ࡱ> hrefguk%`  bjbj"x"x @@ :*,j@ !j n&:'LP'P'P')6) B)$yhL:(")::VVP'P'Ň>>>:HV8P'P'>:>>0d0gP'& >T;$`e$.p\ۇ0 e- =B-Hgg"-glJ).>2,5J)J)J)M>jJ)J)J) ::::jj$ rd~jjrjjVVVVV  EMBED Word.Picture.8  MAINE DATA BREACH STUDY Pursuant to Resolve 2007, Chapter 152 Prepared by the Staff of The fb88 Bureau of Financial Institutions November 24, 2008 John Elias Baldacci Anne L. Head Governor Commissioner Lloyd P. LaFountain III Superintendent DATA BREACH STUDY TABLE OF CONTENTS INTRODUCTION PART I: CURRENT LAWS AND REGULATIONS RELATING TO DATA PROTECTION AND RECOVERY 1) Disclosure of data breach 1 a) fb88s Notice of Risk to Personal Data Act 1 b) Federal guidelines 2 2) Protection of data 3 a) Federal guidelines for banks and credit unions 3 b) Requirements of the Fair Credit Reporting Act 4 c) Responsibilities of non-financial institution entities 5 d) The PCI Standard 5 3) Recovery from data breach 6 a) State and federal laws protecting consumers from fraud loss 6 b) Compensable damages under common law 7 c) Statutory liability for data breach losses: other States 9 d) Federal data breach legislation 10 PART II: STUDY FINDINGS 1) Responses by fb88 financial institutions to incidents of data breach 11 a) Introduction 11 b) Narrative questions and summary of responses 12 2) Costs Incurred by fb88 financial institutions due to incidents of data breach 18 Conclusion 24 APPENDIX A: Data Security Breach Questions 25 APPENDIX B: Resolve 30 INTRODUCTION The Bureau of Financial Institutions (the Bureau) was required by Resolve 2007, chapter 152, to study the impact of data security breaches on fb88 banks and credit unions, including financial institutions response to data breaches and the actual costs and expenses incurred by financial institutions as a result of such breaches. The focus of the study is on those breaches that were reportable under fb88s new data breach law known as the Notice of Risk to Personal Data Act, 10 M.R.S.A. 1346 (fb88s Data Breach Law). As required by the Resolve, the Bureau prepared this study in consultation with the fb88 Credit Union League, the fb88 Association of Community Banks, the fb88 Bankers Association, and the New England Financial Services Association. Under fb88s Data Breach Law, which was passed by the Legislature in 2005, a security breach is defined as the unauthorized acquisition of an individuals unencrypted computerized data that compromises the security, confidentiality or integrity of the personal information. It requires that fb88 residents receive notice when a security breach has occurred. For most entities, notice is required when, after investigation of the loss of personal information, misuse of the personal information has occurred or is reasonably possible to occur. Various data breach notification laws have also been passed in other states in response to a growing national concern about identity theft in the wake of several large and well publicized data breaches. Over 44 other states have passed legislation with similar notice requirements for data breaches. The purpose of the notice requirement in these laws is to allow consumers the opportunity to take steps to protect themselves from financial harm. Notice encourages consumer vigilance in reviewing credit reports and account statements for unauthorized transactions. If unauthorized transactions are discovered, consumers may take advantage of other consumer protection laws to avoid having to pay for these unauthorized transactions. Before discussing the impact of data breaches on fb88s financial institutions, Part I of this Report will review the various laws, guidelines and regulations that help prevent identity theft by requiring or encouraging safekeeping of personal information by financial institutions and other businesses. In addition, Part I will touch upon those laws that help individuals avoid liability for unauthorized charges and reclaim their identity. Part II of this Report will present the findings of the Bureaus study. PART I: CURRENT LAWS AND REGULATIONS RELATING TO DATA PROTECTION AND RECOVERY 1) Disclosure of data breach a) fb88s Notice of Risk to Personal Data Act fb88s Data Breach Law requires disclosure to a fb88 resident when a person or organization that maintains unencrypted computerized personal information becomes aware of a security breach and determines that misuse of the residents personal information has occurred or is reasonably possible to occur. The rules are stricter for information brokers, such as ChoicePoint and Reed Elsevier, the parent of LexisNexis, that collect information for the primary purpose of furnishing personal information to nonaffiliated third parties. Information brokers must provide notice whenever a breach occurs, whether or not harm is likely to occur. Thus, fb88s Data Breach Law has a tiered notice requirement depending upon whether or not the entity responsible for the information is an information broker. Pursuant to fb88s Data Breach Law, notification requirements apply to all personsincluding colleges, universities and State Government. fb88s Data Breach Law is typical of many other state laws in defining what type of lost personal information requires notification. Personal information is defined in 10 M.R.S.A. 1347(6) to consist of a persons name, or their first initial and last name, in combination with any one or more of the following identifying data element(s): social security number, drivers license number or state identification card number; account number or credit card number or debit card number if circumstances exist whereby the number could be used without additional identifying information. Personal information also includes data elements when not used in connection with a name if this information would be sufficientto permita person to fraudulently assume or attempt to assume the identity of the consumer whose information has been compromised. Importantly, fb88s Data Breach Law, like other state laws, does not require notification if the data that are lost, stolen, or accessed by an unauthorized person have been encrypted. fb88s Data Breach Law requires that notice must be given to residents expediently and without delay, but consistent with the legitimate needs of law enforcement or with measures necessary to determine the scope of the breach. When notice of breach is required, notification can be provided either in writing or electronically. In the case of very large breaches, fb88s law allows for substitute notice via email, conspicuous posting and statewide media, if: (a) providing normal written notice would cost over $5,000; (b) the number of affected persons exceeds 1,000; or (c) there is insufficient contact information. Notice must also be sent to the Department of Professional and Financial Regulation if the entity is regulated by the Department (i.e., a fb88-chartered bank or credit union). If the entity is not regulated by the Department of Professional and Financial Regulation, notice must be sent to the Office of the Attorney General. Similarly, the Office of the Attorney General is generally responsible for enforcing fb88s Data Breach Law. However, in cases where entities are regulated by the Department of Professional and Financial Regulation, such as financial institutions, the relevant Bureau within the Department is responsible for enforcement. In either case, if an entity fails to disclose a breach as required by the law, it may be fined up to $500 per violation, and up to $2,500 per day. In addition to penalties for persons that fail to disclose a data breach, fb88 recently passed a criminal law designed to deter and punish those who misuse identifying information like that obtained in a data breach (17-A M.R.S.A 905-A). A person is guilty of the class D crime of Misuse of Identification if they knowingly present a credit or debit card that is stolen, forged, canceled or obtained as a result of fraud or deception. Furthermore, law enforcement agencies are now required to make a police report and provide a copy of the police report to the consumer in the event that a consumer has reported the misuse of personal information (Title 10, 1350-B). b) Federal guidelines Pursuant to fb88s Data Breach Law, financial institutions that comply with the security breach notification requirements of rules, regulations, procedures or guidelines established pursuant to federal law are deemed to be in compliance with the requirements of fb88s Data Breach Law as long as the law to which the financial institution is subject is at least as protective as fb88s Data Breach Law. Financial institutions are covered by the federal Interagency Guidelines Establishing Standards for Safeguarding Customer Information or, in the case of credit unions, the Guidance on Response Programs for Unauthorized Access to Member Information and Member Notice (collectively, the Federal Guidelines) and are thus exempt from the notification requirements set forth in state law. The Federal Guidelines state that banks and credit unions should develop response programs that specify actions to be taken when they suspect or detect that an unauthorized individual has gained access to customer information systems. The Federal Guidelines formed the basis for fb88s Data Breach law, and are thus substantially similar. 2) Protection of data a) Federal guidelines for banks and credit unions In addition to the Federal Guidelines mentioned above, the Federal banking regulatory agencies issued two further Guidelines and updated another in 2005, all of which relate generally to the protection of personal information in light of electronic and Internet-based banking. The Interagency Guidelines Establishing Information Security Standards and the NCUA Guidelines for Safeguarding Member Information (the Security Guidelines) were first issued in 2005. The Security Guidelines established standards relating to administrative, technical and physical safeguards to ensure the security, confidentiality, integrity and proper disposal of customer information. The Security Guidelines were issued with a view toward preventing or responding to foreseeable threats to, or unauthorized access or use of, customer information. In 2005, the Federal regulatory agencies also updated their Guidance entitled, Authentication in an Electronic Banking Environment (the updated Authentication Guidance) originally issued in 2001. Pursuant to the updated Authentication Guidance, the Federal agencies state that single-factor authentication is inadequate for high-risk transactions involving access to customer information over the Internet or the movement of funds to other parties. The updated Authentication Guidance further states that financial institutions offering Internet-based products and services to their customers should use effective methods to authenticate the identity of customers using those products and services. b) Requirements of the Fair Credit Reporting Act The Fair Credit Reporting Act, later amended by the Fair and Accurate Credit Transaction Act, contains many consumer protection measures related to data collection and consumer reports. One provision requires credit card machines to truncate all credit and debit card numbers on non-manual receipts. The Fair Credit Reporting Act also requires each national credit bureau to provide a free credit report within 15 days of a consumers request annually. Another new and important provision requires that the federal bank and credit union regulators issue guidelines requiring all financial institutions to actively seek out and prevent identity theft by looking for and responding to red flags that indicate potential problems. These federal guidelines require the establishment of an identity theft prevention program within every financial institution that is designed to detect, prevent and mitigate identity theft in connection with covered accounts, including personal debit and credit card accounts. Financial institutions must have developed an identity theft prevention program that is appropriate to the size and complexity of each institution by November 1, 2008. The elements of the program must include procedures to identify and detect patterns, practices, or activities considered to be red flags that indicate possible identity theft. Once identified, financial institutions may respond accordingly. Relevant red flags include alerts, notifications or other warnings from consumer reporting agencies or fraud detection services. These red flags may include notice of data breaches from credit card processors or third party retailers. When a bank or credit union discovers a red flag, the guidelines suggest a number of responses. Appropriate responses may include monitoring the account; contacting customers; changing passwords; closing accounts; notifying law enforcement; or determining that no further response is warranted. These suggested responses are consistent with the actions described by fb88s financial institutions, as set forth in Part II of this Report. These actions help prevent identity theft, defined in the guidelines as a fraud committed or attempted by using the identifying information of another person without authority. c) Responsibilities of other non-financial institution entities Although far less comprehensive, non-financial institutions are subject to some control over their use and storage of customer data. The Federal Trade Commission (the FTC) has adopted de facto national data security standards for non-bank creditors that are covered by the Federal Trade Commission Act. In 2005 and 2006, the FTC announced significant settlements with entities, including ChoicePoint, that have had personal information data under their control breached or compromised (FTC File No. 052-3069). Pursuant to a settlement with the FTC, ChoicePoint agreed to pay a $10 million civil penalty and another $5 million in consumer redress. The settlement also required ChoicePoint to implement new procedures to ensure that it provides consumer reports only to legitimate businesses for lawful purposes, to submit to third-party audits for 20 years, and to establish and enforce a comprehensive information security program. The FTC has also settled data breach actions against BJs Wholesale Club, Inc. (In the Matter of BJs Wholesale Club, Inc, FTC File No. 42-3160) and Discount Shoe Warehouse (In the matter of DSW Inc., FTC File No. 052-3096). Each of these settlements required these entities to establish and implement a comprehensive information security program and to submit to third party audits for 20 years. In these cases, the FTC instituted the action, not as a deceptive practice, but as an unfair practice. The FTC did not charge these entities with having misstated their standard for data security; rather, the entities were charged because they did not adopt a minimal level of security for personal information data, thus leading to data breaches. d) The PCI Standard In addition to the laws that seek to prevent data breach and deter identity theft, the card industry itself has standards designed to prevent breach and deter fraud. These are known as the Payment Card Industry Security Standard (the PCI Standard). The standard originally began as a number of individual programs established separately by each of the major credit card companies. The common goal of these programs was to create an additional level of protection for customers by ensuring that merchants met minimum levels of security when they stored, processed and transmitted cardholder data. Following the creation of the Payment Card Industry Security Standards Council, these credit card companies aligned their individual policies and, on December 15, 2004, released the PCI Standard. Pursuant to the PCI Standard, an entity processing, storing, or transmitting payment card data must be PCI Standard compliant or risk losing its ability to process credit card payments and being audited and fined. All merchants and service providers who accept, capture, store, transmit or process credit and debit card data are subject to PCI compliance. PCI compliance includes 12 major requirements which emphasize the need for encryption, access controls and firewalls. A single violation of any of the requirements can trigger non-compliant status. 