ࡱ> |~uvwxyz{5@ 09bjbj22 7XXS  8b >o(V DO$nnnnnnn$0pRrn V!V!V!n n(((V!"  n(V!n(f(d)@D B ]&Wx!ABB+o0>oYB`bs6"bs0B bs B s " (  s s s nn (  Information Security Management BS 7799.2:2002 Audit Check List for SANS Author: Val Thiagarajan B.E., M.Comp, CCSE, MCSE, SPS (FW), IT Security Consultant. Approved by: Algis Kibirkstis Owner: SANS Extracts from BS 7799 part 1: 1999 are reproduced with the permissionof BSI under license number 2003DH0251. British Standards can bepurchased from BSI Customer Services, 389 Chiswick High Road, London W4 4AL. Tel : 44 (0)20 8996 9001. email: HYPERLINK "http://by9fd.bay9.hotmail.msn.com/cgi-bin/compose?mailto=1&msg=MSG1059574389.34&start=1230298&len=8023&src=&type=x&to=customerservices%40bsi%2dglobal%2ecom&cc=&bcc=&subject=&body=&curmbox=F000000001&a=545b046342a524add22c08ff88064aa5" customerservices@bsi-global.com Table of Contents  TOC \o "1-3" \h \z  HYPERLINK \l "_Toc47427654" Security Policy  PAGEREF _Toc47427654 \h 9  HYPERLINK \l "_Toc47427655" Information security policy  PAGEREF _Toc47427655 \h 9  HYPERLINK \l "_Toc47427656" Information security policy document  PAGEREF _Toc47427656 \h 9  HYPERLINK \l "_Toc47427657" Review and evaluation  PAGEREF _Toc47427657 \h 9  HYPERLINK \l "_Toc47427658" Organisational Security  PAGEREF _Toc47427658 \h 10  HYPERLINK \l "_Toc47427659" Information security infrastructure  PAGEREF _Toc47427659 \h 10  HYPERLINK \l "_Toc47427660" Management information security forum  PAGEREF _Toc47427660 \h 10  HYPERLINK \l "_Toc47427661" Information security coordination  PAGEREF _Toc47427661 \h 10  HYPERLINK \l "_Toc47427662" Allocation of information security responsibilities  PAGEREF _Toc47427662 \h 10  HYPERLINK \l "_Toc47427663" Authorisation process for information processing facilities  PAGEREF _Toc47427663 \h 10  HYPERLINK \l "_Toc47427664" Specialist information security advise  PAGEREF _Toc47427664 \h 11  HYPERLINK \l "_Toc47427665" Co-operation between organisations  PAGEREF _Toc47427665 \h 11  HYPERLINK \l "_Toc47427666" Independent review of information security  PAGEREF _Toc47427666 \h 11  HYPERLINK \l "_Toc47427667" Security of third party access  PAGEREF _Toc47427667 \h 11  HYPERLINK \l "_Toc47427668" Identification of risks from third party access  PAGEREF _Toc47427668 \h 11  HYPERLINK \l "_Toc47427669" Security requirements in third party contracts  PAGEREF _Toc47427669 \h 12  HYPERLINK \l "_Toc47427670" Outsourcing  PAGEREF _Toc47427670 \h 12  HYPERLINK \l "_Toc47427671" Security requirements in outsourcing contracts  PAGEREF _Toc47427671 \h 12  HYPERLINK \l "_Toc47427672" Asset classification and control  PAGEREF _Toc47427672 \h 13  HYPERLINK \l "_Toc47427673" Accountability of assets  PAGEREF _Toc47427673 \h 13  HYPERLINK \l "_Toc47427674" Inventory of assets  PAGEREF _Toc47427674 \h 13  HYPERLINK \l "_Toc47427675" Information classification  PAGEREF _Toc47427675 \h 13  HYPERLINK \l "_Toc47427676" Classification guidelines  PAGEREF _Toc47427676 \h 13  HYPERLINK \l "_Toc47427677" Information labelling and handling  PAGEREF _Toc47427677 \h 13  HYPERLINK \l "_Toc47427678" Personnel security  PAGEREF _Toc47427678 \h 14  HYPERLINK \l "_Toc47427679" Security in job definition and Resourcing  PAGEREF _Toc47427679 \h 14  HYPERLINK \l "_Toc47427680" Including security in job responsibilities  PAGEREF _Toc47427680 \h 14  HYPERLINK \l "_Toc47427681" Personnel screening and policy  PAGEREF _Toc47427681 \h 14  HYPERLINK \l "_Toc47427682" Confidentiality agreements  PAGEREF _Toc47427682 \h 14  HYPERLINK \l "_Toc47427683" Terms and conditions of employment  PAGEREF _Toc47427683 \h 15  HYPERLINK \l "_Toc47427684" User training  PAGEREF _Toc47427684 \h 15  HYPERLINK \l "_Toc47427685" Information security education and training  PAGEREF _Toc47427685 \h 15  HYPERLINK \l "_Toc47427686" Responding to security incidents and malfunctions  PAGEREF _Toc47427686 \h 15  HYPERLINK \l "_Toc47427687" Reporting security incidents  PAGEREF _Toc47427687 \h 15  HYPERLINK \l "_Toc47427688" Reporting security weaknesses  PAGEREF _Toc47427688 \h 15  HYPERLINK \l "_Toc47427689" Reporting software malfunctions  PAGEREF _Toc47427689 \h 16  HYPERLINK \l "_Toc47427690" Learning from incidents  PAGEREF _Toc47427690 \h 16  HYPERLINK \l "_Toc47427691" Disciplinary process  PAGEREF _Toc47427691 \h 16  HYPERLINK \l "_Toc47427692" Physical and Environmental Security  PAGEREF _Toc47427692 \h 16  HYPERLINK \l "_Toc47427693" Secure Area  PAGEREF _Toc47427693 \h 16  HYPERLINK \l "_Toc47427694" Physical Security Perimeter  PAGEREF _Toc47427694 \h 16  HYPERLINK \l "_Toc47427695" Physical entry Controls  PAGEREF _Toc47427695 \h 16  HYPERLINK \l "_Toc47427696" Securing Offices, rooms and facilities  PAGEREF _Toc47427696 \h 17  HYPERLINK \l "_Toc47427697" Working in Secure Areas  PAGEREF _Toc47427697 \h 17  HYPERLINK \l "_Toc47427698" Isolated delivery and loading areas  PAGEREF _Toc47427698 \h 17  HYPERLINK \l "_Toc47427699" Equipment Security  PAGEREF _Toc47427699 \h 17  HYPERLINK \l "_Toc47427700" Equipment siting protection  PAGEREF _Toc47427700 \h 17  HYPERLINK \l "_Toc47427701" Power Supplies  PAGEREF _Toc47427701 \h 18  HYPERLINK \l "_Toc47427702" Cabling Security  PAGEREF _Toc47427702 \h 18  HYPERLINK \l "_Toc47427703" Equipment Maintenance  PAGEREF _Toc47427703 \h 19  HYPERLINK \l "_Toc47427704" Securing of equipment off-premises  PAGEREF _Toc47427704 \h 19  HYPERLINK \l "_Toc47427705" Secure disposal or re-use of equipment  PAGEREF _Toc47427705 \h 19  HYPERLINK \l "_Toc47427706" General Controls  PAGEREF _Toc47427706 \h 20  HYPERLINK \l "_Toc47427707" Clear Desk and clear screen policy  PAGEREF _Toc47427707 \h 20  HYPERLINK \l "_Toc47427708" Removal of property  PAGEREF _Toc47427708 \h 20  HYPERLINK \l "_Toc47427709" Communications and Operations Management  PAGEREF _Toc47427709 \h 20  HYPERLINK \l "_Toc47427710" Operational Procedure and responsibilities  PAGEREF _Toc47427710 \h 20  HYPERLINK \l "_Toc47427711" Documented Operating procedures  PAGEREF _Toc47427711 \h 21  HYPERLINK \l "_Toc47427712" Operational Change Control  PAGEREF _Toc47427712 \h 21  HYPERLINK \l "_Toc47427713" Incident management procedures  PAGEREF _Toc47427713 \h 21  HYPERLINK \l "_Toc47427714" Segregation of duties  PAGEREF _Toc47427714 \h 22  HYPERLINK \l "_Toc47427715" Separation of development and operational facilities  PAGEREF _Toc47427715 \h 22  HYPERLINK \l "_Toc47427716" External facilities management  PAGEREF _Toc47427716 \h 22  HYPERLINK \l "_Toc47427717" System planning and acceptance  PAGEREF _Toc47427717 \h 23  HYPERLINK \l "_Toc47427718" Capacity Planning  PAGEREF _Toc47427718 \h 23  HYPERLINK \l "_Toc47427719" System acceptance  PAGEREF _Toc47427719 \h 23  HYPERLINK \l "_Toc47427720" Protection against malicious software  PAGEREF _Toc47427720 \h 23  HYPERLINK \l "_Toc47427721" Control against malicious software  PAGEREF _Toc47427721 \h 23  HYPERLINK \l "_Toc47427722" Housekeeping  PAGEREF _Toc47427722 \h 24  HYPERLINK \l "_Toc47427723" Information back-up  PAGEREF _Toc47427723 \h 24  HYPERLINK \l "_Toc47427724" Operator logs  PAGEREF _Toc47427724 \h 25  HYPERLINK \l "_Toc47427725" Fault Logging  PAGEREF _Toc47427725 \h 25  HYPERLINK \l "_Toc47427726" Network Management  PAGEREF _Toc47427726 \h 25  HYPERLINK \l "_Toc47427727" Network Controls  PAGEREF _Toc47427727 \h 25  HYPERLINK \l "_Toc47427728" Media handling and Security  PAGEREF _Toc47427728 \h 25  HYPERLINK \l "_Toc47427729" Management of removable computer media  PAGEREF _Toc47427729 \h 26  HYPERLINK \l "_Toc47427730" Disposal of Media  PAGEREF _Toc47427730 \h 26  HYPERLINK \l "_Toc47427731" Information handling procedures  PAGEREF _Toc47427731 \h 26  HYPERLINK \l "_Toc47427732" Security of system documentation  PAGEREF _Toc47427732 \h 26  HYPERLINK \l "_Toc47427733" Exchange of Information and software  PAGEREF _Toc47427733 \h 27  HYPERLINK \l "_Toc47427734" Information and software exchange agreement  PAGEREF _Toc47427734 \h 27  HYPERLINK \l "_Toc47427735" Security of Media in transit  PAGEREF _Toc47427735 \h 27  HYPERLINK \l "_Toc47427736" Electronic Commerce security  PAGEREF _Toc47427736 \h 27  HYPERLINK \l "_Toc47427737" Security of Electronic email  PAGEREF _Toc47427737 \h 28  HYPERLINK \l "_Toc47427738" Security of Electronic office systems  PAGEREF _Toc47427738 \h 28  HYPERLINK \l "_Toc47427739" Publicly available systems  PAGEREF _Toc47427739 \h 28  HYPERLINK \l "_Toc47427740" Other forms of information exchange  PAGEREF _Toc47427740 \h 29  HYPERLINK \l "_Toc47427741" Access Control  PAGEREF _Toc47427741 \h 29  HYPERLINK \l "_Toc47427742" Business Requirements for Access Control  PAGEREF _Toc47427742 \h 29  HYPERLINK \l "_Toc47427743" Access Control Policy  PAGEREF _Toc47427743 \h 29  HYPERLINK \l "_Toc47427744" User Access Management  PAGEREF _Toc47427744 \h 30  HYPERLINK \l "_Toc47427745" User Registration  PAGEREF _Toc47427745 \h 30  HYPERLINK \l "_Toc47427746" Privilege Management  PAGEREF _Toc47427746 \h 30  HYPERLINK \l "_Toc47427747" User Password Management  PAGEREF _Toc47427747 \h 30  HYPERLINK \l "_Toc47427748" Review of user access rights  PAGEREF _Toc47427748 \h 30  HYPERLINK \l "_Toc47427749" User Responsibilities  PAGEREF _Toc47427749 \h 30  HYPERLINK \l "_Toc47427750" Password use  PAGEREF _Toc47427750 \h 31  HYPERLINK \l "_Toc47427751" Unattended user equipment  PAGEREF _Toc47427751 \h 31  HYPERLINK \l "_Toc47427752" Network Access Control  PAGEREF _Toc47427752 \h 31  HYPERLINK \l "_Toc47427753" Policy on use of network services  PAGEREF _Toc47427753 \h 31  HYPERLINK \l "_Toc47427754" Enforced path  PAGEREF _Toc47427754 \h 31  HYPERLINK \l "_Toc47427755" User authentication for external connections  PAGEREF _Toc47427755 \h 32  HYPERLINK \l "_Toc47427756" Node Authentication  PAGEREF _Toc47427756 \h 32  HYPERLINK \l "_Toc47427757" Remote diagnostic port protection  PAGEREF _Toc47427757 \h 32  HYPERLINK \l "_Toc47427758" Segregation in networks  PAGEREF _Toc47427758 \h 32  HYPERLINK \l "_Toc47427759" Network connection protocols  PAGEREF _Toc47427759 \h 32  HYPERLINK \l "_Toc47427760" Network routing control  PAGEREF _Toc47427760 \h 33  HYPERLINK \l "_Toc47427761" Security of network services  PAGEREF _Toc47427761 \h 33  HYPERLINK \l "_Toc47427762" Operating system access control  PAGEREF _Toc47427762 \h 33  HYPERLINK \l "_Toc47427763" Automatic terminal identification  PAGEREF _Toc47427763 \h 33  HYPERLINK \l "_Toc47427764" Terminal log-on procedures  PAGEREF _Toc47427764 \h 33  HYPERLINK \l "_Toc47427765" User identification and authorisation  PAGEREF _Toc47427765 \h 34  HYPERLINK \l "_Toc47427766" Password management system  PAGEREF _Toc47427766 \h 34  HYPERLINK \l "_Toc47427767" Use of system utilities  PAGEREF _Toc47427767 \h 34  HYPERLINK \l "_Toc47427768" Duress alarm to safeguard users  PAGEREF _Toc47427768 \h 34  HYPERLINK \l "_Toc47427769" Terminal time-out  PAGEREF _Toc47427769 \h 35  HYPERLINK \l "_Toc47427770" Limitation of connection time  PAGEREF _Toc47427770 \h 35  HYPERLINK \l "_Toc47427771" Application Access Control  PAGEREF _Toc47427771 \h 35  HYPERLINK \l "_Toc47427772" Information access restriction  PAGEREF _Toc47427772 \h 35  HYPERLINK \l "_Toc47427773" Sensitive system isolation  PAGEREF _Toc47427773 \h 35  HYPERLINK \l "_Toc47427774" Monitoring system access and use  PAGEREF _Toc47427774 \h 35  HYPERLINK \l "_Toc47427775" Event logging  PAGEREF _Toc47427775 \h 35  HYPERLINK \l "_Toc47427776" Monitoring system use  PAGEREF _Toc47427776 \h 36  HYPERLINK \l "_Toc47427777" Clock synchronisation  PAGEREF _Toc47427777 \h 36  HYPERLINK \l "_Toc47427778" Mobile computing and teleworking  PAGEREF _Toc47427778 \h 36  HYPERLINK \l "_Toc47427779" Mobile computing  PAGEREF _Toc47427779 \h 36  HYPERLINK \l "_Toc47427780" Teleworking  PAGEREF _Toc47427780 \h 37  HYPERLINK \l "_Toc47427781" System development and maintenance  PAGEREF _Toc47427781 \h 37  HYPERLINK \l "_Toc47427782" Security requirements of systems  PAGEREF _Toc47427782 \h 37  HYPERLINK \l "_Toc47427783" Security requirements analysis and specification  PAGEREF _Toc47427783 \h 37  HYPERLINK \l "_Toc47427784" Security in application systems  PAGEREF _Toc47427784 \h 37  HYPERLINK \l "_Toc47427785" Input data validation  PAGEREF _Toc47427785 \h 37  HYPERLINK \l "_Toc47427786" Control of internal processing  PAGEREF _Toc47427786 \h 38  HYPERLINK \l "_Toc47427787" Message authentication  PAGEREF _Toc47427787 \h 38  HYPERLINK \l "_Toc47427788" Output data validation  PAGEREF _Toc47427788 \h 39  HYPERLINK \l "_Toc47427789" Cryptographic controls  PAGEREF _Toc47427789 \h 39  HYPERLINK \l "_Toc47427790" Policy on use of cryptographic controls  PAGEREF _Toc47427790 \h 39  HYPERLINK \l "_Toc47427791" Encryption  PAGEREF _Toc47427791 \h 39  HYPERLINK \l "_Toc47427792" Digital Signatures  PAGEREF _Toc47427792 \h 39  HYPERLINK \l "_Toc47427793" Non-repudiation services  PAGEREF _Toc47427793 \h 39  HYPERLINK \l "_Toc47427794" Key management  PAGEREF _Toc47427794 \h 40  HYPERLINK \l "_Toc47427795" Security of system files  PAGEREF _Toc47427795 \h 40  HYPERLINK \l "_Toc47427796" Control of operational software  PAGEREF _Toc47427796 \h 40  HYPERLINK \l "_Toc47427797" Protection of system test data  PAGEREF _Toc47427797 \h 40  HYPERLINK \l "_Toc47427798" Access Control to program source library  PAGEREF _Toc47427798 \h 40  HYPERLINK \l "_Toc47427799" Security in development and support process  PAGEREF _Toc47427799 \h 41  HYPERLINK \l "_Toc47427800" Change control procedures  PAGEREF _Toc47427800 \h 41  HYPERLINK \l "_Toc47427801" Technical review of operating system changes  PAGEREF _Toc47427801 \h 41  HYPERLINK \l "_Toc47427802" Technical review of operating system changes  PAGEREF _Toc47427802 \h 41  HYPERLINK \l "_Toc47427803" Covert channels and Trojan code  PAGEREF _Toc47427803 \h 41  HYPERLINK \l "_Toc47427804" Outsourced software development  PAGEREF _Toc47427804 \h 42  HYPERLINK \l "_Toc47427805" Business Continuity Management  PAGEREF _Toc47427805 \h 42  HYPERLINK \l "_Toc47427806" Aspects of Business Continuity Management  PAGEREF _Toc47427806 \h 42  HYPERLINK \l "_Toc47427807" Business continuity management process  PAGEREF _Toc47427807 \h 42  HYPERLINK \l "_Toc47427808" Business continuity and impact analysis  PAGEREF _Toc47427808 \h 42  HYPERLINK \l "_Toc47427809" Writing and implementing continuity plan  PAGEREF _Toc47427809 \h 43  HYPERLINK \l "_Toc47427810" Business continuity planning framework  PAGEREF _Toc47427810 \h 43  HYPERLINK \l "_Toc47427811" Testing, maintaining and re-assessing business continuity plan  PAGEREF _Toc47427811 \h 43  HYPERLINK \l "_Toc47427812" Compliance  PAGEREF _Toc47427812 \h 44  HYPERLINK \l "_Toc47427813" Compliance with legal requirements  PAGEREF _Toc47427813 \h 44  HYPERLINK \l "_Toc47427814" Identification of applicable legislation  PAGEREF _Toc47427814 \h 44  HYPERLINK \l "_Toc47427815" Intellectual property rights (IPR)  PAGEREF _Toc47427815 \h 44  HYPERLINK \l "_Toc47427816" Safeguarding of organisational records  PAGEREF _Toc47427816 \h 45  HYPERLINK \l "_Toc47427817" Data protection and privacy of personal information  PAGEREF _Toc47427817 \h 45  HYPERLINK \l "_Toc47427818" Prevention of misuse of information processing facility  PAGEREF _Toc47427818 \h 45  HYPERLINK \l "_Toc47427819" Regulation of cryptographic controls  PAGEREF _Toc47427819 \h 46  HYPERLINK \l "_Toc47427820" Collection of evidence  PAGEREF _Toc47427820 \h 46  HYPERLINK \l "_Toc47427821" Reviews of Security Policy and technical compliance  PAGEREF _Toc47427821 \h 46  HYPERLINK \l "_Toc47427822" Compliance with security policy  PAGEREF _Toc47427822 \h 46  HYPERLINK \l "_Toc47427823" Technical compliance checking  PAGEREF _Toc47427823 \h 46  HYPERLINK \l "_Toc47427824" System audit considerations  PAGEREF _Toc47427824 \h 46  HYPERLINK \l "_Toc47427825" System audit controls  PAGEREF _Toc47427825 \h 46  HYPERLINK \l "_Toc47427826" Protection of system audit tools  PAGEREF _Toc47427826 \h 47  HYPERLINK \l "_Toc47427827" References  PAGEREF _Toc47427827 \h 47  Audit Checklist Auditor Name:___________________________ Audit Date:___________________________ Information Security Management BS 7799.2:2002 Audit Check ListReferenceAudit area, objective and questionResultsChecklistStandardSectionAudit QuestionFindings ComplianceSecurity Policy1.13.1Information security policy1.1.13.1.1Information security policy documentWhether there exists an Information security policy, which is approved by the management, published and communicated as appropriate to all employees. Whether it states the management commitment and set out the organisational approach to managing information security. 1.1.23.1.2Review and evaluationWhether the Security policy has an owner, who is responsible for its maintenance and review according to a defined review process. Whether the process ensures that a review takes place in response to any changes affecting the basis of the original assessment, example: significant security incidents, new vulnerabilities or changes to organisational or technical infrastructure. Organisational Security2.14.1Information security infrastructure2.1.14.1.1Management information security forumWhether there is a management forum to ensure there is a clear direction and visible management support for security initiatives within the organisation. 2.1.24.1.2Information security coordinationWhether there is a cross-functional forum of management representatives from relevant parts of the organisation to coordinate the implementation of information security controls. 2.1.34.1.3Allocation of information security responsibilitiesWhether responsibilities for the protection of individual assets and for carrying out specific security processes were clearly defined. 2.1.44.1.4Authorisation process for information processing facilitiesWhether there is a management authorisation process in place for any new information processing facility. This should include all new facilities such as hardware and software. 2.1.54.1.5Specialist information security adviseWhether specialist information security advice is obtained where appropriate. A specific individual may be identified to co-ordinate in-house knowledge and experiences to ensure consistency, and provide help in security decision making. 2.1.64.1.6Co-operation between organisationsWhether appropriate contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunication operators were maintained to ensure that appropriate action can be quickly taken and advice obtained, in the event of a security incident. 2.1.74.1.7Independent review of information securityWhether the implementation of security policy is reviewed independently on regular basis. This is to provide assurance that organisational practices properly reflect the policy, and that it is feasible and effective. 2.24.2Security of third party access2.2.14.2.1Identification of risks from third party accessWhether risks from third party access are identified and appropriate security controls implemented. Whether the types of accesses are identified, classified and reasons for access are justified. Whether security risks with third party contractors working onsite was identified and appropriate controls are implemented.2.2.24.2.2Security requirements in third party contractsWhether there is a formal contract containing, or referring to, all the security requirements to ensure compliance with the organisations security policies and standards. 2.34.3Outsourcing2.3.14.3.1Security requirements in outsourcing contractsWhether security requirements are addressed in the contract with the third party, when the organisation has outsourced the management and control of all or some of its information systems, networks and/ or desktop environments. The contract should address how the legal requirements are to be met, how the security of the organisations assets are maintained and tested, and the right of audit, physical security issues and how the availability of the services is to be maintained in the event of disaster. Asset classification and control3.15.1Accountability of assets3.1.15.1.1Inventory of assetsWhether an inventory or register is maintained with the important assets associated with each information system. Whether each asset identified has an owner, the security classification defined and agreed and the location identified. 3.25.2Information classification3.2.15.2.1Classification guidelinesWhether there is an Information classification scheme or guideline in place; which will assist in determining how the information is to be handled and protected.3.2.25.2.2Information labelling and handlingWhether an appropriate set of procedures are defined for information labelling and handling in accordance with the classification scheme adopted by the organisation.Personnel security4.16.1Security in job definition and Resourcing4.1.16.1.1Including security in job responsibilitiesWhether security roles and responsibilities as laid in Organisations information security policy is documented where appropriate. This should include general responsibilities for implementing or maintaining security policy as well as specific responsibilities for protection of particular assets, or for extension of particular security processes or activities. 4.1.26.1.2Personnel screening and policyWhether verification checks on permanent staff were carried out at the time of job applications. This should include character reference, confirmation of claimed academic and professional qualifications and independent identity checks. 4.1.36.1.3Confidentiality agreementsWhether employees are asked to sign Confidentiality or non-disclosure agreement as a part of their initial terms and conditions of the employment. Whether this agreement covers the security of the information processing facility and organisation assets. 4.1.46.1.4Terms and conditions of employmentWhether terms and conditions of the employment covers the employees responsibility for information security. Where appropriate, these responsibilities might continue for a defined period after the end of the employment.4.26.2User training4.2.16.2.1Information security education and trainingWhether all employees of the organisation and third party users (where relevant) receive appropriate Information Security training and regular updates in organisational policies and procedures. 4.36.3Responding to security incidents and malfunctions4.3.16.3.1Reporting security incidentsWhether a formal reporting procedure exists, to report security incidents through appropriate management channels as quickly as possible.4.3.26.3.2Reporting security weaknessesWhether a formal reporting procedure or guideline exists for users, to report security weakness in, or threats to, systems or services. 4.3.36.3.3Reporting software malfunctionsWhether procedures were established to report any software malfunctions. 4.3.46.3.4Learning from incidentsWhether there are mechanisms in place to enable the types, volumes and costs of incidents and malfunctions to be quantified and monitored. 4.3.56.3.5Disciplinary processWhether there is a formal disciplinary process in place for employees who have violated organisational security policies and procedures. Such a process can act as a deterrent to employees who might otherwise be inclined to disregard security procedures. Physical and Environmental Security5.17.1Secure Area5.1.17.1.1Physical Security PerimeterWhat physical border security facility has been implemented to protect the Information processing service. Some examples of such security facility are card control entry gate, walls, manned reception etc.,5.1.27.1.2Physical entry ControlsWhat entry controls are in place to allow only authorised personnel into various areas within organisation. 5.1.37.1.3Securing Offices, rooms and facilitiesWhether the rooms, which have the Information processing service, are locked or have lockable cabinets or safes. Whether the Information processing service is protected from natural and man-made disaster.Whether there is any potential threat from neighbouring premises.5.1.47.1.4Working in Secure AreasThe information is only on need to know basis. Whether there exists any security control for third parties or for personnel working in secure area.5.1.57.1.5Isolated delivery and loading areasWhether the delivery area and information processing area are isolated from each other to avoid any unauthorised access.Whether a risk assessment was conducted to determine the security in such areas.5.27.2Equipment Security5.2.17.2.1Equipment siting protectionWhether the equipment was located in appropriate place to minimise unnecessary access into work areas. Whether the items requiring special protection were isolated to reduce the general level of protection required. Whether controls were adopted to minimise risk from potential threats such as theft, fire, explosives, smoke, water, dist, vibration, chemical effects, electrical supply interfaces, electromagnetic radiation, flood.Whether there is a policy towards eating, drinking and smoking on in proximity to information processing services. Whether environmental conditions are monitored which would adversely affect the information processing facilities.5.2.27.2.2Power SuppliesWhether the equipment is protected from power failures by using permanence of power supplies such as multiple feeds, uninterruptible power supply (ups), backup generator etc., 5.2.37.2.3Cabling SecurityWhether the power and telecommunications cable carrying data or supporting information services are protected from interception or damage. Whether there are any additional security controls in place for sensitive or critical information. 