ࡱ> :>789 sbjbj >Qi@%@%222224222h342O6X<}=}=}=>QdW"$$$$$$]$2HZ>>HZHZ$22}=}=X9l^l^l^HZ2}=2}="l^HZ"l^l^H}=J"H!2Z4O0LL[h,ĝ2RYYl^Y YSYYY$$J^"YYYHZHZHZHZYYYYYYYYY@% I1:   SUBJECT \* MERGEFORMAT   SUBJECT \* MERGEFORMAT  Information Technology Contingency Plan Version Number:  DOCPROPERTY Version \* MERGEFORMAT 1.0 Version Date: VERSION HISTORY [Provide information on how the development and distribution of the  TITLE \* MERGEFORMAT Security Approach will be controlled and tracked. Use the table below to provide the version number, the author implementing the version, the date of the version, the name of the person approving the version, the date that particular version was approved, and a brief description of the reason for creating the revised version.] Version NumberImplemented ByRevision DateApproved ByApproval DateDescription of Change1.0 Notes to the Author [This document is a template of a  DOCPROPERTY Title \* MERGEFORMAT Security Approach document for a project. The template includes instructions to the author, boilerplate text, and fields that should be replaced with the values specific to the project. Blue italicized text enclosed in square brackets ([text]) provides instructions to the document author, or describes the intent, assumptions and context for content included in this document. Blue italicized text enclosed in angle brackets () indicates a field that should be replaced with information specific to a particular project. Text and tables in black are provided as boilerplate examples of wording and formats that may be used or modified as appropriate to a specific project. These are offered only as suggestions to assist in developing project documents; they are not mandatory formats. When using this template, the following steps are recommended: Replace all text enclosed in angle brackets (e.g., ) with the correct field document values. These angle brackets appear in both the body of the document and in headers and footers. To customize fields in Microsoft Word (which display a gray background when selected) select File->Properties->Summary and fill in the appropriate fields within the Summary and Custom tabs. After clicking OK to close the dialog box, update all fields throughout the document selecting Edit>Select All (or Ctrl-A) and pressing F9. Or you can update each field individually by clicking on it and pressing F9. These actions must be done separately for any fields contained with the documents Header and Footer. Modify boilerplate text as appropriate for the specific project. To add any new sections to the document, ensure that the appropriate header and body text styles are maintained. Styles used for the Section Headings are Heading 1, Heading 2 and Heading 3. Style used for boilerplate text is Body Text. To update the Table of Contents, right-click on it and select Update field and choose the option - Update entire table. Before submission of the first draft of this document, delete this instruction section Notes to the Author and all instructions to the author throughout the entire document.] Table of Contents  TOC \o "2-3" \h \z \t "Heading 1,1,PageTitle,5,Appendix,4"  HYPERLINK \l "_Toc237743446" 1 INTRODUCTION  PAGEREF _Toc237743446 \h 5  HYPERLINK \l "_Toc237743447" 1.1 PURPOSE  PAGEREF _Toc237743447 \h 5  HYPERLINK \l "_Toc237743448" 1.2 BACKGROUND  PAGEREF _Toc237743448 \h 5  HYPERLINK \l "_Toc237743449" 1.3 APPLICABILITY  PAGEREF _Toc237743449 \h 5  HYPERLINK \l "_Toc237743450" 1.4 SCOPE  PAGEREF _Toc237743450 \h 6  HYPERLINK \l "_Toc237743451" 1.4.1 Planning Principles  PAGEREF _Toc237743451 \h 6  HYPERLINK \l "_Toc237743452" 1.4.2 Assumptions  PAGEREF _Toc237743452 \h 6  HYPERLINK \l "_Toc237743453" 1.5 REFERENCES/REQUIREMENTS  PAGEREF _Toc237743453 \h 7  HYPERLINK \l "_Toc237743454" 2 CONCEPT OF OPERATIONS  PAGEREF _Toc237743454 \h 8  HYPERLINK \l "_Toc237743455" 2.1 SYSTEM DESCRIPTION AND ARCHITECTURE  PAGEREF _Toc237743455 \h 8  HYPERLINK \l "_Toc237743456" 2.2 LINE OF SUCCESSION  PAGEREF _Toc237743456 \h 8  HYPERLINK \l "_Toc237743457" 2.3 RESPONSIBILITIES  PAGEREF _Toc237743457 \h 9  HYPERLINK \l "_Toc237743458" 2.4 TESTING AND MAINTENANCE  PAGEREF _Toc237743458 \h 9  HYPERLINK \l "_Toc237743459" 2.4.1 Tabletop Testing  PAGEREF _Toc237743459 \h 9  HYPERLINK \l "_Toc237743460" 2.4.2 Technical Testing  PAGEREF _Toc237743460 \h 10  HYPERLINK \l "_Toc237743461" 3 NOTIFICATION AND ACTIVATION PHASE  PAGEREF _Toc237743461 \h 10  HYPERLINK \l "_Toc237743462" 4 RECOVERY OPERATIONS  PAGEREF _Toc237743462 \h 11  HYPERLINK \l "_Toc237743463" 5 RETURN TO NORMAL OPERATIONS  PAGEREF _Toc237743463 \h 12  HYPERLINK \l "_Toc237743464" 5.1 ORIGINAL OR NEW SITE RESTORATION  PAGEREF _Toc237743464 \h 12  HYPERLINK \l "_Toc237743465" 5.2 CONCURRENT PROCESSING  PAGEREF _Toc237743465 \h 13  HYPERLINK \l "_Toc237743466" 5.3 PLAN DEACTIVATION  PAGEREF _Toc237743466 \h 13  HYPERLINK \l "_Toc237743467" Appendix A: Contingency Plan Approval  PAGEREF _Toc237743467 \h 14  HYPERLINK \l "_Toc237743468" APPENDIX B: REFERENCES  PAGEREF _Toc237743468 \h 15  HYPERLINK \l "_Toc237743469" APPENDIX C: KEY TERMS  PAGEREF _Toc237743469 \h 16  HYPERLINK \l "_Toc237743470" APPENDIX D: RELATED DOCUMENTS  PAGEREF _Toc237743470 \h 17  INTRODUCTION PURPOSE This Contingency Plan establishes procedures to recover the following a disruption. The following objectives have been established for this plan: Maximize the effectiveness of contingency operations through an established plan that consists of the following phases: Notification/Activation phase to detect and assess damage and to activate the plan Recovery phase to restore temporary IT operations and recover damage done to the original system Reconstitution phase to restore IT system processing capabilities to normal operations. Identify the activities, resources, and procedures needed to carry out processing requirements during prolonged interruptions to normal operations. Assign responsibilities to designated OPDIV personnel and provide guidance for recovering during prolonged periods of interruption to normal operations. Ensure