ࡱ>  +@bjbj[[ o998| | $PJtC0j///////$%24|//4/$t t t |/t /t t Vh()0vL) /0<C0X)xS5fS5))S5p+$t // hC0S5| : Introduction May 2017 Update To utilize a cloud computing model that receives processes, stores, or transmits FTI, the agency must notify the Office of Safeguards at least 45 days prior to transmitting FTI into a cloud environment. The IRS strongly recommends that a state agency planning on implementing a cloud computing environment contact the Office of Safeguards at HYPERLINK "mailto:SafeguardReports@irs.gov" \o "Safeguard Reports Email Link"SafeguardReports@irs.gov to schedule a conference call to discuss the details of the planned cloud computing implementation. The agency should be prepared to discuss the requirements below with respect to their cloud computing environment. The purpose of this document is to provide requirements for the information and documentation to include in the written notification to the IRS Office of Safeguards. This process will be used to assist the IRS in understanding and evaluating the state agencies cloud computing plans for compliance with IRS Publication 1075, and help ensure agencies build Publication 1075 security requirements into cloud computing environments. How to Complete This Document Agencies should review the security controls and compliance inquiries included below and provide their complete response in Part 1 of the form. This is a standalone form which will be evaluated on its own merit. Please ensure that all information is written out to address each control. The IRS cannot accept any responses that reference other documents. This includes but not limited to SSR, CAP responses, Agency Policy and Procedures, NIST, etc. However, this information may be transposed into this document. All submissions should be sent to the IRS Safeguards mailbox (SafeguardReports@irs.gov) with the subject line: Cloud Computing Notification. The information requested through this document is not meant to be all-encompassing and the IRS may require additional information from the agency in order to evaluate the planned data warehouse implementation. Document Workflow The IRS will evaluate the agencys submission and complete Part 2 of the form. Upon submission of the table below, agencies may be contacted by the IRS Office of Safeguards for additional information or discussion based upon the information provided about the cloud computing environment. After the agencys transition to a cloud environment, Safeguards will assess compliance with Publication 1075 requirements for cloud computing environments during subsequent onsite Safeguard review. Cloud Computing Notification Requirements Cloud Computing Notification Form Part 1Date:Agency:POC Name:POC Title:POC Phone / Email:[Please use this format (XXX) XXX-XXXX / E-Mail]POC Site / Location:Site / Location FTI: #Security ControlCompliance InquiryRequirementsAgency Response1System and Services AcquisitionWhat services are the agency requesting from the cloud providers (e.g., email, document storage/management, application hosting)? What service model (IaaS, PaaS, SaaS) is the agency pursuing to process FTI?Agency must describe the business process or data processing capability which is moving to the cloud environment and the nature of the cloud solution.