ࡱ> }ac:1  !#$%&'()*+,-./0;3456789<>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|~Root Entry F,U oZw[@ Workbook=oMBD00113B5E  Fw9 |[FV,:xۧ/{k>qvD h"СP))F #ƟS)!GĎjJ3+Dbm5Ĕn~CZLCa#`m魜;?kWOV!Jm UKaܣj\$܄=O9FV"kTגyn- jVw!:j<ݜwAxND(ySzYKz>pRN=XT*QU/{o+T&iJ6YK~=H'?0Ou7-峭+5GdA:Vc&~E|OJӒ*X@UNHtc>Z󋄆4OgҨz/'~BQ1| .3SZ$N588l ՃbjU4&٢x/1fç#N-olKu!,O[\g(yϨh:\4{5q=~)|*Xpu0zc7C6Jg5}9AFtFqr74՚ d4ϣnVH A? 'bq„c|sB&IPݝ6m}궕i#:'PfC.4NUc31Zoj!4Oqf3]o"eLt W<'aM(>e5v M:_Y*y]Ɓ ďg%u =ԖIWqBYm]Gn 4<rф 傼;+ZܞQ |V^kɶ=KL)9#bчMBHdG tSs 6( W<ϖO3qͧTʴ[K` k߂cd ؑ/\^芊 >1_OO, λX%Z뤿6@qNgϗI3<=Α}M:skfwvA[" %cŖ=yTwt|P @Y9[jO==E /`1{zX Uѫc5qVxͤe+WbJkAmؗHv&5vmԜ0?0`OwjtkᾛMX;>_*I|p۫7QǢr&C"[m%Ls h6>%k^n{;8c,z'F3{?ͲQ{@?YM|R5\טT}dufx ]"H!' C~H)ӘDVi})"OҼFZL0+IO1&f>}OXwMZѺJnrtw2@v&O7>z?l3bS]';q:MyT'fEmS ű+HZOn,Fa `D7·(-$T*&󟟢ܣX^$Q;_MuKé(Uֆ1uCs1XGb6(kg3h١Rq"3n논%SRbKO,Ts~f~90C`QɨĬlYkTsL,'˼k N ۽ [rLc(>-ZA )ҟFJAt~O[~O)gA{'maQ aB3r#Sq#rО5$Pb=6 ՅZvѺEfD+1EѾDT $wV{cDyhK֚&{)t }5 EyTV\vj.AsTr ;21Vm|hY%!#n>q^: nI {N4}&8Zܚ6HȖ܊)*# zc۶7o= 1z E@l>}= ׌7EBe¦cБ~P {9dkwe5-|dBͫ7EQm]eU0kl\% ~߳zlLrGݠ5fq~Ê Mb஁՚;vpl_3N( a5LfH>&Qb0'=fbLO&߃uY+XPEDJW]3LLL UJ oYs_M'6($>LYcR31[mU %G9L'0.Xָ*vKZ߫Z?NFD>}2 >wV _U 7Q <\YhNh1U=H' x?BkS|blyjrrDTP,8pCwqm?dο"B_WeP]ڀk{e'bf0ݑ]'إ)ԮZg:ħ0nY-ˍ :*1稝 RjVWAN$(VT@W&iP?|opOj=@Z=Nx>;&=VSj'4 &*NwCvό5\4c=:_8~T`w Ci??ҍ}mkP3ZGuxkТ-q K@ $Gۖ [ѐZJدqЀau|'eM_͉v*l' xZ3NX:D2m΂-Dzwk1@t_xUڏ|G-U~lLKوĞڱeJ? /v|v܈k,'|`Lqu`a0QT'{KE!S$,kض'8NՀ88dRdy:7pbmd?uPs7a,zh4@2,|u m16j=yסhg9Ms5'.)lp*,Gxst% UgBu 3ggwhxy׃$Ӏ._)$/]uQI͟ἧ&O:@9T'>t~m 4~@sTodZ揥&"_ [$)(zuOoyqS]n?ħyx++W"%EUO{/`,P'^qbN -=8R/]uF<'PkViHguDvTq=4~9 E[:=S{uCrN2o3CU%^MtKs^çyG-VK26۲uYwg3ЀRuJnى| +ZL'm)D9,,ϧw։MɓnS.!#1N)rt#|nDX~ұDx:} hG"8DD5׀AOI` C*T ^NԢ#qoWD^Km^NJϩ 4FŖBӳ٦hz4y.4yҝ4dIB,^N,il xs EbD CFLE[% aQNƏ*żgQ% *k<s&Tq~)qgK#X nX|L )4tsl(%9y3ڏ|ڑhzKn%g|S&)\>נo@3([W`ЎD_$ WQ`-Ml[C *\Dn ^0Cxj}A-.O5Af7JhtY?`Z|?}H$=E[]g?N><$*hnY !*2S>||Ͼ"ey?\ꋆCXAE)qO_EP=)N r ڱWoK]>,g䓿rwo?ۏU\2!QAp4._~0HhSBY2@"XbjZãuE+N;{b7Oy ۥ1{i3;irMCPq?wf|`*gBQ mGCvEǡ2CD:Sqxtd?r/J,P'O0[߻la<о@cH'i0o1h篟~ 7c=KY}H9PQq| ? /ЮwTdml&=ʒè ,3 Yf*s}73lǜJ<[y|OOm:*KD؃0 >g/CMrwDESt,|&sonu!]{yCDP`;4}toS^OwG/1Յ3٧*N.@~Hnl|mI}E5I 3$LNW`UXBowN?vNLDw|.ݪ8J:*Vn_1 a7 ?A)wk*B6sX.tpיhbЏADgO[Q?{l5LQ<76ٍ$UolFLs )9i"p ]msPw'6/l6j;Bňj kƶhԽ3 X}RWv]Nat;΅bPWU9s5z8%w_DDGݓD:Jܡr̷Đ}`Dh._G.E>IF.b=b#>Cͥ'1]sWO?9:L $(qTO97h*h0SJAV\:Dh=ΰk^ZK4N4SoNNZX>! []'*R힓]0*OPqy{K/IT[g ."Onn|ul}^-a"4byrab/<^)Pt7nF`e"Rص d5t[2~DNlRӇ˥a>SAۿK#sU?=x7ǽ ḀG~uZ.w鞖1EL\/\f<Ѯ04ԺzzOgٮ1i{u^,WF]\85PEB9bYiӶ5l]a~Im9e%dDŽ!`bKewKtRoO+VO2.e OO?|e|Sx|$+cֹB}ҙS=Rx#Xc%K|B{C 7cԟ}@TX@bn"ˋZvQe(b^œi[}nKA,8R⪞GKj#Lz67 fPS=C# vQ7+wB&o\~l좢E} ٠Ds`/'ב4Qr)qik )e-1B\ϯǓ2|cx{%F9!s9Y¥r1<)\[NS΂ߏkat~\D/#.0mbp<((v`hĊ/]㾼fUxL,۹h-Dq|.&\ARfj\lzxbՉWxY>vH5+ a.2_~kF &_'4 <螦oUlFwIEEяⰫ3އ"x !I[= ߸N|gdd9s& McbTrC13u)\qy)`f/2&A-0Kt O%wV3>>"s":Y#ɟ~t N)3*#5Vi ĶޘUx煱;Ձpn_³mw<*҆SxyfM:O' .mj r>ҋ"n*NT4pN c \)1 {on^ WXdrqޑy0]{tVgź? *xntlo:p;Fݱ&-WJ]0\OXg>.)8u;":y۱=ǐ淖}/ѳ"p+e:&s&gNg<8fe[M蚧}xV8q$,;<?wvG8$g}-y;,*=Qxu`w*ޟ쿽p:^cWqxd]YbPT怚wRfE"za0Z1јa4U{IMхBI*PEq,.bPlvLMZzm;Q|FJL#qL wbKzo6\#|3g/FcF3VUxd1dy #UB|q|F,~`C5>fG11]˞#y=~hauucX!-q|ڻ >=':B~[h*NV|=Mɧ92Y (E* vfx %ߵ $+lgoaBgڍ18M@Ty-q =k ;p1N/JPIeUKrk /PPG" XE7@ ?)8֋(|& <]_EmE#æV\lވbSM/2( d|izy8 yeo'+-kF3X@iK;-^(۽#m6yܔO"7?T,G/QdōLꚃlcL˰ |F3P6"|>Zё.(#§1Ѫ)ħ1Ƿɵوth1ُ)ɱ?<>JA<+ ?t/d CWOC#+y+y+y+y+y+y+y+y+y+y+y+y+yWQ~?|q^R2j^%"Eh嘫g^|g^|g^|g^|g^|g>$pxW.>w@YoJѝSqzx:tn4W%sW䡽F1kymЉO2g?Y3:̤&bstU] |b`,Vl k& W(|2\i|\}1ɸK^9(vS>B |9 >7ç6NcBB"|Xgx>8.45ǧp| [Qj{cюefu ;)X&~Jȧ5'| Ơ#2C AT.gӷtⳋsN pCvm>x~l bj; T^x[T?\MԭӦ̾1=qYP)<< еl=P<a x; ӼO(I}@޹? c%T.% 缟pk%c藹}gy/^%+y+y+y+y+y+y+y+y~a/9\~+Gݝ?eY׷[b9Plz}qUyڿeƵѷ]b6 q'9ϏC! ryAo,㣇[xw"xse e; <qxψ> (U)s Otnx B=/bIrvtllO(L@G q)cڹ 5*>U洡P}ጟ欙S7e;¿?O(戾vİjہ񁣧95?ϰҾǑ>ֲ%p?DֱЯ|.1E!=~A 8nag(33}8^\QRs ]0v1Cٜ&ǁxS32{GTGܘ98\*>E@8;BJ`aIF|윟|wԗBg>k1#!CNRh}a'Q}ȪQսbNg~iRQ4Es>/l?xjc1G^2Qsɱ&O'x2E祊tTЊlOT` T,Ŷ%LF2ٲLML\zjhb zyJ,|" Bj9swF|w0oJs\HTTÁ~k-ՎHL>!?yY+$)Y:zoD V_>|c+@283c\R1o 9f+< l?vJ=Y-a42v$r1v#|Εs;Ͻw\n; oR|МL 2p\_)`l8[0DǜJ>-l*ĩ릿o2KVڶmaI_4 }{0 |Zk<|{@6y07MNу՘;6`1|.|B;D:9*Őz ^"L=F#Pv ˻5} O#?tg4 $|x p{y,eԍ&.,kMi뺞/5oHyvZu#ԣ1[Ɛ9oOLE+ޜ p0OBěRyvh ٵ_r*6'\'쌹'MeQ0OVog=U(T1izg墈4+ܴiE(n[9ZAZ|idE_UQ dԇp C)us iC.*9Kt|2n Ԏ^?7cP ͐ + uL ZIl/ٿD{% ȜTeN|}NIka l?L';y$*||FeuP-;v;{Rwfoyy`[? wzPGDw)A_o$Er>s´"0<< U۾A5?'~@ѿ?) e痺:P8;_(IPLm9-/9">^wɩmf:iCe=>BHg6a!*2GJ`B)sᳱcli/soȑͧʣؚ l)?m f#TL=scb>[=lCc[~>LafOTA?Uk3wNa1kf=2l˃( d>_jSb Pħ_myݧ>Kh.#*MNPħC{꽏GE/!O^në  6ё-u/ G'YŻ'|1ERYU؟xL"&i1ULdiqqY`t陓4>#v5A>ɠR|2lOv,ϲp@?HVr&2Hj-//ozĩϕ=Uy[g# E%,~o8+U;N.|ڽa?oϼk=983Ec"ZO#f{DHJY&RO;u0XB/v6v09ASigz{$s |q3HH`oӼf>sHeWdB߷SqTZ~O7xkhvuB)E(Z}UaRw}~؃W\5Ƙ 8;[w"GɊ_M_1`Fxw[7+}Θ1'սi GHSʍ{`;EČ/O8G fJt#A~y$ݏPp~t4y GzDϴπ0!2> col dash,cd k@@OB@col heading,8 col heading,ch,Col Heading,8 col heading,8colheading,9 col heading,e,ColHead,C1 col heading,8colheading,C0 Col Heading$dPP 5;CJJ!RJcol sub-bullet,csb <Qb<col sub-dash,csd >Ar>col sub-heading,csh;22 first,f,1 #CJ6 @6Footerd P2CJB&@BFootnote Reference6CJEHH*DD Footnote Texthd6CJ@@ footnote,fnhd6CJBB harvey ball $ CJOJQJ66Headerd P2CJ22note,no #6CJBBnumbered text,nt #5;>>oversized graphic !4"4 paragraph,p "#dD2D source,so#ud 6CJ.B.step,st $854!R4sub-heading,sh%;<b< table title &$d5CJR!Rtrailer,7 trailer,t'x#$2/.&)@& Page Number@O@TitlePageBottom )$dCJFT@F Block Text *$yC5;CJ$OJQJBOBFile Name in Footer CJOJQJVVfacing page #,fp,&@#$2/.5CJ 8@0( mer*mer*mer*mer* B S  ? BA&H USERNC:\My Documents\Props\IRS\TIPS Props\1061\Task Award\Nov Tasks\Task 3 Deck.doc BA&H USERNC:\My Documents\Props\IRS\TIPS Props\1061\Task Award\Nov Tasks\Task 3 Deck.doc BA&H USER4C:\WINDOWS\TEMP\AutoRecovery save of Task 3 Deck.asd BA&H USERNC:\My Documents\Props\IRS\TIPS Props\1061\Task Award\Nov Tasks\Task 3 Deck.doc BA&H USERNC:\My Documents\Props\IRS\TIPS Props\1061\Task Award\Nov Tasks\Task 3 Deck.doc BA&H USER4C:\WINDOWS\TEMP\AutoRecovery save of Task 3 Deck.asd BA&H USER4C:\WINDOWS\TEMP\AutoRecovery save of Task 3 Deck.asd BA&H USERNC:\My Documents\Props\IRS\TIPS Props\1061\Task Award\Nov Tasks\Task 3 Deck.doc BA&H USER4C:\WINDOWS\TEMP\AutoRecovery save of Task 3 Deck.asd BA&H USER4C:\WINDOWS\TEMP\AutoRecovery save of Task 3 Deck.asd#2  hh^h`OJQJo(#2@`@GTimes New Roman5Symbol3& ArialABook AntiquaAHarvey Balls;Wingdings@"0hJKfuKFiK&+cY0dSObjectPool Calibri1>Calibri1>Calibri1>Calibri14Calibri1Calibri1?Calibri1h>Cambria1Calibri1 Calibri1 Arial1(Arial1h Arial1Tahoma"$"#,##0_);\("$"#,##0\)!"$"#,##0_);[Red]\("$"#,##0\)""$"#,##0.00_);\("$"#,##0.00\)'""$"#,##0.00_);[Red]\("$"#,##0.00\)7*2_("$"* #,##0_);_("$"* \(#,##0\);_("$"* "-"_);_(@_).))_(* #,##0_);_(* \(#,##0\);_(* "-"_);_(@_)?,:_("$"* #,##0.00_);_("$"* \(#,##0.00\);_("$"* "-"??_);_(@_)6+1_(* #,##0.00_);_(* \(#,##0.00\);_(* "-"??_);_(@_) 0.0%"Yes";"Yes";"No""True";"True";"False""On";"On";"Off"],[$ -2]\ #,##0.00_);[Red]\([$ -2]\ #,##0.00\)                                                                      ff + ) , *     P  P     !   " ` #        $   % & a '  x@ @   p  p  p@ @     h  "x )x !x  x@ @  x Zx@ @  x@ @   |@ @   x@ @   *x  x   x  "x@ @   (@ @  (8@ @  8@ @  <@ @   x   t""@ @  x""@ @ 8 "x""@ @ 8 p""@ @  "p""@ @   x""@ @ 1     x@ @    ("x@ @   @ @   `@ @   `@ @   p""@ @   p@ @  Q (x@ @   x@ @   x@ @   `@ @ 7  `@ @ 7  `@ @ 7 *pUU@ @   x@ @   x@ @   `  `  x@ @   p@ @  "p@ @   `@ @   x@ @    h@ @   @  `   x x  @ @  x@ @   x@ @   x@ @  x@ @  (x  @ @  x@ @  )x  @ @   x@ @   @ @  x@ @   @ @   p@ @   @ @  x |@ @  (x@ @    @         *"X *"X  (  "x@ @   "x@ @   "x@ @  (8@ @   (8@ @   (8@ @  )8@ @  )8@ @  )8@ @  )8@ @  )8 )8@ @  )8@ @  )8@ @  )8@ @  "x"  "x"@  "x "@  x"@ @   x"@ @   x "@ @  x@ @  x@ @   "x )x !x *X ||<}A} 00_)ef[$ -}A} 00_)ef[$ -}A} 00_)ef[$ -}A} 00_)ef[$ -}A} 00_)ef[$ -}A} 00_)ef [$ -}A} 00_)L[$ -}A} 00_)L[$ -}A} 00_)L[$ -}A} 00_)L[$ -}A} 00_)L[$ -}A} 00_)L [$ -}A} 00_)23[$ -}A} 00_)23[$ -}A} 00_)23[$ -}A} 00_)23[$ -}A}  00_)23[$ -}A}! 00_)23 [$ -}A}" 00_)[$ -}A}# 00_)[$ -}A}$ 00_)[$ -}A}% 00_)[$ -}A}& 00_)[$ -}A}' 00_) [$ -}A}( 00_)[$ -}}) }00_)[$ -##0.  }}* 00_)[$ -???##0.??? ??? ???}-}/ 00_)}A}0 a00_)[$ -}A}1 00_)[$ -}A}2 00_)?[$ -}A}3 00_)23[$ -}-}4 00_)}}6 ??v00_)̙[$ -##0.  }A}7 }00_)[$ -}A}8 e00_)[$ -}x};00_)[$##  }}< ???00_)[$???## ???  ??? ???}-}> 00_)}U}? 00_)[$## }-}@ 00_)}d}Y00_)[$ ## ??? }(}_2300_)}P}`00_)[$ ##}(}a00_)}P}b00_) [$ ##}<}c 00_)[$}(}e00_)}(}f00_)}<}j 00_)[$}(}k00_)}(}l00_)}(}m400_)}(}n400_)}(}o400_)}(}q00_)}(}r00_)}d}s00_)[$## ??? }x}t00_)[$## ??? ???}(}u00_)}(}v00_)}(}w00_)}(}x00_)}(}y00_)}(}z00_)}(}{00_)}d}|00_)[$ ## ??? }(}00_)}(}00_)}<} 00_)[$}<} 00_)[$}(}00_)}(}00_)}(}00_)}(} p00_)}(} p00_)}(} p00_)}(} p00_)}(} p00_)}(} p00_)}(} p00_)}(} p00_)}(} p00_)}d}00_)[$## ??? }P}00_)[$##}d}00_)[$## ??? }(}00_) +   28 + !%8   !%8 2 !% +   2: 3 @%8 + !%8   !%8 2 !%8 + !%8   !%8 2 !%8 + !%8   !%8 2 !% 20% - Accent1M 20% - Accent1 ef % 20% - Accent2M" 20% - Accent2 ef % 20% - Accent3M& 20% - Accent3 ef % 20% - Accent4M* 20% - Accent4 ef % 20% - Accent5M. 20% - Accent5 ef % 20% - Accent6M2 20% - Accent6  ef % 40% - Accent1M 40% - Accent1 L % 40% - Accent2M# 40% - Accent2 L渷 % 40% - Accent3M' 40% - Accent3 L % 40% - Accent4M+ 40% - Accent4 L % 40% - Accent5M/ 40% - Accent5 L % 40% - Accent6M3 40% - Accent6  Lմ % 60% - Accent1M 60% - Accent1 23 % 60% - Accent2M$ 60% - Accent2 23ږ % 60% - Accent3M( 60% - Accent3 23כ % 60% - Accent4M, 60% - Accent4 23 % 60% - Accent5M0 60% - Accent5 23 %! 