ࡱ>  bjbj 7rr3F, , "8 \$MxLpFF;K=K=K=K=K=K=K$O`RaK}aKFFHL"""FF;K";K""DDGF4\ E&'KL0$ME$S!$SLGGv$S_H"aKaK"$M$S, L: The Ohio Department of Public Safety (ODPS) recommends that any online provider adhere to the National Institute of Standards and Technology (NIST) information security standards, and the SANS Institutes 20 Critical Security Controls. However, ODPS minimum technical requirements for online driver education providers are listed below. ODPS requests that online providers provide detailed explanations regarding how the providers are meeting each of the outlined requirements. Please be aware that incomplete or insufficient responses may result in a follow-up discussion with an ODPS IT Security Consultant in order to clarify security assessment responses, if necessary. For the purpose of this assessment, the definition of personal information is aligned with Ohio Revised Code (R.C) 4501:1-20-02 Drivers privacy protection (A)(1). "Personal information" means information contained in a motor vehicle record that identifies an individual person, including but not limited to, the person's photograph, digital image, digitalized photograph, social security number, driver or driver's license identification number, name, date of birth, telephone number, medical or disability information, or a person's address other than the county and five-digit zip code. "Personal information" does not include information pertaining to a vehicular accident, driving or traffic violation, or driver's status, or a name that is provided by the requester. Please enter the URL of the login page for your Online Driver Education program here:  FORMTEXT        HARDWARE, SOFTWARE, AND INTERNET CONNECTION SPEED List the hardware, including the make, model and operating system version and software with version information that will be used by the provider to administer the online driver training. Make sure to include all web, database, file, and application servers that store and / or transmit training application data. Additionally, please specify the Internet connection speed that will be used by the provider to administer the online training.  FORMTEXT        RISK MANAGEMENT, BUSINESS CONTINUITY, AND DISASTER RECOVERY Online providers shall have in place Risk Management, Business Continuity, and Disaster Recovery plans. Describe those plans utilized by the provider. Please include relevant information regarding offsite storage and processing facilities, facilities used in the event that a disaster damages or destroys your primary data processing facility.  FORMTEXT        SECURE CONFIGURATIONS FOR HARDWARE AND SOFTWARE ON MOBILE DEVICES, LAPTOPS, WORKSTATIONS, AND SERVERS Providers shall apply standard secure configurations for the operating system as recommended by the operating system provider before releasing those systems to production. Providers shall apply security patches to the operating system, installed software packages (Adobe, Java, etc.), databases, and web servers. Explain how the provider currently meets these requirements. FORMTEXT        MALWARE DEFENSES Providers shall employ automated anti-malware and anti-virus software on all workstations, servers, and mobile devices to ensure the most up-to-date version(s) is used. Systems must block installation, prevent installation, or quarantine malicious software within one hour, alerting or sending an e-mail when this action has occurred. For the purposes of this control, mobile devices do not include smartphones. However, providers are strongly encouraged to evaluate the need for anti-malware technologies for smartphones and other handheld devices to the extent that they are in use within the scope of the enterprise. Explain how the provider currently meets these requirements. FORMTEXT        APPLICATION SOFTWARE SECURITY Providers shall utilize a web application security controls (web application vulnerability scans, web application firewalls, etc.) to protect against unauthorized access and attacks. Security monitoring systems shall scan all Internet-accessible web applications on a regular basis and shall, at a minimum, generate an alert or send an e-mail to the enterprise administrative personnel within 24 hours of a detected attack. Should a scan fail to be successfully completed, the security system must alert or e-mail the administrative personnel within one hour indicating the scan was unsuccessful. All Internet-accessible web applications