[Note: Please be as detailed as possible in your responses.] Please place the agencys response here using Arial 12 pt font, unbolded.2System and Services AcquisitionIs the cloud solution FedRAMP authorized?All third-party cloud environments must have FedRAMP authorizations in order to receive FTI.3System and Services AcquisitionDescribe the operational environmentThe agency must identify all contractors with access to FTI and the purpose for which access was granted. The agency must provide the name and address of the contractor, including data center addresses. The agency must include Exhibit 6 information for the third-party cloud provider contracting organization.4System and Services AcquisitionA. Will the cloud environment and associated systems be managed by the agency or another state agency (e.g., state IT department)? Or will it be handled by a vendor)? Note: agency-managed or state-managed cloud environments will not be considered as third-party clouds requiring notification B. Identify where the equipment used in the cloud computing environment is hosted and physically resides.Recipients of FTI are allowed to use a shared facility but only in a manner that does not allow access to FTI by employees, agents, representatives or contractors of other agencies using the shared facility.5System and Services Acquisition (Contractors)Certain FTI may not be included in a cloud environment where contractor access is prohibited by statute (e.g., Treasury Offset Program or access is prohibited by 6103 (l)(7)). Please describe in detail what FTI will be in the cloud environment. Please describe how contractors and sub-contractors will be utilized in the cloud computing environment. Access restrictions pursuant to the IRC authority by which the FTI is received continue to apply. For example, since human services agencies administering benefit eligibility programs may not allow contractor access to any FTI received, their data within the consolidated data center may not be accessed by any contractor of the data center. Note: If the agency is able to encrypt data using FIPS 140-2 certified solutions and maintain sole ownership of encryption keys, Safeguards will consider this a logical barrier and will allow data types with restrictions (e.g., (l)(7)) to move to a cloud environment.6System and Services Acquisition (SLA or Contract Language)A. Describe the contract or Service Level Agreement (SLA) in place with the cloud provider and identify whether it covers all of the requirements as listed in Publication 1075 under Section 5.5.2 and Exhibit 7. B. Provide a copy of the draft contract or SLA.7System and Services Acquisition (Location of Operations)Certify that none of the cloud provider personnel with access to FTI or FTI systems, and cloud provider equipment receiving, processing, storing, and maintaining FTI are located offshore. FTI may not be accessed by agency employees, agents, representatives or contractors located offshore, outside of the United States or its territories. Further, FTI may not be