Loading...
The URL can be used to link to this page
Your browser does not support the video tag.
CONTRACT 7434 Vender Agreement
Agreement No. 7434 te6refresh Company Address I(W bly';IeO.. C i c1e �LJl e _30 IN? Boor: Seach, CA "2i: 0 us Quote # QUO - 22 75 Contact Information Prepared By Maftheuv Taal-al`o Title Sales CCen�tiors .a mir Email matttammarocd.�:ec-e�resn -or-, Phone +3 1 -' 329-95 Address Information Bill To Name C,t' o1 Ei Sa,u:rr,o Bill To 350 kIair St EISeaunac. -A 9C24 .:S PAN-PA-3430-ATP-HA2-R PAN-PA-3430-ATP-HA2-R PAN-PA-3430-AWF-HA2-R PAN-PA-3430-AWF-HA2-R PAN-PA-3430-AD NS-HA2-R Terms & Conditions iV:'. '30 Expiration Date 103''2025 Opportunity Owner Stapher Car -;!,alai Contact Name T,xdd Selbv Title IT Email Or• Phone -1 310-52 -% 10C) Ship To Name C)f; of EI Senurrdo Ship To 350 �;ta,n S: El Securco A ..=45 S Advanced Threat Prevention subscription for device in an HA pair renewal, PA-3430 Start Date: 11/24/2025 End Date: 11/23/2026 Serial #: 024301002699 Advanced Threat Prevention subscription for device in an HA pair renewal, PA-3430 Start Date: 11/24/2025 End Date: 11/23/2026 Serial #: 024301003488 PA-3430, Advanced WildFire subscription, for one (1) device in an HA pair, 1 year (12 months) term, renewal. Start Date: 11/24/2025 End Date: 11/23/2026 Serial #: 024301002699 PA-3430, Advanced WildFire subscription, for one (1) device in an HA pair, 1 year (12 months) term, renewal. Start Date: 11/24/2025 End Date: 11/23/2026 Serial #: 024301003488 Advanced DNS Security subscription for device in an HA pair renewal, PA-3430, 1 year Start Date: 11/2412025 End Date: 11/23/2026 Serial #: 024301002699 Advanced DNS Security subscription for device in an HA pair renewal, Please remit all purchase orders and invoices to: IrC UI:en State• 1.00 $13,741,71 $13,741.71 1.00 $13,741.71 $13,741,71 1A0 $13,741.71 $13.741.71 1.00 $13,741.71 $13,741.71 1,00 $13,741.71 $13,741,71 PAN-PA-3430-ADN S-HA2-R Agreement No. 7434 teC,refresh PA-3430.1 year Start Date: 11/24/2025 End Date: 11/23/2026 Serial #: 024301003488 PA-3430, Advanced URL Filtering subscription, for one (1) device in an 1.00 $13,741.71 $13,741.71 HA pair, 1 year (12 months) term, renewal. PAN-PA-3430-ADVURL-HA2-R Start Date: 11/24/2025 1,00 $13,741.71 $13,741.71 End Date: 11/23/2026 Serial #: 024301002699 PA-3430, Advanced URL Filtering subscription. for one (1) device in an HA pair, 1 year (12 months) term, renewal. PAN-PA-3430-ADVURL-HA2-R Start Date: 11/24/2025 1.00 $13,741.71 $13,741.71 End Date: 11/23/2026 Serial #: 024301003488 For US Government accounts only. Premium support renewal, PA-3430 PAN-SVC-PREIVIUSG-3430-R Start Date: 11/24/2025 End Date: 11/23/2026 Serial #: 024301002699 For US Government accounts only. Premium support renewal, PA-3430 PAN-SVC-PREMUSG-3430-R Start Date: 11/24/2025 End Date: 11/23/2026 I Serial #: 024301003488 Totals Contract # .., r r; c Nj. e- 7_ 1-7C-4 --5 .:JP"D -.'Easter -73V i_,m'cer Vendor Quote # Memo 2025) PaIc Alt•.. 3J3Cs: PereAa1 Y'H CITY OF EL SEGUNDO, a general law city and municipal corporation cam_," Darrell George, City Manager a -1�6— Assistant City Attorney Subtotal Grand Total "Susan Truax, City Clerk 1.00 $13,73135 $13,731.35 1.00 $13.731.35 $13,731.35 ry Sharon Brennan, isk Manager Attachments - State of California Participating Addendum No. 7-17-70-40-05 First Amendment to Participating Addendum No. 7-17-70-40-05 Second Amendment to Participating Addendum No. 7-17-70-40-05 Third Amendment to Participating Addendum No. 7-17-70-40-05 State of Utah Cooperative Contract with Carahsoft Technologies Corp_ (NASPO ValuePoint) (Contract # AR2472) Terms & Conditions V,:t :Iil Please remit all purchase order and invoices to: idovr: r !elf\ ;;rr.;:c Stags Agreement No. 7434 STATE OF CALIFORNIA PARTICIPATING ADDENDUM NO, 7-17-70-40-05 Cloud Solutions Utah NASPO ValuePoint Master Agreement No. AR2472 Carahsoft Technology Corp. This Participating Addendum Number 7-17-70-40-05 is entered into between the State of California, Department of General Services (hereafter referred to as "State" or "DGS") and Carahsoft Technology Corp. (hereafter referred to as "Contractor„) under the lead State of Utah NASPO ValuePoint Master Agreement Number AR2472. 1. SCOPE A. This Participating Addendum covers the purchase of Cloud Solutions under the Utah NASPO ValuePoint Master Agreement. The Utah NASPO ValuePoint Master Agreement Number AR2472 is hereby incorporated by reference. The cloud solution services are identified in Section 5 (Available Services). } B. This Participating Addendum is available for use by all State Agencies including the Executive, Judicial and Legislative branches, and will include all California political subdivisions/local governments. A subdivisiontlocal government is defined as any city, county, city and county, district, or other local governmental body or corporation, including the California State Universities (CSU) and University of California (UC) systems, K-12 schools and community colleges empowered to expend public funds. C. Each political subdivision/local government is to make its own determination whether this Participating Addendum and the Utah NASPO ValuePoint Master Agreement are consistent with its procurement policies and regulations. 2. TERM A. The term of this Participating Addendum shall begin upon signature approval by the State and will end September 15, 2026, or upon termination by the State, whichever occurs first. B. Lead State amendments to extend the Master Price Agreement term date are not automatically incorporated into this Participating Addendum. Extension(s) to the term of this Participating Addendum will be through a written amendment upon mutual agreement between the State and the Contractor. 3. TERMS AND CONDITIONSIINCORPORATION OF DOCUMENTS. A. Terms and conditions listed below are hereby incorporated by reference and made a part of this Participating Addendum as if attached herein and shall apply to the purchase of services made under this Participating Addendum. Page 1 of 8 Agreement No. 7434 Participating Addendum No. 7-17-70-40-05 Carahsoft Technology Corp. 1) General Provisions — Information Technology (GSPD-4011T), effective 9/5/2014. The twelve (12) page document can be viewed at: httPJ/www.documenj§.dgs.ca., ov/ d/ oli roc/GSPD4011T'p 4 0905, df. Exception: Article 11 of the General Provisions — Information Technology, is superseded by Section 4 (Order of Precedence) below. 2) Cloud Computing Special Provisions for Software as a Service (SaaS), effective 9/3/14. The five (5) page document can be viewed at: htt ://www,d,ocuments.d s,ca. g ov/ d/ oli roc/CLOUDCOMPUTINGSERVICESSPE CIALPROVISItNS 14 0903.docx 4. ORDER OF PRECEDENCE In the event of any inconsistency between the articles, attachments, or provisions which constitute this agreement, the following descending order of precedence shall apply: A. California Participating Addendum Number 7-17-70-40-05 B. Utah NASPO ValuePoint Master Agreement Number AR2472 C. Utah Solicitation CH16012 including all Addendums D. Contractor's response to Utah's Solicitation 5. AVAILABLE SERVICES The following service offering from the Utah NASPO ValuePoint Master Agreement Number AR2472 are allowed under this Participating Addendum: Software as a Service (SaaS) 6. RESTRICTIONS/DISALLOWED SERVICES — These restrictions are not applicable to political subdivisions/local governments. A. The following service offerings are prohibited under this Participating Addendum: Infrastructure as a Service (laaS) Platform as a Service (PaaS) Value Added Services, including Additional Value Added Services such as Maintenance Services; Deployment Services; Consulting/Advisory Services; Architectural Design Services; Statement of Work Services; Partner Services, and Training Deployment Services B. Product and service categories that are available on mandatory California statewide contracts cannot be purchased from this Participating Addendum by State Departments without an exemption. Prior to issuing a purchase order, State Departments are responsible for obtaining an exemption from DGS, and/or California Department of Technology (CDT). Page 2of8 Agreement No. 7434 Participating Addendum No. 7-17-70-40-05 Carahsoft Technology Corp. 7. PRICING A. Contractor shall submit a Price Schedule identifying all services offered under this Participating Addendum for the State's approval. B. The Price Schedule shall include the following: 1) Service Category (SaaS) Description 2) List Price 3) Discount off List Price 4) Contract Price C. Contractor shall obtain prior approval from Utah NASPO ValuePoint Contract Administrator, and submit a written notice of price increases/decreases and a revised Price List for the State's approval. D. State -approved Price List will be posted on the State's Cal eProcure website. 8. SERVICE ADDITIONS/DELETIONS A. Contractor may add or delete services introduced or removed from the market by the manufacturer under the following conditions: 1) Service is within existing awarded categories under the NASPO ValuePoint Master Price Agreement; 2) Contractor has obtained prior approval from the Utah NASPO ValuePoint Contract Administrator; and 3) Contractor receives written approval from the California State Contract Administrator. B. Contractor shall submit a written notice of service (s) additions/deletions and a revised Price Schedule for the State's approval. 9. FULFILLMENT PARTNERS/AUTHORIZED RESELLERS Authorized Resellers are available for this Participating Addendum: ISSUE PURCHASE ORDER TO Orders may be placed with Carahsoft Technology Corp. or with an Authorized Reseller as indicated below: Orders placed with Carahsoft Technology Corp. SUBMIT ORDERS TO: Carahsoft Technology Corp. 1860 Michael Faraday Drive, Suite 100 Contact: Karina Woods Phone: 703/871-8500 Fax No.: 703/871-8505 E-mail: OM@carahsoft. corn Page 3of8 Agreement No. 7434 Participating Addendum No. 7-17-70-40-05 Carahsoft Technology Corp. Orders placed with an Authorized Reseller must be addressed as shown below, and payment must be made payable to the Authorized Reseller identified on the invoice as shown below: SUBMIT ORDERS TO: Carahsoft Technology Corp. c/o DynTek Services, Inc. 4440 Von Karman, Suite 200, Newport Beach, CA 92660 Contact: Kelsea Pratt -Acosta Phone: 949/271-6780 Fax No.: 949/271-6794 E-mail: CAsales d ntek.cor SUBMIT ORDERS TO: Carahsoft Technology Corp. C/o NWN Solutions Corporation 2969 Prospect Park Drive, Suite 225, Rancho Cordova, CA 95670 Contact: Team Meade Phone: 916/637-2160 Fax No.: 916/596-4800 E-mail: TMeade nwnjt.com SUBMIT ORDERS TO: Carahsoft Technology Corp. c/o Taborda Solutions, Inc. 9580 Oak Ave Pkwy, Suite 7-180, Folsom, CA 95630 Contact: Bear Williams Phone: 916/717-8711 Fax No.: 9161200-0353 E-mail: bear.williarns@tabordasolutions.com For invoicing purposes, each State Accounting office must have a copy of the reseller's Payee Data Record (Std. 204) in order to process payment of the invoice. Agencies should forward a copy of the Std. 204 to their respective accounting office. Without the Std. 204, payment may be unnecessarily delayed. AUTHORIZED RESELLERS ARE RESPONSIBLE FOR SENDING A COPY OF ALL PURCHASE ORDERS TO CARAHSOFT TECHNOLOGY CORP. FOR COOPERATIVE AGREEMENTS (NASPO VALUEPOINT) QUARTERLY REPORTING REQUIREMENTS. When issuing an order to an authorized reseller listed on Cooperative Agreements, it is the agency's responsibility to ensure that the reseller holds a valid California Seller's Permit. NOTE: Contractor shall be responsible for successful performance and compliance with all requirements in accordance with the terms and conditions under this Participating Addendum, even if work is performed by Servicing Subcontractors. All State policies, guidelines, and requirements shall apply to Authorized Resellers. Page 4 of 8 Agreement No. 7434 Participating Addendum No. 7-17-70-40-05 Carahsoft Technology Corp. 10. ORDERING AGENCY RESPONSIBILITIES A. State department and political subdivision/local government use of this Participating Addendum is optional. B. State departments and political subdivision/local governments must follow the ordering procedures outlined within the User Instructions guide, administered by the State Contract Administrator, to execute orders against this Participating Addendum. 11. INVOICING AND PAYMENT A. Payment terms for this Participating Addendum are net forty-five (45) days. Payment will be made in accordance with IT General Provisions Paragraph 30 (Required Payment Date). B. Invoices shall be sent to the address identified in the Ordering Agency's purchase order,. The State Participating Addendum Number and Ordering Agency Purchase Order Number shall appear on each invoice for all purchases placed under this Participating Addendum. C. Contractor will accept the State of California credit card (CAL -Card) for payment of invoices. 12. USAGE REPORTING A. Contractor shall submit usage reports on a quarterly basis to the State Contract Administrator for all California entity purchases using the report template attached hereto as Attachment A. The report is due even when there is no activity. B. The report shall be an Excel spreadsheet transmitted electronically to the DGS mailbox at PDCoo eratives d s.ca, ov. C. Any report that does not follow the required format or that excludes information will be deemed incomplete. Contractor will be responsible for submitting corrected reports within five business days of the date of written notification from the State. D. Tax must not be included in the report, even if it is on the purchase order. E. Reports are due for each quarter as follows: Reporting Period Due Date JUL 1 to SEP 30 OCT 31 OCT 1 to DEC 31 JAN 31 JAN 1 to MAR 31 APR 30 APR 1 to JUN 30 JUL 31 F. Failure to meet reporting requirements and submit the reports on a timely basis shall constitute grounds for suspension of this contract. Page 5of8 Agreement No. 7434 Participating Addendum No. 7-17-70-40-05 Carahsoft Technology Corp. G. Amendments for term extensions may be approved only if all due reports have been submitted to the State. 13. ADMINISTRATIVE FEE A. Contractor shall submit a check, payable to the State of California, remitted to the Cooperative Agreement Unit for the calculated amount equal to one percent (0.01) of the sales for the quarterly period. B, Contractor must include the Participating Addendum Number on the check. Those checks submitted to the State without the Participating Addendum Number will be returned to Contractor for additional identifying information. C. Administrative fee checks shall be submitted to: State of California Department of General Services, Procurement Division Attention: Cooperative Agreement Program 707 3`d Street„ 2"d Floor, MS 2-202 West Sacramento, CA 95605 D. The administrative fee shall not be included as an adjustment to Contractor's NASPO ' ValuePoint Master Agreement pricing. E. The administrative fee shall not be invoiced or charged to the ordering agency. F. Payment of the administrative fee is due irrespective of payment status on orders or service contracts from a purchasing entity. G. Administrative fee checks are due for each quarter as follows: JUL 1 to SEP 30 OCT 31 OCT 1 to DEC 31 JAN 31 JAN 1 to MAR 31 APR 30 APR 1 to JUN 30 1 JUL 31 H. Failure to meet administrative fee requirements and submit fees on a timely basis shall constitute grounds for suspension of this contract. Page 6of8 Agreement No. 7434 Participating Addendum No. 7-17-70-40-05 Carahsoft Technology Corp. 14. CONTRACT MANAGEMENT A. The primary Contractor Contract Manager for this Participating Addendum shall be as follows: Contractor: Carahsoft Technology Corp. Name: Jack Dixon Phone: 703-230-7545 Fax: 703-871-8505 E-Mail: nas o carahsoft.com Address: 1860 Michael Faraday Drive, Ste 100 Reston, VA 20190 B. The State Contract Administrator for this Participating Addendum shall be as follows: Name: Yolanda Tuft Phone: 916.375.4408 Fax: 916.375.4663 E-Mail: yolandaAjtt(cDdgs.ca.gov Address: State of California Department of General Services Procurement Division 707 Third Street, 2nd Floor, MS 2-202 West Sacramento, CA 95605 C. Should the contact information for either party change, the party will provide written notice with updated information no later than ten business days after the change. 15. Termination of Agreement The State may terminate this Participating Addendum at any time upon 30 days prior written notice to the Contractor. Upon termination or other expiration of this Participating Addendum, each party will assist the other party in orderly termination of the Participating Addendum and the transfer of all assets, tangible and intangible, as may facilitate the orderly, nondisrupted business continuation of each party. This provision shall not relieve the Contractor of the obligation to perform under any purchase order or other similar ordering document executed prior to the termination becoming effective. 16. Amendment No amendment or variation of the terms of this Participating Addendum shall be valid unless made in writing, signed by the parties and approved as required. No oral understanding or agreement not incorporated in the Participating Addendum is binding on any of the parties. Page 7 of 8 Agreement No. 7434 Participating Addendum No. 7-17-70-40-06 Carahsoft Technology Corp. 17. Agreement A. This Participating Addendum and the Master Agreement together with its exhibits and/or amendments, set forth the entire agreement between the parties with respect to the subject matter of all previous communications, representations or agreements, whether oral or written, with respect to the subject matter hereof. Terms and conditions inconsistent with, contrary or in addition to the terms and conditions of this Participating Addendum and the Master Agreement, together with its exhibits and/or amendments, shall not be added to or incorporated into this Participating Addendum or the Master Agreement and its exhibits and/or amendments, by any subsequent purchase order or otherwise, and any such attempts to add or incorporate such terms and conditions are hereby rejected. The terms and conditions of this Participating Addendum and the Master Agreement and its exhibits and/or amendments shall prevail and govern in the case of any such inconsistent or additional terms. B. By signing below Contractor agrees to offer the same services as on the Utah NASPO ValuePoint Master Agreement Number AR2472, at prices equal to or lower than the prices on that contract. C. IN WITNESS WHEREOF, the parties have executed this Participating Addendum as of the date of execution by both parties below. STATE OF CALIFORNIA Department of General Services ;Incy Name &�� VAU& ignature of Authorized Signer Date Signed Ricardo Martinez, Acting Deputy Director Printed Name and Title of Authorized Signer 707 Third Street West Sacramento, CA 95605 Address Page 8 of 8 CONTRACTOR Carahsoft Technolo Cor . Contractor Name August 9, 2017 Signature of Authorized Signer Date Signed Ellen Lord, Contracts Manage Printed Name and Title of Authorized Signer 1860 Michael Faraday Drive, Suite 100 Reston, VA 20190 Address El O Z E 3 ti a v � e w a< d Z z � � afro 4 ti e aELE ei�iun�unN nen�i�nnn I�I�lplll� Agreement No. 7434 Agreement No. 7434 STATE OF CALIFORNIA PARTICIPATING ADDENDUM NO. 7-17-70-40-05 AMENDMENT NO. 1 Cloud Solutions Utah NASPO ValuePoint Master Agreement No. AR2472 Carahsoft Technology Corp. The parties hereto mutually agree to amend Participating Addendum Number 7-17-70-40-05 as follows: 1. Authorized Resellers outlined in Section 9 (Fulfillment Partners/Authorized Resellers) is revised to reflect the following: Authorized Resellers are available for this Participating Addendum: ISSUE PURCHASE ORDER TO Orders may be placed with Carahsoft Technology Corp. or with an Authorized Reseller as indicated below: Orders placed with Carahsoft Technology Corp. SUBMIT ORDERS TO: Carahsoft Technology Corp. 1860 Michael Faraday Drive, Suite 100 Tempe, AZ 85283 Contact: Karina Woods Phone: 703/871-8500 Fax No.: 703/871-8505 E-mail: Owl carat s ft, coo Orders placed with an Authorized Reseller must be addressed as shown below, and payment must be made payable to the Authorized Reseller identified on the invoice as shown below: SUBMIT ORDERS TO:: Carahsoft Technology Corp. c/o Allied Network Solutions, Inc. 5718 Lonetree Blvd., Rocklin, CA 95765 Contact: Roger Schnorenberg Phone: 916/774-2670 X101 E-mail: Rschnorenber ans-it.com SUBMIT ORDERS TO: Carahsoft Technology Corp. c/o Data Path Inc. 318 McHenry Ave., Modesto, CA 95354 Contact: Brian Jump Phone: 209/312-9808 E-mail: BJum m data path.com Page 1 of 4 Agreement No. 7434 Participating Addendum No. 7-17-70-40-05 Amendment #1 Carahsoft Technology Corp. SUBMIT ORDERS TO: Carahsoft Technology Corp. c/o DynTek Services, Inc. 4440 Von Karman, Suite 200, Newport Beach, CA 92660 Contact: Kelsea Pratt -Acosta Phone: 949/271-6780 Fax No.: 949/271-6794 E-mail: CAsaies@dynlgk.com SUBMIT ORDERS TO: Carahsoft Technology Corp. c/o Eventus Solutions Group LLC 9777 Pyramiel Court, Suite 160, Englewood, CA 80112 Contact: Craig Tobin Phone: 303/376-6161 E-mail: Crai tobin ventus .com SUBMIT ORDERS TO: Carahsoft Technology Corp. C/o HF Tech Services, Inc. 5777 Madison Avenue, Suite 1060, Sacramento, CA 95841 Contact: Allan P. Hart Phone: 916/690-5056 E-mail: allanehftechservices com SUBMIT ORDERS TO: Carahsoft Technology Corp. C/o NWN Solutions Corporation 2969 Prospect Park Drive, Suite 225, Rancho Cordova, CA 95670 Contact: Team Meade Phone: 916/637-2160 Fax No.: 916/596-4800 E-mail: TMeade@nwnit.com SUBMIT ORDERS TO: Carahsoft Technology Corp. c/o Savant Solutions, Inc. which will do business in California as [Savant Solutions Group] 1931 H Street, Sacramento, CA 95811 Contact: Caleb Kwong Phone: 916/836-8182 E-mail: Caleb savantsolutions.net Page 2 of 4 Agreement No. 7434 Participating Addendum No. 7-17-70-40-05 Amendment #1 Carahsoft Technology Corp. SUBMIT ORDERS TO: Carahsoft Technology Corp. c/o SHI International, Corp. 290 Davidson Avenue, Somerset, NJ 08873 Contact: Nick Grappone Phone: 732/564-8189 E-mail: Nick Gra onei. shcom SUBMIT ORDERS TO: Carahsoft Technology Corp. c/o Solutions Simplfied 8880 Cal Center Drive, Suite 400, Sacramento, CA 95826 Contact: Rachel DaValle Phone: 530/521-0576 E-mail: Rachel. Davallesolutlonssam lifed.net SUBMIT ORDERS TO: Carahsoft Technology Corp. c/o Taborda Solutions, Inc. 9580 Oak Ave Pkwy, Suite 7-180, Folsom, CA 95630 Contact: Bear Williams Phone: 916/717-8711 Fax No.: 916/200-0353 E-mail: Bear,Wiliiams@tab,ordaso,lutions.com SUBMIT ORDERS TO: Carahsoft Technology Corp. c/o vCloud Tech Inc. 609 Deep Valley Drive, Suite 200, Rollling Hills Estates, CA 90274 Contact: Nadia Khan Phone: 424/703-4135 E-mail: nadakhan vcloudtech.com For invoicing purposes, each State Accounting office must have a copy of the reseller's Payee Data Record (Std. 204) in order to process payment of the invoice. Agencies should forward a copy of the Std. 204 to their respective accounting office. Without the Std. 204, payment may be unnecessarily delayed. AUTHORIZED RESELLERS ARE RESPONSIBLE FOR SENDING A COPY OF ALL PURCHASE ORDERS TO QUEST MEDIA & SUPPLIES, INC. FOR COOPERATIVE AGREEMENTS (NASPO VALUEPOINT) QUARTERLY REPORTING REQUIREMENTS. When issuing an order to an authorized reseller listed on Cooperative Agreements, it is the agency's responsibility to ensure that the reseller holds a valid California Seller's Permit. Page 3 of 4 Agreement No. 7434 Participating Addendum No. 7-17-70-40-05 Amendment #1 Carahsoft Technology Corp. NOTE: Contractor shall be responsible for successful performance and compliance with all requirements in accordance with the terms and conditions under this Participating Addendum, even if work is performed by Authorized Resellers. All State policies, guidelines, and requirements shall apply to Authorized Resellers. All other terms and conditions of the Participating Addendum shall remain the same. IN WITNESS WHEREOF, the parties have executed this Participating Addendum Amendment as of the date of execution by both parties below. Participating State: State of California, Department of General Services By: Name: Angela Shell Title: Deputy Director Date: ° ' 11 Contractor: Carahsoft Technology Corp. Name: Robert R. Moore Title: Vice President. Date: April 25, 2018 Page 4 of 4 Agreement No. 7434 STATE OF CALIFORNIA PARTICIPATING ADDENDUM NUMBER 7-17-70-40-05 AMENDMENT 2 Cloud Solutions Utah NASPO ValuePoint Master Agreement Number AR2472 Carahsoft Technology Corp. (Contractor) The parties mutually agree to amend Participating Addendum 7-17-70-40-05 as follows: 1) Section 3. TERMS AND CONDITIONS/INCORPORATION OF DOCUMENTS is updated to read as follows: A. Terms and conditions listed below are hereby incorporated by reference and made a part of this Participating Addendum as if attached herein and shall apply to the purchase of goods or services made under this Participating Addendum. Terms can be viewed on the DGS Procurement Division website (https://www.dgs.ca.gov/PD/Resources/Page-Content/Procurement-Division- Resources-List-Folder/Model-Contract-Language). i. General Provisions — Information Technology (GSPD-401IT) effective 9/5/2014. ii. Cloud Computing Software as a Service (SaaS) General Provisions effective 6/7/2019. iii. Cloud Computing Special Provisions for Software as a Service (SaaS) effective 03/15/18. iv. Cloud Computing Special Provisions for Infrastructure as a Service (IaaS) & Platform as a Service (PaaS), effective 05/11 /16. 2) Section 5. AVAILABLE PRODUCTS AND SERVICES is updated to read as follows: A. The following service offerings from the Utah NASPO ValuePoint Master Agreement Number AR2472 are allowed under this Participating Addendum: 1) Software as a Service (SaaS) 2) Infrastructure as a Service (IaaS) 3) Platform as a Service (PaaS) 3) Section 6. RESTRICTIONS/DISALLOWED PRODUCTS AND SERVICES (STATE AGENCIES ONLY) is updated to read as follows: A. The following product/service offerings are disallowed for state agencies under this Participating Addendum: 1) Value Added Services, including Additional Value Added Services such as Maintenance Services; Deployment Services; Consulting/Advisory Services; Architectural Design Services; Statement of Work Services; Partner Services, and Training Deployment Services Page 1 of 3 Agreement No. 7434 Participating Addendum 7-17-70-40-05 Amendment 2 B. Product and service categories that are available on mandatory California statewide contracts cannot be purchased from this Participating Addendum by State agencies without an exemption. Prior to issuing a purchase order, State agencies are responsible for obtaining an exemption from DGS, and/or California Department of Technology (CDT). C. State agencies must first obtain approval by the California Department of Technology (CDT) to use this Participating Addendum for Infrastructure as a Service (laaS) and/or Platform as a Service (PaaS) purchases in accordance with Technology Letter 17-0 (www.cdt.ca.gov/wp-content/uploads/2017/08rTL- 17-06.pdf). 4) Section 14. CONTRACT MANAGEMENT subpart A is updated to read as follows: A. The primary Contractor Contract Manager for this Participating Addendum shall be as follows: Contractor: Carahsoft Technology Corp. Name: Alex Cord Phone: 703-871-8500 E-Mail: Alex,Cord@Cara,hsoft.com Address: 11493 Sunset Hills Road, Suite 100 Reston, VA 20190 5) Section 9 FULFILLMENT PARTNERS/AUTHORIZED RESELLERS is updated to read as follows: A. Contractor may use State -approved Authorized Resellers under this Participating Addendum for sales and service functions as defined herein. 1) Orders may be placed with the Contractor or Authorized Resellers. 2) Authorized Resellers must accept purchase orders and accept payment from ordering agencies for products and services offered under this Participating Addendum. 3) Authorized Resellers are responsible for sending a copy of all purchase orders and invoices to the Contractor for compliance with quarterly usage reporting and administrative fee requirements. 4) All purchase documents to Authorized Resellers shall reference the Participating Addendum Number and Contractor Name. Page 2 of 3 Agreement No. 7434 Participating Addendum 7-17-70-40-05 Amendment 2 B. Contractor shall be responsible for successful performance and compliance with all requirements in accordance with the terms and conditions under this Participating Addendum, even if work is performed by Authorized Resellers. All State policies, guidelines, and requirements shall apply to Authorized Resellers. C. Contractor will be the sole point of contact with regard to Participating Addendum contractual matters, reporting, and administrative fee requirements. D. Subject to the approval of the State, Authorized Resellers may be added on a quarterly basis during the term of the contract. Contractors shall notify the State of any deleted Authorized Resellers or changes to current Authorized Resellers' contact information in writing at any time during the contract term. E. Contractor will be required to submit Authorized Reseller requests, in a format specified by the State, to the State Contract Administrator for approval. F. State -approved Authorized Resellers will be posted on the State's Cal eProcure website. All other terms and conditions of the Participating Addendum shall remain in full force and effect. IN WITNESS WHEREOF, the parties have executed this Amendment as of the date of execution by both parties below. STATE OF CALIFORNIA CONTRACTOR Department of General Services Carahsoft Technology Corp. Agency Name Contractor Name 4ZAugust 11, 2021 L� 8/11/2.021 ................. �........ Authorized Signature Date Signed Authorized Signature Date Signed Stephanne Lim, MAU2 Supervisor Printed Name/Title of Person Signing 707 Third Street West Sacramento, CA 95605 Address Kristina Smith - Director of Contracts Printed Nome/T _ mmm►tle of Person Signing 11493 Sunset Hills Road, Suite 100 Reston, VA 20190 Address Page 3 of 3 Agreement No. 7434 STATE OF CALIFORNIA PARTICIPATING ADDENDUM NUMBER 7-17-70-40-05 AMENDMENT 3 Cloud Solutions Utah NASPO ValuePoint Master Agreement Number AR2472 Carahsoft Technology Corporation (Contractor) The parties mutually agree to amend Participating Addendum 7-17-70-40-05 as follows: 1) Section 7. PRICING is revised to read as follows: A. Contractor's pricing is outlined in the Utah NASPO ValuePoint Master Agreement Number AR2472. 2) Section 16. CONTRACT MANAGEMENT, subparagraph A is revised to read as follows: A. The primary Contractor Contract Manager for this Participating Addendum shall be as follows: Contractor _ Contract Manager ..._ .. _...m.� ...._... Name:. ....... _ .. Mariah Edwards Phone: �_....._ ...... __..... (818) 449-3729 _�� Email: ._ carahsoft,co m Mariah.Ed ards Address: Carahsoft Technology Corporation Mariah Edwards 11493 Sunset Hills Road, Suite 100 Resto, VA 20190 Page 1 of 2 Agreement No. 7434 Participating Addendum 7-17-70-40-05 Amendment 3 3) Section 18. EXECUTIVE ORDER N-6-22 — RUSSIA SANCTIONS is hereby added to read as follows: 18. EXECUTIVE ORDER N-6-22 — RUSSIA SANCTIONS On March 4, 2022, Governor Gavin Newsom issued Executive Order N-6- 22 (the EO) regarding Economic Sanctions against Russia and Russian entities and individuals. "Economic Sanctions" refers to sanctions imposed by the U.S. government in response to Russia's actions in Ukraine, as well as any sanctions imposed under state law. The EO directs state agencies to terminate contracts with, and to refrain from entering any new contracts with, individuals or entities that are determined to be a target of Economic Sanctions. Accordingly, should the State determine Contractor is a target of Economic Sanctions or is conducting prohibited transactions with sanctioned individuals or entities, that shall be grounds for termination of this Participating Addendum. The State shall provide Contractor advance written notice of such termination, allowing Contractor at least thirty (30) calendar days to provide a written response. Termination shall be at the sole discretion of the State. All other terms and conditions of the Participating Addendum shall remain in full force and effect. IN WITNESS WHEREOF, the parties have executed this Amendment as of the date of execution by both parties below. STATE OF CALIFORNIA CONTRACTOR Department of General Services _. Carahsoft Technology Corporation Agency Name Contractor Name Authorized Signature Date Signed Julie Matthews, M_AU2 Supervisor Printed Name/Title of Person Signing 707 Third Street West Sacramento, CA 95605 Address ��,.� pxej5L 06/22/2023 Authorized Signature Date Signed Kristina Smith, Contracts Director ._...._ .... Printed Name/Title of Person Signing 11493 Sunset Hills Rd, Suite 100, Reston, VA 20190 ....�.. .... ........� Address Page 2 of 2 Agreement No. 7434 Contract # AR2472 STATE OF UTAH COOPERATIVE CONTRACT I. CONTRACTING PARTIES: This contract is between the Division of Purchasing and the following Contractor: CarahsoFt Techno£ot+Co�oration_mmm _ m. ..... -_. . LEGAL. STATUS OF CONTRACTOR Name ❑ Sole Proprielor 1860 Michael Faraday Drive. Suite 100 ❑ Non-Prolit Corporation Address Z For -Profit Corporation Reston VA 20190 ❑ Partnership City State Zip ❑ Government Agency Contact Person 13etllt rt Phone +703-230-7435 Email NASPCY'Carativwll com Vendor YVC00001 16540 Commodity Code 0920-05 2. GENERAL PURPOSE Or CONTRACT:C"onirrcCz�r iuscttttitlecl4a..pt'wu3�tmgltr warda3tlpdt utit,sttmulw itrIp tcltrteg�t E3 La Ptmr�tici. �tttrtta* Slate" once a Paprticifaatin �r Acticlw rtdttttl drags bCCIT srgM ed 3. PROCUREMENT PROCESS: This contract is entered into as a result of the procurement process on 13idPCH 16012. 4. CONTRACT PERIOD: Eflcctive Date: 10/14/3016 Termination Date: 09,115/2026 unless terminated earl, or extended in accordance with the terms and conditions of this contract. dote: Pursuant to Solicitation NCI-116012, Contract must re -certify its goalilications each year. 5. Administrative Fee, ns described in the Solicitation and Attachment A: The Contractor shall pay to NASPO Valuel'oint, or its assignee„ a NASPO ValuePoint Administrative Fee ol'one-quarter ofone percent (0.25% or 0.0025) no later than 60 clays Iollowing the end of each calendar quarter. The NASPO ValuePoint Administrative Pce shall be submitted quarterly and is based on sales of the Services. 6. ATTACHMENT A: NASPO ValuePoint Master Terms and Conditions, including the attached Exhibits ATTACHMENT B: Scope of Services Awarded to C'omractor ATTACHHMENT C: Pricing Discounts and Pricing Schedule ATTACHMENT D: Contractor's Response to Solicitation CLI16012 ATTACHMENT E: Service Offering EULAs Any conflicts between Attachment A and the other Attachments will be resolved in favor of Attachment A. S. DOCUMENTS INCORPORATED IN f0 THIS CONTRAC r 13Y REFERENCE BUT NO I- ATTACHED: a. All other governmental lws, regulations, or actions applicable to the goods and./or services authorized b; this contract. b Utah State Procurement Code and the Procurement RUICS. 9. Each signator,, below represents that he or she has the requisite authority to enter into this contract. IN WITNESS WHEREOF, the parties sign and cause (his contact to be executed, CONTRACTOR STATE �,. ttrrtt t� 10, II l 16 �w ctors s nalutc Date D'n'cctgr, Tp°isit rt of Purchasing Cl,t9c Robert Moore, Vice President Type or Print Name and Title D1ei4uo0 oltuu�r lh 1t«m,,, Co11 ioyu .W in �4OC11110 s N i li yr I av Number �l�m ul rro Itl4 V�Rk9 ..�..�L �N^9 t4� qlk 6Y+I dR,+ ,uiwrr p1, Juno 'tS4Cr} Agreement No. 7434 This document includes salient or non-standard provisions extracted from NASPO/ValuePoint Model Contract for Cloud Services. February 17, 2016. NASPO e Poin't Attachment A: NASPO ValuePoint Master Agreement Terms and Conditions 1. Master Agreement Order of Precedence a. Any Order placed under this Master Agreement shall consist of the following documents: (1) A Participating Entity's Participating Addendum' ("PA"); (2) NASPO ValuePoint Master Agreement Terms & Conditions, including the applicable Exhibits2 to the Master Agreement; (3) The Solicitation; (4) Contractor's response to the Solicitation, as revised (if permitted) and accepted by the Lead State; and (5) A Service Level Agreement issued against the Participating Addendum. b. These documents shall be read to be consistent and complementary. Any conflict among these documents shall be resolved by giving priority to these documents in the order listed above. Contractor terms and conditions that apply to this Master Agreement are only those that are expressly accepted by the Lead State and must be in writing and attached to this Master Agreement as an Exhibit or Attachment. 2. Definitions - Unless otherwise provided in this Master Agreement, capitalized terms will have the meanings given to those terms in this Section. Confidential Information means any and all information of any form that is marked as confidential or would by its nature be deemed confidential obtained by Contractor or its employees or agents in the performance of this Master Agreement, including, but not necessarily limited to (1) any Purchasing Entity's records, (2) personnel records, and (3) information concerning individuals, is confidential information of Purchasing Entity. Contractor means the person or entity providing solutions under the terms and conditions set forth in this Master Agreement. Contractor also includes its employees, subcontractors, agents and affiliates who are providing the services agreed to under the 1 A Sample Participating Addendum will be published after the contracts have been awarded. 2 The Exhibits comprise the terms and conditions for the service models: PaaS, IaaS, and PaaS. Agreement No. 7434 This document includes salient or non-standard provisions extracted from NASPO/ValuePoint Model Contract for Cloud Services. February 17, 2016. Master Agreement. Data means all information, whether in oral or written (including electronic) form, created by or in any way originating with a Participating Entity or Purchasing Entity, and all information that is the output of any computer processing, or other electronic manipulation, of any information that was created by or in any way originating with a Participating Entity or Purchasing Entity, in the course of using and configuring the Services provided under this Agreement. Data Breach means any actual or reasonably suspected non -authorized access to or acquisition of computerized Non -Public Data or Personal Data that compromises the security, confidentiality, or integrity of the Non -Public Data or Personal Data, or the ability of Purchasing Entity to access the Non -Public Data or Personal Data. Data Categorization means the process of risk assessment of Data. See also "High Risk Data", "Moderate Risk Data" and "Low Risk Data". Disabling Code means computer instructions or programs, subroutines, code, instructions, data or functions, (including but not limited to viruses, worms, date bombs or time bombs), including but not limited to other programs, data storage, computer libraries and programs that self -replicate without manual intervention, instructions programmed to activate at a predetermined time or upon a specified event, and/or programs purporting to do a meaningful function but designed for a different function, that alter, destroy, inhibit, damage, interrupt, interfere with or hinder the operation of the Purchasing Entity's' software, applications and/or its end users processing environment, the system in which it resides, or any other software or data on such system or any other system with which it is capable of communicating. Fulfillment Partner means a third -party contractor qualified and authorized by Contractor, and approved by the Participating State under a Participating Addendum, who may, to the extent authorized by Contractor, fulfill any of the requirements of this Master Agreement including but not limited to providing Services under this Master Agreement and billing Customers directly for such Services. Contractor may, upon written notice to the Participating State, add or delete authorized Fulfillment Partners as necessary at any time during the contract term. Fulfillment Partner has no authority to amend this Master Agreement or to bind Contractor to any additional terms and conditions. High Risk Data is as defined in FIPS PUB 199, Standards for Security Categorization of Federal Information and Information Systems ("High Impact Data"). Infrastructure as a Service (IaaS) as used in this Master Agreement is defined the capability provided to the consumer to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run Agreement No. 7434 This document includes salient or non-standard provisions extracted from NASPO/ValuePoint Model Contract for Cloud Services. February 17, 2016. arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications; and possibly limited control of select networking components (e.g., host firewalls). Intellectual Property means any and all patents, copyrights, service marks, trademarks, trade secrets, trade names, patentable inventions, or other similar proprietary rights, in tangible or intangible form, and all rights, title, and interest therein. Lead State means the State centrally administering the solicitation and any resulting Master Agreement(s). Low Risk Data is as defined in FIPS PUB 199, Standards for Security Categorization of Federal Information and Information Systems ("Low Impact Data"). Master Agreement means this agreement executed by and between the Lead State, acting on behalf of NASPO ValuePoint, and the Contractor, as now or hereafter amended. Moderate Risk Data is as defined in FIPS PUB 199, Standards for Security Categorization of Federal Information and Information Systems ("Moderate Impact Data") NASPO ValuePoint is the NASPO ValuePoint Cooperative Purchasing Program, facilitated by the NASPO Cooperative Purchasing Organization LLC, a 501(c)(3) limited liability company (doing business as NASPO ValuePoint) is a subsidiary organization the National Association of State Procurement Officials (NASPO), the sole member of NASPO ValuePoint. The NASPO ValuePoint Cooperative Purchasing Organization facilitates administration of the cooperative group contracting consortium of state chief procurement officials for the benefit of state departments, institutions, agencies, and political subdivisions and other eligible entities (i.e., colleges, school districts, counties, cities, some nonprofit organizations, etc.) for all states and the District of Columbia. The NASPO ValuePoint Cooperative Development Team is identified in the Master Agreement as the recipient of reports and may be performing contract administration functions as assigned by the Lead State. Non -Public Data means High Risk Data and Moderate Risk Data that is not subject to distribution to the public as public information. It is deemed to be sensitive and confidential by the Purchasing Entity because it contains information that is exempt by statute, ordinance or administrative rule from access by the general public as public information. Participating Addendum means a bilateral agreement executed by a Contractor and a Participating Entity incorporating this Master Agreement and any other additional Participating Entity specific language or other requirements, e.g. ordering procedures Agreement No. 7434 This document includes salient or non-standard provisions extracted from NASPO/ValuePoint Model Contract for Cloud Services. February 17, 2016. specific to the Participating Entity, other terms and conditions. Participating Entity means a state, or other legal entity, properly authorized to enter into a Participating Addendum. Participating State means a state, the District of Columbia, or one of the territories of the United States that is listed in the Request for Proposal as intending to participate. Upon execution of the Participating Addendum, a Participating State becomes a Participating Entity. Personal Data means data alone or in combination that includes information relating tc an individual that identifies the individual by name, identifying number, mark or description can be readily associated with a particular individual and which is not a public record. Personal Information may include the following personally identifiable information (PII): government -issued identification numbers (e.g., Social Security, driver's license, passport); financial account information, including account number, credit or debit card numbers; or Protected Health Information (PHI) relating to a person. Platform as a Service (PaaS) as used in this Master Agreement is defined as the capability provided to the consumer to deploy onto the cloud infrastructure consumer - created or -acquired applications created using programming languages and tools supported by the provider. This capability does not necessarily preclude the use of compatible programming languages, libraries, services, and tools from other sources. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. Product means any deliverable under this Master Agreement, including Services, software, and any incidental tangible goods. Protected Health Information (PHI) means individually identifiable health information transmitted by electronic media, maintained in electronic media, or transmitted or maintained in any other form or medium. PHI excludes education records covered by the Family Educational Rights and Privacy Act (FERPA), as amended, 20 U.S.C. 1232g, records described at 20 U.S.C. 1232g(a)(4)(B)(iv) and employment records held by a covered entity in its role as employer. PHI may also include information that is a subset of health information, including demographic information collected from an individual, and (1) is created or received by a health care provider, health plan, employer or health care clearinghouse; and (2) relates to the past, present or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present or future payment for the provision of health care to an individual; and (a) that identifies the individual; or (b) with respect to which there is a reasonable basis to believe the information can be used to identify the individual. Agreement No. 7434 This document includes salient or non-standard provisions extracted from NASPO/ValuePoint Model Contract for Cloud Services. February 17, 2016. Purchasing Entity means a state, city, county, district, other political subdivision of a State, and a nonprofit organization under the laws of some states if authorized by a Participating Addendum, who issues a Purchase Order against the Master Agreement and becomes financially committed to the purchase. Services mean any of the specifications described in the Scope of Services that are supplied or created by the Contractor pursuant to this Master Agreement. Security Incident means the possible or actual unauthorized access to a Purchasing Entity's Non -Public Data and Personal Data the Contractor believes could reasonably result in the use, disclosure or theft of a Purchasing Entity's Non -Public Data within the possession or control of the Contractor. A Security Incident also includes a major security breach to the Contractor's system, regardless if Contractor is aware of unauthorized access to a Purchasing Entity's Non -Public Data. A Security Incident may or may not turn into a Data Breach. Service Level Agreement (SLA) means a written agreement between both the Purchasing Entity and the Contractor that is subject to the terms and conditions in this Master Agreement and relevant Participating Addendum unless otherwise expressly agreed in writing between the Purchasing Entity and the Contractor. SLAs should include: (1) the technical service level performance promises, (i.e. metrics for performance and intervals for measure), (2) description of service quality, (3) identification of roles and responsibilities, (4) remedies, such as credits, and (5) an explanation of how remedies or credits are calculated and issued. Software as a Service (SaaS) as used in this Master Agreement is defined as the capability provided to the consumer to use the Contractor's applications running on a Contractor's infrastructure (commonly referred to as 'cloud infrastructure). The applications are accessible from various client devices through a thin client interface such as a Web browser (e.g., Web -based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user -specific application configuration settings. Solicitation means the documents used by the State of Utah, as the Lead State, to obtain Contractor's Proposal. Statement of Work means a written statement in a solicitation document or contract that describes the Purchasing Entity's service needs and expectations. 6. Discount Guarantee Period: All discounts must be guaranteed for the entire term of the Master Agreement. Participating Entities and Purchasing Entities shall receive the immediate benefit of price or rate reduction of the services provided under this Master Agreement. A price or rate reduction will apply automatically to the Master Agreement Agreement No. 7434 This document includes salient or non-standard provisions extracted from NASPO/ValuePoint Model Contract for Cloud Services. February 17, 2016. and an amendment is not necessary. 8. Confidentiality, Non -Disclosure, and Injunctive Relief a. Confidentiality. Contractor acknowledges that it and its employees or agents may, in the course of providing a Product under this Master Agreement, be exposed to or acquire information that is confidential to Purchasing Entity's or Purchasing Entity's clients. Any reports or other documents or items (including software) that result from the use of the Confidential Information by Contractor shall be treated in the same manner as the Confidential Information. Confidential Information does not include information that (1) is or becomes (other than by disclosure by Contractor) publicly known; (2) is furnished by Purchasing Entity to others without restrictions similar to those imposed by this Master Agreement; (3) is rightfully in Contractor's possession without the obligation of nondisclosure prior to the time of its disclosure under this Master Agreement; (4) is obtained from a source other than Purchasing Entity without the obligation of confidentiality, (5) is disclosed with the written consent of Purchasing Entity or; (6) is independently developed by employees, agents or subcontractors of Contractor who can be shown to have had no access to the Confidential Information. b. Non -Disclosure. Contractor shall hold Confidential Information in confidence, using at least the industry standard of confidentiality, and shall not copy, reproduce, sell, assign, license, market, transfer or otherwise dispose of, give, or disclose Confidential Information to third parties or use Confidential Information for any purposes whatsoever other than what is necessary to the performance of Orders placed under this Master Agreement. Contractor shall advise each of its employees and agents of their obligations to keep Confidential Information confidential. Contractor shall use commercially reasonable efforts to assist Purchasing Entity in identifying and preventing any unauthorized use or disclosure of any Confidential Information. Without limiting the generality of the foregoing, Contractor shall advise Purchasing Entity, applicable Participating Entity, and the Lead State immediately if Contractor learns or has reason to believe that any person who has had access to Confidential Information has violated or intends to violate the terms of this Master Agreement, and Contractor shall at its expense cooperate with Purchasing Entity in seeking injunctive or other equitable relief in the name of Purchasing Entity or Contractor against any such person. Except as directed by Purchasing Entity, Contractor will not at any time during or after the term of this Master Agreement disclose, directly or indirectly, any Confidential Information to any person, except in accordance with this Master Agreement, and that upon termination of this Master Agreement or at Purchasing Entity's request, Contractor shall turn over to Purchasing Entity all documents, papers, and other matter in Contractor's possession that embody Confidential Information. Notwithstanding the foregoing, Contractor may keep one copy of such Confidential Information necessary for quality assurance, audits and evidence of the performance of this Master Agreement. c. Injunctive Relief. Contractor acknowledges that breach of this section, including disclosure of any Confidential Information, will cause irreparable injury to Purchasing Agreement No. 7434 This document includes salient or non-standard provisions extracted from NASPO/ValuePoint Model Contract for Cloud Services. February 17, 2016. Entity that is inadequately compensable in damages. Accordingly, Purchasing Entity may seek and obtain injunctive relief against the breach or threatened breach of the foregoing undertakings, in addition to any other legal remedies that may be available. Contractor acknowledges and agrees that the covenants contained herein are necessary for the protection of the legitimate business interests of Purchasing Entity and are reasonable in scope and content. d. Purchasing Entity Law. These provisions shall be applicable only to extent they are not in conflict with the applicable public disclosure laws of any Purchasing Entity. 9. Right to Publish: Throughout the duration of this Master Agreement, Contractor must secure prior approval from the Lead State or Participating Entity for the release of any information that pertains to the potential work or activities covered by the Master Agreement, including but not limited to reference to or use of the Lead State or a Participating Entity's name, Great Seal of the State, Coat of Arms, any Agency or other subunits of the State government, or any State official or employee, for commercial promotion which is strictly prohibited. News releases or release of broadcast a -mails pertaining to this Master Agreement or Participating Addendum shall not be made without prior written approval of the Lead State or a Participating Entity. The Contractor shall not make any representations of NASPO ValuePoint's opinion or position as to the quality or effectiveness of the services that are the subject of this Master Agreement without prior written consent. Failure to adhere to this requirement may result in termination of the Master Agreement for cause. 11. Changes in Contractor Representation: The Contractor must notify the Lead State of changes in the Contractor's key administrative personnel, in writing within 10 calendar days of the change. The Lead State reserves the right to approve changes in key personnel, as identified in the Contractor's proposal. The Contractor agrees to propose replacement key personnel having substantially equal or better education, training, and experience as was possessed by the key person proposed and evaluated in the Contractor's proposal. 13. Indemnification and Limitation of Liability a. The Contractor shall defend, indemnify and hold harmless NASPO, NASPO ValuePoint, the Lead State, Participating Entities, and Purchasing Entities, along with their officers, agents, and employees as well as any person or entity for which they may be liable, from and against claims, damages or causes of action including reasonable attorneys' fees and related costs for any death, bodily injury, or damage to real or tangible property arising directly or indirectly from the negligent or wrongful act(s), error(s), or omission(s) of the Contractor, its employees or subcontractors or volunteers, at any tier, relating to the performance under the Master Agreement. b. Indemnification — Intellectual Property. The Contractor shall defend, indemnify and hold harmless NASPO, NASPO ValuePoint, the Lead State, Participating Entities, Purchasing Entities, along with their officers, agents, and employees as well as any Agreement No. 7434 This document includes salient or non-standard provisions extracted from NASPO/ValuePoint Model Contract for Cloud Services. February 17, 2016. person or entity for which they may be liable ("Indemnified Party"), from and against claims, damages or causes of action including reasonable attorneys' fees and related costs arising out of the claim that the Product or its use, infringes Intellectual Property rights ("Intellectual Property Claim") of another person or entity. (1) The Contractor's obligations under this section shall not extend to: a. Any use of the Services provided hereunder not contemplated in the product documentation. b. Any use of the Services provided hereunder in combination with other products not contemplated hereunder or in the documentation, any use of modification of the Services provided hereunder except as permitted by this Agreement. (2) The Indemnified Party shall notify the Contractor within a reasonable time after receiving notice of an Intellectual Property Claim. Even if the Indemnified Party fails to provide reasonable notice, the Contractor shall not be relieved from its obligations unless the Contractor can demonstrate that it was prejudiced in defending the Intellectual Property Claim resulting in increased expenses or loss to the Contractor and then only to the extent of the prejudice or expenses. If the Contractor promptly and reasonably investigates and defends any Intellectual Property Claim, it shall have control over the defense and settlement of it. However, the Indemnified Party must consent in writing for any money damages or obligations for which it may be responsible. The Indemnified Party shall furnish, at the Contractor's reasonable request and expense, information and assistance necessary for such defense. If the Contractor fails to vigorously pursue the defense or settlement of the Intellectual Property Claim, the Indemnified Party may assume the defense or settlement of it and the Contractor shall be liable for all costs and expenses, including reasonable attorneys' fees and related costs, incurred by the Indemnified Party in the pursuit of the Intellectual Property Claim. Unless otherwise agreed in writing, this section is not subject to any limitations of liability in this Master Agreement or in any other document executed in conjunction with this Master Agreement. b. Except as otherwise set forth in the Indemnification Paragraphs above, the limit of liability shall be as follows: i. Contractor's liability for any claim, loss or liability arising out of, or connected with the Services provided, and whether based upon default, or other liability such as breach of contract, warranty, negligence, misrepresentation or otherwise, shall in no case exceed direct damages in: (i) an amount equal to two (2) times the charges specified in the Purchase Order for the Services, or parts thereof forming the basis of the Purchasing Entity's claim, (said amount not to exceed a total of twelve (12) months charges payable under the applicable Agreement No. 7434 This document includes salient or non-standard provisions extracted from NASPO/ValuePoint Model Contract for Cloud Services. February 17, 2016. Purchase Order) or (ii) two million dollars ($2,000,000), whichever is greater. ii. The Purchasing Entity may retain such monies from any amount due Contractor as may be necessary to satisfy any claim for damages, costs and the like asserted against the Purchasing Entity unless Contractor at the time of the presentation of claim shall demonstrate to the Purchasing Entity's satisfaction that sufficient monies are set aside by the Contractor in the form of a bond or through insurance coverage to cover associated damages and other costs. iii. Notwithstanding the above, neither the Contractor nor the Purchasing Entity shall be liable for any consequential, indirect or special damages of any kind which may result directly or indirectly from such performance, including, without limitation, damages resulting from loss of use or loss of profit by the Purchasing Entity, the Contractor, or by others. iv. The limitations of liability in Section 43 will not apply to claims for bodily injury or death as set forth in Section 13, and Section 30 when made applicable under a specific purchase order. 16. Insurance a. Unless otherwise agreed in a Participating Addendum, Contractor shall, during the term of this Master Agreement, maintain in full force and effect, the insurance described in this section. Contractor shall acquire such insurance from an insurance carrier or carriers licensed to conduct business in each Participating Entity's state and having a rating of A-, Class VII or better, in the most recently published edition of Best's Reports. Failure to buy and maintain the required insurance may result in this Master Agreement's termination or, at a Participating Entity's option, result in termination of its Participating Addendum. b. Coverage shall be written on an occurrence basis. The minimum acceptable limits shall be as indicated below, with no deductible for each of the following categories: (1) Commercial General Liability covering premises operations, independent contractors, products and completed operations, blanket contractual liability, personal injury (including death), advertising liability, and property damage, with a limit of not less than $1 million per occurrence/$3 million general aggregate; (2) CLOUD MINIMUM INSURANCE COVERAGE: ................. ........ ...... Data Breach and Privacy/Cyber Liability including Technology Crime Insurance Level of Errors and Omissions Minimum Insurance Risk Minimum Insurance Coverage Coverao e 000 00 Low $2 000,000 $2 Agreement No. 7434 This document includes salient or non-standard provisions extracted from NASPO/ValuePoint Model Contract for Cloud Services. February 17, 2016. Moderate Hioh $5,000,000 $10,000,000 $5,000,000 $10,000,000 (3) Contractor must comply with any applicable State Workers Compensation or Employers Liability Insurance requirements. (4) Professional Liability. As applicable, Professional Liability Insurance Policy in the minimum amount of $1,000,000 per occurrence and $1,000,000 in the aggregate, written on an occurrence form that provides coverage for its work undertaken pursuant to each Participating Addendum. c. Contractor shall pay premiums on all insurance policies. Such policies shall also reference this Master Agreement and shall have a condition that they not be revoked by the insurer until thirty (30) calendar days after notice of intended revocation thereof shall have been given to Purchasing Entity and Participating Entity by the Contractor. d. Prior to commencement of performance, Contractor shall provide to the Lead State a written endorsement to the Contractor's general liability insurance policy or other documentary evidence acceptable to the Lead State that (1) names the Participating States identified in the Request for Proposal as additional insureds, (2) provides that no material alteration, cancellation, non -renewal, or expiration of the coverage contained in such policy shall have effect unless the named Participating State has been given at least thirty (30) days prior written notice, and (3) provides that the Contractor's liability insurance policy shall be primary, with any liability insurance of any Participating State as secondary and noncontributory. Unless otherwise agreed in any Participating Addendum, the Participating Entity's rights and Contractor's obligations are the same as those specified in the first sentence of this subsection. Before performance of any Purchase Order issued after execution of a Participating Addendum authorizing it, the Contractor shall provide to a Purchasing Entity or Participating Entity who requests it the same information described in this subsection. e. Contractor shall furnish to the Lead State, Participating Entity, and, on request, the Purchasing Entity copies of certificates of all required insurance within thirty (30) calendar days of the execution of this Master Agreement, the execution of a Participating Addendum, or the Purchase Order's effective date and prior to performing any work. The insurance certificate shall provide the following information: the name and address of the insured; name, address, telephone number and signature of the authorized agent; name of the insurance company (authorized to operate in all states); a description of coverage in detailed standard terminology (including policy period, policy number, limits of liability, exclusions and endorsements); and an acknowledgment of the requirement for notice of cancellation. Copies of renewal certificates of all required insurance shall be furnished within thirty (30) days after any renewal date. These certificates of insurance must expressly indicate compliance with each and every insurance requirement specified in this section. Failure to provide evidence of coverage Agreement No. 7434 This document includes salient or non-standard provisions extracted from NASPO/ValuePoint Model Contract for Cloud Services. February 17, 2016. may, at sole option of the Lead State, or any Participating Entity, result in this Master Agreement's termination or the termination of any Participating Addendum. f. Coverage and limits shall not limit Contractor's liability and obligations under this Master Agreement, any Participating Addendum, or any Purchase Order. 17. Laws and Regulations: Any and all Services offered and furnished shall comply fully with all applicable Federal and State laws and regulations. The federal and state laws, regulations, policies, standards, and guidelines that Contractors doing business with the Participating Entities must be aware of, include, but not limited to: Criminal Justice Information Services (CJIS) Security Policy; Federal Educational Rights and Privacy Act (FERPA); Federal Information Security Management Act (FISMA); National Institute of Technology Standards; Gramm -Leach - Bliley Act (GLB) Act; Health Insurance Portability and Accountability Act (HIPAA); Health Information Technology for Economic and Clinical Health Act (HITECH); IRS Publication 1075; Payment Card Industry Data Security Standard (PCI DSS); Sarbanes- Oxley Act (SOX); Electronic Communications Privacy Act, Stored Communications Act and the PATRIOT Act. The list is intentionally United States -centric, and is not intended to be all-inclusive. Further, since laws, regulations, requirements and industry guidelines change, consulting definitive sources to assure a clear understanding of compliance requirements is critical. Many State Entities have additional program compliance requirements that must be considered in addressing compliance. (e.g., DMV Privacy Act, Public Service Law, etc.). 20. Participants and Scope a. Contractor may not deliver Services under this Master Agreement until a Participating Addendum acceptable to the Participating Entity and Contractor is executed. The NASPO ValuePoint Master Agreement Terms and Conditions are applicable to any Order by a Participating Entity (and other Purchasing Entities covered by their Participating Addendum), except to the extent altered, modified, supplemented or amended by a Participating Addendum. By way of illustration and not limitation, this authority may apply to unique delivery and invoicing requirements, confidentiality requirements, defaults on Orders, governing law and venue relating to Orders by a Participating Entity, indemnification, and insurance requirements. Statutory or constitutional requirements relating to availability of funds may require specific language in some Participating Addenda in order to comply with applicable law. The expectation is that these alterations, modifications, supplements, or amendments will be addressed in the Participating Addendum or, with the consent of the Purchasing Entity and Contractor, may be included in the ordering document (e.g. purchase order or contract) used by the Purchasing Entity to place the Order. b. Subject to subsection 20c and a Participating Entity's Participating Addendum, the use of specific NASPO ValuePoint cooperative Master Agreements by state agencies, political subdivisions and other Participating Entities (including cooperatives) authorized Agreement No. 7434 This document includes salient or non-standard provisions extracted from NASPO/ValuePoint Model Contract for Cloud Services. February 17, 2016. by individual state's statutes to use state contracts is subject to the approval of the respective State Chief Procurement Official. c. Unless otherwise stipulated in a Participating Entity's Participating Addendum, specific services accessed through the NASPO ValuePoint cooperative Master Agreements for Cloud Services by state executive branch agencies, as required by a Participating Entity's statutes, are subject to the authority and approval of the Participating Entity's Chief Information Officer's Office3. d. Obligations under this Master Agreement are limited to those Participating Entities who have signed a Participating Addendum and Purchasing Entities within the scope of those Participating Addenda. Financial obligations of Participating States are limited to the orders placed by the departments or other state agencies and institutions having available funds. Participating States incur no financial obligations on behalf of political subdivisions. e. NASPO ValuePoint is not a party to the Master Agreement. It is a nonprofit cooperative purchasing organization assisting states in administering the NASPO ValuePoint cooperative purchasing program for state government departments, institutions, agencies and political subdivisions (e.g., colleges, school districts, counties, cities, etc.) for all 50 states, the District of Columbia and the territories of the United States. f. Participating Addenda shall not be construed to amend the terms of this Master Agreement between the Lead State and Contractor. g. Participating Entities who are not states may under some circumstances sign their own Participating Addendum, subject to the approval of participation by the Chief Procurement Official of the state where the Participating Entity is located. Coordinate requests for such participation through NASPO ValuePoint. Any permission to participate through execution of a Participating Addendum is not a determination that procurement authority exists in the Participating Entity; they must ensure that they have the requisite procurement authority to execute a Participating Addendum. h. Resale. Subject to any explicit permission in a Participating Addendum, Purchasing Entities may not resell goods, software, or Services obtained under this Master Agreement. This limitation does not prohibit: payments by employees of a Purchasing Entity as explicitly permitted under this agreement; sales of goods to the general public as surplus property; and fees associated with inventory transactions with other governmental or nonprofit entities under cooperative agreements and consistent with a Purchasing Entity's laws and regulations. Any sale or transfer permitted by this 3 Chief Information Officer means the individual designated by the Governor with Executive Branch, enterprise - wide responsibility for the leadership and management of information technology resources of a state. Agreement No. 7434 This document includes salient or non-standard provisions extracted from NASPO/ValuePoint Model Contract for Cloud Services. February 17, 2016. subsection must be consistent with license rights granted for use of intellectual property.. 22. Data Access Controls: Contractor will provide access to Purchasing Entity's Data only to those Contractor employees, contractors and subcontractors ("Contractor Staff') who need to access the Data to fulfill Contractor's obligations under this Agreement. Contractor shall not access a Purchasing Entity's user accounts or Data, except on the course of data center operations, response to service or technical issues, as required by the express terms of this Master Agreement, or at a Purchasing Entity's written request. Contractor may not share a Purchasing Entity's Data with its parent corporation, other affiliates, or any other third party without the Purchasing Entity's express written consent. Contractor will ensure that, prior to being granted access to the Data, Contractor Staff who perform work under this Agreement have successfully completed annual instruction of a nature sufficient to enable them to effectively comply with all Data protection provisions of this Agreement; and possess all qualifications appropriate to the nature of the employees' duties and the sensitivity of the Data they will be handling. 23. Operations Management: Contractor shall maintain the administrative, physical, technical, and procedural infrastructure associated with the provision of the Product in a manner that is, at all times during the term of this Master Agreement, at a level equal to or more stringent than those specified in the Solicitation. Contractor must maintain any certifications required under the Solicitation. 24. Public Information: This Master Agreement and all related documents are subject to disclosure pursuant to the Purchasing Entity's public information laws. 26. Records Administration and Audit. a. The Contractor shall maintain books, records, documents, and other evidence pertaining to this Master Agreement and orders placed by Purchasing Entities under it to the extent and in such detail as shall adequately reflect performance and administration of payments and fees. Contractor shall permit the Lead State, a Participating Entity, a Purchasing Entity, the federal government (including its grant awarding entities and the U.S. Comptroller General), and any other duly authorized agent of a governmental agency, to audit, inspect, examine, copy and/or transcribe Contractor's books, documents, papers and records directly pertinent to this Master Agreement or orders placed by a Purchasing Entity under it for the purpose of making audits, examinations, excerpts, and transcriptions. This right shall survive for a period of six (6) years following termination of this Agreement or final payment for any order placed by a Purchasing Entity against this Agreement, whichever is later, to assure compliance with the terms hereof or to evaluate performance hereunder. b. Without limiting any other remedy available to any governmental entity, the Agreement No. 7434 This document includes salient or non-standard provisions extracted from NASPO/ValuePoint Model Contract for Cloud Services. February 17, 2016. Contractor shall reimburse the applicable Lead State, Participating Entity, or Purchasing Entity for any overpayments inconsistent with the terms of the Master Agreement or orders or underpayment of fees found as a result of the examination of the Contractor's records. c. The rights and obligations herein exist in addition to any quality assurance obligation in the Master Agreement requiring the Contractor to self -audit contract obligations and that permits the Lead State to review compliance with those obligations. d. The Contractor shall allow the Purchasing Entity to audit conformance to the Master Agreement and applicable Participating Addendum terms. The purchasing entity may perform this audit or contract with a third party at its discretion and at the purchasing entity's expense. 