ࡱ> dwB9  !#$%&'()*+,-./012345678;<=>?@ACEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcefghijklmnopqrstuvwxyz{|}~Root Entry F\T]L@Workbook D[MBD0011E457  FMc|@G|Ole =  -F!Cover!Object 1  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89qOh+'0 $ D P \ ht|Christian, Michele [USA]Data 81Table",CompObjrObjInfo8DdO zp<  C Ab48{ߌ[4yͰL8Dn8{ߌ[4yͰLPNG  IHDRO:EgAMA pHYs12N– IDATx}8e}{p#0rCG`9&r"D3KPxg`EF.oϼX̋ϼX̋ϼX̋ϼX̋ϼX̋ϼX̋0+놡y8ck+Sx脰:D[Q/[??HPTI5o HuoD1ճC ]^Qhz|`VOOay Z8n#ʬCR6RJUoZ篟tXܳCPZNa~FET5ېbns#n[.ZW>w9 |[FV,:xۧ/{k>qvD h"СP))F #ƟS)!GĎjJ3+Dbm5Ĕn~CZLCa#`m魜;?kWOV!Jm UKaܣj\$܄=O9FV"kTגyn- jVw!:j<ݜwAxND(ySzYKz>pRN=XT*QU/{o+T&iJ6YK~=H'?0Ou7-峭+5GdA:Vc&~E|OJӒ*X@UNHtc>Z󋄆4OgҨz/'~BQ1| .3SZ$N588l ՃbjU4&٢x/1fç#N-olKu!,O[\g(yϨh:\4{5q=~)|*Xpu0zc7C6Jg5}9AFtFqr74՚ d4ϣnVH A? 'bq„c|sB&IPݝ6m}궕i#:'PfC.4NUc31Zoj!4Oqf3]o"eLt W<'aM(>e5v M:_Y*y]Ɓ ďg%u =ԖIWqBYm]Gn 4<rф 傼;+ZܞQ |V^kɶ=KL)9#bчMBHdG tSs 6( W<ϖO3qͧTʴ[K` k߂cd ؑ/\^芊 >1_OO, λX%Z뤿6@qNgϗI3<=Α}M:skfwvA[" %cŖ=yTwt|P @Y9[jO==E /`1{zX Uѫc5qVxͤe+WbJkAmؗHv&5vmԜ0?0`OwjtkᾛMX;>_*I|p۫7QǢr&C"[m%Ls h6>%k^n{;8c,z'F3{?ͲQ{@?YM|R5\טT}dufx ]"H!' C~H)ӘDVi})"OҼFZL0+IO1&f>}OXwMZѺJnrtw2@v&O7>z?l3bS]';q:MyT'fEmS ű+HZOn,Fa `D7·(-$T*&󟟢ܣX^$Q;_MuKé(Uֆ1uCs1XGb6(kg3h١Rq"3n논%SRbKO,Ts~f~90C`QɨĬlYkTsL,'˼k N ۽ [rLc(>-ZA )ҟFJAt~O[~O)gA{'maQ aB3r#Sq#rО5$Pb=6 ՅZvѺEfD+1EѾDT $wV{cDyhK֚&{)t }5 EyTV\vj.AsTr ;21Vm|hY%!#n>q^: nI {N4}&8Zܚ6HȖ܊)*# zc۶7o= 1z E@l>}= ׌7EBe¦cБ~P {9dkwe5-|dBͫ7EQm]eU0kl\% ~߳zlLrGݠ5fq~Ê Mb஁՚;vpl_3N( a5LfH>&Qb0'=fbLO&߃uY+XPEDJW]3LLL UJ oYs_M'6($>LYcR31[mU %G9L'0.Xָ*vKZ߫Z?NFD>}2 >wV _U 7Q <\YhNh1U=H' x?BkS|blyjrrDTP,8pCwqm?dο"B_WeP]ڀk{e'bf0ݑ]'إ)ԮZg:ħ0nY-ˍ :*1稝 RjVWAN$(VT@W&iP?|opOj=@Z=Nx>;&=VSj'4 &*NwCvό5\4c=:_8~T`w Ci??ҍ}mkP3ZGuxkТ-q K@ $Gۖ [ѐZJدqЀau|'eM_͉v*l' xZ3NX:D2m΂-Dzwk1@t_xUڏ|G-U~lLKوĞڱeJ? /v|v܈k,'|`Lqu`a0QT'{KE!S$,kض'8NՀ88dRdy:7pbmd?uPs7a,zh4@2,|u m16j=yסhg9Ms5'.)lp*,Gxst% UgBu 3ggwhxy׃$Ӏ._)$/]uQI͟ἧ&O:@9T'>t~m 4~@sTodZ揥&"_ [$)(zuOoyqS]n?ħyx++W"%EUO{/`,P'^qbN -=8R/]uF<'PkViHguDvTq=4~9 E[:=S{uCrN2o3CU%^MtKs^çyG-VK26۲uYwg3ЀRuJnى| +ZL'm)D9,,ϧw։MɓnS.!#1N)rt#|nDX~ұDx:} hG"8DD5׀AOI` C*T ^NԢ#qoWD^Km^NJϩ 4FŖBӳ٦hz4y.4yҝ4dIB,^N,il xs EbD CFLE[% aQNƏ*żgQ% *k<s&Tq~)qgK#X nX|L )4tsl(%9y3ڏ|ڑhzKn%g|S&)\>נo@3([W`ЎD_$ WQ`-Ml[C *\Dn ^0Cxj}A-.O5Af7JhtY?`Z|?}H$=E[]g?N><$*hnY !*2S>||Ͼ"ey?\ꋆCXAE)qO_EP=)N r ڱWoK]>,g䓿rwo?ۏU\2!QAp4._~0HhSBY2@"XbjZãuE+N;{b7Oy ۥ1{i3;irMCPq?wf|`*gBQ mGCvEǡ2CD:Sqxtd?r/J,P'O0[߻la<о@cH'i0o1h篟~ 7c=KY}H9PQq| ? /ЮwTdml&=ʒè ,3 Yf*s}73lǜJ<[y|OOm:*KD؃0 >g/CMrwDESt,|&sonu!]{yCDP`;4}toS^OwG/1Յ3٧*N.@~Hnl|mI}E5I 3$LNW`UXBowN?vNLDw|.ݪ8J:*Vn_1 a7 ?A)wk*B6sX.tpיhbЏADgO[Q?{l5LQ<76ٍ$UolFLs )9i"p ]msPw'6/l6j;Bňj kƶhԽ3 X}RWv]Nat;΅bPWU9s5z8%w_DDGݓD:Jܡr̷Đ}`Dh._G.E>IF.b=b#>Cͥ'1]sWO?9:L $(qTO97h*h0SJAV\:Dh=ΰk^ZK4N4SoNNZX>! []'*R힓]0*OPqy{K/IT[g ."Onn|ul}^-a"4byrab/<^)Pt7nF`e"Rص d5t[2~DNlRӇ˥a>SAۿK#sU?=x7ǽ ḀG~uZ.w鞖1EL\/\f<Ѯ04ԺzzOgٮ1i{u^,WF]\85PEB9bYiӶ5l]a~Im9e%dDŽ!`bKewKtRoO+VO2.e OO?|e|Sx|$+cֹB}ҙS=Rx#Xc%K|B{C 7cԟ}@TX@bn"ˋZvQe(b^œi[}nKA,8R⪞GKj#Lz67 fPS=C# vQ7+wB&o\~l좢E} ٠Ds`/'ב4Qr)qik )e-1B\ϯǓ2|cx{%F9!s9Y¥r1<)\[NS΂ߏkat~\D/#.0mbp<((v`hĊ/]㾼fUxL,۹h-Dq|.&\ARfj\lzxbՉWxY>vH5+ a.2_~kF &_'4 <螦oUlFwIEEяⰫ3އ"x !I[= ߸N|gdd9s& McbTrC13u)\qy)`f/2&A-0Kt O%wV3>>"s":Y#ɟ~t N)3*#5Vi ĶޘUx煱;Ձpn_³mw<*҆SxyfM:O' .mj r>ҋ"n*NT4pN c \)1 {on^ WXdrqޑy0]{tVgź? *xntlo:p;Fݱ&-WJ]0\OXg>.)8u;":y۱=ǐ淖}/ѳ"p+e:&s&gNg<8fe[M蚧}xV8q$,;<?wvG8$g}-y;,*=Qxu`w*ޟ쿽p:^cWqxd]YbPT怚wRfE"za0Z1јa4U{IMхBI*PEq,.bPlvLMZzm;Q|FJL#qL wbKzo6\#|3g/FcF3VUxd1dy #UB|q|F,~`C5>fG11]˞#y=~hauucX!-q|ڻ >=':B~[h*NV|=Mɧ92Y (E* vfx %ߵ $+lgoaBgڍ18M@Ty-q =k ;p1N/JPIeUKrk /PPG" XE7@ ?)8֋(|& <]_EmE#æV\lވbSM/2( d|izy8 yeo'+-kF3X@iK;-^(۽#m6yܔO"7?T,G/QdōLꚃlcL˰ |F3P6"|>Zё.(#§1Ѫ)ħ1Ƿɵوth1ُ)ɱ?<>JA<+ ?t/d CWOC#+y+y+y+y+y+y+y+y+y+y+y+y+yWQ~?|q^R2j^%"Eh嘫g^|g^|g^|g^|g^|g>$pxW.>w@YoJѝSqzx:tn4W%sW䡽F1kymЉO2g?Y3:̤&bstU] |b`,Vl k& W(|2\i|\}1ɸK^9(vS>B |9 >7ç6NcBB"|Xgx>8.45ǧp| [Qj{cюefu ;)X&~Jȧ5'| Ơ#2C AT.gӷtⳋsN pCvm>x~l bj; T^x[T?\MԭӦ̾1=qYP)<< еl=P<a x; ӼO(I}@޹? c%T.% 缟pk%c藹}gy/^%+y+y+y+y+y+y+y+y~a/9\~+Gݝ?eY׷[b9Plz}qUyڿeƵѷ]b6 q'9ϏC! ryAo,㣇[xw"xse e; <qxψ> (U)s Otnx B=/bIrvtllO(L@G q)cڹ 5*>U洡P}ጟ欙S7e;¿?O(戾vİjہ񁣧95?ϰҾǑ>ֲ%p?DֱЯ|.1E!=~A 8nag(33}8^\QRs ]0v1Cٜ&ǁxS32{GTGܘ98\*>E@8;BJ`aIF|윟|wԗBg>k1#!CNRh}a'Q}ȪQսbNg~iRQ4Es>/l?xjc1G^2Qsɱ&O'x2E祊tTЊlOT` T,Ŷ%LF2ٲLML\zjhb zyJ,|" Bj9swF|w0oJs\HTTÁ~k-ՎHL>!?yY+$)Y:zoD V_>|c+@283c\R1o 9f+< l?vJ=Y-a42v$r1v#|Εs;Ͻw\n; oR|МL 2p\_)`l8[0DǜJ>-l*ĩ릿o2KVڶmaI_4 }{0 |Zk<|{@6y07MNу՘;6`1|.|B;D:9*Őz ^"L=F#Pv ˻5} O#?tg4 $|x p{y,eԍ&.,kMi뺞/5oHyvZu#ԣ1[Ɛ9oOLE+ޜ p0OBěRyvh ٵ_r*6'\'쌹'MeQ0OVog=U(T1izg墈4+ܴiE(n[9ZAZ|idE_UQ dԇp C)us iC.*9Kt|2n Ԏ^?7cP ͐ + uL ZIl/ٿD{% ȜTeN|}NIka l?L';y$*||FeuP-;v;{Rwfoyy`[? wzPGDw)A_o$Er>s´"0<< U۾A5?'~@ѿ?) e痺:P8;_(IPLm9-/9">^wɩmf:iCe=>BHg6a!*2GJ`B)sᳱcli/soȑͧʣؚ l)?m f#TL=scb>[=lCc[~>LafOTA?Uk3wNa1kf=2l˃( d>_jSb Pħ_myݧ>Kh.#*MNPħC{꽏GE/!O^në  6ё-u/ G'YŻ'|1ERYU؟xL"&i1ULdiqqY`t陓4>#v5A>ɠR|2lOv,ϲp@?HVr&2Hj-//ozĩϕ=Uy[g# E%,~o8+U;N.|ڽa?oϼk=983Ec"ZO#f{DHJY&RO;u0XB/v6v09ASigz{$s |q3HH`oӼf>sHeWdB߷SqTZ~O7xkhvuB)E(Z}UaRw}~؃W\5Ƙ 8;[w"GɊ_M_1`Fxw[7+}Θ1'սi GHSʍ{`;EČ/O8G fJt#A~y$ݏPp~t4y GzDϴπ06666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH N`N Normal,ndhCJOJQJ_HmH sH tH @" pHeading 1,1 ghost,g,Ghost,ghost,g ,1ghost,Ghost +,h1,Chapter Number,Divider Page Text,og,Heading,Ghos,g1,Graphic @&CJ*@2* Heading 2,2 headline,h,headline,h2,h headline,Heading 11,heading 1,H2,heading 2,Heading 12,oh,Header1,Heading 121,h g2,Heading 1211,Heading 12111,2 hheadline,01 Headline,Heading 13,Heading 121111,Heading 1211111,Heading 12111111,2 headline1,2 headline2@& #@5;020 Heading 3,3 bullet,b,2,bullet,SECOND,Bullet,Second,4 bullet,h3,BLANK2,B1,b1,blank1,3 dbullet,ob,bbullet,3 gbullet,dot,second,3bullet,Bulle,bdullet,heading 3,Bullet 1,3 dd,3 cb,3 Ggbullet,02 Bullet,bul,B,Heading 21,3 bbullet,Heading 211,3 bulle,h 2,Dot#F@&]#^F``B` Heading 4,4 dash,d,38[@&]8^[`nRn Heading 5,5 sub-bullet,sb,4[~@&][^~`fbf Heading 6,sub-dash,sd,5p @&]p^ `F@F  Heading 7$$@&a$ CJ$OJQJN@N  Heading 8$$x@&]a$5CJDA D Default Paragraph FontViV 0 Table Normal :V 44 la (k ( 0No List JOJ center bold,cbo$dha$5@@ center plain,cp$a$bOb col text,9 col text,ctdPP @CJ.". |col bullet,cb,Center Bold,col bulletcsb,u,cbbullet,C2 Col Bullet,cb 10pt,col bullet1,cb1,c,Center Bcbold,6 chart,Chart,chart @E^`EN!2N col dash,cd k@^`JOBJ col heading,8 col heading,ch,Col Heading,8 col heading,8colheading,9 col heading,e,ColHead,C1 col heading,8colheading,C0 Col Heading$dPPa$ 5;CJZ!RZ col sub-bullet,csb ^`LQbL col sub-dash,csd^`FOArF col sub-heading,csh;BOB first,f,1#^#`CJ> @> Footerd P2CJJ&`J Footnote Reference6CJEHH*T@T  Footnote Texthd^h`6CJPOP footnote,fnhd^h`6CJLOL harvey ball$a$ CJOJQJ>@> Headerd P2CJBOB note,no#^#`6CJROR numbered text,nt #^#`5;NN oversized graphic!]