ࡱ>  =?6789:;<ABQ_ ebjbjzXzX 2@\2@\YSff:tPtdtdtdt4ttthuy\t/,`z`(̟|H@+++++++$.w1+dt"+dtdt+NNNdtdt+N+NNVpׯLL++0/,& 3j 3| 3dt ,N6++. /, 3f> s: Information Standard 18: Information Security - Implementation Guideline Final July 2011 v1.0.2 PUBLIC Document details Security classificationPUBLICDate of review of security classification STYLEREF "Report date" \* MERGEFORMAT July 2011AuthorityQueensland Government Chief Information OfficerAuthorICT Policy and Coordination Office Documentation statusWorking draftConsultation release(Final versionContact for enquiries and proposed changes All enquiries regarding this document should be directed in the first instance to: Director, Policy Development ICT Policy and Coordination Office  HYPERLINK "mailto:ICTPolicy@qld.gov.au" ICTPolicy@qld.gov.au Acknowledgements This version of the  STYLEREF "Report title" \* MERGEFORMAT Information Standard 18: Information Security - Implementation Guideline was developed and updated by the ICT Policy and Coordination Office. This guideline is based on Annex A Control objectives and controls of the AS/NZS ISO IEC 27001:2006 Information technology Security techniques Information security management systems Requirements. Reproduced with permission from SAI Global under Licence 0911-C028. Feedback was also received from a number of agencies, including members of the Information Security Reference Group, which was greatly appreciated. Copyright  STYLEREF "Report title" \* MERGEFORMAT Information Standard 18: Information Security - Implementation Guideline Copyright The State of Queensland (Department of Public Works) 2010 Information security This document has been security classified using the Queensland Government Information Security Classification Framework (QGISCF) as PUBLIC and will be managed according to the requirements of the QGISCF. Contents  TOC \o "1-1" \h \z \t "Heading 2,2"  HYPERLINK \l "_Toc273003703" 1 Introduction  PAGEREF _Toc273003703 \h 5  HYPERLINK \l "_Toc273003704" 1.1 Purpose  PAGEREF _Toc273003704 \h 5  HYPERLINK \l "_Toc273003705" 1.2 Audience  PAGEREF _Toc273003705 \h 5  HYPERLINK \l "_Toc273003706" 1.3 Scope  PAGEREF _Toc273003706 \h 5  HYPERLINK \l "_Toc273003707" 1.4 Document structure  PAGEREF _Toc273003707 \h 5  HYPERLINK \l "_Toc273003708" 2 Background  PAGEREF _Toc273003708 \h 6  HYPERLINK \l "_Toc273003709" 3 Policy, planning and governance  PAGEREF _Toc273003709 \h 8  HYPERLINK \l "_Toc273003710" 3.1 Information security policy  PAGEREF _Toc273003710 \h 8  HYPERLINK \l "_Toc273003711" 3.2 Information security plan  PAGEREF _Toc273003711 \h 8  HYPERLINK \l "_Toc273003712" 3.3 Internal governance  PAGEREF _Toc273003712 \h 10  HYPERLINK \l "_Toc273003713" 3.4 External party governance  PAGEREF _Toc273003713 \h 10  HYPERLINK \l "_Toc273003714" 4 Asset management  PAGEREF _Toc273003714 \h 11  HYPERLINK \l "_Toc273003715" 4.1 Asset protection responsibility  PAGEREF _Toc273003715 \h 11  HYPERLINK \l "_Toc273003716" 4.2 Information security classification  PAGEREF _Toc273003716 \h 12  HYPERLINK \l "_Toc273003717" 5 Human resources management  PAGEREF _Toc273003717 \h 12  HYPERLINK \l "_Toc273003718" 5.1 Pre-employment  PAGEREF _Toc273003718 \h 12  HYPERLINK \l "_Toc273003719" 5.2 During employment  PAGEREF _Toc273003719 \h 12  HYPERLINK \l "_Toc273003720" 5.3 Post-employment  PAGEREF _Toc273003720 \h 13  HYPERLINK \l "_Toc273003721" 6 Physical and environmental management  PAGEREF _Toc273003721 \h 15  HYPERLINK \l "_Toc273003722" 6.1 Building controls and secure areas  PAGEREF _Toc273003722 \h 15  HYPERLINK \l "_Toc273003723" 6.2 Equipment security  PAGEREF _Toc273003723 \h 15  HYPERLINK \l "_Toc273003724" 7 Communications and operations management  PAGEREF _Toc273003724 \h 17  HYPERLINK \l "_Toc273003725" 7.1 Operational procedures and responsibilities  PAGEREF _Toc273003725 \h 17  HYPERLINK \l "_Toc273003726" 7.2 Third party service delivery  PAGEREF _Toc273003726 \h 17  HYPERLINK \l "_Toc273003727" 7.3 Capacity planning and system acceptance  PAGEREF _Toc273003727 \h 17  HYPERLINK \l "_Toc273003728" 7.4 Application integrity  PAGEREF _Toc273003728 \h 17  HYPERLINK \l "_Toc273003729" 7.5 Backup procedures  PAGEREF _Toc273003729 \h 19  HYPERLINK \l "_Toc273003730" 7.6 Network security  PAGEREF _Toc273003730 \h 20  HYPERLINK \l "_Toc273003731" 7.7 Media handling  PAGEREF _Toc273003731 \h 22  HYPERLINK \l "_Toc273003732" 7.8 Information exchange  PAGEREF _Toc273003732 \h 23  HYPERLINK \l "_Toc273003733" 7.9 eCommerce  PAGEREF _Toc273003733 \h 24  HYPERLINK \l "_Toc273003734" 7.10 Information processing monitoring  PAGEREF _Toc273003734 \h 24  HYPERLINK \l "_Toc273003735" 8 Access management  PAGEREF _Toc273003735 \h 26  HYPERLINK \l "_Toc273003736" 8.1 Access control policy  PAGEREF _Toc273003736 \h 26  HYPERLINK \l "_Toc273003737" 8.2 Authentication  PAGEREF _Toc273003737 \h 26  HYPERLINK \l "_Toc273003738" 8.3 User access  PAGEREF _Toc273003738 \h 26  HYPERLINK \l "_Toc273003739" 8.4 User responsibilities  PAGEREF _Toc273003739 \h 27  HYPERLINK \l "_Toc273003740" 8.5 Network access  PAGEREF _Toc273003740 \h 27  HYPERLINK \l "_Toc273003741" 8.6 Operating system access  PAGEREF _Toc273003741 \h 27  HYPERLINK \l "_Toc273003742" 8.7 Application and information access  PAGEREF _Toc273003742 \h 28  HYPERLINK \l "_Toc273003743" 8.8 Mobile computing and telework access  PAGEREF _Toc273003743 \h 28  HYPERLINK \l "_Toc273003744" 9 System acquisition, development and maintenance  PAGEREF _Toc273003744 \h 29  HYPERLINK \l "_Toc273003745" 9.1 System security requirements  PAGEREF _Toc273003745 \h 29  HYPERLINK \l "_Toc273003746" 9.2 Correct processing  PAGEREF _Toc273003746 \h 29  HYPERLINK \l "_Toc273003747" 9.3 Cryptographic controls  PAGEREF _Toc273003747 \h 29  HYPERLINK \l "_Toc273003748" 9.4 System files  PAGEREF _Toc273003748 \h 29  HYPERLINK \l "_Toc273003749" 9.5 Secure development and support processes  PAGEREF _Toc273003749 \h 30  HYPERLINK \l "_Toc273003750" 9.6 Technical vulnerability management  PAGEREF _Toc273003750 \h 30  HYPERLINK \l "_Toc273003751" 10 Incident management  PAGEREF _Toc273003751 \h 31  HYPERLINK \l "_Toc273003752" 10.1 Event/weakness reporting  PAGEREF _Toc273003752 \h 31  HYPERLINK \l "_Toc273003753" 10.2 Incident procedures  PAGEREF _Toc273003753 \h 31  HYPERLINK \l "_Toc273003754" 11 Business continuity management  PAGEREF _Toc273003754 \h 33  HYPERLINK \l "_Toc273003755" 11.1 Business continuity  PAGEREF _Toc273003755 \h 33  HYPERLINK \l "_Toc273003756" 11.2 Disaster recovery  PAGEREF _Toc273003756 \h 33  HYPERLINK \l "_Toc273003757" 12 Compliance management  PAGEREF _Toc273003757 \h 34  HYPERLINK \l "_Toc273003758" 12.1 Legal requirements  PAGEREF _Toc273003758 \h 34  HYPERLINK \l "_Toc273003759" 12.2 Policy requirements  PAGEREF _Toc273003759 \h 34  HYPERLINK \l "_Toc273003760" 12.3 Audit requirements  PAGEREF _Toc273003760 \h 34  HYPERLINK \l "_Toc273003761" 13 Reporting requirements  PAGEREF _Toc273003761 \h 35  HYPERLINK \l "_Toc273003762" 13.1 Event and incident information  PAGEREF _Toc273003762 \h 35  HYPERLINK \l "_Toc273003763" 13.2 VRT communication alerts  PAGEREF _Toc273003763 \h 35  HYPERLINK \l "_Toc273003764" Appendix A Information security related legislation and standards  PAGEREF _Toc273003764 \h 36  Introduction Purpose This guideline provides information and advice for Queensland Government agencies to consider when implementing the mandatory principles of  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Information Standard 18: Information security (IS18). The requirements of  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" IS18 and this supporting guideline, are based on the three elements of information security: confidentiality ensuring that information is accessible only to those authorised to have access integrity safeguarding the accuracy and completeness of information and processing methods availability ensuring that authorised users have access to information and associated assets when required. These guidelines do not form the mandatory component of  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" IS18 and are for information only, however they are based on best practice and agencies are strongly recommended to consider the advice provided in this document. Audience This document is primarily intended for: information security governance bodies information security strategic areas information security operational areas. Scope This guideline supports  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" IS18. Document structure The  HYPERLINK "http://qgcio.govnet.qld.gov.au/SiteCollectionDocuments/Architecture%20and%20Standards/QGEA%202.0/QG%20Information%20Security%20Policy%20Framework%201%200%201.pdf" Queensland Government Information Security Policy Framework (QGISPF) represents information security at two levels of detail. This guideline has been similarly divided into two levels of domains, with the ten level one domains corresponding with the ten mandatory principles in  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" IS18. Please note a reporting requirements heading has also been included to align with  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" IS18. Headings are as follows: policy, planning and governance asset management human resources management physical and environmental management communications and operations management access management system acquisition, development and maintenance incident management business continuity management compliance management reporting requirements. Background  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" IS18 has been developed to provide agencies with the minimum requirements for information security management. However, some agencies may find that their particular agency requires more stringent information security controls to be implemented. In these cases it is suggested that agencies refer to the following for guidance:  HYPERLINK "http://infostore.saiglobal.com/store2/Details.aspx?ProductID=1119299" ISO/IEC 27000 series of standards (incorporating ISO 17799) International Standard ISO/IEC 27000 series is available through Standards Australia (SAI Global distributors). HYPERLINK "http://www.safeguarding.qld.gov.au/govassets/index.htm"Tools and templates (Queensland Government employees only) issued by Security Planning and Coordination, Queensland Police Service (function formerly residing in Department of Premier and Cabinet)  HYPERLINK "http://www.ag.gov.au/pspf" Australian Government Protective Security Policy Framework the Australian Government Protective Security Policy Framework (PSPF) is issued by the Attorney-Generals Department. This standard is restricted to Government agencies and can be purchased by emailing  HYPERLINK "mailto:pspf@ag.gov.au" pspf@ag.gov.au. The PSPF has superseded the Australian Government Protective Security Manual (PSM) as of June 2010  HYPERLINK "http://www.dsd.gov.au/library/infosec/ism.html" Australian Government Information Security Manual - the Australian Government Information Security Manual (ISM) is available through the Department of Defence Defence Signals Directorate website. Agencies may also consider the application of various methods and industry frameworks for managing their agency information security. Note that the Queensland Government is not legislatively obliged to comply with the  HYPERLINK "http://www.ag.gov.au/pspf" PSPF and  HYPERLINK "http://www.dsd.gov.au/infosec/ism.htm" ISM. However, the Queensland Government is a signatory to a Memorandum of Understanding that commits it to engage in practices consistent with these manuals. There are a number of other documents that support implementation of  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" IS18 that have been produced by the ICT Policy and Coordination Office. These documents are referred to throughout this document and also in Figure 1 (page 7).  EMBED Visio.Drawing.11  Figure  SEQ Figure \* ARABIC 1 IS18: Information security supporting documents organised by mandatory principle Policy, planning and governance Information security policy The agency information security policy serves as the foundation for information security management within the agency. The development of this policy is the first step in establishing management commitment and the responsibilities for information security within the agency and should therefore be concise and clear. The  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Information Security Policy Mandatory Clauses has been developed to assist agencies in the development of their information security policy and details the minimum set of mandatory requirements and quality criteria that must be included within the agency policy and makes suggestions for agency specific considerations. Information security plan The level of detail contained in the agencys information security plan should be commensurate with the complexity of the agencys information environment, its business functions and the information security risks that it faces. The suggested approach for the development of the plan is to: develop an overarching information security plan, which outlines the security program for the agency as a whole support this information security plan with a number of detailed plans for each separate entity/agency portfolio and/or significant or high risk agency information systems and processes. Regardless of the development or format of the plan, information security planning should be integrated into the agencys culture through its strategic and organisational plans and operational practices. Security considerations should be incorporated into the agency corporate planning process and ICT strategic resource planning, to ensure that the agency information security plan meets the business and operational needs of the agency and its clients. Suggested steps for developing an information security plan There are a number of steps which should be used to develop the agency information security plan. Step 1: Identify agency goals and objectives for information security Identify linkages between the agency information security policy and all agency corporate plans, strategies, goals and objectives to establish the key areas which may impact on the current or future information security environment of the agency. Step 2: Identify major information assets and business critical ICT assets This information may be sourced from the agencys disaster recovery register. Agencies are required to establish this register under  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" IS18. Step 3: Conduct a risk assessment Conduct a risk assessment on the major information assets with the assigned owners of these assets on an annual basis or after any significant change has occurred (eg. machinery-of-Government). The process or methodology used by the agency to assess security risks should be based on the agencys preferred risk management processes. In the absence of an agency risk methodology agencies are encouraged to utilise  HYPERLINK "http://infostore.saiglobal.com/store2/Details.aspx?ProductID=1378614" AS/NZS ISO 31000:2009 Risk management Principles and guidelines. Step 4: Current situation Gather information regarding existing agency security policies, procedures and controls and map these against the: data obtained from the risk assessment process mandatory principles of  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" IS18 and/or any other security standards that the agency uses agencys security architecture targets. Step 5: Analysis of any gaps and the effectiveness of existing controls Conduct an analysis of any gaps and the effectiveness of the existing controls against the information obtained from step 4 above. Step 6: Develop recommendations and strategies Develop and document recommended controls and prioritised plan of actions/strategies which need to be implemented or maintained to achieve the desired level of agency security, how this is to be achieved and who is responsible. Information security plans should provide for treatments that are both cost-effective and appropriate to the level of risk. Where agencies identify a high level of risk in their information environment (based on the information security classification of information assets in its care) it is suggested that it consult with specialist information security agencies or industry professional bodies for advice or technical assistance in developing their strategies and plans. Step 7: Identify outstanding/residual risks that will not be treated Document any ongoing risks that will remain untreated or assessed as acceptable risks. Step 8: Obtain agreement on risks and strategies To ensure that the information security plan meets the requirements of the business it is important to gain agreement from the information asset owners. This will ensure that the strategies and plan adequately reflects the protection of the assets from a business perspective and will also inform the prioritisation process for treatment. Step 9: Develop actions and timetable Document and develop a detailed plan of activities and actions along with timeframes for implementing the controls and strategies agreed on. Step 10: Determine resourcing Document and detail the resourcing requirements for the implementation of the controls and strategies including the personnel, materials and budget for its implementation. Step 11: Endorsement and publishing of the information security plan Gain endorsement of the information security plan from the appropriate governance body and senior executive on an annual basis. Step 12: Implementation of the information security plan To facilitate a systematic and co-ordinated approach to security and risk management, agencies should establish a structure or framework to help develop and implement the agency information security plan. Step 13: Ongoing monitoring and review To ensure that security controls in the agency continue to remain relevant to the agency goals, objectives and operational and business environments, the agencys information security plan should be reviewed, monitored and reported on, on an ongoing basis. The information gained from these activities is used to inform future agency security plans and strategies. It is suggested that agencies review their security plan at least annually to identify changes to the risk profile and to assess the effectiveness of existing controls. Further to this, the agency should ensure that security planning becomes an integral component of all agency management, projects and activities rather than an isolated and once a year planning activity. General agency security plan Whilst the ICT Policy and Coordination Office works with agencies to improve information security practices across the Queensland Government, protective security and counter-terrorism issues throughout Queensland are coordinated by the Queensland Police Service. The Government Asset Protection (GAP) Project has produced the Guide for general security planning which agencies should refer to when developing their general agency security plan. Enquiries about this document can be directed to the Queensland Police Services Security Planning and Coordination team on 07 3406 3677 or by emailing  HYPERLINK "mailto:security.planning@police.qld.gov.au" security.planning@police.qld.gov.au. Internal governance The  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Information Security Internal Governance Guideline provides implementation advice for this domain. Information on internal governance arrangements for ICT and information management are available in the following documents respectively:  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspx" Information Standard 2: ICT Resources Strategic Planning  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Information Security Internal Governance Guideline. External party governance See the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Information Security External Party Governance Guideline. Asset management Asset protection responsibility Information assets It is a requirement of  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Information.aspx" Information Standard 44, Information asset custodianship (IS44) that agencies: identify their information assets establish and maintain an information asset register. Agencies may wish to use this register or establish a separate one, to record the information security classification of its information assets. The following documents provide agencies with implementation guidance:  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Information.aspx" IS44  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/informationstandards/toolbox/Pages/InformationAssetCustodianship.aspx" Identification and classification of information assets guideline  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Queensland Government Information Security Classification Framework (QGISCF)  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Queensland Government Information Security Controls Standard (QGISCS). Disposal of information assets For information assets that are public records, their retention and disposal must be managed in accordance with a retention and disposal schedule approved by the state archivist, under the  HYPERLINK "http://www.legislation.qld.gov.au/Acts_SLs/Acts_SL_P.htm" \o "" Public Records Act 2002. For further information regarding the disposal of records agencies should refer to  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Information.aspx" Information Standard 31: Retention and disposal of public records (IS31). For all other information assets agencies should refer to the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCF and the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCS. Refer to section 4.2 below for guidance on the disposal of equipment. Control of technology devices It is a requirement of  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" IS18 and the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Information Security Policy Mandatory Clauses that agencies identify their ICT assets, document them and assign owners for the maintenance of information security controls. ICT assets must be assigned information security controls commensurate with the highest level of security classification applied to the information assets contained within or transmitted via the ICT asset. The following documents provide agencies with further implementation requirements and guidance:  HYPERLINK "http://www.qgcio.qld.gov.au/SiteCollectionDocuments/Architecture%20and%20Standards/QGISCF%20v1.0.1.doc" Queensland Government Information Security Classification Framework  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Queensland Government Network Transmission Security Assurance Framework (NTSAF). In the absence of advice within these documents, agencies should consider guidance from the:  HYPERLINK "http://www.ag.gov.au/pspf" PSPF HYPERLINK "http://www.dsd.gov.au/infosec/ism.htm"ISM. Information security classification Agencies should refer to the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCF which provides detailed implementation requirements and guidance with respect to the information security classification and control of information assets. Additional advice is available within the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCS. Agencies should be mindful that the information security classification of an information asset, does not limit the operation of legislation. For example, a policy document classified as PROTECTED may be assessed as suitable for release under the  HYPERLINK "http://www.legislation.qld.gov.au/Acts_SLs/Acts_SL_R.htm" Right to Information Act 2009. In this situation, the information would need to be reclassified as PUBLIC. Human resources management Pre-employment Depending on the nature of the agencys business, consideration should be given as to whether: specific information security clauses should be included in terms and conditions of employment (eg. responsibilities and disciplinary processes) additional scrutiny is required during the recruitment and selection phase for positions involving exposure to classified or sensitive information or where relevant legislation is in place (eg. security assessments and criminal history checks). When dealing with employment for these types of positions the following include examples of what requirements the agency needs to consider: the availability of satisfactory character referees the completeness and accuracy of resume and qualifications security and criminal history checks (where required under legislation or where clearly identified risks can be reduced by such checks) the  HYPERLINK "http://www.ag.gov.au/pspf" PSPF for further information on employing staff who will be dealing with national security classified information. During employment Induction, training and awareness programs The information security induction, training and awareness program should: address all levels of staff and all areas of the agency cover the following: general employee responsibilities (see  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Information Security Internal Governance Guideline) information security responsibilities concerned with particular roles (see  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Information Security Internal Governance Guideline) the correct operation of information systems and ICT facilities and devices (see also  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspx" Information Standard 38: Use of ICT Facilities and Devices (IS38)) reporting of information security events, weaknesses and incidents information security related responsibilities within the agency code of conduct and the disciplinary penalties for breaches. be updated regularly to include changes in the information security plan and policy include regular refresher training. Examples of mechanisms that agencies may consider when developing information security induction, training and awareness programs include: addressing information security responsibilities within the agencys code of conduct briefing sessions online tutorials regular distribution of educational material (eg. security updates, log-on notices, factsheets, newsletter articles and posters) distributing copies of the agencys information security policy and obtaining a signed acknowledgement of understanding from each employee (especially those that handle classified information). It is the responsibility of: managers to ensure that their employees undertake information security induction training and regular refresher training agency employees to understand and follow information security policy and processes. Roles and responsibilities High level information security roles and responsibilities are defined within the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Information Security Internal Governance Guideline. Agencies should use this guideline as a basis for developing, documenting and assigning information security roles and responsibilities within their environment. Disciplinary processes The disciplinary actions and processes for misconduct and official misconduct should be determined under the  HYPERLINK "http://www.legislation.qld.gov.au/Acts_SLs/Acts_SL_P.htm" Public Service Act 2008 and/or other relevant legislation, regulation and policy that apply to the agency. These should be documented in the agencys terms and conditions of employment. For guidance on information security incident management, agencies should refer to Section 10 Incident Management in this document Post-employment The Public Service Commissions  HYPERLINK "http://www.psc.qld.gov.au/page/corporate-publications/directive/index.shtml" Directive No. 2/09: Employment separations procedures, requires agencies to establish separation procedures in all cases where an employee is separating employment from the Queensland Public Service. Implementation of this directive is supported by an  HYPERLINK "http://www.psc.qld.gov.au/page/corporate-publications/catalogue/ceo-ses-so.shtml" \l "separation" Employment separation checklist. In addition the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Information Security Policy Mandatory Clauses requires agencies to set up procedures for ensuring the security of the agency during the separation of employees from, or movement within the agency. It is recommended that agencies also ensure that procedures are in place for termination of employment. To meet this requirement, it is suggested that agencies implement: exit interviews that ensure the employee understands their continuing responsibilities for maintaining information confidentiality and privacy (especially when the employee has had access to classified information), and respecting the Queensland Governments intellectual property rights this should include the consequences of non compliance with these responsibilities separation checklists that confirm: exit interview has been conducted all Queensland Government property has been returned (eg. access cards/keys, credit cards, mobile phones, personal digital assistants) the employees user ID has been disabled and access rights revoked. As is the case with many personnel security issues, the responsibility for employee separation procedures does not remain with one area of the agency but requires a coordinated approach across the agency. Physical and environmental management Agency information security should work with those responsible for protective security within their agency to ensure that appropriate physical and environmental management controls are implemented. Building controls and secure areas The level of building and secure area controls to be implemented would depend on the classification of information assets stored therein under the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCF. The  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCF and the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCS provide some guidance with regard to building controls and secure areas. In the absence of advice within these documents, agencies should refer to: HYPERLINK "https://portal.qgcio.qld.gov.au/images/documents/QGEA_documents/QGEA/IS18%20toolbox/GAP_GeneralSecurity.pdf"Guides and tools (Queensland Government employees only) issued by the Security Planning and Coordination unit within the Queensland Police Service AS 2834-1995 Computer accommodation  HYPERLINK "http://www.ag.gov.au/pspf" PSPF HYPERLINK "http://www.dsd.gov.au/infosec/ism.htm"ISM. Equipment security The level of controls to be applied to agency equipment would depend on the classification of the information assets