ࡱ> 9:;<=x  !#$%&'()*+,-./012345678?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry F`E2IWorkbook BMBD00050015  F 7 7Ole = !-F!cover!Object 1  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89qOh+'0  4 @ L Xdlt|Christian, Michele  Normal.dotmChristian, Michele Data 81Table",CompObjyOlePres000>\8DdO zp<  C Ab48{ߌ[4yͰL8Dn8{ߌ[4yͰLPNG  IHDRO:EgAMA pHYs12N– IDATx}8e}{p#0rCG`9&r"D3KPxg`EF.oϼX̋ϼX̋ϼX̋ϼX̋ϼX̋ϼX̋0+놡y8ck+Sx脰:D[Q/[??HPTI5o HuoD1ճC ]^Qhz|`VOOay Z8n#ʬCR6RJUoZ篟tXܳCPZNa~FET5ېbns#n[.ZW>w9 |[FV,:xۧ/{k>qvD h"СP))F #ƟS)!GĎjJ3+Dbm5Ĕn~CZLCa#`m魜;?kWOV!Jm UKaܣj\$܄=O9FV"kTגyn- jVw!:j<ݜwAxND(ySzYKz>pRN=XT*QU/{o+T&iJ6YK~=H'?0Ou7-峭+5GdA:Vc&~E|OJӒ*X@UNHtc>Z󋄆4OgҨz/'~BQ1| .3SZ$N588l ՃbjU4&٢x/1fç#N-olKu!,O[\g(yϨh:\4{5q=~)|*Xpu0zc7C6Jg5}9AFtFqr74՚ d4ϣnVH A? 'bq„c|sB&IPݝ6m}궕i#:'PfC.4NUc31Zoj!4Oqf3]o"eLt W<'aM(>e5v M:_Y*y]Ɓ ďg%u =ԖIWqBYm]Gn 4<rф 傼;+ZܞQ |V^kɶ=KL)9#bчMBHdG tSs 6( W<ϖO3qͧTʴ[K` k߂cd ؑ/\^芊 >1_OO, λX%Z뤿6@qNgϗI3<=Α}M:skfwvA[" %cŖ=yTwt|P @Y9[jO==E /`1{zX Uѫc5qVxͤe+WbJkAmؗHv&5vmԜ0?0`OwjtkᾛMX;>_*I|p۫7QǢr&C"[m%Ls h6>%k^n{;8c,z'F3{?ͲQ{@?YM|R5\טT}dufx ]"H!' C~H)ӘDVi})"OҼFZL0+IO1&f>}OXwMZѺJnrtw2@v&O7>z?l3bS]';q:MyT'fEmS ű+HZOn,Fa `D7·(-$T*&󟟢ܣX^$Q;_MuKé(Uֆ1uCs1XGb6(kg3h١Rq"3n논%SRbKO,Ts~f~90C`QɨĬlYkTsL,'˼k N ۽ [rLc(>-ZA )ҟFJAt~O[~O)gA{'maQ aB3r#Sq#rО5$Pb=6 ՅZvѺEfD+1EѾDT $wV{cDyhK֚&{)t }5 EyTV\vj.AsTr ;21Vm|hY%!#n>q^: nI {N4}&8Zܚ6HȖ܊)*# zc۶7o= 1z E@l>}= ׌7EBe¦cБ~P {9dkwe5-|dBͫ7EQm]eU0kl\% ~߳zlLrGݠ5fq~Ê Mb஁՚;vpl_3N( a5LfH>&Qb0'=fbLO&߃uY+XPEDJW]3LLL UJ oYs_M'6($>LYcR31[mU %G9L'0.Xָ*vKZ߫Z?NFD>}2 >wV _U 7Q <\YhNh1U=H' x?BkS|blyjrrDTP,8pCwqm?dο"B_WeP]ڀk{e'bf0ݑ]'إ)ԮZg:ħ0nY-ˍ :*1稝 RjVWAN$(VT@W&iP?|opOj=@Z=Nx>;&=VSj'4 &*NwCvό5\4c=:_8~T`w Ci??ҍ}mkP3ZGuxkТ-q K@ $Gۖ [ѐZJدqЀau|'eM_͉v*l' xZ3NX:D2m΂-Dzwk1@t_xUڏ|G-U~lLKوĞڱeJ? /v|v܈k,'|`Lqu`a0QT'{KE!S$,kض'8NՀ88dRdy:7pbmd?uPs7a,zh4@2,|u m16j=yסhg9Ms5'.)lp*,Gxst% UgBu 3ggwhxy׃$Ӏ._)$/]uQI͟ἧ&O:@9T'>t~m 4~@sTodZ揥&"_ [$)(zuOoyqS]n?ħyx++W"%EUO{/`,P'^qbN -=8R/]uF<'PkViHguDvTq=4~9 E[:=S{uCrN2o3CU%^MtKs^çyG-VK26۲uYwg3ЀRuJnى| +ZL'm)D9,,ϧw։MɓnS.!#1N)rt#|nDX~ұDx:} hG"8DD5׀AOI` C*T ^NԢ#qoWD^Km^NJϩ 4FŖBӳ٦hz4y.4yҝ4dIB,^N,il xs EbD CFLE[% aQNƏ*żgQ% *k<s&Tq~)qgK#X nX|L )4tsl(%9y3ڏ|ڑhzKn%g|S&)\>נo@3([W`ЎD_$ WQ`-Ml[C *\Dn ^0Cxj}A-.O5Af7JhtY?`Z|?}H$=E[]g?N><$*hnY !*2S>||Ͼ"ey?\ꋆCXAE)qO_EP=)N r ڱWoK]>,g䓿rwo?ۏU\2!QAp4._~0HhSBY2@"XbjZãuE+N;{b7Oy ۥ1{i3;irMCPq?wf|`*gBQ mGCvEǡ2CD:Sqxtd?r/J,P'O0[߻la<о@cH'i0o1h篟~ 7c=KY}H9PQq| ? /ЮwTdml&=ʒè ,3 Yf*s}73lǜJ<[y|OOm:*KD؃0 >g/CMrwDESt,|&sonu!]{yCDP`;4}toS^OwG/1Յ3٧*N.@~Hnl|mI}E5I 3$LNW`UXBowN?vNLDw|.ݪ8J:*Vn_1 a7 ?A)wk*B6sX.tpיhbЏADgO[Q?{l5LQ<76ٍ$UolFLs )9i"p ]msPw'6/l6j;Bňj kƶhԽ3 X}RWv]Nat;΅bPWU9s5z8%w_DDGݓD:Jܡr̷Đ}`Dh._G.E>IF.b=b#>Cͥ'1]sWO?9:L $(qTO97h*h0SJAV\:Dh=ΰk^ZK4N4SoNNZX>! []'*R힓]0*OPqy{K/IT[g ."Onn|ul}^-a"4byrab/<^)Pt7nF`e"Rص d5t[2~DNlRӇ˥a>SAۿK#sU?=x7ǽ ḀG~uZ.w鞖1EL\/\f<Ѯ04ԺzzOgٮ1i{u^,WF]\85PEB9bYiӶ5l]a~Im9e%dDŽ!`bKewKtRoO+VO2.e OO?|e|Sx|$+cֹB}ҙS=Rx#Xc%K|B{C 7cԟ}@TX@bn"ˋZvQe(b^œi[}nKA,8R⪞GKj#Lz67 fPS=C# vQ7+wB&o\~l좢E} ٠Ds`/'ב4Qr)qik )e-1B\ϯǓ2|cx{%F9!s9Y¥r1<)\[NS΂ߏkat~\D/#.0mbp<((v`hĊ/]㾼fUxL,۹h-Dq|.&\ARfj\lzxbՉWxY>vH5+ a.2_~kF &_'4 <螦oUlFwIEEяⰫ3އ"x !I[= ߸N|gdd9s& McbTrC13u)\qy)`f/2&A-0Kt O%wV3>>"s":Y#ɟ~t N)3*#5Vi ĶޘUx煱;Ձpn_³mw<*҆SxyfM:O' .mj r>ҋ"n*NT4pN c \)1 {on^ WXdrqޑy0]{tVgź? *xntlo:p;Fݱ&-WJ]0\OXg>.)8u;":y۱=ǐ淖}/ѳ"p+e:&s&gNg<8fe[M蚧}xV8q$,;<?wvG8$g}-y;,*=Qxu`w*ޟ쿽p:^cWqxd]YbPT怚wRfE"za0Z1јa4U{IMхBI*PEq,.bPlvLMZzm;Q|FJL#qL wbKzo6\#|3g/FcF3VUxd1dy #UB|q|F,~`C5>fG11]˞#y=~hauucX!-q|ڻ >=':B~[h*NV|=Mɧ92Y (E* vfx %ߵ $+lgoaBgڍ18M@Ty-q =k ;p1N/JPIeUKrk /PPG" XE7@ ?)8֋(|& <]_EmE#æV\lވbSM/2( d|izy8 yeo'+-kF3X@iK;-^(۽#m6yܔO"7?T,G/QdōLꚃlcL˰ |F3P6"|>Zё.(#§1Ѫ)ħ1Ƿɵوth1ُ)ɱ?<>JA<+ ?t/d CWOC#+y+y+y+y+y+y+y+y+y+y+y+y+yWQ~?|q^R2j^%"Eh嘫g^|g^|g^|g^|g^|g>$pxW.>w@YoJѝSqzx:tn4W%sW䡽F1kymЉO2g?Y3:̤&bstU] |b`,Vl k& W(|2\i|\}1ɸK^9(vS>B |9 >7ç6NcBB"|Xgx>8.45ǧp| [Qj{cюefu ;)X&~Jȧ5'| Ơ#2C AT.gӷtⳋsN pCvm>x~l bj; T^x[T?\MԭӦ̾1=qYP)<< еl=P<a x; ӼO(I}@޹? c%T.% 缟pk%c藹}gy/^%+y+y+y+y+y+y+y+y~a/9\~+Gݝ?eY׷[b9Plz}qUyڿeƵѷ]b6 q'9ϏC! ryAo,㣇[xw"xse e; <qxψ> (U)s Otnx B=/bIrvtllO(L@G q)cڹ 5*>U洡P}ጟ欙S7e;¿?O(戾vİjہ񁣧95?ϰҾǑ>ֲ%p?DֱЯ|.1E!=~A 8nag(33}8^\QRs ]0v1Cٜ&ǁxS32{GTGܘ98\*>E@8;BJ`aIF|윟|wԗBg>k1#!CNRh}a'Q}ȪQսbNg~iRQ4Es>/l?xjc1G^2Qsɱ&O'x2E祊tTЊlOT` T,Ŷ%LF2ٲLML\zjhb zyJ,|" Bj9swF|w0oJs\HTTÁ~k-ՎHL>!?yY+$)Y:zoD V_>|c+@283c\R1o 9f+< l?vJ=Y-a42v$r1v#|Εs;Ͻw\n; oR|МL 2p\_)`l8[0DǜJ>-l*ĩ릿o2KVڶmaI_4 }{0 |Zk<|{@6y07MNу՘;6`1|.|B;D:9*Őz ^"L=F#Pv ˻5} O#?tg4 $|x p{y,eԍ&.,kMi뺞/5oHyvZu#ԣ1[Ɛ9oOLE+ޜ p0OBěRyvh ٵ_r*6'\'쌹'MeQ0OVog=U(T1izg墈4+ܴiE(n[9ZAZ|idE_UQ dԇp C)us iC.*9Kt|2n Ԏ^?7cP ͐ + uL ZIl/ٿD{% ȜTeN|}NIka l?L';y$*||FeuP-;v;{Rwfoyy`[? wzPGDw)A_o$Er>s´"0<< U۾A5?'~@ѿ?) e痺:P8;_(IPLm9-/9">^wɩmf:iCe=>BHg6a!*2GJ`B)sᳱcli/soȑͧʣؚ l)?m f#TL=scb>[=lCc[~>LafOTA?Uk3wNa1kf=2l˃( d>_jSb Pħ_myݧ>Kh.#*MNPħC{꽏GE/!O^në  6ё-u/ G'YŻ'|1ERYU؟xL"&i1ULdiqqY`t陓4>#v5A>ɠR|2lOv,ϲp@?HVr&2Hj-//ozĩϕ=Uy[g# E%,~o8+U;N.|ڽa?oϼk=983Ec"ZO#f{DHJY&RO;u0XB/v6v09ASigz{$s |q3HH`oӼf>sHeWdB߷SqTZ~O7xkhvuB)E(Z}UaRw}~؃W\5Ƙ 8;[w"GɊ_M_1`Fxw[7+}Θ1'սi GHSʍ{`;EČ/O8G fJt#A~y$ݏPp~t4y GzDϴπ06666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH N`N Normal,ndhCJOJQJ_HmH sH tH " pHeading 1,1 ghost,g,Ghost,ghost,g ,1ghost,Ghost +,h1,Chapter Number,Divider Page Text,og,Heading,Ghos,g1,Graphic @&CJ*2* Heading 2,2 headline,h,headline,h2,h headline,Heading 11,heading 1,H2,heading 2,Heading 12,oh,Header1,Heading 121,h g2,Heading 1211,Heading 12111,2 hheadline,01 Headline,Heading 13,Heading 121111,Heading 1211111,Heading 12111111,2 headline1,2 headline2@& #@5;020 Heading 3,3 bullet,b,2,bullet,SECOND,Bullet,Second,4 bullet,h3,BLANK2,B1,b1,blank1,3 dbullet,ob,bbullet,3 gbullet,dot,second,3bullet,Bulle,bdullet,heading 3,Bullet 1,3 dd,3 cb,3 Ggbullet,02 Bullet,bul,B,Heading 21,3 bbullet,Heading 211,3 bulle,h 2,Dot#F@&]#^F``B` Heading 4,4 dash,d,38[@&]8^[`nRn Heading 5,5 sub-bullet,sb,4[~@&][^~`fbf Heading 6,sub-dash,sd,5p @&]p^ `FF  Heading 7$$@&a$ CJ$OJQJNN  Heading 8$$x@&]a$5CJDA D Default Paragraph FontViV 0 Table Normal :V 44 la (k ( 0No List JJ center bold,cbo$dha$5@@ center plain,cp$a$bb col text,9 col text,ctdPP @CJ.". |col bullet,cb,Center Bold,col bulletcsb,u,cbbullet,C2 Col Bullet,cb 10pt,col bullet1,cb1,c,Center Bcbold,6 chart,Chart,chart @E^`EN!2N col dash,cd k@^`JBJ col heading,8 col heading,ch,Col Heading,8 col heading,8colheading,9 col heading,e,ColHead,C1 col heading,8colheading,C0 Col Heading$dPPa$ 5;CJZ!RZ col sub-bullet,csb ^`LQbL col sub-dash,csd^`FArF col sub-heading,csh;BB first,f,1#^#`CJ> > Footerd P2CJJ&J Footnote Reference6CJEHH*TT  Footnote Texthd^h`6CJPP footnote,fnhd^h`6CJLL harvey ball$a$ CJOJQJ>> Headerd P2CJBB note,no#^#`6CJRR numbered text,nt #^#`5;NN oversized graphic!]