coordination with other OPDIV staff who will participate in the contingency planning strategies. Ensure coordination with external points of contact and vendors who will participate in the contingency planning strategies. BACKGROUND This Contingency Plan has been developed as required under the Office of Management and Budget (OMB) Circular A-130, Management of Federal Information Resources, Appendix III, November 2000, and the Health Insurance Portability and Accountability Act (HIPAA) Final Security Rule, Section 164.308(a) (7), which requires the establishment and implementation of procedures for responding to events that damage systems containing electronic protected health information. This Contingency Plan is promulgated under the legislative requirements set forth in the Federal Information Security Management Act (FISMA) of 2002 and the guidelines established by the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-34, titled "Contingency Planning Guide for Information Technology Systems" dated June 2002. APPLICABILITY The Contingency Plan applies to the functions, operations, and resources necessary to restore and resume OPDIVs operations as it is installed at . The Contingency Plan applies to OPDIV and all other persons associated with as identified under Section 2.3, Responsibilities. The Contingency Plan is supported by , which provides the . Procedures outlined in this plan are coordinated with and support the , which provides . SCOPE Planning Principles Various scenarios were considered to form a basis for the plan, and multiple assumptions were made. The applicability of the plan is predicated on two key principles. OPDIVs facility in , is inaccessible; therefore, OPDIV is unable to perform processing for the Department. A valid contract exists with the that designates that site in , as the OPDIVs alternate operating facility. OPDIV will use the alternate site building and IT resources to recover functionality during an emergency situation that prevents access to the original facility. The designated computer system at the alternate site has been configured to begin processing information. The will be used to continue recovery and processing throughout the period of disruption, until the return to normal operations. Assumptions Based on these principles, the following assumptions were used when developing the IT Contingency Plan. The is inoperable at the OPDIV computer center and cannot be recovered within 48 hours. Key personnel have been identified and trained in their emergency response and recovery roles; they are available to activate the Contingency Plan. Preventive controls (e.g., generators, environmental controls, waterproof tarps, sprinkler systems, fire extinguishers, and fire department assistance) are fully operational at the time of the disaster. Computer center equipment, including components supporting , are connected to an uninterruptible power supply (UPS) that provides 45 minutes to 1 hour of electricity during a power failure. hardware and software at the OPDIV are unavailable for at least 48 hours. Current backups of the application software and data are intact and available at the . The equipment, connections, and capabilities required to operate are available at the in . Service agreements are maintained with hardware, software, and communications providers to support the emergency system recovery. The Contingency Plan does not apply to the following situations: Overall recovery and continuity of business operations. The Business Resumption Plan (BRP) and Continuity of Operations Plan (COOP) are appended to the plan. Emergency evacuation of personnel. The Occupant Evacuation Plan (OEP) is appended to the plan. Any additional constraints should be added to this list. REFERENCES/REQUIREMENTS This Contingency Plan complies with the OPDIV IT Contingency Planning Policy as follows: The organization shall develop a contingency planning capability to meet the needs of critical supporting operations in the event of a disruption extending beyond 48 hours. The procedures for execution of such a capability shall be documented in a formal contingency plan and shall be reviewed at least annually and updated as necessary. Personnel responsible for target systems shall be trained to execute contingency procedures. The plan, recovery capabilities, and personnel shall be tested to identify weaknesses of the capability at least annually. The Contingency Plan also complies with the following federal and departmental policies: The Computer Security Act of 1987 OMB Circular A-130, Management of Federal Information Resources, Appendix III, November 2000 Federal Preparedness Circular (FPC) 65, Federal Executive Branch Continuity of Operations, July 1999 Presidential Decision Directive (PDD) 67, Enduring Constitutional Government and Continuity of Government Operations, October 1998 PDD 63, Critical Infrastructure Protection, May 1998 Federal Emergency Management Agency (FEMA), The Federal Response Plan (FRP), April 1999 Defense Authorization Act (Public Law 106-398), Title X, Subtitle G, Government Information Security Reform, October 30, 2000 [Any other applicable federal policies should be added.] [Any other applicable departmental policies should be added.] CONCEPT OF OPERATIONS SYSTEM DESCRIPTION AND ARCHITECTURE [Provide a general description of system architecture and functionality. Indicate the operating environment, physical location, general location of users, and partnerships with external organizations/systems. Include information regarding any other technical considerations that are important for recovery purposes, such as backup procedures. Provide a diagram of the architecture, including security controls and telecommunications connections.] LINE OF SUCCESSION OPDIV sets forth an order of succession, in coordination with the order set forth by the Department to ensure that decision-making authority for the Contingency Plan is uninterrupted. The Chief Information Officer (CIO), , is responsible for ensuring the safety of personnel