27. Administrative Fees: The Contractor shall pay to NASPO ValuePoint, or its assignee, a NASPO ValuePoint Administrative Fee of one -quarter of one percent (0.25% or 0.0025) no later than 60 days following the end of each calendar quarter. The NASPO ValuePoint Administrative Fee shall be submitted quarterly and is based on sales of the Services. The NASPO ValuePoint Administrative Fee is not negotiable. This fee is to be included as part of the pricing submitted with proposal. Additionally, some states may require an additional administrative fee be paid directly to the state on purchases made by Purchasing Entities within that state. For all such requests, the fee level, payment method and schedule for such reports and payments will be incorporated into the Participating Addendum that is made a part of the Master Agreement. The Contractor may adjust the Master Agreement pricing accordingly for purchases made by Purchasing Entities within the jurisdiction of the state. All such agreements shall not affect the NASPO ValuePoint Administrative Fee percentage or the prices paid by the Purchasing Entities outside the jurisdiction of the state requesting the additional fee. The NASPO ValuePoint Administrative Fee shall be based on the gross amount of all sales at the adjusted prices (if any) in Participating Addenda. 28. System Failure or Damage: In the event of system failure or damage caused by Contractor or its Services, the Contractor agrees to use its best efforts to restore or assist in restoring the system to operational capacity. 29. Title to Product: If access to the Product requires an application program interface (API), Contractor shall convey to Purchasing Entity an irrevocable and perpetual license to use the API. 30. Data Privacy: When required by a specific purchase order issued under this Agreement or a Participating Addendum and accepted by the Contractor, the Contractor must comply with all applicable laws related to data privacy and security, including IRS Pub 1075. Prior to entering into a SLA with a Purchasing Entity, the Contractor and Agreement No. 7434 This document includes salient or non-standard provisions extracted from NASPO/ValuePoint Model Contract for Cloud Services. February 17, 2016. Purchasing Entity must cooperate and hold a meeting to determine the Data Categorization to determine whether the Contractor will hold, store, or process High Risk Data, Moderate Risk Data and Low Risk Data. The Contractor must document the Data Categorization in the SLA or Statement of Work. 31. Warranty: At a minimum the Contractor must warrant the following: a. Contractor has acquired any and all rights, grants, assignments, conveyances, licenses, permissions, and authorization for the Contractor to provide the Services described in this Master Agreement. b. Contractor will perform materially as described in this Master Agreement, SLA, Statement of Work, including any performance representations contained in the Contractor's response to the Solicitation by the Lead State. c. Contractor represents and warrants that the representations contained in its response to the Solicitation by the Lead State. d. The Contractor will not interfere with a Purchasing Entity's access to and use of the Services it acquires from this Master Agreement. e. The Services provided by the Contractor are compatible with and will operate successfully with any environment (including web browser and operating system) specified by the Contractor in its response to the Solicitation by the Lead State. f. The Contractor warrants that the Products it provides under this Master Agreement are free of malware. The Contractor must use industry -leading technology to detect and remove worms, Trojans, rootkits, rogues, dialers, spyware, etc. 32. Transition Assistance: a. The Contractor shall reasonably cooperate with other parties in connection with all Services to be delivered under this Master Agreement, including without limitation any successor service provider to whom a Purchasing Entity's Data is transferred in connection with the termination or expiration of this Master Agreement. The Contractor shall assist a Purchasing Entity in exporting and extracting a Purchasing Entity's Data, in a format usable without the use of the Services and as agreed by a Purchasing Entity, at no additional cost to the Purchasing Entity. Any transition services requested by a Purchasing Entity involving additional knowledge transfer and support may be subject to a separate transition Statement of Work. b. A Purchasing Entity and the Contractor shall, when reasonable, create a Transition Plan Document identifying the transition services to be provided and including a Statement of Work if applicable. Agreement No. 7434 This document includes salient or non-standard provisions extracted from NASPO/ValuePoint Model Contract for Cloud Services. February 17, 201& c. The Contractor must maintain the confidentiality and security of a Purchasing Entity's Data during the transition services and thereafter as required by the Purchasing Entity. 35. Debarment : The Contractor certifies, to the best of its knowledge, that neither it nor its principals are presently debarred, suspended, proposed for debarment, declared ineligible, or voluntarily excluded from participation in this transaction (contract) by any governmental department or agency. This certification represents a recurring certification made at the time any Order is placed under this Master Agreement. If the Contractor cannot certify this statement, attach a written explanation for review by the Lead State. 37. Governing Law and Venue a. The procurement, evaluation, and award of the Master Agreement shall be governed by and construed in accordance with the laws of the Lead State sponsoring and administering the procurement. The construction and effect of the Master Agreement after award shall be governed by the law of the state serving as Lead State (in most cases also the Lead State). The construction and effect of any Participating Addendum or Order against the Master Agreement shall be governed by and construed in accordance with the laws of the Participating Entity's or Purchasing Entity's State. b. Unless otherwise specified in the RFP, the venue for any protest, claim, dispute or action relating to the procurement, evaluation, and award is in the Lead State. Venue for any claim, dispute or action concerning the terms of the Master Agreement shall be in the state serving as Lead State. Venue for any claim, dispute, or action concerning any Order placed against the Master Agreement or the effect of a Participating Addendum shall be in the Purchasing Entity's State. c. If a claim is brought in a federal forum, then it must be brought and adjudicated solely and exclusively within the United States District Court for (in decreasing order of priority): the Lead State for claims relating to the procurement, evaluation, award, or contract performance or administration if the Lead State is a party; the Participating State if a named party; the Participating Entity state if a named party; or the Purchasing Entity state if a named party. d. This section is also not a waiver by the Participating State of any form of immunity, including but not limited to sovereign immunity and immunity based on the Eleventh Amendment to the Constitution of the United States. 40. Contract Provisions for Orders Utilizing Federal Funds: Pursuant to Appendix II to 2 Code of Federal Regulations (CFR) Part 200, Contract Provisions for Non -Federal Entity Contracts Under Federal Awards, Orders funded with federal funds may have Agreement No. 7434 This document includes salient or non-standard provisions extracted from NASPO/ValuePoint Model Contract for Cloud Services. February 17, 2016. additional contractual requirements or certifications that must be satisfied at the time the Order is placed or upon delivery. These federal requirements may be proposed by Participating Entities in Participating Addenda and Purchasing Entities for incorporation in Orders placed under this master agreement. 42. NASPO ValuePoint Summary and Detailed Usage Reports: In addition to other reports that may be required by this solicitation, the Contractor shall provide the following NASPO ValuePoint reports. a. Summary Sales Data. The Contractor shall submit quarterly sales reports directly to NASPO ValuePoint using the NASPO ValuePoint Quarterly Sales/Administrative Fee Reporting Tool found at http://www.naspo.orgMNCPO/Calculator.aspx. Any/all sales made under the contract shall be reported as cumulative totals by state. Even if Contractor experiences zero sales during a calendar quarter, a report is still required. Reports shall be due no later than 30 day following the end of the calendar quarter (as specified in the reporting tool). b. Detailed Sales Data. Contractor shall also report detailed sales data by: (1) state; (2) entity/customer type, e.g. local government, higher education, K12, non-profit; (3) Purchasing Entity name; (4) Purchasing Entity bill -to and ship -to locations; (4) Purchasing Entity and Contractor Purchase Order identifier/number(s); (5) Purchase Order Type (e.g. sales order, credit, return, upgrade, determined by industry practices); (6) Purchase Order date; (7) Ship Date; (8) and line item description, including product number if used. The report shall be submitted in any form required by the solicitation. Reports are due on a quarterly basis and must be received by the Lead State and NASPO ValuePoint Cooperative Development Team no later than thirty (30) days after the end of the reporting period. Reports shall be delivered to the Lead State and to the NASPO ValuePoint Cooperative Development Team electronically through a designated portal, email, CD -Rom, flash drive or other method as determined by the Lead State and NASPO ValuePoint. Detailed sales data reports shall include sales information for all sales under Participating Addenda executed under this Master Agreement. The format for the detailed sales data report is in shown in Attachment F. c. Reportable sales for the summary sales data report and detailed sales data report includes sales to employees for personal use where authorized by the solicitation and the Participating Addendum. Report data for employees should be limited to ONLY the state and entity they are participating under the authority of (state and agency, city, county, school district, etc.) and the amount of sales. No personal identification numbers, e.g. names, addresses, social security numbers or any other numerical identifier, may be submitted with any report. d. Contractor shall provide the NASPO ValuePoint Cooperative Development Coordinator with an executive summary each quarter that includes, at a minimum, a list Agreement No. 7434 This document includes salient or non-standard provisions extracted from NASPO/ValuePoint Model Contract for Cloud Services. February 17, 2016. of states with an active Participating Addendum, states that Contractor is in negotiations with and any PA roll out or implementation activities and issues. NASPO ValuePoint Cooperative Development Coordinator and Contractor will determine the format and content of the executive summary. The executive summary is due 30 days after the conclusion of each calendar quarter. e. Timely submission of these reports is a material requirement of the Master Agreement. The recipient of the reports shall have exclusive ownership of the media containing the reports. The Lead State and NASPO ValuePoint shall have a perpetual, irrevocable, non-exclusive, royalty free, transferable right to display, modify, copy, and otherwise use reports, data and information provided under this section. f. If requested by a Participating Entity, the Contractor must provide detailed sales data within the Participating State. 43. Entire Agreement: This Master Agreement, along with any attachment, contains the entire understanding of the parties hereto with respect to the Master Agreement unless a term is modified in a Participating Addendum with a Participating Entity. No click -through, or other end user terms and conditions or agreements required by the Contractor ("Additional Terms") provided with any Services hereunder shall be binding on Participating Entities or Purchasing Entities, even if use of such Services requires an affirmative "acceptance" of those Additional Terms before access is permitted. Agreement No. 7434 Exhibit 1 to the Master Agreement: Software -as -a -Service 1. Data Ownership: The Purchasing Entity will own all right, title and interest in its data that is related to the Services provided by this Master Agreement. The Contractor shall not access Purchasing Entity user accounts or Purchasing Entity data, except (1) in the course of data center operations, (2) in response to service or technical issues, (3) as required by the express terms of this Master Agreement, Participating Addendum, SLA, and/or other contract documents, or (4) at the Purchasing Entity's written request. Contractor shall not collect, access, or use user -specific Purchasing Entity Data except as strictly necessary to provide Service to the Purchasing Entity. No information regarding a Purchasing Entity's use of the Service may be disclosed, provided, rented or sold to any third party for any reason unless required by law or regulation or by an order of a court of competent jurisdiction. This obligation shall survive and extend beyond the term of this Master Agreement. Data Protection: Protection of personal privacy and data shall be an integral part of the business activities of the Contractor to ensure there is no inappropriate or unauthorized use of Purchasing Entity information at any time. To this end, the Contractor shall safeguard the confidentiality, integrity and availability of Purchasing Entity information and comply with the following conditions: a. The Contractor shall implement and maintain appropriate administrative, technical and organizational security measures to safeguard against unauthorized access, disclosure or theft of Personal Data and Non -Public Data. Such security measures shall be in accordance with recognized industry practice and not less stringent than the measures the Contractor applies to its own Personal Data and Non -Public Data of similar kind. b. All data obtained by the Contractor in the performance of the Master Agreement shall become and remain the property of the Purchasing Entity. c. All Personal Data shall be encrypted at rest and in transit with controlled access. Unless otherwise stipulated, the Contractor is responsible for encryption of the Personal Data. Any stipulation of responsibilities will identify specific roles and responsibilities and shall be included in the service level agreement (SLA), or otherwise made a part of the Master Agreement. d. Unless otherwise stipulated, the Contractor shall encrypt all Non -Public Data at rest and in transit. The Purchasing Entity shall identify data it deems as Non -Public Data to the Contractor. The level of protection and encryption for all Non -Public Data shall be identified in the SLA. e. At no time shall any data or processes —that either belong to or are intended for the use of a Purchasing Entity or its officers, agents or employees — be copied, disclosed or retained by the Contractor or any party related to the Contractor for subsequent use in any transaction that does not include the Purchasing Entity. Agreement No. 7434 f. The Contractor shall not use any information collected in connection with the Services issued from this Master Agreement for any purpose other than fulfilling the Services. 3. Data Location: The Contractor shall provide its services to the Purchasing Entity and its end users solely from data centers in the U.S. Storage of Purchasing Entity data at rest shall be located solely in data centers in the U.S. The Contractor shall not allow its personnel or contractors to store Purchasing Entity data on portable devices, including personal computers, except for devices that are used and kept only at its U.S. data centers. The Contractor shall permit its personnel and contractors to access Purchasing Entity data remotely only as required to provide technical support. The Contractor may provide technical user support on a 24/7 basis using a Follow the Sun model, unless otherwise prohibited in a Participating Addendum. 4. Security Incident or Data Breach Notification: a. Incident Response: Contractor may need to communicate with outside parties regarding a security incident, which may include contacting law enforcement, fielding media inquiries and seeking external expertise as mutually agreed upon, defined by law or contained in the contract. Discussing security incidents with the Purchasing Entity should be handled on an urgent as needed basis, as part of Contractor's communication and mitigation processes as mutually agreed upon, defined by law or contained in the Master Agreement. b. Security Incident Reporting Requirements: The Contractor shall report a security incident to the Purchasing Entity identified contact immediately as soon as possible or promptly without out reasonable delay, or as defined in the SLA. c. Breach Reporting Requirements: If the Contractor has actual knowledge of a confirmed data breach that affects the security of any purchasing entity's content that is subject to applicable data breach notification law, the Contractor shall (1) as soon as possible or promptly without out reasonable delay notify the Purchasing Entity, unless shorter time is required by applicable law, and (2) take commercially reasonable measures to address the data breach in a timely manner. S. Personal Data Breach Responsibilities: This section only applies when a Data Breach occurs with respect to Personal Data within the possession or control of the Contractor. a. The Contractor, unless stipulated otherwise, shall immediately notify the appropriate Purchasing Entity identified contact by telephone in accordance with the agreed upon security plan or security procedures if it reasonably believes there has been a security incident. b. The Contractor, unless stipulated otherwise, shall promptly notify the appropriate Purchasing Entity identified contact within 48 hours or sooner by telephone, unless shorter time is required by applicable law, if it has confirmed that there is, or reasonably believes that there has been a Data Breach. The Contractor shall (1) cooperate with the Purchasing Entity as reasonably requested by the Purchasing Entity to investigate and resolve the Data Breach, (2) promptly implement necessary remedial measures, if necessary, and (3) Agreement No. 7434 document responsive actions taken related to the Data Breach, including any post -incident review of events and actions taken to make changes in business practices in providing the services, if necessary. 6. Notification of Legal Requests: If legally permissible, the Contractor shall contact the Purchasing Entity upon receipt of any electronic discovery, litigation holds, discovery searches and expert testimonies related to the Purchasing Entity's data under the Master Agreement, or which in any way might reasonably require access to the data of the Purchasing Entity. The Contractor shall not respond to subpoenas, service of process and other legal requests related to the Purchasing Entity without first notifying and obtaining the approval of the Purchasing Entity, unless prohibited by law. . 7. Termination and Suspension of Service: a. In the event of a termination of the Master Agreement or applicable Participating Addendum, the Contractor shall implement an orderly return of purchasing entity's data in a CSV or another mutually agreeable format at a time agreed to by the parties or allow the Purchasing Entity to extract it's data and the subsequent secure disposal of purchasing entity's data. b. During any period of service suspension, the Contractor shall not take any action to intentionally erase or otherwise dispose of any of the Purchasing Entity's data. c. In the event of termination of any services or agreement in entirety, the Contractor shall not take any action to intentionally erase purchasing entity's data for a period of: 10 days after the effective date of termination, if the termination is in accordance with the contract period • 30 days after the effective date of termination, if the termination is for convenience • • 60 days after the effective date of termination, if the termination is for cause After such period, the Contractor shall have no obligation to maintain or provide any purchasing entity's data and shall thereafter, unless legally prohibited, delete all purchasing entity's data in its systems or otherwise in its possession or under its control. d. The purchasing entity shall be entitled to any post termination assistance generally made available with respect to the services, unless a unique data retrieval arrangement has been established as part of an SLA. e. Upon termination of the Services or the Agreement in its entirety, Contractor shall securely dispose of all Purchasing Entity's data in all of its forms, such as disk, CD/ DVD, Agreement No. 7434 backup tape and paper, unless stipulated otherwise by the Purchasing Entity. Data shall be permanently deleted and shall not be recoverable, according to National Institute of Standards and Technology (NIST)-approved methods. Certificates of destruction shall be provided to the Purchasing Entity. 8. Background Checks: Upon the request of the Purchasing Entity, the Contractor shall conduct criminal background checks and not utilize any staff, including subcontractors, to fulfill the obligations of the Master Agreement who have been convicted of any crime of dishonesty, including but not limited to criminal fraud, or otherwise convicted of any felony or misdemeanor offense for which incarceration for up to 1 year is an authorized penalty. The Contractor shall promote and maintain an awareness of the importance of securing the Purchasing Entity's information among the Contractor's employees and agents. If any of the stated personnel providing services under a Participating Addendum is not acceptable to the Purchasing Entity in its sole opinion as a result of the background or criminal history investigation, the Purchasing Entity, in its' sole option shall have the right to either (1) request immediate replacement of the person, or (2) immediately terminate the Participating Addendum and any related service agreement. 9. Access to Security Logs and Reports: The Contractor shall provide reports on a schedule specified in the SLA to the Purchasing Entity in a format as specified in the SLA agreed to by both the Contractor and the Purchasing Entity. Reports shall include latency statistics, user access, user access IP address, user access history and security logs for all public jurisdiction files related to this Master Agreement and applicable Participating Addendum. 10. Contract Audit: The Contractor shall allow the Purchasing Entity to audit conformance to the Master Agreement terms. The Purchasing Entity may perform this audit or contract with a third party at its discretion and at the Purchasing Entity's expense. 11. Data Center Audit: The Contractor shall perform an independent audit of its data centers at least annually at its expense, and provide an unredacted version of the audit report upon request to a Purchasing Entity. The Contractor may remove its proprietary information from the unredacted version. A Service Organization Control (SOC) 2 audit report or approved equivalent sets the minimum level of a third -party audit. 12. Change Control and Advance Notice: The Contractor shall give a minimum forty eight (48) hour advance notice (or as determined by a Purchasing Entity and included in the SLA) to the Purchasing Entity of any upgrades (e.g., major upgrades, minor upgrades, system changes) that may impact service availability and performance. A major upgrade is a replacement of hardware, software or firmware with a newer or better version in order to bring the system up to date or to improve its characteristics. It usually includes a new version number. Contractor will make updates and upgrades available to Purchasing Entity at no additional costs when Contractor makes such updates and upgrades generally available to its users. Agreement No. 7434 No update, upgrade or other charge to the Service may decrease the Service's functionality, adversely affect Purchasing Entity's use of or access to the Service, or increase the cost of the Service to the Purchasing Entity. Contractor will notify the Purchasing Entity at least sixty (60) days in advance prior to any major update or upgrade. 13. Security: As requested by a Purchasing Entity, the Contractor shall disclose its non-proprietary system security plans (SSP) or security processes and technical limitations to the Purchasing Entity such that adequate protection and flexibility can be attained between the Purchasing Entity and the Contractor. For example: virus checking and port sniffing — the Purchasing Entity and the Contractor shall understand each other's roles and responsibilities. 14. Non -disclosure and Separation of Duties: The Contractor shall enforce separation of job duties, require commercially reasonable non -disclosure agreements, and limit staff knowledge of Purchasing Entity data to that which is absolutely necessary to perform job duties. 15. Import and Export of Data: The Purchasing Entity shall have the ability to import or export data in piecemeal or in entirety at its discretion without interference from the Contractor at any time during the term of Contractor's contract with the Purchasing Entity. This includes the ability for the Purchasing Entity to import or export data to/from other Contractors. Contractor shall specify if Purchasing Entity is required to provide its' own tools for this purpose, including the optional purchase of Contractors tools if Contractors applications are not able to provide this functionality directly. 16. Responsibilities and Uptime Guarantee: The Contractor shall be responsible for the acquisition and operation of all hardware, software and network support related to the services being provided. The technical and professional activities required for establishing, managing and maintaining the environments are the responsibilities of the Contractor. The system shall be available 24/7/365 (with agreed -upon maintenance downtime), and provide service to customers as defined in the SLA. 17. Subcontractor Disclosure: Contractor shall identify all of its strategic business partners related to services provided under this Master Agreement, including but not limited to all subcontractors or other entities or individuals who may be a party to a joint venture or similar agreement with the Contractor, and who shall be involved in any application development and/or operations. 18. Right to Remove Individuals: The Purchasing Entity shall have the right at any time to require that the Contractor remove from interaction with Purchasing Entity any Contractor representative who the Purchasing Entity believes is detrimental to its working relationship with the Contractor. The Purchasing Entity shall provide the Contractor with notice of its determination, and the reasons it requests the removal. If the Purchasing Entity signifies that a potential security violation exists with respect to the request, the Contractor shall immediately Agreement No. 7434 remove such individual. The Contractor shall not assign the person to any aspect of the Master Agreement or future work orders without the Purchasing Entity's consent. 19. Business Continuity and Disaster Recovery: The Contractor shall provide a business continuity and disaster recovery plan upon request and ensure that the Purchasing Entity's recovery time objective (RTO) of XXX hours/days is met. (XXX hour/days shall be provided to Contractor by the Purchasing Entity.) Contractor must work with the Purchasing Entity to perform an annual Disaster Recovery test and take action to correct any issues detected during the test in a time frame mutually agreed between the Contractor and the Purchasing Entity. 20. Compliance with Accessibility Standards: The Contractor shall comply with and adhere to Accessibility Standards of Section 508 Amendment to the Rehabilitation Act of 1973, or any other state laws or administrative regulations identified by the Participating Entity. 21. Web Services: The Contractor shall use Web services exclusively to interface with the Purchasing Entity's data in near real time. 22. Encryption of Data at Rest: The Contractor shall ensure hard drive encryption consistent with validated cryptography standards as referenced in FIPS 140-2, Security Requirements for Cryptographic Modules for all Personal Data, unless the Purchasing Entity approves in writing for the storage of Personal Data on a Contractor portable device in order to accomplish work as defined in the statement of work. 23. Subscription Terms: Contractor grants to a Purchasing Entity a license to: (i) access and use the Service for its business purposes; (ii) for SaaS, use underlying software as embodied or used in the Service; and (iii) view, copy, upload and download (where applicable), and use Contractor's documentation. No Contractor terms, including standard click through license or website terms or use of privacy policy, shall apply to Purchasing Entities unless such terms are included in this Master Agreement. Agreement No. 7434 Exhibit 2 to the Master Agreement: Platform -as -a -Service 1. Data Ownership: The Purchasing Entity will own all right, title and interest in its data that is related to the Services provided by this Master Agreement. The Contractor shall not access Purchasing Entity user accounts or Purchasing Entity data, except (1) in the course of data center operations, (2) in response to service or technical issues, (3) as required by the express terms of this Master Agreement, Participating Addendum, SLA, and/or other contract documents, or (4) at the Purchasing Entity's written request. Contractor shall not collect, access, or use user -specific Purchasing Entity Data except as strictly necessary to provide Service to the Purchasing Entity. No information regarding a Purchasing Entity's use of the Service may be disclosed, provided, rented or sold to any third party for any reason unless required by law or regulation or by an order of a court of competent jurisdiction. This obligation shall survive and extend beyond the term of this Master Agreement. 2. Data Protection: Protection of personal privacy and data shall be an integral part of the business activities of the Contractor to ensure there is no inappropriate or unauthorized use of Purchasing Entity information at any time. To this end, the Contractor shall safeguard the confidentiality, integrity and availability of Purchasing Entity information and comply with the following conditions: a. The Contractor shall implement and maintain appropriate administrative, technical and organizational security measures to safeguard against unauthorized access, disclosure or theft of Personal Data and Non -Public Data. Such security measures shall be in accordance with recognized industry practice and not less stringent than the measures the Contractor applies to its own Personal Data and Non -Public Data of similar kind. b. All data obtained by the Contractor in the performance of the Master Agreement shall become and remain the property of the Purchasing Entity. c. All Personal Data shall be encrypted at rest and in transit with controlled access. Unless otherwise stipulated, the Contractor is responsible for encryption of the Personal Data. Any stipulation of responsibilities will identify specific roles and responsibilities and shall be included in the service level agreement (SLA), or otherwise made a part of the Master Agreement. d. Unless otherwise stipulated, the Contractor shall encrypt all Non -Public Data at rest and in transit. The Purchasing Entity shall identify data it deems as Non -Public Data to the Contractor. The level of protection and encryption for all Non -Public Data shall be identified in the SLA. e. At no time shall any data or processes — that either belong to or are intended for the use of a Purchasing Entity or its officers, agents or employees — be copied, disclosed or retained by the Contractor or any party related to the Contractor for subsequent use in any transaction that does not include the Purchasing Entity. Agreement No. 7434 f. The Contractor shall not use any information collected in connection with the Services issued from this Master Agreement for any purpose other than fulfilling the Services. 3. Data Location: The Contractor shall provide its services to the Purchasing Entity and its end users solely from data centers in the U.S. Storage of Purchasing Entity data at rest shall be located solely in data centers in the U.S. The Contractor shall not allow its personnel or contractors to store Purchasing Entity data on portable devices, including personal computers, except for devices that are used and kept only at its U.S. data centers. The Contractor shall permit its personnel and contractors to access Purchasing Entity data remotely only as required to provide technical support. The Contractor may provide technical user support on a 24/7 basis using a Follow the Sun model, unless otherwise prohibited in a Participating Addendum. 4. Security Incident or Data Breach Notification: The Contractor shall inform the Purchasing Entity of any security incident or data breach within the possession and control of the Contractor and related to the service provided under the Master Agreement, Participating Addendum, or SLA. Such notice shall include, to the best of Contractor's knowledge at that time, the persons affected, their identities, and the Confidential Information and Data disclosed, or shall include if this information is unknown. a. Incident Response: The Contractor may need to communicate with outside parties regarding a security incident, which may include contacting law enforcement, fielding media inquiries and seeking external expertise as mutually agreed upon, defined by law or contained in the Master Agreement, Participating Addendum, or SLA. Discussing security incidents with the Purchasing Entity should be handled on an urgent as -needed basis, as part of Contractor's communication and mitigation processes as mutually agreed, defined by law or contained in the Master Agreement, Participating Addendum, or SLA. b. Security Incident Reporting Requirements: Unless otherwise stipulated, the Contractor shall immediately report a security incident related to its service under the Master Agreement, Participating Addendum, or SLA to the appropriate Purchasing Entity. c. Breach Reporting Requirements: If the Contractor has actual knowledge of a confirmed data breach that affects the security of any Purchasing Entity data that is subject to applicable data breach notification law, the Contractor shall (1) promptly notify the appropriate Purchasing Entity within 48 hours or sooner, unless shorter time is required by applicable law, and (2) take commercially reasonable measures to address the data breach in a timely manner S. Breach Responsibilities: This section only applies when a Data Breach occurs with respect to Personal Data within the possession or control of the Contractor. a. The Contractor, unless stipulated otherwise, shall immediately notify the appropriate Purchasing Entity identified contact by telephone in accordance with the agreed upon security plan or security procedures if it reasonably believes there has been a security incident. Agreement No. 7434 b. The Contractor, unless stipulated otherwise, shall promptly notify the appropriate Purchasing Entity identified contact within 24 hours or sooner by telephone, unless shorter time is required by applicable law, if it has confirmed that there is, or reasonably believes that there has been a data breach. The Contractor shall (1) cooperate with the Purchasing Entity as reasonably requested by the Purchasing Entity to investigate and resolve the data breach, (2) promptly implement necessary remedial measures, if necessary, and (3) document responsive actions taken related to the data breach, including any post -incident review of events and actions taken to make changes in business practices in providing the services, if necessary. 6. Notification of Legal Requests: If legally permissible, the Contractor shall contact the Purchasing Entity upon receipt of any electronic discovery, litigation holds, discovery searches and expert testimonies related to the Purchasing Entity's data under the Master Agreement, or which in any way might reasonably require access to the data of the Purchasing Entity. The Contractor shall not respond to subpoenas, service of process and other legal requests related to the Purchasing Entity without first notifying and obtaining the approval of the Purchasing Entity, unless prohibited by law. 7. Termination and Suspension of Service: a. In the event of an early termination of the Master Agreement, Participating or SLA, Contractor shall allow for the Purchasing Entity to retrieve its digital content and provide for the subsequent secure disposal of the Purchasing Entity's digital content. b. During any period of service suspension, the Contractor shall not take any action to intentionally erase or otherwise dispose of any of the Purchasing Entity's data. c. In the event of early termination of any Services or agreement in entirety, the Contractor shall not take any action to intentionally erase any Purchasing Entity's data for a period of 1) 45 days after the effective date of termination, if the termination is for convenience; or 2) 60 days after the effective date of termination, if the termination is for cause. After such day period, the Contractor shall have no obligation to maintain or provide any Purchasing Entity data and shall thereafter, unless legally prohibited, delete all Purchasing Entity data in its systems or otherwise in its possession or under its control. In the event of either termination for cause, the Contractor will impose no fees for access and retrieval of digital content to the Purchasing Entity. d. The Purchasing Entity shall be entitled to any post termination assistance generally made available with respect to the services, unless a unique data retrieval arrangement has been established as part of an SLA. e. Upon termination of the Services or the Agreement in its entirety, Contractor shall securely dispose of all Purchasing Entity's data in all of its forms, such as disk, CD/ DVD, backup tape and paper, unless stipulated otherwise by the Purchasing Entity. Data shall be permanently deleted and shall not be recoverable, according to National Institute of Agreement No. 7434 Standards and Technology (NIST)-approved methods. Certificates of destruction shall be provided to the Purchasing Entity. S. Background Checks: a. Upon the request of the Purchasing Entity, the Contractor shall conduct criminal background checks and not utilize any staff, including subcontractors, to fulfill the obligations of the Master Agreement who have been convicted of any crime of dishonesty, including but not limited to criminal fraud, or otherwise convicted of any felony or misdemeanor offense for which incarceration for up to 1 year is an authorized penalty. The Contractor shall promote and maintain an awareness of the importance of securing the Purchasing Entity's information among the Contractor's employees and agents. b. The Contractor and the Purchasing Entity recognize that security responsibilities are shared. The Contractor is responsible for providing a secure infrastructure. The Purchasing Entity is responsible for its secure guest operating system, firewalls and other logs captured within the guest operating system. Specific shared responsibilities are identified within the SLA. c. If any of the stated personnel providing services under a Participating Addendum is not acceptable to the Purchasing Entity in its sole opinion as a result of the background or criminal history investigation, the Purchasing Entity, in its' sole option shall have the right to either (1) request immediate replacement of the person, or (2) immediately terminate the Participating Addendum and any related service agreement. 9. Access to Security Logs and Reports: a. The Contractor shall provide reports on a schedule specified in the SLA to the Purchasing Entity in a format as specified in the SLA and agreed to by both the Contractor and the Purchasing Entity. Reports will include latency statistics, user access, user access IP address, user access history and security logs for all Purchasing Entity files related to the Master Agreement, Participating Addendum, or SLA. b. The Contractor and the Purchasing Entity recognize that security responsibilities are shared. The Contractor is responsible for providing a secure infrastructure. The Purchasing Entity is responsible for its secure guest operating system, firewalls and other logs captured within the guest operating system. Specific shared responsibilities are identified within the SLA. 10. Contract Audit: The Contractor shall allow the Purchasing Entity to audit conformance to the Master Agreement terms. The Purchasing Entity may perform this audit or contract with a third party at its discretion and at the Purchasing Entity's expense. 11. Data Center Audit: The Contractor shall perform an independent audit of its data centers at least annually at its expense, and provide an unredacted version of the audit report upon Agreement No. 7434 request to a Purchasing Entity. The Contractor may remove its proprietary information from the unredacted version. A Service Organization Control (SOC) 2 audit report or approved equivalent sets the minimum level of a third -party audit. 12. Change Control and Advance Notice: The Contractor shall give a minimum forty eight (48) hour advance notice (or as determined by a Purchasing Entity and included in the SLA) to the Purchasing Entity of any upgrades (e.g., major upgrades, minor upgrades, system changes) that may impact service availability and performance. A major upgrade is a replacement of hardware, software or firmware with a newer or better version in order to bring the system up to date or to improve its characteristics. It usually includes a new version number. Contractor will make updates and upgrades available to Purchasing Entity at no additional costs when Contractor makes such updates and upgrades generally available to its users. No update, upgrade or other charge to the Service may decrease the Service's functionality, adversely affect Purchasing Entity's use of or access to the Service, or increase the cost of the Service to the Purchasing Entity. Contractor will notify the Purchasing Entity at least sixty (60) days in advance prior to any major update or upgrade. 13. Security: As requested by a Purchasing Entity, the Contractor shall disclose its non-proprietary system security plans (SSP) or security processes and technical limitations to the Purchasing Entity such that adequate protection and flexibility can be attained between the Purchasing Entity and the Contractor. For example: virus checking and port sniffing — the Purchasing Entity and the Contractor shall understand each other's roles and responsibilities. 14. Non -disclosure and Separation of Duties: The Contractor shall enforce separation of job duties, require commercially reasonable non -disclosure agreements, and limit staff knowledge of Purchasing Entity data to that which is absolutely necessary to perform job duties. 15. Import and Export of Data: The Purchasing Entity shall have the ability to import or export data in piecemeal or in entirety at its discretion without interference from the Contractor at any time during the term of Contractor's contract with the Purchasing Entity. This includes the ability for the Purchasing Entity to import or export data to/from other Contractors. Contractor shall specify if Purchasing Entity is required to provide its' own tools for this purpose, including the optional purchase of Contractors tools if Contractors applications are not able to provide this functionality directly. 16. Responsibilities and Uptime Guarantee: The Contractor shall be responsible for the acquisition and operation of all hardware, software and network support related to the services being provided. The technical and professional activities required for establishing, managing and maintaining the environments are the responsibilities of the Contractor. The system shall be available 24/7/365 (with agreed -upon maintenance downtime), and provide service to customers as defined in the SLA. Agreement No. 7434 17. Subcontractor Disclosure: Contractor shall identify all of its strategic business partners related to services provided under this Master Agreement, including but not limited to all subcontractors or other entities or individuals who may be a party to a joint venture or similar agreement with the Contractor, and who shall be involved in any application development and/or operations. 18. Business Continuity and Disaster Recovery: The Contractor shall provide a business continuity and disaster recovery plan upon request and ensure that the Purchasing Entity's recovery time objective (RTC) of XXX hours/days is met. (XXX hour/days shall be provided to Contractor by the Purchasing Entity.) Contractor must work with the Purchasing Entity to perform an annual Disaster Recovery test and take action to correct any issues detected during the test in a time frame mutually agreed between the Contractor and the Purchasing Entity. 19. Compliance with Accessibility Standards: The Contractor shall comply with and adhere to Accessibility Standards of Section 508 Amendment to the Rehabilitation Act of 1973 or any other state laws or administrative regulations identified by the Participating Entity.. 20. Web Services: The Contractor shall use Web services exclusively to interface with the Purchasing Entity's data in near real time. 21. Encryption of Data at Rest: The Contractor shall ensure hard drive encryption consistent with validated cryptography standards as referenced in FIPS 140-2, Security Requirements for Cryptographic Modules for all Personal Data as identified in the SLA, unless the Contractor presents a justifiable position that is approved by the Purchasing Entity that Personal Data, is required to be stored on a Contractor portable device in order to accomplish work as defined in the scope of work. 22. Subscription Terms: Contractor grants to a Purchasing Entity a license to: (i) access and use the Service for its business purposes; (ii) for PaaS, use underlying software as embodied or used in the Service; and (iii) view, copy, upload and download (where applicable), and use Contractor's documentation. No Contractor terms, including standard click through license or website terms or use of privacy policy, shall apply to Purchasing Entities unless such terms are included in this Master Agreement. Agreement No. 7434 Exhibit 3 to the Master Agreement: Infrastructure -as -a -Service Data Ownership: The Purchasing Entity will own all right, title and interest in its data that is related to the Services provided by this Master Agreement. The Contractor shall not access Purchasing Entity user accounts or Purchasing Entity data, except (1) in the course of data center operations, (2) in response to service or technical issues, (3) as required by the express terms of this Master Agreement, Participating Addendum, SLA, and/or other contract documents, or (4) at the Purchasing Entity's written request. Contractor shall not collect, access, or use user -specific Purchasing Entity Data except as strictly necessary to provide Service to the Purchasing Entity. No information regarding a Purchasing Entity's use of the Service may be disclosed, provided, rented or sold to any third party for any reason unless required by law or regulation or by an order of a court of competent jurisdiction. This obligation shall survive and extend beyond the term of this Master Agreement. 2. Data Protection: Protection of personal privacy and data shall be an integral part of the business activities of the Contractor to ensure there is no inappropriate or unauthorized use of Purchasing Entity information at any time. To this end, the Contractor shall safeguard the confidentiality, integrity and availability of Purchasing Entity information and comply with the following conditions: a. The Contractor shall implement and maintain appropriate administrative, technical and organizational security measures to safeguard against unauthorized access, disclosure or theft of Personal Data and Non -Public Data. Such security measures shall be in accordance with recognized industry practice and not less stringent than the measures the Contractor applies to its own Personal Data and Non -Public Data of similar kind. b. All data obtained by the Contractor in the performance of the Master Agreement shall become and remain the property of the Purchasing Entity. c. All Personal Data shall be encrypted at rest and in transit with controlled access. Unless otherwise stipulated, the Contractor is responsible for encryption of the Personal Data. Any stipulation of responsibilities will identify specific roles and responsibilities and shall be included in the service level agreement (SLA), or otherwise made a part of the Master Agreement. d. Unless otherwise stipulated, the Contractor shall encrypt all Non -Public Data at rest and in transit. The Purchasing Entity shall identify data it deems as Non -Public Data to the Contractor. The level of protection and encryption for all Non -Public Data shall be identified in the SLA. e. At no time shall any data or processes —that either belong to or are intended for the use of a Purchasing Entity or its officers, agents or employees — be copied, disclosed or retained by the Contractor or any party related to the Contractor for subsequent use in any transaction that does not include the Purchasing Entity. Agreement No. 7434 f. The Contractor shall not use any information collected in connection with the Services issued from this Master Agreement for any purpose other than fulfilling the Services. 3. Data Location: The Contractor shall provide its services to the Purchasing Entity and its end users solely from data centers in the U.S. Storage of Purchasing Entity data at rest shall be located solely in data centers in the U.S. The Contractor shall not allow its personnel or contractors to store Purchasing Entity data on portable devices, including personal computers, except for devices that are used and kept only at its U.S. data centers. The Contractor shall permit its personnel and contractors to access Purchasing Entity data remotely only as required to provide technical support. The Contractor may provide technical user support on a 24/7 basis using a Follow the Sun model, unless otherwise prohibited in a Participating Addendum. 4. Security Incident or Data Breach Notification: The Contractor shall inform the Purchasing Entity of any security incident or data breach related to Purchasing Entity's Data within the possession or control of the Contractor and related to the service provided under the Master Agreement, Participating Addendum, or SLA. Such notice shall include, to the best of Contractor's knowledge at that time, the persons affected, their identities, and the Confidential Information and Data disclosed, or shall include if this information is unknown. a. Security Incident Reporting Requirements: The Contractor shall report a security incident to the Purchasing Entity identified contact immediately as soon as possible or promptly without out reasonable delay, or as defined in the SLA. b. Breach Reporting Requirements: If the Contractor has actual knowledge of a confirmed data breach that affects the security of any purchasing entity's content that is subject to applicable data breach notification law, the Contractor shall (1) as soon as possible or promptly without out reasonable delay notify the Purchasing Entity, unless shorter time is required by applicable law, and (2) take commercially reasonable measures to address the data breach in a timely manner. S. Breach Responsibilities: This section only applies when a Data Breach occurs with respect to Personal Data within the possession or control of the Contractor and related to the service provided under the Master Agreement, Participating Addendum, or SLA. a. The Contractor, unless stipulated otherwise, shall immediately notify the appropriate Purchasing Entity identified contact by telephone in accordance with the agreed upon security plan or security procedures if it reasonably believes there has been a security incident. b. The Contractor, unless stipulated otherwise, shall promptly notify the appropriate Purchasing Entity identified contact within 48 hours or sooner by telephone, unless shorter time is required by applicable law, if it has confirmed that there is, or reasonably believes that there has been a data breach. The Contractor shall (1) cooperate with the Purchasing Entity as reasonably requested by the Purchasing Entity to investigate and resolve the Data Breach, (2) promptly implement necessary remedial measures, if necessary, and (3) document responsive actions taken related to the Data Breach, including any post -incident Agreement No. 7434 review of events and actions taken to make changes in business practices in providing the services, if necessary. 6. Notification of Legal Requests: If legally permissible, the Contractor shall contact the Purchasing Entity upon receipt of any electronic discovery, litigation holds, discovery searches and expert testimonies related to the Purchasing Entity's data under the Master Agreement, or which in any way might reasonably require access to the data of the Purchasing Entity. The Contractor shall not respond to subpoenas, service of process and other legal requests related to the Purchasing Entity without first notifying and obtaining the approval of the Purchasing Entity, unless prohibited by law. 7. Termination and Suspension of Service: a. In the event of an early termination of the Master Agreement, Participating or SLA, Contractor shall allow for the Purchasing Entity to retrieve its digital content and provide for the subsequent secure disposal of the Purchasing Entity's digital content. b. During any period of service suspension, the Contractor shall not take any action to intentionally erase or otherwise dispose of any of the Purchasing Entity's data. c. In the event of early termination of any Services or agreement in entirety, the Contractor shall not take any action to intentionally erase any Purchasing Entity's data for a period of 1) 45 days after the effective date of termination, if the termination is for convenience; or 2) 60 days after the effective date of termination, if the termination is for cause. After such day period, the Contractor shall have no obligation to maintain or provide any Purchasing Entity data and shall thereafter, unless legally prohibited, delete all Purchasing Entity data in its systems or otherwise in its possession or under its control. In the event of either termination for cause, the Contractor will impose no fees for access and retrieval of digital content to the Purchasing Entity. d. The Purchasing Entity shall be entitled to any post termination assistance generally made available with respect to the services, unless a unique data retrieval arrangement has been established as part of an SLA. e. Upon termination of the Services or the Agreement in its entirety, Contractor shall securely dispose of all Purchasing Entity's data in all of its forms, such as disk, CD/ DVD, backup tape and paper, unless stipulated otherwise by the Purchasing Entity. Data shall be permanently deleted and shall not be recoverable, according to National Institute of Standards and Technology (NIST)-approved methods. Certificates of destruction shall be provided to the Purchasing Entity. 8. Background Checks: a. Upon the request of the Purchasing Entity, the Contractor shall conduct criminal background checks and not utilize any staff, including subcontractors, to fulfill the obligations of the Master Agreement who have been convicted of any crime of dishonesty, Agreement No. 7434 including but not limited to criminal fraud, or otherwise convicted of any felony or misdemeanor offense for which incarceration for up to 1 year is an authorized penalty. The Contractor shall promote and maintain an awareness of the importance of securing the Purchasing Entity's information among the Contractor's employees and agents. b. The Contractor and the Purchasing Entity recognize that security responsibilities are shared. The Contractor is responsible for providing a secure infrastructure. The Purchasing Entity is responsible for its secure guest operating system, firewalls and other logs captured within the guest operating system. Specific shared responsibilities are identified within the SLA. c. If any of the stated personnel providing services under a Participating Addendum is not acceptable to the Purchasing Entity in its sole opinion as a result of the background or criminal history investigation, the Purchasing Entity, in its' sole option shall have the right to either (1) request immediate replacement of the person, or (2) immediately terminate the Participating Addendum and any related service agreement. 9. Access to Security Logs and Reports: a. The Contractor shall provide reports on a schedule specified in the SLA to the Contractor directly related to the infrastructure that the Contractor controls upon which the Purchasing Entity's account resides. Unless otherwise agreed to in the SLA, the Contractor shall provide the public jurisdiction a history or all API calls for the Purchasing Entity account that includes the identity of the API caller, the time of the API call, the source IP address of the API caller, the request parameters and the response elements returned by the Contractor. The report will be sufficient to enable the Purchasing Entity to perform security analysis, resource change tracking and compliance auditing b. The Contractor and the Purchasing Entity recognize that security responsibilities are shared. The Contractor is responsible for providing a secure infrastructure. The Purchasing Entity is responsible for its secure guest operating system, firewalls and other logs captured within the guest operating system. Specific shared responsibilities are identified within the SLA. 10. Contract Audit: The Contractor shall allow the Purchasing Entity to audit conformance to the Master Agreement terms. The Purchasing Entity may perform this audit or contract with a third party at its discretion and at the Purchasing Entity's expense. 11. Data Center Audit: The Contractor shall perform an independent audit of its data centers at least annually and at its own expense, and provide an unredacted version of the audit report upon request. The Contractor may remove its proprietary information from the unredacted version. For example, a Service Organization Control (SOC) 2 audit report would be sufficient. 12. Change Control and Advance Notice: The Contractor shall give a minimum forty eight (48) hour advance notice (or as determined by a Purchasing Entity and included in the SLA) to the Purchasing Entity of any upgrades (e.g., major upgrades, minor upgrades, system changes) that Agreement No. 7434 may impact service availability and performance. A major upgrade is a replacement of hardware, software or firmware with a newer or better version in order to bring the system up to date or to improve its characteristics. It usually includes a new version number. Contractor will make updates and upgrades available to Purchasing Entity at no additional costs when Contractor makes such updates and upgrades generally available to its users. No update, upgrade or other charge to the Service may decrease the Service's functionality, adversely affect Purchasing Entity's use of or access to the Service, or increase the cost of the Service to the Purchasing Entity. Contractor will notify the Purchasing Entity at least sixty (60) days in advance prior to any major update or upgrade. 13. Security: As requested by a Purchasing Entity, the Contractor shall disclose its non-proprietary system security plans (SSP) or security processes and technical limitations to the Purchasing Entity such that adequate protection and flexibility can be attained between the Purchasing Entity and the Contractor. For example: virus checking and port sniffing — the Purchasing Entity and the Contractor shall understand each other's roles and responsibilities. 14. Non -disclosure and Separation of Duties: The Contractor shall enforce separation of job duties, require commercially reasonable non -disclosure agreements, and limit staff knowledge of Purchasing Entity data to that which is absolutely necessary to perform job duties. 15. Import and Export of Data: The Purchasing Entity shall have the ability to import or export data in piecemeal or in entirety at its discretion without interference from the Contractor at anytime during the term of Contractor's contract with the Purchasing Entity. This includes the ability for the Purchasing Entity to import or export data to/from other Contractors. Contractor shall specify if Purchasing Entity is required to provide its' own tools for this purpose, including the optional purchase of Contractors tools if Contractors applications are not able to provide this functionality directly. 16. Responsibilities and Uptime Guarantee: The Contractor shall be responsible for the acquisition and operation of all hardware, software and network support related to the services being provided. The technical and professional activities required for establishing, managing and maintaining the environments are the responsibilities of the Contractor. The system shall be available 24/7/365 (with agreed -upon maintenance downtime), and provide service to customers as defined in the SLA. 17. Subcontractor Disclosure: Contractor shall identify all of its strategic business partners related to services provided under this Master Agreement, including but not limited to all subcontractors or other entities or individuals who may be a party to a joint venture or similar agreement with the Contractor, and who shall be involved in any application development and/or operations. Agreement No. 7434 18. Business Continuity and Disaster Recovery: The Contractor shall provide a business continuity and disaster recovery plan upon request and ensure that the Purchasing Entity's recovery time objective (RTO) of XXX hours/days is met. (XXX hour/days shall be provided to Contractor by the Purchasing Entity.) Contractor must work with the Purchasing Entity to perform an annual Disaster Recovery test and take action to correct any issues detected during the test in a time frame mutually agreed between the Contractor and the Purchasing Entity. 19. Subscription Terms: Contractor grants to a Purchasing Entity a license to: (i) access and use the Service for its business purposes; (ii) for IaaS, use underlying software as embodied or used in the Service; and (iii) view, copy, upload and download (where applicable), and use Contractor's documentation. No Contractor terms, including standard click through license or website terms or use of privacy policy, shall apply to Purchasing Entities unless such terms are included in this Master Agreement via amendment. Agreement No. 7434 ar QJ O Ln M a O Q T f0 E O ........ > LU 0 L 3 0 3 z g z ° C u_ u_ O CLO > L N f C Q) U Ln M a, ai 'n -0 Q) � E p 0- L O al N Ln to M 0 . o u L > > c E 0 O O •T M Qi C ai QJ V) i Q1 V) > n L +' H to N U p m •L 4+ L 3 bp 4) u)7 a u ai a, ai - o a40 o o o� L GJ y O O .L aaj L O i aa) QJ L C Q l7 �! u. C7 > ) C C •p fa � L cu L L ai L E O L tE O 4- O � O O 3 M L L Q) L L (L) L O 0 L � to O V T v O M f0 :6 4' C C C O t 2 > > f0 O > 0 Q1 N M L L L � Q1 � L O � -0Ln Y O O � O CU u W In io n v v v u 'C QJ 3 4• 3 41 7 4- -a L M U � = C M .a) C > > 2 .cu > C o b O +' L M L QJ L Q1 L QJ L CFI M U O O O a) aa'i M'',, L L L En M L it L M L Q) CC L 3 V 7 ( 7 Ql 3 '� 'ai i O J 'O > > > p > O O n Q L C M O QJ }J L p O C, +' C �+ N E O v •L of fa Ln � t M fL0 C N `n ca d CJ E M M Y 'L t bo L C ro QJ 4- M Lv O E Agreement No. 7434 Attachment C — Cost Schedule Solicitation Number CH16012 NASPO ValuePoint Cloud Solutions RFP Cloud Solutions By Category. Specify Discount Percent Offered for products in each cate,go . Highest discount will apply for products referenced in detail listings for multiple categories. Provide a detailed -product offering for each categoN. Software as a Service Infrastructure as a Service Platform as a Services Value Added Services Additional Value Added Services: Maintenance Services Professional Services • Deployment Services • Consulting/Advisory Services 0 Architectural Design Services Statement of Work Services Partner Services Training Deployment Services Discount % 0-21.60 Discount % 0-10 Discount % 0-11 Discount % 0-13 Onsite Hourly Rate $ _250 Remote Hourly Rate $ _175 Onsite Hourly Rate $ _350 Remote Hourly Rate $ _275 Onsite Hourly Rate $ _3 0 Remote Hourly Rate $ _225 Onsite Hourly Rate $ _300 Remote Hourly Rate $ _225 Onsite Hourly Rate $ _250 Remote Hourly Rate $ _175 Onsite Hourly Rate $ _250 Remote Hourly Rate $ _175 Onsite Hourly Rate $ _250 Online Hourly Rate $ _175 El (MY, dd m'r m m 0 0 w 0.0 0 0 0 0 0 0 0 w 0 0 0 0 o o 0 o o 0 o o o o o o 0 0 0 0 0 0.0 0 0 0 0 W m M O N W l0 la la N 'a O O N N N V O V 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 m I� N VI O N Vl m m O M M M In r In r O O Vl M �/1 V O V N O o 0 0 0 0 0 0 0 0 0 0 0 o0 O O W l0 l0 DO 00 O O O M N O O O ul m c-I mla w c-I O N N M Vl O l0 O la N ddla O'0 0 0 7 V dd o ;I.V 0 N M O O O � V r{ `.-1 �--� m W .--I � '-I m N LLim .-I N m W l/1 lfl O M N N O O '. I� to r O m m N mN' rl '., N O m O a) V M w r-I V w CI 1, Ln V l0 4 r N N, c-I r-1 M w Vl 00 rl N •--I l0 e-I la C -cl, V} Lf to i/} 4n i/f i/f Vf In in Vf iA V} iA iR Lf V} N• VL +t1 4n 4M i/f ',. Vf tR i/f V} in V? in iN in u) V} in in o n `? c3 m m o N o 0 0 0 o 0 o N oN o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0o O o 0 0 o o o 0 o 0 0 0 o o o 0 o o 0 o o o 0 o o o o 0 o o o o o o o O o o 0 o o o 0 o 06 0 0 0 0 0 0 o 0 o o 0 o 0 o o o w o o m w w w w 0 0 o m 0 0 0 0 t0 O w N w w O O O O V V O w O V �'-� M O w Or O o N m 0 In In O M N N O M r O m M N Cl rl N O 07 O p c-I Vl m.... N W a ....' w O n m V to V lrn9 lD M d0 O V V c-I e-1 iA 1h 1A 1h L} N.7h 7A.iR iR in iA N N N N ih in in• ti v4A Mb 1^ in in V} to iA In Vl''..tn iA iA in 7n in VT ln, In Vl.. to N'..1n V} in V} Eo N-1 hod. E hod W bd o cuo c c c o do o w o 0 o o E u E? w m .m o 0 0= m o O w Q 0 o Q o m o 0 0 0 0 0 o m O m m o° o W E ^ Ooo ! oo00o0 o000oa mmaim m m H 0 m,p p m O w o m} v H m m m m m m m m m m m Q m LL m o m o m m o o o...o r m m m 0 v m m m m m m m m m m Q r LL ¢ n r m D CO m v N m s¢ a o 0 0 0 0 0 0 co m m d¢ u w u u u u u u u .� vl >> LL' r ac vcl Vcl ¢¢¢ m m s an' c 2¢ m m H H c c c O O O O O O O d' V1 O. yl N J N In ul N r1 '>-I G C G U V c U c U m m W W W W W W W W C G G 0 0 O O O O 0 H H a 1 d C 1 d d d a d d C G • O O O o 0 0 0 z o o ¢ a 0 a a u u u ulu u u u u u u u u z Z Q¢ Z z Z Z Z z Z Z z z z z z a 4 a¢ Q¢¢ w LL LL O z z do x x ct:'a Q¢ a¢¢¢¢ a,,a ¢ Q.... Y V fC � n. o m m m Y o O Y V U O u u f0 U W O a O. a mO V U U U O a .2Ifln 'C � .--I M � m M1l n7 N ei M •C c-I N O v o n o a o 0 0`o 0 C O O O Y Y Y O O O O O O m c c a c c W C o 0 o -a o 'E a (D(D co (Doom'-'O 3o o o o o ° ,W, v m O a c o o o N m c) m vl n a c ,� u u u c W¢ o .4 N a u u o o> O O u u 1p u u> u m c c ry `w > > > a .o. > a > J J •� ti J a u a a a a m m a s m m a m m 6 ro m m m aen zZ Ooc m m a a Q m m m oo ro m m m a m m Y m Y .W W a v v W W O O G Y d> o Y ao• so+ W d= m J' W W ao+ ao+ - ao+ so+ J so+ J J 7 ao+ .- c cc c Oc C C - C m J J J J J C C a J J J J ', J C J C C C J o C G N C O C W O 3 O C C C C C_ C O E C C C C C_ C _C O O w w N c m c o m� ° y c ° W gC7Ol7 �IN,v °a o m v o° m� o�v v Y �������000� o c N a ¢ O O '', w w a ` vl '.... u C7 a In vl �n .� ul .� vl .� a ul m m .-+ ul .� vl .� .� .� �n u w jl aCC ,;1 c V 0 w Q In pd'' w N m o N o o o o o o o o o o c o o o o o o o O O 0 0 O O C C N w f- a.. N y 2 U f0 N IO W W '"i Z - C C- G. - •E Vl Vl Vl C C C C C C C C C C C C C C C C C C C C C C C C W O O O O O O O O O O O O O O O O O O O O O O O O o w o w o O,O n a a m y LL to v° c C C C 2 2 2 2 Z O O H u w m y 2 m O a c�� D E E u V u u u u u u u U U u u U u u u U V u u u' u u 5 O w J K W w !` % N hod hop, 1ccO t` W W W N •C •C .0 y .0 •N .0 .0 •C .0 .0 •C w N w w •C Ol G1 O1 O/ Ol O1 a V a U r cc C7 C Y Y C C C C C C C u C o 0 d) L L L L L L L L L L L L L L L L L L '- L Y L L L W 0 w O W C W U U o W W W f0 ry O W C C C C C C C C C C c C C C C c C C C c C C C C C C C H 0 H O z w U O O U U U U o .>+ H u m lh to >. > > > > > > >. >� >. >. > >- >- >Y. > > > > > > > >. >.. vl Jl In vl Jl a a _ vl In vl vl In In In vl vl vl vl vl In In vl vl vl vl vl vl vl vl In m uuuuuuu °' 3 3°° T —T .� 01 v a a a a n n a a a a a a a¢ a, a a a a a a a a a O O O O O O O 'ca o o 'm 'no 'oa 'oy W W o �� J--//' E w a m a a. a a a a a a m a a; a a a a a a n n a a a a. a s D O Q LL LL Q Q Q Q d V f- Q Q a Q Q Q Q Q Q Q Q Q Q a Q a a a Q a Q Q Q Q Q Q Q a 0 0 0 0 0 0 0¢ a a a a a a a¢ aia a a a a a¢ a IL,<,f,<, a a a¢ Q a'a a a a a a a a a a a¢¢ Q a Q a a,a a u u u u u u u u u u u u u u u u u u u V u u u u u u u u u u,u u u u u u u v v wOd'Opi� 'pp 'tw 'Cd .m�'hd 'Op''Cd 'Op 'Od 'tld W '0 'Gd - 'Cd0 0 0 0 0 0 0 0 0 0 0 0 0'0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0'0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0'0 0 0 0 0 0 0 C C L.L LL ''.L L L L L L L L U U U u U V u u U u u U U V u U V u U u U V V u u U u U u u V u V u u U V u u OOOOOOOWWWWWWoWWoWWW WooW W WWWWWWoWWWWWWoWWooa a a a a a a u u u u u u u u u u u'u u u u u u u u u u u u u u u u u u u,u ulu u u ul,u El 0 0 o ry x'c m o 0 m N N m mlo v ml0 m v v o'I n c .� n m m N .� m .� ti v 1 q o O O O N 0 a.•y^' N o 0 0 m m m m o0 o� o N l0 m m m n n a m '... M N m In M l0 m '... a0 m O O w H O N O O N '-I Vl m O O N O O lD LO 0) r, a-1 O c-I '-I W 00 n w n w W '., O N m V1 lmD .n-1 .n-I 00 lD m n V W W c-I a0 n w W m Lal n .-I N N ci N m N lR V7 m M '4 ri c-I M N,m N wr � an +n u* in yr an in o o o o v o 0 o o o o,o o 0 0 0 o n'o 0 0 0 0 0 o n o 0 o 0 0 0 0 o o o 0 c-. In n N 0 0 0 lan O n ta7 O O O O O O O O O O O O a0 m 0 0 0 O O O N O O .--I in O N O O O o o 0 .--1 [h .-I to Vl O vl O o O O O O O 00 00 c-1 N l0 O O O',. 00 ao a O'O o V m m N m.o m O,o''O O W O .--I n m 0 0 0 '-I '-I O O O o ei N N a-1 N O N 0 0 0 0 >uZgomecC QmQ`m° #"66yAtJppNi LCOLk1❑>O~❑❑ m�j cU}❑> x NUW c �.1n a1nn �n av❑na i❑inn v❑i �❑vm > w Ma 0 0oO 0 m m m m Q u U UO ni v1 ❑ ❑ ❑1 ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ N II 00 m 00 N�ON0100 00 I TLroo-or",-uooli � ar« q' .n in0 o o oo 0 0 00 OO Vl Vl O lalLn mm N m N N N NNN U ¢ Q w V1 V1 ffih d M N LL o, Q U ❑ LL LL LL CI N In VI V1 ,Ln VI V1 V1 u'0 a a a LL ',. a o_ a s ta. oPo�lofa�Ol��HO��HL�"1 ui mu IIo<I OC pNV, �N ❑ ❑ z z zz U aw O Z Z O O p u l7 t p O O❑ p w lu o p c o Q ¢ o w ¢ o OZ z w > 0 u m e z u m u ❑ E oc v> ca 0 0 of .••« E u N z0 .° N O z W> j m ❑ Z �^ w a w '., Q Q 'u o }❑ m c ❑ O Z U u w w` a w N E an z v v vai .� cu ❑ m Q❑ O >> 0 z a. H '° > Q w u v o u u as c d a H ❑❑ s w O ... I= u u> ai O w o c c `m `w w is 'ta Y ¢, ❑ w 1n m❑ ur a`r w w> z c u u ¢ E m ro c N v c val aJ ~ rL u Q va E unh �,. m V '... w c> v O 2L. 4n C N i i O .� u.+ t "O i a.o W V7 oa= as a E ,a - ❑ c v' E ¢ o w " E ra u r au o v w ra v 4s ':a c c a -- v m c .ia N n. ¢ 3 V, _v w ¢ J O VI > a�,�q' ftl 0q z n c C W U O `v Ur: OL O" 93 0 O C ii ra = p7 ad LL O aAi Gv ¢ U U V �4/L y via m� zpc o w w a E E a� e, C C x 'Ci x c. c�. ¢ c c c Z o o u ma ❑ z O O n y o r Y S 'Z a `o ,a z z n c ¢•>ruOC•i L•OwCx ¢U¢:CwOr ¢Ua�OM u¢LY a¢uj ♦u1z•u,>n �,nmn,...11nmnx inC ci i,YnLcJ1an5 ,on v❑` �o?C? ❑cCa ❑c°eQ❑a 41n2 u�nm uvm ❑oa l ❑°c°a ❑"° ❑art9.a ' LLF- ` -a & p aoo ',, awN an av1 Vrf avaa.l1 m° �•Zun aaoycny .z H0v3 eyaoC1Ea0^7s, O O EZ — 0 ^vaWwwcaGc 3°' v a n7 Ote� 0, vv °� zQ U Ka1 Z x O LLLLd UOOO U O o O r• Y U l0 ¢a i+ �-0 m cc cc u =Q Q Q Z w al a7NJ 013 a.uuas y F' F- O N c=LL c vclD N untiz m u u u u Q > O o oaroo x > Om v v v aw E m = c ¢ Q¢o0 0 0 o= = C = W1n E A as m co oc¢ Q Q o0 0 p o o cv p c c c Z) oEar 0. ° u u u-mn¢ tog aRm uu000°r°u u m m rn rm¢u O oa L:b waro' i. ° U o o o 0 0 0 0 0 0 C C C C c C C C c C N w N N w W N N T a! F- F- F- F- F- F- F- F- P^- a a Q Q¢ Q¢¢ Q¢ u u u u u u u v u u El W W '-I In M O n m m O 01 O Ol W N 7 V W m W o m V Ln lm O e-I e-I W N r� O m r m V�� O O 7 m m W N ':I-m m W N N N W W C m I� r-- r- V1 m V1 m w r� mW If1 ci 1� W W M m M I� r" m M O O '.. m I� ITV M M I� V Ol W m 1� V mW 00 m M O O 1� O N N m W Vl 1- .-I .� �'-� r-I r N W .. to C11 O W O m m oo I� N m H .-I .-I o 0 o o o 0 0 �--� W N m o H W N H H o w w r� n o to m N N H V1 to No o N a m N I, m m N Ol a ul O m m N o O Rl m H''., e-I .--I M m Vl In r-I Lr H m I� N .. N ul l r . e-I �--I N .--I H M V V m m V Cl m y N vt vr'.'.,vr u! V* +n Al an to 'f'u* vt',.n 'A V* ti v1 +n V1 IniA �n.in..'n In u, In .n, V1 +n..an. r1 c-I u1 N N O1 N V O1 I� W W N .-i O O m m w O a O o O �/1 m O �+1 �r1 c-1 . -i .-i O O O O O O O O O O o o 0 o o 0 V O o o o o o o o 0 o o o 0 o o 0 N o mo Vl V V o O N V W o C N� W mO O W m m N O O o W O V 0 0 V1 O O O O O O O O O O c? an r a m m M W� 01 it 'n W V Cn O O O O m W In c N m W In an N N O m m Il r Vl m N N c-1 W W V m o o o m o N N Zllo N (5 to O N l!1 O c-I ei rl m M V1 ''... V1 '-1 O c-I '. O lf1 O N N l!1 1f1 Ol of O '''.. Vi m O a Oi N LPti V1 N tlA"m V}''.,an to V1 V1 VT V} V} -v ,In V1 V7 V1 V1 V) N. N V} V) V}.Vv V1 ut VI V}'...ih V} N V1 Vf V}...''lf} In. VY, V? V1 VT. V1 V1 VY VF V1. 1/f. Vl.. VT ....w.' m.. Y Y > T Y > > a -I N M V V1 L N m V w w a w a a w n w r❑ w a a w a i a ra a s❑❑ w d ww a 1i.i w LL w V V V V V a) o)V N LL N N N N N N N N N N N '-I cL m m O o 0 0 o o o o o .--i w .1 N u',i m- m a N N w w m .--i w a N Q m Q Q m m '.. a �--� .-I d m N m N 0 0 0 o 0 o o 0 0 O iy,� O O W O O O �;,i O O m m .-1 O w m w Q❑ p �m U v1 >> w in vl O Q O O Q `""� O c-I O O O O o O O O O O o ,n o o „1 0 o o w o O O p o o m, v1 v1 w Q Q a �n H w a a o ,m o o ,m o 0 0 0 o o o 0 o ... o o o o o o d d a d d d a d n- o N O N y1 N N N N N N ✓1 ✓1 O N to N to Vl N N V1 tm V1 V1 V1 V1 'n V1 V1 N V1 N N 1n O N O N r r r r r r r r r .ti p .ti .� p N ti .ti p .•-i .� p❑ N .ti ❑ p p p p p p p O p p p❑ p❑ O .ti p .--i .ti p N .--i ry .� w w w w w w w w w O ca a' E tw m E u v 0 Q w m w 0 7 76 o m E o Q v Q E c o C Q p C E C c NE E O Q ❑ w N w C IL O Q p m C O 3 C pp. cL C Q > In c ami Q w O eo C ai e p c � N 7 Q c °O 'u •m Q V1 C m W w C Q O , ✓ a w to c p o Z} n. d r ° V1 o O On. Q vi r N O c Ou 7 a. a io a cx w O p❑ a w O w O U O C ',, > a a. fa cl n m V1 �p J f0 w V C O> v7i c v `^ ami + v+i o L m w m,.. > E ",' ° 01 C.. w m` v01i � Q m tf :? cL . a) a. E E ° o o d S Q a y m aE c m c c U m n u n a J v a a E n `o V a m J o o w w o o w_ a o. ai rn m rn rn m a a v N n io a 7 c w n, ° > o f o r a v v v v rn m m m O. J J a - J w C C> a E w f` CC U a s N V1 Cl N m ,� "6 w N N N N N e G m 4, `,�_' d W w W> a y > E n o. .-i e-1 N �-i r-1 m - m w- ° �m - J a 2 J w v E `m O o m a' a a w w v c `w c v .w E a V •- W W c �! t' G. vOi N N . N\ 7 �-.� L.L O C Y Y E VI W E LLl IL Vl C w w w w w m m m ''... m E E a w a E o a`i + w c N m o ro w u w o o O v c w C W a T>> r> w w w w v v Y C E a o V1 o w v Q Q m m ". w .E a o o v '^ .� ry m v v1 r>}> w E a o o c c a J w j w ;. a\ c>> m o` o c t c .� .� H N m a c v caw a d a w w w c= w m w m 7 v v1 u c c a E w° a o `o `o 0 o m v v v 0 o a o o c �'G S E E o m m;.Y w T y u N n N �, E E o o a w o J'W �' E Q E a a a a a>>>> m" o v o v1 J J a v " c Y u v a; c 7 0 o u E E a 7 J 7 Cl a a a Cl i+ •Y U U -0 m n.. m L c c - N U U J 7 J 7 J c c c C a ry' �. - V1 O '''... w w= w J W O O V1 VI N V7 V1 w w w w w N n w N w W p❑ C N a N c �. a N N E E c c 3 a 'E w E •- p v❑ E E E E E E E E E w E E u u w a_ m_ m n+!