identified shall be fixed (or a compensating control implemented) within 15 days of the discovery. Specify the specific firewall used and response to alerts that comply with these requirements. FORMTEXT        WIRELESS DEVICE CONTROL If the provider uses wireless technology within their office network, they must secure the wireless connections with at least standard management tools that, at a minimum, run commercial wireless scanning, detection, discovery tools, and wireless intrusion detection systems. The system must be capable of identifying unauthorized wireless devices or configurations when they are within range of the providers systems or connected to their networks. The system must be capable of identifying any new unauthorized wireless devices that associate or join the network within one hour, alerting or sending e-mail notification to a list of enterprise personnel. The system must automatically isolate an attached wireless access point from the network within one hour and alert or send e-mail notification when isolation is achieved. The system must be capable of identifying the location, department, and other details of where authorized and unauthorized wireless devices are connected to the network. In lieu of an automated wireless intrusion detection system, a documented manual process may be considered an acceptable alternative. Explain how the provider currently meets these requirements. FORMTEXT        DATA RECOVERY CAPABILITY At a minimum, critical application data shall be backed up daily. At a minimum, providers shall perform a monthly integrity test to ensure data can be successfully restored from backups. If backup data is stored on media (i.e. hard drives and tapes, etc.), that media shall be secured in a locked facility, preferably off-site. Explain the backup strategy and the security measures for the backup data used by the provider to meet these requirements. FORMTEXT        SECURE CONFIGURATIONS FOR NETWORK DEVICES SUCH AS FIREWALLS, ROUTERS AND SWITCHES Providers must have documented standard secure configurations for all network devices deployed within the business. To ensure that system or application software is kept current, any unused or unnecessary software shall be uninstalled and removed from the providers system within 24 hours of its discovery. The system must be capable of identifying any changes, including modifications to key files, services, ports, configuration files, or any software installed on the device. Modifications include deletions, changes, or additions of new software to any part of the device configuration. The configuration must be checked against the master image database to verify any changes to secure configurations that would impact security. This includes both the operating system and configuration files. Any of these changes to a device or operating system must be detected within 24 hours and notification sent to a list of enterprise personnel. The system must send notification about the status of the system until the change(s) have been investigated and remedied. Explain how the provider currently meets these requirements. FORMTEXT        CONTROLLED USE OF ADMINISTRATIVE PRIVILEGES Providers must have controls around administrative privileges within the provider s systems that, at a minimum, provide for the following: Complex passwords (letters, numbers, special characters); Scheduled change of passwords for each user at an interval of no longer than six months; Documented procedures for requesting, granting, removing, and reviewing administrative account privileges; Utilization of access control of accounts to ensure administrative accounts are used for administrative purposes only. Security personnel must be notified via an alert or e-mail within 24 hours of the addition of an account with administrative privileges. Every 24 hours after that point, the system must alert or send e-mail about the status of the administrative privileges until the unauthorized change has been corrected or authorized through a change management process. Explain the tracking and limitations the provider currently uses to meet these requirements. FORMTEXT        MAINTENANCE, MONITORING, AND ANALYSIS OF AUDIT LOGS The system must be capable of logging all events across the network. The logging must be validated across both network-based and host-based systems. Any logged event must generate a log entry that includes the date, timestamp, source