ࡱ>  Mbjbj <DD--85 4i!tx"&L&&&_+>24 SxUxUxUxUxUxUx$z}Vyx5*|=+"55yx--&&x<<<5-&&Sx<5Sx<<2q6+v& ̘?6Gs.?xx0xus~6~\+v~+v55<55555yxyx9555x5555~555555555 :    Document Control Organisation[Council Name]Title[Document Title]Author[Document Author Named Person]Filename[Saved Filename]Owner[Document Owner Job Role]Subject[Document Subject e.g. IT Policy]Protective Marking[Marking Classification]Review date Revision History Revision DateRevisorPrevious VersionDescription of Revision Document Approvals This document requires the following approvals: Sponsor ApprovalNameDate Document Distribution This document will be distributed to: NameJob TitleEmail Address Contributors Development of this policy was assisted through information provided by the following organisations: Devon County CouncilSefton Metropolitan Borough CouncilDudley Metropolitan Borough CouncilStaffordshire ConnectsHerefordshire County CouncilWest Midlands Local Government AssociationPlymouth City CouncilWorcestershire County CouncilSandwell Metropolitan Borough Council Contents  TOC \o "1-3" \h \z \u  HYPERLINK \l "_Toc216240593" 1 Policy Statement  PAGEREF _Toc216240593 \h 4  HYPERLINK \l "_Toc216240594" 2 Purpose  PAGEREF _Toc216240594 \h 4  HYPERLINK \l "_Toc216240595" 3 Scope  PAGEREF _Toc216240595 \h 4  HYPERLINK \l "_Toc216240596" 4 Definition  PAGEREF _Toc216240596 \h 4  HYPERLINK \l "_Toc216240597" 5 Risks  PAGEREF _Toc216240597 \h 4  HYPERLINK \l "_Toc216240598" 6 Applying the Policy - Passwords  PAGEREF _Toc216240598 \h 5  HYPERLINK \l "_Toc216240599" 6.1 Choosing Passwords  PAGEREF _Toc216240599 \h 5  HYPERLINK \l "_Toc216240600" 6.1.1 Weak and strong passwords  PAGEREF _Toc216240600 \h 5  HYPERLINK \l "_Toc216240601" 6.2 Protecting Passwords  PAGEREF _Toc216240601 \h 5  HYPERLINK \l "_Toc216240602" 6.3 Changing Passwords  PAGEREF _Toc216240602 \h 5  HYPERLINK \l "_Toc216240603" 6.4 System Administration Standards  PAGEREF _Toc216240603 \h 6  HYPERLINK \l "_Toc216240604" 7 Applying the Policy Employee Access  PAGEREF _Toc216240604 \h 6  HYPERLINK \l "_Toc216240605" 7.1 User Access Management  PAGEREF _Toc216240605 \h 6  HYPERLINK \l "_Toc216240606" 7.2 User Registration  PAGEREF _Toc216240606 \h 6  HYPERLINK \l "_Toc216240607" 7.3 User Responsibilities  PAGEREF _Toc216240607 \h 6  HYPERLINK \l "_Toc216240608" 7.4 Network Access Control  PAGEREF _Toc216240608 \h 7  HYPERLINK \l "_Toc216240609" 7.5 User Authentication for External Connections  PAGEREF _Toc216240609 \h 7  HYPERLINK \l "_Toc216240610" 7.6 Suppliers Remote Access to the Council Network  PAGEREF _Toc216240610 \h 7  HYPERLINK \l "_Toc216240611" 7.7 Operating System Access Control  PAGEREF _Toc216240611 \h 7  HYPERLINK \l "_Toc216240612" 7.8 Application and Information Access  PAGEREF _Toc216240612 \h 8  HYPERLINK \l "_Toc216240613" 8 Policy Compliance  PAGEREF _Toc216240613 \h 8  HYPERLINK \l "_Toc216240614" 9 Policy Governance  PAGEREF _Toc216240614 \h 8  HYPERLINK \l "_Toc216240615" 10 Review and Revision  PAGEREF _Toc216240615 \h 9  HYPERLINK \l "_Toc216240616" 11 References  PAGEREF _Toc216240616 \h 9  HYPERLINK \l "_Toc216240617" 12 Key Messages  PAGEREF _Toc216240617 \h 9  HYPERLINK \l "_Toc216240618" 13 Appendix 1  PAGEREF _Toc216240618 \h 10  Policy Statement [Council Name] will establish specific requirements for protecting information and information systems against unauthorised access. [Council Name] will effectively communicate the need for information and information system access control. Purpose Information security is the protection of information against accidental or malicious disclosure, modification or destruction. Information is an important, valuable asset of [Council Name] which must be managed with care. All information has a value to the Council. However, not all of this information has an equal value or requires the same level of protection. Access controls are put in place to protect information by controlling who has the rights to use different information resources and by guarding against unauthorised use. Formal procedures must control how access to information is granted and how such access is