ࡱ>  Kbjbj <B~I]]   - - - 8e a!l- mR"zG%(o%o%o%)-.$a` 0I)|)"00]]o%o%'9990]o% o%9099{ 6Ѐo% Ղ- 1 }:؂=0mZ}v1tЀ Ѐm/0/"9//m/m/m/5m/m/m/m0000m/m/m/m/m/m/m/m/m/ #:    Document Control Organisation[Council Name]Title[Document Title]Author[Document Author Named Person]Filename[Saved Filename]Owner[Document Owner Job Role]Subject[Document Subject e.g. IT Policy]Protective Marking[Marking Classification]Review date Revision History Revision DateRevisorPrevious VersionDescription of Revision Document Approvals This document requires the following approvals: Sponsor ApprovalNameDate Document Distribution This document will be distributed to: NameJob TitleEmail Address Contributors Development of this policy was assisted through information provided by the following organisations: Devon County CouncilSefton Metropolitan Borough CouncilDudley Metropolitan Borough CouncilStaffordshire ConnectsHerefordshire County CouncilWest Midlands Local Government AssociationPlymouth City CouncilWorcestershire County CouncilSandwell Metropolitan Borough Council Contents  TOC \o "1-3" \h \z \u  HYPERLINK \l "_Toc220210041" 1 Policy Statement  PAGEREF _Toc220210041 \h 4  HYPERLINK \l "_Toc220210042" 2 Purpose  PAGEREF _Toc220210042 \h 4  HYPERLINK \l "_Toc220210043" 3 Scope  PAGEREF _Toc220210043 \h 4  HYPERLINK \l "_Toc220210044" 4 Definition  PAGEREF _Toc220210044 \h 4  HYPERLINK \l "_Toc220210045" 5 Risks  PAGEREF _Toc220210045 \h 4  HYPERLINK \l "_Toc220210046" 6 Applying the Policy  PAGEREF _Toc220210046 \h 5  HYPERLINK \l "_Toc220210047" 6.1 User Responsibility  PAGEREF _Toc220210047 \h 5  HYPERLINK \l "_Toc220210048" 6.2 Remote and Mobile Working Arrangements  PAGEREF _Toc220210048 \h 7  HYPERLINK \l "_Toc220210049" 6.3 Access Controls  PAGEREF _Toc220210049 \h 7  HYPERLINK \l "_Toc220210050" 6.4 Anti Virus Protection  PAGEREF _Toc220210050 \h 7  HYPERLINK \l "_Toc220210051" 6.5 User Awareness  PAGEREF _Toc220210051 \h 8  HYPERLINK \l "_Toc220210052" 7 Policy Compliance  PAGEREF _Toc220210052 \h 8  HYPERLINK \l "_Toc220210053" 8 Policy Governance  PAGEREF _Toc220210053 \h 8  HYPERLINK \l "_Toc220210054" 9 Review and Revision  PAGEREF _Toc220210054 \h 9  HYPERLINK \l "_Toc220210055" 10 References  PAGEREF _Toc220210055 \h 9  HYPERLINK \l "_Toc220210056" 11 Key Messages  PAGEREF _Toc220210056 \h 9  HYPERLINK \l "_Toc220210057" 12 Appendix 1  PAGEREF _Toc220210057 \h 10  Policy Statement [Council Name] provides users with the facilities and opportunities to work remotely as appropriate. [Council Name] will ensure that all users who work remotely are aware of the acceptable use of portable computer devices and remote working opportunities. Purpose The purpose of this document is to state the Remote Working policy of [Council Name]. Portable computing devices are provided to assist users to conduct official Council business efficiently and effectively. This equipment, and any information stored on portable computing devices, should be recognised as valuable organisational information assets and safeguarded appropriately. Scope This document applies to all Councillors, Committees, Departments, Partners, Employees of the Council, contractual third parties and agents of the Council who use [Council Name] IT facilities and equipment remotely, or who require remote access to [Council Name] Information Systems or information. Definition This policy should be adhered to at all times whenever any user makes use of portable computing devices. This policy applies to all users use of [Council Name] IT equipment and personal IT equipment when working on official Council business away from [Council Name] premises (i.e. working remotely). This policy also applies to all users use of [Council Name] IT equipment and personal IT equipment to access Council information systems or information whilst outside the United Kingdom. Portable computing devices include, but are not restricted to, the following: Laptop computers. Tablet PCs. PDAs. Palm pilots. Mobile phones. Text pagers. Wireless technologies. Risks [Council Name] recognises that there are risks associated with users accessing