ࡱ> 9:;<=x  !#$%&'()*+,-./012345678?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry FP I@Workbook IMBD000503E5  F77Ole =  -F!cover!Object 1  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89qOh+'0  4 @ L Xdlt|Christian, Michele  Normal.dotmChristian, Michele Data 81Table",CompObjyOlePres000>\8DdO zp<  C Ab48{ߌ[4yͰL8Dn8{ߌ[4yͰLPNG  IHDRO:EgAMA pHYs12N– IDATx}8e}{p#0rCG`9&r"D3KPxg`EF.oϼX̋ϼX̋ϼX̋ϼX̋ϼX̋ϼX̋0+놡y8ck+Sx脰:D[Q/[??HPTI5o HuoD1ճC ]^Qhz|`VOOay Z8n#ʬCR6RJUoZ篟tXܳCPZNa~FET5ېbns#n[.ZW>w9 |[FV,:xۧ/{k>qvD h"СP))F #ƟS)!GĎjJ3+Dbm5Ĕn~CZLCa#`m魜;?kWOV!Jm UKaܣj\$܄=O9FV"kTגyn- jVw!:j<ݜwAxND(ySzYKz>pRN=XT*QU/{o+T&iJ6YK~=H'?0Ou7-峭+5GdA:Vc&~E|OJӒ*X@UNHtc>Z󋄆4OgҨz/'~BQ1| .3SZ$N588l ՃbjU4&٢x/1fç#N-olKu!,O[\g(yϨh:\4{5q=~)|*Xpu0zc7C6Jg5}9AFtFqr74՚ d4ϣnVH A? 'bq„c|sB&IPݝ6m}궕i#:'PfC.4NUc31Zoj!4Oqf3]o"eLt W<'aM(>e5v M:_Y*y]Ɓ ďg%u =ԖIWqBYm]Gn 4<rф 傼;+ZܞQ |V^kɶ=KL)9#bчMBHdG tSs 6( W<ϖO3qͧTʴ[K` k߂cd ؑ/\^芊 >1_OO, λX%Z뤿6@qNgϗI3<=Α}M:skfwvA[" %cŖ=yTwt|P @Y9[jO==E /`1{zX Uѫc5qVxͤe+WbJkAmؗHv&5vmԜ0?0`OwjtkᾛMX;>_*I|p۫7QǢr&C"[m%Ls h6>%k^n{;8c,z'F3{?ͲQ{@?YM|R5\טT}dufx ]"H!' C~H)ӘDVi})"OҼFZL0+IO1&f>}OXwMZѺJnrtw2@v&O7>z?l3bS]';q:MyT'fEmS ű+HZOn,Fa `D7·(-$T*&󟟢ܣX^$Q;_MuKé(Uֆ1uCs1XGb6(kg3h١Rq"3n논%SRbKO,Ts~f~90C`QɨĬlYkTsL,'˼k N ۽ [rLc(>-ZA )ҟFJAt~O[~O)gA{'maQ aB3r#Sq#rО5$Pb=6 ՅZvѺEfD+1EѾDT $wV{cDyhK֚&{)t }5 EyTV\vj.AsTr ;21Vm|hY%!#n>q^: nI {N4}&8Zܚ6HȖ܊)*# zc۶7o= 1z E@l>}= ׌7EBe¦cБ~P {9dkwe5-|dBͫ7EQm]eU0kl\% ~߳zlLrGݠ5fq~Ê Mb஁՚;vpl_3N( a5LfH>&Qb0'=fbLO&߃uY+XPEDJW]3LLL UJ oYs_M'6($>LYcR31[mU %G9L'0.Xָ*vKZ߫Z?NFD>}2 >wV _U 7Q <\YhNh1U=H' x?BkS|blyjrrDTP,8pCwqm?dο"B_WeP]ڀk{e'bf0ݑ]'إ)ԮZg:ħ0nY-ˍ :*1稝 RjVWAN$(VT@W&iP?|opOj=@Z=Nx>;&=VSj'4 &*NwCvό5\4c=:_8~T`w Ci??ҍ}mkP3ZGuxkТ-q K@ $Gۖ [ѐZJدqЀau|'eM_͉v*l' xZ3NX:D2m΂-Dzwk1@t_xUڏ|G-U~lLKوĞڱeJ? /v|v܈k,'|`Lqu`a0QT'{KE!S$,kض'8NՀ88dRdy:7pbmd?uPs7a,zh4@2,|u m16j=yסhg9Ms5'.)lp*,Gxst% UgBu 3ggwhxy׃$Ӏ._)$/]uQI͟ἧ&O:@9T'>t~m 4~@sTodZ揥&"_ [$)(zuOoyqS]n?ħyx++W"%EUO{/`,P'^qbN -=8R/]uF<'PkViHguDvTq=4~9 E[:=S{uCrN2o3CU%^MtKs^çyG-VK26۲uYwg3ЀRuJnى| +ZL'm)D9,,ϧw։MɓnS.!#1N)rt#|nDX~ұDx:} hG"8DD5׀AOI` C*T ^NԢ#qoWD^Km^NJϩ 4FŖBӳ٦hz4y.4yҝ4dIB,^N,il xs EbD CFLE[% aQNƏ*żgQ% *k<s&Tq~)qgK#X nX|L )4tsl(%9y3ڏ|ڑhzKn%g|S&)\>נo@3([W`ЎD_$ WQ`-Ml[C *\Dn ^0Cxj}A-.O5Af7JhtY?`Z|?}H$=E[]g?N><$*hnY !*2S>||Ͼ"ey?\ꋆCXAE)qO_EP=)N r ڱWoK]>,g䓿rwo?ۏU\2!QAp4._~0HhSBY2@"XbjZãuE+N;{b7Oy ۥ1{i3;irMCPq?wf|`*gBQ mGCvEǡ2CD:Sqxtd?r/J,P'O0[߻la<о@cH'i0o1h篟~ 7c=KY}H9PQq| ? /ЮwTdml&=ʒè ,3 Yf*s}73lǜJ<[y|OOm:*KD؃0 >g/CMrwDESt,|&sonu!]{yCDP`;4}toS^OwG/1Յ3٧*N.@~Hnl|mI}E5I 3$LNW`UXBowN?vNLDw|.ݪ8J:*Vn_1 a7 ?A)wk*B6sX.tpיhbЏADgO[Q?{l5LQ<76ٍ$UolFLs )9i"p ]msPw'6/l6j;Bňj kƶhԽ3 X}RWv]Nat;΅bPWU9s5z8%w_DDGݓD:Jܡr̷Đ}`Dh._G.E>IF.b=b#>Cͥ'1]sWO?9:L $(qTO97h*h0SJAV\:Dh=ΰk^ZK4N4SoNNZX>! []'*R힓]0*OPqy{K/IT[g ."Onn|ul}^-a"4byrab/<^)Pt7nF`e"Rص d5t[2~DNlRӇ˥a>SAۿK#sU?=x7ǽ ḀG~uZ.w鞖1EL\/\f<Ѯ04ԺzzOgٮ1i{u^,WF]\85PEB9bYiӶ5l]a~Im9e%dDŽ!`bKewKtRoO+VO2.e OO?|e|Sx|$+cֹB}ҙS=Rx#Xc%K|B{C 7cԟ}@TX@bn"ˋZvQe(b^œi[}nKA,8R⪞GKj#Lz67 fPS=C# vQ7+wB&o\~l좢E} ٠Ds`/'ב4Qr)qik )e-1B\ϯǓ2|cx{%F9!s9Y¥r1<)\[NS΂ߏkat~\D/#.0mbp<((v`hĊ/]㾼fUxL,۹h-Dq|.&\ARfj\lzxbՉWxY>vH5+ a.2_~kF &_'4 <螦oUlFwIEEяⰫ3އ"x !I[= ߸N|gdd9s& McbTrC13u)\qy)`f/2&A-0Kt O%wV3>>"s":Y#ɟ~t N)3*#5Vi ĶޘUx煱;Ձpn_³mw<*҆SxyfM:O' .mj r>ҋ"n*NT4pN c \)1 {on^ WXdrqޑy0]{tVgź? *xntlo:p;Fݱ&-WJ]0\OXg>.)8u;":y۱=ǐ淖}/ѳ"p+e:&s&gNg<8fe[M蚧}xV8q$,;<?wvG8$g}-y;,*=Qxu`w*ޟ쿽p:^cWqxd]YbPT怚wRfE"za0Z1јa4U{IMхBI*PEq,.bPlvLMZzm;Q|FJL#qL wbKzo6\#|3g/FcF3VUxd1dy #UB|q|F,~`C5>fG11]˞#y=~hauucX!-q|ڻ >=':B~[h*NV|=Mɧ92Y (E* vfx %ߵ $+lgoaBgڍ18M@Ty-q =k ;p1N/JPIeUKrk /PPG" XE7@ ?)8֋(|& <]_EmE#æV\lވbSM/2( d|izy8 yeo'+-kF3X@iK;-^(۽#m6yܔO"7?T,G/QdōLꚃlcL˰ |F3P6"|>Zё.(#§1Ѫ)ħ1Ƿɵوth1ُ)ɱ?<>JA<+ ?t/d CWOC#+y+y+y+y+y+y+y+y+y+y+y+y+yWQ~?|q^R2j^%"Eh嘫g^|g^|g^|g^|g^|g>$pxW.>w@YoJѝSqzx:tn4W%sW䡽F1kymЉO2g?Y3:̤&bstU] |b`,Vl k& W(|2\i|\}1ɸK^9(vS>B |9 >7ç6NcBB"|Xgx>8.45ǧp| [Qj{cюefu ;)X&~Jȧ5'| Ơ#2C AT.gӷtⳋsN pCvm>x~l bj; T^x[T?\MԭӦ̾1=qYP)<< еl=P<a x; ӼO(I}@޹? c%T.% 缟pk%c藹}gy/^%+y+y+y+y+y+y+y+y~a/9\~+Gݝ?eY׷[b9Plz}qUyڿeƵѷ]b6 q'9ϏC! ryAo,㣇[xw"xse e; <qxψ> (U)s Otnx B=/bIrvtllO(L@G q)cڹ 5*>U洡P}ጟ欙S7e;¿?O(戾vİjہ񁣧95?ϰҾǑ>ֲ%p?DֱЯ|.1E!=~A 8nag(33}8^\QRs ]0v1Cٜ&ǁxS32{GTGܘ98\*>E@8;BJ`aIF|윟|wԗBg>k1#!CNRh}a'Q}ȪQսbNg~iRQ4Es>/l?xjc1G^2Qsɱ&O'x2E祊tTЊlOT` T,Ŷ%LF2ٲLML\zjhb zyJ,|" Bj9swF|w0oJs\HTTÁ~k-ՎHL>!?yY+$)Y:zoD V_>|c+@283c\R1o 9f+< l?vJ=Y-a42v$r1v#|Εs;Ͻw\n; oR|МL 2p\_)`l8[0DǜJ>-l*ĩ릿o2KVڶmaI_4 }{0 |Zk<|{@6y07MNу՘;6`1|.|B;D:9*Őz ^"L=F#Pv ˻5} O#?tg4 $|x p{y,eԍ&.,kMi뺞/5oHyvZu#ԣ1[Ɛ9oOLE+ޜ p0OBěRyvh ٵ_r*6'\'쌹'MeQ0OVog=U(T1izg墈4+ܴiE(n[9ZAZ|idE_UQ dԇp C)us iC.*9Kt|2n Ԏ^?7cP ͐ + uL ZIl/ٿD{% ȜTeN|}NIka l?L';y$*||FeuP-;v;{Rwfoyy`[? wzPGDw)A_o$Er>s´"0<< U۾A5?'~@ѿ?) e痺:P8;_(IPLm9-/9">^wɩmf:iCe=>BHg6a!*2GJ`B)sᳱcli/soȑͧʣؚ l)?m f#TL=scb>[=lCc[~>LafOTA?Uk3wNa1kf=2l˃( d>_jSb Pħ_myݧ>Kh.#*MNPħC{꽏GE/!O^në  6ё-u/ G'YŻ'|1ERYU؟xL"&i1ULdiqqY`t陓4>#v5A>ɠR|2lOv,ϲp@?HVr&2Hj-//ozĩϕ=Uy[g# E%,~o8+U;N.|ڽa?oϼk=983Ec"ZO#f{DHJY&RO;u0XB/v6v09ASigz{$s |q3HH`oӼf>sHeWdB߷SqTZ~O7xkhvuB)E(Z}UaRw}~؃W\5Ƙ 8;[w"GɊ_M_1`Fxw[7+}Θ1'սi GHSʍ{`;EČ/O8G fJt#A~y$ݏPp~t4y GzDϴπ06666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH N`N Normal,ndhCJOJQJ_HmH sH tH " pHeading 1,1 ghost,g,Ghost,ghost,g ,1ghost,Ghost +,h1,Chapter Number,Divider Page Text,og,Heading,Ghos,g1,Graphic @&CJ*2* Heading 2,2 headline,h,headline,h2,h headline,Heading 11,heading 1,H2,heading 2,Heading 12,oh,Header1,Heading 121,h g2,Heading 1211,Heading 12111,2 hheadline,01 Headline,Heading 13,Heading 121111,Heading 1211111,Heading 12111111,2 headline1,2 headline2@& #@5;020 Heading 3,3 bullet,b,2,bullet,SECOND,Bullet,Second,4 bullet,h3,BLANK2,B1,b1,blank1,3 dbullet,ob,bbullet,3 gbullet,dot,second,3bullet,Bulle,bdullet,heading 3,Bullet 1,3 dd,3 cb,3 Ggbullet,02 Bullet,bul,B,Heading 21,3 bbullet,Heading 211,3 bulle,h 2,Dot#F@&]#^F``B` Heading 4,4 dash,d,38[@&]8^[`nRn Heading 5,5 sub-bullet,sb,4[~@&][^~`fbf Heading 6,sub-dash,sd,5p @&]p^ `FF  Heading 7$$@&a$ CJ$OJQJNN  Heading 8$$x@&]a$5CJDA D Default Paragraph FontViV 0 Table Normal :V 44 la (k ( 0No List JJ center bold,cbo$dha$5@@ center plain,cp$a$bb col text,9 col text,ctdPP @CJ.". |col bullet,cb,Center Bold,col bulletcsb,u,cbbullet,C2 Col Bullet,cb 10pt,col bullet1,cb1,c,Center Bcbold,6 chart,Chart,chart @E^`EN!2N col dash,cd k@^`JBJ col heading,8 col heading,ch,Col Heading,8 col heading,8colheading,9 col heading,e,ColHead,C1 col heading,8colheading,C0 Col Heading$dPPa$ 5;CJZ!RZ col sub-bullet,csb ^`LQbL col sub-dash,csd^`FArF col sub-heading,csh;BB first,f,1#^#`CJ> > Footerd P2CJJ&J Footnote Reference6CJEHH*TT  Footnote Texthd^h`6CJPP footnote,fnhd^h`6CJLL harvey ball$a$ CJOJQJ>> Headerd P2CJBB note,no#^#`6CJRR numbered text,nt #^#`5;NN oversized graphic!]