ࡱ>  Gbjbj[[ ;p99K?r> > 8L0\(Z$x*\;+++;P+R+~8cA}RXf0C rcc+++++++;;AT++++++++++++++++> ^:  INFORMATION TECHNOLOGY CAMPUS INFORMATION TECHNOLOGY SECURITY POLICY Introduction Policy Definitions Reasons for Information Technology Security Roles and Responsibilities Key Security Elements Privacy and Confidentiality Compliance with Law and Policy Resources Introduction: As reliance on electronic technology continues to develop, it is incumbent upon the University to provide, to every extent possible, for security of data as it is collected, stored, or used by anyone. Information Technology has an obligation to ensure appropriate security for information technology data, equipment, and processes in its domain of ownership and contol. Policy: Each member of the campus community is responsible for the security and protection of electronic information resources over which he or she has control. Resources to be protected include networks, computers, software, and data. The physical and logical integrity of these resources must be protected against threats such as unauthorized intrusions, malicious misuse, or inadvertent compromise. Activities outsourced to off-campus entities must comply with the same security requirements as in-house activities. Definitions: Security is the state of being free from unacceptable risk. The risk in information technology concerns several categories of losses. Confidentiality of information Integrity of data Assets Efficient and Appropriate Use System Availability Confidentiality refers to the privacy of personal or University information. This includes issues of copyright. Integrity refers to the accuracy of data. Loss of data integrity may be gross and evident as when a computer disc fails, or it may be subtle as when a character in a file is altered. Assets that must be protected include: Computer and Peripheral Equipment Communications Equipment Computing and Communications Premises Power, Water, Environmental Control Communications Utilities Supplies and Data Storage Media System Computer Programs and Documentation Application Computer Programs and Documentation Information Efficient and Appropriate Use ensures that University IT resources are used for the purposes for which they were intended, in a manner that does not interfere with the rights of others. Availability is concerned with the full functionality of a system, e.g. finance or payroll, and its components. The potential causes of these losses are termed threats. These threats may be human or non-human, natural, accidental, or deliberate. Reasons for Information Technology Security: Confidentiality of information is mandated by common law, formal statute, explicit agreement, or convention. Different classes of information warrant different degrees of confidentiality. The hardware and software components that constitute the Universitys IT assets represent a sizable monetary investment that must be protected. The same is true for the information stored in its IT systems, some of which may have taken huge resources to generate, and some of which can never be reproduced. The use of University IT assets in other than a manner and for the purpose for which they were intended represents a misallocation of valuable Univeristy resources, and possibly a danger to its