3) Recovery from data breach a) State and federal laws protecting consumers from fraud loss When a persons personal information is lost pursuant to a data breach, there are a number of laws that help to protect against identity theft and also permit them to recover any losses they may have suffered. fb88s Act Regarding Identity Theft Deterrence, 10 M.R.S.A. 1312, enables consumers to place a security freeze on their credit report so that an unauthorized third party may not apply for credit in that persons name. The federal Fair Credit Reporting Act also allows a fraud alert to be placed on a persons credit report to alert potential creditors of a problem. In addition, consumer reporting agencies must block reporting of information in a personal credit report file if it is related to identity theft, and furnishers of information are prohibited from repolluting an identity theft victims credit report with erroneous credit information. Both State and federal law permit free copies of credit reports to allow individuals to review their reports for irregularities. Once fraud has taken place, the Electronic Funds Transfer Act (implemented by federal Regulation E) protects consumers in the event of data breach occurrences. Pursuant to section 205.6(3) of Regulation E, as long as a consumer provides notice to their financial institution within 60 days from the date when the consumers account statement containing an unauthorized transaction has been sent to the consumer, the consumer will not be liable for any amount of any unauthorized transactions on their account. However, if the consumer fails to give notice within this 60 day period, the consumer may be liable for any transactions occurring after the close of this 60 day period and before the consumer gives notice to the institution. In the case of an unauthorized use of a credit card, under federal Regulation Z and fb88s Truth-in-Lending law, a consumer's liability is limited to $50 even when they have not notified the card issuer of the unauthorized use of their credit card. When the consumer has provided timely notice, they are not liable for any unauthorized transactions. b) Compensable damages under common law Recent cases have shown that, when determining whether or not financial institutions may obtain restitution for losses sustained as a result of third party data breaches, the law is still not settled. In 2006, suits brought by Sovereign Bank and BankNorth, N.A. against BJ's Wholesale Club Inc. were dismissed by a Pennsylvania Federal District Court. Both financial institutions reissued cards following a massive data breach at BJ's and, as a result, incurred significant expenses, including the costs of issuing new cards to replace those that had been compromised by the data breach. Sovereign Bank and BankNorth claimed damages as a result of their costs incurred because of the third-party data breach, and framed their claims on several causes of action. On the financial institutions' claims for breach of contract against the retailer, the Pennsylvania Federal District Court held that the financial institutions were not intended third-party beneficiaries of the contracts between BJ's and the credit or debit card companies. Accordingly, it determined that the financial institutions could not succeed against BJ's for breach of contract, particularly in light of the fact that the contracts between BJ's and the credit and debit card companies specified that they were not for the benefit of, and not intended to be enforced by, any third party. Thus, the failure of BJs to protect data was not a violation of any agreement with the banks. Similarly, the Pennsylvania Federal District Court took a restrictive view of the types of losses that are compensable when the financial institutions' actions are framed in negligence. The Court applied the economic loss rule, adopted in many states, which bars recovery in a negligence claim for economic damages alone. The Court held that the economic loss rule barred the financial institutions' negligence claim because they claimed damages only for economic losses, not for damages to persons or property. In July 2008, however, the 3rd U.S. Circuit Court of Appeals reversed the lower courts ruling on the issue of whether the financial institutions which issued the cards were third-party intended beneficiaries of the contracts between BJs and the credit or debit card companies (3d Cir. 07/19/08). Specifically, and without actually deciding that the financial institutions were entitled to damages, the Court held that there was an issue of fact as to whether or not the financial institutions were third-party intended beneficiaries. Accordingly, the lower courts grant of summary judgment on this issue was reversed and the case has been remanded back to the District Court. If allowed to sue as third party beneficiaries, financial institutions may receivesome compensation for breach of contract. (The court found that BJs had breached its contract with VISA, more particularly, VISAs operating regulations which include the Cardholder Information Security Program, or CISP, providing for security requirements relating to the protection of cardholder information.) In summary, the issue of whether or not financial institutions may obtain restitution at common law for losses sustained as a result of a third party data breach is still an open one, pending final determination by the courts. c) Statutory liability for data breach: other States fb88s law does not contain any specific provision for private causes of action that may be brought by individuals subject to a breach or by third parties affected by a breach, or damages or remedies to which they may be entitled. Although several states have considered amending their data breach notification laws to include such a provision, only one state, Minnesota, has enacted a law providing for liability for costs incurred by affected third parties, such as financial institutions, as a result of data breaches. Minnesotas law was passed in August 2007, and the section in the law providing liability for costs became effective on August 1, 2008. Minnesotas law provides that, when a data breach has occurred due to an entity having retained personal information for longer than 48 hours after a transaction has been authorized, a violation under its law, the entity shall reimburse the financial institution that issued any access device affected by the breach for the costs of reasonable actions undertaken by the financial institution as a result of the breach. Under Minnesotas law, these costs may include, but are not limited to: (1) the cancellation or reissuance of any access device affected by the breach; (2) the closure of any deposit, transaction, share draft, or other accounts affected by the breach and any action to stop payments or block transactions with respect to the accounts; (3) the opening or reopening of any deposit, transaction, share draft, or other accounts affected by the breach; (4) any refund or credit made to a cardholder to cover the cost of any unauthorized transaction relating to the breach; and (5) the notification to cardholders affected by the breach. The financial institution is also entitled to recover costs for damages paid by the financial institution to cardholders injured by the data breach. In 2007, Californias House and Senate passed a similar bill that would have held entities in violation of its provisions liable to all owners and licensees of the information for the reimbursement of all reasonable and actual costs of providing notice to consumers pursuant to the breach and for the reasonable and actual cost of card replacement as a result of the data breach. However, this bill was vetoed by the Governor. The Governor, in vetoing the bill, claimed that the proposed law would be too onerous to businesses, especially small ones. The Governor also cited the PCI Standard that already established minimum data security standards for storing, processing, and transmitting credit card data, as another reason for vetoing the bill. Several other state legislatures, including Illinois, Massachusetts, Texas and Connecticut have introduced bills providing for compensation to be paid to financial institutions for costs incurred as a result of a data breach. However, none of these bills has become law. d) Federal data breach legislation Because of the different approaches to data breach notification at the state level, there has been a strong push by the private sector for Congress to enact a federal data breach notification law. Numerous data security and data breach notification laws have been introduced in Congress but none has specifically provided for private parties to sue for damages as a result of third party data breaches. There have been several differences between the House and Senate bills including, by way of example, their approach to preemption of state data breach notification laws, adoption of specific encryption standards, penalties for breach of the law, and what triggers notification requirements. PART II: STUDY FINDINGS 1) Responses by fb88 Financial Institutions to Incidents of Data Breach a) Introduction The Bureau surveyed state and federal financial institutions headquartered in fb88 about their experiences responding to data breaches. The Bureau received responses from both state and federal-chartered financial institutions, and from banks, thrifts and credit unions. In all, there were 50 credit unions and 25 banks that responded to the survey. The Bureaus survey contained two parts. The first part was comprised of twelve questions to which financial institutions provided narrative responses. These questions focused on the responses of financial institutions to data breaches. To capture as much relevant information as possible without placing an onerous burden on the industry, the Bureau limited the questions and framed them in a generic fashion. The responses to these questions were varied in detail and thoroughness. Nevertheless, the summaries of these narratives paint a useful broad brush picture of how fb88s financial institutions have been affected by data breaches and how they have responded to them. Since January 1, 2007, there have been two major data breaches affecting fb88s financial institutions. These have been the TJX (a corporation that owns TJMaxx, Marshalls, HomeGoods, and other retailers) data breach which became known to financial institutions in January 2007, and the Hannaford Bros. Co. (Hannaford) data breach which became known to financial institutions in March 2008. Although there were occasional instances of other isolated data breaches, the survey results showed that they affected a small number of financial institutions and their affect on those financial institutions and customers was limited. The Bureau, in summarizing the responses, thus organized the data breaches as follows whenever possible: the TJX data breach, the Hannaford data breach, and other data breaches. Furthermore, the Bureau, in consultation with the fb88 Credit Union League, the fb88 Association of Community Banks, the fb88 Bankers Association and the New England Financial Services Association, determined to limit the scope of the survey to those breaches affecting 25 or more fb88 resident customers at each financial institution. Thus, not all data breaches have been captured by the survey. Set forth below are the questions posed by the Bureau and the summaries of the responses to these questions. b) Narrative questions and summary of responses The Bureau asked each financial institution to identify each breach affecting that financial institution that involved 25 or more fb88 customers and that occurred since January 1, 2007. The Bureau asked each financial institution to be as specific as possible in identifying each breach, e.g., entity name where the breach occurred (including the name of your financial institution, if applicable), or, if unavailable, the entity type, date or code number, as indicated on any CAMS (Compromised Account Management System) or similar fraud alerts. Responses Financial institutions reported that it was not uncommon for them to receive several alerts for each data breach event. CAMs alerts were the only alert mentioned by name. These are electronics messages sent out by Visa after it has verified that a potential account compromise has occurred. Many of the financial institutions listed all of the CAMs alerts that they received. Although these CAMs alerts did not identify the source of the breach, the Bureau was able to identify and group these CAMs alerts by source, inferring from the proximity of the dates of the CAMs alerts and their code numbers. Because of the publicity surrounding the TJX and Hannaford data breaches, several financial institutions were able to identify the source of the breach without reference to any alert. The Bureaus survey revealed that most of the responding financial institutions were affected by the TJX and Hannaford data breaches. Almost all reported being affected by the Hannaford data breach. Only eighteen out of the responding financial institutions reported being affected by other data breaches captured by the survey. The Bureau asked each financial institution to provide the date the breach was reported to regulators under 10 M.R.S.A. Chapter 210-B for each breach that occurred at the financial institution. Responses There was only one report of a data breach that occurred at a financial institution since January 1, 2007. Pursuant to 10 M.R.S.A. Chapter 210-B, this financial institution notified the Bureau of this breach shortly after the breach occurred. For each breach that occurred at the financial institution, the Bureau asked the financial institution to describe how and when the breach was first detected within their financial institution. Responses In the case of the financial institution at which the breach occurred, the financial institutions risk management team was promptly notified by the employee responsible for the inadvertent breach. For each breach that did not occur at the financial institution, the Bureau asked each financial institution how and when it first learned of the breach. Responses The majority of the financial institutions responded that they first learned of each breach through the CAMS alerts that they