ࡱ> FJ?@ABCDE 7bjbj .cc >">"/////T///01 /(zT>T>4>>>e@SBBLyyyyyyy$ }y/HC@"e@HHy//>>y,N,N,NH/>/>y,NHy,N,Ntlx>&K?v*yy0(zivtDLtTxt/x3CCD,NEE3C3C3Cyy>M3C3C3C(zHHHHt3C3C3C3C3C3C3C3C3C>" ^.: Attachment 3: Report Template for IV&V Reviews The attached template is used by service providers to report on Independent Verification and Validation Reviews for major IT projects. This template will be included as Attachment 3 in all SOWs sent to providers or potential providers. Please note that the attached sample has fictitious information that must be updated with pertinent project data This page intentionally left blank. Commonwealth of Virginia  Report on the (Enter Type of IV&V Review) Independent Verification and Validation (IV&V) Review Of (Enter name of major it project) (Enter Date of Report) (Enter Name of Agency) Table of Contents Executive Summary The Commonwealth of Virginia Information Technology (IT) Resource Management Policy for Technology Management requires the implementation of an Independent Verification and Validation (IV&V) Strategy for all Major IT Projects. At the direction of Secretary of Technology and the Chief Information Officer (CIO), the VITA Project Management Division (PMD) was directed to include specific guidance and requirements for the IV&V of Major IT Projects in COV ITRM Standard GOV2004 - 02.3.2, Project Management, dated November 29, 2010, and to develop and implement an IV&V Review Program for Major IT Projects in support of the Project Management Standard. An essential component of the IV&V Review Program is the presentation of IV&V Review Reports of all Major IT Projects. This is the (Enter Type of IV&V Review) Report of the (Enter Major IT Project Name) Project IV&V Review. Background Information Project Title: (Enter the Major IT Project Name) Agency: (Enter the Sponsoring Agencys Name) IV&V Service Provider: (Enter the IV&V Service Provider Company Name) Date of IV&V: (Enter the dates of the IV&V Review) Planned Start Date: (Enter the date the Major IT Project was planned to begin) Planned (Baseline) Completion Date: (Enter the date the Major IT Project was originally planned to end, as reflected on the Commonwealth Major IT Project Status Report Dashboard) Estimated Completion Date: (Enter the date the Major IT Project is currently expected to end, as provided by current Project Management) Estimated (Baseline) Total Project Cost: (Enter the original estimated cost of the Major IT Project, as provided by current Project Management) Actual Cost-to-Date: (Enter the actual cost-to-date of the Major IT Project, as provided by current Project Management) Project Summary The objectives and scope of the (Enter the Major IT Project Name) Project, currently in the (Enter the current phase (e.g., initiation, planning, execution and control, closeout) of the Major IT Project) phase, are to (Provide a short narrative description of the objectives and scope statements from the Baseline Information section of the Project Background section of the Commonwealth Major IT Project Status Report Dashboard entry for the Major IT Project. Include in the narrative the major motivating factors behind the Major IT Project, as well as, the major benefits that are to be realized through the completion of the Major IT Project. An example of such a Project Summary narrative is provided below. ) (The objective and scope of the WebDMS Project, currently in the late stages of the Execution and Control phase, is to create a new web-based document management application that will replace an existing and antiquated DEC-based Document Management System (DMS). Maintaining the existing DEC machines is becoming increasingly difficult and expensive. As a result, the agency has decided to replace the existing DMS with more up-to-date and flexible technology, that is, a Web and Oracle-based system employing a Graphical User Interface to the users of the system. The new system will be known as WebDMS (Web-based Document Management System). The WebDMS system will have, as a minimum, the same functionality as the current DMS system. The DMS system is an automated document management system that links all of the VABC locations statewide.) Summary of Findings Findings can be positive or negative. Positive findings can be further designated a Best Practice, i.e. noteworthy actions or processes that should be shared with all Commonwealth IT projects. Negative findings are categorized as Major or Minor findings. Major findings are findings of the absence of a technological, management or financial process or breakdown of a process that may result in the failure of the project or seriously impact its schedule, fiscal status or public image. Minor findings are single observed lapses or isolated incidents where technological, management, or financial processes are not following the approved processes. A Minor finding has minimal risk of causing a serious impact to a project schedule, fiscal status or public image. (Provide a short narrative summary of the findings from the IV&V Review. Provide positive and negative findings in separate paragraphs. Major findings should be addressed first in the negative findings summary. Not all Minor findings need to be summarized. If the IV&V Review is one in a series of previous IV&V Reviews, include in the narrative a comparison of the findings of the current IV&V Review with those of the previous IV&V Reviews. An example of such a Summary of Findings narrative is provided below. ) (The WebDMS Project has encountered a number of challenges over the past three years that have caused the scheduled implementation of the new system to slip significantly. Despite the projects shortcomings in planning and process, the project is in the final stages of implementation. The project will go into production in early 2004. Additionally, the user community is excited and anxious to make use of the new technology contained in the new system. The WebDMS Project is also likely to come in under budget. Many of the Minor findings from this third In-Progress IV&V Review continue to highlight opportunities for VABC Major IT Project management process improvement that may not be addressable in the WebDMS Project, given it is in the later stages of the execution and control phase of the project, but do provide good lessons learned for future VABC Major IT Projects. Correspondingly, the recommendations associated with these findings have been categorized into short- and long-term recommendations. The short-term recommendations will help ensure that the WebDMS project concludes successfully, and the long-term recommendations are aimed at improving the performance and effectiveness of future VABC Major IT Projects. Many of the challenges faced by the WebDMS Project Team over the course of the two-year lifecycle of the project can be attributed to two main issues: Not establishing a Project Steering Committee, and Not spending sufficient time defining requirements and planning the project. First, the lack of a Project Steering Committee has resulted in limited governance and oversight of the projects progress, no defined issue escalation processes or procedures, no change control processes or procedures, and no formal communications between the WebDMS Project Management Team and the agency stakeholders. Regular project status reporting was occurring between WebDMS Project Management and VABC IT Management, however, information was not always being communicated to the agency stakeholders. Second, not spending sufficient time to fully understand and define the system requirements resulted in the WebDMS Project Team initially underestimating the complexity of the project and consequently underestimate the resources needed to complete the project, as well as, the amount of time needed to develop, implement, and test the new system. A WebDMS Project Plan was initially developed to manage the WebDMS Project. However, since November 2002 the WebDMS Project Plan has not been followed nor updated. Over the past year, an informal project calendar methodology has been used by the WebDMS Project Team to manage the project. This informal management of project activities makes it difficult to communicate project status, track progress, and plan and communicate activities among members of the WebDMS Project Team and between the Project Team and VABC IT Management. Additionally, there is no comprehensive set of metrics (e.g. schedule variance, number of high importance defects/bugs identified, number of users trained versus target, etc.) being tracked so that an objective view of the projects overall status can be portrayed. Apart from User Acceptance Testing (UAT), there are no formal, independent quality assurance processes in place for the WebDMS Project. Developers are individually responsible for providing technical oversight, which immediately leads to a conflict of interest and leaves all independent testing to the users. IT Quality Assurance is undermined by not having a Software Quality Assurance (SQA) function to review the work of the WebDMS Project Team (e.g. develop and execute system and integration test scripts, review project documentation and code, assess project management practices, etc.). The lack of a SQA function within the WebDMS Project may be an indicator of a more systemic deficiency within VABC IT management and could impact other VABC IT projects as well. Although, some effort has gone into operations support planning, no formal Operations Support Plan has been developed. Given that the VABC IT organization does not have an application support group, the WebDMS Project Team will be required to continue to support the WebDMS application after it goes into production, which could lead to conflicts over work priorities (e.g. new project work versus WebDMS support). The need for project team members to provide ongoing operational support of an system once it is fielded may be an indicator of a more systemic deficiency within VABC IT management and could impact other VABC IT projects and VABC IT resources.) Summary of Analysis (Provide a short narrative summary of the analysis performed on the findings from the IV&V Review. If the IV&V Review is one in a series of previous IV&V Reviews, include in the narrative a comparison of the analysis of the findings of the current IV&V Review with the analyses of findings for the previous IV&V Reviews. An example of such a Summary of Analysis narrative is provided below. ) (The WebDMS project has missed its original schedule, changed scope, and failed to fully account for cost. The project is in the final stages of the Execution and Control Phase and current indications are that the project will closeout in April 2004. The Commonwealth Major IT Project Status Report Dashboard clearly identifies that the WebDMS Project is Yellow for schedule and scope. The WebDMS Project has been in an overall Yellow status since January 2003. The WebDMS Project Plan also lacks a Risk Management Plan and a Quality Management Plan. The WebDMS Project Team should implement a few positive and cost effective measures. Suspension of the project would gain little at this stage of the WebDMS Project lifecycle. The WebDMS Project Team needs to establish a revised Project Schedule and VABC IT Management needs to exercise intensive oversight of the WebDMS Project during the final implementation phase. The Third In-Progress IV&V Review identified a number of immediate actions that should be implemented by the WebDMS Project Team. The response of VABC IT Management indicates that they have begun addressing the revision of the Project Schedule and are reviewing measures that they can take to address the remaining IV&V Review recommendations.) Summary of Recommendations (Provide a bulleted list of the primary recommendations resulting from the IV&V Review. An example of such a Summary of Recommendations is provided below. ) VABC (WebDMS Project Team) develop a detailed project schedule, covering both business and technical responsibilities, for the final months of the project and update the Commonwealth Major IT Project Status Report Dashboard. VABC (WebDMS Project Team) identify business and technical risks that may affect the WebDMS Project over the final months of the execution and control phase and update the current risk status on the Commonwealth Major IT Project Status Report Dashboard. VABC (WebDMS Project Team) document scope changes to the WebDMS Project. VABC (WebDMS Project Team) develop a Transition Plan to move WebDMS from its current project status into operational support by January 31, 2004.) Summary of Best Practices (Provide a short summary of the processes, practices, or systems identified during the review that performed exceptionally well. These processes, practices, or systems can be used in other organizations.) Summary of Lessons Learned (Provide a bulleted list of the primary lessons learned gathered from the IV&V Review. An example of such a Summary of Lessons Learned is provided below. These lessons come from working with or solving real-world problems. Lessons learned identify problems and solutions to problems. Collecting and disseminating lessons learned helps to eliminate the occurrence of the same problems in future projects. Lessons learned are negative with respect to identifying process, practice, or systems to avoid in specific situations, or can be positive with respect to identification of solutions to problems when they occur). One of the nine Demonstration sites purchased third party equipment w/ delivery occurring 1 week prior to phase. The lessons learned are: Hardware and/or BIOS specifications identified and published. 1) Allocate realistic time to test equipment. 