address, destination address, and other details about the packet. Any activity performed on the network must be logged immediately to all devices along the critical path. When a device detects that it is not capable of generating logs (due to a server crash or other issue), it shall generate an alert or e-mail notification for enterprise administrative personnel within 24 hours. Providers shall store audit logs for the user activity for three (3) years from the date of completion of the activity and review them annually for discrepancies. Providers shall conduct recurring comprehensive security audits that, at a minimum, include running reports to identify anomalies and documenting findings and steps taken to mitigate any identified deficiencies. Explain how the provider currently meets these requirements. FORMTEXT        ACCOUNT MONITORING AND CONTROL Providers must have controls to monitor and control systems and user accounts. The system must be capable of tracking and disabling accounts. System users shall be logged off after a standard period of inactivity. At a minimum, external (student) and internal (employee) users shall be logged off after thirty (30) minutes of inactivity. At a minimum, all user accounts shall be disabled after a period of sixty (60) days of inactivity. Explain the controls used by the provider for these requirements. FORMTEXT        DATA PROTECTION Providers shall handle, store, and process confidential personal information (CPI) or other information that is required to be protected by law, regulation, or executive order, in an encrypted format. Providers shall monitor fouT        J K 񲢲q_M_M_M#h h B5CJOJQJ^JaJ#h hR-5CJOJQJ^JaJ h hR-CJOJQJ^JaJ h h BCJOJQJ^JaJh h BCJOJQJ^Jh hDU>*CJOJQJ^Jh hDUCJOJQJ^Jh> CJOJQJ^J)jh hd0J$CJOJQJU^Jh hdCJOJQJ^Jh h$DCJOJQJ^JT U  M N 8:d$Ifgd{E|l &d P gd$D ^gd Bgd$DK L M N &(*46:<>ʺʠzbGz@ h{E|hI4jh{E|hICJOJQJU^JaJmHnHu/jh{E|hICJOJQJU^JaJ h{E|hICJOJQJ^JaJ)jh{E|hICJOJQJU^JaJh hOJQJ^Jh hdOJQJ^Jh h B6CJOJQJ^Jh h BOJQJ^J h h BCJOJQJ^JaJ-jh h B0J$CJOJQJU^JaJ:<>@Bvi\NE^gdTC hd^hgdR  & Fdgd: $da$gd~5 dgddgd$Dxkdt$$IflO&$  t 044 lap yt{E|>B:Tdefg ʶwlWF h{E|hICJOJQJ^JaJ)jh{E|hICJOJQJU^JaJh h'6CJaJh hCJaJh h@CJaJh> CJaJh hvCJaJh h,aCJaJh hQkDCJaJ&h hR5:CJOJQJ^JaJ h5:CJOJQJ^JaJ&h hy5:CJOJQJ^JaJ h h~5CJOJQJ^JaJ>@cYQH^gdr & Fgdr dgd,axkd$$Ifl8&$  t 044 lap yt{E|d$Ifgd{E|l $^a$gd$D  @ZҷҦwcOD9.9.D.h hGOCJaJh h4CJaJh hQkDCJaJ&hrhGO5:CJOJQJ^JaJ&hyhy5:CJOJQJ^JaJ&hrh B5:CJOJQJ^JaJ&h hGO5:CJOJQJ^JaJ h{E|hI h{E|hICJOJQJ^JaJ4jh{E|hICJOJQJU^JaJmHnHu)jh{E|hICJOJQJU^JaJ/jh{E|hICJOJQJU^JaJ<>@BVXZdfjlnʹʆʹkWC/&h hR5:CJOJQJ^JaJ&hyh2 5:CJOJQJ^JaJ&hyhy5:CJOJQJ^JaJ&hyhG5:CJOJQJ^JaJ h{E|hI4jh{E|hICJOJQJU^JaJmHnHu/jh{E|hICJOJQJU^JaJ h{E|hICJOJQJ^JaJ)jh{E|hICJOJQJU^JaJh hQkDCJaJh h'6CJaJh hGCJaJ@hjlnWXom`RII^gdr hd^hgdR  & Fdgd$Dxkd$$Ifl8&$  t 044 lap yt{E|d$Ifgd{E|l '(.3<=DSkFJQUVWXYZɾԳԳ곢~l~eP)jh{E|hICJOJQJU^JaJ h{E|hV$#h{E|hd6CJOJQJ^JaJ#h{E|hV$6CJOJQJ^JaJ#h{E|hi6CJOJQJ^JaJ h h:CJOJQJ^JaJh hCJaJh h()CJaJh hYCJaJh hGCJaJh hiCJaJh h"CJaJh h:CJaJXYlTTd$Ifgd{E|l mkd*$$Ifl$t" t044 lap yt{E|d$If^gd{E|l dgdb/  8:<NP§{gS?4)h h&uCJaJh h:CJaJ&hRhR5:CJOJQJ^JaJ&hyh2 5:CJOJQJ^JaJ&hyhy5:CJOJQJ^JaJ&h h5:CJOJQJ^JaJ h h~GCJOJQJ^JaJ h{E|hI4jh{E|hICJOJQJU^JaJmHnHu)jh{E|hICJOJQJU^JaJ/jh{E|hICJOJQJU^JaJ h{E|hICJOJQJ^JaJ:<mn}obXOOO^gdr dgdR  & Fdgd$D hd^hgd dgdb/xkd>$$Ifl8&$  t 044 lap yt{E|PRj~(Qlmnnwɾɾ꨾vdR#h{E|hV$6CJOJQJ^JaJ#h{E|hi6CJOJQJ^JaJ h hcCJOJQJ^JaJh hI}CJaJh hCJaJh hb/CJaJh h:CJaJh h6CJaJh hcCJaJh hGCJaJh h.yCJaJh hCJaJh hiCJaJh h'6CJaJlTTd$Ifgd{E|l mkd$$Ifl$t" t044 lap yt{E|d$If^gd{E|l dgdr  TVԿ{tcO;&hyh2 5:CJOJQJ^JaJ&hyhy5:CJOJQJ^JaJ hH35:CJOJQJ^JaJ h{E|hI4jh{E|hICJOJQJU^JaJmHnHu/jxh{E|hICJOJQJU^JaJ h{E|hICJOJQJ^JaJ)jh{E|hICJOJQJU^JaJ h{E|hV$#h{E|hV$6CJOJQJ^JaJ#h{E|hd6CJOJQJ^JaJVX  ywj\NA $da$gdGGH d^gdr hd^hgdR  & Fdgd$D hd^hgd,axkd$$Ifl8&$  t 044 lap yt{E|VXjlx^8?    b ʹʹʗuudR#h{E|hi6CJOJQJ^JaJ h hxzCJOJQJ^JaJ h hb!/CJOJQJ^JaJ h hxCJOJQJ^JaJ h hGCJOJQJ^JaJ h h&uCJOJQJ^JaJ h hiCJOJQJ^JaJ h h"CJOJQJ^JaJ h h:CJOJQJ^JaJ&h hR5:CJOJQJ^JaJb !!!! !۷rWP:+hyhI5:B*OJQJ^JaJph h{E|hI4jh{E|hICJOJQJU^JaJmHnHu/j&h{E|hICJOJQJU^JaJ h{E|hICJOJQJ^JaJ)jh{E|hICJOJQJU^JaJ h{E|hV$#h{E|hV$6CJOJQJ^JaJ#h{E|hd6CJOJQJ^JaJ#h{E|hi6CJOJQJ^JaJ#h{E|hx6CJOJQJ^JaJ !!v^^d$Ifgd{E|l mkd$$Ifl$t" t044 lap yt{E|d$If^gd{E|l !! !>!@!&&xjaU $^a$gd~?^gdR hd^hgdR  & FdgdRxkd$$Ifl8&$  t 044 lap yt{E| !:!!