� Q o o v._ E v a u u J 7 7 J 7` E E P a a c a a. v w �' •E E c c a, v a 1n v T° u m m :° :° w °. a s o_ cu E v E ,c c G c c>>>> a`i N w w l w c d c a m m o o mw c `m v n, a .. w - y -a c m m Q Q c c c ,'; "' c w c ai w e a. c c c 0 0 0 0 c c o c c c o o>> c c c c v o � E w w w m o " o �; w o m c o c a a a a a (7 l7 l7 C7 w w •-o w w m om, m �, p p w w w m w w O v1 7 J ° O O >> w r r" LL LL E w E �- w 'y. w C C C C C C C C C w w� w w w IS w w w �n v1 ;., w ,., w w E o w ,� u 7 N ,m o 0 0 0 o o o 0 o u u W u u u w E w u E m m E E E p C>> p p w " w O E "�� O E 'o E O O w O O O N O N O O W O W O O J N O u u I W N N 7 O 7 w O w C c c C C cl c c C _ N w w ,A 1 Q m 0 0 'vl 'pa pp �... _ U U .- Q _ Q vl v� w w w w w w w w w w w w w w w w w u u w w w J w w > w w w>>>>>>>>> a- a- a- v m E n. v +� w c 'c a Z a E m a, E m m m m m m m m Ln w yO OvN y Om m o° mJ o m o m o a o n o o a C C C C G C C C C C C C C C C G C C C C C C C C C C C C C O O C C C C C C C C C L L L"L L L L L L 00 0o m m m ao. oo w to m,.,.. m oo''., m oa ea o0 oa. a'... oa no m m em m m m . w w7 ',� ,� oo no ea oa no, wa w9 tG Cp r r r r r F- r r r 111 VI V1 VI V1 V1 U1 V1 V1 V1 V1 VI V1 VI V1 �m VI NiVV1 im VI VI VI V1 VI V1 V1 V1 V1 V1 VI VI VI N N VI VI V1 7 7 J J 7 J J J J 7 7 J 7 7 J 7 7 7 J 7 J J 7 J J 7 7 J J ,d 7 J J 7 J J 7 7 J 'm m m m m m m m m u u u u u u u u u u u u u u u u u u. u u u u u u u u u o o u u u u u u u u u u u o',o o o'..o o 0 0 o 0 0 o''o o o o o..o o..o c o o oo 0 o o o o o o o o o o o o E E E E E E E E E ❑'Ip p p''❑ ❑ p p❑ O':.. p. p.,❑ p p D O D p''.�❑ p p❑ p',❑.❑ Q in 0 a a p M p❑ p p p p p w w w'',W W w w w W C c C C C C C C C c C C c c C C C C C C C C C C C C C C C C C C C C C C C C C C Oa L7w CJ 5J Jp aJG hJaJ19Jp G7 JCmJ '.OJ O7CCJ 7 J J q71 tLoJw OJo mJn J1 7 J1 �Jl CJI tJs1 tJw w W Ww ww Ww ww> WwaEO1 WT WT T Tap OCTV1 VV1 V1 In V1 o u uu u u u u u u u u u u u u u u u u uu u u u u u uw w wjvvwvaTw pOocOOOoOOOOO O OOOoOO o0oOOOoOOOOOOOoOiZLLiiLLLLiiiZuLL p in 0 0 0❑ p p 0 0 p p 0 0❑ 0❑ in 0 0❑ 0 p 0❑❑❑ 0 0 0 0❑ 0 0 0 0 0 '.. It M d' ti O z E L 0) El m I ao w H m m w - m m w m r., m N aNW H.m�w V W ,y�N�0�0 M ��OIIN I�pJ M��n O1�N�l�O M�lo m c o HO 00 O (+�'f lD 001w i O (fit N m m OI N N , M N N � l0 oo ��N T - I - N a.°\ MN nNN V °1�-� lND v�. afVoOooAololl-� ,,,.v.vNc a�of n�i ��ml N{vWi%m��ryrn N� II"o I - IT m kD 000y � I m�INOI 000 o, r Ln n oj°rv� Nru"-, F-m-1 r r,r r> r r r>>> r r r r>> r r> r r r r r r> r r r � rl N M V N ey N m V Ln c-I N M V V1 �y N' m d' Ln ' a -I N M C' In �y N M O' Ln � N m�� N N M V 1l1 '-I N m V In c>-I N fr 2 2 a a a a.aJ, a.a a�� 7 7 a aa 77 � 7 7 a aa a a7 7 7 7 7 a a a 9- a 7 7 7 7 7aaa 0 R 7 co6m m mono,mmmmmmmmmmmmmmmmmmmmmmo,mmmmmmmmmo,o,mmo,moio m v a v....v m m m m m m m mm m m m m m m m m m m m m m m m m m m m N o 3 V V a V V V n n n n n n n n n n m m m m m m m m m m m m m m m m m m m m m m m m m m m m o o o O o o 0 o 0 o o o 0 o o 0 o o 0 0 o o 0 0 0 0 0 0 M M M M M 0 M M M M ci Ch M C) ....... M o o 0 0 0 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0'0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0'.0 0 0 0 0 0 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ,f 0 0..o 0 0 0 0 o o o o o o o o o 0..0 o 0 o_ d d o_ a a LL a.. o_ o_ o_ o_ o_ o_ o_ a a d a o_ d a d. o_ d a. a LL d d o_ a H �........F H H.FH..HH...F'H ~ ~ ~ ~ ~ ~ ~ ~ ~ w w W W w w w W w w w w w w w w w w w w w W w W W w W w W W w W W W W W W W w W w w w w w w W W a mmvmmvm mmavmm mmmmmmmmmman...vnvnnanmmmmmm ''rnrnmrnrnrnmrnomm mmm mmm mmm mmmmm l.......�m o 6 6 6 oa 6 6 n m ojcs aro n" 6 6 6 6 o N o N tn o O O O O o o o 0 O O O O O O o m o O O O C3 O O O r�ayy O O C:N O C77 N N N N N N Vl w o o to to an to o O O o O O n n n n n an N m LNmLn N N N N N Vl m VI to Vl T T T to t0 to T T T N ` (o f0 N f0 fo !0 fo fo N fo tp (o f0 N fO �p of N of Ul of N N N N N } } > } > . . f0 fo fo 01 0l N O1 0) N W N W N > > } } > to f0 fo to to 7/ of Ul 01 0l f0 f0 '' t0 r - > > N m v an r > r > > .� N m a m > » » .� N m a m > » r > .� N m a in > > > > > .� N m a an > > > Ntf `" L' `-' N m v �n ' ,'. *.". .� ry m v in t 'C' `�' �- N m v m .� ry m a m ... .� N m 7 a. O o In vl !n to vl i. i1 io !n to Ln vl vl o ca CY t �y !n an Ln vl an q A b Y.7 an h to an an Cr�yy R"J Q t' vl ufB vl C7« Ci., V5. C .. Ct 7 - - A L7. CS. ta. Q, � z � z = C3. O. Ga O..', 7 � o �Y. C4, a Ck.. D ','� 7 Ck Gk� O. O. sl 4 O. C1 _ _ = O., Cl. �a Gd, R tl d. E]L K7W. Cl O, O.q. Lan O. C J :' ,',� „'.? J C C C C C J' 7 J J J C C C C C 'o '... J J J C C C C C �J J J J J C C C C C '3 J J J J C C C of 4rW a�% 4a"I 0.?9 W G1 Ol '., N of N ufY Mf o 'A w w N W w �"7 ' ✓1 N 4e'f iJd Ol w w W w 4n o V1 N U'.N N N W o! w �"k GN 4n Vb ti1W W N 7/ >>>> >,c c c a>>>> E E E E E>>> E E E E E E E E E E E E E E E E E E E E E E E E E J J J J J ` ` E ` ` J J J J J ` ` ` > C C C C .0 > > > N >- C C C C N N N o1 N C C C C C y N .0 C C C C C C C C C >O - m m.m m 0 0 0 O O m m m m O O O O O m m m m m O O O O O....,m m m m m O O'...,O O O mmmmm >>> O O O l7 LL a a. a a l7 l7 C7 l7 C7 ci:. a a a a l7 l7 C7 l7 l7 a a a a a l7 C7 l7 C7 l7 a a a a a l7 C7 l9 'l7 l7 a a a a a ''l7 l7 C7 o c c' c o c a.' r' a 2 ', �' c c' e c c e a e 6 c. O O POl 4 p i O Ca O t C) O f3 O L C C C c G' 'K' C C 41 p G7 O c c p c O G1 O f7 O O O O ,A O C1 O tY O Ca Ca O {q O D o O O C C C 1..^ C C LLC C C �C C C C C C C' c C C C C' C C C C C C a C C C •C '.' {' .0 Fll m Ol pJ' M CU of fG 71 ,1 a37 Q) SU I N GY N 4D q'N 41 akY R9M a41 mq GJ w iu w of 71 $� a�Y N Qq F➢1 '9a' YyA N of itlN Cd �"a of $N naJ 90 0- a` ai � aa az ` a. a-m r a: ' a a. a a a sa, mm ca. a a. ea, a'rt a as a cL a`. a: m a a a cL LL a ca Q, a: JEE. m mmm'm m m m'mmmm m m m m mmm'..mmmm m m m mmmmm m mmm mav H F FHNF t: HC^S X9p NIUfo !. F. ,t0 .@,i61R{ fO fo tO fO fo 10 fO f0 f0 p p 6 C fp fp fO fl3 to CIE E E EE E E E E E E E E E E E E E E E E E E E E E E E E E E E E E''E E E 'E E E E E E E E E E E w W W w w w w w w w w w w w w w w W W w w W w w w w w w w w w w w w w w au w w w w w w w W w w of o) UJflu /ofI GJO1 N U1 0l N / N w m o/ N . U1 0l Ol U1 Ol Ul of of o) N W of W o1 0/ of O1 v > > > > > > } > >, } T > > > > > T > > > > >.. } } > > > > > W w W O1N o/ N Nl'u1l1v11 11 I1 11 LL. LL LL 11 LL 11 11 LL 11 11 4L LL 11 lL LL ML iZ M lL 1.1 aL W M LL LZ al M al LY LL lL al I1 lL w. 11 El O M m m M O w m m M O W w .--� N lD c-I w c-I N w '-I lD N O N w w N w N w r M Lrl M a-i '-I M Lrl M N O O O n i m m m w c M m m 00 M n m N M n m N O N n O N O L n O N ri LD O n V M w O n N a --I w N m N N.4 m m m N d' m m m m 00 00 LD m w a-4 00 w 00 w oo VI L--I Ll0 w 00 m ti LD N V oo m lD N V OO Q - OO 00 O M V DO 00 Lti N V m n m N V m n m L--I M m ''... lO w 'i M In w w ''... N M I '.. LD w N m V LD w e-I M zr '... Ln n H m C Vl n N N M N w H N rl in li,ry. 1^ q^ ulh 0!'h L) V1 V}.......,in N N Vl rn N in rh 14 ih LT N in N 1A N Vn In SIN if� in Nn VY. .-1 W LA O 00 00 00 LA O 00 00 00 O O V N O O O N O n v1 M N LD N V1 N Ln O m O 00 Vl O M O lb N V m m m N cT o 00 e-I N W V o .ti N W V O N V to n m N a u1 n m ID N O n a n lfl O n a n to lD V) m i� lfl lD Ill M N V n M m N V M 00 M �--� 00 c-1 V Ln c-I 00 ci V N� m 0) m N V m m m O .--I LD a M o H ID 7 M 00 n o n V 00 n o n V LD N M 00 N LD N O NM LD m N LnLD m N V Ill n m N V lfl n m N V Ill n m N V Ill n m a -I M Ill LD 00 N M LA LD W e-I M-;t Lr) n M WJ5• v*# vM in VT N i/T N VT — — - — N — N — - to — - iA to iR in in ih iA, th V4 In Ln rl N M -zr N M V Ln ei N M V Me -I N M I LLna--I N M V M N T -IT Ill '. r-I N M M V Ln ei N M V Vl 'i N T H Lt1 ei N F-.F- :? :? a a a '.... a s 7 :? :? a a a a a 7 7 7 a 'a a a a 7 7 a a a a a 7 7 7 a a a a a M m m m m ''..... O1 m a) al M a) al a) a) a) a) a) al m m Ol a) Ol a1 a) m m m m m m m a) al al m m m m a) m m ch a) a) m M m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m c v m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m v v a v v v v v c a m m m m m m m o o 0 0 0 o 0 o oIo o.o N ti ti ri �'...� v v v v.......v v v v v n n n n n n n n n n m m m m m m m 0 0 0 0 0 0 0 0 o 0 0 0 o o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o o 0 0 0 0 0 0 0 0 o a o O o 0 0 0 ''...a a a a a a a a a m a a a a m a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a F F- F- F- H H H H H F- F- F- F- F- F- F- F- w w w w w w w w w w w w w w w m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m a a a a m m m m m m m m m m m m m m m m m m m m m m m m � I N m m m m m ', V C V a m m m m m n t` n n n a a a� a m m m m m m m m m 01 m m m 0) m m m m m 0 0 0 0 0 `" � `"� "'� '"� `"� O o 0 0 0��?� a o 0 0 o o^^^ n^ O O O O O m m V a, O o 6 6 o m m m m m 0 0 0 O O O O o 6 6 o o o O O o o O o 6 o o O O O o o O O O o o O o o 6 6 6 o O o o O o o o o o O O O O O O O O O O O c c C O c o o c) c)o O O C O c o o o O o O O c O O O o 0 o o o o o o o o o o o O o O O O o oo oo oo oo o o o a O oo 0 o a o 0 O o o o o 0 a o I LA Ln m v O O O c LP Lrl Lr Lri Lf) O c O c O ey rl e-I .--I '-I O O O O O N N N N N O O a.O o m m N O c 0 0 6^^^^^ u'1 Ill N N �- Vl f L2 L2 lf1 e-I L-i ci r-I e-I N N N N N �- N Ln T Ill Ln n n LO N t0 LD N t0 N 2) T N 0] N N !0 N f0 N N N N N (O N LO N v v v v v `m v v v v v v v v M, m m `m v v v v v r}}} r v v v v .. v >- >- r}} v v v v v}} r r} v v v v v r}} } r v w v v v r}}} r v v } } Y '... Y .--1 N M 7 Ltl } } V Ln N m V to Y s+ t' t' t' `i N m -;t N t+ N +.+ t t .--I N M t+ .--I N M Ln N O O O O O N O O O O O N Ln vl t/l to O 0 0 0 O lrl L/l N to In O O O O O V V vl V In O O O O O N Ln 7� '... Cl a a a a? 7 7 Z) Z) a a a a a :D Z) a. Cl. a a a M a a a a a 7 0 ,, D> :D a a a a '> > a a a a a a . a a a a a a a a a a a a a a a a a a a C C J J J J J C C C C C J J J J J C C C C C J J J J J C C C C C J J J J J C C C C C J J J J J C C v v Ln In Ln Ln Ln v v v v '. v Ln Ln Ln In Ln v v v v v Ln Ln Ln Ln en v v v v v Ln Ln Ln Ln Ln v v v v v Ln Ln Ln Ln Ln v v E E E E E E E E E E EE E E E E 'E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E Ec c'c c c J J J J J c c E E E E E E c t E E E E E E E E J J 7 J J J J J J 7 J J J J J J 7 J J J C C C C C C C C C c C C C c C c C C C C C c C C C O1 OJ v v v O1 W N v O1 N W v N v v v v N v Ol v N v O O >>>>> > > > > > m m m m m O O O O O La La 2 Lu Lo O O '.. O O O mmm m m O O m m m m a O O O O O m m o 0 o O O O O O 0 (D a a a a a u 0 l9 0 0 a a a a a l7 l7 l7 C7 l7 a a a a a l7 C7 l7 ' l7 C7 aaaaa C7 l7 l9 C7 l7 aaaa a Ill C7 c C c C C C c C C C C c C c C C C C C C c C C C C C C C C C O O O O O O O 0 O Q O O O O O O O O O O O O O 0 0 0 O O O O '. O O O O O O O O O O O O O O O O O 0 0 C C C C C C C 0n; C •c',. C C C C C C C C C C C C .0 •C .CC •C •CCC •C •Cc .0 •C .0 .0 •• C C ', c C C....' C C C C C C C OJ w O) v v v v w v 0A w Ol v v v w v v v Ol v v v W v w v v w v v v v N v w w v v" v Ol v v v v v v v Ol a a a a a a a a a a Li a s a` a a a a a a a a a a a a a mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm v v v d v v v w a v v v v v v v v v v v v v v v v v v v v.. v a v v v v v v v v L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L F- F- F- F- '... F- H F- F- F- F- F- F- F- F- H F- F- F- F- F- F- F- F- F- '.... F- F- F- F- F- F- F- F- F- F- F- F- F- F- F-' H F- F- F- F- F- F- H F- F- E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E'E E E E E E E E E E w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w '.. w w w w w w w '... v v v v w w w w w w w w w w w w w w w v v v v v '... v v v v v v v v v '..... v v v v v v v v v v '..... v v v v v v v v v v v v v v v v v w v a v v v v v 11 11 11 LL LL '.LL ''LL LL w 11 11 LL w w ''.. Il 11 LL Il 11 MLTLL LL M''.. 11 LL 11 11 LL LL LL 11 Il LL LL LL 11 LL LL M LL LT IL lL LT LL LL LL 11 El . - ic,� - � m- m�O m�, NII NII�m a � � N,,...,msR N�c�i 11N m V�Ln N m f m�w O tj NIIm o O,,w m�01�� N Lo N "N NI O�IO N W lD ^ m Ln fV N r'lla R IIN ,,,., n�� N�mIL 0 H1 NIm M� II mII NI.�IIO mI ry,,,M ,T o�^�a�m�N m Ln OII III N0 M OIILq m T OLq IIOrIj O�NI �NI Ln Om m�^� t 4IN mIIO r r r > > >}}> >> r r r N m v CD� N m v wn N N m � un� ,ti N m qx vw `'"� ry m V vw ati N m v in (7 ''., C7 l7 (7 C7 a VI 4h VI F F F F F K✓9' �+i ePY VI N U U U U U U U > >,� a LL a a n a a a a a „ '�,� o d m d o o d ai ow m ai ai aw aw m m an of r,`n aw o 0 0 0 0 l o 0 0 0 o v v v a v v v O o 0 0 0 C7 O O O N N N N N N N m m m m m m m m m 4& m dXk m O O O O O rk«G'•N� O O O O O O O O O mmmmmmm nmcnm amo0000 000o00000 m m m m m m m m m m m m m o o'.o 0 0 0 0 o 0 0 0 0 O O O '-I e•-I ei a-i r-tl a-i rr^T e-I 1N a) N N N N N N N N NO Q a Q Q Q Q Q a a a o a s a rts µmµ.a- I CL o a a o C dC rc4 d o a o ri a o a s dw w,w w w w w w w wFi,N n� ~~ ~......,~.~ ~~~ F w w w w w w w w w �n .n in.n an an mow. u'p, wn a+win'v� an M +nv� — > > > > > } » r > r > ?^ > > > H N m ;I-VCl > > > Vw a J J J G U LD (7 () 0 o. aa, 1. a a a a a a a a eb m an aw a, a) ''... m m aw m m ai ow m a cru aw z¢vvvvavvav W W W, N N N N N N N N N N N N N 000 O O O O O O O O O O O O O O O O O O O CD O 0 0 0 0 0 O O O O O O O O a+�aaaaaa¢aa¢a�Q m a. LL a a d d a d a a o_ o_ c ti ra aFw iw w w w w w w w w w w w 1- 0 m m m M m m m m m m m m m m m m m m m m m m m m v v v v v m w m m m m m m m m m m N N N N N N N N N N m m m m m m m m m m m m m m m m m m w �„ .� a� N .� ti ti v v v v v ` m 6 6m m o 0 0 a� ,� ,� o o o i aJ w a ar v w v v ar m .� N a� m O O O. O TT 0 O 0 0 > > > >',> } " y 2�' Sp dy OO > } } > Y O CD 0G" CO."Y yY O O O1 S� O'! LO fi +'" Ck CJ CJ '.' {{O� GM O# a-i N m V Vl a-i N m a Ln ro m m ra ro Vl u"w Wryi """' � ` �ry mM 0 O O O N NO 4^W O 0 00 O 0 m m m m m u.r t ',, ,fie t 't } '. } > > >- •--I 7>> j pp O p O m....m m m m gyp, 0 0 C' O'. ti N m V Ln V '. 7 a V V O m m m m m m m m m m N N N N N LL d LL d CL CL CL 4Y. a N N N N N d a! w `m `m m `m m v m m m m `m `m r`o `m .-i .� a .� ti o 0 0 o o a > > > 'k': *" w aw v } } > } > ar v m w w } } y } } v v v ar w w✓a' vro v, an 0 a c0a„ 0 a..=, .� .� a� .� o } r > .� ry m t vw > > > > > a� ry m a m > > > > } ''. �o LL` a a a a a CL ¢a. CL CL m v ui 'lm". 'C' '.,.� N CL m v wn N ry m v m w of ar a, oa > > > ;� o ' , ar v aw v w Vw '.. O O qy Q� qj vw wn vw an m O O Gi O O an wn N } > } } > m io m m a a a a m . an un ua O Ck, SS ik a 7� 7�� Cy CL a al t'k„ Z) D Z) 7 D a --I N m [F In m a a a d e-I N m V In a 0 sa 0. 0 0 ca, ra, 0 0 ¢¢ Q¢¢¢¢¢¢¢ o 0 0 0 0 E E E E E ;7 ',' :`J, C C C C C ',' m'T„ C C C C C U U U U '... U U U U U U a CL d d ., [L C C_ C C C aJ w a/ Vi in Vag in 0 w al a) w w Ln u � Vh C w w a/ N al E E E E E E E E E E E E E E E E E E E E E E E >o o >0 >0 >o 0> o>''>o >0 o m m m m m m m m w w m w al a2S oil o� o� 07$ 03 07l oif o3 aif o7l oD v v v v vm vam'J o>if vo>7l o>� 0v>3 a> c oi a) >> c>>>>0000 00 CID y ai c c c m 7a a a C7 0 3 7 33 vo(>07c >>''>>ao2o2ol 03 03 os>m m >>>>>o oo 0000 0 0 0 0 �'v -0 -0 -0 v -0 v v'v -o -0(7 (7a(7 (7 o 0 wo b a a a a a (7 J (7 0 (7 > > > > > > > > > > > > > > > > > > > > > > > > > > 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Q c' c c Ic'" c c' c: c: Ic: c' c; c" c c" e 0 u' u u u u u u U u u u u U u U U u u u u u u u U lJ u O O O -- 0 +' kd o o l O a3 U� O C.ti CF O C,Y, t' 0 O O CA d CL 0. a a. [l CL W [L [l Cl LL CL d aw. a O. d '... [L a LL [L d [L CL O. C c c c c C" V C c C c c C c. C C c C c C. C c Y,= C F F F F- F F F F F F F F F F F F F F F F F F F F F F j CU? � a5 aJ a! V ( pj ar. aJ y y, U t, �y � > > > > > >, > > > > > > > > 7' wal N 2! v 2 a! an 4Y W a1 G e a 2 v qJ 0 ',. O O O O O r0 O O O O O w O O O O O w O O O d El.. al aL CLM p" p` a.:m d i5, tA. CL CL d M a(. c c c C c c C c c c c c C C c c c c C C C C C C C C m m m m m m m m m m m m m m m'm m m m m O O O O O O O O O O O O O O O 0 0 O O O O O O O O O v'.� v v v ti v L L L t L L L L L L L L L t L L L L L L L L L F F F F F Q Q a Q Q ''' Q Q Q Q Q Q Q¢ Q Q¢¢ Q¢ a Q Q m w E 'm w w 'm 'E w 'E w 'E w 'E w 'E w w w 'm m 'Eu 'E a w w w a.uE.i. w w w w w w[, nSJ a! a/ 41N ad Mr as au Y1¢ q+ > ? u w ay rv, au nr kJ N a5� a aW ar ¢u w ,n a'r aJ a� akw arP ar m,r a„n qa +, ae �taar >a>>>>a>>>>>w>>>>>> W W un w ws w w ua W w wa aaa uu'. r,aa w,w n.wd w w w cra W W wa..r w W wu w,w Wu W w w Wi w w.a W uxa w. w v +u ae � as as as a�a ctr � ar ai � v cu wr✓ �u rn ve ad �x as � � aw cd' � as �e �n as as awe w � eu � mr w v LL LL 9 w P.L W. W W M1.C. W �dL A.L. M1L LJ LL W !z LL:.. wA ILL Su. W ta. uz LT W x UL. it iZ W LL wx. uxm W LL en. LL lk. IL iLL El _.. O00 DOl lMD N 10f1 V lmD n l-D 0�1 O T n W T O Io n W VOl V lm0 ^ m o n M 00 .-I 00 V m M m N O .--1 r-I m lD l0 In O ID lD In N ID a m .'-� 00 C N O N O 00 n lD m O 00 n lD 00 00 N O c-1 00 V N O N O 00 n 1D Vl 00 m m l0 lD O N n rl 00 O N n N n M m M Ill 00 m lD 00 e-I V ID w ei V ei Ill m H� m to w r-I V m 0J w e-I V N V lD m H N Ill n m N m n m N VT VT L? N• N, LT Lf Vf L1 Vl. in Vf A 4n VT VT'A iA i/} th VT V! Lf V? V? VT i/f V? V} VT'. VA VT In Vl In N ih N'',..N VT to VA,, 7. Vl vl O O O V7 V m lD N 00 m O M ID ID m O M lD n V m w N w V m w N 00 m 0 m LD ID In m V N N O In n m w O Ill n m N Vl O Vl m N O V 00 V O N m lD N O N m ID V] N O V 00 m N O 00 V O N m VJ n lD M �-I m O O n tD Vl ID O n lD Ill O N o n M n n m rl n O ';t 00 .-i O r-I 00 c-I n n m .-I LIl n n m a-i n O .--I a 00 m In O n M e-1 00 M a -I m m 00 00 V O n M rn ''... ID m N w m n O m LD '-1 n O M LD '.... N 10 m N ID M 10 m N lD M n '... O M W N In 00 O M '... M In 00 c-I m Ill 00 a -I M c-I N N M to Vl....',N rn N V} VT V} Vf V} <R aA V? 4A ih Ll V1.'.4A N Ll to NA N Vl ih to 1J?''. t/T to L11A i/T N 4/f M N- VN in In Vl'..IA > Y}}} Y Y Y Y Y r} r r> Y I Y r r Y Y Y} Y r r-I N M Il) a -I N m L!1 ri N M tll ci N M V In c-I N m C 0. N m V Vl N M V l!1 e-I N M tll ri N M V Ill J J J j a a a a C7 l7 l7 l7 l7 ¢ a a a a w w In vl In In Q Q a Q a a a Q Q Q a a a a a H F- H H H vl vl In In vl vl an m an In Q Q Q Q Q Q Q a Q Q a a i a a U U U U U U U U U U a a a a o_ o_ a a a a 7 7 7 0 0 0 u U u U U U u a a a a s m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m IT OOl Ol m Ol Ol 6 CO m m m OOl Ol v v v v m m m m'm m m m m m m m m m m m m m m m m m m m m m m m m m v v v v v v d v v v v v v v v V V V V V Q C V C V V Z. V V V C V V V v c v v c v n n n n n n n n n n n n n n n 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O 0 O 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O o 0 oo 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0'.0 0 0 0 0 0 0 0 0 0 0 0 0 R 0 0 0 0 0 000 0 000 000 00 0 0 00 0 0 0 0 0 0 0 0..0 0 0 0 0'0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o O o O.o ¢ ¢a aa a a a aaa a a a a a a d d a a a d a LL a d o_ a a a a a d a d o_ a a a o_ a D_ a a a m m a m m d m r r � F- F WW W W W W W W W W W W W W W W w W W W W W W m m m'm m m m m m m m m m m m m m m'm m m m m m m m m m m m v a a a a n m m m m v c v v v Q o a v a v a a d a n n 6 n n 0 0 0 0 0 a c v v o 0 0 0 o m m m m m o 0 0 0 0 o 0 0 0 0 0 0 0 0 0 N N N N lfl In In 111 111 N N N N N V Q V V V N N N N N '.. to Om Om to to ll1 N to Ll1 to N N O o 0 0 0 la r0 N m N N m W m O! N N N N N N m O N m N O O N N w W N w } y } } } a, >-} } > > > > > } } } y } > } > > > r Y } Y r N M V l!1 m m m m m .-i N m l!1 .--I N m V In m N N N N m m m m m rl N M V In V V C m V '.., .--I N M In a -I N m V y m m m m m � t r r t r }}} r C C 'C 7 3 7 7 7 7 7 O O O O O 3 > > j j n n n n n j 7 J 7 J O O O O O E E E a 0 0 0 0 0 E d a d a O. a O_ O. a N M V n O1 O G a a In In In In In o. a a a a +-' r o Io 0 0 o E E E E E 0 0 0 0 0 a E a E E N N N N N O O O O O J J J J 7 0 o.. O O o N. N N N O, O O O O Ill Ill Ill Ill In O O O D O J J 7 J J • .� Vl Vl N VI Vf a a a D_ a a a a a `m a o_. 0. o. a Ol O! Ol Ol N J J J 7 m J 7 J J 7 w w w W W W w 0/ w O) 3 7 3 7 i0 m m i0 In In vl In In > > r r } i0 i0 m m is } } > } } m m m M is E E E E E ''..... E E E E E E a E E + N m y In E E E E D o o o o o E E E E E N m v m E E E E 0- N m 't In E E E E a o 0 0 0 0 O N VI " a a a a a a a a a a- •- -- •- 7 J J 7 J In Vl Vl 0 VI 0 Vl N In 0 Q a a Q a a Q a a'..a LD� D D u U u U U U U U U U a a a a` a` c c c c c>>>> » >>>> u u u U U U U U u u a d d a a > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > 0 0 0 0 0 0 0 0 0 0 0 0 0 0.� M 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 m m m m m W (D (D LD (D (D 0 0 (D 0 C7 LD LD U E a a E a a E E E a 0 (D l9 U (D (D '.... W 0 (D 0 0 0 U U l9 U ID l7 U (D E E a E E '....... oo oD 03 Oil 03 ob o3 ob oil .6 03 0a o0 co 0 oil oil 021 06 0 o0 co od .6 .6 04 ob o3 .6 .6 a3 0o ao 0 oa 0 0 .3 03 0a 0 04 o6 I oil .6 o6 .6 .6 o6 Jo Jo Jo 07 Jo Jo Jo Jo 70 07 Jo Jo Jo Jo Jo Jo 7o Jo 07 Jo Jo Jo 0 70 70 o Jo Jo 7o7o Jo 0 7o.Jo Jo 0 of 7oIJo 0 7o Jo Jo o Jo 0 7o Jo Jo u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u a a m a a a a m a a a a a m m m a a a a a a a a m a a a a a a a a a a a a a a a a a a a a a a a a O O O O O O 0 0 0 O O O O O O O O O O O O O O O O O O O O O O O o- O O O O O O O O O O- O O-0 O aa aa aa aa a aOC "aOO O O O O O O O O O O O O O O O O CO aOC ,aOC 9 C VaOC O -D _0 a _0 _0 D a a a -0 a a a a a a -0 a -0 a a a a a -0 -0 a a a a a a a'a a a a a a -0 a a a Lna C < Vl In V1 < In Vl Vl VI N Vl In Vl V1 N VI V1 VI N Vl V1 V1 Vl V1 Vl N Vl Vl Vl V1 VI Vl s Q a a Q a Q Q Q Q Q Q Q Q Q Q Q a a a Q a Q Q Q Q Q a Q Q Q Q Q Q a a Q a \ \ \ \ \ \ \�. \ \ \ \ \ \ \ \ \ \ \ \ \ \.\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ %>>> >>>>>%%>>>>>>>>>>%>>>>>>>>%>,>>>>>>>>>>>>>>> a a a a a a a a a a Q a a a a Q a a a a a a Q aa a a a a a a Q a a a a,a a a a a a Q a a a a a a a a a a v a a a v a v a a a a a a v a a v a, v a v a a a a a a a a a a a a v v u v v v u a u v a v > > > > > > > > > > > > >. > > > > > > > > > > >.. > > > > > > > > > > > > > > > > > > > > > > > > > w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w l w w w w w w w w w w w w w w Ol LJ �1 `1 0 OJ Ol �! Ol "'.ly lL I1,LL LL LL LL I1.11 11 w LL.LL LL Il 11 1.1. LL 11 LL''LL LL 11 11 '.LL LL''.LL 11 LL LL LL".LL LL LL 11 LL'.11 LL LLLL LL 11 LL LL 11 11 4L LL El W OO ci V Vf'. VT IA %4 o. e C Ol a�'4 a er 0 o o CL W Lly m m tD V* 00 V} CC G 01 et 0 W N m m VTI O o Vl zt c W Li 00 tD Ill c-I N VT V/ tD . M m V} In '-I ec G a, al v a 0 0 o 0 o 0 W '. W 00 V V} VI VT N m a 0 o o W m m lD VT 00 o' m m v 0 o 0 W N Vl m lD m ri VF V} N m O r-1 V? VY Lb Ill Do al CT a.....a 0 0 o a 0 0 W W m V tD O N Ill V} i/T''...th',, N O O O t~n l�fl o. V?,,.'n ei N d d VI Vl a1 O, a'a 0 0 o 0 0 0 d d W W oo N n N n W M d Vl eT a o o 0 0_ W Ill o n m V} n tD Vf 'pT' d nD a"1 .t 6. yyJ V '-1 '', N V} m to o. &PX LL. iVY 471 tY a 'o W. p,y,( lD N N N m n N 7 V} V} M 00 O N N Ildl V} o. e-1 N cc�t Q <<< lJ u 6 m o o o o 0 m.. d W W '., m „--1 0o W VT W T n� o. T Q u Oat m o o 0 d W N m O m V? '-I Ill VT Q Q '.... U a, m o o o [i W ID M lD ,.. M m tD ri N VT YA V tD lD N m m VT V? Y 111 EL (:i < Q Q U u m Ol m m m m o o o o o'o d LL W W N N m V LL...'t/} OD lfl `val N'Vl Y}} N d Q U al mm m o o 0 d W 00 O H n O n 00 M d Q U ''... a, m 0 o o d W 0o n m VT V m O 1A a. d Q U O, m m 0 0 o LL W n 7 0o ci VT n .-1 VT r d L Q U Ol m m o o o d W W O n Vt• a-1 .-I +4 . Y} J d d m m m o o o ''., d W N N m V V! W Vl v" N ,.,y L1. Dm m m m Ck. dL,U co O .ti n Vt• O n V"h ?^^ T ..J CM.. C4.,. mn m m o O c q. W oo n 7 m ih'...ih ., O m 0o o, ✓' 4. m.p d s'x. d), m m 0 o a ey„. a.p n V oo c-I n ci tD i^ > J d d m m m 0 o o d W 00 to m rl Vt• a-1 lD to 'A '-I ec G I- d al m m o o 0 d W N N n V Vf 00 N 'o N H d al m m 0 o 0 d W m '-I OO to V}..'', W M 00 n 4d'M M H d a, m m o o 0 d W N m o m Vf .-i V7 � O kNti ec G I'- d 6''', m rn a o 0 d W W tD m rl V} V <D O U> N I- d a, m m o o 0 d W tD N o N VY M O m N V/ Y} '.' U 0 to a, m m o o 0 d W N N n V 'o 00 N V 111 — N M a, m m o o 0 d W m '-I 0o l0 'n W M 00 n V}— r M D 6m mm m'....m 0 a 0 LL W N m O m o c-1 to a O Y> 3 :.� to 7 0 0 0 d W tD t0 M a-1 V} V tD O —'— L3 6;� 1 V a) m ffi M m tD N V? ID N O M rVY d 4/a f m. mIm m''..a, M N.AX N N m 'n 00 Ln tD lfl — N d e18 m 0 oL LLUF 00 o .-i n V} O n . 0o — m d Ra", ma, ere m M !1M1 00 n a m o. m Oo O — V d Vl m m 0 o 0 d W n V '., oo ci 1A n r1 w V? f N d<< al m o, 0 o 0 d W V V m c-I YA 111 M N N — } -U Q V m m m 0 0 d '. W tD M W M to''... m n H — r N Q U m m m 0 0 d W O N N m N M O LD VI,,.— Y M a U m m m 0 0 d W O O O n V} ID V o W r V Q U m m al ti 0 0 d W v v v v v m m m m m m m m m m m m c v m a m c m v n n o o'o n n o n 0 m o m 0 m o m o m o m o ''. m o m 0 m m m o '', m m m m m m m m m m m m o m m m m m m 0 m m n n 0 6 n 6 n 6 n o o o n n o '.. O n o n to n In n In n In n vl n o '^ ^`^` '^ I^ m m m m m m In o 0 o 0 c 0 o Ln 0 o 0 o o m m w m o 0 0 m 0 n `m n n n `m n ` m to m L N '...., af0i ami w w ami m v m m f0 v 1° w tO m v m m m a! n` n m m m m m m m m a) N m r`o m m Ol r`o a, m m m m m r} „'-� N r M r} V M "', m a, m m r}} m '., .-I N M Y> Ln ,� N m a In m r`o A m m, m m m r>>> N M } m ' m m, m 'm m al >>} ati N M Y} V C Ill V V m m m m m,, m m m m 7 7 7 7 7 '� O r (5 t^' t }}} j} m m m m m m m m m c-1 V In rtl m .-I m^i �rX ^�.' '♦ '', 'C O 'G° O o 0 c, d LL d d d 0 0 0 o 0 a a d d a ' a, C] �^^ ~ N n', 7 In O'o m o o 0 O_.......,d O 0 [} O xoi 5 66 O o� In O m O m O O In n o 0 0 0 0 ul In n In n u, n V1 n o 0 0 0 0 O. titOry rwl. o CJ. Lq O. M3. O' 0 0 C O n n n n v n n n m n 0 0 d 0 d 0 d O CN is io o rn cx. Cl za Ci' ❑. CJ. CL. ca RS m m m `m m d d d a a m m m m } m io is > } } } > m is m io io a a a a a " to v, en m4 >-r > } > is io is m is N Y O) r m > N } E E E E E ,� ry m v....m '.. a s a'a a H N m v In a a....a..a d'. o 0 0 0 o E E E E E N m a N a a a a d N m v c c c c to c>>>>>>>>> VI V,,VI V, N tn'VI D D Q u Q u Q u Q u a Q u U a u a u Q u Q u a a a a d` 7 c 7..7 c c 7 c 7 c> N VI » V, ''. V,.V, D'. » In V, » VI Vl D V, D a u Q u Q u Q U >'.>...> o o o > > o o > > o o > o > o > o > o > o > a > o > > o o > o > o > o > o a o m m m - m - o - m - o - m > o > 0 >.....>'> 0 0 0 > 0 > o > a > o >.> 0 0 > 0 > 0 > 0 i a a a a V' U' l7 l7 l7 l7 V' C7 C7 V' '.... 17 U' '.... V' C7 l7 ' U' V' l7 C7 l7 a a a a d o- a a a l7 U' U (D U '..... U' U' l7 l7 0 0 (D u' ' l7 o uD .6 o6 oil 0 ab oa ca ob co ob o6 o3 0a 0 0 ou .3 .6 03 .6 .6 oD 0 ob D6 o3 Ga oa 0 0 o3 o7 ca 0 co c6 ca oL o3 'ca oD ca 03 Q3 oz 'cz ca 7 7 7 7 7 7 7 7 v v 7 7 v v 7 7 -o 7 v 7 v 7 v 7 v 7 v 7 v 7 v v 7 7 v 7 v J v 7 v 7 v 7 v 7 v 7 v 7 v 7 v 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 O O O O O O O O O O O O O O O O O O o O O O O O O o o O O O O O O O O O O O O O O O O o O O O O 7 o d d d d d d d d d a. d d d...d d ,d d'...d d d d.''...a d d d LL d d d d d d d d d d L W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W O O O O O O O O O O O O O- O O O O O O O O O O O O O O O O O O O O O.. O O O O O C C C C a c c c c c c c c c c a0 c c C c c c C c c c c c c c -o c 12 c ''. c c C c c C a c c c O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O c O c O C O c O C O c O c O c O ovvvv..tivvmvvvv-D-Dvv. vv vvv v vv vvvvv"vvvavvvv.'.,vvvti o v x Q v a v s v v a a v a v a v v a a v v Q a v Q v Q v a v a v a v a v a v v a Q v a v a v Q v a v a v a v a v a v Q v a a a v a v a v a v a vca a a v a v a v a v a v a a a v Q v Q� v Q v a v a n to N'la +�°r ua'7 +„Y'y ClF G"i vp +gip A/'k a AJ] c2 0.!i Q VW dd'4 a tl.dM1 a v� s fn IA Q V, a N Q¢ to dJ"M +> V'k Q IA a N'Y al" 1/Y Q¢ i/q Q Lf9�pp I!'p 4"e f+'1 Vvv F.n CIA '. i i �'Y ""d ."� `J `✓ � � w"s ..+' `! .".� % Q i Q � a¢ r � a wA"T a .`✓ a `J a :i '�° ram= a¢ «�" w 'tl:.uE ."`✓ .? "�. �" a r� s eJ �& «`Y a+ .w✓ w"'� i^ ."� ,% r> L Ol u lL a/ W m w Ol al W w m w N W w m w w N N W W N W OJ W O/ W N W OJ w aJ w m w N w w W a/ W m w m w Ol w OJ W m W N al W m al al w m Ol a/ ny m al N m `) `l `l `l d `1 m N N Ol Ol W tL w m w W W N w 0) W w '.... w W L L w w W w W W W W W W 6dJ L LL 11 11 LL 11 11 LL LL 11 lL 11 ELM LL LL LL Il I1 d . LELL 11 11 .l lL v LL `1 11 LL v I,y 11 `/ `1 `1 N 4.L O/ LL 1.1 LL LL LL LL LL WG.. 11 µ, 11 11 11 '.. LL 11 11 LL LL I,A. El O W O. d' 00 m O .--I V w N ID O O O C ID o O O w O N C w O N lD .-1 h N h M V V M h wM -;ZrC .-� NW �--� Ih O N W In N mh 01 �"� M mh mr-I M M In O In V M In O In N m h M CV N 'i N M O M N 00 V h O h C N .-I W h V N .--I N W N CD 0� W N O h O h V N c-I V' h Ot N Ill In W O V 00 ul w 0 7 w 00 N m In h am)m Ill h 01 a -I M Ill h w H M M h w N M M h m rl N M M w �-i N V In w N d' Ill w e-I N M In lD H''... N m Vl 'ic V} ih t/f 4�'F kiY Lf V} Vf V} lM1 VF V} V} V?.i aR N t/D A I Vl LY N� N iA '.aA t/T t/T a/L V} Vf M- ti./Y VFW iA �� %6} VT Vf vT, 00 Ol ID W V rl M l0 00 V rl ''., W Ol Ill lD 00 In 01 Vl LD 00 0) LD 00 V c-I h h �-i '-I N w Q7 m h e-I O 01 M h ei m h -4 e-I N h h H Vl N In 00 CO 00 M 111 00 00 00 .--i h m 7 In M h m V lfl N lfl 00 00 00 lD .-i O O O M V Ol Vl N h V Cl N N 00 .ti 0 0 0 lD �--! O O m m N m V h m N m V C e-I O O O N c-I O O O m M N m V w rl m O Ill h N lD N 00 w N lD N 00 N c-I VI O In lD H Ill O N '... V W 00 O V w w O N 0 w o N V w w O N V w w O a M V tD h .--i M V w h M V w h N M lD h N M V VFV Wb Vf V1 Mb Vil +IF"A ... VI'1 VIA N iA Vk to LL 4A 4/f ah V1 in. Vl.. qA Un Vd VA V to sY'h ^i+^w .+./'n In in In V1, V4 N 1A t/? VL V}.,VT V/ 4A Vl t/Y Lk VT N i/1 r Y r T Y r } r Y Y Y} Y r}} T}} Y}} M V In ,}-i N M c-I N M V Ill Y T r r Y H N M� Vl .-� N M V Ill �y N M V M `� N M V In a -I N M 'ZrLn �..� J J Ill V Vl G C G cc cc c cc cc c U d d d d d J J J G G G C G U` (j �'J (� (7 d d d d d (� (� (,� (,7 (7 d d J Q a a Q Q a a a d d d H H F- F- r vl vl In In In vl vl In of vl a Q Q Q Q Q Q U U U U u u d a s d d d d d d d 7 7 7 y u u'.0 U U U U U V d d d d d a CL d a d� Z) Z) 01 01 m m m m m m m m m m m m m m m m Ol Ol m Ol 0) 0) 0) 01 Ol 0) 0) Cl) m 01 Ol 01 Ol Q1 Cl m m m m Ol Ol Ol Ol Ol Ql Ol Ol 01101 Ol Ol O1 01 m Ol 01 01 41 01 01 01 01 Ol Ol 01 m al 0) 0) 01 0) 0) 01 Ol m 0) 0) M m 01 m 0 m m m m m m m m m m m m m m rn m aHti a1 0aH1 maF- maH mHaFO<- Oa ma Oa Oa oa Oal a1 0a1 aI0- aHl aH1 aF-7 a)m m m m Ol m m m m aH ma ma ma m aHm maH m v v v v a v v,a It a It v va a v It a v v OOO O O O O O O O O O O O O 0 O O O O O O O O O O O O O 0 0 O O O O O O O O O O OaH 0 0vaH1 QO O O O O O O O O O O CDOOOOOOOb O O O O 1.�O ObO000 a a a a w wa_d a d d d d d a da a- d a d a a a d d w w w w wW R O OOOwOw w w w w W w w w w w w w w w wOO O O O O O O vaHl w w w w w rnm m m m m mmmmmm'rnmm mmmmm mmmmmmmmmm m m m m m m m m rn rn rn rn m m T v l v v a a m m rn m rn N .� .y ti ti m m m m m v a a v o 0 0 0 o m m rn m rn 0 0 0 0'0 0 0 0 0 o m m m 0) 0) 0 0 0 0 0 0 0 0 0 0 0'0 0 0 0 0 0 0 0 0 0 0 0 0 0 �'� r' 00000 0 0 0 0 0 0 0 0 0 0 �.� v v v C 0 0 o o 0 0 0 0 0 O O o C C 0 0 0 0 0 0 0 0 0 0 '-I c-1 c-i ,y '-I N N N N N N ` N O O O O O m O O O O O to m m m m O O O O O m N m m N N 0mj v N Oml v N N N N ` O1 m Ol 0l v v v v v v v v v v ,-i .-i .-i ,-i m m m m m v v v v v m m D+ m m v v v v v r r} T r 0l r r Y r} T T r T r m mmm o, r r }}} m m m m m r} Y T r O1 m Dl rn c-I N m V Ill f0 w w m N m m m Ol 01 m Ol '... Ol Ol 01 e-I N m a In M m M M m M m 01 v m v as ar .� ti .� .� N m a In V v v a N m v In v N 01 v 0/ V '3 V r t r t} Y r r} o 0 0 0 0>>>>> 0 0 0 `o o T r} T} o 0 0 0 �--I N M I In O O O O O = _ _ 0 3 0 0 0 O O a. a a a a N Y V In 3 3 0 0 0 0 0 a a a a a a a a a a o 0 0 0 d d d d a a a a a a r r >= O o 0 0 0 0 0 0 0 0 rj O O O '. 0 O>> > 7 O O O O O O e-I c-i rl .� O O O O O N N N N N O O O O O 7>> 0 O O O O N N N • Vl Vl VI V1 VI a a a a a Vl VI Vl Vl VI a a a a a m a a a a a a a a Cl a'... `m m `m a a a a a a a, a. a s `m m v > j>>> n 3>>> v v v v v v v v v v>>>> 3 n>> v v v a a a In a.....a a a a 0 ........ `-' N m v.. In Q a a Q a m v m a a a a a o o o o.... o E E E E E o Q '- '- 0 L 0 L L>o E E E EE In In vl vl vl In In vl vl Q a a Q a a a >>>>> vl vl In u U U U u U a 1 > D n D In Q Q a c c c c c D D D D>>> D>> U u u U U u U u u u d a` d d d C c c C C o> o'> o> >o >o >o - - - - > > > > > > > > > > > > > > > > > > > > > > > m m a m o m 0 m m o 0 0 0 0 0 0 0 0 0 0 0 o O o 0 0 0 0 0 0 0 0 l9 (D (D ED l9 l7 a a a a a a d a a a l7 (D LD U U LD LD 0 U l7 0 (D 0 (D (D U LD 0 0 0 a d a a a a a a d a 0 0 (D ob ob ob ob ob 0b ob 0b oil ob ob ob ob ob ob ob a ob ob ob ob ob 06 06 ob oil ob ob ob ob ail ob a ob ob ab 0 ob ob ob o3 ob oil 021 ob ob ob ob ob a a a a v...v a a a a a a a a 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o o o o o o o o o o o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 u u u u u u u u u u u u u u u u u u u'u'u u u u u u u 0I0 u u u u u u u u u u u u u u u u u u u u d d d d d d d d M d d d d d d a d d d d d d d d d d d d d 0.a a d d d d d d d d d d d d d d dw00 0 0 0 0 O 0 0 0 0 0 —0O C C C C C C C C C C C C C O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O a a a a -a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a s a s a s a a a a a a a a a a a a a a a a a a a a Q a a a a a a a a a a a,a a a a a a a a a Q¢ a a a a a a a a a s a a a a s a s a a a a a a a a a a a a a a a a a a a Q a a a a a a a a Q a > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > a a a a a a a a a Q a Q Q Q a a a a a a Q a a a a a a a Q a a a a a a¢ a a a a a Q a a Q Q a a a v v v v v v v v v v v v v v v v v v v l y v v v v v v v v v v v v v v v v v v v v '..... v v v v v v a, v v > > > > > > >, > > >. >„ > Y > > >. Y Y > > > > > > > Y > > > > > > > > >. > > > > >. > >. > > Y > > > W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W v O) `1 O1 01 O) `/ v Ol v OJ d O1 v `1 `1 QI 01 `1 Ol Ol 01 `J v v `1 `! 01 m `1 01 O) �1 O/ O1 `1 v OJ - - - - - - - - - - - LL 11 LL LL 11 11 LL LL 11 Il LL"'.11 11 11 w LL "',LL 11 LL LL '..11 11 ".LL LL I1 ll LL LL LL Il 11 LL LL I1 LL 11 LL 11 LL LL LL LL w LL LL LL LL'.,11 Il El o "'J �l J J m 0 HIN � C�w '�'Jl �... N� a�l ill ill � O mua n r, Cn m I`~ N m IN NIN m�V 11m NOJ - �mNV 0 �--I�ON�m V�O � N m',,� Ni vtcanh in llv l.n ©I®©m©©IDIDI©0! I�InIti*i'U+[V�IIv*Il+/)-ll+n1l 11l+nlin mJ O�N ^ Tlool �v�loIN e N m O COD�t�n ONO T ��0N00 N elm lm O�rt�l�n M�O O a ^�T m lO � J IN�agVI IO Nfl N�M � w m N to wI lm�-�- 0 O N �V�I�II�II�II�II� � .� ry m a m +�•�' N m.. O � � D D D t 3 C9 ICA m m m m m m m m m m m m m m m m m'm a0 0 a v acc��ww �pf m 0 0 0 0 0 0 0 0 0 0 0 0 0 > >- >- >I>,,.> > > > N ry l+•m �t In J ry J v a a a,.....a a Q Q a Q¢ a a a oidtdtdtoiota)a)a) m m m m m m m m m m m m m m m m m Cn m m m m m a) a) m m O O O O O O O o O' O O O O O O O i aa'aaaaaa< a as cL a a w w w w w w w w w ©©1©1©1©1©®1©1©1©mmm1E! ilmm. > > > > > > M V l>I1 Q ry aN (D to ,>-� N M V a. a a a C7 C7 a a a a a � < < ¢ a ¢ a ¢ a ¢ ¢ a a U V U U U U U U U V... m m m as ' of of at at at at of m ae m m m m m m m m m m m m caw an m m m m m m m m m m m m law m m m m r9a m m m m m m m m aew cn O O O �r^Y 0 0 0 C3 0 0 a 0 ¢ 0 a0 ¢ 0 0 0 Oice. ¢aaaaa F- a a a ri. a a a a a a L a c. w w w W, w w w w w w w w w ua m mt m rsw m -M rmpu mm c*w m m m m m. eau aat ati, m m m m m mmmmm mm2mmmmmm mmmmm m on 0) � m a w an of m � m m m �a cOn m cra m atr m amaw m m ea) gq� Cory 0 0 [' 6 BOO �8 OO O O O 0 F awn P R i!O"'1 m G. ' i7 i 0 0 O G.7 �O} 0 00 G C3 R7 O O c O O MnA t' CAP �'r m m. O O k'O t':� O' j O 8 ari In L trb' O O Cw o o o o O O, N i L rhY wJi tpY WP1 da"1. wd% O O O O G� Nti f V'i u"8 sn ro m m m` ro O O O OO7 rFmi cmYn m ra to ro to m m m a�i al0i w avi af0i m m m m m af0i a1Oi w af0i v v v v v nn wti vs to m m` as `m m` r`a 1O '� m m } } } } Y m m m m m > > > > } 7w m m m U1 v v v v m m m m m v W N 7/ v v v > } } } K7N qm^y ¢,Tr CbV m, } } Y } } C8Y m a, m CA y > } } } >- N m m m m cl m m c N m V N N 0 m 0 m m {} Rat rl N M V N r-I N M li l M17`� 4F101 e^1 m^1 +w4 .--I uY m m m m Ciw W Ol v UJ v m '-I N m R In .--I N M V In O o � '""� .'. L" > > > > > O C.y Or O 3 - o o a > > rcs o c. C7 Cq ca o o i7 O O CO L7 ak a7. a L"7. C1 r-I M V Vt #'.a J>> J J o cl C7 O 7 7 J J 7 .. i ct y a a a a a o o cs a a a a a a M 0. c 2 0 C ' o c ca a a a LL a Ca to ca ,ra a a a a a co o 0 0 ,n U, u°a ,n „ o 0 0 0 0 7 7 J 1 7 :a qp p o, o. o, wr7 wl to vi o 0 0 0 0 ,.a a- w -a o o o 0 0 7 a ai ai o. ri +.+^, un uv xn ca, o. a o. a, M m `m m `m m ai a aria aa. ta. o. cal cy. `m `ro `m m m` a` ri a` a` ri ao m al v W v N v v 3 .. 3 7 7. m 7 7 v v v v w W U1 v v W 3 m m io is a a a a a xn OE E wE va > } > > > io L m io i- a vt a aaa a ,� N m v In a' a a a a .� N m v an a a a a a .� ry m a ', vt a a a ......aaa a to In In to an Co cn a Q Q¢¢ a¢ a¢¢ o o 0 0 o E E E E E o 0 7 J J 7 7 N va va an In w w va In an Q Q Q Q Q Q Q Q¢¢ »>» U U U U U U U U U U ai d a d a G c c c c 7 7 Z)� 7 D 7 7 7 0 0 0 U U U U U U U ai a > > > > > > > > > > > > > > > > > > > > > > > > > > > >. > > > > > > > > > 0 0 0 O O O O O O O O' O O O O O' O m io io m is O O O 0 0 O O O o o 0', O O O O O O O O O l7 C7 U' C7 U' l7 '.. U' l7 l7 ',,. U V U' l7 l7 U l7 l7 a a a a a a a a a a C7 Uo V' U l7 ( 0 (D 'D 0 l7 l9 U' U' lD U' U' U' 0 U a a .6.a -.a.010� uD achic6.a.60-n�a.6.6.6n6.aaa.6-a-a.6.60�Oc'a-aa60oa.6.6.6.6.6-aaac3.6.6.ac6 O O O O O '.. O O O O O O O O O O O O O O O O O O O 0 0 O O O O O O O O O O O O O O O O O O O O O O O U U U U U V U U U U U U U U U U U V U U U U U U V V U U U V V U V V U U U U U U', U U V U U V U U U a a.a a a a a a a a a a a......a a a a a a a a a m a a a a a a a a a a a m a a a a a a a a a a a 'a a F- FF--s F - F-F- F- F- F F F F F F F- F r F `o o `o 0 0 0 0 0 0—o o o `o c c c c G c c c C C c c c c c c c O O O 0O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O v v vaa-ova v v v v v v v v vvv v v v v v v v v v v v v viv v v v v ¢ ¢ a ¢ ¢ a a Q �¢r� u¢ rr¢� vv vo v ut vw a. r a✓u �n rt� orr na zn un va arw wv uv ren+✓r wn +.�"a uu wx tie'a r✓+ art u+ ^�S. <wE ¢ �" �' � ¢ ¢ Q a Q Q �' •� .� a '� Q ¢ «� a 4 Q ¢ Q ¢ Q ----w W�w-- W IL1 LL LL LL LL LL `�lL„u, µ,.�11NlL�LL LL,LL�11�LL 11 lLtl LL�11 LL ll�j,y www-LL } > > >• Y >Allpll.. ..v v v W v v v v N N v v W N v N W W N v UJ v N WW W W W W W W W W vv v v U1 N Ul v v v v N v U1 d N v N N v Ul `J v v v v �l ''., Il LL LL LL LL LL LL Z Z Z Il l.L M M LL lL lL El Vl O LD m m N M a N m N M a lD W lfl O LD O 00 .--I rI N a LO N n rl N lfl N n r-I .--I '., n a n N Lfl a n N n Ln OO rl a M n m N m 00 W n n '-I DO w n n m ID n o1 N Ln M a n N n V/ 00 �--� a N 00 w ri a M w 't N O m rl rl N a LD N n c-I M rl N N m O O O O rl O O O O .-� .-1 �--� N N O co n w V1 O m W n n am w n n w w n w m O w n w l/1 O m 00 n no M ''.... a Ln N M a Ln rl N m a m N m a N M a N m a rl N M a '... rl N m a N H N m a rl rl N M a rl VT VT if , In V} V} V} VF V? In In Vf V. VT VT to V1 V} In m oo. ro m lc�o .� m ,� o o rl a m m oo aD Ln nm o0 oD a m ,� a oo Ln o rl a oo a m m m ooLn n m ro oa a m .� a oo aIV M a n 00 a O W `I 00 a'...o a rl N m a Lfl LD .-I Ln m O toLn M rl 00 M Ln In rl M LI! rl Ln m Ln LD H Ln m O Ln Ln m rl OO lD 00 O O a LD 00 N a 7 LD OO M M w w o H H H r-I e-1 N N N m a a N N m a m .--I r-I rl a --I '-1 r-I .-I rl rl fV N N m a .-iM a LD rl Rl a Ln N m a Ln rl N M a LD H N M a Ln �--� N M a Ln N m a Ln N M a Ln M a m rl N M a Ln rl V1 ..�.. V} Ln v1 V? VT VT VT In 'n VT l.1n /n v1 Vl. V? VT VL VT Vl. VT VT Vl Vl VT VT VD VT 'n V) Vl Vl 'n V1 V1 'n V1 } } } } Y'..,}.,} } } } } } } Y Y } } } } r } } r } } r } } r } .r-I N m a,.M e}-1 N M a er-I N M Y}} .--I N M a ul .--I N m a a --I N M a Ln r1 N m a Ln c-I N M a Ln N M J 2 2 2 2 2 Co l7 Uo U9 C9 a a a a a 0 0 0 l7 (D a a a a a J J (� l7 l7 C7 C7 a a a a a C7 a a a F- ut in ut vi Ln vi In In In a a a Q a a Q Q Q Q a a a a a F- , F- F- F- Ln ut vi ut Ln In In ut Q D_ ¢ a a a a a D_ 7 ����� U.0 U U U U U U U.0 a O_ a a a D_ a a a 0 0) of of of of m of of of of of of of of of m of of of m of of of of of of of of of of of of of of oa f m of of of o m m of m O o 0 0 m m m m m m m m m m m m m m m m m m m m m m'm m m m m m of m'm m m m m m m Ol m m m m m m m m'm m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m a r r r r e r r r r aaaa a aaaa aaaa a a a a a¢ aaaaa a a a aaa n o o o 0'0 a o o o o o 0 0 0 0 0 0 0 o o o 0 o 0 0 0 0 0 Cl 0 0 0 0 0 0,0 0 0 0 0 0 0 0 0'0 0 0 0 0 a s<< a a¢ a< a «<< a< a a a a< a<< a a « a<< a a<<< a a<<< a a< a a a<< D_ D_ a s a a d a a d a d d d d a d a D_ m a m m a a m a a a a a a a a a a d a d d a o a m m a m m o_ F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- H F- F- F- F- F- F- F- H F- F- w w w w w w w w w w w m m.....ol m m mmm mmmmm mmmmmm mm mmmmm m m of m m m m m m m m m m m m m m m m m m m m m m m m m m m � r m m m m m .O1-1 °rl' ti v..v..v a v m a a a o m m m m m �v v v v v m m m m m m m m m m o 0 o o o o o o o O o o o o o m m m m m O O O O O C o o 1 �� o o o 0 o 0 0 0 0 o O o o O o v a a a a o 0 o o o 0 0 0 0 o o o o o O O o o c c O o 0 o 0 o o 0 0 0 0 o o c c c c c rl r-1 rl O O o o o O O O O o O o o o O N N N N N 0 o o o 0 0 c c c 0 ti rl rl rl , N N N N 0 0 0 0 0 N N N N N m m m m m m m O O O O O m m m m m m m m m m la 0 0 0 0 0 m m m m m 'p LO la m w Ol N e-I a -I c-1 .--I '-I w t0 w w lO (0 0] f0 f0 N N W W N m m m m m N Ol N aJ N m can) m m N N N Ol O) N N N N N m m m m m N W N W OJ m r r} m m m mm }...r r}} m m coy)) m m y}}}}} r r r} m m m m m}} r r} a m a In w m `m `m `a) , r+ rl rl rl a a a a a rl N m a Ln `m `m `m `nl m a v a a a n N N N N N '-I N M a Ln .-I N m a Ln Ol - aJ Ol - rl N m a Ln o o o }}}}} o 0 0 0 0 o 0 0 0 0 C }}} r r O O O O O O O O j 7 j j j C O O C O j j j j j O O O O O O O O O O .-i N M a Ln `ti N m a Ln 0 0 0 0 0 O 0 0 0 0 0 0 0 0 0 o a a a a a a a a a a a a a �- a s o. a a a t r r r r o 0 0 0 0 0 0 0 0 o m M a n r r r r o 0 0 0 0 0'0 0 0 0 7 7 7 O O O O O rl rl rl !-I rl O O O O '. O N N N N N O O O O O 7 7 7 7 7 O O O O O N N N N N VI Vl N a a a a a to M O. O. a s Cl o. a a a a `m `m m `m `m a a a a a m m m m ro d a d a d a a a a o. m `m `m `m `m a a d d a m 7 7 7 7 7 7 J J al 01 OJ W N Ol aJ N OJ QJ 7 J 7 7 J J 7 7 7 7 N al Ol Ol N Ol a a g Ln '..... Ln Ln Ln w} r r}} m m m is m} r r }} m i0 m m m d g g a s ut Ln vl vl vl }}}} } m m m m m} 0 0 o E E E E E r N m a Ln a a a a a rl N m a m a a a a a o 0 0 0 o E E E E E rl N l m a Ln aaa a a H 7 7 7 7 7 VI o o Vl Vl to V) VI In N a a Q Q a a a a a a 7 7 7 7 7 VI to ''... Vl N VI V7 N m Vl N Q a a a C C C C C z) z)z) -D D z) D U U U U U U U U U U a a a a a C C C C C Dz) D z) z) D z) D=1 z) 1) f0 fO 10 f0 (a IO IO IO > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > O O O O o O O O O O O o o O O O o o O O r O O m � m m la m O O O O O O O O O O O a a a a a a a a l7 (D I U l7 l7 LD l7 (D 0 (D 0 (D 0 0 0 0 0 0 0 U a a a a a a a a a a (D LD 17 (D l7 0 0 0 U u u co 06 06 06 o3 03 0b 0a oil 06 ',06 06 03 03 03 as 0' ab 06 06 06 co 06 o3 aa a'a co 06 06 06 03 a3 03 04 04 0a 06 06 a2f ail '.0b 06 0 0� 0 ' 0a 0 co co 7 7 7 7 7 7 7 7 7 7 7 7 '... 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 ''... 7 7 7 7 7 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u a a a m a a a a D_ a a a a a a m o_ a a m m a a a a a a a a a a a D_ a a a a a o_ a a a a a a a D_ a s F- F- I F- F- I I F- '.... F- F- ' I F- I I I F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- I I F- I F- F- IF- w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w 0 0 0 0 0 0 o O o 0 0 0 0 0 0 0 0 0 0 0 0 o O o 0 0 0 0 0 o O o 0 0 0 0 0 0 0 0 0 0 0 o O o 0 0 0 C C C C C C C vaVaO1 vaVaOI vaNaO vaMaO aaaO IvatOo vaN va vaC vaVC1 vaVC1 vaC vaC vaC vaC vaC vaC vato vaN vaN va vaVI vato vVaCl vVaCl �MaaC vQamO vataCo �aNa vaVa1 vaVa1 vaNa vVaa1 vaVaf vaVa1 vaatCo vQtaCo aaato vaVaI vaa[n vaVal vaNaC aaVal aatao C O o Oo vtaaOCo vaVaOCl vaaOO O O O O O O O O O O O OO O O O O O O O O O O O O O O VCI a a aaa aaa aa a a aaa a a a aa s aaaaaaa a aa a a a a a a aa a aa Q a a a a a ar m m m m m v v m ar m m w v ala, ar '..... m m ar > l v a, w w w w m v w v>>> m w m m m m a m w> m ar ar w m v w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w m y ar v v v m w m v v v '. v v m v m v m a v ar a m ar v m v a v m v v v m w m w ar a w m m v a v ar v v 11 LZ LZ IA•. LL LTlL Il LL lL LZ LL LL LZ LZ LL LL LL LZ LZ lL LZ LL LL a_ LZ LZ LL lL Il E LT LT LZ LL lL a:LL LZ M LL LELL LZ LZLZ El O m H 00 ''.. 00 l!w o m V n N m m tll ,D .--I m ti w o m m M lD ci m ID lO lD N a --I 00 00 Vw . M 0...0 rn m .1 oo W '... o ,/1 m V n N .-+ m m N w m 00 n lfl .� O N O m '-I ,n M N O o M r+, V v T m V .-+ o..m o M V v m m m H N .� o .� o ao .-i m M ci ri N r` ID m V o c-I o N 00 N 00 m oo V V o N a0 N ao m 0o ITati r- m n N ri w M I o of ati H r\ N n M w CT o e-I 0 N 00 N 06 M w V O �-1 O N Ol '.. N oo m a0 ti ,-i N O M O '.. v O,n 7 N CM)O T V C2 '.... O N Ol N 00 M Oo V in V� ae"H. cn +n u* u* in'n .n'.....in +n vw v>• 00 n N OO I M N N M w ID N N m O V n N 00 C W n N OO � M N N M m lD In O ID LD ri m lD N m '.. -i M� Ln n O m V In W r-I m '', lD N W .--I m lD N m '-I T V L!1 M .-1 V lD n m a) V a -I 00 o0 'R o .--I lD n R '-I ID W 00 V O .--I N N ID c-I to V O lD lD n N M m N M V V7 r e-I M N M� M rn In V m N m M V lf) Ifl 00 N N M M N m Ll'I H N ti N m M N V M V1 N .--I MN N m't m V N ,n N c-I M '., N T M a '., R Lrl In N-t a -I N R M W I 00 In ',. 7 N M tD V 00 ,n 00 M N M m- V N Ln VT VT U! YYw do vA V} N M'a>T Lu" r r N > m r a n r',� J',.m">7' CCCC ti.........N M, T Vrl r e-I r N r m r r M c4 r M, r r r V7 r .ti r N r M r> v,,, In r >,r r r r r r < Q Q+ < a a. a. a Q¢¢ o_ a a Q J J J G G V' (:) (7 (7 O Cl O_ Cl a a .�N........Ja J..". U U k.i y U U U U U a D_ a a a o_ a o_ a a H o_ f- o_ i-- tc. N- Ir D� s, rn rn yr yr rn rn yr U rn rn yr a r,,,� aa,, C,A pT U a U ¢H-- U U U U U U m m m m aaa an m m alit m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m M at m m m m m m m m m m m m m m o_ m m CL m a m o_ m a m c, m p. raw a .. m �9- m 9 M, m a m ct at m +d +v m'.m ^wt a m v m v m a m v m v m v m v m v m a m v m sr m m art m m..m v v a m v m v m..,m ct v m v m v m v m m aw m m m m m m m m m m m m....m m '.. m m m m m m m m m m m m m m m m m M, m m m m m m mim.. m oocalca 700000000000a o00000000000'c>000000000000aao n n n n n 'o n n n n Dam M m...m m m m m m m m m m m m m m m a a¢¢ r¢¢ a a a '', a a a a a a a ¢ a a¢ a a¢¢ a a 5 5 ¢ a¢ aaaa < a a a a w D_ w cs a D,� a a f- m f- a F- m f- a H M m H a f- M F- D_ '. f- m � m m m m '. H d M a f- a f- a f- a o a t a D a d a ri d a D_ D_ a a d D_ knk- sµ.w. cL D hcL w r of w w w w w w w w w w w w w uj aad w w w W w w w w w w w w w w ww.w w w,w iw w cxp m m m 01'r Y m m m m m m m 41 m m m m m m m yTe m mm mm m m m m m m m m m m m m aml nnnn amw Oml dm't nnnr+nnmmmmm V V � V m m m as m Rm1 ^p iP *�.s m Omw vv T 3 mstiamOvmmmctaamacnm E 1mFb amw aau mmmra, '', m m raw m m. n n n n . n m m m ctw m oa ooar o C? '''oor c a � v 0 tiS �? n oa � to a o oo 0 0 0 0 m m m 7 m m o an rr uw; a an ra ww o ua O '^ o vw rr u°t o ut 0 vw 0 o 0 o 0 ca ca 0 o ci cro cro rs +o w to �i o ana a7 vi ca sn u a~k c r. ur a. Ln n taw n o ca �' o o 6 m m m m m m m m r`0 ra ry `m v v a w w o cl " C5 m m m m m r`o `m m` m' c¢w smrt rn m ra r`o r`a m` w"ti ,mmm ,ma,,.. v °1 r a, r> a, m r ar r r r r r r `n `m vw io ar ua ua m m v v m v m a m v> v v r v r v r v r m m m m ¢tit m m rn m m af0i r> a1Oi c`0i r a`0i af0i v r w r v r v r> v n c"n., I n oo r+ n n > > > a > rn > .� ry a m v m m ar ro aJ r`o r`o v ar n n n n n o .� N m v vw crr a m m o m o .� ry m .. r a r N m a rn C>iiii r`o ro m` `ro r`o ca ea a a a a a n o rz a cx ocrr>rMoD ca N m v n c7 aa, C 7 7 7 7 7 o o a as o N m v n r an coca vw urt ara o 0 0 0 0 ca c 7 aa. o, o ai o ra as m cti, m ca � o m a o 0 o 0 o as 0 o N n wmi n r,n ui vi a'aaaa o 0 0 0 0 a eta. "0 'o r`c ra o) ro a . a` ''. a` a` a un wn vw rrw un [rm`a. � a Q. is m` `m `m a` a a` a a m `m n m n m` n m a a a a` a vu sra -7 ara uro rn ei cc o aa. v r a r> v m r m a io io a io m >>>>> a s a a a cn.. o vo s va '7 ufr m m r r> m m r a, r m m io ''. m m> i i> m io i0 io io 7 a 7 a 7 a 7 a 7 a cx un cx +i ca o. ca ry Q¢ m a ,n a Q¢ ',, a Q Q a Q a Q o o o o o E 7 E 7 E 7 E E 7 7 '-' "' VI Vl m Vl y M `n to a to a VI a N a Vf a m `-' Q ^r Q m Q a a ,n a a a a a a Q¢ a s a o •- 0 •- 0 .- 0 •- o .- E E E E E V U U U U U U U U a a a a a C C C C C '.� � z) 7 z) z) z)� z) U U U U U U U U U Ua` a` a Cl 7 C 7 C 7 C 7 C 7 C O u O C7 O O u u O 0 O l7 O l7 O 0 O LD ,a a m a ,c a ,0 a m a m a ro a ,a a m ,o a a O O C7 U O LD O l7 O U O l7 O l7 O l7 O LD O U O U O C7 O 0 O (D '... O U O 0 O U O l7 ''.... O C7 O C7 ,o a m a a a a' a a 0o co 06 co ab 00 00 a o0 0o ao 00 0o co co oil oo eo 00 00 0o co co 00 ca o0 00 00 0o co 00 00 00 'oo co ', 0 00 ', 0 00 00 00 ''., 0 o0 00 00 00 00 '..... 0 'oO a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a m la a a a v '.m '.v ''....v -o a a a a m O O O O O O O O O O O O O O O O O O ". O O O O O O O O O O O O O O O U U U U U U U U V U U .'.....Q. U U U U U U .'.m U V U U U U U U V U U U U U U U U U U U U U U U U V U U U U U U '.. a a a m a a a a a '.... a s a a a a a a a a a a a a s a a s a a a a m a a a a a a a a a s a ....,. a a a a ....... O O O O O O O O O O O O 2 O O O O O O O O O O O O O O O O O O O O O O O O C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C —O C C C C C C C C C O C O O O O O O O O O O O O O O O O O O O O O O O O o O O O O O O O O o O O O O O O O O '.. O O O O O O C O C O C O C O vv'vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv�vvvvavvvvvv ¢ aaa ¢ a a a a Q a a a a a a a s a a a a a a a a a a a a a a a a a a a a a a a a Q¢ v a a a a a a a a a a a a a a¢¢¢¢ a a la a a a a a a a a a a a a ¢aaa a a a a Q vw aaa c+ro sra ww a uro un an an an ! v R15 un cra 0n wn m an esr vv uw to �ro vs w yr ,n yr > » > » > > > > » M > > > > > » » > > > > > a » �e¢a > > » >>aaa ¢ Q¢ Q¢ a a¢ Q Q.Q Q Q¢¢¢¢ a Q Q a a,¢ Q¢ a ¢aaa ¢ Q Q a vvv v a a a v v a a a>, >v a>, 1> 1> 1> v v a a a v >v v v v> a> v > v a >> v >a >a >v a v v v > a > , LL 11 lL LL LL LL LL LL lz ".LL JIT 11 iz LL LL T iz 11 LL LL LL LL 11 LL ll 11 lL LL 11 LL w Il Il 11 11 LL LL 11 MLL ll M LL 1.1. 11 LL Il LL L3., El 00 In O O c-I M O M C m 00 M M ID O I� m W1� I\ m u1 N W CD N C N O 00 M M lD O m n w n M m li l w r 4 N N H'-I 00 Ill N O M V Vl M Vl M I- N n N m �"� m O M m M N I� wC m C M V1 m 1� N N m rl m O m V tD 1� w u1 O O O m 00 W r-I r-I O O O m 1� to M N m 00 lD Ill m M Op lD Ill C M n Ill M N m I� m m N m 00 to Ill M m 6 C N O m I� Ill C M C H N m C m 4 N M C N M C H N M C ci N M C H N m C rl N '... m N m C H N m VT lA Vl. V7VI VI V} VT''...1/} VT V} V). V} VI V} VI V? V} V) VI VI VI V V) V} V VI VI VI 'n VT...i/1 w VY VT VT 'A V} V) L! V} VI m '-1 7 lD I� m .-1 00 C .--I I� r-I ri 00 In N O M C Vl N O C lD 00 00 Il1 C m C 00 N c-I '-I rl M '-I N m C N m m L! m m O N o. m D Vl o W _4 C ID 00 O 0o N� H e M ei N m C O m o0 C `~ oo N N m IZt oo m 00 1 N o M V Ill d V m Ill m 0D M M o N In M C Vl N V C lD 00 0 0 m 00 00 ti �'-� O O O m e-I O O q IO O m 00 W O O m 00 00 rI H o 0 0 0 m 00 I� LD Co o m m .--I N M C Ill H N M C Vl �--� N N m C �--� N m C u1 N M C In N N m C N N N M C �--� N m C Ill c-1 �"� N '.. m y .� N N m aAVT V'w VF VLVI VF in V} VI. V? V} VF.''... VT VT V} VI VT VT'n 4 V}..,VT VI 'A Vt Vb'A V? VT L1 V1..,. Vl IN N....V lj, Vl VI VI lA V} t4 1^ V. VY in y >. r r Y} Y Y}} } Y Y Y r r r r Y }} Y Y Y} Y Y}} r> Y r r r r Y Y r}} Y r r .c--i N mc C Icll .-1 N m C vl .}-I N m C Im .-I N m C Vl ci N M C 111 '-1 N M C m rl N M C ul J J m J J c G L l7 L7 U l:J U d d d d d (� l7 l:J l:J d d d LL d< (� <<< d d LL d d J L G In of vl In to vl vl vl In vl Q Q a a Q Q Q Q Q l/1 N Vl Vl Vl VI (/1 Vl Vf Vl Q Q Q Q Q Q Q a a Q d d LL d d H F^- H ♦- H U U U U U V U U U 7 7 7 � U U U U V U U V U U d d d d a d c. d d d 7 7 O 7 O O + + + + + + + + + of m m m of m of of m m m m m m of of m of of of of m m m m.of m m of m of of m m m m m of of 0 o O o O o o o 0 m a)a) m m m m m m m m m m m m m mom m m m m m m m m m m m m m m m m m m m m m m 0 0 o 0 0 0 o 0 o m m m m m m m m m mmmmm rnlOm m m m m m m m m m Co m m m m m m m m m m o o O O O o 0 oO o m m m m m m m m m m m m m m m m m m m m m m m m m m Div m m m m m m m m m m m m m o o o o 0 0 0 0 0 O O O O o O O O O O 6, ci e-1 '-I .--I .--I '-I '.., .--I .-I '-1 e-I .--I .-i c-I .i .--I c-I c-I .--I c-I H .--I .--I _4 H .--I .-i ei r-I N N N N N N N N N a a a a a a a a a a a a a a'a a a¢ a a a a a a a a< a a a a a a a¢< a a a a a a a a a a a a a CL LL LL LL LL LL L1 Ll LL d [L d LL LL d 0L LL d LL LL LL Ll L LL li LL LS,.. d d LL LL LL LL d d LL d ti LL tl L1 Ll �- CL LL LL Ll LL LL H H H H H H F H f- F- F H ♦- f- F- H f- F- F H H H H ♦- F- H I^, H ♦- F- H H f- F- H H w w w w w w w w w w w w w w w w w w w w w '. w w w w. w w. w w w .w w w ...... w w .w w w w w. w. w w w w w w w w w w~~~~ w~~ j M m mmlal m m m..m m m m m m m m m m''.m m m m m m m m m m m m m m m m m mm m m m m m m m m m m m m m m m m m m m m m m m m m m Cl) m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m '.m m m m m 0 0 00.0 0 0o.0 ` m m m m m o 0 0 0 0 o o o o 0000 0 00001000o00o7ry V -r 1' 00000 0000 o o 0 0'0 0 0 0 0 0 0 0 c 0 0 0 0 0 0 0 o o 0 0 0 0 o o o 0 o o 0 o m m m m m o 0 0 0 0 o o o o m m m m m y i y„� c c 0 0 0 m m m m o 0 0 0 o m m m m m H L ` ` e-I N N N ` m m m m m m m m m m o o 0 0 o m m m m m m m m m m fO .. t0 (p m m m m m Ip ry 0] N f0 O O O O O m m m m m.. 10 N f0 f0 f0 (0 0] m m m m m 0/ ... w m m m m m 01 w o w w 0J 01 N 01 - a-1 a -I c-I c-I N m m m m m N Ol 01 Ol 0) 01 01 01 OJ m m m m m r> Y.r > r Y r> r�����} Y Y r r H� �'� � Y r >- >- Y+++++ r r r Y m m m m m t N m C l N N N O N O O O O O e N M C l o O o O O N m C c-I N M C Ill O O O O O '-I N M C N N N Ol 01 01 0 0 0 0 0 0 o o 0 o N tf m'r r}} rlr } 0 0 0 o o o o 0 0 0 O O O o o j j j j j C c C 0 0 j j j j j O O O O o �..� N m C c 0 0 0 c 3 3 J j c o Cl0 0 j j j n 0 0 0 o o a a a a a o o 0 0 o o o o o o o o o 0 o a a a a a aaaa o.,o 0 0 oa am a.. Iri vi ui vi Iri 0 0 0 0 o :3 D a a. a 1' o o o o 0 0 0 0 0 0 0 0 0 n^ n n n O O O O O . 4 H c-I - O O O O O 7 7 J 7 7 p p p O O r1 c-I .-I .--I '-I O O O O O N N N N N O O O O . ut Vl Vl Vl N a a a a a �. I0 Ip 10 I0 ry d d d LL d Ip ry N N ry d d d LL d a s Cl a. a., t0 f0 f0 01 ry d d d LL d 1p f0 N l0 f0 d d d d 01 QI 01 Ol Ol Ol 0) Ol 01 OJ '.....r > Y r......} m m m m f0la aaa a In vl In In In >. >- >. > r m m N m v m a a a a a N m v In a a a a d o 0 0 0 o E E E E E N m -4 In a s n a s N M I In a o- a s In In vl In In vl cn ut on en Q Q Q Q Q Q a a Q Q. ' ' L 7 J 7 7 7 ut In vl '..... In In In vl vl ''... ut In Q Q Q Q Q Q Q Q a n z)� 7 7 z)7 7�� U U V 0 0 0 U V U U a a a ` c c c c c>>>>>>>>>> U V U V U U V U U > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > co coo O O O O O O O O O O O O O O O O O O m O m m m O O O O O co O O O O co co O O O O (D(7 (D 0 (7 (7 U' U' U' 0 U (7 (7 (7 l7 V' (7 U' U' t '..a a a a a a a a '..a a U (7 (D (J (7 0 (D V' (9 0 (7 (7 (D 0 (7 (D (7 (7 0 aaaaaaa aaobco0coaaaaaaaaoilaaaaaaaaaaczcaaaaaaaaaaaaaaaa O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O U U U U U U U U U V U U V U U U U U U U U U U U V U U U U U U U U U U V U U U U U U U U U V U U U d d LL LL d d d d LL d d LL LL LL d d d CL d LL m d'.LL d d d d LL d d LL d d d LL d d d LL d d LL d d LL d d LL LL t-� F r � F- r� f -r - -� rr r� r--r F ��f- r w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 o—o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O v v v v v v v m v v v v v v v v v v v v v a v v v v v v v v v v v v v v v v v v v v v v v v v a Q Q a a a Q a a a Q Q a aaaa a Q Q a a a a a a a a a a a Q a a a a a a a a a Q a Q a Q a a a > > > > > > > > > > > > > > > > > > > > >'> > > > > > > > > > > > > > > > > > >'> > > Q a a a Q a a a a Q a a a s a a a a a a a a Q a a Q a a Q a a Q a a a Q Q a Q Q Q a a a a a a a a\\\\\ a a a a a a a s Q a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a aaaa 'a'' a, w m ar w ar w a w m m w m m ar v m m ar v ar v a, 5 a, m m ar ar v w w w v m w m m w ar v v v a m a, m v w w w w w w'. w., w w w ww'w w w w..'..w w Il LL v LL v LL I 11 IL 11 LL 1, m 11 LL LL ll 11 I1 w 11 11 LL LL 11 11 ll 11 11 LL LL 11 11 LL 11 LL LL LL LL 11 11 LL ` LL LL I1 LL LL LL LL LL 11 11 El NjN n�in VYw.i^�in a�^i�0 °iw�aCry o rn^� �NCNN m n � � om�wll m �,Z"o�w�in w m � w�m m n °.-i° N�OMm� ,.-ill m�mo1 Lo co. I..^ v N M c N m a ti rq m e . N m v n v m w m n Ln o n v n Ln o n v n v m w m n v mm w m n in o rl .1 N m ci N N m a1 N �--I � I lj� I �ntl �^p III In III^ III 'AI n -lm� YRoo�r-A-ZTP N�w� MI'nl� O��O NI,,,m T - mII NIl m� I. oo w N o�oo IIIN ml m�a) oo �l fmv mll cn oo 'D M o�mll oo W ry o oo 0o .��....M r r r r'r rr r',r r rr>>->•>,�rv,mv�nrrrr> rrrrr rrr�-a• J j z w N m v n v m a m ry m a r'� r r r r r r r N m ern r>> r r D L9 l7 l7 (D a. a a a a ,-r N m v m N J J G:7 'r..7 U C�7 CN7 a a a C7 C7 C7 l7 l7 cs. ,. a a a Q a a ca, a F H H H H m an an m urq urti of �n Q Q Q Q Q V a a a a a a a 7 .. �a �� 7 u U U u '.... U L.A R.l f..b u U a a a d d a d a ti c. + + + + + + + + + + + + + + + + •t •w + + + o O o O O o O O O O o o o O O O O O Ol Ol Ol Ol Ol wFM Wry'b STq Ol Ol Ol Ol Ol Ol Ol Ol Ol q4 p'p ''.., �SY C11 Ol Ol Ol Ol 41 0 0 o c ca a 0 0 0 0 0 0 0 0 0 0 0 0 v v v v v rr �r c v v a v v v v v a x �r c .r v v v v v O O O qq O O O O O O O O O O O O O o 0 0 N N N N N N N ITJr N N N N N N N 0 0 0 CJ O O o O O O O O O O O O" O O O O O C7 O O O O O O O O OO R'� CS 00o OOo88000000000 'oo000000o0 o0000000 oc.>oS ryaoo000 N N N N N N N N N N N N N N 0 0 0 0 0 1 O O 0 0 0 0 O O O O O O O ` O 0 0 0 0 aaas ¢¢,¢''aaaaaa¢Q <t S ¢¢'¢uuuuuwy ruuc5uuuuuuuu svuut�u CL w w.w w w w w w.w w.w w w w w w w w w......w a s aa„ a s an... a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a[ w w w w.w rn rn m m m v a v O1a v a a v v v N N N N N N M n7 N la N fV N N N ¢ } M } + �, O O O (n + it + # > > r > > CO7 o O q C3gq., '., m V V7 '~ N m V VI m }11 fa m !a ''.. O o b C}" 40' 7 �W '" O rY^.3 01 o) Cl cA Ol.,. �k O yy }1 �r u v v v v v 3 0 as o �o as cy , m v Ln a Oo CAO 4;7 R".9 „"M N N N N N rw crya' o o ca o o 0 o cr >> 'k: N N ` N o 0 0 0 o ca 'a 0 t ro `m oo cod `m m` m ra a a a a a vb ,ri m a m rL ctary rx aJ v m v v `m m m `m m ea.. cL ct � cw `m a r r r r r N N N v v v v v v v v v v >>>>>>> a o v > r> r r r r r r r> m o m m w m n> .ti N m V Ln A `m `m m `m -� } �^ }+ ,� N m v a a a a a a a a ",... a s v v v v v o o o ca ti ^' m T M o o o o o E E E E E `~ ca o o Q Q Q Q Q Q Q Q Q Q 3 0>> E 0 0 Ka ca o ,y N m v m c ca .a > j u u u u u u u u u u a a A a` a c c c c c r' or a a a a a > > > > > > > > > > > o ct ca zx wn wry vu Vr 0 o �0 0 ��,aa �N �N N N �� o a O o o (7 V (7 l7 C7 l7 l7 (o as 0 m E m m m io m m m m p a ca �a cL aa., 0. � C7 a a a a a a a a a d' oo a za a� 0. 0, ra r`o r`a io (`o a` a a` a a o� a7J oil a'J o7J o21 07$ 03 ob e� o� oiS oil o� --6 06 chi -6 -6 oil o7i v v v v v `� d a d a d a Cn w✓ Wn VI VI > r w w r - fa N ,0 (a wa"t 4n ll'p kn VJp VY h 0 0 0 0 o E E E E E N m v n a a a a a n M e w¢ d Q > > > > > w✓a vi m v) m m an .? u>>>>> z) z) Z) U > > > > > > > > > > > t r Y N L L aL-+ L aL-i y t N t L Y Y t t Y r Y o m m io N io ro io m io io w a d a a a a s a'a a uo 0(D(D 0 0 0 �7 0 3 3 3 3 3' 3 3 3 3 31,3 3 3 3 '3 3 3 3 3 3 3 oil o7J oii a 03 a'J o6 ob oil 03 03 0 a3 od 0 a'J ob 0 .6 a 0 a a a a a a a a a a a a a a a a a a a m a a a a a a a a a a a a a a a a a a a a a > > > > > > > > 5 > > > > > > o'a o 0 0 0 0 0 0 0 0 0 0 0 0 o to o 0 o a 0 0 0 0 2.2 0 0 0 0 0 0 0 0 0 _0 0 o o o o u u u u u u u u u u u u u u u u u u u''u u a a a a a a a a a a a a'a a a a as a a a o 0 0 0 0 0 0 0 0 0 0 0 0 0.......0 0 0 o o o o H H F f- H H H H H H t- H H r H I--i- H H H •� � �� •� •� .0 � 'c .c am w w w w w w w w w w w w w w w w w w w w w w ar v w v w v ai OO O O O O O O O O w O O O O O O O O w O > > > > >> > > > > > > > > > > > > > > > a/ `1 v d v v d v L1 N 22 2. v 22 `1 d v `1 aJ C C C C C C C C C C C C C C C C C C C C C o-v w a, v w v v w v v v v w a a a s a a d a d a a a a a a a a a a d 0 0 00 0 0 0 0 0 0 0 0 o 0 0 0 0 0 0 0 0.... Q Q Q Q Q Q Q R Q Q Q Q Q Q Q Q Q Q Q Q Q L L L L L L L L L L L L L L L L L L L L L 4�'d in 4ti xY1 a�ryV7OVA,Q Q Q Q Q Q cG Q Q E E E E E E E E E E E E E E E E E E E E E +$ ±S Q +�. Q Q Q Q Q Q Q @. w w w wul w w w w w w w w w w w w ww - w w w m V N m � V N N N . �i '-1 c-1 v v v v v v v v v v v l y v v l y v v v v v v v v v v v v v v v v v v v a v a _ � 1 � 6 LL I1 LL LL '.. 11 LL LL 11 w LL LL LL lL LL M1l.. LL 11 LL LL L.L "'., 11 LL jL LL 11 LL Il LL' LL �. 11 11 LL El O O n V O M M lip Owl ONl Oml M lap Owl ONl OMl n '', C O l^p M n V O l^O M ........ N m V w w m V1 m m. m O .! c-1 Iry W w n n ut � '-1 m m w Vl w M m N a c-I m m w w 1p M N O c-I vi o H v l^p w m m w o r- v m w o is d. o ''...-i a w r i o .-i v oo m m o o � a N a o is a v w w m a a w w m v N v 1� V w N w H n w N N N w w" N N N w w N w r1 n w N w rl n w N 1, N w Ln o� w m Vl O V m a m O V m V m o VT In VT Vk VI V4 VA V# V'F u"b I^ VT L1.... V} V? 'A 'A V! Vn VT NA 46 V} V). V} to V} VT VY V) Vv n v). N.. VY Vf V} V} VT V} +A N in Vl. VT o m N V N m m W w 00 w .ti ci ci N V '-1 m m N V I .--I Vl m 00 w N '.. e-I r1 m o0 o C m w w m a m w w Ln r m 00 m w oo w m .� r, Lq� o Ln r, Ln o� oa w Ln m� oo w Ln m .� r,o in oo n n w� a oo in ry m a oo � ry m oo n 1� w m m W w N I, N M . w N '... 1, 01 m o0 4 V m m w c-I V N V1 w N N m m .--I V1 m N V o0 V O N-,t w't N O m Ln m .-1 m w m w m e-I r, V m w N Q m w N w m w m A w m w w H r� V m w N N m Ln N �'-� w ''. c-I e-I w N N w N rl w c-1 N N oo N w N '-1 w e-1 N o0 N c-I N V} V} VT V1 V1 Vl v' v0 VT VT V} V)- V1 V} V} iA V1 Vn VT VT Lltn V?......,VT V} 'A VF V} V) N VT Vti N V1 VT V} V} VT N VA VT Vn VT.. VT Vn In 'A Vl. Vn Y r N r} M I m y}M} Y} Y TN M} YV N V}Ma v NLL Q 7 0 d D d 1dJ cC cc cc cc cc d a L a 7 .V}D_ cc.}H-I G < < < < Q Q Q Q LJ dH 'V} < <QQ Q 0Y H u u u u u u u u u ua a a a a a>>>>>> u u u u u uu u u u a a d,dimd)d a v'm m m mmmmm'mmmmmmmmmmmmmmmmmmmm m m m m m'm m m m m m m m m m m m m m m m m m m m m d,d,d m v v d,d,dimmd,d,d)m0)MM0)did, v v v v a v v v v v v v a v a N N 0 0 v 0 v 0 It 0 It 0 v 0 v 0 v v v 0 a 0 v 0 v 0 v 0 v 0 a'v 0 0 v 0 v 0 v 0 v 0 c 0 v 0 v 0 v 0 v 0 v 0 v 0 v 0 v 0 v 0 r a o r o o n o r o o o , o o o o o o o o 0 0 0 0 0 0 0 0 0 o o 0 co 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 oo o 0 o o o o o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 vuuuuuuu( 0 0'0 0 0 0 0 0 uuuuuu(5uuuu(5u(iuuuuuuuuu(iuuuuuuuuuuuuuuuu 0 0 0 0 0'0 0 0 0 0 0 0 0 0 0 0 0 o m 0 o o 0 0 0 0 0 0 0 0 0 a a a aaa amaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaanaaaa w w w.'...w w w w w w,w.w w.W',w w w w w w w w w.'...W w W w w w w w w w w w w w.w ww w w w w'...w w'....w w w w m m m m m m m m m m m m m m m rn m m M m v v v v v m m m m m m m m m m v a g v v a vvv v n n v v N N O O o O o O o O o 0 0 0 0 m m m m m m m m m m o o O V1 o 1n o V1 O O O O O O o O o O O o O O O 1� r Vf N to N '... N N Ln N N ''... N N lV N 1n N m N N N N Vl VI m - - u"I `` V1 w V1 V1 0 0 c-I r-I ` t0 f0 w m v t0 v f0 v O V1 o Ln o Ln o m o m w m N m f0 m m w w w O O m ami ami w r w r afOi Y ami r w r w T T Y T } N N N M N I N M ami r r w r ami T ami r w } w r w r w r w r T r T T r r T m m m m m- N.m a `~ N m a t m, m m m m m m m m ,� ry m v m m m m m ,� N.m a ti ry m a M M w m w ,n v a v v>> �'� n n 3 �,� o o o o o 3 v o a 0 v 0 v 0 v>> o a a a >> a a o a o n o a o a o a .� N m v �n o 0 0 0 o a a a a a o o o 6 o g a a 7 a a a a a a a N g g ,n N N N N ,n N O O'. O O O n a, a a a 0 a C 0 a a 0 O a t a O N m N N m N Ln N O O O O'. O o Vl o Vl o V1 0 o m VI 0 0'. O O O a 7 s 7, a:. 7 a s 7 t o If O a d `m `m `m `m `m a s vi in in `m `m `m `m a a a a a m `m m m m d d o- a` a in m in a s Cl a w w w w w a` a` a` 7 7 7 7 7 a 7 n:. 7 a 7 n: 7 a 7 m w w w w w w w w w w fa m !a fa fa 7 7 7 7 7 7 7 19 m T r } T Y fa 2 ' fo la fa -E d a d d VI V1 VI VI VI r a a a a a Vf Vf a s N m v n a a a a d o o o o o E E E E E N m a a a a a a N m a Ln a a a a a o 0 0 0 0?> aaaa!aaaaaa•-•-'-'-•- 7 7 7 7 7� V n�V,V,� naaaaaaaQaa a a d a u u u u u u u u u u a a a a a c c c c c 7 7 7 » » D u u u u u u u u u > u > LL c c > > O O > O > O > O > O > O > O > O > o > O > o m m m > O > o > O > O > O > O > O > O > O > o > O > O > O > > O O > O > o > O O O m m m m m m m l7 '', 0 (D (9 l7 (7 ''.... (7 0 (7 (7 u l7 a a a o_ a o_ ''.. a a a a 0 u' 0 0 0 u 0 0 0 '., 0 0 0 0 (7 0 0 l7 0 0 0 a a a d a d a 06 ob C6 oil Ob 06 '.... 06 06 of 06 ail a'i oil oD ail C7 o3 06 co ''.. cz 03 ca '.. ail 06 06 06 ab co co a ca 0 � 06 o2i 06 o3 Vl. N a a Vl a Vl a V7 a VI. a V) a¢¢ Vl Ln VI a VI a VI a Vl a VI a Vl a Vl a VI a Vl a Vl a Vl a !2 a VI a VI a 0 a Ln a VI a Vl a Vl a Vf a Vl a VI a Vl a V1 a VI a Vl a Vf V) a a VI a Vf a Vl a VI a V2 a VI a 'n aaaaa Vl N N VI V7 a > > > > > > > > > > > > > > > > > > > > > > >'> > > > > > > > > > > > > > > > > > > > > > > > > > a a''a a a a a a a a a a a a aaaa a a a a a a a a a a a a a a a a Q a Q a a a a a a a a a a a a L L jL L L L L L L L L L L L L L L L L L L q3 mLlL L L L L L L L L:tf L L L L :LlL L L L L L L L L L L L L au L 3 3 3 3 3 3 3 3 3 3 3 mt�L 3 3 3 3 3 3 3 3 3 3 3 3 3 �3 3 3 3 �3 O O u u O u O u O '.. u O u O u O u O '.. u O u O u O u O u O u O u O u O u O u O u O u O u O u O u O u O u O u O u O u O u O u O u 0 '.. u 0 u 0 u 0 u O O u u O u O u O u 0 u 0 u 0 u O u O u o u O u O u O u C C O O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C C O O C O C O C O C O C O C O C O C O C O C O C O c O .CC • C • C • • • •C . C . C • C • C CC • C C C C C C C C C C C C C C'. C C C C C C C C'. C C C C C C C C C C `1 ) m LL a a a m a LL a o_ a` a a n o_ a LL LL a a s a a...a LL a LL a`..o_ a a a a a a s a a m m io m m m m m m m m m m m is m m m m m m m m mNNE m io m m io m m m is m m m m m m m m m m m m m m m w a v w w w w w w a w w w v a w v w w w a w wwvwwwwwvwwwvvwvvwwvww r � F- F-- F- � � t- r � r � � � � � � � t- � � r �����rr���E E E E E E E E''E E E E E E E E E E E E E E E E E E E E'E E EE E E E E',E E E E E EE E E E I W w w W w w l w w w W W w w w w w w w w w w w w w w w w ''.... w w w w w w w w w w w w w w w w w w l w w w w w'' w w w w w w w w'''... w w W W w W W W W w W W w W W w w W W W w W W W W W W W w w W w W w W w w W w W W w w W w w W W w W W 11 LL LL 11 11 LL LL.LL 11 LL LL LL 11 LL I1 11'"LL LL11 11 LL.LL 11 11 LL lL LL I1 I.I.. LL 11 LL 11 lL LL LL11 LL 11 LL LL 11 w.LL LL LL W 11 I1 El '., 00 n n O c-1 W n n '.: ci M Vl M N LD N In N c-I M to ci n a-1 M lO rl n ID N Ill N 1p N to N rl M to ci n m 0o Co W O n 1p In .-I N 1p Vl m to Ip Ill n In c-1 In m to N c-I N N w N a-i N N n Ill rl N m n Vl ci Vl m 1p N .--I N N Io M r-I tb l0 M O N zr V as m N M V O o V n W a m V m W o lO m V V m� m d' n w" w N m w: m N c-I V m mzt N ID Ill O Vl a .--I m ''., m N to N M n O 00 w '-I n w N m m V m W m I-i � Vl w m Vl V r-I m M N ,. 7 to In m m n N W .--I W--I .--I N s•-I ci .-I N .-i '-I s-1 N .--I r-I '... N 'i .-I N �--I '-I N ei .-I e-I '., ati H O ''., N M n O '... e•i V .-I n .--I a V? VT IA. Vl- VI V} Vl V} V}...''t/T In. VT V} In a V} V} V? VT t6 t^ VI 'n V} VT VT 'n V?...,. V1 V} V} V} V} V} VF VA UW CM1 Vf V} V} V} V} V!b V? in vh %A VI .,'.. On t00 Vl W lO 111 0o In n Owl M loo ..'', s-1 CO OD O Vl m M In 7 W lC) Vl Ill n V m M V to 0o l0 In In I� m O O m m O '-I C9 '.., w Ill O I11 o O to H w m In to to .Ln V N V n '... m IT In r-I o m IO I-1 l0 m I!1 m rti ci w t!1 H m to N�* w N w-4t o w N as o In O o Vl M H w to N N-zt '... In o� e-1 w w In m N Ill V O ti ''., CF ad w N O o M li In .-I w In O O as In O a --I In to V N ao In .--I CO w In to �--I m In n rl N N ei I-1 N N e-1 N N N N ei ei N e-I rl e•i N s•-I e-1 e-1 1 O N e-1 In ei cc N '-I N Vl O '-I In r-I w s-1 N N m o O d' w m -zrm O1 N t0 w O N d' V�•' Vl V?....., V1 Vf V} qiA Nb if4 V}.....,in to VI Vl'., {A'$ vC VT VT V} VT V? to VY V}. ry,Pk� Nb iJb de"Y .., 1'}....,Vl tl✓# in %h 'V'4, VT Vf V/", VT VT In VT VT......, VT VT In ih Vn VT V} m }v In e e ec e-I N M Cr rP"'4 } rl N N } },} M V lfl } a-i } N } m } } lf1 N m^ } 111 N } } } m } r 'CC7 M1G1 c-I » N } M } V } M } r } } },'r } r } } Vl ''. m d ®. d 61„ d a}-1 J J J J J ++•-::i^^ eNc e�,' G e C WC 'fl-^ t:i 0 0 0 J H d N d M d C d In d u (7 (7 Q(1 d F a a a N '.. Z) 7 to 7 t/7 4n VI „y 'ie.^tl '.. „' h VI Vl 7 7 Q u a¢ u u a u aaa u u' h.! u u Q U d d d d d d d d d F- d 21. o_ F- d N^^ al.. d VI N Vl ',' Vl Vl N H 7 V1 7 Vl Vl a u a u a u c IC, u aT t'�8 Ol m m a v v N n n m v n m v IN men a n n in cr r. <i4 v r- Cib g r. m m m v v n n n m m m c% m m'...m 01 m Ql m m CT m m m a7'p m 21 m 4M m m m c O m m m Ol m Cil m m m CT m m m m m m m R7 m m m m ��p CI9 cn m m Cil m m m m m m m m rn Ol rn m m Ol m m m m m n& m m Ol m 6P M 000000Qa 0 0 0 0 0 0 0 0 o In 0 00 m o m 0 m 0 m 0 m 0 a) M m 0 o m o &aI m I m 0000ooc m m m m'....m m m'm m � O O O o o 0 0 O O O 0 O 0 o 0 O 0 O 0 O c� O o o O O o O O ro o o 0,0000000 o o o 0 0 0 0 0 09 o c o rc 0 u u u ' u u u u u u r u u u o u u u v u u u a H~~ w~ g. w �y W p 4W C��a W w w w w w w w w L h q w W- ~~~~ w w w w w H w H off- 8- CL� Mh.. d o_ [L N- ur w w �� 4w w w w w w w w w w w w w ant w w m m v m v "It, m m v v m m m m m m mrn m m m m m m m m m m m m m m....,m m m......... n m m n m m C11 m m m om m 0 m 0 m 0 m 0 m m m m m m m m m m m m m m m o r v v n n o o O 0 o O o o 0 0 0 O o o N Co mm Ln N Lon In n In n to m m Oml m Oml Vl In Ion ''', On IOn O O O n O o n In In In In In ` Io m n m n m m Io ra m m ` O O m O O O n` m n m n m ` v-q ` a m v r v� r} v� r r v v r r v r v r v r v r} v v r} v v �^ r n` i a Ia m w a w m m y ro Il a! N m m m '... m m s•-I N M ll) c-1 N M 7 to .--I N m V In m m al al m a! m m m m m m m r} '-1 N r M Y Y In m m 2r e al }} V n I� 7 n V F� V n 7> '*� j 7 m m m m m m m m m m j 3 � � al al .m-I *^# n•d r-p s•-I n v u1 000000 00000aaaalyo..00'ooa.ddaa'CL J O� d Q O a, ci N a. M C' In 00000 od aai. In m m n n 0 0 0 o n rn nv n n m n n n o 0 0 0 0 alga 0 �x ti eri Inlnln nm'addaao,o,a mmmmmaaaaammmmmdaaaa����� .o a VW Vl >> ut 2a o N 0 n n n n n o 0 0 0 0 ` = a. a. WD Ia Ia al IO 1 d d d d n nxl v�r..,. In r� >} r} m m m m m}}> aJ N al al r> aJ m m m m is a a a a O 3 vl, vl 7 In ',', O al r}}} al - N al r m is m m — m} al N N N N m - E E .� N m v In a a a a a .ti N m v In a a a a s o 0 0 0 a o E E E E E `-' N m v Ina a aaa , r N r}} m v n a j J V1 >>>>>>>>> VI Vl V) Vl vl N V1 Vl VI D a u a u a u ¢ u a u a ''. a u u Q u a u a u o- a a a '„"� d: C c c > c c>> Vl N ✓1 N Ln V1 Vl D In �'.. V1 7 In 7) a u Q u a u a u a a o > > > > > >....> > >'.> > > > >......> > > > > > m > >.........> > > > > >> > > > > > u > u > a a 0 (D 0 (9 0 Q 0 0 0 Q 0'0 0 0 0 0'0 Q) (7 (9 '(D 0 0 (9 0 (9 o (7 o (7 o 0 (7 l7 0 () 0 0 0 (9 a a a n- m d m a'm a 'a a m a m m a a o U 0 0 0 l7 0 l7 0 (7 0 (7 0 C9 0 0 0 (D o (7 a (7 ''.(9 0 Q 0 (7 0 (9 o (7 2f o� .6 o6 oz oil w1 oil ob oil c6 ob 06 Q6 I od o6 0 a6 o6 Q6 co 06 a71 0a o6 '.... oil 0 co 63 Q6 o6 Q6 oil Q6 ' ob o6 oil a 0 oil oil o' a co oil '..... Q6 ail 0 06 ^a uw aarrk� �+y w'a an w Mn yr I,+4 wr+ wx„ �y u�r aanr�y yr vsn� un vl va uNq uInp r�rry� arnry rip cvrryry In wr�,rn uuyy vvyy ors o y rra�yy cn aarrt1 ry an am vtryy cn wro vre I�F ¢ < a¢ a ^< a Q = L Y L Y Y L L L Y L L L L L N L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L v v -a -D v v v v o 0 0 0 0 o 0 0 o o o o o 0 0 0 o 0 0 0 0 0 0 0 0 0 0 0 o 0 0 0 0 0 '.. o 0 0 0 0 0 '.. o 0 0 0 0 o o u u u u u''u u u u u''u u'u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u �r o u u' C C O O C'. 27 C O C O C O C 0 C 0 C O C C C O O O c O C O C O C O C O C C O O C o C 0 C O C O C O l C 0 C O C C c O O O C O C C: O O l C a C O C O C O C O C O C O C O C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C O C O C O OO C 'C O O 0 C N W > > a7 > QI > al > al > al > al > al > a1 a) al > > > al > al > N > al > QI > N N > > a) > al > al > al > N > al > O1 > N aJ N > > > a) '., > N al > > al > QI > a! > W > a1 > aJ > a/ > al > aJ > a) > C al > N > ttiN C O1 C al aJ d d d d d d 1 d `1 d v d W W ti �. LJ d `1 d `1 d N ti `1 d `1 d v d N `1 `1 d d d `J d `1 N d d `1 d v d ` d `1 d '.. `J v d N d d > > > o m m m m m m io m m m m m m m m is m m ', m m m m m m m m m �. io io m m m m m io m m m io m m is m is m m m '' L L L L L L F- H F- F- F F- F- F- F- F- H F- F- F- F- F- F- F- F- F- F- F- F- F® F- F- F- F- F- F- F--IF-IF- F- F- F- !- F- F- '', F- H F- H F- F- ' H H I da f6 Ya f0 fa al al f0 al M m al m al m 4V} A a] fa •f0 .!0 .(0 .f0 .fa ''., fa N IO .� %I .fp •Ip .f0 'IO '','N = = =a1 al a] fa to = = : E E E E,E E E E E E E E E E E 'E E E E E E E E E E E E E IE E E E E E E E E E E 11I E E IM9 E E E N E la E f E w w. w w w w w w w w w w w w atr two w w w w w '.. w w w w w w u,u w w w w w w w w w w w w w w xx,p w w w w w 1 al al i w w an al al a/ Ol al al Ol O/ al O/ al a) al a al a) al w w N N al al al N QI N ',. 11 Ol al Ol W al al a) a) aJ al W al a) al al a/ al a/ N al. I v a a0 w a v v m m v ar al m v v m m y al w al w w w w w w w w w w w w w �w w w w w w w w w w w w w'.w . LL LL. w LL LL LL Il LL LL >_ LL LL LL LL LL LL LL LL lL w LL .= LL LT LL 11 4,. LL ''. 41 �` jr lL 11 11 lL 11 ''LL 11 LL Il LL 11 11 �A El d' n N m fA O n r4 r-I V? M '', m 00 v to lO lO w* 1A n M H' 1A V n N co lfT o n .--I Hc In.. m m w VY W -1 w wm v"M m D m A^ CO M- m no V ID n w M N -Cal V'M O 0 w n 14 m IO m '.. m N w In m n 'n w r-1 n" O 'A w 00 v 'n '.. o ' ID w n iR n M a t/T ;I,O n N w LA n r-1 H 1n m m w c 'n ID r w w VY m H w m N IO N N n N Vl m no m 'n n O m N. m Vl N w AA ID D n m i 1n.. N m Vl n 'n al Ip r o 'n, 00 Vl m m 1A 00 V m w V1- ID w n m VY N n Vl n to m w r-I o i/T 00 V Vl m�D W V m m N IO m w N N n Vl V no m n O m m m Vl HN N w w m IO N n m V n m n O O m m V N ID o m 00 00 Vl O m 00 00 N n M m N V n m Ol M O m oo oo M to M ti m m o0 oo ri m 00 00 V r-1 m o m c-I m m 1p M c-I m .-1 M r-1 m Vl In r-I , m IO N. N N IO N ri N N Vl -1 M ri m Vl o rl Vl O0 '.... N Vl OO 00 00 N M 00 I 00 00 Ill O ri Vl 00 VI O ri Vl 00 Ill oo .--I M n m 00 ri m Vl r-1 m V Ill Vl ."� M V Ill n Ill oo r-I M H M N m ID M IO l0 Vl -4 m w lD m� .'-� m N m lD r-I m N m IO M '.... N ''... H n ri r-I N 'tm N ri n r-I H N a �,tt m N ri ID r-1 O '., N V '.., m N ri w ri O N ;tm N c-I n c-I r-I N t o0 r-I c-I V 00 t 00 ri Vl m a 00 ri Vl m t 00 c-I V OD V 00 ri V 00 v' In. In. w UT.......,N to V? Vl iA N} i'A1w 1A In vR in iA In 'A VY iA i Vl Vl Vl to lA 'A Vl. in 'A 'A to Vl 1A Vl N 'n A, th 1n N lA V} 1n N in..'A N, }} N T V l} Il -I N M a VYl T c-1 T} N M T C Y Vl Y ry Y N Y M T Y Vl V N .}-I N M V L}l) HN M -CT 0'... N d M a V d Vl d c-I J J a J 111 J cc C cc G cc G cc G CC C (J U (7 Lo U cY d d d d d (7 (D (J 0 (D d a d d d rY-I J J J J J c CC G c c c i 0 u u (D U' Vl a U a U Q U Q u d d d d d d d d d d F- d F- d h d h d F- d Vl Vl VI Vf 7 VI Vl � Vl : Vl Vl � Vl Q U Q U a U a U Q U a U a U Q U a U a U d d d d d d d d O d d M d M a F- H a a H a Vl Vl Vl Vl m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m ',. m ,,,, m m m m m m m m m ''., m m m m Ol m m m m m m m m m m m m m m m m m m m Cl m ( m Ol m Cl m Ol m of O) m m M m M m M m M m M m M m m m m m m m m r1 al m m m r1 m r1 m m ri m r1 m m m m ''.. m ri m m r1 m r1 m m v m v m v m v m v m c al v al a m a m a m v m a m a m a al v m v m c m m v a m v m a m v m v m v m v O o o o r1 0 o 0 a o o o 0 o o o 0 o 0 o 0 o 0 o 0 o 0 o o o o 0 0 0 0 o o o 0 o 0 o 0 o 0 o 0 o 0 o 0 o 0 o 0 o 0 o 0 O 0 o 0 o 0 o 0 o 0 a 0 o 0 o 0 o 0 o 0 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 u u u u u u u u u u u u u u,u u v u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u'u O_ CL d d C d d D__ d 1 Q. d d d d d d d d d d IL F L H a H d H D_ F- d F- d F- m F- d H a H d f- a f- d F- 0_ H O_ H d f- d F- '.. d F- l d H d F- d d d 1 L d d QL d w w w w w w w w w w '. w w w w w w w m m m m m m m m Cl) m m m m m al m m al m '.m m m m m m al m m m M m m m m M m m a m m v m m v m m a m m a m m m v m m m v al m m v al m m v m m m Zrm m m m m ri ri ,y 0 0 0 0 0 m m m m m � rm1 .m-i 0 0 0 o m m m m m 0 0 0 0 0 0 0 0 0 0 0 c 0 c 0 c 0 O o o o 0 o 0 0 0 0 0 0 0 o o 0 0 o 0 o c 0 0 c 0 0 o m a m a m m a m O O o c O O O O O O c c c c O c N c N c c N ` ` ` N O O o O O O f0 `m la la I`a O O O O O O O c O O r1 .'-� `m •"� `m N m `m m N m N la O la m `m O O O O O O O o O O la N }} to O/ to - r} to 0) j}}}} ```` ri m m m m m m m m m m}}} I`0 N to N N I`o N, r r m m m m m m m m m m}}} N Ol w N T r`o N r T y }} T ` Y Y N N (o m '... m m m m m m m m m M M V Vl .� � N � m � v � Ill � ra N ro N Ol N M N m ri m ri m r-I m ri m ri r-I N m Vl m V m V m V m V m R ri N N m C Ill r+ � N � m � v � m � to N } , N } m w O/ N y } Ol } m V m v m V m V m a > > 7 7 O o O o O a } `� } N } M y y O 0 O 0 O 0 o 0 o 0 j j j j j O 0 O 0 O 0 O 0 O 0 7 a a a. a s a. a H N to V m O O O o O O 0 O 0 d a d a a a a a n a a a a c c o o O o c c C c a a a a a. n:.n a r o 0 c 0 0 0 N O O O O 7 7 7 7 7 O O O O O .--I r-I .--I ti .-1 O O O O o O o N N N N N O O .. O O .. O 7 7 7 7 7 0 0 0 0 O N N N N 1 Vl VI VI N a c a a a n a n a a f0 f0 fO 19 10 d lL d �. 