2) Hold vendor responsible and accountable for error. Introduction The Commonwealth of Virginia Information Technology (IT) Resource Management Policy for Technology Management requires the implementation of an Independent Verification and Validation (IV&V) Strategy for all Major IT Projects. At the direction of the Secretary of Technology (SoTech) and the Chief Information Officer (CIO), the VITA Project Management Division (PMD) was directed to include specific guidance and requirements for the IV&V of Major IT Projects in COV ITRM Standard GOV2004 - 02.3.2, Project Management, dated November 29, 2010, and to develop and implement an IV&V Review Program for Major IT Projects in support of the standard. An essential component of the IV&V Review Program is the conduct of IV&V Review Reports of all Major IT Projects. This (Enter Type of IV&V Review) of the (Enter Major IT Project Name) Project is such an IV&V Review Report. In accordance with the (Enter Major IT Project Name) IV&V Plan, this is the (Enter numerical sequence number) IV&V Review in a series of (Enter the total number of IV&V Reviews for the Major IT Project) IV&V Reviews that will be conducted for the (Enter Major IT Project Name)Project. The IV&V Schedule for the (Enter Major IT Project Name) Project is shown below: (Insert the first two columns (i.e., Activity and Scheduled Date or Phase) of the Independent Verification and Validation Schedule contained in Section 2 of the IV&V Plan. An example of such an IV&V Plan extract is provided below.) ActivityScheduled Date or PhaseDevelop IV&V Plan11-March-05Detailed Project Plan IV&V Review21-March-05 User Acceptance Test Planning IV&V Review29-March-05First In-progress IV&V Review15-April-05 Deployment Plan IV&V Review27-July-05 User Acceptance Test Report IV&V Review8-August-05Second In-progress IV&V Review19-August-05 Deployment Report IV&V Review12-September-05 Final Acceptance Report IV&V Review20-October-05Third In-progress IV&V Review28-October-05Closeout IV&V Review31-January-06 Background The (Enter Type of IV&V Review) IV&V Review for the (Enter Major IT Project Name) was conducted on (Enter the dates of the IV&V Review) at the (Enter the Sponsoring Agencys Name) offices at (Enter the address of the location where the work was performed). The IV&V Review Team consisted of: (Enter IV&V Review Team Members Name) (Enter Company Name) (Enter IV&V Review Team Members Name) (Enter Company Name) (Enter IV&V Review Team Members Name) (Enter Company Name) Key personnel from the (Enter Major IT Project Name) Project Management Team and the (Enter Sponsoring Agencys Name) participated in the (Enter Type of IV&V Review) IV&V Review of the (Enter Major IT Project Name). These agency personnel participating in the IV&V Review were as follows: (Enter Name of Agency Representative) (Enter Agency Representatives Title) (Enter Name of Agency Representative) (Enter Agency Representatives Title) (Enter Name of Agency Representative) (Enter Agency Representatives Title) (Enter Name of Agency Representative) (Enter Agency Representatives Title) (Enter Name of Agency Representative) (Enter Agency Representatives Title) (Enter Name of Agency Representative) (Enter Agency Representatives Title) (Enter Name of Agency Representative) (Enter Agency Representatives Title) (Enter Name of Agency Representative) (Enter Agency Representatives Title) (Enter Name of Agency Representative) (Enter Agency Representatives Title) (Enter Name of Agency Representative) (Enter Agency Representatives Title) (Enter Name of Agency Representative) (Enter Agency Representatives Title) (Enter Name of Agency Representative) (Enter Agency Representatives Title) Methodology The (Enter Type of IV&V Review) IV&V Review of the (Enter Major IT Project Name) Project was conducted in accordance with the (Enter Type of IV&V Review) Project IV&V Plan. The IV&V Task Items were accomplished through a combination of interviews and documentation reviews. A list of the personnel contacted is provided in Attachment 1 and a list of the documents reviewed is provided in Attachment 2. The accomplishment of the IV&V Task Items resulted in the generation of detailed Findings for each IV&V Task Items and, where necessary, the development of Recommendations for corrective and/or improvement actions. The Detailed Findings and Recommendations of the (Enter Type of IV&V Review) IV&V Review of the (Enter Major IT Project Name) Project are provided in Attachment 3. Attachment 4 provides a list of Best practices observed during Review(s). Attachment 5 provides a detailed list of Lessons Learned to date for this project. Finally, the IT Project Complexity Model presented as Appendix A of COV ITRM Standard GOV2004 - 02.3.2, Project Management, dated November 29, 2010 was updated/re-accomplished for the (Enter Major IT Project Name) Project. The updated/re-accomplished model is provided in Attachment 6. Appendix 1: List of Personnel Contacted The List of Personnel Contacted identifies the individuals who provided informational inputs to the (Enter Major IT Project Name) Project (Enter Type of IV&V Review) IV&V Review. NumberNameTitle/PositionOrganization1234567891011121314151617181920 Appendix 2: List of Documents Reviewed The List of Documents Reviewed identifies the documents that were reviewed as part of the (Enter Major IT Project Name) Project (Enter Type of IV&V Review) IV&V Review. NumberDocument/Data Title/Description1234567891011121314151617181920 Appendix 3: Detailed Findings and Recommendations Table The Detailed findings and Recommendations Table provides the detailed findings and recommendations developed during the (Enter Major IT Project Name) Project (Enter Type of IV&V Review) IV&V Review for each of the IV&V Review Areas and Tasks specified in the agency Statement of Work. (Specified in Attachment 1 and 2 of the SOW). Not reviewed per SOW, is entered in the findings column for task not specified in the SOW. (Selected examples of findings and recommendations narratives are provided below.) Review AreaTask ItemTask DescriptionFindingsRecommendationsFeasibility StudiesFS-1Assess the methodologies used for the technical feasibility study verifying it was objective, reasonable, measurable, repeatable, consistent, accurate and verifiable.Not Reviewed per SOW FS-2Assess the methodologies used for the economic feasibility study verifying it was objective, reasonable, measurable, repeatable, consistent, accurate and verifiable.Not Reviewed per SOWBusiness CaseBC-1Review and evaluate the Business Case for the project to assess its reasonableness.ProcurementPROC-1Verify that the procurement strategy supports Agency and Commonwealth project objectives.PROC-2Review and make recommendations on the solicitation documents relative to their ability to adequately inform potential vendors about project objectives, requirements, risks, etc.PROC-3Verify that the evaluation criteria are consistent with project objectives and evaluation processes are consistently applied; verify all evaluation criteria are metrics based and clearly articulated within the solicitation documents.PROC-4Verify that the obligations of the vendor, sub-contractors and external staff (terms, conditions, statement of work, requirements, technical standards, performance standards, development milestones, acceptance criteria, delivery dates, etc.) are clearly defined. This includes verifying that performance metrics have been included that will allow tracking of project performance and progress against criteria set by the agency and the Commonwealth.PROC-5Verify the final contract for the vendor team states that the vendor will participate in the IV&V process, being cooperative in the coordination and communication of information.Project ComplexityPC-1Verify that the assigned project complexity level is current and accurate. If the project complexity level is not current and/or accurate, then reassign a project complexity level to the project. Project SponsorshipPS-1Assess agency sponsor buy-in, participation, support and commitment to the project.Positive Finding: Bill Williams and Debbie Black are the project sponsors and understand their roles well (e.g., provide visible leadership and resources, remove barriers, etc.). The sponsors are co-located on the same floor as the project team that aids communication and fosters executive involvement. Positive Finding: Bill is the project champion and owner. He is very involved in the decision-making process and very bought-in to the need for the database conversion. Bill has faith in his team and confidence in their ability to execute. Positive Finding: Debbie, as the technical sponsor, has been deeply involved in all aspects of the project. She attends weekly status meetings. She is very supportive of the project team. She delivers hard messages to the staff as required (when additional effort needs to be exerted). Positive Finding: The project team appears to be a high performing work team working hard and enjoying the challenges presented schedule and on budget. The project management team should continue strong and active sponsor support and engagement as has been demonstrated throughout this project. Bill and Debbie have mandated that this project maintain a low technical risk profile.PS-2Verify that open pathways of communication exist among all project stakeholders. PS-3Verify that agency sponsor has bought-in to all changes that impact project scope, cost, schedule or performance.Management AssessmentMA-1Verify that lines of reporting and responsibility provide adequate technical, financial and managerial oversight of the project. Positive Finding: Lines of reporting appear to be clearly documented and followed allowing for optimal productivity: Jerry Riggs (DDD IT) is responsible for all contract management and financial oversight. Mark Phillips (DDD IT) and Bill Jones (Contractor) are responsible for all managerial and technical oversight. Mark and Bill work hand-in-hand on all aspects of the project implementation. Positive Finding: Financial management appears to be comprehensive, structured, disciplined and well defined. The Contractors payment schedule is clearly defined against deliverables. Vendor payments are not based on effort or schedule but only on successful acceptance of completed deliverables. DDD uses a time tracking system to track actual internal time against planned project time. Internal time management is for tracking staff commitment and for historical costing only as there is no internal resource budget for this project. DDD should ensure that the current oversight structure remains in place and is operational until the final delivery of the system by the contractor. After handover of the system, DDD should evaluate and establish the appropriate oversight structure to facilitate and support on-going maintenance activities and future development initiatives. MA-2Evaluate project progress, resources, budget, schedules, and reporting.MA-3Assess coordination, communication and management, to verify agencies and departments are not working independently of one another.Project ManagementPM-1Verify that a project management plan exists and that the plan is being followed.Positive Finding: A detailed project plan exists and the plan is being closely followed. Given that the project team is using the contractors implementation methodology, the project plan is defined and documented in the contractors re-engineering plan. Positive Finding: Microsoft Project is being used to track all aspects of the project plan including tasks, resources, and costs so that variations can be identified and managed closely. Positive Finding: Jerry Riggs is very skilled with Microsoft Project and uses it to generate most of the projects reporting.The project team should continue the execution and maintenance of the existing project management plan.PM-2Evaluate the project management plan maintenance procedures to verify that they are developed, communicated, implemented, monitored and complete.PM-3Evaluate project reporting processes and procedures and actual project reports to verify that project status is being accurately traced using project metrics.PM-4Verify that milestones and completion dates are planned, monitored, and met.PM-5Verify the existence and institutionalization of an appropriate project issue tracking mechanism that documents issues as they arise, enables communication of issues to proper stakeholders, documents a mitigation strategy as appropriate, and tracks the issue to closure.PM-6Evaluate the status of the schedule being reported for the project on the Commonwealth Major IT Project Status Report Dashboard.PM-7Verify that the Critical Path Milestones described for the project on the Commonwealth Major IT Project Status Report Dashboard are those approved by Agency Management, including the date when the Critical Path Milestones received approval from Agency Management.PM-8Evaluate the systems planned life-cycle development methodology or methodologies (waterfall, evolutionary spiral, rapid prototyping, incremental, etc.) to see if they are appropriate for the system being developed. PM-9Evaluate the status of each Measure of Success being reported for the project on the Commonwealth Major IT Project Status Report Dashboard. PM-10Verify that the Measures of Success for the project incorporate input from the systems users and customers.PM-11Verify that the Internal Agency Oversight Committee (IAOC) has approved the Measures of Success, including the date when the Measures of Success received approval from the IAOC. PM-12Determine if the project has remained within its approved scope.PM-13For each change in the approved scope of the project verify the date the change was approved and by whom. PM-14For each change in the approved scope of the project, evaluate the description of the change, the reason for the change, and the impact of the change, particularly on the cost and schedule baselines of the project.Business Process ReengineeringBPR-1Evaluate the projects ability and plans to redesign business processes to achieve improvements in critical measures of business performance, such as cost, quality, service, and speed. BPR-2Verify that the reengineering plan has the strategy, management backing, resources, skills and incentives necessary for effective change.BPR-3Verify that resistance to change is anticipated and prepared for by using principles of change management at each step (such as excellent communication, participation, incentives) and having the appropriate leadership (executive pressure, vision, and actions) throughout the reengineering process.Risk ManagementRM-1Verify that risk management processes and procedures exist and are being followed. Evaluate the projects risk management processes and procedures to verify that risks are identified and quantified and that mitigation plans are developed, communicated, implemented, monitored, and complete.Minor Finding: A high-level risk management plan is included in the contractors reengineering plan. The reengineering plan is a comprehensive document but does not go into the same level of detail that is outlined in the VITA templates. Minor Finding: Risks have not been differentiated from issues to-date. As a result, risk management has been handled tactically on this project and focused more on the technical aspects. Strong