60% - Accent6M4 60% - Accent6  23 % "Accent1AAccent1 O % #Accent2A!Accent2 PM % $Accent3A%Accent3 Y % %Accent4A)Accent4 d % &Accent5A-Accent5 K % 'Accent6A1Accent6  F %(Bad9Bad  %) Calculation Calculation  }% * Check Cell Check Cell  %????????? ???+ Comma,( Comma [0]-&Currency.. Currency [0]/Explanatory TextG5Explanatory Text % 0Good;Good  a%1 Heading 1G Heading 1 I}%O2 Heading 2G Heading 2 I}%?3 Heading 3G Heading 3 I}%234 Heading 49 Heading 4 I}%5( Hyperlink 6InputuInput ̙ ??v% 7 Linked CellK Linked Cell }% 8NeutralANeutral  e%"Normal 9Normal 2: Normal 2 2 ;Noteb Note   <OutputwOutput  ???%????????? ???=$Percent >Title1Title I}% ?TotalMTotal %OO@ Warning Text? Warning Text %XTableStyleMedium9PivotStyleLight168=,=,̙̙3f3fff3f3f33333f33333\` CoverPurposeR Dashboard Test Cases.Out of Scope Controls TSourcesWLegend` Change Log!  ;;  _xlfn.IFERROR  ;4fNf8@ ah0 a"aw:QtR'`@=`w:QtR'aU; _`x6р(@&thЛ(J@wL`z;w0{w{f4w_織][~fF=p/n7;kړ{l锓;Ҳ7Ͳ<ô}~>h&W;$O~ߑӫ5栽7un/b77&j޽~pxpA)Nq 8)O :թԧ>5|pӜN{!QNw:8Cӟpp8GqLg3pzֳv6889 c89 :׹>7'0)8餓x<򑏄G=QG?cXx Ox|x ^/| E/z/%P/e^W+_Jxի^~5y ׽u׿7Fxӛo~,Kx[o}[mo{owwwnx{}{}{|~>>G>G? 8|O~O} >Og>g? <| _/~PU|K_/|կ׾5׿7&|[߂o|=??G??'ӟ~s/~/W׿7~{?Gӟ/ o?O׿?2.C <ρϓ/ZJlT%]*Rj|,׌!]g񬲤aD4^B,uah卿VݏdIt]̳cXt,oq:2ߍ7ոN>b;Q#Y]" 50γ败<>I{l( g/p9p[\iyTubN<+]Lٶ2Ol39Li,³5<#9^C6 Z7%KhFd OCyLXKK:x.]hjbQĿϒxQK UYXX=Śx*l+´^ZL|t,V믫+uDb'1\'ɲްDʂ鬱&%Ҳ8aVgdѳWʱ6V;³(֐ϒ䴥ܰ3٥P޽|ԋ<[R,O&28M9EK\&̈9GIY4NI瑮'̀'γ&YE Ӣ--,L8t-a/%x="05yb'Fͷ):QMjFfFlRʚGmDnFxFQɑMvElh,SHPnF 0^IS1霏vϚDGOLGO^Hg͝sDSY}GJHn(><rxI0GOfD"F;6܁ is9s9xm9xm9xm9x<6x"fEhхAgYQۯj9I,'܍-ll d\6<3lD묨>-ؘN;2"4رR͊ƧڴڰҍٱwY"O+(ݼ0ҪZx*vx΍m}U\ [qS^'3hd1ua/J!gFL'5uqs#b0,=hkiyVmSbr<ADP/>@v /菦^,"{ ո'USPq_\/(݊23&R]z5c[Y.EsIiCh _6,BXioO84?ge4x)}yLPYL[~He) QMֲAV\;Տqq9NGC2 ǼyԈϳ(+fNCIc1j֑#>xuG3+gu=# tV+4TeˮX8D;!x0;#Y`(ks{su>-ORS(19%?37i'z3@S {9{<Ӂc<\Ͼų0ɳ(3yfI|0306=x7d7ІKρshρshρshρs9s9s*bzѽ*_orvPj5lʵё&MO8fy1o[]'pxb{8ׯ7;;2p+Z̑WGg67hkf?+){8S\vZT;mܟkܦ~yJ{jb!Y7Ok9QO84z)\A(;f:Jvm!Ζ6,v>ϔYw9sV?%ɓU#NSbœWlsS3Yy g[ef-aOH+yJMMK]KY xn0>ܲ>3żSϓ, w䩻swYD0s!{mʳqr/])d3y&<%' -giRw9ZI~gɯ8uMew:)u&gcٗ`+˄rd ʢzR/0Bc7Qn9gcgf nH#1 =ҷh72zuLMOH֊i*d\H(oZrs(⋦*xZZ>ϴ1<-BLᚭ3xrNTP>Y<%g^5x<#B%SAX*O[ qtj̫ԥ0TjOr_k]'6R['t/WYkx<ρs9x<ρs,"NAZH <ϡ <ϡ <ϡ <ρρρρshρsh;gsNJf1SN)Ь}gY$.L˅# <9<>V] Ƀ']02*ay-je<5&D㮮cYWj*Eog]D̳d5)Z! ՛ۄzw~ ظ"؉2fWaoGTOE}ъзyZZ mwB#QtU]榣Sֱ<(kx1vxRNNiJ%RϽh45F@aW:ofĘ0Hk9=u|HՎ6Tn~jX.r11li ""IAQ@yË&@n7x^YbcԾ^#w>+/&)1=DZ'ଲ'<1oO_)W׸o}gH$ -ȩ0Ip r|n{'uY F^.OUC)PMwS C4隐gly+0wș&wTIwNHL*F^})m8M)T I2xdc ~<+sW$vMH堳IEgbĩkb{n>;zw 'w(H~p%Ӑ5k+y ڞ4Ђ_&\FFͰcW7sB7 DaN{} &Hh/{-GkanSwWBhsF w ,PpJϘwJaFan^fGB9r aKPa :q_I"ȴ.^ME<96k`Zͼz'6A+"g[ʴh-ۜ,Lhʋ'UU.Wm[KiM=?T`PF+6A &5ugjAIn2Z ZfYA'`F8$),#ل[pώN, 9Qd{Sd\\7e813`Gfk3a&">܏h謁O¸< "?r?by(ũ_ t< 6/iƗPqzi%X:]׉~ktB23"BVWp#1JG6 ;jIU,!B|BSQ)|BJIO12ͷ 1wOH '"КԮS8Ovx^ɶ7eXWy|6Gg0@ϭgʏtBZ2:e/tf&Wǣ={N<]-OgecxR$[<3+ kIBԖ'鏳~N+̛&gI'Dʨ jyԹOxJ,r-< 9le(ڇgDWʓ(L9Swo%Y^$n5bþD1'𙮘gOjGy>yjW-IO|i穖3 U頫&|<5wT'Qʊ-B4Y OLaeIPg`{oC`ąT>x94ݐ%+Ǣii"@8ɳj*ܰĂ?y:&±aӭg]8<ݦE+-j>59g_ݲ:'ʱ?$۱<??U|EÆF',kzvLECX;'[ό9( pOLzI\ SD>49<4ˊ董S3=-Gy W@mWbXnh[*>-R\ s7d+ tiQJ*:]aqЉnQ%'et~<+U۞̎<%oUpwXgE_GEhmY'˔*=c*էM~1Q9^<8m؏e ([RfΫxJjœ2;:%Kٰ cO%J XWR3:9-9N]+3)& 5[dYgJ͏]xڧ<ߏNh8>я< شT^*YzF*Wηz| <1qЫaׄL "gT'6_$Jd2g<澳vhPΥd,D;P"S֕L ͨPr(y卺;yVYDfD i%ooUXLxa{I͂p$6d4R )=ȹC<%mƽ1R/ck+8=G#4M|{9@|YrLQ ޗTrxNwd1&H$u.&!4ۜwtk빈r'^HRݸJ}y:׃z(|XEʹ.*hk<cxL\< %=РT1Â-Bmtkft&fJu WX&tyCbC)DWUoWI\Qldz`XNfZM“vLYQͭ`5zt<81Di6MURdz`?4QD= m[#u)J2дE<69iCtdr.Ҍę7&mʋODznVNCEZQb֋UP̽x&B/=ZNtN 7)C->m҆3>"8߆n;~R4; g WO%IZTH0'xs vb!qh[US$čGDqxJ< LGڞ^"Ob,WS 16s^Q˺j]86n 瘗]| +GRu1ftQfK.kfcɓsp=G0I,3ġ2MLKddLi[jkkS!Q2r3W,Z{fs&Y9g э!LKIpNOR7L, оZU1(vʮ=Rx+%7ǚ敏5;g)nl@+gDxڱtzr38h1L!}vIk<6Px@c.=XBzYOwX,{8RAEXz<]%ZvD?@CO)3Ͼ )&6Zy@e?4}砥jĞ㝧yIw2]|9<6gu#ΩKi/K.A։et ]69MO+9qERhmP+WIۢVslT:~:ho^TgZ ύ)\lCu0w\% d]+5|VJ mU܃PZt(Qg`Uq}'*kZ,cy ș[2Vȓyhrgfֈ\;jDժQxVk5}nu}@t>粷<9/) G|\v?l~v ?lGp8ɵ'?O9O?q08q£t{)ɽsONp λ&b?bϧ=>~ 7o Ǐw7fy߹L'ߛɿs .qgK ptSpS N}S 9iധ=-r!EtC=;08O~8 g3pGt&8 g9Yg=+lgps8sps }sys8y ;#: .p/Ѕ0\"^$ \b_pK\.yK¥.u)/ eಗ,\r_p+\x+•t%? BUWUjW\Wk\pG5yMֵ׾:׹\ׅ]zp_np oxCHnto|cMns 7fpnq[-oyKխn6 vpp;x;t' {,.wp ~=q= ׽㎃{pCep{7֪?<>p ' x yC}(x= R N:$x#|#Qz<я<1>xI<=i?g3Lxֳ~9y<υ=y?^ _Bxы^/~%/y E/}Ke/{/WW^W_jxk^}ku{7 77f([Vxoxw]w{^x|}C|>я>1?'$|SO|>>9?__"TU_җ_2|+_~} 7 7 ַ6|;߁~}~0Cя~?'? ?g~_/Kկ~7 w꺆???g__oo `<Cx<Cgs%6[x, %]*RjQf2w_=:ge٭APiHGnߨDQW> ]4[xuVA,󷞸y#mHδ1.sO\]E'[XvFSE5 },)`$O;q^QuY9] }x1:*v׃xr3vA< ٔYxT?) 'JO/!<h8£GxrK,I|ރgL.Gy:&>8!2<6"v %]׬UV<}*,9yt9 'GZj6kU7I=(!bdyZ*nF 1/1ve O*?uha/?sSߎאMnfn[Q OlG QA5gPev>63+HU¶zsz] 9L΢,]56 <}x;Nw:aFO/VD^vPm<7=S7NҎ9s9s9s9s9s9xm9xmL3o7;³Bkݸ¦GGG/bw*6+oCu%8W )"P[˃$2{{5Ce1?UE&D̒eEijnd?#rmB a<09I`mE/x&l$x"ʫT|D̊Т OF-t_մ7rXNع[+RK d[nm7xf؈.YQ|Z1=v9~ebDi;٨¥ ;1.Q:3;Oi5I͸6˹YB>*"ղ±ʺy`˴ƞ0S߬"d<8#k*rѨg x". #^|@^dM^YD&䩑qOZ/y}g9`g1Pg=̆a&g"alz4 on ρρρρshρshρӣUt4{ -$T^j< +jRk#Lplb7#;p˳ݧv$v?DﹲѰ6(nֵi̳"Q '޵ӛ<3'폧hg*e9k'϶.H'-Z¦?H |W*xd_X{g-S>e Yúx5j'*o6qpiO<D'q$?,.o)9_.>(FkiKR#DxX+O[!FgSx@I35 OqQ̼s>ɓ2,$藵&ԝ}񞶳.WKa'"+"3!ׂ*-^96<ρs9x<ρY4El[ 9< x<Cx<Cx<Cx<ϡ <ϡ <ϡ <ρρv.Z*HT9c^-SԡY*VqH] G$Yyriy:}!d @$OaLeT"Êy4Y[">˨뷡٧yѠ+o]<5TTκ.gŧ"jRC7 ̈1`%s>" <#6|հ\bc&(QDܭEnl+LoR'oqr::C6 .];l>yZoQ; c5۾V2 jOC#uP7h}5\+"VX!=Ҝ(*^x_2hzHF2Dܭ:xO+HΌ9o_'W\vgWn$S/,GyFUGw&Hܭ=H=-~Ey93;de')1rD\ J?!ń]xk)5$LqOs/qߺ%K=>!Lg笷#1ɛ85^R,)4ڲ.Rz7Գ4n:ߗx&'%w)S_zi|"wH5'Y96:O?P/2"JS!kH׎W4t=i"Laڡ-4on~%P[ĝ M^X{[(ڧ-W9TSEmȯ=.&AXŽ1.1FJ-%Ľt͎r.*.O}-qq,J1A%2u3`ODEԑi]"6὚4x󷕧`,ybO #z $/#AS`]8gHue] ]K aIM+3h˹`Cܧ푳n ŗ= tHJPR\i\E [qM.\ MP/S򴯓,&6B)ݶhY% 9w7cQ.l^uwf(rS"\- 4́Ev3 0A+>.ѕ\&<ɋE4ζP'i[vo7[b9Yxȋ wyYݢo/OxBϷAVx`iZ)w|xn1sӳWVxF:%G @cB 湐E]2t4w\̙e_jqjz HAf(4 ګWqkM `G2KڶRSۚ Kږm(;*i)Θ\>J}ֱu1W` [cm&Af>Uൺ\iXǎEh+PALT~&hN u_>~D h&hAA; |<O";\MҖ{H5VlMj1><+Ԃdb&̲N6pH(ϑS֙YnG &&Z+\7 XsLç\ Oxnpb*gj;53fMD|^SE6:x9E~ĐPS'ym^x/sַj <%gK=Ast%yƬ@rγQ^LԅᅴR5@YDY7Z Z<[F4h<%OZpGF5k7xZg̋}dpgE\BBF b mvL[":YpC$V3V51VSr#@,/lrm\7όa [1ϔ1脴du^x<]AWCMH5U< G{nxZe'T=HxFÃgV֒{-#Og_,ԩWә7Mϒ6#OҽQtsg YylY4Zx2"sٰP<Cۉ'#Pr&xyGBLxLSWʳ5Ȓe VƳfdQQyZ*jT2+A)P`RKL. s!-gnE)PtWn<_y6R)`'?]E~#b &TvyFՎiMM q*2nM^;OA{`:OU6uh%|0EyzhjDNj0I)a@x"; $eLhg5>' RA$)G )dM3ryƈ%<n#*Ѵ Oz.ڼói;8?(0յD/<V@e@b|vNs2/VQHz|h*fusZ@sT#6O' VƒgISM*jȲϔOEy 7qƵ}y|iqý>TbɍTnoONk_yb$wW5J MۙD &y&ls~\3oÿM,ڔOßRM(j$62^*-b{=L^$zVv3,-5 b/nqS# 4L?1O{ :|z9(_Io:Y+5y|S/Q8'߄ĒtzhTo + M8)g"x0s ?a+q4c]l{b[HsM G) "b]j~3f-DcO s9?D>ṿ-&N/:Ҕ+Bʷɵɼ۔NܳE0<}{bP]{4E͇ 9WJ !,7rO1ȍ5+k ~eq?w(`tSB/@؀Vcψc^.gpВcB캓qym \6f{8$ X@2qUJ=w2xJ~bSf}zW|}0Ws⊲ڠ0'yW BE٨utnP<|SVl`JnbIJWskh@۪ɡB͏QBY6O^U0:XqN?3;Ie^;'#QSV 9rEsS^mw,ϩ՚ZU<֤kUb|yhρs9s9s9syy8<39OpX2&Y'lj#vw7A9LBŅ?睻pI2ӌ5wN;9VntS AA@A@   Pass / Fail / Info / N/AHChecks to see if the organization responds to audit processing failures.cInterview the system administrator to verify the following actions occur in the event of an audit failure or storage capacity being reached: 1. In the event the audit log becomes full, a scheduled job shall be executed to archive the log to a secure location on the server for the Mainframe; it shall include DASD or other media 2. In the event the security event log is manually cleared by the system administrator, this should be recorded as an auditable event for future analysis. 3. Security event logging should be configured to capture the clearing of the security event log itself as an auditable event.1. A scheduled job is executed to archive the log to a secure location on the server for the Mainframe; it shall include DASD or other media 2. Security event logs manually cleared by the system administrator is recorded as an auditable event for future analysis. 3. Security event logging is configured to capture the clearing of the security event log itself as an auditable event. InfoPassFailNot ApplicableBlank (Not Reviewed)Total Tests PerformedAbsolute Total # TestsKPassword history shall be maintained for a minimum of six (6) generations. ]Users are notified to change their passwords before the password change interval is enforced.Check to see if the information system separates user functionality (including user interface services) from information system management functionality.Check to see if the organization allocates sufficient audit record storage capacity and configures auditing to reduce the likelihood of such capacity being exceeded.Systems are configured to log out of interactive processes (i.e., terminal sessions, ssh sessions, etc.,) after 15 minutes of inactivity or ensure a password protected screen lock mechanism is used and is set to lock the screen after 15 minutes of inactivity.Check to see if the feedback from the information system provides information that would allow an unauthorized user to compromise the authentication mechanism. Displaying asterisks when a user types in a password is an example of obscuring feedback of authentication information.PDetermine if automatic session termination applies to local and remote sessions.The information system separates user functionality (including user interface services) from information system management functionality.Version Release DateSummary of ChangesName First ReleaseThe information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.KSufficient storage is available to meet IRS logging and retention policies.Tester:Date: Location:IRS Safeguard SCSEM Legend(Identification number of SCSEM test caseNIST ID'NIST 800-53/PUB 1075 Control IdentifierObjective of test procedure.6Detailed test procedures to follow for test execution.LThe