^@"@ paragraph,p"#d`#T2T source,so # ud^`u6CJ>B> step,st$8^8`5<!R< sub-heading,sh%;FbF table title&$da$5CJZ!Z trailer,7 trailer,t'x#$2/..).  Page NumberJJ TitlePageBottom)$da$CJXTX  Block Text*$yC]y^Ca$5;CJ$OJQJJJ File Name in Footer CJOJQJ^^ facing page #,fp,&@#$2/.5CJPK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] " 8@0(  B S  ? #2  hh^h`OJQJo(#2 n @@UnknownG* Times New Roman5Symbol3. * ArialABook AntiquaY Harvey BallsCourier New;WingdingsA BCambria Math@ "1hJK#fiK&,cY0dS2HX $P n2!xxChristian, Michele Christian, Michele        !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~\ FT&" WMFC l EMF \KhC   % %   Rp@"CalibriHRO`2H@,$O`2H@ o.1@H <:o.1 ,%7.{ @Calibr ŗ`2s:Lt9'1z%1<:dv% % % !F(GDIC!b K  QOPl0 (Oppp@@@000 PPP```C k                                  H       "             [           &" WMFC m            8          ^                5   2                #    h                                          &" WMFC M                            &" WMFC -                                                                &" WMFC                                                                                                                                         &" WMFC                                               &" WMFC                                                                       &" WMFC                                                                                                                                                                           &" WMFC                                                                      &" WMFC m    &" WMFC M                                                          &" WMFC -                                                                                                           &" WMFC                                                                                                               &" WMFC                                                                                                    &" WMFC                                                                                                             &" WMFC                                                                                                 &" WMFC                                                                                                                             &" WMFC m                                                                                                              &" WMFC M                                                                                                                  &" WMFC -                                                                                                   &" WMFC                                                    & WMFC " FGDIC" % % % TTAEALP % %   n."System-- @"Calibri---,n,TA Op(Oppp@@@000 PPP```C k                                  H       "             [                       8          ^                5   2                #    h                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         ''--- 2 pn --NANIWordDocument SummaryInformation( DocumentSummaryInformation8 ,SummaryInformation(  bjbj΀ 0 $$$$$$$$8!% -% $'9%9%9%9%9%&&&'')')')')')')'^),v)'$&&&&&)'$$9%9%>'f&f&f&&$9%$9%''T) f&&''f&f&&&9%q=4$&R&'T'0'&v,f&v,&v,$&$&&f&&&&&&)')'f&&&&'&&&&v,&&&&&&&&& #:         h hjh U    dgd  .:p n) =!"#$% 44Microsoft Office Word@ʗ1@KhM@FJ@(Z4՜.+,0 hp  BOOZ-ALLEN & HAMILTON  TitleOh+'0H      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwyz{|}~ \p Andrew Westner Ba=  ThisWorkbook=x1,>1>1>111<Calibri1>Calibri1?Calibri14Calibri14Calibri1 Calibri1 Calibri1Calibri1Calibri1 Calibri1Tahoma"$"#,##0_);\("$"#,##0\)!"$"#,##0_);[Red]\("$"#,##0\)""$"#,##0.00_);\("$"#,##0.00\)'""$"#,##0.00_);[Red]\("$"#,##0.00\)7*2_("$"* #,##0_);_("$"* \(#,##0\);_("$"* "-"_);_(@_).))_(* #,##0_);_(* \(#,##0\);_(* "-"_);_(@_)?,:_("$"* #,##0.00_);_("$"* \(#,##0.00\);_("$"* "-"??_);_(@_)6+1_(* #,##0.00_);_(* \(#,##0.00\);_(* "-"??_);_(@_)[$-409]d\-mmm\-yy;@ 0.0%                                        -  -  -  -  -  -  -  -  -  -  -  -  #  '   ) ff + ) , * + "   P  P ! !  %   ( ` $         &    , a *  x@ @   x@ @    h  "x  x   x  )x  !x  x  |@ @   x@ @   *x   x@ @   1 |@ @   x@ @  *x   " "  "x@ @   x@ @   8@ @   <@ @   8@ @   (@ @  8@ @   8@ @    |@ @   "x@ @   Zx@ @   x@ @   p  p@ @   p@ @   t!@ @   p@ @   p!@ @   @  x )x  x!@ @   x!!@ @   p@ @   x@ @  *p@ @   x@ @  &x"@ @   &x"@ @   &x "@ @   &x"@ @   &x""@ @  ( x@ @   h@ @   H  8@ @   x@ @   8@ @   x@ @  "<@ @  Q  <@ @   |@ @   8@ @  *x@ @ "x@ @ (x@ @  (x@ @   (@ @  "x@ @   `@ @   @ @   `@ @   `@ @ 7  `@ @ 7  `@ @ 7 (x@ @  8@ @  8@ @   +8@ @  *pUU@ @    (@ @    ,@ @   (8@ @  x@ @   8@ @    @        *X "X  (  "x@ @   "x@ @   "x@ @  (8@ @  (8@ @  (8@ @  8@ @  8@ @  8@ @  8@ @  8 8@ @  8@ @  8@ @  8@ @   x"@ @   x"@ @   x "@ @  "x  )x  !x  x@ @  ||+}<} 00\);_(*_)?_);_(}(}00\);_(*}(}00\);_(*}(}400\);_(*}(}400\);_(*}(}400\);_(*}(}00\);_(*}(}00\);_(*}<} 00\);_(*_)?_);_(}<} 00\);_(*_)?_);_(}(}00\);_(*}(}00\);_(*}(}00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}-}? 00\);_(*}A}1 00\);_(*;_(@_) }A}2 00\);_(*?;_(@_) }A}3 00\);_(*23;_(@_) }-}4 00\);_(*}A}0 a00\);_(*;_(@_) }A}( 00\);_(*;_(@_) }A}8 e00\);_(*;_(@_) }}6 ??v00\);_(*̙;_(@_)    }}= ???00\);_(*;_(@_) ??? ??? ??? ???}}) }00\);_(*;_(@_)    }A}7 }00\);_(*;_(@_) }}* 00\);_(*;_(@_) ??? ??? ??? ???}-}A 00\);_(*}x}<00\);_(*;_(??? ??? ???}-}/ 00\);_(*}U}@ 00\);_(*;_( }A}" 00\);_(*;_(}A} 00\);_(*ef;_(}A} 00\);_(*L;_(}A} 00\);_(*23;_(}A}# 00\);_(*;_(}A} 00\);_(*ef;_(}A} 00\);_(*L;_(}A} 00\);_(*23;_(}A}$ 00\);_(*;_(}A} 00\);_(*ef;_(}A} 00\);_(*L;_(}A} 00\);_(*23;_(}A}% 00\);_(*;_(}A} 00\);_(*ef;_(}A} 00\);_(*L;_(}A} 00\);_(*23;_(}A}& 00\);_(*;_(}A} 00\);_(*ef;_(}A} 00\);_(*L;_(}A}  00\);_(*23;_(}A}' 00\);_(* ;_(}A} 00\);_(*ef ;_(}A} 00\);_(*L ;_(}A}! 00\);_(*23 ;_(                 13  5 3 @5 3 @3 + !3   !3 2 !3 + !3   !3 2 !3 + !3   !3 2 ! 20% - Accent1M 20% - Accent1 ef % 20% - Accent2M" 20% - Accent2 ef % 20% - Accent3M& 20% - Accent3 ef % 20% - Accent4M* 20% - Accent4 ef % 20% - Accent5M. 20% - Accent5 ef % 20% - Accent6M2 20% - Accent6  ef % 40% - Accent1M 40% - Accent1 L % 40% - Accent2M# 40% - Accent2 L湸 % 40% - Accent3M' 40% - Accent3 L % 40% - Accent4M+ 40% - Accent4 L % 40% - Accent5M/ 40% - Accent5 L % 40% - Accent6M3 40% - Accent6  Lմ % 60% - Accent1M 60% - Accent1 23 % 60% - Accent2M$ 60% - Accent2 23ٗ % 60% - Accent3M( 60% - Accent3 23֚ % 60% - Accent4M, 60% - Accent4 23 % 60% - Accent5M0 60% - Accent5 23 %! 