communications across a small and high performing project team has made this work up to this point; however, this approach is susceptible to breakdowns and lends itself more to reactionary risk management. Positive Finding: Overall, the project has a relatively low technical risk profile: The contractor has done this type of work a number of times with other customers. There are no new or additional business requirements. This project should be transparent to the end users. The project team should develop a formal and detailed Risk Management Plan to enable more active management of risks and risk mitigation plans including costs. The project team should conduct a monthly QA review session to review all closed and outstanding issues, risks and associated action plans/mitigation plans with the project sponsor (i.e., Connie White) to ensure that issues and risks are closely managed and communicated in the late stages of this project.RM-2Verify that a list of risk events is maintained and that the probability of occurrence and impact are measured for each event.RM-3Verify that a mitigation approach has been documented for each risk event listed.RM-4Determine if any risk events have been dropped from the list and the reason why.RM-5Verify that the top five risk events identified for the project are those being reported for the project on the Commonwealth Major IT Project Status Report Dashboard.RM-6Verify that the Internal Agency Oversight Committee (IAOC) has reviewed the project Risk Assessment(s), including the date(s) when the Risk Assessment(s) were reviewed by the IAOC.Change ManagementCHM-1Verify that change management processes and procedures exist and are being followed. Evaluate the projects change management processes and procedures to verify they are developed, communicated, implemented, monitored, and complete. Minor Finding: No Change Management Plan has been completed; however, given the limited scope of the project (one agency, one department and no impact on end-users), a formal Change Management Plan may be of limited benefit. A Communications Plan has been defined and is being executed to ensure all stakeholders are properly and adequately informed. End users will see no noticeable change in how the system looks or feels, and, as a result, communication to end-users has been limited. District Managers are provided updates every three weeks. DDD should include people-focused change management plans in all future system development activities that impact end users. Future initiatives that are founded on this new platform will likely impact end-users dramatically. CHM-2Evaluate the projects organizational change management processes and procedures to verify that organizational resistance to change is anticipated and prepared for.Communication ManagementCOM-1Verify that communication processes and procedures exist and are being followed. Evaluate the projects communication processes and procedures to verify they support communications and work product sharing between all project stakeholders; and assess if communication plans and strategies are effective, implemented, monitored and complete.Configuration ManagementCM-1Review and evaluate the configuration management (CM) processes and procedures associated with the development process. Verify that configuration management (CM) processes and procedures exist and are being followed. Evaluate the projects configuration control processes and procedures to verify that they are effective, implemented, monitored and complete.CM-2Verify that all critical development documents, including but not limited to requirements, design, code and test are maintained under an appropriate level of control.Minor Finding: Unlike code configuration management, there is no defined project documentation control process, which could lead to document revision issues (i.e., which version is current or most updated). The DSS and Sogeti project managers own all project planning documentation to maintain version control and updates. Documents are maintained on a shared drive under a structured set of project directories with secured access. All project planning documentation is also maintained under a version control tool (PVCS) and is manually updated monthly to facilitate project archiving. The project team due to training issues is not using PVCS. User acceptance scripts are maintained on the server (Word and Excel based). Microsoft SharePoint (a document management tool) is now being installed and will likely be used on future projects in order to better enable and automate document management.DDD should work with VITA to specify and procure a mainframe-based software configuration management tool that integrates with the software development environment. This tool should be used as the application moves into production and for future maintenance/development. A formal document control process should be evaluated and implemented for all project-related documentation. PVCS or SharePoint should be considered as potential tools.CM-3Verify that the processes and tools are in place to identify code versions and to rebuild system configurations from source code.CM-4Verify that appropriate source and object libraries are maintained for training, test, and production and that formal sign-off procedures are in place for approving deliverables.CM-5Verify that appropriate processes and tools are in place to manage system changes, including formal logging of change requests and the review, prioritization and timely scheduling of maintenance actions.CM-6Verify that mechanisms are in place to prevent unauthorized changes being made to the system and to prevent authorized changes from being made to the wrong version.CM-7Review the use of CM information (such as the number and type of corrective maintenance actions over time) in project management.Project Estimating and SchedulingPES-1Evaluate the estimating and scheduling process of the project to ensure that the project planning assumptions, budget and resources are adequate to support the work-breakdown structure and schedule.PES-2Examine historical data and data sources to determine if the project team has accurately estimated the schedule, labor requirements and cost of product, service or system development efforts.PES-3Examine historical data and data sources to determine if the project has been able to accurately apply Earned Value Management to the project.Minor Finding: Earned value is calculated monthly using the data contained in the Microsoft Project plan: Task completion is the baseline for DDD earned value analysis. Tasks are only considered 0%, 50% or 100% complete (i.e., the PMI 50% rule) to ensure that task completion is more objective. Deliverable completion is the baseline for Sogeti earned value analysis. Portions of the plan were re-baselined due to schedule changes after the programming language change decision, but the overall end date of the project was not changed.The project team should continue to report project performance. DDD should document the lessons learned/best practices from the project for use in future development efforts.PES-4Examine historical data and data sources to determine if the project has been able to accurately accumulate the actual costs of tasks completed for the project.PES-5Examine historical data and data sources to determine if the project has been able to accurately determine the earned value of tasks completed for the project.PES-6Examine historical data and data sources to determine if the project has been able to accurately accumulate the budgeted cost/planned value of tasks for the project.PES-7Examine historical data and data sources to determine if the project has been able to accurately calculate Schedule Variance.Minor Finding: Schedule variance is tracked in Microsoft Project. The project is on schedule and, in earned value terms, has a Schedule Variance of $0 (this only reflects contractor costs which are based on the deliverable schedule which is defined in the project plan and covered under the fixed price contract). Parts of the schedule have been re-baselined, but, due to the ability to complete certain tasks concurrently, the overall project end date has not changed. Individual milestones have been adjusted as necessary to deal with issues or resource availability.DDD should continue to conduct earned value analysis and actively report on project performance per the communication plan. PES-8Examine historical data and data sources to determine if the project has been able to accurately calculate Cost Variance.PES-9Compare and evaluate the status of the planned and actual costs being reported for the project on the Commonwealth Major IT Project Status Report Dashboard.PES-10Validate that the Planned Costs To Date reflected for the project on the Commonwealth Major IT Project Status Report Dashboard are the same as those approved by the Internal Agency Oversight Committee.PES-11Validate the Actual Costs To Date figures reported for the project on the Commonwealth Major IT Project Status Report Dashboard.PES-12Evaluate the nature and amount of cost variance between the budgeted and actual costs to the project to date.PES-13Verify that Internal Agency Oversight Committee (IAOC) approved the Planned Costs for the Project, including the date when the Planned Costs received approval from the IAOC.Project PersonnelPP-1Examine the job assignments, skills, training and experience of the personnel involved in program development to verify that they are adequate for the development task. PP-2Evaluate the projects personnel planning for the project to verify that adequate human resources will be available for development and maintenance.PP-3Evaluate the projects personnel policies to verify that staff turnover will be minimized.Project OrganizationPO-1Verify that lines of reporting and responsibility provide adequate technical, financial and managerial oversight of the project. PO-2Verify that the projects organizational structure supports training, process definition, risk management, quality assurance, configuration management, product testing and any other functions critical for the projects success.Contractors and External StaffCES-1Evaluate the use of contractors or other external sources of project staff (such as IS staff from another State organization) in project development. CES-2Verify that the obligations of contractors and external staff (terms, conditions, statement of work, requirements, standards, development milestones, acceptance criteria, delivery dates, etc.) are clearly defined. CES-3Verify that the contractors software development methodology and product standards are compatible with the systems standards and environment. Positive Finding: DDD has adopted the contractors waterfall implementation methodology and processes for this project. The contractor methodology and templates map closely to VITA PMD standards and have provided significant structure and discipline to the implementation. The project team should continue to leverage the contractor implementation methodology for the remainder of this project.CES-4Verify that the contractor has and maintains the required skills, personnel, plans, resources, procedures and standards to meet their commitment. This will include examining the feasibility of any offsite support of the project.CES-5Verify that any proprietary tools used by contractors do not restrict the future maintainability, portability, and reusability of the system.Oversight of ContractorsOC-1Verify that project management oversight of contractors is provided in the form of periodic status reviews and technical interchanges.OC-2Verify that the project management has defined the technical and managerial inputs the contractor needs (reviews, approvals, requirements and interface clarifications, etc.) and has the resources to supply them on schedule.OC-3Verify that the project management staff has the ultimate responsibility for monitoring project cost and schedule.Quality ManagementQM-1Evaluate and make recommendations on the projects quality assurance (QA) processes, procedures and organization.Minor Finding: DDD has a System Quality Assurance (SQA) group within DDD IT, but they have not been involved with this project to date due to other project commitments. It should be noted that the project team has attempted to engage the SQA group repeatedly over the course of the project to gain an independent view of the projects health. SQA involvement will continue to be sought until the project is complete.The project team and sponsors should continue to reach out to the SQA group and insist on the groups involvement over the final months of the project. Regardless, on future development projects, DDD should ensure the involvement of the SQA group to provide in-house oversight and independent quality assurance.QM-2Verify that QA has an appropriate level of independence from project management. QM-3Verify that the QA organization monitors the fidelity of all defined processes in all phases of the project. QM-4Verify that the quality of all products produced by the project is monitored by formal reviews and sign-offs.QM-5Verify that project self-evaluations are performed and that measures are continually taken to improve the process.QM-6Monitor the performance of the QA contractor by reviewing its processes and reports and performing spot checks of system documentation; assess findings and performance of the processes and reports.QM-7Verify that QA has an appropriate level of independence. Evaluate and make recommendations on the projects Quality Assurance plans, procedures and organization.QM-8Verify that the QA vendor provides periodic assessment of the CMM activities of the project and that the project takes action to reach and maintain the next CMM Level.QM-9Evaluate the mechanisms that are in place for project self-evaluation and process improvement.Process Definition and Product StandardsPDPS-1Review and make recommendations on all defined processes and product standards associated with the system development. PDPS-2Verify that all major development processes are defined and that the defined and approved processes and standards are followed in development.PDPS-3Verify that the processes and standards are compatible with each other and with the system development methodology. PDPS-4Verify that all process definitions and standards are complete, clear, up-to-date, consistent in format, and easily available to project personnel.User Training and DocumentationUTD-1Review and make