@!!!7"""%m%y%%&&&&n&ų|q|f[fI7#h{E|hV$6CJOJQJ^JaJ#h{E|hU6CJOJQJ^JaJh hcCJaJh h~?CJaJh hlCJaJh h:CJaJh h.yCJaJh hYCJaJh hCJaJh h%9PCJaJ#hH3hR5CJOJQJ^JaJ#hyh2 5CJOJQJ^JaJ,hyhyh%9P5:CJOJQJ^JaJ"hyhy5:CJOJQJ^Jn&&&&&&&&&&&&&&&Կ{tcO;&hyh2 5:CJOJQJ^JaJ&hyhy5:CJOJQJ^JaJ hyh:CJOJQJ^JaJ h{E|hI4jh{E|hICJOJQJU^JaJmHnHu/jh{E|hICJOJQJU^JaJ h{E|hICJOJQJ^JaJ)jh{E|hICJOJQJU^JaJ h{E|hV$#h{E|hV$6CJOJQJ^JaJ#h{E|hd6CJOJQJ^JaJ&&&&&v^^d$Ifgd{E|l mkd4$$Ifl$t" t044 lap yt{E|d$If^gd{E|l &&&&&((}pbYY^gdr hd^hgdR  & Fdgd$D dgdb/xkdH $$Ifl8&$  t 044 lap yt{E|&&'*'|'~'''''''7(9(B(H(K(}(~((((((((((().)ֵֵᵪֵ֔wewSw#h{E|h26CJOJQJ^JaJ#h{E|hV$6CJOJQJ^JaJ#h{E|hUZ6CJOJQJ^JaJh hcCJaJh hf%_CJaJh htCJaJh hQkDCJaJh h2CJaJh h.yCJaJh hUZCJaJh hCJaJh hlCJaJ&h hR5:CJOJQJ^JaJ.)@)B)C)D)N)O)* * *******Կ{tcO;0h h:CJaJ&hyh2 5:CJOJQJ^JaJ&hyhy5:CJOJQJ^JaJ hak5:CJOJQJ^JaJ h{E|hI4jh{E|hICJOJQJU^JaJmHnHu/j h{E|hICJOJQJU^JaJ h{E|hICJOJQJ^JaJ)jh{E|hICJOJQJU^JaJ h{E|hV$#h{E|hV$6CJOJQJ^JaJ#h{E|hd6CJOJQJ^JaJ(B)C)**v^^d$Ifgd{E|l mkd $$Ifl$t" t044 lap yt{E|d$If^gd{E|l *****,//}{sjj` dgdr^gdr & Fgd6H dgd$Dxkd $$Ifl8&$  t 044 lap yt{E|*****+++++,,6,;,?,q,,,,,,@...////ɾɾɾɾɠwlw[I#h{E|hUZ6CJOJQJ^JaJ h h"CJOJQJ^JaJh hCJaJh hJCJaJh h:CJaJh-CJaJh h2 CJaJh> CJaJh hZPCJaJh hQkDCJaJh hUZCJaJh h_CJaJh hI}CJaJh hlCJaJh h~GCJaJh h"CJaJ////////0 0 0000l0p083Կ{t`L8-h hDCJaJ&h hD5:CJOJQJ^JaJ&hyhR5:CJOJQJ^JaJ&hyhD5:CJOJQJ^JaJ h{E|hI4jh{E|hICJOJQJU^JaJmHnHu/j0 h{E|hICJOJQJU^JaJ h{E|hICJOJQJ^JaJ)jh{E|hICJOJQJU^JaJ h{E|hV$#h{E|hd6CJOJQJ^JaJ#h{E|hV$6CJOJQJ^JaJ///00v^^d$Ifgd{E|l mkd $$Ifl$t" t044 lap yt{E|d$If^gd{E|l 000l0p011V22yl^RGGG $ & F a$gdD $^a$gdD hd^hgdR  & FdgdD hd^hgdDxkd $$Ifl8&$  t 044 lap yt{E|283444566aIId$Ifgd{E|l mkd> $$Ifl$t" t044 lap yt{E|d$If^gd{E|l dgdD $ & F a$gdD834455 5 56 6 6666~6677@9}lXD9.9h h2-CJaJh h#{CJaJ&hhh2 5:CJOJQJ^JaJ&hhhR5:CJOJQJ^JaJ hr5:CJOJQJ^JaJ4jh{E|hDCJOJQJU^JaJmHnHu/j h{E|hDCJOJQJU^JaJ h{E|hDCJOJQJ^JaJ)jh{E|hDCJOJQJU^JaJ h{E|hD#h{E|hD6CJOJQJ^JaJ h hDCJOJQJ^JaJ666699N:";#;}tthh^ dgdb/  & F F^Fgdr^gdr & Fgd6HxkdR$$Ifl8&$  t 044 lap yt{E|@9F999999999 :0:8:9:L:N:f:o:p:::::";#;$;L;^;`;a;ɾɨɝɨɨɌzhVhO h{E|hV$#h{E|hd6CJOJQJ^JaJ#h{E|hV$6CJOJQJ^JaJ#h{E|hn6CJOJQJ^JaJ h h"CJOJQJ^JaJh hf1CJaJh hCJaJh hm!eCJaJh h!XCJaJh hnCJaJh h"CJaJh h:CJaJh h#{CJaJh hMZ!CJaJ#;`;a;<<v^^d$Ifgd{E|l mkd$$Ifl&$ t044 lap yt{E|d$If^gd{E|l a;b;l;m;< < <<<<<T<V<X<j<ٟwcO;0h h:CJaJ&h hR5:CJOJQJ^JaJ&hhh2 5:CJOJQJ^JaJ&hhhR5:CJOJQJ^JaJ&hhh6H5:CJOJQJ^JaJ&h hm!e5:CJOJQJ^JaJ h{E|h6H4jh{E|h6HCJOJQJU^JaJmHnHu/jh{E|h6HCJOJQJU^JaJ h{E|h6HCJOJQJ^JaJ)jh{E|h6HCJOJQJU^JaJ<<<V<X<>>>yl^N??$ & F ` a$gd6H$^`a$gd6H hd^hgdR  & Fdgd$D hd^hgdm!exkd$$Ifl8&$  t 044 lap yt{E|j<v<<<<<<==t===>>>%>C>c>i>>>>>>>>>>>>>>>>>ɶtߊtiW#h{E|hn6CJOJQJ^JaJh hb/CJaJh hjCJaJh hpCJaJh hgCJaJh h9&CJaJh hzCJaJh h$DCJaJh hMZ!CJaJh6HCJaJh hxzCJaJh hnCJaJh hECJaJh h:CJaJh hcCJaJ">>(?)?@@jRRd$Ifgd{E|l mkd$$Ifl$t" t044 lap yt{E|d$If^gd{E|l $h^ha$gdb/>>>>??&?'?(?)?*?4?5?@ @ @@@ɷۥ힉x`Ex> h{E|hI4jh{E|hICJOJQJU^JaJmHnHu/j:h{E|hICJOJQJU^JaJ h{E|hICJOJQJ^JaJ)jh{E|hICJOJQJU^JaJ h{E|hV$#h{E|hd6CJOJQJ^JaJ#h{E|h#d6CJOJQJ^JaJ#h{E|h'G6CJOJQJ^JaJ#h{E|hn6CJOJQJ^JaJ#h{E|hV$6CJOJQJ^JaJ@@@6@8@xjaW dgdb/^gd6H hd^hgdR  & Fdgd$Dxkd$$Ifl8&$  t 044 lap yt{E|@@4@6@8@J@L@X@r@t@v@~@@@@pArAzA|AAAAAAB/012dz|k|||`U|S|K|Kh> CJaJUh hAmCJaJh h#dCJaJ!jh h&=0J$CJUaJh h&=CJaJh hf1CJaJh hxzCJaJh hcCJaJh h:CJaJ&h hR5:CJOJQJ^JaJ&hhh2 5:CJOJQJ^JaJ&hhhR5:CJOJQJ^JaJ hr5:CJOJQJ^JaJr and alert unauthorized attempts to access and / or transmit CPI. The relevant security system(s) shall identify and alert the provider of unauthorized data extraction within one hour of the occurrence. Upon detection of unauthorized access or attempted access, the system shall notify the provider every twenty-four (24) hours until the source of the event is identified and the risk is mitigated. Explain how the provider currently meets these requirements. FORMTEXT        COMPLIANCE WITH SECURITY AND PRIVACY REGULATIONS Providers shall be reasonably aware of relevant security and privacy regulations. Specifically, providers shall comply with iNACOL Course Standards 2011, with Section A (Content), Item 11 (privacy policies) and Section D (Technology), Item 11 (confidentiality controls). A11 Privacy policies are clearly stated. A policy statement is posted on the course providers website and in the course and is easily found by the student. The policy discloses the organizations information gathering and dissemination practices. D11 Student information remains confidential, as required by the family Educational Rights and Privacy Act (fERPA). Defined course procedures for reporting grade