^@"@ paragraph,p"#d`#TO2T source,so # ud^`u6CJ>OB> step,st$8^8`5<O!R< sub-heading,sh%;FObF table title&$da$5CJZ!Z trailer,7 trailer,t'x#$2/..).  Page NumberJOJ TitlePageBottom)$da$CJXT@X  Block Text*$yC]y^Ca$5;CJ$OJQJJoJ File Name in Footer CJOJQJ^O^ facing page #,fp,&@#$2/.5CJPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3N)cbJ uV4(Tn 7_?m-ٛ{UBwznʜ"Z xJZp; {/<P;,)''KQk5qpN8KGbe Sd̛\17 pa>SR! 3K4'+rzQ TTIIvt]Kc⫲K#v5+|D~O@%\w_nN[L9KqgVhn R!y+Un;*&/HrT >>\ t=.Tġ S; Z~!P9giCڧ!# B,;X=ۻ,I2UWV9$lk=Aj;{AP79|s*Y;̠[MCۿhf]o{oY=1kyVV5E8Vk+֜\80X4D)!!?*|fv u"xA@T_q64)kڬuV7 t '%;i9s9x,ڎ-45xd8?ǘd/Y|t &LILJ`& -Gt/PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!0C)theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK]  8@0(  B S  ?#2  hh^h`OJQJo(#2  F:(]cw jTNcL<H@@UnknownG*Ax Times New Roman5Symbol3. *Cx ArialABook AntiquaY Harvey BallsCourier New;WingdingsA$BCambria Math@ "1hJKCiK&/cY0SKHX $P 2!xx Christian, Michele [USA]Christian, Michele [USA] WordDocument :SummaryInformation( DocumentSummaryInformation8 ,SummaryInformation( y bjbj 0{{ $$$$$%%%88% D% %e'P%P%P%P%P%+&+&+&' ' ' ' ' ' '?)+ '$+&+&+&+&+& '$$P%P%'+&+&+&+&$P%$P%'5) +&+&'+&+&&&P%yj|+&&&5'0e'&{,+&{,&{,$&@+&+&+&+&+&+&+&+& ' '+&+&+&+&e'+&+&+&+&{,+&+&+&+&+&+&+&+&+& #:         hLjhLUh<jhcU    d .:p ) =!"#$%  Normal.dotmChristian, Michele [USA]47Microsoft Office Word@ʗ1@v6qM@WOJ@G9՜.+,0 hp  BOOZ-ALLEN & HAMILTON  TitleOh+'0 `h<` x  8Safeguard Computer Security Evaluation Matrix (SCSEM) ,Network Assessment Manual Control Analysis Internal Revenue Service (IRS)0Network Assessment Manual Control AnalysisChristian, Michele [USA]Microsoft Excel@#@-DS f2ɀ\pIRSistian, Michele [USA] Ba=   =hK;8X@"1Calibri1Calibri1Calibri1Calibri1 Arial1Arial1Arial1Arial1 Arial1Arial1Arial1Arial1Arial1Arial1Arial1Calibri1Calibri1Arial1Calibri1Arial1Calibri1 Calibri1Calibri14Calibri1 Calibri1Calibri1Calibri1,8Calibri18Calibri18Calibri1>141<Calibri1?Calibri1h8Cambria1Calibri1 Calibri1Arial1Tahoma1 Arial1 Arial1 Arial1 Arial"$"#,##0_);\("$"#,##0\)!"$"#,##0_);[Red]\("$"#,##0\)""$"#,##0.00_);\("$"#,##0.00\)'""$"#,##0.00_);[Red]\("$"#,##0.00\)7*2_("$"* #,##0_);_("$"* \(#,##0\);_("$"* "-"_);_(@_).))_(* #,##0_);_(* \(#,##0\);_(* "-"_);_(@_)?,:_("$"* #,##0.00_);_("$"* \(#,##0.00\);_("$"* "-"??_);_(@_)6+1_(* #,##0.00_);_(* \(#,##0.00\);_(* "-"??_);_(@_) 0.0%"Yes";"Yes";"No""True";"True";"False""On";"On";"Off"],[$ -2]\ #,##0.00_);[Red]\([$ -2]\ #,##0.00\)                                                                       ff + ) , *     P  P    *     ` !         "   # $ a> %  "x@ @    (@ @    ,@ @   (8@ @   x""@ @ 8 *x""@ @ 8  p""@ @   x""@ @   t""@ @   t  x""@ @ > *p""@ @   x""@ @   p *pUU@ @   x@ @   x@ @    h  `@@ 7  `@ 7  ` @ 7   h  "x  x   x  *x  )x  !x  x @   x  Zx@ @   x@ @   x@ @    x@ @    |@ @   Zx@  x@ @   x@ @  & &8@ @  & 8@ @  &  &x@ @  x@ @ 7 x@ @ 7     x@ @  0@ @   h@ @  x@ @  x@ @  x@ @   h@ @   h@ @   x@ @  x@ @  x@ @  x@ @    8@ @   8@ @   <@ @   x@ @  1 |@ @  &x@ @  &X & x@ @   x@ @   !<@ @   !8@ @  "x@@  "x@  "x @  (8@@  (8@  (8 @   "x"   "x"@   "x "@  x"@ @   x"@ @   x "@ @  )0@@  )0@  )0 @  "p@ @ 7 !0@@  !0@  !0 @  "8@ @   x@@   x @   "x  )x  !x  (*X )"X ( )"X  @ (       *Q ||n}-} 00_)}-} 00_)}A} 00_)ef[$ -}A} 00_)ef[$ -}A} 00_)ef[$ -}A} 00_)ef[$ -}A} 00_)ef[$ -}A} 00_)ef [$ -}A} 00_)L[$ -}A} 00_)L[$ -}A} 00_)L[$ -}A} 00_)L[$ -}A} 00_)L[$ -}A} 00_)L [$ -}A} 00_)23[$ -}A} 00_)23[$ -}A} 00_)23[$ -}A} 00_)23[$ -}A}  00_)23[$ -}A}! 00_)23 [$ -}A}" 00_)[$ -}A}# 00_)[$ -}A}$ 00_)[$ -}A}% 00_)[$ -}A}& 00_)[$ -}A}' 00_) [$ -}A}( 00_)[$ -}}) }00_)[$ -##0.  }}* 00_)[$ -???##0.??? ??? ???}-}/ 00_)}A}0 a00_)[$ -}A}1 00_)[$ -}A}2 00_)?[$ -}A}3 00_)23[$ -}-}4 00_)}}6 ??v00_)̙[$ -##0.  }A}7 }00_)[$ -}A}8 e00_)[$ -}x}<00_)[$##  }}= ???00_)[$???## ???  ??? ???}-}? 00_)}U}@ 00_)[$## }-}A 00_)}-}U 00_)}-}V 00_)}-}W 00_)}(}i 00_)}(}j 00_)}(}k 00_)}(}l 00_)}<}m 00_)[$}(}n00_)}(}o00_)}P}p00_)[$ ##}d}q00_)[$ ## ??? }(}u00_)}(}v00_)}(} 00_)}(} 00_)}(} 00_)}-} 00_)}-} 00_)}-} 00_)}-} 00_)}-} 00_)}-} 00_)}-} 00_)}<} 00_)[$}<} 00_)[$}<} 00_)[$}(}00_)   : 3 @%: 3 @%8 + !%8   !%8 2 !%8 + !%8   !%8 2 !%8 + !%8   !%8 2 !% 20% - Accent1M 20% - Accent1 ef % 20% - Accent2M" 20% - Accent2 ef % 20% - Accent3M& 20% - Accent3 ef % 20% - Accent4M* 20% - Accent4 ef % 20% - Accent5M. 20% - Accent5 ef % 20% - Accent6M2 20% - Accent6  ef % 40% - Accent1M 40% - Accent1 L % 40% - Accent2M# 40% - Accent2 L渷 % 40% - Accent3M' 40% - Accent3 L % 40% - Accent4M+ 40% - Accent4 L % 40% - Accent5M/ 40% - Accent5 L % 40% - Accent6M3 40% - Accent6  Lմ % 60% - Accent1M 60% - Accent1 23 % 60% - Accent2M$ 60% - Accent2 23ږ % 60% - Accent3M( 60% - Accent3 23כ % 60% - Accent4M, 60% - Accent4 23 % 60% - Accent5M0 60% - Accent5 23 %! 60% - Accent6M4 60% - Accent6  23 % "Accent1AAccent1 O % #Accent2A!Accent2 PM % $Accent3A%Accent3 Y % %Accent4A)Accent4 d % &Accent5A-Accent5 K % 'Accent6A1Accent6  F %(Bad9Bad  %) Calculation Calculation  }% * Check Cell Check Cell  %????????? ???+ Comma,( Comma [0]-&Currency.. Currency [0]/Explanatory TextG5Explanatory Text % 0Good;Good  a%1 Heading 1G Heading 1 I}%O2 Heading 2G Heading 2 I}%?3 Heading 3G Heading 3 I}%234 Heading 49 Heading 4 I}%5( Hyperlink 6InputuInput ̙ ??v% 7 Linked CellK Linked Cell }% 8NeutralANeutral  e%3Normal % 9Normal 2: Normal 2 2 ;Normal 3&Normal 3 <Noteb Note   =OutputwOutput  ???