changed. This policy also mandates a standard for the creation of strong passwords, their protection and frequency of change. Scope This policy applies to all [Council Name] Councillors, Committees, Departments, Partners, Employees of the Council (including system support staff with access to privileged administrative passwords), contractual third parties and agents of the Council with any form of access to [Council Names] information and information systems. Definition Access control rules and procedures are required to regulate who can access [Council Name] information resources or systems and the associated access privileges. This policy applies at all times and should be adhered to whenever accessing [Council Name] information in any format, and on any device. Risks On occasion business information may be disclosed or accessed prematurely, accidentally or unlawfully. Individuals or companies, without the correct authorisation and clearance may intentionally or accidentally gain unauthorised access to business information which may adversely affect day to day business. This policy is intended to mitigate that risk. Non-compliance with this policy could have a significant effect on the efficient operation of the Council and may result in financial loss and an inability to provide necessary services to our customers. Applying the Policy - Passwords Choosing Passwords Passwords are the first line of defence for our ICT systems and together with the user ID help to establish that people are who they claim to be. A poorly chosen or misused password is a security risk and may impact upon the confidentiality, integrity or availability of our computers and systems. Weak and strong passwords A weak password is one which is easily discovered, or detected, by people who are not supposed to know it. Examples of weak passwords include words picked out of a dictionary, names of children and pets, car registration numbers and simple patterns of letters from a computer keyboard. A strong password is a password that is designed in such a way that it is unlikely to be detected by people who are not supposed to know it, and difficult to work out even with the help of a computer. Everyone must use strong passwords with a minimum standard of: At least seven characters. Contain a mix of alpha and numeric, with at least one digit More complex than a single word (such passwords are easier for hackers to crack). [Amend the above as required for your local needs] The Government advises using Environ passwords with the following format: consonant, vowel, consonant, consonant, vowel, consonant, number, number. An example for illustration purposes is provided below: pinray45 Protecting Passwords It is of utmost importance that the password remains protected at all times. The following guidelines must be adhered to at all times [amend list as appropriate]: Never reveal your passwords to anyone. Never use the 'remember password' function. Never write your passwords down or store them where they are open to theft. Never store your passwords in a computer system without encryption. Do not use any part of your username within the password. Do not use the same password to access different [Council Name] systems. Do not use the same password for systems inside and outside of work. Changing Passwords All user-level passwords must be changed at a maximum of every 90 days, or whenever a system prompts you to change it. Default passwords must also be changed immediately. If you become aware, or suspect, that your password has become known to someone else, you must change it immediately and report your concern to [Name a department e.g. IT Helpdesk]. Users must not reuse the same password within 20 password changes [amend as appropriate]. System Administration Standards The password administration process for individual [Council Name] systems is well-documented and available to designated individuals. All [Council Name] IT systems will be configured to enforce the following: Authentication of individual users, not groups of users - i.e. no generic accounts. Protection with regards to the retrieval