5.2.47.2.4Equipment MaintenanceWhether the equipment is maintained as per the suppliers recommended service intervals and specifications. Whether the maintenance is carried out only by authorised personnel.Whether logs are maintained with all suspected or actual faults and all preventive and corrective measures. Whether appropriate controls are implemented while sending equipment off premises. If the equipment is covered by insurance, whether the insurance requirements are satisfied. 5.2.57.2.5Securing of equipment off-premisesWhether any equipment usage outside an organisations premises for information processing has to be authorised by the management. Whether the security provided for these equipments while outside the premises are on par with or more than the security provided inside the premises. 5.2.67.2.6Secure disposal or re-use of equipment Whether storage device containing sensitive information are physically destroyed or securely over written. 5.37.3General Controls5.3.17.3.1Clear Desk and clear screen policyWhether automatic computer screen locking facility is enabled. This would lock the screen when the computer is left unattended for a period. Whether employees are advised to leave any confidential material in the form of paper documents, media etc., in a locked manner while unattended. 5.3.27.3.2Removal of propertyWhether equipment, information or software can be taken offsite without appropriate authorisation. Whether spot checks or regular audits were conducted to detect unauthorised removal of property. Whether individuals are aware of these types of spot checks or regular audits. Communications and Operations Management6.18.1Operational Procedure and responsibilities6.1.18.1.1Documented Operating proceduresWhether the Security Policy has identified any Operating procedures such as Back-up, Equipment maintenance etc., Whether such procedures are documented and used.6.1.28.1.2Operational Change ControlWhether all programs running on production systems are subject to strict change control i.e., any change to be made to those production programs need to go through the change control authorisation. Whether audit logs are maintained for any change made to the production programs. 6.1.38.1.3Incident management proceduresWhether an Incident Management procedure exist to handle security incidents. Whether the procedure addresses the incident management responsibilities, orderly and quick response to security incidents. Whether the procedure addresses different types of incidents ranging from denial of service to breach of confidentiality etc., and ways to handle them.Whether the audit trails and logs relating to the incidents are maintained and proactive action taken in a way that the incident doesnt reoccur. 6.1.48.1.4Segregation of dutiesWhether duties and areas of responsibility are separated in order to reduce opportunities for unauthorised modification or misuse of information or services.6.1.58.1.5Separation of development and operational facilitiesWhether the development and testing facilities are isolated from operational facilities. For example development software should run on a different computer to that of the computer with production software. Where necessary development and production network should be separated from each other. 6.1.68.1.6External facilities managementWhether any of the Information processing facility is managed by external company or contractor (third party). Whether the risks associated with such management is identified in advance, discussed with the third party and appropriate controls were incorporated into the contract. Whether necessary approval is obtained from business and application owners.6.28.2System planning and acceptance6.2.18.2.1Capacity PlanningWhether the capacity demands are monitored and projections of future capacity requirements are made. This is to ensure that adequate processing power and storage are available. Example: Monitoring Hard disk space, RAM, CPU on critical servers. 6.2.28.2.2System acceptanceWhether System acceptance criteria are established for new information systems, upgrades and new versions. Whether suitable tests were carried out prior to acceptance.6.38.3Protection against malicious software6.3.18.3.1Control against malicious softwareWhether there exists any control against malicious software usage. Whether the security policy does address software licensing issues such as prohibiting usage of unauthorised software. Whether there exists any Procedure to verify all warning bulletins are accurate and informative with regards to the malicious software usage. Whether Antivirus software is installed on the computers to check and isolate or remove any viruses from computer and media. Whether this software signature is updated on a regular basis to check any latest viruses.Whether all the traffic originating from un-trusted network in to the organisation is checked for viruses. Example: Checking for viruses on email, email attachments and on the web, FTP traffic. 6.48.4Housekeeping6.4.18.4.1Information back-upWhether Back-up of essential business information such as production server, critical network components, configuration backup etc., were taken regularly. Example: Mon-Thu: Incremental Backup and Fri: Full Backup. Whether the backup media along with the procedure to restore the backup are stored securely and well away from the actual site. Whether the backup media are regularly tested to ensure that they could be restored within the time frame allotted in the operational procedure for recovery.6.4.28.4.2Operator logsWhether Operational staffs maintain a log of their activities such as name of the person, errors, corrective action etc., Whether Operator logs are checked on regular basis against the Operating procedures.6.4.38.4.3Fault LoggingWhether faults are reported and well managed. This includes corrective action being taken, review of the fault logs and checking the actions taken 6.58.5Network Management6.5.18.5.1Network Controls Whether effective operational controls such as separate network and system administration facilities were be established where necessary. Whether responsibilities and procedures for management of remote equipment, including equipment in user areas were established. Whether there exist any special controls to safeguard confidentiality and integrity of data processing over the public network and to protect the connected systems. Example: Virtual Private Networks, other encryption and hashing mechanisms etc., 6.68.6Media handling and Security6.6.18.6.1Management of removable computer mediaWhether there exist a procedure for management of removable computer media such as tapes, disks, cassettes, memory cards and reports.6.6.28.6.2Disposal of MediaWhether the media that are no longer required are disposed off securely and safely. Whether disposal of sensitive items are logged where necessary in order to maintain an audit trail.6.6.38.6.3Information handling proceduresWhether there exists a procedure for handling the storage of information. Does this procedure address issues such as information protection from unauthorised disclosure or misuse. 6.6.48.6.4Security of system documentationWhether the system documentation is protected from unauthorised access. Whether the access list for the system documentation is kept to minimum and authorised by the application owner. Example: System documentation need to be kept on a shared drive for specific purposes, the document need to have Access Control Lists enabled (to be accessible only by limited users.) 6.78.7Exchange of Information and software6.7.18.7.1Information and software exchange agreementWhether there exists any formal or informal agreement between the organisations for exchange of information and software. Whether the agreement does addresses the security issues based on the sensitivity of the business information involved.6.7.28.7.2Security of Media in transitWhether security of media while being transported taken into account. Whether the media is well protected from unauthorised access, misuse or corruption.6.7.38.7.3Electronic Commerce securityWhether Electronic commerce is well protected and controls implemented to protect against fraudulent activity, contract dispute and disclosure or modification of information.Whether Security controls such as Authentication, Authorisation are considered in the ECommerce environment. Whether electronic commerce arrangements between trading partners include a documented agreement, which commits both parties to the agreed terms of trading, including details of security issues. 6.7.48.7.4Security of Electronic emailWhether there is a policy in place for the acceptable use of electronic mail or does security policy does address the issues with regards to use of electronic mail. Whether controls such as antivirus checking, isolating potentially unsafe attachments, spam control, anti relaying etc., are put in place to reduce the risks created by electronic email. 6.7.58.7.5Security of Electronic office systemsWhether there is an Acceptable use policy to address the use of Electronic office systems. Whether there are any guidelines in place to effectively control the business and security risks associated with the electronic office systems.6.7.68.7.6Publicly available systemsWhether there is any formal authorisation process in place for the information to be made publicly available. Such as approval from Change Control which includes Business, Application owner etc., Whether there are any controls in place to protect the integrity of such information publicly available from any unauthorised access. This might include controls such as firewalls, Operating system hardening, any Intrusion detection type of tools used to monitor the system etc., 6.7.78.7.7Other forms of information exchangeWhether there are any policies, procedures or controls in place to protect the exchange of information through the use of voice, facsimile and video communication facilities.Whether staffs are reminded to maintain the confidentiality of sensitive information while using such forms of information exchange facility.Access Control7.19.1Business Requirements for Access Control7.1.19.1.1Access Control PolicyWhether the business requirements for access control have been defined and documented. Whether the Access control policy does address the rules and rights for each user or a group of user. Whether the users and service providers were given a clear statement of the business requirement to be met by access controls.7.29.2User Access Management7.2.19.2.1User RegistrationWhether there is any formal user registration and de-registration procedure for granting access to multi-user information systems and services. 7.2.29.2.2Privilege ManagementWhether the allocation and use of any privileges in multi-user information system environment is restricted and controlled i.e., Privileges are allocated on need-to-use basis; privileges are allocated only after formal authorisation process. 7.2.39.2.3User Password ManagementThe allocation and reallocation of passwords should be controlled through a formal management process. Whether the users are asked to sign a statement to keep the password confidential. 7.2.49.2.4Review of user access rightsWhether there exist a process to review user access rights at regular intervals. Example: Special privilege review every 3 months, normal privileges every 6 moths.7.39.3User Responsibilities7.3.19.3.1Password useWhether there are any guidelines in place to guide users in selecting and maintaining secure passwords. 