reputation or a violation of law. Finally, proper functionality of IT systems is required for the efficient operation of the University and are of paramount importance to the mission of the University. Roles and Responsibilities: Responsibilities range in scope from security controls administration for a large system to the protection of ones own access password. A particular individual often has more than one role. Administrative Officials, individuals with administartive responsibility for campus organizational units and individuals having functional ownership of data must identify the electronic information resources within areas under their control, define the purpose and function of the resources and ensure that requisite education and documentation are provided to the campus as needed, establish acceptable levels of security risk for resources by assessing factors such as how sensitive the data is, such as research data or information protected by law or policy, the level of criticality or overall importance to the continuing operation of the campus as a whole, individual department, research projects, or other essential activities, how negatively the operations of one or more departments would be affected by unavailability or reduced availability of the resources, how likely it is that a resource could be used as a platform for inappropriate acts towards other entities, limits of available technology, programmatic needs, cost, and staff support. Providers, inidividuals who design, manage, and operate campus electronic information resources, such as project manager, system designers, application programmers, or system administrators, must become knowledgeable about relevant security requirements and guidelines, analyze potential threats and the feasibility of various security measures in order to provide recommendations to administrative officials, implement security measures that mitigate threats, consistent with the level of acceptable risk established by adminstrative officials, establish procedures to ensure that privileged accounts are kept to a minimum and that privileged users comply with privileged access agreements, communicate the purpose and appropriate use for the resources under their control. Users, individuals who access and use campus electronic information resources, must become knowledgeable about relevant security requirements and guidelines, protect the resources under their control, such as access passwords, computers, and data they download. Key Security Elements: Logical Security: Computers must have appropriate software security patches, commensurate with the identified level of acceptable risk. Adequate authentication and authorization functions must be provided, commensurate with appropriate use and the acceptable level of risk. Attention must be given not only to large systems but also to small computers, which could constitute a threat to resources. Physical Security: Appropriate controls must be employed to protect physical access to resources, commensurate with the identified level of acceptable risk. These may range from extensive security installations to protect a room or facility where server machines are located to simple measures taken to protect a users display screen. Privacy and Confidentiality: Applications