^@"@ paragraph,p"#d`#T2T source,so # ud^`u6CJ>B> step,st$8^8`5<!R< sub-heading,sh%;FbF table title&$da$5CJZ!Z trailer,7 trailer,t'x#$2/..).  Page NumberJJ TitlePageBottom)$da$CJXTX  Block Text*$yC]y^Ca$5;CJ$OJQJJJ File Name in Footer CJOJQJ^^ facing page #,fp,&@#$2/.5CJPK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] " 8@0(  B S  ? #2  hh^h`OJQJo(#2 n @@UnknownG* Times New Roman5Symbol3. * ArialABook AntiquaY Harvey BallsCourier New;WingdingsA BCambria Math@ "1hJK#fiK&,cY0dS2HX $P n2!xxChristian, Michele Christian, Michele        !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~\ FT&" WMFC l EMF \KhC   % %   Rp@"CalibriHRO`2H@,$O`2H@ o.1@H <:o.1 ,%7.{ @Calibr ŗ`2s:Lt9'1z%1<:dv% % % !F(GDIC!b K  QOPl0 (Oppp@@@000 PPP```C k                                  H       "             [           &" WMFC m            8          ^                5   2                #    h                                          &" WMFC M                            &" WMFC -                                                                &" WMFC                                                                                                                                         &" WMFC                                               &" WMFC                                                                       &" WMFC                                                                                                                                                                           &" WMFC                                                                      &" WMFC m    &" WMFC M                                                          &" WMFC -                                                                                                           &" WMFC                                                                                                               &" WMFC                                                                                                    &" WMFC                                                                                                             &" WMFC                                                                                                 &" WMFC                                                                                                                             &" WMFC m                                                                                                              &" WMFC M                                                                                                                  &" WMFC -                                                                                                   &" WMFC                                                    & WMFC " FGDIC" % % % TTAEALP % %   n."System-- @"Calibri---,n,TA Op(Oppp@@@000 PPP```C k                                  H       "             [                       8          ^                5   2                #    h                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         ''--- 2 pn --NANIWordDocument SummaryInformation( DocumentSummaryInformation8 ,SummaryInformation(  bjbj΀ 0 $$$$$$$$8!% -% $'9%9%9%9%9%&&&'')')')')')')'^),v)'$&&&&&)'$$9%9%>'f&f&f&&$9%$9%''T) f&&''f&f&&&9%q=4$&R&'T'0'&v,f&v,&v,$&$&&f&&&&&&)')'f&&&&'&&&&v,&&&&&&&&& #:         h hjh U    dgd  .:p n) =!"#$% 44Microsoft Office Word@ʗ1@KhM@FJ@(Z4՜.+,0 hp  BOOZ-ALLEN & HAMILTON  TitleOh+'0H      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwyz{|}~ \p Andrew Westner Ba=  ThisWorkbook=Yx1,>1>1>111<Calibri1>Calibri1?Calibri14Calibri14Calibri1 Calibri1 Calibri1Calibri1Calibri1 Calibri1Tahoma"$"#,##0_);\("$"#,##0\)!"$"#,##0_);[Red]\("$"#,##0\)""$"#,##0.00_);\("$"#,##0.00\)'""$"#,##0.00_);[Red]\("$"#,##0.00\)7*2_("$"* #,##0_);_("$"* \(#,##0\);_("$"* "-"_);_(@_).))_(* #,##0_);_(* \(#,##0\);_(* "-"_);_(@_)?,:_("$"* #,##0.00_);_("$"* \(#,##0.00\);_("$"* "-"??_);_(@_)6+1_(* #,##0.00_);_(* \(#,##0.00\);_(* "-"??_);_(@_) 0.0%                                        -  -  -  -  -  -  -  -  -  -  -  -  #  '   ) ff + ) , * + "   P  P ! !  %   ( ` $         &    , a *  x@ @   x@ @    h  "x  x   x  )x  !x  x  Zx@ @   |@ @   x@ @   *x   x@ @   1 |@ @   x  1 |@ @  *x   " *x  "x@ @    (@ @    ,@ @   (8@ @   p  8@ @   <@ @  8@ @   p@ @ 8  p8  x8 )x8  p@ @   p  t  x )p  x@ @       x@ @   h@ @     x""@ @ 8  p""@ @   t""@ @   x""@ @ 1  x""@ @  *x""@ @ 8 *p""@ @  "x@ @   @ @   `@ @   `@ @   (@ @   @ @   @ @   x@ @   p@ @   x@ @   x  x@ @   p@ @   p@ @   x@ @   x@ @   x@ @   x *x  h@ @   H  x@ @  0@ @  x@ @   h@ @  Q  `@ @ 7  `@ @ 7  `@ @ 7 (x@ @   |@ @  |@ @   <@ @  |@ @  |@ @   |@ @  |@ @  |@ @   <@ @  "4 *pUU@ @   p@ @   x@ @   x@ @    @        *X "X  (  "x@ @   "x@ @   "x@ @  (8@ @  (8@ @  (8@ @  8@ @  8@ @  8@ @  8@ @  8 8@ @  8@ @  8@ @  8@ @  "x"  "x"@  "x "@  x"@ @   x"@ @   x "@ @   x@ @   x@ @  "x  )x  !x ||ww}(}h00\);_(*}P}i00\);_(*_)?_);_(  }d}j00\);_(*_)?_);_(   }(}k00\);_(*}P}m00\);_(* _)?_);_(  }(}q2300\);_(*}<}u 00\);_(*_)?_);_(}(}w00\);_(*}(}x00\);_(*}(}z00\);_(*}(}{00\);_(*}(}|00\);_(*}(}}00\);_(*}(}~00\);_(*}(}00\);_(*}(}00\);_(*}(}00\);_(*}(}00\);_(*}(}00\);_(*}(}00\);_(*}(}00\);_(*}(}00\);_(*}(}00\);_(*}(}00\);_(*}(}00\);_(*}(}00\);_(*}(}00\);_(*}(}400\);_(*}(}400\);_(*}(}400\);_(*}(}00\);_(*}(}00\);_(*}(}00\);_(*}(}00\);_(*}d}00\);_(*_)?_);_(   }(}00\);_(*}(}00\);_(*}(}00\);_(*}<} 00\);_(*_)?_);_(}<} 00\);_(*_)?_);_(}(}00\);_(*}(}00\);_(*}(}00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}(} p00\);_(*}d}00\);_(*_)?_);_(  }P}00\);_(*_)?_);_( }d}00\);_(*_)?_);_(  }-}? 00\);_(*}A}1 00\);_(*;_(}A}2 00\);_(*?;_(}A}3 00\);_(*23;_(}-}4 00\);_(*}A}0 a00\);_(*;_(}A}( 00\);_(*;_(}A}8 e00\);_(*;_(}}6 ??v00\);_(*̙;_(   }}= ???00\);_(*;_(??? ??? ??? ???}}) }00\);_(*;_(   }A}7 }00\);_(*;_(}}* 00\);_(*;_(??? ??? ??? ???}-}A 00\);_(*}x}<00\);_(*;_(??? ??? ???}-}/ 00\);_(*}U}@ 00\);_(*;_( }A}" 00\);_(*;_(}A} 00\);_(*ef;_(}A} 00\);_(*L;_(}A} 00\);_(*23;_(}A}# 00\);_(*;_(}A} 00\);_(*ef;_(}A} 00\);_(*L;_(}A} 00\);_(*23;_(}A}$ 00\);_(*;_(}A} 00\);_(*ef;_(}A} 00\);_(*L;_(}A} 00\);_(*23;_(}A}% 00\);_(*;_(}A} 00\);_(*ef;_(}A} 00\);_(*L;_(}A} 00\);_(*23;_(}A}& 00\);_(*;_(}A} 00\);_(*ef;_(}A} 00\);_(*L;_(}A}  00\);_(*23;_(}A}' 00\);_(* ;_(}A} 00\);_(*ef ;_(}A} 00\);_(*L ;_(}A}! 00\);_(*23 ;_(3 + !3   !3 2 ! +   23 + !3   !3 2 !3 + !3   !3 2 !3 + !3   !3 2 ! 