of passwords and security details. System access monitoring and logging - at a user level. Role management so that functions can be performed without sharing passwords. Password admin processes must be properly controlled, secure and auditable. Applying the Policy Employee Access User Access Management Formal user access control procedures must be documented, implemented and kept up to date for each application and information system to ensure authorised user access and to prevent unauthorised access. They must cover all stages of the lifecycle of user access, from the initial registration of new users to the final de-registration of users who no longer require access. These must be agreed by [Council Name]. Each user must be allocated access rights and permissions to computer systems and data that: Are commensurate with the tasks they are expected to perform. Have a unique login that is not shared with or disclosed to any other user. Have an associated unique password that is requested at each new login. User access rights must be reviewed at regular intervals to ensure that the appropriate rights are still allocated. System administration accounts must only be provided to users that are required to perform system administration tasks. User Registration A request for access to the Councils computer systems must first be submitted to the [Name a department e.g. Information Services Helpdesk] for approval. Applications for access must only be submitted if approval has been gained from [Name a role e.g. your line manager]. When an employee leaves the Council, their access to computer systems and data must be suspended at the close of business on the employees last working day. It is the responsibility of the [Name a role e.g. your line manager] to request the suspension of the access rights via the [Name a department e.g. Information Services Helpdesk]. User Responsibilities It is a users responsibility to prevent their userID and password being used to gain unauthorised access to Council systems by: Following the Password Policy Statements outlined above in Section 6. Ensuring that any PC they are using that is left unattended is locked or logged out. Leaving nothing on display that may contain access information such as login names and passwords. Informing [Name a department e.g. Information Services Helpdesk and any relevant roles] of any changes to their role and access requirements. Network Access Control The use of modems on non-Council owned PCs connected to the Councils network can seriously compromise the security of the network. The normal operation of the network must not be interfered with. Specific approval must be obtained from [Name a department e.g. Information Services] before connecting any equipment to the Councils network. User Authentication for External Connections Where remote access to the [Council Name] network is required, an application must be made via the [Name a department e.g. IT Helpdesk]. Remote access to the network must be secured by two factor authentication consisting of a username and one other component, for example a [Name a relevant authentication token]. For further information please refer to [name a relevant policy -likely to be Remote Working Policy]. Suppliers Remote Access to the Council Network Partner agencies or 3rd party suppliers must not be given details of how to access the Councils network without permission from [Name a department e.g. IT Helpdesk]. Any changes to suppliers connections must be immediately sent to the [Name a department e.g. IT Helpdesk] so that access can be updated or ceased. All permissions and access methods must be controlled by [Name a department e.g. IT Helpdesk]. Partners or 3rd party suppliers must contact the [Name a department e.g. IT Helpdesk] before connecting to the [Council Name] network and a log of activity must be maintained. Remote access software must be disabled when not in use. Operating System Access Control Access to operating systems is controlled by a secure login process. The access control defined in the User Access Management section (section 7.1) and