recommendations on the training provided to product users. Verify that sufficient knowledge transfer occurs for the maintenance and operation of the new product.UTD-2Verify that training for users is instructor-led and hands-on and is directly related to the business process and required job skills.UTD-3Verify that user-friendly training materials and help desk services are easily available to all users.UTD-4Verify that all necessary policies, processes, and documentation are easily available to users.UTD-5Verify that all training is given on time and is evaluated and monitored for effectiveness, with additional training provided as needed.Developer Training and DocumentationDTD-1Review and make recommendations on the training provided to system developers. DTD-2Verify that developer training is technically adequate, appropriate for the development phase, and available at appropriate times.DTD-3Verify that all necessary policies, processes and standards documentation are easily available to developers.DTD-4Verify that all training is given on time and is evaluated and monitored for effectiveness, with additional training provided as needed.Requirements ManagementREQ-1Evaluate and make recommendations on the projects process and procedures for managing requirements. REQ-2Verify that system requirements are well defined, understood, and documented. Positive Finding: System requirements were well documented in the RFP. This project is strictly a system infrastructure project and will have no impact on end-users. Lower-level technical requirements have been dealt with as the project has progressed and technical issues have arisen. Technical issues are being tracked and managed in the Complexity Analysis and Solution Design Guide (CASDG).DDD should establish a more rigorous technical specification process for future development efforts.REQ-3Evaluate the allocation of system requirements to hardware and software requirements.REQ-4Validate that software requirements can be traced through design, code and test phases to verify that the system performs as intended and contains no unnecessary software elements. REQ-5Validate that the relationships between each software requirement and its system requirement are correct.REQ-6Verify that requirements are under formal configuration control.Security and Privacy RequirementsSPR-1Evaluate and make recommendations on project policies and procedures for ensuring that the system is secure and that the privacy of client data is maintained. SPR-2Evaluate the projects restrictions on system and data access.SPR-3Evaluate the projects security and privacy risk analyses.SPR-4Verify that processes and equipment are in place to back up client and project data and files and archive them safely at appropriate intervals.Requirements AnalysisRA-1Verify that an analysis of user needs and objectives has been performed to verify that requirements of the system are well understood, well defined, and satisfy any regulatory requirements. N/A No changes that affect the end user are included in this project. The existing underlying system is being reengineered into a new technology platform and tool set. The system changes will be transparent to the end user.N/ARA-2Verify that all stakeholders have been consulted to the desired functionality of the system, and that users have been involved in prototyping of the user interface. RA-3Verify that all stakeholders have agreed to all changes that impact project cost, schedule or performance.RA-4Verify that performance requirements (e.g. timing, response time and throughput) satisfy user needs.RA-5Verify that users operations and maintenance requirements for the system are completely specified.Interface RequirementsIR-1Verify that all system interfaces are exactly described, by medium and by function, including input/output control codes, data format, polarity, range, units, and frequency. IR-2Verify those approved interface documents are available and that appropriate relationships (such as interface working groups) are in place with all agencies and organizations supporting the interfaces.IR-3Verify that all external and internal system and software interface requirements have been identified.IR-4Verify that each interface is described and that the interface description includes data format and performance criteria (e.g., timing, bandwidth, accuracy, safety, and security). Requirements Allocation and SpecificationRAS-1Verify that all system requirements have been allocated to either a software or hardware subsystem. RAS-2Verify that requirements specifications have been developed for all hardware and software subsystems in a sufficient level of detail to ensure successful implementation.RAS-3Verify that performance requirements (e.g., timing, response time, and throughput) allocated to hardware, software, and user interfaces satisfy user needs.RAS-4Verify that the internal and external interfaces specify the data formats, interface protocols, frequency of data exchange at each interface, and other key performance requirements to demonstrate compliance with user requirements.RAS-5Verify that application specific requirements, such as functional diversity, fault detection, fault isolation, and diagnostic and error recovery satisfy user needs.RAS-6Verify that the users maintenance requirements for the system are completely specified.RAS-7Validate that there are objective acceptance testing criteria for validating the requirements of the requirements specification documents.ReengineeringRE-1If a legacy system or a transfer system is or will be used in development, verify that a well-defined plan and process for reengineering the system is in place and is being followed.Development HardwareDH-1Evaluate new and existing development hardware configurations to determine if their performance is adequate to meet the needs of system development.DH-2Determine if hardware is maintainable, easily upgradeable, and compatible with the agencys existing development and processing environment. This evaluation should include, but is not limited to CPUs and other processors, memory, network connections and bandwidth, communication controllers, telecommunications systems (LAN/WAN), terminals, printers and storage devices.DH-3Current and projected vendor support of the hardware should also be evaluated, as well as the agencys hardware configuration management plans and procedures.Development SoftwareDS-1Evaluate new and existing development software to determine if its capabilities are adequate to meet system development requirements. DS-2Determine if the software is maintainable, easily upgradeable, and compatible with the agencys current hardware and software environment.DS-3Evaluate the development environment as a whole to see if it shows a degree of integration compatible with good development. This evaluation should include, but is not limited to, operating systems, network software, CASE tools, project management software, configuration management software, compilers, cross-compilers, linkers, loaders, debuggers, editors, and reporting software.DS-4Language and compiler selection should be evaluated with regard to portability and reusability (ANSI standard language, non-standard extensions, etc.)DS-5Current and projected vendor support of the software should also be evaluated, as well as the agencys software acquisition plans and procedures.High-Level DesignHLD-1Evaluate and make recommendations on existing high-level design products to verify the design is workable, efficient, and satisfies all system and system interface requirements. HLD-2Evaluate the design products for adherence to the project design methodology and standards.HLD-3Evaluate the design and analysis process used to develop the design and make recommendations for improvements. Evaluate design standards, methodology and CASE tools used and make recommendations.HLD-4Verify that design elements can be traced back to system requirements. HLD-5Determine the relationship between the design elements and the requirements are specified to a constant level of detail.HLD-6Verify that all design products are under configuration control and formally approved before detailed design begins.Detailed DesignDD-1Evaluate and make recommendations on existing detailed design products to verify that the design is workable, efficient, and satisfies all high-level design requirements. DD-2Evaluate the design products for adherence to the project design methodology and standards.DD-3Evaluate and make recommendations on the design and analysis process used to develop the design.DD-4Evaluate and make recommendations on the design standards, methodology and CASE tools used.DD-5Verify that design elements can be traced back to system requirements and high-level design elements.DD-6Determine if the relationship between the design elements and the high-level design elements are specified to a constant level of detail.DD-7Verify that all design products are under configuration control and formally approved before coding begins.CodingC-1Evaluate and make recommendations on the standards and processes currently in place for code development.C-2Evaluate the existing code base for portability and maintainability, taking software metrics including but not limited to modularity, complexity and source and object size.C-3Evaluate code documentation for quality, completeness (including maintenance history) and accessibility.C-4Evaluate the coding standards and guidelines and the projects compliance with these standards and guidelines. This evaluation should include, but not be limited to, structure, documentation, modularity, naming conventions and format.C-5Verify that developed code is kept under appropriate configuration control and is easily accessible by developers.C-6Evaluate the projects use of software metrics in management and quality assurance.C-7Verify and validate that code components satisfy the detailed design.C-8Validate that the logic, computational, and interface precision (e.g., truncation and rounding) satisfy the requirements in the system environment.Unit TestingUT-1Evaluate the plans, requirements, environment, tools, and procedures used for unit testing system modules. UT-2Evaluate the level of test automation, interactive testing and interactive debugging available in the test environment.UT-3Verify that an appropriate level of test coverage is achieved through the testing process, that test results are verified, that the correct code configuration has been tested, and that the tests are appropriately documented, including formal logging of errors found in testing.UT-4Validate that the unit test plan satisfies the following criteria: Traceable to the software requirements and design; External consistency with the software requirements and design; Internal consistency between unit requirements; Test coverage of requirements in each component; Feasibility of software integration and testing; and Feasibility of operation and maintenance (e.g., capability to be operated and maintained in accordance with user needs).Integration TestingIT-1Evaluate the plans, requirements, environment, tools, and procedures used for integration testing of system modules. IT-2Evaluate the level of automation and the availability of the integration test environment.IT-3Verify that an appropriate level of test coverage is achieved through the test process, that test results are verified, that the correct code configuration has been tested, and that the tests are appropriately documented, including formal logging of errors found in testing. IT-4Validate that the integration test plan satisfies the following criteria: Traceable to the software requirements and design; External consistency with the software requirements and design; Internal consistency between unit requirements; Test coverage of requirements in each component; Feasibility of software integration and testing; and Feasibility of operation and maintenance (e.g., capability to be operated and maintained in accordance with user needs).IT-5Verify that the test organization has an appropriate level of independence from the development organization.System TestingST-1Evaluate the plans, requirements, environment, tools, and procedures for system testing of the system. ST-2Evaluate the level of automation and the availability of the system test environment.ST-3Verify that a sufficient number and type of case scenarios are used to ensure comprehensive but manageable testing and that tests are run in a realistic, real-time environment. ST-4Verify that test scripts are complete, with step-by-step procedures, required pre-existing events or triggers, and expected results.ST-5Verify that test results are verified, that the correct code configuration has been used, and that the test runs are appropriately documented, including formal logging of errors found in testing.ST-6Validate that the system test plan satisfies the following criteria: Traceable to the software requirements and design; External consistency with the software requirements and design; Internal consistency between unit requirements; Test coverage of requirements in each component; Feasibility of software integration and testing; and Feasibility of operation and maintenance (e.g., capability to be operated and maintained in accordance with user needs).ST-7Verify that the test organization has an appropriate level of independence from the development organization.Interface TestingIT-1Evaluate the plans, requirements, environment, tools, and procedures for interface testing of the system. IT-2Evaluate the level of automation and the availability of the system test environment.IT-3Verify that a sufficient number and type of case scenarios are used to ensure comprehensive but manageable testing and that tests are run in a realistic, real-time environment. IT-4Verify that test scripts are complete, with step-by-step procedures, required pre-existing events or triggers, and expected results.IT-5Verify that test results are verified, that the correct code configuration has been used, and that the test runs are appropriately documented, including formal logging of errors found in testing.IT-6Validate that the interface test plan satisfies the following criteria: Traceable to the software requirements and design; External consistency with the software requirements and design; Internal consistency between unit requirements; Test coverage of requirements in each component; Feasibility of software integration and testing; and Feasibility of operation and maintenance (e.g., capability