and the execution of procedures documented within this Contingency Plan. If the CIO is unable to function as the overall authority or chooses to delegate this responsibility to a successor, the Deputy CIO shall function as that authority. To provide contact initiation should the contingency plan need to be initiated, please use the contact list below. [Continue description of succession as applicable.] Contact List #NameOffice PhoneHome PhoneCell PhoneEmail1 FORMTEXT  FORMTEXT  FORMTEXT  FORMTEXT  FORMTEXT 2 FORMTEXT  FORMTEXT  FORMTEXT  FORMTEXT  FORMTEXT 3 FORMTEXT  FORMTEXT  FORMTEXT  FORMTEXT  FORMTEXT 4 FORMTEXT  FORMTEXT  FORMTEXT  FORMTEXT  FORMTEXT 5 FORMTEXT  FORMTEXT  FORMTEXT  FORMTEXT  FORMTEXT 14 FORMTEXT  FORMTEXT  FORMTEXT  FORMTEXT  FORMTEXT RESPONSIBILITIES The following teams have been developed and trained to respond to a contingency event affecting the IT system. The Contingency Plan establishes several teams assigned to participate in recovering operations. The is responsible for recovery of the computer environment and all applications. Members of the team name include personnel who are also responsible for the daily operations and maintenance of . The team leader title directs the . [Continue to describe each team, their responsibilities, leadership, and coordination with other applicable teams during a recovery operation.] The relationships of the team leaders involved in system recovery and their member teams are illustrated in Figure XX below. [Insert hierarchical diagram of recovery teams. Show team names and leaders; do not include actual names of personnel.] [Describe each team separately, highlighting overall recovery goals and specific responsibilities. Do not detail the procedures that will be used to execute these responsibilities. These procedures will be itemized in the appropriate phase sections] TESTING AND MAINTENANCE The Business Owner and System Developer/Maintainer shall establish criteria for validation/testing of a Contingency Plan, an annual test schedule, and ensure implementation of the test. This process will also serve as training for personnel involved in the plans execution. At a minimum the Contingency Plan shall be tested annually (within 365 days). The types of validation/testing exercises include tabletop and technical testing. Contingency Plans for all application systems must be tested at a minimum using the table top testing process. However, if the application system Contingency Plan is included in the technical testing of their respective support systems that technical test will satisfy the annual requirement. Tabletop Testing Tabletop Testing should be conducted in accordance with the CMS Contingency Planning Tabletop Test Procedures. The primary objective of the tabletop test is to ensure designated personnel are knowledgeable and capable of performing the notification/activation requirements and procedures as outlined in the CP, in a timely manner. The exercises include, but are not limited to: Testing to validate the ability to respond to a crisis in a coordinated, timely, and effective manner, by simulating the occurrence of a specific crisis; and Crisis communications and call tree verification. Technical Testing The primary objective of the technical test is to ensure the communication processes and data storage and recovery processes can function at an alternate site to perform the functions and capabilities of the system within the designated requirements. Technical testing shall include, but is not limited to: Process from backup system at the alternate site; Restore system using backups; and Switch voice and data telecommunications to alternate processing site. NOTIFICATION AND ACTIVATION PHASE This phase addresses the initial actions taken to detect and assess damage inflicted by a disruption to . Based on the assessment of the event, the plan may be activated by the . In an emergency, s top priority is to preserve the health and safety of its staff before proceeding to the Notification and Activation procedures. Contact information for key personnel is located in Appendix A. The notification sequence is listed below: The first responder is to notify the . All known information must be relayed to the . The is to contact the and inform them of the event. The is to instruct the Team Leader to begin assessment procedures. The is to notify team members and direct them to complete the assessment procedures outlined below to determine the extent of damage and estimated recovery time. If damage assessment cannot be performed locally because of unsafe conditions, the is to follow the outline below: Damage Assessment Procedures: [Detailed procedures should be outlined to include activities to determine the cause of the disruption; potential for additional disruption or damage; affected physical area and status of physical infrastructure; status of IT equipment functionality and inventory, including items that will need to be replaced; and estimated time to repair services to normal operations.] Upon notification from the Contingency Planning Coordinator, the Damage Assessment Team Leader is to The Damage Assessment Team is to . Alternate Assessment Procedures: Upon notification from the Contingency Planning Coordinator, the is to is to When damage assessment has been completed, the is to notify the of the results. The is to evaluate the results and determine whether the contingency plan is to be activated and if relocation is required. Based on assessment results, the is to notify assessment results to civil emergency personnel (e.g., police or fire department) as appropriate. The Contingency Plan is to be activated if one or more of the following criteria are met: will be unavailable for more than 48 hours Facility is damaged and will be unavailable for more than 24 hours Other criteria, as appropriate If the plan is to be activated, the is to notify all Team Leaders and inform them of the details of the event and if relocation is required. Upon notification from the , Team Leaders are to notify their