expected outcome of the test step execution that would result in a Pass._The actual outcome of the test step execution, i.e., the actual configuration setting observed.Comments / Supporting EvidenceReviewer to include any supporting evidence to confirm if the test case passed., failed on not applicable As evidence, provide the following information for the following assessment methods: 1. Interview - Name and title of the person providing informatiTest Case Tab: Execute the test cases and document the results to complete the IRS Safeguard Computer Security review. Reviewer is required to complete the following columns: Actual Results, Comments/Supporting Evidence. Please find more details of ea Expected ResultsTest Objective Test StepsActual ResultsTest IDComments/Supporting EvidenceDetermine if the organization permits actions to be performed without identification and authentication only to the extent necessary to accomplish mission objectives. Examples are access to public facing government service websites such as www.firstgov.gov.nReviewer to indicate if the test case passed, failed, requires additional information, or is not applicable. Percent (%)Number of ChecksStatusAuditing is configured to capture unsuccessful security-relevant events (e.g., logon failure, user violations). Audit events include the original of request (e.g., terminal ID) for logon, logoff, password change, and user system activities. Each audit event trails the user and information relevant to the event (e.g., date and time of the event, user, type of event, file name and the success or failure of the event). The audit record shall include the file name of the file related event. SCSEM Results DashboardOut-of-Scope ReasonRA-1RA-2RA-3RA-5PL-1PL-2PL-4PL-5,Control not selected in IRS Publication 1075PL-6SA-1SA-2SA-3SA-4SA-5SA-6SA-7SA-9CA-1CA-2CA-3CA-5CA-6CA-7PS-1PS-2PS-3PS-4PS-5PS-6PS-7PS-8CP-1CP-2CP-3CP-4CP-6CP-7CP-8CP-9CP-10CM-1CM-8MA-1MA-2MA-3MA-4MA-5MP-1Control covered in the SDSEMMP-2MP-3MP-4MP-5MP-6PE-1PE-2PE-3PE-4PE-5PE-6PE-7PE-8PE-9PE-10PE-11PE-12PE-13PE-14PE-15PE-16PE-17PE-18SI-1SI-3SI-4SI-5SI-8IR-1IR-2IR-3IR-4IR-5IR-6IR-7AT-1AT-2AT-3AT-4IA-1IA-4AC-1AC-19AC-20AU-7AU-11SC-1SC-12SC-15SC-17SC-18SC-19SC-20SC-22 References+IRS Publication 1075, October 2007 Revision Control covered in the MOT SCSEM InterviewExamineInterview Examine First M. Lastmonth d, yyyy - month d, yyyyCity, STAgency POC(s): Name: Telephone # Email Address(###) ###-#### x#####First.M.Last@xx.xxx NIST Control Test MethodAssessment ObjectAccount ManagementAccess EnforcementSeparation of DutiesUnsuccessful Login AttemptsSystem Use Notification Session LockAuditable EventsApplication PartitioningContent of Audit RecordsAudit Storage Capacity%Response to Audit Processing Failures&User Identification and AuthenticationAuthenticator ManagementAuthenticator FeedbackInformation RemnanceAC-6AC-2AC-3AC-5AC-7AC-8AC-17AC-11AU-2SC-2AU-3AU-4AU-5AU-9IA-2IA-5IA-6SC-4SC-5AU-1CM-2CM-3CM-4CM-5CM-6CM-7MP-7SA-8SA-10SA-11SC-7SI-9SI-10SI-11SI-12IControl covered in the network device SCSEMs, not applicable to mainframeDIRECTIONS FOR SCSEM USEPass / Fail / N/A / InfoNumber of test casesLast test case row: Control IDAC-21!Control not selected in Pub. 1075AC-22AU-13AU-14CM-9IA-8IR-8*Control covered in the MOT SCSEM and SDSEMPM-1PM-10PM-11PM-2PM-3PM-4Control covered in MOT SDSEMPM-5PM-6PM-7PM-8PM-9SA-12SA-13SA-14SC-16SC-25SC-26SC-27SC-28SC-29SC-30SC-31SC-32SC-33SC-34SI-13SI-7%Audit Review, Analysis, and ReportingAU-6The organization supervises and reviews the activities of users with respect to the enforcement and usage of information system access controls. (1) The organization employs automated mechanisms to facilitate the review of user activities.SAudit logs are reviewed on a regular basis. Automated tools are used if available.Network DisconnectSC-10The information system automatically terminates a remote session after 15 minutes of inactivity. (1) Automatic session termination applies to local and remote sessions.CInteractive sessions are terminated after 15 minutes of inactivity.Audit Generation AU-12)Checks to see if auditing is implemented.Auditing is implemented.Protection Of Audit InformationThe audit trail shall be protected from unauthorized access, use, deletion or modification. The audit trail shall be restricted to personnel routinely responsible for performing security audit functions. < ~Passwords shall not be automated through function keys, scripts or other methods where passwords may be stored on the system. Policies and training are in place to ensure that users understand that passwords will not be automated or stored in clear text on the system.lDefault vendor passwords shall be changed upon successful installation of the information system product. YDefault passwords for installed products are changed as part of the installation process.The organization manages information system authenticators by: (i) defining initial authenticator content; (ii) establishing administrative procedures for initial authenticator distribution, for lost/compromised, or damaged authenticators, and for revoking authenticators; (iii) changing default authenticators upon information system installation; and (iv) changing/refreshing authenticators periodically.Users shall commit passwords to memory, avoid writing passwords down and never disclose passwords to others (e.g., with a co-worker in order to share files).XPolicies and training are in place to ensure that users protect passwords appropriately.zThe site should have adequate procedures in place for initial password dissemination, and forces periodic password change.HExpected Results: The warning banner is compliant with IRS guidelines and contains the following 4 elements: - the system contains US government information - users actions are monitored and audited - unauthorized use of the system is prohibited - unauthorized use of the system is subject to criminal and civil penalties Booz Allen HamiltonjNIST Special Publication 800-53, Recommended Security Controls for Federal Information Systems, Revision 3#DESCRIPTION OF SYSTEM ROLE WITH FTInProvide a narrative description of this system's role with receiving, processing, storing or transmitting FTI.System Hostname:[The dashboard is provided to automatically calculate test results from the Test Case tab. The 'Info' status is provided for use by the reviewer during test execution to indicate more information is needed to complete the test. It is not an acceptable final test status, all test cases should be Pass, Fail or N/A at the conclusion of the review.Least PrivilegeChecks to see if all FTI data in transit is encrypted when moving across a Wide Area Network (WAN) and within the agency s Local Area Network (LAN). (Transmission Confidentiality / Integrity SC-8 SC-9SUpdates based on NIST 800-53 rev 3 release Updated for new Publication 1075 versionUser ConfigurationIUser-ids (at the user-id level) are disabled after 90 days of inactivity.Procedures: Use the SIMAN security tool to display the Master Menu Screen. Select  User-id Maintenance Menu Screen. Select ACCESS Screen  Password Control Information. Display the ACCESS Screen - Password Control Information for each user-id identified on the Administrator Summary report generated from the  Generate Administrator Summary processing mode (i.e., a processing mode option identified on the User-id Maintenance Menu Screen). Under  Disable User-id Parameters : Review parameter specified in [__] Maximum days of inactivity.Expected Results: 90 days Note: This parameter is not available as a system-wide configuration parameter. This parameter is unique to each user-id. Consequently, a risk-based sampling of privileged system users was selected for testing.VAny exits active on the system must be reviewed and verified for authorized changes. ~Consult with the system administrator to ensure that any active system exits are reviewed and verified for authorized changes.IAll active system exits are reviewed and verified for authorized changes.BTapes cannot be used until the all files on the tape have expired.Consult with the system administrator to ensure that tapes (if used) cannot be re-used until all files on the tape have been expired.FTapes cannot be re-used until all files on the tape have been expired.System ConfigurationTerminal Security is ON LProcedures: Review the SENTRY_CONTROL system-wide configuration parameter.6Expected Results: TRUE Note: SENTRY_CONTROL = TRUE configuration parameter permits identification & authentication security features to be configured at the system level (system-wide security options). The SENTRY_CONTROL = TRUE configuration parameter meets Security Level 1  Fundamental Security or higher. User ListcSecurity officer user-ids are restricted to security administrators and security subadministrators.