ࡱ> 3 bjbj T{{r0GlN N N X 0t0t0tuw  W`f2 # ^^^^^^^$b d^ @^Hd d _HHHpd l ^H^H H2bA , |I 0k h0t~pEV|I\_xW`Ee&"e|IH d d d d  DEPARTMENTAL DIRECTIVE OCIO:1-106 Page  PAGE 1 of 27 (12/02/2005) Distribution: Approved by: All Department of Education Employees _______/s/_____________________ Michell C. Clark, Acting Assistant Secretary Office of Management Lifecycle Management (LCM) DirectiveFramework Version 1.0 Table of Contents  TOC \o "1-3" \h \z \u  HYPERLINK \l "_Toc113160808" I. INTRODUCTION  PAGEREF _Toc113160808 \h 2  HYPERLINK \l "_Toc113160809" II. PURPOSE  PAGEREF _Toc113160809 \h 3  HYPERLINK \l "_Toc113160810" III. POLICY  PAGEREF _Toc113160810 \h 3  HYPERLINK \l "_Toc113160811" IV. AUTHORIZATION  PAGEREF _Toc113160811 \h 3  HYPERLINK \l "_Toc113160812" V. APPLICABILITY  PAGEREF _Toc113160812 \h 3  HYPERLINK \l "_Toc113160813" VI. DEFINITIONS  PAGEREF _Toc113160813 \h 3  HYPERLINK \l "_Toc113160814" VII. RESPONSIBILITIES  PAGEREF _Toc113160814 \h 4  HYPERLINK \l "_Toc113160815" VIII. THE FRAMEWORK  PAGEREF _Toc113160815 \h 4  HYPERLINK \l "_Toc113160816" APPENDIX A: ACRONYM LIST  PAGEREF _Toc113160816 \h 19  HYPERLINK \l "_Toc113160817" APPENDIX B: GLOSSARY  PAGEREF _Toc113160817 \h 20  HYPERLINK \l "_Toc113160818" APPENDIX C: LCM FRAMEWORK 1.0 GRAPHIC  PAGEREF _Toc113160818 \h 24  HYPERLINK \l "_Toc113160819" APPENDIX D: DEPARTMENTAL DOCUMENT REFERENCES  PAGEREF _Toc113160819 \h 25  HYPERLINK \l "_Toc113160820" APPENDIX E: TAILORED PROJECT GUIDE TEMPLATE  PAGEREF _Toc113160820 \h 26 I. INTRODUCTION This directive explains the LCM Framework (Framework). The U.S. Department of Education (Department) LCM Framework (Framework) is an outline of a structured approach, outlining required stages, key activities and core deliverables that provides a foundation for aligning existing interrelated processes, such as, the Office of the Chief Information Officers (OCIO) Information Technology Investment Management (ITIM) process, the Office of the Chief Financial Officers (OCFO) Contracts and Acquisition Management (CAM) process and processes associated with project management, used in delivering information technology (IT) solutions. The purpose of the Framework is to help existing Department processes work together more efficiently. It does not intend tois not intended for reengineering existing processes, but rather, to provide a foundation and frame of reference for aligning them. Staff from various processes related to LCM will be responsible for determining the particulars of how their processes will work within the Framework. In aligning processes, the Framework provides the basis for executing enforcement mechanisms already contained in those processes. Through a stage gate review, the Framework focuses on results obtained at the end of each stage to assist investment oversight, product quality and compliance to Department directives and regulations. However, these stage gate reviews also do not represent an additional enforcement layer, but rather are a means to facilitate and coordinate business and technical reviews for each stage already present in existing processes. The Framework is flexible concerning core deliverable length and the addition of deliverables to accommodate solutions with varying cost, complexity and time constraints. Small projects are required to perform all Framework activities and core deliverables; however, the total documentation for a very small project might amount to one page, for example. How project staff conducts the stage gate review for their small projects will help them determine how they will conduct the Frameworks business and technical activities and reviews. Additionally, project staff should rely on existing Department guidance documents and staff expertise relevant to small projects to determine how those projects should align and work within the Framework. By using this Framework directive, the Department will realize the following benefits: A single reference to inform Department employees of expectations, activities and core deliverables associated with IT solutions development. Improved product quality and reduced rework by establishing standard business and technical reviews throughout the development of IT solutions. Improved oversight by encouraging and enabling integrated and coordinated reviews. Improved performance management of projects through review of project cost and schedule in alignment with the Departments mission or objectives. A mechanism by which projects can define their deliverables against the scope of the IT solution. II. PURPOSE This directive sets forth the Departments policy for using a frameworkthe EDDepartments LCM Framework to provide the foundation for the implementation of standards, processes and procedures in developing IT solutions. All LCM related processes will use the Framework to align and streamline their processes to support effective oversight and management of IT solution development. III. POLICY This directive applies to the development, acquisition, implementation, maintenance and disposal of IT solutions regardless of cost, complexity and time constraints. IV. AUTHORIZATION The following are links to Federal regulations and policies that set forth the legal obligations for the Department to use a lifecycle management approach:  HYPERLINK "http://irm.cit.nih.gov/itmra/itmra96.html" Clinger- Cohen Act of 1996 (Clinger Clinger-Cohen Act); (Formerly the Information Technology Management Reform Act, or, ITMRA) HYPERLINK "http://www.whitehouse.gov/omb/circulars/a123/a123_rev.pdf"Office of Management and Budget (OMB) Circular A-123  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf" OMB Circular A-130 The Departments Office of the Chief Information Officer (OCIO) will own and maintain the Framework and work diligently to communicate and provide support for its implementation. V. APPLICABILITY This directive applies to all Department employees and contractors engaged in the development, acquisition, implementation, maintenance and disposal of IT solutions. Nothing in this directive is meant to excuse or exempt contractors from satisfying all requirements of their contracts. VI. DEFINITIONS The following are key definitions related to this directive. Lifecycle Management is the coordination of activities associated with the implementation of information systems from conception through disposal, which include defining requirements, designing, building, testing, implementing, establishing operations and disposing of systems. Framework is an outline structured approach of required stages, key activities and core deliverables that provides a foundation for aligning existing interrelated processes within the Department, regardless of system lifecycle methodology employed. Solution pertains to automated information systems, software applications and manual processes. Stage is a definitive section of the lifecycle that indicates a specific purpose or goal. The end of each stage is marked by a Stage gGate, noting the exit from one stage and entry into the next. Key Activity is a required task, procedure or process. Core Deliverable is a required document that must be completed and approved by the end of a particular stage of the lifecycle. Exit /Entry Criteria refers to requirements that must be completed and approved in order to exit one stage and enter the next. Stage Gate Review is the integration of various business and technical reviews that ensures core deliverables (and any additional deliverables) required for that stage have been completed. VII. RESPONSIBILITIES The following are staff responsibilities associated with this directive: Project Manager/Program Manager is is responsible for creating deliverables and ensuring that business and technical reviews are executed and required deliverables are completed. This individual . Program Manager is a staff person is also responsible for managing the day-to-day operations of the Departments of Education IT sSolutions. Program Managers are responsible for developing the majority of core deliverables required throughout the lifecycle and are responsible for ensuring that all required activities throughout the lifecycle are accomplished on schedule and within cost. Deliverable Reviewers areis is responsible for reviewing and approving the content of all required deliverables. Deliverables Reviewers are staff from various business and technical areas (e.g. ITIM, CAM) with specific knowledge of the requirements areas.responsible for reviewing and approving the content of all required deliverable s Stage Gate Reviewer is responsible for authorizing a projects progress into the next stage based on the completion of reviews and deliverables for each stage. VIII. THE FRAMEWORK The Framework is structured approach of required stages, key activities and core deliverables that provides a foundation for aligning existing interrelated processes such as, the OCIOs ITIM process, OCFOs CAM process and processes associated with project management, used in delivering IT solutions. The purpose of the Framework is to help existing Department processes work together more efficiently. It is not intended to reengineer existing processes, but rather, to provide a foundation and frame of reference for aligning them. Staff from various processes related to LCM will be responsible for determining the particulars of how their processes will work within the Framework. In aligning processes, the Framework provides the basis for executing enforcement mechanisms already contained in those processes. Through a stage gate review, the Framework focuses on results obtained at the end of each stage to assist investment oversight, product quality and compliance to Department directives and regulations. However, these stage gate reviews do not represent an additional enforcement layer, but rather are a means to facilitate and coordinate business and technical reviews for each stage already present in existing processes. The Framework is flexible concerning core deliverable length and the addition of deliverables to accommodate solutions with varying cost, complexity and time constraints. Small projects are required to perform all Framework activities and core deliverables; however, the total documentation for a very small project might amount to one page, for example. How small project staff conducts the stage gate review for their projects will help them determine how they will conduct the Frameworks business and technical activities and reviews. Additionally, project staff should rely on existing Department guidance documents and staff expertise relevant to small projects to determine how those projects should align and work within the Framework. The Framework is comprised of six stages: 1) Vision; 2) Definition; 3) Construction &and Validation; 4) Implementation; 5) Support &and Improvement; and 6) Retirement. Each stage consists of required key activities and core deliverables that must be completed for entry into the next stage. Appendix A is an acronym list and Appendix B, a glossary. A detailed illustration of the Framework, Departmental document references and a template for the Tailored Project Guide can be found in Appendices C-E respectively. The content of the appendices is for information purposes only and serves as guidance for those using this directive. However, Appendix C,, the Framework Graphic, will be maintained as part of main body of this document, since it is the a visual portrayal of the required stages, key activities and deliverables described in this directive. The Framework stages are designated by number followed by supporting information for each stage. The sections in the text are numbered to correspond to the six stages of the Framework. We have chosen to use numbers only for the section below to reflect the six stages of the Framework Key activities and core deliverables for each stage are explained in text format. Supporting detail for each core deliverable within a particular stage is contained in tables. The tables support the bulleted list of core deliverables in each stage by providing detail that better explain each deliverable. Below is key information regarding each stage of the Framework. 1. VISION STAGE The purpose of the Vision Stage is to develop a business case, necessary acquisition planning documents for acquiring the procurement of services and resources to build new IT solutions or improve existing IT assets and high-level requirements for the new system. During this process, the feasibility and cost of the project will be assessed. During this process, feasibility costs will be assessed. The Vision Stage contains the following key activities: Identify needs and define project scope, define high-level requirements and prepare business case. Obtain appropriate reviews and approvals for the business case. For example,This will include the OCIOs ITIM staff ensuresstaff ensuring that the business case aligns with the Departments IT investment objectives. Obtain review and approval of acquisition planning activities. The contract CAM office will review and approve all acquisition and contracts documents. Obtain necessary technical reviews and approvals for the project, as envisioned. The OCIOs Technical Review Board (TRB), Security, Regulatory Information Management Services (RIMS), Planning and Investment Review Working Group (PIRWG), Enterprise Architecture (EA) and Information Assurance (IA) are examples of staff, whothat would participate in the review and approval activities. The Vision Stage contains the following core deliverables: Business case. Business case will include a high level project management plan and a project charter. Acquisition and contracts documents. Technical documents. Examples would include presentations for TRBs and EA reviews. Security and privacy documents. An example is the Critical Infrastructure Protection (CIP) Questionnaire. Tailored project guide. The business case is includes a request to the Departments senior management for support of an initiative and usually involves indicates the level of resource investment and financial commitment deemed necessary for the project. The business case provides a business justification for implementing new or improved IT solutions. Table 1 contains key information for the business case. Table  SEQ Table \* ARABIC 1. Business Case Key ComponentsKey Roles & ResponsibilitiesKey Legislative/Policy DriversProject Description and Purpose Project Charter Business Value of the Initiative Alternatives Analysis (Market Research & Alternative Solution) Recommended Solution and Justification Project Scope, Cost and Funding Performance Measurements and Risks (includes Security Risks) High-Level EA Plan High-Level Solution Acquisition Plan High-Level Project Management PlanProgram ManagerProject manager Develops Business Case ITIM, EA, IA and Other Relevant Staff Reviews Business Case; ITIM Approves HYPERLINK "http://irm.cit.nih.gov/itmra/itmra96.html" \o "Clinger Cohen Act"Clinger- Cohen Act  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a11/current_year/a_11_2004.pdf" OMB A-11: Preparation, Submission & Execution of the Budget  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a094/a094.pdf" OMB A-94: Guidelines and Discount Rates for Benefit-Cost Analysis of Federal Programs  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf" OMB A-130: Management of Federal Information Resources  HYPERLINK "http://csrc.nist.gov/policies/FISMA-final.pdf" Federal Information Security Management Act (FISMA)  HYPERLINK "http://www.nist.gov/" National Institute for of Standards and Technology (NIST)  HYPERLINK "http://connected.ed.gov/doc_img/itimprocessguide.doc" ITIM Process Guide  Acquisition and contract documents help identify and manage the activities of the acquisition strategy to ensure solution acquisition in a timely, efficient and effective manner. Table 2 contains key information for acquisition and contracts documents. Table  SEQ Table \* ARABIC 2. Acquisition and Contract Documents Key ComponentsKey Roles & ResponsibilitiesKey Legislative/Policy DriversMarket Research Source Selection Plan Independent Government Cost Estimate Acquisition Strategy Vendor Identification List Requisition Document Solicitation: Statement Of Objectives (SOO) Statement Of Work (SOW) (with appropriate LCM and security language)Procurement Action Requests IT Procurements Indicating how Specific Equipment or Resources are to be Acquired Document Hand-off strategy for Multiple Vendors Quality Assurance Surveillance Plan (QASP) Final EA Review Award DocumentContracting Officer/Business Area Develops Acquisition and Contracts Documents Contract OfficeCAM