respective teams. Team members are to be informed of all applicable information and prepared to respond and relocate if necessary. The is to notify the that a contingency event has been declared and to ship the necessary materials (as determined by damage assessment) to the alternate site. The is to notify the that a contingency event has been declared and to prepare the facility for the arrival. The is to notify remaining personnel (via notification procedures) on the general status of the incident. RECOVERY OPERATIONS This section provides procedures for recovering the application at the alternate site, whereas other efforts are directed to repair damage to the original system and capabilities. The following procedures are for recovering the at the alternate site. Procedures are outlined per team required. Each procedure should be executed in the sequence it is presented to maintain efficient operations. Recovery Goal [State the first recovery objective as determined by the Contingency Plan. For each team responsible for executing a function to meet this objective, state the team names and list their respective procedures.] Team Recovery Procedures Team Recovery Procedures Team Recovery Procedures Recovery Goal [State the second recovery objective as determined by the CP. For each team responsible for executing a function to meet this objective, state the team names and list their respective procedures.] Team Recovery Procedures Team Recovery Procedures Team Recovery Procedures Recovery Goal [State the remaining recovery objectives (as determined by the CP). For each team responsible for executing a function to meet this objective, state the team names and list their respective procedures.] RETURN TO NORMAL OPERATIONS This section discusses activities necessary for restoring operations at the s original or new site. When the computer center at the original or new site has been restored, operations at the must be transitioned back. The goal is to provide a seamless transition of operations from the to the computer center. ORIGINAL OR NEW SITE RESTORATION [Procedures should be outlined, per necessary team, to restore or replace the original site so that normal operations may be transferred. IT equipment and telecommunications connections should be tested.] Team Resumption Procedures Team Resumption Procedures CONCURRENT PROCESSING [Procedures should be outlined, per necessary team, to operate the system in coordination with the system at the original or new site. These procedures should include testing the original or new system until it is functioning properly and the contingency system is shut down gracefully.] Team Resumption Procedures Team Resumption Procedures PLAN DEACTIVATION [Procedures should be outlined, per necessary team, to clean the alternate site of any equipment or other materials belonging to the organization, with a focus on handling sensitive information. Materials, equipment, and backup media should be properly packaged, labeled, and shipped to the appropriate location(s). Team members should be instructed to return to the original or new site] Team Testing Procedures Team Testing Procedures Appendix A:  DOCPROPERTY Title \* MERGEFORMAT Contingency Plan Approval The undersigned acknowledge that they have reviewed the  DOCPROPERTY Subject \* MERGEFORMAT   DOCPROPERTY Title \* MERGEFORMAT Contingency Plan and agree with the information presented within this document. Changes to this  DOCPROPERTY Title \* MERGEFORMAT Contingency Plan will be coordinated with, and approved by, the undersigned, or their designated representatives. [List the individuals whose signatures are desired. Examples of such individuals are Business Owner, Project Manager (if identified), Designated Approving Authorities and any appropriate stakeholders. Add additional lines for signature as necessary.] Signature:Date:Print Name:Title:Role: Signature:Date:Print Name:Title:Role: Signature:Date:Print Name:Title:Role: APPENDIX B: REFERENCES [Insert the name, version number, description, and physical location of any documents referenced in this document. Add rows to the table as necessary.] The following table summarizes the documents referenced in this document. Document NameDescriptionLocation APPENDIX C: KEY TERMS The following table provides definitions and explanations for terms and acronyms relevant to the content presented within this document. TermDefinition[Insert Term] APPENDIX D: RELATED DOCUMENTS FIPS 199, Standards for Security Categorization of Federal Information and Information Systems FIPS 200, Minimum Security Requirements for Federal Information and Information Systems SP 800-18, Guide for Developing Security Plans for Federal Information Systems SP 800-30, Risk Management Guide for Information Technology Systems SP 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems SP 800-53, Recommended Security Controls for Federal Information Systems Draft SP 800-53A, Guide for Assessing the Security Controls in Federal Information Systems SP 800-55, Security Metrics Guide for Information Technology Systems SP 800-60, Guide for Mapping Types of Information and Information Systems to Security Categories SP 800-70, Security Configuration Checklists Program for IT Products: Guidance for Checklists Users and Developers SP 800-100, Information Security Handbook: A Guide for Managers      SUBJECT \* MERGEFORMAT  PAGE  Contingency Plan Template (v1.0) Page  PAGE 2 of  NUMPAGES 17 [Insert appropriate disclaimer(s)]  [Insert appropriate disclaimer(s)]  SUBJECT \* MERGEFORMAT  Contingency Plan Template (v1.0) Page  PAGE 7 of  NUMPAGES 17 [Insert appropriate disclaimer(s)]  SUBJECT \* MERGEFORMAT  Version:  DOCPROPERTY Version \* MERGEFORMAT <1.0> DOCPROPERTY "Status" \* MERGEFORMAT Error! Unknown document property name. PAGE 1 Revision Date:  DOCPROPERTY "Release Date" \* MERGEFORMAT Error! Unknown document property name. -./0IJWXYijtgZPZhkOJQJ^Jh$thAOJQJ^Jh$th"pOJQJ^J h$th"p6B*OJQJphh$th"pB*OJQJph&jh$th"pB*OJQJUphh$th"pOJQJ h$th"pCJ(OJQJ^JaJ(/h$th"p6B*CJ(OJQJ\^JaJ(ph8jh$th"p6B*CJ(OJQJU\^JaJ(ph h$thA/Y $$Ifa$gd] ,gd] gd gdAgd"p*gd"p$&dPa$gd"p$a$gd"p!gdA3 4 L M ^ _       " # : ; < B C I L ` ôôôôô̙xmah$thA5CJ^Jhm3hACJ^Jh$thA^Jjh$thAU^Jh$thACJ^J5h$thA56>*B*CJOJQJ]^JaJphh$th] 6B*^Jphh$th] ^Jh$th] OJQJ^Jh$th] 5OJQJ\jh$th] U h$th] h$th"p&    # ; &$Ifgd] &$$Ifa$gd] Ff| $$Ifa$gd] ; < = > ? :.