+Procedures: Use the SIMAN security tool to display the Master Menu Screen. Select  User-id Maintenance Menu Screen. Select  Generate Administrator Summary processing mode to generate the Administrator Summary report. Review user-ids listed under  USER-ID ADMINISTRATORS . The user-ids prefixed with an asterisk (*) represent the site s sub-administrator user-ids. Conversely, the user-ids not prefixed with an asterisk represent the site s security administrator user-ids. Determine users / user names and job descriptions associated with the user-ids.gExpected Results: User-ids are restricted to security administrators and security subadministrators. RSecurity-privileged system-high users are restricted to security officer user-ids.Procedures: Identify all users whose security records have the following characteristics: (a) full clearance level range of 0 to 63, (b) a user compartment set of ALL, and (c) the Set A Privileges of SSCCL, SSBYCOMP, and SSBYPASSOWNR.Expected Results: Security-privileged system high users are restricted to security officer user-ids. All unprivileged users should have (a) a clearance level range with a minimum of 0 and a maximum of 0, (b) a compartment set of NULL. (Note: SSCCL permits a user to circumvent clearance level validation within the range specified in the user s security record. Also permits user to change executing clearance levels within that range. SSBYCOMP permits a user to circumvent compartment set validation within the maximum compartment set specified in t< he user s security record. SSBYPASSOWNR permits user to circumvent discretionary access control validation  including Access Control Record (ACR) validation.]Trusted security privilege, SSCCL (MODRUNCL), is restricted to appropriate users or programs.Procedures: Using SIMAN interactive batch mode (i.e., keyword syntax interface), generate report  listing all user-ids with the SSCCL security privilege. SSCCL permits bypass of clearance level validation and allows change within the user s clearance range. SSCCL does not bypass clearance level validation for subsystem transition. (Note: Not routinely required by security officers.)UExpected Results: SSCCL (MODRUNCL), is restricted to appropriate users or programs.[Trusted security privilege, SSBAFC (BYACR), is restricted to appropriate users or programs.Procedures: Using SIMAN interactive batch mode (i.e., keyword syntax interface), generate report  listing all user-ids with the SSBAFC security privilege. SSBAFC permits bypass of ACR evaluation for file access, user-id security-record access, and subsystem transition. SSBAFC does not permit bypass of the private access list. (Note: Not routinely required by security officers.)SExpected Results: SSBAFC (BYACR), is restricted to appropriate users or programs.`Trusted security privilege, SSBYCOMP (BYCOMPMT), is restricted to appropriate users or programs.Procedures: Using SIMAN interactive batch mode (i.e., keyword syntax interface), generate report  listing all user-ids with the SSBYCOMP security privilege. SSBYCOMP permits bypass of compartment validation within the user s compartment set for file and user-id record access. SSBYCOMP does not permit bypass of compartment validation for subsystem transition. (Note: Not routinely required by security officers.)XExpected Results: SSBYCOMP (BYCOMPMT), is restricted to appropriate users or programs.cTrusted security privilege, SSBYPASSOWNR (BYOWNER), is restricted to appropriate users or programs.Procedures: Using SIMAN interactive batch mode (i.e., keyword syntax interface), generate report  listing all user-ids with the SSBYPASSOWNR security privilege. SSBYPASSOWNR permits bypass of owner and ACR validations for files, users, and subsystems. Bypass ownership and ACR validations on file assignment (owned files only), user-id records, and subsystem transitions. To bypass read-only and write-only validations on owned files, users also need the SSBKUP (BYRWMODE) privilege. (Note: Not routinely required by security officers.)[Expected Results: SSBYPASSOWNR (BYOWNER), is restricted to appropriate users or programs.^Trusted security privilege, SSBKUP, (BYRWMODE) is restricted to appropriate users or programs.Procedures: Using SIMAN interactive batch mode (i.e., keyword syntax interface), generate report  listing all user-ids with the SSBKUP security privilege. SSBKUP permits write into read-only files or read of write-only files. For owned files, the SSBYPASSOWNR security privilege is also needed to bypass read-only and write-only files. Conversely, for unowned files, no other privilege is needed. (Note: Not routinely required by security officers.)VExpected Results: SSBKUP, (BYRWMODE) is restricted to appropriate users or programs.ZTrusted security privilege, SSBYCL (BYCL), is restricted to appropriate users or programs.Procedures: Using SIMAN interactive batch mode (i.e., keyword syntax interface), generate report  listing all user-ids with the SSBYCL security privilege. SSBYCL permits bypass of clearance level validation, regardless of user-id clearance-level range for file access. SSBYCL does not bypass message validation, or validations in subsystem transitions. (Note: Not routinely required by security officers.)RExpected Results: SSBYCL (BYCL), is restricted to appropriate users or programs.^Trusted security privilege, SSADID (ABSDVASG), is restricted to appropriate users or programs.0Procedures: Using SIMAN interactive batch mode (i.e., keyword syntax interface), generate report  listing all user-ids with the SSADID security privilege. SSADID permits absolute device-id assignment including special I/O devices, symbiont-controlled devices, and online maintenance of all system peripherals. Such an assignment bypasses file assignment validation. (Note: Not routinely required by security officers.) (Note: If Quota Level 4 is configured, a user-id must also have the proper Quota set in order to perform an absolute device-id assignment.)VExpected Results: SSADID (ABSDVASG), is restricted to appropriate users or programs.]Trusted security privilege, SSBRWK (BYRWKEY), is restricted to appropriate users or programs.fProcedures: Using SIMAN interactive batch mode (i.e., keyword syntax interface), generate report  l< isting all user-ids with the SSBRWK security privilege. SSBRWK permits users to read and write unowned files without specifying the file keys. SSBRWK cannot bypass the private access list of unowned files. (Note: Not routinely required by security officers.)UExpected Results: SSBRWK (BYRWKEY), is restricted to appropriate users or programs.cTrusted security privilege, SSBYOBJREUSE (_______), is restricted to appropriate users or programs.~Procedures: Using SIMAN interactive batch mode (i.e., keyword syntax interface), generate report  listing all user-ids with the SSBYOBJREUSE security privilege. SSBYOBJREUSE permits users to bypass EOF marks/blocks on tapes  using the Executive Request (ER) IO$ and IOW$ locate block function (LBLK$). Consequently, users could access information beyond the software EOT and potentially gain access to information with different security attributes. SSBYOBJREUSE permits access to areas not cleared. Use of this privilege requires use of the SSBHDR1RDCHK privilege  which is not security relevant. (Note: With SENTRY_CONTROL=FALSE, the security officer, EXEC8 and the overhead user-id, are required to SSBYOBJREUSE privilege. However, SSBHDR1RDCHK should be removed EXEC8 PCT security buffer so the Exec does not run with that privilege (SSBHDR1RDCHK remains in the EXEC8 security record).PExpected Results: SSBYOBJREUSE is restricted to appropriate users or programs.ob Access RulesLLogical access to SYS$*SACRD$ security database is appropriately restricted.Procedures: Using SIMAN: Determine if the security database is owned (has a specified owner  usually the file creator) or unowned. Existing read/write keys are ignored for owned files, but not ignored for unowned files. Ensure database executes as system high. Evaluate the clearance file level associated with the security database. Normally, this will be the creator s executing clearance level when the file was created. Evaluate the file compartment set associated with the security database. The file s compartment set is the creator s executing compartment set when the file was created. Determine if the file is semiprivate, which ensures the file has an attached access control record (ACR). Use the Access Control Maintenance Screen to display the ACR (Access Control Arguments) for the file and review Object Access assignments (READ, WRITE, MODIFY, DELETE, ACR_DELETE, EXECUTE) for appropriateness. Also, review the user-ids listed in the  Access Restrictions section of this screen.Expected Results: Logical access is restricted to routine system support staff. (Note: SYS$*SACRD$ stores user security records, subsystem security attributes and ACRs.)NLogical access to SYS$*TSS$FILE security database is appropriately restricted.,Expected Results: Logical access is restricted to routine system support staff. (Note: SYS$TSS$FILE stores terminal security information including user-ids, passwords, and password expiration parameters. A user-id must be in the SYS$*TSS$FILE before a user-id record can be created in SYS$*SACRD$.)KLogical access to SYS$*SMDTF$ security database is appropriately restrictedProcedures: Determine if the security database is owned (has a specified