received, stored, processed or disposed via information technology systems located off-shore.8Configuration Management (Component Inventory)Please describe and provide a listing of the equipment that is used to transmit FTI to the cloud provider and the organization which owns the equipment. The agency must retain control, for all hardware, software, and endpoint equipment connecting to public communication networks (i.e., internet).9System and Information Integrity (Protection from Unauthorized Disclosure)A. Describe where the FTI data is stored in the cloud computing environment and how it will be isolated from other customers data. B. How is the information protected from inadvertent or unauthorized disclosure?FTI received under certain code authorities may not be re-disclosed to contractors. Other entities/customers leveraging the cloud solution must be prevented from having logical access to agency FTI. 10System and Information Integrity (Incoming FTI and Encryption)Describe how FTI is transitioned into the cloud environment. List the encryption protocols used to protect the data in transit. The information system must protect the confidentiality of FTI during electronic transmission. When cryptography (encryption) is employed within the information system, the system must perform all cryptographic operations using Federal Information Processing Standard (FIPS) 140-2 validated cryptographic modules with approved modes of operation. Cryptographic data transmissions are ciphered and consequently unreadable until deciphered by the recipient.11System and Information Integrity (Security Control Validation)Describe how the agency for which the FTI is authorized, ensures that the cloud computing environment meets the physical and logical security requirements as outlined in Publication 1075. Agencies must ensure third-party providers of information systems, who are used to process, store and transmit federal tax information, employ security controls consistent with Safeguard computer security requirements. 12System and Communications ProtectionDescribe if data is protected at rest using FIPS 140-2 certified encryption capabilities. Describe the encryption key management capabilities and describe who is in controls the encryption keys.FTI data received under (l)(7) and (l)(10) must be encrypted at rest using agency-managed encryption keys for the agency to move those data sets to a third-party cloud provider. Note: Using FIPS 140-2 certified encryption at rest exempts third party contractors from some protection requirements such as training and background investigation requirements.13Media Protection (Media Handling Procedures)Describe what media (e.g., hard disks, removable media, network storage) in the cloud computing environment will contain FTI and how it will be sanitized and disposed of once no longer required.The agency shall describe the cloud providers methods for sanitizing information system media prior to disposal or release for reuse. Note: If FTI is encrypted at rest, the agency does not have a reporting requirement for this control.14Media Protection (Labeling and Commingling)Describe the agencys methodology for