ࡱ>  9:;<=x  !#$%&'()*+,-./012345678?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry F0DWorkbook  MBD0004F59A  FT y7T y7Ole = !-F!cover!Object 1  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89qOh+'0  4 @ L Xdlt|Christian, Michele  Normal.dotmChristian, Michele Data 81Table",CompObjyOlePres000>\8DdO zp<  C Ab48{ߌ[4yͰL8Dn8{ߌ[4yͰLPNG  IHDRO:EgAMA pHYs12N– IDATx}8e}{p#0rCG`9&r"D3KPxg`EF.oϼX̋ϼX̋ϼX̋ϼX̋ϼX̋ϼX̋0+놡y8ck+Sx脰:D[Q/[??HPTI5o HuoD1ճC ]^Qhz|`VOOay Z8n#ʬCR6RJUoZ篟tXܳCPZNa~FET5ېbns#n[.ZW>w9 |[FV,:xۧ/{k>qvD h"СP))F #ƟS)!GĎjJ3+Dbm5Ĕn~CZLCa#`m魜;?kWOV!Jm UKaܣj\$܄=O9FV"kTגyn- jVw!:j<ݜwAxND(ySzYKz>pRN=XT*QU/{o+T&iJ6YK~=H'?0Ou7-峭+5GdA:Vc&~E|OJӒ*X@UNHtc>Z󋄆4OgҨz/'~BQ1| .3SZ$N588l ՃbjU4&٢x/1fç#N-olKu!,O[\g(yϨh:\4{5q=~)|*Xpu0zc7C6Jg5}9AFtFqr74՚ d4ϣnVH A? 'bq„c|sB&IPݝ6m}궕i#:'PfC.4NUc31Zoj!4Oqf3]o"eLt W<'aM(>e5v M:_Y*y]Ɓ ďg%u =ԖIWqBYm]Gn 4<rф 傼;+ZܞQ |V^kɶ=KL)9#bчMBHdG tSs 6( W<ϖO3qͧTʴ[K` k߂cd ؑ/\^芊 >1_OO, λX%Z뤿6@qNgϗI3<=Α}M:skfwvA[" %cŖ=yTwt|P @Y9[jO==E /`1{zX Uѫc5qVxͤe+WbJkAmؗHv&5vmԜ0?0`OwjtkᾛMX;>_*I|p۫7QǢr&C"[m%Ls h6>%k^n{;8c,z'F3{?ͲQ{@?YM|R5\טT}dufx ]"H!' C~H)ӘDVi})"OҼFZL0+IO1&f>}OXwMZѺJnrtw2@v&O7>z?l3bS]';q:MyT'fEmS ű+HZOn,Fa `D7·(-$T*&󟟢ܣX^$Q;_MuKé(Uֆ1uCs1XGb6(kg3h١Rq"3n논%SRbKO,Ts~f~90C`QɨĬlYkTsL,'˼k N ۽ [rLc(>-ZA )ҟFJAt~O[~O)gA{'maQ aB3r#Sq#rО5$Pb=6 ՅZvѺEfD+1EѾDT $wV{cDyhK֚&{)t }5 EyTV\vj.AsTr ;21Vm|hY%!#n>q^: nI {N4}&8Zܚ6HȖ܊)*# zc۶7o= 1z E@l>}= ׌7EBe¦cБ~P {9dkwe5-|dBͫ7EQm]eU0kl\% ~߳zlLrGݠ5fq~Ê Mb஁՚;vpl_3N( a5LfH>&Qb0'=fbLO&߃uY+XPEDJW]3LLL UJ oYs_M'6($>LYcR31[mU %G9L'0.Xָ*vKZ߫Z?NFD>}2 >wV _U 7Q <\YhNh1U=H' x?BkS|blyjrrDTP,8pCwqm?dο"B_WeP]ڀk{e'bf0ݑ]'إ)ԮZg:ħ0nY-ˍ :*1稝 RjVWAN$(VT@W&iP?|opOj=@Z=Nx>;&=VSj'4 &*NwCvό5\4c=:_8~T`w Ci??ҍ}mkP3ZGuxkТ-q K@ $Gۖ [ѐZJدqЀau|'eM_͉v*l' xZ3NX:D2m΂-Dzwk1@t_xUڏ|G-U~lLKوĞڱeJ? /v|v܈k,'|`Lqu`a0QT'{KE!S$,kض'8NՀ88dRdy:7pbmd?uPs7a,zh4@2,|u m16j=yסhg9Ms5'.)lp*,Gxst% UgBu 3ggwhxy׃$Ӏ._)$/]uQI͟ἧ&O:@9T'>t~m 4~@sTodZ揥&"_ [$)(zuOoyqS]n?ħyx++W"%EUO{/`,P'^qbN -=8R/]uF<'PkViHguDvTq=4~9 E[:=S{uCrN2o3CU%^MtKs^çyG-VK26۲uYwg3ЀRuJnى| +ZL'm)D9,,ϧw։MɓnS.!#1N)rt#|nDX~ұDx:} hG"8DD5׀AOI` C*T ^NԢ#qoWD^Km^NJϩ 4FŖBӳ٦hz4y.4yҝ4dIB,^N,il xs EbD CFLE[% aQNƏ*żgQ% *k<s&Tq~)qgK#X nX|L )4tsl(%9y3ڏ|ڑhzKn%g|S&)\>נo@3([W`ЎD_$ WQ`-Ml[C *\Dn ^0Cxj}A-.O5Af7JhtY?`Z|?}H$=E[]g?N><$*hnY !*2S>||Ͼ"ey?\ꋆCXAE)qO_EP=)N r ڱWoK]>,g䓿rwo?ۏU\2!QAp4._~0HhSBY2@"XbjZãuE+N;{b7Oy ۥ1{i3;irMCPq?wf|`*gBQ mGCvEǡ2CD:Sqxtd?r/J,P'O0[߻la<о@cH'i0o1h篟~ 7c=KY}H9PQq| ? /ЮwTdml&=ʒè ,3 Yf*s}73lǜJ<[y|OOm:*KD؃0 >g/CMrwDESt,|&sonu!]{yCDP`;4}toS^OwG/1Յ3٧*N.@~Hnl|mI}E5I 3$LNW`UXBowN?vNLDw|.ݪ8J:*Vn_1 a7 ?A)wk*B6sX.tpיhbЏADgO[Q?{l5LQ<76ٍ$UolFLs )9i"p ]msPw'6/l6j;Bňj kƶhԽ3 X}RWv]Nat;΅bPWU9s5z8%w_DDGݓD:Jܡr̷Đ}`Dh._G.E>IF.b=b#>Cͥ'1]sWO?9:L $(qTO97h*h0SJAV\:Dh=ΰk^ZK4N4SoNNZX>! []'*R힓]0*OPqy{K/IT[g ."Onn|ul}^-a"4byrab/<^)Pt7nF`e"Rص d5t[2~DNlRӇ˥a>SAۿK#sU?=x7ǽ ḀG~uZ.w鞖1EL\/\f<Ѯ04ԺzzOgٮ1i{u^,WF]\85PEB9bYiӶ5l]a~Im9e%dDŽ!`bKewKtRoO+VO2.e OO?|e|Sx|$+cֹB}ҙS=Rx#Xc%K|B{C 7cԟ}@TX@bn"ˋZvQe(b^œi[}nKA,8R⪞GKj#Lz67 fPS=C# vQ7+wB&o\~l좢E} ٠Ds`/'ב4Qr)qik )e-1B\ϯǓ2|cx{%F9!s9Y¥r1<)\[NS΂ߏkat~\D/#.0mbp<((v`hĊ/]㾼fUxL,۹h-Dq|.&\ARfj\lzxbՉWxY>vH5+ a.2_~kF &_'4 <螦oUlFwIEEяⰫ3އ"x !I[= ߸N|gdd9s& McbTrC13u)\qy)`f/2&A-0Kt O%wV3>>"s":Y#ɟ~t N)3*#5Vi ĶޘUx煱;Ձpn_³mw<*҆SxyfM:O' .mj r>ҋ"n*NT4pN c \)1 {on^ WXdrqޑy0]{tVgź? *xntlo:p;Fݱ&-WJ]0\OXg>.)8u;":y۱=ǐ淖}/ѳ"p+e:&s&gNg<8fe[M蚧}xV8q$,;<?wvG8$g}-y;,*=Qxu`w*ޟ쿽p:^cWqxd]YbPT怚wRfE"za0Z1јa4U{IMхBI*PEq,.bPlvLMZzm;Q|FJL#qL wbKzo6\#|3g/FcF3VUxd1dy #UB|q|F,~`C5>fG11]˞#y=~hauucX!-q|ڻ >=':B~[h*NV|=Mɧ92Y (E* vfx %ߵ $+lgoaBgڍ18M@Ty-q =k ;p1N/JPIeUKrk /PPG" XE7@ ?)8֋(|& <]_EmE#æV\lވbSM/2( d|izy8 yeo'+-kF3X@iK;-^(۽#m6yܔO"7?T,G/QdōLꚃlcL˰ |F3P6"|>Zё.(#§1Ѫ)ħ1Ƿɵوth1ُ)ɱ?<>JA<+ ?t/d CWOC#+y+y+y+y+y+y+y+y+y+y+y+y+yWQ~?|q^R2j^%"Eh嘫g^|g^|g^|g^|g^|g>$pxW.>w@YoJѝSqzx:tn4W%sW䡽F1kymЉO2g?Y3:̤&bstU] |b`,Vl k& W(|2\i|\}1ɸK^9(vS>B |9 >7ç6NcBB"|Xgx>8.45ǧp| [Qj{cюefu ;)X&~Jȧ5'| Ơ#2C AT.gӷtⳋsN pCvm>x~l bj; T^x[T?\MԭӦ̾1=qYP)<< еl=P<a x; ӼO(I}@޹? c%T.% 缟pk%c藹}gy/^%+y+y+y+y+y+y+y+y~a/9\~+Gݝ?eY׷[b9Plz}qUyڿeƵѷ]b6 q'9ϏC! ryAo,㣇[xw"xse e; <qxψ> (U)s Otnx B=/bIrvtllO(L@G q)cڹ 5*>U洡P}ጟ欙S7e;¿?O(戾vİjہ񁣧95?ϰҾǑ>ֲ%p?DֱЯ|.1E!=~A 8nag(33}8^\QRs ]0v1Cٜ&ǁxS32{GTGܘ98\*>E@8;BJ`aIF|윟|wԗBg>k1#!CNRh}a'Q}ȪQսbNg~iRQ4Es>/l?xjc1G^2Qsɱ&O'x2E祊tTЊlOT` T,Ŷ%LF2ٲLML\zjhb zyJ,|" Bj9swF|w0oJs\HTTÁ~k-ՎHL>!?yY+$)Y:zoD V_>|c+@283c\R1o 9f+< l?vJ=Y-a42v$r1v#|Εs;Ͻw\n; oR|МL 2p\_)`l8[0DǜJ>-l*ĩ릿o2KVڶmaI_4 }{0 |Zk<|{@6y07MNу՘;6`1|.|B;D:9*Őz ^"L=F#Pv ˻5} O#?tg4 $|x p{y,eԍ&.,kMi뺞/5oHyvZu#ԣ1[Ɛ9oOLE+ޜ p0OBěRyvh ٵ_r*6'\'쌹'MeQ0OVog=U(T1izg墈4+ܴiE(n[9ZAZ|idE_UQ dԇp C)us iC.*9Kt|2n Ԏ^?7cP ͐ + uL ZIl/ٿD{% ȜTeN|}NIka l?L';y$*||FeuP-;v;{Rwfoyy`[? wzPGDw)A_o$Er>s´"0<< U۾A5?'~@ѿ?) e痺:P8;_(IPLm9-/9">^wɩmf:iCe=>BHg6a!*2GJ`B)sᳱcli/soȑͧʣؚ l)?m f#TL=scb>[=lCc[~>LafOTA?Uk3wNa1kf=2l˃( d>_jSb Pħ_myݧ>Kh.#*MNPħC{꽏GE/!O^në  6ё-u/ G'YŻ'|1ERYU؟xL"&i1ULdiqqY`t陓4>#v5A>ɠR|2lOv,ϲp@?HVr&2Hj-//ozĩϕ=Uy[g# E%,~o8+U;N.|ڽa?oϼk=983Ec"ZO#f{DHJY&RO;u0XB/v6v09ASigz{$s |q3HH`oӼf>sHeWdB߷SqTZ~O7xkhvuB)E(Z}UaRw}~؃W\5Ƙ 8;[w"GɊ_M_1`Fxw[7+}Θ1'սi GHSʍ{`;EČ/O8G fJt#A~y$ݏPp~t4y GzDϴπ06666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH N`N Normal,ndhCJOJQJ_HmH sH tH " pHeading 1,1 ghost,g,Ghost,ghost,g ,1ghost,Ghost +,h1,Chapter Number,Divider Page Text,og,Heading,Ghos,g1,Graphic @&CJ*2* Heading 2,2 headline,h,headline,h2,h headline,Heading 11,heading 1,H2,heading 2,Heading 12,oh,Header1,Heading 121,h g2,Heading 1211,Heading 12111,2 hheadline,01 Headline,Heading 13,Heading 121111,Heading 1211111,Heading 12111111,2 headline1,2 headline2@& #@5;020 Heading 3,3 bullet,b,2,bullet,SECOND,Bullet,Second,4 bullet,h3,BLANK2,B1,b1,blank1,3 dbullet,ob,bbullet,3 gbullet,dot,second,3bullet,Bulle,bdullet,heading 3,Bullet 1,3 dd,3 cb,3 Ggbullet,02 Bullet,bul,B,Heading 21,3 bbullet,Heading 211,3 bulle,h 2,Dot#F@&]#^F``B` Heading 4,4 dash,d,38[@&]8^[`nRn Heading 5,5 sub-bullet,sb,4[~@&][^~`fbf Heading 6,sub-dash,sd,5p @&]p^ `FF  Heading 7$$@&a$ CJ$OJQJNN  Heading 8$$x@&]a$5CJDA D Default Paragraph FontViV 0 Table Normal :V 44 la (k ( 0No List JJ center bold,cbo$dha$5@@ center plain,cp$a$bb col text,9 col text,ctdPP @CJ.". |col bullet,cb,Center Bold,col bulletcsb,u,cbbullet,C2 Col Bullet,cb 10pt,col bullet1,cb1,c,Center Bcbold,6 chart,Chart,chart @E^`EN!2N col dash,cd k@^`JBJ col heading,8 col heading,ch,Col Heading,8 col heading,8colheading,9 col heading,e,ColHead,C1 col heading,8colheading,C0 Col Heading$dPPa$ 5;CJZ!RZ col sub-bullet,csb ^`LQbL col sub-dash,csd^`FArF col sub-heading,csh;BB first,f,1#^#`CJ> > Footerd P2CJJ&J Footnote Reference6CJEHH*TT  Footnote Texthd^h`6CJPP footnote,fnhd^h`6CJLL harvey ball$a$ CJOJQJ>> Headerd P2CJBB note,no#^#`6CJRR numbered text,nt #^#`5;NN oversized graphic!]