20% - Accent1M 20% - Accent1 ef % 20% - Accent2M" 20% - Accent2 ef % 20% - Accent3M& 20% - Accent3 ef % 20% - Accent4M* 20% - Accent4 ef % 20% - Accent5M. 20% - Accent5 ef % 20% - Accent6M2 20% - Accent6  ef % 40% - Accent1M 40% - Accent1 L % 40% - Accent2M# 40% - Accent2 L湸 % 40% - Accent3M' 40% - Accent3 L % 40% - Accent4M+ 40% - Accent4 L % 40% - Accent5M/ 40% - Accent5 L % 40% - Accent6M3 40% - Accent6  Lմ % 60% - Accent1M 60% - Accent1 23 % 60% - Accent2M$ 60% - Accent2 23ٗ % 60% - Accent3M( 60% - Accent3 23֚ % 60% - Accent4M, 60% - Accent4 23 % 60% - Accent5M0 60% - Accent5 23 %! 60% - Accent6M4 60% - Accent6  23 % "Accent1AAccent1 O % #Accent2A!Accent2 PM % $Accent3A%Accent3 Y % %Accent4A)Accent4 d % &Accent5A-Accent5 K % 'Accent6A1Accent6  F %(Bad9Bad  %) Calculation Calculation  }% * Check Cell Check Cell  %????????? ???+ Comma,( Comma [0]-&Currency.. Currency [0]/Explanatory TextG5Explanatory Text % 0Good;Good  a%1 Heading 1G Heading 1 I}%O2 Heading 2G Heading 2 I}%?3 Heading 3G Heading 3 I}%234 Heading 49 Heading 4 I}%5( Hyperlink 6InputuInput ̙ ??v% 7 Linked CellK Linked Cell }% 8NeutralANeutral  e%"Normal 9Normal 2: Normal 2 2; Normal_Sheet3 <Noteb Note   =OutputwOutput  ???%????????? ???>$Percent ?Title1Title I}% @TotalMTotal %OOA Warning Text? Warning Text %XTableStyleMedium9PivotStyleLight168=,=,̙̙3f3fff3f3f33333f33333\O8 M@'J:C  Eric Hodge - Personal View` :CoverLPurpose!U Dashboard.g Test CasesڞOut of Scope ControlsSources#Legend Change Log!  ;0 _xlfn.IFERROR  ;  ;J0 Z_E4E481EA_20CB_4D8F_9AC2_40274A3AD9C0_.wvu.Cols;J0 Z_E4E481EA_20CB_4D8F_9AC2_40274A3AD9C0_.wvu.Cols; P6 Z_E4E481EA_20CB_4D8F_9AC2_40274A3AD9C0_.wvu.FilterData;O5 Z_E4E481EA_20CB_4D8F_9AC2_40274A3AD9C0_.wvu.PrintArea;Q7 Z_E4E481EA_20CB_4D8F_9AC2_40274A3AD9C0_.wvu.PrintTitles; X`( /"n-L'Š!6@=n-L'Š!6 ]xxuP[np+NB)RHqNhqC (5H79;ss˞53 #$!B  a95y {H"/}m>f>JleP 0 %$a LгPN'OО OR#RГ5z<]dhȨ(ȨȀ?$"O!3π&נ i|!;ľ~ #O!L_bfiV?uxM=)Tst,!@j,^ @So?$|1OkxII@Oژ4TS,ZC]qeD|G(T)5).*= c9+WkuRX_P=?H_"wC*`&+@(nVV?5}Q{YڼQJ(kqUp:HwI$ Y6 S1gj3+|pO}W xK#.rqH\n* Ip}b'0X PX^qNg&'1Oz^WEj>.6yuɼ{e_@}j| U|QCKeZQ1pM]]( FY/w$թN ǼV70Me/ಥKLMkV#2i^V}jbpGR"p Ҕ;92Py"@0ne;Sq#XlXf"ޗ;-& x7mt| SmL% M._z6WT֑MM/odjQԕhA3ؖe\L6gbbm'Ra+b¿'"Zj0u>_mI`s./.%O|^/&8;ğq4sM޾څ ρo8Զ](bGKIaY, ][AnҬJKy_PcdDŔ8\G/@)?2d#;B륽Eyh5/]%QڔS觍 @-Y'K]Xl捙j-/?xŸ4Ϭ,nlp` $۰?k&Y̨V Bԏs&7t:^2E+8 <m":vKT#|M>޻,$Z1Uza $iET+\#27Uof^`裷B2 #|./Bu~6 Q PYe['4'&vcbvPBJJ> ',gF`73Ȓ.K1{]D6̬>Qj"TnvS^GRƌ8,!9b>7cNitA_q% I+>頹bbݳrXTf%M]ļ~˾ݏ W43JK<*?%^6[ +EH:f*"Oz^ֻa-ߞ 7 w@D~GBͅrW({{34&0PZVOQ jC" X'@JgCd,O 4WhBt;yb^f0OciЉ%FBpѺ+Lј%R 8ݻ#GyB}l{|~\h΂W$% AZ鱄KD&{;3Y:V$ޏ7a(!"s6hy~ m]0)V̲L:]@6"{D,dH/6Ƙ ,eԩpa7:DHi*;^{!GΒaS^$?IoUAyo `/G]|"Ff} ]PU3XWQqJ9=9K9̉,oRv\o Qp7t\*{0-Wu8Ytb;އ,cʥkGjp/g pdydݤ^Np7!oI oJ7n_ڢaZ W0Jq >|ǃS2mQ L[@<3u@L0LuȱY%}fH@O{v:xnd?Ug'%Ư; uNc}nLR#zo~#SʞiΒ7?2c79L_nn|+-33 :İgg|cqHeQrhe{jbX 3qH0^A9`}e`B˛FpVnt߂ߑp҂]ׇ1L@uVWw*5wL~|нA61oRLqW ma XVu]SX*H YmKf-8p*g&{|g֊ M 6M?Xcj PXȺZa|5f@CH6BoCuVUue2h4a0dέv*[ڛQsT c,yڌt*7X"BUx\S-*wF+5Fihgoq:ɿ{饗uS° l5DLNh mE[^hbC?X|̮LfdqAi-kFL8KC]vDUinmiֶGac4LW"2?dd;WZXwxMfKT[`0lR Ey I_ .ةcI9^ >ER}E>4G JYӣ3pMQX<,4eۃ~ VbuITzڟضGFi1X^2UQQ8~N1$Y[B: ̼pe&?vK KČPtv8iF)xxōs9^Qi,K!ْP̼7] ^fhO4g+GU=-ۈo$x+U44@DCߐW^kv(Tqļo%߷x.'J^^ 8>AME }R*bA{=w8V!l 3բdC=srM z6lv̜vӳMr63hv()+IR~WS5XiFcZL^G}'tXu@|G!S s$ v/_qA ŋ+(Ը;o>-O m $бՔ}:Ni0JN5ȂC{a3AV3̱A$K )wTJ1k@;+#@dt"0/wҬXAmn:TdϬ;C^|'M@;|"\M)$(ЯC|_gϲIO85޹X/2<{-&ԭumVҿ!*WEE%S5,"0*]A#g,B*G{TBsO^"J=Au t7/O-]ŭ*eR9gVՈk7xx = S.hW+W)?۔iy(;Ep^ATVٻdτ991 epIE‘TLJ BL[zް|z7Z-c1)j ul@ 1`NvśPV@hRV#9pb&h\ n ÑCPxS.J}}I_ݸʖ" ?M~0Czu7v, ޜZW_rqq{<[(PH\sUKR/C: =e5G;'wR5zj1*LfP>Z,gR>m>w(#p#oF#l71t..6*yda L#cQ%KQvw[ d@aD|I7re>Fő c76S$w"$7dX6׌z4Avb}(3fmYH$dUFo\ifzUCG"7U8xd?!RDBcRւ%iʶw'h3?Fhח\$]Ef{:cӮ_6u]wA d !s6ԇ-ڋ P' ^/(M&5W0b -tvk{̋s&#&+vs'4o.~yFI4fO|3aCzIb!Q-R!gS.A'< [@iגaN=^O <؃}JJyoIc>=Um8o|$r-S[Ѡv Z8l53&TTw:-K2ӷrÅenCa".}V_%\;;cP95*ْ>RxW6΃چDG$-w|!8eGL٢!>^L [+ 'jh7dV᯻$pGϾCcSzX-9 LڳLAj;Al;xfhMr evL}P 82>yCE8r*_vZy i|)'Ur-v焃hX'C0Z<ʞoơ$g%VjQ6U]My.Xtpsƽཟ ہߝ͕\rDi$;SiG'#%UK% f:mg&Ƭ;f >G³X]U+|yV@\K_E8O@7 ;$Ƥؽ68߸]ZrwɎ=MVOC4'$Q >h&Dm $)-̇zAu;Un /w3CvQqL;."ݶ֩4ʽ22;ޔqۣμV`'/vС*N`(un;[M+͘阾)9~{[p * }ݨ r "J ! K"u{pTIi0íofxe%em3&G+p}?Q.e!Vjt$^-U74-R NIQM |o7aA<[*&"jXqIM#Rzhq_4`Y۰evo''U#ԇԍοž&CJ8k֙fj`lEu!Up+M1޶y>(:|B^{wů;-W}\717,qCD-ׄj :'v~`Ԛm`Xp7~]5XVݾD:l"WgsqxBAKTd] ՎiN+ߥ F\ڤ>ƽ9.Ѱ<6<0`70?r4w-d&B' a{aaÏMxJwM/#>.9n7KP O~~G;҄Upj٨S%^^m<5Wae;9V @9凶ߠ˺:mmj旖ӭ](4÷ucbZޥL1uLK#]L+%.$_R'ώdq9+jIC ws*R+`!-2|ODLdSk o/+b2L8Ȟh/cr{YZL&nz1â"9꺣cVldd73n#.c>ݐe^cRӍ1d|tV!/ 6+ 6mP-ώoMNթ$e5w0IIf"CPߏo. |Ӭv tlz[;{*B-'. Nj)(Tz哉T7̈́aE8˪"Bs40yv)X`mS +fxa<(|2F]{F>%9ٰt888p1ܕɳʶ3ݱ'ޱh?}=ಹ2͞("ܴ䆲rݵ!7ݱ%2]nň/2/8r;Zb5Fy kW3z |ruYNNyh ) Jp4y9BN.zfES.յWvDh mĹn s$B٧GDὐK_x\Txۙ-F<R">Vubw$YTI I6z;gcdҗ '"= xn6a*jg/mDΒ>Da攷_a\Mz뭵!U 0|+JA,T ixd"jm 'GBXGtۨW52z[R.2.;rsAʴi0آէe-苼gCe;*?2OнIXp᧤6qߜL;Vh٫!7Rr Ѱ\WP0u} 'TV!(|`rQŚPuk]yc⛲箑8HIKZfC]tsD íxyM70Uƙ{xX<_~)/oǚ]? <nHiT\O;m(,u%T(T*WQQ%[RHITv/̙{/z|_ϯ˼Ҝ99>9̜32'=/1>ǃհշ [8Ǿʑ辱9<*YRڥg 'j)5h}1QB:ӗAf ݜ+d61]Jaio9$dnG}i{(R7@bJPפ8CvXtzɓTZZ-;w.~wJNjJPBw{I!ߊSK&%UiRu.Y\֊2LpJYG?&S;^iWJYK`+#{n J':?m9,UoIm鴍UG~5JƁao2-L~A-,eGN?sڬX'|UCw7um{iڲ5S^y]fʻ U:}((}j-˚?pvN7v&gw 4u})n}M-v'>GuGWث9;շYcR([C9{D ) jIAtEm3~rh皁)x&\rJLq𲊦5?[ݕPЈ}\15MI*CMp# Wq6KO, ^e u6$ `n 4>sY,k^ֺ8UM;أz%Jf!wNdʮقЌECW7儧Oy%{"ar9G~e\k$~Tؖڲpmq޶$M4w1+[bSf1 &N`g֌ܲc\y &Yr 9딙Aɱt x;+J{]QY4概&)ComsZ$OejM'~ xb>V"U=k"D}RMcLDOC3 f}vrlm3<)u:18s<K7Hl2i`IT2u\/דsGԦs%q~SO\buI Ȯ$=:y]n QASWggBl{^bӷӯE ؔ$Yn,UtK>6jJLMr /KxXeחȎ0)1ˏ kSkm;ywDWtX`G&kJ4MV$捁fN$[NַO-{_Ϊ\Ƶ!?潵Okb-hjȴ r M]S<5H~.˛cӅK^Ŝ*+Km\%;[GxbVgQbܪd7x涓?]qr~F^m_g DQ#b%wvؚ9MO4Nȍ齧qL)d$tޜ["֐㳒gF^6T?ɻqfS{y`[K6uA/N+""Dsܫd) YY?%)o`'ԁ?oVTƅyu): W5T{d/Z[W|obyBԽ_cuBӊ&3./g΋9=uSsJi͒'8x&w{lk66_~ڱ?s-7OX~9F"g996ÏNOZ"U㶙"+RU?Գ~k9NǼu,~}'5SԹJÍvū< >6ճМC~緡8|;-%/̴ܰ>/虾6G9Ϲ9Fi$rժ9OlǓX߹eTzb}A52.aE8LK"&NiϱxauY># dۣUH%=lt3wY?X;qzU%ZZT~ZdHTY׫G__zڀ*E.ע'zZ YiL |ݤ+S+TU.kFnoi20Wkh^qyV5̑ܝ =;*y)ebʇ-$ Y " ǏN=3Wl/;Uwǹ"_Mso]aE|GL^#@4y`%qc"%~z]W/t FjvziARC6&LzQe3͏S]ǖ^PLTvdj%M+^b(S_zݬ*G-&%"~@iod&z\Pɼ=-rC+0ku W=u÷G[CH[Iۤc0?" 'B[TJL2vSXIC+I{M??H@BI:6noG7@ 合c2yCByhFБ5)SżLjAI(XV 6&/))$%%aD"inn9r|r2FVVavڅp6y%M,v8ϱ%0s[in"\#҂S[SxD7O#qrR33\S&/ AQ.^0h{0 /@a.5RmD0yDW'/R8C+An,'>&.A[mj"I-O9QQZTPv6dMq(S@4!?$ L-O* F:iaax +:,( p8#DZ(L dǓ:8/ :2}{<Bf^_7ôOdlxlBB` "lyG&71OC)CU;Ba(;Óat710 `" <)*&gx#T9NSQF 5"#lH"\+`1aѓbϚSգaUǑDF$|9B5'%(F 0kõ$mk t<J # Aʛ ZucWfsDΓ GZ4Bգ3,ESe8Qh .Ń虡2i1,y1[ PưBe1b̴;(7yʐu%0¾³ R\ zC&KN NhP-Mz4B DF`m-g % TJMpJ hb9ZOU=Kv"XePHy#efe`GHФ D) a0P Ȧԣ'R̟OJ4.# d$+ "H?IkR@KޯCPgXȆ)*5X4B  _ARnbsF: 0DA]IO`|$ 5.}JUyDKQgDIgOhsr0;| I'=u")3P9$ EOSIj+HE`S(y eIV:< (%Gt iDG4xOa.n~#7ɿxm# C;G>Ԧf90ưűI΢yٹ()N03~ T8CX^ZiaDZ؎(b C ״$AP (9*85 }< L`c@Ul[#VBd'@Ʌ|@ɦ̍Cefa@!LaF䉈J 4'p%UVzo +M!p$`kDBଅĎb~2˨4Fa"gGbޖ!'