the equipment stores or transmits under the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCF. The QGISCF provides some guidance with regard to the following controls: preparation and handling removal from workplace and monitoring discussing classified information (including telephone and video conference) copying and storage electronic transmission archive and disposal. Additional advice is available within the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCS. Agency risk assessments may identify the need for additional information security controls for equipment. In the absence of advice within the above documents, agencies should refer to the:  HYPERLINK "http://www.ag.gov.au/pspf" PSPF HYPERLINK "http://www.dsd.gov.au/infosec/ism.htm"ISM. Note: the Queensland Government is not legislatively obliged to comply with the  HYPERLINK "http://www.ag.gov.au/pspf" PSPF and ISM. However, the Queensland Government is a signatory to a Memorandum of Understanding that commits it to engage in practices consistent with these manuals. Offsite equipment When developing policies and processes for the use and/or maintenance of offsite equipment, agencies should ensure: a risk assessment is conducted prior to locating equipment offsite Equipment and media taken off the premises are not left unattended in public places. This extends to ensuring that portable equipment is carried as hand luggage and disguised where possible during travel manufacturers instructions for protecting equipment are followed teleworking arrangements are determined by risk assessment and suitable controls are applied as appropriate (eg. backup, virus protection) adequate insurance cover for offsite equipment. Maintenance of equipment To ensure availability and integrity of information, equipment should always be maintained according to manufacturers maintenance guidelines. Maintenance processes cover a wide range of activities including preventative, repair and upgrade maintenance, which may be the result of scheduled or non-scheduled activities. Agencies need to ensure that adequate policies and processes are in place to protect agency information, during any maintenance process. Agencies should be mindful of the risks of continuing to use equipment that is no longer supported by a vendor. Unsupported equipment are subject to increased information security risks as patches for new vulnerabilities identified will not be available. Disposal of equipment The  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCF and the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCS provide some guidance on appropriate controls for disposal of electronic media and equipment commensurate with security classification levels. In accordance with  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspx" Information Standard 13: Procurement and disposal of ICT products and services (IS13) disposal of government-owned ICT resources must be: conducted with approval from the accountable officer or delegated personnel supervised and certified upon completion by a person delegated by the accountable officer. Agencies should ensure that these policies and processes include employee training. Further implementation guidance is available within the HYPERLINK "http://www.dsd.gov.au/infosec/ism.htm"ISM which provides detailed instructions on product and media sanitisation and disposal. Communications and operations management Operational procedures and responsibilities When documenting operational procedures agencies should at a minimum ensure that detailed operating instructions are in place for all processes outlined in the mandatory principles of  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" IS18. In terms of assigning operational responsibilities agencies should consider the separation of operational functions and duties where procedures involve activities, which could be susceptible to unauthorised activity, misuse of information or pose a conflict of interest, such as security audits. Third party service delivery Agencies should ensure that third party services are managed and operated according to service level or operating level agreements. Further advice is available within the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Information Security External Party Governance Guideline and the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Information Security Internal Governance Guideline. Capacity planning and system acceptance To minimise threats to the operational environment agencies should at a minimum ensure: adequate testing and change control mechanisms are in place for the migration of new or modified systems into the operational environment that the information environment is managed in a way that will easily accommodate changes or future expansions so as to not adversely impact the operational environment. Application integrity Agencies are required to implement controls for the prevention, detection and removal of malicious and mobile code. Malicious code Malicious code includes, but is not limited to, viruses, spyware, worms, Trojan horses and logic bombs. The following controls are recommended: anti-malware software software authorisation policy and processes education and awareness infection handling procedures. Anti-malicious code software Agencies should ensure that current anti-malicious code software is installed. The following points summarise some of the considerations an agency should make when implementing anti-malicious code software. when selecting a product agencies should consider: the vendors track record and frequency of updates using more than one product to ensure maximum protection. the anti-malicious code software should be configured to: run whole of server scans daily sit inside the agency firewall in real time mode to ensure malicious and mobile code infections are identified and cleaned immediately upon detection deal with both spam and instant messaging. a separate server or computer should be configured to sit inside the agency firewall in real-time mode this server should be configured with appropriate software to check for malicious code (if a virus is detected and all incoming and outgoing email attachments can be cleaned then the message can be distributed or if attachments cannot be cleaned then the message should be blocked) the anti-malicious code software must be updated with new definition files and scanning engines as soon as possible after vendors make them available the implemented anti-malicious code software should be regularly reviewed agencies should ensure that virus protection and recovery strategies are included in risk management and business continuity plans. Software authorisation policy Agencies should establish a policy outlining the prohibited use and installation of software not authorised by the agency including user responsibilities with regards to downloading software from the internet, email or media devices. In order to reduce the risk of malicious code being introduced into agencies systems via these mechanisms. See also  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspx" IS38. Education and awareness Users must be educated about malicious code in general, the risks posed, virus symptoms and warning signs including what processes should be followed in the case of a suspected virus. Agencies should consider network broadcasts or a system for alerting users of virus attacks. Ensuring that personnel are aware of their responsibilities when using the Internet and the agencys software authorisation policy will also reduce the risk of the introduction of malicious code. Further implementation guidance is available within: HYPERLINK "http://www.dsd.gov.au/infosec/ism.htm"ISM  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspx" IS38. Infection handling procedures The HYPERLINK "http://www.dsd.gov.au/infosec/ism.htm"ISM provides some instructions on the handling of malicious code infections. Mobile code The  HYPERLINK "http://infostore.saiglobal.com/store2/Details.aspx?ProductID=1017612" AS/NZS ISO/IEC 27002:2006 Information technology Security techniques Code of practice for information security management defines mobile codes as software code which transfers from one computer to another computer and then executes automatically and performs a specific function with little or no user interaction. Mobile code is associated with a number of middleware services. In addition to ensuring that mobile code does not contain malicious code, control of mobile code is essential to avoid unauthorised use or disruption of system, network, or application resources and other breaches of information security. The following controls are recommended: blocking education and awareness. Blocking Agencies may wish to consider blocking the use and receipt of mobile code. However, this should be balanced against the potential loss of business functionality. A middle ground may be the blocking of mobile code for selected websites only. This approach must be consistent with the agencys internet acceptable use policy. See further  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspx" IS38. Agencies should be mindful that active content filters must be installed on a gateway/firewall if they are to be effective. Education and awareness Users should be educated about mobile code in general including the risks posed. Further implementation advice on mobile code controls is available in  HYPERLINK "http://infostore.saiglobal.com/store2/Details.aspx?ProductID=1017612" AS/NZS ISO/IEC 27002:2006 Information technology Security techniques Code of practice for information security management. Reporting malicious and mobile code incidents In addition agencies are required to establish reporting procedures for malicious and mobile code incidents. For further advice on reporting of malicious and mobile code incidents see:  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Information Security Incident Category Guideline Information Security Event and Incident Management Guideline (not yet approved)  HYPERLINK "http://infostore.saiglobal.com/store2/Details.aspx?ProductID=394737" AS/NZS ISO/IEC 18044:2006 Information technology Security techniques Information security incident management. Backup procedures When establishing backup procedures and processes, agencies should consider the following factors to minimise threats to the integrity and availability of information: backup information should be afforded appropriate controls (including physical and environmental) commensurate with the information security classification of the information assets involved backup cycles should be based on analysis of the business risk, frequency with which data and software is changed and the criticality of the system to business operations. The cycle should include, as a minimum: incremental daily backups of data and full weekly backups of all data, operating system and applications - backups of data on a cycle deemed appropriate by the IT Manager, but as a minimum, on a weekly basis backups of the complete operating system, and applications on a cycle deemed appropriate by the IT Manager, but as a minimum, on a monthly basis. a register of backups, including verification of their success, should be maintained restoration procedures should be documented and available to those that require it and at the location that the information is backed up the means to recover the information is stored at its back up location or is at least available from an identified source as required a cycle of backup media should be used for all backups (see also below regarding business continuity and ICT disaster recovery) in addition to regular back up cycles, a system backup should be performed before and after major changes to the operating system, system software, or applications consideration should be taken when upgrading technologies to ensure that backup data is able to read in the new environment a cycle of regular tests should be implemented to verify that the system can be recovered from the backups produced (see also below regarding business continuity and ICT disaster recovery) a cycle of backup media should be retained of all information required to meet customer service, legal or statutory obligations. effective backup procedures are important to ensure business continuity and the ability to recover from disasters for business continuity and ICT disaster recovery purposes: at least one copy in each backup cycle and restoration procedures should be stored off-site and in accordance with the business continuity and relevant ICT disaster recovery plans regular tests (at least annually) should ensure that backup procedures meet the requirements of business continuity and ICT disaster recovery plans see further section  REF _Ref264027671 \r \h 11. Queensland State Archives provides advice on risks associated with relying on backups as evidence of business activity and the appropriate retention of backups. For further information refer to the  HYPERLINK "http://www.archives.qld.gov.au/" Queensland State Archives Public Records Brief: Management of backups. Network security Network security management is critical to the overall security of the agency information environment. Agencies should ensure that appropriate governance and controls are in place to protect networks from internal and external threats including intrusion, disruption or exposure through malicious or accidental action. These controls should be commensurate with the highest level of security classification applied to the information assets contained within the network, and transported between agency gateways. Where possible the application and monitoring of network security controls should be automated in order to address scalability requirements and to reduce costs. Processes in place for secure network management include but are not limited to: designing networks, including their infrastructure are designed with appropriate controls for that entity for all ICT assets that provide services accessible outside Queensland Governments internal networks it is recommended that: these are isolated to a separate, security network domain, called a demilitarised zone (DMZ) the DMZ is secured with controls commensurate with the highest level of information security classification for the information assets stored within or transiting the DMZ, including defence-in-depth deployments, firewalls, intrusion detection and prevention systems (IDP), monitoring and reporting business requirements for access controls for all ICT assets within the DMZ are identified and implemented. maintaining current documentation for network and gateway systems, including firewall and security device configurations and ensuring that only staff with a need to know have access to this documentation security configuration management and software updates monitoring and analysis of logs from firewalls for security breaches alerts for detected breaches and intrusion attempts, and a documented response process regular testing of network security. Agencies are to note that the Queensland Government Consolidated Infrastructure (QGCI) as delivered by the Foundation Infrastructure Project (FIP), will be provisioning an IDP service and a multi-tenanted security information and event management solution, and offering these services to agencies that migrate to this new whole-of-Government solution. Agencies wishing to utilise these technologies within their own network management domain, should seek guidance from the QGCTO on the interoperability with the QGCI solution; however, the preference is for agencies to consume whole-of-Government services provided by CITEC. Further implementation guidance is available within the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/azqgeadocs.aspx" \l "n" NTSAF. Firewalls Agencies should implement firewalls: at the network perimeter to prevent unauthorised access to agency networks on the internal network and on servers (depending on the agencys network security architecture). Agencies should document tightly defined firewall rules that match network access requirements. This should be stored in a secure location and be known to those employees with a need to know. Agency change control and configuration processes must include consideration of any required changes to agency firewall rules to ensure ongoing appropriate firewall protection. Reviews of firewall rules should be scheduled on a regular basis. Agency firewall and gateway architecture should also be subject to regular tests, to identify any security weaknesses. Agencies should report the results of these tests and any corrective actions to the information security governance body. Firewall Warning Notice It is recommended that agencies implement ICT system firewall warning notices for Queensland Government external facing ICT devices (eg. firewalls, intrusion prevention systems, bastion hosts, screening routers etc) to provide potential users with notice as to the private nature of the system and that monitoring and reporting activities may be conducted. Crown Law has been consulted as part of the development of a standard warning notice to ensure the notice complies with statutory obligations while remaining as succinct as possible. The Commonwealth and Queensland Criminal Codes both prohibit unauthorised access to ICT systems and typically provide for offenders to be imprisoned for periods of time varying from two to ten years. Crown Law advised that there is no statutory requirement for a firewall notice to refer to any specific legislation and including references to legislation governing this area would only increase the length of the firewall without offering any substantial legal benefit. As per Crown Law advice, the ways in which a firewall notice may have legal effect, if appropriately worded and implemented, include: forming a contract, enforceable by legal action, obliging the user not to use the system for unauthorised purposes providing notice to the user that their electronic communications may be accessed by third parties, to establish the knowledge of the sender of a communication necessary to avoid contravening the Telecommunications (Interception and Access) Act 1979 through unlawful interception of the communication making an individual aware of the use and disclosure of personal information for the purposes of compliance with the Information Privacy Act 2009. The following notice is intended to meet the 265 character requirement and to secure the best chance of having the legal effects outlined above: This private ICT system is for authorised use only. By using this system you agree to use it only as authorised. You consent to agency personnel monitoring or recording your use (including personal information and communications) and using or disclosing such records for disciplinary or law enforcement purposes. Crown Law has advised that at this time, users will not be required to actively accept the terms of the firewall notice prior to entering their login details. However, agencies should consider this in light of other existing login notices they are using which require employees to acknowledge their responsibilities (such as employee use of ICT facilities and devices under Information Standard 38 (IS38)). Media handling The level of controls to be applied to agency media would depend on the security classification assigned to that media under the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCF. The  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCF and the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCS provide some guidance with regard to the following controls: preparation and handling removal from workplace and monitoring copying and storage archive and disposal. Agency risk assessments may identify the need for additional information security controls for media. In the absence of advice within the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCF, agencies should refer to the HYPERLINK "http://www.dsd.gov.au/infosec/ism.htm"ISM. Note that the Queensland Government is not legislatively obliged to comply with the HYPERLINK "http://www.dsd.gov.au/infosec/ism.htm"ISM. However, the Queensland Government is a signatory to a Memorandum of Understanding that commits it to engage in practices consistent with this manual. Information exchange To ensure the security of information exchanged within the agency and with external parties, including online information systems, the agency should ensure information handling and exchange procedures are established in line with the:  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCF  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCS  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Queensland Government Authentication Framework (QGAF)  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/azqgeadocs.aspx" \l "n" NTSAF. See also  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Information.aspx" IS44. Email Email has become a critical business enabler, with information included in emails often traversing public untrusted/uncontrolled networks such as the internet. Agencies should ensure that information within emails is appropriately protected or does not reduce the risk profile of the agency by: ensuring staff have clear guidelines regarding the use of email for sensitive or security classified information ensuring that passwords are used on email systems (this may be achieved by use of a password at network login) prohibiting the use of scanned signatures (they can be cut and pasted to give the appearance that a document was signed officially) acknowledging that email communication is not private - any opinions expressed via external e-mail, where they are not related to the conduct of business, should be noted as individual opinions and not those of the organisation by inclusion of a disclaimer. For example: This email, together with any attachments, is intended for the named recipient/s only. If you have received this message in error, you are asked to inform the sender as quickly as possible and delete this message and any copies of this message from your computer system network. Any form of disclosure, modification, distribution and/or publication of this email message is prohibited. Unless stated otherwise, this e-mail represents only the views of the Sender and not the views of the Department of xxxxx. ensuring email systems are backed-up and maintained in accordance with operational system management standards ensuring the evidentiary value of electronic message transactions, and the general reliability and availability of the electronic messaging system is maintained. For Queensland Government policy on implementation advice on emails that are public records, agencies should refer to the Queensland State Archives  HYPERLINK "http://www.archives.qld.gov.au/downloads/emails_that_are_public_records_policy_and_guideline.pdf" Managing emails that are public records policy and guideline. Agencies should refer to  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspx" IS38 for further advice regarding email policy. Further advice on email transmission is available within the references listed in section 7.8 above. eCommerce eCommerce and online transactions All agency eCommerce and online transactions and services must be assessed against and consistent with the requirements of  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGAF and  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/azqgeadocs.aspx" \l "n" NTSAF. Further implementation advice is available within: AS/NZS ISO/IEC 27001:2006 Information technology Security techniques Information security management systems Requirements AS/NZS ISO/IEC 27002:2006 Information technology Security techniques Code of practice for information security management PCI Data Security Standard (PCI DSS) for payment account data security. Publicly available information Internet security is a critical current and ongoing security issue for agencies. The internet creates a window into the agency network that opens up the potential for unauthorised access and security threats to the confidentiality, integrity and availability of its information and all information facilities. Agencies should assess their internet security requirements and develop policies and controls to manage all aspects of online and internet activities. The issues to take into consideration are numerous, however, a few of the points to assess include: anonymity and privacy including the requirements of the  HYPERLINK "http://www.legislation.qld.gov.au/Acts_SLs/Acts_SL_I.htm" Information Privacy Act 2009 data confidentiality use of cookies applications and plug-ins type of language to be used practices for downloading executables web server security configuration and auditing access controls use of data encryption. Impact and risk assessments should be conducted on all web security controls on a regular, if not on-going basis, and external expert advice should be sought where possible. Information processing monitoring Agencies are required to ensure that audit logs of user activities, exceptions and information security events are produced, maintained and monitored. Agencies need to ensure that their system and user monitoring activities are in line with all legislative obligations and the risk the system or activities pose to the security of the environment. Agencies should refer to  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspx" IS38 for further information regarding the monitoring of communications including email and the  HYPERLINK "http://www.legislation.qld.gov.au/Acts_SLs/Acts_SL_I.htm" Information Privacy Act 2009 for obligations regarding the protection of personal information. Audit, fault, administrator and operator logs should be produced, maintained and monitored on a regular basis to assist in maintaining the security of the agency information environment. Logging facilities and log information should: be protected against tampering and unauthorised access collect at a minimum the auditing requirements specified in the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCS and may in addition consider collecting the following: user IDs dates and times of key activities the identity and location of the computer network addresses and protocols systems alerts or failures activation of anti-virus and intrusion detection and prevention systems. in the case of log information, retained as a record and/or in compliance with requirements to collect and retain evidence. For further guidance agencies should refer to:  HYPERLINK "http://infostore.saiglobal.com/store2/Details.aspx?ProductID=394887" AS/NZS ISO/IEC 27001:2006 Information technology Security techniques Information security management systems Requirements  HYPERLINK "http://infostore.saiglobal.com/store2/Details.aspx?ProductID=1017612" AS/NZS ISO/IEC 27002:2006 Information technology Security techniques Code of practice for information security management  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/informationstandards/current/Pages/Recordkeeping.aspx" IS40 Recordkeeping  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/informationstandards/current/Pages/Retention%20and%20Disposal%20of%20Public%20Records.aspx" IS31 Retention and disposal of public records  HYPERLINK "http://www.saiglobal.com/PDFTemp/Previews/OSH/as/misc/handbook/HB171.PDF" HB 171-2003 Guidelines for the management of IT evidence. Access management Access control policy The agencys access control policy should address and detail access control rules and rights for each group of users. Generally these should be based on what must be generally forbidden unless expressly permitted, ensuring that business requirements are followed. Access controls need to be consistent with policy and legal requirements. The overall framework for access rights should be reviewed on a regular basis to determine that they remain appropriate. Authentication Authentication codes should be changed when there is an indication of possible system security or authentication code compromise.  