%????????? ???>$Percent ?Title1Title I}% @TotalMTotal %OOA Warning Text? Warning Text %XTableStyleMedium9PivotStyleLight16` e1Cover)aPurposeT Dashboard Test CasesOut Of Scope Controls=Sources`Legendo Change Log!  ;  _xlfn.IFERROR  ; 8fNf8@ Mp0 'O /$"[v8lȅIF7@=/v8lȅIF axxeT_o+NB)RHq(S 8@"]J-k`Aox9tg3gfϞ=3JփXQ9V%&E0ȩ(mTKHFZBe$8N$@{"AHt#@FH#(xN?232?zIBGK#!{(F ) AaY|2ѿW}P!eQ_dG%0̑u!@w% %ըpfff@߀\#}(AE?Mum4OP[__}z ?7{<V.Aߦ6et<y22"v~$XWk9HZyyqk Jݛwڋ5r4cH|(ۋYr9$jH'~+7G%p7fwrg9/k ?rBrn'eǤy?7w4pI͗/pۋC\eqmOG v!ydݰAȶ&Q,{s&?!oyŮ)'uPΓ| @!0UsQOw'չ4#uA1: ϕi lcwe/53/A ĚA:#Z)N]ׯx^?]mz_J&ȾhE 3bzZ;08 0EIsKfy-opN1E6 /YY ʤ9W/ {~J t"),YiJSnK Z=6TO ay x?Lj@jtF2/߀y3|# $pܑ=1B8\la_z:[T֞MK+odjjrLtP~ j2,X5 yd;Za+bĿ/*^nq9kI%ǾɈ)q 5S~`a Ȇ; ֋ 2sj .~/m%Aڤss&ߌ3N l,]Q|6LvDM3+K`-k8}6,<ŪI'2BQ1u\.! NEl=݀dp!_'cpb?T+^/TaD0Y9z-HQj1sHY iݧmЌݟj -*f8T!TqVX11%Lr:хNL.V(_Ik q_=ۦrj!/~3*̌!0dI-dm;ȉEsFky WRDϰDO뚑2+hZ'_zc.ܿYFVZ T)yE}tTL"܄ E!|]p[1`npמ+TD$LQ(\(wR胦>O4 ӲJO|_U8RgY)^e3<\ Of#پiyMMo^E{Jc JA57H5k !!GJUw\7,&N(o,9zvR%|;/KJ P.n_aLgiXyZ< 1GIkhonIbd҉oh dzd:)4lX{;',x?/@üa J=oT`T5udW +)հ%Aj?h|?alo]D|ج/5Kʱj_>(6B)&f(08ђ͟]Ȏ !֕ QN [LRELϳ'zTj.{DߤpmHk4-N1};3>zj;8|)D-axߵ„4H7I ?uP&vbd! 1&/tD~MmIcUb3Ӱ6?~8$('%ꀥbX q=(p̓mA9eB@zpVntpҼ}QLuV3ҷ*5v~}=ƃgu|Ψ̂\?7p}궪XL2/5/''Xbkpd[.v֊  4MXcj2PXȺZl=fBO]H>LkCuFUuE2X~0tֽTm+-M ?̷9 xZ *6X"BTx\ēzSk^*c˕'5'iON㯣op:ɿ{뤗uQ±VMq 6XyF' x" ԖW;9/Ї#. /Ӥ[Sf:ڕ]AwRsvvJ(X'Y=IŸ%MZmz6^xecDlGJ kN|)bL)*}gs+MJH9ϥ>_8e"y ~bG4IUG_|_GB_MGĬ cŲrenڠqFb(43"4O@L7fyL| qWύ3P)zEIzZXC99yvT6A=p4`O{vƵbSsB¶H 0}"5ӏ[ Z8j/h 7>|#=پ׎C^yڣQEQ޻0m^K(Ҿ{ xtESU!_{\Y M->,/CڪEɞڻ<d;U䞟k1sfO4}ȠaVN~LuTM`&wJ$*"Ŋ'; GH1U{9ߩm7>?p;"5'<YF҄tMu!~:\?)\88?*SyvPhLabe?l6RL+S RP|$}L+vf[%O ?rVȭȥ!y]S-"/ҬX+%[g5Vi[X#0L۱ C^|'K|:sFNj;uQPIP<_.#oEND}hƩ~ɶ`j\`8~jKLqkIJh<@RՍiO OXJlpWX?Qa 7< 򐭨kk$!V6K Z{U~b_9wFհk7xx`J?Ā_!& SS+4 n3Eo y2!'snL'4O RGWebd|Epm &deh2 ǧ?Id8r vLkO'\ue{LT6'ʟp2W͖aڢ!箄}1}N!VJҥWd)&I2 ΝQXc>丳rU#W=-c[dӮTk r, ɿAy6,~.y˝5p dwR# {Dx~;4.[Ta/7m:@e KtmUX0.mpv#ΒAI|/B" CtGn2a1ͨGdMCt4jB"; e1rLg"{DDy^ τG.`"xX],IR]8և4HlF.1ruHEi@ Qdk34<eCX'/e&᰽T@@c?hE?|p'w@;oыj uvCٔ.aXs,Kڔ~vy2<Yn svt 8m-Gǫ@ 4`K1EDu *5Wp:NW6XA_o-EGPV)5(}8u1( 7|0RI>?CʢAǾp[Gd\Ev&v O!3q/d2jYn޲er0 S g'ϲqhYI׾2AgDԴ $fo"+~.{`8kPνOw|ۈ HK2P1ɡ#v8Fq ;tV" 8XP­;gi;u74fpQ=igo blw:&u, )p86 %&Gؽ78߸_ZpΎ=IU MA5%~Q k$D$)-̇txB۩9O&؅?0^l| AE1&p<t\R/dlS>(;*ے|0(vךрw'^Ƙ@sXթTQDa~B,ަ "u;刅T[_rJ~r5fN&G+p}?V&e!Vjx$^%Y78=R NIQM zo-W!A<[*&"jX1oIMR:O>Ch F"a[cKbkWLo&& UA=qBBsdpbc|XS[ Gwu!]UCIG+>F~b_-L'w& 5a7+NwxA{ f;'+43,[ x. , t(yw6fL1z5LK]L % HV$ޟmrX݉1*W& ra*R˜wD eе/ *vDLd~ o+{Ԛb2L8^WO4_z_ K:7M^w#brEEru;hGX-=$flџ5] ?3ǼŻ.h) c(u-?𴊥]^;^-[ wkZݧ$eDU4,'g54JIf"CX߇oT⅗Ym zg{ـvӁOݷUΙW߾7˺:X3I`wvF~>Ѻ>4T^/q̟@^RڧcA 7M%QClyQ(8U%[;e΍޽Jrr3WkG|K>7⠗cj p[l+ypG!%k35K2 2UۭL2I)oH/'meL}i {o5qY51׬RxjcUH=p&A,a; :Il#j[KV4cOW!K6$;hr?Y}9c1m:a4ym9@6' >gX8>ڲceNL%alx'#ĝNDi}^uXx;10rIS't6i)Kg;nxq`' PzM=-Tk"?@lX\B( R_6cėbIh9Z=.@\K؈>#x/C3i5s{%'~'+7ץ{߈ r񲿇Mq3@+G) ] d#{Fm}Wχ Ju#N?,jZfk|Y9|.|Qz= t O#wP1Юw &uׄP= )/HQ+ =Բ))o=kx r;[z$&KOј{l|ҩ+4 ا:Ҋ<烔IC#KG|sQVP/C_ʴ0-‹LV;?l/Wj{e.]Qgw^f $.{%mϲvgA#/G4}(u~d䋋E_D4$ߪ_=HUAQYZ_ fNjD=35^mI\0zVosB2AVnf9Q0_a3c[zjZskbϧQnWY $wJe|#|'iX]>˩J7E 4M[4,"z腝UN^jM,:7"a%XilYCz|wdJ>ƿx!ۢU M0|Cw Y9ld&Zb֙RoD'JJ&:~/+g)<ŪQċU_mY#4˘r'μldFl4SLx!EMc^˥ 5|ZaQ~jz| Ti׾.L}:=g? Mw3r85$$Wt-gHs4DVhqw^)3:lDRL[/vP1V8Hzюwv0hvI]WCgY g]*zgm4-|8kٷo{y%ڼϴm W}PeVW/ 9eߥ.wI߆  KCѬ*KǫȮPkG^cGVB{4[EVGtd]ň:D|6|wFFch+mw<=ݴ_v+,\ԼutW~6e[6<2n>ӌ z@J P.hO! }Bob]:bvK0XoLA>%v TmQzƳJ~DsL hߕs242ujoVD\/4At묠.峝\]nX6`Up#VXoOuB72$'$n-ֶ Zi@?&2}7lՕd;iarn }{RK蟁NW:W=4T=G/fޠ4:Ō1Ar"->?LpJMһU޼af%WmmO)[`$%Ot"^̇E|o nJw߹sVҤ\S:'(mV1OA1IM\4Xδę|83c5uʚʢHkM%qƦdWJ[g%hn]xcs>/Fߟ)J3Ď%B w-ueln-^ILi٢'wbI5N/.5B3z:paӱ{2فZ#*Tz 쮡}&׻V*밒XKf[:jZX*zJ0|qr}R=GbFЏL$M;f{PekI:+hYylS/dX@:6.F+%)x¢)+Um&>dz*㺽.VV]Ճ.Գݰб<52;Xl猪,#䳆WD찦õҕSGLa'-{ggd\BÛZ|gE'~n7{υ?-k̾ݼE/}m}h[l\ Owm/O]xFem)/{b#y.ɳhvVIZCw‚TȆIO dzK;IWjc‘w=fK>H_T>βMQs;׼QL@{׸㙛E {sfI& mV%]'vd0tOk.ɽAI6Ui1=bc==.sT]pƏ*[M/ө+2:Y|g{gМ KYۯmLNgdɦhGH'ƍ^WtvjXM{mhbмO e+'׊˽-8.rGtþys>ް)ICfTc%գwDv6zW(_~I|4jhÂ-'3^dS]^;OW 엋}i_W54W̵ g`d7{ j4V3Ib>j~J9ɠ~*Koh[:aW߮⌿Mzmy}v#(U/y;-bY@W,k֍ǵLNۂƟ^̜P[p|B>\Wof'O+ ȩK}e6߿ݘw'ό8>[LvO[mQ"'F4 "[uj:n_rr2&JnhꬰvKe]WZ}şSo間5;c4IU!ƞPY5ky-dXT|8e3ecE[KZQg? +l(,u)E?}U)ӧvSUVfpj{9fZVWgĠnkH8^YJ2(L9V{Bhk}:39_=u^zPa)2/'>^XKזYÒm;h2iƐ3>m+HKz^om޲Od١ܧX|\*zK@}xטˌF^ VPpٔ=:;{hֿ=7b۞ZUiN]7ޣ8ot ''܎S^%jA-\.K>/pW/4yhVjBC%(а$*w{I}rc.#>Țlu`u [֑.9WF6I;xjf<) HrөF_-)y1X8jOXllTjooݟl\z_/vG-=miOwnw8;Zu5t^:E{f); :Kf&rCRe]wͽ1NNj ]h9%r ?Bҡ'rZ:'I2ZppyV?N*w͌C6B'4,_?wH YIUw\SQ$W_^ep!3لcB|uzյCfLyfcuCS,GJ} >c'h mZweX*  rG7U7z?d;>Vt~m]{׻55-t7=&uCs.ɇ\v+$c|.!Sjyw=r,94UO/KFbyGǤ9Z e&“S~kX~MC٦LB<;΢aZfۧꅟeXm )3@se7fW3Fhtۗӟ6zaɦIQy_Nʫ&9 E<ѡN1w/Š2WOtϐW5ܖ,YҬD1y5]s7ogPerfeQScT<|=a]gO>;(=NFKjeΫ\xz[x{0eۋhv(L]| 랧ܽW|{I&ƚjG_ 1WjDH{:YY;el > 9V ??xKʥUn7+ #|Ӯ ˲(JvCJ_n6윜ZV*\u,\@[]|4Qo]ҙ9iH񩜥m4[ӨɾcO IO {)o>i|=;PFȯן_a{M5JxJȥϜ`yQԇ*5>יy/(1㛾ǜ/YMU|H`E=/@hq+4]Ny6ReWJl?y} {w/X.wx568'/hY)4(Ca2zGQgT$&Uuwr~Kk]H 1EM?1R^=}T8]|GKSG@}U'Vk$ ')͗$^+&?ۘkM**.w=ɕ =l}fq#ֺ̘D:11l֕ &]̓8`xOoɽ٩6W=>Ih=+ Fd&US՛M]>֖w}lş\y3'~^S/{Vl_]vԪ o/7ͽaK)9ܼ0tWRCG >"b:,r?;yUxK^ +LYSߚ+E _VVq.,eҡCRMyv{܄i>u$+Y7S]Lb k]#UH+mwmxPI%ф=WW\h+}bX]̑$ARno#v:)͗^R{ e2ΈTEڒ5_v(ՅIzS Śj';ΤYm+z\ NmRj~ՋBN&4٩@cӟ)?;q@]^.Ț=Kz)}cU"tyW4mSKkJ[^ J*?횻y-=PQr_D%=ufKZ{t|c.LoesG9WKS|!+b6鮸ژW# U .85ne܏Χ:߶Tr8qچmw}߼КHu\ۂ[ o3 дΙv6u\#U/jbltNdEuӻO˟RNK_zḣ]/^:fTO7ycx# UI=ͯ&ÿ=K捆ue,~oo Kcp}0بPQ(t@THIk!%ՠpv\2C+( BC/IdN'yzzI;vfϞM:u*IEEI&YXX֭[GP($# 4d+^< @NJ6@`"MFXH, J K JuO$(,ʀHC 4եO~`7 aވDd$1wH Eރ"HlFPCnBзqEV -s,*$ۿ;DT+0LPu `ࠌgo$xހtIeGA>`''<0l0<#0dv8頎F7D$4R)H\@9!oትxYOAP@ =.W< > pnFi <9OG ?l@yƅT &Zdj:Go UrA?0 P>nx- WL?N1 ?$('5Ÿ>nL8}}$ؽoV cT-A]-Tma!O\}A^h¯)b%s.Az߸pD8b' R,S O`B#C4*<!O2 t P`ek6& 9e1aqxx$qĈw8h̒$扲c):-S`!l7yIatOf8ۓbzŴ9b(;f0H UHT"N2I0\a1Ot.=~fqy!e "0ܿ>y䖡?Npĉ ΫPBGhP K" /: b>Nf iɈT4C1R`gUZ91ndU;#X48b5g@%H*"Oc\C < L`1*pI0y{*!oBv> Sgo!5;6W("?dA/B7EwxB&JAȈ )ē,*>8cp%x{Ļo}g"n`=lÈ$OD#>1Z i%n 0@`x;x f{#o'1 I{Cx~/9xs 0@` p]0&? M7e5m W,#ΓN3Є}SEMq][ cJȀ1 ~8|IY3A\p;OZLkSpEP,st$%Dž: v2X}CMuQب1 DV|OΪ+\'<YL)l!b A.] njPBCv1#IÓ7$1.