must be designed and computers must be used so as to protect the privacy and confidentiality of the various types of electronic data they process, in accordance with applicable laws and policies. Users who are authorized to obtain data must ensure that it is protected to the extent requred by law or policy after they obtain it. For example, when sensitive data is transferred from a well-secured server or mainframe system to a users location, adequate security measures must be in place at the destination computer to protect this downstream data. Technical staff assigned to ensure the proper functioning and security of University electronic information resources and services are not permitted to search the contents of electronic communications or related transactional information. For example, any scanning of network traffic to detect intrusive activities must follow established campus guidelines or organizational procedures to ensure compliance with laws and policies protecting the privacy of the information. Compliance with Law and Policy: FERPA Annually, 黨ǿ informs students of THE FAMILY EDUCATION RIGHTS AND PRIVACY ACT OF 1974 (FERPA), which affords students certain rights with respect to their education records. They are: Inspect and review the student's education records within 45 days of the day the University receives a request for access. Students should submit to the registrar, dean, head of the academic department, or other appropriate official, written requests that identify the records(s) they wish to inspect. The University official will make arrangements for access and notify the student of the time and place where the records may be inspected. If the records are not maintained by the University official to whom the request was submitted, that official shall advise the student of the correct official to whom the request should be addressed. The right to request the amendment of the students education records that the student believes is inaccurate or misleading. Students may ask the University to amend a record that they believe is inaccurate or misleading. They should write the University official responsible for the record, clearly identify the part of the record they want changed, and specify why it is inaccurate or misleading. If the University decides not to amend the record as requested by the student, the University will notify the student of the decision, and the vice president of the area concerned will advise the student of his or her right to a hearing regarding the request for amendment. Additional information regarding the hearing procedures will be provided to the student when notified of the right to a hearing. The right to consent to disclosures of personally identifiable information contained in the student's education records, except to the extent that FERPA authorizes disclosure without consent. Exceptions include disclosure to personnel within the institution who are acting in the student's educational interest, to officials of other institutions in which the student seeks to enroll, to persons or organizations providing the student financial aid, to accrediting agencies carrying out their accreditation function, to persons in compliance with a judicial order, and to persons in an emergency in order to protect