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGAF provides a process and a set of definitions which will allow agencies, as service providers, to evaluate the risk associated with their services and determine the appropriate level of authentication assurance required. Agencies should refer to the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGAF series of documents for detailed information regarding authentication management. Agencies are also required to align with the  HYPERLINK "http://qgcio.govnet.qld.gov.au/SiteCollectionDocuments/Architecture%20and%20Standards/QGEA%202.0/Identity%20and%20Access%20Management%20policy.pdf" Identity and Access Management Policy and meet the targets within its accompanying  HYPERLINK "http://www.qgcio.qld.gov.au/SiteCollectionDocuments/Architecture%20and%20Standards/QGEA%202.0/Identity%20and%20Access%20Management%20position.pdf" position. User access User registration User access rights should be in accordance with information owner requirements and should be authorised by the users manager before the user is granted access to the information or system. The manager should ensure that the user has a sufficient understanding of the system before approving access rights. Access control mechanisms should be used to restrict access to all computer systems, including hardware, software and data. If user authentication is based upon passwords the following controls should be considered: the user should be required to change temporary passwords at the first logon (temporary passwords only being valid for one day) users should be required to change their authentication code after a predetermined period of time, through either automatic or manual means and should not be allowed to reuse an authentication code for at least 13 cycles user access should be rejected after three rejected attempts to logon where passwords are used as authorisation, users should be educated in selecting and using passwords. All access control privileges of users should default to denial of access when there is a malfunction in the computer or network access control system. All changes to an employees user duties should be reflected in their access control rights. Changes should be carried out on a timely basis. Access privileges should be disabled or modified when users change jobs, or leave the agency permanently, or are on leave for a prolonged period. User access rights should be subject to regular review using a formal process. Agencies should consider reviewing and possibly disabling access rights which have not been used within the last 30 calendar day period. Privilege management The use of special privileges should be restricted and controlled as the unnecessary allocation or unauthorised use of special privileges can be a major factor to system security failure. Special privileges include: high privilege users (for example administrator/supervisor access rights) security administration (for example security administrator) root access/operating system access network management access database administration. User responsibilities Users should be made aware of their responsibilities with regard to system access including: following the password policy and processes securing unattended equipment keeping a clear desk and screen. Network access In relation to controlling unauthorised network access agencies should consider implementing: network access control policies and software gateway and firewall technologies for filtering and controlling traffic. Remote network access To minimise risks from external connections, agency remote access processes should at a minimum register all persons with remote access privileges and log all remote access attempts and activity and ensure all users are authenticated before access to the network is granted. Operating system access Agencies should implement controls to prevent unauthorised access to operating systems. The following should be considered: implementation of secure log-on procedures for operating systems, including: ensuring that minimal information is disclosed about the system the log-on is validated only upon correct input of all data. assigning all users with a unique identifier (user ID) and a suitable authentication technique to substantiate identity claims not reassigning user IDs, instead disabling the user ID when no longer required managing password quality with a formal system restricting and controlling the use of systems that may have the capability of overriding system and application controls shutting down sessions after a defined period of inactivity limiting user connection times where appropriate. Further implementation advice is available within  HYPERLINK "http://infostore.saiglobal.com/store2/Details.aspx?ProductID=1017612" AS/NZS ISO/IEC 27002:2006 Information technology Security techniques Code of practice for information security management. Application and information access Agencies should consider implementing controls that assist in restricting access to information within applications, by the use of menus and controlling access rights (eg. read, write, delete). Access to system utilities that may be used to alter data or program code should be kept to a minimum with all system master passwords restricted to, and maintained by system owners or applicable appointee. All remote access support applications and utilities should only be provided to authorised information systems support personnel. Policies should also be in place for the configuration of such systems. All vendor and default passwords should to be changed prior to an application going into operation. Mobile computing and telework access Risk assessments and policies and processes for mobile computing and telework access should consider: physical security of the site security of the telecommunications link lack of control of information, for example, access by family or friends increased risk of disclosure or unauthorised use of information increased risk of unauthorised access to agency network and systems support and maintenance of hardware and software updates backup procedures access security aspects (such as writing down of instructions for login including passwords). Further details on movement of information assets outside the agency can be found in the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" QGISCF. Using privately owned equipment To ensure the integrity of government networks privately owned devices (eg. home computers) should not be connected to agency networks unless either: specific technology has been implemented to ensure security for the agency detailed risk assessments are conducted to assess all security impacts. Detailed risk assessments must include all aspects of information security including: authentication measures access controls virus and malicious code physical and personnel security. System acquisition, development and maintenance System security requirements Security requirements and specifications should be addressed and agreed for any new or improved system in the initial stages of development, or acquisition. These requirements should identify and address any potential risks, vulnerabilities and/or conflicts with existing systems or business processes. Where possible, authentication should be managed through a separate enterprise directory product. Where appropriate agencies should also consider seeking independent evaluation or security certification of systems. Agencies should ensure that applications which are to be implemented into the web environment undergo a stringent risk assessment process in the development phase and during the life of the application to ensure appropriate security controls are in place. Agencies should also ensure that patch management issues are assessed and considered prior to the implementation of systems and, in the case of developed applications, that periodic code reviews are incorporated into security maintenance. Correct processing Agencies should ensure that implementation policies and processes outlining the practices for input validation, internal processing checks and controls, message authentication techniques and output data validation are in place to ensure appropriate security of all application and systems development. These processes should be in accordance with the risks associated with the system data and its security classification. Audit trails and activity logs should also be written into applications for the validation of data and internal processing. Cryptographic controls In order to provide a trusted communications channel over untrusted communication paths, cryptographic algorithms are a recommended control set. Further information on cryptographic controls can be located in the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/azqgeadocs.aspx" \l "n" NTSAF. System files Operational software should be maintained at a level supported by the supplier and ideally maintained to the latest available patch level. Appropriate testing, planning and migration control measures should be carried out when upgrading patches or installing new software versions to ensure the overall security of the agency operational environment is not adversely impacted. The testing of systems and data should be controlled and monitored especially where operational data sets are used. Access controls should be implemented to ensure restricted access to all systems and applications including system source code. Agencies should be mindful that they must retire or replace software that is approaching end of mainstream support as per the  HYPERLINK "http://www.qgcio.qld.gov.au/SiteCollectionDocuments/Architecture%20and%20Standards/QGEA%202.0/Software%20Currency%20Policy.pdf" Software currency policy and the targets within the  HYPERLINK "http://www.qgcio.qld.gov.au/SiteCollectionDocuments/Architecture%20and%20Standards/QGEA%202.0/Software%20Currency%20position.pdf" Software currency position. Secure development and support processes Policies and processes should be in place for control of changes to operational applications including version control for software upgrades. To minimise threats to the operational environment agencies should consider but not limit activities to ensuring: adequate testing and change control mechanisms are in place for the migration of new or modified systems into the operational environment that the information environment is managed so that future expansions or changes can be accommodated and do not adversely impact the operational environment. For further information on change management see the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/azqgeadocs.aspx" \l "i" ICT Infrastructure change management guideline. Technical vulnerability management As a first step, agencies should ensure that they have a current and complete register of application and technology assets including vendor, version numbers, current state of deployment and contacts for persons responsible for the asset (agency ICT Baseline data may be a useful starting point). Agencies should refer to  HYPERLINK "http://infostore.saiglobal.com/store2/Details.aspx?ProductID=1017612" AS/NZS ISO/IEC 27002:2006 Information technology Security techniques Code of practice for information security management which provides guidance on establishing effective management processes for technical vulnerabilities. Agencies should be mindful that the Foundation Infrastructure Project (FIP) is investigating options for the supply of enterprise management software for the whole-of-Government ICT infrastructure, which includes patch vulnerability management software. Incident management When addressing information security incident management, agencies should be mindful that the Queensland Government Chief Technology Office (QGCTO) is establishing a virtual response team (VRT) that will include representatives from participating agencies. The VRT is being established to assist any agency requesting analysis and potential resolution of incidents of a significant nature only. Expertise may be drawn upon resources external to the Queensland Government if required. It should be noted that the VRT is a consultative service only, and successful resolution, including payment for external resources, will be borne by the requesting agency. CITEC, as the mandated whole-of-Government service provider, has also negotiated a Standing Offer Arrangement (SOA) for the procurement of Security Information and Event Management (SIEM) technology. A SIEM can be utilised for managing event and log information from all agency network devices, and offers the ability to assist with the analysis of events and incidents, as well as automating the process of generating reports. The SIEM technology can either be purchased by an agency or managed by CITEC on behalf of an agency Event/weakness reporting When agencies are developing their policies and/or procedures for information security event and weakness reporting, the following guidelines should be taken into consideration:  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Information Security Incident Category Guideline Information Security Event and Incident Management Guideline (not yet approved)  HYPERLINK "http://infostore.saiglobal.com/store2/Details.aspx?ProductID=394737" AS/NZS ISO/IEC 18044:2006 Information technology Security techniques Information security incident management. Incident procedures When agencies are developing procedures to manage information security incidents, the following guidelines should be taken into consideration: Information Security Event and Incident Management Guideline (not yet approved)  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Information Security Incident Category Guideline  HYPERLINK "http://infostore.saiglobal.com/store2/Details.aspx?ProductID=394737" AS/NZS ISO/IEC 18044:2006 Information technology Security techniques Information security incident management  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" Information Security Internal Governance Guideline Australian Standards  HYPERLINK "http://infostore.saiglobal.com/store2/Details.aspx?ProductID=568739" HB 171-2003 Guidelines for the management of IT evidence. For information security incidents that involve breaches of privacy, agencies should refer to the:  HYPERLINK "http://www.legislation.qld.gov.au/Acts_SLs/Acts_SL_I.htm" Information Privacy Act 2009 OICs  HYPERLINK "http://www.oic.qld.gov.au/files/IPAGuidelines/Guideline%20-%20privacy%20breach%20management%20and%20notification%20-%201-12-09%20-%20v1.1.pdf" Privacy breach management and notification guideline  HYPERLINK "http://www.comlaw.gov.au/ComLaw/Management.nsf/current/bytitle/32AA97DFE9AA8326CA256F7100071D25?OpenDocument&mostrecent=1" Privacy Act 1988 (Cth) Australian Government Office of the Privacy Commissioners  HYPERLINK "http://www.privacy.gov.au/materials/types/guidelines/view/6478" Guide to handling personal information security breaches. Under  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" IS18 agencies must establish and maintain and information security incident and response register and record all incidents. The register may be created manually or linked with existing business process tools, such as an Information Technology Infrastructure Library (ITIL) compliant ticketing system. QGCTO is currently implementing of a strategic whole-of-Government information security management service with CITEC, which will introduce new Security Information and Event Management (SIEM) technology to assist with the collation and summarisation of events and incidents, including the generation of reports. As part of the migration strategy for agencies to consume whole-of-Government services, QGCTO will work with agencies in understanding the benefits of adopting a SIEM service. This will include understanding the benefits of utilising a SIEM in maintaining a register and the ability to provide more accurate and timely reporting. Business continuity management Business continuity Agency business continuity plans should be reviewed and tested on a regular basis to ensure that all current business and ICT systems and infrastructure are accounted for. When developing the agency testing strategy, the importance of each system to the business operations and the ability to recover it within the time frames required by users should determine the extent of the testing. Business continuity plans should ensure that information security controls are maintained and this should be within scope of the testing strategy. Agencies should also undertake a review of their plans and strategies after any significant disruption to information services or failure to ascertain the cause, assess the remedy and ensure procedures are adjusted to reduce the likelihood of any repeat occurrence. For further information, please refer to  HYPERLINK "http://qgcio.govnet.qld.gov.au/govnet/Documents/Architecture%20and%20Standards/Information%20Security/BCP%20Guideline%201.0.0.doc" Business continuity plan documentation guideline (Queensland Government employees only)  HYPERLINK "http://premiers.govnet.qld.gov.au/security/docs/GAP%20Guide%20for%20Business%20Continuity%20Planning.pdf" Queensland Government guide for business continuity planning (Queensland Government employees only) HYPERLINK "http://www.saiglobal.com/PDFTemp/Previews/OSH/as/misc/handbook/HB221-2004.PDF"Australian Standards HB:221:2004 Business continuity management. Disaster recovery To ensure the availability of information, and ICT systems and services following a disaster, agencies need to document information and ICT disaster recovery plans. When documenting agency information and ICT disaster recovery arrangements, agencies should refer to the  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" ICT asset disaster recovery planning guideline. The plans should ensure that information security controls are recovered as part of the plan. When developing information risk management strategies to assess the vulnerability of information and ICT assets and the impact on these assets as a result of a security failure or a disaster, agencies should consider adapting the HYPERLINK "http://infostore.saiglobal.com/store2/Details.aspx?ProductID=1378670"AS/NZS ISO 31000:2009 Risk management Principles and guidelines. Further information can also be found in the  HYPERLINK "http://qgcio.qld.gov.au/qgcio/architectureandstandards/informationstandards/current/Pages/index.aspx" \o "" Information risk management best practice guide. It is a requirement of  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" IS18 that agencies establish an information and ICT asset disaster recovery register to assess and classify systems to determine their criticality. Note that this register does not need to be a new register, agencies are free to utilise existing registers that they may have provided that they assess and classify information and ICT assets to determine their criticality. Requirements and advice regarding disaster recovery for public records is available from  HYPERLINK "http://www.archives.qld.gov.au/default.asp" Queensland State Archives. Compliance management Legal requirements A summary of information security related legal requirements is included in Appendix A. However, this is no replacement for agencies seeking legal advice on the specific legal requirements that apply to them from their internal legal section. Policy requirements Information security policies, procedures and compliance should be reviewed and reported on to appropriate management at least annually to ensure the reliability and overall effectiveness of the security controls for all information systems, networks infrastructures and applications. Audit requirements Agencies should ensure that appropriately qualified personnel are assigned to audit the compliance of the information environment against agency policies, processes and industry technical standards to ensure appropriate security levels are maintained. These personnel should, where practical, not be involved in the operational information or systems environment of the agency. Reporting requirements Event and incident information Under  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" IS18 agencies must submit their Security Event and Incident Management information to the QGCTO. Actual reporting requirements may evolve over time as the process matures. In the interim, the QGCTO is in the process of establishing a Virtual Response Team and gathering business requirements for a whole-of-Government AusCERT subscription service. QGCTO is currently working with CITEC and a large agency to implement the SIEM technology chosen as part of the FIP tender. As soon as these technologies, processes and services are in place, consultation with agencies will commence on determining the level of detail for events and incidents that will be reported to QGCTO on an ongoing monthly basis. VRT communication alerts Under  HYPERLINK "http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx" IS18 agencies must send Virtual Response Team communication alerts to all agencies as directed by the QGCTO. Actual reporting requirements will evolve over time as the process matures. After the whole-of-Government Virtual Response Team is established, further information will be provided on the level of detail for events and incidents that will be reported to QGCTO. The intent of this communication forum is to have agencies participate in the notification of observed security events and incidents and to share information in order to both contain and resolve incidents in a timely manner. There is no requirement to divulge any sensitive information that may cause distress to the participating agencies. Information security related legislation and standards This appendix provides a summary of some of the information security related obligations that apply to Queensland Government agencies. The contents of this appendix do not constitute legal advice and should not be relied on as a comprehensive statement of information security legislative obligations. Legislation Criminal Code Act 1995 (Cth) Electronic Transactions Act 1999 (Cth) Electronic Transactions (Queensland) Act 2001 (Qld) Evidence Act 1977 Financial Accountability Act 2009 (Qld) Financial and Performance Management Standard 2009 (Qld) Information Privacy Act 2009 (Qld) Privacy Act 1988 (Cth) Public Records Act 2002 (Qld) Public Sector Ethics Act 1994 (Qld) Public Service Act 2008 (Qld) Right to Information Act 2009 (Qld) Telecommunications Act 1997 (Cth) Telecommunications (Interception and Access) Act 1979 (Cth). International /Australian standards and guidelines AS 2834-1995 Computer accommodation AS/NZS ISO/IEC 27001:2006 Information technology Security techniques Information security management systems Requirements AS/NZS ISO/IEC 27002:2006 Information technology Security techniques Code of practice for information security management AS/NZS ISO/IEC 18044:2006 Information technology Security techniques Information security incident management AS/NZS ISO 31000:2009 Risk management Principles and guidelines Australian Standards HB 171:2003 Guidelines for the management of IT evidence  HYPERLINK "http://infostore.saiglobal.com/store2/Details.aspx?ProductID=568831" Australian Standards HB:221:2004 Business continuity management Queensland Government Counter Terrorism Strategy 2008-2012 Department of Premier and Cabinet (function now residing in Queensland Police Service) Queensland Government Counter Terrorism Plan 2007 Department of Premier and Cabinet (function now residing in Queensland Police) Government Asset Protection Framework Queensland Treasury. Australian Government standards PSPF ISM. Queensland Government Enterprise Architecture Business continuity plan documentation guideline Directory services position Information security external governance guideline Identification and classification of information assets guideline Identity management, authentication and authorisation services position Implementing internal information security governance guideline Information risk management best practice guide Information security event and incident category guideline Information security event and incident management guideline Information Security external security governance guideline Information Standard 2: ICT resources strategic planning Information Standard 13: Procurement and disposal of ICT products and services Information Standard 31: Retention and disposal of public records Information Standard 38: Use of ICT facilities and devices Information Standard 40: Recordkeeping Information Standard 44: Information asset custodianship Network management position Network transmission security assurance framework Patch management policy and position Queensland Government authentication framework Queensland Government ICT disaster recovery plan development guideline Queensland Government information risk management guidelines Queensland Government information security classification framework Queensland Government information security policy - mandatory clauses.  AS/NZS ISO/IEC 27002: 2006 Information technology Security techniques Code of practice for information security management, p.35.  AS/NZS ISO/IEC 27002:2006 Information technology Security techniques Code of practice for information security management, p. 55-56.  AS/NZS ISO/IEC 27002: 2006 Information technology Security techniques Code of practice for information security management, p. 63.      STYLEREF "Report title" \* MERGEFORMAT Information Standard 18: Information Security - Implementation Guideline QGEA ICT Policy and Coordination Office Department of Public Works Queensland Government Enterprise Architecture  STYLEREF "Report status" \* MERGEFORMAT Final  STYLEREF "Version number" \* MERGEFORMAT v1.0.2,  STYLEREF "Report date" \* MERGEFORMAT July 2011 Page  PAGE 15 of  NUMPAGES 37  STYLEREF "Security classification" \* MERGEFORMAT PUBLIC  STYLEREF "Security classification" \* MERGEFORMAT PUBLIC 7FGOPUVZ[^_`cefghiopǺ~rfaYOBhNih':B*phh+x0JB*phhxh'5 h'5he`*0J5B*phh00J5B*phh'0J5B*phh'0J5B*phh*0J5B*phh0 }0J5B*phh00J5B*phhNih'5B*phh'0JB*aJ4phhP 0JB*aJ4phhmsh6t^Jhmshz^Jhmshz0J5CJ^JPV`ghipqgd+ xxTq#'&#$/]gd0 xxTq#'&#$/]gd' xxTq#'&#$/]gd>gdA j ^j gdzgd6tgdmdgdWpq    $ S \ g k ~ Ļ~~qaULhh) ^J *hihE;]^J jhh0CJ^JaJhhE;CJ^JaJhhY^Jhh{e^JhNT^JmHnHujhhE;U^JhhE;]^Jhh+x^JhhE;^Jhh4s5CJ^JaJhh4sCJ^JaJhmsh) ^Jhh6t^Jhh^J h^Jqrstuvwxyz{|}~d$Ifgdd$Ifgdgd-[3gdo_Od$Ifgdd$Ifgdkd$$Ifl40 % u t0.Rk.Rk.Rk.Rk.Rk.Rk6244943af4p gWGd$Ifgdd$Ifgdkd$$Ifl40 % u  t .Rk0.Rk.Rk.Rk.Rk.Rk.Rk622 U44943af4p .Rk  $ T gWGd$Ifgdd$Ifgdkd$$Ifl40 % u  t .Rk0.Rk.Rk.Rk.Rk.Rk.Rk622 U44943af4p .RkT U \ gWGd$Ifgdd$Ifgdkd$$Ifl40 % u  t .Rk0.Rk.Rk.Rk.Rk.Rk.Rk622 U44943af4p .Rk gWGGGGGGd$Ifgdd$Ifgdkdo$$Ifl40 % u  t .Rk0.Rk.Rk.Rk.Rk.Rk.Rk622 U44943af4p .Rk J P Z ,zc o/.$gdbJgd0gd$~Rgdxgde`*gdagdagdlgd) gd) Ff J R f g r u v   źŤ͙͎yncQCQhlh'6CJ]aJ#jhlh'6CJU]aJhxh'CJaJhxhaCJaJhahaOJQJ^Jh) 0J1^Jhmsh) 0J1^Jh hl0J1^J+jh hl>*B*U^Jphhlhl0J1^Jhl0J1^Jjhl0J1U^Jhmsh{e^J h{e^J h.s^JhmshY^Jhmsh) ^J f g P Z [ ,19ʿҭwmcYmPGA h.s^JhmshTf^Jhmsh$~R^JhmshzN5^Jhmsh(:5^Jhmsh) 5^Jhlh 6]^JhNT6]^JmHnHuhlh6]^Jjhlh6U]^Jhmsh) ^Jhn1he`*aJhn1he`*^JaJhaCJaJhxhaCJaJ#jhlh'6CJU]aJhNT6CJ]aJmHnHu()*+GHIJKLXYZtuvwxyz{|¹–vkvfv…¹R–'j h!(h!(>*B*Uph hNTj h!(Ujh!(U h!( h!(5CJKHOJQJaJhh_h!(0J1^J'jh!(h!(>*B*Uphh!(h_h!(0J1jh_h!(0J1Uhmsh^JjhmshU^Jhmsh&:^Jhmsh&?^Jhmshk^J5678;<ABC]^_ֹ𹰬ֹ𹰬ynj h!(U'js h!(h!(>*B*Uphj h!(U'jy h!(h!(>*B*Uphh!(h_h!(0J1jh_h!(0J1U hNTj h!(Ujh!(U h!(h_h!(0J1^Jh!(CJKHOJQJaJh+_`abcde   ˳Ԩ˄shsj h!(U h!(5CJKHOJQJaJh'jg h!(h!(>*B*Uphj h!(U h!(h_h!(0J1^J'jm h!(h!(>*B*Uphh!(h_h!(0J1h!(CJKHOJQJaJhjh_h!(0J1Ujh!(U hNT(   )*+,-.MNOijklmnopqƵưsưhsjh!(Uh!(CJKHOJQJaJh'j[h!(h!(>*B*Uph hNTjh!(Ujh!(U h!( h!(5CJKHOJQJaJhh_h!(0J1^J'jah!(h!(>*B*Uphh!(h_h!(0J1jh_h!(0J1U(+,-./0123OPQRUVijkӿޜӿyޜe'jIh!(h!(>*B*Uphjh!(U'jOh!(h!(>*B*Uphh!(h_h!(0J1 hNTjh!(Ujh!(U h!(h!(CJKHOJQJaJhh_h!(0J1^Jjh_h!(0J1U'jUh!(h!(>*B*Uph'1Cu${P^lo06./    !"<=>@ABCDEabcdghֹ𹰬|ֹh'j=h!(h!(>*B*Uphjh!(U h!(5CJKHOJQJaJh'jCh!(h!(>*B*Uphh!(h_h!(0J1jh_h!(0J1U hNTjh!(Ujh!(U h!(h_h!(0J1^Jh!(CJKHOJQJaJh(345678RSTnӻӘĘӻyӘh h!(5CJKHOJQJaJh'j1h!(h!(>*B*Uphjh!(Uh_h!(0J1^J'j7h!(h!(>*B*Uphh!(h_h!(0J1h!(CJKHOJQJaJhjh_h!(0J1U hNTjh!(Ujh!(U h!(%noprstuvwؾ؛|،ؾh؛'j%h!(h!(>*B*Uphjh!(U h!(h!(CJKHOJQJaJhh_h!(0J1^J'j+h!(h!(>*B*Uphh!(h_h!(0J1 h!(5CJKHOJQJaJhjh_h!(0J1U hNTjh!(Ujh!(U$!"#$%&BCDEHIXYZtuvxyz{|}؝ɝ꘍y؝h h!(5CJKHOJQJaJh'jh!(h!(>*B*Uphjh!(U h!(h_h!(0J1^J'jh!(h!(>*B*Uphh!(h_h!(0J1h!(CJKHOJQJaJhjh_h!(0J1U hNTjh!(Ujh!(U$  -./IJKMNOPQRnopqtuؾ؛|،ؾh؛'j h!(h!(>*B*Uphjh!(U h!(h!(CJKHOJQJaJhh_h!(0J1^J'jh!(h!(>*B*Uphh!(h_h!(0J1 h!(5CJKHOJQJaJhjh_h!(0J1U hNTjh!(Ujh!(U$6789<=hij؝|،h؝ɝ'jh!(h!(>*B*Uphjh!(U h!( h!(5CJKHOJQJaJhh_h!(0J1^J'jh!(h!(>*B*Uphh!(h_h!(0J1h!(CJKHOJQJaJhjh_h!(0J1U hNTjh!(Ujh!(U$ ;<=WXY[\]^_؝ɝ꘍y؝ɝnjr h!(U'jh!(h!(>*B*Uphjxh!(U h!(h_h!(0J1^J'jh!(h!(>*B*Uphh!(h_h!(0J1h!(CJKHOJQJaJhjh_h!(0J1U hNTjh!(Uj~h!(U+_`|}~ 234ǸdzҸǸdzzҸf'j"h!(h!(>*B*Uphjf"h!(U'j!h!(h!(>*B*Uph hNTjl!h!(Ujh!(U h!(h!(CJKHOJQJaJhh_h!(0J1^Jjh_h!(0J1U'j h!(h!(>*B*Uphh!(h_h!(0J1(4589IJKefgijklmnӾɹ򰬰Ӎɹ򰬰y'j$h!(h!(>*B*UphjZ$h!(U'j#h!(h!(>*B*Uphh!(h_h!(0J1 hNTj`#h!(Ujh!(U h!(h!(CJKHOJQJaJhh_h!(0J1^Jjh_h!(0J1U+ <=>?BCLMNhijlmnopq؝ɝ꘍y؝ɝnjH'h!(U'j&h!(h!(>*B*UphjN&h!(U h!(h_h!(0J1^J'j%h!(h!(>*B*Uphh!(h_h!(0J1h!(CJKHOJQJaJhjh_h!(0J1U hNTjh!(UjT%h!(U+ )*+-./012NOPQTUjklǶDZҶtDZitj<)h!(Uh!(CJKHOJQJaJh'j(h!(h!(>*B*Uph hNTjB(h!(Ujh!(U h!( h!(5CJKHOJQJaJhh_h!(0J1^Jjh_h!(0J1U'j'h!(h!(>*B*Uphh!(h_h!(0J1'/01345678TUVWZӿޜӿyޜe'j+h!(h!(>*B*Uphj0+h!(U'j*h!(h!(>*B*Uphh!(h_h!(0J1 hNTj6*h!(Ujh!(U h!(h!(CJKHOJQJaJhh_h!(0J1^Jjh_h!(0J1U'j)h!(h!(>*B*Uph'Z[pqr   %&'ABCֹ𹰬ֹ𹰬ynj.h!(U'j-h!(h!(>*B*Uphj$-h!(U'j,h!(h!(>*B*Uphh!(h_h!(0J1jh_h!(0J1U hNTj*,h!(Ujh!(U h!(h_h!(0J1^Jh!(CJKHOJQJaJh+HQ s 7!!!Y""#k##"$}$$A%%'&)&*&+&gd;P./CEFGHIJfghilm <=˳Ԩ˄Ԩyj0h!(U'j/h!(h!(>*B*Uphj/h!(U h!(h_h!(0J1^J'j.h!(h!(>*B*Uphh!(h_h!(0J1h!(CJKHOJQJaJhjh_h!(0J1Ujh!(U hNT,=>?@Apqrӽޚsӽhsޚj2h!(Uh!(CJKHOJQJaJh'j1h!(h!(>*B*Uphh!(h_h!(0J1 hNTj 1h!(Ujh!(U h!( h!(5CJKHOJQJaJhh_h!(0J1^Jjh_h!(0J1U'j0h!(h!(>*B*Uph$./0JKLNOPQRSopqruvӿޜӿyޜe'jw4h!(h!(>*B*Uphj3h!(U'j}3h!(h!(>*B*Uphh!(h_h!(0J1 hNTj3h!(Ujh!(U h!(h!(CJKHOJQJaJhh_h!(0J1^Jjh_h!(0J1U'j2h!(h!(>*B*Uph'      ! " # $ ' ( P Q R l m n p q r s t u ֹ𹰬ֹ𹰬ynj6h!(U'jk6h!(h!(>*B*Uphj5h!(U'jq5h!(h!(>*B*Uphh!(h_h!(0J1jh_h!(0J1U hNTj4h!(Ujh!(U h!(h_h!(0J1^Jh!(CJKHOJQJaJh+ !!!!!0!1!2!4!5!6!7!8!9!U!V!W!X!\!]!u!v!w!!!!!!!!˳㨗sԨhj8h!(U'j_8h!(h!(>*B*Uphj7h!(U h!( h!(5CJKHOJQJaJhh_h!(0J1^J'je7h!(h!(>*B*Uphh!(h_h!(0J1h!(CJKHOJQJaJhjh_h!(0J1Ujh!(U hNT(!!!!!!!!!!!!!!!!!!!!!""""""6"7"8"R"S"T"V"W"X"Y"Z"["w"x"ƷƲsƲhsj:h!(U h!(5CJKHOJQJaJh'jS:h!(h!(>*B*Uph hNTj9h!(Ujh!(U h!(h!(CJKHOJQJaJhh_h!(0J1^J'jY9h!(h!(>*B*Uphh!(h_h!(0J1jh_h!(0J1U(x"y"z"~"""""""""""""""""""""""# # # # #####-#.#/#0#2#ӿޜӿyޜe'jA=h!(h!(>*B*Uphj<h!(U'jG<h!(h!(>*B*Uphh!(h_h!(0J1 hNTj;h!(Ujh!(U h!(h!(CJKHOJQJaJhh_h!(0J1^Jjh_h!(0J1U'jM;h!(h!(>*B*Uph'2#3#H#I#J#d#e#f#h#i#j#k#l#m##########################$$$ո︯}ոi'j5?h!(h!(>*B*Uphj>h!(Uh!(CJKHOJQJaJh'j;>h!(h!(>*B*Uphh!(h_h!(0J1jh_h!(0J1U hNTj=h!(Ujh!(U h!(h_h!(0J1^J h!(5CJKHOJQJaJh)$$$$ $!$"$#$$$@$A$B$C$G$H$Z$[$\$v$w$x$z${$|$}$~$$$$$$$$$$$$؝ɝ꘍y؝h h!(5CJKHOJQJaJh'j)Ah!(h!(>*B*Uphj@h!(U h!(h_h!(0J1^J'j/@h!(h!(>*B*Uphh!(h_h!(0J1h!(CJKHOJQJaJhjh_h!(0J1U hNTjh!(Uj?h!(U$$$$$$$$$$$$$$$%%% %:%;%<%>%?%@%A%B%C%_%`%a%b%f%g%%%%%ؾ؛|،ؾh؛'jCh!(h!(>*B*UphjBh!(U h!(h!(CJKHOJQJaJhh_h!(0J1^J'j#Bh!(h!(>*B*Uphh!(h_h!(0J1 h!(5CJKHOJQJaJhjh_h!(0J1U hNTjh!(UjAh!(U$%%%%%%%%%%%%%%%&&& &!&"&$&%&&&'&(&)&؝|،fT"hmsh;PKH^JhmHnHu+jhmshKHU^JhmHnHujDh!(U h!( h!(5CJKHOJQJaJhh_h!(0J1^J'jDh!(h!(>*B*Uphh!(h_h!(0J1h!(CJKHOJQJaJhjh_h!(0J1U hNTjh!(UjCh!(U+&,&9&A&3(((`)****+@+F+++.. /&/L/u/&gd= & F^gd<- & F^gdx&gdOgd=&gd{egdlgd=gd=gd;P)&,&A&F&O&&&*'+','2'R'Y'Z'`'a'c'w'x'''''((3(4(E(F(N(u(ƽƢӂzvzpzg`YUNY hmsh{eh{e hmsh? hmsh JhmshBK^J hrl0J1hrljhrlUhmsh+0J1^Jhmshda0J1^Jj Fhmshl;U^Jhmsh?^Jjhmsh?U^Jhmshda^Jhmsh/;6^J$.....// / ///&/'///B/L/M/[/k/u/v/|/}//////////////////0000$0%00000001111־jhmshY2AU^Jhmsha^Jhmsh{Q^J hrl0J1hrljhrlUhmshO^J hN0^Jhmsh>a^Jhmshda^J h{e^Jhmsh j'^Jhmsh\D^Jhmsh{e^J7u/////00$0123565789999h::gds8gd{e^gd8!  & F^gd/0]gdlgdc & & F^gd=&gd<-&gdc&gd{egd<-gd=&gd=122 2[2\2]2^2223333'3(3*3J3Z333444?4@4B4C4D4~ukeUkJkehchc0J1^JjIhchi|U^J hc^JjhcU^Jhmshi~'^J h{e^Jhmsh$7Q^Jhmsh$7Q0J1^Jhmshi~'0J1^JjHh{+h4GU^J h{+^Jjhmsh$7QU^Jhmsh+^JhmshY2A0J1^JjhmshY2AU^JjGhmshY2AU^JhmshY2A^JD4E4r44444455#515354555C5D5E5F5b5555555555666666657?7ش񞕅zqhhmshe-^Jhmshq^JhmshY2A0J1^JjJhmshU^JhmshwY^JjhmshwYU^Jhmshc^Jhihc0J1^Jj,JhihcU^Jhchc^JjhcU^Jhmsh+^J hc^JhmshY2A^J h<-^J%?77777777777777888839498999[9d9g9h99999ɹϮ}wn}e_Rhmshp5^JnH tH  h{e^JhmshN^Jhmshx^J hx^Jhmshwj^J hrl0J1hrljhrlUhmshp5^Jhmshv)^JnH tH hT4hv)0J1^JjKhT4hNfU^J hT4^JjhT4U^Jhc0J1nH tH hcnH tH jhcUnH tH hmshv)^J99999999999::::::g:h:i:r:v::::::ɾ޷~ululcZQhmsh0,^Jhmsh4kH^Jhmsh{^JhmshmG^Jhmsha^Jhmshywd^Jhmsh/;6^J h{e^JhNT^JmHnHujhmshNU^JhmshN^J hmshNjwLhmsh/0]UjO hmshp5UV hmshp5jhmshp5Uhmsh/0]^JnH tH he-^JnH tH ::==>5??AAVBBCCDDE!G;GGGHHII&gdW6gdxgdDgd*gdD&gdxgdl  & F^gdlgdU G::;;;;;C<D<E<a<c<t<u<v<<<<<< ==#=.======²ȧȓҊxofxo]TKhmshQ%<^Jhmshi^JhmshT~^JhmshBK^Jhmshy^Jhmshb^JhmshQ^Jhmsh^Jhmsh<^Jhrlh 0J1^Jhrlh<0J1^Jjdhrlh HU^J hrl^JjhrlU^JhmshOX=^JhxB*^JphhmshtKB*^JphhmshaB*^Jph===h>>>>>>>>>>5?6?B?W?v????