11 `m N f0 fO f0 d d lZ d 1 N N Vl Vf Vl a a a a a,.. M w M M M J 3 7 7 J 7 7 7 O) Ol v N N N 0J Ol N N m m is , is 7 a 7 a 7 a d a Vl Vl Vf VI Vl } } } } O/ T d d'd a o o'o 0 o E E E E E H N m a In a a a a a N m In a a''a a a o 0 0 0 o E E E E E, N m v m Q a a Q - •- --- M 7 7 7 7 7 VI Vl Vl 7>> V1 Vf Vl 7 ul Z)>> VI Vl Vl 7 Q u Q u Q u Q U a v Q u Q u a u a u Q u a a a a a 7 c 7 c 7 7 c c J c Vl > M Vf Vl 7 V1 u > u > ,,. o o io m io a` iO i0 c M c m c m c T c is > O > O > O > o > o > O > o > 0 > o > O > O > O > o > O > O > o > O > O > o > o O O O fO . O . to . . O . to > o > o > O > O > o Q (9 U U a a m a a a a a a a (9 Q Q (7 (7 (7 (7 (7 (D (9 Q U U' (9 Q U' o U (7 : (7 a a a a a a a d a a U U' Q U (7 0o 03 06 0-6 cif c9 0 0b 0i1 03 06 03 06 0� 06 03 06 06 a6 06 03 06 06 a1 06 03 0a 06 06 06 oil '''., 06 06 , ca Q6 06 06 06 06 06 03 06 06 ob I oz 06 09 oil ob ul a V1 Q Vl Q Vl a VI a Vl a Vl a VI a VI a Vl a Vl a Vl a Vl a Vl a Vl a VI a Vf a V1 a VI a Vl a Vl a Vl a Vl a VI a Vl a Vl a Vl Q Vl a VI a Vl a Vl a— Vl Vl a Vl a Vl a N a VI a VI a Vl a VI a Vl a Vl VI a a Vl Q Vl a Vl a ul < a Vl a Vl a ---����������--------- --- >>>>>�I����� a Q a a a a s a a a a a a Q a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a L Y L L Y ri L L Y Y --F -.FL L w L Y L L L L L L L Y L L E -.FL L L L t L L L L L Y L •3 L Y L '..L L Y 5 L 3 3 3 •3 3' 3 •3 3 3 3 3 •3 •3 •3 3 3 3 3 3 3 3 :3 3 .3 3 .3 3 3 3' •3 3 3 -3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 v v v -D -a -a -o''v -a a -a -o -a -D -av -D -D -Dv v v v v v v -D -Dv v -a -a -a -D -a -a -o -a -D O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O p U U u U U U U u U U U U u U U U U U U U U U U U U U U U U u U U V U U U V U U U u U U u U U U U U c O c O c O c O C O c O c O c O c O ". c O c O c O c O c O '.. C O c O c O c O c O c O c O c O c O c O c O c O c O c O c O C O C O c O c O c O c O c O c O c O c O c O c O c c O O c O c O c O c O c O c O C C C C C C C c C C C C C c C c C C C C C C C c c C c C C c G C c c C c c C c C C C c c c c C C c O1 d N 01 W O) 01 W 41 OJ Ol N W O1 OJ O1 N 01 O/ OJ O1 O/ O1 Ol O/ N N N Ol 01 O/ N O1 Ol N N O/ Ol W N N W N 0) O) N W N O/ f0 f6 fO (O fO !0 fC fO N f0 N fO IO N f0 fO f0 IU N 0] (C f0 (O f0 f0 N f0 f0 Ip f0 01 N fC f0 N IO f0 N l0 f0 10 N N !O fO R 0] fO 10 H H F F f- H H H H F- H F H F H H H H H H F- F- H F- H F- F H H H F- F-- H H H H `mm mmmmm 'm m m m mm mm m '.m m mmm 'mm mm m mmm 'm m E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E'E E E E E E E E E E'E E E E E w '.... w w w w w w w w w w w w w w w w ,w w w w w ar ar ar m m ar w '..... v m ar w v ''. v m v ar ar ar m m m m v, ar w m m v w w v w ar m ar w ar v w ar m w w m m m w w v Il 11 11 LL 11 -m I.L .LL i 11 M I„I,,. w x LL M M w w w 11 LL LL LL ''. I1 I1 11 LL 11 w LL 11 w LL LL w LL lY LL 11 11 w 11 LL 11 LL LL 11 LL LL It M d' O Z W E 0) El w N m l0 M w m n O Vl V? VT m m oo N M fA m to w V l)D r-1 4A VT V1 m a a a >>>� O) Ol 01 ct a a 0 0 o u u'u a a a ~ ~ ~ N Li M L} [>0 Y/1 Vl iA v a m v o u a ~ 00 V w'm ah W V m Vf m a<< 01 v o u ~ N ci V} N N 0) M to c-I a u m o u ~ N w <0 t/} V 7 oo n tR'V} N a U m 0 u ~ N .--1 N m N'V},,VT m W ul O mY,} M l7 a u rn o u ~ cq W N N .--I m '-1 .-i V N V << a U rn 0 u ~ Ul V1 m ul c-I m c to n Vf Q u m o u ~ n ul 0 m Vf w oo O 4/T a a u m o u ~ M ri r-I n t/} w n .--I W V} a a u rn o u ~ 'on O O m V} W M- O c-I e-I LT a a u m o u a ~ V m O O w O N IO V?.. V} n to m n m 00 Vt•'Vf a a a a' U U m rn 0 0 u u a ~ ~ n m Vl c-1 m N m n i/) V} w to o0 i` O .--I V W Vf V} J J LL a a 9- m m 0 0 u u ~ ~ M O l0 m L} w M O c-I th J a a rn....rn 0 v ~ V ''., w N VT n c-I V V} a a s 0 u ~ Lfl o <D iA'. w m W ±JW J LL����� IL m 0 u ~ N w M of N N m ,tit"! IZ m 0 u w V ''., w t0 VT V V n v} � a m 00 u W N N m m O] O V} a m u w C a0 N N. 4✓} m .-I V Vf a rn...m o u W m ul m o 4ry a) I, 4A a o v'u w i,., N .--i '', f M ^-A•'F. N '�, N M Ll (� I., 7 m o H w V N w w V V I, V} (� I ., m o u H w N r-I N m M9plY m fXl O i/} U I., 7 m 0'..o u'u H W V m N N m c-1 V {/1, U I ., m H W LII ul m m +id} m n tA,M tl) C9 I ., U m'm 0 u H l\ vl N M YfM to fD V '-I tL I ., U 0 c) M .ti r4 n X✓b l0 t� lb Vt• N a I ., m 0 u M O lO m,N tiJY oo M rI �/} M s I ., U m 0 u O o6 +h n .--I VT V o_ �, '.' m 0 u '.., Vl O O w lh t0 m M W 'VS- Ul I ., a<<< m 0 u Vl 00 N of .--I DD N M ar,',. ID Q U m....m 0 u m O t` In N'. N lD ul to ipy.. N a u 0 u n...w O n r,0 vT m lf1 W lb K✓4 (D a u m 0 u I- N VT N ti f>0 rl iA (D U a '..0 m 0 u w 00 N Vf 1f1..O w t� V1 Ill U a u m 0 u m I, m N Lf N a M VA T a a U m o u'' .--I vl m ul v} O W t0 v+, Y} a a U m o u � M O w vT V N m iA"b a Q' U m o u c-1 c-I 1� O to _.. N M N N 1!a T d< a u m o u m 00 ' M m VT O m Ln tf1 to Y a u'..a m o u d I� m N vT,, O N 7 M 1„'n a m o u a Vl m m V? O 00 w d a m u a M O w VT V N m iA a a m u''u a N I� o vT N M N N a1',W a a m a mmm a) c, m ' ir) m m fy1 m m m f]v KTa m m m cf^a C1b orb m m m m m m m m Gb m m m m m m m m m ere m ran. m corn m m '., m m m'd m fAl m m m L7k m m m CW'F m m iab m m e7Y c1 tA) �+t m m m m m m earo m�p m m OY m rm1 m taro 0 m-e m .ti mw. .--I Pq r rO a �ryV ry ('�1 O o 6 m m m tin Omi m O d'I m O T 0 O 8 �'y O e:7 R:Y 4J' O� R C? 4 Gpy 'O ar',1 F O C3 f:h 01 O m O m O U5 O O ymmmo '�] ryO 47 O OA O O O T'd YY' wv1i LiY tfli `m L1"i `m u'4 O O O e Ca M'i un unCl V1 �`a m m O '., O O O `m `m i 7mJUml N N N m m m m can m v v m v m m v v}rrr>. N N 61 m v 0.F1 Vl Iri N bM ca rnmmer m m m mmmm m m m w Ip N v v v m v }r}}r V ul r m vn m r Gab maa m tln ci N M V ll1 •--I N M V to mm m m m m Im m m m LmiF N M }V `~ ~ 'i N M V £1'M1 irn Q m tiA.. ? O � N 7 J J J J dW '•° 0 �q`y"' 'a '0 dW Y N Y m } v } v } m fib m m a, .}i � 7 7 J V}l J� iC+ (§ oa CIS ,[y,1y, e}i N m a ul d a a a a CT 'C:P 41 Ck LOL LPL '-1 N m� V1 sa $1 e C'S cro a a a a a FJ GO_J' o .o 0 0 •o wti ar r u o 0 0 0 0>> C 0 C 0 C 0 0 o n um vi 0 0 0 0 0 e c a o 0 o a o c°a. a a a` a a a` . In m nta era wi �, rl ca. Q tar ¢a. o, t'z.. a. is m d' N d a d a a O O O O O E E E E E c-I N m 7 ll'I O_ d d a. 1 .-i N M N d a d a �. a a a a v n n m n n Q U. a u a u Q u '' a u Q U Q U' Q u a Q u U a d a L d c C' c c' c Vl 7 '.� vl ut ���� N N vl tll z) M ut to ¢ U Q u Q u a u Q u '.. Q U a¢ U a'¢ o 0 d 0 a 0 a > > > O O O > o > O > O > o > O > o > o > O > O > o > > O O i0 is is m > O > O > O > O > 0 > 0 > O > O > O > 0 > 0 > O > o > O > O > o > 0 u > 0 u > O u > O a. U' C7 l7 (7 U U` l7 l7 l7 l7 C7 C7 t7 l7 l7 a a a a a a a a a a' 8 Uo U '..... 8 Uo U U U U7 l7 U7 l7 t U l7 C7 U l7 l7 U a a a a 24 o6o6 as ca o6cel co oa c6 c6 o6 to co o a a l a a D6 Q3 c6 o6 ca as .4.6 .6 .6 o6 oa o6 ca ca a 66c,6 ail .6 o6 co o6 oa o-6 a a ca a Q6 c2 Q vvqq ¢ a,�b a to Q itc�^yy KS ! pp i !ttpp �T wn ¢ vl !��g Q a I< yr Q a 1r "� uu�Q *n� 'a L2 !' It*rq !v}} !r am rr,,�yyy ��np w� Y,�q G� qq nos n� en ua vl rr,tr�� w�•� V�{ ��Fpp L�ipp 1t�r� ttrryy m�aryy wq��'� aunryy vvryy V,P� aaa< > << <> > "„�w > `r `a ¢ > » > ¢ > eL. "�. �Q "�. a a„ >a' a w.:. "�.. *'� r>w as <'C *».. "^,. ^ter e ;-.: as `.. ^ .. > 'M. ><aaa ^«. ^•.. mow„ "^a " •ww ^*.. 'w.., '-,. `*.. n.. '�.,.. '"+,... a i¢¢a",�"��sa'�+�^x*�Q*a'x'�a°�w'QQ�s*$c$"�^4a+xaa.�'�Q'�¢,�rQ"�<a<+¢QQ�e$�r^s >» aar L Y N L L L L L L L L L L L L L L L L L L L S L L L L L L L L L L L L L L L L L L L L L L L L L L 3 •3 3 3 3 .3 3 3 3 3 3 3 3 •3 3 3 3 '3 3 3 3 '3 '3 '3 '3 3 '3 3 3 3 3 3 3 .3 '3 '3 '3 '3 •3 3 .3 .3 •3 r3 3 •3 .3 .3 '3 0 0 0 J U U 0 U 00 U U 0 u 0 U 0 U 0 U 00 u U 00 U 0 U U 0 0 U U 0 U 0 U 0 U 0 U 0 U 0 U 0 U 00 U U 0 U 0 U 0 U 0 U 0 U o u a U o U 0 U 0 u 0 U 0 U 0 u 0 U 0'0 U '.. U 0 U 0 U- 0 0 U 0 U 0 U 0 U C C C Oc C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C c C C c C C C c C C C C C C C C C C C C C • C . . C • C . C C • C C C C . c • C •C . c . C • C . c • C • C C C O O C O C O C O m v m > > > lU > lU > m > N > W > m > m > v > v > v > v w > > v w > > v > v > v > v > v > v > w > v > v > v > v > Q > w > w > m > v > v > v > w > v > v > v > v > c v > c v > '', C v w C v w W v C v aivo am`v iL� d ` aa ''Ldm2v .'. > > > > > > .`oaaaoaaaaaLoa. > ..'La.'H . mv o LH LHLF Lamv Lamv` Lmvvdv ms HHH H H HHLH Lam`v Lsma` Lamvd Lsmd`o Lomv``v`v_ Lamvv Lmvv Lasav E E E L m E ma E m', E .m E .mm E E .mm E E m E .m E 'm 'm E E m mm E E m:mmmmm E E E E E E .Nmm E E E .N E 'm E 'fOm E E l&m E E'E mm E m E 'Nmmmmmm E E E E E E'E 'm E 'm E "'tCu. E 'm E 'm E 'fC E 'lp E W W w W W W W W W W W W W W W W w W W W W W W W W W W W w w w w W w W W W W W W W W w XY.4 W W W W LI W W W W W W w w w w w W w w w w w W W W w w W W W W w W W w w W W W W W W W W W W W W W W W W W v `1 `/ .. 11 LL LL 11 ll LL Il µ,. LL 11 LL LL 11 IL I.L Il IL LL LY w 11 µ,• LL 11 lL 11 11 LT- LL 11 LL 11 L1 LL 11 ll LL ''. LL 11 LL wiz LL LL 11 11 IL 11 El M m w On O N 00 W O ''.. O N ......, w m m O n M lO N O V n V M W N n v m W N lD N O V lD N O I� In M ONO V) n C N m v m n lD 0 V m n l0 LO m rl V' .-1 0) n O n V O o N co Vl O O N OO ul m n o n V al n O n V CDO N 00 0o m m n m N V1 no N N In ''... n o N N In w O m N ''... n n m rl N o n m N N o n m N '... N V7 n m rl N 0 n m rl N N n m N N C LD lff VT Vf In iA 9a3 vA l U6 iA VT iA M• in vT 'n 4 to Lf 'A Vl in ^ V} aA 4 Vl f} iA VT lf! Vn in N N ff iA Vk n N .In 4A IA In lff VT V1- iA M lA m N Vl w n N m w w n V w N m m O o '-I OO In r-I N V N .-1 '-I N V N .--I o o w m •••o o H w m H mN a N c4 I� o .--� N m N LIl N m N m O O V In o0 N o 0 0 n l0 lO m n o0 lD '-I M no o .-� n l0 m o o n w m w w m n m o m r-1 m oo lD Ln �--I U 00 l0 Vl r-1 lD N V m m n M Vl m w m e-I V m w w ei V m w m N V1 m lD w O m m w W '-I -t T tD DD ti a m lD w o m m lD w o m m ID w e-I V N Ln n c-1 r-I ei '... ci r-I '-I e-I r-I ei '-I '-I N '-1 '-1 c-1 c-I '-I e-I e•1 V}' V? V?....,V1.., in <A V1 V} V} to iA V1 i,N iA N to N, N N.. N l/Y Vf In to to lA V?'A in to 'A. (/1 'A'A f} th In 'A IlA VT Y} Y r r }}}}} }}} Y Y}} Y Y Y } Y r} Y} r r Y}}} Y Y} r} Y }}} r} }} Y} Y '-I N M V V1 '-I N M V Vl r-I N m V In J e-I N M e Vc VcI e-I N m V V) c-1 N M I Vl c-I N m� In c-I N M V to J N M VJ J C ec ec c C Q < < Q Q Q a Q Q Q Q d d d d d� I- H H H vi in in vi �n an �n vi �n �n Q a d d d d d d 7 � U U U U U u u U U I U d D. d d d d d d d d 7 7 : 7 U U U Ol m m m m m Ol m ''. m m m m m m m m m m m m m m m Ol m m m m m Ol Oat m m m m m m m Ol aa, m oll m Ol m m Ol m Ol m m m m m rn m m 'm m m m m m m m m m m m m m m m m m m m m Di m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m. m m m m m m m m m m m m m l m m m m m m m m m m m m m m m m m '.. m m m m m m m m m m m m m m m m m m m m m m m m m m m m m a v v H H H H H H N- H N H v v v v a v v a v v v v a v a R�9 a a v v v a a aaa v v v n n n 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Cl 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 u u u u u uu u u u u u u u u u y u u uu u u v u u u u u u u u u u u u u o_ L a d d a add d a L a d d o_ a d a a a a a d o_ a a a a a a o_ o_ a a a a d a a a a � W W W W W w W W W W W W W W W W m m m m m m m m m m m m m m m m m m m m m m m m m m F- a, m m m m m m m m m m m m m m m In m m m m m m m m m m m m m m m m m m m '' m m m m m m m m m m m m m m m m .....mmmmm (n a) vavvvavvaa....rnmmmm vvvvv o m m m m m o''M m m m m o o o 0 o 0 0 0 0 0 0 0 o 0 o m m m m m o o 0 0 o o H--�� o o o 0 o o 0 0 0 0 0 0 0 0 o'v v v v v o o o o o 0 c c c c 0 0 0 0 0 o o a o o 0 C 0 0,0 O o a o o o o o 0 o o o O O O o o o o o a O O o o o o 0 o �' o O O O O O �••� �"� N N N N N ` _ O C 0 C Cl i N N N N m o o 0 o o m m m m m m m m O O O O O m m m m m ry m m m m m m m m m ap ao ap m m m m m m m N N N N N m m m m m m O f0 `0 m m m w �'..� s-I m m m m m w w w w w m m m m m w w w w w} j Y Y Y O O O O w Y m m m m m r} r r} m m m m m}}}} r m m mlm m r r r r r v v v V1 m.... m m m m a-1 ci 1- 1-I 1- N m"t m m m m m m V d a V V n n n .� ry m a �n ti N m v �n v v v v v ry m a in }>>> y o 0 0 0 0 0 0 o o o r i o} r r r} o 0 o o 0 o o o O o o o o o>>>> 0 0 0 0 0> j 3>> 0 0 0` o 0 0 0 0 0 0>>>> j o 0 0 a N m v o 0 0 0 0 0 0 0 0 o a a a a a ^^ v^ c c C c 0 0 0 0 a a a a a a a a a a a a a a a o o 0 o o 0 0 o 0 o a a a a a tf r t t� o o o 0 o o 0 o o o o o o' O O O O O O ti 'ti O O O O O N N N N N O .-o.o O o > > > > > O O O O O a a a a s in an w �n �n a a a a a a a a a a. m m m m m d d a d a` m m `m m m d` d`d` a s a a a a a. m m m m m a a a` a a m m m 3 0 3>> v v v v v v v v v v >>>>> >>>>> v v w v w v v w g r m� an � cn r r r is is m m' m} r r o E E E E E `-''ry m a a'a a a a N m v n a a aaa o 0 0 0 o E E E E E H N m v Ln a m a alm H N m vi vi in �n �n an Q Q Q Q a a Q Q Q a > > > > 3 �n �n vi �n <n an in �n �n in Q Q Q d C C C C C Ln� 7 U U u U V U U U U V d d d d d C C C C C 7 7 Z) 7) D D z) u u u � � � � zJ > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > O O O O O O O O O O O O O O O O O O O O m m m m m m m m m m O O O O O O o O O O O O O a a a a a a U U U U U (D (D(7 (D (D (D (DU (D (D(D (D (7 U (Da d a a a d a a a a (D U U (D (D (D U (D U I (D U U U a a a a oil a aaa a s oil aaa aaa a a a a a a a a a a a a a a,a a a a a a a a a a a a 0.a a a a V1 N V1 N VI V1 VI V1 V1 VI VI VI VI V1 VI VI VI V1 N VI V1 V1 V1 V1 VI Vf VI V1 VI VI VI VI to V1 V1 V1 VI V1 Vf V1 V1 In N N VI V1 V1 V1 V1 a a a a a aaaa ¢ Q a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a aIa ¢ a a > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >'> > > > > > > > > > > >'> > > a a a a a a a a a a a a a a a a ala a a a a a a a a a a a a a a Q as Q a a a a a a a a Q a a a a L L L L L L L L L L L L L L L L L . L L L L L L L L L L L L L L L L L '.L L L L L L L L L L L L L L L 3 3 3 3 3 3 3 3 3 3 3.3 3 3 va 3 3 3 3 3 3 v v v v v v 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 u u u u u u u u u u u u u u u u u'u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O 0 .CC .0 .0 •C "'. C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C v w v w w w v v w w w w w v w w w v v w v w w w w v v w w w w w w v w w w w w w w w w w w w w w w m m m io io m m m io m m m m m io io m m m m m m m is m m m is m m m M m m io m m m m m m m is is m m m m m v v a v a m m d v v a m v v v m v v v a w a v m m v m vi v a v v a v a v v v v L v v v a v v v v v L L L L L L L L L L L L L L L t L L L L L L L L t L L L L L L L L L L L L L L L L L L L L L L L 'm 'm 'm 'm 'm 'm 'm •m 'm 'm 'm 'm 'm 'm m m 'm 'm m m 'm m m m 'm •m m •m m m 'm m 'm 'm m m 'm 'm 'm m 'm 'm m m 'm 'm .� m m E E E E E E E E E E E E E E E E E E E E E E E E E E E E E'E E E E'E E E E E E E E E E E E'E E E E w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w v v w w w v v w v w w v v v w w v w w v v w w v w w v v w w w v w w w w w w w v w w w w v v w W W W W W W W W W W W W W W w w W W W w W W w W W W W W W W w W W W W w W W W W W W W w W W W W W 11 11 LL LL lL 11 11 11 I1 LL LL LTLL LL LL 11 11 LZ Il I1 11 l.L lL 11 - w lL 11 LL lL 11 11 11 LL LL LL LL 11 LL 11 m W LL LL LL I1 LL LE 11 It M d' ti O Z -1� E L 0) El OO O N V tO i,,,,� N�N aIN N�N.. m�VYlNO W 0 NII r 7 W N�N T r�W N�N� r Vmr nlun m N7V N nHm N -Zr m rn Omnrp NpV m nmi -1 �mf N V '^q'nII1^11" IV, I,, ^IIv*jlv*j ^I,,-V IJ ^Jti*Ivgv-,Jif�II^] 10I90I901=1090MIl®®©IM ooll NlI m `NN 11N kP l. nj. MI NI^ r�N NII NIILn O r O(3)... M�n NII r�Omr N�N�Ln ^ r�N cQ A zr �o oo N N O to amr 11 � Ln WD N� Ip �N r w oo O NN V ^I NI nI''^[I VNI l+ j nj,,�vd"+V"*I�I--dv l">N�I">'".I"� rrr}rrYrYr } Nmav}irYYrY 0 a--1 J J '' N (D '., 0 U c-1 N M a VI `D N m V ''... N '-I N. m V Lfr << a a a a a J J J l7 (7 C7 C7 (7 a a a a a<<<<< a a a a a •--� N m a J Q a a Q Q¢ Q a a a a d I- H H F- H m ut m m m m ut ut m m Q Q Q Q Q Q Q¢ a Q U U V u u u u rl a a a a n. a n. C. a �» 7 7>>> u u u u u U u u u u a a a a a a dr or of m of or m m m of m ' or or of or or m or or or of or or ai of or or of or dr or o� or cr of m a m m m m d, m m m m m m m m m m m m '.... m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m :m m v N nItn v n n n n n n v v v v v N n n v v v v v v v v v v a v v Itv v m m m m m m m m m m m m m m m m n n n n n nn n n n n n n n N n n m m m m m m m m m m',m m m m m m 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 u u'u u u u u u u Y U u u U uu u u u u uu u u u''u u u u u u u u u u u u uuuuu u aaaaaaaaaaaa'a0-m a- maaaaaa-mm CLaaaaaaaaaaaaaaa H f- H H f- H r- F H H F H F: H f- H f- H F F H F F H F- H H H H F H F- H f- '''.. f- H H F- F F f- f- m W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W w"Pr m m m m a' cm m m m m M m m m m m m m m rm1) m m m 13, m arm mm m m m m m m m m m m m m m C'r m m m mm rvaa m m amrwrfma ,:. 9lh n' M n m� 51n m ar rrO m m m m mV m m m �fO n n 0 C00O r,V 9OO O O 7 §OV V O JO 8 O O O 7 i1 OgON q7T0 29 6 C6 (3 ] fY Ifi t9anLi�LM r� h Iry+a m OO O a ma PCOSY' %4 C] 15 C' O G:A m a) m m m m V GAO O OO. Ot4` o. a a cL a tm t" t v6 O 0 ri ` o o o o o 7 7 7 7 7 0 0 a o rr en n sw m m d G.L.. a d d ur 0 O. a CL O, O., m mmm J 3 J 7 7 7 T1 7>>> >> a a a a a �n m� are m Y r r Y Y v m a a a a a o o o o o E E E E E I N m v m a Q a¢ Q Q¢ 7 7 7= 7 m m rn n u U U u U U u a a a` a a c c c c c>> 7>> >o >o >o >o o >o >o m m m m m m o >o >o >o >o U' u' U' l7 U' ( a a a a a a a a a:a Q7 U U` U (7 03 oi1 .6 o6 obi o6 ',...6 '.....6 oil all oil oil '....6 .6 o6 '.'.... oa 0d a'J o6 oil oil ''.....6 uro � wn crr i nrtr err yr m � m ' m >>I>>>»>>>»'>>>>'>> a> >> a Q¢ a a a a¢¢ Q a a Q a 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 v v v v v -o v v v v v v v v v v v v 7 7 7 7 J 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 o...o 0 0 0 0 0 0 0 0 0 0 0 0 o 0 0 0 0 0 0 0 u'u u u u u u u u u u u u M u'u u uu u uc c c c c c c c c c c c c c c c c c c c 000 OOO OO O O O O g '. O O O O O OI 0 C C C C.0 •C •C .c •C '... C C C 'C c C c C C C C C C ''., > > > m m m m m m m m m m m m m m m m m''m.....m m m m > F- H HF- H H H H H F H H H H F HIH F H H H I F- W I W� W u W I W� W I W� W I. W II W 4 W u W I W,6 W j W W I W II w p W W W W II > > > > > > > > > > > > > > > >- > > TI T > Z LL Ll LZ LL W LL lL 1.1 Z tZ LL H N f0 f0 Ip m m m mc7� m ae. 10 IO '', f0 f0 IO IC IO Ip f0 fp YF1 M1+P'p 1B'b 1R"4 m Y Y } Y Y N M V Vl m m�y m m 'PJ'0 ''-1 N M a Vr •--I N M V V8 ''.. N m m f0 m � t: t Y } } } y am` 7 7 7 7 O O 7 7 7 7 7 O O O C7 Y o VVVVVV C9 Wi .� ry m a rn ,0. a s tl w ru Gsn a 'roi 4 0 0 0 0 0 re n n o 0 0 0 0 7 7 wi 7 o 0 0 0 o n m uv CL C1 M Q a ca''. ¢ti,. O.: CR Mm m m m m>>> >- > m m m m m a a a a a .� N m v m a a a...a a''o 0 0'0 o E.E..'.'..EE E CL Vr 0 0 N a Q a 0 0 0¢¢ Q a ._ ._ ._ ._ 7 7 7 7 7 Vr >> 0 7 u u u u u u u u U u > > > > > > > > > > > > > > > _ o o 6 o 6 6 o o o o 6 0o m m m m m m m (D (D Q (D '... U' (7 (D (7 '....(7 U 'l7 (D U' (7 a a a a a a a a a a 8 oil orf o7l o6 o6 o6 ob obi oil o'd o� o6 o3 o6 oD .6 a a o6 a'S o6 .6 .6 06 V v v n n n >>a a»»`»»> > >>> >>>>> Q a¢> a Q Q a'a a Q Q¢ L L L L L L L L L L L L 3 .3 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o u u u u u u u u u u u'u u u u u u u''u u u u u u u c c C c c C c c c c c c c c c c c c c C c c c C C O O O O O O O O O O O O O O O O O O O O O O O O O mmmmmmmmmmmmmmmmmmmmmmmmm L L L L L L F H H H H H f- H f- f- H H H H m m m mo m m m m m m 'm m m m m '..m�w^^.. m m .m m 'm mm m m W �lI ��' �� gal �r'v1 v� �dw� iz v� �� v �� �a�a �' �� � �� v El rl V W n V W ci Vl M W VI 1- m O 0) N M M O m N m M M ID Vl n (n M W Vl 1� m o m N M M I� M .-1 I' C m r�V W C)o) V Vl lD ci M W Co 1� �'-� N m N Vl m 1� C, C,o m I� O O m m OO O M W M 1� ID lD ID I� '.... w V1 N m m m W W W M ci W r� - W M W r� '-I W M W ID W V1 c-I W W W Vf c-I W N r-I W M W M Ln 1, m N V m N m rl m V '... w W m m w W '-I m m to W e M V w W m V lD W H m o LD W H m '... V w N .--I m V lD 1� ci Lf in V} V} In. in L} In to to In to V} in V} V} VT VT'in VT 'A i/f to V) VT VI in in V) 4} In N. //} VT VT In. VA N',N lD W O N V7 lD m rl N 7 VI I, (n N V V1 F, '., m N V M 1, m N '.... V M I, m N V V7 1, m N V Ln I, 01 m W oo W lD o M lD V W rl N oo N C V m V N V C m V V I oo 1l N W C W I, N W N V V m C o O V7 0 VI m lD m m m m M m m m W 1� w W w N O I� n V lD rl n 1\ It tD ci I� W lD N O I� W lD N O I� n a <D r1 n Vl O lD N I� M lD W m V M V1 1� m m O W. a 0 N ID m m rl m oo W 1, ci m W W N O '-I w m m o .--� lD m m .--� m W W 1� m m N M c-1 O rl M V7 I� W N V m 1� m N Vf 4A In W ih N N VT VF to V} to in i/f 1n L} V} V} VY In V} In V)N Vl M VT t/} V? Vf Vl VT Vf V1 N.. N. V1.. V) to t/l.. V} Vf VY N th in. VT Vl V1 } } Y } } r r r r r} Y> r} Y Y r r N}} r y Y r}} r}} Y r }}}} Y }} Y Y} Y}} Y Y .c--I Nc M Vc VI e-I N M V Vf e-1 ", N M V V1 ci N M 7 VI .-I N M V V1 N M V V) '-I N M V N �--I N M V Vf c-I J M V Vl l7 C7 C7 a a a a a l7 l7 << (7 a a a a a) J J a a a a a a a a a a a a a V V V V m v, . V D a a a a a a a a a a a 7 7 7 7 7 U U u 0 0 0 U u V U U a n a a n a a n a a >>> 7>> 7 u U U V u 0 0 0 u U n + + + + + + + + + + + m an 01 O1 cn m m 01 O1 Ol m m Q1 O1 O1 O1 an m 01 O1 O1 O1 m m (n mm mm mm mm m m m m m m m m m O o 0 o O o 0 o O o 0 m m m m m m m m '., m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m o O o 0 0 0 o O o O O m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m O O O O O O O O O O O m a Cl) m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m c,o O O O O O o O O o m mm m m m m m mm m m m m m m..m m m m m m m m m m m m mm m m m m m m m m o 0 0 00 0 0 0 0'.0 0 O O O O O O O O U U U U U U U U U V U U V V U U U V V U U U U U U U U U U U U U V U U V V V U U U U U U U U U V V D_ L L OL a d a d a L d a d d a a a a d d d a dad a a d n a a m a d a a a a M m a a a a a a a d w w w w w '.w w w w w w w w w w w w w w w w w w w w w w w w~~~~~~~~~~~~ ~~~~~~~ W F- H H F H H H F- H H H H H H H H H H w H F H H H F H w w w w w w w w w w w w w w w w w w m m m m m m m m m m m m m m m m m m m m m m m m''...m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m nn- -1 � `� m m m m m m m m m m �?' D O D' D o 0 0 0 0 0 0 0 o o m m m m m o 0 0 0 0 0 0 0 C. o a o 0 0 0 0 0 0 0 0 0 0 0 0 0 r r o 0 0 0 0 0 o O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 c 0 0 o 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0'0 0 0 0 0 0 ,A Vj m Ln uj m m m m m 0 0 0 0 0 ' O O O O '. O m m m m m 0 0 0 0 0 O O O O O N R^^^^ m m m m m .y cy iy �--� '-I ~ m m m m m N Cm m m m m m m i O O O O O(n m m m m i i m m m m m m m m W a] W O o 0 0 0 m m m m m ry ry Ip ry N a] N a1 N a] m m m N w m m m m m N `� `� `� '� `� N N N Ol a/ W Ol N al aJ m m m m m m m m .� ry m v to �a `m ro ro N m a n o 0 0 0 0 N m v n a w w m v o 0 0 0l6 N m v n o 0 0 0 0 N m v n 0 0 0 0 0 0'0 c r r o}}}}} o 0 0 0 0 0 0 0 0 0 0 0 0> j',> > j,o 0 0 0 0 7>>>> o 0 0 0 0 0 0 0 0 0> j 3 o 0 0 0 0>>>> a 000 0 nnno ^ ^'�`^00000 00000" a a o o o o 0 0 0 o a a a a a a a a a a a a a a a a as a a" o 0 0 0 0. o 0 0 0 o a O O O 0 0 0 O O O O O O O O O 7 7 7 7 7 0 O O O O N ti e-I ti O O O O O N N N N N O O O O O 7 . . . In ut In ut a a a a a m a` a a a I a a a a n m `m `m ', `m a/ aJ aJ aJ m N al al 3 3 J 7 O 7 O a) N a) al al aJ N N al al J r m......m mmm a a a a a w ututVf w Y r}} }mmmmm }} r r>- m m m..m m a m v m a a a a a .� N m v a.....a a a a o o o 0'.....o E E E E E•~ N m v m a a a a a .� N m a In a a a s a o '...... In Ln N In ut a a a a a a ''..... a a a a '- '- '- '- '- 7 7>> ut In In In In ut In In In a a a a a a a a a a 7) M z) D 7 V U U V 0 0 0 U U U ri a a a a` c_ c c_ c c 7 D'.z) M>>> U U u U U U U U U U a > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > o o o o o o o o o o o o o o o o o c m m m m m m m m m m o o o o o o o o o o o o o o o o o o o o m 0 (7 (7 (D '.....(7 (7 (D (D (D (7 (D 0 (D (D (D 0 U (7 a a a a a a a a a d C7 U (D (A (D (9 (D (D (D (D (9 (7 (D (D (D (9 l9 (D U (7 a oil c6 '...... ob o6 ''.. og o6 ca c6 c6 o6 o6 o6 o3 o6 o6 obi of o6 o6 '.... o-6 o6 cif o6 ob o6 a6 o6 06 06 06 06 of ob .0 cO ob .6 ob .6 .6 06 a o6 a .6 Qd Q6 06 ab V1 Vf VI VI V1 V1 VI VI VI VI V1 V) VI V1 V1 VI VI VI Vf VI V1 V1 V1 Vf VI VI VI VI VI V1 VI VI Vf V1 V1 V1 N VI VI Vf Vf VI VI VI Vf VI VI VI V1 a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a'a a'a a a a a a a a a a a a a a a a a a a a,a a a a a a a a a a L L L L L L L L L L L L L L L L L L L t t L L L L L L t L L L L L L L L L 3 3 3 3 3 3 3 3 3 3 .3 3 3 3 3' 3 3 3 3',3 3 3 .3 •3 3 3 3 3 3 .� v v v v v v v .......v v lv -a v v m v v v v v v v v v v v '.v v m v v ...... -D-av v v v v v v v O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O 0 0 O O O O O O O o U U U U U U V V U U U U U V U U U U U V U U U V U V U V U U U U U U U V V U V V U U V U U V U U U c C C C C C c C C C C C C C C C c C C C C C C C C C C C C C C C C C c c C c C c c C C C C C C C C O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C N aJ Ol a1 N aJ N a/ N aJ N N al al a/ W aJ aJ N a1 aJ W N N al al al N N aJ N 61 m N al a/ al N al N N al al W aJ N al N N '. a a a n a a a a a` a a m m m m m m m m m m m m m m m m m m m m m m mmmmm m m m m m m m m m m m m m% m m m m mmm m m'. v m m v a m w m v m ar w v a v m m w v a m m m v v a w a m v w v v m v a v w 2 1 `J v m m 2 `1 v '... 2 W L L L L L L L L L L L L L L L L L L L L L L L L L L L L t L L L L L L L L L L L L t L L L L L L L m m ns m. m m m ro m m m m m m E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E w w w w w w w w w w w w w w w w w w w w w w -- w w w w w w w w w w w w w w w w w N N al N 4J a/ N al al N aJ a1 N m al al N al m N m a/ N al Ol N N a) N a/ N al N N al al W a/ aJ N N aJ aJ al a/ a/ N a/ N m w jai v m w v m w m v w v a v v ar w ar v ar '... ar ar v v m m v v w v ar v m m v a w v v v m m w a v v w ar '.. LL 11 LL LL 11 11 LL w LL 11 11 LL 11 LL Il 11 11 w w 11 1.1 LL LL M LL LL w M 11 LL iz w Il 4A.. wiz m m 11 iz Il LL 11 11 iz --1 -- 1 -- 1 El wj m vl...,mo r, lm -:31 ko....rl. 4 m- ll�llnll�Ilm v mIN II �Ln M w N L m° NQ�T H w °l 1 H 0 owwo�mllm�NNw mml IIm N w�m�00�00 -I-nil-Il�ll'All-�f�II�II-�I,�II�nn-J).11,J).11-�l-� ;q,j u�i..,qapppg m..,,,00 �CO....L rl 00 LNLn r- C3) ��� �. �.uo Ln 5 w oN^ryalN,...a�m �IIN v m �...`H ;I. HlLQ t w t vLn .........owwo�m m�N } } cy M SKY Vl ti M S1' m e-I M a Vl 'y M V VW +��'F 'G°� V1 e-I m V lfl e-I M �ro N M V vi 2 U' a 11 h' l7 C7 C7 a a a a a H F N- H vi an F- H H H v1 �n �n w B-• F- b.- an I- F- a- H a a d CL H H uv vi in vi a s ... a :, a a a a ", ca.. c� a. a 7 >> C. a C. a a a a a q, aa. ea.. ':7 D D D 7 Z) Cn ci of o? m e$a o� o� of m of o� di di e n + + + + + + a 4 + F d + + + + + + + + 5T� ClID m m Ol Cn CT 01 Ol m m 00OOOO aOOOOO,OOOo000 vvetvvv vmmmmm mmcn rtis a vvvavmmm 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 a '«? ry N N N N N ra ry v v v v a v v +ar n n rw n n n n n m m m 0 0 0 0 0 0 0 C� O o 0 0 0 0 0 0 0 0 C1 CL o oOb 0 0 0 0 0 0 0 0 0 0 0 o cr 0 0 0'0 0 0 0 0 0 0 0 0 0 0 0 0 O CT O o o O o 0 0 0 o F- H O O C;Y '.. 0 0 0 O O O O o 0 0 0 0 0 0 o i] 0 0 0 0 0 0 0 0 0 0 o O o O 0 0 0 6O7 0 0 0 0 0 0 0 0 o w w o o LOS o 0 o 0 0 o O o 0 0 o O 9 .3 O 9 o 0 o O o 0 0 0 N N N N N N N N N N N N N N N N N N N d d a d d CL [1 a d d d d [L LL b CL' U U U U U U U %.,1 y Cf t..P U U U U U U U U W w �eUr � ""' F- H H p^°^' 9-• N^^' Z Z Z Z Z z Z Z Z Z Z Z Z Z C0." ~~~~~~ Ci L Cl d d d m y0a ta, m m L a a a a d d d 11 J ...A � i � ~~ W W W W W W >> ,w`"„ Z Z Z Z Z Z W W W W W W iJ9 7A,U W W W W W W W W W W yuJ. g', cc w cr =Z � w i z w W W �- L C, �ryryFO'",'ryM1s O + + + a CD O O CO7 o 0 0 O o OO O O O G;y g `� N N N L f0 IO f0 N0,10 f0 f0 IO fO + (�i i'ri'ryy 37j 4,+7 r T T } } N M t t N W w w N O C'S OY 4,] O •'-I N M �tl m m m m m m m m a a v v m m m m m m m "'' >' r r T r r m m m m m m m m m m m . ". `-' `� .m,,, >- '^ 0 >>>> v v c c c v a v m m m m n n n v v v v m m m '9;: " m a a a a a ry N N N v v v v o 0 0 o v v a v o 0 0 o n n n n o 0 0 in m m Ln o 0 0 0 �n �n Ln 7 7' O O 0 O O Kd NIN N N ,O 0 0 0 O e-1 .�I r-1 .�I N N N N N N N N O O O O i+l u7 ul v1 O O O O n n'.n v1 M^'V fin 0.n Ck CL O. a Kk V1 v1 ul Vl O O O O m Vl In In 3 J 7 J J 7 7 ',' w w L1 [L [1 Ct Vf vl 0.fN Vk d!Y }}}} Y 10 m m N m }} y} N t0 fa N w w w w N N w to w w w w to la N m w w w w w w w}} T T rl N m V In 1 Cl C1 [1 LL w r r r 0 0 0 o E E E E E �mv'�nrrrr,�m a�n}rrrNmauir}},},�mv J J 7 7 J Vl Vf Vf V1 Vl VI VI Vl VI VI Q, P! �] N to VI N t '` ..`~ m V In t 'C t c-I m a Ln t t " a a`......a 4 O o O VI N VI Vl y} {� C] 0 VI VI Vl Ln ro m m m m m m m m>>>>>>>>>> a s CL Ca. Z) Z Z) 7 a s C1 C.'Cr D Z) Z)� e1. CL CL Ca Z) D Z) Z) C1 a Ca. O O O O O O O O O O M CL CA. Ca. O; Ca O. CAL 4 C4 O: CL a. a Cb, a a a a a a a a a C7 C7 C9 C7 (D (D l7 l7 lD (J Vry... J a �'a ',a. c c c c c c c 7'Z : 7 c c c c J J z 03 o2f a'i o� o7j o3 ai1 o2J 66 .6 .6 oZ oii � a2i ab ob ob os ,� C+n iyry aPb w w w w 14- u7 �n �n w w w w of yr en an.... w w w w �n M an Va�l/ vv ura wa an an va 5a% ,;r. ,,�n I/� vv > E E E E E E E E E E E E E E E E E E E E E E E E E E E E E J J J J E E E E J 7 J J E E E E J 7 J 1 7^r 3;r `r > C C C C C C C C C C C ..0 mmm$ C£ a aK¢ o00 m mm am o5 amC mC m CL a a o00o 7 0 0 C l9 0 0 U a a a '3 3 .....3 ...... 3 3 •3 3 3 3 •3 3 3 3 3 3 3 3 3 3 '..... 7 c c a .. c c c 0 0 a 0 a c c c c c J _o O O L%" O 0 0 '... O #7 O Zs 41 O G3 O O O 010;. 0 0 0 0 0 0 0 , 0.. r "c - c - J J J J 7 J J J J J 7 J 7 7 7 J 7 7 J o U C C c' C C C �C, 'G C C` C 'C c '. C �C C'. C:, C' C c C C C c c C c O O O O O O O O O O O O O O O O O O O C U C w w WV w w w w qq ww w w TAa w w w' w w w w w w w w w w w O O > > > > > > > > > > > > > > > > > > > > > > > > > U U U u u u u u u u u u u V U u u u u 01 w ` qA w w WJ w w w w' w w qi�. w Yei w wM c c c c c c C c c c C C C C C C C C C C W c LL m.. 0-[1 CL £¢. O O O O O O O O O O O 17 O O O c)O O O w w C C C C C C C C C C G `1v m m m m IO m m IO m m m..'..,m IO m m mm IO f0 m IU (0 m m m fO w w w w w w w w w w w w>>> > > > > > > > > > > > > > > > > ,.. > > > d C a L L L L L L L L L L L L L L L L L L L L L L L L L L L m O m - - - - - - - - - H H H H - F- - - - I- - F- - - - - - - a v v v — _ _ — — _ _ — _ -. . •^ .... — — — — — — — — — — — — — — v m ro m m m m m m m wr Er m 'm m 'm 'm 'm 'm m 'm m m m'm m m m m m m m o m m m m m m F a F'E E E E E E E E E E E E E E E E E E E E E E E E E E E w w `1 v w w N `1 w w w w `1 w w `1 w w w V4 W W W W W W W W W W W W W W W W W W W W W W W W W W W l0 IG N N N N- io N (O F N ~~~~~~~~ F- ~~~~~~~~~~ E> E > C C C C C C C C C c C C G C C C C C C C C C C C C C C W W W W W W W W W w 0 w w w w w w w w w w w w w w w'... w E E E E E E E E E E w w w w w,w w wEu uE.r w>> w w w w w w w w w w w, cc ��w��w���� �'� w'� w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w L i _ W ''. W LL LL LL m E 11 E 11 11 LL LL m m LL 11 lL '. LL LL 11 U. y„ LL 11 LL LL I1 11 LL LL lL LL LL W '.. lL 474A„ AA. LL '.. LL LL LL W 11 ll LL I1 It M d' O Z W E 0) El N 00 00 m N 1� O� n n O V h N' w O m N 00 O m 0) M 0 00 m m O w lO N ID rl w N w H w IO N w w w N w c-1 m m H 00 w 00 M m In a -I m m m '-I 0) N 1� '-I Ot N '... I� .-� c-I m m 00 �"� m m 00 -1 I, m N I, 0\ N O 1� O N O I� O N m O r� � In O '4 00 L!i I� m w m I- M w m V I, m N a n m N N m m m N m m m m .-I 00 l0 m .-I 00 lD 00 W N '-I 00 00 In .-I l0 00 M m M 00 O M N Il m N N Il m N N lD 00 H N w w rl N N n m N 0 N m c-I m l0 w H m l0 w H V lD w e-I ID 00 rl V In I� ry yr uti n. u} u} u} u! n yr v� Vr in � vs vn U* .n .n n u} vi rn .n + ' .n n ,n n v* v* V 'A 'n n u} .n +n u* n'+n an 'A u* ✓* 'n a -I 0) lDD W V (a1 N Vl C Owl N l!1 l0 M...�.00 ..00 l�0 T W Vl 00 00 W W 00 Z, V1 00 00 W O V N O O In '., I� m l0 ul V N lD In V N lfl T O 00 N O 1� O n V n O n V I� lD Ill M w m w. a-1 V m rl .--I V m .4 w 1� m w w n m w m w ei m w e-I 7 N M m m N Cl) m m O W V M O t0 V m 00 O 1� V Ill m 0) N In M 00 e-I V m 00 a -I V N 1� O N N 1� O N N lD m H N lD m rl N Vl n m N In I� m N In I, '... m N In I, Ol a ul ID 00 /n LT i/} to in 1A in to '... VI V? i/}',ah N. 1n. V1 N V1.......,VT VT ✓l V} an V1 'n VY Vf }} Y r } Y Y } r} Y r }} Y r l} }}} r }} r> r r r} r} Y r .� m a In .� m a vri .}-� m a m .}� m v 0 .1 m a 0 .� m a In .� m a 0 m v In ,� m v In .� m v In ,� m v In ,ti m v In C7 C7 C7 l7 l7 U' l7 F- l7 l7 (7 l7 l7 l7 C7 U' U' rL l7 l7 l7 Q r � � F F F C7 C7 U' U' vl In � � In In vl In � � F r- In v, In In � � F � In vl v, In F F f- n.m m m m m am am am Dm_ m m m :?m dm 9-m ma ma m :?m >m >m m m m 7a1 00Cl of aof of of m f 7of a D_ a o0 Ot of 0) m (n 0) 0) Ot of 01 01 0) 0) 0m of of 0) m of m 0 m01 m m) m) m m m m) m m m m m m m m m m m m m m m m mo_ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m 'm m m m m m m m m 0 0 0 0 0 .� .� .� .� .� N�� a v v v a v a v m m m m m m m m m m m m m m m m m m m m m m m m v v v v 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 9��� 0� v v v v v v v v � n � � 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 a a a a o_ a d ri a a d a a o_ a a a a d o_ a d_ a a a a o_ a s o_ d d a_ a o_ a o_ d a d ri. a o_ a_(L 0- �f-f-f-F--f����F r���f ���0000r91F ��r�l W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W Z Z Z Z Z Z Z'.Z Z Z Z Z Z Z'.Z Z Z Z Z Z Z Z Z Z Z Z Z',Z Z Z'..Z Z Z Z Z Z Z Z'.Z Z Z Z Z'.Z Z Z Z Z Z 0L 0; C K C C C K K K K K 2 w K w w d"'... K K K x K w m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m 6 6 6 o m m m m 6 a a? m m m m n n n n m m m m m '~ `~ `-' m m m m m m m m m m m m 0 0 0 0 0 `" i 0 0 o 0 0 0 0 a 0 0 0 0 0 0 m m m m m 0 0 0 0 r o 0 0 0? o 0 0 o m m m m'o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o m m m m o 0 0 0 0 0 0 0 0 0 O O o o o o 0 0 0 0 o o o o O O o O o o o o O O o O O O o 0 0 0 o o n o 0 0 0 o O 0 0 0 O O 0 O 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0'0 0 O O O O N N N N O 0 0 0 In ul Vl Vl C C 0 0 c-i c-i f-1 N O O o O N N N N o o 0 O In InLn r-I '-I e-I .--I N N N N Ill Vl IA lf1 e-I rl �-i c-I N N N N 19 T 10 IO 1a m N IO IU N N IO f0 N 10 f0 fO N N m . � . ". f0 f0 v . '.., . I0 Ip v v v 01 l0 I`p Ip Ip v 01 v v O I`p Ip Ip v O1 O1 01 Ip ry N t6 v v v v Ip 1p ry (6 v O1 v v Ip Ip I0 ly r v v v v Y} Y Y v v v O1 Y Y Y Y 0J v O1 y r}} Y 01 0J 01 v} Vl e-I m v 0 Y Y Y Y a -I m d' Ill Y r}> .--I m V o> Y r r .--I m V V7 >- >- r r .-1 M a ul } Y Y} t M V In In tf� t t .� m v m t t C t .� m y Ill � C t t .� m y In t t t t .ti m y In t t t t `� m y In t t t O to vl '.. In Vl O O O 0 0 0 0 vl O '. O O O In V1 In to O O O O Nl in to 0 O O O O to vl In ''. Vf O O O 0 Vl In N vl O O O O a > > > > a a a 0. > > > > aa a a > > > a. a a a > > > > a a a. a. > > > > a a a a > > > > a a. a a a a a a a l a a s a a a a a n a. a. a a a a a a. a. a C C C C > a > > > C C C C > > > C C C C > > > > C C C C 3 3 7 7 C C C C > > > 3 C C C C 3 3 3 In v w w 0) Vl 0 0 Vl v v w 01 0 VI 0 0 0J 01 w 01 Vl Vl Vl VI u 0J 01 v In V1 ✓) V1 01 w 0J ED an Vl Vl VI w (u 01 0Vl V1 0 Vl E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E Ea E E>>>= E E E EE E E E>>>> E E E E>> aCO l7 l7 C7 l7 a a a a l7 C7 C7 l7 a a I a a l7 C7 l7 C7 a a a a l7 l7 C7 l7 a a a aaC lE7 lE7 lE7 ''... CE7 aC aC aC C lE7 ICE7 'CE7 lE7 >>>> v C C C C v v v v v v v C C C > > v v C C C C > Om m > > > > > > > > >> > > O aa O O O O O O O O am ao 12 O O O O O O O O O O a a C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C O O O O O O O O O O O O O O O O O O O O O O O O O O O O O '.. O O O O O O O O O O O O O O O O O O O O C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C v v v v v v v v v v v v v v v l y v v v v v v v v v v v v v v v v v v v v v v v v v v l y v v v v v v `1 `J v v v `1 `1 `1 `1 `1 v v 2 2 2 v `1 v `1 d `1 v v v d mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm 01 `1 v 0/ `1 ` d v E E E E E E E E E E E E E E E E E E E E E E E E E E E E E'E E E E E E E E E E E E E E E E E E E E w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w m m m m m m m m m m m m m m m m m m m m m m m m m m m m m' m m m m m m m m m m m m m m m m m m m m 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 v v v v v v v v v v.... v'v v v v v vv vl C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C v 01 01 v v v 0l v v 01 01 01 v O1 Ol 01 01 v 01 v 01 01 v v 01 0J v 0/ (uv v w . w v v 01 v v 01 01 v v 01 v 01 v v v K C D_' K 1' 1' K K d' K K 0C 0C of w w w of a' w 1' w of 01 v v 0/ v 01 v v OJ 01 v v Ol 01 v v v 01 01 v 01 01 01 01 01 OJ v v v v 01 v 01 01 01 v v v v 01 ''. v v 01 01 v 01 v v v w w W W w "'. w W W W w w w W W w w W W W W W W W W w W W W W W w w w W w w W W W W w W w w W W W W w `/ `1 OJ Ol `1 v O1 �1 `! O) v ` v OJ Ol i �1 Ol 01 W `J `1 `1 v L LL 11 11 LL LL LL 11 11 LA. LL LL 11 LL LL W I1 I1 LL 11 11 LL LL LL FL LL LL LL LL LL 11 LL LL I1 LL LL LL 11 LL 11 w LL LL LL ll LL LL 11 11 LL El �Iau Ln r, AI m� m� wIl�� mll ill w. �l m.�l�l�� mll all mil.~IMI� m�� m1a�o wIlo. m�N �..,,. moll w� m......... N �IOIlo IMINO-1-1lD a w m eh w O m a 00 o M N m eh m N m a m' e-I N N e•-I e-I N N N I� m m ei m N W a m ei N 1p a mI� m N w lO oo o�k �....� II��r, mllr, mlmILo � m m�wl~...ml� 5� m�4llw�^um�m m m r, ;t Ln �c,�OoA I T o olm �l.......m rpm mPn 1-1�II+f�IIIn +��+�Il+i*IIti*Ilwf�*I+i*f�nllnf.n rAimlFaacacamMM iMM90901^ r r} r r>} r r r r r} r r r a m ,� ry m a m v v'yi .� N m a m .� m a u) m a Ln m a Ln m a m m `~ m a m m a a n (7 0 C7 l7 0a a a a a (D0(D 7222�i (DcD002:E22cD(DL9(D (DUL ¢QaaaaQaa'aa 0 in vJ va F- '.., F_ H F-- m m m m H H F_ F_ m m m m F- F H H m m m U U u '.... U U U U U U U a cti. CM. a R., d a a a a 7 D 7 7 7 a a a a 7 7 7 7 a a a a 7 7 7 7 a a a a 7++ m of m of of of of d� o� of m n ci± m n o� di a. . . ai moidia I.d�aio�dio,d�dividiaiofdio+o�o�di00000...0a a'aavaaaavvv „I.�t a^r mayday m m m m m m m m m m m m m m m m m Im m m 0 0 0 0 0 O O N N N N N N N N N N N N N N N N N N N N N m m m m m m m m m m m m m m m m m m m m 0 '.. O O O O O O 0 0 0 0 0 0 0 0 O O O O tim7 O O O O O O v a v m m m m m m m m m m m m m m m m o 0 0 0 o 0 0 0,0 0 0 0 0 0 0 O O o 0 �a 0 ca' 0 0 0 O o O 1� n n i"^• m m m m ', m m m m m m m' m m m m m 0 0 0 0 0 0 0 0 0 0 0 0 0 O O 0 0 0 O O O O 0 0 0 0 0 0 0 0 0 a N N N N N' Q Q a a Q Q Q a a Q Q w Q Q Q¢ Q Q I dd'a� daari zdadaa''dri aaad''adaaaadcti ddadaadaddya.a ari addada w F H H F- H H H H H H H H H H H H H F- H H H H H P^ ry..... H F F- H H H F- . H W W W IW W l w W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W w qdN W W W W W W W W 'Z Z Z Z, Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z K K .. Or GC K K K C K Or K f w w w K w w w w o' w w w Vim. w w w w K K C¢ K ',, K K 2' ¢ CA m m m can m m m m m m m 0 m m m m m..''.m m m m.......,m a v...,m �rX m m m m m mm v v a v v m m m m m m m m m m m T,$] csv m m m m+p Cp m N N N N N zt m m m m m m m m m m m m i7'U m m m N N N N N v v v a m CrI l m in m m m a� ��y n C�}� �~ �~-~ v v a a v OO �:k m m m ¢4TM1 O O O O Cytl O O !'] C �'O Q o o o O O O O O C1 C'S OO, C O CP i7� �J O O j O Y. UI v v N v}}}}} ````` O' O O N W'Y Wb lfb O O O 4,0. O O' O O O O O C] O o '-I N m a In c-I N M a to N N m N N '.. of o CS L r* u.,. vi vi XrS ^� +^« No tN f4 4 ��yq ppG� m m m m m •C 'a^^ +� "a 'C'. > i m > m n 'L % m Yn 1� n n n M H N N N W a a a a a J J J J J Ca es O y N m a n O (o ro ro fa ro (o m a 'd.. O. a fo t0 N to W W W W W W W W tO N f0 m N N N N N a a a a d om o, o.. rn m W W W W} r r r N W W N} Y} r N W W N }}}} N W W W `i c-1 N. �I .-I O O O O O i O J ,^ ,''' q qO„ N m a In r } } r rl m a m } } } r .ti m a m r } r } �- 4di w/Y usT tid'q M+Y .� m a �n ,.a .� m a �n ,� m '.... a Ln ,� m a m W W W W w a` a` a a` a? j? j? coy o, coi CL �a vJ m m m C t '' V 'C' 'C' t; C 'C" O O :a W O 5a O cs m m m m O O O O' m m m m O Ld.. O Ca. m m m m r Y r} Y N io T -2 N a a Xrp say wry uf5 alV } 7 7 7 7 C, 'ct O, Ca 7 7 7 7 ao Oa ca. R 7 7 7 7 cy c0.. f3 K,L7 7 7 7� N m a m n. d a d a ,y a CL CL G1 '' M e1 M CL M I CA. 1� CA Q Q Q Q Q a a a a a O O O O O j j E E C C C C J J J J C C C C J J ,', J C C C C ',7 JI J J C C C C U U U U U U U U U U d d d a d C C C C C 7 W W W W to arry uro vu W W W W m m cn r+"u W W W W un �a m m W W W W c c c c>>>> c.....'.c c..c > j....c = c c c clE E E E E....''E E E o 0 0.....'o o 'o 'o o' o' 'o m m io m m is R m m m o :� J J J E E E E U C7 (D C7 0 C7 Q U 0 l7 a a a a a a a m a a 0 O c aJ v iv c c c v v y W c c c c 03 ao7J ob oil a� o7i ab a2f ab a21 a2i '.... ab ab o4 obi co 0 0 03 O O O O N p O O O m m p O O O m i0 m>' 0 0 0 0 o 'a-0 _0 -0 -a -a -o -0 -0 -0 -0 -0 -0 -0 -0 a -0 -0 -0 -0 -0U` C7 l7 l7 a a a a V' l7 0 l7 d a d a C7 U' C7 ''.... C7 [q... a a a C7 0 l7 l7 J J J J = J J '.... 3 J J J J = J J J J J J= J 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 C C C C C C C C C C C C' 0' O O O O 2 � O U U U V U U '' U U U U U' '.. O O .a O CJ %D O O O �'Y c7' 0e5 q' a 00 o 0 p 0 ry o ti� ea� ra O [�' �U U U U V U U U U U G. C C C C O8.." C C C C C: 'C C C; H H w H F- � F- F- w F- F- F- W W W WJ W G},w W W W W W W { yea yky W yy W W W W W W W W W W W W W W W W W W W W WW W W a w `o a, CL CL.. m n d 0, CL 0. 6.. a- m m a- &'a.. r. C C C '... C C C C C C C C C C C C C C C C C C �'� m o 0 0 0 0 0 0 0 o a o 0 0 0 0 0 0 0 0 0 0 L L L L L L L L L L L L L L L L L L L L L L L L L L L L <<<<<<< V < V<<<<< V F.-H H H F- F- H H �-- H H F- F- H H H a Q + Q� a a Q a ',, n�anry. Q 'eC a Qrny Q� a s n Q� w Qyq�,r aryy Q u� Qrqq ,'m to wv 'm fo as .� ro fo 'm ra •(a .� io ra .� m ro m �m •to 'ro d d � Q Q +x �& � � Q Q Q sL "� <Z a 4.. +i E E E E E E E E E E E E E E E E E E E E E E E E EIE E>>>>> »>>>> >>>>>> E w w w w w w w w w w W Ln w w L J w w w w w w W W W W w w io io is ra ro is is ra ro io ro ttf fq m io '.. is io is m m cc ro mf wtta mro rtg is m io ttf fa .»7 io is io iv Tq MY m im m m mp mp .� io io arr +wF 3 3 MU5� WW W WW W W W W W W W W W W W W W W CC C i,: C C C C C C C C 'C C 'C.'. C C C C C C C *.'W', C C C '(,: C C' C C C C C C C C C C W W W W 0.ktl 'W W W W W W W W W W W W W W W W W W 'W kA W W W bC 0 Rk'W v v W W 0 W W W v v K C C d7C 1 ft w w K K CC [L �" cr dz w nk" ft K CL. �7G {' '. tZ' 2' CC RS.' {C. GL SL" [C d' C dam. wl 2l 1J1 Wail `J `) WI I Wl WN W W pI W W p11 W Wl Uu O/I Ulu 0J G/ O) W^ WII Ul II W1. v w WII W W11 vj v W W WI Wl WIIw LL w� oWownwVwlw�wllwllWowllwVwllwl .[wlwVwiwlwVMil wV IiZM MIIiL!Z1Z �IwILLVwVwVWII� El O O m lmO N o W m m N Li Oil n m o0 r W V '.... m m O oo m m In O n M o0 m O n m o0 r oo 'T m m m N O .--� m lD ID Vl V t0 n lD m O m n o0 m O M n W In V ID n N 111 ID n W m O m n OO V m N In m V W n m In .-i Vl N w V M .ti oo V N O N O -o n ID m O -o n w oO o0 7 N 0 H m V N O N O m n w In m m m W w O N f-1 lD N m w N n m m m In m � q V m lD m �--I V w m H V e-I o m H V m In W H V M LD w rl V N V w m H N N n m N — — — — - - - - V} V} — - V} V} — VT VT VT VT V} Lf VT VT VT V} N V} VIA V/ V} Vw V>' VT V} m m L IN O �c o r, m m w n N w tnn On o m LD On o m w N w T N w m w Oml N llo m On O m w od N Ln Lri om O 'mm� On Ln oo cn m to Vl In. V} LA to V1 V) V}''...1/T Vl� V1. V} V} V} N V? PA rn VT VT V} V! VT V1 VL VT VT VT V} Vn V} VT VT Vn VY In VT U! VT Vf V1 VT In VY 'A V}i{n 4^ } } > > r > > > > } } r > r> > > r r r r > Y �,� �n�i m va va a a ¢ ¢ a a ¢ ¢ a a N M V li I �--I N M V Vl c-I N m V ul e-I N M V VI c-1 N m j Y}} Y Y Y Y r} Y (D '.., 0 U (D a a a¢ o_ 17 0 17 17 C7 a a a a a J J J Vl Vf VI VI VI '.... V1 Vf N to a Q Q a Q Q¢ Q a Q D_ D_ a s O_ F F F F F � : R 7 7 u U u u U u '..... u U U u D_ a a a >>>>>>>> u u u U U u u u u U m m m m m m m m m m m m m m of m m m m m m m m c� m ai m m m m m m m m m m ci m c, m m c, m m m m m m of v v v a v vlv v It m m m m m m m m m m m m m m m m m m m mlm m m m m m m m m m� a v v v v a v a v N N N N N N N N N V' V Kt V V' � V a a V V a V�'t v a* v v v "I. v a a ,T v v a v n n n n n n n n n n O O O O O O O O O o O O O O O O O O O o o O O O o O O O o O O O O O O o O O O o o O O O O O o O O o O O o O O o o o O o O O O O o O O O O O o O O O O o O O o O o O o O O o o O O O o O O O o O O o O O O O O o O O O O O O O O O O O O O O O O O O O o O O o o o O O O O O O O O O O O O O O O O o O a a a a a a a a a¢ a a a a a a a¢¢¢ a a a a a< a a a a a a a a a¢ a a a a a a a a m a¢ a a d o d a a d d o a a a a a a d a d a o 0 0 0 'd o d a o M a a o o a o 0 o dd d a d d F WWWWWWWWWWWWWWWWWWWWW W WWW WW W W W W W W W W W W W WWWWWZ Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z ZK K R' K D: K K OC K K K C OC ''... tnK K� r.. m m m m m m m m m m m m m m m v a v a) 0)m m m m m v v v v a a' a IT v v v v n n n n n a a a a a o 0 0 0 o m m m m m N N N N N O O O O O M M In In - m m m m m '.O O O O o O O O O c)W � N N N N N V V V V T 'Ln LA m LA Ln O O O O O 0 0 0 0 0 N N N N N f T In In In f0 f0 IO l0 fO fC 10 lU l0 fO W W N N N N N N N N N w W w N w N w w N w w w w w w w w w w T}}}} T } } } } } } } } } N m ro ra ro Y } } } } Y Y } > Y ci N m -,Tn m m m m m rl N M V In w w w w w w mOwl m m N M V Vl d' a a a ''.... a)•--� N m V V1 m m m m m t 1 1= �} y y }} m m m m 7 > > > J V V V V J J J 3 O O o o O V V 7 � a V a V V a a, a s a. t N M V t O O O o o a a a a D. O O o o ''...O ..... a o 0 0 0 o a a a a a In In In In In a n. a a a �n In In In In o o O o 0 iy N .-i ci O O 0 0 O N N N N N O. O O O O>>>>> O O O O O N N N N N O O O O O In In In m m O O O O O In 1n V1 VI Vl a a a a a `m `w `m `m `m a a a a a n: a a a a m `m m `m m` w w w w w w w w w >>>>>> 3 >> w w w w w w w w w w lommY}Y,Y> mla la m maaaaaln of In In vl>}Y>}mmm mm>Yrr} wwww m N m v In a s n a a ti N m a n a a o a a o o o o o E E E E E N m `n o 0 o a o N m v In d a d a¢ In In In In In In In In In Q Q a ¢ Q a a Q a Q ._ ._ ._ ._ ._ . 3 . In In In In In In In In In In a Q Q Q a a ¢ Q a Q z) >> U u u'.0 u U'..0 u'.0 U a ala` a s c c c c_ c_ D� � z) 7 7 7 z) z) D u u u u u U u u u u > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > O O O O O O O o o O O O O O O O O O O N n] N N O N O O O O O O o O O O O O O O O O O O O O o 17 17 0 0 19 17 17 19 17 17 19 ID '..... 17 0 U 17 17 17 17 a a a a a a a a a a 17 17 17 17 17 17 17 17 19 17 17 17 0 17 11 17 17 19 17 17 a of o6 o3 ob o6 0 0 c6 ob ob o6 o6 o6 o6 c6 c2 '.oil oil 0 o6 ',ob o6 o6 ca oD oiJ ob D6 o6 oL o3 o6 o6 0 0 o6 o6 o6 o3 c6 a o� ob oil oa o6 o6 ob v v v Iv v v -o v v v O O O O O O O O O O O O O O O O O O O O O'.. O O O O O O O O O O O O O O O O O O O O O O'. O O O O O O u u u u U U u u u u u u U u U u u u u u u U u u u u u U U u u u u u u u u u u U u u u u U u u u u D_ a m a a a a a a a a a a a a a a a a a a a F F I F F F F w F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w j w w w w w w w w w w w w w w O O O O D O O O O o O O O o o O O O O O o O O O O O O C C C C c C c C C C C C c C C C C C C C C C C C C c C c c c C C C C C c c c C C C C C C C C c C C O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O Vf Vf N VI VI V1 VI Vl < < In VI In Vl < Vf < < < < < VI < < < Vl VI N Vf VI VI Vf Vl VI Vl Vl VI Vl ✓1 VI Vl VI VI. < In VI Vf In VI a a a a a ¢aaaaa ¢ a a a a a a a a a a a a a a a Q a a a a a a a a a¢ a a a a a a¢ a¢ a a > > > > > > > > > >I> > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > a a¢ a a a a a a a a a a a a a a,a a a a a a a a a a a a a Q m m m m m m m m m m m m m m m m mN m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 E '3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 E 3 3 w w w w w w w w w w '..... w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w .. w w K [C CL w O! OC O_' K O_' C C K (L C O! 0_' K ',, [C C K �' K SL' Ct 2' ',,, 1' K oC ',. w ',. D_' w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w., w w w w > > T. w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w v v w w w v w w w w w w w w v w w w w w w w v v w w w v v w w v v w w v w v w v w w w v w w v w w LL LL 11 11 IL LL - - - LL w ll 11 IL W 11 M jZ LL IL 11 11 LL i m Il 11 IL LL LL 11 11 W LL IL 11 w LL ll 11 LL Il Il IL W LL LL LL 11 It M O z_ W ^E W 0) El zr V w o Ln W O ID O m w Vn V} J N a a d an vvvv n o 0000000000oa 0000 oo'ooc aaaa W W Z Z W N ''., n Ln n ''.. m to M a m o W Z '-1 V r-I n w m N H n m m W 1I1 Ifl .-i m w In 1n VA V 4/%cc CL �. F- a a9 a e o �t a n n. o 0000000 oa a W W Z Z Z Q w VA LD m an ?a a.. �t n Q cx,.. r- W m m r w ifl m o 'A m cc ♦- a d vvvv o oo a a F- W Z N m m V rl I, </A a cc ♦- a a a a d F- W Z In lw rl N m m VA m cc ♦- a oA n oo a a F- W Z W N N ID n M 'A N vl m n a a W Z [L' W Vl 1p Ln nn AA N Adb r n a W 'ic°' aC m m W 4n ''., M o Dap UA.. M 1n ar n a W ar N m m V 'y n o nn v Vl d v n 000aaoo00000000or�ca 000ca00000000000lacs o0oro0000000000ocs a a W Z [C V) w H N O '.. m m tiCM N o a o a a W Z m w N V} N O N m N �--� VA m �t n a a W Z [C V O m N O O co o V}....,,tn N V.r'1. ar S n �e nL W Z 00 N n t/T m n m w r M Ul d v n a¢ a W Z lx: c-I n m L1 n l0 H .� in r V N > d a n s W Z ae. a rl N Vf m lfl al m ln.V} r VA m > d v n a ai W Z [Y N m N £a"F'Md•Y m O al N r>>> .� Q u m m m a a W Z C N n r 00 N a o N,. N Q u o m m a a W Z [C W w +J"} W m 00 n Ll M Q u 0 m m a d W Z [C m O m "NA �-I VA V O In v Q u o m m a cL W Z [C 1p m H 'Gtl'k Q l0 O m VT r l,A Q u a! m m a d W Z [C m l0 N '6Cq ',. W N o m N r '-1 a u an m m a d W Z K N...O m V Cfn 00 Vl lD vn in r N Q u d m m a m W Z LY c-I n va O n .� o0 to >»' M Q u o m m a a W Z w V m ''. +J^M• V m W o N W'a" s0. a ai m a W Z S V e-1 t/F n rl W m in d"y a t ax a srn ai (YJ "a' O n +n rl ci 00 N r ,,,� a a.. J a�ro t a�. W w N m V In 00 N ID Ln de% r> J a a a m m o0oa000000o0 o ovooO00000000gg000 a a W Z aX, O .-I n in O n .ti o0 a s ci trn m �a M (Y9 w n m to V m Oo o W r a s o m m 000000000000 a''a i W Z aC C Vl [q m rl H In V1 n rl .-I la ID vi m .� 4A6 dlM > r ,� J a H a a an m m m m m a m ai W W Z Z w K N n ct VT [a N a o VI r ry H a,a m m m a a W Z w �.,... m r-I W w 1n fa M CO n LA r m F- F- d m m a L W Z cc N m O m vlA ei In V o in r> v a...a m m m a L F- W Z LY l0 la m c-I N"F la o m 'n m m m m a a W Z "'.aL la N In N 4n M O M N In l0 >>>>> d m m a a W Z K N N n '., V lf} 00 N v Ln In r>> N (7 o m m a a W Z = m a --I w W 4n oo m co n M l7 a a, m a a W Z [Y N m o m in '-1 Vl V o iVf V l7 d m m oO a<< a W Z CC. la W m V} V la O M V), r m l7 m m m a W Z w M M w V). W N O m 'A r �y a m m a z cc N N m r W m lL) m Vn r N a ] ai m a Z cr 00 O rl VI O n .-I co r M a :? d m m 00 00 a F- W Z x co n 7 of m W o r V CL o m m L W Z cc m a) ¢ v n n a) v n m m v v n n m v m v m c m v m v m m m m m m m m m m m m m m m m m,m m m m �.....�. 0 0 0 0 0 0 0 0 m m n^ m m'...m n n o n 0 n 0 n 0 n 0 m m m m m m 0 m 0 m 0 oA 0 m 0 m m m m m m m m m m a, m o m o m o m N^ n uoi '... voi n n n N n m m m m m ui � m o rn �.� o o o o o 0 rn m m m o rn m m n` '', ` n o 0 o.''.,o o n nn n w w > >- w >- w w > >- L o m c N w w m w w m w m w m w m w m w m w w of 0i w w ami m n m o m n `n n......n m m m m m M t t m w 'o r m w r>> m w m w m w r m a m v m a' m v m v >>> �--� N M r> V to m m m m m r �--� r N r M r> V Lf1 N N m� In m w m w m w m w m w m m m m m Y rl T>} N M I rm o. 0 a o OL 'i m y uA n n n n n>> m m m m m>>> t� o 0 o o � r» r r rn m T rn m 3 3> j cc as ax sa o o o a� o o a a a a a o rn 6 rn 6 6 o a a a a a ax as ca rct s0 .� ' ' N "" m a o 0 0 0 0 0 a a ai r vai o n ca c`a ar. o az. as cb 'cl o ca m n m n n o d 0 0 0 0 ` m n m n rn ` o 0 0 .o o ca vn n w' ax en ai cw,. V' C rn , m n ` rn i o 0 0 •o 3? £A. '' O. ax Co, m m m m m d d a d m m m m m ai a s ai a a ao."an cl m ''... m m m - a a a a D� n w w w w w m is m io m> w w r>>> w w w m m m m m a 3>>> a a a a u� v'a^n �u nn i> '.., i i i m 0 c o o o E E E E E r N m v'Ln a'a a a a ry m r v a a a a a o 0 0 0 o E'E E E E E E E E N'm v n a a a a > a` c > c > c > c > c>» rn vA m m z) 7 rn z) v, z):D m z) m z) Q U a U a U a U Q U'U Q Q U a U Q U Q U - a '- •- •- - cn vA vA v, vA vA rn �n is is m io m io _a m i0 is > > > > > > > > > > > > > > > > > > > > m m m m .- N .- .- .- >O a a a a a a a a a a O (O O (O O (O O (O o (9 O U O 0 O (O o U O (O O (O O U O Q O (O O (D O l7 O (O O U O (9 O (O a a m a m a a a N a N a i0 a O (O O CO O l7 O (7 'l7 O O (O O (7 O (O (O 03 oD ob 06 06 06 06 06 ob oD o3 06 06 06 of ca 01 oil'ob 06 06 06 06 o'a 06 cif Da 06 06 06 06 ob (Z 0 oa '.... 06 06 06 o3 03 06 06 ca cif 06 03 06 06 06 - 0 0 0 0 0 0 0 00 -2 0 0 00 0 0 0 0'0 0 0 2 o 0 0 o o 0 0 2-2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 u u u u u''u u u u ''... u u u u u u u u u u u (F u'u u u u u u u u u u,u u u u u u u u u u u u u u u u u a a a a a a a a a F- a s a. a a a '.F- a a a a a a a a a a a a a a a F- a F- a F- a a a a a a a a a ''..,c- a a a a a a a w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w F- w o O O O O O O O O o O O O O o O o O o O O o` O O o O O o O O O o o O o n o o O O O O o o O o O o. 0 C C C C C C C C C C C C C C C C C C C C C C C C C C C C C c c C C c C O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O o O O C O O c O c O c O C O C O c O c O c O c O C O C O. C c 9 -o v v -o -o�Iv -o -o - v m-a o v v U -o v-D v-D-D v -0 v "6 v -0 V� -0 -0',. V V -0 v� ',, v v� 99 "O v B v a v a a aaaa aaaa v � v �',,� aaaaa "O v � � a "6 Q a a a a a a a a a a a a a a a Q a a a a a a a Q a a a a a a ✓n vro ¢QaaaQ�aaaaQaaQlaQaQQaQaa<%aaQaaaa vA v+ m ua vA rn rn +n rn vF ,n e,rr wvti wn an wn ww vv re«n w'w v rrn vn aea uAn con um a>:�>a>5-5 >>»>>>a>>>a>»>>> a;. a>>>>;�>>>;�> <n ar? aQa�ra¢a e__,aaa Qaa.aaaQQa'Q¢ aQQaaQQ'-Q m m m m m m m m m m m m Mp m m m m m m m mp m m m m m m m m m m W m m m m m m m m Mk 0 —Q--¢--- m m m m m m 4 3 w 3 3 w 3 3 3 3 3 3 3 a $ 3 3 3 3. 3 m a+ C C c w w a<' C C w C c w C w C w C w C w C c aw w ar w C w C C c c'..w C as w a. c C w C w C w'..w C C: w ar w C C c c c C C C c c C c c aw•. c w w w w w w w su w w w w w w w w w 0y py w w w w [C w to w tlC w iCK w 2K ar R' tYw' CC iCwC 6;Kn san [ CC [L' CC K 4L' fib tA". K iRK d�.'.. R.K aK, aK YIf T } T >.: > ? >. T > > > >'�. T, > > ? > >'',. } ] Y ,,..... > > > > > T > Y W > W T W > > T .,', > >. >. ?, ? T > Y ww qywwwvwwaw W W W w W W W W W W W ,LL 1 L LL LL Ll L1 LL LL µ, LL LL LL IL LL iz IL z. 11 LL lL LA.. LL X LL 11 lL LZ LL LL Il LL LL Il lL LA.. LL 11 LL LL It M d' ti O Z W E W 0) El v W rl 1- lj n ri W M v m ci In m N N m 1D m VT Ol n c-I r 0 N Vl 0.n In m o W o O r,W %6 lO V 0 W CD n VII W In o O w O N 0) N M N 0- n m YA 10 III M r m W 00 N 10 rn n V 00 M 00 '.., m c-I 00 V O m '... In m rvl 1� m r, m V} ID lfl m V n V 0 V} W co N W rn N r,m V} V 00 M W °�° .-I VY .ti 00 O m N ri V} l0 .-I �--i m w M .o O, n T N Ill Vl V m 1D o O r,W r^ ID V 00 r.-m kd"'J W Vl O v r7 t^ In M N m w m Vl Ol I� V vo N m V1 In M lO 0 CD r,W Vl l0 V O 00 on n ',N W II1 o O ry O N V} Ol N M N m n m V} W vl m V r t w VT W N IO m N- n U1 W ri 00 m if co V O of T r-I V n 1D ID c-I N r,m N Vl n �"� m W m n N In y N N w In ti 0 lO N m w VI N ul n Vl m �-1 V1'',.. W n .-i -....,.-i— N W N U} OI ry M m W 0.4 V V? m w V Ill V? In N lD — C O W w Vl N 00 n Vl m W VI V1 O n lD VI n N W N VF DI v N m Vl m W 0-;t -;rm Vl m rn W y Vl V n ul N 10 — V W w ri ry 00 n — e c-I H O, W N ci — N r..m N n .� a --I m — p m '~ o M y — I} d }}} ei U' N C7 m C7 }} 0 U< In Y rl a Y N D_ r m a } a a } Vl a J J m }a J } ,.-I c G } ''., N c G } m C C Y V c G } In c G } c-I (7 Y N C7 Y M C7 Y V l7 r V1 C7 } ri a } N a r..y M a V a } Ifl a r 0 U' } N C7 Y M U` } V In a -I a N a M. a V a VI a J r,4 J M J J N M �+ a a a a a a a a a a a a a a a r������ �^ �� �^ �� �^ � a a a << a a a a o_ a s a a a OI U 0, U M U 0) U m U 0, U Ol U 0, U 0, U O, U Ol aa,a.....a m 0) 0, 0, a m a m a 0, a 0, a 0, a 0, m 7 m 7 m m m m m m 7 Ol Z, 0, U D, U Ol U O, U O, U m U m U m U m U m U m a m s m m m m m m m m m m m m m m rn m m m m m m rn rn m m m m m m D, m m m m m m m m 0n rn m m m m m m D, m rn rn D, m m m m m 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 a 0 a 0 a 0 a 0 a 0 a 0 a 0 a 0 a 0 aaD_ 0 0 aa ''. 0 0 a 0 a 0 a 0 s 0 a 0 a 0 a 0 a 0 a 0 a 0 ''.. a o a a a o a 0 a 0 a 0 a 0 a 0 a 0 a 00 a a 0 a 0 a 0 a 0 a 0 a 0 a d 0 a a 0 a a a o_ a a a a a a a a a a a a a d d_ a d o_ a o_ o_ a o_ cL d a o_ d a a o_ cL o_ a a a a ��F-- L a a D_ d o_ a a& a a a W W W W W W j W W W W W W W W W W W W W W W WWW W W W W W W W W W W W W W W W W W W W W W W W W W z K z K z K z K z C z z K Z Of z z '.K z K Z K . z w Z w Z 00 Z a' Z K Z C Z K Z K Z KiK Z Z Z Z Z Z Z Z z z Z Z CC ,,...�. Z w Z w Z w z cc Z'Z K''...w z K z C z W z K z K z 0mm z z ...m.. z z K Ol Ol OI Ol DI DI m Ol Ol 41 m Ol O, O, m m m m 01 m v 01 0 v OI m D, m v Ol m v m m m m m '-I .� .� .� .� m m m m m m m N m ,O1-I m m a v m v m a v v m m m rn m m o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 m m m m m. 0 0 0 0 o 0 0 0 0 0 0 0 o 0 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o m o, a D, m a rn a 0 0 C 0 C 0 O o O 0 O 0 N 0 �. 0 �. 0 0 O' O' O O r O C O C O C O O O C O N O O N O O N N ` N N 0 0 0 rl O C C 0 0 ` N W N N O O O.O O O m v O, Ol Ol Ol O, MM m 01 m v m 01 tG v m 01 0J N r N r N r N r O1 D, Q7 Ol DI m 01 m 01 m Ol m 01 m 0/ O1 Ol O, Ol m}} m O/ m v m 01 m 0/ m 0J r } 01 } r > N `m N N r m m '... Dl m D, m D, m m r r r r r r r1 ry m v In m` `m m m m m m m m m m m m m m r} N r m r a r m m D, o, rn. m al m m R '� N r}} M V Vl .-I N m a 0 01 m 01 m 01 In j iy O c-I O .--I O rl O ". '-I O ci j N j m m V j In j tf O t O t O t'� O O 01 r w r N v r M v r V OJ r 0 a -I O O O O O j j j j j R O O CD O 0 O O j j j > > r O r O C O t O r O >- Y r N r nl d O o O 0 O 0 O 0.0 O a aaa a a. a a a l a '~ 0 o 0 C 0 C 0 0 0 o a a a a a 0 0 0 0 0 a a a a a a a a a a, , O rj '-7 .ti ati .-i O O O O O>>>> ", a O O O O O r1 c-i ati .-i .ti O O O O O N N N N N O O O O O>>>>> O O O a . Vl VI VI to VI a a a. a.. a a a a a 3 > > a a a a aaa a VI N Y Y } } Y f0 IO fO fO i0 } , Y } } } f0 (0 i0 (0 (0 a a a a a > Vl > Vl > VI a a a 0 0 0 0 o E E E EiE '. .� N m a In a a a a a .� N m a In a a a a a o 0 0 0 0 In � a U s U a...a U' U a U s '.. U a U a U a U a U d ti a s '. a >>>>> c c c c '.. c_ �D 7� 7 7 N 7 7� N � a U U U U U a U a U a U a U a U a U a U a a a a` a _....= ._ > O > O > O > O > O > O > O > O > O > 0 > > > > > > > > > > > > > > > > > > > > >%%% W C9 (D l7 C9 7 7 7000a a0 a a a a U C7 l9 0 U 0 CD (D 0 17 lD (D U U C7 U l7 l7 0 C7 a s aaaaa a ob 06 06 03 06 06 ''...06 06 a 06 06 03 06 03 06 '.,,06 ob 0b 06 06 06 06 06 06 04 06 06 06 co 0L 06 oil 06 O21 02 02 oD 06 03 ca 06 om 0b ob oif 06 03 06 06 v O J v 00 v 3 v 0J v 7' v J v J v J v 0J v 3 v 0) -0 0J -0-0 J O '...... v J v 7 v O -0 0] v 0J ''..... v O v J v 0] v J v 7>> v- J v J v J . v O v J v J> v -0 >> v v O -0 J v J v J -o J -o J -0 O -0 J -0 J -0v 3 J v J J O U O U O U O U O U O U O U O U O U O U O U O u O ''. U O u O U O '.0 O u O U O U O U O '..0 O U O U O U O U O U O U O U O U O'.. U O U O V O U O U O U O U O U O U O U O U O U O U O U O U O U O u O U O U 0 U a a a a a a a a a a a a a a a, a a a a a'..,a O O O O O O O O o O O O o O 2-0 O O O O O O- O O C O c O C O "'. C O c O c O c O C O C O c O C O c O c .. O c O c O c O c O c O C O C O c O c O c O C O c O c O c O c O C O C O c O C O C O c O C O c O c O c O C O c O C O c O C O c O c O C O c O c O c O v v vl< v v v v< v v v v a v v v v v v v m v -0. v v v v-0 Iv v v v v v -0 -0 v v v v v v a v v v< v v v a'a ¢¢ a a a a a a a a a a a a a a a a a a a a a aid aaaaaaa < aaaaaaaaaaaaa a VI a VI aaaaa Vl VI V1 VI VI a'a '. In V1 aaaaaaaaaaaaaaaaaaaaa VI V1 V, V, V, VI to VI V1 V, In VI VI Vl Vl Vl VI VI Vl Vl Vl a'a '... VI VI a VI a Vl a VI a VI a VI a VI a V1 a V, a Vl a VI a VI a Vl a N a N a VI a VI a VI a > a > a > a > a > a > a > a > a > a > a > a > a > a > a > a > a > a > a > a > a > a > aaaa > > > > > as > > > > aaaaaaaaaaaaaaaaaaaaa > > > > > > > > > > > > > > > > > > > > > > > > > a i0 3 m 3 i0 3 i0 3 i0 3 iO 3 iO 3 iO 3 m 3 m 3 m 3 m 3 i0 3 m 3 io 3 iO 3 iO 3 iO 3 m 3 m 3 is 3 iO 3 i0 3 F. 3 -F. 3 iO 3 i0 3 iO 3 i0 3 iO 3 m 3 iO 3 r0 3 iO 3 iO 3 i0 3 i0 3 is 3 m 3 i0 3 m 3 m 3 iv 3 m 3 is 3 iO 3 m 3 iO 3 iO 3 v v v v v v v v v v v v v v v v v v v v v v v v v v v v v. v ". C v C v C v C v C v C v C v C v C v C v C v C v C v C v C v C v C v C v C ' v C C 01 C 0J C 0) C 01 C 0/ C 01 C Ol C 01 C 01 C OJ C 01 C 01 a' C v C O) C 01 w C 01 K C 01 w C 01 K C O/ OC C 0) K C 01 K C 0J a' C 01 K C 01 D: C 01 K C 01 K C 01 K C 01 W C 01 K 0) K 01 K Ol K 0) a' Ol K 01 K 01 a' 01 OC Ol C W a' O1 W 01 f>n. O) 0= 0J aC 01 K O) K 0) K 01 Ot K 01 K 0J > Ol > o >+ 0/ > 01 > 01 > 01 > w > 01 > 01 > 01 > '', w T 01 > 01 > 01 > 01 > 01 > v > v > 0) > 01 > v > Ol > 01 > 01 > 0/ > 01 > w > w > 01 T 01 >' ' 0/ > 0/ > 01 >. 01 >. 0/ > w > 01 } 01 > v > 0/ > w > 01 > 01 > w > w > O1 > 01 >. 01 > W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W L/ W `1 W O/ W `! W N W O1 W iJ W v W O1 W 01 W `1 W `1 W O1 LL LL'.11 11 LL LL Il 11 Il 11 11 '.LL LL LI M LL 11 l.L *M LL 1.1 ',LL Il 11 MILL lL M M 11 im LL LL M m w LL M LL E 1.1 M M LL 11 LLIiZjjil El m � o � � I r�l CD Ll1RVRvlR'�-I�IV ..,V...,Vl. 1/1��--I�fV�o ,P lO p- Np m��..,..., lD1�y� N� mf V OM ni NuM V un N O I m� VI w��-iI NOl m , Vl.1...N Pir-PMPIOO .l Nlw N CON I, . m. om .......'D V m O arimwlm O � 0im r� 0iO.. tD V r� of m tD m m O m rn N...,v vaomN w m INIIk-mry r� rn oo 'I m m r, rn m ti N r. rn m- rIl,n eo -I m r� n as m m rn m .! oo ao v o v .i H ti m a w n H N m N w a N V Ln w N V m w H N m N w c N m Ln lD H N V Vl w N N M d N e V } Y } Y } } } Y T Y > Y T } Y } } } N m m V 11 N } n-J} �}a m z*, � >N} MYYVTT MY *;p NT }m v} NY Y Nl*a (D C7 (D OC7aa a 0-0- (D l7 l7 (7 7 aa Q Q a Q a Q Q Q r a Q Q Q a Qa Z) 7� Z) u u u Q Ts u u u u u u a a a a a Q,, m a a Ct. 7 CN u u U u u u Ol 01 C l Ql fTM d"N Ol 01 Ol of Ol 01 Ol 01 Or C l 01 01 01 C l 6 Cl O1 01 C l 01 0'G.. 6 O1 01 CCL Ol Ol 01 Ol 01 01 Ol 01 OM 41 CTN 01 01 01 Ol 01 Ol Ol m of of ClY Of PSG of Ol Ol of of Ql Ol Ol Ol m m m m CT m M M M M M 01 M 0M Ol �m Ol 0) 0) M Ol 0) 01 0) M Ol OM 0) 6 Ol Ol Ol Ol Ol m M 01 01 (P M M 0) 0) 01 01 Cn 0) 0) ob o1 0) M 01 M M 01 01 01 M m ST4. 0M 0M Ol Ctl1 M 01 01 01 0) 01 01 01 OM 01 OM 0) m m 01 m of V V V V �'&' a,� d' V V' V 01 01 41 GTG 01 01 01 01 0 0 01 01 01 0 01 M_ G'A1 2 YiY of 01 m of Ol Ol Ol Ol rtm m m m C71 m of Ol m O O O O O 0 0 0 0 0 0 0 0 �y O O O O O O O O O O O O O c O O O O O O O O O O O O O O O CS g O O O O O O O O 40 O O O O O O O O O O O O %,";N O O O O O O O O O O 0'y O O 0 0 0 0 0 0 a Q Q Q$ a a a a a Q Q Q Q Q a a Q a a a a a Q a a Q i'Q Q Q a Q a a Q Q a x a Q¢ Q a a Cl d d a C 0_ d 0_ d d D...., 0_ O_ a.. CL CL D, C%�« D_ a d a d a d a a. a ¢ d a d o_ a f- f- H F- F- W lqJ F- f- H f- H H f- F N•- {- H F- H f- H F- H H H H M- q".' W- h4 F- H H f- H H H H h H H H L H H CL W W W W W W W W W W W W W w W W W W W W W W W W W #xi w w W W W W W W W W W W w W w W W W W W W z z z z Z,Z z Z'Z z z z „� z z z Z z Z Z z Z Z z z z z z z z z z z z z Z z z z z z C0'. [C [C [C K 2 C CC K K [C K [C [C Tle CK CK iS�' 0 CAM 01 01 GTM 0`4 0W OM SSY. C7] gpry 01 0'1 CiG �9r CPM ¢7h of m m 01 OR Ol CYY Ot 01 4h1 0M1 0'N 01 F!'ry 0M. 04 0Y Dt CS7 0Y 05 01 4 as Ol m m cn ''CmaA77Y' Oy " P' j `q�7 '�X' 4'i d7y1 ¢C1�5 LTI O'pyf ^To 01 d1 0'b CA1 0b m 0$ 0cn m 01 m of m 1 � � C7 C7 O O O Cp S� Q r, oM oN 0b 4T1 G.Ay g� O IO 9 y O O a 0 W'M adi' NIT 5 0.rry0 'CY O0S 1'.0 CD CD O " ` fhM rV P"J CW N I.Yq NFtl Id"4 M.I"i LPM' 'Y O Q 0A U"G ` 4E4 vi V1 � (0 N f0 N N A«i C:) 0 q 0M CGt CiS Ol Ol N N W N N N '04 0`4 CAM 0v 01 N f0 la ro N N N w N N N N f0 t0 N m Cr1 CiM T Ol 1p rp m T> T T} rcy$ M am cm rm > i» >»>>> w a` � Dc m rn m m w a m a w g cn m m f0 N 0ti 01 01 CTY 01 m "J7 M c) Cm rl N M V V1 N IO . M r0 M M 0) m 01 > > > > > H 'm-I cm-1 > > >> a t` �R ry m v n rr ¢r a? aOO+ y N m v n 1 > i i i> ci m m am m+ ry m v v o a� c5 ca ~ N V V1 O �i " . aaaaa O O i7' > > > > > .. 0&%. ,. COS. .--I N M V Ln � O O O0:, o� ca ca oraa ¢aaaa. aa000 rcao 0ao0xaa Cr o r+a' �Nyu G-a r,7''.... o 0 0 o r� Goa I�i vro New nri,. o 0 0 0 0>> a a a a a r da" 'ro oa NrM rn rn uv g q 0 0 0 �+ vi �i ''. ati vi o 0 0 o o ..a , ,-r o 0 a ' m mL . `m m a a a a a Lm Lm Lm `m `m a a` a s a` 0� a�. ¢x o L L L L L L O m m W N N tl) Ol Ol Ol OJ 3 3 3 j O" 00. 0k &7. a IU fp N IO f0 a a a a a n nYYTYTm''mmmim>>>>>m''mmmmaaaaa nnuro n>YT>Ymmm mm>>>»m 0 E E o 0 0 0 o E E E E E ', N m y Ln 0- a� N m v vl a s to N to M v1 :D N to Z) to Q Q Q Q Q a a Q a a ]>> ] ] In v1 In to Vl to to to Q a '.., a ,, Q a a .., a >>> >>>>>> u u u u u U U U U U aL aL a` a a c c c c c>> U U U U U U U > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >. > > 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o O o 2 io i0 is m o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 a a U' C9 l7 ( 0 l7 C7 l7 0 U I Q C7 (D ',C7 ',(D (D 0 0 l7 ID a a a a a a a a a a l7 C7 l7 C7 0 U' U' C7 C7 0 l7 l7 (D l7 l7 0 0 oil 06 cau 06 06 03 0� 0' 06 0D 03 ob '..., 40 ca 03 06 06 oz oil 06 03 oil '.... 06 06 06 oa 06 06 06 �a ca -A 03 06 0 0 '...... 0 06 0 0D co 0-6 06 ai 0 06 0 06 0 v v m-0 "Q m m v 0 0'0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0'0 0 o 0 o'O'o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 u u u u u u u u u u u u u u u u u u'u u u u u u u u u u u u u u u u u u u u u u'u u u Q u u u u u a a a a a s a a F- f- H H H F- F H H H H H f- w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w O O O o O O O O O O O o O O O O O O O o O O O O O O O O o O O O O O O o O O O O O O O O o O O o C C C C C C C C C C C c C C c c c C C C C c c c C C C C C C c C c c C C C C C C C C C c c C c c C O O O O O O O O O O O q O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O -0avno vvvvv-^6`0-0v-0vv-o-0vvvvv-ovvvvvav-b-bvvv-ovvv-a-o-ov-0'......vv v v v err v v v.....-0 v v v o v v'v v v v v -..- v v v v v- v v v- v v v v v- v v v-- v v v- v'.v v a Q Q a a a Q a a a a Q a a a a a¢ a a a a a a a a a aaa a a a a Q Q a Q Q a a Q a a Q a a a a Iq cry Nra vl in vl rn QaaQa Q�rwx�z�¢�aaaas--aaaa¢aaaaaa�ca¢a76 �raaa NI IL!- 3333 3 333 Ol OJ N 0.I 4J W I I oc, M91' A1' U" dl 01 O1 aJ N W tl! 61 N 0d !Li Mil Ik4 cccc1�7 0I �I 0d 0J 41 ra 01 OI al of W dl ID 0Y0Iall p} Ca.. C C C C C: C C C C C O0 C C. C C e.,CI[K..CK cL lt� U0 Ah: CC CC� [C ' K K LiG C0r SX� 0c' �C OC" -S al 01 al 01 G r 01 mi 6M 0/ 0kY 4MON 0r 01 0/ aAl ql dAI W N OJ Ol tL W d10 Ix K C[ CC' K "La" W"W Ce: w & w f.W I.C. I K1" u w 'dY O1 N N OI W Ol WM�wmf` NWO/NWN Ol O1 O1 O1 N O1 O1O1 NWNNO/W NN N o LL LL w LL 11 W LL LL W LL LL w LL 11 l 11 11 LL 1.1 11 W W ._ ` N l w LL LL LL W W W W W W W W W W W W W W W W W W W W W W lL LL 11 LL LL 11 Ly 11 11 lL LL It M O Z W E 0) El Ih m N 00 W n m N...m 00 00 Ih Ih H 0o 00 n n...m..w n m N M vl R r- N n wm 00 H Noo w H V. M 00 V I� N Ln to M O W N 00 M O W M 01 NM N m N m V w 00 Ln O lD O W H �--� N W N n H N Ln N n .--� n H H N O 00 H �--� N H N N to H'.--I N N 0) O o O O e-I O O O o N o oo I-, w Vl O m oo 1-, I,- V o) oo I', 1- oo 0o 1� ID V1 O 00 r� ID O m y Ln N m a Ln N- V Ln H N m V Ln H N M V Ln H H N M. H H N M a H N M- N N M C N N N M V H N. 1h N to N t/T h.N L} VT i/Y LI. Vf Vl,i/f N. L} VT VT... i/) 4/1< M- ) N .— W N in N oo oo m oo O am -I N oo oo m oo a) ti O O H m H o o H V m m a0 o0 Ln n o) 00 00 V m H V o0 Ln o N V o0 V m m o0 00 m L\ m 00 W� 00 O W H 00 O V H N M lA W H Ln m O lfl N M H 00 Ln ll'1 M H M l!1 H Vl m Ln W H V1 m O LD 00 O LD Ln W 00 O O V� LD 00 N V V W 00 m Ln W 00 O H �"� H H H N N N m V 7 N N m V m H H H H H H H H H N M a LD N M V W H N m� Ln H N m V Vl H N m� o H N m V Ln H N m V Lo N m V Ln N m V Ln H N M'...� Vl H ,tih i/f VT V� tr} vv V1.......,N iA 1/? M? ih l/}'... Vl N,'n V}'., j). i/f to ''..'n V) v} VT'... t/T VT to to N, N. in N NN to 1/} th L4. VY V) V/. N 'A N -vf VA th } Y } } } } } } Y } } Y } } Y Y Y Y Y Y > } > Y Y } } } Y } > N 0Yt u}j e}-I N M V Lf}1 eY-I m V }}}}} H N m Ln H N M a Ln H N m V Ln H N J J In H N J J c c c c c H N T V Ln H N m LIl c c m c c d d d J J (D LD U U U d d d ::� ::: d d d d d J J J G G C G G (.� �-% d Q Q Q d d d d d r r r r r Ln N VI V) 'A V) V1 Ln LA VI Q Q Q Q Q Q Q Q Q Q d d d d d r r r r r Ln N M Vl N !n U U U d d d d d d d d d d > > > > U U U U U U U U U U d d d d d d d d d d » > m m m m m 0) 01 O) 01 0) O) O) m m m m m m 01 0) O1 01 0) 0) O1 LT 0) Cl) M M '... M M M 0) M M M M M M M M 01 M m 0) 0) 0) Cn m m m'm m m m m m m m m m m m m m m m m m m mIm m m m m m m,m m m 0) m m m Cl) o) m m m 00) m m m m m O) m m 0) o) o) m m m 01 m m m o) m O) m o) m O) m m 0) l o) m m m m m m m m 0) m 0) m o) 0) m m O) o) m 0) 0) m m m O) m O) 0) O) m O) o) o) 0) O) m 0) m m o) O) O) o) m o) m o) o) O) 0) m 0) O) m O) m m o) m m m m. o) 0) o) o) m 0) m 0) 0) m m m H H H H H H H H H H H H H H H H H H H H H H H V It 7 V V V -It -It �� d' V � V V V 't.1 a 7 �t a a V 't 0 o o o O o o o o 0 o o o o o(D o o o 0 0 0 0 o o a o o o 0 0 o o o 0 o o 0 0 o o o 0 o 0 0 o o o a s a s a a a a a¢ a¢ a a a a a a a a a a a a a a a a a a a a a a a¢ a a a a a a a a a¢ a a a d a d dad d d d d cLcL d d d a d d d d d d'd d d d d add o d a d a d d d a d d d d d d d d d d rlr r r r r r r r r r r r E r r r r r r r r r r r r r,r r r r r r r r r r r r r r r r r r r r r r '. Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z ram m a rc m m w of w z''..w w z nf x'....m w Lr z'....s w s cc s s zwi i m m m m m m mm o) m m m o) m m'm m m m m m m m m m m m m m m m m m m m'....m m m m m m m m m m m..m m m m m m m m m m m m m m m '.... m m m m m m m m m m m m '.. m m m m m m v v v c'....a m m m m m m m m m m rn m m m m m ti ff °H) ''.. �� v vvv v m m m m m v o o o o o ° O1 m m 0 0 0 0 0 0 0 0 o 0 0 0 0 o 0 0 0 0 o 0 0 0 o m m m m m O 0 0 0 0,.0 0 0 o H H H H H o 0 0 0 0 0 0 o 0 0 0 0 0 0.o vvvv a o 0 0 0 0 0 0 0 0 0 0 C O O O O O O o o o o o O O o O O O O O O O ON N N ON ON o o o o o L7 H H H O O o c o m m m m m H H H m m m m m N N N N N ` o o 0 0 0 N m m m m m LC w w w w O O O O O m m m m m L0 l0 ry N N m m m m m Lp L0 Lp ry ry w 0 0 0 0 0 m m m m m ry w w w>}}}} m m m m 0) w N w w w m m m m m w w w w w}} } Y } m m m m m w Y}} m m m m m}}}} } m m m m m} Y Y >- >- i m m m m m} M Ln H N m lf1 N 0) N N N H H H H H H N M''... In V V V 7 V H N m V Ln H N m V lf) w w w N w V V V V H +� t y}}} w o 6 o o o 0 0 0 0 0 �, �' }}}}} o o o o o 3 3 o o O O O O o o o O j j j j j O O O O O j 7 j j j O O O O O H N m Ln O O O O O j d d d n n n O_ Q H N m V Ln O O O O O d d d d d o o O O o n d d d d n n a s n. 0 0 0 0 0 n n n n n r r C o 0 0 0 0 0 C c 0 o a a D M a 1 1 0 0 0 0 0 o O O O 7 7 7 7 7 O O O O O H H H H H O O O O O N N N N N a O O O 7 7 7 7 7 O O O O O N N N N N V1 to m V1 vl n O. n.. d V) to Ln N N a O., n ll d d n a n n n N f0 t0 fC ID 1 11 d d a. N f0 f0 IO fO d d d ll O LO Z . n G,. a a N 1II mf0 !a d 7 7 7 7 7 7 7 Z3 7 w w w w w w w w w w 7 7 7 7 7 7 7 7 7 7 w w w w w f0 (0 f0 2 d d d d VI Ln M to Vl >- >- >- >- >-fa f6 f0 la la >- > > >- >-m f0 f0 f0 f0 to VI to Ln Ln } } Y Y } 10 a a a a d d d o o o o o E E E EIE H N m v n a a a',a a H N m v n o a a,a a o 0 o 0 o E E E E E H N m m of Ln Ln m Ln m Ln Ln Q Q Q Q Q Q Q a Q Q 7 7 7 7 7 an m Ln Ln Ln Ln U u U d a a a a c c c c c » >>>> » >> U U U U U U U U U U Li a a d d C C C C c>>>>>> > > > > > > > > > > > > > > > > > > > > > > ._ ._ . > > > > > > 0 0 o m w o o o o o o o o o o o o o o o o 0 o o o 2� 2 2 2 2 o o o o o o (j (7 (rJ d d d d C d d d C d i7 (7 (7 (D (D (7 (D U :D U Q Q U U U 0 (J U Q (D d C d d d d d d d d (J QJ 0 (D (7 (7 ob 06 06 06 06 03 06 ca ob ob Dl Oil '..... co cb 06 06 06 0� 03 03 06 '.06 06 06 ob 06 06 06 '.... C6 03 � 06 ob o 0� 06 co '.., oo 06 06 03 06 06 oil 06 06 06 06 0 v v v �'....v v �'.v v v a v v'v v v v v v'v v 7 7 7 7 7 7 7? 7 7 7 7 7 O O O O O O O O O O O O.. O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O '.0 U U U U U U U U U U U''U,U U U U U U U U'U U U U UU U'U U U..0 U U U U U'.0 U U U U U'.0 U U U U U.. d d d d d d d d d d d d d d d d d d d d d d d (L d d d d d d d d d d d d d d d d d d d m d d d d d r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r!r r r r r r r r r r r r o O o j o o O O O o O o O O O o o o O O O o 0 O O O o 0 0 0 0 0 O o 0 0 0 o O O O O O o o O O O o cm C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O Vl Ln N V1 Vl. N !n to V1 VI N N Ln Vl Vl to VI !n to M to to VI to V1 VI Vl V) to VI N V) VI V1 N V) VI V1 V1 to to Vl N In V1 Vl N to to Q Q Q Q Q Q Q Q Q Q¢ ¢ Q Q a Q Q \ Q Q Q Q Q Q Q Q Q Q Q a Q Q Q Q Q Q Q Q ¢ Q Q Q Q Q Q Q Q Q Q ¢ Q Q a a Q Q¢¢ Q a¢ Q¢ a a Q¢ a a a a a Q¢ a a Q a a Q¢ a a a Q a Q Q a¢ 3 3 3 3 3''3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 M M Ml M� M 3 3 3 3 3 3 3 w w w w w w w I w w w w w w w w w w w w w w w w w w w w w w w a) w a) w w w w w w a) w w w w w w w. w w C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w d' K tY C i C CC m'.. K CC cc'' CC OC K d' a< K ccwC OC C K K w wK wCC wd' a:K OC K K 5 [C '.. K GK 0; 0-' C m. w w l w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w W W w W W W W W W W W W W W W W W W W w W W W W W W w w W w W W W W w W W W W W W W W W W W W W W LL 4.L 11 LL LL LL I1 I1 LL '. LL 11 11 I1 LL mLL LL M 4,.4. lL LL mLL LL mLL '. LL I1 I1 LL LL LL lL LL LL LL LL LL 11 11 11 LL LL ll LL LL 11 LL Il El w N n e•-I r o O .--I M M !b 00 O IIl M C n N '-1 On De '... VI e-I V W- O (T l0 w m M l0 w w N H 00 00 o T O O M M m e-I 00 00 o M m V n N '-I M (In In l0 ei M w n 0 0 0 .--I m O ''. M V m O m r m [T 00 ci N n M n V . ''.... m r., O •-'I ci N r- m w 0 e-I 0 N 0 N w T w R a o 00 N N 00 M 0o V I: of - I: N N M w 0 m C H H r- N .. r-I M 0 V 0 H 0 N w N 00 m w a 0 H e-I 0 N .--I m N W 00 m Vl 00 zr N H H o H N m'r 0 m 0 C IIl 0 m a-1 v O H N M 0 m V 0 V In 0 m 14 VT., Vf VI. Vn. i/T Vl Vl i/} V} VT V} 1A vT'SA V} V} 1/1, V?.''.,N V} tR a? VT a'„✓p. iA 4h 'M} Wrh iA to Vf Lf to iA to VT V?.,N N i/T i/f 0) H V 00 V 00 n N 00 ^ V M N N ••L l l0 N N Re O V n ry 00 oq 00 n N '., 00 V _.. T N N ••• In lfn M 00 ae l0 M 7 L n O T q T 00 '-I On l0 N 00 .-I On l0 N M .-1 M T Vl ell m 10 rl N V O '', t0 l0 n vl an et ' I l0 00 00 7 O e-I lD n V H l0 00 00 O N N M V, V .ti N .--1 N N m M N T m m M V m m V M M V Vl W N e•-I c-I N to M -It V m In N c-I M N m m a V m In N H V N 7 ''.... m l0 v 00 m V of N 7 M w V w to '... Vf to VT lA to iA 4A N VT V} 4A i/}',. V? {h V} vi to w�A. iA 4Jb- L? L} V? to to iA to V}. V} 4A ih 4/F 4FF Vf vl° to 'wn 4A iA BCA. 1J1� dA 'A R{M 'A iA In 4A }T N m eN M(D VoI M}d V}a }N a m- a �dIno0n <<< 6 <5¢ ¢ -} J2 ' , l7 (7 l7 a < �}3 < Ur ¢ adre-I ¢ M a¢u Ja >dV�o u u u 1C. uU auu u ur u}Va¢ UY¢Ia/1 aJa IL a rkr„nl dM�>o rn m m m aN1rnM m an (3) n 07 IM cfr"a U) ae (3) anIr6an0nrnm0) c), en m an m 0) m o m 0) 0) m m t� tem0r00 drc-I t d}N o} o} d} 0)'mordotorn mMa - m m m to m m an x+ rn r to m m m m m m m n q0toxstom ummmm0,m m m ae m alm on 0) M an o co m m m '.'.. nCtinmm M 01 Mmm t m m m m o m m m Cl ani t�qhtAia a00000?00 0 0 0 0 a a 991999o1? :0,daao 0a00Ilk00000000000009e¢ a'aaaaaaa¢aaaamaaa FK0)a0 FKtv0o W d FK W Wa F[vnaY mmCLmd0_a W1aWW WK WCn¢C aa¢aa WKonn WWWZ WFH WHU WWWWWWWWF HKm H F Hm Hm -Je Waa0_da KaFma SFmva KFWva iv Kva Kv Ccta�ya" 0" .tCQOM KaWmn KaW0n) Cmn '... [aanYn K(3) Kan KHM [mHt w elf w wK..' ''. ] am T 0) 4 "ul'N {g m er m Or a) O 01 1 m O 01 Cm 0 Cif CR dkM P`JU. 0 01 O O1 O 01 Ki 4"J1 7 01e C KiN Sr 4PF O1 O1 m CA m 4PR a) O1 Ol O1 m m cl m aT 0 In m 01 m ,TTh f7T. tr ` 'S'd 0R CF �]b S "^w' GM RF CPo c1 C71 V 01 V 01 7 y. .�y ':N n n V n V n C71 (11 01 O1 O1 al M 8 aC O m tiA a) Cn O M m M a) O) a) M e11 C�,ir f'"• n n „„„yyy n n O 0�]a Oyy tt� O7 O G7 O' On V (le V m Ol V On CT V Kfl 4 i.CA 'tii n O C+ C7 d p+ O f y« O P^- c 1 0000000800 t$'M 01 0 M ea) 0......'. 7 O Ok O O t:3 CCOOii 07 n I� q^�. co:, O pp C? 10, O 00 O CS O O O O 6 O 0 0 O 0 O 0 C7 Ci,� O ) Ln in cn n ufU nn a� W'1 L MF'4 O O 0 01 00'7. Og� 0 O O n hTw n 9 f0 N 10 On (In Cn Oe 0m a) Ol (T GGPPNN tpn GGmm Oe fa v fa W tp '., W R 19 a) wm N N [0 to v v al IO v 10 v O O O ppq 00"J O In O 0 m 0 m m On (11 01 On (11 On VOe N WO'Y � m m '0<t.., ml, T9n aPn CN Om ain trn tRY flN n R � h n � n f0 fa PT. 10 fib"^ IO [a . r m '.', r} a In v a v n n n n a r.- r r r} r r r r} •~ ry m a r In ro m mr. �x s v v c i i i i i am+ m a } a r}}} a v v r r} r r O ti 3 ry > m > a > IA > C' q�� i > i i i 0 �tty]]], 0 ' 6C 'tO3 Odd 17 ,~ N 3 m � v 7 In � ca rt'0 atn 0 ¢pe �� I ,y N m v In ti N m v In L d o d 0 d 0 O O n' a o a 0 a 0 a 0 a 0 —snae 0 Co]. '00. nv O. v .ti ca N m V C In T3 to ''ca 12anINr C] ca 'O d n 8 0 n a o a 0 a 0 o_ 0 a on � I a � nnnn CM:�a.] u orl n > a o > a 0 > a 0 > a 0 a ov'���un s] e as 0' ci rs o 0 ca, 0 �aaamm ammddaaa �Ca.aCL.mmmmaa'aaammmmmaaaaa a m is fi m m v } } } } } io a _o is m m a a a a In yr a rn o] t+w.i0 v a) m a, ......... w is v } m r m } w } w r i0 i0 m m m >>>>> a d a d a ''.... M qr s o_ . sr: a 0 0 0 0>>>>> .� ry m v In a a a a s .-I N m v In a. a a a a U U U U U'...0 U U U ¢I„o U a a a a a' c c c...... c...... n n c>> n �'� n v Z) v Z)� v n 7 n Z) v Z) ¢¢¢¢¢¢¢ U U u 0 0 0 u a¢¢ u o C 0 a 0 s C ] o 0 0 0 0 0 0 0 0 0 a o o �a �a Via' m m m m m m m 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 U.Ud,,..a 0 a d` 7 C7 (D U) l7 C7 C7 C7 l7 (D (7 (a 0 Q a a a a a a 0_ a a a (D 0 (D Q 0 (D 0 0 C7 (D 0 0 0 0 0 0 0 0 0 0 a a a a a off .6 o3 ab oiJ ab 0� 0� 06 '. 0 06 06 06 oil ab I.... ca Q2 06 06 .6 C6 co 03 ' 04 ' oa 0b 06 06 06 0 06 0 ab 06 0 06 0 06 06 0 0' a'd co ail of 02 0 03 ] a a a a a la a m a a m a m m a a a m a m a a a a a a a a a a a a a v v a sa''.v v a m a m a a a m a ] O U O u.0 O O O O U'U U,u O O U O U O u O U O U O U O O 0 U..0 U 0 U O U O U O U O U O U O O O U U U O U O U O u O u O UU O O U O u O u O U O U,I,r a o ''.. U o U O U O U O U O U O U O U o''.. O O 0- 0- a a a a a a 0. a a a o_ M a a LL a a a a a a'0_'a a a a a 0_ a a''a UU a U s ] O O o O O O O O o O O o 0 0 O o O O o O O w O O O O O o O O o O O O O O O O O O O O 0 0 O o C C c c C C c C c C c c C C c C C c c C c C c c C O U -6 -6 "O OO OOOO O OO -6 oOoOOo 'O -6 O a O -0 O V O T O _0 O -0 O -D O -0 '0 R C 'a c 'O c _0 Co V C -0 OC Va C O aOC aOC aOC aOC aOC Q¢ aOC a aOC aOC ¢¢ aC ac aaa a _0 -0 a¢ a a aaa a a aa¢ a -O a aa a a¢¢ a -0 -Daaa a a a a a ¢'¢ a _0 a -0-0aaa-oa s a,a a a a aaaa Q¢¢ a a¢¢¢¢ a L vvryry ^Q.4"+"c•«' (•: VI �y ^¢¢a nA u"p <a '. \Q¢ i ^aw"«is >i \¢QN \a > 'icwp. > l ' > > \aV > °!Q�\; > \a `y�.