the Password section (section 6) above must be applied. The login procedure must also be protected by: Not displaying any previous login information e.g. username. Limiting the number of unsuccessful attempts and locking the account if exceeded. The password characters being hidden by symbols. Displaying a general warning notice that only authorised users are allowed. All access to operating systems is via a unique login id that will be audited and can be traced back to each individual user. The login id must not give any indication of the level of access that it provides to the system (e.g. administration rights). System administrators must have individual administrator accounts that will be logged and audited. The administrator account must not be used by individuals for normal day to day activities. Application and Information Access Access within software applications must be restricted using the security features built into the individual product. The [Name a department e.g. IT Helpdesk or business owner] of the software application is responsible for granting access to the information within the system. The access must [amend list as appropriate]: Be compliant with the User Access Management section (section 7.1) and the Password section (section 6) above. Be separated into clearly defined roles. Give the appropriate level of access required for the role of the user. Be unable to be overridden (with the admin settings removed or hidden from the user). Be free from alteration by rights inherited from the operating system that could allow unauthorised higher levels of access. Be logged and auditable. Policy Compliance If any user is found to have breached this policy, they may be subject to [Council Names] disciplinary procedure. If a criminal offence is considered to have been committed further action may be taken to assist in the prosecution of the offender(s). If you do not understand the implications of this policy or how it may apply to you, seek advice from [name appropriate department]. Policy Governance The following table identifies who within [Council Name] is Accountable, Responsible, Informed or Consulted with regards to this policy. The following definitions apply: Responsible the person(s) responsible for developing and implementing the policy. Accountable the person who has ultimate accountability and authority for the policy. Consulted the person(s) or groups to be consulted prior to final policy implementation or amendment. Informed the person(s) or groups to be informed after policy implementation or amendment. Responsible[Insert appropriate Job Title e.g. Head of Information Services, Head of Human Resources etc.]Accountable[Insert appropriate Job Title e.g. Section 151 Officer, Director of Finance etc. It is important that only one role is held accountable.]Consulted[Insert appropriate Job Title, Department or Group e.g. Policy Department, Employee Panels, Unions etc.]Informed[Insert appropriate Job Title, Department or Group e.g. All Council Employees, All Temporary Staff, All Contractors etc.] Review and Revision This policy will be reviewed as it is deemed appropriate, but no less frequently than every 12 months. Policy review will be undertaken by [Name an appropriate role]. References The following [Council Name] policy documents are directly relevant to this policy, and are referenced within this document [amend list as appropriate]: Remote Working Policy. The following [Council Name] policy documents are indirectly relevant to this policy [amend list as appropriate]: Email Policy. Internet Acceptable Usage Policy. Software Policy. GCSx Acceptable Usage Policy and Personal Commitment Statement. Legal Responsibilities Policy. Computer, Telephone and Desk Use Policy. Removable Media Policy. Information Protection Policy. Human Resources Information Security Standards. Information Security Incident Management Policy. IT Infrastructure Policy. Communications and Operation Management Policy. Key Messages All users must use strong passwords. Passwords must be protected at all times and must be changed at least every 90 days. User