ࡱ>      dbjbj |6p"gp"g\..```ttt8Ht|Pn!(""""$~%,%OOOOOOO$RU!P`%$"$"%%!P""6P(6(6(6%8"8"O(6%O(6(6LHN"0~|D&BMOLP0|PM:6V'T6V4N"OJ6V`cO%%(6%%%%%!P!P.N%%%|P%%%%6V%%%%%%%%%.X :  GENERAL SERVICES ADMINISTRATION Federal Supply Service Authorized Federal Supply Schedule Price List On-line access to contract ordering information, terms and conditions, up-to- date pricing, and the option to create an electronic delivery order are available through GSA Advantage!, a menu-driven database system. The INTERNET address for GSA Advantage! is: GSAAdvantage.gov. Multiple Award Schedule Information Technology Contract Number: 47QTCA20D00E4 Period Covered by Contract: August 26, 2020 through August 25, 2025 For more information on ordering from Federal Supply Schedules click on the FSS Schedules button at fss.gsa.gov. Contractor: cyDaptiv Solutions Inc. 7315 Wisconsin Ave Suite 400W Bethesda, MD, 20814-3224 Phone: 301-804-3205 Fax: 240-383-3704 HYPERLINK "https://cydaptiv.com/"https://cydaptiv.com/ Contract administration source: Curtis Hefflin, President/CEO Phone: 571-274-4407 curt@cydaptiv.com Business size: Small CUSTOMER INFORMATION: 1a. Table of awarded special item number(s) with appropriate cross- reference to item descriptions and awarded price(s). SIN 54151S: Information Technology Professional Services SIN 54151HEAL: Health Information Technology Services 1b. Identification of the lowest priced model number and lowest unit price for that model for each special item number awarded in the contract. N/A 1c. If the Contractor is proposing hourly rates, a description of all corresponding commercial job titles, experience, functional responsibility and education for those types of employees or subcontractors who will perform services shall be provided. See  REF _Ref516677835 \h  \* MERGEFORMAT Attachment A for Labor Category Descriptions. SIN 54151SLabor CategoryYear 1Year 2Year 3Year 4Year 5Program Manager$134.80$138.50$142.31$146.23$150.25Project Manager$134.21$137.90$141.69$145.59$149.59Cyber Security Analyst, Senior$122.42$125.78$129.24$132.80$136.45Cyber Security Analyst$117.04$120.26$123.56$126.96$130.45Cyber Security Engineer, Senior$124.13$127.54$131.05$134.66$138.36Cyber Security Engineer$124.13$127.54$131.05$134.66$138.36Systems Administrator, Senior$124.13$127.54$131.05$134.66$138.36Systems Administrator$92.49$95.04$97.65$100.34$103.10Database Administrator, Senior$104.28$107.15$110.10$113.12$116.24IT Specialist$72.54$74.54$76.59$78.70$80.86Information Assurance Project Manager$131.22$134.83$138.54$142.35$146.27Sr Cyber Security Engineer / Task Lead$125.90$129.37$132.92$136.58$140.34SIN 54151HEALLabor CategoryYear 1Year 2Year 3Year 4Year 5Health IT Program Manager$134.80$138.50$142.31$146.23$150.25Health Project Manager$134.21$137.90$141.69$145.59$149.59Health IT Cyber Security Analyst, Sr.$122.42$125.78$129.24$132.80$136.45Health IT Cyber Security Analyst$117.04$120.26$123.56$126.96$130.45Health IT Cyber Security Engineer, Sr.$124.13$127.54$131.05$134.66$138.36Health IT Cyber Security Engineer$124.13$127.54$131.05$134.66$138.36Health IT Systems Administrator, Sr. $124.13$127.54$131.05$134.66$138.36Health IT Systems Administrator$92.49$95.04$97.65$100.34$103.10Health IT Database Administrator, Sr.$104.28$107.15$110.10$113.12$116.24Health IT Specialist$72.54$74.54$76.59$78.70$80.86Health IT Information Assurance Project Manager$131.22$134.83$138.54$142.35$146.27Health IT Cyber Security Engineer, Sr. / Task Lead$125.90$129.37$132.92$136.58$140.34 2. Maximum order. SIN 54151S - $500,000; SIN 54151HEAL - $500,000 3. Minimum order. $100.00 4. Geographic coverage (delivery area). Worldwide 5. Point(s) of production (city, county, and State or foreign country). N/A 6. Discount from list, prices or statement of net price. All pricing in table above are Net. 7. Quantity discounts. 1% for single task orders over $250,000 8. Prompt payment terms. NET 30 days Information for Ordering Offices: Prompt payment terms cannot be negotiated out of the contractual agreement in exchange for other concessions. 9a. Notification that Government purchase cards are accepted at or below the micro-purchase threshold. Government purchase cards are accepted in full. 9b. Notification whether Government purchase cards are accepted or not accepted above the micro-purchase threshold. Government purchase cards are accepted. 10. Foreign items (list items by country of origin) N/A 11a. Time of delivery. 