7.3.29.3.2Unattended user equipmentWhether the users and contractors are made aware of the security requirements and procedures for protecting unattended equipment, as well as their responsibility to implement such protection. Example: Logoff when session is finished or set up auto log off, terminate sessions when finished etc.,7.49.4Network Access Control7.4.19.4.1Policy on use of network servicesWhether there exists a policy that does address concerns relating to networks and network services such as: Parts of network to be accessed, Authorisation services to determine who is allowed to do what, Procedures to protect the access to network connections and network services. 7.4.29.4.2Enforced pathWhether there is any control that restricts the route between the user terminal and the designated computer services the user is authorised to access example: enforced path to reduce the risk.7.4.39.4.3User authentication for external connectionsWhether there exist any authentication mechanism for challenging external connections. Examples: Cryptography based technique, hardware tokens, software tokens, challenge/ response protocol etc., 7.4.49.4.4Node AuthenticationWhether connections to remote computer systems that are outside organisations security management are authenticated. Node authentication can serve as an alternate means of authenticating groups of remote users where they are connected to a secure, shared computer facility. 7.4.59.4.5Remote diagnostic port protectionWhether accesses to diagnostic ports are securely controlled i.e., protected by a security mechanism. 7.4.69.4.6Segregation in networksWhether the network (where business partners and/ or third parties need access to information system) is segregated using perimeter security mechanisms such as firewalls.7.4.79.4.7Network connection protocolsWhether there exists any network connection control for shared networks that extend beyond the organisational boundaries. Example: electronic mail, web access, file transfers, etc.,7.4.89.4.8Network routing controlWhether there exist any network control to ensure that computer connections and information flows do not breach the access control policy of the business applications. This is often essential for networks shared with non-organisations users.Whether the routing controls are based on the positive source and destination identification mechanism. Example: Network Address Translation (NAT).7.4.99.4.9Security of network servicesWhether the organisation, using public or private network service does ensure that a clear description of security attributes of all services used is provided. 7.59.5Operating system access control7.5.19.5.1Automatic terminal identificationWhether automatic terminal identification mechanism is used to authenticate connections.7.5.29.5.2Terminal log-on proceduresWhether access to information system is attainable only via a secure log-on process. Whether there is a procedure in place for logging in to an information system. This is to minimise the opportunity of unauthorised access.7.5.39.5.3User identification and authorisationWhether unique identifier is provided to every user such as operators, system administrators and all other staff including technical. The generic user accounts should only be supplied under exceptional circumstances where there is a clear business benefit. Additional controls may be necessary to maintain accountability.Whether the authentication method used does substantiate the claimed identity of the user; commonly used method: Password that only the user knows. 7.5.49.5.4Password management systemWhether there exists a password management system that enforces various password controls such as: individual password for accountability, enforce password changes, store passwords in encrypted form, not display passwords on screen etc., 7.5.59.5.5Use of system utilitiesWhether the system utilities that comes with computer installations, but may override system and application control is tightly controlled. 7.5.69.5.6Duress alarm to safeguard usersWhether provision of a duress alarm is considered for users who might be the target of coercion. 7.5.79.5.7Terminal time-outInactive terminal in public areas should be configured to clear the screen or shut down automatically after a defined period of inactivity.7.5.89.5.8Limitation of connection timeWhether there exist any restriction on connection time for high-risk applications. This type of set up should be considered for sensitive applications for which the terminals are installed in high-risk locations.7.69.6Application Access Control7.6.19.6.1Information access restrictionWhether access to application by various groups/ personnel within the organisation should be defined in the access control policy as per the individual business application requirement and is consistent with the organisations Information access policy.7.6.29.6.2Sensitive system isolationWhether sensitive systems are provided with isolated computing environment such as running on a dedicated computer, share resources only with trusted application systems, etc.,7.79.7Monitoring system access and use7.7.19.7.1Event loggingWhether audit logs recording exceptions and other security relevant events are produced and kept for an agreed period to assist in future investigations and access control monitoring.7.7.29.7.2Monitoring system useWhether procedures are set up for monitoring the use of information processing facility. The procedure should ensure that the users are performing only the activities that are explicitly authorised. Whether the results of the monitoring activities are reviewed regularly. 7.7.39.7.3Clock synchronisationWhether the computer or communication device has the capability of operating a real time clock, it should be set to an agreed standard such as Universal co-ordinated time or local standard time. The correct setting of the computer clock is important to ensure the accuracy of the audit logs. 7.89.8Mobile computing and teleworking7.8.19.8.1Mobile computingWhether a formal policy is adopted that takes into account the risks of working with computing facilities such as notebooks, palmtops etc., especially in unprotected environments. Whether trainings were arranged for staff to use mobile computing facilities to raise their awareness on the additional risks resulting from this way of working and controls that need to be implemented to mitigate the risks.7.8.29.8.2TeleworkingWhether there is any policy, procedure and/ or standard to control teleworking activities, this should be consistent with organisations security policy. Whether suitable protection of teleworking site is in place against threats such as theft of equipment, unauthorised disclosure of information etc., System development and maintenance8.110.1Security requirements of systems8.1.110.1.1Security requirements analysis and specificationWhether security requirements are incorporated as part of business requirement statement for new systems or for enhancement to existing systems. Security requirements and controls identified should reflect business value of information assets involved and the consequence from failure of Security.Whether risk assessments are completed prior to commencement of system development. 8.210.2Security in application systems8.2.110.2.1Input data validationWhether data input to application system is validated to ensure that it is correct and appropriate. Whether the controls such as: Different type of inputs to check for error messages, Procedures for responding to validation errors, defining responsibilities of all personnel involved in data input process etc., are considered.8.2.210.2.2Control of internal processingWhether areas of risks are identified in the processing cycle and validation checks were included. In some cases the data that has been correctly entered can be corrupted by processing errors or through deliberate acts.Whether appropriate controls are identified for applications to mitigate from risks during internal processing. The controls will depend on nature of application and business impact of any corruption of data.8.2.310.2.3Message authenticationWhether an assessment of security risk was carried out to determine if Message authentication is required; and to identify most appropriate method of implementation if it is necessary. Message authentication is a technique used to detect unauthorised changes to, or corruption of, the contents of the transmitted electronic message. 8.2.410.2.4Output data validationWhether the data output of application system is validated to ensure that the processing of stored information is correct and appropriate to circumstances. 8.310.3Cryptographic controls8.3.110.3.1Policy on use of cryptographic controlsWhether there is a Policy in use of cryptographic controls for protection of information is in place. Whether a risk assessment was carried out to identify the level of protection the information should be given.8.3.210.3.2EncryptionWhether encryption techniques were used to protect the data. Whether assessments were conducted to analyse the sensitivity of the data and the level of protection needed.8.3.310.3.3Digital SignaturesWhether Digital signatures were used to protect the authenticity and integrity of electronic documents.8.3.410.3.4Non-repudiation servicesWhether non-repudiation services were used, where it might be necessary to resolve disputes about occurrence or non-occurrence of an event or action. Example: Dispute involving use of a digital signature on an electronic payment or contract. 8.3.510.3.5Key managementWhether there is a management system is in place to support the organisations use of cryptographic techniques such as Secret key technique and Public key technique. Whether the Key management system is based on agreed set of standards, procedures and secure methods.8.410.4Security of system files8.4.110.4.1Control of operational softwareWhether there are any controls in place for the implementation of software on operational systems. This is to minimise the risk of corruption of operational systems. 8.4.210.4.2Protection of system test dataWhether system test data is protected and controlled. The use of operational database containing personal information should be avoided for test purposes. If such information is used, the data should be depersonalised before use. 8.4.310.4.3Access Control to program source libraryWhether strict controls are in place over access to program source libraries. This is to reduce the potential for corruption of computer programs. 8.510.5Security in development and support process8.5.110.5.1Change control proceduresWhether there are strict control procedures in place over implementation of changes to the information system. This is to minimise the corruption of information system.8.5.210.5.2Technical review of operating system changesWhether there are process or procedure in place to ensure application system is reviewed and tested after change in operating system. Periodically it is necessary to upgrade operating system i.e., to install service packs, patches, hot fixes etc., 8.5.310.5.3Technical review of operating system changesWhether there are any restrictions in place to limit changes to software packages. As far as possible the vendor supplied software packages should be used without modification. If changes are deemed essential the original software should be retained and the changes applied only to a clearly identified copy. All changes should be clearly tested and documented, so they can be reapplied if necessary to future software upgrades. 8.5.410.5.4Covert channels and Trojan codeWhether there are controls in place to ensure that the covert channels and Trojan codes are not introduced into new or upgraded system. A covert channel can expose information by some indirect and obscure means. Trojan code is designed to affect a system in a way that is not authorised. 