and handling information in order to conduct official Council business. The mobility, technology and information that make portable computing devices so useful to employees and organisations also make them valuable prizes for thieves. Securing PROTECT or RESTRICTED data when users work remotely or beyond the Council network is a pressing issue particularly in relation to the Councils need as an organisation to protect data in line with the requirements of the Data Protection Act 1998 (see [Name a relevant policy but likely to be the Legal Responsibilities Policy]). This policy aims to mitigate the following risks [amend list as appropriate]: Increased risk of equipment damage, loss or theft. Accidental or deliberate overlooking by unauthorised individuals. Unauthorised access to PROTECT and RESTRICTED information. Unauthorised introduction of malicious software and viruses. Potential sanctions against the Council or individuals imposed by the Information Commissioners Office as a result of information loss or misuse. Potential legal action against the Council or individuals as a result of information loss or misuse. Council reputational damage as a result of information loss or misuse. Non-compliance with this policy could have a significant effect on the efficient operation of the Council and may result in financial loss and an inability to provide necessary services to our customers. Applying the Policy All IT equipment (including portable computer devices) supplied to users is the property of [Council Name]. It must be returned upon the request of [Council Name]. Access for ICT Services staff [or equivalent department] of [Council Name] shall be given to allow essential maintenance security work or removal, upon request. All IT equipment will be supplied and installed by [Council Name] IT Service staff [or equivalent department]. Hardware and software must only be provided by [Council Name]. Where users access Government Connect Secure Extranet (GCSx) type services, facilities or RESTRICTED information, under no circumstances should non-Council owned equipment be used. User Responsibility It is the users responsibility to ensure that the following points are adhered to at all times [amend list as appropriate]: Users must take due care and attention of portable computer devices when moving between home and another business site. Users will not install or update any software on to a Council owned portable computer device. Users will not install any screen savers on to a Council owned portable computer device. Users will not change the configuration of any Council owned portable computer device. Users will not install any hardware to or inside any Council owned portable computer device, unless authorised by [Council Name] ICT department [or equivalent department]. Users will allow the installation and maintenance of [Council Name] installed Anti Virus updates immediately. Users will inform the IT Helpdesk [or equivalent department] of any Council owned portable computer device message relating to configuration changes. Business critical data should be stored on a Council file and print server wherever possible and not held on the portable computer device. All faults must be reported to the IT Helpdesk [or equivalent department]. Users must not remove or deface any asset registration number. User registration must be requested from [name a relevant department]. Users must state which applications they require access to. User requests for upgrades of hardware or software must be approved by [name a role e.g. line manager]. Equipment and software will then be purchased and installed by IT Services [or equivalent department]. The IT equipment can be used for personal use by staff so long as it is not used in relation to an external business. Only software supplied and approved by [Council Name] can be used (e.g. Word, Excel, Adobe, etc.). No family members may use the IT equipment. The IT equipment is supplied for the staff members sole use. The user must ensure that reasonable care is taken of the IT equipment supplied. Where any