receive. As mentioned above, a CAMS alert is an email sent out by a card issuer (i.e., Visa) after it has verified that an account compromise potentially has occurred. The CAMS alert notifies financial institutions of the accounts that may have been compromised. One financial institution responded that it first learned of a breach by a local news report. Several other financial institutions reported that they first learned of data breaches directly from their card or data service processors (e.g., Elan, Metavante and Fair Isaac), and one reported learning of the breach through the fb88 Association of Community Banks (MACB). It was not clear in all cases whether the service providers or MACB were responsible for the initial reporting of the breach to these financial institutions. For each breach that occurred, the Bureau asked each financial institution to describe what personal information was breached, to the extent it is described in any breach notifications, such as CAMS alerts, received by the financial institution (e.g., Track 1 or 2 data). Responses Although the responses to these questions were not uniform, generally, the personal information that was breached with respect to the TJX data breach involved only Track 2 data. The term Track 2 data means that the information contained in the magnetic strips of credit and debit cards is less dense, does not contain alphabetic text and, hence, does not contain the cardholders name. Track 2 data include: the primary account number, the expiration date, the service code and certain discretionary data. The term Track 1 data, on the other hand, means that the information contained in the magnetic strips of credit and debit cards is more dense, does contain alphabetic text and, hence, contains the cardholders name. Track 1 data include the following: the primary account number, the cardholders name, the expiration date, the service code, and certain discretionary data. Although not all financial institutions reported the type of information that was breached by data breach occurrence, for those that did, it appears that only Track 2 data were compromised for the TJX and other smaller breaches but that Track 1 and 2 data were compromised for the Hannaford data breach. Some financial institutions made the distinction between Track 2 full data whereas others did not. However, this distinction was not explained. Generally, with respect to any small breaches, only Track 2 data were compromised. The only exception to this was an internal breach that included the names of bank customers. For each breach, the Bureau asked each financial institution to identify/specify how many accounts at the financial institution were breached, and how many customers were affected by the breach. The responses to this question were inconsistent, with some financial institutions reporting numbers of accounts affected, others reporting customers affected, and others reporting cards affected. Others did not specify, providing numbers only, which meant that the Bureau had no way of determining whether the financial institutions were referring to accounts, customers or cards. However, in all three cases, the numbers reported were generally of the same order. Of those financial institutions that reported the number of cards breached, many of the cards (as many as half in one case) were already no longer active and thus did not require deactivation (or hot carding). Responses In general, the number of accounts, customers or cards affected at each financial institution was proportionate to the financial institutions total assets (i.e., the smaller the financial institutions assets, the lower the number of accounts affected). With respect to the TJX breach, the lowest number of accounts affected at an individual financial institution was 26 and the highest number was 5,460. With respect to the Hannaford breach, the lowest number was 95 and the highest number was 11,793. Without exception, every financial institution that was affected by both the TJX breach and the Hannaford breach reported a greater number of accounts affected by the Hannaford breach. See Table 7 below for more details. For each breach, the Bureau asked each financial institution to describe any audit(s) related to the breach that were conducted to determine what accounts were breached. Responses For many financial institutions, no audits were conducted. Rather, they decided to re-issue all customers cards. For those financial institutions that did conduct audits, this process involved compiling card numbers from the CAMS alerts, and determining which of these card numbers were still active. These active cards were then blocked (or hot carded) and new cards were re-issued. In a minority of cases, financial institutions provided their customers with the option of having their cards replaced. Only after customers notified the financial institution that they wished to have their card replaced was the old card blocked (or soft carded). Otherwise, the decision to replace cards was made unilaterally by the financial institutions. Any reporting of unauthorized or fraudulent activity on accounts was followed up by manual reviews of those accounts to verify whether or not unauthorized or fraudulent activity took place. For each breach, the Bureau asked each financial institution to describe the steps taken by the financial institution in response to the breach. Responses The purpose of this question was to capture any relevant activity conducted by financial institutions not covered elsewhere in the survey questions. The responses varied widely and thus it is difficult to summarize them. Some financial institutions either repeated or referred to their answers to other questions. In addition to this information, some financial institutions reported on the communication chains following discovery of a breach, starting with internal notifications to management and employees, followed by notification to customers, providing website alerts, establishing hotlines, hot carding or soft carding cards, reissuing new cards, and monitoring of unauthorized or fraudulent activities. Prior to determining which customers needed to be notified, financial institutions conducted research to determine which accounts were (a) affected by the breach and (b) still active. This involved cross-checking account lists provided by the CAMS alerts and the financial institutions own lists of accounts. Once a database of account numbers that (a) had been affected by the data breach and (b) were still active (or not already hot carded) had been made, risk management teams next determined whether or not to hot card all of the affected accounts, soft card accounts of those customers wishing their existing accounts closed and new ones opened, or allow continued use of the compromised accounts. Once this was determined, a decision was made regarding how to notify customers. Generally, financial institutions decided to mail notifications to customers, informing them that their accounts would be hot carded and that new cards would be issued together with pin numbers. Through the financial institutions vendors, a new card and PIN number were produced and sent to customers. For each breach, the Bureaus asked each financial institution to describe if, when and how it notified its customers of the breach. Responses As stated above, the majority of financial institutions notified their customers of the data breach by letter, indicating that notification by letter was the most efficient way to communicate the data breach, particularly with respect to the larger data breaches that occurred at TJX and Hannaford. In addition to sending letters, some smaller financial institutions notified their customers by telephone, some financial institutions posted website alerts, and at least one established a dedicated hotline for customers who had questions about the data breach. For each breach, the Bureau asked each financial institution how many accounts, if any, were subject to unauthorized or fraudulent transfers and what amount from the financial institution was transferred fraudulently or without authorization. Responses Much of the hard data relating to this question may be found below in this Report. The majority of financial institutions reported no unauthorized or fraudulent transfers. Of the 71 affected financial institutions, 25 reported unauthorized or fraudulent transfers. In one case, the unauthorized activity involved only one account and, in most cases, fewer than 25 accounts. In another case, by contrast, the number of accounts which may have been subject to fraudulent transfers due to the breach was 265, and the amount subject to unauthorized or fraudulent transactions was reported to have been $75,000. For each breach, the Bureau was asked to describe any media communications (oral, electronic and print) by the financial institution in relation to the breach. Responses Only two financial institutions reported any media communications. Two CEOs were interviewed on local news stations. For each breach, the Bureau asked each financial institution to provide other relevant information, if any, in relation to the breach not described above. Responses No further relevant information was provided. 2) Costs Incurred by fb88 Financial Institutions due to Incidents of Data Breach As stated above, 75 financial institutions responded to the survey. Of the 75 respondents, 71 reported being affected by a data breach since January 1, 2007 and incurring expenses reported at $2.1 million. The Hannaford breach had the largest impact, affecting the most institutions (71), the highest number of affected account holders (243,599), and had the largest dollar cost ($1.6 million). TABLE 1 IMPACT SUMMARY TJXHannafordOtherTotalInstitutions Affected52711871Accounts Affected64,825243,5998,008316,432Cards Reissued54,737186,8854,857246,479Estimated Cost$485,245$1,595,444$62,760$2,143,450 The survey requested data on several categories of expenses, segregated by direct and indirect cost, as well as data on number of accounts affected and estimated hours. Because of the various degrees of completeness and inconsistencies in reporting the data, the aggregate data is imperfect. Further, detailed comparisons between the TJX breach and the Hannaford breach are limited, mostly because more and better records were generally maintained on the Hannaford breach based on the experience gained from the earlier TJX breach. Nevertheless, despite its weaknesses the aggregate data are considered representative of costs to fb88 financial institutions in response to the subject data breaches. As seen in Table 1, there is a fairly significant variance between the number of accounts affected and the number of cards reissued. The difference is attributable to two primary factors: (1) each account reported as affected in a CAMs alert is not an active account the account may have been previously closed or is inactive; and (2) every institution did not automatically reissue all affected cards in the TJX breach, two institutions reissued only at the customers request and, in the Hannaford breach, four institutions reissued only at the customers request. The Survey identified 13 expense categories, but only three were utilized by a majority of the respondents and more than 95% of the expenses fell into four categories (net fraud losses being the fourth).(Table 2) TABLE 2 EXPENSE SUMMARY TJXHannafordOtherTotal$%$%$%$%Investigation71.614.8184.911.613.421.3269.912.6Communication72.615.0218.613.713.221.1304.514.2Reissuance285.158.8859.553.919.531.11,164.254.3Net Fraud36.27.5299.518.80.40.6336.115.7Other19.64.032.92.116.225.968.83.2TOTAL485.2100.01,595.4100.062.8100.02,143.5100.0 $ in thousands. For the TJX breach, 32 of the 52 affected institutions reported an Investigation Expense (Table 3), ranging from a low of $62 to a high of $21,000. The five largest accounted for 54% of total Investigation Expense. For the Hannaford breach, 47 of the 71 affected institutions reported an Investigation Expense, ranging from a low of $100 to a high of $29,983. TABLE 3 INVESTIGATION EXPENSE TJXHannaford# Affected5271# Report3247Highest$21,000$29,983Lowest$62$100Highest Individual29.3%16.2%Top 553.6%46.4% For the TJX breach, 42 of the 52 affected institutions reported a Communication Expense (Table 4), ranging from a low of $24 to a high of $23,895. For the Hannaford breach, 62 of the 71 affected institutions reported a Communication Expense, ranging from a low of $24 to a high of $27,809. TABLE 4 COMMUNICATION EXPENSE TJXHannaford# Affected5271# Report4262Highest$23,895$27,809Lowest$24$24Highest Individual16.2%12.7%Top 546.4%38.7% For the TJX breach, 49 of the 52 affected institutions reported a Reissuance Expense (Table 5), ranging from a low of $60 to a high of $32,146. For the Hannaford breach, 70 of the 71 affected institutions reported a Reissuance Expense, ranging from a low of $250 to a high of $58,278. TABLE 5 REISSUANCE EXPENSE TJXHannaford# Affected5271# Report4970Highest$32,146$58,278Lowest$60$250Highest Individual11.3%6.8%Top 542.9%24.7% For the TJX breach, gross fraud losses of $44,898 were reported by six institutions with one institution reporting a fraud recovery of $8,652. For the Hannaford breach, gross fraud losses of $318,213 were reported by 22 institutions with three institutions reporting fraud recoveries of $18,698. The Hannaford fraud losses occurred in more than 712 accounts (five of the 22 institutions that suffered a fraud loss did not report the number of accounts). Additionally, several respondents that did not report any fraud losses stated that fraud losses could not be tied to a specific event. The non-fraud expenses were more concentrated in a few institutions in the TJX breach than in the Hannaford breach as five institutions accounted for 39% of total expenses (excluding fraud) in the former vs. 20% in the Hannaford breach. TABLE 6 NON-FRAUD EXPENSE CONCENTRATION TJXHannafordTop 110.2%5.0%Top 539.1%20.2% The non-fraud expenses were also reviewed in relation to total assets and number of cards reissued by each of the responding institutions. As seen in Table 7 below, the total non-fraud expense is in all instances very proportionate to the cards reissued, for both the TJX breach and the Hannaford breach. For example, in response to the TJX breach nine institutions each reissued between 500 and 999 cards, which in the aggregate represented 11.3% of the total cards reissued and the total non-fraud cost to those nine institutions was 11.0% of the total non-fraud cost for the TJX breach. TABLE 7 DISTRIBUTION BY CARDS REISSUED TJXHannaford Cards Reissued# FI% Cards% Exp% Fraud# FI% Cards% Exp% Fraud0 499217.810.234.0111.31.70.0500 999911.311.00.073.04.34.01,000 2,4991640.043.735.12018.520.126.42,500 4,999530.726.530.82138.936.039.85,000 7,499110.18.60.0924.926.024.77,500+00.00.00.0313.311.95.0TOTAL52100.0100.0100.071100.0100.0100.0 While the correlation between percentage of cards reissued and percentage of non-fraud expenses is not as concentrated based on asset size as based on number of cards reissued, the variance is not considered significant. See Table 8. The 15 institutions with assets between $100 million and $249 million accounted for 32.3% of the cards reissued and 30.2% of