(̷yM# ¡ 9\V1OAS,=ݸ=<85! Pp?OpV@qgHƆ=Kl63A SݡxDF xq$ַWW4-xg8'P3Dx)  OegHglBx8c#_A}'HSq,u 1>c/ɗPOB׀M :cgs ܃2c ip+hq)3U0*?5pVؤx'qDğ փƍ'΢j4@aC] d.>4K`8=}}\[w`C\>s" \o\#'TR:ǰOФ(Hv_扳(v.ʁFa>SN"" .wV.p.)عt F OglBNd!n! śCpA J<` TB&)5l*ȰHpታ(a!!Ō| \0'SPP;y*"`&9/Pp -)eyXlD}xM  +&AˌW'e= *fD,q+E̓ @_7X;(qb0> j/NtZ,&(B, ]O VEw @|;g{0;Lޜ>e:(&T;-ȶePK'댝;cD{0; < aKx]Wkuy,IbPOƘH٩ |49Wʀ7mz$ng@Y[\eZ)TcYJW)Zju6@ڤ̡\kc&+jBZ*, \il@vKZ^C{7  i'T\0ӥ3ޞ]"rոe% ʶCA\; ψA14mr9xVS]O0I`z"SuׯTs `KŐΰOKu+ϧ'xnfsاL^TG&L)7uqa,CG5Pn2 W.)^&xfKU nk45ք\ lWGNĿs)!Z5tg+퉛oM$baw)}5Q) r^#Yx9NJ騉: aiǀBCT]J_T0 gXpRzTsi8xƸ~POL]VyPѥ ޟ^ƙxlPJZX܋g Y⸒aƳJ֮G|P}#Ypri{&Fw_NfE l f/qϯ;q?>>v3ž۰ʱ8x<6Jͽ]2pw-&A#=?͙ž ϴ&~=~g\5@O^NgkNZ^??QϞ"|OɄ8c$n'+1)б Hw9ϖN1]!xNGNo dU˫2>JQHgÃhT[q}!KCxk HdT\OF@B<=YcxӢgP9ʉ5w}-ݼ?AsLw@bşg"\ pm{.z!,3mi/eHQ(yk_NK)\srӁx祫g {8OQP-=^e 'O:&#wf] ExoVT* u=ZL(T*'qBcQv}K̬E'^[QX>~ۼYղѐ!<$W<߽Z)TD_YajT:CH~F]G&NU:MУ^H ctԍ<4W=쫞qg1]RSqN3Sxgdk0ub0g) !In.]~s/Hэ:&uqkϰkS Vt~a.yW!հxNOѤBF8nxuS}a:Q3ϣKEe1#=Flm1CEX8]R*1L<˃c!gױ qR\4ޱ8]V 0`?ϔLBW %fb>>Sm+Xm ./3p+I <޽EOP?v>zVM1 dJ++(йni^q|eAM-mЙu[|;Xj-<oө,'`l#$ea$:O3Gy<Ϸ0ᾟZ+ xv?&H3u]ӺzjA\# 6"?GB^_Lm Oy!O\+E"4^g>,;E,~B;e.p nx^`~3r  ox@.pĖ{ߡf/14%x<{?] 2߇hhP&sDgFHͷ#ϣ>ղ϶v3<@甞7'!`.ܞR͓_v3 q^|\1x8嫑hӑ~r { w$_9RO¶ƀPpN/лt|cn]~Ulߡ*`vO$mU O ItUʡ3+Pârbx;jnbC-d,Jք1y1ZĢ&) )wo{IƑ3wDd0iE:)L4r4}|<{=ơJ:EM紽!j;Xϱ%ȿs?M&Q3p$f%:od!Ƈ\bz[86afH4] #wQ(գ?tw6!EgZ dIcG ]wWxN7t# K+t'`*Ba=*fz"HNל $D[oK8vU8cAS^cn=m/;9_{Ru 38yg>0bY7aeF kqxbiww&P`/}==3E |6;uQQ+;8 1mj+;Ss"̦:3<3eό=EGI4PC 2]&_!o\)Q3h1ɀ`/lqٞVG0E4""m9"uxҮ@Ι2yh }=#]%Б ,?/?`Aaȟp`@A32݅)Ƣ('O =\~RR H"8te["a0EZB;RTe;"&ZK֪t{t@a]`o-vgO2"H͵Q/MB.`VZIH'>6C"+Q| 04Qr$Pwόk 2jSCHBƩg!"|=^@UiQ_RУ*l>T9x1Պz^?3 bS΄ip"Ɔko[  +JQ%.G$JTΝr Y:(2139Xec+NWd'PXY "=ID[pL\wϓVh0u".ܭ Iuo+n0aɆ1^Au OAnEC1G HuVAF8{r T&5' * Hf gQ#&cBZY =ߝ. Y*IAP㣠 #UƥHh'6ŋKƌI #knGpod"ꐍImbv] @q/H\0{AȠBG:3~glQO8 t *')ЎMޤ[;%b)c[xn;_ ȌTa+@#ԓNGm;S}o$EC4 f>%;s7J 1I-UCmft-6⨹+YoI2Ջgk11Qƚ.gY[26F j}+~7ECf&\3#^>ebN}_m'ϭNG+t pËSp}^,о٫< b(Zh}M4=E'PR,2=:,ɤ*T ulpҷ- u5t9rچ)hhIb!:8r<-g{b&Zs&z-<mgͬ slM8k%mB6x}z8gYU͸݃rUxw> ϊ@ lbfmBN (Ii}?5ܼ,`hͨفM$A sMQ NVHn>eA`tRKZv֬8ٺf4W[-aڍgKp+A* O-- }zv>Tp& ͚('A$ , 1iuO=M%76P'<_WVށ*zY} L{^=<@ՖX C5ղsz^6WM &BZ/{gtEVL}#?;c#بyg%l8R4G_ fB$Z(W@je@x +Z܋,p}֦ pP8`d2Y|iwr sf^n#vp  >#4'1龱8h?4KϮXnj^Mumz9"<;;<IK=`I^mv^y^o3(Y e3ʆzn7w `^M-W4Tb \YBuSΩ_'&.ғ$C.A=piiR]%4̃Z^`Y\: "kl=rY/t,\cdR& $B6|OBܯ',Ē ^B:aH0STMmdZiKu*1?GXY>m,Opy*n0\irynqh1&nWy wQO1'$X rcI=ɟ;Y*}5ڰD}DV\侌>%' lG\xtW.&'}sӢi\C—R9rOw^"dL&vBTB'UkЙUF/^9rvO3Bg"{U|3U7дS!j ^paK;NPNl71utX䄋[M&*zwv \%sv>)fR2;ܠ'xxV,^d [w/s#r%'V52Y4L,7㑉´ѳ }fe!Bt$q 8GA ٖZZNP `qYI&#L1dg,zy;+s5{Ek" .L+~)=Кbg2_w~jX˒0a8O6 BNچb'>#Mn7O!"XeW"`ɝqB|%/ ٪Zmρ'hw<+$O M1FVI#o0i E7bÓ=xr}MDЦEk(vMI37آ"\_m=! Bu>?qHq@AlQDS4qF ߃q ^8РMS'O TQo'ڠr@A>r>Gv7 "F'b[\ ލ443<8"z 6Tbt &⾜{zx2çDȕ!&RMDp2L -::O-)3xWaW,{^eQ@E؃^><MODROa8g(c<ύInV=pA6Ah;T``BǑ>7Dݏ徠Q_8T)`I ,]tY1F:װփ>|U jN<6'{ eO1ė4>op.>Ol"LiP闹 I[ XbXTf+A.'!ezo#\\ڤkm [=рLxo;2%@7xk0!+=ng jtIE'0_;oO]gV!Y *-+CkPۓiXQTP(h'00bAj=13?'w(Zaxf o`3N4Ѫ%7ww;*bs"d@Žs-0 W}](9^Rat{Ioߏ:W8x:P@+*޴ҍ8z)AKD/ Pe3Oa2tΕB*LO\qe7o| XQrdsh XRf1̓wIg$󥦼/p3x2[]y3%TrJPmr`6e wi(@\/JvOTL󢖑ZPĤ]N;c eYE&NGvynBKaȅYLrB)n!ѨŖMt \NQ;fzh=pyk4vfJQ/]hpBs6Ҋ"#InF1'"@! fSD!l.~Yxiwtڂ~_hzXGkPK~UUkT9OE y!O*iq%'w]}T+{H!z4b- U%孾TثK&5_ˆgΛK(66s6@=|"\R%H[ܤ{C֢g`FVVݤJyhWmLWuVeZbS`6vdRN7sHM X(^~Bh۴ SP( |^馴ۏ' D̠`xOܑ h|4tԘuCZE7;3Kp>."Q~2gY؟OLdJbU>Yix/_'MDHb =Pȑ D컻Kܘ܃˓!j+t?QֈjCk3,@  m➊%58ދЊ\Nc 5UZs@Agޅ$pޝ{iƳv ^ۙTr~ ()I1HqsWf!Z;~\]MgΟI(&YS.vȜQ_?oD?FцA_QfUq|KGv/@U.cOǖQVO * "Pze|}$fD,At.[F#^/r$<٘4Dj"vf_t>`Y @¿c/ɷ&Ń{ i@R˵SvᓦBVR 6m#*{΃c8j[ L %`46S1e"O&)=/oIdʶʉWK3Rm"zӒ=B2F-a=U([q%,Rsfh'.dG} F$.W-7V"©ަ!gmIh|uy[sV&lwJ] !cM!JiQ8UFV7B@eB!uTDsHZ5+bvnAE-MBwwifrHtܮ^L3[s'тMY4NKgܾ R |E ~j=[D 2Ca3/I||6JPVnuHjKsjh49bj4l.Ʉ1ݗ"u{v+٬ܞb>ڞY6i2f&AqoB8ـLɰ$tH_q뱪w|mI+0l{g@q >$Ԏ3.ǩ-ZԵ q ʿU^ 23)R`y;]q4z"ޒqP7o!.Lf}L}ˑNo\u*ȯgJ6=Rimy+N L6<FR_Qysn|l@uznkfѯiE珗n,4WC + f70ͼYS4MO?>_ʯ3? 3mnx;71. Verbose logging is enabled on all network boundary devices.1. Systems record logs in a standardized format such as syslog entries or those outlined by the Common Event Expression initiative. 2. If systems cannot generate logs in a standardized format, log normalization tools are deployed to convert logs into a standardized format.1. Network device logs have adequate storage space and logs are backed up and archived off of the system for storage in accordance with the agency's policy.fNetwork and system vulnerability scanning is performed on a regular basis to identify vulnerabilities.u1. Servers, workstations, and laptops are configured to automatically scan removable media for malware when inserted.U1. Servers, workstations, and laptops are not configured to auto-run removable media.1. Network-based IDS sensors are deployed to monitor traffic on Internet and extranet DMZ systems and networks, and network segments with FTI that look for unusual attack mechanisms and detect compromise of these systems. 2. The IDS is configured to look for attacks from external sources directed at DMZ and internal systems, as well as attacks originating from internal systems against the DMZ or Internet.DLogs for network devices have been allocated adequate storage space.GAudit log settings capture consistent information in a standard format.5Malicious code protection is implemented and current.An intrusion detection system (IDS) is used to monitor traffic at the agency's network perimeter and the perimeter of the network segment with FTI. Control IDOut-of-Scope ReasonAC-1 Control covered in the MOT SCSEMAC-21,Control not selected in IRS Publication 1075AT-1Control covered in the SDSEMAT-2AU-1AU-13AU-14CA-1CA-2CA-3CA-5CA-6CA-7CM-1CM-2CM-3CM-4CM-5CM-6CM-7CM-9CP-1CP-2CP-3CP-4CP-6CP-7CP-8CP-9CP-10IA-1IA-4IA-8IR-1IR-2IR-3IR-4IR-5IR-6IR-7IR-8MA-1MA-2MA-3MA-4MA-5MP-1MP-2MP-3MP-4MP-5MP-6MP-7PE-1PE-2PE-3PE-4PE-5PE-6PE-7PE-8PE-9PE-10PE-11PE-12PE-13PE-14PE-15PE-16PE-17PE-18PS-1PS-2PS-3PS-4PS-5PS-6PS-7PS-8RA-1RA-2RA-3SA-1SA-2SA-3SA-4SA-5SA-6SA-7SA-8SA-9SA-10SA-11SA-12SA-13SA-14SC-1SC-12SC-15SC-16SC-17SC-18SC-19SC-20SC-21SC-22SC-25SC-26SC-27SC-29SC-30SC-31SC-32SC-33SC-34SI-1SI-4SI-5SI-7SI-8SI-9SI-10SI-11SI-12SI-13PM-1PM-2PM-3PM-4PM-5PM-6PM-7PM-8PM-9PM-10PM-11AC-2.Covered