the health or safety of students or other persons. The right to file a complaint with the U.S. Department of Education concerning alleged failures by 黨ǿ to comply with the requirements of FERPA. The name and address of the Office that administers FERPA is: Family Policy Compliance Office U.S. Department of Education 400 Maryland Avenue, SW Washington, DC 20202-4605 Copies of the full policy, including a directory of education records maintained on students in this institution is posted on the Registrar's Bulletin Board on the first floor of the Liberal Arts Center. Definition of Directory Information 黨ǿ hereby designates the following categories of student information as public or "Directory Information." Such information may be disclosed by the institution for any purpose, at its discretion. Category I Name, address, telephone number, e-mail address, dates of attendance, class Category II Previous institution(s) attended, major field of study, awards, honors, degree(s) conferred (including dates). Currently enrolled students may withhold disclosure of any category of information under the Family Educational Rights and Privacy Act of 1974. To withhold disclosure, written notification must be received in the Office of the Registrar prior to September 22, 2008. 黨ǿ requesting the withholding of "Directory Information" are available in the Office of Academic Records. 黨ǿ assumes that failure on the part of any student to specifically request the withholding of categories of "Directory Information" indicates individual approval for disclosure. MARYWOOD STUDENTS MAY BE ASSURED THAT EVEN WITH THEIR PERMISSION; DIRECTORY INFORMATION IS DISCLOSED ONLY ON RARE OCCASIONS. THE POLICY OF MARYWOOD UNIVERSITY ALLOWS THE DISCLOSURE OF SUCH INFORMATION TO NON-INSTITUTIONAL PERSONNEL ONLY FOR SERIOUS REASON AND AT THE DISCRETION OF THE PERSON RESPONSIBLE FOR THE STUDENT RECORD INVOLVED. HIPAA PRIVACY PRACTICES The Heath Insurance Portability and Accountability Act of 1996 (HIPAA) requires that health plans protect the confidentiality of private health information. A complete description of rights under HIPAA can be found in the Plans notice of privacy practices. For a copy of the notice, if you have questions about the privacy of your health information, or you wish to file a complaint, contact the Privacy Officer, Patricia E. Dunleavy, Assistant Vice President for Human Resources. Campus departments, units, or groups should establish security guidelines, standards, or procedures that refine the provisions of this policy for specific activities under their purview, in conformance with this policy and other applicable policies and laws. Policies that apply to all campus electronic information resource security include, but are not limited to, 黨ǿ Electronic Communications Policy and the Conditions of Computer Use Policy. Federal and state laws prohibit theft or abuse of computers and other electronic resources. Representative Activities specifically prohibited under this policy: Interfering with, tampering with, or disrupting resources Intentionally transmitting any computer viruses, worms, or other malicious software Attempting to access, accessing, or exploiting resources one is not authorized to access Knowingly enabling inappropriate levels of access or exploitation