fault in the equipment has been caused by the user, in breach of the above paragraphs, [Council Name] may recover the costs of repair (calculated at a rate of [insert rate per hour and state date of prices and any associated costs]). This charge is subject to annual review. The user should seek advice from [Council Name] before taking any Council supplied ICT equipment outside the United Kingdom. The equipment may not be covered by the Councils normal insurance against loss or theft and the equipment is liable to be confiscated by Airport Security personnel. [Council Name] may at any time, and without notice, request a software and hardware audit, and may be required to remove any equipment at the time of the audit for further inspection. All users must co-operate fully with any such audit. Any user who chooses to undertake work at home or remotely in relation to their official duties using their own IT equipment must understand that they are not permitted to hold any database, or carry out any processing of PROTECT or RESTRICTED information relating to the Council, its employees, or customers. Under no circumstances should Personal or RESTRICTED information be emailed to a private non-Council email address. For further information, please refer to the [name a relevant policy likely to be Email Policy]. Any user accessing GCSx type services or facilities, or using GCSx PROTECT or RESTRICTED information, must only use Council-owned equipment which has appropriate technical security and advanced authentication mechanisms whilst working remotely. Remote and Mobile Working Arrangements Users should be aware of the physical security dangers and risks associated with working within any remote office or mobile working location. Equipment should not be left where it would attract the interests of the opportunist thief. In the home it should also be located out of sight of the casual visitor. For home working it is recommended that the office area of the house should be kept separate from the rest of the house. Equipment must be secured whenever it is not in use [insert relevant security standards as appropriate]. Users must ensure that access / authentication tokens and personal identification numbers are kept in a separate location to the portable computer device at all times. All removable media devices and paper documentation must also not be stored with the portable computer device. Paper documents are vulnerable to theft if left accessible to unauthorised people. These should be securely locked away in suitable facilities (e.g. secure filing cabinets) when not in use. Documents should be collected from printers as soon as they are produced and not left where they can be casually read. Waste paper containing PROTECT or RESTRICTED information must be shredded to required standards [insert shredding standards if appropriate]. Access Controls It is essential that access to all PROTECT or RESTRICTED information is controlled. This can be done through physical controls, such as locking the home office or locking the computers keyboard. Alternatively, or in addition, this can be done logically such as by password controls or User Login controls. Portable computer devices should be switched off, logged off, or the keyboard locked when left unattended, even if only for a few minutes. All data on portable computer devices must, where possible, be encrypted. If this is not possible, then all PROTECT or RESTRICTED data held on the portable device must be encrypted. An SSL or IPSec VPN must be configured to allow remote users access to Council systems if connecting over Public Networks, such as the Internet. If connecting to GCSx resources, this must be an IPSec-VPN. The use of thin client over the VPN should be considered as a further means of security. Dual-factor authentication must be used when accessing the Council network and information systems (including Outlook Web Access) remotely via both Council owned and non-Council owned equipment [delete as appropriate should the Council not require dual-factor authentication]. Access to the Internet