the total non-fraud expenses related to the Hannaford breach. TABLE 8 DISTRIBUTION BY ASSET SIZE TJXHannaford Total Assets # FI% Cards% Exp% Fraud# FI% Cards% Exp% Fraud0 992222.115.82.33834.931.535.4100 2491433.137.01.81532.330.213.8250 49957.04.80.067.65.93.1500 74945.37.239.445.79.723.3750 999516.923.856.5613.518.816.91,000+215.511.50.025.93.97.4TOTAL52100.0100.0100.071100.0100.0100.0 Assets are in millions of dollars. Tables 7 and 8 also show that there is no correlation between cards reissued or total assets and net fraud losses in either the TJX breach or the Hannaford breach. The survey also requested an estimate of the number of hours the institution spent in responding to the breach. Not all institutions that experienced a breach provided an estimated number of hours nor did all institutions provide an estimated number of hours for each expense category recognized. For example, an institution may have reported an investigation expense but not attributed any hours to that action. Nevertheless, most respondents provided some information regarding the estimated number of hours. Table 9 shows the average minutes and the range in minutes per reissued card, based on the number of cards reissued. For the nine institutions that reissued between 500 and 999 cards and that reported their estimated hours related to the TJX breach, the average time per reissued card was 13 minutes, with a low of 4 minutes and a high of 28 minutes. TABLE 9 TIME DISTRIBUTION BY CARDS REISSUED TJXHannafordCards Reissued# FIAveRange# FIAveRange0 49915254 20611144 49500 9999134 286251 731,000 2,49914165 531892 252,500 4,999342 52071 215,000 7,499155862 157,500+0N/A211 2TOTAL42122 - 2066571 73 Table 10 provides the same data as Table 9, but is based on the asset size of the institutions. For the 34 institutions with assets less than $100 million, the average time per reissued card was 8 minutes, with a low of 1 minute and a high of 49 minutes, in addressing the Hannaford breach. Only three institutions, two for the TJX breach and one for the Hannaford breach, reported spending more than an average of 60 minutes per reissued card; only three other institutions reported spending between 30 minutes and 60 minutes, on average, per reissued card. That most institutions spent less time, per reissued card, on the Hannaford breach than on the TJX breach, is attributed to the timing of the breaches; i.e., the TJX breach occurred first and therefore provided a roadmap for responding to the Hannaford breach. TABLE 10 TIME DISTRIBUTION BY ASSET SIZE TJXHannafordTotal Assets# FIAveRange# FIAveRange0 9915142 363481 49100 24912115 601562 21250 499554 7621 7500 7494205 2064172 73750 9995154 53561 151,000+155188TOTAL42122 - 2066571 73 Last, while 18 institutions reported a total of 36 data breaches occurring since January 1, 2007, the number of accounts affected was relatively small and the dollar cost comparatively minimal. Further, because of the manner of reporting, generally it was not possible to determine if a breach was common to more than one institution. Conclusion There is an ongoing debate as to whether current data breach notification laws are effective in providing consumer protection and whether they should specifically provide for liability in all circumstances. Although it is not the purpose of this Report to advocate a particular position in this debate, the Bureau hopes that the information provided in this Report will be useful to the Legislature in its deliberations. APPENDIX A: Data Security Breach Questions Data Security Breach Questions Introduction Pursuant to L.D. 2139, the Bureau of Financial Institutions, in consultation with the fb88 Credit Union League, the fb88 Association of Community Banks, the fb88 Bankers Association and the New England Financial Services Association, was mandated to conduct a study of the impact of data security breaches on fb88 banks and credit unions since January 1, 2007 that have or should have been reported under fb88s Notice of Risk to Personal Data Act. The Bureau was further mandated to submit its findings to the Insurance and Financial Services Joint Standing Committee by December 1, 2008. Data security breach" means the unauthorized acquisition of an individual's computerized data that compromises the security, confidentiality or integrity of personal information of the individual maintained by a person, including banks and credit unions. Personal information means an individuals first name, or first initial, and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted or redacted: Social security number; Drivers license number or state identification card number; Account number, credit card number or debit card number, if circumstances exist wherein such a number could be used without additional identifying information, access codes or passwords; Account passwords or personal identification numbers or other access codes; or Any of the data elements contained in paragraphs A to D when not in connection with the individuals first name, or first initial, and last name, if the information if compromised would be sufficient to permit a person to fraudulently assume or attempt to assume the identity of the person whose information was compromised. Good faith acquisition of personal information by an employee or agent of a person on behalf of the person is not a data security breach if the personal information is not used for or subject to further unauthorized disclosure. Pursuant to Title 9-B, all submitted surveys will be treated as confidential by the Bureau. Information from the surveys will be aggregated and summarized, and the Bureaus findings will be submitted in a manner so that no individual financial institution will be identified. Scope Please provide information relating to data security breaches that have: (a) occurred since January 1, 2007; and (b) affected 25 or more customers at your financial institution who are fb88 residents. Include those data security breaches that had an impact on your financial institution, whether or not the breach occurred at your financial institution. Submission deadline Complete and submit this survey to the Bureau by no later than August 15th, 2008. General directions There are two parts to the survey: Part I requires narrative responses to your institutions process in identifying and responding to breaches and Part II requests costs incurred in responding to the breaches. We understand that exact dollar amounts may not be known for all expenses incurred and therefore the use of estimated costs, if explained, is acceptable. Additional guidance for completing Part II is provided below: Directions for completing Part II All costs should be based upon information available to your financial institution. If precise figures are not available, please justify any estimated costs. All costs are per breach. Complete a separate spreadsheet for each breach identified in Part 1, Question 1. Indirect costs are any costs that are not considered direct costs, such as lost productivity. Report only those indirect costs that are incurred as a result of the breach. Do not report indirect costs that would have been incurred in any event (e.g., fraud department). For all indirect costs, provide an accounting/explanation as to how such costs were calculated. All categories of costs are mutually exclusive. Do not include a cost in one category if it has been included in another category. Completed surveys should be sent to: Bureau of Financial Institutions Department of Professional and Financial Regulation 36 State House Station Augusta, ME 04333-0036 Email:  HYPERLINK "mailto:BFI.info@fb88.gov" BFI.info@fb88.gov To send a secure message, go to the following Zix site to set up an account and log in. HYPERLINK https://maine-securemail.net/s/login?b=stateofmaine https://maine-securemail.net/s/login?b=stateofmaine If you have any questions, contact Christian Van Dyck at (207) 624-8574. SURVEY QUESTIONS Name of Financial Institution: Contact person: Telephone number: Email address: Part I: General Questions (provide brief narrative responses) Identify each breach affecting your financial institution and involving 25 or more fb88 customers that occurred since January 1, 2007. Be as specific as possible, e.g., entity name where the breach occurred (including the name of your financial institution, if applicable), or, if unavailable, the entity type, date or code number, as indicated on any CAMS (Compromised Account Management System) or similar fraud alerts. For each breach that occurred at your financial institution, provide the date the breach was reported to regulators under 10 M.R.S.A. chapter 210-B. For each breach that occurred at your financial institution, describe how and when the breach was first detected within your financial institution. For each breach that did not occur at your financial institution, describe how and when your financial institution first learned of the breach. For each breach, describe what personal information was breached, to the extent it is described in any breach notifications, such as CAMS alerts, received by your financial institution (e.g., Track 1 or 2 data). For each breach, identify/specify how many accounts at your financial institution were breached, and how many customers were affected by the breach. For each breach, describe any audit(s) related to the breach that were conducted to determine what accounts were breached. For each breach, describe the steps taken by your financial institution in response to the breach. For each breach, describe if, when and how you notified your customers of the breach. For each breach, how many accounts, if any, were subject to unauthorized or fraudulent transfers and what amount from your financial institution was transferred fraudulently or without authorization? For each breach, describe any media communications (oral, electronic and print) by your financial institution in relation to the breach. For each breach, provide other relevant information, if any, in relation to the breach that is not described above. Part II: Costs (Complete the spreadsheet. Leave shaded cells blank.) Identify breach and date of occurrence: DirectIndirectAffected AccountsEstimated Hours$$##1. Internal Investigation (a) Audit/research (b)Legal (c) Data Processing/IT (d) Other2. Customer Communications (a) initial notification (b) subsequent communications( (c) public media(3. Reissuance costs (a) credit card reissuance (b) debit card reissuance (c) other reissuance (e.g., checks)4. External Legal (a) Investigation/consultation (b) Defendant/third party costs (c) Plaintiff costs5. External Audit6. External Consultant7. Fraud Losses( (a) Insurance Recovery( )8. Judgment( in favor( )9. Judgment( against (a) Insurance Recovery( )10. Settlement paid out (a) Insurance Recovery( )11. Settlement received( )12. Free/Discounted Services to customers13. Other (Identify)TOTAL PLEASE NOTE: Legislative Information cannot perform research, provide legal advice, or interpret fb88 law. For legal assistance, please contact a qualified attorney. Resolve, Directing the Bureau of Financial Institutions To Study Data Security Breaches in the State Sec. 1 Bureau of Financial Institutions directed to study the effect of security breaches in fb88. Resolved: That the Department of Professional and Financial Regulation, Bureau of Financial Institutions, in consultation with the fb88 Credit Union League, the fb88 Association of Community Banks, the fb88 Bankers Association and the New England Financial Services Association, shall conduct a study of the impact of data security breaches since January 1, 2007 that have or should have been reported to state regulators under the fb88 Revised Statutes, Title 10, chapter 210-B on fb88 banks and credit unions, including the response of financial institutions to such breaches and the actual costs and expenses incurred as a result of such breaches, to the extent information is available; and be it further Sec. 2 Reporting date. Resolved: That the Department of Professional and Financial Regulation, Bureau of Financial Institutions shall submit its findings under section 1 to the joint standing committee of the Legislature having jurisdiction over insurance and financial services matters by December 1, 2008. LR 2889, item 1, SIGNED on 2008-03-17 123rd Legislature, page 1.  On October 22, 2008, the FTC announced that it would suspend enforcement of the new Red Flags Rule until May 1, 2009, to give non-bank creditors and state-chartered financial institutions additional time in which to develop and implement written identity theft prevention programs. However, this announcement does not affect other federal agencies enforcement of the original November 1, 2008 deadline for institutions subject to their oversight to be in compliance.  In the Report of the Department of Professional and Financial Regulation to the Joint Standing Committee on Insurance and Financial Services on Public Law 2005, Chapter 379, An Act to Protect fb88 Citizens from Identity Theft, the issue of whether or not to establish a private cause of action for consumers was raised and recommendations were made. The Department recommended the establishment of a private cause of action for actual damages suffered because a party subject to the proposed legislation failed to investigate a breach or failed to make timely notice. The Department, however, did not recommend permitting recovery for a technical violation if no actual damages occurred, and did not recommend recovery of double or treble damages, nor punitive or other exemplary damages.  Minn. Stat. 325E.64 (2007)  See Appendix A: Data Security Breach Questions ( Item 2(b). Includes all forms of internal and external communications, as well as call center costs. ( Item 2(c). Includes oral, electronic and print media. ( Item 7. Losses sustained as a result of actual fraudulent or unauthorized transfers from accounts. ( Items 8 and 9. Includes any final court order or arbitration award in favor of your financial institution or pursuant to which your financial institution has been ordered to pay any damages and/or costs.     