in operating system and network SCSEMsAC-3AC-4AC-5=Control covered in operating system and network device SCSEMsAC-6AC-7AC-8AC-11AU-2AU-5AU-8AU-9*Control covered in operating system SCSEMsIA-2IA-3IA-5IA-6IA-7MA-6SC-2SC-3SC-4SC-10SC-13SC-23SC-28SI-2SC-5SC-8SC-9SC-14Information System MonitoringRA-4AN/A. Agencies are not required to perform security categorizationThis SCSEM is used by the IRS Office of Safeguards to evaluate an agency s network, focusing on key perimeter and internal network segment entry points for network segments containing systems that receive, store, process or transmit FTI; and logical placement of networking equipment to ensure control of the flow of FTI to and from the systems with FTI. Agencies should use this SCSEM to prepare for an upcoming Safeguard review, but it is also an effective tool for agencies to use as part of internal periodic security assessments or internal inspections to ensure continued compliance in the years when a Safeguard review is not scheduled. Also the agency can use the SCSEM to identify the types of policies to have in place to ensure continued compliance with IRS Publication 1075.2Updated based on Top 20 Critical Security ControlsTechnical Memo MappingFThe network architecture separates internal systems from DMZ systems. 1. Publicly accessible components reside in a screened subnet (DMZ) architecture to provide boundary protection. 2. DMZ systems do not contain FTI and internal systems with FTI are not directly accessible from the Internet.1. Examine the logical network design to identify the location of IDS sensors on the network. 2. Review the IDS settings and the network configuration to ensure that an IDS monitors all traffic. 1. Determine whether there are any host-to-gateway VPN connections to systems with FTI. 2. For host-to-gateway VPN connections, determine if the destination host with FTI employs a HIPS.,1. If host-to-gateway VPN connections exist to systems with FTI where the traffic between the VPN gateway and the destination host is not protected by IPSec, a HIPS is installed on the destinatio< n host to provide defense-in-depth by detecting attacks and monitoring for potentially malicious traffic.1. A HIPS is installed on each FTI-applicable system which is logically positioned for protection behind the boundary device. The HIPS should be specifically configured for each individual device and those settings should be documented.1. The agency employs malicious code protection mechanisms at information system entry and exit points and at workstations, servers, or mobile computing devices on the network to detect and eradicate malicious code transported by email, email attachments, and web accesses. 2. The malicious code protection software employs signature auto update features or administrators manually push updates to all machines on a daily basis. After applying an update, each system is verified it has received its signature update. 3. Malicious code protection software is configured to perform periodic scans of the information system and real-time scans of files from external sources as the files are downloaded, opened, or executed. 4. Procedures are in place to address the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the information system.1. Review the agency's network diagram to determine how traffic to systems that receive, process, store or transmit FTI is limited only services needed for authorized business use and limited access to authorized personnel. 2. Identify all access points into the information system and how segmentation is handled, and determine what protection is employed at each network segment where FTI is present. This review should cover the point where FTI enters the network from the perimeter to where it is stored or currently resides.1. Review the network traffic flow/data flow diagram to determine how publicly accessible information system components are protected and arranged. 1. Review the network traffic flow/data flow diagram and determine where the demarcation point is for public traffic on the network. 2. Review the boundary device located at that point and ensure that the router or firewall is configured with NAT enabled. $1. The agency's internal network is segmented into separate trust zones to provide more granular control of system access and additional intranet boundary defenses. Segmentation limits traffic to systems that receive, process, store or transmit FTI to only services needed for business use and to authorized personnel. 2.The network segment where the systems that receive, store, process and transmit FTI are located are protected with a firewall to control the traffic into that network. There are multiple layers of protection (defense-in-depth).Systems that receive, process, store or transmit FTI that are accessible by a host-to-gateway VPN employ at Host Intrusion Prevention System (HIPS).71. All remote access to the network with FTI is logged.A hardware asset inventory of all systems and devices that receive, process, store or transmit FTI is maintained in production and pre-production environments.A software asset inventory of all software used to receive, process, store or transmit FTI is maintained in production and pre-production environments.<1. The software inventory includes a list of authorized software that is required in the enterprise for each type of system, including servers, workstations, and laptops of various kinds and uses in production and pre-production environments. 2. The inventory tracks the version number and patch level of the underlying operating system as well as the installed applications. 