{C BȠ<#"yBb|< ;9*Mvy"[bh} 3Bu1Lfx2j!;JuG'eG͠劲GE&XOg/fn<"8r9A/T?#&CyEE2VU<'*17G$]3ԙCĂ?Zȸb]#ӡ=/BW/WEAOmi7{Z4-X4#*~ O^TT2~'0?+_6<#|L͝öGFhe5y-6ԟ<ǖJqcK`l8ϱ%0s[i9sl qxBӽI(L u &)7WTX>0Hi7x&Ț.` \IТ:֯sA1c@?Bϯ0?KJ u*2*0b ?l/!ײ>f\CCr/%m DsXPg:C9? RgMuQȨ2> Damlx2V]є@Hf9 X,Oe [t伬2& ʗYز1J/I "xf "$'6 mvpptk8D-~ OvL OYW r^ ,::aH, {/݃>O6QIKj'3t&A@ဗE>E^ck1^Ht~  WxL\"$ j7## [>W 4bzIӂxPx5Jm(EAb`eqS)LO{G4zL"~xhg>J2X1HN"/9"TL2) ^MiQ(A8 $? VEw*AyChoSѐ4@DCڴnq3!"<?,#AKLlm-ğ(BI,-szkT]s6[ә_DH).;k+1ə݉͏kIE1yjV4u&C&7<=Lj^EwR7Ϥ(&ܝx*ItnԺ#\"! p)7kg΂Ԯ)RZj<>'qQPbOs&gb.Ll],(3weIdM4ۭONH:5~WԻn딏 (_ {TA@ȅaN`9=?Qnwq#rE? ~[{*w9 zO, Kү?eA¼V$OoiڊaxS~~8NZn;զNƗ _Ts `!ODkK sCJ+)V,E&KR|tOۀ\w3Wm-7h7XdO=#cVEELŲv+&sCG!}~89j_i }"Ucex uPUf3/ TPN7?r$(sR<}\x>>9S=n.3[P&RFuj^ N<'*<F[gYb?aij^GMg|ΰ#7Ey¯pr({oVȟ>ン, TK`uuG_7"+n+ ^N,6Jyd[T F=gt͙M qa- ;26~5y 6e >-հ{/*ĉ#ڿqu<:v7V D;6 kywwiCN!'>VW@Տ 'a`ůݮ_gّ_\GAn _sbǴJf!}xJ!}xJ!}xJ!}xJ!}xJ!}xJ!}xJ!}xJ!}xJ%+3z A\$[WXϧ ďo<}2C *+&%;T_^|oiih~8=^wL';M?>; ]{]܃lx!+/tiz<Q*AL'B!r%ZѽiQ3 ~TF|b2]a{տDW/--SÓ^t(@@1tmkM7z.m9]“^5V׶S؈* 9P)KEm<2Yv<]aa)~ϊ"[Aa6rSs}vgXR#; rFe/O%trohF"QRٳX a3VeOqxZagM0Cyz '<}W hnR}g(iWj;m„D7e/wo_+/Ņ:yʎI﨓+.=}s*@{Yq-Ga8<=:s7s<O@aO $; Y6pÂ8Kח[k ý`f~[lҔ?%wp{ϋZH CMlzu~kO7k):+:/aհx OфXH ;ҭ+'dz$i;Lf8Gn/YT-Ӓ`8(Ӧ.݂ m|;3?8lӘIqQǾχW ̃2c5~__gaOvi9 o,ϰUkj[jo)8d.+q˧A<>%Xsۏ%Ί)Q^ @΍qKqƍ>}UjR/]ש.ue/3 <ʘ}RGy45X gOԂnsTx[~/Y|zk~-y TRQ &SI_HBz/lYkx><~`o2FpQ2G?O QrE텛'? sY9óy,?y=`2-gPW-@xЛG@ a@p(pZ]ӽ)!X3|sdgfOoS r]uAX)?`b&'kmœ(WHi.}|VꃰR߱.rW\ ),cmpJ];+Ox^ ~r+tx:@6( v<}$joG:uoxf5~O|woِz$k) !U{G6@J7˹!ͣrכ ecoGoDCUיvo"es49m>xvǛXM@; +u/VkӢc)=/2ʰdy7s34 !׍ 0qW1Vn [,p&[629iXI3+:{Iv=f`n5Lzp<;!4>elwX0:OhyO9*q{ z][^8OAqdu~<3Ka>,s .=xLU;%@dz [˧:BQ;h (@퐊WX\#&}Hi'F.odzڣ ᜖#Dmѐj5>W#vn҉9wnljBnz'#CPhm`-=`fHZ]#wQ(cCΔ dHUs~tCw1Df'&A⽹.xa ;|^,:ZH'w9g> #$$Dko % s_sh~A(]{4[_&ujI Fh `YuhAxLjZ W}kd:O,A<*S >βgI9̦:=<3eό=MG^TFPE4Kx$I?PWM߈jwRn튤Pww<4 6Q/'u" &шm9"uxR./Itp":uL'Gʛ+oK$\3Nj^r}-xk * m.'`6*o=~!*mhsAp$U͑H v b"`n 3vdELb+Tt{p@aC[g-Z~;x<7OqYckJoX*/Uн*Υxp23I%DFMI8+е8>'چkk [Ϗ 3,J65*ʁ&29zN6v{ m6#$*h5ҏ`RQ #XMGj>>q,`@v'PJm'i 212ueƦ4aKPAJ*)2>+Zɷ4%紳(5?s<|tआE6cɧs7.źx253͍FFs'.&ճGM= J6ڠf%"#_ҤTmD;6xz}}6TGVOj(@j~fVDGtZд҉(9'7-jL+z 7ZP5™rw,m5=g #L;*wZtk'4E t>UqlULIEa IQT* k?TdwEC4o7A@_ 1Plz[Gu $:X<ɢ&mR.Ӎ8׋a|k'uU#Je:XW4I_gynafl!T,~E6KSpQɅOY/C*BL`0jn;mxׂr*}ѡ4uojHzx3OM T߱r/:U8 ŊMJQramoktf-ݩN!6vRCc'ibyሲB#2 G pƩ 7+DџlnN~wҠ9F+CPCՁ9Ak\oݶ`4x7[khhNMVO JUӸ{P ?^@!* "lEaI_{LL0P’s~y iΗ/iOl5ѦjC#+2-`SJHRJ ҽpl3MȊC_ϵ]t_լ@@%lx-RYiv fB;$Z(2"u( 5bhRۇb1Mwh x? \&]IU!ʓsiR^i\&K5ã0)vYU20PYo*> ϯC 5*4qPI`^碷Sڐpz d)*V D渡}Uotvw}:8y,?UX>gBAfC6*5xy5i 6\*h`?@.O{!u> S'AF`!sw5rPUƞu0C+4Q"kt7U;L)v{:+$B6|OCo'LĂ^AE-f|5iH%&Vm-RbJKJUe]l'gW n4) ]k\d(9j$qh1nWn-/ ç1;$NϏ-$?2Uj<ڰy}DVj5G}>% ' jEX\ Lju=vJZܩXz} g_,U7;W#&vWv %xvBg2O= {2pxd}˳jbGlJ96E|r[f|v1~h'z 7tTdnr'X5#_URjT|/OE0@;ÓE6DZ}K>jʉ h 7 N#߅i> -='Ϩ8ވ cAAV15.s %,;}}O(mw&ҩbV':G b^- /C3 =(Su+Y GzUygĽxPFJˀ71x}RswB7R8˅發(V+5s/Q{%4\ BgwEa@YfA͆[ S,^p'6*Ym(2kz<;ᓼ [Hb~`$qUnĒVbYz FK#om <b=hZlxr kG_K"h"f5;$`t7آ"K_ۯ=! \v?Iq7@AlQDSL\ƕ>L6w\'ƕ.|x@6M>>+h@MuL8}8Q\(QtBGtC%GeI_'czǰc]F>T7fF>KN_Y]kEcjRFaq_xc]  32]<}|0g 3A\ُ(|wcdg-5% .C/_!a2x^34n<1|JL6o)&v  ؒV[{{~E&TI)q+?|Vl^<'0-z8HW[Y'QfH'y he koYU ʁWQhD%I7:Փv: IP1N@_H < >Б _A%ZVRȑ#w"z\_ܝ˰ҙ7e%ՅkD7;>U^ЛWl#H5 ُ3QH(=ـQ_* <>9) şE

{ EӶgzdL* QKvK U$'^}7,$Q42t`3$ #8q?ަ)~|ֲ'N{mqxMzO09Ny$Peu|le.C7"v3 #,o;Ҏ8H""RGp~"G36I;peKqp4N *>;>uV x6|iP<t@哮TsMC!mnzٲOxR4;㨭%PiB\X0qx4LY'LH&/{ZK?\*.2Zt`c' =r`ـXzoց5Cy ątplD`(>5*M$ՅS㝲]rƳ֞4oo/zk,fdz4}Ϲy5;໖ p><촠>UKx}^x*3`~]7Z]x1(Ǧ9Hh| v޾7Čz<Bpl+:Ғ+ ǚ{uՈTp'hu%FxUvI7DD_OFnPQÙCq E*gB녟wr~ |!6P9Z!NfGv9+atg5+ dO'vтyhT=rTE?>و!Zdѱɂ31İհzʰ±<,d #]akCJko_"EOǚ2#<1TjIm{oSZ]=$W%!ӤH>c!L%ٟfͱէ\䥱败:I&݆[x[StxːFg̍0ZArtd c<ˤ$Rz!k#%\]W@,i'GN_q*YI5bƔ:|' @KƗ^?>'#?Fٳ>"t:Ɠ<[ NR>ވZv )Eh>sS (W*N`}$ќ3Qe@^IRb\1ћb*TfMFbEҥ6Rc&6K1 MƌB%oRU|sxNMގ/ZU,%g5%ޣHpܮT19ԒjфMY4J[6 ֙'<< x3h&Q>ɽ7OhHDGgu -#)I#/rkxb[8$a״Ot^gMOZ2Lyp6L5ѹ6g,yqa2xiTxBQƽ떭`Vq$mcgk'DHa[aGuZȳy$̢؉NpG5d &K3utϡ߬g`NHPx4Ĉ4!QQ# !̏:Jr%$'wlwHdހo Ert=86W-%ZB>&~4;W=\ϹÛw: *.1-/ZON܉gp,7lxC> H9VAH4紸.>;'s=L< j{^ғl4@BQCwRR\m?A&9\ B2:vEpecHޞ 'gX9b:wl4gGg0^cfdx*\t;a]N0 #?9Cu9i@y8@^<"93?'nwBr@dwZ+' jH1v ?>Nmm 9=ns ;_v.:[ Gqc_'b~幞%@]sX.Nrj}NdUy$3yMhm|=TQ4?Ceuo fi,5< Ӎ|V>ֳ0S鱫!|)܌[Xs-:$kϵ<dߦFV]eNO>Mjy%ngxDP/EMۮd8_6 m{S<|~ǬlI:;( X3'V3lմ!|==ʻ巡<"k.֌F UߘxaO#tBq0^`~ڽ hO_X %Cߚ<˳gx0cXgJougL׉=RbCկ8.$w3ɠxag7?|->kC_8G:q^?kO~g:׿Ÿ%C?niO_? B忖!#Ÿe/+OΣ3Ӈ3D*GO ޶Ro+ 7{b  ^HI n ^HIPNG  IHDREye sRGBPLTEHtHtHttttHHHHtHHtHHHtHtHHHttHtttHtHHtHttttHttttttttHHHHtttHtߜ߿ttHttHtߜ߿ߜHߜt߿tߜtߜ߿z. ~IDATx ۶iͫdKGYnSnV)ًmU$|4pBUG& gٴu݄4T|N*6BnoSVVe/{sS̺OݛK2˖O RWPEbRnalvZMqB/%`.%D:JR߿e?B),*gQBE ȇ*\|2-.wBs)a.X']5.Q SD<\kMlOՄ`3*! v7?T^*BN܈)U 2*sQ^no"B}cZTGrklY/.V?>B?=̙/ډ40nc$?ȞB4Ts"0/s`y_>Nx4 cP Sqm<"|ޮv7[{D58!SNu<~u+AWՃm22z*;!*{dnhxOnZyrfKZ Jn[7hS5>az~Ѫ~5VV~ /S422ljCH3;zZYh}vHWKɱ=˗,f/?c]S3SgN?,SͪM9J̸NI1=o`/~D"Dzuv]LGta:F D Fśy5[l׀En]▦*d:֬<k1?39yk%bjIy@cV0ܥں.L'P IHmxZBA`LiΫg xW jF7g:!kt1"b/8c ?![ؖ$X=s9(H66lA.n)nȮ@qK6 ӉL'E6m[sŻ?yU+ QmXMnFg:Q2V%cm@1` cm:0_f:hcZ-~*3Vi WM;#c9#HWqd {*V`H͡'S순W0p2Q7#%cB%=Bd2`GqX mEƌ:) `-.7:\f+Fs cR1cr%T#;MdwJsco,ǵͿ˃ksNt\W"T̘$*ci1R7=rfh 4T|,f Hf$72=E೔:2"3"m3I{U-!As׳@T(FO^~LL;glIxd,E^-'_c{/ Txd,E~ >`αP#_!+-eTBM+dM+dMLmqzLdsfo-Ѐ^xp#̂0!E4)`#  HU9H(R#3VRݷ8_.Izr$S^~rϋeqPTF;.Ȃܷ,XȰ":e U]?b*o,3`sjQRw]Tnp,T5w0k]F1XQrX:斍==\? :e lͽYATFj78$gH -1)1[?8}7緟 2ƗJ8` U"ms}@(#+Ho,t-Җ/וRq+d g hCZrsRge3?.:ebkaT_[֥ Ul@ƪmib8bzw?&-y*rկUS/։vbd}6z!> ͊4:)F׋v"{1ao{/j[E;EUTCEń`3u{d`oE;uX. vhQE;s&2ٚZ<=)IENDB`S AA@A@   . Updates: -Cover: Reorganized the Tester and Agency POC information cells, to better reflect possible multiple POCs. -Test Cases: a. Changed Column G header to "Pass / Fail / N/A", to more accurately reflect the four possible status indicators. Deleted Column P - it was a duplicate of Column H (Comments / Supporting Evidence). b. Added conditional formatting to the status cells, and included summary cells at the bottom of the checks. c. Added control names to the NIST ID cells. Primary control is listed in black; any secondary controls are listed in GRAY. d. Changed the primary control for several findings where there was a better fit than the currently assigned control: 48, 53-59, 62, 64 -Legend: Updated the Pass/Fail row to reflect the three possible status indicators (above). -Test IDs: -None.   u  % Percent (%)StatusNumber of ChecksPassFailInfoNot ApplicableBlank (Not Reviewed)Total Tests PerformedAbsolute Total # Tests1. Material provides basic awareness of the risks associated with wireless technology. 