60% - Accent6M4 60% - Accent6  23 % "Accent1AAccent1 O % #Accent2A!Accent2 PM % $Accent3A%Accent3 Y % %Accent4A)Accent4 d % &Accent5A-Accent5 K % 'Accent6A1Accent6  F %(Bad9Bad  %) Calculation Calculation  }% * Check Cell Check Cell  %????????? ???+ Comma,( Comma [0]-&Currency.. Currency [0]/Explanatory TextG5Explanatory Text % 0Good;Good  a%1 Heading 1G Heading 1 I}%O2 Heading 2G Heading 2 I}%?3 Heading 3G Heading 3 I}%234 Heading 49 Heading 4 I}%5( Hyperlink 6InputuInput ̙ ??v% 7 Linked CellK Linked Cell }% 8NeutralANeutral  e%"Normal 9Normal 2: Normal 2 2; Normal_Sheet3 <Noteb Note   =OutputwOutput  ???%????????? ???>$Percent ?Title1Title I}% @TotalMTotal %OOA Warning Text? Warning Text %XTableStyleMedium9PivotStyleLight168=,=,̙̙3f3fff3f3f33333f33333\` 6CoverHPurposeQ Dashboardf Test CasesOut of Scope Controls.SourcesLegend Change Log!  ; X`( /"n-L'Š!6@=n-L'Š!6 ]xxuP[np+NB)RHqNhqC (5H79;ss˞53 #$!B  a95y {H"/}m>f>JleP 0 %$a LгPN'OО OR#RГ5z<]dhȨ(ȨȀ?$"O!3π&נ i|!;ľ~ #O!L_bfiV?uxM=)Tst,!@j,^ @So?$|1OkxII@Oژ4TS,ZC]qeD|G(T)5).*= c9+WkuRX_P=?H_"wC*`&+@(nVV?5}Q{YڼQJ(kqUp:HwI$ Y6 S1gj3+|pO}W xK#.rqH\n* Ip}b'0X PX^qNg&'1Oz^WEj>.6yuɼ{e_@}j| U|QCKeZQ1pM]]( FY/w$թN ǼV70Me/ಥKLMkV#2i^V}jbpGR"p Ҕ;92Py"@0ne;Sq#XlXf"ޗ;-& x7mt| SmL% M._z6WT֑MM/odjQԕhA3ؖe\L6gbbm'Ra+b¿'"Zj0u>_mI`s./.%O|^/&8;ğq4sM޾څ ρo8Զ](bGKIaY, ][AnҬJKy_PcdDŔ8\G/@)?2d#;B륽Eyh5/]%QڔS觍 @-Y'K]Xl捙j-/?xŸ4Ϭ,nlp` $۰?k&Y̨V Bԏs&7t:^2E+8 <m":vKT#|M>޻,$Z1Uza $iET+\#27Uof^`裷B2 #|./Bu~6 Q PYe['4'&vcbvPBJJ> ',gF`73Ȓ.K1{]D6̬>Qj"TnvS^GRƌ8,!9b>7cNitA_q% I+>頹bbݳrXTf%M]ļ~˾ݏ W43JK<*?%^6[ +EH:f*"Oz^ֻa-ߞ 7 w@D~GBͅrW({{34&0PZVOQ jC" X'@JgCd,O 4WhBt;yb^f0OciЉ%FBpѺ+Lј%R 8ݻ#GyB}l{|~\h΂W$% AZ鱄KD&{;3Y:V$ޏ7a(!"s6hy~ m]0)V̲L:]@6"{D,dH/6Ƙ ,eԩpa7:DHi*;^{!GΒaS^$?IoUAyo `/G]|"Ff} ]PU3XWQqJ9=9K9̉,oRv\o Qp7t\*{0-Wu8Ytb;އ,cʥkGjp/g pdydݤ^Np7!oI oJ7n_ڢaZ W0Jq >|ǃS2mQ L[@<3u@L0LuȱY%}fH@O{v:xnd?Ug'%Ư; uNc}nLR#zo~#SʞiΒ7?2c79L_nn|+-33 :İgg|cqHeQrhe{jbX 3qH0^A9`}e`B˛FpVnt߂ߑp҂]ׇ1L@uVWw*5wL~|нA61oRLqW ma XVu]SX*H YmKf-8p*g&{|g֊ M 6M?Xcj PXȺZa|5f@CH6BoCuVUue2h4a0dέv*[ڛQsT c,yڌt*7X"BUx\S-*wF+5Fihgoq:ɿ{饗uS° l5DLNh mE[^hbC?X|̮LfdqAi-kFL8KC]vDUinmiֶGac4LW"2?dd;WZXwxMfKT[`0lR Ey I_ .ةcI9^ >ER}E>4G JYӣ3pMQX<,4eۃ~ VbuITzڟضGFi1X^2UQQ8~N1$Y[B: ̼pe&?vK KČPtv8iF)xxōs9^Qi,K!ْP̼7] ^fhO4g+GU=-ۈo$x+U44@DCߐW^kv(Tqļo%߷x.'J^^ 8>AME }R*bA{=w8V!l 3բdC=srM z6lv̜vӳMr63hv()+IR~WS5XiFcZL^G}'tXu@|G!S s$ v/_qA ŋ+(Ը;o>-O m $бՔ}:Ni0JN5ȂC{a3AV3̱A$K )wTJ1k@;+#@dt"0/wҬXAmn:TdϬ;C^|'M@;|"\M)$(ЯC|_gϲIO85޹X/2<{-&ԭumVҿ!*WEE%S5,"0*]A#g,B*G{TBsO^"J=Au t7/O-]ŭ*eR9gVՈk7xx = S.hW+W)?۔iy(;Ep^ATVٻdτ991 epIE‘TLJ BL[zް|z7Z-c1)j ul@ 1`NvśPV@hRV#9pb&h\ n ÑCPxS.J}}I_ݸʖ" ?M~0Czu7v, ޜZW_rqq{<[(PH\sUKR/C: =e5G;'wR5zj1*LfP>Z,gR>m>w(#p#oF#l71t..6*yda L#cQ%KQvw[ d@aD|I7re>Fő c76S$w"$7dX6׌z4Avb}(3fmYH$dUFo\ifzUCG"7U8xd?!RDBcRւ%iʶw'h3?Fhח\$]Ef{:cӮ_6u]wA d !s6ԇ-ڋ P' ^/(M&5W0b -tvk{̋s&#&+vs'4o.~yFI4fO|3aCzIb!Q-R!gS.A'< [@iגaN=^O <؃}JJyoIc>=Um8o|$r-S[Ѡv Z8l53&TTw:-K2ӷrÅenCa".}V_%\;;cP95*ْ>RxW6΃چDG$-w|!8eGL٢!>^L [+ 'jh7dV᯻$pGϾCcSzX-9 LڳLAj;Al;xfhMr evL}P 82>yCE8r*_vZy i|)'Ur-v焃hX'C0Z<ʞoơ$g%VjQ6U]My.Xtpsƽཟ ہߝ͕\rDi$;SiG'#%UK% f:mg&Ƭ;f >G³X]U+|yV@\K_E8O@7 ;$Ƥؽ68߸]ZrwɎ=MVOC4'$Q >h&Dm $)-̇zAu;Un /w3CvQqL;."ݶ֩4ʽ22;ޔqۣμV`'/vС*N`(un;[M+͘阾)9~{[p * }ݨ r "J ! K"u{pTIi0íofxe%em3&G+p}?Q.e!Vjt$^-U74-R NIQM |o7aA<[*&"jXqIM#Rzhq_4`Y۰evo''U#ԇԍοž&CJ8k֙fj`lEu!Up+M1޶y>(:|B^{wů;-W}\717,qCD-ׄj :'v~`Ԛm`Xp7~]5XVݾD:l"WgsqxBAKTd] ՎiN+ߥ F\ڤ>ƽ9.Ѱ<6<0`70?r4w-d&B' a{aaÏMxJwM/#>.9n7KP O~~G;҄Upj٨S%^^m<5Wae;9V @9凶ߠ˺:mmj旖ӭ](4÷ucbZޥL1uLK#]L+%.$_R'ώdq9+jIC ws*R+`!-2|ODLdSk o/+b2L8Ȟh/cr{YZL&nz1â"9꺣cVldd73n#.c>ݐe^cRӍ1d|tV!/ 6+ 6mP-ώoMNթ$e5w0IIf"CPߏo. |Ӭv tlz[;{*B-'. Nj)(Tz哉T7̈́aE8˪"Bs40yv)X`mS +fxa<(|2F]{F>%9ٰt888p1ܕɳʶ3ݱ'ޱh?}=ಹ2͞("ܴ䆲rݵ!7ݱ%2]nň/2/8r;Zb5Fy kW3z |ruYNNyh ) Jp4y9BN.zfES.յWvDh mĹn s$B٧GDὐK_x\Txۙ-F<R">Vubw$YTI I6z;gcdҗ '"= xn6a*jg/mDΒ>Da攷_a\Mz뭵!U 0|+JA,T ixd"jm 'GBXGtۨW52z[R.2.;rsAʴi0آէe-苼gCe;*?2OнIXp᧤6qߜL;Vh٫!7Rr Ѱ\WP0u} 'TV!(|`rQŚPuk]yc⛲箑8HIKZfC]tsD íxyM70Uƙ{xX<_~)/oǚ]? <nHiT\O;m(,u%T(T*WQQ%[RHITv/̙{/z|_ϯ˼Ҝ99>9̜32'=/1>ǃհշ [8Ǿʑ辱9<*YRڥg 'j)5h}1QB:ӗAf ݜ+d61]Jaio9$dnG}i{(R7@bJPפ8CvXtzɓTZZ-;w.~wJNjJPBw{I!ߊSK&%UiRu.Y\֊2LpJYG?&S;^iWJYK`+#{n J':?m9,UoIm鴍UG~5JƁao2-L~A-,eGN?sڬX'|UCw7um{iڲ5S^y]fʻ U:}((}j-˚?pvN7v&gw 4u})n}M-v'>GuGWث9;շYcR([C9{D ) jIAtEm3~rh皁)x&\rJLq𲊦5?[ݕPЈ}\15MI*CMp# Wq6KO, ^e u6$ `n 4>sY,k^ֺ8UM;أz%Jf!wNdʮقЌECW7儧Oy%{"ar9G~e\k$~Tؖڲpmq޶$M4w1+[bSf1 &N`g֌ܲc\y &Yr 9딙Aɱt x;+J{]QY4概&)ComsZ$OejM'~ xb>V"U=k"D}RMcLDOC3 f}vrlm3<)u:18s<K7Hl2i`IT2u\/דsGԦs%q~SO\buI Ȯ$=:y]n QASWggBl{^bӷӯE ؔ$Yn,UtK>6jJLMr /KxXeחȎ0)1ˏ kSkm;ywDWtX`G&kJ4MV$捁fN$[NַO-{_Ϊ\Ƶ!?潵Okb-hjȴ r M]S<5H~.˛cӅK^Ŝ*+Km\%;[GxbVgQbܪd7x涓?]qr~F^m_g DQ#b%wvؚ9MO4Nȍ齧qL)d$tޜ["֐㳒gF^6T?ɻqfS{y`[K6uA/N+""Dsܫd) YY?%)o`'ԁ?oVTƅyu): W5T{d/Z[W|obyBԽ_cuBӊ&3./g΋9=uSsJi͒'8x&w{lk66_~ڱ?s-7OX~9F"g996ÏNOZ"U㶙"+RU?Գ~k9NǼu,~}'5SԹJÍvū< >6ճМC~緡8|;-%/̴ܰ>/虾6G9Ϲ9Fi$rժ9OlǓX߹eTzb}A52.aE8LK"&NiϱxauY># dۣUH%=lt3wY?X;qzU%ZZT~ZdHTY׫G__zڀ*E.ע'zZ YiL |ݤ+S+TU.kFnoi20Wkh^qyV5̑ܝ =;*y)ebʇ-$ Y " ǏN=3Wl/;Uwǹ"_Mso]aE|GL^#@4y`%qc"%~z]W/t FjvziARC6&LzQe3͏S]ǖ^PLTvdj%M+^b(S_zݬ*G-&%"~@iod&z\Pɼ=-rC+0ku W=u÷G[CH[Iۤc0?" 'B[TJL2vSXIC+I{M??H@BI:6noG7@ 合c2yCByhFБ5)SżLjAI(XV 6&/))$%%aD"inn9r|r2FVVavڅp6y%M,v8ϱ%0s[in"\#҂S[SxD7O#qrR33\S&/ AQ.^0h{0 /@a.5RmD0yDW'/R8C+An,'>&.A[mj"I-O9QQZTPv6dMq(S@4!?$ L-O* F:iaax +:,( p8#DZ(L dǓ:8/ :2}{<Bf^_7ôOdlxlBB` "lyG&71OC)CU;Ba(;Óat710 `" <)*&gx#T9NSQF 5"#lH"\+`1aѓbϚSգaUǑDF$|9B5'%(F 0kõ$mk t<J # Aʛ ZucWfsDΓ GZ4Bգ3,ESe8Qh .Ń虡2i1,y1[ PưBe1b̴;(7yʐu%0¾³ R\ zC&KN NhP-Mz4B DF`m-g % TJMpJ hb9ZOU=Kv"XePHy#efe`GHФ D) a0P Ȧԣ'R̟OJ4.# d$+ "H?IkR@KޯCPgXȆ)*5X4B  _ARnbsF: 0DA]IO`|$ 5.}JUyDKQgDIgOhsr0;| I'=u")3P9$ EOSIj+HE`S(y eIV:< (%Gt iDG4xOa.n~#7ɿxm# C;G>Ԧf90ưűI΢yٹ()N03~ T8CX^ZiaDZ؎(b C ״$AP (9*85 }< L`c@Ul[#VBd'@Ʌ|@ɦ̍Cefa@!LaF䉈J 4'p%UVzo +M!p$`kDBଅĎb~2˨4Fa"gGbޖ!'{C BȠ<#"yBb|< ;9*Mvy"[bh} 3Bu1Lfx2j!;JuG'eG͠劲GE&XOg/fn<"8r9A/T?#&CyEE2VU<'*17G$]3ԙCĂ?Zȸb]#ӡ=/BW/WEAOmi7{Z4-X4#*~ O^TT2~'0?+_6<#|L͝öGFhe5y-6ԟ<ǖJqcK`l8ϱ%0s[i9sl qxBӽI(L u &)7WTX>0Hi7x&Ț.` \IТ:֯sA1c@?Bϯ0?KJ u*2*0b ?l/!ײ>f\CCr/%m DsXPg:C9? RgMuQȨ2> Damlx2V]є@Hf9 X,Oe [t伬2& ʗYز1J/I "xf "$'6 mvpptk8D-~ OvL OYW r^ ,::aH, {/݃>O6QIKj'3t&A@ဗE>E^ck1^Ht~  WxL\"$ j7## [>W 4bzIӂxPx5Jm(EAb`eqS)LO{G4zL"~xhg>J2X1HN"/9"TL2) ^MiQ(A8 $? VEw*AyChoSѐ4@DCڴnq3!"<?,#AKLlm-ğ(BI,-szkT]s6[ә_DH).;k+1ə݉͏kIE1yjV4u&C&7<=Lj^EwR7Ϥ(&ܝx*ItnԺ#\"! p)7kg΂Ԯ)RZj<>'qQPbOs&gb.Ll],(3weIdM4ۭONH:5~WԻn딏 (_ {TA@ȅaN`9=?Qnwq#rE? ~[{*w9 zO, Kү?eA¼V$OoiڊaxS~~8NZn;զNƗ _Ts `!ODkK sCJ+)V,E&KR|tOۀ\w3Wm-7h7XdO=#cVEELŲv+&sCG!}~89j_i }"Ucex uPUf3/ TPN7?r$(sR<}\x>>9S=n.3[P&RFuj^ N<'*<F[gYb?aij^GMg|ΰ#7Ey¯pr({oVȟ>ン, TK`uuG_7"+n+ ^N,6Jyd[T F=gt͙M qa- ;26~5y 6e >-հ{/*ĉ#ڿqu<:v7V D;6 kywwiCN!'>VW@Տ 'a`ůݮ_gّ_\GAn _sbǴJf!}xJ!}xJ!}xJ!}xJ!}xJ!}xJ!}xJ!}xJ!}xJ%+3z A\$[WXϧ ďo<}2C *+&%;T_^|oiih~8=^wL';M?>; ]{]܃lx!