and student information comply with the family Educational Rights and Privacy Act (fERPA). Providers shall also implement reasonable security measures to validate the identity of the student and the students parent prior to granting the student access to the training system. Explain how the provider currently meets these requirements. FORMTEXT        Certification Statement: I hereby certify I am the authorizing official of this online driver education program and the information contained herein is true and accurate. I have read, understand, am familiar with, and am responsible for knowing and understanding the security provisions governing online schools and online instruction as those provisions are set forth in Chapter 4508. of the R.C. and Chapter 4501-7 of the Administrative Code, which incorporates this security assessment. I further understand that a false statement on this document constitutes falsification under section 2921.13 of the R.C., which is a first degree misdemeanor, and may also result in the denial, suspension, or revocation of my online provider license. To all herein I so certify and attest with my signature below. SIGNATURE OF THE AUTHORIZING OFFICIAL XDATE OF SIGNATURE  FORMTEXT        STATE OF OHIOCOUNTY OFThe foregoing instrument was acknowledged before me thisday of,20, by.NAME OF PERSON ACKNOWLEDGEDXNOTARY PUBLICMy commission expires,20PRINTED NAME  Specifically, Special Publication 800-53, Rev 3:  HYPERLINK "http://csrc.nist.gov/publications/nistpubs/800-53-Rev3/sp800-53-rev3-final_updated-errata_05-01-2010.pdf" http://csrc.nist.gov/publications/nistpubs/800-53-Rev3/sp800-53-rev3-final_updated-errata_05-01-2010.pdf and Special Publication 800-30, Rev 1:  HYPERLINK "http://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf" 2b̜ 2?ABINgu̝ΝϝНڝ۝ñq`Hq/jh{E|h6HCJOJQJU^JaJ h{E|h6HCJOJQJ^JaJ)jh{E|h6HCJOJQJU^JaJ h{E|hV$#h{E|hd6CJOJQJ^JaJ#h{E|hV$6CJOJQJ^JaJ#h{E|h#d6CJOJQJ^JaJ h hcCJOJQJ^JaJh hcCJaJh h(CJaJh hWCJaJh h&=CJaJΝϝv^^d$Ifgd{E|l mkdH$$Ifl&$ t044 lap yt{E|d$If^gd{E|l  tvIJKLп{peZIAZ6+6h hpCJaJh h.yCJaJh CJaJ!jh hDU0J$CJUaJh hDUCJaJh hr0vCJaJh h&=CJaJ&hhhp5:CJOJQJ^JaJ&hhhR5:CJOJQJ^JaJ) *h{E|hh5:CJOJQJ^JaJ h{E|h6H h{E|h6HCJOJQJ^JaJ)jh{E|h6HCJOJQJU^JaJ4jh{E|h6HCJOJQJU^JaJmHnHuvKLFGFGzqqhhhqq^gd6H^gd6H & Fgd-gdhxkd\$$Ifl8&$  t 044 lap yt{E| LuGFG+=?@AKL ųt\At: h{E|h-4jh{E|h-CJOJQJU^JaJmHnHu/jh{E|h-CJOJQJU^JaJ h{E|h-CJOJQJ^JaJ)jh{E|h-CJOJQJU^JaJ h{E|hp#h{E|hd6CJOJQJ^JaJ#h{E|hp6CJOJQJ^JaJh hZCJaJh hhTvCJaJh h.yCJaJh h.y6CJaJh h.y56CJaJ?@jRRd$Ifgd{E|l mkd$$Ifl$t" t044 lap yt{E|d$If^gd{E|l $^a$gdZ`}sn`d$IfgdvFgd- dgdb/ dgdpxkd $$Ifl8&$  t 044 lap yt{E|DmUm`b̻xgYHA0 h6Hh-CJOJQJ^JaJ h{E|h- h6Hh-CJOJQJ^JaJh-CJOJQJ^JaJ h h-CJOJQJ^JaJ#h h-CJOJQJ]^JaJ)h h-B* CJOJQJ^JaJphI}h BCJOJQJ^JaJhRCJOJQJ^JaJ h h-CJOJQJ^JaJ#h h-5CJOJQJ^JaJ h h:CJOJQJ^JaJ h hpCJOJQJ^JaJ`b֨|l||^d$IfgdvFdP$IfgdZiNd$IfgdvFskd$$IfTl$$$ t044 lap ytST֨ب$(*>BDދϋ}qbQJb:Jh6HhT5CJOJQJ^J h{E|hT h6HhTCJOJQJ^JaJh6HhTCJOJQJ^JhTCJOJQJ^Jh6Hh-<CJOJQJ h{E|h-&jh> CJOJQJUmHnHu!jMh> CJOJQJUh> CJOJQJjh> CJOJQJUh6Hh-CJOJQJaJ h6Hh-CJOJQJ^JaJh6Hh-5CJOJQJaJtdd$IfgdvFkd$$IfTl0$$  t044 lapytST$&(o^^$5$7$8$H$IfgdvFd<$5$7$8$H$Ifgdgd-skd$$IfTl$$$ t044 lap ytST(*>@BhWFF$5$7$8$H$IfgdvF$5$7$8$H$IfgdTkd7$$IfTs4(Fc"$`Go`M t0    44 sBaytZiNTBDƩȩkZIII$5$7$8$H$IfgdvF$5$7$8$H$IfgdTkd$$IfTs4Fc"$ o M t0    44 saytZiNTDҩ֩ةکީ&'<>BDȹ~leVEVEVE h6HhCJOJQJ^JaJh6HhCJOJQJ^J h{E|hZiN#hZiNhZiN5CJOJQJ^JaJ#hZiNhZiN5CJOJQJ^JaJ h6HhZiNCJOJQJ^JaJ h{E|h- h6Hh-CJOJQJ^JaJh6Hh-CJOJQJ^J h{E|hT h6HhTCJOJQJ^JaJh6HhTCJOJQJ^J h6HhTCJOJQJ^JaJȩЩҩةک$5$7$8$H$IfgdvFFf$5$7$8$H$IfgdT$5$7$8$H$IfgdvF$$5$7$8$H$If^a$gdvFYG8G$5$7$8$H$IfgdvF$$5$7$8$H$Ifa$gdvFkd$$IfTsP\P${L t044 saytZiNTl[E[d<$5$7$8$H$IfgdZiN$5$7$8$H$IfgdvFkd$$IfTs6F$>L t0    44 saytZiNT'=>BlXGG/$$5$7$8$H$If^a$gdvF$5$7$8$H$IfgdvF$$5$7$8$H$Ifa$gdvFkdh$$IfTsIF$AT t0    44 saytZiNTBCDE"kdE $$IfTsPֈ8s"$>mO_M t044 saytZiNT$5$7$8$H$IfgdvFDEHJKZ[_`ab tuFGHIJKusuu`$h{E|hDU>*B*OJQJ^JphUjhvF0JOJQJU^JhTChDU0JOJQJ^JhvFjhvFUhTChDUOJQJ^J%jhTChDU0J$OJQJU^J#h h&=5CJOJQJ^JaJ h{E|h- h6Hh-CJOJQJ^JaJh6Hh-CJOJQJ^J h{E|h EFGHIJ$5$7$8$H$IfgdvFJKX:($$5$7$8$H$Ifa$gdvFkdh!$$IfTsrP"${GM t022 H44 sBaytZiNTXYZ[\]B/p$5$7$8$H$If]pgdvFkdy"$$IfTs(F$>L t0    22 H44 saytZiNT$$5$7$8$H$Ifa$gdvF$5$7$8$H$IfgdvF]^_`a/*gdkd8#$$IfTs\$\ L t022 H44 saytZiNT$$5$7$8$H$Ifa$gdvF$5$7$8$H$IfgdvFhttp://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf   HYPERLINK "http://www.sans.org/critical-security-controls/guidelines.php" http://www.sans.org/critical-security-controls/guidelines.php  See  HYPERLINK "http://codes.ohio.gov/oac/4501%3A1-12-02" http://codes.ohio.gov/oac/4501%3A1-12-02 for additional details.   