FRONT COVER.indd 1
04/10/2012 16:19
C O R P O R A T E
S E C U R I T Y
P O L I C Y
FRONT COVER.indd 2
04/10/2012 16:19
FRONT COVER.indd 3
04/10/2012 16:19
Spicerhaart Group Ltd
Group I.T. Services
Contents Introduction & Letter From The Executive Acceptable Use Policy
1 Page
Users & Technical
Since inappropriate use of corporate systems exposes the company to risk, it is important to specify exactly what is permitted and what is prohibited. The policy details the acceptable use of corporate information technology resources for the protection of all parties involved.
10 Pages
Users & Technical
The policy provides a consistent framework to apply to the backup process. The policy will provide specific information to ensure backups are available and useful when needed.
5 Pages
Technical
7 Pages
Users & Technical
5 Pages
Users & Technical
15 Pages
Users & Technical
4 Pages
Technical
3 Pages
Technical
8 Pages
Technical
5 Pages
Users & Technical
The purpose of this policy is to describe what steps must be taken to ensure that users connecting to the corporate network are authenticated in an appropriate manner, in compliance with company standards, and are given the least amount of access required to perform their job function.
6 Pages
Technical
The purpose of this policy is to establish the technical guidelines for IT security, and to communicate the controls necessary for a secure network infrastructure.
16 Pages
Technical
This policy specifies actions to take when selecting a provider of outsourced IT services, standards for secure communications with the provider, and what contractual terms should be in place to protect the company.
5 Pages
Technical
This policy specifies guidelines for use of passwords. Most importantly, this policy will help users understand why strong passwords are a necessity, and help them create passwords that are both secure and useable. Lastly, this policy will educate users on the secure use of passwords.
5 Pages
Users & Technical
9 Pages
Technical
4 Pages
Users & Technical
4 Pages
Users & Technical
3 Pages
Users & Technical
3 Pages
Technical
5 Pages
Technical
7 Pages
Users & Technical
Backup Policy
Confidential Data Policy This policy details how confidential data, as identified by the Data Classification Policy, should be handled.
Data Classification Policy The policy details a method for classifying data and to specify how to handle this data once it has been classified.
Email Policy The purpose of this policy is to detail the companyâs usage guidelines for the email system.
Encryption Policy Set to outline the companyâs standards for use of encryption technology.
Guest Access Policy
The company may wish to provide network access as a courtesy to guests wishing to access the Internet, or by necessity to visitors with a business need to access the companyâs resources.
Incident Response Policy
This policy is intended to ensure that the company is prepared if a security incident were to occur. It details actions and approach, covering both electronic and physical security incidents.
Mobile Device Policy The purpose of this policy is to specify company standards for the use and security of mobile devices.
Network Access & Authentication Policy Network Security Policy Outsourcing Policy Password Policy
Physical Security Policy A policy to protect the companyâs physical information systems by setting standards for secure operations.
Remote Access Policy Defining standards for accessing corporate information technology resources from outside the network.
Retention Policy The purpose of this policy is to specify the companyâs guidelines for retaining different types of data.
Third Party Policy
The policy is intended to provide guidelines for deploying and securing direct conections to third parties.
VPN Policy
This policy details the companyâs standards for site-to-site VPNs.
Wireless Access Policy This policy states the standards for wireless access to the companyâs network.
Forms
Policy Acknowledgement Form, Guest Network Access Request, Security Incident Report, Notice Of Policy Noncompliance & Request For Policy Exception.
Contents.indd 1
23/07/2013 10:36
Dear Colleague
financial services
Technology in our business is an exciting and evolving arena, often supporting the business initiatives to gain business or driven through regulation of market trends. Along side these changes are running advancements in technology and with that, the threats that we face in this Ãĸ€˜information ageÃĸ€™ that we find ourselves operating in. In recent years the Group has been successful in establishing relationships with numerous outside parties who face similar threats or operate in tighter regulation areas than ourselves. Supporting our own needs and the needs of our B2B relationships the Corporate Security Policy has been reviewed and updated, breaking down each subject into its own policy to make reference and understanding as easy as possible. Whilst a large document, not all sections are intended for every IT user to read. The Contents page identifies the target audience for each policy. As all of the Group policies and procedures are referenced in employment Terms and Conditions, you should make yourself familiar with these new and amended policies to ensure that you are in compliance with the requirements. Through greater understanding I hope that you can gain an appreciation for the complexity of technology today and the part you can play maintaining a tight grip on security across the Group.
With thanks Steve Lamb IT Director Group IT Services Spicerhaart
Spicerhaart Limited. Registered No. 3094936 Registered Office: Colwyn House, Sheepen Place, Colchester, Essex CO3 3LD
Contents.indd 2
23/07/2013 10:36
Spicerhaart Group Ltd Acceptable Use Policy
Created: July 2010, Amended AugÃĸ€™11 Section of: Corporate Security Policies Target Audience: Users, Technical CONFIDENTIAL Page 1 of 10
Spicerhaart Group Ltd, including all subsidiary companies, is hereinafter referred to as "the company."
1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common is granting access to employees for performance of their job functions. This access carries certain responsibilities and obligations as to what constitutes acceptable use of the corporate network. This policy explains how corporate information technology resources are to be used and specifies what actions are prohibited. While this policy is as complete as possible, no policy can cover every situation, and thus the user is asked additionally to use common sense when using company resources. Questions on what constitutes acceptable use should be directed to the user's supervisor.
2.0 Purpose Since inappropriate use of corporate systems exposes the company to risk, it is important to specify exactly what is permitted and what is prohibited. The purpose of this policy is to detail the acceptable use of corporate information technology resources for the protection of all parties involved.
3.0 Scope The scope of this policy includes any and all use of corporate IT resources, including but not limited to, computer systems, email, the network, and the corporate Internet connection.
4.0 Policy 4.1 E-mail Use
Personal usage of company email systems is prohibited. Users should use corporate email systems for business communications only.
Acceptable Use Policy
Confidential
Spicerhaart Group Ltd Acceptable Use Policy
Created: July 2010, Amended Augâ11 Section of: Corporate Security Policies Target Audience: Users, Technical CONFIDENTIAL Page 2 of 10
âĸ The following is never permitted: spamming, harassment, communicating threats, solicitations, chain letters, or pyramid schemes. This list is not exhaustive, but is included to provide a frame of reference for types of activities that are prohibited. âĸ The user is prohibited from forging email header information or attempting to impersonate another person. âĸ Email is an insecure method of communication, and thus information that is considered confidential or proprietary to the company may not be sent via email, regardless of the recipient, without proper encryption unless prior agreement has been granted by the IT Director. âĸ It is company policy not to open email attachments from unknown senders, or when such attachments are unexpected. âĸ Email systems were not designed to transfer large files and as such emails should not contain attachments of excessive file size. Supporting this statement, email accounts have size limits for attachments which are administered by the IT Departmentâs Infrastructure team. Please note that detailed information about the use of email may be covered in the company's Email Policy.
4.2 Confidentiality
Confidential data must not be A) shared or disclosed in any manner to non-employees of the company, B) should not be posted on the Internet or any publicly accessible systems, and C) should not be transferred in any insecure manner. Please note that this is only a brief overview of how to handle confidential information, and that other policies may refer to the proper use of this information in more detail.
4.3 Network Access
The user should take reasonable efforts to avoid accessing network data, files, and information that are not directly related to his or her job function. Existence of access capabilities does not imply permission to use this access.
Acceptable Use Policy
Confidential
Spicerhaart Group Ltd Acceptable Use Policy
Created: July 2010, Amended Augâ11 Section of: Corporate Security Policies Target Audience: Users, Technical CONFIDENTIAL Page 3 of 10
4.4 Unacceptable Use
The following actions shall constitute unacceptable use of the corporate network. This list is not exhaustive, but is included to provide a frame of reference for types of activities that are deemed unacceptable. The user may not use the corporate network and/or systems to: âĸ Engage in activity that is illegal under local, county, national, or international law. âĸ Engage in any activities that may cause embarrassment, loss of reputation, or other harm to the company. âĸ Disseminate defamatory, discriminatory, vilifying, sexist, racist, abusive, rude, annoying, insulting, threatening, obscene or otherwise inappropriate messages or media. âĸ
Engage in activities that cause an invasion of privacy.
âĸ Engage in activities that cause disruption to the workplace environment or create a hostile workplace. âĸ
Make fraudulent offers for products or services.
âĸ Perform any of the following: port scanning, security scanning, network sniffing, keystroke logging, or other IT information gathering techniques when not part of employee's job function. âĸ
Install or distribute unlicensed or "pirated" software.
âĸ Reveal personal or network passwords to others, including family, friends, or other members of the household when working from home or remote locations.
4.5 Blogging and Social Networking
Blogging and social networking by the company's employees are subject to the terms of this policy, whether performed from the corporate network or from personal systems. Blogging and social networking is allowed from the corporate computer network for business purposes only. In no blog or website, including blogs or sites published from personal or public systems,
Acceptable Use Policy
Confidential
Spicerhaart Group Ltd Acceptable Use Policy
Created: July 2010, Amended AugÃĸ€™11 Section of: Corporate Security Policies Target Audience: Users, Technical CONFIDENTIAL Page 4 of 10
shall the company be identified, company business matters discussed, or material detrimental to the company published. The user must not identify himself or herself as an employee of the company in a blog or on a social networking site. The user assumes all risks associated with blogging and/or social networking. Exceptions to the blog and website publishing stated above are permitted for the Group PR Manager and Social Media roles in IT that represent the business in these matters.
4.6 Instant Messaging
Instant Messaging is not permitted on the corporate network for any purpose.
4.7 Overuse
Actions detrimental to the computer network or other corporate resources, or that negatively affect job performance are not permitted.
4.8 Web Browsing
The Internet is a network of interconnected computers of which the company has very little control. The employee should recognize this when using the Internet, and understand that it is a public domain and he or she can come into contact with information, even inadvertently, that he or she may find offensive, sexually explicit, or inappropriate. The user must use the Internet at his or her own risk. The company is specifically not responsible for any information that the user views, reads, or downloads from the Internet. Personal Use. The company recognizes that the Internet can be a tool that is useful for both personal and professional purposes. Personal usage of company computer systems to access the Internet is permitted during lunch, breaks, and before/after business hours, as long as such usage follows pertinent guidelines elsewhere in this document and does not have a detrimental effect on the company or on the user's job performance.
4.9 Copyright Infringement
The company's computer systems and networks must not be used to download, upload, or otherwise handle illegal and/or unauthorized Acceptable Use Policy
Confidential
Spicerhaart Group Ltd Acceptable Use Policy
Created: July 2010, Amended AugÃĸ€™11 Section of: Corporate Security Policies Target Audience: Users, Technical CONFIDENTIAL Page 5 of 10
copyrighted content. Any of the following activities constitute violations of acceptable use policy, if done without permission of the copyright owner: A) copying and sharing images, music, movies, or other copyrighted material using P2P file sharing or unlicensed CD's and DVD's; B) posting or plagiarizing copyrighted material; and C) downloading copyrighted files which employee has not already legally procured. This list is not meant to be exhaustive, copyright law applies to a wide variety of works and applies to much more than is listed above.
4.10 Peer-to-Peer File Sharing
Peer-to-Peer (P2P) networking is allowed as long as illegal and/or copyrighted materials are not downloaded or shared, and as long as it does not negatively impact the computer network or the user's job performance.
4.11 Streaming Media
Streaming media can use a great deal of network resources and thus must be used carefully. Streaming media is allowed for job-related functions only.
4.12 Monitoring and Privacy
Users should expect no privacy when using the corporate network or company resources. Such use may include but is not limited to: transmission and storage of files, data, and messages. The company reserves the right to monitor any and all use of the computer network. To ensure compliance with company policies this may include the interception and review of any emails, or other messages sent or received, inspection of data stored on personal file directories, hard disks, and removable media.
4.13 Bandwidth Usage
Excessive use of company bandwidth or other computer resources is not permitted. Large file downloads or other bandwidth-intensive tasks that may degrade network capacity or performance must be performed during times of low company-wide usage.
4.14 Personal Usage
Personal use of company computer systems is not permitted under any
Acceptable Use Policy
Confidential
Spicerhaart Group Ltd Acceptable Use Policy
Created: July 2010, Amended Augâ11 Section of: Corporate Security Policies Target Audience: Users, Technical CONFIDENTIAL Page 6 of 10
circumstances.
4.15 Remote Desktop Access
Use of remote desktop software and/or services is allowable as long as it is provided by the company. Remote access to the network must conform to the company's Remote Access Policy.
4.16 Circumvention of Security
Using company-owned or company-provided computer systems to circumvent any security systems, authentication systems, user-based systems, or escalating privileges is expressly prohibited. Knowingly taking any actions to bypass or circumvent security is expressly prohibited.
4.17 Use for Illegal Activities
No company-owned or company-provided computer systems may be knowingly used for activities that are considered illegal under local, county, national, or international law. Such actions may include, but are not limited to, the following: âĸ
Unauthorized Port Scanning.
âĸ
Unauthorized Network Hacking.
âĸ
Unauthorized Packet Sniffing.
âĸ
Unauthorized Packet Spoofing.
âĸ
Unauthorized Denial of Service.
âĸ
Unauthorized Wireless Hacking.
âĸ Any act that may be considered an attempt to gain unauthorized access to or escalate privileges on a computer or other electronic system. âĸ
Acts of Terrorism.
âĸ
Identity Theft.
âĸ
Spying.
Acceptable Use Policy
Confidential
Spicerhaart Group Ltd Acceptable Use Policy
Created: July 2010, Amended Augâ11 Section of: Corporate Security Policies Target Audience: Users, Technical CONFIDENTIAL Page 7 of 10
âĸ Downloading, storing, or distributing violent, perverse, obscene, lewd, or offensive material as deemed by applicable statues. âĸ
Downloading, storing, or distributing copyrighted material.
Acceptable Use Policy
Confidential
Spicerhaart Group Ltd Acceptable Use Policy
Created: July 2010, Amended Augâ11 Section of: Corporate Security Policies Target Audience: Users, Technical CONFIDENTIAL Page 8 of 10
The company will take all necessary steps to report and prosecute any violations of this policy.
4.18 Non-Company-Owned Equipment Non-company-provided company's network.
equipment
is
expressly
prohibited
on
the
4.19 Personal Storage Media
The company restricts the use personal storage media, which includes but is not limited to: USB or flash drives, external hard drives, personal music/media players, and CD/DVD writers, to company supplied equipment only on the corporate network and provided that guidelines for data confidentiality are followed. The user must take reasonable precautions to ensure viruses, Trojans, worms, malware, spyware, and other undesirable security risks are not introduced onto the company network. Use of personal storage media must conform to the company's Mobile Device Policy.
4.20 Software Installation
Installation of non-company-supplied programs is prohibited. Numerous security threats can masquerade as innocuous software - malware, spyware, and Trojans can all be installed inadvertently through games or other programs. Alternatively, software can cause conflicts or have a negative impact on system performance.
4.21 Reporting of Security Incident
If a security incident or breach of any security policies is discovered or suspected, the user must immediately notify his or her supervisor and/or follow any applicable guidelines as detailed in the corporate Incident Response Policy. Examples of incidents that require notification include: âĸ Suspected compromise of login credentials (username, password, etc.). âĸ
Suspected virus/malware/Trojan infection.
âĸ
Loss or theft of any device that contains company information.
âĸ
Loss or theft of ID badge or keycard.
Acceptable Use Policy
Confidential
Spicerhaart Group Ltd Acceptable Use Policy
Created: July 2010, Amended Augâ11 Section of: Corporate Security Policies Target Audience: Users, Technical CONFIDENTIAL Page 9 of 10
âĸ Any attempt by any person to obtain a user's password over the telephone or by email. âĸ Any other suspicious event that may impact the company's information security. Users must treat a suspected security incident as confidential information, and report the incident only to his or her supervisor. Users must not withhold information relating to a security incident or interfere with an investigation.
4.22 Applicability of Other Policies
This document is part of the company's cohesive set of security policies. Other policies may apply to the topics covered in this document and as such the applicable policies should be reviewed as needed.
5.0 Enforcement This policy will be enforced by the IT Manager and/or Executive Team. Violations may result in disciplinary action, which may include suspension, restriction of access, or more severe penalties up to and including termination of employment. Where illegal activities or theft of company property (physical or intellectual) are suspected, the company may report such activities to the applicable authorities.
6.0 Definitions Blogging The process of writing or updating a "blog," which is an online, user-created journal (short for "web log"). Instant Messaging A text-based computer application that allows two or more Internet-connected users to "chat" in real time. Peer-to-Peer (P2P) File Sharing A distributed network of users who share files by directly connecting to the users' computers over the Internet rather than through a central server.
Acceptable Use Policy
Confidential
Spicerhaart Group Ltd Acceptable Use Policy
Created: July 2010, Amended AugÃĸ€™11 Section of: Corporate Security Policies Target Audience: Users, Technical CONFIDENTIAL Page 10 of 10
Remote Desktop Access Remote control software that allows users to connect to, interact with, and control a computer over the Internet just as if they were sitting in front of that computer. Streaming Media Information, typically audio and/or video, that can be heard or viewed as it is being delivered, which allows the user to start playing a clip before the entire download has completed.
7.0 Revision History Revision 2.0, 22/07/2010 SRL Revision 2.1, 24/08/2011 SRL
Acceptable Use Policy
Confidential
Spicerhaart Group Ltd Backup Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 1 of 5
Spicerhaart Group Ltd, including all subsidiary companies, is hereinafter referred to as "the company."
1.0 Overview A backup policy is similar to an insurance policy - it provides the last line of defence against data loss and is sometimes the only way to recover from a hardware failure, data corruption, or a security incident. A backup policy is related closely to a disaster recovery policy, but since it protects against events that are relatively likely to occur, in practice it will be used more frequently than a contingency planning document. A company's backup policy is among its most important policies.
2.0 Purpose The purpose of this policy is to provide a consistent framework to apply to the backup process. The policy will provide specific information to ensure backups are available and useful when needed - whether to simply recover a specific file or when a larger-scale recovery effort is needed.
3.0 Scope This policy applies to all data stored on corporate systems. The policy covers such specifics as the type of data to be backed up, frequency of backups, storage of backups, retention of backups, and restoration procedures.
4.0 Policy 4.1 Identification of Critical Data The company must identify what data is most critical to its organization. This can be done through a formal data classification process or through an informal review of information assets. Regardless of the method, critical data should be identified so that it can be given the highest priority during the backup process.
Backup Policy
Confidential
Spicerhaart Group Ltd Backup Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 2 of 5
4.2 Data to be Backed Up A backup policy must balance the importance of the data to be backed up with the burden such backups place on the users, network resources, and the backup administrator. Data to be backed up will include: âĸ All data determined to be critical to company operation and/or employee job function. âĸ All information stored on the corporate file server(s) and email server(s). It is the user's responsibility to ensure any data of importance is stored on file servers. âĸ All information stored on network servers, which may include web servers, database servers, domain controllers, firewalls, and remote access servers, etc.
4.3 Backup Frequency Backup frequency is critical to successful data recovery. The company has determined that the following backup schedule will allow for sufficient data recovery in the event of an incident, while avoiding an undue burden on the users, network, and backup administrator. Database servers:Hourly SQL log backups to disk between 08:00hrs and 20:00 hrs with full backups to disk and tape daily. All other servers.:Incremental: Daily (Monday to Friday) Full: Weekly at weekends.
4.4 Off-Site Tape Based Rotation Geographic separation from the backups must be maintained, to some degree, in order to protect from fire, flood, or other regional or large-scale catastrophes. Offsite storage must be balanced with the time required to recover the data, which must meet the company's uptime requirements. The company has determined that backup media must be rotated off-site daily.
Backup Policy
Confidential
Spicerhaart Group Ltd Backup Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 3 of 5
4.5 Backup Storage Storage of backups is a serious issue and one that requires careful consideration. Since backups contain critical, and often confidential, company data, precautions must be taken that are commensurate to the type of data being stored. The company has set the following guidelines for backup storage. When stored onsite, backup media must stored in a fireproof container in an access-controlled area. When shipped offsite, a hardened facility (i.e., commercial backup service) that uses accepted methods of environmental controls, including fire suppression, and security processes must be used to ensure the integrity of the backup media. As a backup service is used, rigorous security procedures must exist and be maintained, which include, at minimum, credential-verification and signature of the backup service courier. Confidential data must be encrypted using industry-standard algorithms to protect the company against data loss.
4.6 Backup Retention When determining the time required for backup retention, the company must determine what number of stored copies of backup-up data is sufficient to effectively mitigate risk while preserving required data. The company has determined that the following will meet all requirements (note that the backup retention policy must confirm to the company's data retention policy and any industry regulations, if applicable): Incremental Backups must be saved for one month. Full Backups must be saved for one month.
4.7 Restoration Procedures & Documentation The data restoration procedures must be tested and documented. Documentation should include exactly who is responsible for the restore, how it is performed, under what circumstances it is to be performed, and how long it should take from request to restoration. It is extremely important that the procedures are clear and concise such that they are not A) misinterpreted by readers other than the backup administrator, and B) confusing during a time of crisis.
Backup Policy
Confidential
Spicerhaart Group Ltd Backup Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 4 of 5
4.8 Restoration Testing Since a backup policy does no good if the restoration process fails it is important to periodically test the restore procedures to eliminate potential problems. Backup restores must be tested when any change is made that may affect the backup system, as well as once every month.
4.9 Expiration of Backup Media Certain types of backup media, such as magnetic tapes, have a limited functional lifespan. After a certain time in service the media can no longer be considered dependable. When backup media is put into service the date must be recorded on the media or catalogue services. The media must then be retired from service after its time in use exceeds manufacturer specifications.
4.10 Applicability of Other Policies This document is part of the company's cohesive set of security policies. Other policies may apply to the topics covered in this document and as such the applicable policies should be reviewed as needed.
5.0 Enforcement This policy will be enforced by the IT Manager and/or Executive Team. Violations may result in disciplinary action, which may include suspension, restriction of access, or more severe penalties up to and including termination of employment. Where illegal activities or theft of company property (physical or intellectual) are suspected, the company may report such activities to the applicable authorities.
6.0 Definitions Backup To copy data to a second location, solely for the purpose of safe keeping of that data. Backup Media Any storage devices that are used to maintain data for backup purposes. These are often magnetic tapes, but can also be CDs, DVDs, or hard drives.
Backup Policy
Confidential
Spicerhaart Group Ltd Backup Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 5 of 5