PAGE 30 MAINE DATA BREACH STUDY PAGE 29 MAINE DATA BREACH STUDY PAGE 9 MAINE DATA BREACH STUDY PAGE 27 MAINE DATA BREACH STUDY RESOLVE Chapter 152, 123rd fb88 State Legislature Resolve, Directing the Bureau of Financial Institutions To Study Data Security Breaches in the State RESOLVE Chapter 152, 123rd fb88 State Legislature Resolve, Directing the Bureau of Financial Institutions To Study Data Security Breaches in the State LR 2889, item 1, SIGNED on 2008-03-17 - 123rd Legislature, page . Explanations/Justifications: ________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ ]c  - . / 񹬠xl\P\P\P\P\P? h5>*B*CJ\aJphhZghZg6>*CJhZghZg6>*CJOJQJhZghZg>*OJQJhZghZg>*CJOJQJhZghZg:>*CJOJQJhZghZg>*@hZghZg>*@CJ$hZghZg5:>*CJ0hZghZg>*jhZghZg>*CJU-j3: hZghZg>*CJUVmHnHuhZghZg>*CJj hZghZg>*CJU7C]^_`abc $ $ Ha$gd` 0 H$ Ha$$a$ -       . / 0 B T a dhgdb<dhgdcZ $da$gdjL $da$gd1$ Ha$ (#gd` f!gd` !gd` $gd` (# $/ 0 B S T         0 1 2 3 8 @ A O ´~tj`V~tj~`~`~`~~h8K>*B*phhVV>*B*phha9>*B*phhoy>*B*phhdz>*B*phhjO>*B*phhx9>*B*phhz/ >*B*phhB[hdz5>*B*phhB[hL5>*B*phhcZhg-5>*B*phhcZh1Z5>*B*ph h1Z5>*B*CJ\aJph hZg5>*B*CJ\aJph!   3 i  V s_ # dh^`gdFp # dh^gdVV # 8hdh^8`hgdVV # dh^gdFp # dh^gdVV # dh`gdzh # dh^`gdjO # dh^`gdVV # dh`gdjO O P Y Z ` a f g h i n        " + / 0 : ; I J O P S T U V Y [ g h o p u v | غ캰찺h>*B*phhz/ >*B*phhoy>*B*phhC>*B*phha9>*B*phhjO>*B*phhVV>*B*phhdz>*B*phhx9>*B*phA| }       κⰦĦ؜ynynhL5>*B*phhg-5>*B*phh1ZhR5>*B*phhL>*B*phhg->*B*phh;, >*B*phh]>*B*phh>*B*phhoy>*B*phhz/ >*B*phhjO>*B*phhVV>*B*phh>*B*phhx9>*B*ph+V  R g  0 H I # dhgdjO dh`gdb< # dh^gdFp # dh`gdFpdhgdb<dh^`gdb< # dh^gdVV # dh^`gdVV & ' 6 7 C D H I N O Q R W c d f g l v w طجؕ؋hOJ>*B*phh8K>*B*phhLhL>*B*phhz/ 5>*B*phh$>*B*phh$h$>*B*phh$5B*phhjO>*B*phhFp>*B*phhx9>*B*phhL>*B*ph1  , / 0 9 : E G H I J K W X :ȾobXNbAh1Zh l>**T>**>**1$>**󳦴ܽ$5>**p󳦴ܽ<5>**p95>**pL95B*p<>*B*phhLB>*B*phhC}>*B*phh91>*B*phhjO>*B*phhL>*B*phhLhZ>*B*phhLhOJ>*B*phI J K X Z~afgh#a%$dh`a$gdb<$dhdd[$\$`a$gdD[j $dha$gdb< $dhxa$gd$dh`a$gdb<$dhx`a$gdk $dhxa$gdKL dhxgd:;@ABCDEFIMiYZlnpy~|}~JK  `a¸Ϟ枖zzpch1ZhH>*B*phhZ;>*B*phh91>*B*phh1ZhC>*B*ph he1A>*h1Zh,>*h1Zh,>*B*phh1Zh1>*B*phh1>*B*phh91hH$N>*B*phh1Zh l>**)>**1$>**1W>**#ջծyհ))5>**󳦴ܽ$5>**󳦴ܽ<5>*B*phh>*B*phhr9>*B*phh >**>**1>**1+>**1,>**1>**1H>**᳢>**91>**<>*B*phCIKLOcdef0*,->N )*B ENikиибةؗ؍{{w{{{hhZ; h1Zh, u h1ZhH$Nh1ZhH$N6]h1Zh lB*ph h1Zh91h91h&at h1Zh&athZ;B*phh&atB*phhg;B*phh)B*phh1ZhH$NB*phh1ZhH$N6>**pDz6>**p..<DIYckm&3j""""""""##9#I#K#_#f#########^$~$$$$$$$%^%h1Zh, u\ h 2\ h J\ h&at\h1ZhL+\hrhh6h h1ZhL+ h1Zhkgh&ath J h1Zh lhThAhZ; h1ZhH$N?^%`%a%%9&O&k&&'((( ((((((1(A(B(X()9)\)q))))) **:*;*<*b*c*********üyyuquhg-h h1Zht4 h1Zhkg hrhkg hrhH$Nhrhj h1ZhL+ h1ZhH$N h)6]h1ZhH$N6] h6]h1Zhkg6] hoy6]hoyh1Zh 25OJQJ\^Jh 25OJQJ\^J hL+\ h 2\,a%((,,,-!023 79;@<?xABB F$dh`a$gdb<$dhdd[$\$`a$gd$dh`a$gd$dh`a$gdb< $dha$gdb<$dh`a$gdb<***++9+K+Q+++%,*,4,Y,y,,,,,,,,,,,,,,,--A-L-Q-W-u-x--yoyeoeh J>*B*phhj>*B*phh1ZhC>*B*phhjhj6>*B*phhoy6>*B*phhj6>*B*phhoy>*B*phh1ZhH$N>*B*phhjhj5 hoy5 h5 hyw5hH$N h1Zht4 h1ZhChg- h1ZhH$Nh J h1Zhkg%--7.8.A.B.u.v.w.|.......///0!0+0:0\0_0p0q000ݿݲ襲貘wobXhrB*]phhrhkgB*]phhrB*phh1ZhL+B*phh1ZhH$NB*phh1ZhkgB*phh1Zh 5A>*B*phhrhH$N>*B*phh1ZhH$N>*B*phh1Zht46>*B*]phhrht4>*B*]phhr>*B*]phhrhH$N>*B*]phhr>*B*ph00000000000111111111111122 22222233~vl_Wh JhH$N6h Jh J6B*phhoy6B*phh JB*phh4qB*phhUB*phh1ZhL+B*]phh1ZhL+6B*]phhYBhL+B*]phh1ZhH$NB*phh1ZhL+B*phh1ZhWB*phhrhkgB*]phh1ZhkgB*]phh1Zhkg6B*]ph!33t33344 55555556677!828<8J8b8v8889::::::; ;2;5;E;F;K;L;T;渮}}}sishyw>*B*phhg;>*B*phh1Zh,>*B*phhYB>*B*phjhK0J>*B*Uphh J>*B*phhU>*B*phh1Zhf>*B*phh1Zh0?>*B*phh>*B*phh$">*B*phh1ZhH$N>*B*phh1Zh 5A>**);;;;;;;<<!<?<@<<<<<='=B=R=j===>'>B>L>g>8@z@@@@@@@̼~w~n~w~w~j~wf~f~b~^b^b~hahGhhh1ZhH$N0J h1Zh-L h1ZhH$NhU!h JhH$N56OJQJ\^J"hhU0J6OJQJ]^Jh JhV:[56OJQJ^Jh JhL56OJQJ^Jhoy56OJQJ\]^Jh1ZhH$N>*B*phhU>*B*phh1Zh,>*B*ph#@@BBBC8CCCCCCCCEE FFFGG9HҺxxcSAS4Sh5OJQJ\^J"h1ZhH$N0J5OJQJ\^Jh1ZhH$N5OJQJ\^J)hG5B*OJQJ\^JmH phsH )h5B*OJQJ\^JmH phsH /h1Zh5B*OJQJ\^JmH phsH )h J5B*OJQJ\^JmH phsH /h1ZhH$N5B*OJQJ\^JmH phsH $h1ZhH$N56OJQJ\]^Jhoy56OJQJ\]^J h1ZhH$Nh J F:HXHHLcOPPBSVX\]]ydhdd[$\$`gdC}$dh`a$gd$dhdd[$\$`a$gd$dhdd[$\$`a$gdD[j$dh`a$gdb<$dh`a$gdb< $dha$gdb<$dh`a$gdb< 9H:H;HHWHXH\HiHHHHHHHHHHHI+I7I;I?IGIhIkIIĴqdqWqWqWqWdWqWqIh1ZhU5OJQJ^JhU5OJQJ\^Jh E5OJQJ\^Jh1ZhU5OJQJ\^J$h1ZhU56OJQJ\]^Jh56OJQJ\]^JhU56OJQJ\]^JhM S56OJQJ\]^JhUhUOJQJ\^JhoyOJQJ\^JhywOJQJ\^JhUOJQJ\^JhH$N5OJQJ\^JIIIIIIIIIIIIIIIJJfKgKKKKKKKLLL'LFLPLQL_LaLLLLLLLLdNlNN止|o|h E5OJQJ\^Jh1ZhU5OJQJ\^Jh;, 5OJQJ^Jhcc5OJQJ^Jh4q5OJQJ^Jh 5OJQJ^Jh E5OJQJ^J$hHmhU5B*OJQJ^JphhU5B*OJQJ^Jphh1ZhU5OJQJ^JhU5OJQJ^J+NNrOuOOOOOOP*B*phha>*B*phhjF>*B*phhM S>*B*phh>*B*phhA>*B*phh1ZhH$N>*B*ph h6]h1ZhH$N6] hS6] hd~=6] ha6] hM S6]hU5OJQJ\^Jh1ZhU5OJQJ\^Jh E5OJQJ\^J%VVVVVVWWGWgWWWWX^XXXXXXXXYYYY>ZCZZZ#[L[v[[[[[[[s\\\\\7]E]]]]զՙhzhhzh6>*B*]phhzh>*B*phh1Zh86>*B*phh1Zh-L>*B*phhjFhjF>*B*H*phhjF>*B*phh E>**>**>**1$>**->**/]]]Ѱ^^<`q```````` aaddee(g9ggggg:hؾؾrreXh&e5OJQJ\^Jha5OJQJ\^Jh{{5OJQJ\^Jh E5OJQJ\^JhjF5OJQJ\^Jh1ZhH$N5OJQJ\^Jjhf0JUha h1ZhH$NhC}B*ph"jhzhhC}0JB*UphhzhhC}B*phh1ZhC}6>*B*]phhC}6>*B*]ph ]]`Je;hKioik'l(l@lllm~$dh`a$gdb<$dhdd[$\$`a$gdD[j$dhdd[$\$a$gdD[j $dha$gdb<$dh`a$gdb<$dh`a$gdb< $dha$gdC}$dhdd[$\$`a$gdC} :h;hJiKiOiWinioijk'l(l?l@lAlClDlElLlʾ}oaVaH:hOJhs5>**f5>**ɭ5>**<5>**󳦴ܽ5>**󳦴ܽ<5>*B*phh5>*B*phh1ZhH$NB*ph h1ZhH$Nh1ZhH$N6]h;, 0J56\]he0J56\]hf0J56\]h1Zhb-5OJQJ\^Jhb-5OJQJ\^JhH$N5OJQJ\^JLlMlalblqlrl~llllllllllll#m$m&mImmmm nnnnnnʼpfYfffOha>**1&>**&>**&0>**%,>**>**1R>**6B*$6>**<6>*B*phh$5>*B*phhOJhf5>*B*phhOJhs5>*B*phhOJh$5>*B*phniomooq-qyqqqqq r$r5r=rvsssssjuuu v+w/w-x.x߷߭ߣ~pbUbJhR6>**-R>**$R6>**R6>**<6>**1<>**R>**󳦴ܽ>**&>**>**<>*B*phhJ,>*B*phh>*B*phh1ZhR>*B*phha}>*B*phh5>*B*phmopsjuu v.x8xP{Q{||b}l}{$ dha$gdb< $dha$gdb<$dhdd[$\$a$gd$ & F hdh^`a$gd3c$dhdd[$\$`a$gdD[j$dh`a$gdb<$dhdd[$\$`a$gd.x8x9xBxNxzxxxxxxyy1y;y]y^yzzzN{s{{{{{{{||&|)|@|V||a}b}c}Żܱ܉qgh!6B*phh$hR6>**!>**>**<>*B*phh6>*B*phhGe>*B*phht!>*B*phhcc>*B*phhs>*B*phh1Zh!>*B*phh1ZhR>*B*phh!>*B*phh!h!6B*ph%c}j}k}l}m}}}}~~~~>~_~`~a~b~$%&-.0CX{ ķĭέΣ{qgΖΈ\h 6>*B*phhI>*B*phh_>*B*phh$h!U6B*phh$hR6>*B*phh1Zh!U>*B*phhR>*B*phhg>*B*phh1Zh!>*B*phh!>*B*phh1ZhR>*B*phh1ZhR6>*B*phh!6B*phh1ZhR6B*ph#l}a~b~%06sd$ dha$gdb<$ dhdd[$\$a$gd$ & F h0dh^`a$gd3c$ Ldha$gdb<$dh`a$gdb<$dhdd[$\$a$gd$ & F hdh^`a$gd3c $dha$gdb< ƀ%78:jlprw (= ͹ͯ͹͗͗Ê|ndhg>*B*phh1ZhR6>*B*phh_h_6>*B*phh1Zh_>*B*phhI>*B*phhIhI6>*B*phhcc>*B*phh6>*B*phh_>*B*phh1ZhR>*B*phh1ZhR6B*phh_6B*phh1ZhR5>*B*ph'347-1GHOPQڅ !%PQ8DOST|ڊ'F qѺߣߙߙߏߏߙߏߙtjh6>*B*phhhR6>*B*phh1Zhg>*B*phh!U>*B*phhI>*B*phh>*B*phh1ZhR6B*phh_6B*phhg-hR>*B*phh$hR6>*B*phh1ZhR>*B*phhg>*B*phh_>*B*ph&67GQEF CM$ dha$gdb<$ dh`a$gdcZ$ dhdd[$\$a$gd$ & F h0dh^`a$gd3c$ 0dha$gdb<qyÌAWrt}ۍݍލ[_֏ CDKLMVȻȻxj``h_6B*phhhR6>*B*phh1Zh;}}>*B*phhr>*B*phhcc>*B*phh>*B*phhPh hPh 6>*B*phhPh >**1R6B*B6B*>**1B>**1R>**B>**%Ւ˒דݔǔ&<ėŗԗn鰦{qhXaI>*B*phh6>*B*phhG>*B*phh!U6B*phh1ZhR6B*phh_6B*phhhR6>*B*phhR>*B*phhw>*B*phhr>*B*phh1Zh_>*B*phh1ZhR>*B*phh_>*B*ph(oAKs}yiy$ 0dha$gdb<$ dh`a$gdcZ$ dhdd[$\$a$gd$ & F h0dh^`a$gd3c$ dhdd[$\$`a$gd$dh`a$gdcZ$ $ dhdd[$\$a$gd no"#-.ABIJK]lŞIfst{|}¡ӡ-4VXZķķ棭ķķ{{{hr>*B*phhw>*B*phhcZ>*B*phh>*B*phhF?K>*B*phh5m>*B*phh1ZhR6B*phhF?K6B*phhhR6>*B*phhg->*B*phh1ZhR>*B*phh!UhR6B*ph,Ԣآ٢ -Aasx{ڣ߾ߴߦ{qdh1Zh1>*B*phhR>*B*phh1>*B*phh1ZhR6B*phh6B*phh6B*phhhR6>*B*phhg>*B*phhcc>*B*phh1Zhr>*B*phhr>*B*phh1ZhR>*B*phhw>*B*phh>*B*ph'إ+ӧqbZ$a$gdOC$dh`a$gd\ ddd[$\$gd\$ & F h0dh^`a$gd3c$ dha$gdb<$ dh`a$gdcZ$ dhdd[$\$a$gd%$ & F h0dhdd[$\$^`a$gdcZ ץإ٥*+aҧӧԧק$BQo~ݩǹwl^^^^^TJhL>*B*phh>*B*phhOChOC5>*B*phh5>*B*phh;t56>*B*phhOChOC56>*B*phh |>*B*phhOChOC>*B*phhOJhw65>*B*phhOJhOJ5>*B*phhyw5>*B*phhR>*B*phh1ZhR>*B*phh1ZhR6B*phh6B*phӧԧا $$Ifa$gd(_i $$Ifa$gd(_i D8,, $$Ifa$gd(_i $$Ifa$gd(_ikd$$IfTlr$ 4z*  t0644 layt(_iT $8, $$Ifa$gd(_ikd$$IfTlr$ 4z*  t0644 layt(_iT $$Ifa$gd(_i$+39AB8kd$$IfTlr$ 4z*  t0644 layt(_iT $$Ifa$gd(_iBQX`fn $$Ifa$gd(_i $$Ifa$gd(_ino~D8,, $$Ifa$gd(_i $$Ifa$gd(_ikdT$$IfTlr$ 4z*  t0644 layt(_iT80$a$gdOCkd$$IfTlr$ 4z*  t0644 layt(_iT $$Ifa$gd(_i qz~ŮƮԮ 78Cpq{ίϯկ ߻ߠߠߠߠߠߠߠp&hOChOC56>*B*CJaJph hOChOC>*B*CJaJphh5>*B*phhOChOC5>*B*phh;t56>*B*phhOChOC56>*B*phhA>*B*phhcc>*B*phhOChOC>*B*phhL>*B*phh>*B*ph&hi{} $$Ifa$gd(_i $$Ifa$gd(_i$dhdd[$\$`a$gd\$a$gdOC$dh`a$gd@ F:... $$Ifa$gd(_i $$Ifa$gd(_ikd$$IfTlr "#N t0n#44 layt(_iTîŮƮԮٮޮ "',27Ff $$Ifa$gd(_iFfW $$Ifa$gd(_i78CINTY^ckpq{FfFf $$Ifa$gd(_i $$Ifa$gd(_iFfmůʯίϯկۯ $dh`a$gdOJ$a$gdOCFf $$Ifa$gd(_iFf $$Ifa$gd(_i$&'ƱDZɱʱ̱ͱαֱױٱڱܱ⨛|q_O_|_|_hOChOC0J5>*B*ph#hOChOC5>*B*CJaJphhd~=5>*B*phhOChOC5>*B*ph hOChOC>*B*CJaJphh;t56>*B*phhOChOC56>*B*phhOChOC>*B*aJphh0J>*B*phhOChOC0J>*B*phhOChOC>*B*ph hOChOC>*B*CJaJphDZʱͱdX $$Ifa$gd(_ikd$$IfTF 0006    22 l4ayt(_iT $$Ifa$gd(_iͱαױڱݱpdXX $$Ifa$gd(_i $$Ifa$gd(_ikd$$IfTF 0006    22 l4ayt(_iTܱݱޱ !&'(-.349:;<=EGH`adkооСоޱޱޱvih;t56>*B*phhOChOC56>*B*phh0J>*B*phhOChOC0J>*B*phhOChOC0J5>*B*phhOChOC>*B*ph#hOChOC5>*B*CJaJphhOChOC5>*B*ph hOChOC>*B*CJaJph hOChOC>*B*CJaJph)ݱޱpdXX $$Ifa$gd(_i $$Ifa$gd(_ikdi$$IfTF 0006    22 l4ayt(_iTpdXX $$Ifa$gd(_i $$Ifa$gd(_ikd$$IfTF 0006    22 l4ayt(_iT!'pdXX $$Ifa$gd(_i $$Ifa$gd(_ikd$$IfTF 0006    22 l4ayt(_iT'(.4:pdXX $$Ifa$gd(_i $$Ifa$gd(_ikd$$IfTF 0006    22 l4ayt(_iT:;=`aphYMhA $$Ifa$gd(_i $`a$gdOC$dh`a$gdOJ$a$gdOCkd=$$IfTF 0006    22 l4ayt(_iTƳdzγгֳ׳ڳ۳޳ Ĺħħħħėħ hOChOC>*B*CJaJphhOChOC0J5>*B*ph#hOChOC5>*B*CJaJphhd~=5>*B*phhOChOC5>*B*ph hOChOC>*B*CJaJphhOChOC>*B*phhOChOC56>*B*ph0dX $$Ifa$gd(_ikd$$IfTF 0006    22 l4ayt(_iT $$Ifa$gd(_ipdXX $$Ifa$gd(_i $$Ifa$gd(_ikd$$IfTF 0006    22 l4ayt(_iTdzϳpdXX $$Ifa$gd(_i $$Ifa$gd(_ikd\$$IfTF 0006    22 l4ayt(_iTϳг׳۳߳pdXX $$Ifa$gd(_i $$Ifa$gd(_ikd$$IfTF 0006    22 l4ayt(_iT߳pdXX $$Ifa$gd(_i $$Ifa$gd(_ikd$$IfTF 0006    22 l4ayt(_iT pdXX $$Ifa$gd(_i $$Ifa$gd(_ikd{$$IfTF 0006    22 l4ayt(_iT34Tpkk\PH$a$gdOC $`a$gdOC$dh`a$gdOJgdOCkd0$$IfTF 0006    22 l4ayt(_iT Wa347>STUVXYZceoprsuwطؙn^nnؙؙnؙؙnؙؙhOChOC0J5>*B*ph#hOChOC5>*B*CJaJphhd~=5>*B*phhOChOC5>*B*ph hOChOC>*B*CJaJphh;t56>*B*phhOChOC56>*B*ph hOChOC>*B*CJaJphhOChOC>*B*phh0J>*B*phhOChOC0J>*B*ph$TVZdepsvXkd$$IfTF 0006    22 l4ayt(_iT $$Ifa$gd(_i $$Ifa$gd(_ivwpdXX $$Ifa$gd(_i $$Ifa$gd(_ikd$$IfTF 0006    22 l4ayt(_iTpdXX $$Ifa$gd(_i $$Ifa$gd(_ikdO$$IfTF 0006    22 l4ayt(_iTpdXX $$Ifa$gd(_i $$Ifa$gd(_ikd$$IfTF 0006    22 l4ayt(_iTõĵɵʵεеյֵ۵ܵ345f%,NOP࢖{qaTah;t56>*B*phhOChOC56>*B*phh>*B*phh@>*B*ph hOChOC>*B*CJaJphh0J>*B*phhOChOC0J>*B*phhOChOC0J5>*B*phhOChOC5>*B*ph hOChOC>*B*CJaJphhOChOC>*B*ph#hOChOC5>*B*CJaJphĵʵϵpdXX $$Ifa$gd(_i $$Ifa$gd(_ikd$$IfTF 0006    22 l4ayt(_iTϵеֵܵpdXX $$Ifa$gd(_i $$Ifa$gd(_ikdn$$IfTF 0006    22 l4ayt(_iT4"OpdN80$a$gdOC$dhdd[$\$`a$gd@$dhdd[$\$`a$gd\ $`a$gdOCkd#$$IfTF 0006    22 l4ayt(_iTOPT^_ekpRkd$$IfTlF4 t t06    44 layt(_iT $$Ifa$gd(_i $$Ifa$gd(_iPS^_eqwxۺ̻ػ߻#&?BYb#DLklrJٿّqqqqqq hOChOC>*B*CJaJphh;t5>*B*CJaJphhGe5>*B*CJaJph#hOChOC5>*B*CJaJphh;t56>*B*phhOChOC56>*B*phh>*B*phhOChOC>*B*phhOChOC5>*B*phh5>*B*ph*pqw}j^RR $$Ifa$gd(_i $$Ifa$gd(_ikdn$$IfTlF4 t t06    44 layt(_iTֻ׻jbSbbG $$Ifa$gd(_i$dh`a$gd@$a$gdOCkd$$IfTlF4 t t06    44 layt(_iT"'K??? $$Ifa$gd(_ikd$$IfTl\T  t0644 layt(_iT $$Ifa$gd(_i'/15=>CKMQYZbeinstw{Ff[Ff, $$Ifa$gd(_i $$Ifa$gd(_iļɼμϼҼ׼ܼFf $$Ifa$gd(_iFf $$Ifa$gd(_i #%*.235:?DELNRVZ[]bgFf $$Ifa$gd(_iFf $$Ifa$gd(_igklru{HIqrvw$dh`a$gd\$a$gdOCFfu $$Ifa$gd(_iFfF $$Ifa$gd(_iJLSpqruɿп$.LVv"Ǽǟǐǐǃrrrrrrǃ^&hOChOC56>*B*CJaJph hOChOC>*B*CJaJphhOChOC>*B*phh;t5>*B*CJaJphhGe5>*B*CJaJphhOChOC5>*B*phh5>*B*ph#hOChOC5>*B*CJaJphh;t56>*B*phhOChOC56>*B*phhcc>*B*ph WKKKK?? $$Ifa$gd(_i $$Ifa$gd(_ikd$$IfTl\p  t0644 laytGeTȿɿпӿؿݿ FfwFfC $$Ifa$gd(_i $$Ifa$gd(_i#$.048<=?CGKLVX\`efhlFf $$Ifa$gd(_iFf $$Ifa$gd(_ilpuvFf{FfG $$Ifa$gd(_iFf $$Ifa$gd(_i"-/_`deo$dh`a$gd\$dhdd[$\$`a$gd@$a$gdOCFf $$Ifa$gd(_i $$Ifa$gd(_i9>op-.018^_`copr *P`dmŸŦ馍xjhcch6>*B*phhcc>*B*phh;t5>*B*phhOChOC5>*B*phh5>*B*ph#hOChOC5>*B*CJaJphh;t56>*B*phhOChOC56>*B*phh\>*B*phh;t>*B*phhOChOC>*B*phh>*B*ph)opWK????? $$Ifa$gd(_i $$Ifa$gd(_ikd $$IfTl\  t0644 layt(_iT $$Ifa$gd(_i kdv $$IfTlִh  + t06    44 laytGeT $$Ifa$gd(_i $$Ifa$gd(_i kdc $$IfTlִh  + t06    44 laytGeT $$Ifa$gd(_i $$Ifa$gd(_i kdP $$IfTlִh  + t06    44 laytGeT  $$Ifa$gd(_i $$Ifa$gd(_i kd= $$IfTlִh  + t06    44 laytGeT!#)*-/6 $$Ifa$gd(_i $$Ifa$gd(_i67 kd*$$IfTlִh  + t06    44 laytGeT7EGIKLNPW $$Ifa$gd(_i $$Ifa$gd(_iWX kd$$IfTlִh  + t06    44 laytGeTX_aefgikq $$Ifa$gd(_i $$Ifa$gd(_iqr kd$$IfTlִh  + t06    44 laytGeTrx{~ $$Ifa$gd(_i $$Ifa$gd(_i kd$$IfTlִh  + t06    44 laytGeT $$Ifa$gd(_i $$Ifa$gd(_i$dh`a$gd@$a$gdOC  -0<!"v9<NQY&ǼǮzrzrzrzjrzrzbzZzhB*phhwB*phhd~=B*phhP2|B*phh1Zh+B*phh`h+6B*phhOChOChOC>*B*phh;t5>*B*phhOChOC5>*B*phh5>*B*ph#hOChOC5>*B*CJaJphh;t56>*B*phhOChOC56>*B*phh;t>*B*ph"!%+,1WK????? $$Ifa$gd(_i $$Ifa$gd(_ikd$$IfTl\Tt`  t0644 layt(_iT15; $$Ifa$gd(_i;< kds$$IfTlִTR t`2n t06    44 laytGeT<CFIPQTV] $$Ifa$gd(_i $$Ifa$gd(_i]^ kd`$$IfTlִTR t`2n t06    44 laytGeT^hknuvy{ $$Ifa$gd(_i $$Ifa$gd(_i kdM$$IfTlִTR t`2n t06    44 laytGeT $$Ifa$gd(_i $$Ifa$gd(_i kd:$$IfTlִTR t`2n t06    44 laytGeT $$Ifa$gd(_i $$Ifa$gd(_i kd'$$IfTlִTR t`2n t06    44 laytGeT $$Ifa$gd(_i $$Ifa$gd(_i kd$$IfTlִTR t`2n t06    44 laytGeT $$Ifa$gd(_i $$Ifa$gd(_i kd$$IfTlִTR t`2n t06    44 laytGeT ! $$Ifa$gd(_i $$Ifa$gd(_i!" kd$$IfTlִTR t`2n t06    44 laytGeT"#$v'(Tsc $ & Fa$gd\ $`a$gd\$a$gd\$dhdd[$\$a$gd\ $dha$gdpdhgdS$dh`a$gdP2|$a$gdOC&'(TYbrseGagm+-6Iϰvvvvvh]h(9YhpB*phh;hp>*B*H*phh;hp>*B*phh;hpB*phh[ihp>*B*phhp>*B*phhfhpB*ph hfhp5B*CJaJphhp5B*CJaJph hdhp5B*CJaJphhphp5B*phh\5B*phhpB*ph!cdHK`ag56I'9 EFg $ & Fa$gd\ $da$gd\ $`a$gd\$a$gd\"5ij )*+,<=ݰݜݰ{nnnf^Sfh;hpB*phhKa.B*phhpB*phh;hp>*B*phhp'jhihp>*B*Uphhghp0J'jhghp>*B*Uphjhp>*B*Uph h}hp>*B*CJaJphh*hp6>*B*phhp>*B*phhWcohp>*B*phhWcohpB*phgi*+,=\l~u$ & F h0^`0a$gdKa.$a$gdKa.$dd[$\$a$gdKa. $7$8$H$a$gd\$a$gd\= rv õããÖ{m\m\m\J8#h(9Yhp5>*B*CJaJph#h}hp5>*B*CJaJph hG~Mhp>*B*CJaJphhp>*B*CJaJphhG~MhpB*CJaJphh\B*CJaJphhG~Mhp>*B*ph#hG~Mhp6>*B*CJaJphhp>*B*CJaJph hG~Mhp>*B*CJaJphhG~MhpB*CJaJphh;hpB*ph!hp5>*B*OJQJ^Jphuv 12|}$ 0^`0a$gdKa.$ L0^`0a$gdKa.$ & F h0^`0a$gdKa.$ 0^`0a$gdKa.&' -= $$Ifa$gd $Ifgdgd\dgd\$ & F h0^`0a$gdKa.$ L0^`0a$gdKa.$ & F h0^`0a$gdKa. =?G56QR" #()-yccUIh>B*CJaJphjh>UmHnHu* jh(9Yhp0J>*B*CJaJph* jh(9Yhp0J>*B*CJaJphhp>*B*CJaJph#h(9Yhp6>*B*CJaJph* jh(9Yhp0J>*B*CJaJph* jh(9Yhp0J>*B*CJaJph&h(9Yhp5>*B*CJ\aJph h(9Yhp>*B*CJaJph=>?+" $Ifgdkd$$IfTl?r|(|"'''<'<'T0&644 lap2yt\T?ACEG $$Ifa$gdGHbc+"" $Ifgdkd$$IfTl;r|(|"'''<'<'T0&644 lap2yt\TcdefgFf $$Ifa$gd $Ifgd kd!$$l,("'''<'<'T (YYY0&644 lap2YYYyt\T $$Ifa$gd $IfgdkdP"$$l,("'''<'<'T (YYY0&644 lap2YYYyt\T $$Ifa$gd $Ifgdkd#$$l,("'''<'<'T (YYY0&644 lap2YYYyt\T $$Ifa$gd $Ifgdkd$$$IfTl,r|(|"'''<'<'T (YYY0&644 lap2YYYyt\T Ff' $$Ifa$gd $Ifgd 78+"" $Ifgdkd{)$$l,("'''<'<'T0&644 lap2yt\T89:; $$Ifa$gd $Ifgd;<ST+"" $Ifgdkd*$$l,("'''<'<'T0&644 lap2yt\TTUVW $$Ifa$gd $IfgdWXkd+$$IfTl,r|(|"'''<'<'T (YYY0&644 lap2YYYyt\TXlmnopqFfQ. $$Ifa$gd $Ifgd +"" $Ifgdkd:0$$l,("'''<'<'T0&644 lap2yt\T $$Ifa$gd $Ifgd+"" $IfgdkdN1$$l,("'''<'<'T0&644 lap2yt\T $$Ifa$gd $Ifgd+"" $Ifgdkdb2$$IfTl,r|(|"'''<'<'T0&644 lap2yt\T#$%&'Ff4 $$Ifa$gd $Ifgd '(kd6$$l,("'''<'<'T (YYY0&644 lap2YYYyt\T(PQRST $$Ifa$gd $IfgdTUkd8$$l,("'''<'<'T (YYY0&644 lap2YYYyt\TUnopqr $$Ifa$gd $Ifgdrskde9$$l,("'''<'<'T (YYY0&644 lap2YYYyt\Ts $$Ifa$gd $Ifgdkd:$$l,("'''<'<'T (YYY0&644 lap2YYYyt\T $$Ifa$gd $Ifgdkd;$$l,("'''<'<'T (YYY0&644 lap2YYYyt\T $$Ifa$gd $Ifgd+"" $IfgdkdC=$$l,("'''<'<'T0&644 lap2yt\T $$Ifa$gd $Ifgd+"" $IfgdkdW>$$l,("'''<'<'T0&644 lap2yt\T $$Ifa$gd $Ifgd)*+"" $Ifgdkdk?$$l,("'''<'<'T0&644 lap2yt\T*+,- $$Ifa$gd $Ifgd-.JY+"" $Ifgdkd@$$l,("'''<'<'T0&644 lap2yt\TYZ[\ $$Ifa$gd $Ifgd\]uv+"" $IfgdkdA$$l,("'''<'<'T0&644 lap2yt\Tvwxy $$Ifa$gd $Ifgdyz+"" $IfgdkdB$$l,("'''<'<'T0&644 lap2yt\T $$Ifa$gd $Ifgd+"" $IfgdkdC$$l,("'''<'<'T0&644 lap2yt\T $$Ifa$gd $Ifgd+"" $IfgdkdD$$l,("'''<'<'T0&644 lap2yt\T $$Ifa$gd $Ifgd+"" $IfgdkdE$$l,("'''<'<'T0&644 lap2yt\T $$Ifa$gd $Ifgd#$+"" $IfgdkdF$$l,("'''<'<'T0&644 lap2yt\T$%&' $Ifgd'(*++##dgd\kd H$$IfTl;r|(|"'''<'<'T0&644 lap2yt\T+,-9g$xx1$7$8$H$`a$gdF?$xx1$7$8$H$a$gdF?1$$d%d&d'd1$7$8$H$NOPQa$gdF?dgd\-RX9g}fNf?7-hp>**Tp>*Tp0>*/??>**䴳*ϴ,??>**䴳ϴ?>**ϴ$??>**ϴ2??5>**䴳ϴ^2??5>**䴳ϴ^0??56>**ϴ]^$??>**ϴ7<=> gdpgdpgdC}$xx1$7$8$H$`a$gdF?$xx1$7$8$H$`a$gdF?78:EMZp~}j]K>>>>>hMrhp>*B*ph" jhMrhp0J>*B*phh&hp>*B*ph%jh&hp0J>*B*Uphhfhp>*B*phhp>*B*phhC}hp>*B*ph%jhC}hp0J>*B*UphhM ShC}>*B*phhC}>*B*phhcchC}>*B*phhcchC}>*%jhC}hC}0J>*B*UphhKhp>*B*ph:=>?@  ˺zmeeeWSLSHSDh9_\hL9 hh9_\hhh9_\h9_\5>*B*phjh`%Uh@uh`%>*B*ph!jh@uh`%>*B*Uphh`%* jhEXhp0J>*B*CJaJphhp hEXhp>*B*CJaJph hMrhp>*B*CJaJph* jhMrhp0J>*B*CJaJphhMrhp>*B*ph" jhMrhp0J>*B*ph !-EFRklw $h]ha$gdk &`#$gdh$hh]h`ha$gd$hh]h`ha$gd9_\ &`#$gd&gd$a$gd9_\ !"()+,-3DEFGMNPQRXijkl׹{ċ{ncXJhkhk5>*B*phh5>*B*phhk5>*B*phhT0J5>*B*phh9_\h9_\0J5>*B*ph(jh9_\h9_\0J5>*B*UphhL9hL95>*B*phhL95>*B*phhVG5>*B*ph$h6I0J5>*B*mHnHphuh9_\h0J5>*B*ph(jh9_\h0J5>*B*Uphhhlmstuvw}M۽{h{]OK4,hF?hF?