8.5.510.5.5Outsourced software developmentWhether there are controls in place over outsourcing software. The points to be noted includes: Licensing arrangements, escrow arrangements, contractual requirement for quality assurance, testing before installation to detect Trojan code etc., Business Continuity Management9.111.1Aspects of Business Continuity Management9.1.111.1.1Business continuity management processWhether there is a managed process in place for developing and maintaining business continuity throughout the organisation. This might include Organisation wide Business continuity plan, regular testing and updating of the plan, formulating and documenting a business continuity strategy etc., 9.1.211.1.2Business continuity and impact analysisWhether events that could cause interruptions to business process were identified example: equipment failure, flood and fire. Whether a risk assessment was conducted to determine impact of such interruptions. Whether a strategy plan was developed based on the risk assessment results to determine an overall approach to business continuity.9.1.311.1.3Writing and implementing continuity planWhether plans were developed to restore business operations within the required time frame following an interruption or failure to business process. Whether the plan is regularly tested and updated.9.1.411.1.4Business continuity planning frameworkWhether there is a single framework of Business continuity plan. Whether this framework is maintained to ensure that all plans are consistent and identify priorities for testing and maintenance. Whether this identifies conditions for activation and individuals responsible for executing each component of the plan.9.1.511.1.5Testing, maintaining and re-assessing business continuity planWhether Business continuity plans are tested regularly to ensure that they are up to date and effective.Whether Business continuity plans were maintained by regular reviews and updates to ensure their continuing effectiveness. Whether procedures were included within the organisations change management programme to ensure that Business continuity matters are appropriately addressed. Compliance10.112.1Compliance with legal requirements10.1.112.1.1Identification of applicable legislationWhether all relevant statutory, regulatory and contractual requirements were explicitly defined and documented for each information system. Whether specific controls and individual responsibilities to meet these requirements were defined and documented.10.1.212.1.2Intellectual property rights (IPR)Whether there exist any procedures to ensure compliance with legal restrictions on use of material in respect of which there may be intellectual property rights such as copyright, design rights, trade marks. Whether the procedures are well implemented.Whether proprietary software products are supplied under a license agreement that limits the use of the products to specified machines. The only exception might be for making own back-up copies of the software. 10.1.312.1.3Safeguarding of organisational recordsWhether important records of the organisation is protected from loss destruction and falsi function.10.1.412.1.4Data protection and privacy of personal informationWhether there is a management structure and control in place to protect data and privacy of personal information. 10.1.512.1.5Prevention of misuse of information processing facilityWhether use of information processing facilities for any non-business or unauthorised purpose, without management approval is treated as improper use of the facility. Whether at the log-on a warning message is presented on the computer screen indicating that the system being entered is private and that unauthorised access is not permitted. 10.1.612.1.6Regulation of cryptographic controlsWhether the regulation of cryptographic control is as per the sector and national agreement.10.1.712.1.7Collection of evidenceWhether the process involved in collecting the evidence is in accordance with legal and industry best practise. 10.212.2Reviews of Security Policy and technical compliance10.2.112.2.1Compliance with security policyWhether all areas within the organisation is considered for regular review to ensure compliance with security policy, standards and procedures.10.2.212.2.2Technical compliance checkingWhether information systems were regularly checked for compliance with security implementation standards. Whether the technical compliance check is carried out by, or under the supervision of, competent, authorised persons.10.312.3System audit considerations10.3.112.3.1System audit controlsWhether audit requirements and activities involving checks on operational systems should be carefully planned and agreed to minimise the risk of disruptions to business process. 10.3.212.3.2Protection of system audit toolsWhether access to system audit tools such as software or data files are protected to prevent any possible misuse or compromise.  References Information Security Management, Part2: Specification for Information security management systems AS/NZS 7799.2:2003 BS 7799.2:2002 Information Technology Code of practice for Information Security Management AS/NZS ISO/IEC 17799:2001 SANS Institute BS 7799 Audit Checklist  DATE \@ "d/MM/yyyy" 30/07/2003 Author: Val Thiagarajan | Approved by: Algis Kibirkstis | Owner: SANS Institute Page -  PAGE 2 "#23DENP {lalQFh20JmHnHujh20JUmHnHuh25CJ(\aJ(jh25CJ(U\aJ(h25B*CJ(aJ(ph h2CJjh26CJU]h26CJ]h26CJ]aJh25\aJ h2aJh2CJaJh25CJ$aJ$h25B*CJ$aJ$phfh25B*CJ(aJ(phfh2CJ$aJ$h2h2CJ(aJ("#23DENOP n $a$#$d%d&d'dNOPQ&$$d%d&d'dNOPQa$8 ' ( ) * 9 N O h i j k l m n o p 빪ąn빪] jqh2UmHnHu,jh2>*B*UmHnHphu'h25CJKH\^JaJmHnHu j{h2UmHnHujh2UmHnHuh2mHnHujh20JUmHnHu,jh2>*B*UmHnHphuh20JmHnHuh2mHnHu"n / S wGEePx 2  2     ) * + , - . / 0 1 L M N O d e f  ôãôٚΚ΃ôrôٚΚ[,jh2>*B*UmHnHphu j]h2UmHnHu,jh2>*B*UmHnHphuh2mHnHu jgh2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,jh2>*B*UmHnHphu#  1 2 3 L M N P Q R S T U p q r s űŦŦuŝŦ^Ŧ,jh2>*B*UmHnHphu jIh2UmHnHu,jh2>*B*UmHnHphuh2mHnHuh20JmHnHu'h25CJKH\^JaJmHnHujh20JUmHnHu jSh2UmHnHujh2UmHnHuh2mHnHu# :;<=pqrżűűՉżűrűaż j+h2UmHnHu,jh2>*B*UmHnHphu j5h2UmHnHu,jh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHuh2mHnHujh2UmHnHu j?h2UmHnHu&    ,-./UVWpqrtuvwxy庫庫r j h2UmHnHu,j h2>*B*UmHnHphu j! h2UmHnHujh2UmHnHuh2mHnHu,jh2>*B*UmHnHphuh2mHnHuh20JmHnHujh20JUmHnHu$%&'@ABDEFGHIdefgôãôٚΚ΃ôrôٚΚ[,j~ h2>*B*UmHnHphu j h2UmHnHu,j h2>*B*UmHnHphuh2mHnHu j h2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,j h2>*B*UmHnHphu#5678fghżűűżűrűa jh2UmHnHu,jjh2>*B*UmHnHphu j h2UmHnHu,jt h2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu j h2UmHnHujh2UmHnHuh2mHnHu&#$%>?@BCDEFGbĉ̵̪̪q jh2UmHnHu,jVh2>*B*UmHnHphu jh2UmHnHuh2mHnHu,j`h2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHujh2UmHnHu'cde    -.ôãôُΆoô^ôنΆ jh2UmHnHu,jBh2>*B*UmHnHphuh2mHnHu'h25CJKH\^JaJmHnHu jh2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,jLh2>*B*UmHnHphu ./0CDE^_`bcdefgôãôٚΚ΃ôrôٚΚ[,j$h2>*B*UmHnHphu jh2UmHnHu,j.h2>*B*UmHnHphuh2mHnHu jh2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,j8h2>*B*UmHnHphu#9:;<^_`yz{}~żűűżűrűa jh2UmHnHu,jh2>*B*UmHnHphu jh2UmHnHu,jh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu jh2UmHnHujh2UmHnHuh2mHnHu&./0IJKMNOPQRmnopn] jwh2UmHnHu,jh2>*B*UmHnHphu jh2UmHnHuh2mHnHu,jh2>*B*UmHnHphuh2mHnHuh20JmHnHu'h25CJKH\^JaJmHnHujh20JUmHnHujh2UmHnHu$9:;<VWXqrsuvwxyzq jch2UmHnHu,jh2>*B*UmHnHphu jmh2UmHnHujh2UmHnHuh2mHnHujh20JUmHnHu,jh2>*B*UmHnHphuh2mHnHuh20JmHnHu#   $%&()*+,-HIJKvôãôٚΚ΃ôrôٚΚ[,jh2>*B*UmHnHphu jOh2UmHnHu,jh2>*B*UmHnHphuh2mHnHu jYh2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,jh2>*B*UmHnHphu#x+ i)KNt%u<k  2  2 vwx     ()*+GHIbcdfżűűżűrűa j1 h2UmHnHu,jh2>*B*UmHnHphu j;h2UmHnHu,jh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu jEh2UmHnHujh2UmHnHuh2mHnHu&fghijk "#$&'()*+FĜ̵̪̪q j"h2UmHnHu,j!h2>*B*UmHnHphu j'!h2UmHnHuh2mHnHu,j h2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHujh2UmHnHu'GHI`ab{|}ôãôٚΚ΃ôrôٚΚ[,j$h2>*B*UmHnHphu j $h2UmHnHu,j#h2>*B*UmHnHphuh2mHnHu j#h2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,j"h2>*B*UmHnHphu#*+DEFHIJKLMhijkvwxűŦŦuŝŦ^Ŧ,jp&h2>*B*UmHnHphu j%h2UmHnHu,jz%h2>*B*UmHnHphuh2mHnHuh20JmHnHu'h25CJKH\^JaJmHnHujh20JUmHnHu j$h2UmHnHujh2UmHnHuh2mHnHu#,-.GHIKLMNOPklmnżűűՉżűrűaż j(h2UmHnHu,j\(h2>*B*UmHnHphu j'h2UmHnHu,jf'h2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHuh2mHnHujh2UmHnHu j&h2UmHnHu&    ,-./RSTmnoqrstuv庫庫r j*h2UmHnHu,jH*h2>*B*UmHnHphu j)h2UmHnHujh2UmHnHuh2mHnHu,jR)h2>*B*UmHnHphuh2mHnHuh20JmHnHujh20JUmHnHu$ "#$%&'BCDESôãôٚΚ΃ôrôٚΚ[,j*-h2>*B*UmHnHphu j,h2UmHnHu,j4,h2>*B*UmHnHphuh2mHnHu j+h2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,j>+h2>*B*UmHnHphu#STUnoprstuvwżűűżűrűa j/h2UmHnHu,j/h2>*B*UmHnHphu j.h2UmHnHu,j .h2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu j-h2UmHnHujh2UmHnHuh2mHnHu& ;<=>`ab{|}̵̪̪̂q j}1h2UmHnHu,j1h2>*B*UmHnHphu j0h2UmHnHuh2mHnHu,j 0h2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHujh2UmHnHu'  5679:;<=>YZ[\~ôãôٚΚ΃ôrôٚΚ[,j3h2>*B*UmHnHphu ji3h2UmHnHu,j2h2>*B*UmHnHphuh2mHnHu js2h2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,j1h2>*B*UmHnHphu#    = J K d e f h i j k l m żűűuű^ű,j5h2>*B*UmHnHphu'h25CJKH\^JaJmHnHu jU5h2UmHnHu,j4h2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu j_4h2UmHnHujh2UmHnHuh2mHnHu# !!!1!2!3!5!6!7!8!9!:!U!V!W!X!r!s!t!!!!!!!!żűűՉżűrűaż j78h2UmHnHu,j7h2>*B*UmHnHphu jA7h2UmHnHu,j6h2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHuh2mHnHujh2UmHnHu jK6h2UmHnHu& 8!!!K""!###'$$$@%%%3&&&6'''R(()))C**+ 2  2 !!!!!!!!!!!!!!!!!!!"""")"*"+"D"E"F"H"I"J"K"L"M"h"i"庫庫r j#:h2UmHnHu,j9h2>*B*UmHnHphu j-9h2UmHnHujh2UmHnHuh2mHnHu,j8h2>*B*UmHnHphuh2mHnHuh20JmHnHujh20JUmHnHu$i"j"k""""""""""""""""""####### #!#"###>#?#@#A#_#ôãôٚΚ΃ôrôٚΚ[,j<h2>*B*UmHnHphu j<h2UmHnHu,j;h2>*B*UmHnHphuh2mHnHu j;h2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,j:h2>*B*UmHnHphu#_#`#a#z#{#|#~##########################$$$ $!$"$$$żűűżűrűa j>h2UmHnHu,jv>h2>*B*UmHnHphu j=h2UmHnHu,j=h2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu j=h2UmHnHujh2UmHnHuh2mHnHu&$$%$&$'$($)$D$E$F$G$l$m$n$$$$$$$$$$$$$$$$$$$$$$$$$$%%̵̪̪̂q j@h2UmHnHu,jb@h2>*B*UmHnHphu j?h2UmHnHuh2mHnHu,jl?h2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHujh2UmHnHu'%%%%% %9%:%;%=%>%?%@%A%B%]%^%_%`%s%t%u%%%%%%%%%%%%%%%ôãôٚΚ΃ôrôٚΚ[,jDCh2>*B*UmHnHphu jBh2UmHnHu,jNBh2>*B*UmHnHphuh2mHnHu jAh2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,jXAh2>*B*UmHnHphu#%%%%%%%%%%%%&&&&&&&,&-&.&0&1&2&3&4&5&P&Q&R&S&e&f&g&&&&&żűűżűrűa jEh2UmHnHu,j0Eh2>*B*UmHnHphu jDh2UmHnHu,j:Dh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu jCh2UmHnHujh2UmHnHuh2mHnHu&&&&&&&&&&&&&&&&&&&&&&&&&&&'''/'0'1'3'4'5'6'7'8'S'T'̵̪̪̂q jGh2UmHnHu,jGh2>*B*UmHnHphu jFh2UmHnHuh2mHnHu,j&Fh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHujh2UmHnHu'T'U'V'|'}'~''''''''''''''''''''''''''((((0(ôãôٚΚ΃ôrôٚΚ[,jIh2>*B*UmHnHphu jIh2UmHnHu,jIh2>*B*UmHnHphuh2mHnHu jHh2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,jHh2>*B*UmHnHphu#0(1(2(K(L(M(O(P(Q(R(S(T(o(p(q(r(((((((((((((((((((())))żűűżűrűa jeLh2UmHnHu,jKh2>*B*UmHnHphu joKh2UmHnHu,jJh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu jyJh2UmHnHujh2UmHnHuh2mHnHu&))))))7)8)9):)e)f)g))))))))))))))))))))))))))**̵̪̪̂q jQNh2UmHnHu,jMh2>*B*UmHnHphu j[Mh2UmHnHuh2mHnHu,jLh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHujh2UmHnHu'***!*"*#*<*=*>*@*A*B*C*D*E*`*a*b*c******************ôãôٚΚ΃ôrôٚΚ[,jPh2>*B*UmHnHphu j=Ph2UmHnHu,jOh2>*B*UmHnHphuh2mHnHu jGOh2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,jNh2>*B*UmHnHphu#***+++++++ + +%+&+'+(+B+C+D+]+^+_+a+b+c+d+e+f++++++++++++żűűżűrűa jSh2UmHnHu,jRh2>*B*UmHnHphu j)Rh2UmHnHu,jQh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu j3Qh2UmHnHujh2UmHnHuh2mHnHu&+d++4,,,M---P../S//0i00&1{117222L334l44/5 2  2 +++++++++++,,-,.,/,1,2,3,4,5,6,Q,R,S,T,|,},~,,,,,,,,,̵̪n̪] j Uh2UmHnHu,jTh2>*B*UmHnHphu'h25CJKH\^JaJmHnHu jTh2UmHnHuh2mHnHu,jSh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHujh2UmHnHu$,,,,,,,,,,,,,,,,,,----+-,---F-G-H-J-K-L-M-N-O-j-k-q jVh2UmHnHu,j|Vh2>*B*UmHnHphu jVh2UmHnHujh2UmHnHuh2mHnHujh20JUmHnHu,jUh2>*B*UmHnHphuh2mHnHuh20JmHnHu#k-l-m-~----------------------------......ôãôٚΚ΃ôrôٚΚ[,j^Yh2>*B*UmHnHphu jXh2UmHnHu,jhXh2>*B*UmHnHphuh2mHnHu jWh2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,jrWh2>*B*UmHnHphu#../.0.I.J.K.M.N.O.P.Q.R.m.n.o.p......................