Full Backup A backup that makes a complete copy of the target data. Incremental Backup A backup that only backs up files that have changed in a designated time period, typically since the last backup was run. Restoration Also called "recovery." The process of restoring the data from its backup-up state to its normal state so that it can be used and accessed in a regular manner.
7.0 Revision History Revision 2.0, 22/072010 SRL
Backup Policy
Confidential
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīī īīīīīīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīīīīīī īīī īīī īī īīīĄī īī īīīīīīīīī īīīĸīŖī¤īĨīīĻīŖīīĨīīīī īīīīī īīīīīīī§īī īī ī īīīīī īīīīīīī īīīīīī īīīīĄī īīīīīīīīīī īīīī īīī¨īīīīīīīī īīīŠīīīīī īīĄī īīī īī īī īīīīīī īī īī īī īīī īīīīīīīīīĒīīī īīīīŠīīīīīĢīĒī ī
īīĢīīīĸīŦī īīŦīī īī ī
īīīīīīī īīīīīī īīīīī īīī īīīīīīīīīī īīī ī īīīīī īīīīī īīīīīī īīī ī īŠīīīī īŦīīīī ī īīī īī īīīŠīīīīīĢīīīĸīīī īīĄīīīīīīīī īīīīīīīīīīīīīīīŦīīīīī¨īī īīīīīīīī īīīīīīīī īīīĄīīīīīīīīīī īīīīīīīīīīīīī īīī īīīīīīŽīīīīīīīī īī īīīīīīīŠīīīīīīīīīīĢīīī¤īīīīīī īī īīī īīīīīīĄīīīīīīī īīīīī īīīīīīīī ī īīī īīīīīīī ī īī īīīīīīī īīīīīīīīīī īīīīī īī īīīī ī īīī īīīīīīīīīī īīī īīīīīīī īīīīīīīīīīīĢī
ī īīĢīīīīīīīīī ī ī
īīī īīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīī īīīīīīī īīīīīīīīīīīĄīīīīīīī īīīīīī īī ī¨īī īīī ī īīīīīīīīīīīīīīīīīīīīīīīīīīīĄīīīīīīīīī¨ī īīīīīīī īīĢīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīī īīīī īīī ī īīī ī īīī īīīīīīī īīīīīī īīīīīĄī īīīī īīīīīīī īī īīī īīīīīī īī īīīīīīī īīīīīīīīīīīīīīīīī īīīīīīīīīīīīīĢīīī
ī ī¯īĢīīīīīīī ī ī
īīī īīīīīī īīīīīīīīīīīīīīīīīīīŦī īīīīīīīīīīŠīīīīī°īīīīīīī īīīīīīīīīīīĄīīī īīīīīī īīī īīīīīīīīīīīīĢīīīīīīīīīīŦī īī īīī¨īīīīī īīīīīīīīīīī īīīīīīīīīī īīīīīīīīŠīīīīīīīīīīĄī īīīīīīīīīīīīīīīīīīĄīīīīąī īīĄīīīīī īīĄīī īīīĢī
ī ī˛īĢīīīīīīīīī ī
ī˛īĢīīīīī īīīŠī īīīīīīīīīīīīī īīīīīīīīīīī
ī¤īīīīīīīīīīīĄīīīī īīīīīīīīīīīīī īīīīīīīīīīīīīīīīī īĄīīīīīīīŠīīīīīīīĄīīīīīīī īīīīīīīīīī īīīīīīīīīī īīīīīīīīīīīīīī īīī īīīīī īīīīīīŠīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīĢī
ī
ī˛īĢīīĢīīīīīīīīī ī īīīīīīī īīīīīī īīīīīīŠīīīīīī īŠīīīī ī¨ī ī īī īŠīīŦī īī īīīīŠī īī īīŽīīĄī īīīŠīīīī īī īīīī ī īīīĄī īīīī īīīŠīŠīīī īīī īīī īīīī īīīīīī īīīīīīīī īīīīī īīī īīī īĢī ī īŗīīīīīī īīī ī īīīīīīī īīīīīīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīī īīīīīīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīīīīīī īīī īīī īī īīīĄī īī īīīīīīīīī īīīĸīŖī¤īĨīīĻīŖīīĨīīīī īīīīī īīīīīīī§īī īī ī ī¨īīīīīī īī īīīīīŽīĄī īīīīīīī īīīīīī īīīīīīŠīīīīīī īīīīīīī ī¨ī ī īīīīī īī īīī īīī ī īīīīīīīīīīī ī īīīīīīī ī īī īŦīīī īīĄī īīīīī īīī īīīīŽīī¨īī ī īīī¨īīī īīīĢī ī īŗīīīīīī īīīīīīīīī ī īī īīīī īīĄī īīīīīīī īīīīīī īīīīīīŠīīīīīī īīīīīīī ī¨ī ī īīīīī īī īīī īīīī īī īīīīŽī īīīī īŽī īī īīīī īī īīī īīīīīīī īī īīīī īī īīī īīī īīīī īīīī¨īī ī ī¨īī ī īŠīīīīī ī ī´īīīī īīīīīīīīīīīīīĢī ī ī˛īĢīīĢīīīīīīīīŠīīīīīīī īīīīīīī īīīīīīīīīīīīŠīīīīīīīīī¨ī īīīĩīīīīīīīŠīīīī īīīīīīīīī īīīī īīīīŠīīīīī īī īīīīīŽī īīīīīīīī īīī ī īīī ī īīī īīīīīīī ī īīīīīīīīīīĄī īīīī īīī īīīīīī īīīī ī īŠī īīī īīīī ī¨ī ī īī īīīŦī īī ī¨īī īīī ī īĨīī īīīī īīīīī īīīīĄī īīĩī īī īīī īīī īŦīīīī īŠīīīīīīīīī īŠīīĄīī īīīī īīīīīīīī īīīīīīīīīīī īīīī īīīīŠīīīīīļīīīī īīīīīŽīĢī ī ī˛īĢīīĢī¯īīī īīīīīīīīīī īīīīīīī īīīīīī īīīīī īŠīīīī ī¨ī ī īī īīīīīī īī īīī īī īŠīīīī īī īīīīī īŠīīŽī īī īī īīīŦī īīī īīī īīī ī īīīīīīŠīīīīīī īīŠīīīīīī¨īī īĢī ī īīī ī īīīīīīīīīī īīīīī īīīī īī īīīīīīī ī īˇī īīīī īī¸īīīīīŠī īīīīīīīīī īīīīīīīīīīī īšīīīī īīĢī ī īˇī īīīīīīī īīŠī īīīīīēīīīļīīĄīīīģīīļīīĩīīīīīīīīīīīīī īīīīīīīīīīīīīīī īšīīīī īīĢī ī īˇī īŧīīīī īīīīŦī īī¸īīīīī īŠīī¸īŊīī¨īīī ī īīīīīīī ī īŊī īīīīī īīī īī īŠīīīīŠīīŠīĄī īīīīī īīīīīīī īŠīīīī ī¨ī ī īīī īīĢī ī īīīŠīīīī īī īīīīŠīīīīīīī īī īīīīŦī ī īīī īī īīīī īŠīīŽī ī īīī ī īīīīī īīīī īīīŦī īīī¨īī īĢī ī īīī ī īīīŠīīīīī īīīīīīī īīī ī īī īīīī ī īīīŠīŠī īīīīīīīī°īīŦīīīīī¨īī ī īŠī īīīīīī īīīī īīīīī īīīīīīīĄī īīīī īī īīīīī īĸīī īīīīīīīīīīīī īŠīīīīīīīīīīīīīīīĢī ī
ī˛īĢīīī īī īīīīīīīīīīī īīīīīīīīīīī
īī īīīīī īīīīīī īīīīīīī īīīīīī īīīīī īīīīīīī īīī īī īī īīī īīī īīī īīī ī īīī īīī īŽīīīīīīī īīīī īīīī īīīīī īīī īīī ī īīīŠīīīīīļīī īīīīīīīīīī īīīŦīīīŦīīīī īīī ī īīī īīīŠī īīī īīī īīīīīīī īīīīīī īīīīīĢī ī īīī ī īīīīīīīīīī īīīīīī īī īīī īīīī īīī īīī īŠīīīī īīīī īīīīī īīīīī īīīīīīī īīīīīīīīīīīī ī īˇī ī īī īīī īŠīīīī ī¨ī ī īīīŦīīī īī īīī īīīī īīīīīīī īīīīīī īīīīī īīī īī īīīŦī ī ī¨ī ī īī īīīīīī īī īīīī īīīĢī ī īīīīī īīīīī īŠīīīī ī¨ī ī īŠīīīŽī īī īīī īīīī īīīīī ī īī īīīīīīī īī īĒīīīīīīī īīīīīīĢīĒī īīīīīīī īīīīīīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīī īīīīīīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīīīīīī īīī īīī īī īīīĄī īī īīīīīīīīī īīīĸīŖī¤īĨīīĻīŖīīĨīīīī īīīīī īī¯īīīīī§īī īī ī ī īˇī ī īī īīī īŠīīīī īīīīī īīīī īīī īīīīīīī īīīīīī īīīīī īīī īī īīīīīŠī īīīī¸īī īī īžīī¨ī īīīīīīīīīĢī ī īˇī ī īī īīī īŠīīīī īīīī īī ī īŽī īī īīīīīīī ī¨ī īī īīīīĄī īīī īīīīīīī īīīī īīī īīī īī ī īŽīīīī īī īīīīīīīī¨ī īī īīīīĄīīīīīŠīīīī īīīī īīīīīīīīīīī īīīīīīīīīīīīŠīīīīīīĢī ī īˇī ī īī īīīīŠīīīīīīīīī īīīīīīīīīīīīīī īīīīīīīīīīīīŠīīīīīīīīīīīīīīīīīī īīīīīŦī ī ī¨ī ī īīīīīīīī īīīīīī īīīīīīīīīīīīī īŦī īīīĄīīī īī īīī īĄīīīīīī īĄīī īŠīīīīīīī īīīīīīī īīĄī ī īąīīī¨īīīĄīīīīīīīīīĄīīīīīīīī¨īīī īĄīīīīīīīīīīīīīīī īīīīīīīŠīīīīīīīīīī īīīīī īī īīīīīīīīīīīī īīīīīīīīī īīīžīī¨īīīīīīī īīīīīīīīīīīīīīīīīŦī īīī¨īīīīīīīīīīī īīīīīī īīŦīīīīīĢī ī īˇī ī īī īīī īŠīīīī īī īīīīī īīīī īīīīī īīī īī īŠīīīīī ī īīī īīīīīīīīīīŋī īī īīīīīīīīīī ī īīīīīīīīīī īīīīīīīīīīīīŠīīīīīīīīŠīŠī īīīīī īīīīīīīīīīīīīīī īīīīīī īīŦīīīīīĢī
ī ī˛īĢī¯īīī īīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīī
īīīīīīī īīīīīīīīīīīīī īšīīīī īīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīī īīīīīī īīīīī īīīīī īīīī īīīīīīĢīīīīī īīīīŠīīīīīīī īšīīīī īīīīīīīīīī īīīīīīīīīīīīīīīī īīīī īīīīī īīīīīīīī īīī ī īˇī īīīīīīī īĻīīīīīīīīīīĢī īĻīīīīīīīīīī īŠīīīī ī¨ī ī īīī īī īīīī īīīīīīī īīīīīī īīīīī īīīīīīŠīīīī īī ī īąīī īīīīī īīī īīī ī īīīŠīīīīīĢī ī īīī īī īŠīīīīŠīīŠī īīīīī īŠīīīī īīīŽī ī īīī ī īīīīŠīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīŠī īīīīĢī ī īˇī īŖī īīīīīŽī īī īīŠī īīīīīīīīĢī īī īīīīīīīīī īīīīīīī īīīīīī īīīīī ī¨īī īī īīīīīŽī īī īīŠī īīīīīīīīīīīīīīīīī īšīīīī īīĄīī¨īīīī īīīīīīīī īīĢī ī īˇī īīīīī īīīīīīīīīīĢī īīīīīīī īīīīīīīīīī īŠīīīī ī¨ī ī īīī īī īīīī īīīī īīī īīī īīīīīīī īīīīīīīīīīīĢī ī īˇī īīīīīīīīīīī īīīīīīīĢīīīīīī īŠīī īīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīī¨ī ī īī īīīīīī¨īīīīī īīīī īīĢī ī īˇī īīīīīīīīīĢī īŗīī īī īīīīīīīīī īīīīīīī īīīīīī īīīīī īīī ī īīī īī īīīīīīī īīī ī ī¨ī īīī ī īīīīīīīīīīī īīīīī īīīīīīīīī īīīīīīīŠīīīīīīīīīīīīīīŦīī īī īīī¨īīīīīī īīīĢī ī īˇī ī¤īīąīīīīĢīīŗīī īīīīīąīīīīīīīīīīī īīīīīīīīīīīĄīīīī īīīīŠīīīīīīī īīīīŦī īīīīī ī īīī īīīīīīī īīīīīīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīī īīīīīīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīīīīīī īīī īīī īī īīīĄī īī īīīīīīīīī īīīĸīŖī¤īĨīīĻīŖīīĨīīīī īīīīī īī˛īīīīī§īī īī ī īīīīīīīīīīīŠīīīī īīī īīīīī īīīīīīīīīīī īīīīīīīŠīīīīīīīīīīīīīīīī īīīīīīĢīī ī īˇī īĻīŠīīīīīīīĢī īīīīīīī īīīīīī īīīīī īŠīīīī īīīī ī¨ī ī ī īŠīīīī īī īīīīīīī ī īīī ī īīīŠīīīīīīīīīīīīīīīī īīīī īīīīī īīīīīīīīīīĢī ī īˇī īŊīīīīīīīĢīīĨīīīīīīīīī īīīīīīīīīīīīŠīīīīīīīīīīī īīīīīīīīīī īīīī īīīīŠīīīīīĄīīīī ī īīī īīīīīīīīīīīīīīīī īīīīīīīīīīīī īīŦīīī īīīīīīīī īšīīīī īīīīīīīīīīīīī īīīīīīī īī īīīīīīī īīīīīīīīīīīŠīīīīīīĢī ī īˇī īīīīīīīīīīīĢī īŗīī īī īīīīīīī īīīīīī īīīīīīŠīīīīīī īīī īīīīīīīī īī īīī īīīīīīī ī¨ī ī īīīī ī īīī īīīī°īīī¨īīīī īīīīī īīĄī īīīī īīī īī ī īīī ī īīīīīīīīīīī īīīīīīī ī¨ī ī īīŦī īīī īīīīĢī ī īˇī īīīīīīī īīīīīī īīīīī īīīīīīī ī¨ī ī īī īŠīīŦī īī īīīīŠī īīīīīŠī īīīī īīīī īīī īīīī īīīīīīīīīīīīīīī¨īīīīīī īīīīī īī īīīīīīĢī ī īˇī īĨīī īīīīīīī īīīīīī īīīīī īīī īīīīīī īī īīī īī īīīīī ī¨īīīīī īīī īīīī īī īīīīīīīīī īīī īī īīīīīīīī īīīīīĄī īīī ī īīīīī īŠīīīī ī¨ī ī ī īīīī īī īīīī īī īīī ī īŠī ī īīīīī īīī īīīīīīīī īīĢī
ī ī˛īĢī˛īīĻīąīīŠīīī īīīīīīīīīīīī īīīīīīīīīīī
īīī īīīīīīīīīīīīīīīīīīīīīīīīīīī īīī īīīīīī¨ī īī īąīīīīīīīŦī īĄīī¨īīīīīīīīīīīīīīŦīīī īīīī ī īīīŠīīīīī īīīīī īīīīī īīīī īī īīī īīīīī īīīī ī īīī īīīīīīŠīīīīīī īīī īīīīīīīīīī īīīīīīī īī īīīīīīīīī īīīīīīĢīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīī īī ī īˇī īĻīŠīīīīī ī ī īīī īīīīīīŠī īī īīīīīīī īī īīīīīīī īīīŠī¨ī īīī īīī īī īīīīīīī īīīīīīŠīīīīīīĢī ī īˇī īŊī īīīīīīīīīīīī īīīīīīīī īīīīīīīŠīīīīīīĢī ī īˇī īĻīī īīīīīīīīīŧī īīīīīīĨīīīīīŠīīīīīīĢī ī īˇī īīīīīīŠī īīīīīīīĢī ī īˇī īīīŠīīīīīīīīīīīīīīīīīīīīīĢī ī īīīīīīī īīīīīīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīī īīīīīīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīīīīīī īīī īīī īī īīīĄī īī īīīīīīīīī īīīĸīŖī¤īĨīīĻīŖīīĨīīīī īīīīī īīīīīīī§īī īī ī īˇī īīīī īīīīīī īīīīīīĢī ī īˇī īīīīīīīīīīīī¸īīīīī īīŦīīī īīīīīīīĄīīī īīīīīīĄīīīīīīīīī īŠīīīīīīĢī ī īˇī īŖī īīīīīŽīīīīīīīīŠīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīĢī ī īˇī īīīŠīŠīīīīīīīīīīīīī¨īīīīīīīīīīīīī īīī īīīīīŠīīīī īīīĢī ī īˇī īīīīīīīīīīĢī ī īˇī īīīīŽīīīīīīīīīīīīīīīŠīīīīīīĢī ī īˇī īīīīīīīīīīīīīīŠīīīīīīĢī ī īˇī īīī īīīīīīīīīīīīīīīŠīīīīīīĢī ī īˇī īīīī īīīīīīī īīīīīī īīīīī īī īīī īīīī īī īīīīīī īīīīīī īēī¨ī ī īīīī ī īīī īīīī īī ī īīī īīīīīīīīīīī īīīīīīīīīīīīīīī ī īŠī īīīīīīŦī īīīīīīīīīīīīīīīīŠīīīīīīĩīĢī
ī ī˛īĢīīīĻīŠī īīī īīīīīīīī īīīīīīīīīīī
īī īīīīī īīīī ī īīīī īīīī īīī īīī īīīīīīī īīīīīī īīīī īīīīīīīīī īīīīī īīīīīīī īīī ī īŠī īīī īīīī īīīī ī¨ī ī īī īī īŦī īīīī īī īīīī īīīīīŠī īīī īīĢī ī īīī ī īīīŠīīīīī īīīī ī īīīī¨īīīīī īī īī īīīīī īīīī ī īīīī ī īŠī īīī īīīī īīīī īīī īīī īīīī ī īīī ī īīīīŠīīī īŠī īīīīīīīŠīīīīīīīīī īīīīīīīīī īīīīīīī¨ī īīīŠī īīīīīīŦīīīīī¨īī īīīīīīīīī¨īī īīīīī ī īīīīīīīī īŠīīīīīī īīīīīŽīīīīī¨īī īŠīīĢīīī ī īīī īīīīīī īīīī īīīīīī īīīīīī īīīīīīīīīīīīšīī īīīīīīīī ī īˇī īŗīīīīīīīīī īīīīŠīīīīī¨ī īīīīīīīī īīīīīīīīīīŦīīī īīīī īī īŠī īīī īīīīīīīī īīī īīīīī īīīī īī ī īˇī īŗīīīīīīīīī īŠīīīīīīīīīīīīīīīīīīŦīīīŦī īī ī īˇī īĨīīīīīīīīīīīīīīīīīīīīīīīīīī¨ī īīīīīīŦīīī īīī ī īˇī īŗīīīī īīī ī¨ī ī īīīīīŦīīī īī īīīīīŠīīīīīīīīī īīī īī īīīīīī īīīīīīīīīīī īīī ī īŠī īīĄī īīī īīīīīīī īīīīīīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīī īīīīīīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīīīīīī īīī īīī īī īīīĄī īī īīīīīīīīī īīīĸīŖī¤īĨīīĻīŖīīĨīīīī īīīīī īīīīīīī§īī īī ī īīīīī īīī īī īšīīīī ī īīīŠīīī īīīī īīŦī īīīīīīī ī īĨīī īīīĄī īīīī īīī īīīīīīīīŋī īī īīī īŠīīŽī ī īīī ī īī īīīīīīīīīīīīŠīīī īŠī īīīīīī īīīīīī īīīī īī ī īˇī īŗīīī īīīīī ī¨ī ī īīīŦīīīŦī īī īīī īīī ī īīīīī īīī īīīī īīīīī īīīī īī īīīīī īīī īī īī īīīīīŠīī
ī ī˛īĢīīīīīīīīīī¨īīīīīīīīīīĸīīī īīīīīīīīī īī
īīīīī īīīīīŠī īīī īīī īīīīī īīī īīī ī īīīŠīīīīīļīī īīīī īīīŦī ī īī īī īīī īī īīīīīīī īīīīīīī īīĢīī īĸīīī īī īīīīīīī īīīŠīīī īīīīīī īīī īīī ī īīīīīīīīīīŦī īī īīīīīīīīīīīīīīīŠī īīīīīīī īīī īīīīīīīī īīīīīīīīī¨īī īīīīīīīī īīīīīīīīīī¨ī īīī īŦīī īī īīīīīīī ī īī īīĢī
ī
īīĢīīīĻīīīīīī īŠī īīī ī
īīīīī īīīīīīī īīīīī ī¨ī ī ī īīīīīī īī ī¨īī īīī ī īĨīī īŊīīīīī īī īīīī¸īīī īĻīąī īīīīīŦī ī īī īīŠīĢī īģīīīīīīīīīīīŠīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīĄīīīīīīīīŠīīīīīīīīīī īīīīīī īīīīīīĄī īī īīīīīīīīīī īīī īīīī īīīĄī īīī īŠīīī ī īī īŦī īī ī īī īīīīīī īī īīī īīī īīīī īīīīīīīīīī īī īīŠīīīīīīīī īīī ī īŠīīīīīŠī īīīĢī īŗīī īī ī īīīī īīīī īīīīīŦīīīī īī īīī īīī īīī īīī īīīŠīīīīī īīīīī īīīīīēīīīīīīīīīīīīīīīī īīī īīīīīīĩīīīī īīīīīī īīī īīĄīīīī īīīīŠīīīīīīŠīīīīī īīīīī īīīīīīīīīīŦīīīī īīīīīīīī īīīīīīīīī¨īī īīīīīīīīīīī īīĢī
ī īīĢīīīī īīīīīīīīīī ī
īīīīī īīīīīīīīīīīīīīī īīīīīīīīŠī īīīīīīīī īīīīīīŦī īīīīīīīī īīīī īīīīīīīīīīīīīī īīīīīī īīīīīīīīŋī īīīīī īīīīīīīīīīīīī īŠīīīīīī īīīīīŽīĢī ī īĻīīīīīīīīīī ī īīī ī īīīīī īīī īīī ī īīīīīīīī īīīīī īīīīī īīī īīīīīīīīīŠī īīī īīīīī īīī īīī īīīīīī īīīīīī¨īī īīīīīīīīīīīī īīŽī īīĢīīī īī īīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīŠīīīīīīīīīī īīīīī īīīīīī īīĢī ī īŊīī¨īīī īīīīīīīī īŦīīī īīīī īīīīīīīīīīīī īīī īŦīīī īīīīīīīīīīīīŋī īīīīīīīīīŠī īŠīīīī īīī īīīīī īīīīīīĢīīīĸīīī īīīīīīī īīīīī īīīīīīīŦī īĄīīīīīīīīīīīŦī īĄīīīīīīīīŠī¨īīīīīŦī īĢī ī īīīī°ī¤īīīīīīīīīīī īīīīīīīīīīīīīīŠī īīīīīīīīīīīī īīīīīīīīīīīīīīī īīīīīīīīīīīīīŋī īī īīīī īŠī īīīīīīī īīīŠī īīīīīī īīī ī īīī īī īīīīĄī īīīī īīīŠī īīīīīī īīī ī īīī īī īŽīīīīīĢīī īīīīīīī īīīīīīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīī īīīīīīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīīīīīī īīī īīī īī īīīĄī īī īīīīīīīīī īīīĸīŖī¤īĨīīĻīŖīīĨīīīī īīīīī īī§īīīīī§īī īī ī īĻīąīīŠīīī īī īīī ī īīŠīīīī īīīīīīĄī īīīŽī īīīĄī īīī ī¨īīīŠī īīīīīīĄī īīī īīīŠī¨īīīīīīīī īīīīī īī īīīīīīīīīĢī
ī ī§īĢīīīī īŦīīīīīīīŧīīīīīīī ī
īī īŦīīīīīīīīĢīīĄīīīī¸īī§ī¸īīīīīīīīī
īīīīīīī īīīīīīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīīīīīī īīī īīī īī īīīĄī īī īīīīīīīīī īīīĸīŖī¤īĨīīĻīŖīīĨīīīī īīīīī īīīīīīī§īī īī ī īīīīī īīīīīīī īīīīīī īīīīĄī īīīīīīīīīī īīīī īīī¨īīīīīīīī īīīŠīīīīī īīĄī īīī īī īī īīīīīī īī īī īī īīī īīīīīīīīīĒīīī īīīīŠīīīīīĢīĒī ī
īīĢīīīĸīŦī īīŦīī īī ī
īĨīīīīīŠīīīīīīīīīī īīīīīī īīīīī īīīīīīīīī īīīīŠīīīīīīŽīīīīīīī¯ī īīīīīīīīīīīīīīī īīīīĢīīīĨīī īīīī īīīīīīī īī īīŠīīī īīīī īīŦīīīī īīīīīīī īīīīī īīīīīīīīīīīīīīīīīīīīī¨ī īīīīīīī īīĄī īīīīī īŠīīīī ī¨ī ī īīīīīīīīī īī īīīīīīīīīī īīī īīīī īīŠīīīīīīīī ī īīī īīīŠīīīīī īīī īīīīīīīī īīīī īīī ī īīīīīīī īīīīīīīīī īīī īīīī īīīīī īīīīĢī ī īĸīīī ī īīīīī īīīī ī¨ī ī īī īī īī īīŠīīī īīĄī īīī ī īīīŠīīīīī īīīī īīī¯ī ī īīī īīī īīī ī īīīīī ī īīīīī īīīīī īīī īīī īīī īī īīīīīīīīīīī īīīĢī
ī īīĢīīīīīīīīī ī ī
īīī īīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīŠī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīī īīīīīīīīī¨ī ī īīīīīīīīīīī īīĢīīī
ī ī°īĢīīīīīīī ī ī
īīī ī īīīīī ī īīī īīīīī īīīīīīī īīīŦī īīī īīīī īīīŠīīīīī īīīīī īīīīī īī īīī īīīŠīīīīīą īīīī īīĄīīīīŠīīīīīąīī īīī īīĄīīīīīīīīī īīīīī īīīīŠīīīīīąīīīīŦīīī īīīīīīī īŠīīīīīī īŠī īīīīĄīīī īīīīīī īīīīīīīīīīīīīīīĢīīīīīīīīīīŦī īī īīī¨īīīīī īīīīīīīīīīī īīīīīīīīīī īī īīīīīīŠīīīīīīīīīīĄīīīīīīīīīīīīīīīīīīīĄīīīī˛ī īīĄīīīīī īīĄīī īīīĢī
ī īŗīĢīīīīīīīīī ī
īŗīĢīīīīīīīīīīīīīīīīīīīīīī
īīīīī īī īīīīīīī īīī īīīīīīīīī ī īīīīī īŠīī īŠīīīī ī¨ī ī īīīīīīīīīīīī ī īŦīīīīīī īī īīīī īīīīīīīīī īīīīīīīīīī īīīīīīīīīīīīīīī īīīīī īīī ī īīĢī īī īīīīīīīī īīīīīīī īī īīī īī´īī īī īīīīīīī īīīīīĄī ī īŠīīīīīĄī īīīīīŠī īīīīĄī ī īīīĢī ī īīīīī īīīīīīīī ī˛īīīīī īīīī īīīīīīīīīīīīīŠīīīīīīĄīīīīīīīīīīīīī īīīīīīī īīīī īīīīīīīīĢī īīīīīīīīīīīīīīīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīīīīīī īīī īīī īī īīīĄī īī īīīīīīīīī īīīĸīŖī¤īĨīīĻīŖīīĨīīīī īīīīī īīīīīīī§īī īī ī ī īīĢīīīī¨īīīīīīīīīīīī īīīīīī īīīīąīī īī īīī īīīŠīīī¯ī īīīīīīŠīīī īīīīīĄīīīīŠīŠīīīīīī¯īīīīī īīīīīīŠīīīīīīĄīī īīīĢīīīīī īī īīīī īīīīīī īĩīīīī īŠī īīīīīīīīīīī¨īīīīīīīīīīŠīīīīīīĢī ī ī°īĢī īĸīī īīīīīīīīīī īīīīīīī īī īīīīī īīīī ī¨īīīīī ī¨īīīīī īīī īīī īīīīīīīīĄī īīīŠīŠīīīīīīīīīīī īīīīī īŦī īīīīīīĄī ī īŠīīīīī ī īīĄī ī īīīĢī īļīīīīąīīīīīīī īīīīīīˇīĢī ī īīī ī īŠīīŽīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīĢī ī īŗīĢī īīīīīīīīīī īīīī īīīīīīŠīīīīīī īī ī īŠī īī īīīīīīīīī īīī ī¨īīīīī īīī īīī īīīīīīīī īļīīīī īī īīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīī īīīīīīīīīīī īīīˇīĢīīīĨīīīīīī ī˛īīī īŠī īīīīīŠīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīī¨īīī¯īīīīīīīīīī īīĢī ī ī§īĢīīīīīīīī īīīīīīīīīīīīīīīīīŠīīīīīīīī ī īŠī īīīīīīīīī īīīīīīīīīīī īī¨īīīīī īīīĢīīīī ī ī īīī īīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīŠīīī īīī īīīīī īīīīīīīīŠīīīīīīīī¨īīīīīīīī īīī īīīīīī īīīīīīīī īīīīīīīīīīīĢī
ī īŗīĢīīīīīīīīīīīīīī ī
īīī ī īīīīīīīīīī īīīīī īīīī īī īīīīīī īīī īīīīīīī ī īīī īīī ī īīīīī īī īīī īīīī īī īīī īīīŠīīīīīīīīīīĢī
ī
īŗīĢīīĢīīīī īīīīīīī īīī īī īīīī īīīīīī īĩīīīī īŠī īīīīīīīīīī īīīīīīīīīīīīīŠīīīīīīĢī ī īŗīĢīīĢīīīīī¨īīīī īīī īī īīīī īīīīīī īĩīīīī īŠī īīīīīīīīīīī¨īīīīīīīīīīŠīīīīīīĢī ī īŗīĢīīĢī°īīĸīī īīīīīīīīī īĸīī īīīīīīīīī īīīīī īŠīīīī ī¨ī ī īīīīī īī īīī īī ī īīī ī ī¨īīī¯īīī īīīī īīīī ī īīī īīīīīīīīīīī īīīīīīī īīīŠīīīīīīīī īīīīīīī īīīīīīĄīīīīīīī īīīīīīī īīīīīīīīīīī ī īīī īīĢī ī īŗīĢīīĢīŗīīīīīīīīīī īīīīīīīīīīīīīīīŠīīīīī¨ī īīīīīī īīīīīīīīī īīŦī īīīīīīīīī īīīīīī īīŠīīīīīīī īĩīī īīī ī¨īīī¯īīīī īļīī īī īī īīī īīī ī ī¸īīī¯īīī īīīīīīī īīīī īīīīīīīīīīī īīīīīīŠīīīīīīˇīĢīī īīīīī īŠīąīīīīīīīī¯īąīī īŦī īīīī īīīīīīīīīīīīīī īĩīīīī īīĢī ī īīīīīīīīīīīīīīīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīīīīīī īīī īīī īī īīīĄī īī īīīīīīīīī īīīĸīŖī¤īĨīīĻīŖīīĨīīīī īīīīī īī°īīīīī§īī īī ī īŗīĢīīĢī§īīīīīīīī īīīīīī īīīīīīī īīīīīī īīīīīīŠīīīīīī īŠīīīī ī¨ī ī īī īŠīīŦī īī īīīīŠī īī īī¯īīĄī īīīŠīīīī īī īīīī ī īīīĄīīīīīīīīŠīŠīīīīīī īīīīīīī īīīīīīīīīīīīīī īīīīīīīīīīī īĢīīīīīīīīī īīīīīī īīīīīīŠīīīīīī īīīīīīī ī¨ī ī īīīīī īī īīī īīīīīīīīīī ī īīīīī īīī ī īīīīīīī īīīīīī īīīīīīīīīīīīĢī ī
īŗīĢī°īīīīīīīīīīīīŠīīīīīīī
īīī ī īīīīīīīīīī īīīīī īīīī īī īīīīīī īīī īīīīīīŠīīīīīīī īīī īīī ī īīīīī īī īīī īīīī īī īīī īīīŠīīīīīīīīīīĢī
ī
ī
īŗīĢī°īĢīīīī īīīīīīī īīī īī īīīī īīīīīī īĩīīīī īŠī īīīīīīīīīī īīīīīīīīīīīīīŠīīīīīīĢī ī īŗīĢī°īĢīīīīī¨īīīī īīī īī īīīī īīīīīī īĩīīīī īŠī īīīīīīīīīīī¨īīīīīīīīīīŠīīīīīīĢī ī īŗīĢī°īĢī°īīĸīī īīīīīīīīī īŖīīīīī īīīīīīīī īĩīīīī īŠī īīīīīīīīīīīīīīīīīīīŠīīīīīīīīīīīĸīī īīīīīīīīīīīīīīĄī īīīī īŦī īīĄī īīī īī īī īī īīīī īīīī īĄī īīī ī īīīīī īīīīīīī īīīī ī¨ī ī īīīīīīŠīīīī īī īīīī īīīīī īī īīīīīīīīīīī¨īīīīī īīīīīīīīīī īīĢī ī īŗīĢī°īĢīŗīīīīīīīīīī īīī īī īīīī īīīīīī īĩīīīī īŠī īīīīīīīīīīīīīŠīīīīīīīīīīīīīīīīīīīīīīīīĄīīīīī īīīīīī ī īīīīī īīī īĩīī īīīīīī īīī īīīīī īīīīīīī īī īī īīī īīīīīīīīī īīī īīīīīīī īīīīīīĄī īīī īīīīīīīīīī īīīī īīīīīīīīī¨īī īīīīīīīīīīīīī īŠī īīīīīīīīīīīīīīīīĢī ī īŗīĢī°īĢī§īīīīīīīī īīīīīī īīīīīīī īīīīīīīīīīīīŠīīīīīīīīī¨ī īīīˇīīīīīīīŠīīīī īīīīīīīīī īīīī īīīīŠīīīīī īī īīīīī¯īīīīīīīīīīīī īīīī īīīīī īīīīīīīīīīĄīīīˇīīī īīīīīīīŦīīīī īŠīīīīīīīīī īŠīīĄī ī īīīī īīīīīīīī īīīīīīīīīīī īīīī īīīīŠīīīīī´īīīī īīīīī¯īĢī
īŗīĢīŗīīīīīīīī īīīīīīīīīī
īīī īīīīīīīīīīīīīīīī īīīī īīīīīīīī īīī īīī ī īī īīīīīīīīīīīīīīīī īīīīīī īī īīī īīīī īīīīī īīīŠīīīīīīīīīīĢī
ī
īīīīīīīīīīīīīīīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīīīīīī īīī īīī īī īīīĄī īī īīīīīīīīī īīīĸīŖī¤īĨīīĻīŖīīĨīīīī īīīīī īīŗīīīīī§īī īī ī īŗīĢīŗīĢīīīī īīīīīīī īīī īī īīīī īīīīīī īĩīīīī īŠī īīīīīīīīīī īīīīīīīīīīīīīŠīīīīīīĢī ī īŗīĢīŗīĢīīīīī¨īīīī īīī īī īīīī īīīīīī īĩīīīī īŠī īīīīīīīīīīī¨īīīīīīīīīīŠīīīīīīĢī ī īŗīĢīŗīĢī°īīĸīī īīīīīīīīī īīī īī īīīī īīīīīī īĩīīīī īŠī īīīīīīīīīīī īīī īīīīīīīīīīīīīīĸīī īīīīīīīīīīīīīīĄī īīīīīīīīīīī īīīīīīīīīī īīīīīīīī īīĢī ī īŗīĢīŗīĢīŗīīīīīīīīīī īīī īī ī īīī ī īīī īī īĩīīīī īŠī īīīī īīīī īīī ī īī īīīīīīīīīī īīī īīīīīīīīī īīīīīĄī īīīīīīī īīīī īīīīīī īīī ī īīīīīīīī īīĢī ī īĨīī īīī ī īīīīī īīī īĩīī īīīīīī īīī īīīīī īīīīīīī īī īī īīī īīīīīīīīī īīī īīīīīīī īīīīīīĄī īīī ī īīīīīīīī¨īī ī īīīīīīī īīīīī īŠī īīīīīīīīīīīīīīīīĢī ī īŗīĢīŗīĢī§īīīīīīīī īīīīīī īīīīīīī īīīīīī īīīīī īŠīīīī ī¨ī ī īī īīīīīī īī īīī īī īŠīīīī īī īīīīī īŠīī¯ī īī īī īīīŦī īīī īīī īīī ī īīīīīīŠīīīīīī īīŠīīīīīī¨īī īĢī ī īīī ī īīīīīīīīīī īīīīī īīīī īī īīīīīīī ī īšī īīīī īīēīīīīīŠī īīīīīīīīī īīīīīīīīīīī īĩīīīī īīĢī ī īšī īīīīīīī īīŠī īīīīīļīīī´īīĄīīīģīī´īīˇīīīīīīīīīīīīī īīīīīīīīīīīīīīī īĩīīīī īīĢī ī īšī īŧīīīī īīīīŦī īīēīīīīī īŠīīēīŊīī¨īīī ī īīīīīīī ī īŊī īīīīī īīī īī īŠīīīīŠīīŠīĄī īīīīī īīīīīīī īŠīīīī ī¨ī ī īīī īīĢī ī īīīŠīīīī īī īīīīŠīīīīīīī īī īīīīŦī ī īīī īī īīīī īŠīī¯ī ī īīī ī īīīīī īīīī īīīŦī īīī¨īī īĢī ī īīī ī īīīŠīīīīī īīīīīīī īīī ī īī īīīī ī īīīŠīŠī īīīīīīīīąīīŦīīīīī¨īī īīŠī īīīīīīīīīīīīīīīīīīīīīīĢī ī
īŗīĢī§īīīīīīīīī¨īīīīīīīīīīĸīīī īīīīīīīīī īī
īīīīī īīīīīŠī īīī īīī īīīīī īīī īīī ī īīīŠīīīīī´īī īīīī īīīŦī ī īī īī īīī īī īīīīīīī īīīīīīī īīĢīī īĸīīī īī īīīīīīī īīīŠīīī īīīīīī īīī īīī ī īīīīīīīīīīŦī īī īīīīīīīīīīīīīīīŠī īīīīīīī īīī īīīīīīīī īīīīīīīīī¨īī īīīīīīīī īīīīīīīīīī¨ī īīī īŦīī īī īīīīīīī ī īī īīĢī
ī
īīīīīīīīīīīīīīīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīīīīīī īīī īīī īī īīīĄī īī īīīīīīīīī īīīĸīŖī¤īĨīīĻīŖīīĨīīīī īīīīī īī§īīīīī§īī īī ī
ī§īĢīīīĻīīīīīī īŠī īīī ī
īīīīī īīīīīīī īīīīī ī¨ī ī ī īīīīīī īī ī¨īī īīī ī īĨīī īŊīīīīī īī īīīīēīīī īĻī˛ī īīīīīŦī ī īī īīŠīĢī īģīīīīīīīīīīīŠīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīĄīīīīīīīīŠīīīīīīīīīī īīīīīī īīīīīīĄī īī īīīīīīīīīī īīī īīīī īīīĄī īīī īŠīīī ī īī īŦī īī ī īī īīīīīī īī īīī īīī īīīī īīīīīīīīīī īī īīŠīīīīīīīī īīī ī īŠīīīīīŠī īīīĢī īžīī īī ī īīīī īīīī īīīīīŦīīīī īī īīī īīī īīī īīī īīīŠīīīīī īīīīī īīīīīļīīīīīīīīīīīīīīīī īīī īīīīīīˇīīīī īīīīīī īīī īīĄīīīī īīīīŠīīīīīīŠīīīīī īīīīī īīīīīīīīīīŦīīīī īīīīīīīī īīīīīīīīī¨īī īīīīīīīīīīī īīĢī
ī īŋīĢīīīī īīīīīīīīīī ī
īīīīī īīīīīīīīīīīīīīī īīīīīīīīŠī īīīīīīīī īīīīīīŦī īīīīīīīī īīīī īīīīīīīīīīīīīī īīīīīī īīīīīīīīī īīīīī īīīīīīīīīīīīī īŠīīīīīī īīīīī¯īĢī ī ī¸īīī¯īīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīĄīīīīī īīīīīīīīīī īīīīīīīī īīīīīīīī ī ī¯ī ī īīīīīīīīīīīīīīīīīīĢī ī īĻīīīīīīīīīī ī īīī ī īīīīī īīī īīī ī īīīīīīīī īīīīī īīīīī īīī īīīīīīīīīŠī īīī īīīīī īīī īīī īīīīīī īīīīīī¨īī īīīīīīīīīīīī īī¯ī īīĢīīī īī īīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīŠīīīīīīīīīī īīīīī īīīīīī īīĢī ī īŊīī¨īīī īīīīīīīī īŦīīī īīīī īīīīīīīīīīīī īīī īŦīīī īīīīīīīīīīīīī īīīīīīīīīŠī īŠīīīī īīī īīīīī īīīīīīĢīīīĸīīī īīīīīīī īīīīī īī¸īīīīīŦī īĄīīīīīīīīīīīŦī īĄīīīīīīīīŠī¨īīīīīŦī īĢī ī īīīīąī¤īīīīīīīīīīī īīīīīīīīīīīīīīŠī īīīīīīīīīīīī īīīīīīīīīīīīīīī īīīīīīīīīīīīīī īī īīīī īŠī īīīīīīī īīīŠī īīīīīī īīī ī īīī īī īīīīĄī īīīī īīīŠī īīīīīī īīī ī īīī īī ī¯īīīīīĢīī īĻī˛īīŠīīī īī īīī ī īīŠīīīī īīīīīīĄī īīī¯ī īīīĄī īīī ī¨īīīŠī īīīīīīĄī īīī īīīŠī¨īīīīīīīī īīīīī īī īīīīīīīīīĢī ī
īīĢīīīī īŦīīīīīīīŧīīīīīīī ī
īī īŦīīīīīīīīĢīīĄīīīīēīīīēīīīīīīīīī
īīīīīīīīīīīīīīīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīī īīīī īīī īīīĄīī īīīĸī īī īīīīīīīīīī īīīŖī¤īĨīĻī§īī¤īīĻī īīī īīīīī īīīīīīīī¨īī īī ī īīīīī īīīīīīī īīīīīī īīīīĸī īīīīīīīīīī īīīī īīīŠīīīīīīīī īīīīīīīī īīĸī īīī īī īī īīīīīī īī īī īī īīī īīīīīīīīīĒīīī īīīīīīīīīĢīĒī ī
īīĢīīīŖīŦī īīŦīī īī ī
īīīīīī īīī īīī ī īīī īīīīīī īīīīīīī īīī īīī īŠīīīīī īīī īīīīīīīīīīīīīīŽī īīīī īŦī īī īīī īīī īī īīīīīīīīīīīīīīīīīīī īīīīīīīīīīī īīī īīīīī īīīīīīīīīīīī īīīīīīīīīīīīīīīīīī īīī īī īīīīīīī īīīī īīī īīī īīī ī īī īīīīī¯īĢī ī īīīīīī īīīī īīīīī īīīŦī ī īīī ī īīī īīī īīī īīī ī īīīīīīīī°īī īīīīŠīīīīīī īŠīī īīīīŦīīīīīī īī īīīīīī īī īī īīīīī īīī īīīīīīīīīīīīīīīĸī īīī īīīŦīīīī īī īī īīī īīīīīīīī īīīī īīīīīīī īīī ī īīī īīīīīīĢī ī īīīīī īīīīīīī īīīīīīī īī ī īąīī īīīīīīīīīīīīīīīīīīīīīīīī īĸīīīīī īĸīīīīīī īīī īīīīŦī īī īīīīīīīī īĢī
ī īīĢīīīīīīīīī ī ī
īīī ī īīīīīīī ī īīī īīīīīīīīīīīīīīī īīī īī īīīīī īīī ī īīīīīīīī°īī īīīīī ī īīīīī īīīī īī īīīī īīī ī ī īīīīī īīīīī īīĢī ī īīīīī īīīīīīī īīīīī īī īīī īīī ī īīīīīīīī īī īīīī ī īīīī¯ī īīī īīī ī īīīīī˛īī īīīī īīīī īīīīīīīīīīīīī īīīĸīīīīīī īīīīīīīīŠīīīīī īīīīīīīīīīīīīīīīīīīŠīīīī īīīī īīīīī īīīī ī īąīī īīīīī īīī īīī ī īīīīīīīīĸī īīīī īīīīŦīīī ī īīīī īīīīīīīī īīī īīīī īīīīī īīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīī°īīī īīīīīīīīīīīīīī īīĢī
ī īŗīĢīīīīīīī ī ī
īīī īīīīīī īīīīīīīīīīīīīīīīīīīīīīī īīīīī īīīīīīīīī°īīī īīīīīīīīīī īīīīīīīīīī īīīīī īīīĸī īīīīīīīīīī īī īī¯īīīī īīīī´īīī īī īŠī˛īŠīīī īī ī īīīīī īīīīīīīīīīīīīĸī īī īīŦī īī˛īīīī ī īīīīīīīīīīīīīĸī ī īīīīī īī īīīīīĸī īīīī īīīīīīīīī īī īīīīīīīī īĢī ī īĻīī īīīŦī īīī īīīī ī īī īīīīīīīī īīīīī īī īīī īīīīī īīī ī īīīīī īīĸī īīī īī īīī īīī īīīī ī īąīī īīīīī ī īīīīī īīīīīīīīīīīīī īīī īīīīīīīīīī īīīīīīīīīīī īīīīī¯īĢī
ī īĩīĢīīīīīīīīī ī
īĩīĢīīīīīīī īīīĄīī īīīīīīīīīīīīīīīīīīīīīīī īīī
īĄīī īīī īīī ī īīī¯ī īī īīī ī īąī īīīīī ī īīīīīīī īī īīī ī īīī īī īī īīīīīī īīī īī īī īīŦīīīī ī īīīīī īīīīī īīīīīīīī īīīīīīīīīĢī ī īīīīīīīīīīīīĸī īīī ī īīīīīīīīīī īīīīīī īī īīī īīī ī īīīīī īīīīī īīīīīīī īīīīīīīīīī īīīīīīīīīī īīĢīīī īīīīīīīīīīīīī īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīī īīīī īīī īīīĄīī īīīĸī īī īīīīīīīīīī īīīŖī¤īĨīĻī§īī¤īīĻī īīī īīīīī īīīīīīīī¨īī īī ī īĩīĢīīĢīīīī īīīīīīīīīīīī īļīī īī īīīīīī īī īīīīīīīī ī īīīīī īīīīīīīīĸī ī īīīīī īīīīī īŠī ī īīīīī īīī īī īīīī īī īīī īīīī īīīīīīĢī ī īĄīī īīī īīīīīīī ī¯ī ī īī īīī īīīīī īīīīī īīī ī īīīīīīīī īīīī īī īīīī īīīīīīīī īīī ī īīīīī īīīī ī īīī īīī īī īīī ī īąīī īīīīī īīī īīī ī īīīīīīīī īī īīīīī¯īĢī ī īĄīī īīī īīīīī īīī¯ī ī ī īąīīī īī ī īīīī ī īīī īī īīīīīīī īīī īīīīī īīī īīĸī īīīīīīīīīīīīī īīī īī ī īīīīī īīīīī īīī īīīīī˛īīīīīī īī ī īī īīīīī īī īīī ī ī īīīŠīī īīŽī īīīīīī īīī ī īĒīī īīīī īīīīĒī īīīīīīīīīŽī īīī īīīīīī īīīīīīīŠīīīīīī īīīīīī īīī īīīī īīīīīīīŦīīīīīīīīīŦī īīī īīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīī īīī īī īī īīīīī īīīĢī ī īīīī īīīī īīī ī īīī ī īīīīī īīīīī īī īīī īīī ī īīīīīīīī īīŦīīīī īīī ī īīīīīī īīīīīīīīīīīīīīīīīī īīīīīī īīīīīīŦī īīīīīīīī˛īīīŠīīīīīīīīīīīīīīīīĢī ī īĩīĢīīĢīīīī īīīīīīīīĄīī īīīīīīī īī īīīīīīīīī īīīī īī īī īīīīīīī īīīīī ī īīī īīīīīīīī ī īīīīī īīīīī īīī īīī īīīīīīŠīīī īīĢī ī īĄīī īīī īīīīīīī īīī ī īīīīīīīīī ī ī īīīīī īīīīī īīī īīīī īŠīīīīī īīī īīīīīīīīīīīīīīī īīīīīĢī ī īˇī īīī ī īīīīīīīīīī īīī īī īŦī īī īī īīīīīī īīī īīīīīīīīīĸī īīīīīīīī īīīĸī īīīīīīīīīīīīīī īīīī īīīīĸī īīīīīīīīīīīīīīĸī īīīīīī īī īīī īīīĸī īīī īīīīīīīī īīīī īī īīĢī ī īīīīī īīīīī īīī īīīī ī īąīīīīīīīŦī īĸī īŠīīī īīī īīīīīīī īī īīī īīīīŦīīī ī īī īīīīī īīīīīī īī īī īīī īīīīīīīīī īīīīīīīīīīŦīīīī īīīīīīīīīī īīīīīīīŠīīī īīĢī ī īˇī īīī ī īīī īī īīī īīīīīīŠīīī īī īīīīī īīīīīīīī ī īīīīī īī īīī īī īīīīīīīīīīīī īīīīīīī īīīīīīīīīīīīīī īīīīīīī īīīīīīī īīīī īīīīīĢī ī īˇī īīīīīī īīī īīī īīīī īīīī ī īī īīīīī īīī īīīīīīīīīīīīīīĸī īīīī īīīīī īīīīīīīīīīīī īīīīī īīī īīīīīīī īī īī īīīīīīī īīīīīī īīī īīīīīīī īīīīī īīī īīī ī īīīīīīīī īīīī īīīī īŠī ī īī īīī īŦīīī ī īīīīīĸī īī īīīīīī īīī īīī īīī ī īī īīīīī īīīĸī īīīīīīīīīīīīī īīī īīīīīīīīīīĢī ī īˇī īĻīī īīī īīīīīīīī īīīīīīī īīīī īīī īīī īī ī īīīīī īīīīīīīī īīīī īīīīī īīī¯īīīīīīī īīī īīīĸīīīīīīī īīīīīīīīīīīīīīī īīīīīīī īīīī īąīī īīī īīĢī ī īˇī īīīīīīīīīīī īīīīī īī īīīīīīī īīīīī īīīīīīīīīīīī īīīīīīī īīīīī īīīīīīīīī īīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīī īąīī īīīīŦī īīīīī īīīī¸ī īĢī ī īīī īīī īīīīī īīīīīīīīī īīīīīīīīīīŠīīŦī īīīīīīŠī īīīīŦī īī īīīīīīīīī īīī īīīīīīīī īīīī īīīī īīīīīīīīīīīīīīīīīīīīīīĢī īīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīī īīīī īīī īīīĄīī īīīĸī īī īīīīīīīīīī īīīŖī¤īĨīĻī§īī¤īīĻī īīī īīīīī īīŗīīīīīī¨īī īī ī īĩīĢīīĢīŗīīšīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīī īī ī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīī īīīī īŠīīīīī īīī īīī īīīīīīīīĢī ī īĄīī īīī īīī īīī ī īīīīīīīīī ī ī īīīīī īīīīī īī īīī ī ī īąīī īīī īīīīīīīī īī¯īīīīīīī īīīīīīīīīī īīīīīīīīīīīīīīīīīī īīīīīīīīīīī īīī īīīīī īīīīīīīīīīŠīīīīī īīīīīīīīīĢī ī ī īīīīīīīīīīīīĸī īīī īīī īīī ī īīī¯ī īī īīī īī īīīīīī¸ī ī īīīīī ī īīīīī īī īīī īīīīī īī īīīīīīīī īīīīīīīī īī īīī īīīī īīī īīī ī īīīīīīīīĸī īīīīĸī īīī īīīīīĸī ī īīīīī īīīīīīŠī īīīī īīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīī īīīĢīī ī īĩīĢīīĢīĩīīīīīīīīīīīīīīīī ī ī īī ī īīīīī īīīīīīīīī ī īēīīīīīīīī īīīīīīīīīīīī īīīī īīī īī īīī īīī ī īŠīīīīīī īīī ī īīīī īīīīīīīīī ī īīīīīģī īīī īī īŧīīīī īī īīīī īīīī ī īīīīīī īī īīī īīīīī īīī ī īīīīīīīī ī īīīīī īīīīī īīĢī ī ī īīīīīīīīī īī īīī ī īīī ī˛īīīīīīīīī īī īīīī īŠīīīīī īī īīī īī īŧīīīī īīĢī ī ī īī īī īīīīīīīī īīī ī īīīīīīīīī ī īīīīīīī īīīīīīī ī īīī īīīī īī°īīī ī īˇī īīīīī ī ī īˇī īīīīīīīīīīīī ī ī īˇī īīīīī īīīīīŠī īīēīīģī ī īˇī īĨīīąīīīīīŠī īīīīīīīīīīīīīŠīī ī ī īˇī īĄīŊīīīīīīīīīīīīīīī īīī īŠīīīī ī ī īīīīīī īīīīīīīīī īī īīīī īīīī īīīīīīī ī īī īīīīīīī īī īīīīī īī īēīīīīīīīīīīĸī īīīīīīīīīĸī ī īīīĢīģīĢī ī īīī ī īĻīī īī īīīīīī īīī īīī īīŠīī ī īīī īīīīīīī īīī ī īīīīī īīīīīīīīī īīī īīīīīīīīī īī īīīīīīĢīī ī īĩīĢīīĢī¨īī īīīī˛īŊī īīīīīī īīī ī īī īīīīī˛īī īīīīīī īī īīīī īŠī ī īī īīī īīīī īīīīī īīī īī īī īīī īī īīīīī īŠī ī īīīī īīī īīī ī īīīīīī ī īīīī īīī ī īąīī īīī īī īī īīīīī īīī īīīī īĢī ī īīī ī īīīīīīīī īī īīīī īī īī īŧīīīī īīīīīīīīīīŠīīīīīīī īīīī īīīīī īīīīīīīīīī˛īī īīīīīī īīīĢīīī ī ī īīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīī īīīī īīī īīīĄīī īīīĸī īī īīīīīīīīīī īīīŖī¤īĨīĻī§īī¤īīĻī īīī īīīīī īīĩīīīīīī¨īī īī ī īĩīĢīīĢīžīīŋīīīīīīīīīīīīī īīī ī īīīīīīīī īīī¯ī īī īīī ī īīīīīīīīīīīī īŠī īīī ī īī īīī ī īī īīīīīī īīī īīīīī ī īīīīīī īīīī īīī ī īī īīīīīī īīī īīīīīīīīīī īī ī īīīīī īēīīīīīģīĢī ī īŋīīīī ī īīīīīī īīīīīŠī īīīī īīīīīīīīīŠīīīīīīīī īīīīīīīīīī˛īīīī īīīīīīīīī īīīēīīīīīīīīīīī īī īīīīīīīīīīīīīīīīīīīīīī īīīīīīīīī°īīī īīīīīī ī īīīīīīīīīīīī īīīŠīīī īģīĸī īīīīīīīīīīīīī īīīīīīīī īīīīīīīīīīīīīīīīīī īīĢīīīīąīī īīīīīīīīīīīī īīī īīīīīīī ī īīīīīīīīīīīīī īīīīīīīīīīīī īīīīī īīīīīīīīīīīīīīŠī īīī īīīīīī īīīīīīīīīīīīī īīīī ī īī īīī īīīīī īīī īīĻīīī§īīī īīīīīĢīīīī īīī īīīīīīīīīīīīīīĸīīīīīīī īīīīī īī īīīīīĸīīīīīīīīīīīīīīīīīīīŠīīī īīĢī ī īĻīī īīī īīī ī īīīīīīīī°īī īīīī īīīīīī īīī īīīīīīī īīīīī īīīīīīīīŠīī ī īīīīī īīīŦī īīīīīīīīī īīī īīīīīīīīīīīīīīī īīīīīīĢīīīĨīīīīīīīīīī īīīīīĸīīīīīī īīīīīīīīī īīīī īī īīī īŠī ī īīīīīīīī īīī īīīīī īīīīī īŠīīīīī īīī īīīīīīīī īīĸī īīī ī īīīīīīīī īī īŧīīīī īīīīīīīī īīīīīīī īīīīīīīīīī īīīīīīīīī īīīīīēīīīģīīī īīīīī īīīīī īąīī īīīīī īīīīīī īīīīīīīīīīīīŦī īīīī īīīīīīīīīīīīīīīīīīī īīīīīīīīī ī īīĢī ī īīī ī ī īīīīī īīīīī īīīīīīīī īīīīīīīīīīīīī īīī īīīī īīī īīīīīŠīīīīīŠī ī īīīīī īī īī īīŦīīīī īīīīīī ī ī īīīīīī īēīī īīīīīī ī īĒīī īīīī īīī īīīīī īī īīīīī ī īīīīī īĄī¤īīĄīšīīīŊīĻīšīīīīīīīī īīīīŠīī īīīīīīī īĒīīīīīīīīīģīĢīīīĄīīīīŠīīīīīŠī īīī īŧīī īīīīīīīīī īŠī īīīīīīī īīīīīī īīīīī īīīĢī ī īīĢīīīīī īī īīīīīīīīīīīīīīīīīīīīīīīŠīī īīīīīīī īīī īī īŦīīīīīīīīīī īīīīīī īīīĢī ī īŗīĢī ī īīī ī ī īīīīī īīīīī īīīīīīīī īīīīīīīī īīīīīīīīīīīīĸī īīīīīīīīīī īīī ī īīīīī īīīīīīīīīīīīīī īīīĸīīīīīīī īīī īīī īīĢīīī ī īĩīĢī ī īīī ī ī īīīīī īīīīī īīīīīīīī īīī īīīī īīīīīīīīīī īīīīī īīīīīī īīīīīīīīīīīī īēīīīīīīīīīīīīī īī īīīīīīī īīī īīģīĸīīŠīīīīīīī īīīī īīīīĸīīīīīī īī īīīīŦī īīīīī¯īīĢī ī ī¤īīī īīīīīīī īīīīīīīī īīīīīīīīīīīīīīī īīīīīī ī īīĸīī īąīīīīīīīīīīīīīī īīīĸīīīī īī īīīīīī īīīī īīīŦī ī īīīī īīīī īīīŧīīīī īī īīŠīīīī īīī ī īīīīīīīī°īī īī īīŦīīī īī īīī īī