2. Records include the type of instruction received and the date completed.LChecks to ensure security assessments are conducted on the wireless network.O1. Examine the results of the last security assessment of the wireless network.The agency uses wireless security assessment tools (e.g., vulnerability assessment) and regularly conducts scheduled security assessments. The assessments include validating that rogue access points do not exist on the wireless network. _Checks that a site survey has been completed to measure and map wireless access point coverage.The site survey report contains access point locations, determines coverage areas, and assigns radio channels to each access point and that ensures the coverage range does not expose APs to potential malicious activities.PA complete inventory of all APs and 802.11 wireless devices should be conducted.S1. Examine the inventory of all wireless access points and 802.11 wireless devices.VWireless networks can not be used until they comply with the agency s security policy..Checks the location of wireless access points.7Checks the range boundaries of wireless coverage areas.NA wireless connection is only successful inside the documented coverage area. >Checks to ensure access points are turned off when not in use.1. The policy states that wireless access points are to be turned off when not in use. 2. The connection attempt to the access point fails. Access point services are not running.vThe reset function on APs should be used only when needed, and the latest security settings are applied after its use.x1. Examine the agency's wireless LAN policy and procedures to verify it covers use of the access point reset function. 1. The policy states that the reset function is only used when needed, and is restricted to authorized personnel. Appropriate personnel restore the latest security settings after a reset.7The default SSID should be changed in the access point.B1. Examine wireless access point configuration, SSID name setting./The broadcast SSID feature should be disabled. 'The broadcast SSID feature is disabled.fChecks to ensure access points are protected against radio interference from nearby wireless networks.1. Examine the agency's site survey report to determine the channels used by each wireless network within the agency. 2. For a selected sample of access points, examine the wireless access point configuration, wireless channel setting. 1. Channel for each wireless network is documented in the site survey report. 2. AP channels are at least five channels different from any other nearby wireless networks to prevent interference. The channel settings match what is documented in the site survey report. KAll insecure and nonessential management protocols on the APs are disabled.v1. Examine the wireless access point configuration to verify that insecure and non essential protocols are disabled.HChecks to ensure encryption keys are properly configured and controlled.1. Examine the wireless access point configuration, encryption key settings. 2. Examine documented records of encryption key changes.51. The agency has changed the shared key from the default setting because it is easily exploited. 2. The encryption key size is at least 128-bits. 3. Cryptographic keys are replaced periodically, and when there are personnel changes, with more secure unique keys. Key changes are tracked and documented. 3Software patches are deployed and tested regularly.2All APs must have strong administrative passwords.*All passwords should be changed regularly.K1. Review documentation the explains the expiration intervals of passwords.CThe documentation will explain when passwords automatically expire.;Where possible  ad hoc mode for 802.11 should be disabled.Y1. Review the AP configuration files and verify that ad hoc mode is disabled by default.+Ad hoc mode will only be enabled as needed.YUser authentication mechanisms for the management interfaces of the AP should be enabled.JManagement traffic destined for APs should be on a dedicated wired subnet.'1. Review the detailed network diagram.SNMP is disabled if not used.J1. Review configuration files and verify that SNMP is disabled by default."SNMP will be disabled by default. S1. Review AP configuration files and verify that SNMPv1 and SNMPv2 are not enabled.61. Connect to an AP using local serial port interface.`1. Review Intrusion Detection logs and verify that traffic is captured for the wireless network.4Wireless traffic will be captured in the audit logs.SKey-mapping keys (802.1X) rather than default keys should be utilized for sessions.A1. Review the procedure followed when disposing of access points.@The procedure will clear access point configuration information.R1. Review the access point configuration files to verify that logging is enabled.If the access point logging feature is enabled, there will be a record kept that verifies that the logs are reviewed regularly.Test Case Tab: Execute the test cases and document the results to complete the IRS Safeguard Computer Security review. Reviewer is required to complete the following columns: Actual Results, Comments/Supporting Evidence. Please find more details of each below. EAn inventory is maintained of all wireless access points and 802.11 wireless devices. The inventory includes any information determined to be necessary by the organization to achieve effective property accountability (e.g., manufacturer, model number, serial number, software license information, system/component owner). ~1. Examine network diagrams and tour the facility to view the physical location of all wireless access points in the facility.(1. Wireless access points are located on the interior of the facility and not located near exterior walls or windows. Wireless access points are located in out of reach, secured areas, such as restricted telecommunications closets, to prevent unauthorized physical access and user manipulation.1. Review the site survey report and network diagrams to verify the location of each AP and coverage areas. 2. Select a sample of APs and attempt to connect to the wireless network from inside and outside of the documented coverage areas. <1. Examine wireless computer security awareness training material. 2. Examine training records of selected users. Note: This can be tested with the MOT SCSEM tests for security training records. This may require an interview with an HR representative depending on who within the agency holds the training records. H1. Examine wireless access point configuration, SSID broadcast setting. 