%. &$Ifgd] &$$Ifa$gd] kd$$IfFֈ$ PH$ 0V$44 ayt] ? @ A B C D .kd$$Ifֈ$ PH$ 0V$44 ayt] &$$Ifa$gd] D E F G H I &$$Ifa$gd] &$Ifgd] I J K ` :5) $xa$gd] gd] kdo$$Ifֈ$ PH$ 0V$44 ayt] ` c # ]l01$@<<^@a$gdcc ($^a$gdA ($x^a$gdA ($ & Fxa$gdA($a$gdA ($ & Fa$gdA ($ & Fxa$gdA ($xa$gdA'/012nopqʶuku^UQU=^U'j^h h >*B*Uphh hlnh 0Jjhlnh 0JUhnxh ;^Jjhnxh ;U^Jh$thzOJQJ^J h$thzCJ$OJQJ^JaJ$'h$thz5CJ$OJQJ^J_HaJ$'h$thcc5CJ$OJQJ^J_HaJ$$h$thAB*OJQJ]^Jphh$thqKCJ^Jh$thACJ^Jh$thACJ]^J     ,-./23ӻﻲtӻ`'jRh h >*B*Uphjh Uh OJQJ_H hlnh 0JKH$OJPJQJ'jXh h >*B*Uphh hlnh 0Jjhlnh 0JUjh Ujh U h hlnh 0JKH$PJh 5;OJQJ\_HaJ%3=>?YZ[\]^_`a}~ȾȵȾȵ~sj h U'jF h h >*B*Uphj h U'jL h h >*B*Uphh hlnh 0Jh OJQJ_Hjhlnh 0JUjh Ujh U h hlnh 0JKH$OJPJQJ-_[ g*8Sy;OQR`gdRgdR  & F^gd  %&9:;UVWXYZ[\]yz{|~j h U'j: h h >*B*Uphj h Ujh U h hlnh 0JKH$OJPJQJ'j@ h h >*B*Uphh hlnh 0Jjhlnh 0JUh OJQJ_H)     +,-./0EFGabcdefghi;ޠ{k{`kޠjh Uh 5;OJQJ\_HaJhlnh 0JKH$PJ'j.h h >*B*Uphh hlnh 0Jj h Ujh U h h OJQJ_H hlnh 0JKH$OJPJQJjhlnh 0JU'j4 h h >*B*Uph$  $%&'()*+,HIJKNO_;ޠ;}ޠi'jh h >*B*Uphjh U'j"h h >*B*Uphh hlnh 0Jjh Ujh U h h OJQJ_H hlnh 0JKH$OJPJQJjhlnh 0JU'j(h h >*B*Uph)_`a{|}~234567ŭ؜Μ}؜Μrjh U'jh h >*B*Uphjh U hlnh 0JKH$OJPJQJ'jh h >*B*Uphh hlnh 0Jh OJQJ_Hjhlnh 0JUjh Ujh U h ,789:VWXY^_pqr|l|aljh Uh 5;OJQJ\_HaJhlnh 0JKH$PJ'jh h >*B*Uphjh Ujh U h hlnh 0JKH$OJPJQJ'j h h >*B*Uphh hlnh 0Jjhlnh 0JUh OJQJ_H&012LMNPQRSTUqrstuvŵŰҵŵŰ|ҵh'jh h >*B*Uphjuh U'jh h >*B*Uphj{h Ujh U h h 5;OJQJ\_HaJhlnh 0JKH$PJjhlnh 0JU'jh h >*B*Uphh hlnh 0J(:;<=@AVWXrstvwxyz{ҽ򴰴ґ򴰴}rjch U'jh h >*B*Uphjih U'jh h >*B*Uphh hlnh 0Jjoh Ujh U h h OJQJ_H hlnh 0JKH$OJPJQJjhlnh 0JU,45689:;<=YZǹǀufuUfufAǹ'h 5;OJQJ_HaJmHnHu j]h UmHnHujh UmHnHuh mHnHu*hlnh 0JOJQJ\^JmHnHu2jh h >*B*UmHnHphuh mHnHuhlnh 0JmHnHu$jhlnh 0JUmHnHuh OJQJ_Hjhlnh 0JU h jh UZ[\rstӽ~pgpMӽ< jQh UmHnHu2jh h >*B*UmHnHphuh mHnHuhlnh 0JmHnHu'h 5;OJQJ_HaJmHnHu jWh UmHnHujh UmHnHuh mHnHu*hlnh 0JOJQJ\^JmHnHu$jhlnh 0JUmHnHu2jh h >*B*UmHnHphu  ,-.HIJLMNOPQҾҰwfҾNCh$thROJQJ/jhnxh ;OJQJUaJmHnHu jKh UmHnHu*hlnh 0JOJQJ\^JmHnHu2jh h >*B*UmHnHphuh mHnHuhlnh 0JmHnHu'h 5;OJQJ_HaJmHnHu$jhlnh 0JUmHnHuh mHnHujh UmHnHuQR_`inp{|H\] ʵʵ{{{jZʵJʵh$thA6OJQJ^JaJh$thAOJQJ\]^J!h$thA5OJQJ\]^J$h$thA56OJQJ\]^Jh$thn6OJQJ^JaJ,h$thn6B*OJQJ^J_HaJph(h$thn6B*OJQJ^J_Hphh$thAOJQJ^Jh$thAOJQJ h$thAKH$OJPJQJ_Hh$thROJQJ^J`iHD U!!!!##>%M%&&''gdAgdS !$^gdS & F !$gdA & F !$gdAgdAgdcc !!!!!!!#####=%>%M%Q%S%^%_%`%%%%%%%%|k[K[h$thA6OJQJ]^Jh$thA6OJQJ^JaJ h$thAKH$OJPJQJ_Hh$thzOJQJ^Jh$thS6OJQJ^JaJh$thn6OJQJ^JaJ,h$thn6B*OJQJ^J_HaJph(h$thn6B*OJQJ^J_Hph h$thSKH$OJPJQJ_Hh$thSOJQJ^Jh$thAOJQJ^J%#&'&)&3&4&@&}&&&&&&&&&&&&&&&'''#'$'&'l'm'ɲɲɲyl\L\l\L\lh$thu< 6OJQJ]^Jh$thA6OJQJ]^Jh$thu< OJQJ^J"h$th1!6OJQJ]^JaJh$th1!6OJQJ^JaJ,h$th1!6B*OJQJ^J_HaJph,h$thn6B*OJQJ^J_HaJph(h$thn6B*OJQJ^J_Hphh$thAOJQJ^J(h$thA6B*OJQJ^J_Hphm'v'w'''''''_(`(f(i(u(((((((((( ) ))))8)E)U)V)))Ӧӑ||eUӦӑh$thn6OJQJ^JaJ,h$thn6B*OJQJ^J_HaJph(h$thn6B*OJQJ^J_Hph(h$thA6B*OJQJ^J_Hphh$thAOJQJ^JaJ h$thAKH$OJPJQJ_Hh$thu< OJQJ^Jh$thAOJQJ^Jh$thu< 6OJQJ]^Jh$thA6OJQJ]^J!''`(a((u)&**@+M++,,-f..A//Z0[00TxgdA & FgdAgdA - & FdgdA - & FdgdA  & F7$8$H$gdAgdAgdcc)))))))*#*L*[***************@+M++ηηkkηZ h$thAKH$OJPJQJ_H,h$thA6B*OJQJ^J_HaJph,h$thu< 6B*OJQJ^J_HaJphh$thAOJQJ]^Jh$thn6OJQJ^JaJ,h$thn6B*OJQJ^J_HaJph(h$thn6B*OJQJ^J_Hphh$thA6OJQJ]^Jh$thAOJQJ^J++++,,!,#,.,/,,,,,---).=.>.f.h.s.t.........$/%/5, -$$Ifa$gd1! -$Ifgd1!kd%$$Iflֈt $C/G t0m$644 layt1!===>>>> >>>*>+>,>->7>8>9>T>U>V>W>a>b>c>~>>>>ϷϦϔzϷϦϔ`ϷϦϔFϷϦ2j|( *h$thnCJOJQJU^JaJ2j' *h$thnCJOJQJU^JaJ2j<' *h$thnCJOJQJU^JaJ# *h$thnCJOJQJ^JaJ h$thnCJOJQJ^JaJ. *h$thnCJOJQJ^JaJmHnHu,j *h$thnCJOJQJU^JaJ2j& *h$thnCJOJQJU^JaJ>,>V>>> -$$Ifa$gd1!>>>>>>>>>>>>>>>>>>>>??? ?ӼgM2jZ+ *h$thnCJOJQJU^JaJ2j* *h$thnCJOJQJU^JaJ#h$thn5CJOJQJ^JaJ h$thnCJOJQJ^JaJ. *h$thnCJOJQJ^JaJmHnHu,j *h$thnCJOJQJU^JaJ2j) *h$thnCJOJQJU^JaJ# *h$thnCJOJQJ^JaJ>>>>5, -$$Ifa$gd1! -$Ifgd1!kd)$$Iflֈt $C/G t0m$644 layt1!>?+?U?? -$$Ifa$gd1! ? ??)?*?+?,?6?7?8?S?T?U?V?`?a?b?}?~?????ϷϦϔzϷϦϔ`ϷϦNϔ#h$thn5CJOJQJ^JaJ2j:- *h$thnCJOJQJU^JaJ2j, *h$thnCJOJQJU^JaJ# *h$thnCJOJQJ^JaJ h$thnCJOJQJ^JaJ. *h$thnCJOJQJ^JaJmHnHu,j *h$thnCJOJQJU^JaJ2j+ *h$thnCJOJQJU^JaJ????5, -$$Ifa$gd1! -$Ifgd1!kd-$$Iflֈt $C/G t0m$644 layt1!???????????????????@@ @ @ @(@)@*@+@ϷϦϔzϷϦϔ`ϷϦϔFϷϦ2j0 *h$thnCJOJQJU^JaJ2j0 *h$thnCJOJQJU^JaJ2jx/ *h$thnCJOJQJU^JaJ# *h$thnCJOJQJ^JaJ h$thnCJOJQJ^JaJ. *h$thnCJOJQJ^JaJmHnHu,j *h$thnCJOJQJU^JaJ2j. *h$thnCJOJQJU^JaJ??@*@T@ -$$Ifa$gd1!+@5@6@7@R@S@U@W@X@b@c@d@@@@@@@@@@@@@ӼgM2j3 *h$thnCJOJQJU^JaJ2j2 *h$thnCJOJQJU^JaJ#h$thn5CJOJQJ^JaJ h$thnCJOJQJ^JaJ. *h$thnCJOJQJ^JaJmHnHu,j *h$thnCJOJQJU^JaJ2jX1 *h$thnCJOJQJU^JaJ# *h$thnCJOJQJ^JaJT@U@W@@5, -$$Ifa$gd1! -$Ifgd1!kd1$$Iflֈt $C/G t0m$644 layt1!@@@@)A -$$Ifa$gd1!@@@@@@@@@@@@@A A A A'A(A*A-A.A8AϷϦϔzϷϦϔ`ϷϦNϔ#h$thn5CJOJQJ^JaJ2jv5 *h$thnCJOJQJU^JaJ2j4 *h$thnCJOJQJU^JaJ# *h$thnCJOJQJ^JaJ h$thnCJOJQJ^JaJ. *h$thnCJOJQJ^JaJmHnHu,j *h$thnCJOJQJU^JaJ2j64 *h$thnCJOJQJU^JaJ)A*A-AWA5, -$$Ifa$gd1! -$Ifgd1!kd6$$Iflֈt $C/G t0m$644 layt1!8A9A:AUAVAWAXAbAcAdAAAAAAAAAAAAAAAAAAAϷϦϔzϷϦϔ`ϷϦϔFϷϦ2j8 *h$thnCJOJQJU^JaJ2jT8 *h$thnCJOJQJU^JaJ2j7 *h$thnCJOJQJU^JaJ# *h$thnCJOJQJ^JaJ h$thnCJOJQJ^JaJ. *h$thnCJOJQJ^JaJmHnHu,j *h$thnCJOJQJU^JaJ2j7 *h$thnCJOJQJU^JaJWAAAAA -$$Ifa$gd1!AAAAAABBBBBBBCCӼu^Ku^4'h$thnOJQJ^J,h$thA6B*OJQJ^J_HaJph%h$thA6>*OJQJ]^JaJ,h$thn6B*OJQJ^J_HaJphh$thAOJQJ^J h$th1!KH$OJPJQJ_H h$thnCJOJQJ^JaJ. *h$thnCJOJQJ^JaJmHnHu,j *h$thnCJOJQJU^JaJ2j9 *h$thnCJOJQJU^JaJ# *h$thnCJOJQJ^JaJABBB D50)$gdAxgdAgd1!kd4:$$Iflֈt $C/G t0m$644 layt1!C$C1C2ClCvCCCCCCC D DDDDDEEEFFIIKKMMMINWNNNudddWdh$thzOJQJ^J h$thAKH$OJPJQJ_H!h$thAB*OJQJ^JphT h$thA6B*CJ_Hph h$thn6B*CJ_Hph,h$thA6B*OJQJ^J_HaJphh$thA6OJQJ]^Jh$thnOJQJ^J,h$thn6B*OJQJ^J_HaJphh$thAOJQJ^J! DDEEEFFII KKKK!MSMuMMMM_OgdcV$<x^a$gdz$ & F<xa$gdA$ & F<xa$gdAgdccgdccxgdARgdAxgdngdA;gdANNNNNOPPBPdPePjPkPzP{P~PPPPPP/QHQ9RQRRRRRTT˺⣺⣓|ˣ˓kZS h$thA h$thA6B*CJ_Hph h$thA6B*CJaJphT,h$thu< 6B*OJQJ^J_HaJphh$thA6OJQJ]^J,h$th^E6B*OJQJ^J_HaJph!h$thAB*OJQJ^JphT,h$thA6B*OJQJ^J_HaJphh$thAOJQJ^J h$thAOJQJ^J_HaJ_O`OOfP+QrRRTnTTTUCUUwV+W,WWWX$X & FgdA & F gdA & F gdA & F gdA; & F 7$8$H$gdA & FgdA & F xgdAxgdAgdATTTTTUUU;U*OJQJ]^J#%e4ePe_e{eeg g9gHgagg>i;ji;jujvjjjjkkk̷̷̷󦒦󦄦󦄦uueh$thAOJQJ\^J_Hh$thAOJQJ^JaJh$thA5OJQJ^J'h$thA56B*OJQJ^Jph!jh$thAOJQJU^J(jh hAOJQJU\^J_Hh hAOJQJ\^J_H h$thAh$thA6OJQJ]^Jh$thAOJQJ^J'GjHjNjOjPj\j]j^j_jVI $IfgdAkd2;$$Ifl\k$O t0t"44 laytA $IfgdA_j`jgjhjijjj_RIII $IfgdA $IfgdAkdU<$$Ifl\k$O t0t"44 laytAjjkjqjrjsjtj_RIII $IfgdA $IfgdAkdj=$$Ifl\k$O t0t"44 laytAtjujvjjjjj_ZMDDD $IfgdA $IfgdAgdAkdc>$$Ifl\k$O t0t"44 laytAjjjjjj_RIII $IfgdA $IfgdAkd\?