>*B*CJOJQJ^JaJphh@(hkh[5>*B*phh[5>*B*ph$h6I0J5>*B*mHnHphuhkh[0J5>*B*ph(jhkh[0J5>*B*Uphhhhkhk5>*B*phhk5>*B*phhVG5>*B*ph$h[0J5>*B*mHnHphuhkhk0J5>*B*ph(jhkhk0J5>*B*UphMNO+,-JK    $xx1$7$8$H$`a$gdF?gdp $1$7$8$H$a$ $1$7$8$H$a$gdF? $h]ha$gdk &`#$gdhMNO()+,-JK     ˽{,hF?hF?>*B*CJOJQJ^JaJphhhphlQ(hpB*CJaJphhpB*CJaJphhpCJaJhp>*B*CJaJphh`%,jhw5B*CJOJQJU^JaJph#hw5B*CJOJQJ^JaJphhw5hF?21h:pL9/ =!"#$% 21h:pL9/ =!"#$% 21h:pL9/ =!"#$% 21h:pL9/ =!"#$% 21h:pL9/ =!"#$% 21h:pL9/ =!"#$% =0&P1hP:p/ =!"#$% 21h:p&/ =!"#$% 6&P1h:p&/ =!"#$% 5 01h:p / =!"#$% 5 01h:p / =!"#$% 50P:pI?/ =!"#$% Dd m|{B  S A? 2kR+xu wts10ɧD-`!kR+xu wts10~~5(kx=#.s{^`cFL`he]u.MW&l>tE\\(B@I6J mQɀ :(pywUJ3{=^{ҪU?yTڿ_=^k;_ÿo_t?w}GF}sOhV'j5 qV0O$+OtUhwY?HG6ϿO}.VOɚuug>Y{pOD+Г|O m7O_}5whr:.nOO缧vjvj>$6ʴ秭'Z<wg:vjsFF`cK YaB8 Nq<˞ov_<کO~ޘԣi?0@ dƋqx!i~GW~6FsB8{1 g)q<Kz`=vj#卒{'U$}`MF4~6w9Xe>ɧP;SS:®/< x 6=/@|.7_Orۏ捂)[a®`LFa<HGȞ/2p;b;=S;O-q:BNx]/7(CG nl_<}NT)MxBcOSKo?7NSۉdzoD$PD^k>2{ :a}_7L0s>&'ȩoʿ13"vt󰨰02m/%1a?>?(<}C}6<$x#/$bi4!eK$K˸mEQ}|Qex\%S{_R(4뫙Gf5woGX~NeO'o?οQGMkHQ\A_8$m6<($_-OŹ>,q_b=>k,_{7 IUxB}>P^ )W5y~3ѿǓ}gnJ{,XRLLox ,HLbaG]?EI.A`W\z>r4DTl(_oe#64VcPS 72wK<-P[ `av6_y;r62c5P+4yzs+~ݝO~L-c7}xS#Oʽ0ƄB=A@x%fX5敍Ϗϛe Ey\m#SnMfmdoXd62^-xDu o:@_U^ޥ^0V.>,X)js=rr.9/ҼJQw!AƤE gU1AN!O@k_~nmZ)|j?CAQ6@91ɆF^< @xD}ȤFtHo~Ba51~2v!|fEo6 MiAo5 bnlkȵ̰Ԃn^? U+8GfY˰MsmMrD!-Wq>Ь)g1Gy,kAh[u9̅ |3"sQEִ/fMY3?ǕV~ ~Ov.EO^M0eQ:.+cc\NeFi?!Ǎ)kh ~*1F*AϮ1&[A~O aQ.!e_Ɣ=أ[#i9cãDb̀F%r r_4);TP,s*B__\}.Y$}964\<d^Y*P+[b):lFpYwxj~L-Q%oZ.|LþZAM`(b5[x$0%Q|)F =g^}3!Yi{ 㫶~ kxxBN4Qʫ]ؗjw֋WU/:Qezl@qu[ j J 4M$,G[ɼfBm䪄Uʗ&bf YOjɇoN}':Sڏ7.FsP|"_W>bvĮ\x1+c׬\]X&u?U]x#$g .gQvKTu: 9R>MB!qƔu `ƤRV ᧟`ft!% IDzYkC~(O=h p$cRae3e40:@_d.pݨ^dGUcACDhE* 2Qh*_Xnȃo@(|S \i`<%y86= O ҦXh-u] nM܄Kׁ-O+IxQ FSH ߳F FБDtHjGHL#D8Y>ıʹzi޳ݙɧف0uފ[+<%[os*0Iܔpy\؄v9ce{G=`\;#3}FjqQؿJ!D=J+4b-3ڔˑCR<&#(? ϲ&Q!(~_=&='8u3%́l !-ǟOQ6yFIW~ jfɛxA{E:ʋWةY?^! -Flkĕ5%Y)U|VG!;>@EAG u{~ڏ獒'DA&!Vg  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\^_`abcditklmnopqwxyz{|}~Root Entry  F>TsData ]IWordDocument ObjectPool0C>T>T_976425893 F0C>T >T1TablejCompObjhObjInfo [0@0NormalCJOJQJmH <A@<Default Paragraph Font  /X2$r1,y+NNK4b$sZ`S  @z(  B  3 AB S  ?mt@7d@GTimes New Roman5Symbol3& Arial"h&,F&,F!r0bChristine L. SolomonChristine L. Solomon   FMicrosoft Word Picture MSWordDocWord.Picture.89qOh+'0  8 D P \hpxDATA BREACH STUDY Normal.dotObjectPool 0C>T0C>TWordDocumentvSummaryInformation( DocumentSummaryInformation8Y bjbjWW ==] $zw"  @03   jUmHN N!"##$#%nsZ`S PNG  IHDRۙgAMA pHYsj IDATx[OGV}M0=0=9;L<ذ(ͬ`pF`  ^4/|>HjBz *ȡ |s=<#9Y:C4MwWU?ӓSxۅ %0NKB0W^,1("Bh "֊3M׭ 0u7m0!ED̟^=WJ;{5ޝRoW+ؓS(/  IQ N@2" ]}h Ĩ^7r<7[\@ b8#p1y?nTmzS76ڟ5Fv^xt#FQ7Z;#Bz{76y?A w *P( 2T?Z[o}ίVۨS+U)1p1,KD|Z )yZk++gbl6Kl$ϤMZ b!7}i>b.s؉z;5TJݳeٴꫮJɾe'$~rb՞_G,O-ԳծV˗/$i<;=9=}~:uN1vzEߣn'77kk|?֮1{}o]/ |szwa♲g\;8a-[!DEăop1qMw/s9 Ο44v$~9M*RIˡX8_k0?Z4˲78=9m=i{K~[7Ihb6{vQ³:"*+S=̝-Dl|h|ȭ1nЙ=uWC>a-I vN1q_/OɕO]*Nsu{w?ۍ@ tK,'痊%I2 F&3q0!98N~FAz{PjҽѰs'Q)kDA$Ƙ/mDܹ#I}>e ( 8? A&,C,LC.{X7V/f3!D؟- 6b9MSV,̍ׯ@ԍ  |ukyS3iz>ݵ-">%aUxi>nn8's7:DqcsyV\(^X0(/[O[QOMɛ1/dƘXN΃L@))idtԋQi5%7#Q@G #@xi#=N hD1o].2hIF "(xl}wlv>['6c]>Ϝ wR$J)Tz*WBn'czjh6C'F RIf|_nQ2J/k?ŭݖB*iR8:"rڵ5n>R.`"\  . M)i3HHGvyn>lڿ-4T~%7#oSf*5@x޶Aq)I^w'뺥pI p1t;ntiC?nn2JSCd@!SZ.!}]OdA0ui\wbX'RA2JncxCr~uvcvƍ6SK^|BPQ[}w8LhD, %IR,R$Ilv!&1,MS}񠱷nzDܸu#jkJ柛P^Rx*M-TGq^5)elҟ@I%w]]#~S9S\W[]t@9 &]GjSpQJ@ T/w QԍQ,J6]JeQ1%hxŝ;Fݨ~u#_?Ț#(<łp e f zpDiK7H%[?wR1T,m,/y8f'IBDzDTUYߪ#"LTy,S.̓TV*Ƙ:sF jBʩ7\N M3b 8cvlLeeɫY (PCKRrx& bŚ\\/2IMA<%"p G1RTʙ@TkRJ^pI! lȑk^~)d㽄յ{;WTV*sp11Ɵɐ mƻ %3ƄavmsI 惽_:ʒ8c+;\48N$\w~ݵky`>J2lh&S #`*BW`빞8>~2-1rF0VV*D8|} ꌃ<(Ő&"!Dzrɡ%`[JϷ؟rv}2RJ)Q7 C ?2vY=\  2rɛa&GDHعp-/9^2J{q\dKi*&Rj({qL c@t #y,/|%$Ok8O ys y 0B B-\:?Occ Έ-hR fm2դiv2Je_fY!"j1ZkMD|sW+VÎ6YuK]Zz;*~AGɓ0a_p„X$ !H~#HP + tZo;3+ǒ|loOOWU}kkWjcMǴ_~|tܺ{ۖ}&ћm囯繣\#X5ll8k$%4MM01(hb`T;"`1fge&3VY_޾M`LM.ǻl^`FI\q}4[f7ك,KVʲן\2;(X~R>);7lc#&s6ȴ(8/}x),x oORT'8>[_?6 F@"Jmmm]R»n/gk뺾VJ],x4WۓmVFyutؠ.#hnxj75rG6}׾v~1 f:}-?>dʦo+4ͩιsdsrw+M -9r5EQ$k)(ҕZ fs}RIҕ*I9t=ot>Eʄt-ͧd2y4˲6x&&Fϛ[+ǣ1RZ:7Y?~ W>r[~vN+na Χy^ aٹjf>͍1{_\ 𦺋_4pCZ s<?F<70tGc6_J(Q]nsUrs~x4nGb,ia9/ٟeo>1Eq[%d4lOǣVο79BPʐ#lq77cֆ7^>皚͈+--d! ѹ/5i:24*Q&I7&G0spGI&5u RKQ[p8BVrZ``ʭt:(p/x13f34D'AUU3q̴8x˲t:u]G1#w=6}cV:c~ Ap?{{{DT}灚f8N'F6fiqey!Gw410M$ VduT2jroBe4]K7'Yk+(jWe]ImYb>͓D9G #)T@Do([ZuI5q$ K;Y%\?+tQvNE1^$\_<(_\+\C2 6s ,1aGbuL`A,2 A(,οb8$fJR&k ,*-sb*gUios`a>./$cP#< +gUL>%zU|(D,)"t(tHa QUUZDјE!1w[DdneZiR(|EqKdƃ|?;zWtQq,EbT@AwhY]v1-/ZfQ!bEq3'E}ڏ{<7\JWJJ8kQ,0B(i?R{wc>9i:<62t>TUj8>`|^-hJ8d: & @ݸ=xFTB(WiHPEMb4:Mh*vILYXjL| MP4ǵJ@#224tz<e ہ@ n*-v onP' + -jGCW3IŞdpX/G;aμڂ ,O8=尤 lax%zv1' cŮ0 ݖpy!pi4TD_}}}s9l-zk&2(ǣp۱pxc"D~>^B+]`R~'}kes }'^ٯ1AD'I[orOS?(aiRؽv +ˋo&pmK~]sV:MX mi8J9ّم^:DjГde/vp`{іO IDATvၴRobl|, 5,KuTˋ-5LA))i&D&ФJ:r %8W:FQi-u(=$-—(6JYW"*@BDH![^Nq ۧxXJpx\5"jc,`DJl| s q2ւLXpiy-KM?? 0ُEPUCZx.ֶmIY };[}ǜqXtD#bFD(ӈR eY&1eQA d=QaQ&MB̓$BY(G9".$WQ37 c?&/%pe/0vIyuI,pp䬜l=]҅_p/TB 6V #ֆQ9["#Z9&mDDvIh[B+Bυ9ҕaR;qb!#.$@BtD;*;D fv!\"W[ =;ߜ/)%ձ;wϴڱ?+/,̹y˧Ow;̼"Ϗ='5!?94/鲵⿰ؓOHո":$Ѳѯ;.󾘗>;>"ԃ_/5մʵK4l³᭗ׇ%;>vV[汹8r鱹!-<"//}BHqL"8m}Kߣ' &'ZGN9::Ʀ687 i- Bh\HRH93xp;~]W4iy'L\GW?Z냯Df'3~$VW/kbcvK>ڭ_f g1Q#"̚HUK;”::Afʪ6)ixvK;Z+J^NfC?8aӅlO|JΥLۥrF \/33&R< p3B׉" ;6DH̜/ENIMv`z+[oCc4fu7)`H*r6P&J(?Q_rYCC^h c_sY呒SN@{cIWyҘJ~J] FKhR>yZJ*2TUT3~})( )ק27Iy9_Ӧ4WA|Y#5v$v!~M;!OADƶ뎔< fCrm @Ap5qJ4B^)c8qL!FW#,im!# =ǘ7F!@W>W3fqs=b4L˺@KO>u}rK̭$J E)qQFΟW%TxJ2=K!"98)E>Մ<˖'"yb$lЮ9ME F]n2ʩE "xs""E`K)%^A6[o @0֭5NH!`0`@DdFhSД PN3Ni+zl@mT9 = 5DغZ5w/+'v۶OTNݣo9zo=Ljy_rۮwvPȸ 0b)\4z,/˕5śSZo}J'j ~*+tA)(ɪ]*36΃#ĜϽO1j Ӡi!bT cB |bb_Hˠ "X:oS0 G=`!BϽ)D)1hiGÝZɃK뿊ދ Ȉh"UR*G2>[,X8 UM3=MhVF` qybp/Fn zZDYO)rߊ~ Bݘwğ䝭b.U(nENw<42d^K&hDt8FL%}JVk"j2 kIhRܻ_,A/^mdVYң Mq%kTսbmSmͪoM/&e.D(,cޗeU4WFtl 1f6ƐԥB PZljSJYc Zh409! =JY5 !k =3eB̕lHJ^iz/Ts_Lle0xJ[Y[TC)R3ZI[O!#ӬRJ=z(?_?ԫ _{g}(XNfrO)zp&#MLWB0q;V`*nx+yw3m}W8V!c69Hb J,Auz]63Xto2lc{{}2/[s iq!̱pr0 qX;9J5QrUok߶(z+|hå+"•.Ou{ 0snscs^uU*.,J{)AժteTO[OhW-̃g^"}݂q3RfLDC \Z+6) eEJ@kmQfۆ.Xf6oB32S(u['m\I30ӣ aWX54n[\ WX VQp0b91VҌQHuqh*rBpmۦ10pd%ʷ«flɧOt7KI. |)4Tࢵ._aχ*gVomDX>?nZ;8jޥd,da lqJA$ﻡw C*|5ZCN7wRl عME}Lonݣ-t<ֶVdg[}BQ'eX{fJ \g,l%!FyTCޜs"[9p&6ٸGʭNLҖ4Өح&33ψe|y~𾎌xj.z_ WRܳϞ}_VyDNM=Vu=̡ S4.>saV`qnf@eH )e31F"K+۵ufLRsZkJf4C ̗v]/;ve8 |Sb63(K7{/'|>7k!s[㖶ms{9pP{X$s>֖u+rV 5}>o(4&qURmz ˋ^{G[˺l$$)1)߯he2(*ztVNs*͹˵K9u˿!cC֜FZ'"h;"Ԛ: N٭FE]ԍi]k:<v ;=?E#K= A'Dt, ^TuX,ݤG3ee8iɷatR5}0D̦=DV*JzMt?^x8깵N1s),g/b.k(̗sn2$"2Bd႙s=B]MEYt7Z[TOmGPM$ ?Ces~ClQؼX_9ka={-3c_˹a^j3a~SNM/ݶ;MV'2RɃ*)%*RJ$P}$`b;2\eu~nO&~3i>#[:7a(wrL>?SYιb6z2':EF/cwu;LT;urBWK\j}>g #Ͽz~v~GtzV˕n:QΉT8ܖ^=/mS~{ޘrU2I ̜pa;sEaT<O9[{a,g]֛MJ& dLwmL{glGTH S9)4bOm d/LX-kM&ĺ҆?KΈ1Zc_BJ)ǂ]9}MKwlpA۶\`G/KQ`k#vι\pMw[k힕a1윉W;oPL,@so6ҰޛO<78==mo쬵{˷r)5iz` rA|?o~Su4Ӏ4܈w?=Chz)zNP 1&H$!"Vh@EKcyG W'zt胳F5-ֈ}J޸3Ƹ2dBP"#$pмU3ƪJ#Ze;]L)(0#F[n?MƑ#3ossi')<~2Aͅ~\9>}TWge{ڮd߼h?O?q;SU@~pu\Yy?}XX@q@ $ݳ_>T,؟oi,gm8? ZP, 0xjڥ'?*_]g/uSrޅSȰhDRu}1b$謄R!W8랟=z쫳?/_O?}StܿJ9a4e$"I1Ǩ;\:SrFe`FV5dJ[9+p5G0 ˜֨W9{昳76ǘ9 ˚cc t BDdp^C#Rۜ93g)bœ4YcT8C a. ^ 2N$F"JDXș9#ی"%CO= g1E}5Ʀ,"-)%2&\DsƸc)1 X 6x<43$'3Hr(u8О#I!4{}oVojvia&N1 1|[o.]'0cSI9)1k.e|īF7 rДsI; R՜"tSo~Td'd ]Ϯ )˙c'}DI,s0!g48ʞ 2 %"c!oFYgTZ1 b19\paj(j@9sYDݘH'@Ft!c%BsCץB 2#fek cQU9ư7a,s%3r,YRMJ' 3w1&%R-&Kc )i1Ќ̬1h>*NHA$ efdbJE&ƈ̺+k )iJ@0 @0P 3#D&eF5v] eV@dnon$e?'dyY$X0]oΊa̮PT{7<OS5UVQ*@+oI m3U}_^֨M)}?&njoPi ?W IDAT2|7\//*#zr}[FuΝx*7 htQ:T];Bb8륒;yӷ{1HWG\}ZSa sCκyaqFWevvVQsn#h~ܠj*V P U4-3uSPq3\_<0xr0YiER:::Z?阘zv;T-3U 2i򐛺BUudN-P0 uE`n|=zXY,>kf;\7\_4u]G0d` 3jnzX,LsǻGE0X4FSZUutTa`!_ȹfƐ ըY#Q5tMo(Uq5 7C]Cc:^, D*Zs 53Xھ€Clۆ>nP>oоa8fT##@5W5 _ۅB k@f.g't9]1rGO|كh^ ?s]jƹN8k#WS$+@#PkX؟e C-94OWhA /}CW Fհ ݲ  3 f lca U.x^+RY @HPAqljWURTV{3##N8:5Hjғf m1D>MV+3% *CwDŬY4tHFGZm]͔T2)-􎤥92 :SD=niA Ex%٢9o' [sjRA4yeؚt|08M?IRwC{3"n c[o<̯P+>/;<}$}e;\8l8}xꀮ!Fc)M{$.MpV.|w3;"#_Ї4w| <"JhEI8 3 ZYVM-f?~ӓ{lw U,WgH#j- l+8[M.B͒UYAEB:1Y7Q͚U-` ['+ŠΛ0"R=Tmot`LIy[Zm%],?h)YrSd E0KlH[_yil4otT>7ҽj#.'])񰪶ޓc{8%ãĴBDZܪ~ವ<)1E&S[ y;zB &??6y8(;bs_=1&WY=~0l9bڷI?m/I)مޫ<]?1O OCȘoUcgX0GigΆ;OE](h'}[Ե?EtYEDa~{D+GYRBe)8{47m2FųS:ϴNZ?y T$})7^vtcJ!8#zrwAAn/(+W"/ŗD6'Wrp9l$gҍ+puPMoN* _6@E7/(~xa ?_D}zj7PRrsW*8p8l65Xa3qsD<ܞ s_lJ1W>Mf9b9lD@qhwaseW`|"pA/p'w'ֆ (@\)5~جOWjlpu6D9•_ 7H g U}#llR妎|lp6j!l81ffiY6 Y[bߴ_# ঍|$G)Mka=}[_|_G y_8'8;2kpXib1uE{/J˩$r0M{Z<SJ*bDZ^Z}^jPt]s.Pu!j( Fb5U͙! *4o)ڛ0,\$8$mg+Lꧺߵ'w] 2FUɓ*L(S-b:|oO,h=C<|RQqW/ 7!Uw*T`޹{r6AlI%NUVթ]6t)Jc<,I(=# VoZ]BfZ"Xo@ɢ@ *κ)1e8*7IyA^{7߰ԩZG!E23 @Q)?S&p7n߹K s`jgaR^ͽZo!gO g<+~7݄:OhYAҼkkYZ9~^l=Qt9v]ȑ!Kq {fZ!k.6é1C}n+ZCރ߅nƱ;1v8ƗػnK)1B?Ӕðn!}gw=CQuYWQ;":IW^/̶Ii$F)h*EՎwѩ 7OUPy|<DRo.Ѿ9I'p9޾sWP3bè9 $IsQd@Ї$bJc2! "+}ٙ oA1,1l( p9 f|.K{t؄qzFE2-=/Bzv`5+SiF,jAEI i$yrZCѼ>%VD ѭWLQVz>dzRs&3J 3ˢ:SdɹϢ+{U'^;WQxV٦h;_͎ʆ27]_HET$;!JfI !dJXB>2+ 3=|,|BDm0.Lac;!yc a:2k ?ۻi]-" ۛHS:;?.8 VbI#/lŢ5ZSyak nU0w(vj.M}HAGCVQ؎d!A{"~ =V 8,)h$Td)(d@p*JD}._٢5;kpX @EZl"L7J!#yG!ZH -A'R*)0eC")R- EPG2xIuhp,Uxml>( _)ZɪVuEZVl!BaHl,}XNZkذ=JC(l5NW`:˸y_q]~ɳ:ZZ*(^&*@/P]W!Wu*b}ϲۻ"omzTExP,bIapz~CH}h'ggOoN:])%L ?iXVINd.kжuU4㣳tYo}x:Svx )Z{EeJ*)%4/o>$!:vtdўuMUuc#kPQ|^ȅ.fѢ :@ӔӍS*YCT`3%e36VxΛK[,(+ -1XTdIP$1zb't UgpVE1Փj̅H\"Q/[Y\C7P͜Pz Cf ,ng֎יLj!h$rl)b{zqQQ.)rПRhg빹4桶yQ&šw%WW2bY4x!2+7'tQ\oI]ZVfa%mQ(aTȁ.ǻY2Uqۛ>=}sSqc+41}E, l[iJs0ov/=_ܺ9OHb=h@S8i9к4T2 "%]?IUuEA$yA1׌ b);JVlf3MV 7u`t9]&RwEJN·x()'@3 D+yצ4qt"}:c>1ѹʲ%G+\Y4$8(9)40֫/<}oÐ.)%>0g1ґ9L|(YۂmvYPjI-..GeeE4ሪUI@_j⭩ VDQGQYDXA3-6ْKOcEm\BT!"V7ԸH%!`)UIglUg= 9b3jWE_^IUs +0I5AY+ۊ+rXkatsB-]Pɫ|Z-q*?78t/˚oo`=Vœo HL rpz@bS oO%H -Yӆ 8\x"~`j\uw{E0}; @;Eֹ0'-V֐"YERJ*м?߫,*zxYcDUo~뛧>Y=o޽syxwu]P-N}hAA%Ss[(|sz~vA{y7}Kszu*WǓ[GGw+ q]g{}hW'N5~ M+o[o}BLjt!`gHO&k/gQR̛K¬kpDXjbϼ{.|h"6y|pptWWF*A 6بh+q8<#>;/fsP}ry|^7 GO> LI|ɿ/>Jэ|ş⓫+9}xvu??˿r >|'sԧdڷoͻn>k,ӴpՕ˗)nKYT6İ6N<% g\6G 6"*/Odz?<?ٿu7bnpPU/? lxP=p@uy9P`|['/߸1 ?^ lP3/pF8Wp;{w?;{U- Z) 5m6G?;᠛)J+d/7G7pэÕ#:lʕ/U_K7|8ܨF/}+UO^y†*Aqt*G<:Gz#]ȔASpD pP=8\_^nx7(6_ ˜ph+Hquģ+l6^fsčn6U3ǣ {.U nQs>c˒XhYu TtcdmaecQ@@$y\lBURz #]N5;‘b|$9';UaeJ]ݏ X{E 7 +Ț*۶\ o3i&-VAe͔J2S',&Nds<˔w*i#,Yqla'ԺS2\X#kߥSqþzYQ3ǨA~9*P(#X8|4Wqq~fm;EtfZn) 2K)I`f]B謮Ŗ.ߘhJ8htE3芪):PGh;wR"JShj4T|VlmƕRkިYgɴyd7̒fVtK\RϚٶ9VD63G|:ݵ׀1ƀ/kOiNiW Ai>d?"edz3.,q Ů]ܽvoJrIxvcaGg9%PXdS&M>J>Kj $@-"$⬸)ϯ IDAT}S؟oSCHw^icKUI}nHqayTm1RQ|჋ :hi,Shlӳ]*?:}}G?r #5b1;c榻)=FUDZ Z5!s޷:LifOY7@ЋӇ؞{* ]}u7󪳳$mϋy 60tRtg:x{u[ƥEjXf-5 @!kqpWT9qAMWX#̧Q5*ע jlg3~5"xFAH(p)-,4Inτjg53_|YKi*eM @*{ McH&TcY~OgS;oofEۻr]"}r0 #)sʤ/rnw|RJi+ι##kkv*,-'}|V+hBEfϳmxxz*`GS+E!*9U)/p) n0#\m tN~Z 폷WOӴ4E Mg:i/ ,)U跴YAv]]XZUƔej2H߹+?iVdTEESUU8hy}u?|޳44p%M5S)H&]QcUPbCs7*p2NlWfdO1|>uDENrfMYDH =w:j^$-(\Lݪ˯P5/|`F+̈6]g}f 4'(=Az8HiCiGPY%{EFv]; 4Vl@DUJqѩPsj>[-@:WZ3IjިmVLHɝz&1MPͰ!(@,Y.f%n%"hkTjr> PxgBShP~5+rP{}Q 鼛tJSy-9=K'}ew vKrx<>)ΡnK~D(ҟm޾uݫwn^g6g)b} 늤,:.HUYߚhsd8-P- -.ca=d뒾33~V$!kjq[ÌXcF0PVDͲBcݾG`K(zߟMÅL.&[{Pu{ nnFUH|[UGI1%ۛ CG2圆awd }mŋzIB\CR.DQ<6B0,#zKK"s&4;v`6D,SWjr ,s P%Ì%h2[M3$IւKƪ#ǼLSC8~.3[Dݼ$3ڪضBtqPho޺!dJd$n(MQo}Ѳ#ECl RV\<# E̘d @F S ֋2iIS 9VP͜LCQVjjIFH dPy7'z92[ Zg^ó0K>_n~ג9@w89Ք2,enw'琦t?vR2o?yݾ A58\1}1x;Ybao>ι~:ɶ,h6IJfzEVw]wjV@|J✃*)|x{=4H(ӔS:Y.3J3nj0Cb+tfC(cGM eV3:]piRPk b\EZ{ZiG]w~Հ9?4Ie] ]-*!bCoU1jb(Πh{-7e} w~~ Z?Tnzagt^?6QԵ~kh0#tb{;Mg D1߷P 7,|஝7fAɀ-ZZ3`ٗXW moE+RX",0Mc`NCbnǙ~H-$i8?Sh`pps߽soߟ\l=BǽjQ00\unC-pޟ}77O[Fy[k34ړ@X]{wqozDDqEm!4V,9Ox{{݅9^.6Q[gQZ~ 謤r;.ٵF[>ZdNYq kTڪ9-ǭ@kxO,b7 k"nW\}eƦsl85g sKXfJТgU:vgob~~1<>üƏi@ґWɱLX)<#fy;NJs{_y8uYx:`³~gfzlJ`{{u7]?<ݾiQqD.ts}4 }=A'^wt@& >$O*Td+[KfIBRoU5Iʶ5]e,΍Ov{(?;n삙iJ~&gu4GNc&$Tt9yف-Yf#:+KcR]6B60;Qu"V+f8Gsޱ>QS3SﻓS-W*7 \KQd" I4e60 AhoMJɮ Ghm|:]#i=c; [·GM1$,Q 3V-ѐ#m\,'VVYk9s%+Ń|J]s.31#܊|U2qU!fhkV(. AZCQ8歬 WVmNރ>Hĩ"̼0ڰD,dڸ5͛ʹ4/<B_1 }K1.jB+ (tFmFk8hR,yum3^:C~fũ 9˫FזbF׌3a mE]۵yF{1+Ȭb]| ]Cgį|q锕8U0оLxcqtԢ݉>"2Mb5}wos}?c9{*piO=oߺk6ZJKAUU 1FOoe|yҌ"BmA!VZ UAqI,^?GRNfo_<<}L<ȌK:wBBq5LH;,g᪮ DptYJVEŽSf$ZU1c4nk! VہȮ0/4=&rH)ã5"~ψ7diEafDw5h M7P< 4NU&L|gDg\VS*`.^r^gu\s*l95g߷x3B)B72QXYQi\yH+B xFYaFj]_y ղE1b!\\~;Tm!8cNU <|@&| dVc ӔKcm)%E !*v9D9Ќj7Ds΢uL"{G8LZJ))T@!*PdͦOuV18'9 ߺP,",NYk>TwH&G v6-\ԢҥtF\iAuiw fYĊZye Ng^BUEdx3kj'{D1}E5hoM%[!G"VJCJGggiSKK?;? *4HERD4B@CYAZC[ܒs_1}ۥDӓd% TEe'EpUd*%z6$[iX9OE6R_Qx:U>ꌧ[1ȴ#M zֳj7e\%A>6ˢ(CJ;2yB0,ΰ붯ܬ/͉^^B3ٴڲښhʠS'i5$µ)+<#TKȪHME2AMb^7n?362*{gyČg\b: T丮gdFv֦ දHKNnݾ.xO߄4iLwܽw:8?nzU8:bPOι1FU} U8Tu;Bo3bA9gpqA~2OYT9ER \0*ٜ*$F1BPnkJoFd\Л|J< 7'Q֬UW,V[;)o?TIF+*^ԝ ô5-+=FlooffniA25m:dkSc4n7+zЬV(Hq~.}AQZN=YViSs& * *O_ YJ\U,[5KYkK⩙s}F6^硨,'4<1y>3ٷY:,]s"^P]q|d/MS1LS ߟ"0No^)0#lREJ (4L-žK)tދ{bT)/"֝aJM|CHS Ċ$qlcB0ۂ@>WJ m 08 цJ$}'( ) J76>.t[v`ܴ:=.Ө+\=(-U#z)jj EJIĥZVUYo}RGIU폷qo呚dX̋5jԠjguE rwnغ l gv!ٹ৞S``LC;9Oj0`驭õ-Ⱦ/m0ֽ/Sa@%J0de63Gp!O b@92>aE IDATOfI*s+WV@AF +Kju;@iӕfUMcJcJ\`rĀi+ kdNT}`R̭Mnhk'N8j܀UΪ5aj0Cqڢjb[8e_RPf(ͤ0~u!IS'HȤ~P4?=Лsa^FIWzփo]Ґ\:MG8dYOMr3:aLKUsWWibߋ 8ڕI¢QaZ5Q hȔs!vI Y9!@$!k*YcuMK\+;ρEQ-EKV8{j,I)%1C'H D䩺._>$<&(JR L|%Uc`dHCȂe-:v]h^YW@:}E>>;$v]\RR"|}0 Hb41C5KVS!=%\P(<3OJ&ICrLE|l|wa򎹈8e ENIT,=( 1gyeUhvc skvR=68dn ^CNo^aPDVs^{D5(5;LM_ ӴoŽzmuճdJ|e£=X]X.1ƋEvSy{2""CJ]g^8*ap9gb&]fh4AS !8XJvZ B Q5w)hA"`HٹPiy/*@3TU"_"%G>ky'bbqP"A /  vl8aLDYt[CE$Pc%Z1@> )PYi(Øm9[X% 򝯳{gBֲ~vQQ .أr'5fբ8]L`Ēp:v]4-JRa [;GAH^ ]}d}~I@nZs;'vCmReK7DEQ.ګwEsRTTj|K`D9kΒeLU&s,['&"R+= И EMv98|l)Tq f&4оK[틵n{__UmST5- `\Ѧ -) 6Xl@ȵ.6k,TMxɽ_:X(c^oo/YO? 1.6_~w>Dug]'1Ivpw=nrJ=l-. J/luM|8,w.>Trxy/{H|\{-׾kQܻ7hQ&gwP%m~=VtYlw ظ6evɧ.z})p-nb,k, u[{w}ŝ;wLܻ>;B ٵ\|QfkOUUfϰ eUkbftbK]lҽ;t.{Boޣ{gvtwp/!,Nu`2lId\C?,D>lT7w]V{; /-f| f_],$]ـDfX!26w^r !+r٨wqu*" bmBX,XxU,hAwY7Dι~Kt^lk՗~qoO?hqݽ;w=>fY,ǼY,,s.|#Ţ#! l,m⎕w6;;equ-cܱfpgl6 7Jfŝblt%G32d fY jRԷ-6khw6 , nТ(-6bctfB7[ ,+ ]ob_~AitaX`Y2c/3NR!C  n4)$Fo{чfܔSVz rY2q~= ]T''ON}죩YdL~ٰRJW_As{G9(-+q%gK @s&BœEB!cvlATՌ9C$LKTZͧz qjê b.r׍=6*sG s/:&JN"J@fΊZ-Ng5&b]$ vQGJW4DHErQrcR* -4gqM6j,?;欀w@9+ϜܙPv(,ՔDAIǨ`"pEB3W0#(@$dd6CR0PcY5"Q@'aLx4E}؋-ZlM)5m{) @'4gO*-eڪ24iu(=G'3VmB3+K<^f_ǹ<j9ėyRV8Tdž*I""(E.]֪ڿDZc^A4?G?yt9 {g*~\_fU}8JA߮T`ЅED_Y^^ 8t4paĽ8\ !$ٓ˹y+E}lPa`+&9aj AR%K ;,8G@lJ&*2$MPY\ӺQ֤p!E21Uɩ)9j"E*&C@֬Yeϒ%}*$ ٳcS6Lj yBleLraփTt óKU2zץ<&xyĞw^4CT5W䜷D)%|`Hwuoޏz躃aLĬ;y.lI)%(%JVYȅR=*@皶 (KvQ#e"70{x Q{̾7Ңksf!B^&[@ "Ou䫔4;Զ>Ѵ-)(#9BێfkG5{yL Gq,_=;Ab5gx*SDXhUSS(&@d!Uhk0chHYIe T U}!dɀEx;iL6-iKAS {Ea7ZR]t- WqH فT-oJ#(<9U3Ad\q Mޠ@Er$Y͒؇Ǫ OHa+3=jKmF3hdknϸ%E;OQ-I| y_ 1fu-&s eB>9#i\ eD A&hT%pпҧ1yrB G"y? UN|LM"0NvU^TϞWk=0 1UhѢ%ĨiЙ:$wBFY,?{k !U)e ,xP@M_yL"U"jRG`s.0ǽxz~~vA̱SJ"xbGL=sGFJ5K: NzvZ>](%y!R!\r5養yl-yLU0&G ɞMZ$ MKr](8g$}EXsb5iavڧ/̝$b\jiO -"fܖhl~ݜ-^Gc+f_md}%Z\ R;Tmd]"eW;Gڄڀ&h8fh y\4% +K>(=#0Meرᴥ䰿3ʳ'x?I2ҳ;;?_EI!p|t A%TWWCN<9({:ơNjJ) "]A1 e>>:U,l#gjS @J` _=^8*',a>tzF=sbЭ:mdžjMCPz/EeQs 4^Y5^rgbmRb.++ۅP픘C ն'sjo"@ gO>xExhVhsCh7wV4 wbh7Wǯ>89:sհ/<~\403{ GeR %^l`-[ ; I0#Pǒam=af/(jEܻ2kj?=ӈ8x#p&L{"Ƿ[}L?WܜmB^.f0v@TN4*U"I'M䝦Q /,'a|8vLg#XUg딳㬟(B2ѐrjJ,_ZuEjboj% C+1aH$u4͞|ʙ@Rcu1nbR?aV%c׿w{"Pb1z11XEU:q*4PY򺴚ܧi01ߎaB6k,H&xBD _ &d0SMY'- U)4- s#&O7qVf1YƁQѢ*5U ,[ QfӍd efZ٥6L"rIDZ)z]XG]U·{_١@5z6 ¢^k>Y&i4 &%̵?(lP 1P4e pF8fO^%Js47J6nU[NAr 4I+]iȔ:U=x3qʖpO wmstDœM/Pm6Jm:$ *f3Anhr@DÀ>C};>yLz$VgG.,9SZPb"2䜩vم~cRs겏jDAsZFH g?PUuTRCj*z|`2ZT.9Ǝ@ D24P5LQ,QτoM2ТٹK .VZi1h鍐ex60Dl{BݙFQM Ɏ\fO +JavZfnbCuJ՜/m 7Vy"K(|pZ{ aBiL" tȎZ)#RAfB6RuL8ݖ{bW@l,JD esd4kaA%SFٱs-KܷO%mYf5NcvTAڌ0-RSeѰyTP&W3e58K7EM8HйMY:vD 8X#_f"irI]8ܸ 28YGܸ:h2A^SYs$xH^)O?ykf\Er?xLãcU k9>:ȣt\/ފTDs:;|$%c3_]yOCrySyH A$ώj2@Y4 )/ΞB\ kGǏxu~v;fDR"(¤D=*LiȄ!Pf48d'ie! qN W*MgT#Dϻbz\_VL%@ "$iRh  R8!EFD #d$ E@+90KOC&@9 ^%w0^vTt22$59Y<PH<ԣ@S c$OkBOC$;nSQP!"9'c @PE& j^Ӓ,<e L,@ၔ.{ѫB5\EaB@D@ UH"T3nو,FiX@{nUă$ћLgB͙o6) yU]VgF ͟D>x(2ℙN^(Zr4=JK!DO q!(>%]wT"GI) އVc9 D]茆ؠ{1]~8?!!GC D;:2jOJ ]E%HfCZmtK?OT!OOktg)=&xRB<ş99-?x{-gQ|˽x~5$ƄZ0^?I'MĬ˼'*hx H9Xxv0_b͹):~Oȧ=g(K\ŒH<2CJȑ#9Zjb 왙0WCQ ]{LQr1~mhUas mۛoQŮT}YYl;lr2߼%[?U;_lYNKy`;hsMʓogLƅGBJKI{)AJ9dbbEP 9 c=GY4^8St5x,.x%Cɹ4.~"D,HѢE` xÓ>.tD_SI `{TMzyI;UU!Sb}9̸e܏Y`y`?WC5j^F*H1D.+-Eg| Tr*D{W9\bfjJ8D ~/2 2qf4my @jAt!z"fBk"v8\jg4R[ƫ?'<c{3V'*fM-UҬ`̱e=  lhȱOgOOw8@;*Lzѓ?z|:M)]겷TՇP7W7c-7Ϟ1!ңfٰ3jNW6jxRK`[ TDDØTKhy|t|bc=ǡxcBUM&,kB-:հm u764+&Fldnb{]P}GiKDQ[3ME P +)JP\#^fAU?xVn/ȑ_*'o$47m ɟxEDtjՎxi8|7y_ U^kD݇Ѵx[+PwUնh Hi<}zzh\].K(^sK%~Ab+9z "9(`:RJD sƶC}O-NxzaK!px7糾%7(Ŷijͨ3Ʊ›ճ*yƻKٵ:??*x,22A(L,)2гGгK&:1?<< h@+}!%?x CŽ.tTBY6]WZ^WȨ9f6 q<>}zڮ{e5E;p4T3W0&Lta}sz Tl0\ sC[TΟWU8Dhu%~=;?1PD;uɶ]DWo[{!