^@"@ paragraph,p"#d`#T2T source,so # ud^`u6CJ>B> step,st$8^8`5<!R< sub-heading,sh%;FbF table title&$da$5CJZ!Z trailer,7 trailer,t'x#$2/..).  Page NumberJJ TitlePageBottom)$da$CJXTX  Block Text*$yC]y^Ca$5;CJ$OJQJJJ File Name in Footer CJOJQJ^^ facing page #,fp,&@#$2/.5CJPK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] " 8@0(  B S  ? #2  hh^h`OJQJo(#2 n @@UnknownG* Times New Roman5Symbol3. * ArialABook AntiquaY Harvey BallsCourier New;WingdingsA BCambria Math@ "1hJK#fiK&,cY0dS2HX $P n2!xxChristian, Michele Christian, Michele        !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~\ FT&" WMFC l EMF \KhC   % %   Rp@"CalibriHRO`2H@,$O`2H@ o.1@H <:o.1 ,%7.{ @Calibr ŗ`2s:Lt9'1z%1<:dv% % % !F(GDIC!b K  QOPl0 (Oppp@@@000 PPP```C k                                  H       "             [           &" WMFC m            8          ^                5   2                #    h                                          &" WMFC M                            &" WMFC -                                                                &" WMFC                                                                                                                                         &" WMFC                                               &" WMFC                                                                       &" WMFC                                                                                                                                                                           &" WMFC                                                                      &" WMFC m    &" WMFC M                                                          &" WMFC -                                                                                                           &" WMFC                                                                                                               &" WMFC                                                                                                    &" WMFC                                                                                                             &" WMFC                                                                                                 &" WMFC                                                                                                                             &" WMFC m                                                                                                              &" WMFC M                                                                                                                  &" WMFC -                                                                                                   &" WMFC                                                    & WMFC " FGDIC" % % % TTAEALP % %   n."System-- @"Calibri---,n,TA Op(Oppp@@@000 PPP```C k                                  H       "             [                       8          ^                5   2                #    h                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         ''--- 2 pn --NANIWordDocument SummaryInformation( DocumentSummaryInformation8 ,SummaryInformation( 0 bjbj΀ 0 $$$$$$$$8!% -% $'9%9%9%9%9%&&&'')')')')')')'^),v)'$&&&&&)'$$9%9%>'f&f&f&&$9%$9%''T) f&&''f&f&&&9%q=4$&R&'T'0'&v,f&v,&v,$&$&&f&&&&&&)')'f&&&&'&&&&v,&&&&&&&&& #:         h hjh U    dgd  .:p n) =!"#$% 44Microsoft Office Word@ʗ1@KhM@FJ@(Z4՜.+,0 hp  BOOZ-ALLEN & HAMILTON  TitleOh+'0 P      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwyz{|}~ \p Andrew Westner Ba= =,8X@"1Arial1:Calibri1:Calibri1:Calibri1:Arial1:Arial1:Arial1:Arial1:Arial1:Arial1 :Arial1:Arial1:Arial1 :Arial1:Arial1 :Arial1:Arial1 :Arial1(:Arial1 :Arial1 :Arial1:Arial1h>:1,>:1>:1>:1:1:1<:Calibri1>:Calibri1?:Calibri14:Calibri14:Calibri1 :Calibri1 :Calibri1:Calibri1:Calibri1 :Calibri1:Tahoma"$"#,##0_);\("$"#,##0\)!"$"#,##0_);[Red]\("$"#,##0\)""$"#,##0.00_);\("$"#,##0.00\)'""$"#,##0.00_);[Red]\("$"#,##0.00\)7*2_("$"* #,##0_);_("$"* \(#,##0\);_("$"* "-"_);_(@_).))_(* #,##0_);_(* \(#,##0\);_(* "-"_);_(@_)?,:_("$"* #,##0.00_);_("$"* \(#,##0.00\);_("$"* "-"??_);_(@_)6+1_(* #,##0.00_);_(* \(#,##0.00\);_(* "-"??_);_(@_) 0.0%                                        &  &  &  &  &  &  &  &  &  &  &  &       " ff + ) , * $    P  P       ! `             % a # x@ @   Q  `@ @ 7  `@ @ 7  `@ @ 7  &x"@ @  &x"@ @  &x "@ @  &x"@ @  &x""@ @   p@ @    x@ @   t!@ @   p@ @   p@ @   p@ @    x@ @  *p@ @    x!@ @   p!@ @  *p!@ @    x!!@ @  x@ @  x@ @   x@ @   0@ @    h@ @   x@ @   x@ @   x@ @    x@ @   @ @  "x@ @       `@ @    (@ @   `@ @   h "x x  x *x )x !x x@ @  x Zx@ @  |@ @  x@ @  "x@ @  8@ @  <@ @  8@ @   x@ @  1 |@ @    x  x@ @  x@ @  x  (x  x x@ @   x x  8  8  (8 1< 8  *8  *  (   1*|  *x 1*<  (x@ @   x@ @  <@ @      @         *X "X ( "x@ @  "x@ @  "x@ @   (8@ @   (8@ @   (8@ @  8@ @  8@ @  8@ @  8@ @  8 8@ @  8@ @  8@ @  8@ @    x"@ @   x"@ @   x "@ @  x@ @  x@ @  "x )x !x ||ް}<}a 00\);_(*_)?_);_(}P}b00\);_(*_)?_);_(  }d}c00\);_(*_)?_);_(   }(}d00\);_(*}(}f00\);_(*}(}00\);_(*}<} 00\);_(*_)?_);_(}<} 00\);_(*_)?_);_(}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}-}> 00\);_(*}A}1 00\);_(*;_( }A}2 00\);_(*?;_( }A}3 00\);_(*23;_( }-}4 00\);_(*}A}0 a00\);_(*;_( }A}( 00\);_(*;_( }A}8 e00\);_(*;_( }}6 ??v00\);_(*̙;_(    }}< ???00\);_(*;_( ??? ??? ??? ???}}) }00\);_(*;_(    }A}7 }00\);_(*;_( }}* 00\);_(*;_( ??? ??? ??? ???}-}@ 00\);_(*}x};00\);_(*;_(??? ??? ???}-}/ 00\);_(*}U}? 00\);_(*;_( }A}" 00\);_(*;_(}A} 00\);_(*ef;_(}A} 00\);_(*L;_(}A} 00\);_(*23;_(}A}# 00\);_(*;_(}A} 00\);_(*ef;_(}A} 00\);_(*L;_(}A} 00\);_(*23;_(}A}$ 00\);_(*;_(}A} 00\);_(*ef;_(}A} 00\);_(*L;_(}A} 00\);_(*23;_(}A}% 00\);_(*;_(}A} 00\);_(*ef;_(}A} 00\);_(*L;_(}A} 00\);_(*23;_(}A}& 00\);_(*;_(}A} 00\);_(*ef;_(}A} 00\);_(*L;_(}A}  00\);_(*23;_(}A}' 00\);_(* ;_(}A} 00\);_(*ef ;_(}A} 00\);_(*L ;_(}A}! 00\);_(*23 ;_(3 + !3   !3 2 ! 