access rights must be reviewed at regular intervals. It is a users responsibility to prevent their userID and password being used to gain unauthorised access to Council systems. Partner agencies or 3rd party suppliers must not be given details of how to access the Councils network without permission from [Name a department e.g. IT Helpdesk]. Partners or 3rd party suppliers must contact the [Name a department e.g. IT Helpdesk] before connecting to the [Council Name] network. Appendix 1 [Include any relevant associated information within appendices. This may include any templates or forms that need to be completed as stated within the policy]     IT Access Policy FINAL COPY v2.0Page  PAGE 1 of  NUMPAGES 10 DRAFT v0.1Page  PAGE 1 of  NUMPAGES 9 [Local Authority Logo] Policy Document IT Access Policy [Date]   #$56CQRSYikqr * , 8 : ; < D M ͼͼͼͼͼͼͼ͜wohk hYd5hYdB*^JphhB*^Jph hYdhYd5B*CJ^JphhYdhB*CJ^Jph *h}hB*CJ^Jph *h}h}B*CJ^Jph hYdh5B*CJ^Jphhk h5 hk h hk hjhk hU(    !gdk !"#56CRSYjf}kd$$Ifl40j 5&j  t05&644 lalf4 $If^gd^gdk gdk jkrtt $If^gd}kd$$Ifl40j 5&j  t05&644 lalf4tt $If^gd}kd:$$Ifl40j 5&j  t05&644 lalf4tt $If^gd}kd$$Ifl40j 5&j  t05&644 lalf4tt $If^gd}kdt$$Ifl40j 5&j  t05&644 lalf4 + tt $If^gd}kd$$Ifl40j 5&j  t05&644 lalf4+ , 8 9 tt $If^gd}kd$$Ifl40j 5&j  t05&644 lalf49 : ; < M N \ d u ||snaTaT H$If^Hgd H$If^HgdYdgdk ^gdk gd}kdK$$Ifl40j 5&j  t05&644 lalf4 M N W [ \ c d t     # $ 9 : ; a e f o p }    ɸתתנɛɸתתנwshhL<{h%CJ h%CJhhh%CJhhh%5h% hYd5hYdB*^JphhYd5B*CJ^JphhmzhYdCJhYdhYd5hYdhB*^Jph hYdhYd5B*CJ^Jph hYdh5B*CJ^Jph hk hYd+ [NNNN H$If^Hgdkd$$Ifl4\  % $ t0%644 lalf4 [NNNN H$If^Hgdkd$$Ifl4\  % $ t0%644 lalf4 [NNNN H$If^Hgdkdz$$Ifl4\  % $ t0%644 lalf4 [NNNN H$If^HgdkdC$$Ifl4\  % $ t0%644 lalf4 [NNNN H$If^Hgdkd $$Ifl4\  % $ t0%644 lalf4 [NNNN H$If^Hgdkd$$Ifl4\  % $ t0%644 lalf4 [NNNN H$If^Hgdkd $$Ifl4\  % $ t0%644 lalf4 [NNNN H$If^Hgdkdg $$Ifl4\  % $ t0%644 lalf4  [YPPPCC H$If^Hgd^gdYdkd0 $$Ifl4\  % $ t0%644 lalf4      akd $$Ifl4F/ ]5&/ .  t05&6    44 lalf4 H$If^Hgd     naaa H$If^Hgdkd $$Ifl4F/ ]5&/ .  t05&6    44 lalf4  ! " naaa H$If^Hgdkd_ $$Ifl4F/ ]5&/ .  t05&6    44 lalf4" # $ : ; a f p ~ neeeeXXX H$If^Hgd^gdYdkd$$Ifl4F/ ]5&/ .  t05&6    44 lalf4~  naaa H$If^Hgdkd$$Ifl4F/ ]5&/ .  t05&6    44 lalf4 naaa H$If^Hgdkdx$$Ifl4F/ ]5&/ .  t05&6    44 lalf4 naaa H$If^Hgdkd+$$Ifl4F/ ]5&/ .  t05&6    44 lalf4  ne\\\K & F7$If^7gd%^gd%^gdk kd$$Ifl4F/ ]5&/ .  t05&6    44 lalf4 8 9 ] t u 5Tkd$$Ifl0&$  t/'644 laytaD & F7$If^7gd%Tkd$$Ifl0&$  t/'644 laytaD & F>$If^>gd%  5Tkd$$Ifl0&$  t/'644 laytaD & F7$If^7gd%TkdQ$$Ifl0&$  t/'644 laytaD & F>$If^>gd%   % & * y '=fgd+(^gdk Tkd$$Ifl0&$  t/'644 laytaD $If^gdaD % & ' > ? @ A ] ^ _ ` a b r s t ñÒÈygy`yΒN#jkh3h30JCJU h%CJ"jh3h3CJUjh3h3CJUh3h3CJ<h3h3B*CJOJQJ\^JaJmHnHphsH tH #jqh3h30JCJUh3h30JCJjh3h30JCJUh3h3CJjh3h3CJUhhk h5     $ % & ' ( ) * + , H I ̫̽֌z̽h֌"jh3h3CJU#jeh3h30JCJUh3h3CJjh3h30JCJU h%CJ"jh3h3CJUjh3h3CJUh3h3CJh3h30JCJ<h3h3B*CJOJQJ\^JaJmHnHphsH tH !I J K L M W X Y s t u v w x y z { ӴӪ޴ygӴӪU޴"jh3h3CJU#jYh3h30JCJUh3h3CJ h%CJ"jh3h3CJUjh3h3CJUh3h3CJ<h3h3B*CJOJQJ\^JaJmHnHphsH tH h3h30JCJjh3h30JCJU#j_h3h30JCJU! !"#$%&'()EFGHKzˬlZ#jMh3h30JCJUh3h3CJmHnHu h%CJ"jh3h3CJUjh3h3CJUh3h3CJ<h3h3B*CJOJQJ\^JaJmHnHphsH tH jh3h30JCJU#jSh3h30JCJUh3h3CJh3h30JCJKL^_`z{|}~ȴȝucK==h3h30J6CJ]/h3h3CJOJQJaJmHnHsH tH u#jGh3h30JCJUh3h3mHnHujh3h30JCJUh%CJmHnHu-jh3h3CJUmHnHu'jh3h3CJUmHnHuh3h3CJmHnHuh3h30JCJ8h3h3B*CJOJQJaJmHnHphsH tH uౙnQAh3h3CJmHnHu8h3h3B*CJOJQJaJmHnHphsH tH u#jAh3h30JCJUh3h3CJmHnHuh3h30JCJ/h3h3CJOJQJaJmHnHsH tH ujh3h30JCJUh%mHnHu)jh3h3UmHnHu#jh3h3UmHnHuh3h3mHnHu789:;<=>?[\]^abtuv먋r`I먋-jh3h3CJUmHnHu#j;h3h30JCJUh3h3CJmHnHuh3h30JCJ8h3h3B*CJOJQJaJmHnHphsH tH ujh3h30JCJUh%CJmHnHu-jh3h3CJUmHnHuh3h3CJmHnHu'jh3h3CJUmHnHu昄m`ŨWE#j/h3h30JCJUh3h3CJh%CJmHnHu-jh3h3CJUmHnHu'jh3h3CJUmHnHuh3h3CJmHnHu8h3h3B*CJOJQJaJmHnHphsH tH ujh3h30JCJU#j5h3h30JCJUh3h30JCJh3h3CJmHnHuDEF`abcdefgh̫̽ևuXHh3h3CJmHnHu8h3h3B*CJOJQJaJmHnHphsH tH u#j)h3h30JCJUh3h3CJmHnHujh3h30JCJU h%CJ"jh3h3CJUjh3h3CJUh3h3CJh3h30JCJ<h3h3B*CJOJQJ\^JaJmHnHphsH tH 먋r`I먋-j h3h3CJUmHnHu#j# h3h30JCJUh3h3CJmHnHuh3h30JCJ8h3h3B*CJOJQJaJmHnHphsH tH ujh3h30JCJUh%CJmHnHu-jh3h3CJUmHnHuh3h3CJmHnHu'jh3h3CJUmHnHufwG#83 gdhl^gd8igd^gdYd9:;<?