of resources by others, Downloading sensitive or confidential electronic information and/or data to computers that are not adequately configured to protect it from unauthorized access. Disclosing any electronic information and/or data that the individual does not have a right to disclose. Enforcement: Insufficient security measures at any level may cause resources to be damaged, stolen, or become a liability to the campus. Therefore, responsive action may be taken; for example, if a situation is deemed serious enough, computer(s) posing a threat will be blocked from network access. Administrators, faculty and staff members, students, and all others, whether on or off campus, are responsible for adhering to this policy. The University reserves the right to monitor network traffic, perform random audits, and take other steps to insure compliance with this policy. All users who violate this policy may be subject to restrictions. Employees and students may be subject to other disciplinary action, including termination of employment or student enrollment. The University and its component shall comply with all applicable federal, state, or local statutes, regulations, and ordinances, as they may be amended from time to time, relating to the privacy rights of students, including but not limited to the Family Educational Rights and Privacy Act (FERPA), the Health Insurance Portability and Accountability Act of 1996 (HIPAA), and Graham-Leach-Bliley Act. Resources: Contacts: Questions about this Policy or other campus electronic information resource policies may be directed to Information Technology: projectoffice@marywood.edu Report network security incidents to Information Technology: itsecurity@marywood.edu For 黨ǿ Policies and Procedures: http://www.marywood.edu/policy/ For reports about general computer use violations see "Conditions of Computer Use at: http://www.marywood.edu/policy/detail.html?id=95039&crumbTrail=Conditions%20of%20Computer%20Use&pageTitle=Policies%20and%20Procedures%20Manual:%20Conditions%20of%20Computer%20Use For National Standards to Protect the Privacy of Personal Health Information (HIPAA):  HYPERLINK "http://www.hhs.gov/ocr/hipaa/" http://www.hhs.gov/ocr/hipaa/ For Family Educational Rights and Privacy Act (FERPA):  HYPERLINK "http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html" http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html Related Documents: Policy Security for Administrative Computing User Passwords Policy IT Purchasing Policy Conditions of Computer Use Policy IT Physical Security Policy Supported Technology Policy IT Overtime Work Original Issue Date: June 16, 2010 Last Updated: October 10, 2017 changed OIT to IT -skb     Information Technology Security Policy Page  PAGE 9 Print date 11/13/08 Print Date 11/13/08 #KX_    K L O P x y  }q}fXLLLCh;mHnHuh5h&UmHnHuh5h 5mHnHuh55mHnHuh5h[umHnHuh5h mHnHuh5h]mHnHuh5h]5mHnHuh45mHnHu"h]h]5CJaJmHnHuh]5mHnHu"h]h]5CJ aJ mHnHuh]mHnHuhC"mHnHu jh h]UmHnHuJKX_k     ^gd5gd]@ ^@ gd] & F gd gd $a$gd]  = >   o q Onqr9uwxĹyyyyh5hqU5mHnHuh5hqUmHnHuh5h~mHnHuh5hZmHnHuh5hyz5mHnHuh55mHnHuh5h]5mHnHu h5h h5h 5mHnHuh5h]mHnHuh5h5e&mHnHu, 6 7 V h o 0 & FgdqUp^pgd] & Fgd]^gdqU^gd5gd]0VzGH^gd5^gd5gdqU^gdqU ^ gdqU & FgdqU"rs6Uab|6T禚禚~~~pd~ddddh5h[umHnHuh5hd~5mHnHuh5h[u5mHnHuh5hTy5mHnHuh5h~mHnHuh5hd~mHnHuh5hyz5mHnHuh55mHnHuh5hqU5mHnHuh5h55mHnHuh5hqUmHnHuh5hTymHnHu'abU:D7JKgd[u & Fgd[u & Fgd[u^gdTy^gd[ugdd~^gdqU^gd501bn 3 E V W Y u!