1. The SSID has been changed to a value other than the default value for the access point. 2. The SSID character string does not reflect the agency's name, or any other identifying information of the agency. aAll insecure < and nonessential management protocols, (e.g., telnet, FTP) on the APs are disabled. 1. The policy states that wireless networks must be authorized by agency officials prior to implementation. Wireless devices must be tested as operating in compliance with the agency's wireless security policy prior to being implemented. ,1. Examine the network architecture diagram.]1. A firewall is present that separates the agency's wired network from the wireless network.xA properly configured firewall must exist between the wired infrastructure and the wireless network (AP or hub to APs). Antivirus software is installed on the wireless clients to ensure that wireless client do not introduce known worms and viruses to the wired network while protecting the wireless client from viruses that originate on the wired network. T1. Examine selected wireless clients to verify the existence of anti-virus software.8Antivirus software is installed on all wireless clients.1. Examine the agency's wireless LAN policy and procedures to verify it is policy that wireless networks must be authorized prior to implementation.11. Examine the agency's wireless LAN policy and procedures to verify it is policy to turn off wireless access points when they are not in use (e.g., after hours, weekends). 2. Select an AP that is not in use to verify that access point services are not running. Attempt to connect to the access point. \1. Examine selected wireless clients to verify the existence of personal firewall software. @Personal firewall software is installed on all wireless clients.G1. Personal firewall software is installed on wireless network clients.+1. Examine the results of the site survey. c1. Review the encryption configuration files and/or session logs to verify that 802.1x is enabled. 1ob sharing is disabled on the wireless clients.-ob sharing on wireless clients is disabled.K1. Examine selected wireless clients to verify if file sharing is enabled. 1. The MAC address access control list is populated with authorized clients only. 2. The attempt to access the access point fails. 1. Examine the wireless access point configuration, MAC address access control list. 2. Attempt to access the wireless access point with a client that is not on the authorized MAC address access control list. 1. Records indicate that software patches are deployed and tested regularly. 2. The wireless access point is current with the vendor's patch level. 1. Review the records containing installation, configuration and testing of software patches. 2. Examine the wireless access point configuration, patch level.Version Release DateSummary of ChangesName First ReleaseReviewer to include any supporting evidence to confirm if the test case passed., failed on not applicable As evidence, provide the following information for the following assessment methods: 1. Interview - Name and title of the person providing information. Also provide the date when the information is provided. 2. Examination - Provide the name, title, and date of the document referenced as the evidence. Also provide section number where the pertinent information is resident within the document (if possible). Ensure all supporting evidence to verify the test case passed or failed. If the control is marked as NA, then provide appropriate justification as to why the control is considered NA.Recommendations Residual RiskTest Objective Test StepsActual ResultsTest IDImpact Likelihood DescriptionPossible ThreatsAnalysisTester:Date: Location:IRS Safeguard SCSEM Legend(Identification number of SCSEM test caseNIST ID'NIST 800-53/PUB 1075 Control IdentifierObjective of test procedure.6Detailed test procedures to follow for test execution.Expected ResultsLThe expected outcome of the test step execution that would result in a Pass._The actual outcome of the test step execution, i.e., the actual configuration setting observed.Comments / Supporting EvidenceComments/Supporting Evidence@1. Review documentation that provides admin password standards. The records will explain that strong passwords are to be used. (e.g. min length of 8 characters, use of numeric and special characters)5The wireless network should use static IP addressing.1. Examine the wireless access point configuration to ensure the management interface use some kind of authentication mechanism. (e.g. username and password)DConnection to the AP's management interface requires authentication.>Web-based management session should use SNMPv3 and/or SSL/TLS.1. Review the session audit logs and verify that SNMPv3 and/or SSL/TLS is enabled. &SNMPv3 and/or SSL/TLS will be enabled.JSNMP settings on APs are configured for least privilege (i.e., read only).1. Review AP configurations files and verify that least privilege principle are utilized. For example, users are configured with read only privileges.OSNMPv3 or FIPS-140-2 compliant encryption should be used to manage AP traffic. No AP will have SNMPv1 and SNMPv2 enabled. SNMPv1 and SNMPv2 message wrappers support only trivial authentication based on plain-text community strings and so are fundamentally insecure and not recommended. Agencies should use SNMPv3j1. Review the configuration files and check the that SNMPv3 or FIPS-140-2 compliant encryption is enabled.;SNMPv3 or FIPS-140-2 compliant encryption will be enabled. QA connection to the local serial port interface should be allowed for AP configurations. By using a local serial port interface for AP configuration ensures that sensitive management information do not traverse the network as well as minimizing the risk of unauthorized users gaining access via a network protocol used to manage the AP.TRADIUS and Kerberos are acceptable forms of authentication for the wireless network.FIntrusion detection is applied to the wireless portion of the network.Z1. Review the local security policies for the possible application of RADIUS or Kerberos.lThere will be written documentation stating that RADIUS and Kerberos are acceptable forms of authentication.F1. Obtain and review the audit logs that can trace RADIUS connections.1An audit log of RADIUS connections is maintained.Management traffic