HYPERLINK "http://codes.ohio.gov/oac/1301-1-03" http://codes.ohio.gov/oac/1301-1-03   HYPERLINK "http://www.inacol.org/cms/wp-content/uploads/2013/02/iNACOL_CourseStandards_2011.pdf" http://www.inacol.org/cms/wp-content/uploads/2013/02/iNACOL_CourseStandards_2011.pdf     DTO 0201 7/14 [760-1275] Page  PAGE \* Arabic \* MERGEFORMAT 6 of  NUMPAGES \* Arabic \* MERGEFORMAT 6 OHIO DEPARTMENT OF PUBLIC SAFETY ONLINE DRIVER EDUCATION SECURITY ASSESSMENT DTO 0201 7/14 [760-1275] Page  PAGE \* Arabic \* MERGEFORMAT 1 of  NUMPAGES \* Arabic \* MERGEFORMAT 6 aHVmnpqstvwyz(<=$d$Ifa$gdvFd$IfgdvF H$dgdX&Z dgdc"<=UVWXYklmnoqrtuwxzĴ߰י׆wf hX&ZhX&ZCJOJQJ^JaJhX&ZhX&ZCJOJQJaJh2hDU0JjhvF0JUhFhDU0JhDUjhDU0J$Uh BjhvF0JOJQJU^JhTCh B0JOJQJ^JhvFjhvFUhTCh BOJQJ^J%jhTCh B0J$OJQJU^J$;=>?@ĭĭvi_iQvJFhR- h{E|hR-hX&ZhR-5CJOJQJhR-CJOJQJhX&ZhR-CJOJQJhX&ZhR-CJOJQJ,j$h{E|h{E|CJOJQJUmHnHuhvFhX&ZhX&ZCJOJQJaJ,jhX&ZhX&ZCJOJQJU^JaJ*(h{E|CJOJQJ^JaJmHnHu* hX&ZhX&ZCJOJQJ^JaJ)jhX&ZhX&ZCJOJQJU^JaJ=>?@\ZXIGXX H$dgdR-kdh$$IfTlFB A)  t00*    44 lapytvFT@Y^_˸˸񴰞#h h&=5CJOJQJ^JaJhvFhR-%h{E|CJOJQJ^JaJmHnHu)jhR-hR-CJOJQJU^JaJ hR-hR-CJOJQJ^JaJhR-hR-CJOJQJaJgd5 01h:pI/ =!8"8#$% tDText1$$If!vh#v$:V lO  t 05$ap yt{E|tDText1$$If!vh#v$:V l8  t 05$ap yt{E|tDText1$$If!vh#v$:V l8  t 05$ap yt{E|$$If!vh#vt":V l t05t"/  / ap yt{E|tDText1$$If!vh#v$:V l8  t 05$ap yt{E|$$If!vh#vt":V l t05t"/  / ap yt{E|tDText1$$If!vh#v$:V l8  t 05$ap yt{E|$$If!vh#vt":V l t05t"/  / ap yt{E|tDText1$$If!vh#v$:V l8  t 05$ap yt{E|$$If!vh#vt":V l t05t"/  / ap yt{E|tDText1$$If!vh#v$:V l8  t 05$ap yt{E|$$If!vh#vt":V l t05t"/  / ap yt{E|tDText1$$If!vh#v$:V l8  t 05$ap yt{E|$$If!vh#vt":V l t05t"/  / ap yt{E|tDText1$$If!vh#v$:V l8  t 05$ap yt{E|$$If!vh#vt":V l t05t"/  / ap yt{E|tDText1$$If!vh#v$:V l8  t 05$ap yt{E|$$If!vh#v$:V l t05$/  / ap yt{E|tDText1$$If!vh#v$:V l8  t 05$ap yt{E|$$If!vh#vt":V l t05t"/  / ap yt{E|tDText1$$If!vh#v$:V l8  t 05$ap yt{E|$$If!vh#v$:V l t05$/  / ap yt{E|tDText1$$If!vh#v$:V l8  t 05$ap yt{E|$$If!vh#vt":V l t05t"/  / ap yt{E|tDText1$$If!vh#v$:V l8  t 05$ap yt{E|$$If!vh#v$:V l t0,5$/  / p ytSTDQM/d/yyyyM/d/yyyyM/d/yyyy$$If!vh#v#v :V l t055 / pytST$$If!vh#v$:V l t05$/ / p ytST$$If!vh#v#vo#vM:V s4( t0++,,55o5M/ / 4 sBytZiNT$$If!vh#v#vo#vM:V s4 t0++,55o5M/ / 4 sytZiNT$$If!vh#vg#v#vy#vX#v#ve#vM:V sP t0,5g55y5X55e5M/ / / / / / 22H222 22H222 22H24 sBytZiNT5kd$$IfTsP֞8m"$GgGGyGXGGeGM t022H222 22H222 22H244 sBaytZiNT$$If!vh#v#v{#v#vL:V sP t0,55{55L/ / / / 4 sytZiNT$$If!vh#v>#v#vL:V s6 t05>55L/ / 4 sytZiNT$$If!vh#v#vA#vT:V sI t0,55A5T/ / / / 4 sytZiNT!$$If!vh#v>#vm#vO#v#v_#vM:V sP t0,5>5m5O55_5M/ / / / / / 4 sytZiNT$$If!vh#v#v{#v#v#vM:V s t0,55{555M/ / / / 22 H4 sBytZiNT$$If!vh#v>#v#vL:V s( t05>55L/ 22 H4 sytZiNT$$If!vh#v\#v #v#vL:V s t05\5 55L/ 22 H4 sytZiNTDDd p  s >A?Picture 8"bC6Eq(.5urCI$*nC6Eq(.5urPNG  IHDR, pHYs.#.#x?vtEXtSoftwareAdobe ImageReadyqe<C-IDATx eUyϝP@C&mzE(Y&ENNB{h.bbcۭ1FML‰AHl5#C+{s;s=~ù{|{9cLV+F79.610 |0̧2ĸ3  (hd 2fG\۵~ 3 SYo&yTݫ @V)~QMi@0?WgL | 2"QŸ9fX>T H#t10 F(Q.7|J5 iO |vҚԸeBTT]瑄(|V|֎y<> Ϥ$Op>aFh( <3$#i: (bD(&θqB90g7Pf@T4YҤF!~{6F٪]۔vQ| 5"Q KS>#{>  (e\!g| @3GÒ% |Fro3QX |>#g @a!fD͇#'(!FN,ԙzPrHek|unGYO|>#on;To @ɍ3ڈ<$z꩑eD=[cQ1C3 u9!FC2A)8W?g3:RgŐ 4"}7SOQɋ_ eڟXjʐxd8rUղU1ߎq}~#_{K4"O5*8CUoDB@Հ~#_#hD@+jD =bA"E/zц85?M6 D@)*[vT|3aGϐ2F=X DwT%Pg >e3,k}WTb J>dnPlMͷN(h>C=3 > !ܽk߾}x^/ueuBlMͷ(h>C }r _2(7ԑ7Dh8O55:4>o3~CEk^A݄K֟"!xʖ!x}}F7@]@VX|4Lo3ʐ|0"pUl3x7 04tP>j8Q@VI|@lx %Tnp,J*$ʖUH |F5}F(J"@+ҋO4 y2z } DJQP6alل>Z>#(B"@5'I/1>#2_uVlM*[R;J2bϨHBB"qWYPp;LAUʠ [3T'hg$P I{_C3PK{v`93BeblGIg3M$s9r۶9r~TKPl W%۪qpebu{ot3Bm㜳_ )Q+{ZN?p{#I;*+}u_4lĬgȠT\60f9& 5$􊋣Dđ etў2 眽̤G;gV]f"0g3a>c(gH{9ām۶ej׷E" 3&"OQe7%B{O6kN٪QTg3Y1!pՌHC_t1cu|o8/}垑ӤF2ț,2ʪG)>xhUV|a#fahi}TL)ϰ  7$_}e˖}7 #aenXt_էy/rۮ1j. 13gėu1o n3/Xlٲy1xCnQ%lrј, -璻[<Ԕ-ΐa uF>#7tQcPPMgxxaaḖyܼ y s-%M_rlu,si˼qQP)*仨4 a{7NΨӷ(/kN Hozc6$@P`Т;zp| *Eΐm@+>Bty}FT3p3F \ @5 aX_̈loXIM—!?:Ձ4~^dߣ5.4T~ܦ>*od3~#gWNL[PM_^\\&_6M ̳cg kN0UkHzԀWtylD}Ƣ0Ԡ-kP;+tewﶢekx^g |F0gk"!]WUcIF$ !*.Y."S8ek՟;mFҧbH={q"NE.S|ư64 U%@'jǨy˛߬I*DϿ, #t iy跳: &( @5λt[lfgZHRIҳ3(rbvQ2uEG|dy),(m[Qz43tIuv;+@*NR;rϯL+B-7m_#$>ӈаPy-m= Yͬ3Ir;/d)mw[ߊqMmAP@57A-G;~w +!:Qᖛѕ0<ꦝXDv U Z9ևj@OPhG8]^!IbLbE(?깊rlwVy;P|?*WeCT)_*̪3 z|MWbhY5lyQoU2]6 IB:(j!-ݾ.%ݱcIܜqTMyI;{x仈ې(Q f.i+4BgU~AlzQ=pyrV΋^53[Ѳ5)ghho 3BTU0$իsm8sЭ,NL&\c7*x8zP%{?h?p{ӄ!ɫG{aeyaLo®FfW $̈Y:>#\7z[Q; @K`Pͷju3P~ޣbY^6&Gn3WvŸ69g7[M%nut/н#@kq궧v9hЖ(Lņ-j_5:T9 ƦC}4(kYUhwпmئMӠN>NC9 Z&ZӃU({ĄRAdoLt(o8}UqY.RGjvsh?n9eG\@U5ȹ<ɨ>D{:oZd3&EA76?ix^ß WaЂI` qODCQh?