from [Council Name] owned ICT equipment, should only be allowed via onward connection to Council provided Proxy Servers and not directly to the Internet. Anti Virus Protection ICT Services [or equivalent department] will deploy an up-to-date Anti Virus signature file to all users who work away from the [Council Name] premises. Users who work remotely must ensure that their portable computer devices are connected to the corporate network at least once every two weeks [amend as appropriate] to enable the Anti Virus software to be updated. User Awareness All users must comply with appropriate codes and policies associated with the use of IT equipment. This includes the following [amend list as appropriate]: Email Policy. Internet Acceptable Use Policy. Software Policy. GCSx Acceptable Usage Policy and Personal Commitment Statement. Computer, Telephone and Desk Use Policy. Removable Media Policy. IT Access Policy. It is the users responsibility to ensure their awareness of and compliance with these. The user shall ensure that appropriate security measures are taken to stop unauthorized access to PROTECT or RESTRICTED information, either on the portable computer device or in printed format. Users are bound by the same requirements on confidentiality and Data Protection as [Council Name] itself. Policy Compliance If any user is found to have breached this policy, they may be subject to [Council Names] disciplinary procedure. If a criminal offence is considered to have been committed further action may be taken to assist in the prosecution of the offender(s). If you do not understand the implications of this policy or how it may apply to you, seek advice from [name appropriate department]. Policy Governance The following table identifies who within [Council Name] is Accountable, Responsible, Informed or Consulted with regards to this policy. The following definitions apply: Responsible the person(s) responsible for developing and implementing the policy. Accountable the person who has ultimate accountability and authority for the policy. Consulted the person(s) or groups to be consulted prior to final policy implementation or amendment. Informed the person(s) or groups to be informed after policy implementation or amendment. Responsible[Insert appropriate Job Title e.g. Head of Information Services, Head of Human Resources etc.]Accountable[Insert appropriate Job Title e.g. Section 151 Officer, Director of Finance etc. It is important that only one role is held accountable.]Consulted[Insert appropriate Job Title, Department or Group e.g. Policy Department, Employee Panels, Unions etc.]Informed[Insert appropriate Job Title, Department or Group e.g. All Council Employees, All Temporary Staff, All Contractors etc.] Review and Revision This policy will be reviewed as it is deemed appropriate, but no less frequently than every 12 months. Policy review will be undertaken by [Name an appropriate role]. References The following [Council Name] policy documents are directly relevant to this policy, and are referenced within this document [amend list as appropriate]: Email Policy. Internet Acceptable Use Policy. Software Policy. GCSx Acceptable Usage Policy and Personal Commitment Statement. Computer, Telephone and Desk Use Policy. Removable Media Policy. IT Access Policy. Legal Responsibilities Policy. The following [Council Name] policy documents are indirectly relevant to this policy [amend list as appropriate]: Information Protection Policy. Human Resources Information Security Standards. Information Security Incident Management Policy. IT Infrastructure Policy. Communications and Operation Management Policy. Key Messages It is the users responsibility to use portable computer devices in an acceptable way. This includes not installing software, taking due care and attention when moving portable computer devices and not emailing PROTECT or RESTRICTED information to a non-Council email address. Users should be aware of the physical security dangers and risks associated with working within any remote office or mobile working location. It is the users