20% - Accent1M 20% - Accent1 ef % 20% - Accent2M" 20% - Accent2 ef % 20% - Accent3M& 20% - Accent3 ef % 20% - Accent4M* 20% - Accent4 ef % 20% - Accent5M. 20% - Accent5 ef % 20% - Accent6M2 20% - Accent6  ef % 40% - Accent1M 40% - Accent1 L % 40% - Accent2M# 40% - Accent2 L湸 % 40% - Accent3M' 40% - Accent3 L % 40% - Accent4M+ 40% - Accent4 L % 40% - Accent5M/ 40% - Accent5 L % 40% - Accent6M3 40% - Accent6  Lմ % 60% - Accent1M 60% - Accent1 23 % 60% - Accent2M$ 60% - Accent2 23ٗ % 60% - Accent3M( 60% - Accent3 23֚ % 60% - Accent4M, 60% - Accent4 23 % 60% - Accent5M0 60% - Accent5 23 %! 60% - Accent6M4 60% - Accent6  23 % "Accent1AAccent1 O % #Accent2A!Accent2 PM % $Accent3A%Accent3 Y % %Accent4A)Accent4 d % &Accent5A-Accent5 K % 'Accent6A1Accent6  F %(Bad9Bad  %) Calculation Calculation  }% * Check Cell Check Cell  %????????? ???+ Comma,( Comma [0]-&Currency.. Currency [0]/Explanatory TextG5Explanatory Text % 0Good;Good  a%1 Heading 1G Heading 1 I}%O2 Heading 2G Heading 2 I}%?3 Heading 3G Heading 3 I}%234 Heading 49 Heading 4 I}%5( Hyperlink 6InputuInput ̙ ??v% 7 Linked CellK Linked Cell }% 8NeutralANeutral  e%"Normal 9Normal 2: Normal 2 2 ;Noteb Note   <OutputwOutput  ???%????????? ???=$Percent >Title1Title I}% ?TotalMTotal %OO@ Warning Text? Warning Text %XTableStyleMedium9PivotStyleLight168=,=,̙̙3f3fff3f3f33333f33333\` 10CoverQAPurposeuJ DashboardBV Test CasesOut of Scope ControlsSourcesLegendk Change Log!  ;   ; I8  Á"n-L'Š!6@=n-L'Š!6 ]xxuP[np+NB)RHqNhqC (5H79;ss˞53 #$!B  a95y {H"/}m>f>JleP 0 %$a LгPN'OО OR#RГ5z<]dhȨ(ȨȀ?$"O!3π&נ i|!;ľ~ #O!L_bfiV?uxM=)Tst,!@j,^ @So?$|1OkxII@Oژ4TS,ZC]qeD|G(T)5).*= c9+WkuRX_P=?H_"wC*`&+@(nVV?5}Q{YڼQJ(kqUp:HwI$ Y6 S1gj3+|pO}W xK#.rqH\n* Ip}b'0X PX^qNg&'1Oz^WEj>.6yuɼ{e_@}j| U|QCKeZQ1pM]]( FY/w$թN ǼV70Me/ಥKLMkV#2i^V}jbpGR"p Ҕ;92Py"@0ne;Sq#XlXf"ޗ;-& x7mt| SmL% M._z6WT֑MM/odjQԕhA3ؖe\L6gbbm'Ra+b¿'"Zj0u>_mI`s./.%O|^/&8;ğq4sM޾څ ρo8Զ](bGKIaY, ][AnҬJKy_PcdDŔ8\G/@)?2d#;B륽Eyh5/]%QڔS觍 @-Y'K]Xl捙j-/?xŸ4Ϭ,nlp` $۰?k&Y̨V Bԏs&7t:^2E+8 <m":vKT#|M>޻,$Z1Uza $iET+\#27Uof^`裷B2 #|./Bu~6 Q PYe['4'&vcbvPBJJ> ',gF`73Ȓ.K1{]D6̬>Qj"TnvS^GRƌ8,!9b>7cNitA_q% I+>頹bbݳrXTf%M]ļ~˾ݏ W43JK<*?%^6[ +EH:f*"Oz^ֻa-ߞ 7 w@D~GBͅrW({{34&0PZVOQ jC" X'@JgCd,O 4WhBt;yb^f0OciЉ%FBpѺ+Lј%R 8ݻ#GyB}l{|~\h΂W$% AZ鱄KD&{;3Y:V$ޏ7a(!"s6hy~ m]0)V̲L:]@6"{D,dH/6Ƙ ,eԩpa7:DHi*;^{!GΒaS^$?IoUAyo `/G]|"Ff} ]PU3XWQqJ9=9K9̉,oRv\o Qp7t\*{0-Wu8Ytb;އ,cʥkGjp/g pdydݤ^Np7!oI oJ7n_ڢaZ W0Jq >|ǃS2mQ L[@<3u@L0LuȱY%}fH@O{v:xnd?Ug'%Ư; uNc}nLR#zo~#SʞiΒ7?2c79L_nn|+-33 :İgg|cqHeQrhe{jbX 3qH0^A9`}e`B˛FpVnt߂ߑp҂]ׇ1L@uVWw*5wL~|нA61oRLqW ma XVu]SX*H YmKf-8p*g&{|g֊ M 6M?Xcj PXȺZa|5f@CH6BoCuVUue2h4a0dέv*[ڛQsT c,yڌt*7X"BUx\S-*wF+5Fihgoq:ɿ{饗uS° l5DLNh mE[^hbC?X|̮LfdqAi-kFL8KC]vDUinmiֶGac4LW"2?dd;WZXwxMfKT[`0lR Ey I_ .ةcI9^ >ER}E>4G JYӣ3pMQX<,4eۃ~ VbuITzڟضGFi1X^2UQQ8~N1$Y[B: ̼pe&?vK KČPtv8iF)xxōs9^Qi,K!ْP̼7] ^fhO4g+GU=-ۈo$x+U44@DCߐW^kv(Tqļo%߷x.'J^^ 8>AME }R*bA{=w8V!l 3բdC=srM z6lv̜vӳMr63hv()+IR~WS5XiFcZL^G}'tXu@|G!S s$ v/_qA ŋ+(Ը;o>-O m $бՔ}:Ni0JN5ȂC{a3AV3̱A$K )wTJ1k@;+#@dt"0/wҬXAmn:TdϬ;C^|'M@;|"\M)$(ЯC|_gϲIO85޹X/2<{-&ԭumVҿ!*WEE%S5,"0*]A#g,B*G{TBsO^"J=Au t7/O-]ŭ*eR9gVՈk7xx = S.hW+W)?۔iy(;Ep^ATVٻdτ991 epIE‘TLJ BL[zް|z7Z-c1)j ul@ 1`NvśPV@hRV#9pb&h\ n ÑCPxS.J}}I_ݸʖ" ?M~0Czu7v, ޜZW_rqq{<[(PH\sUKR/C: =e5G;'wR5zj1*LfP>Z,gR>m>w(#p#oF#l71t..6*yda L#cQ%KQvw[ d@aD|I7re>Fő c76S$w"$7dX6׌z4Avb}(3fmYH$dUFo\ifzUCG"7U8xd?!RDBcRւ%iʶw'h3?Fhח\$]Ef{:cӮ_6u]wA d !s6ԇ-ڋ P' ^/(M&5W0b -tvk{̋s&#&+vs'4o.~yFI4fO|3aCzIb!Q-R!gS.A'< [@iגaN=^O <؃}JJyoIc>=Um8o|$r-S[Ѡv Z8l53&TTw:-K2ӷrÅenCa".}V_%\;;cP95*ْ>RxW6΃چDG$-w|!8eGL٢!>^L [+ 'jh7dV᯻$pGϾCcSzX-9 LڳLAj;Al;xfhMr evL}P 82>yCE8r*_vZy i|)'Ur-v焃hX'C0Z<ʞoơ$g%VjQ6U]My.Xtpsƽཟ ہߝ͕\rDi$;SiG'#%UK% f:mg&Ƭ;f >G³X]U+|yV@\K_E8O@7 ;$Ƥؽ68߸]ZrwɎ=MVOC4'$Q >h&Dm $)-̇zAu;Un /w3CvQqL;."ݶ֩4ʽ22;ޔqۣμV`'/vС*N`(un;[M+͘阾)9~{[p * }ݨ r "J ! K"u{pTIi0íofxe%em3&G+p}?Q.e!Vjt$^-U74-R NIQM |o7aA<[*&"jXqIM#Rzhq_4`Y۰evo''U#ԇԍοž&CJ8k֙fj`lEu!Up+M1޶y>(:|B^{wů;-W}\717,qCD-ׄj :'v~`Ԛm`Xp7~]5XVݾD:l"WgsqxBAKTd] ՎiN+ߥ F\ڤ>ƽ9.Ѱ<6<0`70?r4w-d&B' a{aaÏMxJwM/#>.9n7KP O~~G;҄Upj٨S%^^m<5Wae;9V @9凶ߠ˺:mmj旖ӭ](4÷ucbZޥL1uLK#]L+%.$_R'ώdq9+jIC ws*R+`!-2|ODLdSk o/+b2L8Ȟh/cr{YZL&nz1â"9꺣cVldd73n#.c>ݐe^cRӍ1d|tV!/ 6+ 6mP-ώoMNթ$e5w0IIf"CPߏo. |Ӭv tlz[;{*B-'. Nj)(Tz哉T7̈́aE8˪"Bs40yv)X`mS +fxa<(|2F]{F>%9ٰt888p1ܕɳʶ3ݱ'ޱh?}=ಹ2͞("ܴ䆲rݵ!7ݱ%2]nň/2/8r;Zb5Fy kW3z |ruYNNyh ) Jp4y9BN.zfES.յWvDh mĹn s$B٧GDὐK_x\Txۙ-F<R">Vubw$YTII6z;gcdҗ '"= x n6a*jg/mDΒ>Da攷_a\Mz뭵!U 0|+JA,T ixd"jm 'GBXGtۨW52z[R.2.;rsAʴi0آէe-苼gCe;*?2OнIXp᧤6qߜL;Vh٫!7Rr Ѱ\WP0u} 'TV!(|`rQŚPuk]yc⛲箑8HIKZfC]tsD íxyM70Uƙ{xX<_~)/oǚ]? <nHiT\O;m(,u%T(T*WQQ%[RHITv/̙{/z|_ϯ˼Ҝ99>9̜32'=/1>ǃհշ [8Ǿʑ辱9<*YRڥg 'j)5h}1QB:ӗAf ݜ+d61]Jaio9$dnG}i{(R7@bJPפ8CvXtzɓTZZ-;w.~wJNjJPBw{I!ߊSK&%UiRu.Y\֊2LpJYG?&S;^iWJYK`+#{n J':?m9,UoIm鴍UG~5JƁao2-L~A-,eGN?sڬX'|UCw7um{iڲ5S^y]fʻ U:}((}j-˚?pvN7v&gw 4u})n}M-v'>GuGWث9;շYcR([C9{D ) jIAtEm3~rh皁)x&\rJLq𲊦5?[ݕPЈ}\15MI*CMp# Wq6KO, ^e u6$ `n 4>sY,k^ֺ8UM;أz%Jf!wNdʮقЌECW7儧Oy%{"ar9G~e\k$~Tؖڲpmq޶$M4w1+[bSf1 &N`g֌ܲc\y &Yr 9딙Aɱt x;+J{]QY4概&)ComsZ$OejM'~ xb>V"U=k"D}RMcLDOC3 f}vrlm3<)u:18s<K7Hl2i`IT2u\/דsGԦs%q~SO\buI Ȯ$=:y]n QASWggBl{^bӷӯE ؔ$Yn,UtK>6jJLMr /KxXeחȎ0)1ˏ kSkm;ywDWtX`G&kJ4MV$捁fN$[NַO-{_Ϊ\Ƶ!?潵Okb-hjȴ r M]S<5H~.˛cӅK^Ŝ*+Km\%;[GxbVgQbܪd7x涓?]qr~F^m_g DQ#b%wvؚ9MO4Nȍ齧qL)d$tޜ["֐㳒gF^6T?ɻqfS{y`[K6uA/N+""Dsܫd) YY?%)o`'ԁ?oVTƅyu): W5T{d/Z[W|obyBԽ_cuBӊ&3./g΋9=uSsJi͒'8x&w{lk66_~ڱ?s-7OX~9F"g996ÏNOZ"U㶙"+RU?Գ~k9NǼu,~}'5SԹJÍvū< >6ճМC~緡8|;-%/̴ܰ>/虾6G9Ϲ9Fi$rժ9OlǓX߹eTzb}A52.aE8LK"&NiϱxauY># dۣUH%=lt3wY?X;qzU%ZZT~ZdHTY׫G__zڀ*E.ע'zZ YiL |ݤ+S+TU.kFnoi20Wkh^qyV5̑ܝ =;*y)ebʇ-$ Y " ǏN=3Wl/;Uwǹ"_Mso]aE|GL^#@4y`%qc"%~z]W/t FjvziARC6&LzQe3͏S]ǖ^PLTvdj%M+^b(S_zݬ*G-&%"~@iod&z\Pɼ=-rC+0ku W=u÷G[CH[Iۤc0?" 'B[TJL2vSXIC+I{M??H@BI:6noG7@ 合c2yCByhFБ5)SżLjAI(XV 6&/))$%%aD"inn9r|r2FVVavڅp6y%M,v8ϱ%0s[in"\#҂S[SxD7O#qrR33\S&/ AQ.^0h{0 /@a.5RmD0yDW'/R8C+An,'>&.A[mj"I-O9QQZTPv6dMq(S@4!?$ L-O* F:iaax +:,( p8#DZ(L dǓ:8/ :2}{<Bf^_7ôOdlxlBB` "lyG&71OC)CU;Ba(;Óat710 `" <)*&gx#T9NSQF 5"#lH"\+`1aѓbϚSգaUǑDF$|9B5'%(F 0kõ$mk t<J # Aʛ ZucWfsDΓ GZ4Bգ3,ESe8Qh .Ń虡2i1,y1[ PưBe1b̴;(7yʐu%0¾³ R\ zC&KN NhP-Mz4B DF`m-g % TJMpJ hb9ZOU=Kv"XePHy#efe`GHФ D) a0P Ȧԣ'R̟OJ4.# d$+ "H?IkR@KޯCPgXȆ)*5X4B  _ARnbsF: 0DA]IO`|$ 5.}JUyDKQgDIgOhsr0;| I'=u")3P9$ EOSIj+HE`S(y eIV:(%Gt iDG4xOa.n~#7ɿxm# < C;G>Ԧf90ưűI΢yٹ()N03~ T8CX^ZiaDZ؎(b C ״$AP (9*85 }< L`c@Ul[#VBd'@Ʌ|@ɦ̍Cefa@!LaF䉈J 4'p%UVzo +M!p$`kDBଅĎb~2˨4Fa"gGbޖ!'{C BȠ<#"yBb|< ;9*Mvy"[bh} 3Bu1Lfx2j!;JuG'eG͠劲GE&XOg/fn<"8r9A/T?#&CyEE2VU<'*17G$]3ԙCĂ?Zȸb]#ӡ=/BW/WEAOmi7{Z4-X4#*~ O^TT2~'0?+_6<#|L͝öGFhe5y-6ԟ<ǖJqcK`l8ϱ%0s[i9sl qxBӽI(L u &)7WTX>0Hi7x&Ț.` \IТ:֯sA1c@?Bϯ0?KJ u*2*0b ?l/!