*π|}F:==kvJ%@1Ц+A BD@:"Vs.#Y&hQ&:F0rZO6NHhE@'%0J Z<ģ7gyϱl@\fǞ#t5`'& ?d4ZN $T^͸hPʸu{/& {5}Y֬=gW`/ЦE@G*ѮD瞻Q`^$xkxWTZ5{55_:ɋҠzիQAMia#;R8@"3?ߋB:ٹ]o[zw߾}ՋCbڨi -@(4=go;kW"GYجYW?~NB?϶57ϯPQ FhS2pm z>.y%V8~E&2yN Ea/9܈u]zzOZ!q>}^GgEѷEME(F֓GSLTz z"=u=])'NL):NO})Y< şiu>rg]: #@npׯw/wT~~Ǫk2@ˣ}vZ;vxmWP#17~׻QD?(XaH=f0_֝ԈWޝv"wɏ/ZЊP|`R Nٻw` rhS*&0QlgW,{lZ`v?8{w(Ǻs4vCwwzVKyaqQhvC|' @aw~w>=L_CD`PO'poV^]AkĮ"{uhȑ#5W_#6mQ-:EgSN>y>o_QC'ҋp'Bz䑾ioNh*ޱz}]{Lkqq>3"g>۬6ų hI#:(/O`˖ Z#:}$E~³?3?/M\sĦM[ |+?fOIPs>sq'D{o>7_:U笳βvډN]P!v0{B}6;OرcڱcǜVyo*h\6MOH)a+bغu !,kAQ3mx7뷦mn7 r>uMJΤsyqؼ6AHp4j,JxJ(o93;U])/>usnP.-fU{?ߞs>#< Fjx(Մg@;6zٱcl6z{RV+3h8=Qa  M%B|~V9YtV7o޼n;#ixg6 "EwO1%Z}֭[Tlؘ5~3jO!>_h4V'&& GfwdrJ;"5=۶m{X1 OG*ܛ|h?^Գh)=9YϕÇu|)F&d1u갓BO%0|1>CW); uV]c=]6mo*!@œnZuh5#(w.Mx%6ϝvHܖVj=y5W_Jד#r-=۶m(h|FPI AF=Wsfvm^ZZZ|nA|(n((>#hI$x灖->UD9-;ͦUy# D@5ph X~Sm!@-}{']XUQ!9e[vZrUޓ-OħL̼KVkyӦM핕IT@RzIA 8z4]TF|=Uq[Վ)\2ِF?O*\W2d ekF@ȳg舏3 z=9$9"W!>53Vq[e,xۍF^[[3֐ѣGc?tyv&,BKs҅qP)J|G?QOA;1;gy3Y BG1S@B3_tj9j20C0nǔ& Zu~]o؆I1Lh~v|׻}ve~ȑDN-ɷ /FdSET] L7T_(s eKb[..ɅGBًdH$ =ƅ;QEU_vj>cPbК)Uafv} T^ƈO(+CU\Te8* Juq˻t[3!پcR;ړͦjTH؅ɐڎIzO)M5Y3#@5wEZ e!! z D٢?R vVaaR9##ÂPX-qM:)|&Ľt+r]*>Ud\nJҞDFQSfR_6*qA ƴay mav]zG&;I<1[E U.VOF?T Z @tnmZ<}?O6/x *EAGjjJ2lџ=dpDMo@\O|Xܦ0lۖCT}iiz׻]S͈r؞,GoGH2I X7 @+\ nq&^raRY"4Έ >S4pR.!HzfvVFDW}UWY\}Icϓn/3Oْ, IR4ld:F G~9]1  -{?lj#ƅ??Y۶m[}jjv9gײ4 zЃz7$2Zz AlMwnN_âqv9(>c|AJCs#ۿm&ZֵȿZΥ1HI62'~/г2"H$=$ă)H_> timZRaFZr:u>dMNMZfLTfa@L3"8c'ImB,m [h0>cE> -sE|Tn$MjuofHcㆄN>dmghHzF%߹u0QP!"tUA:jX44ΦgH>#Q|DEAUA$rV!+;ް>fMNLXzݚhaKLF$ :*iRLddZPR!:'uM @K6*j$wHh}mu:!Bvݱl6Ϭx-unU?bo<HT4>FyMU0g ZPE+nex84Ns2*hj]NǍ~637&_k#ASNѶ={`bCR85.eK nDEA"ԍjh˂4GٲQ"D>##P( *׼~,5wX՚pn5[B{݈h04_ k$2`IbH~Сx!tkIhj>#\Y@V(h^GuF ѯ!:묳{k=!j y]wR9u̅Z_=ŰHgdP ؼ$btTaYW~y!@a-s><'D:g-Ol o+۶b;OPQ!li0*?IDiU 1C*f$ʈFΨC>5s#¤x]svMnDԍzRwXց `5UV]8f3ƁaqCeK!:H}B$F;vMe˻xc{ӵ}$#\ELP MeK;o >}FҎT^j{"}*SՅ={ݻꚵ*.-@ڞ uJDw:3P߿ imGRM2Ԯ¥aS{n7h(:*7]ј(4rdqj,@*l ÄPɞ=wYZk]^On[Wږ@k&մ0$YbYBU˖v$6D{Ǖ}M3Z @DCuwCwyGN(B'CN7~8J1$IDh-s uQPDh&@M!*"ogW>/ԝ $3/CzD($㼦k!@h"nVWIrx~UWNۋ+&O}LeK;J5Ex(#fYEDCQ/"z{Ƽ mw"!PTX联Xل~!rHqP`TCz4_ͺ[zlZu#MJ uJݱID(h$>@ B~wodod(!8aPAx|M:ΗJ "Th0мwk֊uSZۋu 3L|?)[g%Ciz}Tz44 DC QݺJo`,N⽐;0ш0lџPas\F>J44hhEJ: Q9?[nvWȯvkV[\0;MvnK`DtE&QJ!TBT 6j D|"!@ 1"hhBԋumoF PS5`(DU"t GyzW#gʲ)2-<*]:,\ *B!:o;/_s tOPEn o8^e5hen ʕvpzRhc'$3"Q3'-BSECOMLQ՜8!d#"DhSq_[ê׽gh^uz~_oxn}#`u%*~?"mg>6ws z _HaHZZ!㡒M"8UEq*0.,/b."XD z4PI Z-`|GUmQ"4[n==]%*ONZn#/ә`P/] &F|rW%`A=~!B4TUFF zqEyF{2*+c}%U}I$T6*!"kV/B&"5N{'}SO[O?{bwrw!>@7?2,ts2"@`+x=]o[3뒋/~b@?f|P Dbt4iBuiP]Ejv7g]ַXvg:`_2H$M섧N (CK:q"k<`^g{ϐwBG/%(3N3P%IEn"teeU\+:8?^FAJdT'Y*AL*uiX[&8 zP6^׏w:iLJ tQGyIŨ4I'4Mx"@a0Raszɰ(. :⚶m{u֭g/"'DqQ6ʞFt*<` IaL}R*^׏?^ի~Kk%Ѱ&Dv M+j7O(t@%&GAo"tqomydgk P !T a4 W* V!‘)a`D},-q j=sAH!:L&I4KFt*<lP1toevX97~.CbtXTtTApDtOqkU&WeĬ~ 鈸M\R vرn1D)ļoW$8ZD@AKsBM I-e[>A\>/#VKFAkDA u*ҤbN^Swbᛢ> qQj5Fөoٲax- FGYӴ"JaBM&ĵn'FG/Dr%E #iPV+gXћnTF?V^oL?X 0DܕPvn$. ]Lǯax9R_*RP_ISh(h.⽆mڦM0|Tȟ:E4iҐgQ HNy\Tɕ`@~2iyPysiiIPPHm7ړO>A)R7ZF?+2O)4{0ԍJ F~wVĵ,(_P)JOt 0q+rH!BYu~TFԓgxE=\m)>DkG,Xu\hTc6G! Oqϋw ]t:j Cu؜0 BFy UK莛v"4*ON.߻Hr#F>r䈱¬(i# k !iu{u+o{ωQq`ǎΕW\A$\c)N;ZA1"'+*jfϨ觿t^?/BTWFϓO>UR>/JQņ(鼩wRtҒje-F*k%~ojW~FIӏEx*#>M'l ~ !۶JF,X;m~BUDJ~TTF| mz׊EHr^Ą]EG?6* 唅NP( <cϙ?}J_O7TFCz{ӦM'>q;U~Gxf[UO i(dhܳetZ_|(~%m[F?Ǐ&P ԅj~GI"LզM"FD|.6c$\^ Oߧx}L\?ϥve˖ο8\doUq@~_ӎu{9Tq;'NQS9?yԆExfJi箙?%}QOR i/..{[¤J|"B)<տO]zӝ)gωOyѢ:sxF\Ɉqa}Q`!L񎕺(:k#y|^veB3]33#2)#rO\m{Qn6/O<未?'&F3u &Fw;و"10]!BaIV9:UĬz^iyUsz~T n:???tF3/GGm:*H#C"<ً t_/ZF?W;N{yy~_l~PCe6Sˡ  BS3JC"k^\s~TIw&BD9x<'"T} >D|">D??.njw)B傣EyґnieesaۤaQVv%*Aj5;Y)+;MWEx">ӋϾw9.qZCf-.{˖-u"*w{YiOW"DA*ϕA$4y3hPg³]n./~qm Zֲ9sӦMm۶lPQVxVU|mIZz^Z;vؚ<. UGx">|-!,IlZ}J\7 z4@ T_K:=#G|VqQX|&&SBl)WZ-^ ig5V"< "fӍxJ)=BsXOS|NLLD><;!o)YXZx_|VˍW/--uw^g={Yt^箙})WK)bә?ֶnݺ&W\aS P`Z.|r{%_xٶ}P~DS ;AY_|M _A4um(|'xG@ג#7m67). )$&9rPB=(PG@Ϫ9fwq?h~ȶz$)Rj3a%jZvN8Ѧ$eˮutҴDz롊#: Pg9kf7-Xl$ٔdtbb6==| T8`Ex!@]e4UmhOgYsfvݽ1ϥF"h{~~󲗽9rRyF+d> ᙷ􅜌z!w7)MNN.,..voWIo|m-),JQ1T&@v!<^byCmtY)~nOMMΡC1̴((:-t JD;U=sH899SV4ܜn2ځ](7o)ʨ e qDRT98˚u$¬nVe8̗g]WI?oX{ɪFgT>N;)9k #<ύ욙܏\m}a{֭ZABnD8aqJZ;N{U*R%v_ʰEٲ,Bt#<}FW;͛|OF7@%& ZTqY1KG2,ӗe]PY?ymbļ5,$g⳪s_=&''; Ą;;A(E}gqh}9-HhYCE8S"m{y 1.YC:{ Lܐ{M T[x">cxu^ h4vY\\n-Hrػ%sGRtGV/e/3mzCUlcYmbQ}͢*TI|ym Bt.̯Zvӱfily˫>!T65zOωv1X=S|˶CE2l9lSQsts "=n1t7ggiyG`ߙWe~OYqd)Kt'|0!>VgLwҽnv֔ϡNCYmryYlQ;ز$8aW"bSEnl{E,k"nGO^Y6xMD'TW۶-W-fsMn0!cf $]Ief!ˈQIک8sU)"E٪"j<N;wB|.