+/tiz<Q*AL'B!r%ZѽiQ3 ~TF|b2]a{տDW/--SÓ^t(@@1tmkM7z.m9]“^5V׶S؈* 9P)KEm<2Yv<]aa)~ϊ"[Aa6rSs}vgXR#; rFe/O%trohF"QRٳX a3VeOqxZagM0Cyz '<}W hnR}g(iWj;m„D7e/wo_+/Ņ:yʎI﨓+.=}s*@{Yq-Ga8<=:s7s<O@aO $; Y6pÂ8Kח[k ý`f~[lҔ?%wp{ϋZH CMlzu~kO7k):+:/aհx OфXH ;ҭ+'dz$i;Lf8Gn/YT-Ӓ`8(Ӧ.݂ m|;3?8lӘIqQǾχW ̃2c5~__gaOvi9 o,ϰUkj[jo)8d.+q˧A<>%Xsۏ%Ί)Q^ @΍qKqƍ>}UjR/]ש.ue/3 <ʘ}RGy45X gOԂnsTx[~/Y|zk~-y TRQ &SI_HBz/lYkx><~`o2FpQ2G?O QrE텛'? sY9óy,?y=`2-gPW-@xЛG@ a@p(pZ]ӽ)!X3|sdgfOoS r]uAX)?`b&'kmœ(WHi.}|VꃰR߱.rW\ ),cmpJ];+Ox^ ~r+tx:@6( v<}$joG:uoxf5~O|woِz$k) !U{G6@J7˹!ͣrכ ecoGoDCUיvo"es49m>xvǛXM@; +u/VkӢc)=/2ʰdy7s34 !׍ 0qW1Vn [,p&[629iXI3+:{Iv=f`n5Lzp<;!4>elwX0:OhyO9*q{ z][^8OAqdu~<3Ka>,s .=xLU;%@dz [˧:BQ;h (@퐊WX\#&}Hi'F.odzڣ ᜖#Dmѐj5>W#vn҉9wnljBnz'#CPhm`-=`fHZ]#wQ(cCΔ dHUs~tCw1Df'&A⽹.xa ;|^,:ZH'w9g> #$$Dko % s_sh~A(]{4[_&ujI Fh `YuhAxLjZ W}kd:O,A<*S >βgI9̦:=<3eό=MG^TFPE4Kx$I?PWM߈jwRn튤Pww<4 6Q/'u" &шm9"uxR./Itp":uL'Gʛ+oK$\3Nj^r}-xk * m.'`6*o=~!*mhsAp$U͑H v b"`n 3vdELb+Tt{p@aC[g-Z~;x<7OqYckJoX*/Uн*Υxp23I%DFMI8+е8>'چkk [Ϗ 3,J65*ʁ&29zN6v{ m6#$*h5ҏ`RQ #XMGj>>q,`@v'PJm'i 212ueƦ4aKPAJ*)2>+Zɷ4%紳(5?s<|tआE6cɧs7.źx253͍FFs'.&ճGM= J6ڠf%"#_ҤTmD;6xz}}6TGVOj(@j~fVDGtZд҉(9'7-jL+z 7ZP5™rw,m5=g #L;*wZtk'4E t>UqlULIEa IQT* k?TdwEC4o7A@_ 1Plz[Gu $:X<ɢ&mR.Ӎ8׋a|k'uU#Je:XW4I_gynafl!T,~E6KSpQɅOY/C*BL`0jn;mxׂr*}ѡ4uojHzx3OM T߱r/:U8 ŊMJQramoktf-ݩN!6vRCc'ibyሲB#2 G pƩ 7+DџlnN~wҠ9F+CPCՁ9Ak\oݶ`4x7[khhNMVO JUӸ{P ?^@!* "lEaI_{LL0P’s~y iΗ/iOl5ѦjC#+2-`SJHRJ ҽpl3MȊC_ϵ]t_լ@@%lx-RYiv fB;$Z(2"u( 5bhRۇb1Mwh x? \&]IU!ʓsiR^i\&K5ã0)vYU20PYo*> ϯC 5*4qPI`^碷Sڐpz d)*V D渡}Uotvw}:8y,?UX>gBAfC6*5xy5i 6\*h`?@.O{!u> S'AF`!sw5rPUƞu0C+4Q"kt7U;L)v{:+$B6|OCo'LĂ^AE-f|5iH%&Vm-RbJKJUe]l'gW n4) ]k\d(9j$qh1nWn-/ ç1;$NϏ-$?2Uj<ڰy}DVj5G}>% ' jEX\ Lju=vJZܩXz} g_,U7;W#&vWv %xvBg2O= {2pxd}˳jbGlJ96E|r[f|v1~h'z 7tTdnr'X5#_URjT|/OE0@;ÓE6DZ}K>jʉ h 7 N#߅i> -='Ϩ8ވ cAAV15.s %,;}}O(mw&ҩbV':G b^- /C3 =(Su+Y GzUygĽxPFJˀ71x}RswB7R8˅發(V+5s/Q{%4\ BgwEa@YfA͆[ S,^p'6*Ym(2kz<;ᓼ [Hb~`$qUnĒVbYz FK#om <b=hZlxr kG_K"h"f5;$`t7آ"K_ۯ=! \v?Iq7@AlQDSL\ƕ>L6w\'ƕ.|x@6M>>+h@MuL8}8Q\(QtBGtC%GeI_'czǰc]F>T7fF>KN_Y]kEcjRFaq_xc]  32]<}|0g 3A\ُ(|wcdg-5% .C/_!a2x^34n<1|JL6o)&v  ؒV[{{~E&TI)q+?|Vl^<'0-z8HW[Y'QfH'y he koYU ʁWQhD%I7:Փv: IP1N@_H < >Б _A%ZVRȑ#w"z\_ܝ˰ҙ7e%ՅkD7;>U^ЛWl#H5 ُ3QH(=ـQ_* <>9) şE

{ EӶgzdL* QKvK U$'^}7,$Q42t`3$ #8q?ަ)~|ֲ'N{mqxMzO09Ny$Peu|le.C7"v3 #,o;Ҏ8H""RGp~"G36I;peKqp4N *>;>uV x6|iP<t@哮TsMC!mnzٲOxR4;㨭%PiB\X0qx4LY'LH&/{ZK?\*.2Zt`c' =r`ـXzoց5Cy ątplD`(>5*M$ՅS㝲]rƳ֞4oo/zk,fdz4}Ϲy5;໖ p><촠>UKx}^x*3`~]7Z]x1(Ǧ9Hh| v޾7Čz<Bpl+:Ғ+ ǚ{uՈTp'hu%FxUvI7DD_OFnPQÙCq E*gB녟wr~ |!6P9Z!NfGv9+atg5+ dO'vтyhT=rTE?>و!Zdѱɂ31İհzʰ±<,d #]akCJko_"EOǚ2#<1TjIm{oSZ]=$W%!ӤH>c!L%ٟfͱէ\䥱败:I&݆[x[StxːFg̍0ZArtd c<ˤ$Rz!k#%\]W@,i'GN_q*YI5bƔ:|' @KƗ^?>'#?Fٳ>"t:Ɠ<[ NR>ވZv )Eh>sS (W*N`}$ќ3Qe@^IRb\1ћb*TfMFbEҥ6Rc&6K1 MƌB%oRU|sxNMގ/ZU,%g5%ޣHpܮT19ԒjфMY4J[6 ֙'<< x3h&Q>ɽ7OhHDGgu -#)I#/rkxb[8$a״Ot^gMOZ2Lyp6L5ѹ6g,yqa2xiTxBQƽ떭`Vq$mcgk'DHa[aGuZȳy$̢؉NpG5d &K3utϡ߬g`NHPx4Ĉ4!QQ# !̏:Jr%$'wlwHdހo Ert=86W-%ZB>&~4;W=\ϹÛw: *.1-/ZON܉gp,7lxC> H9VAH4紸.>;'s=L< j{^ғl4@BQCwRR\m?A&9\ B2:vEpecHޞ 'gX9b:wl4gGg0^cfdx*\t;a]N0 #?9Cu9i@y8@^<"93?'nwBr@dwZ+' jH1v ?>Nmm 9=ns ;_v.:[ Gqc_'b~幞%@]sX.Nrj}NdUy$3yMhm|=TQ4?Ceuo fi,5< Ӎ|V>ֳ0S鱫!|)܌[Xs-:$kϵ<dߦFV]eNO>Mjy%ngxDP/EMۮd8_6 m{S<|~ǬlI:;( X3'V3lմ!|==ʻ巡<"k.֌F UߘxaO#tBq0^`~ڽ hO_X %Cߚ<˳gx0cXgJougL׉=RbCկ8.$w3ɠxag7?|->kC_8G:q^?kO~g:׿Ÿ%C?niO_? B忖!#Ÿe/+OΣ3Ӈ3D*GO ޶Ro+ 7{b  ^HI n ^HIPNG  IHDREye sRGBPLTEHtHtHttttHHHHtHHtHHHtHtHHHttHtttHtHHtHttttHttttttttHHHHtttHtߜ߿ttHttHtߜ߿ߜHߜt߿tߜtߜ߿z. ~IDATx ۶iͫdKGYnSnV)ًmU$|4pBUG& gٴu݄4T|N*6BnoSVVe/{sS̺OݛK2˖O RWPEbRnalvZMqB/%`.%D:JR߿e?B),*gQBE ȇ*\|2-.wBs)a.X']5.Q SD<\kMlOՄ`3*! v7?T^*BN܈)U 2*sQ^no"B}cZTGrklY/.V?>B?=̙/ډ40nc$?ȞB4Ts"0/s`y_>Nx4 cP Sqm<"|ޮv7[{D58!SNu<~u+AWՃm22z*;!*{dnhxOnZyrfKZ Jn[7hS5>az~Ѫ~5VV~ /S422ljCH3;zZYh}vHWKɱ=˗,f/?c]S3SgN?,SͪM9J̸NI1=o`/~D"Dzuv]LGta:F D Fśy5[l׀En]▦*d:֬<k1?39yk%bjIy@cV0ܥں.L'P IHmxZBA`LiΫg xW jF7g:!kt1"b/8c ?![ؖ$X=s9(H66lA.n)nȮ@qK6 ӉL'E6m[sŻ?yU+ QmXMnFg:Q2V%cm@1` cm:0_f:hcZ-~*3Vi WM;#c9#HWqd {*V`H͡'S순W0p2Q7#%cB%=Bd2`GqX mEƌ:) `-.7:\f+Fs cR1cr%T#;MdwJsco,ǵͿ˃ksNt\W"T̘$*ci1R7=rfh 4T|,f Hf$72=E೔:2"3"m3I{U-!As׳@T(FO^~LL;glIxd,E^-'_c{/ Txd,E~ >`αP#_!+-eTBM+dM+dMLmqzLdsfo-Ѐ^xp#̂0!E4)`#  HU9H(R#3VRݷ8_.Izr$S^~rϋeqPTF;.Ȃܷ,XȰ":e U]?b*o,3`sjQRw]Tnp,T5w0k]F1XQrX:斍==\? :e lͽYATFj78$gH -1)1[?8}7緟 2ƗJ8` U"ms}@(#+Ho,t-Җ/וRq+d g hCZrsRge3?.:ebkaT_[֥ Ul@ƪmib8bzw?&-y*rկUS/։vbd}6z!> ͊4:)F׋v"{1ao{/j[E;EUTCEń`3u{d`oE;uX. vhQE;s&2ٚZ<=)IENDB`S AA@A@   DzSI-8 SI-9 SI-10 SI-11 SI-12 AC-31) Test the VPN by attempting to authenticate with the published default password for any existing built-in account. Nortel VPN gateway UN=admin PW=admin Cisco VPN 3000 Series UN=admin PW=admin Juniper - N/A (PW set at initial setup) Note: This test will require the reviewer to research ahead of time built-in accounts and default passwords for the application used by the agency, which will be identified during the PSE.Request a list of recently terminated staff. 1) Choose 2 terminated staff and verify that the terminated user's access has been terminated.,1) The test sample does not have VPN access.JVerify that any unused/expired accounts have been removed from VPN access.AC-5Verify that the VPN system enforces a separation of duties for sensitive administrator roles. There is an effective segregation of duties between the administration functions and the auditing functions of the VPN.1) Interview the VPN Administrator to identify the following: " Personnel that review and clear audit logs " Personnel that perform non-audit administration such as create, modify, and delete access control rules; VPN user access management.AC-14q1) Personnel who review and clear audit logs are separate from personnel that perform non-audit administration. .This control is not applicable to a VPN systemAU-4AU-51) Examine a sample audit log from the VPN software to determine if the audit records capture: 1) sufficient information to establish what events occurred; 2) sufficient information to establish the sources of the events; 3) a time stamp from an authoritative source.The VPN audit log captures sufficient information: 1) to establish what events occurred; 2) to show the sources of the events; 3) an authoritative time and date for example: i) the date of the system event; ii) the time of the system event; iii) the type of system event initiated; and iv) the user account, system account, service or process responsible for initiating the system event.CM-7wVerify that the organization VPN system identifies and authenticates specific devices before establishing a connection.IA-3e1) The organizational VPN system restricts access to authorized systems before authentication occurs.SI-2Verify that VPN system maintenance is in Place The VPN system is updated in a timely manner to protect against known vulnerabilities1) Interview the VPN administrator to determine if maintenance is readily available for the application and if the application is under vendor support to address security flaws. 