ײ>f\CCr/%m DsXPg:C9? RgMuQȨ2> Damlx2V]є@Hf9 X,Oe [t伬2& ʗYز1J/I "xf "$'6 mvpptk8D-~ OvL OYW r^ ,::aH, {/݃>O6QIKj'3t&A@ဗE>E^ck1^Ht~  WxL\"$ j7## [>W 4bzIӂxPx5Jm(EAb`eqS)LO{G4zL"~xhg>J2X1HN"/9"TL2) ^MiQ(A8 $? VEw*AyChoSѐ4@DCڴnq3!"<?,#AKLlm-ğ(BI,-szkT]s6[ә_DH).;k+1ə݉͏kIE1yjV4u&C&7<=Lj^EwR7Ϥ(&ܝx*ItnԺ#\"! p)7kg΂Ԯ)RZj<>'qQPbOs&gb.Ll],(3weIdM4ۭONH:5~WԻn딏 (_ {TA@ȅaN`9=?Qnwq#rE? ~[{*w9 zO, Kү?eA¼V$OoiڊaxS~~8NZn;զNƗ _Ts `!ODkK sCJ+)V,E&KR|tOۀ\w3Wm-7h7XdO=#cVEELŲv+&sCG!}~89j_i }"Ucex uPUf3/ TPN7?r$(sR<}\x>>9S=n.3[P&RFuj^ N<'*<F[gYb?aij^GMg|ΰ#7Ey¯pr({oVȟ>ン, TK`uuG_7"+n+ ^N,6Jyd[T F=gt͙M qa- ;26~5y 6e >-հ{/*ĉ#ڿqu<:v7V D;6 kywwiCN!'>VW@Տ 'a`ůݮ_gّ_\GAn _sbǴJf!}xJ!}xJ!}xJ!}xJ!}xJ!}xJ!}xJ!}xJ!}xJ%+3z A\$[WXϧ ďo<}2C *+&%;T_^|oiih~8=^wL';M?>; ]{]܃lx!+/tiz<Q*AL'B!r%ZѽiQ3 ~TF|b2]a{տDW/--SÓ^t(@@1tmkM7z.m9]“^5V׶S؈* 9P)KEm<2Yv<]aa)~ϊ"[Aa6rSs}vgXR#; rFe/O%trohF"QRٳX a3VeOqxZagM0Cyz '<}W hnR}g(iWj;m„D7e/wo_+/Ņ:yʎI﨓+.=}s*@{Yq-Ga8<=:s7s<O@aO $; Y6pÂ8Kח[k ý`f~[lҔ?%wp{ϋZH CMlzu~kO7k):+:/aհx OфXH ;ҭ+'dz$i;Lf8Gn/YT-Ӓ`8(Ӧ.݂ m|;3?8lӘIqQǾχW ̃2c5~__gaOvi9 o,ϰUkj[jo)8d.+q˧A<>%Xsۏ%Ί)Q^ @΍qKqƍ>}UjR/]ש.ue/3 <ʘ}RGy45X gOԂnsTx[~/Y|zk~-y TRQ &SI_HBz/lYkx><~`o2FpQ2G?O QrE텛'? sY9óy,?y=`2-gPW-@xЛG@ a@p(pZ]ӽ)!X3|sdgfOoS r]uAX)?`b&'kmœ(WHi.}|VꃰR߱.rW\ ),cmpJ];+Ox^ ~r+tx:@6( v<}$joG:uoxf5~O|woِz$k) !U{G6@J7˹!ͣrכ ecoGoDCUיvo"es49m>xvǛXM@; +u/VkӢc)=/2ʰdy7s34 !׍ 0qW1Vn [,p&[629iXI3+:{Iv=f`n5Lzp<;!4>elwX0:OhyO9*q{ z][^8OAqdu~<3Ka>,s .=xLU;%@dz [˧:BQ;h (@퐊WX\#&}Hi'F.odzڣ ᜖#Dmѐj5>W#vn҉9wnljBnz'#CPhm`-=`fHZ]#wQ(cCΔ dHUs~tCw1Df'&A⽹.xa ;|^,:ZH'w9g> #$$Dko % s_sh~A(]{4[_&ujI Fh `YuhAxLjZ W}kd:O,A<*S >βgI9̦:=<3eό=MG^TFPE4Kx$I?PWM߈jwRn튤Pww<4 6Q/'u" &шm9"uxR./Itp":uL'Gʛ+oK$\3Nj^r}-xk * m.'`6*o=~!*mhsAp$U͑H v b"`n 3vdELb+Tt{p@aC[g-Z~;x<7OqYckJoX*/Uн*Υxp23I%DFMI8+е8>'چkk [Ϗ 3,J65*ʁ&29zN6v{ m6#$*h5ҏ`RQ #XMGj>>q,`@v'PJm'i 212ueƦ4aKPAJ*)2>+Zɷ4%紳(5?s<|tआE6cɧs7.źx253͍FFs'.&ճGM= J6ڠf%"#_ҤTmD;6xz}}6TGVOj(@j~fVDGtZд҉(9'7-jL+z 7ZP5™rw,m5=g #L;*wZtk'4E t>UqlULIEa IQT* k?TdwEC4o7A@_ 1Plz[Gu $:X<ɢ&mR.Ӎ8׋a|k'uU#Je:XW4I_gynafl!T,~E6KSpQɅOY/C*BL`0jn;mxׂr*}ѡ4uojHzx3OM T߱r/:U8 ŊMJQramoktf-ݩN!6vRCc'ibyሲB#2 G pƩ 7+DџlnN~wҠ9F+CPCՁ9Ak\oݶ`4x7[khhNMVO JUӸ{P ?^@!* "lEaI_{LL0P’s~y iΗ/iOl5ѦjC#+2-`SJHRJ ҽpl3MȊC_ϵ]t_լ@@%lx-RYiv fB;$Z(2"u( 5bhRۇb1Mwh x? \&]IU!ʓsiR^i\&K5ã0)vYU20PYo*> ϯC 5*4qPI`^碷Sڐpz d)*V D渡}Uotvw}:8y,?UX>gBAfC6*5xy5i 6\*h`?@.O{!u> S'AF`!sw5rPUƞu0C+4Q"kt7U;L)v{:+$B6|OCo'LĂ^AE-f|5iH%&Vm-RbJKJUe]l'gW n4) ]k\d(9j$qh1nWn-/ ç1;$NϏ-$?2Uj<ڰy}DVj5G}>% ' jEX\ Lju=vJZܩXz} g_,U7;W#&vWv %xvBg2O= {2pxd}˳jbGlJ96E|r[f|v1~h'z 7tTdnr'X5#_URjT|/OE0@;ÓE6DZ}K>jʉ h 7 N#߅i> -='Ϩ8ވ cAAV15.s %,;}}O(mw&ҩbV':G b^- /C3 =(Su+Y GzUygĽxPFJˀ71x}RswB7R8˅發(V+5s/Q{%4\ BgwEa@YfA͆[ S,^p'6*Ym(2kz<;ᓼ [Hb~`$qUnĒVbYz FK#om <b=hZlxr kG_K"h"f5;$`t7آ"K_ۯ=! \v?Iq7@AlQDSL\ƕ>L6w\'ƕ.|x@6M>>+h@MuL8}8Q\(QtBGtC%GeI_'czǰc]F>T7fF>KN_Y]kEcjRFaq_xc]  32]<}|0g 3A\ُ(|wcdg-5% .C/_!a2x^34n<1|JL6o)&v  ؒV[{{~E&TI)q+?|Vl^<'0-z8HW[Y'QfH'y he koYU ʁWQhD%I7:Փv: IP1N@_H < >Б _A%ZVRȑ#w"z\_ܝ˰ҙ7e%ՅkD7;>U^ЛWl#H5 ُ3QH(=ـQ_* <>9) şE

{ EӶgzdL* QKvK U$'^}7,$Q42t`3$ #8q?ަ)~|ֲ'N{mqxMzO09Ny$Peu|le.C7"v3 #,o;Ҏ8H""RGp~"G36I;peKqp4N *>;>uV x6|iP<t@哮TsMC!mnzٲOxR4;㨭%PiB\X0qx4LY'LH&/{ZK?\*.2Zt`c' =r`ـXzoց5Cy ątplD`(>5*M$ՅS㝲]rƳ֞4oo/zk,fdz4}Ϲy5;໖ p><촠>UKx}^x*3`~]7Z]x1(Ǧ9Hh| v޾7Čz<Bpl+:Ғ+ ǚ{uՈTp'hu%FxUvI7DD_OFnPQÙCq E*gB녟wr~ |!6P9Z!NfGv9+atg5+ dO'vтyhT=rTE?>و!Zdѱɂ31İհzʰ±<,d #]akCJko_"EOǚ2#<1TjIm{oSZ]=$W%!ӤH>c!L%ٟfͱէ\䥱败:I&݆[x[StxːFg̍0ZArtd c<ˤ$Rz!k#%\]W@,i'GN_q*YI5bƔ:|' @KƗ^?>'#?Fٳ>"t:Ɠ<[ NR>ވZv )Eh>sS (W*N`}$ќ3Qe@^IRb\1ћb*TfMFbEҥ6Rc&6K1 MƌB%oRU|sxNMގ/ZU,%g5%ޣHpܮT19ԒjфMY4J[6 ֙'<< x3h&Q>ɽ7OhHDGgu -#)I#/rkxb[8$a״Ot^gMOZ2Lyp6L5ѹ6g,yqa2xiTxBQƽ떭`Vq$mcgk'DHa[aGuZȳy$̢؉NpG5d &K3utϡ߬g`NHPx4Ĉ4!QQ# !̏:Jr%$'wlwHdހo Ert=86W-%ZB>&~4;W=\ϹÛw: *.1-/ZON܉gp,7lxC> H9VAH4紸.>;'s=L< j{^ғl4@BQCwRR\m?A&9\ B2:vEpecHޞ 'gX9b:wl4gGg0^cfdx*\t;a]N0 #?9Cu9i@y8@^<"93?'nwBr@dwZ+' jH1v ?>Nmm 9=ns ;_v.:[ Gqc_'b~幞%@]sX.Nrj}NdUy$3yMhm|=TQ4?Ceuo fi,5< Ӎ|V>ֳ0S鱫!|)܌[Xs-:$kϵ<dߦFV]eNO>Mjy%ngxDP/EMۮd8_6 m{S<|~ǬlI:;( X3'V3lմ!|==ʻ巡<"k.֌F UߘxaO#tBq0^`~ڽ hO_X %Cߚ˳gx0cXgJougL׉=RbC<կ8.$w3ɠxag7?|->kC_8G:q^?kO~g:׿Ÿ%C?niO_? B忖!#Ÿe/+OΣ3Ӈ3D*GO ޶Ro+ 7{S AA@A@   $EThe audit log does not overwrite old events. Only authorized staff can retrieve audit trail information and archive it for review. Audit trails are protected from modification, unauthorized access, and destruction. Audit logs are retained for at least one year.]An anti-virus software is installed on the system. obs and diskettes are scanned regularly.SI-4IA-3AC-7AC-2AC-8AC-10AC-6SI-2AC-5AC-11CP-4AU-8IA-2Passwords that have reached password aging threshold are no longer valid. Passwords are aged on a per-user basis. The system notifies users to change their password before the password aging threshold is reached.Vendor supplied passwords are deleted upon installation. A list of system users is maintained in the system s database. Guest account does not exist..Password encryption policies are implemented. }Password settings are only accessible and managed by administrators. Passwords are protected to prevent unauthorized access. ?Only authorized administrators perform administrative actions. :A warning screen is displayed before a successful logon. The system has properly configured permissions on system and data files. The system controls actions between users and resources. <Default protection is properly set for newly created files. 9Approved patches for the operating system are installed. LPrivileges are assigned with consideration to the user s role on the system.& Remote access is properly configured.Backups are performed regularly. Only Government systems are used to process SBU information. All storage objects are cleared before reuse. Audit trails are generated. Auditing is configured to capture security relevant events. Audit events include the original of request (e.g., terminal ID) for logon, logoff, and password change. Each audit event trails the user and information relevant to the event (e.g., date and time of the event, user, type of event, file name and the success or failure of the event). The audit record includes the file name of the file related event. User actions are reviewed based on individual identity.ZAfter 90 days, inactive accounts are disabled first, then removed when deemed unnecessary.XTerminals are not left unattended. A timeout feature is set to 15 minutes of inactivity.