Reviews and Approves HYPERLINK "http://irm.cit.nih.gov/itmra/itmra96.html"Clinger- Cohen Act  HYPERLINK "http://www.arnet.gov/far/current/pdf/FAR.book.pdf" Federal Acquisition Regulation (FAR)  HYPERLINK "http://www.section508.gov/index.cfm?FuseAction=Content&ID=12" 508 Compliance, (Electronic & IT Accessibility Standards)  ACS Directive: Acquisition Planning (OCFO: 2-107) ACS Directive: Procuring Electronic and Information Technology (EIT) in Conformance with Section 508 of the Rehabilitation Act (OCIO: 3-105) Technical documents will substantiate solution technical needs. These documents are presented to technical staff during the Vision Stage to obtain initial technical review and approval. Table 3 contains key information for technical documents. Table  SEQ Table \* ARABIC 3. Technical Documents Key ComponentsKey Roles & ResponsibilitiesKey Legislative/Policy DriversSolution Functionality High-Level Functional Requirements Operational Requirements Presentation Summarizing DataSummarizing Data Presented in Business Case and Components Above Above Program ManagerProject manager/Vendor develops Technical Documents Groups such as TRB, Security, PIRWG, EA, IA Review & Approve HYPERLINK "http://irm.cit.nih.gov/itmra/itmra96.html" Clinger-Cohen Act   HYPERLINK "http://ednethome/EDNetDocuments/General%20Access/GUIDE%20-%20TRB%20Process%20-%20V10_0_PA.pdf" TRB Process Guide  HYPERLINK "http://connected1.ed.gov/po/ea/index.html" EA Guidance Documents Security and privacy documents consist of various types of security documentation necessary for the Vision Stage. These documents contain security &and privacy requirements and controls for protecting the solution. Table 4 below contains key information for security and privacy documents. Table  SEQ Table \* ARABIC 4. Security and Privacy Documents Key ComponentsKey Roles & ResponsibilitiesKey Legislative/Policy DriversIdentify Certification & Accreditation (C&A) Team Determine Initial System Security Requirement Complete Critical Infrastructure Protection (CIP)CIP Questionnaire Complete a General Support System (GSS) and Major applications (MA) Inventory FormProgram ManagerProject manager/Vendor develops Security & Privacy Documents IA reviews; C&A approves & Accepts as Part of Larger C&A Process  HYPERLINK "http://irm.cit.nih.gov/itmra/itmra96.html" Clinger-Cohen Act  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf" OMB A-130: Management of Federal Information Resources HYPERLINK "http://thomas.loc.gov/cgi-bin/query/z?c107:H.R.2458.ENR:"E-Government Act 2002  HYPERLINK "http://csrc.nist.gov/policies/FISMA-final.pdf" FISMA  HYPERLINK "http://www.nist.gov/" NIST ACS Handbook for Information AssuranceIA Security Policy (OCIO-1)ACS Handbook for IT Security Risk Assessment Procedures (OCIO-7) ACS Handbook for IT Security GSS & MA Inventory (OCIO-9) ACS Handbook for IT Security Contingency Planning Procedures (OCIO-10) ACS Handbook for IT Security Configuration Management (CM) Planning Procedures (OCIO-11)  The Tailored Project Guide is a document for planning, recording and tracking the completion of required deliverables for an IT solution. All project and programproject managers will be required to develop a Tailored Project Guide to track the completion of core deliverables throughout the lifecycle. Appendix E at the end of this document is a Tailored Project Guide Template for suggested usesuggested for use. Project and program managers may develop their own tailored project guide as long as one is used to plan and track the completion of all project deliverables. 2. DEFINITION STAGE The purpose of the Definition Stage is to define functional requirements that address both the business and technical solutions. Project staffThe project team will produce a high-level functional design and a detailed solution design to be used to guide work in the Construction and & Validation Stage. The Definition Stage contains the following key activities: Review existing business case. Submit a Baseline Change Request to ITIM, as necessary. Develop and obtain approval of detailed project management plan. Develop high-level business, functional and security requirements. Develop high-level architecture. Obtain technical reviews and approvals. TRB, Security, RIMS, EA, IA are examples of entities that would participate in review and approval activities. Design solution. The Definition Stage contains the following core deliverables: Review previous deliverables and update as necessary. Project management plan. Configuration management (CM) plan. Requirements documentation. Design documentation. Security and privacy documentation. Business continuity plan, disaster recovery plan, contingency plan and security risk assessment and mitigation plan are examples of security and privacy documentation. Test Plan. Review previous deliverables and update as necessary is listed to remind project and programproject managers to review documents from the previous stage and make updates, if needed, to ensure that documents stay current with any project or solution changes. Project and programProject managers, who originally developed the deliverables in question will review and update them. Following industry standards such as, the Project Management Book of Knowledge (PMBOK), the project management plan outlines a performance-based management approach (current and estimated cost, schedule and performance goals) including project milestones and associated resources, tools, techniques and organizational roles & and responsibilities. This project management plan will establish and maintain plans that define project activities throughout the lifecycle. Table 5 contains key information for the project management plan. Table  SEQ Table \* ARABIC 5. Project Management Plan Key ComponentsKey Roles & ResponsibilitiesKey Legislative/Policy DriversProject Charter Project Management Approach Scope Work Breakdown Structure (WBS) (with cost & schedule estimates and baselines) Responsibility Assignments System or Software Development Plan High-Level Risk Assessments and PlanPMBOK Subsidiary Management Plans, such as: Communications Plan Quality Assurance Plan Open Issues Supporting Detail: Deliverables Constraints and Assumptions Relevant Standards and PoliciesProgram ManagerProject manager/Vendor develops project management plan Program and Technical Staff Reviews and Approves  HYPERLINK "http://irm.cit.nih.gov/itmra/itmra96.html" Clinger-Cohen Act The configuration management plan identifies the configuration items, components and related work products that will be placed under configuration management using configuration identification, configuration control, configuration status accounting and configuration audits. This plan will establish and maintain the integrity of work products throughout the lifecycle. Table 6 contains key information for the configuration management plan. Table  SEQ Table \* ARABIC 6. Configuration Management Plan Key ComponentsKey Roles & ResponsibilitiesKey Legislative / Policy DriversBaseline Work Products Mechanism to Track and Control Changes Change Requests Mechanism to Establish and Maintain Baseline IntegrityProgram ManagerProject manager/Vendor Develops configuration management plan IA Reviews and C&A Reviews and Accepts as Part of Larger C&A Process  HYPERLINK "http://irm.cit.nih.gov/itmra/itmra96.html" Clinger-Cohen Act  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf" OMB A-130: Management of Federal Information Resources  HYPERLINK "http://csrc.nist.gov/policies/FISMA-final.pdf" FISMA  HYPERLINK "http://www.nist.gov/" NIST  HYPERLINK "http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doc"ED IT Security Systems Development Lifecycle (SDLC) Integration GuideACS Handbook for IT Security Configuration Management (CM) Planning Procedures (OCIO-11) Requirements documentation consists of all the detailed requirements associated with the solution. The requirements documentation will identify and validate the business, technical, security and solution requirements. Table 7 contains key information for requirements documentation. Table  SEQ Table \* ARABIC 7. Requirements Documentation Key ComponentsKey Roles & ResponsibilitiesKey Legislative/Policy DriversBusiness Requirements Met throughAccomplished by Manual Processes Technical/Systems Requirements, Met throughAccomplished by Automation Infrastructure, Met throughAccomplished by Telecommunications, Facilities and DesktopProgram ManagerProject manager/Vendor Develops Requirements Documentation Program and Technical Staff Reviews and Approve Approves  HYPERLINK "http://csrc.nist.gov/policies/FISMA-final.pdf" FISMA  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf" OMB A-130: Management of Federal Information Resources   HYPERLINK "http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doc" ED IT Security SDLC Integration Guide Design documentation reflects the functional and technical solutions of what will be delivered and is traceable back to the requirements. The design is should be depicted through graphic models, process flows, or block diagrams preliminary vs. versus defined. The design documentation includes all the detailed requirements associated with the solution. The design documentation will define functional & and technical components required to implement the solution. Table 8 contains key information for design documentation. Table  SEQ Table \* ARABIC 8. Design Documentation Key ComponentsKey Roles & ResponsibilitiesKey Legislative / Policy DriversTechnical Architecture: Telecommunications, hardware (HW) and software (SW) Data Architecture Entity Relationship Diagrams (ERDs) Data Dictionary Interface Specification (to Other Systems) Application Design: User Interface Input/Output, Design/Layout, System Security ManagementProgram ManagerProject manager/Vendor Develops Design Documentation Program and Technical Staff Reviews and Approves HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf" OMB A-130: Management of Federal Information Resources  HYPERLINK "http://csrc.nist.gov/policies/FISMA-final.pdf" FISMA  HYPERLINK "http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doc"ED IT Security SDLC Integration Guide  Security and privacy documentation will help protect the confidentiality, integrity and availability of the solution. It describes and addresses information associated with risk, risk mitigation, security requirements and controls. Security and privacy documentation will contain detailed security and privacy requirements and controls for protecting the solution. Table 9 contains key information for security and privacy documentation. Key ComponentsKey Roles & ResponsibilitiesKey Legislative / Policy DriversBusiness Continuity Plan Disaster Recovery Plan Contingency Plan Risk Assessment and Mitigation System Security PlanProgram ManagerProject manager/Vendor Develops Security & Privacy Documents IA Reviews and C&A Reviews and Accepts as Part of Larger C&A Process HYPERLINK "http://irm.cit.nih.gov/itmra/itmra96.html" Clinger-Cohen Act  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf" OMB A-130: Management of Federal Information Resources  HYPERLINK "http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_bills&docid=f:h2458enr.txt.pdf" HYPERLINK "http://thomas.loc.gov/cgi-bin/query/z?c107:H.R.2458.ENR:"E-Government Act 2002  HYPERLINK "http://www.epic.org/privacy/education/ferpa.html" Federal Educational Rights and Privacy Act (FERPA)  HYPERLINK "http://csrc.nist.gov/policies/FISMA-final.pdf" FISMA  HYPERLINK "http://www.nist.gov/" NIST  HYPERLINK "http://www.usdoj.gov/04foia/privstat.htm" Privacy Act of 1974, as amended FISMAACS Handbook for IAr Information Assurance Security Policy (OCIO-1)ACS Handbook for IT Security Risk Assessment Procedures (OCIO-7) ACS Handbook for IT Security GSS & MA Inventory (OCIO-9) ACS Handbook for IT Security Contingency Planning Procedures (OCIO-10) ACS Handbook for IT Security Configuration Management (CM) Planning Procedures (OCIO-11)Table  SEQ Table \* ARABIC 9. Security and Privacy Documentation The test plan outlines the types of testing, testing participants and timeframe for testing and provides a detailed strategy for testing the solution. Table 10 contains key information for the test plan. Table  SEQ Table \* ARABIC 10. Test Plan Key ComponentsKey Roles & ResponsibilitiesKey Legislative / Policy DriversOrganizational Structure with Roles and Responsibilities Types of Testing Testing Scenarios TimeframesProgram ManagerProject manager/Vendor Develops Test Plan IA Reviews and C&A Reviews and Accepts as Part of Larger C&A Process Program and Technical Staff Reviews and Approves HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf"  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf" OMB A-130: Management of Federal Information Resources  HYPERLINK "http://csrc.nist.gov/policies/FISMA-final.pdf" HYPERLINK "http://csrc.nist.gov/policies/FISMA-final.pdf"FISMA   HYPERLINK "http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doc" HYPERLINK "http://wdcrobiis08/doc_img/SDLC%20Security%20Integration%20Guide%20v3.doc"ED IT Security SDLC Integration Guide   3. CONSTRUCTION & AND VALIDATION STAGE The purpose of the Construction & and Validation Stage is to build, test and validate the solution, transform specifications developed in the Definition Stage into an executable solution and validate solution functionality to ensure it meets or exceeds business and technical expectations. The Construction &and Validation Stage contains the following key activities: Build and/or acquire solution. Test and monitor solution. Telecommunications, applications and manual processes are aspects of the solution that project staff will test and monitor. Obtain security certification and accreditation. Obtain technical reviews and approval for implementation. Prepare implementation documents and maintenance and operations plan. The Construction &and Validation Stage contains the following core deliverables: Review previous deliverables and update as necessary. Testing documentation. A Fully Tested and Accepted Solution and test execution results and reports are examples of testing documentation. Implementation documents. Implementation plan, training plan, solution user manual, data conversion plan, system start-up (a.k.a. system change over plan) are examples of implementation documents. Maintenance and operations plan. As in the Definition Stage, review previous deliverables and update as necessary is listed to remind project and programproject managers to review documents from the previous stage and make updates, if needed, to ensure that documents stay current with any project or solution changes. Project and program managers are responsible for reviewing and updating deliverables. Testing documentation contains testing approaches and standards, provides a record of the completion of all necessary testing and helps gauge whether or not the solution meets all business &and technical requirements. Testing documentation ensures that the solution is properly constructed in relation to requirements and business needs. Table 11 contains key information for testing documentation. Table 11. Testing Documentation Key ComponentsKey Roles & ResponsibilitiesKey Legislative/Policy DriversFully Tested & Accepted Solution Test Execution Results and ReportsProgram Project Manager/Vendor Develops Testing Documentation IA Reviews and C&A Reviews & Accepts as Part of Larger C&A Process Program and Technical Staff Reviews and Approves HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf"  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf"  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf" OMB A-130: Management of Federal Information Resources  HYPERLINK "http://csrc.nist.gov/policies/FISMA-final.pdf"  HYPERLINK "http://csrc.nist.gov/policies/FISMA-final.pdf" HYPERLINK "http://csrc.nist.gov/policies/FISMA-final.pdf"FISMA   HYPERLINK "http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doc"  HYPERLINK "http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doc" HYPERLINK "http://wdcrobiis08/doc_img/SDLC%20Security%20Integration%20Guide%20v3.doc"ED IT Security SDLC Integration Guide  Implementation documents are the plans for executing solution activities, roles & and responsibilities, dependencies and timelines. Implementation documents provide guidance and consideration for all activities necessary to deploy the solution. Table 12 contains key information for implementation documents. Table 12. Implementation Documents Key ComponentsKey Roles & ResponsibilitiesKey Legislative/Policy DriversImplementation Plan Training Plan Solution User Manual Data Conversion Plan System