-n < ¢Q atQs¢¢a a i0 m ova a�0a. is m na cos ro io m io r`0 cop "q"ro ca n. �m iu m u�a is io io am sar ro m r0 `m. m iq wro io i0 is m m en n'"i m m am av 3 a v 3 v v 3 v 3 3 3 3 3 3 ;'9 3 9 3 3 3 3 3' 3 i 3 3 3 3 3 3 C al C c v v C C C '... al C v C ar L v C ee`, v C v C v v v C e c v c v C v c v c w c 0 c w v v c C c v e v e v e v C v c v., v c su c trr. c v C an c C v C v C v C au 'C v C v Sm v K v C ar C ap a:. v c P -. Ol 91 ak Faq v O) K Ol K a+ w 9'wm cc W W. a) W 0) v $A w d' iC w r� aA t� tll LC. ay ax. ap [ar'. Q, a10 w 0 w 6'f0 LaC CL"'. . K . K 0) � ar CC. RU' CN^ ad' OC, � a) vS 91 OC r9) tr LU rtim'. 0a 0� au cc Ol w v w v w 0 cc v cc ' W Y".,0' 0 w w a') w '.... I v Ol OJ al al W a1' al 0) v Ol. v a) }. OJ O) v Y > aJ N al v al O) a) al 01 a) Ol w a) 0) a) Y I W I v W `! W v W W W 01 L/ ''., a/ RMX i W v W 0) W: 0) W `/ W a) W v W W W LI a) al W a) W a) W v W N W `) W 1) W W W N v �1 W aJ i W v W `1 W Ol W `1 W N W L) W �1 W aJ W al W W W W W ". W v W Ol W `1 W OJ > W al >.. W `l > W v } LYJ flJ W LL LL 11 IlL LL Gy 4L LL 11 LL LL ll LL Il '.LL 11 LL LL 11 4L ly. 11 1111 Il LL LL 11 LL 11 LL W t LL i 11 LL LL It M d' O Z W E W 0) El lf1 Vl o o. H o0 �/1 0 0 �--� m o m " �/1 00 m m W o n 00 00 n n Vl L!1 N lD o N N lY N 0 0o m m W O n 00 00 n n n H n m '-I W Vl n N-i 00 t/1 N O M V Vl M ✓1 M n N Ir- N M .'-� m O M Vl M N n lD V m V M lf1 m n N n N m m O m V W n O m W W O O m W m `-1 c-I O o O m r, m m N m o0 lD lfl m m w w A Q m n Ln m N m n o m N m w w Ll1 m m W V N N N m V 11 N N m V N N ''... M� In '... r- N m 't' �--� N M V e-I N m V �--� '... N m V e-I N m V '-I N M V �--� N M V? VT N.V1 V! V} VT Vf VF Vf VY in 1/f Vf VT V} V)-. VT Vl LT V} u} V} V? V} VF Vf VT i/1..'tn V1 In V} In V* In VT V} In VY V1.LT V} VT V} VT VT Vk VA N ID L!1 O lD m lD V1 O ID '-I w W o w VI .i '-I r-I m r-1 N m V o m o0 V ci 00 m r m V oo tI) a-1 ei H m rl N m V N m m rl N '-1 V 1D n m ci lD n m .-I 00 a �'-� n �'-� �'-� 00 lfl N O m V) �tl O V 1D o0 Vl N N m n n rl `-1 00 V) N O M Vl V V �--� L/1 w m m zr m N m m� m N 'D w O O m o0 00 s-I .-i O o o m '-I 0 0 o W O m o0 00 O o m o0 W '-I .-I o c)o o Di 00 n N rn � m H N M V V1 e-I N m V Ln e-1 N N M V .--� N M a Ln N M C Vl N N M N m V N N M V ul rl c-I N m 4A VT Vf V1 V? V}......., V} Vl VF V) V)i/k to V1..', V} VY V1 VT V). VA V1.. VT......'VL VT V). V}.. VY 'A 'A V}. 1^ V} In Vl V! Y> r r Y>>> T>>>>>> T >> T> T T r T Y T T>> T>>> Y> Y> r Y r N M a a-1 N M V Vl ',.. e-I N M V o r-I N m V Vl ri N M Vl rl N M 7 Ln N N M V J rl N m V VI �y N M V lf7 e-I N M a m 0 0 2 2 2 d-' U 0 0 0 (D a o- a a a C7 l7 l7 l7 C7 a a a a a w w 2 2 2 2 u l7 l7 C7 C7 a a a a a � r r F- i- Q Q a Q Q Q a Q a a a a a a a F- F- F- F- F- m m m in in m U U U U a a a a'.....a 7 7 7>>> D D u u u u u u u u u u'....a a a a a a a a a a� >> 7 7 7 + + + + d, d, m m m mm m m m m m m m m m m m m m m m m m m m m....,rn m m m m m m m m m m m m m m rnm m m m o 0 0 0 m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m o 0 0 0 m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m o 0 00 m m m m m m m m m m m m m m m m m m m m m m m m m.....m m m m m m m m m m m m m m m m.....m m m m o 0 0 0 O o o O O O o 0 0 0 0 0 0 o O H a a a a a a a a a a a a a a a a a¢ a a a a a a a a a¢ a a a N a a a a a o_ o_ a a a a a a a a a o_ a a a a a a a a fL o_ a a a L a a a a o_ a o_ a s o_ a o_ o_ d a o- a s F F F F- F F- F- F- F- F F- F- F F- F- F F- F- F- F F F F- F- F F- F- F F- F- F F- W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W z Z z z z z z z z z z z z z z z z z z z z z z Z'Z Z Z Z Z Z Z Z z Z Z Z Z Z z Z Z z Z Z Z Z Z K aC 0C K K C w of w C w K K K 0C w K d' ''... C '.. LC K K K w ''.., K C K Om f.K 0C w CC K K K K w m w 0m w QC 1m w CC w m m m m m m'.....m m m m..... m m m m m m m m m m m'm m m m.... ..., m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m mmmmmm m m m m m '.m m m m m m m m m m m m m m m m m m m m m m N 6 6 6 m m m m m m m m m m m m m m m m m m m m m m m m m m O O O O O m m m m m m m m m m O O O O O O O O O O m m m m m 66666 m m m..m m O O O O O O O O O O o o O o o `"�"'� `~ '~ 'O O O O O TTTTT o O O o o c O O O O O O O O o O O o 0 o O O O O O '....o 0 0.',0 o O u1 O Or. Vi m m m m m o 0 0 0 0 o o O O O O O �,,� 0 0 0 0 0 0 0 oIO o m m m'.m m n n n n n m c, a, 6, ti N N O O O O O m m m m m to � l/1 Lr Vr m m m m m m m m m m �p �p �p �p t0 O O O O O m m m m m �p jp ry ry ry n n n n n m m m m m afOi a`Oi w af0i w cn a� m cn� ar ar v w v»> i >- •~ •� •� •� •~ m t t>>>>> m m m m m> T T T> r T> T> ++++ f0 f0 IO f0 `m m m m m m "'� N m N W o o '.. O o o H N m ul o 0 0 o O O N w �--I N m a V1 0 0 0 0 0 '-I N M V u1 0 0 0 0 0 0 0 0 0 >> T r> O o 0 o O o 0 o O o 1= tf 4Lt 11> r T T> o 0 0 o o O o O O r Ln 0 0 0 0 0 j 7 3 7 7 0 0 0 0 0 j j j j 7 o o O o o ci N m V ti l 7 7 7 3 O O O O O a a a n n O o 0 0 o d a a n. d O o o o g a a a a o 0 0 0 o g a a a a a a a n n C r r r o 0 0 0 0 0 0 0 0 vi vi vi'.. �i vi o 0 0 0 0 O O O O O n n n n n O O O O O o o o o o O O o ,O o 7 7 7 J 7 o O O O O N O O O O O N N N N n n n n1 n. i N N N M N n n n n'. n n n n a'.. n. `m `m m m ro d a d a a` `m m `m `m m d a a a a` n a a a n m m `m m m `m 7 7 J of of of of m of N of o) N of J 7 V1 V1 VI VI > > > '.... r > f0 f0 f0 fO i0 > > > > r (0 !0 f0 f0 m a d d d 1 VI Vf N N ... to > r > > r IO f0 f0 to m T Y > T E E E E E Nmvnaaaaa Nmvndaaaao000,oEEEEiE NmvnaaaacLHNma J 7 7 7 7 V1 Vf VI VI Vf M M VI V1 N a Q a Q a Q a Q Q Q 7 7 J 7 7 Vl Vl IA Vf Vf VI Vl N VI Vl Q Q Q a 7'.....> > 7 7 u u u u u u u u u u a a,,.a a s c'.... c c c.... c �..'z) 7 7> z) z) z z.0 u u u '- ._ ._ •- > > > > > > > > > > > > > > > > > > > > '- I1. '- > > > > > > > > > > > > > > o o o o 0 o o o o o o o o o o o o o o o m m m A T o o o o o o o o o o o o o o a a a a a tD (D (D ''..... l7 (D ID (D (7 U (7 U (D Q Q (7 LD 0 LD (D 0 a a a a a a I a a a m o 0 LD 0 0 0 (D 0 (D l7 (7 l7 0 (7 03 06 0i 0i 06 0b 03 06 ...... e3 06 06 03 0a 03 03 0a 06 oil 06 03 06 06 o3 (z 0 06 0 0 co 0 (z 06 02$ 0� co 0 co 0 07$ oil 03 0 oil 0Z o6 cO 03 0 o6 7 J J J 7 J J J J 7 7 J J J J J 7 J 7 J 7 J J J 7 J J 7 J J 7 J J J 7 7 J 7 J J J J J J J 7 7 7 J O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O u u u u u u u u u u u u u u u u u u u u u u u u u u u '. u u u u u u u u u u u u u u u u u u u u u u a a a a a a a a a a m a a a a a a a a a a a a a a a a a a a a a a a m m a a a a CL a a a a a a a a F F- wF- F- F F-��r�F- ��F-� 1-- wF F �F ���F- H,rF-- F- F-'� w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w tit w w w w w w w O O O O O o O O O O O O o O O O O O o O O O O O o O "', O O O O O O o o O O O O O O O O O O O o O O C CCC C C c C C C c C C c c c C c C c O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O C C O v v v v -o v v v v -o v v a v v v -o vvv v v v v v v v v v v v -o -o v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v -o v v v v v v v v v v v v v v v v v < Vf < N VI < Vl M VI N N h < V1 N < < < < V1 V1 V1 V1 V1 VI N < < VI VI < < < N " N V1 V1 N M VI V1 V1 VI VI V1 V1 V1 M VI a Q a Q a a Q Q Q Q Q Q a a Q a a Q Q Q a Q a Q Q Q a a Q a a Q a Q Q Q Q Q Q a a a Q a Q Q a Q Q > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > a Q a a Q a a a a a a a a a a a a a a Q a a a a a a a a a a a a Q as a Q a a a a a a ¢'a a a a Q F M Fig F� F M m �� �''� P3 3cccccc w cccccc ccccccccccmccccccccccccccccccccc C C C C C CC C C C C C C C C C C C CCCCCCC C C C C C C' C C C C C C C C C C C C C C C m m o! of Ql O1 0l Ol K K R a' w w K K CC oC K w w C K w C m a' C K K w C CC w w CC a' K K K K a' K w C w w W K CC OC K [C W C w N w w w w of 0/ of of m o/ w w of w w of of w of w w w 0/ of of of w w N w of w of of o/ w of w w w w of w of 0/ of Y >. > > > Y > >. T > > > >. >,. > > Y > > Y > Y ?. Y Y Y > >• Y > T > Y Y > > Y > >. T Y >. Y >>Y Y > Y w w W W W W w w W w W W W W W W W W W o) of Ol N of o) �/ N of `1 0l `1 `1 Ll 01 QI `1 d m L_ _ _ _ _ _ _ _ LL LT" I1 11 11 LL W lL 11 LL LL- LL LL LL I1 LL 11 11 W w 11 LL 11 LL LL LL 11 11 LL Il LL" 11 LL LL LL 11 LL LL w It M 6 Z CFI W ^E�♦ ^W W 0) El ail OOJLO� V Ol c^-I N MINA N n N V ., Na L(1 tO N M a 01 W N M V ^ N M V I, V al ID M tll O l^O V I, Ln O r.� n I T DPI �'D T I r, .--I ' N M ti N N M a N N M VT't/1 VT aA iR Vf LI LI V? Vf V VT in. W}',. m 1D O N O I� M N w n aD V e-I lD ul V N Ol M .••I iTd w O N O I� lD N �--I N N V W oa O M V 00 00 O M IO W M m M , 00 'I M M .--I 01 O Ill c-I In Ol V � r-I tf) a4"I' CO m I m a -I W Vl ... rl M � M .--I N Ol M W �--I N co M tD In M V Ill lfl �-1 M lO O ''., O Ol Ol CO T O Ol Ol 00 IO Ol 00 1� ''., W O 01 00 t\ NO O O M M W V M W O W W I� r ID W w I� n lO V Ol W V O V Dl CO N M V N N M V c-1 N M 7 '-I .--I N M 'RT e-I N N m�' as lO N O a0 w 1, M �--I m a0 N m e-I Ol W lO N O 00 CO lD N r-1 N M M ci N T M c-1 N M M r1 N m T c-1 N wwv�lv� v� v}'VN to v}.VN.. i/} rs/M KFa" N7. �II"4 MO"i 1.l} 9A9tF3 to Vf V}ln ih to V} V1 VT V} VS th t/TV}.,tA lh 4i MT4 fJl Mh M r-I N M wT, In r } } r } H. N M vl .-1 N M V N r } } } } } } ? ]- Y } } } } } Y r r Y } r } } l7 a a a a a `~ e'I N V In e-I m 'p' Ill Y r} r r rl N M V ul C7 l7 C7 U' C7 a a a a a- m l7 fi.".l 4;1 ''L7 l7 a a a a d "'�' N ry m ¢ a Q¢ Q a a a a a p.-. H F- va vl m vl m Ln In Do vl m Q q �Q[ " a Q Q Q¢ Q a a a a'i a 2 2 2 0 0 0 V U U U U a a a a a v.a„ a a a a 7 7 7' 7 7 7 7 7 7 7 u F.l a U .... U u u u U a a a a m a a a a a 7 7 7 + + + + + '.. + + + + + + + + + + + + + + + + + + + + + O O O O O O O O O O O O O O O O O O O O O O O plTl', qy'y Qy D1 01 CIl p1 01 01 01 pl CT J,Il" 01 C11 CT Ol 01 pl [Il pl a o 0 0 o 0 0 0 0 0 o 0 0 0 o 0 0 0 0 0 0 0 o y r c c c v c c c T v "T c v c v r c v a 0 0.0 O 0 0 0 0 0 0 O O O O O O O O O O O O O N N N fV N N N N N N N'.N N N t'W N N N.N'N N N N O O O O O O O O O O O O O O O O O O O O O O O p O 6 O O O O O O O O O p O O O O O O O O O O O O O G� O O O O O O O O O O O O O o O O o p O O O O I o [pN O O O O O O O O o O p O O O O O O O O N N N N N� N N N N N N T4'. N N N N N N N N N tV N N N N 0 0 Cb C3 O O O O O O O o O IC? c O O O O p O O O asaasQaa,aaaaaaaaa¢¢¢auu.tti.�c',uuuc5uuuuua 0uuuuuuuu at a a a ¢i, a a d d a a& a o_ a a a d o a a a a a o a a ti ri d d d aL a a a d at ci i s m m o_ a a d m F- F- F- F- F- F- F- F- F- F- F- F- F- F- I!-• F- F- F- F- F- F- F- F- ',, F- F- l•-- d... h- F- F- F- F- F- F- F- F- F-- F- W W W W W W W W W W W W W W W W W W W W W W W W W 44M w w W W W W W W W W W tZ W W W W W W W W Z Z Z Z 'z Z Z Z Z Z Z Z, Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z . Z Z Z Z Z Z Z Z Z Z Z aZ Z Z Z Z Z Z Z Z Z GK, �CK'. a' w: W a' w omc K K K E Ni E K K Ss d' aC K K dK. Or CL:, K [C K K K C C [C C m w iK I= a"'. K K K of w ' Ol O\ 01 B1 Dl Ol Ol M Ma c a v a, v v v v v N N N N N N N N N N aavv�r Ia Ia m m O N N N N N N IU w w ,. to a) as as as as` O a m a a a O+] Cl o O. O p O O O C•A > ++ �^ N N M V Ifl '� N m V vl m Ia ro m ro Cl 8 8 O 4� �§ § N N N N N OO K7 it O, Q O O X��:'yy� O� .q + ySgy Oq.. o Gift Ly CM "". a V Ol Ol Ol O O c"jc1 O LO•l g 0 O O t�. SO g a d, CA o N N N N' N a n a l O_d. C3. KS, N N N N N N' N N p O Os 4' ca o ca az.. ca d ra: w�. t 't t 't' N N �N N n N N N ry y y o 0 0 0 o JJ J 4 c c ' Cy vs'ry +tY I!e of vl d Q o Ci ty. c-I ai i m` `m `m m `m doi w w w w Crv7 o o 2 `m `m m `m r`a `m f`o �'a `m `m a` �` �` a` � ki �s'. 'n m` m m w v w v v .-, ry m v In m` I`o I`o I`0 " > > '..... > > > v a as w v > > vl In In w Voo > > > r} r r} +++ •w + r r} >' >- �a m m m o E E E E E p e-I N T In O o 0 0 p .-I N M V Vl ti N '... M V In a E O' "�7: "�': >>>>> O o O ',. O Co Q a Q Q Q Q¢ Q¢ ',. Q O O O O O J J J J J Vl Vl Vl w d Ca ar. d c c 0 o o>> 3> j u U u u u u u u v U a a a i a` c c c c c 7 7 7 N M V M EL a E a E w a ax ca, o 0 0 o a a E E E >'> > > > > > > > > -- ->>> o 0 0 0 0 o 0 0 p o o o o o o o 0 o o R m m m m m m m m . w7 ub iN tia +,rp d d O d rv` rv`` O O O .O o 0 l7 C7 (D C7 (D U (D L7 U' E E E E E Co- E E E E U l7 Cd7 I`o Ia m` Ia ro a` a a` a a ab oil oiS oil o� o7j oiJ oil 021 o2i ail o� tZf oti oa oii o7J oil 07l oif 03 03 oli m m _a m a E E E E VI In un wn In > > > > > m m m m la VA, tlJ"I V4 - - an - an - W} HI'i 5n vo vl a E E a E .-I N m v Ln .... E E E E E" Q Q¢ Q¢ Q a¢ a ^, a Q 4 a ¢ Q Q Q Q Q o 0 0 0 0 E E E '.,. `^.. ^,». ^m ^e o '»... '^.... ...... -^... °.»., ^»« ^.„ 'w, r r.,. 'e ••�.. J J J '.... J In va vl vl In In In In vl vI > > > > > > > > > > > >' > > u u U u u U a a a a a C O O c c 7 7 7 7 7 7 7 7 7 7 ". Q. ",' ,p, Q.. Q Q Q¢ Q '1', a Q Q Q *' > > > >> >>> > > L L L L L L L L L L L L L L L L L L L L L L L O co O O O O to m m m m ITJ* m m m c7 a co C7 a a E a a E a E a(D l7 0(D c7 co C7 � cD l7 03 0 oa 63 "a 63 o3 ob 'oil o� 0 0 o6 oil a6 ca a oil o3 oil 0 ail a'J a3 0'.... 0' v v v -a -a v� -O "O V -a-o-o"O -u"O -o-a-o m-D� '.. m U-a -a -a -a V-D m J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J J O O O O O O O O O o oO , O O O O O O O O O .. O O SoO O O O _O O O O O O O O. O O O O O O co co O co co O co D U U U U U V U U U U U U U U U U V U U U U U U V U U U U U u u U u u u U U U U U U U U U U U u u c C C c c c c c c c c c c c c c c c c C c c c a a a a m a a a a a a a a m a a a a a a a a a a a a O o o o 0 0 0 O O o O o o O o O O O o e3 O O O w w t '', w w w F- w t w w I- t w w w w H F- F- F- F- F- C C �C' C •C .0 •C .0 .0 .0 •C C .0 C C C C C C C C C C W w w W w w w w w w w W w w w w W w W w w W of w W N N aA as as as N O as as as N 0a as as O O as w N as as O O O O O O O O O O O O O O O O O O O w O O O O O O > >> > > > > > > > > > > > > > > > > > > `J `1 N `1 `/ d C c C C C C C C C C C C C c c. c C c c c C C C C c C a a a CL. O O O O O O o co co co co coO o O co coO O O O O O O O O v ti v v v v v ti v 'o -o v-6-6 v v v v v v v 'a v 'O '....'o m ......' m m m m m m m ......' m m m m m m m m m m m m m m m v v v v v v v v -a -o 'a -a m; -D -D-d -a'.....v -a -a -av v v v m a v v v a v ¢ Q Q ¢ ¢ Q Q Q ¢ ¢ Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q L L L L L L L L L L L L L L L L L L L L L L L ttrnry ul �.rq,u uw,rn� In nn u„ulvp uuryry yv., nn Ln In yy rr..rr'�pp cc y+ry an q�l �el F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- +C ¢'m 'm m m m "d m ma m •m m •m m •m m "m >>> >> >>>>>>>>>>>>>>>>>> E E E E E E E E E E E E, E E E E E E E E E E E ¢ a a¢ Q °•' ¢ Q 'CK '�$ ¢ a Q Q +aL' w w w w w w w w w par W va.0 w w w w w w w w w w W r`a ip +ro sa +a m �q iu l7 •m m m a9 +u a m +ia am is v0 ro +u' io m d'a +u m m m m m m m m m ma m Iia m m TO m m m m m m m ca aj aj Q 3 3 3 3 w 3 CA 3 3 as ar ems w a! ma ma ar v au am c v ae rtIa as uu a1 as ar au ar a! v aJ v m w v m w ar a.o ar ar w C C" G C c C CC C C c c IC C C C C C c c C C c c C c c c C c c C c c c �c C C c c C c C C C c c C c ar as w a ai as 4 kM ar do a) as a® w au as ➢i ai w aS as w as as 'u w as as as as as as as m as w ej S i as as as as a a a a a a ar '✓'N: dK iK, JY M1"C C { . a" (r K Qy[ Ix as w lc w C'C OC = w w c w ac w a' aC w a' ',. aC w w CC GC.' q1C K aC ',, C cc w as C w K T—T w w w w w w Eiw!,-= w w w w w w w w w w w w al `1`1 `v li LLLL lL LL 11 LL LL 11 Il LL I,a. 11 LL LL - - - - lL 11 'X I,L iZ LL I.L LL LL LL Il lL I.L LL LL LL LL iZ T LL iZ LL LL iZ El N M r, N 0 0 C WO N w N N w N 0 N N lD N n N N w N a OO N'.,'DD N l'D N N W N ON N N 0 O �...w N Ln O M V M 0 i^ A^ V? Vf Vl Vl V! V? VD Vl V} N V) V} V} Vl iA 1/f V) 'n V 'n Vl''. V1 V! V} VT V1 V} VT v/ N to Vl V1'.. V} V} V} i^ VT V} V) V} 'n 'n VY VT V Vl .�-I N ''., 0�1 0 W V '-I Vl M W W lD N 0) N V c-I M 0, 00 ID '., �--I e-I '-I Ol W O O a -I M 1p w M V M lO W In 09 .--I r- In U O LQ n In In O Lq W lD � o0 lD In m -i n In " O N 00 n n lD In v, 00 In n 01 'ztN 00 O 00 lG1 n n W Ol al 00 .--I N 111 lGl N I N In lD N r m m w c-I V m m w .--i N Ln w N n O1 Ol Hw In mo N w V O N V O W W n M .-1 M lD M W 0 '-I n V m l0 N n V m w N ID M W n .-1 W M W Ln a -I n V M W N u'I �"� lD �"� t0 lD N w N w l0 N M M .--I N M M �--� '... �'-� N M e-I �-i N M N N N M rI rI N M .ti e-I N M VT Vf V1 iA V). Vw V} V) V} Vl V1 Vl V} V} VT''.. VT''...Vl VY "A V1 Vp VT Vl V)'. V1 V1 V? V} V/ VT VT Vl iA VY VT V} V/ In VT iA V1 V} Vt Vn VT.. Vk VT. VT. V1 } r}}} '-I N M C V1 . N M V. N M V Ln rl N M C V1 c}-I N M V l}l, J } Y } } } } y } Y Y } } } r } } Y } } } } Y } r } } } 0 V1 r-I N M V M V N N N M V V1 J J M J l7 C7 0_ a a a a C7 C7 l7 l7 0 0_ a a M M w U' l7 0 U' V' a o_ o_ a o_ l7 C7 C7 C7 C7 0_ a D_ a o_ Ln on v, Q Q Q Q a Q¢¢ Q Q a a a D_ a F- F- F- F- F- vl �n vl to v, vl v, 0 N� Q a a 0 0 0¢¢ a a a M V U u U V U u U U U . o_ . o_ o_ a a a a a 7 7 7 7� u U u u U U u u u V D_ O_ 41 Ol Ol 01 O, CT C7, CIl C11 CT 01 Ol 01 O1 Ol G, Q1 ' Ol Ol ' C11 Ol O1 Ol O, 01 Ol 01 01 CT O, Ol Ol CI, 01 Ol Ol Ol Ol Ol O, CI1 01 Ol 01 01 Ol Ol ', CI1 CI1 v a v v V a a m rn rn rn m rn rn rn m m rn m m m m m m m m m m m m m m m rn rn m o, v c c v a v v v v c c c 0 V n n n n n n n n n n n n 0 0 0 0 0 0 0 0 o O o 0 0 0 o O o 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O o o O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O o 0 0 0 0 o O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o O o 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 u u V u u u u u u u u u u u u u u v u u u u u u u u u u'u u u u u v u u u u u u u u u u u u u u u acLao_adaddo aaaa aaaaaadMMCLL aaoLddddaaaaadCLCL LLddada IF- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z s cc w w w z w'.,= f= = z s s s cc cc x a',ne s',,= w w of cc =.E.� z z'...w o- re x z ¢.s s z s s oc z Of m m m m m m m rn m m rn rn rn m m c c m m m m rn v v a v v n n m o, m rn rn v g q v q a a v v v a c v a v o 0 0 0 0 0 6 % 6 m m m m m o o o o o 0 0 0 0 0 0 0.... N N N N N N M In M to N N N N N a a N N N N N M Ln Ln 0 0 0 0 0 m m m m to m fa m m to W N N W m m Ln N m o m M (a to . to !a la 19 to Y} } y Qj Y } } y } y } >- rl N M 7 Vl �y �y •O N N 0Nl .-i N M C tlf ~ N m Ln YW T}m'}} O) O) Ol Ol Ol N M -;t ul Ol Ol M M Cn N M 'CT MM M M T aC C t t w 0w w m o, `�7 4J`, 0 0 0 0 o Mcv3>>>> >>>> o o a a a a ary OOoao000 a a a a a aa saNaa a a a 0 0 aa a a a tt tt tLn Ln Ln lui 0 OOOOOOOOONN OO 0 0 0 0 O N N N N O f m LnO O ' VI Vf V, VI Vl a a a a a L - N V, s a a a a m `m m` ra a a` a` a a` m mm m w w w w w w w 7 7 7 7 J J J J J w w w w w w w w w w 7 }} o m m m m} r }}} m m m o o a a a a a Ln Ln cn Y T T}} m m m o m> }} r Y m m m m- a a a v, a a a a a......N N m v vl.....a a a a a .� N m c M a..a n. a s N..m a a a a a a 0 0 0 0 o E E E E E 4 oI D D D Q Q Q Q Q¢ a Q Q Q J J J J J D vl v> vl vl Z) in in on o7 Q Q a Q Q Q a Q Q Q >>> V U U U V V V '.. U U U D` a a a a C c c c c»>> » 7 7 0 0 0 U U U V U U U a a > > > > > > > > > > > > > > > > > _ •_ ._ •_ •_ > > > > > > > > > > > > > > > > > > > > O O O O O O O O O O O O O O O O O= ro m m m m m m m m O O O O O O O O O O O O O O O O O O O. O 0 V 0 0 l7 (D 'V U' '.... 0 tD V 0 l7 U U' l7 l7 0_ a a a a o_ a a a a U' U V' l7 l7 0 U U' 0 U' U' U' l7 C7 l7 l7 U' C7 l7 l7 o3 o6 o6 o6 oil ob o6 ob oil o6 oil o6 o-6 oil o2F o2 a oil o6 06 06 06 oil 06 a Ga 06 06 06 co 06 06 co co co a oil 0 co 06 03 04 ob dS 06 06 03 03 oil a¢¢ a a a a a Q Q¢¢ Q a Q a¢¢ Q Q a¢¢ Q a Q a a Q Q¢ a Q Q a¢ Q a a a a¢ a a Q a Q a a > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > a a a a a a a a a Q a a Q a¢ a a¢ a¢ a Q a ¢aaaa ¢ Q a a a Q Q a a Q a a a a a a a Q Q Q a L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L +'5 L v -o v O O O O O O O O O O O D O O O O O O O O O O O O O O O O O O O O O O O O O O o O O O O O O O O O O u u U V u u U U U u u U U V u u V U u u u U V U u U U U u U U u u u U U u U U U U U U V U U U V u C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C G C C C C C C w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w `1 io io io m m io io io m m io m io is io io io io io m io io io io io is io m m io io io io io io is m is is m io io m io io m m m is L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L F- F- F- F- F-'.... F- F- F- F- F- F- F- F-- F-- F- F- F- F- F- ''. F- F- F- F- F- F- F- F- F- F- F- F- r F- m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m E E E E E E''E E E E E E E E E E E E E E E'E E E E E E E E E E E E E E E E E E E E E E E E E E E E' w w w w w w w w w w w w w w w w w w w w w w w '.w w w w w w w w w w w w w w w w w w w w w w w w w w io io m io is io io is ro io io io io io ro io is io io io is io io M io m io m ro io m io m m io io io m io io is m io io io m io io m 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 w w w w w w w w w w w w w w w w w w w w w w w '..... w w w w w w w w w w w w w w w w w w w w w w w w w w C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w K K K [L 0' 1' K 2' K C' K 0m. K w w w 0' w w D_' M w K w K K= K ',, K C ',. M 0' 0= K =-tw:: ',. K w C K K 0'. 0.' K d'w w w w w w w w w w w w w. w w w w w w '.... w w w w w w w w w w w w w w w w w w w w w w w wWW w w w w w w w w W w W Wv v w v a v w v vLL 11 11 LL LL '. LL 11 LL LL LL 11 I.l. '. w LL LL LL 11 LL LL 11 11 LL LL 1Il LL �. LL 11 LL LL LL LL LL '. El �l a °� a o a�a�w�`N^p`^�o�-:I- w m `o o r m V. 'T m�o m m "t m�N w�opt m�N,w o �lw �m m-;T w °HH o m c m N�w�o m an v�M---- vnmomo°n°O�viva1Domnmm�omvoOovO'�rnvoOovD�m'mom�omm�o~oomromm�00 � O m m 4Vl m N O O 4PM c-1 lD N 7 .-i W N V� W V1 O O Vl e-I lD O O Vl'.--I l0 N a .-i 001l'1u1W N W In c-1 wlD l0N w N ONl!1W m �/1 O V W m u'r O m W N Vl O M W N lfl O V 00 m V N N '-1 rtiN N ',. �-I .--I N N .--I .i N N eti e-I c-1 N '-I '-I '.. ri N '-I e-I N N rti �--I '-I N c-I '-I N N '.. aJa JLLa Jaa 9a.am-.ti NrVL faVm}f Yxa } }N Um V ur} } M} VY V} Y--T Ln } Y } } } } mY E 7 l7 (D a a 0 iQ a a a a Q a a 0 0 0 0Y 0}Vl�l �ra 0 imYA 0Yaa murs-i am n o n o n �p???�?=�UU srl�-I u u U U U U V d a ¢. am. a LL a LL a a n D D 0>> D n n u 01 al or tT4 ' al c1 or m al m ary qry a) al or WiM m m m m m m m m m m m m m 6 of 6 6 ar 6 or m ar or al a1 01 rsr 6 ar or a r rt v a a v v w at v v a ar'v m m m m m m m m m mlm m m m m m m m m m m m m m m m m m m m n n n n n n n n n'n n n n n n n n n m m m m m oi'.m m m m m m cro tar m m m m m m...m m m m m m m m m''m o o 0 o o o 0 0 0 0 0 0 o o o c o 0 0 o o o 0 o 0 0 0 0 o ma o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0+ 0 0 0 0 0 0 0 0 o o o 0 0 o 0 0 0 0 0 o o o o o o o 0 o 0 0 o o 0 o o o 0 o 0 o o o o 0 0 0 0 0 0 0 0 0 0 o 0 0 0 o is o 0 0 0 0 0 0 o 0 0 0 0 0 0 0 0 0 o'o o o o o o 0 0 0 0 0 0r¢ o'o 0 uuuu6uuuuuua�ruuuu ruuuu,uuuuuuuuuueruuuuuuuuuuuuaau'uu d o d d tx, a d d d d a w a, a a d r d d d d d d d d a o a a d d a d o d d l o d d o d d d ti a d d W W N"". b'° ♦- F- ♦- a- ♦- ♦- ♦- ♦- ♦- I-- H H ♦- H F- ♦- b^ F- W H H H H H H F H H L- W w W W W w W W W +y W�l W�l W W�l �Wl W W W W k�J 44A W W W W W W W W W W W W k5J Po{,ry' W W W Z Z Z Z Z Z Z Z Z Z Z 'Z 'Z Z Z Z Z Z Z Z (G:.. L L Z L L Z Z Z ZZ Z Z Z Z Z Z Z Z Z Z Z Z Z Y" Z, Z Z Z K K 2 CC ,' rr' I dC' K OC CC w K K z r,C K CY CC K 2' K ',, = 2' K K K 41` '., t CR'.. w w w w w R' tr K K K ''. K C9C rY. Im m m m m m m m m m.... m m m m m m m m m m m m m m m N.,.'.n n as v c v m m m m m m m m rn Cl)m..,m m m m n',n n n n m m rn'rn m m m m m m',.. 0 0 0 m m m m m O O O O O m m m m m 0 0 o v v av v 0 0 0 0 0 0 0 0 0 0 „D 0 ,n L m m m m m m o 0 0 0 0 o 0 0 0 0 in ui �n �n �n n n n n n m m m m m �n in ur �n yr 0 0 0 0 0 n 0,0 0 0 0 n w w w m m m m i n o r r Y w w w w w w w w w w m y vi ro m `w �a m m m m m m} r r r r m m m m m r r r r} N N m v L r m m m m m` i N w w w w w .� N m v �n .� N m v yr m m m m m k r} r r r v v v v �t m mmmm C X t >>> i> m m m m m~ N m-- C9 p n n n n n J J J m m m m m 7 J J J 7 Ca Q T.Y C7 Fa m m m m m .i N m V �n .-I N m V Vl J '', o + 00000aEEEE00000EEEEE cace,ctca.o, o0000 0 ca + C! t o 0 0 0 o E E E E E 0 0 +a o L n Ln � m o o o 0 0^���� 0 0. � 0, 0 0 n n n n n .o 0 o a o J 7 J 7 7 `n `n m 'n rao. r0i a. �. o, n n n n n o 0 0 0 0 CX a. ffi. �, na `m m ro m m a` a` a a` a `m `m `m i0 `m ri a a` a a `r" wp va w . 0 rr cs. 0 0:, `m `m `m `ra `m E E do va to N N r} r r Y mmmmm r}} r r m =0 _O m N E E E to to N GF1 �-+Nm 'Y �nEEEEE,y N m v LnE LL rLE m 0 0 0 0 o E E E E E 0 0 0 'E E E E E N m a u E E E E E . 7 J J J J In �n VI to V1 Vl to to Vl VI Q Q Q a '., Q a a Q a a J J 7 J ''... J VI N V7 Ln N V1 to to Vf H 7 u U u V U U U 'U U U d a o` ti a` C C '.., C C c 7 0 7 7 U mmm m m m m m > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > O O '.. O O O O O O O O O O O O O O O O O O m O O O O O O O O O O O E as a: ri.� E a E E l7 (D'0 lD l7 l7 l7 l9 l7 l7 l7 0 l7 0 0 Dill l7 0 0 E E E E a E E E a E us'l9 l7 00 . l7 0 l0 l7 l9 0 oiS .6 06 .6 016 o21 co ca 0 03 06 06 co ca C6 06 Old 006 06 cub 06 06 06 0b ' ca ca 0,1 06 06,06 06 ''.... 06 0' 0a a 06 co 03 0 0� 0 06 06 a 03 06 0 06 0 �n 0re Gn nn wn ua en 0n an � I vro � � ara nsw vre vro vi in m ur u'w +tt rWu vx sra yr � � � an an � wn yr aaaa a aaaaamlacaazaetaaaaaa¢a ¢aaaaaaa�:a a¢ a Q a a Q Q Q a a QIQ Q a a a Q Q a Q a a a a a a¢ a a¢ a Q 'a. a a a a a a a¢ a Q¢ a y L L L',L L L L L L L L L L L L L L L L L L L L''.L L L.L L L .0 L O O O O O O O O O O O O O O 010 O '.. O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O 0 U U U U U U U U U U U V U U V U U U U u u U u u U U u u U U U U U U U u V U u V u u U U V U U u u aC`O1 aN`OC aOC`r ciCwO>�a>dOC rLOC>N a>`0 1 a>`O_0 1 adO> rvzO> awO> a>`OOL OC s>`9 C1 a>`2 C1 .aNOC> a`OC>r oO .a`2 C>1 aO>`CJ o>`O 0>Y2 a>`OC ......a>`2 C1 rLOC>L/ LL2 C>`1 2 C>`1 >vOC >vOC 2 >`C1 >`2 C1 vOCw> .0 .0 dOCw> OCw>v Ow>vC >NOCw 0 w>vOC w>`0 C1 w>`0 C1 OCw>`/ NOCw> w>`OCJ OC w>`o C C C C C C CCCC C CCC CCC Cw w w w w w w w w w w w C C C C C C C C C > > > C1 a rl a LL rl a o_ a rLrL a s W.....LL a s as a s m m m,''...m m m m m m m m m m.... m m m m m m...m m m m m m m m m m m m m''. m m m mmm m m m m m nr m m m 'm 'm 'm 'm 'm 'm 'm m 'm M f'u`. m m .m m m m m m m m r!5 rta "m ru m m m m m 'm m m m 'm m m "up m m m m 'utr m m E E E E E E E E E E E E E E E E E E E E E E E EE E E E E E E E E'E E E E E E E E E E E E E E E E ae.r w w w w w w w w w w w w w w w w w w w w. w w w w W W w an.r w w '... w w w w w w w w w wu.i w w w w w w. w w m m m m m m m m m m m m m m +p '...m m m M m m m m'm m 0 *q m m m m m m m m m m m ma m m m m mmm m 3 3 3 3 3 3 3 3 3 3 CIA- 3 3 3 3 3 3 ml. 3 w w w w w w w w w w w w''... w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w C C C C C C C C C C C C C C C. C C C C C C C C C C C C C C C C C C C C C C �",: K C C C C C C C w w w w w w w w w w w w w w w w w w ' w w w w w w tu'w w w w w w w w w w.w w tar w.,w w w w'¢� w w CC d' C C C 2' C K K Q' C C K fk. x C11 K. C C 0_' YO' CC YX 'tr" rtC� K K 1' w K C= w C ,, K C SIC .�,- 0' C- :- w w w w w w w ("I w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w T>> TIT T T T T T T T' T T? T T T? T T T> Y TI T >. } T T T T T T} T> T T T T T >. LL LL LL W W W W W W W W W W W W W W W W W W W W W W W W Ww W W W W W W W W W W W W W W W W W W W W W W w w w w a v w w ,.. "r w v' a w w w w w a w w v w a v v v v w m a v w E w m m v `r w a w w m v w LL LL LL LL LL LL LL LL 11 LL I,.L LL Ll µ,, µ,. LL LL LL 11 LL LL 11 1.1 X m LL E LL Il M W E 11 Il LL I1 lL LL Il lL LL 11 El 00 LO m n O a n N f-1 rl m m N 'A1/f 00 00 V m N V to N'.. O W ''. n In. m N to O.4 IV Mti n Pn V V to to n ih V n m ll 0 .--I m '., m N O n e~-I lV/ m M oo N VY m m V VA 00 .--I r-I n +J'4 W �"� W to as m m N ti/A. n M V Vl to l!1 n a '... V'M n W Vh O .-I to m ,'FFk O n N Vd m M 00 N in m m a Vl* ao e-I n L? lD a-1 W vlw 00 m M N 4/1 m to M V? N tD to a 'spy 00 M n Vf v N .-1 m ID '-I O V) n .--I m N e-1 W"l 00 00 V In m N V W ''.. rl l/N 0.. W r, m ''... N to O N in m W T ON ry tD to -;t 4A w M r In v N �--� m N W r-I O AA n '...--I M N N N w CO V A m N z to c N, O W r V} m N M O N t/1.N,. n m V A to lfl n CT V n W VF o c-I W m O n c-I Vl m M 00 N rl m m V in 00 .1 r-I n H to rl W /Y ao m m rl N m r-I m N m Vl e-I 7 w N n VT W O m w m m m h m .--I N a -I c-1 n O m h .� lfl m V a -I m lfl lND N,N m W tD w ri tD W m m N m V N M n V? ao In W 00 m tD 0 n ao 00 ID N '-I w N m N 't.�..0) 00 to N r-I w V w VU 00 V m ci W W m VT N M a N m n N 00 N LD 00 m W o V} 00 00 tD c-1 rl W m R -It.-� 00 to to ci w w to 00 V- m a -I m m iR m to V w n V. w O M 00 U'1 m VA m N r-1 n m V} N to m V ri m w N m 00 '... W 00 '-I } T N M ('J () } V U T m U' } e-I CL } N O_ Y M d Y V D_ } to 0_ Y}}} �--� J J M J V T J } ci ec G } N ec C } M e G > a ec C Y to ec G } N �% Y N Y m } V } to y H D_ } N CL } M d } Zr a } to a } e-1 V Y N (i Y M (7 Y Q C7 > to V Y a -I a } N Q_ Y m D_ Y a 0_ Y to a Y . J Y N J } J > J Y J Ln Q a,Q a a Q Q Q a a a a[ O r r r r r n m V to to V n n 0 n 0 0 0 Q Q Q'Q Q Q Q a a a a o r r r r r U U U U U U V U U 0_ LL a d O_ D_ D_ LL a D_ 7 O U U U U U U U U U U a 0_ d O_ 0_ a d O_ O_ C ofmYmo�ofYYaan . d,ofd,ofananC,ofd,tTofmd,d,o�m00�ofd,mmtTo�cid,d,md,md,ofad�d�dmd, m m m m'..,m m m mm m m m'.m m.....m mm m m mm m m m m m m m mm m m m m m m m m m m m m m m m m m m m m m m m '.m m m m m m m m m m m m m m m m m m m m m m m m m m 00 0rW 0urW 00000 00 0rW 0rW 0rW 0W 0 0 0 0dW 0dW 0 0 0dW 0 0 0 0dW 000000 0dW 0 0iW 0dW 0W 0dW 0dW 0dW 0000000 0aW 0dW 0W 0W 0W 0W 0 0 0rW 0 0rW 0 0rW 0 0 0 0 0r 0 0r 0 0r 0 0r 0dr 0 0 u u u u uuuu u uuu u u u u u u u uu uuu'u u u uu uu' U u u u ad rW r0 r r rrr 'W0 dW aW0 a d d r r r o d d d d a d ad dru W WWW W0 W0 W0a W0i W0d W0 W0 W0r WW Z ZZ 0'KCwcc Z Z Z 0 Z 0_ Z ac Z cc Z w Z K Z Cc. Z Z cc Z K Z Z K Z w Z K Z wK Z Z Kw Z Z Z Z Z w Z wm Z Z w Z Z Z Z Of Z Z Z Z Z Z Z Z w Z x Z Z Z Z Z m m m m m mmm m m m.,m m'.,m m m m m m m m mm m m m m m ~ m `~ m 'i m 'i m `i m m m a m a m a v v a v..m,m m m m 0 o 0 0 0 a000a 0 0 0 0 o m m m m m m m m m m 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o 0 0 0 0 0 0 0 0 0 0 o 0 o m m m m a m m m m 0 m m a 0 0 0 o 0 0 0 0 0 0 0 0 0 0 0 O O O 0 0 0 0 0 0 0 0 0 N 0 0 o 0 N 0 N 0 N N N o 0 o 0 0 0 0 O O O O C O O O O C �"� mmm �"� �"� " m N m m N N N i W M i N 0 0 0 0 0 m m m m m v m v m v m v m v v } v } v > v } v } ,-i ,-i m m m m m v v v m v v m m m m m m m m v v mmm v v v N y}}}} W al N N N N m m m m m m cr4 m } --I } N } m } } to .� N m v m m m m m m m m'.....m m m m m m m m } > } Y > to m m Q m m V m V m V m - > } Y ', } } .� N m a to m m m w m N m N m al rl H 0 0 H 0 wV 0 a j j j D j ` ,e ` �. } T } } y ci '-I '-1 ci 7, 7 7 7 7 7 0 7 7 7 7 7 O O O L' O O. T Y Y > Y 0 0 0 a a s a a O a O a O a O a O a .--I t N C m t'.....t a Ln t O o O C O O O C O C a a a a a.o 0 0 0 0 C C 0 o a a d a a a a a a a a n n a.. a.0 N t m t V t m rl rj c-j ty .-y O 0 '.. O . O O 7 to 7 to 7 to 7 7 to O a O a O a O a O a c-i H .ti ati c-i 0 0 O O ,O N N N N N O O O O O 7 7 7 7 7 O O O O 0 mmmm¢¢¢¢¢ aaaaammmmmaaaaam�mmmaadaa a.cxaaa aJ v } Y N Y v Y mmmmm 7 J d 7 d 7 d 7 7 to 7 to 7 to 7 to 7 to O) Y N > al > m Y W > mmm m m N '..... Y v } N > a! } W Y mmm m m 7 a 7 a 7 a 7 a 7 a 7 to 7 to 7 m 7 to 7 to N m v to a a a a a a c 0 o o o E' E E E E N m v n a a a a a' ry m a a a a a a o 0 0 0 0?> j>> aaaaaaaaa•-•-•- a d -- a s 7 7 7 7 7���N��+�� »>>>>> Z) n Z) naaQaaQaaaa u U U U U'U u U U U a a` a` a a c c c c c u u >o o> u >o u >o u >o u >o u >o u >o u >o mmm a` mmmm c_'c c m c_ m c_ m > o > 0 > 0 > 0 > 0 > 0 > 0 > 0 > 0 > 0 > 0 > 0 > 0 > 0 > 0 > 0 > 0 > 0 > 0 > 0 m m m m m m m m m m. (7 ',,. (7 (D0 (D(7 (D 0 (D K a a LL a a '..... a '.... a a a 0 (7 U (7 (7 U (7 (D0 (D (7 (7 0 0 0 0 0 0 (7 0 a a a a a d a a a a o6 o3 o6 o3 o6 o6 ob o6 oil oil o3 oil o6 o6 c6 ob '......6 o6 .6 all o6 a cO -6 ob -3 oil oil -6 -6 ail 06 0 -6 02 oil aS 0 a a oil 06 oil oz a 06 a .6 o6 '.. VI N a Q V1 a VI a N a N s N Q to a to a¢ V1 N Q to Q to Q 'tn a a < VI Q N a N a m a m a to Q to Q a < Q < Vf Q to Q N Q to Q !n a to Q a < to Q to Q to a < a < Q to Q to aaaa < to to m ¢ m a ✓1 a In a to a m a > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > �. > > > > > Q Q a Q Q Q a Q a Q Q Q a a a s a s a a a a a a Q a Q a a a a a a a a Q Q a a a Q a a Q Q a a Q Q L.+ Y L N L L L ,5 L.+ + L L L L L L y L L y aL+ L L— Y Y --- '3 '3 .� 3 3 .� 3 3 3 3 3 3 3 3 3 3 .- 7 7 O O 7 O '. O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O u U U u U u u U U u U U ''.. U U U U U U U U U U U U U u U U U u U U u U U u U U U U u U U U U U U U U C C O O C O C O C O C O C O C O C O C O C O C O '. C O C O C O C O C O C O C O C O C O C O '. C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O '. C O C O C O C O C O C O C O C O C O C O C O C 0 C C C C C C C C C C C C C C C c C C C C C C C C C C C C C C C C C C C C C C C C C C C al QJ v N v a) al al v m v v ', a1 N v al al al N v N v N al N al QJ v al v v N al al al aJ N aJ N al QI al m m al v N v a! m m m m m m m m '... m m m m mmm m m mmm m m m ''. m m m m m m m m m m m m m m '',mmm m m '... m m m m m m m r r r r r r r r r r r r r r r r r r r r r r rIr r r r r r r r r r r r r r r r r r r r r r r r r r mmm E E E o E'E m m E m E m E'E m m E m E m E m E m E m E m E m E m E m E m E m E m E m E m E m E m E m E m E l m E m E m E m E m E m E m E m E m E m E .� E .� E . E m E''E m m E .. E E m E m E .� E w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w W w w w w w w W W W W W W W w m m m m m m m m m m is m m m m m m m m m m m io m m m is m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3'm 3''3 v c v c c c v v v v v m v v v v v v c v v c c v c v v v v v v v m c w c c v c v v m m v v l m v v c wwwwwww'wwaciwaciww'wwwaciwwwwwwwwwwwwwwlwwwwaa)www'acw'wwaa)aa)iwwa) K-- -- 0c - w cc C K- K z K K K Kac C CC cc Qc cr,w cr w w oC.aC W. w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w l II1 LL 11 LL w 11 LL w t .l 11 11 t.L LL I1 I1 I1 tA. Z LT, LL t.l LL LLt.l LL Y LT LL ` a:LL LL LL ` LL 41,. LL" ` LL ` LL w LL LL. ` LL LL LL LL Y LL ` LL LL LL LL It M d' ti O Z E 0) El M N m m�0 m r � 0d and w� -;r w......, m�., N . 0001"11"I,,'., r,m�Nl�O rw �N mlNllim � O1 �ti� W O W rNwmO0 r-M U0 M t0 Vl V .--I N. 00 O .ti I O 1 O O .--11 N R r-I W N .-1 Ij N N V1 M I� m N l0 N N n O N N V1 w O L �j -�tlm�cn� �o�o,a�ao `° `� m�mllOD 0...-r r,�" m ;I- w ,r w o�l . w m r., 0.'T ��m�r�o�.a-, N `r�w�o�-zt W'm ��W�Hl...N a oWW�m.._m �IfriNii�lirii��liCii©©®�i71©C7i®�®I®�I®®I®I®�mlm�m©�.7�,l�ll�®I@�F©©©�7I©I©A�l�lil�+1�D.'l�P.�lr.+. rrrrrrrrrrr>•'.rrr'rrr'>.''rrrrr r.r.,s....Nm�y•.....,r,�rrr>rrrrrrrrrrr..rrr v^I N M V 1f1 .y N T V Vl e^i N M V 4%i '-I N M C V1 J N M J '-I N M a N �--I N m� 'i N M V t l7 C7 (7 (7 a a a a a (7 (7 a a a a a N m�� l7 N m l7 'o a s as o C7 N m crry ut Q Q Q. Q Q ¢ Q ¢ a a a a �. '.... h F- H h-• f- m of m ut ut u'ti Lm m Q Q Q Q '... Q Q Q Q u u u u y a„t u u u C1w 01 (11 CT O1 Ol m Ol 01 Oat CFh C7v. (]1 m Oa'Y m 01 (]l CT m Ol Ol m O1 ✓ 01 01 Ob Qr a) Ol eT Or m m Oat Chi CI}Y Ol Ol m CT 01 (T c h m m (T m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m O'b {4ro m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m v v v v a v c pr a m m '.. m m m m m m m m m o i m m m m m m m m m m r: tww m m m m m m art m m m 00000000000 00 0000000000 00 00000000000.,mm(na)m,),3),) 0 o 0 o 0 o 0 0 0 0 0 0 0 0 0 0 0 0 o 0 o 0 0 0 o o o o o 0 0 0 0 0 0 0 0 0 0 0 o o 0 0 0 (.7 U U U U U U U U U 0 0 U U 6 U U U U U U U V U 0 4nb U U w..d� U u u U U u u u 6 6 R u'U u U'' u u u 9 ,- a a a a a a a a o_ spi.� a s dw a a a a o_ a d a a ra. a. a s a a a a o_ a a d ca.. ¢, a i o_ d 0 u o_ a w F- H F- F- F- H H F- F- U•- 4ca F- F- 6-" F- F- H F- H H F- F- H F- H F- F- f- H F- H F- F- F- b- wW WWWWWWWWWWWWWWWWWWWWWW W W wr WWWWWWWwa aa a a cc ''m cc cY: z ". cc z z cc x m x= w Z Z Z Z Z Z Z Z Z' Z Z Z Z Z 'Z Z Z Z z z z z z z z,z z z zz z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z '+as�p�Ja,•' +rf'�tj v .� N m a K:J I C;5 0 7 J J J J C,o cx 0 o a a a a a o o 0 o'O o v V` VI Vr V) VI Vr Vr VI VI VI N ¢ Q Q D Z) :D Z) M) U U U > > > > > > > > > > > > > O O O O O O O 0 0 O O O O 0 C7 ' (D C7 LD C7 ' 0 l7 l7 !7 C7 l7 l7 1�]Ei00�0001F1I0IDE' L L L L L L L L L L L L L O O O O O O O O O O O O O U u uU u''U U u,U U u U'.0 C C C C C C C C C C C C C O O O O O O O O O O O O O C C C C C C C C C C C C C w w w w w w w w w w w w w > > > > > > > > > > > > > a a a a..a a a a a a a a a- . m m m m m m m m m m m m w w w w v a w v w v v L L L L L L L L L L L L L m mmmmm 'm aiam m m 'm m E'E E E E E Ead.rE E E E E E w w w w w w w m m m m m m m am ml. m m m m 3 3 3 3 3 3 3 3 3 3 3 3 3 w w w w w w w w c w w w w C C C C C C C C C C C C C w w w '., w w w w w au w w w w CC 0_ (C z [Y CC '', CC w" wC K CC [Y LLI WI WILLIiLLI'wllwRwllLL L 3 mmmm m m mIm 55 6 6 6 ': 1IWL W` w w w w w w w w rrb l n` v ura' cob m m m m m w m ami r r r r r r r r r N m v an m m m m m m m m m 7 7 0. a O O '-I N m V Vr 0 0 0 6 3 � � 3 a a a o ,o Eaa o o o rx ca oa C C t c C C 0 O O O O a` Cr `I vi.... o o o .O cL a ao C1 0. C]a. R'L 0• m m m m m a a d a is io �o a a a a n rru m yr ut arw '. r r r r r io io io io a a a o 0 0 0 o E E E E E .� N m a an a:a a: a ¢ Q Q J J J J J Vr VI VI V1 VI VI Vf VI N 1. U U U a d a d d C C C 'C C 7 > > > > > > > > > > > > O O O r0 io m io is is m dd io O o o O O O O O O 0l7 !7 a a a a a a a a a a (7 C7 U (D (7 l) 0 U () ¢ QIQ oZi Vr trti rxd in ut va ���0�� rn m Vn w ��«xOts an ua rn L L L L L L L L L 3 3 3 3 3 3 3 3 3 O O U U u'.0 U U U U U C C C C C C C C C O O O O O O O O O ,a •> .w> c. > > > > > vv v a v a o_ o_ a m a` m a d m m m m m m m m m w w v a w v w w v H H F- F-,,, H f— H H F- mm w w...w w a�.....w w w w 3 3 3 3 3 3 3 vvv M M E L L L L L L L L L L L L •3 .3 3'3 .3 3 '3 3 .3,'3 3 3 J J J J J J J a 7 J J J O O O O O O O O O O O O U U U U U U U U u U U U C C C C C C C C C C C C O '' O O O O O O O O O O O C C C C C C C C C C C C w w w w w w w w w w w w > > > > > > > > > > > > v a v m v m v v v a w v a s a a....aa....aa a s m m m m m m m m m m m m w v a v a w a w w w v v L L L L L L L t L L L L E'E E E E E E E E E E E m m m m m m m i m m m m m 3 3 3 3 3 3 3 3' 3 3 3 3 w w w w w w w w w w w w C C C C C C C C 1 C C C C w w w w w w w w w w w w HIMw w w > M M 11 HIMowm m m p'r m m m era m m m m m m �15, m m m c.> > > > 142fl2N N l o1 o1 of o C C C C Ca C C C C w w w w w w w w w v v v v v m m v v^ a a a a m m m m m m m m m w a v w wL� w w w F-f— m m "m "m m E E E E E E E E E w w w w w w w. w W LLI'�IWILLAw�wIiLLuLL El OI Vl .� V c-I al C al n lD w . m n lD IO...m .--I V N' m m n o n V O o..N w m O o N w In m n o n� m n o n V o o N W n 111 M rl GD to O O n V l!1 O O n V n In m ti W ti M n N 00 M w n N a0 f l tD n N 00 r-I m n N o0 .-I m n N o0 to lD n M Ol al O n M w n n N 00 00 n n N 'o al al O n m la N o 7 n n� . m 00 N w N O� n w N O V n r' v m m N m 00 O M N Vl n O N N In n '.. o N N Ifl w O m N Vl n m rI N Lf1 n m N N 111 n m N N t!1 n m r-I N ul n m �-'� N 0 n in n n an v v* n n n vu n of to ,n n an .n vl n n yr n n an n n vl v InY �,vr O o O V N O H N al N V1 rl N al N In o O V N O o o n lD In w w M n H Oo W M n �--� O O n w ul o O n ID M 00 w m m N V M .-1 al O0 lD In c-1 lD 00 lD Lf) r-I W N V M al M n n n al N e-I N N m V N N M V m n n m v w N m M N In w W n N In W w n v W N M M O O .-I OO 1f1 �--� N V N .-1 ei N V N e-I O O N 00 Vl O O '-I w I/1 �--� N V Vl m la m N Vl M w w c-1 a M w w H't M w m N Vl m lD w O M m Iw w H a m w m �'-� V m lD 00 O m m w 00 O m m tD 0o e-I c-1 e-I rl e-I .-I rl r-I .--I rl ''... vw to V} i/f i/} Vf �. 49 [n to In 4n V! V) in VT i/F V? V} In to Vf V/ 1n t4 Vf Vl 4/f Vl N 4n Vl'...in to to Vl to to in i/f V} M.. M• y/}. } } Y Y Y Y Y Y Y Y Y } Y Y Y Y Y Y Y Y > Y > Y Y Y Y Y Y Y Y Y > Y Y Y } Y } }}}}> c-I N M V Itl LD N T V (D c-I N M lfl e-1 N M 'CTu 0 .-I N M V V J J M J J M V m 0 N M V 0 n. 0- Q- m U C7 (D l7 C7 a a a a a l7 l7 l7 C7 C7 a a a. a a w F- C7 l7 C7 C7 U' Q a a a a. a. r r r r r m m m `n N a Q Q Q Q¢¢ a Q Q a a. a s a. r r r r r In In In In In 'n V a a a_ a a a a a a a ':� � U��� 7��� 0 0 0 U U U U U U U a a a a a a. a a O1 m m m m m m m m m m m m m O) m m Cl m m m m (n m M M M M m m m O) M M m m m CO Ol � Cl C1 01 M a M M M al a1 Ol Ol Ol Ol al dl a1 T Ol al 01 Ol al al a1 m m M m m al al al m m m m m m al m al m m m m al m m al m m m m m m m 01 Ol 01 01 Ol al al al 01 Ol T a1 Ol al al al al a1 al al 01 Ol a1 a1 Ol Ol a1 al O a1 al al al m m al m M al m al al m M m al m al al al Ol 01 al '.. a1 al al al a1 01 Ol O1 Ol O1 al Ol al al al al Ol a1 al al al a1 al Ql a1 T al Ol al al a1 al 41 Ol O1 Ol al al O7 01 a1 O7 Ol al al .�.�,�,�.�.�.�.�.��.�� vavvvvvvavv � a vvvvvvvvavvvvaa o.o oo 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0.0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0'..o 0 0 0 0 0 u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u v u u u u 6 u u u 0 u U'u u u v u u aaaaaa,aaaaaaaaaaaaaaaa0_aaaaaaaaaaaaaaaaaadMaaaaa r r r r r r'r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r W Z Z Z Z z Z'ZIz z z Z Z Z Z Z Z Z Z'Z Z Z Z'Z Z Z Z Z Z Z Z Z Z Z Z z Z Z Z Z Z Z Z,Z Z Z Z z wy w cL K K w w w w w K w K K K 4' aK '.... 0C tlK C '.... C C K K K K S cr 0' 0! K w K w OC ''. w K OC K = K w K w a m Ol Q1 M al al al al al al m m m al m al m al m T al al al al 0) Ol al al al al Ol Ol m al a1 Ol a1 m M M al m a1 al al 01 Ol Ol al Ql Ol a1 Q1 al al al �Q7 O7 al al m al al al al al 01 al al ,�.�.�,�.�ma)- m1 .11°.11N 'I'Tvvcv� , cs6a)...mmmm aaa 0 0 0 0 o o m m m m m o o 0 o 0 O O O o 0 0 0 0 0 0 �.,,,� O o o o 0 0 0 0 c '� `'"� `""� `""� 'ti o o o o o o o o 6 o 0 0 c 0 0 0 0'o 0 0 o 0 0 0 D o d o 0 0 0 0 0 0 N N 0 N 0 O O O O O 0 0 0 0 0 O O o o O N N N .. N N O O O O O o N O �--� O O O O O ."� ""� N N N N N"` ` c O O O O m m m m m Ol m m m m ... m al m r0 N t9 to O O O O O m m m al al ry N to t0 to al al a1 al T N m to t0 m N W N N N o o O O o al al al m al to m to w w w w w iy �y �--I rl Ol 41 Ql Ol O w w w w w 01 Q1 Ol Q1 al w w w w N N N N N al al al m al }}} }> Y Y Y Y Y} Y � � � al Ol 01 Ol Ol N H N m V M 10 t0 a] tO '�-I chi '�-I ci N M V I/1 '... V V V R V rl N m V tll H N m V V1 w N w w awj C V V V V H N m °' M a' aI , o o o o o o o o o o i' L' r C t' > Y Y Y Y o 0 0 0 0 j o c o o o N 0}'1 V M o o O. O o j j j j O O O O O j j j j j o o o o o O O O O O j j j 0 C 0 0 0 t N M V N C c 0 c a a a a a a O O O O O a d d a d O O O' O O W a a a a a r r o o o o o O O O a a a a a t r tf t t o c 0 0 0 D 7 7 J J J 0 0 0 O O ti r-I N'. rti 0 0 0 0 O�N N N N N o o o o o 7 7 7 J 7 0 o 0 o o N N N N'N . Vf N Vl Vl in o o a. o o N m a a.. a s a. i a a cal .. a.. a a. m `m `m `m `m a` a a a a `m `m `m `m `m n- d a a` a a a. a a. a. m `m `m m` `m a n. a- J J 7 7 J J J J J J w w w w w w OI w w w 7 J 7 7 J J 7 J J 7 w w w w w rti a a. 0_ a. d- N VI VI Vl Vl Y Y Y > Y f0 f0 fO f0 f0 Y > > Y } IO i0 f0 IO i0 Vl In VI Vl VI Y Y Y Y Y i0 f0 10 _ d a d d a a o 0 0 0 o E E E E E r N m v v a a a a o- N In ajv a d a a a o o w o o E E E E E N m V n a n a VI VI Vl VI VI Vf Vl VI Vl to Q Q Q Q I,. Q a Q Q a Q J 7 J J 7 D VI D Vl Vl In Vl Vl U a a d a a c c c c c 7 7 77 7 7 z) z) M'.0 u U U'u u u U U U'a a i a` a C C c C c'.> >>> >� > > > > > > > > > > > > > > > > > > > > m Io Ia nl is ro a5 w m w O O O O O O O O O to = n] O O O O O O O O O O O O O O O o O O O O o o O Uo (7 (7 3D (9 l7 (D (7 (D 0 0 0 0 0 0 (7 l7 l7 U (D a M a a a o. a a a a 0 (3 (D C7 0 (D 0 (D 03 CO 06 06 Oz 021 ob CO CO CO 06 03 oil 06 oil '..... oil oil 06 06 Da 06 0' a o3 a a ob 06 06 a a�S 06 06 ob 06 0E 06 06 06 06 Ca � CO a 0i 0lf 06 06 03 ¢¢¢ a a a a a a a¢ a a a a a a a a a¢ a¢ a a¢ a a a a a a¢ Q a a¢¢ a a a a Q a¢¢ Q a a > > > > > > > > > > > > > > >:> > > > > > > > > > > > > > > > > > > > > > > > > >'> > > > > > > > Q¢ a a Q a a a a a a a¢ a a a¢ a a,a a a a a¢ a¢¢ a a a Q¢ a Q a a¢¢¢ a a a a a¢ a a a L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L Y L L +:5 7E -E 45 L L 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 7 J J J J 7 J J J 7 J J J J J J 7 J J 7 J 7 J J J 7 J J 7 J J J J J 7 J J J J J J 7 J J J J J 7 J O O O O O O O O O O O O O O O o O O O O O O O O O O O O O O O O O O O O O O O O O O 1 0 O O O O O O u u U U U u U U U U U U u u U u U u u u U U U u U u u u U U u u u U U V U u u U U U V u u U u U U C C C C C C C C C c C C C C C C C C C C C C C C C C C C C C C c C C C C C C C C C C C C C C C C C O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C c C C C C C C C C C C w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w a_ O_ a. a. L L L L r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r E E E E E E E E E E E E E E E E E,E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E ra ro r0 r0 r0 m ra m r0 ra r0 ra r0 m ro ra r0 ro ro m r0 m m ro ra ra ra m ra r0 ro m m r0 ra ra r0 r0 r0 m ra m m ra ra r0 r0 m ra 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 w w w w w w aJ w w w w w w w w w w w w w w w w w w w w w w w' w w w w w w w w w w w w w w w w w w w c C C c c c C C C C C C c C C C c C C C C C C C C C C c C C c C C c c C C C c C c c C C c C c c C w w w w w w w w w w w w w w w w w w w w w w w w w w w w w wI w w w w w w w w w w w w w w w w w w w C K K K OC K CC 0.' 2 2' GC ',. K K GC a' 0= 5 Cc 0_ c K OC K w w w a' w C C K a' a: a: w K 2 w OC K K K K w w l w w w w w w w w w w w w w w w w w w w w w w w w w w w w '.... w w w w W W W W W W W W W W W W W W W W W W W W W W W W W W W W w w w w w" w w w w w w w w w w w w w w w w `/ w w 212 w `1 w w `J w w w w w w w it w: `1 w w `1 w w `/ w w L L L L L L i L t L Z _ _ _ _ _ _ _ _ ll ll LL 11 l.L 11 L 11 LL LL I1 11 11 Il LL LL 11 11 LL 11 LL LL 11 LL W w w 11 LL LL 11 11 LT- LL 11 11 LL W 11 Il Il W w ll 11 11 11 El M NN V INO .w 0�" � IWONW N N V�ILO w N�NIS IID W 0 N 'T Lo W 0 N VI,. n�oON � Ln n�O�1 C�V�1 � On�1�N R V��7 01 N V Ln 0�1 cq N � nCO �m�m �...^�n�0lm ry ^ n 0�.rv-I ^IO am Nll ^IIIn m'N rvl ill^ 0 �I WIw wl mO L�o t�O O-I�� N ol 0,,,, tWO Ol �,,,,N 00 V rvo_ >an,>Nt7- >ry >m >c >v>>>r> r>>,>,>>r>>> r >>>>>»>>>'>>>>>o_ ro_ >o_ >a j>N> >J ra >m >- >r- o N m c �ry _2 2 Nma in N ry M v m¢NQm¢v in N m v Lnu C7 0 0 a oa-aoJ 7 7 7 a on- 7 7 7 LL¢¢¢ Q¢ Q Q Q¢ < <¢¢¢ Q¢ a a a >> u u u u u u y u u u o_ of a_ a o_ a o_ o_ o_ LL D m D D D�?:?? u u u u u u u u u u o o_ o_ a a a o_ an 6 6 d� o� of an en c, m di ci m m m ai'..... m m m m m m m m m m ck m m ci....d� a c� oi..o, d, ai m 'm m m m m m m m m m m m m m m m m '..... m '..... m m m m m m m m m m .c� of of m m m m m m m an mm m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m v v v v v v v v r, v v v v v v v v v v a a v v v v m m m m m m m m m m m m m m m m m c v n n n n n n'n n n n n n n n n n n n n n n n n n n n n n n n m m m m m m m m m m m m m m m m m 0 o o o o 0 0 00 0 0 0 0 0 0 0 0 0 0 0 o o o 0 0 0 0 0 0 0 0 0 0 u u u u u u u u u u u uu u u'u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u'u d d d d d d d d d d d d d d d d d d d WZF FW W W W W W W W W W W W W W W W W W W_ dW-,dFW dFW- FW FW FW FW FW aF dF dFd Fa dF Fd aF dF aIW- aFW 8-FW d FW FW d ZF W W W W W W W W W FW FdW Z Z.Z Z''Z'Z Z Z Z Z Z Z Z Z Z ZIZ,,.Z Z Z Z Z Z Z Z Z Z''.. Z.Z Z Z Z Z Z Z Z Z Z Z'..Z Z Z Z Z''Z Z Z cr LC w 0: CL' cca- K K w CK w [Y K K CC fl' of K w w w m K w K w C== w w w C K w K w K K K w of Sl' m m m (n aNa) m m m m m m mmmmmm mmm m m m m D m m m m m m m m m a) m m m m m m er m m m m m Cl m ea m m 'o), M7, m s dmi v v c " a a a m m m m m m m m m m m m m m m a7 anvil smaw oq' rna" n °` nnnn dam a 6' nnn 6o00 oo ro°a � oo oo eo°a oo o m rna C7'. Oz b C7 r;.0 CN a Or o o c o o CY Q o Cz CY Cu. Ot vn wn +re o o 0 0 0 m m m m m c ''.. o o 0 o ''. an a` cn en c. i `�. T. (`o m m m m m m to m r`o m O c O/ {':A O m m m m m m .w /tit m C4. LY m m m m m v v o v v R R uD an Ln m m m m m ,� m m zvw m m a) m co m r`o ro m` �o uw uti v v lzr IT v v v v v m m m m m m m gat m aw v v v v v -tLn ^rrrr>>rvmvvr `a � m `m vaavv»»Ln mm De}''>iiir>>rrr n n n n v n ry m c n v v v v v rv'm v u� m m es, Dw ti N m v m ti ry m v n `o 00 0o0 r r> r> aso'r o > > q O o > > > > > a' O O 0 O o o a0 � SO C] o 4:7 c O .-I N M V Vf >>>> 7 J J 7 7 {p [pq a a a a [1 LL LL O• CL 'O. i']. O., M17 C'P O Ol. z'.t, Ck 6k ai O, cy ti p o o ca o sr oz C C k 0 o g a o o n o cwroa o 0 0 0 o r n "o o a o acl n n + v O O O O O w V v d n: n. O O O O O J 7 J O O O, C:0.. Cl M O,'. a` a` rp m m m N d a d a a O, Sk. Q O. CL. N m mo` 2 d a o` ` l/4 I n in nn N `m m `m m `ma a o`.o` a` [. 7 7 J 7 J m m>> r r> m m m m m a a a a a wr� to o ul w^s r>>>>m> i>>> m m m m m a a a a�.. y....' a s ry m v m a o o a a o' o O o o E E E E E ri rv'm a m a a ca a a ry m m a a a a o 0 0 0 0 o E E VI N Q Q Q¢¢ Q¢ Q¢¢ J J J J J o In VI VI v) V1 v) '... o Vl o Q Q Q Q¢ Q Q¢¢ Q .- >> U u U U u U U V U U'.a o_ a'o_'o_ C c C c C 7� 7� z) n: n>> u U u V u U U u u U > > > > > > > > > > > > - ._ > > > > > > ', >. > > > > > > > > > > > > > O O O O O O O O O O O O mi2 fo T = Ofo m O O O O O O O O O O O O O O O O O O O O O O O O ro O l7 0L7 l7 l7 l7 '., 0'..... L7 l7 l7 l7 C7 a a a a a o_ a a o_ a C7 l9 t7 0 to C7 U C9 V C7 C7 U tD t9 C7 Co C7 C7 0 C7 a a a a a a a oil O� ca oil o6 oa o3 o'6 o'J 0 o3 o6 ci cO oa cZ o6 ob o2 o3 o6 oa o3 co o� off -6 o3 -6 ob .6 o7j ob o'a a off 0 .6 0 0 o3 .6 0 ob o?$ o2S .6 aA"b 4h {n < V1 ud : F :! V :. , < < to , N try , 6�•I' , Ike* * - - - ✓1 Vp ' W uM1 W'4 9n - Q¢¢¢z¢¢¢¢Q¢¢Q�QQa.�.�.�Q�+$°¢aQQaQ¢Q ¢QQ¢«�Q'QQI¢Q' y L y Y Y N N L N N Y L N ',� rL+ L Y aL-1 L L L L L L L L L L L L L L L L L L L L L L L L L L L L L 3 3 3 3 3 3 3 .3 .3 .3 .3 ----- .3 ME .3 -- -3 - 3 3 3 a a a a a J J J J 7 J J J J 7 J J 7 J J J J J J J J J J J J 7 J J J 7 J J J J J 7 J J J J J J J J J J J J J O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O V U U U UU U U U''. u'V U u U U U U -u -U U U u..V u V''U u u u u u u u u u'.. U'U U uV V'..0 UU U U U.0 u C C C C C C C C C C C C C C C C C C C C C C C C C C C C C c C C C C C C C C C C C C C C C C ti:. C C O O O O O O O O O O O O 0 0 0 0 O O O O O O O O O O O O O O O O O O O O O O O O 0 0 0 O O O O O O C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C;' C C W W N W N v N v v N U/ ql v > ` y m m m m m m m io m m '. m m m m m m m m m m m m io m m m m m m m io m m is m m io m m m m m m m' m' m m m m L L L L L L L L L L L L L L L L L L L L L L .0 L L L L L L L L .0 L L L ''.L 'L L L L L L L L L L L L L F F F F- F F F F F F F F F F F F F F F F F F F H H F F F F F F F F F F 'F F H F F F F F F F F F F F Tp f0 l0 N N f0 (0 f0 N f0 m m N (0 IO CIO N N f0 •N N l0 Y'i T IU fd N fO mN f0 ' fO .f0 .fU •IC f0 'f0 "f0 f0 N N N mf2' f0 •f0 IO f0 (p E, E E E E E E E E E E E''E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E w W W W w w w w W W w W W W W W W W W W W W 1n1 W W W W W W W W W W W W W W W W W W W m m m m m m m m m m m N mmm m m m m m m mivY m m m m m......,m m m m m m m m m m m m m m msq,m m m m m 3 3 3 3 3 3 3 3 3 v v v v v v v v v v v ar v v v v v v v v v.v v v v v v v v v v v v v v v v v C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C eC a,C d' K CC C CC K K d' C ti dC [C K d' LC K N N N N v N N W v N w v v N N W W N N v N N N v v v v w v v N w v Gl N Ol N ar v N W N v N v N N N W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W N v `/ `/ N `l . v `1 v N W N `1 L L L LL LL LL LL LL LL,LL LL w LL LL LL.LL LL.w I.1 LL LL LL LL LL 11 LL I1 LL I.1. 11 11 11 LL LL'lL LL LL I lL„LL LL'.LL 11 lL I..L LL 11 LL I 11 LL lL LL''.I1 El .-i V Co to m e V 00 n V to , Vl I.'l lD Vl I� 0) O m N M m o m N m m M ID Vl 1� Gl M to Vl 1� Ol O 01 N m Ym I, m .--I n V m V Vl W N M V Vl to ci M 00 00 n c-I N' al N' VI al P, O O O m I- O O O ti N 01 N Vl .ti N T N V1 Ol 1, cc O al al 00 O m lD 1� w m .-I N I- LD Vl N d' Ol m Ol 00 lD co m .-� 00 n ti M M OO n c-I M M DO ID 00 In .-I 00 W 00 M .'-� 00 r' N 00 M W m Vl lD I� m I, m N V m N of N C Vl I -I Ol a -I m V w w N m m w w ci m m w '... w c-I m V l0 w a -I m V w w m m w w c i M V lD N c-1 lf} lf? v? aA VT vl iA to in an V! vto N 'A V} '.4 VT V} ....... . V} to V} Vf VT..''.,in.. VF Vl V} 1/} Lf VT L? V} VT V? . . 1.. Ol 00 00 V 00 Ol 00 oo o0 lD O M to V 00 I� N W N V V al V N a V 01 V -Cl. 00 n N w V w ^ N 00 N V V Ol t O O m O Vl m OIOI Ol V 00 Ol Ol O V O1 00 ''...I� l0 W to lD 'i I� n W 'i n 00 lD N O I� W lD N O I� n V lD 'i N V1 O lD N I� M Vl 1� Ol 7 00 Vl 1, m m O 00 '-I V O . l0 m m c-I M 00 00 1, .-1 m 00 00 r� O '-I W m M O c to m m N m 00 00. I' 01 (3 N O I' o l0 00 O N V l0 00 O N In lD m N � Vl r� al N T Vl I, 01 N V I Vl - 01 N V Vl r� M N 'T Ln I' Ol N a Vl I' (n rl M Vl n 00 N 4/F t/? a? VT iA N V1 V} N i/f i/Y Vf th VV ih N 4h t/f M) VT to VT th VT N M to N N N 1/f In N. to % lA ih iR VT W N N, ih N 1A v1 in V! In i M V Vl .-I NM VI rl N M V V1 e-I NM V VIN N M.......,V Vl N J J } cc cc cc y } } } } } icy cN cM cC uc1 rl N M a Vl iy N M a. Vl d d d d d d J J G G C 0 0 0 D l7 �J d d d d d V V d r r r n n n Q Q Q Q Q Q Q Q a Q d a d d d r r r r r d d d u Q Q 5m0555DDDmU U¢ UaU¢ V U U U U U U U U U U 9- d 9- d d 9- 9- a-Q + + + i. + + 01 01 01 Ol Ol 01 C71 Ol Ol Ol 01 01 Q7 Ol Ol Ol Ol '... Ol CI1 01 Ol O1 Ol Ol 01 Ol 01 01 41 O1 Ol Gl c l C11 Cl Gl Ol 6 c O Q7 Ol Ol Ol o o o o O o al al al al al m (nM O) (n a) m Ol m al Ol of Ol al al al Ol Ol al al m m m m m m m m m m al Ol Ol Ol Ol Ol m m O O o O O O Ol Ol 01 01 Ol Ol m 01 01 m m m m m m m m m m m m m m m m m m m m '.., m m m m m m m 01 01 Ol Ol Ol m m O O O O o 0 Ol Ol al 01 Ol 01 01 Ol 01 m m m m m m m m Ol al m Ol cn Ol Ol Ol Ol Ol m m 01 01 m m m al m m m Ol 0) m al M O O O O O o Ol 01 al Ol Ol 01 Ol Ol dl T T Ol Ol Ol Ol Ol Ol 01 Ol 01 Ol Ol Ol Ol Ol Ol Ol Ol Ol Ol Ol Ol Ol 01 Ol Q7 T Ol 01 Ol Ol 01 01 O O O O O O O O O O O O R ZUar ZUdr ar dr dr ro O O O O O U U V U UUor U UerW-I rWU."� erWU-I rUc-I U Uer-I Urrl '. Uer-I rVe-I V Vrci VN UN UNr UrN U a ddd a a oC_ d d d d OL d d d 0d d d r r W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W WNr W Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z ZZ Z Z Z Z Z Z Z Z Z Z Z Z Z Z ZZ �6� w K w K C wKddof w K w 0_C ' K Of cc KCC'K OC SK 0'0L.K K Ndr '. Ol m m m m Ol m m o m 01 01 Ql Ol Ol 01 01 D7 T 01 Ol Ol Ol Ol Ol Ol 01 Ql Ol of Ol 01 m 01 01 01 01 al Ol M al Ol 01 n Ol m m Ol m al Ol Ol Ol Ol al - - - - - - Ol Ol Ol - Ol of Q7 01 Ol m O1 Ol 41 Ol Ol Q7 al al Ol m al M m Ol .m-I m Ol 01 Ol Ol 01 m m m m m Ol Ol M m Ol M Ol m Ol al e-I .--I c-I a -I e-I m m m m m r-I ei . -I ri c-1 Ol 01 Ql Ol al al m 2n + Ol 01 01 O1 Q1 O1 Q1 0 0 0 0 0 0 O o 0 0 m m dl 41 O o 0 0 0 O M Ol m o O O o O c c O o o (J O () C] O `'"� `� '"� "'� ""� 0 0 0 0 o O al Ol Ol O O O O O O O O O O O O O O O O O O O O O O o 0 C O O o O O O O O O O O O O O O O O 0 0 0 0 0 m T Dl 0 0 0 0 o O O O O V1 V1 L' V1 V1 0 0 0 0 0 0 0 0 0 O O O O O O Ol '., O1 Ol Ol Ol O O c 01 Ol 0W a1 01 ` i �, Ol m Ol Ol (m i i i O O O o o m m m m m i V7 m m m m Or.�a Ol m m m m m m m m m m m N m m m m 10 m m N N o O O O O m m m m m N �0 m m m m O) m v Ol QI Ol OJ Ol N N Ol Ol Ol Ol 01 m O) 0) Ol Ol O) N OJ Ol 0! rl ci ci a� c-1 Ol M m al Dl Ol O/ Ol w of N Ol Ol oti QI 01 } } } > } ` ` T m m (o O7 Ol D'4 Ol Ol Y } } } } } > } T Y c-I N m Ln m m m m m + t + + + } j} '� N m a Vl O O O O O .--1 N m V vl m W N w 0) O O O O O c-I N M V vl 0 0 0 0 0. 0 0 00ryry o 0 0 0 0 0 o r r t r if Y >- >- T Y o 0 o O o o 0 0 0 0 m O O O O O O O O O j j j j j O O O O O c O O O O j j O j j O O O O O j O O O O O O o a a a. a `i N M M O O O O O d d C a d O 0 0 0 0 d 0000o ao.aaa C C 00000 00000 vi ari ui vi vi d d d d d o 0 0 0 o a d a a s pa d pa n n n n O O O O O .-I .-1 c-1 .-I H O O O O O>> 7 7 O O O O O O ti H .� ci 7- O O O O ,O N N N N N . in v+ vl v+ a a a a a a a a `m `m `m `m `m a a a d` a `m `m m `m `m d d` a s a` a a a a a m` m m m `m > > ar ar m v ar w v m v ar > > > > > > > > m m m ar m v as ar v w Vl V) VI }} T T Y m m m m m} T Y Y} m m m '.. m m d d d a a Vl Vl Vl Vl Vl Y Y} T T m ....mmm m Y Y}} Y m E E E~ N m v vl a a a a'av> a d a a a o 0 0 0'' o E E E E' E~ N m v v a a a a a N m v n a vl v e M In In v Ln ut Q¢ a Q Q Q a Q¢¢ 3>>>> ut vl in In i v u v¢ Q Q Q a Q c C C D D D D D D D D D D V V U U U V U U V V 1 d d d 1 C C C c C �' D z) D' D U U U V U V > > > > > > > > > > > > > > > > > >, > > .- > > > > > > > > > > > > > > > > m m m o o o 0 0 0 o o o 0 0 0 o 0 0 0 0 o o o m m m m m mmm m m o 0 0 o o o o 0 0 0 0 0 0 0 0 o a a a LD 0 0 (D 0 0 (D (D (D W 0 0 ''.... (D (D (D 0 0 l7 '. (D0 a a a a a a a a a a (D u (D (D 10 (D '.. 0 0 (D '... 0 (D 0 0 C7 l7 (D ca 06 cif 06 03 0,6 a o' Oil 03 0 0a o6 oa oa '.. oa oil a .6 o6 O3 oii .6 oij a'1 a o6 0 cii a2S a od oil cOu Ob a 06 ' 06 06 06 a O3 a3 oil oa .6 o3 a 03 Vl V) N Vl Vl Ul Vl Vl N Ul Ul Vf Vl VI VI Vl Vl Vl VI Vl Vl U) Ul Vl V) Vl' VI Vl Vl Vf Vl VI ul Vl VI VI Vl V1 Vl U) Vl N ul Vl Vl Vl Vl V1 Vl a Q a Q¢ a a a Q¢ a a¢ a a Q Q a a a a a a a a ¢la ¢ Q a¢ a a Q¢¢ a Q Q¢ Q Q a¢ a Q a a Q 3 > > > > > > > > > > > > > > > > > > > > > > > > > >I> > > > > > > > > > > > > > > > > > > > > > > a Q a a Q Q a a a a a a Q a¢ a a s a Q a a a Q a a Q¢ a a a Q Q a Q a Q Q a Q a a a¢ a a Q¢ a L L L L L L L L L L L L L L L L L L L t L L L L L L L L L L L -cL L L L L --EL L L L L L L L -.Ey Y 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3.3 3- 3 3- .- 3 3 3 3 3 3 3 3 3 3 3- 3 3 3 3 3 3 3 3 3 3 3 3 3 m v -a-Dv v v m v v v m v v v v m v m-a v v m v v m J J J J J J 7 = J > > J J J > > > D J = J J J J = J = J n J = J J J J J J J = J J J J J > > > O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O 0 0 O O O O O O o U U U U U V U U U U V U U U V U U U V U U V V U U V '.0 U U U U V U U U V U U U V U U V U U U V U U C C C C C C C C C C C C C C C C c C C C C C C C C C c c c C C c c c C c c c c c C C C C C C C C C O O C O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O o C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C m O) 0/ 0/ N m Ol Ol O/ Ol O1 N O! O1 Ol Ol O1 Ol m N O1 O1 m O1 Ol O1 N O1 Ol O1 O! N Ol N OJ Ol O) O1 O/ O/ N OJ W O1 O1 N m O) N > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L r F- r r r r r r r r r r r r r'r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r 'm 'm 'm m acro 'ilv m 'ro m m 'm 'm m 'm 'm 'm m m 'm 'm m 'm 'm 'm 'm 'm 'm 'm 'm 'm m �'i; 'm m m 'm 'm m 'm m 'm E E'E E E E E E E E E E E E E E E'E E E E E E E E E E E E EIE E E E E E E E E E E E E E E E E E E w w w w W W w w w w w w w w w w w w w w w w w w w w w w w w w w w ni of m rO isy m,. ni of ai m of m of ni ni m ni ai ni ni ni ni ni m m ni of of of rO ni of ni ni ni of ni ni m ai ni ni ni m rO ni ni ni ni m m m m m w m m w m m m ar w ar m a, w w w ar as '.... m m m w w v m m w m m m m w m m c v m w c c m c c v m w C C C C c. iC C C C c C C c C c C c c c C C C '.. C C C C 01 m Ol Ol CIN dVJ m O/ of O1 m Ol m O1 O1 m Ol O1 O1 N m Ol Ol m O1 Ol Ol Ol Ol Ol O1 O1 m OJ O) O! Ol Ol of m m Ic W Ol Ol Ol m O1 m O! K C 2 2 K d' C C K K K K C K of OC OC wK cc', 2 K K cc'... 2 K K K O! OC K K K wK K K K 0) Ol OJ Ol O/ O/ Ol Ol Ol O1 m OJ O) Ol Ol Ol 01 Ol Ol m O) W O/ N m Ol Ol N Ol m 01 W O/ N OJ OJ N m N Ol I O) Ol 01 W Ol N O/ Ol m w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w m v v w ar w m m ar m m v v v m m w m v ar m Oi ar '.. w v v m ar v l v m '. m v v m w v v v a v m w m v v m v ar 11 11 LL LL LL 11 LL M. Z. 11 � LL LL 11 LL E m I1 LL LL LL mLL m mLL LL LL LL LL LL LLLL 11 LL 11 LL mLL LL LL LL LL LL LL '. {Af m�v It M d' ti O Z -1� W E 0) El mIa Lb r,�n mll allw r, tomll ZIlw rl � m� q w r, ^ m ,. o N NI'L ~II^II mdN WII N�^II NI'. NI. Ln oII �II mII NII Ln o NMOO q� o� �j �j m� m �, cnj q,�� -1 -� -� -�, -�' -1 ,j o a11m r, m�O T Ln r,�I mm m Olw rl -II mII NIIOIwIOl t m ra m mI^ ;r c, w m , :T o NIIMIIwIImIIID wNMN�wIN.^���O...a � and vt vn art art us an art an +n art an art art art art V-� an V-r u4 an arw +n. �.. .art an an art art an art ,rt an .art art art N art an ate cnwy rrrrT r'>rrr .� N m a C7 C9 l7 l7 C7 a a a a a a a¢ a a a a a H H H 5-• an in to y u U U'...a a s a...a a a a + + + + + + + w• + + + + + + + + + + a > r } r r O o 0 0 C) 0 0 0 0 c)O o o O O O o O O -o O o o O L (,,e m a N N N m a 0- N N M > N (L a Ln arW N M oOOoOOOOOOOOO�000OoOOOOou.LcL ��aaaaa m ox lIn ca o o o o o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o a'a. n. a a a to to w m to a a a sa , nn vi a a a o 0 0 0 0 0 0 0 0 0 o 0 00 0 0 0 0 0 0 0 0 a a a LL a>>>> LL a a a a LL a a 0NNNN0000000 0NNNNN000omc auo mof o) mmm N N N N N N N N N N N N N N N N N N N N N N N N am, a a a V a a V a m m m m m D) m m m m a V a a V' V U U U U U U U U U V U s:1. U U U U U U U U V U~ N N N N N N N N N N a a V '.1' +rJ` V a a A^. n n n a aaa a d a d d d d a a a a a d d a a d a a a 3 o 0 0 0 0 a 0 0 0 0 0 g o o O o o 0 o ~ ~ F ~ ~ ~ ~ ~ ~ ~ o o ue ua a a o 0 o 0 do cl 9 W W W W W W W W W W O O O O O O z z z z z z z z z z z z z z z z z z z z z z z z O qu w F h a a d y�� a a a w w �.� �. �.''.� �,or K �.''� K C w¢ z w A ��w w w w w w w w w w w w w v E r 0 v J 0 u c + * g ca ccio ociOO o00 0o cxra m c7 VO O O Cy O O O t7 Q c7 O O Ci to a NNNN sNNN o ay aolca c 9 6, ,N v v v v v v v v v L LI Nka }..T } y Y Y'} T } L N en -It Lnm m m m m '4' 'b` +' * H N m OJ Ol v 'O '[7 O O c-I N N a — 'a a Y Y 7> J 7 O 1"a. Cq %r O .--I N m a Ln O4"`N o ,7 7 j 7 j j aaa a ca.aa talc4 L'.,,,.. coa aaaaa w °� o" o. n� +n o oo o o o ry cw 'N o 0 0 0 o c a d a a > > > > > a, 0, cn sa.. m` `m `m `m `m a a a` a` a w m m -2 a a a a a +ra rn an �w >- >- i>> m io m m io a a a a o 0 0 0 o E E E E E'-'...N'm v Ln a s a s a o..... � �... a¢¢¢ J 7 7 7 7 Vl VI Vl N Ln VI m V1 m N U m m m 1 m m m m m 01 m u u u u a a` a a a c c c c c>>>>>>> O U O m m m m m M v v v m m m m m m >> >> >>>>>> >.......> >> a v aaa m m m m m v a v v v O O O O m m m m m m m m m m O O O O O O O O O O N N N rV N N N N N N o 0 0 o 0 6 6 6 6 0 0 0 0 cD 0 0 (D (D (7 LL a a ' a a a a CL LL a () (D (D W 0 (7 iD (D U` ( m rl ri �-I rl c-1 N Nm Ln N N N Ln M Ln Ln to c c' 0 0 o-6 0 oa 0 o6 ob ', 0 ca o6 ob o6 c6 cZ o6 o6 co ob Oa .6 ', oa O,6 Oa o3 06 �✓g '� �. � � �`" '+"�� 4x"1 Y/1N N to 4.+A Nb U3 6!N to Vl H Ol m N W Ol � � � m � OJ m N Ol O/ m N N m m v Ol Ol OJ 3 . 3' 3a '> > > '> > > \ . s-I N m a N r T } } T .--I N m a Ln > > >' > ': >•, > > < > >, > > > > > > > >. < > > > > eau ti N m a N N m v in ¢a xa¢¢aa¢a¢.a¢aaaaaaa¢¢aa Ea r a t � � � � foattIT Y Y Y L L L L L L Y L L Y L y L L L L L L L L C aC7' C7 1 aj '., 7 J Cd i3 x5 Ck (y J 7 j 3 y} Od" CJ 47 " a ea a cx o: a a a a a ca I o I ca: a a a 7 7 7 7 7 0 0 0 7 o a o 7 0 7 0 0 0 c 0 7 7 a v v v v v v v v v v v -ca v v a v v v v v v v v an vi to vi m +ra u^r. �L) ' yr wra orn an 7 J 7 J 7 7 J J = J 7 7 7 J J 7 7 7 7 7 7 J J 7 d d 4. d d d' d d a' d O O O O O O O O O O o O O O O O O O O O u u u u u u u u u u u4u u u uu uO uO uO c c c c c c c c c C C C C C C C C C C c c c c c v o 0 0 0 o a a a a a o 0 0 0 0 a a a a a o 0 0 0 O 0 0. 2 O O O O O O O O O O O 0 c O.. O O O O O O u . to .. to . � .'� m N N to .0 •C •C .0 .0 •C C .0 •C •C .0 .0 •C .0 .0 •C .CC C .0 •C C U a W a a` a` O O O 7 O a a a a a tlJ W m' N tlJ Ol N OJ m N tlJ m 0/ N tll Ol Ol m Ol N N N Ol m m m m m m > > > > > > > > `,+ > > > > > > > > > > > > > > > > > > > > O O O O O m m m m m O O O O o m m m m m v v d a v v v v v a v a m v v v...... m v a v v v v ^ep'...a a s a s l7 C7 C7 C7 l7'a...a a a a C7 l7 l7 l7 l7 a s a a c c" c c c c c cc c' c c c- c c' c c M I O O D 0 0 0 g 0 0 0 O O O O O O O o 0 O O O O m�mmmmmmmmmmmmmmmmmmmmmm c e c c c c c. c > > > > >> > > �, �, > > > > � > „� > H H H H H H H H H H F- H H F- H H F- H H F- H F- H H � �J cL `1 �tl � d `1 � m 0�J m m m m m m m m m aW a0 "u%i 'm m "m 'm m m •m 'm t1T m �... !L, O. 44. L4 a s d'A. a a a a a. K,L a.. m a 'L a 0. a,. M. a d E E E E E'E E E E E E E E E E E E E E E ELE E m m m m m m m m m m m m m m m m m m m m m m m m W W W W W W W W W w Ltd LLd LlG W W W W W W W W Ltl W W m N m N m m N W m m m` m v m v v m m v m m m m m m m m m �Cd dk4 itp Cfp (p f0 IU (p (0 N (p f0 ny, pqp �p L L L L L L L L L L L L L L L L L L L L L L L L 3 3 aj 3 3 3 3 3 3 C 3 3 3 3 3 3 3 3 . 3 m~~ v v v v v v v v v v v ny v v v v v v v v v ata v v c— _=------ •- ----- --- --- C C C C C C C C C C C C C C C C C C C C C C C C m m m m m m m m m nd p49 tp '(p 'N '(p 'tp 'IpNt0 •fOf0t6 Yq v v v v v ay rd� v v v v v v v v +u as v E E E E E E E E E E E E E E E E E E E E E E E E & g w= C am= w pC. a". z O w w w w w w w w w .... v . _ Q1 al aj Cu a) l m� Ol� `J v� v N PPMIDN 2`1 LL It M O Z W ^E W 0) El O '-I N l0 n O ID N O .--I e-I l0 N O ci '-1 n Vl M �--� 00 n m M .-I 00 M n Vl O tIl M n O �/1.. N.. 1I1 n m m e-I Vl m m � 1I1 CO l0 m 00 m N '... l0 1I1 '-1 .--I 00 Vl w .-I .-I 00 Vl m m m M m m '., m M 00 l0 m lD N W lD m l0 N M n V1 O 1A M n Vl O Vl m O l0 m r-I m m ''., w w n w m 00 n V w m 7 m V Lfl n m� Ln n rl m m T m r-I M Vf V T w w w N i� w l0 l0 N n V w o O� m N lD O m n O M m m � O m n m w m N Vl m lD m N o m w w c-I - m w w �--� V N m n O N N lfl n O N N V lD Vf VT In. V} VT V} VT ih in VT V"x VMS VY L} VT In VY V1 V} In V/ VT V1 V} V} VT VT Vl.. V>'i V1... V1 Vl NA V} VT V1 N VA V1 V)- V) N IA to Vl V} 'A ll.to n n V 00 n n N V lD V1 V N •m•W ,•N• l0 11 cT O O C N O O O V N O m 00 m N lD m 00 m N lD m CO m N lD m 00 m N lD T ID lfl � n l!1 � m� M 10 l0 V1 � M lD lD m C N V V1 n m N� 1n n m lfl '-I n n , l0 Iff �--� n n N .--� m M lD ci N m n N Vl N m n w m m m V w m m a1 O O 00 V O O O w V O l0 m w .-1 V l0 m w'...- V N m n n o N Ln n n o w w Vl m m ''.. O V 00 T V 00 e-I Vl m V 00 1!1 m V 00 O V CO V w O a w m n m m w m n m m w m l0 a0 N .--I '-1 e-I N e-I ei r-I r-I 'i ci ci r-I r-I '... c-I rl rl e-I a -I e-I rl '-I r-I H N Y ,} Y Y y r r r Y} Y Y Y Y Y Y}}}}} Y} r Y} Y} Y Y y }} Y Y Y Y r Y}}}} Y Y }} Y c-1 N T V V1 ci N M V V1 e-I N M V V1 �y N M V V1 ci N M V1 .y N M V1 cL N m li1 e-I N T C Vl c-I N M a- ll1 e-I N M J d d d d d J J J J J d d d d d J J J J J d d d d d J J J J d d d d d J J J J J d d d d d J J J d V) VI VI VI V1 d d d d d N V1 VI '', VI d d d d d '.... V7 V1 VI VI N ''., d d a d d M M VI Vf d d d d d of ut M d d d d d d'd d d d d d d d.� �'.d d d. d d d d d d d d d d 0 oimmo d o mmC, a,ma,a c' cm m6 Cl 6 (3 a,oi'ck o ma a o, n o,a,a)ma,ch6aia,mo a)mo v v v v a t m m m m m m m m m a,. m a, m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m n n n n n n m m m m m m m m m m '.m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m o o o o o 0 0 o o o o o o o o o H .� .������ o o o o o 0 o o o o o o o o o 0 0 a o o o o o 0 o o o 0 o o o 0 o o o o o o o o o o o o o o ti + 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 9i0 0 0 0 0 a aaaaaaaaaaaaaaaaaaaaaaaaaaadadaaaa-fL o- aadadaaaa H... F F w w w w w W w w w '. w w w w w w w w w w w w w w w w w w w w w w w w w w w w W w w w w w w w w w w w m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m l m m m m m ,y ,..� N ,y ,y m m m m m a a m m m m m m m m m m m m m m m m m m m m m m m m m m m m m H N H N H c v v v v m m m m m o o 0 n v a v v m m m m m m m m m m o 0 0 0 0 0 0 0 0 0 0 0 0 O 0 o o o njn n n n m m m m m o 0 o 0 0 o o o a 0 0 0 o o 0 of o o o o 0 c o O o 0 o o o 0 a c c c c c 0 0 0 0 0 o O o 0 0 o o o 0 0 0 0 0 0 o'o 0 o m m 1 m n n o m 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O O O O O n n n n n lfl Vl lA Ln V1 rj rl c-I r-I r-I N N N N N 111 lfl lfl 1f1 V1 ci ci rl ` V) 1I1 lfl Vl 1n ` n n n n n rl e-I e-I c-I c-I N N N N N m ` VI Vf V7 Vf VI m ���mmmmm mm���mmmm �mmmm mm m m } w w w w w> y }} Y w w w w w r y y}} w w w w w>} r} Y w w w w w}} r Y Y w w w w w Y y} Y Y Y}} Y Y Y Y r Y Y Y Y Y Y Y Y}} Y Y}} Y Vf c-I N M L!1 f-I N M V V1 rl N M V V1 rl N M V V1 a-1 N M V Vl e-1 N M a V1 r1 N m V V1 a -I N M V Lf1 If V t t t � � t' � t"� t+ � .o o O O O O 7 7 7 7 7 o O O O O 7 7 7 7 7 O O O O O 7 7 7 7 7 o O O O O 7 7 7 7 7 O O O a a......,E EEE n. annaaEE E.......a as a....a aaEEEa a, a nj n n.. E E E E E cca a aaaaaa a n a. a n: n. a a.. a a a a a a ccn n n. a p. a. a. a a a a 7 O O O O O 7 7 7 7 7 O O O O O 7 7 7 7 7 O O O O O 7 7 7 7 7 O O O O O 7 7 7 7 7 O O O O ,O 7 7 7 V1 VI N VI N j V1 VI V1 Vl to V1 N VI V1 VI V) Ln V) V1 V1 V1 N VI V1 d` a a a a a a a a 3 > > J J > J io io m io =a m _o m m m =a io m io is is m is is m _o is m io =o E E E E E E E E E d E E E a a E E d E E E a a a E E E E d E d E E'.E d E E E E E d E E E d E E E d 0 0 0 0 0 0 0 0 0 0 o p o 0 0 0 0 0 0 o p o 0 0 VI V1 ul V1 VI N 1/1 V) Vf VI m m m D m ' VI N N VI V1 V1 V1 Vf V1 to » 7 7 a a a a >>>> > > > > > > > a>� a a a a a a a a .. > > > > > > > > .. > > > > > > > > > > O o O O O is m m m m O o O O O m m m O O O O o m O O O O o m is m io 0 o 0 0 0 m E 0 0 u l9 l9 a E E EjE L9 l9 l9 (D''..0 E E a'.....E E 0 IDC9 (D l9 E E E E'...E 0 0 L9 0 0 E....E E a E l9 l9 0 l9 C9 E E E C C C C C C C C C C C C e C C C C C C C e C C C C C e C C C C C C e C C C C C C C e C e C C C C e .0 .0 .0 O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O p O O O O O O O O O O O O O O O C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C if C w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w a�d.....'d m m m io m m m m m m m m m m is m m m m m m m is m m m m m m m m m m m m m io m m io m m m m m m m m m L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L m m m m m m 'm m m m 'm m m m 'm m m m m m m m m mm m m m m m m m m 'm m m m m m mm m m m E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E w w w w w w w w w w w w w w w w w w w w W w W w w w w ar w w I al w w w a/ w ai ai w w w ai a/ w ai a, w w w al w w w w w w '.... w w w w w w w w w w w w w w w w w w w > >'. > >. > > > > > > > > > > > > > > > >. > > > } > > > > > > j > > > > > > > > > > > > > > > > > > > W W W W W W W W W w W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W w W W W W W W W w v a v v v w w v a w j v v a w w w w w w v v w v v w v v v w w w w w w v w v v v v v v v v w v v 11 11 LL LL 11 11 11 Il 11 11 M. '' LL LL LL I.. LL LL I1 LL LL lL 11 4.. w 11 LL LL 11 LL LL LL '. I1 LL LL I1 7 1l- 11 11 LL 11 I1 Il It M d' O Z -1� W E L 0) El ao olv m w w o M w�..,N m n w w N m n an m oo M''..o M m w m o m m n m ry m an n m N an o o w m 0 o'....o w M LO M w 0 a m o w 0 o .� m o ao o .� m o w as w N o 00 0o w N o oa o o w m ,� o o w ao � oo n 00 0 M 0o n' w o an I m m N T T M w N m M O .--I w N M O e-1 w In M w w 00 a .-I w ''.. w 00 e-I ''.. e•-I N n a -I Ln ei N 00 N r w w� N V w w o N v w w O N..,� N',n m'',N a In n m rl'...M a w w" M c w w rl M a N.n H M V Lf rl N r-1 .n'+n• In +n.n In .n.'',.n• .n•''In U. �. +n• .n• .n• �..n• .n .� v>• vt• ,� v} an �n ...... ti. i..h �.n 'v> .n an yr �. ..>• v> .� '�+n 'a�w, +n an an n m .''.. m w an n m M w MMAq e-IN0)to N N V V m V N V v m v N V m m mmmm In Ln O wan fn Inw N T m m w N 00 m m w N W n v m N n V m In N N V c-1 N m N a .--I In mw 00 w In .--I w w M .-1 Vl m w'-I In m M n V w n M '... n V 0 .ti M V M O .--I Ln V M 00 w m an .ti 00 w m ll'a .--I n a n m N V w 00 O N V w w O N to n m N e� V1 n m ei M V w 00 w 00 c-I m ,-�PV�I�I%I�I-�II�I"VPv�I�IIv�I'ICI'nI�I�II-�IIVN�II I/�II�N,-,II'n V4'Al "'J'VIn] �^I I I(A] I-I-n—1-1-1,* r r r r r r r rlr r'r rr rr r'r r r r r r r r r rlrlr r r r r r,r r r r r r r r rIr r'r r r r 1f1 `""� N M V 1iI ati N m V lf1 c-I N M 7 VI '-1 N M V In rl N M V �n c-I N m V In �-I N M V V1 �--I N M V m J J w LL d LL d J J J J J d n. a a a J J J J J n. a LL d C J J J J J d a d O_ a J J J J J d LL LL d 1 J d O_I N V1 N m an O. LL ',.. d LL d N Ln Vf V1 VI d a LL LL,LL Ln N to VI N a a> > > > > a a O_ a a > > > > > a a o_ LL...a > > > > a a aa a > o_ a a > > > > > .LL a, > >....> > > as dT m d, m m dT dT dT m dT d, dT dT dT dT dT m dT dT dT da dT m m dida d, dT m m da dT dT d, dT dT da dT.... dT m m m dT m dT m dT.. o o m m m m m m m m m m m m m m m m m m m m m m m m m Im m m m m m :m m m m m m m m m m m 'm m m m m '.. o o m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m o 0 m m m m m m o c o o o 9 m ti'... 0 0 0 0 9 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 a a a a d d d a o_ d a a a a a a ad a a d a a a o_ a d a a d a a a a a a a F F . F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F ''F- F F F F F F F F F F F F F F M w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w m m m m m m m m m m m m m m m m m m m m m m m m m m �av m m m m try m tva m 'm m m a rn m s cm mmm m m m sa ,m,mymmmmmmm,m pm,,m*awTawtrwaT avvaam mmm 'vv.r tw nnnnnAr,r,nf-,mmmmmm 0 0 0 0 oo ° 0 0 cy wo 0 o 8 0 � o � 4�� Op6 6 �yy ��y oy ��y tO.i CO"J 00 o O p Isa:S t'a O Cs 4' p e:P c7 id b O Ci CW C? In t7 � 0 0 O N '', N O O1 C7' LPtl Mfg LPX fn 4t1 Lfp to," N N N N N 0J Ol N 01 0/ N 01 01 GJ N OJ 01 m N la as t0 N N 0J 01 N N fo lu fo m N v° v v v r r r r r v v v v v r r r r r v r r r r r '.r r rr r r r r r r 'r r V e-I N T V N etf N M V N e-I N m' 1n ' '�: N M d' In c-1 N O O J O J J O O O O O O> j J O J O O O O O O 3 J>> O o O O O. >> aox awoadada cma daaaa cod as daaaa CL L%oro taaa 7' O O O O O O M M O 7 O o O O O O O 3 ",0 n, O O O O O n m wnan a` a` an v'o ua trn o` a a` o` a` va va an ++'a rn a an an In° io m m m m m m m m 2 O O O O O io m 2 '..... m in : 7>2 7 m io '.... a s d a a a a a a o a d a a a a d a a a a d a a a a a s a a a a s 0 0 0 0 0 0 0 0 0 o o o o o o o o • V1 V1 In m VI p/y ',. N m Vl Ln N Ln V1 o N a '.a 7 a a a a a '.. ' 7 7 a a a a a 7 a a a m m o 0 0 0,o m m m m m o o o o o m m m m m o >o >o >o o> o m Yv m o o a o-17 1t 17 17 1 a a a a.....a C7 l7 0 0 (D a a Q a,a L7 0 0 (D LD cL a'a a'a l7 0 � C C C �. IC C C C C C '�,'. � 0' C � C � C L C L..°. � � '�; C0: ,, 'C' C C... �am• C� O O O O O LA O FY 47 O O o O 4'd O O O d3 O' O 67 O 0 O a, O o o O o CA 4r O O C �c C c ,c c C C c c C c c G E r a C a>>>> > w w w w RM WLY w w w W> w w ON Nik OJ Yk1 iM dkp @f M 0tl' c C c c r c > > > > } > > > > > > > > > > ? . } "?d' > > > > > > 01 > � v d al �!' W' W `1 0.1 ,1 1 v 6d Y '0P rJ O�.P tl d 0W 3WA 0A S ct a a a a c a` t t�. o a a m cL a` a m cL cu, m aL a m v v a w m v m v m v v v a v v v m m a v m v a m m v w w m v v m MEEEE E E E EE E E E E E E E E E E E E E E E E E E E E E E E E E E w w w w w w w rya. u.a w w w w w w w w w w w w w w w w w w w w w w Gl 01 Ol 01 N 0l Ul 0J 0/ O) Ol O/ 0/ 0) 01 01 01 Ol 01 Ol 01 N 0) Ol W 01 Ol 01 >• r r rl > r > >. >• w > >• r r r r > > r >.'.. r ? r > r >. r > w w w w w w w w w w w w w w w w w w w w' w w w w w w w '.. w O/`/ 11 val `1 N LL w w 11 lL LZ 11 aL IZ LL 11 lLL LL Il LL LL 11 Z lL LY LL LZ LL �Lz lL LL 11 m m m m m vT m m o m m m m m trs m Oa m m m m m o o+ O O O O oO GJ 4! 0k O ON OJ a GJ WJ 0 w I rt10 N 0p CL d cn O a a r IL n: is io m is m is io io m is is io io io E E E E E E E E E E E E E E I wa w w w w w w w w w w w w ' 21 21 TIE! 4 p 1V 1u Tp T1 2p TI LLII LLYLL It M d' O Z W ^E W 0) El o.. n.. 7 w m '... O n V m w� Ol m w r 'n N a c-I 00 N r ri 00 N lD n ci N w n w N O c-I w N O �--� n Ln m .--I n lf1 m H m V 00 m Ol 01 V o0 M 00 w o M o7 w o MY V) O lfl w u) O In w at DD Ol N m 00 Ol N l!1 c-I r-I o0 Vl rl .--I w al Ol r m Ol m t m w o m rn v m o m n a of vi rri v ai ui ri m a ni rri r� � N m H m vi m H m m w N a w ao v oo v m -It m y of 't m ti m w N n m w O V 01 O c{ 01 V Ol N w V m N w m n O m M n o m M w m N M w m N m a -I .--I N ci '-I N �--I .--I .� '-I 'i '... rl '-I '-I 'i '•1 ri .--1 rl ', r-1 c-1 c-1 cry A vf.. v} u} .n u* J* u* ur yr +f4 .n.. 'A 'n v* uF v* u* u} u* v} v} uti u* +n +n. 41 vw u* +n v} u* +n to uti an u} in u! u* v* .n. ve {n V N O O O V N O N V O n N V O n N V o n N c} O n n V W n n v 00 n N v w In N v w ul o O V N o O V N O1 V Ol V N V' Ol Vl O N N Ifl O N N V1 O .-i V Cl n In V Cl M w w M m w w Lfi N V Li n N� LQ n ul ID H N n v w .1 n v 0) H 00. V Ol H 00 .-� m w .--I .-I m w N N Vl N m N m N m V w Ol m 7 w m m O o w a 0 0 00 v w v w n a -I m V w n n V O w n V o w w N w N ''. w N w N Ln O V w m O a w V m .--� m V w ati 0 * w O V a w O V' m rl N '.... N , N N rl H N N e-I ry H j r-1 rl H a -I H '•I c-1 r-1 c-1 H, H N tp4 th to u? v). V} V} VT V} VY'', VT Vl VY to N',..N V? ul 1n 'rT V) in vY 'n VT V} V! in- 1/T 1n vT in In VT N v1 Vl',. Vl N vT vT In Vl V! in 1/T Vh Vl= in } } } Y } } } } } } } y } } } Y y } } y } y } } Y } Y } Y } } Y } y } } } Y Y } } rl N m V •--I N m a e-I N J V �--I N M a e-I J M e-I N M a �--I N m V ci N M V •-I N M i--� } } >„ Y Y J J J J 0• d O_ a J J J d d O_ a J J J O_ O_ C O_ J J J D_ CL O_ D. J J J J CL O_ CL 0_ J Y Y Y d d LL a rn VI VI VI a d LL a rn CL a d 0_ rn - VI VI m a a O_ N Vf V1 V1 d O_ O_ 1 rn V1 VI V1 LL M V J H N M a Vl a CL D_ O_ 7 CL a LL C 7 a a a a 7 7 7 a a a ''.... a 7 a a a a VI Vf In VI VI Ol m m m m m 01 O1 m m m m O1 01 O1 01 Ol 01 m m m m O1 01 0) m m m m m 01 O1 O1 01 m m m m m 01 01 0_ a LL O 7 7 V V V V V V Ol 01 01 Ol Ol 01 01 Ol V V V V V V V V Ol 01 01 01 01 01 Ol 01 01 m Ol m 01 an m O1 0) } } } } } + + + N N N N N N N N V V V 7 V n n n n n n n n 01 Ol Ol Ol Ol Ol Ol 01 Ol Ol Ol 01 Q7 Ol T Ol Ol 0 0 0 0 0 0 0 O O O. O o 0 0 0 0NLLr Nor Nar Nar Nar dr dr ar z z z z z z z 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o N H O O O O O OOO O Oo O o OO O O O oc-I 0 O O0 o o 0 O O O O O O O O O O O O O O O O O O O O O O O O O O O O NIL 00O dOz0 0 o d d add r a0 0 o d 0 0 0 0 orr r r r r r r N N N WWWWWWWWWWWWWWWW W W W W W W W W W W W W W WWW Wz'z z z z z z z z z z z z z z z z zzZ z'zz z z ccac ow w x z Ol 01 01 01 01 Ol Ol Q7 � O1 O1 01 O1 O1 01 Ol O1 Ol Ol O N O1 .O-I O1 O1 Q1 QI mer--II meN-1 m'm-1 mrai NN N 6} v} vO}l v0Y1 V V Va+ 0}1 YOl 0}1 0}1 , arl+ 0a+1 0♦+1 } 0}1 } Y oca-I '. -I 0a-m1 e0�--I.. 0.