īąī īīīīīīīīīīīī īīīŠīīŦī īīī īŧīīīī īī īīīīĢīī ī īĩīĢīīĢīīīŖīī īīīīīī īīīīīīī īīīī īĄīī īīī īīīīī īīī ī īīīī ī īīī īī īīī īīīīī ī īīīīī īīīīīīīī īīīīĢī ī īīīīīī īīĸī īīīīīīīīĸī īīīī īīīī īī īīīīīīī ī īīīī īŠī ī ī īīīīīī īī īīīŦī īī īī īīī īīī ī īīīīī īīīīīīīī īīīĢīīīĄīī īīīīīīīīīīī īīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīī īīīī īīī īīīĄīī īīīĸī īī īīīīīīīīīī īīīŖī¤īĨīĻī§īī¤īīĻī īīī īīīīī īī¨īīīīīī¨īī īī ī īˇī īŖīī īī īī īīīī īīī īīī īąīī īīī īī īīīī´īīī īīīīī īīī ī īīīīī īīīīīīīī īīīīĸī īīīīīīīī īīīī īīīīīīī īŠī ī īīīīīī īī īīīīīī īī īī¯īīīī īīīīīŦīīīīī īŠī īīīī ī īīī īīīīīĢī ī īīī ī īīīīīīīī īīī īī ī īīīīīīī īīīŠīīīī īŦīīīīī īīīīīīīīīīīīīīī īī īīīīīīī īīŦī īīīĢī ī īˇī ī¤ī īŦī īīīīī īīī īīīīīīīīīīīīī īīīīīīīīīīīī¯īīīīīīīīīīī īīĢīīī ī īˇī ī¤ī īŦī īī īīīīī¯ī īīīī¯īī īīīīīīī ī īīīīī īī īīīīī īī īīīī īīī īī ī īīī īīī ī īīī īī īīīīīīīīīīīī īīīīī¯ī°īīīīīī īīīĢīīīĻīīīīīīīīī īīīŠī īīīīīīīīīīīīīīīīīīīī īīīī īīīīī¯ī īīīīī īīīīī īī īŠī īŠīīīīī īīĸī īīī īī īīīī ī īīī ī īĄīŊīīĸī īīī īīī īīīīīīī˛īīīīīīīī īī ī īīīīīīīīīīīīīī īīīīīīīīīīīīīīĄīŊīīĢīīī ī īīī ī īīīīīīīī īīīī īīī ī īī īīīīīī īīī īŠīīīī¯ī īīīīī īīī īīīīīīī īīī īīī īŠī ī īīīīī īīīīī īīī ī īīīīīī īīī īīīīīī īīīī īīīīīīīī īīīīīīīī ī īīīīī īīīīīīīī īīīī īīīīīīīī ī īīīīī īī īīīīīīĢī ī īĩīĢīīĢīīīŋīīīīīīīīīīīīīīīīīīŦīīīī īĄīī īīī īīīīīīī ī īąīī īīī īīī īīīīŦīīīī īīī īī īīīīīī īīī ī īīīīīīīīī ī īī īīīīī¯ī īīīīīīīīīīīīī īīīīīī īīĢīīīīīīīīīī īīīīīīīīīīīī īīŠīīīīīīīīīīīīīīīī īīīīīī īīīīīīīīīīīīī īīīī īīīīīīī ī īīī īīīī īīĸī īīīīīĸī īīīī īī īīīīī īīĢī ī īīī ī īīīīīīīī īī īī īīŦī īī īīī ī īīīīīī īīī īīīīīīīī īīīī īīīī īīīī īīī ī īīī īīī ī īīīīīīī īī īī īīīīī¯īĢī ī īīī ī īīīīī ī īīīīīīīīīī ī īīīīī īīīīīīīī īīīīīīī īī īīīīīīīīīīīīīīīī īīīī īīīīī īīī īīīīīīīīīīīī īŦīī īīīīīīīīīī īīīīīīĸīīīīīīīī īī īī īīīīī īī īī īīī īīī īī īī īīŦī īīĸī īīīīī īīīīīī īīī īīīīī īīīīī īī īīī īī īīīīīīī īīīī īīīīī īīīīīī īīĸīīīīīīīīīī¯īīĸīīīīīīī īīīŦīīŠīī īīī īīīīĢī ī īĩīĢīīĢīīīīīīīīīīīŖīīī īīīīīīīīīīīīīīī īĄīī īīī īīīīīīī īŠī ī īīīŦīīī īī īīīīī īīī ī īīīīīīīī īīīīī īīīī īīīīīīīīīī īīīī īī īīīī īīīīīīī īīī īīīī ī īīīīī īīīīī īīī īīīī īī īīīīī¯īĸī īīīī īīīīī īīīī ī īīīīī īīīīīīīīīīīīīīīīīīī īī īīīīīī īīīīīīīīīī īīīŠīīīīī īīīīīīīīīīīīīīīīīīīī īŠī īīīīŠīī īīīīīīīīī īīīīīīīīīīīī īīīīīīīīīīīīīīīī īīīŠīīīīī īīīī īīĢīīī ī ī īīīīī īīīīīīīīīīī īīīīīīīīīīŠī īīŠīīī¯ī īīīīīĸīīīīī īīīīī īīīīīī īīĸīīī īīīīī īīĸīīīī īīī īī īīīī īī īīīīĸī īīīīīīīīīīīīīĸī īīī īīīī īī īī īīīīīīĢī ī ī īīīīīīīīīīīīĸī īīī ī īīī īī īīīīīīī īŠī ī īīīŦīīī īī īīīīī ī īīīīī īī īīī īīī īīī īīīīī īī īīīīīī īīīŠīīīī īīī īīīŦī īīīī īīīīīī īīīīīī īīīīīīīŠī īīīīīīīī īī īīīīīŠīīīīīī īīīīīĢī ī ī īīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīī īīīī īīī īīīĄīī īīīĸī īī īīīīīīīīīī īīīŖī¤īĨīĻī§īī¤īīĻī īīī īīīīī īīžīīīīīī¨īī īī ī īĩīĢīīĢīīīīīīīī īīīīīīīīŊī īī īīŦī īīīīīīīīī īĄīī īīīīīīīīīīīī īīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīī īīīīīīīīīīīŦī īīīīī ī īīīīī īīīī īīī īīīŠīīīīī ī īīīīīĸī īīīī īīīīī īīīīī ī īīīīī īīīī īīīīīīīī īīīī īīīīīīīīīī īīī īīīī īīīīīīīīīīīī īīīīŦī īĢīīīĻīīīīīīīīīīīī īīī īīīīīīŠī īīīī īī īī īīīīŠīī īīĸī īīī ī īīīīīīīī īīīī īīīī īīīī īīī īī īīīī ī īīī ī īīīīīīī īīī īīīīī ī īīīīī īīīīī īīī ī īīī īīī īī īī īīŦī īĸī īīīī īŦī īī īīī īīīīīīīīī īīīīī īŠī ī īīīīī ī īīī īīīīŦī īĢī ī īīī ī īŠī īīī īīīīīī ī īīī īīīīīīī īīī īīī īīīī īīī īī ī īīīīīī īīīīīĸī īīī īīī ī īīī īī°īī īīīīīīīīĸī īī ī īī īīīīīīīīīīīĢī ī īĻīī īīī ī īīī īī īīī īīīīīīīīīīīīī īīīīī īīī īī īīŠīīīī īīī ī īīīīīĸī īīī īŠī īīī īŦī īī īīīīī īīī īīīīīīīīī īīīī īīīī īīīīī īīīĸīīī īīīīīīī īīīīīīīīīīīīīīīīīīīīīīīī īīīīīī īīŦīīīīīĢī ī īĩīĢīīĢīīīī īīī īīīīīīīīīīīīīīīīīīŋīīŠīīī īīīīīī īī īŋīīīī īīīŠīīī ī īīīīī īī īīī īīīī īī īī īŦīīī īīĸī īīīī īī īīīīī īī īīīīīīīīīī īīĸī īīīīŦīīī īīīī īīīīīīŠīīīīīīīīīīī īīīīīīīīī īī īīŦī īī īīīīīĢīīīīīīīīīīīīīī īī īīī īī īīīīŠī īī īīī īī īīīīīīī īīīīī īīĸī īīīīīīīīīīīīī īī īīīīīīī īīī īīī ī īīīīīīī ī īīī ī īīīīīĸī īīīīīī īīīī īīīīīīīī īī īīīīīīŦī ī īīīīīĸī īīī īīī ī īīīīī īĢī ī īĄīī īīī īīī ī īīīī īīī īīīī īīīĸī īīī īīīī īīīī īīī īīīī īīīĸī īīī ī īīīīīīīī°īī ī īīīīī īīīīī īī īīīīī īī īīīŠīīī ī īīīīī ī īīīīīīīī īīī ī īī īīīīīīīīī īīī īīī ī īĻīī īŋīīīīī īī īīīī´īīīī īąī īīīīīŦī īīī īīīĢīīīī ī ī¤īīī ī īīīīī īīīīī īī īīīīīī īīī īī īīīī īīīīīī īīī īīī ī īīīīīīīī īīīīŦīīī īī īīī ī īīīīī īīīīīīīīŠīīī īī īīīīīīīīī īīīīīīīīīīīīīī īīīīīī īīīī ī īīīī īīīīīīīīĢīī īĻīīīīīīīīīīī īĸīīī īīīīīīīīīīīīīīīīīī īīĢīīīŊī īī īīīīīīīī īīŋīīŠīīī īī§ī īŦīīī īīīīīīīī īīīīīīīī īīīīīīīīīīīīīĢī ī
īĩīĢīīīīąīī īīīīīīīīī´īīīīī īīīīīīīīīīīīīī īīīīīīīī
īīī īīīīīīīīīīī īīīīīī¸ī īīīīīīīīīī īīīīīīīīīīŦī īīī īīīīīīīī īīīīīīīīīīīīīīīīī īīīīīīīīī īīī īīī īīī īīīīīīīī˛īīīīŦīīī īī īīīīīīīīĢī ī īīī ī īīīīīīīīīī īī īīīīīīī īīīīīīīīīīīīī˛īīīīīīīīīīīīŦīīī īīī īīīīīīīīīīīīīīī
ī
īĩīĢīīĢīīīĄīī īīīīīīīīīīīīīīšīīīīī īīī īĄīī īīī īīīīī īīī ī īīī ī īīīīīīīīī ī ī īīīīī īīīīī īī īīīī īīīī īŠīīīīī īīī˛īī īīīī īī ī īīīīīĢīīīĄīī īīīīīī īīīīīīīŠīīī īīīīīīīīī īīīīīīīŠīīīīī īīīī īīīīīīīīīīīīīīīī˛ īīīīīīīī˛īīīīŦīīī īīī īīīīīīīīīīīīīĢī ī ī ī īīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīī īīīī īīī īīīĄīī īīīĸī īī īīīīīīīīīī īīīŖī¤īĨīĻī§īī¤īīĻī īīī īīīīī īīīīīīīī¨īī īī ī īĩīĢīīĢīīī īīī īīīīīīīīīīī īīīīīīīīīī¤ī īīīīī¯ī īĄīī īīī īīī ī īīīīīīŠīīī īī īīīīī īīīī īīīīīī ī īąīī īīīīī īīī īī īīīīīīī ī īīīīī īīīīīīīīīīīīīīīīī īīīīīīīīīī īīī īīīīī¯īĢī ī īĩīĢīīĢīŗīīĄīī īīīīīīī īīīīīīīīŊī īīīīīī īĄīī īīīīīī īīī īŧīīīī īīīīīīīī īīīīīīī˛īīīīīīīī˛īīīīŦīīī īīīēīī īīīīīīīģīī īīīīī īīīīīīīīīīīīīīīīīīīī˛īŠīīīīī īīīīīīīīīīīīīīīīīīĢīīīīī īīīīīīīīīī īī īīīīī īīīīī īī īīī īīīī īīīīīīīīī ī īīīīīīīīīīīīīīī īīīīīĢī ī īĄīī īīī īīīīī īīīīīīī īīīīīīīīŠīī ī īīīīīīī īī īī īīīīīīīī īīī ī īīīī īīī īīī īīīī˛īīīīīīīī˛ īīīīŦīīī īīīīīīīīīīīīīīīīīīī īīīīīīīīīīī īīīīī¯īĢī ī
īĩīĢīŗīīīīīīīī īīīīīīī§īīīīīīīīīīīīīī
īīī īīīīīīīīīīīīī īīīīīīīīī īīīī īīīīīīīīīīī īīīīīīīīīīīīīīīī īīīīīī
ī
ī ī
īĩīĢīŗīĢīīīīīīīīīīīī ī īī īīīīī īīīī īīīīīīīī īīīīīīīīīīĸī īīīīīīīīīī īīī īī īīī īīīī īīī ī īīīīī īīīīīīīīī īīīīī īŠī ī ī¯ī īīī īīīīīīī īīīīīī īīīī īīī īī īīī īīīī īī īīī ī īīīīī īīī ī īīīīīīīīī īīīīīīīĢī ī ī īī īīī ī īīīīīī īīīīī īīī īīī ī īĻīī īŋīīīīī īīĸī īīī ī īīīīīīīī īīīī īīīīīī īī īī īīīī ī ī īīīīī īīīīī īī īīīīīīīīī īīĸī īīīī īīīīīīī īīīīī īīīīīīīīīīĸīīīīīīīīīī īīīī īīīīīīīīī īīīīīīīīĢī ī īĩīĢīŗīĢīīīīīīīīīīīīīīīīīī īīīīīīī§īīīī īīīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīīīīīīīīīĢīīīĄīī īīīīīīīīīīīīīīī¯īīīī ī īīīīī īīī īīī īī īīīīīī īī īīīīīīīīīĸī īīīīīīĸī īīī¯ī ī ī īīīīīĸī īīīī īŠī ī īīīī īīī īīī īīīīīīīī īīīīīīīīī īīīīīīīīīīīīīīīī īīī īīīī īīīīī īīīĢīīī ī īīī īīīīīīīīīīī īīīīī īīīīĸīīŠīīīīīī īīīīīīīī īŧīīīī īĸīīīī īī īīīīīīīīīīīīī ī īīīīī īīīīī īīīīīīīīī īīīīīīī īīīīīī īīīīīīīīīīīīĸī īīīīī īīī īīīīīīīīīīīīī īīīīīīīīīī īīī īī īīī ī ī īīīīī īīī īī īīī īīī īī īī īīīīī īīī ī īąīī īīīīī īīī īīī ī īīīīīīīīĢī ī īĨīīīīī īīīīīīīīīī īīīīīīī īīīī īīīī īīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīī īąīīīīī īīīīīī īīīīīīīīī°īīīīīīīīī īīīīīīī§īīīīīīīīīīīĢīīīĻīīīīīīīīīīīīīīīīīīīīīī īī īīī īīī ī īīīīīīī īīīīīī ī§īīīī īīīīīīī īīīīīīīīīī īīīīī īīīīī īīīīīīīĸī īīī ī īīīīīīī īīīīīīī§īīīīīīīīīīīīīīīīīīīīīīĢī
īīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīī īīīī īīī īīīĄīī īīīĸī īī īīīīīīīīīī īīīŖī¤īĨīĻī§īī¤īīĻī īīī īīīīī īīīīīīīī¨īī īī ī
īĩīĢīĩīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīī
īīī ī īīīīīīīī īīīīī īīī ī īīīī īŠī īīī ī īīīīīī īīī īīīīīīīīī īī īīī ī īīīīīīīī°īī ī īīīīī īīīīī īī īīī īī īīīīī īī īīīīī īīīīīīī īīī ī īīī īī īīī īŠīīīī īŠī ī īīīīīīīīīŦī ī īīīīī ī īīīī¯īīīīīīīīī īīīīīīīī īīīī īīīī īīīīī¯īīīīīīīī īīīīī˛īī īīīī īīīī īīīīīīīīīīīīī īīīĢī
ī
īĩīĢīĩīĢīīīĨīīīī īīīīīīīīīīīīīī ī īīīīīīīīīīīīīīīīīīīīī īīīīī¯īīīīīīī īīīīīīīīīīīīīīīī īīīīīīŠī īīīī īīīīīī īīīī īī īīī ī īīī īī īīī īīīīī īīī ī īīī īī īī īī īīŦī īī īīīīī īīīī īĸī īŠīīīīī īīī˛īī īīīī īī īī īīīīī īīĢī ī īĨīīī īīīīī īī īīīīīĸī īīī ī īīīīīīīī īīīīī īīīīī īī ī īīīīī īīī īīī ī īĻīīī īīī īīīīīī īīīī īīīī´īīī īīī ī īīīīīīī īīŦī īīĸīīīīīīīīīīī īīīī īīīīīīīī īīīīīī īīīīīĸīīŦīīīīī īīĸīīīīīīīī īīīī īīīīī īīīīīīīīīīīīŠī īīī ī īī īīī īģīīīīīīīīīī īīīīīīīīīīīīīīīĸīīīīīšīģīīīīīīī īīīīīīīīīī¯īīīīīīī īīīīīīīīī°īīīĻīīīī īīīīīīīĢīīī¤īī īī īīīīī īīī ī īīīīī īīīīī īīīīī īīī īīīīī ī īīī īīīīŦī īĸī īīī īīī ī īīī īī īīī īīī¯ī īī īīīīīīīīīīīīī īīī īŠī ī īīīīīī¸īīīī īīī īīīīī īīīīīīī īīīī īīī ī īīīīīīī īī īīī ī īīī īīīīī īīīīīī īīīīīīĢī ī ī īīīīīīīīīīīīĸīīīīīīī īīīīīīīīī´īīīīīīīī˛īīīīīīī īīīīīīīīīīīīīīīīīī īīīīīī īīīīīŧīīīīīīīīī īī īīīīīīīīīīīīīīīī ī īīīīīīīīīīīīīīĢīīīĻīīīīīīīīīīīīīīī īīīīī īīīīī īī īī īīŦī ī īīīīīīīīīīīīī īīī īŧīīīīīīīīī ī īīīīī īīī ī īīīīīīīīīīī ī īīīīīīīīīīīīīīīīīīīī īīīīīīīī īīīĢī ī īĩīĢīĩīĢīīīīīīīīī§īīīīīīīī īīī īīī īīīī īīīīīīīī īīīīīīīīīīīīīī īīĸīīīīīīīīīīī īąīīīīīī īīī īīīīīīīī īī īīīīīī ī īŦī īīī īīīīīīīīī ī īīīīī īī īīīīī īĸī īīī īīī īīīīīīīīīī īīīīīīī īīī īīī īīī ī īīīīīīīī°īī īīīī¯ī īī īīīīīīīī ī īīīīīīīĢī ī īīī ī īīīīīīīī īī īŧīīīī īī īīī ī īīī ī īīī ī īīīīīīīīīīīīīī īīīīīīī īŦī īīīīīīīīīīīīī īīīīīĸīīīīīīīīīīīīīīīīīīīīīīī ī īīīīīīīīīīīīīīīī īīī ī īˇī īīī īī īīīīīīīīīīīīīīī īīīīī īīī īīīī īīīīī īīīīīīīīĢī ī īˇī īīī īī īīīīīīīīīīīīīīīīīīīīīŦīīī īīīīīīīīīīīīīĢī ī īˇī īĻīīīīī īī īīīīīīīīīī īī īīŦī īīīīīī īīīīīĸīīīī īīī īīī īīīīīīīīīīŠī īīīīīīīī īī īīīīīīīīīīīīī īīīīīīīī īī īīīīīīī īīīīīī īīĢī ī īˇī ī īīīīīīīīīīīīī¸ī īīīī īŦīī īīĸīīīī īĸīīīīīīīīīīīīīī īīīīīīī īīīīīī īīīīīīī īīīīīīŠīīī īīĢī īīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīī īīīī īīī īīīĄīī īīīĸī īī īīīīīīīīīī īīīŖī¤īĨīĻī§īī¤īīĻī īīī īīīīī īīīīīīīī¨īī īī ī ī īīī īąīīīīī īīīīīīīīīīīīīīīīīīīī īīīīīī ī ī¤īŖīīīīīīīīīī īīīīīīī īīīīī īīīīīīīīīīīīīīīīī īīīīīīī īīīīīīīī īīīīī īīīī ī īīī īīī ī īīīī īīī īī īī īīīīī īīīēīīģī īīīī īīīī īīīīīīīī īīīīīīī īīīīīī īīīī´īīī īīīīŦīīī īī īī īīīīīīīīīīīīĢī ī īīī īīīīīīīīīī¸ī īī īī īŦīī īīĸī īīī īĸī īīīīīīīīīī ī īīī īīīīīīīŠīīīīīī īīī īīīīīīŠīīī īīĢī īĻīī īīīī īīī ī īīīī īīī ī īīīī īīī īī īī īīīīī īīīĸī īīī īīī īīīīīīīīīīīī īīī īīī īīīŠīīīī īīīīīīīīīīīīīīīī īīīīīĸīīīīīīī īīīīīīīīīī īīīīī īīīīīīīī īīīīīīīīīīīī īīīīī īĢī ī īīī ī īīīīīīīī īīīīīīī īī īŦīī īī īīīī īīīīīīīīŠīī ī īī īīīīīīīīīī īī īīīīīīī īīī īīīī ī īī īīīīīīīī īīīīīīīīīīīīīī īīī ī īīīīī ī īīīīī īīīī ī īīīīī īīīīīīīīī īī īīīīīīī īīīīīīīī īŧīīīī īīīīīīīīīīīīīīĢī ī ī īīī ī īąīī īīīīī ī īīīīīī īīīīī īīīīīīīīīīīīīī īŠī ī īīīī īīī īī īīīīī īīī ī īī īŧīīīī īīīīīīī īī īīīĢī ī īĩīĢīĩīĢīŗīīīīīīīī§ī īī īīīīī īĄīī īīīīīī īī īīīīīīīī īīīīīīī īī īī īī īīīīīīī īīīīīīīīīīīīīī īīīīī īī īīīīīīīī īīīīīīīī īīīī ī īī īīīīīīīŠīīīīī īīīīīīīīīī īīĢīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīī ī¯ī ī īīīīī īīīī¸ī īīīīīīī īīīī īī°īīī īīīīīīīīīīīīīīīīīīī īīŠīī īĸīīīīīīī īīīī ī īīī ī īŠīīīī īī īīī īīī ī īīīīīīīī īīī īīīīī ī īīīī īŠīīī¯īīī īīīī īī īīīīīī ī īīīīīīī īīīīī īīĢīīī ī īīīī īŦī īīĸī īīī īīī īīī ī īīīīīīīīī īīīīŠīīīī īī īīīīī īī īī īīīīī ī īīīīī īīī īīī īīīī īīīī īīī īīīī ī īī īŦīīīīīīīīī īīī īīīīī īīī īīīīīī īī īīīīīīīī īīīīīīīĢīī īĨīīīīī īīĸī ī īīīīī īīīīī īīīī īŠī ī īī īī īī īī īīī īī īīī īī ī īīī īīī īīīīīŦī ī īīīŦī īīīīīīīīīīīīīīīīīīīīīīīīīīī īī īīīīīīī īīīīīīīīīīŠī īīī īī īŦīīīīĢīīī ī īĩīĢīĩīĢīĩīīŊī īī īīīīīīīīīīīšīīī¯īīī īīīīīī īīīīīīī īŠī ī īī īīīīī īī īīīī īŠīīī¯ī īī īīī īīī īīīīīīīīīī ī īīīīī īīī ī īīīīīīīīŠīī ī īīīīīīī īīĸī īīīīīī īīīī īīīīīīī ī īŠīīī īīī ī īīīī īīīīīī īī īīī īīī īī ī§īīīī īīīīīīīīīīīīīīī īīīīīīīĸī īīīīīīī īīīīīī ī§īīīī īīīīīīīĸī īšīīī¯īīī īīīīīīīĸī īīīīīŊī īī īīīīīīīīīīīīīĢīī ī īĄīīī īīī īīīī īīīīī ī īīīīīīīī īīĸī īīīī īīī ī īīīīīīī īī īīī īŠīīī¯īīī īīīī īī īī īīīīīīĸīī īīīīīīīīīīīīīŠī īīīīīīīī īī īīīīī īīīīīīīīīīīīīīĢīī ī īīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīī īīīī īīī īīīĄīī īīīĸī īī īīīīīīīīīī īīīŖī¤īĨīĻī§īī¤īīĻī īīī īīīīī īīīīīīīīī¨īī īī ī īĩīĢīĩīĢī¨īī īīīī īīīīĨīīīīīī īīīīīīīīīīī īīī īīīīīīīīŠī īīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īī īīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīī īīīīīīīīīīīīīīīī īīīīīī īīīŠīīīīī ī īĻīī ī§ī īīīīīī īīī īīīīīīīīīī īīīīīīīīīīīīī īīī īī īī īīīīīī īīī īīīīī īīī ī īīŊī ī§ī īīīīīī īīīĢīīīīī īīīīīīīīīīīīīīŠī īī˛ī īī īˇī īĨīīīīīīīī īĢīīīīīīīī īīīīīīīīīīīīīīīĢīīīīīīīīĢīīīĢīī¯ī ī īīī īīīīīīīīīīīīīīīīīīī īīŦīīīīīīīīīīīīīīīīīīīīĸīīīīīīīīīīīīīīīīīīīīŠī ī īīīīīī īī īīīīīīīī īīīīī īīīīīīīīīīī īīī ī īīīīīīī¸īīīīīīĢī ī īīī īīīīī īīī īīī īīīīī īīīīīīī īīī īīī īīīīīīīīī ī īīīīī īīīīīīīīīīīīīī īīī īī īīī īīī īīīīŦīīī ī īī īīīīī īīīīīīīīīīīī īīīīīī īĢī ī īĩīĢīĩīĢīžīīīīīīīī īīīīī īī īŖīīī īī īīī ī īīī ī īīī īīī ī īīīīī īīīīīīĸī īīīīīī īīī īī īī īī īīīī īīīīī īīī īīīīī īīīīīīīīī ī īīīīī īīī īī īīī īī īīīīīīīīĸī īīī īī īīīīī īīī īī īīī īī īīī ī ī īīīīī īīīīī īīīīī ī īīīīīīīŠī īīīīīīī īīīīŠīīīīīīīīīīīĸīīīīīīīīīīīīīīī īīĻīīī īīī īīĢīī ī īīīīī īī īī īīīī ī īīī ī ī īąīīīīīī ī īīī īīīī īī īīīīīī īīīīīīīīīīīīĸī īīīīī īīī īīī īīīīīī īīīīīīīīīīīīīīīīīīīīīīī īīīīīĸīīīīīī īīīīīīīēīīīī īīģīīīī īīīīī īī īīīīīīīīīīīī īīīīīī ī īīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīĢīīī ī ī īīīīīīīīīī īīīīīīīīīīīīīīīīŦīīī īīīīīīī īīī īīī īīīīī¯īīŠīīīī īīīīīīīīīī īīīīīīī īīīīīīī īīīīīīīī īīīīī ī īīīīīīīīīīī¯īĢīīī ī ī īīī īīī īąīīīīī īīīīīīīīīīīīīīīīī īīī īīīīīīīīīīī īīīīī īī ī īˇī īīīī īīīīīīīīīīīīīīīīĢīīīīīīīīĢīīīĢīī¯ī ī īˇī īī īīīīīīīīīīīīīīīīīīīīīīīīĢīīīīīīīīĢīīīĢīī¯ī ī īˇī īīīīīīīīīīīīīīīīīĢīīīīīīīīĢīīīĢīī¯ī ī īˇī īīīīīīīīīīīīīīīīīīīĢīīīīīīīīĢīīīĢīī¯ī ī īīī īīīīīīīīīīī īŧīīīī īīīīī īīīī īīīīī īīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīī īī ī īīīī īīīīīīīīīī īīī īīīīīīŠī īī īąīīīī īīīīīĸīīīīīī īīīīīŠīī īīŠīīĸī īīī īīī īī īīīī īīīŠīīīīĢī ī īīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīī īīīī īīī īīīĄīī īīīĸī īī īīīīīīīīīī īīīŖī¤īĨīĻī§īī¤īīĻī īīī īīīīī īīīīīīīīī¨īī īī ī īĩīĢīĩīĢīīī īīīīīīīī īīīīŦīīīīīī īīīīīī īīīīīīīīī īīīīī īŠī ī īī īī īīī īīīī ī īīīī īīī īī īī īī īīīīī īī īīī īīīŦī ī īī īŠīīīīī īīī īī ī īī īīī īī īīī īīīī īī īī īīŦī īīīīīīīīī ī īīīīīĢī ī ī īīīīīīīī īīīīī īŠī īīī īīīīīīīī īīī ī īīīī īīīīī īīīīīīīī īīīīīīīŠī ī īīī īīī īī īīīīīīīīīī īīīŊī ī§ī īīīīīī īīī īīīīī īīī īīīīī īīī ī īīīīīīīīĸī īīī īīī īī īī īīīīīīīīīī īīī īīīīīī īīīīīīīī¯īīī īīīīīīīŠīīīīīī īīīīīīīīīī īąīīīīīīīī īīīīīī ī īīīī īīī īīīīī ī īī ī īīīīīīī īīīīīīīīī īī īīŦī īī īīīīīĢī ī ī īī īīīī īīĸī ī īīīīī īīīīīīīīī īīīī īŠī ī īīīŦī īī īīī īīīī˛ī īīīīīī ī īīĸī īīīīīīīīīīīīĸī īīī īīīī īī īīīīīŦīīīīīīī īīīīīīīīī īī īīī īīīīīīīī īī īīīīīī īīīī īīīī īīī īīī ī īīīīīīīī°īī īŠīīīīī īīīĢī ī īĻīī īīī īī ī īīīī īīĸī īīī ī īīīīīīīī īīīīī īīīīīīī īī īī īīīīīīīīīī īīī ī īī īīīīīīīī īīī īīīī˛ī īīīīīī ī ī īīīīīīī īīī īīī īīīīīīīīīīīīīīī īīīīīīīīīīīīī īĢī īī īĩīĢīĩīĢīīī īīīīīīīīī īīīīīīīīīī īļīī īī īī īīī īī īī īīŦī īī īīī ī īīīīīīīīĸī īīī īīīī īīī īī īī ī īīīīī īīīī īīī īīī īīīīīīīīīīī īī īīīīīīī īī īīīī īīīīīī īī īī īīīīīĸī īīī ī īīīīīīīī īīīīī īīīīīŠīī ī īīī īīīī īī°īīīīīī īīīīīīīīī īīīīīīīīīīŠīīīīīīīīīīīīīīīīī īĸīīīīīīŠīīīīīīīī ī īīīīīīīīĸīīīīīīīīīī īīīī īīīīīĢīīīīī īīīīīīīīīīīīīīīī īīīīīīīŠīīīīīīīīī īīī īŠīīīī¯ī īīī ī īīīīīīīī īīīīī īī īī īīŦīīīī ī īīīīīĸī īīīī īīīī īīīīīīīī ī īīī īīīīīīīīīīīŠīīīīīī īīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīī īīĸīīīīīī īī īīīīīīīīīīī˛īī īīīīīī īīīīīīīīīīī īīī īīī īīī īīīīīīī īīī īīīī īīīīīīīīīīīīī īī ī īīīīīī īīīŠīīīīī īīīīīīīīīĢī ī ī īĩīĢīĩīĢīīīīīīīīī īīīīīīīī ī īī īīīīī īīī īīī ī ī īīīīī īī īīŦīīī īĸī ī īīīīī īīīīīīī ī īīīī īŠī ī īīīīŦīīī īī īīī īīīīīīīīīī īīŦī īīīīīīīīīī īīīī īŦīīī īīĢīīīīī īī īīīīīīīīīīīīīīīīīīīī īīīī¸ī ī īīīīī īŠī ī īīīīīī īī īīī īīīīī īīī īī īīīīīīŠīī ī īīīī ī īīīī ī īīīīīī ī īĸī īīī īīī ī īī īī īīīīīīīīīī īīī īīī ī īĻīī īŋīīīīī īīĢī ī īīīīīīī ī īīīīīīī īīīī īŦīīīī īŠīī ī īīīīīī ī īīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīĢī ī
īĩīĢī¨īīīīīīīŠīīī īīī īīīīīīī
īīī ī īīīīīīīīīī īīīīīīīī īīīīīī īīīīīīīīīī ī īīīīīī īīīīŠīī ī īīī ī īīī īīī ī īīīīīīīīī ī ī īīīīīīīīīī īīĢīīīīīīīīīīīīīīīīīīīī īąīīīīīīīŦī īĸīīŠīīīīīīīīīīīīī īīīīīīīīīŦīīī īīīīīīīī ī īīī īī īī īī īīī ī īīīī īīīī īī īīī īīīīīŦīīīī īī īīīīī īīī ī īī ī īī īī īīīīīī īīīīŠīī īĢī ī īīī ī īīī īīīīīīīīīīīīī īīīī īīīīīīīīīī īī īīīīīīīīīī īīīīīī īīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīī īīīī īīī īīīĄīī īīīĸī īī īīīīīīīīīī īīīŖī¤īĨīĻī§īī¤īīĻī īīī īīīīī īīīīīīīīī¨īī īī ī īˇī īī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīī īīīīīīīīīīŠīī īīīīīīĢī ī īˇī ī īīī īīī īīīīīī īī īīī īī°īī ī īīīīī īīīīīīīī īīīīīīīī ī īģī īīī ī ī¯īīīīī īīī ī īīī īī īīīīīīīīī īīī īīīīī īīī īī ī˛ī īīīīīī īīīīīīī īīīīī īīīīīī īīī ī īąīīī īī ī īīīīīīīīīīīī īīĸīīīīīšīģīīīī īīīīīīīŦīīīīīīīīīīīīīīī īąī īīīīīŦī īīīīīīīī īīīīī īīīī īīī īīīŦī īīīīīīīīīīĸī īīī īīģī īīī īī īīīīī īīīī īīī īīīīīīīīīī īī īī īīīīīīīīī īīī īīī ī ī īīīīīī ī ī°īīīīīīīīīīīīŠīīī īīīīīīīŠīīīīīī īīĢī ī īˇī īī īīī īīīī ī īīīīīī īīīīī īīīī īīīīī ī ī īīŠīīīīīīīī īīīĸī īīīīīī ī īīī īī īīīīīīīīīĸīīīīīīīī īīīīīīīīīīīīī īīīīīīīīīĢīīī ī īˇī ī§īīīī īīīīīī ī īī īīīīīīīīīĸī īīīīīīīīīīīīīīīĸī īŦīīīīīīīīīĸī īī īąīīīīĸī īīīīīīīĸī īīŠīīīīŦī īĸī īīīī īĸī īīīīīīīīīīĸī īīīīīīīīīĸī īīīīīīīīīīĸī īīīī īīī īīīīīĸī īīŠīīī īī ī īīī īīīī īīīīī īīīīīīīīīīīīīī īīī īīīīī īīīīīīī īīīīĢīīī ī īˇī īī īīīī īīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīī īīīīī¯īīīīī īī īīŦīīīīīī īīīīīī īīī īīī ī īī īīīīīīī ī īīīī¯īīīīī īĢī ī īīīīī īīīīīīī īī īī īīīīīī ī īīīīīī īīīīī īīī ī īīīī īīīīīīīīīīīīīīīīīīīīīīīĸīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīŦī īīīīīī īīīīī īīīīīīīīīīīī¯īīīīīīīīīīīī īī īĢī ī īˇī īŋīī¯ī īīīīīīīīī īīīīīīī īīīīīīīīīīīīīīīīīīīīī īīŦīīī īīĢī ī īˇī ī īīī īīīīīīīīīīī īīīīīīī īīīīīīī īīīī īīīīīīīīīīīīī īīīīī īīīīīīī īīī īīĢī ī īˇī īī īīīīīīīīĸīīīīīīīīīīīīīīīĸīīīīīīīīī īīī īīīĸīīīīīīīīīīīīīīīī īī īīĢī ī īˇī ī īīīīīīīīī īīīīī īīī īī īīī īīī ī īīīīīīīī°īī īīīīīŠīīīīīī īīĸī īŠīīīīī īīī īīīīīīīī īīĸīīīīīīīīīī īīĸīīīīīīīīīĸīīīīīīīīīīī īīĢī ī īˇī īīīīīīīīīīīī˛īīīīīīīī˛īī īīīī īīīŠīīīīī īīīĢī ī īīī ī īīīīīīīī īīīī īīī¯ī ī īīī īīī īīī īī īīīīī īīīī īīīīī īīīī ī īŦīīīīīīīīīī īīī īīīīī īīīīīīīĸīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīŠīī īīīīīīĢī
ī ī ī ī
īīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīī īīīī īīī īīīĄīī īīīĸī īī īīīīīīīīīī īīīŖī¤īĨīĻī§īī¤īīĻī īīī īīīīī īīīŗīīīīīī¨īī īī ī īĩīĢī¨īĢīīī§īīīīīī īī¯īīī ī ī§īīīīīīīīīī īīŦī īīīī īīī īīīīī¯īīīīīīīīīīŠī īīīīīīīīīīĢīīīŖīīī īīīīīīīīīīīīīī īīīīīī īīīīīīīīīīīŠīīīīīīī īīīīīīīīīīīīīīīī īīīīīīīĢīīīĨīīīīīīīīīī īīīīīĸīī īīīīī īīīī īīīīīīīīīīīīīīīīīīīīī īīī īīīīīīī īīīīīīīīī°īīīīīīīīīīīīīīīīīīīīīīĢīīī ī īĄīīīīīīīīī¸ī īīī īīīīīīīīīīīīīīīīīīīīīīīīĸīīīīīīīī īīīīīīīīīīīīī īīīīī īĸī īīī ī īąīī īīīīī ī īīīīī īīīīīīīīī īīīī īīī ī īīīīīīī ī īīī īīīŦīīīī īīīīī īīīīī ī īąīī īīīīī īīī īīīīīīīī īīīīī īīī īīī īīīīīīŠīīī īīĢī ī īĻīī īī īīī īī īī ī īīī īīīī īīī īīī īīīīīīīīīīīī īīīīī ī īąīī īīīīī īīīīī īīī īēīīīīī īīī īīīīī īīīī ī īīī īīīīī ī īīīīŦī īīīīīģīĸī īīīīī īīī īī īīīīīīī īīīīīīī īīīī īīī īī īī īīīī īīŦīīīīī īīīīī īī īīīīī ī īīīīīīīī īīī ī īīīīī īīī īī īī īīīīīīī īīīīīīīī īīī īīīī īīīīī ī īī īīīŦīīīī īīī īīīīīīīīīīīīīīīīīī īīīĢī ī īīī ī īīīīīīīī īīīī ī īīīīīī īīīīī īīīīī īīī īŦī īīīīīī īī īīīīīŧīī īī īīī īīīīī īīī īīīīīīīī īī īī¯īīī ī īīī īīīīīīī īīīīīī īīīīī īīī īīī ī īīīīīī īīīīī īīī īīī īīĻīīīŋīīīīī īīĢī ī īĩīĢī¨īĢīīīī īīīīīīīīīīī īīīīīīīī īīīīīīīīīīī īīī īī īī ī īīīīīī īīīīī īī īīī īīīīīīī īī īīīīī īīīīī īīīīīīīīīīīīīī ī īīīīīī īīīīīīī īīīī īīīīīīīī īīīīīīīī īīīī īīī ī īąīī īīīīŦī ī īīīī ī īīī¸ī īĢī ī īīī ī īīīīīīīī īī īīīīīīīī īīī¸ī ī īīī īīīīī ī īīīīīīīī īīīī īīīī īīī ī īīī¸ī ī īīīī īŠī ī īīīīīī īīīīīīīīīīī īīīīīīīī īĢīī ī īīī ī īīī īī īīī īīīīīī īī īīī¯ī īī īīī īī īīīīīī¸ī ī īīī ī īīīīīīīŦī ī ī īīī īīī īīī īīīīī ī ī īīīīī īīīīīīīī īīīī īīī īī īī īīī īīī īīīīīīīī ī īī īīīīī īīīīĸī īīīī īīī ī īī īīīīīīīīīīī īīīī īīīīīīīīīīī īīīīī īīīīīīīīī īīīīīīīīī īīī īīīīīĢī
ī īĩīĢīžīī īīīīīīīŠīīīīīīīīīīŖīīī īīīīīīīīī īī
īīīīī īīīīīī īīī īīī īīīīī īīī īīī ī īīīīīīīī°īī īīīī īīīŦī ī īī īī īīī īī īīīīīīī īīīīīīī īīĢīī īŖīīī īī īīīīīīī īīīīīī īīīīīī īīī īīī ī īīīīīīīīīīŦī īī īīīīīīīīīīīīīīīī īīīīīīī īīī īīīīīīīī īīīīīīīīīŠīī īīīīīīīī īīīīīīīīīīŠī īīī īŦīī īī īīīīīīī ī īī īīĢī
ī
ī¨īĢīīīīīīīīī īī īīī ī
īīīīī īīīīīīī īīīīī īŠī ī ī īīīīīī īī īŠīī īīī ī īĻīī īŋīīīīī īī īīīī´īīī ī īąī īīīīīŦī ī īī īīīĢīī īīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīĸīīīīīīīīīīīīīīīīīī īīīīīī īīīīīīĸī īīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīī īīīī īīī īīīĄīī īīīĸī īī īīīīīīīīīī īīīŖī¤īĨīĻī§īī¤īīĻī īīī īīīīī īīīĩīīīīīī¨īī īī ī īī īīīīīīīīīī īīī īīīī īīīĸī īīī īīīī ī īī īŦī īī ī īī īīīīīī īī īīī īīī īīīī īīīīīīīīīī īī īīīīīīīīīī īīī ī īīīīīīī īīīĢī ī īļīī īī ī īīīī īīīī īīīīīŦīīīī īī īīī ī īīīīī īīī īīĸī īīī ī īīīīīīīī īīīī īī īīīīī īīīīī īīīīīŦīīīī īī īīī īīī ī īīīīīīīīŠīī ī īīīīīīīīīī īīĢī īīĻīī īīīī īīīīŦīīīīīī īīī īīīīī īīīīīīī īīī īīīīīī īīī īŠī ī īīī īīīīīī īīŠīī ī īīī īŦīīīī īī īīīī īīīī īī īīīīīĸī īīīīī īīīŦīīīīīīīīīī īīīīī īīīī īīīī īīī īīīī īī īīīīīīīī īīīīŦīīīīīīīĸī īīīīīī īīīīīīī īīīīīīīīīīīīī īĢī
ī īžīĢīīī§ī īīīīīīīīīī ī
ī īīīīīŊī īīīīīī īīīī īīī īīīīīīīīīīīīīīīīīīīīī īīīīīīīīī īī īī īīīīī īīīī īīīīīī ī īīī īīīīīī ī īīīī īī īīīī īīī ī īīīīī īīī īī īī īīīīīī īīīīī īīīĢī ī īŖīīī īī īīī īī īŠīī ī īīīīīī ī īī īīīī īīīīīīīīī īīīŦī ī īīīī īīī īīīī īīīīī īīīī īīī ī īąīī īīī īī īī īīīīīīīī īīīī īĸīīīīīīīīīīīīī īīī īīīīīīīīī īīīīīŠīī īīī īĢī ī īī īīīīīīīīī ī ī ī īīīī īīīīī īī īī īĒī§īīīīīīī īī īīīīīīīīī īĢīĒī ī ī ī īīīī ī īīīīī īīīīīīīīī īīī ī īīī īīīīīī īīī īīī ī īīīīīīĸī īīīīī īīī īī īīīīīīīī īīī īī īīīīīĢī ī īŖīīī īī īīī īī īīī īīī¤ī īīīīī īīīīīīīīīīīīīīīī īī īīīīīīī īīīīŠīīīīīīīīīīīīīīīīī īīī īīīī īī īīīīīīĢī ī ī§īīīī īī īī¯īīī ī ī ī īīīī īīīīī īī ī§īīīī īīīīīĸī īīīīī īī īī¯īīī ī īī īī īīī īīī īīīīī īīī īīīī īīī īīīīīīīīīīī īīīīīīīīīīīīīīīīī īī īīīīīīīīīīīīīīīīīīīīīīīīīī īīīīī īīī īīīŦī īī īīīīī īīī ī īī īīīīī¯ī īīī īīīīīīī īī īīīīī īīīĢī ī ī ī§īīīī īī īī¯īīī ī īīī īīīī īīīī īī īīīīīīīīīīīīīīīīīī īīīī īīīīīīīŦī īīī īīīīŠīīīīī īīīīīīīīīīīīīīīīī īīīīīīīĢī ī īīīīīīīīīīīīīīīīīī īī īīīīīīīīīīīīīĸīī īīīīīīī īī īīīīīīī īī īīīīīīīīīī īīī īīīīīīīīīīī īī īīīīīīīīīīīīīīīī īīīīŠī īīī ī īīīī īīīīī¯ī īīīīīīīīī īīīīī īīīĸīī īīīī īī īīīīīīīīī īīīīīīīīīīīīŠī īīī ī īīīīīīīīīī īīĢī ī īīīīīīīīīīī ī īīī ī īīīīī īīī īīī ī īīīīīīīī īīīīī īīīīī īīī īīīīīīīīīī īīī īīīīī īīī īīī īīīīīī īīīīīīŠīī ī īīīī īī īīīī ī īīīīīīīī īīī ī ī¯ī īīĢī ī īĄīī īī īīī īīīīī īīī īīīīī īīīīīīī īīīīīīīīīīīīīīīīīīīīī īīīīīī īīĢī ī īŋīīŠīīī ī ī§ī īŦīīī ī ī ī ī īīīīīīŠīī ī īī īŦīīī ī īīīīī īīīī īŠī ī īīī īī īīīī īī īīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīī īĢīīīīąīīīīī īīīīī īīī§ī īīīīīīīīīīīīīīī īīĢī ī ī ī īīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīī īīīī īīī īīīĄīī īīīĸī īī īīīīīīīīīī īīīŖī¤īĨīĻī§īī¤īīĻī īīī īīīīī īīī¨īīīīīī¨īī īī ī īīīīīīīīīīī īīī īŧīī īīī īīīīīīīīīīīī īīīīīīīīīīīīīī īīīīīīīīīī īīīīīīī īīīīīī īīīīī īīīīīī īĸīīīīīīīī īīĸīīī īīīīī¯īĸīīīīīīīī īīīī īŦīīī īĢīīī īīīīī¯īīīīīīīīīīīīīīīīīīīī īīīī īīīīīīīī īĢī īīīīī ī īĄīīīīīīīīī īī īŠīīī¯ī ī īīīīīĢī ī īīīīī īīīī īī īīīīīīī īī īīīŦī īīīīī īī īīīīĸī īŠīīī īīīī īīīīīīī ī īīīīīīī īĸī īīīī¯īī īīī īīīī īīī īī īī īŠīīīī īīĸī īīī īīīī īī īīīīīīīīīī īīī īīŠīī īīīīīīīŠīī īīīīīī īīīĢī ī īīīīīīīīīī īīī īīīīŠīīī īīī īī īīīīī īīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīĸīīīīīī īīīīī§ī īīīīīīīīīīīīīīīī īīīīīĢī ī īīīīīĨīīīīīīī īīīī īīīīīīīīīīīī īīī īīīīīīīīīīīī īīīīīīīīīīīīīīī īīīīīīīīīīīīī¸ī īī īīīī īī īīīīīīī īīīī īīīīīī īīī ī īīī īī īīīīĸī īīīī īīīī īīīīīī īīī ī īīī īī ī¯īīīīīĢīī īīąīīīīī īī īīī ī īīīīīī īīīīīīĸī īīī¯ī īīīĸī īīī īŠīīīī īīīīīīĸī īīī īīīīŠīīīīīīīī īīīīī īī īīīīīīīīīĢī ī
īīĢīīīŊī īŦīīīīīīīīīīīīīī ī
īŊī īŦīīīīīīīīĢīīĸīīīī´īīī´īīīīīīīŊīī
īīīīīīīīīīīīī
īīīīīīī īīīīī
Spicerhaart Group Ltd Encryption Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 1 of 4
Spicerhaart Group Ltd, including all subsidiary companies, is hereinafter referred to as "the company."
1.0 Overview Encryption, also known as cryptography, can be used to secure data while it is stored or being transmitted. It is a powerful tool when applied and managed correctly. As the amount of data the company must store digitally increases, the use of encryption must be defined and consistently implemented in order ensure that the security potential of this technology is realized.
2.0 Purpose The purpose of this policy is to outline the company's standards for use of encryption technology so that it is used securely and managed appropriately. Many policies touch on encryption of data so this policy does not cover what data is to be encrypted, but rather how encryption is to be implemented and controlled.
3.0 Scope This policy covers all data stored on or transmitted across corporate systems.
4.0 Policy 4.1 Applicability of Encryption 1. Data while stored. This includes any data located on company-owned or company-provided systems, devices, media, etc. Examples of encryption options for stored data include: âĸ
Whole disk encryption .
âĸ
Encryption of partitions/files.
âĸ
Encryption of disk drives.
Encryption Policy
Confidential
Spicerhaart Group Ltd Encryption Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 2 of 4
âĸ
Encryption of personal storage media/USB drives .
âĸ
Encryption of backups.
âĸ
Encryption of data generated by applications.
2. Data while transmitted. This includes any data sent across the company network, or any data sent to or from a company-owned or company-provided system. Types of transmitted data that can be encrypted include: âĸ
VPN tunnels.
âĸ
Remote access sessions.
âĸ
Web applications.
âĸ
Email and email attachments.
âĸ
Remote desktop access.
âĸ
Communications with applications/databases.
4.2 Encryption Key Management Key management is critical to the success of an implementation of encryption technology. The following guidelines apply to the company's encryption keys and key management: âĸ Management of keys must ensure that data is available for decryption when needed. âĸ
Keys must be backed up.
âĸ
Keys must be locked up.
âĸ
Keys must never be transmitted in clear text.
âĸ
Keys are confidential data.
Encryption Policy
Confidential
Spicerhaart Group Ltd Encryption Policy Section of: Corporate Security Policies CONFIDENTIAL
âĸ
Created: July 2010 Target Audience: Technical Page 3 of 4
Keys must not be shared.
âĸ Physical key generation materials must be destroyed within 5 business days. âĸ Keys must be used and changed in accordance with the password policy. âĸ When user encryption is employed, minimum key length is 10 characters.
4.3 Acceptable Encryption Algorithms Only the strongest types of generally-accepted, non-proprietary encryption algorithms are allowed, such as AES or 3DES. Acceptable algorithms should be re-evaluated as encryption technology changes. Use of proprietary encryption is specifically forbidden since it has not been subjected to public inspection and its security cannot be assured.
4.4 Legal Use Some governments have regulations applying to the use and import/export of encryption technology. The company must conform with encryption regulations of the local or applicable government. The company specifically forbids the use of encryption to hide illegal, immoral, or unethical acts. Anyone doing so is in violation of this policy and will face immediate consequences per the Enforcement section of this document.
4.5 Applicability of Other Policies This document is part of the company's cohesive set of security policies. Other policies may apply to the topics covered in this document and as such the applicable policies should be reviewed as needed.
5.0 Enforcement This policy will be enforced by the IT Manager and/or Executive Team. Violations may result in disciplinary action, which may include suspension, restriction of access, or more severe penalties up to and including
Encryption Policy
Confidential
Spicerhaart Group Ltd Encryption Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 4 of 4
termination of employment. Where illegal activities or theft of company property (physical or intellectual) are suspected, the company may report such activities to the applicable authorities.
6.0 Definitions Encryption The process of encoding data with an algorithm so that it is unintelligible without the key. Used to protect data during transmission or while stored. Encryption Key An alphanumeric series of characters that enables data to be encrypted and decrypted. Mobile Storage Media A data storage device that utilizes flash memory to store data. Often called a USB drive, flash drive, or thumb drive. Password A sequence of characters that is used to authenticate a user to a file, computer, or network. Also known as a passphrase or passcode. Remote Access The act of communicating with a computer or network from an off-site location. Often performed by home-based or traveling users to access documents, email, or other resources at a main site. Remote Desktop Access Remote control software that allows users to connect to, interact with, and control a computer over the Internet just as if they were sitting in front of that computer. Virtual Private Network (VPN) A secure network implemented over an insecure medium, created by using encrypted tunnels for communication between endpoints. Whole Disk Encryption A method of encryption that encrypts all data on a particular drive or volume, including swap space and temporary files.