owner  usually the file creator) or unowned. Existing read/write keys are ignored for owned files, but not ignored for unowned files. Ensure database executes as system high. Evaluate the clearance file level associated with the security database. Normally, this will be the creator s executing clearance level when the file was created. Evaluate the file compartment set associated with the security database. The file s compartment set is the creator s executing compartment set when the file was created. Determine if the file is semiprivate, which ensures the file has an attached access control record (ACR). Use the Access Control Maintenance Screen to display the ACR (Access Control Arguments) for the file and review Object Access assignments (READ, WRITE, MODIFY, DELETE, ACR_DELETE, EXECUTE) for appropriateness. Also, review the user-ids listed in the  Access Restrictions section of this screen.Expected Results: Logical access is restricted to routine system support staff. Note: The file stores the security mandatory definition table (SMDT), which is comprised of: the symbolic clearance level definition table (SCLDT) and the security-compartment definition table (SCDT).PLogical access to SYS$*ACCOUNT$R1 security database is appropriately restricted.Expected Results: Logical access is restricted to routine system support staff. (Note: SYS$*ACCOUNT$R1 stores Quota sets attached to user-ids to limit the resources used by the attached user-id. This file also stores a resource limit on real-time execution of executing programs.)KLogical access to database containing FTI data is appropriately restricted.Procedures: Determine if the database that contains FTI data is owned (has a specified owner  usually the file creator) or unowned. Existing read/write keys are ignored for owned files, but not ignored for unowned files. Ensure<  database executes as system high. Evaluate the clearance file level associated with the database. Normally, this will be the creator s executing clearance level when the file was created. Evaluate the file compartment set associated with the database. The file s compartment set is the creator s executing compartment set when the file was created. Determine if the file is semiprivate, which ensures the file has an attached access control record (ACR). Use the Access Control Maintenance Screen to display the ACR (Access Control Arguments) for the file and review Object Access assignments (READ, WRITE, MODIFY, DELETE, ACR_DELETE, EXECUTE) for appropriateness. Also, review the user-ids listed in the  Access Restrictions section of this screen.yExpected Results: Logical access is restricted to users who need access to the FTI data to perform their job functions.bUser-ids are disabled after three (3) unsuccessful password attempts (hacker frustration feature).Procedures: Review the MAXATMP (MAX_SIGN_ON_ATTEMPTS) system-wide configuration parameter. MAX_SIGN_ON_ATTEMPTS denotes the maximum number of invalid sign-on attempts allowed before the system begins to ignore sign-on attempts once the maximum number specified is exceeded. Expected Results: 3 Note: The DELAYSOL (DELAYED_SIGN_SOLICITATION) system-wide configuration parameter must be disabled (set to FALSE) to ensure the MAXATMP parameter takes effect. DELAYSOL denotes a solicitation delay between invalid sign-on attempts. The delay period automatically increases between attempts. After eight (8) invalid sign-on attempts, the system closes the session and disables the user-id.SUser-ids (at the user-id level) are disabled after three invalid password attempts.Procedures: Use the SIMAN security tool to display the Master Menu Screen. Select  User-id Maintenance Menu Screen. Select ACCESS Screen  Password Control Information. Display the ACCESS Screen - Password Control Information for each user-id identified on the Administrator Summary report generated from the  Generate Administrator Summary processing mode (i.e., a processing mode option identified on the User-id Maintenance Menu Screen). Under  Disable User-id Parameters : Review parameter specified in [__] Maximum invalid passwords. OExpected Results: 3 Note: MAXATMP system-wide configuration parameter denotes the maximum number of invalid sign-on attempts allowed before the system begins to ignore sign-on attempts after the maximum number specified is exceeded. The DELAYSOL system-wide configuration parameter must be disabled (set to FALSE) to ensure the MAXATMP parameter takes effect. DELAYSOL denotes a solicitation delay between invalid sign-on attempts. The delay period automatically increases between attempts. After eight (8) invalid sign-on attempts, the system closes the session and disables the user-id.The computer system displays an approved screen-warning banner, which outlines the nature and sensitivity of information processed on the system and the consequences / penalties for misuse. fProcedures: Review the logon warning banner for information consistent with IRS-approved documentation!System Configuration & Audit LogsWSystem audit logging parameters are configured to capture all security-relevant events.Procedures: Determine if the following system-wide configuration parameters are enabled on the system: TSS_CONTROL = TRUE TSS_SENTRY = TRUE Review the LOGCONSOLEON (CONSOLE_CLASS_LOGGED) system-wide configuration parameter. LOGCONSOLEON forces the system to create log entry type 203. Review audit logs (e.g. hardcopy DUMP using Log Analyzer or online review) to ensure the entry type is captured and monitored.Expected Results: TRUE Note: The following provides a brief description of the log entry type: Type 203  Operator keyins and all console messagesProcedures: Determine if the following system-wide configuration parameters are enabled on the system: TSS_CONTROL = TRUE TSS_SENTRY = TRUE Review the LOGFILEHDRON (LOG_FILE_HDR_CLASS_LOGGED) system-wide configuration parameter. LOGFILEHDRON forces the system to create the system time, date, and system-identification log entries. Review audit logs (e.g. hardcopy DUMP using Log Analyzer or online review) to ensure the logging controls are captured and monitored.Expected Results: TRUEProcedures: Determine if the following system-wide configuration parameters are enabled on the system: TSS_CONTROL = TRUE TSS_SENTRY = TRUE Review the LOGSYSHISTON () system-wide configuration parameter. LOGSYSHISTON forces the system to create the security log-entry types 461, 801, 805 through 814, 12001, 12002, and 13002. Review audit logs (e.g. hardcopy DUMP using Log Analyzer or online review) to ensure the entry types are captured and monitored.Expected Results: TRUE Note: The following provides a brief description of log entry types: Type 461  Insufficient privilege to perform Media Manager function Type 801  Security Messages ** Type 805  Creation of a user-id record Type 806  Modification of a user-id record Type 807  Modification of a file record (MFD) Type 809  Tape Volume Access Log Entries Type 810  Sign-on Validation Log Entries Type 811  Compartment Table Log Entries Type 812  Subsystem Transition Log Entries Type 813  Print Label Change Log Entries Type 814  Clearance Level Change Log Entries Type 12001  Password changes, using SIMAN, by the security officer. Type 12002  User-ID enabled or disabled by SIMAN Type 13002  A thread illegally tried to write to a read-only file. ** Includes (a) Password changes with @PASSWD, (b) Password changes with @@PASSWD, (c) Changes in secured ER(s) and privileges, and (d) Other security-relevant events.AAll security-related events are recorded in the system a< udit log._Procedures: Verify the following system-wide configuration parameter: EXERR_054_FOR_ALAT = TRUEExpected Results: TRUE Note: Thisconfiguration parameter causes a system stop if the ASCII log audit trail (ALAT) is rendered inoperable or becomes unavailable. This control ensures data loss does not occur.Audit and Security ReportsRequest the Security Administrator to generate sample audit and security reports, and verify that all required information is included in the report.1. Each audit event trails the user and information relevant to the event (e.g., date and time of the event, user, type of event, file name and the success or failure of the event). The audit report records the date and time of the security events, the user, and the type of event/commands performed by privileged users (e.g., adding, modifying, or deleting the userid). 2. The violation report records audit events, which include the original of request (e.g., terminal ID) for logon, logoff, password change, and user system activities. 3. The violation report records audit events which include the original of request (e.g., terminal ID) for logon, logoff, password change, and user system activities.RAudit trails are protected from modification, unauthorized access, or destruction.ZProcedures: Verify the following system-wide configuration parameter: SRSF_SYS_HIGH = TRUE=Expected Results: TRUE Note: SRSF_SYS_HIGH = TRUE denotes all security-relaxable files, including the ASCII log audit trail (ALAT), are system high and can only be accessed by security-privileged, system high users. See test procedure under DAC section for qualification of security-privileged, system high users.AAccess to the audit files is restricted to authorized personnel. 