2) Determine whether vendor supplied updates have been implemented. Note: The vendor maintenance aspect of this test does not apply to custom developed applications supported by agency personnel. This test requires the tester to research the current vendor supplied patch level.1) The VPN is currently under support (either through vendor support for COTS product, or in-house agency maintenance team), and maintenance is available to address any security flaws discovered. 2. The VPN system is current with vendor supplied updates. CM-3AC-17IA-2Verify that the VPN Client Does Not Allow Blank Passwords Security policies and procedures appropriately address ID and password management. 1) Examine the list of VPN user accounts to identify any default built-in accounts (e.g., accounts with vendor names such as Oracle or Tivoli). Nortel VPN gateway UN=admin PW=admin Cisco VPN 3000 Series UN=admin PW=admin Juniper - N/A (PW set at initial setup) Note: Built-in accounts are those that are added as part of the installation of the software. These accounts exist for many common commercial off-the-shelf (COTS) or open source components of enterprise applications (e.g., OS, web browser or database software). Verify that the VPN system enforces agency password policy of a minimum length of 8 characters in a combination of alpha and numeric or special characters.O1) The VPN provides the ability for a user to manually initiate a log out and the log out feature is reasonably accessible to the user. Note: Reasonable accessibility is defined as the user having a hyperlink or button which they can click to manually log off. 2) Idle VPN sessions are terminated off after 15 minutes of inactivity.Review remote access documentation or training material to verify that: 1) the organization establishes usage restrictions and implementation guidance for the VPN system.W1) Review the client configuration settings to verify that split tunneling is disabled.1) Split tunneling is disabled.g1) Review a sampling of VPN logs files to and verify that session creation and terminations are logged.F1) The VPN logs contain VPN session creation and termination messages.1) Review Network diagrams and interview the VPN administrator to verify that there are only a limited number of VPN access points implemented.J1) There are only a limited number of VPN access points at on the network. 1) Examine audit logs and ensure the following events at a minimum are captured: 1) All successful VPN login and logoff attempts. 2) All unsuccessful VPN login attempts. 3)The audit trail shall be protected from unauthorized access, use, deletion or modificationThe identified audit events are captured in the application logs. 1) All successful VPN login and logoff attempts. 2) All unsuccessful VPN login attempts. 3) The audit trail shall be protected from unauthorized access, use, deletion or modification1) The application provides a capability to limit the total number of VPN sessions that can be opened to the entire VPN system at the same time. 2) The application limits the number of concurrent VPN sessions that can be opened by a single user to one.bExamine the VPN configuration to determine if it provides system definable parameters for the following: 1) The total number of VPN sessions open for the entire VPN system. 2) The total number of concurrent sessions that can be opened by a single user. Note: If configuration parameters cannot be viewed, conduct manual tests for the two items above.I1) The VPN access point is located on a segmented network (such as a VPN)1) Interview the VPN administrator and review system architecture diagrams to determine if the VPN system is located on a protected network (such as a DMZ).aReviewer to indicate if the test case passed, failed, is not applicable, or in Informational . First DraftPass / Fail / N/A / InfoP1) There are documented usage restrictions and implementation guidance in place.=Interview the VPN administrator and review system documentation and configurations to determine if the VPN system is configured to check the client for the following configurations before a connection is established: 1) installed, current, and approved Antivirus solution 2) current approved system security hot fixes are applied 3) Internet Connection Sharing is disabled 4) a password protected Screen Saver set to engage after 15 minutes of inactivity is enabled 5)Verifies that a firewall is installed that blocks all other network interfaces when the VPN is engaged The VPN systems checks for the following configurations / installations before a connection is allowed by a client to the network. 1) an approved up to date antivirus is installed 2) the currently required security hot fixes are installed 3)Internet Connection sharing is disabled 4) a password protected screen saver is engaged after 15 minutes of inactivity 5) a firewall is installed and engaged to block all other network interface devices when the VPN is enabled.m1) All default built-in accounts have been removed from the VPN system or disabled if they cannot be removed.I1) All VPN default passwords have been changed from their default values.1) Test the VPN system by creating a new user < account and attempt to create a password that does not conform to agency password policy.b1) The attempt to create the password fails because it does not conform to agency password policy.`1) Test the VPN by attempting to authenticate. Observe the screen output during password entry. ^1) The password is not displayed in clear text, it is blotted by characters, i.e., asterisks. 1) Interview the VPN administrator to demonstrate passwords are encrypted before they are transmitted during authentication with FIPS 140-2 validated encryption. }1) The VPN system encrypts passwords before they are transmitted during authentication with FIPS 140-2 validated encryption. 1) Interview the VPN administrator and review VPN configurations to determine if there is a session termination after no more than15 minutes of inactivity.f1) The VPN system terminates a session if there is a period of inactivity of no more than 15 minutes.Q1) All cryptographic functions used by the VPN use FIPS 140-2 validated modules. Verify that a warning banner displayed upon connection and is in compliance with IRS requirements. This banner should require user intervention to clear. 