7.0 Revision History Revision 2.0, 22/07/2010 SRL
Encryption Policy
Confidential
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīī īīīīīīī īīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīī īĄīĸīŖī¤ī īīĸīīīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīīīīīīĨīī ī
īīīīī īīīīīīī īīīīīī īīīīĻī īīīīīīīīīī īīīī īīī§īīīīīīīī īīī¨īīīīī īīĻī īīī īī īī īīīīīī īī īī īī īīī īīīīīīīīīŠīīī īīīī¨īīīīīĒīŠī ī
īīĒīīīīĢī īīĢīī īŦī ī
īīī īīīīīīī īīīīīīīīī īīīī¨īīīīīīīīī īīŦīīīŽīīīīīīīī īīīī īī īīīīīīīīīīīīīīīī¨ī īīīĻī īīīīīīīīīīīīĻī īīī īĢī īīīīīī īŦīīī īīī ī īĢīīīīīīīī īīī ī īīī¨īīīīīīī īīīīīī īīĒī ī īīīīī īīīī ī§ī ī īīī¨īīīī īīī īīī ī īīīī¨ī īīī īīīī§īīīīī īĸīīī īīī īī īīīī īīīĻī īīī īīī ī īīī īīī ī¨īīī īī ī¯īīīī ī īīīī īīī īīī īīī īīīīīī īī īīīīīī īī īīī īīī ī īīī¨īīīīīīī īī īīŦīīīŽīĒī ī īīī īīī īīīī īīīīīīīīī īīīī¨īīīīīīīīī īīŦīīīŽīī¨īīīīī§ī īīīīīīīīīīīīīīīīīī īīĒī
ī īīĒīīīīīīīīī ī ī
īīī īīīī¨īīīīīī¨īīīīŦīīīīīīīīīīīĢīīī īīī īīŦīīīŽīīīīī īīīīīīīīīīīīīī īīīīīīīīī īīīī īŦīīīīīīī īīī īīīī īīī īīī ī īĸīīī īīī īīĻī īīī ī§īī īī īī īīīīīī īīī īĢīīīīīīīī īŦīīīī īī ī§īīīīī īīī īī ī īī īīī īīīī īīī īīī ī īīī¨īīīīīīī īī īīīīīī īīĒī ī īīīīī īīīīīīī īīīīīīī īī īīī ī īīī¨īīīīīīīīīīīī īīīī īīīīīīīī īīīīīīīīīī īīīīīīī īīīĒī
ī īĨīĒīīīīīīī ī ī
īīī ī īīīīī ī īīī īīīīī īīīīīīī īīīīīīī īī īīīī īĢīīīīīīī īīī īīī ī īīī¨īīīīī īŦīīīīīīī īīī īīīī īīīīīī īīī īīŦīīīŽīīīīīĸīīī īīī īīīīīīīīīīīīī īīīī¨īīīīīīīīīīīīīīīīīīīīī īĻīīīīī īīīĢī īīī ī§īīīī īŦīīī īī īīīī īŦīīī īī īīī īīīīī īīīīīīīĒī ī īīīīī īīīīī ī ī ī°īīīīī īī īīī īīīī īīīī īīīīīīīŦīīī īī īīīī§īīīīī§īīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīī īīīīīīīīīīīīī īī īīīīīīīīīīīīīīīīŦīī īī īīīī īīīīīīīīīīīī īīīīīīīīīīĢī īīī īīīī īīīī¨īīīīīīīīī īīŦīīīŽīĒīī
ī īąīĒīīīīīīīīī ī
īąīĒīīīīīīīīīīīīīī īīīīīīī īīī
īīī īīīīīīī īīīīŦīīīīī§ī īīīīīĢīīī īīīīīīīīīīī ī˛ī§īī˛īīīī īī§īīīīīīīīīīīīīī īīīīīīŦīīī īīīī īī ī¨īīīīīīīī ī īī īī īīīīīī§īī ī ī§īīīīī īīī īī ī īī īīī īīīī īīī īīī ī īī īīŦīīīŽīĻī īīī īīīī īīīīīī īīĸīīī īīī īīīīīī¨īīīī īīīī¨īīīīīīī īīŦīīīŽīĒīīī
ī
īīī īīīīīīī īīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīī īīīīīīī īīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīī īĄīĸīŖī¤ī īīĸīīīī īī
ī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīīīīīīĨīī ī
īąīĒīīĒīīīīŗīīīīīī īīīīīī ī īīī īīīī ī¨īīīī īīīī ī ī īīī īīīī īīīīī īīī ī īīī¨īīīīīīī īīīī īīīī§īī ī īŗīī ī īīīīīīīī´īīŗīīĩīī§ī īīīī īī§ī īīīīīīīīīī īīīīīī īīīĒī ī īąīĒīīĒīīīīīīīīĢīīī īīī īīīīī ī īīīīīīīīīī īīīīŦīīīīī§ī īī īĢīīīīīī īīīīīīīīīīĢīīī īīīīīīīīīīī ī˛ ī§īī˛īīīī ī ī§īīīīīĒī ī īīīīī īīīīīīī īīīĢīīīĢī ī ī¨īīīīī ī¨ī īīī īīīīīīĢīīī īīī īīī ī īī ī¯īī īīīīīīīīīī˛īīīīīīīīīĒī ī īąīĒīīĒīĨīīīīīīīīīīŗīī ī īīī īīīīīīīīīīīīĻīīīīīīīī īī īīĻīīīī īīīīīīīīīī§ī īīīī īīī§īīīīī īīīīĒīīīŗīī īīīīŦīīīī īī īīŦīīīŽī īīīīīīīīī ī¨īīīī īīī ī īīī īīī īīīīīīīīī īīīī īī īīŦīīīŽī īīīī īīīĒīī īīī īīī īīīīīīīīī ī¨īīīī ī§ī ī īī īī īīī īīīī ī īīīī īīī īīī īīīī īīīīīī īīī ī īīī¨īīīīīīīīī īīŦīīīŽīĒīīīīī īīīīīīīīīīīīī¨īīīīīīīĢī īīīī īīīīīīī ī°īīīīīīīīī īīīī īī īīīīī īīīīī īīīī ī īīī īīī ī ī§īīīīī īīī īī ī īī īīīī īīī ī īīīīīĢīīīīīī īīī īīīīī īīīī īīīĒīīīīī īīīīīīīīīī ī°īīīīīīīīīīīīī īīīīīīīīīīīī ī°īī ī īīīīīīīīīīīīīīĒī ī īąīĒīīĒīąīīī īīīīīīīīīīīīī īīīīļīīīīīī īī īīī īīī ī¨īīīīīī īī ī¨īīīī ī§ī ī īīīīīī īī ī§īī īīī ī īĸīī īŖī īīīīī¨ī īīī ī§ī īīīī ī ī§ī īīīīīīīīīŦī īīīīīīīīī īīīīīī īīī īīŦīīīŽīĒīīīīī īīīī¨īīīīīīīīīīīīī īīīīī ī īīīīīīīīīīīīī īī ī īīŦīīīŽīīīīī īīīīīīīīīīīŦīīīīī§ī īīīīī īī īīīīīĻīīŦīīīīīī¨īīī īīīĢīīīĢī īīīīĢīīīīīˇī¨īīīŦīīī īīīīīīīīīīīīīīīī§ī īīīīīīīīīī īīīīīī īīīĒī
īąīĒīīīīī īīīīīīī īīīīĸīīīīīīīīīīīīī īī¸ī ī¯īīīī ī¨ī īīīī
īšī īīīīīīīīīīī īīīīīīīīī īīīīīīīīī īīīīīīī īīīī§ī īīŽī īīīīī īīīīīī īĻīī īīīī īīīīīīīīīīīī īīīīīīīīīīīīīīĻīīīīī¨īīīī īīīīīīīīīī īīī īīŦīīīŽīĻīīīīīī īīīī īīīīīīīĢī īīīīīīīīīīīīīīī īīīī īīīīī ī īīī ī īīī¨ī ī īī¨īīīīī īīī īīīīīīīīī īīī īīī ī īīī¨īīīīīīī ī ī¨īīīīī ī īīĒīī īīīīī ī¨īīīī ī§ī ī īŦī īīīī īīĻī īīīŦī īĢī īīĻī īŦīīīī īīī ī īīīīīī īīīī īī īīīīīīīī īīīīī īī īīīīī īīī¨ī īīŦīīīīīīīīĢīīīīīīīīīīīīī īīīīīīīīīĒīīīīīīīīīīīīī¨ī īīīī īīīī¨īīīīīīīī īīīīīī īīīīĢīīī ī īīīī īīī īīīīīī īī ī¯īīīī ī¨ī īīīī īīīī īīī īīī īīīī īīī īīīīīīīīīīīīīī īĒī ī īīī īīī īīīī īīīīīīīīīīī§ī īīīīīĢīīī īīīīīīī īīīīīīīīīī¨īīīīīīī īīīīīīīīīīīīīīīīī īī īīī īīīīīī īĒī
ī īąīĒīĨīī¸ī īīīīīīīīīīīīīīīīī īīīīīīī īīī
īīī īīī īīīī īīī īŦīīīī ī§ī ī īī īīīīīīī īī īīī īīī ī ī¨īīīī¨īī¨ī īī¨īīīīī īī īī īīīīīīĒīī īŖī īī īīīīīī īīī īīī ī īīī īīī īī ī īīīīī īīīī īīīĻī īīīīī īīīī īīīī īī ī§ī ī īīī¨īīī īī īīī īīī īīīīīīī īīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīī īīīīīīī īīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīī īĄīĸīŖī¤ī īīĸīīīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīĨīīīīīĨīī ī
īīīī§īīīīī īĸīīī īīī īī īīīī īīī īīīīīĒī ī īīī ī īīī¨īīīīī īŦīīīī ī īĢīīīīīī ī īīī ī īī ī īī īīī ī īīīīīīī īīīīīīīīīīīĢīīī īīīīīīī īīīīīī īīīīīīīīī īī īīīīīīī§īīīīī īīīīī ī īīīīīīīīīīīĒī
ī īąīĒīąīīļīīīīīīīīīīīīīīīī īīīīīīī īīī
īīīīī īīīī īīīīīīī īīīīīī ī¨īīīīī ī īīīīīīīī īīīī¨īīīīīīīī īīīīī īīīīīīīīīīīī īī īī īīīīīī īī īīī īīīĒī ī īīī īīīīīĻī īīī ī īīī¨īīīīī īŦīīīī ī¨īīīīīīī īīī īīī īīīī īīī īīī ī īīīīī ī īīīīī īīī ī īīī¨īīīīīīī īīīī īī īīīī īīī ī īīīīī īīī īī īīīī īīī ī īīīī īīīī§īī ī īŗīī ī īīīīīīīīīīī§ī īīīīīīīī īī īīīīīĒī
ī īąīĒīēīīīīīīīīī§īīīīīīīīīīīīī īīīīīīīīī īī
īīīīī īīīīī¨ī īīī īīī īīīīī īīī īīī ī īīī¨īīīīīīī īīīī īīīĢī ī īī īī īīī īī īīīīīīī īīīīīīī īīĒīī īīīī īī īīīīīīī īīī¨īīī īīīīīī īīī īīī ī īīīīīīīīīīĢī īī īīīīīīīīīīīīīīī¨ī īīīīīīī īīī īīīīīīīī īīīīīīīīī§īī īīīīīīīī īīīīīīīīīī§ī īīī īĢīī īŦī īīīīīīī ī īī īīĒī
ī
īēīĒīīī¤īīīīīī ī¨ī īīī ī
īīīīī īīīīīīī īŦīīīī ī§ī ī ī īīīīīī īī ī§īī īīī ī īĸīī īļīīīīī īī īīīīˇīīī ī¤ī°ī īīīīīĢī ī īī īī¨īĒī īģīīīīīīīīīīī¨īīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīĻīīŦīīīīīī¨īīīīīīīīīī īīīīīī īīīīīīĻī īī īīīīīīīīīī īīī īīīī īīīĻī īīī ī¨īīī ī īī īĢī īī ī īī īīīīīī īī īīī īīī īīīī īīīīīīīīīī īī īī¨īīīīīīīī īīī ī ī¨īīīīī¨ī īīīĒī īŧīī īī ī īīīī īīīī īīīīīĢīīīī īī īīī īīī īīī īīī īīī¨īīīīī īīīīī īīīīī´īīīīīīīīīīīīīīīī īīī īīīīīīĩīīīī īīīīīī īīī īīĻīīīī īīīī¨īīīīīī¨īīīīī īīīīī īīīīīīīīīīĢīīīī īīīīīīīī īīīīīīīīī§īī īīīīīīīīīīī īīĒī
ī īŊīĒīīīŖī īīīīīīīīīī ī
īīīīīīīīīīīīīī¨ī§īīīīīīīīīīīīīī īīīī¨ī īīīīīīīīīīŦīīīīīīīīīīīīīīŦīīīīīī īīīīīī īīī¨īīīī īīīīīīī īīŦīīīŽīīī īīīīīī īīĒī ī īīī īīīīīīīĢīīīīīīīīīīīīī īīīī¨īīīīīīīī ī¨īīī īīīŦīīīīīīīīīīīīīī ī¨īīīīī ī īĒī ī
īžīĒīīī¸ī īĢīīīīīīīŋīīīīīīī ī
ī¸ī īĢīīīīīīīīĒīīĻīīīīˇīīžīˇīīīīīīī¸īī
īīī īīīīīīī īīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīī īīīīī īīīīīī īīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīĄīĸīŖīī¤īĨīĸīīī īīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīī īīīī īīī īīīī īīīīīīīīī īīīīī īīīīīīīĻīī ī
īīīīī īīīīīīī īīīīīī īīīī§ī īīīīīīīīīī īīīī īīī¨īīīīīīīī īīīŠīīīīī īī§ī īīī īī īī īīīīīī īī īī īī īīī īīīīīīīīīĒīīī īīīīŠīīīīīĢīĒī ī
īīĢīīīĄīŦī īīŦīī īī ī
ī īīī īīīīīīīīīīīīī īīīīīīīīīīŠī īīīīīŠīīīīīīīīŠīīīīīīŠīīīīīīīīīīīīīīīŽī īīīīīīīīīī īīīī īīī īīī īīī ī īī īīīīīŽī§ī īī īŦīīīīī īīī īīīī īī īŠīīīīīī ī īīīī īīīīīī īīīŠīīīī īīī§ī īīī ī īŦī īī īī īīīīī īī īīīīīīī īīīīīīīīīīī īīīīīīī īīīīīī īīīīīĢī ī ī ī īī īīī¯īīīīīīīī¯īīīī īīīīīī īīīīī īīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīī īīīŦī īīīīīīīŠīīīīīīīīīī īīīĢīī īīīīīīīīīīīīīīīŦī īīīīīīīīīīīīī īīīīīīīīīīŠīīīīīīī īīīīīī īīī īīīīīīīīīīīīīīī īīīīīīīīī īīī īīīīŠīīīīī°īīīīīīīīŠīīīīīīīīīī īīī§īīīīīīīīīīīī īīīīī īīīīīīīīīŽī īīīīīīī īī īŦī īīī īīīīīīīīīīīīīīīīī īīīĢī
ī īīĢīīīīīīīīī ī ī
īīīīīīīīīīīīīīīīīīī īīī īīīīīī īīīīī īīīīīīīīī īīīīŠīīīīīīīīīīī īīīī īīīīīīīīī īīīīīīī īīīīīī īīīīī īī īīīīīīīīīīĢīīīīīīī īīīīīīī īąīīīīīīīīīīīīŠīīīīīīīīīīīīīīīīīīīīīī īīīīīī īīīīī īīī īī§īīīīŦī īīīīīī¨īīīīī īī īīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīī īīīīĢīīīĸīīī ī īīīīīīīīīīīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīŦīīī īīīīīī¨īīīīīīī īīīīīīī īīīīīīīŦīīī ī§īīīīī īīīīīīīīī īīīīī īīīīīīīīīīīŠīīīīī īīīīīīīīīīīīīīī īīīī īīīī īīīīŦī īĢī
ī ī˛īĢīīīīīīī ī ī
īīī ī īīīīī ī īīī īīīīī īīīīīīī īīīŦī īīī īīīī īīīīīīŠīīīīīī īīīī īīī īīīī īī īīī īīīīŦīīī īī ī¨īī īīī ī īīīŠīīīīī§ī īīī īīī īī īīī īī īī īīīī ī īīī īīī ī īīīīīīīīī ī īī īīīīīŽī īīī ī īīī īīī īī īĢī
ī īŗīĢīīīīīīīīī ī
īŗīĢīīīīīī īīīīīīīīīīī īīīī
ī īīī īīīīīīīīīīīīī īīī§ī īīīīīīīī īīīī īīīīīīīī īīīīŠīīīīī°īīīīīīīīŠīīīīīīīīīī īīī§īīīīī īīīŽī īīīī īīīīīīīīīīīīŠīīĢīīīŖīīīīīī īīīīīīīī īīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīī īīīīīī īī īīīī īīīīīīīī īīīīīīī īīīīīīīīīīīī īīīīīī īīīīī īīīīīī īīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīī īīīīī īīīīīī īīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīĄīĸīŖīī¤īĨīĸīīī īīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīī īīīī īīī īīīī īīīīīīīīī īīīīī īīīīīīīĻīī ī
ī ī´ī īĨīī īīīīīīīīīīīīīīīīīī īīīīīīīīīī īīīīīīīīīīīī īīīīīŠīīīīīīīīīīŽī īīīīīīīī īī īīīī īīīīīī īīī ī īī īīīīīŽī īīīī īīīīīīīīīīĩī īīļīŠīīīīīīīīī īīīīīīī īī§ī īīī īī īŦīīīīī īīīī¨īī īīŽī§īīīīīīīīīīī īīī īīīīīīˇīīīīīīīŠīīīīīī īīīīī īīīīīīĢīīī ī ī´ī īīīīīīīīīīī īīīīīīīīīīīīīīī īīīīīīīīīīīīī īīīīīīŦīīīŦī īīīīī īīīīīīīīīīīī īīīīīīīī īīīīīīī§ī īŠīī¨īīī ī īī īŦīīī ī§ī īī¤ī īļīīŠīīīīīīīī ī§ī īīīīīī¨īī ī īīīīīīī ī īī īŦīīī ī§ī īīī īīīī īīīīīīīīīīīīīīīīīīīīīīīīīīŠīīīīīīīīīīīīīīŠīīīīīīīīīīīŠīīīīīīĢī
ī īŗīĢīīīīī īīīīīīīīīī
ī¸īīīŽī īīīī ī īīīīīī īīī īī īī īīīīīīī īīīīīī īīī īīī īīīīīī¨īīī īŠīīī ī īīŠīīīīīīīī īīīīī īīīīŽī īīīī ī īīīī īī īīī īīīīīī īīī īīī īīīīīīŦī īī īīĢī ī īīī ī īŠīīīī īīŠīīīīīīīī īīī īīīīīīīīīīīīīŽī§īīī¨īŦīīīīīīī§īīīīīŠīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīī īīī īŦī īīī īīī īīīŠīīī īīīŠīīī ī īīī īīī ī ī īŦī īīī īīī īīī īīīīīī īīīĢī ī īīīīī īīīīīīī īī īī īīīīīīīī īīīīīī īīīīī īīī īīīī īīīīīī§ī īīīīīīīīīī īī īī īīīīīī īīīīī īŠīī§ī īīīīī īīīīīīīīīī§ī īīīī ī īīīīīīīīīīšī īīīī īīīī¯īī īīīīīīīī īīīīīī īīīīī īīī īīīīī īīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīŠīī¨īīī īīī īŦīīī īīĢī ī ī īīīīīīīīīīīī§ī īīīīīī īīī īīī īīīīīī īīī§ī īīī ī īīīŠīīīīī īŠīīīī ī īīīīī ī īīīīī īīī ī īīīīīīīīīīīīīīīī īīīīīīīīīīī īīīīīī īīī ī ī´ī ī¸īīīīīīīīīīīīīīīīīīŽī īīīī īīīīīīīīīīī īīīīīīīīīīī īīī īīĢī ī ī´ī ī¸īīīīīīīī īīīīīīī¨īī īīīīīīī īīīīīīīīīīīīīīīīīīīīī īīīĢī ī īīī ī īīīŠīīīīī īŠīīīī īīīŦī ī īīīīīīīīīīīī īīīīī īīī īīī īī īīīīīīī īīīŠīīīīī īīīīī īīīī īīī īīīīīī īīī īī īīīīīī ī īī īīŦīīī īī ī¨ī īīīī ī īīīīī īīī īīīīīī īīī īīīīīīī īīī īīīī īī īīīīīī īīīī īīīīī īŠī īīī īīīīīī īīŦīīī īīīīīīīīīīĢīīīīīīīīīīīīī īīīīī īīīīīīīīīīī¯ī īīī īī īīīīīī īīīīī īīēīīīīŽīīīīīŦīīīīī¨īī īīīīīīīīīīīīīīīīī īīīĢī ī īŖīīīīīīī§ī īīī ī īīīŠīīīīī īīīīīīī īī īŦīī īī īīīī īīīīīīīīī īīī īīīŦī īīīŠī īīīīī īī īīīīīīīīīī īīīīī īīīīīīī ī īīīī īīī īŠīīīī īī īīīīīī īīī īī īī īīīīīīī īīīīīī īīī īģīīī īīīīīīīīīī§īīīīīīīīīīīīīīīŠī īīīīīīīŧī§īīīīīī īīīīī īīīīīīīīīīīīīīīī īīīīī īīīīīī ī īīīīīīīīīī īī īīīīīīī īī īīī īīīīīīīīīīĢīīī
ī ī
īīīīīī īīīīī īīīīīī īīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīī īīīīī īīīīīī īīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīĄīĸīŖīī¤īĨīĸīīī īīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīī īīīī īīī īīīī īīīīīīīīī īīīīī īī˛īīīīīĻīī ī
īŗīĢī˛īīīīīīīī īīīīīīīīī
ī īīī īīīīīīŠīīīīīī īī īīīī īī īīī īīī ī īī īīīīīīīī īīī īīīīīīīīī īī īīīīīīī īīīīīī īīī īŠīīīī ī¨ī īīīī īīī īīīīīīīīīīīī īīīīīīīīīīīīŠīīīīīīīīīīīīīīī īīīīīīī īīīīīīīīīīīīīīīīīīīī īīĢīī īīīīīīīīīīīī īīŦī īī¨īīīīīīīīīīīī īīīī īŠīīīīī ī īī°īīī īīīīīīīīīīīģīīīīīīīīīīīī īīīīīīīīī ī īīī īīī ī īīīīī§ī īī īīīīī īīī ī§ī īīī īīīī īī īīīī īīīŧī§ī īīīī īīī īīīīīīīī īīī ī īī īī īīī ī īīī īīīīīīŠīīīīīīīīīīīī īīŠī īīīīīīīīļīīīīīīīīīŠī īīīĢī
ī īŗīĢīŗīīĨīī īīīīīīīīīīīīīī īīīī
ī¸īī īī īīī ī īī īīīīīīīī īīīīīī īīī īīī īīīīī īīī īī§ī īīī ī īīīŠīīīīī°īī īīīīī īīī īīī īī īīīŦī īī īīī īēīīīīŽīīī īīī īīīīīī¨īī ī§ī īīīŠīīī īīī ī īīīŠīīī ī īīīī ī§ī īī īīīī ī īīī ī īī īīīīīŽī§ī īīīī īīī īī īīŦī ī ī īŦīīī īīī ī īīī īīī ī īīīīīī īīīĢī ī īīī ī īīīīīīīīīī īīī īīī īīīīīīīī¨ī īīīīŽī īīīīīīīīī īīī ī īīĢī īŊī īīīī ī īīī īīīīīī īīī īīīīīīī§ī īīī ī īīīŠīīīīī īŠīīīī īīīīŽī īīīī īī īī īīīīīī ī īīī īīīīīī īīīīī īī īēīīīīīīī īī īīī īī īīīīīīī īīīīīīīīīīī īīīīī īīīīīīī īī ī īŠī īīī īīīī īīīī īīīīīīīīīīī¯ī īīīī īąīī īīīīī īĢī ī īīĢī īī īŠīīŦī ī īīī ī īīīŠīīīīŠīīī īī īī īŦīīī ī īīīīŠī īīī ī īī īīīīīŽī ī¨īī īīīīīīīīīīī īīī īīīīī¨īīīīīīī īīīīīŽīīīīīī īīīīīīĢīīī¤īīīīīīīīīī īīīīīīīīīī īīŠīīīīīī īĢī ī ī˛īĢīī¤īīīī¨īī īīīī īīīīŠīīīīŠīīī īīīīīīīīīīģīīŧīīīīīīīīīīīīīīī īĢī ī īŗīĢīīī īīīīīīīī īīīīīīī īīīīīīīīī īīīīīžīīīīī īīīīīīļīīīīīīī¤īīī īīīīīĢī ī īŋīĢīīīīīīīīīīīīīī īīīī īīīī īīīīŠīīīīŠīīī īīīīīīī īŠīĢī ī īīĢīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīīīīīī īŠī īīī īīīīīī īīīīīī īĢīīīīīīīīīī īīīīīīī īīīīīī īīīīīīī īīīīīīīī īīīī īī§īīīīīīī¯īīī¯īīīīīīīīīīīīīīī īī īīŦīīīīīīīīīī īŦīīī īīī ī īīī īīīīīīīīīīĢī ī īīĢīīīī īīī īīīīī īīīīī īīī īŦī īīīīīīīīīīīīŠī īīīīīīī īīīīīīī īīīīīŽī īīīīīīīīīīīīīī īīīīī īīīĢī ī īĻīĢīī¤ī īī īīŠīīī īīīīīīīī īīīīīīīŽī īīīīīīī īīīīīī īīīīīīīīīīīī¨īī īīīīīīīīīī īīīĢī ī īīĢīīī ī¨īīīīīīīī īīīīīī īŠīīīīīīīīī īīīīīīīīīī īĢīī ī īīīīīī īīīīī īīīīīī īīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīī īīīīī īīīīīī īīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīĄīĸīŖīī¤īĨīĸīīī īīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīī īīīī īīī īīīī īīīīīīīīī īīīīī īīŗīīīīīĻīī ī
īīīĢīīī īīīīī īīīīīīī ī īī īīīīīīīīīīīŠīīīī īīīīīīīŽīīīīīīīīīīī¨īīīŽīīīīīīīīīīī īīī īīīīīī īŠīī¨īīīŽīīīīīīī īĢī ī īīīĢī īīīŽī ī īīīīīīīī§ī īīī īīīīīī¨īī ī§ī īīī ī īīīīī ī īīīīī īīī ī īŦīīīī īīī¨īīīīīī īģīīī īīīŠīīīīī īŦīīīī īīī¨īīīīīī īīŧīīīīīīīīīīīī īīīī īīīĢī ī īīīĢī īĸīīīīīī īīīīīīīī¨īī ī īīīīīīīīīī īī īīī īīīīī īīīīīīī īīī īī īīīī īī īīīī īīīīīī¨īī ī ī¨īīī īīīīīīīī īī īŦīīī īīī īīīīīī īīī īīĢī ī īī˛īĢīīī īīī īīīīīīīīī īīīīīīī īīīĢīīī¸īīīīīīīīī¨ī īīī īīīī īīīīīīīīīīīīīīī īīīīīīī īīī īī īīīīīī ī īī īīŠī īī īīīīīŠīī ī ī¸īīī īīī ī īīīīīīī īīī īēīīīī īī ī ī¸īīīī īīīīīī ī¨ī ī īīīī īīīīīī īī īīīīīī ī īīŗīĢī īī īīīīīŠī īī īŦīīīī īīī¨īīīīīī īīīī īīīŠī īīī īīī īī īīīī īīī īīīīī īīīī īīīī īī īŦīīīī īīī¨īīīīīī īīī¨ī īīīī īīīī īīīīīīī¨ī īī īąīīīīīī īīĢī
ī īŗīĢīŋīīīīīīīīīīīīīīīī īīīī
īīīīīīīīī īī īīīīīīī īīīīīī īīīī īīī ī īīīīīī īīīīīī§ī īīīīī ī īīīī īī īīī ī īīīīī īīīīīīīī īīīīīīīīīī¨ī īīīīŽī īīīīīīŠīīīīīīī īīīī īīīīīīī īīīīŠīīīīī¨ī īīīīī īīīīīīīŦīīīī īĢīīīīīīī īŠīīŽī īī īīī īīīīīīīīī īīīīīīīīīĢī ī īĄīī ī īīī īīī ī ī¨ī īīī īīīīī īīī īīī īīīī ī īīī īīī īŠīīīīīī ī īīī ī īīī ī īīī ī īīīīīīīīīī īīī īī īīīī ī īīīīī īīī īŠīī¨īīī ī īī īŦīīī īīĢīī ī īīīīīīī¨īī ī īīīīīī īī§ī īīīīī īīī īīīīī ī īīīŦī īīīīī ī īīīīīīīīīī īīīī īīīīīīī īīīīīī īīīīī§īīīīīīīīī¨ī īīī īŦīī īī īīĢī ī īīīīīīīīī īī īīīīīīī īīīīīī īīīī īīī ī īŠīīīī īīīŽī īīī īīī ī īī īīīīī īīī īī īīīīīīŠī īīī īīī īīī īīīīīŦī īīī īīī īīīīī ī¨īī īī īīī īī§ī ī¨īīī īīī īī īŠīīīī ī¨ī ī īīī īīī īī īīī īīī īīī īī īī īī ī īīīīī īī īīīīīīīī īīīīŠīīīīīĢī ī īīī īīīīŠīīīīīīŠīīīīīīīīīŠī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīŠī īīīīīīī§īīīīī īī īīīīīīīīīīīīīīīŦī īī īīīīīīīīŠīīīīŠīīīīīīīīīīīīīīīīīīīīī īŠīī¨īīī īīī īŦīīī īīīīī īī īī īīŠīīī īīīī īīīīīŽīīīīīīī īīī īī īīīīī¨ī īīīīīīīīīīīīīī īīĢī
ī ī ī ī ī
īīīīīī īīīīī īīīīīī īīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīī īīīīī īīīīīī īīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīĄīĸīŖīī¤īĨīĸīīī īīī īī
ī ī ī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīī īīīī īīī īīīī īīīīīīīīī īīīīī īīŋīīīīīĻīī ī
īŗīĢīŋīĢīīīī īīīīīī ī īĨīīīī¨īīīīīīīī īīī īŦī īīīīīīīīīīī īīīīīīī īīīī¨īīīī īī īīŠīīīīīīīīī īīīīīīīīīīī īī īīīīīī īīŠīīīīīīīīī īŦīīī īĢīīīīīīīīŠīīīīīīīīīēīī īīīīīīīīŠīīīīī¨ī īīīīīī īī īīī ī ī īīĢīī¸īīīīīīīīīī īīīīīīīīīīīīīīŦīīīŦī īīī ī īīĢīīīīīīīī§īīī īī īīīīīīĒīīīīīīīīīīīīī īīĒīī¨ī īīīīĢī ī ī¨īĢī īīī īīīīīīī īīīīīī īīīīī īīīī īīīŦīīīŦī īī§ī īī īī īī īīī īĒī¤īīīī īīīīī īīīīī īīī īīĒīī¨ī īīīīĢī ī īīĢīī¸īīīī īīīīīīīīīīīīī īīī ī īīĢīīīīī īīīīīīīīīīīīīīīīī īī§īīī īī īīīīīīĒīīīīīīīīīīīīī īīĒīī¨ī īīīīĢī ī ī¨īĢīīīīīīīī§īīī īī īīīīīīĒī¤īīīīīīīīīīīīīī īīī īīĒīī¨ī īīīīĢī ī īŗīĢīŋīĢīīīīīīīīīīīīīīī īī īŖīīīīī§ī īīīīīī ī īīīī īīī īīīīŠī īī§ī īīīīīīīīīī§ī īīīīīīīī īīīīīīŠīīīīīī§ī ī¸īĨīīļī¸īī ī īŽī īīī§ī īīīīīīīīīī īī§ī ī īīīĢī§ī īīīīī īī īī ī īīīīī īī īīī īīī ī īīīīī īŠīĢīī īĸīīīīīīīīī īīīīīžīīīīī īīĢīīīī īīīīī īīīī īīīīīīīīīīīīīī īīīīīīī īīīīī īīīīīī īīīīŠīīīī īīīīīīī¨īīīŽīīīĢīīīĸīīīīīīīīī īīīīīīīīī¨īī īīīīīīīīīīī īīīīīīīīīī īīīīīīī īīīīīīī īīĢī ī īŗīĢīŋīĢī˛īī¤īīīīīīīīīīīīīī īīī īī īŖīīīīī§ī īīīīīīī īīī ī ī īąī īīīīīŦī ī īī īīŠī§ī īī īīīī ī¤ī īīīīīŠī īīī§ī īīīīļīīī īīī¨īīīī īī īīīīīīīīīīīīīīīīī īīīīīī īīŠīīīīīī īŦīīīīīī īīīīīīīī īīīī īīīīī īīīīīī ī īīīīīī īīīīīī īīĢīīī ī īīīīīī ī īīīī īīī īīīīŠī īī§ī īīīīīīīīīī§ī īīīīīīīī īīīīīīŠīīīīīī§ī ī¸īĨīīļī¸īī ī īŽī īīī§ī īīīīīīīīīī īī§ī ī īīīĢī§ī īīīīī īī īī ī īīīīī īī īīī īīī ī īīīīī īŠīĢīī īī īīīīī ī īīī ī īīīīī īīīīīīīī ī īīīī īī īīīīī ī īīīīī īīīīŠī īīī ī īīīīī ī¨īīīŽīīīĢīī īĸīīīīīīīīī ī īīīīīīīī¨īī īīīīīīīīīīī īīīīīīī ī īī īīīīīīī īīī īīī īīīīīīīīīīī īī īīīīīīīīīīīīīīīīīīīīī īīīīīī īīīī īīīīī īīīīī īīīīīīīī īīīīīīīīīīīīīīīī īīīīīīĢīīī ī īī īŦīī īīīīīīī īīīī īīīīīī īīīīī īīīīīīīīīīŽīīīīīīīīīī īīīīīīī īīīīīīīīī īīīī īī ī¨īīīīŠīīī īŠī īīīīīīīīīīīīī īīīīīīīīīīīīī īīīīīīīīīīīīīīīīĢī
īīīīīī īīīīī īīīīīī īīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīī īīīīī īīīīīī īīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīĄīĸīŖīī¤īĨīĸīīī īīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīī īīīī īīī īīīī īīīīīīīīī īīīīī īīīīīīīĻīī ī
īŗīĢīīīĸīīīīīīīīīīīī
īīīīīīī īī īīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīī īīīīīīīīīīī īīī īīīīīīīīŦī īīī īīīīī īī īīī īīī ī īīīīī īīī īīīīīī¯īīīīīīļīīīīīīŠī īī īīīīī§ī īīīīīīīīīīīīī īīī īīī ī īīī¨īīīī īīī īīīī īīī īīī īīīīīī īīīīīīīīīīīīīīīĢīīīŖīīīīīīīīīīīŠīīīīī¨ī īīīīīīīīī īīīīīīīī īąī īīīīīŦī ī īī īīŠī īīīī īī īīīī īī īīŠī īīī īī īī īīŠīīī ī īīī īīīīīīīīīīī ī īīīīīī ī īīī īīīīīīīĢī ī īīī īīīīīīīīīīīīī īīī īī ī īŠī īī īīī īīīīīīīīīīī ī§ī īīī īīīīīīī īīīīīī īīī īīī īīīīīīīī īī īīīīīīīīīīīī īīīīŠīīīī īīĢī
ī īŗīĢīīīžīīīīīīīīīīīīŽī
īžīīīīīīīī īīīīŽī īīī īī īī īīīīīīī īīīīīī īīī īīī īīīīī īīīīī īīī īīī ī īīīīŠīīīī īī īīīīī īīī īīī īīī īīīīīīŠīīīīīīīīīīīīīŠīīī īī īīīīŦī īīī īīīīīīīīīīīīīīĢīīīīīīŽīīīīīīīīīŠī īīīī īŠīīīī īīīīŠīīī ī īī īīīīīīīī īīīīŽīī īīīŽī ī īīīīī īīīīīīīīīīī§ī īīīŠīīīī īī īŦīīīīī īī§ī īīīīŽī īīī§īīīīīŠīīīīīīīīīīīī īīīšīīīīīīīīīīīīīīīīīŽīīīīīīīīīīīīīīīļīīī īīīīīīīīīī īŦīīī ī§ī īīīīīīīī ī īīīīīīī ī§ī īīīī ī§ī īīī īī īīīīīīīī īīīīīīī īīĢī ī īīīīī īīīīīī īīīīīīīīī īīīīī īīīī īīīīī īŠīīīīīīŠīīīī īī īīīīīŽīīīīīīīīīīīīīŠīīīīīīīŠīīīīīīīī īīīīīīī īīīīŠīīīīīĢī
ī
ī
īŗīĢīīĢīīīīīīŽīī īīī īīīŠī īīī ī īī īīīīī īīī īīī ī īīīīŽī īŠīīīīī īŠī īīī īīīīī īīī§ī īīī ī īīīŠīīīīī īŠīīīī īīīīīīīī īīī īīīīīīīī ī īīīī īīīīīīīīī īīīī īīīŠī īīī īīī īīī ī īīīī īīīīīī īīīīŽīī īģīŠīīī¯īŠīīī ī īīīī īīīīīīīīŧī īīīī īīīī īŦīīīī īīī¨īīīīīī īī īīī īīī ī īīīīīīī īīīīīīīīī§īīīīī īīīīīī§īīīīīīīŦīīīīī¨īīīīīīīīīīīī īīīīŠīīīīī°īīīīīīīīīīīīīī īīīīīīī īīīīīīīīīīīīŠīīīīīīĢīīī īīīīīī īīīŠī īīīīŠīīīīī¨ī īīīīīīīīīī§īīīīīī¨ī ī īī īīīīīŠī īīī¨īīīīīŠīīīīīīī īīīīīī īīīīīī īąīī īīīīīīīīīīīīīīīīīīģīīīī¨īīīīŧī§ī īīīīīŠīīīīī¨ī īīī īīīīīīīīŠī īīī īīĢī ī īŗīĢīīĢīīīīīīŽīīžīīīīī īŠī īīīīīīīīīīŠī ī īīīīīŠīīīīīīīŽīīŠīīīīī īŠī īīīīīīīīīīŠīīŠīīīīī¨ī īīīŠīīī īŠī īīī īīīīīīīīŦī īī īīīīīīīīŽīīīŽīīīīīīīīīīī īīīīŠīīīīīīģīīīīīīīīīīīīīī¨ī īīīī īīīīīī īīīīīīīīīī īīīīīīŽīīīīī īīīŠī īīīŧī§īīīīīīīīīīī īīīīīīīī īīīīīī¨īī īīī īīīīīīīīŠī īīīīī īīīīī ī īīīīīīīī īīīīīŠīīīīīīī īīīīīīīī īīīīīī īīīīīīŽīīīīīīīīī īŦī īīīīīīīīīīīīī īīīīī īīīī ī īīīīīīīī īīīī īīīīīīīīīīīīī īīīīŠīīīīī°īīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīĢī
īŗīĢīĻīī īīīīīīī¨īīīīīīīīīīĄīīī īīīīīīīīī īī
īīīīī īīīīīŠī īīī īīī īīīīī īīī īīī ī īīīŠīīīīī°īī īīīī īīīŦī ī īī īī īīī īī īīīīīīī īīīīīīī īīĢīī īĄīīī īī īīīīīīī īīīŠīīī īīīīīī īīī īīī ī īīīīīīīīīīŦī īī īīīīīīīīīīīīīīīŠī īīīīīīī īīī īīīīīīīī īīīīīīīīī¨īī īīīīīīīī īīīīīīīīīī¨ī īīī īŦīī īī īīīīīīī ī īī īīĢī īīīīīī īīīīī īīīīīī īīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīī īīīīī īīīīīī īīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīĄīĸīŖīī¤īĨīĸīīī īīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīī īīīī īīī īīīī īīīīīīīīī īīīīī īīīīīīīĻīī ī
īŋīĢīīīĨīīīīīī īŠī īīī ī
īīīīī īīīīīīī īīīīī ī¨ī ī ī īīīīīī īī ī¨īī īīī ī īīī īžīīīīī īī īīīīļīīī īĨīąī īīīīīŦī ī īī īīŠīĢī ī īīīīīīīīīīīŠīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīī§īīīīīīīīŠīīīīīīīīīī īīīīīī īīīīīī§ī īī īīīīīīīīīī īīī īīīī īīī§ī īīī īŠīīī ī īī īŦī īī ī īī īīīīīī īī īīī īīī īīīī īīīīīīīīīī īī īīŠīīīīīīīī īīī ī īŠīīīīīŠī īīīĢī ī¸īī īī ī īīīī īīīī īīīīīŦīīīī īī īīī īīī īīī īīī īīīŠīīīīī īīīīī īīīīīģīīīīīīīīīīīīīīīī īīī īīīīīīŧīīīī īīīīīī īīī īī§īīīī īīīīŠīīīīīīŠīīīīī īīīīī īīīīīīīīīīŦīīīī īīīīīīīī īīīīīīīīī¨īī īīīīīīīīīīī īīĢī
ī īīĢīīī¤ī īīīīīīīīīī ī
īĨīīīīīīīīīī ī īīī ī īīīīī īīī īīī ī īīīīīīīī īīīīī īīīīī īīī īīīīīīīīīŠī īīī īīīīī īīī īīī īīīīīī īīīīīī¨īī īīīīīīīīīīīī īīŽī īīĢīīīīī īīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīŠīīīīīīīīīī īīīīī īīīīīī īīĢī ī īžīīīīīī īīīīīīīīīīīīīĒīŠīīīīīīīīīīīīīīīīī īĢīĒīīī īīīīīīīīī īīīīīīīīīīīīīīī īīīīī īī īīīīī īŠīīīīīīīīī īīīī īīīĢī ī ī īīīīī īī īīīī īīīīˇīīīī īīī ī īīīŠīŠīīī ī īąīīŠīīī īī īīī īŠīīīīīī īĢī ī īžīī¨īīī ī ī¤ī īŦīīī ī ī ī īīīīīī¨īī ī īī īŦīīī ī īīīīī īīīī ī¨ī ī īīī īī īīīī īī īīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīī īĢīīīĨīąīīŠīīī īīīīī īīī¤ī īīīīīīīŠīīīīīīīī īīĢī ī īī¤ī ī ī īīīīīīī īīīī īī īīīīīīī ī¤īīīīīīī ī īīīīīīīīīĢī ī ī ī īīīīīī¨īī ī īī īŦīīī ī īīīīī īīīīī īī īīīī īīīīīīīĩī īī īī īīīīīīī īīīīīīŠīīīīīī§ī īīīīī īīī īīīīīīīī īīīīīīŠīīīīīī§ī īīīī īīīīī§īīīīīīīīī īīĢī ī īīŠīīīīīīīī īīī īīŠīī¨īīī īīī īī īīīīī īīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīī§īīīīīī īīīīī¤ī īīīīīīīīīīīīīīīī īŠīīīīĢī ī īīīīˇīīī ī ī īīīī īīīīī īī īī īĒīīīīˇīīī īīīīī īĢīĒī ī īī īīīīīīīīīīīī īīīīī īīī īīīīīīīī īī īīī īīīŠī īīīīīī īīīīīīīīīī īīī īī īīīīīŠīīī ī§ī ī¨īīī īīīī¨īīīī īī īŠīīīīīīīīī īīīīīīīīĢīī īīīīˇīīīīīīīīī¨ī īīīī īīīīīīīīŦī īīīīīīīīīīī īŠīīī īīīīīīīīīīīī īīīīīīīīīīīŠīīīī īī§ī īīīīīŽī īīīīīīŽī īī§īīīīīī īīīīīŠīīīīī īīīŠīīīīīīīīīīīīīī īīīīīīīīŦī īīīīīīĢī ī ī īīīīīī īīīīī īīīīīī īīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīī īīīīī īīīīīī īīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīĄīĸīŖīī¤īĨīĸīīī īīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīī īīīī īīī īīīī īīīīīīīīī īīīīī īīĻīīīīīĻīī ī
ī īīīīī ī īīīī īīīīī īī īī īĒīīīŠīīīī īī ī īīīīīĢīĒī ī ī īī īīīīīīīīīī īīīīīīīīīīīī īīīīī īīīīīīī īī īīīī īīī īīī īīīī īī īīīīī§ī īīīī īīīīīī īīīī īī īīīŠīīīīī īīī īīīī īī īŦīīīīī īīīī īīīī īī īīīīĢī ī īīīīī īī īīīī ī¨ī ī īīīī īīī īīīīīīīī ī īŠīīīī īīī īŦīīī īī īīīīīŽī¯īīīīī īīī īī īīīŠīīīī īīīīīīīīīīī īīīīīī īŠīīĢī ī ī¸īĨīīīīīīīīīīīīīī¸īīī īīīĨīēīīīŦīīī īīīīīīīīŦīīīīĢīīī īīī īīīīīīīīīīīīīīīīīīīīīīīī īī īīī īī īīīīīŽīī īīīīī ī īīīīīīīī īīīŠīŠīīīīīīīīīīī ī¨ī īīī ī īī īīī ī īīīŠīīīī īī īīīī īīī ī īīīī īī īīīīīīī īīīīīīīīīĢīīī¸īĨīīīīīīī¨ī īīīīīīīīīīīīīīīīīīīī¨īīīŽī īīīīīīīīī īīīīīŦī ī ī īīī īĢī ī ī¸īī ī īīīīīīī īīīī ī¸īīŖīī īīīīī īīī īī ī īīī īīīĢī ī ī īī īīīīīīī īīīīīīīīī īīīī īīīī īī īīī īī īīīīīŽīī īīīīī ī īīīīīīīī īīīŠīŠīīīīīīīīīīī ī¨ī īīī ī īī īīī ī īīīŠīīīī īī īīīī īīī ī īīīī īī īīīīīīī īīīīīīīīīĢīīīĸī īī īīīīīīīīīīīīī īī īīīŠīīī īīī īīīī īīīīīīī¸īĨīīĢī ī
īīĢīīīī īŦīīīīīīīīīīīīīī ī
īī īŦīīīīīīīīĢīī§īīīīļīīīļīīīīīīīīī
īīīīīī īīīīī īīīīīī īīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīī īīī īīīī īīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īī īīīĄī īīīĸīīīī īīī īīīŖīī īīī¤ī ī ī īīīīīīīīī īīīĨīĻī§ī¨īīŠīĻī ī¨īĸīīī īīīīĄī īīīīīīīĒīī īī ī īīīīī īīīīīīī īīīīīī īīīī¤ī īīīīīīīīīĄī īīīī īīīīīīīīīīī īīīĢīīīīī īī¤ī īīī īī īī īīīīīī īī īī īī īīī īīīīīīīīīŦīīī īīīīĢīīīīīīŦī ī
īīīīīĨīī īīīī īŽī ī
īī īī īīīīīī īīī īī¯īīīĄī¤ī īī īĢīīī ī īĢīīīīī ī īŽīīī¯īīīīī ī īīī īī īĢīīī ī īīī ī°īīīī ī īīīī īīīīīīīīīī ī īŽīīī¯īīīīī īī ī ī§īīī īīīīī īī īīīīī¤ī īīīīīī īīī īīī ī īīī īĢīīīīī ī īī īīīī īī īīī īĄīīīŽīīīĄīīīīąīīŽī īī īī¤īīīīīīī īī īīī īīīī īīīī īīīĢī īīīīīīīīīīīīīīīīīīī īīŽīīī¯īīīīī ī¤ī īĢīīī ī īīīī īĢīīī ī īī īīīīīīī ī īīīīī īīī īīīīī īī īīī īīī īĢī¤ī īīīī īīīīī īīī ī īīīī¯ī īīīīīīīīī īīīŽīīīīīīī īīīīīī īīīīīĄīīīŽīīīĄīīīīīī īīīīīīīīīīīī īīīīīīīīĢīīīīīī īīĄīīī īī īīīīīī īīī īīīīīīīīīīīĢīīīīī īīī īīīī īīī
ī īīīīīīīīīīī ī ī
ī īī īīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīĢīīīīīīīīīīīīīīīīīīīīīī īīīī īīīīī īī īīīīīīīīīīīĢīīīīī īīī īīīī īīī
ī ī˛īīīīīīīī ī ī
ī īīīī īīīīīīī īīīīīī īī īīī īīīĢīīīīī īīīīī īīī īīī īī īīīī īī īīī īĢīīīīī ī īī īīīī īī īīīīī īīī ī īīīīīīī ī īīī īīīīīīīĄī īīīīī īīīīī¤ī īīīīīīīīīĄī¤ī īīīī īīīī īīīĢīīī īī īīī¤ī īīīīīīīī¤ī īīīī īīīī¯īī¤ī īīīĸīī¤ī īīĢīīīī īīīīī īī¤ī īīīī īŖīīŗī īīīīī īīī ī īīīīī ī īīī ī īīīīīīī īīīī īīī īīī ī īīīīī īīīī īīī¤ī īīŽīī īīīīīī īīī īīī ī īĢīīīīī ī īī īīīī ī īīī īīīī īī īīīīīī ī ī īīīī īīīīīīī īīīī īīīīīīīīĢīīīīī īīī īīīī īīīīīīīī īīīīīīīĢīīīĄīīīīīīīīīīīīīīīŽīīīīīīīĢīīīīī īīīīīī
ī ī´īīīīīīīīīī ī
ī´īīīīīīīīīīīīīī īīīīīīī
īŗīīīīīīīī ī¤īīīīĢīīīīī īīī īīīī īīīīīĢīīī īīīīīī īīīīīī īīīīīīīīīīīīīīī īīīīīīīīīīīīīīĩ īĢīīīīī ī īīīīī īĢīī ī ī īī ī īīīĢīīīīī īīīīīīī īīīī īīīīīī īīīīīīī īī īīī ī īīīīīīīīī īī īīīīīīī īīī īīīī īĢīīīīī ī īī īīīī īī īīīī īīī¯ī ī īīīīīīīīīīī ī īīīīī īīīīī ī īĢī īīīīī īī¤ī īīīīīīīīīĄīīīī īīīīīīīŽīīīĄīī īīīīīī īīī īīīī īīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīī īīī īīīī īīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īī īīīĄī īīīĸīīīī īīī īīīŖīī īīī¤ī ī ī īīīīīīīīī īīīĨīĻī§ī¨īīŠīĻī ī¨īĸīīī īīīīĄī īīīīīīīĒīī īī ī ī īļī īīīīīī īīī īīīī īīīīīīīīīīī īī¯ī īīīīīīīīīīīīīĄīīīīŽīī īīīīīīīīīīīī īī ī īļī īīīī īīīīīīīīīī īīĄīīī īīīŽīī īīīīīīīĄīīīīīīīīīīīīīīīīĄīīĢīīīīī īīī īīīī īīīīī īīīīīīīī īīīī ī īļī īĸīīīīīĄī īī īīīīīīīī ī¤īīĢīīīīī īīī īīīī īīīĢīīīīīīīīīī īīīīīī īīīīīīīīīīīīī¨īīīīī ī īīīīīīīīīīīī īīī īīīīīīīīī īīīīīīīī īīīīī īīīīīīī īī¤īīīī īīī īīīī īīĢīīīīīī īīīīīī īīīīī īīī ī īīīīī¤ī īŽīīīī īīī ī īīīī īīīīī īīīīī īī īī īīī ī īīīī¯ī īīˇī īīī īīī īī īīīī¯īīīī ī īīīĢīīīīīĢī īīīīīīīīīīīīīīĄīīīī īīīī°īī ī īļī ī īī īīīīĢīīīīīī īīīīīīī īīīīīīīīīīīīīŽīīīīīī īīīīīī īīīīīīĢīīīīī īīī īīīī īī īīīī īīīīīīī īīī īī īĢīīī ī īŽīīī ī¸īī īĢīīī ī īī īī īī ī īī īīīīīīīĄīīī ī ī īīīī īī īīīīīīīĄīī īīīīīŽīī īī īīī īī īīī īīīĢīīīīīīīīīīī īīī īĢīī¯ī ī īīī ī īīīīī īīī īīī ī īĢīīīīī ī īī īīīī ī īīīī īīīī īīīīī īī ī īļī ī īī ī īīīĢīīīīī īīīīīīī īīīīīīīī ī īīī īĢīīīīīīī īīī ī īĢīīī¯ī īī īīīī īīīīīīīīī īī īīīīīīīīīīīīīīīīīīīīīĢīīīīī īīī īīīī īī¤īīīīīīīīīīīīīīīīīīīīīī īīīīīīīĄīī
ī ī´īīīīīīīīīī īīīīīīī
ī¨īī īī īĢīīīīī ī īī īīīī ī īīī īīīīī īīī īīīīī īī¤ī īīī ī īīīīī īī īīīīīīī īīīīīīīīī īīīīī īŽī īī ī īīĢīīī īĢī īīī īī īīī īīī ī īī īīīī ī īīī ī īīī ī īīīīī īīīī ī īīī īī īī īīī ī īīīī īīīīī īīīīīĄī īīīĢīīīīī īīīīīī ī ī īī ī īīīīīīŽīīīĄī īī īīīīīīī īīī īīīīī īīī ī īīīĢīīīīīšīī īī īēīīīī īĢī īīīīīīīīīīīīīīī īīīīīīīīīīīīīīī īīīī īīīīīīĢīīīīī īīī īīīī īīī
ī
ī´īīīīīīīīīīīīī īģīīīī īīīīī¯īī īīīīīīīīīīīīīīī īēīīīī īīīīīīīīīīīīīĢīīīīīī īēīīīī īīīīīī īīīīĢī ī īīīīīīīīīŽīīīīīīīīīīīĢī īīīīīīīīīīīīīĄīīīī ī ī´īīīīīīīīĸīī¸īīĢīīīīīīīīī īī īŖīī ī īīī ī īīīīīīīīīī īīī īīīī īī īēīīīī īī īīī īīīĸīī¸īīĢīīīī īīīīī īī īīīī īīī ī īīīīīīīĄī īī īīī īīīīī īīīīī īī īīī īīī ī īī īīīī ī īīī ī īīī īīīīīīī īī īīīīīīī īīī īīīĸīī¸īīĢīīīīīīīīī īīīĢīīīīīī īēīīīī īīīīīīīīŽīīīīīīīīīīīĄīīīī ī ī´īīīī˛īīīīīīī īīīīīīīĄī īīī īīīī ī īīīīīī īīīīīīīīīī īīīīīīīīŖīīŗīīīīīī ī¤īīīīīīīīīīīī ī¤īīĢī īĢīīīīīīīīī¯īīīīīīīī īī īīīīīī īīī īīīī īīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīī īīī īīīī īīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īī īīīĄī īīīĸīīīī īīī īīīŖīī īīī¤ī ī ī īīīīīīīīī īīīĨīĻī§ī¨īīŠīĻī ī¨īĸīīī īīīīĄī īī˛īīīīīĒīī īī ī īī īīīīīīī īīīīī īīīīīīĄī ī īĢī īīīīī ī īīīīīīĄī ī īīī īīīĢīīīīī īīīīī īīī īīīīī īī īīīī īī īīī īīīīīīīīīĄī īī¤ī īīīī īīī īīī īīī ī īīī īī īīĢīīīī īī īīī īīīĢīīīīī īīīīīīī īīīī īīīī īīīīīīīī ī ī´īīīī´īīīīīīīīī īīī īīīīīīīīī īīīī īĻīīīīīĢīīīīīīīīīīīīīīīī īīīīīī īīīīīīī īīīīīīīīĢī īīīīīīīīī īīīī ī ī´īīīīĒīīĨīīī īīīīīīīī īīī īīīī īī īŖīīī īīī īīī īīīīīīīīīī īīīīī īīī īī īīī īīīīī īīīīīīī¤ī īīīīīīīĄī īīīĢīīīīī īīīīī īīī īīīī īī īĢīīīīī ī īī īīīī īī¤ī īīī īīīīī īīīīīĄīīīīīī īī īīīī īī īīī īīīĢīīīīī īīīīī īĢīī¤ī īīī ī ī°īīī īīīīī īīīīīīīīī īīī ī īŧīī īīīīīīī īīī īī īēīī īīīī īīīī īīīīīīīīīīīīīīīīīīŽīīīīīīīīīīīīīīīīīīīīīī īī īīīīīīīīīīī īīīīī īīī īīīīīīīī ī ī¨ī īīīīīīĄī īīī ī
ī´īī˛īīīīīī īīīīīĄīīīīīŖīīī īīīī īīīĻī īīŽīīī¯īī
īŖīī īīī īīī ī īī īīĢīīīī īī īīī īīīīī īīī īīīĢīīīīīĩīīīīīīī īī īīīĢīīīī īīī īīī īīīīīīī īīīīīīī īīīī īīīī īīŽīīī¯īīīīīŠī°īīĢīīī īīīīīīīīī īīīī īīīī īīŽīīī¯īīīŽīīīīīīīīīīīīīīī¤ī īīīīīīīīīīīŽīīīī¤īīī īīīī īīīīī¨īīī īīī īīīīīī īīī¤īīīīīīīīīīīīī īīīīīīīīīī īīīīīīīĢīīīī īīīĢī ī īī īīŽīīī¯ī¤ī īīīī īīī īīīīīīī īī īīī īī īīīī īī¤ī īīī īīī īī īīī īīīīĩīīīī īŽīīī īī īīī īīīīīīīī¤ī īī īīīīī īīīīīī īī īīŽīīī¯ī¤ī īīī īīīī īīīī īī īī īīŽīīī¯ī īīīī īīīī īī īīīī īīī īīīīīīīīīīīīīī īīīīĢīīīīīī
ī ī´īī´īīī īī īīīīīīīīī īīīī īī
ī īī īīīīīīīŽīīīĄīīĄīīīī īīīī īīīīīīīīīīīīīī īīīī īīīīīĢīīīīī īīī īīīī īīī ī īļī īīīīī¤ī ī īī īīī¤ī īīī īīīī īī īī īīīīīīī īīīīīī īīī īī īīīī īī īīī īī īīīĢīīīīīĩ īīīīīīī īīīĢīīīīī īīī īīīī īīĢīīīīīī īīī īīīīī īīīīīīĢīīīīīī ī īļī īīīīīīī īīīīīīīīīīīīīīīīīīīīīīīī īīīīīī īīīīīīĢīīīīī īīī īīīī īīīīīī īīīīīīīīī īīīīīīīī īīīīī īī īīīīīīīīī¨īīīīīīīīī īīīīīīīīīīīīīīīīīīī īīīīīīīīĢīīīīī īīī īīīī īīīī īĢīīīī īī ī īīīīīīīīīīī īīī īī īīīī īī īīīī īīīĢīīīī īŽīīīī īīī ī īīīīīīī īīīīīī īīīīī īīīīīīīī ī īļī īīīīī īīīīī īī īīī īĢīīīīī ī īī īīīī īī īĢīīīī īī ī īī īīīī īīī īīīīīīī īī īīī īīī īīīīīīīīīī īīŽīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīī ī īīīīīī īīī īīīī īīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīī īīī īīīī īīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īī īīīĄī īīīĸīīīī īīī īīīŖīī īīī¤ī ī ī īīīīīīīīī īīīĨīĻī§ī¨īīŠīĻī ī¨īĸīīī īīīīĄī īī´īīīīīĒīī īī ī īļī īŖīī īīī īīī ī īīīī īīī īīīīī ī īīīĢīīīīī īīīīī īīī īīīīĩīīīĢīīīīīĩīīīīīīī īī īĢīīīīī īī īēīīīīĢī īīīīīī īīīīīīī īīīīīīīīīīīīī īīīīĢīīī īīīīīīīīīīīīīīīĢīīīīīī¤īīīīīī īīīīīīīī īīīīĢīī īīī īīīīī īĢīīīīīīīīī īīī īī¤īīīīīī īīīīīīīīīīīīī īīīīīīī¯īīīīīī īī īīīīīīīīīīīī īīīīīīīĸīī
ī ī´īīĒīīĸīīīīīī
ī īī īīīīĢīīīīīīŽīīīīīīīīīīīīīī īīīīīīīīī īīī īŽīīīīīī īīīīī īīīīīīīīīīīĢīīīīīīī īīī īĸīīīīĢīīīīīĄīīīīīĢīīīīī īīī īīīī īīīŽīīīīīī īīīī¯ī īīīīīīīīīīīī īīīīĄīīīīīīīīīīīīīīīīīī īīīīīīī īīīīīīīīīīīī
ī ī´īīŊīīĸīīīīīīīīīīīīīīīīīĨīīī īīīīīīīīī īī
ī īīīī īīīīīĢī īīī īīī īīīīī īīī īīī ī īīīĢīīīīīšīī īīīī īīīī ī īī īī īīī īī īīīīīīī īīīīīīī īīīī īĨīīī īī īīīīīīī īīīĢīīī īīīīīī īīī īīī ī īīīīīīīīīīī īī īīīīīīīīīīīīīīīĢī īīīīīīī īīī īīīīīīīī īīīīīīīīīīī īīīīīīīī īīīīīīīīīīī īīī īīī īŽī īīīīīīī ī īī īīī
ī
īĒīīīīŠīīīīīī īĢī īīī ī
ī īīīī īīīīīīī īŽīīīī īī ī ī īīīīīī īī īīī īīī ī ī¨ī ī īīīīīĄī īī īīīī¸īīī īŠī°ī īīīīīī ī ī ī īīĢīī īžīīīīīīīīīīīĢīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīī¤īīŽīīīīīīĢīīīīīīīīīī īīīīīī īīīīīī¤ī īī īīīīīīīīīī īīī īīīī īīī¤ī īīī īĢīīī ī īī īī īī ī īī īīīīīī īī īīī īīī īīīī īīīīīīīīīĄī īī īīĢīīīīīīīī īīī ī īĢīīīīīĢī īīīī īģīī īī ī īīīī īĄīīī īīīīīīīīī īī īīī īīī īīī īīī īīīĢīīīīī īīīīī īīīīīŋīīīīīīīīīīīīīīīī īīī īīīīīīīīīī īīīīīī īīī īī¤īīīī īīīīĢīīīīīīĢīīīīī īīīīī īīīīīīīīīīīīīī īīīīīīīī īīīīīīīīīīī īīīīīīīīīīī īīī
ī īŊīīīīī īīīīīīīīīī ī
īŠīīīīīīīīīī ī ī īī ī īīīīī īīī īīī ī īīīīīīīĄī īīīīī īŽīīīī īīī īīīĄīīīīīīĢī īīī īīīīī īīī īīī īīīīīī īīīīĄīīīī īīŽīīīīīīīīīī īī¯ī īīīīīŖīī īīīīīīīīīī īīīīīīīīīīīīīīĄīīīīīīīĢīīīīīīīīīī īŽīīīī īīīīīī īīī ī īīīīīī ī īī īīīī īī ī īĸī īīīīīīīī ī īī īīīī ī īīīīī īīīī īī ī īīī īī īīīī īī īīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīĄī īīīīŠī°īīĢīīī īīīīī īīīīĸīīīīīīīĢīīīīīīīī īīī ī īīīīīī īīīīīīīĄī īīī īīīīīīĸīīīīīīīīīīīīĄī īīī īīīī īīīīīīīīīīīīī īīīīīīīīīĢī īĢīīīīīīī īīīīīī īīī īīīī īīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīī īīī īīīī īīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īī īīīĄī īīīĸīīīī īīī īīīŖīī īīī¤ī ī ī īīīīīīīīī īīīĨīĻī§ī¨īīŠīĻī ī¨īĸīīī īīīīĄī īīĒīīīīīĒīī īī ī īīīīī īīīīīīīīīĨīīī īīīīīīī īīīīīŖīīŗīīīīīī ī¤īīīīīīīīīīīī ī¤īīīīīīīīĢīīīīīīī īī ī īīīīīŽīīīīīīĸīīī īēīī īīī īīīīīīīīīīīī īīīīīīīīīīīīīī īīīīīīīīīī īīīīīīī īīīīīī īīīīī īīīīīī ī¤īīīīĢīīīī īī¤īīīīīī īīŽīīī¯īīīīĸīīīīī¯īīīŽīīīīīīīīīīīīīīīīī īīīīīīīīīīīī īī ī īīīĸī ī īīīīīīī īīīī īī īīīīīīī īīīĄīīīīī īĸīīīīīīīīīī ī īĸī īīīīīīīī ī īī īīīī ī īīīīī īīīīī īī īīīī īīīĄīīīīī īī īī īīīīīīī īīīīīīĢīīīīīī¤ī īīīīī īīī īīīīīīīī īīīīīīĢīīīīīī¤ī īīīī īīīīī¤īīīīīīīīī īīī ī īīīīīīīī īīī īīīīīīīīī īīīīĸīīĢīīīīī īī īīī īīīīīīĢī īīīīī īīīī īīīī īīīīīīīīīīīīīīīī īīīīīīīī īīīīīī īīīīīŠī°īīĢīīī īīīīī īīĢīī˛īīīīīī īīīīīīīīīīī īīīīīīī īīīī ī īīĢīīīīīīīī īīīĸīīĢīīīīī īīī īī īīīīī īīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīī¤īīīīīī īīīīīīĸīīīīīīīīīīīīīīīī īĢīīīīī ī
īīīīīī īīīīīīīīąīīīīīīī
ī īī īīīīīīīīīīī¤īīīī¸īīī¸īīīīīīīīī ī ī ī ī ī
īīīīīī īīī īīīī īīīīīīīī
īīīīīīī īīīīī
Spicerhaart Group Ltd Network Access and Authentication Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 1 of 6
Spicerhaart Group Ltd, including all subsidiary companies, is hereinafter referred to as "the company."
1.0 Overview Consistent standards for network access and authentication are critical to the company's information security and are often required by regulations or third-party agreements. Any user accessing the company's computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces risk of a security incident by requiring consistent application of authentication and access standards across the network.
2.0 Purpose The purpose of this policy is to describe what steps must be taken to ensure that users connecting to the corporate network are authenticated in an appropriate manner, in compliance with company standards, and are given the least amount of access required to perform their job function. This policy specifies what constitutes appropriate use of network accounts and authentication standards.