3. The network is monitored for deviations from the expected inventory of software, and security and/or operations personnel are alerted when deviations or unauthorized software is discovered. 1. Obtain the agency's IT software asset inventory (including software used in pre-production/development environments). 2. Review the IT software asset inventory to verify systems that receive process, store or transmit FTI are included and identified. 3. Determine the process used to keep the inventory current, and verify the inventory is up to date in accordance with the agency's policy. 4. Determine if the agency has the capability to monitor for unauthorized software on the network. 1. Obtain the agency's IT hardware asset inventory (including hardware used in pre-production/development environments). 2. Review the IT hardware asset inventory to verify systems that receive process, store or transmit FTI are included and identified. 3. Determine the process used to keep the inventory current, and verify the inventory is up to date in accordance with the agency's policy. 4. Determine if the agency has the capability to monitor for unauthorized hosts on the network. 1. The organization maintains an asset inventory of the systems and devices that receive, process, store and transmit FTI in production and pre-production environments, including but not limited to desktops, laptops, servers, network equipment (routers, switches, firewalls, etc.), printers, storage area networks, voiceover-IP telephones, etc. The inventory of information system components includes detail such as make, model, OS, type, model, serial number, physical location, owner, and machine name. 2. The inventory includes systems and devices that receive, store, process and transmit FTI in a pre-production environment. 3. The inventory is kept current through periodic manual inventory checks or a network monitoring tool automatically maintains the inventory. 4. The network is monitored for deviations from the expected inventory of assets on the network, and security and/or operations personnel are alerted when deviations or unauthorized hosts are discovered.w1. Interview the system administrator and ensure that network and host-based logs are reviewed on a regular basis in accordance with agency policy for frequency of review. 2. Ask the system administrator to walk through the review process and determine how anomalies are identified and handled. 3. Ask about the agency's process for monitoring increases in network activity. Systems employing boundary protection (Firewall, IDS and HIPS) generate an alert or e-mail notice upon detection of a suspected attack. Si-4^1. The agency conducts automated vulnerability scanning against systems and networks that receive, store, process and transmit FTI at least quarterly. 2. The agency compares the results from back-to-back vulnerability scans to verify that vulnerabilities were addressed either by patching, implementing a compensating control, or documenting and accepting a reasonable business risk. 3. Security personnel share vulnerability reports indicating critical issues with senior management. 4. Any vulnerability identified is remediated in a timely manner, with critical vulnerabilities taking highest priority. +Updated based on internal feedback session..1. Meet with the firewall and/or IDS administrator and/or the administrator(s) for systems employing boundary protection, to determine how administrators are notified of alerts for suspected attacks or attempts to bypass system security measures (e.g., through console dashboard or reporting mechanism)Where network boundary protection mechanisms are not granular enough to protect FTI components (for example a firewall is employed which allows more ports/protocols than is necessary for communication to the FTI component), a Host Intrusion Prevention System (HIPS) is employed.1. System administrators/security personnel regularly review all network and host-based logs on a regular basis, are reviewing anomalies, and are documenting findings and reporting in accordance with the agency's incident reporting procedures. 2. The agency's log review process includes regularly reviewing network activity for abnormal increases in network traffic from the agency's normal traffic threshold. 3. Abnormal increases in network traffic activity are reported in accordance with the agency's incident reporting procedures1. When agency firewalls, IDS, HIPS, and other systems employing boundary prot< ection generate a real-time alert or e-mail notice regarding unauthorized packets based on a suspected attack, or suspected attempt to bypass system security occurs, administrators are notified. 2. The alert is written to local and remote consoles, an administrator must acknowledge the alert, and the alert and administrator acknowledgement are logged.1. Review the network boundary protection components and their settings. 2. Determine whether the boundary protection mechanisms are granular enough to specifically protect FTI components or if the firewall is too permissive (e.g., if the firewall allows more ports/protocols than necessary for communication to the FTI component) Note: This would be applicable if any of test cases 9-13 for the SC-7 control do not pass. All remote access (i.e., VPN, dial-up, or other mechanism) to the network that contains the systems with FTI, whether to the DMZ or an internal network, is logged.The IRS strongly recommends agencies test all SCSEM settings in a development/test environment prior to deploying them in operational environments because in some cases a security setting may impact a system s functionality and usability. Consequently, it is important to perform testing to determine the impact on system security, functionality, and usability. Ideally, the test system configuration should match the operational system configuration. Prior to making changes to the production system agencies should back up all critical data files on the system and if possible, make a full backup of the system to ensure it can be restored to its pre-SCSEM state if necessary. The IRS welcomes feedback and suggestions from agencies in regard to individual SCSEMs.Application Name:Safeguard Computer Security Evaluation Matrix (SCSEM) Network Assessment Manual Control Analysis December 8, 2011+B a?z>j*e ?2/ s4Vm<Sw'>g~1~Ne0{n E(ccB f2ɀ +yV[]  dMbP?