30-days ARO l1b. Expedited Delivery. Contact the Contractors representative to affect a faster delivery. l1c. Overnight and 2-day delivery. Contact the Contractors representative to affect a faster delivery. 11d. Urgent Requirements. Contact the Contractors representative to affect a faster delivery. 12. F.O.B. point(s). F.O.B. Destination. 13a. Ordering address(es). cyDaptiv Solutions Inc. 7315 Wisconsin Ave Suite 400W Bethesda, MD, 20814-3224 13b. Ordering procedures: For supplies and services, the ordering procedures, information on Blanket Purchase Agreements (BPAs), and a sample EPA can be found at the GSA/FSS Schedule homepage (fss.gsa.gov/schedules). 14. Payment address(es) cyDaptiv Solutions Inc. 7315 Wisconsin Ave Suite 400W Bethesda, MD, 20814-3224 15. Warranty provision. N/A 16. Export packing charges, if applicable. N/A 17. Terms and conditions of Government purchase card acceptance (any thresholds above the micro-purchase level) Standard Terms and conditions as any Credit Card Purchase. 18. Terms and conditions of rental, maintenance, and repair (if applicable) N/A 19. Terms and conditions of installation (if applicable). N/A 20. Terms and conditions of repair parts indicating date of parts price lists and any discounts from list prices (if applicable). N/A 20a. Terms and conditions for any other services (if applicable) N/A 21. List of service and distribution points (if applicable). N/A 22. List of participating dealers (if applicab1e). N/A 23. Preventive maintenance (if applicable). N/A 24a. Special attributes such as environmental attributes (e.g., recycled content, energy efficiency, and/or reduced pollutants) N/A 24b. If applicable, indicate that Section 508 compliance information is available on Electronic and Information Technology (EIT) supplies and services and show where full details can be found (e.g. contractors website or other location.) The EIT standards can he found at www.Section5O8.gov/. N/A 25. Data Universal Number System (DUNS) number. 079403104 26. Notification regarding registration in System for Award Management database. cyDaptiv Solutions Inc.s SAM registration is current. Attachment A cyDaptiv Solutions Inc. offers the following Labor Category Descriptions to support the effort contemplated herein. SIN 54151SLabor CategoryFunctional ResponsibilitiesMinimum EducationMinimum Years of ExperienceProgram ManagerPlans, organizes, and directs all project activities. Ensures that project goals and objectives are met within contract terms and conditions. Interacts with client management and is adept in oral and written communication.Bachelors degree10Project ManagerAccountable for all aspects of project performance. Provides overall direction to all project activities and interactions with clients. Demonstrates oral and written communication skills.BA/BS or equivalent and seven years in a related field with supervisory or managerial experienceBachelors degree7Cyber Security Analyst, SeniorBA/BS or equivalent and seven years applicable experience. Leads a medium-to-large team performing tasking in a discipline and related areas (operations analysis, T&E/IV&V, CM, DM, QA, technical documentation, program support, etc.) or independently performs highly complex tasks in a discipline or related areas.Bachelors degree7Cyber Security AnalystLeads a medium-to-large team performing tasking in a discipline and related areas (operations analysis, T&E/IV&V, CM, DM, QA, technical documentation, program support, etc.) or independently performs highly complex tasks in a discipline or related areas.Bachelors degree5Cyber Security Engineer, SeniorBA/BS or equivalent and 7 years applicable experienceLeads a medium-to-large team performing tasking in a discipline and related areas, or independently performs highly complex tasks in a discipline or related areas. Leads a medium-to-large team performing tasking in a discipline and related areas, or independently performs highly complex tasks in a discipline or related areasBachelors degree7Cyber Security EngineerLeads a medium-to-large team performing tasking in a discipline and related areas, or independently performs highly complex tasks in a discipline or related areasBachelors degree5Systems Administrator, SeniorBachelors degree from an accredited college in a related discipline, or equivalent experience/combined education, with 7 years of professional experience. Considered career, or journey, level. BS/5-8 Maintains smooth operation of multi-user computer systems, including coordination with network administrators. Duties may include setting up administrator and service accounts, maintaining