3.0 Scope The scope of this policy includes all users who have access to companyowned or company-provided computers or require access to the corporate network and/or systems. This policy applies not only to employees, but also to guests, contractors, and anyone requiring access to the corporate network. Public access to the company's externallyreachable systems, such as its corporate website or public web applications, are specifically excluded from this policy.
Network Access and Authentication Policy
Confidential
Spicerhaart Group Ltd Network Access and Authentication Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 2 of 6
4.0 Policy 4.1 Account Setup During initial account setup, certain checks must be performed in order to ensure the integrity of the process. The following policies apply to account setup: âĸ
Positive ID and coordination with the HR Department is required.
âĸ Users will be granted least amount of network access required to perform his or her job function. âĸ Users will be granted access only if he or she accepts the Acceptable Use Policy, which forms part of the employee terms & conditions of employment. âĸ Access to the network will be granted in accordance with the Acceptable Use Policy.
4.2 Account Use Network accounts must be implemented in a standard fashion and utilized consistently across the organization. The following policies apply to account use: âĸ Accounts must be created using a standard format (i.e., with their employee number (seven digits) etc.) âĸ Accounts must be password protected (refer to the Password Policy for more detailed information). âĸ Accounts must be for individuals only. Account sharing and group accounts are not permitted. âĸ User accounts must not be given administrator or 'root' access unless this is necessary to perform his or her job function. âĸ Occasionally guests will have a legitimate business need for access to the corporate network. When a reasonable need is demonstrated, temporary guest access is allowed. This access, however, must be severely restricted to only those resources that the guest needs at that Network Access and Authentication Policy
Confidential
Spicerhaart Group Ltd Network Access and Authentication Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 3 of 6
time, and disabled when the guest's work is completed. Ãĸ€Ë Individuals requiring access to confidential data must have an individual, distinct account. This account may be subject to additional monitoring or auditing at the discretion of the IT Manager or executive team, or as required by applicable regulations or third-party agreements.
4.3 Account Termination When managing network and user accounts, it is important to stay in communication with the HR Department so that when an employee no longer works at the company, that employee's account can be disabled. HR leaver processes support notification to the IT Manager and/or account set-up teams in the event of a staffing change, which includes employment termination, employment suspension, or a change of job function (promotion, demotion, suspension, etc.).
4.4 Authentication User machines must be configured to request authentication against the domain at startup. If the domain is not available or authentication for some reason cannot occur, then the machine should be permitted to access the network with cached information only.
4.5 Use of Passwords When accessing the network locally, username and password is an acceptable means of authentication. Usernames must be consistent with the requirements set forth in this document, and passwords must conform to the company's Password Policy.
4.6 Remote Network Access Remote access to the network can be provided for convenience to users but this comes at some risk to security. For that reason, the company encourages additional scrutiny of users remotely accessing the network. The company's standards dictate that username and password is an acceptable means of authentication as long as appropriate policies are followed. Remote access must adhere to the Remote Access Policy.
Network Access and Authentication Policy
Confidential
Spicerhaart Group Ltd Network Access and Authentication Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 4 of 6
4.7 Screensaver Passwords Screensaver passwords offer an easy way to strengthen security by removing the opportunity for a malicious user, curious employee, or intruder to access network resources through an idle computer. For this reason screensaver passwords are required to be activated after 15 minutes of inactivity.
4.8 Minimum Configuration for Access Any system connecting to the network can have a serious impact on the security of the entire network. A vulnerability, virus, or other malware may be inadvertently introduced in this manner. For this reason, users must strictly adhere to corporate standards with regard to antivirus software and patch levels on their machines. Users must not be permitted network access if these standards are not met. This policy will be enforced.
4.9 Encryption Industry best practices state that username and password combinations must never be sent as plain text. If this information were intercepted, it could result in a serious security incident. Therefore, authentication credentials must be encrypted during transmission across any network, whether the transmission occurs internal to the company network or across a public network such as the Internet.
4.10 Failed Logons Repeated logon failures can indicate an attempt to 'crack' a password and surreptitiously access a network account. In order to guard against password-guessing and brute-force attempts, the company must lock a user's account after 5 unsuccessful logins. This can be implemented as a time-based lockout or require a manual reset, at the discretion of the IT Manager. In order to protect against account guessing, when logon failures occur the error message transmitted to the user must not indicate specifically whether the account name or password were incorrect. The error can be as simple as "the username and/or password you supplied were incorrect."
Network Access and Authentication Policy
Confidential
Spicerhaart Group Ltd Network Access and Authentication Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 5 of 6
4.11 Non-Business Hours While some security can be gained by removing account access capabilities during non-business hours, the company does not mandate time-of-day lockouts due to the flexible nature of the working hours and Call Centre operations.
4.12 Applicability of Other Policies This document is part of the company's cohesive set of security policies. Other policies may apply to the topics covered in this document and as such the applicable policies should be reviewed as needed.
5.0 Enforcement This policy will be enforced by the IT Manager and/or Executive Team. Violations may result in disciplinary action, which may include suspension, restriction of access, or more severe penalties up to and including termination of employment. Where illegal activities or theft of company property (physical or intellectual) are suspected, the company may report such activities to the applicable authorities.
6.0 Definitions Antivirus Software An application used to protect a computer from viruses, typically through real time defenses and periodic scanning. Antivirus software has evolved to cover other threats, including Trojans, spyware, and other malware. Authentication A security method used to verify the identity of a user and authorize access to a system or network. Biometrics The process of using a person's unique physical characteristics to prove that person's identity. Commonly used are fingerprints, retinal patterns, and hand geometry. Encryption The process of encoding data with an algorithm so that it is unintelligible without the key. Used to protect data during transmission or while stored.
Network Access and Authentication Policy
Confidential
Spicerhaart Group Ltd Network Access and Authentication Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 6 of 6
Password A sequence of characters that is used to authenticate a user to a file, computer, or network. Also known as a passphrase or passcode. Smart Card A plastic card containing a computer chip capable of storing information, typically to prove the identity of the user. A card-reader is required to access the information. Token A small hardware device used to access a computer or network. Tokens are typically in the form of an electronic card or key fob with a regularly changing code on its display.
7.0 Revision History Revision 2.0, 22/07/2010 SRL
Network Access and Authentication Policy
Confidential
Spicerhaart Group Ltd Network Security Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 1 of 16
Spicerhaart Group Ltd, including all subsidiary companies, is hereinafter referred to as "the company."
1.0 Overview The company wishes to provide a secure network infrastructure in order to protect the integrity of corporate data and mitigate risk of a security incident. While security policies typically avoid providing overly technical guidelines, this policy is necessarily a more technical document than most.
2.0 Purpose The purpose of this policy is to establish the technical guidelines for IT security, and to communicate the controls necessary for a secure network infrastructure. The network security policy will provide the practical mechanisms to support the company's comprehensive set of security policies. However, this policy purposely avoids being overly-specific in order to provide some latitude in implementation and management strategies.
3.0 Scope This policy covers all IT systems and devices that comprise the corporate network or that are otherwise controlled by the company.
4.0 Policy 4.1 Network Device Passwords A compromised password on a network device could have devastating, network-wide consequences. Passwords that are used to secure these devices, such as routers, switches, and servers, must be held to higher standards than standard user-level or desktop system passwords.
Network Security Policy
Confidential
Spicerhaart Group Ltd Network Security Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 2 of 16
4.1.1 Password Construction The following statements apply to the construction of passwords for network devices: âĸ
Passwords should be at least 8 characters
âĸ Passwords should be comprised of a mix of letters, numbers and special characters (punctuation marks and symbols) âĸ Passwords should be comprised of a mix of upper and lower case characters âĸ Passwords should not be comprised of, or otherwise utilize, words that can be found in a dictionary âĸ Passwords should not be comprised of an obvious keyboard sequence (i.e., qwerty) âĸ Passwords should not include "guessable" data such as personal information like birthdays, addresses, phone numbers, locations, etc. 4.1.2 Failed Logons Repeated logon failures can indicate an attempt to 'crack' a password and surreptitiously access a network account. In order to guard against password-guessing and brute-force attempts, the company must lock a user's account after 5 unsuccessful logins. This can be implemented as a time-based lockout or require a manual reset, at the discretion of the IT Manager. In order to protect against account guessing, when logon failures occur the error message transmitted to the user must not indicate specifically whether the account name or password were incorrect. The error can be as simple as "the username and/or password you supplied were incorrect."
Network Security Policy
Confidential
Spicerhaart Group Ltd Network Security Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 3 of 16
4.1.3 Change Requirements Passwords must be changed according to the company's Password Policy. Additionally, the following requirements apply to changing network device passwords: Ãĸ€Ë If any network device password is suspected to have been compromised, all network device passwords must be changed immediately. Ãĸ€Ë If a company network or system administrator leaves the company, all passwords to which the administrator could have had access must be changed immediately. This statement also applies to any consultant or contractor who has access to administrative passwords. Ãĸ€Ë Vendor default passwords must be changed when new devices are put into service. 4.1.4 Password Policy Enforcement Where passwords are used an application must be implemented that enforces the company's password policies on construction, changes, re-use, lockout, etc. 4.1.5 Administrative Password Guidelines As a general rule, administrative (also known as "root") access to systems should be limited to only those who have a legitimate business need for this type of access. This is particularly important for network devices, since administrative changes can have a major effect on the network, and, as such, network security. Additionally, administrative access to network devices should be logged.
4.2 Logging The logging of certain events is an important component of good network management practices. Logging needs vary depending on the type of network system, and the type of data the system holds. The following sections detail the company's requirements for logging and log review.
Network Security Policy
Confidential
Spicerhaart Group Ltd Network Security Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 4 of 16
4.2.1 Application Servers Logs from application servers are of interest since these servers often allow connections from a large number of internal and/or external sources. These devices are often integral to smooth business operations. Examples: Web, email, database servers Requirement: At a minimum, logging of errors, faults, and login failures is required. Additional logging is encouraged as deemed necessary. No passwords should be contained in logs. 4.2.2 Network Devices Logs from network devices are of interest since these devices control all network traffic, and can have a huge impact on the company's security. Examples: Firewalls, network switches, routers Requirement: At a minimum, logging of errors, faults, and login failures is required. Additional logging is encouraged as deemed necessary. No passwords should be contained in logs. 4.2.3 Critical Devices Critical devices are any systems that are critically important to business operations. These systems may also fall under other categories above - in any cases where this occurs, this section shall supersede. Examples: File servers, lab or manufacturing machines, systems storing intellectual property Requirements: At a minimum, logging of errors, faults, and login failures is required. Additional logging is encouraged as deemed necessary. No passwords should be contained in logs. 4.2.4 Log Management While logging is important to the company's network security, log management can become burdensome if not implemented appropriately. As logs grow, so does the time required to review the logs. For this reason, the company enforced weekly log Network Security Policy
Confidential
Spicerhaart Group Ltd Network Security Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 5 of 16
management activity and application controlled monitoring for all servers. 4.2.5 Log Review Device logs do little good if they are not reviewed on a regular basis. Log management applications can assist in highlighting important events, however, a member of the company's IT team must still review the logs at least once per week. 4.2.6 Log Retention Logs should be retained in accordance with the company's Retention Policy. Unless otherwise determined by the IT manager, logs should be considered operational data.
4.3 Firewalls Firewalls are arguably the most important component of a sound security strategy. Internet connections and other unsecured networks must be separated from the company network through the use of a firewall. 4.3.1 Configuration The following statements apply to the company's implementation of firewall technology: âĸ Firewalls must provide secure administrative access (through the use of encryption) with management access limited, if possible, to only networks where management connections would be expected to originate. âĸ No unnecessary services or applications should be enabled on firewalls. The company should use 'hardened' systems for firewall platforms, or appliances. âĸ Clocks on firewalls should be synchronized with the company's other networking hardware using NTP or another means. Among other benefits, this will aid in problem resolution and security incident investigation. âĸ The firewall ruleset must be documented and audited six monthly. Audits must cover each rule, what it is for, if it is still necessary, and if it can be improved.
Network Security Policy
Confidential
Spicerhaart Group Ltd Network Security Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 6 of 16
âĸ For its own protection, the firewall ruleset must include a "stealth rule," which forbids connections to the firewall itself. âĸ The firewall must log dropped or rejected packets if the volumes of packets donât impact the performance of the device. 4.3.2 Outbound Traffic Filtering Firewalls are often configured to block only inbound connections from external sources; however, by filtering outbound connections from the network, security can be greatly improved. This practice is also referred to as "Egress Traffic Filtering." Blocking outbound traffic prevents users from accessing unnecessary, and many times, dangerous services. By specifying exactly what outbound traffic to allow, all other outbound traffic is blocked. This type of filtering would block root kits, viruses, and other malicious tools if a host were to become compromised. The company requires that permitted outbound traffic be limited to only known "good" services, which are the following ports: 21, 22, 23, 25, 53, 80, 110, 443, and 995. All other outbound traffic must be blocked at the firewall unless an exception is granted from the IT Manager.
4.4 Networking Hardware Networking hardware, such as routers, switches, hubs, bridges, and access points, should be implemented in a consistent manner. The following statements apply to the company's implementation of networking hardware: âĸ Networking hardware must provide secure administrative access (through the use of encryption) with management access limited, if possible, to only networks where management connections would be expected to originate. âĸ Clocks on all network hardware should be synchronized using NTP or another means. Among other benefits, this will aid in problem resolution and security incident investigation. âĸ
If possible for the application, switches are preferred over hubs.
Network Security Policy
Confidential
Spicerhaart Group Ltd Network Security Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 7 of 16
When using switches the company should use VLANs to separate networks if it is reasonable and possible to do so. âĸ Access control lists should be implemented on network devices that prohibit direct connections to the devices. Exceptions to this are management connections that can be limited to known sources. âĸ Unused services and ports should be disabled on networking hardware. âĸ Access to administrative ports on networking hardware should be restricted to known management hosts and otherwise blocked with a firewall or access control list.
4.5 Network Servers Servers typically accept connections from a number of sources, both internal and external. As a general rule, the more sources that connect to a system, the more risk that is associated with that system, so it is particularly important to secure network servers. The following statements apply to the company's use of network servers: âĸ Unnecessary files, services, and ports should be removed or blocked. If possible, follow a server-hardening guide, which is available from the leading operating system manufacturers. âĸ Network servers, even those meant to accept public connections, must be protected by a firewall or access control list. âĸ If possible, a standard installation process should be developed for the company's network servers. This will provide consistency across servers no matter what employee or contractor handles the installation. âĸ Clocks on network servers should be synchronized with the company's other networking hardware using NTP or another means. Among other benefits, this will aid in problem resolution and security incident investigation.
4.6 Intrusion Detection/Intrusion Prevention Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) technology can be useful in network monitoring and security. The tools
Network Security Policy
Confidential
Spicerhaart Group Ltd Network Security Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 8 of 16
differ in that an IDS alerts to suspicious activity whereas an IPS blocks the activity. When tuned correctly, IDSs are useful but can generate a large amount of data that must be evaluated for the system to be of any use. IPSs automatically take action when they see suspicious events, which can be both good and bad, since legitimate network traffic can be blocked along with malicious traffic. The company requires the use of either an IDS or IPS on critical or high-risk network segments. If an IDS is used, procedures must be implemented to review and act on the alerts expediently. If an IPS is used, procedures must be implemented that provide a mechanism for emergency unblocking if the IPS obstructs legitimate traffic. Also, if an IPS is used, it should be audited and documented according to the standards detailed in the "Firewalls" section of this document.
4.7 Security Testing Security testing, also known as a vulnerability assessment, a security audit, or penetration testing, is an important part of maintaining the company's network security. Security testing can be provided by IT Staff members, but is often more effective when performed by a third party with no connection to the company's day-to-day Information Technology activities. The following sections detail the company's requirements for security testing. 4.7.1 Internal Security Testing Internal security testing does not necessarily refer to testing of the internal network, but rather testing performed by members of the company's IT team. Internal testing should not replace external testing; however, when external testing is not practical for any reason, or as a supplement to external testing, internal testing can be helpful in assessing the security of the network. Internal security testing is allowable, but only by employees whose job functions are to assess security, and only with permission of the IT Manager. Internal testing should have no measurable negative impact on the company's systems or network performance. 4.7.2 External Security Testing External security testing, which is testing by a third party entity, is an excellent way to audit the company's security controls. The IT
Network Security Policy
Confidential
Spicerhaart Group Ltd Network Security Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 9 of 16
Manager must determine to what extent this testing should be performed, and what systems/applications it should cover. External testing must not negatively affect network performance during business hours or network security at any time. As a rule, "penetration testing," which is the active exploitation of company vulnerabilities, should be discouraged. When penetration testing is performed, it must not negatively impact company systems or data. The company requires that external security testing be performed annually.
4.8 Disposal of Information Technology Assets IT assets, such as network servers and routers, often contain sensitive data about the company's network communications. When such assets are decommissioned, the following guidelines must be followed: Ãĸ€Ë Any asset tags or stickers that identify the company must be removed before disposal. Ãĸ€Ë Any configuration information must be removed by deletion or, if applicable, resetting the device to factory defaults. Ãĸ€Ë At a minimum, data wiping must be used. Simply reformatting a drive or deleting data does not make the data unrecoverable. If wiping is used, the company must use the most secure commercially-available methods for data wiping. Alternatively, the company has the option of physically destroying the data storage mechanism from the device (such as its hard drive or solid state memory).
4.9 Network Compartmentalisation Good network design is integral to network security. By implementing network compartmentalisation, which is separating the network into different segments, the company will reduce its network-wide risk from an attack or virus outbreak. Further, security can be increased if traffic must traverse additional enforcement/inspection points. The company requires the following with regard to network compartmentalisation:
Network Security Policy
Confidential
Spicerhaart Group Ltd Network Security Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 10 of 16
4.9.1 Higher Risk Networks Examples: Guest network, wireless network Requirements: Segmentation of higher risk networks from the company's internal network is desirable, and must be enforced with a firewall or router that provides access controls. 4.9.2 Externally-Accessible Systems Examples: Email servers, web servers Requirements: Segmentation of externally-accessible systems from the company's internal network is required, and must be enforced with a firewall or router that provides access controls. 4.9.3 Internal Networks Examples: Sales, Finance, Human Resources Requirements: Segmentation of internal networks from one another can improve security as well as reduce chances that a user will access data that he or she has no right to access. The company encourages, but does not require, such segmentation.
4.10 Network Documentation Network documentation, specifically as it relates to security, is important for efficient and successful network management. Further, the process of regularly documenting the network ensures that the company's IT Staff has a firm understanding of the network architecture at any given time. The intangible benefits of this are immeasurable. At a minimum, network documentation must include: âĸ
Network diagram(s)
âĸ
System configurations
âĸ
Firewall ruleset
âĸ
IP Addresses
âĸ
Access Control Lists
Network Security Policy
Confidential
Spicerhaart Group Ltd Network Security Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 11 of 16
The company requires that network documentation be performed and updated on an annual basis.
4.11 Antivirus/Anti-Malware Computer viruses and malware are pressing concerns in today's threat landscape. If a machine or network is not properly protected, a virus outbreak can have devastating effects on the machine, the network, and the entire company. The company provides the following guidelines on the use of antivirus/anti-malware software: âĸ All company-provided user workstations must have antivirus/antimalware software installed. âĸ Workstation software must maintain a current "subscription" to receive patches and virus signature/definition file updates. âĸ Patches, updates, and antivirus signature file updates must be installed in a timely manner, either automatically or manually âĸ In addition to the workstation requirements, virus and malware scanning must be implemented at the Internet gateway to protect the entire network from inbound threats.
4.12 Software Use Policy Software applications can create risk in a number of ways, and thus certain aspects of software use must be covered by this policy. The company provides the following requirements for the use of software applications: âĸ Only legally licensed software may be used. Licenses for the company's software must be stored within the IT Department, in a secure location. âĸ Open source and/or public domain software can only be used with the permission of the IT Manager. âĸ Software should be kept reasonably up-to-date by installing new patches and releases from the manufacturer. âĸ
Vulnerability alerts should be monitored for all software products
Network Security Policy
Confidential
Spicerhaart Group Ltd Network Security Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 12 of 16
that the company uses. Any patches that fix vulnerabilities or security holes must be installed expediently.
4.13 Maintenance Windows and Scheduled Downtime Certain tasks require that network devices be taken offline, either for a simple re-boot, an upgrade, or other maintenance. When this occurs, the IT Staff must perform the tasks before and after normal business hours. Tasks that are deemed "emergency support," as determined by the IT Manager, can be performed at any time.
4.14 Change Management Documenting changes to network devices is a good management practice and can help speed resolution in the event of an incident. The IT Staff should make a reasonable effort to document hardware and/or configuration changes to network devices in a "change log." If possible, network devices should bear a sticker or tag indicating essential information, such as the device name, IP address, Mac address, asset information, and any additional data that may be helpful, such as information about cabling.
4.15 Suspected Security Incidents When a security incident is suspected that may impact a network device, the IT Staff should refer to the company's Incident Response policy for guidance.
4.16 Redundancy Redundancy can be implemented on many levels, from redundancy of individual components to full site-redundancy. As a general rule, the more redundancy implemented, the higher the availability of the device or network, and the higher the associated cost. The company wishes to provide the IT Manager with latitude to determine the appropriate level of redundancy for critical systems and network devices. Redundancy should be implemented where it is needed, and should include some or all of the following: Ãĸ€Ë Hard drive redundancy, such as mirroring, RAID and remote data storage. Ãĸ€Ë
Server level redundancy, such as clustering or high availability.
Network Security Policy
Confidential
Spicerhaart Group Ltd Network Security Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 13 of 16
Ãĸ€Ë Component level redundancy, such as redundant power supplies or redundant NICs. Ãĸ€Ë Keeping hot or cold spares, either onsite or at the external data centre location.
4.17 Manufacturer Support Contracts Outdated products can result in a serious security breach. When purchasing critical hardware or software, the company purchases a maintenance plan, support agreement, or software subscription that will allow the company to receive updates to the software and/or firmware for a specified period of time. The plan must meet the following minimum requirements: Hardware: The arrangement must allow for repair/replacement of the device within an acceptable time period, as determined by the IT Manager, as well as firmware or embedded software updates. Software: The arrangement must allow for updates, upgrades, and hotfixes for a specified period of time.
4.18 Security Policy Compliance It is the company's intention to comply with this policy not just on paper but in its everyday processes as well. With that goal in mind the company requires the following: 4.18.1 Security Program Manager An employee must be designated as a manager for the company's security program. He or she will be responsible for the company's compliance with this security policy and any applicable security regulations. This employee must be responsible for A) the initial implementation of the security policies, B) ensuring that the policies are disseminated to employees, C) training and retraining of employees on the company's information security program (as detailed below), D) any ongoing testing or analysis of the company's security in compliance with this policy, E) updating the policy as needed to adhere with applicable regulations and the changing information security landscape.
Network Security Policy
Confidential
Spicerhaart Group Ltd Network Security Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 14 of 16
4.18.2 Security Training A training program must be implemented that will detail the company's information security program to all users and/or employees covered by the policy, as well as the importance of data security. Employees must sign off on the receipt of, and in agreement to, the user-oriented policies. Re-training should be performed periodically. Additionally, the policies should be reviewed when there is an information security incident or a material change to the company's security policies. 4.18.3 Security Policy Review The company's security policies should be reviewed at least annually. Additionally, the policies should be reviewed when there is an information security incident or a material change to the company's security policies. As part of this evaluation the company should review: âĸ Any applicable regulations for changes that would affect the company's compliance or the effectiveness of any deployed security controls. âĸ If the company's deployed security controls are still capable of performing their intended functions. âĸ If technology or other changes may have an effect on the company's security strategy. âĸ If any changes need to be made to accommodate future IT security needs.