destined for APs will be on a dedicated wired subnet. Passing management traffic over an  out of band network or management subnet protects management traffic, interfaces, and passwords from organizational and outside users.If an authentication mechanism such as RADIUS is utilized, then auditing technology is also used to analyze the records produced by RADIUS.V1. Examine the wireless access point configuration to ensure that DHCP is not enabled.Pass / Fail / N/AMReviewer to indicate if the test case passed, failed, or is not applicable. %SNMPv1 and SNMPv2 are not to be used.TChecks to ensure users are trained in awareness of wireless computer security risks.ExamineExamine & TestTestOut-of-Scope ReasonRA-1RA-2RA-3RA-5PL-1PL-2PL-3PL-4PL-5,Control not selected in IRS Publication 1075PL-6SA-1SA-2SA-3SA-4SA-5SA-6SA-7SA-9CA-1CA-3CA-5CA-6CA-7PS-1PS-2PS-3PS-4PS-5PS-6PS-7PS-8CP-1CP-2CP-3CP-4CP-6CP-7CP-8CP-9CP-10CM-1MA-1MA-2MA-3MA-4MA-5MP-1Control covered in the SDSEMMP-2MP-3MP-4MP-5MP-6PE-1PE-2PE-3PE-4PE-5PE-6PE-7PE-8PE-9PE-10PE-11PE-12PE-13PE-14PE-15PE-16PE-17PE-18SI-1SI-5SI-8IR-1IR-2IR-3IR-4IR-5IR-6IR-7AT-1AT-3AT-4IA-1=Control covered in operating system and network device SCSEMsIA-4AC-1AC-4AC-19AC-20AU-1<AU-7AU-11SC-1SC-15SC-17SC-18SC-19SC-22SCSEM Results Dashboard- References+IRS Publication 1075, October 2007 Revision Control covered in the MOT SCSEM&MAC access control lists are utilized.CM-4CM-2The AP is not configured to use DHCP, static ip addresses are used instead. Using static IP addressing makes it more difficult for a hostile user to connect to the network.SC-20;A local serial port interface is used for AP configuration.GWhen disposing of access points, access point configuration is cleared.UIf the access point supports logging, this feature is enabled and reviewed regularly.6Key-mapping key (802.1X) are used by during sessions.:NIST Special Publication 800-48, Wireless Network Security Control IDAC-2.Covered in operating system and network SCSEMsAC-3AC-5AC-6AC-7AC-8AC-11AC-14AT-2AU-3AU-4AU-5AU-9CA-2CM-3CM-5CP-5IA-2IA-6MP-7SA-8SA-10SA-11SC-2SC-4SC-5SC-7SC-10SI-2SI-9SI-10SI-11*Control covered in operating system SCSEMs First M. Lastmonth d, yyyy - month d, yyyyCity, STAgency POC(s): Name: Telephone # Email Address(###) ###-#### x#####First.M.Last@xx.xxx NIST ControlSecurity Awareness Security Assessments Remote Access'Information System Component Inventory Wireless Access Restrictions Remote Access Session Termination Authenticator Management Configuration Settings Boundary Protection Least Functionality /Cryptographic Key Establishment and Management Malicious Code Protection (Device Identification and AuthenticationFlaw Remediation &User Identification and AuthenticationAuthenticator ManagementUse of Cryptography$Cryptographic Module Authentication Auditable Events Information System Monitoring Information Remnance *Audit Monitoring, Analysis, and Reporting  AC-17CM-8AC-17IA-5CM-6CM-7SC-12SI-3 IA-3 IA-2 IA-5SC-13IA-7SI-4AU-6DIRECTIONS FOR SCSEM USEThis SCSEM is used by the IRS Office of Safeguards to evaluate compliance with IRS Publication 1075 for agencies that have implemented an 802.11x wireless LAN where systems that receive, store or transmit or process Federal Tax Information (FTI) are accessed from, or reside. Agencies should use this SCSEM to prepare for an upcoming Safeguard review, but it is also an effective tool for agencies to use as part of internal periodic security assessments or internal inspections to ensure continued compliance in the years when a Safeguard review is not scheduled. Also the agency can use the SCSEM to identify the types of policies to have in place to ensure continued compliance with IRS Publication 1075. Test MethodPM-1PM-2PM-3PM-4PM-5PM-6PM-7PM-8PM-9PM-10PM-11 AC-21AU-13AU-14SA-12SA-13SA-14SC-25SC-26SC-27SC-29SC-30SC-31SC-33SC-34SI-13SC-16Number of test casesLast test case row:AU-12IA-8Booz Allen HamiltonjNIST Special Publication 800-53, Recommended Security Controls for Federal Information Systems, Revision 3#DESCRIPTION OF SYSTEM ROLE WITH FTInProvide a narrative description of this system's role with receiving, processing, storing or transmitting FTI.[The dashboard is provided to automatically calculate test results from the Test Case tab. The 'Info' status is provided for use by the reviewer during test execution to indicate more information is needed to complete the test. It is not an acceptable final test status, all test cases should be Pass, Fail or N/A at the conclusion of the review.System Use Notification9The wireless network displays an approved warning banner.1. Logon to the wireless network. Verify that the warning banner displayed is in compliance with IRS requirements. The user must accept the warning banner message before moving forward.GExpected Results: The warning banner is compliant with IRS guidelines and contains the following 4 elements: - the system contains US government information - users actions are monitored and audited - unauthorized use of the system is prohibited - unauthorized use of the system is subject to criminal and civil penaltiesNote: Remote access is defined as any access to an agency information system by a user communicating through an external network, for example: the Internet. SC-8 SC-9(Transmission Confidentiality / IntegrityConfirm whether all FTI data in transit is encrypted when moving across a Wide Area Network (WAN) and within the agency s Local Area Network (LAN). All FTI data in transit is encrypted when moving across a Wide Area Network (WAN) and within the agency s Local Area Network (LAN). dFIPS 140-2 compliant encryption is used to encrypt FTI when transmitted across the wireless network.?Updated for NIST 800-53 Rev 3 Updated for new Publication 1075 < Updates: -Cover: Added SCSEM disclaimer language -Dashboard: Added test case calculations -Test Cases: a. Updated NIST test case method on old to new test cases b. Added test method column -Out of Scope Controls: Newly added worksheet to identify out of scope controls -Sources: Added worksheet for source documents  1< Zg   The IRS strongly recommends agencies test all SCSEM settings in a development/test environment prior to deploying them in operational environments because in some cases a security setting may impact a system s functionality and usability. Consequently, it is important to perform testing to determine the impact on system security, functionality, and usability. Ideally, the test system configuration should match the operational system configuration. Prior to making changes to the production system agencies should back up all critical data files on the system and if possible, make a full backup of the system to ensure it can be restored to its pre-SCSEM state if necessary. The IRS welcomes feedback and suggestions from agencies in regard to individual SCSEMs.System Hostname:jSafeguard Computer Security Evaluation Matrix (SCSEM) Wireless LAN Release IV July 30, 2010 Version 0.4P   KLz{no|Yn  B 5  Z7M*U2kS0l: {:/Dl Z  !E\"k#*$A$V' 'N ' ( ( -p8/ccB  +@DF  dMbP?