1) Interview VPN Administrator and ask for the system documentation that states how often audit logs are reviewed. Also, determine when the last audit logs were reviewed. 2) Examine reports that demonstrate monitoring of security violations, such as unauthorized user access. 1) Test the VPN system by attempting to create a new user account with a blank password. 2) Test the VPN system by attempting to logon to the application with an existing user account, but leaving the password field blank.1) The new user account creation fails, a password is required to create an account. 2) The logon attempt fails, a password is required for identification and authentication to the application.1) Examine the list of VPN user accounts. 2) Test the VPN system by attempting to create a new user account with the same name as an existing user account. 3) Interview the VPN administrator to see if any shared accounts are used:1) All VPN system user accounts are unique, there are no duplicate user accounts. 2) The new user account creation fails. The VPN system provides a mechanism to ensure duplicate user account names are not created, e.g., using operating systems functions to manage user accounts. 3) No shared accounts are used._1) Test the VPN by connecting as a user and attempt to manually close the VPN session. If this option is not available, ask the Application Administrator to explain how this function is performed. 2) Examine system security settings or observe an idle user session to determine whether the VPN logs the user off after an elapsed period of idle time.1) The Application Administrator can provide system documentation identifying how often the auditing logs are reviewed. The auditing logs have been reviewed by security personnel within the time period identified in the system documentation.Source of the test objectiveReviewer to include any supporting evidence to confirm if the test case passed., failed on not applicable As evidence, provide the following information for the following assessment methods: 1. Interview - Name and title of the person providing information. Also provide the date when the information is provided. 2. Examination - Provide the name, title, and date of the document referenced as the evidence. Also provide section number where the pertinent information is resident within the document (if possible). 3. Test - Provide a detailed description of the output observed. Ensure all supporting evidence to verify the test case passed or failed. If the control is marked as NA, then provide appropriate justification as to why the control is considered NA.Version Release DateSummary of ChangesName Percent (%)StatusPassFailInfoNot ApplicableBlank (Not Reviewed)Total Tests Performed # of Tests-SCSEM Results DashboardTotal # Tests Available Residual RiskTest Objective Test StepsActual ResultsTest IDImpact Likelihood DescriptionPossible ThreatsAnalysisTester:Date: Location:IRS Safeguard SCSEM Legend(Identification number of SCSEM test caseNIST ID'NIST 800-53/PUB 1075 Control IdentifierObjective of test procedure.6Detailed test procedures to follow for test execution.Expected ResultsLThe expected outcome of the test step execution that would result in a Pass._The actual outcome of the test step execution, i.e., the actual configuration setting observed.Comments / Supporting EvidenceComments/Supporting EvidenceTest Case Tab: Execute the test cases and document the results to complete the IRS Safeguard Computer Security review. Reviewer is required to complete the following columns: Actual Results, Comments/Supporting Evidence. Please find more details of each column below. SourceAC-4 AC-8 AC-11 AC-17 AU-6 IA-2 IA-5 IA-6 PS-4 SA-5 SC-7 SC-10 +Verify that the VPN sessions are monitored.Verify that split tunneling is turned off. When a system is connected to the agency network through a VPN, all traffic, including public network traffic, should route through the VPN tunnel, This protects the VPN tunnel from unauthorized access from the public network References5Verify that the VPN system has a host checking facility that ensures the client meets system configuration standards before being allowed to attach to the production network. If not, the client is directed to a private zone to allow installation or configuration to meet the requirements (VPN Quarantine Zone)SC-41) Examine the VPN documentation and configuration to determine if there is a client cache cleaning utility and is it implemented.71) A client side cache cleaning utility is implemented.1) Authentication measures in addition to the userid and password are used to access the system through a VPN 2) The VPN authentication attempts, success and failure, are audited@Interview the VPN administrator to verify that: 1) authentication measures in addition to the userid and password are used to access the system through a VPN (view a VPN logon to verify multi factor authentication is used) Review the VPN authentication logs to verify that: 2)The VPN authentication attempts are audited Control IDOut-of-Scope ReasonSI-3AC-2 Verify that the VPN provides the ability to manually log off of the VPN and terminate the session. Verify that the VPN automatically terminates the session after a period on inactivity 1Verify that usage restrictions have been defined.9Verify that there are limited VPN access points employed.Verify that the VPN software produces audit records that contain sufficient information to establish what events occurred, the sources of the events, and the outcomes of the events.Verify that audit trails are periodically reviewed by security personnel. Exceptions and violations are properly analyzed and appropriate actions are taken.Verify that the VPN software adequately logs security-relevant events. VPN Security violations are identified in a timely manner.Verify that the VPN system does not contain duplicate accounts VPN users are appropriately identified and authenticated Identification and authentication is unique to each user or systemfVerify that the Number of VPN Logon Sessions is Limited Multiple log-ons are controlled and monitored|Verify that built-In Accounts Are Removed Security policies and procedures appropriately address ID and password managementVerify that default passwords have been changed Security policies and procedures appropriately address ID and password management@Verify that clear text passwords are Not Displayed During