Ϳۿۿۘیی󌘦h5hF mHnHuh5hF 5mHnHuh5hyz5mHnHuh55mHnHuh5h}W5mHnHuh5h[u5mHnHuh5h}WmHnHuh5h[umHnHuh5h~mHnHu4K!;0;<D E X ^gdF ^gd}W & Fgd}W^gd}Wgd}W & Fgd}WX Y !!!!""##%%%%%%&7'=))`, & F%dd[$\$gd5{f & F$dd[$\$gd5{f^gd5{f ^`gd5{fgd5^gdF ^gdF u!v!!!!!!/"0"""T#^###%$&$%%%%%%%&6'=)A)))`,-./{11556668Κxpi h:h5{fh5{fCJaJh5{f5CJ\aJh^hp{h5{f5 h^5\h5{f h5{f5\hnx0J5CJ\aJhrmHnHuhnxmHnHuh5hyz5mHnHuh5hF 5mHnHuh55mHnHuh5hF mHnHuh5h\mHnHu)`, -./{1T3456668899 ; ;O; ^`gd7^gdF 7$8$H$^gd5{f7$8$H$^`gd5{f ^`gd5{f & F)dd[$\$gd5{f^gd5{f & F&dd[$\$gd5{f888849599; ;M;N;P;Q;j;;;;;;;;;;<6<7<O<<<<<=1=2=3=d=i==== >>@ɽޱޱޱޱޱޱޱޱޱޱޱxhmHnHuh5h:mHnHuh5h:5mHnHuhnx0J5CJ\aJhrmHnHuh5h?nmHnHuh5hyzmHnHuh5hF 5mHnHu h5hWh5h\mHnHuh5hF mHnHuh5{fmHnHu*O;P;;;7<<2=====>>@@>B?B@BABMBgd7ugd?n ^`gd:^gdyz^gdnx^gd:^gd:gd_B^gdnx & Fgd?n^gdF @@=B>B?B@BABBBKBLBMBNBOBVBWBYBBBBBBC1C3C5CJCɽxof]fTfMIMEAhMhlh; h5hZhMmHnHuh;mHnHuhZmHnHuh [jmHnHuhZ5mHnHuh5h [jmHnHuh?nmHnHuh5hyzmHnHuh5hyz5mHnHuh5mHnHuh5h?nmHnHuh:5mHnHu h5hyzhnxhnxmHnHuhnxhnx0J5\h5hnxmHnHuMBNBXBYBBBBKCLC~CCCCDDLEMEFFFFWFnF & Fgd7u^gdgd^gdj^gd7u^gdM`gd7ugd7uJCLC}C~CCCCCCCCCCDDDDDEE,E-EJEKELEMEEEEEEEFFFFxoiahB*ph h7u0Jhh0Jhh0Jjh0JU h0J hhhh [j5hh0J5jhh5Uhh5 hj5hjB*phh5hZB*ph hxN"h7h7h75 hxN"hZ hjhjhjh5{fh7#FFWFFGGGFGGGKGLGNGOGQGRGTGUGWGGGGGGGGGGGGGGGGhZh5e&CJaJh5e&CJaJht0JmHnHu h5e&0Jjh5e&0JUh5e&h,wfը"_ "]}eF_EYWQ(kU5*}eF_EYWQ(kU5*}eF_EYWQ(ke_%BK ^D/*kU5*}eF_EY/~b B?yb Qܞd>\O2Gz.@ z%&Dͣ(sA$_wzxfLJeq3GMi+Y:G7ݻcOf,i;i%]oz'I[8<7o1aV{z=6|]bt9k5=9:Mf.->==aVc]0k BGgOo<٤-z 949AeGɒfsIX!%_S%EGkn=Ӥo)-7iBӦwѥD7xSo۲)щy|ҞmM;$lnEIm&D7خ}1|B~5ޫXc$ꂒZ?eo.ugO1d;-RwtDqUb&}VS5 2tdwB n&T\'uٛeEo}\?'s-mi 3d؜m7qtA%Eд'l'B'fVn\[:2tu_/nxj mZ= v]Mg١05jRc?6c%gsdEzU*}S]ͥ4eV#&O$|=zJSB R#&c3-w*> :vzjJ趜FIiЭ`-ZOĕ]6 U|tZĨMӠx=kJ%؀HلV|[Uл\eT@\RHӠ~'tQ#CazNT*MR&"kFΪ^mt*> :vnOl%:ZIЛ'=]6m58M:S۠9q@W"|%=ptK^ w,Лr%uv:E")n2NCWK8냀VYҩ<3dKsO:hKnYK2F*@6ag-:(xk9xƶ5>zFTFtyk,H8@gaB ش*> i[} ztҗx uZ.t$_´_5W[9n2Ano25U fRzzT [RF蠸l.C7ˆ. ^ҠFO /O# yl , e`ʒڳW~ɔJ#i+"T\l1h[+Gx-ǿm SᕛySzGt" [tBnS_lod /?zmXf*Üm@7R ѡ]F6xjQTP:n2zHg8h!i к,7U[l@8D{|AoLd[S+8oCo'㣃aZ1x.&ޔm$6y^?~w&Pgdػc--o ]tx(cgS3M^kO*D/DGo&wz45=">]>=tDc{tm]Ů4߇ UHN5e&2x Ktl t 80!/:[4+0Lpv֐\)ly:@&FdQḮc4K]sӌ͵.&1zs.:zurIoY>6)<[Wi)+XHx-Rqѡ11+1:;:%eCHALpx!:hΥdc=-wG՘C E3DOޔa3O;'PZRe FG9rrt@݇tQ%.zB( <}ݫ069Rww x*T-3J3MJ~yUl%5 .p-I*xTo5s&GůIF͹LO|\,W:㔠бpݨemf./<Ky25௯W, ]'EA9{kmH4{3Qҋ=qK~=+LޖȰЏ,::^Z4I0 Y[, :NzaGtKΞrfcQ%EW^nڐ{G Y|tYGU£c)Ev 'ۣkL[dt|~B5nrc%ic]cqEǬJTtAU` L<\D مsR!+Hk& {M]Kyk\6?Ĉ#Ɉ5#I37߀?qy$n1iΪ)Txhb^t? _#4E(tP&)^|tM7s  5'XuKzz;]`e@7[k6Xp=N )&0u4guf_8\:&K0|vԊ\tZ)0j.M@K ~ukW·J4>g=?k WJOdXפU$B߷?Y {TtO$ *$~CMPS裳{;= +/8.4zFˈN*cggi?~N|q WX%jzo>|w8ʶh5ުb?= I~:/ zs~ ݞ?Úc:+t].._ɫ?(/| _ELS!''[^/WIKy)T~u'Ͽeĩ:Q].c1w=z}7Gt+`h@ __.$8Fw$@793zd 'J4IB=0i#Ai:ik|Td_El7M|t ZIƇ`Xh)Mf_"+DoPIcRbKJڨ~vJ'>օF)t-2zB.윂E0dW-wT@φ5/>T +a>ſN.~'~"_2?П 1N'Ы!sˀNnj\\;7Y,~?ö`2qr@~8I0FC`t3GCN^}4:͓+,Š_m7=z 2vxۉ(.(}&C@Kx]9!A]#F7НQoePm %[lt0W)`#rWR2LϠћmʱn:o}xk,mklϝ|crUx V"_t}*C͗}ۯMś27GOV@ ˇ +XCdG|twuZe~*-F(_ Xj͜Z#!]2zoQq%u"^Q &л׽#>ZHbه, BspDns}{ͫ]ltZ|A}㒌#ݯ1.ؾz\&PJ4qn<(hvRg;L$GG]tqأm~@y=uىc ⡗NoD4_/Giye-3W&-{Ry`Pќ{\xtM9T킂 :t+bK)l4P\bЫ|Z.'iӡ p`.X֖h|-ҞVȄg_,*et;N!qzN=z)ct:.k䷰I4.OgOBϖݗrh$t!HȻg-@tޅQ%賋+׬G3L}}Vʥ@zgg"{zIC_ s[Nɟ`-¢S?