//żűűżűrűa j[h2UmHnHu,jJ[h2>*B*UmHnHphu jZh2UmHnHu,jTZh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu jYh2UmHnHujh2UmHnHuh2mHnHu&//////"/#/$/%/1/2/3/L/M/N/P/Q/R/S/T/U/p/q/r/s///////////////̵̪̪̂q j]h2UmHnHu,j6]h2>*B*UmHnHphu j\h2UmHnHuh2mHnHu,j@\h2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHujh2UmHnHu'///////00000000#0$0%0&0G0H0I0b0c0d0f0g0h0i0j0k000000ôãôٚΚ΃ôrôٚΚ[,j`h2>*B*UmHnHphu j_h2UmHnHu,j"_h2>*B*UmHnHphuh2mHnHu j^h2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,j,^h2>*B*UmHnHphu#00000000000000001111 1!1#1$1%1&1'1(1C1D1E1F1Y1Z1[1t1u1v1x1żűűżűrűa jbh2UmHnHu,jbh2>*B*UmHnHphu jah2UmHnHu,jah2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu j`h2UmHnHujh2UmHnHuh2mHnHu&x1y1z1{1|1}111111111111111111111222021222425262728292T2U2̵̪̪̂q jkdh2UmHnHu,jch2>*B*UmHnHphu juch2UmHnHuh2mHnHu,jbh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHujh2UmHnHu'U2V2W2s2t2u22222222222222222222222222 3 3 33*3ôãôٚΚ΃ôrôٚΚ[,jfh2>*B*UmHnHphu jWfh2UmHnHu,jeh2>*B*UmHnHphuh2mHnHu jaeh2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,jdh2>*B*UmHnHphu#*3+3,3E3F3G3I3J3K3L3M3N3i3j3k3l33333333333333333333 4 4 4 4żűűżűrűa j9ih2UmHnHu,jhh2>*B*UmHnHphu jChh2UmHnHu,jgh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu jMgh2UmHnHujh2UmHnHuh2mHnHu& 444444-4.4/404J4K4L4e4f4g4i4j4k4l4m4n4444444444444444444̵̪̪̂q j%kh2UmHnHu,jjh2>*B*UmHnHphu j/jh2UmHnHuh2mHnHu,jih2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHujh2UmHnHu'444 555(5)5*5,5-5.5/50515L5M5N5O5f5g5h555555555555555ôãôٚΚ΃ôrôٚΚ[,jmh2>*B*UmHnHphu jmh2UmHnHu,jlh2>*B*UmHnHphuh2mHnHu jlh2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,jkh2>*B*UmHnHphu#/555<666W778d889t99:::Y;;<q<<!=y==.>>>,? 2  2 555555555555666 666656667696:6;6<6=6>6Y6Z6[6\6y6z6{66666żűűżűrűa joh2UmHnHu,jxoh2>*B*UmHnHphu jnh2UmHnHu,jnh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu jnh2UmHnHujh2UmHnHuh2mHnHu&66666666666666666666667777576777P7Q7R7T7U7V7W7X7Y7t7u7̵̪̪̂q jqh2UmHnHu,jdqh2>*B*UmHnHphu jph2UmHnHuh2mHnHu,jnph2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHujh2UmHnHu'u7v7w7777777777777777777788888888828384858B8ôãôٚΚ΃ôrôٚΚ[,jFth2>*B*UmHnHphu jsh2UmHnHu,jPsh2>*B*UmHnHphuh2mHnHu jrh2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,jZrh2>*B*UmHnHphu#B8C8D8]8^8_8a8b8c8d8e8f888888888888888888888888 9 9 99żűűżűrűa jvh2UmHnHu,j2vh2>*B*UmHnHphu juh2UmHnHu,j*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu jth2UmHnHujh2UmHnHuh2mHnHu&999999/9091929R9S9T9m9n9o9q9r9s9t9u9v9999999999999999999̵̪̪̂q jxh2UmHnHu,jxh2>*B*UmHnHphu jwh2UmHnHuh2mHnHu,j(wh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHujh2UmHnHu'999999 : ::::::::0:1:2:3:U:d:e:~:::::::::::ôãôٚΚ΃ôrô^Κ'h25CJKH\^JaJmHnHu jzh2UmHnHu,j zh2>*B*UmHnHphuh2mHnHu jyh2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,jyh2>*B*UmHnHphu :::::::::::::::;;;;7;8;9;R;S;T;V;W;X;Y;Z;[;v;w;x;y;;ôãôٚΚ΃ôrôٚΚ[,j|h2>*B*UmHnHphu jq|h2UmHnHu,j{h2>*B*UmHnHphuh2mHnHu j{{h2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,j{h2>*B*UmHnHphu#;;;;;;;;;;;;;;;;;;; < < <<<<<<<.</<0<1<O<P<Q<j<k<l<n<żűűżűrűa jSh2UmHnHu,j~h2>*B*UmHnHphu j]~h2UmHnHu,j}h2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu jg}h2UmHnHujh2UmHnHuh2mHnHu&n<o<p<q<r<s<<<<<<<<<<<<<<<<<<<<<<======= =!="=#=>=?=̵̪̪̂q j?h2UmHnHu,jĀh2>*B*UmHnHphu jIh2UmHnHuh2mHnHu,jh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHujh2UmHnHu'?=@=A=W=X=Y=r=s=t=v=w=x=y=z={==================>>> >ôãôٚΚ΃ôrôٚΚ[,jh2>*B*UmHnHphu j+h2UmHnHu,jh2>*B*UmHnHphuh2mHnHu j5h2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,jh2>*B*UmHnHphu# > >>'>(>)>+>,>->.>/>0>K>L>M>N>`>a>b>{>|>}>>>>>>>>>>>>>>>>>>żűűżűrűa j h2UmHnHu,jh2>*B*UmHnHphu jh2UmHnHu,jh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu j!h2UmHnHujh2UmHnHuh2mHnHu&>>>>>>>>>> ? ? ?%?&?'?)?*?+?,?-?.?I?J?K?L?d?e?f????????????̵̪̪̂q jh2UmHnHu,j~h2>*B*UmHnHphu jh2UmHnHuh2mHnHu,jh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHujh2UmHnHu',???G@@AyAAUBBCCCYDD,EEFsFFAGG HHHaII.JJ 2  2 ???????????????@@@@%@&@'@@@A@B@D@E@F@G@H@I@d@e@f@g@@ôãôٚΚ΃ôrôٚΚ[,j`h2>*B*UmHnHphu jh2UmHnHu,jjh2>*B*UmHnHphuh2mHnHu jh2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,jth2>*B*UmHnHphu#@@@@@@@@@@@@@@@@@@@AAAAAAAA A;AAWAXAYArAsAtAvAżűűżűrűa jnjh2UmHnHu,jLh2>*B*UmHnHphu jыh2UmHnHu,jVh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu jۊh2UmHnHujh2UmHnHuh2mHnHu&vAwAxAyAzA{AAAAAAAAAAAAAAAAABBBB3B4B5BNBOBPBRBSBTBUBVBWBrBsB̵̪̪̂q jh2UmHnHu,j8h2>*B*UmHnHphu jh2UmHnHuh2mHnHu,jBh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHujh2UmHnHu'sBtBuBBBBBBBBBBBBBBBBBBBBCCCCCCCCC4C5C6C7CUCôãôٚΚ΃ôrôٚΚ[,jh2>*B*UmHnHphu jh2UmHnHu,j$h2>*B*UmHnHphuh2mHnHu jh2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,j.h2>*B*UmHnHphu#UCeCfCCCCCCCCCCCCCCCCCCCCCCCCCCDDDD7D8D9DRDűŦŦuŝŦ^Ŧ,jh2>*B*UmHnHphu jh2UmHnHu,jh2>*B*UmHnHphuh2mHnHuh20JmHnHu'h25CJKH\^JaJmHnHujh20JUmHnHu jh2UmHnHujh2UmHnHuh2mHnHu#RDSDTDVDWDXDYDZD[DvDwDxDyDDDDDDDDDDDDDDDDD E E E%E&E'E)E*E+E,EżűűՉżűrűaż jmh2UmHnHu,jh2>*B*UmHnHphu jwh2UmHnHu,jh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHuh2mHnHujh2UmHnHu jh2UmHnHu&,E-E.EIEJEKELErEsEtEEEEEEEEEEEEEEEEE FFFFFFFFF1F2F庫庫r jYh2UmHnHu,jޖh2>*B*UmHnHphu jch2UmHnHujh2UmHnHuh2mHnHu,jh2>*B*UmHnHphuh2mHnHuh20JmHnHujh20JUmHnHu$2F3F4F>FRFSFlFmFnFpFqFrFsFtFuFFFFFFFFFFFFFFFFFFFôãôُΆoô^ôنΆ jEh2UmHnHu,jʘh2>*B*UmHnHphuh2mHnHu'h25CJKH\^JaJmHnHu jOh2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,jԗh2>*B*UmHnHphu FFFG G!G:G;GG?G@GAGBGCG^G_G`GaGGGGGGGGGGGGGGGGGGôãôٚΚ΃ôrôٚΚ[,jh2>*B*UmHnHphu j1h2UmHnHu,jh2>*B*UmHnHphuh2mHnHu j;h2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,jh2>*B*UmHnHphu#GGGHHH H H H HHH*H+H,H-H`HaHbH{H|H}HHHHHHHHHHHHHHHHHHżűűżűrűa jh2UmHnHu,jh2>*B*UmHnHphu jh2UmHnHu,jh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu j'h2UmHnHujh2UmHnHuh2mHnHu&HHHHHHIIII?I@IAIZI[I\I^I_I`IaIbIcI~IIIIIIIIIIIIIIIIIÎ̵̪̪q jh2UmHnHu,jh2>*B*UmHnHphu j h2UmHnHuh2mHnHu,jh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHujh2UmHnHu'III J JJ'J(J)J+J,J-J.J/J0JKJLJMJNJmJnJoJJJJJJJJJJJJJJJôãôٚΚ΃ôrôٚΚ[,jfh2>*B*UmHnHphu jh2UmHnHu,jph2>*B*UmHnHphuh2mHnHu jh2UmHnHujh2UmHnHuh2mHnHuh20JmHnHujh20JUmHnHu,jzh2>*B*UmHnHphu#JJJJJJJJJJJJ K K KK)K*K+KDKEKFKHKIKJKKKLKMKhKiKjKkKKKKKKKKżűűżűrűa jͤh2UmHnHu,jRh2>*B*UmHnHphu jףh2UmHnHu,j\h2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHu jh2UmHnHujh2UmHnHuh2mHnHu&JJKKKLcLeLvLwLLL M Mhwkd4$$Ifl4 3x3  t 044 lap $If$a$$a$ 2  2 KKKKKKKKKKKKKKKKLLLLLL!L"L#L$L.LBLCL\L]L^L`LaLbLcL̵̪̪̂q]'h25CJKH\^JaJmHnHu jh2UmHnHu,j>h2>*B*UmHnHphu jåh2UmHnHuh2mHnHu,jHh2>*B*UmHnHphuh20JmHnHuh2mHnHujh20JUmHnHujh2UmHnHu#cLdLvLL M M@MAMMMMMMMMNNNOPPPPPPPQQQQQRRRR_SaSbSS\T^T_TTUUUUVVVVWWWXX@XYYY YYYYYrZtZuZZZZϸϲϸϲϸϸϸϲϸϲϸϲϸϲϸϲϸϲϸϲϸϸϲϸϲϸϲϸϸ h2CJh2CJaJh2OJQJ^J h25h2h25CJ aJ h2CJaJh2CJ(aJ(%jh25CJ(KH U\^JaJ(F MM8M@MAMKMTM\MkMFkdݧ$$Ifl4F $ 3m | ``` t0    44 lap$IfkMuMMMMMMMMxr$Ifukd|$$Ifl 3x3  t ̙044 lap ̙$IfFfc$IfMMMMMNNNNpjjdjjjj$If$Ifkd"$$Ifl4F- 3 * t0    44 laf4NNNOOO:44.4$If$Ifkdۭ$$Iflֈ- $- 3p  t044 laOPPPPP4.$IfkdЮ$$Iflֈ- $- 3p  t044 la$IfPPPPP}$If$Ifukdů$$Ifl 3x3  t ̙044 lap ̙PPPPQQQQsmmgmmm$If$Ifkdk$$IflF- 3 * t0    44 laQQQQQR:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 laRRRRRR4kd$$Iflֈ- $- 3p  t044 la$IfRR_S`SaSbS.kd$$Iflֈ- $- 3p  t044 la$If$IfbShSnSS\T]T^T$If$If^T_TeTkTTT:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 laTUUUUU4kd$$Iflֈ- $- 3p  t044 la$IfUUUVVV$If$IfVVVVVW:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 laWWWWWW4kdܶ$$Iflֈ- $- 3p  t044 la$IfWXX XX@XXYYYmggagggg$If$Ifkdѷ$$IflF- 3 * t0    44 la$If YY Y Y YY:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 laYYYYYY4kdy$$Iflֈ- $- 3p  t044 la$IfYYrZsZtZuZ.kdn$$Iflֈ- $- 3p  t044 la$If$IfuZyZ}ZZZZZZ[\\\ga$Ifkdc$$IflF- 3 * t0    44 la$If$If Z\\\\\] ])]^^^<^=^c^___7______&`'`^`aaaabbbcdddDd!e#e$e:e;ese6f8f9fsftff'gTgg hVh}h i-i,jRjSjj`kkk*llllmFmmmn4nnnoKooo+p1p qqqqqrrrh2OJQJ^Jh2CJaJh2 h2CJZ\\\:4$Ifkd$$Iflֈ- $- 3p  t044 la\\\\]}$If$Ifukd $$Ifl 3x3  t ̙044 lap ̙] ]]])]]^^^smmgmmmm$If$Ifkd$$IflF- 3 * t0    44 la^^^!^<^:44.$If$Ifkdd$$Iflֈ- $- 3p  t044 la<^=^C^I^c^___smmgmmm$If$IfkdY$$IflF- 3 * t0    44 la____7__:44.4$If$Ifkd $$Iflֈ- $- 3p  t044 la_____4.$Ifkd$$Iflֈ- $- 3p  t044 la$If____&`}$If$Ifukd$$Ifl 3x3  t ̙044 lap ̙&`'`-`3`^``aaasmmgmmmm$If$Ifkd$$IflF- 3 * t0    44 laaaaaa\b:44.4$If$IfkdO$$Iflֈ- $- 3p  t044 la\bbbbbb4kdD$$Iflֈ- $- 3p  t044 la$Ifbbccddd$If$Ifddd!dDd!e:44.4$If$Ifkd9$$Iflֈ- $- 3p  t044 la!e"e#e$e(e,e4kd.$$Iflֈ- $- 3p  t044 la$If,e:e;eAeGese6f7f8fmggaggg$If$Ifkd#$$IflF- 3 * t0    44 la$If8f9f=fAfsf:44.$If$Ifkd$$Iflֈ- $- 3p  t044 lasftfzfff'g(g)gsmmgmmm$If$Ifkd$$IflF- 3 * t0    44 la)g*g0g6gTgg:44.4$If$Ifkd~$$Iflֈ- $- 3p  t044 lagggggg4kds$$Iflֈ- $- 3p  t044 la$Ifg hVhWhXhYh.kdh$$Iflֈ- $- 3p  t044 la$If$IfYh_heh}h i i i$If$If i iii-i,j:44.4$If$Ifkd]$$Iflֈ- $- 3p  t044 la,j-j.j/jSj4.$IfkdR$$Iflֈ- $- 3p  t044 la$IfSjTjXj\jhj}$If$IfukdG$$Ifl 3x3  t ̙044 lap ̙hjijojujjj`kakbkpjjdjjjj$If$Ifkd$$Ifl4F- 3 * t0    44 laf4bkckikokkk:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 lakkkkkl4kdq$$Iflֈ- $- 3p  t044 la$Ifl*lllll.kdX$$Iflֈ- $- 3p  t044 la$If$Ifllllllm$If$IfmmmmmFm:44.4$If$Ifkd?$$Iflֈ- $- 3p  t044 laFmGmHmImOmUm4kd&$$Iflֈ- $- 3p  t044 la$IfUmmmnnnn.kd $$Iflֈ- $- 3p  t044 la$If$Ifn nn4nnnn$If$Ifnnnnno:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 laoooo oo4kd$$Iflֈ- $- 3p  t044 la$Ifo"o#o)o/oKoooojdd^ddd$If$Ifkd$$Ifl4F- 3 * t0    44 laf4$Ifooooo+p:44.4$If$Ifkdm$$Iflֈ- $- 3p  t044 la+p,p-p.p/p0p4kdT$$Iflֈ- $- 3p  t044 la$If0p1p q q q q.kd;$$Iflֈ- $- 3p  t044 la$If$If q qqqqqq$If$Ifqqqqqq:44.4$If$Ifkd"$$Iflֈ- $- 3p  t044 laqqqqr r4kd $$Iflֈ- $- 3p  t044 la$If rrrrrr.kd$$Iflֈ- $- 3p  t044 la$If$Ifrrrrwsxsys$If$Ifrws}ssttt+u1uuvvv6wmww%xGyjyyyz{{{{{||}4}}}~ ~~~<aCk OGhq.4ÆɆkl} ƊGvW;kޒGÓɓAm4 h26CJh2 h2CJ^yszs{s|s}ss:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 lassssss4kd$$Iflֈ- $- 3p  t044 la$Ifststttt$If$Ifttttt+u:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 la+u,u-u.u/u0u4kd$$Iflֈ- $- 3p  t044 la$If0u1uuuuu$If$Ifuuuuvv:44.4$If$Ifkds$$Iflֈ- $- 3p  t044 lavvvvvv4kdZ$$Iflֈ- $- 3p  t044 la$Ifvv6w7w8w9w.kdA$$Iflֈ- $- 3p  t044 la$If$If9w?wEwmwwww$If$Ifwwwww:44.$If$Ifkd($$Iflֈ- $- 3p  t044 lawwwx%xxGyHyIypjjdjjjj$If$Ifkd$$Ifl4F- 3 * t0    44 laf4IyJyPyVyjyy:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 layyyyyy4kd$$Iflֈ- $- 3p  t044 la$Ifyy5zzzz$If$Ifzzz:4$Ifkd$$Iflֈ- $- 3p  t044 lazzzzzz$If$Ifxkdo$$Ifl4 3x3  t ̙044 laf4p ̙zzzz{{{{smmgmmm$If$Ifkd $$IflF- 3 * t0    44 la{{{{{{:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 la{{{{{{4kd$$Iflֈ- $- 3p  t044 la$If{{||||.kd$$Iflֈ- $- 3p  t044 la$If$If||||}}}$If$If} }}}4}}:44.4$If$Ifkdg$$Iflֈ- $- 3p  t044 la}}}}}}4kdN$$Iflֈ- $- 3p  t044 la$If}}}~~~$If$If~~ ~ ~ ~~:44.4$If$Ifkd5$$Iflֈ- $- 3p  t044 la~~~~~~4kd$$Iflֈ- $- 3p  t044 la$If~~<=>?.kd$$Iflֈ- $- 3p  t044 la$If$If?EKa$If$IfCk:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 laklmntz4kd$$Iflֈ- $- 3p  t044 la$Ifz .kd$$Iflֈ- $- 3p  t044 la$If$If $If$If 0:44.$If$Ifkd$$Iflֈ- $- 3p  t044 la017=OGHIsmmgmmmm$If$Ifkd$$IflF- 3 * t0    44 laIJPVhӄ:44.4$If$Ifkd+$$Iflֈ- $- 3p  t044 laӄ4kd$$Iflֈ- $- 3p  t044 la$IfABHNq./0ga$Ifkd$$IflF- 3 * t0    44 la$If$If 01234Æ:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 laÆĆņƆdžȆ4kd$$Iflֈ- $- 3p  t044 la$IfȆɆF$If$Ifl:44.4$If$Ifkdl$$Iflֈ- $- 3p  t044 lalmnosw4kdS$$Iflֈ- $- 3p  t044 la$IfwA}~mggagggg$If$Ifkd:$$IflF- 3 * t0    44 la$If :44.4$If$Ifkd$$Iflֈ- $- 3p  t044 la 4kd$$Iflֈ- $- 3p  t044 la$If .kd$$Iflֈ- $- 3p  t044 la$If$IfƊA$If$IfG:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 laGHIJNR4kd{$$Iflֈ- $- 3p  t044 la$IfReflrmggaggg$If$Ifkdb$$IflF- 3 * t0    44 la$If:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 la4kd$$Iflֈ- $- 3p  t044 la$If.kd$$Iflֈ- $- 3p  t044 la$If$IfÎɎvwxga$Ifkd$$IflF- 3 * t0    44 la$If$If xy:44.4$If$Ifkda$$Iflֈ- $- 3p  t044 la4kdH$$Iflֈ- $- 3p  t044 la$IfWXY$If$IfYZ`f::44.4$If$Ifkd/$$Iflֈ- $- 3p  t044 la:;<=>D4kd$$Iflֈ- $- 3p  t044 la$IfDJkޒߒ$If$If:44.$If$Ifkd$$Iflֈ- $- 3p  t044 laG“Óēœsmmgmmmm$If$Ifkd$$IflF- 3 * t0    44 laœƓǓȓɓA:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 laABCDJP4kdp $$Iflֈ- $- 3p  t044 la$IfPm $If$If 4:44.4$If$IfkdW $$Iflֈ- $- 3p  t044 la4kd> $$Iflֈ- $- 3p  t044 la$IfWXYZ.kd% $$Iflֈ- $- 3p  t044 la$If$IfW]!MGMݙ̚Қ͜Ӝaȝ &S#Y750aȩǪ}0\Wڮ069?Աг3T 42\ 9T 1Jo h20Jh2 h2CJ_Z[\]!"#$If$If#$*0M:44.4$If$Ifkd $$Iflֈ- $- 3p  t044 la4kd $$Iflֈ- $- 3p  t044 la$If.kd$$Iflֈ- $- 3p  t044 la$If$IfĘFGHI$If$IfIJKLMݙ:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 laݙޙߙ4kd$$Iflֈ- $- 3p  t044 la$If͚̚ΚϚ.kd$$Iflֈ- $- 3p  t044 la$If$IfϚКњҚX$If$If͜:44.4$If$Ifkdv$$Iflֈ- $- 3p  t044 la͜ΜϜМќҜ4kd]$$Iflֈ- $- 3p  t044 la$IfҜӜabcd.kdD$$Iflֈ- $- 3p  t044 la$If$Ifdstx|zzt$If$Ifxkd9$$Ifl4 3x3  t ̙044 laf4p ̙$Ifȝ !"pjjdjjj$If$Ifkd$$Ifl4F- 3 * t0    44 laf4"#$%&:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 la4kdi$$Iflֈ- $- 3p  t044 la$If.kdP$$Iflֈ- $- 3p  t044 la$If$If45;ASd^$Ifkd7$$Ifl4F- 3 * t0    44 laf4$If$If :44.4$If$Ifkd$$Iflֈ- $- 3p  t044 la 4kd$$Iflֈ- $- 3p  t044 la$If #.kd$$Iflֈ- $- 3p  t044 la$If$If$If$If:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 la4kd~$$Iflֈ- $- 3p  t044 la$If֢עݢYZ[jdd^ddd$If$Ifkde$$Ifl4F- 3 * t0    44 laf4$If[\bhC:44.4$If$Ifkd$$Iflֈ- $- 3p  t044 laC4kd$$Iflֈ- $- 3p  t044 la$IfͤΤԤڤi˥d^UUU $$Ifa$$Ifkd $$Ifl4F- 3 * t0    44 laf4$If$If ˥+kd!