Login Verify that there is a client side cache cleaning facility to prevent unauthorized and unintended information transfer via shared system resources.bVerify that the VPN system resides on a secured subnet that is separate from the internal network.9Verify that passwords are Encrypted Prior to TransmissionFVerify that< automatic session termination applies to all VPN sessions.Verify that the agency ensures that VPN sessions employ additional security measures, such as 2-factor authentication and are audited.AC-1 AC-18 AC-19 AC-20 AT-1 AT-2 AT-3 AT-4 AU-1 AU-7 CA-1 CA-2 CA-3 CA-5 CA-6 CA-7 CM-1 CM-2 CM-5 CM-8 CP-1 CP-2 CP-3 CP-4 CP-6 CP-7 CP-8 CP-9 CP-10 IA-1 IR-1 IR-2 IR-3 IR-4 IR-5 IR-6 IR-7 MA-1 MA-2 MA-3 MA-4 MA-5 MA-6 MP-1 MP-2 MP-3 MP-4 MP-5 MP-6 PE-1 PE-2 PE-3 PE-4 PE-5 PE-6 PE-7 PE-8 PE-9 PE-10 PE-11 PE-12 PE-13 PE-14 PE-15 PE-16 PE-17 PE-18 PL-1 PL-2 PL-4 PL-5 PL-6 PS-1 PS-2 PS-3 PS-5 PS-6 PS-7 PS-8 RA-1 RA-2 RA-3 RA-5 SA-1 SA-2 SA-3 SA-4 SA-6 SA-7 SA-8 SA-9 SA-11 SC-1 SC-2 SC-12 SC-14 SC-15 SC-17 SC-18 SC-19 SC-20 SC-22 SC-23 SI-1 SI-4 SI-5 First M. Lastmonth d, yyyy - month d, yyyyCity, STAgency POC(s): Name: Telephone # Email Address(###) ###-#### x#####First.M.Last@xx.xxx NIST Control Test MethodInterview ExamineExamineTest Test Examine Interview1) Interview the VPN administrator to ascertain if there is a mechanism in place to restrict access to the VPN before establishing a connection.`Remote access VPNs using SSL protocol use the approved FIPS TLS protocol, also known as SSL 3.1.Account ManagementInformation Flow EnforcementLeast PrivilegeAccess EnforcementSystem Use Notification Remote AccessIdentification & AuthenticationAU-3Content of Audit RecordsAudit Monitoring & AnalysisMalicious Code ProtectionSeparation of DutiesAuditable EventsFlaw RemediationBoundary ProtectionRemote access via VPN uses IPSec ESP in tunnel mode or another technology that secures using FIPS 140-2 validated encryption such as AES, 3DES, SSH, or SSL. For legacy support, L2TP may be used if IPSec provides encryption.1) Interview the application administrator and review the VPN vendor documentation to determine if the VPN is using IPSec ESP in tunnel mode, or another technology that uses FIPS 140-2 validated cryptographic modules such as AES, 3DES, SSH or SSL. For legacy support, L2TP may be used if IPSec provides encryption. The National Institute of Standards and Technology s (NIST) FIPS 140-2 Vendor List is located at: http://csrc.nist.gov/cryptval/.SC-13T1) Examine the VPN configuration to determine if the version of SSL used is SSL 3.1.%1) The version of SSL used is SSL 3.1Transmission ConfidentialityVerify that VPNs are established as tunnel type VPNs that terminate outside the firewall (e.g., between the router and the firewall, or connected to an outside interface of the router). p1) Interview the VPN administrator and examine network diagrams to verify the termination point for VPN tunnels.71) VPN tunnels terminate outside the agency's firewall.Use of Validated Cryptography Control covered in the MOT SCSEMControl covered in the SDSEM,Control not selected in IRS Publication 1075Authenticator FeedbackInformation RemnanceNetwork Disconnect&Device Identification & Authentication Session Lock+IRS Publication 1075, October 2007 RevisionXDISA Network Infrastructure Security Technical Implementation Guide Version 7, Release 1AU-8AU-9CM-4CM-6NVerify the agency has implemented an account management process for the VPN. hVerify that access to the VPN is limited to individuals with a valid business purpose (least privilege).AC-61) Interview the VPN Administrator to verify documented operating procedures exist for user and system account creation, termination, and expiration. 1) Examine a list of users with VPN access and select a sample to determine the proper account authorization is in place. 2) Examine a list of recently departed personnel and verify that their VPN access was revoked or deactivated in a timely manner (e.g., less than two days).V1) The VPN Administrator can demonstrate that documented operating procedures exist. 1) The sampled accounts have the proper authorization in place in accordance with agency policy (ex. VPN access request form). 2) The list of active accounts does not contain personnel who have recently departed the agency or no longer need access.ZThe dashboard is provided to automatically calculate test results from the Test Case tab. The 'Info' status is provided for use by the reviwer during test execution to indicate more information is needed to complete the test. It is not an acceptable final test status, all test cases should be Pass, Fail or N/A at the conclusion of the review.AC-7.Control covered in the operating system SCSEMsDIRECTIONS FOR SCSEM USEmThis SCSEM is used by the IRS Office of Safeguards to evaluate compliance with IRS Publication 1075 for agencies that have implemented a Virtual Private Network (VPN) solution that is used to access systems that receive, store process or transmit Federal Tax Information (FTI) remotely from the Internet, or another non-agency network. This SCSEM does not apply if the agency utilizes a VPN, but does not use it for access to systems with FTI. Agencies should use this SCSEM to prepare for an upcoming Safeguard review, but it is also an effective tool for agencies to use as part of internal periodic security assessments or internal inspections to ensure continued compliance in the years when a Safeguard review is not scheduled. Also the agency can use the SCSEM to identify the types of policies to have in place to ensure continued compliance with IRS Publication 1075.PM-1PM-2PM-3PM-4PM-5PM-6PM-7PM-8PM-9PM-10PM-11 AC-21AU-13AU-14SA-12SA-13SA-14SC-25SC-26SC-27SC-29SC-30SC-31SC-33SC-34SI-13SC-16Number of test casesLast test case row:AU-12IA-8IR-8AConnect through the VPN and a warning banner should be displayed.HExpected Results: The warning banner is compliant with IRS guidelines and contains the following 4 elements: - the system contains US government information - users actions are monitored and audited - unauthorized use of the system is prohibited - unauthorized use of the system is subject to criminal and civil penalties Booz Allen HamiltonjNIST Special Publication 800-53, Recommended Security Controls for Federal Information Systems, Revision 3#DESCRIPTION OF SYSTEM ROLE WITH FTInProvide a narrative description of this system's role with receiving, processing, storing or transmitting FTI.Note: Remote access is defined as any access to an agency