}Passwords consist of a minimum of eight (8) characters. Passwords have at least one number or one special character, one upper case and one lower case letter. Initial passwords are changed immediately. Passwords are changed at least every 60 days for privileged users and 90 days for standard users. Passwords are not reusable by the same individual for a period of 6 generations.Tester: First M. LastDate:month d, yyyy - month d, yyyy Location:City, STAgency POC(s): Name: Telephone # Email Address(###) ###-#### x#####First.M.Last@xx.xxxDIRECTIONS FOR SCSEM USEStatus # of Tests Percent (%)PassFailInfoNot ApplicableBlank (Not Reviewed)Total Tests Performed-Total # Tests Available[The dashboard is provided to automatically calculate test results from the Test Case tab. The 'Info' status is provided for use by the reviewer during test execution to indicate more information is needed to complete the test. It is not an acceptable final test status, all test cases should be Pass, Fail or N/A at the conclusion of the review. Control IDOut-of-Scope ReasonAC-1 Control covered in the MOT SCSEMAC-14AC-18AC-19AC-20AC-21,Control not selected in IRS Publication 1075AC-22AT-1Control covered in the SDSEMAT-2AT-3AT-4AU-1AU-7AU-11AU-13AU-14CA-1CA-2CA-3CA-5CA-6CA-7CM-1CM-2CM-3CM-4CM-5CM-6CM-7CM-8CM-9CP-1CP-2CP-3CP-6CP-7CP-8CP-9CP-10IA-1IA-8IR-1IR-2IR-3IR-4IR-5IR-6IR-7IR-8MA-1MA-2MA-3MA-4MA-5MP-1MP-2MP-3MP-4MP-5MP-6MP-7PL-1PL-2PL-4PL-5PL-6PE-1PE-2PE-3PE-4PE-5PE-6PE-7PE-8PE-9PE-10PE-11PE-12PE-13PE-14PE-15PE-16PE-17PE-18PM-1PM-2PM-3PM-4PM-5PM-6PM-7PM-8PM-9PM-10PM-11PS-1PS-2PS-3PS-4PS-5PS-6PS-7PS-8RA-1RA-2RA-3RA-5SA-1SA-2SA-3SA-4SA-5SA-6SA-7SA-8SA-9SA-10SA-11SA-12SA-13SA-14SC-1SC-5SC-7SC-12SC-15SC-16SC-17SC-18SC-19SC-20SC-22SC-25SC-26SC-27SC-28SC-29SC-30SC-31SC-32SC-33SC-34SI-1SI-5SI-7SI-8SI-9SI-10SI-11SI-12SI-13 ReferencesjNIST Special Publication 800-53, Recommended Security Controls for Federal Information Systems, Revision 3+IRS Publication 1075, October 2007 RevisionIRS Safeguard SCSEM LegendTest Case Tab: Execute the test cases and document the results to complete the IRS Safeguard Computer Security review. Reviewer is required to complete the following columns: Actual Results, Comments/Supporting Evidence. Please find more details of eaTest ID(Identification number of SCSEM test caseNIST ID'NIST 800-53/PUB 1075 Control IdentifierTest ObjectiveObjective of test procedure. Test Steps6Detailed test procedures to follow for test execution.Expected ResultsLThe expected outcome of the test step execution that would result in a Pass.Actual Results_The actual outcome of the test step execution, i.e., the actual configuration setting observed.Pass / Fail / N/AMReviewer to indicate if the test case passed, failed, or is not applicable. Comments / Supporting EvidenceReviewer to include any supporting evidence to confirm if the test case passed., failed on not applicable As evidence, provide the following information for the following assessment methods: 1. Interview - Name and title of the person providing informatiVersion Release DateSummary of ChangesName First ReleaseBooz Allen Hamilton8DISA Open VMS Security Checklist, Version 2, Release 2.3 NIST ControlTest Case Reference800-53 Test MethodPass / Fail / N/A / InfoComments/Supporting EvidenceExamineD1. Logon as sysadmin without password. 2. Logon as sysadmin with a valid password. 3. Run the Authorize utility by typing SHOW USERS /FULL 4. Check different types of user accounts and verify that open accounts that require no passwords are used (the password is null). 5. Verify that SYSTEM has a system password by typing SHOW USERS SYSTEM /FULL or SHOW IDENTIFIER SYSTEM. 6. Access the network proxy database file (NET$PROXY.DAT) which records specific remote users who may access a local account without using a password. 7. Close out of the AUTHORIZE utility by typing EXIT.V1. Logon is successful. 2. Password expiration parameter for sysadmin is set to 7 days. 3. A password expiration-warning feature will appear. "Your password will be expired in 7 days. Please change your password." 5. Logon fails. A password expiration-warning feature will appear. "Your password is expired. Please change your password."e1. Logon as sysadmin. 2. Use the SYSMAN command PARAMETERS SHOW to view intrusion detection settings. 3. Check the parameter of LGI_BRK_LIM which defines how many times a person can try logging in. 4. Verify the system provide any parameter for disabling user accounts. 5. Check the following system parameters to ensure that they are configured properly: 1. Logon as sysadmin. 2. Type TYPE SYSUAF.DAT to view user settings. Hit Cntrl-S to stop the scrolling, Cntrl-Q to continue. 3. Access the VMS$PASSWORD_HISTORY.DAT file to verify the set of the password history feature. 4. Verify that a history list of users old passwords is maintained. 5. Open the Open-VMS add-in authentication executable file and examine password length and complexity string. H1. Login is successful. 2. A list of user accounts< on the system is displayed with user identification code (UIC), real name, identification information, and basic account name. All accounts are authorized. 3. No vendor-supplied accounts exist. Guest account does not exist. The system administrator account has been renamed.{1. Logon as sysadmin. 2. Run AUTHORIZE and type SHOW USERS 3. Verify that vendor-supplied accounts and passwords exist. 1. Passwords stored in the file are encrypted. 2. Passwords are encrypted. 3. Triple-DES or AES is used as the active encryption algorithm1. Verify that the SYSUAF.DAT file is encrypted. 2. Run AUTHORIZE and type SHOW SYSUAF.DAT. 3. Verify that Triple-DES algorithm is used for encryption. 1. The utility can only be used by administrators. 2. Access to the SYSUAF.DAT is only granted to those who have administrator privileges. 1. User accounts that have not been used for 90 days are disabled. Disabled accounts are removed after a specific interval of time.Y1. Verify with the system administrator the process for disabling accounts after 90 days.S1. Login is successful. 2. The AUTHORIZE utility does not open. The attempt fails.|1. Login as testuser. 