Start-up Plan (a.k.a. System Change Over Plan)Program ManagerProject manager/Vendor Develops Implementation Documents IA Reviews and C&A Reviews and Accepts as Part of Larger C&A Process Program and Technical Staff Reviews and Approves HYPERLINK "http://irm.cit.nih.gov/itmra/itmra96.html"  HYPERLINK "http://irm.cit.nih.gov/itmra/itmra96.html" Clinger-Cohen Act  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf"  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf"  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf"  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf" OMB A-130: Management of Federal Information Resources  HYPERLINK "http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_bills&docid=f:h2458enr.txt.pdf" HYPERLINK "http://thomas.loc.gov/cgi-bin/query/z?c107:H.R.2458.ENR:"E-Government Act 2002  HYPERLINK "http://csrc.nist.gov/policies/FISMA-final.pdf"  HYPERLINK "http://csrc.nist.gov/policies/FISMA-final.pdf" FISMA  HYPERLINK "http://www.nist.gov/"  HYPERLINK "http://www.nist.gov/" NIST ACS Handbook for Information Assurance IA Security Policy (OCIO-1)ACS Handbook for IT Security C&A Procedures (OCIO-5) ACS Handbook for IT Security Risk Assessment Procedures (OCIO-7) ACS Handbook for IT Security GSS & MA Inventory (OCIO-9) ACS Handbook for IT Security Contingency Planning Procedures (OCIO-10) ACS Handbook for IT Security CM Planning Procedures (OCIO-11) The maintenance and operations plan establishes an approach for continued operational use and maintenance of the solution. The plan provides the processes and procedures used to maintain the solution. Table 13 contains key information for the maintenance and operations plan. Table 13. Maintenance and Operations Plan Key ComponentsKey Roles & ResponsibilitiesKey Legislative / Policy DriversPlan to Maintain Technical Solution Points of Contact Notification and Escalation Process with Issues Resolution Job Execution Workflow Schedule Run Book Restart ProceduresProgram ManagerProject manager/Vendor Develops Maintenance and Operations Plan IA Reviews and C&A Reviews and Accepts as Part of Larger C&A Process Program and Technical Staff Reviews and Approves Production Readiness Review (PRR)  HYPERLINK "http://irm.cit.nih.gov/itmra/itmra96.html"  HYPERLINK "http://irm.cit.nih.gov/itmra/itmra96.html" Clinger-Cohen Act  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf"  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf" OMB A-130: Management of Federal Information Resources  HYPERLINK "http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_bills&docid=f:h2458enr.txt.pdf" HYPERLINK "http://thomas.loc.gov/cgi-bin/query/z?c107:H.R.2458.ENR:"E-Government Act 2002 HYPERLINK "http://csrc.nist.gov/policies/FISMA-final.pdf"FISMA  HYPERLINK "http://www.nist.gov/" NIST HYPERLINK "http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doc"ED IT Security SDLC Integration Guide HYPERLINK "http://ednethome/EDNetDocuments/General%20Access/GUIDE%20-%20TRB%20Process%20-%20V10_0_PA.pdf" TRB Process Guide ACS Handbook for Information AssuranceIA Security Policy (OCIO-1) ACS Handbook for IT Security Risk Assessment Procedures (OCIO-7) ACS Handbook for IT Security GSS & MA Inventory (OCIO-9) ACS Handbook for IT Security Contingency Planning Procedures (OCIO-10) ACS Handbook for IT Configuration Management (CM)CM Planning Procedures (OCIO-11) 4. IMPLEMENTATION STAGE The purpose of the Implementation Stage is to install the new or enhanced solution in the production environment, train users, convert data as needed and transition the solution to end-users. The Implementation Stage contains the following key activities: Execute implementation plan. Obtain program and technical review and approval to ensure successful implementation. The Implementation Stage contains one core deliverable: the Accepted Operational/Running Solution. The Accepted Operational/Running Solution is a fully operational solution installed in the production environment. The document associated with the solution accepted for implementation will facilitate executing the solution in the operating environment. Table 14 contains key information for the Accepted Operational/Running Solution. Table 14. Accepted Operational/Running Solution Key ComponentsKey Roles & ResponsibilitiesKey Legislative/Policy DriversExecution of Implementation Plan to include: Notification of Implementation to End Users Execution of Training Plan Data Entry or Conversion Security, C&A and Post Implementation EvaluationProgram ManagerProject manager/Vendor Oversees Installation of Solution in Production Environment Program and Technical Staff Reviews and Approves HYPERLINK "http://irm.cit.nih.gov/itmra/itmra96.html"  HYPERLINK "http://irm.cit.nih.gov/itmra/itmra96.html" Clinger-Cohen Act  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf"  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf"  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf"  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf" OMB A-130: Management of Federal Information Resources   HYPERLINK "http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doc"  HYPERLINK "http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doc" HYPERLINK "http://wdcrobiis08/doc_img/SDLC%20Security%20Integration%20Guide%20v3.doc"ED IT Security SDLC Integration Guide  5. SUPPORT &ANDnd IMPROVEMENT STAGE The purpose of the Support and& Improvement Stage is to document operational and practicing procedures for solution modification and enhancement and align operational and practicing procedures with Department information technology business and technical standards. The Support &and Improvement Stage contains the following key activities: Operate and manage solution. Evaluate and enhance operations. Conduct annual contract review. Conduct annual business case review through the Capital Planning & Investment Control (CPIC) process. Conduct annual technical reviews. Security, RIMS, IA and EA are all examples of t technical reviews. Update business case and budget, as necessary. Conduct Post Implementation Review (PIR), as necessary. The Support &and Improvement Stage contains the following core deliverables: Review previous deliverables and update as necessary. Amended Business Case for Solution Enhancements. As with the Definition and Construction and Validation Stages, review previous deliverables and update as necessary is listed to remind project and program managers to review documents from the previous stage and make updates, if needed, to ensure that documents stay current with any project or solution changes. In the Support and& Improvement Stage, however, a solution change or enhancement, depending on the magnitude, may require new deliverablesnot just updates to previous ones. Project and program managers who originally developed the deliverables in question will review and update them. There is also the potential for new project managers or vendors to make changes or enhancements and create new deliverables. The Amended Business Case for Solution Enhancement contains updates to the business case to reflect solution enhancements or changes. Table 15 contains key information for the amended business case. Table 15. Amended Business Case for Solution Enhancement Key ComponentsKey Roles & ResponsibilitiesKey Legislative/Policy DriversBaseline Change Request for any Section of the Original Business Case Requiring Update Explanation for Change in Cost/Schedule Variance PIR ReportPost-Implementation Review (PIR) ReportProgram ManagerProject manager/Vendor Submits Amended Business Case for Solution Enhancement Relevant Process Groups Review ITIM Reviews and Approves HYPERLINK "http://irm.cit.nih.gov/itmra/itmra96.html" Clinger-Cohen Act  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a11/current_year/a_11_2004.pdf" OMB A-11: Preparation, Submission & Execution of the Budget  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf"  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf"  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf"  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf" OMB A-130: Management of Federal Information Resources   HYPERLINK "http://connected.ed.gov/doc_img/itimprocessguide.doc"  ITIM Process Guide 6. RETIREMENT STAGE The purpose of the Retirement Stage is to execute the systematic termination of the system and preserve vital information for future access and or reactivation. The Retirement Stage contains the following key activities: Develop retirement plan. Sections of the retirement plan will include shut down system or continue service decision and the data and documentation plan. Develop disposal plan. Obtain program and technical reviews and approvals for retirement and disposal plans. The OCIOs PIRWG is an example of a review board whothat will approve the retirement and disposal plan. Dispose system (at end of life) and archive SW, data and documentation. The Retirement Stage contains the following core deliverables: Retirement plan. Disposal plan. The retirement plan outlines activities to ensure orderly termination of the system and preservation of vital information about the system, so that information may be reactivated in the future, if necessary. It will contain the strategy for elimination, removal, or transitioning of services provided. Table 16 contains key information for the retirement plan. Table 16. Retirement Plan Key ComponentsKey Roles & ResponsibilitiesKey Legislative/Policy DriversSystem Disposal Strategy Retirement Strategy Solution (SW, HW) Retirement Requirements List Event Tracking Procedures Data/Documentation Plan Updates to CM Plan to Track Document VersionsProgram ManagerProject manager/Vendor develops Retirement Plan Program and Technical Staff Reviews and Approves HYPERLINK "http://irm.cit.nih.gov/itmra/itmra96.html" Clinger-Cohen Act  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf" OMB A-130: Management of Federal Information Resources  HYPERLINK "http://csrc.nist.gov/policies/FISMA-final.pdf" FISMA HYPERLINK "http://www.nist.gov/"NIST  HYPERLINK "http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doc" ED IT Security SDLC Integration Guide  HYPERLINK "http://ednethome/EDNetDocuments/General%20Access/GUIDE%20-%20CCRB%20Process%20-%20V9_0.pdf" CCRB Process Guide The disposal plan emphasizes the proper preservation of the data processed by the solution, so that it can be effectively migrated to another solution or archived and restored in accordance with applicable record management regulations and policies. The disposal plan will outline the strategy for termination of a solutions HW and SW. Table 17 contains key information for the disposal plan. Table 17. Disposal Plan Key ComponentsKey Roles & ResponsibilitiesKey Legislative/Policy DriversIdentify how the Termination of the Solution/ Data will be Conducted and When Solution Termination Date SW Components to be Preserved Data to be Preserved Disposition of Remaining Equipment Archiving of Lifecycle ProductsProgram ManagerProject manager/Vendor develops Disposal Plan Program and Technical Staff Reviews and Approves HYPERLINK "http://irm.cit.nih.gov/itmra/itmra96.html" Clinger-Cohen Act  HYPERLINK "http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf" OMB A-130: Management of Federal Information Resources  HYPERLINK "http://csrc.nist.gov/policies/FISMA-final.pdf" FISMA  HYPERLINK "http://www.nist.gov/" NIST  HYPERLINK "http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doc" ED IT Security SDLC Integration Guide APPENDIX A: ACRONYM LIST (For information purposes only) ACRONYMDESCRIPTIONACSAdministrative Communications SystemCAMContracts and Acquisition ManagementC & ACertification &and AccreditationCCRBChange Control Review BoardCIOChief Information OfficerCIPCritical Infrastructure ProtectionCMConfiguration ManagementCPICCapital Planning and Investment ControlDSTDevelopment Services TeamEAEnterprise ArchitectureEITElectronic and Information TechnologyERDEntity Relationship DiagramFARFederal Acquisition RegulationFERPAFamily Educational Rights and Privacy ActFISMAFederal Information Security Management ActFSAFederal Student AidGSSGeneral Support SystemHWHardwareIAInformation AssuranceIMInformation ManagementITInformation TechnologyITIMInformation Technology Investment ManagementITMRAInformation Technology Management Reform ActLCMLifecycle ManagementMAMajor ApplicationNISTNational Institute for Standardsof for Standards of and TechnologyOCFOOffice of the Chief Financial OfficerOCIOOffice of the Chief Information OfficerOMBOffice of Management and BudgetPIAPrivacy Impact AssessmentPIRPost Implementation Review PIRWGPlanning and Investment Review Working GroupPMBOKProject Management Book of KnowledgePMPProject Management PlanPOPrincipal OfficePWSPerformance Work StatementQASPQuality Assurance Surveillance PlanRIMSRegulatory Information Management ServicesSDLCSystems Development LifecycleSOOStatement of ObjectivesSORNSystem of Records NoticeSOWStatement of WorkSWSoftwareTRBTechnical Review BoardWBSWork Breakdown StructureAPPENDIX B: GLOSSARY (For information purposes only) TERMDEFINITIONBusiness AreaThe office or offices within the Department responsible for managing an IT solution and whose purpose will be to support that business function.Capital Planning and Investment Control (CPIC)This process is an integrated approach to managing Information Technology (IT) investments.Certification &and Accreditation (C&A)This activity entails a comprehensive analysis of the technical and non-technical security features and other safeguards of an IT solution to establish the extent to which a particular solution meets a set of specified security requirements. Clinger-- Cohen ActThis public law is formerly known as the Information Technology Management Reform Act or ITMRA. It requires each agency to undertake capital planning and investment control by establishing a process for maximizing the value and assessing and managing risks of IT acquisitions of the executive agency.Contract OfficeDepartmental offices (i.e. CAM or FSAs contract office) that review and approve acquisition planning documents.Core DeliverableA document that must be completed and approved by the end of a particular stage.E-Government Act of 2002This public law requires agencies to develop performance measures for implementing e-government. In addition, the act requires agencies to conduct and submit to OMB, Privacy Impact Assessments (PIAs) for all new IT investments administering information in identifiable form collected from or about members of the public. (Refer to the CPIC process for more information).Enterprise Architecture (EA) This functional area provides resources and processes to help the Department link its business needs with the best available technologies. EA helps the Department accomplish more with existing resources by using common or shared technology features to deliver needed capabilities faster, reduce new technology risks and free key program staff to focus on more important work.Exit/Entry CriteriaThe required Framework deliverables that must be completed and approved to exit one stage and enter the next.Federal Information Security Management Act (FISMA) of 2002Federal legislation that requires agencies to integrate IT security into their capital planning and enterprise architecture processes at the agency, conduct annual IT security reviews of all programs and systems and report the results of those reviews to OMB.Family Educational Rights and Privacy Act (FERPA)A Federal law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education.508 Compliance A section of the Rehabilitation Act that requires compliance with the Electronic and Information Technology Accessibility Standards.FrameworkA structured approach of required stages, key activities and core deliverables that provides a foundation for aligning existing interrelated processes within the Departmentregardless of system lifecycle methodology employed.General Support System (GSS)A system that encompasses all parts of an information system (e.g. hardware, software, applications, and people) that uses each part to make up the whole system. An interconnected information resource under the same direct management control that shares common functionality. A system normally includes hardware, software, information, data, applications, communications, facilities and people. It provides support for a variety of users or applications, or both.Information Assurance (IA)The continuous application of security policies, procedures and processes that protect and defend information and information resources from unauthorized disclosure, modification or denial of services to authorized