@UVWqrstuvwxy昄m`ŨN昄#j"h3h30JCJUh%CJmHnHu-j!h3h3CJUmHnHu'jh3h3CJUmHnHuh3h3CJmHnHu8h3h3B*CJOJQJaJmHnHphsH tH ujh3h30JCJU#j!h3h30JCJUh3h30JCJh3h3CJmHnHu%&'ABCDEFGHIefԸp``IԸ-j#h3h3CJUmHnHuh3h3CJmHnHu#j#h3h30JCJUh3h3CJmHnHuh3h30JCJ8h3h3B*CJOJQJaJmHnHphsH tH ujh3h30JCJUh%CJmHnHu'jh3h3CJUmHnHu-j"h3h3CJUmHnHufghklӶӦ{n޶`NӶӦ#j%h3h30JCJUh3h3CJmHnHuh%CJmHnHu-j$h3h3CJUmHnHu'jh3h3CJUmHnHuh3h3CJmHnHu8h3h3B*CJOJQJaJmHnHphsH tH uh3h30JCJjh3h30JCJU#j $h3h30JCJU !"#$%ABCDGHjklԸp``IԸ-j|&h3h3CJUmHnHuh3h3CJmHnHu#j%h3h30JCJUh3h3CJmHnHuh3h30JCJ8h3h3B*CJOJQJaJmHnHphsH tH ujh3h30JCJUh%CJmHnHu'jh3h3CJUmHnHu-j%h3h3CJUmHnHu234567좓zˬh좓Vz"jp(h3h3CJU#j'h3h30JCJU h%CJ"jv'h3h3CJUjh3h3CJUh3h3CJ<h3h3B*CJOJQJ\^JaJmHnHphsH tH jh3h30JCJU#j&h3h30JCJUh3h30JCJh3h3CJ!789:VWXY[\opqǾǬǢzǾhǢV"jd*h3h3CJU#j)h3h30JCJU h%CJ"jj)h3h3CJUjh3h3CJUh3h3CJ#j(h3h30JCJUh3h3CJh3h30JCJjh3h30JCJU<h3h3B*CJOJQJ\^JaJmHnHphsH tH !-./012345QRSTVWabc}ڻڰڰyڻڰgڰ#j+h3h30JCJU"j^+h3h3CJUh3h3CJ#j*h3h30JCJUh3h3CJh3h30JCJ<h3h3B*CJOJQJ\^JaJmHnHphsH tH jh3h30JCJUjh3h3CJU h%CJ"}~ .LPFɪ}wmgmgaggPBPh3B*CJ^JaJph!hhlhYtlB*CJ^JaJph hWCJ hhlCJ *hhlhhlCJ hCJ hk hhhl hk hhlh h3CJh3jh3h3CJU<h3h3B*CJOJQJ\^JaJmHnHphsH tH jh3h30JCJU h%CJjh3h3CJU"jX,h3h3CJU !^gd4^^gdZgdmz^gdmz 7$8$H$^gdy 7$8$H$^gdYtl^gd8iFTvw+B`adr#$(ⲡqkbYS h//,CJh//,h//,CJheYhyCJ hyCJhyB*CJ^JaJph!hhlh~B*CJ^JaJph!hhlh//,B*CJ^JaJph!hhlhZFB*CJ^JaJph!hhlh:B*CJ^JaJph!hhlha B*CJ^JaJphh3B*CJ^JaJph!hhlhYtlB*CJ^JaJph *hhlhYtlCJaJ (01 \=>ȿzΌiX!hOhOB*CJ^JaJph!hOh@B*CJ^JaJphhUv5\^Jhmz5\^J hZCJh@B*CJ^JaJph hhlCJhOhOCJ hOCJ *hUvhhlCJhhlhhlCJ hCJ hk h hk hUvhmz!hYtlhyB*CJ^JaJph hyCJheYhyCJ>LM !%&'(5\^ɾsbTbCsC!hOhsKB*CJ^JaJphh3B*CJ^JaJph!hOhI/B*CJ^JaJph!hOh4B*CJ^JaJphhI/5\^JhOhI/hUv5\^Jhmz5\^JhOh4CJaJ *hOhZCJaJhOhZCJaJh3B*CJ^JaJph!hOh@B*CJ^JaJphhOhsKCJaJ *hOhsKCJaJ!'(Z[\|}$% !!^gdTW 7$8$H$^gdTWgdO^gdeYgd & Fgdmzgdmz^gdmzgdI/XYZ[\o{|}#˿yyqf\U\UGhOB*CJ^JaJph hTWhTWhTWhTW6]heYhTWCJaJheYCJaJh3CJaJheYheYCJaJhlheYaJhhmz5CJaJhk hW'hZhI/5\^Jhmz5\^Jh3h35\^Jhmbh35\^Jhmbh3CJ\^Jh3B*CJ^JaJphhI/B*CJ^JaJphD E !!!!!!!!""""Y"Z"["_""""T##wodw\PHhCJaJ *heYheYCJaJheYCJaJhuuhuuCJaJhuuCJaJheYhWCJaJhWCJaJh CCJaJh4CJaJheYheYCJaJheYhTWCJaJheYB*CJ^JaJphh3B*CJ^JaJphhOB*CJ^JaJph'hTWhTW6B*CJ]^JaJph!hTWhTWB*CJ^JaJph!"""Z""""#######t$u$$$%X%%% & & Fgd ^gd gd & F gd & FgdeY & Fgduu^gdeY#######U$V$W$r$t$%%%&!&"&5&t&|&&&&='B'X'c'g's'''֯֯嚯zogg]Q *h hlCJaJ *h9)hk]CJh*CJaJh/ {5CJ\aJh@1CJaJhCJaJh:jCJaJh/ {CJaJhlh aJ *h h CJaJh h CJaJ *hWhWCJaJh//,CJaJh/CJaJh CJaJ hh hWCJaJheYCJaJheYheYCJaJ &!&"&5&6&''''(((((?)))*]*^*_****gdW'^gdeY & FgdW' & Fgd gd^gd '''''''''''''((K(Y(b(d(y(((((((")$)%)>)?)Ắᦟ}}uiZh h 5CJ\]aJh h CJ]aJhCJaJh8CJaJ *h h CJaJh h 5CJ\aJ hh h CJaJ *hWhWCJaJhWCJaJhCJaJh h|ztCJaJhOh|zt5CJaJh h CJaJ *hk]CJaJh3hWCJaJ?)^)\*]*^*_*****i+j+-,;,<,=,>,w-x---`.a.b.t..ɾuga[ULhZhWCJ hZCJ h9)CJ hP!CJhOB*CJ^JaJphhptB*CJ^JaJph *hOhptCJaJhiB*CJ^JaJph!hOhptB*CJ^JaJphhZhZCJ hhZheYh CJaJhW'hPCJaJh CJaJhW'h CJaJh h CJaJh h CJ\aJ**,,,)-r-s-`.a.b.t.u.//00000}1~112{2 33 & FgdWgd & FgdZ^gdZ..////J/b/c/|/////00(0*0+0J0K0q00000000%1Q1R1~111111111111222222!2{2|22ƽⷮ⛮ܛ⛮⛮⛮ h#j?CJ heYCJ hWCJ h^"CJ hhZhZhWCJ hZCJhZh^"CJ hP!CJhZhZCJ\ hn2CJ h9)CJhZhZCJ *hn2hZCJ *hn2hn2CJ5222222 3 3 333&3'3<3@3N3333414E4F4G44444444525;5<5>5?5555Ļ⟙ysmdyhZhCJ hZCJ hCJ *h9)hZCJ *h9)h9)CJ h9)CJ hL CJ hCJhZhL CJ hhZhZhW5CJ\hZ5CJ\h9)hZCJhZh#j?CJ h#j?CJ hP!CJhZhZCJ *heYhZCJ *heYheYCJ'33&3'344444X6Y6Z666-8.8999<9=9>:?:|:::K;L; & FgdPgd^gdZ56V6W6X6Y6Z6666 7&71727{77778+8;8=8[8^8_8888999<9G9H9Q9R9Y99999999999罶窡盒猆}w hPCJhZhDCJ hDCJ h>bCJhZh#j?CJ h#j?CJhZhqCJ hqCJ hCJ *h9)CJ *h9)h9)CJhZhZCJH* hhZhZhCJ hZCJhZhZCJ *h]Uh]UCJ h]UCJ.999999?:@:C:z:{:|:}::::::::::; ;;;#;I;J;Z;[;d;e;l;;;;;;;<< = = =/=>=?=G=H=T===پ߸߸߸߸߲ߏ *h)h)CJhZhDCJ hhZhZhCJ hZCJ h\CJhZh\CJhZh3CJhZh=CJ h3CJhZhZCJ hPCJ h=CJ hDCJ h>bCJ4L;J<K< = = =/=0=x>y>>?Y??,@E@F@G@Y@Z@VAWAAAAgd>b^gd>b^gd & F gdPgd^gdZ=======>>[>v>y>}>>>>>>>>>>>>>>>>>>>>>>>>?????&?W?X?Y?\?]?c???????*@+@,@/@6@D@E@տհ϶հϤϪϤտտ϶տտ϶տտ϶հտϤhZh3CJ hPCJ h8CJ h+CJhZhDCJ h3CJ *h3h3CJ hDCJhZhZCJ h)CJ *h)CJ *h)h)CJ *h9)h)CJb5B*CJ]^JaJph'h3h>b5B*CJ]^JaJph' *h>bh>bB*CJ]^JaJph$h>bh>bB*CJ]^JaJph h>bh>bh>bB*CJ]^JaJphh5B*]^JaJph'AAABBBHCC D DDyDxx$If^gdi & Fgd>b^gd>bgd>b yDzDDEtccxx$If^gdikd,$$Ifl03$  t 0644 lap yt(EEEEtccxx$If^gdikd-$$Ifl03$  t 0644 lap yt(EEEFtccxx$If^gdikd9.