to be operated and maintained in accordance with user needs).IT-7Verify that the test organization has an appropriate level of independence from the development organization.Acceptance TestingAT-1Evaluate the plans, requirements, environment, tools, and procedures for acceptance testing of the system. AT-2Verify that acceptance procedures and acceptance criteria for each product are defined, reviewed, and approved prior to tests and that test results are documented. Acceptance procedures must also address the process by which any software product that does not pass acceptance testing will be corrected.AT-3Verify that a sufficient number and type of case scenarios are used to ensure comprehensive but manageable testing and that tests are run in a realistic, real-time environment.AT-4Verify that test scripts are complete, with step-by-step procedures, required pre-existing events or triggers, and expected results.AT-5Verify that test results are verified, that the correct code configuration has been used, and that the test runs are appropriately documented, including formal logging of errors found in testing.AT-6Validate that the acceptance test plan satisfies the following criteria: Traceable to the software requirements and design; External consistency with the software requirements and design; Internal consistency between unit requirements; Test coverage of requirements in each component; Feasibility of software integration and testing; and Feasibility of operation and maintenance (e.g., capability to be operated and maintained in accordance with user needs).AT-7Verify that the acceptance test organization has an appropriate level of independence from the subcontractor.AT-8Validate that appropriate acceptance testing based on the defined acceptance criteria is performed satisfactorily before acceptance of software products.AT-9Verify that the process by which any software product that does not pass acceptance testing should be corrected has been defined and documented.ImplementationI-1Review and evaluate implementation planning.Data ConversionDC-1Evaluate the agencys existing and proposed plans, procedures and software for data conversion. DC-2Verify that procedures are in place and are being followed to review the converted data for completeness and accuracy and to perform data cleanup as required.DC-3Determine conversion error rates and if the error rates are manageable.DC-4Make recommendations on making the conversion process more efficient and on maintaining the integrity of data during the conversion.Database DesignDBD-1Evaluate new and existing database designs to determine if they meet existing and proposed system requirements.DBD-2Recommend improvements to existing designs to improve data integrity and system performance.DBD-3Evaluate the design for maintainability, scalability, concurrence, normalization (where appropriate) and any other factors affecting performance and data integrity.DBD-4Evaluate the projects process for administering the database, including backup, recovery, performance analysis and control of data item creation.System HardwareSH-1Evaluate new and existing system hardware configurations to determine if their performance is adequate to meet existing and proposed system requirements.SH-2Determine if hardware is compatible with the agencys existing processing environment, if it is maintainable, and if it is easily upgradeable. This evaluation should include, but is not limited to CPUs and other processors, memory, network connections and bandwidth, communication controllers, telecommunications systems (LAN/WAN), terminals, printers and storage devices. SH-3Evaluate current and projected vendor support of the hardware, as well as the agencys hardware configuration management plans and procedures.System SoftwareSS-1Evaluate new and existing system software to determine if its capabilities are adequate to meet existing and proposed system requirements. SS-2Determine if the software is compatible with the agencys existing hardware and software environment, if it is maintainable, and if it is easily upgradeable. This evaluation should include, but is not limited to, operating systems, middleware, and network software including communications, file-sharing protocols, etc.SS-3Current and projected vendor support of the software should also be evaluated, as well as the agencys software acquisition plans and procedures.Database SoftwareDBS-1Evaluate new and existing database products to determine if their capabilities are adequate to meet existing and proposed system requirements. DBS-2Determine if the databases data format is easily convertible to other formats, if it supports the addition of new data items, if it is scaleable, if it is easily refreshable and if it is compatible with the agencys existing hardware and software.DBS-3Evaluate any current and projected vendor support of the software, as well as the agencys software acquisition plans and procedures.Hardware and Software Environment CapacityHSEC-1Evaluate the existing processing capacity of the planned hardware and software environment and verify that it is adequate for projected system.HSEC-2Evaluate the historic availability and reliability of the current hardware and software environment, including the frequency and criticality of failures.HSEC-3Evaluate the results of any volume testing or stress testing.HSEC-4Evaluate any existing measurement and capacity-planning program and evaluate the hardware and software environments capacity to support future growth.HSEC-5Make recommendations on changes in processing hardware, storage, network systems, operating systems, COTS software, and software design to meet future growth and improve system performance.Change TrackingCT-1Evaluate the system change request and defect tracking processes. CT-2Evaluate the implementation of the product change request and defect tracking process activities and request volumes to determine if processes are effective and are being followed.User SatisfactionUS-1Evaluate user satisfaction with the product to determine areas for improvement.Goals and ObjectivesGO-1Evaluate impact of the product on operational goals and performance objectives.DocumentationDOC-1Evaluate operational documentation.Operational ProcessesOP-1Evaluate the implementation of operational processes including backup, disaster recovery and day-to-day operations to verify the processes are being followed. Attachment 4: IT Project Best Practices The (Enter Name of Major IT Project) Project (Enter Type of IV&V Review) IV&V Review observed these Best Practices during review of the project. The updated/provided best practices matrix is shown below. (The type of information required and examples for filling out the blocks are provided below.) TitleBest PracticeObservationProject PhaseCommentVirginia Base Mapping ProgramCollaboration between multi tiered agencies to establish and maintain one consistent, accurate, foundational digital base map upon which local government and many regional, state, and federal geospatial data applications could be built. The VBMP statewide imagery has produced a single consistent, seamless base map, providing the foundation for a consistent enterprise architecture for GIS throughout Virginia. This ensures that data sharing for state and local, public and private business. . AllVGIN contracted with VARGIS LLC. of Herndon, Virginia, to produce full color, "leaf-off", digital orthophotography for the entire land base of Virginia. The imagery was developed at one of three scales, determined by evaluating population and housing densities. Appendix 5: IT Project Lessons Learned The (Enter Name of Major IT Project) Project (Enter Type of IV&V Review) IV&V Review updated/provided Lessons Learned found during contact with project personnel. The updated/provided lesson learned matrix is shown below. (The type of information required and examples for filling out the blocks are provided below.) TitleLesson Learned StatementObservationProject PhaseImpact on CostImpact on ScheduleImpact on QualityRecommended ActionVendor RelationshipVendor relationships are influenced by many factors. It is important to find out what motivates your vendors.Not understanding the vendor's situation can lead to misunderstandings and incorrect expectations.All Phases (Initiation, Planning, Execution & Control, Closeout or All)Low (Low, Medium, High)Low (Low, Medium, High)Low (Low, Medium, High)Understand the presence your vendor has in the market, the maturity of the vendors product, how large a part you are of their customer base and the importance of their product in your system.      This IV&V Report template is for Commonwealth of Virginia governmental use only and will not be used or duplicated for non-governmental documents PAGE   PAGE 3 This IV&V Report template is for Commonwealth of Virginia governmental use only and will not be used or duplicated for non-governmental documents. This IV&V Report template is for Commonwealth of Virginia governmental use only and will not be used or duplicated for non-official documents. For questions or concerns, send email to pmd@vita.virginia.gov [Type text] (Enter Name of Major IT Project) Project (Enter Type of Review) IV&V Review Report (Enter Month and Year)  PAGE 39 /01 ϼߩqߊbRA jh0h0UmHnHuhMbh^5CJ OJQJ\hMbh^CJ$OJQJaJ0jh0hCJOJQJUaJmHnHuhMbh^CJOJQJaJhMbh^5CJ$OJQJaJ%hMbh^5;CJ$OJQJ\aJ$%hMbh^56CJOJQJ\aJhMbh^CJOJQJ\aJhMbh^CJOJQJaJ"hMbh^5CJOJQJ\aJ01 $da$gdMb $da$gdMb dgdMb $da$gdMb$d7$8$H$a$gdMb dgdMb _ ` c d }$hd@&]h^gdMb dgdMb$$d@&a$gdMb $da$gdMb$d7$8$H$a$gdMb$ d<@&a$gdMb$ da$gdMb$d<@&a$gdMb ( c d ̶m[L[L@L.L@"hMbh^6CJOJQJ]aJhq CJOJQJaJhMbh^CJOJQJaJ"hMbh^5CJOJQJ\aJ"hMbh^5CJOJQJ\aJ"hMbh^5CJOJQJ\aJ$%hMbh^56CJ OJQJ\aJ "hMbh^5CJ OJQJ\aJ+hMbh^56;CJ$OJQJ\]aJ"hMbh^5CJ$OJQJ\aJ$hMbh^5CJ OJQJ\!hMbh^56CJ OJQJ\ NOfgCDGHbc hd]h^gdMb$hd@&]h^gdMbhd]h^gdMb M a 6Ofguw CDWX񱡏lZlH"hMbh^CJOJQJ\]aJ"hMbh^5CJOJQJ]aJ%hMbh^6CJOJQJ\]aJhMbh^5CJOJQJaJ"hMbh^6CJOJQJ\aJhMbh^CJOJQJ\aJ"hMbh^5CJOJQJ\aJ"hMbh^5CJOJQJ\aJhMbh^6CJOJQJaJhoCUCJOJQJaJhMbh^CJOJQJaJEFHbcacwx/J'-24R/S/g/h/000ݪˉˉˉyjyyˉyyˉhMbh^OJQJ^JaJhMbh^6CJOJQJaJhMbh^CJOJQJaJ"hMbh^5CJOJQJ\aJhMbh^CJ OJQJaJ"hMbh^5CJOJQJ\aJ"hMbh^6CJOJQJ]aJ"hMbh^6CJOJQJ\aJhMbh^CJOJQJ\aJ)'(-34<=""""" & Fhd]hgdMbhd7$8$H$]h^gdMb dgdMb$hd@&]h^gdMbhd]h^gdMb"-#.#&&)),,R/S/g/h/00!3"355 6 6$hd@&]h^gdMbhd7$8$H$]h^gdMbhd]h^gdMb & Fhd]hgdMb01*255 6 6f6666V7777U888888m99U:V:W:s:<>>?9?@$@=@A9AAA^AAAAABμݬzΊΊnnhoCUCJOJQJaJhMbh^6CJOJQJaJhMbh^5CJOJQJaJ"hMbh^6CJOJQJ\aJhMbh^CJOJQJ]aJ"hMbh^5CJOJQJ\aJhMbh^CJOJQJaJ"hMbh^6CJOJQJ]aJhMbh^6CJOJQJaJ+ 666778888l9m999V:W:r:s:<<k=l=hd]h^gdMbhd7$8$H$]h^gdMb & Fhd]h^gdMbhd]h^gdMbl==>>CCCD$hd$If]h^a$gdMbhd]h^gdMbhddd[$\$]h^gdMbhdd\$]h^gdMb & Fhdd\$]hgdMbBQB~BBBBBCCCCDD D!DODPDDDDDDDEE>E?EnEoEEEEEEEEFF"F6FSFeFfFFFFFFྲྀට΂%hMbh^6CJOJQJ\]aJ"hMbh^5CJOJQJ\aJhMbh^CJ OJQJaJ hh^!hMbh^56OJQJ]aJ"hMbh^6CJOJQJ]aJhMbh^CJOJQJaJhMbh^6CJOJQJaJ/DDD DjQ$hd$If]h^a$gdMb #hd$If]h^gdMbzkdy$$IfTl0 H 044 laytkaT D!DCDODjQ$hd$If]h^a$gdMb #hd$If]h^gdMbzkdz$$IfTl0 H 044 laytkaTODPD{DDjQ$hd$If]h^a$gdMb #hd$If]h^gdMbzkdz$$IfTl0 H 044 laytkaTDDDDjQ$hd$If]h^a$gdMb #hd$If]h^gdMbzkd&{$$IfTl0 H 044 laytkaTDDDDjQ$hd$If]h^a$gdMb #hd$If]h^gdMbzkd{$$IfTl0 H 044 laytkaTDDEEjQ$hd$If]h^a$gdMb #hd$If]h^gdMbzkd8|$$IfTl0 H 044 laytkaTEE1E>EjQ$hd$If]h^a$gdMb #hd$If]h^gdMbzkd|$$IfTl0 H 044 laytkaT>E?E^EnEjQ$hd$If]h^a$gdMb #hd$If]h^gdMbzkdJ}$$IfTl0 H 044 laytkaTnEoEEEjQ$hd$If]h^a$gdMb #hd$If]h^gdMbzkd}$$IfTl0 H 044 laytkaTEEEEjQ$hd$If]h^a$gdMb #hd$If]h^gdMbzkd\~$$IfTl0 H 044 laytkaTEEEEjQ$hd$If]h^a$gdMb #hd$If]h^gdMbzkd~$$IfTl0 H 044 laytkaTEEEFF'G(Gr]S==hd7$8$H$]h^gdMb dgdMb$hd@&]h^gdMbhdx]h^gdMbzkdn$$IfTl0 H 044 laytkaTFFFFFG(GNGPGGGGGGGH5HUHjHHHHI(I)ItIuIIIJJ[J\JJJJJ?K@KKKKK#L$LoLpLLLLLLLL"M=MMMBO]OqO̽̽̽̽̽̽̽̽޽̽̽̽̽̽̽̽̽̽̽̽̽̽̽޽޽޽޽%hMbh^B*CJOJQJaJph"hMbh^5CJOJQJ\aJhMbh^CJOJQJaJ"hMbh^6CJOJQJ]aJhMbh^6CJOJQJaJ"hMbh^56CJOJQJaJ<(GeGGGGIIOIII6JJJKfKKKJLLLL$hd@&]h^gdMbhd]h^gdMbhd7$8$H$]hgdMbhd7$8$H$]h^gdMbLLuQvQwQQQTRUR\RaRpR}R$d$Ifa$gdMb $da$gdMb dgdMb$hd@&]h^gdMb$hdh@&]h^gdMbhd7$8$H$]h^gdMbhd]h^gdMb qOOcPPPPPQ+QvQwQyQQQQR#R+RFRTRURྲࡏqdVdVdGhMbh^CJOJQJaJhMbh^6OJQJaJhMbh^OJQJaJhMbh^CJ OJQJaJhI5CJOJQJ\aJ"hMbh^5CJOJQJ\aJ hMbh^CJ OJQJ^JaJhoCUCJOJQJaJ"hMbh^6CJOJQJ]aJhMbh^CJOJQJ]aJhMbh^CJOJQJaJhMbh^6CJOJQJaJUR}R~RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSSS S*S+SS篠hMbh^OJQJaJhMbh^CJ OJQJaJhI5CJOJQJ\aJ"hMbh^5CJOJQJ\aJ%hMbh^B*CJOJQJaJph%hMbh^B*CJOJQJaJph hh^"hMbh^5CJOJQJ\aJ0}R~RR0$d$7$8$H$Ifa$gdMbkd$$If\hH #8   (044 ap(ytkaRRRRRRRM7$d$7$8$H$Ifa$gdMbkd$$If\hH #8  044 aytkad$7$8$H$IfgdMbRRRRRRRM7$d$7$8$H$Ifa$gdMbkd$$If\hH #8  044 aytkad$7$8$H$IfgdMbRRRRRRRM7$d$7$8$H$Ifa$gdMbkd^$$If\hH #8  044 aytkad$7$8$H$IfgdMbRRRRRR`J777d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbkd$$If\hH #8  044 aytkaRRRRRR`J777d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbkd$$If\hH #8  044 aytkaRRRRRR`J777d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbkdV$$If\hH #8  044 aytkaRRRRRR`J777d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbkd$$If\hH #8  044 aytkaRRRRRR`J777d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbkd$$If\hH #8  044 aytkaRRRRRR`J777d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbkdN$$If\hH #8  044 aytkaRRRRRR`J777d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbkd$$If\hH #8  044 aytkaRRRRRR`J777d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbkd$$If\hH #8  044 aytkaRRRRRR`J777d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbkdF$$If\hH #8  044 aytkaRRRRRR`J777d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbkd$$If\hH #8  044 aytkaRRRRRR`J777d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbkd$$If\hH #8  044 aytkaRRRRRR`J777d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbkd>$$If\hH #8  044 aytkaRRRRRR`J777d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbkd$$If\hH #8  044 aytkaRRRRRR`J777d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbkd$$If\hH #8  044 aytkaRRRRRR`J777d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbkd6$$If\hH #8  044 aytkaRRRRRS`J777d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbkdތ$$If\hH #8  044 aytkaSSS*S+SS`SSI< $da$gdMb dgdMb $d@&gdMbkd$$If\hH #8  044 aytkaSSSSSSSSSTTTTT T T T TTTTTTTTT T!T%T&T*T+T/T0T4T5T9T:T>T?TCTDTHTITLTMTNTRTSTWTXTտ%hMbh^B*CJOJQJaJph%hMbh^B*CJOJQJaJph hh^"hMbh^5CJOJQJ\aJ+hMbh^5B*CJOJQJ\aJphhMbh^CJOJQJaJhMbh^OJQJaJhMbh^6OJQJaJ2SSSSSS6kd<$$If0hr# < 0F"44 apytka$d$Ifa$gdMb$d$7$8$H$Ifa$gdMb H$dgdMbSTTTTs]$d$7$8$H$Ifa$gdMbxkd $$If0hr# <0F"44 aytkad$7$8$H$IfgdMbTTTTp]d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbxkd$$If0hr# <0F"44 aytkaT T T Tp]d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbxkd#$$If0hr# <0F"44 aytka T TTTp]d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbxkd$$If0hr# <0F"44 aytkaTTTTp]d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbxkd;$$If0hr# <0F"44 aytkaTTTTp]d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbxkdǑ$$If0hr# <0F"44 aytkaTTTTp]d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbxkdS$$If0hr# <0F"44 aytkaTTT Tp]d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbxkdߒ$$If0hr# <0F"44 aytka T!T$T%Tp]d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbxkdk$$If0hr# <0F"44 aytka%T&T)T*Tp]d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbxkd$$If0hr# <0F"44 aytka*T+T.T/Tp]d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbxkd$$If0hr# <0F"44 aytka/T0T3T4Tp]d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbxkd$$If0hr# <0F"44 aytka4T5T8T9Tp]d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbxkd$$If0hr# <0F"44 aytka9T:T=T>Tp]d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbxkd'$$If0hr# <0F"44 aytka>T?TBTCTp]d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbxkd$$If0hr# <0F"44 aytkaCTDTGTHTp]d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbxkd?$$If0hr# <0F"44 aytkaHTITLTMTp]d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbxkd˗$$If0hr# <0F"44 aytkaMTNTQTRTp]d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbxkdW$$If0hr# <0F"44 aytkaRTSTVTWTp]d$7$8$H$IfgdMb$d$7$8$H$Ifa$gdMbxkd$$If0hr# <0F"44 aytkaWTXTYTTTVVVVVVyyoooo^^^$d$Ifa$gdMb dgdMb $d@&gdMbxkdo$$If0hr# <0F"44 aytka XTYTcTTTT U'U0ULU=VVVVVVVVVVVV;xaxaxaxZF&hMbh^5CJOJQJ\^JaJ hh^-hMbh^5:CJOJPJQJ\^JaJ)hMbh^5:CJOJQJ\^JaJhMbh^6CJOJQJaJ"hMbh^6CJOJQJ]aJhMbh^CJOJQJaJhMbh^CJ OJQJaJ"hMbh^5CJOJQJ\aJhI5CJOJQJ\aJ"hMbh^5CJOJQJ\aJVVV$d$Ifa$gdMbVVkd $$If4r PD%/  20//2 24ap2ytkaVVVWWWWd$IfgdMb$d$Ifa$gdMbVVVVWWWWWWUXVXlXmX{XXXXXXXXXXXCYDYFYGYHYNYOYZZZZZ Z ZZZZZZ[[\\\\\\\ijسijijijijij&hMbh^5CJOJQJ\^JaJ hh^$hMbh^CJOJPJQJ^JaJ hMbh^CJOJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ#hMbh^5CJOJQJ^JaJ*hMbh^5CJOJPJQJ\^JaJ4WWWWVXJ<+<$d$Ifa$gdMbd$IfgdMbkdD$$If4r PD%/  0//2 24af4ytkaVXkXlXmX{X<+$d$Ifa$gdMbkd$$If4r PD%/  0//2 24af4ytkad$IfgdMb{XXXXXd$IfgdMb$d$Ifa$gdMbXXXXDYJ99+d$IfgdMb$d$Ifa$gdMbkdܜ$$If4r PD%/  0//2 24af4ytkaDYEYFYGYHY<kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbHYOYZZZd$IfgdMb$d$Ifa$gdMbZZZ ZZJ<+<$d$Ifa$gdMbd$IfgdMbkdo$$If4r PD%/  0//2 24af4ytkaZZZZZ<kd;$$If4r PD%/  0//2 24af4ytkad$IfgdMbZ[\\\d$IfgdMb$$d$Ifa$gdMb\\\\]J<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytka\]]]]]]b^e^f^h^{^|^^^^icjckclccccccdd!d"d#d(ddddddd9e:e>jտՍyeyeտeտeye'hMbh^5CJOJPJQJ^JaJ&hMbh^5CJOJQJ\^JaJhMbh^CJOJQJaJ hMbh^CJOJQJ^JaJ#hMbh^5CJOJQJ^JaJ*hMbh^5CJOJPJQJ\^JaJ hh^$hMbh^CJOJPJQJ^JaJ hMbh^CJOJQJ^JaJ']]]]]<+$d$Ifa$gdMbkdӠ$$If4r PD%/  0//2 24af4ytkad$IfgdMb]]c^d^e^d$IfgdMbd$7$8$H$IfgdMb$d$Ifa$gdMbe^f^g^h^|^^J@@//$d$Ifa$gdMb dgdMbkd$$If4r PD%/  0//2 24af4ytka^^````iaaabbbbbIcJcKcLcMcNcOcPcQcRcScTc & FhLd$If^h`LgdMbd$IfgdMbTcUcVcWcXcYcZc[c\c]c^c_c`cacbcccdcecfcicd$IfgdMbicjckclcmcH:):$d$Ifa$gdMbd$IfgdMbkdf$$If4#r PD%/  0//2 24af4ytkamccccc<kd@$$If4r PD%/   0//2 24af4ytkad$IfgdMbccddd d!dd$IfgdMb$d$Ifa$gdMb!d"d#d(ddJ<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytkaddddd<+$d$Ifa$gdMbkd$$If4r PD%/  0//2 24af4ytkad$IfgdMbdd:eefff6gghhzi{i=j>j & FhLd$If^h`LgdMbd$IfgdMb$d$Ifa$gdMb>j?j@jEjjH77)d$IfgdMb$d$Ifa$gdMbkd$$If4cr PD%/  0//2 24af4ytka>j?j@jDjEjjjjjjjjkkkk/k0k4k5kkk,n-n.n3nnnnnnlomooopoqouovooooooooppppppgqhqϼϼϼϫϼϼϼϫ#hMbh^5CJOJQJ^JaJ&hMbh^5CJOJQJ\^JaJ hMbh^CJOJQJ^JaJ$hMbh^CJOJPJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ*hMbh^5CJOJPJQJ\^JaJ hh^4jjjjj<+$d$Ifa$gdMbkd~$$If4r PD%/  0//2 24af4ytkad$IfgdMbjjkkkd$IfgdMb$d$Ifa$gdMbkk0k5kkJ99+d$IfgdMb$d$Ifa$gdMbkdJ$$If4r PD%/  0//2 24af4ytkakllEmFmm,nd$IfgdMb,n-n.n3nnJ<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytkannnnn<kd$$If4r PD%/   0//2 24af4ytkad$IfgdMbnnmonoood$IfgdMb$d$Ifa$gdMboopoqovooJ<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytkaooooo<kdz$$If4r PD%/  0//2 24af4ytkad$IfgdMboopppd$IfgdMb$d$Ifa$gdMbppppeqJ<+<$d$Ifa$gdMbd$IfgdMbkdF$$If4r PD%/  0//2 24af4ytkaeqfqgqhqiq<kd$$If4r PD%/   0//2 24af4ytkad$IfgdMbhqiqnqxryrzr~rr[s\s]sbssssshtitjtpt!u"u%u&u'u-upuquruxuuuuuvvvvvwwwwwww:x;x=x>x?xDxExnyoyٮȟٮȮٮȮٮȮ&hMbh^5CJOJQJ\^JaJhMbh^CJOJQJaJ$hMbh^CJOJPJQJ^JaJ hh^ hMbh^CJOJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ#hMbh^5CJOJQJ^JaJ6iqnqvrwrxrd$IfgdMb$d$Ifa$gdMbxryrzrrYsJ<+<$d$Ifa$gdMbd$IfgdMbkdެ$$If4r PD%/   0//2 24af4ytkaYsZs[s\s]s<kd$$If4r PD%/   0//2 24af4ytkad$IfgdMb]sbssssd$IfgdMb$d$Ifa$gdMbssssftJ<+<$d$Ifa$gdMbd$IfgdMbkdv$$If4r PD%/   0//2 24af4ytkaftgthtitjt<kdB$$If4r PD%/   0//2 24af4ytkad$IfgdMbjtpt#u$u%ud$IfgdMb$d$Ifa$gdMb%u&u'u-unuJ<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/   0//2 24af4ytkanuoupuquru<kdڰ$$If4r PD%/   0//2 24af4ytkad$IfgdMbruxuuuud$IfgdMb$d$Ifa$gdMbuuuuvJ<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/   0//2 24af4ytkavvvvv<+$d$Ifa$gdMbkdr$$If4r PD%/   0//2 24af4ytkad$IfgdMbvvwwwd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbwwww;xJ<+<$d$Ifa$gdMbd$IfgdMbkd>$$If4r PD%/  0//2 24af4ytka;xx?x)kd $$If4r PD%/   0//2 24af4ytkad$7$8$H$IfgdMbd$IfgdMb?xExoypyqyd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMboyqyryyyyyzz!UVWX^ƁÂĂłƂׂ؂݂ނǃ˃ֆ׆؆ކԾ辗辗辗辗ԾԪԾԪ$hMbh^CJOJPJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ*hMbh^5CJOJPJQJ\^JaJ&hMbh^5CJOJQJ\^JaJ hh^ hMbh^CJOJQJ^JaJ;qyryyyzJ99+d$IfgdMb$d$Ifa$gdMbkdִ$$If4r PD%/   0//2 24af4ytkaz{{/}0}}}D~E~~~ & FhLd$If^h`LgdMbd$IfgdMb !J<)<$$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytka,kdn$$If4r PD%/   0//2 24af4ytkad$IfgdMb$d$IfgdMb$d$IfgdMbd$IfgdMb$$d$Ifa$gdMbUJ<)<$$d$Ifa$gdMbd$IfgdMbkd:$$If4r PD%/   0//2 24af4ytkaUVWXY,kd$$If4r PD%/   0//2 24af4ytkad$IfgdMb$d$IfgdMbY^$d$IfgdMbd$IfgdMb$$d$Ifa$gdMb ÂJ<)<$$d$Ifa$gdMbd$IfgdMbkdҸ$$If4r PD%/   0//2 24af4ytkaÂĂłƂ,kd$$If4r PD%/   0//2 24af4ytkad$IfgdMb$d$IfgdMbƂ؂ނȃɃʃ˃+Նֆ & FhLd$If^h`LgdMbd$IfgdMb$d$Ifa$gdMb ֆ׆؆ކK::,d$IfgdMb$d$Ifa$gdMbkdj$$If4r PD%/  0//2 24aytka=,$d$Ifa$gdMbkd3$$If4r PD%/  0//2 24aytkad$IfgdMb.kd$$Ifr PD%/  0//2 24aytkad$IfgdMb$d$Ifa$gdMbd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb{|} ‘ÑđȑɑEFGKLГѓ”ÔĔɔʔDEFL՛#hMbh^5CJOJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ&hMbh^5CJOJQJ\^JaJ hh^ hMbh^CJOJQJ^JaJ$hMbh^CJOJPJQJ^JaJ=5J<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytka5Џя{d$IfgdMb {|}J<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/   0//2 24af4ytka<kdU$$If4r PD%/   0//2 24af4ytkad$IfgdMb ‘d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb‘ÑđɑJ<+<$d$Ifa$gdMbd$IfgdMbkd!$$If4r PD%/   0//2 24af4ytka)kd$$If4r PD%/   0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbCDEd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbEFGLΓJ<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/   0//2 24af4ytkaΓϓГѓ)kd$$If4r PD%/   0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbѓ”d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb”ÔĔʔJ<+$d$Ifa$gdMbd$IfgdMbkdQ$$If4r PD%/  0//2 24af4ytkaʔd$IfgdMbd$7$8$H$IfgdMb d$IfgdMbJ<+$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/   0//2 24af4ytka#M? & FhLd$If^h`LgdMbd$IfgdMb d$IfgdMbJ<+$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/   0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb d$IfgdMbJ<+$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/   0//2 24af4ytkaBCDd$IfgdMbd$7$8$H$IfgdMb d$IfgdMbDEFLJ<+$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/   0//2 24af4ytkaLd$IfgdMbd$7$8$H$IfgdMb d$IfgdMbL678>žabcj678? àĠˠ;<=D VWX]ϣԣգVWYZ[`FGekl$hMbh^CJOJPJQJ^JaJ#hMbh^5CJOJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ&hMbh^5CJOJQJ\^JaJ hh^ hMbh^CJOJQJ^JaJ=J<+$d$Ifa$gdMbd$IfgdMbkdM$$If4r PD%/   0//2 24af4ytkaz56d$IfgdMb d$IfgdMb678>J<+$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/   0//2 24af4ytka>d$IfgdMbd$7$8$H$IfgdMb d$IfgdMbžJ<+$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/   0//2 24af4ytkaž_`ad$IfgdMbd$7$8$H$IfgdMb d$IfgdMbabcjJ<+$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/   0//2 24af4ytkaj456d$IfgdMbd$7$8$H$IfgdMb d$IfgdMb678?J<+$d$Ifa$gdMbd$IfgdMbkd}$$If4r PD%/   0//2 24af4ytka? d$IfgdMbd$7$8$H$IfgdMb d$IfgdMb àĠˠ9J<+<$d$Ifa$gdMbd$IfgdMbkdI$$If4r PD%/   0//2 24af4ytka9:;<=)kd$$If4r PD%/   0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb=Dd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb J99+d$IfgdMb$d$Ifa$gdMbkd$$If4r PD%/   0//2 24af4ytka)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbTUVd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbVWX]J<+<$d$Ifa$gdMbd$IfgdMbkdy$$If4r PD%/  0//2 24af4ytka)kdE$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbУգWXYd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbYZ[`DJ<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytkaDEFG)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbGSWfld$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb@ABG)*+0 ijkpYZ[`ձֱױܱMPQ$hMbh^CJOJPJQJ^JaJ#hMbh^5CJOJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ&hMbh^5CJOJQJ\^JaJ hh^ hMbh^CJOJQJ^JaJ=J<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytka)kdu$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbJ<+<$d$Ifa$gdMbd$IfgdMbkdA$$If4r PD%/  0//2 24af4ytka)kd $$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb>J99+d$IfgdMb$d$Ifa$gdMbkd$$If4r PD%/  0//2 24af4ytka>?@AB)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbBG'()d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb)*+0J<+<$d$Ifa$gdMbd$IfgdMbkdq$$If4r PD%/  0//2 24af4ytka)kd=$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb0Ӯ d$IfgdMb$d$Ifa$gdMb gJ<+<$d$Ifa$gdMbd$IfgdMbkd $$If4r PD%/  0//2 24af4ytkaghijk)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbkpd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbWJ<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytkaWXYZ[)kdm$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb[`ӱԱձd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbձֱױܱJ<+<$d$Ifa$gdMbd$IfgdMbkd9$$If4r PD%/  0//2 24af4ytka)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbNOPd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbPQRWJ<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytkaQRWfij/234;ζѶҶ>?@F!ѹع()+,-3ŴŴ؛ŴŴŴŴششششششŴش#hMbh^5CJOJQJ^JaJ hh^ hMbh^CJOJQJ^JaJ$hMbh^CJOJPJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ&hMbh^5CJOJQJ\^JaJ=)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbghid$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbij}J9999$d$Ifa$gdMbkdi$$If4r PD%/  0//2 24af4ytka)kd5$$If4r PD%/  0//2 24af4ytkad$7$8$H$IfgdMbd$IfgdMbd$7$8$H$IfgdMb$d$Ifa$gdMbd$IfgdMb0J<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytka01234)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb4;϶жѶd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbѶҶJ99+d$IfgdMb$d$Ifa$gdMbkd$$If4r PD%/  0//2 24af4ytka)kde$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb<=>d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb>?@FJ<+<$d$Ifa$gdMbd$IfgdMbkd1$$If4r PD%/  0//2 24af4ytka)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb!J<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytka)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbҹع)*+d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb+,-3J<+<$d$Ifa$gdMbd$IfgdMbkda$$If4r PD%/  0//2 24af4ytka)kd-$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb0128ûĻۻܻHIKLMS56ſ1239|}؉ve hMbh^CJOJQJ^JaJ$hMbh^CJOJPJQJ^JaJ hMbh^CJOJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ#hMbh^5CJOJQJ^JaJ hh^ hMbh^CJOJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ&hMbh^5CJOJQJ\^JaJ%./0d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb0128J<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytka»ûĻ)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbĻܻIJKd$IfgdMbd$7$8$H$IfgdMb H$d$IfgdMb$d$Ifa$gdMbKLMSJ<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytkaOP6<kd]$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbJ<+<$d$Ifa$gdMbd$IfgdMbkd)$$If4r PD%/  0//2 24af4ytka)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbſ/01d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb1239zJ<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytkaz{|})kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb}EFHIJPpqJK2349VWX].12HN@CȵȮȮȮȮȵȮȮȮٵȮٵȮȮȮى hMbh^CJOJQJ^JaJ&hMbh^5CJOJQJ\^JaJ hh^$hMbh^CJOJPJQJ^JaJ hMbh^CJOJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ#hMbh^5CJOJQJ^JaJ6}FGHd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbHIJPJ<+<$d$Ifa$gdMbd$IfgdMbkdY$$If4r PD%/  0//2 24af4ytka)kd%$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbnJ<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytkanopq)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbqK.2d$IfgdMb$d$Ifa$gdMb2349J<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytka)kdU$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbTUVd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbVWX]J<+<$d$Ifa$gdMbd$IfgdMbkd!