consumers.Information Technology (IT)A term used to describe equipment or an interconnected system or subsystem of equipment, which is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data by an executive agency.Information Technology Investment Management (ITIM)A process area within the Department that provides an integrated management mechanism for the continuous selection, control and evaluation of investments in information systems and resources over the course of their lifecycles. (Refer to the Departments ITIM Process Guide for more information). Key ActivityAny task, procedure or process that enables and supports the development and/or approval of a core deliverable (see definition for core deliverable above).Key ComponentCritical documents, sections of documents or categories of information that pertain to a core deliverable.Lifecycle Management (LCM)The coordination of activities associated with the implementation of information systems from conception through disposal, which include defining requirements, designing, building, testing, implementing and disposing of systems. Major ApplicationAn IT system that contains sensitive information that is valuable to the organization. When the application is determined to be major, its loss of data or inability to function properly will adversely affect continuing activities of the organization.An application that requires special attention to security due to the risk and magnitude of the harm resulting from the loss, misuse, or unauthorized access to, or modification of, the information in the application.National Institute of for Standards and Technology (NIST)This organization is a non-regulatory Federal agency within the U.S. Commerce Departments Technology Administration division. NISTs mission is to develop and promote measurement, standards and technology to enhance productivity, facilitate trade and improve the quality of life.OMB Circular A-11The title of this legislation is Preparing, Submitting and Executing the Budget. A-11 provides guidance on preparing the Fiscal Year Budget submissions for Presidential review and includes instructions on budget execution.OMB Circular A-94The title of this policy is Guidelines and Discount Rates for Benefit-Cost Analysis of Federal Programs. A-94 offers guidelines to promote efficient resource allocation through well-informed decision-making. OMB Circular A-123The revised version of this policy will have the title, Managements Responsibility for Internal Control, and is effective as of FY 2006. This legislation defines managements responsibility for internal control in Federal agencies and has a strong emphasis on financial reporting, as opposed to IT Capital Planning.OMB Circular A-130The title of this policy is Management of Federal Information Resources, A-130, provides information resource management policies on Federal Information Management/Information Technology (IM/IT) resources. The ED OCIO recommends that all offices investing in IT resources become familiar with OMB A-130.Paperwork Reduction Act of 1995Federal legislation intended to minimize the paperwork burden resulting from the collection of information by or for the Federal government in an effort to reduce cost by better managing Federal government information.Principal Office (PO)Offices within the Department thatwhich are responsible for ensuring that they develop automated systems that use information technology in accordance with the Framework.Planning and Investment Review Working Group (PIRWG)Department governing body that conducts IT investment analysis reviews and evaluates IT investments and makes recommendations to the CIO. The PIRWG also advises the CIO on Strategic IT investment management issues.Privacy Act of 1974, as amendedAll Department IT systems processing data that is protected under the Privacy Act must have measures implemented to protect individually identifiable information. Interconnecting systems owned by other departments and agencies that process Department data must also be considered. Protection measures must consist of management, technical and operational controls and ensure an acceptable level of risk. An acceptable level of risk should be determined in accordance with the Departments Risk Management Procedures.Legislation to protect information collected from the public by federal agencies; requires the use of, means of collection, and storage and classification of such information be approved and sanctioned.Process GuidesDocuments for various process areas within the Department (e.g. ITIM, TRB, CCRB).Program ManagerA staff person responsible for managing the day-to-day operations of Department of Education IT Solutions. Program Managers are responsible for developing the majority of core deliverables required throughout the lifecycle and are responsible for ensuring that all required activities throughout the lifecycle are accomplished on schedule and within cost. Project ManagerStaff person who is responsible for creating deliverables and ensuring that business and technical reviews are executed and required deliverables are completed. This individual is also responsible for managing the day-to-day operations of the Departments IT solutions.A staff person responsible for assisting program managers with the day-to-day management of IT solutions; they are accountable for the IT initiative under their management.Quality Assurance (QA)A discipline within project management to objectively monitor control and ensure the completion of key activities and required core deliverables throughout the lifecycle.SolutionA term to describe all automated information systems, software applications and manual processes at the Department (see System below).StageDefinitive sections of the lifecycle that indicate a specific purpose or goal (e.g. Vision Stage, Design Stage). The end of each stage is marked by a gatestage gate, which marks the exit from one stage and entry into the next. Stage Gate ReviewThe integration of various business and technical reviews that ensures core deliverables (and any additional deliverables) required for that stage have been completed.Tailored Project GuideA document to be used by program and project managers to plan, record and track the completion of all deliverables required for that solution. Project managers should list all Framework core deliverables and any additional required deliverables for their solution. SystemA collection of components (hardware, software, interfaces) organized to accomplish a specific function or set of functions; generally considered to be a self-sufficient item in its intended operational use.Technical Review Board (TRB)Department governing body whose purpose is to govern the technical aspects of new systems development that might affect the performance of the many client and enterprise systems, infrastructure, data and general integrity of the Departments network (EDNet).UserAn individual or organization who operatesing or interactsing directly with the system; one who uses the services of a system. APPENDIX C: LCM FRAMEWORK 1.0 GRAPHIC  APPENDIX D: DEPARTMENTAL DOCUMENT REFERENCES (For information purposes only) DOCUMENTATION OFFICEPOINT OF CONTACT (POC)EDNET LINKAcquisition Planning ACS Directives Contracts and Acquisition Management (CAM)Cynthia Bond (HYPERLINK "mailto:cynthia.bond@ed.gov"cynthia.bond@ed.gov)http://connected1.ed.gov/po/om/executive/acs/alpha.html *Change Control Review Board (CCRB) Process GuideSecurity and Reliability Assurance TeamManny Hernandez ( HYPERLINK "mailto:manny.hernandez@ed.gov" manny.hernandez@ed.gov) HYPERLINK "http://wdcrobiis09/doc_img/guide_ccrbprocessv9_0.pdf" http://wdcrobiis09/doc_img/guide_ccrbprocessv9_0.pdf  HYPERLINK "http://ednethome/EDNetDocuments/General%20Access/GUIDE%20-%20CCRB%20Process%20-%20V9_0.pdf" \o "http://ednethome/EDNetDocuments/General Access/GUIDE - CCRB Process - V9_0.pdf" http://ednethome/EDNetDocuments/General%20Access/GUIDE%20-%20CCRB%20Process%20-%20V9_0.pdfPolicy and Procedures: ConnectED Development Services Team (DST)Sally Budd ( HYPERLINK "mailto:sally.budd@ed.gov" sally.budd@ed.gov)http://connected.ed.gov/doc_img/policy_proc.doc Enterprise Architecture GuidanceArchitecture GuidanceEnterprise ArchitectureJoe Rose ( HYPERLINK "mailto:joseph.rose@ed.gov" joseph.rose@ed.gov)http://connected1.ed.gov/po/ea/index.html A Guide to the Information Collection Clearance Process Regulatory Information Management Services RIMS)Jeanne Van Vlandren ( HYPERLINK "mailto:jeanne.vanvlandren@ed.gov" jeanne.vanvlandren@ed.gov) HYPERLINK "http://wdcrobiis08/doc_img/ticol.doc" http://wdcrobiis08/doc_img/ticol.docITIM Policy ACS Directive (Draft: Pending Approval)Information Technology Investment Management (ITIM) OfficeWanda Davis ( HYPERLINK "mailto:wanda.davis@ed.gov" wanda.davis@ed.gov) HYPERLINK "mailto:" http://connected1.ed.gov/po/om/executive/acs/alpha.html *System Security Plan TemplateInformation Assurance (IA)Jerry Davis ( HYPERLINK "mailto:jerry.davis@ed.gov" jerry.davis@ed.gov)http://connected.ed.gov/doc_img/System%20Security%20Plan%20Template%20102903%20v1%201.doc IT Security Systems Development Lifecycle LC(SDLC) Integration GuideIAJerry Davis ( HYPERLINK "mailto:jerry.davis@ed.gov" jerry.davis@ed.gov)http://connected.ed.gov/doc_img/SDLC%20Security%20Integration%20Guide%20v3.doc Information Assurance (IA) ACS DirectivesIAJerry Davis ( HYPERLINK "mailto:jerry.davis@ed.gov" jerry.davis@ed.gov)http://connected1.ed.gov/po/om/executive/acs/alpha.html *TRB Process Guide, 9.1Production OperationsRenaldo Harper ( HYPERLINK "mailto:renaldo.harper@ed.gov" renaldo.harper@ed.gov)http://connected/index.cfm?navid=225  HYPERLINK "http://ednethome/EDNetDocuments/General%20Access/GUIDE%20-%20TRB%20Process%20-%20V10_0_PA.pdf" \o "http://ednethome/EDNetDocuments/General Access/GUIDE - TRB Process - V10_0_PA.pdf" http://ednethome/EDNetDocuments/General%20Access/GUIDE%20-%20TRB%20Process%20-%20V10_0_PA.pdf *Link is to the ACS Directives library on ConnectED. APPENDIX E: TAILORED PROJECT GUIDE TEMPLATE (For information purposes only) Revision # 1. Visions Stage Core DeliverablesNotesBusiness CaseAcquisition and Contracts DocumentsTechnical Documents (e.g. TRB, EA)Security and Privacy DocumentsTailored Project GuideAdditional Deliverables2. Definition StageCore DeliverablesReview previous deliverables and update as necessary Project Management Plan (PMP): Scope, Cost, Schedule, Quality, Staffing, Communications, Risk and Procurement.Configuration Management Plan (CM Plan)Requirements DocumentationDesign DocumentationSecurity &and Privacy DocumentationTest Plan Additional DeliverablesRIMS Deliverables: (consult the Departments A Guide to the Information Collection Clearance Process about whether your solution requires RIMS deliverables)Systems of Record UpdatePrivacy Impact Assessment (PIA)Information Collection ClearanceSystem of Records Notice (SCORN) 3. Construction &and Validation StageCore DeliverablesReview previous deliverables and update as necessaryTesting Documentation Implementation DocumentsMaintenance &and Operation Plan Additional Deliverables 4. Implementation StageCore DeliverablesAccepted Operations / Running SolutionAdditional Deliverables5. Support &and Improvement StageCore DeliverablesReview previous deliverables and update as necessaryAmended Business Case for Solution EnhancementsAdditional Deliverables6. Retirement StageCore DeliverablesRetirement PlanDisposal PlanAdditional Deliverables  Please refer to Appendix A of the draft ITIM PolicyACS Directive, Information Technology Investment Management (ITIM) Policyfor a description of small projects as defined by the Office of Management and Budget (OMB). The ITIM Policy ACS Directive is referenced in Appendix D of this directive.     OCIO:1-106 Page  PAGE 2 of  NUMPAGES 27 (12/02/2005) For technical questions concerning information found in this Administrative Communications System (ACS) document, please contact Joe Wanda Davis atRose at 202-245-6444561 or  HYPERLINK "mailto:joe.rose@ed.gov" joe.rose@ed.gov. HYPERLINK "mailto:wanda.davis@ed.gov" wanda.davis@ed.gov. OCIO:1-106 Page  PAGE 14 of  NUMPAGES 27 (12/02/2005) . OCIO:1-106 Page  PAGE 24 of  NUMPAGES 27 (12/02/2005) OCIO:1-106 Page  PAGE 25 of  NUMPAGES 27 (12/02/2005) OCIO:1-106 Page  PAGE 26 of  NUMPAGES 27 (12/02/2005) ADMINISTRATIVE COMMUNICATIONS SYSTEM U.S. DEPARTMENT OF EDUCATION 45;<=>R_dq )2;HI[\]ȼȼȧ֘vqkaI.j0J5>*B*U\mHnHphsH u5>*OJQJaJ 6OJQJOJQJ Hh陆5CJOJQJaJ 5CJOJQJaJcHdh陆5CJOJQJaJOJQJ6OJQJ]5OJQJ\mHnHuj5OJQJU\5OJQJ\ 5CJ\5>*CJOJQJ^J5>*CJ4OJQJ^JaJ4 jUjUmHnHuRq   <HI[\i,$a$ &dP@]@ &dP$a$ !rB]tuvwƼƼyoƼZƼKj\}5UmHnHu)j|5>*B*UmHnHphu5aJmHnHujb|5UmHnHuj5UmHnHu5mHnHu)j{5>*B*UmHnHphu5mHnHu0J5mHnHuj0J5UmHnHu.j0J5>*B*U\mHnHphsH u%0J5>*B*\mHnHphsH u789:GHIcdefghijkǿǪǿdžwǿjP5UmHnHu)j~5>*B*UmHnHphujV~5UmHnHu)j}5>*B*UmHnHphu5mHnHu0J5mHnHu5aJmHnHuj0J5UmHnHu5mHnHuj5UmHnHu) 1234EFGabcdefghiɻɬɻܢҚ҅ɻvɻܢҚaɻ)j5>*B*UmHnHphujD5UmHnHu)jǀ5>*B*UmHnHphu5mHnHu5aJmHnHujJ5UmHnHuj5UmHnHu5mHnHu0J5mHnHuj0J5UmHnHu)j5>*B*UmHnHphu&gt5  ' ( rs_`G & F ^` & F ^`$h^ha$$ ^ a$h^h ^  h^h`,6789QRSmnoqrstuv˷˷ً˷v˷g˷j25UmHnHu)j5>*B*UmHnHphuj85UmHnHu)j5>*B*UmHnHphu5mHnHu0J5mHnHu5aJmHnHuj0J5UmHnHu5mHnHuj5UmHnHuj>5UmHnHu(v   . / 0 2 3 4 5 6 7 S T U V ´¥´˛´w´˛b)j5>*B*UmHnHphuj&5UmHnHu)j5>*B*UmHnHphu5aJmHnHuj,5UmHnHuj5UmHnHu5mHnHuj0J5UmHnHu)j5>*B*UmHnHphu0J5mHnHu5mHnHu&        & ' ( ` d ̸̸̸tlfYfOJQJ\cHdh陆 OJQJ\mHnHsH u.j0J5>*B*U\mHnHphsH uj5UmHnHu)j5>*B*UmHnHphu5mHnHu0J5mHnHu5aJmHnHuj0J5UmHnHuj 5UmHnHu5mHnHuj5UmHnHud i  W X ` a t  # 6 A D -.ƹwjjwXMHh陆OJQJ"jHhߔF0J2OJQJUHh,fOJQJ\OJQJ\cHdh,fOJQJcHdh*fHh*fOJQJOJQJHh+fOJQJ\Hh,fOJQJ\OJQJ\cHdh+fOJQJ\cHdh+fOJQJ\cHdh+f OJQJ\Hh+fOJQJ\Hh+fOJQJ\^_#01mx|~ghi{PQRYZ[lmosf0JOJQJcHdh陆Hh陆0JOJQJ 0JOJQJjOJQJUjOJQJUHhOJQJHhלfOJQJmH sH OJQJmH sH  HhF Hh+fHh陆cHdh+f Hh陆 cHdh陆CJOJQJ^JaJ OJQJ\OJQJ#-#01hi{|Qd` & Fh^hV^V` 0h^h` & F ^` & F ^` & F ^`owOPQRhz{ "ŲŲwodHh*fOJQJ56OJQJOJQJmH sH HhN+f\ HhN+fCJOJQJ^JaJOJQJcHdhfjAOJQJU 0JOJQJj\OJQJUjOJQJUHh+fOJQJHh+fOJQJOJQJHh陆OJQJOJQJcHdh陆'hz{ab(  & F rH^H & F XE`$<`<a$ & F EW^W`h^h & F *<^<`^-$a$z^z04xbhw) 5 _ a q a!u!#"%"<"""""""+#0#ξ΢΢uj_HhћfOJQJHh͜fOJQJOJQJcHdh̜f56OJQJcHdh͛fOJQJmH sH CJOJQJ^JaJ56B*OJQJphHh陆B*OJQJphB*OJQJcHdh陆phB*OJQJph OJQJ\Hh陆OJQJOJQJcHdh陆56OJQJOJQJ$( ) ` a b!c!$"%"<"="""$$ & F  ^` $`a$$a$$h^ha$ & F ` & F ` & F `h^h0#1#:#<#=#L#M#N#O#^#_#q#t#y#############U$ñxmmmxmxmx[I"HhꙆOJQJcHdh՛f"HhꙆOJQJcHdhϛfHhꙆOJQJ"HhꙆOJQJcHdhΛf"HhꙆOJQJcHdh͛f(HhꙆ56OJQJcHdh͛f"Hh陆OJQJcHdhΛfOJQJcHdhΛfHhϛfOJQJHhΛfOJQJHhћfOJQJOJQJOJQJcHdhϛfU$d$e$$$$$$$$$$$$$U%ʸrgUJ?4Hh陆OJQJHh͜fOJQJHh̜fOJQJ"Hh陆OJQJcHdh̜fOJQJcHdh陆56OJQJcHdh̜f56OJQJcHdh陆56OJQJOJQJOJQJcHdhgꙆ"HhꙆOJQJcHdh6"HhꙆOJQJcHdh՛f"HhꙆOJQJcHdh՛f"HhꙆOJQJcHdhқf"HhꙆOJQJcHdhқfU%V%d%%%%%%%%'&)&*&,&?&&&&Q''+H-I-///3/4/7/W/X//1ӶӫȠޘތ{{peZeZ{HhfOJQJOJQJcHdhfHh陆OJQJ OJQJ\CJOJQJ^JaJ5>*CJOJQJ^J56OJQJOJQJcHdh陆HhϜfOJQJ"Hh陆OJQJcHdhϜfHh陆OJQJHh陆OJQJOJQJHh陆OJQJ"Hh陆OJQJcHdhΜf$+&,&&&&&()++..X/Y/2)^)$h^ha$ & F `h^hS & F Eƀ.^`/181B1C1D1\111112s222.3444*545G5555666O66ǺݲЀsdUOJQJ]aJcHdh*fHh*fOJQJ]aJHh*fOJQJ\ OJQJ\Hh*fOJQJ]aJOJQJ]aJcHdh*fOJQJ]aJ 5OJQJ5OJQJaJOJQJaJcHdh*fHh*f\Hh*fOJQJ\ OJQJaJHh*fOJQJOJQJOJQJcHdh*f22h4i44444O6P66667_899:::: & Fh`h & F ^ & F ^^$^a$$^a$  ^` )^)667777-797J7[7h7{7 88888F8T8e8o88889999˼˼魞qqdUFOJQJ]aJcHdh陆OJQJ]aJcHdh陆Hh +fOJQJ]Hh +fOJQJ]aJOJQJ]aJcHdhffOJQJ]aJcHdh +fHh +fOJQJ]aJOJQJ]aJcHdh +fHh*fOJQJ]aJOJQJ]aJcHdh*fHh*fOJQJ]aJOJQJ]aJHh*fOJQJ]aJ9999:::;;;;;;<B<c<f<h<i<= = =!="=#=$=5=}lg`gWgWMWgOJQJmHnHujOJQJU HhۢOJQJ Hh+f5CJOJQJaJ Hh+f5CJOJQJaJ 5CJOJQJaJcHdh+f Hh+f5CJOJQJaJ 5CJOJQJaJcHdh+f5CJOJQJaJOJQJ]aJcHdhG& OJQJaJ5OJQJaJOJQJ]aJHh陆OJQJ]aJ:f;~;;f<g<h<==6=E=b==$$P($l&`#$/Ifa$//^$a$^ & Fh`h & F ^ 5=6===>??w?x????????