}o>GDkU$?nexꃳ׾`cL=83RU=oQG63Pa lsBM_`(ŀ_Y cqbJ.i{گfkPǡ}CC0ٓ>t؟..DHRvD) I,Y Ȼ>" .P'TeNGOr, @C;8^Fqo]/_Yx1zZH|iw|b܋~wDa=S g֔BŔeN mxYrJiPIHPV":}zR]i۷\iL4ifg"~:jS U]=6d]+c ?c1}N# vDe~"Tj^U}uEB &(T"ʢ E؋ D*s}̽;PxL)CDo҅1QaTtu~Qpq *1D9x ,8k܏P-0 fG&T鬯VvHι22j0a 9h@܋ozLb&AyS e]%OUT#Tq)5E{}QE8@k+!*sVmgqZ4IM?y)3V#WJq>ySN RFU`݊l+9[T+" [ٺdEFpE֘֟cշyo Cg6-g.h1gm6AJ|C4g@Q Z ̥'| %O9[(f`y ,5hŽcP-`ә!Eb\O:.P9&BWYj[Iϛt|Щp5owjtg?{:`>1wO=wG֒rl!(Yj?D7oԷ=Sȓ}? ɿᓏK 3뚧?b3 [UF3fAUCfK"-3ϜdqG2frN@R%%~Bccr|. J}/CZLvo"Wz]m^$Y-,=Z8yqt] uG(1&(y$gDAF[JZ jZT3J"jk)Jٰ]ϒ:ir.kYnom_k/ry,9#n!Nf^v]|eqm2JV>P5=!DDɹ[IΡӵOZ8˻-ڸ(Ll\Z Zo8Ґ>x\̚kfs )߸nmԶyEmO~Fʷ Z~%^*8q[NsQEaMlmN# qV!WD9gidYTUQr>Hr$"anP9Jqko XDAv'( S|RySo{A_~N4gQ80~LHjRz.?1yBa[ sSMi>4tEruG)sJqΕʚs&ٟiBsM6rMqo~'l5 :wCΈͪJP@TMTRSV3 nԹ* 2t;vHTh 307'qیC)$) YԥN(mB880 jNF"a-Q%SUQoP"LU""8h)c51#X^ZS@=X'@̥+8Tng<73/}5ִލ5H;ܭeO3lHD9Մ+EH~hSc\ լ-lI<}|!'`:m}L+ 3*:'vē|7xsa2q@컮Ȫl_+iL% D8fD(C|x4hsPWi#BA1hmbR̀C{8ovV.4$#èe&? u2mg)1sHWͶmE[U5t@~,0}y֌@Ƥi=YݾJں#आ%Ǚ¯ mOIԙ#QdsN2 8'9wsBsN{G?x KVA Z(2HS"nRe1溪\n헱M˸]*5y[VJ}U8NxmXJOC,:I!7(& Dfq$%9БdU-)u\Fð\_NmQ+,p܋Tyra0 9%jj2߄0\ BU?s9 λ5'ezΨyKYW(ȚK|ұetZH@}Ϟ]ؤc2sFx8RL (C)$)}}; fȘ.U-*yL< wA@d8vyDPfբ0!Eo.2ǔ`nJrt@}܏0\3'Q !\?[=w%4ճX֕aܽ'< [a3D?=_N:lAQ0L2VT.h8nfg? Ϝ>Sܒ)b߭,bv7>Pi*84121Ĵ!":9ĭ2i1հ0ഡ̳ۄ@ʴ<{Llo]K~uǜdً^js!9VV÷CJYkD~tŽf8bMF濮x! iSe)yc`&h<8YGTx'O5 ;.ח olZSi2>|M>~5׾~lU@4cI̜d]pҘjDLx= My]yLwNP5/C$%9x 2P\M6;z<E*Y]WyjW3麽$IIkNC[(1b>ɱ0,'$p<uGYTO$fMVkiVb҆]j49m9ˆt[t:Q>7P9RJtQug>~/2Φ)ITl>]%ώMB}bW囯 g?x"9ɐdHJ:3q>e9j`MbH3۷q8>7%s4_u a{ni iNz q/~#%7:Byd1u&:7~.˒,_Yƽ8}b^KIB,Xu666sC  هl6fJb v"S]Uc{=zT2姈P(,@eC3>/rRڳAMmf>MA̦iʪGwۿ}b" %U3`fQDa fk ):qR J2M>IXn{iєҏon.VZuߝy9K]z}=?¢1ƛ77GSu N[կ͚]1үuOLV2Ch|)%dSѲ?z@߼ys㋣OtsKM&?/xFw4@aTtcJVPkMr>!" #R*ūmLke +f4xu9^lu߅"ki'qmzvi14|Wk "dw)ٕ @A01@9WD|ᨥ,Q޽o柿0 !_c^>'5)MDb#JCIV#W|LDNoއC3R9}qt͍39dvLs.T@Tx1ݤ.~5f}ui׻r )7yH:O7e IDATAr4PH()#FrKbUH'SZ:Q/4M(.XCl<O>5p'@0/S%-40α<[1U(y>~dYVB`cBi^gGpU7"!iZENg9%"gm[-w4Mq_jAv)lԮS^Vf7ֺ܋m4CJ-M-V{:UK!kg@tbSni @֢:Ur} xE,6kDP*THZj(Ĝ)D8 mI| MlOҏ`vqcMe|sowvhjfv[֊IUk,݅w8}r`%ai c%^bk2-:V k# /}Os!LEDm9ii};!}x x8qkiV(h.T(QÀ Ъ 5"*t|7@W,$,"13UHq^77rp0{) V9Qݦ3~duPQDRmV:4WH͖uRE;JN:-ύ1F։cVQ;"D*B%/jz>E]wB >sr 6 ~?TK-;^Φ&k+K"`S b*JUQK9F!d""[6/3ahN>۷<+iu#aK)b>R..<.Zs~B$,ʦ_J)466Oyv.1ٲ2s1P8kP]!*f[9<<NU}LNZ[mX{pZ,,ZW -_t<ƌA3P2 *$R60uv`R'"P9pD ̘bX@mŏ7ڷ?ְհi78od)ϰ)&&qHߕ}ۋ-9ǟWϵⰿɡ~0߰1ϳsuյ6ϙ۰Ѱ±ᱷ$l뾴=ҟYq=q"籷Ek|1i)eAM$*@jfMG5H~g~?! ߗ;ο6u~`ox6@2)8-Xc#>owGwώ/Ɍ'=qH`thU u2]\Q57LNj—㏁ghF`RBTe,3) qN9xxFJ*B0U2%@Q#I,1|}=U S6<(_<$8l~CW/Ϥ}ƣ__X7/IENDB`Oh+'0t  0 < HT\dlssChristine L. Solomon8hri Normal.dot.Christine L. Solomon82riMicrosoft Word 8.0n@@^s03@^s03՜.+,D՜.+,, hp|  PFRj  Title 6> _PID_GUIDAN{2FD97772-9F1A-11D2-93EE-00608CEA06EC}      !"#$%&'()*+,-./0123456789:;<=>?9EV1)%0 ;\F5#2Fք>Ɍmӿ7:NZY)?%6[FQ ~M"t0E+ Llf L];糘[>L\,0Op.ƔyclLؖo_7 !u#- ,YDQjZ:9 L O-)We ,8~Bw=JlkN_>(j6\`}bjr;~4"S>6ھF;NJVvjH؇g GM0pc"$S6F`$!R@B *t7)"$R 7lnPK|9'b)?Q}xS[no"#!>bhkT`~_~U>;Q fzDu&!2Q P:JC|yjk8XH܇ƣ0s6h߅C]tşpM⓯W!y=Ȝ~6uYa$: L:ҘrMG?zPHF~~m?6aWmQd5\F rS71x#@ jQ-& lJ9M+GFb:{66ʋ_2=o6. #?on¯ v8uKW,_$VjoX6%f׳7-Ke+doMm2??_lȮ*_n^%S2P xctېrpR.Q(-þb>ƴ:Ea*0&)q3=3%.+SΊ`-d<7Tv)&?zj hf(>ꐍS7ڌ sLȦ pxcDFj6;~bĢ&2G?oEiJ,νhfqg ֳN#!N >|z|$v%;5“4}GYz~pg`_\Hx#`*$1W=ocejz(("F6D*Fh8Z gv|F>ޥbi2IF n_hoM)P̬x @On퓺V6&?AFCb7((_78eR`Q~ZgXJdN؏- SչyM{ư@Jq`J#E>UL So;= Vj˳e -m4恛ՕͶSn^:˅F.Q62cbLp7$#oHZ3٪X4 gR~Z|r<3x; ]rwdԼqoϷy8){;FܲcGԇ@d$LIp[~''d*~\@ ț0m8{hSVhyI 0 ZF,Fysٶ'5%}F}= )?Fo[vj7G20+~2&}aŢ?Kn%2\ ڬAr l( Q%古c~(fPydS,fEevTLRKæB?Kl~-D33ڞTݽc-ޘ%Kk+mQڇ:]pZ iNDF^Д ZEfcME4j_%2,p52 ( F8UFd`_LB "U^sy '4Zu5oԾw)%oKD^(Y*S7Bl_"2ߓ̀")>ڼ!Wh>2`rIrɸZy@|s9i;[6x L,, ̾lsIW7 )S4{{1s]C 0BlJ:%pTJ26 f򖱯A! ~;q7KtʌˀY}*?flμT]XPk|W׍C//7qK+>FD #m:m{ l#pD KL~-2f$ y3\@qh)&OZ w{%S~2֏WFP#[g,7Ք݄j\=qycZ'Td~KxP w}YCc UTwak@pڋKI\Ў r x8;֑mxnŲ*s$!!eu )*iq0˲7EJl|+!!o<䐪 8Dd(&{x7͔ьh)2(;dFF?ŖBWm3PFf4H'i=0ռQ$r&K`bl5Z~=;|S}%IntQO:usyW+|Gdg؀qLF̷VI[﷭4#5 B><۴/a;u7Fވ힗Dc#16?ҷ-G5c13S5>pG_cU__ߔ%Tm8,Bm!{3l@ YtA-ټuZ Y졠ehHe &:LW8j®ݧqyaTW REˎM3F͆s^ڎyUqDZ~@[q/ ˢNM" +8s`)PGhNſ:qx`R%^j*e:08I?c_A|=N틼{3oTɎlg?j.D>2-G;̓M_NV:捧 []tb٩<<>ϙ7wƷ h^~c73훆W c<ÑD<D# Db;Q4a u@@ŝIFˇ7(n<$PS%TZ ]+wL'oF;.F8cfj z@3;ExVe} F*_J]P;= [oO͆+tkJ iyTtz,1+ͺF6yk63 YX]I#[98m)FGFMG⫹= ֆ߂!1Հ[YT,ޚ?>&+v~QҼpV-H~Eu Vֱq`Y D\" }`ߥSe'X܏wh ۡt^ry> )lds6S>ٰEq/[>'!֪Ϲ<˯t6L5`9 S*}+ LIQWtjlj5qޠlZ2+@V{Ԙ_^B_[\}u~]ShÚ@{ՂJꭶ7{bcbNN!:M&G̶̈esHN#?Tkg1q"SڎCX " }?0QeUR!ƸF`:nHTARV=&T,o%f9K /ن>tL$\RړXyuү g+/dU\H`k>!f[++5#6XN@+DX> wlnw]}5u,Di:\7&ʻ؃Dlf$:^\9.urmRo/]o8ւ2d4"1Z`YDl;{7!e~7&T^ĶPƑ.M3ѕ}oGaP3BJk6vs [3EHŠ2pǔzL%y`H6"0^|2_C䐬OD!I Wt#AlݬnHZREh$ h+?Yza{1}]~ I_7czYяxcڏ h4Dr\q%:ήt}9tnTC*Qޖ<y/t4!5+OܨǝYSOOOo}-}53XT-+a{k-KlBFjH4 ԉi k=a:2:!FܼIfܿi/2&붕&fȵ\" 2DG)q<"E2`-|:^$kH_f}#" A|8P_Y${f,W_IvMn]O 1*(`!0'Rib<<K-fGWK hlEW8rBo8=Fׂey5(]<Z{ڥ8fuf$DQҽyzpϗj\ d8Hkγc|m=9ɨc_TO'{jםw֕î"5yLG$e${nҚdcތHEZR&arc6* ^1Dg1taS&(ZK/B&i<,_>< |l6{X=o9:+5ׄ}ԖhOK?p OW]!f+??Zw"ws#& 60J|R̀g  3~Mg_4)ɷ/kX,[.׻!1 Y'R-gYb5  A^gQ6Awaz> S[VU2)UעLQ !ߒyѼ? l֬+\i[d;] R!@&ڀWƹN3OR-^9O!2f'huCyI&b2HR?¾8Xu2#d%7~M$.H4!e%hxM)~ti+a2[9_>lO/ =8靷.p={jv Aξo}iE{O[κJ^o~ٴN ֺ~ᢀwv*h9A;}O|OYD԰EGSJDRو+:_*ŒxF aӎ#Jp'_OU3@~UGVIuekգ@eql%Wc+ >n/qëfuzi]77vMz8nEW-:mBvZőF#15{"bvŕQ:P,' NV^4E&^܋V^60"1j]4Zuݾl/]5]q7pxs>˃k׿lm 7+׻@ & p8qx K=L&1t>Ot,Z@%ڱ!$ò8r/o3ibMG P-097-X$]ݍ1#`x:LwX-gvr6^Mu3[9}[, ueR= ӻbz9!aAJc5?.yfҞ5~dH pPBP>ѳىgD㚲3n9\Og&#j8/?(1z%ͫ/.7<\Ak<-vi+9x{0~`GۃT_>^r)*\}pΧZs)۪Kߨ/(uyɻΘincz}i{>^h\:ӾpI8szLA|n\8A-4{{NP,K@"i~পykMYXfzKyIr ɝ2 Ǻ6dy|j:y}h>о&`:t);$ؼh-ꯚM;^6#M{|,)($0\-i,F&I4wNq-`H¸͇b/'=# #Vj jRVz1r>cv [Ϩ_Ͳ5;4C._+YC:qޏ=P1]V/3|< c,4#<e=}Ko5znK? Am!f~lxSߖƛ+Poe;1 D˟3"󲕁Qv}TWy/Ք~Lg$b83ԦژzICgޓy0̔`әgړ}?]9y}QKpu#Ri Kh o-%Y@6JtHˈMGIآwz! 9& IaJQ6GО;%Uӻ׽pF$ĽewuguzY8zQ+#5#o5[|n|zgZ JczG19鍻hYx>׳h5 u&o{Qi9ѯ'G+:;e~XPcBB:j3K$(l&g LeaXG1P N7xSx=>čq,n73>ۇK3ܱ<<1=X/z~Kq{O`1Tj`4%W$vq$-q,6kB=Ic> B2*Rp.DQĆE=AroEK3!  Gob^m| Xk`{=L4sd\;EͿ6:pغtZWO18"a9^fb^=YlkNpEI"jJΈK3G.bH*Jr Z @#{.V KHDHgI[=㮋{NgIx/E ,fiM{`xN.G4dxHbE=cAݳ#:]HUk)& q4k13ǵW(V@MXo%e`|KL(F2:Wl"?PI'ߩy@L#?C,^[y+TAYx-M ny|C\a&|"A t&P5(`TMsEȯh 7;s{1fyy( {'?)xt063/^bKW|^ߨyu73Ԁ~c4QGa uM1$1@$}49)p4!nsZescN gUT1 8@;\g#tYI~ٵ}H͘)[#)%IPv$QTmˆ!Drm $D6 hw\8{gq,8$>7 j>`Y;B x: =) f,g"cgb}KFeD捊;687ܛyAHy `$fȐHYBNzf<8gLL,9pi1I40nAbƀ)|836"8E|~Xn _SP2a"a5_&k~.ЇJiqEwK݃12{|\jfh0*am#meSC+bx1֌6{TQgq`ިpRx#q[;2f;!(W䫞5o7v-=5#h5$qܩ7aE-Qm̾Hqܡ諈lpT$Գ``*lT]>,픘$qH6mҞ^ԅOݚ@ `!tQ5Oj@ VVpBB1UPEڊ3- WI G$C@(\tUבn$,'B y7 "J ɡYʲ33;nAƂ6GQ?.g`dda0c~{7*Q^ Qh!bsB4نxO޺yRcr> idTF^Y(a/O}efx/ӒvBcƕ̿1#qoT}=Zbi`j <7oM:~V %X7~KQ=FGs #3mBƕalˋ.*0\F+%09*Ȍ1s 4fjM8d3_c|P,5VQϼq!qF5<*'A\TPlf82Ȑ^sHaZ1v.-3FX0mI"ܔ@mDK捖7~f2{T{/o b/u4V7n+7w-H7Z+qxcEߨ$sMo$` ƚZXyW_8xK}BFAnPݠ~pHoL.*Rf~+R|$ohX% *L&EJĒ<']S6 ou# QrR48 |Oޚ]Z#;Ƚg{t71y/A "9hg\oq CFF#!lP .ʼN, N9[|݇2' Xb 5㣈|K]%SUSں&˄J.FKvlA~G)5d-yLGt쓌9'+^tV@OiMjLBN|*{r] #fk7YNnչ"?Lڴ";vGѯKݙx܄(-h=+ oܕ/Zމ\kL 5${1ְA `XM{eƨ.cvFR?7Ѓ/wݷxƒky/kZJcC`@\a $m~ X;$KWr,rC\E#QdozɆSS )x+Vo\1$#nFW=[v ګ{w'^72*hgrigfyw8y9>N@mx0b Sg07~wKg{AF ⨀SE?0I~ku=x$);Oq4֣>2ًY$.ڱH>1\lHT I'LP#rֈDsKF7Y8jš0FZMtD QM;SQ3nsB>i"I&0dƸiz!a?+ h 5,Ř/h"zdE㐜@,zh``;w "cGF7xeޓV~ܡ39^vG8W/Mvky>v@cRtXŇI@2q /Nx]C׏n\ XjN?BE &G89ĕ$>/=$A lOm bJF=?o\K ʛLe{UNmtEY77vjOrcU5<_X+kSNM<7E-$Ztƶ;-"Y#.Eߒ+;\ܹE .*x+/qM,vm&Дfe Ԛ..@9bُH`䪂6H_چ lH1にUU`D(6z i+=in(}!ӌ'(u!M}1Tt6o%5X;ewdΤQL8 GpLcF<`sT%2 Hrxd^1Ѷy~e  X/JQ" Gq ڋAx%-FMQ :`=:@G0>l4&HXyڹK,̋q.˞^  }go,F )xcE 1B oة_7UFg='#ԝx#ay(2JD[Wl{JQ&*310kkiF =S^Pp@KI 8b0CkWoXpŸ(Iw@6 ƛg+34B%M(ذ\60!M;1zmv8nA/!XU0d9ؐ@O6jG,1F=,`|H!+mYLM@ܵF7Nna,OĂ0kG(rԘ| !)-Fэt% 8!!8ML <B0N O (:cJ:ǀ{DfJG1̀6QD c$wǘ4&QS4<2# 3~P6HRCS Kc1FBHj%V>ZOe>.PWM xN۬Q yS;UB-cukO272r (0Q$E"gnCr$ |2]"EUuze};IRU0P#f4:Iu}q4!)r-/^=ġ>)^="Ȫ7i¼"kW꣌i̱2<0`of/i@dLHبAb Y;"c.>BB'.$HxEh 3fĦ\ r[Rse4 8ϤB© *VM(:W923$jrG@^w#| ޥ_˘Lș0,ӕ qwȎHfD28y|2mb͈9K9vK-_4Vg>T 4*M*"FH= 獜\UQƽVxjok ڢ1F።o$z~7ds(}1cGn֥㼫y7MIqkЛާjlח] fh }0&PMLׄhe`-} 8Lu&I_r;QsPU7tp ERo7sJi]5 X+x@bST-QL氈a[ x# *Ab.k5V?BxBcf5QMzW/۸>B&T!vZt !ϛNQI)BYMҸWt1g;AʻEdF }zFv$Cu܋ӼGiV{Ѯ{䳷5+*xQ4<;~Jy#G߯> n6t,cƊ{,PqW捖OO7Vx4c5?x,=?HUPK7Fbvr `zm.. sf{ LݸI`bvdX` @ZO{$JBOR1Ij\ɠ닻#Gr!"n'؉Y#ET =-t$3C*'UVJ}|u<Ǣu~ר;4;NcZg<3V&9v'$;(,=A1X \өwa66F$q^]gQ`Mbi\SPj#C+#ξVd, f~fU]p@q:+: oB 9eAA;H7g/a#rT~5Jdȭ7kFcvy< UߨuʏYGRXƟgŢaNpg_j}!ZE6Jh& ؘUY ܕb溁^=TZfei Tj>𿠖aԆʼn+Zޒ2.ԘgƠ*Քjvk.g:ҲP4©%D$0F JټpZ KxuAJL IxS+clRflva딕3+R x8Tɉ>Su=Z *!4T.Cx@>< ơʺc7&MV+Jz\R VS+^&T3ڸܒ]_, ۨ8dH1 m{W.8^z Nmœ#`+C XQeVߵc~l*XAi 3LxWW*Sz2frU]-/~%^F{\-$t27Z_=޸eܖ-$ i_`i"Fmc%=?xφ=o1iE6tޒwtUKjL}1IcG(-Fn9skA[Y\Q2$& `]8da6[G„b+1É*HhDJIt6 2V Mё&D@*5hC.Xߘw6fbqex,1+f |$%i$(5wG⛭xUsQpA.l(?͎ڡR_ `N]5Cwg1%+jv0d*Zw/Fv5Q]a'FYak4 JxU%A:՚m⍱Z-Nݻ+ ;eIA)Q_ߨ˱X֎[WcvB.l1vFݛxjQF]_a$(hأ|FPGjFm%LEXf?j)#"0SsS|ћg X;Y-MNsO9Uz~[h1|78EM1'=-qػ~R 4]TӜ+$[Z`(Tы<*qRZxi|ij˺TimIAQP5uSDOXIpoL9M[}#7R!X2T ȡzA7⍭fHX`v7֪?1L1}x#Al$+eSͼټzx *Fv, ԻVtcq< @~§^3TըD4:ͼFE۬7UX}}\hF`I߸ک ?|˿<O!7*J[YB=<y#AeCeȿy79WP[plhZIa`+7&*պ3-buKV7A]_me}chFdj?kgT t"8clEAl4q77Wż1,]o5e/"<ǖ_IZ^:z%^e FlroD{k2(/E6[j[Kco|Kة@MHQՑfmr Tf,S,{^3lxQ4 pS?T2^R$la r(fE̲~(F,жnqo{';r x7x7Lm }'a&﷮e9|= ߨ7,}c{*2cTFXFgzivJ^׽ؔs0<$;"!ϓ9lN>.SR:"TPӑP^u[Fibt:[#^:I .CZW2&K0d!9 nky Hs 锶GX7SܿUv),5Y-c׎(f Q\ yxcq1RKG1> ڼ6 cCs'J1,7ZH%@Ac|WDN#dI.1@7&Zq%Vx6Ss<8 \}%6~JcdF EjVu5Z+j;3XPoe>fޙJX ז(5#ISS1 4(bgcM۲S2i$T<^3X}$VЩ/ҠoWI/])ֱʪMT{4k+R)@p$2sZw Z+m(H":9GmS[|T!34g.20*zbD֦e}O*ڭkMWp \2H '%/n ި_mW"1oDju9%9N^C \B Xb_#vo8f|D]g)6#[hVqB 4=H7fQ131q1eG-1`[݂%R&Ӽ1a3 Cq蘯#GO? UKQS&*|`"b>fd# }c9.;oFN-zBienMS_Oc kv6q{l_9![$U#P[WuIn3tRV E=&jD,AHҨ`dJ6kR%8Oȉߞa~,ў{G\jʿqܧ%eiqp+ 苭 i$y V9:)l4{[36eCw񚯿 rSGi%pxH+=WȃkeX<u7)>{T\S/(3[bLԔuPښFOұ$Sf?sڊy_ߨycN6m]yoˮ4SaT5*u xSU}<ƁP>_LO&ޓ]98"ď#p[Ȩh Zh")\J9lB@!PGRy0&ΚkJ]k/ﳜ o,׽y.n SRe!U %t@F)G睠z.1U5x18BFmH141,J|övDFʫ BQESe90eī1b-_;x~AYq!Jx1g$CsҞHp#FàbVδʴڏ-1֧ղE@l6+|Ai?q8HJy!l0$OfO"ύ:z.l%PB pqa~זqk_kMxGԥ;%{|>506I5>޴ 3A\o,&p-8opٞHl 6Wa XGY9`edg/+!gcƂ(φi!nL[t Aޱ[4¿Uh}K7*;/7J>vA)&(EF@}a*d6蘷/; m=x<b[".-PyۊwYSٙ$xo޾h3㬟'Ǵ㱷բ/ް<*cVW|9O-[U6*;x6~PYKq1&xSřoxߣ!>x>`r2$Quo%2: Z#3FHY8)]JnD#Phx^B(RT(ݣ2nM#|c%"mU4"Wn|* 3g[P,6iKN-`4RY'ּKWRZftIig8lp5y7Ɯo,/\¦y1KLݺp o G˶CWki)`e /JJ9wXkOqDŽ\D2wq'\[21hgs,i6=O9a70{@&TK%% Cȁ9%Sэo1:<*0\)P,[qeƺR6`e=q '\ލq d7ѡQz:%.{5,:'N}Yod1y)ڠ^{U-㪵ivgMD]Ŀ(Rm{? 0o<SV+Ɲcgn3; oXߴSp}7 scO-:J8'CLhǹpH%n=j⬩%ߩ螗rmRM&&!A)c-"q(T9 M]26e`@Sђ*Vsp1#)b+. RM8:yWdn52DE(x(.2`EU{u@\"9t;k]=6Әy: 4WݰUg8 RKw}7_y?i( rª>!9R6l09{ksfr5K/XMG|[FtAl|& 8 o"P_եG N4qۺG)eƦ ?F{\Jiyųq40p]`kwu,aOblXeo7Qc+/_׳r!:"Ю[m#kcCѪBfH6N#DsHdJvUVmZWu,=oL50Cs1>9CBλs.}pcԙv+uT)ULIjZ2! b,m-f!ڔb`UjW:"FОq%j$s:ǜw`}kzJ.!( ʤJ57=RRSǀ^FKHdts7i?S8EAw0]N7(cG[t}Tַ~N%&qYATO$??,@9.2gp>J>~ P :Cd~0Ϗ4~>?qH𣇰?9G0$*OA:x<̗Tk&WwS$á U$R2|x>f[ϼ̱ʬի'<t+Dh1\jǬv:^ <,C|+~R)&пJVM"۽->RFnbaM`,Fi8I[ QF2Ѐ4λ<&'TDGI=unpitA?lg:DdC Ɣ{H%\6H.GvzT9DؼtDDՁ5K".g=,n9c/C1R:qC}wu: QŘ$*tsyg@PZ!ܕ JJνC\Qfč,2p9Dx6o^p68GLғjUJs6T-YdN0xG EN>j#7; 1cs=Ub@eO3!|Mu1&aRbf |Q<)U\P{\nT>o aY.iw5?d^3{fc6fQdY͢FeE2d)$RP$LF2dAAT]ڞybtʮӧuLa[SzSʷ >ɀR8ኚ'#޸τ,qb,cxA04޸B+43e]`,kq%oT85*"hdOsqx*DK bznFΗfGϻjU_TOaނzFtx!ejTmg4otWTHL[¥rpf'QT't%Ѱ}.o$(-5JWc<7}8VGc].Q}xXRGƍ~۵XբzۧrٖreRx, O7M;EUqܞ\m~XUPeQ#Qֆ|#CYHTkAxF]~(מq gXds7m=/!_qЇp\QRri%2C:TxGJx8?$0V8x|4@C8^z7$<F}xVlP"Jzc@ i.@6ƞyK o?ܨc`?tQϛ܇RP7=Sϒ>yog 푡"41=7Yj'Wn:ڱ;f;VyQoAQޙs4K~S4GI]5{Nq省%Q&5>?hYlohi,9cnEu7Qc#n|hK31oh;w 6<< x9 2_6,0ջJ5 x#PN1v]6:? 悁C[ϳ&V>IT0F!cAJ BXBτi*H~0o&f]l]9)xKauXeWZi ܙ8dΠ0|4F Y3V iL1_ȾQ1vzc\g ^Wx$(9րA~Wule1UaPɏ^zw}aqGk脶mFu?17\~jOE|Tm%s=µ&0R#Zb0Ȼlz ]3\O83t>r}\5-#YT՜G]Y/Vၘ/[ \M[QhxV0F.3QP,ף eF^c#wv+)͛- zk7 M>S(tFBA׺(:մ,O CTfdzL8Qxr@.7 6JlS' xP;]oxcx,V" >R_n䱦4'8&F,q'wFX"|\#9G O/;7d|f$`Rq7e7\#<<=xIIQ^=`2Pr[\E(USIm>q.S1Qܩ?᜝-<<CzBrQT9€@;Mq ʻUb vn$2o@*%`VMbojY>EH7pt q t Pr  +3FhZ]oGyx[Ҏ}$;߇8i@Ew~,y!3=`zmC#x^>A??c5%B:DW@-( !@Lr[Ƣ4C߫"^䒞ՌУOURw=t7,JRG#Z`z'ORHJ>=)oz^0u巣)[B.Qez^sw,x7>rc r F"/*E6QLV֓4$𨹇>lUw?VH\O|=WT r !ƴ[ *:x6@]`m^gXYKz؟EwxfOӠ4ȣ r9|٩Uu/L&Xhӿ |kqه ❛EҘ_iM&II"M..v[n;5F|4]M)O 7Osp<7}`̟8J t?My j\K\䉔,:`;=%,@ a4IG)GOˬgfTsI"6oJwW-Awy5"Y.ڽK)da" WY|Z-.i$<5ʂ^'uN@?LAُ &]hόM]h[!#r.:}ǩbc\6ˍ+zFoa_Q\Žܩh/fJ)͓;Y.?x.Pߒ:)O R4a%_5.r8~Ϊ@p+jwg *^qRW t|߅tMum'Ռ I,M7|+[+ttuAtg)\Ag4gHd7.Ic6&LOF0. % X@ Q@)|[lMw ]2O=_[/ ôUИ*cºU|hiڝ8:9RRmm+R^._E.B*yo4y0y] Uv{+,7˼=G=\4\4kp5poP(~r[ƣ?]hۊΥ=<=o[*_g L^|ZLtfR?Uo4`zȍ]~c#ŧ}3Y /ʻ a u2.caG"Ts,W'H<0 8&$jx98>tfE:"ٞLn([t(6꫘P(>;uw+KQ;2 zQPtA#t;t!#c ű[2"+W-JT@^òԩmlwEo K%o2M6=RWMiid*k׸Eأ ׶q^m0Tʈv9$.['9>9"&dlDH8\@jN>/eM WF#~Ɩ 2,nyE^8PhDL*Etw'(_z(E60:tZi\uBjo4kԼSSR~9}qlIzV>#糾³x2=šsʲA)5 + u#q" 牎NI,B4Ry\S˗x9rޒ00{\=;6 dNga,Xpq_- i6gY84`AaLE8 2Ɩz:K vi KƑemN>ު1=&ʯ"?x}m";o;3eH V$9; PnˤdU8 (7Y QbVJaֿjqbދG0Vl9?"Krh#o=>IĎƜ'rڟՃRӭw#IL+,sI&1ªd6p :84 %>r/+r_!.'&W?ܶ;YThOŏPľj*WlRcB7bt"AkI]c[b}nbԹi4ap6d^ꎏmsoӈF'BLq6-J dB<@.Lzƙ!UԒPb:oc:֜V@^T݀|9%w GAa (LJVxUpogHNNaxEpF҈0/M\Jo !:X("1<$m ^9O_7TBr_:yɻC'hP36;>,Qlx/˽#hXRwJRMo$٤>u96 B`G1RijOOw1%G'“a>6z0tX܈^q6I{v'zƴ%o)MWk}oë!CΏ_>tbqwK_hoNũؓkЮcvАa6:QP7wm3֏"o},Pz󒼑JBޘ)ҙS[܈7Ӊ@T%ď0XRQc%XKya_ )aGa |c(Ga:q/{h('UضN_[b*P(t6bԳڰ>ȡmaޘj/s,.6q"))K/''1DTO0]H.j7FEnt ?jEGX;u-^6n]r8kհhY(uiźFZtTݴi3>y DR ;\V9UcjN}8Y^S[(oW卥m(%,EX8qxLHD-Z1U)_H ou#d`șDcHU9loUNyl(oF J"9sT.HG=UdJy[mS/5^6FIH0%yNeŇ!3lMƖaqwGqmbftGF=14i1n6Śz]t T@dz?Z2ޖRhhq]`כ4O3r&hs_7܀FNg(wQjX1<8pgn ppRmouOs&nC)02x7~[*>l\ <5uo|,~mնGW0K#JWc/ù 'ņzͨḨѓ3\m&:6ڸp :}M|oy~ƔDP^Eeʪ"8bQa\ǥkj1l,V3'ltL[܎  j* 4(T=G`%GBb7cP36y̢~P.jRa#$T#[ ߹qh ҈1#&P袺(e̪Y\n"!3\=NcZc7~x^"%y3?\v2mEfh+Ј鿋77.[B5u:bc&ȁ97=U]HX]6|# P#&oTzmظZ<W9N"D[`-x<@FDbQɤlr.\ùzw_C$7^~Q_//fp"HtZtPQ Im@*XKƇA:ɂBYȯ,N:̞lH#gg 7RYhjeŸ%'ls:-^6RR^lbI3x5+3卺.jnp՟ xV ;F}*oυ7. ]|Kw D!d&t%/,8o)܏4 T72/ot^e]LTYi[zkOE&!ʑ4o.2LI} E]1}|z18:Q\*dV8:\*X%nQvv+7jF#.jÂv7j(1Wg7Mmڰќ6FfyqQ?o_TW0bɣ*lU5V2ViEDJmmi-I꯹X64Ō@W<`'6M[SKɝfF. EvS獘; +$?x֡~ ?t%$x5EpBNkc݅l] JOlD&e¬9Q GG0{ CKJS-m䛼qO*:l |Kl|3λH81]Ry$tA6H#l:6hF5\U7>fH6T\6ƹ`#ko=7Z_$;B a iyM2;齻 -MQR`K fMn-d]S͝vOs<6% ".5h<~ӻ>s/xTzuظ",WcNԢ {,+UUGXAKUݺr6m4D1u-l{Ɨ7R"f߸QPNEsb.>շwjbx(7ۃr$r1u0/mOy ?4j0@?ZXKȷmx Q_S!v6svqыhP P](o=1\$1&sW`kA1֨LZ+Un9GY/7MAґE@[u꣬~ <҃"U9/]LNY.br0_OpY =f4ްjwAS3 N,p܅=ζgFƵB a`ٵMv!#5kK^zɭ-|{Rac"aY˲HwsBlFiR7#Ub>4$FIF0s36׫A^VPA@[(_- )G靌n-PŠYf~j c"Uq&Fv`yIY24v~#Z++CRnZ<yX u.4Zkg٘9v ][ 4= !YP0b_ěqOz}ظ%o\?Yq[ocB5:3顂΂Q5,>"k.뤠\{KU[Yz y#S/UR۳\dp=CH.Zxڏyt jWQi5>,>*3]D  EK{bôiI1<:Nz#Pׇ>¿˳²6ղ競:r" FoU C5b=o׉!HM VG}̊Uqdب 8nv=d{Ѕ9Թ6?~^uBƍЈz?K [vi!g`dbeŬ`a*+ᰫ=<峹o5Wx-4P +_+,el6@^1*F֞Pўnl#kqVMycؤDg.俪ǦWr']\?-3p6,i 7.hl@yhbn#[V7H ~/n@ 6Dl52Ͱy7x#sZDLNՈUN,`fqMx1ͧ GovY?/vFƍ@dF,çl<ǓV|`f{דYwm6|Q2obPnujZuB`'R̰qOX%zI5Dqa%:UyrmbMaQJC<xLe2,"02m.i=2FI°-‘aڳ8ggZ>602Vt jr4DP`86#2L;ਆ}<`){Wr-Eucc}~eݻ̰h66GGb xnf%ZsõD[2JFF4!7_7= Y]rF(g n%^Jh2 I[ryFb|pʧ*yq ZiB6&F3+7Hv8vCrB.[Qmo${~ml_oniT~c!|K׎q ]beF 7}aokGF4N2 !H2td[O6 { 1lћ_SK?2ۻ1-!&ۏˀ57.u#LvrzHm57e>7 zgnljz4(*[}ߒ7=%1ch =prٺ Y8C=ƅ=p'&,QXp Sg]pEC2&)/-'P^BŽA6Fɒ:" #]*'k}'ؒq/_YF 9R@G,26+>>$=5D9쬳5˭-M֩qz6) ^ȯ$"2[PqZR9WO+mׁi1t\J」D"׊ RJ~N|$pLGG~52a7i޲D|tݱ2ʻO F^P>OL6n+bOxTH&E- okg"i9Y#/q;CTU{oa(h~UWi17z=AaO1@ly9m" ($2DG(ٳ`. \ %pIDurN"0i-Y=TO@ t]C*JW, U0peH(Jd- ^̪ ]juIAxTq(aDLgl&w6JL"(cPoh_0ud)0[lO aJGY@EA:뮞bV? o2g'm~5ΫH; љ-prxPm{nk([1Λ==3;09[!d)1Mg+޲/dJ 7[ٸjTexZY6\˦KB{ɵ׌tcK*̧P e2WaFɻ ))'~Fg5l!ny6u=(OK|)m~-lܑua>У U.ji2G>V[679t0k(F1hN>ܪôƉp҄o6Bp!YK!$|互{@1oU5u݋ &@ In$!?d\hšٴbJš "Qib*A‘'o6kq*.lFe( OiŶi  )OL>67Ѵ۹M07ҳG=-*D,u<骼8;QxQm Hv|:6$^^*EpF[{^N'2a#DWj&$[ocu4a)o 4CX֊FSV31aLG sjԋFռc=gڙwx.pBx$ߵwi׻|Ac$嬖O 6ԍm%[i $y?g'Xkk!6ΪN)7qf8ZՏIA F_ k< ,<9 MۡL3;NXBR>DLxl歼N)poZ{ɇظVE)+ BC:ꦽ_" ѻT"}cn,5_8uRC" zsqѐY3 GQfy$붛gihKjX3L.ʹ8n(?Dlgx\SSb޸7豨 Lޚ퐕7< `p.mryد]-49W6>䞚˪&Ɛ }'3+#| mSDGe[?'sC4DrSx_p\1=wT \JU0I1]BZzϱmXzy^Z'J| nlՁ`v| \ڜ1s28#&UCiE4jjc:X]P@1w#OLsdOFZèeN >62. .zRZ{V/{\"#!IBfX88z??Z>ef36n&cO\/nwu$ q;.Dq,.