%@1@@@UAnAAAAAAAA7B;BUBVB[B^BBBBBB|rhmshd\^Jhmsh+^JhmshG^Jhmsh*^Jhmsh'^Jhmshj@^Jhmsh d^Jhmshms^Jhmsh3/C^Jhmshd\ hmsh3/C hmsh' hmshd hmsh, hx^Jhmsh,^Jhmshd^J,BBBBBCCcCoCCCCCCCCCCCDDD!D"D,DODbDcDdDDDDDDDDDDD:EE娞{rihmsht ^Jhmsh+^J hrl0J1hrljhrlU h93\^JhmshZ\^Jhmsh+\^Jhmsh I\^J h93^Jhmshr^Jhmshi^Jhmsh*^JhmshG^Jhmshe^Jhmshd^Jhmsh d^Jhmsh3/C^J(EEEEEEEEF}FFFFFFGG G!G'G)G0G1GGGGGGGGGGRHSHWHȣԚxqxjxb^bX hrl0J1hrljhrlU hmsh;b hmsh* hmshdhmsh;b^Jhmsh*^JhmshG^Jhmshd^JhhY0J1\^J"jshhJU\^J h\^JjhU\^Jhmshd\^JhmshY\^Jhmsht ^J hx^Jhmshx^J"WHXHHHHHHHHHH II&I6I7I8I>IiI}IIIIIIIIJJJJKKpK|KKKrLxLzLLLMMMMSMlMNNNżŭŧhmsh(2^Jhmsh(2\^JhmshF\^Jhmshj@\^J hx^Jhmshj@^J hl^Jhmsh;b^JhmshF^Jhmsh*^JhmshG^Jhmshd^J hmsh* hmshdjhrlU2IIrLLM@MNNHOfOPWPPQQRtSTUVWWX#YgdV;gdU Ggd(T$gd$gdlgd Jgd*gdlgdDNNNHOOOQOZO[OfOPPP&P'P=PVPWPoPPPPPPPPPP QQQQQQQQQRRRRRRRRSsSSSTTTTUȾhmsh^Jhmsht^Jhmsh^JhmshF^Jhmsh+^JhmshF\^Jhmsht \^Jhmsh\^Jhmsh`h^JhmshG^Jhmshd\^Jhmshd^Jhmsh*^J4UU4UU V VVV;V?VLVMVpVVVV7Whrlh HU^J hrl^JjhrlU^Jh 5h1 0J1^Jjh 5h4.U^J h 5^Jjh 5U^Jhmsh1 ^Jjh(T$U^Jh(T$h1 0J1^Jh 50J1^J_________'`G```aaa5a6aaaaɿu_QGA h4.^Jjh4.U^JhmshXS0J16]^J+j\hmsh?B*U]^Jph333 hmshXS0JH6B*^Jph333)jhmshXS0JH6B*U^Jph333hmshk*^JhmshXS^Jhrlh1 ^Jhrlh5^JjhrlU^Jhrlh4.0J1^Jhrlh 50J1^Jhrlh#CM0J1^Jhrlh{0J1^Jhrlh50J1^Jaaa b b5b=b>b?b@b~bbbbbbbbbIcJcKcQcRcScTcechc廮|la[RIhmshvt^JhmshXS^J h4.^Jhrlh4.0J1^Jjdhrlh HU^J hrl^JjhrlU^Jh,h~^Jhrl0J1]aJ hrl0J1jhrl0J1UhmshXS^JnH tH hmsh~^Jh4.hI0J1^Jh4.hw"0J1^Jh4.hXS0J1^Jjh4.U^Jj?h4.h4.U^Jhcicncoccccc,d-d1d2d3d;dz]z^zzzzzz{{{{{{{ообth٨_YPhmsh)U^J h)U^JhmshA^JhmshB0J16^J"jthmshB6U^JhmshB6^JjhmshB6U^Jhmsh^JhmshB^Jhmsh'`^JnH tH hmsh8^JhmshFT^Jhmshjc^J hsE^JhmshS^JjhrlU^JnH tH hrl0J1nH tH {{{{{||p|q|r|||:};}m}n}o}p}}}}}~~~~~~óɨӢvkbYPFjhrlU^Jhmsh^JhmshR^JhmshD+^JhdhE0J1^Jj`hdhpU^JjhdU^Jhmshsg^JhmshE^J hd^JhsEhN0J1^JjWhsEhpU^J hsE^JjhsEU^JhmshN^Jhmshp^JhmshB^JhmshTF^Jhmsh+^J~p~q~~~~89?r.XY}ԁف%&5<@hiɺɨҐɨ~~ulclhmsh.n^Jhmsh:^Jhmsh%V;^Jhmsh?4^Jhmsh'`^JhmshCy&^J hT4^Jhmshb ^Jhmshk1?^Jhmsh)U^J h)U^Jhmsh^JhmshFK ^Jhmsh?^J hd^Jhmsh^J hrl0J1jhrlU^J hrl^J$ijԂ678BT]^#$Gv{|Ȅτڄۄ78>ʸ~u~lcluYSYL hrl0J1] hrl0J1jhrl0J1Uhmsh?-^JhmshWrR^Jhmshf*^Jhmsh3.^Jhmshj^Jhmsh+^JhmshSq^Jhmsh ^JnH tH hmsh ^JhmshN*D^JhmshfD^Jhmshim^Jhmshywd^JhmshD+^Jhmshy^Jhmsh/H^JhmshR^J$GcI\Ɖ9Me{ vɋ & & F^gdD & & F^gd7 & & F^gdA&gd=gdFgdZ&gd Xl&gddgd+ & & F^gddgd?>?ABFG!?abcg&'(ǽ׽ݜxkeUkjhmsh_GU^J h_G^Jjhmsho=U^JhmshNs^Jhmsh2#^Jhmshj^JhmshW^Jhmsh(^JhmshN^JhmshX3_^J hrl^JjhrlU^JhmshIr^J hrl0J1] hrl0J1hmsh+^J hd^Jhmshf*^Jjhrl0J1U(89;Z ABCFGHI\ψƺtkbYPGPhmshpa^Jhmsh.^Jhmshj^Jhmsh2#^Jh Xlh2#^Jh Xlh2#0J1^JjhT4hNfU^J hT4^Jjh XlU^Jhchc^Jhc0J1nH tH hcnH tH jhcUnH tH hmsh)1^Jhmsho=6^J hd^Jhmsho=^Jjhmsho=U^Jhmsho=0J1^JZ[abcdƉlj89:MNef{ vËNjȋɋϽƽƽƽ瘢vmvgv h)U^Jhmshh/^Jhmshd<^Jhmsh7^JhmshNs6^J hrl^JjhrlU^JhmshNs^JhmshD^Jhmshu^Jhmsh^Jhmsh=^Jhmsh.^J hd^Jhrl0J1]aJ hrl0J1jhrl0J1UhmshW^J'ɋʋ*+,/01RSV[devЍ׍؍ٍȸέΧ󞘞ypg^gUgyhmshzr^Jhmsh_;^Jhmshvt^JhmshZ^Jhmshy^Jhmsh"Y^Jhmshd<^JnH tH  hA^Jhmshd<^J hF^JhT4hd<0J1^JjhT4hNfU^J hT4^JjhT4U^Jhchc^Jhc0J1nH tH hcnH tH jhcUnH tH !ɋ2Seٍ+ɑȒޒEJ 6gd\gdA&gd.>(&gd}, & & F^gdAgdFgd%&gdc-gdygdjgdc& lgdFٍڍۍ&qrɎDuvɑNORǒȒɒĻ廩vmdddm[hmsh%^Jhmshm^Jhmsh^Jhmsh+^Jhmshj^Jjhmsh.0JLU^Jhmshz"^Jhmsh9^Jhmsh.^Jhmshs)^JhmshL^Jhmsh?<^JhmshA^J hA^Jhmshc-^Jhmsh_;^Jhmshvt^Jhmshzr^J#ɒޒ?@FGHPQϓۓCEXY֔ה "IľĴwlwaXhmsh},^JhAhZKr0J1^JhAhfD0J1^JhAh|(;0J1^JjdhAhpU^J hA^JjhAU^Jhmsh|(;^JhmshM_^Jhmshh/6^J hrl^JjhrlU^Jhmshh/^J hrl0J1] hrl0J1jhrl0J1UhmshZ0^Jhmsh l^J!IJEFZz~ ,56wxvmdWNFBFhrljhrlUhmsh!^JhmshN*D^JnH tH hmshTB^Jhmshc-Q^JhhA0J1^JnH tH 'jhT4hNfU^JnH tH hT4^JnH tH !jhhU^JnH tH hmshrB^JnH tH hmshW^JhmshC^Jhmsh+<^JhmshrB^Jhmsh/d^Jhmsh},^Jhmsh^J6bř̛$XnÞ۞&gd6gd0C&gd~R&gd0Cgd8c9gd6&gd)>gd)>  & F^gd8c9gd)>gd!gdAgd#x|}~řܙlopq͚ΚϚۚ ʽzk\OBhmshE^JnH tH hrlhE^JnH tH hrlhE0J1^JnH tH hrlh8z0J1^JnH tH 'j@hrlh HU^JnH tH hrl^JnH tH jhrlU^JnH tH hmshH^JnH tH h:dN^JnH tH hmshA{9^JnH tH hmsh:_^JnH tH hmsh:_^Jhmsh!^Jhmshc/^JjhrlU hrl0J1no"nz !*2Xú||obbobUHhmsh*^JnH tH hmsh~R^JnH tH hmsh0C^JnH tH hmsh^JnH tH hmshpW^JnH tH hmshS^JnH tH hmshS^Jhmsh#>x^Jhmsha ^Jhmsh>^Jhmsh)>^Jhmsh:_^JnH tH hmshc/^JnH tH h H0J1nH tH h H^JnH tH jh HU^JnH tH žÞ۞3:?JOWXefȟܟM`6wú~u~~u~lcZhmsh^Jhmsh ^Jhmsh$^JhmshA^Jhmsh{^Jhmsh{^J hA^Jhmsh"+^Jhmsh|^Jhmsh.c^Jhmsh^ ^Jhmsh6^Jhmsh0C^Jhmshxt^JnH tH hmsh~R^JnH tH hmsh0C^JnH tH hmsh^JnH tH #Mw%teӨA_gd*gdAgdxt&gd~R  & F^gd{gd~Rgd8c9gd&gd8c9&gd6&gd&$gd+x'gd6 \]ad$%&)8=FJлЗллЎtgth+xh+x^JmH sH h+xh+^JmH sH h+xhsS^JmH sH hmsh^Jhmsh o^JhmshsS^Jhmsh|^JhmshA^J hA^Jhmsh ^J h^Jhmsh6^Jhmsh)U^J h)U^J h!(^Jhmsh^Jhmsh{^J'ǥklmqrstæΦӦ#13Dĺ}tkbYbhmsh:>^Jhmsh)^Jhmsh`^JhmshsS^Jhmsh6^Jhmsh{^Jhmsh,v6^JhsEh:dN0J1^JjOhsEh:dNU^J h:dN^Jjh:dNU^Jhmsh,v^Jhmsh U^JhmshLV^J h+x^Jhmsh%^Jhmsh^Jhmsh*^J$_dy̨ͨΨѨҨӨԨ89:>?@Acd˞xmg^UA'jJhT4hNfU^JnH tH hmshxt^Jh:dNh{^J h8c9^Jh:dNh:dN0J1^Jj+h:dNh:dNU^Jh:dNh:dN^Jjh:dNh:dNU^Jhh0J1^JnH tH 'jnhT4hNfU^JnH tH hT4^JnH tH !jhhU^JnH tH hmsh{^Jhmsh%^Jhmsh*^Jhmsh~R^JHIJǪȪ\ĻshZLZLZLAhh!(6^JnH tH hmsh?6^JnH tH hmshE6^JnH tH h[6^JnH tH hh?0J1^JnH tH 'jhhJU^JnH tH h^JnH tH jhU^JnH tH hmsh?^JnH tH hmsh6^Jhmsh*^Jhmshxt^JhmshDgj^Jhh0J1^JnH tH !jhhU^JnH tH ήJbΰF^&gd!(&gdMagd8c9gdxt & & F^gd[gd)gd) & & F^gdm & & F^gd8c9gdn&gdxt  & F^gdxt  & F^gd?  & F^gd*Z[`aŮƮǮˮ̮ͮήIJLMNοȿxoaWCa'j!hhU^JnH tH h^JnH tH jhU^JnH tH hmsh~^Jhmsh)^Jhmshn^Jhmsh-j6^JhsEh:dN0J1^JjhsEh:dNU^J h:dN^Jjh:dNU^Jhmsh-j^J hF|C^Jhmshm^Jhmshn^JnH tH hmshxt^JnH tH hmsh*6^JnH tH N˰̰Ͱΰi2DEFZdopzĻ}ri`W`N`NE? h!(^Jh!(hw^Jh!(hMa^Jh!(hwTz^Jh!(hj8^Jh HhMa^Jh Hhw0J1^Jh Hhj80J1^Jjh Hh HU^J h H^Jjh HU^J *hmshMa^JhmshMa^Jhmsha ^Jhmshxt^Jhmsh~^Jhmsh~^JnH tH jhU^JnH tH hh0J1^JnH tH [\^pƴִ״]{bq亱~~~ulcZhmsh7:W^Jhmsh5+^Jhmsh6C7^Jhmsh+X ^J h^Jhmsh)U^J h)U^J h^Jhmsh4!^Jhmsh, 9^J h^JhmshMa^JhhMa0J1^Jj+hhJU^J h^JjhU^Jh!(hMa^Jh!(hw^J!^p״|crϺQJξgd8c9gd# ' & F^gd8c9'gd<&gd'gd)>'gd&gd)>&gd[gd)>gd)>κQR[ĻŻƻ(D]^bļؼIJKV^_xyz|}~tnhdh^JhmshT^J% EFstu;ξ]lt <Det-*+ú~ulcZhmshS ^JhmshgU^Jhmshr^Jhmsh.^Jhmsh4y^J h[^JhmshSH^JhmshQ"p^JhmshS^Jhmshy^Jhmshn^JhmshR^Jhmsh4@|^Jhmsh#^J h#>hkz{678簧瞕猃秕秕}w}nh h^JhmshL^J hR^J hy^JhmshH^Jhmsh-a^Jhmshml^JhmshX^Jhmshem^Jhmshd^Jhmsh^JhmshR]^J hR]^Jhmsh&(]^Jhmsh/4]^Jhmsh^:^Jhmshyj6^J h[^J$^_ gh|}#$%abcs}~Ļİħ{pg^Tjh:dNU^Jhmshr9^JhmshX^JhmshZ0J1^JjVhmshoLU^JhmshZ^JjhmshZU^J h^Jhmsh7^Jhmsh^:@^Jhmshem^Jhmsh^:^Jhmsh! ^J h!(6^J h6^J hR6^Jhmsh^:6^Jhmsh! 6^J~Ropyz!"~ú̱xmfXmOmKh8h Hh0J1jh Hh HU h Hh Hjh Hh HU hmshZ hmshUhmsh4BD^JhmshSE^Jhmshus\6^J h)U^Jhmshu^Jhmshus\^JhmshD^Jhmsh7O^Jhmsh^:^JhsEh:dN0J1^Jjh:dNU^JjhsEh:dNU^J h:dN^Jdz53{m,D&gd_&gdigd^:gd4BD&gd&gdgd4BDgdgdgd"7  & F^gd^:  & F^gd45{ rIUijMŸů|sg` h86^Jjh86U^Jhmshx^Jhmsh_^J h^Jhmsh%^Jhmshi^Jhmshpk^Jhmsh^:^Jhmsh4BD^Jhmsh^JnH tH hmsh^J hmsh8hh8c9h0J1jhL\Uh8c9jh8c9U hmsh{!MNOklD .:EGdrsĻ|s|sjaj[QK h:dN^Jjh:dNU^J h^Jhmsh==^JhmshE^Jhmsh &u^Jhmsh!>d^Jhmsh^Jhmsh;^Jhmsh7 ^Jhmsh%W^Jhmsh,_^Jhmshz^Jhmsh3 ^Jhmsh^:^Jhmsh_^Jh8hx0J16^Jjh86U^J"jh8h6U^JD)SsTX,*&gd'&'$$gd!('$$gd'gd 'gd3,&gd&gd!>d$gdF|Cgdigd7 gd"7$sgd^:-KOSTU5W3^_ѿѰvvmc]cWcmNhmsh3,^J h H0J1 h H^Jjh HU^Jhmsh.^Jhmsh*Z^Jhmsh!>d^Jhmsh0J16^J"jhmsh;6U^Jhmshq6^Jjhmshq6U^Jhmsh$^Jhmshy^Jhmsh7 ^JhsEh:dN0J1^Jjh:dNU^JjhsEh:dNU^J &STVWXY{k`{Uh&h'&0J1^Jh&h)0J1^Jjh&hJU^Jh&h3 0J1^Jjh&hJU^J h&^Jjh&U^Jhmsh'&^Jhmsh^Jhmsh@$c^Jhmsh!>d^J h!(^Jjhmsh$(0JLU^Jhmsh$(^Jhmsh3,^Jhmsh^J h^J *+,-efg'()*+̼ձը̘ձըxmd[RhmshY^Jhmsh{^Jhmsh=n^Jhkih=n0J1^JjhkihJU^J hki^JjhkiU^Jjh&hJU^Jh&h@$c^Jh&h0J1^Jjh&hJU^Jh&h&^Jjh&h&U^Jhmsh)^Jjh&U^Jh&h:0J1^J*+,?U"1eAdcgdD&gd\gd\gdN0gdJgdGBgdgd_Ugdigdq$9gdn  & F^gdN*DgdY+,-45>?Uw*+_"1mƽƴƴƫƢ}pfpUHhmshZV^JnH tH !jhmshZVU^JnH tH h^JnH tH hmshq$9^JnH tH  h H0J1h Hjh HUhmsh_U\^Jhmsh_U^Jhmshq$9^Jhmsh %^JhmshQ<^Jhmshu^Jhmsh=^Jhmsh0^Jhmshg^Jhmshe7^Jhmshywd^Jhmsh/e^JnH tH mnoھrcTG:Gh:dNhE^JnH tH h:dNhp^JnH tH h:dNhe$-0J1^JnH tH h:dNh80J1^JnH tH 'jh:dNhoLU^JnH tH h:dNhe$-^JnH tH !jh:dNhe$-U^JnH tH hmshe$-^JnH tH hmshp^JnH tH hmshq$9^JnH tH hmshq$90J1^JnH tH !jhmshZVU^JnH tH 'jhmsh^U^JnH tH  +e!@dwwwne\n\n\S\hmsh0^Jhmsh\^Jhmsh/^Jhmshe/^Jhmsha/^Jhmsh^2^JhmshJ^Jhmsh8^JhmshGB^JhmshU5^JnH tH h:dNhe$-^JnH tH h:dNhF|C0J1^JnH tH 'j$h:dNhF|CU^JnH tH h:dNhF|C^JnH tH !jh:dNhF|CU^JnH tH c[  ( q      N s t        +      Ļ軣{nanThmshj^JnH tH hmshGB^JnH tH hmshE^JnH tH hmshHz^JnH tH hmshNI^Jhmsha?^Jhmsh"A%^JhmshGB^Jjhmsh0JLU^Jhmsh^Jhmsh^Jhmsh*^JhmshJ^JhmshNE^J h^Jhmsh@^JhmshD^J [pJ ( >      t     +   &gd#gda?gda?&gdGBgdGB&gd&gdgd*gdGB&gdJgdigdJ$gdi     B N o p q  @RZno$%Ÿwwj]TD]jh2hJU^Jh2h2^Jjh2h2U^Jhmshw^JnH tH hmsh! ^JnH tH hmsh d^JnH tH hmsh^JnH tH hmsh\^JnH tH hmsh_~=^JnH tH hmshj^JnH tH hmshE^J hp^Jhmsh}z^Jhmsh#^Jhmsh#^JnH tH hmsh}z^JnH tH  4 q  @o%W^C@eZ)&gdG\rgdG\rgdH~gdigd[gd(2 & & F^gdp&gdE'gd#[\]^n),)?@de/Q=>DEFGX̺̱̙̐Ç~~tntgtaXhmsh"Y^J hp^J h H0J1] h H0J1jh H0J1Uhmsh.^JhmshG\r^JhmshH~^JhmshJ^JhmshF|C^J hF|C^Jhmsh0^Jhmshm^Jhmsh(2^Jhmsh[^Jhmshw6^Jh2hw^Jjh2h2U^Jh2hw0J1^J )GhI(Iz' gd^gdBK gdBK gdigdj;cgdx1 & & F^gdD_&gdUM&gdD_gdG\rgd,W & & F^gdp&gdG\rItIJQR^_nyz34EFĻ}p}f}Y}Yhmsh ^JnH tH hp^JnH tH hmsha9^JnH tH hmshBK ^JnH tH hmsh$^JnH tH hmshj;c^Jhmshjw^Jhmsh>a^Jhmshg^Jhmsh"Y^JhmshW^Jhmsh ^JhmshUM^JhmshD_^Jhmsh9^JhmshG\r^J hbz$^J"Fn%EMjk   $ % & '    ǾǦ{ue{Z{QHQhmsh ^Jhmsh?E^Jhihp0J1^JjhihL\U^J hi^JjhiU^J hF|C^Jhmsh2^Jhmshfdh^Jhmshqa^Jhmshm^Jhmsh ^J hp^Jhmsh^^JhmshBK ^Jhmsh#>^Jhmshqa^JnH tH hmshE^JnH tH hmshBK ^JnH tH ' 4 !""$$$%I&&'']*[+\+q+V-.  & F^gd5&gd & Fgd$gd|gd^ & & F^gdp&gd?Egd?E & & F^gdp & & F^gd9Ygdigd?E  ,!7!!!" #!#########s$t$u$$$$$$$$J%K%&&'''ɹҮҥɌҮ҃zqke_UjhiU^J hx1^J hh^J h?E^Jhmsh^^Jhmshfdh^Jh:dNh ^Jjh:dNh U^Jh:dNhP.^Jh:dNho^Jh:dNhP.0J1^Jjh:dNh U^Jh:dNh|^Jjh:dNh|U^JhmshP.^Jhmsh[^Jhmsh?E^J hp^J!''''''''''';()#)$)v)w)x))))\*]*Z+Ļyi^UHhmshi4^JnH tH hmsh2m#^Jh2h2m#0J1^Jjh2hJU^Jh2h2^Jjh2h2U^Jhmshg^JnH tH hmshZF^JnH tH hmsh^^JhmshL}^Jhmshh^J hx1^Jhihx10J1^JhihF|C0J1^JjhiU^Jj}hihL\U^J hi^JZ+[+\+]+f+g+q++++,,,,-,Y,Z,H-U-V-.//00,0O0i0j0Ծ|rrh_VMVhmshd'^JhmshHf^Jhmsh?E^JhI^JnH tH h^JnH tH hq^JnH tH h*^JnH tH hmsh5&^JnH tH h5&^JnH tH h=^JnH tH hmshX^JnH tH hmshq^JnH tH hmshg^Jhmshx^Jhmshywd^Jhmsh$^JnH tH hmsh_^JnH tH .0,00p1122+3{3 44d5 6m667O899gdL\&gdJj&gdi & & F^gdJj&gd.T\&gd2&gdHfgd=gd=&gd]v&gdpgd?Egd?E  & F^gdij0000000;1<1=1Q1R1S1[1e1m1n1o1p111112222ۺې~u~h_OhDh2h?E0J1^Jjh2hJU^Jh2h2^Jjh2h2U^Jh!(hy^Jh!(h -^Jh Hh?E^Jh Hhf[^Jh HhHf0J1^Jh Hh?E0J1^Jh Hh) 0J1^Jh HhV@0J1^Jjh Hh HU^J h H^Jjh HU^Jhmsh?E^JhmshHf^Jhmsh^J2222)3*3+3@3g3z3{3|333 4 4 4 4]4^4_44444/505b5c5wl^T^J^h H0J1nH tH h H^JnH tH jh HU^JnH tH h2h20J1^Jjh2h2U^Jh2h2^J h H0J1 h H^Jjh HU^Jh!(h ^Jh!(h) ^Jh!(h,_^Jhmsh=^JnH tH hmsh.T\^JhmshnG^Jhmsh=^Jh2h?E^Jjh2h2U^Jc5d5z5{5|555566 6 6g6k6m6n66666666ڿڹ|fVL>hmshJj6^JnH tH hp^JnH tH hmshJj0J16^JnH tH *jhmsh?6U^JnH tH hmshTU6^JnH tH $jhmshTU6U^JnH tH  h)U^JhmshJj^JhmshQ^2^JnH tH  hp^JhmshQ^20J1^JjhmshQ^2U^JjhmshQ^2U^J h,_^JhmshQ^2^Jh H^JnH tH 66u7v7w77777586878M8N8O8888888999zj_K<hmsh,0J1^JnH tH 'jJhmsh 2SU^JnH tH hp6^JnH tH hmsh,0J16^JnH tH *jhmsh?6U^JnH tH hmsh?6^JnH tH $jhmsh?6U^JnH tH hmshJj^JnH tH hmshJj0J1^JnH tH 'jhmsh 2SU^JnH tH hmsh,^JnH tH !jhmsh,U^JnH tH 9999x9y9}9~99999:V::::::::;;);7;b;f;g;*=+=,=-=.=/=0=Ȼre\hmshywd^JhmshI^JnH tH h QhI^JnH tH hi^JnH tH h ^JnH tH h=^JnH tH hy^JnH tH h*^JnH tH h Q^JnH tH h Qh Q^JnH tH hL\^JnH tH hJ;^JnH tH  h H0J1h Hjh HUhI^JnH tH hL3nH tH "9:+=,=-=.=/=O=c=|?@AzBC*CC&E~GkIJJ3Jgde-}gdYdgdJ(gdF\&gdp&gd<gd<gdigd\?gd & & F^gdI & & F^gdi0=E=O=c=d====>>>>{?f@@@@@AABACAsAtAuAAABBB B!B?BܻܮscsXXhmsh@0J1^Jj hmsh<U^Jjhmsh<U^JhmshAz6^JhmshAz0J1^Jj9 hmsh 2SU^JhmshAz^JjhmshAzU^JhmshXO^Jhmsh$TH^J hp^Jhmsh`2^JhmshnG^Jhmsh<^Jhmshu]^Jhmshg^J?BCBJBQBRByBzB{BBBBB CCCCCC)C*CHCYC|CCCCCC˺{tkbYkYPYGPkhmshs^Jhmsh.F^JhmshJ^JhmshF\^Jhmsh /!^J hph<hph,_6h:dNh1+0J1^Jh:dNh<0J1^J'j h:dNh>`>*B*Uphh:dNh:dN>*B*ph!jh:dNhnG>*B*Uphhmshp^Jhmsh<^Jjhmsh<U^Jhmsh@0J1^Jhmsh<0J1^JCCCC8D9DDDDDDDDDDDDDD%E&EEE FF^F_FϿش؊{rir\SCj h:dNh>`U^Jh:dNh:dN^Jjh:dNh:dNU^Jhmshi^JhmshJ(^Jhmshz^J hp^JhmshXO^Jh HhJ0J1^Jh Hhw0J1^Jh HhAz0J1^Jh Hh(0J1^Jj h Hh HU^Jh Hh H^Jjh Hh HU^Jhmsh /!^JhmshJ^Jhmsh.F^J_F`FFFFFFJGKGLGwG{G|G}G~GGGGGGGHHHHHHHjIƻƜƄxogcg]goWNoHoHo hu$^JhmshF|C^J hF|C^J h H0J1h Hjh HUhmsh|^JhphJ(6^JaJh:dNh?^JaJh:dNhJ(0J1^JaJh:dNhYd0J1^JaJ#jh:dNh?U^JaJh:dNhJ(^JaJjh:dNhJ(U^JaJhmshJ(^Jh:dNhJ(^Jh:dNhYd0J1^Jjh:dNh:dNU^JjIkIIIIIIJJJJJJ)J3JFJSJpJJJJ9K:KMKNKkL}L캰ztke\VOFh4h4^J h7h4 hgM^JhmshgM^J h^Jhmsh9^J hu$^JhmshE^Jhmsh1+^JhmshK3^Jhmshu]^Jhmshg^Jhmshywd^JhmshQ6^Jhmsh\6^Jhmsh\0J1^JjhmshXU^Jjhmsh\U^Jhmsh\^Jhmsh|6^J3JFJ:KNKkL~LMN0NAOmPSQlQCSTTTWU & Fgdg"gd1T  & F^gdZ~  & F^gdi & & F^gd4g & & F^gdigdZ~gdZ~gdigd4gd4gdgM & & F^gdygdlL}L~LMMMNNNN#N$N0N6N7NNNNNNNNNNNN?O@OOlPmPRQSQ^QdQkQlQrQsQQQQŽuuuhΪh Qh*^JnH tH h*^JnH tH h4g^JnH tH  h4g^J h"Y^^J hF|C^J h:dN^JhyhYI^JhYIhYI^J h H0J1h Hjh HUhYIhX^JhYIhZ~^Jh QhZ~^J hdw^J h^Jhe h7h7h4hGy^J(QQQQ$R7R*B*^Jph hF|Ch 0J1>*B*^JphjhF|Ch U^JhF|Ch ^JjhF|Ch U^JhmshDY^JhmshB2^Jhmsh ^Jhmsh^J h^JhmshY^Jhmsh<^JnH tH Z[\R\r\w\|\\\\+]m]]]%^`^^^_a___`>`&gdYc&gd``,&gd<&gd J&gd1&gds6#gd^)&gdT4#gdCL&gd z\{\|\\\\\\\\]]*]+]?]m]]]%^9^C^_^`^^^^___`_μΒԉwqwkqb\SJhmshDY^Jhmsh^J h^Jhmsh`Z````'adaaaaxbcccccccccccccccMgdMgd23&gd &gdh&gd<&gd``,&gds6ccccccccccccdddddddAd\d]d^dddddddddddddddddddddd(e)e2e3e5e;e$a$gdtV)$?& #$$d/Na$gdR)$o?&#$$dNa$gdhgdmgd~SGkdF$$If47'' t 6T_8'4af4p 9 0&P 1h:pmd. A!n"#$%7I 6&P 1h:p+. A!n"n#n$n% 6&P 1h:p+. A!n"n#n$n% F`-| ǧF@0JFIF,Photoshop 3.08BIMAdobed ##''$ %'% $('++++'()02520)7;;;;7;;;;;;;;;;;;;;; 11;%%;;;;;;;;;;;;;;@@@;;;;@@@@;;;@@@@@;@@@@@@@@@@@@@@@@@@@@@B   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw;!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?T#!/y;ΝM4_x_R{egװ_p-_ ;Dw%{_ S}佲p)X0$?xw%{M!]{e^\0'G*1gOw!{ghf?}K*37wܗJƯ&|l e}i_ZܗUuW,/]{Eb>`8l K*!軟}Xl6@Q6gYE}p-W֞{ fkjW@;K/lO֎{Cee90wm߬O/hlj؞%ȣI^KGl,iBxlgw%풏p++6zD%D 1mɯȥl$8Gi!{~t)̻+ ǦųRp%}M|6"%{\:eN-6?%{YKڒثE^?+S}p-gl 8w%{"K`[?س"%{w}p1Ef] >~Oӌt񄇬⷗C)c_cOE k)( >ڈ>W]QK){RGWO"|Z^ԕ_ϥ>Ի' ?\X E# mj?C*L~>\C8OCw֮YJyt_Gڗe{?E/j]){Rp3gN[nx({D+ ?.@ܟWZ߬ u?>WD߮1~~VqOZ~@U,ӁcC'?({e\a|?~@RWb߭}9wkZI\a/Rp+x_Kٗd{_Ǧ^̻+ ". WO_4ȡqǯa[}70L۸٧_䏶QU-|>/l- K쏓/l3$%qx'ܗU3S0٣c丵9ra o.| ASz(pqvu\z]4=I$5ɃI!D%ܤ8EjHj~ mϵI ?Eh&*_woOD~tc^Gg96 y'{RWc_֮s[d` Ȧe\aV}il>* oNKE}# 8^Ի'(m/Pg}bc74l-_<+גO{e8@WG:zO/ȧ{eaYr^$=Ƞq0Y0isrC) ֮_Gڒ=Ӈ_/ȥI^PӏO/ȥqH8}=0u_G(?˃ z=ȡ{.?]ʝ$ ] aX)%ԑξ(RW\}j'Pp.߭/Ȥq0kw0Y0X$ÿl#};'Q0Y0lR}gK* WOIEp+ut_K*WOIE+ ]?'Rp+t_KڒE/jHOOIE+ > ?"B}gafE/h Ξ(RWHXM`y}0}hwEh.56kWr^W=?'Rp+t_K) Ξ){RW_tt_K* /ȥqɃsZ'/ȡql븖;xw?rW]s@~0tw$`Bxr[p Rh%I)I)I)I)I)O<}bɳ0 w$i说4 17t5;@?׺4)+2aH^ߕ*R̶A`53%JS,}5QRY {k%0K;r4z<PMZ쨝u.'_VCNZ{bD;~^(Wlvн!jKcѹh{5EetӟМ̥ikO [k kȅ2  (X䶛ݣAizj!杦>~A 5_;!G86,@kϴ RyWukx)/^Oן9U=y2>3KCBSISʀt2Hd"T{yvѵ͑># ]ԫc rہ* Rܶb4\6?0XKu8dd} CG oJф_';&AYoJp E yjw1]xM?rRΫ@rwz7h?}1l~(KzϪ\'sc|T,VK}~ 57§'V[cA=hcǹՉ$_pSXˉ'ħҖ));=׼yr?C%GM.?Qy??K4%-)ӴsJiSaK|^L!Uk]QKYSV(ݐ0MRZff%,t:K]7s~sfrHP6}5R VTG \f+n;yU*9Vb@+▴{3?.IM~PO}\QoE>멀Jrmhn:Ky&]cP/B-.-坿St 2SZ;A[:F{1O1su~TӺYMŏFn97ژ9x_\$|iS5ӱcO Dꏣ}!3-s\8lG9wotQb-bnbg(*#O i-S:ݤ{).}wX5:q,yO>*@Lkm-b^v5M%p cʄywo4¹P9[)ѾR  ?p(`,T}y T>HE.EJIJ(62Og]`BWá|%r=HMH-~Ѡ"!Axo-=אV( l:JU$$$$$+C^ yյMv,<=t]c`=ݟh1vl8? ntKs<&Rj{q%jgeM.LnAKֺLJGqk -uEMy?Pa2xĢL]n~%6gkELiₙd 4?HcÄBUV^I@$qѲyGV>T٣A</iß!4||OJ] t?x=RZS" b^ss8`oʂ&D?)KXA>Re$t~D=B*n>^'̧UkEoϐELYUxv=4~(mn jZb64RՁ@i.)l ]i;g]<|u@6:]mRE~FϚ(C-$! Sz'HtL wAkS (f90w>'Wy?bZ i>.|3)IotYx-d۳1 )5NnMdZg~RJkӁmrO"+n8Bjb86y=;j_Sqkg*k5 47 5ɓpdYgO,졻de8nG.)u[m nOPv>iSU煮z'_pC}uO 5̽4S*L3(GIv; DxSmx^^uLmw@mޫ&78)Z5LF4-'cAQJ,MءZ)LNEs,8&):Mu Oޖ1z*Ln8X4zRMXk50 nq19u:9M%TE.tnr~R뀈 Sn> kaޙnk{)LxlnHNkCEm=J) ^5zt?ߚHU2nنΪI)I)I)I)I) ѓ)qœg_h\~i$'⊑}I*J\䒖1'<5H5%RΪI$9O? w39|t )WCFH_SΪmqhO|?*jnm5wt?z eV6n K'O ZfՆIGG;$8`s^#_"TAfsZ#uA._o˰ǔᢛ8$͓?Ţm8䆍zji4?(%}*y1eqxs]|\],K7S>BOJRRJzs5@ygU3i侳{[X#RCw~h\k]=htKvȢ\~:OC,7|7w&..Kҽu0 0[`ELR!Vj4?TLПOI=G|JpC,ZKpVHo R}Z~%Пfo: Px_a6]y?`h-݀tglu)yW&:AO$zr,;wA%Kw)PT<7?!s$1qTGsjfYb_Ӏyuhwܘ FzX0O٫^ Ԇٖy.?´&y$i!@;؄^k֯IL]x3<$0zfhiy|a9KEMjdk~)A JLߏEMlWZE]ϺI_OEQkH | e4m,<1btBZqxO*j6 {Gu!1O d,\G }~hv%s>? .I[-cO( -`+u/q`: Is ^}!iR 9 >h~~0ѻNRz87FppSNm5:n߼G oTq\f {y'Җ׎wGI|3'4! SQV@?R-N4LbtSoa_/ +7 kt"*r_eПSۦ'? -ic N%jCvKZ-̬))~A3)ZwB"X`F60sQ w>W'%h;Z<ϗ"}6{oPixdScԮ%F sFy|U$viCM])>IIkqȲx)J[- hy7[@.jE5vmwτPs=akOG?oCRlNCqUcL Ʌrn(>$ wE 1wl$4CgeeʱL2jcZyb֗$E(:Ue#Stz*U{~Bų m`.M"}-o~uJ^ytVH`L65:5RӪA]u}7O+R!` J!MJ[:ʌ9SO-,CI2xE 5D)&#&qnwza) r N R*IM>*l s`)k2iQ7YW4h)s߳FL\ɚ!.ekj{G`\]OY6s J+Q76<ΩbhIS+o~OH.ExAO~is^}C@.R)I)I)tTT<|nxs6|4Ot@m25~i?Ldh XWt%%2s4M\ƬbX$cO)U{lu&I'-fGxG$QRHY G,컷qTفa[Tطbɳ]wٷFϴNE5{K8@{b@6op4)-}w em^ %x ku2S㉞~5N[]K);F31OQ*O<KLϲLLv%K47kkѩSP*Do#:`J`hSy(%%: ;Ke0/x/!Z 2KcH b/ǒ~?✥[}xg_ْKCei#JGE7zKZ^'K<)cW-nF%Jp )%KTK^7m[m3h۬SHRO %}4v@ qFےi; +ijU2Žq 8!%Q&]._N^Q%r<L"T5w%:Nxfv75?jR+3 `yqZJu AJ4a@a*nVH ~ FAm εSₗͱޡHcx4D)mn;ӹOC}XqIdݒ!{4RAoN4-/"U{CN;B[''(md6R~A-wykS!n`?}*7u%:E ;@},<7}墌..;[uRn?˟gѺݬ'5Hf{I?/i!` qqƞ?)-%=yD<rʇ\& q"jJj;Y#hIIw?67IYHxzr7JƲ {OiLJE:v=GT:=^㇊\Tߋf]-qk>UXcO >Pu '挵HjdnyyJ1(UeX8~kj\r$mHjKY_l#q'~(m?xg@(ИE"Z4 ŨxA Qk'@+Y($s),tcápg[L: l68=ibۮZ+W|e)Jh9Ds^L׋÷6;kn$"'d>#wx3as|8 r/5( !FR S]ߙH78 `y7~j= # TIJ )tJW))IZ`p3tY[{l+xuFԠS4YE JfN)>.8c}[[0׻q2O'R1DǸ枤(җI I BJ{пͻs̤}e;plꂗY6xUMhs}bH!Cu!/mPHtIқa\Fܚ]aON2R7c4?DGJlv31}-.$PR+)k\;?DBQ>֝R?13-~OlrA5txh9V7KAc|sSEP94qv#&Rum;^- 滊?GRٹBOSNeo ~Jtm]8{ D̏wSTuuki;=w.l)-^~'NeY"hh)*ONǶãd{)ex9@rt*x_h&K[J!/M$$~?@8شI%O1?!0ꆗUNt5RMX=`AB&'CH4|Oq-5#!Qݗۤ߾~:¬w{O7qq[14|-JZ>5o{XQBT mgN?SjH&H?D&VP24~!%=f `7m~G$s*`|\Up\l?N&vΨ3C"I{FҪaVN8_ [SCDr R~@Tؽkg1͍y:w .aszAL*fV5ܜEޝkQ @{ls6k~Lz7tcleowma4he47"Fp%,{,&EMqTp$qi 9OV4<˞xH6ӝ+w:y84?=|$}O5v́ʇv$|p\}%4j8>8VęIL\ԶwDs/v]ZXV 슙T˧qs"0$n9xtzi*nш 0?E2s? vIV[9jDhhA !ϰZY> .Ϳ`* $QZQBgE-Fs4hrm~8%AI-RI]$%/))I)I)tTĤm_GoӪEu~珂A \~ݭ"ׄNZ>MW9m2bIOC\ M%ANQi<%@ aH4 s:"HQIOo;YncUٔO>_Sc݋&z_ph4ViZ9'Tnѕ>:)O9{ILkLsjY@ )pGI$q)ݘ[Tګ#%jEf@`>=ǔT{t.)#EvTH~iL/w5&ڙݟWOp:{<|Mp~ot6>ͣk$k3 wq'49H6H>Wnu`ߺ4}ҝ,}χiTDږg6A lCViol\:ȉ"8W0ߐƞ?~ cotiw(NNK?+@PcO ?" ҥ*'̳ BmX.~ߠ>}I:u}$GFT+b# )Ʋe:s( bX77JV IUNP;KRXǮO\,Ľh{˧A鶾6K!jcq8vU`$;I %]lMZ'Xs~5 E=1OHhf8;g>"guEH$;uIJ}UYI:a64oQI! .AQ|F}SH-A5L.i|P)o~bZn-o߯ғdپ? !.{BqRLv?`3;*NM\z֚ޫrX w6RR_JPJƱUxHc^D>\RKWe 4 {duPioݭ'5fdZۓ}O d ST0T\%3ħװt%].l1 ;#UK^"đ?*r\|ga9T bd~|%w9NIw]xKOp$.sǖ )@y0s{$ u.$*J1kD?T|s?C2RFf5qyQS&s:sS1ot S((-IRJ(9O oGtRXܧmni4Ik[oXO X!dIRJPIK$$JQII1s'FJi)_3+FF̘d3"]u!RRRvT#ǘH/[$9?6EJ64Fz TH^d򊘤JH]%)$=?gݹguWfRJRJRJRJRJs>fAKv,p{RS?LV$5`:Mp=|RSsL.pDnw?Ti>1 ibnhy?8 PT~Y`9}4 sGQ &ADKFs@kkI~]hZ֩pl?{JiۗNCAl|NSc6&E]L$&).{jx< ֲ̢ sH>|6z=@@¦`1}_*n#_5,BN^xSzZ t${Tdڝ K yiqQ?.[*H SAaKjmMof^R';fF/(}cmE~n)*oU~.?66Kb~3S[:ȥfXDH1_jt]^ " }MͲh5'-c&24hOtG`.}>|\gﳏpo^;K㵟yV`ASHEԒ{2 i'?>q|ʎԶFEIMv iNNf#R\0HK_TSo١J efتhL*GYHx2R Vș5Fu^\=G8zGff4K9w'mq|'c> ttRQ=TLji~pG8441OR'ZXIJVFki!L )űͶᱍ5R) l00vo2Ipq.k..*EenL g73{0쏢 si y'-#dO H0dܵz Ook?JMA;#ԢP% a^모$RLojlSIS=ǧeOvݭSvӱhW#Vn9o&yyVal`zgu>)]%6zcF SV[yւ8lS&h%<-EbPj4W9֗D1(KklwBMh^]Rtdȩ#j/L|ޛhNi&3XJʎI½>Pr,p=Y>mcCIk<4]RJ<]N P=gKs ڹgǐ>I:%#J8srO ~jh)&v0ck d={c̤5C7;50ꖭV݃|ӂ҆֩)$%.TJ)I)I)t]i ˛X~M`owB*@ Ju!rRJ d5%70)vh5nGF@/$> oZ&V7;ħ-,a+X$$$RC}O~mۘwve$$$$$'StymSb݋&ZXGfV4S2ж2lPOIAHCr7k]4Tf3-;HzJ]@;P)M_N||焔xj?xRR_G{Iq=?z3k4SS,~4F]Xd7GXNuտ9|@ԟr8Վ}D$q4\˺&z~Allv`Q C[3b>:wHJ|>:ax>HK[Tыҽӹp s]XX8Jp9#lm}/4SdRQH%ɭߚxłCZvO{Jj;xK"F;e:57 qqji*kfufaƟHEI:NeApF)7e">z`*`ml0ױ#q0ZtIM{ [^N;t6`[wwvS-\t\ְހ{5:^.%#žѴnSMWceGOܞ{\.|,$GIOGN]#Q :4: )5op^1xCr"m:~d8KXQm HFI~Q?Ao=H/n}'Zҷ-?'to?ܟJBhJC.ة??@ymХ,g ).#`~6豣í4Hyu;u{EYlS7r\M;MKXpk|O*"9sBө'itƗ:n;GD\A) 1P;q%l?!ǫ yQ(EpcOI"٢ҹޛ~MMwn"St?q:%#qcez\ne@YN]= JsV7?9 yM4NS"6QIjtGB y.:@ߌ'˱n?rp s^CI#U)c%Z|J{:: IF5Es 7ܞP/wT iq>MJu?$AqMs]x VvKx5H%^7Ϗb'NH.<]PN%@~sqH0 λw7i-"X :m|DjgDG*mvL0|OtKCg_im5T5pm$^M^ mByt>xHF֢׸-0@ZZi$<A&Kpr~hڔez~hp6T^6-Z|Bm)Ya0=NR졥4KA'I'ŌѥCC?1}mq!0?63K [/}c~O֫3.sk=nCqxȝJSs4ߗ#JO_Z~aJKNn6sSJTUcMAMg4+ì4A8Cm-fvVڛ5ᶑ?W42˘6K5w*M[{nse>uXIo>A}Gq.>1.p R*\D?xŕq()}H3ŲhHVR|KSc[#J{~*@xSKC|.RH{I?OԘ's R٭ޭ֑r+1mBzG.t|Jԉ͖8mSfՏhm,'sS!&I7<_)@vᨨ:J>ag 3$49=Ҥ9G1C@PL2E].fsĘO<Ϊ`V'0dٲ\ 5~( XuCE`~DNM^`!"^$s@B/_|=B"݆^NNSk ө[f?aSS.kN-}rNTک)EߢS:sX>PSps~erυ 2nfG+.?HQ YNM8 '| $7?q "dn1QA̰4h"O HK}-i]b?׹)% JzՑBRRRRR)I%A%.QR% cF{w UFUNRAe}ަ@"R-RITJfn)zvK&I YUzؚUa}= ok=@SjI)H)I%I)I)yIq?YncUٔ66+ 8)œgvOa#<*hmg.!$p'%#%ԃ_?R_EÂ\5)Fѽ4j%|ҵ0{<|Sbb\K % SS3%qp8FfEH:zq#u8DVt~HoQpFSyMC]M'uKr]-r]ORl,;^ѳJ鶦C$={9mZ{HZ lvR;!h?9PRhnַkx.?w%Vd1ۚ))Id<톲gwmҝ?M$\{Nsꏻߨtj4r7kp:mtcCfy-;54N;R ~"UG$veX?!W -c| +b.qxIv\Isܦ--}3*@%.L$֘h&6jo| y[ Kv4jw8k NjWXf9?r Fs6{6X w4=?=e<0S*muQ FZWgIO sԧ+hs'R-H}H{G{2wL%Ao\h>hd4 bI j2`A!5.0NeF{["cT-v \&}~ɩ(j$跟ic(WǠPְp*` s^~z7)1edO.2S֤;EM˚q7Wak^`~%8)NB!I)I)I)I)I)tTVåe~hQWPYѵzrIJ: Mgrk]khxM(nzl2`{RI<Gd-mޯN Y\R*IpshJ$IJIJIJI*I* !~C ?6{;2RRRRS@:Mv,n}wJkGqT2"@,[fckO? 6j=Xԃ"o!*0h{rK|V2;BZ[>ҕ}@- gJLrP%\VqݕdltGt:uಏuX1-ԋ+ty#¦U_s=aߔ&u{G~DD>%vtauSħOc6=L Z`p%-/,aHr j;m>Ω7st,ϖSc.,l9A _ikȅ6t]uh@j&~`}Aů ׼ A9,h~Fo7%h;ZH)b.lǿŪS ۱7Z+itc4--ts;}6ۦƏH'-MScexsοn?W v[a,I9L.sa{sC}ǟ, !}ϼktj!~C&oy1NQ#}!Fk\ Ѯ5<),m'?9L]kA)ECC$}ұx䔄TIK,J}WU~ εD׎mo1 嫍ۜ)( >-?J]vš5,I=Ý)L1jß'ᵿ"W.[E^/,sRv`GBm%ulr(Zz?w:t4>ڜfmn6[C G&uV߱Ǩ?;)ul7{@ `KV :ܜc*~<d~@6?/_'N!i,3ZeyuZK^,nu:h eo0\|LsI{ R @m2asACwZƹsNMc+kIw^̋qʒ!iF>k>dOgmH+wC$ro )!rSuVg(rO|;''u&w~UY@mg]19!̹lEh=@v+WnImmo1XW|r+'=մ{zJRIPIM,Qi.v 5ScAE,pnE zEJ@p$y6Swp-ЙV5+N INZWGo)GDث; ])%)%)$%.S}O~mxwve$$$$$+8݁`R݋&Mu4I:+Aq~:j<"W_qcGU"Bh}ߛH Sf>wCu2Ϯ؎S]{ikxhuQRg?f̖AOR[-5?R r ŭqH3)|^[uܗSّV{kn6 QJ>]d7hգ')>7NObƟB6W5KF;GГtMȋ2_^%#/6!7tw(V|D2\EL=ₗco蛵QR.'#Io`ݻ4}?(zNXlsy^>:}R.{`:Iz@n GumM׶HogqV0f3_Y w.sHU)XOH:Xw[o%MO1.vؿS mGs؍%4n<?u-^ `8Kz)C6=ɀt)UA\?$T83O0*o2k`:Ho(ʝ<Y1N~xs6LǍM_A}7k)n6ނCEK 4EJIK"H;1uch{(N^Ix:Q>\(W)'ټ7&E;S5UztM2?y|l5|ЖJ-{@N%4}8Y<Ȣm.Ck9J;kYqJRaAPKan[j쬉cL)fkd8idJ = c1N| Ru\}WѣOJ6<#B̊k}%~ЖH]\^O> ;cgNHa3<@AKqߑy4n m&/-ϵ>X!3?+U6SoGGI5ޛ~.nJ<4m_ލ-V=^:.Qy4&`ɞNƧruIJǠ1i!ֈg])Zᢕ %wdҖY$ݼs P=lXdvߢ?RRS*48r*[ps~P]%)$%)%=?gݷguWfRJRJRJRJRJsI;Cu=˼ A,FZּ3w:&M.1:dڵNORvH"?8)iL饷?pt:К*.x!5I*ysNyM+YftCBZ# ikD4Q%)e4XcW>)Er+qa,<4D) 6fY$fD#6;G~c3ecɽhRY`'0wk:%ײ^KkLPF .3[UG臻l?ܬ,ee\!?ۨ )>fm%5 띣7ZG?UZ-hcx&5>zm,isXOӧ6;HR[C\^gG@II IIGZ,p"{C|6;J^SeXl. n=bRZ}6y2 Ocnq[^~1S }him4|G(Ю\eX|xJѫ"7q οyM%I>F&LK#h۬1'R?.+;G;{h{ Ԥ7X)[4}6Q\ bZ6LOM,XǙ' TMxo\g%3gR7$aߕ%6Ȱ#h bǤ\#:965KMTX?9L6#IK:%%(蒒W5~!jf]UII_umq1O犛PK l;\?0ml%Z,r*S? nM֥ѪlT]>0h&;MHahhӷ8Mq Lsk>c6i{T \tfsFMJgVY}6Lv䂐U[j51c*(Ĕ lﰝcgx&U-wB<84vEkO1Ͳu")MTLsS`?42fuL< U^qn-0]<9ڟ+4 #MۯhR]Oqpl' BnK^I%ZBJ !p=> ,]cL4A,)'!k_V`&a{N0D!ASyYZƻ)JJn4va?P]? bVu.?eWlD5s7voHe 6<)AK|4tSvmwpjZ[Gʔ-GrR!I)I)I)I)I)U-ݾMƧE4s/yyиAJvT䔚<EK{-dflM<IH{}OkρHAK3.u>}(f[*xCͭ%$+KV_V{оaxz~t(u,KOJuJh`>~(jqE&\|;÷ĩ6Ksnk~;䚵wPuZx ioN5O} ]%t|9ܝS7CW#ٔ$xh)[-o NJvSX~Wh)`pݮп?55s,sIh|NTxgti)SfK@.h1u5s-oцq#ħ!.uև?r9$8m "STc֙0衦?F t>tH*gs3'QSaY1F)j+9÷0;a>*iY;7W|Աs!V/EK6ktA :u{$/vJJVa$o PRfdNhmr [&eA4 %׺ʉ ~b䔔:xmd-l`ehd԰Gy @V:y-7Z? TE+=< 7MD<C>}jTةˏĢlJ>ܜ"'?HҚe}/|pߢ:xJL[׶ $clk*2`K@O9Hh.nIJd}xGߪr6լya-7Y6thcO 4Թ ΅ R"ܖv')`Mq$ftwp vOݪj,cZt>Q0~R?cpލCs84g%sF8=xbMNqq(ze ky?F֡ycTa k\))%E%'%[[^3R o M[]5,AeqH'R֞-HU̖Eu0?ܐR=WcƦzlxIIwcRݍT]DJ)HА)j49΂k'kKHk✅˜x3w(en=Ù>ec2$ΥWs3!xc200ΰ06>HD%=V;S STTW?:)z6ɇ8ԏPW9HφH erk'̟9M&t䎩u*$;Mm>R=Ij gTVlKY`j"!8u|{eA.I3Ӟ=yV ryt(Z)\;ST Ĭy\&!s-3? EJY%.5IK$$$"KO l`W$K L~Bqꜵ$DRRtRJ a⚹yP EQRRR)I)I)6;&ɤT8>Q"V5JEJIJI/q;YmUٔϬbpGQvqœgts0rhl̚< I:7`J9!6ǟ7e-^.~:ncEl?G5q1}͎Ȕ:4N 2GduG<ƍ/ eV7 rħ]%mA?}%V썮@8} o6\Hq%%Z.IQ*r2~O9ӴݸN)M$N]?x  s " ]l;O+czy$R=IcA "iMf-f}6~H@jYfO\O R\\.Ik EnnSx~е3eas^ZC@wIJqh' j[;$@R%`%2ĵHL*KeY,kݻ6L^a7蒘{v .)|ZCI m> R v>ms 1r3 [f VZk5Zm4Y"6$>Y=?ćCt~ea;꣜.Yyu8GU@:5d;HX.2"jbS*[Qץ\-kT kqhyU9'%" 72*Z׾Y=NM{c>ܝIBMG[i)v 5ڞ(ZesĂВ\W01'_h*q]2t58yRJ;nuܝ; #JV5{o$-'iSwG't&ɼ-i1eqѤ%6g7&P*g g D@$%ޟTf;LF; hBJKMW5 'OuH⡜׆ӃpAzU5y\׵ tSW?ҵ_wvl?e:c|i (3ms!ƽRJά:H@)6K79 }IIA*hE"Y֊\8cC[)"sی淑K7SK:o&oU'ƍ\u?ӪdemluOH/Cu֨@鸘y~(T8cDƋ{΀?$T96p:G*Y(RHRIQI+R$)%)%)+ ] j#}GQǗ9yBH\$$.%&ǥG|./$hG.RH%H%շ5ZXShv=]I)I)I)I)I)#6=زl5t}r վ&t A74U` n%3̀}'tmI] SQ;$.h-Jg_M" :MѣwXk= D4};CsGE6AK% ?9N%A>e?xB|~oPE{(qRIct}΀07'6L509^T*aӝ 4;Ԟ2+[o[֥Ԑ~M*Sfv04JM~Ao |J4ycZ!ߕR17o0tn7N}mo3{G``8~MCwӭu6a36$(5Zb<; Kn;k-q~iSaؿh{Ix543*n4r5JoustNSV:CGwNROJFB*KWO| l{$AA ~lhOȅ)6,%ptP*u+-%h?\^?J 5oR!l8{C~d|%/iOoXԇH:@o.L%Mޥ0~9_f :LzHߒѰ"@|QS&vi3S~;wZ,I-I&w8Bm)*Ï}~ ke_]GҲ6nOhon6M-|~]9`}B_mphC Xo']OZIC}5rǖD!z&]$F F_'Pţ]fy}Gh@Ss`2<MR9pl`l<$ն\>݂{rukZL ˭Ԏd2\?ansk E-.o2*ݜ<^H!:k5vNXJrjS_ҝ< 9ߑr Lnt qMth?#KNn'cZ>Sb-E ԂtCx/&M)A}hȭsςj]ޕja>5Wfl[\=g0 IpsAF15TL8%c6`h_k3t.~N QI)H!I)tJ\$RRSs }j?61Ø4&k Ԡ4n@EѠD611=P^OL%4&DhѭڐJb5q%$ E )I)I)H)HyIJIJA)(?K,/ q߁@!yBRRK}N~mxwUve$$$$$/1{pl,0}{Tbɳ%#.#V4a]SiIݜN-&JCӝom$ Q7281NfuhNrT)./MkonjUi!>gF;iMvUoQ\yLQSh:FȢ&ҶOWvA4['hэ^!mv32jhi:5ߞ@ɩ!`?>:gNUzUN%+#M(3i0ZiBk&; "ELFs׎C*p)bܧ'~L*@mThM^f{@qn~9:4N0HH)`u RG017[>OfKKjlnhp` E(%?iN_+ѱ~if},i$i)*}nymmߤV\h4<†z"mhrTqǟt0 cUCΕ rƟP^Ы[#+C$$e~CDF B5 x~)囎?')KY\$ iHl7]pyۯd&u¶lXSh69)x'OJеdwqH־=E t5֞^vtlSOt@Ճ&Acvq+^_\HQfpAqk$IQY1=|1pmNfv8DzjhkPCҩk?H[[ ־dܒSQ8ƾ<|tхFr{PJ5/$IR9Ji\"֙O1,qg'x^ýQH;H/wHUwg.L9+Q w\ntqS;IBؿU+(msZɡys!OB)%)*RJR$/))Ho2x]S>~g`\1۵3枆T}М8ƃ $\M.lܿCZ6E-r?f~ZINR(]%)%)%)5JEJtIM~O?Jf˚ZShv=]I)I)I)I)I)X ]\{dx5t VEZcB|~i֤Ưw9 +LV SWm%çܜ`3y")M&ZR_oK@p2,w|t̊ Sԃn?u &fcCiiG8vBMe%:s p6 a- 1p|PRVb3;mw!v5/wdMfdenw u:ٮPvMRZ:xZǷyB,WTzWˡ㙟31ƪH߸ 4w9MڛfT3[| R e\7O-h>'BDNֶZ)fʇF-LMf6~T\L4O3ALMu;;5wp12ԅ╥S]}"*$ҰS{Y)Hmv|\N2S ShWAm3a)>@NK2UC%1U>tG.0B v[\B.w[e`o0@1`Z9Y mlݠ~ Eٍ`!5cB҆N~!:Ե&8CVjg_Nϯ;13'OOlR&0`KSTڧ~TodӖ n* X&ZGޜlol&Rm#yv2>?q\*t1?S^ %؜z`ۗ&6 lߺJbgYm~7eR29Mi?*brjrJJb*,"Os?zJ͙ 3l- k_.>_au ||ʔ쵳ne^&uWR:Iѣ3cXI-mivkgRwJ \I.'<<@۬ 0rcݤ '28 3l4#cCGBł)d99,GӪmwTީ,oUlpc9SH9k[5¶9GtDnae-NJ1BlZm ].;? Q\yߨc6Ԡ5Z]rښ4@˫mysoßʤKG+|O)K =Wn8)jǏr:.k[k!T#U#R-B_:M^pnw4sw$wQj'heb[SmMpyqSnǶw&鰱+cXdU[ Y@9k?=-<\jmrSII~(Fn{>i)IvGT&$Y9J)tJPI hw@ṓxh_1y>A%]9K"DRL<7eM$&KI+o/2i@G(B:9 $$RRRRRJ]%(%&ǻx=?i\W߻Z)%)$_?gݷguWfRJRJRJRJRJr~\q}Agi6-زlxf-hhB7IMm>'GrP5+r݄Kb*Rw0vFCd۵43:@{ Oh6`hDlj-1 \4 ?qխ>_|ѤK3OwM\&`>OA(Qoݣ6[ij])_f P#D۲ihqJgN{\ب A154;@:q/+B !520pu '1_ )֥I Ӎlikcpt6R!NawUmEͪmcH*Nes..0GQYnFCEb((EWj8ڈZ2d1$8tV瑯яrJITZr=zC%*6,GxV,1-LKRΦ% =(jVW*r Rv7a)ci[l'?A(5=L j|;yk6T<IUxn{h24$ñ06w<' {F[Q1YWwɟħ)_i>J4ORΟ M ].nʪ 9*к#qIHkZk\&;"$%ob ג%0eN#n-ϛ8AMkez8΃V|Hp.0D6CJ >ѣG?(1S||Ԛ=&8A|$U4{/%7--04y{j|ֿ!dhc)D=K-,ʙrM>܁*l? PLn|-(EM~T=ٴgwGjO<67%.O&28P>L}'?qN"̌?o%~C)Lrƻk~)Ixڒ;I!ͷO7iRS+1DlF[#DGBX痒@Ѝ'23ѥ]=EN\Z`FJl*q.`;Z8S)/?r,sLMV(tLvyi[d?A’ԉ6?jb,g-?rVgM.ƛ ?(KaW<(_S= Z$HUyit~zO4۞UXd8(w*Sbs@L*o׈&mF&ڛʢIcyAM,=Sf֍tD4CNh#'MMNS׸@CJ[ zm)I!]U'H 櫲e^v8,,@DQZm6?t%#s3auP`p1Kw\ԯdrOOa?M>IZֶMekHvK/5QM)c@1(cSvURs,I 3>^?8hyk C15 ;xsJj [.%r)Ei{AQQ@Ɍ6'{lR ܣK^p9kG]x|rpQS[|G'橓m)vAxݬwVa"-t7zXķMQZ*occmc~^׶*n!jRR T JRJRJ]$( Ȥ:4f;_3FJBٸ_JCmï9j8EJ"tILf%2d:5)nd7 gXԦUjv)Gkͮ!.TIJIJIJIJIJIJ )tJlkE/׃*SZ{~DLI{ͻo̤f6O.=زla֑$;#ݢ]4'ѥ:U+aARJm>p#ޛVQ%m xKN)CO{@n;tܵ% 9o6:[%yԟ~> =Ykn?.qR[mŠo jjdkTSLk&]٠Sbj{^#^v7BAMg,w;]~"[Y_|tSMϱ_ѴRR?9HM `k..p xQnSk}?h:{H@)ȫIIRڒ4I$~уM'? 6^7x5SIWY\^qv[Ya. MV02.><Ine`&Қ`{Ke{$\nӹ"y. G<7~A7:`)ĖFeDTbcuD|JpR 3*]+"*c '׻[\!$ ^@L|ѥ+kL KKBfN))=76 yqnJ#*n-u~EZZ _]bH?8I> C,SKL>=@%̪ɎBmƬ{`RH4>;)ֵ:;~j_ _ )`/>qVIsCb.$en6v?RR?G8rm}UT}m?ޕ lSq-l7 I?Ї?ښ+ǹ9,ah.vqD/s@?x k9wC2>*E2Ƿ~ ~ 0>ѯRvei> P!'Qh!;Z y 6+ưj,xdko~dF\cw$ ʬ$4 sǚhԩ'F1ۃfJ6ZN~Ƨi>f>T w/Y_QBNF'gZ|WͰ?zAjg4)di.KUQzi:]]; ){kXR-Ac[[; 6ux~W"LYXw脢9 %RQo{xH(['SLoKҖMǒ,P ȭb&-Đqѿ%K&{;*U$$$$$s_Nh7)œgvkZ ;ZVoGM}&&8"]7 i6qkZ^"{rjt ִzz7԰O;mNt Foe&QMbii[_=5(c[)6Sb)t<>OǿT$|k6oobM{uWu) 5n/5)Uu;!qܠPۛ?uZD-{goEMΎPa?{)BT\67]5E-|X\I[09ԵxHcGB_P78' 9)+fuT NeTew{x k;L~%ǹ0ZCÝAL÷6m B0w܍} ƌ*54RX=Wx*@w[.V݃))na Rj*p~a-h=&ڑ[IIH{"6}S1c"փ||RuAISg!K׷ю0 y%,\r q, xh*`JN?GR /pTٮ$8v[#r@68TܶOB*JܺaT^;;? %ƣ"Ɓ?th.9~4РE\IѲ AhdD03fWu$y5.'*Wnf))m% p<{JaSBxp/vt=KSȍ;ޫai!jhGq>cU" -0gzmP?95ILL1$e!G~&Ɨ˵PȮ ( n q\\/vFI 豵Ǩu~)Sc7ЧwiK^ͨY!Rc6S:}~IMHGOr?EY? 9ᧂcJ-Agڮ<'!Ue\۶[m󈭟i+XmqSdJ!kA?rcio3tR>W}!)aM8X`B2853sB4{ao&9Y؏S'CAM}f=? k'%MT\@vjuSƟ7U[f7QH5-RDRPΪgmrO /G=&xnHOѯPT!ݷ#앛ݾ[r L=JC |Ն581^\` Sء^;{B}gLG,bR)I)I)H)PR)E%6pRD >$\gM=wx&)6@8H*P(e>H()ݯމ)A1 xiU_qrSJ>]tIKJPIKRR)I%P~9F֩Kb >LxgI%_jƧU?f/_VL4Hh5Fp-[),txChNCP3~mۘwvU$$$$$3 y"ciڥǻM9v| P'm#O6%-دǍ?JVs1??-Ȭ6FYH Iq̑Ssu5*9uKfǟ%(3y.;e*N>WW{J5*X}/o-SMcr>K\N} Ule.s>'rֹ} ;R6~qX"w^<>N!k,;?C!̴֟ \7SMWeoʝ`lw4j _v+O JGfhinied:sB/ѺKZO@yt['IC2D=>@J++1?aӆZ\w09+RGWwPk|(ZTzm2'H` T]5`!䂜Z!hSԇ^SW:vZgq b!qV2*>o?$&; Gx(Zb2/.#ɱ┴ 9i v5l=[{Q~\Eo~b-idYHcC:uc7mx G* ktp(XY˾p!$,O>_R3kmm]MR*mWtn{v7Je:cdeG2};($<.&\I0ibs3tS Y\ָp\?,Ҕ)8mrDh#nO?ѣ:;C=t>r6u`9ǿȦZuy4pLw⍩v:~EH;V4II=!\Lkc%hZq^ u@A!mV#n D/l佸ďu@t sd:xG4hHъ?;_8bz06<ҖO5(3ȰaɿN cjVܛ%xg v󈩿mW7X <͚+SwZk} 7Z־H#u*Ac5WwGu630m F}5SC0K|/X~vp#: .]>:'|qqԂ?R:G CH 5Ucd1WxwW Q^r8Dl'8)z` :y F A AqN 8 u!inS_ݼH&|JP>?AMmxJIM=> ckoU$Y)hEdVa(* ^wkEN =:t~|TGRc}6)Ԅ%9 TJRKTTU))A%.Wu&7r-5TkSv>'zE NS1? Y?.Na5yֶu<&%k`}@-F RIKIRJRH]RH\jWkgO7.LzjP^VyqS웲D@Z/N?ܝh_<ѵ+t) bd-LC>)!~fLTrdz)%)%)%)%)%8\_-Njl]?{ ct7w-Z,3=8k4^ j||Mj34;)А>f+i?V}CfƐ>N5h~A\U-ERݍWO<~IZ+~V<⊑ݑomUDڲY =IH > F;JYͫH >'Ie&vfrk;cɎ[[P Wjfnv3]'N*ne xgKƏQՈI(ZӮn]FTǾ[7?0-y$RTѣ q(E՛g/9NeX#qoea}#tjS2̞4#[$ ~tmo܍!5=b[55o? +2$p;.brQu eXM{C %4T9dz3엒{jY},hF!E}'f`2ncБ?X CU 0utP̯ YGp@#pM+?,@c2A;~ /-Qqy ςhɼ:+n|NRǛ-2gXRSELc0?ޜ)s{6ԿKSJyp RߪYas;̨2h:Njî˪tK Bԭ{- (SCMq?0 1؆r> c^эJpCS&^>\g7PYyʽj>\|`MݏJK~eNQ5i,rg&ǚ52YAh^⪍ ?G+ԉ~9`)H) KE!踺'_UYlu,ML9u0 d&s+/t#kGq%[%<;3m%} wdddmw~ D$Bb)I)pRR!Z$$'xa0qlߏ왺pGu)] RJd|RR7joV ?*-5eˉNEѣeӔJPIK" P(-Iķ#40nMc5@)kF:>M!wU  ‹j$:rSCxA+ɵ8ϷRo'cTZHT^{vhK6{;*RRRRS|LmmSlvckdD'H n|7`|#d˵5H60DISHEL5 hߚ|حkI8Է̦ړ徺kӠ??"]e}}7F})7ؽ0K¦ﻲ JǴ6 )e?S?(FQ-٣{P%[{79Lc8iG/?'e6d045b;qдq)k+ tVwxF;/:4!lwJxsF֞8d<;>Fv$(iۿ(8L{pR&}>wlaE)>2[EMaj 0z6|t&i1>p k; <ԗ͍kgS L<b φ\?Ji*i=WBI!L_3-^^ C;4s)H}&FY4̽Ҙ;!xE,Li|Bo=Cm[ VZ-t7]qS(z,sU\+<Ǵm-G CtK*bZt3Ĕ5% cYDb:Z=IRݿ RPi_ԧR!A|r)FNJHzopU+o)f;ѳ W8miTR4$$8n 10kG(:"5M r鶺 pC*-o|Rl:&⚕UP@q۵ 1kLTWsNk=LwB=q!ˢa n׸@4!ûM*j}eF'O op#vJ}^ycRį_ X=L)Is`-":Kak_g߀QC]x.6נ >Ӵ/? %-6;g1)a5KEH1 .nHsmoWj3í3jd@gwjxryz g?g57jMQwg9M:Iiuu)h`]O‡goSF!W@`+Uiqq?zTu2'-wVϢ;ȋIrb\@E-^kU{)9AwM5G"=Zh|85Wr}C)gw?ɽD,%]cVEJd<1ISuQ RgJ B)I)pI IJI*IK<% Zfnv5T%r"4$xr! gv@0%)f?j1l[0 J,lF;'F))q Kf}vw~(qRILz;V?MԸϦPQU&Skyq{GDIKfhRS\9?܊JHVTSMHO|X= >C mPUTϬ0,ŻMVȴ$Ecsk#럸N13S)qĻrg}gt-'KVK` 붾ON'6ev@x Ie@%5u5k>3G=6.'̤(qnEL:~IL chy7)@:`9 `K\nJ<:- og0$bcmMKkg?Rc82Ikb,J1&<*W,vI ?RXS?FW4zwB:85ZTxnyY(MZ $*I|=%[e=={=u(<:-L{4RB 6DnRSv5Rmgq9]4\jt F8ȟ5K̝|)RJZt)JR$egEML=;Iq00W[Inqv ޢ\n U$P꿢͔,F54r}P ӟ+Sb` x@ɪkg7[Hۆp)MX?`,k{{V[{ B􋉱D{NS3QwQS[itt3v 鍭ۭq$(ڛ4b[{Hl5w JTT'F| %6OF}OH6܁Su>4{@~)LEVuAsxGe& Xλ_uߜ*m55c>gݏS` 1O.)|CKΟ?"!M\][ )78n? RtjA2sC% lbG{p3䚦mmtvYΥ1̫/`ޒNpu9-?:IԩF_C̞|`cO$&LcȃKn]d8MS,+?ܒYSZa%LiHYM KD=\8h#`я*W8ֿls!]|U >X2 ?&+nĺ]?t"H6:w}8H)U_Dn>.*JS.uLR1Tɤ䒓6ǎ\@Ż0*M5.-GSlh2hvr(oD̷%$Ā+f4߉)%N^c꒛ \{|ich>%έ2A™LR!\$J*RJP))KhT~)u=OIcHh^E/7ߴg5@ar!%.;DL;s 6{t!Bn ?ZZm=p`4ˀYͮZR'w99Iio<(k `Z|jXV4m s1/֟\};,!=\RC]4͆դ G;Q<~ ە+ ~߰bCrWq:r!iʺ4fOz1c N< FXԌ+$?4+16Ύv5.δ7S;K@/k@x5}/8jXʦ\[$pv*mtf<>5>g0ԾNKKݣ?jpQi-PIK$$$A$$(jxx$V)ֶu=ZZ\RڊhJJ^KΉ)dc~ \y_lpk0}߾)&=°X?T%BKJIº67ɣqM,ܜJ4ee%M_hvSUmRMLRe0JRwHQ/r%JW}.{S{$P%%(8 )EILQ*RRR)hAK%I"?˻n; U$$$$${6I |Y6x*k҆2v~.?-"H7⚦ܫe/:19L]`~w06w~{ot=*=kIKUv{Lmkk|sh>e1Hmu5~ Zft5ucO0쮽ƼɃ 9H2EMV|RMwz4h~!=L F 6IinbNow9:ݭf`qSJxH)~% @kFxu?$Rz,L1=Q/=m &?:G.zp*CcM㎿{_ED9s2GSRZ? Ŏ6p>CD}K5?2.cM{+=@7pHkwhPHhh$ǀ9MeTA{ SRƛ %É| s\䊕 F I%% -E#Mqk]dP!N\Ѻ "#ā.G!ƴ?SC~H"5q?&Qy n]}`r6@A$Tɡ  ({某1--B YS?L7v5ILLa;?%5$Tk6\\m9=&B~53nN` 5c19ѣhFjd)e?Ħw7S>QNk2)I~pv.v;]'j`hJ<~ޕSMS Sӛ h€5L\}{V6 r{'ӂfk@ú?>SS>=0V:.] Iᢙ}%7W >zKjo )~MtAm &2$4|ʌj!?I"uHsX6:~wLև_#$fK&$856=I#^y'USN k67hM)`g.nF Ss{`WƢf V%hW8lF槄X\ceb;xC,zcXIBFʲ67W7缽cX%A%. )s!IIp0Ks FyL-KFD=LJ ^KJlcb)FjxYe.Ɲ( #k$Go$mmvBS?C<7.:)jڔxQh-ͻ ~ZxF3Ĥx}ڗ' K~J \)c|S?*VĔ4$%1$$RRRBBVﳀ:c0Ji;q Si[vԫz流#s*YwmcP2%)%)%)%)%9?Z$yMv,>knU^.3v0m >>.fri'wAHEuU1i϶t2ns忤#G$MTOS{\ߘ֍ HY[:~TT0qLRUox4smiUgQ<'Wa1QIL죰3q@Bׅ]$:CӻrJݔh'Mӌ|O<;!38gkZ'9,uk{0✦d-)Z1+@O{jxM{I+cۏ)l헻T/.tj8>–n0@pd9ג6ho*JS pAs06oH7}ɤ5[i%&*c, ejA<Ʈ?n}Ҥ<2|JrVJT6G xStlgQS\Wm%pgqH ϑ:rE!6<õ'ڟȕ%v>up.vԣEkY^E$u֛ApEXI'c~;1Z7x4hA,]]U:->7<T#zf:WY%JZ+r@So*"^eDz̘ ˬ.HEvAo3'9T` OS& 2ݰ蒛`j?W\VE|)UCYB'tLS]w}JS;ݒ sncR)n8{ eF5w zU&tSJٕUGml >?H)oag0`A:9O1M .l"c]> )-t⤌ <8mgXSH{[sL7vrhCX[TU=؉H);yR%io!9J ncov/Hjjf]4b*ժKEHYT,t0%mǾvO-~\BBp_T1e[YPS)kt$?v@)!ʽ8?xOۖkI6԰e RSݠvgykZN5YŽ҈7-3܇ 5S#6PՎ#JcP)^?#R|*}͈?ܚT$5s.pSg*KJV.ag ))qV$΍[HPU:H3&̯9'NʕИ{ތ.ۇ-@ ip vw v~cEI?6$C>M)!k})w@hF;=T5+5<}GTҦl-}4K[~~.qq@Ӑ!Ƌ]~d?h>Awȡm}ec]1L-3/%SKy>]ʸ1&vx7gUbøZRr\^'!