2. Attempt to perform administrative functions by running the AUTHORIZE utility. Type RUN AUTHORIZE. IReview the Information System Component Documentation e.g. guides or manuals for privileged users (e.g., administrators, programmers, production control) and end-users on configuring, installing and operating the OS/System Software; and optimizing the system s security features to ensure compliance with the security objective. 1. Verify that an anti-virus program is installed and running. 2. Verify that system files and media are scanned regularly before use. 1. Logon as sysadmin. 2. Enter the DCL command SHOW AUDIT/ALL. 3. Run AUTOGEN to verify the size of page files. 4. Verify that the default behavior of the audit server (Purge_Old [default]) is altered. 5. Type SHOW SECURITY to verify audit file privileges. n1. Login is successful. 2. The following events, at a minimum, were selected: " Logins, logouts, or login failures " All intrusion attempts " Changes to the authorization database (e.g., SYSUAF.DAT, NETPROXY.DAT, RIGHTSLIST.DAT) " Access to a protected object, such as a file, device, or global section " Changes in privileges or the security attributes of protected objects (e.g., use of DLA command SET AUDIT; events triggered by AUDIT or ALARM ACEs) 3. Each event records detailed information (e.g., date and time of the message, type of the event, date and time of the event occurred, the process identification (PID) of the user who caused the event). 4. AUDIT/AUDIT/ENABLE=ACCESS=FAILURE/CLASS=FILE is set. This enables auditing for all failed file accesses. 5. " SYSACF.DAT " OPERATOR.LOG " ACCOUNTING.DAT Auditing ACEs are set for the files so that they are audited. n1. Logon as sysadmin. 2. Type the DCL command SHOW AUDIT to verify auditable events selected. (Or, use the Audit Analysis Utility.) 3. Verify information in auditing messages to each event. 4. Access the VMS$AUDIT_SERVER.DAT (residing in SYS$COMMON:[SYSMGR]) to verify failed file accesses are audited. 5. Verify security auditing for ACEs for the following files. 19A19B1. Verify with the system administrator that a backup strategy exists. 2. Verify that no personal systems are used to process information. 3. Verify the media clearing process for data on the data cluster. 1. Determine the existence of remote capabilities. If capabilities exist, verify that they are managed by each office in support of network security. 2. Verify that mechanisms, such as I&A and audit trails, are used in the implementation of remote access. 3. Log on as sysadmin. 4. Type SHOW SECURITY /ACL to view the ACLs and their capabilities. 5. Verify that access to objects is allowed only when logged in from a local terminal. 1. If remote capabilities exist, they are managed and controlled. 4. IDENTIFER=DIALUP, ACCESS=READ, WRITE, EXECUTE 5. IDENTIFIER=[SYSADMIN NAME]+LOCAL, ACCESS=READ+WRITE+EXECUTE+DELETE1. Log on as sysadmin. 2. Access the SYSUAF.DAT file that contains users' privileges. 3. Access the system administrator's UAF record to verify privileges. 4. Access the security administrator's UAF record to verify privileges. 5. Select a user and Type SHOW PROCESS/PRIVILEGES. 63. System administrators have SYSPRV privileges. 4. Security Administrator allows monitoring of the system (AUDIT, SECURITY, AND READALL); however, he/she does not have modification privileges. 5. It shows the user's authorized privileges and default process privileges. User privileges are assigned properly.c1. Log on as root. 2. Access the file containing information on patches installed on the system. 1. Log on as sysadmin. 2. Check default protection access control entries (ACE) for new files to verify default protection by typing DIRECTORY /SECURITY 1. Log on as sysadmin. 2. As the system administrator, type DIRECTORY /ACL. 3. Verify that the access matrix represents proper authorization access regarding objects and subjects. 4. Type SHOW PROCESS /ALL 5. Verify that the rights are assigned. 6. Type DIRECTORY/SECURITY to view the owner, protection activation, and access control lists (ACL) available on system files. 7. Type SHOW SECURITY * to see a display of all security class objects. 1. Logon as sysadmin. 2. Use the SYSMAN command PARAMETERS SHOW to view intrusion detection settings. 3. Use the "LGI_PWD_TMO" command to verify the time-out period.DISA Checklist, V2, Rel. 2.3&User Identification and Authentication(Device Identification and AuthenticationUnsuccessful Login AttemptsAccount ManagementLeast PrivilegeSeparation of DutiesSystem Use NotificationConcurrent Session ControlFlaw Remediation Session Lock&Contingency Plan Testing and ExercisesAuditable EventsAU-2 Time StampsMalicious Code Protection Information System Documentation(Continued from Test Case 19) 6. Use the DCL command SHOW INTRUSION. 7. Use the SHOW USERS command to verify that user actions can be reviewed based on individual identify. 8. To get a report on the activities of user Robin, enter the following command: 9. Generate a full report of selected security audit records: ANALYZE/AUDIT/FULL/SINCE=TODAY/OUTPUT=20APR2000.AUDIT - /EVENT_TYPE= (BREAKIN, RIGHTSDB, SYSUAF) MAIL/SUBJECT="SECURITY EVENTS" 20APR2000.AUDIT SYSTEM 10. Type ANALYZE/AUDIT/BRIEF SYS$MANAGER:SECURITY.AUDIT$JOURNAL 11. Type ANALYZE/AUDIT/FULL SYS$MANAGER:SECURITY.AUDIT$JOURNAL 12. Type ANALYZE/AUDIT/SUMMARY SYS$MANAGER:SECURITY.AUDIT$JOURNAL   (Continued from Test Case 19) 6. The intrusion database captures the following types of information on login failures: " Intrusion class (genera< l source of failure) " Type (suspect, intrusion) " Number of logon failures " Expiration " Origin of the login failure. 7. Individual user actions can be reviewed by running the AUTHORIZE utility and setting the AUDIT flag. (for example) Run SYS$SYSTEM:AUTHORIZE MODIFY ROBIN/FLAGS=AUDIT 8. ANALYZE/AUDIT/SELECT=(FLAGS=MANDATORY, USERNAME=ROBIN) SECURITY.AUDIT$JOURNAL 10. A brief report of all the security audit events is displayed. 11. One record from a full format audit report. 12. A summary report is displayed.  01. Login is successful. 2. The following information is shown: " List of audit journals, including the journal owner " Security auditing server characteristics " Security archiving information " System security alarms currently enabled " System security audit currently enabled Warning thresholds are established. (e.g., AUDIT /JOURNAL=SECURITY /THRESHOLD=WARNING=100) 3. The audit server runs with a maximum size of page files (20,480 pages). 