system documentation, tuning system performance, installing system wide software and allocate mass storage space. Interacts with users and evaluates vendor products. Makes recommendations to purchase hardware and software, coordinates installation and provides backup recovery. Develops and monitors policies and standards for allocation related to the use of computing resources.Bachelors degree7Systems AdministratorBachelors degree from an accredited college in a related discipline, or equivalent experience/combined education, with 5 years of professional experience. Considered experienced, but still a learner. BS/2-4 Maintains smooth operation of multi-user computer systems, including coordination with network administrators. Duties may include setting up administrator and service accounts, maintaining system documentation, tuning system performance, installing system wide software and allocate mass storage space. Interacts with users and evaluates vendor products. Makes recommendations to purchase hardware and software, coordinates installation and provides backup recovery. Develops and monitors policies and standards for allocation related to the use of computing resources.Bachelors degree5Database Administrator, SeniorImplements and maintains smooth operation and physical design of databases. Reviews database design and integration of systems, provides backup recovery and makes recommendations regarding enhancements and/or improvements. Maintains security and integrity controls. Formulates policies, procedures, and standards relating to database management, and monitors transaction activity and utilization. Responsibilities include: database loading; development and management of operational procedures; environment management; database health (e.g. monitoring, proactive and reactive responses); resource planning; database upgrade planning; backup and recovery strategy planning and implementation; environment transition planning (development, test, stage, production). Bachelors degree from an accredited college in a related discipline, or equivalent experience/combined education, with 7 years of professional experience. Considered career, or journey, level. BS/5-8 Bachelors degree7IT SpecialistMonitors and operates electronic digital computers to process business, scientific, engineering, or other data according to operating instructions. Normally required to set control switches; ensure that correct peripheral equipment is utilized and move switches to clear system and operate the equipment; selects and loads input and output units with materials such as tapes and printout forms. Observes equipment and control panels for operator messages or error indicators. Sets up and runs diagnostic test and reacts appropriately to the messages and reports errors or machine malfunctions as required. May perform clerical work incidental to machine operations such as labeling tape containers, maintaining production records, replenishing specified stock items, and distributing output materials. Normally required to operate peripheral equipment to perform such operations as tape-to-printer. Takes corrective action according to supervisor's instructions. May include working with multiple systems.Bachelors degree4Information Assurance Project ManagerMust have seven years of general experience including five years of specialized Cybersecurity and of which two years were direct supervisory experience. Functional esponsibility includes responsible for the performance of relatively small technical projects or a definable portion of a larger technical program in accordance with contract requirements and company policies, procedures and guidelines. Directs and supervises all support resources for the performance of project assignments and activities. Manages the technical direction of a project through the design, implementation, and testing in accordance with project objectives. Responsible for acquiring follow-on business associated with assigned projects and for supporting new business development by leading relatively small proposals or assisting with major proposals.Bachelors degree7Sr Cyber Security Engineer / Task LeadMonitors, evaluates, and maintains systems and procedures to protect the data systems and databases from unauthorized users. Identifies potential threats and responds to reported security violations. Determines causes of security breaches. Researches, recommends, and implements changes to procedures to protect data from future