/@0@1@l@m@n@o@@˷ˑ|q`qKqˑ(jB*CJOJQJUaJph!Hh陆0JCJOJQJaJ0JCJOJQJaJ(j*B*CJOJQJUaJph"jB*CJOJQJUaJph&HhfB*CJOJQJaJph&B*CJOJQJaJcHdhfphB*CJOJQJaJph"56B*CJOJQJ]aJph56CJ]aJmH sH CJOJQJaJ=====>V2222# & F hx<<$l&`#$/If^`$$Ifl4F`$   t 6`l0$    44 la>:>[>>>>>+?w??n@ AABbB# & F h<<$l&`#$/If^`# & F hx<<$l&`#$/If^`@@@ A A A AUAVAWAAAAAABB%B&B'B:B>B@B`BaBbBcBq`O!HhI0JCJOJQJaJ!0JCJOJQJaJcHdh,f!Hh,f0JCJOJQJaJ(jB*CJOJQJUaJph(jB*CJOJQJUaJph(jˍB*CJOJQJUaJphB*CJOJQJaJph0JCJOJQJaJ"jB*CJOJQJUaJph(jB*CJOJQJUaJphcBdBBBBBBBBBBBBCCCCCCCCCCCCDSDӸ皕wwmwbU56CJ]aJmH sH OJQJcHdh%+fOJQJmHnHujOJQJU cHdhvf cHdh"+f cHdh+fOJQJB*CJOJQJaJph!0JCJOJQJaJcHdhk,f5jB*CJOJQJUaJcHdhk,fph&B*CJOJQJaJcHdhk,fph/jB*CJOJQJUaJcHdhk,fphbBBT<<$l&`#$/EƀEF4IfBBBBBBV???? & F<<$l&`#$/If$$Ifl4\`$``` ` t 6`l0$44 laBBBCCDDVTNTIDd8$a$/^$$Ifl4^\`$     t 6`l0$44 laDD4DSDTDP$$Ifl4FP$` @  t0$    44 lal$$P($Ifa$SDTD@FxFFFFFFFFFFFFGGFGGGHGlGmGnGoGGذ؊ujYjDj؊(jB*CJOJQJUaJph!Hh陆0JCJOJQJaJ0JCJOJQJaJ(jB*CJOJQJUaJph"jB*CJOJQJUaJph&Hh,fB*CJOJQJaJph&B*CJOJQJaJcHdh,fph&B*CJOJQJaJcHdhfphB*CJOJQJaJphCJOJQJaJ"56B*CJOJQJ]aJphTDdDzDG\ & F h<<$EƀEF4If^`\ & F h<<$EƀEF4If^`zDDDG\ & F h<<$EƀEF4If^`\ & F h<<$EƀEF4If^`DDDG\ & F h<<$EƀEF4If^`\ & F h<<$EƀEF4If^`DDEG\ & F |<<$EƀEF If^`|\ & F h<<$EƀEF4If^`EWEsEG\ & F h<<$EƀEF4If^`\ & F |<<$EƀEF If^`|sEEEG\ & F h<<$EƀEF4If^`\ & F h<<$EƀEF4If^`E F2FG\ & F h<<$EƀEF4If^`\ & F h<<$EƀEF4If^`2FAFFG\ & F h<<$EƀEF!4If^`\ & F h<<$EƀEF 4If^`FFGG\ & F h<<$EƀEF#4If^`\ & F h<<$EƀEF"4If^`GnGGG\ & F h<<$EƀEF%4If^`\ & F h<<$EƀEF$4If^`GGGGGHHHHIIIIIII4J5JKJLJnJoJJJJJo````J*B*CJOJPJQJaJcHdh陆phB*CJOJPJQJaJph"56B*CJOJQJ]aJph56CJ]aJmH sH OJQJmHnHujOJQJUOJQJ5OJQJ\5>*CJOJQJCJOJQJaJB*CJOJQJaJph0JCJOJQJaJ"jB*CJOJQJUaJph(jB*CJOJQJUaJphG*HHG\ & F h<<$EƀEF'4If^`\ & F h<<$EƀEF&4If^`HHHIIIIa\VQQLd8$a$^d$$Ifl9 \pP$p` @ t0$44 lalIIJ4J5JMl $$IfTl4F8 $  t06    44 la$$P($Ifa$5JLJoJG\ & F h<<$EƀEF)4If^`\ & F h<<$EƀEF(4If^`oJJJG\ & F h<<$EƀEF+4If^`\ & F h<<$EƀEF*4If^`JJJJJJJ KoKpKKKKKKKK긤~i~^~J2/jB*CJOJQJUaJcHdh,fph&Hh,fB*CJOJQJaJph0JCJOJQJaJ(j|B*CJOJQJUaJph"jB*CJOJQJUaJph&HhfB*CJOJQJaJph&B*CJOJQJaJcHdhfphB*CJOJQJaJph*B*CJOJPJQJaJcHdh陆phB*CJOJPJQJaJph*Hh陆B*CJOJPJQJaJphJ2KoKG\ & F h<<$EƀEF-4If^`\ & F h<<$EƀEF,4If^`oKK>LWK<<$EƀEF/4If\ & F h'<<$EƀEF.4If^`'K)L*L+LL?LvLwLxLLLLL%M&MѹoTC:5*OJQJcHdhfOJQJCJOJQJaJ!0JCJOJQJaJcHdh,f5jVB*CJOJQJUaJcHdh,fph&B*CJOJQJaJcHdh,fph/jB*CJOJQJUaJcHdh,fphB*CJOJQJaJph!0JCJOJQJaJcHdh,f/jB*CJOJQJUaJcHdh,fph5jAB*CJOJQJUaJcHdh,fph&B*CJOJQJaJcHdh,fph>LLLL#!$$IfTl40F8 $ t06    44 laK<<$Eƀ.f04If&M)MqMwMMMMMMMMMMMANBNNNN8OGOVOO￲kWC&HhfB*CJOJQJaJph&B*CJOJQJaJcHdhfph&HhۛfB*CJOJQJaJph&B*CJOJQJaJcHdhۛfphB*CJOJQJaJph"56B*CJOJQJ]aJph56CJ]aJmH sH 5>*OJQJOJQJmHnHujOJQJU5>*CJOJQJOJQJcHdh؛fOJQJHhfOJQJLMMMN"NAN$$P($&`#$/Ifa$$a$i^iANBNV $$Ifl4F8$bG  t 6`06    44 laBNtNN9c & F hx<<$&`#$/EƀEF24If^`c & F hx<<$&`#$/EƀEF14If^`NN8O9c & F hx<<$&`#$/EƀEF44If^`c & F hx<<$&`#$/EƀEF34If^`8OOO9c & F h<<$&`#$/EƀEF64If^`c & F h<<$&`#$/EƀEF54If^`OOOOPPPPP]P^P_PPPPPPPPPPPP1Q2Q3Q8Q9Q;Q4If^`c & F h<<$&`#$/EƀEF;4If^`QQ~RRRRRRVSiSpSCTTTeTpT|TUUU߿n]LD= OJQJaJ5OJQJaJ 5CJOJQJaJcHdhxf Hh:+f5CJOJQJaJ 5CJOJQJaJcHdh:+f Hhf5CJOJQJaJ 5CJOJQJaJcHdhf5CJOJQJaJ5CJOJQJ\5>*CJOJQJ6CJOJQJ]aJ&Hh,fB*CJOJQJaJphB*CJOJQJaJph&HhޛfB*CJOJQJaJphQQ#R9c & F hG<<$&`#$/EƀEF@4If^`Gc & F hG<<$&`#$/EƀEF?4If^`G#RjRR9c & F hG<<$&`#$/EƀEFB4If^`Gc & F hG<<$&`#$/EƀEFA4If^`GRRRRUUUNVXVTNHVB^^^$$Ifl.\8$b t 6`0644 laUUU6V:VbDbEbZb[b\b]bbbbTcccnaM&B*CJOJQJaJcHdhfphB*CJOJQJaJph"56B*CJOJQJ]aJph56CJ]aJmH sH OJQJmHnHujOJQJUOJQJ OJQJaJ5OJQJaJ6CJOJQJ]aJ0J6CJaJ#j6B*CJUaJph6B*CJaJphj6B*CJUaJph6CJ]aJmH sH ````=b>bbbXVVLVGBd8$a$ ^`$$IflE\ $\ t 6`!0644 labbbbb@, $$Ifl4F $3  t 6`!06    44 la$$P($!&`#$/Ifa$bb c9c & F h<<$!&`#$/EƀEFP4If^`c & F h<<$!&`#$/EƀEFO4If^` ccTc9c & F h<<$!&`#$/EƀEFR4If^`c & F h<<$!&`#$/EƀEFQ4If^`ccrccccccd d!d2d3d4d5d~dddddddddd e!e"e'e(e߸ߣ߸߃nY(jTB*CJOJQJUaJph(jB*CJOJQJUaJph(jB*CJOJQJUaJph0JCJOJQJaJ(jٚB*CJOJQJUaJph"jB*CJOJQJUaJph6CJOJQJ]aJCJOJQJaJB*CJOJQJaJph&HhfB*CJOJQJaJphTccc9c & F h<<$!&`#$/EƀEFT4If^`c & F h<<$!&`#$/EƀEFS4If^`c4dd9c & F h<<$!&`#$/EƀEFV4If^`c & F h<<$!&`#$/EƀEFU4If^`dd'e9c & F h<<$!&`#$/EƀEFX4If^`c & F h<<$!&`#$/EƀEFW4If^`(e)e*ewexeyeeeeeeeeff8g?g@gUgVg͹͍̀l]]QLD7D7j5CJOJQJU5CJOJQJOJQJ6CJOJQJ]aJB*CJOJQJaJph&Hh,fB*CJOJQJaJphB*CJOJQJaJph!0JCJOJQJaJcHdh,f5jB*CJOJQJUaJcHdh,fph&B*CJOJQJaJcHdh,fph/jB*CJOJQJUaJcHdh,fph3Hh,fB*CJOJQJaJcHdh^ph'efc & F h<<$!&`#$/Eƀ.fZ4If^`fff8g9gvgwgkf`XXP$d8a$$da$^d$$IflF $3 t 6`!06    44 laVgWgXgwgggggg%h0h?h[hfhuhhhhiiiözfR@#6CJOJQJ]aJcHdh陆&B*CJOJQJaJcHdh陆ph&HhfB*CJOJQJaJph&B*CJOJQJaJcHdhfph&Hha+fB*CJOJQJaJph&B*CJOJQJaJcHdha+fphB*CJOJQJaJph56CJOJQJ]aJ56CJ]aJmH sH 5CJOJQJj5CJOJQJU5CJOJQJmHnHuwggggg@ $$Ifl4F $QW  t 6`!06    44 la$$P($!&`#$/Ifa$ghKh9c & F h<<$!&`#$/EƀEF\4If^`c & F h<<$!&`#$/EƀEF[4If^`Khhh@\ & F h<<$EƀEF^4If^`c & F h<<$!&`#$/EƀEF]4If^`i#i$i%i&i'ibicidijiliiiiiiii@jAjBj߸ͭߘͭ̈́lX=l5jB*CJOJQJUaJcHdh,fph&B*CJOJQJaJcHdh,fph/jB*CJOJQJUaJcHdh,fph&Hh,fB*CJOJQJaJph(jB*CJOJQJUaJph0JCJOJQJaJ(jB*CJOJQJUaJph"jB*CJOJQJUaJphB*CJOJQJaJph&Hh陆B*CJOJQJaJphh&ijiG\ & F h<<$EƀEF`4If^`\ & F h<<$EƀEF_4If^`jiiijWK<<$EƀEFb4If\ & F h<<$EƀEFa4If^`Bjgjhjjjkkk]kakhkllllllllllmmn*n9nnnnĹĹĹĥĥĎmYG"jB*CJOJQJUaJph&HhfB*CJOJQJaJph&B*CJOJQJaJcHdhfph56CJOJQJ]aJ56CJ]aJmH sH OJQJmHnHujOJQJUHhc+fOJQJOJQJcHdhc+fOJQJB*CJOJQJaJph/jB*CJOJQJUaJcHdh,fph!0JCJOJQJaJcHdh,fijjjkj|l}llllkica\WA$$P($&`#$/Ifa$d8$a$^$$IflF $QW t 6`!06    44 lallmm@D $$Ifl4F $W@  t 6`06    44 la$$P($&`#$/Ifa$mNmam9c & F h<<$&`#$/EƀEFd4If^`c & F h<<$&`#$/EƀEFc4If^`ammm9c & F h<<$&`#$/EƀEFf4If^`c & F h<<$&`#$/EƀEFe4If^`mmn9c & F h<<$&`#$/EƀEFh4If^`c & F h<<$&`#$/EƀEFg4If^`n_nn9c & F h<<$&`#$/EƀEFj4If^`c & F h<<$&`#$/EƀEFi4If^`nnnooPoQoRoXoYoZo[ooooooooْzfKz:z25OJQJaJ!0JCJOJQJaJcHdh,f5jEB*CJOJQJUaJcHdh,fph&B*CJOJQJaJcHdh,fph/jB*CJOJQJUaJcHdh,fph3Hh,fB*CJOJQJaJcHdhcph(jxB*CJOJQJUaJphB*CJOJQJaJph0JCJOJQJaJ"jB*CJOJQJUaJph(jB*CJOJQJUaJphnoXoG\ & F h<<$EƀEFl4If^`\ & F h<<$EƀEFk4If^`XooogK<<$EƀEFm4IfK<<$EƀEFm4Ifooopkic^$$IflF $W@ t 6`06    44 laoppqqqqSrbrqrrrsss0s1s2s3s|s}s~sss&tɼmbS>b(jB*CJOJQJUaJph>*B*CJOJQJaJph0JCJOJQJaJ(j:B*CJOJQJUaJph"jB*CJOJQJUaJph&HhfB*CJOJQJaJph&B*CJOJQJaJcHdhfphB*CJOJQJaJph"56B*CJOJQJ]aJph56CJ]aJmH sH 5OJQJaJHhcOJQJOJQJpqqqqq$$P($T&`#$/Ifa$HC$Eƀc^qqTD$$Ifl4F$#  t 6`T06    44 laqqr=] & F h<<$T&`#$/EƀEFo4Ife & F h<<$T&`#$/EƀEFn4If^`rr>r=e & F h<<$T&`#$/EƀEFq4If^`] & F h<<$T&`#$/EƀEFp4If>rSrr=e & F h<<$T&`#$/EƀEFs4If^`] & F h<<$T&`#$/EƀEFr4Ifrr2s>\ & F h<<$EƀEFu4If^`e & F h<<$T&`#$/EƀEFt4If^`2sst>e & F h<<$T&`#$/EƀEFw4If^`\ & F h<<$EƀEFv4If^`&t't(t)tmtntottttttttttttt8u9u:uʿʿٍٚxgRٍ=(jB*CJOJQJUaJph)Hh,f>*B*CJOJQJaJph!Hh+f0JCJOJQJaJ(j0B*CJOJQJUaJphB*CJOJQJaJph>*B*CJOJQJaJph+jM>*B*CJOJQJUaJph0JCJOJQJaJj0JCJOJQJUaJ"jB*CJOJQJUaJph(jB*CJOJQJUaJphttAu1f & F h<<$T&`#$/C$Eƀ,fIf^`f & F h<<$T&`#$/C$Eƀ+fIf^`:u?u@uAuBudueufujukulumuuuuuuuuuܺܔ܅ܺpe܅M25j.B*CJOJQJUaJcHdh,fph/jB*CJOJQJUaJcHdh,fph0JCJOJQJaJ(jkB*CJOJQJUaJph>*B*CJOJQJaJph!Hh,f0JCJOJQJaJ(jЩB*CJOJQJUaJphB*CJOJQJaJph)Hh,f>*B*CJOJQJaJph"jB*CJOJQJUaJph!Hh,f0JCJOJQJaJAuluu3e & F h<<$T&`#$/Eƀ,f{4If^`f & F h<<$T&`#$/C$Eƀ,fIf^`uuuuuuuvv www.w/w5w6wKwLwMwNwJxKx`xaxcxdxrxxxyƲƏƣƃ~u~uku~u~uku~^Q56CJOJQJ]aJ56CJ]aJmH sH OJQJmHnHujOJQJUOJQJ6CJOJQJ]aJ&Hh,fB*CJOJQJaJphB*CJOJQJaJph&HhfB*CJOJQJaJphB*CJOJQJaJph&B*CJOJQJaJcHdh,fph/jB*CJOJQJUaJcHdh,fphuvTv>e & F h<<$T&`#$/EƀEF}4If^`\ & F h<<$EƀEF|4If^`Tvvv5e & F h<<$T&`#$/EƀEF4If^`e & F h<<$T&`#$/EƀEF~4If^`v.we & F h<<$T&`#$/EƀEF4If^`.w/wtwuwBxCxDxqxVQOFQQQd^$a$$$Ifl.\ $# t 6`T0644 laqxrxxxxx7 $$Ifl4F $0i  t 6`l!06    44 la$$P($l!&`#$/Ifa$d8xx y5e & F h<<$l!&`#$/EƀEF4If^`e & F h<<$l!&`#$/EƀEF4If^` yy(y5e & F h<<$l!&`#$/EƀEF4If^`e & F h<<$l!&`#$/EƀEF4If^`y'y(y7yFyyyyy"z#z$z%znzozpzzzzzzzz!{"{#{){*{+{꛰oZH#j0JCJOJQJUaJ(j B*CJOJQJUaJph#j$0JCJOJQJUaJ0JCJOJQJaJj0JCJOJQJUaJ(jɫB*CJOJQJUaJph"jB*CJOJQJUaJph&HhfB*CJOJQJaJph&B*CJOJQJaJcHdhfphB*CJOJQJaJphCJOJQJaJ(ybyy5e & F h'<<$l!&`#$/EƀEF4If^`'e & F h'<<$l!&`#$/EƀEF4If^`'yyz>\ & F h<<$EƀEF4If^`e & F h'<<$l!&`#$/EƀEF4If^`'z){{{|>++<<$l!&`#$/If\ & F h<<$EƀEF4If^`e & F h<<$T&`#$/EƀEF4If^`+{,{-{|{}{~{{{{{{{{|||||*|Ͷܠvi]UF7UHh,f5OJQJaJ5OJQJaJcHdh,f5OJQJaJ6CJOJQJ]aJB*CJOJQJaJph0j0JCJOJQJUaJcHdh,f!0JCJOJQJaJcHdh,f*j0JCJOJQJUaJcHdh,f,jCJOJQJUaJcHdh,fCJOJQJaJcHdh,f&jCJOJQJUaJcHdh,fHh,fCJOJQJaJ|||)|*|L}M}}}igagWgQH & Fh`h^  ^` ^$$IflF $0i t 6`l!06    44 la*|J|L|P|M}^}_}b}UPdw~&2347'(sȹȹׯתxmתdW56CJ]aJmH sH CJOJQJaJHhfOJQJOJQJcHdhfOJQJcHdhfHhfOJQJOJQJcHdhf 6OJQJOJQJ6OJQJ]aJHhfOJQJ]aJOJQJ]aJcHdhfOJQJ]aJHh,fOJQJaJOJQJaJcHdh,f OJQJaJ}R~~~Uۀuv(7$$P($&`#$/Ifa$$a$  ^` ^` & F ^ & Fh`h ^` & Fh`h & F ^7Tst@$$Ifl4F& $1  t 6`06    44 la$$P($&`#$/Ifa$stȄjkLMNĆņƆ͹ᒧxbxPx;(jB*CJOJQJUaJph#j50JCJOJQJUaJ+jL>*B*CJOJQJUaJph0JCJOJQJaJj0JCJOJQJUaJ(jB*CJOJQJUaJph"jB*CJOJQJUaJph&HhfB*CJOJQJaJph&B*CJOJQJaJcHdhfphB*CJOJQJaJph"56B*CJOJQJ]aJpht9c & F h<<$&`#$/EƀEF4If^`c & F h<<$&`#$/EƀEF4If^`99c & F hR<<$&`#$/EƀEF4If^`Rc & F hR<<$&`#$/EƀEF4If^`R9j@\ & F h<<$EƀEF4If^`c & F hR<<$&`#$/EƀEF4If^`RƆdž>?@FHIJKkP:*j0JCJOJQJUaJcHdh,f5jB*CJOJQJUaJcHdh,fph&B*CJOJQJaJcHdh,fph/jB*CJOJQJUaJcHdh,fph&Hh,fB*CJOJQJaJph"jB*CJOJQJUaJph#jȶ0JCJOJQJUaJ+j>*B*CJOJQJUaJph0JCJOJQJaJj0JCJOJQJUaJFlp>-<<$&`#$/If\ & F h<<$EƀEF4If^`e & F h<<$T&`#$/EƀEF4If^`DEFlnopqÈňɈЉѻ}qlaVlLl?56CJ]aJmH sH 5CJOJQJ\Hh+fOJQJOJQJcHdh+fOJQJ6CJOJQJ]aJB*CJOJQJaJph/jB*CJOJQJUaJcHdh,fph0jϹ0JCJOJQJUaJcHdh,f*j0JCJOJQJUaJcHdh,f8jڸ>*B*CJOJQJUaJcHdh,fph!0JCJOJQJaJcHdh,fpqrsωЉkff`f[[f$a$^d8$$IflF& $1 t 6`06    44 laЉ߉@P$$Ifl4FH$bb  t 6`^06    44 la$$P($^&`#$/Ifa$]^ϋЋы/012{|͹ᒧxfxQx;+jѽ>*B*CJOJQJUaJph(jvB*CJOJQJUaJph#j0JCJOJQJUaJ0JCJOJQJaJj0JCJOJQJUaJ(jĺB*CJOJQJUaJph"jB*CJOJQJUaJph&HhfB*CJOJQJaJph&B*CJOJQJaJcHdhfphB*CJOJQJaJph"56B*CJOJQJ]aJph0?9c & F h<<$^&`#$/EƀEF4If^`c & F h<<$^&`#$/EƀEF4If^`?Ti9c & F h<<$^&`#$/EƀEF4If^`c & F h<<$^&`#$/EƀEF4If^`i9c & F h<<$^&`#$/EƀEF4If^`c & F h<<$^&`#$/EƀEF4If^`,]9c & F h<<$^&`#$/EƀEF4If^`c & F h<<$^&`#$/EƀEF4If^`]LG\ & F h<<$EƀEF4If^`\ & F h<<$EƀEF4If^`|~njȌʌLOQÍ  !"]^_`庶whS(jB*CJOJQJUaJph>*B*CJOJQJaJph+j>*B*CJOJQJUaJph(jB*CJOJQJUaJphB*CJOJQJaJph"jB*CJOJQJUaJph#j0JCJOJQJUaJ#j0JCJOJQJUaJ0JCJOJQJaJj0JCJOJQJUaJL!9c & F h(($^&`#$/EƀEF4If^`c & F h(($^&`#$/EƀEF4If^`ȎɎʎˎ"DMopӍ~j~jVJEOJQJ6CJOJQJ]aJ&Hh,fB*CJOJQJaJph&Hh⛚fB*CJOJQJaJphB*CJOJQJaJph#j'0JCJOJQJUaJ(j~B*CJOJQJUaJphB*CJOJQJaJph"jB*CJOJQJUaJph0JCJOJQJaJj0JCJOJQJUaJ#j0JCJOJQJUaJ;@c & F h(($^&`#$/EƀEF4If^`\ & F h<<$EƀEF4If^`;p9c & F h (($^&`#$/EƀEF4If^` c & F h (($^&`#$/EƀEF4If^` 19c & F h (($^&`#$/EƀEF4If^` c & F h (($^&`#$/EƀEF4If^` 1oc & F h (($^&`#$/EƀEF4If^` opqrXVVPNI@  !d8$a$^$$Ifl# \H9$bb t 6`^0644 lađ>$$Ifl49Fp$  t 6`*06    44 la$$P($*&`#$/Ifa$ΒtuГѓғӓ ;͙mXmI>0JCJOJQJaJj0JCJOJQJUaJ(jB*CJOJQJUaJph"jB*CJOJQJUaJph3Hh陆B*CJOJQJaJcHdh*fph*Hh陆CJOJQJaJcHdh*fHhfCJOJQJaJCJOJQJaJcHdhfB*CJOJQJaJphCJOJQJaJ5B*CJOJQJaJph56CJ]aJmH sH '99c & F h<<$*&`#$/EƀEF4If^`c & F h<<$*&`#$/EƀEF4If^`9t9c & F h<<$*&`#$/EƀEF4If^`c & F h<<$*&`#$/EƀEF4If^`9c & F h<<$*&`#$/EƀEF4If^`c & F h<<$*&`#$/EƀEF4If^`D9c & F h<<$*&`#$/EƀEF4If^`c & F h<<$*&`#$/EƀEF4If^`Du7d & F h<<$*&`#$/C$Eƀ陆If^`c & F h<<$*&`#$/EƀEF4If^`O\ & F h<<$EƀEF4If^`T<<$*&`#$/C$Eƀ陆If !jklm`abc•ÕŕӉt^O>*B*CJOJQJaJph+j>*B*CJOJQJUaJph(jB*CJOJQJUaJph+j>*B*CJOJQJUaJph(jtB*CJOJQJUaJphB*CJOJQJaJph"jB*CJOJQJUaJph0JCJOJQJaJj0JCJOJQJUaJ#j0JCJOJQJUaJ•G\ & F h<<$EƀEF4If^`\ & F h<<$EƀEF4If^`*+,0123ْzfKz:z!0JCJOJQJaJcHdh,f5jhB*CJOJQJUaJcHdh,fph&B*CJOJQJaJcHdh,fph/jB*CJOJQJUaJcHdh,fph3Hh,fB*CJOJQJaJcHdhlph(jB*CJOJQJUaJphB*CJOJQJaJph0JCJOJQJaJ"jB*CJOJQJUaJph(jB*CJOJQJUaJph•)G\ & F h<<$EƀEF4If^`\ & F h<<$EƀEF4If^`'(:OQ@]_~_wӸ皋wcZUHB;3OJQJ]aJ OJQJaJ 5OJQJHh5OJQJOJQJCJOJQJaJ&HhAfB*CJOJQJaJph&Hh㛚fB*CJOJQJaJphB*CJOJQJaJphB*CJOJQJaJph!0JCJOJQJaJcHdh陆5j]B*CJOJQJUaJcHdh陆ph&B*CJOJQJaJcHdh陆ph/jB*CJOJQJUaJcHdh陆ph)kG\ & F h<<$EƀEF4If^`\ & F h<<$EƀEF4If^`,G\ & F h<<$EƀEF4If^`\ & F h<<$EƀEF4If^`,~\ & F h<<$EƀEF4If^`~^_kffYfOE e^e` ^`  d8^` d8$$IflFp$ t 6`*06    44 la_wxɛʛ (G$$P($!&`#$/Ifa$d$a$d^Jd^J^ & F ^` & F 8^8`` wțɛGH՜$ѝҝӝԝ q\qMB0JCJOJQJaJj0JCJOJQJUaJ(jrB*CJOJQJUaJph"jB*CJOJQJUaJph&HhfB*CJOJQJaJph&B*CJOJQJaJcHdhfphCJOJQJaJB*CJOJQJaJph56CJOJQJ]aJ56CJ]aJmH sH 5CJOJQJaJ OJQJaJOJQJ5OJQJaJ OJQJaJGHV$$Ifl4F/ $Q  t 6`!06    44 laH9c & F h<<$!&`#$/EƀEF4If^`c & F h<<$!&`#$/EƀEF4If^`՜9c & F h<<$!&`#$/EƀEF4If^`c & F h<<$!&`#$/EƀEF4If^`h9c & F h<<$!&`#$/EƀEF4If^`c & F h<<$!&`#$/EƀEF4If^`  "klmnOPQӉweQ&Hh,fB*CJOJQJaJph#jQ0JCJOJQJUaJ#jh0JCJOJQJUaJ+j>*B*CJOJQJUaJph(j$B*CJOJQJUaJphB*CJOJQJaJph"jB*CJOJQJUaJph0JCJOJQJaJj0JCJOJQJUaJ#j_0JCJOJQJUaJG\ & F h<<$EƀEF4If^`\ & F h<<$EƀEF4If^`ݟޟߟ/02Ӹ碑t[NB*B*CJOJQJUaJcHdh,fph!0JCJOJQJaJcHdh,f*j0JCJOJQJUaJcHdh,f5j:B*CJOJQJUaJcHdh,fph&B*CJOJQJaJcHdh,fph/jB*CJOJQJUaJcHdh,fph<<$!&`#$/If\ & F h<<$EƀEF4If^`ݠޠkfffZfPJ&`&  ^` d8d[$^d8$$IflF/ $Q t 6`!06    44 laàĠŠǠɠʠޠ,/GI£ãҿxiZK*B*CJOJQJUaJph0JCJOJQJaJj0JCJOJQJUaJ(j-B*CJOJQJUaJph"jB*CJOJQJUaJphB*CJOJQJaJph֪=PR<<$&`#$/EƀEF4If\ & F h<<$EƀEF4If^`CV̮ϮӮ|}4ѹvogXIgocdefδϴдziNiB=OJQJ6CJOJQJ]aJ5j)B*CJOJQJUaJcHdh,fph!0JCJOJQJaJcHdh,f5j4B*CJOJQJUaJcHdh,fph&B*CJOJQJaJcHdh,fph/jB*CJOJQJUaJcHdh,fphB*CJOJQJaJph0JCJOJQJaJ"jB*CJOJQJUaJph(jB*CJOJQJUaJpheYR<<$*&`#$/EƀEF4IfR<<$*&`#$/EƀEF4Ifstukiicci^^Yd8$a$^$$Ifl.FK $L t 6`*06    44 la rstuڶ۶ȷ׷'(_`arstu̴m[F[;[[0JCJOJQJaJ(j8B*CJOJQJUaJph"jB*CJOJQJUaJph&HhfB*CJOJQJaJph&B*CJOJQJaJcHdhfphB*CJOJQJaJph"56B*CJOJQJ]aJph56CJ]aJmH sH OJQJcHdhCfOJQJ)Hhy5B*CJOJQJaJph5B*CJOJQJaJph5CJOJQJaJڶ۶@ $$Ifl4F a$Q  t 6`06    44 la$$P($&`#$/Ifa$۶)C9c & F h<<$&`#$/EƀEF4If^`c & F h<<$&`#$/EƀEF4If^`Cav9c & F h<<$&`#$/EƀEF4If^`c & F h<<$&`#$/EƀEF4If^`v9c & F h<<$&`#$/EƀEF4If^`c & F h<<$&`#$/EƀEF4If^`'9c & F h<<$&`#$/EƀEF4If^`c & F h<<$&`#$/EƀEF4If^`'t9c & F h<<$&`#$/EƀEF4If^`c & F h<<$&`#$/EƀEF4If^`u456;<=>`abfghi~jO~5jNB*CJOJQJUaJcHdh,fph&B*CJOJQJaJcHdh,fph/jB*CJOJQJUaJcHdh,fph(jB*CJOJQJUaJph(jB*CJOJQJUaJph0JCJOJQJaJ"jB*CJOJQJUaJph(jB*CJOJQJUaJphB*CJOJQJaJph=h9c & F h<<$&`#$/EƀEF4If^`c & F h<<$&`#$/EƀEF4If^`߹'34]^ѺҺ5ɽxsjsjsj[LjsjsjsjsjHhfCJOJQJaJCJOJQJaJcHdhfCJOJQJaJCJaJ5CJOJQJaJCJOJQJaJmH sH  6CJ\]CJOJQJ^JaJ(HhCJKHOJQJ\^JaJ5OJQJ6CJOJQJ]aJB*CJOJQJaJph/jB*CJOJQJUaJcHdh,fph!0JCJOJQJaJcHdh,fh$$Ifl.F a$Q t 6`06    44 laR<<$&`#$/EƀEF4If'34G$$Ifl40  t0644 la $$Ifa$ $If$d8a$$a$$a$d848]^bѺҺֺ|y$$Ifl0 t0644 la$If56;cdht|p$Ify$$Ifl0 t0644 la56cdɻʻ?@rsμϼ78>jklĽɺɯ{*Hh陆CJOJQJaJcHdh,fCJOJQJaJcHdh陆CJOJQJaJcHdh陆Hh陆CJaJHh陆CJOJQJaJHh陆CJOJQJaJHhI&CJaJHhI&CJOJQJaJCJOJQJaJCJaJ+ɻʻλ?@y$$Ifl0 t0644 la$If@Frswμdp4hy$$Ifl0 t0644 la$IfμϼҼ 78>klpllh$Ify$$Ifl0 t0644 lap>?X$y$$Ifl0 t0644 la$IfĽȽѽҽսؽٽ>?cd׾ؾ !56UVԿտ'(45PQnoɺئئئئئ؈ئئئئئئئئئئئئئئئHhCJOJQJaJHh$CJOJQJaJCJaJHh,fCJOJQJaJHh,fCJOJQJaJCJOJQJaJcHdh,fCJOJQJaJHh陆CJOJQJaJHh,fCJOJQJaJ1?Ccdh׾ؾ޾|y$$Ifl0 t0644 la$If !$56:UV[tT$Ify$$Ifl0 t0644 laԿտٿ'(t|\4y$$Ifl0 t0644 la$If(+459PQUnopxvqq$a$$a$y$$Ifl0 t0644 la$If oUVW>?@#$%JKAվդxkHhJ&OJQJaJB*OJQJaJphOJQJaJcHdhꙆ&HhꙆOJQJaJcHdh,fHh1OJQJaJHhfOJQJaJOJQJaJcHdhf5CJOJQJaJ OJQJaJ5OJQJaJ 5OJQJ6CJOJQJ\]CJOJQJ^JaJ&Vnhh$If$$Ifl40pC&y  t03644 la $$Ifa$VW0$Ify$$IflK0pC&y t03644 la l$Ify$$Ifl0pC&y t03644 la?$Ify$$Ifl0pC&y t03644 la?@P$Ify$$Ifl0pC&y t03644 la$%>JK_8` $Ifw$$Ifl0pC&y t03644 la $Ify$$Ifl}0pC&y t03644 laA$Ifw$$Ifl0pC&y t03644 laA~? nopmn%&();7uh[Hh陆OJQJaJOJQJaJcHdh陆HhOJQJaJHhOJQJaJHh陆OJQJaJHh陆OJQJaJOJQJaJcHdh陆5CJOJQJaJ OJQJaJ HhJ&5CJOJQJaJHhJ&OJQJaJHh OJQJaJHhK&OJQJaJ" ~X$Ify$$IflP0pC&y t03644 la~opmn$Ifw$$Ifl0pC&y t03644 la $Ify$$Ifl0pC&y t03644 la%&A();K P$Ifw$$Ifl0pC&y t03644 la$'+deYZ@A jk[뭠듆yly_HhꙆOJQJaJHhOJQJaJHhꙆOJQJaJHhOJQJaJHhꙆOJQJaJHh陆OJQJaJOJQJaJcHdh陆HhOJQJaJHh,fOJQJaJOJQJaJcHdh,f5CJOJQJaJ OJQJaJHh%OJQJaJ%KdewY7G$EƀfIfy$$Ifl0pC&y t03644 la$IfYZl@ATP$Ifw$$Ifl0pC&y t03644 la$Ify$$Ifl\0pC&y t03644 la$Ify$$Ifl0pC&y t03644 la$Ify$$Ifl0pC&y t03644 la8$Ify$$Ifl0pC&y t03644 la rs?@W 4 $Ify$$Ifl0pC&y t03644 lars>?@26@<=_`78XY|Ƕ뫠{naaOJQJaJcHdh陆HhƜfOJQJaJOJQJaJcHdhƜfOJQJaJcHdhfHhOJQJHhfOJQJHh fOJQJ 5CJOJQJaJcHdhfOJQJaJcHdhf5CJOJQJaJOJQJaJcHdhꙆ OJQJaJHhꙆOJQJaJ%W Dy$$Ifl0pC&y t03644 la$If<$Ify$$Ifld0pC&y t03644 la<=T_$Ify$$Ifl$0pC&y t03644 la_`g7`$Ify$$Ifl0pC&y t03644 la78UX$Ify$$Ifl0pC&y t03644 laXY^$Ify$$Ifl0pC&y t03644 la&Sst 234GH3467CþóypbpjCJOJQJU0JCJOJQJjCCJOJQJUjCJOJQJU CJOJQJ5CJOJQJaJ5CJOJQJ5OJQJaJ6CJOJQJ\] jUCJOJQJ^JaJ 5OJQJ5CJOJQJaJOJQJaJcHdh陆 OJQJaJHh陆OJQJaJ" zuuuuuuuu$a$$a$y$$Ifl0pC&y t03644 la  !"#$%&Sst $$Ifa$$a$$a$=`7$If$$Ifl4\ (h 3Et  t(044 la $$Ifa$J6T T$$Ifl\ (h 3Et t044 la$If $$Ifa$ Cwyz{opCDEVW 򱤱}tgZHhꙆCJOJQJCJOJQJcHdhꙆ0JCJOJQJjCJOJQJU5CJOJQJaJ0JCJOJQJcHdh&CJOJQJcHdh&"jCJOJQJUcHdh&Hh&0JCJOJQJjCJOJQJUjCJOJQJU CJOJQJHh&CJOJQJY$T$$Ifl\ (h 3Et t044 la$If $$Ifa$ !"OPOPQuvwxֱֿ֣̖|oo։ajCJOJQJUHh,fCJOJQJHhUT&CJOJQJHhTT&CJOJQJHh,fCJOJQJjCJOJQJUjCJOJQJUCJOJQJcHdhf5CJOJQJaJ CJOJQJ0JCJOJQJjCJOJQJUjCJOJQJU&$OPwx]TT]<T $$Ifa$$$Ifl\ (h 3Et t044 la$If Lga$IfL$$C$EƀTT&Ifa$L$$C$Eƀ,fIfa$0123HIKL ghu|}ƹƗvooaXoNoAoAHh,fCJOJQJ5CJOJQJaJ0JCJOJQJjFCJOJQJU CJOJQJ Hh,f5CJOJQJaJHh,fOJQJOJQJHh,fCJOJQJ(joCJOJQJUcHdh,fCJOJQJcHdh,f"jCJOJQJUcHdh,fHhTT&CJOJQJjCJOJQJUHhTT&0JCJOJQJ ghc]TT]c]TT $$Ifa$$If$$Ifl\ (h 3Et t044 la LM>?ijkklӼ޲ޤӼ޲ޖӼމwjw[w0JCJOJQJcHdhFCJOJQJcHdhF"jCJOJQJUcHdhFB*CJOJPJQJphjCJOJQJUjCJOJQJU5CJOJQJaJ0JCJOJQJjCJOJQJUjCJOJQJU CJOJQJHh,fCJOJQJCJOJQJcHdh,f#LMwz.]TT],T $$Ifa$$$Ifl\ (h 3Et t044 la$If .0TRRRI$a$$$Ifl\ (h 3Et t044 la$If $$Ifa$0P[n3479:<Qce 68SUjluιιΙβββxHh陆 *OJQJaJ6OJQJaJ *6OJQJaJ *5OJQJaJ *OJQJaJcHdhf OJQJaJ *OJQJaJ5B*OJQJaJph5OJQJaJ6CJOJQJ\]aJCJOJQJ^JaJ CJOJQJ5CJOJQJaJ,0P[mndvv $$Ifa$o$$IfTl    #  t 0    644 la$If$a$$a$@$Ify$$IfTl    0$#   t0    644 la$Ify$$IfTl    0$#   t0    644 la$Ify$$IfTl    0$#   t0    644 lad$Ify$$IfTl    0$#   t0    644 la45h|v$If $$Ifa$y$$IfTl    0$#     t0    644 la5678 |v$If $$Ifa$y$$IfTl    0$#   t0    644 la89:; |v$If $$Ifa$y$$IfTl    0$#   t0    644 la;<PT$Ify$$IfTl    0$#    t0    644 laPQcdPu $A$If^Aa$ $O$If]Oa$o$$IfTl    #    t 0    644 lader $A$If^Aa$$Ify$$IfTl    0$#   t0    644 la n$$If^`a$$Ify$$IfTl    0$#   t0    644 la 678STUjklrtr\rr0 $A$If^Aa$$Ify$$IfTl    0$#   t0    644 la uvy_bz}ӲreR%5B*OJQJaJcHdhfph5B*OJQJaJphHh陆OJQJaJHh陆 *OJQJaJHhI& *OJQJaJ)Hh陆 *OJQJaJcHdhI&Hh陆 *OJQJaJ *5OJQJaJ5OJQJaJ OJQJaJ *OJQJaJHhf *OJQJaJ *OJQJaJcHdhfri $$Ifa$y$$IfTl    0$#     t0    644 la $A$If^Aa$$If`ar $A$If^Aa$$Ify$$IfTl    0$#   t0    644 laab{|}l{n{n{n $A$If^Aa$ & F($Ify$$IfTl    0$#   t0    644 la gZ $A$If^Aa$Mh$C$Eƀ陆If^hK & F($EƀEFIf $Ify$$IfTl    0$#   t0    644 la !UXnoq !