responsibility to ensure that access to all PROTECT or RESTRICTED information is controlled e.g. through password controls. All PROTECT or RESTRICTED data held on portable computer devices must be encrypted. Appendix 1 [Include any relevant associated information within appendices. This may include any templates or forms that need to be completed as stated within the policy]     Remote Working Policy FINAL COPY v2.0Page  PAGE 1 of  NUMPAGES 10 [Version No.][Page. No.] [Local Authority Logo] Policy Document Remote Working Policy [Date]   #$56CQRSYikqr * , 8 : ; C L M V Z [ b ͼͼͼͼͼͼͼ͜yr͋͋ hk hYdhk hYd5hYdB*^Jph hYdhYd5B*CJ^JphhYdhB*CJ^Jph *h}hB*CJ^Jph *h}h}B*CJ^Jph hYdh5B*CJ^Jphhk h5 hk h hk hjhk hU,    !gdk !"#56CRSYjf}kd$$Ifl40j 5&j  t05&644 lalf4 $If^gd^gdk gdk jkrtt $If^gd}kd$$Ifl40j 5&j  t05&644 lalf4tt $If^gd}kd:$$Ifl40j 5&j  t05&644 lalf4tt $If^gd}kd$$Ifl40j 5&j  t05&644 lalf4tt $If^gd}kdt$$Ifl40j 5&j  t05&644 lalf4 + tt $If^gd}kd$$Ifl40j 5&j  t05&644 lalf4+ , 8 9 tt $If^gd}kd$$Ifl40j 5&j  t05&644 lalf49 : ; L M [ c t xoj]P]P H$If^Hgd H$If^HgdYdgdk ^gdk ^gd'}kdK$$Ifl40j 5&j  t05&644 lalf4b c s      " # 8 9 : ` d e n o | ~   $ % пޱޱާТпޱޱާ~zrzhk h5hhL<{h'CJ h'CJhhh'CJhhh'5h' hYd5hYdB*^JphhYd5B*CJ^JphhmzhYdCJhYdhYd5hYdhB*^Jph hYdhYd5B*CJ^Jph hYdh5B*CJ^Jph( [NNNN H$If^Hgdkd$$Ifl4\  % $ t0%644 lalf4 [NNNN H$If^Hgdkd$$Ifl4\  % $ t0%644 lalf4 [NNNN H$If^Hgdkdz$$Ifl4\  % $ t0%644 lalf4 [NNNN H$If^HgdkdC$$Ifl4\  % $ t0%644 lalf4 [NNNN H$If^Hgdkd $$Ifl4\  % $ t0%644 lalf4 [NNNN H$If^Hgdkd$$Ifl4\  % $ t0%644 lalf4 [NNNN H$If^Hgdkd $$Ifl4\  % $ t0%644 lalf4 [NNNN H$If^Hgdkdg $$Ifl4\  % $ t0%644 lalf4  [YPPPCC H$If^Hgd^gdYdkd0 $$Ifl4\  % $ t0%644 lalf4      akd $$Ifl4F/ ]5&/ .  t05&6    44 lalf4 H$If^Hgd     naaa H$If^Hgdkd $$Ifl4F/ ]5&/ .  t05&6    44 lalf4   ! naaa H$If^Hgdkd_ $$Ifl4F/ ]5&/ .  t05&6    44 lalf4! " # 9 : ` e o } neeeeXXX H$If^Hgd^gdYdkd$$Ifl4F/ ]5&/ .  t05&6    44 lalf4} ~  naaa H$If^Hgdkd$$Ifl4F/ ]5&/ .  t05&6    44 lalf4 naaa H$If^Hgdkdx$$Ifl4F/ ]5&/ .  t05&6    44 lalf4 naaa H$If^Hgdkd+$$Ifl4F/ ]5&/ .  t05&6    44 lalf4  ne\\\K & F7$If^7gd U^gd'^gdk kd$$Ifl4F/ ]5&/ .  t05&6    44 lalf4 7 8 \ s t 5Tkd$$Ifl0&$  t/'644 layt U & F7$If^7gd UTkd$$Ifl0&$  t/'644 layt U & F>$If^>gd U  5Tkd$$Ifl0&$  t/'644 layt U & F7$If^7gd UTkdQ$$Ifl0&$  t/'644 layt U & F>$If^>gd U   $ % ) x t7>(^gdk Tkd$$Ifl0&$  t/'644 layt U $If^gd U% & = > ? @ \ ] ^ _ ` a q r s ǼǨǑDžt`tWtԑǼC'jkh+}h+}0JCJUaJh'CJaJ&jh+}h+}CJUaJ jh+}h+}CJUaJh+}h+}CJaJ,h+}h+}B*CJOJQJ\^JaJph'jqh+}h+}0JCJUaJh+}h+}CJaJh+}h+}0JCJaJ!jh+}h+}0JCJUaJh+}hz?CJaJjh+}hz?CJUaJ     # $ % & ' ( ) * + G H ᾭqᾭ]&jh+}h+}CJUaJ'jeh+}h+}0JCJUaJh+}h+}CJaJh'CJaJ&jh+}h+}CJUaJ jh+}h+}CJUaJh+}h+}CJaJ,h+}h+}B*CJOJQJ\^JaJphh+}h+}0JCJaJ!jh+}h+}0JCJUaJ#H I J K L V W X r s t u v w x y z Ͷͪ|ڶq]ͶͪI&jh+}h+}CJUaJ'jYh+}h+}0JCJUaJh+}h+}CJaJh'CJaJ&jh+}h+}CJUaJ jh+}h+}CJUaJh+}h+}CJaJ,h+}h+}B*CJOJQJ\^JaJphh+}h+}0JCJaJ!jh+}h+}0JCJUaJ'j_h+}h+}0JCJUaJ 89:;>Խ԰԰qԽ԰aM԰'jMh+}h+}0JCJUaJh+}h+}CJaJmHnHu&jh+}h+}CJUaJh+}h+}CJaJ'jSh+}h+}0JCJUaJh+}h+}CJaJh+}h+}0JCJaJ,h+}h+}B*CJOJQJ\^JaJph!jh+}h+}0JCJUaJ jh+}h+}CJUaJh'CJaJ>?RSTnopqrstuvȲșyyiUyȲ'jGh+}h+}0JCJUaJh+}h+}CJaJmHnHu!jh+}h+}0JCJUaJh'CJaJmHnHu1jh+}h+}CJUaJmHnHu+jh+}h+}CJUaJmHnHu"h+}h+}CJaJmHnHuh+}h+}0JCJaJ0h+}h+}B*CJOJQJaJmHnHphu12345аzfTT;1jh+}h+}CJUaJmHnHu"h+}h+}CJaJmHnHu'jAh+}h+}0JCJUaJh+}h+}CJaJmHnHuh+}h+}0JCJaJ0h+}h+}B*CJOJQJaJmHnHphu!jh+}h+}0JCJUaJh'CJaJmHnHu+jh+}h+}CJUaJmHnHu1jh+}h+}CJUaJmHnHu56789UVWX[\qrsȸȤȒ|c|T|ȸh'CJaJmHnHu1jh+}h+}CJUaJmHnHu+jh+}h+}CJUaJmHnHu"h+}h+}CJaJmHnHu'j;h+}h+}0JCJUaJh+}h+}CJaJmHnHuh+}h+}0JCJaJ0h+}h+}B*CJOJQJaJmHnHphu!jh+}h+}0JCJUaJ  ʹ͢sdڴYE'j/h+}h+}0JCJUaJh+}h+}CJaJh'CJaJmHnHu1jh+}h+}CJUaJmHnHu+jh+}h+}CJUaJmHnHu"h+}h+}CJaJmHnHu0h+}h+}B*CJOJQJaJmHnHphuh+}h+}0JCJaJ!jh+}h+}0JCJUaJ'j5h+}h+}0JCJUaJ  89:;<=>?@\]^_`arstпЫ܆rп^܆&jh+}h+}CJUaJ'j)h+}h+}0JCJUaJh+}h+}CJaJ!jh+}h+}0JCJUaJh'CJaJ&jh+}h+}CJUaJ jh+}h+}CJUaJh+}h+}CJaJh+}h+}0JCJaJ,h+}h+}B*CJOJQJ\^JaJph!><WX^gdR|gdmz^gdmz^gdWgd>^gd2hgdz?