labeling FTI prior to introducing it to the cloud environment and how commingled FTI will always be tracked and identified in the cloud environment. Describe the process to ensure FTI is labeled down to the data element level.In situations where physical separation is impractical, the file should be clearly labeled to indicate that FTI is included and the file should be safeguarded. The information itself also will be clearly labeled.15Access ControlDescribe how logical access controls are managed and granted in the cloud computing environment and who has control over the process and approvals.Agencies must manage information system user accounts, including establishing, activating, changing, reviewing, disabling, and removing user accounts. The information system must enforce assigned authorizations for controlling system access and the flow of information within the system and between interconnected systems.16Incident Response/ System and Service AcquisitionA. Describe what incident response policies, plans and procedures have been developed for the cloud environment. B. Have the notification requirements, including the specifics of reporting timeframes, information required to be reported, and the point of contact to which it should be reported been incorporated into the SLA/ contract? Upon discovering a possible improper inspection or disclosure of FTI, including breaches and security incidents, by a federal employee, a state employee, or any other person, the individual making the observation or receiving information should contact the office of the appropriate Special Agent-in-Charge, Treasury Inspector General for Tax Administration (TIGTA) and the IRS. The agency will contact TIGTA and the IRS immediately, but no later than 24-hours after identification of a possible issue involving FTI. The agency should not wait to conduct an internal investigation to determine if FTI was involved. If FTI may have been involved, the agency must contact TIGTA and the IRS immediately.17Awareness and TrainingDescribe the training requirements for the cloud provider personnel who have access to systems that process, store, receive, or transmit FTI. Does the training content include information on the provisions of IRS Sections 7431, 7213, and 7213A?Granting agency an employee or contractor access to FTI must be preceded by certifying that each employee or contractor understands the agencys security policy and procedures for safeguarding IRS information. Employees and contractors must maintain their authorization to access FTI through annual recertification. The initial certification and recertification must be documented and placed in the agency's files for review. As part of the certification and at least annually afterwards, employees and contractors should be advised of the provisions of IRC Sections 7431, 7213, and 7213A (see Exhibit 6, IRC Sec. 7431 Civil Damages for Unauthorized Disclosure of Returns and Return Information and Exhibit 5, IRC Sec. 7213 Unauthorized Disclosure of Information). Note: If FTI is encrypted at rest, the agency does not have a reporting requirement for this control.18Contingency Planning (Backup