_*+%&ffffff?'ffffff?(?)?M HP Officejet J4500 series#C odXXLetterDINU"` xΪLP`SMTJPHP Officejet J4500 seriesInputBinTray1RESDLLUniresDLLHPPreAnalysisFalseMSPreAnalysisFalseHPReportSymmetricMarginsFalseHPHideResizingOptionTrueHPAlignMarginsForMDTrueDuplexNONEHPPrintPreviewFalseHPOverSprayOptionAutomaticHPOverSpray100HPBorderLessPhotoFalseHPCustomBorderlessTrueHPOutputOrderReverseTrueHPOrientRotate180FalseJobUITruePaperSizeLETTEROrientationPORTRAITHPDocPropResourceDatahpzhlw71.cabHPNUseDiffFirstPageChoiceTrueHPMediaTypeDuplexConstraintsPREPRINTEDHPPrintInGrayScaleFalsePrintQualityNormalPrintQualityGroupPQGroup_2HPColorModeCOLOR_MODEHPPDLTypePDL_PCL3HPTilingSelectionTrueHPMediaTypeTreeviewPopupTrueColorModeColor24MediaTypePLAINResolution600dpiPQDPIInstalledHPMirrorPrintFalseHPAutoDuplexScalingTrueHPPrintOnBothSidesManuallyFalseHPManualDuplexDialogItemsInstructionID_01_FACEUP-NOROTATEHPManualDuplexPageRotateUserRotateHPManualFeedOrientationFACEUPHPSpeedMechFastDraftHPOutputBinOrientationFACEUPHPManualDuplexDialogModelModalHPManualDuplexPageOrderOddPagesFirstHPMapManualFeedToTray1FalseHPConsumerCustomPaperHPCustomHPColorSelectionForHPAEnabledHPBornOnDateHPBODHPInputColorSpaceCOLORSMARTHPDriverDataDriverDataHPCustomSizeCommandTRUEHPSendPreloadCommandTRUEESPRITSupportedTrueHPRESDLLNameHPFRSW71HPRedEyeReductionOffHPDigitalImagingHPHomePrintingHPSmartFocusOnHPContrastOnHPDigitalFlashOnHPSharpnessLowHPSmoothingOnHPJpegPngPassthroughTrueHPReverseBandOrderForEvenPagesReverseBandOrderHalftoneHT_PATSIZE_DEFAULTHPMDSideCountTrueHPHagakiPrintingTRUEHPHTDLLNameHPFIGW71HPMHDLLNameHPFIEW71HPHPAFilterTrueManualDuplexPreventTimeoutTrueHPICCPrinterFamily5700_6500HPCRDCommandTrueHPSendUnitMeasureCommandTRUEHPPaperSizeTreeviewPopupMetricHPSimplifiedUITrueHPPosterPrintingOptionSUIFalseHPAutoEnhanceTrueHPPhotoFixBASICHPMaxDpiFalseHPSpecialtyInkSupportTrueDuplexForBPDTrueHPXMLobUsedhpj4500t.xmlxIUPHdLetter o [none] [none]4Pd?02802844dPrint driver host for 32bit app<splwow64.exeC:\Windows\splwow64.exe028028BAHIPACDRWDSGATCAPI;F4E8Q;Ki݅&E%9xPPBHAERP"dXX333333?333333?&<3U} } } $ }  } } } $ +                             @  ;                         9      4*(2# $ % & ' ( * ##$$%%&& ' ( *:x 0(  0 0  r0A ? 1?IRS Logo@!]N` $Word.Document.8W %O2 0S N Group 2Horizontal Rule"< ] `~vB 0B >?Line 3%O]`|B 0 D)?Line 4Z 22]`> @    ggD f2ɀ Tt  dMbP?_*+% &C&Pof&N&?'?(?)?M      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvxyz{|}~HPD99FE4 (HP Officejet 6500 E7(C odXXLetterDINU"<SMTJHP Officejet 6500 E709n SeriesInputBinFORMSOURCERESDLLUniresDLLPaperSizeLETTEROrientationPORTRAITResolution600dpiColorModeColor24MediaTypePLAINHPSimplifiedUITrueIUPH3/KCj}(!XXKKV2=sC:\Windows\splwow64.exe x]oUn?D-ER!dnwQ-- _ 1b^ ^xI;riJT#Y#1wfLg30ȶZ4g3g̞>sfgtH5&459uQMKdv~pߨ|UTV֩YY1i:gVh(ҫ#M;u]˚~k^3I,f^Ԯ3kȟ_}'3#?VSdCreY2=@V:_eU iw4dӸ"3ijj0єTMiו/$gf4zKnk}kKjOv΅}gmpaN)?,/SX7~ 斯yvLWœ"jjє$jӕOrL}~UJh7n[49&iÜYr3ymͦߦ]mbʧBx߬.WM/M^j5fszqٴmy_cNsD~?= yC&䢖I9rI.9yY;/N*+Z%zۮk;I98g"a)蜋ZrA7,ʘrs=NN8[4U.ˈy݃GiLx٣7]Oyp>Tر;PmrQB䰦44#Fh aBr4:a 'XJ#MN8p<'N;a'H8!}4 Nr~'N຃4qNq(b!4:9 8pB ܳd#-4:0"@1qUJ)"-9KL\jbLl3f&0qGM\mc&1.M\'wכ״651nR>wQ1;͞aދc2H~DWv=/E $~xр% ~ױ _ KY/0%)mˀ2 >\:SbeR}_vAMTL }ATS^2gq0_kS E> ڳ;~)e-ijg< u }/@~e*œs}n9,./0/^kbE嗫ܿ 1<>~)ly }_aS9~/esS ~'v~Deejtf/j3u,0LOC_ 8@d  7ggD f2ɀ  tu  dMbP?_*+%&ffffff?'ffffff?(?)?MHPD99FE4 (HP Officejet 6500 E7(C odXXLetterDINU"<SMTJHP Officejet 6500 E709n SeriesInputBinFORMSOURCERESDLLUniresDLLPaperSizeLETTEROrientationPORTRAITResolution600dpiColorModeColor24MediaTypePLAINHPSimplifiedUITrueIUPH3/KCj}(!XXKKV2=sC:\Windows\splwow64.exe x]oUn?D-ER!dnwQ-- _ 1b^ ^xI;riJT#Y#1wfLg30ȶZ4g3g̞>sfgtH5&459uQMKdv~pߨ|UTV֩YY1i:gVh(ҫ#M;u]˚~k^3I,f^Ԯ3kȟ_}'3#?VSdCreY2=@V:_eU iw4dӸ"3ijj0єTMiו/$gf4zKnk}kKjOv΅}gmpaN)?,/SX7~ 斯yvLWœ"jjє$jӕOrL}~UJh7n[49&iÜYr3ymͦߦ]mbʧBx߬.WM/M^j5fszqٴmy_cNsD~?= yC&䢖I9rI.9yY;/N*+Z%zۮk;I98g"a)蜋ZrA7,ʘrs=NN8[4U.ˈy݃GiLx٣7]Oyp>Tر;PmrQB䰦44#Fh aBr4:a 'XJ#MN8p<'N;a'H8!}4 Nr~'N຃4qNq(b!4:9 8pB ܳd#-4:0"@1qUJ)"-9KL\jbLl3f&0qGM\mc&1.M\'wכ״651nR>wQ1;͞aދc2H~DWv=/E $~xр% ~ױ _ KY/0%)mˀ2 >\:SbeR}_vAMTL }ATS^2gq0_kS E> ڳ;~)e-ijg< u }/@~e*œs}n9,./0/^kbE嗫ܿ 1<>~)ly }_aS9~/esS ~'v~Deejtf/j3u,0LOC_ 8@ 7  ; DD B@Pass; DD B@Fail; DD BInfo  ; DD B@Pass; DD B@Fail; DD BInfo  ; DD B@Pass; DD B@Fail; DD BInfo  ; DD B@D  ; DD B@D{+{  {+{  {+{  {+{ {+{ {+{ {+{ {+{ {+{ {{ ;DD B@3{{ ;DD B@3ggD f2ɀ 9  dMbP?_*+%&ffffff?'ffffff?(?)?MHPD99FE4 (HP Officejet 6500 E7(C odLetterDINU"<SMTJHP Officejet 6500 E709n SeriesInputBinFORMSOURCERESDLLUniresDLLPaperSizeLETTEROrientationPORTRAITResolution600dpiColorModeColor24MediaTypePLAINHPSimplifiedUITrueIUPH3/KCj}(!XXKKV2=sC:\Windows\splwow64.exe x]oUn?D-ER!dnwQ-- _ 1b^ ^xI;riJT#Y#1wfLg30ȶZ4g3g̞>sfgtH5&459uQMKdv~pߨ|UTV֩YY1i:gVh(ҫ#M;u]˚~k^3I,f^Ԯ3kȟ_}'3#?VSdCreY2=@V:_eU iw4dӸ"3ijj0єTMiו/$gf4zKnk}kKjOv΅}gmpaN)?,/SX7~ 斯yvLWœ"jjє$jӕOrL}~UJh7n[49&iÜYr3ymͦߦ]mbʧBx߬.WM/M^j5fszqٴmy_cNsD~?= yC&䢖I9rI.9yY;/N*+Z%zۮk;I98g"a)蜋ZrA7,ʘrs=NN8[4U.ˈy݃GiLx٣7]Oyp>Tر;PmrQB䰦44#Fh aBr4:a 'XJ#MN8p<'N;a'H8!}4 Nr~'N຃4qNq(b!4:9 8pB ܳd#-4:0"@1qUJ)"-9KL\jbLl3f&0qGM\mc&1.M\'wכ״651nR>wQ1;͞aދc2H~DWv=/E $~xр% ~ױ _ KY/0%)mˀ2 >\:SbeR}_vAMTL }ATS^2gq0_kS E> ڳ;~)e-ijg< u }/@~e*œs}n9,./0/^kbE嗫ܿ 1<>~)ly }_aS9~/esS ~'v~Deejtf/j3u,0LOC_ 8 R$ kc kL k^ jjj  j@j@ ~ j@ R? k@ R$ kM k. k5 jjj  j@j@ ~ j@ R R R$ R) R+ R* jjj  j@j@ ~ @ R R R$ R( R, R-   j?j@ ~ j @ RD RE R$ R_ ST 1 jjj  j$@j@ ~ j"@ R R R$ RQ R" R% jjj j[~ j?~ j$@ R R R$ RS R$ RN jjj  j@j@ ~ j&@ R R R$ R R# R jjjj ~ j@~ j(@ R R R$ RR RY RZ jjj  j@j? ~ j*@ R R R$ RP R) RO jjj  j@j@ ~ ,@ R R R$ Rf R Rb   @@ ~ .