#=CNORfzŻ߳ųų}x̳e̻%5B*OJQJaJcHdhfphOJQJ *5OJQJaJHhf *OJQJaJ *OJQJaJcHdhf *5B*OJQJaJph *OJQJaJ *6OJQJaJ OJQJaJ5OJQJaJB*OJQJaJph5B*OJQJaJph%Hhf5B*OJQJaJph'  Pu $A$If^Aa$ $O$If]Oa$o$$IfTl    #    t 0    644 la !VWv $$Ifa$$Ify$$IfTl    0$#   t0    644 laWXopd}t $$Ifa$$If{$$IfTl    0$#     t0    644 lapql}t}t $$Ifa$$If{$$IfTl    0$#     t0    644 lahzz $$Ifa${$$IfTl    0$#       t0    644 la zz $$Ifa${$$IfTl    0$#     t0    644 la}w$If !{$$IfTl    0$#     t0    644 laPw $$Ifa$ $$If]a$q$$IfTl    #      t 0    644 la!"}t $$Ifa$$If{$$IfTl    0$#     t0    644 la"#;<hzz $$Ifa${$$IfTl    0$#       t0    644 la<=>? }t $$Ifa$$If{$$IfTl    0$#     t0    644 la?@ABCe }t} $$Ifa$$If{$$IfTl    0$#     t0    644 laefxyPw $$Ifa$ $$If]a$q$$IfTl    s#      t 0    644 layz}t $$Ifa$$If{$$IfTl    0$#     t0    644 la}t $$Ifa$$If{$$IfTl    0$#     t0    644 la.=@MPkmnpqrstuPQUƿ|qf[Hh씚FOJQJHhFOJQJHh攚FOJQJ"Hh䔚FOJQJcHdhfHhfOJQJHh,OJQJHh䔚FOJQJHh㔚FOJQJOJQJ HhߔFjHhߔF0J2U CJOJQJ5B*OJQJaJph5OJQJaJ OJQJaJ *OJQJaJhzz $$Ifa${$$IfTl    0$#       t0    644 la zz $$Ifa${$$IfTl    0$#     t0    644 la zz $$Ifa${$$IfTl    0$#     t0    644 laX}$If{$$IfTl    0$#       t0    644 la,-Pw $$Ifa$ $$If]a$q$$IfTl    #     t 0    644 la-.>?H}t $$Ifa$$If{$$IfTl    0$#     t0    644 la?@NO@}t $$Ifa$$If{$$IfTl    0$#     t0    644 laOPhihzz $$Ifa${$$IfTl    0$#       t0    644 laijkl zz $$Ifa${$$IfTl    0$#     t0    644 lalmno zz $$Ifa${$$IfTl    0$#     t0    644 laopqr~|z|||||||||1$a${$$IfTl    0$#       t0    644 la UVW1?@NOZtx׽|n|nncccXOJQJcHdh,fHhfOJQJj0J5OJQJU\0J5OJQJ\0J5OJQJ\mHnHu%j0J5OJQJUW'\)Hh0J5OJQJW'\2jHh0J5OJQJUW'\5OJQJ\ jUHh씚FOJQJOJQJHhFOJQJ"\]^`abcde?@ $  $ &dP &dPx017ΫΕ䉕|tZE)Hh0J5OJQJW'\2jHh0J5OJQJUW'\5OJQJ\Hh,f0JOJQJjQOJQJUjOJQJU0JOJQJcHdh,f$jOJQJUcHdh,fjOJQJUcHdh,fOJQJcHdh,fHh,fOJQJOJQJOJQJcHdh,fHh,fOJQJ78:;?@JKMN\e!",-/0?Bùݫݫݫݫ5OJQJ\mHnHuj5OJQJU\5OJQJ\j0J5OJQJU\0J5OJQJ\2jHh0J5OJQJUW'\0J5OJQJ\mHnHu%j0J5OJQJUW'\5@ABg$a$ B CJOJQJ5CJ$OJQJ5CJOJQJ^JaJ/ 0&P1F/R / =!"#$%/ 0&P1F/R / =!"#$%2 0 0&P1F/R / =!"#$%/ 0&P1F/R / =!"#$%/ 0&P1F/R / =!"#$%2 0&P1F0/R = /!"#$%2 0&P1F0/R = /!"#$%/ 0&P1F/R / =!"#$%@=_9YؗhNǀ 0MM'/-x= |osߛd7MH";@r#x$"YXZQkЖˣ_XU f̛&$o߇ m5 4&|Bre!w"B<)q)q %\pm7B^m#ܪa܀TB@s:HlgB|-1o@g-#i~=k}ۥpy6FW}1ŵsqķ }Fݤ8r#{O6MfQ mZI;sExxb8B Sη؛W^ԗqf@-prAZ ۮax$1oNV¶Ol EZ97 i) ms;TRmL,: }WQ׶oxo\xN:=j_o> 670ި`kS xd:pxwnowfFSļ1mci8}afX*m Fߺu7#+ȦYYg|g+[u׸:0 sjc}x-ee!2'71GǮBӾv}l~1X,!%~?´MU ܲE?> pH>S]?qa~/یZ*kfV."wQN}_E7L$8pE 1xgV^]<8-ñ];\׷szoxWn{د}C\>>d!gjQc|U'ӂOQ 8LC/ñ7oOh5w`Հw#!S:)ocpRm R?ɺ#I>!u/IՉ0I:{+xt.Q=q02-9ՏnnpWXWxwV#\y|×A[|.>4\,FXI+BToI%Bi7^= r!l/+#'.:JDzK_ٻ~E(-]N1|'2\2p$e|JJyo})ʴ΁~Blg QOt1j8u $~b@n @'"&ZhMbpk=x+ඌ[V(NgkiN=pt8/̀;e8=:{8XS2MpϽTLDNg.UNg$kW2Wû·FKGWean({<.. cnt6NBޙs_tv(|#Rr?p?d7;.9lQyEX$wbo)/4,M;=Vئ)} Muq<&]Ҹak GyzlkHq_EFit5 .K:ØS hJW/|^Q2 ^۫_N: ŰL8_8@~CLev{?3 |?oդS;וX^NuZGoA<P,rFra>rh#}nI` g|y|$a;H'{~>wj<+l.gdU^,QgyKTSyZ"^:J:thVCawkKVisx$;qyIޟ/)e%?8 ado)[[zؼ%W p*Vq^>^ s,ϡCbW+#po y;q{<Oڣy{ྲྀ:DžU l!ִ^wK?c(E8$Tr-Xn53%Ȭ,r񪔴cob:Je+`Jៃ9a8Nfwߜq09LO(M wxYnl]ÿbSG4`E~Jz`aN2z.vlc[ž( .Feo_u[ƞnog ޤ{OЌoh ( Wz}t\O%hkϧ^,|qe9[3)Ĭ2~$Zx8M fjcz$;gѹnEUi'R/Æ|/bߓ}/H8 Q΃k qq"]8^_gG] v6/pgdlͯyK18Gz|CX8`l}hplOIHrtv [lpMxx_iiMbT_*~c;y52Uf#Ʊ6vưjlI3aݤM4Fp(#Vn-‹={{2| 1ǡgg cx-D*J6g9F.Z~y_/3wj?A?Ssy:r6wZ8! 0_X.<=8xhSa,ݏe#ffy咫x]C0U rY~ٮsy>p?aLØA~ɞsTݴ,RMM'[#&B8{agK*/ _q5QNu6gqٸ 5vVMq:fyϫow[N>n[ql9e ޯKwlNQ͆tF9'AgNu6s2l\EwK >Mr;<ʛgfu6g-w'-v6ۣ7A[~u6=ҩ9=ïhҩΦ>#\M70l䵉=l5-*u635$M7W٧rX(ܷNg݄uͷnGXg3[73t6W@ PѺ8kRmx]==/NZۖG:Zy.7=~McfokNd ͠?׼6[z9{W:f]uo+4a0´n!0#al_38DgP=+Fxz֞!Yz6Rk7‹_ZQg̠z֚ gݰ2zgXsqgžD1Yg8Fu\pq*!AmXz)^rLo3 ][e=kITY/aLޅ <%,9,z^&YK|kWkM0C8FӚkWB԰P۫/yɝTϺΥg23ŋ}{`EYԳ a_/ͥD},Y0{`NA-ӳ*#Ye:z>BSoyH<` LD<4tS\6{c )a,Qpٳ?occïۨb]x}5$嵉k|xڿ&F[C2ݔq3/MYnMEܺYhpк&Yc c{V22Ѵf'{_`㻰BԳV lmͰvNj='Y}> gk/,z0WK:~: ٰCԳҜw٤\ֳ@ PSg?)jnԟ5{Y{J9Y8_nԟ5ߟ5mӃ7,aFX6Azo 66v QzK7ϚϪ5Ѵ&}Ak!׆[ ƫU;(8q:NqN}`߮5e?~<||}9!Nr{>\ڬ8z<7?K?x2 +/%`y'R4eK% *ඕ5n|oBОzU8&8?3W8d^^^ճ^XE*>+Ufp`8}#K?XS%HhgH|ɰ$8 _hǑ1ߨUs}Gs*Ǹ.g sN}~xCT›(i= sn񴻓}ûs9hT9ف^և7Ԫjyq0"ؗs1y:**">!s!ui{)g. oֿ10 η*L\}'Lx YSlET|ciiw7 $ߴ?WOxt˾ kky>]^;DPn=q*kkY^;(0n}?<3VkS#ϐ/p|QI|x"-:eVnTG86*aSxBɍ*߇9,=~Q'%8dz1CYqp ?C-m@7~듄Ԭ:="/s6iD8=z$fr ݝN =_eU~+|ܨG1<)747*ύ 2ПV,谠qe|,06L Ƃj n Пb0.'r2pMX,"m\RYFd,Y!,\ srX,rNMf5pNjiq1#٤Q~G <0mz&G|Fad:h >U08N- 3_mB|FvIhkW1} gzx'Š 1f,Vsq%K?ŞtVᆱE l fK5,Q6۶:V;^N:}kqGW7q8ޢ]]d(]u?l/Ο?g9}犑zC?HO3sx0: zAp/\Qvuߺx>[)7TZo{nt? ~Ɠ}׍j^ [YkyU9Q3vx8wyg`FK4!f/IrᘮNcL)Ok@W⬋Øo~Tע?.j9| gn\"=7\&iϘ@-,kt$DJV%ilMdkXSCG3ɏåIB=%:ٰ~zzD}y+dRt=q~n;/f;5o|#ׅ>ryN3cdp߮HK)}x{mDy=4> J'_ޓR=[jrtkNbۓM)>:L"ێcZA0cL) F=< 8u11VǹRŹ7OiT39s>(gqh$,dFYVŹwg?.A{N$3a>gÄLl sci`6e\ 4rYChmGqtbM!.>] _Fa ﳂCe _j|Gт/|OO-^C9`+T7ɶv 'K EP,wRdtz ,-*y#nʓߙf3L0y̏\F-'KOnyZwK}黻(ȋyIwqy"5<ًnʓ]ϓZ=e) cf:.MRj G'{My+y2#cM?6frWC&ǧܐՐy9D2MN4/!=Dڃ*~hM4*i:tN#鯔:UI[rU:\3g@zUiit3跽J)izstr /9~^,W"yV/g/ջ HsH_P^lZ+dQc^K(~yWqN sv(I?OcIsIߵ{!?i%r?{u/I\Xw91jGu7!?oIdkGźiPM?6NolV5McË&\J<,M16N>_ݢNpn tS8:m[gaº[7="nN<U5G _NbI,wzw žA^=ކ齥+y*}!ui-׆5dzژ!靖;땊^к&Yc6lNy- 7(ĘWNaSby潈D_DwyhVzEښ`08'ܘc^{i?;c^{濘D_n*%GLh9.Z'9WuK4$IIXuw:O:ӞaJ] SXjķFJId$uqqu51M &/{7,>L-˗~>uy۶}ZזG:Z>>7e$hc'`BlB`^3^6>8sJF8f:7+&:8>?o9Cc@kck6bc{BWeيqpRm1O#ҺŞ4}|0PaOCB<+ӽĤhfԺd_\&ui6cњ;5nbs݀@dmYK(>+9C#o!WMԵ\{Lu\>WƝ Վ[Kk8b>k8\5^^W%k8>Ғ'o  g%` "%k8nLdƴΜ n_ڒiڒՆ+%c(X#tpe,%"Z!p^j8*!lv5/Q7Sñ%ЗIL̮tmYDu GWo;P[czkgǚ[d"<Kk>ޖxE pzqd_ 0d>5s"#E|b41)k 5JXs1ޤ*++#:NNgV賲Sqlxͻ“M .i@6%dSlʏ/V(h8h+dRm]TjX 2EA)GQaE̗ⷚ Z{#~\ ׃cy-\v @/.`ս5ϲ3^Ez_়n5/0PyD /px^/{x x u 44Wa8\l JTvgע1+$| rupl^ƕqU$ΐ\w(CAN5Q\w%D\C|Ww̬wS=ⴃ ߝ໯՚"]3wxX{&;{MA/J|pKߛ%qp X45N>V؞2D/@A XS{|5=U}.XQƧáU6z\O_}=\v͛}p@¾aMzCq9jwSh}-Ax^ݼ9΂{6]>AB*5L Kk%ol8Lkݙ'>=uƴk :\ߧ0}k>J}CITeOyS-9p@c@H/EOz:|/1C15xᶷAa7}yDܷ5Lyy{/qw6Lܧ_'tx8y{ 2Wa-X%_ M#:`$DP~xP-Cy&xjk.[}K}K@~}%{;N(swܼ/z"}HuS^`[ 5dkMV^i/Ny}Ky+b[[2o +5]oI^oI8W[&-iܫ[Q]w {ݪKߝwx,~ |go =]l-Sݷq߹:zHAnQ+ 1Zp_K ^i7go pYX>Gݷ.ߒt&=&= |oiwaŷ[i][bo=FR)WMW-:Ju-ll3CQ^A;oi#2!qJ9"їi0W9,yr 3XΑ9ۯSig29+"\)u %> 7gJWL~YO47Ls l_xninQ`{?WEqJfs)33JȹFF`'se &;s!Js= >]8ǫcW.׉ȶ? dLuP|aBdؒn}hebGRhΰ)axX0ǹ G+a6Į$ bW]W~tR6:gtA.B릮Yl"`=HZ&[#i%%'t\ ytܰ}#rq<[-ѬVi~Q^P=NZX.xFSm2)1\97'Vm *^l@1 ƘW 󈯭kF#쯁^L^.ר3lW(,å>E5{ԜBjƹ)=ípcFo)r@w]벛VS6/?k,JB/ǰRS%oy4W|`w&y7]azDg4lMٚFl̳xkx{~̆ |I. fQDZPZ#I~GpqPq)cd6Z^=xى Q㵲9zc&9exis%^C.61=iYa/QU+x.KQgQay8,#6zpXz'as(N6v`<6f x͖Þd8l8E.AI*̖[%^Z4H?5}ϻWvbIp`X=dk r;C(c X汎!g6||b?!\T!ǒ&SHbgl,I'Ʃrx_;ʰp!~7}L!C|CϏB5b<<>DX'@ڠqP>7n` >WX륎4pu)X/\,K0Ʒfd}JVH,Gcu^}ph8:jMDay۵&[ _SER,f+"4wB_ y b:QoLZl4;aoOG_$@j2CZKakD(%eZk\SyTr6RYJZc%m@b?aC쟐k?咎Z{w\')X&7S"O_ tN PvzAHML:Gkْ<79O-ύX&` \@[g<'H=33%O.|fh?%>yBPH+scvj)'gʼnpj\գ21gpg~] U-Ǐ1ősUcDZkņff,`XC|Ƚ/W`_,Π(9bq\yLE1 3AiY3r1 v,BsU˾!AΙKڐm _Tbc6+bjShNuj#!&URLÒi@+4X'5ʓ88Cj[A|ei8{k75;qgV㗊C1 䘆X4t|o="[:0JthC9n$6X"qZ{Gxk_WL)1 FD^sv"w׊sxmn>]h?vn~]5^sw4;q 8,ᰡ9],ar:oiNovݼ1 =?pز~3hk; [SumM~? x6XycvڠqP>W+z1 &N%،U]1 \LCu` R+ApA=[upu0?Mi ]1 ?!Ԙ= 0Yo+\ 7kP1 /Ww^d%ALCg\*ύSs 4]-w:uvsf4 .8p<5RL?Ϻ1  êt 5NH"?Kؓ>HH }Hz|YcNS#I뷷FFR _A Vj"8H,W]# a$=^?fǬ~ Bl0`%nM>e]B z WY®K(by_m3_"^ɕE/_ZuɓÆ_jY$+/dKR.ZԙOf_fPa̗-D] iYY۹Kx՝ZoϷ7mkzl5Aq[Yk;M΢~v2/ߞɵn!?í 32?r{털RYi{VWmhL\Uӡlum'<בk;Ui%.zlM-LMd~#=ۇ"Hw ܔVb=6{tXͅ{BOFmtmih$af<*;D0?W3*tXq\IeNXC.$T){0,|}׬Ͻ\偄N(6ĝnJ/}43a4ka/b/2C:kY2 xIoKk= @S# dyasw4wQ̐ Q oqr+;|Z5]hƴb9~h7Cc?ZA~ʏޞGo206t{φ0 ¼Gl &($1~,Jhw EQ7gqJt+}:%-bv |dGa|/fC 7~[GsUGa;WcX~?\Z|.,ӳ$&3Y >=Cs-? qcZ-Ղ7Tıbv6&YYZ>𹥎ros\8-W_jV2̗Vl5Zµ3gڇeL_A tNE9n]&xa(0R0E}5Qj,0Gk)硳 Z- 'k克}GAfk>%:SNڐ oIbcJ+|ɢok]U(j^wvKGA$7XQak9[]υVh~|{Gw7 MuS;խc;X-@bMپCݴ64.{|59_~uĊ\|5>!W7`n(6y}D| ^}昴񟿅HWBȏʾZ' ޛECr|7E ?z0. $?ؘO {)mQ+,'T'wV|#0X\tD/wޟ2YY_Z>ޛ!gpQuz}tޟrQz ZQlZJ>ܵ䬡p ~x`-nォSct5}kb}~c]{w6 Ն|Iׁ^f…fepqa.27GHY0KiF.($OtP{1ʾY# 5Q?UGu-yjゼe``{=nپ+z=k0G,ڝCp_V&!Ӷm?lbO|G|諕Oa\JV+ᥣ<ĤR+,Z9tZ9_kM|)ֹ:7ܐxh;<'~~OVbm}bun:7{ɤs:p:7#Ì+-+bc(_4}s3GFFQ\ѯh unH'ҁv ߋ8㦕2LH(,Fzehs#A =ɫ4GAZUKat-ܶ 3RKFd9~cD$.r"某ʉɓO?I'+ 'l#+Oxɉ?ʑħ<>p”r!|(''290rb "oRgqq%}ؽ:|~dD} oLױ2/^Ss]5BJtP` 翑TV\ cnbMZY!98]`YcMkk\.N6E_u8W(԰1\3ӻNz.&.5x]IG&֛ ÷0&aL~ cFk[>f@cNk#1lS[a8~x<ǿcք>RxϳF\TH}n*QH97ީ ϔb$\ڋWXl)vWr;w]#_-OYz?=sN{czrTcxaچX-ߠ?՗0?_:2#/ņz0Ib=9Cߺۯ*uS%biO?fO4sX!DOfO3ña"A͖ X]#p=*F<= G9+sSi(O;?|+󽪈B{P{^VG:G{utFt2#7V^ ?J{?nUE6: ,{,Q^]ࢂWb~rW'w[Z[ 9C6ـ<c@1هk7@l<9!mEj. yn5A.6IThd$zD@%\4^I(q,d$S S:?]-!|.]3'0(o]-`#VRd;m\_q6=X-)͋}9<ռVԃ~=>7g}.=I} ˭r`LB~~Ϩ=3 6/6~\}nrm}.=c_q&G>EmΑБy1on`:-{3eP,JykWݫ l߳Fg#~VZ i,s+{:SYCi]-Ξo :ً-RO;:N !:'JV^NK۫i qV^}VBAu*ɺ}5F ӧ 5[G]w=KeNiri˭"{hNFEzxxaV;uZD !hq ڝoq-t6okM'<D?-3dؤ~J({< saϽOO͙@ǒ3F1Kk}=Gpf02Odmal3ӆK0{Dw[}aiT?LʣԐyr5l.F:rƓu 7Ǡfnfc{]O:4&|hvaio(>o'OF Ο@?;Uh6Γ9T0@BUR֣AhW mqs5|{8e_ߓBG9d}Ϫ=^jˮJJ }>I_gm_`І2^$[s3%jFV=%]?,Q48_^}:fM| > ޝLȵܐ%H^~;ur5;;|J4D^é#+ n #E¯#+Pi?Q:*2\A~h-77vp p8s}3^Ù^GHH=HI_^.WCR,qSucq_䧐5%DPfIq pC+>5PsȬf<&g 8W.07y>yK0d@k5X+le<+Sy8>xjYbYuGlK!&op3h#`ϭwʪ.9*x0Lޭ=jMwf!hP%HAIZPJêrPڃ{v6FA,q"2,ǭQ˵{2""q^hr !r, _pXӆKM.z:Q"EyD/Wx*nXqRvs_ϐfJ=S/*6 ~_>cʈQ~xLM’O(}mR,|7-1Q}IyL5_1x}/f f ['x{yL59E3oWK2-Xaf0W՞)~@ih̍|oc,'A?w)0@—)cٵǩ dg x=O:N4K)j")ڛRms$.A%_J 6W<\mEZK$U|)Z>W8"l&DWNh8^Vz2]hJ)o|/ij7=ئk5˱DS,*)nHwUw,g|p=욣3}q\#CL칑(xOwUZNWisY{Wb-jR? tV߮te>2KVy0Lc}ؕaσ59 $-N/O'.^[o}[ŴGk5C.!sf!ӏcmCGmI G7yȀ|]5octNίKjCKW7[#)E9xp9-#>Ǥ]ATm߿iAi͟qşLau*bB͗"C9Cy˰c3Usl{ȩ72ϟA | ]jTT;}dy2'vEp ΞCbF]jh5eU ۪%,7D(.g.b_^뱍`<+fE=sQڳuIlA`~@vΩ d3np!4q>OϏ9PL}HI2N&ks2P"iT7mA>%&ߒw-d|_820}x20>w-E~;$Aw {w*S-Drl..ޱzj-߅2EdbJ<JϯC) ]fFZi< l!ִ^wK?c׸ΧR 'pM*ՙ\8OWܕu% 7d >oG]c]#o:&o+xԖSG,qppϾG_>^_(ꘔ׉tnnZ]n0;Gkc /O$c#$c#RuNMNXx +v y2 =?_% VX8!3XܚLkqa{` I,Q=K1Rk5rYᛵ<&Cgi݌ڬu5h:l_p=5_-ږq_JKQX6~lXhTDiݻzlk5ՋmL #HN0Z7"]MwhZw jnZ?\)cpp,Ƒj\ӳu,M SL쯱p G o3:GhW 0"ߍz:}֓I2DE0*VK<\vZlcK^]Ł&iȚ"HS/CM{v؜ [m[wgv.2aTf>O"ׅCw(YMgDkEN"N'qI A %|Q2{LQza\y8]nGϗ'dc˅';ssr ?9X~gg+`,clbX8IFW%&Ӳ \'mp=O5=P=J% |\&GfP|\SǝX|\=9U{wo3(D,sq >Of@Z`eSx\a3PA,ҏ>VӼ9 kbBG4~s|oeU>Y%\.qnB1;zRZy7e=J=FU/1"ZF~MX~yUp=vm_"ٜ"ޯWXC![RB}kKԾxΘom^[A{vPy2e%ԷGڷv{^O Vǰ:,“>d|gWڂKmYᶟk_}Q]Q'3}њ ۔>x,|,{TYF>ije%|=u"t"hRU+|JTy肋y+t}?;}w},wo28X=)-]]{kX p a`5Ir^}+V3?gLU9c^9{տb[_%`Vd;)SNMKl8>u頃 ߢ>x}ӂp[UŨ,r|E0S0~M:2 ;1VyĘ_\_= ϓM0ӭ,N7M<:4P켹ğ%G(SN\-:u[b d o#{0oZsG)\9| AS N~ܒ_fY%IK$BY+Qrr Z+*mf&ՂrP{Ig﷓)e/Ue9N'j{5"Usyx'ؽ׶oo#o>.w7m@ b#ad6N4$ @s%k#!G y<㙶<]{yx@j{'[sR81 /pq) {J?AcBNr |ˆ ghj6JҶ^l#=klr. Er\E0qpUpb ɨqU>a82Q[Y"* |,3U0+pVFy8+AqG$q…G'ƻN_2DBg`%%6{o*\)7 b[s l y+Á?Gv񅎝-{OAۅVʨOe}z-xn|Egd9 j~;}f+<D}fXΨ薺ڨlaC*m~|ÈRR*\[a~Z=c8i2-a2m>L;y_LK4d5 ?.FmL{:1fN$>_uu@oA^%rqsJT]-*)9S&5]"2&l!SDK<IjrxR)? JQ)jV^iΫ9yOHF|IZ3˨nnd=^-l:9Wޙvo}{A.I8}wʄ~}klCsnBvkmZrǪmmwȎ]oÍw1qw54r9Ho b˸pM;\xk n;P2nm,رM`E}ظc@y[%P_Fz 8q&fWaҰ|['զV1{w31~6VeӒjcG~W*:R}qtDZoC|>UbXOKkx6h~Z,Óp,r™~ߜpD dysw@a(`0ñ>p(3l-' ;lWOQ6f3? 'F=٬f.gp'j]+' Doo gHT㬌bԈ+,<v"^z |RAget?Cg} [ʵG7ӌb9g%|z #3ۧ0--eԴ"O~2\Y<^nڜ)O9$ISV$u,R9D -mD|XCԸ"4ټe'.OxO\?+x`py·<LzK?E߶S;s ܡ?G𹷃?Í寎SӉ(gb160u1;eGW[+Bk@}~W㹟%thZӥ '3pb.…~,$s[s1hm*VuqL]+o'=c1O(ɧdzst)cZs`|w@0:=TݖyeEp ߛϛ6JTv9i4%I:՞+]BYZIÕ.̭;u߸5Htw)Znٮrr`~:~2J7.-K~(IMG%uh=TߕIo>3I.w˭E pQ>ok-WNn}7ǂSF5>a1KĢݭSgE,>geMEC;B` _/wCKh&{ZcTc uR)|KXiKAw8?UAh % s\1uJM6,ߟB+K҂m)XoOeDgi4Hukm?$Ɵ߉ƈ{1⮉.ǟLjgh4٬g(XnfY07{3mS'x}/,Egi5i3|~ɮ?}CM,"9e5 2v uص*6Y6صձk\ƳU+`saQ\kgǏϫXIqwX+&qwb۶Ƕ]k<$>KF1x: al[ 0~DQY#yz$Hֽ&fݣHHGj]ne=O܃ܶWb_N|y:K]]xF7+[0fM/_q/Z[*ϷHwR C+̠ue[א+-غM\&Sbf:;&dkO(w&6~-_?iS-n펭K@I(o4ΓAc]^sc5+Ć7ua9űul ޛ%m:/.S3N{b뺅[w27[p bD]mP-tn(`lݝ:fؑj6Ӈ n[kVֵecE"yi=a@wgF/yᾞjܗxw2#wB8+l^%Ƨ)q_Vm4O+mԋ `pѶuY:v*cf-.昽cv7#celrO:UyO^6l m]|+-2}Z4י}D2燴I³̩kn> 5zd h %9i<t.#ןnD<αNcEkl)LՓQac(g=~]9.}gcD+bԞfrelK$^tzw!e=7,]3axbLlf(k0V嚹 6zɫ96B3Q3wۅ17,PQ5U,wʵsG]>lv}w& tOk Xm78b+L.2Ja¶1d&zN^4:- *(4'h(CF %Ơl } >hgk]:ξ`.:ᧅ?pr6"X ;LHNu—iKaþK}WHiC5 e] w]K5ڛ氕;B,St&;.6?4~pSL51껦ap ֵwuNC2*l쟆uhۡ.ܡ+#fCw̖Tc^s1ja9nyZHSp#mD<α=FƦ;6ܡ6;¸BQ?txFHYD>ͱQdTc#l;|MQ5Weܬ%wȊ;,Զ͸CƸûgwDm*lcwWw w8ϹB &J?r NFc>sn5 7Ч2^~{gux߫б??\=l~eFƪM?$Lo|njC]LRGVDǵeXꪞa=A,[&AruQZKbb a%Iij'}Z8X~MQ!jNY&s_?j'x~f8'9u!̶*fc -lY-F1YZBSx=/z@5mP汜~giugk|ujI|?nsJm;= #+^)2VEs9X}_Қ9D[zhKM|ɓ6d/B,?W}IO)WyKC)/ =|7F_LuCl)A?E?R~%=䦚釋džڬ7f½}uļ*w\wÌL|lj-߹K?}>;f<orl>GK`sFԾY~86bH!>'ϋKtRdm`3cf/j'7mf棘RH#w@vQ(9M(8lyq iN5_x4^h&L0inlzcsa}~9Iwiwqe m66m†m?_¥ơ]ÆCumpkVО808g;"594簓>4834pqߘw&>X@05jy5儼r>諅?[Qqh57ܿƓ!O887~7UF]<,Pn^ sSns@m0]Fl 'm|I? |I=e%/Àї2ͩ<~#YIEχ$)a?QU1jnk~Cvpolw7{=E!jP;u~f7TC _$k]>OmfjpOܙ-ŏn-^-Z,VTϝyyؽeʝِ`yؓ c6ƪ-[7 {mO%X<)nv^ݴfXsyIO;sj6ʼnf-.́b|S'^aSRr;}xXCcYp6_T^ç$nv|Ic>6Ɛơ>HXvzUOx;`k[W}5l p_ V*lM[o*[X[6[lfzJoaE.q枌ek=އw2ezuo@\qVS*; ꪈX;@vc-r2bc ]ĺ;#uη0%Ɍ`z8%ankD۪,z lr2'ʞw;rҹ[^߲&vl?oр'~g9Wҹ [^vl:e_2O` ͽfs:98(BSF^^ cΟVj!ϏX;6Ҽy,Ͳ¿?f40cט5KmՏXZ5]FlEa`\XT֑ZVci[Pic|XX&6ciՎJskLʘD~kWXY* ּ)0x<]E:vը7p.jyoH1e+ω|]V^HElBo@.=w@4k++~+OfwW 1_'Vu1W~WHD8]Dh yU~:\Ưqz{Dd++d  c 2AEdseal"`b-{?[ 9/ٕSb {D}n{?[ 9/ٕSbPNG  IHDR7x@gAMAPLTEٟ IDATxouثWl ٴtL_pBE()PhڢR ^q QU4Q96 $6pF+p";0$TbI{g;f<wljdmmW޿陝;)p;]{^(U7oRߤI}&{jT_ HUua_U_ڪ+P ?j3 U.c}-}M/K-gP>R,jԙM:Q4u_u^S}Q g?\ Z_|_}4~];\}r}PqhiR^hBL MExqj9x.^:wV>o05tp]ף׻ɏⅩӍiJf͠~xQj5=5AƾT;T~VjRk=8ۇXZbuWhR Ն4InuRjI~m!p/FmzWKZl~;T^ZZ~)KIvṳv#VU:sEqxԶ:[f0Ksa M׆2qUΝU/[捡q0v bTGo]p`6݄@j*4TEը"*+j &PA+ZjS PkVW RpOuce *tZ 4)\\K(Bjc„ֳZjC9uΦEzݛF-$jMQ8Z:TfݛZك-v'((]{HEArU7zxQTTדIk3NZ=uoP퐚vOj)zu T[^35 +W~zT5{뉽GUԖ/m{Q GjZNPSsm8EdX@ *UnOqڋZrQ1H-CamhR,*&')N{Pr̠fZf= kC? 5'' kVR䃩|Qsij)#H>^GP=Q۽ijTn+Ԛ!N.^SmPCS2 uZ]ңGl|I5R+)2̠]ŗD-ڨ DiV؛J7J*cPRMj/Ns- 68suHPc;ͥ6,dX :R;׃\*{p"5Q-[LEcNK-y,6c͐ Ry@\*Rg|tS :5a*;\8ڊbtZA=HH^2B{=PE^wTi}TӉI57IeьԄ.4~ ե'i96}*7.-s.ST!0!CGi`Z h3(]DM(6'fSeX T^, Ү3ZoP͞:3QZ^oԸx*MR8nBem6PidԙIè1ԲńU!–4e;cl!IZɉ*ӰJ*I |qjIEfj+MhT}vy̩3jU|LPoOͥwfNT]z%!rD ?vԙEGS+ʏ̲GE";;CgQYT 5MYY'xsV LzT;c̠Oyd ջ#PH-gLT>⭁63 j%Na>OFg7<֨s[ZcsvWUDC5!S}<3 P~;v7aHMfT8q!D/Q$9"U͜:TE: p$fB_/㹋Oʱ3NRBшJ8&j1KSy@BS/*'Q2:>HˈYjH/{9we9=)jtŽSO3aDuJh/CRE![&hfPYʥv*jXGP*.ư7U̪L!mpdŽR鲎Xq:Xm[kUHi!jT֑tpEIbBuWGf\ftn[J'= ao5:9( k&$UNoAM!!8&Uk^JUŴZr16a4-K7UL=cv؂'q6O{Sp6G/T_֙TF̟I NZyrrŽR@My{Pem}  Qk)\haRbS%ʼnm&oDMLS+*C>A9sC71A ߈Ae3|t(5 D%[ק(^I&"LQۑTR QT*,؎c4PJx>1&m8Df +ֳ!u;P|oČ.ppTx" *R}:bRBʥPcTvrAfW-#FNQ! ;E q^Rba zo5V_ Բ' Ch\WlURosV}*~Z A*&(#u&S񄍢0|\E!l&ŴsqCAdܮ >ҵ,EI='LӾ%SoNҹi>iZW*Z%Ljw ߠ A#1ZQ##Q[g_;s $j=-YHZ "jwj0#7qYVXb.j&dChۺV$Sb)^&m&tAIa{&.b8PKs|*RT 2T^RO[Dݤ|K"'Qvm|t2E U$硆Hs P(/醼}xQBH%&fP9MQ;1'rmW J!wL2(6rժKM0̙RL}V%ʸ۪d*IXj `oUiX#ojZk9y'ӐJh`uUPVkgg5FFшW:ytB[wmcnLz*oNʱ{P+ivܔrR/<.ľLa)>ZsVJ@{%z.U /JW1_0ȓ,(ûm1Hcd%=@%NRf: i펚=ueԗ3l(5rzoJC Nxn]jZs y&>>ݎj; Y/ ٜRESۣ&!S!y~, wy9]BcAu1Q'TkCZnUCn/f 7ǡ.?U0э#9RM AOJBh+ޖ͐~3WzRmiQ*qJ^}ڴC{i7+xś@>jCs**q@iZV~iE+ո5k(!USYFz(_07唩*"ƧRuhMB5CE5>bnP8/h.}.Dm7`y&NHt &CE"TN"8Qd K#r6fӬ|܅bo]\ܥfG->Uq{ܳq ၌}~ny(kԝ>OG# $|ϠeN@IP/+8%ZzĐa7. 5C U?1HQ j%-@x{j>RO2KL,_\t0] sǨ5G.5H8X`uRoo/3N);=!Ur7 j#ӛ.[/5W -vΣyT- +z.G-G/Ԝ10o¶uPhq睞ZW;su"5Rx@MM H*_ʤOu$&?F-e)p5$|ְE!E{ Mj_5tZ(E67GoGo'$F1XUo=$:} +i%>V#K)T'B?OfDQT+XӝlrL_(pd!+؏Lm^ ,Rg60 r:*eQl*Uz/9=pRpn}J#+sW9L6FT~f+$3nʟC%\*t+x'Rݩ"0b-Dz UamMV'+SM~bIPt͚(&6qJ?:Hm jWwzTԘL}q.?D8 w$|UD*[=q #5 pu_i@~)5bc\7>Y~&o݂%AtTVpVLn +.Ez[ךNFGLQɍž`DyA'JR~M&+cieL1*Bv[tTPigPFF-VQom3w&R4୔<8C:znφo/5O  Uq_띾G hOdoA[oO0+g爧`DmYޛEM&yw, 4K">|r$B=%b{nщTI䮔|ĪQkX 0a&PO(|Yh6SI8X NrDuCœߍΆOR΂pX0ogS> o_yUk8K>Nu@ժ5;WhGU7Rꇼ.T(!V"&lr SxjԠ)-RCZEAĥnjy#~MFPm{PfsJ[6RvfG-ꎗ18UѪcմCWu7˄&8!˯?Ԓ;;NENP}3ܞZ|WDGT n Ui򛦆Cw!bh[c[CS915T@M#Z%yn]HΒr~m-TLV}jY%(k2uS` J z";sf=Ɩ@-~ #5G ܽl&oI/Q#B%ؚ +_SgHS<[ IDAT43]EҴwm7j6Uf0Slָ&FYQ!xYyM-,Xd=MSfCONPñFSFi3|M<8 qi tOEZCCʼl(E-p'"nIj8ajhl. (J7Z>]a) .7~)$NR;Eșx^)RT? 9EyҗLGq"($I } R~ئrZ({>jԶR8Uz/΄OP?mzkU;B[>qݫbj|$X-g W~UcHO_M9_qɨ`*m.u:gj!T*bsS᧕ZRGx3Tt56yˇEۜGa;*Pz7IѧOmz|{uZOHͣ8 *^N1+MWh6=jC^\\'MkԑS*y SZ{ mRQe*'sZZ ~'c^4[I(+Tg22+ߗtTFub?'qjPþ2!m5u[ZY ur-vBѢσek`B^R?_A<޾ FGa\Vugaa}jx ~l'K$5maHKQ+>|,Ѵ6M"G7Tۧ^ #QxNaE]߁bT (5EM1jQoOO,;SD])/oWT/o)59Hu"U>& _#B#b9(e9PjqfT?潶eRF,&]cj~qq Q)j>݀HƸ<4H}I[m.. "GUP)* {By䈩aw/5_zE[UJIgѮ(6 Ѕu$IUjiY󌾋|Ed{<"QaOBKB RPO&7P n?A3ةB3LP뾍KNbju)>1mnpKL۲\nڅ|8vn}!A|Lŵ gWTz?j&3#8 &LOJ܅+ +{ rc4 S_Dq*4Pmg8EjQv&=^ P,Pe.!5w/h%'I&6RKWISGY]dјz%Z5!q/HZp*0倊s?,6P)%wLHQ#y9Xj%cJ&Su-S+پOxyz_ղxN 09&\*RrzJ2X=]uEҒ}cTwTl`A`$Eg՚Rn|Ұ@A=BQif)B5K10HS*.Oz1@J)RUY ΏKAL;uWI{''E_ձ.$ܡrq뼦2 z5RQDM0 'DdfS1,|ZXjZەvMavg]WY[ĚZV˰}G0[IJ^Im0"f_]R6e*6&ݮy;=/~P~3Cjbj i9ǟdej%M尠B ϊXUT H`L=*ѵ%Q:j* \?"U8qwZΟo;R[N* HUL҄Ct@=JeÈr%=VR_I:($Ȕqhɞ)tjkzɹzdQ'm?=!2bK0͸R cv=LqTj83u;*4) Y>6P)jqUE3<F[S*Z ugMG" -Q[I yIFc%KZ)k73%S]Ij4^L,Z-k@ܸ:d%oaJ~䞨2Q(/  3·h;X,WfC=3=w(5.=NHr W`(T%8硌.2PZxz,OH hOP9.Xs_ӝϘn7D/R[xB K)iY+TgUL|Z/#׏Wi5iCILAm*ƩĪϒeQη/kpD'EqjB3ٝ}jf8$EQ٧^eV/"WJA\T +$Rc<1gȨ(kݧ/ٷ\^E%[Ҷ6M⧩ IQ%֬W{^Sa^󜩔7bJ8=HD&8SRnpFI/5lz-+U@} 9d tT\ِmG:0ԸlWU8x7J[lbZ-Ti@&<}⣾?@a.=3u)SCiLj%cS(o0R-P0mTabPsuRTxgFVϣx' فR$i6 340O c3$* Q?lo߱1Vmqg̢ԶOoTK`4 >g;Q=*;_i&|I5[GԚE*֤ zgRqI-4(O&('s%UQIG&1bZp9R@)TէZC˗"0B.m3㌟rO,P1ͣIK~uGP'=YzR8+#Vr(^"$pXs< [K<![iPuRp=_BC+p$xai+ROp.4b!U:‹Hc9;gf])̜͝?{tYW?-5bI>dK blwLjȊD1@E j|ga:JJg6*CCK|#XP50IE:(*j\x (zX9ŒOiMRP3vQc~lqC2:@w , 'KexK,Q!A$6IL { DvT2v(G).WrG7d?G!7JMZ*E؄-@ =IIUj C drtMܣPST}Q`e7g |5Vu 5QR-3܁H"Nd?eߠɰ+rC"B˯P a'(6X!ATg'%u+6+GЧHl尊JdKe%eDQJ~WYe)/"@PؐQkD|8* Tuq!:m*(jyAվZ┽L]jգ163JKP HW2 j|/.$uV?MGE [fI =-uUj7V7^8jR/cjW:鬯]p9MINO;K}46f??I-}$=Q3Z:Hcq;9x-LܔZO,3eZSctp9iρZ/iTEwFЀU5slzFzਲw'cZyxck]|GϙL:.Ą}!o@zz;ptU-p1x ʸCM _9wTѓ5rW3Tn&!@W}ZRGH;ӣʴ;il\JPyQ*Dž>0'$?w=a,/hATs^-Sq ":jzXdi 2v˗;5O)$ꌥ~S\$:J㼊YIK@Ų1YN*ºTrjZ:+PЊui35$n&DyA`k| <:TYQKyϋw* v$]E0cItFQRAuK.L1; ϡjKP0 ~+҆MEKEsFMR ԔAZa jdV\Yڥ&+Z*V ꖥƲ& ʧT*@= #T6GI, 44hO>Է Jv :_P+26E]- JRxjGm70=?F@e7]nKU$l>HISf17#~n eաOfLeP_!qT~N`>|1L ~>2G[PBN֡OT8Q%6MZ"EL|I`sz/>\Zjn̽&wJ$fD#[^mn{^`ӠRS5y!ZsN,/b * ]H `RLQ Uz¨-u5!9jI5B?$ɴ U V;Si!Ry}hw0ڪnϧV!->jᎄ[Q'cKg,5}EFϤb1{}+ӍlV V#ʩV<N;ƿz6ՎKtYԠ$E騰7p/ ^e$F~<&͔<:MMF&z U]P6w"̣ZWM}]jshSȷEKm|f Za-D<k-GITE#ɠ9{ue2/!$yK}8@?OT8]n [j!