Frequency)Describe how backups are handled, including what is backed up, to what is it backed up, according to what frequency, and where is it being stored (e.g. tapes, Storage Area Network (SAN)).Agencies must conduct backups of user-level information, system-level information, and FTI and store such backups at a secure location.19Risk AssessmentAgencies are required to conduct a risk assessment (or update an existing risk assessment, if one exists) when migrating FTI to a cloud environment. Subsequently, the risk assessment must be reviewed annually to account for changes to the environment. This implementation and an evaluation of the associated risks should be part of the risk assessment.Agencies must conduct assessments of the risk and magnitude of harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the agency regarding the use of FTI. The agency must update the risk assessment periodically or whenever there are significant changes to the information system, the facilities where the system resides, or other conditions that may impact the security or accreditation status of the system.  Cloud Computing Notification Form Part 2Date:Reviewers Name:Approval Decision:Comments#IRS CommentsAgency Response1Agency Response, Date X/XX/2017: Note: Please update the date above and place your response here. Please follow this format for the remainder of the document. 2        BUuw x ±~m_J<hZCJOJQJ^JaJ)jhwmhfCJOJQJU^JaJh XCJOJQJ^JaJ hwmh^CJOJQJ^JaJ h Xh XCJOJQJ^JaJ hwmhOCJOJQJ^JaJ hwmhXCJOJQJ^JaJ hwmhfCJOJQJ^JaJ#hwmh )<5CJOJQJ^JaJh3 hU+h )<h/kh^5CJOJQJ^JaJ h6hf h6hG  h j k d7$8$H$gd-xd7$8$H$gdCgd\|,d7$8$H$gd\|,d7$8$H$gdfgdU+gd^gd6 H h j k    4 _ һҪo^P^PBP0#h;h-x5CJOJQJ^JaJh3CJOJQJ^JaJh-xCJOJQJ^JaJ hCh-xCJOJQJ^JaJ hwmh<CJOJQJ^JaJ hwmh< h\|,h-xCJOJQJ^JaJh\|,h\|,CJOJQJ^JaJ hwmhfCJOJQJ^JaJ-hwmhf0JB*CJOJQJ^JaJph)jhwmhfCJOJQJU^JaJ/jhwmhZCJOJQJU^JaJ $NUVUޯsbQJQ9Q hhCJOJQJ^JaJ hwmh< hwmh<CJOJQJ^JaJ hCh-xCJOJQJ^JaJh-x5CJOJQJ^JaJ hYh-xCJOJQJ^JaJh-xCJOJQJ^JaJhFZCJOJQJ^JaJ h;h-xCJOJQJ^JaJh35CJOJQJ^JaJh X5CJOJQJ^JaJ#h;h-x5CJOJQJ^JaJhFZ5CJOJQJ^JaJ %(v,ͿͮͿޮ޿{jf_[LhM5B*PJ\^Jphh5{\ hh'Dh5{\hH-) hh'Dh<CJOJQJ^JaJ hh'DhCJOJQJ^JaJ hwmh3CJOJQJ^JaJ hwmh=s"CJOJQJ^JaJ hwmh?ICJOJQJ^JaJh3CJOJQJ^JaJ hwmhyMCJOJQJ^JaJ hwmh<CJOJQJ^JaJ hwmhqpCJOJQJ^JaJH$d$Ifa$gd0gd6d7$8$H$gdC,>-.0±Э< h(h-wCJOJQJ^JaJ#h(h-w5CJOJQJ^JaJ#hh'Dh]5CJOJQJ^JaJh(h X5OJQJ^Jh(h]5OJQJ^J#hh'Dh5CJOJQJ^JaJh(h5OJQJ^Jh0!huMhMB* OJQJ^JphphMB* OJQJ^Jphph:hM5OJQJ^JhM5B*PJ\^Jph#h:hM5B*PJ\^JphHIOPgT>$d$7$8$H$Ifa$gd0d$7$8$H$Ifgd0kd$$Ifl40N85    t6]6]0`944 lap6]6]yt PQYZnX$d$7$8$H$Ifa$gd0d$7$8$H$Ifgd0}kd$$Ifl40 8r + t0`944 layt Z[efnX$d$7$8$H$Ifa$gd0d$7$8$H$Ifgd0}kd$$Ifl40 8r + t0`944 layt fgrsnX$d$7$8$H$Ifa$gd0d$7$8$H$Ifgd0}kd$$Ifl40 8r + t0`944 layt stnX$d$7$8$H$Ifa$gd0d$7$8$H$Ifgd0}kd$$Ifl40 8r + t0`944 layt nX$d$7$8$H$Ifa$gd0d$7$8$H$Ifgd0}kd$$Ifl40 8r + t0`944 layt nX$d$7$8$H$Ifa$gd0d$7$8$H$Ifgd0}kd.$$Ifl40 8r + t0`944 layt ld$7$8$H$Ifgd (i}kd$$Ifl40 8r + t0`944 layt -.0PooooojooWd$7$8$H$Ifgd-wFf d$7$8$H$Ifgd (i}kd>$$Ifl448`9   t 6]0`944 laf4p 6]yt  ^ab8f "=>?AnwͺvbP?? h(hCCJOJQJ^JaJ#h(h-w5CJOJQJ^JaJ& *hh'Dh-w5CJOJQJ^JaJ!h(h-wB* OJQJ^Jphph(h/kCJOJQJ^Jh(hFZCJOJQJ^J(h(hFZ5B* CJOJQJ^Jphp%h(hFZB* CJOJQJ^Jphp h(h-wCJOJQJ^JaJ h(h/kCJOJQJ^JaJ h(hFZCJOJQJ^JaJ>d$7$8$H$Ifgd/kd$7$8$H$IfgdFZ>?AaG44d$7$8$H$Ifgd (ikd$$Ifl4rwr$8\ d t0`944 laf4yt/kad$7$8$H$IfgdWd$7$8$H$IfgdChijkl3ɷnZɷH6#h(h/k6CJOJQJ^JaJ#h(h!