-�-I 0'-I 0 0OOOT M 01 M M 0 0 0 0 6666 0 v d 'z" v V V O O o 0 0 0 0 0 0 0 0 0 0 o 000 0 0 0 00C c 0O O O CN rN'N�NNNVfIn lfO OOOoo0 O fVtfVV Ln N-N ff f fVLON nF, , mM--m m mn O O Oo O O w w w m o O O w w w} }OOOO OOo O } Y MM VO 0 COO c sO O O CD o CD O O.+ aY ♦+ aa s+ NY`mw N N N N N p O O O 7 7 7 7 O O O O 7 7 7 7 O O O O 7 7 7 7 O O O O 7 7 7 7 O O O O 7 7 7 7 O a aa a g g a a a a a a a g a a a a a' a s a a I a a a a a a LL a a a a a a a a a a a: }} y m `m co m m a Cl Cl a a. Cl a a a a a a w w w w w 7 7 7 7 0 0 0 0 7 7 7 7 0 0 0 0 7 7 7 7 0 0 0 0 7 7 7 7 0 0 0 0 7 7 7 T o o 0 0 7 m V } } Y } } VI V1 V1 V1 VI V1 N VI VI VI V1 V1 V1 Vf to VI Vf N N M m 'C rl N M V oaa a 1in 1 rn1 m m7> m aa aa7 -m m 0 07 aa07 aa07 aa0a aa o a o 0 0 0 0 0 0 00 0LL a0 0 0 0 y1co>r a >>> D D> 0 rn o 0 0 0 0 aaaaaaad m iim> > > > ao O O aLLy>moO O O > > > > >> > > >O OOO O 00O O OOOO m a aaLD aa(D l9 0 0a 0 LD LD l7 a >r '....ia•rl7 l7 C7 0 a d a LL 1 d O O O C C C C C C C C C C C C C C C C C rn V) v1 V) 0 O O O O O O O O O O O O O O O O O O O O O O O O O O O O O. O O O O O O O O O O O O Ia ri a 7 O 7 7 ._ _ _ _ _ _ _ _ _ _ _ _ _ y. > > > > > C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C fO fO m O O O O O w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w a a a V' l7 k L l7 > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > 2 2 2 v v w 2 2 v d `1 v v v d v 2 v v w 2 2 2 d v `1 `1 v v `1 `1 `! `1 `/ v `J ` C C C C C C C C d D_ LL a O_ d O_ a Q. O_ LL D. d D_ d a O_ a O_ d a O_ 0_ a D_ D_ a a a 0 0 0 0 0 0 0 0 m M M m m m M m .. m m m m io m m m io '.. m m m ''. m m m -M m -M m m m '... -M m m m m m m m m m m m C C C C C C C C w w w w w w w w w > > > > > > > > m v v v v v a v r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r a a a a a a a a •� •� •� •� •� •��� m •m m m •m •m m •m •m 'm 'm 'm 'm 'm 'm 'm 'm m 'm 'm 'm 'm 'm m 'm 'm 'm 'm 'm 'm m 'm m o m m m m m m m E E E E E E E''E E E E E E E E E E''E E E,E E E E E E E E E E E E E E E E E E E E E w w w w w w w w W W w W - W 111 w - w - w W - w - w w w W w w L L L L L L L L m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m r r r r r r r 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 .m •m •����� .m w w w w w w w ai w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C E E E E E E E E w w w w w w w w w w w w w w w w w w w w w w ww w w w w wjw w w w w w w w w w w w cc C w w K w W. w oc 2' cc w W-w '... w ac '... w z w w 0! K w w w w w w ww T' W W W w W w w w W W w W W W W W w v w w v w v w w w w v w w w v a v ll 11 11 LL E iz Il I1 11 M LL lL 11 iz LL LL I1 11 LL 11 LL LL LL 11 LL LL 11 LL LL 11 LL 11 YLL LL lL 11 I1 LL 11 11 LL LL LL 11 LL LL 11 LL LL El ID 0? Iq 4`1 W M IIq m � r" M o II II I�tI R o ry V OBI. �O t o 0 00 l0 N Ol 00 '. AD ry Ol Ill Ol 00 tll V1 01 00 Vl ''... m 111 I� 01 m to 1� Ol to 0 IIIPIII ry ry o ti o .� m o o meo O as o o W ao m aM MvmInamwInNmmmNvmWmctmwwm�Nmmw"moIO Iri oIOoo bvmInaov IO m D m e-I N Vl I, O N W n O N l0 m N lO m N V l0 m N V l0 m N V Vl n N V to n H M W N M V lD e-1 m �. �..�1'^I`^l'^I�*l�^��^I�*I�*V�^f�l�^I�1�^A�*��*V�*V�*V�*�I���I��u�*�I�*INS*�I'l�l�+����*��I�l�,��,f�».j�np.��l�.�l•� oo �, ol al o� m � � � m �wj Ln r-j� �, lol - � - � An M Om MID II q q O1UM M IO ^.M ISO AM N o ICIo N Ni.N O�NIO N m NIo N AM IN 7fl w�m N NHV ION m�Oo N ON�'lf11n �IID N An v>{+ni�nd+nl+n�v��.nlanl�n�v�N.n �IIIVN r r r}}} rIr r r}}}} r y y y y r r r}}}} r r} r r r r} r} r} -zr }} r r r y r N M c-I N M V 2- N M J •--I N Rf M c-I N a .--I N M ei N M V c-I N m M c-I N M CL N m V '-I N m v rl N M V t N J J J d d 1 fl J J C f1 S f1 J J J d a d fl J J J d d 1 �. J J d d d f1 J J J J d d d d J J fl fl fl N In VI N 1 C I 1 VI, Vl VI VI d fl tl R In N In In d C. d S Vt VI In !n d S fl S N N In VI fl d S 1 VI VI VI VI C fl a a a? a a a a �'� 7 a a a a a a a a 7 R,,,.a a a:al� a a a a �'.7 a s Ol Ol O1 AM Ol Cl AM m AM m m m m Ol m An m m m An m m m m m m Ol m m m m AM m m m m m m m m m m m m AM m m AM AM m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m,m m m m m 0 0 0 0 0 0 0 m m m m m m m m m m m m m m m m m m m m m m m m v v v v v v v v m m m m m m m m m m 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 v v a a A N N N N N 0 9 m m m m m m m m m m 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o a o 0 0 A. 0 0 0 0 0 0'0 0 0 0 0 0 0 0 0 0 d d d d d d La d d a d d a d d d d d d a d a a d a d d''d d d d d a d a d d d a d F F F F F F F F F F F F F F F F F I- L- F F F F F F ... F F F F F W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z K K K K K fK GC K K fY K K K K K K C K K= fY C d' K 5 K K 4K CC fY K K K K K '... tr fY C tY [,K Om S ',. K tr m a m m mmmer rceUmcr f rr mAAu rcmrAFn Cmm7l m c�Cmm z"m mmAi m m m ncama, Mm mm m mmmma, a, n mm mom^mlmla m m cn 0) n7, tea v,�m m A myc omm c m � o d'wp` N rV ul vi 4d'i w'i 00 006A8808- o o podN cs r4Cf CJ P C7, �,. W N vcu f0 f0 l0 fC N N N N !0 N 10 N o N N f0 t0 10 N N N N N (O N tp f0 !0 N N N M } } } I. m V } } } > r } } } > V } } } } } } } Y W �-1 o M. a a a a a t a a a a a rL a coi a a a aQaa, a � 7 o o 0 0 o' 7 7 7 7 s�'o 0 0 7 7 ;o 0 0 0 0 7 7 7.0 0 0 0 0 7 :a.7 0 nPx vl in In Ix'u r ^u wls ,A In an m... vr., c+r vv sera an '.... uw w^w� w� a a` a`a` a a` o` ri a m m m m 2 ig m m m m m m m 2 m m m a a a d a d a d a d a a a a a d a d a a a a a d a d a a a a a �. a M. a 0 0 0 0 0 0 0 0 0 0 0 0 0 o o o o 0 o > > :D D........ a` a o` a m m m >O >0 o mmmm o o o >o m m m m>>>> >O >o O m m m m> o'o 0 o m o a a a C7 C7 l7 0 a a ''.. a s 17 17 1 17 , a a a u Q l7 l7 a a a a l7 u C7 l7 a a a a o C c G C C C'.... C O o C.Y O 0 00 O O di O C} O CA O MCA O 0 G7 Ei O O O O ST l5 O O 0SF oO O O O O CC C C j 61 w RC!' N 4 Yw N v eA7 lad w 4! %J hJ' tlM tav qld 9J GD N $B Flf wYf 6V N W OJ W N N . > > > > > > p! 4Y1Nd lL ` 4 N 6>i +>�!' > q�l NJJ '.i �Y CY 94A 0.1 'dJ KKI titid NX q1 F IU `1 `l `1 `l v cn` d t t o tea t o Mm as i a c az ai a L a a Z m m mm m m m m m m m mmmmmmmm...m'm.''....mmmm....mmmmmm..mmmmm L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L F F F F F F F F F F F F F F F F F F F F F F H H F F F H ',. H F F F F F F F N f0 f0 m N fO m 10 m m t0 N fO N Ind RR f0 .� •f0 f6 't0 'N .N f0 f0 m N "AV '.•m m •IO .fp .Ip •m E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E w w w wI w w w w w w lu w w w u1 w w w w w w w w w w w w lie 'w W w w w w w w m m ro u*'e m m N m m m m m m m iTy)F m N m m m m m m m m m d !G hT m m m m m m o o AD o 0 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3? 3 3 3 3 3 3 3 3 3 3 3 3 C C C C C C C C C N W O N N c +3Y G1 Gl N N U1 fU N N Ul GJ W l 9J IL a, U1 Od G1 U1 N C C A'. C C C C;, C C C C C C C C C C C c C' C C C C C C C N N G1 W N N N Cd U1 N 41 �,a. fU Ul fU N W N fU W W Ul N R1 Yyl 4J Gl N W U1 UI N K fY K <L' K K C w C w w w w *: = w K C C w w C= w fL q°y^ cc F0." w '.., w tr w d' C ilmilloolin�l C C C C C C C c C C C c did' qJ PLY. N 91 Ol N N al 0.1 w w - mmmmmmm'mmmmm L L L L L L L L L L L L N fp � N 'IO •N .� N Yq fO f0 f0 E E E E E E E E E E E E w w L. w w w w w U.r w w w to ro RrW m la ro m O e9 to ro ro 3 3 3 3 3 3 3 3 3 3 3 3 N 0 0d�. Gl N Gl u w w w N v C C. C C C C C C c C C C w w (u N Ul N N N Ul N N O/ W 7d N Ul UJ O/ > Gl N N T >• TIT T T T T T T T T T T T T T >• T T T W W W W W w w W W W W W W W W W W w w W W W `1 v �1 d Il LL LL 11 µ, 11 LL 11 Il LL LL 11 LL LL 11 W W LL 11 LL LL 11 It M O Z W E 0) El m N N .-I e-I N N In I m n Vl n O O w O 00 I� w O m m t. w m m V w V V 1� N 00 00 O O...V V m m M M M !n .--1 c-I lD l0 N N 00 M 7� i� lO I� W I� lD O 7 o �O �n o o w w m O rn LO m o n m oo m m w w w �D v c m m rn 0 m V m O m H H m Rl V w w w w N N W w a a m m a -I N .-I N N -• O 1p �' V7 rl M V In rl N lf) c-I N V 1I1 O O 00 00 1� r` l0 lD Ln Vl V C V V m m m m M M N N N N N N N N N N N N^ ID % N � in Vf V} .4 VY,I Vb 'A V} Vf VT VT V1, V} V Vf 'n Vy V} V} V} Vk 'A AA VY VT V1 V1 V? V}'.., V1< Vn, V Vf 'n V} VI V) V) V} VT lm/1 N V �mfl ON m N v v m 'T lOY7 T C, 0 m m m m N N 0 0 0 O L l In loll VOI V N N N N O lD O 10 O LD O O .o N vl m m O O O O O O Y 0 0 m VI 00 LD m In r� V W c-1 I� V LD c-1 LD W ID t0 N N m m N N rl n '-I - V V .--1 ti n r N N 00 00 lD lD l!1 ID M l0 M lD O O V to ci M V to c-I M.0 lD �-i m W to m m 00 W l0 w lD LD In m V1 Ln V V V V M m rn M N N N N N N N N N N = 0 0 S N, lfl m V? V} V. V1 VF I/} V} V? VF Vl V1 V) V} Vl iA''...VT VT VI V1',,'n VT . V} VTV1.,..., V1 V? VT 4/h VY Vl V! Vl Vl'V4 VT VT U V} V} }} Y > } } y Y > Y y > } } > N N Y } '-I N m a ci N M r �--I N M� N N N N N N N N N N N N N N N N tV N tV N tV J J a ''... J J a a a a l7 (D 0 (D 2 (7 C7 U' l7 U' l7 C7 l70 J ti ti •--� N a s in �n vi �n a a a a n :n 0 S r r N r 0 r r In r r m r m r m r r vi r in 12 D < a v�i vai a a a a a a a 7 a a a a o_ a a 7 a a a a++ r + + + + + + + + a a u u > > a,mm0)m0)0 0o0000a,a,mm0)0)0)a,a,a)cn0)0)MM0,onma,o a o a o 00 m m m m m m o O.o'.....0 o o o o v v m m......r W m m m m m m m m m m m mIm m m m m m o 0 6 o O o 6 6 m m m m m m o 0 0'0 0 0 o O N N v v'n n m m m m m m m m m'm m m m m m m m m o 0 2 2 2 r m m m m m m o 0 0 0 0 0 0 0 0 0 0 0 o O 0 0 T v m m m m m m v v m m m m o o w m m m m m m o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o O 0 0 0 0 0 .� .� c v r m m m m o 0 0 0 , .-i .--i N N N N N N N N O O O O O O O O O O O O O O O O O O O O O O 1- ti N N W- 0: aaaaaaaaaaaaaaaaaaaaaafLm0- maaam0- m aamaaaaaau�� r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W O O O z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z a a a rrrrrr�%+�nJ, z s cc cc x cc Om cc or '', rc '.... ¢ o: '.... z z w Of x Om s O�. w w w w w w a a a Y N - 7 v 6' > O1 f0 � a, 3 v � 7 u � C - 7 m ,0 m 0 w 7 > o" �o v w Q +' c 7 0 -, u v c v t 7 a c 3 m c 0 X v co T V y, m m m m m m v y w v z m m m m m m > } } 0a), can) m m m m m m m 0) 0) m v m m m m m E 0 0 0 0 0 0 000 00 o 0 co m m m m m m m m m m m m m t o c E 0 0 0 0 0 0 0 0 0 0 o O 0 m m m m m m m a m^ m m° m+ C o o ° o 0 0 0'0 0 0 0 C-) ml m m m m m m m m o o+ o E 0 0 0 0 0 o a o 0 0 0 0 0 o m v m m m T m o o a O o m o 0 o o°^ 0 0 0 0 0 0 N N N N 0 0 0 0 m a,m ^ V m m O ''"�.O � O.,m o o O O O Op 'O ',.p 0.0 O O a. ra a ra a tD O V o 1� O' m O o 0 0 0 0 0 0 0 0 0 0 0 O O O O O. 7 j is } m O `m m (o m ra ro L N 0 O 0 C 0 0 0 C 0 O C 0 C 0 C 0 C O p' O 0 a y}}}v N N v N N, m V O I- Om O N C V I O O N C) V O n V l 0 O E O a a Y > N m > } } T > e-1 N Ln r� e-I N Ill e-I N In I� Q Q Vl V1 O L M V e-I N M V ci N M V IO fC N IO f0 IQ V N L N N U U 7 v V N N v ry W �p N �p O/ �p m -p v -. v N v - fE v a, v 0] v N y Y vl Y d> 0� Y O> v> v T v> v T v> v} W> v> v} v jp to O O O O O O 7 3 > > O O O O 7 7 7 7 N Y N Y N Y N Y N > N > N > N > N > N Y N > N T N > d d Ur U. Ur (DCL N u a as a a a a a a a 0 0 0 0 0 0 s a a a t. N tI,,N t. N t. N` N t. N t+ N t' N t' N t' N tIN t N t N >+'> 7 7 0 0 0 7 7 7 7 �n 0 Ln 0 oo O �+ � �+ t o � o N o� 0 � 0 �+ o f o �n °� °'� °� °� °� °�' m N a a...0 a n Z) a D a Z n 0 a.Z) a Z) a 0 a a. Z) a 0 a a a a a d a a a Cl a n a n n n. a Cl' a a. Cl > j y.r •+ '.... 7>> > �+ Y 7 C 7 C 7 C 7 C 7 C 7 C 7 C 7 C 7 C 7 C 7 C 7 C O t6 is io T N m 2 N Vl (U Vf Ol V1 0/ in v vl v VI v ul w �n 01 V1 v �n v V1 Ol Vl 0J V1 w j - ? 7 j a s a a a a .� .� .-1 .� .1 .� 0 o.a a s ao 0 0 o a a a a E E E E E E E E E E E E E E E E E E E E'E E E E E E o L In Vf VI V1 VI VI In VI 7 C 7 C 7 C 7 C 7 C 7 C 7 C 7 C 7 C 7 C '.. 7 C 7 C 7 C N VI V1 V1 VI V1 W aL aL D Z) D 7 a a a d 7 D Z) 7 c y c `u c a`) c CD c a`) c v c m c w c v c v c v c v c v— a-- Q\ LL V io O O 0 O O O >O o i0 O >0 O O O �0 0 o O C)m O O O O Q Q Q Q Q Q y w 0 d ID d (D d (J L L L L L L J 3 C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C- U 0 0 0 0 0 0 0 0 0 ojo 0 0 0 0 0 0 0 0 0 0 0 0 0 010 0 0 0 0 0 0 0 0 0 0 0 0 0 0 C C C C C C C C C C C C C C C C C C C C C C C C C c C C C C C C C C C C C 01 O) 01 01 Ol v v N O1 0/ 0) v O1 v v v v v N 01 Ol W v v w v w v v v v w v v v w w v W 01 O O O O O O E > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > O N Ol `1 v d v v `1 v v v v N 2v v Ev v wU U U U U U u u 2.2 0 0 0 o u N N m io m' m m m m m m is m m m m io m m m m io m m m io m m m m m m m is m m m m io m m m' v v v v v v u m > > > > > L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L > C c C r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r v v,v v a m Z o o' m m m mmm m'm'mm m'mm'm mm'm mm m m m m mmmmm m m m m m m m m maaaaai G E E E E E E E E E E E E E E E E'E E E E E E E E E E E'E E E E E E E E E E E E E w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w `J W O1 `1 `J v c o o 1......'. m m m m m m m.. m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m r a �a 3 3 3 3 3 3 3'3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3'3 3 3_ _--= w; p v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v vm 'm 'm 'm 'm 'ns . wwwwwaciwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwEEEEEEt`cam 0: K O_ K 2 2' 0' 0: C 0.' [C a' D: K K, W cc cc 0' w O_ 0C K w D:. C cc . C O! a Q Q v v v v v v v v v v v v v v v v v v v v v a v v v v v v v. v v v v v v v v v v v v v v v v v v v v >. >. > > > > > >.... > > > > >' > > > > > > > > > > > > > > > > > > > > > > >'. > > > > > >� > > > > > > w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w a v v a v v v v v v v m v v a v v v v v a v a v v v v m v v v v v a v v a v v v v v v v v m a v v iz LL LL LL 11 11 LL 11 11 LL LL 11 11 LL LL LL 11 11 LL LL LL 11 lL 11 11 LL 11 I1 M IL MLL LL I1 11 LL LL LL IL LL LL LL 11 LL LL E. LL 11 I1 El YIrI Ij j R IjjII jI N N N ....... V n AV'4 �Y Q MCA v^1 wN n ',, W ri W N ,,, lwll N w 4� N �., t~ V II,,, NII N ID M ,,..., O� N a m O Ioo H N ry . IOD W Cd°.N. dam' W� NII w Ow . w ryNy � w zj. W r ry II ua I �m I I %n I+A in I4A _ « . O MOO O O �Ci T w �;y N W O O O d 0' O M lD V N O Ol a0 I� lD �n V op N �D O a a0 N ID O c-1 N M I vl O O O O O O O 4',] O d ki' Vl O C7 l0 .i I- 00 to 5C N O. N ul e0 .--� � V ai V Ol ID N m u1 N O O c-I .-I N oo N t0 O �D N o0 O O r to N W SY d lD M m '',. M1Ca N Ol ww��^^ m "S'f' m oo n n w m w W n n N an n O M M w m N lf1 n V N m n U0 n 09 a M O m 00 dda W] Vf a-H w lD N od M la O M'� f°µ I� u1 M c-I m N to M '-I m la N 00 Vl N Af"1 00 r^d +:p to M m N M tD fC.?T�9. '4D a --I M oo .--I N M M !-I .-i N M r•-I rl .--I N mN. S°J fcl LAq '4'['b aMi M1i'M1 a+l N.. rr-v. rti.. e^"i' M iR CFfi tiM1 {f�pCA"W 4/t fin. W1 AJk. in Y"k V} iA th V} 4A 'V? �/? YJY, i/1 V} yyp. lA"F Kh •W'�3 Mb il"M Mf4. W'fiF. "K7MN V} 9JF 4J°k U1 wrn 'SAy Ih. V} 4A Kl'W 'M MJk 'yi"M V"? '., IA } N } } } } } } T } } y- i• > } } Y T } } } } } } } } } } } } .}-I N m v m } } T } } c>-1 N m m N M V In a) N M 7 1l1 .--I N M Ifl ei N M V1 ci N M yn c-I SV M V lA m m m GP m '-I N M a V1 m m m m m W h m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m > m e8 RI' o o C m m m m m m m m m m m m m m m m m m m a9 m m m m m m m m m m m m m m m m m m m m m .21 IC"*7tl N N N o V V V a 4?N m m m m m m m m m ia'M S3M m61gb O1 Ol Ol Dl Ol D1 Ol D1 Ol l7'M1 Ol Ol 01 Ol D1 Ol 01 01 Ol 01 Ol a' � C^' O O O O O N O O O C1 CS O' O O c-I o o o o o 's' Ci o o o o o 01 V V S' V Ol D1 01 01 Ol Ol 01 01 D1 OI o 0 0 0 0 W o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 m y p o ti r > > > > > ¢ u u u u u u u u u u u u u u u > > > > > > > > > > u > > > > > > > u do u u u u u ui a.y u u u u u u u u u R„ u a„r a Gar u u u u u u u m m m m m m m m m m m ;a a1 m m m m ai m m m m m m m a, m m m m m m m m rn......' m m m m m m m m m m m m rn ai m m m m m m m m m m m m m m m m m m m m m ''... m m m 'm m m m m m m m m m m m m m m m m m m m m m m m m m m m v ai v m m m m m ti m m m m m m m m m m m ti .� .� .� v v v v m m m m m .� .� .� .-� .� m m m m m a a v v v rn o o m m o 0 o d o o d c a c v a v o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Ne Y Y SE Y 0 0 0 0 0 N N N N fV 0 0 O O O O O O O O O O 0 0 0 0 O O O O O O O O O O O O O O O O O O O o C7 YJ Cn Vl In m an O O O O o 0 0 O O O o O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 4!q bfB NA'y cf �� q,p"p ci ci ci ci c-I N N ,�. N N N lf1 to yn N .--I ci c-1 c-1 c-I N N N N N Ifl Vl to In Vl ci c-I .--I c^X c-1 ci c-I ci c-I c-I '..i wW c-M s^1 m^I m-W N N f6 N fo f0 N } C N (6 N IO fO N f0 fO t0 f0 N N f0 N N N (6 N (O to l0 IO f0 N IO (6 fo N N f0 fp N N fo N N f0 f0 of N d) o) N da dl - dl N W dJ W of N dl N N dl ''. of N N dl of N dl dl N W U1 0l W d) N N W dl of W dl dl N N dl N N N N M , tv ci N '' M V Ln c-I N M In c-I N M ct V) c-1 N M N N N '... M m H N M V Ln N j M Vl rl N M V V) UUuUydA �y dl of N W N1Y 6UdN aof oa o�dtlN dd y Nayrydgyq,Mda <LC dlVVVVV VVV� V V V V V is V V V V iJ V V.c C C C C '�,°. C C C dam' C C M ' to m 1 m No m m m m m No m M Ad m m m m m oPJ '. tw tw 'w od ❑o rod v °ro4p SdW'.. > .� `cY7 n Zed sp oo Fqo ad oro op cad oo PdYJ w17 'afd axd oo- �d Syn �d °09 bd op� °Sfal %ac 9dy'., 6Yd Ep . oJy rro oG Ex Y a - N 0 J J J J J c J J o J J 0 J J o o o 0 J o J J J J J J J J J J J .. J J J J J J J J 3 '... J J o 0 0 0 0 0 o m o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 01 w J J J J J J J w0_ J J J J J J J J J J J J J J J J J J J J J .. J J J J J J J J J J J J J J J C C C C C C C E C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C O - - - - - s+ O a C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C o 0 0 0 0 0 0 o 0 0 0 o O o O o o O o o o a o 0 o O o 0 0 0 0 0 0 0 0 0 0 0 0 a o 0 0 0 0 U u u u u u u wy u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u C v N N N d/ of N d N N d/ oy W dY dl o) N W W N N Ol Ul O! dl O1 w O1 O1 N dJ of N a) oY N w da d1 N N Ol dJ W dJ dl C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C H w w w w 'ww w w t C. � o ww w N of w N of w N of w w N d/ of of dl of U W d/ d dY dl of w d1 dl of N dy of d/ -Fad1 N Ol d/ of v N ey", w Gy w w dY Gy w dl w (D d) w w w w N w dY w w N w N w w w w w w w w v ay w w d/ w dJ C w ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑''❑ ❑ ❑ ❑'❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ o '" mi 'D '2 _0 as "a N ii "Sa 'C9 'da TS "q "Ca "�G 'd3 17 'I7 17 "Ka Tyi "4 °p 'YJ', m v , "Ca L7 "Wa "x'a "as 'RP Ta 'Qa "ii °Ca "55 "K7 '"3J N dM d) iW 4➢ ffiM �.W y' '" W G 41 w t9.1' W w W7 '.... Al' 4d B8 WY 47 ok o.Y '0 '' a 'D m dJ N' dJ' xd oy oJ' W dy dJ' pY oy '@] op of IW dM 2y G! '�+. oy ul dk I. wN Sµ1 Ssq Sbd Sud .. L Pb o h6 fao'� A 43p o0 op' 'IxpA Htli'... CC oD b0 kW} ryCA SJA odtl aC oU @ kd4 oY7 Mb17 mA �' bG tlS17 W5 ili W6 ouW K1fY P fdA RAG Sad C PfY r4 OtF Go oe sp, +V Po Np io 10 Aq ati Fo lyy tl'o XG'P Ao rcNg to na na yo A'd �'o fo. MA 4o fb To oN Ad J'J R4 m M11 N m m m m N m C ! C C C. c' c G o: C G t: o o: C C C C C C G C C V.^ C C rm aT'. C C C C C is C' 'C.,. C C C 4Fy flY Yo Yo So rm d11 40 ad m m no m m m ANY m AO m m Nd #o PC 4d riy NU nay to VW RIy Co !M1% ApY ryNo vo _ My P6 do Cp Jxk N Rk .Z IZ M � II ILLI I I� ZIZ��I'TnLLI i N fl ill N P l El 0 c M H 00 In c-I iR +++++} O O O O O N > U ❑❑❑ 0 00 W N 00 O M In O o O O O N > U m m O V 0 '.. N. ID V in O 0 O O O N > U m m M Vl 0 lD r-I lD 14 O 0 O O O N > U m M m lD .n 0 O Il 1� to O 0 O O 0 N > U ❑ 1� D lf) m .n 0 O rl '.... in m m m m m M > U ❑ V M rn I, +uti 0 o N 00 V1 r m m m m m M > U ❑❑❑❑❑ N O 9 O v. 0 0 M N A^+'W r m m '. m m m R1 > U W D N V 0 0 7 tD Y V m m m m m > U l/) M 00 I, ,n 0 0 In O in r m m m m m m > U N M m m In, 0 0 lD Al In, r m m m m m If) > U V D N W 0 0 N P %A r N m m '.,m ''.,m l%1 > U ''❑ lD m M m .n 0 0 00 O In T m m m m m 111 > U ❑ 00 N r! N ,n 0 0 C 1n r V m m m m V7 > U ❑ O 0 1p In in 0 0 o 00 1n r m m m m m In > U '❑ ',, O 0 lD N ,n 0 0 O ',.. m '.tn r m'..N m m m m 1� > U ❑ O N N o .n 0 O O lO to r m m m m t\ > U ❑ O M m I� in 0 O O m {n Y}} m 0 m m m n > U ❑ O V V O +n O O O N Vk V m m m ''... m n > U ❑ ',, O VI In N o M m N .n ..� O N O 1� o lD ul N V? L} r In m m m m m m m m m n m > > UUU ❑ ❑ cG m V ', ID V v, V V m lfl in r}} N m m m m m > ❑ V lh m lO r„ry lD .�-I O 00 to m m m m m m > UU ❑ m m N m <n 00 00 lD O 4n V m m m m m > ❑ M N N rl 1n O lD m M 4/f r m m m m m m > U ❑ N N 1� N ws O O lD m N ,4 1n } N N O O > U ❑ Z K V O m 0 rn O O N m Vl N Vk'LT N N V N o O > V ❑ Z w lD ! N 00 '�. ark O O 00 00 00 ''... M M m N N 0 O > V ❑ Z x M O O c-I 1n O O V 00 �--� lfl N Y} V N N 0 O > U ❑ Z R 00 N c-I 1� .n V lD lD l/) lO N e-I m V 0 O > U ❑ Z K l/1 V N V .n 00 N m �--� fn N Y N m 0 0 O > U ❑ Z w M M c-I +n N 0) m lD m In m M m V 0 O > U O Z K N V) 00 +h lD In ID N lD i/? Y} a m 0 0 O > U ❑ Z K N e-I m v,,..n O o0 C m M to e-I m m 0 O > U ❑ !.Z '.. K rr N 00 O lD m lD ID 'n y}}}} N m m 0 O > U O Z K .._. 00 M I, .n O V O O t/M'. m 0) m m 0 O > U ❑ Z K O� 111 ID .n o N m m M to V m m m 0 O > V ❑ Z OC m Vl Ln 1n.. 00 N m Il in �--� m m m O 9 > U ❑ Z K m c-I ci ✓� In m o0 m m 1n N m m m O 9 > U ❑ Z K m I� wN .n 00 00 I� M mI- in M M m m m '.,9 O >M Om W- M +n N •-I n e-I lA Y} Cm m m m O 9 > K m lD .n m � m 1, In m m m V O > V Z K m W m .n 00 m� o0 ul '-I 1n y m m m V O > U Z C 7 I' O .n 1, 00 m N iA M m m m a O > V Z C M lD I" 14 lD m I� .--� M VT } V m m m V O > U Z K O � N .n UR lD N lD 1/Y y e-I m m m m O > U Z m o0 O 00 N Vl ''.. N r•°I Vl y N m m m m O > U Z K m ; m lD .--I vn N m r- 00 e-I 11, Y m;t m m m m O > U Z m � r H N +rt lD In O V1 N V? Y m m m m O > U Z K m m m m m m m m m m m m m m m m m m m m m '. m m m m m m m m m rl m m rl m m rl m m H m m v m m IT m m ,. v m m IT m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m-'*'*'t O O O O 0 O m O T O D) O 0 O 0 O 0 O 0 O 0 O o O 0 O 0 O 0 O 0 O 0 0 0 0 m m m m m m m m m m m m m m m m m m m m m m m m m N N N N LA u) M In O O o 0 0 0 0 0 0 0 0 0 0 o 0 0 +++++ O o 0 0 o m M m m m M m m m m m In m In m In m m m In m n m m m n 0 m m n m o 0 m m 0 m m 0 m m 0 m m 0 `m m �� m w m w `m w � m 0w ''. m `m w `m w `m m m w `m W ro m `m w `m a- a a a a a a a a a 0 O 0 O 0 O 0 O 0 O 0 O 0 O 0 O o O 0 O o O o O 0 O 0 O 0 o 0 O 0 O 0 O O o o O o O 0 O 0 o O Y Y} N m Y a- Y"} ''. N Y M Y V� Y} N Y m Y} V N Y}}} f m V N Y}}}} N M 7 .--� N y} M V O O N O O N O O N d O N C) o N O o N O O N o 0 N 0 O N 0 O N o O d' 0 O V 0 o a 0 O a o O V 0 o l0 o O <D 0 0 W 0 0 W o o O O lD 00 O 00 O 00 O 00 O 00 �" N u y u N u of u N u w u of u of u w '.. u w u a) u w u N u w u w u w u of u C al u C al u C of u C N u C w u C al u C of u C 01 N fO fO N f0 fO 19 N fC f0 M1] 0] f0 fO (0 fO f0 0] f6 f6 f0 N IO IO C N C la C N C N C" . C m C m C la C m C m C m C m C m C . C m C m m m 0l N f0 f0 T m of of w of 0w w of w w al of w w al of 0) al a1 a) a) a) w a) aJ ". h0 C0 00 00. '0_0 00 0_0 Cp 00.hai00i 00 0a..� Oq 0[i '-I N m V '.... m e-I N m -4 to '-I N m m ei N m V In a -I N M V1 > > > > > > > > > > > > > > > > > > > > > > > of of u u al u of u u u of u of u u U u u of u u u u u u u a) u u U u u of u u u N u 0 7 0 J 7 7 J 7 7 7 J 7 7 7 7 J J 7 J 7 7 J J 7 u u C u u C u u C 02 u u C u u '. '.... of u u '., 10 ig o] f0 2 fa 02 IO N 2 2 C C 01 (a C 02 C f0 C N C 10 p 7 O J O 7 O 7 O 7 O J O 7 O 7 O J O J O 7 O 7 O 7 O J O J O 7 '. O ,, 7 O J O 7 O 7 O J O 7 O 7 O J 2T 0a 0D 00 T 00�', 00 10 GO 12 00 T 'p0,,, b➢ 00 00 5— 00 00 0fI 00 .'00 C0 '0_0 -0a'-00 'h0.•d_0 •0_d .0_6 C C C C C C C C C C C C C C C C C C C C C C C C C C C C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O O O C O O O U V U V u u U U u U U V U V V U U V U U V U U U O O O O '.. O O O 0 '.. O O 0 0 0 0 0 O O O O O O O 0 0 O aJ N N of O1 N w O1 N a/ of O1 N al 01 al a1 N al al OJ of of a1 J 7 7 J J 7 J J 7 J J J 7 C J C J C 7 C J C J C 7 C J J C C J C J C J C J C C C C C C C C C C C C C C C C C C C C C C C C C C C - C C C C - C C C - C C C -- C C C C C C of W N y al N W N N y Ol y W N O) N al y al W N N w w a) w w w of w w w w w w w al w N w w N w w C O C O O O C O C O C O C O C O O O O O O O O O O O O O O O O O ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ w ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ U U V U U U V U U V U U U U U U V U U U U U U U V a s a a a a a a a a a a a a a a a a a a a a a N Ol of O/ of o) of W aJ OJ aJ o) of N aJ of N aJ O1 O/ N C C aJ C of C o) C a) C t of O) aJ 0l N 4! N al w' al N of �' OJ w' N o) w" N 00 N of of a) m OJ m a! 00. al o) C of C Ol C O1 C al C o! C QI C 01 C 0l C aJ C O1 C al C O1 C N C W C of C N C of C Ql C O1 QI of al o) 0) o! f0 C 0] C 0] C 0] C 10 C 0] C f0 C f0 C 0] C o] C of C 0l C o] C f0 C f0 C 0] C m 0) C o] m C m !a C f0 C 01 C f6 C f0 C f6 m C U1 N of U1 ai N N a) w w w a) w ai 0! N W G1 U/ of N N N N N N f0 fc0 fcc0 m N N cm N N cm cN ccN cN ccN cN ccN ccN ccN ccN ar ca v oa ar m w mi m oa a oa m m w m- ar m m m v m m v 0a w m w m m ar w m m ar w m- ar m, a m 0a v m ro 3 ra 3 m 3 �o 0) ro 3 m 3 ro 3 ro 3 m 3 m a) =�--==--- ro a) m� 3 a) ra 3 m 3 3 3 L) 3 3 L) 3 C C C C C C C m C m C f0 C m C m oI C N C 0) C 0] m C c C m m C m C c c C m m m C C to C m c C C a m C c of u C a! C r C a) C I C al C of C c C C C C C of C of C ',. o) C '.... c '.. C of C C c c C N C of C C c 0 N C of C '... al ',. C of C fa 0] f6 N � f0 l0 f0 la IC fa N l0 f0 N la f0 N 2 1a 2 (6 f6 N fa f0 N 10 al of N al C a) w 0/ of OG al OC al K N OG of al K of of OJ Ol of N O1 0G 01 m a! K al C O) m al al O1 0l of N N of QI al Ql 0! N N a1 a/ o! O) O1 al 4✓ al a1 0/ N of 01 ',. aJ Ol 0/ ", N Ol o! '.. N of al al 0! al N o! N '. LL LL 11 I.F. LL LL Il L.L LL 11 11 LL LL LL.. W 11 I.1,. ll LL 11 LL LL LL 11 LL LL LL W LL 11 11 I.I.. Il 11m LL LL IL LL LL LL LL Il W LL LL 11 LL ll 11 El c m m m m m c m m w,, m o o m m nlv.m'.N 1 v m.....0 o o m m v m o 0 olO o. ti N 7 n m .-I M Vl n 'k RD e u 1p T O lD m lO m N c-1 N N V n m m 0 0 .. O O O O O O c-I N m 7 LO N w v m w O m N .--I 1� N .--I N m '.. m l0 N V T l0 m N w o 0 0 0 � N C lO w d' w w e M V lO a N ZrNl M N O� m wm N Ill O N V l0 m I� O Olt m O lD V n m �4I,AIIv-�I,�I�I,/�IV�I'i^InI�I")- O O O O O O O O O CD O O O O O O O 0 0 0 0 0 0 0 0 0 O rn O N O n o v o V N � N d' N a0 IA Ib ',. 00 V m V V�1 nil A/�IIU�II'a V W N lD ci N M V 0 0 0 0 0 0 0 C,10 0 0' O O O I O O O '. O O O N V ID W 0 0 0 0 0 O Olc-o:i 0jcoo- 00 lO ID N o0 e¢ W N lO O O O O O O O O O O O 1- 7 .--i o0 O O O O OO OO OOM w m N E� dN m w n m a In O LD .-4 '4 N m� w"w V O O O O m O ED O OOOO ' � 0 00O NI omo o 0 o 0 000O� 0R OV OO c O N 7 o ❑ } } y } m } } } } } } } } } } } } y } y y } } } } H m m m m a, N m v m m m m p p p p >H N M V s-I N m r H N V H N m V m❑ x m m m m m m m m m m m m O O O o m m m m m m m m m m m m m m m m m m m m m m m m m m m m m O O O O m m m m m m m m m m m m m m m m D_ >- >. m m m m m m m m m m m m O O O O m m m m m m m m m m m m m m m ''...m LIl 'r > N v v v v m m m m m m m m o 0 0 o m m m m m m m m m m m m m m m m ~ m¢ Q Q J d N N Q Q N m m m m n > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Q ❑ ❑ } } y j U U u u V U U U V U V U V U U U U U V U U V U U U U U U U U U V 0 a> >- ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ '❑ O ❑ ❑ O ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ME3� U. ❑ O ❑ ❑ mU U QQ aQ QQ a❑uuU U U U U U U U U U UZ Zz zZ ZZ ZZ Z Z z Z ZZ ZZ Z ZZ z Zz z Z Z Z m s ms x -Mac ac rr m z acac Y m z- s z s cc z x u u w w -01-0 v v x'x 11 11 E E m m CID X 7C v v v al v m m m m a a a a+irn o 0 0 m1 a�; m m m m m m m m m m m m m m m m m m m m m m m m m 0) 0) m m m m m m m m m m m m m c c E E v v v m m m m m m m m ," m m m m m m m m m m m m m m m m o' o v "O r m r m r m ��� N ti +++ m m m m m m m m m m m m m m m m o... M m m ,� a a`ii c� o o m m Irl m n n m m � n r` mmm m n E E un� r O O O O cO 0 O � o o o 0 0 0 0 0 0 0 0'0 0 0 0 0 0 0 0 o a s `m mD u u'o o o o o O O o o O O o o 0 o 0 o o O O o O O O o O O U U U C C U U N ❑ ❑ U U N O O O O O O O O'] C O S:i Ca C3 p O ...... O O O O O O O O o o 0 o o o 0 0 d�0 sA1 M au'Y O O O O O o 0 o o o o o p o o O O o O am+ m y -o C c N N ci .-I .--I '-I .� r-I '-I ri rrA, m•-C c^p m^1 N N N M^Y N N N N b• V 7 7 tD tO lD m m 0O W lD N o '... O r m "O O v `~ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m c lD ~ } C C C C 7 O C C C C c rrr}.rrrrrrr...rrrrrrrrrrrrrrrrrrrrrm m o o v v v v v v._ rr--1 N m V rr-1 N M V �-1 N m � e-I N m a c-I N m ly.--. p p m m >>>> 0 0 0 0 v w aJ W N al v al '... 9W d p v aF v lib qJ.. } N u al ar 4p N m v aD ak 0Y v al N J 7 !6 I Q a (7 o a d U' U (o a s U W U U U U U U U U U U U W W U U U U U' U U U U W U U U U L L c 48 _ C C c C C C C C C C C C C c c c c C C c C K, C C C C C C C C C C m U O O Q 4 +ri dEF m C46. m m m m m m d;M fa m m >qa tr57 Y1G N11 I dit m m Pa 2Cwa m tmWC> � ma mL m.4"k '., �dSRqp6 fatu5 M ceCu�a 111 m fa t0 wC FOW OC mC C 'OCai?Y..' 'c C9. • u}M1 `¢?ry • yYy emxdrr •�N. �'• m'5 > > > > >> ✓'C c c 0 c C Cc c < a Q a$a av m ?^� 7 7 7 7 7 7 J 7 7 J 7 7 J 7 J 7 7 J 7 7 7 7 J 7 7 7 7 7 7 J 7 7 im+ 6 .... C c C 'c c c c c c c .co O O 0 O O O O O O O O O O 0 0 0 0 O O 0 0 0 O 0 0 O O O O O O v 'Cn, ca O O 0 0 0 2 9 rc O O 0 J 7 7 J 7 7 J 7 7 J 7 7 J J 43 C3. C C m [L C c C C C C C C C C C C C C C C C C c c c C C C C c C C C C C c tcb a "," a m m, U. m e •C •C •C C •C .0 .0 •C •C '.. c C C C c C C C c c c c C C C c C C c C c C C" y0j c CO. qy. ,-SS gz• k. O, qry,. O. O O O O O o O O O O 0 0 O O O 0 0 O O O O o O O O O O O O o o O C:,p O O O. R Fi O. C2 Cy, O. ak CL R3. iti, u u u ca u u u u u u U u u u u u u u u u u u u u u,u u u u u u u a v 7 J a a a a a Qt a a a a vOi aJ h uvi v vOi vOi H uvi vOi vOi vOi al al H v v N v v v al O1 u.r c c u C C c C C C C C C C C C C C C C c C c C C c c'C C C C C c '.. c C c ❑ j j C C C C C C C C C C C v v v v N v v al al v v W v al al aJ N N v �F v al N a) 22 v C N L1 O O O O O O O O O O O aJ N al v v al v v al v v v w v al '.., v w al v aJ v aJ a/ ''.. v v aJ wal N v v v U U d O_ C c C C C C c C C C c ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ m w-• al al al al w al v (ual w w "tb 'E"L "[f �^E '^r'f xw"wY. `r'M^vM 'a ^n-ra •nw +a..-,rv.... .... ,•... •.... ...., .,.�., „a. �... ❑ > > c I P WI.-I rsam mm om saEah�'� ���v C vC C C C C C C C C C C C' C car q.!to t�' ae rr z 5 tr K � &K`. aC tr tY � CK 2 tr v a v v v a v v'm v v v v 11 LL 11 11 µ„ LL 12 LL LL LL LL LL ll 'C v > > > > > > > > > > > REF h v`Oi d A> > ad°.1flm c C r Ra ' •. m H d- d- d- d LL d- d c C C O. c C c C. W �O 0 aF al m i m m m m m m m m m 2 m �^ A4 v v v v v v v v w v v en YG rr»+, n W L L L L L L L L AC' L L O 0~~1-- F- 1--1-- H Y H F- 3 3 0 w 3 3 3 a a m n a v Nil v au v v v v o 0C C C C, c C C O N !rO0 O cO cO O O (Ul vYvvYvjvwlv,m�vlw�w v�v........v vvv El CD O O O OOOOmw CD O O 'D N O O O MIn O O O n IT O o 0N0 o o N V OO O O : o0 1- O y O O O O O uH O lD ul m lf1 I* W V7 m V m I, C V1 0 0 o O GO O w o w O V o V O V o o o O o 0 w N lD ul w m o H o w Il N V Vl �'-� m Vl n m 7 m r� �"� T w r� O V O V Vo d' w� l0 a w w w to w lD O w O w o w w I, N m I, n m o w M O m w M m lD N w H w V1 O V m M V m m lfl w lfl I, w rl ''... -c I� oc lD V lD V tD V lD O O O lO O .--I N N m H N N m H H N N H H N N H H H N H m m to v v v v v r m w Ln Ln m ua0i m m'D r� r, w r, 1'Ih MY. VT 1A.N iu} v} V} to u} to ih ih jLf u} Vf L} u) Vf tA....�uf iA ✓?.,, V} t/f Vf V} t/T uY VY VT VT N. N to 'A VT M. u} O O O O O O O o O O o o O O O I O O O I O O O o O o o O O O O o o O O O o O O O o o o O O O O o 0 O o O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O o 0 o o o o O O o o o o o a o o o m w O O O w LD O o 0 m w o o o H N o o O m w o o o w N o o O O o o o o o o o o o o o a o o o o m m o V m w n m o w I, o ff I, V I, C m ul H o N 1� N r Vl H V1 O O O o � o V O V O N O N O N O o o o H N M r H N m M H N N M H H N m N O N o0 O o0 O o0 O LD 10 w w V Io V O oo a c ' v v c m ' a vi v m Ln io � w LD ko ' 00 m o0 0o ao 00 VF. ll. VT...'.1A tit V! %A u1 %A V} VT......,ih uY to V}''., VT V?'...tA ul b'^6 Vl 0.d"M V! VT to t/} to u/ iA VY uM V1 Vl. V) 'A. <A.. u}'n tA. tA. V1 Vl VlI� VT VT u) uT N oT m m m m m m m m a) m m m m m m m m m m m m m OI m Cl Ol m 1 J (7 a m m m m m m m m m m m m m m m m m m m m m m m m m m m m d Vl Vf Q Q D_ ul V7 Q Q J a Vl ul Q Q d ul ul V V V V V' m m m m m m m m m m m m m m m m m m m m m m m a>> u u a o_ >> v u D_ a �.� u u a a» o 0 0'o o 0 o o o o H HHH H v a v v v m m m m m m m m 0 0 0 o o 0 o o o o o o o o 0 o o 0 0 o 0 o 0 0 o H H H o 0 0 0 0 0 0 0 0 0 E 0 0 0l0 0 0 0 0 0 0 0 0 0 0 0 0 0 N N N M M M m m M V V V' V a 7 Ifl m ul m Ifl lfl u7 V7 V1 V1 u; u7 V1 ul m 9 V1 99999¢ a¢ Q Q Q Q Q Q a Q Q Q Q Q Q a a Q Q Q Q¢ a a a .0 u u u u u u u u u u u u u u u u u u u u21 uu u u u u u u u u u u u u u u u u' _... a a a a a a a 0 o a o o a o `m f`o �a v v v v v v v „ymym ,gym>�o y mym „ym a) a m l a v m a a v a m in a v m a > lin ¢ Q Q N>> u u C C C C y C C C C y C C C C y C C g v v v v M a v v v v v g v v v v Ln g v v o E E E E E o',E E E E E o E E E E E o E E C C C C C C C C g Ct C C C C C C v O/ of of C d v v w w C D_ v W Ol N C D_ Ul N > > > > > > > > > > > > > > O O O O O m O O O o O O O o O O o O O O a (7 (7 (7 C7 a a 0 0 (7 U a a (D (7 (D U a a C7 (7 m m m m m m T u, ILI m m �, v, m m m m m m m m m m m m m m m m m m m m m m m m m m >....., .�, > >.. •> > .... > .. >> i.. > -- >, >> �> i.. >,. > m m m m m m m m m m m m m m '. m m m m m m m m m m m m m m m a „ v v a Id. Kt m m m m.m m m m m m m m m m m m m m m H H H Cm m C Cm Cm m C m mlm m m m m m m C C C C C C C C C Cm m m m C C C C C C O o 0 O O O O O O O `H H H H V a V G a m m m m m a ', ¢ a Q Q Q Q a ¢ Q Q Q Q Q Q Q ¢ a a Q ¢ O O '. O O O O O O O O Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y O O O C C C C C C C '. C C C C C C C C C C C C C C H H H H H V1 lfl l!1 In lfl ''' H H H H H N N N N N V1 ul V7 Vl In H H H O O O O O O O '... O O O O O O o O o O O O O O O O m m m m m m m O O O m O m m O m m �o m m m m m m �v m m m m m m m m m m m m m m m m m W o o N v N N 4 W v N N N N N N v N U G w w UJ w v w v of u _u u u u u u> y> y y>>>> >'''} »..y.> » >.y y'» »>>> >''. - H N m a H N m v in H N m v u) H N rn v in H N m v �n H N m a a a a a. a a a o, a.. a a a a s a. a a a n a.. I - a a a a a a a a a a m a a a a an a a a a a'a a a a a a d a a a a a a a a d a a a a a Q a a Q a a a a¢ a C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C O O O O O O O O O O O O O O O 0 0 O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C N N 4J N N W G1 N Ul v N W N U1 U/ N of G1 U1 U1 U1 v O/ N Gl U1 U1 0l Ul v U1 N Ol N N N O/ N N W U1 N N Gl N N N U1 N mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm L L L L L L L L L L L L L L L t L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r,r r r r r r r r r r r r r r r r o/ v of U1 W v 2 ... N OJ N of N 2 N of W v v v v W N Q! .. N v 9J 2 O1 T v N T v v v G1 O) N N v N 71 Ol v o/ O/ N O1 N a a a n z a-6 n a a-6-6 a-3 a -a a a a'-3 n a n a a-3-6 -6 a-6 a -a a a a a a a a a a a 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0,0 0 o o o o o o o o o 2 2 2 212 2 0 0 0 0 0 v v v v v v v..v'v v v v v v v v v v v v v v v v v v v..''.v v v v v v v v v v v v v v v v v v v v v v > > > > > > >. > > > > > >. > > > > > > > > > > > > > > > >.. > > > > > > > > >. > > > > > > > >. >. > >. w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w N `1 v 2 v v v N v v v v v v. v v m w v v m v v m` v m v m m a w v v m m v m w v v m a! LL 11 '. 11 11 11 FL LL Il LL LL LL Il LL 11 Il LL LL w 11 w ll ll LL ', LL LL 11 LL LL LL LL 11 11 w 4A. LL LL -- 11 Il LL LL LL 11 w El o 000 v0i o rn a .�'-i m y o m 0 n, o rn m o 0 0 0 0 0 0 0 0 0 0 .... , 0 0 0 0 0 0 0 0 ''., 0 0 0 .m� '... � mo vro ri�m�r o oovDivvmm ter- n isn m ors0 0 oez'o00 oaearasz 0 0 ''ovo ��v n o c oo v m m n o m n m �o m N v m o 00 m o n ear n o c ca r c c as ¢ ra oo w� ao c c� woo N m ri .� e-1 'i .-I '* N V" N 'CT N 90 Vl C4F XPk R%7 617. n r•+.., '9G n filLti. ID Ir ID V 4d7 '.f N N n o9 ^ wAF I� a0 ,'+t 12i 44 Mai H' M ,Mi Vr; c^i ft V 06 a a0 X 06 •� +-a .-� .--+ .� .� m m m mm m Ct 4 ' 1 v` v r va'd an un in u , � m L4 Vn v? vlW Vd *Ah,. Vti in v} V? In 'Vk 'V^ 'V9• 'VY Vh V,x"'J title Vry m^ t6 VY ir4. VT Vf v! v* V4 VA Vf 9Fti,.+fb Vb 'I.n. Vn V4 vA 'A Vw caa u! In u} +:tM V1 1^ Vb 4^ V1 N00N'0-1 00p0-I 000ci e0-I ot•-I O¢N' N.--i oN0N•+ 0N 0N 9wT "g'T�o+7' ''q z0+'b <7' 0'C.ti V 00d'+: 0o000000000000loc o00 a0 �o 0 0 0 0 0 O O O vO O O O o 0 0 O O l0 N O O O s O O 0 O �O V VO m n N -d' 0N tD O a 0 ti V m 0 0 CT l O Oo 0 0 0 O0 a, m 0 VOOOO OC id rdim 'Q,06 un M r-, q 0 to to W w lD VM1 - - - - - - V?,iJ"M— — - - - - - - - '- - - - - -- VY 14 V} of 'V$ V1 V} V} V) Vl V?.....,'A (J•W VI v ','4MW i x••4 N M m m CA �} } } } } } Y } } } } } } } } } } + N + V Vl F J (D a (D a J u" a a F J a U a J (7 a MTM1 M 0) Vl a-1 N m� vl e•-I N M V N e-I N M I Vl (7 a Ol of of of al of of al m ul of of al of of of of O O O O O Q Q J a Vl Q ¢ J a '-r4 N Q J a In V1 al 0) m 0) 0) Ol 0) of Ol of of of m of of of of 0 0 0 0 0 u u a a 7 7 u u a a ",] 7 u u a a u u d 2 7 0 o 0 m 0) 0) Ol m m 0) m 0) 0) Ol of ' of of cn m m O O O O O } } Y } , } > } > > } r . > > > } > } > > > > O o of of (n of of 0) 0) 7 a W �{ Ql 01 0l m of O O O O O r-I e-1 ci ei a -I .-I N N N N N N m m m m m m v v a a v ^ar v v v v v n n n n n m rn m m rn o 0 0 0 o Q n J J 0 0 o O o o O o 0 0 0 0 o o O o o .�.1 2 2 0- ¢¢¢� ¢¢ �¢¢ Q��¢ I¢ ¢ a ¢d �¢¢�¢ a ul u u U V U u u u u u 'u u 0 u u u u u u u u u u u u u u u U u u u u u u u u''u u z z z z z z'z z z z z z z z z z z z z z z z z a a a a a a a a 0 0 0 0 0 0 0 0 v v v v v v v ry r m si d w rl a N. a w N d m d aJ m a a a w �t 1 u u y u u N u u v m u u v v C C r C C C c } J C C C C } . C C C C } J C C EEEoEEEEEoEEEEEoEEEEE EE C C C C C C C C C c > C C C C � C C .5 v` c a `w, `v v a`l .5 a `v v > > > > > > > > > > > > > > > > 0 0 o 0 0 o m o 0 0 0 o 0 0 o m o 0 C7 C7 a s (7 U (9 l9 a s (7 U (7 (7 a s ti,"� (7 (9 0 a a '', 0 (D vi a,h wP + ti s of O) Ola c 0) v m m +q • M m m m M M0 m m m m m m m m m m m m m m c C a. c c c c c C C. C c c c C c C c C a C C C C 0 0 0 41 O1 Ol O1 Ol Ol O1 Ol of Ol of m of of of of m Q Q < < ¢ Q << : Q Q ¢ ¢ < '<, < ¢ ¢ ¢ Q Q Q O O O Q1 Qt 01 m of of of m m of m of of 01 m of m C a a C C' C c c c C c c c a c c C c C c c c c '~ 01 m of of m m m m m of m of m m of 01 01 O O O O O O O O O O O O O O O O O O (] O q O O O O AlO m Ol H ol. Ol Q1 0l Ol Ct i � of of Ol of Ol ^^ - - .� ct v v a v n n n n n m rn rn rn rn o 0 0 0 o m m roi m a io m io is m m La m m as one io is is m is v v v 0 0 0 0 o Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y 0 0 0 0 0 '"" """ "• ^^• •- •- •- _. -•• ••-^ - - .ti N m O '... O O O O O O O O O O O vl ul vl O O O O O ,. 'a ci a L a a a a a a a a M 'Q a cL O. a 4l M. C"L aa, -O, � �. 4, .-I '. N lfl Ifl N In Vl n n n n n �--I M--I .--I .-i e-I a, a a a a a QL Li CY '1^�. 'q. Ci. CL, ti a5. O, a C& M a GL Ol a Q a a a �`a r`o �`o `m w f`a f`o `m i`a `m t`o �`a `m �`a '`o r`o Q ¢ ¢ ¢ +, , " *.� ¢ * ;', ¢ ¢ ''. Q "�; ¢ Q Q N w w w w w N w w w al w w w w w W w w C C C C C C C C C C c C C C C C C C C C C C C c c C C r r r r r}}} r r r r} r r'....tLn } r r}} 0 0 0 0 0 .2 .2 0 0 0 0 0 0 0 o a o 0 0 .2 .2 0 o 2 o 0 0 V �/1 '-I N m V Vl e-I N M V '', V1 e-I N m� V1 .-i N m V Ifl C C C C C C •C •C C •C U .0 C '... C C C' C C C C C C C a a a a a d a a a a a a a as n. a a a a d a v v v v v v v v v v w v v w v v''..w w v...w w w v •w •w w w v m v a v v v v v v v m a v a v v v v v v un v v v c c c c c c c c c c c c c c c c c c c c C c a` a ''. a a a a a a a a m m a a m ai: a a a a a a a a a a m 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 •C •C .0 .0 .0 .0 C .0 •C .0 .0 •C .0 .0 •CC C C C C C' C N N fa fa IO (O (6 (0 f0 (p fO IO (0 fO fO (0 IO fa f0 iO f0 f0 tp ip fa i0 IO v v v v a v v v v v v v v a v v a v v v v a w v m v v v v v v a v > > > > > > > > > > > > > > > > F- F- F- F- H F- F- F- F- F- H F- F- H F- F- H F- F- F- F- F-F- a a a d a a a a a a d a d a a a a a a d: d v w N _v w W w 4flY w a/ w aJ w v N w v al _v v v w ''.". v N w v v m m m is m m m io m m m m m ...... m io m m a d :cro .a3' v v v v v v w v v v v v v v v v v v v v v cc o 0 o cc a o o 0 0• 0cco cc o o cco co o cc o cC o o ro�. �CaC c cco cc o co cco cco Go L L L L F- F- F- }..• F- F- F- F- F- F- F- F- F- F- F- F- m m m m m m m m m m m m m m cm PMk m m m m m m m "'" v v v reu ° v m v v° w° v" a v v 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 a s .isn �n v v v v v v v v v v v v v v v v v v j cc 0 0 0 0 0 0 0 0 0 0 0 0'0 0 0 0 0 0 0 0 0 o c c c c c c a a c c c c c c c c c c a a c c c c c c c v v v v v v w v v v v v v v w v w w w w v w v w w w v 2 2 2 2 2 ce z z x z..e c e¢ w z z z z rt z z e s s z z �' LZ Z LLll���IIe���1� El o �D a -I In V o r r M i'dh VT o �--� O O N N 0 O '-I lD N Ih o uR o m m ih m r w t0 In o r N w .-I an o Ol C M N In o ''., o0 Vl m N M, r r .ti lD Vd o m m w '-1 In 0 In r �'-� N N, 0 r m lD N V5 .� o0 V N ✓} oo Ol r '-I V} V a --I m 'i V? o al m� N V} ry r w �'..N'.... ° o In o M i'-I O O V r �--� V? o oo m O N 4h o N m V LT o �"� M �"� rl 4A o at r e-1 N o rl Dl r-I N vl "'� m� m V} o o �"� to o N m M e-1 N o O V r �"� Vf 0 GO V m N o r N Dl N'... o w s-I N �-1 Vf o Ol r V .-I V? ry m .--� m N o O '., r bo N. 0 m c-I �"� 1/f o N m m ci 'n ww. ul l0 In In Dl ID Vl Ln lD n Ol w inh o In r-1 L N Vl, o Ill e-I w N VA N, v al m Vl 'A oo 00 r o �--� n m m oo m .--1 'n r In m oo �"� Vl oo lD m N N V} v N m V to oo o Ol '.... Lf o�,,o 0 0 0 0 0 0 0 oN 0 0 0 0 0 0 0 0 0 0 0 0 0 0 • o� o0 0 0 o m olo o o o o o o 0 o o o o o o m o o o o O o o o olm w o 0 o u 0 �"� w N o - w lD N to o O M w m o W r rl r ct m r m Ln lD r N N r o In O N m -I N V N D o N a '-1 c e-1 '-1 O rl M '-I w r-I m al m al Vl N a c-I e-I '-I N N a .-I rl rl r r r N UR A'n N, my i/1 1n %f1 vk t^ GA to N In VT 11" VT 1A 14, n N .. V} N N to in Vf N N,,.1h VT,,,N Vn 1n- Vn N'. M� N- V1 N- N VT VT N� 4n 4A Vf } } } } M C a) N M cn++++ }}}}}}} N M V In e-I N Dl cn al Ol Dl m Ol Dl Dl Dl Dl Ol Ol Ol Ol Dl Dl Ol Gl Ol Ol Ol Ol Dl Dl M Ol Dl m M Dl Dl Ol Dl Ol M Ql Dl Dl Dl Ol Ol Ol Dl Cl Ol Ol Dl Ol m m Dl m Ol m Dl Dl Dl 01 Ol Ol M '', O1 Ol Dl Ol O '... O o O o O o O Cl Cl Cl OOl Gl Ol m Ol o o Ql o Ql 0 01 o Ol 01 al �+ 01 01 vlv Ol 01 v T T Ol m m mlol Ol of m Dl m D1 m Ol m Ol m'm Ol 01 D Ol D Ol m 01 v Ol v Ol v Ol v Ol m Dl m 01 m 01 of O o O o O o O o Dl m Dl Dl m -Ito Ol m Dl m o o o o o o o o o o o o o o o o o v v v v r r r o r 0 of 0 al 0 al 0 rn 0 o o o o m= v x o o o 0 o o o 0 o 0 o 0 0 0 0 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o a o 0 0 0 0 0 V1 o V1 a VI a N1 VI N N N V1 V1 V1 ?� X X O O O O O O O Vl VI V1 V1 Vl Vl VI VI Vl N VI VI V1 VI V1 V1 V1 VI Vl V1 VI V1 VI Vl In N X X o In cU Uc cU cU cU cU cV cU cU cU cU cU cU cU cU Uc C cU G cU G Uc C cU L cU C cU G cU C cV C cU C cU L cU L cU G cU C cU G cU G cU C Uc C cU G cV G cU G cU C O O M G L Z Z C Z C Z'....Z G G Z G Z G Z G Z G Z G Z'...Z G .'. C Z G Z G Z....Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z...Z .', Z.Z Z Z Z w o- J W U O> m w Uc C 666666 c C c C '... c G K K K� K K 2' K '. LC cc ,w IK OC K K '... K K C K C K CK K W K C K CC K K CC i= cc � cc C Dl m C W E c W amu ac E c m W W W c m m m m v E 0 c o m of m Dl m of rn W oa>�� m vvvvvmm m m m m W } w W Y W } w W Y W Y W } W } m Dl Dl Ol Ol Dl Ol Ol Dl m O1 j W E W ri N M a L!1 .� N Dl Ol of Dl Ol Ol Dl Dl Ol cn Dl Dl Dl of Dl Ol Dl Dl m m m Dl Ol + + t + W N L O L C C C C C . C C Ol T of m Dl m Ol m al m Ol m Ol m 01 of Ol of Ol rn m m Ol m Ol of D1 m Dl al Ol m O1 al cn m Ol of Dl al Ol m (n m Dl m m m Ol of m c m v m v m v m Dl m m m m o o o o W g O C W W W W W W W v m O O m m m m m m ~~ m of m of a m a m m al m m O .� Y .� Y .� Y .� Y v Y c Y v Y v Y r Y r Y rn Y r Y m Y m Y T Y m Y o O 0 O 0 o o o o— o C C `° m pp aEi p4, aEi w aEi w aEi w v pry aEi w O O rl V1 O o m O o to O~ o lI1 ]C e-I ]d ci he '-I ]e a --I Y N ]e N he N Y N ]L V1 Y M Y lf1 Y V1 O .--I O r-I O e-I o '-1 o N O N O N O N O N O V1 O V1 o N m r Ln r Ln r ul r O a-1 O rl O '-1 o e-I O 'C O >, a+ m m m m m N m N m N m IO W W m W m W m W (O W f0 W m W fC W f0 W IO W m W f0 W m W m W '... fO W m W m W m W IO W m W fO W '., m W m W m W m W m W m W m W m W f0 -W m W m W m W (0 W m W m W C O `l d W > C W J W m C L fCO C CC m C LL m y C L H N m V H N m V .--I N M N m R N N m 7 e-I N m V N N m a H N m jp D_ a a d a a a a a_ a a a n. a a a a a a a a a a a a a a a d a a a N N N N ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ o nv n v Ln ✓ C C C C C C C C C C C C C C C C C C C C W W W WW— W C C O O C O C O C O C O C O C O C O C O C O C O C O C O C O C O O O O O O O O O O O O O O O O O O O O O O W — —N —W —N — C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C L O O O O O O O o O C W W > > W > W > W > W > W > W > W > W > W > W > W > W > W > W > W > W > >W >W W> >W >W >W >W >W >W >W W> >W >W >W >W >W >W >W >W O O ` ` W W 2 ` v v W ` ` v ` W 2 v , 0000 , , . 0� 0 ffIffMMMNMMM MMM f U W `0 C C C C C C C� m tp "> > > > > > > f � r � F- F � F-- r r- W W F- W r- W r W W � W r W W W F- W F- W W C W Q. a d W L a) m W d v D_ v 1 v d a D_ v 1 W W W W W W W W W W W W W W W W ., W s W a W W W a W W W W . a a a �s :n a n a cco cco c0 cco n. 'n, o o v v w ami w v a v Go co G G cco G <co C Co G co G co C CCo G cco G co C co C cco L cco G cco G co C cCo L co C cco L CCo C cCo L cco G cco G cco L cco G CCo C cco G co C CCo C cco G cco G co C co G C CC0 C L C G a. O., a In L L L L L L L ¢ x x x o 3 3 3 3 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 3 W 0 O1 0 O1 J L d L L d L W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W X x L5 O j O O O O O i O cL O 2 c' w w w w f.0 z K rG z W w¢ rr w K w cc DK m c' w w Oc w w K K SK z K K rG w a W W W > >,. W > W >. W > W > W > W > W > W T W > W > W > W T W > W > 2 W > w W , T ", w W T w W > W W T W W >. W W > W W > W W > w W >, W W W W >.I w W W w jw > WWw>W`/ > W > W > W >. W T W > W > W > W > W >. W > W T W T W > W > W > W ', >. W >. W w W W w w W W w W w w W w C 11 LL LL 11 I1 LL Lr 111111 1 l.L11 11 Z11 ''11 11 11 11 LL 11 LZ ll LL I.{. LL 1 LL 11 L.L L: 11 1.1 11 11 lL 11 IT z 11 LL LL LL LL LT LL LL It M ti O Z E 0) El ,-I �� �� OI��.. �j.,m^MrylD m,O m N�lI7 ��00�O�N�V 1l1 ICI OI w M V IO zr�N M�Ln w N�N�m r O OIO N m V m OlAm----i ONl ©�®®®��I�®Irma©I�©©©©�I�I�I�I®©i©I©®©ieeeeeeeeeeelele©® ��ml.........^�N�m�j°�o°.o�.a�°oT°�m�NN m om�on m uDoD N o�o�"IoNLn `Z °ow° ol," aNL N.........Ln N a) - rn ����p lm�v 0 N -zt uo�i�����CYolq ; r'�'��If�l�ii�i��f�lifi�i��iil��l�ll�l71©I�ii101�iil©I�iil�iilG�l©�©I©I©l0©©©©©©©�©�I®'�I®e�.7e©I©e�' r I I I I r r> r r m o, o,.o,.o, M V to '-I N M V Vl c-I N m 7 tl, c-I N m m a-1 N m V 1l1 ci N m V lfl c-I N m d' Vl .--1 N T Vl r-I N M 7 V, m m O, m m + + + + + �' . O m m m m ..' m m m m m m o) a) m O, m m O, m m O, O, m m m ...,. m m m m m m m m m ..'', m m m m m O O O O O O O O O O O a) o) m m m a) (n m m m m m m m m m m m m m m m m O, m m m m m m Q, m O, m m m m m O O o o O' o 0 o o O O m 'm m o, m m 'm m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m O O O O o o O O O O 0 0 0 m m m m m m m m m m m a c v v v m m m m m o 0 0 0 0 So 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 N v v v v n o m m m m m o 0 0 0 0 0 o o o o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o O 0 0 0 0 0 0 0 0 o 0 o o o oa Ln V, V) vl N N VI VI o V, N v) o o o M V, to o '., v) U U U U g : � �,� � i Z U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U Z Z Z Z Z m m m m m m m m m m m m m V a a V V O mmmmmmmmmm 0 0 0 0 0O m m m m o O O O O m m m m m m m m m m m m m m m m m m m m m m m m m v v a v v m m m m m w m m m .-� .� ,� .-i ,� a V V V V m m m m lT o 0 0 0 o m > m m m o o o o 0.0 0 0 0 0 o 0 0 0 0 0 0 0 0 0 0 o 0..0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o o o o o o o,o 0 0 0'0 0 N o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o o o o o o o o o 0 0 o 0 o o o o o o'o o o N m v o o o 0 o o 0 o o 0 0 0 0 0 0 0 o o 0 o o 0 0 o o o 0 o o o o 0 o Ln m ,n Ln v, o o o o o '. In VI .--I e-I '-1 r-I '-I N N N N N V, Sl'1 Vl In VI '-I ei e-1 '-I ', E m mm m m `m m `m m m `m m m m `m m m` m m m `m m `m `m `m `m `m `m `m `m m` m` `m `m m `m `m `m E E E E v. w v w v v w w w w w w w w w w w w w w w w v w w w w v w w w w v w w w w w w w w w w w > r > > > > > > > > > r > > > > > > > > > > >. > r > > > > > > > > > > > > > > > > > > �c wr xe lf, '-1 N T d' lf1 N M V V1 c-I N T V V1 A MY m m RCS C c C C C C O O c C c c O C C c C C IG C'. C O O C r O c c C C rp m m m m E E E E E E E E E E E E E E E E E E E E E E E E E F F F F F F w R9 GN m m rcq "'., m m m alp m rtl m m m m m aNp )1S m m m m wr3 m. m p'tl m m m m m m m m m m m: M m mp m m m IJ 0 0 0 0 0 c J J J J J J J J •J J "7 J J Ji J =7 J J J J J J J J J ,', ' J� 5 J �J J J Ji J J J J J J .'. C G CJ 61 M L1 Lt 4J U U '4N W 4N 4,Y WJ Ck MJ Md U YJ U U U 'U 4d r.! a S.N V L+ M.Y U U W M�M1 V kd Sk Wd' M1J V V u v �I v c ar v v v a a a o pw v v v v vw v v v v o wy v v v v v v v v pan i� 0 a v w v v��� 0a'k tAi 4+M ti1 VS4ry V7 N'1. V, M rdq WY 0 WTI M1n VS Vi 0' wl VS V, V, V, A WI VS VS M1 ^ 0 VY 0 N 0 VS 'A idA OC w w w v w w _O) _w _ w w w w _w w w w w w _w w w w . w w w w ww Vw4 ue) A w w ww C C C C C C O O O O O O O O O O O O O O O O O O O O 0 0 O O O O O O O O O O O O O O O O O O O O O C C C C C v �wC ' sL.amOawvinLamOmvwv ......... �LamvOvw`........�Lamwvw Lamwaw Lamv Lamv nLamwv 'nLamwv amcvv- LaimrRutd Lama Lamaavar Laamvv L�amvv aamvv Lamvw` ammv Lamav Lamvv Lamv Lamv ......''Lamv Lamv Lamvv LFamwv LFamav LFamwa- LFsmwv LFamvwv LaFmwwv LFavwv Fawvv Fawv Favv aFwv .FaCww '..... L♦av_v- L♦awv-C LFawvC ..L♦ewai-c .LFav`c LFavvCO O O O O O O O O O 0O O O 0 0 O O O O O O O O O O O O O O O O O O O O O_ _ _C _ C__C _m O O O O O w C C C C C C C C C C C C C C C C C c C C C C c C C C c C C C C C C C C -c C LF> > > > > w w w w wv w w w w w w w w w ww w w w wwvw'wwww'wwwwww> > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Fa�m3wmw, F-F- ALFammwv L_aFamIwwSqF mm- m mm m mm.m mvc LLLF F F-LF LF- F F- F- FF F ♦- ♦- ♦- F ♦- L♦v vW w.0 . 0�OO -0 -0 rc � �aO ME v v w wO o��00 0 0 0 O 00 0 0 0 0 0 0 0 O am.4aEwy1b Y W w w t—ULLLH ai,� (Li" wM)w wvil wwwvvvw w M w v N vvw > >> Y > Y > Y Y > Y > Y > >. > Y>YY> W W W W w mvE "1.1LL iIl LL LL LL LL LL LL LL LL ll LL lL L1 I1 lL 11 I1 11 LL LL LL LL 11 LL It M O Z W E W 0) El a-1 m n ri N O m .ti N V V O O m V O n O co m m n V 00 V O m ww lO e-1 W lO N lD O 00 1� n n O O O O O N n m N 7 00 n 00 N M lD O O �--� ri N m n .--� n V1 lD Ol O N Vl m tD M n V1 N V VI r-1 M M n N 00 m lD T O O W V O Vl m m N n� Vl n m �--� N o n M lD N wwm H m m M m 00 W lD N w V m W O m N -I'c-I ri N O O lD V1 V N-T o 7 w C '... H m m M n m N m M lD wO m N Vl lD wri N R '.... m n m '... ri m V lD n H N m Ill b N m V m c-I N N m V m m 00 n a m Vl V ID Vl iri ci ri ri ri rl ri ri N ri M V Vl tiA to V} vIk to vl" V1 In VI Vl. VT V1 lfT VT 1A rn. N, lA VT in V) V} VT L1 in to V? VT 'A N, VT N N N Vl Vl^ Lf "ItA N N'',i to V? 'n Vf 'A 'A.. N N N O O O O o O o O O O O O O O O O ". O O O O ". O O O O O O O o O O O O o O O O O O OO O O O O O O O O OO O O O O O O O O O O O O O O O O O O riM t0O nmtDNM m O O N O V1 O 1 V1 n r-I N N O n V a 0o M� 00 lD 00 O N't .--I ri .--IOOOOOVl M n N V 00 a -I 00 M n m N Vl M W lo O M N Vl ID W O N V V1 n m H M� M n H N M� lO r-I N M V V1 0 lD 0 N 7 00 N 0 V ri ri N c-I r-I .-1 ri a -I ri ei ri H M M ri m lO VT V? iA L1 N 1A ✓T [A Vl iA i/}', iJ1, 1A li RA7r y}. kP"n •mM1 4M. i/1 V),,,, t/? t/}. LY. Vf ✓1...., V1 V1 1A N N'A N to t/T V) V? to iA V1 V} L}..,lA 1A V1 Y r r r r r..r r rr Y r r Y.Yrr r Y r rr Y r r r> '.,Ill r rlr M V Y V1 r 1i r N r M r V r V1 Y c-1 r N r M r V Y V1 r ri rr N M V V1 ri N M V V1 r-1 N M V Vl r^I N M V Vl a -I N M V Vl ri + N + M + + + ri ''. m m m m m m O1 m Ol m 01 m m m m m m m m m m m O1 m m m m m m m m m m m m m m m [m m m m m m O1 m Ol m m m m m ''., m m G1 m Q1 m m m m m m m Ol m M m m m m m M m Ol m m m O O O O O O O o o m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m o O O O o O 000000000000000000or-I.-I.-Ir� o o o o o o c o o o o o o o m m m m m m m m m m r- Ivavvannnnnmmm m m m m m v v v c c m m m m mmo000o m o o o o o O O O O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 '.. o 0 0 0 0 0 0 o O O .-I .� .� .-I r r Y r r r ''... V1 Vl V1 V1 Vl VI Vf Vl Vl Vl V1 '', Vl Vl Vl Vl Vl V1 Vl '., V1 VI V1 VI VI VI V1 Vf Vl VI Vl Vl Vl V) VI N Vl VI In Vl VI V1 V1 V1 V1 a u a u a u a u a u. u u u u u u u u'u u u u u u u u u u u u u'u u uu ic u u u u u u u u u u u u u u u u u u x x X x x z z z z z z z z z z z z z z z z z z z z z z z z z z z,z z z z z z z z z z z z z z z z o o o o a o 0 o o o ac ¢ s rr ¢ s cc w z� ws wac cc x� cc cc z s c z z� ''.. z w s w rc ac ac oc ac wz cr w w cc z m m m m m m mmmmmmm m,m m m m'm m m mIm m m m m m m m m m m m m m m m m m m m m m m m m m m m m m'm m m m m m m m m m m m m m m m m m m m m Im m m m m m m m m m m m v v v a v m m m m m+++++ m m m m m m m m m m m m m m m m m m m m T ri 0 r-I 0 r-I 0 r-I 0 r-I 0 v 0 v 0 g 0 v 0 v 0 I� 0 n 0 n 0 n 0 n 0 m 0 m 0 m o m o o m o 0 o o 0 0 o 0 0 0 a O1Dl o T o T o 6 6 6 O 0 o 6 o o 0 0 o o o o o o o o o o o o o 0 o 0to O O o O O,o o o oo O 0 o oo o 0 o oo o 0 o oo o oo o oo o o O a O o O 0 o O o o o 0 o o o O 0 O o o o o o ". o o o o o o O o o o o o o o o o o o o O o o o o o O O o o o o o o o o o In V1 ''.. m m In o 0 o o o N V1 Vl Vl Vl T'... n n n n n 1- 1- .-I 1- 1- m m'm m m m m m m m m m m m m m m'm m m'm m m,m m'm m m m m m m m m m'm m m m m m m m m ri m d• V) r-I N M V Vl c-I N M VI r-I N m V Vl a -I N M a ''., Vl r-I N m v V1 c-1 N m V Vl ri N M V V1 r-I N m V VI w w '.. C C C E E E E E E E E''E E E E E E E E E E E E E E E E E E E E E w E w E w E w E w E w E w w E w w E w E w E w E w E w E w ''.... w m W w m'. a w eO w W w W w hA w m' '.... w m w m w U w MO w eO w W w W w m w Im w oo, w m w m w m• w m w m w oD w eO w m w M w aO w oa.. w eO w W w as w M w oO. w M w w aO w oO w M w tO w eO w oa m m C C m C M m C m C m C m m:.'. m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m' C m C m C m C m C m C m m 2 m m 2 m 2 +p m 6 mym� ru m 2 m m 2 m 2 m 2 m 2 m 2 m 2 m 2 m 2 m 2 m 2 m 2 m 2 m 2:2 m m 2 m 2 m 2 m 2 m 2 m 2 m 2 m 2 m 2 m 2 m 2 m 2 m 2 m 2'2 m . 2 m 2 m 2 m } } T T,.. } > > l T T } > T }, > > > T } > T T > } T T } > > }. } > > .0 V w w w w w V1 V1 w w VI w w VI w w V1 w w V1 w w V1 w w V1 +.�+ YA w w V1 w w VI l w w ''... Vf w w N w w VI w w VI w w V1 w w V1 w w Vl w w VI w w V1 w w V1 w w V1 w w Vl w w VI w w V) w w VI w w VI w w Vl w w V1 w w VI w w VI w w V1 w w V1 w w V1 w w ul w w V1 w w N w w V1 w w V1 w w '.. V1 w w V1 w w V) w Vl w w V1 w w w w w w w w w w w w w w w w w w w w w w w w w w w w w '., w w a) w w w w w d 4 L L 1] 9 d L d Q L L L d L d L L Q L L L d d L L L L 1] L L L D L d L D L 9 d L o .O cccO cO ccO ccO cO ccO ccO ccO ccO cO ccO cO GcO ccO cO ccO cO ccO ccO ccO ccO cO cO ccO cO cO cO cO ccO o c cO cO cO cO ccO ccO ccO GGO ccO cO ccO ccO ccO C C O O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C O C 2) C .2 C O C O C O C O C O C O C O C O o C O C O o O O O a a a s a C C C C C C C w C C C C C C w C w C w C w C w C w C w C w C w C w C w C w C w C w "' C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w U U U U U w w > > w > w > w > w > > w > w > w > w > w > > > > > m > > > > > > > > > w > > > > > > > > > w > v > v > v > w > v > w > a > m > v > v C w C w C w C w C w a v d a m d v a v LL'a v v o v o v a v LL v LL v alo v a a v a a a o v a v o v a a o v LL v a a o a v o v 0 v o v a v o v a v a v a a a a a a a a o d o o E E E E E m m m m m''...mm m m m m m m mmm m m m m m m m m m m m m m m m m m m m m m m m m m m m m E E E E E v v w w w w v w v w w w v w L v L v L w L w L w L v L v L w L v L v L w r w L w L a L w t w L w L w L v L w L w L w L v L a L w L w L v L w L w L v>> L O O > o >. O > o L L F- H L H L H L H L H L H L H L H L H L H L H L H H H H H H H '', F- H I- H H H H f- r H H H H H H H r H H f- H H H H H Lo E7 0 (D U' w w''....w''..w w w w w'''...w w w w w w w w w w w''...w w w w w w w w w w w w w w w.....w w w'..w w w w w t!........t t tf.......� -2 -w o o o o o 0 o o 0 o o o o o 0 o o o o o o o o o o 0 o o o o o 0 o o o o o o o o o o o o a a acx n m m m 3 3 m 3 m 3 m 3 m 3 m 3 m 3 m'm 3�3 m 3 m 3w m 3 m 3 m 3 m 3 m 3 m 3 m'm 3 3 m 3 m 3 m 3 m''m 3 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 a 3 m 3 m 3 m 3: m 3: o 3 m 3 m 3 m 3 m 3 3 w o o m 0 o m 0 O m 0 o m 0 0 m w w C C w C w C w C C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C w C C x x x x x wcc Q [C ''... [C of oc of K Oe OC CN ac ''., aC d' K OC K am:7 C 2' S' K ',. K w d' w CN w K w K w 0: w OC > T T T >. > >,. } T }, >^ > T w w w w w w w w, . w w } Y >, } } w T .. > > T Y > T T } T T } T T. > M LL I1 1.1 LL T 11 M M M 11 iZ lL 11 LL M Z M M LL LL '', W W - M LL LL 11 11 11 iz LL 11 iz E l.L LL l.L 11 LL LL M 11 - - - LL lL El 0 0 0 o O O o 0 0 0 0 0 0 0 0 0 0'0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o w v o 0 o as a o o 0'.. o 0 o O 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 a o 0 o 0 a O '.. O lD 00 O O O lD a0 O N 7 0 V W N O V g O O L6 a0 O N Q o V o0 O O w o0 o 0 0 '.. l0 W O N C O V w N . O V v -T n o cn c ao n m ao v 'm In m as v n a vac a c m w a v v m ry v oo m m a Ln m oo v v m v m m rn m V m m ry m v o n er Ln m l m F m v m n v rn m n v rn m m r- m v rn m ry m v c-1 m 41' l0 -1 m a Ln l0 c-I N M V '.. Vl e-1 N M V uni N m � 111 lD '., .y.''., N M V Ln e-I m -;d- Ln to '-1 m V Lr lD rl N (Y V Ln e-i N m 4 Iq 0 0 0 0 0 0 0 0 0 0 0 0 0 0l0 0 0 0'0 0 0 0 0 0 0 Io o o 0 o 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 a o 0 0 0 0 0 0 0 e o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 MIN 0 0 0 o 0 o o 0 �l 0 o o 0 0 0 0' o 0 0 0 0''0 0 o o 0 0 o o o o 0 o o 0 0 0 0 0 0 0 0 o''o 0 0 o o oloo K'. O O O O CN CF OV a"."} V N O O O V N O O O O O O o O V N O o O O O O o O 7OOo�Oo0 q' O O O +,' '.}` ¢ip u^w Op .-I 1p N a0 rl V O O e0 V O l0 N a0 .-I O o 00 V O O No0.lpN o000 N 5C' Up,' oq� X m tYf Vl '... lCl r-I M T l!1 1p N V l0 W '-I M M Ln lD N I.., � ..., t0 , 00 N !Yf f+l Ln LD .ti M T Vl c-I N m WY Lf3 �y N M V ''., In }} T } Y c-1 N m "� ul v-N N M C � m T }} Y } < < < M1.7 < a a a LL a F F �-- s- 'A In � rn m InT} r r} 1 #'+k r+"N to r T Y ]� Y¢¢ r ¢¢¢¢¢¢ d a d d y cs.. rJ. t¢k. ¢. 4:7 CN",1 ' C�7 l�7 a s chi. a V V y a y V V V V V C� a a LL a C� '... a L. LL � D D D U U u U a a a d a r p H q aA + v n n u vv n x x x x x x x x x x x x x x x x >C >t x x x >C >C x xx xxxzxxxtx000g0000000o000000l000 rn m a m m rn m rn m m m m m m m ern ss m m m m aao'+ m m m rn m m D a, coo m m m m Q o z z z. I z z z z z z z z z z z z z z..z z z z z z = = rr = = s z = s = ce x re yam w s = = `Im m` m``m m`m `m `m `m `m aJ aJa2aJ aJ `m `m na `m `m v v v v v a -I N m V Vl N M V M £ O O 'O '-I N m V In J J 7 7 J J J 7 7 7 Y Y Y } } C] O O 4 d a a: a a:m m m m m iY d d N M V C7 Gu p a ti N m v �. O Q 0 O 2a U u U U u '' U U U u U " m m `m m m 7 j�� O 2 O N v m v N 3 Ca O K'7 >>>> j v G) " v ,u (p °D .O O. C C C C C C C C C } Y} Y} C C C C d d d d C } T r Y T ° m v v m w w m m m 0n`. ra... a a%a.` wa. r r .� N m v rn E m m a.: E E E E E E E E E E E E E ''' E E ....E E E E E E E E E ¢ ¢ ¢ ¢ ¢ .. V V V V V C m Mo m m m Z) 7 Z) Z) 7 Z>» » C C C C C C C C C C N m 4 4is O O O O m ar7. m N m > > > > > > > > > > .- .- - O O O O } %* Y Y Y C C C C C C C C C C O O O O O O O O O O m m m m fa m m m m m E E E '.... E E '� N m v `n v v v v v v v v v v C7 0 l9 l7 U l7 l9 l7 L7 (D,,. a a a a a a a a a 3 0 l7 l7 E E E E E E E E E E t r- E c ''. c c 7 7 J 7 7 J J 7 7 J ``` C C ``` i ` O C7 q Sa. ti> G7 43 O U CS {A O i7 £5 O O Gb i} O O O 'C5 CV >.. o a a a 5 i1 Q. a Ni o, a s O.. o O. o o o o R° o a CL > > > > > > > > > > C1 Or LY, q O. Ck. Ct, CL wrL d'.t. CYO C& O. CL 91 Cl' CL O, 0. CL CL Ca. CL rL O O O O O io m m io io io io m m io O O O O O O O O O O J J 7 7 7 7 7 J 7 7 7 J J J J a J 7 7 a a J J 7 l7 l7 t7 l7 C7 a a a a a a a a a a C7 U 0 LO U U 0 0 C7 l7 wn an m : va Lrs en an m rn Ln vn a�-y a1 wA LAl v, vu bn va. 0 m rn 0 0 0 0 0 0 0 o 0 o 0 0 o O o o O o 0 0 010 o 0 0 0 0��� �'� � '" � '0 � 0 0, 0 0 0 o O o 0 0 0 o 0 0 0 0 ao 0 0 0 0 0 0 0 0 o 4 O' C C' a `°' % �+ # m m...m m m m m m m m m m m.m m'm m m m m m m m m cL ° CL cL ra ° ca Ca a Ct a ax, za cL to ca Lx CL aa. � x x x x x x x x x x x x x x x x x x x x x x x xc a 4 CL CL O. Cl CL CL M Ck CL a Ca ffi O G& Ct O. CL CL u C. CL CL Ca c c c c c c c c .'� 7 a J J J J 7 J J 7 a J J C C C C C L G G C C G G G C G L C G G G G G G 0 0 0 4n 0 0 0 0 0 0 +Y4 0 0 0 Vl TWA Wry J7 x%Y CP1 MN rt,3 Ma. N N_ 0 0 0.0 0 00 0 00'0 0 0 0 0 0 0 0 0 0 0 0 0 0 o m m m m m m m m m'm m m mm m m m m'.m m m m m m 0 0 0.o 0 0'0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0.3 3 3 3 3 3 3 3 3 3 3 3 �� 3 3 3 3 3 m 3 3 3 3 3 m m m m m m m m m m m m m m m m m m m m m m m m m v v v v v v v v v v X X X X X X X X X X X X x'. X X X X X X X X X X X X C C C C C C C C C C C C C C C C C C C C C C C C v v v v M. W. W. W. W. W. W. v X. W. v W. m v v v v v v v i'lli"a LiH v vvvvvav v v vvr} >}> >> r a r Ya rus axu w us a.ca 'u.a L4r l � axa'•. w w - - ur w.� i,�a u,axn iao w w v I a �1 aWvtlY &i LL ul.. LL. LL LL .` kL. W. LL ux.. L¢.. X 11.. .LL LL LL 4Y'. ni i% El m ww 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 M m O o 0 0 C N 0 W w C W C m w w m N O o 0 0 0 0 0 W C O O o 0 0 0 0 0 N lO O O O N w '.. O O O N w O w w O O O N C M 0 N C to T O w N W ri m O O w W O Il O C w W o o w W O W w Vl m N W w N m N W w m M N N m O O W- c-I r-I w I- w W w Vl c-I M W N m W m N w N W W C w C W I- w w C m m a-1 m C m M N m C m m a-F m C C c-I H 'n O o 0 N o c-I Il m C O N N 1l m N I� e-I m m In C In IZ C N l/1 al m w oo c-I m '... m w W' M m w W c-1 T to lfl m rr In Vl ry w I, al C In N O c O ry w o r-I T C:, Ill N ry M n m Vl .--1 AI , C V1 <D ' r-1' r-I r-I l0 tD rl '-I o ao C In O 1p ld O R7 V m LD c-I '-I N O o CI N O m... O. c-1 N In Ill ei rl N N m C C N m C oo m C N N m C rl N m C In VY ill M, V? N lf) QA In In i/1 ih In N if . V Nn In In i/T''... Vn in 'A jl 1/l 'A In ih. N VT N N In N. Vl In In Vl 1n Vl Vl Vl ,I, N., 4A N Vl o o '. 0 0 0 O O O OHO 0 0 0 0 O O O o .. 0 0 0 0 0 '.. 0 O. O. O C o O O 0 o O o o O O o o 0 o o o 0 O O o o 0 0 0 0 0 o o 0 0 0 o o 0 o'o 0 00 0 0 ojo 0 0 0 0 0 0 o O o o o o o o 0 0 0 0 o o O O O o o O O o o o O O o O O O O In In O o o O N w O V W N C N al W W I� w 0 0 0 0 0 0 0 C N 0 0 0 0 0 0 0 o w W o 0 o w o a w W o rn m o o o w 1 o m n v n rn v m n m m o o W v o o o rl C C O o0 C o C W M'....N w C W M C'.W M N w M M O O C'.n T C W. C W w w In al oq cq W Fj n C o...0 W'N C In w w N V w 00 '....--1 c-I r1 c-I V V ll m m N m N w m '-I.:. w Ln m V m Ill r m �--I m w r� l0' ... M M w W N m m lfl m rl r-I N m C Ill N N m C N m C 4A In Vl Vl Vf in t/}.an Vl iA t/f Iq V? llY to In In Vf in 1n In V} N V1'...V? V} to'A 1n 14n Vl:N M �, iA In N,. to to 4n '...Vl ul VI... V} IA ul in Vl in yrryr m C IA y}}} y N M C Ill a a a a a �y N M C In CL a a a a a a a '.. a a a d a d a a Y}} y y } a a a a a a a a a a a a a as r}} r N N N N N N N N N.N,.} Y}}} l7 a a a a a l7 (7 U' l7 C7 l.7 C7 (7 (7 (7 m 2 r Y Y r Y Y r} Y Y ,}i N m v I}il ,y N m a In In W In vl In Q Q Q Q Q F- '.,. � vl In In en In 2 ti ry m C In .� ry m C vl ti ry m C j 7 7 7 7 7 7 (7 (7 C7 (7 C7 a a a a a 7 7 7 7 7 X x (7 Q 0 (7 (7 a a a a a J J J ''.., 3 3 g a a a a a a a a a a a a a a a X X x x X X X X X X X >< X X X X X X X X X x 2 0 0 0 0 U U V U U U U a a a a a a a a a a 7 7 7 7 c000000cDc3000000�oo 23oo xo0xzx>�xxxx>�zxXxX>�XxxIxXI>M 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 000 al m m m rn m m m m o 0 0 0 0 0 0 o o o o o 0 o o 0 0 o oo'.o o oZ z''z z z z d a d d d a a a a...o_ o_ d o_ d do o -u o 0 0 0 0 000000000000 o 000a s> C v a a v v v v v C a C v v v v v v v a.W W O X o a Q W X o w ¢ Q', W O w m X O Q o O v o C u O 2 a ,I° m ai E a 'a c uo o E a m u o u E w C j w C UO w w E C C � u w m E 2 m c w > c ry : > C w U w w to u o - w w O d N � ccO w w w w w m m m m m m m m m m m m m m m-o O C } r r Y r w w w w w w w w w '.. w w w w w w O O C M C M Y Y r Y Y}} r}} Y Y ',, Y}} C O > C. ` > w m m m m m a a n a a w w w w w a: a a: a n. d d d d d o a `1 }}}}} > > > > >' > > > > >' C N M C V1 w 0 0 0 O O O O O O O O O 0 0 O O O O o O `1 L `1 jQ 7 7 7 7 as a` a a H L a)n a a a a w w w w w In n`. a a a a Q a¢¢ Q..d v H L >>>> y r r} Y N to to N N to to ` 1 ` 7 7 7 '.., j j j U U U u u ''... m m io m m 7 7 7 7 7 y v y m ra `m m m o 0 0 0 0 •--� N m C m >> >I> > a a a a a> >........> >> o m m m m m >>>> 0 0 0 0 0 o L w w w w w o o o o o`_ >>>>> w w w C C C C C C U. (7 (J (� O O O O O oc (7 oo (� o- C O L} Y Y} Y }}}} w w w w w w O .--I N M C N a a d a a a a a a a . N m C E E E E E E o o a o o E E E E E o o 0 o o v¢ a a a¢ a a a¢ QY -In n v m E E E E E E a a a a Q 7 J 7 7 7 Fn In N N Fn u u U U u u U U U U :_ ._ m m m m w 7 7 7 7 C C C C' C 7 7 z) 7 7 o C w' O O O O O w w w w w w w w w w w>>>>> > } Y Y Y > > > > > > > > > > > > > > > > m i > C C C C C C C C C C C C C C o o O O O O o O o O O O O O o o w w w w w w w w w a a C w w a a a a -I N m In w w w w (q (g (7 Q (o (q Q (7 0 0 (9 a a a a a 0 (7 () Q)0 n w E E E E E E E E E E E E E E E E E E E E E E E E a• t t' t t' j- L }' '"f t' t' t' t' t t t t' t' 'J N ` w E E E E E E E E E E 7 7 7 7 7 7 7 7 7 J E E E E `o o o o o o o o o o o o o o o o `o `o o o o Z u m w w w w w w w w w w c c c c c c c c c w w w w a a.. a a n n n a a a n a. a�. a a a a a n. n a w w c c>>>>>>>>>>- > > > > a a a a n a a Cl Cl''.. Cl', Cl Cl n a a a'. a n m In to o o o o o o o o o o '� m fO o o c o 7 J 7 7 7 7 7 7 7 7 7 7 7 7 7 7 J 7 an vl an an In In of an N In an an In an In In Fn In w u Cl a. (7 (7 (7 (7 (7 (7 (7 C7 (7 (7 a a d a a a a a a a C7 (7 (7 C7 o o 0 0 o 0 0 0 0 o 0 o O o o o C o o o 0 c c a" t t tf tf t t t tf t tf t t t t t t t r t t tf tf t o o'o 0 0 0 o 0 0 o o o o o o o 0 0 0 0 o m m `o o o o o o o o o o o 0 0 0 0 0 o o o `o o o c o m m al o m al rn m rn rn al al al al m al al al al al al o a a a a a a a a a a n. a a. a. a a. a n. a. a s n. a s a a o 0 a. a. a a a n a a a a cal a a. a s a. a a, a: cx a o. a a:. X X XC X X x xc x xc Cx xc cx cX cx cX cx cx cxc xc cX cxc a a C o 7 7 7 7 7 J 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 J 2 2 C 2 2 2 L� C C G G C G C C C G c C L Q a W W n n n n n n n n n In In N n N n n N N n n n n n n v w w m m w w w w w m w a w w o o x 0 0 0 0 0 0 0 o o o o o o o o o o o o o o o o o m m m m m o o m m -a -a -o m-D o o x c 0 0 0 0 0 0 o o 0 o o o 0 o o 0 o o 0 o o 0 0 3 3 3 3 3 3 m m m m m E 2 2 a c C C C C C C C C C C C C C C C C C C C C C C C C W W J W W W W W W W W W W W W W W W W W W W W W W W W C C C C C C - w) !>D W CO mi oo �' m w) P10 W W w X X a U X X X X X X X X X X x X X X X X X X X X X X X X n a a a a a a. n a a a n n rr aw' awC 2 aw'. 7 7 7 a a 7 7 7 7 7 7 7 7 7 7 7 w am 2 2 2 2 2 2 2 2 w w w w w w w w w w w w w w w w w w w w l w w w w w w w w w w w w w w w w w w w w w w > > > > > > > > >� > > u > Y >. >.. > > >',. >� > >. > > > > > > > > > > > > > >�, > > >� > > > >. >� > > >... w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w v w w w w v w w w w a w w w w a 11 FI,. LL LL 11 11 LL Il LL 11 LL ll LL 11 11 i.F. LL LL 11 11 LL w Il 11 11 ll 11 11 LL Il LL IL jr 11 11 LL 11 11 11 17 11 11 LL LL LL I.F. LL El oq u*1 lA m N l0 Ol i^9 o C7' Cb C] o o CC o o 00 lD w I;t W m 11 N oo �...m l0 l0 4XM1 d'�d m lD lD W tl�Y w-tl ar^a r•-1 O n O wCk l0 4'�F Ln N CO 7 l0 N lb .-I llt O O nri a' O S:.b " e4 O Vl r-I 00 °eF' r ID i°« afl r\ O lD N N m pXa wa n N O w a/1 w r*# N of o ¢+1 N 8 z m +.# C9t Ifb c^P, m P3 N T am RJY N t0 Cle ¢d"Y 4%7 MAY N n Yin mr~« OV 4Xa O m SP5 m V ¢Y9 afa 4CY ^3Yi 4 rn O A-w o ,�z rn m ua N V m C'r N O r*tt O r .-+ ,-e N r` ¢a', N r. ri rM a.!] un Qr m o ,-a ,� 0 m tara ^«r +d3 TT •a N wn oo 'q•' C7 N *a' o0 i N rA u p ma N r eT Td sy O ry e wM O N ¢$r 0 m wx ¢n r` TT' n 1- a s Xa rw n-% oo m m n O G4 IZ4 we r` O m N mi n rrp raa rri 47 n"r" e+u aro 'sr u^i wAa" v ri li r`~ m w�` w-d - r*¢ d t7 ^.F ry Gn Ca 10 �i r.Y'p �-i '..... we` mrc tii� r+Y ee',F � m'i cCi r+.r: r»i w'M wi qti ' � e•+u �' ap an ,-+• m r.. .-e N N 1Ca oo N m ue¢a r N m nt wn N N m 17 wti N' m wa oo � m r*i �m A 'A -.4 era era n n n vw v>, rw rM n v+ rrw +aa m a r Vr %^ +A ran n we n a ro- aro yr n r a yr rra an r 'n c 4A w, lj* ,ln'.n oroaaca 000aaaroaooa, 000locoaoorOal IoRo 0 Ooo0ca A ocoOx rcricr ao o c rta m ca Ln q 9 as ua z rw m ad oo r rs m ax o0 N cr r m r N u 1.6 m m co rra m a a r. m co) o oo v 0 o ry �GGqq r as � cc �t cr sr y v m m r m't an oo a r.¢:i MPa Cld C+w N q^ O Cd v oR oq rA P, a) zq tR co r-r� 'T O V ✓ r`Kt' aY'1 aq FFa fl n+ r\ ure w.T kra rw Tit N [F r` T 41 N CI m Cr7 Cfi srt; 4`w. 9°i*w ¢tl9 ¢� CF¢ xWi r+t W n N,9 a^�W $',' m ', o an N Do '✓ "' 'f.T' Wb Ka' ¢Yb ' 0riC C"^ V51 wM. N fn"li 4dri G"� mti i"W rM9 "."I° ¢R, c-1 TN N m '<'S m^1 m M P+« C'9tl 4#'4 'Wy C�' ...�a '� 9"^�C eM m^M i 211,000001 } } } } } & d a a d a a a a a a a a } } } y.. p... a a a a N 0. N n N N a a a wy N m V m .-I N M V Ln '-I N N N N N N N N N N l7 l7 l7 'd.7 R..F" a a a a CL �--I N m V l!1 cc cc cc N m 'CY u.M'L N N N J } } } } > u u u a.J Q ¢ ¢ Q vVi vVi vVi U u V u U u a a a a a a... a ¢.. a a 7 V U n 7 7 ;7. �.. a a a a y V C. C7 U a a a d a U v4 to vT Yn tq X x X x x X X X x X X X X X X �S X 7 X X x X X X X X X X 7C. 7C X X x x X X X X '.. x X X X SAC X X X x X O o 0 88 O o O O o O O o O O 0 O C7 0 0 0 O O O o o O O O o O o o O O o O O O iq O av r rvc3vovavavaaravCV at OrRt OOt .......... ca o 0 0 0 00 0o ao ar 09 oo aeo 0o m as as m m ao po 0o m m oo m ao 00 0o m m ao oo am as � m o0 w m o0 w m w w w roS i aZy a�oa`rooaoaaoz��,zzzzzzzzzzz'zzzzzzzzzzzzzzc daaddacLaaacLca o _ }}}}} v v v v v � N m v � '. v v v v v v v v v v a a a a a a a a a a H N m a Yn o La p p p H N m a n a s cx ca Ta > Z` 2 afOi a10i afOi a�i ar6i p O > > 3 3 ar0i aTQi a�i ar0i ar0i eva p C7 _ o [s } } Tea ii.......' is C p a o a d d d d d r•-I N m V In Ll`*. ia. y,L d 1 .--I N m 7 m d.•: !a. C,. { RY.. d5.. CA, [L A 't k C1.. d d a* ' '- a ,• >^ a Q Q Q Q Q Q Q Q Q Q '" ^" G +'' vi Tn Yn Tn Yn Tn Yn Yn in Yn Q ¢ Q Q Q in Yn Tn ,q p Ca U U U u V U U U U V O p Cv af0i api w ar0i a�i >>> 7>>>>>>> m m m m m>>> a a aiaa N C C C c C c C C C }}}}} o 0 0 o O o o p wv vv d C c c C C l7 V. l7 Ur (7 p o 0 o O (� l7 l7 } ., .. a '...... . w w v v v �. s�, �`. p`.. �„ .� N m a Yn v v w v v v v m v Tu n e% ci a aa` E E E E E E E E E E E E E E E E'E E E E E E E E E E E E E E o 0 0 o o E E E E E o 0 0 m V1 N VI VI E E E E E E C C C C, C C C C C C 7 7 7 7 v v v > v v v v v v v v U a.J '... u U U C C C C C C C C C C C O O O O O O' O O O O - ro L O O O O O O O O O 0 0 O O O O m ra O O O v v E a v v t V l7 U C7 l7 l7 C7 l7'U a a a a a a a a a a l7 C7 17 C7 V.(7'V V U'l7 l7 l7 l7 l7 V a a a a a.Q V' l7 c c c c c 'C t: C 'C 't "C :° t � t t". to C 'C �4 tm t „t t V � 'V tm t. t: W tw t t: t tr � '�'. o a a a a a s ra o o a a e� p a o a o a 4 a a 4 p , o a a o p a o o o p 0 v v v v v v ... a, a a. ca a. a. a. CL o. & a, a a, a a a. a Q. a. a ea oa" ca �ea a. a, cs, T:a ct a a., a. a+. a > > > > > > ra as a� as a a a a ca aa, p a a. a. a. ca a a. M a a. a c a a a. a ¢a � p ca a. ca. a. a ra a a a a. o o o o o o a 7 a a a a a a a 7 7 a a a 7 a a 7 a 7 a a a� a a a 7 a a a 7 7 a a a 7 a 7 a 'V (7 C� (7 l7 (7 T,ra wra v9 Trr rrs •ua Yn an arw arl TAe r+°w rn an Mra va vw are va va ti an u wrn (,I w+a T o o ¢n re o o wl1 c In uYr ¢n vw va � va o 0 0 0 0 0 0 0 0 0 0 0 0 0l0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 a s a o a a a 0 0 0 0 0 0 0,0 00 0 0 0 0 0 0'0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 T -;t -t v.4 a 't v v v v 9 c v c v v v 0 0 0 0 -:I- -;I- v c -t a a v v a v 't a a 't ;t 'T ;t v v v ;tas a ra o: oo ww ww w w ww w ww 'oo 'oo as w w ww wm ww w w w m w ww 'oo w w w w w w 00 00 00 0o ao 00 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x X x'x x x x x x x x x x 0 0 0 0 0 0 0cxo 0 0 0 I.x0 0 na ro a m o mj l �u m m m m o a n m m y 6' L dr is 'L Q d w w w w .... v c'3 � 3 3 i 3 3 3 3 3 aj 3 3 3 3 3 3 3 3 N of AP v w rar v ru T7k W W N v v v W W v v v rIN 0.¢ v v v v Ta Ka a. La a.. 4a, a. Ca " r✓ra a,. e z z me az z z z cc v oc r z z z z s s re r e z r m, ¢#, ttb, ¢1.. ¢a.. T 91 Z kA. a- LL ia. � &4. 161151 &� I i�W � na. � ¢e.. � dL• � a� a 11 � LL � S.L � %IL 1 4'L. fl Y11. LL q 1W. II ty � IJ4 14R. � Rk. i TA. El 00 to LA 'Tm C 00 m� 00 m lD m e-1 N m In N V LD m V o O n w LA m O m O m n V m 1- NN m m M ;ro m w m Ln ci 1, lD lD m m o .--I n N V .--I m In V m O w M M LD N n m rl N V m V n Vl n M m N LA m I� N 1� lfl m N m L--I m m m 00 O m LD M 1, m N m O N N m n V a --I � m '-I N V N o w N o m n c-I m m w n m w m LA N t m m m w N V N m V m m Ln Ln o r m ;I. V m N w O M 1, O m w m w m c-I V N o r m N V n n m m C Lo m c-I N m o w c-I N m V m o lD m Vf VT VT''... ll .lf} In t/} V} L} L! U} Q). Vl V1 iA Ln L? 'n iA +A Vf In t/Y in iA V/ t'f iA aA in /1 In M? N. Vn 'n 'n to V1 to '...VY L} VT....'n 1/Y 'A. 4/} VT 'A o 0 0 0 0 o o 0 0 0 0 0 0 u 0 0 0 0 a o 0 0 0'0 0- 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 25 0 0 0 0 0 0 0 0 o v N o o o v y o 0 0 oo Ln o o y o 0 0 0 0 0 o o n o n o o n n o o m ry Ln .. ao a o In m N 1, m m N V O m lD w't m w N I, m N O O �'-� m N Ln o n O N L--I N LD Lfl V L, V Ln .-ID 0o I� O fn m m m o N lD N n Ln O V w m a m H Ln m m 1, m N w m lD 00 O M N m o m rl N T Ln I, m a M ;rw r, �'-� N M Ln w I, oo N O 'ID t4 4/} V} to V) Lf iA ✓1 V} In {A 4A. In In 1A,.'A 14 VT lA V)•.... N- 4/Y'A. Vf VY to V N } } } } } } } } y > } } } } y } } } } } } } y } } y y y } } } } } } } } } } } } } y } y } CL L1 rI N m 7 LA �--� N m Vl e-I N M V LA r-I N m 'Tf M V Ln c-I N CL Ll d m m m m LT m m m m m m '... m m cn Ol m m O1 m m m m 0) m m m m. m m m m cn m m m cn m m 01 LT m m mm m N N m m m m m m m m m m m 'm m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m 0) m m L7 (D T a m V m m m m m m m of m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m u o o 0 o 0 o o LA Ln 0 o o H .1 H ,� .� a a v v v m m m m m m m m m m m m m m m v v a v a m m m m m >> 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 V 7 ww cGou oucCC ccGououccC 0uccC 0ccC 0ccC 0ccC cG ccC ccG ccC ccGo Gocc cG ccGo CCGo i ccGo occS '. occC o0ccC 0ccGo ccG00 "'.. o0ccG ccG0 ccGoN 0ccC occG oGc 0ccG occGa ovccG ovccG 0vccG 0 2 Z u u u u u u u u u u u u u uu u u u u u v rvccG ccGo VCCC CCC Gocc mccG mCCC m0 mccG mcco0 0 o o a o 000 0 x z u u u u u u A NIn LUuUUuUUUUUUUuUUUUuuUUUUuUUUUUUUU6666 0 G '.. m C w E o 0 n w 0 a 7 0 u C O C w `1 L1 m m m m m m m m m m m m m m m m m m m m m v m m m m m m m m m m m m m m m m m m m m L m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m v c a v v m m m m m � m m m m m m m m m m m m m m m m m m m m m m m m m N v? v v v m m m m m o 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 v c v a cm m m m m o o o 0 o o 0 0 o 0 0 0 o o o o o o o o o o o o 0 0 o 0 o o o o o o o 0 o 0 o o o o o 0 o o o o o o o o o o o 0 0 o o 0 o o 0 o o o o o o o 0 0 o 0 0 o m m o c o 0 0 0 0 0 0 0 o 0 0 0 0 0 0 0 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 m m 0 o Ln Ln Ln Ln In C Ln M N Ln Lfl 1- 1- 1- 1 i 1 i N N N N N Ln T Ln f f n n n n n r`o r`a m` `m r`o ro `m m m `m `m m `m m `m r`a r`o `m r`o Lo o r r} y r r r> r r r r}>} r>> r r}} r r r r}}} r}}> r r} r r}} r r}}} M v Ln ry ro v Ln N m N M v Ln .1 N M a Ln M v M N m v m N m v Ln N m a m J a a a a a a a a a a a a a a a a la a s a a a a a a a a a a a a a a a a a a a a a a a a a a w Lp C w o o..o 0 0 0 0 0 0 0 0 0 0 0 .0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 >» E u u'u u u u u u u'u uuuu -2 u -2-2-0 u u u u'u u u u u u u u u u u u u u u u u u u u u u w H V Co', C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C 7 7 d C w w w w aJ w w w w w w w w w w w w w w w w w aJ w w w w w w w w w w w w w w w w w w w w w w a s E E E E E E'E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E >> y c w w w w w w w w w.. w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w Y Y C CQ CD 00 CO. C0 CO. to tw w Co Co Co Co w Co Co 00 Co w C0 0o Co w m w Co w CO Co. bd Co 0o Co CO 0o Co w Co m w w Co be Co Uo... m m m m m m m m m m' m m m m m m m m m m m m m m m m m m m m O O CO ,+_>' C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C >> w > ,>. l Y l > > > > w Ln Y Y a+ ♦+ -- ++ Y a� �+ ++ i+ ++ �+ i+ ++ i+ :t �+ �+ Y Y ++ Y �+ Y i_ i+ i+ at o O (g (D u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u O o O LO w w w w w w w w w w w w w w w w w w w w w w w w w. w w w w w w w w w w w w w w w w w' w w w to ✓1 Ln N to to V1 VI to to VI VI V1 N to ✓1 N V1 to V1 LA Ln N Ln to LA VI Ln to m m to N N LA Ln to VI N N !n LA In to to N N^ 2 w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w 7 7 d 4 U L d d L L d L .fl L L d d L L L l7 d d L L L d L L L L L L L L L d d 4 L d L d L d L L 9 >> u O O O o O O O O O O O O O o O o 0 0 o O O O O O o O o O o O O o o O O O O O O o o O O O O o o a > a 0C 0C 0C 0C 0C 0C 0C 0C 0C 0C 0C 0C 0C oC aC oC 0C 0C 0C 0C 0C 0C 0C 0C 0C 0C 0C 0C 0 a a o 000000000 am C a C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C 7 J w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w Ln Ln C m > > > > > > > > > > > > > > > > > > > > > > > > >. > > > > > > > > > > > > > > > > > > > > O O ,C v c m L a a a a a a a Li a Li a a a a o_ a a a a a o_ d a c h a a a a a a a o_ a a a a a a a a a a Li a x X....