@ R0 R R$ / 3 6 ~ 0@ R R R$ R& R R ~  @~ 1@ R R R$ 4 R7 R    m*@j@ ~ 2@ gF gG g8 ke gX g! jjj  j(@j? ~ 3@ gF gG R$ kU kH ka jjj  j(@j? ~ 4@ gF gG R$ kV kW k` jjj  j(@j? . v0  h(   R  C ]F! d ZR  C ]F! d ZR  C ]F! d ZR  C ]F! d ZR  C ]F! d ZR  C ]F! d ZR  C ]F! d ZR  C ]F! d ZR  C  ]F ! d ZR  C  ]F ! d ZR  C  ]F ! d ZR  C  ]F! d >@Z A N>;L'J@@A'  " BN>;L'JA'  " BN>;L'J@@A'  " B{+{{+{{+{ggD f2ɀ , " *109<  dMbP?_*+%&ffffff?'ffffff?(?)?MHPD99FE4 (HP Officejet 6500 E7(C odXXLetterDINU"<SMTJHP Officejet 6500 E709n SeriesInputBinFORMSOURCERESDLLUniresDLLPaperSizeLETTEROrientationPORTRAITResolution600dpiColorModeColor24MediaTypePLAINHPSimplifiedUITrueIUPH3/KCj}(!XXKKV2=sC:\Windows\splwow64.exe x]oUn?D-ER!dnwQ-- _ 1b^ ^xI;riJT#Y#1wfLg30ȶZ4g3g̞>sfgtH5&459uQMKdv~pߨ|UTV֩YY1i:gVh(ҫ#M;u]˚~k^3I,f^Ԯ3kȟ_}'3#?VSdCreY2=@V:_eU iw4dӸ"3ijj0єTMiו/$gf4zKnk}kKjOv΅}gmpaN)?,/SX7~ 斯yvLWœ"jjє$jӕOrL}~UJh7n[49&iÜYr3ymͦߦ]mbʧBx߬.WM/M^j5fszqٴmy_cNsD~?= yC&䢖I9rI.9yY;/N*+Z%zۮk;I98g"a)蜋ZrA7,ʘrs=NN8[4U.ˈy݃GiLx٣7]Oyp>Tر;PmrQB䰦44#Fh aBr4:a 'XJ#MN8p<'N;a'H8!}4 Nr~'N຃4qNq(b!4:9 8pB ܳd#-4:0"@1qUJ)"-9KL\jbLl3f&0qGM\mc&1.M\'wכ״651nR>wQ1;͞aދc2H~DWv=/E $~xр% ~ױ _ KY/0%)mˀ2 >\:SbeR}_vAMTL }ATS^2gq0_kS E> ڳ;~)e-ijg< u }/@~e*œs}n9,./0/^kbE嗫ܿ 1<>~)ly }_aS9~/esS ~'v~Deejtf/j3u,0LOC_ 8? w sj p !w !sj!p "w "sj"p #w #sj#p $w $sj$p %w %yl%p &w &sj&p 'w 'sj'p (u (vn(p )z )yl)p *z *yl*p +z +yl+p ,z ,sj,p -w -x-p .w .x.p /w /xj/p 0u 0x0p 1w 1s1p 2u 2x2p 3u 3yl3p 4u 4vn4p 5u 5vn5p 6u 6vj6p 7u 7vn7p 8u 8vn8p 9u 9vn9p :u :vj:p ;u ;vj;p <w <sj<p =w =sj=p >w >sj>p ?w ?sj?pD@l&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_ @w @sj@p Au AvnAp Bz BynBp Cz CynCp Dz DynDp Ez EynEp Fz FynFp Gz GynGp Hz HynHp Iz IynIp Jz JynJp Kz KynKp Lz LynLp Mz MynMp Nz NynNp Oz OynOp Pz PynPp Qz QylQp Rz RylRp Sz SylSp Tz TylTp Uz UylUp Vz VylVp Wz WylWp Xz XynXp Yz YynYp Zz ZynZp [z [yl[p \z \yl\p ]z ]yn]p ^z ^yl^p _z _yl_pD@l&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&`abcdefghijklmnopqrstuvwxyz{|}~ `z `yl`p az aylap bz bylbp cz cylcp dz dyldp eu evnep fu fvnfp gu gvngp hu hvnhp iu ivnip ju jvnjp ku kvnkp lu lvnlp mu msjmp nu n{np ou osjop pu psjpp qw qsjqp rw rsjrp sw ssjsp tw tsjtp uw usjup vw vsjvp ww wsjwp xw xsjxp yu yvnyp zu zsjzp {u {sj{p |u |yl|p }u }yl}p ~u ~yl~p u yjpD@l&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&& u  xp u  ylp u  xp u yjp u yjp u yjp w  xp w xjp w  xp w ylp w xjp w ylp w xjp w xjp w xjp w ylp w ylp w xp w ylp w ylp w ylp w ylp w ylp w ylp w ylp w ylp w ylp w xjp u xp u sjp u sjp w slpD@l&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&@ w yjp w yjp w yjp u vnp u ylp u tlp u tlp u tlp r sjp r sjp r sjp r sjp r sjp r sjp r sjp r sjp r tlp r tlp r tlp r tlp r tlp r tlp r tlp r tlp r tlp r sjp r tlp r tlp r sjp r xp r sjp r sjpD@l&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&& r sjp r slp r tj r tj r tj u vn u vn u sl u tj u sl u vn u sl u sl u sl u sl u sl u sl u sl(tT&&PH@,0(  ,>@A ggD f2ɀ  ^_  dMbP?_*+%,&ffffff?'ffffff?(?)?MHPD99FE4 (HP Officejet 6500 E7(C odXXLetterDINU"<SMTJHP Officejet 6500 E709n SeriesInputBinFORMSOURCERESDLLUniresDLLPaperSizeLETTEROrientationPORTRAITResolution600dpiColorModeColor24MediaTypePLAINHPSimplifiedUITrueIUPH3/KCj}(!XXKKV2=sC:\Windows\splwow64.exe x]oUn?D-ER!dnwQ-- _ 1b^ ^xI;riJT#Y#1wfLg30ȶZ4g3g̞>sfgtH5&459uQMKdv~pߨ|UTV֩YY1i:gVh(ҫ#M;u]˚~k^3I,f^Ԯ3kȟ_}'3#?VSdCreY2=@V:_eU iw4dӸ"3ijj0єTMiו/$gf4zKnk}kKjOv΅}gmpaN)?,/SX7~ 斯yvLWœ"jjє$jӕOrL}~UJh7n[49&iÜYr3ymͦߦ]mbʧBx߬.WM/M^j5fszqٴmy_cNsD~?= yC&䢖I9rI.9yY;/N*+Z%zۮk;I98g"a)蜋ZrA7,ʘrs=NN8[4U.ˈy݃GiLx٣7]Oyp>Tر;PmrQB䰦44#Fh aBr4:a 'XJ#MN8p<'N;a'H8!}4 Nr~'N຃4qNq(b!4:9 8pB ܳd#-4:0"@1qUJ)"-9KL\jbLl3f&0qGM\mc&1.M\'wכ״651nR>wQ1;͞aދc2H~DWv=/E $~xр% ~ױ _ KY/0%)mˀ2 >\:SbeR}_vAMTL }ATS^2gq0_kS E> ڳ;~)e-ijg< u }/@~e*œs}n9,./0/^kbE嗫ܿ 1<>~)ly }_aS9~/esS ~'v~Deejtf/j3u,0LOC_ 8@  B7ggD f2ɀ =  dMbP?_*+%&ffffff?'ffffff?(?)?MHPD99FE4 (HP Officejet 6500 E7(C odXXLetterDINU"<SMTJHP Officejet 6500 E709n SeriesInputBinFORMSOURCERESDLLUniresDLLPaperSizeLETTEROrientationPORTRAITResolution600dpiColorModeColor24MediaTypePLAINHPSimplifiedUITrueIUPH3/KCj}(!XXKKV2=sC:\Windows\splwow64.exe x]oUn?D-ER!dnwQ-- _ 1b^ ^xI;riJT#Y#1wfLg30ȶZ4g3g̞>sfgtH5&459uQMKdv~pߨ|UTV֩YY1i:gVh(ҫ#M;u]˚~k^3I,f^Ԯ3kȟ_}'3#?VSdCreY2=@V:_eU iw4dӸ"3ijj0єTMiו/$gf4zKnk}kKjOv΅}gmpaN)?,/SX7~ 斯yvLWœ"jjє$jӕOrL}~UJh7n[49&iÜYr3ymͦߦ]mbʧBx߬.WM/M^j5fszqٴmy_cNsD~?= yC&䢖I9rI.9yY;/N*+Z%zۮk;I98g"a)蜋ZrA7,ʘrs=NN8[4U.ˈy݃GiLx٣7]Oyp>Tر;PmrQB䰦44#Fh aBr4:a 'XJ#MN8p<'N;a'H8!}4 Nr~'N຃4qNq(b!4:9 8pB ܳd#-4:0"@1qUJ)"-9KL\jbLl3f&0qGM\mc&1.M\'wכ״651nR>wQ1;͞aދc2H~DWv=/E $~xр% ~ױ _ KY/0%)mˀ2 >\:SbeR}_vAMTL }ATS^2gq0_kS E> ڳ;~)e-ijg< u }/@~e*œs}n9,./0/^kbE嗫ܿ 1<>~)ly }_aS9~/esS ~'v~Deejtf/j3u,0LOC_ 8@PJ     7ggD f2ɀ T  dMbP?_*+% &C&Pof&N&?'?(?)?MHPD99FE4 (HP Officejet 6500 E7(C odXXLetterDINU"<SMTJHP Officejet 6500 E709n SeriesInputBinFORMSOURCERESDLLUniresDLLPaperSizeLETTEROrientationPORTRAITResolution600dpiColorModeColor24MediaTypePLAINHPSimplifiedUITrueIUPH3/KCj}(!XXKKV2=sC:\Windows\splwow64.exe x]oUn?D-ER!dnwQ-- _ 1b^ ^xI;riJT#Y#1wfLg30ȶZ4g3g̞>sfgtH5&459uQMKdv~pߨ|UTV֩YY1i:gVh(ҫ#M;u]˚~k^3I,f^Ԯ3kȟ_}'3#?VSdCreY2=@V:_eU iw4dӸ"3ijj0єTMiו/$gf4zKnk}kKjOv΅}gmpaN)?,/SX7~ 斯yvLWœ"jjє$jӕOrL}~UJh7n[49&iÜYr3ymͦߦ]mbʧBx߬.WM/M^j5fszqٴmy_cNsD~?= yC&䢖I9rI.9yY;/N*+Z%zۮk;I98g"a)蜋ZrA7,ʘrs=NN8[4U.ˈy݃GiLx٣7]Oyp>Tر;PmrQB䰦44#Fh aBr4:a 'XJ#MN8p<'N;a'H8!}4 Nr~'N຃4qNq(b!4:9 8pB ܳd#-4:0"@1qUJ)"-9KL\jbLl3f&0qGM\mc&1.M\'wכ״651nR>wQ1;͞aދc2H~DWv=/E $~xр% ~ױ _ KY/0%)mˀ2 >\:SbeR}_vAMTL }ATS^2gq0_kS E> ڳ;~)e-ijg< u }/@~e*œs}n9,./0/^kbE嗫ܿ 1<>~)ly }_aS9~/esS ~'v~Deejtf/j3u,0LOC_ 8@@ ~ D@@ F2 DDEFDDEFDDEFDDEFD DEFD DEFD DEFD DEFD DEFDDEFDDEFDDEFDDEFD(RT82222PHp$0(  $>@A   7ggD @U|՜.+,0PHP X`hp x   CoverPurpose Dashboard Test CasesOut Of Scope ControlsSourcesLegend Change Log'Test Cases'!Print_Area  Worksheets Named Ranges FMicrosoft Excel 2003 WorksheetDocumentSummaryInformation8CompObjkBiff8Excel.Sheet.89q