information system by a user communicating through an external network, for example: the Internet. [Updated for NIST 800-53 Rev 3 Updated for new version of Publication 1075 Dashboard updated SC-8 SC-9 Authenticator ManagementThe IRS strongly recommends agencies test all SCSEM settings in a development/test environment prior to deploying them in operational environments because in some cases a security setting may impact a system s functionality and usability. Consequently, it is important to perform testing to determine the impact on system security, functiona<Wlity, and usability. Ideally, the test system configuration should match the operational system configuration. Prior to making changes to the production system agencies should back up all critical data files on the system and if possible, make a full backup of the system to ensure it can be restored to its pre-SCSEM state if necessary. The IRS welcomes feedback and suggestions from agencies in regard to individual SCSEMs.System Hostname:Safeguard Computer Security Evaluation Matrix (SCSEM) Virtual Private Network (VPN) Security Controls Release IV July 30, 2010 Version 0.2sE |l? J6x?,L J6)F < X[\^]f&f'l0=/+eD 3!"%q'+b++!+a-IS4ccB  +<@B  dMbP?_*+%&ffffff?'ffffff?(?)?MFreedom Import Printer$C od,,LetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"d,,333333?333333?&<3U} $ } } $ }  } I} } $ +                           @  y                     w       0l*2# $ % & ' ( *  #e # $f $  %g %  &  & & & & &  ' ' ' ~ ( ( ( ~ *xxL**$|(  $ %O2 $S N Group 2Horizontal Rule"` ] ``.~vB $B >?Line 3%O]`F|B $ D)?Line 4Z 22]`F $ JA 1?IRS Logo!]N`֩  $ U Word.Document.8>@  '' yK First.M.Last@xx.xxxyK Nmailto:First.M.Last@xx.xxxyX;H,]ą'c(( yK First.M.Last@xx.xxxyK Nmailto:First.M.Last@xx.xxxyX;H,]ą'cggD  MtP  dMbP?_*+%&ffffff?'ffffff?(?)?MFreedom Import Printer$C od,,LetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"d,,333333?333333?&<3U    Q @            K  L  q  r   @0$0$0$0$$$$$$>@ "    ggD  6V \  dMbP?_*+%&ffffff?'ffffff?(?)?MFreedom Import Printer$C odXXLetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"dXX333333?333333?&<3U} $} } }  } }  J      0   E@  pY qr sP sW tOaaghi lQ+m ;PassAZ>d (D DD  B aa cR+b ;FailAZ>d (D DD  B aa eS+b ;InfoAZ>d (D DD  B aa oT*b ;N/AAZ>d (D DD  B aa cU$b?@ ;A[>d? (D DD  B aa cV# n  % jX aaa fZ# ?@  % kX aaa H  h?@  D i.@@ ;@@B@"r>SS1>@     ; ;@@B@B@B$C@Pass; ;@@B@B@B$C@Fail; ;@@B@B@B$CInfo  ; ;@@B@B@B$C@Pass; ;@@B@B@B$C@Fail; ;@@B@B@B$CInfo  ; ;@@B@B@B$C@Pass; ;@@B@B@B$C@Fail; ;@@B@B@B$CInfo  ; ;@@B@B@B$C@D  ; ;@@B@B@B$C@D{+{  {+{  {+{  {+{ {+{ {+{ {+{ {+{ {+{ {{ ;@@B@B@B$C@3[ t|{{ ;@@B@B@B$C@3[ t| Sheet2ggD   r  dMbP?_*+%%"&CIRS Safeguards Application SCSEM &C&Pof&N&?'?(?)?M \\ipp://156.80.61.26\i_A365_HP S oZXXLetterPRIV0''''T\KhC]F4TRJPHAA536406"ZXX??&U} S} I S} S} S} u} u} u} mT} I R} $R} R} $ R} R} R} mR} m"R} $ R} I-Q} $ R  I@ p P  p   0     0 x  @   @  p`  N_ N Nj N N\ N] Nn O^ N2 O` Oa N[ Ob Oc Od ]r~ {? { { y \A \D PF[ZZZZZZ\~ {@ { {C y \B \E PG[ZZZZZZ\~ {@ { {u y \ \$ \%[ZZZZZZ\~ {@ { [ y \ \ \}ZZZZZZZZ~ {@ { {v y PA `m n[ZZZZZZ\~ {@ {: {w y P PG P"[ZZZZZZ\~ {@ { {x y \ \# \3[ZZZZZZ s~ { @ { { y \ \& \'[ZZZZZZ\~ {"@ { { y \ \( \) [ZZZZZZ\~ {$@ {  | z P P P vwwwwwwP Q~ {&@ {" {! y ` ` ` [ZZZZZZ\~ {(@ {# {y y \ \B PH [ZZZZZZ\~ {*@ {& {j y \ \* P+ [ZZZZZZ\~ {,@ {  {z y P PE PF[ZZZZZZ\~ {.@ {  {z y P \C \D[ZZZZZZ\~ {0@ {v {{ y P P- P,[ZZZZZZ\~ {1@ {v {{ y P P P6[ZZZZZZ\~ {2@ {v {{ y P P P7[ZZZZZZ\~ {3@ {v {{ y P! P8 P9[ZZZZZZ\~ {4@ {6 {| y P P: P;[ZZZZZZ\~ {5@ {$ { y \ \4 \5[ZZZZZZ\~ {6@ {7 { y \ \ \}ZZZZZZZZ~ {7@ {( { y \ \/ \.[ZZZZZZ\~ {8@ (  \ \/ \0 \1[ZZZZZZ\~ {9@ {. {u y P P< P=[ZZZZZZ\~ {:@ {8 { y P P> P?[ZZZZZZ\~ {;@ {2 {+ y \) P* P@[ZZZZZZ\~ {<@ {2 {+ y \ P, P-[ZZZZZZ\~ {=@ {% [ y P P P}ZZZZZZZZ~ {>@ {9 [ y \ P P}ZZZZZZZZ~ {?@ {' [ y P P \}ZZZZZZZZDl~~~~~~~~~~~~~~~~~~~~~~~~~~~~$ ((  ( ( A??NTaudit policyPicture 1NTaudit policyP]&`@FZR ( C ]F!F d ZR ( C ]F!L d ZR ( C ]F!@L d ZR ( C ]F!L d ZR ( C ]F!L d ZR ( C ]F!@% d ZR ( C ]F!& d ZR  ( C ]F !& d ZR  ( C  ]F !' d ZR  ( C  ]F !@( d ZR  ( C  ]F !) d ZR  ( C  ]F !) d ZR ( C  ]F!* d ZR ( C  ]F!@+ d ZR ( C ]F!, d ZR ( C ]F!, d >@dZ,, A  &;@Fail;N/A;Info{+{{+{{+{y  Input Error5Please enter an accepted value: Pass, Fail, N/A, InfoPassFailN/AInfoN Sheet3gg_T  $5}Ų  dMbP?_*+%&?'?(?)?MFreedom Import Printer$C odXXLetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"dXX??&U} $ } 8        3  3  3  3  3 X 5 I J  4 4 3 3 3 Y 5 Z 5      3 =  >   3  3  3  3  3  3  3  3  3 ? 3  3 @ 3Dl !"#$%&'()*+,-./0123456789:;<=>?  3 ! !3 " "3 # #5 $ $3 % %5 & &3 ' '4 ( (4 ) )5 * *5 + +3 ,k ,5 - -4 . .4 / /4 0 04 1 14 2 24 3 34 4l 43 5 53 6 63 7 73 8 83 9 93 : :5 ; ;4 < <4 = =4 > >4 ? ?4Dl@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_ @ @4 A A4 B B5 C C5 D D5 E E5 F F5 G G5 H H4 I I4 J J4 K K4 L L4 M M4 N N4 O O4 P P4 Q Q4 R R5 S S3 T T3 U U3 V V5 W W3 XM X5 YV Y5 ZW Z5 [N [3 \O \5 ]P ]4 ^Q ^5 _R _5Dl`abcdefghijklmnopqrstuvwxyz{|}~ `S `5 aT a5 bU b5 c c4 d d4 e e4 f} f4 g g4 h h4 i i4 j j4 k k3 l l3 m m3 n n3 o o3 p p q[ q5 r\ r5 s] s5 t t3 u u3 v v3 w~ w3 x x3 y y3 z z3 { {4 | |3 } }3 ~ ~5  3Dl g 5 3  3  3   5  5   ^ 5 _ 5 ` 5 a 5 b 5 c 5 d 5 e 5  3  5  5  4 f 5  3  3 5  36>@A  }}8(;@J In Progress  B~~~~8(;@J In Progress  B8(;@J In Progress  B 8(;@J In Progress  B 8(;@J In Progress  B 8(;@J In Progress  B8(;@J In Progress  B{+{} {+{~~{+{{+{{+{{+{{+{ Sheet4ggD  JT  dMbP?_*+%&?'?(?)?MFreedom Import Printer$C odXXLetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"dXX??&U} I_  p ; <x   >@  Sheet6ggD   )  dMbP?_*+%%"&CIRS Safeguards Application SCSEM &C&Pof&N&?'?(?)?MFreedom Import Printer$C odXXLetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"8XX??&U} E} mM} 1D} m}D} D} mE} D} &F} ID} IG} AD} D} $ D ,X@X@@,J,@@,@ , , ,   h  s HIIID _ Ci_ Bj Ck D_ Ut ^IDD \ ClDD ] CmD D n  Co D ^  Cp 2  K0 q  LJ0&4:::&&>@FLJ J       Sheet7ggD  /  dMbP?_*+%&#&CIRS Safeguards Application SCSEM &C&Pof&N&?'?(?)?MFreedom Import Printer$C odXXLetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"dXX??&U} m } $}       VK VL VM VNW$@X@ Y1 Wo4@@ t WoWXYWWWYWWWYWWWYWWWYWWWY WWYW WWYW WWYW WWYW WWYWWWYWWWYWWWYWWWYW(T822>@WRA   Sheet8ggD P 8Safeguard Computer Security Evaluation Matrix (SCSEM) IRSJonathan Isner@W }@@exu@ߜ7՜.+,D՜.+,\HP X`hp x  CoverPurpose Dashboard Test CasesOut oDocumentSummaryInformation8CompObjrf Scope ControlsSourcesLegend Change Log  WorksheetsP(X`D _PID_HLINKS_NewReviewCycleA kHmailto:First.M.Last@xx.xxxkHmailto:First.M.Last@xx.xxx F&Microsoft Office Excel 2003 WorksheetBiff8Excel.Sheet.89q