� „ m m. m m m mmm m m m m m m m m m m m m m mmm m m m m m m m m m m m m m m m m m m m c cc G G w L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L w Lv 3° r H H H H H H H F r H H H H r H H H r H H H r w H H r H H H H Fww H r- F r- F- r t- a a w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w a a c m o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o a ojo 0 0 w w w w w w w w w w w w w w w w w w Im w w' wL.L LL LL LL m LL 11 LZ w LL LZm z E M LL. LL E LL 11 11 11 Z LZ w w LL M E M LL LL LZ LT a: LTL.L LZ LL LZ LL m LT M 11 LZ El V'm m 01 m m N ' O m m V m m 0 N,V'.w m'.O V m r-1 Vl mm IDm •-1 lfl V1 m m N m ', m m O n cf N O O m n m M n In V c-I m 0 7 N n m 0 N M l!1 n ci N N M� N O V m m ci An ',. n c-I t•-a m m O n tY rl N ti ti o An v m m m m m v .! m n w m m m M o M m m m N n m o O N m m n N m m m 7 �--� ' �--� N .--� N N m m v v An 0 0 0 0 o o 0 00 0 a! 0 0 0 0 0 0 0 0 0 o a N o 0 o a N o 0 0 0 0 ca o 0 0 0 0 0 N R N m R N n m O m OR N RkY Cr',y l0 N 00 ri N M V N m N m N Vl m O M Ok n m m Ol Vi c-1 rl N V 01 N +^R m^rc G3 P�+ n l0 m, M1TA V1 In O M 06 Y*Y Wig R'I" r, ' 01 N m km ID ati .-i N '"+i N M1LU re-1 n 'cfi O dm N w 10 l,0 m O 000 Vl o ti al l14 m0 In n rl! ID O In 01 C 0000 N n - WO l!1 wW In O zt '... Vl n M Ol c-1 Ol 7 m n O-;f '... n O a n- T m In r oo N m m O'n V 00'm O V N m e-I '.m O V 01 m n N m 0 m Ol n m An N N O of N M -! o Cl n m r n fV m M 00 Z 01 In O m .--1 m N m m m lfl .i m N r, O1 O M m m V� .., m, n m' 0) O H N M. I. V1 00 O_ m m n n m m H N N N m kiln m n m Ol O N m,T Vl',,m,n.N m''.,m m ©I©IDIDIDIDI©I�DIDI©DI©'�!!�'f[6'f[►�. 0 0 0 0 0 0 0 0 0 0 o O 0o v o � o to N m ITm O n a M'm lla ai a0 ti V n O n m -CT0 N m m m, m 0 N N u7f_171i rL"-A MvR.. } } } } ti N M Y Y } T } Ol O1 Ol 09 .--I N M V V7 O 01 tT OM Ll d tL d CL CL O_ d d d CL d tL O_ ay d 0 0 0 o O 0 0 0 0 0 a 000OOo00.....>`-'r.1.--A.-1.-1.,-�.�.-1.-�.�,�,�.-�.�r O O O O O O O O O '. e-I O O 0 O O U U U 4.Y0 m o ❑ ❑ ❑ ❑ ❑8 ❑ 0 ❑ ❑ ❑ ❑ ❑ ❑ ❑ O o 0 0 0 m m a m m T m cr za m m m m ❑ T g m J m In In 111 m 1? e19 an CP Im n In J1 In vl m c5 u euc euc u �ec �ec r� o w n a a-c C G G c C W Y W Y w W W JJ3. 41d W AAA W W W W W W Sc ]G Y Y Y, Y, Y ]4 le Y le Y Y W 2 VI Vf vl v1 U U U U Ne f Y O In o m O M1n O An O liI O In O 111 O Y N n N m M er ¢,n n m m n n m ti u'u'u u u'z Z z a- ¢ ¢ ¢ 4' ei ¢ ¢,a m ¢,¢ 0'0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o O O o 0 0 0 0 o O V m..m O fV V m m O N',V- m m o N.O 7 V m m ''... M In m n m m O N m V V1 m m m In w N m An v m N N- o am m n m In M o1 m m m V 0 6 to I --I n M M Ill o m N m V '-1 m M V 010,0 0 0 0 m v m N V m 0 M In m- m m m. M m m V N V Ln m n m C li In m n m C m m m '-I c-1 rl e4 r-I c-1 N a--1 N ,rL.a �,®®®©ion©i©i©®�ni%mm�i%nieni�n N 14 N N N N N N N N N N N N N> M >�. M 0 0d'oddd❑❑rzoddt ^' m6 mmrcr mm mmmmmm'mm mm❑ca0 J m m m n In J1 ax J r m y m ua o_ a a am m '.... cs.. a a�, o_ m W w w v- w W ts. W Y Y Y Y Y Y Y Y le W Y O ae] O VI O m o m O m w is O In O. Y O m m v a In In m' �, ua n n m r1 Ni aa'u rtn d ci d d ri d a d d a d d d dew d ci d< ¢� a � aim a 0 0 00 00 00 + + + + + 0 o o 0 o o o''..o o o > > Y > 00000. N m v 0 0 0 0 0-0-0-0-0 o 0 0 0 W N. W w u u u V E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E } > r } T E J E J J J J J J J J J J J J J J J E J E J J J J J J J J J J J J J J J E J E J .-I N m a N''' C C C C C C C C C C C C C C C C C C J C J C C C C C C C C C '.. C C C C C C J C J C E E E E —° m m m m m m m m m m m m m m m c O m m m m m m o m m m .� m •� .� 0 0 0 0 o a a O a c a a o o a a a a a a a a a a a° a a a a a a a a a a ao a a a a w, m roa C 0 C'. C..' } K C K K K tr K K K K m K K K K ' K m K K C C OC K C ' cC C m m m m ti i70 } } } Y } } T } } } } > } } } K N C > } } Y } } > } } } > } } } } K > o_ } w w w, N N N N N N N N N N N N N N N > M } M ~ V.0 GJ� M1a 'hA� hF a c.A LN tl•5 �Lw 4A'� C4 4Y 0.b 0.J N Ad N 8J NA M1d l.0 L 4Y M15 hA aA a,d U U U U 4,.M m U m dJ roar rAt am rap Oq .� >' '—>' al'i N w " wwn ,-m S wai w w uaw ' ' w w. . ,� aau w w , r w w N w w ' N u' , m m ro ro m, C t oo. C C V uu U V c "' w A"w�:, W 4C.V 9CJ m W pCJ ar aCa N W N mCd CCJ C 75 4 ,%" c. g g g g v n w> > w w oA a w w ms w w w w w w w o e w w N N v> > a w w w w a w wI w w w a a>> a w w w w w w w a w w w w w w w w Y +Sq Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y w Y w Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y 'a Y Y m Y O '... m O N O to o u7 O ul o m ''., o In O Y ]e O Vl O to O In o VI Lm U r.A U 43 U � � � eL mlOD l�0 On � y U Y u V U u U u u tit U u u U u u u u V U u u u u u u u V U U u u U u u u u Y u C C C C w w w w w w w w w w '... w w w w w O o O O w w OJ U1 w v w w w w v w w w w w w w U1 w w w w w w w w w OJ w w w w w w N w w w w n 9 ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ O ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ O O O O O C C C C w w ww.. w w w w w w w w w w w w w w w w w w w w w w w w „� >>>> m 'mmm m m m m to m m m o m m m m m m m m m m m o m '', m m to m m m ',. m m m m m m ,. m m m m m m m m m m m m m m m m m m m m m m m '... m m m m m m m m m m m m m m m m m m m 0 0 0 0 o a''E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E,E E E E E E E E E E 0 o o 0 �,2 0 0 0 0 0 0 Nil 0 O O O O' O �O O O �O 0 0 0 O'. O —O O O'. O —O O O O O w w w w w v v > > > > > L L L L IC f0 fO ID f0 1a fJ N fO Ip IO fo IO fO m N fU N f0 IO f0 f0 10 f0 IO IO (6 f0 f0 fO f0 fp IC f0 f0 IO f0 fO fo m...v m v v H- d a a L a a..a a'a a a a a.......a...a a a a a a a a.........a.......a d d d d 1 d d 1 d d a.........a a s a'a d d d d CL w w w umm" V V a 'u' vt aah wf a✓q an M 1n Wp 41 Sn � sx "u a.v an r;r r u u "w'� +mu a "a" is r:r a u' u w �u aA r ua a a ''u u u 'r6 'v wami v v v coo 0 oo cco a •a. a• �'a. > a.1 a a-, � - a°. •a° a. L L L L L C < G m t0 Yo, ah aSt aro t0 m m am za aid °Ip N fo Jv ad', m R'4 RJ ao m aU arcs 19 m m aro a5u aNb' as{ m 1 m an ail m m m . F- — — C C C C L C C. C c C C, C C C C, C C C: C C b o„" C C C C 'C C 0: C C C C a a C C. C .o is m m io is r>a is m m, r-a r5l m m is io m is io 'mM m ie PCI m is m m m m m is m mm re m 4; mro io m w w w w a v v v v al w E M v a v w v w v as w �a ar v` a v v v a Ea Ea yw aaar v v m 2 s rc Al H a a� wz 1- w a w l F _- e w r r O O O O O C C C C w R4N w L L L .G: -iC L .C', L' .G .0 .G L L L .0 Ill W N`1 W y1 I `1 yl �l yl � `1 { ll v� `1 � `/ � `1 M w..I W� W w� w� TM of � 01 � w II w l w u w W I W w '.., � � w 101 of j a I w l w w w II w I l I w wd w.. w I w �WlW I WILLIWIW�W�W�WmLL LL.ILLNWNWaw�WIWaWIwIW.I! ILLIWNWIIwIWIWNwIWIIWIIWIIWIIIWIILLI -Li I -Li IWI IWIILLIIIwILL It M d' ti O Z W E 0) El m 00 O w N co -;I" O w N 00 V O w O V a w V V O m lD V N O 00 w 7 N o 00 0 0 0 0 0 0 O O O O O O O O O O O M CO (n �--I N w n 0) O N r w o N m M o V T N e-1 O Ol m w Ln VIM N O lfl m m N M M O w N M C O w N m't 0 w m Ln O w c-1 w c-I w .� n N n N w m m m m c-I V .--I m Ln r-I m Ln N m w m 0 n n V V e-1 m M e-I 0 m n w V m e-I O M m ll1 n m O N m In w w m r1 N V w r O M V n M '.. N O M m w w V N c-1 o m Ln m Ln N w m m m H w N m zr O w N r- '... m m Ln 0 N Ln 0 r- V n O It n C m o m V N V' C Ln w w r m Ol C .--I N M m v Ln N m Ln O N .�-i 0 w n Ln C M 0 00 m N H Ln O V 00 M n �--� ID o V m a V r•-I Lr trl N 111 V M N e•-I O Ol D1 00 n Ln O n n a w LTl cl M! I� O V 00 N lD... O V 1� n m N 00 m •-I n V o I, m 0 w N 00 '-I N .--I n N m a -I m Ln 1, Dl o N w W O m Ln N tD w Ln w v r+ DI w m 0 m w 00 0 Ln w w m .-I m V w m al .--I M : w m V V '.... 0 n m O '... M Ln r' LT rl � w m C N Ln V Vl Vl w m '-I m w Ol .-I V 1� O N Ln m. .-I .--I L•-I rl e-I r-I N N N N e-I e-1 e•-I e-I e-I N N N N m rn m rl e•-I �--� e-1 N N N rri M m m V tilt to In V} V - Vl V1 Vn VY V} VT L1.. Ln V? VA V, Ln V} V>- VR V", VN V1 Vn 'n 'n V} V} in V? Vl- Vl V . V1 V) Vl Vl .... V1 Vl V} VIM V}' VT I VI VY Lf V) Vl l vvoaoo0vrv0w 0vN 0o0000-N0oNQovo00 0oao00N00v000000000000000000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 m m V 0 F, V .-� m V c-1 m In N m 0 Ln m N D1 cN-I N w Ol .--1 a w m .-+ M w m Ln V v w Ol Ol O m w N O m w V N o In N M N O Ol m w Ln V N r o m m O7 m Ln n m rl ' n Ln V N O m 1� N m D1 O w m m D1 w a N 0 m Ln m ti C1 n w Ln V m N O m w N w Ln V M r-I c-I '... Ln � N m O cl O N V ID 00 O r-I M Ln n D1 N V tD O O VI R'1 00 M m 0'1 n N n N w .--� w m V M N e-I m m n w a m N V r m m m w 0 Li w e-I w L l n N n N n N Ln Ln O� N n m O '-I m V w N m O N w n D1 .-1 M Ln w m O N V w m O V V a Ln m 0 N Ln I� O N Ln n O N Ln n O Ln lfl w 1� '-I M Ln m N Ln m e-I V n O V n rl r-I a-1 c-1 ri N N N N NM e-I r-1 c-I a --I N N N N m m m M C rl c-I c-I L•-I N N N M f/1 0'1 a V m...V1 V1 V1 VT Vf VT V? VlVn +JS VI Vl V} VY N VT V? +.A6 V} N "!`+, 'V& V1 i/f V1 +./? YfP VT V} VT V1 V) V1- VT Vl V1 VT Vl VI VT VT V} Vf VT Vl V} � V1 a r r r r>> r i r i i i r> a i a r>> r r> r r i> r r r i r a Y >> Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln d d❑ ❑'o a d d d d o o d d a❑ v❑ d d d❑❑ o 0 o d o d d d o Ln ❑ Ln o o d d o d❑ o d d d d❑❑ m m'm m m m m m m m m'm..m m❑ m.❑ m m m m m m m m m m m m m m m m o m m m m m m m Ln In Ln Ln vL vl Ln Ln Ln vi Ln 0Ln m a m Ln Ln LiL Ln an Ln Ln Ln en Ln Ln Ln Ln 'A Lil m a m Ln Ln Ln Ln Ln Ln Ln vi vi Ln vl Ln Ln w a w w w w Ln o_ a o_ a a a a a a w w w a w w Ln Lin w w w w w w w w w w w w w w w 0.w W D_ w w w w w w w w w w w w w w w a W w w w w w w w w w w w w w w w Y Y Y Y Y Y Y Y Y Y Y Y Y Y W Y W Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y w Y W Y Y Y Y Y Y Y Y Y Y Y Y Y Y Ln O Ln O 0 O Ln 0 Ln O Ln. O Ln O Y N ]e o Ln O 0 O m O Ln O Ln o o O m o Y Y Y 0 m O Ln O Ln O m O Ln O Ln O N a -I N N M m R V Ln Ln w w n n m .ti N M '-I �--� N N M M V V Ln Ln ''... w w t\ r m .--I N Ln .-I .--I N N m m� a m Ln w w 1, n aaaaaaaaa�aaaaaaaaaDaaaaaaaaoaaaaaaaaaaaaaaaaaaaa a s aaa aaa a a a a a aaaaaa a s aaa a a a a a a a a a aaaa aaa a a a a a a a a a E E E E E E E E E E E E E E E E E E E EE E E E E E E E E E E E E E E E E E E E E E E E E ''... J 7 J E 7 E '.... 7 J J J J '... J J 7 J J J 7 '... J J J E 7 E J J '... 7 J J 7 J J J J J J 7 J C C C C C C C C C C_ C C C C J C 7 C C C C C C C C C C C C C C C 7 J C C C C C C C C C C C C C C mmmNmmmCmOmmmmCo �Cammmmmmmmmmmmm'mma�m a�Cmmmmmmm a a a a a a a = a aaaaa a a: -m a- . . . . . . . . . . . . . . mamamamamamam a m y m m m>. m z Lz m m Lz z s z¢ m}} r}} r}} m } } T r r} r r r} r r T r Lu M Lu M M m m m m m m M M M> u r u u u v v v a v v v c v v u a r Lu } Lu Lu Ln u Ln u Lu Ln u Ln u Lu Ln u Lu Ln u Lu Ln u Ln u u ar u u u u u u u u u u u u u u u u u u u u u u u u u u... u u Ln u u Lu u u u u u u u u u u u u u u N a v m v v v w ar v v ar m a, u v u m m N v v v v v v N w w m mw u v u w ar v v N ar a, mw N m w m m C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C > > > > > > > > > > > > > > 01 Ol > > > > > > > > > > > > > > > > y 01 > > > > > > > > > > > > > > 01 G9 01 01 01 O! 0J Ol 01 O/ N 01 Ol Ol > > w w w w w w w w w w w 0) w w w> > 01 01 O1 0! 0! O1 Ol 01 0J 01 0) 01 O1 e Y Y Y Y Y Y Y Y Y le Y Y Y Y 01 Y Y Y Y Y Y le Y Y Y Y Y Y le Y Y wY Y Y Y Y Y ]C Y Y Y ]C Y Y Ln O Ln O Ln O Ln O Ln O Ln o Ln O Y Ln Y O Ln o Ln O Ln O Ln O Ln O Ln o Ln o Y �! Y O Ln O Ln VI O Ln O Ln O Ln O Ln O Ln Ln N w I, I, m N N m m V V m Ln w w r, 1� 00 L'-� N Ln H L'-� N N m m V V u U U U u u U U u u U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U 01 01 Ol 01 01 W W 01 OJ 0 W 0J 2O1 Ol O1 lU 01 O) W 2 2W W 01 0/ N 2 0! 201 W 201 01 OJ OJ 201 W 2 2W 01 W w w O1 01 m O O w U m m w w G U m U w w O w w O O/ w O Ol w w w m w w U m w w O N w w O U m w U N m O W m O U 01 01 O/ O1 0/ 0) 01 01 01 0J 01 01 01 O) Ol 01 01 01 0/ 01 01 Ol Ol 01 01 W. Ol 01 01 0J 0) 01 W1 01 0J 01 01 N Ol 01 01 01 0w 01 01 N Ow 01 01 LO LO LO f0 f0 N IO IO LO LO LO LO LO (0 N M M N N f0 LO N LO 10 f0 N fO IC f0 LO 19 LO LO N f0 LO 10 N N fO fO f0 f0 LO LO f0 M M M m m m m m m m m m..m m m m m m m m m m...,m m m m.......m m m m. m m m m'....m m m m m m'..,m m m m m m m m m m m m E E E E E E E E EE E E E E E E E E E E E E E E E'E E E E E E E E E E E E E E E E E E E E E E E E o` `o w _`o o `o `o 0 0'0` `o `o o `o 0 0 `o o `o `o 0 0 `o 0 0 `o 0 0 `o `o `o mmmmmmmmmmmmmmmmmmmmmmmmmNmmmmmmmmmmmmmmmmmmmmmmm a s aaaa aaaa aaa a a a a. a s o_ a a a o a 2 a a a a a a a a a— a aaaa a a a a a a a a u x+ u u u u u u u u u u u u u u u u u... u u u u u u u u u u u u u u u u u u u u u u u u u u `_' u u u m �a. La 21 m m m '.. m m m m m m m m m m m m m m m m m m M m m m Lo Lo m m m Lo m m m Lo Lo m La La ro m Lo m m m m C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C a s a'a a a'a a a a a a am N�N L L La La LaL L m m 'Lam Lam Lam Lam Lam La La La Lam Lam Lam La Lam La Lam Lam Lam Lam Lam La La Lam Lam La mm m0ME ME m0ME m`m0ME 102 2 2 0`2 2 ``2 2 v 2v2 v a 2 0v v v w v v a m a wp F F F F F F F F ',. F- F F F F F F F- F F F F F F F F F F W w w w w 0/ w w w w w 01 Ol 0/ 01 01 01 01 w 01 0/ 01 0/ w w w 0J w w w w w w w w w w w w w w w w w w w w w 0/ > > > > > > > > > > > > > > >� > > > > >^ > > > >, > Y > > > > > > > > > > > > > > > >, > > > > W W W W w W W W w v W w W W W W W w W W W W W W W w W W W w w W W W W W w w W W W W w W w w W W w w 01 w `! 01 O1 01 0J `1 ` 0) 01 01 ._ ._ — .- ._._ ._ i ._ s_ � ._ LL LL LL LL LLLL LL LL LL LL LL w LL LL LL LL LL LL LLLL LL LL LL LL LL LL w LL LL LL LL'.LL LL LL LL LL LL'..LL LL LL LL LL w W ll 11 LT LL LLI El w II) u) I� O D) M D) c-I I� O ul w m M 00 O) O � Q1, V) Dl O Il1 c O in 00 c 1' W 00 N e-1 Vl N o0 N 1q N k M w M O D1 M N 'n L} w M e0 O u) M o0 w M N N N N M V}.V} O N O V rr�w m M� i/t. F� V t')t vt N V rl D) m N T D) V L) Vl N O^ e-I 1, 1, V ul Vf Ol 00 w V N o w V} w O w N n u) w V} lD �.... N M m C N rH I� 1A m O V o W l0 w N O m W r� 'CP u) e-I N Vf N O N V) O ci P'+ T O) oo M MY '-I O %D N I� g^• m o .'. +J'ro in N W T w M W O V D) 1, o n .-1 m V} In N ul V N w w w V} N I� m M N H w V?,.'', O N N H 1j N V In d' w o w N '.. n VI dA ao O a O 00 w w In N u1 N V m lD r WY w al O D) oo u1, w v+ O V V m V L m e-1 VT V oo n 1, D) i O e-1 iP9 W N .� N u1 V e-I ••1 lln N w n to V 00 w O O w- a T N m '., e-I '-I VF V" O w .--I n M V '•I lalM1 V O ul Dl w N In '... e-I vd O ul r I� N m w ih W w oo o ul o H" Vf 00 m N m m l0 Vf N IIl V N w w w N w 1� w M m D1 N w Vl T Ln W H m O 00 u) N Ln .--1 N w D) O m W m w N '-I ID O N O.� u) '•I` w N .--I N ul * r1 e-1 V V to m W m n e-1 O w u) '... e-I M V '-I 0 0 O O 0 O 0 O o CF o o O O O O O O O O O O O O O O o O O O O O O O O O O O o. :CT CY C3 C3 PJ C} o O. 0 0 0 0 0 0 0 O O O O O O o o 0 0 0 o 0 o 0 O m u1 m O p N M a7 4xA @4 O w q^ N m'8 O w w N o0 � O w O w w KY iPb l0 O O O fV O a O w O m O O O O N v O w O 00 O O O N O O O V O o 4 o ID O C O a o o 0 O 0o O w O .. f O N O o KNi V N O w w w n c-I u) 1l V N V 0o M V m D) O I, N O7 M ry -d 'I w N DT M 9dti It w to I, � W M M N O N N 1-1 M V C D) M a0 w 1, w w m u) to M w '... O) N w m M m u1 M N V M O N N O T O) .--1 m m w 0 'w O W M H H .--I 0 00 .4. Y�� YY"U o; d` 1� O '... M l0 m N m oo H 7 n O n e^,Y w v O,' O) m, H N m m ul o t0 N oo V r1 L rci V lD ul V n9 N O D1 W IN N w N4 N H 1r, m M O* '., V O w m VI N w D) w m e-1 0o V O N m v 'm v m N uI oo O M u) oo r1 m w oo r 1 m m In 'I" w m V M N H m m n oo 0o m O N N N N +qq' w 1, oo O r-I N T In w F� W O m m m w 1, D) '', f)) VI w o0 1i.P1 N r-I c-1 N r-I c-1 r-I r-I '-1 N r r-I r d r d r °' N a r r r N r r r r r r r N r r r>_ a O_ r r i"^ 7m r dL m H H rl s-1 a--1 71 c-I a --I H e-I H e-I .--1 H c-I r } N N N N N N N N N N N N N N N Y ,},) r '' M M M m M m M M M iM m M M u) ❑ ❑ D] m X1 m m vt m m VI m m m m m m m m m m 0 C7 ❑ m m m m m m m m m m m m m m m m ❑ '', m O m m m m m w w m m m V1 W Vb Y LL ti'i w 0. Vt w D..LL w w V) w V) V) w w V) w to LL w Vl w w Vl CL w VI Ll w V) LL w VI ✓k w Wry,' , w w�,,. VI D_ V1 d w Vt D_ w Vt w w '., to E w VI w w o m w u) E w V) w w A w w 'A ti7 D. CL w V) d w Vt D. w V) d Vt O_ m VI VI d m V1 Vf d O_ V7 D. N a. V) d 4f'1 1.1 M] 0,„,. Ll SQL, Mary ''... w tk Y M w Y Y O Y Y m O Y Y m o Y m Y Y O u) Y O Y ul Y O Y u) Y O Y u) Y W O Y qq5 w ]e Y o Y u) Y o Y m Y O Y u) Y O Y u) Y O WU Y " u1 O Y m Y w Y w Y d W Y Y m D_ w Y w Y w ]C w Y w Y w Y µa Y w bd w wt O o d a d a ae D. o_ d a d u) a T o w d w o 1� a n a m s^d 1y a ti cry. u1 a c-I o_ c-1 m N m N d M o m a V o V a ul d u1 /rD d 1 i w a o I� d u) n a O W e-I a a O I17WY1i m o_ a s a Q aaa Q a a a a aaa a a a a Q a a a a Q a a¢¢ a a a a a a a L a L a a a L a L a a m a a a Q zy a. 4 E E E E > E E > > E E > > E E E > > E > E > E > E > E > E E > E E E E > E > E > E > E > E > E > E > E > E E E E E E E E E E'E E E E E E E E .0 C C C C C C C C C C C C C C C C C C C C C C C - C C C C C C > > C C > C > C > C > C J C J > C ' > C = C > C > C > C > C > C > C m fa fo 2 fo l0 f0 fo to fo fO fo !a fO !0 (o •- N .- N to fa iU N f0 IC fo fo is fo fo f0 !O fo C a+ C 'a+ fo (o IU N fo to a a boa a a a a- d D m a a a a a a a a a a a a a a a a m a a d........a a E s } o_ C } K K } } 2 K > } C' } K ',. } } CC > } } m } } 2 C } }.� } N} } > m } } > o_ } m } >- } K } > } m }....} m > } } > }.....} >- > > } a Fes,'} > a. } > I.. } y } I.. > } C } } > I. y > K } } } `~ U U ci U U '-I fi .--I 'i .-I .--I '-I '-1 '} N U N N N N N N N N N N N N N N N N} M } > M T T M M T M M T L U 4d �$0 > > > 9ll rv,/ ✓ '4! > oo U tiW 4M w '1A L1 WY U U > I,U a) > U > U > dy 4F > W.J' U > 9.V U > > Wa 'li U > U >U M U M U > U CI U N � yn � '�^. "�. ".. 1. � i � ^^w .,,•, e°w",,, ir�'m ai>a w u>a w, r„,„ rim �. "^-. � � �, � H 'O "`' ""^�. "1'')"^ '*.. ``�. � � »•'" U IU > > >. C L C v�i w^w.w' w^^..m v"^ra' C'. 11 C 5 > C > > > 'q) > w 'w > 1" w > > > > > > > > ? > w > a w > > > > > 'Y Y [. � C. > > > > o✓ %u >' > > old' l,� > > > > 4V o' > C > ' �P C > c > RY7 c 9d C > C > 'C w s1 Y> Y > > Y Y > > Y Y > Y > > Y Y > Y Y e aD Ne > Y > Y > > he Ne > w T > > Y > > > a7 > > } >' . > > > > w > w > > > Y > ILI > o>N CS! > W > Y m Y O u) O u1 O m O u1 O u) O u) O u) O le N Y Y O Y u1 Y O Y m Y O Y m Y O Y VI Y O Y Y u) O Y u) Y O, he le O Y m v Y Y 0 le Y Y VI he ]G Y Y Y N u) r-I a -I N N M T V V Ln m w w I, n oo A N u1 a--1 H N N M M '... C� u) ut w w I, n oo H N ul '.. A m '-I O N N O, m M O V ", u1 I- O Ln y u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u D N N W U1 O) N U1 U1 U1 N N N U1 Ul O) N _w _w N _w 0/ O1 N Ul N Ul Ol N O1 O/ U1 OJ N UI w U1 - N 3 Ul 1 U 0/ p > > �mMMMm > > > > > > mm...,mmmm > > > > > mmmmmmmm'..mmmmmmmmmmmmmmmmmmmmmmmm.....'m > > > > > > > > m > m > m > > > > > > > > > > > > > > > > v > > > > > > > > In 11 m m m m m m m m m m m m m m m m m m m m m m m 'm m m m m m m m m m m m m m m m m m m m m m m m m v E E E E E'E E E E E E E E E E E E E E E `o E E E E E E E E E E E E E E E E E E E E E E'E E E E E o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 IU o o'o IO 0 0 f0 0 0 0 0 0` o 0 0o o 0 0 o o 0 o o a a a a a a a a a a a a a a a I11 a N fo a a IO N a a fo a N a N a fo a N a a N a'K Ya a (0 a 10 a a l0 a N a f0 a f0 a N a' f0 10 a'a N N a N a N a (a a N f0 f0 IO U _ u 6J AMA Mk U 4J tid V 4Y &J u.N U U U _w Ma w 'U 6. U' 'ur 'aa n�y uZ an 4.p ,n rJl 4,M W+ 1J i w u u u u u u u 7• >'a� 7 z,.� a - '• 'S•. a- a. ', '.. ` s. a.. }•,'',",,,�,..,„ .mow. o to I7M N m M'J 10 N fo m Ao M uq wA IV Y� tlYA Ao 1TM _r dFb N N N m _,��• N! . c� Rp � do m LPL a)1 rt io io is ,a. 'wn nrca rvs ''±+a mm m r`v m ra ras nr io io io <' <'',Q Q Q 4 4 < < < <.' < It c � "�Qa,QQ"¢aaaQ y � c a'¢Qaaaa <' C C C C "¢QQa^+�Q'� C C C C C ¢a¢QQQ C'. C C C C J 4>D JC ip fo fo t0 fo f0 f0 fO iO fo fO bR t0 la N fo . fo N . to is N fo to fa < m .. m fo fo .J 10 fo fo !a fo (o fo to IC fo N IG IC fo i0 fO fo `/ Co F F F F F F F F F F,,F F F F F F F F F F F F F F F 'F F F F F F F F F F F F F F F F F,,F F F F C m m m m m m m m m m.,m m 17 m m m m'.,m m m m m m m m hq m m m m m m m m m m m ltS and m m m m mm m m 04.tlw w w w w wwww w w w w'...w wwwwwwwwwww''wwww..www"' Y C C C C C C C C C C C, C C C C C C C C C C C C C C C C C C C C C C C w. C w C w C w C w C w C' w C w C w C w C w....., C w C ww > waY • o,"'. oC' > CC > K > > CC K > > '... m K > m > i> tr GC,", > CC > CC w 00.' > w > w > > K K > > w C > K > CC > m > '., K > C > iC w C'R"; > [C > w > CC > > w w > '', K > OC > K > > w '', > w > i> > > > > > > C > C > u [C CC. CC. K OC K K !r w m > a)iitmi > 1J 22 > v > ` > > > ` > > > W > > ` E! > 6 M is - Ll M IL ILIL L1 IL LL IL L M M>lLM LL L1 L IL L M lL Il 11 Il L LT aW>- IWl>> LW>dL El _.. _. lr0 D7 O N T O W O V V lD V V O m lD V N O CO lD V N O CO H Ol ID M lD V M H Cn O m lD V N m H m n N m N w N m lD In O N 00 m O V a N H O Ol m w In V M N O In .--� �--� Ol Ol m lf1 O H Ill 0 In O lD H V1 o O M T m Ol lD O lD H 1� N I- N w m M m m V H m Vl H m Ill N M W m 0 lD In m m I, m H N N N N m m v m t a m M O w Ill I� m l0 00 MH N V ID 1� O M zt r,m N O Mm ID Ifl cT N H O Ol m Ol N H 11 C In w I� m Q7 O H N m C m ID m m ;I T m m O V r o V j I, O m O m V N V� Ill w w I� m O1 O H N m I m m lD I� m O1 H lfl O Vl O V1 H lD H lD H lD H 1� m y lD m N H I. c-I lD O V Ol V V H V1 tYl N ul a r6 N e-I O (3l Ol 00 I- l0 1 Ill O 00 o In N N 1� Ill N O n Ifi N o I, L6 N O r-1 r-:e4 o Ill V In O I, m 0 ID N m H N H I N 0) H m In r� 0) o N V 000 0 0 o H m o C 00 V 0 w H I� m m R O w N '. o H N I, O m n m Ol H M V' lD m T V Ill 1, Ol O m '... Ill 1L al H l0 00 O N Ill '... H H H H N N N m 4 V Ill Ill w CD I, m ma) N N N N r V Ill N N N N e-I e-I rl e-I e-1 N N N N m m Rl.'... [Pti LT to th ih L} t/} 1A N N'.'. V} to V}'. Lf Vf t/f tR VT VT v� VT V N'... LT ih N N Lf i/} NIN V} V} L1, Vb 0 0 0'o 0 0 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0.0 0 0 0 0 0 0 0 0 00 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 m lD V N O 00 0 N N m N N 0 V m N w O V m NI O V m m m N m M m N w m M r, H w V w m w V m H m Ill N m O Vl M N m H N V W 0) H V lD m H m lD m 1, M W m O co H N N m m M't qzt V' Ill Ill lD V n M n '... H lD '... M Ill a N H O 00 m C 00 In 1, m H Ol n Ln - N o m r, to m H 0) 0) N ul M M Ill'., w r- m Ol O H N m V Ill to Ol 00 Vl O lD to C 1l w Ill V m ti Vl a N 00...O ai O N 4 lD 00 O c fl9 Ill r, Ol Ill V I� Ill M 00 O l0 N 00 V ti n m Ol Ln r-I 1- H Ol V H t0 w e-I I, w l!1 V' m N I� w m m lD Ill H w H lD H 1, N n N, N H N N Ill m I, m 0) l0 N M 0 N Ol Vl N 0) In M C Ill H lD ul to O N V lD m ''... O V� 7 Ill m O N lf1 1, O N m n O N '... In n O H H H H N N m m d' Vl Vl w 1, n 00 ',. 0) 0) C N N N T Ill lD N N N N N m N N N N M M M M +J"W V4 iA VT tR N in. 4/f t/f Vf to In N N N N th 1A i/T VT VT''... M} ih th 4/f N to N LT V? i/! an lA Vl, Vl.. N, M N N N, N'ff 'n V/ i/f a d a a a d a a a a d a a a a a a I m m m m m m r> O ❑ ❑ ❑ ❑ ❑ :� ❑ � ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ O ❑ ❑ ❑ O ❑ a r a > > r } Y } } Y } r } r } Y Y a N ',. a r Y Y ',. Y m m m m m m ❑ m ❑ m m m m m m m m m m m m m m m } `� Y H H H H H H H H H H H H H H H} } N N N N V1 Vl V1 ul V1 0 m d m VI A L l ul Vl Vl Vl VI o VI ut ut V1 V1 Vl H ❑ H ❑ ❑ ❑ ❑ ❑ ❑ �.... ❑ ❑ ❑ ❑ ❑ ❑ O ❑ ❑ :. N ❑ N ❑ ❑ ❑ ❑ a a a a a a vl ut d a a d a a a a d a a a d a a 0 m o m m m m m m m m m m m m m m in 0 m O m m m m w w w w W w d Y a w w W W w w w w w w w w w w w Y Y Y Y Y Y W w Y 2 Y Y Y ]C Se Y Y Se Y Y Y Y Y m M m V1 Vl L l ul N N VI ul U1 Vf VI V1 Vl A Vl m d m VI V9 V1 Vl In o In o m O Y M Y o In O lfl O Ill O Vl O In O lfl O Ill O N lyaj ul a a a d a a a a a a d a a a a Vl W Vl a a a a l!7 lD lD I� n m H N In H H N N m m v V V7 In lD to I, n 00 a Y a w W W W w w W W w w w W w w w a Y a w W w w W W Y Y Y Y Y ]e Y Y Y Y Y Y Y Y ]C W w Y Y ]G Y d d a ti O_ Da. ti ti ti ti d a t a ti [L a ti ti a d d d d Y L Y 0 Ill 0 m o 0 O In O Ill 0 0 0 m O Y Vl ]C 0 m o Ill Q Q Q Q Q Q¢ Q Q Q¢ Q Q Q Q Q Q Q Q Q Q Q Q Q H N In H H N N M M V V V1 w W w 1� n m H N Vl H H N N H F� F7 F- H F� H F� H H H H H H H F- ~ Q Q Q L . i E E E E E E E E E E E E E E E E E E E E E E E C E J J J J J J J J J J J J J J J C C C C C C C C C C C C C C - C m m m m m m m m m m •t0 .iomm .f0 a d a d a a m a m a..a a a a a a a a a a a a a a alp a a a a a a a...a a a a a a a a a.2 a a a a a o_ a o m o 0 0 0 0 0 00 0 o o o o o o a ° a o 0 0 0 s z s rr rr s cc s m rr z s z m r s m rr s rr o o o o . }> r r r} cc v m> r r r r r r r} r r}} r r o` a` d o d o a a j a a a a d` a s a` m m m m m..m r r v v r v v v v v c v c c v v.4 a ja a m a u u u u u u,*u� uu u u u u u u u u u u u u u �° m mmmmm m'.m m m m mmm m m m m m uvi vl w owi u w u vwi v w w v N v w v v v N N v w m a m a a a a a a a a a a a a a a a m a m d a d a C C C C C C C C C C C C C C C C C C C C C C } K w ' cc ac w w w w w w C C w w w w w w w w w w w w w w v a' H C r} r r} Y >- >- H r r}}}} K N tr r}}} > > > > > > w > w > > > > > > > > > > > > > > > } Y H H H H H H H H H H H H H H H } U N u fv N N > w > w w w H H u U u U u u u U V V U u U N u V U U U u w w w H w w w w w w w N w u w w w Y Y Y Y Y Y w Y w Y Y Y Y Ne Y Y Y Y Y Y se Y ]e Y w N w w N w In O 0 0 m O Y In Y O In 0 m 0 ul 0 In O ul O m O ul O N N � � � � � � � � � �' � � �' � � �' � � � ' In w w 1, n m H N V1 H H N N m M ;r V Vl VI lD lD Il n m C I C C C C C C C C C C C C C C C C C C C C U U U'. U U U U U U U U U U U U U U U U U U U U U C j C w w w w w w w w w w w w 01 w w w w w >>>>>>>>>>>>>>> w w w> > > > C C C C C C m m N N m m N m m m m m m m N m m m> > w w w w w w w v w w v w w w w> > w w w w '... ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ w Lq e Y Y Y Y o Y Y Y Y ]C Y m S Y Y e � w Y Y Y Y w w w w w w w w w w w w w w w w Y Y O u'I O ul O Vl O v1 O In O w O In 00 Y Y O ul O N H N In H H N N m M V V Vl In lD lD I, r m H N Vl H H N N !O fm fm fO (O IO fm fm m fU fm m N N N N N.. N. '° '° U U U y U U U U U U ''' m m m m m m m m m m m m m m m m m m m m m m m m v v a w v w w v w w v v w v v w w E E E E E E E E E E E E E E E E E E E E E E E E 0 0 0 0 0` o''o 0 0 `o 0 0 `o `o 0 0 `o 0 0 `o `o 0 0 0 ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ .� w w w w v v w v v v v v v v v v v v v v v N N ow w v w m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m mIo m m m a a a a a a a a a a a a a a a a a a a a a a a a m m m m m m m m m m m m m m m m m m m m m m m '..m m u u___ u u= '.. u u u_ _u u u u u__ u u E E E E E E E E E E E E E E E E E E E E E E E. E E T 5>; 5 5 5 �',� 5 i>; y 5 `o o` o 0 0` o` o w o `o 4`o 0 0 `o o `o 0 0 0 `o o `o `o o `o �mmmmmmmmmmFammmmmmmmmmmmmmmmmmmmm�mm''mm C C C C C C C C C C C C C C C C C C C C C C C C Q Q¢¢ Q Q¢¢ Q Q Q¢ Q Q Q¢¢¢¢ Q Q Q Q G a d a a a a a a a a a a a a a a a a a a a a a a a mmmmmmmmmmmmmmmmmmmmmmmmuu=uuuuu uu - -=uuu' v v w w v a v w w v v v w v v v w v WE w v v v w' T >.> > > F. r F- � F F7 F F F N IU m N.. mN IO f0 N f6 N (6 N N f0 fO N N (0 N m N fO C C C C C C C C C C C C C C C C C C C C C C C C C F. m m m m m m mmm m m m m m m m m m m m m m m Q Q Q Q Q Q Q Q Q Q¢ Q Q Q Q Q¢ Q Q Q Q Q Q Q Q 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 m m m m m, m m m m m m m m m m m m m m m m m m m v v v v w v v v w w v v v v v v w v v w v v v v w a v v v w a v v w a v v w v w v v v w a v w a v C C C C C C C C C C C C C C C C C C C C C C C C w w w w w w w w w w w w w w w w w w w w w w w w L L L L L L L L L L L L L L L L L L L L L L L L L c' rr I= z rr z rG m 2 tr m rr rr m rr z s m rr m rr F- F- F- F- F- IN F- F- F- r F- F- F- F- F- F- MLWRE. v vwvvwwvvvww v v w w v v w w wwwvww v w v v v '. Wv ''..... v wvwvva wv wv I., W LL 11 ll I1 LL LL LL 11 11 LL M I1 M LL M. 11 LL LL Il 11 11 LL Il 11 LL LL LL 11 W lL I1 LL LL 11 LL LL 11 LL IL El v O Imo 0 o 0 ua v o w " a � m cl m D1 m N N T w N w V ID N w!.. . m n w m o n w n w m O m N m 1D O N V lD w O m w w m Vl N N N N N M M ID O rl m O o O In O M O N ID N V1 In w w m m 0 wM m m v e-I rl r-I ri '-1 e-I e-I V? V In Vi V} VNl vTi O V M r co IIDD 0 Omo Mn N O n n W m 'N-1 O w V ID n ID n TT O N o N m Vl w O N VI •--I Vl w w V In oo . V n O V n O m w m w w m n- '... m O V N m''Vl N N 0 0 0 0 0 0 0 0 0 0 0 o o,o o'o O o 0 0 0 0 0 0 0 0 0 0 00 0 0 tD V N fb m V N ai r-I V n w n m rl n w m m 0 .--I 0 ci N m 0 w w O N V lD m �--� M m w w lD m m Vl w r1 N V ID w 0 Sa°i m '.. n V c-I w m V r-I m w N V1 w f-I Ill w ei V n w w m m m w w M V Ill n w 0.I N M M M V IO w m c-1 M �-i .-i '-i .-+.......... N ti ri iraMa N o n o N Ln n o M V N w oo o N m '... n V .--1 w ID o m V V .--I ID V) w m '... n oo N V VI n V V V m w m .--I m N N o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o o oio o 0 o 0 0 0 0 0 0 0 0 N V ID w 1, Ol �--I M N w N ILl N w lD N O N N T V Ill n w m V n In M N n m w V n O M m m w n O �--1 N M O V N M !r ..',M N M M N ID w w w n n n n n w m O �--I N w n m rl m In n m, v a Vl ID m rl m Ln rl c-I N N N N N M �-1 c-I r-I �iiL971ift7���!©I©�©I©I©©I©©I©lin O N V w w N V LD oo Vl Ln V m N .--I O Vl V M N Ill m w O N V m V w w O N m In m m Ia w n m m v v It In IR c v cD O O O O O O O o V rn V n O m <D m N w w O V o C 1 Ln n m N Z. IO m Vl r N N N''.N N m m M ,J). II -'� II141 ll� I,� I V� f!. � I l.r III -V)N� 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0'0 0 O LD N w V W N w V Vl Ill N M Ill w w m '-1 N V ID w M Ill Clm w N ID w ID M M V f>0 N n O m 0 0 w O m c-I n V n m to n N N m .� v n m N m w o_- �. '�. > > > > i } i i i 9• a } a > r ;s- a• a=' } i i > i > r } } y::. > r > > > r r ,Y > i > !n. N N N N N N N N N N N m m M M m M m m m m m m m m m M M T >- '" ,Y V V ".'- V V V V V V V V V V 0 O❑ 0 0 0 0! O 0 �! � 0 0 6 0 0 0 0 0 0 V 0 T❑❑ �❑ ❑❑ �❑❑❑❑ ❑' ❑ 0 0 m m m m m w m m m m m❑ m❑ m CO w m" CO m m m m m m m m m Ctti ❑ m m m n m m m m m m m 0 m" m m m 0 pfl VI N VI Vl V1 VN N tf5 N Ln i!N m Vl m N''., VI Af4 Vq N ti+3 a✓t prY Vf Vf 0 0 N Ln U, m VO O Ln to j, Ln N Vl VI Vf VI N'h M1 Vl N Lh a a a M M M M ez:.. a m 0, Ln w vI a s rx �, a �, cu.. i7;, a m m a m a CL m� an a m Ca,. Tl_ LL m m m m '... m D, a.. a m K w w w w w w w wt.ti w w 40 a D_ w w Imp w w pax W r,aa. w w w u,n w w aaa a Cps. w w pap w w w w w w' w w w w w azx Lh Y Y 0. Y Y Y Y' Y ',.�". Y Y Y W Y W 0 m Y 0 Y %: Y Y Y Y Y y Y Y y w '.SG kap Y Y Y le Y Y Y Y Y Y kXS ! LO O Vl O u1 O!� O iA'1 O Ill O y u? Y O In O !W1 Lm7 M 0 try 0 .. Ln Ln 0 'ID O n O Y �!' Y O In O. In O M O Vl O Vl s7 u�°1 O In O y T m V I!'tl A+'n5 ID WD I� n TICS e-I N T '- ti N N o. *W p"y pn .--I '-I RW N m M * V M1R5 Vl 4Li 5/'p n n p,M,7 -I I'l% a a a a 0. a D i D s c,d d a a az ai a a d a a a rti c% ep f u a d a a a �` d ti. m ai r Q ¢ a Q¢.Q. ¢¢ Q Q a¢ Q a a a a a , pe h t M r- r a E a'a a E E E E E a a..,'� E E a E E E E a:E E E E E a"!E �......0 a E a E E a E E E a a E E E a a 0 0 0 0 0 0 0 0 0 0 0 a o 0 0 0 0 0 0 0 0 0 0 0 0 0'o a 4 a o 0 0 0 0 0 0 0 0 0 0 0 0 00 a 3 a CL Ti Ti a` aa Ti ai a Li a a` Ti a ` Ti ` io m z m cr ¢....z cc cc m mccLL w m m m s LL' �'!.m m z m........w m Lr cc cc m,m z m cc w ......�,....w ofm y N N N N N N N N N N N } m } m m m m m m M m M m M M m m m Y V V V V V V V V V V V V V V V} U u u v A.A M v M U U U U W U U U U p U U U U V M u u U u 3 U w U U u U 4I a.a lA 01 oa n"uA op oA op od' TkY QA CIJ U U H of N U) N i. N h%S W opoa pp 4U CY U I + l 410 I oa 11.1 TY 6p MI U oA � ok T4M oA [J a w u w n w of N N.b 0.a plp Lll GA Ca 1'd! Aq1 C > C of ! of of W 4yl '., N 4A W N w of 'qN C!p rcU C C. W IiF 4p aJ u:a ✓a! Wp of pr p1i WA q) qp +JA C'; > > > '� '4p v > > > > > > > > >' > > > ? > .'�^ +Ly > AJ., > > > > > > > N fU 4a! Ty 0.J od oa mi oa op tiMp > > w w w N oA N op! W 41! ua w N w 9kP Atl5 ^� > TU Qp Cp op p7d 1SY W op Aj Od Ila CA 0l 01 oA Y Y Y y Y Y Y Y Y Y! Y iU y y Y Y Y Y Y Y Y Y Y Y Y Y Y Y dJ'� Y Y y Y Y le ]G Y Y le Y Y ]e ]e y Y ' Y O Vl O Ln O In o In o Ln o Y m Y 0 Ln O In O Vl O In 0 Vl O Vl O Vl O Y ]C O Ln O m O Ln O m O Vl O In o Ln O ]e Lq m m v v 111 Vf lD w n n w N VI - c-1 N N M T V '... V V) m ID ID n n w .-I " m ci " N N m m V V Ln m D ID n n oo c-1 N u u u u" u u u u u u u u u u u u u U u u'' " u u u u u u u u u u u u u u u u' u u u u u u u u u u u as as Tu w as v w m m Tu v v v v v v of 01 Tu Tu Tu ap v Tu v v Tu Tu v w m v v Tu '.... To Tu Tu Tu Tu m m Tu v m v v w w m wwwwwwwasawwww'wwwwwwwwwwwwwwwwwwwwwwwww wwwwwwwwww ❑ ❑ ❑ O ❑ ❑ ❑ ❑ ❑ ❑ ❑ O ❑ ❑ O ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ !❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ in ❑ N fU N W N N o/ N N N W W W W N W N N N W N N N N Ul of of N N N N of of of oa w of SS N W m m m m m m m m m mmm m m m m m m m m m m m m m m m m m mI m m m m m m m m m m m m m m m m m'.,m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m E E E E E E E E E E'E E E E E E'E E E E E E E E E E E E E E E M E E E E E E E E E E E E E E E E o `oo o` o o `o `o `o o `o 0 0 0` o o `o o` o `o 0 0o `o o` oo `o o `o 0 0 `o `o 0 0 `o o `o `o o `o `o 0 0' ��������M M����� ��M � -� M a E!a a E E E E E a E E a E E a E E a E a: E: E a a E E E E a E E E a E E E a a a a''.E a a a a: a: E E 1 uvL" Uw v5 a 0.A owww n 1iA 6 0 u 6a wp v 4A moo PqW m m m m rtp CCl ro '., m m m d4i crti. fq ! S �B 19 iP aeu +S f0 m N f0 aNp rp m T C3 066 u'T`. �R'V .� fO f0 fo N ip� ,•uo E� ro Im M M M, M C C C C lr C! C C C C C C C C C C C C C C C C C. C C C C C Cn C C C C C C C C C C a" C C C C pu'. C Q a¢ a a a Q Q,a a¢ a a a a a a a a Q a �s a aaa ¢ Q¢« Q¢¢ a a a a a a a z¢¢ a.'¢ a v n m m ati a ro m m m a c m a m m 're as v v w v v as w �a Ep m m v v v v y,pr v w w m v v Tu aw as np np npa v v Tu Tu v v Tu TuA cA a' ao TD 'qr' w iE .,C: -I--,a•"' f- %-^- W # W` F^ V-^ H H H H F- NLa)" WNN ®1aww L"L(u Mw W N W N N ofof Ul UJ A."N o) o/ IIIVpVpIoaIIIINNIIIIIIIINIINgpIIalN IIINpuII o1 o/ NNW0/ IIIINIIII0l IIIINIIIIN of GlNfUN IIRII N fU v tli LL d Ll_ LL LL LL lL LL I.Ju L � LLa� LL �..Iv M � d I � LLJ ! � I! v � � � d l � l � I. � � LL . 11 1 LL II LL � LL I � � � II It M d' ti O Z W E 0) El O m O O m In In o O O o O Ill 111 In m r1 01 lD M w M c-1 M o W ID V N m '-I Ol r� N m N lD N co lD N m O W N m V lD 00 lD m N to O C In . . 1� ci .--I ul m '.... m Ill s-I '-I m m co Vl O C -i ul O Ifl O ID Li O O M m m m o O O Ol N O O N Vl V Ol V n O N O N m I- O m O N m o m '', m w I� m c-I N N N N m m t m V V 111 M O lD I� V'I N M V T V In o I� m I� rl D1 . r to ei to e-I W e-I tD N lD N I-. N of m N e-I Il V Ill to Il w m O H N m V Vl w 01 Ol V M lfl Ol o N w m O N V to '.... to M m I� n M clD; Vl O lD rl n N ocw w I� M m Ill C Vl O Vl ci lD '... t! lD r to '-I N N N j m w V o Il o N o I -I to M o m o m o o o6 O Ill N N I� o N� o n o N O I, Ill N o �--� I� ti O Vl C Ill O o' o Ill o m o Ill o I� s-I �-i M N- O m I� lD m m N ri O O o .-I m o a m C o to '-I n m Ol V o w N O .--I N 1� o m n Ol o N m m lD m M m lD O N I, O m 111 m '-I n O m lD .-I .-I '-I e-I N N N m V V V1 Vl lD to I� m m m N N N N-t V Ill W w m o N m:T rl e-I c-I i'-I N N N N mi mi " V V V '-1 r-I -4 '-1 e-I n r r, �..q �vz r r h�,vav �,�.nvl n n�,�,� q+� ��.�. n nvr n.� O O O 0 o O o o o o O O O O O o o O o o O O o o o o O o O o o O O O O O O O O O O O O O O O O O O 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o o 0 0 0 0 0 0 0 0 0 0 0 0 cD o 0 0 0 0 0 0 0 o Ill O O Ill m Ill O O o o O o V M Ill m Il w m m N m M I, O V m N l0 Ol M Il '-I to V lD W lD V W lD V O m lD V N W V m� to m rl m to n m ci m V w m O Il m ID m O m .--I N N M m T V' N V Ill Ln w V I� M 1� .-i to m't m lD lD I� m m m M lD Vl lD Ill T- lD lD a -I II N n N n m m Ol N 111 rr M Vl lD 0 '-I N M V m o m m Ill o lD lD O N V lD m O N V lD lD 1l ''... lD rl N M M V It Ln M W l0 n n M 0 V I, to m '... oo O to N 00 V c-I I' m m lfl e-I IN �--I Dl V '-I l0 to c-I m o n al N V o w m I lD '.., m o m H -;r n O M w M N Ill oo c"I N N ul m Il M m to N M lD N Dl M N m Ill m -;r Ln rl lD Ill w m N o m N m m H w ''... 1- e-I T lD al cr ''... lD al '.... m lD al N lD al N .-1 'i e-I .-I N N M M V Vl In W I� l\ m M M O N N N M �t T lD Il Ol N '.... N N m M M V V C Vl Vf in Lf L? i/} V1 in lh N V? t/T N tR N 4/l u? Vl VA V' . V} N NA 1^ la 4n N'...N iN In Vf N ah iA N U} U? Vl V1 V} VY N V1,. In Vl VT... o_ a ''.... d o_ m D_ o_ cL o_ d o_ a o- o_ o_ o_ D_ a o_ o_ cL '... m a a ''.... a o_ o_ D_ o_ D_ a o_ a m o_ D_ a a o_ o_ D_ a o_ o_ D_ D_ d 0_ ',.. o_ m D_ d d d cL D_ d '.... d d LL O_ d d D_ D_ LL m D_ d 2 O_ D_ d d m D_ D_ ''... o_ M o_ a a o_ a o_ N CL d D_ d d 9- a a D_ Ct d D_ d D_ d O_ d } Y N N N N N N N N N N N N } In ul In In vl vl vl In vl vl vl vl vl vl In ❑ m❑ m m m m m m m m m m m m m m m❑ m❑ m m m m m m m m m m m m T m V1 m to vl Li) Ln In In vl Ln VI N N V1 Ln VI Vl m Vl m V1 Vl Vl VI Vl Vl Vl Vl V) Vl vl V1 ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ o_ o_ ❑ m m m m m m m m m m m m m m ... m W LL LL d d LL d d d d LL d LL LL d Vl W N O_ D_ d d D_ D_ w D. d LL w n.... a d w w w w w w w w w w w w w w w d Y d w w o w w w w w w w w w m N H N N VI V) vl Vl N N N Vl V1 m N w Y W Y Y Y Y cD ]C Y Y c3 Y Y m cD Y Y w he Y Y Y Y 8 Y Y Y o ]C Y Y Vl D_ d d d 0_ D_ d d d D_ d d d D_ '. O_ Y� Y O lfl O Ifl O lfl O V1 O ll'I O �'1 O N O Y� Y O lfl O Vl O In O In O l!1 O lfl d w w W W- W W W W W W w w w w ci N Ill � �--1 N N M T V V to to lD lD 1� n m c-I N Ll '-I ri N N M T V V Vl T lD lD w Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y w 0_ CL a d d O_ 0_ d O_ O_ d a d a D_ 2 d d LL LL d d d M cL D_ D_ d d D_ m M Y o Vl O l/l O In O In O Ill O Vl O vl O a Q Q a a a a a a a a a Q a a Q a a Q Q¢ a¢¢¢¢¢¢¢¢¢¢¢ In a -I .--I N N T T V L!1 In lD lD 1� n W F' < �FT F F F F 1- H H H ¢¢¢¢¢¢¢¢¢¢¢¢¢ z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z a a Q H� � �. �� .� r� � .� � I— m m z m z z m m z' z m m x m z m m m m oc z m s m z s Of m ac m s m m moo_ "=aaaaaaaa aaaaaaa J o_ JM a.Q.adacL mm d o a 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o a 2 LL o O o 0 0 0 0 0 o O o o 0• o. o 0 . d a a a a` a` a a....w` a` a s o`,.,a` a a` �.� E Jaaaa',aaaaaaaan— a^aaa a: a: aaaaaaaama�aaadaaiaaaaaa a o 0 0 0 0 0 0 0 0 0 0 0 0 o o cc a s a' s s cc s z s ac m m m s oc m m m Q m m m m z m m m m s Oc m o H>- Y} r r r r r r r r .. r r Y r r K N oG r} r r r r r } } rl c-I r-I '-I e-1 e-I .--I '-1 e-I rl '-I c-I rl rl `-I r } N N N N N N N N N N N N U V U U V U N N N U U U U U U U V u U V U u u Imil aj w N h H (u of m m N m m m of V u m m vmi vVi m H m m N H aaaaaaaaaaaaaaamNv mNN 2 C K CK K >> > K >- K CC > C C I�il oC } } } r Y } } >-} } } I} In In Vl u'1 l!1 Vl Vl In tl1 V1 lfl Ill V1 u'1 lfl C > C W m m N m m W N W N'.. m O/ > m m C > C > m m > m of of m > > m m U U U U U U U U U U V U U U U v m m > > > > > > > > > > > > > > > m N > > > > > > > > > > > > u H vUi H h vUi N m m H m N N m> > m m m m W m m m w m m m m m m> > N m m m m N N m m m m of m Y al Y Y Y Y Y Y Y Ne Y Y Y Y Y Y Y V Y m Y Y Y Y Y Y Y Y le Y Y ]e Y N Y o, m O In o Ill o Vl O In o 1f1 O Ill O Y� Y, O ul cD III O w O Vl O m c vl rl N m H H N N M M V r Vl Ln w lD I- r,w H N o H H N N m M V 7 f I.fl lD to C C C C C C C C C C C C C C C C m m m N m m m of m m m m > m U U U V V U U U U U U U U U U U U U U U U U U U U U U U U U U U U > m>>>>>>> > > > > >> aU+ N m m aJ GJ N m m 4J Gl m m m N m W O1 m N m Ol m W '. G! N m m W m m m GJ > m m N m m m m 4J m m of UJ m m m m Ol m UJ m U) Gl m m Ul Ul m m N Ul m W Ul Ul N O/ N m m N N W m U1 O/ m m N m Y Y Y Y Y Y Y Y - Y Y Y Y Y Y ❑ ❑ ❑ ❑ ❑ ❑ ❑ ',, ❑ O ❑ ❑ '', ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ Y O 111 o Vl o Vl o Vl O to O tll o In O m N O1 m m m m O1 m m m OJ m m m m m m m N OJ m m m m m W m m m W m m ul c-1 r-I N N M M d' V 11'1 to lD lD I� t` m U u m o m m m o m m m m o m m m m m m m m m' m m m m m m m m m m m m m m m m m m m m m m m m m m v m m m m m v m m v m m v m m m E E E E E E E E E E E E E E E E E E E E E E E E E E E E I E E E E E ❑❑❑❑❑❑❑❑❑❑❑❑❑❑❑❑ o 0 0 o `o `o 0 0 0 `o 0 0 o 0 0 0 0 0 o o `o 0 0 0 0 0 `o 0 v m v m m m ar v m m m v m m m m w '�- m m m m m m m m m,m m m m m mm f0 m m m m m m m m m m m m m m m m m m m m m m,m m m m m m m m m m m m m m m m m m m m m m m m co m a a a a a a a a a a a aaaaaaaaa d a D- E E E E E E E E EIE E E E E E E u u_ u_ u_ u u u u u u u u u u u u_ u u u u u u _u u u u u_ u u u u= u 5 5 5 55> mmmm m m m m m'm m m m m m'm m m m m m m m m m m m m m m m m m m m m m m m m m m m m m o m m m E a a a a aa C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C a a a , a a a a a a a a a a a a a a a a¢¢ a a a a a Q Q a a a a a a a Q a a a a a a = ===u u uuu,ummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm w a m m v v w m v v v m m v m m m m5. >= L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L m m m m m m m m m m m m m m m m F F r F F N H H H H H H H H H F H H H H F� H H H F- H C C C C C C C C C C C C C C C C a a a a a a a a a a a a a a a m m m m m m m m m m m m m m m m m m m m m m m m m m'm mmmmlmmmmmmmmmlmmmvv�vvvvvvvvvvvavv�vv�vvvvvvvvvv d C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C L L L L L L L L L L L m m m m m UI m m m m m m w m m m a/ m m m H r �. H z z cc w m z w ce cc z w w, w w w IY = oc D- of or z- w of w w w L L L L.. m m m of m m W m m. m ar ar ar m m m m v m m v v m m> m m m m m m m m m ar v m m m m m m m v m m m m m> m m m >. v m m v I„4. LL LL LL ll LL '.11 11 LL 11 11 LL lL Il LL LL W W '..LL 11 11 LL 11 11 11 LL W 11 11 11 LL LL LL W LL 11 LL 11 11 11 LL W 11 LL LL''.LL LL'.Il El ............._. _. N m m m N 01 M I, O V m N l0 m m 1, '. ri T w C N V w N V W O N' w m N C w m m 1p H.N M r Vl w'n m N e-I e-I VI V1 7 I� m Vi Vl O C m I� , w O m T n N O n l0 I� m m .-I O Ol . M N '.., O Vl C M N V a m w m O N V lD m m..,O m M m w m w �t w N w n T O N O N.''M Vl w O N Vl '-i m w m m w'O N.....'C LD V l0 m O N V T O V O w H w r-I m O m m m w V) M V T m '-1 V I� O V I� O M w Ol m m Ol n m Ot O a m N 1� H Vl Ol m n ri w Ol e-I T M m N I� �--I lD N M M lD O e-1 Ol Ol V lD .--1 n N 1� M m M 01 C m V M n m N '., 01 Vl N N N M M V L I Vl W lD M m I� O M W N N M ''.. M O N O N l0 N 6 W W N o N O N VI N O N Vj 1� b rri V N e-I a-i W O O O O O O O O O O O O N O M C r-I m r N Olq. lD r N oc O N m 0 w N w m O m m N m m lD O M V'� ci w M m H V n O M ID M N M m O V I� ci N N M V M W lD I� m m m m a w n m O N M Lr n m c N V N 1\ V V a m m m lD m o m Vl N cn N V l0 N N N� w m c tV lD Ln a-1 N rl r-I e-1 �-1 N N N N '-1 r-I N rl N N N N N m m t'll 7R VT VT V? iN ',, VT iA V} Vf in u? in v" +Jk 1A fin t4 V", U4 in• N1'tiFM in V} iR iR N VT aA N O O O O O O O O O O O O O O O O O O O O O O O O O O p y O O O O O O O O O O O O O O O O O O O O O 0 0 0 0 0 0 0 0 O 0 0 0 0 0 p0 O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O p O l0 V N a1 .-i n V uiY 1'w c4 14 O N w m N m H m N m N w N 00 N m O w N m V w N m of V1 m m w m N M m H V O '-I N .--1 r-I O .--I N 0'w Vq 4D 00 01 O O N M Vl lD m Ol e-I N V T 1l1 ci lD M '-I Ol m W 01 �-1 m al m m w 01 ON 4l'w m e^x m c-I C I� O M lD Ol m 1� O e-I N m 4:4 d' 01 m n e-I V7 41 M m N w l0 N lD Ol Ol '... Ol Ol m m m O m' N f\ V c-I w Ol "'.' .:. w•,e 5�., rc4pp w 4 cri .4 Ol 00 l0O V rV M T Ol N m m a j w O V1 M 7 00. N n. 4 lD. O. N l0 a Vl M c-I al n 1/1 M u1 m '-I V n m lD Ol M� Ob m� OCI m m m m I� n n n n ID Ol O N ''.. m t^0 N m m H N , O n m O w m m n N N '-I Vl m N ", w O m Ol r-I m M M l0 iK4 ON M Vl n 01 H M VI I' 0) H '... V M lD 01 r^/ m m m e-I m w 01 H V N Ot N N N M r n Ol .--I - ID 01 rl N N '., rF r•d' H c4 c4 N N N N N M x4 4 t4 r4 N N N N Rl M n'J r V c-1 _r c UT UT V1''UT U) u} pp'h to U"f Aerl W+"p NA. N VY u?....,tA to U1 UT N Ul [/?...,tA to U) V} Uy 4i}'WM UT {n Ll UT U7 ih UT SA U) in UT VT in U} VT id%U} UT V? U) a a a a a a a l a a a a a a a a a a a! a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a aa aaaaaaaaa a a .0- a a a a a r.r N N N r ^� r m m 'm m m m m m m m m m m' m m m r Ca ❑' ❑' T❑ m 6 6 6 6 6 Is 6 6 6 6 6''6 6 6 ❑,'a ❑ ❑'.O tj O O,tj � a ❑,,0 D O❑ 0 D a r a Oil m m❑ m,,❑ m m m m m m'.m m m..m m m m m m❑ m.❑.ca m m m m m m m m m m m m m m .}-1 ti c}-I Vb M VI m m V) N Vl 41'1 to N N VI m M V7 Vl N Vl N m Y✓X m to m VI to 01 m VI m M V1 E m VI Afl' Vl Vl M �--I ci VI VI w/'8 SA1 Y✓Y Vl N '.... a to W vl a a a a a a a a a a a a a a a wa p. 0 a a a a a a a a a m a a a a w w w a Y a w w w uxl w w w w w w w w w w w ^Y Y Y wLF! w Y Y Y 5C Y Y Y Y Y Y Y Y Y Y Y w `^'�^ w Y Y Y Y Y Y Y ]e Y Y Y Y Y Y Y M M Vl x�'g y"ry qry an to p Vl O Y N Y O V1 O fn . O M O m O V7 O VI O V7 mo 14 ]4° O m O V1 O V1 O m O Ln O V1 O Vl OG.. a s N VI rl ti N N T M V V V1 VI l0 l0 , n m rW Py N N f�1 M V VI V1 lD M1D I� t\ m a a W W ClA W W W W a s Ll a a a a CL a i�. a d LL LL d o_ o_ LL a s 4"L, A. a CS.. LL d L L d 0_ Ll a 0_ d LL a a& m Y 4A O V& O le la'w O Ve O a Q Q a Q a a Q a Q. a a Q Q e4 IL, a a Q a a Q" " '"� ' Q a Q a a Q Q Q a Q a a a Q l a .--I +"M to 0 m N N m m C) F H H H H H H H H F^ 1- H f- H H F7 f- F H H 9-^ F- p- rmm^ f- F H F- H H F H H H 1- M�^ N"y M� F- a a a a a a a U U U u U v v a! v v O W W N W m m m m m E E E 0E E 0 mamma ¢aaaa J J J J aaaa 0 0 0 0 a a a a mama a a a a a a. a a a a w a aaa E E E E E E E E 2 KK.........0 K m C K''...m CC CC m K K K K''. a' C m m K C 2 2 K K E J E J J . J J J J Y } } } } } } Y } } } } Oc Y K } } } Y } } Y >. >.} >. >- >- >. >. 7 C J c C C C c C C m m m m m>m m m m M m>m} a} v v a -4 'r v IT v 'Ta v v v.....v Ir c c u u u u u u u' u u u v u o n,+ u u �p u u u u u u u m m m m m m m to w v Np� �y° nl u' u N v rtp 4u rJr•. wuw ell' al ml rvr aEp - a a a a a a '.... a a cc Ol wkY top OJ OJ W 4p Of 01 Ol Rl N is C R bk N ilN iSY 41p OY O!' Ol Od qp Rp OJ 01' W } Y .}-� .r,}-�yyI p>!' Ol 0>1 N ,7i, ..+ > ? > > JU pp }' �> > 'T, '>. > `� > > > > ? �Y > W O,w AUw p5! v Ol 9J' Ol w CL w W w w v o> w' OA u O U Ol Ol Y Ne Y Y Y Y Y heY se Y Y w Y w' Y Y leY a e heY Y ]e ] Y Y Y ]C O!' N v T O T O Vl O Vl O vl O Vl O Y V? Y O m O m O M O oO T O Vl O V1 O "w �wMi' w v"i wow N M M V V VI M l0 <D r- I'- m e-1 N T m m V '... o Vl W tD n f\ m C '.. U U U U U U U U U U U U U U U U U U U U U U U U U u U U U U O' > C N N C' a c O. c Cc .° ° .° .° °. .° m y .° ° m > v >w a rop m U O m O m m U O 0 O 0 Ol N U O) N w w O O m N O U W U O O p E Y Ol Y ]e ]G Y Y le Y ❑ ❑ ❑ ❑ ❑ O ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ O ❑ ❑ ❑ ❑ ❑ ❑ Y Vl Y O In O T O m O lll N O1 OJ O1 Ol O/ O1 U1 N O1 N N W OJ N w w '... w w w w w N w w N N w w N m m V '., n c o N m o N t0 N f0 n n c0 0] N fm n tm (O f0 N t0 N N N f0 N tp � (p L L L L L L L L L L m m m m m m m m m m m m co m m m m m m m m m m m CO CO m m m u u u u u u u E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E v v aO aO aO a° w w w aO V1 V1 N V1 V1 to to V1 O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O a+ ` f ` mmm m m m m m m m m m m m m m m m m m m m m m m m m m O O O O O O O O O O L L L L L o L L o L a a a a a a a a a a a a a a a a a aaaa a aaa a s a a a ,n v o o n n o a a a a a a a m a a m m? a2 m m m a c. m a m a¢ 0 0 0 0 0 0 0 0 0 0 0 o D'O a- .0 0 0 0 0 0 0 0 0 0 a` a mmmmmmmmmm,mm f0 mmmmmmmmmm aaaaaaaaaa'aa�a�a--------- w +v c to c c c c c c ac w c c c c c O c c c c c c c C C C C C C C C C C C C 'C C C C. C 0. C C C C C C C C C C C C C. K:•. Q.a a a¢ a Q Q mmmDmmmmmmmmmmmmmmmmm'mmmmmmmmmm i7 F F- H H F- H H F f- H p7 k^ H fO N N R4wAY r15 40 (O f0 N N N m N m mm pip f0 f0 N f0 N N IO f0 -Ca 7a FO l0 Fa p1] C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C Ol N W. O,P we Aw O1 Ol U1 O) N N Cl N , Ol 'c GN W Ol 01 Ol O) N W Ol OJ w '., Ol Ol RN qy C C OC R'r= G4: C6: K fY C '. a' [C m O_ a' K OC CG a" C K K '., 1' a' 2 00 OC CC OC OC =1 m I OC'. Ol `! 11 LL O/ Ol > O/ O/ W N O/ al al W > Ol > > > > > > > Y1 a Y Y } } > > } } Y Y Y > W W W '' W W W W W W W W W W W W W W al `/ Ll O/ Ol `l `1 OJ d d O) Ol Ol W LL 11 U: ll•. I.A,.. 11 11 M LL 1.1 LL E LL 11 LL M m u it w.0 a 6 u E E E E E E E E E E a.� 0 0 0 0 ° 0 0 `o `o 0 �� ���mmmmmmmmmm mmmmmm���w��pµ� v v v v v m 27 H F_ H f- F_ F_ 'c C cm l0 N. me w9 m 'r. t0 C C C p: C C C t0 N 70 f0 fO 76 a It a '< a a a a Q a 3 3 3 3 3 3 m 1m m m m m m m m WQjWWWWC C 00 C c C C T T EJ Nl OF F 22 2O1 N O/ W W W L C =', L L. L L L LLIILLI'LLI'LLILLI'LLIILLIIWIILLULL El '.... Ol 0Y ••'-I N M 7 Vl l0 O N...N lO CO O N V AD 00 O N � AD '.. a0 O N Vl '.. 00 m lO Ol N n 00 H V 1� O m tD Ol N 00 O C V 00 N 00 H M m n m H m Ol Ol lD o0 N lD H of m I- N AD O V 00 fll 1� m m of N 00 VI H I� 7 O lD m Ol Ill H 00 O 00 00 N AD M AD N 1-. N 1l. N 00 M V 00 AD O H .--I N N N m m V Ill Ill Ill w lD I, m m H AD N 00 m m m O lD H 1- m 00 O of I- m H N O 0 of t 00 m N N 00 00 N 00 1, AD Ill t m N H O m 00 I- AO Ill V I, m M 1, O V I, H a 00 N n m N Ao m m I� AD n Ill lD r V Vl Vl 1p O n n AD 't H N M V Ifl AD I, W m Ol O H N m H O H N V Ill t0 00 0l O N m AO I- 00 O H M m 00 m M T O I, V '-I 00 Ln N a O 1, 00 N AD O V 00 N' tD O V m m 1, H Ill n c-I H N M V o lD Ol O H N m V Ln n 00 01 lO n n 00 Ol m O H o '... 00 V N -It Ln 00 m H N V Ill w w m H N O N N V AO 00 O N V AO of H m Ill I� m H m o w m M 00 00 O N V AD 00 H- V C o 00 N AO O C 00 m H Ill Ol M I- N O lD N 00 - H m - Ill N 00 O lD M al 00 T O AD V -1 N, N ''.. N N N Rl T H '-I N N N ''... M m V ''.. V V Ill m lD lD rl H N m m V V V1 wAD 1, 00 w m m '-I rl N N V}'VP VT V? VT LT 1h V? VT''.. L} in '....4A In V).lj 'VA V} Vl Vl Vl Vf 'n VT V} V} V1 V} V} V} Vl VII Vl 'n VT V) V1'',VT V} NA Vl An Vl V} o 0 o o o o o o 0 0,0 0 o o o O o o''o o o 0 0 0 0 0 0 0 o o 0 o o o o o o o o� a o O o o o 0 0 0 0 0 0 0 0 0 0'o O o 0 o 0 0 0 0 0 0 0 0 o o o o o o o o o 0 0 0 0 0 0 0 0 0 o sz sc o 0 o 0 o I� O m lD m N Ill 00 O to lLl N 00 C o lO N 00 V O l0 N o0 V O O Vl V of 00 I, to Vl O m N H o Ol 00 I, AD A O N N V AD V m H Ol 1� lD N 1� H N m Ol w m Ol l0 N of lD N Ql VI N Ol. VI O 1� M Ol Ql of V Ol V m M DO m W It 4t V M I/1 lD Ol W 00 00 I, t\ n n n N In N M 00 00 00 1� r n AD AD LO Ill Ill Ill V V of I� 00 a0 00 I, n w lD m ill '... -t � 0'1 m N VI c V 00 1� H Ol I, M t+l c-1 Ol 1, Vl N Ol c-1 r, M Ol Ill H n rn of Vl H I, M Ol Vl n 00 mi I� e-I Ill Ol m r '-I L6 m m I, '-I Ill n u o Vl 00 m M V^ H Ill Ol m lD O W Ill N Ill N o 1, Vl M o 00 Ill M H 00 W M H 01 N C N V VI AD 00 Ol H N M V1 lD 00 Ol S 7i m O Ill O Ill H M lD W O M Ill 00 Vl lD of V al m 00 M 00 N I, N 1� H <0 H lD lD 00 Ol V H 00 N N Ol 1� V H W to N of , Yt of H N Ol 00 N N N N M M M M H e-I N N m m a V Vl VI lD lD n n '-1 N '.. N M V V Vl AD I� n 00 Ol Ol '-1 e-I rl N MPp VT VT V1 V}...,'tlM In v✓ 'Vl I/V VT'.... V? V? V? V} in U! to V? VY Vl V} Vl V1'',. Vl V},. In Vl- Vl Vl VT.,1h V) VT V? Vl VT VT Vl'.. V} N V1 In Vl V1..., V1 V} a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a y } } } } } } } a N a } } } y y } } y } >- >-y j y > a } a } > } y } > } } } > j } } j y a - a Y } H H H H H H H H } } N N N N N N N N N N N N N N N } m } M M M M m T M m m m M M M M M Y Vf VI VI V1 V1 VI V1 Vl N N N Vl VI Vl !n N V1 Vl Vl VI V1 V1 Vl VI N VI M m V1 to Vl Vl Vl Vl !n VI Vf to V1 VI V1 Vl to VI Vl N VI Vl V1 VI VI V1 V1 VI VI Vl lA to VI N N V) Vf to M VI lA VI N to VI V1 V1 VI In VI lA N !n VI Vl V1 '., Vf to In In V1 VI Vl M Vl VI VI VI V1 VI VI VI N !n V1 N Vl to V1 Vl Vl V1 Vl V! Vl Vl Vl Vl V! IA !n !n Vl Vl V1 V1 V1 N VI V1 VI lA V1 Vl VI LA Vl V1 d T,. V! Vl a a a a a a a a �.a vl vl,a a a a a a a a o_..a a a a a a ut W In ,,a a W'.W W W W WW W W a,'Y w''Y Y Y Y Y Y Y Y Y'.Y Y Y Y Y'..Y W Y W Y Y Y Y Y Y ]G Y Y Y W W Y Y Y Y Y Y Y Y'..Y Y Y Y Y Y Y W Vl O m o Ill O o O Y N Y O V! O Vl O IA O Ln o m O Ill o Ill O Y N Y o Ill O Ill O Vl O w O Ill O In O Ill O Y Vl Y O VI I� n 00 H N Vl H H N N m m V N Vl 1p lD I� n 00 H N M H H N N m m V V Ill In lD lD n n 00 H N N H H d a d d d d d d a a a a a a a a a d a m a m d'm a s a'o add a d d d a o a a a a a a o d d o a d a aaaaa aaaaaa a a,a a s aaa a a a a a a aaaaaa a aaa ¢¢ a a a a a a a aaa a r r r r r r r r r r r F- r l- r r r r rm� E E E E E E E E E E E E E E E E E E E E'E E E E E E E E E E E E E E E E E E E E E E E > > 3 > > > > E E > > > > > > > > > > > > > > =,E E > > > > > > > > >'> > >'> > E E > >, C C C C C C C C S C S C C C C C c C C C C C C C C C C 3 C C C C C C C C C C C C C C C C C C m mm m .mm 'A .mm .m .m .io .mm .iam mm 'm .m .m .m .m .io .mm m m m m m m m m a a a a a a a d a a a a a,,m a m a a a a a a a a a a a a aia m s r z s a s o z o s z rr a a r z s s r¢ s a Y T Y Y Y T T } N K } } } Y Y Y } Y Y Y T Y Y Y T K } >- >- } } Y Y Y Y T Y Y Y } T Y C Y Y H H H H H H H H Y } N N N N N N N N N N N N N N N >.M T m M m m m m m m m m M m m m m u u u u u u u u N u N u u u u u u u u u u u u u u u m u m u u u u u u u u u u u u u u u N u u W N OJ Q! O) N N V u N W N N of wN N w wN wh N u U oN oN N of W wN N N W N of N u u 0J OJ C C C C C � C � >>> N of of > Ol C> C>>>>>> N>>>> 01 N N 4J C j C 0! w N 0! w w W w w N N w 0! w w C> C O1 N > > > > > > > > of y O) > > > > > > > > > > > > > > > o! y O) > > > > > > > > > > > > > > > N y o) > > w '.... w 01 N 0/ 01 w of > > N of of o! o w of w w w o! 01 w o! O! > > o! w w o! 0! 01 W w o! 01 01 w o! of 0! > > w W Y ]d ]L Y he Y Y Y w Y wY Y Y ]G Y Y Y ]& Y Y Y le ]e Y le w Y N Y ]C ] Y ]e ]e he Y ]C Y le Y Y ]e ]e N Y 11 ]e Y Vl o m O Vl O m O Y Ln Y O m O m O Vl O m O Vl O m o m o ]e Ln Y O Ill O m O Ill O Vl O m O ul O In O Y Y O Vl -4 Vl Vl w AD N n 00 H N Ill H H N N m m V V m o AD n n n w H N m H H N N m m V o In AD AD n 00 w N N N fO 10 10 f0 N w w w f0 w w w w w w w w w w w w w w w w w w '., 10 w w w w w w w w w w w l0 !0 w w w w N W of W N N 01 N of a! N N W N of N N N N N O/ O! o) W N N of 01 W N O1 0/ N of of o1 n N O/ N 01 0/ N of N N O) N n VI V1 V) Vl V1 Vl Vl N VI Vl Vl V7 VI N Vl Vl V) VI V1 VI N Vl Vl V) V) V1 "'. V) to VI V1 N '... Vf VI In V1 Vf V1 VI VI V1 V! N M V1 t a+ t t t .f t t t+ t+ t t+ t t t. t. t. t. ... V t tr .. t t t t ., .. a+ t t+ a+ ... ..t t t t. t t t t+ .. t ,. t. .. a• o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o O O O o o o o o o o o o o o O o L L L L L '.L L L L L L L L L = L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L VI Vl VI V1 VI Vl N N VI Vl VI N VI m V1 V1 Vl V1 Vl V1 Vl V) VI Vl VI VI V! V! VI In Vf VI N Vl Vl N VI Vl '.. V! V! Vl Vl VI Vl Vl VI N V1 !n E E E E E E''E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E EE E E E E E E E E E E 0 0 o `o `o 0 0 0 0 0` o 0 0 0 o `o 0 o 0` `o o o o o `o `o o `o `o `o `o 0 0 o 0` o `o `o `o 0 0 o `o 'o o `o 0 mmmmmmm'mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmommmm E a a a a a a l a d d d d d d d d d d d d d d d d 'a a a a d a a a a a a a a a a a d a a a a a a a a = = = = = fo fll N N f0 (Q N m m 01 f0 f0 N f0 IO N 70 N 7. @ 76 f0 fO 70 fo fC 7E f6 l0 lD 111 70 f0 7E IC f0 f0 fO 10 fO fo 10 fO fO f0 fO fC m f0 a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a �mmmmmmmmmmmmmmmmmmmm�mmm o! OJ r r ` ` ` r r r r r L L L L L L L L L r r r r� r r r rr r r r L L L L L W w w Ol o! '.. O/ N 0! 01 O1 Njj N N of o! Ol 'u, O/ N N N of W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W OJ N 0! N `1 N `1 N v Ll N `1 N `1 N N `1 01 OJ `1 v O! O1 v W N 01 L!'uLL 11 11 LL LL LL lL 11 11 LL LL LL LL 11 Il I.L LL 11 11 IL lL ll 11 LL lL LL 11 I.A. LL Il LL LL Il 11 Il LL LL W lY 11 LL LL It M d' ti O Z ^E W 0) El l0 O M N M '., N O n m N O M .--1 M V � O M 00 O 01 m V 00 0. N la N n m ', n m N W V V Vl N W lD O '... r` N O M Vl ;tN n rR O 00 0 w .--1 00 00 of V N m 00 m o1 O �--I 6Oi tn'V! 00 a 2L # R O a## O R a N R R# H R# # R## 00 a # m# a cn :m R# R R # A # a R# a ## a'.R A # R # R # R Vl N N m e-i rl O - {n O M N N n e-i O N L} Vl O Vl .--I W N Vl m V 00 O tO n M O N VT V} V1 r-I 00 r, l0 Vl O .--I Rl N'.� O N V O m O r•i V m O N M O W M N c-I M l0 e-I n ei .--I N Vl of N VB m N 0a a+'J ko 'GP N 0 n 4/Y G:} 9"7 CId4 O OR - N o6 Vr"A # Vl R ## C a M R# O# a# n # c-1 a# M' R al R# 41F- # R # a ''... R## a a R A# # a### ## R### a # a R## R # R R # a U a....R a # a R R## # a U R # R# R# a R# R R',# S'C # a a a R Vl V� N m m N O N W 7 V M O V N !-I M m �-I r M n N N V O m C V .--1 ,I-lO M W Ill m '-I c-I N V 00 O 00 r-I W N 00 Vl O W N N Vi m O In N r-I r, N N V N n C LD c-I M Ol V E ' DO..01 10 ci l0 M lO NlO ' M W O V M 00 l0 rl 0 '-1 N Lfl V O O n N ...--1.. M n m V n r�N N N 111 N V M ''... V W V N M r\ r 00 M e-I m lO N V m N M lO 00 m00 N m 'i 00 t` l0 Vl 2 M lO ''... M M N n N �--" m M O. O 0 0 0 0...0 a ## R R R#.....'A a## R o o c ow o ca o 0 0 o R R •••• O'O 0 0 0'..0 O a a R a a# 0 0 O} 0.0 O O O'O O# R R yk a a# A## a R# a A #',O o 0 O 0'0 OO 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 W O N O N m V N l0 Vl W 00 O N a R a### A Vj n O m n O 'k0 M vi V 0 'W' Vl O n m m O O N a R R# R R# R## a R R R# R Vj W M m N Vi a0 .--1 n O M lD m N vi W n O Ill Vf V M m R# R rl N 0:A 0r„I n M1FCI Il) M# R# R a'R R ## R R R a a# a M 'a Vl N c-I l0 lD m V m M m ri m m W 00 00 lO W 00 CH M 00 e-I 00 m n r. t\ n lD n n N r� r,','z 8- of r M Iri r". a a a # a R # M r M al ai Oti ai of o a # a # a R R # a N � v Ili M .4 of r: Il M of I: M .- Oi In 00 n '-I '.. t\ lD w W W Vl m## Ill a R# R# R# R R R l0 �--i 00 m Pw. r, pn m w.1fl -1 VV) ?a R M m '. �--I N M e-I Ill R R # R a R R## R a A## R R M N n N '-I M n v N r` Vl m 00 N l0 O w n e-I Ill m M ', l0 O M d L'i lD r- 00 cr ## a R# R H N m 'q Ill n 00 a1 a R a## R A R - c kR O ,� N M N W N Qo o M M In R '... 4h V}ilT _ V} to th VT a R s# a # a R A a.''a A +n iA to ✓k 'MO-'V& LT V} +h iA # a R # R# a R a### R a'a'.R r c N 4A M iA to M N M N- a}'arir»irr>>>rrrr a a LL LL a LL LL a LL LL LL LL.......LL LL LL LL d LL r r LL i d r LL r d r LL LL LL LL LL d LL LL> LL LL> LL i LL t LL LL r'r LL LL LL LL d LL LL d LL LL>> I""1 n r"I c-I Jl ri J a -I '-1 '-I e-1 •-I ri s-1 .-I c-I r1 ei a v v a a 7 v v a c v a '... v >- ''....'^ > m In In '... vl In i>} ul m i In In r m i In r Irl r> m m i In I'^il v 1n In vl '.... vl en vl vl In vl 1n en vl vl an In 1n Vl V1 V1 Vl N VI Vl Vl VI Vl.. In Vl VI Vl Vl Vl N Vl Vl Vl Vl N VI Vl V1 Vl Vl Vl Vl Ill Vl VI VI Vl V1',. Vl VI CA Vl Vl Vl Vl V1 (A Ill'., Vl Vl V1 Vl Vl V1 VI V1 N V1 V1 V).., to VI VI M ul an LL W m V1 LL VI LL In a_ VI LL V1 LL Vl LL Vf E VI LL Vl LL VI a_ Vl LL Vl LL Ln LL VI LL V1 LL VI Vl LL d Vl LL Vl LL til LL In LL Vl LL Vl LL VI Vl VI LL LL LL Vf LL Ill LL ul Vl Ill'' LL N Vf. to LL V1 '... LL V1 LL VI Vl LL LL V1 LL 0 LL vl Vl LL LL N LL VI LL N LL 0 ''... LL N LL Vf ''., LL LL W Y V1 LL W W ]e W ]e ''. W Ne W ]d W Y W Y ''... W N4 W Y W Y W Y W Y W Y w Y "'. W Y W ]d ''... W W Y Y W Y W Y W Y W Y W Y W Y W W W Y Y Y": W W LL W W Y LL W W Y W Y W Y W W Y Y W Y W Y W W Y Y W- le W ]e W Y W- Y Y le cy N le In O ,-i m r-I O N m N O M In m O v m v 0 In 0 V7 0 lO m lO O n m r o 00 O In O m O In O ul O ',In O In O Y Vl Y O Vl O ul O In O m O Vl - O In O Vl O LL d d LL LL d [L LL LL LL LL d a LL d d d N N M M V V1 Vl tO tO n n OP 1- N In - .--I N N m n1 V V V1 m O lO n n W fL CL Q Q CL Q¢ d LL Q¢ a_ LL Q¢¢¢¢¢ Q ¢¢ ¢ Q¢¢ Q Q Q¢ Q¢ Q Q Q Z Z z Z z z ¢ Q Q a cc: s z cc z z z = Z cc z Of z nc z a- z x z s Z z Z of Z s E E E E E E E E E E E E E E E E E E J J J C J C J C 7., C J' C J C J C J C J C J C J C J'... C J C J C J C m a m a a a d a a a a a a a a a a a EEEEEEEEEEEEE E J J C C J C J C J C J C J C J C J J J C C C J C J C E J E m m m ._ m m m m m m .. 'd C f0 C r0 1 d d f0 LL 2 d d d N �. d LL LL ti.. % LL= m LL m LL m d r0 m LL LL m d f0 m d LL m '.., d m d m 1 m d m d m 1 m d '~, j �,. '"1 44 quqa� ari LN 41 r..w co e.b w a w v w a w u 0 Q �u '4a �U1 N' U v u al u N u '.'... al rcc n: s o: z '''.. zccs s w41F > r r r r> r r>} r>> s r>}>}} r>> r>} r>> µ c a c'c e c c c c c c c u1 u u u u ar n,l V V I.r u v r..r' `7 } vl I^ a } to anw Vl V1 vl Vl Vl In m m V1 In V1 N In ul C x'uy C ar RAJ > aP > R:N > SU > a1 0J A1' ai' > al > 1, a« aF > QY a a1 > al > N > a,6 al aJ nu aF u w! N a1 tll cc,�� QY U GLw V 41 w'rl al cl u QA 41 v w u u w 0 aA al u al u al w' as al w.r Afi a aV � Y � PM al W/' s0.F ad fd tL w Q1 W 41' al' a) Q1 a) `.- » fll ^.«,. ^: `""` Vf wl ""�' vl rro ^ "^- "^* N N M "'� 'vl wrt ""^+ V? Y Y Y Y Y Y Y Y Y ]G Y Y Y Y le C C C C' ri '",q.. w y dA 4� rV'+ .., Y c-I N Y In O '-I Vl r•-I O N In N O M In M O C 1.r1 � O Ill Vl Vl O W Vl W o n m n O aF 01 C Ol C c Q! Ol al' C N O dF C:. G C al aJ ad L.' 41 till C a1 u� C C al C aF C i1Y c G ai al C'.' a7 C C ab p! C aJ C Ol C al C Ol C N C QA ikY L L L L L L L L L L L L u L L L L 00 L ]d tll al QY aJ ad ad ak ql 0.1 dl N&Y OF > ',`� gF :W aF, al Oo a0 al ad /Yi aJ N N a) aJ"i al' N rO rO 10 f0 fO r0 rp ra r0 r0 r0 r0 rO fa r0 r0 ra C Y 7 In Y O Y Ill Y O Y m '... Y O Y m Y Y Y O m O Y Ill Y O aA Y Y Lnie Y O Y Ill Y O Y Y In O Y Ill Y Y O In Y O Y Ill Y O Y In Y O Y m Y O O1 vl a1 m al Vl al Vl O Vl al Vl' al Vl Vl a) Ln al Vl al Vl N V7 al N a! Vl O1 Vl N N a! Vf a/ VI N N m m T Ill Vl w'... tO r\ r` 00 '-1 N '... Ill ci .--I N N M M V V In m l0 la n r` w '-' t ''' t' '., t' t' t' t' t t' t' t' '., t' t' t' '', t t L L L L L L L L L L L L L L L L L 'L L L L L L L L L L L L L O O O O O O O O O O O O O O O O O O N ra fO (Q 10 10 r0 f0 fa N N fa ra r0 f0 ra (0 N ` u 1a 10 ` ra u ` N IQ u N ` rO u fO ` N ` f0 ` f0 U fO L V1 L Vl L M L ',L Vl 'A L VI L VI L Vl L VI L Vl L Vl L Vl L Ln L Vl L N L 'n L L °C Vl Vl VI Vl '' N Vf Vl VI VI VI VI VI VI Vl Vl Vl VI V1 Vl Vl Vl VI Vl Vl V1 Vl Vl Vl Vl VI '... }f t a+ t t t O O O O O O O O O O O O w O O O O O J O O O O O o O O O O O O O O O O O O O O O O O O O O O O O O VI V1 N V1 V1 Vl VI VI Vl V) VI 4+l VI V1 Vl Vl 'n Vl Vl, 0 Ln VI m Vl VI 0 LL LL LL LL LL LL LL a a a '... a LL LL LL 'LL LL LL LL E E'E E E'E E E E E E E E E E E E E E''E E E u u a wQ u u u u `o 0 0o `o 0 0 `o o` oo o` o o `o o` o `o o` `o `o u u o m m m m m m m m m m m m m 2 '''., m 2 m m m m m m m m m m m m m m ^v r`Q ra cn am as m m m ra rela ns en "uti me LL a a a a a LL a a a a a a LL a a a¢¢¢¢¢¢¢ C C C C C C C C C c C C C C Q«¢ C '.'.... C C n> u u G.w w .� w,l u' ii Gr it 'i 're m is m m m m io io io io is m io oa as a io Q is T A.. > > T T > »fin?+ T 3 M T rw yi,.y 4 CIO n1} ''., YPi d0 rile w t0 N fO f0 r0 75 r0 SQ m 10 da 10 11'1 Yp N N fO r0 tl'Q 7 rq *0 +0 C C C C C C C C C C ¢ C C ¢ C ¢ C ¢ C C Q C ' C'. " C C " Q C ''... Q C C Q Q C Q C ¢ C < C < ¢ C Q C '" Fp F H H F- F H to H H H F- F� H H FT t F H '.. o mImmmmm'mmmmmmmmmmmmm�mm3333a3a333333a 1MR N N 1a fa f0 fa f0 ra (O IO r0 r0 N da f0 l0 u au " b"", E p.-`. E p^' as F.,, a �' v H 2 H v v ar H ' H h v v �a a/ '.. 'a' ru 41 �Qa �a v m v a v w v ,/ +a/ ttr' �r � C w C m C ar C w C m C �cu C,. ar C v C v C ar C ar C ar C v C �, C � C m C m C f'^ }"'. &..` k'.' p- h p„ }...H H H FM p... d^ qe, Y- F•. F., N^. aK LL' K K K z ' ac K K 2' K a' K K QC '. M1'bw", K tr a1 T al > N T Q! > W T al T al T al N a! > Ol al N al al W al N al N "I T N T al N T T al T al u N al T O/ > O1 T al T Ol T N T QI T N T al > al > lu T 11 T a! T W al al a1 N N Ol N Qi J W W W W W W W W W W W W W W W W W W W W W W W `1 a1 W al W N W `1 W al W N W `1 W a) W �1 W al W ` W al W v W a/ W N W `/ W al W al W al W al W `1 }. W `1 T W >• W T W > lkk LL LL 11 LL LL LL Il IY 11 ll_ m 11 LL LL LL - - - - W ll,. L1. LL ll LL LL LL LL LL ll ll µ. IA, 11m LL Il lL ll Il LL ll lL LL 11 11 ll M1d. It M O Z W E 0) El O N N V l0 W O N W 00 O N a w co O N m W m w m N m 00 .--I '., t L` O M '... W 01 N o W O V 'rW N w O V W N LO.. O V Cl col W W N W.-I Ln 01 m 1� N WO V 00 M n T m 01 N W lfl �--I n O wm Ol Ln �"� W O W W N w Ln M N O W n Ln V N a W w O .-I .-I N N N m T-tr a to Ln m w w I, m m ci LD N W T 6 111 O LO yi W C O m I-, m e-I N m r LP m W n W m W W N W n w m t m N .--I O m W I, LO m V I, m m 1, O V n V W N Ln m N 0 m m r� to r 0 w ;rN O W l0 7 N O W n LD V c-1 N m t N w r,W m m o T V �'-� O s•-I N V Ln LD W O1 O N M V La n W O v! m m W m LA n 01 O N V L0 W 01 V O 1-: 00 N 1p O V 00 N LD O V 01.. M r, c-I Ln n c-I e•-I N m C LA LD 1, 01 O c-I N M 'tm r, 00 01 '4 V l0 z N O. 01 r L11 M 01 o 00 V N� Ln n W 01 ''-I N- Ln LD W 01 rl N O N N V 1D W O N -;rw 01 c-1 m Ln r, 01 �--I m O w m LA 00 '-I V L0 0) N Ln W O Ln W N w O V W M n .-i M 01 M 1, N LD '... 10 r, W N W .-� n m 01 to N W� C l0 m Ol W Ol C lD V M ti al I� tD N N M M V V V Ln L!1 LD l0 ''., e-I .-i N M m V V v) w w n 00 a0 01 01` '-I - N M d� V Vl LD n W. 01..: VT V} Vl..,. V) V) VY Vf V* V. V} VY VT L} LT 'A Vl V1 Vl V} In V} V} Vh Vh VT Lf Vf V1 'A A^ VT V! In VT V} 'A V) 'o 'A V} In V} Vo V? in VT V} V) O O O o O O O 0 0 O O O 0 M O 0 O O O O O O O O O O O O O 0 O O o u A O O O O O O O O O O O O a00000000000 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 ua0O LD w N w a O LO N w V O w V 0 w N V m Wn lD LA V m N e-I o O1 W r� w u zr O N fV V w W O N V lD W 0 n A N m m w M m w N m w N N m Ln o n m m V m r m V m� m m W m W YS A V M lfl lDWL001Nl!1NO1W0 WnnntDLDLOL!1 V t 01 n W W W 1-- n LD L0 LA LP V V m m N.. l!1 O a W n n LD Ln LP V M Nmm N 0) s•-I n m cn Vl s•-I n M Ol m c-m m Ln r� w f19 L\ r4 L6 Ol M.� .4 L6 01 M n c-I lil 4 YL O Ln 00 M Lll n al `-1 M l!1 n 01 u V Ln lD Q1 a m M '... W RMl W N n N n '... tD cm -I t0 lmD W Dal V r�-I W Ln N 9 n cm -I W LWII N 0�1 4 R 01 N al W W n t\ W lD Ln # e-I rl N '', N M m r C m V1 LD w L` n e-I N N M V V LA 1p n n 00 41 01 A c-I e-I e•-1 N T V Ln LD I� 00 01 V) Vt lh V} V} iR V1 In V1 VT In V1 VT In VT V1.., V1 VT VT V1....,'A to V1I VY. V) i/1 Vf VT in VT VF V1 11 '.. ...'n V1 V1'... to V? VT 'AV? Vw V1.,. V1 VT a a a a.........a a I� } a a a a a a a a......a a s a> r>>>> r r r> r r r> r a r D'> r r r r r r r r r T M M M m M m M M M M M M M M } } V V a V N NN to to N VI N Ln V1 N VI Lo Lo rn to Lo VI M M VI an to IA N Lo V1 N N V1 VI V1 to to LA V �i Lo V1 V1 !n VI to Lo VI VI N !n M Vf VI A VI W VI !n In N N V1 V1 Ln Ln N VI VI M V1 VI V1 VI VI VI Ln N a- Vl. W Ln o o o Lo '0 to Ln Vf o o Ln A LA W d M Vl Lo o o o to o o to N Lo N to N V1 '.: d N Lo to o Lo Vl o Lo Lo Ln Lo w Ln a a a a a a a a a a a a a a a v1 w vL a a m a a a a a a a a a m a a Ln w o a a 0- he a a a a a a a a a w w w w w w w w w w w w w w w a a w w w w w w w w w w w w w w w a Y a w w w w w w w w w w W Y w Y Y Y ]G Y .. Y Y ]m '.. ]o ]G Y ]C Y Y Y w w Y Y Y Y Y -e '.. ]d ]e Y ]0 Y Y ]d Y ]e w w ]e Y Y Y Y Y Y Y Y Y Y N Y O 4l O LA O Ln O to O Lf1 O N O LA O Y Lq ]C O Ln o m O Ln o m o Ln O Ln o m o Y Y o m O Ln O Ln O 0 O m 'i N LA a-1 e•-I N N M m V V Lf1 N l0 <D n n W 1- N Lf1 1I N N T 17 V V L1 Ln L0 T n n W v/ N LP '-I i N N T T T V Ln LA o_ o_ o_ a d a d d a a Li. d d d a a a a a d d a a m d d a a d d d d a d d o_ d d a a d add a s a a ¢ a a ¢ ¢ a FT z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z E E E E E EE E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E' E E > > > > > > > > > > > > > > > E E > > >'> > > > > > > > > > > > E E :3D > > > > > >,> 7 C = C C C C C C C C C C C C C C C C 7 C C C C C C C C_ C C C C C C C C 7 C C C C C C C C C C C � C - ... C C C C f0 m E 2 12 -2 2 10 12 M 12 12 .m .N •f0 � (0 'f0 •IO '.. m m m lO g m m Ill m IC m m - � m m RI m m m m IO f0 fO m a...fO a......a a.....a a a a a a a a ma m a a a...a�a a a a a d a a a a a m a m a a a a a a a a..,a a,. w of K LY li' K !Y K K o: z z z z '...... K CC a' K LY W W o: o: Lr z } r} r r r r r r r r} r r r r z''} o r r r r r r r}} r r r r r r i W} r r}} r N r N N N N N N N N N N N N N N N Y M r m m M m rn m m m m M m m m m M r r V V V V V V V V N U N u u U u u u u u u u u u U u u m u m U u U u u u u u u u u u U u uR�r u't u u u u U u u u u u u ywj U w w w h w w w w w w w w N w w U w u w w w w w w w w w w w w w w w U u w w w v w w N w w w �vNi C N N C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C w w w w w w w w w w w w w w w C C w w w w w w w w w w w w w w w C j C w w w w w w w w w w w w > > > > > > > > > > > > > > > w w w > > > > > > > > > > > > > > > w w > > > > > > > > > > > > w w w w w w w w w w w w w w w> > w w w w w w w w w w w w w w w> > w w w w w w w w w w w Y d Y Y Y Y Y Y Y Y Y Y Y ]e ]C ]C Y w Y w Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y w Y w Y Y Y Y Y Y Y Y Y Y Y Y O Ln O Ln O Ln O M O LA O '.. mO Ln O Y Y O 'Ln O o O Ln O m o LP O m O Ln O ]C m he Ln O M O Ln O Ln O Lll a -I N Ln ri a -I N N m m C a Ln Ln w ''... w r, n W N N r-1 .--I N N m m V V o M W LD n n W N o N N M M a V M M U U ` ` ` U U U ` ` ` U U ` ` U U L U U U ` ` U ` ` ` ` U ` ` ` ` U ` ` L U ` ` ` '. ` U i U U ` '. ` L ' V1 W VI V7 VI V1 VI Vl V1 V1 N to Ln V1 to V1 V1 V1 N V1 W V1 h V1 W W V1 M to vl VI V1 V1 VI N V1 VI N Ln M Vf ''., N V1 V1 W N V1 ', W VI t t t t t r t t t r t it t t t r t t r r t t r r r t t r t It t r r t t t t t i r o r r r r t t t r O O O O O O O O O O O 0 O O O O O O O O O O O O O O O O O O O O O O O O O O O O O '.. O O O O O 0 O O L L L L L L L L L L L L L L L L L 0 L L L L L L L L L L L L L L L L L L L L L L L IL L L L L L L L N V1 VI Vf V1 of o VI oV1 oN o"'. N oLn oN VI VI N Ln VI V1 N VI V1 N VI N V1 V1 VI VI V1 N ut V1 V1 Ln V)': ut V1 VI VI VI VI ''.. W Vf E E E E E E E E E E E E EE E E E E E E E E E E E E E E E E E E E E E E E E E E E'E E E E E E E E `0 o `o 0 0 `o o `o,2 0 0 0 `oIo `0 0 0 `o o `o `o o `o o `0 0 0 0 0 2 o 0 0 0 0 `o `w o o `o 0 0 0` o 0 oI`o `o a a a a a a a a a a d a a a a a a a a a a a d a a a a a a a a a a a a a a a a a a a a a a a a a a u u u u= = u u_ u u u_ u u_ u u u__ u u__ u u u_ u u u u_ u u_ »5�5.?55V-V-S?S>55>555S�'5 5>55555.�>•>5�55555> 55'57 55 S> m io m m io io io ra m is iu . m m m m m m in iu ru m m m io m m io io io m m io is m m m io io m m is is m io iu m m iu C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C a a a a a a a a a a'a Q a a a a a a a a',a a a a a a a a a a a a a a a a a a a¢ a a a a a a Q a a m io m m io io io m is �o m io io io io � is is io m io m m is io is is m m io io m io io io m m m is is io m is m m io io m io �7 � � � � F � � HIS F7 F 7 � � � � F- i- F7 F7 F7 F7 F 7 ru m -F. m -F. -F. iu m m �o io io io m m �o m m m m -F.�a m iu m m io m io -F. �a m io io io 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 313 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 w w w w w w w w w w w w w w w w w w w w w w w w w w w w w. w w w v w w w w w w w w w w w w w w w w C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C w w w w'. w w w w w w w w v w w w w w w w w w w w w w w w w w.. w w w w w w w w v w w w w w w w w., w w 2' K''.,K K K'...K v w w w w w v w w w v w l w w w v w w w w v w w v w w w w v w w w w w '.... w w w v w w w w w w dT vw..�> > > T W w w w W W W w w W W W W w w W W W w W W w W W w w w W W W W w W W w w W W W W W W W w WwW W w w w w w '.. w w w w w w w w v v v v wv wv w ar ar w v a v v ar v ',, v w w (,u v v ww v w v m v v a w 11 w LL imjLzL 111 I.11�lL�ir m M II11ILLtlLLullZll 11 11 111.1. LL LL LL LL LL 11 11 Il LL LL 11 11 11 LL''.LL ll LL l.L lL LL LL LL�LL 11 LL LL,LL'LL El 00 # it 4 Ik m I.- w w N m m m m "1 00 N w O It It :It A N r N w O N m m N Vl m -1 r' w i-{ O 3 * Ni m V N O n V N m w u) It ### w m m m m 00 00 00 n N n 4d1 AD :mx# It ul m m .� m m m .� In m M N w CO it It a # N N I� V N m L .--I 01 k f+*li .ti R0I i I. m # If # a-1 M 00 M In lD 00 O N M $n N, m � 424 m# It # S N N N V lD 00 C (n Ill (l m -a M D Op # u l c-1 e-I sH°. N N # # # # 7R VT N N 1/T''.iA u? VT VT vs 90 4'h V} 'V^ Va ##It# a000000000000000 a## It # 0 0 0 0 0 0 0 0 0 0 0 0 0,0 0 #### h n .--I V V w m a -I m an I, m N V w w :g # 7t # # lD 4^. w V N- m I, an M N O w w ## YI ## n lD m V N .-1 O ''. m w I, N V # Yt It # :m ## mr m m m v m Kt am zt m a m y ZZ u u## N N m zt '... I, m N V n m N tt # It # # e a al}.,^.i Vl i Vl Vl ■n V} V} to w °.�° m ui Iwn m o a A m� °.�° wIN m p m o p m w m w 0 0 pl�lr, c-I m-Zt m w m a O m m V m M O O1 V m m w w o 1- V w O N V lD m N N m w w m I� w ID m w m V m m N N e-I m w m w 1, n w Ill m m o N n v m .--a '..... m n m m H m m m H m n m o .--i m In gy m. O00 Ill V V m 7 c M 00 M 00 oi I� N n N n '-I lD r n N V lD 00 O (Vl I, N O n w o m I, O� n- V w r-I m w N Vl m an w O o o w H N V R V7 m w T I� r-I aD O V m m N N w O Ill m w N w m m lD N m M M rl '-I N N M M M f V Ill N l0 aCi 1p c-I '-1 N m" M In In,.n In vA n vlA t un n ..n .n j� vA n n vl n an 0 0 00...0 0 0 0 0 0 0 0 0 0 0 0 0 0 0,0 0 o o 0 0 0 0 0 0 0 0 0 0 N V m N w N N 00 N lD O 00 V 00 N lD O V 00 c-1 T N N 00 '., I� M m M, M V w N m an M O w N O .--� m m m w m N N a--1 an c-I w Vl N O W m m c-I w w V .--I Ol r, V N 00 N O N- an N 00 00 00 00 O O m m m Op 00 06 od 1-: ',. n N N w w w w N o H m w m w N v m w w w m m m m m m m m m m m m m m m m � m m at m It n m v In w m v m v m v m c m v m I-m t m N w m v N m n v m M '-1 ei N N M reV N M l0 lD r. r. c-I 'T M''... V to t/} b!'4 0.+MIVM.'oa°4.'%n In an to td'M44 Vl V X/ in [n CA ^6A1, n NA Gi Yn 1/1'., In i al 0.. lL d d o_ a a a a,. ' a a d a a a a a0- a o_ d a ¢a. ca.. o_ a, a... a. a C,. d a d a a o_ 0- 0. m CL CL m D_ p... m m d ''. C m d d '' d d 0,an d � N N N N N N N N} f i1 }( m m m m wN d<l Vl M VI ti M"b v^+I M Vl Vl M N Vl N Vl Yam. In e✓Po ., h Vl N Vl N N to Vl 4n 5d9 I VI V9 MAp tiAY l/I uFM to to M to M VI m V1 VI 4i"# Id"I Vl w w w W VI a'ery V7 Vl VI Vl a'+i VI VI VI Vl r/S 0 Vi V1 Vl LAT Vl VI VI In Vl W�4 VY Vl 4wd MM tfA Afd A/4 Vl 0 0 0 0 M 0 0 0 cry ':Cy Vl Y 'X Y Y Y VI 11 In 0 N 0 Vd Vl to N N xIp V1 ai"p N a%1 1aA Vl an VI !n N N 4// cfW VI 4a'l 'IfM M+M1 dJ1 N Vl In In Vl !n !n N ✓1 4lA W'V an O un O to O VI w1'V D- d d m 06.. d 0_ a m CL m flJ.. O. m 04 L, w Ln C d d tx m LL aaa OS. 0. m G. n- C LL 0_ to d !n LL m m U% " d w 4p I, n w m SII, w w w w w'� W W w W w w udJ w w w w w 1 W W W w uj W w w W, 4aA uua w w w w 1 w d W W W 4uy' w w &Nk Y Y Y Y Y Y Y Y Y X ',y„+ Y Y Y Y W Y W Y Y Y Y 2 0- a 0w a Y an. O an O an O an O an O 4n O Any O an [� Y Y O m O naY9 �QH Qh^ ¢Fs- �W- �¢F� a6¢.--i. . NIh¢¢-. 4pmA_ whQc3--.I ',, �0..ti p¢Na,,. QN, �M Fm¢-. � ',. Ha Haan C'tlF�N1'.4.., M10Y.DW.". NR�:ib.. C!I"�'4-., .n4P'.- . � �Opq. NraQ-1 �d¢N.".....Md¢an- F'¢--:1. . 'aHi HNo_ laI¢A'+•A. PaN¢ryL-.. . ci0F¢n O24¢+Lat- gONckFI..,� $w[mQ �O i¢ann•- 0 ...WYr¢- Y�kheOi cDo NQM"T' EO 0da d [La a. oa 4¢ k-- E E E E E C C C C C •� •� •� ' N m > > J 7 7 J J J J 7 J J J 7 7 � 7 J 7 "'. J J 7 J J '', J J J 7 '', 7 7 J J ,n � �n J '' 7 7 7 J _7 d D_ CL d a a a w d C [L CL S d C 7 O_ 7 w ll ''l1 d ll 11 d 0_ CL 0_ 0_ 1 D_ D_ a: 7 ° a o 0 0 0 0 0 0 0 0 0 0 0 0 o a o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0° a o 0 0 0 0 a'a` a` or- Cc:. ai..a a o`.....'a` a a..a.....o`o`'..... o....a o a` a.....a a a` u 4L u u u m- m'- mm m m- m m m m''....m m f0 m m m m- -mmm m m m -- ,...a-aaaCLCL aaaaaa-a maaaaaaaaaKEa:ELaa C C K lr LY LC K lr K 0' C CC C z ''... K K 2 C 2' K K K OC lr Of N Y } Y } } } } } } } } } } Y K t}YI K } } Y Y } >-N N N N N N N N N N N } N N N N} } T T M M T M1`J aA 0A 0.! a/ � 01 a y aA 9r rar as ru qr y +u'.. ''y' 4r 4r ar ua y u u V r u u u u u u u 41. u a u m U, m u nor u.r 'u .w Y Y Y Y Y 03 'w.,, N 'ww YP 1 uh yy. yp U' U aJ Oa 0! OJ 01 O/ 01 01 01 01 0A �L gJ gyay r„q N Ww w qlg O an O Vl O ury yr u1^... ^+w ^r.� 'n+..00 L L L L L C' C C C C C C C' C C O', C C C,' C C C C C C. C C xrb C C ` C > C Ci» 0a 0a aU 'aA 0a lll tad d7! at as aA GL W' 0a C W C aA 0a 0 0 01 #7.. aA N a/ v 0a L` C IG C � � C C C �� �.. al 01 cai > > > > > > > > > > > ? > I N > > > :? > > > > > > ? 7 > CM > > > >> N N N N N W Y qp t9 0 ""' aA w as w ' ' N > aA 4! CkA tluN al 0B m al al aA m aN Oa Ua 0a > > 0a as aA 0 w Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y WN Y W Y Y Y Y Y V1 Vl V1 Vl to '..In Y Y Y Y Y Y Y Y Y Y Y Y Y ]C Y Y O e Y O ul O N O m O In O Vl O ul O m O Y u? Y O m o In O m o m o m o Vl O m O Y In Y O M O m O N L!1 r-I ci N N m m V an Vl Co w Pw. n 00 rl N an ti c-1 N N m M V� In an w w n n 00 r-I N an .