7All system tasks have a userid associated with them. Confer with the system administrator to verify that all system tasks have a userid associated with them, such that all access authorizations will be dependent on the privileges granted to the associated userid.-All system tasks have a an associated userid.TEach userid is unique and is consistent with the naming conventions of the facility.Confer with the system administrator to verify that each userid is unique and is consistent with the entity s naming-conventions policy.TEach userid is unique and is consistent with the entity s naming-conventions policy.CUsers are forced to change passwords at a maximum of every 90 days.Procedures: Review the MAXPASSDAY (DEFAULT_MAX_DAYS_PASSWORD) system-wide configuration parameter. DEFAULT_MAX_DAYS_PASSWORD denotes the maximum number of days a user will be forced to change his/her password. Expected Results: 90 days for general users, and 60 days for privileged users. Note: The number specified must be greater than or equal to the MINPASSDAY (DEFAULT_MIN_DAYS_PASSWORD) system-wide configuration parameter._Users are prohibited from changing their passwords for at least 15 days after a recent change. RProcedures: Review the MINPASSDAY (DEFAULT_MIN_DAYS_PASSWORD) system-wide configuration parameter. DEFAULT_MIN_DAYS_PASSWORD denotes the minimum number of days a user must have a password. This parameter deters users from changing passwords to a temporary password, and immediately/subsequently changing it back to the original password. Expected Results: 15 or greater7Minimum password length is set to eight (8) characters.Procedures: Review the MINPASSLEN (MIN_PASSWORD_LENGTH) system-wide configuration parameter. MIN_PASSWORD_LENGTH denotes the minimum password length, ranging from 1  8 characters, if machine-generated passwords are not configured: (MACHINE_GENERATED_PASSWORDS = FALSE). MIN_PASSWORD_LENGTH can range from 8 to 18 characters only if MACHINE_GENERATED_PASSWORDS = TRUE. Ensure machine-generated passwords are prohibited.Expected Results: MINPASSLEN (MIN_PASSWORD_LENGTH) = 8 or larger MACHINE_GENERATED_PASSWORDS = FALSE Note: Unisys does not enforce alphanumeric password composition or password history controls.qThe default password shipped with the security officer s user-id is changed immediately upon system installation.Procedures: Verify the security officer s user-id of the security officer name specified in the SECURITY_OFFICER configuration parameter value entitled  Name specified during initialization . The security officer s user-id is stored in SYS$*TSS$FILE security database. Verify the security officer s user-id security record specified in the SYS$*SACRD$ security database coincides with the user-id specified in the SECURITY_OFFICER parameter value. Determine if the default password (SECURI) was changed after system installation. The system evaluator should enter SECURI as the password once the user-id is identified. Note: When the system is installed/initialized, the system automatically creates a security officer user-id and security record in the SYS$*SACRD$ file.XExpected Results: The default password (SECURI) was changed after system installation.ZUsers (at the user-id level) are forced to change passwords at a maximum of every 90 days.ZProcedures: Use the SIMAN security tool to display the Master Menu Screen. Select  User-id Maintenance Menu Screen. Select ACCESS Screen  Password Control Information. Display the ACCESS Screen - Password Control Information for each user-id identified on the Administrator Summary report generated from the  Generate Administrator Summary processing mode (i.e., a processing mode option identified on the User-id Maintenance Menu Screen). Under  Password Expiration Parameters (no input = system defaults) : Review parameter specified in [__] Maximum number of days before password change allowed.Expected Results: 90 days for general users, and 60 days for privileged users. Note: Thissetting can circumvent the system-wide configuration parameter (MAXPASSDAY). Und< er the  Password Expiration Parameters (no input = system defaults) section of each user-id s Password Control Information access screen, the value of the MAXPASSDAY configuration parameter is attributed to the  maximum system default nnnn setting -- where nnnn denotes the system-wide default value.uUsers (at the user-id level) are prohibited from changing their passwords for at least 15 days after a recent change.ZProcedures: Use the SIMAN security tool to display the Master Menu Screen. Select  User-id Maintenance Menu Screen. Select ACCESS Screen  Password Control Information. Display the ACCESS Screen - Password Control Information for each user-id identified on the Administrator Summary report generated from the  Generate Administrator Summary processing mode (i.e., a processing mode option identified on the User-id Maintenance Menu Screen). Under  Password Expiration Parameters (no input = system defaults) : Review parameter specified in [__] Minimum number of days before password change allowed. Expected Results: 15 or greater~Logon grace periods for expired passwords are reasonably restricted for consecutive successful logons (at the user-id level). 9Procedures: Use the SIMAN security tool to display the Master Menu Screen. Select  User-id Maintenance Menu Screen. Select ACCESS Screen  Password Control Information. Display the ACCESS Screen - Password Control Information for each user-id identified on the Administrator Summary report generated from the  Generate Administrator Summary processing mode (i.e., a processing mode option identified on the User-id Maintenance Menu Screen). Under  Disable User-id Parameters : Review parameter specified in [__] Maximum times password-expired notices may be ignored.Expected Results: 0-5 days Note: The security option should be superseded by the following  Disable User-id Parameters setting: [__] Maximum days of inactivity. UConfer with the Security Administrator and verify that password history is enforced. ;At least 6 generations of previous passwords are maintained_Confer with the Security Administrator and verify that a password expiration warning is issued.VA password expiration warning is issued between 5-14 days before the password expires.BBatch/background jobs do not have embedded User IDs and passwords.Verify with the Security Administrator that UserIDs and passwords are not embedded in job streams when submitting batch/background jobs.\UserIDs and passwords are not embedded in job streams when submitting batch/background jobs.Mass storage (including FTI files) and trusted subsystem data structures are cleared before file space is allocated or reallocated to users."Procedures: Determine if: Security Option 1 (i.e., system-wide configuration parameter SECURITY_OPT_1_CNTRL = TRUE) or higher is installed. Review the RESDUCLR (RESIDUE_CLEAR_) system-wide configuration parameter. RESIDUE_CLEAR prevents (a) users from accessing private or sensitive data residue/structures, and (b) private or sensitive data from being available in user registers. If RESIDUE_CLEAR is not enabled, investigate potential existing compensating controls clearing FTI residue before file space is allocated or reallocated to users.&Expected Results: 1 or TRUE  depending on the security level installed (i.e., Option 1 or higher) or alternative control that ensure FTI files can not be reused after ph      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~ysical erasure from the system. (Note: This parameter could negatively affect file I/O allocation and release performance.)Network DocumentationSI-2This SCSEM is used by the IRS Office of Safeguards to evaluate compliance with IRS Publication 1075 for agencies that have implemented a UNISYS mainframe that receives, stores or processes Federal Tax Information (FTI). Agencies should use this SCSEM to prepare for an upcoming Safeguard review, but it is also an effective tool for agencies to use as part of internal periodic security assessments or internal inspections to ensure continued compliance in the years when a Safeguard review is not scheduled. Also the agency can use the SCSEM to identify the types of policies to have in place to ensure continued compliance with IRS Publication 1075.2Confer with the Information Assurance Manager (IAM). Verify that procedures are in place to review audit logs on a regular, periodic basis, and that these procedure are followed (i.e. that the reviews are performed). Inquire whether automated data review and reductions tools are available and/or in use.Procedures: Confere with the Information Assurance Manager (IAM). Verify that access to the audit files is restricted to ersonnel routinely responsible for performing security audit functions. GProcedures: Interview the Information Assurance Manager (IAM). Verify that policies and training are in place to ensure that users protect passwords