4.19 Applicability of Other Policies This document is part of the company's cohesive set of security policies. Other policies may apply to the topics covered in this document and as such the applicable policies should be reviewed as needed.
5.0 Enforcement This policy will be enforced by the IT Manager and/or Executive Team. Violations may result in disciplinary action, which may include suspension, restriction of access, or more severe penalties up to and including Network Security Policy
Confidential
Spicerhaart Group Ltd Network Security Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 15 of 16
termination of employment. Where illegal activities or theft of company property (physical or intellectual) are suspected, the company may report such activities to the applicable authorities.
6.0 Definitions ACL A list that defines the permissions for use of, and restricts access to, network resources. This is typically done by port and IP address. Antivirus Software An application used to protect a computer from viruses, typically through real time defenses and periodic scanning. Antivirus software has evolved to cover other threats, including Trojans, spyware, and other malware. Firewall A security system that secures the network by enforcing boundaries between secure and insecure areas. Firewalls are often implemented at the network perimeter as well as in high-security or highrisk areas. Hub A network device that is used to connect multiple devices together on a network. IDS Stands for Intrusion Detection System. A network monitoring system that detects and alerts to suspicious activities. IPS Stands for Intrusion Prevention System. A networking monitoring system that detects and automatically blocks suspicious activities. NTP Stands for Network Time Protocol. A protocol used to synchronize the clocks on networked devices. Password A sequence of characters that is used to authenticate a user to a file, computer, network, or other device. Also known as a passphrase or passcode. RAID Stands for Redundant Array of Inexpensive Disks. A storage system that spreads data across multiple hard drives, reducing or eliminating the impact of the failure of any one drive. Switch A network device that is used to connect devices together on a Network Security Policy
Confidential
Spicerhaart Group Ltd Network Security Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 16 of 16
network. Differs from a hub by segmenting computers and sending data to only the device for which that data was intended. VLAN Stands for Virtual LAN (Local Area Network). A logical grouping of devices within a network that act as if they are on the same physical LAN segment. Virus Also called a "Computer Virus." A replicating application that attaches itself to other data, infecting files similar to how a virus infects cells. Viruses can be spread through email or via network-connected computers and file systems.
7.0 Revision History Revision 2.0, 22/07/2010 SR
Network Security Policy
Confidential
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīī īĄīĸīŖī¤ī īīĸīīīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīīīīīīĨīī ī
īīīīī īīīīīīī īīīīīī īīīīĻī īīīīīīīīīī īīīī īīī§īīīīīīīī īīī¨īīīīī īīĻī īīī īī īī īīīīīī īī īī īī īīī īīīīīīīīīŠīīī īīīī¨īīīīīĒīŠī ī
īīĒīīīīĢī īīĢīī īŦī ī
īīīīīīīīīīīī īīī īī īīīīīīīī īīīīīīīī ī īŦīī īī īīī īīīīīīī īī ī īīī īīīīī ī īīī īī īŽīīīī īīĻī īŦīīīīīīīīīī īīīīīī īŽīī īīīīīīīīīīī īīīī īīīīīīīĸīīīīī¨īīīīīīīī īīīīīīīīīī¯īĸīī°īĒīīīīīīīī īīī īī īī īīīīīī īīīī īī īīīīī īīīīīī īīīīīīīīīīīī īī īīīīīīīīīīīĻī īīīŦī īĢī īīĻī īīī ī īīī¨īīīīī ī¨īīīī ī§ī ī īīīīī īīī īī ī§īī īī īīīīīīī īīīīī īī īīīīīī īīīī ī īīīīīī īī īīī ī īī īī¨īīīīīīīī īīīīīīīīīīīīīīī īīīīīīīīīīīĒī
ī īīĒīīīīīīīīī ī ī
īīī ī īīīīīīī ī īīī īīīīī īīīīīīī īīī īīī īīī īīīīī īīīīīīīī īīī īīīąī ī īŦīī īī īī īī īīīīīī īī īīīīĢīīī īī īīī īīīīīīīīī īī īĸīī īī īīĢīīī īīĻī īīīīīīīīīī īīīī īī īīīī ī īīī¨ī¨īīīīīīīīīīī īŦīīīī īīī ī īīīīĢīīī īīĻī īīīī īŦīīīī īīīīīīīīīīīī īī īī¨īī īīīīīīī ī§ī ī īīī īīīīī ī īīī īīīīī īīīīīī īīīī¨īīīīīĒī
ī ī˛īĒīīīīīīī ī ī
īīīīīīīīīīīīīīīĢī īīīīīīīīĸīīīī īīĢīīī īīī§ī īīīīīīīīīīī īī īīīīīīīīīīīīīīīīīīĒī
ī īŗīĒīīīīīīīīī ī
īŗīĒīīīŖī īīīīīīīīīīīīīīīīīīī ī
īīīīīīīīīīīī īĸīī īī īīĢīīī īī īīī īīīī īī īī īī īīīīīī ī§īīī īīīīīīī ī§ī ī īīīī īīīīīī īīīīīīī īī īīĻī īīīīī ī ī§īī īīīīīī ī īī īī īīīīīī īī¨īīīīī īīī īīīīīīīī īŦīīīī ī§ī ī īīīīī ī§īī īīīīīīīīīĒīīīīī ī īīīīīīŦīīīīīŽīī īīīīīīīī¨īīīīī§ī īīīīīīī¨īīīīĢī īīī īīīīŦī īī īīī§ī īīīī ī īīīīīīīīīīīīīīīīīīīīīī īī īīī ī ī´ī īīīī īīī ī īī īīĢīīī ī ī§ī ī īī īīīīī¨ī īī ī§ī īīī īī īīī īī īīī ī īīī īīīīĢī īīī ī§īī īī īīīīīī īīīīīīīīīīĢīīī īīĩī ī īīīīīīīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīī īĄīĸīŖī¤ī īīĸīīīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīīīīīīĨīī ī
ī´ī īļīīīīī īīī ī§ī ī īīīīīˇīīīīīī§īīīīĢī ī īīī īīīī īīŦīīī ī īīīī īīīīīī§īī ī īīī īī īīīīī¨ī īīīīīīī īīĢīīī īīīīˇīīīīī īĩī ī ī´ī īļīīīī īīīīīīīīīīīī īīī ī īī īīĢīīī ī īīīīīīīĢī īīī īīīī īīī īīī ī īŽīīīīīīī īīī īīīīī īī īīĢīīī īĩī ī ī´ī īĸīīīīī īīīīīīīīīīīīīīīī īīĢīīī īīŦīīīīīīīī īī§ī īī īīīīĩī ī ī´ī īīī ī īīīī īīīīąīī īīīīīīīīī īī īŦīīīī īīīīīīīīīīīī īīī ī īī īīĢīīī ī īŦīīīīī īīī ī ī§ī īī īīīīĩī
ī īŗīĒīīīīīīīīīīīīīīīīīī īīĄīīīīīīīīī
īīī ī īīī¨īīīīī īī īī¨īīīī īīī ī īīīīīīīīīīīī īīī īīīīīīīīī īīīī¸īīī īīīī ī īīīīīīīī īīī īīī īīīī¨īīīīīšīīīĸīīīīī¨īīīīīīīī īīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīī īīī īīīīīīŦī īīĒī ī ī¤īīī¨īīī īī īīī īīī īī ī īīīī īī īīī īīīīīīīīīī īīī ī īīīīī ī§īīīąīīī īīīīīīī īĻī īī ī¨īīī ī īīīī īīī īī īĢīīī ī īīīīīīīīĻī īī īīīīīīī īī īīīīīī īīīī ī¨īīīīī īīīīī īĻīīīīīīī īīŦīīīąīī¨īīīīī ī¨ī īīīīīīīīīīīīīīī īīīīī¨īīīī īīīīĒī
ī īŗīĒī˛īī¤īĢīīīīīīīīīīīīīīīĢīīī īī
īīīī ī īīī ī īī īīīīīīī īīī īīīīīīīīī ī īīī īĸīīīīī¨īīīīīī īī īīīīīīīīī īīīīīīīīī īīīī ī§ī ī īīī¨īīī īĻīīī īī īīīīīīīīī īīīīīīīīīīīī īīīīīĢīīī īīīīīīīīīīīīīīīīīīīī īīīīīī īīīīīī īīī ī ī īīī īīĢīīīīĒī ī īŖīī ī īīīīīī īīī ī ī¨īīīī ī§ī ī īī īīīīī¨ī īī īīīī īī īīī ī īīīī īīīīīī īīīīĢīīī īīīīīīĢī īī§ī ī īīīīīī īīīīīīīīīīīīīīīīīīīīīīīŦīīīīīīīīī ī īīīī¨īīīīī īīĒīīīŖīī ī īīīīīī īīī īī¨īīīīīīīŦīīīīī§ī īīī īīīīī¨ī īīīīīīīīīīīīīīīīīĢīīī īīī§ī īīīīīī īī īīī īīĒīīī ī īŖīī ī īīīīīī īīī ī īīīīīīī īīīīīīī ī īīī ī īĢīīīīīīīīī īīī īīī ī īīīīĢīīī īīšīī īī§īīīīīī īīī īī īīīīī¨īīīī īīī īŽīī īīī īīīī īīĢīīī īīĒīīīĸīīīīīīīīīīīīĢīīīĢī īīīīī īĢīī īŦīīīīīīī īīīīīĢīīī īīšīī īī īīīīīīīīīĻīīī īīīīīīīīīī§īīīīīīĻīīīīīī īīī īīī īīī īīīīīĢīīīīīīīīī īīīī¨ī īīī īīĢīīī īī īīīīīī¨īīīīīīīī¨īīīīī īīĒīīī ī īĸīī īīī ī īīīīīīīīī īī īī īīĢīīī ī īŦīīīī īīīĢīīīĢī ī īīī ī īīīīĢīīī īī īīīĢīīīī īīīī īīī īīīĻī īīī īīīīīīīī īīī ī īīī¨īīīīīšīī īīīīīīī īīīīīī īīīīīī¨īīīīīīĻī īīī ī īīīīīī īīī ī īīīīīīī īīīĢī īī īīī ī īīīīĢīīī īīšīī īī īīīīīīī īīīīīīīīī īīīī īīīī īīī īīī īīī ī īīīīīīī īīīīīī īīīīīī¨īīīīīīĒī
ī ī
īīīīīīīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīī īĄīĸīŖī¤ī īīĸīīīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īī˛īīīīīĨīī ī
īŗīĒīŗīīī īīīīīīīīīīīīīīīī
īīī ī īīīīīīīīīīīī īīīīīīīīī ī¨īīīī īīīīĢīīī ī īī ī¨ī īīīīīīī¨ī īīīī īī īīīī ī īīīīīī¨īīīīīī ī īīīīīīī ī īŦīīīī īīī ī īī īīĢīīī ī īīīīĢīīī īīĒī ī īīīīī īŦīīīī īĢīīīī īŦīīīī īīī ī īīīī ī īīī īī īīĢīīī ī ī§ī īīīī īīīīīīīīī īīĻī ī§īīī ī¨īīī īīīīīīī ī īī ī¨īīī ī īīīī īīīĻī īēīī īĻī īīīī īīīīīīī īīīīīī īī īīīīīīī īĒīīī ī īīī īīīī¨īīīīīīīīīīīīīĢīīī īīī¨īīīīīīīīīī¨īīīīīīīīīīī¨ī īīīīīīī¨īīīīīīĢī īīīīīīīī īīī īīīī īīīīīīīīīīīī īīīīī īīīīīīīīīīīīīīīīīīī¨īīīīīīīīīī īīīīīīīī īīī īīĢīīī īĒīīīīīīī īŦīīīī īīī īĢī īīī īīī īīīīīīąī īī īīīī¨ī īīīīīī īīīīīīī ī īīīīī ī īīīīī īīīīīīīī īīī īīīīī īīīī īīīīīīīīī¨īīīīīīīīīīĒī
ī īŗīĒīĨīīīīīīīīīīīīīīīīīīīīīīī
īīīī īīīīīīīīī īī īĸīīīīī¨īīīīīī īī īīīīīīīīī īī īīĢīīī īī ī¨īīīī ī§ī ī īīīĢī īīī īī ī§īī īī īī īīīī īīīīīīīīīĻī īŦīīīī īīī īīīīīīīīī īīī īīī ī ī īī īīīī īī īīīīīīīīī ī¨īīīīīīīī īī ī§īī īīī īīīī¨īīīīīĒī ī īīīīīīīīīīī¨īīīīī ī ī´ī īīīĢī īīīīīīī īīīīī īīīīī¨ī īīī īīīīīĒī ī ī´ī īīī īīīīīī īīīīīīīīīīīīīīīīīīīī īīī īīĢīīī īīĒī ī ī´ī īīī īīīīīīīīŦīīīī īīīīīĢīīī īīīŦīīīīīīī īīīīīīīīīī īīīīīīīīīīīī¨īīīīīīĒī ī ī´ī īĸīīīīīī īīīīīīīˇīīīīīīīīīī īīīīī ī ī¨ī īīīĒī ī ī´ī īīī īīīīīīī īīĢīīī īīīīīī§ī īīīīīĢīīī īīĻīīīīīīīīīīīīī īīĢīīī īīī īĢī īīīīīī ī ī¨ī īīīī īīīīīī īīīīīī īīīīīīī¨īīīīīīīīīī īīī īĢī īīīĒī ī ī´ī īīīīīŦīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīī īī¨īīīīī īīīīīī¨ī īīĒī ī ī´ī īīī īīīīī īīīīīīīīīī īīīī īīī§īīīīīīīīīīīī īīī īīī ī īī īīĢīīī īī īīīī īī īīīīīīī¨ī īīīīīīīīīīīīīīīĒī ī ī´ī īīīĢī īīīīīī§īīīīīīīīīīī īīĒī ī ī´ī īŖī īīīīī§ī īīīīŦīīīīīīŦīī īī īīīīīīīīīī īīīīīīīīīīīīīīīīīīīī īīĒī īīīīīīīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīī īĄīĸīŖī¤ī īīĸīīīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīŗīīīīīĨīī ī
ī īŗīĒīģīīīīī īīīīīīīĸīīīīī¨īīīīīī
īīī ī īīīīĢīīī īī ī¨īīīī ī§ī ī īīīĢī īī īīī ī īī īīīī īī¨īīīīī īīī īī īīŦīīīąīĻī īīīīī ī¨īĻī īīīī¸īīī īīīīī īīīī īīī īī īŽīīīī īī īīī īī īīīīī¨ī īīī ī īīīīīīīīī īī īī īīĢīīī īīĒī ī īīīīī īīīī īīī ī¨īīīīīīīīīīŦīīīīīīīīī§īī īīīīīīīī īīīīīīī§ī īīī īīīīīīīīīīīīīīīīī īīĒī
ī īŗīĒīŧīīīīīīīīī§īīīīīīīīīīīīī īīīīīīīīī īī
īīīīī īīīīī¨ī īīī īīī īīīīī īīī īīī ī īīī¨īīīīīšīī īīīī īīīĢī ī īī īī īīī īī īīīīīīī īīīīīīī īīĒīī īīīī īī īīīīīīī īīī¨īīī īīīīīī īīī īīī ī īīīīīīīīīīĢī īī īīīīīīīīīīīīīīī¨ī īīīīīīī īīī īīīīīīīī īīīīīīīīī§īī īīīīīīīī īīīīīīīīīī§ī īīī īĢīī īŦī īīīīīīī ī īī īīĒī
ī
īĨīĒīīī¤īīīīīī ī¨ī īīī ī
īīīīī īīīīīīī īŦīīīī ī§ī ī ī īīīīīī īī ī§īī īīī ī īĸīī īŊīīīīī īī īīīī¸īīī ī¤īī īīīīīĢī ī īī īī¨īĒī īēīīīīīīīīīīī¨īīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīĻīīŦīīīīīī¨īīīīīīīīīī īīīīīī īīīīīīĻī īī īīīīīīīīīī īīī īīīī īīīĻī īīī ī¨īīī ī īī īĢī īī ī īī īīīīīī īī īīī īīī īīīī īīīīīīīīīī īī īī¨īīīīīīīī īīī ī ī¨īīīīī¨ī īīīĒī īļīī īī ī īīīī īīīī īīīīīĢīīīī īī īīī īīī īīī īīī īīī¨īīīīī īīīīī īīīīī¯īīīīīīīīīīīīīīīī īīī īīīīīī°īīīī īīīīīī īīī īīĻīīīī īīīī¨īīīīīī¨īīīīī īīīīī īīīīīīīīīīĢīīīī īīīīīīīī īīīīīīīīī§īī īīīīīīīīīīī īīĒī
ī īģīĒīīīŖī īīīīīīīīīī ī
īžīīīąīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīĻīīīīī īīīīīīīīīī īīīīīīīī īīīīīīīī ī īąī ī īīīīīīīīīīīīīīīīīīĒī ī ī¤īīīīīīīīīī ī īīī ī īīīīī īīī īīī ī īīīīīīīī īīīīī īŦīīīī īīī īīīīīīīīī¨ī īīī īīīīī īīī īīī īīīīīī īīīīīī§īī īīŦīīīīīīīīīī īīąī īīĒīīīŋīī īīīīīīīīīī īīīīīīīīīīīīīīīīīīīīī¨īīīīīīīīīī īŦīīīī īīīīīī īīĒī ī ī ī īīŦīīīąī īŊīīīīī ī¨ī īīī ī īī īīīīˇīī īīīīīīī īī īī¨ī īīīīī īī īī īīī īīī īīī ī īīīīī īīī īīī ī¨īīīīīīīīīīī īīīī īīī¨īīīīīī īīīīī īī īī īīŦīīīąī īīī ī īīīīī ī īīīī īīĢīīīīī§īīīīīīĻī īī īīīīī¨īīīī īĻīīīīīīī īīīīīīīĒī ī īī ī¨īīī ī īīīī īīī ī īīī ī īīīī īīī īīī¨ī¨īīīīīīīīīī īŦīīīī īī īīī¨īīīī īī īīī īī īīŦīīīąī īīīī¨ī īīī īīīīˇīīīī ī īīīīīīīīīĒī ī īīīī īī īī īīīīī¨ī īī ī§īī īīī¨ī īˇī§īīī īī īīī īīīīĢī īīīīī īīīīīīīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīī īĄīĸīŖī¤ī īīĸīīīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīĨīīīīīĨīī ī
īīī īīīīīīīīīī īīīīīīīī¨ī īīīīĻīī ī¨īīīīĻīīīīīīīī īīīī īīīīīī īīīīīīīī¨īīīīīīīī īĒī ī īēīī ī ī īī īī īīīī ī īī īīŦīīīąī īī¨īīī ī¨ī īīī īī īīĢī īī īīī īīīī īīīī ī ī¨ī īīīī¨īĻī īīī īīī īī ī§īīīīīīīīī īīīīīīī īīīīīīī īīīīīīīīīī¨ī¨īīīīīīīīīīī§ī īīŦī ī īīī īīīīīīīīīĒī ī
īŧīĒīīīī īĢīīīīīīīīīīīīīī ī
īī īĢīīīīīīīīĒīīĻīīīī¸īīŧī¸īīīīīīīīī
īīīīīīīīīīīīīīīīīīī
īīīīīīī īīīīī
Group I.T. Services Spicerhaart Group Ltd Password Policy
Created: 07/10. Amended: 05/11. Section of: Corporate Security Policies Target Audience: Users, Technical CONFIDENTIAL Page 1 of 5
The Spicerhaart Group Ltd, including all subsidiary companies, is hereinafter referred to as "the company."
1.0 Overview A solid password policy is perhaps the most important security control an organization can employ. Since the responsibility for choosing good passwords falls on the users, a detailed and easy-to-understand policy is essential.
2.0 Purpose The purpose of this policy is to specify guidelines for use of passwords. Most importantly, this policy will help users understand why strong passwords are a necessity, and help them create passwords that are both secure and useable. Lastly, this policy will educate users on the secure use of passwords.
3.0 Scope This policy applies to any person who is provided an account on the organization's network or systems, including: employees, guests, contractors, partners, vendors, etc.
4.0 Policy 4.1 Construction
The best security against a password incident is simple: following a sound password construction strategy. The organization mandates that users adhere to the following guidelines on password construction: Ãĸ€Ë
Passwords should be at least 8 characters.
Ãĸ€Ë Passwords should be comprised of a mix of letters, numbers and special characters (punctuation marks and symbols).
Password Policy
password_policy.indd 1
Confidential
23/07/2013 10:40
Group I.T. Services Spicerhaart Group Ltd Password Policy
Created: 07/10. Amended: 05/11. Section of: Corporate Security Policies Target Audience: Users, Technical CONFIDENTIAL Page 2 of 5
Password Policy
password_policy.indd 2
Confidential
23/07/2013 10:40
Group I.T. Services Spicerhaart Group Ltd Password Policy
Created: 07/10. Amended: 05/11. Section of: Corporate Security Policies Target Audience: Users, Technical CONFIDENTIAL Page 3 of 5
âĸ Passwords must be comprised of a mix of upper and lower case characters and numbers. âĸ Passwords should not be comprised of, or otherwise utilize, words that can be found in a dictionary. âĸ Passwords should not be comprised of an obvious keyboard sequence (i.e., qwerty). âĸ Passwords should not include "guessable" data such as personal information about yourself, your spouse, your pet, your children, birthdays, addresses, phone numbers, locations, etc. A good password is more than just a âcomplexâ password. A good password is one that is not easily guessed but still easy to remember. It should be long and should consist of letters, numbers, and symbols, but still easy to type quickly with few errors. For example "J0hn99" would pass Microsoftâs complexity requirements, "J0hn99" is not as âstrongâ a password as it appears. Most password crackers have rules that can try millions of word variants per second. Replacing the letter "o" with the number "0" and adding a couple numbers is no big deal to a password cracker. A better approach is to be less predictable. Rather than replacing "o" with "0", try replacing "o" with two characters such as "()" as in "j()hn". And of course, making your password longer will make it even âstrongerâ. Ideally 8 characters or more. Although most users do not realise it, Windows allows spaces in passwords. In fact, if you can view a character in Windows, you can use that character in a password. Therefore, spaces are perfectly valid password characters, however do not to begin or end your password with a space. Spaces can actually make it easier for users to come up with more complex passwords. A pass phrase such as âDonât Eat Yellow Sn0wâ is an example of a good password. Creating and remembering strong passwords does not have to be difficult. Substituting numbers for letters is a common way to introduce extra characters - a '3' can be used for an 'E,' a '4' can be used for an 'A,' or a '0' for an 'O.' Symbols can be Password Policy
password_policy.indd 3
Confidential
23/07/2013 10:40
Group I.T. Services Spicerhaart Group Ltd Password Policy
Created: 07/10. Amended: 05/11. Section of: Corporate Security Policies Target Audience: Users, Technical CONFIDENTIAL Page 4 of 5
introduced as well: an 'S' can become a ',' or an 'i' can be changed to a '!.'
4.2 Confidentiality
Passwords should be considered confidential data and treated with the same discretion as any of the organization's proprietary information. The following guidelines apply to the confidentiality of organization passwords: âĸ
Users must not disclose their passwords to anyone.
âĸ Users must not share their passwords with others (co-workers, supervisors, family, etc.). âĸ Users must not write down their passwords and leave them unsecured. âĸ Users must not check the "save password" box when authenticating to applications. âĸ Users must not use the same password for different systems and/or accounts. âĸ
Users must not send passwords via email.
âĸ
Users must not re-use passwords.
4.3 Change Frequency
In order to maintain good security, passwords should be frequently changed. This limits the damage an attacker can do as well as helps to frustrate brute force attempts. At a minimum, users must change passwords every 30 days. The organization will use software that enforces this policy by expiring users' passwords after this time period.
4.4 Incident Reporting
Since compromise of a single password can have a catastrophic impact on network security, it is the userâs responsibility to immediately report any suspicious activity involving his or her passwords to the IT Manager or IT Director. Any request for passwords over the phone or email, whether the request came from organization personnel or not, should be expediently Password Policy
password_policy.indd 4
Confidential
23/07/2013 10:40
Group I.T. Services Spicerhaart Group Ltd Password Policy
Created: 07/10. Amended: 05/11. Section of: Corporate Security Policies Target Audience: Users, Technical CONFIDENTIAL Page 5 of 5
reported. When a password is suspected to have been compromised the IT Manager or IT Director will request that the user, or users, change all his or her passwords.
4.5 Applicability of Other Policies
This document is part of the organization's cohesive set of security policies. Other policies may apply to the topics covered in this document and as such the applicable policies should be reviewed as needed.
5.0 Enforcement This policy will be enforced by the IT Manager and/or Executive Team. Violations may result in disciplinary action, which may include suspension, restriction of access, or more severe penalties up to and including termination of employment. Where illegal activities or theft of company property (physical or intellectual) are suspected, the company may report such activities to the applicable authorities.
6.0 Definitions Authentication A security method used to verify the identity of a user and authorize access to a system or network. Password A sequence of characters that is used to authenticate a user to a file, computer, network, or other device. Also known as a passphrase or passcode. Two Factor Authentication A means of authenticating a user that utilizes two methods: something the user has, and something the user knows. Examples are smart cards, tokens, or biometrics, in combination with a password.
7.0 Revision History Revision 2.1, 22/07/2010 SRL Revision 2.2, 03/05/2011 SRL
Password Policy
password_policy.indd 5
Confidential
23/07/2013 10:40
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīī īīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīī īĄīĸīŖī¤ī īīĸīīīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīīīīīīĨīī ī
īīīīī īīīīīīī īīīīīī īīīīĻī īīīīīīīīīī īīīī īīī§īīīīīīīī īīī¨īīīīī īīĻī īīī īī īī īīīīīī īī īī īī īīī īīīīīīīīīŠīīī īīīī¨īīīīīĒīŠī ī
īīĒīīīīĢī īīĢīī īŦī ī
īĸīīīīī¨īīīīīīīīīī īīīīīī īīī īī īīīīīīīīīīīīīīīīī īīīŦīīīīīīī īīīīīīīīīīīī īĢīīī īīīīī īŦīīīīī īīī īī īī īīīī īĒī ī īĸīīīīī¨īīīīīī īīī īīīīī īī īīī īŦīīīīīīīīīīīī īīīī īī īīĢī īīī īīīī īīīīīī¨īīīī īīīīīīīī īīīī¨īīīīīŽīīīīīīīīīīīīī īīŦīīīīīīīīīīīīīīīīīī īĒīīīĸīīīīīī īīīīī īī īīīī ī īīī ī īīī¨īīīīī īīīīīĻī īīīīīīīī ī¨īīīī ī§ī ī īīīĢī īī īīī īīī ī īī īīīīīīī īīī īīī ī īīī¨īīīīīŽīī īīīīīīīīī īĸīīīīī¨īīīīīī īī īīīīīīīīī ī¯īĸīī°ī īī īīīīīī īī īīī ī īīīīī ī īīīīī īīī īīīīī īīīīīī īīī īīīīīī¨īīīīīīīīīīīīīīīīĒī
ī īīĒīīīīīīīīī ī ī
īīī īīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīī īīīī¨īīīīīŽīīīīīīīīīīīīīīīīī¨īīīīīī īīīīī ī¨īīī§īīīī īīīīīīīīīīīīīīīīīīīīīī īīīī īīīī īīīīīīīīĒī
ī īąīĒīīīīīīī ī ī
īīīīī īīīīīīī īīīīīī īī īīī īīī ī īīīīīīīīī īī īīīīīīī īīī īīī ī īīī¨īīīīīŽīī īīīīīī¨īīīīīī īīīīī ī¨īīĻī īīīīīīīīīīĻī ī§īīī īīīī īīī¨īīī īī īīīĻī īīīī īīī¨īīīīī˛īīŦīī īī īīī īīī¨īīīīī˛ īīīīĢīīī īī īī īīŦīīīī īī īĢīīī īīĻī īī īīĢī īīīĻī īī īīīīīīī īīī¨īīīī īīīĻī ī¨īī§īīī ī īī īĢīīī īīĻī īīīī īīīīīīī ī ī¨ī īīīīĒī ī īīīīīīīīīīīīīĻī īīīī īī īīīīī īŦīīīīīīī īīī īīī īĢīīīīīīīī īīī ī īīī¨īīīīīŽīīīīīīīī īīīīīīīĢī īī īīī§īīīīīīīīīīīīīīĒīīī ī īīī īīī īīīīī īīīīīīīīīīīīīīīīīīīīīĢī īīīīīī īīīīīīīīīīīī īīīīīīīīīīīīī īīīī¨īīīīīŽīī īĸīīīīī¨īīīīīīīī īīīīīīīīīīīīīīīīīīīīīīī īĻīīīīīīīī īīīīīīīīīĢī īīīīī īīī īīīīīīīīīī īīīī˛īĸīīīīī ī¨īīīīīīīī īīī¨īīīīīīīīīīīīīīīīīī ī¨īīīīī ī īīī īīīīīīīĒīīīŗīīīī īīīī īī īīŦīīīī īīīŦīīīīī§ī īīīĢī īīīīīĻīīīīī īī¨īīīīīīīī īīīīīī īīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīī īŦīīīīīīīīī ī´īīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīī īīĒī
ī ī ī
īīīīīīīīīīī īīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīī īīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīī īĄīĸīŖī¤ī īīĸīīīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīīīīīīĨīī ī
īĩīĒīīīīīīīīī
ī īĩīĒīīīī īīīīīīīīļīīī īī
īīīīīī¨īīīī¨īī¨īĻīīīī īīīī¨īīīīīīŦīīīīī¨īīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīĻīīīīīī īīī īīīīīī īīī ī ī´īī īīīīī īīīīīī īīīīˇīīī īīī īīīīī¨ī īīīīī ī¨īĻī īīī īī īīīī ī īīī ī īīī¨īīīīīŽīī īīīī īīīĒī ī īĸīī īīīīīīīīī īīīī īīīīīīīīī ī īī īīīī īī ī¯īīī īīīīīīīīīī īīīīīī īīī īī ī¸ī īīī īīīīīī īĻī īīīīīī īīī īī īŖīšī īĄīīīīīīīī īīĻī īēīīīīīīīīī īīīīīīīīī ī īīīī īī īģī ī ī īŦīīīīī īīīī īīī īīīīīīīīī°ī īīī ī īīī¨īīīīī ī¨īīīī īīīīĢīīī ī īī īīīīīīī īīī īīīī īīīī§īīīī īīīīīīīīīīīīīīī īī īīīīī īīīīīīīīŧīīī īīīŦīīīīīīīīī īī§īīīīīīīīĒīīīī īīīīīīī īŧīīī īīīīīīīīīīīīīīīī īī ī īīī§īīīī īīīīī īīīīīīī īī īīī īīī īīī īīī ī ī§īīīīīīīī īīī īīīīīī ī īīīīī īīī ī īīīī īīī īī īīīī īīī§īīīīīīīī īīīĒī ī īŊī īīīī īīīīšī īīīīīīīīīīīīī īīī ī ī īŊī īīīīīīīīīīīīī īīīīīīīīīīīīīīīīīī īīī ī ī īŊī ī¤ī´īī¨īīī īīīīīī§ī§īīĻīīīī¨ī¨īīīīīī īīīīīīī§īīīīīīīī ī īīī¨īīīīī īīīīī īīīīīīī īī īīī īīī īīī īīī ī ī§īīīīīīīī īīī īīīīīī ī īīīīī īīī ī īīī īī īīīīī ī§īīī ī¨īīīīī ī īīīīīīīīīī īīīī īīīīīīīīīīīīīīīīīīīīīī¨īīīīīī§īīīīī īīīĒī ī īŊī īīīī īīī īšī īīīīīīīīīīīī īīīīī īīī¨īīīīī īī īīīīīī īī īīīī īīīīīīĢī īīˇī īīīīīī īīīīī īīīī ī īŊī īīīīīīīīīīī īī īīīīīīī īīīīīīīīīī īīīīīīīīīīī īīīī īīī īīīīīīīīī īīīīīīī ī§ī ī īīī īīĻī īīīīī īīī īī īīīĻī īī īīīīīīĻī īī īīīīīīīĻī īīī īīī¨īīīīī īī īĢīīī īīĻī īŦīīīī īīīī īīī īīī īīī īī īīīī īīīīīīīī īīīīīīīīīīī§īī īĒī ī īŊī ī¤ī´īī¨īīī īīīī¸īīīīŦīīīīĻīīīīīĢīīī īīīīīīī īīĻīīŦīīīīīīī īīīĻīīīīīī īī īīī īīīīī¨īī ī īīīīĢīīī ī īīīīī īīīīīīī īī īīī īīī īīīīī īīī ī īī īīīīīīī īī īīī īīī ī ī§īī īī īīīīīī īī īīīīīī īŦīīīīīīīīī īīīī¨īīīīīĻīīīīīīīīīī ī´ī īīīīīĢī īīĻīī¸īšīĻīīīīīīīīīĻīīīīīīĸīīīī īīīīīī īīĻīīīīī īī īīīīīīīīīīīīīī īīīīī īīīīīīĒī ī īīīīīīīīīīī īīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīī īīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīī īĄīĸīŖī¤ī īīĸīīīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīąīīīīīĨīī ī
īŊī īīīī īīīīšī īīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīĢī īīīī īīīīīī īī ī īŊī īīīīīīīīīīī īī īīīīīīī īīīīīīīīīī īīīīīīīīīīī īīīī īīī īīīīīīīīī ī¨īīīī ī§ī ī īīī īīĻī īīīīī īīī īī īīīĻī īī īīīīīīĻī īī īīīīīīīĻī īīī īīī¨īīīīī īī īĢīīī īīĻī īŦīīīī īīīī īīī īīī īīī īī īīīī īīīīīīīī īīĒīīīīīīīīīīīīīīīĻīīīīīīīīī¨īīīīīī ī¨īīīīīīīīī§ī īīīīīīīī īī īī īīīīīīī īī īīīī īīīīīīīīīŦīīīīīīī īīīīīīīīīīīīīīīīī īīīīīī īīīĒī ī īŊī ī¤ī´īī¨īīī īīīī¤ī´ī īīīīīĢī īīīīīīī īīīīīīīī īīŦīīīīīīī¨ī¨īīīīīīīīīīīīīīī¨īĒī
ī īĩīĒīąīīīīī īīīīīīīīīīīī
īīīī īīī īīīīīīīīī īīī ī īī īī īīīīīī īīī īī īīīīīīī ī īīīīī īīī īīī ī īīī¨īīīīī īīī ī¨īīī īī īīīī īī īīīīīīī īŧīīī īī īīī īīīīī īīīīīīĢī īī īī īīīīīīĒī ī īīī īī ī īīī ī īī īī īĢī īīīī īīīīīīīīīīŦīīīīīīīīīīīīīīīĻīīŦīīīīīīīī īīīīīīīī īīīīīīīīīīīī īīīīīīĻīīīīīīīīŦīīīīīīī ī īīī¨īīīīīŽīīīīīīī īīīī īīīīīīīīī īīīīīī īĒī
ī
īĩīĒīąīĒīīīžī īīīīģīīžī īīīīīī īīī ī īīī ī īīī īī īīī īīī īīīīīī§īīī īī īīī īī īī īīīīīīī ī¨ī īīīīīīī¨īĒī ī īžī īīīīīī ī¨īīīī§ī īīīī īīīīīīīīī˛īīīīĢīīī īīīī īīīĒīīīīī īī īīī īīīīīīīī¨ī īīīīīīī¨īīīīī ī īīī ī ī¨īīīī īīī ī´īī īīīīĢī ī īīīī īīī ī īīī ī ī¨īīīī īīī¨īīīīīī īīī īīī īīīĒī ī īīī ī īīīīīīĢīīīīīī ī īīī īīīīī īīī ī īīī¨īīīīī īīīī īīī īīīīīīīīĻī īīīīī ī īīīī¨ī īīīīīīīīī īīī ī īīīīīī īīī īīīī īīĻī īīĢī īī īīīŦī īīīī īŦīī īī īīī ī īīīī īīī īīī īīī īīĒī ī īžī īīī īīīī ī§ī ī īīīīī īī īīīī īī īīīīī īīīī īī īīīī ī§ī ī īīīīī īī īīī īī ī īīīīīīīīīīīīīīīĒīīī ī īĩīĒīąīĒīīīžī īīīīīīīīģīīēīīī¨ī īīīīīī īīī ī īīī¨īīīīī īī īŋīīīī īī īīīīī īī īīīīīīī īīī ī§īīī¨ī īīīīīī ī§ī ī īīī īī īīīī īīīī īīī īī īīīī īīī īīīīīīīīīĒī ī īīī ī īīī¨īīīīī ī¨īīīī īīī ī īīīīī īī īīīīīīīīī īīī ī īīīīīī īīī īīīīīīīīŧīīī īīīīīīīīīīĢīīī īī ī¨īīīīī ī īīīīī īīī īīīīīī¨īīīīīīīī īīīī īīīīī īŋīīīī īīīīīīīīīīī īīīīīī§īīĒī ī īžī īīīīīīī īīīī ī§īīī¨ī īīīīīī īīīĢī ī īīī īīīĢīīīīīī ī īīĢī īī īī īīī īīī īīīīī īīīī īīīīīīīīīī īīīīīīī§ī īīīīī īīīīīīīī īīīīīīĢīīīīīīīīī īīĒīīīīīī īīīī īīīīīī ī§ī ī īī īī īīī īīīī§īīī īīīī˛īīīīīī īīīī īīīĻī īīī īīīī§īīī īīī īīī īīīī¨ī īīīī īīīīīī īī īī īīīīīīī īŧīīī ī īŦīī īī ī īīī īī īīī ī īīīī īīīīīīīīī īīĒī ī īī īīīīīī ī§ī īīī īīī īīīīĻī īīī īī ī ī¨ī īīīīīī īīīīīŦī īīīī īīīīīīīī īīĢī īī ī ī´īīīīīī īŦīīī īīīīī īīī īī īīī ī īīī īī īīīīīīīĒī ī īĸīī īī īī īīīīīī īīī īīīīī īīī īīīīī īī īīī īīīī ī§ī ī īī¨ī¨ī īīīīī īīī īīīīī§īī īīĒīīīĸīīīīīī ī¨īīīīī ī īīīīīī īī¨īīīīī īīīīīīī īīīīīīĻīīīīīīīīī īīŽīīīīīī īīī īīīīīīīīīīī īīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīī īīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīī īĄīĸīŖī¤ī īīĸīīīī īī
ī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīĩīīīīīĨīī ī
īīīī ī§ī ī īīīīī§īī īīĒī ī īīī ī īīīīīīīīī īīīīīīīī īīīī īī īī ī§īī īī īīīīīīī īīīī ī§īīī¨ī īīīīīīī¨īīī īīīī ī¨īīīīī īīīīīīīīīī īīīīīīīīīīīī¨ī īīīīīīĒī ī ī īĩīĒīąīĒīąīīīīīī¨īīīīīī ī¨ī īī īī īīīīīīī īīīīī¨ī īīīīī ī¨ī īīī īī īīīīī īŦīīī īīī ī¨īīīī¨īīŧī ī īīīīī īīī īīī īīīĻī īīī īī īīīī īīīīīīīīīīīī īī īĢī īīīīīīīīīīī īīīĒīīīīī īīīī¨īīīīīī¨īīīīīī īīīīī īīīī ī īīī īīīīī īīīīīīīīīī ī¨īīīīīīī īī īīīīī¨ī īīīīī ī¨īĒī ī īīī ī īīīīī ī¨ī ī¨īīīī ī§ī ī ī¨īīīīīīī īīīīĩī´īīĻīīŦīīīīīīī¨īīīīīīī īīīīīī īīī§ī īīīīīīīīīīī īīīīīīīīīīīīī¨ī īīīīīīīīī īīīīīīīīīīīī¨ī īĒī
īĩīĒīĩīīīīīīīīīīīŖīīīīīī īīīīīīī
īī īīīīīīīīīīīīīīīīīī īīīīīīīīīī¨īīīīī§ī ī īīīī īīīīīī īīīīī ī īīī īīīīī īīīīīīīīī īīī ī īīī¨īīīīīŽīī īīīīīĒī ī īīī īī ī¨īīīī¨īī¨īĻī īīī ī īīīīīīŦīīīī īīīīī īīīī īī ī¨īīīī ī§ī ī īīīīīīŦī īīī ī īŊī īīī¨īīīī īī īīīī ī īīī īīīīīīī ī§ī ī īīīīīīīīī īī īŦīī īī ī īīīīīī¨īīīīīī īīī īīī ī īīīī ī īīīīīīīīīīī§ī īīī ī īīī§īīīīīīīīī īīīĒīīī ī īŊī īīīīīīī īīīīīīīīīīīī īīīīīīĢī īīīīīīī¨īīīīīīīīīīīīīīīīīī§ī īīīīīīīīī īīīīīīī īīī¨īīīī īī īīīī ī īī īŦīī īī ī īīī ī īīīī ī īī īīīī ī§ī ī īĢīī īŦī īī ī§īī īīīīī ī īīīī īīīīīīīīī īīīīīīĢīī īŦīīīī īīīīīīī¨īīīīīīĒī ī īŊī īīī īīī ī¨īīīī īīīī īīīī īīī īīīīī īīīŦīī īīī īīī īŦīīīīīīīīīīīī īŦīī īī īī īīĢīīīī īīīī īīīī ī´īī īīī īīīīī¨ī īīī īīīīīĻīīīīīīīīīī īī īīīīīīīīī īīŦīīīīīīīĒī ī īŊī ī ī īīŦīīīīīīī§īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīī īīīīī īīīīīīī īīīīīī ī īīī§īīīīī īīī īīīīīīīīī īīīīī īīī§īīīī īīīīī ī¯īīĒī īĒīĻī ī ī´īī īīī īī īŦīīīīīī īīīī īīī īĸīīī īīī īī īīīīīīīī°īĒī ī īŊī īīī ī īīī¨īīīīī īī īīī¨ī¨ī īīīī īīīīī§īīīīī īī īīŦīīīī īīīīīī īīīīī īīī ī īīīī īīī īīī īĒī