$$If4r PD%/  0//2 24af4ytka)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb/01d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb12INJ99+d$IfgdMb$d$Ifa$gdMbkd$$If4r PD%/  0//2 24af4ytka)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbAJ<+<$d$Ifa$gdMbd$IfgdMbkdQ$$If4r PD%/  0//2 24af4ytkaABCDE)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbCDEJ,3OPQWWXZ[ou ѯѯѯѯ$hMbh^CJOJPJQJ^JaJ#hMbh^5CJOJQJ^JaJ hMbh^CJOJQJ^JaJ hMbh^CJOJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ&hMbh^5CJOJQJ\^JaJ hh^6EJd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb-3J9999$d$Ifa$gdMbkd$$If4r PD%/  0//2 24af4ytka3)kd$$If4r PD%/  0//2 24af4ytkad$7$8$H$IfgdMbd$IfgdMbMNOd$7$8$H$IfgdMb$d$Ifa$gdMbd$IfgdMbOPQWJ<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytka)kdM$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbJ<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytka)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbJ<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytka)kd}$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbXYZd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb$$d$Ifa$gdMbZ[pu J99+d$IfgdMb$d$Ifa$gdMbkdI$$If4r PD%/  0//2 24af4ytka )kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb12FLjklq./@Gcdek345; ӿӭښӿӿӿӿӭӿӿӿӿӿ hMbh^CJOJQJ^JaJ$hMbh^CJOJPJQJ^JaJ#hMbh^5CJOJQJ^JaJ&hMbh^5CJOJQJ\^JaJ hh^ hMbh^CJOJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ6/J<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytka/012)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb2GLd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbhJ<+<$d$Ifa$gdMbd$IfgdMbkdt$$If4r PD%/  0//2 24af4ytkahijkl)kd@$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMblqd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbJ<+<$d$Ifa$gdMbd$IfgdMbkd $$If4r PD%/  0//2 24af4ytka)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb,-.d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb./AGJ99+d$IfgdMb$d$Ifa$gdMbkd$$If4r PD%/  0//2 24af4ytka)kdp$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbabcd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbcdek1J<+<$d$Ifa$gdMbd$IfgdMbkd<$$If4r PD%/  0//2 24af4ytka12345)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb5;d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbJ<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytka )kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbLJ99+d$IfgdMb$d$Ifa$gdMbkdl$$If4r PD%/  0//2 24af4ytkaNOPU$-.qrsw&'(, abcgٜ hMbh^CJOJQJ^JaJ&hMbh^5CJOJQJ\^JaJ hh^ hMbh^CJOJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ#hMbh^5CJOJQJ^JaJ=LMNOP)kd8 $$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbPUd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbJ<+<$d$Ifa$gdMbd$IfgdMbkd $$If4r PD%/  0//2 24af4ytka)kd $$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb$d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbJ<+<$d$Ifa$gdMbd$IfgdMbkd $$If4r PD%/  0//2 24af4ytka)kdh $$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbJ<+<$d$Ifa$gdMbd$IfgdMbkd4 $$If4r PD%/  0//2 24af4ytka)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbopqd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbqrsw$J<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytka$%&'()kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb(,d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbJ<+<$d$Ifa$gdMbd$IfgdMbkdd$$If4r PD%/  0//2 24af4ytka)kd0$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb _J<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytka_`abc)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbcgd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbIJ<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytkaIJKL)kd`$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbKLX^LOPQV7nopu9<=PV456;STUZwx%()*/¯¯¯ŠŠ hMbh^CJOJQJ^JaJ&hMbh^5CJOJQJ\^JaJ$hMbh^CJOJPJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ#hMbh^5CJOJQJ^JaJ hh^ hMbh^CJOJQJ^JaJ6LY^d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbMJ<+<$d$Ifa$gdMbd$IfgdMbkd,$$If4r PD%/  0//2 24af4ytkaMNOPQ)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbQVlmnd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbnopu:J<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytka:;<=)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb=QVd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb$$d$Ifa$gdMb2J<+<$d$Ifa$gdMbd$IfgdMbkd\$$If4r PD%/  0//2 24af4ytka23456)kd($$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb6;QRSd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbSTUZ&J<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytka&'()*)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb*/d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbJ99+d$IfgdMb$d$Ifa$gdMbkd$$If4r PD%/  0//2 24af4ytka !&~;<=Bcfghm`acdej ڛڛ*hMbh^5CJOJPJQJ\^JaJ hMbh^CJOJQJ^JaJ&hMbh^5CJOJQJ\^JaJ hh^$hMbh^CJOJPJQJ^JaJ hMbh^CJOJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ4 !)kdX$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb!&|}~d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb~9J<+<$d$Ifa$gdMbd$IfgdMbkd$$$If4r PD%/  0//2 24af4ytka9:;<=)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb=Bd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbJ<+<$d$Ifa$gdMbd$IfgdMbkd$$If4r PD%/  0//2 24af4ytka)kd$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbdefd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbfghmJ<+<$d$Ifa$gdMbd$IfgdMbkdT $$If4r PD%/  0//2 24af4ytka)kd !$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbabcd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbcdejJ<+<$d$Ifa$gdMbd$IfgdMbkd!$$If4r PD%/  0//2 24af4ytka)kd"$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb}~d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb J<+<$d$Ifa$gdMbd$IfgdMbkd#$$If4r PD%/  0//2 24af4ytka )kdP$$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb $%7=-./456BEѯъѯъ$hMbh^CJOJPJQJ^JaJ#hMbh^5CJOJQJ^JaJ hMbh^CJOJQJ^JaJ hMbh^CJOJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ&hMbh^5CJOJQJ\^JaJ hh^6d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbJ<+<$d$Ifa$gdMbd$IfgdMbkd%$$If4r PD%/  0//2 24af4ytka)kd%$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb"#$d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb$%8=J99+d$IfgdMb$d$Ifa$gdMbkd&$$If4r PD%/  0//2 24af4ytka)kd'$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbJ<+<$d$Ifa$gdMbd$IfgdMbkdL($$If4r PD%/  0//2 24af4ytka)kd)$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb+,-d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb-./4J<+<$d$Ifa$gdMbd$IfgdMbkd)$$If4r PD%/  0//2 24af4ytka)kd*$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbCJ<+<$d$Ifa$gdMbd$IfgdMbkd|+$$If4r PD%/  0//2 24af4ytkaCDEFG)kdH,$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbEFGL=?@AEF589:>?MOPQVWbefglmѾѾѾћѾѾѾћѾѾѾ#hMbh^5CJOJQJ^JaJ hMbh^CJOJQJ^JaJ$hMbh^CJOJPJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ&hMbh^5CJOJQJ\^JaJ hh^=GLd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbJ<+<$d$Ifa$gdMbd$IfgdMbkd-$$If4r PD%/  0//2 24af4ytka)kd-$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb=J99+d$IfgdMb$d$Ifa$gdMbkd.$$If4r PD%/  0//2 24af4ytka=>?@A)kds/$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbAFd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb6J<+<$d$Ifa$gdMbd$IfgdMbkd?0$$If4r PD%/  0//2 24af4ytka6789:)kd 1$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb:?d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbMJ99+d$IfgdMb$d$Ifa$gdMbkd1$$If4r PD%/  0//2 24af4ytkaMNOPQ)kd2$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbQWd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbcJ<+<$d$Ifa$gdMbd$IfgdMbkdo3$$If4r PD%/  0//2 24af4ytkacdefg)kd;4$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbgmd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb789>qrtuv{YZkr   [±ww$hMbh^CJOJPJQJ^JaJ&hMbh^5CJOJQJ\^JaJ$hMbh^CJOJPJQJ^JaJ hMbh^CJOJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ#hMbh^5CJOJQJ^JaJ hh^ hMbh^CJOJQJ^JaJ.J99% H$d$IfgdMb$d$Ifa$gdMbkd5$$If4r PD%/  0//2 24af4ytka)kd5$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb567d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb789>J<+<$d$Ifa$gdMbd$IfgdMbkd6$$If4r PD%/  0//2 24af4ytka)kdk7$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbrstd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbtuv{J<+<$d$Ifa$gdMbd$IfgdMbkd78$$If4r PD%/  0//2 24af4ytka)kd9$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMbWXYd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbYZlrJ99+d$IfgdMb$d$Ifa$gdMbkd9$$If4r PD%/  0//2 24af4ytka)kd:$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb  J<+<$d$Ifa$gdMbd$IfgdMbkdg;$$If4r PD%/  0//2 24af4ytka)kd3<$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb[\]d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb[]^_f HKLMT                 8 9 ; < F Q V                 ԗԗԗԗԗ*hMbh^5CJOJPJQJ\^JaJ$hMbh^CJOJPJQJ^JaJ'hMbh^5CJOJPJQJ^JaJ&hMbh^5CJOJQJ\^JaJ hh^ hMbh^CJOJQJ^JaJ;]^_fJ<+<$d$Ifa$gdMbd$IfgdMbkd<$$If4r PD%/  0//2 24af4ytka)kd=$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb IJKd$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMbKLMTJ<+<$d$Ifa$gdMbd$IfgdMbkd>$$If4r PD%/  0//2 24af4ytka)kdc?$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb   d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb    J9$$d$If]a$gdMb$d$Ifa$gdMbkd/@$$If4r PD%/  0//2 24af4ytka     )kd@$$If4r PD%/  0//2 24af4ytkad$7$8$H$IfgdMbd$IfgdMb      d$7$8$H$IfgdMb$d$Ifa$gdMbd$IfgdMb    9 J99+d$IfgdMb$d$Ifa$gdMbkdA$$If4r PD%/  0//2 24af4ytka9 : ; < )kdB$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb< B F Q V    d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb     J99+d$IfgdMb$d$Ifa$gdMbkdZC$$If4r PD%/  0//2 24af4ytka    )kd!D$$If4r PD%/  0//2 24af4ytkad$IfgdMbd$7$8$H$IfgdMb      d$7$8$H$IfgdMbd$IfgdMb$d$Ifa$gdMb              12~AEKLNUuyW|ǵǥǥ蔂paǵǥǥhI5CJOJQJ\aJ#hMbh^6CJOJQJ^JaJ#hMbh^5CJOJQJ^JaJ hMbh^CJOJQJ^JaJhMbh^6CJOJQJaJ"hMbh^6CJOJQJ]aJhMbh^CJOJQJaJ"hMbh^5CJOJQJ\aJ hh^ hMbh^CJOJQJ^JaJ!      J===3 dgdMb $d@&gdMbkdD$$If4r PD%/  0//2 24af4ytka   )1d$IfgdMb $d@&gdMb dgdMb12P6(((d$IfgdMbkdE$$Iflr * )*&  n  t2*644 lap2ytka-=>f >@AEUr)Kd$IfgdMbKLupcYYYKKKd$IfgdMb dgdMb $d@&gdMbkdF$$Iflr * )*&  n t*644 laytka$78L(ei}pFf_Hd$IfgdMb78(ei}pqyz%&'()/01褠|uqgaga h^0J?jh00J?UhBPn h h^h hqmH sH h mH sH hqh*jh*Uh^hMbh^CJOJQJaJ"hMbh^5CJOJQJ\aJ#hMbh^6CJOJQJ^JaJ hMbh^CJOJQJ^JaJ hh^ hMbh^CJOJQJ^JaJ&pqrst7&&&$d$@&IfgdMbkdJ$$Iflִ  !%*2tT4 t26    44 laytkatuvwxy$d$@&IfgdMbyz{|}7&&&$d$@&IfgdMbkd/K$$Iflִ  !%*2tT4 t26    44 laytka}~$d$@&IfgdMb7*%gdI $d@&gdIkdK$$Iflִ  !%*2tT4 t26    44 laytka&'(123>?$gdq &$$d N a$gd;F& &&`#$gd;F$gd $ dgd'Q-1234:;<=>?$%&()/0234567Ͽ}yh*#hYh^5CJOJQJ^JaJh^0J?mHnHuh^5CJOJQJ^JaJh^56\]hq h{=h hq mH sH hqmH sH h mH sH  h^CJh%0J?mHnHu h^0J?jh00J?UhBPnh^#$%&(4567gdI&$ 4$d N a$gd;F& 4$d N gd;F$ $&d P &$$d N a$gd;F&&$a$gd;F A 0&P1h:p;F/ =!"0#$%0 =%< 0 0&P1h:p;F/ =!"#$%   < 0 0&P1h:p;F/ =!"#$% 9&P1h0:p;F= /!"#$% 21h:p'Q-/ =!"#$% yDd tn  JrrA?Picture 1bxEkUE2ai!xDnxEkUE2ai!PNG  IHDRgAMAPLTEٟ pHYs.'.&C% IDATx]W`*Y6F`+B9/T^y+^yWx///^yˋW^Wx///^yˋW^Wx///^yˋW^Wx///^yˋW^l?&o2D,y;W6e+[[ս[e }uPF qiy1S#.AEꭔGs%nl͇勻#z_hc%#rcy /F2!dՉANCRA(#T^4K-TRs7z( +-Q[-{9j蓷< D#v,RccykI iQXG($<\0IS*x7f1x6V[(ى8VNھ֞S520Zt ۳Fơa#UܪvF2#{ǻUimxcزR1Bb SHy>DRTQ?<+0U|uJk:ӖD3*()Hbϒ iEf;?xjy΅yKheuh9odM 6a_pݲ&Uk@!ug=T~;hǾ(q`@k}QIe|r ϙXN:j'U0M/5&>@ 35ڍgğl5 ]^DR!yI`0p+[^H 蟧/6c\":C#rlLbP)7X}`XRgFho h^BX~/a:`%`(@{qs2e#O F,7)oKвBS(rE4*GFL…myL51E첸(F#"Ds 4O_ɓ;GPU7}SEgp0x8ȲL MG⻄ ġ{.vXJ\~!G1%痻e6@^NONZ>-a& ]_,j_6o6\^njny4kjvؚU R-Tv$xk;SB)Y5'yBS- /.6~..FC~T煮BYɸ70b qzȭ-Y*k+෹cK H7 NApa:@.RՖf/;7^mʢr,Km,}Yqk8;TS ϛΞʍzCnOD)mA6%u>괕O2hl$Bl>o'#jMi>=Xf↴h꧸߳SB: iZZ[!l<]Bw{Fۨf ̡qM2VHdq|/{džazb&wČO?Pc% 'nKyGXrġ^Um 5*7+D(AMŤ E|"T1  d(|Nb3-K @_>tHnx[ac$.|KKRYy/c[Ey">'& A%Eo%p0Zi]r)tj[ŏ`.<>D^0;JX|@#NX˂^FÔi ֐m#mLQvF6yr#SD:l9dN!Ent%nOi0j ܚ-x A N?{mZ.MR7{܄NG&03Ԉ1ڴsM+5a VI6=PnC Bh"2 J(戵 Sd ԬN9-zQE㭿0XھKh7ʳ tDŝ{oO_NhԞh`Qm SNM&}\a㛰7P@jp "%OR>nI ˋ|FحŚUf+Q IT6QfVDngHzmhC^o.Rŕ`44M%imƶPˆqE/ Q~p˫"/Z UlA<]-|zES5ƣG'iM;ѠLtk@*&o /$+UtYw]v5g^@w yE&7Ke6 Ew,0k7暛g|G~EHg:f7d #}iU<^C,cRHh4 n#btqڤB@W"owjC턍Ic[+N@yځ&ʋ' J>@|\EЧS/u`3#@h:iv6ߝ?) 0.ž-`L^4>`C Z0feN'ċŔ+B-GѪirEL1w*['sz7_} SS&Ʃ(OMt$,7z"c., z"$8rñ|u WzU P|lY.hB,JbM\ 4׈I' D`z0(h^VAsժբNBr5< E'=`qQCh:0UW+W3r)0YZD{Q6F)K:p.S}KLEb jLW&ƕE Ć* ,<Ť.5E6 ˑ&`X ,7 A((آ.: 8o, ACD*/Q\bOuD FgjA힎=ƋŴHKJXyٝ-Aq\H]^F[~ 9SLN`+9F"fty!^ĨA r-zh9Vso럯55>on95/hAhrs}`hB) Znbb:F4[O("1IWg@Ȭq̋ぉo&KASR7r Q:ECT :/~K5N{/.?qJкR\WQr0߬)Q)+.[ׅ N6#&:aя @蠅Hk@_] SR,/&w), QYHCJhQxSbk`m,%*1k C3o6s-q'l+C:,J܀!n`F9 bܸЂw߿݇"ulV )Տr\f6L%{i7yNyIn7)lv(>'"(Zh _!PxuI}?9uPs` B 0Cw^=g0Cϝ̳i +/.yՓF-wvGC7[4YۊQtoTGMxMNf\c˰9JB  러\l+G1y1^up0dR;p~ ]>6s_Vz FTlcM*u۲ovo|dߙ3wZ25PōjJAJ{nnD:N"'T,`H*G3_UKrł~5rv6gli)p_08Yh<$NUIɉo%Z6VG[Z/f^Z20;mXd|wCԙVr!V ^Nid,ߦsD#t^hgGw&i|D@UEZ}1z |'o+<"*91.‹b.D;mі@rWFU" gciMy9dL\8Vw>VNzK,Qb]}jXSNEy[3,br/rNQw]' x۩",&5u{%u񾭜򎒹jZ8^;XhቱAO`0`׾chrA.t'VNㅼפ<`4eUOyᘠ3B(3^Q,kbsZXG`bU7-`QӴ>$u SAc=@i[Nыg505ub uCyaiQd#vEEkjE3k; Gf5]58Dj m04|(gB -' (99\lFG9F~=daVy1m[<bhzCm>GpX8q |wZo`1Vrl|C> NB//"b+b`8dluL^#uO'/;ӕZ Sq88B^O|!8':J%.L *ӎjoAϊsɥȐB/Z1+"(-8O 򀁲yAM{=o, A@.Y/P7 *ewE~`.c7wBK8rZb#ɬAV!4h=ǙC,asa'Wk#^Ć咕Q^PbX y q%PU1q-۴3tK[Ƽpv1;o{Xu䅺υ-" B4naƁn'!0lÎ3=<Ϧ`Ot &"pqi 7110;qn3(Z \ۑ. cN>cHH0Sy)Zشԑ8^\Xm CҮ5B*Ym]Fe^$B]NL8ZSƊ~U90?ڟo^^t5JXyxq^xŤyqImhqy380(yQonhqD \Q^\8y/DF3AԑM֝56^,΍&eĈF8__A்݊ ؆ּ"慵ؿ@BWdz}PPekHq ^lrSL޴ ȡWUA"βPF^$`amguv+9/_ɧ3Ta<Тld=隑g^^Bț`4Κݜckj,@W^}d_ґM$j`O{9{EEJY*ߌ /Uڝҏ0T([7b_!PtL@@Տt#\E\E`h@J9е EU'o~U7 :EvN1#p?/gs`o㾘d<U[9C ur< o'B /("s攊".zs{9(<҂~&e}t. %U D ?nprxrЏOY 1Mۺ]1"jIWC֨ ^؏p1rXVǣ'fk^6-S围rōhżؑ fTZ!QW9Z<nղ(t1}^*Z[qXŋBJ ƢS覆S!ɞE G xD|(-wtNj{8p3hiyTZ?mj}x}_^hChW{.-Z1ٛB\F X 0Ñd{t(&Wxqʴ+y$h 4ʠ3/v(^|RW weW^Z#h"v);Fr{ A|y^dz^Cx!u**Yuq-ߜ@5iqJ'ɢ-MAn oMt-^^#fۼ3fmТ$W/|]z^\/o+Acmγ0"s^1DMxa 8^bT_NmE{DKyAx^ eۚfl ZuwݞJ+܏'a-Mׅ.u?lxnc-6 qp֞ G Pޘe n O}@bmhZlB,1Jo]I^c˩&/BMiqKbL$!]ݦzxsW[ˋX%-nA ʋf]Qg/A2웶/©]n4F*lB0慸\ŋhS&]R苋~pñۆyaEnnSvEkjWL˥ LѼ_cc^+o ݓibڤh &p޶'rvw'f28kA 5ya^\#^Gp֮Td]y!\wSczs2.k,K/&v/Ory1urx`{ IDATh6%E1:Gd_v޴dK+= _>eIC/eh>0@`b5j9Ѕj\^d]dE_Ei[aw+pl*K")Ƌ\Cx⅀,gf*>Gk+oql+ԇ"I6恱rRɖ/(V\Zx伐UYwz cx-8aK,W~]/ sm /1:>!K^b+5c("fw.Ȣ>X-D¥Ɇ8Ɯ w1T/xSmyAF(Ë R㆐U F HQ\fwGH¯"l/ HɌuyAf-ˋ صqr(޲ގB yap 跓>^kxQ|#YRRż@Ǭ sHxOv>CVrA~Ƶ }8˞wO`J$A Ҵ0^,/Ѝ{z? mx3/- _:кĀn%Rci[/I [ks/܁L^c5gX @$gиL#w`^L /<M!ֈ?b;ucR I^L֋"q/Zѩ ^sSy!zhqY^VK i½eC ? /*`MdJaQxR9 9XY.GE=^LWK=#l/g\QVB¯/İ*dE:K 8ٝ}eZϥDևncR/oG_ Eъ⯋"q/g= C/NF gr;^H:ط7 Ke2͑%uh1Y K{q5/Þ0D}<!W/ 7_[,Yϋ*!hEOJ.^Lb֮w&^*SڨU/1B+=\[ 3\vh*C\Oj1^yr{ xӟm$- {BHoM;yd0J:Gͫ˚Pay}N7|]$Qr?1r[/nBŋrIN}v+-兩_Gހc(?E'E sBJ |zőBܕx;f]MH76$m^w8 GB- 3rjUi5I0a˪Rּat>BDnGq^|@Ogha[9xgr"/8YM6VZެS/x댨iP|Q1" Iqqʁ0gjͺH|' a0l8W}Q"R O4&g@$VYSَpj. _C|ٴT)\paߗg yG~mwA~ nRb ¯XpcVkbH D竧UC',k9tIy@"uB߁-vKKcNrbyRp[-y!7-/,-n^ o=B /|EI+4_v->}¶Li>kxiy^@P7m^Ӧ&x/ ~J,:޺+h/DB>nپ /ȳ9pM^$#Q$/Y 02x1!0BEPfmd _G(/ ]>HJ➽j4Tua<<2MЪX 4^e{"a*qiCh26Q,=LN|WE(@=1/'GX1j'x*j <!-DSwlU_^ɇ[y !pHܓN>5;l N=Y6 L(ox_XV%Zk.o$]fpmnu1 buC++4G>/ ۻ8P25e㶸SL]걆`V .(9Z'%" NGpjBD R B7"0S]  ?ĮEvѕLV,/t x)uE`,^70b̗u1* @9b]R y!7/k`<\^TM{lS^9ٞiVLuî&"e  [6PI'vNjIЏ.myQG+{l/xҨ:Y$l-QEIBy϶ZJT;B̠#ƖPcBw /X?ͲC2T//5pPvs<f^b61慈zUfue/lQ/$[`vQLV6#|W#*>F1LUPeЁսv72 Yf˅Lh};V yQw7~_Lpi;WU/MxE[gtUEMi^H>X;t8 aM}4/EK}}J*8-~D2]@^m^̿I^HZ[tO1*|Q@\ 7EY~p $`۹˪B.#[EWn;N ^^@u^WF|r^-^D' F_@Й ~wZl m^>wb*ڇ&` n*BKF^8-KXk-V09,1 }y-30xya%1&a4䰘$#Z-k^^'^)fJVj~r/,-X)^kiKfC>X(TdpW兛sBx!,H1o_Ubk{Dk 2‹I_ew’o#  LJ+?QS/pͤdž4m3^CҢhG,QĨ7BG/#z Dˊ%( nWX&xlibEP6D60 xʚ -^,JMZ1R"u%o !/t;ZCx\_9^Iiˊ~6իQDyK GB+vk(t\ #Ki^bLbIucʹ! eNN$%bl%Fx'Ŭa>gKH N%,_ $arPkJbH|_SW cZ1y9_ 0L. Yh;&W'tFUvj޾mf8_!~?)P䅭k>1$/&?z^U܀Eyv_^,[Vӿ @$Hc.crJEiF,L9Eߎs]E}$yA^اn':^4d+ @G/9^Ƽo# RE;L 8D^$e ŝKݔDzcڢwHa^9Ul?pj"|dxc(.ɋr/hI E3LZF^}9E&1+lbDS/L#'\ H蹲;/*1nީ^^؎}hA_^|D&&Sj*.f*<dh zW2UV&O6ajmT-<Ⱥ9 }=SݼO剢Tu|D./1R-BT1n'P2v:7jHq13ҩ,/ܽ:[S)Fò"^h3`2&\AIo]X,/eY؝y"ƭyF) ^8li͞ Hzb7N*.^%q`Zĉid\umy!BZ g%W(-8_p$Ba,EQZny /dCWYxbðɋ[H^/03w5}&K3qh@L Q^!^5N=ib<lr^Lf;zi颈ODk/(_!: S@Y8_\1b;JЛQo¦Fye^'x1(ҘF qʁy`eMP~bo^Lz ^h+7V yѦųEfd9+vJ̋x^nj)/NDO7g¿0]Ol HiѢBįx!s ;#9ˬ]KE0(1/8Re.Y엵IZ<KւE҂|Y^dB <q:[+'y Fۼ־\BFF0x^r[_/q{Ph,E d 9 ?ŗxq<=I YβZg,M鯩c.>ߵ=M }U6tŕt[^|AxcU?1жy}a֒(U?t<1En¾OL<&EAp=Yn m,ӍN|,1[𑈕$ [ Ϝva( !}$b1yy>0CB쫑- ^ĕ򘊭ĵ(%dKʍdx?h/2؛Cϒ.%jd'{ |Cg|R=H\+'uB>2~c`yᨠnhڻIϠTɨ5>tV@SXd# 6b!Dc:k^B2ϋR i"c8Ih㹬V9*zwkc_GοƋZ`8h-f 5F1'Z>u$ #9*}φ: /Pǭfiґ̨xvdȺDn%vltmμp@l RiKz7iŌCS%t6pZ kBkqnBg?߻scPdj)v5ȋ RAԼ[񢨏ɉPuY:"ÛϺ@*ƣDƋ^ْ9u&K} y1(XQgOb _h¯ 8Q: *wE8q߸X8ڦugFb#U/5Í\"_yAbt?^3#Ʋapa _'EA>^^GD5m-/M/ OX2yxa%͋bW|jt)U jCIpM [n*T` @\ (뱏ApˋCJiAl.o)McS IW@"N+t}" #"T.