appropriately. If possible, walk through the office areas and ensure that passwords are not written down (e.g. look for sticky-notes, passwords taped to keyboard bottoms, etc.)Procedures: Interview the Information Assurance Manager (IAM). Verify that policies and training are in place to ensure that users understand that passwords will not be automated or stored in clear text on the system.Confer with the Information Assurance Manager (IAM) to determine the site policy and procedures for issuing and disseminating initial user passwords, and for requiring and enforcing periodic system-wide password change.The System Administrator (SA) will configure systems to log out interactive processes (i.e., terminal sessions, ssh sessions, etc.,) after 15 minutes of inactivity or ensure a password protected screen lock mechanism is used and is set to lock the screen after 15 minutes of inactivity.Confer with the Information Assurance Manager (IAM) and System Administrator (SA). Verify that auditing is enabled. If auditing is not enabled then this is a finding.Procedures: Interview the System Administrator (SA) and Information Assurance Manager (IAM). Verify that procedures are in place requiring that default passwords for installed products are changed as part of the installation process.Confer with the Information Assurance Manager (IAM) and System Admi<.nistrator (SA). Verify that interactive sessions (SSH, etc.) are terminated after a period of inactivity in accordance with IRS guidelines.Interview Information Assurance Officer (IAO) or System Administrator (SA) and ask if any applications or services display the user or service account password during input or after authentication. AChecks to see if services that allow interaction without authentication or via anonymous authentication are documented, justified to the Information Assurance Officer (IAO), and are properly secured and segregated from other systems that contain services that explicitly require authentication and identity verification./Services that allow interaction without authentication or via anonymous authentication are documented, justified to the Information Assurance Officer (IAO), and are properly secured and segregated from other systems that contain services that explicitly require authentication and identity verification.Interview the System Administrator (SA) or Information Assurance Officer (IAO) and ask if the information system physically or logically separates user interface services (e.g., public web pages) from information storage and management services (e.g., database management). Separation may be accomplished through the use of different computers, different central processing units, different instances of the operating system, different network addresses, combinations of these methods, or other methods as appropriate.pThe organization employs FIPS 140-2 validated cryptographic mechanisms to prevent unauthorized disclosure of information during transmission across the agency's LAN and WAN. FTI is encrypted when traversing communication lines (e.g. T1, T3, ISDN) using encryption solutions including, but not limited to: Triple DES, SSL, TLS, or Secure IP Tunneling (VPN using IPSEC).Procedures: Obtain a network diagram that depicts all access points used to process, store and transmit FTI  noting firewalls, routers, and switches where applicable. Interview the System Administrator (SA) or Information Assurance Officer (IAO) to determine if all connections to the Mainframe are via *SSH or *Other communications methods using tunneling via or equivalent FIPS encryption. FTI is encrypted when traversing communication lines (e.g. T1, T3, ISDN) using encryption solutions including, but not limited to: Triple DES, SSL, TLS, or Secure IP Tunneling (VPN using IPSEC). Evaluate viable encryption alternatives for appropriatenessInterview Information Assurance Officer (IAO) or System Administrator (SA) and ask if log storage is sufficient to meet IRS logging and retention requirements. IRS Publication 1075, section 9.3, requires log data retention for 6 years.Flaw Remediation)System Software Maintenance DocumentationProcedures: Interview the System Administrator (SA) to determine how often vendor software updates, especially security related updates, are received, evaluated, and applied to the system. Review system maintenance documentation if available.Checks to see if the system is kept current with vendor updates, especially security related updates, and that maintenance is received, evaluated, and installed on a regular schedule.The system is kept current with vendor updates, especially security related updates. Maintenance is received, evaluated, and installed on a regular schedule.Note: A general rule of thumb for mainframe systems is that the system should be no more than 3 months out of date with regular maintenance. Security maintenance should be applied as soon as possible after being received from the vendor.NNote: This requirement may not be possible with all releases of the Unisys OS.Identifier Management|The organization manages user accounts by: (i) uniquely identifying each user; (ii) verifying the identity of each user; (iii) receiving authorization to issue a user account from an appropriate organization official; (iv) issuing the user account to the intended party; (v) deactivating the user account once it is no longer needed; and (vi) reviewing user accounts periodically.iThe site should have adequate procedures in place to issue, manage, review, and deactivate user accounts.Confer with the Information Assurance Manager (IAM) to determine the site policy and procedures for issuing, managing, reviewing, and deactivating user accounts.cRevoked / deactivated user-ids are archived; they are not deleted, and are not re-issued / re-used.Procedures: Confer with the Information Assurance Manager (IAM) to determine the site policy and procedures for handling revoked / deactivated user-ids.The IRS strongly recommends agencies test all SCSEM settings in a development/test environment prior to deploying them in operational environments because in some cases a security setting may impact a system s functionality and usability. Consequently, it is important to perform testing to determine the impact on system security, functionality, and usability. Ideally, the test system configuration should match the operational system configuration. Prior to making changes to the production system agencies should back up all critical data files on the system and if possible, make a full backup of the system to ensure it can be restored to its pre-SCSEM state if necessary. The IRS welcomes feedback and suggestions from agencies in regard to individual SCSEMs.YSafeguard Computer Security Evaluation Matrix (SCSEM) UNISYS March 8, 2011 Version 1.0>@ 7w 5 s˽+vcӾ W\ο XE}$o DE VC{&Sa Hz%W{ #R` @+ '4} >LER.WB dZs4{ۄ[5^ ZccB f2ɀ *   dMbP?_*+%&ffffff?'ffffff?(?)?"B333333?333333?te&<3U} $ } } $ } } I} } $ *                          @                             .:*2" # $ % & ' )  " " # # $ $ % %% %% % & & & i ' ' ' i )(xL**,z(  , %O2 ,S N Group 2Horizontal Rule" -] `~vB ,B >?Line 3%O]`|B , D)?Line 4Z 22]` , HA ?1?IRS Logo- ]N` $Word.Document.8^;>@   && yK First.M.Last@xx.xxxyK Nmailto:First.M.Last@xx.xxxyX;H,]ą'c'' yK First.M.Last@xx.xxxyK Nmailto:First.M.Last@xx.xxxyX;H,]ą'cggD f2ɀ X  dMbP?_*+%&ffffff?'ffffff?(?)?"333333?333333?&<3U    @             mnnnnnnnnnnno  mnnnnnnnnnnno & nnnnnnnnnnnnn '   @0$0$0$0$$$$$$PH 0(  >@"    ggD f2ɀ hP  dMbP?_*+%&ffffff?'ffffff?(?)?"333333?333333? &<3U} $} }  J           0   @  4  [2 \1 [0 ]+g;< PassAZ.Z#DD B ]+g;< FailAZ.Z #DD B ]+g;< InfoAZ.Z#DD B _*g;< N/AAZ.Z#DD B ]$]N@;< A[.Z?#DD B ] # ^ % ] ] # pN@  % ] )  N@  D .N@;@@B@"*ooonh??1PH00(  >@     ; (  @Pass; (  @Fail; (  Info  ; (  @Pass; (  @Fail; (  Info  ; (  @Pass; (  @Fail; (  Info  ; (  @D{+{ {+{  {+{  {+{ {+{ {+{ {+{ {+{ {+{ {{ ; @3 Sheet2ggD f2ɀ L#(-$3l8=BDHMRXd]bgCH峧X];c@`ǡ;$BCE׹ϰ']tY=\?zi}7WLk.acM?L飶QF5P, OEkQ8s׳QB2=)LFQ6UǎS{[mc܅Z"yZ$F$^jׄχ)/ii'{M̈hy~d.fyؔ}T%w_o]7ƯcKQSo-\ѐ ٨:u'cL-͏#-' (cQª+R[I!u LHͶ`?ڿFβ,L.ŎY\~y52o~əBzhq^qr6=4qӟ/ .F[ǖ5[4 ?MDDDDDDD 2m"7XX??&U} $D} I B} B}  B}  B} C} &C} mC} C} B} m#} $ C  }@ ~^ ~~X~~" ~ ~  ~  ~  ~  ~ $ ~ E@ @@@@1 @@ j, j j j j A) A* A( A+ A A-~ ?    h h h.hCCCCCCCCCCCCCCCCC~ @  D      ~ @    3 4 5.hCCCCCCCCCCCCCCCCC~ @    6 7 8.hDCCCCCCCCCCCCCCCCC~ @    9 : ; <  ~ @    = > ? @.}}}}}}}}}}}}}}}}}~ @    = A B C  ~  @ *   = D E F  ~ "@ *   = G H I  ~ $@ *   = J K L  ~ &@ *   = M N O  ~ (@ *   = P Q R  ~ *@ *   = S T U  ~ ,@ *   = V W X.~~~~~~~~~~~~~~~~~~ .@ *   = Y Z [.~~~~~~~~~~~~~~~~~~ 0@ *   = \ ] ^.~~~~~~~~~~~~~~~~~~ 1@ *   _ ` a b.~~~~~~~~~~~~~~~~~~ 2@ *   _ c a d.~~~~~~~~~~~~~~~~~~ 3@ *   _ e f g.~~~~~~~~~~~~~~~~~~ 4@ *   _ h f i.~~~~~~~~~~~~~~~~~~ 5@ *   _ j k l.~~~~~~~~~~~~~~~~~~ 6@    9 m n o.~~~~~~~~~~~~~~~~~~ 7@    9 p q r.~~~~~~~~~~~~~~~~~~ 8@    9 s t #.~~~~~~~~~~~~~~~~~~ 9@      .~ :@    u v w x.~~~~~~~~~~~~~~~~~~ ;@    u v y z.~~~~~~~~~~~~~~~~~~ <@    u v { |.~~~~~~~~~~~~~~~~~~ =@    9 } ~ .~~~~~~~~~~~~~~~~~~ >@     h3   hD ~ ?@    h   hD D*l| ! @"@# $(@%&~'~() *+X,-.A /0@123P @4k @56789 :;<=>?~ @@     h h h hD ~ !