$$Ifl\k$O t0t"44 laytAjjjjjj_RIII $IfgdA $IfgdAkd@$$Ifl\k$O t0t"44 laytAjjjjjj_RIII $IfgdA $IfgdAkdA$$Ifl\k$O t0t"44 laytAjjjjjjj_ZMDDD $IfgdA $IfgdAgdAkdB$$Ifl\k$O t0t"44 laytAjjjjjj_RIII $IfgdA $IfgdAkdC$$Ifl\k$O t0t"44 laytAjjjjjj_RIII $IfgdA $IfgdAkdD$$Ifl\k$O t0t"44 laytAjjjjjj_RIII $IfgdA $IfgdAkdE$$Ifl\k$O t0t"44 laytAjjjkkk_ZNI@7@^@gdA,gdA K$<<a$gd #gdAkdF$$Ifl\k$O t0t"44 laytAkk l ltlulxlyl|lllm.m/mr?rMrNrOrPrtllXlA,h2h1!56CJOJQJ\]^JaJ&h h 56CJOJQJ^JaJjh1!U h2h1!CJOJQJ^JaJ,hkh1!6B*CJOJQJ^JaJph&h1!6B*CJOJQJ^JaJphh:h\3j2Oh\3Uh1! hm3hm3CJOJQJ^JaJ&hm36B*CJOJQJ^JaJph,hkhm36B*CJOJQJ^JaJphqqqqr#r$rOrPrrrrkslsws~&`#$ !$&dP^$ !H$$dNa$gd$ i$ !$&dP^a$gd2$ !H$$dNa$gd2$ !H$$dNa$gdm3Prprrrvrwrxr~rrrrrrrrrrrrrrϽ~~nZCZ,hkh1!6B*CJOJQJ^JaJph&h1!6B*CJOJQJ^JaJphh1!0JMCJOJQJ^JaJ)h|(0JMCJOJQJ^JaJmHnHu$h h1!0JMCJOJQJ^JaJ-jh h1!0JMCJOJQJU^JaJ#h h1!5CJOJQJ^JaJ#h h1!CJOJQJ\^JaJh1!CJOJQJ\^JaJh|(CJOJQJ\^JaJrrrrrrrrrrrssssssBsCsisjskslsmssstsusvswsssssssssssʤ}r}ʤʤnhc#sh1!0JMmHnHu h1!0JMjh1!0JMUh1!56CJ\]h 6CJ\aJjh1!56CJUaJh h 6CJ\aJh1!6CJaJh1!56CJaJh h 56CJaJjh1!Uh1! h$ ih1!CJOJQJ^JaJ&wsssss & F7$8$H$gdAh$d N ]hss h$thCJOJQJ^JaJ9 0&P1h:p2/ =!"#$% 9 0&P1h:pR/ =!"#$% 6&P1h:pR/ =!"#$% z$$If!vh555555 #v#v#v#v#v#v :V  <0V$555555 4 p<yt] kd$$Ifֈ$ PH$ <0V$44 ap<yt] $$If!vh555555 #v#v#v#v#v#v :V F0V$555555 4 yt] $$If!vh555555 #v#v#v#v#v#v :V 0V$555555 4 yt] $$If!vh555555 #v#v#v#v#v#v :V 0V$555555 4 yt] }DyK _Toc237743446}DyK _Toc237743446}DyK _Toc237743447}DyK _Toc237743447}DyK _Toc237743448}DyK _Toc237743448}DyK _Toc237743449}DyK _Toc237743449}DyK _Toc237743450}DyK _Toc237743450}DyK _Toc237743451}DyK _Toc237743451}DyK _Toc237743452}DyK _Toc237743452}DyK _Toc237743453}DyK _Toc237743453}DyK _Toc237743454}DyK _Toc237743454}DyK _Toc237743455}DyK _Toc237743455}DyK _Toc237743456}DyK _Toc237743456}DyK _Toc237743457}DyK _Toc237743457}DyK _Toc237743458}DyK _Toc237743458}DyK _Toc237743459}DyK _Toc237743459}DyK _Toc237743460}DyK _Toc237743460}DyK _Toc237743461}DyK _Toc237743461}DyK _Toc237743462}DyK _Toc237743462}DyK _Toc237743463}DyK _Toc237743463}DyK _Toc237743464}DyK _Toc237743464}DyK _Toc237743465}DyK _Toc237743465}DyK _Toc237743466}DyK _Toc237743466}DyK _Toc237743467}DyK _Toc237743467}DyK _Toc237743468}DyK _Toc237743468}DyK _Toc237743469}DyK _Toc237743469}DyK _Toc237743470}DyK _Toc237743470$$If!vh555C55/5G#v#v#vC#v#v/#vG:V l4  t<0m$6,555C55/5G/ p<yt1! kd$$Ifl4ֈt $C/G  t<0m$644 lap<yt1!D<Click here and enter data>D<Click here and enter data>D<Click here and enter data>D<Click here and enter data>D<Click here and enter data>$$If!vh555C55/5G#v#v#vC#v#v/#vG:V l t0m$6555C55/5G/ yt1!D<Click here and enter data>D<Click here and enter data>D<Click here and enter data>D<Click here and enter data>D<Click here and enter data>$$If!vh555C55/5G#v#v#vC#v#v/#vG:V l t0m$6555C55/5G/ yt1!D<Click here and enter data>D<Click here and enter data>D<Click here and enter data>D<Click here and enter data>D<Click here and enter data>$$If!vh555C55/5G#v#v#vC#v#v/#vG:V l t0m$6555C55/5G/ yt1!D<Click here and enter data>D<Click here and enter data>D<Click here and enter data>D<Click here and enter data>D<Click here and enter data>$$If!vh555C55/5G#v#v#vC#v#v/#vG:V l t0m$6555C55/5G/ yt1!D<Click here and enter data>D<Click here and enter data>D<Click here and enter data>D<Click here and enter data>D<Click here and enter data>$$If!vh555C55/5G#v#v#vC#v#v/#vG:V l t0m$6555C55/5G/ yt1!D<Click here and enter data>D<Click here and enter data>D<Click here and enter data>D<Click here and enter data>D<Click here and enter data>$$If!vh555C55/5G#v#v#vC#v#v/#vG:V l t0m$6555C55/5G/ yt1!!$$If!vh5O555#vO#v#v#v:V l t0t"5O555/ / / / / /  / aytA$$If!vh5O555#vO#v#v#v:V l t0t"5O555/ / / / / / aytA$$If!vh5O555#vO#v#v#v:V l t0t"5O555/ / / / aytA$$If!vh5O555#vO#v#v#v:V l t0t"5O555/ / / / aytA!$$If!vh5O555#vO#v#v#v:V l t0t"5O555/ / / / / /  / aytA$$If!vh5O555#vO#v#v#v:V l t0t"5O555/ / / / / / aytA$$If!vh5O555#vO#v#v#v:V l t0t"5O555/ / / / aytA$$If!vh5O555#vO#v#v#v:V l t0t"5O555/ / / / aytA!$$If!vh5O555#vO#v#v#v:V l t0t"5O555/ / / / / /  / aytA$$If!vh5O555#vO#v#v#v:V l t0t"5O555/ / / / / / aytA$$If!vh5O555#vO#v#v#v:V l t0t"5O555/ / / / aytA$$If!vh5O555#vO#v#v#v:V l t0t"5O555/ / / / aytA$$If!vh5 5 5O#v #v #vO:V F  t065Q554 pytAT$$If!vh5 5 5O#v #v #vO:V  t065Q554 ytAT$$If!vh5 5 5O#v #v #vO:V F t065Q554 ytAT$$If!vh5 5 5O#v #v #vO:V F t065Q554 ytAT$$If!vh5 5#v #v:V   t065F5B4 pytA$$If!vh5 5#v #v:V F t065F5B4 ytA$$If!vh5 5#v #v:V F t065F5B4 ytA$$If!vh5 5#v #v:V F t065F5B4 ytADd >  # ?"@@Dd >  # ?"@@Dd >  # ?"@@DdFN  C *AuntitledR -bHp.f/vO0F-bHp.f/JFIF``C     C   ZR" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?Sj-vR8aR7Ȑ*cOQM+ /W9gDSxr+,ӡ@#( Y([ qZm71=Ehtu=Uxa;M 2;9|4֖qH0aJG ȋ 2]IEI{oS/\)==cZR|nl.J*5"GK.-tr*}54RRٚQEAA^q=O+[]cNT嵜ٙZ9s,rQ*-nwk,3̖E'/ݫ8]!CRx.|1c}˱MCxs@Ϋ|P dK9%Ljz-f2'NVP,08$NI$I$O$MKE;`(͇OUtHkV(a@2Y݈ I+~>;_wZxTW^Z@N3# l7(capu1MVzE+˹ws SOm>_ıjzxSB4m$)-e1;/fu]\^j"խfmd"o13Im ֒Wl"M+oQ%?2>s3)8{peNj[|u=47~"ӎ$ ,C6@,@؅E t}o]`t9bv(X;,#Hc2y;Ğ9ci'¿S~!k6XpUb0 @>DܬF]otK+ÛqrnVj]o=_]k7~"T_|B^G%w9Pz|~2 JZ쩴=H''9'(+2Km%\G/^xXl#`t'(  1H#fd q_ަ~⯄񗆠^[Q 0 yf"Q${8KI%+:16ߕv??ZMyŸ\ݶ~?Ҵ'}:3J =!G̨i$Er1 Կ~O >o*vo6XDĞ2v5ÝC!$,w;A1}~0w^._Дe$vU*n7NK]qi)Z| Lzk$d$ќ1*_)<_%wĉ VPN9r#P Ŗb=aur+G4S"s$H2Q8$gh,^Y/OlS5 In&B˷K6a+oSm]<.hOPC# 2 kZrQz3yѵ?X-};Ǹ!WG(eee A^Q{c|+5hmd٦iJƑĩkiL(FuMLu9 rܤsDXô^fM#A`d~SU*Np?E~Yh mcoblE1Ĺ΅dA¾51 ^/>QyG3i2̑]@$Qc)R$'Y#u !A+|{K P[@Mw; 8'# j'̞T_cZ)9h]ÿ^ $h )scgyM=W%y%ۡDn>NkmTiAƺ4im&&u˛ A#mfgm0Bw16{*[A%̯y؃Gí{7<,45-&9w$s#Wˇ-d -}iʕ7ZoywetY?