violations. Defines, plans, designs, and evaluates information security system. Assesses architecture and current hardware limitations, defines and designs system specifications, input/output processes and working parameters for hardware/software compatibility. Designs and conducts tests of designs and architectures. Leads and guides less experienced engineers. Capable of independent management of projects.Bachelors degree7 SIN 54151HEALLabor CategoryFunctional ResponsibilitiesMinimum EducationMinimum Years of ExperienceHealth IT Program ManagerPlans, organizes, and directs all health IT project activities. Ensures that project goals and objectives are met within contract terms and conditions. Interacts with client management and is adept in oral and written communication.Bachelors degree10Health Project ManagerAccountable for all aspects of health IT project performance. Provides overall direction to all project activities and interactions with clients. Demonstrates oral and written communication skills.Bachelors degree7Health IT Cyber Security Analyst, Sr.Gathers and organizes technical information about an organizations mission goals and needs within a cybersecurity environment, Health IT infrastructure, and existing security/IA products. Assists in developing security/IA policies, procedures, and standards. Responsibilities will include working with the customer to minimize risks and assess and secure networks. Evaluates and recommends security products for various platforms and initiatives. May act as a project leader and provide technical leadership and guidance. Must have more than 7 years of experiance Bachelors degree7Health IT Cyber Security AnalystGathers and organizes technical information about an organizations mission goals and needs within a cybersecurity environment, Health IT infrastructure, and existing security/IA products. Assists in developing security/IA policies, procedures, and standards. Responsibilities will include working with the customer to minimize risks and assess and secure networks. Evaluates and recommends security products for various platforms and initiatives. May act as a project leader and provide technical leadership and guidance.Bachelors degree5Health IT Cyber Security Engineer, Sr.Must have a minimum of seven years experience in Health IT cyber security engineering field. Monitors, evaluates, and maintains systems and procedures to protect the data systems and databases from unauthorized users. Identifies potential threats and responds to reported security violations. Determines causes of security breaches. Researches, recommends, and implements changes to procedures to protect data from future violations. Defines, plans, designs, and evaluates information security system. Assesses architecture and current hardware limitations, defines and designs system specifications, input/output processes and working parameters for hardware/software compatibility. Designs and conducts tests of designs and architectures. Leads and guides less experienced engineers. Capable of independent management of projects..Bachelors degree7Health IT Cyber Security EngineerMust have a minimum of five years experience in Health IT cyber security engineering field. Monitors, evaluates, and maintains systems and procedures to protect the health data systems and databases from unauthorized users. Identifies potential threats and responds to reported security violations. Determines causes of security breaches. Researches, recommends, and implements changes to procedures to protect data from future violations. Evaluates information security system. Assesses architecture and current hardware limitations, recommends system specifications, input/output processes and working parameters for hardware/software compatibility. Conducts tests of designs and architectures.Bachelors degree5Health IT Systems Administrator, Sr. Provides Tier 2 on-site systems administration support to local customers at assigned Medical Training Facilities (MTFs). Support includes, but not limited to, receiving trouble tickets, analyzing issues, developing/implementing solutions, escalating issues and tracking customer service to completion for all service requests. Technical support for communications may include installing, maintaining and troubleshooting desktop hardware, software including web-based applications, and peripherals associated with Medical Information Systems. Ensures HIPAA compliance.Bachelors degree7Health IT Systems AdministratorProvides Tier 2 on-site systems administration