{1ZMgc(x)0EGAW6),j1YLN3ΉwD>#>2Ϣ#3#/u#Y\Y0Ӑ]zї^;\V/xc9+G/$:y.tM7ztI:DãQҹrtN :03O]/Y1+Q1`ЛY8 S4o>x> z|7c]k /%:3Nԩ tߒj w{-ع!:hݟSs__ z;^Z zFoCnv=q7-z-/';^CusEjDuI |ɫ]-]Of臾O4 \u9'Cѡc2as  z[{`Uv6SC%iv  ϒz/LJG?=.'+D/%9.qqt/S-/ Upk2sM)At=ã>{ћ4 ttЁ%KѣdC}J^TR荗.,YSriJϴNuG{#ϴ*t8mB\n]< ';J"Fok- xx >z+Yw&2FkkxcxF vp:K ]zNF/ PT:!I MޢU~kdЙFlvt+|tc_le^T6̢G P.*vm,ћ~jۏ܅@9@m? ʯ*_ ЭBWMA^ҷϊt'$zշπM1Alj>0޺/^z=lk_ NtM7 t\ %7PeސalG֜S}% թ?W_yzOt8[}(]|LǿHƒŮ9Bux `Zy!!Y/OS@#{#t^kL: N'wk5B[bZT>gFwxñR./ mp yN\ׁ=>ߠߦۧ@Oca6/Dwn2uY)ٵ=| vje:/{ty+7/^ū>ڱE@:A IDAT~s]Jo|NFj=:/Bξ`3|=z_sGv OȞsS 9X0舦a^[tGN`-(htxBCVK+h7 y[@W灇/&?Xj* ;B/ۊ\ۼڸ*|OE2RRԏ6Wwm^>0\vX"tF f}l%+G }K|M;HrO|Gu*=:zV0 {Aok^ufw%1zoS~ܜ))r[`5"Dqn=Z5Ӫn2kiuO@vWjv;;3Yt@oHO= ;fxwZB}D ݐpeD#[ZN7)  zaޒ{wݎY<z_kp +{#lǖ츭sq7?]T(KX/d2˾}AP (ݡDf*kd/\Eѥ7zףêƝE !<~ %BN}ah]Q[Zw؆J(;WL%<= pU ܱ>z y\k^-%n9ӹF<ҡ߀ N -_[!]~/0⭸&<''/[\?K6z}iM`#rx%E.Vht[X/9'o ]V<MC>Bã%at^l]sM7EͿRKX]:jM,:v80?[a-'a,s+ڱBҮ5yQA{/%ر􃣣ڪ-vEyMzF|zC'ҮEѥj'`Q~T6,ysMp0`AҞER,.(QENڱp@_I,:*xGϒ "#WUԢB](9RžT]s.8LU)t8`q*뻬Zb0${XOЛFoBm.1MMo›~<XIF51} oy'͢(4zIMc+$&][Ğ(-ix@fWv9<Kߡk]4rkK]ͫH;.>\_Q+T0zM|.Fo'\P3EgrB..؋ :t2V%5r0W]Me<:FVv#oCG[[oRKtS0:}.߱;&hD1D0f͂~Kp)1M&^uA ãK9jt,PEG4_"Ұ‚a&qYgd6mї.h>)ƢQZ<%7eU8^?:I;_Ab%B{%8 :8ewh=7.1h哐׾eї.W;<{w~A oWx|~,cօ,#ޭ5طxT/-U [6Џzg!y6tZְ< ֺ*̹BuТ7tȲr&?[A(cm̩ 6{&[ڗ Go]B,Цktu1ב :ćG }БXB7:+ϩ4zY,|hzt%jnIT㐵%_axh<¾%Z + QU?F/ˣcEJp`&Vv,zp1eatȽ͗ętЇ=Jݩ (;v Lb[gިgЋEYV~nZy_q,Np'>/Z҂Ј/^W~-hA di+iLmJ*jڱO;-J^1dcS.9w7;T^bfA/$j.,Jx3K#^֩B=q<&l^6}N08z-xh@.+<`=ڱLхAVF a{9W'@o`1-ZvO|)ܼQU;6Rhuщ],Y %U!dDGS]-ܟÎ̀ (*W(ul\Rð5DŲj TaQG XI%? }6.Wn1Î]l4v LL> @ CgÎ͇7XntX1 =~ytV9ף[q(ͮG֌Q֏Y'+}s^9K\V'Z\u2Gsn/W쵝:-&^~=V.C@U=qUɀ6pХmףê&DgOѦ>3r2Y)cˣw+* Bb3]౪)ba@GiYEӶ9g˘[ FFvכmn`P3F` Aؒ,.s~}-z2;KY} '@uhs˧¥M#K ջ !K@cUkw6hyd*?зr:v*5LkG E/<Z_hx5cB:(߽l@Bӥom%A[1[ʁ^_|z'^cfeըEO|MEԠCWɢɁ4;v w2XV 7OluUFv\~?8_) .jl8*0bo^ev֠'խ@ovwя?׆MDQK/m|4Y[@}Ϝ&Џ0`]GEt!w ̾)#% 6r{\ztʉe~<ۛz}.Wߖmε+k(TitƶχΎ7 ۷MPzDɑPܛFWL䇽:SxVno,/9D/=~d'N|"Ez3f-;] (79]ߩg 67,n}3VS3$ّ}ܳލ!;l+}.wyAPX9zX{UC%\zIdA \.y^mܖ }ʱj=?>^y6f![ iXGo˃ 9HK?G%I |WyvqYv}R[TX}U;'bW{BuL xozE}WN:2s8|o68D |.%Cΰ:W p@D~3 ;8o{A{} H-Ds͑[@ǫ9\lb\} ZsT;2It;W_Z.>#¨6鳾.$0gg/́ڰֹ<:ᵜ |.tyNCWszw~hOn$*k>J˵cVfl>tЍOr>X2r|n=ȝl \N36z[z3)$z٩#<М |6-񴔧 u+ь͇9JfR=6fllzo,ESiFUgEuen*D/T2sT|teYɆީ=넄IB5MifDv'W!ꬶ\Vtb>C]LE|oWӼ\FVvtD]檞`W:rrLD /uʧЌRw~#V6r{Z>Ɉ$ s`Fzp^ ?xGT咜 6(H=AX 7琬ŌcL$wzS)Y0=/jN]}4Rv<"yόz};kˍކ%7(aʗWߔu6E +;S9q&۳].i,QSa$woλ=:zKFG6#"˄=>zZt$D^ãžGoFo']fCuzsm)uGtP!mêg-zKH=.g{6^O'}$Fo`dTr;ZѻvzNVt:Wtߦ1xH[NJ7>k' G:Ο@61-)  nImb㣋 ˠK+ ˥\NM]x~t+Ыc yyѧr&:h A U?3m݆Лg@́ݢgPq)Y1TDãOz+E@RO=T]OVxC\D/RO{2ٹm0zuu}l{?6pWQӣA~г(u6׿Ssm菌>RW^>Rr EЊJC@iAtmy\DFл1tjP<`N'@i sup},]#X'z*|f|C c-B/g>7ЀױgRs +Fo׋oj:á[?3SώN.p= ٵ\%}g2Β<)tAU+06_=v5Vkc!I81ʉ1:J-jYM*y9@7Ha!E_t~HS6C1pН=[:FC>[j]߀"lj\? yWǴS*YԪ?@1y5Sbݦh=EO*(3}Cx SO'SGO*hC1z'k3==`nlB!Qo5.E,Ч>qGK =pQcM`3:Dz"+u78no(^ɾѹ$tgLe.ze to,!N3aWqz; ݲډ.~4Oe}BmvHz Dz>>Tk Ws5H7X@g .F??"]>hЃ 9=U qA|Tz4bte͋d I:1&Kp3PEk&;!:K7-+$Dw/Q?ݤ5^&3Ӟ+2؜AgG:NC?\tţnt%D}c-^gC_8")½Or=kOGgBQ_:mS,GAgSE6eCzzHӓC_Ecg>kCCGW^ 5s3Vs-@'c ݱrtGe[z) ۊ_=\R 9襣͠7<~ctfnH3=4z@8<^D)WAutg=UEj6^,n4DWn4WW-gUũ1NIp5Msh\sRA\Ex;NM&ړٵiίޑ$p Ltod=f ݿq?Nֹμg)t@.k^7tg3ioS81t+{~zЯ_jg`E9m/ *zu+twxfe]4z"!tnL!zb@{et}5w x5\+@WF뉡4;`w$:r*[!]j6z7#uX5: $竈}j??-XOf7Ĩw%g;_˪Óިs3<y; 0xۉ z3YN Ps;9:ĈQ7ĮZ@VֻwkSrit Agz'BםC5N+3,s*f_\;~bujF?\]0Tr'4Fg*9>\f 7CFuD t!4;+{߉$ zwtg\[usk^Ś,ΨGm zff:_z9ibtdtW[T[Нu赙T.= |s.@' OE ;\ &Ng=B/\Wl Btc~Ģs!?=5)rv[_V2z9wD;qZAC趔Aoo<!:)΀LMU~t:8 <LbDOΡkʿv:Ӕ$ǝʝUD`$z-tQYčW#ݩ\?