[au@ P@ @ (@ P( @ (@ P( @ (P@ P((`jTLaWIENDB`$$If!vh#v #v#v :V l t00*5 55 / pytvFTj% 666666666vvvvvvvvv666666>6666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~ OJPJQJ_HmH nH sH tH J`J Normal dCJ_HaJmH sH tH b@Rb  " Heading 5d @&!B*CJOJPJQJ^JaJphCaDA D Default Paragraph FontRi@R 0 Table Normal4 l4a (k ( 0No List @@@ ~ List Paragraph ^m$bob "Default 7$8$H$-B*CJOJQJ^J_HaJmH phsH tH >@> c0HeaderdH$.!. c0 Header Char> @2> c0FooterdH$.A. c0 Footer Char6O6 c0Default1 B*pht`ct : Table Grid7:V0 dB'`qB Lx0Comment ReferenceCJaJB@B Lx0 Comment TextdCJaJBoB Lx0Comment Text CharCJaJHj@H Lx0Comment Subject5CJ\aJNoN Lx0Comment Subject Char5CJ\aJN@N Lx0 Balloon Text dCJOJQJaJJoJ Lx0Balloon Text CharCJOJQJaJ6U`6 *0 Hyperlink >*B*phFV`F I}0FollowedHyperlink >*B*phVoV "Heading 5 Char!B*CJOJPJQJ^JaJphCaV^@V "0 Normal (Web) !dCJOJPJQJ^JaJH@"H #d0 Footnote Text "dCJaJDo1D "d0Footnote Text CharCJaJ@&`A@ d0Footnote ReferenceH*PK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3N)cbJ uV4(Tn 7_?m-ٛ{UBwznʜ"Z xJZp; {/<P;,)''KQk5qpN8KGbe Sd̛\17 pa>SR! 3K4'+rzQ TTIIvt]Kc⫲K#v5+|D~O@%\w_nN[L9KqgVhn R!y+Un;*&/HrT >>\ t=.Tġ S; Z~!P9giCڧ!# B,;X=ۻ,I2UWV9$lk=Aj;{AP79|s*Y;̠[MCۿhf]o{oY=1kyVV5E8Vk+֜\80X4D)!!?*|fv u"xA@T_q64)kڬuV7 t '%;i9s9x,ڎ-45xd8?ǘd/Y|t &LILJ`& -Gt/PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!0C)theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] K(,@9hC@9  ~EHK >PVb !n&&.)*/83@9a;j<>@2LDD@!#%'(*,.02367:;>?CEGIKMVXZ]_djstv:@X !&&(*/026#;<>@`(BȩBEJX]a="$&)+-/14589<=@ABDFHJLWY[\^`abcefghiklmnruw! !!!,&8&>&b(n(t(>+J+P+///333@9FFFFFFFFFFFFFFF*LNSy{?AH!!3<(fn@EXXXXXXT # @H 0(  0(  B S  ?" !!,&?&b(u(>+Q+//3337#8H8L8u8w8x8899;9A9" !!,&?&b(u(>+Q+//3337#8H8L8u8w8x8899;9A9" !!,&?&b(u(>+Q+//3337#8H8L8u8w8x8899;9A9=v BgdG떝KV,P"hA49ZH7" | 9 W8JV<F`v:iev.k K(uAZ~guCJx>E\xTLh^h`.P^`P..^`...x^`x.... ^` .....  X^ `X ......  ^ `....... 8^`8........ `^``.........^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(.T^T`.$ L^$ `L. ^ `.^`.L^`L.d^d`.4^4`.L^`L.^`o(.T^T`.$ L^$ `L. ^ `.^`.L^`L.d^d`.4^4`.L^`L. ^`OJQJo(^`OJQJ^Jo(o  ^ `OJQJo( \ ^\ `OJQJo(,^,`OJQJ^Jo(o ^`OJQJo( ^`OJQJo(^`OJQJ^Jo(o l^l`OJQJo(h^h`CJo(.P^`Po(..^`o(...x^`xo(.... ^`o( .....  X^ `Xo( ......  ^ `o(....... 8^`8o(........ `^``o(.........^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h^h`.P^`P..^`...x^`x.... ^` .....  X^ `X ......  ^ `....... 8^`8........ `^``......... ^`OJQJo(^`OJQJ^Jo(o  ^ `OJQJo( \ ^\ `OJQJo(,^,`OJQJ^Jo(o ^`OJQJo( ^`OJQJo(^`OJQJ^Jo(o l^l`OJQJo( ^`OJQJo(^`OJQJ^Jo(o p^p`OJQJo( @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJQJo( ^`OJQJo(^`OJQJ^Jo(o P^P`OJQJo( ^`OJQJo(^`OJQJ^Jo(o  ^ `OJQJo( \ ^\ `OJQJo(,^,`OJQJ^Jo(o ^`OJQJo( ^`OJQJo(^`OJQJ^Jo(o l^l`OJQJo( O^O`OJQJo(^`OJQJ^Jo(o  ^ `OJQJo(  ^ `OJQJo(^`OJQJ^Jo(o _^_`OJQJo( /^/`OJQJo(^`OJQJ^Jo(o ^`OJQJo( ^`OJQJo(^`OJQJ^Jo(o  ^ `OJQJo( \ ^\ `OJQJo(,^,`OJQJ^Jo(o ^`OJQJo( ^`OJQJo(^`OJQJ^Jo(o l^l`OJQJo(kF`x8JL| 9H7K(u~guE\x=vKV,BieGhA4                                    x        z(                                                                       k{8H* Z6!{8H*ijBV5ijZ6!YPw"G yki='h"22 YoRq,D2i7Lx_:}df % > MZ!Z"V$9&(()q,R-(.b!/b/H3~5'6U8fn8w:&=15?~?@oX@5 A>B BTCRDQkDGGH JTFJZiNGO%9PZPmPU$uUoXX&ZF"\f%_,am!ejO3m>or0vhTv2x.y.yxz#{{E|I}\p*DUm Q@R4 y cz{I77U+"-6:4 *YKaky xUZv-El$DAmFWE/p-~'Gr/SY4^hn~GTdf12-.-8_gGA76HvFY#d0t!X4@ B6[JtZNJ&u33@ x  !"9&9'o(o)K+K,/0235@9@ @,@4@<@ D@&P@*X@0d@6p@<|@@8@@@L@T@@Unknown G*Ax Times New Roman5Symbol3. *Cx Arial7.@Calibria Diavlo LightTimes New Roman{Lucida GrandeFranklin Gothic Medium Cond?= *Cx Courier New;WingdingsA$BCambria Math"1h(g(g* (8,^Z/e!8037JHX  $P~*!xx 0ODPS Online Driver Education Security AssessmentJoseph A. Polley Randy J. BareL           Oh+'0  4 @ L Xdlt|4ODPS Online Driver Education Security AssessmentJoseph A. PolleyNormalRandy J. Bare2Microsoft Office Word@@@>Tz@>Tz8,՜.+,D՜.+,|8 hp  $Ohio Department of Public Safety^3 1ODPS Online Driver Education Security Assessment Title 8@ _PID_HLINKSAd$[Uhttp://www.inacol.org/cms/wp-content/uploads/2013/02/iNACOL_CourseStandards_2011.pdf6z $http://codes.ohio.gov/oac/1301-1-03XQ )http://codes.ohio.gov/oac/4501%3A1-12-02IQ>http://www.sans.org/critical-security-controls/guidelines.phpICGhttp://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf3%ihttp://csrc.nist.gov/publications/nistpubs/800-53-Rev3/sp800-53-rev3-final_updated-errata_05-01-2010.pdf  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxz{|}~Root Entry F4\Data yki1TablepSWordDocument 7SummaryInformation(DocumentSummaryInformation8MsoDataStoreM4\AAZGWM1IPRD==2M4\Item  PropertiesUCompObj r   F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q