ī īĩīĒīīīīīīīīīīīīīīīī ī¨īīī īīīīīīī
īĸīī īīīīīīīīī īīī īīīīī īīīīīī īīī ī īīīīī īīī īīī ī īīī¨īīīīīŽīī īīīīīī¨īīīīīī īī īīīīīīīīī īīīī īīīĻī īīīīī īīīīīīī īīīīĢīīī īī īīī ī īīīīī īīīī īī ī§ī īīīŦī īīī īī ī īīīīī īīī īīīīīī ī¨īīīīī ī¨īī īīĢī īīīī īīīī īīīīī¨īīīī¨īīī īīīīīīī īīīĒī īīīīīīīīīīī īīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīī īīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīī īĄīĸīŖī¤ī īīĸīīīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīīīīīīĨīī ī
ī
īĩīĒīīĒīīīīīīī¨īīŧīīīīīšīīīīīīīīīīīīīīīīīīī īīī īĸīī īīīī īī īīī ī¨īīīī¨īīŧī ī īīī ī īīīīī īīī īīīīī īīīīī īīīīīīīī īīīīī īīī īīī īīī īīī īīī¨īīīīīīīīīī īīīīĻīīīī īīīīīīīŦīīīīīīīīī īīīī īīī¨īīīīī§ī īīīīīīīŦī īīī ī īŊī īīīīī īī īīīīī ī¨īīī īĸīī īī īīīīī ī¨ī īīī īīīī īīī īīī ī īīīī īīī ī ī´īī īīī īī īī īīīīī īīī īīī¨ī ī īīī īīīīīīī ī§ī ī ī¨īīĢī īī īīī īī īī īīīī ī īīī īī īīī īīīī īīŦīīī ī īī īīīī īīĒī ī īŊī īīī§īīī ī īī īĢīīī īīī īīī īīīīī īīī īīīīīīīīī ī¨īīīī ī§ī ī īīīī īī īīī īīī īĢī īīī īīīīī īīī īīī īīī īīī ī¨īī§īīī ī īī īĢīīī īīĒī ī īšī īī īī īīī īīī ī īīī¨īīīīīŽīī īīī§īīī īīŖī īĢīīī īīīīīīīīīīīīīīīīīīīī īĒī ī īŊī īīīīī ī¨īī īīīīī īīīīī ī īīīīīīī īīīīīī īīīīīī īīī īīīīī īīī īīīīīīīīī ī¨īīīīī§ī īīīīī īīīīīīīī īĢī īīīīīīīīīīīīīī īīīīīīīīī īī īīīīīī ī¨īīĒīīīšī īī īīīīīīīī ī īīī¨īīīīīŽīīīīīīīīī īīīīīīīŖīīīīīīīīīīīīīīīīīīīīīīī īĒī ī īĩīĒīīĒīīīīīīī¨īīŧīīīīīšīīīīīīīīŖīī¨īīī ī īīīīī ī¨īī īīīīī īīīīī ī īīī¨īīīīī īīīīī īīī ī īīīī īī īī īīīīīīĢī ī ī īī īīīīīīīī īī īĢīīī īī īīīīī īīī ī īīīīī īīīī§īī ī īīī ī§ī īīīī īīīīīĢī īīī īīīīī īīī¨īīī īīĒī ī īĸīī īīīī īīīīīī¨īīīī¨īīŧī īīīī īīīīīīīīīīīī¨īīī īĻīīīī īīīīīīīŦīīīīīīīīī īīīī īīī¨īīīī ī§ī īīīīīīīŦī īīī ī īŊī ī¤īīĢīīīīī¨ī īīīīī īīīīīīīīī īīīīīīī īī ī īī īīī ī īīī īīīīīīī ī īīĢīīīīī¨ī īīīīīīīīī¨īīīīīīīīīī ī¨īīīŦīīīīīīīīīīīīīīīīīīī īīīīī īīī§īīīīī ī ī¨īīīīīīīīīī īīĒīīīīī īī īīīīīīīīīīīīīīī īīīīīĢīīīĢī īĻīī§īīīīīī īīīīīīīī¨īīī īīīīīĻī īī ī¨īī īīīīīī īīīīīīīī¨īīīīīīĒī ī īŊī īīīīī īī īīīīīīīīīī īīīīī īīīī īī ī¨īīīī ī§ī ī īīīīīīŦī īī īŦīī īī īīī īīīīī īīīīī ī¨ī īīīī īīĒī ī īīīīī ī¨īīī īīīīīīī ī īīī ī īīī īī īīīīīīīīīī īŦīīīīī īīīīīī īīī īīīī īī ī¨ī īīīī īīī ī īīīīī ī īīīīī īīī ī īīīīī īī īīīī¨ī īīīīīīī ī īī īīīīīīīīīīīīī¨īīīī¨īīŧī īīĒī ī īŊī īīīīīīī ī¨īīīī īīī ī¨īīīī īīīī ī§ī ī īīī īī īīī īīīī´īī¨īīīī īīī īīī¨īīīīī īīīīī ī¨īīīīīī¨ī īīīīĒī ī īŊī ī¤ī´īī īīī īīī īīī ī īīīī ī īīī īī īīīī ī īīīīīī īīīīīī īīīīī ī¨īĻī īīī īī īīīŋīīīīī īīīīīīīīīīī īīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīī īīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīī īĄīĸīŖī¤ī īīĸīīīī īī
ī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īī īīīīīĨīī ī
ī¨īīīīīīīīī§ī īīīīīīī īīīī§īīĢī īīīī¨īīīīīīīīīī ī¨īīĒīīīī īīīīīīīīīīīŦīīīīīīī īīīīīīīī īīīīīī¨īīīīīīīīīī ī¨īīīīīīīīīīī īĢī īīīīī īīīī īīīīīī ī¨īīīīīīīī§īī īī īīīī ī§ī īĢī īīīī īīĒī ī īēī īĢī īīīī īī ī¨īīīī īī īĢī īī ī§ī ī īīīīī īī īŦīī īī ī īīī īī īīīī ī§ī īīīīīīī īīīīīīīīīī¨īīīīīīīīīī ī¨īīĒī ī īŊī īīīīīī īīīīīīī§īī ī īīīŦī īī īīīīīīī īī ī¯īīīīī°ī īīīīˇīīī īīīīī ī˛īīīīī īīīīīī īīī īīī īŋīīīī īīīīīīīī¨īīīīīīīīīīīīī ī¨īīīīīīī īīīīīīīī īīīīīīīīīīīīīīī ī¨īīĒī īīī īī ī īī īĢīīī īī ī¨īīīī īīīīīī īī īŦīīīīīīīī īīīīī īīīĢī īīī īīī ī īĢīīīī ī īīī īīī ī īīīīī ī¨īīīīīīīī īīīīīī ī¨īīīŦī īī īīīīī§ī īīīī¨īīī īīī§īīīīīīīŦī īīīīīīī īĒī ī īŊī īēīīīīīī īīīŦī īī īī īī īīīīīīī īīī ī īīī īī¨īīīīīīīī īŦīīī īīī ī¨īīīīīīīī īīīīī ī¨īīīīĢīīīīī§īīīīīīī§ī īīīīīīīīīī§īīīīīīīīīīīīīīĒīīīīīī īīīīīī ī¨īīīīīīīīī ī§ī īīīīīīīīī īīī§īīīīī§īīīīīīīī īī īīīīīīĒī
īĩīĒī īīĄīīī īīīī īĢī īīīīīī
īĸīīīīīīīī īīīī¨īīīīīŽīīīīīīīīīīīīīīīīĢīīī īīīīīīī īīŦīīīīīīīī īīīīīīī¨īīīī¨īīŧī īīīīī ī īīīīīīīīīīīī īĒīīīĸīīīīīīīīīīīīīīīīī īīīīīī īīīīīī ī¨īīīīī ī īīĻīī īĢī īīīīīī¨īīīīīīīī īīīīī ī§ī ī īīīīīīīīīīīīī īīī īīī¨īīīī īī īīīīī ī¨īīĒī ī īĄīīīīī īīĻī īīī ī īīī īīī ī ī īī īīīīīīīī īīī¨īīīī īīīīīīīīĸīīīīīīī ī¨īīĻīīīī īīīīī īīīīīī īīīīīīīī īī īīīī īīīīīīīīīīīīīīīīīīīīī īī īīīīī īīīī īī īīī īīī īīī īīī ī īīī¨īīīīīŽīī īīīīīī īĒī ī īīī ī īīīīī īīīī īī ī§ī īīīŦī īīī ī īīīī īīī īī īīī ī§ī ī īīī īīīīīī īīī īīī ī īīī¨īīīīīŽīī īīīīīī¨īīīīīī īī īīīīīīīīī īīīī īīī īīīīīīīīīīīīīīīīīī¨īīīīīīī īīīī¨īīīīīŽīīīīĢī īīīīīīīīī īīīīī īīīīīīīīīīĒī ī īŊī īĄīīī īĻī īī¨īīī ī īīīīī¨īīĻī īīīīˇīīī īīīīīī īīīīīī īīīīī ī¨īī ī¨īīīī ī§ī ī īīī īīĻī īīīī ī¨īīīīīīīīīīī¨īīīīīīīī īīī īīīīīīīīīīīīīīīīīīīīīī§īī īīīīīīīīīī īīĒīī ī īŊī ī¤īī īīīīīīīī īīīīī īīī ī¨īīīī īīīī ī§ī ī īīĢī īīīīīī īīĒī ī īīī īīī ī¨īīīī īīīī īīīīīī ī¨īīīīīīī īīīīŦī īīīīīīīīīĻīī ī´īī īīīīīīīīīīīīĻīīīīīīīīī īīīīīī īīīīīīīīīī īīī īīĒī ī īŊī ī¤ī´īī īīīīīī īīīīīīĻī īīīīī ī īīīīī īīīīīīĻī īīīŦī īī īīīīīīīĻī īīīī īīīīīī īīīīīīī§īī ī īīīŦī īīīīīīīīī īīī¨īīīīī§ī īīīīīīī īīīīī ī ī˛īŦīīī īˇīīīī ī ī˛īīīīīīīĢīīīī īīīĒī īŊī īīīīī īī ī īī īīīīīīīī ī īŋīīīī¨ī īīī īīīīīīī ī§ī ī īīīīī īī īīīī īŦīī īī īīīī īīī īīī ī īīīīī ī´īī īīī īīīī īīīīīīīīīīīī¨ī īī¯īīĒī īĒīĻīīīīīīīīīīīī˛ī§īīīīī īīīīīīīīī°īīīīīīīīīī§īī īĒī ī īŊī īī īīīīīīī īīīīī īīīīīī īīī ī īī īīīīīīīī ī īŋīīīī¨ī īīī ī¨īīīī ī§ī ī īī īīīīī¨ī īīĒīī īīīŦī īī īīīīīīĻī īīī§īīīīīĻī īīīī īīīī īī ī īī īīīīīīīī īī īĢīīī īī ī¨īīīī ī§ī ī īīī īīī īī īīīī ī ī´īī īīīīĢī ī īŦī īīī īīī īīīīīīīĒī ī īĸīī īīĢī īīīī˛īŦīīīī ī īŋīīīī¨ī īīī īīī īīīīīīĻī īīī ī īīīīīīīīīīī īīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīī īīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīī īĄīĸīŖī¤ī īīĸīīīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīīīīīīĨīī ī
ī īŋīīīī¨ī īīī ī¨īīīī ī§ī ī īī īīīīī īī īīī īīīī īī īīīī īīī īī īīĢīīī ī īī¨ī¨ī īīīīī īīī īī īī īīīīīīīīīīīī īīī īīī ī īīīīīŦī īīīĒī ī īŊī īī īī¨īīī ī īīīīī¨ī ī¨īīīīīīīīīī īī īīĢīīī ī ī¨īīīī ī§ī ī īīī īī īīīīī īŦīīīī īīī īīī īī īī īīīīīīī īīīīī¨īīīīīī ī¨īīīīī ī īīīīīīīīīīīī¨īīīīīīīīīī īīīīīīīīīīīīī˛ī§īīīīī īīī īīīīīīĒī
ī īĩīĒīīī¤īīīīīīī īīīīīīī
īĸīī īīī īīī ī īīī¨īīīīīŽīī īīīīīīī īīī īīīīĢīīī ī īī īīīī ī īŦīīīīīīīī ī īīīī ī ī¨īīīīī ī īīĒīī īīīīīīīīīīī īīīīī ī īŦīīī ī īīī īī īīīī ī ī´īīī īīī ī īīī ī¨īīī īī īīī īī īīīīī īī īīīīīīī īīīīīīīī īīīīīī īī īīīīĻī ī§īīīīīīīīīīīīīīīīīīī īīīī īīīīīī¨īīīī¨īīŧīīīīīīīīīīīīīīī¨īīīīī īīīīī ī¨īī īīīī īīīīīĒī ī īīī ī īīīīī īīīī īī ī§ī īīīŦī īīī ī īīīī īīī īī īīī ī§ī ī īīī īīīīīī īīī īīī īīīī¨īīīīīŽīīīīīīīī¨īīīīīīīī īīīīīīīīī īīīī īīīīīīīīīīīīīīīīīīīīī¨īīīīīīī ī īīī¨īīīīīŽīīīīĢī īīīīīīī īīīīīīīīīīīīīīĒī
ī
īĩīĒīīĒīīīīī īīīīīĸīī īīīīīīīīīīīīīēīīīī īī īŗīīīīīī īīī ī īīī¨īīīīī īīīīīīīīī ī īī īīīī īī īĸīī īīīīīīīīīīīī ī¯īĸīŖī°ī ī§īīīī īī īīī īīīī īīīīīīīīīī īīīīīīīīīīīīīīī īīīī īīīīīīīīīīīī īīīī¨īīīīīīīī ī¨īīī īīĒīī īīī īīīī¨īīīīīīīīīī īīīī§īīīīī īīīīī īīīīīīīŦīīīīīīīīī īīīī īīīīīīīīī īīīī īīīī īĸīŖīī§īīīī īīĒī ī īŊī ī¤ī¨īīīīī ī īīī īīīīīī īĸīŖī ī§īīīī īī īīī ī īī īŋīīīī īī īīīī ī¨īīīī ī§ī ī īīīīīīīī īīīīīīīīīīīī¨ī īīīŦīīīī īīīīīīī¨īīīīīīīī ī¨īīī īīĒīī¤ī¨īīīīī ī īīī¨īīīī īī ī¨īīĢī īīīī īīīī§īīīī īīīīīī¨īīĢīī īŦīīŦīī īīīīīīīīīīīī īīīīīīī īĒī ī īŊī ī īīī˛ī ī¨īīīīī ī īīˇīīīīīīīīīīīīīīīīīīī§īīīī īīīīī īīī īŋīīīī īīĒīīīīī īīīīīī īī īī īīīī ī§īīīī īī ī¨īīīī īīī īīīīīī īĢīīīīīīīīĒī ī īīī ī īīī¨īīīīī īīīīīīī īīīĢī īīīīīīī ī īĢīīīīīīī ī§īīīī īī īīīīī īīīīī¨īīīīīīīīī ī ī´īīīī ī īīīī īī īī īī¨īīī ī īīīīīī īīīī īīīīīīīīīīī īīīīīīīīīīīīīī īīīī§īī īīīīīīīī īĒī ī īŊī īīī īīīī¨īīīīīīīī īīīīīīīīīīīīīīīīīī īīī§īīīī īīī¨ī¨ī īīīīī īīīīīīīīīīīīī īī īī īīīī īīĢīīīīīĒī ī īī īī ī¨īīīīīīī ī§īīīī ī ī¨īīī ī§ī ī īīīīīīī īī īīī īīīīī īīīī īī īīīīīīīīī īī§īīīī īīīīīī§ī īīī ī˛īī īī īīīī īīĒī ī īŊī īĸīīīīīīīī§īīīī īīī īī īīīīīīīīŦīīīīī§ī īīīīī īīīīīīīīīīīī īīīīī īīīīīīīīī ī¸īšī īīīī īī īŦī īīīī īī īīī īīī īīī īīīīīīīīī īīī§īīĒī ī īīī īīī ī¨īīīī īīīīŦī īīīīīī īīī īīīīīīīīīīīīīīīīīīī īīīīīīīĢī īīīīīīīīīīīĒī īīīīīīīīīīī īīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīī īīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīī īĄīĸīŖī¤ī īīĸīīīī īī
ī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīīīīīīĨīī ī
ī īĩīĒīīĒīīīīīīī˛īīīīšī īŋīīīī ī¨ī īīīī īīī ī īīī¨īīīīī ī¨īīīī ī¨īīīīīīīī īī īīīīī˛īīī īīīī ī¯īīī īīī¨īīīīī īī īĢīīī ī°ī īīī īīī ī īīī§ī§īī īīī ī īīīīī īīī īī īīīī īĢīīīīīīīī ī¨īīīī ī§ī ī īī īŋīīīī īī īīī īīīīī īīī īīīīī īīīīīĢīīīĒī ī īīī ī¨īīīī¨īī¨īĻī īīī ī īī īīīīī īī ī¨īīīī īīīīīīī ī īīī ī īīīīīīŦīīīī īīīīīī¨īīīīīīīīĢīīīīīīīŽīīīīī¨ī īĻīīīī¨īīīīīīīī¨ī īĻīīī īīīīīīīīīīĢīīīīīĻīīīī¨ī īīīī īī īīīīīīĢīīīīīīīīĻīīīīīī˛īīīīīī¨ī īĻīīīīīīīīīī˛īīīīīīī¨ī īĒī ī īĩīĒīīĒīąīīīīīīīīīīīīī īīī īīīīīīīīī īīīīīīī ī§ī ī īīīĢī īī īīīīī īīī ī īī īĢī īī īīī īīīī īīī īīī īīī ī īīī¨īīīīī īīī ī¨īīī īī īīīīī īīī īīīīīīīīīīī ī īīī īīī ī īī īīīīī īīīī īīī īīī īĢīīīīīĒī ī īīīī īī īīī īīīīīī īīīĻī īĢīīīīīīīī ī¨īīīī ī§ī ī ī īīīīīī īī īīīī īīī īīī īī īīī ī īīīīīīī īī īī īŠīīīīīī īīŠīī§īīīīī īīīī¨īīīīīĒīīī¤ī´īī¨īīī īīīīīīīīīīīīī īīīĢīīīīīīīī¨īīīī§ī īīīī ī īīī¨īīīīīŽīī īī īīīī īīīīīī īīĻī īīīīīīīīīī īīīĢīīīīīĻī īīī īī īīīīīī īī īīīīī īīī īŋīī īīīīīīī īīīīīīī īĻīīīīīīŦīīīīī§ī īīī īīīī īīīīīīīīīīī ī˛ī§īī˛īīīī īī§īīīīīĒī
īĩīĒīīīīīīīīīī§īīīīīīīīīīīīī īīīīīīīīī īī
īīīīī īīīīī¨ī īīī īīī īīīīī īīī īīī ī īīī¨īīīīīŽīī īīīī īīīĢī ī īī īī īīī īī īīīīīīī īīīīīīī īīĒīī īīīī īī īīīīīīī īīī¨īīī īīīīīī īīī īīī ī īīīīīīīīīīĢī īī īīīīīīīīīīīīīīī¨ī īīīīīīī īīī īīīīīīīī īīīīīīīīī§īī īīīīīīīī īīīīīīīīīī§ī īīī īĢīī īŦī īīīīīīī ī īī īīĒī
ī
īīĒīīī¤īīīīīī ī¨ī īīī ī
īīīīī īīīīīīī īŦīīīī ī§ī ī ī īīīīīī īī ī§īī īīī ī īĸīī īīīīīī īī īīīīˇīīī ī¤ī´ī īīīīīĢī ī īī īī¨īĒī īīīīīīīīīīīī¨īīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīĻīīŦīīīīīī¨īīīīīīīīīī īīīīīī īīīīīīĻī īī īīīīīīīīīī īīī īīīī īīīĻī īīī ī¨īīī ī īī īĢī īī ī īī īīīīīī īī īīī īīī īīīī īīīīīīīīīī īī īī¨īīīīīīīī īīī ī ī¨īīīīī¨ī īīīĒī īŗīī īī ī īīīī īīīī īīīīīĢīīīī īī īīī īīī īīī īīī īīī¨īīīīī īīīīī īīīīī¯īīīīīīīīīīīīīīīī īīī īīīīīī°īīīī īīīīīī īīī īīĻīīīī īīīī¨īīīīīī¨īīīīī īīīīī īīīīīīīīīīĢīīīī īīīīīīīī īīīīīīīīī§īī īīīīīīīīīīī īīĒī
ī ī īĒīīīŖī īīīīīīīīīī ī
īēīīī¨ī īīīīīīīīīī īīīīīī īīīīīīīīīīīīīīīī īīīīīŽīīīīīīŋīī īīīīīīīīīīīīīīīīīī īīīīīīīī īīī īīīīĢī ī īīīīī īī īīīīīŽīī īīī īīīīīīĒī ī īīī¨ī¨īīīīī īīī īī īīī ī īīīīī īīīīīīīīĻī īī īīīīīī īīīīī īīīīĻīīīīīīīīīīīī īī¨ī īīīīĒī īīīīīīīīīīī īīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīīīīīīīīī īīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīī īĄīĸīŖī¤ī īīĸīīīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīĨīīīīīĨīī ī
ī īŖīīīīī īīī īī ī īī īīīīīīīīī īīī īī īīī īīīīī ī īī īīī¨īīīīīŽīī īī īīĢī īīī īīī īīīī īī īīīīīī¨īīīīīī īī īīīīīīīīī īīīī īīīĒī ī īīīīīīīīīī īīīī īīī ī īīīīīī īī īī īīīīīīīĻī īī īīīīīīīīīĻīīīīīī īīĢīīīīī¨ī īīīīīīīīīīīīīīĒī ī īžī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīŦīīī īīĻīīīīīīīīīīīīīīīīīīīīīīīī´īī¨īīīīīī īĢīīī īĻī īīīīīīīīīīī īīīīīīīīī īīīīīīīīīīīīīīīīīīī īīĒīīīīīī īīīīī īīīīīīīīīīīīīīīˇīīīīīīīīī īīīīīīīīīīīīī īīīĒī ī īžī īīīīī ī īī īī¨īīīī īī īī§īīīīī īīī īīī¨ī§ī īī ī īīīīī īī īĢīīī ī īīīīī īīīīīŦīī īī īīī īī īīī īīīīīī īī īīīī ī īīīī īīīīī īīīīīīīīīī īīīīīīī īīĒī ī īīīī īī īīī īī īīī īīīīīī īīīīˇīīī īīīīīīīīīīīīīīīīīīī īīīĒī ī īīī§īīī ī īŖī īĢīīī ī ī īī īīīīīī§īī ī īī īĢīīī ī īīīīī īīīī ī§ī ī īīī īī īīīī īī īīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīī īĒīīī¤ī´īī¨īīī īīīīī īīīŖīīīīīīīī¨īīīīīīīī īīĒī ī īīŖīī ī īīīīīīī īīīī īī īīīīīīī īŖīīīīīīī īīīīīīīīīīĒī ī īī īīīīīī§īī ī īī īĢīīī ī īīīīī īīīīī īī īīīī īīīīīīīŧī īī īī īīīīīīī īīīīīī¨īīīīīīĻī īīīīī īīī īīīīīīīī īīīīīī¨īīīīīīĻī īīīī īīīīīĻīīīīīīīīī īīĒī ī īī¨īīīīīīīī īīīīī¨īī§īīī īīī īī īīīīī īīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīĻīīīīīī īīīīīŖīīīīīīīīīīīīīīīīī ī¨īīīīĒī ī īīīīīī īīīīīīī§īī īīīīŦī īīīīīīīīī īīī¯īīīīī°īīīīī§īīīī īīīīīīīī ī¨īīīīīīīīīīī¨īīīīīīīīī īīīīĢīīī īīīīīŦī īīīīīī īī īīīīīīīīīī īĢīīī īīīīīīīīīīīīīīŦī īīīīīīīī īīīīīīīīī īīīīīī īī īīīīīīīīīīī¨ī īĒīīīīīīīīīīīīīīīīīīīīīīīīīīīīīŦī īīīīīīī īīīīīī īīīīīīĒī
ī īīĒīīīšī īĢīīīīīīī¸īīīīīīī ī
īšī īĢīīīīīīīīĒīīĻīīīīˇīīīˇīīīīīīīšīī
īīīīīīīīīīī īīīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīī īīīī īīīīī īīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīī ī īīīīīīī īīī īīīĄīī īīīĸī īī īīīīīīīīī īīīŖī¤īĨīĻī§ī¨ī¤īīĻīīīī īīīī ī īīīīīīīŠīī īī ī īīīīī īīīīīīī īīīīīī īīīīĸī īīīīīīīīī ī īīīī īīīĒīīīīīīīī īīīīīīīī īīĸī īīī īī īī īīīīīī īī īī īī īīī īīīīīīīīīĢīīī īīīīīīīīīŦīĢī ī
īīŦīīīŖīī īīīī īŽī ī
īĻīīīīīīīīī īīīī īī īīīīīīīīīīīīīīīī īīīīī īīīīīīīīīīīīīīī īīīīīīīīīīīīīīī īīīīīī īī īīīī īīīīīī ī īīīīīīīīī īīīīŽīīī¯īīī īīīīīīīī īīīī īīīīīīīīī°īīīī īīŽīīī¯īŦīīīąīīīī īīīīīī īīīī īī īīī īīī īīīīīīīīīīīīī īīīīīīī īī īīīī īīī īīīī īīīīī īīī īīī ī īī īīīīīī īīīīī īīīĒīīīīīī īī īīī īīīī īīīīī īī īīī īī īīīīī īīīīŦī ī īīī ī ī īīīī īīī īīīīī īīīīīīī īīī īīī īīīīīīī īīīī īīīīīī īŽīīī¯īīīīīīī īīīī īīī īīīī īīīīī īīīīīīīī īī īīīīīīīīŦī
ī īīŦīīīīīīīīī ī ī
īīīīī īīīīīīī īīī īīīīīīī īī īīī īī īīīī ī īīīīīīīīīī īīīī īīīī īīīīī ī īīīīīīīīī ī īīīīīīīīīīīīīī īīīīīīī īīīī īīīīīī īīīīīīīīīīīīīī īīīī īīī īīŽīīī¯īŦīīīīīīīīīīīīīī īī īīīī īīī īīīī īīīī īī īīīīī īīīīī īīī ī ī īīīīīī ī ī°īī īīīī īĸī īī īīīī ī īŽīīī¯īīī ī īīīīīīīīīīĸī īŽīīīī ī īīīīī īīīīī īĸī ī īīīŦī ī īīī ī īīīīīīī ī īīī īīī īī īīīī ī īīīŽī īīī īīīīī īīī īīīīīīīīīīīīīīīī īīīīŽīī īīīīīīī īīīīīīīī īīīī īīīīīīīīīīīīīīīī īīīīīŦī
ī ī˛īŦīīīīīīī ī ī
īīī ī īīīīī ī īīī īīīīī īīīīīīī īīīī īīī īīīī ī īīīīīī ī īīĸī īīīīīīīīīīīīĸī īīīī ī īŗīī īīīīī īīīīīī īī īīīīī īīīī īīī īīīīīīīī īī īīīīīī īī īīī īī īī īīīīīī´īīīīīī īī īīŽīīī¯īĸī īŽīī īīī īī īīīīī īīīī īīī īīī īī īīīīīī īī īŽīīīī īīīīīīīī´īīīīīīī īī īīī īīīī´ īīīīīīīī´īīīīīīī īīī īĩīīīīī īīīŦī
ī īŠīŦīīīīīīīīī ī
īŠīŦīīīīīīīīĒīīī īīīīīīīīīī
īī īīīī ī īīīī īīī īīī īīīīīīīīī ī īīīīī īīī īīī īīīīī īīī īĒī ī īīīī īī īī īīīīīī īī īī īīīīīīīī´īīīīīīī īī īī īīīī īīī īī īīīī ī īīīī īīī īīī īī īī īīīī ī īīīīīīīīŦī ī īīī ī īīīīīīŽīīī īīīī īīīī īīīīīīīīīīīīīīīīĒīīī īīī īī īīīī īīīīī īīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīī īīīī īīīīī īīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīī ī īīīīīīī īīī īīīĄīī īīīĸī īī īīīīīīīīī īīīŖī¤īĨīĻī§ī¨ī¤īīĻīīīī īīīī ī īīīīīīīŠīī īī ī ī īļī īĻīīīīīīīīī ī īī īīīī īīĸī īīīīī īīĸī īīī īīīī īī īī īīīī ī īīīī īīī īī īīīī ī īīī īī īīīīīīīīīīīīī īīīŽīīīīīīīīīī īīīīīīīīīīīīīīīī īīĻīīīˇīīīī ī īīŦī ī īļī īī īīīī īīīīīīī īīīīī īīīīīīīīīī īīīīīī īīīīŽīīīīīīīī īīīī īīī īī¯īīīīīīīīīĸī īīīīīīīīī¸ī¤īīĸīīīīīīīŗīĸīīīīīīīīīˇīīīīīŽīīīīīīīīīī īīŽīīīīī īīīīīīīīīīīīīīīīīīī īīĻīī īˇīīīī ī īīŦī ī īļī īĄīī īīīīīīīī´īīīīīīīī´īīīīīīī īīīī īīīī īīīīī īīīīīīīīŽīīī īŦī ī īļī īīīīīīīīīīī īīīīī īīīīīīīīī īīīīīīīīīīīīī īīīī īīī īīŽīīī¯īīīīīīīīīīīīīīīīīīī ī īīīīīīīīī īīī īīŽīīī¯īĸīīīīīīīīīīī īīīīīīĒīīīīīīīī īīīīīīīīī īīīīīīīīīīīŦī
ī īŠīŦīīīĄīī īīīīīīīī´īīīīīīīī´īīīīīīī īīīˇīīīīīī īī
īĄīī ī īīī īīīī´īīīīīīīī´īīīīīīī īī īīīīīīī īī īīī īīīī īīī īīī ī īīīīīīīīī ī īī īīŽīīī¯īīīīīī īīīīīī īīīīīīīŽī īĒīī īīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīī īī īīīīīīīīī īīī īīīī īīī īŗī īīīīī īīīīīīīī īīīīīŦīīīīĄīī īīīīīīīī´īīīīīīīī´īīīīīīī īīīīīīīīī īīīīī īīīī īīī īīī ī īīīīīīīīī ī īī īīŽīīī¯ī ī¸īīīīīīī īīīīīīī ī ī¤ī īīŽīīī¯ī īšī¸īī¤īēī īīī īīīīīīĒīīī īī īŽīīīīīīīīīī īīŽīīīīī īīīīīīīīīīīīīīīīīīī īīĻīīīˇīīīī ī īīŦī
ī īŠīŦī˛īīīīī īīīīīīīīŽīīī ī
īīī īīīīīīīīīīŽīīīīīīīīīīīīīī īīīīŽīīīīīī īīīī īīīīī īīīīīīīīŽīīī īīīīīīīīīīīŽīīīīīī īī īīīī ī īīīī īīī īīīī ī īīīīīī īī īīī ī īī īīīī ī īīīī īīī īīīīīīīŦī ī īīī īīīīīīŽīīī ī īŽīīīī īīīīīīī īīīīīīīīīī īīīīīīīīīīīīīīīīī īīīīīīīīīī īīīīīī īīīīīīīīīīīī īīīīīīīīīīīīīī īīīīŽī īīīīīīīīīīīī īŽīīīīīīīīīīīīīī īīīīīīī īīīīīīīī īīīīīīīīīīīīīīīīī īīīīīī īīīŦī
ī īŠīŦīŠīī¤ī īīŽīīī¯īīīīī īīī
īīī ī īīīīīīīī īŽīīīī īīīīīī īī īīīī ī īīī īīī°ī īīīī īīī īīīīīīī ī ī īī īīī īīīīī īīīīī ī īīīīīīīīīīīīīīīī īīīīīīīīīīī īīī īīīīīīĒīī īīīīīīī īī īīīīīīīīīīī īīīīīīīīīīīīīīī īī īģīīĒīīīīīīīīīīīŽīī īīīŽīīī¯īīī īīī īīīī īīīīšīīŦī īŦīĸīī īīīīīēīŦīīīīī īī īīīīī īīī īīŽīīī¯īīīīīī īīīīīĒī īī īŗīīīī īīīīīīī īīīī īīīīī īīīīīīīī īīīīīīīŦī
ī īŠīŦīŧīīĻīīī īīīīīī īīīīīīī
ī§īī ī īīī īīī ī īī īīīīīīī īīīī¯īī īīīīīīīīī īī īŽīīīī īī īīīī ī īī īīŽīīī¯ī īīīī īīīĸī īīī īīī īī ī īīīīīīīīīīīī īīīīīīīīīīī īīīīīīīīīī īīīīīī īīīīīīīīĒī īīīīī īīīīīīīī īīīīīīīīīīīŦīī īī īīīī īīīīī īīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīī īīīī īīīīī īīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīī ī īīīīīīī īīī īīīĄīī īīīĸī īī īīīīīīīīī īīīŖī¤īĨīĻī§ī¨ī¤īīĻīīīī īīīī ī īī˛īīīīīŠīī īī ī īī īīīī īīīīīī īīīīīīīīīīīīī īīīīīīīīī°īīīī īīŽīīī¯īīīīīīīĒī īīīīī īīīīīīīīīī īīīī īīīīīīīīīīīīīīīīīīīŦī
ī īŠīŦīŊīīīīīīīīīĒīīīīīīīīīīŖīīī īīīīīīīīī īī
īīīīī īīīīīī īīī īīī īīīīī īīī īīī ī īīīīīīīī°īī īīīī īīīī ī īī īī īīī īī īīīīīīī īīīīīīī īīŦīī īŖīīī īī īīīīīīī īīīīīī īīīīīī īīī īīī ī īīīīīīīīīīī īī īīīīīīīīīīīīīīīī īīīīīīī īīī īīīīīīīī īīīīīīīīīĒīī īīīīīīīī īīīīīīīīīīĒī īīī īīī īŽī īīīīīīī ī īī īīŦī
ī
īŧīŦīīī¨īīīīīī īī īīī ī
īīīīī īīīīīīī īŽīīīī īĒī ī ī īīīīīī īī īĒīī īīī ī īĻīī īˇīīīī ī īī īīīīžīīī ī¨īŗī īīīīīī ī īī īīīŦī ī¸īīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīĸīīŽīīīīīīīīīīīīīīīī īīīīīī īīīīīīĸī īī īīīīīīīīīī īīī īīīī īīīĸī īīī īīīī ī īī īī īī ī īī īīīīīī īī īīī īīī īīīī īīīīīīīīī ī īī īīīīīīīīīī īīī ī īīīīīīī īīīŦī īąīī īī ī īīīī ī īīī īīīīīīīīī īī īīī īīī īīī īīī īīīīīīīī īīīīī īīīīīšīīīīīīīīīīīīīīīī īīī īīīīīīēīīīī īīīīīī īīī īīĸīīīī īīīīīīīīīīīīīīī īīīīī īīīīīīīīīīīīīī īīīīīīīī īīīīīīīīīĒīī īīīīīīīīīīī īīŦī
ī īŊīŦīīī§ī īīīīīīīīīī ī
īˇīīī īīīīīīīīīīŽīīī īīī īīīī īīīīīīīīīīīŽīīīīīīīīīīī īīīīīīī īīīīīīīīī īī īīī ī īīī īīīīīīīīīīīīīīīīīīīī īīīīīī īī īīīīī īīīīī īŦī ī īī īīīī ī īīīī īīī ī īīī ī īīīī īīī īīīīīīīīīīīīī ī īŽīīīī īī īīīīīīī īī īīī īī īīŽīīī¯ī īīīīī īīī īīīī´īīīī ī īīīīīīīīīŦī ī īŖīīī īī īī īīīīīī īī īĒīī īīīī ī´īĒīīī īī īīī īīīīī īīīī ī īīī īīīīīīīīīī īīīīīīīīī īīīīĸīī īīīīīĸīīīīīīīī īīīī īīīīīī īīīīīīīīīīīīīīīī īŦī ī īīīīīī īīīīī īīīī ī ī īī īī īīīīī īīī īīīī īīīīī ī īī īīīīīī īī īīŽīīī¯ī īīīī īī īīīĒīīīī īī īīŽīīī¯īĸīīīīīīīīīīīī īīĻīīī īīī īīĸīīīīīī īīīī īīīīī īīīīīī īīīīīīŦī ī īīīī īīīī ī īī īī īīīīīĩīī ī īīīīī īīīīīī īīī īīīīī īī īī īīīīī īīīīīī īīīī īī īī īī īīīīīī īī īīīīīīīīīīīīīīīīīīīŦī ī īīŽīīīĨīīīīīīīīīīī īīīīīīīīīīīīīīī īīīīīīīīīīīī īīīīīīīīī īīīīīī īīīīīīīīīīīīīŋī īī īīŽīī īī īīīīīīī īīīī īīīīī ī īīī ī īīī īī īīīīĸī īīīī īīīī īīīīī ī īīī ī īīī īī ī¯īīīŽīīŦīī īī īīīī īīīīī īīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīī īīīī īīīīī īīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīī ī īīīīīīī īīī īīīĄīī īīīĸī īī īīīīīīīīī īīīŖī¤īĨīĻī§ī¨ī¤īīĻīīīī īīīī ī īīŠīīīīīŠīī īī ī ī¨īŗīīīīī īī īīī ī īīīīīī īīīīīīĸī īīī¯ī īīīĸī īīī īĒīīīī īīīīīīĸī īīī īīīīĒīīīīīīīī īŽīīīī īī īīīīīŽīīīīŦī ī
īīŦīīīī īīīīīīīīīīīīīīī ī
īī īīīīīīīīīŦīīĸīīīīžīīīžīīīīīīīīī
īī īīīī īīīīī īīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīī īī īīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīīīīīī īīī īīī īī īīīĄī īī īīīīīīīīī īīīĸīŖī¤īĨīĻī§īŖīīĨīīīī īīīīī īīīīīīī¨īī īī ī īīīīī īīīīīīī īīīīīī īīīīĄī īīīīīīīīīī īīīī īīīŠīīīīīīīī īīīĒīīīīī īīĄī īīī īī īī īīīīīī īī īī īī īīī īīīīīīīīīĢīīī īīīīĒīīīīīŦīĢī ī
īīŦīīīĸīī īīīī īŽī ī
īīī īīī ī īīīīīīī īīīīīīīīīīīīīīī īīīŽīīī īīīīŽīīīīīīī īīīīī īīīīīīīīīŦīīīīīĒī īīīīīī īīīīīŠī īīīĒīĒī īīīīī īīīīī īī īī īīīīīīīīīĒī īīĒīīīīīŠī īīī īīīīī īīīīīīīīīī īīīīīīŠīī ī īīīī īīīīīī īīīī īīīīīī ī īī ī īī īīī īīīīī īī ī ī¯īīīīīŦī ī īīīīī ī īīīīī īīīī īŠī ī īīīĒī īŽīīīī īīīŠī°ī īīīīī īĄī īī īī īī īīīīīī īīīīīīī īīī īīĒīīīīīīīī īīī ī īīīīī ī īīīīī īīī ī īīīĒīīīīīąīī īīīīī īīīī īī īīī īī īī īīīīīī īīī ī īīīīīīīī īīīīī īīīīīī īī īīīīīīīīīīī īīī ī īīīīīīī˛īīīīīīŦī
ī īīŦīīīīīīīīī ī ī
īīī ī īīīīīīī ī īīī īīīīī īīīīīīī īīī īīī īīī īīīīī īīī ī īīīĒīīīīīąīī īīīīī īīīī īī īīīī īī īīīīīīīīīīīīī īī īīīīīīī īīīīīīīīīīŦī
ī īŗīŦīīīīīīī ī ī
īīī ī īīīīī ī īīī īīīīī īīīīīīī īīīī īīī īīīī īīīĒīīīīī īīīīī īīīīī īī īīī īīīĒīīīīī´ īīŽīī īīĄīīīīĒīīīīī´īī īīī īīĄīīīīīīīīī īīŽīīī īīīīĒīīīīī´īīīīīīī īīīīīīī īĒīīīīīī īĒī īīīīĄīīī īīīīīī īīīīīīīīīīīīīīīŦīīī ī īŖīīī ī īīīīī īīī ī īī ī īī īīī īī īīīīī īī īīīīīī īīīīīīĒīīīīīī īīīī īŠī ī īĒīīīīīī īī īŠīī īīīīīīĄī īīīīīīīīīĄī īīī īīīī īīīĒī īīī īī īīīīīīīīīīŦī ī īĩīī īī ī īīīīī īīīīīīī īīīīī īīī īīīīĒī īīīīīīīīŠīī īīī īīīīīīīīīīĄīīīī īīīīīīīīīīī īīīīī īīīīīīīī īīī īīīīīīīīīīīŽīīīīīīīīīīŦī
ī ī¨īŦīīīīīīīīī ī
ī¨īŦīīīī īīīīīīīīīīīĻīīīīīī īī īīīīīī
īīī īīīīĒīīīīīīīī īīīīīīīŽīīīīīīīīīīĒīīīīīīīīīīīīīĢīīīī īī īī īīīīīīīīĢīīĒī īīīīīīīīŦīī īīīīī īīī īīīī īīīīīīīīīī īīī īīīīī´ī īīī īīīīī īĄī īīīī īŽīīīīī īīīīī ī īīī ī ī¯īī īīīīī ī īŠīīīī īīīīīīīī īīĨīīīīīīīīīīīīĒīīīīī īīīī īīīīīīīīīīīī´īīīīŽīīīīīīĒīīīīīīīīīīīīīŦīīī īī īī īīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīī īī īīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīīīīīī īīī īīī īī īīīĄī īī īīīīīīīīī īīīĸīŖī¤īĨīĻī§īŖīīĨīīīī īīīīī īīīīīīī¨īī īī ī ī īīīĒī īīīīīīĄīīīīŽī īī īīĄīīĒīīīīīŠī īīī īīīīī īīīīīīīīī īīīīīīīīīī īīīīīī īīīīĒīīīīīąīī īīīī īī īīīīĄī īīī īī īīī ī ī īīīī īīī īĄī īīīī īī īī īīīīīī īīīīīīīĒī īīī īīīīī īŠīīīīī īīī īīīīīīīī īīŦīīīīīĒī īīī īīīīīīīīīīīīīīīīī īī īīīīīīīīīīīīī īī ī īļī īīīīīīīīīīīŦī ī īļī īīīīīī īīīīīīī īīīīīīīīīīŦī ī īļī īī īīīīīīīīīīīīī īīīīīīī īīīīīīīīīīŦī ī īļī īī īīīīīīīīīīī īˇīīīī īĒī īīīīŦī ī īļī īĨīīī īīī īīīīīīīīīīī īīīīīīī īī īīīīīīīīŦī
ī ī¨īŦīīīĻīīīīīĻīīīīīīīīīīī
īīīīīīīīīīīīīīī īīīīīī īīī īīīīīīīī˛ī īīīīīīī īīī īīī īīīīīīīīīīĄīīīīĒīīīīī īīīīīī īī ī īīī īīī īīī ī īīīī ī īīī īīīīīīīī īīīīī īīī īī īī īīīī īīīīī īī īīī īīī ī īī īīŽīīī¸īŦī ī īī īīīĒīĒīīī ī ī¯īīĒīīī ī īīī īīīīī īīī īŽīī īī ī īī īīīīīī ī īīīī ī īĒīīī īŠī ī īīīīī īī īīī īī īīīīīī īīī īīąīī īĒīīīīīī īĄī īīī īī īī īīīīīī īīīī ī īī īīī īīĄī īīīī īīīīīī īīī īī īŠīīī¸īīī īīīīī īĒīŦīī īĩīī īī īīī īīīīīīīīī īīīī īīīīīīīīīīīī īīī ī īīīĒīīīīīąīī īīīīīĄī īīī īīī īīĒīīīīīīīī īīī īīīīīīīīī īīīīīīīīŽīī īī īīīīīīīīīīīīĒīīīīŠī īīīīīī īīĄīīīīīīīīīīīīīīīīīīīīīīīīīī ī īīīīī īīĄī īīī īīīīī īīīīī īīīīīīī īĒīīī īŠī ī īīīīīī īī īīī īīīī īīīīīīīīī īī īīī īīī ī īīīīīīĒīīīīīīŦī
ī ī¨īŦīŗīīī īī īīīīīīīī īˇīīīī īĒī īīīī
īīīīī īī īīīīīī īī īīī īīīīī īīīī īī īīīī īī īīīīīīīī īīī ī īīīīī īī īīī īīīī īī īīī īīīĒīīīīī īīīīīŦī ī īī īīīīīīī īīī īī ī īīī ī īīī īī īī īīīīīī īī īˇīīīī īĒī īīīī īīīī īī īīīīīīī īīīīīŦī ī īĨīī īīīīīĄī īīī īīīīĒīīīīīīī īˇīīīī īīīīīīīīīīīŠī īīī īī īī īīīīīīī īīīīīī īīīŽīī īīīīīīīīīīīīīīīī īī īī ī īī īīŦī ī īīīŠīīīīīīīŠīīīīīīīīīīĒīīīīīŠī īīī īīīīī īīīīīīīĒīīīīĒīīĒīīīīīŗīīī īīīīŦī ī īĸīī īīīīīīīīī īšīīīī īīīĒīīīīī īīīīī īŽīīīī īīīīī īīī īīīīī īīīī īīīīīŦī ī īĸīī īīīīīīīīī īī īī īīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīī īī īīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīīīīīī īīī īīī īī īīīĄī īī īīīīīīīīī īīīĸīŖī¤īĨīĻī§īŖīīĨīīīī īīīīī īīŗīīīīī¨īī īī ī īīīīī īĒīīīī īŠī ī īī īīīīī īī īīīī īī īĒīīīīĒīīĒī īīī īēī īī īīīīŦī ī īīīĒī ī īŠīīīīī īīī īīī īīī īī īˇīīīī īīīīīī īīīī īī īīīīīīīīīīīīīīī¤īīīīīīīīīīī īīīīī īīŦī ī īīīīīīīīīīīīīīīīīīīīīīīīĒīīīīīŠī īīī īīīīī īīīīīīīĒīīīīĒīīĒīīīīīēīīī īīīīŦī ī īīīīīīī īīīīīīīīīīīīī īīīīīīīīīīīīĒīīīīīŠī īīī īīīīī īīīīīīīĒīīīīĒīīĒīīīīīēīīī īīīīŦī
ī ī¨īŦī¨īīī īī īīīīīīīīīī§īīīīīīī īīīĻīīīī
īĨīī īīīī īīīīīīĒīīīīīī īī īīīīī īī īīīī īī īīīīī īīīīīīī īīī īīīīī īī īīī īīī ī īīīīīīī īī īīīīĒīīīĄīīīīīīīī īīīīīīīīīĒīīīīīŠī īīīī¸ī īīīīīīīī īīīī īīīīīīīī īīīīīīī īī īīīīīīīīīī ī¸ī īīīŦīīī§īīīīīīīīīīī¸ī īīīīĒīīīīīŠī īīī īīīīī īīīīīīīīīīīīīīīī īīīīīīīīīīīīīī īī¸ī īīī īī īīīīīīīīīīī īīīīī īīŦīīī
ī ī¨īŦīģīīĻīīīīīĻī īīīīīīīīīī
īĻīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīĒīīīī īīīīīīīīīīīīīīī īī īīīīīīīīīīīīīŦīīīĻīīīī īī īīīīīīīīīīī īīīīī īīīīīīīīīī īīīīĒīīīīīīŽīīīīīīīīīī īīīŠīīīī īīīīīīīīīīĄīīĒīī¸īīīī īīīīīīĒīīīīī īĒī īīīīīīīīīīīīīī īīīī īīīīīĒīīī īīīīĒīīīīīīī īīīīīīī ī¯īī īīīīī ī īīīīī īīī īī ī īīī īīī īŠī īŦī ī ī§ī¯īīīīīī īīīŽī īī īīīīīī īīīīī īīīīīīī īŠī ī īī īīīīīī īī īīī īīīī īī īīīīīīīī īīĻīīīīīīīīīīīīīīīīīīīīīīīīīīŦī ī īĩīī īīīīī īīī īī īīīīīīīīīĒī īīīīĒī īī ī¯īīīī īīĄīīīī īīīīĒīīīīīīĒīīīīīīīīīī īīīīī īīīīīī īīī ī īīīīī īīīī īī īī īŠīī īīīīī īīīīīīīŦī ī īĨīī īī īīī īī īī ī īīī īīīīī īī īīīīīī īīīīī īīīīīīī īīīīīŠī īīī īīīīīī īīĄīīī īīīīīīī īīīīīīīīīīī īīīīīīīīī īīīīīīīīīīīīīīīīīī īīīīīī īīīīīīī īīīīīīīīīīīī ī¯īī īīīīīīīīīīīī īīīīīīīīīīīīīŠī īīīīīīīī īī īīŦīīīīīīī īīīīīīīī īīīīīīī īīīī īīīīī´īī īīĒī īī īīīī īīĒīīīīīīīīīīīĄī ī ī¯īī īīīīīīī īŽīīīī īŠī ī īīīīīīī īī īīīīī īŠīī īī īĒī īĒīŠī īīīīīīĒī īĒīŠī īīīīīīīīī īīīīĒīīīīīąīīī ī¯ī īīīīīī īīī īīĒīŦī ī īīī ī īīīĒīīīīī īīī īīīīīīīīīī īīīī īīīī īīī īīī īīīī īīī īī īīīīīī īīīīī īīī īīīīīīīīīī īīī īīīīīīīīīīīīŦīīīīīīīīīīīīīīīīīīīŠīīīī īīīīīīī īīīīīīīīīīīīīīīīīīīīīīīī īīīĒīīīīī ī īīīīī īīīīĒīīīīīīīīīīĒīī īīīīīīīī īīī īīīĄīīīīīī īīīīīīīīīīīīīīīīīīīīīīīī īĒīīīīīīīīīī īīīīī īīīīīīīīīīīīīīīīīīŽīīīīīīīĒīīīīīīīīīīīīŦī
ī ī¨īŦīŧīīīīīīīīīŠīīīīīīīīīīĸīīī īīīīīīīīī īī
īīīīī īīīīīĒī īīī īīī īīīīī īīī īīī ī īīīĒīīīīīąīī īīīī īīīī ī īī īī īīī īī īīīīīīī īīīīīīī īīŦīī īĸīīī īī īīīīīīī īīīĒīīī īīīīīī īīī īīī ī īīīīīīīīīīī īī īīīīīīīīīīīīīīīĒī īīīīīīī īīī īīīīīīīī īīīīīīīīīŠīī īīīīīīīī īīīīīīīīīīŠī īīī īīī īŽī īīīīīīī ī īī īīŦī īī īī īīīīīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīī īī īīīīīīīīīīīīīī īīīī īīī īīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīīīīī īīīīīīī īīī īīī īī īīīĄī īī īīīīīīīīī īīīĸīŖī¤īĨīĻī§īŖīīĨīīīī īīīīī īī¨īīīīī¨īī īī ī
ī
īģīŦīīī§īīīīīī īĒī īīī ī
īīīīī īīīīīīī īŽīīīī īŠī ī ī īīīīīī īī īŠīī īīī ī īĨīī īšīīīīī īī īīīīŊīīī ī§ī¯ī īīīīīī ī īī īīĒīŦī īžīīīīīīīīīīīĒīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīĄīīŽīīīīīīĒīīīīīīīīīī īīīīīī īīīīīīĄī īī īīīīīīīīīī īīī īīīī īīīĄī īīī īĒīīī ī īī īī īī ī īī īīīīīī īī īīī īīī īīīī īīīīīīīīīī īī īīĒīīīīīīīī īīī ī īĒīīīīīĒī īīīŦī īĩīī īī ī īīīī īīīī īīīīīīīīī īī īīī īīī īīī īīī īīīĒīīīīī īīīīī īīīīīŋīīīīīīīīīīīīīīīī īīī īīīīīīīīīī īīīīīī īīī īīĄīīīī īīīīĒīīīīīīĒīīīīī īīīīī īīīīīīīīīīīīīī īīīīīīīī īīīīīīīīīŠīī īīīīīīīīīīī īīŦī
ī ī īŧīŦīīīĻī īīīīīīīīīī ī
īīīī¸īīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīĄīīīīī īīīīīīīīīī īīīīīīīī īīīīīīīī ī ī¸ī ī īīīīīīīīīīīīīīīīīīŦī ī ī§īīīīīīīīīī ī īīī ī īīīīī īīī īīī ī īīīīīīīī īīīīī īŽīīīī īīī īīīīīīīīīĒī īīī īīīīī īīī īīī īīīīīī īīīīīīŠīī ī īīīī īī īīīī ī īŽīīīīīīī īīī ī ī¸ī īīŦī ī ī īī īī īīī īīīīī īīī īīīīī īīīīīīī īīīīīīĒīīīīīīīīīīīŽīīīī īīīīīī īīŦī ī ī§īīīīīīīīīī īī īī ī īīī īīīīīīīīĒī īīīī īī īīī īī īīī īīīīīīīī īīī īīīīī ī īīīŠīī īī īīīīī īīīīŠī īī īīīīīīī īīīīīīīī īīīīīī īīŦī ī
īēīŦīīīī īīīīīīīīīīīīīīī ī
īī īīīīīīīīīŦīīĄīīīīŊīīēīŊīīīīīīīīī
īī īī īīīīīīīīīīīīī
īīīīīīī īīīīī
Spicerhaart Group Ltd Third Party Connection Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 1 of 3
Spicerhaart Group Ltd, including all subsidiary companies, is hereinafter referred to as "the company."