~v9*Ug_ PUrbG0)ζ'TWJO%EL UɆHzS&^^^DƐ9E$١[ȐbHUyVkŨ _eVV+<,NFW>͕PIC]5NRr$J?Q^wLF$~`mu>{b/Ѿ4#trtVf/>N z|n{)Bwt+Ymx^f0QtgM%'RGֶ^/++F]2o,/F$eSa@q+6iDgL@Xz˾\W.2;[zD{Kբ;K"q=7(P 29Xº75sI.32֓}>uz2$opNige0%)oq Т2 5 M2lé7Txza|Y& \ bVaT}$V޵QźħA./{ ȕia3nI†//Nj¨k;ɊP]SLw] Ri'EVh^9} ^u_/h; {3I=!Ɂq3{ϋa ./tExax/2fYFX5*m?o -*\٧^B^İf'1ˋ1/`Yw+[~_ EC}L^KY!X ַ$F j:}:/uZթ0OYǯh¼0zQdҌ5#e=q8/ݍ#0 bs>R?-VShDyo2 ڃyqb@Zݺ,@Fψm/Txļಭ XbtDv?Y*z *H]&@k*f/* Ҙ9Gކ!;A, %ȍ^^VE3-Ł~qˑ/`.XnێHeFyepRȝ$DRʠt]]NRRGJXo4TkyQnb f$Օcxێibk,\[Mt"/<`M$KuZG aʴC_' mct32q7)gfTL/ DUt"L9NZ'2TxQ޷z'KHG66x,:ɔ0U"uu1ȋJKuS]1co RҁR48kJiG뺓#  0y^|a\nʿȢ~* 8jSi n4sHX ?# r7j|/ҵZnlkROM` AwYˮlp_ű?枺i) Eӓo%are#e]/:I VzUjE&4"l'5do'U7r=ÈE cϼXՄVl8#` 2Փld -0b$[b#*ۄy!/ IL%Ӡ{%]he)"xE$慛A`jnQ T/־0|]/RtZ+~8bڼJ?6624t>w]]Mz 5'+YOHrAV(P(b˜Yqo"j4r/Ɵ=;5T+ PAq.%_u >cfEO\nLݼ02pX֔ErJv&NPèAq/{!p&,[B/'SSA9,rcJBa:pG%̠/ު-^M hAb&^|R@& rsZ /`CEIZؖ +ZCV/ĶY17$\hFzՃ*)3s ĠV`7 fu CБcso܋l:lCztv[ 0^bUi0QrРBtDڟ=|4 ^Xb E'lK;7A#]l G Ui/ɐ:͋rUuVic@xJqp#Wq[ܚqÖې^ bvgu.~:a ՉeHD񻠁Em;~ᆱӢ㪐[;FF5 NjI+# ^Db9; UU3ߖD`^Ѱb)IEV K iWC'6 ]iwAz\Guk)s@Y@,WF8Mظ~d- 8I ԦlA Pey EVbYp.M}az6n )A)%":LlUȪ}wMnkED'ޫ*gW(4J2u(,D`$4CB@¶aaUoj}&K< %>,|@뀬rشUvZʠ.6 _(ūlË)dAԅB}.H jۨI`7q?@jcxP‰ˋp LJD\I6r5_hʴ^Š@ $=hLuqoCRî:TxliI_ WAJ/z&pzypan0$B$kU̵Z`x~}SkXIO+ vYrXVYKó3QZ28w)p8j4mܚSMA1䲾=Yz"!"Fx:A ŗI `@hle!qV v:2UuVQt bae.1u_ Ra3gaی>womKiOQZHW-󒊗-1 J g D^K\x n5{c)]1~[DM!m @"r%34u[y$hYi_b^ĀFS#ӈ6_ Ի}vo|FAP=ؒ"jR%ApMZvœ3BB"PϩAOh3åLPD+ʫ_]x-n -ڌ0t'*OHhncHw;tkLMc;zۺCeC@$1""C6- 㣎tðXC '5l;Qt D=|r/j"rp;fui)`M5M_cg혣\&}`0uPI/Tf r$C͝lh$GCӮsأor'i]VꎯJ9U .>n p`o}d#  >ud1sʋq(+vY9k[`Ga}Z\Cȸju 5gIQ oR(zvYX-0m'iUR5^yIGP@\ම2GdFG3!8ܤ9P%SLZMka;$E $bc'3 _@M[#{ Po6{]l/]ȉV^5b֩wY{.$x㶤a}Fu *cIApmyJ9Ȯ(^ce湙AJFk<|>~5O˺%iZʢwSh1jN.4/Wj2G⊶(#ԝhȐ-Ѫ@uK/:lRsnB%/<10lڦ(k (p2M:jʞnrA\gHS+P}xt]^%FMr{e gus1RysoQ`Slaq$:W kܮj#?_alZOσQ 2Zap9A~ q_(7^l#?@h9[% mFm10Vfa`ƭcf^A#ׅ՘f[98K_m٘U/Bb$0[M{J%Ɍp,r7f9_lo$JH]=&Y[/zVB Uݓaf>\ɖr\%$/%Ft%rrc# 8<3`\޴߯S7-Bk^DC#ID]C%QK“}Bt۹kYkv!:a^]3](nŭ98pIg)A" &0.dD>n sZr[$8 lD̋ xWW.P{p"W:ﮒy5Hޛu_]k^EB9Fbw9HrDx? '1ԶnQ/|=oKgdch&b?M(tDF]?jVܢP/[:8Q@JP~3#lۍՓ"^u1c&Lغ8'.zrϒi/*.hլOR1u,v ǵo[rCq%4s&6J ^D=7R5w.41(ީ_rh?`ga7/(`]BHj5\47_UY/̿U՗N;SM"ơD:gȣPYi-ӫ0#oQl);B0tUl=UDۊ=7auu ެIZVۈneqU)d. -e'^Ljded OUP( DPRYՖ.OJ ,1nWIcy؅ETbYRb{n<=jORI1mbk ylr]ُqO&P'U"nKC+þl`*L$뾗)xibM#zzi[مh瞧|Fa5/tPUZv׸~8HkO0/_P/@x rl% WK\dbqI,Gb 󺸵ARBK5,; %j) C`큪)0d(&jԗU 0?pDD*XV~ gi_GJXںI%#7jvV(hA3S4q,:/)ֲ/xOa kgVvbW.7?JPa[ƮMﺑv XE=h4*{R{b!M.=0o~.)⩵m2t5-)0Eu]$RPB@hj|jd\ċ27k4> qBK<{h>"Pڎ:Na:퇛Bo\Eg1?hj93BVe%MxV-e΋a@ZM`7pL93E/wʕ^vc^u]WWi( Kф8! !Ӳ\,K9~Y7|r^!c&i`b:(2ųF.$/hAqkޒ2@{jER̂HQg+U$$9hDvj츆Fo )jw[VBtĆ&8%݋9;N&ø )*{Cl:s]W/q~ɏ![āuAhr(/~2T:7ɳz"!X_g#43wO:K IhI&&ER'(^qMv{,L{:yl5? m^o;1ܲs}.wy=C~$b4.mp4oYdFM*!0-衼.N8Y J-,V79hQb1z;LV唓x#lV++7FR @-r3ϔ矼2lJ n 'CΑqmk].@^F"9ZV=[2=w=HhEǙm/>8! 5E~[r/1B-ݚ;h92ֳC/Xꪨ򀾖xNN:Z Qt^4Ji:X}ݹkr^+^ "0b^CTc-SԱV*u P[- t r >Rk 33n'#xP{ш$t5s>RIw B-v8b@S0O6&]ñ(vQ_(um  HxTxYڞq8Hr9p"$ r*-i|)' e ֥<&u 4lI⪊UK5jX2лaܣ%hUhq2/1d{BMP w[oN5Tv+RmOzDNl9(,vSGz i..'࠮ڀ:N79$Kș \@C\{\| ^ ;.*_k/ AmRq(~zuVX'vWgnAμcfi:>nTa{ ی("8M3tXc6Wbp懨_gO^76 jhnZ='?]JuG^Y_;piM,(qe.B)/rvKU榆Uζ Gs6jeGLX¾.DĞTSacN6}7EkGCAx8MG d6MAR4YsuZ O _@z䧆#QtGRHiOЛa *.鼰(߫=:6?d /{] XjFyWWv=t@B׻d!A':.3~$`qŬmGᎊ[/W񊴸/QʵUZSKrK%֏h_~cp07@,e+=StvWb%b۶F 3٩\g_KX0,+W}K - m73n6PĚs"WNRX[ߜd$Gwx+${?C.ៀڸ^z͢c4h=^ԁ0׬ICbx"er r0{GphdȣiO^YG B&%Z .iPQZMT)BYH)GhhT )ȱr l.С>t@-P#  EFӇiԣ '{GE`[Y&wQQSa[qua|mӷEΛP.jK O>QVD8,a-"A}6&[Wkfm ʌ߯0qZۏ[9c:iS $o@Zȯ VGUp nbV`HV<8Тߏr2Q (m0ŧ0Sj+N;iֲuAxQ" s:hN[॥,:ȍӱr$=%TyA m4ܱ`R=g24E`"%{`&Sn=vBe9ܔ0D'ȕ|Vȴؒ !h4L<G-[:.5X[Ebs +$S#qfԜw0/tuqdxa^,İN|lBǓ xNkdFyڮ9ijί\h56lx^WY#d"T/PHx"4Js{]Ō[R| J.uȰ#>+ Fx 4ݤ9vc1?' !Wr>"kM! vcL⤛1/`X ZG/yVF N B'\yʅXב[%8A韈F= 4G`-z0|q/:D8SIkX]nU $"KIO*@H@}/-2`v2/2j骑rMTDM4*9n. rk{^F31ъ7 ,)rQXueD*ѳGYǍj|W넨-MT)X9NTb]I#IrU\!Kimw..i8 o| -{V5Yhf\GtlQp$FX^$_w3e_0X 3(W\"8]n# sh C:NIFL6 zGpUWRI>b~;?(Zw6CE6H"R(I/a_N'tV ݲCm)v񮷍n#<.s*[#6DrķI.k):!H()@fXeN#|0uʓv⓸gU[hl2qBUɍ~X4zZ:9|`vpP*Enb*ŝfNX?Jܢ PX!6|CIjZQJWTXc2(BPe010EnoLZL&RsYRwnQr36iMw[9NByoEgPr>UnZ h;B{Jqw"1[-A$Fgzj 2Rb /.7X`P^]ǎ_Զ j梀^4_]#QH]^-ת8F<;PEI>f^۫݀~y--ྠ*5DXnݢ Q@\Ki=͘QpC'P5ZV ` ^*s_6"0pp;coAbfMiPDCg8[ 7 M&AzZq7{'xZsE=L -X;΅$BgPwH0b)M:N_cڢh xf2BqFMrwzA&%6'A4;rVC+z`D\A?%4k`k]If#D.Ω5*S,Qi+H##S׋i C, [Z2B$8X$_~7G$'+Q8QT(ݮYԖfzxr D544&lﲺ! H{FX2N r2T V,<%?Ag! ; eo8/H4C#y5ս,2.1 lO8}*b@GxmT,Z0\i5q%[U<)q,ф1Hc0\,Bx䠔Q| Or>)1/,RSSf L#}ˢ<}̨2tihqL"+ou|yZ>'2@/SQղAŖ&~]qq,$n#{U$E0Ds.16iۜB<1? {)lȒXvb_`Y o8 ޾ Y}$hǣZ--[jc M>s'?yj^A ͆\le `:F3H&!Is3'|&dd 8z[@/HIĂ(O>z;@g|@!>Vɣ@No髅oN.G1 s6߃aL"2>vuԗ$E<M1ȬJPy|q݌ ]ogޯw# F6DG;h&1Z=sxQ̣s0, {-II~Ķ5%.POw )X^66ў.daY Bѩ:53aZ+@MJ`W^3~Mh'&P+(\m4o17VC~$|/oDꝒEoa:*({T:r-MyM",m7z=缺k /jKr)nc 9ϔ#A-ݵQK#y#/X>L~1Dmg{hE;hXn@7GH{O'Fۚ/wC?|MO '$'z]HW3y^1!v ҋY,ؤ?m.Poog> |ZCj i||I0dS,N1 _gE/S-b$5*+y0 t1ʛ7$l EH{2ay GϐJ,3y Ő6,-xJfUx~Dm9׷ @A>[VJcTsƋUp:WS|k& @h+f;n$L- J bйWw0J?.oU'])CK5wU,oe"6o\t z:ř{ES_MD^'oyڒdv%oR7W},}`6,sR^֍t6Tٶ,H^I[Np`crIQM{g[aIOr-z-:?Fvv[-t0w͓%F"rl=g-v+Nbn.)z,yDY6W^1k4*o]w2bWy{lˉWvGK;[KH=]x///^yˋW^Wx///^yˋW^Wx///^yˋW^Wx///^yˋW^Wx///^yˋW^Wx///^yˋW^Wx///^yˋW^Wx///^yˋW^Wx///^yˋW^Wx///^yˋW^Wx///^yˋW^Wx/D:IENDB`$$If!vh#vH#v :V l05H5 aytkaT$$If!vh#vH#v :V l0,5H5 aytkaT$$If!vh#vH#v :V l0,5H5 aytkaT$$If!vh#vH#v :V l0,5H5 aytkaT$$If!vh#vH#v :V l0,5H5 aytkaT$$If!vh#vH#v :V l0,5H5 aytkaT$$If!vh#vH#v :V l0,5H5 aytkaT$$If!vh#vH#v :V l0,5H5 aytkaT$$If!vh#vH#v :V l0,5H5 aytkaT$$If!vh#vH#v :V l0,5H5 aytkaT$$If!vh#vH#v :V l0,5H5 aytkaT$$If!vh#vH#v :V l0,5H5 aytkaT$$If!vh#v8#v #v #v:V  (0585 5 5/ 4 ap(ytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 54 aytka$$If!vh#v8#v #v #v:V 0585 5 5/ 4 aytka$$If!vh#v #v<:V  0F"5 5</ 4 apytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5<4 aytka$$If!vh#v #v<:V 0F"5 5</ 4 aytka9$$If!vh#v#v#v#v #v :V 4 20//,5555 5 2 24 p2ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 4#0//+++,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+++,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 4c0//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 ytka$$If!vh#v#v#v#v #v :V 0//,5555 5 2 24 ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//+,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//,5555 5 2 24 f4ytka$$If!vh#v#v#v#v #v :V 40//,5555 5 2 24 f4ytka$$If!vh#v& #v#v #vn#v :V l  t2*65& 55 5n5 p2ytka|$$If!vh#v& #v#v #vn#v :V l t*65& 55 5n5 ytka?$$If!vh#vt#v#v#vT#v#v4:V l  tP265t555T554pPytkaBkdG$$Iflִ  !%*2tT4  tP26    44 lapPytka$$If!vh#vt#v#v#vT#v#v4:V l t265t555T554ytka$$If!vh#vt#v#v#vT#v#v4:V l t265t555T554ytka$$If!vh#vt#v#v#vT#v#v4:V l t265t555T554ytkafV 666666666vvvvvvvv6666666666666666666666666666666666666666H6666666666666666666666666666666666666666666666666666666666666662 0@P`p28 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV>OJQJ_HmH nH sH tH J`J 'Q-Normal dCJ_HaJmH sH tH Z@Z Mb Heading 1$d@&CJOJQJaJmHsHtH`@` Mb Heading 2$d@&"5CJOJQJ\aJmHsHtHr@r Mb Heading 3)$d<@&^`0a$CJOJQJaJmHsHtH@ Mb:Heading 4,h4,a) b) c),h4 sub sub heading,Level III for #'s)$d<@&^``a$5CJOJQJaJmHsHtHn@n Mb Heading 5&d<@&^`a$CJOJQJaJmHsHtHb@b Mb Heading 6d<@&"5CJOJQJ\aJmHsHtH\@\ Mb Heading 7d<@&CJOJQJaJmHsHtHr@r Mb Heading 8&d<@&^``a$6CJOJQJaJmHsHtHt @t Mb Heading 9& d<@&^0`a$"56CJOJQJaJmHsHtHDA D Default Paragraph FontRi@R 0 Table Normal4 l4a (k ( 0No List HoH MbHeading 1 CharCJOJQJ^JaJNoN MbHeading 2 Char5CJOJQJ\^JaJHoH MbHeading 3 CharCJOJQJ^JaJo! GSHeading 4 Char,h4 Char,a) b) c) Char,h4 sub sub heading Char,Level III for #'s Char5CJOJPJQJ\^JaJHo1H MbHeading 5 CharCJOJQJ^JaJFoAF MbHeading 6 Char5OJQJ\^JHoQH MbHeading 7 CharCJOJQJ^JaJLoaL MbHeading 8 Char6CJOJQJ^JaJNoqN  MbHeading 9 Char56CJOJQJ^JaJo MbXHeading 4 Char1,h4 Char1,a) b) c) Char1,h4 sub sub heading Char1,Level III for #'s Char15CJOJQJ^JaJPOP Mb BodyTabled((CJOJQJ^JaJr@r Mb Table Grid7:V0OJQJbob MbDefault 7$8$H$-B*CJOJQJ^J_HaJmH phsH tH >'`> Mb0Comment ReferenceCJZ@Z Mb0 Comment Text dCJOJQJaJmHsHtHNoN Mb0Comment Text CharCJOJQJ^JaJZ@Z Mb0 Balloon Text dCJOJQJaJmHsHtHNoN Mb0Balloon Text CharCJOJQJ^JaJ@j@@ "Mb0Comment Subject!5\Zo!Z !Mb0Comment Subject Char5CJOJQJ\^JaJZ@2Z Mb0List Paragraph#d^m$CJOJQJaJZ@BZ %Mb0Header$dH$CJOJQJaJmHsHtHBoQB $Mb0 Header CharCJOJQJ^JaJZ @bZ 'Mb0Footer&dH$CJOJQJaJmHsHtHBoqB &Mb0 Footer CharCJOJQJ^JaJ6U`6 Mb0 Hyperlink >*B*ph^ A^ Mb0 TOC Heading)$d@& 5B*OJQJ\aJph6_@@@ MbpTOC 1 *dCJOJQJaJ^B@^ ,Mb0 Body Text+da$"5CJOJQJ\aJmHsHtHNoN +Mb0Body Text Char5CJOJQJ\^JaJpC@p .Mb0Body Text Indent-d7$8$H$^CJOJQJaJmHsHtHVoV -Mb0Body Text Indent CharCJOJQJ^JaJtR@t 0Mb0Body Text Indent 2/d7$8$H$^CJOJQJaJmHsHtHZoZ /Mb0Body Text Indent 2 CharCJOJQJ^JaJbOb Mb Instructions1dM a$CJOJQJ\aJ^>@"^ 3MbTitle2d7$8$H$a$"5CJ$OJQJ\aJ$mHsHtHFo1F 2Mb Title Char5CJ$OJQJ\^JaJ$|^@B| Mb0Normal (Web),Normal (Web) Char4ddd[$\$CJOJQJaJP6@RP Mb0 List Bullet 25dx^h OJQJaJXObX Mb TableTextLeft6$d((CJOJQJaJ.W`q. Mb`Strong 5\^J\O\ Mb TableHeader8$da$5:CJOJQJaJbOb Mb BulletIndent9dxh^`(a$CJOJQJaJDD Mb ListIndent: h8^8`PvO!v MbStyle Heading 2 + Not Bold ; &x@^@`a$\aJNONMb TableCaption<$<a$ mHnHuP"@P Mb0Caption=dxxa$5CJOJQJaJZOZ Mbxl24#>dddM [$\$CJOJPJQJaJ2)`2 Mb0 Page Number^JXQ@X AMb0 Body Text 3 @dxCJOJQJaJmHsHtHLoL @Mb0Body Text 3 CharCJOJQJ^JaJjS@"j CMb0Body Text Indent 3Bdx^hCJOJQJaJmHsHtHZo1Z BMb0Body Text Indent 3 CharCJOJQJ^JaJXP@BX EMb0 Body Text 2 DdxCJOJQJaJmHsHtHLoQL DMb0Body Text 2 CharCJOJQJ^JaJNON MbH4F$ddd1$@&G$5CJOJQJaJJV`qJ Mb0FollowedHyperlink>*B* ^JphjN@j IMb0Body Text First Indent 2Hx7$8$H$^h`CJaJfof HMb0Body Text First Indent 2 CharCJOJQJ^JaJ\J@\ KMbSubtitleJda$"5CJOJQJ\aJmHsHtHLoL JMb Subtitle Char5CJOJQJ\^JaJHOH Mb Table BulletsLB*CJ^JphFOF Mb Table IndentMB*CJ^Jph2(`2 Mb0 Line Number^JROR Mbfont0Oddd[$\$CJOJPJQJ^JaJPOP MbListdot1Pdx7$8$H$CJOJQJaJZI@Z RMb0Message HeaderQ$d^`0a$5CJ\aJRo!R QMb0Message Header CharCJOJQJ^JaJDD MbMessage Header FirstSVoAV MbMessage Header Label5@CJH*OJQJRR MbMessage Header LastUPPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3N)cbJ uV4(Tn 7_?m-ٛ{UBwznʜ"Z xJZp; {/<P;,)''KQk5qpN8KGbe Sd̛\17 pa>SR! 3K4'+rzQ TTIIvt]Kc⫲K#v5+|D~O@%\w_nN[L9KqgVhn R!y+Un;*&/HrT >>\ t=.Tġ S; Z~!P9giCڧ!# B,;X=ۻ,I2UWV9$lk=Aj;{AP79|s*Y;̠[MCۿhf]o{oY=1kyVV5E8Vk+֜\80X4D)!!?*|fv u"xA@T_q64)kڬuV7 t '%;i9s9x,ڎ-45xd8?ǘd/Y|t &LILJ`& -Gt/PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!0C)theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] KYL 7C R%%%%3 0BFqOURSXTV\>jhqoyLQ}C E[ 17!7Ney&6=D " 6l=D DODDDDE>EnEEEE(GL}RRRRRRRRRRRRRRRRRRRRSSSTT TTTTT T%T*T/T4T9T>TCTHTMTRTWTVVVWVX{XXDYHYZZZ\]]e^^Tcicmcc!ddd>jjjkk,nnnoooopeqiqxrYs]ssftjt%unuruuvvw;x?xqyzUYÂƂֆ5{‘EΓѓ”ʔDL6>žaj6? 9=VYDG>B) gkW[ձPi04Ѷ>+0ĻK1z}Hnq2V1AE3OZ /2hl.c15 LPq$(_cILMQn:=26S&*!~9=fc $-CG=A6:MQcg7tY]K    9 <      1Kpty}7      "#$%&'()*+,-./012345689:;<=>?@ABCDEFGHIJKLMOPQRSTUVWXYZ[\]^_`abcdfghijklmnopqrstuvwxz{|}~      !"#$%'()*+,-./012345789:;<>?@ABCE!!!L# @^(    jWW\dX,k)? SAMPLEArial Black#"  ?B S  ? 7e+t@ _Toc107218217 _Toc102881478 _Toc102881479 _Toc102881480 _Toc102881481 _Toc102881482 _Toc102881483 _Toc102881484 _Toc102881485 _Toc102881486 _Toc102881487 _Toc87339444 _Toc87339445 _Toc102881488 _Toc102881489 _Toc102881490 _Toc102881491_GoBackO S'-=DxI\JaJKYLM  8 /e &f' .>DI`JoJ)KLs  8Vb_Wb_Xb_Yb_Zb_[b_\b_]b_^b__b_`b_ab_bb_cb_db_eb_fb_gb_hb_7<C<{<<<=1=^=8rr8     7<N<<<<===m=;zz8 9*urn:schemas-microsoft-com:office:smarttagsplace=*urn:schemas-microsoft-com:office:smarttags PlaceName=*urn:schemas-microsoft-com:office:smarttags PlaceType>*urn:schemas-microsoft-com:office:smarttags PersonName8*urn:schemas-microsoft-com:office:smarttagsdate9*urn:schemas-microsoft-com:office:smarttagsState m 11121519200521272934789DayMonthYear              KQ:@ jp6<39[ a *"0"a#g#.$4$%%%%J&P&((G*M*}****&+,+++++^,d,--..////000000112787x~           (03=(358 MM@Jcm-2 UY) 3            my#583333333333333333Ma797,8186878;8=8HHHHHH   &(03=?(38Ma797,8186878;8=8HHHHHH   &(03=?(38뀶DuZ 7# XZ!ژ~'.{WPV:ln#);U{HpLhһ:i%,iVj7LKqX$ysz#x 7m~J ^`OJQJo( T^T`OJ QJ o( $ ^$ `OJ QJ o(o  ^ `OJ QJ o( ^`OJQJo( ^`OJ QJ o(o d^d`OJ QJ o( 4^4`OJQJo( ^`OJ QJ o(o ^`OJ QJ o( h^h`56^Jo(.^`^J.pL^p`L^J.@ ^@ `^J.^`^J.L^`L^J.^`^J.^`^J.PL^P`L^J. ^`OJQJo( p^p`OJ QJ o(o @ ^@ `OJ QJ o( ^`OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( P^P`OJ QJ o(o  ^ `OJ QJ o( ^`OJ QJ o( ^`OJ QJ o(o p^p`OJ QJ o( @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o P^P`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o( ^`56^Jo(.^`^J.pL^p`L^J.@ ^@ `^J.^`^J.L^`L^J.^`^J.^`^J.PL^P`L^J. b^b`OJ QJ o( T^T`OJ QJ o(o $ ^$ `OJ QJ o(  ^ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( d^d`OJQJo( 4^4`OJ QJ o(o ^`OJ QJ o(hh^h`CJOJ QJ o( ^`OJ QJ o(o hh^h`OJ QJ o( 88^8`OJQJo( ^`OJ QJ o(o   ^ `OJ QJ o(   ^ `OJQJo( xx^x`OJ QJ o(o HH^H`OJ QJ o(hCJOJQJo( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(hh^h`CJOJQJo( 88^8`OJ QJ o(o ^`OJ QJ o(   ^ `OJQJo(   ^ `OJ QJ o(o xx^x`OJ QJ o( HH^H`OJQJo( ^`OJ QJ o(o ^`OJ QJ o(^`B*OJQJo(ph ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(hCJOJQJo( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o( ^`56^Jo(.^`^J.pL^p`L^J.@ ^@ `^J.^`^J.L^`L^J.^`^J.^`^J.PL^P`L^J. ^`OJQJo( p^p`OJ QJ o(o @ ^@ `OJ QJ o( ^`OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( P^P`OJ QJ o(o  ^ `OJ QJ o( ^`56^Jo(.^`^J.pL^p`L^J.@ ^@ `^J.^`^J.L^`L^J.^`^J.^`^J.PL^P`L^J.^`^Jo(.^`^J.pL^p`L^J.@ ^@ `^J.^`^J.L^`L^J.^`^J.^`^J.PL^P`L^J.hCJOJQJo(8^8CJOJQJo( pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(7m~%,i~'DXZ!$ys#x{WZ VjKqLh:iln#){H         (                                    >k                  \:v        RL                          RL        ʞ                 ؟                  RL       ! Yq Yi}"''Q-0{=;F~MQRoCUMblBPn*ue~*^kaH=OV}%aDIq  @7@Unknown G*Ax Times New Roman5Symbol3. *Cx Arial=Times-Bold?Times-RomanI. ??Arial Unicode MS7.@Calibri5. .[`)Tahoma7@Cambria;Wingdings?= * Courier NewA$BCambria Math"1 h#6#6yf:(K3:(K3!0  2HX  $PMb2! xx 0Attachment 3: IV&V Sample Report Review TemplateChristy Butchermnt76813T             Oh+'0  0 < H T`hpx4Attachment 3: IV&V Sample Report Review TemplateChristy Butcher Normal.dotm mnt768132Microsoft Office Word@F#@>]@w@w3:(K՜.+,D՜.+,l( hp  Computer Aid, Inc.  1Attachment 3: IV&V Sample Report Review Template Title P-5Imy ContentType7display_urn:schemas-microsoft-com:office:office#Editor TemplateUrl xd_ProgID7display_urn:schemas-microsoft-com:office:office#AuthorOrder _SourceUrl DocumentBell Sinclair, Linda (VITA)Bell Sinclair, Linda (VITA)45800.0000000000  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-.012345689:;<=>GHI]LM[OPQRSTUVWXYZ\Root Entry F4KData GGL1TableȀWordDocument.SummaryInformation(/DocumentSummaryInformation87MsoDataStore " FI43FGEYOWXA==2" JItem  PropertiesSRGZSWE0MHDVZKQ==2 " qItem  Properties OBYMUOW==2" Item N.Properties  " DocumentLibraryFormDocumentLibraryFormDocumentLibraryForm This value indicates the number of saves or revisions. The application is responsible for updating this value after each revision. metaAttributes"/>  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89qCompObj!r