鸇.wvjd-f8# bji6,E[x.?TuG515Mu8ӼPڙ%Hý$Q JW"qw:vEKJQpRILN)BBJ^QR*_TkKM&f+u7rf$Oʇip)??SgƍkQCf]r$ID)ReRsSoiII=ATdzeRJRJRJRJRJr>TۺutѼ6|Y6|U6y+MP #|撐_aqJ A3Ï=,i{cq!U˒7O5ZqOTWOXỏNHxi}{5Ñ[)Zg1(Kr/*JaR1b̻82̘I=:'`HҜu >JK4kPuv5Ķ S r*Cd}G)i!v'X)κ{[ SpdpGD)龦G̝ϗ 6h }|JA[CMDWhΥ87VA MwL5b WS{^@.':mFiif6թʹ_C88nm*V wO)C} 6GHJ*UxNɱ!;P!FѦʫE%ʹ:~UTcj]FW9e&WܖO5*qcnz*Z$twD Yy.Ä)*sC9pMʕ)mʂ MׇKªn Z)-JHHܛÏލ)ϴw*R806eِd&A@O )8q(hR'h'?ޜ_en5ՃRdWnԖvPi6>!܂Viw-C1$~PqX EN@d+PNUm'wrd~Mm\BN>ς] WEM0Y i<$k9!T;ğɛYkC{O)!le_} |!9?mw[@)[痟-,@e-!kώyzxLnjE P)+ G<%XdѤr%H,-ߙ-geLi~o=HAJ:aXr( G_ȯIWQq ` k)좦 4J3q"drjngd.Oګ\:8pi[&70msd7P9[I( ̻NRzlny|%OOZ?8w(X6#t poAO̫,h Ȁx˱x"^Ez7^[F\IJbVIK RRRlG :Z$ 2mu6_kǨ1 AsW:ClcXs~Ycdߧ =h5leHo|R#ioV|xjevg٘ĉdJ>KXd hj㻼}ti{C{4lvƙ?4TYsHkE5qTU?v# ;?&˝<8kt Ԧ{GS›"${@)6uT1'k@2{7 mg/?܊7.]hd٩m)%T>w5i.:TB(p#Zx>ֈ>߷p"[&Қ́tIp>n7+ƪ% L6i`?Hj?qXn '])L;WIӒL'p.96JkbA I({kŒK$SNO-!ΉJGwSY?8rg-Y.;KJSiARH:U(O ˲gdmy3?LFO>)fTkϬђC?"tTF-lMuS֣]D F NTŌ7ZW=1sܯ; S-5au7gv kKM-~ߘv8r܊7w< ).,'M*^?p ݬ_* '<'䂛>aqiѮC *k#''(^d=r6vpOJO 1<&f[|?/,wJd;MH(ͥq`pN(;_GLv&'|Ce`g 00{04TPj0?^EL${NoUUO/{Y1٥}5j&)oqNCayvK> 4>FPeVS><\?85+^ߘ`Z+agyg~4H eg~ PX^OOYȥScYGU0FP5 ktE6Ce6k~mZt>Ln~k? 37Xd6K#OB=R:9֏Zɇ8o~ga !<͙4 L4? }5h #A-P:.!'; 8~Nww(Yt.j`~Mj ,@9;qлF|ո瓰y-1 Iu[Y0.?ruth'(dPJR)^RRm)·#贔80T&~M6Cc7qqAS )hIJ $JRR P2!p ILK+]I;?3M+G ԍk!&y$R 4FQL?Sm)[] RVu%})g%R4T(I)t?Slv=]I)I)I)I)I)׻۳C>/&ϟS[+qgi$VA3xhsoi(ZfSq-od7Kf{')Ka'oǻSs?1v`SgvkO*l<<0 wST4cw4/68Jnc t~lx!MgY|xD*ztStw NR7GwT)I08!Tٔ@kc]g;#aR<ٸl񦿺ވR;'u׶~OSs<6ٕ|)M5 :\֞!5iip*mSxc\dƤ>鶹K].d5[?4 :gpvH)ԥı@=)ZgYmKzUJұ%j`C8|'Z;[c5 5ǚU6C#og$ӔD^v4.rz* 'OַRĵ='袐\Cx&AH ?uԂPz4=O<)]|Xz[ '<w.ڪvJV6;J2kV*Xl6X5cΟ>6чQp^:8LyD95-*[Z}=i)?JG,A3h5: W3h<<#%g R zBTAKJH_S7{kd ;X-CG^*t(G( c3"wb-u:{j%y:pS&\uSMR;pELs]}wɺ5/RnʞTh'KR;9>K{]isV9q:~A>_gOWk^FC*B{#d"7,PN"X2sd{%-\%~JF!brI'JnVCt)KOh(*54\)D&YzV$Jא33T;k{!w@7e<+\w ?%u+q~siMA{Z&s&ꭕ1zMs~k>fmH J}Өm{x`\*w{NS]=  )MiyMjs#hVZ}qh(]Q@yTM{<җǨ$Kqŵ0:u]GL-'۽y :1ܒW)g\ھIo2? ctx4Xk)ԂX$4ZAi.gHt<~B?Huuok˶1 i&>:y+%WYf~ǞP c_K{5$7T#wL$vVN->E+Rm5:8JԳq!;l4A=ۻJr:˨@"vc>ҝS9>:(N\Wny@N S6Z4+1v&Ng!e^p'%18>䔉ӬJ*avߜP8{߱t9cݽR/1 ]a _әRZ6U٭VT?6joBRdZt1BV( #G%µ7Mo;>B6b}q$qL&k6~Da>?*J[kv8gJ&! Rv!TŌ<HԵQOux1UڛC9ǓSBTe >\~)ehc<7ߟ)V-Cau>?j}YRןaZ}G?4$=EL?x-gYw 5*H掕~2]$uK[ !ϵ?\) B?ָk;Ml_`ƨ.s]?˵;Mhn:LxJPni2 `>ѶY-$X?I%<&;iZΝ&{<85^Ex z_X+n\K\a >*hr;1l) >~ڇLOM˾ILM6Ҝ69i܂wV{DVϖz@.iݑe~ic)a=Bl|Ch$wM%40\N|bZ )C&n0{ˏsRR(3Y\aFM@דmuS n 9j2QR X"ǻD.OP)K^3jfϓArNqzY*0~@>!Yw$Ѥ#QS +1^ƞ%S#EljT-DOD>*B'ƪUf.u1,.w{utSONtR4aXy:Ҍrug$VUckI<| $=gSR׀DeJ^YDѣ媜is%4rI-:mjk=/$(NS:o̟@`GbvCZOfz$pbE wMMJvV#y@r7̎>% ;Oܨ5.57S‹,sP UR:f#|3  8lDlVuRk ŔM߀ S7J"#jCYu 3I H{z?$.kdyp/R>`ē:*BV׻y;7հC-QKD_4d2*gmk1 E'hZ{!tSӭ[D:~uAvW5ĨXRZ)1VnCtU"_fG$8Z%a=m#qO<|tB+gyLa;T CrN*o|&/i&Dˏ*T3-ۤST67*mMi0\WXl>p<.=S6bѤ0~)˛W/k|7D,YvT̴hnUN.rHw gv8 z3]RS>Xu%:hI)tTIJIJIJIK$$$I l'_Ѿ*"WUepv=*RRRRSgNK?>/&ϟpc'4ZEλsXXOj?*j89GϺ)t) dŽ& 8!vV $BrC6΁ Hy]]%0sK>z B[@w̢W)eh O;wqv?I i;uk8Q)Y^.y٩O!7<%rJih{ϖN Ave& `uIL̴uo)wL~k+k=ŒS:paqеZ]}DV 1vJNS~J}%]n8s|jZ?zz6WCLHAHisF}r^־Y!ᴟAId | K*1SD+hɍ[im!cc˄Bq ac3(w)+~װ_9S{?9k {@>RnC,wi#(ETZ9 ۩<|*60Uyh$F:̋^XdƎ-Lɵ$OiHҭ.zCS/[$5o΃It[W0ďVS:Cf`Cࡷ:k {Q蘶(ewd@G4즏V2^GN~)EZoR-a:(5:#RSf7鏤$5Ru~1vx*E#v;b>c6?d%icb;!+Jރ)Zk?tJʊlxAM_dqKo?]*"TP{Hƀ~e y,iG!zc{'*vqpqUS]-cSԟ`&h=ˀZY2?۴r*l8rcv7x^q.Jِqq\`|N}K]6S;2r?B?r Cnےuc>%-jT/?JŷS3aw`Gu6q#a]R>_6O;=w:k::t@{/EzYRl\ \L7`7jt~sk:&Td5-vY짩[$\S9 ǀ#Vly1y?q:AN8WrY]s|ZK0,~%LoG^9Lh=243\I:|(-(Z FБﳀIf\S?Vp 蕡^~4.%ڙF^@o%*K~G7W) +em<7Bj֩@ 暥nTʏJHFg$JzIJA IJIJIK$$$%)%.*\10ƯoWiNctsފo/eݷgu@ʤ}iiOl>6-زlcR"?j߽i4$҇Ѡj)%Wdd9 `yHvƍkOTt;qNS?]c$:n;I~}L ُҐmi%9f?'D:X 3rh47r[G1|\urXƿ>IM,XѹIk\4*ƑKJEy'RY5 M%M6xU`1 S3CcֳMdNeֶs۔L-sw;QC+ ?Z)%v%5*;Rm|R{e ۴ƾ_hSD u??>mZ7=#܂w1$5I.FNS:58Rۯ:Ѽ9k@;U6DE3.lyXm-|+q-3X*4XK_4i]m;(wzq?HvӺ*Slgb~))#K~wAB ~ *C]2́*&-~)EEMΘ4jRaycf tWK@ ;A}ێPhݖ㹏OOΏl4iBV㴂ЈO S AFԊZ}%jE]tZ?Ԡ_x$| ֥piI pR5ë&1#JX GLunP٩W sw~TmMPu:0h3͙"tK.ᱬuF(i@.%7;A_0)S}h,%rx 2R.{Y؟,I,`0wi`D)#kbYY;6/vEuSw򠵞YnS:7.j\N68o.?H5ZK^+9&5\2ϢѰy5HQT-cl5{o&v~m-ѭ,:ڙ܈R[,n{ !E~tT<m@8s  XRR Z`m5`Oh$+ND{u30UyEv^k-H#%0{5j̻!#.%\eJĸ86ti ܼ{X6T?+j07}*`V,qH[AEy!,T2JV)pmB~I><;kt1/?WYw6 b>ejC)ۣyIJkCD)*X]?$9'Oi)膉[?9ʜnsYT':$VEL,5K;6t<<"hS&JVi+Jjmڕ>@Jb R@ ]%))($RRRRRJ)I)I)xIJIJIK$BHT>i+m:ڰ֍Ĵl;ş3)!jÃ*ncUT_6z]2H)|Y6|vx?VSE_OV Z|J^h 'JaS&pi N> ! 62ONSeh;5Mە9q\Jtq]Ugre= hp֍4j A?HC@ѠQBJlhkKgq~kP9y95ެ_B[4mʬt{G`pR\JoSн&¶+|JI0ǯqR}ZE%-h;$K .v5x:THSw3Zkx<Tįֱ@Y RGtrHsww qƟzDYW8iQ jzucD_FkDpaF)}3 LX۟TSk<iBrWc EL:>HOMw|?Z6ρ/*@?En`3)\ك/+ԬNCH+j *Sl}T@R(F͗=8)R#S?R=Gή vnS.KX4ACW[0l7Iyy'>Vڰxv!䠞{k7Ң$ɧuvS8c?RC2we"@*C115k[ ={J=<R1x72޷hJf2j깎IeLj{%09ӫ4]~%"c$AauԑT pS)G!sOq )>O67x|ڔK $OmP)Mt\wLR;]|x 4sRzmʵЯ%;\/q59ɩߵ D73j׊uq}T%!'D"y`)YQΎlw(M 'tG^tsv*=2F\]&?#I| K^_o?))5I|O.Ge{@-ZkcmO_@-lNjj|K(Ɛ܈Ssb4#atSdag% ]OV"9D95^'⥦+j67KޜTu7X|<.{D4@}! yg➦ I mgJВr8FhS 98? <{)^ }9)Q~k~ >גIe`}/?P+YefUs[&k\?N֣̟wmdwyoA,W_.*JX䵼6RCdh E)J(RJPAK$$$$$RRR򒔒IJIJi4>c\H^(>M|[u>)!쾧 ,1(T_:u :>/&ϚhV;W:{CJ)n{m& ELs;> sɸA>p4>X`>CJjgfKgh u)u )?F6)Trl 並:yEn-詿o)ibYkq:< 6VOO`[OoT7R%%Jq2.sH"s}?R KOR#INP`;s?y 2Ww\+:WEԷWE;]0R\7HsA?B~c})%9rl_y--uYpx.>~&Y:\xxD)MUkIvbg(Yc tKe!yp7*ct.d;Y_soꤎlqL~E\W]hH꧕l?Nmd?}# FEOknw~%PGun3Y?yG^\aNz[?KުK&t HjVHh!vXpHE k8!8~- )B%:T%DT3`tI"M8wS1cO)~Y:k#LQ˫] 7;B)+2 {GR,`oqi.Oȣ);ENgɥ8Gnq2mO>*ai > QsM|I.0yK?LN-` ﶦ?8#}$9:fߥaH2­d" k-<ԂӃӴ$5SYis?$ᦩe* g ?EAWTC4k}~nasMzp>Ce-Em }z@.'O8LXO~T C&>ɿXq ,s@c >_JcvScY$ljэB64T >`L9xz^m]>;eE09yXgaqlw΍||FM:ַ}#!LM=Qᩕne p zl(Ҋ))cJf5jF nvܦhi.;. }vZ7'(sY>˿ _iK/ 1'ʳxP!_Q Inւ?xOޤZc+.bVn>%|@U*R)PR\"$ %)%)%)%).R)I)I)I)tH]$$%($R)S))T䅦ګnr|9?gVFN@8o`҈N%bvc ~6ҵ9$ g,۷1IJIJIJIJIN/2Obɳݢ;RgN}~ YN#@'LiSC.Re/6n))n{6c|x ķavd-NFK8'TD^ SwSZqn~OJhݣ(6.H~zv| CA` *;ͽx*_)qJj5vқ"@ӹ:%6>ONS&Ac[[i̡JGN㸉s DT*V 80)0ǁTbH)NRܤ.5!}餩m~Ӽ5(iݵ]ƾZ&)ϫ\I`EHu . քFJ)ot,Q[|Sft\װqasK}Sٶ0cG氻PPv7Sv5lTc"tjr$$$ *{357aI&0}d[(oܤKxRgĦUV;{@7S˕ij)yAJIKZCGr?9KD%OK.RRВ5gJe?|TL[;Oţi,ď v9 *gkDd?djӟZ5~EYHL|\! R+vaɺ cNDvTYaMo"W2{!|'O?4y9R$caL;%۪E%#){~=:%J; nh-o)Lِt#j :f 0ku)HڪcSK ~TP2m%A.wrT\[/{7i! 1*UgcM:{JJCS}.d?4 &'BXV]{ 46fKd$L?G%O`$Ԟrd A.>.Vx* ) 춗imcoĦ oS Ȃ4%+RF8Bl:|'(ڙ_+.w̡Rַ$ݥ16vu+.$kg@<5yOZtH?)9ȓw~DR"걇[w|M{2mpN>\I(Җ!*RRRR%.TR)I)I)I!tTJR RJRJRJRJ]%)$%)%/))CT6Sg ֙2arii=,Yp?U^I&IMK ^f5MWxA(a$1NZi)%~ ?6{;2RRRRSJ9jlAˌωZ/CpIqlA" s(#_:*UA/?T KGC T7Rѫn> jӮZ1Q)9 h0xIL\Yl4`MMǯkxOðHerٵ;7OʂU1A#-gHZ slstPw:ìe"_1\C`Ata`5R 7<9(8oH0  xZQ' Ay-r(X=0\|&ړhmCj:R-_cGN,vYG: U%2cni8Ϋav{5'-YJFS%ԓ7Io\z5{J-WF;vAH R RJRJRJRJ\$BRJR ]%)%)%(*RJ^PRRRRRR%I)S )v` (JoӊʆƝePߝ 㫾(rԬǑĦW6CQR$iJI v\]BT}pq?P˻sҮʤ}l7_OMbɳbTOqwN,;:QթmdȒJJ5kQ pX 88.=5 ]@\v0:S- ~mX+6sNVVsL& '& >] .`SʙKM0wA̔X5sIgOX4gSS,!$sLĴ#IikѦ~<椥5ݛc#.2GȑR.3Awnc#`p2,$#STִX^ ⍩mc@LETo_O{BJGcָ)6..=:Ɲ;˷bug<SI$pĦ'e!ՒIѱxxC.\lF?CMXODiتв, AU5JLKXG8}k#ok -ˏ }\HeǴ&JB+r J1vs')v 'BmiG~IQO_ !PPR=:%%![wST<^yj5(RJ]%)%)%)%)%($I)I)I)I)H)tBI)A.IJgY-slkCtJ럐q:aYu$L1aN0ILȩy Kdn̳LIMX&*q izߪudKQ˻o⁕I)I)I)I)I)'{Tf,<e.4NƹH+D\=:ʶp_Ȋu -{jc w: AJ=?EqZ۷ SD q|$R}lO+4cL9;70*"T6m΍'A0hdف`ѿLS VP"tOMO|>` Lw)3Zd7W6l~TмEڏ/ u(Zgsjv+c3Fw {:%641yk?IMٚL0C hP s۰=OSMV8{|]ܟJ\u RaLiBTk2 m@6k-ttҝT~=4?⚥7!ۈINۤx9;f5LH#NUyk{Ci YZJIgކCȕeiv~fcP:.a!޾m_E4ɢйIK$RT l;&E $$$JRCoW?6[)'(AyL o#rS 3ˋ꧘h|dK5R!HnwTFzjS'F6 Bk0.[6kxo.PSԲ=&0G.5FuKiѣcN! m9wǀ gEx99>]RVzxLu-~f=}Z!3?B^πii-HHh|h?IG')ɀ_͝HchO?x YbjnJsؑK>Z9M E@s@.C 2ۛ[Ƽ(zVTHs5UzpɪK2}hSг!Kkho'T,kYc>y ")d1Hs(T_?JԱIK;&LjOȂ򒛕T[D JYV__?Iɴ X4n𜅜&4tv8M{SIb~:SΩT$RRRRRR$$ RRRIPI $JRJRJRJR*P KwM%+ݚ+ҳ'#ZDNb.%jd ~(R SlsHP.yǀt0^u U!-ch[H8ԧ ?6{;*RRRRS>`tqœg6jmקON6\%Jie_~%)sY>.Z;d#ӭ*5'g9 MVC9Sx뎒P k[d)Σ-r{ RȻ,<;~#5NMu~?}) LN#B*IMx&_C@rsF?'MLHkևZލ>˝s#*;ڂ1hkd~({ȬLAqdSZZs1|Q!NQb4Zi}GG?>Ib+m#<@=(kcwd{kܣt6'h.=LKU^qpn<4׋X<fe{w;||A@n"xlS;8VV.@}f(Y,Il)kI>iYJR5I`I' ]:2SI CDŽTN5M٫ݫɗike^GJkO',S ]$%.TR)I)I)I)tP$$"umr{&oW[1Y<8Txy]Tջ,6).1RZ$?a66ZyILa9K(]-)_ Ji9ͯ@׽R $(a/NZu~GIOmFf<| 1IJIJIJIJINo'5Vn=AKv,>x̀v1Z-wZ{;#Tí ˽Fr:?rLj<:>nt6|&1zNFX8MهF(כ"]uSduVrT71 'SNc> 'qELII,.0%:'@6^7 ?hjm\ѳaEjc"; }y,vAt yҚy9C}kFѸxBVqc?'msgC|?  :Xͮkk bMVMSm йccS7X6StA I>6ӭ5ΝIkO|BzǷ^ǻ~+o4Pe)ne%KZNapm}k~o;~uZmQ}gmc~M Z\s>eHA)DԔJRJX {_ٺk?$3^vi~V0͐{+c l6LyK:C?8iOC%|sK<찞N%%?GmA-!bFp;Y+},o)Vd}%v5nT>b%1o[S敡4 4ȉ%iB0O{1-F;KѶ#ĥadpKL -QR^ϤJzڭ'B'US.cO2*,v⥨8˒Sh7^O S5 kS1upS;\ki₏q'`kSJݥ1L+MזWe> c|IW Tߧq&Rg1if3@ں5DjTJAm ?(PsCkhNBwfr`>?"0jBГR]6x$4e6>wxIMljH O8)5w[CA=M(i^OS$#j MMv  9lxhM~\v?$T=OjLrUI3 ^4u#Wc̨y$ah[]:ntU8]ͽA:O`4$tCUvqh!*u)i>Td+20SY7K ݵ^O4~]FIQR|ldKX08cwQ\OS0|=1~mM*H:cϔ-I^Þܣj}a}܍)ae6k2NR|Jmz?i4O7 IDL8y1iw$C u#c6{B ll$*nWvI$lm96&:9Wmh5}y>Ic}0Ap EMtc4kSRCCZ5o~ucI9@"m ǏtmM`q8yvNJZ9{>kUyRֹgs~D}|#%kY0J)v`=m L*;ky (tI+8H⚵1*uf|Ԓ@qY|6S4R)Z=KxnpuL>LyhO)J _撔 J[SJlaBtgµ{Qvjr#Jfs2cC"Bk_NS)Mq)6[?ޅ)>ˏR vxʀZlyզhK,G'˶Zd4<甊 @hĹd 0eJT֒Df>z hR_0~z: N{׏2.-oh~W\ffd mmuGZciHG&X8[hn'ȫ:1ICҶx֡=EJEJAI)1ƩQTϢK_#0[OoJ7N'Kn6S$W1eհ{xk|` ]I'THNRJ]%,))I)t))tIJIJIJI "L a$)F0fHJa~hW0t/?IKU.0햶mj|;-(u)H3<Plc:c?xrc8ck|ω<c:j8$o֙%-JR*{пͻs̤}h$`YjœgK <}ڭVY Fӹu,t}R{FЉ@1h_nys)*B4k`ywҐ:Y|D#I gALZ^v tk+VᲩ64{Bԭ?g! R ^Y)ٖh >!|?iLFF|?JDn2I?U*!XxnT2K} eNg^WUZ}|J|J["1β$0ƊD4s1NSb_KA3ܗjT|bw<`Ǚ(:8Y;`hom?m-.m+G}{,6u#ր?4Қdq?"61DM= u5V_* +H{yal`%λf8;qPhOs*P8Z XirG+?؈S{.q@Tr\Ƭ7s-Ia\p .O -Ө{hl{ݐqzu[ԵM~>pi/O_qY5jGSjVmS1OJs{ԓ'dcha{o?zaN{,P6s?svʷzFc|D:|P_N&~iw[S,%h#zr^ r4sβ|8Ors,kl2᪐ H%4v1OԻ+6;h"4zTi^hpJNxEiYΝ/[~ gsi[D5֛<R RJRHX$R)I)I)I)I)I)xIRJRHRJPAK$$HR*Q%$|0M7 [vGw7\Ի%ٽpSlt!&\Ou" $ A')zivKJ+W~(\}u|8Z-'*ҶP9MZ/F"ho/ೳndz)%)%)%)%)%9?Zz}ml[dZ9tk AY6ط~iH)cLLnw~i_-ϲA0?(NS X TTΞ]Ժ=1; kE*l01 XlYg)3Ʈil?3 IE-\j];Q5eu'_ܜ"Ja ԅ"u:Z^[KsZןq._5-7{wp '9xbMԘwORs'(Pw]!H>ߦTtI]:@TК2D%ڟ}6MU`x o2[c,'f]cDP )U]6 !J˹$}t\iNqQwLĵvEHn`&ly?O=Na,&L-ޢ ? 8,,,}5 As5rKwVBظk\; JFYʮ \RGt`oܬ9Kn05>I h}*oa`زCCDqd9V+I^|LSZ vRO$f\v.Ba#tV.{I3 w-;qk@pꖎF3qퟸbV=qlq"_~ sȫ {D=k+lnξܒPx*obcC[˃Db]A}A"?LcBt.ǒx< эoF's<y^̆T$% |R}f+@dϺ ܖ˓U[QO_iM: Rt7*鵲b_-bJaKKq#πNR,럫jObJFDS<nAS) ̳-˓_0 [K 2%? nbѻiom@4X¶}'OAt>z 7kep g;a>.>H$%ֺN#F7 3Zdʩ-_N~5Ֆn v-Vĭ > Sg{$֐\ɔqSSj*fw>5)n~~Jjk~ODh8E ,3&>IH /dy2Ժq#)\$$%)%)%,IJIJIK$$$JJ\$RRR ]%)%)%).Oτ--1ڒے{5ڵ"M?z}R2OY|J3%2 TUK)!GO;7v3ϒJYY P)Z ۯĠ}RIK"R%+_Slv=]I)I)I)I)I)h?jœgp :jWrpxx4j׺Y:GoA%/fրta$JG @(a6m{߹H~mM~ZWM:\2| T̻(MǏ! W\K?Jjx>)(sm q%?4{[Br qM6Xw~:hI7saOy &없Vm$N>(IOAuL!L3:cǀ>)9=Z^v֍4>/DŧS0Q(i61y&ԁtŠxB< ~)Lr8oGS0`%KP$TY{sO,켦LD)I[I~Bֻ+ KC\1Kw0;i ܙk&dCe 6TiAu$wqiM fT nqphC^{.8)9}y)F} ?H;9 q vngM wPxYY-a8-g}%mc1IxmL\=LѠV8pEͯ՝sST:Ɠs_GiMe{?е2nan@}FǗf_o<vrrůG ΟBk%Kx%jiz4%oLe/tV@p.?ܒyQHJ gC= !ckxgI M() \~#_k뙇+/<(\I"I$Feeh{(~Km7" rw4O$~&J F:x.$yQ ŠKCɢs, !K骐Oci cɩ).{pi_hB{F;;n0&.:HjR>^5|'K +f^.GV֍X<ޛjcmbw.?$UZh4uʁ<~CRWNHq9wO?/(R 䂑aiI<'SCo}9x|7~uqO=%A-xV̲]:>ZY,)0M$ISҬJA2P57p=MLV +ߢ8)%-L@1/wo pjiWԵ( :b?1[ smRڙyƫ,hR(I)@RKY$$RRRR)I)I)I)I)A%2IJIJIK JJRJRJgU&4< JT+ly?m݌QEUNJlm߿t /So[@)6-F'i-`hرiuru!ZA>I-J>x R]q~]SRRR)I)I)B ;6{;2RRRRSg[jY6|󬴚KbG0s2Z s*BVg\d;C:!ľõ s(Z٣h5slx-̆%<)c{7D''a,h"u ~TTIu%\)Ac6i~HL%MbS\8K|74MMq ?7,K;yo1O$&z8WǾZZ;)߬MV7D)Sd6YvꚔک)o?ϟ)HPmS{@9I=~TĢfn.h4&)`ƻ95eXZAf99彆 ce4! S/5GB^3DnJ gaH1g. uQ*ogX@C>}u2IQƞ @)eOHochcֿp."zOg?=܊\,|~P[ JFf J 2 >Jױ$eJg&\fA>"C,sߩ⣙HgYp4@젃2C8ƩQj.kA'ğx".#C(I('o!%34>ݧ04()mlA'\[K^D#i7dhNQ kX ?T 􇇛RR(߮YG_$8~IIKZӮ:`>CL?؊9[C a0IkZ?8:"9pv|tW鵾=A$s2[~C̗@ e[A7I삗̱F~ )UM;ȝ))DZI{5we,zPӣAs|TʸrV0\?64k[+Q nۛGШkM:$'xyB Ýs>;O"n>~ mpro) !ޜxO y)Kp|#)%3>=1b]涆C]cݚ[<ݍZ$y +VbFi'S)NjwL?wHښ̀;??xBÄXxc9M7{XBɣTmnO"#*RJQIK$I)I!yIJI+JJB)I)I)I)I)I)pIJIJ>^4A|G%46=Oj☦{HEzIK[y~p$[IEK抔e&ܯ@uh*+dUc%*CQ~IH$KI uCD%"IJNRR%).R)I)I)B ;6{;2RRRRS'ŻM4v?v<΍fx-cݵpl9zVz!ߣY?>R!l:_6@]ǚ G]Ȏ?8)1Ĺc'+SS$4 wXS띴KDmMÀ}n{Y )C*qi)s^OQjq!tӼQLr3vI!<$lt]NR*7' /;JTǬnׄ-O%r>ْ}TשŎ%N6-%фÏ(SjWI>wCYsGI sWuzVֲ<>.Դ2!%7=FPkڿv&){`f]ELU !$'Ah)R_lfM7D}GD WMqAR?t)Jbc;Q5t? AUCHywʶR:+&Y?7Kl} %vZ?>:)쪰 K'ȱ:S`S!}RyhCr_*== DT:|V=ԍSX1m@vӯ)A.KrOp6C*JJ7CF!F{}M|yOPpl\w ĝb9Bʝ{C?QՈcۿɘ2#.@@"Tߝ{?3*RL|Q[Ѩ>5,Ct0tC|)r $?;T^@ݤ qj{{tEId'GVH# e%'.cvis/T%x0kD!jHix)vjsAI\ sx ~<)Pf?Z]$'?FP;q) Xd"̦w!^>$v8#d)V  n]?ҕ[-?ސR o2O:4|H%d} ʓ5? ٫h R,}^J@ڗ FS Fl3%4(;3$~_O W'k~|RRX}!˒BO ;hSGTi=|B m\OW/y[dTy#j%ĭZݺgú@(tp|* {*^O*xntf{xSda쏰 ?N)$;?%jHm6XI¤yOu?Rd>A⤥*{X$Kc} qqGZ65JE1rNRAKI $$J$$$)%. )t$lu$hnQHi-Owy%]n9j`}ZmIJ.$%ٔtrOຜwiLv+/6NRS?%$x$NyyJY%)))%)%).R)I)I)B ;6{;2RRRRSQmsڦ1dGu+mlTݭ4Zk=}җP 恨E o )eO??jN `ݮ(f5GxiRmi||SR: C~nj*cZq|wJFʿ`ʳR']Nܒ5VߤK9M%}.e)̂%<)lzNE`%OePvV*F옩R @Sj鼼V?VXJX'$EpP! zKKKghxx#ѩ\ôT2ÞIy>S>at@SF:Ϣ'':6Kc6tםdq*l]]64mA?*j=K5xp.i^pB:opWe߂-t:{}N߇G%Uau@ R1#TYa&\8 r F f]Ґ&(q?J:~ @(a gqZ kmen4gzu:?T J=kjo ?v7)k:aZ}ĔiKLRTs9%Nx.a Ө="MޏK`὾i&]z4ݑ[*aT׊KhL _ )5w:|R΢&^ѧ=NHf@?CDt<2: h T]ej?{^ @8)b8:>䎪i}vG?G˔R} zuYM eG#Iur׸4NS?Fu4>9w>О\R+Ǫ?T[)s΄ߣTyFDRh)+k>ĝNލ) <5!۵0OѓPRR'g8?T3( -|82{.M,ҋ4%󺅶^.=)b 7 !sms1*anA2#wQGyv. 1$Dw*(=)g[&j 1?*HNqk]D|b$ RcUgf?5K[i?rJD0ϤKp,'Za[Xø0;ɣ`ByiL]Iݩ*Rʲyҝ6ize!zܶvS>wC.t*qݧȨ7T7]zD>~Dŭf?>"8T{ `U? ^TrHh9Ê[Χod:]PK{]k?F҉C,[evkl\f`LJS7)e~C(opz4ZV.>O% hh<9(W.,VRH2䧠V'X<(ɴ9Ѻ9c8?@).JY5ppΫq)^XjAOUI=+1p)*][;u?Hȋ\i5ey04I-\;&5tH1 u-U}&{ko?Un_Ѡ !(u+o즍7\T{ig-\~|RV). QMJT)(:PJ!HRJRIY%)%)%.lSnnw-4[C~kRS_N$=:J'8c-[F L)byIM^fVES Se5` wwDie.MRC%}o^'X7BCXJm9\ӡ6Sn-[x.ѩgU6)餥uEeѧvi!K4,ϱN>¼wP4:Zzlgt0O(INK)tt$Mͬ{xNRZ88n.qOT{w|B!^ ֍֦muǺ G וSKc>cꜥٔj#)&Ek>#J@)Kei2Ty2a#\|O&Asuߜ}۠kHz25f.6`xׁ5Zcf4kIѮFzꆵy6v4mOUpvEsA2NR^ߞ]}$mJN{G()Y,v4t^ /:,)1sѭ'_Pm$0JkI'7\hO [V6$ADc_J7%N^UO_sǀ0ם%ߊ(J1-[ڒlg+pSTh{sPSW/*/qLƤ@Sgw'RX:_x*S1`߹/yh?z*W݃䂙6D$We`F~f?jQzc8ΨuC]KwAt;Q v*7RtQuKR.#?o)l?};q׹0),pᾧhORjy`RV=b'X!X%̫]~TR CSX5>vZf0m *П\K)gMsgq/%-qr fv< [ej|xP9 D~PI4?O2"ԏcv &=TS,g])a~+Gw'+^L[qF(.v)t!9H-t[G >OQԋ v>>i z/nLʞ租N ؂M̯w4FϪֹ~urSt|qR7*snO6* J ̈́k@Q2)=a#Jb3)w4HJlƷOI9%,kFRnC20}-T]RElô3N9` =ւ>n+x'#=*&'Br !Mpnݦ0;?X \Ԩ [['q:0Ou"Խ;#y 1&{ >\[u8c,B(qss}ZSTZ ) }IN #^K#YALx~=Ռpyd k&5&i ."Ħ IU'Di˧S.M Ĕ%%))2鏊JuXdTaL2[H zHifհhoD)XֈG;{GryBfO{g˗~D2isiAMl?6wYzakOC?5IٚZ.JѳP!L6] MMOp>[XnꤦٸcO.zi̭ѥjHjִXиkS i?@X+q))l#cBLvOocS_O xr(m<|~nf^Jn?!w oA;%3Hh\5 Ϛ"pV)>Jv5:=*=kqs*A$Cg9ƥ̝C$GNSӀ kQ=/I'Tgy^_s|jF2PFzOg'Zd^渹6NXPIRJRJRJ])$%*R)A$.I+JRJRJP%6+W׆~iu?e  S0GOaAHQSZ|S$򕥵p㱾%4ԙAm?1-8򤥅+h ]HYג6k|aEK R*R RJRJRJRI]%)%)%)%/))I)t_Slv=]I)I)I)I)I)mt\Ϥ6jœgnm QU ԥSȁ R- JƬNPSqX|8b3P77;E@zl%w,wx&X0L??Dh8tp$5F;*meb2<7SSZ`1#4R) F[pFύ}Z')4:O(d@7qTѢuN yk4AX Ut> 6Iupmsk6ԢLq6vTV؆m#Х+e9Š{SOapLRf5;kv܉ eY5hqhbImN{,m\﹩Hb0Yg5(.c[2?.#NdS4"&uK\usd4[^ֹð"ҖU>nbiS՘/KA PRɪV潲 [LL-LZe,#K3I]ym䐳}#w'Z^It6n~[׊;(L\Zh6k>dg[4_(Td5u"̒>8?S})FN.3RRBS ?&) rILRRS:4xA5:OUKJrrkxN h[✇~CB)ǻe.wT;])&]mS o>2)%axzL k84XH3T;ecw;lRʆv[hoto(v+W`ͽ=ky))l]9?Iy5zqLA71`8A-}?v~@.,k>v5:m.ynԏ8$h]_/CF7WQ  |Cu9VΥph)ȯѴjIU^c7,:On|V")atfM~ (hg[.qPn]Ǩ@p7ZQhi= -mġKml*WS[&De m; ψc C1Nc{`~l999.sD d)RZIRJRJRJ])%)$%(I RJ!I%I%A$.W[;Z$Tۢv ΏiY׳>e.ԔTmV>hҖ6 RW\`$To~5Hnɳ x$֮YƃDz+YO )v'(Y%).()yIJIJIJIJIJI+$$$JRJ]%=_?gfݹgyWfRJRJRJRJRJr~uTؾf,>ke5 IyBh!uci\y͎#4jJK^S(.vhJRVK'['Zcl Iyi cy826Qu XNS c\g*szm04m GDYliyay<9M'K?"p `;m92j>L+'Tz4I;Q6[IaogYFo$/ef H IO=Ԭ֒u nR5cy*]y0jz.K45U%2V|B*hēì?HCgLJد;|iN~Xt>)!&^kn4^K:qqWiOJ]׶ѥ`(c[ %#m 5%4h ӎȍGJ)scX>MS)Tn1c1lR٘nҶbGRӶ׹0Fz>.j 1yyQ".8}wSiM#\2;Y6r2F "յXO}~QRٺ[YLoH\XC B:, zrd6~.ku >p]QKd~Ψ4}' ӱȆƺ9gQ*[CDwwtVu^}OG#l9K84}[5 WN78>$Bnt@SG7dޒX=yqe SrKwoBK]#k)%q>H Mt1}ϷaELIT*RJRH]%)($RRRRJ)I)I)I)I)yIJIJIOw7YٷncUٔLs}8nœgϾLNk-fC))y,tֹ_z٦'HФa{Xu:ONe[@k ;8)w$H]I0!:)66Q̘9ЎaFTuH{D#ҒQ\t {u?$ƻAH9R9D2[KbaTL8De%7HmnɣT&KwLcsܥKbc;؎ JY?sd\|@?xJV9'N?0ꐕU#H'#NRks G2qOj.;>|(=+1+aO+ɦ:"*ed4;x'9gYg q!>yma"ek5\Uc/hQiCk!n@hm0`#p$$9x>{TL]U F>'Q2ưR5E ۺ׀<'q b~G { )&>mZ05]ckA7 HPdpB\Sz^~U7Bǁ%0vILTxHBWa&!΀c! &ҟIQphJ5ȅ%C"cH)R"f!kB*\d??6jWh-gڊGڗ8ΉpJ]Y8"[pk M,=GZ;إ%,4bRqw Js177z?QSC.?8r4|bJbX`k۱w$/#8loRKRAmn3<)s s- uX{Z7%XπE3e$´=x+ozGE"isq6L4u`&^ޝDNXOT QO'{$6;dGOI+KXuTMF##K[}o-~óBd92x I?MtfQ\E\̼55H“`ē o dʋح2O]I))9<-Qd܁:Ѻ\_{k c7i&]qVJIk,qCtJ4X&ϰ3m=HEA[Ef部oy>ԚZ!j6u+IyCu'z4G%ss3Ϛ@ZQ[nIc_ !kb]jMg,-)dQ@ɞݾjr(aiݠ!eH H8 73.$2Qz[']>(s鷀FƳ@'ҩ9R/fSs]LigyOJ"ǻ<r*B܌wr*\ .$OfeN 9\^VncqCƧjNQQ ?>min& u.c{m:rcNHn\˃D4j%r_Mfo3vc m Sw|RZXf+S w̡jP5:vߐ!Ji8kQRG$eO RhyQR8$ tF{I?Ԓ${eT7O̠7FOOa #MwO;!q'TSY?6kbI&lw$^ָYyAM }+?O n⾷d>3aweVca]rfdT(/3ΰ{i<@[Hj&EL}gXMѳ?M\`zۢHzS,菻OI`ƯCoOḼ5qyYʅlo'(y*exsn(;6߅ C?H*)SWdLjO>!(pp`i8Vli+NH.{i6{[ ZSs U̩ѣ?8n"ݬ. ߭ 0>#Qc4WI`GVؘ9e')$RRR\A IJIJIJI+$(jUAilRځ)qxS.Ȥe>%[,/; X')N}hOGiZXĤ5m0;d%.f9|{%:aj)h))yAJIJIJIJI* !t$$$IRIRJRJRJPIK$ g,۷1*IJIJIJIJIN_VoiHHAMbɳٍ60R(h&ik`k$=9G:s %:X67}n-=χ>*#tŎ:A %4Jͳ5.\ݜ/;oCDR덥 ~hCu#.>0º5u{G8Ul덤k@=ٯ y[gpUR 䣴mr'k Xeq*[:RN0~&h0X@vT;GjdޓT(td74764h]H=' ᴷH \iaAqB},Sy<X&vSe+J|Zp/N%̿1牆bzgl|>$pܟjmtfy.BO3^vA/Nr/ka(2𚖗Wȩ^ѥ$T5V-qv'!+x$14O'%Jk?|~#JZ_ jZ)Uf̆IGQslZBt79}(#.Z>c8[AL(p3,$y=eLo<Ϗb:!]{k@CŃ`=p;|Q;+⎝{:[ 8)u9Va<CK0Cا[A_T`2֘2|JHn:n0>R kiFȨTo?2Z1wK8Tɸ EǑJm'WXnVQyeW0xA,l;<$syN*u(#)OwԀ>i!-tn{7)qlwG ɵśGҴ?D)Iųa-f(}K?ڢ)ocX̗ZL2rSH `t54 X\eZKw$$o6p?OKnޗ{F̟Mܡr?T?$=SCpI=OGTs6IAi-ӷ~ ) ~>M>!L:V cO6RScK9J;ANU4I'@M(;c7UewQc~SLeLZZ;MbF4 w!FMȴNO x6:+J?d׆$8EV;J~4\aC*!9 $$RRRJR)I)I)A)/))yH8AFjLk}֏Xe !phy?ܝHC܉̮4']I06,whjYs.2O)'*ry@x. RJPAK$$$$BRJ]%)%)%)%.TR)I)B ;6{;ʻ2RRRRSd>Kv,<;}k[#4V2x6t Bf19gе'm;> 6*qłAt>+*s Huͥv)ԛkٛsR6)48LQRvq puJ{rm) %`s:Hyݞ3g2TZ)hkGHв'`7 ~SISUĝ.!CSRK sk\珼)) D4:ø7ihod |G|0FaEǭ"IF}H-{Dsĩ).$8&Ows t0#Jt:k[Tr 3rw@ -7eC&;h}%IUͲ4 idd}ly'Jlk[衇q]Ğ_씃 8kGrqjAsП ZMyOB+np$"/sGԊm<)%CLGl7A$ALc>a9Lš&<ZϬ#╩08hSq)zcv$})gSdKwQڜ̻lw?9O g v@)l]Mf$6yj]+.w}>CPĹO\RC\1zcRӵ\}:LJHv ?S&g\YOIƦV}J\짐{M ,UUPF^0%SFVI7<"Pʴ;Z R Tm z.r6;V37!"T2{NgQsz^ ΰԥ#JOgVz5ܥiqpsjx4:l` V8&F+\l>=K],GtoW>ڛG.⦈XZRNHM-z,F7|IUNv2 ~lJr:>8ɛ go梖I^bZueXnٺ&2#mrOkG.SUf:X}qm67O4m s4EIpţծZO`&H$7li+c\ ݲʘKfx7| JZ}c8E1}"? QJJUg|)g8C`L**G_$eFǖV7ʛdhw2B*]6m~rRHdǼ6>2cIf>ݿ"ZrZ )^ێOS[' %8> *jYky'H \z %F ,emɀTũ絧I!>6 {1 qlf=ȝ>7Hĝ*Hi{1շƙi̘jrF2e 'mN>/>^[}~?OBLwfgߎѵBJS2*>iI)S{\IK?0S1}~0 L>؍uU9:y*}CvK#lRx"Z|89,ioh2KʰY(?SίǃK\XgH!X[a2KA ZwLA#P-]7II`AӻR1Q2;l0;9+R۹o`?{jYؖ62H:+K\rϸ38%hPc;8i_sG&9JЛd u-:|NJEN gK$Dìׅ?8ԏȤy_ߊu)k]5D`ebt]$k{?H$Fa0zmSJ "vѷ}B)Wmf0ԴxKmn]#k|4G!TZ,ʰjuBjWǫl6|wSeWy$mGB;d&LBᵾMiUjOz%ԭ o.!4s/f"hA\仨ݵɣ+-w}}hCVWO(I(tn$mg`,>' D%,d[⚥"usSKsYCfFqPx@_4Hg8PH8?)@)R!I)tIJE h~.l1$CF OOMK?RFڽCX6+;BީhJGZSJͯlIMK@wNk=G9 ,֝cNݒKT$$$%))%)%)%*B)I)xIJIJIJIJI*IK$$$$ g,۷1*IJIJIJIJINWր`XǶjY6|T`%i[A1.$*On= Wc,9A?8BtHumPM,گk`&52O-ܪHJm]nkZ^#48)Um-iMjou@FG 4( Szgp{IvejEQSI`i%rYrc!2p#SutQ~)/?V%}JVysIT;d4kOo8F.u参\5GҔSв:7kwyЇx 襯A q2\5HkXκ|,, @ A it9)@4j4jhCg }kk>K4 L¾Lo?9R9Yf<]c*I>vSW5cb1<''P8Z=A)IB/qk %&WN`@΁!:,ѫ Vg栦F%h{1c` J\5!hE[`${KFsܫG?zk:CX|9*963>v ɖ[hku|P%֘eUqQQsmilhHn6R :*D2o? Ϫv$O?-LdpRS )~ӿQ)k[m$$~Eb=_rTxBTmRWoYx??)%A{`T ysʄwLU:hIv@yDC?8ãۮ3i'N:y7R>n j@yq:T5?OAK6zKe;c R ^`;RϊD48}ΆUSu+hg÷S Pn=' 0}Þx6\o~ᨬX$T%y٩U4|Uѣ?N*_d=1wMoMxL&\sy'|{"&s}IE 6T;,?qX1k6Yum.FvY˳h:fHa(TgI J"׼$6wpprB,GOl=SMFX'Nַ{⛺ٞ۞q28Z5~))37S4^J0Z^Iא5F)W_! ;=Mlc@NIf)!_%@{_C~ Iy|쁑F!ʴַi$n6j;0@R,WEֽD N'JA ?Ns D%̢[] 3U#fǶƳn$u\YA R@sdvSƁ.koPL)oI9W8A 4/q$=ǟ(R9朹G\HKqx hTZ~EL2*v|;"\[Èɹ6~_jIJ=ٮqv7Ft*hn5@2Ʃdwʞl{_@R@M(is@ΨI-l NDbY_wtw~'$6~yYp}->MJGyMS,kݎ;ǝߐKu$pIM)SH9[[. r%:Hr)LmF?T&ɰZ'H]WɑB1K[q#ǹNǯu_Y4h:v.@;JQCA?!?e1LN ;Y9 hUu{:#@-o7vW2zuc q<ܕ.[tqa ?SI/c۫Ǩ8Ua |J(-j\g"R)¨hA٢P7"Kƽ1; *_(H)I)t]`Gԧʁˏ?ܚ F\~ݒAc?iMW٦yZ06F(ZiA SHKN:$G$"s̝RR(I!I%I)I)I)I)I)A%2IJIJ )tHRJRJ^RRRRRJR)I)I)A%.g/ೳndz)%)%)%)%)%9?Zlu]>'V6/&W tq hqM ƿKOTh *RS}6]ȑIIq< Xմb8 %JW۱h -'T*9saD"0~ F\NωEKc5?ޅ)[n^XNCZ䒝0ccV\5k? GVcIqSHR,|>}Ol08XŬ`~L =&m#_R-qw Hn7X{KA|vcZî)x<1tzCCmp>d䰻򒜾n썿REsU(oOݢrv!)$)%)%;?T3]B!! =>(vz6;EMBxzn=*R@\{~yh >nw)$:~5@GƂ?AҸIS=r"A:i&җFr)s.o?zT}<@JO!G43J[~R._i8Ǿ!qoX5r`39ͻOPn-:dkI[[)E < D>33LJͬm\lNlxFE`&tph9$MɽMR<7w~RfXΕ@kyKu5 M%sIM^xݬӨ kj=ʜ Wa)diAyhֈ2"Qs:^y.у٣̧҃{g[t8`wMK687ħIuX5~0{|.^S\2䬁KۀRkrAulY )ǿ!.JdrunTTdYˋwS<}7ƈ TײdIc'tEsU:'%gօ*̈́ۅb1ɤms4{ R&۹&?riKO(4Y-)%)%.Έ%(m:fzj6^7q J؍?w*Am#HTq9k:qa@j?{tvnnk4'U"km?jt"/ֈR0IJIJIJIJIJIJIJI,IJI )tI IJ )tJRJRJPIK g,۷1*IJIJIJIJINWւY=G6=زl $Fhu- rRގ+4''$,aXv!5HiRJc hhZ[-?$.z[Z!<ZZWxi"Q kmvlow|ʳVCNEH.cy8RշcOe. TTdpju;KQ\u $Ȗ^%&湄v!V9Ftnloqƥ9-_J@ ˽N|4D)MOW\ܣ*[ֽ\{Z!SԌRT (zO ^f{-75֓$TD~:╎9OS= *+H?zVwke@i}Q.EX%Q~YP*pC  %LNRLfﱣ~T >d$WyB$$$RRSMT?rPۉ3kYjr y'Sc58gM*Ak0|{*v0x"Tcv=Ǫj\7Qן.MVs#َݭJ ^;;iЅlj]q0^9𭼟 pip)GS;0y"TҤ;]>N:OE_A%Ұ(6?5ٛ\,:[*Xϫػ[>b穩FOaU wv3-gMT#Qq<1th_OCF58LGlxyU ?Qϳq;F[cGnoc 'ﴟV+)Z̬esKT5e7sJR;{,,ik{4x$4Q|x bwd3!TO7R .n(_?s=kOHUAjjVSKtcN'?{Dˈџĩ :|5>A%!s$ RJRJ]3Zt$9^&O^0͟Ƿ5*3;;ǵRSRˉ~e9 ZFq>JmoJ j`L±;X$9K$$$RRRRRRR%.HRJPIK$$$$RRRR%=_?gfݹgyWfRJRJRJRJRJs> }bɳP\ thE1TSSN2ʆ֐'RS r\@H?GjYAloQScJ+0;_RS M3+r<)eW[`.? bc/HS)JudA@=)9 1{{[!-a^;A),md>ߕ Rv凃  >H!p\:fꅩ?Mk1Rh ?6H3i}ܚJ]qpo')Bç:{9-H:\KOo+\X!Lj;JtamjjZ x&!m&vAf3I hQ:6;ctcKiaQuI;'Noٙs,hA,;GRy}$a,p34n au?z6G'Z/ı$Ju뾭9߼*6W5nv秅VmwHyh05 Suv}w]TVYѐJ{ (s+ZV, #4:)Ҋ.R~P*E@#~?%-tBIJIJIJ )tTꏦ>nPrL1ùs%Mg?$w07;R|T_h>%HZln\Si֌43E)ƜɍAL_{u{x4x @ßR}O G| 6@@{ߠϚ `ww?7R=b{E|8!;K:U4&nQGM _TvQTZF+:]G"ߤG M99oδKJ 7u魝]owQ|q2/vC^D:xd_?T6Ժ!XѵOTMэnkriK~yG\e8aR85n|r*}JXú8m?ޜ cyd(7QrnT63ۿ2 >i.G?z5{lCo TU՚w3K`$tNrJl=Pz<|g\[Ǐ!86 <ѵ3Ķ{mXc-0$%5')tTB*vSV;4.SNz'Ʒܞ<ZYKKbu] !y<B?[''H)65~ OK}/ͧk| RTi47k|܁K)}gKyO?p@!qh.o[J˝P:6,.w??܈6='{"\|>hMML?_&hտҪFAGWujeK)R>4k|S+U7tE?ɲ6eI'DR; ذ#15$ww{xt?D}#N&܆ѥivPZk4y)3qsG4higfNS1iӀR L3I0֏jl}XSy>>e0+St=9 " Xd{)բe;k~2V沿vn(&6~^5NHq <{ʸˌ歱)%RR^ jS29BJK^9ya??i* vgh8~(wX^N" )ݫ qL%,/$*AH/˺u)gh0IK$HRHdI*I+$$$R)I)I)pIJ )tPJR PIK$$$RRJRSKvmۘwve$$$$$/-o6qœgY԰Z-vz- c#!TvY'ױQSZ 8 ڭ"L8wktJ*l&'IHhAw8:uEދN=ݾ%5KW)q9~Q/k2MoĦ(5;0 c9q&5ڙX񱥮 v J  FΨ/V;3F]Wλ!71Ȩ*@rF=S;q#XnGқ?%Au h6X`"8 Yd!bϠ OBQ*c56<#GGI{ ϸ\ʚK7q$ɔH:V۟ZGi[-ޛ'OBMcS5oݘ%0=ΪyX&x) hT6R Hۺ<ڍ)g\A<җnMF_:JK_WGs*ǒ@=0SmCZ@PEˮǵG!Bmm۴;B|\*JCmەk֗}) 9쐫;![w17M!.; %ӬR2N#$O#t ϯeU8ɔ@CU zgO)LngUĦ)+hx} y&$_c_h$ĩeږ4d&lqFC|ȕkl~`yoEgStmgC6KiRiâzys!Yn3F5G#MD=1'HB_}}:!L:~(ZOSd{.Mj?xpy50lπN&ٱmmNPݥ9$4{Z^T lbbv,l7W Kb ?55ML[=*owwqNZ;k46~ 6;0u/4ZPU AH?]Iq)JukԟD!Kk> qQlC׷; =$ͳ!֏ȭu]>9;D YU Z; U&o'Zԡʁ!k=I۵5~G0>PP/ ̝ x KcէdW:ùx'akhтORIF)t RI])$/)!I)I%I%A$.$$$$$I]%)$/))H)I)I)I)HtIJIJIJIJIK$$$ g,۷1*IJIJIJIJINo2хf{uR݋&KNiujhlsƣTȾYY rJe\v >~))wtqgG?uBwOmV8=?ފ3-@AR :el#)3h}5764%Ǿ.ŵ @=HՄIGؒ@@&!q>WD)KﱆFD)L˳[AM2*itUxJk֗jvv$ha sˉĻ*6,htBJF*l4Xy #Jke'X"S2u~KL Ks71G-T֧/6Qt1}n0H۷<-$gWqk›xa9eLVٹƞ:9f$4'!V; ˢz R%._6*~S'\a*V(w#xO*A2CrK X:AӢ9ug߼ _'`!hlׯIAExywOZY,ߖ@ֆANP$S_C1!r|SR𒓏m WsC`5ILFE*e<KR,.nƟҥ/3>PR}o1Ĕv&#0XmLT9.DQg;fevk{;w~UJ v@<qO:{_ϺaK[˿6Q_K)> o % hȁ(V9` O$7~A5 Djv.wR;,gLH;~ܕYJ.:hWNw{x7DRoJτA\"\!4Vcjc~40Kߥm?G|)]Drvuh&^v=PWӇ:0 {bX8ͩSICp=F?u$2UHhҘcouwSM9*obbG7Q:Ny!Kn @v$Jǻ1mmo)H5k?OSkM$]Loö4-V&)yjw`VT26A" AL+!vmx`s^es'-q)-nWSI]Lo~L1%}-O>e0]n!pAJIKR)I)A$.TIJIJIJIJIJIJIJILRRJ])%)%)%)%.B%($RRRRJR)I)I)B ;6{;ʻ2RRRRSSc@#o? \z,>~[ƲsZ;4ZٹnݧNɹōp.!hSnkI$^`{6AB c?r*i /ItZ!ݡ!Mn{G?DȽŁa-T]$>$!qmm$Ɯ{|~iRHlI,EA2 䒘|3,f$JO.' %x#OKHn)f]lT op%&ʭf5>H ~>U"|a R|v9, KJTw6l[p6`|5LPKj s|R\@%ڤ kfc熝 @rpRYQ$}-4Q5_m|jFIJ}Pr\a?2ȹ^ X09H纥M:K]s8$'R8ׁc.qNinǦ$O2(kd8i @=.NAf@n84PdeD|t.Y xT01K<˝ cgSTmK$PS:Ə?*IO6jw)|=%%!̀hOti"qp/q(ZvX DSbCMck<Hdk?cW? ()=Us{1KRZ B`oqڟz%A׬dh 4p(QnܶT(fQh:&19v=6G*W˞~[,+QMòzٖ4nq;4tf#Z+mn~ɓywz'M{&ȫ̵< @_$-)MwD NҒU_61j6:*5-iBͲkotxnvRWͣv;%]`8m8tݮs҂d_ZuRQmdKLht~h1S4 h3ߠB NA{^}6 ,q2LjQRWt"}xS" tK|?R[ @)+ k_"2NyT }v ~s<n,-lF"'T R#S2u,'pJq<{|ײ!,얱'OIj|wcZ#j1'ZFYILgA-Fsw&mqIP qkIwf~OUVHO[}Sz\~j%~x)Pg:zߡܷ{TehAݙD9wUז?ُ̥4RT CkɟJJFR)I)I)I)I)6[,un>$~R6ƴ~d%ɪl5?4kO t^E,:{ rʶ=4oD+Fk͎LSc{keDIϟ5JGOZJHC"7%6UnApPX,1yos\bs|OOwZ.wS.R{7%Ѳ%(ǪmӱE>)Ka]T*+C:u!Q<-Lq~C\T!9W:szSуQIl ;pHm7us#鿳G0&즖np 2>:넃+Zֿ̯G4ݣQM+X9$Mtk?$ WSI\p߉Ajl;C!JOujf 50 SԀ;I+;ZOMpJmd^nMBS "Ibܖ;{MSnw߸jA[:IKˢ[DWfᦾa0jv#~` +^B5*IEC :#zBsq(\,Mж$;Z"q@yQGRS96Ɏ <'6fALlѭ_#IJIK$$$Ώ)?1 JthƯqcɼ~)CV񎚾I>>֦vLSȈgo|ܢ*FɦNOܑK~k_X=[O1) 1GT)称D*K6]>;ʌWlhyETD#96ukUx@nu88E *RJ\$JY%)$%("tIbS()~JTWI IJIJIJIJIJIJILJRJT%)%)%)%)%.4I $$$$ZRlv=]I)I)I)I)I)ߎrmvMԘlub^֧Z.>;#7[H)RX[224s|O?Loa!«l=LYiw#5VL\'pJX20gߠ1K44u ֑] jێ6 Q9?lƂi$VF5TOSH/YJ)?5=(1,w ;KZO؞>%<)\Ȓaƍ0:Wc-om>Tm•I)0u&W)'=r!ߐ,<}ۣȧj<~mmrG[g?0d:ֈ,/?0Mnpݭ#FMJtTsMdC$wbdTӉR$3k$}ɡLmЁ*`IJIJIJII 8)AՀ;$T-.CY΀ EMLMui$/#ڣJ߰j+|^P*Oe/^}KO JQ hcݝ%'ߤ&X =Bkk 󜔴K_*ֲEuY.=!kk7W1zU+ޫDx%}? b5{R) :Tmf(%'NlDnlc|~'ބz&"̷d{~)-.Nz 2z)Q^,i} )C׏V[0^OE]]m5?69@C6hS'tua<ܚJkO\' 4Z~wɿޝV.#\L4}'?QZ̆^ʁܹ{%Xe ͮy%%[a>^A$Ppc[}j*L }=ߏM(cݷ`w1k 䊐њy(m.i:4Ieqv}l# XSWOvH ۚ%kH%_ǔB"'_ijIRJRJRJd )[a$R)H)t )P%/TIK$$RRRRथRRJ])%)%)%.R)I)I%A%._/ೳndz)%)%)%)%)%8^M>1d]l7|nvMBn M\Ļ2O@ʅ!01n<Rғ44H3u_wNTL+=@߀ a V^U͇w)%fT 'QJEHaIKAY =*7{G))좎+. Oo~NCֵ`vTYp7MW46<]')zSSENz x:(fh)= ])l[|)"OR z?myJpw--ME0Z鱄:߿:|&3'Q6hO:)!&> Hǚ ?IKcsAK3 0woQRA?%2;=?-BJGV#~TΎظ~Tz]h#E^+@.zyZϒ抚 .Jsܫ"S̭LR^3S"K.?8j47gNqǂԥwcz Wڰݻdd8x ` IحcFGִJXwR ^RSTJRJRJR+Rc@MSg@kv]~()>EC@MJ,a&1V$z>e9N`{ /ۧܡ\f4>tomw*l˝ [0?R;{E5T}BHM;7TCR8ޫԡ1vUED)ǰ@id[2`jO}usIo% l}n<@>Zȅ!6+svU22E%e˚|hC*^~?bѾ[> Ԗ)!pT )r)!d. JR RJ],+HRJ]$IJIJIJIJIJIJIJILRRJ])%)%)%)$B$)%/))I)I%I)I%I)tRlv=]I)I)I)I)I)' 'L~pŻM l{Ch"Ykl511+J mxP}:}k٧ŧĦN}r?'~ g0hCfe1Mʚ$4T6>&\1ܭFWGuD!kÉCvO6EDĠɦ <dTϥSN+C-lyx6^ 9H!R{hֶ}^0ctc|KRX@|p ySK[H,Ђ>:#ib=oBhi\KU6r d2H<FR<qkR|7TaM~ SFNcF؉&&d+ii$ WS~F@-'p'?zwM?fBG| }m1v Ȼ0`y [uYN,-[S[:4i5ev:8x'-jYSkS:p-m`:8j6<`980sD#P RRJ]%)%(j?Gap7)xe,$φ~jӥu6ߊ(he>$`i%?H &jq/I,kO.0!Lb_k6 MjgqSTgR:M.w J j GrGU%ӡ<}5I^>Z&]g`BQknp{脥$W5n(5zvVQCj=osi-g(֎=`H Sg9ߛ_R:zkAh˝|S[/9ҤC?yN/V0,I?B3䕩wO )z~Q-}-Lm̯ Oҳ)8"ZGJ}h:h_qD)F = \Z}I5?f$8[MdZ>ФSo}Oaxk}m.c GQU7YcWt)($%)%)%)%.R)dAJIK$J]%+%)$IJIJIJIJIJIJIJIKJRJ^PRRRRRथJHRJPIK$$$$SKvmۘwve$$$$$~̶[f?=|_3M5n=n?iۄ&AK؂7???i)[t>!./f`¤uz=jT>r ^ A,l;EB]> Vf='v=B!`Lx"9>Y6PPSV lnh@OU2c5&1wO -w2gMAn?;-3iZz.$ꖳĤXӫ"JY= T7[?hd0A jz4%#ɭ?|X4;ﻅ"Wŭ~e"To s ph&vBLjml2t=8A^Im'EHe%/IJЧ)~W6l}WW&?V5>?Q*pQ&t"T @{GJ4W{\I: 5Xm }aԋ[Z]kF)ozB08G.ue-lfC܌ӦǷ%]T)|^ϳXBث>S@0Z׸ω &ґ9$yVtt >RHRJ]%)%("԰%oMC|,G1B }Z+<4fCg;ݚK/tq|%1}yV4}vNV]p$t~ i) XmlnLPJ,tE#RW`ޛ_,yu Lz-:\ S3kՊ(⣈3}ۏ>)KCsu?59\a} <P}Ѿ oNgL422,δ5׆0p;e6aiL[Y2YH:%ijd?,7NRZgL:9k>'BH$'O$f8~I/ڑݖ l6}oJg-=kڐ^yu{nԥ`{<S&Wfx[Oݓ^%Jz\JwTחȒy D ĝJՆZ%4>h ji-y04a69m`Na㗴:}QҚ  fu})zEf4GtRqke$[S@%a6DΟ%Hl`ukk=;| e-\c>@d4(3u9/R鑩i:4~]RSN6ם]S_ESTv-|{&\42Rsw#064mi.]?$ঽq=s/u|R=ja`I {?IK<pn1V;p{R70- Gҧج|:ΎJ/ z`sܨ(zYi|Q~F3rn>tS1ښYoywR Gtvbk"&v5x.?7S:cѣR@p4gI%Y[k~#R u2tdPTywOS2L}ſP.inhk7~VXR;#"x5 R*|=qH)5OS"R$RRJ\$R)I%I)I)t RJXHRJ]%.)%A%.$$%, !rIK"$&"]$=_?gfݹgyWfRJRJRJRJRJp~7c>5Xы&ϓAI)i n>`kcE{3ZXLz '(?^ 5SՉݭ /G?z++L ן㕺"%KB]*tzTatCJ$KNQ%f* 7@Ww6HW`;w m%fn9MP*Ss8-s4-a-lI<):!.1'iB/x 7YXLSЮ95d y(ȥ6ݺJZ' r k4rrՋA%1K ˭$ƃPꘂ!>)h Raq.`עm|SvPq#_8B~wJdsޕ)?pȠTIwi=^nԥ{wJn>-}xZzccBa&F;X#nplHGQ@htrr g-47#82D(mm/&ב'X MQF;B<52c@5-{EMB1#id ~zVJT29))^%.Sjm &#M(\ohJ CiۏP㎱MSKwX߈N`DK| -VY~A]$یc[P*KCl{214|wknэFe'S U#Pcsے[M#mѣ1]NLgլ}B*ê:2u*sYލXcuyrj#>IE7oc[ѣ4U9 v'l[^%$4xuaob↹\?Gҥ4eU{w'lk[ Xy?g5 Rֻk5# h^L-gOIgo$f܃wMo}  6uh_%33u\TK`K bF7henKngR5Mޘ^'u!0ٌޗU,, vp)CD9'ǔPLc@O~9j;Tivá{y˭2uʦGOJXkòjJzIJIJJ\I I*I+ TVILBS I*IK$$R)I)I)I)pQ.()@R%*RR )M!$3mnJԐb\xiBK>$%j[sG܅C8i =~ 򅮦cjcoZCq4x;(TOlm.my|Y6|f| Y) Js~Uzw w{IE*Q4wKd9w1&{ ! UAR\Oщ tTb8 $ȫDTڧ!ȹ#)ak%<5TQx\t5*SK'o]  @))-v`)!"[$p)agF6 k? q!{x)֦.n|ϊ*c h QqZBNKo8~ sK&4QS F(*f¹#DT}Tg[THo|S Q,j9$b3'_D%8'A4̇eǟJWmŤ⊩mn2 5%RhͭITr4"W \߸)J6ܰ~?ޒma3O"R*WѰ4CL' 3sϓ"I[(~̈́&;5kKkqS-r.>]Je vuHkNַ~vJſm>'!3m֙w#R,uƠ{Z`4E'y,}'+MU&xuz~xԏѱ2FX2I.WЪ v)Ԑa<}; K"6dBU4.Xt ƃ?:M#ȷ<kci-d˜|Bk66vn>I)X7gw [)QH sEbI!mϩaH-՘cjwKaӭsbfc'sMM#.}$+7;<F5ˎސe8)- "o D&S1ʡqp4nV3=F= ::yVe!==c c᪩dx\a+p9*AJIJIJIJIKJY%)%)$)!H)yIJI+$BJ_JY*J.)PBV+pJx Z~E \W~?*}pL;y?+R#O() `Kkw+RjoV +8&⒗d PJ0'"4'¦' h#JP̱@P̵ߞRR;ނ)S?Z)%>Vv=]I)I)I)I)I),qTY6d,=S%J6m=kV+sZ CfaulȪ~0,yzWMkkx}9X^3K5Sm,A! h$ %ȮޠvwW^ %22NGPAh'WOut̆wFu}!"º*W)tTE+p!D$% R `yj Y Ԑ>%!97K72i)1+d4mPJj!!N~^3k:)X&RC͂ϱ' Q*'TTF#iXVH)Htg՝0O+*4B>MUYc~O1*59J%v~<ݾ*2W^71i;X*yI(&f, EQ7S/O&KU{4$vr>W]T7{kk.|;4DN^}lZ$s:RU=>.ۮ{C[o嵸s"x~bas1~u}%Swl ?WmO蕪,nN7{PE<5ZK@ $&=C\藆߻>#+8؈j52` JY5JN*^40?%-?$-J & o ΃`])puQwoSmsYemIH=?/ rVNyȊJ˧ S!J4vJ HNJmX?_-tRU(iIKB,T!6kl7h+P9]8΀=Whxk-cC鳑|iԩYVd,J5HiGq̩X8>='WU)34<º+TJ4 "$JRJRJ\$JY%*%%*!$)$$IK%\mJI-ܕV CJb8-+F%j\cVw}o(ڗ5-Ҵ;4|KEcO)R~Mh )>.:? BeݧR1J8 RT>p?蠦b&WK0C8%jq6DTrdzeRJRJRJRJRJp>? ]c>Ə-w}:UlH{z5lj[N"/+1D58l9Qf=~5R:lSu;nTWIP$SUͱmq=d5Ի BV6-[{gZ +ulw4[&>>Sz҃Cj6CNu(t{8It|-u-7Nu:;jRANn[7 D5О9 5HB(iVRHQ )dTJZRC{wwlTZ[굅ϟEiϳ{r2dԺ-LqT+'aAs6` (zi4VְGf|j^V n;v1Ջ򋆾JyJlqs67IOI߫ˋ^1\71$BJy~Ҳsz_ %i>߿jx )&?@qvAж~mO4xGX?4\2ct3ʇұh<%&{l3Umѡ[Z+kw˙IN3OՌ+=5_)!I'՜{1q eA+m#~ɀ#-9mT#xן)I!ۻԀqXDG?!ue ~g"r `ޒ- HbKY?wmu6mڃ? ZOd2#i?/-|K )tEMkDۧ'ugn"6/֍ѳ终rp V-lxya0Qhqk2KPJ!M r,cCDԙHe[xJANYk ÏZ 5]eD{lgm`I-LZo!QB%*a+Jp U$n=(Zخ>:!j_jPm?Ojf19~@~RoFv?74~DKvo?VٿR[Cڅ)ۼ>?#Rsg\iL|=)JoB`IKZJԣMQ+xJ`!h#^Tt˛]LE|RU$Ěf:E1?18LKgo1JL34}BV^;;7 } hꙠ=*kGVJ!`߄r" ?NMKF&?HTr-lTOn9%)|wqtf]q<0 bAd48 }LC226"dzN.+ %]1/soܛkUaa3v (7}{|t@/"Vqs.|*^6'OeTs$kN)էc i >4TWc@-xtTؚDzN-|PRGs$4)mAQrTHI%S)%q%sq;Hic? lN">Z*%9Ly)?jJo_^+wX;@f+ 5Zvv+`쵚lͻ iN-b$i\v9 ();@<{1G rVZ6QB7IL!,B Za6Ή q I,b?_ {C7VmǴ H*)c? Zk]anW< Y׆.K* cÇ _u/w-㦅y:9KkwckfRqsc~g}]$S~e{)Kusy|S0te3_S\ln靻t`˻~jJyڬ8|?wG䔟 BM3Ý)/}u'>KkYuձIKl5SΘ`{Ǹ4CGe4>$tӣ~<))?TzN>FԸYSs :m}6zGd4b rsT egTGRG3 < z"G?JhQ*%h!qVE-u4ۄOO[`S{ ԼԤ6{O0(mqSձAH@_2@ZL%Nvۢt)׹tgSv+\)%tTJ]%)%)%,RSk7.Cn2\KnO̭zsؾkFRL6mk E7q;T~1))z%AKZR4.فrz[mN9,Mi#Bz3&#GJhE(R?%,2+?8`FlO"~2R[Of%#r,<Bw~(kRR}ږ`&V6x_ PmC)CJo̠ 6>IL̇Pه\?LYzIssGKTtSrMq7Vc9sp?xJaP?4sܟ!e4Тg?RIK*Su&~R#wS?.SX-o ?KV]#«cM瀗 6 -ͰQ jy)cs.)P ]?"2ּ}XRV܇al&̏74(z_2{.1Z1)z )Ǫau[[vC[RSC>=퍭'C$wTc]nD}/>]RZ:v&BgELh64A7l2[a{sy_ {-X.;VCI;No}pޥzLЦe+cw.˰IN_ezۙ!g4w ~lsY7q(duJXH2%6,tKwkkIFFXp[jr`TлŷrVWGE WX%:=k t*fZyUO-E0 ÿ|e;`0N3 -ZA[5 `rJRJR4ALRSoGڪoPRGugЇqQJWHmb\~RRL\47^ ȱu?KjRL\Mby{{4&_P`G N wmuݹn-. C[oq'/}Zz'P Z `I^+ T.jC^\%p;/o#U28Iѫ%RF}Jtag,C?5)jQ_KT/d<|I OTJTꕁ%;VJ5.[u`8j\(Vyip؞g`<)aJҏ g:19v?$_ R8kȥjJޗnE3yޕ7t|\.%.:3ͭJ_f8VRS!?=V8-:?4R`JWM?TG*g܇ m_C~*~ްTW휗}~*ٳ#> JxRG%Rh%JBWu䍡Pq ,T6OL_{>%> EN^; tS0(,TS]msY(-5h`وKF?*xY'suM Qc-`uCcOT1M]mi6;q<E|Iz|LgV!Ε 2vA-^Hl(~s|5O lWY9IH% \mk$2pV=m<ςXmZH"#N=;s&yCĄOG.<-"ޗv;my$`km=Ʃ[Ȣ+!?THtO(.슪7;S꽶dGR[#08-vj?H$$Oe5.]| X%QBLkI-aL\))ʊ,-;_=j0 EL˅q<4~>J" X`-. ;S<׵EndλF]][^5-\cN ݣ8kxB{4:V# OZׇG˄TީSC{슋>njswɳSc 7nWǢ=;'7sIN x=2osU\~IOiS_i4sC`ǂ*xJlf͇IMz]~u44;'wANW6|| ;Zqsn] 1 )ۃFn5{70ZBJOYfKw=j:Oo'JtzZT5u[pFh+h_ܔT}tm=JaY~#*X. d=rJI^8?))f?S8QRm>E W鱺6.E0r,̇J0P3um6<|eU Gct[H#!M,[z74:?N[ibFyO%5,5bE K#uI,r^_ýJᮈSwӹe@ToZ&%f탲#tkc ,C3:;;?W->s7n"-Ybј&'r/mt@@\?4G2]†΂˃}/ 4.+QI_MlsI^~A Sbj#CvG-\M5iEKFFE!HN [췰hk~I^|K:9 y%Jޏ'aH:3'W8:S?|!ĦCIrcV@ 3AKp[RǪ?8DiHWiHիҏ }7Uj=axUh- pؿ{AVX9* '"')R r,<Ke%3-Y͏h)q)ؗ hCTɝ`Ktfmo8Kʠso?KTo6;+)2'OĒmG+ ~)Roڔ3QZցZmxtJ~~9* afX~49n.BT?f#RZñ߽ RdBQ1鸣iG$( kbE?3()XԆRQc|jbq2B*fGx R 'Sd_ˣJgOP\ŢusGsRSn;<)~ĖxYwlgiBʤ6w'M s(%M~EVMIM ־j q;9OsPt 7/$b&3=i;YbڒN #o SZbϧb6tM%u:CZMtL" A5#)W`dnutkK<`W{3qBqHj3$)s_t>NOZwaoZNE|>V۸BAu:W].wa&{ދoÖMM`~QXޡ_,[AA*9ynT;ܤ%4[Mu<@op>IXA.m'!s$i;>)!kʽ!$U ZZ59=1[ikX"?'hۓ͗=bbsAwi*f)/nHDLp9lF&"-߆Yct*2m m J*o1sqJu"]yՁh HMS1G{GbJ[M V򔸓JC~iM~sRR۰3.Ee3I ~Ӭq[4HjTZT_2?BךC  w̄iKk{yFJ[ѫu$ڃqw=$T7d5RAIIJF;xFe2tq?*P\ft C/ EJ99|MZ3.SS.^? Z-BV͟WYUּq"~ $Lc>$+y? ^KZv4|ҴO,$P$Kf#B\IیD$ M3uAGjSAGJԻkEqpq)Gϲ~.'!kTޜmOaZBZmѯfxS6>!U؆ΊI)I)I)I)I)K:}cln2[.'_~}; X:P@[^/h,n ^UO>n; 5 i P0ِA:2HN;ؘec@F[1O轃r`eC~  %&"B+D J KI_W鵻RI[xŭ:~׫pzFaT6.notDEwct9$X̯Z7]gݹ:ui)˜1qqU>?qn?*Jrh8~D*G()65}+$hd="_]k-I % zu-.xޒxw['Vy|%%%vFEK/ FnǗG߆svc38폥9AM[/IdpFW;.d$u??x+RaHȧ)#h?+RP#Jζq %vOC6i H:Wl|ΛK3. @Dh_UkԃǸܸ5IN^Qފ'-)ǵW>;k:e.|RzsG3uNgF2\UVܳXƾǼ6-=:tO;: TX^4ٗP xv}>WUKklLƻMSJV'YfDv+;ͧtGx|%HޛSlǛN Q@CQH/<) ?QQ7"S!zmxnf]2Hƕhna=Bl?Yr4bM>g |B3)[j$^~hC' *䥺S;T?*<*cJ!†_j<4TF[1)R̓Eɳ )ͣCE,_w%%.vm <$.Sf2яDC #Iqޱm G `CKlHi]!hf 8\Vl=!i$k%+J좆H5*Km،͉qSOԭK}"~c0%4A }1 A+l m G%[?V?w -wG3ڇ 8 HJC#5>@!LδI 0~%3u&=?7CL~%"}#*ԍZNU?F>Dx*6uLIJIJIJIJIM.W qG$ 찹yd-1smgRD&H';=TLogA vRFvB66u 1sfRCos2d`SPYiқHla^$JRSOՖ >}d}Us{i{+lBVޕK)*܎ORMoU`[ A#*D\Az!k k'RIm0/t(KhSjSӳc 6gNv-̱M/slgGdWҲzCdlGIO]zK~cTʫ{+ƱoO^8IN'SCn.=֒n5L,JJq3e#tSͤCw)kbu]?9NqqSR%)%.S"e%1%%2)6_u3)=t+&NZuѴI!PKT*ޙO=0 kK152D56,G)!X]V:%h|e5s4qM%Ώk= Ehc{6 64qu*Rqa0(:7FjU?u)gG8#Km庖[Oޜ ̨{ۯ;g]}gzs؃⊗{1kw䔻祈c&Z;ނr+,im#4Bw:?FǗ7KHA5Tepm~; 0dt+q#*qTb6Zko;,p2O% ^$))va{O:tTO E3=OV$Jҡ[ɬ}+RO&i\c;1+RV _c*Yؕw%jZߛIKQ)f Cb?)joЍ%qVa)q.8gai RVU=KLW«cU<*PR2/03RRW}Ha?QSe-:'QR\OĔg鸁hZYF5BGU]s@%ݘb4G%G%k ڹR0Oޒ[g Ɵy)ZK[q*:YSxRJznlt%ĦoB5)afs ֳ̧pn?TiY'8"Ҳ{׏ߚgC-\E7Y |gP֞^0C*Y.@ian1)ZX?" *Z)v869sAx{Kke;>˟C4}<\ɔ\9VQKX !l4ݵQݯj}Z[ustyT԰3#1ŭ}?}RѻǏJn[V=Qc7{?W-i[n|n<7><UJɶ {4c-EO5oLmc IJr1zfC+µqZdA/cNn/վshZ7CˎEon&?cIJMzፋ]lvwG%ǰ%;Y>ىhkXq쭖A'!EO#W;sxie`>)׺Xs9VS{1!%=;zZ:k`}ﱮsɴ:7W˚$L$̬Ywjl?>OWUXs'>ϲJv],mL ?oe R+#CK2K芜AJT QIJ%EJ)n֏ZH5줧48#yysg$>^X{f_tn=85nS_K4.J]U4?Au"?7h!i7X渘n&|N7W#Hºm?hɭe})u,.)XGԪ704 &>bT wsC`Dp-|$J\u*@LRnWPʟKg5Q,$Zvfw;IN3Ϟ#hq `G;SmIn\N$ph{MJ <)1μHUUb_,??HQ{[[SdU;+ l3L]&؎>~K~ѯA5:ڠ>gҘ`J}RF[c}*R/*BIJ$;8[X4|yIKQRZnQBF5$:v H.ŭ$O>'3WѶߤ=RqcT}DvUf2~))O `pJJV˜x%%[!yxjݝx6]gBoiޗ\ǷT Ig&q&R075)tA# KVt|y(p<8OZ7YvTAyjZ".At#j6t%j.m,="*))vGM%)ComK wɠԳM![h|\jz窱,S˻f; U$$$$$Q?ʛ-gd]pTD!4*יQ7\ۭ{¿4o윒etZ`C{'R ʷ!+"|JnFdˣIlū4Ec.cljiP&TCe,ykȩZSmg\mݰLxt7G}Q;F憸vQIxw:R~m ,llgďҊUʏ&7%S"mj\t %'?8}kiD- p;$N$x'S|4Fݲ.qihAPH3z~@Nkrف¿?BnIM[>Cl8XA-fbΓ&ˏ=ʗ}n4W m ;{R&AѲ]koڷ\ [|HR+?̛HkcbۋSvckG;nuO!T}'p|S3>ՏM-Gx~ӇE47ܻYgkZRh`'Jyu^whS{;9aAeUP>^Fh)^·s 6UnI%Ip*.