$$Iflֈ- $- 3p  t044 la$If $$Ifa$#)7 $$Ifa$$If$If5:44.4$If$Ifkdp"$$Iflֈ- $- 3p  t044 la4kdW#$$Iflֈ- $- 3p  t044 la$If 012$If$If239?aȩ:44.4$If$Ifkd>$$$Iflֈ- $- 3p  t044 laȩɩʩ˩ѩש4kd%%$$Iflֈ- $- 3p  t044 la$Ifש.kd &$$Iflֈ- $- 3p  t044 la$If$IfǪ}~$If$If:44.4$If$Ifkd&$$Iflֈ- $- 3p  t044 la4kd'$$Iflֈ- $- 3p  t044 la$If0123.kd($$Iflֈ- $- 3p  t044 la$If$If39?\$If$If(:44.$If$Ifkd)$$Iflֈ- $- 3p  t044 la()/5Wpjjdjjj$If$Ifkd*$$Ifl4F- 3 * t0    44 laf4ڮ0:44.4$If$Ifkd:+$$Iflֈ- $- 3p  t044 la0123454kd!,$$Iflֈ- $- 3p  t044 la$If56¯ïį.kd-$$Iflֈ- $- 3p  t044 la$If$IfįʯЯ}9:;$If$If;<=>?Ա:44.4$If$Ifkd-$$Iflֈ- $- 3p  t044 laԱձֱױݱ4kd.$$Iflֈ- $- 3p  t044 la$If.kd/$$Iflֈ- $- 3p  t044 la$If$If$If$Ifг3:44.4$If$Ifkd0$$Iflֈ- $- 3p  t044 la3456<B4kd1$$Iflֈ- $- 3p  t044 la$IfBT.kdr2$$Iflֈ- $- 3p  t044 la$If$If $If$If:44.$If$IfkdY3$$Iflֈ- $- 3p  t044 la 4234pjjdjjj$If$Ifkd@4$$Ifl4F- 3 * t0    44 laf445;A\ :44.4$If$Ifkd4$$Iflֈ- $- 3p  t044 la 4kd5$$Iflֈ- $- 3p  t044 la$If9:@FT jdd^ddd$If$Ifkd6$$Ifl4F- 3 * t0    44 laf4$If1:44.4$If$Ifkdd7$$Iflֈ- $- 3p  t044 la4kdK8$$Iflֈ- $- 3p  t044 la$IfJKL$If$IfLMSYo2:44.4$If$Ifkd29$$Iflֈ- $- 3p  t044 la24kd:$$Iflֈ- $- 3p  t044 la$Ifǻͻ޻d^$Ifkd;$$Ifl4F- 3 * t0    44 laf4$If$If ޻z06̾\2{^D8WjvdzGSPs @u,e-dX^y| $0M h20J h2CJ h20Jh2\z:44.4$If$Ifkd;$$Iflֈ- $- 3p  t044 laz{|}4kd<$$Iflֈ- $- 3p  t044 la$If0123.kdy=$$Iflֈ- $- 3p  t044 la$If$If3456̾;ξ$If$IfξϾ:4$Ifkd`>$$Iflֈ- $- 3p  t044 laz$If$IfxkdU?$$Ifl4 3x3  t ̙044 laf4p ̙$+\pjjdjjjj$If$Ifkd?$$Ifl4F- 3 * t0    44 laf4:44.4$If$Ifkd@$$Iflֈ- $- 3p  t044 la4kdA$$Iflֈ- $- 3p  t044 la$If2{|}jdd^dddd$If$IfkdlB$$Ifl4F- 3 * t0    44 laf4$If }~:44.4$If$IfkdC$$Iflֈ- $- 3p  t044 la4kdC$$Iflֈ- $- 3p  t044 la$If^_`$If$If`agn@:44.4$If$IfkdD$$Iflֈ- $- 3p  t044 la@4kdE$$Iflֈ- $- 3p  t044 la$If$If$If:44.$If$IfkdF$$Iflֈ- $- 3p  t044 la[pjjdjjjj$If$IfkdG$$Ifl4F- 3 * t0    44 laf4":44.4$If$IfkdEH$$Iflֈ- $- 3p  t044 la"4kd,I$$Iflֈ- $- 3p  t044 la$If$If$If$+D:44.4$If$IfkdJ$$Iflֈ- $- 3p  t044 la89:;A4kdJ$$Iflֈ- $- 3p  t044 la$IfAHW$If$Ifj:44.4$If$IfkdK$$Iflֈ- $- 3p  t044 lajklmqv4kdL$$Iflֈ- $- 3p  t044 la$Ifvdefjdd^ddd$If$IfkdM$$Ifl4F- 3 * t0    44 laf4$Iffgmtz:44.4$If$IfkdZN$$Iflֈ- $- 3p  t044 laz{|}4kdAO$$Iflֈ- $- 3p  t044 la$IfGHIJ.kd(P$$Iflֈ- $- 3p  t044 la$If$IfJNSPQRd^$IfkdQ$$Ifl4F- 3 * t0    44 laf4$If$If RSY`:44.4$If$IfkdQ$$Iflֈ- $- 3p  t044 la4kdR$$Iflֈ- $- 3p  t044 la$Ifstu$If$Ifuv|+:44.4$If$IfkdS$$Iflֈ- $- 3p  t044 la+4kdoT$$Iflֈ- $- 3p  t044 la$If4$If$If :4$IfkdVU$$Iflֈ- $- 3p  t044 la @}$If$IfukdKV$$Ifl 3x3  t ̙044 lap ̙@AGNusmmgmmmm$If$IfkdV$$IflF- 3 * t0    44 laT:44.4$If$IfkdW$$Iflֈ- $- 3p  t044 laT,-./4kdoX$$Iflֈ- $- 3p  t044 la$If/5<e-./$If$If/06=d:44.4$If$IfkdVY$$Iflֈ- $- 3p  t044 la(4kd=Z$$Iflֈ- $- 3p  t044 la$IfXYZ$If$IfZ[\]^:44.4$If$Ifkd$[$$Iflֈ- $- 3p  t044 layz{|4.$Ifkd \$$Iflֈ- $- 3p  t044 la$If}$If$Ifukd]$$Ifl 3x3  t ̙044 lap ̙zsmmgmmmm$If$Ifkd]$$IflF- 3 * t0    44 la :44.4$If$Ifkd=^$$Iflֈ- $- 3p  t044 la !"4kd$_$$Iflֈ- $- 3p  t044 la$If"#$$If$If 0:44.4$If$Ifkd `$$Iflֈ- $- 3p  t044 la4kd`$$Iflֈ- $- 3p  t044 la$IfMNOP.kda$$Iflֈ- $- 3p  t044 la$If$IfPW^>$If$IfM$'[I*7Sx+]"+,23459he!0JmHnHu h20Jjh20JUh2CJaJmH sH he!5mHnHujh25U h25h256B*ph he!he!he! h20J h2CJh2($:44.4$If$Ifkdb$$Iflֈ- $- 3p  t044 la4kdc$$Iflֈ- $- 3p  t044 la$If.kdd$$Iflֈ- $- 3p  t044 la$If$If"'[\cjga$Ifkdue$$IflF- 3 * t0    44 la$If$If $+I:44.4$If$Ifkdf$$Iflֈ- $- 3p  t044 la*+,-24kdg$$Iflֈ- $- 3p  t044 la$If27ST[bx+,-ga$Ifkdg$$IflF- 3 * t0    44 la$If$If -.5<]:44.4$If$Ifkdh$$Iflֈ- $- 3p  t044 la422kdti$$Iflֈ- $- 3p  t044 la$Ifx#$678$a$$da$ $dN$a$h^h & Fgde!895 0 01h0= /!"#$% {DyK  _Toc47427654{DyK  _Toc47427654{DyK  _Toc47427655{DyK  _Toc47427655{DyK  _Toc47427656{DyK  _Toc47427656{DyK  _Toc47427657{DyK  _Toc47427657{DyK  _Toc47427658{DyK  _Toc47427658{DyK  _Toc47427659{DyK  _Toc47427659{DyK  _Toc47427660{DyK  _Toc47427660{DyK  _Toc47427661{DyK  _Toc47427661{DyK  _Toc47427662{DyK  _Toc47427662{DyK  _Toc47427663{DyK  _Toc47427663{DyK  _Toc47427664{DyK  _Toc47427664{DyK  _Toc47427665{DyK  _Toc47427665{DyK  _Toc47427666{DyK  _Toc47427666{DyK  _Toc47427667{DyK  _Toc47427667{DyK  _Toc47427668{DyK  _Toc47427668{DyK  _Toc47427669{DyK  _Toc47427669{DyK  _Toc47427670{DyK  _Toc47427670{DyK  _Toc47427671{DyK  _Toc47427671{DyK  _Toc47427672{DyK  _Toc47427672{DyK  _Toc47427673{DyK  _Toc47427673{DyK  _Toc47427674{DyK  _Toc47427674{DyK  _Toc47427675{DyK  _Toc47427675{DyK  _Toc47427676{DyK  _Toc47427676{DyK  _Toc47427677{DyK  _Toc47427677{DyK  _Toc47427678{DyK  _Toc47427678{DyK  _Toc47427679{DyK  _Toc47427679{DyK  _Toc47427680{DyK  _Toc47427680{DyK  _Toc47427681{DyK  _Toc47427681{DyK  _Toc47427682{DyK  _Toc47427682{DyK  _Toc47427683{DyK  _Toc47427683{DyK  _Toc47427684{DyK  _Toc47427684{DyK  _Toc47427685{DyK  _Toc47427685{DyK  _Toc47427686{DyK  _Toc47427686{DyK  _Toc47427687{DyK  _Toc47427687{DyK  _Toc47427688{DyK  _Toc47427688{DyK  _Toc47427689{DyK  _Toc47427689{DyK  _Toc47427690{DyK  _Toc47427690{DyK  _Toc47427691{DyK  _Toc47427691{DyK  _Toc47427692{DyK  _Toc47427692{DyK  _Toc47427693{DyK  _Toc47427693{DyK  _Toc47427694{DyK  _Toc47427694{DyK  _Toc47427695{DyK  _Toc47427695{DyK  _Toc47427696{DyK  _Toc47427696{DyK  _Toc47427697{DyK  _Toc47427697{DyK  _Toc47427698{DyK  _Toc47427698{DyK  _Toc47427699{DyK  _Toc47427699{DyK  _Toc47427700{DyK  _Toc47427700{DyK  _Toc47427701{DyK  _Toc47427701{DyK  _Toc47427702{DyK  _Toc47427702{DyK  _Toc47427703{DyK  _Toc47427703{DyK  _Toc47427704{DyK  _Toc47427704{DyK  _Toc47427705{DyK  _Toc47427705{DyK  _Toc47427706{DyK  _Toc47427706{DyK  _Toc47427707{DyK  _Toc47427707{DyK  _Toc47427708{DyK  _Toc47427708{DyK  _Toc47427709{DyK  _Toc47427709{DyK  _Toc47427710{DyK  _Toc47427710{DyK  _Toc47427711{DyK  _Toc47427711{DyK  _Toc47427712{DyK  _Toc47427712{DyK  _Toc47427713{DyK  _Toc47427713{DyK  _Toc47427714{DyK  _Toc47427714{DyK  _Toc47427715{DyK  _Toc47427715{DyK  _Toc47427716{DyK  _Toc47427716{DyK  _Toc47427717{DyK  _Toc47427717{DyK  _Toc47427718{DyK  _Toc47427718{DyK  _Toc47427719{DyK  _Toc47427719{DyK  _Toc47427720{DyK  _Toc47427720{DyK  _Toc47427721{DyK  _Toc47427721{DyK  _Toc47427722{DyK  _Toc47427722{DyK  _Toc47427723{DyK  _Toc47427723{DyK  _Toc47427724{DyK  _Toc47427724{DyK  _Toc47427725{DyK  _Toc47427725{DyK  _Toc47427726{DyK  _Toc47427726{DyK  _Toc47427727{DyK  _Toc47427727{DyK  _Toc47427728{DyK  _Toc47427728{DyK  _Toc47427729{DyK  _Toc47427729{DyK  _Toc47427730{DyK  _Toc47427730{DyK  _Toc47427731{DyK  _Toc47427731{DyK  _Toc47427732{DyK  _Toc47427732{DyK  _Toc47427733{DyK  _Toc47427733{DyK  _Toc47427734{DyK  _Toc47427734{DyK  _Toc47427735{DyK  _Toc47427735{DyK  _Toc47427736{DyK  _Toc47427736{DyK  _Toc47427737{DyK  _Toc47427737{DyK  _Toc47427738{DyK  _Toc47427738{DyK  _Toc47427739{DyK  _Toc47427739{DyK  _Toc47427740{DyK  _Toc47427740{DyK  _Toc47427741{DyK  _Toc47427741{DyK  _Toc47427742{DyK  _Toc47427742{DyK  _Toc47427743{DyK  _Toc47427743{DyK  _Toc47427744{DyK  _Toc47427744{DyK  _Toc47427745{DyK  _Toc47427745{DyK  _Toc47427746{DyK  _Toc47427746{DyK  _Toc47427747{DyK  _Toc47427747{DyK  _Toc47427748{DyK  _Toc47427748{DyK  _Toc47427749{DyK  _Toc47427749{DyK  _Toc47427750{DyK  _Toc47427750{DyK  _Toc47427751{DyK  _Toc47427751{DyK  _Toc47427752{DyK  _Toc47427752{DyK  _Toc47427753{DyK  _Toc47427753{DyK  _Toc47427754{DyK  _Toc47427754{DyK  _Toc47427755{DyK  _Toc47427755{DyK  _Toc47427756{DyK  _Toc47427756{DyK  _Toc47427757{DyK  _Toc47427757{DyK  _Toc47427758{DyK  _Toc47427758{DyK  _Toc47427759{DyK  _Toc47427759{DyK  _Toc47427760{DyK  _Toc47427760{DyK  _Toc47427761{DyK  _Toc47427761{DyK  _Toc47427762{DyK  _Toc47427762{DyK  _Toc47427763{DyK  _Toc47427763{DyK  _Toc47427764{DyK  _Toc47427764{DyK  _Toc47427765{DyK  _Toc47427765{DyK  _Toc47427766{DyK  _Toc47427766{DyK  _Toc47427767{DyK  _Toc47427767{DyK  _Toc47427768{DyK  _Toc47427768{DyK  _Toc47427769{DyK  _Toc47427769{DyK  _Toc47427770{DyK  _Toc47427770{DyK  _Toc47427771{DyK  _Toc47427771{DyK  _Toc47427772{DyK  _Toc47427772{DyK  _Toc47427773{DyK  _Toc47427773{DyK  _Toc47427774{DyK  _Toc47427774{DyK  _Toc47427775{DyK  _Toc47427775{DyK  _Toc47427776{DyK  _Toc47427776{DyK  _Toc47427777{DyK  _Toc47427777{DyK  _Toc47427778{DyK  _Toc47427778{DyK  _Toc47427779{DyK  _Toc47427779{DyK  _Toc47427780{DyK  _Toc47427780{DyK  _Toc47427781{DyK  _Toc47427781{DyK  _Toc47427782{DyK  _Toc47427782{DyK  _Toc47427783{DyK  _Toc47427783{DyK  _Toc47427784{DyK  _Toc47427784{DyK  _Toc47427785{DyK  _Toc47427785{DyK  _Toc47427786{DyK  _Toc47427786{DyK  _Toc47427787{DyK  _Toc47427787{DyK  _Toc47427788{DyK  _Toc47427788{DyK  _Toc47427789{DyK  _Toc47427789{DyK  _Toc47427790{DyK  _Toc47427790{DyK  _Toc47427791{DyK  _Toc47427791{DyK  _Toc47427792{DyK  _Toc47427792{DyK  _Toc47427793{DyK  _Toc47427793{DyK  _Toc47427794{DyK  _Toc47427794{DyK  _Toc47427795{DyK  _Toc47427795{DyK  _Toc47427796{DyK  _Toc47427796{DyK  _Toc47427797{DyK  _Toc47427797{DyK  _Toc47427798{DyK  _Toc47427798{DyK  _Toc47427799{DyK  _Toc47427799{DyK  _Toc47427800{DyK  _Toc47427800{DyK  _Toc47427801{DyK  _Toc47427801{DyK  _Toc47427802{DyK  _Toc47427802{DyK  _Toc47427803{DyK  _Toc47427803{DyK  _Toc47427804{DyK  _Toc47427804{DyK  _Toc47427805{DyK  _Toc47427805{DyK  _Toc47427806{DyK  _Toc47427806{DyK  _Toc47427807{DyK  _Toc47427807{DyK  _Toc47427808{DyK  _Toc47427808{DyK  _Toc47427809{DyK  _Toc47427809{DyK  _Toc47427810{DyK  _Toc47427810{DyK  _Toc47427811{DyK  _Toc47427811{DyK  _Toc47427812{DyK  _Toc47427812{DyK  _Toc47427813{DyK  _Toc47427813{DyK  _Toc47427814{DyK  _Toc47427814{DyK  _Toc47427815{DyK  _Toc47427815{DyK  _Toc47427816{DyK  _Toc47427816{DyK  _Toc47427817{DyK  _Toc47427817{DyK  _Toc47427818{DyK  _Toc47427818{DyK  _Toc47427819{DyK  _Toc47427819{DyK  _Toc47427820{DyK  _Toc47427820{DyK  _Toc47427821{DyK  _Toc47427821{DyK  _Toc47427822{DyK  _Toc47427822{DyK  _Toc47427823{DyK  _Toc47427823{DyK  _Toc47427824{DyK  _Toc47427824{DyK  _Toc47427825{DyK  _Toc47427825{DyK  _Toc47427826{DyK  _Toc47427826{DyK  _Toc47427827{DyK  _Toc47427827$$If!vh5x3#vx3:V l4  t 05x3/ p $$If!vh5m 55|#vm #v#v|:V l4 ``` t05m 55|/ p$$If!vh55555p5 #v#v#v#v#vp#v :V l4 t<ffffff055555p5 / p<ffffffkdި$$Ifl4ֈ- $- 3p  t<ffffff044 lap<ffffff$$If!vh5x3#vx3:V l  t ̙05x3/ p ̙$$If!vh555 *#v#v#v *:V l4 t0555 */ f4$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh5x3#vx3:V l  t ̙05x3/ p ̙$$If!vh555 *#v#v#v *:V l t0555 */ $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh555 *#v#v#v *:V l t0555 */ $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh555 *#v#v#v *:V l t0555 */ $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh5x3#vx3:V l  t ̙05x3/ p ̙$$If!vh555 *#v#v#v *:V l t0555 */ $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh555 *#v#v#v *:V l t0555 */ $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh5x3#vx3:V l  t ̙05x3/ p ̙$$If!vh555 *#v#v#v *:V l t0555 */ $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh555 *#v#v#v *:V l t0555 */ $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh555 *#v#v#v *:V l t0555 */ $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh5x3#vx3:V l  t ̙05x3p ̙$$If!vh555 *#v#v#v *:V l4 t0555 *f4$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l4 t0555 *f4$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l4 t0555 *f4$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh5x3#vx3:V l4  t ̙05x3f4p ̙$$If!vh555 *#v#v#v *:V l t0555 *$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l t0555 *$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l t0555 *$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l t0555 *$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l t0555 *$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l t0555 *$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l t0555 *$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh5x3#vx3:V l4  t ̙05x3f4p ̙$$If!vh555 *#v#v#v *:V l4 t0555 *f4$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l4 t0555 *f4$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l4 t0555 *f4$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l4 t0555 *f4$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l4 t0555 *f4$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l4 t0555 *f4$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l4 t0555 *f4$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l4 t0555 *f4$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh5x3#vx3:V l4  t ̙05x3f4p ̙$$If!vh555 *#v#v#v *:V l4 t0555 *f4$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l4 t0555 *f4$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l4 t0555 *f4$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l4 t0555 *f4$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l4 t0555 *f4$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh5x3#vx3:V l  t ̙05x3p ̙$$If!vh555 *#v#v#v *:V l t0555 *$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 / $$If!vh5x3#vx3:V l  t ̙05x3p ̙$$If!vh555 *#v#v#v *:V l t0555 *$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l t0555 *$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh555 *#v#v#v *:V l t0555 *$$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 $$If!vh55555p5 #v#v#v#v#vp#v :V l t055555p5 -@@@ NormalCJ_HaJmH sH tH Z@Z Heading 1$<@&5CJ KH OJQJ\^JaJ P@P Heading 2$<@&56CJ\]aJJ@J Heading 3$<@&5CJ\aJV@V Heading 4$<@&5CJOJQJ\^JaJN@N Heading 5 <@&56CJ\]aJT@T Heading 6 <@&5CJOJQJ\^JaJF@F Heading 7 <@& OJQJ^JL@L Heading 8 <@&6OJQJ]^JB @B Heading 9 <@&CJaJDA@D Default Paragraph FontVi@V  Table Normal :V 44 la (k@(No List hOh Style8$ da$#CJKHOJQJ\^JaJmH sH .. TOC 4 ^.. TOC 5 ^.. TOC 6 ^2B@22 Body Textx.. TOC 7 ^bOQb Heading 1 Char.5CJ KH OJQJ\^J_HaJ mH sH tH .