^gdz?    678Ͷͪ|ڶq]ͶͪI&j!h+}h+}CJUaJ'j!h+}h+}0JCJUaJh+}h+}CJaJh'CJaJ&j h+}h+}CJUaJ jh+}h+}CJUaJh+}h+}CJaJ,h+}h+}B*CJOJQJ\^JaJphh+}h+}0JCJaJ!jh+}h+}0JCJUaJ'j# h+}h+}0JCJUaJ89:;<=>Z[\]_`lmnԽ԰԰qԽ԰]԰'j#h+}h+}0JCJUaJ&j"h+}h+}CJUaJh+}h+}CJaJ'j"h+}h+}0JCJUaJh+}h+}CJaJh+}h+}0JCJaJ,h+}h+}B*CJOJQJ\^JaJph!jh+}h+}0JCJUaJ jh+}h+}CJUaJh'CJaJ"[iGUW~xnhnhdh[RHR *h$_hR|CJh$_hR|CJh$_hWCJh> h>CJ *h>h>CJ hz?CJ hz?h> hz?hh hz?hz?hz?jh+}hz?CJUaJ,h+}h+}B*CJOJQJ\^JaJph!jh+}h+}0JCJUaJh'CJaJ jh+}h+}CJUaJ&j#h+}h+}CJUaJWo}'+9v|FLTbӈvmv_v *h$_h$=CJ\^JhZWCJ\^Jh$=CJ\^JhR|CJ\^JhCJ\^Jhmz5\^Jh5\^J *hR|CJ hZWCJ *hR|hR|CJ hR|CJhR|hR|CJ hCJhmz hk h hk hmzhOfCJ\^Jh9VCJ\^Jh$_h$_CJ\^J! -<I`abhiH^gd/b9gd0L^gdmz & Fgd/b9gdmz^,  _`abhisö⊁shdYI *h0Lh0LCJ\^JaJh/b9CJ\^JaJh/b9hmzCJ\^JaJh/b9hR|CJ\^JaJh/b9CJ\^Jh/b9CJ\^JmH sH hR|CJ\^JmH sH " *hZWhZWCJ\^JmH sH hZWCJ\^JmH sH h;CJ\^JmH sH " *h$_h$_CJ\^JmH sH h$_CJ\^JmH sH h$_h$_CJ\^JmH sH swb2?*+FGHIst̠seZhK 0CJ\^JaJh/b9h0LCJ\^JaJ *h htCJ\^JaJ *h0LCJ\^JaJ *h0Lh0LCJ\^JaJhtCJ\^JaJh CJ\^JaJh)*GCJ\^JaJh3hCJ\^JaJh0LCJ\^JaJh/b9CJ\^JaJh/b9h/b9CJ\^JaJ *h0Lh/b9CJ\^JaJ#HI|6.uvwCDEYZT U ! !^gdJw^gd`0^gd2hgdmz^gdmz^gdt & Fgd/b9^gd/b9t6JtuEXYZ^x~9:=KL¾}oe}[[QhJwCJmH sH h`0CJmH sH h)*GCJmH sH  *h)*Gh)*GCJmH sH  *h$ h`0CJmH sH hA(h`0CJmH sH  *h$ h`0CJ h)*GCJ hOfCJ h`0CJ hmzCJhk hZh/b9h/b9CJ\^JaJh *h *CJ\^JaJh *CJ\^JaJh3hCJ\^JaJhtCJ\^JaJ    * 3 C Q T U h ! ! !/!0!!!!!!ù󤝖|x|l_h h CJmH sH  *h!kh!kCJ\h`0 h$ CJ\h!kh!k5CJ\ h3hCJ\ hOfCJ\ h!kCJ\ h`0CJ\h`0hJw5CJmH sH h!kCJmH sH h CJmH sH  *h hJwCJmH sH hJwCJmH sH  *h$ hJwCJmH sH hA(hJwCJmH sH ! ! ! !!!!!""v"w"""(#)###D$E$$$g%h%%%%^gd$  & Fgd$  & Fgd ^gd gdJw^gd`0!!!"""M"["\"v"w"""""""#'#(#Z#^############ $$$#$)$󻲩yoi_huaCJmH sH  huaCJ *h$ huaCJ *h)*Gh)*GCJmH sH h)*GCJmH sH  *hxhmCJmH sH hmCJmH sH hxhmCJhxhxCJhxCJmH sH h$ h$ CJmH sH hRh CJmH sH h$ CJmH sH htCJmH sH hEyh$ CJmH sH %)$*$B$D$g$$$$$8%e%f%g%%%%%%%%&&9&B&c&d&s&v&x&&&&&.'/'I'J'K'L'h'y'{'''''''''ķ~ *h$ h`0CJmH sH hOhCJmH sH hA(hOhCJmH sH hqZCJmH sH hxCJmH sH hA(h`0CJmH sH h$ h`0CJmH sH hOfCJmH sH  *h$ h$ CJmH sH hEyh$ CJmH sH h$ CJmH sH 1%%x&y&K'L'((((***+++,,).*./ /!/"/#/^gdA(,gdR^gdl^gd`0 & FgdJw & Fgd`0gd$  & Fgd$ ^gd$ ''((#($(%(&('(((((((G)U)))))**&*4*y*z****** +++'+)+*+++9+I+J+߽߯եեեvh *hth`0CJmH sH hA(hlCJmH sH h>CJmH sH h}CJmH sH  *hxhlCJmH sH hlCJmH sH  *hDh`0CJmH sH  *h$ h`0CJmH sH hOhCJmH sH hxCJmH sH hA(h`0CJmH sH h)*GCJmH sH h`0CJmH sH (J+]+^+++,,,",5,T,l,,,-- --Q-g-p-w-z-{------'.(.).m.u.x.../// /!/"/ùح⦓ßß|vp hA(CJ hgy=CJ h`0CJh`0hRCJ\ hgy=CJ\ *hxhxCJ\ hRCJ\ hxCJ\h$ h`05CJ\h`0h3hCJ\ h3hCJ\ h)*GCJ\ htCJ\h`0h`0CJ\ h`0CJ\h`0CJmH sH hA(h`0CJmH sH *#/$/K/L///f1g122E4F4G4W4X455667779999gd$ ^gdC(^gdfjgdJw^gdA("/$/K/L//00000000111d1e1f1g1\2~222222222222223,3-3@3I333333333344C4F4G4ǭǦǟΘΌ؅ h$ CJ\ *h$ hC(CJ\ h3hCJ\ h\(CJ\ hqCJ\ *hRhRCJ\ hxCJ\ h9CJ\ hRCJ\hC(hC(CJ\ hC(CJ\h`0hhCJ\ hSH\CJ\ hJwCJhJw hMCJ4G4W4X4{4444444o55555555555556666h66666666666677c7d77777777777¼¶°ªªh5CJmH sH h\(CJmH sH  hJwCJh\(h\(5CJ h5CJ hLCJ h3hCJ h\(CJ hp@DCJ h(CJ\ h54vCJ\ h)*GCJ\ h\(CJ\ h3hCJ\hC(hC(CJ\ hC(CJ\hC(47888899'9-9;9<9O9X9]9_9g9999999999:[:i:u::::::ŻٵٵӫwqgZgZh)*Gh)*GCJmH sH h)*GCJmH sH  h)*GCJ *h$ hDCJ *hDhDCJhDhDCJ hDhD hp@DCJh5CJmH sH h54vCJmH sH  hgy=CJh}8CJmH sH  *h$ h}8CJmH sH  h}8CJ h54vCJ *h2h2CJ *h2CJ *h2h;CJ h;CJ!999K;L;M;\;];;; <)<:<z<<<<<'=(=U>V>W>i>gd$  & Fgd> & Fgd$ ^gd$ gdz?^gdfjgd$ ::::;;;;#;,;-;<;>;I;J;K;L;M;\;e;f;;;9<:<y<z<<<s======>>L>U>W>տvlbbh3hCJmH sH hgy=CJmH sH h>h>CJmH sH h$ h>CJmH sH h$ CJmH sH  *h$ h$ CJmH sH h>CJmH sH h$ h$ CJmH sH  h$ hD h$ CJhDhDCJ hz?CJ *hz?hz?CJmH sH h)*Gh)*GCJmH sH hz?CJmH sH &W>i>j>>>???????@+@9@@@A AXAaAAAB(BBBBB C!C#C-CCCCDD5D6DDDDDʯʥʥʥʥʥʥʥʥʽ}qh>h>hCJ *h>h>CJh>h>CJh2hhmzCJ *h$ h$ 5CJh$ h$ 5CJ *h$ h$ CJh="hmzh$ hmzCJh$ h$ CJ *huShuSCJ^JaJhuShuSCJ^JaJh[h$ CJ^J h[h$ +i>j>f?g????