+x>O&Yߵ*nk)j 09^-s[CO*ouZ Տ oq?HϸuI *0kvEN{~[4'T2re?ѣWIN&Px6ۣZhqU/~}?0ޟIj2DhK(88n Y)R1I:]>c?m7q#NRRWz[P o2F6M.ulj ;DOO .3'řgѬ^%`6ޕP i3YʕZLzF?TqsܹV m`u7ǾjY[m.CbOцcw1A68ٖK䝾6Ƭg@X]ua qwMSbl7ai~Rq#Ǡ鮻Q#⣜8qυң:H.Н s ~3JޒΥ@ipTtENtok.љLCc?2%bg{X-7Jk2Y緸#h sY@#q%jӜպiԺ JpR\&`) B*$$}')Hj;9ݼѥ5:ȓ ]Q2L;䕩sty  KNs╪}'6Laf(i'ğ6'loj!~AOIj'S-).Uv>J468Qk|Z'He:aL}lvf6G2MZ''6^'ZۏCJ@Y =%J6GZ7^?܊1 Z㭍9)Zi li?8K zƥ?PE&{hNAT[eo#iDlsִxn'BJBLY(Z;)À})?z[;7S zNOlk)H R>U=kfg;'i-25>O^.|-/ScZX7 =Q2)%)%)%)%)%5D~P-BINTm 4}+!BCn%ʹyMlа5A>՝p s¶dL4I Lb|Mʬn\BV &g]ah׹%4Z}AKDbdrmAU76<׸SK{ y>i)Wۦ&>(6#'Bmێ! ).yϬŴUg̜umjOĶaZ(!\]< Em{H(.}b-?`5G|Ӓf%=۠6j!1|^SYIգI^RChoMJChu}9X#d:c='kAwW|SӲu̵۽8O~;[>esXsi?W|)Ȥ%|5ѵ]|JIm/W ']mRCҫ졠!!TӤd w ۺtg>!%<m\ǹbSk8ӫ?"/ɃS]g#!ޕB<ͯI.>u$V'ufwڒwt<l fENY_mhkC[Hy^̒[ݣ*]NL2CK,q/wGFtS¢^`ju).(lhO.3ww/p$4󊾩>P$WSI1A(yp:iM@w☢q"g^Fi=zv)L|{.9wP~07A7uCYt0 (&W$ -prs[75"6rr~HklGtiaRοn5ډp!&f;萶%Ýc HK'e3a [=Fܰf5إXCKJ{\@N[h*MS*I.A, Ӣ5 2:=\C^QFl(+)D\؄׳վZ~CS]E7ÆS֎<ɥcux 1PLTNi>+ncCְ|9<eW@\'u^/i!XG걆s7w$$uՓd1Fv %$u>HT= GW(cv\4Os8fm#mk_ݠj*NF'haCˉsYW@kM@== ׎li4}%k iP5c9m< //0 X }'-i{xs 9*sro2y׺CTMuA? ?#Km_Ԛc RoU6z:p(ҭLOcþʹ-qje%лm`%=ȜtU}fyh hc)vꃶ{Ia0C-<7hZ>~ 7t|{"EoVmnuBKx77M`8GOKu޺`yCD4+ Ny8-~#0N{=DWut[M?]c!瞦%1{'2QB2$VVe 9x(u78.>?ܵgNw$8UT$AoI0+b\g)ncyo%6Ɔ<\SJ?enbGIpe :;pVAш>l%,:T߀j4*$s"0~?ԅ36gkIpMK0>#򐒗 {ɴUgwS"mLokJJS:܅)c&ns*Ré2~%f)+m̺!•7 چMEP&g՟L^tcx?Q%K3hjԳ4cJ< F:eu.8R%̆ۘ>eȦn>=RRjk?Cy-Ttb )_ִm'hߏ[ֿ *cUl|Tsf,o+Q*I>F,qoqFɸ7[?7)gHs*+Űeص8#iNg~S `FGdNCR\ V[GtgX}˧ѿgWMK<Yoi F#X*Ϊ5*,t=yM-=?W 7i:^I{F?LA"+trzmٕ.[ O"W<U'㟰9G@$c1k_|U}(MtLV5Q2TCH^zmjmev˃{LNfOqx.~7kÜ_W裏5ُUW5_"+s%㔔ɃMv>^g]f ga՚[JMae'W~3kcJZo~)ʰt%k-\ iIOSvnKg;k_YC?⊜>F++{E9?R=.ΑN&(|g;|ٿ;ZzFW>#թs5/oȓ[OI+Nn.vBA˯OZָ5}i!?Mv,m{][J#SA*%='ԟu}fMw]d%:=^|ET }3!s5"_M;\'ݺڦ:ʈiPd O5j!A y{.W67h 9cS@ݖ4DX.W8ᡄmO}UYe8zMES-%'k\Mڊaypv:&5BH6=N|AhLxkY%ixBa $%-w3w"xcXw8h%%='Ut#Ӡ@(cYg"8') ݵ2+w[=nˣ<}. V>CqnA6[&%/Oe.>d9@МJcQG]6?*AK鑴D5Z^8W^߬5̷`#M {G*ɥH?nY2Ѵ5ѭ?TlǶ%4[35X4x-(v3G3_ލ)N;AJYyhr?(qSf{?3M2=#HS8U(_1?z@UDtų*J7ǛȎj;dM% ]gvU6k|PS0`>QRY 0~%!4W6O%y4X )9ȍ "9g1,<9'%'oN %3!ą?RRfe5@?ZqwhR0~W?U64r~P #7EkwhTH*g%Z؊k2;5]jR3KӰ~%%1یq>A.H5悙i_JT JɷRw~?=Xp#>JmۘwvU$$$$$V=S>1²[-';!PS,ƻ=չŎ{!nZf!$z;nZ<4Z㤪˫`#)qABy" 0 f>V˪^{l~D1[[{Ӡ}^_K0JOH=9g٪sKZ];D!k31ϑ#*l}UKeicBif:h no=}$ _&;ߏ<GFO';Y"KGS2h(tZBI,QXLZ&<ZcҷN4RMg*pXHF+TVRJƩpIctț?ꂞ;KgӪ4G)V{5}l0ꘖۑB6E[w=e |ba/7m@;ZOu2zMxǹlh1h*(y+jy,ώ渗OIqha[.;ukd{O}> !>MֶZ{kIp}:LaOfS ߊHmtUs y$պv}Z .oC4|T>wSakGz_P ݴP%N:ԹQ=s.$#Mˏ hqS&QL.om;O&RR3gs]gЁ )%;l9n5QPK_gMRE< ko!s\{/#,zvz։I$}ZG^{CaSz:+~tTF6\/fe3fk7%m߫]c\|)N?Q{ӱo IWlSv:0D<%CGxh'K$:4*2V-jP)!-O J,R^Z97Ϥ7>m1ퟁE 3Vn=N͢s+n~WX@I-\/E3u C_JPK[v&e %ϼc`>RH*a./q.wAzXI+6-wV2a&\pF;}6Zvѥ| o^eߖ?"Fc<cvE϶Z!8/c\_I$ %BLi>zJ!OI͗ k}eh7[qIqg㢱VưW*h %vQM%oJbKM\\揼qi!T9t oPV'_3(~@ +FȥAM{:YynK\WqP&oJE8xͬ%Ą`2|IiJ` G]aIn{d~  v8>ڙ?Ya*PH3Ϣy?RS&Y!4M68UIJ.wxI}4|'ZNk'ZŬhoJJ\e4 s#J`svj\ oRTEoSorOR P:m*\(I@G ];)n?4~'nwhRJc qXd<}kIJ I8-wp%Z*>@JjGjkob~qR2%1.@JY)_hWCgL@Fo{,FYٷncUٔ_fYĒ;P\l$})pzOmmuN&.)Z@NSd{d m?loPV! HYa{\(5H9 fTe$ ekxtUԶ۩evtd, hO K sͮK={=-PUrC11"}R  < %阏9mYSGf~{7 _YWNuw[]bgûA.gO#εb=CS76>ӫw1?>2w=; $ǡw\٣5{ݣX=<|w,,@-uMD}j./fcGm%%6oWfM } Jyθ[Eu7Y|N )æSV y`.x#D:Gee8K]pX.+Mta )O.T8Tߢ?uII>/ɷH$X+E}׌ jJC^NWV}#>` nuŚjU ;F1\|EPɴtjl۝Yv+ѩlc?Jrz3)mX8hx@Ϊv(Roa Z MȩC3U2!OYMM2 y*Mʵ{.0O8*#QȬlP|e]kPVXwcCOyjPVpX\<ӭIAZɶ7I k3J{/Xٟs\H=;@SzN=/?D:(_ !)澾WXw?MX%@i옹$6mM[dIuA*:"QZձRZUcg y.w?*֧9F7?FYf@*MKţqB5t ) @/qa0Ow),-k~SSKưcHT_cgzo^Ѳt~T!K=bZS'…)#{ecd(*hɳGe4yW. *=<]? FVthjHz|Ywl?%6 ,2(IM* Mk%%8v \Kn&^l#iWة`X"|2y.܍+1jmn?$-4!P̃GjX9JZWs [ĉXt4U 3q g?1Զ}Rw%抩vJd<&Yar*\So(_ܒQ-44%J_׬vq%^G bTLk~ R R96?zTny<~iR H]JRJdZV )~B ;6{;ʻ2RRRRSв$)kg3cw {]jav {lޒr \l6 ({$8`{n]`X,DYzh>&\>kmۣprMٿo MegqPH05FBJn>Ie !j y:7JJhVuz% ?INGOkm \GVǟ:P+;ݴy;$K?Q,ﲱB6sB*q2,9yj96v>nScSuZic_HctkZZ8w;.aR\~ۚssen%hrKz1TqmT贴1))GWmn o n撛YAދI$cG kt;#Ulume`!ފs^;zC &,'S?]>:}n0~DѓC0!$0w?xIqct,qX]n`ˀR\R9s\d>^2n`rH`qIMWMҐ)z88T{OTj׃Oe0*,rg!+qN&K-c!M*zsKөp߽c\'V6ۗMhctԜufsQ-X#ݸc_!4Kη}& h#Ne.TGɥ7Y9i'5ЧqGH,QTesw+w ;\~p2oA`%JQʴqFJDJ$JEJIK$$$$%( RRRRRअIJRlv=]I)I)I)I)I)w[ϬIOK-Io~gEʮrLj&q]STAkS`BOtӰkuw'#]tnS~efmt?68SA;X\D9RSPbg[]U@65ė1qO))2re͵ս44~)Xb8_`Ǧ+Y;aUrm%ih{:z[Mv̵'ڒOWu -~; AN]Sj{M9֊; L:5쒞;۝$xy$S=ŽGX⒞3)qW?@*)级^a?οȞ|S΋))>z;Yqȩ0}9IMN98Ufh'Nq쒘ӛ񏥺2HBhC\*ֶ>gĔ8X:wiNHi6I4ɵAIsn0 @8[3-t~댄c*[OSz}S}Nxa1vtg?{RaԨE<ߗ\LjƋc{H(.PbO䄊[Z֟{KuM]ZXlccK۵9>%h}_]|gAEUĆ9 k[IEm2INWn_+/yhq$9{l68q'I-1rjچ=AN֎﬙نm*YÄ"5EAbKQejHGcI 씔'&ugkl%$9#yTln(#Hb*=]%4 Oc Htq-.s#WhX4 c~.Oȳ> '<Z'YaW yNJ#;B%KPOJ@41yR!C]e(ҖuN~?D6⒭Q<N[TmV -SI%(d7WJj]G[sˉbuIVJ]%)%(I IJI $$JRRRRRRRS$IJIJIJIJIJI JRJ{ϩпͻw̤;A$H!&Ze"W/O?Cx-%2>Ou l'3q\г홞7# Sttz60ʎTSWY` V}cqUYz<6$kJ)sqH;t{ɶ>H)ŷ:SK Rۡ_WVnU6^Cv< T?ީҺ̪HsZa1IM103)2)nFN{G%/O-u8-uojIi:|]hh`{aMuIMlYsͩL16?{ϲJz~_V#>emmw-ӣ4IO5:TrLSMNi\K#Rep- \*]C,?p ,/=Q$ct' n)${I5N}n y]mf}I8ulPS/]G\Ǻ?S3 } N.2o? ]))VQeseoTkCNϷrm*iѾipۘy9 t 1o߻=ڟ2ݕvFHg_Ȧ2Zy&EoQUpÚwE0|JkkGUV |"{ˊJFu*RЕ!~B*\h )tI*I )tJZRR)I!xIJIJIJIK$$$$$$$$IKJRJRJRJRJRJ\$S}Kvm۸wve$$$$$/Yk}b |4a?IN54eI䒖hg '⊖~l=ԾOUMPH3D%a鵭ǗRS#df7;.=ZR8?|o8.@fT^[XJF|S0t(I"RSQzchyq*-_ْ7D@F L\HWf2 gHrͳ Zje7^~[vH*1SstMJw7!):;{=[*ҊIc2k7^R, lm-!G=h|SW/Sv6'vD=o˿t1>?[EI~Q`mǥ2v )>?KvhÙl)1qMZ4qSݍnY[6{O$ gaxvGnt<}) !Hi7p)H}`V1ǒ%>uPX7$kUѷw%=λz=\LR9 |J y}nLjkK@;חKu]i IK5-؂ [Xjs/-24#O:Dmopn肝>dNɻ"jg-{isKtL"`i:o fbM,J{vהVH۝^ٰ5;h``dH>azeZruN78-__YzUX?A9Lp̊CSLm.O)j())7NbԐ%#ISkKroPNKŻug=)Y}?r丐}qe Zwk"Jdz3Hv{EVgUUm!s*䨪?>ᱟ'ҙbu;v1x&}ev6?7w?ڠ,&̫lэhU徾l?QJ#d{N2)Welq:5?EH!9jR)I)I)I)A J)IPIKJQIK$$ $R$$tI J]%,I*IJIJIK$RRRRS IJIJIJIJIJI+)!>B ;6{;ʻ2RRRRS ]!Ñ >L#JY($NϷ۪0 i,32+?UMZ ڤl4;pE:-h?3ҬS˧s'MT=A{Y_ްb-ƷBkKv`޳58!QV͜*`,I~dq⨂董}_ΩX.`?EOYm}۝w^sJm+3QS*(SK[LI+P %)dk%peb0i=]ڍU.w44 @rR*l [fc^4w{|vЙ?% #oe;&XM6jp JE讷 }ǽm+hOڢ=2`h*w% kcqkuHc}s٤0\W]mcÛX2I$K`73?iHw0>i)7a[X%7:}CWMbˎ? rPcq )Kr:IkL=IOk3[s [sY/uqo{4~)%}Z޻{ъPTߠ 4<_[R{y8?4Щ61)܉Iu& [jm%+lBI:e9}RGY,i<|C4&VZiIOT0$.SsA{=drz0 u[h``]`1269\0?9SxwX]ʈ2fpz\gS}>j IBw=d|U "FG -0g-8%%[&4RR]DSsr:;[>ms[幣Nz'S`]>>7}+TJPO.A)mŤq1IJ5c"I>\dG~ȤT׷ced}RSuLweh?)):XlZå>1[󒒛9t,s_kSS3.CF+|SB\k5eN>&OfJz<ں=ml`ʭ!S< { $$_Hñu[{:kc>ܛ:.c:S}hTݑi=Wb)<=/y{\e&II/WlWUXcK.Y."}R# VLzN2 uq$etp)G} "ٕbKxyj),;s;x vŔ3ɟԶ:Aj'N" rL$(&7lܫ+~E8%w\lSca|辂׸As{L]sWKN~|NW%3ykƉsZO))¯ ,dm 9%;VE.xPo>))*IS^ï۝m{㶠?|{꒛Y .59Uc⒜ҳ`1jJ{QU[Ig p~[)}//4ۏ{)xwt8A.%<U3IsN#Q:k\Y}o8JC)"Q7XUm&|?7yEO;ּ $6SͥŸ"ys!#czuW{JjtYȽ~psԠG }3MYINןױsr^3Of~`uRu,?RKKuk:U~::9@#6 S'!UJL,))-vk(%r)),Kh%sRCQ AE<4I-ݳ䒜C%5Rदs!%1))U5)x:71%%eSRV;fII, qIMaa:TcAOMS$$Զ \y< $R&?Bसs@zK\k?6h?Y!xV1\¥B)I)I!tJRJRJRJPIKRJ%$IRJRJ]%)%.IK$%,IJI*IJIJIJIJIJIJIJ )IK$$$$$ !ᆬB ;6{;ʻ2RRRRS(]OYah>G+!+ pqBBBl|q's<% `@2:d9އ;>~վߐ?X^^<WX.ھ'=U'C++#qȒWR!z#t7nOGbYƈp=#{<ػܗss2[hG#TWBuÈY">e.=!p}.+=ڱ˵ܽyKv =ڌQ{q@)pꀗWK++24!.#/n?G-}wRU~_kk}wRU2DXeZ% + m\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$';HnœgնRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRSPmUɻsFfRJRJRJRJRJysʤY6|[i)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%)%>\1j&e$$$$$QuJVZH:i[1wXӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽӿuʽޙOIӨٝLMh.RJRJRJRJRJku :ef˜Ѥ4@Ng?r{,=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^1_פo{gu^%=zOv?ܗ{+wW?r^14uJJ\ى!0^ PJRRRRS%gR9v|hIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIO?/n ;.-@ΤITŻ]!Z.jRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRS_Kۿ˻gP3%)%)%)%)%<_f)n×gV͔d#k/,(S #܄aCTpӭ@?4刈JRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJ}kYwYwtqlu$$$$$K>-r sTRHڧ5r,Fxy8ᏹ_:S]Za?l=i=GH~OC[X~7Fq؍O6tsփQI)BJi= (bc]v<4~D j» kx-j"$$$$$$$$$C?oKYc\``;/01OXuXYk]Lؔ1-秬RJRJ}kYwYwtqlu$$$$$K>-r sTxe~D?*8pO1/g9jo ǓA?ޒqqx!v8[)hs@v*($qJUrIM4Pd7: M$ }Of/ul`/q.cD{WBG+Vg׼;iceӵf):">2k}mqtjY8EvE>_+hË#@Rˆ(:Gռia8&1h ;]SZf`lh4H:xx`YNU_r 'S]{ݟ6KV$uiN`\Ur>Xak1c8]k`Ɇ&~ ?x2%K#i{7v!I 1 @ h||%mfCO!sû6m2W IJIO?/n ;.-@ΤITŻ]!Z.jRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRZ+9'O0: Kxh<1oC<%artZǁjT#BHXIzNտg_'+y_{]]~_7融u`Njs&c.~[77I6{5k-/CIF;^e .տܭr|Ͽ;9^b8nnr(mtS^p).ƾ9-5oRa-Dv%vFwNH}AGsnA@/loSӲܷZ*=c?4)zy/͏G:˷]=Q%$ ?ȶ&49Cd;؎鳻BiWF+ŎݣaB?q8D8YVl{ kH#uFzT4ڮssKe'R_bn?kS֞gLYBC$o-Qj}nFƵΨv9ۛ['c+rBOdXo{rfW ^QY6!cI ih'OȗQ[j<}襇tf?̻[w:čbWe4~>~ֳtRY:y9w@ĖՠmQ- t ԗa|^h%)%>,,컺8z:RRRRS%gR9v|hIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIJIMVggg{/ၗs'*!Aq>}ڠKL3d+=F_b+^VQqb?ڝ5ukI 2?ё f=b]GMO溗%_xk dߤ7+K?x|c?cS7q7ǣ:Z| 1\֔FxQ7vpv9 ǿJY%=CeuzcUYbazpahݠ0 <SŶkcAxd5;y{]&,GG8ZKϒt?6tL.cI.|C*ic 1]twYF ?%G`Ts 7%H>"gxE 6, ];x=%FKqٵ% WN^I~t$qٵ )tW+|Tӌ݂dD5}voXn.=~B<$@cԭN!A/,k-s NKN4g:9nn9̃\þ(6+ws~}vjv?t {>J}q=u6͆d 2d }hοUMAga(c*N .k3(H 3gϮeeBׇ⤆>y8ɫ e$$ֿşwGXgRJRJRJRJRJy$S݇.ϐ5I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)Py!Xܭ8ٍ^geM~ޔ(4Zۆ|6WX;}S}\v[f?ޠLG76%t9~ǟ}k H5ies<2yiT;:M<99=Zx+8s1:2~u]w{W I|Aw: i]DX{dŪ0ckZ$$Map;ӤN0Un3/6x~bu\7xݨ7XwbbԒ.]kKChfLdLOcRJRJRJ}kYwYwtqlu$$$$$K>-r sTh,1}7>IZp6g ?5[)^pik: r@=ós;G_A0O[vn5s9\׫ ްpaOc׳5 enŮ+KPVSnq~m&dٓힱޱe6{xrlO t]!#z1TLme͵c\ѧǔ,t߬@Ūy"u?8ŖYO@}34U\m1 s>e3Rq^n7Yn{q*YT..4n)a(ud7Gu9t6pcFF X\Wc(c}P8h'NI@Guct+2mw[:B^ b}7ǩBvUWh`ucn pʔOm>_X+[Eopk$46MJh)27OJ+k 8:cťKZԢp۴3 nI?T ![qϲn~~5wnG+Jc9ն$ķI)'+,p"jK1eb9ջcϔ m0gY}nߥB9#F9h|?翩\уkD+ SVGI)I)g%mgeų(Ԓ_c/?a˳+ERJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJRJm[ ;E/SvO䤘IJ :3f96ǒ'ܟY,hjR}g˫#{\Y[H%ςJlxt<#tC5R#P>L[vo !)(IG*fm%[;%T̀֬10ZǵŔ @Q>j^mGb4G!SԲFum^wZ[R6AQhBSh;io6͏ uk}D˫.X^q Tn#E7Գ]c5HdҊzy3uEqoVw7L MtIJIO?/n ;.-@ΤITŻ]!Z.jRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRS*k2%!M9N E]Ḅ9+ F3xw~Of~)f|֫Z}ǯr͛ѳK9=8[ 1&nO%tr$G; ]1p:O+:U&yQ wZ8sGO x?ҹgQw9R=;!;LOeLuy&-e;RRRRRRRRRRRRRRRRRRRRRS_Kۿ˻gP3%)%)%)%)%<_f)n×gVɏ5 ≦yF/AG $nł_$|%G"R )b1K#vnIWT6zo*ėHy|W-)͎VdlsݠC|B\$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ֿşwGXgRJRJRJRJRJy$S݇.ϐ5I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)I)g%mgeų(Ԓ 5d!.k'!O=igk{*ƞ4z^Owv/^NJ;?ޗc_KWiNO+W4ox{ӷ{   # A"`"[mZw=tDş7mL@=/mZw=tDşʔgslx} |d7~ewy?6KQCX`E(`" R@%EH Fk}T,ZO)PD"`Ͻ3dvoIPxrg=~&I4Cj75Ym$>^':Y[2M2$%K  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./012345>PDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry FpܯL@@Data WordDocument ObjectPool_կLpܯL_1337765517F_կL_կLOle EPRINTCCompObjs  FMicrosoft Visio DrawingVisio 11.0 ShapesVisio.Drawing.119q Oh+'0 X`lx kirsten.harte      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~lf[ EMFw,ظF, EMF+@``FEMF+0@?@ @ @@x ?˝B??ߊD?ߊD˝B⊌DBcjDaBw;DaB DٝB" DBC&CBep % $$AAF`TEMF+@@4 ף>@$$==_888% % ;Y,FFFFFFX(:.2#62#X( =<@fq% % $$AA( FPDEMF+*@$BB??@0$r>ARIAL6@, Queensland Government Information Standard P6M@D>O@D>W@D>]@D>b@D>bh@D>[n@D> s@D>v@D>{@D>@D>X@D>N@D>@D>@D> Ў@D>0@D>@o@D>k@D>Ě@D>|@D>(y@D>@D>u@D>`Ѥ@D>ͧ@D>n@D>(k@D>8R@D>@D> c@D>@D>_@D> \@D>X@D>X@D> @D>@D>O@D>xL@D>H@D>@D>@D>@D>??   RpArialx6Owh<4``wl|x6h=|OwPwX68Pwr`w w|f||H pg" `wNw`@D>??   % TX*`A`A'LP18% F|EMF++@ *@$BB??6@H<: p@D>8Q@D>??   % TX*`A`A'LP: % FH<EMF++@ *@$BB??6@Information Security @D>@D>(@D>@D>p@D>@D>X@D>h@D>0;@D>@D>h@D>@D>@D>h.@D>DAD>MAD> AAD>AD>LAD>TAD>??   % T/*`A`A'LxInformation Security       % FEMF++@ @th TAKCTA{uC.s"C{uC.s"CKC) C3C0B3CΝBKC BcC2MBcCTAKC@( $$=='Ā%  ; Y(Z( Z( X4Z 8 =<>) % $$AAF`TEMF+@@4 ף>@$$==_888% % ; Y(Z( Z( X4Z 8 =<@*% % $$AA( F`TEMF+*@$BBTA{uC@0$=ARIAL6@Mandatory principle >F=p>F=>F=>F=+>F=>F=N?F=@ ?F=@?F=@*?F=@2?F=B?F=L?F=UR?F='b?F=`p?F=@v?F=B?F=j?F=S?F=??   ( RpArialArial x6Owh<4``wl||@|=|Ꙁ||p (! @w|pg" d||||w! !~,w @wp (dv% T,`A`A,LtMandatory principle % FtEMF++@ *@$BBTA{uC6@@41@G?F=??   % TT`A`ALP1% FtEMF++@ *@$BBTA{uC6@@4: 0?F=??   % TT`A`ALP:% FEMF++@ *@$BBTA{uC6@pdPolicyv>f>e>f>>f>>f>O>f>>f>??   % Tp5O `A`A5 LXPolicy% F|EMF++@ *@$BBTA{uC6@H<, ?f>?f>??   % TXRU `A`AR LP, % FEMF++@ *@$BBTA{uC6@ Planning g?f>`,?f>@2?f>B?f>UR?f>'b?f>@yh?f>Kx?f>`?f>??   % TX `A`AX  L`Planning % F|EMF++@ *@$BBTA{uC6@H<& ?f>@~?f>??   % TX `A`A LP& % FEMF++@ *@$BBTA{uC6@ Governance>>>>?> ?>&?>U0?>'@?>@O?>_?>n?>??   % TC {`A`AC L`Governance% FEMF++@ @th 6C9C6CC?CC?C9C5sCh!Cm[Ch!CZFC9C1CQC$CQC6C9C@$$==%  ;DY(D88X44e ef  k kD=<>  % $$AAF`TEMF+@@4 ף>@$$==_888% % ;DY(D88X44e ef  k kD=<@ % % $$AA( F0$EMF+*@$BB6CC6@Mandatory Principle m >F=4j>F=>F=a>F=>F=>F=?F=?F=?F=>)?F=%1?F=D?F=M?F=@S?F=c?F=q?F=Ex?F= ?F=4?F=?F=??   % T`A`ALtMandatory Principle % FtEMF++@ *@$BB6CC6@@45?F=??   % TT`A`ALP5% F|EMF++@ *@$BB6CC6@H<: ?F=`?F=??   % TX`A`ALP: % F4(EMF++@ *@$BB6CC6@Communications and +>f>4}>f>=>f>>f>>f>T?f>%?f>w$?f>2?f>@B?f>@iJ?f>P?f>`?f>^p?f>~?f>@??f> (?f>?f>?f>??   % T`A`ALtCommunications and  % FH<EMF++@ *@$BB6CC6@Operations Management=>'>>g>>,>>>>>>>>3>>@?>?>?>&?>>?>`N?>@2^?>n?>}?>ӆ?>?>?>`~?>??   % T`A`ALxOperations Management  % FEMF++@ @th QqDCQqD$oCxD$oCxDCDCCǃDCC24DCB}DeC wDeCQqDC@$$==%  ;x<Y(x<DDX4sCA@Q?m=mx<=<>L7 % $$AAF`TEMF+@@4 ף>@$$==_888% % ;x<Y(x<DDX4sCA@Q?m=mx<=<@M8% % $$AA( F0$EMF+*@$BBQqD$oC6@Mandatory Principle m >=4j>=>=a>=>=>=?=?=?=>)?=%1?=D?=M?=@S?=c?=q?=Ex?= ?=4?=?=??   % T3`A`ALtMandatory Principle % FtEMF++@ *@$BBQqD$oC6@@44?=??   % TT6:`A`A6LP4% F|EMF++@ *@$BBQqD$oC6@H<: ?=`?=??   % TX<?`A`A<LP: % FEMF++@ *@$BBQqD$oC6@ Physical and o>m>`>m>?m>?m>?m>E%?m>~3?m>PC?m>@I?m>@Q?m>[a?m>,q?m>@?m>??   % T&`A`A LhPhysical and % FEMF++@ *@$BBQqD$oC6@Environmental >C>>C>y>C>u?C> ?C>@?C>@&?C>5?C>M?C>g]?C>@9m?C>@ u?C>y?C>ࡅ?C>??   % T,`A`ALhEnvironmental  % FEMF++@ *@$BBQqD$oC6@ Management>>>>@?>?>~$?>P4?>@"D?>[?>k?>w{?>??   % T'"`A`A  L`Management  % FEMF++@ @th "DiC"Dk#CCDk#CCDiCj=D9C7D9C2DiCX>-DCY'DC"DhC@$$==%  ;(uY((00uX4r/-,uP+)(u=<>  @ % $$AAF`TEMF+@@4 ף>@$$==_888% % ;(uY((00uX4r/-,uP+)(u=<@ A% % $$AA( F0$EMF+*@$BB"Dk#C6@Mandatory Principle m >F=4j>F=>F=a>F=>F=>F=?F=?F=?F=>)?F=%1?F=D?F=M?F=@S?F=c?F=q?F=Ex?F= ?F=4?F=?F=??   % T `A`ALtMandatory Principle % FtEMF++@ *@$BB"Dk#C6@@43?F=??   % TT `A`ALP3% F|EMF++@ *@$BB"Dk#C6@H<: ?F=`?F=??   % TX `A`ALP: % F EMF++@ *@$BB"Dk#C6@Human Resource `>f>v>f>>f>}>f>@ ?f>b?f>I%?f>9?f>I?f>W?f>@g?f>w?f>}?f>?f>?f>??   % T$`A`A"LlHuman Resource  % FEMF++@ *@$BB"Dk#C6@ Management>>>>@?>?>~$?>P4?>@"D?>[?>k?>w{?>??   % T$1`A`A/ L`Management  % FEMF++@ @th CJCC(}CC(}CCJC#6CCmmCCCKC#Cz+CI[Cz+CCJC@$$==%  ;Y(<<X4nL=<>_1 % $$AAF`TEMF+@@4 ף>@$$==_888% % ;Y(<<X4nL=<@^2% % $$AA( F0$EMF+*@$BBC(}C6@Mandatory principle >g">p>g">>g">>g">+>g">>g">N?g">@ ?g">@?g">@*?g">@2?g">B?g">L?g">UR?g">'b?g">`p?g">@v?g">B?g">j?g">S?g">??   % Tm`A`Am LtMandatory principle % FtEMF++@ *@$BBC(}C6@@42@G?g">??   % TT`A`A LP2% F|EMF++@ *@$BBC(}C6@H<: 0?g">#?g">??   % TX`A`A LP: % FEMF++@ *@$BBC(}C6@Asset ManagementJW>w>>w>>w>z>w>>w>>w>?w>?w>`,?w>@2L?w>[?w>k?w>?w>?w>`~?w>??   % Tt`A`AtLlAsset Management  % FEMF++@ @th ,C9C,CC:TDC:TD9CDh!C Dh!C(D9CCQC(CQC,C9C@$$==%  ;Y(8%8%X4#eH"e k&k=<>R % $$AAF`TEMF+@@4 ף>@$$==_888% % ;Y(8%8%X4#eH"e k&k=<@S% % $$AA( F0$EMF+*@$BB,CC6@Mandatory principle >g">p>g">>g">>g">+>g">>g">N?g">@ ?g">@?g">@*?g">@2?g">B?g">L?g">UR?g">'b?g">`p?g">@v?g">B?g">j?g">S?g">??   % T8`A`ALtMandatory principle % FtEMF++@ *@$BB,CC6@@46@G?g">??   % TT;?`A`A;LP6% F|EMF++@ *@$BB,CC6@H<: 0?g">#?g">??   % TXAD`A`AALP: % F EMF++@ *@$BB,CC6@Access Management4.>w>z>w>}>w>>w>>w>>w>;?w>"?w>@&?w>6?w>wF?w>IV?w>@f?w>u?w>`φ?w>@?w> ?w>??   % T>`A`ALpAccess Management  % FEMF++@ @th |w % $$AAF`TEMF+@@4 ף>@$$==_888% % ; /Y( /Vd7Vd7X464B31t0 /=<@x% % $$AA( F0$EMF+*@$BB|F=p>F=>F=>F=+>F=>F=N?F=@ ?F=@?F=@*?F=@2?F=B?F=L?F=UR?F='b?F=`p?F=@v?F=B?F=j?F=S?F=??   % T]`A`ALtMandatory principle % FtEMF++@ *@$BB|h=f>+>f>c>f>́>f>o>f>>f>>f>@I?f>@?f>T!?f>%1?f>w7?f>E?f>@L?f>@S?f>;Z?f> j?f>??   % TL`A`ALpSystem Acquisition % F|EMF++@ *@$BB|?f>??   % TXPS`A`APLP, % FEMF++@ *@$BB|?f>?f>!?f>??   % TdVi`A`AVLTDev % F|EMF++@ *@$BB|?f>??   % TXls`A`AlLP& % FEMF++@ *@$BB|@R!?>$1?>u7?>GG?>??   % Tl&>`A`A&LXMaint % FtEMF++@ *@$BB|??   % TT@A`A`A@LP.% FEMF++@ @th > DY*D> D# D2P.D# D2P.DY*D(DA(D|#DA(D DY*DtDp,DjDp,D> DX*D@$$==%  ;P#*Y(P# (+ (+*X4@*6*(6*r'*&<+$<+P#*=<>5 % $$AAF`TEMF+@@4 ף>@$$==_888% % ;P#*Y(P# (+ (+*X4@*6*(6*r'*&<+$<+P#*=<@3% % $$AA( F0$EMF+*@$BB> D# D6@Mandatory principle >F=p>F=>F=>F=+>F=>F=N?F=@ ?F=@?F=@*?F=@2?F=B?F=L?F=UR?F='b?F=`p?F=@v?F=B?F=j?F=S?F=??   % TC~`A`ACLtMandatory principle % FtEMF++@ *@$BB> D# D6@@49@G?F=??   % TT~`A`ALP9% F|EMF++@ *@$BB> D# D6@H<: 0?F=#?F=??   % TX~`A`ALP: % F<0EMF++@ *@$BB> D# D6@Business Continuity M>f>ٌ>f>}>f>>f>>f>6>f>l ?f>?f>&?f>.?f>PC?f>@"S?f>b?f>j?f>,q?f>@?f> h?f>?f>?f>?f>??   % TH`A`AHLtBusiness Continuity % FEMF++@ *@$BB> D# D6@ Management>>>>@?>?>~$?>P4?>@"D?>[?>k?>w{?>??   % TX`A`AX L`Management  % FEMF++@ @th qCb0+DqCp D> Cp D> Cb0+DhCJ$)DҟCJ$)DCb0+DdVCz<-DCz<-DqCb0+D@$$==%  ;*Y((b(b*X4J*J*@*P+rP+*=<>w % $$AAF`TEMF+@@4 ף>@$$==_888% % ;*Y((b(b*X4J*J*@*P+rP+*=<@x% % $$AA( F0$EMF+*@$BBqCp D6@Mandatory principle >g">p>g">>g">>g">+>g">>g">N?g">@ ?g">@?g">@*?g">@2?g">B?g">L?g">UR?g">'b?g">`p?g">@v?g">B?g">j?g">S?g">??   % T\`A`ALtMandatory principle % FtEMF++@ *@$BBqCp D6@@48@G?g">??   % TT`d`A`A`LP8% F|EMF++@ *@$BBqCp D6@H<: 0?g">#?g">??   % TXeh`A`AeLP: % F4(EMF++@ *@$BBqCp D6@Incident ManagementQ>w>=>w>4}>w> >w>>w>S>w>>w>M?w>4 ?w>?w>*?w>:?w>@pJ?w>BZ?w>j?w>y?w>ˈ?w>?w>`?w>??   % Tf`A`ALtIncident Management  % FEMF++@ @th gjWDgj*DgjWDD|xDD|xDgj*D0*sDO^(DEmDO^(DygDgj*DbD~v,Dü\D~v,DgjWDfj*D@$$==%  ;5*Y(5' >' >*X4<*R;*9*8+07+5*=<>]~ % $$AAF`TEMF+@@4 ף>@$$==_888% % ;5*Y(5' >' >*X4<*R;*9*8+07+5*=<@\}% % $$AA( F0$EMF+*@$BBgjWDD6@Mandatory principle 0=g">P>g">>g">>g">Z>g">>g">>g">7 ?g">?g">"?g">*?g">@:?g">@D?g">mJ?g">>Z?g">wh?g">n?g">@~?g">v?g">`_?g">??   % Th`A`AhLtMandatory principle % F|EMF++@ *@$BBgjWDD6@H<10R?g">;?g">??   % TX`A`ALP10% F|EMF++@ *@$BBgjWDD6@H<: $?g"> ?g">??   % TX`A`ALP: % FH<EMF++@ *@$BBgjWDD6@Compliance Managementd=w>X >w>J>w>>w>V>w>>w>>w>A>w>@r?w>@?w>}$?w>d,?w>D?w>S?w>@c?w>s?w>`?w>@?w> p?w>Y?w>A?w>??   % Tc`A`AcLxCompliance Management   % FEMF++@ @L@ ף>A@@, ˝B{uCwBt%C@( $$==_888% '%  ;Z6X4 6 ZX4 _ bbb^Z=6*X4&"" "&*6X4 = 6j X4f b b b f j 6 X4      = 6 X4      6 X4 " " "   =Z 6 X4      6Z X4_ b b b ^ Z = 6* X4& " " " & * 6 X4      = 6j X4f b b b f j 6 X4      =<?^c % % $$AA( FEMF+@L@ ף>A@@4(C(}CCbBACbB@$$==_888% %  ;6cX4_[[["_"c6"X4"=6X4""6"X4"=S6 X4    " " 6"SX4"W[[[WS= 6# X4    " "# 6" X4"      = 6c X4_ [ [ [ "_ "c 6" X4"      = 6 X4    " " 6" X4"      =S 6 X4    " " 6"S X4"W [ [ [ W S = 6# X4    " "# 6" X4"      = 6c X4_ [ [ [ "_ "c 6" X4"      = 6X4""6" X4"      =S6X4""6"SX4"W[[[WS=6#X4""#6"X4"=6X(6)X4-111-)Y(""X4"=<?i % % $$AA( FEMF+@L@ ף>A@@4(2Dk#C2D>CD@D>C@$$==_888% %  ;,6,UX4,P,M,M,M,P,U6,X4,,,,,,=,6,X4,,,,,,6,X4, , , , , ,=,E6,X4,,,,,,6,EX4,I,M,M,M,I,E=,6,X4,, , , ,,6,X4,,,,,,=, 6,U X4,P ,M ,M ,M ,P ,U 6, X4, , , , , , =, 6, X4, , , , , , 6, X4, , , , , , =,E 6, X(, , , 6, X4, , , , , , Y(, , ,E X4,I ,M ,M ,M ,I ,E = - 6}- X4- - - - - }- 6 - X4 - - - - - - =- 6=. X4A. E. E. E. A. =. 6- X4- - - - - - =. 6. X4/ / / / / . 6. X4. . . . . . =M/ 6/ X4/ / / / / / 6M/ X4I/ E/ E/ E/ I/ M/ = 0 60 X40 0 0 0 0 0 6 0 X4 0 0 0 0 0 0 =<? % % $$AA( FEMF+@L@ ף>A@@4(14D$oC14DfBDfB@$$==_888% %  ;@6@X4@@@@@@6@X4@@@@@@=@?6@ X4@ @ @ @ @ @ 6@?X4@D@G@G@G@D@?=@ 6@ X4@ @ @ @ @ @ 6@ X4@ @ @ @ @ @ =@ 6@O X4@K @G @G @G @K @O 6@ X4@ @ @ @ @ @ =@ 6@ X4@ @ @ @ @ @ 6@ X4@ @ @ @ @ @ =@? 6@ X4@ @ @ @ @ @ 6@? X4@D @G @G @G @D @? =@ 6@ X4@ @ @ @ @ @ 6@ X4@ @ @ @ @ @ =@ 6@O X4@K @G @G @G @K @O 6@ X4@ @ @ @ @ @ =@6@X4@@@@@@6@X4@ @ @ @ @ @=@?6@X4@@@@@@6@?X4@D@G@G@G@D@?=@6@X4@ @@@@ @6@X4@@@@@@=@6@OX4@K@G@G@G@K@O6@X4@@@@@@=@Y(@@|@X4x@t@t@t@x@|@6@X(@@@6@X4@@@@@@=<?Y  % % $$AA( FEMF+@L@ ף>A@@4(ZFCCZFCZBDHCZB@$$==_888% %  ;^ 86^ X4^ b f k n n 6n 8X4n <k @f @b @^ <^ 8=^ x6^ X4^ b f k n n 6n xX4n |k f b ^ |^ x=^ 6^ HX4^ Cb @f @k @n Cn H6n X4n k f b ^ ^ =^ 6^ X4^ b f k n n 6n X4n k f b ^ ^ =^ 86^ X4^ b f k n n 6n 8X4n <k @f @b @^ <^ 8=^ x6^ X4^ b f k n n 6n xX4n |k f b ^ |^ x=^ 6^ HX4^ Cb @f @k @n Cn H6n X4n k f b ^ ^ =^ 6^ X4^ b f k n n 6n X4n k f b ^ ^ =^ 86^ X4^ b f k n n 6n 8X4n <k @f @b @^ <^ 8=^ x6^ X4^ b f k n n 6n xX4n |k f b ^ |^ x=^ 6^ HX4^ Cb @f @k @n Cn H6n X4n k f b ^ ^ =^ 6^ X4^ b f k n n 6n X4n k f b ^ ^ =^ 86^ X4^ b f k n n 6n 8X4n <k @f @b @^ <^ 8=^ x6^ X4^ b f k n n 6n xX4n |k f b ^ |^ x=^ 6^ HX4^ Cb @f @k @n Cn H6n X4n k f b ^ ^ =^ 6^ X4^ b f k n n 6n X4n k f b ^ ^ =^ 86^ X4^ b f k n n 6n 8X4n <k @f @b @^ <^ 8=^ x 6^  X4^  b f k n  n  6n x X4n | k f b ^ | ^ x =^ 6^ H X4^ C b @ f @ k @ n C n H 6n X4n k f b ^ ^ =^ 6^ X4^ b f k n n 6n X4n k f b ^ ^ =^ 8 6^ X4^ b f k n n 6n 8 X4n < k @ f @ b @ ^ < ^ 8 =^ x 6^  X4^  b f k n  n  6n x X4n | k f b ^ | ^ x =^ 6^ H X4^ C b @ f @ k @ n C n H 6n X4n k f b ^ ^ =^ 6^ X4^ b f k n n 6n X4n k f b ^ ^ =^ 86^ X4^ b f k n n 6n 8X4n <k @f @b @^ <^ 8=^ x6^ X4^ b f k n n 6n xX4n |k f b ^ |^ x=^ 6^ X(^ b f 6 X4      Y(f n n X4n k f b ^ ^ =<?h % % $$AA( FEMF+@L@ ף>A@@4((DC(DBDB@$$==_888% %  ; 86 X4      6 8X4 < @ @ @ < 8= x6 X4      6 xX4 |    | x= 6 HX4 C @ @ @ C H6 X4      = 6 X4      6 X4      = 86 X4      6 8X4 < @ @ @ < 8= x6 X4      6 xX4 |    | x= 6 HX4 C @ @ @ C H6 X4      = 6 X4      6 X4      = 86 X4      6 8X4 < @ @ @ < 8= x6 X4      6 xX4 |    | x= 6 HX4 C @ @ @ C H6 X4      = 6 X4      6 X4      = 86 X4      6 8X4 < @ @ @ < 8= x6 X4      6 xX4 |    | x= 6 HX4 C @ @ @ C H6 X4      = 6 X4      6 X4      = 86 X4 6 8X4 < @ @ @ < 8= x 6  X4    6 x X4 | | x = 6 H X4 C @ @ @ C H 6 X4 = 6 X4 6 X4 = 8 6 X4 6 8 X4 < @ @ @ < 8 = x 6  X4    6 x X4 | | x = 6 H X4 C @ @ @ C H 6 X4 = 6 X4      6 X4   = 86 X4      6 8X4 < @ @ @ < 8= x6 X4      6 xX4 |    | x= 6 HX4 C @ @ @ C H6 X4      =<? b % % $$AA( FEMF+@L@ ף>A@@4(MD}CMDj BMDj B@$$==_888% %  ;:3V6:3X4:3=3B3F3J3J36J3VX4J3ZF3^B3^=3^:3Z:3V=:36:3&X4:3"=3B3F3J3"J3&6J3X4J3F3B3=3:3:3=:36:3fX4:3b=3^B3^F3^J3bJ3f6J3X4J3F3B3=3:3:3=:36:3X4:3=3B3F3J3J36J3X4J3F3B3=3:3:3=:3V6:3X4:3=3B3F3J3J36J3VX4J3ZF3^B3^=3^:3Z:3V=:36:3&X4:3"=3B3F3J3"J3&6J3X4J3F3B3=3:3:3=:36:3fX4:3b=3^B3^F3^J3bJ3f6J3X4J3F3B3=3:3:3=:36:3X4:3=3B3F3J3J36J3X4J3F3B3=3:3:3=:3V6:3X4:3=3B3F3J3J36J3VX4J3ZF3^B3^=3^:3Z:3V=:36:3&X4:3"=3B3F3J3"J3&6J3X4J3F3B3=3:3:3=:36:3fX4:3b=3^B3^F3^J3bJ3f6J3X4J3F3B3=3:3:3=:36:3X4:3=3B3F3J3J36J3X4J3F3B3=3:3:3=:3V6:3X4:3=3B3F3J3J36J3VX4J3ZF3^B3^=3^:3Z:3V=:36:3&X4:3"=3B3F3J3"J3&6J3X4J3F3B3=3:3:3=:36:3fX4:3b=3^B3^F3^J3bJ3f6J3X4J3F3B3=3:3:3=:36:3X4:3=3B3F3J3J36J3X4J3F3B3=3:3:3=:3V6:3 X4:3 =3 B3 F3 J3 J3 6J3VX4J3ZF3^B3^=3^:3Z:3V=:3 6:3& X4:3" =3 B3 F3 J3" J3& 6J3 X4J3 F3 B3 =3 :3 :3 =:3 6:3f X4:3b =3^ B3^ F3^ J3b J3f 6J3 X4J3 F3 B3 =3 :3 :3 =:3 6:3 X4:3 =3 B3 F3 J3 J3 6J3 X4J3 F3 B3 =3 :3 :3 =:3V 6:3 X4:3 =3 B3 F3 J3 J3 6J3V X4J3Z F3^ B3^ =3^ :3Z :3V =:3 6:3& X4:3" =3 B3 F3 J3" J3& 6J3 X4J3 F3 B3 =3 :3 :3 =:3 6:3f X4:3b =3^ B3^ F3^ J3b J3f 6J3 X4J3 F3 B3 =3 :3 :3 =:3 6:3X4:3=3B3F3J3J36J3 X4J3 F3 B3 =3 :3 :3 =:3V6:3X4:3=3B3F3J3J36J3VX4J3ZF3^B3^=3^:3Z:3V=:36:3&X4:3"=3B3F3J3"J3&6J3X4J3F3B3=3:3:3=:36:3fX4:3b=3^B3^F3^J3bJ3f6J3X4J3F3B3=3:3:3=:36:3X4:3=3B3F3J3J36J3X4J3F3B3=3:3:3=:3V6:3QX(:3L=3IB3I6~3IX43I3L3Q3U3Y~3YY(B3YJ3QJ3VX4J3ZF3^B3^=3^:3Z:3V=<?2S: % % $$AA( FEMF+@L@ ף>A@@4(Cp DCFB!CFB@$$==_888% %  ;8(68'X48';'@'D'H'H'6H(X4H!(D%(@%(;%(8!(8(=8]'68&X48&;&@&D&H&H&6H]'X4Ha'De'@e';e'8a'8]'=8&68-&X48(&;%&@%&D%&H(&H-&6H&X4H&D&@&;&8&8&=8%68m%X48h%;e%@e%De%Hh%Hm%6H%X4H%D%@%;%8%8%=8%68$X48$;$@$D$H$H$6H%X4H!%D%%@%%;%%8!%8%=8]$68#X48#;#@#D#H#H#6H]$X4Ha$De$@e$;e$8a$8]$=8#68-#X48(#;%#@%#D%#H(#H-#6H#X4H#D#@#;#8#8#=8"68m"X48h";e"@e"De"Hh"Hm"6H"X4H"D"@";"8"8"=8"68!X48!;!@!D!H!H!6H"X4H!"D%"@%";%"8!"8"=8]!68 X48 ; @ D H H 6H]!X4Ha!De!@e!;e!8a!8]!=8 68- X48( ;% @% D% H( H- 6H X4H D @ ; 8 8 =868mX48h;e@eDeHhHm6HX4HD@;88=868X48;@DHH6HX4H!D%@%;%8!8=8]68X48;@DHH6H]X4HaDe@e;e8a8]=868-X48(;%@%D%H(H-6HX4HD@;88=868mX48h;e@eDeHhHm6HX4HD@;88=868X48;@DHH6HX4H!D%@%;%8!8=8]68X48;@DHH6H]X4HaDe@e;e8a8]=868-X48(;%@%D%H(H-6HX4HD@;88=868mX48h;e@eDeHhHm6HX4HD@;88=868X48;@DHH6HX4H!D%@%;%8!8=8]68X48;@DHH6H]X4HaDe@e;e8a8]=868-X48(;%@%D%H(H-6HX4HD@;88=868mX48h;e@eDeHhHm6HX4HD@;88=868X48;@DHH6HX4H!D%@%;%8!8=8]68X48;@DHH6H]X4HaDe@e;e8a8]=868-X48(;%@%D%H(H-6HX4HD@;88=868mX48h;e@eDeHhHm6HX4HD@;88=868X48;@DHH6HX4H!D%@%;%8!8=8]68X48;@DHH6H]X4HaDe@e;e8a8]=868-X48(;%@%D%H(H-6HX4HD@;88=868mX48h;e@eDeHhHm6HX4HD@;88=868X48;@DHH6HX4H!D%@%;%8!8=8]68X48;@DHH6H]X4HaDe@e;e8a8]=868-X48(;%@%D%H(H-6HX4HD@;88=8 68m X48h ;e @e De Hh Hm 6H X4H D @ ; 8 8 =8 68 X48 ; @ D H H 6H X4H! D% @% ;% 8! 8 =8] 68 X48 ; @ D H H 6H] X4Ha De @e ;e 8a 8] =8 68- X48( ;% @% D% H( H- 6H X4H D @ ; 8 8 =8 68m X48h ;e @e De Hh Hm 6H X4H D @ ; 8 8 =8 68 X48 ; @ D H H 6H X4H! D% @% ;% 8! 8 =8] 68X48;@DHH6H] X4Ha De @e ;e 8a 8] =868-X48(;%@%D%H(H-6HX4HD@;88=868mX48h;e@eDeHhHm6HX4HD@;88=8Y(8@@X4;888;@6@X(DHH6HX4H!D%@%;%8!8=<?2i6 % % $$AA( FEMF+@L@ ף>A@@4( D# D D(B;D(B@$$==_888% %  ;j' (6j''X4j''n''r''w''z''z''6z' (X4z'(w'(r'(n'(j'(j' (=j'I'6j'&X4j'&n'&r'&w'&z'&z'&6z'I'X4z'N'w'Q'r'Q'n'Q'j'N'j'I'=j'&6j'&X4j'&n'&r'&w'&z'&z'&6z'&X4z'&w'&r'&n'&j'&j'&=j'%6j'Y%X4j'U%n'Q%r'Q%w'Q%z'U%z'Y%6z'%X4z'%w'%r'%n'%j'%j'%=j' %6j'$X4j'$n'$r'$w'$z'$z'$6z' %X4z'%w'%r'%n'%j'%j' %=j'I$6j'#X4j'#n'#r'#w'#z'#z'#6z'I$X4z'N$w'Q$r'Q$n'Q$j'N$j'I$=j'#6j'#X4j'#n'#r'#w'#z'#z'#6z'#X4z'#w'#r'#n'#j'#j'#=j'"6j'Y"X4j'U"n'Q"r'Q"w'Q"z'U"z'Y"6z'"X4z'"w'"r'"n'"j'"j'"=j' "6j'!X4j'!n'!r'!w'!z'!z'!6z' "X4z'"w'"r'"n'"j'"j' "=j'I!6j' X4j' n' r' w' z' z' 6z'I!X4z'N!w'Q!r'Q!n'Q!j'N!j'I!=j' 6j' X4j' n' r' w' z' z' 6z' X4z' w' r' n' j' j' =j'6j'YX4j'Un'Qr'Qw'Qz'Uz'Y6z'X4z'w'r'n'j'j'=j' 6j'X4j'n'r'w'z'z'6z' X4z'w'r'n'j'j' =j'I6j'X4j'n'r'w'z'z'6z'IX4z'Nw'Qr'Qn'Qj'Nj'I=j'6j'X4j'n'r'w'z'z'6z'X4z'w'r'n'j'j'=j'6j'YX4j'Un'Qr'Qw'Qz'Uz'Y6z'X4z'w'r'n'j'j'=j' 6j'X4j'n'r'w'z'z'6z' X4z'w'r'n'j'j' =j'I6j'X4j'n'r'w'z'z'6z'IX4z'Nw'Qr'Qn'Qj'Nj'I=j'6j'X4j'n'r'w'z'z'6z'X4z'w'r'n'j'j'=j'6j'YX4j'Un'Qr'Qw'Qz'Uz'Y6z'X4z'w'r'n'j'j'=j' 6j'X4j'n'r'w'z'z'6z' X4z'w'r'n'j'j' =j'I6j'X4j'n'r'w'z'z'6z'IX4z'Nw'Qr'Qn'Qj'Nj'I=j'6j'X4j'n'r'w'z'z'6z'X4z'w'r'n'j'j'=j'6j'YX4j'Un'Qr'Qw'Qz'Uz'Y6z'X4z'w'r'n'j'j'=j' 6j'X4j'n'r'w'z'z'6z' X4z'w'r'n'j'j' =j'I6j'X4j'n'r'w'z'z'6z'IX4z'Nw'Qr'Qn'Qj'Nj'I=j'6j'X4j'n'r'w'z'z'6z'X4z'w'r'n'j'j'=j'6j'YX4j'Un'Qr'Qw'Qz'Uz'Y6z'X4z'w'r'n'j'j'=j' 6j'X4j'n'r'w'z'z'6z' X4z'w'r'n'j'j' =j'I6j'X4j'n'r'w'z'z'6z'IX4z'Nw'Qr'Qn'Qj'Nj'I=j'6j'X4j'n'r'w'z'z'6z'X4z'w'r'n'j'j'=j'6j'YX4j'Un'Qr'Qw'Qz'Uz'Y6z'X4z'w'r'n'j'j'=j' 6j'X4j'n'r'w'z'z'6z' X4z'w'r'n'j'j' =j'I6j'X4j'n'r'w'z'z'6z'IX4z'Nw'Qr'Qn'Qj'Nj'I=j'6j'X4j'n'r'w'z'z'6z'X4z'w'r'n'j'j'=j' 6j'Y X4j'U n'Q r'Q w'Q z'U z'Y 6z' X4z' w' r' n' j' j' =j' 6j' X4j' n' r' w' z' z' 6z' X4z' w' r' n' j' j' =j'I 6j' X4j' n' r' w' z' z' 6z'I X4z'N w'Q r'Q n'Q j'N j'I =j' 6j' X4j' n' r' w' z' z' 6z' X4z' w' r' n' j' j' =j' 6j'Y X4j'U n'Q r'Q w'Q z'U z'Y 6z' X4z' w' r' n' j' j' =j' 6j' X4j' n' r' w' z' z' 6z' X4z' w' r' n' j' j' =j'I 6j'X4j'n'r'w'z'z'6z'I X4z'N w'Q r'Q n'Q j'N j'I =j'6j'X4j'n'r'w'z'z'6z'X4z'w'r'n'j'j'=j'6j'YX4j'Un'Qr'Qw'Qz'Uz'Y6z'X4z'w'r'n'j'j'=j' 6j'X4j'n'r'w'z'z'6z' X4z'w'r'n'j'j' =j'I6j'X4j'n'r'w'z'z'6z'IX4z'Nw'Qr'Qn'Qj'Nj'I=<?u[z % % $$AA( FEMF+@|p )&BnCWqBC)&BC)&BnClm@nClm@9CWqB9CWqBC)&BC)&BnClm@nC@( $$=='%  % [TF= nn<n<((n<n%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,(E>[nnW8E><n<((n<n% % $$AA( FEMF+*@$BBlm@C@0$=ARIAL6@ QGIS policy t&=L> =L>m9>L>S>L>b>L>:>L>>L>>L>>L>.>L>J>L>?L>??   ( RpArial |' _" ]z$ | |{||  " " ||@|=|Ꙁ||p )! @w|pg" d |||w! !~,w @wp )dv% Td6o`A`Am LdQGIS policy % FtEMF++@ *@$BBlm@C6@@4-@ ?L>??   % TT8d9o`A`A8mLP-% FtEMF++@ *@$BBlm@C6@@4 ?L>??FEMF++@ *@$BBlm@C6@ mandatory =>/>>{b>>>>>>\>>4>>>>M>>?>??   % T n6y`A`A w L`mandatory % FEMF++@ *@$BBlm@C6@|pclauses>g>M>g>{b>g>>g>>g>Ļ>g>y>g>??   % Txy/`A`AL\clauses% FEMF++@ @|p BnC.OBCBCBnChBnChB9C.OB9C.OBCBCBnChBnC@߻( $$=='%  % [TDF} nn@n@((n@n%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,hE~[nnW8BE~@n@((n@n% % $$AA( FEMF+*@$BBhBC6@ Implementing =t=P=t= >t=A>t=U>t=>t=>t=>t=o>t=F>t=>t=@?t=z?t=??   % TH[|f`A`AHd LhImplementing % FEMF++@ *@$BBhBC6@ internal $>)[>b9>)[>l>)[>=>)[>>)[>W>)[> >)[>>)[>>)[>??   % TSepp`A`ASn L`internal % FEMF++@ *@$BBhBC6@ information = >= >> >m9> >l> >Ѕ> >Q> >> >> >"> >> >@F? >??   % TLpw{`A`ALy Ldinformation % FEMF++@ *@$BBhBC6@ security 1>>jK>>~>>>>;>>>>>>>>>>??   % TSzp`A`AS L`security % FEMF++@ *@$BBhBC6@ governance•= ?= ?1> ?_> ?> ?> ?Ų> ?z> ?/> ?L> ???   % TKw`A`AK L`governance% FEMF++@ @|p @$$==_888% % V,dEz[RnRRnW8>Ezn((RRnn% % $$AA( FEMF+*@$BBqCC6@pdQGISCF@ >>(S>>>>_>>4>>>>??   % TpLnly`A`ALwLXQGISCF% FEMF++@ @|p iCnConDCiCCiCnC,CnC,C9ConD9ConDCiCCiCnC,CnC@$$==%  % [TF .n\ ..nn(\ (\ ..nn%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,E[.n\ ..nW8En(\ (\ ..nn% % $$AA( FEMF+*@$BB,CC6@h\NTSAF$>>g>>>>>>>>??   % Tlny`A`AwLXNTSAF% F@4EMF++@ @$lm@spDJCOC( $$=='% % V0I<$<1 1 $<$% % $$AAFEMF+@@4 ף>@H<lm@chFDHCchFDHCspDlm@spDlm@chFD@$$==_888% % V0H<1 1 $<$<1% % $$AA( FEMF+*@$BBlm@spD@0$9>ARIAL6@THKEYw"?8>%@S?8>??   ( RpArialArial  |' _" ]z$ ||@|=|Ꙁ||p *! @w|pg" d|||w! !~,w @wp *dv% T`AN\]`A`AA[LTKEY % FEMF++@ *@$BBlm@spD@0$=ARIAL6@ Mandatory ?>>0?>>@g@?>>9P?>> `?>>o?>>w?>>ʃ?>> ?>>?>>??   ( RpArialArial Arial||@|=|Ꙁ||p +! @w|pg" d||||w! !~,w @wp +dv% T=jpw`A`A=u L`Mandatory % FEMF++@ *@$BBlm@spD6@ principle?@?(?@?.2?@?@8?@?RH?@?V?@?\?@?l?@?@s?@???   % T=wb`A`A= L`principle% FEMF++@ *@$BBlm@spD6@ Supporting ?l?+?l?@;?l?K?l?Q[?l?#k?l?t?l?|?l?j?l?S?l?`?+?>?@;?>?K?>?Q[?>?#k?>?t?>?|?>?j?>?S?>?`???   % T=q`A`A= LdSupporting % FEMF++@ *@$BBlm@spD6@ product non?O?(?O?.2?O?@B?O?Q?O?a?O?o?O?w?O??O?@?O? ?O???   % T=t`A`A= Ldproduct non% FtEMF++@ *@$BBlm@spD6@@4-?O???   % TTuw`A`AuLP-% FEMF++@ *@$BBlm@spD6@ mandatory?`?0?`?@g@?`?9P?`? `?`?o?`?w?`?ʃ?`? ?`???   % T=o`A`A= L`mandatory % FEMF++@ @th AǚDAxDZBxDZBǚDz>B5D&B5D9BȚDAZdDYAZdDAǚD@( $$=='Ā%  ;'Y(&l&l'X4u'uu''' ''=<> i7~ % $$AAF`TEMF+@@4 ף>@$$==_888% % ;'Y(&l&l'X4u'uu''' ''=<@h8% % $$AA( FEMF+@|p WB'DG-B)DWB)DWB'DA'DAB/DG-BB/DG-B)DWB)DWB'DA'D@( $$=='%  % [T, >)f*>f*>)L)L++f*>f*>)L)%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,"->)f*>f*>)W8-L)L++f*>f*>)L)% % $$AA( FEMF+@|p WB46DG-B8DWB8DWB46DA46DAS`>DG-BS`>DG-B8DWB8DWB46DA46D@߻( $$=='%  % [T, >-..>..>-L-L//..>..>-L-%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,"->-..>..>-W8-L-L//..>..>-L-% % $$AA( FEMF+@|p L*CnC@$$==_888% % V,E[ n   nW8EDnD( (   nDn% % $$AA( FEMF+*@$BB6CC@0$=ARIAL6@ External >#>P>#>~>#>9>#>>#>R>#>>#>>#>>#>??   ( RpArialArial Arial||@|=|Ꙁ||p ,! @w|pg" d||||w! !~,w @wp ,dv% T`k`A`Ai L`External % FEMF++@ *@$BB6CC6@ information =P>=P>>P>m9>P>l>P>Ѕ>P>Q>P>>P>>P>">P>>P>@F?P>??   % Tkv`A`At Ldinformation % FEMF++@ *@$BB6CC6@ security 1>>jK>>~>>>>;>>>>>>>>>>??   % Tu`A`A~ L`security % FEMF++@ *@$BB6CC6@ governance•=?>=?>1>?>_>?>>?>>?>Ų>?>z>?>/>?>L>?>??   % T`A`A L`governance% FEMF++@ @|p CnCnCCCCCnCNCnCNC9CnC9CnCCCCCnCNCnC@( $$=='%  % [TF nncnc((ncn%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,E[nnW8Ecnc((ncn% % $$AA( FEMF+*@$BBNCC6@pdQGISCS>>P>><>>>>>>I>>??   % Tpny`A`AwLXQGISCS% FEMF++@ @x ߊD˝BߊD>C?>C?˝B?BՙQe % $$AAF`TEMF+@@4 ף>@$$==_888% % ;FFY,FF  X( 2#62#X(.:FF=<@Pf% % $$AA( FEMF+@|p 6R{DnCDC6R{DC6R{DnCQqDnCQqD9CD9CDC6R{DC6R{DnCQqDnC@( $$=='%  % [TF >n@>>nx>nx@$$==_888% % V,E[>n@>>nW8Ex>nx>(S>>>>_>>4>>>>??   % Tpny`A`AwLXQGISCF% FEMF++@ @|p zXDnC3DCzXDCzXDnCDnCD9C3D9C3DCzXDCzXDnCDnC@$$==%  % [TFN CnDCCnPAnPA(D(DCCnPAn%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,9EO[CnDCCnW8EOPAnPA(D(DCCnPAn% % $$AA( FEMF+*@$BBDC6@pdQGISCS>>P>><>>>>>>I>>??   % Tp"nBy`A`A"wLXQGISCS% FEMF++@ @|p mC?C8$CDDmCDDmC?CB?CBD8$CD8$CDDmCDDmC?CB?C@$$==%  % [TlE " P " " B$P B$P " " %  % $$AAF`TEMF+@@4 ף>@$$==_888% % V, " P " " W8kFB$P B$P " " % % $$AA( FEMF+*@$BBBDD6@h\NTSAF$>>g>>>>>>>>??   % Tl| +`A`A|)LXNTSAF% FEMF++@ @|p OC?CbCDDOCDDOC?CL*C?CL*CDbCDbCDDOCDDOC?CL*C?C@$$==%  % [TE  ,   B$,B$,  %  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,  , W8F  B$,B$,  % % $$AA( FEMF+*@$BBL*CDD6@pdQGISCF@ >>(S>>>>_>>4>>>>??   % Tp +`A`A)LXQGISCF% FEMF++@ @|p ÙB?CZeBDDÙBDDÙB?C)&B?C)&BDZeBDZeBDDÙBDDÙB?C)&B?C@$$==%  % [T)cE $  B$$B$$  %  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,Nd $  W8(dFB$$B$$  % % $$AA( FEMF+*@$BB)&BDD6@\PQGAFy9>>>>>>y>>??   % Td; S+`A`A;)LTQGAF% FEMF++@ @|p ΋C?CACDD΋CDD΋C?CqC?CqCDACDACDD΋CDD΋C?CqC?C@$$==%  % [T+E z z zB$B$ z z%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,, z z zW8,FB$B$ z z% % $$AA( FEMF+*@$BBqCDD6@pdQGISCS>>P>><>>>>>>I>>??   % Tp +`A`A)LXQGISCS% FEMF++@ @|p D?CFDDDDDDD?CD?CDDFDDFDDDDDDD?CD?C@$$==%  % [TVE $$R% $$ $$!!B$R%B$R% $$ $$!%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,AW $$R% $$ $$W8WF!!B$R%B$R% $$ $$!% % $$AA( FEMF+*@$BBDDD6@\PQGAFy9>>>>>>y>>??   % Td. F+`A`A.)LTQGAF% FEMF++@ @|p [C?CaDDD[CDD[C?CvC?CvCDaDDaDDD[CDD[C?CvC?C@$$==%  % [TE Lz L LB$z B$z L L%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,  Lz L LW8 FB$z B$z L L% % $$AA( FEMF+*@$BBvCDD6@pdQGISCF@ >>(S>>>>_>>4>>>>??   % Tp +`A`A)LXQGISCF% FEMF++@ @|p YD?C^DDD YDDD YD?C:TPD?C:TPDD^DD^DDD YDDD YD?C:TPD?C@$$==%  % [TA{E r67 r6 r644B$7B$7 r6 r64%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,f| r67 r6 r6W8@|F44B$7B$7 r6 r64% % $$AA( FEMF+*@$BB:TPDDD6@h\NTSAF$>>g>>>>>>>>??   % TlQ l+`A`AQ)LXNTSAF% FEMF++@ @|p chFD?C!KDDDchFDDDchFD?C}/>/B$2B$2 1 1>/%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,. 12 1 1W8.F>/>/B$2B$2 1 1>/% % $$AA( FEMF+*@$BB}>>>>>y>>??   % Td +`A`A)LTQGAF% FEMF++@ @|p YC2D> C46DYC46DYC2DC2DCDD> CDD> C46DYC46DYC2DC2D@$$==%  % [T=w 4,b-4-4,,@1b@1b-4-4,,%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,bx4,b-4-4,W8<x,@1b@1b-4-4,,% % $$AA( FEMF+*@$BBC46D6@ Information p=$==$=Q">$=<>$=jo>$=>$=>$=O>$='>$=l>$=!>$=?$=??   % TEp`A`AE LdInformation % F EMF++@ *@$BBC46D6@security event 8<x>=x>>x>#/>x>b>x>>x>>x>Ǘ>x>>x>>x>p>x>>x>!?x>?x>@g?x>??   % T@t`A`A@Llsecurity event % FEMF++@ *@$BBC46D6@ and incident R=3>&=3>)>3>g]>3>w>3>Ѕ>3>>3>>3>>3>>3>P>3>?3>n ?3>??   % TDs`A`AD Lhand incident % FEMF++@ *@$BBC46D6@ reporting >>$>>6X>>Ѕ>>>>>>>>>>>>p>>??   % TJm`A`AJ L`reporting % FEMF++@ *@$BBC46D6@ standard and h:=">=">=">)>">V]>">`>">>">y>">.>">>">>">?">?">??   % TBu `A`AB Lhstandard and % FEMF++@ *@$BBC46D6@ spreadsheet(x=M?=M?>M?v>>M?q>M?>M?Z>M?v>M?+>M?>M?J?M???   % TC r`A`AC Ldspreadsheet% FEMF++@ @|p ΋C2DAC46D΋C46D΋C2DqC2DqCDDACDDAC46D΋C46D΋C2DqC2D@߻( $$=='%  % [T+ z,-z-z,,@1@1-z-z,,%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,,z,-z-z,W8,,@1@1-z-z,,% % $$AA( FEMF+*@$BBqC46D6@ Information p=t==t=Q">t=<>t=jo>t=>t=>t=O>t='>t=l>t=!>t=?t=??   % T%`A`A LdInformation % FEMF++@ *@$BBqC46D6@ security 1>)[>jK>)[>~>)[>>)[>;>)[>>)[>>)[>>)[>>)[>??   % T`A`A L`security % FEMF++@ *@$BBqC46D6@ incident > >1> >e> >> >> >> >U> > > >> >??   % T`A`A L`incident % FEMF++@ *@$BBqC46D6@ category ) >>b9>>l>>=>>>>>>\>>>>>>??   % T `A`A L`category % FEMF++@ *@$BBqC46D6@ guidelinee> ?6> ?9j> ?~> ?> ?˲> ?> ?U> ? > ???   % T `A`A L`guideline% FEMF++@ @|p D2DgjD46DD46DD2D> D2D> DDDgjDDDgjD46DD46DD2D> D2D@߻$$==%  % [T5n %,&-%-%,P#,P#@1&@1&-%-%,P#,%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,Yo%,&-%-%,W83oP#,P#@1&@1&-%-%,P#,% % $$AA( FEMF+*@$BB> D46D6@ Business >#>>>#>q>#>>#>]>#>>#>>#>>#>>#>??   % TAd`A`AA L`Business % FEMF++@ *@$BB> D46D6@ continuity X=P>e'>P>Z>P>>P>>P>9>P>>P>>P>>P>>P>>P>??   % T@d`A`A@ Ldcontinuity % FEMF++@ *@$BB> D46D6@xplan doc>>B4>>H>>6|>>З>>>>\>>>>??   % T|Aa`A`AAL\plan doc% F|EMF++@ *@$BB> D46D6@H<. .>>>>??   % TXbd`A`AbLP. % FEMF++@ *@$BB> D46D6@ guidelinee>?>6>?>9j>?>~>?>>?>˲>?>>?>U>?> >?>??   % TAc `A`AA  L`guideline% FEMF++@ @|p )D2D2P.D46D)D46D)D2D# D2D# DDD2P.DDD2P.D46D)D46D)D2D# D2D@߻$$==%  % [T f*,+-f*-f*, (, (@1+@1+-f*-f*, (,%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,f*,+-f*-f*,W8 (, (@1+@1+-f*-f*, (,% % $$AA( FEMF+*@$BB# D46D6@ Disaster >#>U>#>9j>#>9>#>>#> >#>>#>>#>>#>??   % T`A`A L`Disaster % FEMF++@ *@$BB# D46D6@ recovery 4 >P>)>P>g]>P>Ѕ>P>>P>>P>V>P>>P>>P>??   % T`A`A L`recovery % FEMF++@ *@$BB# D46D6@ planning >>A>>U>>>>9>>>>3>>>>>>??   % T`A`A L`planning % FEMF++@ *@$BB# D46D6@ guidelinee>?>6>?>9j>?>~>?>>?>˲>?>>?>U>?> >?>??   % T `A`A  L`guideline% FEMF++@ @|p 2PjD2D oD46D2PjD46D2PjD2DM`D2DM`DDD oDDD oD46D2PjD46D2PjD2DM`D2D@( $$=='%  % [T :,;-:-:,88,88@1;@1;-:-:,88,%  % $$AAF`TEMF+@@4 ף>@$$==_888% % V,:,;-:-:,W888,88@1;@1;-:-:,88,% % $$AA( F|pEMF+*@$BBM`D46D6@H<IS\]>L> w>L>??   % TX`A`ALPIS% FEMF++@ *@$BBM`D46D6@TH18 Z>L>>L>>L>??   % T``A`ALT18 % FEMF++@ *@$BBM`D46D6@ compliance J=>>>H4>>>>Z>>>>>>>>N>>j>> ?>??   % T`A`A Ldcompliance % FEMF++@ *@$BBM`D46D6@ spreadsheet(x=g>=g>>g>v>>g>q>g>>g>Z>g>v>g>+>g>>g>J?g>??   % T`A`A Ldspreadsheet% F\PEMF++@ *@$BBf CbiB@0$r>ARIAL6@, Queensland Government Information Standard 2%?U>0?U>|N?U>`f?U>!|?U>?U>?U>ß?U>1?U> ?U> ?U> ?U>e?U>?U>?U>@m?U>M?U>@U>@U>@U>@U>@U>@J @U>#@U> %@U> +@U>.@U>4@U>к8@U>lA@U>F@U>0J@U>L@U>R@U>X@U>[@U>b@U>0Fe@U>Pj@U>Pp@U>Pv@U>p|@U>@U>@U>??   ( RpArialArial Arial||@|=|Ꙁ||p -! @w|H pg" d||||w! !~,w @wp -dv% TT~)`A`A,L Queensland Government Information Standard              % F|EMF++@ *@$BBf CbiB6@H<18K@U>@U>??   % TX-~;`A`A-LP18% F|EMF++@ *@$BBf CbiB6@H<: @U>h\@U>??   % TX>~C`A`A>LP: % FH<EMF++@ *@$BBf CbiB6@Information Security @U>@U>X@U> @U>@U>@U>@U>@U>`F@U>@U>@U>@U>@U>9@U>@U>@U>8@U>H@U>@U>ȉ@U>A@U>??   % TG~`A`AGLxInformation Security       % FtEMF++@ *@$BBf CbiB6@@4 @U>??   % TT~`A`ALP % FxlEMF++@ *@$BBf CbiB6@8, Implementation guideline U@U>X@U> @U>e@U>hb@U> @U>0v@U>@U>@U>@U>`$@U>p@U>8}@U>@U>p@U>@U>-@U>(*@U>&@U>`@U>~@U>6@U>@U>`@U>@U>@U>??   % T~`A`AL Implementation guideline        % FEMF++@ @@4 ף>@<09BnC9BWC˝BWC˝BKC@$$==_888% % W,bHn % % $$AA( FEMF+@@4 ף>@, ˝BnC˝BKC@$$==_888% % W$_bHn % % $$AA( FEMF+@@4 ף>@<0f CnCf CWC˝BWC˝BKC@$$==_888% % W,_H n  % % $$AA( FEMF+@@4 ף>@<0ҭCnCҭCWCCWCCJC@$$==_888% % W,Z'Hn% % $$AA( FEMF+@@4 ף>@<0ACnCACWCCWCCJC@$$==_888% % W,'H)n)% % $$AA( FEMF+@@4 ף>@<0CnCCWCCWCCJC@$$==_888% % W,'Hn% % $$AA( FEMF+@L@ ף>A@@, ygDDygD>C@( $$==_888% '%  ;9'69{'X49w'9s'9s':s':w':{'6:'X4:':'9'9'9'9'=9+'69&X49&9&9&:&:&:&6:+'X4:0':3'93'93'90'9+'=9k&69%X49%9%9%:%:%:%6:k&X4:p&:s&9s&9s&9p&9k&=9%69;%X497%93%93%:3%:7%:;%6:%X4:%:%9%9%9%9%=9$69{$X49w$9s$9s$:s$:w$:{$6:$X4:$:$9$9$9$9$=9+$69#X49#9#9#:#:#:#6:+$X4:0$:3$93$93$90$9+$=9k#69"X49"9"9":":":"6:k#X4:p#:s#9s#9s#9p#9k#=9"69;"X497"93"93":3":7":;"6:"X4:":"9"9"9"9"=9!69{!X49w!9s!9s!:s!:w!:{!6:!X4:!:!9!9!9!9!=9+!69 X49 9 9 : : : 6:+!X4:0!:3!93!93!90!9+!=9k 69X4999:::6:k X4:p :s 9s 9s 9p 9k =969;X4979393:3:7:;6:X4::9999=969{X49w9s9s:s:w:{6:X4::9999=9+69X4999:::6:+X4:0:39393909+=9k69X4999:::6:kX4:p:s9s9s9p9k=969;X4979393:3:7:;6:X4::9999=969{X49w9s9s:s:w:{6:X4::9999=9+69X4999:::6:+X4:0:39393909+=9k69X4999:::6:kX4:p:s9s9s9p9k=969;X4979393:3:7:;6:X4::9999=969{X49w9s9s:s:w:{6:X4::9999=9+69X4999:::6:+X4:0:39393909+=9k69X4999:::6:kX4:p:s9s9s9p9k=969;X4979393:3:7:;6:X4::9999=969{X49w9s9s:s:w:{6:X4::9999=9+69X4999:::6:+X4:0:39393909+=9k69X4999:::6:kX4:p:s9s9s9p9k=969;X4979393:3:7:;6:X4::9999=969{X49w9s9s:s:w:{6:X4::9999=9+69X4999:::6:+X4:0:39393909+=9k69X4999:::6:kX4:p:s9s9s9p9k=969;X4979393:3:7:;6:X4::9999=969{X49w9s9s:s:w:{6:X4::9999=9+69X4999:::6:+X4:0:39393909+=9k69 X49 9 9 : : : 6:kX4:p:s9s9s9p9k=9 69; X497 93 93 :3 :7 :; 6: X4: : 9 9 9 9 =9 69{ X49w 9s 9s :s :w :{ 6: X4: : 9 9 9 9 =9+ 69 X49 9 9 : : : 6:+ X4:0 :3 93 93 90 9+ =<? % % $$AA( FEMF+@@4 ף>@<014DC14DC}xDC}xDnC@$$==_888% % W,* H@@>>>>n% % $$AA( FEMF+@@4 ף>@<0*DnC*D,C14D,C14DC@$$==_888% % W,*3HCnC@@% % $$AA( FEMF+@@4 ף>@<0iC?CiCw)C(Dw)C(D9C@$$==_888% % W,  % % $$AA( FEMF+@@4 ף>@<0/D?C/Dw)C(Dw)C(D9C@$$==_888% % W,:##  % % $$AA( FEMF+@@4 ף>@<0 DD?C DDw)CMDw)CMD{+C@$$==_888% % W,611B3B3% % $$AA( FEMF+@@4 ף>@<0gjWD?CgjWDw)CMDw)CMD{+C@$$==_888% % W,3_55B3B3% % $$AA( FEMF+@@4 ף>@, ygD2DygDgj*D@$$==_888% % W$9,9*% % $$AA( FEMF+@@4 ף>@<0:TD2D:TDB/D DB/D DY*D@$$==_888% % W,Py%,%+r'+r'*% % $$AA( FEMF+@@4 ף>@<0:'D2D:'DB/D DB/D DY*D@$$==_888% % W,v),)+r'+r'*% % $$AA( FEMF+@@4 ף>@<0C2DC/DC/DCb0+D@$$==_888% % W,2[,+@+@*% % $$AA( FEMF+@@4 ף>@<0NC2DNC/DC/DCb0+D@$$==_888% % W, 6,+@+@*% % $$AA( FEMF+@@4 ף>@<0NC?CNCw)CZFCw)CZFC9C@$$==_888% % W,f f % % $$AA( FEMF+@@4 ף>@, ZFC?CZFC9C@$$==_888% % W$f f % % $$AA( FEMF+@@4 ף>@<0B?CBw)CZFCw)CZFC9C@$$==_888% % W,D^^f f % % $$AA( FEMF+@@4 ף>@<0C?CCw)CZFCw)CZFC9C@$$==_888% % W,f f % % $$AA( Ldee)??" FEMF+@ ObjInfo VisioDocumentRGVisioInformation" SummaryInformation(  Visio (TM) Drawing GOcRC:\Program Files\Microsoft Offict !fffMMM333"UJ:DT5I[1hXT@. .Ub##/a0zGGz?K&[&/~&b%*~ !oL $c)PF?#~~,, & "& , 4&?C"/.?L?\.? A  }, ,,'p/%O6$X6 (}j?k)?"   34#o =S?#A:;A;dUdU@;dUdUdUAONOD`;dUdUdUdUdUdUdUUb SR~;4OL%=Qip;RRRggRph=Qji .@]E' @%p3~|bFp#*| | | ui?H "g{-iZUo[CO.7?I?lUR //潎@qQcfQm???O!O_&8JOn,x&/J.@_0_B_T____4/F/X///܏///j>?T?f?x7c?_???BoTofoxo *Ooo`OrIzOOO|dGIyOOGr2b@bz@1b.bLb?bbtb}?fxd_v_/AS__zR,>P.ovQ+a=!tNooHq1S٥yf!Etu{$b_ Ѱ'&l dMD__u.oϦϸ[oo5:o A~'v Qcȑޏ-/J\k}q> )hİ)'9K]oo?#GYk}2/D/ 1CUvOOy_O_/3_E_Q/c/!:˟ݟ//??%?mI?ǯٯ !!rbrb?bjbTfhO ooOҿOOO"SBUFDfP h(TPYYBUAm@ ?I?| P?fJ/5>{ bn/b>>I @«4ob w!O^#,%#,#'owd /> w, #, $#'ȉH?/&?Z2B锥  0g`.Document,sym0te0mk0Eg2erp0im0ek0A0pl0cai0i]0nk0ne0tw]0rk%e^ 5L #U$i ?? 1X!7|_'0U{B-!0 |"+ X?C)32IIIIagy ww5ϼ;̉Drag thuesapWonodwipe.sytJmim9WnfrGai:mbؿ?8i6ؿ贁N7??k4 UHL D $ >h,JTaaMwMUA? ؿ?QR >i >[uA` ;uF >bu~ ~aMBa J`MAM J>HL(P <BUOXOBtXOu/V \{& P2N?#-"@?#14U;/>`Vis_PE.cXm!#48097t `?Copyr0gXt (0)020030M0c0o0of21r0Aa0i0n0 0Al5@ 8s9Be0e0vK@d0uЙ1R66# 7?.x b]ClJa1Ul~1qO4@>aRUP3(Z?*#$sUBeQe#@f` R-"N:?*^("yR/!Uz5@>_UX_jQ_Y2oPUz>rM qbMwcFA8G$EO_ PO__+_T?*@TQY_m_Va Xpr^4,GFXwRq]{}zU___;oF_o#o\T3,K_]_W|UeVk9zqh }k dj Aixq^(fmV&CK}Nܕ6%o/dQK9ޓz5YL篌BɈi~u]3],EGiAgdnnTA  -"aaz23(B3T1~GuV35UMB 0o0UaW@dT W@o0Eu0e+@1A @i5@My0uvsJ0s0e0ai#@g!BmYGz5qcT$&@B6"H+U &aw'AW7SFO #A݂B I[daρ@o@|Co5aOoN8 jUFDfP h$T PYYUF~@x!kbs{kbs66zk%6 12 ?&i+4?1?X|/''0UB!0  K?$6߈kdz:< Drag thuesapWonodwipe.dt,uc s/r)td u2pk:b~߿\.??a߿,h?? 4DH D # =h <>TB$]]># KAUF~? ?F\_.w?Q6 `- > >Ȝ>  mu` _?L0З:DhuTrWb J |>_bXB" hnsr0hn{b% "r&""#-U5 J~@ "A3I{145 1`Vis_S0DL.cTm!#50322"`?Copy igTt (0)r 201 M0uc o0of2R1r0Aa0i0un0 Al)@U 8s-Be0e %v?@d0 $u7 30,5#A30O贁Nk?<i@L =A31C<3CIP?Mġ-A9M3 J7F [BA&A?G8 l7W4>Uh#3 1X2JE0\@ "J%S`SFPo#"%#bRbM@58Qo+o#:`lel5|ekaonc[E3o%oc=lHz?kF0"?FB&i/y=l/{RcB)`Kv,Pqorq?l=brAm w =_H'+{ 3A"bBFO#IB Ivfa @o@LCoEadO%P I;paUFDf h-TYYU?~@x(UhnE  J$&9"(Fn_g5Fe#pheo'*T !,! Jcxo)vR2'"U7 5a%O3W_74b5-6 `F2 V5au\@|Q:0b)`R@As)@E %T@xd@Di  ei=G]U6Tg'0"q)V!DHAn Z1nWaHuw+* O`EW )F$/T 6D UUF~@xTE=cAUF~?M&d2?F\.?QR6  iu` ?7uB bq*z zBAD`AMJU5 #_L@J'#a!f$5 `?CopyrigTt (c) 20 3 M c oKs f"!r !a i n. Al (s"e e v d q/`V s_Sb . hm!#45%7+02p-'/m# m'?9 &H?Ll>0>Uhh11Et!4 Wa!B'E'@*JT3FSF!>zbTrF{ BMO(4MD]OoAtOI"A?5NOwIAEETF_oO7[PE21PO>rA RSI"q]o? EVJ@=l l1n"#8mSY`L aM,k?NeEfWi]8|CCeR%,nEn0Yoko|] a?5,eU\gwonWoi\jLo8EPiC;'gQT=7Ɋ bTR"O(STC&@ 2H'򪠄 ~L)uE/>FOI&_#I'JB M]zaL@l(@+TCpMaOWPt4aL[/f'@.gC @ L,A-TEX%7 ;U U t4aL[/f'@.gC @ eK-C-4cBU17 At4aL[/f'@.g @ cB- AJ-t37jt4aL[/f'@.g @ cB- AJ-37 @dO,NR@O;-OR@O-DR@ O-DRH<(H<(H<(H<( E|O / REO-/ REO:/ RE$OG/ R_b(.T \OFݜS(WJ+#B!_O"/Wi{"O%SO,/?,O:.PDDOT/ 4( UV` , LSFDTyB uhj T UFaL[/f'@F.g @?x?P?b?t??15U@;M?MMBHoqu`hBCBuIof5C"QM"Q.!` Fl@wcarktCR I_[R U_T-_?YC@nPeRPt@r\_nR_TeJDE,DXaa AuA!T4AaAAt!!!$!.!~!!A!!!!!!!!!!1-./0123456789:;<=>_AAJBCv UAHTq`tuk{E`tk{B]wk{`tk{\xAk{\xk{\xk{E`tk{\xk{\x!k{\xk{\x1k{!\xAk{ta\xak{1\xak{A\xak{a\xak{a\xk{a\xAk{a\x!k{\x!k{A\x$!k{a\x.!k{A\xok{t!\xB!k{!\xL!k{!\xV!k{$!\xk{.!\xAk{~!\xt!k{!\x~!k{E`t!k{!\xAk{!\x!k{!\x!k{!\x!k{!\x!k{!\x!k{!\x!k{!\x!k{!\x!k{!\x!k{1\x!k{`t1k{a\xk{a\xak{a\xak{a\xqk{q\xak{q\xqk{q\xqk{ q\x qk{q\xqk{q\xtak{q\xak{q\xak{ q\xqk{$q\xqk{(q\xqk{,q\x qk{0q\x$qk{4q\x(qk{`t,qk{_E`t0qk{@q\x4qk{Dqר_Ak{Hqר@@qk{`tDqkwɸx]PyqM"A~!~%!!1aaaaAAaaAAAt!t!!!!!$!$!!LqLqtaAA1!!|b!!a!!a!!a!!a!!a!!A0q0qaQQAs`t!aa!aa!qq$!qq.!1[Q[Q~!u`b!!!A`! 1 1$qq"! q q!qq"!qq!qq"!4q4q!8q8q"!qq! q q"1DqDq 10ea#F`!a(q(q"a,q,qq_A_A"q@q@qqHqHqb q$q$qqG`!qkqkqqI`1qJ`1 qcK`(1$qL`51(qM`B1,q1N`O10qO`\1b4q_AQ`v1@qAADqj`1l`1A#n`1AA⡉?.,A51TLqAÃ,EQqQMK`eסhԤ? qDXu??EHmU%l?@4O)@@\.?@L&d25?DE?v18fGX۱sO/Nkwd/=xq0P9RaLab`RvUÂ:EF\@\XB4@v$O϶?y?::O_ %?_Q_l] G_\-.: QweMnqld"G*mbt"I[mIS}caa1 q:4oFht R/d/Ə؏v.8`%SaUA:SM:nSxsGa1e.#Wj!3AÀ?@9f@p?@ X #oŹR,#GB$A0u6`u@`fB8 ج}L&@@@-b%/@ )BpXu Ƈ@@z3hƏ؎AS:b aX&n F%175$-ǖ'+rUWF`쀃|)p8|C4W tNyzshW /87@rwq7Fzzߓ1W㘆I1ߓA7Fߓ1WԆ/BW+=Oa=u# yǟM-?Q fxͭ]qG .9KP\5p Cvmuc:Nivns OZʻa*ee4tOO//,/>/vA*ϦOOOOOQ__,_>_P_b________oo(o:oLo^opooo[!(c/u/l///?//Zl)?;?M?q5\5"??Vz@؍jIaaqotaqop$6HZlc>%@@qmxj#Zpv#ֵ!B`Wx3& xt3&t C6"vbXDD  x3hzŸ?[ .O$O6Ov嫯]㯎O+=Oas~4PyӰƳl*ոE{@vrϲ c>PbtφϘϪSoeo$ '0BTfxߊߜ߮lFu $:62*Y2Fu~#Əҏ:4"l,s/'VBA3.6/?ˢ2կ6QBQ_a񒱍Ȳ@@x$G%([ 8/J/\/ n////5/R!$"O CO39?K?]?o?sOr<8D"&(Kȯ????? OfO?OQOcOuOOOFO_Q*_CN_`_r____Wj___3RHSu9a He`or `Q7oIoooooooo !3!İMhq>{s ʮ"ЏT&o/3EWO{/%­ȟ??Q? I.?Eh?қQ)?<73Tfxҿ\V@@.g);M_qσϕK~xQHfwR2/f/a& 3MfMaGc*kf*Gc$6HZl~ߐߴ  @2j|hzTa'9K]o1}p2A st+=Oas'9?]o/o#/5/5OY/k/}//////// ??1?LO?g?y?ϝ???;oE|OCGO B`b/o_cQmko =chEqtODqOOOOOO_!_`T_1EPM^)) F_X_j_|______@^_!` ba[sa)cI.b<<Gc6bZZooooooo%7I[[Sew!3 BTS- zԏD Z'96Lc>eR[m);ǟٟ!z??Wi{uOï H/ASeωa_+=Oasυϗϩϻ߿o'9Komߌ1U<ar@ ZNqh1h1x .| !@@D<Rdv@3qu)0s)0t)0o,K0D[0vK0&K4*1tpb?O0O??????OSe:OLO^OyOOOOOOOO_o$_H_Z_o~_L____9o_% o2oDoVohozooooooo.@dvuT;t5':Jg_/ӏ$;@@g!1|x'9K]oɟۙ61:$61;; F A;M_qK˯ݯ _I[m__'_ǿٿo2}_Vhzόψϰt9RB!ns Ч C(%nt$bca`eBIߑߣߵ6H!3E`i{ Տ/Ae/ +=Oas'կK?f7?CMĿ!)q1/$UUR/d/v//////.ljى @@*X!E??&?8?J?\?n?????3HnCn3<&"C=&"O4OFOXOjO|OO2oOOOOO_0_B_T_f_ __Tv__qo`=oOoaosooogQ^ooo8bIdd%t(^p#$6 /Zl~GƏ D/hzzŸԟ .@RdvVOO*I_cuOڳ__Aj(3EWi{ύϟϱ@oJL#@@{+. -?QHcu߇ShBI5~v~q9Vvq);M_qv%7I 2DVhz 18@C_miUc-?Qcuȯ/ÿ)/;/M/Oq////////O?7?I?I_m?????????O!O3OEO`_iO{OO OOOUH~U0_|T_DS4WOa\Oeabuq@eLo^jY 试ŏistP%@@^s@@%d2ٿ@KJICI¿'ybtauD`u`AlLqtu`u^?R bqc>䲀6,?5$@@<͛Ov@)tbpaҁ ;^@z3Lqup8b$7ION@Ws#wkBkS;r tN|az(@;r "#uu^#@`pȿ@r?@Id ?Z$b%3]gqkep1uTqud|tW@&S&ptdşן;\4bR/A@J%S%I.aSҫŭQ0eFO{e,񷀈au1CcQώ |ώȀS$GBOBWanDaH_6g ^mq.[@@xd@@L&V?@z|WL?TU}*b;rV~t\VP:@@hC#`P&L䒛@ fMoryrg///?/$fWv`BwD+.++=)~?@?tk%a/s/X#2O贁NkvyF3?#?5?G?Y?k?}0v~?=aB??WE׀LO^OG !tOM TOŌNtQ_D7_[_m_____z@@>k@@%D?@G99606Amt4oFo񒱍Ȳ@@{T_1@@Y@@(I!gqeӶoҿo$̲Do#5G}#So*f`.=) 3CUgy@ӏy5dZ=ASmǟO럕O"C990u[W[tί_Ϩ{4^s-V@?dRgo%jrWnc>䲀G, »v bFge0/ Rr®^pϔG}߷z' !l~ߒߴ߀ 2D&Z%.n! != !&c!̘%J\~Fl}~vFvnM)WA!_ -?QcT\{@@?_w`V< U `S&o\i%Fs#gPY05@@cEcPHwh1emfElojRrAigA0vb ////A/z1'Ay/NOq?@"Z|9/////??%?7?I?[?m?v!u~?!A??0A OO-O?OQOcOcuO\TO9CAaO[a_^4_F_X_j_|___`涰AzGW@W_o"o4jKe?S׀䶰@r\AbhҡŪoo?aHooo%m HZl~ҡ'%N^븿@4E+=OasP<3菀% m%FXj|c,ğ\d?lCy,40FMq˯ݯ7y!H`&YO  XN*_N`5i| 9ǚ P`=!~9@4b݉%q]|F8'9KFGϗϩϻS*q~FyXk4(?@?j~W!3EWi{ߍߟ߱߼N&X%N.%=FK]=FGO%NO%N4F|'OPM|UqOF@O4AO?OOO_!_3_E_W_%qE@@ta:W?@gpWƥ_x__ $;mL~`t'AO?oIF׵a9o`^ooooo]$o#5mB),kŶ?@k^* 1?@^͛Ov@@ج}L?@dN@d эvBRp>$.AƲC?~d_BuRZas ).>yF%5rؿ @^/ο .Zc&nb>b˲J\n߀ߒߤ߶2.߱A=A:B,G`BBm>Y@0F%ddO>~Nٗ!`!L)%EAI+`!FK!RdK%%5B1 UhC#`4O)㼠3??TҳU?YQ9BHR.G!D[Fg? e4,?bbbzT%Ϩc4dufua<‘UWlPlh4/E>-Xi]2 To gp\"q?2YSwKuӖ4?0pp$<WtqT U0$2yj%HS$eyYVQ$ d4!3RhZZ!NtF?x<v>`i%p YQGISC܀ Ci>K\VyXXge'2LrCuZv qW'Ax"gjp1// 3uAYV˲h1ԴY?? :ቡ????8KSTOU@oTVTSGOehЧ@MUR:8G0tXyqAK%QOǯJO1MϡMB U 8K%ԿqDB Qcu؏P<ѩHվVck6%۲V_߸߄JD}WoB_[]8*U@U^?@4O)@+<xAL$iz"b$?;Mbb]#25uR$I+>3to7c6 LM\nt* /ҏ?!>5|ώ7/iR/d/v///m߾/0q AៈQGIS\Pp}otPicy\P]-\Pma0dtrctPa_use 5ڏ"4F]AQ?|߉OM 15K8qwPbtk7Iz//+>v//HA3 ?u@ k2Yk1y?ӟ埪U@}L?@0BTf6BTϐfׯ16!V!Q+=OasͿ'n:z߄鑣cc檯?bb̨p ϸooa&8J\߼ߤQtIp\eetn tra\%fUo crUtgv,ne'9/ASew;5;ę1]o rJGUk} %7[ CUyr //-/?/Q/n??//9//M)?;?_?!_5ߝ7q?"H???Gq?O"O4O'"7aOU@FTv @@OOOEVa`bd/Qyc-st?dofbbh@O _SQu3Q9_K_]_o________Wno,o>osA7OOGN~Vacup{QG SCwL^я+Oas1I!ڟ?Q:LχᅫOKOįO ?0??hOUOҿ}_GOkO,_=_b6_ϘϪ2oߒ(oo^p߸o߸I k!E/W/elt,AEqi!%!$-I T@@ 2@@} -?Qcu$|UFXj|<ru ..a$(N% SA8/(:n/`/////ه// ??.?@?R=^H|?gA????___oK__RO*O߬OOOO,oN_`_4__\&_J_&oJo\onoooDVoo"4j|(}u7 IbՋ䱘Āb=!׏5ƽ$@@'9KЯSewp6o2ß՟ /ASewą#?C0O_贁Nk 4.@Qfx_>.QGICOOM_qσϕ.'x` -T [+ya}ߏߡ߳*1gt -?cu zُ);M_q՟#5l[I[p?)U2k9`__J,V5 //0/B/T/f/x/8x2ZT&@@՟////// ??/?@A?S?e81C12???????O"O4OFOXOjO|OOOOOO __9_B_T_f_x____WS_ o%o7oIo[omoooooooe)HASewV /+Oasϟ/'9=?/o+/?/ɟ/#5?}OOůׯxOO`  _Cir_ڳ!Ͽ$CÆ% 1oI?~ )~ϷAA?@`Xgas߅ B=v=q߷#5GYk}5*Ө›QGIӐCן// p1CUg'xɯۯTOI01=Oasϴϝ߯Rq__'|_K]o4_L_^_߂_ϸ_#5o_k_:oߙo 1y`,t  ?0c}k0p??| }"ϟ&8[7?@d_q@%@!#M@!HZl~/ /2/D/V/h/z///Xj// ??.?@?dOd?v:?A????OO+O=OOOysOOOOGO__%_7_foxoaso__o!o3oMWoewoooo/SS=Oy/E/4//͏ߏ/M'.?Awş? 1CUxSc@@T|į֯ 0BпfVfQewѿ+=Oasυϗϩq??%'9ߠK]}ߓISCpoo#5GYk5!a,>Pz/(:LjpHlp֯ϯ/˿//V/h/bϞ//Q//?f_@5KZ???6`Q?4`Q?OO&O8OJO\OnOX0M?@@P_PYQG_o,o`>oPoboto0'xoooooooT* L^pÏa|6Zl~?Wiڟ2D/zE?/ԟ/ .@?kO7OЯ&OO*O N?r _ka<%Ռ11_ۿ#5Gjظ`e@@n90݅ϑ<ϵz Ƥbb .:XvXqWi{ߍ߱ &/ASewc_u_Q / Akea{q|Busnes3 coÐtutUy3 p aÐ @Uo͐.3 gْdŐl׏'9K]zU8W1 0Bq//l?~?/!?ݿ/,/>/b/ʿ?//$/?L:?:^? ߔ?߸????OOOHOZOOOOO_X2UL_*__V)_W_;_oo*oO"O4NYOceHZPAAg8@_CleOOO__,_>_P_b_____UҥP_o o$o6oHowr'o2o 2Dh< d/.@Rd/$//Џ?ʟN`????ޟ0O^8OR0B+ȧ(Q֯S_ 0BTfV@@nĿֿ 0BT;favψϚϬ*<N`r߄ߖߨߺOO8J\@nJaD#Ussrrov@pa ng M_Ugy? -?EUcʩ(Q//2//9Po[+=?a5/G/k/}/ω// ?x1?C?U?g?y?t+O=O??? OOSQOcOOoEOO _V,_>TI_m_______hoJL#@@moo%o7oIe„yqac?zofbGboon9A,,oo 1CUgyw~$6.@l֙ӏ?? *_IS1 JUmXi\cr 8UpFasert|//ğ֟ 0OTfxOYEW@Rߍϔ__ʿ_Z_6r__nߨ____2`oh߿oߞ߰߻.RdvAҏ,; ??VhzYqqS0woaYuEGADMA@A_a= s7ta%@@^s@@Ntڿ@J$)D{ʩ–o`muZ@`u`< @Ԣ u`upJQe o`^x2ZT&@@:Ov@@c>䲀,@)pt@Ep@z3?EWբpAs1qQ㲵 ǦUWנSX@dN tNܠoz @ mAvJ8s|>@Oh4?@r"?@WIϹ]x%1`1@k5ce-AIR.ƀ#EŸ"貟"Rp&zO|UMD@oaXoooah/CǾũYqRqRDM}+$ 'Q{e3_E_i_goo ox]m!ґ?Ο?럨!3EWi{;pXa'@@2 @@~p@ W?MUį֯ \c3h .@@T_1B+6 <%p+QsD0@Cҿ?ĵ#5GYkpvϝؐH/?@¹%7??&]&l~ߐߢ(V%_%U.?);=?asx5uOOKFWlq~?!SU>GvEOa-4ciD5H9vE( 7ts@@ mk7j@@JRT*!@@v_n?TUuˉ& u`Od? bu`&iтNfYr!vEx/vBqL ADAqBw@O WwXOUlOqO "b"i2@1c8iBq MuV&$g/eKLl~UwM~8E~>`H*3\E Que܀nladPGov܀rmނtPIfrainPSa18s:ecڀrtyP 5m0l܀gڀie @ie XCDA*7PEivE\EhXygPD`0'0K8&\E! a[ ax!\E~azDayo'h?@.gBOVjU0 ?Ղ&p U^?@d͛Ov@@ج}L~NnöY¿Կ>5Uu~Ibaffƾ/$".5Q7/I)r_/q///////#֕ 3?*?______~#`.[`90e@BeYn{oo4_hC#``To mCϗ(cL,)))v$ ,Nt@{^Oas;)߃e8ҥ3e&8J\ E OԀޙ]M)џk) -?Q~xϯ .VW4 sW-Qcuo#`= @@0e>@ CdnuYoko'9ϡl_ T5`Pd"m&/#/ k/p|y,&t'CUgyߠ;!ߨ0KrI -?Q#߃F"Fnv5u>#I[]u5Vn_n5Ba0toMDq[I1a(UoJL#@@[l?@JRb%u@?I}wN? w(I!@ 3#vy//ւBa-???[e?A$ ߃ Ab!$) ??H@B>BaW;a0v:tX???h#32O贁Nk׃VACe=OOOaOsOOO'OMBaO_Ba-U!}=TiWZ_t__ 0v_]0|@6CoPcooo#5GY8B@@2 @@wnۿ@0@  )/̐bt0M@@.@@T_1@@+6 '}$^#% ߁"P)oo$/?ŏ׏}B>W?i9flҿ@?CU?9K??)C8OȟڟE/f;MPasP-_?_Q_c_ٯ__!^8_V)Ŕn)8g7QUgq.˿ݿQ~ @@\%)a?@xY,+?J\nπϒNN| !@@"H/cw'(x&3w//aK&//Xjs<6;7߻ԡ!aG/|>P9K]o93wFJ2wF(:L_58>}] /A~ew@.f@o pF8caoASew_Ӫ|d  )Ũs@s//+/iKd V/h-&H$/#5/// }`ܨasnjdžU?g?y??M??ޘΟjJT{CCJ\n U>G]T T?$LplջP>ӽ>ԝh:UguϲϫϽY抭Gr@@h$?@%.ٔ`gl6V%2a#âp{`e@@$;Xfz&5/ ?p N6:?@M?Z‚ˉ<6z7IzTw1{!T*וJ͐p8<!3EWi{'F2;F .$`E"iE_Nk} m?Qcu ֿQhEeX&o)X.J;g,q^ //1/KFm@@\P%-ٿ@b% y////,V%pt/-+J訆c?H??l?<,q9KKzk???Oс,O>OvaB@iO{OOOOOOOiCz"_4_F_X_j_|_@ B_} ,q__,qo)o;oMo_oqooooho4p}v0VĆM q`֜ @@T¯L}U ?ݙhҮ&8J\+@ϷE& @@݆ljى @@A2('TS@e' 429t͔؞SI2nxο@ȣ}-?QcuKCS&SSί(Ue]񋿝Yÿտ ZASϹhx/}"w=?w!//ASew߉`8_W@@ae\3c5mSc@@2D*$F?OYO<!LFtG1CUg͔)A?@ -?CVBVz:d^c^w!7I}!o/y/|]5Y-ve5>$/-//LwQ///?#?5?p%ce@@%20~@@ ?~????5.Fs#g@@-6 @6#|HgOLC!E@O0OO oOO__%TՑ0^!E_ܿ@bs_______E 0W~k&o8oJo\onooFνom0oo0u['9z[N}fxA8tߐ(҃T8?ш/Z?Q)/Ϗq9((Lj"'@P)B!RK]/9%,#!|Hqp3K?I%TܯT\ 2DVhzZ?cP#cPҿ,ϒeim?֔ϦV(?u-${A ]!o2I[%#1U?o9~/ -#14/F/}#1l%v1v5~5//a/Zl~-6g~5E7B$? ρD?h?z??????0=5?@+=IOғ?@ ԮO.O@OROdLAA0)D}OM XK_J\O&__3\ρFYkT|____vt__ Nғ$ oo-o?oQocouoo TJhJoooo \ -ρPρQ8J\n懶5氕7:׌]]2lц$*}͍T?@aoL`?@8?@W*JR@JR?Q˙°չ2\:92q?&>?tT~z{z"R9U4*'Ɠ? Rbbbzl!!>xI h׭.#UJ yKa"qn׈}ߡݙ>)c,$]S %+QHW'G/.T6-/F%z'4/*P/u+??9n0n-?Bgfϒ̠E"wtM&d2g??ԮAYi4cG̀QEX9'%2^!}%>" +V4'xESQ_T tQUR_^t_[_Tt[_oo^*_TEoWoio{ooRR]_T$oooooRR_)~BTf WCQX$ZjHtfD$řeRF^!3΂WV` ' sL>AS`ś/ď֏鏔<"k!'QfD Ֆ ?TUӃ(s1+S(EAOq3+UhBjՍ%U@jU^?@?@x_2>)BԤ-̹s3 7a1 i< n2?@jZ'?FOqn26?F AfX /'>,/?Y/ ///./.c/u,P1QLQss5߇+UKQuϯVy~0 BP(4BϿ 0L8/L#HOl¤eyϋϣˇ\t?@@Eshw Aqb/yGFbb\3E2G_j|~ @'Ln)֑__1֡.8o]1/DtsP9KiÏt ,/DVgzџ/+2?/a/ͯ?ؿ'XO$O]oOlOOM6  !"#$%&'(),/012*345U789:U;<=>U?@ABUCDEFUGHIJUKLMNUOPQRUjlnoUqrstut4MaL[/f'@.gC @ LI_C-fB_] A@tOgQRH<(EO R\O1/oTLN@?fETungaH"@&>fGSendya{ (  R$fERavi"&5<fGDhenu|"{a (  R$fELath#&<fEGautmi &<fGCordia New{ (  R$fGMS Farsi{{ ( _ R$fGulim"{a (  R$fETimes NwRoanz@D$\QP8EBPP}.BlPP%BOPУ5B|OP9BOP>=BNP{CBNP9BMP7B$MP.HBLPv8B4LP'BKPե"BDKP#BJP9BTJPS"BIPu9BdIP&BHPԦ'BtHPCBGP>>BGP|8B GPGBGuideTheDocPage-1"Gestur Fom aOLE NormalDocument"visDecrptonvisVerionFlow NrmaVi}so 0Document.2CostDurationResour cRow_1ScaleBlock }NrmaViso 10Document.5Document.6Document.7Document.8Document.9Document.10Document.1Document.12Document.13Co}nectr(Dynamic onetrTextPoWsiin.Dynamic onetr15.Dynamic onetr16.Dynamic onetr17.Dynamic onetr18.Dynamic onetr19.Dynamic onetr20.Dynamic onetr21.Dynamic onUetr2Document.32Document.4BasicDocument.34Document.26Document.27Document.35Document.28Document.29Document.36Document.37Document.38Document.39Document.42Document.43.Dynamic onetr53.Dynamic onetr48.Dynamic onetr49.Dynamic onetr23Document.40Document.41.Dynamic onetr50.Dynamic onetr51Document.4.Dynamic onetr52.Dynamic onetr14.Dynamic onetr45.Dynamic onetr46.Dynamic onetr54.Dynamic onUetr5.Dynamic onetr56.Dynamic onetr57.Dynamic onetr58.Dynamic onetr59.Dynamic onetr60.Dynamic onetr61.Dynamic onetr62.Dynamic onetr64.Dynamic onetr65.Dynamic onUetr6Basic ShdowViso 02Rectan7glDocument.82Document.84Document.85Document.1Document.24Document.25Document.30Document.31Document.33&LϩE3&LߩG3&LG3sK %G3dJY.G3JYLG3sKf$G3JYG3JYG3JYƪG3KYߪG3&LE3$KY G3DKY%G3&L?E3'LOE3sK_"G3dKYG3T@A3\@A3KYG3KYG3KYޫG3KYG3LYG3$LY8!G3DLYY!G3dLYz!G3LY!G3LYG3 V֬)G3 tK G3X/G3XN/G3?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~U* Ufgt4 aL[/f'@.gC @ VC-EX7A%t4 EX- A-O@77AJ@XMR@X95RH<(H<(JEa/44U&y˪M߃O^Nzj;B/Te]֗1q) f3dajT(1NX潶ɞސ >;+눪ɖGCeqX(YxHHe(dgH8s#Zyqڏ2**Ui\/N`&3-MZ/fzu3bͯbLBSN^xobz:{*o￲+b?k똞|ǹ>~w2]zCs)3wr?~F^>/cL{f7^i{Lgn?x )*~PŜ o &M΄JN=%"pERg? HsN{Yvrqay㨞$=6.@~ xh|Η-hk;y,s}}`Uo|ZG߻kC8q\I#1rcsN-ka;Ypʵ;$t|}k c]wVQՕ-&J!UYT畾qg?C_xr7V#4votu}C=/;zJ^йrx-oNof=[ea[;i,󾱣~oBW^4W0E9Rf?6w}ӳҏ{{vމoU_+囿B{ˏe䡫^Jbz(3L7ק=calD#۹}Fۣv<c;ܹ8VtkwsS>>+*I~nم\6hYT;lOgU{RyˣLG9X%8{>;y8 \?^~ҹ'3p<#b_?׶o:L^(5/ ě<+:QI?y2`^v8JgROR̳ʸ%K4Rv_Bϳ(Gv@;Zs9,B]Aߗ,""6]g J!0mK'?5Tnӱn%Or7xyt0pч'eZӘn:Lc's=i^Bߝ~?&~ :9W9Ȋ9 ug{VfBio٨ts-|R!]qe hq}J^߳ Ҥpy97$~XxtGCn̗uyRLx~k~bg us w3bW)վUjߚX| KMa䫦XW{m3e攄7/˱Y#tqq=,^H0y(6G[T=HtgzwQBwNjd?Sk ||cGO2儭 Vw MZ={u]pu \%8ySw7ijP2^<5RiSy9?Øv3v/twwgz/ZđJǿ=Y\F-g춫%QEk IUssaZ5ٕ ޯyx{r8L_T2گDk vt 9UҬ%)$s=jr6zjrw\8ʾ;':]C(A8N \'8c,kf DX'P6ty|^-|c*/|kK6Gq9󪸾m4gp奼Iv-byܛyo4܍FB?t=GփsO5w͵Wv\  Ϻ0R#^E{7~gr^R|V>|+#{LѾ$󾡵:Yr4elQv%G_>|]w3y,/3Da^19E:>^t*t7M&ya hvIΕhh6Ƒ=)'/f?ڡXTƤ̺U{j({jjm|̯jZnY3e3u\[u޽<Vo~=ПN$AGyA<}YuǻbQΥUt/jҷһy!⪪OkVW:-Vy||la/;}dC=ٕM a37tfp~ن<9 wd!GRE\)=Ly'h62#L*<4#<4#H<4##H<#X)\<<4#<H#$s`:]lww.s$n{/dյnQ] ԗ04yL7^(/X܂K˥_f:vnkʛ\GӘz1-}3n_8?~&Ṽ1r^c6q ƕk"t;9NmVuW6޾,"?KKHSnLG W~ŏwf>VBݘѹpUݶª֮$}q 2+[5yh񿾭qL?XvUfO]tn0q}]ɦIؗy m ^W27o>@c!#!|p2Zl^|4R#*? hO H~*jě }e_Dy.q8U~9`_e> o^ Ծ GHs$ə`l\$v&-%?O2_1]s$GGr| yWx|些a~kqcz|j3C+>:^Qk>؜0 f;ȩY95ۙ@Nv$Sȩyމ|  c˘xο6bzZ^u)ӓphe<>dƉe&q$ʭE>ѓ[!4{tYU$>EK^0Ww|gAgLS߼9G|ssNiVZ$=(";s{]ۜ~s]t#w$;cp/$ǘʵu$;^x?`:OW5}EijԼ}t$='\pt־$OI4gsɐ>~O^e}G='޼g&>?C3cy x bnj:kzW/7 zKvQi{5|ߑ)7w߽~3#qrn<ܪęf76v] 2OsguJ(yV~VܳU%<yY \C2W<$m|yܒ$|޴Sܒzjhp[=}/K7Ϸ-n~ZǏpU뾚R'S~\[G:Mp$[dJ~;n_~\].8K~f/=~No⽟s Z<~Oޡ\kj~1yyy4uv3b~ԚQN++/,V{n{9$y&58ҹ5&9;ء}NEՅT@~ՍWot|`UgL,zL_Ņxݓ_sO4:ewLV r?;\N:a.BYF3O4yAs9 1VJw: F~akK ec]p t/8NB_'p]ſ'gs7Z뭾/Iu}8 z..ӹ~Dy_g5w9HwywӉ%"? a<㾡b3vo^}o^o倝y7޹'>{0qr.s\oWs}2)T8}'#'#ón50n ims<;tcKV>?{'`z9"9b45H\{2U!oo6徔/44U3x7',[JdX߉j9ATC|9ǟ PC\IV~ث>NY I-!;Z|}zyMB+ ^k/HV|^+3:Nض}E_k;+3Q>;hx}9`yc/K߽nuqC|{!=nk!z̐|wDD۵q-Z뒬k w[N-NN\wN Nw*}>᷾XC91$.[N|f&{߹o&Iۨ{ayt\%zO_ox3F=ȒWTSq;K_(k/ )D0kOP3QYo}Pd.:ߝPjo$Rra:_P//-47ƫGlv|)D0}/`x8Pd[+ll`ˇi݆j@9cn!ܰ Lqkmwk6:..Aֹ4Kll`K q 8?N \Bquv ҁ//!AC|c:لfl6M?m[1vXg+xğ햒~: ދJ+Lr~)T>;%1NߨF Q^rXo+nC׶mJjϢwOo~}A֣߭>5><>9 C|'^^Q^5I>ml[GPnw^-_ y|`K4-Ec9Zm@^#|<:yflrG?h }lC_<dǐ:|sf7lwnr[?!>y|`s@,Nrku%.i~-FikϢ&o/s׳r= I]҈Q}>WQ(7 9]q*/}m?|W CT}~%Á rODob|Nd/s_h÷&|o+m3|ttrG~箤r}G}-Eazغ6/ߨ>M 6߳mOڞ>NB_#稣 Kd/sW\* P߂aA_؆OkmSw"rc_~׉T?\k%P}SfUՐ;!P^xg>E}wFmՐU(h]Lx{*ٳr'd/y US`)JWFƣs lg6ħwGo.FbJWF{ƭw[nnu3j|ϸEGc3^3n#|\:sflw.rK?g>ـ-re?B9a;'yɩ_l;6[Oqaq'>ـl.Oh},F_!:9sflwrC?h}lF_!:مf;lvr]?g>ـ-rn?lB` yɦ_l;6[Oa'>ـl.Oh},F_m!:Yf+lVrU?h}lF_!,\eu/+!>s>ωn e~!yȢ^zȒxv'CuCgϰ{m[!,rAK2 Oh޳JzkU#1q4Z>\dwSTŐZk[2>j>Q.˺͚ DwiP|3B|fO> L+6>b+9F6dh̀=>ȨE="CoCShۄ>WSD'7d6]oIt؜ZkKMۏI'oӍmI/ 64 lIO 1 [V)57?M?!>3I'lf]o~hC1K /$_6`{>! BBmhB_M!!dȿTRKͩ=>H KR5Km%O_!t lA%_EacF Rjo~P?!>3I'lf]o~P??!: l2"_@?mBM)A6 /6a>%~ B|I ÷%Eȿ؜S%E?!2(l['|!v )Bm }W,O1O?>>AF4 M }5?!:yf/l^īW?O> {?!txflţ_EacF RjoG?!>3I'lf]oG?y?|!:sf7lwn2­[?mBM A6 % 6` >p%. \B|I ÷)6;a>p-N ʀ/ 5 leRC|: O> $`3C|Bm }W A; !6;`>p BmhB_Ma?v!,kgm%Ovn?-6!lm li'W|QQ`+oO |I'bomc#b62f?Mtg^g Q]vkKQ9.wuQDhSqk>[1lMV!=dxrOh_~ϏֲH_kŞ1e kײ,Z~.pSo!Pn[e e}f}=kYGEe$O63Į'Zmc#b{PnExkYTe Wf ؞dCy_m-k_X/6&Ք=kYGEeZ֞t؜}( e ײ|I?}OZh- Ki= >H mkY,1 [V)5ħ^b3|If5DkYG }?H,ƿ!!B9CAe ײ?mBM)Aگe1*_*lNA*i[eh+|OR 'Z9ۃAe ײ?(l[z-O |I'behC1 kYB`si[ehۄ>WS_b?HZ־x- C[ $mOO؞}aZ|QQ`+Se1 O> $`3C|,mc#b)ZO?>>AֲkY6& ײ:yf/l^Ҷ/,^V> $`eAֲkYEacF RjO'g> $ kֲ?y?H,?n!ܰ e ײ?mBM Aگe1ts .\m-k_X|I 'Z ۝e ײ?(l[z-O |I'behC1skYB9`;i[ehۄ>W_bg?HZ־x- C[ $mOO` i[eQ2H!>Z$O63Į'Z6>b+f ײ:Yf+lV2ªU?mBM A=yL4OL?'a'=T ?IX?˜0̡veV@N>l]9U3Q:7A* C!'| ֞ϪL-^B||yl^|2E@5c Zy' Zi -"|3`slπ2NEAS3^{ mw]kW (0 #|i:|M=>H?SݛƗ&ė|y|yI376]ǿ4!`slO?ȇi &Ɖub:nȿ4 // !4V k& J3_Hǿ!! A4 .+A^OT!Ras*lOR?Ƚ e__eA M/(_6a{> &Ɖub*jȿB||yl^|B} UACt dj@ÿh }B_!t ~^B|Y|ylY4C|c:S`{ |A>L/l'։~2oȿ // !4Vk&J1O?>>A4 .A^O^^^ Aj'ė|y|yI37֫G?lv| z4 &Ɖuϣ_!_[!*h}A_k<dǐnBa7-B.7ym?{]B` ץ__[$XN! ۝|%l'։.2e?B||yl^|B}qUNC9tsdC?h }B_u!t gvn^B|Y|ylY4C|c:لfl6M?m"l['?X!l: __Bzi kAV g*6[a>V B. }׭"6[`>{- e__eA hU { ?O4"3|5&D cZ N"铳ߨ(/?R-i"N̩O 6B #P\[cg>F J(DH)ʥܒ&Kow-*GR[|Vk`kMRKzk_"@k5mG#jUri-i 25m hA_-RK;#Fru W a{1|P Ak'W|_ &W$_l.EA[_6֚b2ؐE: _"H "!ж}4"PdȿB +ͅ>( 3 5+m[G j) ; ÷@ȿ\ @?!_"V57@ǿaa A5+ZSA&/_ E/|`+k }5?HCؐ: a{>|Afk/ڶՒAvOo}y9yd}B|EkoBB\؞  j`c l  _ E/|`+kmG#j /Gȿ؜s23Gÿ!ж}3ǐ:|볅ˆٰ=> 5+E/l\C|u/ 6g, /[?Vk`kM6mȿ,J/|[ _Chۈ>Wci2_BeL؞ de -}d[!_l΀AY_E/|`+⛐_9doBX[k2?Ȅ C'W|_J 5҅CFш?HC!tK/ 64 L/M?mA-% L3!! Aև4+E/l\C|B: Sa{*| AjZ BKO"@k5 }5TCu AdfPÿhۂ>ZWK Oo}@ȿl|  _"H! Ba?/ l5&A& O"@k5CFшoȿRK)=>H 3S4Km[G jI ;S ÷'6`>> /|[$^! ۽jZ |'W|_J 5Bm#hD_^5G?Afz4-}x?N!tֻsf7lwnޭ_E/|`+% 6` >p. BX[kdې.J/|[ _K?mDA\s 8?LN!ж}'4zA;4+E/l\C|:مf;lv׮C?Vk`kLpϮ_ E/|`+k }5?Hݐ6lB` i&ڶb ;m%~niIk4,Dy"Ηbǭ'6lc(xI@Cg7{#7[ {Z ^d7VU"]*a/xzoIr\/'޵z_Y{ >d^oeZtv &<#{km%Zͽ.̃,@yAF;UjZ{:{moi/-L!|~` A25 mG5齗2·57."wv6G`{>,@yAq5m3hF_͑(O5bϡW_,_1l.A1/O |~ؼ!: W`{|PAiW,lհ,6_B|!dj--mG+ K W_d\Bm3hF_ͅdk!t +>(  y|~07@ǿaa A5+UjZ]AF/_>? |KBmC_ua4lȿ|ˇ=> 5mG3j [ W'_l΃yAO |~ؼ!y: sa{.| Aj'lհ:3_B|!dj-mG Ks _999d\9Bm3hF_9dk!t곅ˆٰ=>  y|~072[ǿ,!`slς?, mհVgنO/|~BL YBmC_uYdi!2u/6gL /S?mF9l4_}9g>C?!>/|~`BFf._:lNA:ٞ_6V 22Ð: |~[4]?Cu.,M7_iB4؞qi }5i !B>>?y!C|#C: Sa{*| AjUjZ #CKO/|~BL BmC_udi!: lA2._P?mF9A W/=?H}@?!>/|~`BFt ~d_ÿ6V0_?!|~` A25C:Qdߐ):S`{ |Aƥh"6f՜AO'6`>zB|^8  x?v>!`[5l>2g?B|!dj- u}y?R!<:yfl2ΣG?mFAz W ݰ ?H[?!>/|~`BFus .\dK?6Vj76K?!|~` A25C:Q\dːNB9a;')6f [wޡ>?y!C|#:مf;lvݮC?V aktϮ_>? |KBmC_uvn?6!lm igmG3j6C[f+lVRoO |~ؼ!V,BY`[ n*lհ AF}\$v qo{˒J=Kv펲jU⷗V|TV44cfTѷStRRҵ 05*Ŕ}冦}JTc-MԠCV}guNIxe%czSmfsCDRZ&dn6h%udh&̳I{=BxNCO>Y&U[xts5BؒDy V 55Yʟ|jXgJ#cH{Pσ(IlP-zc0KE 9J9\r˙tl^>V?}{p??K cǥ0Z|W)M;C?OkBV0å` ? HO/pɟY$U-:IFQ=Iz% m8c_~[ j Y8/-Z$ՁSp2GTwŕQJC?]K{~ M G8ud鎅WJwX?ͣv&Z;.p=~ϣ .DT?KoN\Ŀ.Ic'Mx8 ۜuAHgE%%ˢƇLdFԑ댮hwnuC_2c\,9?7gϤ?R9(}okKtĵ]+].1,O%Lj2ӱ}p}_/p/yq0!fy VnЍ3m7ΓmS]#k" 񮕧(^(zl\KsR Dڐ_.]Z(1*iTƨo׸lߏ^?N1ߪcT}/Om+,pw,ߥOjʏՏ'CΓAUr|U365:36 IIf,D{H-ε)bk}媺JQj}k%~5t.~YUk{sTJpd9_k̓|[]BNKՌk.t\ 9:{.?^&Uh:oчStOG-b5ǖBIjSsHJ2 h-/lآ[^PUbKGE'(gBstt:Fr4GG.:GlKQ:Sh?m9|cSޖcESTvbx1!~hg T<5Tgvy'>DYfnSP\&>fn(>nc^GKqZ$Nvr)RSŷyvs음 G>qЎW:Mk}\}楎 f68I'5+&}PZ.Eʘ=n)SW=K'-ia'CeN0{>o\uy|}G]bmBW86쬚ٶL{.P=yάB'{;a $ tn`^:79/>uĉvt{cܾ}F51,VrLG/2-?&$~K~nwm!Kxyͼ]7ܛՏ Wg(47ݮ70A0D&>>a8P'ekuhr]$_U}6mXt4Vʴtotz|Yǂ~y\gY&Uoh<>-;;:z<\l]v.pb|iC1iJ1,v_ȴ9M^]ӯ1KTVw6B hۙh|vUk̉ܪHA=^vO F͑GjRbv0tT`ZG5M-L㻅u+q8#ѽzTj~ۇ7:iF'M'&C7:iFg%v/8<Ձ^I}È],vEbi]M{z4O9GD Og!wo>V>Ϙ{;F7aX)㺢8q^c&zNTv?]#;k俆0 P%D{5ұk-^#Zkck4Sv?K2vMܪD]#]}"9VPUW??T ݁slg7=Ir鑢rף~j_8׶~j7I_zݲ޽|?IBÓ gɋ*ɪ}& NK&+;^w?ge?Q e߽(޾"7'u<ѹ:p߽4{X rt_~c/_u\[4=tNizgXc庱ss~dϰa4gX~jO|[Orkj+i2?{Ӎ z<aߖgXH3, 4{4=Ba!MϰP=zt?r#ͯuBaikaCeECϵjʍ gLgXjSj"MARl#y8~@wI J}Gw= ϰhwu2~yw?#w3,+5|A?2ϰ<,((gzY MyvS4ÖAV_Vٲ}Wűb:s>OVbLDq ,p<ʓH,VD177ӿ[di}OE35 RB-x5Il%&oĹ5?6G!SI!gr,1Mǫ߹USA-l9GRqZym9z6u~II9J=~$yaJn9>Vr*9GGS9kfs|ensйs YŠǗ2RYtvuSt=l(ǖĖ;B+IjSG')QE=~$c<^-z*B1g ylHn[\wg6 * _YmqevSM E7XUTOщdloq6s/t,|"\ YJRQ-dI9$ $Gb8v|!%UXTuQT^B1O)7Ke$y#V&XAeEݪ)P=E'ߓeǖ_ceC}ˆ,OLRQ|q$Gb8L5xq-}Ė[:!v<0)tC3RYtZ5D{2|!slj'Y'«!Y_~4IEcIǏq<ɐcU~lUgc%ʊ[Ӫ_):QCqb߻jn;or I$Gb8vLƉ&;>;e}Ď2U43Pc=jbq8ܑϝP8k\W3-q=cc=gl{]\|0O>Kb{$~>wd7=~0σǎ%mҍyd-{{T2i~QP?ʙ.:哹}xxyFg&0v|iueJq?3{tcK>2qb_ 5'z~V­מּ 7 \굗*g \㚞'}L6q-Gt6k=LwVc:kҹ/M[Mv߭GyO5wX}RWu=5w#^mΛ|FniFnlFniFiFniFn=h/]HZܭ3VRA[JJJJtޭDޭDJTw+w+%㒗LCcw+uxwc1\0w){Vr}z̵{{LOmxtFs̍k~x9_^͵`UQ>{**+{=bD{?3ܷdoGotIHǏw糗r_wvw-Q<"ΊQ9i逿#wy9\u 'u17o}ݺFӹ9j럢xd`o=dkK=W|mݵ7{K,/Wr}뚹޽f7/}<];Ey1h}%}VzV rw%t3k`_+~6&p3];[t]~4́VFDs%2^ t3+|g{&eĿ5@?wUّ'Ϥ7RILҔgl7۾ ٖLҔg<3m-oG?<~cG`cBeE­KD{2όyS־ڇ~1%?gF9wܨ3>VkTu<<8+GU*g[d}DOro8L7-ӼVo{y77yz<uAٕۑ񸌭#*g` tσ^!^c_7)`S$產0uh4Cɱj`x3\9EF4r}n~#&9'z 'IΉĿ^5Wx8 Zϟ=;\Bu>qI.%.ÇI:*R0*)vD'~GCX6 "-vEC@u?Ůѡ){o/]6y|if~}{oC/XMr뗿?io{^VEjwo=wUv4ɻ)5equfDkn+OXעD˜4XN\`^y?fZJw|߇΁T\s!7tJ3<+y/pfD.5OMԥ*xC<㼴:-,}S\12kÅ ,IS8oO2^>1{8_q?Q$+2/9}mV>gn+xh!MrOhCwPA-Q(qyk&o`wl᜶WzyG7ޢϹΗe0~d]>-y37J81_W)zy7_̸ !,2o﹁/ϘqbΛncN=>94y&w'ӑgҟ5Ϣ\Vv-Os3|F6a[}҆wU>ɗ,#sLL&;Nc@L^M}mcQ&rzj4<ޗYTNPmu@˙꺉5'R_~3FQ8;X^7ˆOM徨7}"Sc|sJn4a::?Lϐmn2?Cn܃,s8:oGUr5c۰]?___|_{/~x333~Wm K\;Ֆ>uZAj{CcMo}m)ak'Z?Q8ye@ZLZ>>}0iokjTwkv=?>mwcؼvۛ3et;| {]0>·|;L/Ww]?K=_?;_?9>a>83e]}f0K 0;2Zck|R_O z2οDo>DLpGᤌkתPm'WJrg,H^P#q-֠X`<<9.45ҹ8:~qkDkE siyg9W5RkwNc5 5Rk=-|j@9jЭjokwtjmD .S/ EPNC9ߡ,l>LΣm3Ϟլ`jէ R/l_5C#S5˭5Z>ΒuR) 5"դG56#H PЖRSw讹D_Р/^-ҷd\} Hm@Z/(>}h^_oHU W!U鑯*hHb&!F J=uhX^_P_#ubU"}[6d%WmbUf b h *hCA[J3W W+{%rP JBG@44B \+ R?&!F J4_B}a#G@[Ume!-b+7\r\ˑrh-\?l m)]n?_??b#v?r_?#G-ME!fb!>IQB~S  C>}@N_'цd|ϋ݋x?իW?l m)^Ϡ/^&_b.CeAt A>}B@T_RJs)b/EJ?T2%*@ @>ma^/V*цRJs b/AJ?D6@w <ك=ȁBG@4W,_1b.FA1IQBS'>}zXVF2ڒ? Vl"+BE9("ö PЖRE3 W {!rPBBG@4-4@\ -P?&!F J-4_B}a#G@[me!-bsύ݈ݍ?խ[?l m)nvϠ/υ]݅? O/}h AS}QNى؝ȁz:ClbNG@0Ps me!- 19s fbw hu*hCA[3 {>r|BG@47.19@]|%*@4vG@0P me!-1 /1!< Zt*hCA[JtϠ/+_.bEA.su A>}B@T_4?6lC66rClb \S  C>}@N_&цdl1/GĜsh/G?l m)9Нc?c"}f;} HN| O/}h >}?P"Ų|oy}}<_^Dk깽=/I﫳q}gCEk$}e &\S}`-Eim[ 2x M-}FdM{Li:uksW}2jY 3[ލ^Oq4jroM :*}[gY (ܯI[G] X'7z eVe5 5 j ~{޻`tj0cA[.# $5Sum:'%#WX)L?ٿ?4rOB ܑs?UmUPt5a5 5M:M Nl;1ykpg<)}+k>BqW! !kmko$] p/c5 55!{[!{r׀(~7gx `O7zP\ǜ49c9 7ҹ -/NsM9l=tcZƴX`ٺ wPe&5x(P׀y-5 $_y?