$$Ifl03$  t 0644 lap yt(FFFFF&F'FFFFFtkkkf]]]]]^gd3gdmz^gdmzkd.$$Ifl03$  t 0644 lap yt( FFFFFFFFYGtGGGGGHH}I~IIIIIIIII8JqJrJJJKKqKKKKKKK LL!L"L#L.L/L廱|xhh0:hB*ph *h3h]UCJh]Uh]UCJH*h]Uh]UCJ h]UCJ h>bCJhjhj5CJ hjCJ h3CJ h+CJ *h+h+CJ *h+h3CJhmz hmzCJh3h3CJh3h3hCJ.FFFFvGwGGGGHHH3HDHHHHHI3IdI~IIIIII & Fgd3^gd3gdmz^gdmzII8JrJJK"L#L/L0LLLLLLLLLLLLLM%M $$Ifa$gd $Ifgd%^gd0:gd0:^gdmz & Fgd8/L0L1LLLLLLLLLLLLLLLLLLLLLMMMM MMMMMɹ~zvz~zri\i\Q\ih%CJmHnHujh h CJUh h CJhh8ih%h3hh h8iCJ"jhUmHnHsH tH uhaDjhaDUh0:h0:CJaJh0:B*CJ]^JaJph' *h0:h0:B*CJ]^JaJph$h0:h0:B*CJ]^JaJphh0:5B*]^JaJphMM M!M#M$M%M&M'M(M4M5M:M;MAMBMCMDMHMIMTMUMVMWMYM[M\M]M^M_MsMuMvMMMMMMM¾ƃ{qjqahhCJ$ h8i5CJ0hh5CJ0 *hhhaD hhhhL CJmHnHuhtaJCJmHnHujhW'h CJUhW'h CJhh8ih hhhW'h hCJh%CJmHnHuh h CJjh h CJU&%M&M'M(M5MXMYM\M>Qkd/$$Ifl0K&[\ t644 la $$Ifa$gdW' $IfgdgdSkd/$$Ifl0K&[\ t644 la\M]M^MuMvMMMMMMMMM^gd0: $^a$gd MMMMMMh0:h0:CJaJhhhhCJ$ *hhCJ$:&P 1h/R :ptaJ. A!n"5#$% $$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4$$Ifl!vh5j 5#vj #v:V l4 t05&65j 5alf4$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4$$Ifl!vh5 55$5#v #v#v$#v:V l4 t0%65 55$5alf4$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4$$Ifl!vh5/ 5. 5 #v/ #v. #v :V l4 t05&65/ 5. 5 alf4^$$If!vh5$5 #v$#v :V l t/'65$5 ytaD^$$If!vh5$5 #v$#v :V l t/'65$5 ytaD^$$If!vh5$5 #v$#v :V l t/'65$5 ytaD^$$If!vh5$5 #v$#v :V l t/'65$5 ytaD^$$If!vh5$5 #v$#v :V l t/'65$5 ytaD}DyK _Toc216240593}DyK _Toc216240593}DyK _Toc216240594}DyK _Toc216240594}DyK _Toc216240595}DyK _Toc216240595}DyK _Toc216240596}DyK _Toc216240596}DyK _Toc216240597}DyK _Toc216240597}DyK _Toc216240598}DyK _Toc216240598}DyK _Toc216240599}DyK _Toc216240599}DyK _Toc216240600}DyK _Toc216240600}DyK _Toc216240601}DyK _Toc216240601}DyK _Toc216240602}DyK _Toc216240602}DyK _Toc216240603}DyK _Toc216240603}DyK _Toc216240604}DyK _Toc216240604}DyK _Toc216240605}DyK _Toc216240605}DyK _Toc216240606}DyK _Toc216240606}DyK _Toc216240607}DyK _Toc216240607}DyK _Toc216240608}DyK _Toc216240608}DyK _Toc216240609}DyK _Toc216240609}DyK _Toc216240610}DyK _Toc216240610}DyK _Toc216240611}DyK _Toc216240611}DyK _Toc216240612}DyK _Toc216240612}DyK _Toc216240613}DyK _Toc216240613}DyK _Toc216240614}DyK _Toc216240614}DyK _Toc216240615}DyK _Toc216240615}DyK _Toc216240616}DyK _Toc216240616}DyK _Toc216240617}DyK _Toc216240617}DyK _Toc216240618}DyK _Toc216240618$$If!vh55#v#v:V l  t 0655p yt($$If!vh55#v#v:V l  t 0655p yt($$If!vh55#v#v:V l  t 0655p yt($$If!vh55#v#v:V l  t 0655p yt(]$$If!vh5[5\#v[#v\:V l t65[5\X$$If!vh5[5\#v[#v\:V l t65[5\^2 666666666vvvvvvvvv666666>6666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH L`L Normal ^CJOJQJ_HmH sH tH T@"T mz Heading 1$ & F @&5B*\^JaJphF@F  Heading 2  & F @&CJ\]aJD@D O Heading 3  & F @& CJ\aJLL  Heading 4  & F @&5B*\aJphVV  Heading 5  & F @&56B* CJ\]aJphFF  Heading 6  & F @&5CJ\aJHaH  Heading 7  & F @&CJOJQJaJ<a<  Heading 8  & F @&]8 a8  Heading 9 & F @&DA`D Default Paragraph FontVi@V 0 Table Normal :V 44 la (k ( 0No List @@  Balloon Text CJ^JaJF@F Header$ (#^a$^JaJ@ @@ Footer %AB^CJ:)!:  Page Number CJOJQJ`@`pTOC 1$ h$^a$B*\^JaJmHnHphuL@L pTOC 2 $^` B*aJphRU@QR0 Hyperlink'>*B*CJOJQJmHnHphsH u:@: +pTOC 3 % ^RR Section Heading  & F@& B*CJphH>H Title$ & F@& a$5CJ KH\aJ 22 Bullet  & Fm$66 Numbered  & Fm$FVF FollowedHyperlink >*B* ph&& TOC 444 TOC 5$^a$.. TOC 6 ^.. TOC 7 ^.. TOC 8 ^.. TOC 9 !^BC"B Body Text Indent"$a$RR2R Body Text Indent 2#$a$ B*]ph:B: Style1$& #$./FBRF  Body Text%$^a$ B*phJSbJ Body Text Indent 3& B*phf1rf Style Heading 3 + Black Left'B*^JaJphDP@D  Body Text 2($^a$aJll Style Header + 12 pt Bold Left)$ 9a$5\`;`  List Number 3$*$ ^`a$aJtH jj  Table Grid7:V+0+b/b YtlDefault ,7$8$H$-B*CJOJQJ^J_HaJmH phsH tH 66 YtlFiller- B*^JphB'B QComment ReferenceCJaJ88 Q Comment Text/CJ@j@ QComment Subject05\t t 3p TOC Heading1$ & Fd@& )B*CJOJPJQJ^JmH ph6_sH tH PK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] );CE);CFE YYM  I Kf7}F(>#'?).259=E@F/LMMM'1FGHIJKLMNOQRSTUVWXZ[\^_acdfgijlmsvwz!j+ 9    " ~   f!! &*3L;AyDEEFFI%M\MM()*+,-./023456789:;<=>?