1.0 Overview Direct connections to external entities are sometimes required for business operations. These connections are typically to provide access to vendors or customers for service delivery. Since the company's security policies and controls do not extend to the users of the third parties' networks, these connections can present a significant risk to the network and thus require careful consideration.
2.0 Purpose The policy is intended to provide guidelines for deploying and securing direct connections to third parties.
3.0 Scope The scope of this policy covers all direct connections to the company's network from non-company owned networks. This policy excludes remote access and Virtual Private Network (VPN) access, which are covered in separate policies.
4.0 Policy 4.1 Use of Third Party Connections Third party connections are to be discouraged and used only if no other reasonable option is available. When it is necessary to grant access to a third party, the access must be restricted and carefully controlled. A requester of a third party connection must demonstrate a compelling business need for the connection. This request must be approved and implemented by the IT Manager.
4.2 Security of Third Party Access Third party connections require additional scrutiny. statements will govern these connections: Third Party Connection Policy
The following
Confidential
Spicerhaart Group Ltd Third Party Connection Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 2 of 3
âĸ Connections to third parties must use a firewall or Access Control List (ACL) to separate the company's network from the third party's network. âĸ Third parties will be provided only the minimum access necessary to perform the function requiring access. If possible this should include timeof-day restrictions to limit access to only the hours when such access is required. âĸ Wherever possible, systems requiring third party access should be placed in a public network segment or demilitarized zone (DMZ) in order to protect internal network resources. âĸ If a third party connection is deemed to be a serious security risk, the IT Manager will have the authority to prohibit the connection. If the connection is absolutely required for business functions, additional security measures should be taken at the discretion of the IT Manager.
4.3 Restricting Third Party Access Best practices for a third party connection requires that the link be held to higher security standards than an intra-company connection. As such, the third party must agree to: âĸ Restrict access to the company's network to only those users that have a legitimate business need for access. âĸ Supply the company with on-hours and off-hours contact information for the person or persons responsible for the connection. âĸ (If confidential data is involved) Provide the company with the names and any other requested information about individuals that will have access to the company's confidential data. The steward or owner of the confidential data will have the right to approve or deny this access.
4.4 Auditing of Connections In order to ensure that third-party connections are in compliance with this policy, they must be audited annually.
Third Party Connection Policy
Confidential
Spicerhaart Group Ltd Third Party Connection Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 3 of 3
4.5 Applicability of Other Policies This document is part of the company's cohesive set of security policies. Other policies may apply to the topics covered in this document and as such the applicable policies should be reviewed as needed.
5.0 Enforcement This policy will be enforced by the IT Manager and/or Executive Team. Violations may result in disciplinary action, which may include suspension, restriction of access, or more severe penalties up to and including termination of employment. Where illegal activities or theft of company property (physical or intellectual) are suspected, the company may report such activities to the applicable authorities.
6.0 Definitions Access Control List (ACL) A list that defines the permissions for use of, and restricts access to, network resources. This is typically done by port and IP address. Demilitarized Zone (DMZ) A perimeter network, typically inside the firewall but external to the private or protected network, where publiclyaccessible machines are located. A DMZ allows higher-risk machines to be segmented from the internal network while still providing security controls. Firewall A security system that secures the network by enforcing boundaries between secure and insecure areas. Firewalls are often implemented at the network perimeter as well as in high-security or highrisk areas. Third Party Connection A direct connection to a party external to the company. Examples of third party connections include connections to customers, vendors, partners, or suppliers.
7.0 Revision History Revision 2.0, 22/07/2010 SRL
Third Party Connection Policy
Confidential
Spicerhaart Group Ltd VPN Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 1 of 3
Spicerhaart Group Ltd, including all subsidiary companies, is hereinafter referred to as "the company."
1.0 Overview A Virtual Private Network, or VPN, provides a method to communicate with remote sites securely over a public medium, such as the Internet. A site-to-site VPN is a dependable and inexpensive substitute for a point-topoint Wide Area Network (WAN). Site-to-site VPNs can be used to connect the LAN to a number of different types of networks: branch or home offices, vendors, partners, customers, etc. As with any external access, these connections need to be carefully controlled through a policy.
2.0 Purpose This policy details the company's standards for site-to-site VPNs. The purpose of this policy is to specify the security standards required for such access, ensuring the integrity of data transmitted and received, and securing the VPN pathways into the network.
3.0 Scope The scope of this policy covers all site-to-site VPNs that are a part of the company's infrastructure, including both sites requiring access to the company's network (inbound) and sites where the company connects to external resources (outbound). Note that remote access VPNs are covered under a separate Remote Access Policy.
4.0 Policy 4.1 Encryption Site-to-site VPNs must utilise encryption to protect data during transmission. Encryption algorithms must meet or exceed current minimum industry standards, such as Triple DES or AES.
VPN Policy
Confidential
Spicerhaart Group Ltd VPN Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 2 of 3
4.2 Authentication Site-to-site VPNs must utilise a password, pre-shared key, certificate, or other means of authentication to verify the identity the remote entity. The strongest authentication method available must be used, which can vary from product-to-product.
4.3 Implementation When site-to-site VPNs are implemented, they must adhere to the policy of least access, providing access limited to only what is required for business purposes. This must be enforced with a firewall or other access control that has the ability to limit access only to the ports and IP addresses required for business purposes.
4.4 Management The company should manage its own VPN gateways, meaning that a third party must not provide and manage both sides of the site-to-site VPN, unless this arrangement is covered under an outsourcing agreement. If an existing VPN is to be changed, the changes must only be performed with the approval of the IT Manager.
4.5 Logging and Monitoring A site-to-site VPN can expose the company to additional risk and, as such, traffic passing across the VPN should be subject to logging and monitoring that exceeds that of the general network.
4.6 Encryption Keys Site-to-site VPNs are created with pre-shared keys. The security of these keys is critical to the security of the VPN, and by extension, the network. Encryption keys should be changed yearly. If certificates are used instead of pre-shared keys, the certificates should expire and be re-generated after three years.
4.7 Applicability of Other Policies This document is part of the company's cohesive set of security policies. Other policies may apply to the topics covered in this document and as such the applicable policies should be reviewed as needed.
VPN Policy
Confidential
Spicerhaart Group Ltd VPN Policy Section of: Corporate Security Policies CONFIDENTIAL
Created: July 2010 Target Audience: Technical Page 3 of 3
5.0 Enforcement This policy will be enforced by the IT Manager and/or Executive Team. Violations may result in disciplinary action, which may include suspension, restriction of access, or more severe penalties up to and including termination of employment. Where illegal activities or theft of company property (physical or intellectual) are suspected, the company may report such activities to the applicable authorities.
6.0 Definitions Certificate Also called a "Digital Certificate." A file that confirms the identity of an entity, such as a company or person. Often used in VPN and encryption management to establish trust of the remote entity. Demilitarized Zone (DMZ) A perimeter network, typically inside the firewall but external to the private or protected network, where publiclyaccessible machines are located. A DMZ allows higher-risk machines to be segmented from the internal network while still providing security controls. Encryption The process of encoding data with an algorithm so that it is unintelligible without the key. Used to protect data during transmission or while stored. Remote Access VPN A VPN implementation at the individual user level. Used to provide remote and traveling users secure network access. Site-to-Site VPN A VPN implemented between two static sites, often different locations of a business. Virtual Private Network (VPN) A secure network implemented over an insecure medium, created by using encrypted tunnels for communication between endpoints.
7.0 Revision History Revision 2.0, 22/07/2010 SRL
VPN Policy
Confidential
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīī īī īīīīīīī īīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīī īĄīĸīŖī¤īĨīĄīīŖīīīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīīīīīīĻīī ī
īīīīī īīīīīīī īīīīīī īīīī§ī īīīīīīīīīī īīīī īīī¨īīīīīīīī īīīŠīīīīī īī§ī īīī īī īī īīīīīī īī īī īī īīī īīīīīīīīīĒīīī īīīīŠīīīīīĢīĒī ī
īīĢīīī īŦī īīŦīī īī ī
īīīī īī īīī īīīŠīŠīīīīīīīīīī īīī īīīīīīīī īīī īīīīī īīīīīīīī īīŠīīīīīīīī īīīī ī īīī īīī ī īīīīŽīīīīī īĢī ī īŖīī īīī ī īīīīī§ī īīīī īī īīī īīīī īīī īīīī īīī ī ī ī¯īī īīīīīī°ī īīī īīīī īīīī ī¨ī īīīŠī ī īīī ī īīīīŠī īīī īŠīīīī īīīŠīīīīī īīĢī ī īąīīī īŦī īī§ī īīīīī ī īīīī īī īīī īīīī īīī īīīī īīīīī īīī ī īŠīī¨īīīīīī īīīī īīīīīīīīīŦīīīī īīī īīī īīī§ī īīī īīīī īīīīī īīīīīīīīī ī īī īīīīīīī īīīīŽīī īīī īīī ī īī īīīīīŽīĢī ī īīī īī ī īīīīŽīī īīīī ī¨ī ī īŠīīīīīīī īī īīīīī īī īīīīīī īīīī īī īīīīīīī īīīīīīīīīīĢī
ī īīĢīīīīīīīīī ī ī
īīī ī īīīīīīī ī īīī īīīīī īīīīīīī īīī īīī īīīīī ī īīī ī īīīīīīīīīī īīīī īīīī īī īīī īīīī īīī īīī īīī ī īīīŠīīīīī˛īī īī īīīīīŽīĢī ī īīīī īī īīī īīīī īīī īīī īīīīī īīŦīīīīī¨īī ī īīīīīīī īīī ī īīīŠīīīīīīąī īīīī īīīīī īīīīīīīīīī īīī īīīīīīīīīīīīīīī¨īīī īīīīīīŠīīīī īī īīī īīī īī īĢīī īīīī īī īīī īīīī īīī īīīī ī¨ī ī īīīī ī īī īīīī īīī īīī īī īīīīīī īīī īīī īīī ī īīīŽī īī īīī īŠīīīīīīī īīŽīīīīīīīīīŽīīĢīīīīīīīīīīīīīīīīīīīīī īīīīī īīīī īīīīīī īīīīŠīīīīīīīīīī īīīīī īīīŽī īīīīīī īīīī īīīīīīīīī īī īīīīīīīīīīīīīīīīī īĢī
ī īŗīĢīīīīīīī ī ī
īīīīī īīīīīīī īīīŦī īīī īīīīīī ī īīīī īīīī īīī īī īīī ī īī īīīīīŽī īŦīīī īī īīīī īī īīī īīīīī īīīīīīĢī ī īīī ī īīīīīīī īīīīīī īī īīīŦī īīī īīī ī īīīī īī īīī īīīīīīīīīīīīīī ī īīī īīī ī īī īīīīīŽī§īīīīīīīīīīīīīīī īīīīīīīīīī§īīīīīī īīī§īīīīī īī īīīīī īīīīīŽīīīīī īīīīī īīīīīīī§ī īīīīīīīīīīīīīī īīī īīīīīī¨īī īīīīīīīīīīŠīīīīīīīīīīīī īī īīŦīīīīīīīīīī īī īīīīīīīīīīĢī
ī ī´īĢīīīīīīīīī ī
ī´īĢīīīīīīīīīīīīīīīī īīīī īī
īĩīīī īīī īī īīīī īīīīīīīī īīīī īīīī īīī īīī īī§ī īī īīīī īī īīī īīīī īīī īīīīīī īīīīīīīīīī ī¨īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīĢīīīĸīīīīīīīīīī īīīīī§īīīīī īīīīīīīīīīīīīīīīī ī¨ī īīīīīīī īīīī īīīīīīīīīīīī īīīīīīī īīīīīī īīīīīī īīīīīīīīīīīīīī ī¯īī īīīīīīīīīīīĢīīīŖīī īīīī īī īīīīīīī īīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīī īī īīīīīīī īīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīī īĄīĸīŖī¤īĨīĄīīŖīīīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīīīīīīĻīī ī
īīī īīī īīīīīī¨īī ī īīīīī īīī ī īī īīīīīīīīī īīī īīī ī§ī īīīīīīī ī¨īīīīīīīīī īīīī īīīīī īīīīīīī ī¨ī ī īī īīīī īī īīī īīīīī īīīīī īīī īī īī īīīīīī īīī īīīŦī īī īīī ī īīīīīī ī īīīīī īĢīī ī¤īīī īīīīīīīīīīīī īīīīīīīīīīīīī¨ī īīīīīīīī īī īīīīīīīīī īīīīīīīīīīīīīī īīīīīīīīīīī īīī īīīīīī īī īīīīīīīīī ī īī īīĢīīī ī īīīīīīīīī īī īīīīīīī īīī īīīī īīī īīīīīīī īīīīīīī ī¨ī ī īīīīīīī īī īī īļī īīīī īīī īīīīīīī īīīīīīīīīīīī¨ī īīīīīī īīīīīīīī¨īīīīīīīī īīīīīīīīīī īīī īīīīī īīīīīīīīīīīī¨īī īĢī
ī ī´īĢīīīīīīīīīīīīīīīīīīīīīŖīīīīīīīīīīīī
īīī ī īīīīīīīīīī īīīīī īīīī īī īīīīīī īīī īīī ī īīīīīīīīīīīīīī īīīī īīīīīīīīīīīīī īīī īīīī īī īīīīī īīīīīŽīīī
ī
ī´īĢīīĢīīīī īīīīīīīīīīīīīīīīīīīīī ī īˇī īīī ī īī īīŦīīī ī īī īī īŖīī īīīīīī īī ī¸īīīŖī¤īšī īīī īīī ī īīīī īīī īīīīīī īŠīīīī ī¨ī ī īīīīīī īī īīīīŠī īīī ī īīīīīīīī īī īīīīīīĢī ī īīī ī īīīŖī¤ī īŠīīīī ī¨ī ī īīīīīī īī īīī īīīŠī īīīīīī īīīŠīīī īī īīī īīīīī īīīīīīīĢī ī īīī īīīīīīīīīī§ī īīī ī īīīŖī¤ī īŠīīīī īīīī īīī īīīīīīīīī īīīīŠīīīīī§īīīī īīīīīīīīīīīīīīīī īīīīī īīīīīīīīī§īīīīīīīīīīīīī ī īīī ī īīīīī īŠīīī īīīīīī īī īīīīīī īīīīīī īīī īīīīīīīīī ī īīī ī īīīī īīī īīīīīī˛īī īīīīīīīīīīīīī īīīīŠīīīīīĢī ī īˇī īĨīīīīīīīīīī īŠīīīī ī¨ī ī īīī īī īīī īī īīīī ī īīīī īī īīī īīīŠīŠīīīīīīīīīīīĢīī īīīīīīī īī īīīīīīīīīŠīī īīī ī īīī īī īīī īī īīī īī īīŽī īī īīī īī ī¸īīĢī īĢī§ī īīīī īīīīīīī ī¨ī ī īīŠīīī īŠī īīī īī īīīīī īī īīīīī īīĨīīšīĢī ī īĨīīīīīīīīīī īŽī īīī īŠīīīī ī¨ī ī īīīīīī īīīīīīīī īīīīīīī¨īīī īīīēīīīīī īīīīĢī ī īˇī īīīŠīīīīīīīīīīŦī ī īīīī īīī īīī īīīī īī īīī īīīī īīī īīīīīīī īŠīīīī īīīīīīģī ī īīīīīīīīīīīīīīīīīĢī ī īˇī īīīī īīīīīīīī īī īīīīī īī īīīīīīī ī¨ī ī ī īīī¨īī īī īīī īīī ī īīīŠīīīīī˛īī īīīī īīīīīīīīīīĢī ī ī´īĢīīĢīīīŖīīīīīīīīīīīī ī īˇī īīīīīīīī ī īīīīŧīīī īīīīŠīīīī ī īīī īīī ī īīīī īī īīī īīīī īīī īīīīīīī īīīī īīīī īī īīī īī īīīīīŽī īīīī īīīīī ī īīīīīī ī¸īĄīŖīīīšī īŠīīīī ī¨ī ī īīīīīī īī īīīīīī īīī īī īīīīīŠī īīīĢī īīīī īī īīīīīīī īīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīī īī īīīīīīī īīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīī īĄīĸīŖī¤īĨīĄīīŖīīīī īī
ī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīŗīīīīīĻīī ī
īˇī īīīī īī īīī īī īīīīīŽīīīī īŠīīīī īīīī ī¨ī ī īī īīīīī īī īīī īī īŠīīīī īī īīīīī īīīīīīīīīīīŠīŦī īīīīīī īīīīŠīīīīī˛īīīī īīīīīīīīīīīīīīīīĢī ī īˇī īīīī īī īīī īī īŦīīī īī īŠīīīī ī¨ī ī īīīīīīīī īī īīīīī ī¨īī īīī ī īīīŠīīīīī˛īī īŖīī īī īīīīīŠī īīīĢī ī īˇī īīīīīī īīī īīī īī ī¨īī īīīī īī īīī īī īŦīīī īī īīīīīīī ī¨ī ī ī īŦīīīīīī īī īīī ī īīīīī īīīīīīīīī īīīīīīīīīīīīī īīī īī īīīīīīīīīŠīīīīīī īēīīīīŠī īīīĢī
ī´īĢīŗīīīīī īīīīīīīīīīīīī īīīīīīī¤īīīī
īŖīīīīīīīīī īīīīīīīīīīīīīīīīīī¨ī īīīīī īīī īīīīŦī īīīīī īīīīī īī īīīīī īīīīīŽī§īīīīīīīīīīīī īī īīīīīīī īŠī īīīīī īī īŠīīīī ī¨ī ī īīīŽī īī īīīīī ī īīī ī īī īīīīīīī īīī īīī ī īīīī īī īīī īīīĄī īīīīīīīī¨ī īīī¨īīīīīī īīīīŦī īīīīī īīĢīīīīī īīīīŠīīīīī˛īīīī īŠīīī īīīīī īīīīīīīīīīīŠīīīī ī¨ī īīīīīīīī īīīīīīīīī īīīīīīīīīŦīīī īīīīīīīīīīīīī īīīīīīīīīīīīīīīīīī īī¸īŖīīī īī§īīīīī§ī ī īīīĢīšīīīīīī īīīī īīīīīīīīīīīīīīīīīīīīīī īī īīīīīīīīīŠīīīīīīīĢī
ī ī´īĢī´īīŖīīīīīīŦīīīī
īĩīī īīī īīīīīīī īīīīī¨īī ī īīī īīī īīīī īī īīī īīīīī¨īīīīīī īīī īī īīīī īīīīīī īīī ī īīīī īī īīī īī īīīīīŽīĢī ī īīīīī īīīīī īī īīīī ī īīī ī īīīīīī īī īīīīī īīī īīī īŠīīīīīī ī īīīīīī ī¨ī ī īīīŠīīīīŠīīī īīīīīīŠīīīī īīīīī īī īīīīĄīŖīīĢīīī ī īŖīīīīīīŦī ī īīīī īī īīī īīīī īīī īīīīīīī īīīīīīī ī¨ī ī īīīīī¨īī īīĢī ī īŖīī īīīī īī īīīīīīīī īīī īī īīīīīŠīīīīīīīī īī§īīīīīīīīŦī īīīīī īīīīīīīīīīīī īīī īī īīīīīīīīīīīī īīīī¨īī īīīīīŽīīīī īīī īīīīŠīīīīīĢī
ī ī´īĢīĻīīīīīīīī
īīī īīīīī īī īīīīī īīīīīŽīīŠīīīīī¨ī īīīīīīī īīīīīīī īī īīīīīī īīīīīīī īīīīī īīīīīīīīīīī īīīīīīī īīī ī¨ī īīīī īīīīīīī īīĢī ī īīī īīīīīī īīīīīī īīīīīīī īīīīīīī ī¨ī īī īīīīīīīīī īīī īīīī īīīīīīīīīī§īīīīīīīīīīīī īīīīī§īīīīŖī¤ī§īīīīīīīī īīīīīīīīīīīī īīīīīīīīīīĢī
ī ī´īĢīŊīīīīīīīīī¨īīīīīīīīīī īīī īīīīīīīīī īī
īīīīī īīīīīŠī īīī īīī īīīīī īīī īīī ī īīīŠīīīīī˛īī īīīī īīīŦī ī īī īī īīī īī īīīīīīī īīīīīīī īīĢīī ī īīī īī īīīīīīī īīīŠīīī īīīīīī īīī īīī ī īīīīīīīīīīŦī īī īīīīīīīīīīīīīīīŠī īīīīīīī īīī īīīīīīīī īīīīīīīīī¨īī īīīīīīīī īīīīīīīīīī¨ī īīī īŦīī īī īīīīīīī ī īī īīĢī
ī ī
īīīī īī īīīīīīī īīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīī īī īīīīīīī īīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīī īĄīĸīŖī¤īĨīĄīīŖīīīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īī´īīīīīĻīī ī
īĻīĢīīīĨīīīīīī īŠī īīī
īīīīī īīīīīīī īīīīī ī¨ī ī ī īīīīīī īī ī¨īī īīī ī īŖīī īžīīīīī īī īīīīŧīīī īĨī¯ī īīīīīŦī ī īī īīŠīĢī īŋīīīīīīīīīīīŠīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīī§īīīīīīīīŠīīīīīīīīīī īīīīīī īīīīīī§ī īī īīīīīīīīīī īīī īīīī īīī§ī īīī īŠīīī ī īī īŦī īī ī īī īīīīīī īī īīī īīī īīīī īīīīīīīīīī īī īīŠīīīīīīīīīīīī īŠīīīīīŠī īīīĢīīīī īī īīīīī īīīīīīīīīŦīīīī īīīīīīīī īīīīīīīīīŠīīīīīī ī īīīīī īīīīī¸īīīīīīīīīīīīīīīī īīī īīīīīīšīīīī īīīīīī īīī īī§īīīī īīīīŠīīīīīīŠīīīīī īīīīī īīīīīīīīīīŦīīīī īīīīīīīī īīīīīīīīī¨īī īīīīīīīīīīī īīĢī
ī īŊīĢīīī¤ī īīīīīīīīīī ī
īžīīī īīīīī īīī ī īīīīīī īīīī īžī īīīī īīīī īīī īīīīīīīī īīīīī īīīĢī ī īīī ī īīīīēīī ī īīīīīīīī īīīīīī īīīīīīīīīī īīīīīŽīīīīī īīīīī īīīīīīī¸īīīī īī īīīīīīīīīī īīšīĢīīīĩīī īīīīīī īīī īīīīīīīīīīīīīīīīīīī īīīīī īīīīīīī īīīīīīīīīīīīīīŠīīīī īīīī īīīīīŽīĢī ī īīīŖī¤īīīīīīīīīīīīīīī īīŦīīī īīī īīīŖīī īīīīīī īīĢīīīīī īīīīŠī īīīīīīīīīīēīī īīīīīī īīīīīī īīīī īīīī īī īīīīī īīīīīŽīĢī ī īīĨīīīīīīīīīīīīīīīīīī īīīĨīēīīīŦīīī īīīīīīīīŦīīīīĢīīīīīī īīīīīīīīīīīīīīīīīīīīīīīī īī īīī īī īīīīīŽīī īīīīī ī īīīīīīīī īīīŠīŠīīīīīīīīīīī ī¨ī īīī ī īī īīī ī īīīŠīīīī īī īīīī īīī ī īīīī īī īīīīīīī īīīīīīīīīĢīīīīĨīīīīīīī¨ī īīīīīīīīīīīīīīīīīīīī¨īīīŽī īīīīīīīīī īīīīīŦī ī ī īīī īĢī ī īīīĸīī ī īīīīīī īīīī īīīī īī īīī īĸīīī īīīīīĢī ī īī īī īīī īīī īī īīīīīŽīīīī īīīīīīīīīī īīīīī īīī ī ī¨īīīīīīīīīīīīī īī īīīīīīīīīīīīīī īīīīīĢīīīīīīŠīīīīīīīīīīīīīīīīīĢī ī īīīī īī īīī īīīī īīī īīīīīī ī īī īī īīīīīī īī īŦīīī ī īīīīī ī¨īīīīīīīīīī īī īīīī īī īīī īīīīīīī īīīī īīīīīīī īīīī īīī īī īīīīī īīīīīīīĢī ī īī īīīī īī īīī īīīī īīī īīīīīī īīīīīīīīīī īīīīī īīīīīīīīīīīīī īīīī īīīīīŽīĢī ī īīīī īī īīī īĄīŖīī ī īī īĄī īīīīīŽī īŖīīī īīīīī ī īīīīī ī¸īĄīŖīīšī īīīīī īīīīī īīīī īīī īīīī īī īīī§ī īīīīī īīīīīīīīīīī īī§īīī īīīīīŽīīĢī ī ī ī ī īīīī īī īīīīīīī īīīīīīīīīī
īīīīīīī īīīīī
īīīīī īīīīīīīīīīīīīīīīīī
ī īīīīī īī īīīīīīī īīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīī īī īīī īĄīĸīŖī¤īĨīĄīīŖīīīī īī
īīīī īīī īīīīīīīīīīīīīī īīīīīī īīīīīīī īīī īīīī īīīīīīīīī īīīīī īīĻīīīīīĻīī ī
īīīī ī īīīīīīī īīīī īīīĸīī īīīīī īīī īī īīīī īīīĢī ī īī īī īīīīīīī īīīīīīīīī īīīī īīīī īī īīī īī īīīīīŽīī īīīīī ī īīīīīīīī īīīŠīŠīīīīīīīīīīī ī¨ī īīī ī īī īīī ī īīīŠīīīī īī īīīī īīī ī īīīī īī īīīīīīī īīīīīīīīīĢīīīĄī īī īīīīīīīīīīīīī īī īīīŠīīī īīī īīīī īīīīīīīīĨīīĢī ī
īīĢīīīī īŦīīīīīīīąīīīīīīī ī
īī īŦīīīīīīīīĢīī§īīīīŧīīīŧīīīīīīīīī
īīīī īī īīīīīīī īīīīīīīīīī
īīīīīīī īīīīī
Policy Acknowledgement Form Company:
Spicerhaart Group Ltd
User Name: Department:
I understand that being granted access to computer systems and company information carries a great deal of responsibility. I recognise that I am being granted this access with the understanding that I will use the network resources and company information in a responsible manner. I realise that specific guidelines and expectations of me are detailed in the appropriate policies. Initial below to indicate which policies you have received, read, understand, and to which you agree: ________
Acceptable Use
________
Confidential Data
________
Data Classification
________
________
Password
________
Remote Access
________
Retention
________
Other (list: ________________________________________________)
I UNDERSTAND THAT WHILE THE COMPANY INTENDS TO PROVIDE A SAFE AND POSITIVE EXPERIENCE WHEN USING COMPANY SYSTEMS AND THE INTERNET, THE COMPANY MAKES NO WARRANTIES AS TO THE CONTENT OF THE NETWORK AND THE INTERNET. I AM RESPONSBILE FOR MY OWN ACTIONS AND WILL RELEASE THE COMPANY FROM ANY LIABILITY RELATING TO MY NETWORK USAGE. I AGREE TO USE THE NETWORK AND SYSTEMS IN AN APPROPRIATE MANNER AS SPECIFIED IN THE APPLICABLE POLICIES. I UNDERSTAND THAT MY USE OF THE NETWORK AND SYSTEMS MAY BE MONITORED AT ANY TIME AND I SHOULD HAVE NO EXPECTATION OF PRIVACY IN CONNECTION WITH THIS USE. I UNDERSTAND THAT FAILURE TO USE THE NETWORK IN A RESPONSBILE MANNER MAY RESULT IN LOSS OF NETWORK PRIVELEGES, SUSPENSION, OR TERMINATION. I UNDERSTAND THAT IF ILLEGAL ACTIVITY IS SUSPECTED, THE COMPANY WILL REPORT THE ACTIVITY TO THE APPLICABLE AUTHORITIES.
User Name(Print): __________________________________________________________ User Signature:
__________________________________________________________
Date:
__________________________________________________________
Policy Acknowledgement Form
Version 2.0
Page 1 of 1
īīīīī īīīī īīīīīīīīīīīīīīīīīīī ī ī īīīīī īīīīīīī
īī
īīīīī īīīīīīīīīī
īī
īīīīīīīīīīīīī īīī īī
ī
ī ī īīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīī īīīīīīī īīīīīīīīīīīīī īīīīīīīī īīīīīīīīīīīīīīīīīīīīīī īī īī īīīīīīī īīīīīīīīīĄīīīīīīĸīīīĄīīīīīīīīīīīīī īīī īīīīīīŖīīīīī īīīīī īīīīīīīīīīīīīīī īīī īīīīīīī īīīīīīīīīīĸī ī ī¤īī īīīīīīīīīīī īĨīīīīīī īĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻī īīīīīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻī ī īīīīīīīīŖīīīīīīīīīīī īĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻī ī īīīīīīīīīīīīīīī īĻīĻīĻīī§īī ī īīīīīī īīī¨īī īīīīī ī īŠīīīīīīīīīīĒī ī ī ī īĻīĻīĻīīĢīīīīīŖīīīīīīīīīīīīīīīīī īīīīīī īīīīīīŠīīīī īīīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĒī ī ī ī ī īĻīĻīĻīīĢīīīīīŖīīīīĄīīī īīīīīīĢīīīīīīīīīŠīīīī īīīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĒī ī īīīīīīīīīīīīīī īīīī īĻīĻīĻīīŦīīīīī īĻīĻīĻīīŦīīīīīīīī īŠīīīīīīīīīīĒī ī ī ī ī īīīīīīīīīīīīīīīīīīīīīī īīīīīīīī īī īīīīīīīīīīīīīīī īīī īīīīīīīīīīīīīīīīīīī īī īīīīīīīīīīī īīīīīīīī īī īīī īīīīīĄīīīīīīīŠīīīĄīĒī ī īīŖīīīī ī īīīīī īīīīī īīī īīī īīīīī īīīīīīīĸīīīĄīīīīīīīīīī īīīīī īīīīī īī īīīīī ī ī īīīīīī īīī īīīī īīīī īīīīīīīī īīī ī ī ī ī īĻīĻīĻīĻīĻīĻīī¨īīīīīīīīīīīŽīīīīīīīī īīīīŽīīīīīīīīīīīī īīī īīīīīīīīī īī īīīīīīīīĄīīīīīīĸī ī ī ī ī īĻīĻīĻīĻīĻīĻīī¨īīīīīīīīīīīīīīīīīīīīī īīīīīīīī īīī īīīīīīīīī īī īīīīīīīīĄīīīīīīĸī ī ī ī ī īĻīĻīĻīĻīĻīĻīī¨īīīīīīīīī īī īīīīīīīīīīī īīīīīīīīīī īīīīīīīīī īī īīīīīīīīĄīīīīīīĸī ī īĄīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīŖīīīīī īīīīīīīīī īīīī īīīīīīīīīīīīīī īīŖīīīīīīīīīīī īīīīīī ī īĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻī ī īĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻī ī īĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻī ī ī
īīīīī īīīīīīīŠīĄīīīī īĒīī ī īīīīī īīĢīīīīī īīīīī ī īīīīīīīīīīīīī īīī īī ī īīīīīīīīīīĢīīīīī īīīīī
īĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻī
ī¤īī īīīīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻī
īĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻī īĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻī īĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻīĻī
Guest Network Access Request
Version 2.0
Page 1 of 1
Security Incident Report Spicerhaart Group Ltd
Company: User Name: Department:
Date of Incident:
________________
Incident Location:
__________________________________________________________
Type of Incident: information (circle one)
Physical:
Time/Date Incident Detected: ________________
Loss
or
theft
of
device
containing
company
Complete Section 1 Electronic:
Suspicious password request, hack attempt, virus infection Complete Section 2
Section 1: Physical Security Incident Media/Device Type: __________________________________________________________ Encryption Used?:
Yes
No
Confidential Data Involved?:
Yes
No
Unsure
Section 2: Electronic Security Incident Type of Incident: ī¨ ī¨ ī¨ ī¨
Hack attempt Denial of Service Malicious Code (Trojan/virus) Unauthorized system access
Confidential Data Involved?:
Yes
No
ī¨ ī¨ ī¨ ī¨
Suspicious password request Misuse of systems Password compromise Other (explain below)
Unsure
Impact of Incident: ī¨ Data Loss/Corruption ī¨ System Damage ī¨ System/Network Downtime
ī¨ Web Page Defacement ī¨ Other (explain below)
Section 3: All Incidents Describe Incident: (attach additional pages if needed)
__________________________________________________________ __________________________________________________________ __________________________________________________________ __________________________________________________________ __________________________________________________________
Security Incident Report
Version 2.0
Page 1 of 2
Actions Taken: (attach additional pages if needed)
__________________________________________________________ __________________________________________________________ __________________________________________________________ __________________________________________________________
By signing below I certify that the information I have provided on this form is true to the best of my knowledge: User Name (Print):
__________________________________________________________
User Signature:
__________________________________________________________
Date:
__________________________________________________________ *** Please give this form immediately to the IT Manager or your supervisor ***
Security Incident Report
Version 2.0
Page 2 of 2
īīīīī īīīīīīīīīī īīīīīī īīīīīīīī īī ī īīīīīīīīī
ī
īīīīīīīīīīī
īī
īīīīīīīīīīīī
ī
īīīīīīīīīīīī
īī
ī ī īīīīī īīī ī ī ī īīīīīīīīī ī īīīī īīīīīīīī īīī ī īīīī īīīīīīīī īīīīīīī īīīīīī īīīīīīīīīīīīī īīī īīīīīīīīīīīīīĄī ī ī ī ī ī ī ī ī ī ī ī ī īĸīīīīīīīīŖī īīīīīī īī īīī īīīīīīīĄī ī ī ī ī ī ī ī ī ī ī ī ī ī ī ī ī ī īŖīīīīīīīīīīīīīīīīīī īŖīīīīīīŖī īīīīīī ī ī ī ī ī ī ī ī īīīīīī īīīīīīŖī īīīīī īīīīīīīīīīīīīīī īīīīīĄīī ī ī ī ī ī ī ī ī ī ī ī īīīŦīīīīīīīīīīī īīīīīīīīīīīīīīīīīīī ī ī ī ī
īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī ī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī ī¤īīīīīīīĨīīīīīī īīīīīīīīīīīīīīīīĻīīīīĄī īĨīīīīīīīīĨīīīīīī ī ī§īīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīī¨īīīŠīĒīīīīīīīīī ī īīīīīīīīī īīīīīīīīīī¨īĄī īīīīīīīīīīīī
īīīīīīīīīīīīīīīīīīīīīīīī
īīīĸīīīīīīīīīīīīīīīīīīīīīīīī
īĸīīīīīīīīīīīīī īĢīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī ī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī ī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī
Notice of Noncompliance
Version 2.0
Page 1 of 2
ī īī īī īŠīīī¨īīīī īī īīī īīīīī īīī īīīīī īīīīī īī īīī īīīī īīīīīīīī īī ī¨īīīī ī īīīīīīī īīīīī īī īīīī īī īīīī īīīīī īīīī ī īīīīīīīīīīīīīīīīīīīīīī īīīīīīī¨īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīī¨īīīīīīīīīīīīī īīīīīīīīī īīīīī īīīī īī īīīīīīīī ī¨īīīī īīīīī īīīīī īīī ī īī īīīīīīīīīīī īīīīī īī īīīīī īī īīī īīī īīī īīīīīīīī īīīīī īīīīī ī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīī īīīīīīīīīīīī ī ī īīīīīīīīīīīīīīīīīĄīī ī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī ī ī īīīīīīīī īīīīīīīīī ī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī ī ī īīīīīī ī ī ī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī ī ī ī īīīīīīīīīīīīīīīīīīīīīīīĄīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī ī ī īīīīīīīīīīīīīī īīīīīīīī ī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī ī ī īīīīīī ī ī ī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī ī ī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī ī īīīīī īīīīīīīīīīīĒīīīīīīīīīīīīŽīīīī īŽī§ī ī ī
Notice of Noncompliance
Version 2.0
Page 2 of 2
īīīīīī īīīīīīīīīīīīīīīīīīīīīīī ī īīīīīīīīī
ī
īī īīīīīīīīī
īī
īīīīīīīīīīīī
īī
ī ī īīīī īīīīīīīī īīīīīīīīī īīīīīīīīīīīīī īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī īīīīīīīīīīīīīīīĄī ī īīīīīīīīĸīīīīīīīīī īŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖī ī īīīī īīīīīīīīīīīīī īīī īŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖī ī ī ī ī īŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖī ī ī ī ī ī ī ī īŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖī ī ī ī ī īŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖī ī īīīīīīī īīīīīīīīīī īīī īŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖī ī ī ī ī īŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖī ī ī ī ī ī ī ī īŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖī ī ī ī ī ī ī ī īŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖī ī ī ī¤ī īīīīī īīīīīīī īīīīī īīīīīīīīīīīīī ī īīīīīīīīīīī īīīī ī īīīīī īīī īĨī īĻīī ī īīīīīīīīīīīī ī ī§īī¨īīīīīīīīīīīī¨īī īīīīīīīīīīīīīīīĨī īīī ī īĻīī ī īīīīīīīīīīīī ī ī īŠīīī īīīīīīīīīīīīĒīī¤īīīīīīīīīīīīīīīīīīīīīīīīīīīīīīī¤īīīī¨īīīīīī¨īīīīīīīīīīīī īīīīīīīī īīīīīīīīīīīīīīīī īīīīīīīī īĢīīīĒīīīīīīīī ī īī īīīīīīīīīŦīīīīīīīī īŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖī ī īī īīīī īīīīīīīīīīī īŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖī ī īīīīīī ī ī īŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖī ī ī ī īīīīīī īīīī īīīīīĸīīīīīīīī īīīīīīīī īīīīīīīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖī ī īĸīīīīī¨īīīīīīīīīŦīīīīīīīīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖī ī īĸīīīīīīīŽīīīī īīīīīīīīīī īŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖīŖī Request for Policy Exception
Version 2.0
Page 1 of 1
Spicerhaart Group Ltd Colwyn House Sheepen Place Colchester Essex CO3 3LD Tel: 01206 765599