@@ !  ! !! ! ! !.!~ "A@ " " " "9 " " "."~~~~~~~~~~~~~~~~~~ #A@ # # ## # # #.#~ $B@ $ $ $ $= $ $ $ $hD ~ %B@ % % % %= % % % %hD ~ &C@ & & & &/ &0 &1 &2 & ~ 'C@ ' ' '' ' ' ' ' ~ (D@ ( ( ( (9 ( ( (.(~~~~~~~~~~~~~~~~~~ )D@ ) ) ) )9 ) ) ).)~~~~~~~~~~~~~~~~~~ *E@ * * * *9 * * *.*~~~~~~~~~~~~~~~~~~ +E@ + + + +9 + + +.+~~~~~~~~~~~~~~~~~~ ,F@ , , , ,/ , , ,.,~~~~~~~~~~~~~~~~~~ -F@ - - - -/ - - -.-~~~~~~~~~~~~~~~~~~ .G@ . . . ./ . . ...~~~~~~~~~~~~~~~~~~ /G@ / / // /h / / /hD / ~ 0H@ 0 0 00 0h 0 0 0hD 0 ~ 1H@ 1 1 11 1 1 1 1hD ~ 2I@ 2 2 22 2  2 2!.2~ 3I@ 3 3 33 3 3 3.3~ 4J@ 4 4 44 4 4 4.4~ 5J@ 5 5 55 5 5 5" 5 ~ 6K@ 6 6D 6D6D 6h 6h 6h.6hDCCCCCCCCCCCCCCCCC~ 7K@ 7 7 77 7 7 7 7 ~ 8L@ 8 8 88 8h 8h. 8h 8hD ~ 9L@ 9 9D 9D9D 9h 9h 9h.9hDhhhhhhhhhhhhhhhhh~ :M@ : : : :9 : : :.:~ ;M@ ;, ;- ; ; ;h+ ; ;.;hDhhhhhhhhhhhhhhhhh~ <N@ < < < < < < < <hD < (< hhhhhhhhhhhhhhhhh=CCCCC>CCCCC?CCCCCDl||||||@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`bcdefghijklmnopqrstuvwxyz{|}~CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ?  CCCCC! CCCCC" CCCCC# CCCCC$ CCCCC% CCCCC& CCCCC' CCCCC( CCCCC) CCCCC* CCCCC+ CCCCC, CCCCC- CCCCC. CCCCC/ CCCCC0 CCCCC1 CCCCC2 CCCCC3 CCCCC4 CCCCC5 CCCCC6 CCCCC7 CCCCC8 CCCCC9 CCCCC: CCCCC; CCCCC< CCCCC= CCCCC> CCCCC? CCCCCDl@ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ @ CCCCCA CCCCCB CCCCCC CCCCCD CCCCCE CCCCCF CCCCCG CCCCCH CCCCCI CCCCCJ CCCCCK CCCCCL CCCCCM CCCCCN CCCCCO CCCCCP CCCCCQ CCCCCR CCCCCS CCCCCT CCCCCU CCCCCV CCCCCW CCCCCX CCCCCY CCCCCZ CCCCC[ CCCCC\ CCCCC] CCCCC^ CCCCC_ CCCCCDl` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~  ` CCCCCa CCCCCb CCCCCc CCCCCd CCCCCe CCCCCf CCCCCg CCCCCh CCCCCi CCCCCj CCCCCk CCCCCl CCCCCm CCCCCn CCCCCo CCCCCp CCCCCq CCCCCr CCCCCs CCCCCt CCCCCu CCCCCv CCCCCw CCCCCx CCCCCy CCCCCz CCCCC{ CCCCC| CCCCC} CCCCC~ CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ?  CCCCC! CCCCC" CCCCC# CCCCC$ CCCCC% CCCCC& CCCCC' CCCCC( CCCCC) CCCCC* CCCCC+ CCCCC, CCCCC- CCCCC. CCCCC/ CCCCC0 CCCCC1 CCCCC2 CCCCC3 CCCCC4 CCCCC5 CCCCC6 CCCCC7 CCCCC8 CCCCC9 CCCCC: CCCCC; CCCCC< CCCCC= CCCCC> CCCCC? CCCCCDl@ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ @ CCCCCA CCCCCB CCCCCC CCCCCD CCCCCE CCCCCF CCCCCG CCCCCH CCCCCI CCCCCJ CCCCCK CCCCCL CCCCCM CCCCCN CCCCCO CCCCCP CCCCCQ CCCCCR CCCCCS CCCCCT CCCCCU CCCCCV CCCCCW CCCCCX CCCCCY CCCCCZ CCCCC[ CCCCC\ CCCCC] CCCCC^ CCCCC_ CCCCCDl` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~  ` CCCCCa CCCCCb CCCCCc CCCCCd CCCCCe CCCCCf CCCCCg CCCCCh CCCCCi CCCCCj CCCCCk CCCCCl CCCCCm CCCCCn CCCCCo CCCCCp CCCCCq CCCCCr CCCCCs CCCCCt CCCCCu CCCCCv CCCCCw CCCCCx CCCCCy CCCCCz CCCCC{ CCCCC| CCCCC} CCCCC~ CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ?  CCCCC! CCCCC" CCCCC# CCCCC$ CCCCC% CCCCC& CCCCC' CCCCC( CCCCC) CCCCC* CCCCC+ CCCCC, CCCCC- CCCCC. CCCCC/ CCCCC0 CCCCC1 CCCCC2 CCCCC3 CCCCC4 CCCCC5 CCCCC6 CCCCC7 CCCCC8 CCCCC9 CCCCC: CCCCC; CCCCC< CCCCC= CCCCC> CCCCC? CCCCCDl@ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ @ CCCCCA CCCCCB CCCCCC CCCCCD CCCCCE CCCCCF CCCCCG CCCCCH CCCCCI CCCCCJ CCCCCK CCCCCL CCCCCM CCCCCN CCCCCO CCCCCP CCCCCQ CCCCCR CCCCCS CCCCCT CCCCCU CCCCCV CCCCCW CCCCCX CCCCCY CCCCCZ CCCCC[ CCCCC\ CCCCC] CCCCC^ CCCCC_ CCCCCDl` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~  ` CCCCCa CCCCCb CCCCCc CCCCCd CCCCCe CCCCCf CCCCCg CCCCCh CCCCCi CCCCCj CCCCCk CCCCCl CCCCCm CCCCCn CCCCCo CCCCCp CCCCCq CCCCCr CCCCCs CCCCCt CCCCCu CCCCCv CCCCCw CCCCCx CCCCCy CCCCCz CCCCC{ CCCCC| CCCCC} CCCCC~ CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ?  CCCCC! CCCCC" CCCCC# CCCCC$ CCCCC% CCCCC& CCCCC' CCCCC( CCCCC) CCCCC* CCCCC+ CCCCC, CCCCC- CCCCC. CCCCC/ CCCCC0 CCCCC1 CCCCC2 CCCCC3 CCCCC4 CCCCC5 CCCCC6 CCCCC7 CCCCC8 CCCCC9 CCCCC: CCCCC; CCCCC< CCCCC= CCCCC> CCCCC? CCCCCDl@ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ @ CCCCCA CCCCCB CCCCCC CCCCCD CCCCCE CCCCCF CCCCCG CCCCCH CCCCCI CCCCCJ CCCCCK CCCCCL CCCCCM CCCCCN CCCCCO CCCCCP CCCCCQ CCCCCR CCCCCS CCCCCT CCCCCU CCCCCV CCCCCW CCCCCX CCCCCY CCCCCZ CCCCC[ CCCCC\ CCCCC] CCCCC^ CCCCC_ CCCCCDl` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~  ` CCCCCa CCCCCb CCCCCc CCCCCd CCCCCe CCCCCf CCCCCg CCCCCh CCCCCi CCCCCj CCCCCk CCCCCl CCCCCm CCCCCn CCCCCo CCCCCp CCCCCq CCCCCr CCCCCs CCCCCt CCCCCu CCCCCv CCCCCw CCCCCx CCCCCy CCCCCz CCCCC{ CCCCC| CCCCC} CCCCC~ CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ?  CCCCC! CCCCC" CCCCC# CCCCC$ CCCCC% CCCCC& CCCCC' CCCCC( CCCCC) CCCCC* CCCCC+ CCCCC, CCCCC- CCCCC. CCCCC/ CCCCC0 CCCCC1 CCCCC2 CCCCC3 CCCCC4 CCCCC5 CCCCC6 CCCCC7 CCCCC8 CCCCC9 CCCCC: CCCCC; CCCCC< CCCCC= CCCCC> CCCCC? CCCCCDl@ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ @ CCCCCA CCCCCB CCCCCC CCCCCD CCCCCE CCCCCF CCCCCG CCCCCH CCCCCI CCCCCJ CCCCCK CCCCCL CCCCCM CCCCCN CCCCCO CCCCCP CCCCCQ CCCCCR CCCCCS CCCCCT CCCCCU CCCCCV CCCCCW CCCCCX CCCCCY CCCCCZ CCCCC[ CCCCC\ CCCCC] CCCCC^ CCCCC_ CCCCCDl` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~  ` CCCCCa CCCCCb CCCCCc CCCCCd CCCCCe CCCCCf CCCCCg CCCCCh CCCCCi CCCCCj CCCCCk CCCCCl CCCCCm CCCCCn CCCCCo CCCCCp CCCCCq CCCCCr CCCCCs CCCCCt CCCCCu CCCCCv CCCCCw CCCCCx CCCCCy CCCCCz CCCCC{ CCCCC| CCCCC} CCCCC~ CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl                                 CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCC CCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCC      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abdefghijklmnopqrstuvwxyz{|}~VCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl     CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCC CCCCC CCCCC CCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDl !"#$%&'()*+,-./0123456789:;<=>? CCCCC!CCCCC"CCCCC#CCCCC$CCCCC%CCCCC&CCCCC'CCCCC(CCCCC)CCCCC*CCCCC+CCCCC,CCCCC-CCCCC.CCCCC/CCCCC0CCCCC1CCCCC2CCCCC3CCCCC4CCCCC5CCCCC6CCCCC7CCCCC8CCCCC9CCCCC:CCCCC;CCCCC<CCCCC=CCCCC>CCCCC?CCCCCDl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_@CCCCCACCCCCBCCCCCCCCCCCDCCCCCECCCCCFCCCCCGCCCCCHCCCCCICCCCCJCCCCCKCCCCCLCCCCCMCCCCCNCCCCCOCCCCCPCCCCCQCCCCCRCCCCCSCCCCCTCCCCCUCCCCCVCCCCCWCCCCCXCCCCCYCCCCCZCCCCC[CCCCC\CCCCC]CCCCC^CCCCC_CCCCCDl`abcdefghijklmnopqrstuvwxyz{|}~`CCCCCaCCCCCbCCCCCcCCCCCdCCCCCeCCCCCfCCCCCgCCCCChCCCCCiCCCCCjCCCCCkCCCCClCCCCCmCCCCCnCCCCCoCCCCCpCCCCCqCCCCCrCCCCCsCCCCCtCCCCCuCCCCCvCCCCCwCCCCCxCCCCCyCCCCCzCCCCC{CCCCC|CCCCC}CCCCC~CCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDlCCCCC(&@ (  R  C ]F! d ZR  C ]F! d ZR  C ]F! d ZR  C ]F! d ZR   C ]F ! d ZR   C ]F ! d ZR   C ]F ! d ZR   C ]F ! d ZR   C  ]F ! d ZR  C  ]F! d ZR  C  ]F! d >@PdA w = ; ;@Pass;@Fail;Info9< 9< ;9< ofo d  @Pass;9< ofo d  @Fail;9< ofo d  Info<< << ;@Pass;@Fail;Info{+{ {+{ {+{ {+{9< {+{9<  {+{9< !{+{<< {+{<< {+{<< y  Input Error5Please enter an accepted value: Pass, Fail, N/A, InfoPassFailN/AInfoN<  Sheet3ggD f2ɀ $07?FMR  dMbP?_*+%&ffffff?'ffffff?(?)?"333333?333333?as&<3U} t} At} $ t      q r5s u vs u vs  vs u vs w xs w xs k lgs k lgs u v s u v s u v s k v s w x s w xs u vs uH vs yI vs uJ vs uK vs uL vs uM vs u_ vs u vs u vs u vs u vs u vs u vs u` vs w xs uV vsD@l&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&& !"#$%&'()*+,-./0123456789:;<=>? a^ z> s !uW !v!s "uX "z>"s #uY #v#s $uZ $v$s %k[ %lg%s &a\ &z>&s 'a] 'z>'s (u (v(s )w )x)s *k *lg*s +k +lg+s ,u ,v,s -k -lg-s .k .lg.s /k /lg/s 0u 0v0s 1w 1x1s 2ua 2v2s 3ub 3v3s 4uc 4v4s 5ud 5v5s 6ue 6v6s 7af 7zg7s 8ah 8zg8s 9ai 9zg9s :aj :zg:s ;ak ;zg;s <al <zg<s =a =zg=s >am >zg>s ?av ?z>?sD@l&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_ @aw @z>@s Aax Az>As Bay Bz>Bs Caz Cz>Cs Da{ Dz>Ds Ea| EzgEs Fa} FzgFs Ga~ GzgGs Han HzgHs Iao IzgIs Jap JzgJs Kaq KzgKs Lar LzgLs Mas MzgMs Nat NzgNs Oau Oz>Os Pu: PvPs Qu; QvQs Ru< RvRs Su= SvSs Tu? TvTs Uw UxUs Vw VxVs Ww WxWs Xw XxXs Yw YxYs Zw ZxZs [w [x[s \w \x\s ]w ]x]s ^w ^x^s _w _x_sD@l&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&`abcdefghijklmnopqrstuvw{x{y{z{{{|{}{~{{ `kN `lg`s akO algas bkP blgbs ckQ clgcs dkR dlgds ekS elges fkT flgfs gkU glggs hu6 hvhs ik7 ivis ju8 jvjs ku9 kvks lu@ lvls mw mxms nk nvns ow oxos pw pxps qw qxqs ruA rvrs suB sv tuC tv uuD uv vuE vv wuF wv xu xv ykG ylg zu zv {u {v |u |v }w }x ~u ~v u vDl&&&&&&&&&&&&&&&&&&&{{{{{{{{{{{{{{{{{{{{{{{{{{ u v u z> u z> w x w x w x w x w x w x w x w x w  x w  x u v u v u v u z u z k lg w  x u v u v u v w  x u v> u z ||:PHP0(  >@A    Sheet4ggD f2ɀ U=V  dMbP?_*+%&ffffff?'ffffff?(?)?"333333?333333?&<3U} I_Y} $ Y c` e` d%` f` d`bdPH` 0(   >@ Sheet5ggD f2ɀ  [_  dMbP?_*+%&?'?(?)?M\\ipp://156.80.61.27\i_A585_HPS oAXXLetterPRIV0''''\KhCם{"AXX??&U} G} P} 1F} m}F} F} mG} F} &Q} IF} IR} AF} F} $ F ,X@X@@,K,@,@@ @ ,@ @   ' HIIIF , JL M J F ) J!FF * J"FF ( J#F F +  J$ F F   N/ F F %  O& F0&:::::PHp$0(  $>@   J   w Sheet6ggD f2ɀ kn  dMbP?_*+%&?'?(?)?M \\ipp://156.80.61.27\i_A555_HP S odXXLetterPRIV0''''T\KhC]F4TRJPHAA528693"dXX??&U} $ } $&} $      S S S SV$@W&@ V T$V?W@@ U. T$TTUTTTUTTTUTTTUTTTUTTTUT TTUT TTUT TTUT TTUT TTUT z822PH(0(  (>@A w Sheet7ggD l PXh px )BA&H  CoverPurpose Dashboard Test CasesOut of Scope ControlsSourcesLegend Change Log'Test Cases'!Print_Titles  Worksheets Named Ranges$ 8@ _PID_HLINKSA kHmailto:First.M.Last@xx.xxxkHmailto:First.M.Last@xx.xxx FMicrosoft Excel 2003 WorksheetBiff8Excel.Sheet.89q