support to local customers at assigned Medical Training Facilities (MTFs). Support includes, but not limited to, receiving trouble tickets, analyzing issues, developing/implementing solutions, escalating issues and tracking customer service to completion for all service requests. Technical support for communications may include installing, maintaining and troubleshooting desktop hardware, software including web-based applications, and peripherals associated with Medical Information Systems. Ensures HIPAA compliance.Bachelors degree5Health IT Database Administrator, Sr.Must have a minimum of seven years experience with minimum five years in Health IT environments supporting applications processing Protected Health Information (PHI). Responsible for the implementation, configuration, maintenance, and ensuring the availability and consistent performance of health data platforms. Additional tasks include database loading; development and management of operational procedures; environment management; database health (e.g. monitoring, proactive and reactive responses); resource planning; database upgrade planning; backup and recovery strategy planning and implementation; environment transition planning (development, test, stage, production). Bachelors degree7Health IT SpecialistManages the company's firewalls and intrusion detection systems. Develops, tests, and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools. Safeguards the network against unauthorized infiltration, modification, destruction or disclosure. May research, evaluate, test, recommends communicate and implement new security software or devices. Implements, enforces, communicates and develops security policies or plans for data, software applications, hardware, and telecommunications. Provides information to management regarding the negative impact caused by theft, destruction, alteration or denial of access to health information. Provides recommendations on information assurance engineering standards, implementation dependencies, and changing information assurance related technologies. Manages the company's firewalls and intrusion detection systems. Develops, tests, and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools. Safeguards the network against unauthorized infiltration, modification, destruction or disclosure. Researches, evaluates, tests, recommends communicate and implement new security software or devices. Implements, enforces, communicates and develops security policies or plans for data, software applications, hardware, and telecommunications. Provides information to management on the negative impact caused by theft, destruction, alteration or denial of access to information. Provides recommendations on information assurance engineering standards, implementation dependencies, and changing information assurance related technologies. May supervise lower level staff. Requires Bachelor's degree or equivalent and four years related experience.Bachelors degree4Health IT Information Assurance Project ManagerMust have a minimum of seven years experience with minimum five years in Health IT environments supporting Medical Devices and Equipment, Clinical Applications, and Facility Related Controls Systems. Responsible for ensuring the implementation of periodic security inspections, assessments, tests, and reviews. Provide support for taskers related to information management and assurances. Also responsible for the performance of relatively small technical projects or a definable portion of a larger technical program in accordance with contract requirements and company policies, procedures and guidelines. Directs and supervises all support resources for the performance of project assignments and activities. Manages the technical direction of a project through the design, implementation, and testing in accordance with project objectives. Responsible for acquiring follow-on business associated with assigned projects and for supporting new business development by leading relatively small proposals or assisting with major proposals.Bachelors degree7Health IT Cyber Security Engineer, Sr. / Task LeadMust have a minimum of seven years experience with minimum five years in Health IT environment supporting Medical Devices and Equipment, Clinical Applications, and Facility Related Controls Systems. Monitors, evaluates, and maintains systems and procedures to protect the health data systems and databases from unauthorized users. Identifies potential threats to the information and responds