4. AUDIT/SERVER=FINAL_ACTION=IGNORE_NEW 5. Audit file privileges are set to READ ONLY by Security Administrators. 1. Norton Antivirus is installed and running. New signature files are pushed down and installed every Thursday or when a new file is required. 2. Directory files are scanned regularly. All media is scanned for viruses before use. 2. The following entry should be listed: DEFAULT_PROTECTION, S:RWED, O:RWED, G, W S  System, O  Owner, G  Group, W  World. RWED  Read, Write, Execute and delete. Note that Group and World have no access privileges. 1. Root user is logged in. 2. A list of approved patches installed is displayed. Patches are installed manually to ensure security against the threat of viruses. Testing is also conducted prior to patching. 1. Login is successful. A warning message is displayed. 2. Contents of the intrusion database are displayed. 3. The timeout feature is set to TIMEOUT=15, which means the Server will log a user out after 15 minutes idle period of time. 1. Verify that the AUTHORIZE utility can only be used by those who have administrator privileges. 2. Verify that access to password settings in the SYSUAF.DAT file cannot be changed except by administrators and users who are changing their own password. Type SHOW SECURITY SYSUAF.DAT p1. Login is successful. 2. Contents of the intrusion database are displayed. 3. After 3 invalid login attempts, a user account is locked. 4. THE LGI_BRK_DISUSER parameter allows a user account to be locked. 5. " LGI_PWD_TMO Define the time-out period " LGI_RETRY_LIM Define the number of times a person can try to log in " LGI_RETRY_TMO Define the time interval between login attempts " LGI_BRK_LIM Define the number of login chances " LGI_BRK_TMO Define monitoring period when a suspect becomes an intruder " LGI_BRK_DISUSER Enable the DISUSER flag in user's authorization record, permanently locking out that account k1. Logon as sysadmin. 2. Change the expiration period of the testuser password to 7 days by typing AUTHORIZE /PWDLIFETIME testuser 7. 3. Logout and login as testuser. 4. Logout and login as sysadmin and change the expiration period of the testuser password to 0 days . 5. Logout and logon as testuser. 6. Change the password and logout of the testuser account. LUsers are required to prove their unique identity through their individual user id and password. Passwords are tested and found consistent with policy. All users are authenticated before granting access to the system. Password lengths are not demonstrated. Passwords are blotted out when entered. Null passwords are not accepted. 1. Minimum password length is 8 characters, minimum of 1 numeric or special character, mixture of at least one upper and 1 lowercase letter 2. Password parameters are displayed as follows: " PWD_LIFETIME: 60 days privileged users and 90 days for standard users " PWDMINIMUM=15 days " PWDWARNTIME=7-14 days " INITIAL PWDCHANGE=1 day 3. Users cannot use their 6 old passwords. 4. The LGI_HID_TIM maintains a history list of users old passwords. 5. The password is rejected. 6. The password is rejected. 7. The password is accepted. User account is locked after three (3) invalid login attempts. Locked permanently until authorized system administrator reinstates the user account.S1. Login is successful. 2. As files are listed, their access control lists (ACLs) are also displayed. Every file listed has an ACL. 3. Proper authorization access rights are assigned. For example, (Identifier=Taxgroup, Access=Read+Write+Execute+Delete) (Identifier=Jsimon, Access=Read) (Identifier=Sgibson, Access=Read) 4. The identifiers for the current process are displayed with process and system rights. 5. Process and system rights are properly assigned. 6. Critical system files have system protection and ACLs. 7. Current template settings for the default profile are appropriate. 1. Data is backed up regularly. 2. Only FDA systems are used to process information. 3. All media is cleared before reuse. Clearing and purging procedures are followed to remove excess data from the media.T1. Login fails. No response is received. 2. Login is successful. As the password is entered, there is no prompt and no echo of the characters entered. 3. A list of user accounts is displayed. Member names are unique for each user. Each password differs from the user's login name. 4. Open accounts are set up as restricted accounts (i.e., selected users need to log in to the restricted account first and then log in to their own account). 5. A password is assigned to the SYSTEM account. 6. No remote users access a local account without using a password. 7. The AUTHORIZE utility closes. Open VMS SCSEM Results Dashboard<This SCSEM is used by the IRS Office of Safeguards to evaluate compliance with IRS Publication 1075 for agencies that have implemented Open VMS for a system that receives, stores, processes or transmits Federal Tax Information (FTI). Agencies should use this SCSEM to prepare for an upcoming Safeguard review, but it is also an effective tool for agencies to use as part of internal periodic security assessments or internal inspections to ensure continued compliance in the years when a Safeguard review is not scheduled. Also the agency can use the SCSEM to identify the types of policies to have in place to ensure continued compliance with IRS Publication 1075.Agency maintains documentation for the Information System Component. The documentation is readily available, protected when required and distributed to authorized personnel. #DESCRIPTION OF SYSTEM ROLE WITH FTInProvide a narrative description of this system's role with receiving, processing, storing or transmitting FTI.5The warning banner is compliant with IRS guidelines and contains the following 4 elements: - the system contains US government information - users actions are monitored and audited - unauthorized use of the system is prohibited - unauthorized use of the system is subject to criminal and civil penaltiesK1. Logon as sysadmin and view the warning banner displayed prior to login. SC-8 SC-9(Transmission Confidentiality / Integrity>Verifies FTI is encrypted when in transit across a WAN or LAN.IRS Publication 1075 9.18.2Confirm whether all FTI data in transit is encrypted when