@@@@AXAABB(BBxx$If^gd$ xx$If^gdj` & Fgd$ ^gd$ gdmz^gdmz"^gduS"^gd$ BBB"CtcRxx$If^gd$ xx$If^gdj`kd $$$Ifl03$  t 0644 lap ytj`"C#C-CCtcRxx$If^gd$ xx$If^gdj`kd$$$Ifl03$  t 0644 lap ytj`CCCDtcRxx$If^gd$ xx$If^gdj`kd{%$$Ifl03$  t 0644 lap ytj`DD D!D5D6DDDDDDtkkfk]]]kk^gd>gdmz^gdmzkd3&$$Ifl03$  t 0644 lap ytj` DDDDDEhEEEEEXFFFFFFGGGGGGGHHHHHHIIIIIJJJLJMJXJYJZJJJwh0:h0:CJaJ' *h)*Gh0:B*CJ]^JaJph$h2hh0:B*CJ]^JaJphhh0:h8ChCJ h3hCJ h8CCJ h>CJh>CJmH sH h>h>CJmH sH  *h>h>CJh>h>CJhmz hmzCJ,DDDEEEEEF.FFFXFwFxFyFFF G;GlGGGGGGG & Fgd>^gd>^gdmzgdmzGHjIIMJYJZJJJJJJKKKKKKK0KTK $$Ifa$gd=P $Ifgd'^gd0:gd0: & Fgd8CJJJJJKKKKKKK$K(K,K/K0K5K6KK?KCKDKOKPKRKSKUKVKWKcKdKfKoKtKuKvKwKxKKKKKKKKȻȻȻȻݩݡݡݚݒ݈݁ h\/5CJ0hh\/5CJ0 *hh\/ hh\/ *hXf#h\/ hh\/h'CJmHnHujh=Ph\/CJUh=Ph\/CJh'hz?h>h\/"jh\/UmHnHsH tH uh Ujh UU/TKUKVKWKeKqKrKuK>QkdJ'$$Ifl0K&[\ t644 la $$Ifa$gdXf# $IfgdgdSkd&$$Ifl0K&[\ t644 lauKvKwKKKKKKKKKKK^gd0: $^a$gd KKKKKKKh0:h0:CJaJhh\/ *hh\/CJ$hh\/CJ$:&P 1h/R :p=P. A!n"5#$% $$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4^$$If!vh5$5 #v$#v :V l t/'65$5 yt U^$$If!vh5$5 #v$#v :V l t/'65$5 yt U^$$If!vh5$5 #v$#v :V l t/'65$5 yt U^$$If!vh5$5 #v$#v :V l t/'65$5 yt U^$$If!vh5$5 #v$#v :V l t/'65$5 yt U}DyK _Toc220210041}DyK _Toc220210041}DyK _Toc220210042}DyK _Toc220210042}DyK _Toc220210043}DyK _Toc220210043}DyK _Toc220210044}DyK _Toc220210044}DyK _Toc220210045}DyK _Toc220210045}DyK _Toc220210046}DyK _Toc220210046}DyK _Toc220210047}DyK _Toc220210047}DyK _Toc220210048}DyK _Toc220210048}DyK _Toc220210049}DyK _Toc220210049}DyK _Toc220210050}DyK _Toc220210050}DyK _Toc220210051}DyK _Toc220210051}DyK _Toc220210052}DyK _Toc220210052}DyK _Toc220210053}DyK _Toc220210053}DyK _Toc220210054}DyK _Toc220210054}DyK _Toc220210055}DyK _Toc220210055}DyK _Toc220210056}DyK _Toc220210056}DyK _Toc220210057}DyK _Toc220210057$$If!vh55#v#v:V l  t 06,55p ytj`$$If!vh55#v#v:V l  t 06,55p ytj`$$If!vh55#v#v:V l  t 06,55p ytj`$$If!vh55#v#v:V l  t 06,55p ytj`]$$If!vh5[5\#v[#v\:V l t65[5\X$$If!vh5[5\#v[#v\:V l t65[5\^3 666666666vvvvvvvvv666666>6666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH L`L Normal ^CJOJQJ_HmH sH tH T@"T mz Heading 1$ & F@&5B*\^JaJphF@F p`M Heading 2  & F@&CJ\]aJDD 2h Heading 3  & F@& CJ\aJLL  Heading 4  & F@&5B*\aJphVV  Heading 5  & F@&56B* CJ\]aJphFF  Heading 6  & F@&5CJ\aJHaH  Heading 7  & F@&CJOJQJaJ<a<  Heading 8  & F@&]8 a8  Heading 9 & F@&DA`D Default Paragraph FontVi@V 0 Table Normal :V 44 la (k ( 0No List @@  Balloon Text CJ^JaJF@F Header$ (#^a$^JaJ@ @@ Footer %AB^CJ:)!:  Page Number CJOJQJ`@`pTOC 1$ h$^a$B*\^JaJmHnHphuL@L pTOC 2 $^` B*aJphRU@QR0 Hyperlink'>*B*CJOJQJmHnHphsH u.. TOC 3 ^RR Section Heading  & F@& B*CJphH>H Title$ & F@& a$5CJ KH\aJ 22 Bullet  & Fm$66 Numbered  & Fm$FVF FollowedHyperlink >*B* ph&& TOC 444 TOC 5$^a$.. TOC 6 ^.. TOC 7 ^.. TOC 8 ^.. TOC 9 !^BC@"B Body Text Indent"$a$RR2R Body Text Indent 2#$a$ B*]ph:B: Style1$& #$./FBRF  Body Text%$^a$ B*phJSbJ Body Text Indent 3& B*phl1rl Style Heading 3 + Black Left'$a$B*^JaJphDP@D  Body Text 2($^a$aJll Style Header + 12 pt Bold Left)$ 9a$5\`;`  List Number 3$*$ ^`a$aJtH jj  Table Grid7:V+0+8@8 $ List Paragraph,B'B ;0Comment ReferenceCJaJ88 /;0 Comment Text.CJNN .;0Comment Text CharOJQJmH sH tH @j@ 1;0Comment Subject05\FF 0;0Comment Subject Char5\t t z?p TOC Heading2$ & Fd@& )B*CJOJPJQJ^JmH ph6_sH tH PK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] )@HC)@HKC $$^^}b % H >5 8Wst!)$'J+"/G47:W>DJKK&0EFGHIJKLMOPQRTUWXZ[]^`abdeknq!j+ 9    ! }   >H !%#/9i>B"CCDDGTKuKK'()*+,-./123456789:;<=>?@ABCDNSVY\_cfghijlmop%=>^r$&')IWsuvx:Soqrt2457Wr9;<>^s  7 9 : < \ m C X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%̕<CEJVY!t    ,R$A!D@0:!@ (  VB  C D"?D(  t  3 S"?   s *X)?3"?   s *X)?3"?   s *X)?3"? B S  ? C}'0t/St>a t/ct z%zu# _Toc151889812 _Toc151889833 _Toc160615973 _Toc160616200 _Toc160616367 _Toc160615976 _Toc160616203 _Toc160616370 _Toc161078637 _Hlt190759227 _Toc190759234 _Toc220210041 _Toc220210042 _Toc160615977 _Toc160616204 _Toc160616371 _Toc161078638 _Toc190759235 _Toc220210043 _Toc190759236 _Toc220210044 _Toc220210045 _Toc190759237 _Toc220210046 _Toc220210047 _Toc220210048 _Toc220210049 _Toc220210050 _Toc220210051 _Toc220210052 _Toc220210053 _Toc220210054 _Toc220210055 _Toc220210056 _Toc220210057 bEE $'G,1M3W67!<<?NBC @  !"##%%% gXJ'V,1[3h6774<<?XBC555/'C5'C9*urn:schemas-microsoft-com:office:smarttagsplaceB*urn:schemas-microsoft-com:office:smarttagscountry-region [bh&l&BBBBBBBBCCCCvCwCCg#q#++W.Y.u2J344;;< <F>H>l?n?BBBBBBBBCCCCvCwCC333333333::% d d o } wxh8ecdllsv$$%%% %%%Q%Q%{%%%%m&t&u&u&x&&&&&'' '!'#'++++++++W,W,X,X,{,,,,,,,,........X1]1_1g1L3L3s5555555555@@@@@@@@AAAAAAABBBBBBBBBBBBBBBBCCCCC5C?CCCSCvCwCCCCC::% d d o } wxh8ecdllsv$$%%% %%%Q%Q%{%%%%m&t&u&u&x&&&&&'' '!'