to reported security violations. Determines causes of security breaches. Researches, recommends, and implements changes to procedures to protect data from future violations. Defines, plans, designs, and evaluates information security system. Assesses architecture and current hardware limitations, defines and designs system specifications, input/output processes and working parameters for hardware/software compatibility. Designs and conducts tests of designs and architectures. Leads and guides less experienced engineers. Capable of independent management of projects.Bachelors degree7      Labor Category Descriptions  $;i    1  . / 0 οοһֳΨj(hc&UjhPwU hO+hO+hO+hPwhc& hc&hc&hBthBt5hw] hw]hw]hBthg~\hg~hBthg~hg~5 hBt5hg~h,`5h,` jhhc&UmHnHu3$;i   G H d`3$5$\$gdc&gdPw$a$gdBt$a$gdg~$a$gdc&0 E F G H f g h y ' V W [ a ż~~zhYhYhhBt5CJOJQJ^JaJ#hKhK5CJOJQJ^JaJh0hhRh,`5hRCJaJhRCJaJhR hIch,`h,` hIc5hIch,`5hg~hg~5\h"h"0Jh"hg~\ hO+\h"h"\hg~hg~hg~5hg~h,`5hPwjhPwU hc&0J" [ \ X $$Ifa$ 7$8$H$gdK ,:3$5$],gdRd83$5$ ' W Z [ \ 'WX\]stӵnZRhB9CJaJ&hB9hB95CJOJQJ\^JaJ hB95CJOJQJ\^JaJh5h5B* phph55B* php'jv)h5h55B* Uphph5h55B* php!jh5h55B* Uphph0hhK h,`5h0hh0h5h,`hKCJOJQJ^JaJ#hKhK5CJOJQJ^JaJ{{{{{{ $$Ifa${kd)$$IfTl;50  t 00644 laqp ytl^T  #$'+,-<=DELMTU\]defӿh5CJaJh5CJOJQJ^JaJ#h5B*CJOJQJ^JaJphhB9CJaJ&hB9hB95CJOJQJ\^JaJ&hB9hB95CJOJQJ\^JaJ/hB9hB95B*CJOJQJ\^JaJph8kd*$$IfTl;ֈ .5FFFFFF t00644 lBaqp<ytB9T $, $$Ifa$gd5 $Ifgd5,-kds+$$IfTl,ֈ .5FFFFFF t00644 lBaqp<ytzT-=EMU]e $$Ifa$gd5 $Ifgd5efkdw,$$IfTl,ֈ .5FFFFFF t00644 lBaqp<ytzTf $$Ifa$gd5 $Ifgd5kd-$$IfTlXֈ .5FFFFFF t00644 lBaqp<ytzT $$Ifa$gd5 $Ifgd5 %&'-.567NOVW^_fgnovwx!"')*129:ABCPQWX^_#h5B*CJOJQJ^JaJphh5CJaJh5CJOJQJ^JaJUkd.$$IfTl,ֈ .5FFFFFF t00644 lBaqp<ytzT&.6 $$Ifa$gd5 $Ifgd567kd/$$IfTlXֈ .5FFFFFF t00644 lBaqp<ytzT7OW_gow $$Ifa$gd5 $Ifgd5wxkd0$$IfTl,ֈ .5FFFFFF t00644 lBaqp<ytzTx $$Ifa$gd5 $Ifgd5kd1$$IfTlXֈ .5FFFFFF t00644 lBaqp<ytzT $$Ifa$gd5 $Ifgd5kd2$$IfTl,ֈ .5FFFFFF t00644 lBaqp<ytzT"*2:B $$Ifa$gd5 $Ifgd5BCkd3$$IfTlXֈ .5FFFFFF t00644 lBaqp<ytzTCQX_fmt $$Ifa$gd5 $Ifgd5_eflmstu   !"#'1289?@FGMNTUVopwxdzhB9CJaJ&hB9hB95CJOJQJ\^JaJ hB95CJOJQJ\^JaJ#h5B*CJOJQJ^JaJphh5CJaJh5CJOJQJ^JaJCtukd5$$IfTl,ֈ .5FFFFFF t00644 lBaqp<ytzTu $$Ifa$gd5 $Ifgd5kd6$$IfTlXֈ .5FFFFFF t00644 lBaqp<ytzT  $$Ifa$gd5 $Ifgd5kd+7$$IfTlXֈ .5FFFFFF t00644 lBaqp<ytzT"#29@GNUx{kd=8$$IfTl50  t 00644 laqp ytl^T $$Ifa$gdB9UVkd8$$IfTlֈ .5FFFFFF t00644 lBaqp<ytB9TVpx $$Ifa$gd5 $Ifgd5kd9$$IfTlXֈ .5FFFFFF t00644 lBaqp<ytzT&'(HIPQXY`ahipqr   '23:;BCJKRSZ[\{|h5CJaJh5CJOJQJ^JaJ#h5B*CJOJQJ^JaJphU $$Ifa$gd5 $Ifgd5kd:$$IfTlXֈ .5FFFFFF t00644 lBaqp<ytzT' $$Ifa$gd5 $Ifgd5'(kd;$$IfTlXֈ .5FFFFFF t00644 lBaqp<ytzT(IQYaiq $$Ifa$gd5 $Ifgd5qrkd<$$IfTlXֈ .5FFFFFF t00644 lBaqp<ytzTr $$Ifa$gd5 $Ifgd5kd=$$IfTlXֈ .5FFFFFF t00644 lBaqp<ytzT  $$Ifa$gd5 $Ifgd5  kd ?$$IfTlXֈ .5FFFFFF t00644 lBaqp<ytzT 3;CKS[ $$Ifa$gd5 $Ifgd5[\kd@$$IfTlXֈ .5FFFFFF t00644 lBaqp<ytzT\| $$Ifa$gd5 $Ifgd5  !"'()*YZabijqryz"#'7>?Խ h,`5 hK5 hBt5hKhK5h,`#h5B*CJOJQJ^JaJphh5CJaJh5CJOJQJ^JaJJkd-A$$IfTlXֈ .5FFFFFF t00644 lBaqp<ytzT $$Ifa$gd5 $Ifgd5kd?B$$IfTlXֈ .5FFFFFF t00644 lBaqp<ytzT ") $$Ifa$gd5 $Ifgd5)*kdQC$$IfTlXֈ .5FFFFFF t00644 lBaqp<ytzT*Zbjrz $$Ifa$gd5 $Ifgd5kdcD$$IfTlXֈ .5FFFFFF t00644 lBaqp<ytzT $$Ifa$gd5 $Ifgd5kduE$$IfTlXֈ .5FFFFFF t00644 lBaqp<ytzT#?s _`Kop0NggdB9gdBt?irs '7JP^_`y'}"'IK'*noph6^h,`5h6^h6^5h6^ h6^5 hBt\hBthBt\ hBt5 h55h0h h,`5 h0h5 hB95h,`I'0Nfgh'BC[\t'j'146'@CDwz| ' - 0 2 !'!Y! h,`5\ h6^5h6^hB9hB95hB9h,` h,`5VghBC\t6D|2 ^!!!!'"6""^gd5gd5gdB9Y!\!^!!!!!!!!!!""&"'"(")"6"7"N"O""""""""""""""wwoWWWWWWW/hB9hB95B*CJOJQJ\^JaJphhB9CJaJ#hB9hB95B*CJ\aJphh#h1h1mHnHuh\FmHnHuh\Fh\FmHnHu h1h1h5h5B* phpjh1UmHnHuh5 h55\ h6^5\h\Fh\F5\h6^hB9hB95h,` h,`5"""""""#|zkdF$$Ifl$f$  t 0$644 lBaqp ytB9 $$Ifa$"""""### #!#'#####$$$$$$%$&$'$$$$$'%B%C%T%U%V%W%X%v%w%%%%'&&&&&&&&&&&&'''''''''''ʾʾʾʾʞʾhB9CJOJQJ^JaJ#hB9B*CJOJQJ^JaJphhB9B*CJaJphhB9CJaJ)hB95B*CJOJQJ\^JaJph/hB9hB95B*CJOJQJ\^JaJph>##!#$$+%%%$Ifkd;G$$Ifl\i$FFFhF  t(0$644 lBaqp(ytB9$$$&$C%U%W%@kdUH$$Ifl\i$FGFhF t0$644 lBaqp(ytB9$IfW%X%w%&&&F@@@@$Ifkd9I$$Ifl\i$FGFhF t0$644 lBaqp(ytB9&&&'''F@@@@$IfkdJ$$Ifl\i$FGFhF t0$644 lBaqp(ytB9''()))F@@@@$IfkdK$$Ifl\i$FGFhF t0$644 lBaqp(ytB9'(('((((')))))))))))))'*\*]*n*o*p*q*r******'+j++++',,,,'-------------'....'////'000000000111 1'1/111'2#hB9B*CJOJQJ^JaJphhB9CJOJQJ^JaJhB9CJaJhB9B*CJaJphP)))]*o*q*F@@@@$IfkdK$$Ifl\i$FGFhF t0$644 lBaqp(ytB9q*r**---F@@@@$IfkdL$$Ifl\i$FGFhF t0$644 lBaqp(ytB9---001F@@@@$IfkdM$$Ifl\i$FGFhF t0$644 lBaqp(ytB911 14 5 5F@@@@$IfkdN$$Ifl\i$FGFhF t0$644 lBaqp(ytB9'2/222'3/3334'4/4444445 5 5 5 555'5/555'6/666'7/777'8/8889999999'9/9B9C999':/:::';/;;;'</<<<<<<<<<<<<'=/==='>/>>>#hB9B*CJOJQJ^JaJphhB9CJOJQJ^JaJhB9CJaJhB9B*CJaJphP 5 55999F@@@@$IfkduO$$Ifl\i$FGFhF t0$644 lBaqp(ytB999C9<<<F@@@@$IfkdYP$$Ifl\i$FGFhF t0$644 lBaqp(ytB9<<<???F@@@@$Ifkd=Q$$Ifl\i$FGFhF t0$644 lBaqp(ytB9>'?