moving across a Wide Area Network (WAN) and within the agency s Local Area Network (LAN). All FTI data in transit is encrypted when moving across a Wide Area Network (WAN) and within the agency s Local Area Network (LAN). <Update for NIST 800-53 Rev 3 Update for new Publication 1075The IRS strongly recommends agencies test all SCSEM settings in a development/test environment prior to deploying them in operational environments because in some cases a security setting may impact a system s functionality and usability. Consequently, it is important to perform testing to determine the impact on system security, functionality, and usability. Ideally, the test system configuration should match the operational system configuration. Prior to making changes to the production system agencies should back up all critical data files on the system and if possible, make a full backup of the system to ensure it can be restored to its pre-SCSEM state if necessary. The IRS welcomes feedback and suggestions from agencies in regard to individual SCSEMs.System Hostname:eSafeguard Computer Security Evaluation Matrix (SCSEM) OpenVMS Release IV July 30, 2010 Version 0.2KJ&   lRT:u8pVX>w;!x^2X>EAu G"z&6ccB  +Q5E:<  dMbP?_*+%&ffffff?'ffffff?(?)?MFreedom Import Printer$C od,,LetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"d,,333333?333333?&<3U} $ } } $ }  } I} } $ +                           @  D                     B       0l*2# $ % & ' ( *  # # $! $" %# %$ &% &&& &'& & ( ' ') ' B* ( () ( B* *CxL**|(   %O2 S N Group 2Horizontal Rule" ] ` ~vB B >?Line 3%O]`F|B  D)?Line 4Z 22]`"  JA 1?IRS Logo-P"]N``S  $pN d Word.Document.8>@`SbS  '' yK First.M.Last@xx.xxxyK Nmailto:First.M.Last@xx.xxxyX;H,]ą'c(( yK First.M.Last@xx.xxxyK Nmailto:First.M.Last@xx.xxxyX;H,]ą'cggD  mFI  dMbP?_*+%&?'?(?)?MFreedom Import Printer$C od,,LetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"d,,??&U    b@            + CDDDDDDDDDDDE 5 CDDDDDDDDDDDE 7 DDDDDDDDDDDDD 8   @0$0$0$0$$$$$$>@"    w ggD  OLS  dMbP?_*+%&ffffff?'ffffff?(?)?MFreedom Import Printer$C od,,LetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"d,,333333?333333?&<3U} I}  } }  J         @ F4 GH I, I- J. K/+L ; PassAZM N0+O ; FailAZM P1+O ; InfoAZM Q2*O ; N/AAZM N3$O6@ ; A["M?  DD  N4# R %[ S5 T6# U6@  % V5 7 c*GGGF\CC>@  &   ;  ZAZAZZ$C@Pass;  ZAZAZZ$C@Fail;  ZAZAZZ$CInfo{+{ {+{ {+{ ggD  T [kqwM}݈m5ťU  dMbP?_*+%&LIRS OpenVMS SCSEM&L&F&C&P of &N&R&D&?'?(?)?MFreedom Import Printer$C odXXLetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"AXX??&U} } $} m} }  } $ } #} "}} }} I }} }} $ }    fy |  ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~    8@         w w w w w w w w w w x~ L? z L z. z L z z3 z{{ ~ L@ z L z z L z z/ zzz ~ L@ z L z z L z- z zzz ~ L@ z L z0 z L z z, zzz ~ L@ z L z z L z z zzz ~ L@ z L z z L z z zzz ~ L@ z L z z L z+ z zzz ~ L @ z L z z L z z zzz ~ L"@ z L z z L z z zzz ~ L$@ z L z z L z: z9 zzz ~ L&@ z L z z L z z* zzz ~ L(@ z L z z L z z1 zzz ~ L*@ z L z z L z z( zzz ~ L,@ z L z z L z z) zzz ~ L.@ z L z z L z  z zzz ~ L1@ z L z z L z  z  zzz ~ L2@ z L z z L z  z2 zzz L z L  z z L z z zzz L  z L  z z L z$ z% zzz ~ L4@ z! L z z L z z& zzz ~ L5@ z" L z z L z z' zzz ~ L6@ z# L 6 z L zzzz ~ L6@ Y< Y; z= > L z? z@  ~~~~~~~~~~~~~~DNlt !"#$%&'()*+,-./0123456789:;<=>? ~!~"~~#~~$~~%~~&~~'~~(~~)~~*~~+~~,~~-~~.~~/0123456789:;<=>?Dl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_Dl`abcdefghijklmnopqrstuvwxyz{|}~`abcdefghijklmnopqrstuvwxyz{|}~DlDlDlDlDl          Dl !"#$%&'()*+,-./0123456789:;<=>? !"#$%&'()*+,-./0123456789:;<=>?Dl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_Dl`abcdefghijklmnopqrstuvwxyz{|}~`abcdefghijklmnopqrstuvwxyz{|}~DlDlDlDlDl  &  (  R  C ]F!F d ZR  C ]F!" d ZR  C ]F!@F d ZR  C ]F!F d ZR  C ]F!F d ZR  C ]F!" d ZR  C ]F!" d ZR  C ]F! " d ZR   C  ]F !" d ZR   C  ]F !@" d ZR   C  ]F !" d >@UPՠA w ggD  $ 4| 4  dMbP?_*+%&ffffff?'ffffff?(?)?MFreedom Import Printer$C od,,LetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"d,,333333?333333?&<3U} 8      W8 X9 Y: Z; Y< Z; Y= Z; Y> Z; Y? Z; Y@ [A YB Z; \C ]D \E ]D YF Z; YG Z; YH Z; YI Z; \J Z; \K [A \L [A YM Z; YN Z; YO Z; YP Z; YQ Z; ^R Z; YS Z; YT Z; YU Z; YV Z; YW Z; YX Z; YY Z; YZ Z; Y[ Z;Dl !"#$%&'()*+,-./0123456789:;<=>? Y\ Z; !Y] !Z; "Y^ "[A #Y #Z; $Y_ $Z; %\` %]D &_a &[A '_b '[A (_c ([A )Yd )Z; *Ye *[A +\f +]D ,\g ,]D -Yh -Z; .\i .]D /\j /]D 0\k 0]D 1Yl 1Z; 2Ym 2Z; 3Yn 3Z; 4Yo 4Z; 5Yp 5Z; 6Yq 6Z; 7Yr 7Z; 8_s 8[D 9_t 9[D :_u :[D ;_v ;[D <_w <[D =_x =[D >_y >[D ?Yz ?Z;Dl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_ @Y{ @Z; AY| AZ; BY} BZ; CY~ CZ; D_ D[D E_ E[D F_ F[D G_ G[D H_ H[D I_ I[D J_ J[D K_ K[D L_ L[A M_ M[A N_ N[A O_ O[A P_ P[A Q_ Q[A R_ R[A S_ S[D T_ T[D U_ U[D V_ V`A W_ W`; X_ X`A Y_ Y`D Z_ Z`A [_ [`A \_ \`A ]_ ]`A ^_ ^`A __ _`ADl`abcdefghijklmnopqrstuvwxyz{|}~ `_ ``A a\ a]D b\ b]D c\ c]D d\ d]D e\ e]D f\ f]D g\ g]D h\ h]D iY iZ; j\ jZ; kY kZ; lY lZ; mY mZ; nY nZ; oY oZ; pY pZ; qY qZ; rY rZ; sY sZ; tY tZ; u\ u]D v\ vZ; w\ wZ; x\ x[A y\ y[A z\ z[A {Y {Z; |\ |Z; }Y }Z; ~Y ~Z; Y Z;Dl Y [A Y Z; Y Z; Y Z; Y [A Y [A Y [A Y [A Y [A Y [A Y [A Y [A Y [A Y Z; Y [A Y [A Y Z; Y Z; Y Z; Y Z; Y ZA Y [; Y [; Y [; \ ]D \ ZA8>@A ggD   I  dMbP?_*+%&ffffff?'ffffff?(?)?MFreedom Import Printer$C od,,LetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"d,,333333?333333?&<3U} I_c} $ cJ@ ab db `b fb `bf ex >@cbggD     dMbP?_*+%&ffffff?'ffffff?(?)?MFreedom Import Printer$C od,,LetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"d,,333333?333333?&<3U} h} k} m)g} $tg} g} mh} g} &i} Ig} Ij} Ag} g} $ g ,X@X@@,o,@,@@ @ ,@ @   lmmmg  np A ng  ngg  ngg  ng g   n g g   q g g   r g0&:::::>@Frr J   ggD   #   dMbP?_*+%&ffffff?'ffffff?(?)?MFreedom Import Printer$C od,,LetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"d,,333333?333333?&<3U} $ } m%}       s s s st$@u@@ v tt4@u@ A ut```t```t```t```t```t``` t``` t``` t``` t```T822>@`bA ggD X 8Safeguard Computer Security Evaluation Matrix (SCSEM)IRSJonathan IsnerMicrosoft Excel@l@v)@y7՜.+,D՜.+,h PXh px 'BA&H  CoverPurpose DashboardDocumentSummaryInformation8CompObj r Test CasesOut of Scope ControlsSourcesLegend Change Log'Test Cases'!Print_Area  Worksheets Named Ranges$ 8@ _PID_HLINKSA kHmailto:First.M.Last@xx.xxxkHmailto:First.M.Last@xx.xxx F&Microsoft Office Excel 2003 WorksheetBiff8Excel.Sheet.89q