_*+%&ffffff?'ffffff?(?)?MFreedom Import Printer$C od,,LetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"d,,333333?333333?&<3U} $ } } $ }  } I} } $ +                           @                              0l*2# $ % & ' ( *  #n #3 $o $4 %p %5 &6 &7& &8& & 9 '3 ': ' ; (3 (: ( ; *xL**$|(  $ %O2 $S N Group 2Horizontal Rule" ] `c~vB $B >?Line 3%O]` "|B $ D)?Line 4Z 22]`@" $ JA 1?IRS Logo@"x]N``  $peEx Word.Document.8>@`b  '' yK First.M.Last@xx.xxxyK Nmailto:First.M.Last@xx.xxxyX;H,]ą'c(( yK First.M.Last@xx.xxxyK Nmailto:First.M.Last@xx.xxxyX;H,]ą'cggD  #Q{T  dMbP?_*+%&ffffff?'ffffff?(?)?MFreedom Import Printer$C od,,LetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"d,,333333?333333?&<3U    @            c  d       @0$0$0$0$$$$$$>@"    ggD  =Zs_  dMbP?_*+%&ffffff?'ffffff?(?)?MFreedom Import Printer$C odXXLetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"dXX333333?333333?&<3U} I} $} I J           0   @    n s n o+o ;(PassAZ.p #DD Be o+o ;(FailAZ.p #DD Be o+o ;(InfoAZ.p #DD Be q*o ;(N\AAZ.p #DD Be o$D@ ;(A[.p? #DD Be o # t  % r d o # D@  % r d   D@  D .D@ ;@@B@"*yyyxrMM1>@     ; ;@@B@B@$C@Pass; ;@@B@B@$C@Fail; ;@@B@B@$CInfo  ; ;@@B@B@$C@Pass; ;@@B@B@$C@Fail; ;@@B@B@$CInfo  ; ;@@B@B@$C@Pass; ;@@B@B@$C@Fail; ;@@B@B@$CInfo{+{  {+{ {+{ {+{ {+{ {+{ {+{ {+{ {+{  Sheet2ggD  $Zl΁؈ 0  dMbP?_*+%&?'?(?)?MFreedom Import Printer$C odXXLetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"UXX??&U} mT} $T} $ T}  U} T} %T} "T} $T} IT} T} $ T} ?T} $ T} ?T}  $ T} !!I-S} "$ T""Q" ""&" " "O ""  " " " "  "" """"""" """"" "p"""" Oh O< Os Oe Oe Of Ow Og O Pz Pi Pj Od Pk Pl Pm Pc !R{~ k? h= h z { {D { |}~|||||||!~ k@ h> h    |}~|||||||!~ k@ h? hT   T  |}   |||||||!~ k@ h@ hU    @}!~ k@ hA hV   O H|}~|||||||!~ k@ hB hV   A B|}~|||||||!~ k@ hB hV   C |}~|||||||!~ k @ hC h-   P |}~|||||||!~ k"@ hC h-     |}~||||||| !~ k$@ hD hW    F |}~||||||| !~ k&@ hE hX   E  |}~||||||| !~ k(@ hF h,   ! " |}~||||||| !~ k*@ hG hY  # $ G |}~||||||| !~ k,@ hH hZ  % & '|}~|||||||!~ k.@ hF h,  K I J|}~|||||||!~ k0@ hI h[  N M L|}~|||||||!~ k1@ hG hY  R Q S|}~|||||||!~ k2@ hG hY  W X V|}~|||||||!~ k3@ hJ h\   Z Y|}~|||||||!~ k4@ hK h.  ( \ [|}~|||||||!~ k5@ hL h]  ) | }}~|||||||!~ k6@ hM h^  * + ,|}~|||||||!~ k7@ hG hY  - . /}!~ k8@ hE hX  ~   }!~ k9@ hG hY  0  }!~ k:@      }!~ k;@ hG hY  1 2 }!~ k<@ hN h_    }!~ k=@ hG hY    }!~ k>@ hG hY  3 4 5}!~ k?@ hG hY   6 }!DFl "!""" #"q$"%"&"'"(")"`*"d+"d,"d-"d."d/"d0 d~ k@@ hN h_     } !~ !k@@ ! ! ! ! ! !!}!!~ "kA@ "hG "hY " "  "7 ""}"!~ #kA@ #hO #h` # # # ##}#!~ $kB@ $hP $h $ $ $ $$}$!~ %kB@ %kQ %ka % % %8 %9%}%!~ &kC@ &hH &hZ & &: &U &&}&!~ 'kC@ 'hR 'h* ' '  '; '<'}'!~ (kD@ (hS (hb ( (  (= (>(}(! )___ )aab *c[[ *e[f +e[ ,e[ -e[ .e[ /[g 0[g &@ !"!V$ ((  ( ( A??NTaudit policyPicture 1NTaudit policy]&`"ZR ( C ]F!" d ZR ( C ]F!" d ZR ( C ]F!" d ZR ( C ]F!" d ZR ( C ]F!" d ZR ( C ]F!" d ZR ( C ]F! " d ZR  ( C ]F !4 d ZR  ( C  ]F ! d d ZR  ( C  ]F !c d ZR  ( C  ]F !c d ZR  ( C  ]F ! d ZR ( C  ]F! d ZR ( C  ]F! d ZR ( C ]F!@ة d ZR ( C ]F!a d ZR ( C ]F!a d >@PaaA @ M@'J:P@<'@?&?'?(?)?M\\ipp://156.80.61.27\i_A585_HPS odXXLetterPRIV0''''\KhCם{"dXX??& M@'J: w((;@Pass;@Fail;Info*0.0*,;.0*,27\i_A585_HPS@Pass;.0*,27\i_A585_HPS@Fail;.0*,27\i_A585_HPSInfo{+{({+{({+{({+{*0{+{*0{+{*0y  Input Error5Please enter an accepted value: Pass, Fail, N/A, InfoPassFailN/AInfoN( Sheet3ggD  ( b  dMbP?_*+%&ffffff?'ffffff?(?)?MFreedom Import Printer$C odLetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"d333333?333333?&<3U} } 8j} $ j       i  i  li  i  i  i  i q i  i  i  l i  l i  l i  l i  i  i  i  i  i  li r i s i  li  li  li  i  li  i  i  i  i  iD@l&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&& !"#$%&'()*+,-./0123456789:;<=>?  i ! !!i " ""i #  ##i $ $$i %! %%i & &&i ' ''i ( ((i ) ))i * **i +" ++i , ,,i - --i . ..i / //i 0 00i 1# 1l1i 2 22i 3$ 323i 4 44i 5 55i 6 66i 7 77i 8 88i 9 99i : ::i ; ;;i < <<i = ==i > >>i ? ??iD@l&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_ @ @@i A AAi B BBi C CCi D DDi E EEi F FFi G GGi H% HHi I IIi J JJi K KKi L LLi M MMi N NNi O OOi P PPi Q QQi R RRi S SSi T TTi U UUi V VVi W WWi X XXi Y YYi Z ZZi [ [[i \ \\i ] ]]i ^ ^^i _ __iD@l&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&`abcdefghijklmnopqrstuvwxyz{|}~ ` ``i af aai bo bbi cp cci dg ddi eh eei fi ffi gj ggi hk hhi il iii jm jji kn kki l l m m n n o o p p q q r r s s t t u u v v w w x x y' y z( z {t { |u | }v } ~ ~  Dxl&&&&&&&&&&&&     &    - l       ) l     w  x  y  z  {  |  }  ~  * l +  ,   0  1    . lDl   /  (>@A  Sheet4ggD  6  dMbP?_*+%&ffffff?'ffffff?(?)?MFreedom Import Printer$C od,,LetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"d,,333333?333333?&<3U} I_j} $ j ui wi yi wi vi xi vim4>@jj Sheet5ggD   ?  dMbP?_*+%&?'?(?)?MFreedom Import Printer$C od,,LetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"d,,??&U} E} N} 1D} m}D} D} mE} D} &F} ID} IG} AD} D} $ D ,X@X@@,J,@,@@ @ ,@ @ q  ? HIIID h CrK Bs CtD e CuDD f CvDD w CxD D g  Cy D D   L D D z  Mb D0&:::::>@MJ @ M@'J:F@< &?'?(?)?"??<& M@'J:J    w Sheet6ggD    dMbP?_*+%&?'?(?)?MFreedom Import Printer$C od,,LetterDINU"CSMTJFreedom Import PrinterInputBinAUTORESDLLUniresDLLOrientationPORTRAITResolutionOption5PaperSizeA4PrintQualityLETTER_QUALITYColorModeColorTFSM"d,,??&U} m } $2}       W] W^ W_ W`X$@YU@ Za X\4@]t@ ^ XX>@Y@ Z XXD@Y@ Z XXXZXXXZXXXZXXXZX XXZX XXZX XXZX XXZX XXZXXXZXXXZXXXZXXXZX(RT82222>@XZA @ M@'J:d@<&?'?(?)?"??<& M@'J: w Sheet7ggD P 8Safeguard Computer Security Evaluation Matrix (SCSEM)IRSJonathan Isner@ӌ7c@exu@V7՜.+,D՜.+,pHP X`hp x -  CoverPurpose Dashboard Test CasesOut oDocumentSummaryInformation8CompObj rf Scope ControlsSourcesLegend Change Log'Test Cases'!Print_Area'Test Cases'!Print_Titles  Worksheets Named Ranges$ 8@ _PID_HLINKSA kHmailto:First.M.Last@xx.xxxkHmailto:First.M.Last@xx.xxx F&Microsoft Office Excel 2003 WorksheetBiff8Excel.Sheet.89q