@ABCDEPY]`behknopqrtuxy&>?_s %'(*JXtvwy"$%'G_{}~8:;=]uEacdf    ; V r t u w & B D E G g   ! # C k   3 5 6 8 X p   . 0 1 3 S b ~ E X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4X%4̕7>@EQTkrty!!t    ,R$A!D@0:!@ (  VB  C D"?D(  t  3 S"?   s *X)?3"?   s *X)?3"?   s *X)?3"? B S  ? Ee't/St>a t/ct z%zuB _Toc151889812 _Toc151889833 _Toc160615973 _Toc160616200 _Toc160616367 _Toc216240592 _Hlt190759227 _Toc216240593 _Toc216240594 _Toc160615977 _Toc160616204 _Toc160616371 _Toc161078638 _Toc190759235 _Toc216240595 _Toc190759236 _Toc216240596 _Toc216240597 _Toc190759237 _Toc216240598 _Toc194223673 _Toc205370141 _Toc216240599 _Toc216240600 _Toc194223674 _Toc205370142 _Toc216240601 _Toc194223675 _Toc205370143 _Toc216240602 _Toc194223676 _Toc205370144 _Toc216240603 _Toc216240604 _Toc180469023 _Toc205370128 _Toc216240605 _Toc180469024 _Toc205370129 _Toc216240606 _Toc180469025 _Toc205370130 _Toc216240607 _Toc174159832 _Toc180469026 _Toc205370131 _Toc216240608 _Toc180469027 _Toc205370132 _Toc216240609 _Toc174159833 _Toc180469028 _Toc205370133 _Toc216240610 _Toc180469029 _Toc205370134 _Toc216240611 _Toc180469030 _Toc205370135 _Toc216240612 _Toc216240613 _Toc216240614 _Toc216240615 _Toc216240616 _Toc216240617 _Toc216240618 !\\}}}"""_""""b&b&b&(((++++,,,Z.Z.Z.Z.111 5 5 5G89>>A$DE@ ; !"#$%&'()*+,-./0123456789:<=>?@A## &{444   """"s&s&s&(((+%+%+%+,,,....;1;1;1.5.5.5E8X89%>>A.DE+)1)BBDDDDDDDDDDDD]E^EE{====dAfADDDDDDDDDDDD]E^EEEE3333& vwY##YZZmm~)~)))))**{*{*?+@+,,X.Y.//111111?2?2|2|2222233 5 5v6v6y6y666666677*8+8>>&>>>>>ADDDDDDDDDDDDDDEEE$E:EDEHEWE]E^EuEvEEE& vwY##YZZmm~)~)))))**{*{*?+@+,,X.Y.//111111?2?2|2|2222233 5 5v6v6y6y666666677*8+8>>&>>>>>A"DDDDDDDDDDDDDDDDDDDE]EE7| ɸxF%  6>_rK$5A&ײ6+œ$5, R,HIwdH-2Bw6 W/<[z9 $?} -M{Lȋf9-!`THox e {)3eng)trs$}? yh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh hh^h`hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH. P^`PhH @^@`hH. 0^`0hH.. `^``hH... ^`hH .... ^`hH ..... ^`hH ......  `^``hH.......  0^0`hH........8^`B*OJQJo(ph:uhH8^`B*OJQJo(ph:uhH8pp^p`B*OJQJo(ph:uhH8@ @ ^@ `OJQJo(hH8^`OJQJ^Jo(hHo8^`OJQJo(hH8^`OJQJo(hH8^`OJQJ^Jo(hHo8PP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh ^`OJQJo(h ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`CJOJQJaJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`CJaJo(hH.h^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH^`B*o(ph:uhH. ^`hH. L^`LhH. pp^p`hH. @ @ ^@ `hH. L^`LhH. ^`hH. ^`hH. L^`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHs6>_M{L-!`9 $? y3e,x ew6F wdH-/<5A&7ng5,6+K$                                                               z&                                   W                                            m                 ~@c7+3k]qk L L :XeZ5E%4W'P!^"}%%9)ob+//,/@1n23}x8`@9':0:p<#j? CaDZFtaJPR]U2Z>bj#g8i:jFlhlplYtl*qArUsV tpttt|ztuuUv5xPxmz/ {})8\+9^eYih=~l(dMH|'va y"!- j?yZw I/BO%tl$Yd=hMA8QDTWQsKt> :h*3W~x`DD@####E@Unknown G*Ax Times New Roman5Symbol3. *Cx Arial7.{ @Calibri5. *[`)Tahoma7K@Cambria?= *Cx Courier New;WingdingsA BCambria Math"1hs+҆s+҆fE : #|E : #|nx4dDD 2qHX $P2 !xxYS:\Chief Executive\ISD\ICT\Security\Security Policy\Admin\IT Security Policy Template.dotIT Access Policy TemplatePolicyOlly Baker - Aperia Olly Baker\               Oh+'0 ( H T ` lxIT Access Policy TemplatePolicyOlly Baker - Aperia IT Security Policy Template.dot Olly Baker2Microsoft Office Word@F#@+O@Ƙ@Ƙ E :՜.+,D՜.+,D hp|   |#D IT Access Policy Template Titlel 8@ _PID_HLINKSA$6r _Toc2162406186r _Toc2162406176r _Toc2162406166r _Toc2162406156r _Toc2162406146zr _Toc2162406136tr _Toc2162406126nr _Toc2162406116hr _Toc2162406106br _Toc2162406096\r _Toc2162406086Vr _Toc2162406076Pr _Toc2162406066Jr _Toc2162406056Dr _Toc2162406046>r _Toc21624060368r _Toc21624060262r _Toc2162406016,r _Toc2162406005&r _Toc2162405995 r _Toc2162405985r _Toc2162405975r _Toc2162405965r _Toc2162405955r _Toc2162405945r _Toc216240593  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{}~Root Entry F̘Data |V01TableBWordDocument <SummaryInformation(DocumentSummaryInformation8MsoDataStoreg˘ ̘UK34PESO2SY==2g˘ ̘Item  PropertiesUCompObj y   F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q