@ 6CJOJQJ^JaJ& *hh'Dh!@ 5CJOJQJ^JaJ%h(h!@ B* CJOJQJ^Jphp h(hLCJOJQJ^JaJ&h(h!@ 5>*CJOJQJ^JaJ h(h!@ CJOJQJ^JaJ#h(h!@ 5CJOJQJ^JaJh%5CJOJQJ^JaJ& *hh'Dh-w5CJOJQJ^JaJ%h(h-wB* CJOJQJ^Jphp 1G4444d$7$8$H$Ifgd!@ kd $$Ifl4rwr$8\ d t0`944 laf4yt/khijl/kd_ $$Ifl4rwr$8\ d t0`944 laf4gytd$7$8$H$Ifgd!@ l3d$7$8$H$Ifgd!@ |}$%&ʻufTG2)h(h!@ B* CJOJQJ^JaJphphh'Dh!@ CJ^JaJ#h(h%6CJOJQJ^JaJh%6CJOJQJ^JaJ#h(h!@ 6CJOJQJ^JaJ h(hS)CJOJQJ^JaJ h(h!@ CJOJQJ^JaJ#h(h!@ 5CJOJQJ^JaJh%5CJOJQJ^JaJ& *hh'Dh!@ 5CJOJQJ^JaJh(h!@ CJOJQJ^J# *h(h!@ CJOJQJ^JaJ{|G4444d$7$8$H$Ifgd!@ kd $$Ifl4rwr$8\ d t0`944 laf4yt/k|}d$7$8$H$Ifgd!@ G4444d$7$8$H$Ifgd!@ kd $$Ifl4rwr$8\ d t0`944 laf4yt/k$%&')4kd $$Ifl4rwr$8\ d t0`944 laf4yt/kd$7$8$H$Ifgd!@ &'()-!.!/!0!1!2!a!!!!!{"""""""####{$|kZkk|Z h(hCCJOJQJ^JaJ h(h{gDCJOJQJ^JaJ#hh'Dh!@ 5CJOJQJ^JaJ)h(h!@ B* CJOJQJ^JaJphph(h!@ OJQJ^J h(h/kCJOJQJ^JaJ h(h!@ CJOJQJ^JaJ#h(h!@ 5CJOJQJ^JaJh%5CJOJQJ^JaJhh'Dh!@ CJ^JaJ)b .!/!d$7$8$H$Ifgd/kd$7$8$H$Ifgd!@ /!0!2!a!!!G4444d$7$8$H$Ifgd!@ kdY $$Ifl4rwr$8\ d t0`944 laf4yt/k!!!""d$7$8$H$Ifgd/kd$7$8$H$Ifgd!@ """"b#c#G4444d$7$8$H$Ifgd!@ kd$$Ifl4rwr$8\ d t0`944 laf4yt/kc##{$|$}$~$4kd$$Ifl4rwr$8\ d t0`944 laf4yt/kd$7$8$H$Ifgd!@ {$|$}$~$$$$?% ' ' '''((((() )1)9):)))))ƷvveTCee h(h/kCJOJQJ^JaJ h(h&ECJOJQJ^JaJ h(h8%CJOJQJ^JaJhh'Dh!@ CJ^JaJ h(h{gDCJOJQJ^JaJ h(h!@ CJOJQJ^JaJ#h(h!@ 5CJOJQJ^JaJh%5CJOJQJ^JaJ#hh'Dh!@ 5CJOJQJ^JaJ)h(h!@ B* CJOJQJ^JaJphp# *h(h!@ CJOJQJ^JaJ~$$$@%A%B% ' 'd$7$8$H$Ifgd!@  ' ''N' ( (G4444d$7$8$H$Ifgd!@ kdx$$Ifl4rwr$8\ d t0`944 laf4yt/k ( (((((d$7$8$H$Ifgd!@ ((()G44d$7$8$H$Ifgd!@ kd;$$Ifl4rwr$8\ d t0`944 laf4yt/k)n)o))**=+>+d$7$8$H$Ifgd!@ d$7$8$H$Ifgd0d$7$8$H$Ifgd8%))**=+>+?+A+B+,,, -!-"-$-%-0/1/3/4/111111b5c5d5e5f5g5p9r9y9999999̷xi̷xxxxixh(6CJOJQJ^JaJ h(h!@ CJOJQJ^JaJ#h(h!@ 5CJOJQJ^JaJh%5CJOJQJ^JaJhh'Dh!@ CJ^JaJ)h(h!@ B* CJOJQJ^JaJphp#h(h06CJOJQJ^JaJ h(hS)CJOJQJ^JaJ h(h0CJOJQJ^JaJ)>+?+B+o+G4!d$7$8$H$Ifgd!@ d$7$8$H$IfgdCkd$$Ifl4rwr$8\ d t0`944 laf4yt/ko+2,,, -!-d$7$8$H$Ifgd0d$7$8$H$Ifgd!@ d$7$8$H$Ifgd/k!-"-%-Q-Z.//G4444d$7$8$H$Ifgd!@ kd$$Ifl4rwr$8\ d t0`944 laf4yt/k//0/1/4/4!d$7$8$H$IfgdCkd$$Ifl4rwr$8\ d t0`944 laf4yt/kd$7$8$H$Ifgd!@ 4/C//1114kdG$$Ifl4rwr$8\ d t0`944 laf4yt/kd$7$8$H$Ifgd!@ 11Q11124 4b5c5d$7$8$H$Ifgd!@ d$7$8$H$IfgdC c5d5g5~5G4!d$7$8$H$Ifgd!@ d$7$8$H$IfgdCkd $$Ifl4rwr$8\ d t0`944 laf4yt/k~5s6p9q9r999d$7$8$H$Ifgd!@ 999:G4!d$7$8$H$Ifgd!@ d$7$8$H$IfgdCkd$$Ifl4rwr$8\ d t0`944 laf4yt/k99H;I;J;K;N;<<>>>>>?Ϻo^PL=+#h0uh]5B*PJ\^Jphh]5B*PJ\^JphhhCJOJQJ^JaJ!hu#h!@ B*CJ^JaJph#h(B*CJOJQJ^JaJph)h(h!@ B*CJOJQJ^JaJph,h(h!@ 5B*CJOJQJ^JaJphhh'Dh!@ CJ^JaJ)h(h!@ B* CJOJQJ^JaJphph(h!@ OJQJ^J h(h!@ CJOJQJ^JaJ#h(h!@ 5CJOJQJ^JaJ::I;J; d$7$8$H$Ifgd!@ d$7$8$H$Ifgd!@ J;K;N;^;G44d$7$8$H$Ifgd!@ kd$$Ifl4rwr$8\ d t0`944 laf4yt/k^;<>>>>d$7$8$H$Ifgd!@ d$7$8$H$Ifgd(>>>>E72gdd7$8$H$gdCkdS$$Ifl4 rwr$8\ d t0`944 laf4yt/k>????taK$d$7$8$H$Ifa$gd&8d$7$8$H$Ifgd&8zkd$$Ifl89   t 6]09644 lap 6]yt&8$d$Ifa$gd&8???.?/?C?D?E?N?p?r?s????@@@@@@@@@!