#'++++++++W,W,X,X,{,,,,,,,,........X1]1_1g1L3L3s5555555555@@@@@@@@AAAAAAABBBBBBBLBBBBBBBBBBCCCC$C(C,C/C5C?CCCSCVCVCC7| 4Pm, |=6>_r^h|k!WK$A:&h.;5A&ײB'"<+LDrh6+œ$+3lZ+8%  zE;v%~>n>4 2Dډ@*SrV1F`Ȧs$}?ls~&Aux6wn**Q7zvZQ}m(vh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHop^p`OJQJo(hH@ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoP^P`OJQJo(hHh ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.8^`B*OJQJo(ph:uhH8^`B*OJQJo(ph:uhH8pp^p`B*OJQJo(ph:uhH8@ @ ^@ `OJQJo(hH8^`OJQJ^Jo(hHo8^`OJQJo(hH8^`OJQJo(hH8^`OJQJ^Jo(hHo8PP^P`OJQJo(hH^`B*OJQJo(ph ^`OJQJo(o   ^ `OJQJo(   ^ `OJQJo( xx^x`OJQJo(o HH^H`OJQJo( ^`OJQJo( ^`OJQJo(o ^`OJQJo(hh^h`CJOJQJo(888^8`CJOJQJo(^`CJOJQJo(  ^ `CJOJQJo(  ^ `CJOJQJo(xx^x`CJOJQJo(HH^H`CJOJQJo(^`CJOJQJo(^`CJOJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH0^`0o(0^`0o(.0^`0o(..88^8`o(... 88^8`o( .... ^`o( ..... ^`o( ...... `^``o(....... 00^0`o(........h ^`OJQJo(h ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(|#808^8`056CJOJQJaJo(hH)| ^`hH.| \L\^\`LhH.| ,,^,`hH.| ^`hH.| L^`LhH.| ^`hH.| l l ^l `hH.| < L< ^< `LhH.h88^8`OJQJo(hH^`. L ^ `L.  ^ `.xx^x`.HLH^H`L.^`.^`.L^`L.h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH^`B*OJQJo(ph ^`OJQJo(o   ^ `OJQJo(   ^ `OJQJo( xx^x`OJQJo(o HH^H`OJQJo( ^`OJQJo( ^`OJQJo(o ^`OJQJo( P^`PhH @^@`hH. 0^`0hH.. `^``hH... ^`hH .... ^`hH ..... ^`hH ......  `^``hH.......  0^0`hH........^`B*OJQJo(ph ^`OJQJo(o   ^ `OJQJo(   ^ `OJQJo( xx^x`OJQJo(o HH^H`OJQJo( ^`OJQJo( ^`OJQJo(o ^`OJQJo(pp^p`B*OJQJo(ph   ^ `OJQJo(o   ^ `OJQJo( xx^x`OJQJo( HH^H`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o ^`OJQJo(h^`.hhhhhhhhh 88^8`OJQJo(h ^`OJQJo(oh   ^ `OJQJo(h   ^ `OJQJo(h xx^x`OJQJo(oh HH^H`OJQJo(h ^`OJQJo(h ^`OJQJo(oh ^`OJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh hh^h`OJQJo(h 88^8`OJQJo(oh ^`OJQJo(h   ^ `OJQJo(h   ^ `OJQJo(oh xx^x`OJQJo(h HH^H`OJQJo(h ^`OJQJo(oh ^`OJQJo(^`B*o(ph:uhH. ^`hH. L^`LhH. pp^p`hH. @ @ ^@ `hH. L^`LhH. ^`hH. ^`hH. L^`LhH.^`B*OJQJo(ph ^`OJQJo(o   ^ `OJQJo(   ^ `OJQJo( xx^x`OJQJo(o HH^H`OJQJo( ^`OJQJo( ^`OJQJo(o ^`OJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh hh^h`OJQJo(h 88^8`OJQJo(oh ^`OJQJo(h   ^ `OJQJo(h   ^ `OJQJo(oh xx^x`OJQJo(h HH^H`OJQJo(h ^`OJQJo(oh ^`OJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH|#808^8`056CJOJQJaJo(hH)^`OJQJ^Jo(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJQJo(hHA:&s6>_D~>n>lszE;+3^<+05A&*S|k!F`6wm, Z+8AuVB'Q}7 6+Q7zK$                  l3F        DK        ,f6:5DFpz'f                  ޮR~                          DK        DK        DK        jt|.vWFLdj(?42W                           m        DK                                   ޮR~        |{k $_ a U44g}= ="="Xf#[4%'A(C(\( *;-K 04}8/b9Kh90:3Z:;;gy=P>z?p@D)*GJLMp`M=PRA&RZW]YeF[SH\*]j`uaod ud3hOh2h!kbrm hqXrUsrt54vmzR|+}}I}9~^h>bV$=hYD2qZ cH5=E>,@WEyw9Z`0" \/0LL SfjFYdt9V(.u 7xlOf$ 8CqmJwD\B>juSt^BB@##7##C@Unknown G*Ax Times New Roman5Symbol3. *Cx Arial7.{ @Calibri5. *[`)Tahoma7K@Cambria?= *Cx Courier New;Wingdings7. [ @VerdanaA BCambria Math"1hѦѦJkˆ 8 "y 8 "ynx4dBB 2qHX $P2! xxYS:\Chief Executive\ISD\ICT\Security\Security Policy\Admin\IT Security Policy Template.dotRemote Working Policy TemplatePolicyOlly Baker - Aperia Olly Bakert                     Oh+'0  , L X d p| Remote Working Policy TemplatePolicyOlly Baker - Aperia IT Security Policy Template.dot Olly Baker2Microsoft Office Word@F#@"E@*b}Ղ@*b}Ղ  8՜.+,D՜.+,d  hp  Aperia Government Servicesy"B Remote Working Policy Template Title 8@ _PID_HLINKSATf3bE _Toc2202100573\E _Toc2202100563VE _Toc2202100553PE _Toc2202100543JE _Toc2202100533DE _Toc2202100523>E _Toc22021005138E _Toc22021005032E _Toc2202100493,E _Toc2202100483&E _Toc2202100473 E _Toc2202100463E _Toc2202100453E _Toc2202100443E _Toc2202100433E _Toc2202100423E _Toc220210041  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrtuvwxyz{|}~Root Entry F@ܷՂData s'1Table5WordDocument <SummaryInformation(DocumentSummaryInformation8MsoDataStore~aՂ ՂZ51SDC22N23IYA==2~aՂ ՂItem  PropertiesUCompObj y   F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q