&Tvo[髋x IJI]H#qz>jv=>80!d݂ .k:5'{dkTQEfPQEW5|:5V=wr|,/B"9h]%IYo>k :ZŨqws>mLKmz9HVE%@ T/S"~Hӯlx;PK@eesNn;C(c*Ӝj'vT!8_ݧ~%hvoKB{--C#C/3';nݹ>_A,4K˧[%[v8aZTWK76E*5J*7Q\EPfl xxx0hH2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XVxOJQJ_HmH nH sH tH @`@ /CPNormalCJ_H aJmH sH tH f@f /CP Heading 1$ & F<@&"5CJ KH OJPJQJ\^JaJ h@h /CP Heading 2$ & F<@&$56CJOJPJQJ\]^JaJb@b U/CP Heading 3$ & F<@&5CJOJPJQJ\^JaJVV V/CP Heading 4$ & F<@&5CJ\^JaJXX W/CP Heading 5 & F<@&56CJ\]^JaJNN X/CP Heading 6 & F<@&5CJ\aJ@@ Y/CP Heading 7 & F<@&FF Z/CP Heading 8 & F<@&6]X X [/CP Heading 9 & F<@&CJOJPJQJ^JaJDA`D Default Paragraph FontRi@R 0 Table Normal4 l4a (k ( 0No List VV /CPHeading 1 Char"5CJ KH OJQJ\^J_H aJ XX /CPHeading 2 Char$56CJOJQJ\]^J_H aJ6U@6 ;H0 Hyperlink >*B*ph4@"4 ;HHeader !4 @24 ;HFooter !V>@V \/CPTitle$<@&a$5CJ KHOJPJQJ\aJ @"@ ;HCaption$56CJ\aJ<C@b< ;HBody Text Indent\@\"ppTOC 1  $ ^ 5;OJQJ\aJmHnHuD@D;HpTOC 2 $ ^ mHnHuD@D;HpTOC 3 T$ ^ mHnHu@@@ wpTOC 4p$ ^ 5;aJ** ;HTOC 5^** ;HTOC 6^** ;HTOC 7^** ;HTOC 8^** ;HTOC 9^NON ;Htabletxt 7$8$H$^ CJ^JaJO "p Title Cover5!$$$ d$d0N0a$5@CJ4KHOJQJ^JaJrO2r ;HSubtitle Cover'"dNa$5@CJ0OJQJ2B@22 $;H Body Text#xLAL #o{Body Text CharCJ_HaJmH sH tH BO!RB ;HSubtitle Cover2%@CJ$ZObZ ;H Tabletext&$d1$^a$CJOJQJaJfqf (<$Instructions Char,6B*CJOJQJ_HaJmH phsH tH `O1` '<$ Instructions(M a$6B*OJQJphhh ;H Paragraph2)dP1$^!B*CJOJQJaJmH phsH OQ ;H(Style Subtitle Cover2 + Top: (No border) *N CJ OJQJbb ,b. InfoBlue Char06B*CJOJQJ^J_HaJmH phsH tH DO12D +b.InfoBlue,6B*OJQJ^Jph`o` 2Default-d7$8$H$!B*CJ_H aJmH phsH tH HH ;H Balloon Text.CJOJQJ^JaJB'B ;HComment ReferenceCJaJ<< ;H Comment Text0CJaJ@j@ ;HComment Subject15\B"B ;H Resume Body 2x^a$CJVP2V ;H Body Text 23^a$CJOJQJ^JaJJ^BJ ;H Normal (Web)4dd[$\$^a$*WQ* /CP`Strong5\FVaF ;HFollowedHyperlink >*B* ph>Q@r> ;H Body Text 37^0a0 ;H HTML Cite6]x/x ;HTableColumnHeading9$d<<a$#5CJOJQJ_H aJmH sH tH b/b ;H TableText,tt:d(( CJOJQJ_H aJmH sH tH dR@d ;HBody Text Indent 2;x^a$CJOJQJ^JaJTT ;H Table header<^a$5CJOJQJ\\ ;H PageTitle=xx@&^a$5B*CJ OJQJaJphz/z 9'7 Table Heading!>$d<<G$^a$#5CJOJQJ_H aJmH sH tH VV ;H Table 10 Text?^a$CJOJQJaJRR ;H Text Bold@^a$5CJOJQJaJ\\ ;HText UnderBoldA^a$>*CJOJQJaJ\1"\ ;HBody Text KeepB$d^8a$ OJQJaJ~2~ ;HSection Heading(C$ FdM &`8;@CJEHKHPJ\aJ1B ;H narrat style5D$$d@& M ]c^V`a$6@CJEHKHOJQJLRL ;H form textEx^a$56CJaJBqbB ;H table headingF<6CJVrV ;Hform text - smallG^a$CJaJRR ;HBullet 1 HT^T`a$OJQJRR;H Table TextI5$7$8$9DG$H$5mHnHu:_: ;H HTML Acronym B*phfff<O< ;HAppendixK^ 5CJaJll ;H article-textLdd[$\$^a$!B*CJOJPJQJ^JaJph.)@. ;H Page Number^^\;H EmailStyle781,56B*CJOJQJ\]^JaJo(ph<< ;HbodyOx^ aJmH sH zz C Table Grid7:VP0P<<^@a$|/| ReferenceList(Q dxx^` CJOJQJ_H aJmH sH tH PS@"P S1SoBody Text Indent 3 Rx^hCJaJN1N R1SoBody Text Indent 3 CharCJaJ^OB^ 1So col bullet,cbTPP^`a$ OJQJaJRQR /CPHeading 3 Char5CJOJQJ\^J_H aJJaJ /CPHeading 4 Char5CJ\^J_H aJPqP /CPHeading 5 Char56CJ\]^J_H aJFF /CPHeading 6 Char5CJ\_H aJ@@ /CPHeading 7 Char CJ_H aJFF /CPHeading 8 Char6CJ]_H aJLL /CPHeading 9 CharCJOJQJ^J_H aJJJ /CP Title Char5CJ KHOJPJQJ\aJ FJF ^/CPSubtitle]$<@&a$ OJPJQJFF ]/CP Subtitle CharCJOJPJQJaJ:X: /CP@Emphasis56OJQJ]44 /CP No Spacing`aJ DD /CP List Paragraph a^m$** c/CPQuoteb6818 b/CP Quote Char 6CJaJPP e/CP Intense Quoted]^ 56aJFQF d/CPIntense Quote Char 56CJB!aB /CP0Subtle Emphasis 6B*phZZZJqJ /CPPIntense Emphasis56>*CJaJDD /CPSubtle Reference >*CJaJDD /CPIntense Reference 5>*CJFF /CP Book Title56CJOJPJQJaJ: : /CPp TOC Headingk@& ^JPK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] Rk > ;> v> 8Ch3_7ZQ %m')+?/m1#8<9==> ??+@@8AACNTW@[]H`bGgkoqqPrrss:<CDEGHIJKLMNOPQSTUWXY[\^_acfhjmoqsuwxz{}~ ; ? D I ` `'09=>>>??T@@)AWAA D_O$X_%eGj_jjjtjjjjjjjjjk lxl|l.m~mmmoqwss;=>?@ABFRVZ]`bdegiklnprtvy|-/IW3L^1 n o  . > Z \ ] _  :VXY[{   -Fbdeg %'(*J`|~3568Xq1MPQSs<Wsvwy589;[s-ILMO55+5-595U5W5c5555555555666*6,686T6V6b6~66666666667 7)7+777S7U7a7}77777777778 8(8*868R8W8c888888888888 9'9-999U9W9c99999999999n____```C`T````kUU X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%̕FFFFFFFFFFFFFtFFFFFFFFFFFFFFFFFUUUU &58?jqsx&-/4?Bh"$5c!!!UU!Ud0# AA@H 0(  0(  B S  ? _Toc521978636 _Toc523878296 _Toc237662435 _Toc237662688 _Toc237662812 _Toc237743164 _Toc237662436 _Toc237662689 _Toc237662813 _Toc237743165 _Toc237662437 _Toc237662690 _Toc237662814 _Toc237743166 _Toc237743167 _Toc106079533 _Toc237412935 _Toc237661115 _Toc237661180 _Toc237662438 _Toc237743168 _Toc237743446 _Toc237412936 _Toc237661116 _Toc237661181 _Toc237662439 _Toc237743169 _Toc237743447 _Toc237661117 _Toc237661182 _Toc237662440 _Toc237743170 _Toc237743448 _Toc237412937 _Toc237661118 _Toc237661183 _Toc237662441 _Toc237743171 _Toc237743449 _Toc237412938 _Toc237661119 _Toc237661184 _Toc237662442 _Toc237743172 _Toc237743450 _Toc237412939 _Toc237661120 _Toc237661185 _Toc237662443 _Toc237743173 _Toc237743451 _Toc237661121 _Toc237661186 _Toc237662444 _Toc237743174 _Toc237743452 _Toc237412940 _Toc237661122 _Toc237661187 _Toc237662445 _Toc237743175 _Toc237743453 _Toc237412941 _Toc237661123 _Toc237661188 _Toc237662446 _Toc237743176 _Toc237743454 _Toc237412942 _Toc237661124 _Toc237661189 _Toc237662447 _Toc237743177 _Toc237743455 _Toc237412943 _Toc237661125 _Toc237661190 _Toc237662448 _Toc237743178 _Toc237743456 _Toc237412944 _Toc237661126 _Toc237661191 _Toc237662449 _Toc237743179 _Toc237743457 _Toc237412945 _Toc237661127 _Toc237661192 _Toc237662450 _Toc237743180 _Toc237743458 _Toc237412946 _Toc237661128 _Toc237661193 _Toc237662451 _Toc237743181 _Toc237743459 _Toc237412947 _Toc237661129 _Toc237661194 _Toc237662452 _Toc237743182 _Toc237743460 _Toc237412948 _Toc237661130 _Toc237661195 _Toc237662453 _Toc237743183 _Toc237743461 _Toc237412949 _Toc237661131 _Toc237661196 _Toc237662454 _Toc237743184 _Toc237743462 _Toc237412950 _Toc237661132 _Toc237661197 _Toc237662455 _Toc237743185 _Toc237743463 _Toc237412951 _Toc237661133 _Toc237661198 _Toc237662456 _Toc237743186 _Toc237743464 _Toc237412952 _Toc237661134 _Toc237661199 _Toc237662457 _Toc237743187 _Toc237743465 _Toc237412953 _Toc237661135 _Toc237661200 _Toc237662458 _Toc237743188 _Toc237743466 _Toc136837066 _Toc208031602 _Toc107027580 _Toc107027790 _Toc237412954 _Toc237661136 _Toc237661201 _Toc237662459 _Toc237743189 _Toc237743467 _Toc208031603 _Toc237661137 _Toc237661202 _Toc237662460 _Toc237743190 _Toc237743468 _Toc106079534 _Toc107027581 _Toc107027791 _Toc208031604 _Toc237661138 _Toc237661203 _Toc237662461 _Toc237743191 _Toc237743469 _Toc208031605 _Toc237661139 _Toc237661204 _Toc237662462 _Toc237743192 _Toc237743470_PictureBulletsJJJJYYYY 1 1 1 1 RR``````>>>>>>@#@#@#@#@#))))))////////////111111::::::>>>>>>AAAAAACCCCCCEEEEEESSSSSSYYYYYYZZZZZZ[[[[[[{]{]{]{]{]{]b_b_b_b_b_b_b_b_b_b_bbbbbbdddddddddeeeeeeMik   !