@. TOC 2 ^.@. TOC 3 ^6U@6 Hyperlink >*B*phXOX Heading 2 Char$56CJ\]_HaJmH sH tH 6@6 TOC 1  & FOJQJ4@4 Header  !4 @4 Footer  !.)@. Page NumberR>@R Title$<@&a$5CJ KHOJQJ\aJ .. TOC 8 ^.. TOC 9 ^FV@F FollowedHyperlink >*B* ph: : Index 1"^`: : Index 2#^`: : Index 3$^`: : Index 4%^`:: Index 5&^`:: Index 6'^`:: Index 7(^`:: Index 8)^`:: Index 9*p^p`6!"6  Index Heading+&O& quoted19"#23DENOPn/SwG E  e  P x+ i)KNt%u<k8K!'@36R !!!C""#d##4$$$M%%%P&&'S''(i((&){))7***L++,l,,/---<...W//0d001t11222Y334q44!5y55.666,777G889y99U::;;;Y<<,==>s>>A?? @@@aAA.BBBKCCDcDeDvDwDDD E EE8E@EAEKETE\EkEuEEEEEEEEEEEEFFFFFFGGGHHHHHHHHHHHHIIIIIIIIJJJJJJJ_K`KaKbKhKnKK\L]L^L_LeLkLLLMMMMMMMNNNNNNNOOOOOOPP PP@PPQQQQ Q Q QQQQQQQQrRsRtRuRyR}RRRRRRSTTTTTTTTU UUU)UUVVVVV!Vw?wEwKwawwxxxxxCxkylymynytyzyy z z z z zzzz{{{ { {{0{1{7{={O{|G|H|I|J|P|V|h||}}}}}}A}B}H}N}q}}.~/~0~1~2~3~4~~~~~~~~FlmnoswA}~ ƂAGHIJNReflrÆɆvwxyWXYZ`f:;<=>DJkފߊG‹ËċŋƋNjȋɋABCDJPm 4WXYZ[\]!"#$*0MĐFGHIJKLMݑޑߑ̒͒ΒϒВђҒX͔ΔϔДєҔӔabcdstx|ȕ !"#$%&45;AS #֚ךݚYZ[\bhC͜ΜԜڜi˝#)75 01239?aȡɡʡˡѡסǢ}~01239?\()/5Wڦ0123456§çħʧЧ}9:;<=>?ԩթ֩שݩЫ3456<BT  42345;A\ 9:@FT 1JKLMSYo2dzͳ޳z{|}0123456̶Ͷζ϶$+\2{|}~^_`agn@սֽ׽ؽ޽þʾ[ʿ˿̿Ϳӿڿ"$+D89:;AHWjklmqvdefgmtz{|}GHIJNSPQRSY`stuv|+4 @AGNuT,-./5<e-./06=d(XYZ[\]^yz{|z  !"#$ 0MNOPW^>$"'[\cj$+I*+,-27ST[bx+,-.5<]x#$67:0000000000000000000 0000 00000000000000 00E 0E 0E 0E 0E  00 0 0 0 0 0 0 0 0 0 0 0 0  00000000000000000 00000000000000000000000000000000 00#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0#0# 00202020202020202020202020202020202020202020202 00;0;0;0;0;0; 0 0>0>0>0>0>0>0>0>0>0>0>0>0>0> 0 0D0D0D0D0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D0D0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0D 0000000p0p0 0p 00p00p00@0@0@0My00C@0@0@0My000p#CRRRU c.vfGS !i"_#$$%%&T'0()**+,k-..//0x1U2*3 4456u7B899:;n<?= >>?@vAsBUCRD,E2FFGHIJKcLZrM9vy{|}~Un x +/5,?J MkMMNOPPQRRbS^TTUVWWYYYuZ\\]^<^___&`a\bbd!e,e8fsf)gggYh i,jSjhjbkkllmFmUmnnooo+p0p qqq rryssst+u0uuvv9wwwIyyyzzz{{{|}}}~~~?kz 0Iӄ0ÆȆlw GRxY:DœAP Z#IݙϚ͜Ҝd" [C˥2ȩש3(05į;Ա3B4 L2z3ξ}`@"AjvfzJRu+ @T//Z"P2-89wz      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~8x  )Nikln*,-/Ne 2MPQSr<q   .Vqtuw&ADEGf    7 g $ ? B C E d   / D _ b c e     ; _ z } ~  / J M N P o ;Wruvx %()+Jw  *Hcfgi#&')Ha|*EHIKjw-HKLNm   .Snqrt"#%DTorsu=a| 69:<[Jehik2568Ws*EHIKj!@`{~!$%'Fm:=>@_t-013Rf0346U} 1 L O P R q !!!!9!f!!!!!!!!!!!"""="@"A"C"b""""""""####'#C#^#a#b#d########$.$1$2$4$S$}$$$$$$$$$$$%,%G%J%K%M%l%%%%%%%%%%%%&/&J&M&N&P&o&&&&&&&&&'''$'2'M'P'Q'S'r''''''''((((%(H(c(f(g(i(((((((() )#)$)&)E)Z)u)x)y){))))))))*1*4*5*7*V*t*********** +++F+I+J+L+k++++++++ , ,,,/,K,f,i,j,l,,,,,,,,-)-,---/-N-g-----------..6.9.:.<.[.z.........../6/Q/T/U/W/v////////000040C0^0a0b0d000000000 111111S1n1q1r1t111111111 222222d22222222222383S3V3W3Y3x33333333 444404P4k4n4o4q444444445555!5@5X5s5v5w5y55555556 6(6+6,6.6M6a6|66666666666 7&7)7*7,7K7e777777777778&8A8D8E8G8f888888889999=9X9s9v9w9y9999999:4:O:R:S:U:t::::::::;;;;6;e;;;;;;;;;;;<8<S<V<W<Y<x<<<<<<< =&=)=*=,=K=s=======>>>>3>R>m>p>q>s>>>>>>>> ?;?>???A?`????????@ @ @ @,@a@|@@@@@@@@@@A@A[A^A_AaAAAAAAAA B(B+B,B.BMBnBBBBBBBBBBB C*CECHCICKCjCCCCCCCCCDDD#DBD]D`DaDcD9XT tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%tX%t̕FMOU!8@0(  B S  ? _Hlt47428167 _Hlt47428177 _Toc47427654 _Toc47427655 _Toc47427656 _Toc47427657 _Toc47427658 _Toc47427659 _Toc47427660 _Toc47427661 _Toc47427662 _Toc47427663 _Toc47427664 _Toc47427665 _Toc47427666 _Toc47427667 _Toc47427668 _Toc47427669 _Toc47427670 _Toc47427671 _Toc47427672 _Toc47427673 _Toc47427674 _Toc47427675 _Toc47427676 _Toc47427677 _Toc47427678 _Toc47427679 _Toc47427680 _Toc47427681 _Toc47427682 _Toc47427683 _Toc47427684 _Toc47427685 _Toc47427686 _Toc47427687 _Toc47427688 _Toc47427689 _Toc47427690 _Toc47427691 _Toc47427692 _Toc33854056 _Toc34125061 _Toc47427693 _Toc33854057 _Toc34125062 _Toc47427694 _Toc34125063 _Hlt34143889 _Toc47427695 _Toc34125064 _Toc47427696 _Hlt34143903 _Toc34125065 _Toc47427697 _Toc34125066 _Toc47427698 _Toc34125067 _Toc47427699 _Toc34125068 _Toc47427700 _Toc34125069 _Toc47427701 _Toc34125070 _Toc47427702 _Toc34125071 _Toc47427703 _Toc34125072 _Toc47427704 _Toc34125073 _Hlt34144019 _Hlt34144021 _Toc47427705 _Toc34125074 _Toc47427706 _Toc34125075 _Hlt34143893 _Toc47427707 _Toc34125076 _Hlt34143896 _Toc47427708 _Toc47427709 _Toc47427710 _Toc47427711 _Toc47427712 _Toc47427713 _Toc47427714 _Toc47427715 _Toc47427716 _Toc47427717 _Toc47427718 _Toc47427719 _Toc47427720 _Toc47427721 _Toc47427722 _Toc47427723 _Toc47427724 _Toc47427725 _Toc47427726 _Toc47427727 _Toc47427728 _Toc47427729 _Toc47427730 _Toc47427731 _Toc47427732 _Toc47427733 _Toc47427734 _Toc47427735 _Toc47427736 _Toc47427737 _Toc47427738 _Toc47427739 _Toc47427740 _Toc47427741 _Toc47427742 _Toc47427743 _Toc47427744 _Toc47427745 _Toc47427746 _Toc47427747 _Toc47427748 _Toc47427749 _Toc47427750 _Toc47427751 _Toc47427752 _Toc47427753 _Toc47427754 _Toc47427755 _Toc47427756 _Toc47427757 _Toc47427758 _Toc47427759 _Toc47427760 _Toc47427761 _Toc47427762 _Toc47427763 _Toc47427764 _Toc47427765 _Toc47427766 _Toc47427767 _Toc47427768 _Toc47427769 _Toc47427770 _Toc47427771 _Toc47427772 _Toc47427773 _Toc47427774 _Toc47427775 _Toc47427776 _Toc47427777 _Toc47427778 _Toc47427779 _Toc47427780 _Toc47427781 _Toc47427782 _Toc47427783 _Toc47427784 _Toc47427785 _Toc47427786 _Toc47427787 _Toc47427788 _Toc47427789 _Toc47427790 _Toc47427791 _Toc47427792 _Toc47427793 _Toc47427794 _Toc47427795 _Toc47427796 _Toc47427797 _Toc47427798 _Toc47427799 _Toc47427800 _Toc47427801 _Toc47427802 _Toc47427803 _Toc47427804 _Toc47427805 _Toc47427806 _Toc47427807 _Toc47427808 _Toc47427809 _Toc47427810 _Toc47427811 _Toc47427812 _Toc47427813 _Toc47427814 _Toc47427815 _Toc47427816 _Toc47427817 _Toc47427818 _Toc47427819 _Toc47427820 _Toc47427821 _Toc47427822 _Toc47427823 _Toc47427824 _Toc47427825 _Toc47427826 _Toc47427827 &EEEGHHHIJnKkLMNOPQ}RRTTU!VIVWWW3XYZ!\,]G]A^^6__e`a/b\b\b\bubububocococdddUeUeffgg/g/g j jjjkkmmEoEoEoEooopppVqVqVqrrrsuKwxzy{={V|}N}wRrɆfJP0Đd|A hڜ) ?ס?5ЧBAFYͳ϶+nʾڿ+HvtS`N<=| ^'j+7b<:@@  !"#$%&'()*+,-.0/@1342@56789:;<=>?@ABCDGE@F@HIJLK@MON@PQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~ 'EEEGHHIIJKLMNP?PQRRTU(U;VbV6WW%X]XY[C\9]r]r^^S_ `|`,aRbgbgbgbbbbocccd)d)dlele3f3f!g!gJgJgjjjjllnnEoEokokooop$p$pVqiqiqrrss3u`wBxy/{N{g|@}p}łdj Fl3LrǕ3R"՚̜64`Ƣ['V٦ϫS 3[8S0nݳ[ 1CV~ ?tdc/#ZHRw\:::8*urn:schemas-microsoft-com:office:smarttagsCity9*urn:schemas-microsoft-com:office:smarttagsplace X%X7:EHDDbbccii29.Ceˣ07:33333333333333 EE8EEFGHIIIJJbKnK_LLMMNNOOPPQQuRRT)UVcVW7WWW'X3XYYZ[\!\$]G]9^A^t^^*_T__ `Y`}` a-a/bbccccdIemeffgKgijjjklmm9oEoopJqjqrsss u4u?wawxxnyy {O{J|h|}q}oƂJɆyZ>kDP 4$MĐd|ȕS#\ڜ73aˡǢA\Wڦ?ש6T 45\:T1Mo޳}϶+2~aؽʾͿD;Wmgt}JS`vAu/<0d| 0P^$'\I-x.<$+7:7:VALVALVALVALVALVALVALVALVAL ~(p  #?Q2kN ,CeY ]7Zk 59n8}vNctlp8^`o(.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.hh^h`B*OJQJo(phhH ^`hH) 88^8`hH) ^`hH() ^`hH() pp^p`hH()   ^ `hH. @ @ ^@ `hH.   ^ `hH.P^`P@@^@`.0^`0..``^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........hh^h`.P^`P..^`...x^`x....  ^` .....  X@ ^ `X ......  ^ `....... 8x^`8........ `H^``.........hh^h`.P^`P..^`...x^`x....  ^` .....  X@ ^ `X ......  ^ `....... 8x^`8........ `H^``.........hh^h`B*OJQJo(phhH ^`hH) 88^8`hH) ^`hH() ^`hH() pp^p`hH()   ^ `hH. @ @ ^@ `hH.   ^ `hH.hh^h`B* OJQJo(phhH^`B* OJQJo(phhH 88^8`hH) ^`hH() ^`hH() pp^p`hH()   ^ `hH. @ @ ^@ `hH.   ^ `hH.^`o(. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH. P^`Po(hH @@^@`o(hH 0^`0o(hH ``^``o(hH... ^`o(hH .... ^`o(hH ..... ^`o(hH ......  `^``o(hH.......  00^0`o(hH........CeYp ]7Zk]7Zk]7Zk]7Zkct?Qctctctct#2kN59n~                   e!2D E EE8E@EAEKETE\EkEuEEEEEEEEEEEEFFFFFGGHHHHHHHHHHHHIIIIIIIIJJJJJJJ_K`KaKbKhKnKK\L]L^L_LeLkLLMMMMMMMNNNNNNNOOOOOOPP PP@PQQQQ Q Q QQQQQQQQrRsRtRuRyR}RRRRRRTTTTTTTTU UUU)UVVVVV!Vw?wEwKwawwxxxxxCxkylymynytyzyy z z z z zzz{{{ { {{0{1{7{={O{G|H|I|J|P|V|h|}}}}}}A}B}H}N}q}.~/~0~1~2~3~4~~~~~~~~lmnosw}~ ƂGHIJNReflrÆɆvwxyWXYZ`f;<=>DJkފߊGËċŋƋNjȋɋABCDJPm 4WXYZ[\]!"#$*0MĐGHIJKLMݑޑߑ̒͒ΒϒВђҒ͔ΔϔДєҔӔabcdstx|ȕ !"#$%&45;AS #֚ךݚYZ[\bh͜ΜԜڜ#)75 01239?aȡɡʡˡѡסǢ}~01239?\()/5Wڦ0123456§çħʧЧ9:;<=>?ԩթ֩שݩЫ3456<BT  42345;A\ 9:@FT 1JKLMSYodzͳ޳z{|}0123456̶Ͷζ϶$+\2{|}~^_`agnսֽ׽ؽ޽þʾʿ˿̿Ϳӿڿ$+D89:;AHWjklmqvdefgmtz{|}GHIJNSPQRSY`stuv| @AGNu,-./5<e-./06=dXYZ[\]^yz{|  !"#$ 0MNOPW^$"'[\cj$+I*+,-27ST[bx+,-.5<]:@uDuDDauDuD9P@UnknownGz Times New Roman5Symbol3& z Arial;Wingdings"qhp2uFwfk _Toc47427799>e _Toc47427798>_ _Toc47427797>Y _Toc47427796>S _Toc47427795>M _Toc47427794>G _Toc47427793>A _Toc47427792>; _Toc47427791>5 _Toc47427790?/ _Toc47427789?) _Toc47427788?# _Toc47427787? _Toc47427786? _Toc47427785? _Toc47427784?  _Toc47427783? _Toc47427782? _Toc47427781? _Toc474277800 _Toc474277790 _Toc474277780 _Toc474277770 _Toc474277760 _Toc474277750 _Toc474277740 _Toc474277730 _Toc474277720 _Toc474277710 _Toc474277701 _Toc474277691 _Toc474277681 _Toc474277671 _Toc474277661 _Toc474277651 _Toc474277641 _Toc474277631 _Toc474277621 _Toc474277611 _Toc474277602{ _Toc474277592u _Toc474277582o _Toc474277572i _Toc474277562c _Toc474277552] _Toc474277542W _Toc474277532Q _Toc474277522K _Toc474277512E _Toc474277503? _Toc4742774939 _Toc4742774833 _Toc474277473- _Toc474277463' _Toc474277453! _Toc474277443 _Toc474277433 _Toc474277423 _Toc474277413  _Toc474277404 _Toc474277394 _Toc474277384 _Toc474277374 _Toc474277364 _Toc474277354 _Toc474277344 _Toc474277334 _Toc474277324 _Toc474277314 _Toc474277305 _Toc474277295 _Toc474277285 _Toc474277275 _Toc474277265 _Toc474277255 _Toc474277245 _Toc474277235 _Toc474277225 _Toc474277215 _Toc474277206 _Toc474277196 _Toc474277186 _Toc474277176y _Toc474277166s _Toc474277156m _Toc474277146g _Toc474277136a _Toc474277126[ _Toc474277116U _Toc474277107O _Toc474277097I _Toc474277087C _Toc474277077= _Toc4742770677 _Toc4742770571 _Toc474277047+ _Toc474277037% _Toc474277027 _Toc474277017 _Toc47427700> _Toc47427699>  _Toc47427698> _Toc47427697> _Toc47427696> _Toc47427695> _Toc47427694> _Toc47427693> _Toc47427692> _Toc47427691> _Toc47427690? _Toc47427689? _Toc47427688? _Toc47427687? _Toc47427686? _Toc47427685? _Toc47427684? _Toc47427683? _Toc47427682? _Toc47427681? _Toc474276800 _Toc474276790 _Toc474276780 _Toc474276770 _Toc474276760 _Toc474276750} _Toc474276740w _Toc474276730q _Toc474276720k _Toc474276710e _Toc474276701_ _Toc474276691Y _Toc474276681S _Toc474276671M _Toc474276661G _Toc474276651A _Toc474276641; _Toc4742766315 _Toc474276621/ _Toc474276611) _Toc474276602# _Toc474276592 _Toc474276582 _Toc474276572 _Toc474276562  _Toc474276552 _Toc47427654 http://by9fd.bay9.hotmail.msn.com/cgi-bin/compose?mailto=1&msg=MSG1059574389.34&start=1230298&len=8023&src=&type=x&to=customerservices%40bsi%2dglobal%2ecom&cc=&bcc=&subject=&body=&curmbox=F000000001&a=545b046342a524add22c08ff88064aa5  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNPQRSTUVXYZ[\]^_`abcdefghijklmnopqrst}Root Entry FPX]&WData [j1TablesWordDocument7SummaryInformation(ODocumentSummaryInformation8WH:CompObjj  FMicrosoft Word Document MSWordDocWord.Document.89q