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~slation.qld.gov.au/Acts_SLs/Acts_SL_R.htmDyK yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspxDyK yK rhttp://www.legislation.qld.gov.au/Acts_SLs/Acts_SL_P.htm DyK yK http://www.psc.qld.gov.au/page/corporate-publications/directive/index.shtml-DyK  yK http://www.psc.qld.gov.au/page/corporate-publications/catalogue/ceo-ses-so.shtml separation]DyK yK https://portal.qgcio.qld.gov.au/images/documents/QGEA_documents/QGEA/IS18 toolbox/GAP_GeneralSecurity.pdfyX;H,]ą'cDyK yK Lhttp://www.dsd.gov.au/infosec/ism.htmDyK yK Lhttp://www.dsd.gov.au/infosec/ism.htmDyK yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspxDyK yK Lhttp://www.dsd.gov.au/infosec/ism.htmDyK yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxDyK yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspxDyK yK Lhttp://www.dsd.gov.au/infosec/ism.htmDyK yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspxDyK yK Lhttp://www.dsd.gov.au/infosec/ism.htmDyK yK http://infostore.saiglobal.com/store2/Details.aspx?ProductID=1017612DyK yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspxDyK yK http://infostore.saiglobal.com/store2/Details.aspx?ProductID=1017612DyK yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxDyK yK http://infostore.saiglobal.com/store2/Details.aspx?ProductID=394737}DyK _Ref264027671DyK yK @http://www.archives.qld.gov.au/+DyK  yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/azqgeadocs.aspxnDyK yK Lhttp://www.dsd.gov.au/infosec/ism.htmDyK yK Lhttp://www.dsd.gov.au/infosec/ism.htmDyK yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx+DyK  yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/azqgeadocs.aspxn%DyK yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Information.aspx3DyK yK http://www.archives.qld.gov.au/downloads/emails_that_are_public_records_policy_and_guideline.pdfDyK yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspxDyK yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx+DyK  yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/azqgeadocs.aspxnDyK yK rhttp://www.legislation.qld.gov.au/Acts_SLs/Acts_SL_I.htmDyK yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspxDyK yK rhttp://www.legislation.qld.gov.au/Acts_SLs/Acts_SL_I.htmDyK yK http://infostore.saiglobal.com/store2/Details.aspx?ProductID=394887DyK yK http://infostore.saiglobal.com/store2/Details.aspx?ProductID=1017612SDyK yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/informationstandards/current/Pages/Recordkeeping.aspxDyK yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/informationstandards/current/Pages/Retention and Disposal of Public Records.aspxDyK yK http://www.saiglobal.com/PDFTemp/Previews/OSH/as/misc/handbook/HB171.PDFDyK yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx{DyK yK http://qgcio.govnet.qld.gov.au/SiteCollectionDocuments/Architecture and Standards/QGEA 2.0/Identity and Access Management policy.pdfyDyK yK http://www.qgcio.qld.gov.au/SiteCollectionDocuments/Architecture and Standards/QGEA 2.0/Identity and Access Management position.pdfDyK yK http://infostore.saiglobal.com/store2/Details.aspx?ProductID=1017612+DyK  yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/azqgeadocs.aspxn[DyK yK http://www.qgcio.qld.gov.au/SiteCollectionDocuments/Architecture and Standards/QGEA 2.0/Software Currency Policy.pdf_DyK yK http://www.qgcio.qld.gov.au/SiteCollectionDocuments/Architecture and Standards/QGEA 2.0/Software Currency position.pdf+DyK  yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/azqgeadocs.aspxiDyK yK http://infostore.saiglobal.com/store2/Details.aspx?ProductID=1017612DyK yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxDyK yK http://infostore.saiglobal.com/store2/Details.aspx?ProductID=394737DyK yK http://infostore.saiglobal.com/store2/Details.aspx?ProductID=394737DyK yK http://infostore.saiglobal.com/store2/Details.aspx?ProductID=568739DyK yK rhttp://www.legislation.qld.gov.au/Acts_SLs/Acts_SL_I.htmeDyK yK http://www.oic.qld.gov.au/files/IPAGuidelines/Guideline - privacy breach management and notification - 1-12-09 - v1.1.pdfeDyK yK http://www.comlaw.gov.au/ComLaw/Management.nsf/current/bytitle/32AA97DFE9AA8326CA256F7100071D25?OpenDocument&mostrecent=1DyK yK ~http://www.privacy.gov.au/materials/types/guidelines/view/6478aDyK yK http://qgcio.govnet.qld.gov.au/govnet/Documents/Architecture and Standards/Information Security/BCP Guideline 1.0.0.doc/DyK yK http://premiers.govnet.qld.gov.au/security/docs/GAP Guide for Business Continuity Planning.pdf DyK yK http://www.saiglobal.com/PDFTemp/Previews/OSH/as/misc/handbook/HB221-2004.PDFDyK yK http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxDyK yK http://infostore.saiglobal.com/store2/Details.aspx?ProductID=1378670;DyK yK http://qgcio.qld.gov.au/qgcio/architectureandstandards/informationstandards/current/Pages/index.aspxDyK yK Vhttp://www.archives.qld.gov.au/default.aspDyK yK http://infostore.saiglobal.com/store2/Details.aspx?ProductID=568831i$$If!vh#v:V 4 t 68<,54 af4p i$$If!vh#v':V 47 t 6T_8',5'4 af4p s2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@_HmH nH sH tH @`@ {+NormalOJQJ_HmH sH tH ` {+ Heading 1($ & F-D@&M 35B* CJ$KHOJQJ_HaJ hmH ph1_sH tH `@` {+ Heading 2% & F@d-D@&M B*CJph.RkV@!V {+ Heading 3 & FP@&B*CJKHaJphZ@1Z {+ Heading 4$ & FF@&56aJmH sH tH DAD {+ Heading 5 & F(@&6FF {+ Heading 6$$ & F@&mH sH VV {+ Heading 7$ & F@&a$KHaJhmH sH tH VV {+ Heading 8$ & F@&a$KHaJhmH sH tH V V {+ Heading 9 $ & F@&a$KHaJhmH sH tH DA D {+Default Paragraph FontRi@R  Table Normal4 l4a (k ({+No List fY f {+ Document Map-D M CJOJQJ^J_HmH sH tH l/l{+Front page title $a$&5CJ8OJQJ_HmHnHsH tH uPoP {+Security classification B*ph@O"@ {+ Footer red;B*CJphVO2V {+ Table Text & Fd<<CJKH]tH HoAH {+ Report title5B*CJ4OJQJphFoQF {+ Report date5B* CJOJQJph8aLoaL {+Version number5B* CJOJQJph8aDO1rD {+ Table Heading B*CJphPoP {+ Blank line1$CJ OJQJ_HmH sH tH \/\ {+Blank line Char CharCJ OJQJ_HmH sH tH \B`\ {+ Body Text & FdnCJOJQJ_HmH sH tH VV{+Front page subtitle]6CJB' B {+Comment ReferenceCJaJ@jQR@ {+Comment Subject5\HH {+ Balloon TextCJOJQJ^JaJLOB L {+Heading 1 no number  & F@& ^O^ {+Bullet - Numbered & F((^JaJhtH D1D {+Table Text italics!6\O\ {+ Appendix 1)"$ & F $@&^`$aJ8O!8 {+ Appendix 2 # & F818 {+ Appendix 3 $ & FFAF {+ Appendix 4 % & F56mH sH JObJ {+ Bullet circle& & F ((aJFOrF {+ Bullet dash' & F ((aJTT {+Bullet open circle( & F ((aJ~ @~ {+FooterH)$ & F 9r %$d&dNP^a$KHaJhtH ^@^ {+Header/* & F 9r d&dPCJaJZ1Z {+Table bullet circle+ & F((aJtH R1R {+Table bullet dash, & F((aJd>d {+Title+-$ <*$^`a$:CJ KHmH sH `{+TOC 10. 7% 77<]7^7`-5CJKHOJQJ_HhmHnHsH tH uj@j{+TOC 2//$ n% 7n<]7^n`a$CJKHhmHnHuv v{+TOC 3'0$ % <^`a$*CJKHOJQJ_HhmHnHsH tH u>U`> {+ Hyperlink>*B*OJQJphPP {+TOC 42$ n % ^a$:KHhtH .. {+TOC 5 3^.. {+TOC 6 4^.. {+TOC 7 5^.. {+TOC 8 6^.. {+TOC 9 7^P"@P {+Caption8 & FdJ^CJ\<m<{+1 / 1.1 / 1.1.19 F 0l0{+ 1 / a / i: F @n@{+Article / Section; FDTD {+ Block Text<x]^<P< {+ Body Text 2 =dx>Q> {+ Body Text 3>xCJaJPMP {+Body Text First Indent ?`DCD {+Body Text Indent @n^nTNT {+Body Text First Indent 2 A`RR"R {+Body Text Indent 2Bdx^TS2T {+Body Text Indent 3Cx^CJaJ2?B2 {+Closing D^4R4 {+ Comment TextE$L$ {+DateF<[r< {+E-mail SignatureG.X`. {+Emphasis6]h$h {+Envelope Address!I@ &+D/^@ CJ^JaJ>%> {+Envelope ReturnJ^JFV F {+FollowedHyperlink >*B* ph@&`@ {+Footnote ReferenceH*L@L {+ Footnote TextM & Fd<CJ0_0 {+ HTML Acronym:`: {+ HTML AddressO6]0a 0 {+ HTML Cite6]>b > {+ HTML CodeCJOJQJ^JaJ<c !< {+HTML Definition6]Fd 1F {+ HTML KeyboardCJOJQJ^JaJJeBJ {+HTML PreformattedT OJQJ^J:f Q: {+ HTML Sample OJQJ^JJg aJ {+HTML TypewriterCJOJQJ^JaJ8h q8 {+ HTML Variable6].(. {+ Line Number4/4 {+ListY^`828 {+List 2Z6^6`838 {+List 3[Q^Q`848 {+List 4\l^l`858 {+List 5]^`:0: {+ List Bullet ^ & F>6> {+ List Bullet 2 _ & F>7> {+ List Bullet 3 ` & F>8> {+ List Bullet 4 a & F>9"> {+ List Bullet 5 b & FBD2B {+ List Continuecx^FEBF {+List Continue 2d6x^6FFRF {+List Continue 3eQx^QFGbF {+List Continue 4flx^lFHrF {+List Continue 5gx^:1: {+ List Number h & F>:> {+ List Number 2 i & F>;> {+ List Number 3 j & F><> {+ List Number 4 k & F >=> {+ List Number 5 l & F I {+Message Headergmn$d%d&d'd-DM NOPQ^n` CJ^JaJD^D {+ Normal (Web)nCJOJQJaJ>> {+ Normal Indent o^4O4 {+ Note Headingp.). {+ Page Number<Z"< {+ Plain Textr OJQJ^J0K0 {+ Salutations6@B6 {+ Signature t^*W Q* {+Strong5\FJbF {+Subtitlev$<@&a$ CJ^JaJs {+Table 3D effects 1m:Vwj#j#j#j#j.j.j.j. w55\5B* \`J phB* `J ph66 {+Table 3D effects 2:Vxj.@j#j9jj 4x5\5\tt {+Table 3D effects 3:Vyj.@j j j#j9jj44y:B*`Jph B*`Jph5\5\brb {+Table Classic 1:Vz0  j#j#j#jj z9B*`Jph6]5\56\]s {+Table Classic 2#:V{0  j% j#j0 jjj%  {:5\B*`JphB* `J ph5\TtT {+Table Classic 3:V|0    jj0  j0  |QB* ph5B*\`JphB* `J ph56B*\]`Jphu {+Table Classic 4:V}0  jj0 j0 jj }X5\B* `J ph56B*\]`JphB* `J ph5\RvR {+Table Colorful 1:V~0    j% j% jj%  ~<B*ph56\]56\]56\]TwT {+Table Colorful 2:V0 j% jj0  j @56\]56B*\]`Jph56\]4x4 {+Table Colorful 3:V0j;$ j0 j%  5B*\`Jphy {+Table Columns 1 :V0    j j jjjj#jj4l5\B*`Jph B*`Jph5\5\5\5\5\5\z# {+Table Columns 2:Vj j jjjj% jj45\B*`Jph B*`Jph5\5B*\`Jph5\B*`Jph5\5\{3 {+Table Columns 3:V0j j jjj#j% j4h5\B*`Jph B*`Jph5\5\5\B*`Jph5\|C {+Table Columns 4:Vj j jjj% 4LB*`Jph B*`Jph5\5\B*`Jph`}S` {+Table Columns 5:V0    j jjj#j#4VB*`Jph B*`Jph5\5\5\56\]0c0 {+Table Contemporary:V0j%@ j% j% 4<@B*`JphB*`Jph5B*\`Jphs {+ Table Elegant_:V0j ;B*`Jphjj {+ Table Grid7:V0~ {+ Table Grid 1z:V0jj 6]6] {+ Table Grid 2:V0jjj#j ,5\5\5\5\ {+ Table Grid 3:V0  jjj0  5\5\>> {+ Table Grid 4:V0  jj0 j0  B5B*\`Jph5B*\`JphB*`Jph {+ Table Grid 5:V0    jjj# j 5\5\$$ {+ Table Grid 6:V0    jj#j#j (5\B*`Jph5\JJ {+ Table Grid 7:V0    jjj#j# j 25\5\5\5\5\   {+ Table Grid 8:V0jjj%  H5B*\`Jph5B*\`Jph5B*\`Jphv v {+ Table List 1:V0  j%@ jj#j0 j4M@B*`JphB*`Jph56B* \]`J ph5\p# p {+ Table List 2:V0 j%@ jj#j0 j4G@B*`JphB*`Jph5B*\`Jph5\3  {+ Table List 3:V0  j# j# j 05B* \`J ph6B* ]`J phC {+ Table List 4w:V0    j0   5B*\`JphS {+ Table List 5:V0jj#  5\5\c  {+ Table List 6:V0j%@ j# j#  45\5\s  {+ Table List 7:V0  j%@ j% jjj# j0  4>@B*`Jph5\5\5\5\  {+ Table List 8:V0j%@ j% jjj#j0 4D@B*`Jph5\5\5\56\] {+Table Professionall:V0j%  5B*\`Jpho {+Table Simple 1:V0  j#j# rp r {+Table Simple 2:Vj#j# j#j# j#j#O5\5\5B*\`Jph5\5\5\q {+Table Simple 3l:V0    j%  5B*\`Jphp p {+Table Subtle 1 :Vj0@ j# j# j0  j. jj45\5\p p {+Table Subtle 2:V0j0  j0  j# j# jj5\5\l l {+ Table Theme7:V0 {+ Table Web 1h:V03j B*`Jph {+ Table Web 2h:V03j B*`Jph# {+ Table Web 3h:V03j B*`Jph.3 . {+ QGEA table:V40.Rk.Rk.Rk.Rk.Rk.Rk4943>> Uaf4jg .Rk,OJQJ!56B*CJOJQJaJphhOB h {+Body style for document details & FdLO!B L {+Heading 2 no number & F@& Rab R {+Bullet for exec summary & FBOB {+Image$ & Fd^l# l {+Table of Figures7<<]7 CJOJQJ_HaJmH sH tH 2/ 2 {+ Artefact type {+ Guidance textd & Fd$d%d&d'd-DM NOPQCJtH 2OR 2 {+ Report statusb/ b !A Char Char435B*CJKHOJQJ_HaJ hmH ph.RksH tH L/ L  Body Text CharOJQJ_HmH sH tH R R y Body Text 4$ e@sCJOJQJtH N1 N {+table text number & F((\1 \ {+table text alpha! & F8((^8`h/ h  Heading 3 Char35B*CJKHOJQJ_HaJhmH ph.RksH tH j/! j  Heading 4 Char656B*CJKHOJQJ_HaJhmH ph.RksH tH X2 X o%Bullet 3$$ & F esa$CJOJQJtH h/A h e7Heading 1 Char35B* CJ$KHOJQJ_HaJ hmH ph1_sH tH \/Q \ &lLBullet circle Char CJOJQJ_HaJmH sH tH X/a X MFootnote Text CharCJOJQJ_HmH sH tH r gQDefault Paragraph Font Para Char Char1 Char,Default Paragraph Font Char Char Char hd OJQJtH dO d abodystylefordocumentdetailsd<x^JjO j aheading2nonumber$@<G$5B* CJOJQJ\aJph8aJ/ J !A Char Char1CJOJQJ_HmH sH tH rO r {+Title Page Optional Text LinegdP>B*CJaJphtH b b {+Title Page Subtitle <gdP>B*CJ(aJphtH h/ h {+Heading 2 Char35B*CJKHOJQJ_HaJ hmH ph.RksH tH R/ R {+Body Text Char1CJOJQJ_HmH sH tH PK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭VvnB`2ǃ,!"E3p#9GQd; H xuv 0F[,F᚜K sO'3w #vfSVbsؠyX p5veuw 1z@ l,i!b I jZ2|9L$Z15xl.(zm${d:\@'23œln$^-@^i?D&|#td!6lġB"&63yy@t!HjpU*yeXry3~{s:FXI O5Y[Y!}S˪.7bd|n]671. tn/w/+[t6}PsںsL. J;̊iN $AI)t2 Lmx:(}\-i*xQCJuWl'QyI@ھ m2DBAR4 w¢naQ`ԲɁ W=0#xBdT/.3-F>bYL%׭˓KK 6HhfPQ=h)GBms]_Ԡ'CZѨys v@c])h7Jهic?FS.NP$ e&\Ӏ+I "'%QÕ@c![paAV.9Hd<ӮHVX*%A{Yr Aբ pxSL9":3U5U NC(p%u@;[d`4)]t#9M4W=P5*f̰lk<_X-C wT%Ժ}B% Y,] A̠&oʰŨ; \lc`|,bUvPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!R%theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] ],];sNPPRRRRRRUp  _ n_4ZC= !x"2#$$%)&u(+.1D4?79:=BEWHNUW!Z[]_ahcghkorsvy{~i>(ɋٍɒIxN~Cj~M+m F 'Z+j02c5690=?BC_FjI}LQVgYz\`_c@ABDEFGHJKLMNPQSTVWY\q T +&u/:I#YTc6oLw$ɋ6^dD* )' .93JWUZ>`cdee  $',/38:<?CIORUXZ[] fZ()IYuwxz7B^`ac  + N j l m o  , . / 1 Q j ! = @ A C c     5 S o r s u   ! " $ D Y u x y { .JMNPp8i<X[\^~4Jfijl>Milmo*-.0Pk0346Vq &BEFHh>q/KNOQq#Qmpqs1457Wv7SVWYy   /Iehik "B[wz{};>?Aa!$%'+`w!!!^####$$%&&\&&&$((()*[**+'++,?,-4-C---.//////031811111223D4t4c<<<>>??R@W@\OOOO4PgP#QQQQ"RURzRRSpSST[UUUU[VVVVJWLWWWXY5YYY=Z~ZZZZJ[Q[[,\1\;\\\w^^1_4___B`j`o`q````IaPabub|bwcccggg[iii9jjj#kkkpq4q]rrrtqttouuuvpvv|7}>}F}}}}~~~'8 BFZa Ƀ+/?FPX~w|pΒnlq͠ѠӠ9>cIǢ`Ʀ˦M˨D[^y|Et}!(/3Ex|t{~Bxzdi$a}!NkT^VX*,f'n[ =D$ t#!w!!(<)m))**{++ , ,^,,,/-b-{--.m....v///60M00011x1}18B9s99:Q:z::;8<<< >_>>>K?{????AAB6FFFrIIIiRRR] X   X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%̕XXXXXXXXXXXXXXXX: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX?28:gnq  CJU    !  t ,R$-| ǧF@0`@ (    S ^A@ long docs cover page background#" `?0(  B S  ?U)~?t@ ReportDate _Ref214338390 _Ref215544166 _Toc273003703 _Toc273003704 _Toc273003705 _Toc273003706 _Toc273003707 _Toc273003708 _Hlt251758037 _Hlt251758038 _Hlt271199036 _Hlt271199037 _Hlt277151081 _Hlt277151082 _Hlt273003765 _Hlt273003766 _Hlt253582024 _Hlt253582025 _Hlt272833718 _Toc273003709 _Toc273003710 _Toc273003711 _Hlt261017914 _Hlt261017915 _Hlt261017877 _Hlt261017878 _Hlt264026957 _Hlt261017879 _Hlt264026946 _Hlt264026947 _Hlt261017867 _Hlt261017868 _Hlt261017546 _Hlt261017547 _Toc273003712 _Ref252527873 _Toc273003713 _Hlt271201249 _Toc273003714 _Toc273003715 _Hlt272833244 _Hlt270333519 _Hlt270333520 _Hlt251251855 _Hlt251251856 _Hlt270333927 _Hlt270333928 _Hlt270334317 _Hlt273003775 _Hlt273003776 _Toc273003716 _Toc273003717 _Toc273003718 _Toc273003719 _Hlt271201050 _Hlt271201051 _Toc273003720 _Hlt270335169 _Hlt248208983 _Hlt248208984 _Hlt270334701 _Hlt270334702 _Hlt270334874 _Hlt270334875 _Toc273003721 _Toc273003722 _Hlt440357684 _Hlt440357633 _Hlt440357587 _Hlt273003815 _Hlt272833634 _Toc273003723 _Hlt272833664 _Hlt272833630 _Hlt272833631 _Toc273003724 _Toc273003725 _Toc273003726 _Toc273003727 _Toc273003728 _Toc273003729 _Hlt264028898 _Hlt270337039 _Hlt270337040 _Toc273003730 _Toc273003731 _Toc273003732 _Toc273003733 _Toc273003734 _Toc273003735 _Toc273003736 _Toc273003737 _Toc273003738 _Toc273003739 _Toc273003740 _Toc273003741 _Toc515355193 _Toc516562400 _Toc517686667 _Toc518111431 _Toc518111677 _Toc522674107 _Toc524756711 _Toc525440929 _Toc273003742 _Toc273003743 _Toc273003744 _Toc273003745 _Toc273003746 _Toc273003747 _Toc273003748 _Hlt271200956 _Toc273003749 _Toc273003750 _Toc273003751 _Toc271108164 _Toc273003752 _Toc273003753 _Ref264027671 _Toc273003754 _Toc273003755 _Hlt253662703 _Hlt253662704 _Hlt252544744 _Toc273003756 _Hlt271200922 _Hlt271200923 _Hlt270340808 _Hlt270340809 _Toc273003757 _Toc273003758 _Toc273003759 _Toc273003760 _Toc273003761 _Toc273003762 _Toc271108176 _Toc271108177 _Toc271108178 _Toc273003763 _Toc271108180 _Ref252545247 _Toc273003764P,,,9"@##(E*E*K*K*8-8-y-y---.i225NN!N!N'NONPNPNTNTNXNXNOXRXRSS&SU$W$W0Y0YYY_```,dGd_hkksvtttttuu8{$|356DEI-.. 6X^Ezz4z-?"(^^^^^^^^^@ Jz']#((*0505O5_9_9O:;i?i?w?w?B3B:CkDEFSISISISILLL] @ @ @ @ @@@@@@@@@@@@@@@@ @!@"@#$%&@'()@*@+@,@-@.@/@0@1@2@34567@8@9:@;@<@=@>@?@@@ABC@D@E@F@G@HI@J@K@LMNOPQT@R@S@UVWXYZ[\]^_`abcdefghijklmnop@qrstuvwxyz@{@|@}~@@@@V8@"E#####(F*F*L*L*9-9-z-z---.225NN!N!N'NONPNPNTNTNXNXNOqRqRS%SESU$W$W1Y1YYY_```FdUdphkkswtttttuu]{F|467EF[.//5ađ˓mo{{ͶB+>T0=*nnnnnnnnd y3p#(+(*N5N5b5_9_9O:);j?j?x?x?2BEBMC}DF.FSISISIkILLL]*Lo +Lo ,Lo -Lo.Lo/Lo 0Lo 1Lo2Lo3Lo4Lo5Lo6Lo7Lo8Lo9Lo:Lo;LoLo\gY1MgNgNRRSS=T=T|TTT]\t\t\]     ~{13MqNqNSSSSGTGTTTTh\~\~\] >*urn:schemas-microsoft-com:office:smarttags PersonName9*urn:schemas-microsoft-com:office:smarttagsState9*urn:schemas-microsoft-com:office:smarttagsplace8*urn:schemas-microsoft-com:office:smarttagsCity J"#++@,A,R,,D-//3u4v44OhPiPPVKWLWWZR[4__kk~~~'./99EG0[ȢEJ}yzj WX+(% (n)I0L0GG"N%NINLN*O-OOO PPY[[[[[[[[[[[[\\\\\\3];]F]J]Y][]]]]]] ###( (57<7@@LTUTFePeggllllnnoo&z)zelۖMRw{ ׬ݬ|ϲвJM08=D:@ }z,/di47%-) / IQ(0IM::Y[[[[[[[[[[[]]3333333333333333333333333333333333333333333333333333$U\,A"""#&$(i2255,<<!?;?@@AAFFHGfGIJLMOOXRrRSYS*TLTUUWX[[B``ab,dVd_hhi4ilmm n7pRpqqssYyy7{^{$|G|\9{Ƀ2SeȊފ bő̓XnY_JbF^pJζ4C@,zrz{mDS,-U"1[p,J>+^@ e    ) Gh'4\#q#(,((p)**{+ ,,d-m../O0/5c588;*;BFB:CNCkD~DE0FSIlIMNNNNNMOqOOOOPiPRT+UWXY[[[[[[[[[[[\\^\\\\\\\\3];]F]J]Y][]]]]]]]ef+@,-D-//3u4OhPVKWLWWZR[4__#kk~~~'99G0pȢE^};;;;yzjWX+(%(n)YY[[[[[[[[[[[[[[]]|Kl},wk~ 3jYib, >0ay*`8&_vh`U^99&+,< I_ 40 n- 4+4B\a4ڄ*1@"#$%qB  wE !fTTȅ _W>F wPe# Yf6hXi6߳p{l@rcsTz`~&'(7~!^`.^`.^`.^`. ^`OJQJo( ^`OJQJo( ^`OJQJo( ^`OJQJo(hh^h`. hh^h`OJQJo(^`B* OJQJo(ph1_hH77^7`B*OJQJo(ph.RkhH 7^7`CJaJo(hH 7^7`o(hH 7^7`o(hH 7^7`o(hH 7^7`o(hH 7^7`o(hH 7^7`o(hH hh^h`hH) ^`hH) 88^8`hH) ^`hH() ^`hH() pp^p`hH()   ^ `hH. @ @ ^@ `hH.   ^ `hH.^`B*CJo(phhH nWn^n`Wo(hH. W^`Wo(hH. V^`Vo(hH. ^`o(hH ^`o(hH ^`o(hH ^`o(hH ^`o(hH hh^h`hH) ^`hH) 88^8`hH) ^`hH() ^`hH() pp^p`hH()   ^ `hH. @ @ ^@ `hH.   ^ `hH. hh^h`hH) ^`hH) 88^8`hH) ^`hH() ^`hH() pp^p`hH()   ^ `hH. @ @ ^@ `hH.   ^ `hH."W^`WB*CJOJQJo(phhHRWR^R`WOJQJo(hH nn^n`OJQJo(hH% n^n`o(hH n^n`o(hH n^n`o(hH n^n`o(hH n^n`o(hH n^n`o(hH8$pp^p`56B*OJQJo(phhH-8pp^p`OJQJ^Jo(hHo8@ @ ^@ `OJQJo(hH8^`OJQJo(hH8^`OJQJ^Jo(hHo8^`OJQJo(hH8^`OJQJo(hH8PP^P`OJQJ^Jo(hHo8  ^ `OJQJo(hH [^`[;o(hH Appendix  ;^`;o(hH. ^`o(hH ^`o(hH ^`o(hH ^`o(hH ^`o(hH ^`o(hH ^`o(hH hh^h`hH. P^`PhH.. ^`hH... xp^`xhH....  ^`hH .....  X ^ `XhH ......  ^ `hH.......  8^`8hH........  `H^``hH......... hh^h`hH) ^`hH) 88^8`hH) ^`hH() ^`hH() pp^p`hH()   ^ `hH. @ @ ^@ `hH.   ^ `hH. ;^`;o(hH ;^`;o(hH. ;^`;o(hH.. ^`o(hH ^`o(hH ^`o(hH ^`o(hH ^`o(hH ^`o(hH^`B*CJo(phhH nWn^n`Wo(hH. W^`Wo(hH. V^`Vo(hH. ^`o(hH ^`o(hH ^`o(hH ^`o(hH ^`o(hH ^`hH Article . ^`hH Section . P^`PhH() `p`^``phH() P^`PhH) P^`PhH) ^`hH) P^`PhH. 0p0^0`phH.W^`WB* OJQJo(ph1_hH^`OJQJ^Jo(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoPP^P`OJQJo(hHn ^`OJQJo(njj^j`.n: L: ^: `L.n  ^ `.n^`.nL^`L.nzz^z`.nJJ^J`.nL^`L. ^`o(hH ^`o(hH. 77^7`o(hH. 7^7`o(hH 7^7`o(hH 7^7`o(hH 7^7`o(hH 7^7`o(hH 7^7`o(hH&nWn^n`WB* CJOJQJaJo(ph1_hHW^`WB*OJQJo(ph.RkhH V^`VB*OJQJo(ph.RkhH% ^`o(hH ^`o(hH ^`o(hH ^`o(hH ^`o(hH ^`o(hH ^`o(hH ^`o(hH. 77^7`o(hH. 7^7`o(hH 7^7`o(hH 7^7`o(hH 7^7`o(hH 7^7`o(hH 7^7`o(hH ~}|sTzqBn-wPe994+4!fT1@p{lI_ Xi!fT!fT7~Yf_W< wEsTza4sTz##JHk        ^B6                   bRr]ƽ4<@N~P+~R          y1Q (9F*h Wyc@hr8GU=j4 rL!BU y-m6G%(xB2yiPJn?A6;ac>2rYP  q|p0HB WB; ! {V0k{Vj4 30Q1A\T} kUg0M%x0kj$]yn'%5zj;Wdw6~J 3  u = 4 vSoTY * {KF Y8B2 QAlK V8| zI V}- ys$a P jdc L5l D b *l=  -y #6 H 1 nId8| ZuUm ;2yvzc<'|KG h bQm=i%`}} 1<Id M@6~WMP k)k:0_>ys|2 wy,q<<[lfa4_zItXixFMmF-~P :{)L OO{<)#h#c}_ [F|h.o@^iMCwt4 DPbxAZmY|u>7p0AaC<*l% g8C+|a}YZ_YP H~xsLxNrL!w;l0_>{268 *C~t4VnDFwagQ DUE{47'L+Bb[lf~yDFhF __ D L!8*!xCs9h!ZmY !9UOR!'<;P"!L!&oR2{"=h-Fh#t.a #J #^oLj$z0W~V$^_3Ix-%R2nE%i%u\O~&8aBF&?'$u(&WU{'*q47' u .H'Z@'l'wNgP# v'q|'rb]#W'ku<'{'O(@l4 (*N?(x9p5(HBU6(rk)z"r)0_><)Dq%*Gq9*NB,{#Si,{V~t-Lj$V}-l-C ddT.FMnP.{&_.UHI.)|.CNardGregory Yurchenko4Microsoft Office Word@H'@E@|FL@@tL%3O&  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q  QGCIOs@Y Information Security (IS18) Titlcy Policy.pdfuYhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/azqgeadocs.aspxn|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxANEhttp://infostore.saiglobal.com/store2/Details.aspx?ProductID=1017612tahttp://www.qgcio.qld.gov.au/SiteCollectionDocuments/Architecture and Standards/QGEA 2.0/Identity and Access Management position.pdf http://qgcio.govnet.qld.gov.au/SiteCollectionDocuments/Architecture and Standards/QGEA 2.0/Identity and Access Management policy.pdf|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxIhttp://www.saiglobal.com/PDFTemp/Previews/OSH/as/misc/handbook/HB171.PDF8http://www.qgcio.qld.gov.au/qgcio/architectureandstandards/informationstandards/current/Pages/Retention and Disposal of Public Records.aspxPOqhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/informationstandards/current/Pages/Recordkeeping.aspxANEhttp://infostore.saiglobal.com/store2/Details.aspx?ProductID=1017612vuDhttp://infostore.saiglobal.com/store2/Details.aspx?ProductID=394887|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx%9http://www.legislation.qld.gov.au/Acts_SLs/Acts_SL_I.htmqbWhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspx%9htt՜.+,D՜.+,L hp  QGCIOs@Y Information Security (IS18) Title0ow _PID_HLINKSVersionDate completedAyt'Dhttp://infostore.saiglobal.com/store2/Details.aspx?ProductID=568831|n$Ohttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|n!Ohttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx0o+http://www.archives.qld.gov.au/default.asp|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxQehttp://qgcio.qld.gov.au/qgcio/architectureandstandards/informationstandards/current/Pages/index.aspxKJEhttp://infostore.saiglobal.com/store2/Details.aspx?ProductID=1378670|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxFNhttp://www.saiglobal.com/PDFTemp/Previews/OSH/as/misc/handbook/HB221-2004.PDFsv _http://premiers.govnet.qld.gov.au/security/docs/GAP Guide for Business Continuity Planning.pdf5y xhttp://qgcio.govnet.qld.gov.au/govnet/Documents/Architecture and Standards/Information Security/BCP Guideline 1.0.0.doc|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxt8?http://www.privacy.gov.au/materials/types/guidelines/view/6478BAzhttp://www.comlaw.gov.au/ComLaw/Management.nsf/current/bytitle/32AA97DFE9AA8326CA256F7100071D25?OpenDocument&mostrecent=1U_zhttp://www.oic.qld.gov.au/files/IPAGuidelines/Guideline - privacy breach management and notification - 1-12-09 - v1.1.pdf%9http://www.legislation.qld.gov.au/Acts_SLs/Acts_SL_I.htmvtDhttp://infostore.saiglobal.com/store2/Details.aspx?ProductID=568739|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxy~Dhttp://infostore.saiglobal.com/store2/Details.aspx?ProductID=394737|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxy~Dhttp://infostore.saiglobal.com/store2/Details.aspx?ProductID=394737|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxANEhttp://infostore.saiglobal.com/store2/Details.aspx?ProductID=1017612rYhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/azqgeadocs.aspxi'6whttp://www.qgcio.qld.gov.au/SiteCollectionDocuments/Architecture and Standards/QGEA 2.0/Software Currency position.pdf@Huhttp://www.qgcio.qld.gov.au/SiteCollectionDocuments/Architecture and Standards/QGEA 2.0/Software Currenp://www.legislation.qld.gov.au/Acts_SLs/Acts_SL_I.htmuYhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/azqgeadocs.aspxn|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxqbWhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspx!ahttp://www.archives.qld.gov.au/downloads/emails_that_are_public_records_policy_and_guideline.pdf@AZhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Information.aspxuYhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/azqgeadocs.aspxn|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxJ&http://www.dsd.gov.au/infosec/ism.htmJ&http://www.dsd.gov.au/infosec/ism.htm|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxu|Yhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/azqgeadocs.aspxn*}y http://www.archives.qld.gov.au/y~sDhttp://infostore.saiglobal.com/store2/Details.aspx?ProductID=394737|npOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxANmEhttp://infostore.saiglobal.com/store2/Details.aspx?ProductID=1017612qbjWhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspxANgEhttp://infostore.saiglobal.com/store2/Details.aspx?ProductID=1017612Jd&http://www.dsd.gov.au/infosec/ism.htmqbaWhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspxJ^&http://www.dsd.gov.au/infosec/ism.htmqb[Whttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspx|nXOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nUOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nROhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxJO&http://www.dsd.gov.au/infosec/ism.htmqbLWhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspx|nIOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nFOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxPChttp://www.ag.gov.au/pspfJ@&http://www.dsd.gov.au/infosec/ism.htmP=http://www.ag.gov.au/pspf|n:Ohttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|n7Ohttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxJ4&http://www.dsd.gov.au/infosec/ism.htmP1http://www.ag.gov.au/pspfM.jhttps://portal.qgcio.qld.gov.au/images/documents/QGEA_documents/QGEA/IS18 toolbox/GAP_GeneralSecurity.pdf|n+Ohttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|n(Ohttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|n%Ohttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|n"Ohttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx"mQhttp://www.psc.qld.gov.au/page/corporate-publications/catalogue/ceo-ses-so.shtml separationn?Lhttp://www.psc.qld.gov.au/page/corporate-publications/directive/index.shtml<9http://www.legislation.qld.gov.au/Acts_SLs/Acts_SL_P.htm|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxqbWhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|n Ohttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxP http://www.ag.gov.au/pspf>9http://www.legislation.qld.gov.au/Acts_SLs/Acts_SL_R.htm|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxJ&http://www.dsd.gov.au/infosec/ism.htmPhttp://www.ag.gov.au/pspf|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxPahttp://www.qgcio.qld.gov.au/SiteCollectionDocuments/Architecture and Standards/QGISCF v1.0.1.doc|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx@AZhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Information.aspx<9http://www.legislation.qld.gov.au/Acts_SLs/Acts_SL_P.htm|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx_Phttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/informationstandards/toolbox/Pages/InformationAssetCustodianship.aspx@AZhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Information.aspx@AZhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Information.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxqbWhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/qgea2.0/Pages/Business.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxq+mailto:security.planning@police.qld.gov.au|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxMNEhttp://infostore.saiglobal.com/store2/Details.aspx?ProductID=1378614|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxJ&http://www.dsd.gov.au/infosec/ism.htmPhttp://www.ag.gov.au/pspf1</http://www.dsd.gov.au/library/infosec/ism.htmlQ5mailto:pspf@ag.gov.auPhttp://www.ag.gov.au/pspf`n7http://www.safeguarding.qld.gov.au/govassets/index.htmFAEhttp://infostore.saiglobal.com/store2/Details.aspx?ProductID=1119299|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspxhttp://qgcio.govnet.qld.gov.au/SiteCollectionDocuments/Architecture and Standards/QGEA 2.0/QG Information Security Policy Framework 1 0 1.pdf|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx|nOhttp://www.qgcio.qld.gov.au/qgcio/architectureandstandards/Pages/security.aspx6|_Toc2730037646v_Toc2730037636p_Toc2730037626j_Toc2730037616d_Toc2730037606^_Toc2730037596X_Toc2730037586R_Toc2730037576L_Toc2730037566F_Toc2730037556@_Toc2730037546:_Toc27300375364_Toc2730037526._Toc2730037516(_Toc2730037506"_Toc2730037496_Toc2730037486_Toc2730037476_Toc2730037466 _Toc2730037456_Toc2730037446_Toc2730037436_Toc2730037426_Toc2730037416_Toc2730037406_Toc2730037396_Toc2730037386_Toc2730037376_Toc2730037366_Toc2730037356_Toc2730037346_Toc2730037336_Toc2730037326_Toc2730037316_Toc2730037306_Toc2730037296_Toc2730037286_Toc2730037276_Toc2730037266_Toc2730037256_Toc2730037246_Toc2730037236_Toc2730037226z_Toc2730037216t_Toc2730037206n_Toc2730037196h_Toc2730037186b_Toc2730037176\_Toc2730037166V_Toc2730037156P_Toc2730037146J_Toc2730037136D_Toc2730037126>_Toc27300371168_Toc27300371062_Toc2730037096,_Toc2730037086&_Toc2730037076 _Toc2730037066_Toc2730037056_Toc2730037046_Toc273003703emailto:ICTPolicy@qld.gov.au1.0.011 December 2008/kqC!/L#R k%/jdc >/c(S0K\6M?,0 x{Ue0O&1g0 ! W0M@S0{#SO&1H 1 #1]XNy1R2 DG{2(S02# v' 2DxUr|2QTv]xso3Y bC3s9h!^_3C3/37'u.4@l4p[b{4P;HK4 D3W4dsN'%5^+OK\6Vj=nd@6Jvc6! 7DSc|u>73W4 B^7T8p!8{#S+[8k%/268FC$9A^rfo:HJM'=:$a .<; buB;i,P;/3; ED#2rVj=a4  o=R(f]t=B^70_>J PJA>>\>[o|*N?[]?=AVy?{KF 'r@xaZ@Zu`>A9F bxAV?A2}LAQ9=dY8BB;8aB8*! >BU6(+pBNVwcB DlqC6#xxCzc#-CFCR!DTY DwcB D0} EM?,0KC EB,+YENe=h-FxB2VGTPG4 8G#-CUH+pB*I] *P 9fMI{4PJt 'JxwJaOY]L0_>d M{ONHJMXrR pNL5l _-Nc}_{ON{#S]XN>>~f ]NhZdsN18uQNp.O ^+O*Ip.O{&_.9UO6 ] *P''<;P'r@wNgPPXTP"!-~P;J P)!Q)!Q{30Q'l'!Q2*Q5hL#R'u.4&oRhXrRa1cSQ0KS%St{#SnE%*TOO{ BUPB^U_ kxU*TWUG{2[fV u NV)|.{Vy-m W/-gi/WdkWkxU mXyPXX}LA#nEYk:ZQNTMZ|hZ>/ [+*n w~[!Q\[fVu\%P;a>\kUQTv]*Qrb]VG}YZ_3g_W0_]t= _0_>e7`~S``>AZ`UEt.aTMZ%P;awJxaAae7`p[b b +Bb-y Y b D8bHK4bDScT. ;ac2{" a1c3g_Q9=dkdkd#W'Ne DR(fn>>~fRjfq9*/-gl-wag?gKG hnd@6 h@h5hUe0@^izqXi<NjRj:Zmj~t-kAVy?6l0jm~UmU= mlQm)Vn* +*n ]NvSoE9^o3 x9pdkWT8pWMqzqfo:DqCp*qDxUr~P,yA^r ;/s:{)6&t5(%StD?'$uJA>18u+[8ku0KS 2yvO~&Jv'=:fv.oCwfwxs wOY]L6#xqzLxynP.~P,yE$]y Dk:~y!8qz_-N x{w~[ 8C+|{#S[o|.H'A\T}>B%`} u /}S00}} ~z0W~S`0jm~{#S~)VnH~zj;C~O( DCp'Jkq DE9C!/VF|c#k:E Q<#={QY^wm 0,F%K6OalmwW&JDKzr7-#5&u&s6,<A,W}Zuy0{|9 H#;%,.)14M} B ",0=QW2:JJz;>cjnr#x%`6Reem  ( _ a e q { f ^ L " S. L P 9X b \j Po i "   <8 BK V +X b u ! * rh )  t FK T v Bv,-.;4=LcZeiwq-8k*9d<zXabQ BiBnWdfG{~ =[.=HS)Uo//8(jmjw{/ UQB}PVW{eq )+}1BD[IlpKx17F]_i{+Sbi mr 6i/;HCYZ[#hy#)92>R[b<uNEElK0OV h$;CL^'c's! 3 %imy46sN^ WY_p5 QC ,N q u 4!B!!8!G! !&! /!C9!f!h!eq!4s!" """!"*"C"S"m"w"z"##2#oF#G#\#>c#2m#$$-$(T$k$u$bz$ %%%K9%"A%H%I%( D(\(7)1)E)"n)v)**.*f/* I*e`*f*J+>++1+5+7+8A+~+?,,$,@, D,``,ga, --e$-N-N]-c-e-...P.8.B.].nr.$x.'z.a/e//<-/W5/z5/N/c/h/w/0eF0N0jR0th0w0Sy001[71<1?=1U1V1g1 i1x1 22y#2%2&2(252B2Q^2^2`2h2p&3)3-3-3M1323-[3t|344i$4/44464O4kO4T4[4=c4 595U=5=I5U5v56`6/;6;6^6h6677"7376C7Y7Y7s]7/`7k8f8xF8j8Bn82~8, 999q$9%9.98c9*d90p9r9A{9:(:&:w=:V:_;J;Y;;E;|(;3;KC;%V;V;K\; j;l;k<<<Q%<+<:<B<0j<lv<v<===T=OX=h=o=_~=#>)>:>+G>P>_s>?k??H/?k1?L4?M?a?c?|??|?@)@9@ f@j@ AT A"%AY2ArA!ABBDBEB#JBCTBTBd^BbB-eBrpBrBxsB C3/C0C1CX7C;Cg?CVCF|CDN*D4BDQD\DnDENEFEEE3Ej!E+E?8E:E;EHSH$THBbH4kHIs)INI$uIIJ J J J+JAJoJauJK(KD:KJ>KV?KtKlLL_;L=LULOiLoLW M}'M>5M8M#CMEMUMdMgM=xMzNPN:dNO O7Og;OYGOXOfO;PpP6|P Q=Qc-Q3Q$7Q,WQ;tQ RCRWrR$~R~R SS 2SXS~S&TTtT :TFTNTNTRTcTlT UI$U %UJ%UW&UTUTUH\U_UnU VtVVVMVZVZVjVQvV|zVzV{V}VWW!W/W7:WWW>XNXSX!{XTYYYY"Y"Y9Y?YDYlLYwY*ZTZZ[[c[f[0[9[<\F\.T\b\j\us\x\] ] ]y&]*)]/0]e]u]:^W(^uB^H^eP^Q^"Y^,_X3_:_M_Q_i_vk_``'`/R`x`1an#a-aJFaHaMaPaRakakab b)b;bUbUZb"ab@$c7%c.cj;c&HcMc"TcYcdcdcdmd@d/d!>dbOdjdywd}d}ez e-e-e3e7ehsMhYh_hfdhiii7iBi QiaiailijjJj'j!OjYj:\jDgjyj;k#k.kWk3bkpkll XlJ]lml_zlw mmm8PmSm]mcbmpmnn-nA/nV:n,inonwn9 o oo_ o6oN8o9o>oAoDEoLo$Oopl pQ"p'p*p,+p-p3p4p BpEpsSpfp0jpwpqEqeq?rrrr.rx^x_xy4yH@yGy]OyFpls;>@a*(0Cir7 8l<v*(22??EGIRY.nv5g'Nrb.)[*:;=j@@L\hhpq/*F5?{QsSd-jjL}H pY#1nGBKScCgUkx3 c,M.@FgewP %|%0=U"Yt#AZFvXZ/jlToeS!%W`ek 1e7D_bwjn,E~y!%4Kprt]S7"=#&?F`lt'"+$/5;?MXY6ca F( )@TJS]o r5u?+e7<>R l#Nt,vwy4}~0Aruw>$ap-s(4.^:1l=n,?0fD`Ge ( $k*.r>Ojua|*?6Jgw6S "22CI_MCgt ' Pw[ivz3.DIajcy%?-zK{$8?FQx{~& &k .c i4LMX}mSq {+8V9=JM 4&c*AUboq$Uxo u_~G)0LxRmxN| $=BEDGQf Mirln}+)0n=C,^uw|?d 2QgvjnB= dBmxuRhv8|A r.XZ[p#0^dwfOguu085U=W\Nf[fp <Hqa/ey] 7GBQLVrtozIJiU\b8goZ~_kn s)+8:<A|Ld &EEuY|| # w>nv\qw zv{ }K.) '+,<)@6EH%RAT:|AtFOt 509W>aga|%7&,8>DL[+j HZV,3? HP`Iby!"<-08JJry*48&>Y^ dz{th08:O^syk1IW4ex1\U%W^W @ 0_GX]qC7`hemsNs| f(y3b8EYXm[{~X '1z23M9A[Zcg op \%L3>?)FKp^)d2N=BDE\`>np@4CXuhq | *&.F 1K3Pdd3sv {K DHJBKNdd{&)3/km{rSZ'`tEa9aB8G_RX%D'HS Zu &4i&_`ve`ym LJ\%5g]d| L} gN|PgR3,<w "#&6=C9Yl`iYY@9999]@Unknown G.Cx Times New Roman5Symbol3. *Cx Arial;Wingdings5. .[`)TahomaeTimes New (W1)Times New Roman?= *Cx Courier New7. [ @VerdanaI"  Arial (W1)ArialA$BCambria Math"1HhbAGbAGpg 3O&%s3O&%s!nn24@Y@Y 3qXR :E2! xx sI:\QGCIO\EAS\Enterprise Architecture\QGEA (published)\New QGEA templates\Long templates\QGEA guideline-Standard.dotInformation Security (IS18)QGEA guidelinehancockcGregory Yurchenko|         :   9   ;     CompObjr