@"@$@%@'@(@)@ijĨěve]Y]Y]Y]YRNh R h9h RhRjhRU hwmh]CJOJQJ^JaJh:h$6666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~ OJPJQJ_HmH nH sH tH J`J G[QNormal dCJ_HaJmH sH tH J@J 6 Heading 1@&5CJOJQJ^JaJL@L U+ Heading 2 $@&a$CJOJQJ^JaJDA D Default Paragraph FontRi@R 0 Table Normal4 l4a (k ( 0No List jj 5{\ Table Grid7:V04@4 .Header  !4 4 .Footer  !.)!. . Page Number6U`16 =s"0 Hyperlink >*B*phB'`AB =s"0Comment ReferenceCJaJ<@R< =s"0 Comment TextCJaJ:a: =s"0Comment Text Char@j@QR@ =s"0Comment Subject5\FoF =s"0Comment Subject Char5\R@R =s"0 Balloon Text dCJOJQJ^JaJNoN =s"0Balloon Text CharCJOJQJ^JaJH`H ^ No SpacingCJ_HaJmH sH tH LoL 6Heading 1 Char5CJOJQJ^JaJD@D W] List Paragraph ^m$HoH U+Heading 2 CharCJOJQJ^JaJPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3N)cbJ uV4(Tn 7_?m-ٛ{UBwznʜ"Z xJZp; {/<P;,)''KQk5qpN8KGbe Sd̛\17 pa>SR! 3K4'+rzQ TTIIvt]Kc⫲K#v5+|D~O@%\w_nN[L9KqgVhn R!y+Un;*&/HrT >>\ t=.Tġ S; Z~!P9giCڧ!# B,;X=ۻ,I2UWV9$lk=Aj;{AP79|s*Y;̠[MCۿhf]o{oY=1kyVV5E8Vk+֜\80X4D)!!?*|fv u"xA@T_q64)kڬuV7 t '%;i9s9x,ڎ-45xd8?ǘd/Y|t &LILJ`& -Gt/PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!0C)theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] +8!!8  ,^&{$)9?)@+@!#$%'159>DJTZcHPZfs>al|)/!!"c#~$ ' (()>++!-//4/1559:;;>>?/?????#+"&()*+,-./0234678:;<=?@ABCEFGHIKLMNOPQRSUVWXY[\]^_`abw+8X@ @H 0(  0(  B S  ?+ - 4 < w ~ 8888 8!8#8$8&8'8)8,8 !!##888 8!8#8$8&8'8)8,83333  I P ? a 1j')0a~  !?#o#"%%%&C'))d-~-12K3^37s788888 8!8#8$8&8'8)8,8 / /  " = jk||'(bb0122~  9!:!!!@#A###$$#%$%2'3'))e-f-x1y111K3K333Z4Z44466888888 8!8#8$8&8'8)8,8`plvs5s#V,L]'l ^`hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.hhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJQJo(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJQJo(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHhh^h`OJQJo(hH88^8`OJQJ^Jo(hHo^`OJQJo(hH  ^ `OJQJo(hH  ^ `OJQJ^Jo(hHoxx^x`OJQJo(hHHH^H`OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hHs5s#L]' L]'`p PendspaRyleSt-s1.0Unt-Vy:"W UIXns-         "0         "0         R2?K5c 3o/ B3t!I!#$~t) 8}l :p<NSg=6M6?8>\?Lq@q@AqBh'D{gDrDE3:E F0H?I-6Jl#KLLwiL:MnOjOP,QG[Q RR-R]Sp3TvUlSV^XHYQrYFZV\5{\]]W]6^/_Bg_q_e`]ccd\eflef h (im j&mwmp!q(q6)qpqQ]rbsotCtzlva w-x{ST{ |A|Q}\(&MR^{&EW/x\^dRcMX9XJ%Z#He)EyL@Pe/kWz"ct#.xu.h_1z -C^} U+6OCUEk8%I(%H%:SB^h/+ l.w?)HK]>,S)f~xU88@+8@UnknownAuthorG*Ax Times New Roman5Symbol3. *Cx Arial7.@Calibri5. .[`)Tahoma?= *Cx Courier New;WingdingsA$BCambria Math"qhWW_/ e_/ e!`n2477 2qX $PG6!xx )Cloud Computing Notification Requirements   Oh+'0`    ( 4@HPX,Cloud Computing Notification RequirementsNormal1Microsoft Office Word@@.L@l- @l-  _/՜.+,D՜.+,@ `hpx  e7 *Cloud Computing Notification Requirements Title(X` _PID_HLINKS_NewReviewCycleAx7 mailto:SafeguardReports@irs.gov  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdfghijklmnopqrsuvwxyz{|}~Root Entry F0Data e1Tabletk5WordDocument oSummaryInformation(DocumentSummaryInformation8MsoDataStore0”JITPU1HKAQ==2 0”pItem  PropertiesOULMECFQFZMU5A==2 0”Item  Properties CompObjr DocumentLibraryFormDocumentLibraryFormDocumentLibraryForm This value indicates the number of saves or revisions. The application is responsible for updating this value after each revision. metaAttributes"/>  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q