ݎa9\荣,A/ A$:"M.VY ul/&\Wu}t~\7CGg+D׾ SSBoTARVpa 矀^\٢z?w"zp7b)czzBWFhGNA7ݸi:UѹAZ0z;^jU?w\N 5yPq2k/di?=P 6z \7v(^<3zLtcz1tpL&Чr۳8@t:ToVLD #w'/zSЋ3Ĥn.zE2/׹+B*2@SWV*^/E WA' t6=O5;ڨ6Xts,*ΗEoHu a|8]rzuut`֏s\e~*:sѽ.EU3o`8 =tht'Zϗ1zmKslJw7DպǺc3i’gK^F-&!zו@W+iK۹ݢ]93-$y0H zI$ѾE+^ڰa:1{RIUW{qČ,t+}ݿv"z8Щލ0Wg3]R)C2YxEf>Qg1쨟 *%CM6ZG4Vqzyz zu:C»r=tEtz ?hkn2n<CV`ޮ5D7>>14SblGyf }OzhyPgP^I#-uiNCOF硳S V69ԋmb4M=hUڅwkey9zgn1һ#@q$>}0zrbT88 [k'{Ze:?C7GFz!2NG5f^\԰\ƿJ_yDm zi4qD={豩Gͫ z7Q9qK$zX:w2>Gg.:w6L_`ޞ=N ^뾧МcNͥ(7}Itz uя8y,D1zB忟А"T1"tIeZJ&墇K 559 aOJ׻9[{7hB6 @C9CbM[se#II6ߚVr0JF5C YS-1uVNn-.eI?I]nruIN^:+! 5 ,W9'4RKfxEMV.G˔s62 Qz0zeQiDO螡ua iǠhv<;皽CO;YëH,^+f߫%襃ν0\$`aw3,7-j'gp;Y)Yx͹`EPZrG/A7,® 64:Ns8z-1v 3T^z]~oP""lOk0*zz,ByRM=,X-(u}xMA]MX0 hJgO^ub HuЃXTm ;TztK?F| dt Bםcf%.D-JW~/Ű# @z @I_x0z7=(k]G4bDNF9{]@W1~ zΜf gO*EXA&Л"P`R=dt0bt2 ]YoCS8 z;)OznEh lt&KeMY: [Fg \ؓѻ"{Jx\wuuCrp3,Mx1б.Us=wI4@]puI`DEE(0 TLCX\/}fGt_pJ_k5dvEؿQѕ8=)T&L kу0e{QѕuWQNJEX!R yιE^TlСA}D0kO>͹S-^.%FsЏbz}2zH$ )%9yi:?貭 B$,Ii-FpE`&p&bMڈ6P)SWGGcas;=㎤fK/Uu$\Usΰxl.|&YՌ\oCvvT D5FP0š%/+R*x^DC'چuj\t9~X}zd3'CH9ܦEo0@sn2QHA.ѣv0F)n=iDeN%z47R}xjltJ7@oGC!hXZEg"q:s,9j7§Vc?kϋDU:xs]EOs'Ƽ^T\sn]ck.ՍAJlzy'hCg:=\ =FG/ǽ%Q&~6zsmtY,tS(z[@OM]ћB"nfwz-9h8}+g9."\7NْDn㫣N(naYR6n.Y]C4^& Qoޛs RoO^?zCR%:&˧/zo]=m6#5ESnA'xq:%"J|=@wD7!E΁^If7xdhd"zpE衩=k^zd#:tȼL##7F ~I_$z$^xxjApat@zb0:ަCK5Ȁ5o=,It6A/?:(h HFS9[Ϟd=QƇXYxߏ"j}It)nN}%˙xzE !0Oy~GbOEXHOҞF/ BXvz$D?F/eꡑ fEO.O3_QĢ-镖g/M7N3lAbtMR3t`7+mD" Iwf˥ފ| Gu.0|֞ Fo"NDgit?I(O@5k^B|4w{eBXǿOSGtQ]ĴUeI; }Q65ʆF(eC_lk }Q65ʆF(eC_lk }Q65ʆF(eC_lk }Q65ʆF(eC_lk }Q65ʆF(eC_lk }Q65ʆF(eC_lk }Q65ʆF(eC_lk }Q65ʆF(eC_lk }Q? GIENDB`^ 0hH02 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH @`@ NormalCJ_HaJmH sH tH R@R 7 Heading 1dd@&[$\$5CJ0KH$\aJ0Z@Z  Heading 3$<@&5CJOJPJQJ\^JaJDA`D Default Paragraph FontRiR  Table Normal4 l4a (k (No List 4@4 ZHeader  !4 @4 ZFooter  !.)@. F Page NumberH@"H &U Balloon TextCJOJQJ^JaJ4U@14 yz0 Hyperlink >*phFAF 7Heading 1 Char5CJ0KH$\aJ0RQR Heading 3 Char5CJOJPJQJ\^JaJ2Oa2  headerslevel1FVqF FollowedHyperlink >*B*ph*W@* nx`Strong5\B^@B nx0 Normal (Web)dd[$\$.X. nx@Emphasis6]@@ nx List Paragraph ^PK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3N)cbJ uV4(Tn 7_?m-ٛ{UBwznʜ"Z xJZp; {/<P;,)''KQk5qpN8KGbe Sd̛\17 pa>SR! 3K4'+rzQ TTIIvt]Kc⫲K#v5+|D~O@%\w_nN[L9KqgVhn R!y+Un;*&/HrT >>\ t=.Tġ S; Z~!P9giCڧ!# B,;X=ۻ,I2UWV9$lk=Aj;{AP79|s*Y;̠[MCۿhf]o{oY=1kyVV5E8Vk+֜\80X4D)!!?*|fv u"xA@T_q64)kڬuV7 t '%;i9s9x,ڎ-45xd8?ǘd/Y|t &LILJ`& -Gt/PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!0C)theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] ?p FF[[qt u!8@JCFG$&)+.0245 0KX `,O;MBnFWGG%'(*,-/1367=,=J===>?XX:ACt!8@0(  B S  ? _Hlt215972468 _Hlt215972469 _Hlt264443830====D=?@@@>=>==???????????????????????????%&!!--0/5155888?:?:::::::;1;;;;<<<=>>>>????????????????%&0/5155888?:?:::::::;1;;;;<<<=>>>>???????????????)Г658<8lu|y`ZJ( ,Dh $1r1r=$MN h@bgk޹xV?{*[>{[>{*[>{8o2[>{l7$[>{8M *[>{n*[>{ZD7[>{ F[>{3z5R[>{ R[>{8%'WlX[>{AuX[>{E$\[>{8_[>{8| j`[>{AEi=imp8yl[>{mAEiW%o[>{Gx[>{>=],2 Z:;W07C"xN"5e&S'G2U29&UqU5{f [j?nns?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgijklmnopqrstuvwxyz{|}~Root Entry FAData 9]1Tableh6WordDocument ;pSummaryInformation(DocumentSummaryInformation8MsoDataStore`uAAK2HMOQ1B3==2`uAAItem  PropertiesUCompObj r   F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q