<sZΖȽ[V7R7)&1/C[ZМbo^I) >/5EtoKGPK~zpP1bbbǬV򬓜aDlWh\C$FڡrCD DdTUJ,OCs3NHʉ&M91q{ц]Dmh|Ly*hxmaQ T)%zi@$EgSiW5qGX.?ʼ  =X~RsJݬTSx͢P׊5jZؼ9|I|5$bKԘCWj*J; Jr܏(H)R"DLP# W'tҕ5e1ۨ.T#*S)[u"]jx;? w :u-'70U!.KT4Sc:v0fݎ^s]tW$* tZ{TaW35K Q0M7Fe IDATWSL5 ;ԍ꯾٦ݥ0(l<@HD9%ϡfpjy{Vi`ݒ m|`~sBg`oK >Msp>ʢ9wd:jj8jZ7 pBO[,luZ&b/S߳P2a[Q+NS+V؈o Ex`PEX팑A}YqN8jd& PïًnTOT:6F_X6P2sw?4ق7+n3gFaZK;@PbPCsTm{]|F*dC mP53>Q!Pq?TLpQ8ᩧy(Tq͒L >.zꄚf/oT*^H Ùf7#Co~XV9RN\0OhCէTJ i\Q*Nt|O77ay=&DTXtQr~ >tVoff.tUGQn-4yP%eݡ+ܧ}Y/R` ogS= -1Eywd[|QY0T.q dX="ި`'v,Qm]'1);#.x` 5ӷ3sm0^m 4%`qAOX8%kL2{pEe ߠsQ(Uzcᤔyýsp%n4"QIL׺t#37ϥBYL/"EHo&xaH uɟCcNDNQ)j@/L+xQ*sL5]bQDDP#$>hyiBv5k.sXTm'";.59.etZ+ԑxQTC:ûM#5]* R :rtO-ѯ/k x}D5Ol;Qi0uQ1aJݏZ*9GM`^5gjmgb2@ [B=`a$fWAvtQ> aXbߗP:%F8OQ']nQj!cXA!$EG}ȹo*u{Tn.U;*`}f #>wD=)S^ vJi,5V03d6D pmSjo*% &: ҥПC-a(!jIXoRGZXSOM{O Tgn B"T~ 7,W2ef!FsUqY .>&m޴EK8,wЇVARE"F) \8 *PJKis{ɫ. ?9g9Sugڇ p`" J*\Hpm*ʘmޑԠs·%|LwjNк#iM5Ҥ1{0[lVh S{AxZ' TәFQx$3сQ֤,\Fx}1Nne4Ԋo 9[jsE LAGqf+ 5¢H-9G]jަ҄}VQU=|Mɟt#-O۲A^}`8Lèh==3Im5SHNƖJ2l%ꇎ=A ̣ڜ j8H)tRUI]Xjfxa))Q Z 9*ftQ%Pxc\;pޣHtVGV r;1q14ƟaWfXJ `zuzWqdt;R>J*0*:twg5c8PrZ$BqYK]h!xQ2nDƣi={@éZF^hYm=do#3Q܀*OmRpGQ` /P {bñ:x^Յè y|Z*mCx({K$u`6;._ԑsT* G~%PMRh QզoGMEg'z?ush89-QTzUc..T\Hg} $2y떧jF$t/#)MϗʕQWQ#} ݱp7L=^2T15m TsFTˊ v @]7yؽ*L RMH E5d6`M}a_}{ p5}ju D@ ud6éޫ 0>EzpY`|`z|LK{G=z@sjŒVGPiy4zH/R'p5oSMzb_>$97IZXȶդ2mk(<#Py|]nPl *t&ajQEտ!3=7En<*vbL*z\:;oxOR(xT;CeVI][T'5@j66ӊ T_ |ٻ] g1 UZ{I9! ΙmPcMR1Љ)@B3k~4[Y>@j5͑?&Ug?(s*vy~ Ͻ{hL*|,A4!O \ `zz=r=< q4'&&_MRlt̯ ?:nH1Ͻi4u:q[vJj<łyϛ(\9bNjcgLq*19B똜6zq@{0Pqus:SޠԂ, P@SsF Txw;dMM 5hR%6R" c9 VJ=d*T'-X@~NPV"t^H3tJ@m2_0j٦҆ƪoV:`N#6N3b(<CoJwqjcMݼ;+@hNh8DZ%XݸW5UXW[6a5~G\j*CIj_ {Uϩ ut}ijR)m.\i*PڷVZQF~:KG>blT|qWE&ҫsǥꛗYZE .} 1ͩDz'R=iQ\D}\R$O|R:Zh ,tTn.**7 R#>QzO]ezP;Eu|RGK aC?IO-$Xj!nrDT d 5g'_QPij\Π\kw2t|Fې2HᣘJA3"P} lz:MTn-!un"̜27gbN/RPX7 6g @Mm,1@ےZ#c]i>+P7QYLݏ&mԾXjFc_}57M8*˷buﱨ\> A'Ԇ /b?!+~%-M5Rs\#3?I*&QO\g \w&U,U RM,z#2uHհu] #Rjt\^X@=S2P'5W1P }(hF?;-aS|Q$;'-gu2C1ZqTnL>' g%vrodo.KN=*iojLϒ÷\CY*/U~CnSU/Lԝ OCKFyZZ":^r`cA& jZS;GK}$cĿ[TTIfiOX*)WkTQ(ԩȞA_oSڱ/8;4ârUmYa*6@ͭW?(0R晏0g1Ju[$ԗٯ ~iPJM5m̭$fH|v(zz|I{z!]Fަ ǺF :JU~T]ҧS䫷!> &";q|3uAұ _TNky J->NZHLN]%|4hoF0*YBk*?j|:{DY(%qOG*MjG-T|oyԉ_#a=:ݠ.3~\㑺ZF1x PGjX? 8-(诪KTd.\O3~*9җ#SQTS O7Ўxd kHvK# *0E]%Od{-tUᨼEʘLzESY @G.R3V1z?%<5d.)$hS|KSHgkR~8qWFZnSd{TT_O(gϪLE<{xh4b-jacDT$H-ԸΡTtbOY(ZPƳ0Կ@G!fO&cRBP@Lꯧh=RUnSmD]MΤ/18 5oQ`P\D"Z a8Y x6c!"|:@Tt d|j\m1|aEMɭϳq>u$/Y|rOFp~t>n QS G` T4̦%Jugx̰tT#V[x>]{Mn#2NEY*qʒ݊Xݙ*wejEZHTy&zCj1@ ݔR8N`&y= ̩![oPѻp5VO>=3ʵ4,K_`QV2zEe>8ʕt۩Pe{]gfDEmFρT䔶ð~^月PyZ_72;rY:kyPXtզ#eU0UM}ޮ-ÚTXcbeARf'GPzU:*_UwH-tċ:Q 㭒wz\ޠ#^xyA%#_UkqGABƓ6h1xZ/j r{i=ijF[K\?:R#KxE !T S55jE 61om҄4+GnZk9HhB_l_oR)CP}=ӕ2qQzϐPU*:.Bolu}|(,59k}= .jf&Ч:ۣpڙc));>l ը{>u =X U4ԷPџDJV[ +mKc\2OwuԕPېt as>{:"UVդaV*{ j5ʑ&Jm~hm*?Խ2edCn#Nk#J5EQv׿IPu*$*_v q%M[Y+T55Y(T!Z:U.3T TQS8ߊTLb"Mw 29Quמht65qNua"2aR3C 0]67muc N2r%fm*y)iMBTV٠Z_fMV z> %[rZ^`5U&5jPxtH *rhw ZKf lRS GN,t[}B,d dK+u&*щJZ,oP#Ty}b٨UudDګV񩞐R tx+':02>VQڎM"t #zONGwR5rWμP] ^_XD}yq>E;p2ݏ ssd2:Ms x\9C ƠIMTǐj?p*ĭQ7&Ǩ̵&DdǷjb:."` L);nj5EPnj%[;xRN.TYEު h sũ k3@-Q"pgzIv(f9R/BעBzh5cޤݎdFHZf -vj#ә(9]F_}lCzxfL{G5넖>l@!6@B48 X㒾Dk,9TCS륝y񉺂(_Wo;es Ņu n)ˋ & âM*4\L@ V 1:Cg+`p=((-TT2gYԞPf+}h4J`n~)jg[nP\Ǿf<;V-s⿨=gౚ )8[Ā@ڜíL=E/-:>{n.8WՑn@G&2%N]C,E0e?>}}Sv3Eů1Q𣤖I>s\( '!B[O_^0ٸ hQ+N$3.SES3p=~ '5䀌:wgF < ~mJWTM45 Pr6ZD*G 4\L@ʳसFQ}rsT^U J%mTIf#|6-(a>7%uj/ qh?Lgޔ&[*|#%/&Hs~Us:=i2޴8Hc1hPJUiqITQ`Vkjiy I zTJ*r֣qIDAT[G?6Ae^Y+o2 5pwǂiRUkA)RAT?bO fFe6{J=ѩs+0)=*6 PSQE"Q]ǘ(;x> EK"T?lAŇ9ݧSfTQRkIqEu`ZFfZFLjg>pa/3jb瀀HdĎ3EJ֨%Q[PSb!ΨOEQ*%qSYb6 p.DxEj7ۗR5*)&dcQ5AMI/"z,RCQ;vM%8t0BX Nb[)AiH+ǜb!QQm#B( PaI RڹLhу k8%R[)BI""UPzFmX1qEIiw*qg6E*A=QG^(.آȎ;TӅԇ%!SKSkn͎q*eyA4{ $>_IԙF94AD+%Qͨ5U`.Y rd)S 93jduS x=>֧o)d_Sѽ[(ԂiYWC'*KZn2*Ij'5U c'}*j0j?yOTM Xxn̾\pAj 18@)>vdJ+rN2C0+Bgn&Mq/q5b eskSCSPKn%O~(TO'DUEH<~֩hy! 0=wG0Z6i [c(PH??iIa/SCYM#\5U&@F"*t/M< +?VR]*,:^,1fĻ{RiC Q ϨI\HmY,R)$G[Уp%KȕF8j6$i$P6A$k/zggi/&u‚lDgNɧ!r9qB}VJE.82I}N9淨܌.d7?Mo;8PdMٷ~Ċ B}iHiwp{0⻡>`eGb2EF%E\JܽQvK[g۸j7T2ՋV(Lܱ~GqPԘȭhS\gTx֐BGi4 Tߠ`&\;@qN#&wKXVtqE T bЏ@9.S9T2Ԋ[DM:*? 9,}0LkQA/҈Ձ=68lBg3?$F}給MT%k[)S PݛVQ'e(h1(@Ξ:?NS?WLإJWNT@c*v h&m 4a/hT6.#lJ=Z|l\׮qle)*/vO ǔd qF1`6㑠v 7 i*Noz)!*I6=6ʧUrǙXʎD_-T*ek`zjoDl_ qFZM(Tt-qfsj=BTj(E1^ fY**DZЂեEi ۴ϝsWcdlL`Ws]PQ9A) O Ѹ>[gה%-,~B!Ω$Hu+ib/n61]hOTb:Vԛ>4ɽGǗ٣r^$׭y_+*s4kY*{~p \)T!$⠌5! Jo[zb${tn o]lϘb֬xDhWB\FO,@I<TӂKufNj[| v4uXQ]ӬibuϯW[TjX(5={2[_#`ҿF[*\}*5,X[GԚ7%~׋-*5 R娛\5-uv :2F = %JwW>v^+Be,B<;T.Z&nӟVkuzX}g8 T%ٕn.}>%PYpdGA]PPx;WK*w.F56{ɹRI,&j"խQIaH]**5%xӯ,^0=ڄkvf& y eujh &RjZBږTR쭍+"#]BIP}w_Jpfx={u6is_(j*keyJQDŽ}X [r1ffT5GTcz{HM"(H+׫0I+$R;i3fGOTfbV&*c\IPS7֨żV>.7kTi1obQ)_8]JbEW^C7RKe]Tn0*͌UqDmRIlP뤪Uq$ \?=Ah9ԩUChhxVݠr:2#,tIA\ToXJc?&]KAj$VWOQ[TiMQf̋JuRLK;R`$܋J}1Ucd>E" B=; cd+u0בzwt Sa:wjNWpX4*j%\ޓ5;hU v,Fw]JC3%٫2%*쵑Sm &D_Q+30ew]X${R\ew]za)^%qF NF[uX\T^˩ۺ0#NT^WE.{ K_$TJw]y.5y5ʒcZw]J )QI~aVZ4aDWQN]CK@JwݠZbԊCdeӓ5GLvdnPcACUarUrT͗MONG;l: nNS`02/_Vi sK8~QOzR-nZ͎AlK3 ! Tj`g*DqA/T'?qupQQTLW.Z٢JD}5ȵF >߇jtRiȬu22լw-NF*#g|uL&*G063kpֶNQ@ٳ'wIlٱ&d#SîR ЬɁj_TFTCNٌ';)ڥFq5,n_>JQybx-}5XS)16/ܛRC2h_qT:pVV^Fj1x0*]2%RK9]}xDtNQP:#a:zFƣ;4wL̘J?̝a} D5oq¯n߷PGհ(1R 0J~?{(L<jLb=R+%4HT;ߒ NgbhyU r`* }v<Ғ/) Աe,YOP~q㫚^թ?g]^x\M pK֨챎8C򆂀d/xBE>&G)aMeO$TsTT{_"IaSHHmfN5)ps;SzkHR 6*5jY\szYﻨnYq&6]P;`̃`NH*z {#~sڝy wg2@*W3gi?~YG*W˚|*QTNF'Z?ʔ_L9OfT's;K*xY =W2~}8UxUAh̓XJaTUS'?5;5 F=5]IU1,Z~ڱo{Q߇#ix3;Yڣu,]G=wuZF"Nw{۽:N^R7[ ߔuu\M]ue&WSWSW5!+aԅ>Pgo Dm{z>jAO?:]yCԿSSi2PaKTIENDB`}DyK _Toc113160808}DyK _Toc113160808}DyK _Toc113160809}DyK _Toc113160809}DyK _Toc113160810}DyK _Toc113160810}DyK _Toc113160811}DyK _Toc113160811}DyK _Toc113160812}DyK _Toc113160812}DyK _Toc113160813}DyK _Toc113160813}DyK _Toc113160814}DyK _Toc113160814}DyK _Toc113160815}DyK _Toc113160815}DyK _Toc113160816}DyK _Toc113160816}DyK _Toc113160817}DyK _Toc113160817}DyK _Toc113160818}DyK _Toc113160818}DyK _Toc113160819}DyK _Toc113160819}DyK _Toc113160820}DyK _Toc113160820DyK yK Thttp://irm.cit.nih.gov/itmra/itmra96.htmlDyK yK thttp://www.whitehouse.gov/omb/circulars/a123/a123_rev.pdfDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK Thttp://irm.cit.nih.gov/itmra/itmra96.htmlDyK yK http://www.whitehouse.gov/omb/circulars/a11/current_year/a_11_2004.pdfDyK yK lhttp://www.whitehouse.gov/omb/circulars/a094/a094.pdfDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK \http://csrc.nist.gov/policies/FISMA-final.pdfDyK yK *http://www.nist.gov/DyK yK jhttp://connected.ed.gov/doc_img/itimprocessguide.docDyK yK Thttp://irm.cit.nih.gov/itmra/itmra96.htmlDyK yK dhttp://www.arnet.gov/far/current/pdf/FAR.book.pdfDyK yK zhttp://www.section508.gov/index.cfm?FuseAction=Content&ID=12DyK yK Thttp://irm.cit.nih.gov/itmra/itmra96.htmlDyK yK http://ednethome/EDNetDocuments/General Access/GUIDE - TRB Process - V10_0_PA.pdfDyK yK Thttp://connected1.ed.gov/po/ea/index.htmlDyK yK Thttp://irm.cit.nih.gov/itmra/itmra96.htmlDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK rhttp://thomas.loc.gov/cgi-bin/query/z?c107:H.R.2458.ENR:DyK yK \http://csrc.nist.gov/policies/FISMA-final.pdfDyK yK *http://www.nist.gov/DyK yK Thttp://irm.cit.nih.gov/itmra/itmra96.htmlDyK yK Thttp://irm.cit.nih.gov/itmra/itmra96.htmlDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK \http://csrc.nist.gov/policies/FISMA-final.pdfDyK yK *http://www.nist.gov/DyK yK http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.docDyK yK \http://csrc.nist.gov/policies/FISMA-final.pdfDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.docDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK \http://csrc.nist.gov/policies/FISMA-final.pdfDyK yK http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.docDyK yK Thttp://irm.cit.nih.gov/itmra/itmra96.htmlDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfeDyK E-Government Act 2002yK http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_bills&docid=f:h2458enr.txt.pdfDyK yK rhttp://thomas.loc.gov/cgi-bin/query/z?c107:H.R.2458.ENR:DyK yK bhttp://www.epic.org/privacy/education/ferpa.htmlDyK yK \http://csrc.nist.gov/policies/FISMA-final.pdfDyK yK *http://www.nist.gov/DyK yK Rhttp://www.usdoj.gov/04foia/privstat.htmDyK yK *http://www.nist.gov/[DyK 7OMB A-130: Management of Federal Information ResourcesyK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK FISMAyK \http://csrc.nist.gov/policies/FISMA-final.pdfDyK yK \http://csrc.nist.gov/policies/FISMA-final.pdfEDyK &ED IT Security SDLC Integration GuideyK http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.docDyK yK http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doc[DyK 7OMB A-130: Management of Federal Information ResourcesyK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK FISMAyK \http://csrc.nist.gov/policies/FISMA-final.pdfDyK yK \http://csrc.nist.gov/policies/FISMA-final.pdfDyK yK \http://csrc.nist.gov/policies/FISMA-final.pdfEDyK &ED IT Security SDLC Integration GuideyK http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.docDyK yK http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.docDyK yK http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.docDyK Clinger-Cohen ActyK Thttp://irm.cit.nih.gov/itmra/itmra96.htmlDyK yK Thttp://irm.cit.nih.gov/itmra/itmra96.html[DyK 7OMB A-130: Management of Federal Information ResourcesyK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfeDyK E-Government Act 2002yK http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_bills&docid=f:h2458enr.txt.pdfDyK yK rhttp://thomas.loc.gov/cgi-bin/query/z?c107:H.R.2458.ENR:DyK FISMAyK \http://csrc.nist.gov/policies/FISMA-final.pdfDyK yK \http://csrc.nist.gov/policies/FISMA-final.pdfDyK NISTyK *http://www.nist.gov/DyK yK *http://www.nist.gov/DyK Clinger-Cohen ActyK Thttp://irm.cit.nih.gov/itmra/itmra96.htmlDyK yK Thttp://irm.cit.nih.gov/itmra/itmra96.html[DyK 7OMB A-130: Management of Federal Information ResourcesyK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfeDyK E-Government Act 2002yK http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_bills&docid=f:h2458enr.txt.pdfDyK yK rhttp://thomas.loc.gov/cgi-bin/query/z?c107:H.R.2458.ENR:DyK yK \http://csrc.nist.gov/policies/FISMA-final.pdfDyK yK *http://www.nist.gov/DyK yK http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.docDyK yK http://ednethome/EDNetDocuments/General Access/GUIDE - TRB Process - V10_0_PA.pdfDyK Clinger-Cohen ActyK Thttp://irm.cit.nih.gov/itmra/itmra96.htmlDyK yK Thttp://irm.cit.nih.gov/itmra/itmra96.html[DyK 7OMB A-130: Management of Federal Information ResourcesyK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfEDyK &ED IT Security SDLC Integration GuideyK http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.docDyK yK http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.docDyK yK http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.docDyK yK Thttp://irm.cit.nih.gov/itmra/itmra96.htmlDyK yK http://www.whitehouse.gov/omb/circulars/a11/current_year/a_11_2004.pdf[DyK 7OMB A-130: Management of Federal Information ResourcesyK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK jhttp://connected.ed.gov/doc_img/itimprocessguide.docDyK yK Thttp://irm.cit.nih.gov/itmra/itmra96.htmlDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK \http://csrc.nist.gov/policies/FISMA-final.pdfDyK yK *http://www.nist.gov/DyK yK http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.docDyK yK http://ednethome/EDNetDocuments/General Access/GUIDE - CCRB Process - V9_0.pdfDyK yK Thttp://irm.cit.nih.gov/itmra/itmra96.htmlDyK yK xhttp://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfDyK yK \http://csrc.nist.gov/policies/FISMA-final.pdfDyK yK *http://www.nist.gov/DyK yK http://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.docDyK yK 6mailto:cynthia.bond@ed.govDyK manny.hernandez@ed.govyK <mailto:manny.hernandez@ed.govIDyK 5http://wdcrobiis09/doc_img/guide_ccrbprocessv9_0.pdfyK jhttp://wdcrobiis09/doc_img/guide_ccrbprocessv9_0.pdfDyK sally.budd@ed.govyK 2mailto:sally.budd@ed.govDyK joseph.rose@ed.govyK 4mailto:joseph.rose@ed.govDyK jeanne.vanvlandren@ed.govyK Bmailto:jeanne.vanvlandren@ed.gov DyK %http://wdcrobiis08/doc_img/ticol.docyK Jhttp://wdcrobiis08/doc_img/ticol.docDyK wanda.davis@ed.govyK 4mailto:wanda.davis@ed.govDyK steve.Allison@ed.govyK 8mailto:steve.Allison@ed.govDyK jerry.davis@ed.govyK 4mailto:jerry.davis@ed.govDyK jerry.davis@ed.govyK 4mailto:jerry.davis@ed.govDyK jerry.davis@ed.govyK 4mailto:jerry.davis@ed.govDyK renaldo.harper@ed.govyK :mailto:renaldo.harper@ed.govDyK joe.rose@ed.govyK .mailto:joe.rose@ed.govDyK wanda.davis@ed.govyK 4mailto:wanda.davis@ed.gov3 i@@@ Normal,nCJOJQJ_HmH sH tH R@R  Heading 1$<@&5CJ KH OJQJ\^JaJ X@X Heading 2,2 headline,h $@&5;mH sH L@L  Heading 8 <@&6OJQJ]aJmH sH <A@< Default Paragraph Font,@, Header  !2 @2  Footer,f1  !&)@&  Page Number6P@"6 Body Text 2 CJ(OJQJ*B@2*  Body TextxVBV col bullet,cb" @PP^`mH sH 22 TOC 2  % mH sH .U@a.  Hyperlink >*B*ph@r@  Balloon TextCJOJQJ^JaJTOT col sub-heading,csh$PPa$ 5mH sH :'@: Comment ReferenceCJaJ|O| %Heading 2 Char,2 headline Char,h Char"5;CJOJQJ_HmH sH tH ,"@, Caption 5CJ\0@0  Comment TextCJ88 Comment Subject5\00 Style1CJOJQJ^J>V@> FollowedHyperlink >*B* ph<< Style2 CJOJQJ^JaJ<< Style3 !CJOJQJ^JaJ<"< Style4 "CJOJQJ^JaJ(2( Style5 #<B< Style6 $CJOJQJ^JaJ<R< Style7 %CJOJQJ^JaJ(b( Style8 &BrB Style9'$a$CJOJQJ^JaJDD Style10($a$CJOJQJ^JaJ00 Style11)$a$DD Style12*$a$CJOJQJ^JaJDD Style13+$a$CJOJQJ^JaJ8@8 TOC 1, $ 5OJQJLC@L Body Text Indent-h^h`OJQJBZB Plain Text.B*CJOJQJ^JphHR@H Body Text Indent 2 /^OJQJHS@H Body Text Indent 3 0^OJQJ2@2  Footnote Text1CJ8&@!8 Footnote ReferenceH*- /2DEFDEFIQ\xs&1b,`Rq   <HI[\igt5'( r s _`G-#01hi{|Qhz{ab()`abc$%<= +","""""$%''**X+Y+..h0i00000O2P22223_4556666f7~77f8g8h89969E9b999999:::[:::::+;w;;n< ==>b>>>>>>>>>??@@@4@S@T@d@z@@@@@@AWAsAAA B2BABBBCnCC*DDDDEEEEEF4F5FLFoFFF2GoGG>HHHHIIIJ"JAJBJtJJJ8KKKLLL;MgMMM#NjNNNNNQQQNRORRR$SgSST0T1TpTTTTUUUUUnWoWXYYYYYYYZZ#Z?ZEZZZZZ$[8[P[\[o[|[[[\1\2\\\\\=^>^^^^^^^^ __T___4```'abbb8c9cvcwcccccdKddd&ejeeifjfkf|h}hhhhhiiNiaiiiij_jjkXkkkkklmmmmmmmnn>nSnnn2ooppAqlqqrTrrr.s/stsusBtCtDtqtrtttttt uu(ubuuuv)wwwxxx)x*xLyMyyyRzzz{{U{{||||u~v~(7Tst9jFlpqrsυЅ߅0?Ti,]L!;p1opqrč'9tDu‘)k,~^_wxɗʗ (GH՘hݜޜ3Pq\ßğGxyTUXg,^ڥB֦=VX-EKL34C`ݭ=|~ïestuڲ۲)Cav't=h'348]^bѶҶֶ56;cdhɷʷη?@FrswθϸҸ 78>klp>?Ccdh׺غ޺ !$56:UV[Իջٻ'(+459PQUnożVW ?@P$%>JK_ A ~opmn%&A();KdewYZl@AT rs?@W <=T_`g78UXY^  !"#$%&SstJ6Y$OPwxL ghLMwz.0P[mn456789:;<PQcde 678STUjkl`ab{|}  !VWXopq!"#;<=>?@ABCefxyz,-.>?@NOPhijklmnopqr\]^`abcde?@ABg000000000000000000,0,0,0,0,0,0,0,0,0,0,0,0,0,000000000 0 0 0 0 000#00#0#000000i0i 0i 0i 0i0i0i0i00h-0h0h0000 00 00 00 00 00 00 00 0000%0%0% 0%0% 0%0% 0%00000000000000000000@0"00 0 0 0 000 0 0 0 0 00000/0/000000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 000  0  0  0  000/00000000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00000000000 0 0 0 0 0 0 000000000000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0000@000000 0 0 0 0 0 000 0 0 0 0 0 0 0000000"0000000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0000`0000000000 0 0 0 0 0 0 0 0 0 0 00000000000 0 0 0 0 0 0 000000000000 0 0 0 0 0 0 0 0 0 000000000000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0000000000000 0 0 0 0 0 0 0 0 0 0000`000000 0 0 0 0 000 0 0 0 00000000000 0 0 0 0 0 0 0 0000`0"000000000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 000000000000 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 000000000 0 000000000000 0 0 0 0 0 0 0 0 00000000000! 0! 0! 0! 0! 0! 0! 000# 0# 00000000000 0 0 0 0 0 0 0 0 0000000000% 0% 0% 0% 000' 0' 0000000000 0 0 0 0 0 0 0 0 0 0 0 00000000000"00000 0 0 0 0 0 0 0 0 0 0 0 00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000`0\000000000000000000000000000000`0000000000000000000000000000000000000000000000000000000000000000`00000000000000000000000000000000000000000000000000000000000000000( 000( 000( 000( 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000@10 0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0 00000000 PPPPwwwww YYYYYY]v d o0#U$U%/1695=@cBSDGJK&MOQU\1`cc(eVgiBjno&t:uuy+{*|sƆ| w ã,ժC4u5ĽoAC uUx7B #'),24;BDFLQSVX\`bfmpwy~( $2:=>bBBBDTDzDDDEsEE2FFGGHI5JoJJoK>LLANBNN8OOP;QQ#RRNVY^^?^^^$_P_o__``bb cTccd'efwggKhhjiijlmammnnXoopqqr>rr2stAuuTvv.wqxx y(yyz|}7t9pЉ?i]L;1o9D•),~_GHx,֪`=~۶Cv'h4@μp?(V?~KYW<_7X$.058;Pd a Wp"<?ey-?Oilo@     !"$%&(*+-./01356789:<=>?@ACEGHIJKMNOPRTUWYZ[]^_acdeghijklnoqrstuvxz{|}4;=\tu9Hdfgi3Fbdeg8Rnqrt/235UQlOQ 9!9#9w;;;;0<l<n<< = =V====>>&>b>c>>>???BBCCGClCnCCCEEEoGGGG*HHwHHIIIKKLL^LLLLLL2M8M;M_MdMYYY2\k\}\D^Z^\^_ `2`4```````!a'a)axaa?cUcWc&ecejekeeeeAfgfhhhjjkkQkXkZkkkno0o2o}ooo'p(pnppppppp9q?qAqeqjqlqqqqqq5sKsMsJt`tctu#v$vovvvvvv"w)w*w,w}w~wwwwjMłƂ?FGHJElmn]Ї01|}ȈɈLMNOP‰!^_Ɋʊяҏ  klab‘Ñđ+02'ҙә  !lmPޛߛ01-?BԦ֦!"mn=>?@BE|~ï=ceϰ'`rt5;=afhߵ 3G36zoDV!Pu02IJ >jk! X%X%X%X%X%X%X%X%X%X%X%X%X%̕XXX XXXXXXX XXX XXX XXXXX X XXXXX XXX XXXXXXXĕXXXX  XXĕXX̕XXĕXXXĕ̕XXXĕ̕XXXĕ̕XXĕXXXXĕ̕̕XXĕXXĕXXĕXX̕XXXXĕ̕̕XXXXXXĕXXXXĕ̕̕XXXĕ̕XXXXXXĕ̕̕XXXXXXXXXXXXXXXXXXXXXXXXXXX#*,1<?%57`s+25:EHpwz!XX!!!!