/???????????????????@@!@"@#@'@<@=@@@#A%A&A'A7A8A:A;AA?Picture 1"b' #S8k2'DQn' #S8k2PNG  IHDR-kC|sRGB'zIDATx^\TW"ED@&+5&&MhfS7&?MvIM)ޢ&PXA(EiKÛ3ᓌ3{;;vvZQ)Rphj*T HPP*,O-T |ʇ_u*T>TJS@C˯:*{@)Q,BUU՚5k\ұcǀɓ'[~P +[)55… 7PgPe|cǮ^ʷURqS@+0ʪ+077} |x}Ǐ񕋋* b T>ΧOЮ]Pgiy |ظNXʿjQG`7Pq ݻP'jy |(ACCCvvŋfԨQ_uD.))9<{>s,DPjy |]aXTT$Vcȑ-2*v6SZZ*!=zh=w>KR~ ]]]-,·՘Is:u=Nk>D;w,DQ04;h^o3<l'$$ .)`|PCٹgϞ^^^vI[ˇ++$D]RNw|,:^`꤭vʇXhRRRwbhb? /]Ǣ" C{꼭vʇ&ƂPV;t@Oٻwʕ+mJFðǼ`h>SO>żW6w!$%c@hU.~t2P~]}7 >]KpLXbř3g|}}mlF 0))i׮]4PÆ #εDIXݥOWϐ`݂ursd*g{W=R]]O=ԥCذaoBBQ*ݦ!3}]ۯ_?+v굚+e5g/=~ne?hs~e[wf/ռP 4Y98ڈ;>!Nn(E-)i[m߶ltFUxq! dh#6Z޾Rޯ/sjumԩ:nCY/aiÆ_E^\]_ybE ѱ1wؐ5(K) pľI YCx˖-@pWby}|yW ^mr&XUWQQ,Q4 *˓W9bW(1e4v)IwPv@i*++v  ӄ&!Pwؑ.ӦM#FZc]]'__MمO'?rZql-;N!4Ԓ6pt؏7\rW|x"bU~r%5X*=Iy;4_VSBO*g.,z2RE{i^~uh^=nԊ'DuDv)()eTvۤ(%ڭL!2 _!=!X+{va  .$=ú2a\dB|x= RPt z`¢Ko?W*20 cGaMtGS[WRw.Ύ:mBj競V>Yt8?3+Ϗca=Sf߿>w|(z钕_O3觍DBHũghWJճWWiyuZzYsp];Hrx5v+s)=xRH<#j3f<<\}ppG߾?LlK{-i][:Jf d1d :Dѣ Q lͰ[Ʉ2Dv8 @ز S{R[mQJرczj1޵r0! K5xݥW.Xy)`p.]>7fȞxmDq%2۸1Ȗj7pbGKtՓ2:ëo1GOC[K& }^sOzLIF;uIe DХ+2雅s(Cy?{>&\(Zf N`c/?x>,kDֳPwͺ '״;!!kT]Kd"ϔ}OXiPEI03H31OgxI]޾;}C܆v8s5e6>eX8a$Grl\c x[ ^E®|FO"N;N/so26&Ɛʇ'oCC E4t_F&F‰1Tk5dT/QBic[Nz,(ع'G& /D%Ql|!3S4No"ٔMGLu=0*p] 5F`<ÁKAS*8r4wx۹7G,+-kǰ!Ԫ7&gJǸ30p@FmW6~9X˳\ܳ?W'SncF)N|>rX&"{ofCXBe4W{9Kx5IYU)S_A6[!:mQPk~9irJ_j!t*2HEm(oCѳJP\m$m2a#;kR Ÿ_J"ew8lE)Z"w ra0q]!vQD,@u Qch1c. 2fO!1QqC[$/WlSh 5-1'5"-GU)2#=T<$P>x̌Y9*%:Z (? F@t7&'@>J0lmH{Sct]!n:q2zL +rD.eeeHB@g0b<yHB~gJFn 5;pfєV*pF`*ֆ2նYˌH>Egs]D`e:)z 6|&tg3;A(Bmm*F\@_z(:Ekj740=8JG@!. Y3bOY\A|eB/R`6ml|W1DpНAyځ˷O! q,%K` 6; "4)f7>\fדri;``[O@C׬?>i_T+껃gJ2gʤ(1z1CXk T%M272&d ]`HtBA5 Sڸq#AluET"fs8Ψnuߞv Cm:tHY@=7?$sQdٹS,"&) \ cEbSm\/ pVUZ  7o k5MִM`bYn@D X Sl nΖ0~i˯%g أDž{kJqL#u 8o`;L=Skk|!=$N\ׯ?@M܀ <XZ?}5*Oo?m$y{,tɬ㇇al)VBq.t! 97kw12ĢxXǢgT1j($gF?~ @5tң3jx{tF, >_NC__wzzOH@= e"'@_qm CG gDQCO+H/y^`"B ++bqW# I,tȿh9@F֦)F]\) 5;YΔbMA –p9݂wrNGD?%qiz NaRvڽ/9y4;D`]ZFNO82~bˎ,r9FѮ6q$X݆& (6 [\9kC .G9M[37!m@[a<ʇ"bsi;Q *(*ʄ߽4i|H#7! "V 8+/yw?z.ZdY1NU$J$M0!qړʶ+47˄fhάax Q ‡a]) P|6d 3[ JP(aV#G0=c{[+  @ xܸ(juZ^6xj$NJ$*g6nj-m pA$Ui ~8QDxKl`AlF i}UDs]U]54(~LȑUd)_5 0ܮ{[!d hR! ˦6 F\( +̼ '%wI8R*pf*pܮdܿN;ܚ-\]}EfL*i-ua{P;E<ǤqN,ݶQ̙ c,T my%P{p&TX]Ɍpxl2!Ȣ"iW$7'V :(z0/ićGFF@6%{Za@G" ;i1U;?lFIyD7=yh? 4cdщ!HKc#؊~IK<-n %пa+.QWԒNipgzlqfHi *[`ʞ62p's0Ikpto@|;9a߱+;tYP@p!r܍283ό-96)_YYGHY!ޏ? ܌zrְH?k n8`C7Ny⛖.]ېZ B~UP.4Z9}+ & dy W2&_2@m=\Ɇpء^H&MW'77pK#.J__WK#u W"ȁ@Y2Crbʥf䇊4EIZBe-4~Q|"UU=6ÇdFm1n8rIY0Vbhv28 e@)2J2gJk !תMQH kFxL !'%ƂWT&YR(`|0VQ +Z0·9"'RB~MZ]R PC~T HC΄ddJ) dhbխV͇HBl"!N*j:0)`|H+ܘ! .rRИju!TΌH2(fHR>0MĩU X-l_jTRt X<4}bj *l*bCi)Ml*bCi)ew2IENDB`DyK yK Dhttps://cydaptiv.com/yX;H,]ą'c}DyK _Ref516677835$$Ifq!vh#v0:V l;  t 00650aqp ytl^T$$Ifq!vh#v#v:V l; t00655Baqp<ytB9T$$Ifq!vh#v#v:V l, t00655/ /  / Baqp<ytzT$$Ifq!vh#v#v:V l, t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V lX t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V l, t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V lX t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V l, t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V lX t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V l, t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V lX t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V l, t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V lX t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V lX t00655/ / / /  Baqp<ytzT$$Ifq!vh#v0:V l  t 00650aqp ytl^T$$Ifq!vh#v#v:V l t00655Baqp<ytB9T$$Ifq!vh#v#v:V lX t00655/ /  / Baqp<ytzT$$Ifq!vh#v#v:V lX t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V lX t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V lX t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V lX t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V lX t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V lX t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V lX t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V lX t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V lX t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V lX t00655/ / / /  Baqp<ytzT$$Ifq!vh#v#v:V lX t00655/ / / /  Baqp<ytzT$$Ifq!vh#v$:V l  t 0$6,5$9Baqp ytB9$$Ifq!vh#v#v#vh#v:V l  t(0$6,555h5Baqp(ytB9$$Ifq!vh#v#v#vh#v:V l t0$6,555h5Baqp(ytB9$$Ifq!vh#v#v#vh#v:V l t0$6,555h5Baqp(ytB9$$Ifq!vh#v#v#vh#v:V l t0$6,555h5Baqp(ytB9$$Ifq!vh#v#v#vh#v:V l