=,VHDE pubiA|Oc m?pxVuniw\Ӷ]6JzZWo"l6Nn8 40̵)[~Nq^ljxAx,P殫L{zڒO3)LšwԮ'|tafզ/7 _"ſ__5>*Op᷿$$If!vh5 55F55#v #v#vF#v#v:Vl t65 55yt(_iT$$If!vh5 55F55#v #v#vF#v#v:Vl t65 55yt(_iT$$If!vh5 55F55#v #v#vF#v#v:Vl t65 55yt(_iT$$If!vh5 55F55#v #v#vF#v#v:Vl t65 55yt(_iT$$If!vh5 55F55#v #v#vF#v#v:Vl t65 55yt(_iT$$If!vh5N5555#vN#v#v#v#v:Vl tn#5N5555yt(_iT#$$If!v h5N5`5`555555 #vN#v`#v#v#v :Vl tn#5N5`555 pZyt(_iTdkd2$$IfTl B R"#N`` t0n#$$$$44 lapZyt(_iT#$$If!v h5N5`5`555555 #vN#v`#v#v#v :Vl tn#5N5`555 pZyt(_iTdkd$$IfTl B R"#N`` t0n#$$$$44 lapZyt(_iT#$$If!v h5N5`5`555555 #vN#v`#v#v#v :Vl tn#5N5`555 pZyt(_iTdkdH$$IfTl B R"#N`` t0n#$$$$44 lapZyt(_iT#$$If!v h5N5`5`555555 #vN#v`#v#v#v :Vl tn#5N5`555 pZyt(_iTdkdӶ$$IfTl B R"#N`` t0n#$$$$44 lapZyt(_iT#$$If!v h5N5`5`555555 #vN#v`#v#v#v :Vl tn#5N5`555 pZyt(_iTdkd^$$IfTl B R"#N`` t0n#$$$$44 lapZyt(_iT#$$If!v h5N5`5`555555 #vN#v`#v#v#v :Vl tn#5N5`555 pZyt(_iTdkd$$IfTl B R"#N`` t0n#$$$$44 lapZyt(_iT#$$If!v h5N5`5`555555 #vN#v`#v#v#v :Vl tn#5N5`555 pZyt(_iTdkdt$$IfTl B R"#N`` t0n#$$$$44 lapZyt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh5 5050#v #v0:V 065 5022 l4 yt(_iT$$If!vh555#v:Vl t065yt(_iT$$If!vh555#v:Vl t065yt(_iT$$If!vh555#v:Vl t065yt(_iT$$If!vh55 55 #v#v #v#v :Vl t655 55 yt(_iT$$If!v h555W5?5X555`5 `5 `#v#v#vW#v?#vX#v#v#v `:Vl t6555W5?5X555 `yt(_iT0kd/$$IfTl T ` WW?X``` t06((((44 layt(_iT$$If!v h555W5?5X555`5 `5 `#v#v#vW#v?#vX#v#v#v `:Vl t6555W5?5X555 `yt(_iT0kd^$$IfTl T ` WW?X``` t06((((44 layt(_iT$$If!v h555W5?5X555`5 `5 `#v#v#vW#v?#vX#v#v#v `:Vl t6555W5?5X555 `yt(_iT0kd$$IfTl T ` WW?X``` t06((((44 layt(_iT$$If!v h555W5?5X555`5 `5 `#v#v#vW#v?#vX#v#v#v `:Vl t6555W5?5X555 `yt(_iT0kd$$IfTl T ` WW?X``` t06((((44 layt(_iT$$If!v h555W5?5X555`5 `5 `#v#v#vW#v?#vX#v#v#v `:Vl t6555W5?5X555 `yt(_iT0kd$$IfTl T ` WW?X``` t06((((44 layt(_iT$$If!v h555W5?5X555`5 `5 `#v#v#vW#v?#vX#v#v#v `:Vl t6555W5?5X555 `yt(_iT0kd$$IfTl T ` WW?X``` t06((((44 layt(_iT$$If!v h555W5?5X555`5 `5 `#v#v#vW#v?#vX#v#v#v `:Vl t6555W5?5X555 `yt(_iT0kdI$$IfTl T ` WW?X``` t06((((44 layt(_iT$$If!v h555W5?5X555`5 `5 `#v#v#vW#v?#vX#v#v#v `:Vl t6555W5?5X555 `yt(_iT0kdx$$IfTl T ` WW?X``` t06((((44 layt(_iT$$If!vh5555 #v#v#v#v :Vl t65555 aytGeT$$If!v h55555X555`5 `5 `#v#v#v#v#vX#v#v#v `:Vl t655555X555 `aytGeT0kdA$$IfTl p : |X``` t06((((44 laytGeT$$If!v h55555X555`5 `5 `#v#v#v#v#vX#v#v#v `:Vl t655555X555 `aytGeT0kdu$$IfTl p : |X``` t06((((44 laytGeT$$If!v h55555X555`5 `5 `#v#v#v#v#vX#v#v#v `:Vl t655555X555 `aytGeT0kd$$IfTl p : |X``` t06((((44 laytGeT$$If!v h55555X555`5 `5 `#v#v#v#v#vX#v#v#v `:Vl t655555X555 `aytGeT0kd$$IfTl p : |X``` t06((((44 laytGeT$$If!v h55555X555`5 `5 `#v#v#v#v#vX#v#v#v `:Vl t655555X555 `aytGeT0kd$$IfTl p : |X``` t06((((44 laytGeT$$If!v h55555X555`5 `5 `#v#v#v#v#vX#v#v#v `:Vl t655555X555 `aytGeT0kdE$$IfTl p : |X``` t06((((44 laytGeT$$If!v h55555X555`5 `5 `#v#v#v#v#vX#v#v#v `:Vl t655555X555 `aytGeT0kdy$$IfTl p : |X``` t06((((44 laytGeT$$If!v h55555X555`5 `5 `#v#v#v#v#vX#v#v#v `:Vl t655555X555 `aytGeT0kd$$IfTl p : |X``` t06((((44 laytGeT$$If!vh55 55 #v#v #v#v :Vl t655 55 yt(_iT$$If!vh55555555#v#v#v#v#v#v#v#v:Vl t655555555ytGeT$$If!vh55555555#v#v#v#v#v#v#v#v:Vl t655555555ytGeT$$If!vh55555555#v#v#v#v#v#v#v#v:Vl t655555555ytGeT$$If!vh55555555#v#v#v#v#v#v#v#v:Vl t655555555ytGeT$$If!vh55555555#v#v#v#v#v#v#v#v:Vl t655555555ytGeT$$If!vh55555555#v#v#v#v#v#v#v#v:Vl t655555555ytGeT$$If!vh55555555#v#v#v#v#v#v#v#v:Vl t655555555ytGeT$$If!vh55555555#v#v#v#v#v#v#v#v:Vl t655555555ytGeT$$If!vh55 55 #v#v #v#v :Vl t655 55 yt(_iT$$If!vh55555525n5#v#v#v#v#v#v2#vn#v:Vl t655555525n5ytGeT$$If!vh55555525n5#v#v#v#v#v#v2#vn#v:Vl t655555525n5ytGeT$$If!vh55555525n5#v#v#v#v#v#v2#vn#v:Vl t655555525n5ytGeT$$If!vh55555525n5#v#v#v#v#v#v2#vn#v:Vl t655555525n5ytGeT$$If!vh55555525n5#v#v#v#v#v#v2#vn#v:Vl t655555525n5ytGeT$$If!vh55555525n5#v#v#v#v#v#v2#vn#v:Vl t655555525n5ytGeT$$If!vh55555525n5#v#v#v#v#v#v2#vn#v:Vl t655555525n5ytGeT$$If!vh55555525n5#v#v#v#v#v#v2#vn#v:Vl t655555525n5ytGeTDyK BFI.info@Maine.govyK 4mailto:BFI.info@Maine.govDyK yK hhttps://maine-securemail.net/s/login?b=stateofmaine$$If!vh555<5<5T#v#v#v<#vT:V l?0&6,555<5T9ap2yt\T $$If!vh555<5<5T#v#v#v<#vT:V l;0&6,555<5T9/ ap2yt\Tb$$If!vh555<5<5T#v#v#v<#vT:V l, 2YYYYYYYYYYYY0&6,555<5T9/ ap2YYYYYYYYYYYYyt\Tkd$$l,("'''<'<'T 2YYYYYYYYYYYY0&644 lap2YYYYYYYYYYYYyt\TH$$If!vh555<5<5T#v#v#v<#vT:V l, (YYY0&6,555<5T9ap2YYYyt\TH$$If!vh555<5<5T#v#v#v<#vT:V l, (YYY0&6,555<5T9ap2YYYyt\TH$$If!vh555<5<5T#v#v#v<#vT:V l, (YYY0&6,555<5T9ap2YYYyt\TV$$If!vh555<5<5T#v#v#v<#vT:V l, (YYY0&6,555<5T9/ ap2YYYyt\TT$$If!vh555<5<5T#v#v#v<#vT:V l, 2YYYYYYYYYYYY0&6,555<5T9ap2YYYYYYYYYYYYyt\Tkd<&$$l,("'''<'<'T 2YYYYYYYYYYYY0&644 lap2YYYYYYYYYYYYyt\T$$If!vh555<5<5T#v#v#v<#vT:V l,0&6,555<5T9ap2yt\T$$If!vh555<5<5T#v#v#v<#vT:V l,0&6,555<5T9ap2yt\TV$$If!vh555<5<5T#v#v#v<#vT:V l, (YYY0&6,555<5T9/ ap2YYYyt\TT$$If!vh555<5<5T#v#v#v<#vT:V l, 2YYYYYYYYYYYY0&6,555<5T9ap2YYYYYYYYYYYYyt\Tkd,$$l,("'''<'<'T 2YYYYYYYYYYYY0&644 lap2YYYYYYYYYYYYyt\T$$If!vh555<5<5T#v#v#v<#vT:V l,0&6,555<5T9ap2yt\T$$If!vh555<5<5T#v#v#v<#vT:V l,0&6,555<5T9ap2yt\T $$If!vh555<5<5T#v#v#v<#vT:V l,0&6,555<5T9/ ap2yt\Tb$$If!vh555<5<5T#v#v#v<#vT:V l, 2YYYYYYYYYYYY0&6,555<5T9/ ap2YYYYYYYYYYYYyt\Tkd3$$l,("'''<'<'T 2YYYYYYYYYYYY0&644 lap2YYYYYYYYYYYYyt\TH$$If!vh555<5<5T#v#v#v<#vT:V l, (YYY0&6,555<5T9ap2YYYyt\TH$$If!vh555<5<5T#v#v#v<#vT:V l, (YYY0&6,555<5T9ap2YYYyt\TH$$If!vh555<5<5T#v#v#v<#vT:V l, (YYY0&6,555<5T9ap2YYYyt\TH$$If!vh555<5<5T#v#v#v<#vT:V l, (YYY0&6,555<5T9ap2YYYyt\TH$$If!vh555<5<5T#v#v#v<#vT:V l, (YYY0&6,555<5T9ap2YYYyt\T$$If!vh555<5<5T#v#v#v<#vT:V l,0&6,555<5T9ap2yt\T$$If!vh555<5<5T#v#v#v<#vT:V l,0&6,555<5T9ap2yt\T$$If!vh555<5<5T#v#v#v<#vT:V l,0&6,555<5T9ap2yt\T$$If!vh555<5<5T#v#v#v<#vT:V l,0&6,555<5T9ap2yt\T$$If!vh555<5<5T#v#v#v<#vT:V l,0&6,555<5T9ap2yt\T$$If!vh555<5<5T#v#v#v<#vT:V l,0&6,555<5T9ap2yt\T$$If!vh555<5<5T#v#v#v<#vT:V l,0&6,555<5T9ap2yt\T$$If!vh555<5<5T#v#v#v<#vT:V l,0&6,555<5T9ap2yt\T$$If!vh555<5<5T#v#v#v<#vT:V l,0&6,555<5T9ap2yt\T$$If!vh555<5<5T#v#v#v<#vT:V l,0&6,555<5T9ap2yt\T$$If!vh555<5<5T#v#v#v<#vT:V l;0&6,555<5T9ap2yt\T1TableuSummaryInformation(DocumentSummaryInformation8 CompObjq 0;`0;`0;`0;` 0;`0;`0;`0;` 0 ;`0;`0;` 0 ;`0;`0;`0;` 0 ;`0;`0;`0;`0;`0;`0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;`0;`0;`0;`0;`0;`0;`0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;`L@L Normal$>*B*CJ_HaJmH phsH tH ^@2^ H$N Heading 3dd@&[$\$5>*B*OJQJ\^JphDA@D Default Paragraph FontRi@R  Table Normal4 l4a (k(No List4U@4 H$N Hyperlink >*ph3fN^@N H$N Normal (Web)dd[$\$ >*B*ph>@> H$N Footnote TextCJaJ@&@!@ H$NFootnote ReferenceH**W@1* H$NStrong5\.X@A. H$NEmphasis6]HRH 9 Balloon TextCJOJQJ^JaJ4 @b4 9Footer  !.)@q. 9 Page Numberj@j OC Table Grid7:V0*O* OC ec_spelle4@4 }Header  !/MVX#e5QHNO /0JKghU(d(,-4hж8wQBT3iVRIXZa a  $$$%!(*+ /13@47x9:: >:@X@@DcGHHBKNPTUUXJ];`Kaoac'ddghkjmm n.p8pPsQstt000@0@0@0@0@0@0@0@0@0@0@0000000000@00@0000*00r 0r 0r 0r 0r 0r 0r 0r 0r 0r 0r *00B0B0B*0*0*0*0*0*0*0*00W0W0W0W0W0W@0W@0W*0*0*00o0o0o0o0o0o0o0o0o0o@ 0o0o0o0o0o0o07C]^_`abc./0BTa3iVRg0HIJKXZ~ a fgha  $$$%!(*+ /13@47x9:: >:@X@@DcGHHBKNPTUUUXJ];`Kaoac'd(d@dddeghkjmm n.p8pPsQsttbuluavbv%w0wwwxx6|7|G}Q}EF CMoAKs}؝+ӟԟ؟ $+39ABQX`fno~hi{}æŦƦԦ٦ަ "',278CINTY^ckpq{ŧʧΧϧէۧ ǩʩͩΩשکݩީ!'(.4:;=`aǫϫЫ׫۫߫ 34TVZdepsvwĭʭϭЭ֭ܭ4"OPT^_ekpqw}ֳ׳"'/15=>CKMQYZbeinstw{ĴɴδϴҴ״ܴ #%*.235:?DELNRVZ[]bgklru{HIqrvwȷɷзӷطݷ #$.048<=?CGKLVX\`efhlpuv¸Ƹʸ˸ѸԸڸ"ȹ-/_`deopýĽνнӽڽ۽ݽ !#)*-/67EGIKLNPWX_aefgikqrx{~!%+,15;<CFIPQTV]^hknuvy{ !"#$v'(TscdHK`ag56I'9 EFgi*+,=\l~uv 12|}&' -=>?ACEGHbcdefg 789:;<STUVWXlmnopq#$%&'(PQRSTUnopqrs)*+,-.JYZ[\]uvwxyz#$%&'(*+,-9g7<=>  !-EFRklwMNO+,-JK000000000000000000000000000000000000000000000000000000000000000000000000000000000(00a0a0a0a0a0a0a0a0a0a0a(0030303(0(0(0(0(0(0(0(00cG0cG0cG0cG0cG0cG0cG0cG0cG(0(0(00;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;` 0;`0;`0;`0;`0;`0;` 0;`0;`0;`0;` 0;`0;`0;`0;` 0;`0;`0;`0;` 0;`0;`0;`0;` 0;`0;`0;`0;`0;` 0;`0;`0;`0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;`0;`0;`0;`0;`0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;`0;`0;`0;`0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;`0;`0;`0;`0;`0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;`0;`0;`0;`0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;`0;`0;`0;`0;` 0;` 0;` 0;` 0;` 0;`0;` 0;` 0;` 0;`0;` 0;` 0;` 0;` 0;` 0;`0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;`0;`0;`0;`0;` 0;` 0;` 0;` 0;` 0;`0;` 0;`0;` 0;` 0;`0;` 0;` 0;` 0;` 0;` 0;`0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;`0;`0;`0;`0;`0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;`0;`0;`0;`0;`0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;` 0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;` 0;` 0;` 0;` 0;` 0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;` 0;` 0;` 0;` 0;` 0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;`0;` 0;`0;` 0;`0;` 0;`0;` 0;`0;` 0;`0;` 0;`0;` 0;`0;` 0;`0;` 0;`0;` 0 ;`0;` 0 ;`0;` 0 ;`0 _0 _0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _ 0 _0 _0 _0 _0 _0 _0 _0 _0 _0 _0 _0 _0 _0 _0 _0 _0 _0 _0 _0 _0 _0 _0 _0 _0 _0@0@0@0@0@0@0@0@0@0@000@0X00@0X00@0X00@0X00@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0X000000X0BT3iVRIXZa a  $$$%!(*+ /13@47x9:: >:@X@@DcGHHBKNPTUUXJ];`Kaoac'ddghkjmm n.p8pPsQsttbuluavbv%w0wwwxx6|7|G}Q}EF CMoAKs}؝+ӟԟ؟ $+39ABQX`fno~hi{}æŦƦԦ٦ަ "',278CINTY^ckpq{ŧʧΧϧէۧ ǩʩͩΩשکݩީ!'(.4:;=`aǫϫЫ׫۫߫ 34TVZdepsvwĭʭϭЭ֭ܭ4"OPT^_ekpqw}ֳ׳"'/15=>CKMQYZbeinstw{ĴɴδϴҴ״ܴ #%*.235:?DELNRVZ[]bgklru{HIqrvwȷɷзӷطݷ #$.048<=?CGKLVX\`efhlpuv¸Ƹʸ˸ѸԸڸ"ȹ-/_`deopýĽνнӽڽ۽ݽ !#)*-/67EGIKLNPWX_aefgikqrx{~!%+,15;<CFIPQTV]^hknuvy{ !"#$vscdHK`ag56I'9 EFgi*+=\l~uv 12|}&' -=>?ACEGHbcdefg 789:;<STUVWXlmnopq#$%&'(PQRSTUnopqrs)*+,-.JYZ[\]uvwxyz#$%&'(<=> k-000@0@0@0@ 0@ 0@0@0@0@0@0@000 0000000@00@0000*00r 0r 0r 0r 0r 0r 0r 0r 0r 0r 0r *00B0B0B*0*0*0*0*0*0*0*00W0W0W0W0W0W@0W@0W*0*0*00o0o0o0o0o0o0o0o0o0o@ 0o0o0o0o0o0o 0o0o0o0o 0o0o0o0o 0o0o0o0o 0o0o0o0o 0o0o0o0o0o 0o0o0o0o 0o0o0o0o 0o0o0o0o 0 o0o0o 0 o0o0o0o 0 o000Z00Z00Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00 @0 Z00Z00Z00Z00Z00Z00Z00Z0 0Z0 0Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00Z00 Z00Z00Z00Z00Z00Z00Z00Z00Z00Z0 0 Z0 0Z0 0Z0 0Z0 0Z0 0Z0 0Z0 0Z0 0Z0 0Z0 0Z0 0Z0 0Z0 0Z0 0Z0 0Z0 0Z0 0Z0 0Z0 0Z0 0Z00 Z00Z00Z00Z0!0Z00Z00 Z00 Z00 Z00Z00 Z00 Z00 Z00Z00 Z00 Z00 Z00Z00 Z00 Z00 Z00Z00 Z00 Z00 Z00Z0 0 Z0 0 Z0 0 Z00Z0 0 Z0 0 Z0 0 Z00@0@0@0Z0;0BZ00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z0 0 Z0 0 Z0 0 Z0 0 Z0 0 Z0 0 Z0 0 Z0 0 @0Z0[0J@0@0@0Z0V0)Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[ Z00 Z0 0 Z0 0 Z0 0 Z0 0 Z0 0 Z0 0 Z0 0 Z0 0 @0@0@0Z0w0.Z00HZ00G @0@0Z00Z0G0 Z0G0 Z0G0 @0 Z0I0 Z0I0 Z0G0 @0 Z00%Z00#Z00#Z0{0Z0{0 Z0{0 Z0{0 Z0{0 Z0}0  Z0}0  Z0}0  Z0}0  Z0}0 Z0}0  Z0}0  Z0}0  Z0}0  Z0}0  Z0}0Z0}0 Z0{0 Z00 Z00 Z01 Z01 Z01 Z01 Z01 Z01 Z01 Z01 Z01 Z00  Z00 Z01 Z01 Z01 Z01 Z01 Z01 Z01 Z01 Z01 Z00  Z00 Z01 Z01 Z01 Z01 Z01 Z01 Z01 Z01 Z01 Z00  Z00 Z01 Z01 Z01 Z01 Z01 Z01 Z01 Z01 Z01 Z00  Z00 Z01 Z01 Z01 Z01 Z01 Z01 Z01 Z01 Z01 Z00  Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00 Z00  Z00  Z00  Z00  Z00  Z00  Z00  Z00  Z00 Z00 Z00 Z00  @0 @0 @0 @0Z0{0 Z0{0 Z0{0 Z0{0 Z0}0  Z0}0  Z0}0  Z0}0  Z0}0 Z0}0  Z0}0  Z0}0  Z0}0  Z0}0  Z0}0Z0}0 Z0{0 Z00  Z00  Z01 Z01 Z01 Z01 Z01 Z01 Z01 Z01 Z01 Z00 Z00  Z02 Z02 Z02 Z02 Z02 Z02 Z02 Z02 Z02 Z00 Z00  Z0 2 Z0 2 Z0 2 Z0 2 Z0 2 Z0 2 Z0 2 Z0 2 Z0 2 Z00 Z00  Z02 Z02 Z02 Z02 Z02 Z02 Z02 Z02 Z02 Z00 Z00  Z00  Z00Z00Z00Z00Z00Z00Z00Z00Z00  Z00  Z00  Z00  Z00  Z00  Z00  Z00  Z00  Z00  Z00 Z00  Z00  Z00  Z00  Z00  Z00  Z00  Z00  Z00 Z00 Z00 @0 Z00jZ00EZ00EZ00GZ00DZ00^Z00]Z00\Z0{0 Z00Z00A 0   A 0   R00=R00<@0 @0 @0Z00Z00@0` @0` @0@0@0@0Z0Z2b @0 X0Z00@0 X0 @0 X0 @0@0@0@0@0 X0 Z00Z00@0 bd @0 bd @0@0@0@0@0 bd Z0 0Z0 0@0 @0 @0@0@0@0@0 Z0 0Z0 0R@c0bb R@c0bb @0@0@0@0R@c0bb Z00Z00@0 @0 Z00(Z00'@0@0@0 Z00Z00@0 @0 Z00Z00R00=@0Z00Z00BZ00BZ00BZ00AZ00@Z00646Microsoft Office Word@(#x@NEɡT@$E@=T#՜.+,D՜.+,L px  xw' DATA BREACH STUDY TitleP 8@ _PID_HLINKSA c;4https://maine-securemail.net/s/login?b=stateofmainehmailto:BFI.info@Maine.gov  FMicrosoft Office Word Document MSWordDocWord.Document.89qZ006Z005Z004Z0{0 @0@0@0 @0 @0@0@0 @0 @0@0@0@0 @0 @0@0@0@0@0@0@0@0 @0 @0@0@0@0@0 @0@0@0 @0 @0@0@0@0@0 @0@0@0 @0 @0@0@0@0@0 @0@0@0 @0 @0@0@0@0@0 @0@0@0 @0 @0@0@0@0@0 @0@0@0 @0 @0@0@0@0@00 0000@0@0@0@0@0@0@0@ 0@ 0@ 0@ 0@ 0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@ 0@ 0@ 0@ 0@ 0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@ 0@0@ 0@0@ 0@0@ 0@0@ 0@0@ 0@0@ 0@0@ 0@0@ 0@0@ 0 @0@ 0 @0@ 0 @0@0@0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 @0 0T@0@0@0@0@0@0@0@0@0 00@0@0@0@0@0 00J00J00 9__B"/ O |  :k^%*-03T;@9HINV]:hLln.xc}qVnܱPJ&= - lM RTUWXZ V I a% F]ml}6ӧ $Bn7ͱݱ':ϳ߳TvϵOp'glo67WXqr1;<]^!"cgu=?Gc8;TWX'(TUrs*-Y\vy$'+       !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQSVY i:XX9@C_fh"!!!!@  @H 0(  (  h  # C"` B S  ?(L!ZT" _976425881@e))D)) o ol o, o o ol o, o o o|~<~}}|}<}|TG|G»?@ABCDEFGHIJKMLNOPQRSTUVWXYZ[\]^`_acbd$$ee 99>>##X$X$ 3 3GGkLkLNNVVtWtWXXo`~````VdVdddHhHhhhllnn%%%%%%22WW||ouu  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKMLNOPQRSTUVWXYZ[\]^`_acbd =*urn:schemas-microsoft-com:office:smarttags PlaceName=*urn:schemas-microsoft-com:office:smarttags PlaceType9d*urn:schemas-microsoft-com:office:smarttagsState8*urn:schemas-microsoft-com:office:smarttagsCity>*urn:schemas-microsoft-com:office:smarttags PostalCode::*urn:schemas-microsoft-com:office:smarttagsStreet>a*urn:schemas-microsoft-com:office:smarttags PersonName;;*urn:schemas-microsoft-com:office:smarttagsaddress9e*urn:schemas-microsoft-com:office:smarttagsplace ҡededaededdeeddedeeddeddedededededededeedde;:;:deeddeddddeededdededeedededdeededededdeeddeededeeoz55h6s666CCIIUK^K$T*TGiMiZicippqqqq*r.rrrvr{{{${QU?B ,-55>?u u  g}D@N #(,-3333333333333333\]]-.0DDfg !,FQlv, ,- Y .=k0= ά,EԸoZNԸV Tțd2VZ4p*3)a78c<*sb-hTjR|hql}:~w* wyFh pp^p`hH.h @ @ ^@ `hH.h L^`LhH.h ^`hH.h ^`hH.h L^`LhH.h PP^P`hH.h   ^ `hH.h L^`LhH.88^8`o(. ^`hH.  L ^ `LhH.   ^ `hH. xx^x`hH. HLH^H`LhH. ^`hH. ^`hH. L^`LhH.^`5o()   ^ `hH.  L ^ `LhH. xx^x`hH. HH^H`hH. L^`LhH. ^`hH. ^`hH. L^`LhH.^`5o()   ^ `hH.  L ^ `LhH. xx^x`hH. HH^H`hH. L^`LhH. ^`hH. ^`hH. L^`LhH.hhh^h`56>*hH.h ^`hH.h bLb^b`LhH.h 2 2 ^2 `hH.h   ^ `hH.h L^`LhH.h ^`hH.h rr^r`hH.h BLB^B`LhH.hhh^h`56>*hH.h ^`hH.h bLb^b`LhH.h 2 2 ^2 `hH.h   ^ `hH.h L^`LhH.h ^`hH.h rr^r`hH.h BLB^B`LhH.^`5OJPJQJ^J)   ^ `hH.  L ^ `LhH. xx^x`hH. HH^H`hH. L^`LhH. ^`hH. ^`hH. L^`LhH.^`o(. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.hh^h`56>*hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`5o()   ^ `hH.  L ^ `LhH. xx^x`hH. HH^H`hH. L^`LhH. ^`hH. ^`hH. L^`LhH.^`5o()   ^ `hH.  L ^ `LhH. xx^x`hH. HH^H`hH. L^`LhH. ^`hH. ^`hH. L^`LhH.^`o()   ^ `hH.  L ^ `LhH. xx^x`hH. HH^H`hH. L^`LhH. ^`hH. ^`hH. L^`LhH.h pp^p`hH.h @ @ ^@ `hH.h L^`LhH.h ^`hH.h ^`hH.h L^`LhH.h PP^P`hH.h   ^ `hH.h L^`LhH.^`5o()   ^ `hH.  L ^ `LhH. xx^x`hH. HH^H`hH. L^`LhH. ^`hH. ^`hH. L^`LhH.^`5o()   ^ `hH.  L ^ `LhH. xx^x`hH. HH^H`hH. L^`LhH. ^`hH. ^`hH. L^`LhH.oZNTjV TVZ ,E3)ahql ~w= wy78csb-hk0=         FH         0D         pI        f        ̚                 f        l t                 B                 ?@q        LIT        1 e1 )I?UTWxs+.7 J  :u i .7 z/ R$ )' _ Ph g-m+Zf2T5`0G<`cek)QRD] /Q4 E}v}b-AC#Rj>s.>0?X?r?@@T@AAe1A2A 5A\A BB2B?BOCE.FRF{YFjFwF G$%GDGVG`H@(IXaI=JOJ8KF?KKLC4MAMH$NKNO PqP3Q=QTQDpQM S TxT U~ Z`PaLlC I -\|"Z;-LwQBz0CQ9LLXo7"uyGHn r!U$Rp. 9.A[DC,AF?jl$ywVPsMW\Xe*h%bfz&Hbfox6V, &t4f6Y x_5!)?Hk3Y6U lRuw5Z'6IcZ-|-=/B`=b PThM$&?$YBF`c;pAjLZPC8Sb)L+WK%el !=ntC\FR*jOb8IX=qmSw-OqFHp`)#U$zh1 q G+tu|>]-;.:m;;91=i&L-eCGѢfDzZ9ٳ7;Q(a'>07aopZ,<.ӟԟ؟ $+39ABQX`fno~æŦƦԦ٦ަ "',278CINTY^ckpq{ŧʧΧϧէۧ ǩʩͩΩשکݩީ!'(.4:;ǫϫЫ׫۫߫ TVZdepsvwĭʭϭЭ֭ܭOPT^_ekpqw}"'/5=>CKQYZbeinstw{ĴɴδϴҴ״ܴ #%*.235:?DELNRVZ[]bgklru{qrvwȷɷзӷطݷ #$.048<=?CGKLVX\`efhlpuv¸Ƹʸ˸ѸԸڸ_`deopýĽνнӽڽ۽ݽ !#)*-/67EGIKLNPWX_aefgikqrx{~!%+,15;<CFIPQTV]^hknuvy{ !" -=>?ACEGHbcdefg 789:;<STUVWXlmnopq#$%&'(PQRSTUnopqrs)*+,-.JYZ[\]uvwxyz#$%&'(y0@////P@UnknownGz Times New Roman5Symbol3& z ArialMCentury Schoolbook3: Times5& zaTahoma#1hkˆgFF.\#x#x"4dww 2QX ?H$N2DATA BREACH STUDYH