$  ,_"$2HBr|7Mn:}"$o#xop(}"$Yݔ=|Igltя#}"$(ć]~2 *}"$9YؗhNǀ g}@: (  N  3  J  # A"`B S  ?H0(  ` F%utx3{tA _Toc92888771 _Toc113160808 _Toc92888772 _Toc113160809 _Toc92888773 _Toc113160810 _Toc113160811 _Hlt173302466 _Hlt173302467 _Toc113160812 _Toc92888776 _Toc113160813 _Toc92888777 _Toc113160814 _Toc92011332 _Toc92888778 _Toc113160815 _Hlt106705107 _Hlt106705108 _Hlt106779474 _Hlt106788159 _Hlt106788160 _Hlt106792194 _Hlt106792195 _Hlt106766525 _Hlt106766526 _Hlt106788293 _Hlt106788294 _Hlt106793095 _Hlt106793096 _Hlt106793085 _Hlt106793086 _Hlt106793101 _Hlt106793028 _Hlt106793029 _Hlt106788859 _Hlt106788860 _Hlt118517514 _Hlt118517520 _Hlt118517555 _Hlt118517556 _Hlt118517561 _Hlt118517562 _Hlt118517567 _Hlt118517568 _Hlt118517585 _Hlt118517586 _Hlt118517641 _Hlt118517644 _Hlt106769396 _Hlt106769504 _Hlt106769505 _Hlt118517649 _Hlt106769521 _Hlt106769522 _Hlt118517662 _Hlt106789177 _Hlt106789178 _Hlt118517666 _Hlt118517676 _Hlt118517685 _Hlt118517686 _Hlt118517689 _Hlt118517701 _Hlt117326041 _Hlt117326042 _Hlt118517705 _Hlt106789498 _Hlt106789499 _Hlk106785377 _Hlt117326052 _Hlt117326053 _Hlt118517710 _Hlt117326060 _Hlt117326061 _Hlt118517712 _Hlt117326069 _Hlt117326070 _Hlt118517718 _Hlt117326075 _Hlt117326076 _Hlt117326091 _Hlt117326092 _Hlt118517722 _Hlt118517726 _Hlt117326082 _Hlt117326083 _Hlt117326097 _Hlt117326098 _Hlt118517729 _Hlt118517734 _Hlt117326105 _Hlt117326106 _Hlt117326112 _Hlt117326113 _Hlt118517751 _Hlt118517758 _Hlt117326119 _Hlt117326120 _Hlk106785433 _Hlt118517762 _Hlt106789759 _Hlt106789760 _Hlt117326133 _Hlt117326134 _Hlt117326138 _Hlt117326139 _Hlt106789882 _Hlt106789883 _Hlt118517772 _Hlt106790318 _Hlt117326141 _Hlt117326142 _Hlt106790168 _Hlt106790169 _Hlt118517775 _Hlt118517776 _Hlt117326153 _Hlt117326154 _Hlt118517779 _Hlt118517780 _Hlt117326159 _Hlt117326160 _Hlt118517784 _Hlt118517785 _Hlt106790351 _Hlt106790352 _Hlt117326168 _Hlt117326169 _Hlt118517790 _Hlt106790228 _Hlt106790229 _Hlt106790233 _Hlt106790344 _Hlt106790345 _Hlt118517798 _Hlt117326193 _Hlt117326194 _Hlt118517804 _Hlt118517810 _Hlt118517840 _Hlt117326235 _Hlt117326236 _Hlt117326242 _Hlt117326243 _Hlt118517845 _Hlt117326250 _Hlt117326251 _Hlt117326257 _Hlt117326258 _Hlt118517851 _Hlt109551543 _Hlt109551544 _Hlt117326262 _Hlt117326263 _Hlt118517854 _Hlt117326269 _Hlt117326270 _Hlt118517871 _Hlt106789650 _Hlt106789651 _Hlt117326275 _Hlt117326276 _Hlt118517876 _Hlt117326280 _Hlt117326281 _Hlt118517881 _Hlt118517882 _Hlt117326289 _Hlt117326290 _Hlt118517919 _Hlt118517920 _Hlt117326293 _Hlt117326294 _Hlt118517922 _Hlt118517923 _Hlt118517925 _Hlt118517926 _Hlt117326306 _Hlt117326307 _Hlt117326311 _Hlt117326312 _Hlt118517928 _Hlt118517929 _Hlt118517933 _Hlt118517934 _Hlt117326548 _Hlt117326549 _Hlt109551697 _Hlt117326560 _Hlt117326561 _Hlt118517970 _Hlt106791102 _Hlt106791103 _Hlt106791232 _Hlt117326567 _Hlt117326568 _Hlt118517977 _Hlt109551614 _Hlt109551615 _Hlt109551624 _Hlt109551634 _Hlt109551635 _Hlt117326575 _Hlt117326576 _Hlt118517980 _Hlt117326584 _Hlt117326585 _Hlt118517985 _Hlt117326592 _Hlt117326593 _Hlt118517989 _Hlt117326601 _Hlt117326602 _Hlt118517993 _Hlt118517994 _Hlt117326605 _Hlt117326606 _Hlt118517999 _Hlt118518000 _Hlt117326615 _Hlt117326616 _Hlt118518006 _Hlt118518007 _Hlt117326799 _Hlt117326800 _Hlt118518012 _Hlt118518013 _Hlt118518020 _Hlt118518021 _Hlt117326832 _Hlt117326833 _Hlt106792171 _Hlt117326933 _Hlt117326934 _Hlt118518023 _Hlt106792346 _Hlt106792347 _Hlt117327024 _Hlt117327025 _Hlt106792225 _Hlt106792226 _Hlt118518031 _Hlt106791996 _Hlt106791997 _Hlt118518045 _Hlt117327035 _Hlt117327036 _Hlt117327037 _Hlt117327038 _Hlt117327055 _Hlt117327056 _Hlt117327057 _Hlt117327058 _Hlt117327048 _Hlt117327049 _Hlt106792254 _Hlt106792244 _Hlt106792245 _Hlt118518053 _Hlt117327083 _Hlt117327084 _Hlt106792447 _Hlt106792448 _Hlt118518061 _Hlt106792502 _Hlt106792503 _Hlt118518067 _Hlt117327109 _Hlt117327110 _Hlt117327130 _Hlt117327131 _Hlt117327138 _Hlt117327139 _Hlt106792526 _Hlt106792527 _Hlt106792599 _Hlt106792600 _Hlt117327205 _Hlt117327206 _Hlt117327239 _Hlt117327240 _Hlt117327252 _Hlt117327253 _Hlt117327263 _Hlt117327264 _Toc113160816 _Toc113160817 _Toc113160818 _Toc113160819 _Hlt117327708 _Hlt117327723 _Hlt117327724 _Hlt117327429 _Hlt116301214 _Hlt116301215 _Hlt117327634 _Hlt117327635 _Hlt117429197 _Hlt117429198 _Hlt117429190 _Hlt117429191 _Hlt117327640 _Hlt117327641 _Hlt117327671 _Hlt117327672 _Hlt117429177 _Hlt117429178 _Hlt117327679 _Hlt117327680 _Hlt117429173 _Hlt117429174 _Hlt118518185 _Hlt117429161 _Hlt117429162 _Hlt117327684 _Hlt117327685 _Hlt117428917 _Hlt117327692 _Hlt117327693 _Toc113160820\"#i__h%%"""w;w;;>>>>BBCCLLLLLLLMMMM N NQNQNNNz\z\,``````$a$a$a(a(abgeheheejUkUkVkkkn'o'o)oooospspuppppppppppp>qAqgqgqqqqqqqr%r+r+r+r+rlrlrqrqrsrrrrrrrrrr s suuvv%w%w%w%w%w'w'w(wwwdssCևههEE-^^hh88@@/LLfxxޓޓ55ffSS|//66:?? *VVVkkïïTTffȴȴ99cco&rr00AAXXcc%%%%??@@ @@@@@@@@@@@@@@@ @!@"@#@$@%@&@'@(@)@*@+@,@-@.@/@0@1@2@3@4@5@6@7@8@9@:@;@<@=@>@?@@@A@B@C@D@bE@F@G@H@I@J@K@L@M@N@O@P@Q@R@S@T@U@W@X@V@[@Y@Z@\@]@^@_@`@a@xc@d@e@f@g@h@i@j@k@l@m@n@o@p@q@r@s@t@u@v@w@{@|@y@z@}@~@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ @ @ @ @@@@@@@@@@@@@@@@@ !"@#@$@%@&@'@(@)@*@+@,@-@.@/@0@1@2@3@4@5@6@7@8@9@:@;@<@=@>@?@@&&//z``y;;""";;;>>>>CCCCLLLLLLLMMMMNNRNRNNN{\{\-``````%a%a%aaabheieieejVkVkWkkk(o(o*ooootptpvppppppppp?q@q@qhqhqkqqqqqqqr&r,r,r,r,rmrmrrrrrtrrrrrrrrrrss-svvvv&w&w&w&w&w(w(w(wwwettDIׇڇڇFF.__ii99AA011MMgyyߓߓ66ggTT}0077;?? +WWWllUUggɴɴ::ddRss11BBYYdd&&&&@@/rAB!#(,009%9??EEIIYY>^^^9cYc}hh/sOsDtetxxɜ֜CpwrikAB3333333333333333333333333334>HgFeRr3PQ 9$9 =>??CmCnCCC)D*DDEEoGGIIKLgMgMMMMMM"N#NiNjNjNNNYYD^]^aabb?cXchhppp@qAqkqlqqqqrrrSrTrrrrrr-s-s5sNsJtdt::;;oop011nn))jjkk++,,}}@Bզ'st<=gJJ46WYY"$$MM1LL eeJJ>qrrt0;?N!0ABBgTammy L. TaylorK:\OM-EXO\ACS\ACS documents (directives and handbooks)\NOT signed ACS documents\Lifecycle Management (OCIO 1 106) 2005 11 17.docTammy L. Taylor\\WDCFB6FPR04\Groups\OM-EXO\ACS\ACS documents (directives and handbooks)\NOT signed ACS documents\Lifecycle Management (OCIO 1 106) 2005 12 02.docTammy L. Taylor\\WDCFB6FPR04\Groups\OM-EXO\ACS\ACS documents (directives and handbooks)\NOT signed ACS documents\Lifecycle Management (OCIO 1 106) 2005 12 02.docTammy L. Taylor\\WDCFB6FPR04\Groups\OM-EXO\ACS\ACS documents (directives and handbooks)\NOT signed ACS documents\Lifecycle Management (OCIO 1 106) 2005 12 02.docTammy L. Taylor\\WDCFB6FPR04\Groups\OM-EXO\ACS\ACS documents (directives and handbooks)\NOT signed ACS documents\Lifecycle Management (OCIO 1 106) 2005 12 02.docTammy L. Taylor\\WDCFB6FPR04\Groups\OM-EXO\ACS\ACS documents (directives and handbooks)\NOT signed ACS documents\Lifecycle Management (OCIO 1 106) 2005 12 02.docTammy L. Taylor\\WDCFB6FPR04\Groups\OM-EXO\ACS\ACS documents (directives and handbooks)\NOT signed ACS documents\Lifecycle Management (OCIO 1 106) 2005 12 02.docTammy L. TaylorK:\OM-EXO\ACS\ACS documents (directives and handbooks)\NOT signed ACS documents\Lifecycle Management (OCIO 1 106) 2005 12 02.doc kara.jagessarBC:\Documents and Settings\kara.jagessar\Desktop\acs_ocio_1_106.docsharon.robinsonC:\junk\ocio\acsocio1106.doc(TpPNJOVEs (/n2r\[ B8fbi 8XzD֞y9d~SB-HD/H*3v"6 ր'YW$Jr,$l-%2-tMM/.&{3D֞~5Jr_wT6vkX_7D֞l;D֞X#HtMdK` MN3 ND֞ocR_%V_D֞qPb$bmsctMxdJrT}eD֞PgD֞XiD֞L|kD/ReqD֞yyqi+w"0"&h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh 88^8`hH.h ^`hH.h  L ^ `LhH.h   ^ `hH.h xx^x`hH.h HLH^H`LhH.h ^`hH.h ^`hH.h L^`LhH.hh^h`B*OJ QJ o(ph4^`B*OJQJo(ph 88^8`B*OJ QJ o(ph4^`B*OJQJo(ph- ^`OJQJo( pp^p`OJQJo(   ^ `OJQJo( @ @ ^@ `OJQJo(   ^ `OJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh ^`hH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh88^8`OJQJo(hHh^`OJQJ^Jo(hHoh  ^ `OJQJo(hHh  ^ `OJQJo(hHhxx^x`OJQJ^Jo(hHohHH^H`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh ^`hH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h^`56hH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h ^`hH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h^`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJQJo(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJQJo(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh ^`hH.h pp^p`hH.h @ L@ ^@ `LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`hH.h PP^P`hH.h  L ^ `LhH.h ^`hH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh ^`hH.h pp^p`hH.h @ L@ ^@ `LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`hH.h PP^P`hH.h  L ^ `LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh ^`hH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh ^`hH.h pp^p`hH.h @ L@ ^@ `LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`hH.h PP^P`hH.h  L ^ `LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`56hH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh$^`5CJOJQJ^JaJo(hH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hH)M/.y9HyyqOVOV0% mscS/nl;dK,$NJxd'YW$~52-3vX#H"Xi _%V_qPbReq_wT6T}eocRXz M3TPgfbi 3 N+wX_7 -%L|k0a10^((                                                                        U0                                   006                                                                                          <                 4>p\& FG-/zy;""x$$'*V369E9b999[::w;>>>>>>>@@4@S@T@WAABBDDDEEF4F5FFoGHHIJ"JAJBJ8KKMNNYYYZZZ[2\\\^^^^^T__bbwcccccd&eifjfhhhiijjkkmmmmmSnnr.s/sqtrttttt(uuxx(7TstjpqЅ߅];opč~ (GHXg^4C`=ڲ۲''348]^bѶҶֶ56;cdhɷʷη?@FrswθϸҸ 78>klp>?Ccdh׺غ޺ !$56:UV[Իջٻ'(+459PQUnożVW ?@P$%>JK_ A ~opmn%&A();KdewYZl@AT rs?@W <=T_`g78UXY^tJ6Y$OPwxL ghLMwz.[mn456789:;<PQcde 678STUjkl`ab{|}  !VWXopq!"#;<=>?@ABCefxyz,-.>?@NOPhijklmnopq0@$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0@p(0@Unknown Norma.Fenwick matthew.caia Matthew CaiaTammy L. Taylorchristina.mourtoupal EPHMCCULLOUGH  Gz Times New Roman5Symbol3& z ArialI& ??Arial Unicode MSABook Antiqua71Courier5& z!Tahoma?5 z Courier New;Wingdings9 Webdings"1hڷ"۷ :$iWl!x0d" 2qHX7Lifecycle Management (LCM) DirectiveFramework (MS Word) kara.jagessarsharon.robinsonOh+'0, DP l x  8Lifecycle Management (LCM) DirectiveFramework (MS Word)kara.jagessarNormalsharon.robinson3Microsoft Word 9.0@0@ި@:e@ hk:$՜.+,D՜.+,d  hp|  i# 8Lifecycle Management (LCM) DirectiveFramework (MS Word) Title,N 8@ _PID_HLINKSAM0 Rhttp://ednethome/EDNetDocuments/General Access/GUIDE - TRB Process - V10_0_PA.pdfC7mailto:renaldo.harper@ed.gov8Fmailto:jerry.davis@ed.gov8Fmailto:jerry.davis@ed.gov8Fmailto:jerry.davis@ed.govO%mailto:steve.Allison@ed.gov*_mailto:wanda.davis@ed.gov>%http://wdcrobiis08/doc_img/ticol.dock!mailto:jeanne.vanvlandren@ed.govj mailto:joseph.rose@ed.gov\7mailto:sally.budd@ed.govJ;Ohttp://ednethome/EDNetDocuments/General Access/GUIDE - CCRB Process - V9_0.pdf75http://wdcrobiis09/doc_img/guide_ccrbprocessv9_0.pdf(Ymailto:manny.hernandez@ed.gov/_mailto:cynthia.bond@ed.govlBhttp://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doc\Xhttp://www.nist.gov/F.http://csrc.nist.gov/policies/FISMA-final.pdfz$<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfY*http://irm.cit.nih.gov/itmra/itmra96.htmlJ;Ohttp://ednethome/EDNetDocuments/General Access/GUIDE - CCRB Process - V9_0.pdflBhttp://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doc\Xhttp://www.nist.gov/F.http://csrc.nist.gov/policies/FISMA-final.pdfz$<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfY*http://irm.cit.nih.gov/itmra/itmra96.html=5http://connected.ed.gov/doc_img/itimprocessguide.docz$<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfz$<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfz$<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfz$<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfy}Ghttp://www.whitehouse.gov/omb/circulars/a11/current_year/a_11_2004.pdfYz*http://irm.cit.nih.gov/itmra/itmra96.htmlluBhttp://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doclsBhttp://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doclqBhttp://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.docz$k<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfz$i<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfz$g<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfz$e<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfYa*http://irm.cit.nih.gov/itmra/itmra96.htmlY_*http://irm.cit.nih.gov/itmra/itmra96.html \Rhttp://ednethome/EDNetDocuments/General Access/GUIDE - TRB Process - V10_0_PA.pdflYBhttp://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doc\XVhttp://www.nist.gov/FS.http://csrc.nist.gov/policies/FISMA-final.pdfM9http://thomas.loc.gov/cgi-bin/query/z?c107:H.R.2458.ENR:3*Kbhttp://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_bills&docid=f:h2458enr.txt.pdfz$I<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfz$G<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfYC*http://irm.cit.nih.gov/itmra/itmra96.htmlYA*http://irm.cit.nih.gov/itmra/itmra96.html\X=http://www.nist.gov/\X;http://www.nist.gov/F7.http://csrc.nist.gov/policies/FISMA-final.pdfF5.http://csrc.nist.gov/policies/FISMA-final.pdf19http://thomas.loc.gov/cgi-bin/query/z?c107:H.R.2458.ENR:3*/bhttp://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_bills&docid=f:h2458enr.txt.pdfz$)<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfz$'<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfz$%<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfz$#<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfY*http://irm.cit.nih.gov/itmra/itmra96.htmlY*http://irm.cit.nih.gov/itmra/itmra96.htmllBhttp://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doclBhttp://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doclBhttp://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.docF.http://csrc.nist.gov/policies/FISMA-final.pdfF .http://csrc.nist.gov/policies/FISMA-final.pdfF .http://csrc.nist.gov/policies/FISMA-final.pdfz$<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfz$<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfz$<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdflBhttp://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doclBhttp://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.docF.http://csrc.nist.gov/policies/FISMA-final.pdfF.http://csrc.nist.gov/policies/FISMA-final.pdfz$<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfz$<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfIP)http://www.usdoj.gov/04foia/privstat.htm\Xhttp://www.nist.gov/F.http://csrc.nist.gov/policies/FISMA-final.pdfL 1http://www.epic.org/privacy/education/ferpa.html9http://thomas.loc.gov/cgi-bin/query/z?c107:H.R.2458.ENR:3*bhttp://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_bills&docid=f:h2458enr.txt.pdfz$<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfY*http://irm.cit.nih.gov/itmra/itmra96.htmllBhttp://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.docF.http://csrc.nist.gov/policies/FISMA-final.pdfz$<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdflBhttp://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.docz$<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfF.http://csrc.nist.gov/policies/FISMA-final.pdflBhttp://wdcrobiis08/doc_img/SDLC Security Integration Guide v3.doc\Xhttp://www.nist.gov/F.http://csrc.nist.gov/policies/FISMA-final.pdfz$<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfY*http://irm.cit.nih.gov/itmra/itmra96.htmlY*http://irm.cit.nih.gov/itmra/itmra96.html\Xhttp://www.nist.gov/F.http://csrc.nist.gov/policies/FISMA-final.pdf9http://thomas.loc.gov/cgi-bin/query/z?c107:H.R.2458.ENR:z$<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfY*http://irm.cit.nih.gov/itmra/itmra96.html@F*http://connected1.ed.gov/po/ea/index.html Rhttp://ednethome/EDNetDocuments/General Access/GUIDE - TRB Process - V10_0_PA.pdfY*http://irm.cit.nih.gov/itmra/itmra96.html~=http://www.section508.gov/index.cfm?FuseAction=Content&ID=12Q{2http://www.arnet.gov/far/current/pdf/FAR.book.pdfYx*http://irm.cit.nih.gov/itmra/itmra96.html=r5http://connected.ed.gov/doc_img/itimprocessguide.doc\Xohttp://www.nist.gov/Fl.http://csrc.nist.gov/policies/FISMA-final.pdfz$i<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdf]Mf6http://www.whitehouse.gov/omb/circulars/a094/a094.pdfycGhttp://www.whitehouse.gov/omb/circulars/a11/current_year/a_11_2004.pdfY`*http://irm.cit.nih.gov/itmra/itmra96.htmlz$Z<http://www.whitehouse.gov/omb/circulars/a130/a130trans4.pdfTzW:http://www.whitehouse.gov/omb/circulars/a123/a123_rev.pdfYT*http://irm.cit.nih.gov/itmra/itmra96.html<M_Toc113160820<G_Toc113160819<A_Toc113160818<;_Toc113160817<5_Toc113160816</_Toc113160815<)_Toc113160814<#_Toc113160813<_Toc113160812<_Toc113160811<_Toc113160810< _Toc113160809<_Toc113160808*_ mailto:wanda.davis@ed.gov%Ymailto:joe.rose@ed.govwmEdseal  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXZ[\]^_`bcdefghijklmnopqrstuvwxyz{|}~Root Entry FP|kData + 1TableeWordDocumentTSummaryInformation(YDocumentSummaryInformation8aOCompObjjObjectPoolP|kP|k  FMicrosoft Word Document MSWordDocWord.Document.89q