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~----WWWW  ^^^^^^ggggggKKKKKKK#K#K#K#K#))))))//////!0!0!0!0!0!0111111::::::>>>>>>AAAAAACCCCCCEEEEEESSSSSS.Y.Y.Y.Y.Y.YZZZZZZ\\\\\\]]]]]]________cccccccccdddddddddeeeeeePik.{8Yk#Yk9*urn:schemas-microsoft-com:office:smarttagsplace MiPiQiQiSiSiTiTiViWiYiZi\ii$jNjjjjkkjkkkkkMiPiQiQiSiSiTiTiViWiYiZi\ii$jNjjjjkkjkkkkk > ] :Y Fe (IJ`6WXq1Qrs;<Ww9Z[s -M + +MiPiQiQiSiSiTiTiViWiYiZi\iiiiiiiNjPjpjwjjjjjjjkkjklkvkkkk + +MiPikWi%  @ _H= Ts}3 U8df;WDm#tޞ$B[QE&9;6x & >; ,@b>m%_LZgȢk`x9g`_Hc&4wJ ezT3j (Snj-,Cp0=r S(z:bg2J(a P^`PhH @^@`hH. 0^`0hH.. `^``hH... ^`hH .... ^`hH ..... ^`hH ......  `^``hH.......  0^0`hH........ ^`OJ QJ o( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(h^`OJQJo(hHh^`OJ QJ ^J o(hHoh ^ `OJ QJ o(hHh ^ `OJQJo(hHhP^P`OJ QJ ^J o(hHoh ^ `OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^J o(hHoh^`OJ QJ o(hH^`B*OJ QJ o(ph^`OJ QJ ^J o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJ QJ ^J o(o ^`OJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o PP^P`OJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJ QJ ^J o(o ^`OJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o PP^P`OJ QJ o( h^`OJ QJ o(^`56B*CJOJ QJ o(pho pp^p`OJ QJ o( @ @ ^@ `OJQJo(   ^ `OJ QJ o( ^`OJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o PP^P`OJ QJ o( ^`OJ QJ o(^`OJPJQJ^Jo(  pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o( ^`OJ QJ o( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o( h^`OJ QJ o(^`56B*CJOJ QJ o(pho pp^p`OJ QJ o( @ @ ^@ `OJQJo(   ^ `OJ QJ o( ^`OJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o PP^P`OJ QJ o( ^`OJ QJ o( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o( ^`OJ QJ o(88^8`56B*CJOJ QJ o(pho pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o( h^`OJ QJ o(8^`56B*CJOJ QJ o(pho pp^p`OJ QJ o( @ @ ^@ `OJQJo(   ^ `OJ QJ o( ^`OJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o PP^P`OJ QJ o("^`56B*CJOJQJaJo(ph.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L. h^`OJ QJ o(^`56B*CJOJ QJ o(pho pp^p`OJ QJ o( @ @ ^@ `OJQJo(   ^ `OJ QJ o( ^`OJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o PP^P`OJ QJ o( ^`OJ QJ o(^`OJPJQJ^Jo(- pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o( ^`OJ QJ o(^`56B*CJOJ QJ o(pho pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o( ^`OJ QJ o( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(h^`OJQJo(hHh^`OJ QJ ^J o(hHoh ^ `OJ QJ o(hHh ^ `OJQJo(hHhP^P`OJ QJ ^J o(hHoh ^ `OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^J o(hHoh^`OJ QJ o(hH ^`OJQJo( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o( ^`OJ QJ o( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o( ^`OJ QJ o(88^8`56B*CJOJ QJ o(pho pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o( h^`OJ QJ o( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(   ^ `OJ QJ o( ^`OJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o PP^P`OJ QJ o( ^`OJ QJ o(88^8`56B*CJOJ QJ o(pho pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(Z(SndS(z,Cp$[QE&J e& >g`@ s}3 2=r ,@ck`9;m%_LDm#3j= Wi                   r|                 ֗tbb  D     >p4                ֗tbb  D              tbb       ֗tbb  D    zt        ֗tbb  D             tbb                                            tbb       ֗jw  D     ܒ        @ @ @ @^ikx2\XVjT(JkxVJ2\^61q#`EpDU #v^ u< ] d | , 1w \j n  + h?H^ 4P6II /]p?E_uqXX5;&nZt8$IS'4MXMC C !1!;! E"U"W"m\"c###So#<$sI$,&n"'|(ou)**#*[*a*jw*+'+,---Z-y-1 .b.J/S>09J022m3;3W 4e)4 h4}46G69'7{7F"8/89::u;"<V<i=p{>(-?UT?C@^j@oApBm/C0DKDuDE^EtrF{F@G;HGHIsXIT]JYqJqK\L NNuN5Ov>OcOP(P/CPSPcQ RtR.R[7TkgTcUdUCVpSVcVhVV W,}WkHYk]kalD mRmnnAo1Somo=prsc#s}s$tKu>Ev%*wL y2z |~A5V 0 W24q1,Szy'+DQT"e2?CP E\IQXX "h?]c-AQQ| 368S,g6uBac1G2nUIp"p|rdxA9Hll':J^T[7K|w~b:iR*ro{@Nf[GY)"+D.YhdhSa-{{2TOrPTs| *X1OXZ\~@['V![#u=B:vM%:`%sA[a{+$r>FhDjm:J<\33[7 8!}Q%r(n&rGxqN:|@"cBLd.eD#MsfX.LHt4@zf0:o/p37 aNl 3sb|f 66dI,13p50R;g52uosHu|~7^'"FPRT@[y }& H  e"!(E ,1P7/_Ca4oh-w2U4ikv.RRcc=_,<j&k3K&N} "Oe4?bQiSi@kh@Unknown G*Ax Times New Roman5Symbol3. *Cx ArialI. ??Arial Unicode MS7.{ @Calibri7K@Cambria5. *[`)TahomaABook Antiqua7. [ @Verdana;Wingdings?= *Cx Courier NewA BCambria Math"1h*ZF؆BȦY5Y5!4dii 2qHX ?Mi2! xxContingency Plan Template<Project Name> EPLC Template HHS EPLC TeamNancyh                  Oh+'0 $0 P \ h tContingency Plan TemplateHHS EPLC TeamEPLC TemplateNormalNancy3Microsoft Office Word@@4Ff@@.!Y՜.+,D՜.+,L hp|  5i ! Titlex0jrN^ _PID_HLINKSVersion IssueDateA50_Toc23774347050_Toc23774346950_Toc23774346850_Toc23774346750_Toc23774346650_Toc2377434655}0_Toc2377434645w0_Toc2377434635q0_Toc2377434625k0_Toc2377434615e0_Toc2377434605_0_Toc2377434595Y0_Toc2377434585S0_Toc2377434575M0_Toc2377434565G0_Toc2377434555A0_Toc2377434545;0_Toc237743453550_Toc2377434525/0_Toc2377434515)0_Toc2377434505#0_Toc23774344950_Toc23774344850_Toc23774344750_Toc237743446<1.0>  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&()*+,-.0123456;<=K@ABCDEFGHIJRoot Entry FDAH!?Data _1TableWordDocument>SummaryInformation('DocumentSummaryInformation8/MsoDataStore?G!J"H!JJB2OJV==2 ?G!9G!Item  PropertiesO14EKPPR==2 ?G!@H!Item  PropertiesAmFB0EKLB2L==2?G!J"H!Item OPropertiesSU  !"#$%&'()*+,-./0123456789:;<=>?@BCDEFGHIJKLMNPQRTUVWXZDocumentLibraryFormDocumentLibraryFormDocumentLibraryForm This value indicates the number of saves or revisions. The application is responsible for updating this value after each revision.   F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89qCompObjYy