t0$6,555h5Baqp(ytB9$$Ifq!vh#v#v#vh#v:V l t0$6,555h5Baqp(ytB9$$Ifq!vh#v#v#vh#v:V l t0$6,555h5Baqp(ytB9$$Ifq!vh#v#v#vh#v:V l t0$6,555h5Baqp(ytB9$$Ifq!vh#v#v#vh#v:V l t0$6,555h5Baqp(ytB9$$Ifq!vh#v#v#vh#v:V l t0$6,555h5Baqp(ytB9$$Ifq!vh#v#v#vh#v:V l t0$6,555h5Baqp(ytB9$$Ifq!vh#v#v#vh#v:V l t0$6,555h5Baqp(ytB9$$Ifq!vh#v#v#vh#v:V l t0$6,555h5Baqp(ytB9$$Ifq!vh#v<#:V l  t 0<#6,5<#9Baqp yt\F$$Ifq!vh#v6#v^#vA#vg:V l  t(0<#6,5\55P5Baqp(yt\F$$Ifq!vh#v6#v^#vA#vg:V l t0<#6,5\55P5Baqp(yt\F$$Ifq!vh#v6#v^#vA#vg:V l t0<#6,5\55P5Baqp(yt\F$$Ifq!vh#v6#v^#vA#vg:V l t0<#6,5\55P5Baqp(yt\F$$Ifq!vh#v6#v^#vA#vg:V l t0<#6,5\55P5Baqp(yt\F$$Ifq!vh#v6#v^#vA#vg:V l t0<#6,5\55P5Baqp(yt\F$$Ifq!vh#v6#v^#vA#vg:V l t0<#6,5\55P5Baqp(yt\F$$Ifq!vh#v6#v^#vA#vg:V l t0<#6,5\55P5Baqp(yt\F$$Ifq!vh#v6#v^#vA#vg:V l t0<#6,5\55P5Baqp(yt\F$$Ifq!vh#v6#v^#vA#vg:V l t0<#6,5\55P5Baqp(yt\F$$Ifq!vh#v6#v^#vA#vg:V l t0<#6,5\55P5Baqp(yt\F$$Ifq!vh#v6#v^#vA#vg:V l t0<#6,5\55P5Baqp(yt\F$$Ifq!vh#v6#v^#vA#vg:V l t0<#6,5\55P5Baqp(yt\FeDd cs@@6  3 Abp<_QnpIDATx1 Om 0kXIENDB`)x666666666vvvvvvvvv666666>666666666666666666666666666666666666666666666666hH66666666666666666666666666666666666666666666666666666666666666666p62&6FVfv2&6FVfv&6FVfv&6FVfv&6FVfv&6FVfv&6FVfv8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@66666_HmH nH sH tH @`@ NormalCJ_HaJmH sH tH ZZ ' Heading 1$<@&5CJ KH OJQJ\^JaJ `@` 5 Heading 2$<@&$56CJOJPJQJ\]^JaJZZ 6^ Heading 3$<@&5CJOJPJQJ\^JaJZZ 6^ Heading 4$<@&5CJOJPJQJ\^JaJDA D Default Paragraph FontVi@V 0 Table Normal :V 44 la (k ( 0No List B^@B  Normal (Web)dd[$\$HH  Balloon TextCJOJQJ^JaJHBH $ Body Text$a$CJOJQJ^JaJ6U`!6 g~0 Hyperlink >*B*phcR/1R 6^Heading 3 Char5CJOJPJQJ\^JaJR/AR 6^Heading 4 Char5CJOJPJQJ\^JaJBORB 6^indent1]^CJaJZbZ 6^Indent Level 1Pd^`PCJaJLarL 6^Indent Level 2^`CJRR 6^pbodyd `B*CJOJQJ^JaJph\\ 6^ pindented1d `B*CJOJQJ^JaJphDT@D 6^0 Block Textx]^X/X 5Heading 2 Char$56CJOJPJQJ\]^JaJ*/* #0No List1HH #0Header  H$CJOJPJQJaJB/B #0 Header CharCJOJPJQJaJH H #0Footer  H$CJOJPJQJaJB/B #0 Footer CharCJOJPJQJaJbb #List Paragraph!d^m$CJOJPJQJaJT "T # No Spacing"$CJOJPJQJ_HaJmH sH tH ,/, #0 No List11#D/AD #0Body Text CharOJQJ^JaJFRF #Table Paragraph%1$7$8$H$*/* #0No List2&R/qR CYfHeading 1 Char5CJ KH OJQJ\^JaJ T/T R TableGrid:V(( CJOJQJ_HaJmH sH tH PK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭Vj\{cp/IDg6wZ0s=Dĵw %;r,qlEآyDQ"Q,=c8B,!gxMD&铁M./SAe^QשF½|SˌDإbj|E7C<bʼNpr8fnߧFrI.{1fVԅ$21(t}kJV1/ ÚQL×07#]fVIhcMZ6/Hߏ bW`Gv Ts'BCt!LQ#JxݴyJ] C:= ċ(tRQ;^e1/-/A_Y)^6(p[_&N}njzb\->;nVb*.7p]M|MMM# ud9c47=iV7̪~㦓ødfÕ 5j z'^9J{rJЃ3Ax| FU9…i3Q/B)LʾRPx)04N O'> agYeHj*kblC=hPW!alfpX OAXl:XVZbr Zy4Sw3?WӊhPxzSq]y \ \\+6 0 _?Y!"''2>-B N[dd3579BOYgrsuw} ,-ef67wxBCtuUV'(qr  [\)*g"#$W%&')q*-1 59<??"@8A-BDF^JOMO1RU;\`ddd468:;<=>?@ACDEFGHIJKLMNPQRSTUVWXZ[\]^_`abcdefhijklmnopqtvxyz{|~ /E\\X@ @ (    6 C"? T(    R?"Text Box 2c"$`? B S  ?(\K2$T I8:j@ _Hlk46165751 _Hlt516677857 _Hlt516677858 _Hlk46166202 _Ref516677835\(\@@s5\< K 11~<<\\\\\\\\\\\\\\\!""%%l)),.,22?BIBFGiItI8NCNNNOOQQR(RRRVV\\\\\\\\\\\\\\\3333333333333333333 s  #$+-<=DELMTU\]df %&-.57NOVW^_fgnovx  ! " ) * 1 2 9 : A C P Q W X ^ _ e f l m s u      V o p w x          & ( H I P Q X Y ` a h i p r   2 3 : ; B C J K R S Z \ { |       ! " ( * Y Z a b i j q r y z 7^\\\\\\ s  #$+-<=DELMTU\]df %&-.57NOVW^_fgnovx  ! " ) * 1 2 9 : A C P Q W X ^ _ e f l m s u      V o p w x          & ( H I P Q X Y ` a h i p r   2 3 : ; B C J K R S Z \ { |       ! " ( * Y Z a b i j q r y z 7^\\\\\ 6]?L T1y2txhsl'mZxh+0`05@CJOJQJRHc\aJo(hH"/`/5@CJOJQJRHc\^JaJ."0`05@CJOJQJRHc\^JaJ()" " " " " " "0`05@CJOJQJRHc\^JaJ."/`/5@CJOJQJRHc\^JaJ." " " " " " " "0`05@CJOJQJRHc\^JaJ." " " " " " " " h^`5o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.h 8^8`hH.h ^`hH.h  L^ `LhH.h  ^ `hH.h x^x`hH.h HL^H`LhH.h ^`hH.h ^`hH.h L^`LhH.Q^567>*B*CJH*OJPJQJS*^JaJphq rwh" Q^567>*B*CJH*OJPJQJS*^JaJphq rwhoQp^p567>*B*CJH*OJPJQJS*^JaJphq rwh%Q@ ^@ 567>*B*CJH*OJPJQJS*^JaJphq rwh" Q^567>*B*CJH*OJPJQJS*^JaJphq rwhoQ^567>*B*CJH*OJPJQJS*^JaJphq rwh%Q^567>*B*CJH*OJPJQJS*^JaJphq rwh" Q^567>*B*CJH*OJPJQJS*^JaJphq rwhoQP^P567>*B*CJH*OJPJQJS*^JaJphq rwh%808^8`0o(() ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.h 8^8`hH.h ^`hH.h  L^ `LhH.h  ^ `hH.h x^x`hH.h HL^H`LhH.h ^`hH.h ^`hH.h L^`LhH. ^`OJQJo(^`OJQJ^Jo(o p^p`OJQJo( @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJQJo( ^`OJQJo(^`OJQJ^Jo(o P^P`OJQJo( /b'1y2?L 'm?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~ Root Entry F+|Data `1TablejVWordDocument|6SummaryInformation(DocumentSummaryInformation8CompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q