-I r-I N N m O O O O O L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L u u u u u u u u u U U U U U U U E � E E � U U U U � N M n 10 as as w al (0 w (0 w (0 N N (0 aw (0 (0 (a (a (0 as w (0 a0 (C w w w w w w (U w al (a t0 w (0 al w a) (0 (0 (a m E E E' E E a a w m a w a w a a a m m a a a a a a a m m a a w a a a a a w a a a a a, w m m a v a (v w v v n n n n n n n n n n n v v n n m m n n m m � n n n n n n n m m 0 n n v n n n n n n n w w w 4 t. 0 o 0 0 0 `0 0 `` `` ``````` 0 0 o 0 00 0 00 0 0 0 o 0 0 00 0` `0 `` ``` ` o o0 0 000 0 `` ` ` ` 0 0 0 `0 °000 o `0 L L L L L In a a a a a an In In m vl anLLan L Lm L LvLLmLLnLLenLLmL .. L(nLLm LLn L an un u E E E E.....E E E E E E E E'....E E E E E E E E..E EiE E E E'..E E E E.....E E'E E E E E E E E...E E E E O O O O O O a O a ' a O O 0 O 0 O O O O a a O a a O 0 aO O O'O a a aOO a a OO a a,mcm I--mmm-m'm-mm- mm- mm-mmmmmmmmmmmmmmmmmmmmmmmmm C C C C C a a a a a a a a a a a a a a a'a..a a -E a: a s m a v as v m ea m rra, �.. m mm mn ral ra ma tFA ro ro ru is m I ecr mz m m ra ms m GIs rca m (o m m�. ra axe riz Mn m as wv in C C iy. C C C C '4: im C I C C C. C C C C C C'. G C C. C C C Or I C � C C C C C C C. C C C C a1 < Q ¢ Q '= Q ,� Q Q Q Q Q Q ¢ ¢ 3 3 3 3 3--- m m m m- m- a. e a, l uA a w m v v a, m y ar ' as ,Ca w' ,(a��a. v v v v MvAa°ra m m m m m m m m m m iamv v a!a, ar L .t L c L _ '' L M^ a° k'- N^ p-^ - .aC 'rr .o H H H P-- H- A- s-- G^ A"` -- as a! M1'U qi1 OY 9J' Oa � 4L 41., CU OJ Od @/ C{fl W w w w w w W uu w w w w W w W as +ter ma a, v v as E �'... as w u0. 4lw ll LL GL. 6C„ LL. LL El W N W C O o ry W N A# A## N Vl O O O Ln Ln N N Ln # A R### A D1 Ln n Ol N CF l0 W O N# LD N N lD O M n Lfl T# A A R#�� C..m '-I a0 w lfl N Ol lD � A # R R# N n N LD W O N h Ol c-I M Ln Ol n n W W O O Ol m Ol m o6 W n O Ol e-I W lD M o O W .-I r m V N ci n m V w R # R # A N cy a-i LD w al m m � m M Ln m n N. al �i o M o to m lD W W u V O V V m Vl 1-, c-1 W n m..o w m m N n O m O - W V $ A# # LD Ln O c0 m Ol rh Ol Ol m Ol Ol c1 rl cl W W A # # A A # A A # # Ln M m m r a) '-I V LO atl O N# `. O O1 Ol m ., 00'' 00 h I� n LO VI Ln A A R## N c-I lD m O I� O0 N N$# R# A# A N N I- LD c-I Ln N W 00 N Lr rl N N w 1l r m �"� oo n# A m w o o V �--I m n o lO r � ll M �'-� N o O Ln m Ol• N W w W m## Ln R#$## A A R W O w N m r e-I w N V m m r N Ln o m lD LD w n R# A R# A# A# A R# A A N N N V LP m w h L- 00 D1 al• # A e-I ay '-I N' M V Lrl' l 1p n . II Ol A # A # A # R # #' A e-I c-I '-I N Lrl' 4 Lr l0 '', r w m # A A # A # # SdM 14J4 ypq iA i/F 14 V1 i/} to R N iA VT iA t/F U'A V} N. VY Vl I a'"b N A # R # # sfM '�, il} Rr"M VY N, N 'A iN o o o o o O o g a o o O O O O O O O O O O O O o O O O O O O O $# R A R # a R a A o O O O o O o O O O o O O O o O o o O o # $ a S # A yX a # a $ a # a A O O O O o o O o Ln c4 o n O w O N O w O a A A # A$ # O w O V w w a- w V N O w w o0 A $# A R A R A m Ln O O O Ln I Ln lD Vl Ln '., I� W A # R# A R A# # A A $ R$ A R ri w ,� ^ 7 V N M O Ln LD n N n ''... N.• #A m M ul M N n N w m N � w Ln O t j W N R# A A### A A # N O M I- n LO w lO' Ln Ln ### O n O .--Z D1' 00 ci 00 r �--I n LD LDO m Ln A A R# # R R A O .--I` 00 W n n LO Lf1 Ln A ## R # R # R R A # R# R V O O V Ol a Ol a m C A A R I, LD N M M M M 0 M M M M## A R R# N m m m V m V Ot a Ol A R# A A A# A R# A A V N 01 N M m N lT n V N Ol W n R# A Ol .--I M N D1 Ol N 01 m 01 V D1 o Ol w 01 L, O1 w tT Ol A R## A S-I A N V W V n Ol N V n Ol 0 mAA$ A A R# A#R# A# A$ A $ N LP Vf V/ w iA I, VA Lb RJY ins Ol # A A R # tiA .--I to e•-I to 4n ull "A 'A N 1h. N, $#A# A A R R R A ^A/b V1 N. N- �, t/1 VI 1n v1 an # A A R A R # a a a a a a a a a a a alo a a a a a a a a a a a a d a a a d a a o_ a a a a a a a a a a a a a ala'a a a d a a s d a a a a a a a a a a a a a a a a a a a a a a m a a a a a a a a a a a a a a a m M m m m m m m m m a> i a> > a a a >'.} a a V a a a a a a d a V a v a a a a a 7 a a a V a a> a Ln a } a Ln a Ln a Ln a Ln Ln Ln m m Ln Ln Ln Ln Ln Ln Ln Ln LA of LA vl Vl V1 Lil Vl LA Vl vl '... Vl LA Ln Ln Vl ut '.. V1 N Vl vl VI v V1 Ln ¢ N LA Vl vL Ln !LA Vl vt V1 an Vl vl'Lil Vl Vl vl ul an Vl LiL Vl vl VI ut Vl LA Vl LA Vl Ln Ln Ln !n Ln Ln Vl LA Vl LA Vl LA VI Ln V1 Ln Vl. vl VI Vl ut un vl Ln Vl VI vl Vl an Vl ut Vl vl Vl Lil N a W Ln VI a a Vl a Vl d Vl. a Ln d Ln a Vl a A a Vl a V1.tA V1 '., W Vl N Vl d LA d VI a Vl a to a ul a LA a Vf a to a V) d Vl a Ln d Ln a to a LA a Vl LA Vl a Ln V1I N d lA a V1 a Vl a LA a '... Ln LA a d LA a LA Ln a a Vl a LA a Vl a LA a LA a w Y Y w Y W w Y Y W Y w Y w Y w Y W w w Y w Y W Y a W Y a W w Y W Y w hd w Y w Y W Y W Y w Y W Y w Y w Y w Y W Y w Y W Y a w Y a W w Y w ]e w Y W Y w ]e - w Y ]e W ]& W - Y ]G w Y W ]e: W 14 W ]e LL Y c a N n Ln a Ln o ',. Ln o o O Vl w O n m 1` O w- Y N Y to O m '-I O N Ln N O m Ln m O V Ln V O Ln Ln Ln o <D Ln LD O n Ln r O OP Y ry N Y Ln O 1- Ln 1- O N Ln N O m Ln O m Ln O Ln Ln Vl O w Ln w O n Ln n O 00 Q Q m V a a V a l!1 a Vl a lD a a a a a a a a rl a a a a¢¢ a¢ a a a a¢¢ a a a a a a¢ a ¢aaa ¢ a a¢ z z z ¢¢a¢a¢¢a¢¢¢¢¢aaaaaaLiaaaaaaaaaaaaaaaaaaaaalaaaaa a¢¢ H<<H< H F< � � a N � a o m o a o J a a a a a a a a a a 2 a2 a a',a a a a a'a a s a,a a a a 7 a a a a a a a a a a a a a a a a a a 0 0 0 0 0 0 0 0 0 0 0°- o 0 0 0 0 0 0 0 0 0 0 0 0 0 o D° a o 0 0 0 0 0 0 0 0 0 0 0 0,0 0 z o d a d a 0 0 a a s a` m a` d} r a a mmmmmmmmmm a a a a a a a a a` a a mmmmmmmmmmmmmmm a` a a a a` a Li a` a`a` mmmmmmmmmmmmmmmuau Li Li a` a` a` E .� } N a s aaa a a a a a m —° a a a a a a a a a a a a a a a a- a a a a a a a a a a a a a a a a w N C w CC C lY C } K } K } a' } a' } a a > K } K r K Y w Y Of Y K r 5 r K > w r w Y W } Of > '''.. tY Y K r K r a > a K > 2 Y C r C r r w r > w > 2 w Y r C > r C Y K > K r L�ii C> C w C Y } m m r m Y m r m m m m m m r > C 7 V� a V C V V � 7 V} Ln > , Ln Ln Ln m Ln m m Ln Ln Ln Ln Ln Ln Ln Ln > u u u u u u u u u w u V H u u u w u w u u w u u u u m u m u u m u m u w u w Ln u N Ln u u w u m u w u w u m u u w N u w u u w w u w u w u w u w u w Y W w w w w w N N w N u N N N N N N C C C C C C C C C C C C C C C L L L w w w w w w w w w w C j C w w w w w w w > w > w > w > w > w > w > w > w > C w > C w w > w > w > w > w > w w > > w > w w > > w > w > w > w > w``` > > > w w > w > w > w > w > w > w > w > w> w w w Y w > O > w > w > w > w > w > w w w Y w Y w Y w g w Ne w Y w Y w> Y O w Y > w w Y w Y w Y w Y w Y w w Y Y w Y w w Y Y w Y w Y w Y w Y w Y w. V1 w V) w M Y Y Vl o m V ie m V Y O m Y Ln Ln Y O w ]e m LD Y O n ]G Ln F\ ]e! o Ll0 ]e! A N N Y N Y o c-I ie m ci Y O '... N Y Ln N ]e j o '. m le Ln M Y o '.. V m a O Ln Ln Ln o LD Ln '.. LD O n Ln n O 00 ]e .--I N Y Lfl o .--I m ci O N Ln N O M Ln o m a m a O Ln Ln to o LD Ln Lo o r Ln n O 00 t'_ t'_ t'_ L L "IL L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L O L O L O m m m m m m i m m m m m m m m i m" m m m m m m m m i m m m m m m i m m m m m m i m m m m m m m m i m m m VI E'E VI Vl E w..w ww w wow w w w w w w w w..w wow w w w w w Vl w VI w Vl w VI w V1 w Vl w to w VI w Vl w Vl w V) w V1 w V] w Vl w w...w Vl Vl '.. V1 w w V1 Vf w Vl w V1 w V1 w N w Vl t a+ a+ .f a+ a+ t t t a. a+ a+ t i. s+ •+ a+ t t tf t'_ t'_ t'_ 4 t t t tf s+ a+ a+ a+ a+ a+ a+ a+ a+ t '"� t t '"' i' O w O w O w O o ''. o O O O O o o O O O O o O ", O O o O o O o 0 O O O O O O O o o O O O O O O O O O O O O O O12 `O m N Vl VI '... ✓1 Vl to ''... [n Vl Vl VI to Vl Vl VI Vl '.. Vl to ''. VI V7 Vl VI Vt '... Vl V) VI '... VI Vl Vl Vl Vl Vl VI V1 Vl Vl Vf V1 to Vl Vt Vl Vl VI Vl V1 V1 a m 1 E E E E E E E E E E E E E E E'E E'E E E E E E E E E E E E E E E E E E E E E E E E E E E E E `oo `o 0 0 0 0 0 0 0 `o `o o` o o `o o` `oo `o 0 0 `o `o `o 0 0 `o `o `o o `o 0 0 0 0 `o `o o > 0 0` m m m'm m m m m m m m m m m m m m m m m m m m m m m m mmm mmm m m m m m m m m m m mlm m m C m C m C a a a a a a a a a a a aaaaaaa a a a aaa a a a a a a a aaa a'a a s aaa a s aaa ¢¢ a ===w=u_=mmm w v v m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m C F C C C C C C C C C C C C C C C C C C C C C C C C C C C a C a¢¢ C C C ¢aaa C C C C ¢ C a C C a a C a C C a ¢aaaaa C C C C a aaaaa aaaaa ¢ ¢ a a a a a ¢la a a a a a a 3 3 3 mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmwww L L L L L L L L L L L L L L L L t L L L L L L L L L w N C C C L L L L L H L F- L H L F L i- L H L H cc w w w w w w.''.. > > > > >. >. w >, w > w > '.. m > m > m a, ai w w w w w w w w w w w w w w >, w w T. > w > w w > > w T w > w > w > w > w T w T w > > T T > > > >. >. w w w w w w w w w w w w w w w w v w f w v v w w a v v v v I,�, 11 11 LL LL ''. LL LL LL LL L.L LT LL M lz LL W E LL m LL I M m Ll.. E L.L m LZ W m z ll LL LL W LL LL LL LL 11 LL 11 W LL 11 LL 11 11 11 El . ..... M n- 1l1 m M V C, N- O V .0 00 V w to V l0 V N O M l0 M W� N O M 0 n ., e-I V 'Zr l0 M �--1 M M n M N� W M O l0 O N Vl m N Vl m .-I 'S"!' 00 .�-1 1n 00 .--I 1+1 Vl vl M O V .ti 00 v1 .--i '. c0 N Ol l0 m O l0 M a0 n1 00 O O l0 n n n n n V c7 � V 1n N O n V N m w'... Vl +o m n V c m 7 m M',.m V 0 1n m C m m O a m V m m W w Vl n C l0 O N C lD w o m n m .-I m m m m w w w n n n n lD l0 W l0 m N N m w w w n l0 w m V7 0 V m m N N ei ' m w m w n n t0 m V m m N e-I 0 O m N H 1n m m n H o m m n H v1 m m o n n m m H m n ''. un m H m n m m H m n m 0 H m 1n n m H m 1n n m H m '... m l0 v N' ai )D v c ai 16 ai 4 o0 10 1ri o oo` Lr : i Di v ai ff 06 ff ao m r,� N n 1-i rz, r4 6 r--� r. N 4 16 00 0 1T Lr n US . v k 00 0 M M LD 00 0 N M Vl n m O N V 1D n N o n l0 o M n o V n .i t 00 H ul w N m m m t0 0 In O 0V rl l0 N n N n M 10 00 c m m n m .-I m. W 00 O N- V 1n In 00 M n .-I ''.. 10 O� m M In N t0 O ''... V1 a lD n 0o rn m lD N m M N 0o m H 00 V N N N m m m a-1 .-i N N RI f11 rr V %F 16 m o l6. lD e-I .--I N (vl rr V Vl Vl 1D n n 00 m 0 0 O O O 0 o 0 0 0 0 0 0 a;J O O o 0 0 O O O O O O O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O 0 0 0 0 0 0 0 0 0 0 0 0 o O o o O 0 o O o o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 V lD m rl R1 1n n m N V 1p 00 O m V N 0Q 00 N p]' N lG C) 'c� 00 V w N 0 O V w .--1 m N N w 1, m m V1 H n l0 N 00 V , V N .--I m '.. n M M N O 00 0 WN m .--I M� W N M V) N 00 1n ci n V O n M 0 l0 N O H rn m M 00 M n N n c-I l0 .--I 1n O n w In � N H O m 00 n W M N '-I 1n '-I 4D W"I P-j 0 00 V) M H 00 w V H m n N o0 N O N m u1 N 00 VI .-i 00 ci n m 01 a1 Ol al CT m 00 00 00 00 00 00 d 00 00 O CP m 00 00 00 00 n n n n 10 1D o w N o .--� al 00 00 00 n n n '.. tD lD lD V1 V1 0T, Rd- 0) v m v m v m v m a m v m r,i m' oo ao ut m m .... m m m m m m m m m m m m n m m v m a a) zr a) t m v m Zr u v n 0) N V n m N n.m N V P'w m y m w m y v'm az m v m V'...a V m....a m n 00 m V N m n-;t m n V N 0) t, 0z r-I e-I e-I 1 N N N N ff1 ml m Mi«-1 «y N N m m V V m m LD 0 n n H N N m 4 1/1 In lD '',. n 00 00 '', m AMC V,F 'n 'A VT V) V} V} V? V} V} VT VY V} V'L V1 to U"+ V'- 'V4 VA..''A V) V} VT VT V} Vlih V} VT V1 vf. VT VF NM W1 Vi V1 'n V? Vf VT VT 'n A Vl % n V1 . a''.a a. a a a a a....a a s a la m a s aka a...'a a a a C0. a a m a'.. a a a a a a 0, Q0. (L a a cl,a a a a a a a a a a a a a m m a a a a a a a m a a a (L a a m a. a a a a a a a a a a a 0L a a a a 0. a a" a m a m a a a rrraV-rr�- rr>rrrrr'a>`� rr ti-'i'',rrrrrrr;i-irr',a>ai-r''r>>ra-r'rrrr ~ `� '' '� `y "'� `""� '"'� `"� '"� ' •"� ."� ' ."� ."� ."� ."� } N 7= N N �N N N N N N N N N N N N N'} M} M M M M M M ttA m M M M M m V) ul VI U1 V) Vl J5 Vl V1 V1 Vl V1 Vl V1 N N N Vl Vl V) VI V) u1 UI V) ., VI V1 Vl VI VI M VI M V1 Vf. VI V1 VI V1 V1 Va V1 Vw V1 V1 Vl VI N V1 V1 V1 VI ury Vp7 V1 V1 V1 V1 VI VI VI V1 V) N m 4d'b V1 V1 V1 V1 V1 V1 V1 V1 M V1 V1 to V1 V1 VI VI V1 V1 V1 V1 u fJT 0 M1A V1 V1 V1 V1 V) V1 V) V1 0 Vb T '., V1 0 V) V1 v) V1 0 V1 V) � V1 V1 Vh v) V) V) V) V) V1 V1 V1 VY ✓1 V1 VI V1 V1 V1 V1 V1 V1 V1 V1 V7 �A•9 V1 V) V1 V1 V1 a a a a a a a fu a a a a a a a 1n a 0 a a D,. a a a a a a a a a a a a 1n a 1n a a a a a a a. a a a a a a w w w w w w w W w w w w w w w a W a w w t,t w w w w w w w W to w w w a W Y Y Y Y Y Y Y a W W W w W w ryyY w w w W W W mK' 'bm Y Y Y Y Y Y Y W Y Y Y Y Y Y ]d Y Y Y Y '.4 Y Y Y w Y w Y Y Y Y Y Y ym Y ]e Y Y Y Y O m O m O V) p h%t O N O V) O V1 O Y m Y' O m O V1 p V) O V7 O 115 0 to o m O Y ul Y O an O Vl O u1 p u3 O aa1 O V7 O N m M IT '4' V) 1n l0 T n n W .-I N Vh .-I ri N N m m V V 1n m Vo Zp n n w ei N 1n r-1 .--� N N m M q' m an w to n aaaaaasiaaaao aaaaaaaaa'aad adaaaaao aaaaaaaaa .a a aaa a a,a a a a a a a a a a a a a a a a a a a a a a a a a a a ala a a a a a a a a,a a a a a a a a a a r F H I S H H F 7 F- F- F 6 ~ F Fm F F- H F F H F F r z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z''z z z z z z z z z z z z z W a� z z��� z z z z z z z z z a p z z I��� z rs z ar z z z z z z z z z z ue z z z tic z z z s 0, a'a a a a a a aaa a s a= a a a a a a a a a s a''..,a a 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o a o a o 0 0 0 0 0 0 0 0 0 0 0 0 0 o a 9 a o 0 0 0 0 0 0 0 0 0 0 0 0 •0 m m m m +a m..m m a '° a m m m m m m im m,im m m m a m m a m a m m m m m.'...m im m m m m m im 1O'.a a a a a a: am a a..a a a'..a a s 1O a....m a a a a a.........a',.a a a a a a a z.....z zz........z z,....z z } r r} r''r > } r r r } } z > z } r.}.> } r }.} } } > } } N N NI N NI N N N N N N N} m Y m M M M M M M M M M M M M u u u Q U U w 0td N U N i'.7' U U U bn U' U U 4J U la m U' m aY W W W W W W ffiY W cLN WJ' �!Y "�M i4Y : y G1 4 L1 w , IJ L7 V 4�A k.Y a i4W V M1J 4J' LI tiJ u a �r m� n� a�.' an an au w oa w nr �u.. :lz . �. ",.'� w ,:" ui... c '` `*2 ,w "T d "�.7' ,.+ „wr. .*^�,. ra +�n ur ^m �' c a c c c c c o c c c c 4 a c a c vw c c. c c c e c an e c a c c e C, c m W a as W W' W W W W W W W W W c W W as a y W W W +u W W W w W c c W W om c c W o a W q eu W > Y Y Y Y Y Y Y N Y Y ]8 Y Y ]G Y Y W Y Y Y ]C W Y Y Y Y Y Y ).�' Y Y Y 0V Y W V7 M Y Y Y Y 0 Y Y le ]e Y ,G Y Y O vl O V) O u) O 1n O M O N O m O Y Y "p 1n O M O m O V) O m o o O M O Y Y O m O V) O Vl O v) o o O m O V VI m W W n n 00 .--I N Ul .--I .ti N N T M 0 0 w n n m .-I N m .-I rl N N M m t7 4 V1 1n l0 W n L L L L L L L t L L L L L L L L L L L L L L u L L L L L L L L L L L L L L L L L U U U U L' U U ` U U U U u U " U U` U U ` U U u u i u u m m m m m m m m m m m R VW1 W W W W W W W W W iW mW Wm`mW W m VV) M VVVI V) VVW VWm1 mW VmW VmW) VmW ✓mW mW Wm mW VmWI mW mW VmW mW mW mW VWm) mW mW mW mW mW VmW mW VmW1 VWm1 VmW �mW Vtrtt-rtftrtfrtttfttIertirtftrtrttftfttttt-tt�ttttft,t� O O O O O O O O O O O O O O O O O O O O O O O O O rmW V� mWI tf O O L L L L L L L V) L L L L L L L L L L L L L L L L L L L L L L L L L L L L L 'L t L ''.L L L L t L L t L VI VI' V) VI N VI V) V) VI V1 V1 V1 V1 V) V1 V) V1 VI VI VI V1 VI V1 VI V1 VI ',. V1 VI V1 VI V) V) VI VI VI VI V1 V1 V) V1 '., V) m V1 V) VI V) VI V1 VI E E E E E E E E E E E E E E E E E'E E E E E E E E E E E E E E E E E,E E E E E E E E E E E E,E E olo`o 0 0 `o `o 0 0 0 0 0 0 0 0 0 0 `o m m m m m m m m m m m m m io m m m m m m m m m m im' m m im m m m m m m m m m m m m m m m m m m m m m aaaa.aaaaaaaaaaaaaaaaaa''aaaaaaaaa,aaaaaaaaaaaaaaaaaa x v e awi +"` as ` v ,u_a a tin a u, a 58 a c.w W cJ U is a u' 1V°.n a a.a M y o i iw nn oww C. C C:. C C C C ', C C IC C C C' C ala ¢ a a a a a a 'a aaa a a s aaaa a s M'M M m F- F- H F7 H F- 17 F- H F 1� F•- H F- F- F- F H F- F- F- b !F^ m im m m m m m m m m m m aa' mu m m m m m m m m m m m rC W W W W W W W W W W W W W W W W W W W W '.... C C C C C C C C C C C C C C C W W W W W W W W W W W W W W W W W W W W W W W 01 01 W > > >. > > > > > > > >, > > > > W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W �l W W `! '., W W LL 11 lL izl LL I,y, L1 Il LL ". LL 11 LL 11 '. I.L LL LL LL 11 '. I,.L LL Elm LL LL '', I1 liz m um m m m m m ray m m m m m m m m m m m m _ra M m m m m m is W H H F7 F7 F- F- H F F7 F7 Y7 0`*. '7 F F F7 H F- F. H F- F7 H m m m m m m m m m m m '�'a ', M m m m m m m m m m m 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 a m W W W W W W W W W W W W W W W W W W C C C C C C C C C C C cC. C C C C c c c C C C W W W W W W W W W W 0 0 W W W W W W W W W W W K z z CC z 0! C z z z ac C'A" i'C'.. a' D: W W W W W (D 0) W W W W W W 0) W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W w W W W W W O) W Ol 01 W '' W '' W O/ W W W I W '. W W W W W W �9IAFn-AIGAwiLiiV7'i����®L'�"�®�IL•J®®a• �®®®ISM El N 't Fo 00 N N 00 N.._00 d' O l0 N lD N # ...# 1� l0 Ol N M V Vl 1D n 00 N W V W 00 O N W c-I 00 1� 1D 01 N An 00 � Vl # n O 0l N W O M 1� An Ol A A# '.# A An CO M N 00 7 O <D N 00 .-Ir 41 V lD WeMnrWVMOl A 1l n 00 00 O O 0l 0l 00 I- O.. OI ## A R# I\ O O M V W 00 M N An .� lD M N w M N M N N N M01 C W00 # V 0l I, AD lD Vl m N .--I O O 00 R R## R M M N O AP O An O '., AD �--� Ol O 7 O O �--� A �--� N N Ol Vl AD O AD ri I� N V M '-1 n m Ol VI ei I� M Ol t ## X u M 00 1, .-I AO N I- M 00 V r n V N M V M lD 1� 00 r-I Vl a -I M M AD N C N # O 0) 01 CM 00 00 r� n n W AD AA Vl A A # # R 00 N N 0l 00 00 I, n AD lO t0 An An 00 I� AD An V M N AA CO 00 n lfl �. M c-I A 00 R AP O V M O I� V ti 00 Vl N 01 <0 # R R A# N N ti r tD AA V m N c-I Vl V N V7 M Ol 1� Vl M 00 lD M M O I' V N# r� # 00 O c-I rl lD ; M N O 0) 00 W 1l1 # # # R R Vl lD Ol Ol V Ql V Dl W O N Ol al Ol 00. 00 o0 00 N Vl 00 Ol V 00 m 00 A Oj e-I e-I r-I N M V M lD lD n CO CIl # Mt R � # '-I r-I N NM M rl c-I r-I N M V M w r, rl '-1 ti N V An n 00 R Vf # VY L?. 'A V) If). in 'AVl,V1 In Vl VF V} A # # # R V>- Vl Vl VI,.. V} r} AVT V} VT {/l. VT VT,N, Vl VI..IR. V} V1 V} VY Vl VF V1 VI VI V? V} R O O 0 0 0 O O O O O O O ¢ 0 0 0 O O O O O O O O O O O O O O O O O O O O O O O O u u ## O O O O O O O O O O O O A A # # # R O O O O O O O O O O O O O O O O O O O O O O O O O O O A A R R a0 '.4 AD W V lD V N O o0 L6 a0 # # R R A # '{ W 1� AO Ol N V1 00 '-I V N AD V N 00 V O <D N 00 M V N 00 r lD An # R ## AO 00 1Z Vl 00 .-I V 1- O N An 00 A## R A R �..� ^^ O O c-I '-1 ti N N N All Vl .--I - N M M V V M M M �--� N M V # #A O N M C An r-I l0 �--1 r% N n N � '', # # V Ol N a e-I 00 Vl N Ol l0 00 D1 Vl 00 N LD O V 00 N N al 00 N M Vl ## n O .--� Ol 00 00 r- n lD to An Vl R A## A A N O V AO' 00 O M l0 00 '-I C e-I 00 '' O W e-I r, N n M I, N N W V N O 4 R R R n AD N '.., Ol 0) 0) 0) 01 m al 0) 0) ## R R## 0l O O N CO Vl .1 1� M O 00 O O An n O N An n O n O I� w An V R# # A Ol rl M 'Ol al al Q7 m <T Ol Ql T # # # A A R V AD I, e-I W N 00 M al V1 OI N V N M Vl LD n 00 O V 00 M O n V m V N lD rZ 00 Ol # # # A A # �-i ci N N M M C e-I '-I N m V Vl lD n Ol a -I '-1 N M V1 tD 00 # R Vf VT. VT V} VY VT Vl VT V? Vl.itA. Vli, V) lh VT VT VT V1iV) V? Vf V? V} Vi• V1.. V1... V1 Vl V1 V) In VT Vl Vl Vl,. V1 VT R # R R R # A A V1 o_ a a a a a a a a s o_ d a a a o_ o_ a a a a a a a E. a r r r r M v v v v v v v c v v v v v v v M to VI An v In In to Vl Vl an An An In An In An N An D- i D_ D_ > D. 0- Y D- An r>>r r>r rrrrrr> rrrir� in en vi vl vl � in vl.vl vl � An in � vl � in � � .� N ^'l y y .-I c-I c-I �--� .--I �--� rl } } N N N N N N N> Y M M M M M M Vl V) d N N V) Vl !n Vl N VI Vl Vl to Vl VI Vl Vl VI '-I c71 VI J J Vl Vl J V) N J N Vl J N VI VI J J M m VI Vl J J Ul J 0_ O_ d M 0_ D_ d O_ - - D- J J J J J l%1 N J J J J J N J J J W W 0_ W 0_ W W W W W W W W W W W W W W W Y Y W W Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y J V7 Vf N to to An to J d J An VI l!1 N An N ul d J l%1 V7 An V1 An N m O ]e Y O N O Vl O Vl. O m O Vl O V7 O An O An W An O_ 0_ a a 0_ D_ D_ d d 0_ O_ N I� 00 ''I N Vl 0 �'-� N N M M V V VI lf7 lD lD i� n W CL Y 0_ W W W W W W W 0_ Y Y 1 W W W W W W W W Y Y Y Y Y Y Y W W Y Y Y Y Y Y Y W W Y ]C ]C Y Y Y m a CL a' a 0_ a a a a M D_ 0_ d 0_ 0_ O_ a d '... a Y Y O Vl O m O Vl O Y Y O VI O M O 0 O ]e Y O Vl O M O 0 Q Q Q Q Q a a Q Q Q Q Q Q Q '.... Q Q a¢ Q a .-I N An e-I r-1 N N M M- e-1 N Vl .--1 'i N N M M? .-1 N An .-i '-1 N N m M a a a a a a a a a a a o o d a d a M 0 o a a a a a a o_ D_ z z z z z z z z z z z z z z z z z z z z¢ Q a¢¢¢¢ a K 5 K K OC ,. OC K C. Om cc c OC 0:. a nc K K 0_ K F F F F- F F F F F a s= a 7 a a a a a a a aaa a a a a a o o 0 0 0 o.o o o o o o o o o o 0 0 0 0 a s o_ a a a o` d a d a o` i a a a o` a a a` mm mmmmmmmmmmmmmm a �-E2 a� a .2 a a a a a a a a a a a a a ac z� z cc z s s z M M M M M M E E E E E E E E E E E E E E E E E E E E E E E Y E 7 E 7 7 7 7 7 '... 7 J E 7 E 7 J 7 J J 7 7 '.... E 7 E 7 7 7 7 7 7 } r s oc } Y r}> Y r r r r Y r r r r c c c m m r. Y v v v v va v v v v a a v v v 7 7 c c c c c c o 7 7 o c c c o c c 7 7 c o c c c c �uauuuuuuu uuuuuuuCm. S%C' =_m w mmmmmmm �mmmmmm mmmmmm dui w '.. u u w w w w w j w w uvi w w w w w w w •' w N w m a� a a a a a a a m a m a a a a m C C C C C C C C C C C C C C C C C w CC >' �} Y Y r r r r K Y OC r Y r r r Y Y�} K'} }} Y Y r w w C> C w w w w w w w w. w w w w w w w �y N M > > w w > > > > > > > > > > > > > > > } } a -I a -I '-I N �u u .0 > Y N N N N N N N M Y M u u fu rc7 u w w> w> w w w w w w w w w w w w w w w '+ u u u u u u u N" N u u u u u u u A''1 " �^ u u u u u Y Y w Y w Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y V w u N w w w w w w u w U w w w N N w w u N U w N N w w N O V1 O Vl O.AA O An ',O An O ul O Vl O N N w h vwi vwi� I� 00 ri N '... lfl .--I .-1 N N m M C V1 An l0 lD n r 00 H h N L L IL L L L L L L L L L L L L L L L L L C C G C C C C C C C C C C C C C C C C C C ```` u`` u u `, ` L```` i``` C w C w w w w w w w C C w w w w w w w C> C w w w w w w u u u ra ro u u w m u '.... u u ra ro la ra m ra w w w > > > > > > > w 0) w > > > > > > > w w w > > > > > > w w w w w w w w w w w w w w w w w w w w> > w w w w w w w> > w w w w w w w> > w w w w w w vl Vl Vl Vl V) v) N vl vl Vl ''.... V) Vl Vl '.... In v1 Vl V1 vl vl V1 w Y w ]C Y Y Y Y ]& ]C w Y w he ]C ]G ]C ]C Y Y w N w V. Y Y Y Y ]C LVl ''... LVI m Vl V) N Vl V1 VI V1 Vf Vl Vl V1 ' An O Y O VO Vl O ]C M Y O Vl O m O Vl O he O O ul O m t' ttt' �' tt' Ltt' t' tttt M m :r N M M N N M M O O O O O O O O O O O O O O O O O O O OL L L L L L LuL L LLLtL L L L L L L L L L L L L L L L L L LL ` ` `VVl V L ` E E E E E E E E E E E E E E E E E E E E °°°°°°°°° ° m` `° °°°°° w w w w w w w w w w w w w w w w w w w w w w w w w w w w w O O O O O O O O O O O O O O O �O O O O O Ln V1 M � V) N � � N N M L N w OC 00 oO oO 00 00 00 00. W 00 MO OD 00,.. 00 ob 00d W W CA oa oO W OO bd 0ID 00 00 bO 00, m m m m to m m m m m m m m m m m m m m m C C C C C C C C C C C C C C C C C C C C C C C C C C C C C CL o_ a 0_ CL D_ o_ o_ G 1 D_ o_ 0 0 J J O O O J O O J O O J JO J J J JO JO J JO � J J J 0 0 O u u_= u u_ u u u= u u u== u u E E E 'T '� '� '� '� `o `o 0 0 `o `o `o 0 0 0 `o `o `o o `o o` `o o `o -' `o 0 0` `o 0 0 `o 2 mammm�mmmmmmmmammmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm C C C C C C C C C C C C C C C C C C C C ¢ a a a¢ a Q a a a a¢¢¢¢¢¢¢¢¢ a a a a a a a a a a a a a a a a a a a a a a a a a a a a a mmmmmmmmmmmmmmmmmmmm=======u= E w v w uuuu__�==uuu== w w w v v w w v v w w w v L L L L t L L L t L L L L L L L L L L L T > >F. T -Fo> T > T ? > ? > > > > -Fu> > -ru> Fa Y } j.. H H F F F F F7 F H H 1- F F H F H F F H H m ra m m la ro m c c c O c. m c a c c c c c c c a c O c c c C C C C C C C C C C C C C C C C C C C C C C C C C C C C C a m m m m m m m m m m m m mmm m m m m a a Q Q a a¢ a a Q a a¢ Q a¢ Q Q a a a Q Q¢ Q Q a a¢ 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 m m m m m m Ll- m m m m m m m m m m m m m m m m m m m m m w w w w w w w w w w w w w w w w w w w w y y y w w v am! v a w jw v w w v wwwavwvw v w w w v C c C C C C C C C C C C C C C C C C C C2 2 w w w w w w w w w w w w wwwww w w w L L L L L L L L L L L L L L L L L L L L L L L L L L L Lw w,,.s oC c =C zcC rc s z z z z w z F F F F F F'.. F- F F F''.,F'....F F F F F F F F.F F F F F.F F F F'.. w w w w w w w v v w w w w w w w w v w w v v w w w v w w v w w w v w w v w w w v w w v w w w w w w > > > >. > > >_ >' T. > T > > >, > T > > > > > > > > >T > > Y T } > > > > } > W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W LL LL 11 11 LL LL I1 11 W LL 11 LL IL LL LL LL I.A. LL 11 11 LL LL 11 LL W W LL LL LL 11 LL LL LL 11 W lL LL 11 LL LL 11 Il W LL LL 11 I.A. LL El W cf 0 w N w''O N M c] li n N o m m N M m N M O w c-I N N M T V 00 V l0 00 O M '-I O 1p V N- H of Ln m rn n O Ol a0 00 n M Ill n Oi ,n V. V.n v..n 0 0 o 0 o 0 'F 0 0 0 0 0 o a vNmcvlOcc V c-I O N m v St W e rl W 7 N m m H N "I st ID O.'-I O Vl O X m y m m n o..n N V l0 c3; SC 0Imlm l0 �.v't, w. Ln O e M N l0 m 0 0 0 0 0 o'..o o o o n O N O m In Ol 00 M -q 0 0o m o Ln Nv .-ln o W O N N -t v C In to v N M M Ill 00 +n II Val. V�ffC+nll V> ar a ay°'r rr>r Ln Ln Ln am T L m In a'n m.i� J m In In vl a va o aaa D as ' n D o a a o w LL W W W W W W W W CL W CL 1yU W W W W 4.. w Y Y Y Y Y .. Y Y W o 4A.N Y Y Y Y Y p Y ' Y O m O Ln M lx�M O Y Y O Ln O Vl O '� .� r+a u�ry N m m v .ti na nn oti. �. et p d d a a a a. eti E tt er. w�: a a a Li a a a a a a a a n l0 N M V N 0n 00 V N 00 G l0 00 O N 7 CO " 00 n l0 Ol N m 00 Lq W M N w 7 O l0 N o0 rl n cn lD o0 '-I M M n n Ln al lD � m r- Ol n O O m V LD 00 M e-1 N M r-I e-I W Ol N to Ol N m N N N Ol R m V 00 Ol Ln N O Ln O In O l0 e-I Ol O 7 O O N N Ol Ln W 0 O '-1 n N M W n rl l0 N n M W n n N m a Ln l0 n o0 '.. ei Ln ri DY 01 lO N CT 00 N N Ol 00 00 n N LD• o to M Vl 00 n LD M M N r.!'N o0 co n Ln V M rl N N rl n w Ln V M N c-I m V N .. In m rl Ol n V7 m oaJ lD m m o n Z3, r-I u1 ID Ol V Ol V (T Ol W O N 01 Ol Ol W W W 00 J°Ifl 0 00 M 't 00 M 00 rl r-I N N M M c-I rl e-I N M V In l0 n *^k .-? c-I N V I!l n 00 M .n an yr V* an In. +n m._ a o o 0 0'0 0 0 0 0' 0 0 0 P 0 o p o 0 0 0 0 0 ocr o 0 0 0 000 0 0 0 0 0 0 0 0 00 0 0 0 1l1w �-1 V N w V N w W N od M V .'-I o0 1� l0 Vl -'Tw '-1 N N N o m .--I " mvmmm'-I N M I�sf 01 N Ky' rl 00LnN Ol w 00 m Ln 0o N V W N N Ol 00 N T 1n N O' 1' 4F1 00 " O m lD M o a o" 00 O lD N n M n N rV lD V N O Zt sm p o N oo Ln � n m o 00 0 o In n o N Ln n a n o .� n lD m r ss W N oo M '..... lD n co o a oo .� m o n c sx vN rl N N M M V c-1 .ti N M V Ln o n G9M1 r-I c-1 N M lit l� 00 '4WY. WJ'� V4 'IJ}''m Vn VT . V? V? V! V},,.'. V} *} V) V? V} i^ %^ 4✓b V} V! V 1^ {n Vl +tWT a a aa'.a a a a a a a a d a a a a,.aa..,a a C >- 9- M M M M M ryrypp�y -� J J J LA JJ a J n n vl N vl n a J n In n n A m m J a J J J J J J w m a a D_ a o D_ m w m a a am a a a m m ct a D_ a D_ D. w D_ W w N w w w Y o_ w w w w w w w a Y a cac w w w w w W Y Y Y Y Y Y Y W w Y Y Y Y Y leY w W ',M.'. Y Y Y Y CL le Y o Ill o Ln O m O ]d m Y O Ln O lfl O li I O Y Y O m O Ill O lz c-1 N N Y CL [L O_ a a CL D_ d [1 0j, p, [L CL !L d d cL M M m m M CL p a a a a a a a a a a¢ a a a a s aaa a a a a a¢ a a a QZ H H F- H H H H H F- F-, a �- F H H H F HF- H H 1- Z Z Z z Z Z Z Z Z „". Z z Z Z z z z z z Z Z Z Z Z z Z z F z z s s s ire �[ , = Ccs s E E E E EE E E E E EE E E E E E E E E E E E 7 E 7 7 7 7 7 7 '.. 7 E 7 E 7 7 7 3 7 7 7 E 7 E 7 J J J J c c c c c c c 7 7 c c c c c a mmmmmmm m mm mama .am' •mama-m2 a •� a....a a s a''- m a =' a a E E E E E E E E E E E E E E E E E a a aa a a a 7 E 7 E 7 7 7 7 7 7 7 E 7 E 7 7 7 7 7 7 7 cc w cc cc w 0c [C w w C K C w 0! 0: K K Oc Cc C 7 C 7 C C C C C C C 7 C 7 C C C C C C C C } } } Y r Y Y } K } Y Y Y Y } } 0c > } } }} } r m m m N N N N N N N} m} M M M "i M M •m m U L U U U N N U U U U V M M U U U U U a '° a m a a a a a a a m a m a a a a a a a r a s r r r r r} r z }n z r} r r} r r v" c c c c e c c c c c c c m r } v a a a a v a} > In m m Ln m Ln In E' > c w w w w w c °' r w rup w mr w m c w w w w u +.� u u u u wr o Lu u u u wn 0.a a� a��y > °' d>a as roo w w>a >w ` + a>r a>ry y a>i o a>, m>i "✓� 'w.;: 4fi Wwry w w w w w Uw vwi w wwa N why w Y w Y Y he Y Y lY e w Y w r,,, •,„ \ N N -,,,,uv N N Y ]C cD N seo Y Y QB Y w heY Y Y Y \ t N a.r N in vi cm w1 wm c-I N Vl o N N O Ln o N M m V c-I N O m H. N m M O C rl N N H N N OM C C C...., C C C C C 'C C C C. M3, C w w 0l L L L L L L L L L L L L L L L L L L L L L L L L L L L L N N fO N N Im N f0 n N N m m N fm m l0 m fm Im fm m e0 m m m m Y w Y w Y Y Y Y Y Y Y w Y w Y le ]& ]e Y Y Y O w w w w w w w w w w In lf1 N '.. m m V1 VI to to N to Vf to In Vf to V1 Vf V1 vl N Vl to to Vf V1 M V1 V1 V1 O Y '"e:'� O lIl O Ln O Vl O Y Y o lIl O Vl O N O m m V to co ems rA0 m0 m0 eb0 m0 eY0 SBq m0 mo w Rm w v. 00 w w co w O'6Gi .ems 'ta' C C C C c C C C� C c C c C C C C C L' C C C C C. c C c c c L L L u L L u L L L L u L L L L L L L L L ds. Ali ' 3 2 9 C9 d] 0 GJi 4'F 4i fi i. M"� K- 3' 'CJd L7 'I. Gb C7 3 9' 9 i3 'b Gs' 2 U J J J ..d ...Y J J J J J J �,.d J ,..d J J ...tl W .J ..A N N N fm fm N N (m f0 N (0 fm N ', fm f0 10 10 N fm fm N m m w w w w w w w m m m w w w w w w w w w E E E E E E E E E E E E E E E E E E E E E E E E E E E E M N N N m N N N h N o Ln O O �O O O O O O O O O O O O O O O O O O O �O O O O O O O 00' to 4G w 00 CmA.., Cm9 oa oil oA 0dy ma'. u w 00 mo w to w 0AM C cC c c c c c'C C C c c c!m m m m m m m m m m m m m m m m.....,m m m m m m..'m m mmm m #b O c' JC1 'cl �➢ O 'Ca e7 �c5 a7 CY 4' O O J ...a ..e ,. ..a ,J J J ...+ a a a a a a W d a a M a a a CL a d a a a a a a CL a a a a E E E E E E E E E E E E E E E E E E E E E gI� u � 's� v �� u 0 0` `o oo `o o `o 0 0` o` w `o `o 0 0 `o o `o 0 0 'a m m m m m m m m m m m m m m m m m m m m m m m a q m m m m m ro' a m m m m m m m e m m �4 " a m m m m c C c c c c C. c C C c c: c c c c... c c c C C a a a a a a a a a a a a a a a a a a a a a a< a �: a a a a a a a a a a. a s a' a a a a a a'. a a a a. a " wlI "wlw"6l.1v,v,wlummmmm mlmmmmmmmmm�-- mmmmmmmm'm Y a" % a Y v v w w w w w v v w w m w v v w as to +v w v w w v w m v v [@' to m r0 f0 fm YW Wm 0s 0i l>r d'm m d'0 i0 ls, f0 N to m fo L L L L L L' L L L L '. L L L L '. C 9: C C H H-- -� W' 47 i^". F H N H H H ♦- F H a a a a a a a s a'. a a a a a a a a a a a a im im im im ra iKn m m io im rm im m rm io im m1 N4 im is m im io m im im io mm w mmmmmmmmmm n mmmmmlm3333'333333333333333333333333 m w q, a 2n am me v w w v v w w '.... w w w w cu wv� w w w w w w w w w c. a w w w w w w w w w w'. C C C C C C C'. C C C C C C C C C (C c C C C C C C C C C C .C' ,,CC L L. L .C'C. L L L 'N- K 2 K K C 0'm` w K K '... K C K OC K K oC. CA:: 0C'. K Cc oC 2 K C O< 2 �. I- h•- 1- f-' H H H 4^^ b-, F- P-- i^' #-- V-' H F H N-- M w Iwww wwwwwwwwwwwww w w w ww w w > > > > > �> > > > > > > '.> > >� >, >.� > > > > > > > > > > > > > > > > >> > > w w w w w W w w w w w W w w w w w w w w w w w w w w w w w w w w ww w ww wwrw w w w v m w w aw'... v.... v v w v v w 11 11 I{, LL LL w - LL'.LL L.L 11 LL M LT LL LZ Z LZ LT M LT LT Il lz LT LT LT LL I.L M M Il E LL LT Ll LL 11 El 00 a LD 00 N tD O V Ol r� N w H N m m m w a0 V-T w N e w w O N r� c-I LD V m H m Yt a ID LD 00 00 N V N R m w M ... I- N ., a= a w 'It M ''.. 1p Ol M N T N M V Ill I� Ln V1 M Ln M Vl lD a a M Ol ID V 1- C a O m m N m Ill N a a# I, m I� 00 r, n w Ill C m Vl w V w r V N O w LD m O e-I � '-I e-1 00 Ln a# rl m 00 N 00 00 # m O w e-I N N m# a a iy m m Vl w ',. e-I 7 I, O m M w H N n m T m O w m w i� n w m m N# a n n N m a LD $ Vl V 00 V lD 00 O uu W O1 m 0 0 '.. c-I c-I a -I N N lD D1 1� �--� �--� N N M V V V Ol O r-I N m a Vl N Ol V N M V # Yll ' O LD N �--I ## a m w m w N l0 O V w N m r- 10 LD 4 N O 0D lO a Ol LO O V LD W O N## D1 Vl M N 00 N a ti M Ln rl n m Ol a # ''... # R V d' N V Ln I, 00 Ol ci Ol Ol OO Ln 00 V LD M N � V M 00 N ID '-1 In a # t71 Ol I� ti lD N # n O It Ol 00 00 II # a ''... # V Ill ID C Vl O Ln O Vl 00 O N O O �'-� e-I � N m LD Ol O LD .-i r, N # a r- .--I m N m m I, 01 ',.. e-I rl N N Rl Rl a �--1 rl N M V Ln w I, w .--I '-1 c-I T V lD r- u R '-I N N V l0 OD ul M, VY V1 L? 'n V} # # VT VY to Lf Vf V1 # O O O O o O A 3 3 a O O O O O O O O O O O O O O O O O O O O O O O O O O O R A O a o 0 0 0 0 0 0 0 0.......o o## a a o o o o 0 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 a o v o O## a o o o v o 0 0= V N 00 C LD W a a # # N I, '4 LD V m N 01 1� Ln V t N N Ll0 ID N 00 V O lO M N N O1 m 00 00 V V LD N # V .--I O N m V ## a a u M N m I, e i m Ol N o o w m w to N O w In M e-I m w r, N V In I� # a# N O w O L!1 ti #a w m H LD v N a#$ o o a w Vl m N o w 1� O O Ol m 0 ''., 1, M O n 4 O O V O Ln O Vi.. a a# •-1 `i Ol I� O V # Ol fYl 1� e-I N 0•l # a a a n' e-I Ol r1 N Rl 7 Vl Vl lD V N'.'w m Ill LO OD O'.'-I CII .-4 Nl oD LI7 r, O N # # # w 4 n LD O Irl a LD O ei O Ill O a a # a m m 00 I, LD V r fVl N m w I, w V N O Ol r� m Ln Ol r a c Ol D a# a D N V N 0 Ln a ''... Ol V 00 Vl ll O # a # a M LD r, r-I I� M 0) Ln 1� O N V m Ill Ih Ol O N V Lf1 00 N Vl M C 00. # a a O Vl Ol I- C V # # a # rj c-i N N t+l V c-1 e-I c-I N m C Vl I, OD cn r-I c-I N m LA I- OD a a a N N N V I� Ol rl N N V lD Ol a a## a a# # VT in in tin VT In # # # a VY N to to tn. 4n 'j ., Vf to y, ih 'n 4A i 1A 1n N,,'N N to N N'.N V} M, # # # N'., VT N tn Y r > Y> Y > > } C C C C C C C C D_.. C C d C C C C C C C C C C C C C C C C C C C C C C C C C C a d rl a o_ a a a n. d a C a o_ a a a a C a C n. o_ a C w D_ D_ r C D_ > o_ r i r> r r r r•-IN} m Y M m M' M m m m> Vl Vl J d J Vl Ln Vl V1 Vl VI N H J '-I J J J J N t� N J J J M J m Vl VI VI J J m J' J �i J J Ln J D_ a vl Lir a s o_ D. a a C W W C Y C W W W w W w w J N J J J J to J J J J J J J J J J In J J Y Y w w Y Y Y Y Y Ne Y N tll to N to N Lil N N N N Vl N Lit to N Vt Vl Vl t%1 N N Vl Ln Vl ul O Y Y O V1 O Ln O In O Ln C V1 C C C C C C C Vl C V1 C C C C C C m Ln C VI C C D- tl C C C N C 1n C C C C M V c-I N Vl o m N N M m o C �'"� C w w w w W w w C w C w w w w w w w C W '.. C w w w W W W W C w C w w w w W Y w Y Y Y Y Y Y le W Y w Ne ]e 'e Y Y ]e Y w Y W Y Y Y Y Y Y Y W Y w Y Y Y Y d d D_ d_ a d 11 a a a D_ D_ Y Y O Ln O Vl O Ln O Y Y O Vl O Ln O Vl O Y Y O Ln O No O Vl O Y� Y O m O o ¢¢ Q Q Q Q Q ¢¢ Q Q N T T R .--I N H H F- H h H l- H H H r H a D_ Q¢¢¢¢¢¢ Q¢ m Li. m m m m a m a m m m rL Li Li a OWL a d H H H F- N H �..H Q Q¢¢ Q¢¢¢¢ Q Q Q Q Q Q Q Q Q Q¢ w� ........ s s z<< s w w Q H, a o_ a C a a C a a F- Hw- r- H r � •� I- H H E E E E E E E E E E 7 7 E 7 E 7 7 7 7 7 7 7 •f0 .w C 'C m •mmm t0m .f0 j 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 H 7 7 7 7 12 a d a> > a> > a> J d 7 a a a d a a a d a d a a a a a a a a a a a a a a a 0 a a 0 a a o a a o a ='= o o •o 0 0 0 0 0 0 •o 0 0 0 ,o 0 0 0 0 0 0 0 0 0 0 •o r r s > s > } > > r > > � o` .� a` a` n`. a a Li a � C � a Li a a` a D` a � a � i a` o` a o` a ri •� D- � a a a o` m .... m> r v v v a a a a` u' a N� 'It v� v u u u u u u u mmmmmmm f0 mmmmm m m =� mmmmmmm m N u u w w w N N N w m a m m a m m o m m a m ,,•I w N w a a a a ad a a a a d a a a a s as a a a a s ala K m s } > > } } } > z > > } } > w w C C w w w w w w w} } m m m m m m m r > V V V V >> w> w>>>>>>> rl u Ly N U N M u m u u u u u u U� w u u U u w U u u u U u u u u u u U U w w> > w w w w w w w w H u u w N w w N w w u U w w H w w w H u V H N w N w w N U O u N w w h Y Y a Y Y 0 m Y Ln Y w H N H N in Ln O H N H N w uVi H N N H Ln O Y Y O Vl O Vl O V1 O N N N N H N in N N M V ci N V1 c-I '-1 N N M m Q L L L L L L L L L L L L y C C C C C C 4.5 C C C C C C � C C C C u`` C> C w w w w w w w C> C w w w w w w w C> C w w w w w w w C> C w w w w w w w > > > > > > > w v w > > > > > > > w w w > > > > > > > w w w > > > > m to m ro Lo ro 1`a ro m to > > w w w w w w w> w w w> > m m w w w w w Y w w Y w w '... Y w V1 In Vl V1 N Ln V1 N W Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y '.. Y O V1 O N O Vl O Y Y O Ln O Ln O Vl O Y Y O Ln O Ln o m O Y Y O Ln O N 00 00'�. W! 00 00 00 00 00 m 00 m 00 Ly N ',. Ln .-I .-I N N m m V �--� N Vl rl ci N N m m V N Ln .-I .-i N N M m ci ''... N Ln r1 '-1 N N C C C C C C C C C C C C L L L L L L L L L L L L L L L L L L L L E L L L L L L L L L L L L L L L u O O O O O J O O O O J J U U U i U U i U U i m" U _m "m r`o m m to la L`a `m to ro ro m ro La L`a ro la Lo `m La la Lo ro la ro Lo ro ra m ro ro m re ro to `m ro ro E E'E E E E E E E E E E v v w v w w w v w w w w v w w v w w w v w w w w w v w w w w w w w w w w w w O . O O O '.. E O O O O O O N N Vl N V1 Vl V1 Ln to N Vl Vl N Vl V1 Vl Vl Ln N N Vl N M Vl V1 Vl VI Ln N to N Ln Vl Vl `2 00 wn 00 a0 00 00 00 tw 00 wn 00 tw 00 tw 00 m 00 00 w t00 00 w 00 00 w 00 m 00 w 00 00 .. m w a w w a m m m m m m m m m m m m C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C t1 LL CL CL C '. J J O O J O O J J J O J O O O J O O O J J J 0 0 0 0 0 J0 J J0 J J 0 u 0_- _'u u _u E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E EE E E E E E y 51 �'5 > 5__ 5,*,__� 0 `o `o o `o o `o 0 0 0 0 0 0 0 `0 `o `o `o `0 `o o `0 `o o `o o `o `0 `o 0 0` `0 `o o `o `0 0 C C C C C C C C C C C C _mm2mmmmmmmmmmmm�mmmmmmmmmmmmmmmmmmmm ¢ Q Q¢¢ ¢ Q¢¢¢ Q¢ a a a a. a a a a a a a a a a a a a a a a a a a a a d a a a a a '. a a a a a a mmmmmmmmmlmmm�========== uuuu== =- w w a v v w w v w v w v L L L L L L L L L L L L fO fO fO t0 (0 N N t0 f0 rtl w 10 N (0 m N N rtl m m mm m m N m m N N N m m m m t0 N N N ~ ~ H ~ F ~ H ~ H H C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C m m m m m m To m m m m m Q Q Q Q Q¢ Q Q¢ Q Q Q Q Q Q Q Q Q Q Q Q Q Q¢ Q Q Q Q¢ Q Q Q Q Q Q Q Q w w w w m m m m m m m m m'm m m m m m m m m m m m m m m m m m m m m m m m m m m m w '.... w v w w w w v w w w w v y v v w w v w w v a w w w v w a v v w w v w w v w w w w w w w w w w v C C C � � �� w w w w w w w w w w w w L L L L L L L L 'M" L L L L L L L L L L L L L L L L L L L L L L L L L L L L z z z rr z z s ''. r,' rc cc z rz a-- � � � �-- r � I� � � 1 w w w w w w w w w w w 0) w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w > >> > > >'�. > >. > > >. > > > >. > > > > > >. > > > >,. > > > >. > > >. > > >� >, > > > > > > > w w w '. w w w LL w LL LL LA., lY '. LL LL LL LL LL LL '., LL LL LL w w LL LL1111 LL ', LL W w LL LL LL w LL 11 LL LL I1 Il LL LL I.L_ LL LL 11 LL 11 wI w LL ilml 11 I LL I 11 It M 0 z El Y'... aai' a , ., R R i:.... R "Xm R ^' R it R 3a: R'R R R at a a R ' ft R n R at R ax R� az a'.R d d d d.. CL ck 4rN''p 9�+p m W d d W W Y Y M '+Lrr1 O s o1 00 ; O R m� a V 4t N R N R Vf ... 4t O a 0 R O a W a Lfl R M a M N to d a d d In d to W d Y W p Y .�Fa'x1".,, .-I M n LD of V n N to o 0 Lf1 M L6 N ry M 1n D" D- wry �, 1 N Ln Ln 00 n ko r-I N tY1 tR 0 0 Ln M a n o) LD M In d in qiy d 1RN Y 14'T O o m ''., N O V ri Vl 4R O' O O m M 00 O Lj Lll to d d Ln J Itn d W Y O ri d O Lri m V O rl n n N co, O o n N 00 W 00 [A d d d m J Ln d W Y Ln .--I m R a R R R tt a R a R R RR R R R R a R R R a R R R R R a R R R Yt R *t '', R R a d d d d d d Ln ll) J J to of d d W W Y Y O an N N a. d R R a R R R U a R �t a a a R R'...a R R a a d d d ✓1 J M d W Y O M d R at it R a RR a R A a a a a a a a R d d d l!) J Vf.Vf d W ",aC'. cY!1 r? a k V a n R iy R R m a V :m � a R 1h a$ R o '.. a 0 R N a m o a n R e-1 a M ffi R t/T d d'...d d Lll J J d W '., d Y W ri Y O d V ',. Q d~ ZC o1 aru o w. V m 'Abe',. 0 0 n N O r-I M lD 1n d N J VI W Y N [L Q H K Z n pr: &d`d m m ''++77 #Cs V+ o 0 ri m v o1 M n to d d Vl J d W Y LA d Q 17 z K N y O cc m*M (' *"� AA o 0 LD n Ln H W .-1 ri to d �- J d W Y O ~ d. Q F7 z W � c N V N rd in C) 0 V H � T^A rl P'+ r^M V3 d J d W Y V7 ri [L Q H Z ri '., D l!1 O N to o 0 m o m MI W M N' {/y, '... d » J d W Y O N [L Q H z n D a '~ o n m N 1/i o 0 r-1 m rt -* Q of N 4n d r J d W Y Ln N d Q¢ H@ z M m n V a0 O frl in. o 0 m N o L6 V Ln m ...., to d ..L d lA! O TPT �. z i'T1. ��..;;pp'' a.0 N !d;p ;p5 tY1i ah'r' 1!"1..14n o 0 n O w Lr M r-I V in d i J d W Y lf1 m a Q F- z Vl M m m N N H ri V 0 oo m o n LO N n 't 1/}.''',tn d d r J d W Y O e a Q F- z lb 1p Ln m tD LT O) o0 '', tiF°R 0 0 V W o � M c c-1 d d d> J V7 d W.Y Y e-1 a Q '7 Z W Ol 00 o) n D) O r-I zdY 0 0 V Ln o N lD N H to d d J VI W N a Q H Z ''., M v H n o 00 N c-1 4n"? O o N 00 m 00 n r-I to ''., d d d Ln J V) d W Y Ln . a Q ♦- z V N ri c-I o Ln O N Vs 0 o N Ln rr M W m N 1n d d d i J d W Y p ri a Q H z W m a n c-I V oo O R) in 0. 0 00 N O Ln V Ln m VT't/T d d d r J d W Y'Y Lfl ri a Q H z N N v m N N ri r-I vlU, 0 0 W o n W N n V d d d r J d W O N a Q H z V M N m N O V c-I Lf1 V} 0 o N 00 M W O o) Lf) 7n d d d i J d W Y to N d Q H Z l0 o Ln m o0 LD c-1 o to 0 0 00 N c o m O n L1..'',an d d d r J d W Y''Y''Y O [n d Q F- z 00 Ln m o V 0, o) '., .-I r iA O 0 V m S r-I n N 00 d d d r> J d W Ln M a Q H z O n w w V' N ", N W in O o o r-I v fV7 Ln V o) to d d d J d W O V ll Q F- z N Ln m m V a V. m rl in. O 0 LD m c H Ln Lr H dAM d d d> M J to d W Y ri d Q F- Z n ri 7 Ln o .� 00 n m o LO O M l0 0) c-1 ri Vf to 1 0 ''O o O a -I m 00 n c v m W M e-I 00 N r-1 N to f.!'b'Vd d d d d d d- J m In J d M W d Y W Ul Y N Ln CL d Q Q¢¢ F- F- z Z LD M c n H V o0 O T t/T O o 00 N c M V Ln 09 d d d d W X O c^1 d N' Z V M H w N ''', 1p N lD V in O 0 N t Ln n'. H '., M . M to .�. d d d i• „„j d W Y o r% 04.. F- z M M rt LHn m� W lD .--I LCi v' O 0 O1 m o o.. M c n ih d d d r N J d W Y O N CL Q F z c-I Vl LXI M O r-I n n 1. 4tip� O 0 m n of N W 00 oo in .. _... i d d d r !n J d W Y Ln N d Q F z W in N 1!1 N Ln N tT An CIA a'a R R a a R a a R d d d r !n J d W Y O M D_ Q 1 7 z a a R R a R R R R a R R R u't R d d d ''... > !n J d W Y m m d Q H z R a s a= a R R R R at R a It R R R R d d d r J d W Ne o V a Q H Z lD m .-i n N of o) n ri �vA 0 o W N 00 LD o N 4n d d d> a J '., t/) d W Y r-i m Q H Z lD rn.. m n o) LA LT .--I N vw 0 o 00 0 � V N Ln '., N AAarb� :..d d d J !n d W Y to N d Q H z W oo N V ''', T n Ln N to M 0 o LD m N L/1 o) N d d d J to d W.Y'Y m Ln m Q H z t>D N m N N rl ri V V} 0 o V O n lD N n V to d d d i J d W o e-1 a Q H z N n co V M C7 lD r-I o to O..O o lD m o ''. O' M O n n d d d d W N H a Q H Z V v oo LD V V N N 00 tA1 O N r-1 w M 111 C O)'... Nj d. d d IJl d W Y O N m Q H Z a 7 d 7 a a d d d a a 7 D' 2 a a a a a d d 2 d 2 a a d o d O O O O O O o '.. d o d o o o O o o o d o d o o 0 o o o o d o d o o d o o O o O. d a d a d` d` d` o' a o M d d` d` M M a O Li o. L d . d` d a m d a d` m tm fm to i0 !m m N D`_ m d` f0 f0 i0 a d a= d a a...a a a a a- d m a a''a a,a a a.- d a s a..a a a a d-. a'.a 0 0 dd` 0 0 a 0 d 0 o d o d.,a o o a o i o a ,o d¢ a a s }} z z } } Y } } s } °C,a N ¢ } L¢ �,a a K s''K Y s Cr Cr cc cc Im d m ,>y N N N} m } M M M M M M M}} m t0 2 d i0 fo IO 10 f0 tm fm Im `~ 4A q'L'yj '~ 1p u w U U. U w L,9 u4,�� 0.N 4.V w N N 4i Nk R.a 4.Y U. hi 4! 41 M U M hA +9 NJ U. tL V U U. U V V a a a IL , z a d , a a d � . a , a a wM .; -1 � N � = .: U � � U � w " 0,k Ww 4b "w qN 0J � cl �n 0.N e � d$A w CJ ��ro � '�! � i0pn voa � i a w�' H +••u � �n v�f ! z }} y z L>,) LY }} z w z Y}}}} cc LY r c C c c C C C: a c�., G C 4m c c c. C C" C C is C C c 0: n c a v r U r n n Ln n n Ln Ln c> o w > w > w > w > w w e 0L, c v w w `.+ v w w v c a i< w w w w tt a c Cu c w w w U U W,Y. Ln U U U R.A 0.J w i& v U > w> w wl > .^°. v w w'w Cu > w > m> w w. QJ > > w > w w .'> W > w ,',n, w > w> w .. w �° > >. w > w > v > w > w > m > w> w' w> w .? w ."w w > w w M PAY N Y Y w Y Y o Y Ln he O Y M Y O Y Y w Y Y Ln 'w Y Y O Y N Y O Y Ln Y O Y Ln Y O qS Y Y w M Y Y O Y Ln Y O Y Y Y Y w Y Y V? 'w Y Y Y , C c c 'C x as c ri c N Ln ei ci N N M M M t V e-1 N Ln e-I .--I N N M M ri N Ln ri e-I N N N O M M M O -*- Y O Ln O y1p 0p >>> w.. C v>>>> w l c, w w w w y� 0y >> w L E L L L L L'w L L E L E L E L .0 L E L '.. L L L E L L E L E L E L E L L L L L E L L E L E L L L L L L L L m Y Y Y > Ra w Y w Y w na Y Y w� Y v' Y w m Y w m w m Cu m w m w m w m w m w m w m w m w m w m w m w m w m w m w m w m w m w m w m m w w m w m ''',. w m ''' w m w m w m w m w m w m w m w m w m w'.... m w o m O Y Ln Y O to O Ln O Ln Ln O Ln Ln Ln Ln v) Ln Ln Ln Ln Ln Ln Ln Ln Ln v) Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln m Ln v) Ln v)....LA Ln Ln Ln 'Ln M M V '... W N Ln .� r-I N N M M C m4 to C %a C a C ws C w C 'o aril mdi Cwq *a a ab m0 tw to c 00. a 0q 00 uo Opp Qu 00' w 0� q0 mo 4G..' C w C 0C1 C 4wtl C W C 00 'C m m Loa m Lo m m m i m i m m m " m O „s m O J O O J O J O J i8 J CJ3 CJ0 C.3 J C,7 J O ...k 4 J O �..va O J iS J.O O ,�I O J O J iJi C} J O :..d O J o O 'O J O'D J c O �...: O J O ..A O J w w w w w w w w w.v w w w E E E E E E'.'...E Ln Ln 0dF a� M Lo LurJ aa M Ln Ln N N M O O O O O O O O R O O O O O O O O O O O o O O O O O O O O O O O O O C C 0 C G 0d.1 L 0to C W" o 4ro L": as0 a)0 C.. C 0li7 C 0r5 C Tw@'. G: tD f0 tm Im Im i0 �O' 'K'w1 2 aaaaaaaaaaaa......aaa'..aaaaa.'.....aaaaaaaaaaaaaaaa '., i0 L4 f0 !m 10 fm !p mm N M. m M M m M M tm M M M M !m M M -M M 19 f0 (0 f0 f0 (0 io 10 (o !m tm fm des 40 m m m No A0 m. m m m m E C0 P,' q91 s a (ttY S5,a> M fm y a f0 a a a a a m a a a a a a a a O Q.. C ¢. O 4 Q c ¢ c ¢ c ¢ c Q c ¢ c Q c ¢ c ¢ c ¢ c Q m c ¢ C ¢ m c * m c Q aW c Q'. c Q IC ¢ ro. c c ¢� "t¢ m c m C ¢ m c ¢ N c ¢ m c * Gm c ¢ 447 C ¢ M0 c '¢ m c ¢ m c ¢ m c m c I+} c w w w .� m. M to '.. m is m c c io is im ro c c c c A c io m io is is io m iu im m 'm" dw� io T >. is- r.. >. ;. v v w w aaw v v v v m v v �i v wei v v w v w w v w w v w v w w w w ua v m m C. C m W C C m C M c 40 C _r m l C m ms C l"" iAs C d0.9 C L o; H L H L F- L F- .,c. Fa L f„ I7 H F7 FI H F- H H N H 0 R-- H F- " Q '�'• Q" H H H H H F m m m m m ?.i m m m m m m m m m m m m m m m m m m m m m m m m m iB m'a m m 0,� w w �.. Spa w w w w v w w a w w w v w w nw w v w w w w w w w w w w C 3 w C w c w w c c w c w c w c w C w C v c w c w C w C w C v C w c' w c .0 L W'•- F- L '., .0 i^ ' bmm ,C h L 6m^ L F- L F- L L F- .0 %- 6^^ Jr'' w &-°^ K w K w w w LY w Ak tU C.1C. w dC I w w w w w K w K w = w z w K ,K w w tC w 5C '. w Cr w K w K w w K d' w ce w K w e' I'.. w C w z w C w K '. Cu C w LY v Wes. w d" oo w LY w w Cu w w w w Y LLWf- w T w > w w > T w > w > w'w >. >., w > w > w > w >. w > v >. w.....,. > > w T w..''v > > w > '., dw T w > w > w w > > w T w T w > w T w > w..w > >. w > wwwwy,>. T>• >•' Tvwvvw w v a v v w v v v w w w w w w w v 'w LL LL LT '11 41 LL Il W lL LL LL LL Il W li LL LL LL 11 lL lL I1 lL I1 11 LT LL LL ''. I1 LL W LL LL 11 LL LL LL 11 11 Ll '.LL El 111 O Lo w n w m V M N e-I O m 00 m m m In In am a m It m a m M m M 0 7 N Lo m N n o V 1� c-I V W m O N w c-I N w LD V N w l0 m 0 w m Ln L10 N N 00 Ln T LD m T--I V n O N 1I1 o m to w N m n n w M Ln 00 O N lfl n m m 00 LD n N n N a e-I r-I rl N V In n m m o N N T Ln w W m o 0 o olo O''O o 0 olo o o o o 0 0 0 0 0 0 o o 0 0 o o o 0 0 Ln O m V,c-I V m N m Lo m O n V N N W n lXl M N N M M N n M n r-I lD Ln O m O m, o' Ln O N N m m N m w ill N O n Ln N c, n m a LD 00 O N V Ln n m �--! N r-I a e-I e-I e-I e-1 N N ,-�Inlvq�J�d�N�^fv�Nv�I�l�nl�I'nI'nII� a a a a a a a LL I d a tL d LL d d a lL a s a a L i o `� '� `� Ln In Lil In Ln Ln Ln vl In In v1 to V1 M N N m N N N N V1 V1 V1 V1 N N Vl N N N N N N N N N N V1 to Vl Vl N ~ N F- ♦- ♦- H ♦- ♦- ♦- ♦- f- ♦- f- w w w w H ❑ H ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ O ❑ ❑ Y Y Y Y ❑ d ❑ N In V1 V1 N VI ✓1 V1 V1 N V1 hd N 0 f1N'I � W S w w w w w w w w w w w m Y w Y. he Ye Y& ]e Y Y Y Y Y d a.,a d.Y Y O'.Ln O,,.Ln O m O Ln O P �F-�.Lni ala M a a d a i d a a zzzz cc cc I F Qaaaa M I;tM 0 0 0 LD V w O M M V N M m m 0 n .� n m m w oo ''... OR m N LP .--I m V ID Lo V �--� W- N 0 n o V N m V N ,m 0o N n N .ti m w ll Ln v LD .� n ry oo M m w N M w O Ln m N r` c-I to O t>D m .-I m m � Ln m N N m M V N V N N M M W '-1 Ln 00 r1 V n 11^ In lll� In 'A 0 0 0 0 o o 0 o O '.. 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Ln N o 0 0 00 N 00 O V w N w o m n v 0 LD o o n N n m m v am Ln 00 w Ln n N M m Ln Cs V a M CS a LD Ln T O" C o O N O V e-I w Ln w n m O Ln o Ln LD o0 N M M W m M n .-I 00 �--I N N "'., a -I c-I N '., N N M LnN�n ll�nllnl�Iwl NN�II�O�I+n'tl Niles O W w t N O Llo Ln O m toto Lo O Ln a Ln o C oo In O oo o N rn LD ci LD c-1 Vl O Vl O n 00 V n a0 O '.. N V V ',O LnIN. ID N n m Z n l0 � <D rl ''�m,..n Ln O- m m o0 N oo O V Ln m N-�F O n Ln m Ln O ID n '-I O m all m w T m O M LD m N Ln of m ... V Ln W N n N ... n �--� Vl V V* an In /T V4 VT.''., VT Vf 1A 1A lf4 N....''i to to 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O o 0 0 0 0 0 o O o 0 0 0 0 0 0 O V 00 N w O '.. L1 O ul N m N o LD L- a m 00 o Ln D Ln r o Ln LD o oo w Ln Ln LD n n 00 W o W N Ln N N r V o O O O O O O O LO e-I O T Ln O Ln O Ln O Ln O N c)o O LD n w W n lD N N n Ln o0 Nn m N LLD M Ln m V O LD LD M m V V V Ln' Ln �--� N N m M ala a1 a, Q Q a a Q Q Q Q a Q Q a a a d a L G a? a 9- d d a 9- 9-9- d 9- a Li d i N N N N N N N N N N N N N N N Ln Ln N V1 N N N V1 ✓1 Ln v1 N Ln Ln M 0 V1 0 V1 Ln 0 to N In N N N N N N N" N N N N N N M N , N N N N N N N N N N N N N N N V1, V1 ❑ Vf ❑ N V1 !n to N N Vl N to In LA Ln N In a a a a a a a a a a a a a a W W W a Ln a W W W W W W W W W W W W W W Y Y Nd w Y W Y Y Y Y Y Y Y Y Y Y Y Y Y Y O Ln O Y �? Y O Ln O Ln O Ln O m O Ln O m O Ln n n 00 , N Lo .-1 a -I N N T T ''. V Ln Ln lD lD n n d d LL LL d LL 11 d lL d LL LL a d C_ a a a a a a a a a a a a a a a a a a a a aaaa E EE'',E E E E E E E E E E E O O O O E J E J J J J J J J J J J J J J m .N m m m m m •jp •(p •jC .L9 •(lf •Ill m m m m a s ¢ a a a a a a a a s a c c C c C' C' SI 0J 49N 01 N N O) N N N Ol O) N > O 0P .e Y Y Y o Y o Ln Y Y Y Y Y Y o W o Y N Y O Ln O N O N O Ln '.. O Ln O W O N M M� N Ln .-I .--1 N N M m V V '., Ln Ln lD LD n L L L L L L L U ` ` ` 2 E Em ro La Lo m m m m m m m m m m m m v v v '... v ''. Ln an Ln Ln Ln In In Ln Ln Ln v1 Ln Ln Ln to In In In N In t.to t+ to to to to ` t+ t+ t+ t+ t+ t+ t+ �+ o o o o o o o o o o o o c o o o O O O L L L L L L L L L L L L L L L L to VI VI Ln o N to M Ln Lo VI to l/1 Ln N to E I E E E o 0 0 0 0 0 o 0 0 0 0 0 0 0 0 0 v mv vv vv v v v vw v v v v v vv a-,mvv v v mmmmmvmvwvv u u s E E E E E E E E E E E E E E E E `o 0 00 mmmmmmmmmm m m....ismmm a a¢ a a a a a a a a a a a a a a a a a m m m m u_ - - - u - - - - - - - O Y Y Y Ln Y � O N L L L L L ro ro m `m m Ln vvi vvi vvi vvi o o 0 o o L L L L L M o o o o o o v II GJ II WII vf...v � o 0I� E E E E'E I al.....al....,.� Zll L L L L I'W m m N l0 fO m m N N m m N m m m N N m (ll 3 3 3 3 m m rm iv m m m m m m m m m m m m m m m m m WE W WI W �� �� �� �. N,,, Ni. �, w4 N �� �� W ilLilaRzu LI iliz, � �IiiiCII CII C CII CII CII C C m ro Lo La Lo La la a a a a a a a tY tY OG K K LY lY } } } } r r } N N N N N N N v�i N V�1 N N N N w 01 w 01 w ''., 0/ w Y Y Y Y Y Y le m O m O Ln O Ln N M M V't n N JI J C C a � a N N Y Y O L LLi La r`o Ln vvi 0 0 L L N M 0 0 u u v v 0cl E E `o o a a m m �-Fa m m m m m m 76 m m m m C C C C C C C C C C C C C C a a a a a a a a a a a a a a mmmmmmmmmmmmmm `J W v N v v W v W `! `1 01 v W L L L L L L L L L L L L L L N 01 W v N ''.. N Ol 01 v OJ 01 lU N 01 w w w w w w w w w w w w w w v v v v v v m v l y v v v v v 11 LL LL LL 11 11 LL LL '. LL LL LL LL '.. 11 LL W M O r\ V H W 0 N 0 0 0 N W N O W N W V O W N W -;T O lD M O N O W O W O Vl O 0 O 111 O V R R n N n .--I W m O N W W- '.. m 7 m W n n W W W M Ill r V cr M r- tll N al W Ol N n e-I W O N m d' W 9# m r C Ill Ill W W n n M m 0) A 4 m c-I 0l M n e-I In a) m r\ .--I N al m;t R ''., N r` W 0- C` N 0) r` V 14 6 W R R Id.'M' W O N V W W O N O Ol V W Ol LPq W In to v m m N N .-I O O O N a -I r e-I a-i m 0 n m 0 n V O n In. M N O W W C m c-I N N O W N N u'I W n W Cl O e-I N m V 'r 'r rl m 0 e-I W. W N ul - m W C V n i R as" m m H w vi N o Iri r, m r a w v c i ry ,-i o 0 0 0� ram' o n v o o ram' o as D o' r rc ui n 4n ti W N W m Ol Lrl O N V n. Rd" !-I OA N W, W m O O �-1 N m t m W V N m W O W N m Vl e-I n m Ol R d ua lnOvmm W n,fm W rvr r` WN W v'orvMrnln -I �ln'W W yr rnW nm0 M c v v v v r ti, n v �s ri o o0 o D a 1~i v Ili U6 o r, oD of of a s d ve n n n .n n n n n in n .n JA✓r in ul v vl' sw vl n n v n n n v +nV.,w n 'cn an an o 0 0 0 o o o 0 0 0 0 0 0 0 0 0 0 0l oa a a o 0 0 0 0 0'0 0 0 0 o a a a a 0 0 0 0 Q W 0) O. -I N mR5 v m W O O O W V W O W W V N O W W +sGa^^ N R R wry ci vl O m O m O m O m O 'A g R R R Z N c O m ti O 7 W N m O � V W ` W W OA O H R R N In. N m V W n W R R R R 4J3 rl W W al dI�n "�' r-1 N N V^« O} W . O� In W r� W Cl O c-1 N +�S ia'N �{'}'1 Im, O +.w^� 1� N W W Cl O N M ;C R R R R pp V1 O rri O l0 0 W CSt. m .--I r\ n o o O O O '-1 e•-I �e^5 b R R C"J kt'� n 0; 0 4 In O V1 '-1 t0 .y LiP R R R 3L N an n O wf1 n O W N f\ H W a O O O O O O O O O R R W W JM'1, kn M n o N O n IA N R R R R N n N n M M W V *.$ VD n m Ol r, m N Ol W M O n .^^li W R R W N Ol M N .--I O W n W R R R R ui Iri r57� n ri OD .ti' .-i" N (l'1 V V Iri lD't\ ri fca 'q!ti:' aMP wti m" V Iri 6 r` N oD e # a L to an V% 4PA t/f V? to to of an an ,1n N to to 9XF ill vb, R R h.✓A '*e/n vA RJ"b V'F to to an v) of to N ,pp•µ R R Rin L} Y/Y..m. ...m. � a¢QaaQQaQ a aaaaQaaQQa»�vzaaa �' aaQaaQQQalaaQaa er. ri a e ,, d ti. d d cti:. ¢ d Q a a cl. d d o_ d d a d ar",. ci.. ri. d 9-¢ ' a aL a s o_ 9- a a a 9- a d '... a. d a s' mmmmrrrerr>rrrs 5: a. r r d> dirrr'rrrLnmminLAr> M m m e x'o m v+r m m u�rt r "� > v a ^rs ' v a v v a a v »�' '� wir a r� r "°n > In vl In In In In vl ul '..... In In n In ul vl RNrA vl vl to VI van VI VI qAl ? ? to In RPb Vl Vl W Jl m In to MAS 11'ti AXk N Rn Nn' I^ Jl N Vl VI Vl vl N Vl N W Lp1 tl'A Jl N Val Vl N VA Vl U'd VI VI b"1 m to Vf Vl M1db N N Vl Vl N N Vl %FA 6!A Vi VI w/i N9Y Vl Vl N VI ,Vl Vl N N N Vl Ln 4rA N N N N N N N Nj N N to N N N N N N N N N N N N N N N w/ry N Vl N N N N N N N N N N N N N N 'b-- � ", H H F-' F- H h N I k^- �,, N H t- 1- H� H H H H F #� 4•^ ?^ H tl^ N M- ', N N N N N N N F- H H H kW- i- H H eM1 Vl VI vl"µ VI Vf VI Ul '... ❑ ❑ vl V) tlNV to M vl 0 Vl Vl VI Nx'N LIA V4 vl vi'y 'O eiw" ❑ Vl Vl V1 VI to to Vf Vl InN y�y1%A V7 to d 0-d d d d d d $„ d. d C1. [n d Vl d d d d d d d d In d :Cl, w d d RNA W W W W W W W Rxl W. W W W d m d W '.. W W W W W W W W W iW W W Y Y Y 74" Y Y Y Y *.d', W Y W Y Y Y Y Y Y Y Y Y Y Y yC Y Y Y W Y W ]& Y Y Y Y Y Y Y Y Y Y ice.. Y le o u"1 O Nn o In In O In O v O N O In O M O In 'D Y, to Y O m O In O m O In O In O 0 O In 'kC V VI ?9 W v?, n n .--I R'aJ un �.--I 1--I N N M M V tll Ifl W 4,L] I^.. N W rrwl C'+M In .-i a -I N N m m V m m W W r` N ¢¢QQ¢Q ¢QQ¢mC'aQaQ¢QQQPraaaP r,r���� al.. d.. h- Aw,.. !"_ d d d d �,, D. d d d d d d d d a d E E El E� E� E I EP E E� Eu E >>>>> >>>E=E N IO IO fO 10 fo 2 rO 10' IO . N ala a s as a as m a m a rrrr'rrrrrccr�r m m m m m m m m m cu v v a�u v m7 v l v v, c v c v > > > > > > > > > v > p v aA v v m+ v v> v> v Y. Y Y Y Y Y' Y Y O Y Y O In O N o O IIn O rn Y rn Y O a s N In W' W f, n' W a --I N lfl a• -I L.L ',L L L. L L U L L U L i fO to f0 � N 10 fo 10 (0 fo f6 fC fo v v v rti v v v v v a v v v L L L L M,M O O O O O O O O O al v al v v al v al v al al al v E E E EIE E E E E E E E E 0 0 0 0 `o `o `o o `o `o `o o `o m m io m m m m is is m m m m '. E aa...........aa aaa - dada i m is io io is ro io v w v v v' al `I L L t C F H F- k-• 6---- o O O O O V W In M n N '4 O N In m v .W-I No m 0 i.I --- 1�11-� = E E E E E E E E E E E E E'' E E E E'E E E E E,EE E E E E E d 0 a o i �10 �f>0 t>o I>O f>o(>a f>O '.>rO .>� .>� •N •19 EC- E od o r- . • IIo Yo 2 s cc K W s S W K K W W K 2 C C tr C 2 K K d' W K K d' C C d' C d' ¢ r r r r r r r r r r r r r s>>- >- >- r r 5. r r r r r r r r>. >- r v v v v v v v c v a c v v r r In In n n n In In m n In Ill In n In In r r n u u u u u u cx alp u u u� u u In u u a re u u nr a u' u w u r v v v N aj vl� v v di,. a v u' w u aa'.Aw v v v v Rv� au u 0/ a arer Lt2 'c c c c c c cc c c c c v v v v W v v W W c v c > > > > > >I> > v v a > a v aa' v v v an v v ad v v v v v' IV v ax as v> > v' Y Y'..Y Y Y Y ]C Y Y Y Y le ]C v Y aW Y.Y.Y e Y Y Y Y Y Y Y Y Y Y le v le 1 O In O m O In O W O N O Ill O Y Y O W O m O to O 4Pf O N O In O to O Y Y O I N N m M V V Ill m ''... W W r, n W .--I N Ill .--I ',. e-I N N m m V sp' m m W W n N W a--1 N M .--I L L ` U U L L` ` ` ` U ` U- m fo IU f0 fo a] a] ro a1 IU fO fC fo f0 ', f0 fa fO a] ', f0 rO N (o fa fo IO ro 1 Vf N Vl N N Vl' Vl N W N VI M N VI m V1 M N Vl N VI Vl M M N m V1 ''., to N VI I. Vl M N VI M v t t t t -L a' t t t t t t t' t t 't' t t t t t t t f t t t t t' t t f t I O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O L L L L .. L L L L L L L L L L L L L L L L I to V1 N Vl '... m N N VI V1 Vl Vl VI vl N Vl Vl Ln W M N vl m N VI Vl vl V1 Vl M V1 M N O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O al ar ar al al al al al al al al al al a/ N a1 al al a1 aJ al a/ a/ al N N al al N al al aJ al al E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E 0 0 `o `o 0 0a `o 0 0.0 0 0 0` o` o `o 0 0 0 0 0 0` `o 0 0 `o `o 0 0-0 m m m m m io ar m is m m m m m m m m m m m m m m m m m m m m m m m m m m Ida as a..aa.aa Edda aaaaaaaaaaaaaa............aaa dada a W �,'., N,,,, W�2 N,, WUv v I �� a) W � W (D a) I `1 as va Ra rti. ro xq as ro ro m+6c mvc '.., icvo mcv C ¢�No iaC`nsa1 mmC`Jro mvyGew mveCsti.. ''... .marCq1 mNrtCa ivmCs '..' +eCevnn rCamava. ¢NC m¢ F H H af`COI i¢CWti' : iaCvs N•^ r... W. V"' }^^ F- N^^ ham- H H H N I W p N U al 00�1 I? I ,,,, N N "W N w III I NII NII NII N N -WTI I N �1 N `l `l I > El LO M r O W 0 to w r O M 01 M �--� LD LO V O N W W O N 00 O LO 00 O LD O N CF V LO m 00 n N 0 00 n m V N O Ol n m O M O Ol n 7 M 0 M W m M N_ Lq -i N m �--� n 0 M M M n �--� M W O n Ln N M n M N e-I '-I r-I n N't O N M V M c-1 I� V .-i W N m n V N 00 N M O n V .--I M N .--I 00 N N m Ol Zr W 3. n �--i n O V 00 n M w n N 3. 00 00 M N M LD LO n 0 N V� M NO O M 00 n w LMA V M N M M OLn Nl t w o k Z - Ol LD n Ln N O W LD Idyl W m O V LZD m m m LD N Oml l0 N m LOO N Ol Ol n.,,. al 01 Ol al OU 00 00 00 00 OU w 00 M n M 07 00 V 00 00 w 00 n n n n n lD LD W V O O 00 n N' 00 n r n LD lO LD Ln LIl Lr a q N 0l m H n M Ol Ln e-i n m Ol l!1 N 00 m Ol Ol m Ol rl m Ln n Ol rl m Ln n Ol .ti m m m w m 00 0) n N m rl Ol n m m '-I Ol V lD n Ol .--I N V Ln n 01 C N m Ln N N m- '.. 00 N Lr at N Ln OC - 1 Lr 00 --I V n rl m V U5 00 m O0 m 00 m O0 m n' N n N N' N N N rl e-I c-I N N N M M M V V "I Ln c-I .--I N N Lr Ln LD lO n V} V} VT i/R 'dPJ-I'C VT V±' V4 V"F VT V} i/Y. LY LS iA N V} Vf Lf V1. V.. u} V1• VT V1 in V? V? V} VA V} V}',V} V} V} V} Vl.. Vf m N V1 Vn V} VT m 'A O O O O O O O O CIO O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O W n N 0 00 n Ln V N O Ol n Ln M 00 00 N O lD O LD V O '00 V O 00 a 0 LD N N 00 Ln V '-I LD O V ti LP N lD O n N Ln M M M n� N O M LO V e-I M n M w LD m Ln n M 00 V M Ln e-I LO N w M M N O w O N n '-I M n e-1 V 00 .-1 Ln 00 N Lll M N O/1 '., r-I OO LD � N O n '.. m M H 00 LO V Ln N H S LD m n m 00 V O Ln ci LD N n M M 00 V N LD O Ln LO O M lD O M W O m LO O w r-I 00 N LD O V n '-I Lfl al N LC O LG O LD L10 N N n m N O 00 Ln M O 00 Ln m O 7 m m N M M LOO Otl Oi O N m V LU n co o H N e-I O 00 n m M N O 00 n M r M M O 00 M V M O n V O n V r1 n c ti 00 00 Ol O M V LO Ln O m c-I lO �--� LO rl 0 H n Ln n Ol �--� N 7 lD 00 O N M Ln n Ol N M 1p O V 00 N Ln Ol m <0 O V n ci Lfl 00 m Zt W O Lr1 ri n M 00 � Ol Ln O LD n N '-I H .--I eel rl N N N N. N N '.'. c-I '-1 '-1 N N N M M� V V Ln Ln Ln '-I H N N M M V V N LD LD n '... n 00 AJ1• Vf VT V1 VT Vf 1-11 'A Vn WA in.' VY VL VI V) VT V) VL VT V! V} V) V}. VL V} V} In V} V1 V} V, Vf VT V} A V, VT m' VI Vf VT V Vl In In VT N a> a r> » r r r> r r r r} a a » ¢ a Li Li a Li a a a a a a. a Li a a a¢a. Q a Q a a M Li dad d ri a a a a a a a a a m a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a > a m > > r > N N N N N N N N N N N N N N N Y } m M M M M m m M M M m M In M V1 V1 Ln In to Vl V1 Vl Vl N to N N V1 N N VI N to N N N Ln VI V1 to VI Ln Fn Ln Ln >- M N V1 L%1 Vl Ln T T LA Ln T T Vf to . to N N V1 Vl VI N N Vf V1 V1 V1 V1 V1 Vl VI to N N N M N N N N N N N N N N N Vf N to N m to h VI VI to to L/1 V1 V1 N N N N N N N N N N N N N N N Vl N to N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N r r r r r r r r r r r r r r N r N r r r r r r r r r r r r r N r r N r N r r r r r r r r r r r r r r O ❑ ❑ ❑ O ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ r ❑ r ❑ O ❑ ❑ ❑ ❑ ❑ O ❑ ❑ ❑ ❑ ❑ ❑ ❑ r ❑ r ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ VI VI VI '.. N N N m m m N m m Ln Ln ❑ d❑ to to h m N m m VI 0 m N VI VI Ln Vf ❑ d❑ T T T T Vl T T mI N Vl M N CL h a a a a a m a a a a a a a a V) an a a a a a a a a a a a a a a a Ln W Ln a a a a a a a a a a a a a a W W W W W W W W W W W W W W a W a W W W W W W W W W W W W W W W W a W W W W W W W W W W LL W W W Y Y Y Y Y Y Y Y Y Y Y Y Y Y W Y W Y Y ]4 Y ]4 Y Ne ]e Y Ne Y he Ne Y Y W Y W Y Y Y Y Y Y Y Y Y Y Y Y jr,�, Ln O m O m O m O w O Ln 0 0 0 Y M O N O Ln O m O N O Ln O L!1 O, O Y Y O Ln O LA O Ln O L/1 O L!1 O Ln M mV V to Ln lD tD 1� nW .� lfl �--i ',. rL N N m M ',. 7 V m In LD lD n n 00 sN��N N M m V Ln Lfl tD ID ¢ a Q Q Q..,¢ Q Q¢ Q Q Q..Q ¢ QQ Q a¢ Q Q Q.,Q ¢ Q Q Q Q o. a a a a a a a a a Li d a d a Ci a r r r r r r r r r r r r'¢ ¢¢¢ a Q¢¢¢¢¢ a¢ Q Q a Q a a a a a a a a a a a a a a a a a a a a a a a a a a a a a'',r < r r r r r r rr a a a a a a a a a a a a a a a a a a a a a a a a a 0 0 o O.O o O•o 0 0 0 0 o O o o 0 0 0 0 0 0 o O o 0 0 0.0 0 0 0° o 0 0 0 a`a`a` a` d a d a a` a s Li a ' a a` a` a a a` a a` m m m m m m m m m m w 22 m m m m m m w a a a a a a a la a -Ea a:a a m a w— d a ,,, a a a a a a a a a a a a a K a' CC K C 2 a' lY tY K K K S K } C tY K K K C a' tY C w LY Li' w K K K K C K > } > > > > > > > > > > > > K N > } > > > > > > > > > > } > > K m K > > } �u r-I u eu a �u u �u u N N N N N N N N N N N N N} U m m Iu m U U U U U U U U U U U U U N H N U U U U U U U U U U U U U U m OJ U U U N O1 '.., Ol N N N O1 Ol OJ N OJ Ol N N U U Ol w N O1 OJ O1 O1 N N Ol Ol H N N Ol U U N N N C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C 01 w Ol Ol w w O1 Ol w Ol Ol Ol w O1 C > C N O1 O/ O) Ol Ol w 01 Ol Ol Ol O) O/ O/ Ol C > C O1 Ol Ol > > > > > > > > > > > > > > > y > > > > > > > > > > > > > > > > N Ol OJ > > > O1 O/ OJ W O/ O1 O1 Ol Ol O1 01 Ol OJ O1 > > Ol 01 O/ O/ Ol Ol 0/ Ol O1 O1 Ol OJ N O1 O/ > > Ol Ol W Y Y Y Y Y Y Y Y Y Y Y Y Y Y O Y W Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y O Y W Ne ]d Y to O LN O No O Le O Ln O Ln O Ln O ]C N Y O Ln O LA O N O Ln O Ln O Ln O N O Y Y O m O .-I N N m M F 7 m Ln LO LD n n 00 m `-I c-1 N N M M V a m m 0 LO n n 00 c-I N '.. m L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L LLi L L L L L i L U U L u U U L ` U U u u L U i u E U u u u U U u u u u U ` !O fO N 16 N N IO N N I6 N IO f0 N N N N N f0 N N (9 O1 M M .1 N f0 N m fO IO ML9 N (O N N OJ Ol O) O1 Ol Ol 01 Ol O) 01 0/ O) N W O1 W O1 Ol lU O1 Ol 01 01 Ol Ol N 01 Ol OJ /U 0/ O) lU OJ O) Ol O) to to M V1 V1 to VI M VI V1 M N '.., V1 '.., Vl VI V1 to M In to lA m M M VI to to M VI V1 V1 Vf to V1 '.. N N M V1 '.. u ',, t t t t t t t t' t' v t ',, tf t' t! t t t t t t t t t t' v t t y t' t t t t t t t t O O O 0 0 O O O O O 0 0 0 O O 0 O O O O O 0 0 0 O O 0 O O O O O O O O O 0 0 V1 VI Vf to ''.. V1 Ln VI V1 to N V1 N '', M to VI VI ''.. VI to to N V1 VI V1 N to N V1 V1 N N In N to VI V1 V1 N N O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O m ar m '..... v a w ar w ar '. Lv ai w w al lv ai m m w ai w ar w v m w m m v m w w ar m m v a m wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww ❑ ❑ ❑ ❑ O ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ CIO ❑ ❑ ❑ ❑ ❑ O ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ E E E E E E E EIE E E E E E E E E E E E E E E E E E E E E E E E E E E E E E 0 0 0` `o 0 0 `o oI,`o `o 0 0` `o 0 0 0 `o o` `o o `0 o `o `o `o 0 0 0` o `o `o `o `o o `o o` 0 0 M�MMwM���w����ww���ww���w��ww� a a a a a a a I a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a' -iI ui ui uiI uiI uIi ui ui ui uiI ui ui uiI uiI u uiI u-iI -i 0i uil 0 U, -iI -iI 0iI - I uu m m m m m m m m m m m m ¢`aa,a`¢`aaa`Ia`a`aa v a v v v w a v v v a v � r r r r r r r r r r N N N N N N IO I f0 N N N M v v d w v v v v v v v L L L L L L L L L L L r r r r'r r 1-- I>*Lml C ]e 14 Y Y Y Y Y ]C ]e ]G O 0 O LA O m 0 0 0 m m m v a Ln Ln Ln W n n u L L L u L L L L L fO (0 f0 N fO N N 14 N f0 O) Ol Ol Ol O1 Ol N O1 O1 Ol Ln VI V1 to N VI VI V1 N M t' t t' t' t t t O O O O O O O O O O L L L= L L L L L L v) m m m In m m m In m O O O O O O O O O O U U U U U U U Y U U OJ Ol Ol O1 Ol O1 0/ O1 O! Ol wwwwwwwwww ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ E E E E E E E E E E `o `o 0 0 `o `o 0 0` `o `o w o is is is w is a a o HA a a a a a a a a 1. a uil ui uu uil ui ui uil uil u N N N N IO f0 f0 fO N IO a Q¢¢ a a Q¢ a a M M M M M M L L L L L L L L L L r'1-- 1-- r r r r r r r i � awli Vu vvvNvv�vv'EM0Rvvv 'ME El m'...N N w O V w w O V w 0''.N to O N w O m r-I T V O N L» ei w O m m n N N m w 'tM l0 4IT r-I mm Ol n t'O Xu9 w w O O Vl V$) LYI m tb m W m 00 m W N W`B V lD n M W 7"'+ N"+ N. LO M Ol o o e•-I lD N er` � v '. � � to cri a-: rrta ao vi Lri Lri v v ri ri r•.. v n o m m 0 Dx m rW .� ''... an m m '.... n ,� Ln m us a ui n ti n um r n M OkR m rn n AA .n vn v>• .n .n ...1^ 0 0 0 C) 0 .0 0 0 0 0 0 o 'I �0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O O g # I;R9 lD tD V O N o6 a0 O N XA"41 n M O O Ill W lD 00 Dl O N Y*S rru � Ln'..m m m n Ln tD r,m o'.""'+ X� �'',a. u u -e T' O N t0 Lr � Lr O Lll O l0 # N- tD c-1 n LD oo n .--I V oo H Lm ✓LisDo N LXx # # Do Ill '... lD w M O o0 wq r w w m O w h/x ## LICI eti N N M V Lr Llt t0 n De Lox 'cfi # tFw. *J'b 4n to 4R N of an N of 1n N tin 4R ti76 'Me1 # # 2 $ as as'�ato Az aaQ.maaaa a. a a s a a a a m a m a a a a xs.. a s am. a a m a can. a a. a s nv'Nvmv n nv u9- LA T as n n 5+7 Vl N In Vl XPX Vx I✓9 rwr'T aI'M 1xT W Ln ✓aT o AN VI N N Vl r N N N N N N'.N N N N N N N N N r N❑ N r r! r F r tl F 6 r r ;❑r r❑❑Irks❑L��z❑❑❑c'I❑',❑ yr ❑ a ❑ LL vv a�%ro x 'ux a%r iit all yr a,ra� Jl Jl In a n W n a cu a s A� a D cat a d. a a a a W a Y a W iWW W Wi Ate We.+ w W W W W W W Y Y Y. Y Y ."� Y '� Y Y Y Y f Y N Y O a+ta O uar O APa 0 tl9 o o O LnO s61.. GGi .-I N Ln ti v^i N N m m " o o lD W n I aa''aaaa aaaaaaci alaaaa, Q aQQIlc '¢QQQ QQ Q¢, r�;�rr�I>"-Qrrrrr'a-a--'t,r'arrQ �- o3 a 3 a E a E E a a E a E E E a 0 0 �'0 p o 0 0 0 0 0 0 0 0 0 0 0 a` a a` M M m'1° mmmmmmmmmmmmm a� aC O Y Y O N O Lrl O Ln O LA O Ln O Ln O I. L L L L L L L L L u L L L L L L L VI t/1 Ln N Vl VI Ln VI M N to Vl Ln V1 Vl' Vl to O O o O O o o O o. o o o O O O o o L L L L'. L L L L L L L L L L L L L to N '.. Vr Vp' VI Ln t/1 Vl N vl Vl N N Ln N Vl Vf O O O O O O O O O O O O O O O O O U u u u u u u u u U U U U U U U u U U U U O ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ E E E E E'E E E E E E,E E E E E E `o `o o` o `o `o o `o `o 0 0 `o 02 0 0 0 a m m m.....''m m m m m m m m m m m m m m CIE 'IE E a E a E a E a E a a E E Q Q Q Q Q Q, N N v v C�mW 8mu � � sa m m m m m m m O O O Ln O 4P'x O O y= n O M... lT Ol lD n MN T N kFl o0 n V n O#$# u O M O a"tT 1n ul 00 N O O 4Ab O 'M1' oo ra .--I O 7 Nm it # it # ua - O - N.- Ol a, '., Ol Ol N N n M 00 If'^^ i`"+ O W # V -zl N M Ol N# it ## O m r- N +V w m n Ln m c-I w O m m M O N c-I w O ^tA Ol T n N it '.. ### m m N N'*C 'fwl Ln tr0 lD V N l0 LO L)D rq Ir,. ad r, � Le 6 o v' v' m f) a u a a ni r,xti , N gym` o w w m oo` v o0 in wl Ltr 4n x m' DT cn m csa m rn m rn#### m rw O Acr n N n o r n D m Ln A"- oo "i N W M {`a Ln M e•-I Ol n L/l # # # # T ^t Ln M1'hF" N n O V LD w e4 N N Rl tT .n ra'u zed e.✓'n cn rn {n T .n .n +n # # # # 'un 'eaw 4e ara• a:r'u, to ti> ua +ra o 0 0 0 0 0 0 0 0 0 0 o A### u 0 0 0 0 0 0 0 0 0 0 0 0'#### st O o 0 0 0 0 0 0 o 0 0 0 # it # # # # O O O O O O O O o O o O O O Co X+1 O oo o O O M M O### ## .--i O T .-i Ln N Ol lD N O n'n W N Ol W lD 111 a m N N # # # # # # lD '.,� m..M W N n N W V lD M e-1 lD Ol M N r-I lT Ol O N 'T n n N lT lT Ol # ii # # # it lfl. Lrl r-I .--I Ln M N e-I O 00 YL # # it # # f-1 '-1 m n Ln LP w m w n m M V N e-I N l%7 O m r M m n w##### it [%7 W COI n w W m m m m w w lD lb O n Ill tD Lr Ln V M N ati # # # # # # m V M m r m 't m '7 Ol n m c-1 e-I N m V. 0 tD n o0 Ol # # # # # Yk '-j # SF # 2t a # # # # vT of to N to v? N 1n '..4nI ll� a m m m a cL a cL a m m a. m cL a as aa.M.M aaaaa:.alaLA,a.aa ? Q¢¢a? a a a a > Y asr"�a cal u'l. ual u1 a.n aru 17 n,ry m AX'Y tl.o7 wn w"7 L;l y%1 AXT V✓ yA CA 4/T an RiT ,da o Wg !n 4n LA W�9 ~ � `� I/� {/� N '. e+ra W�7 Al5 WAA Vl LQ 0 L) F✓Y �t�'� Vl In J J J J J J J N N N N qy PI q`y N N N' N N g1] R`,J J e°+I J N N N N N N N J N r r r B y-- ym }- r 0 i vx u�h In A Jl uA v i vT ❑ ❑ v o J J J J❑ v1 a'.'.... a a a a a a a m a a w a w W uu w w w W w w W W ILp w ALX a L6y a w w w w w W W a Y Y Y Ln Y Y 5 Y "5. Y Y w 'Y', W Y ]C Y ]C a� Y Y W Y Y O LIT C'li ury O' L!1 O M O N O Gn 'O!. an O Y Y O tt1 O V1 '., O N O Y A/T ti N IJT +-1 ,^�a N N Aery M V V N N 5yY 'y'S C'* A, 2 '-I FX N t--I fi N N fL'h '., M V .--I a"*A aaaaaar�.�-e.x".a�.ao_a-6-Lm'da-cL ci Q Q Q Q F- r. 1 - a a E E a E E a a a a E a E E 0 0 0.o o o o 0 0 0 0 0 o o 0 0 0 o E E E E E E E E E d E E > > > > > > > E a s a` a` a a` a a a a a` a` a a a c c a` a c c c c c c c c i m mmmmmmmmm m'mmmm- =m ma m m m m m m m m•— a E a a E a E E E E a E E a E m = >. } cc } } } } } } } } } } } } r } } } ¢ > > > K Y K ,� U U U La U un Ln a � Aar � � � � � a �a u u a o a as u j v U u N U ' a a' e " c c c c c c-c cc L: 1 cr a> a c m a a,X w eaci 5 -"." Ad 41 CU dJ t11 dA 7Y mrA G,u a%A abl 4A 4'N.' qi > > > > > .`,. Y ii' u) Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y QI CA w w W w w w he Y Y O Ln O m O LA O Ln O Ln c,M O LnO Y .q Y o Ln O LA O M c, he Ln 1 c-I N Ln m m a m m tD lD n n co L L L L L L L L L L L L L L L L L L L L L L ',M ' mmmmmm m v v v w m v v m m a Ln t t t t t t't t Ln t t Lo N N �''. In N Ln �'...�',.V) t r r C r t t r r C C as vo as w w w xuo w aXa', = w O O O O O O O O O O O O O 0 0 O O o c c. c c c c c. c c 'Am,. C L L L L L L L L L L L L L L L L L L o pF o 0 0 �, � i Vl vl Vl LnN to N t/1 Ln to Vl VI Vl to N '. Vl Vl VI J _ .•.t. J J ..A J .. J' d. o o O o o o O o 0 o o O O O O O O O O O O O O O O O O O Uu u u u u u u u u u u O O u u u u u u u u u u 'J u u u u u u u u N N N / N lU N W N W N N W N N W W o1 O1 W of W lU N N N' N lU N N O! m W m m m 7J UJ U/ O) O! O) Ul Ul 7J Ul N N U/ m W 7J m N Ol O/ U) W GJ m E E' E E E E E E E E E E E E E E E E E E E E E E E E E E E o o 0 0 `a `o 0 0 ,o 0 0'' o `o `o a `oo 0 0 `o `o' o `o `o 0 0` `o 0 0 E.E a E E.E E E E'E: E E E E E E a:amd o d o E.E'LE El El a:. El E m m m m tea M, m m m m m ... Tx ma Rq x'p m m m m m rL1 mq9 ea c c c: c c c c c c c c c c '... 'o c c c c I c .I c' Q Q Q '*' Q Q Q Q Q Q Q S Q Q a Q Q Q a Q Q �c.mm mpm'.mmmmmmm N Ul of GJ 9) of Ul O! !CA al pa' R! 2 2 0 w of al N N of N IFEI�--I IiEIPrI=I=II=II4-I-V4IaIIA ��"Iwk�.Il��t��i� Uw�w�Iw�IwPW��.IwRAA.�W�L� El ID O V a rl O .--I ¢01+ lO...V lD to O O I� .--I VR vl w" im 0 In m N N lD h ',. H Ill Vl M an O 00 m ill rl V In -t of W lO o0 111 m n .-1 N m in lO ITN 00 rti m lD w O to v*..,'. a0 n V lD In o1 ID vl N W H m lD m m v} m h m m I, In N N of m O o rl ll r-I N Ill c-I an r-I m w lO O m Ill N V} rl 1` Il. N c ID N OC M V} V n In w I� N w .-I Ln v}jvf 111...N M W m lD e-I N 111 l0 O 00 m O w N 00 n +n m# ID M O# m s-I o1 n a # a A R # w N N N m" N m .-I of O N N m Ir lD '-I vT N �--I 00 O of N o IN 'n N m c-I m O O m of w N I� m e-I O .--i 0 VT N M Vl T O .--1 al lD Vf O w m# u•1 111 m lD 00 v? A a# g # a## R It R a R R R R R R Y R A 3 A M M 111 w LID0 rZ VY O In N lD W m N an to .-i m ID m M N V} O m .-1 �"� o N 'Z to to 00 c-I I� W^ I, M LD U} O m m# m lD 00 an a R## R R #. ## 34t It a Y a ### # R# R R# # R a a M M N m 00 m O M m N O r C O m lD N m N e-I m 1, N m m N N O - of m m �--I I� N l6 m M .-1 w '-I` V w m 111 N w N N N NIT c-I rl of m n. N O w m 10 Ill m -I R1 Lin N In e-1 N In lO T w C 00 1- m w 0 0 0 0 o 0 o 0 0 0 0 0 0 o'o 0 0 0 o o O 0 o 0 0 o o 0 o o o o# a a a o o 0 0 0 0 o 0 o 0 O 0 o 0# a a a a a o o o 0 0 0 o 0 0 0 o o a a a a ## a# a o o 0 0 0 o 0 O 0 o o o o O 0 o 0 0 0 0 0 0 DO W N 00 O V W N M O 1� N M N 111 10 a A V O lD lD V lC O### In O In O In o# R R# A A# a m O m I- l0 c-I N w O In M m V N W lD V I� V lD m Ifl V VI m 00 '., W 1� m O N "N OO M n O N O N a# ''., V I R V 00 lD 0l 1� N m O V l0 m ''... m m. a a a O O0 0l M ^ M Lin Ill ^ lD c Ol O, N N m rl o N N .. O I, lD O� V ti n W H rti H lD In V .-1 '-I n lD lD ul Ill 111 01 �--� I� n lD VI # .. R I� f\ N of M N 7 # A .. # A m of Ill w of w #### a a a # H lO N ID m Vl m M M 1� N lD Vl M I� m m m m V d' M m In m m A# N N M O w V m A## c)O H w N N## R a O O H N m w N V I- m � O M rl rl N m IY1 m V m V1 m lD m. I�: r-I zr r 1, r-I m N m C m IIl v 1.z m# 00 L R '., a o e. m r m N m ir( m Ill m 1� m 41 a a A m '-1 c N m N w V m 1-z m# m # a # a# v m w 0 rl In e-I O N w. N ('!f lD m V R N vT vT In V} vl V1 # R'R V}.Vl- ti>,'n 4n vl aaa # VT vn M of u vl. % vl• Q Q a a a o_ a o_ a o_ as a a. Q d o. a a a a a o; o_ a d L o_ o; a a D-rd a Y a o_ o_ a s ri. a ara a a aro. o_ N Vl {{/nl {{�n J J VI N J N J J J J J VI J V1 Vl VI J ✓1 J Ul J V1 J VI J J Vl Vl J J J 1{n3 J J J !I/nl J ljl !n J J J J J J J In J N J N H J N H J N F J N H J N H N H N H J N~ N 1n J N N F N H N H N H N H N H N F- J N~ N ❑ to J N N H N H N H N H N H N H N H J N~ N ❑ J N N H N H N H N H N H N F N H J N~ N ❑ J N N F- N H N N N N N ❑ J H H ❑ O ❑ ❑ ❑ ❑ ❑ ❑ F- ❑ ❑ vl H ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ H ❑ In H ❑ ❑ ❑ ❑ V1 ❑ ❑ N ❑ VI ❑ N H ❑ ul H I? ❑ ❑ ❑ O ❑ ❑ ❑ H ❑ In H ❑ ❑ N ❑ VI ❑ N ❑ In ❑ V1 ❑ Vl N ❑ In Vl o_ Vl a Vl o_ VI a VI a Vl a V1 s vl � W an Vl o_ VI D_ VI a Vl a Vl a VI a VI a In D_ W vl. VI a to n. a M a a a rl vl d W In Ln o_ to o_ w to n. w Vf o_ w to o_ w an o_ w to a w ✓l o_ D_ W vl o_ w a w LL w a w a w a w a W In a W Y Y w Y w Y w Y w'..w Y Y a W Y u? a W w ]e w Y w Y w ]G w ]C w Y w Y d W Y a W'..Y lu w Y W Y'..Y W w Y w Y W Y a W Y Y m D_ W Y W Y Y Vl Y O Y In Y O Y"',Y In O W Y Y W w Y Y O Y 111 O o Y In Y O Y''.Y In O W Y Y In O a-1 In '-I O N Ill N O m In m O v Y rl N Y to O .--I In N O N In N O m Vl m O V Y `-I N Y In O rl l!1 '-I O N In N O In In m O rl N In 0 ci � V N N M M ti N a a d a d a o Q d a o_ a D_ a D_ a d a d a a a d a a a d a ri a o_ a o_ a o_ a o_ a d a o a a a a Q n a a a d a a a d a o a a a a Q o_ a a a o_ a d a a a¢ d o a a a o a¢ a a a a a a a a a d a n a a a a a > > > > > a a a a a E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E > E > E > E > a o °- a o o 0 0 0 0 0 o a o E > c > c > c > c > c > c > c E E > c > c > c > c > c > c c '.. > c >'> c c > c > c > c c > c >,> c c c c c c a D• a a` a r1` a a` a' c •- -- c c- c c- c c a` m m m m m m a` a a a a'a a 1O zcc. r r K r r '... incd' r r K r ' '... Y m z LC r K r K r m s r M K r m C >- m s r=} m ' r C z r� ofw >- >-Y C 2 7 K r o' >- d' cc >-Y v K v r r 'n z r K r>. In ccK In r In C r Vl K r Ill K r Ill K r In z } w > z d' r K r CC r K r w r K r C r >.N N u N u N u N u N u N u N u >- m r m m u m u u u u u a v u u u u u u u In y In u u u u u u u `� v '� u u u u u u u N u N v v N v N v u dui u N v v v v u u N v v v v v v u u v N N v v v v u vim"''^ u N v v v N v N u , � N C C C C C �.. C C C C C c c C C C C C C v C v C v C v C v C v C v C C C C v C v C v C v C v C v C v C C > C C v C v C v C v C v C v C v C C C v v v v C v v v C v v > v > v > v > v > v > v > v v v v > v > v > v ''.. > v > v > v > v v > v v > > v > v > v > v > v > v > v v > v ", v > > v > v > v > v > v > v > v v > v v > > v > v > v > v > v > v > v v > v Y v ]G v Y v Y v Y v Y Y v Y "I > Y le Y le ]C Y ]e Y Y Y le Y ]C ]e Y Y Y le ]e Y ]e Y v- N Y Y N Y Y o le Ill Y O Y Ill Y O Ne In Y O Y ]G o In O N In N '', O '... m '.. Ill ''... m O v ]G A N he In O a -I '.. N ''... H O N In N O m Vl m O a ]C r1 N '. Ne ''... V1 o e-I In f-1 O N In N O M In M O ''. V Y �--I ", N he Vl O e-I ul ri O N Vl '... N O, m m o v rl N '... In ei ci N N M M V e-1 m v m v m v m v m v m v m v m v m v m v v) m v M m....', v v v v v v v v v v v v v v V) v v A''..M v v N',N v v M v Ln v In v v M v N v N v v M v v v v v v N v v v v N 00 00.... to W O0 to m 00 W OO W 00 Il0 W 00 W 00 Il0 00 W'.. tW to GOB. W OO IN o0 �', m m m W W W W OO W W o0 m 00...,'. W X.. m W W M 00 00 O O J J O O O J J O O C. O J J J O O O O O O O J J o J J C J C 0 C J C J C o C J C J C O C O C O C O C J C J C O C J C '.. J C J C O C O C J C J C O O O O O O O O O O O O O O O O o o O O O O O O O O O O O O O O O O O O O O O O O o O O O O O O O O tit v v u v u v u v u v u v u v u v it v u v u v u v u v u v u v u v u v u v u v u v u v u v u v u v u v u v u v u v u v u v u v u v u v u v u v u v u v u v t wv u u v u v u v u v u v u v u v u v O1 Ol O/ U/ 71 U1 O1 Ol U1 Ol G1 O1 O1 U1 U/ Ol W O1 OJ O/ N N U1 N N N OJ OJ W U1 7J U1 OJ Ol "', OJ N W U1 N 41 N Ul "'. U1 4! N U/ OJ O/ 1:3Gl E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E `o'o E E `o E E E `o E `o E E E EIE `o E `o E E `o E E E E o `o `o 0 0 `o o` `o `o `o`o o` o o `o `o o 0 0 o 0 0 o o o a a a a a a a a a a LL a a a aIa aaaa a a a a a a a a a u a a a a a a a a a u a u a u a u a a u a u a I m a u m a u io a u m a u u u u u u u u u u u u'u u u u,u u u u u u u u u u u u u u u u u u u u u u u m C mmmm C C C C m C m C m C m C m C m C m C m C m C m C m C mmmmmm C C C C C C m C m C m C m C m C m C m C m C m C m C m C m C m. C C m C m C m C m C m C m C m C m C m C m C m C m C m C a a a a a¢ a a a a a a a a a a aaa a a a a a Q a a a a aaaaa a a¢ a a a a a a a a a a a a is m m io io io is io io io ' m m io io io is m m is m io m io io m io is io io m io is m is is is is io io m io io is is io m io is io v v a v v m v a v v v v w v v v v v v v v a v v v v a v v a v v v m v v v.. H H m..W > > > > > >. > > > > v >- v > v > v >. v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v > v v > W W W W W W W w W W v W W W w W W W W W W W W W W W W W W W W W W W W W W W W w W W W w W W W W W W LL 11 LL 11 11 LL LL ll LT LT LL LL LL 11 LL LL LL l.L I.L 5- LL 11 M 11 lL 1LT'' Il LL 11 LL LL 11 LL LL LL LL LL LL w LL 11 l.L El O N 00 tD O In lD a0 00 cn w rl rl o vi ui oo W oo 00 o n e-I rl N w N�NI�I c, w OOO�OMOI N n Oa n m m n Y� fiti!itilfiliwl"31 lilL1i wra 0 0 0 0 0 0 0 0 010 0 0 0 0 0 0 0 0 o O o 0 0 0 O ID N N'',� N o 0 Il o Ol 00 In n n lD M 00 N n •-I N lD N N 'o0 O n tD lD Vl M M W rl N Vl n F, v m V m o �--I m O N O N N M M N Vl oo ri c-1 N m V Vl w n w 14 dr%ti.'''aca a 0 0 a a E d as : a uma.. a s N a,r r r r a o r a J Vl J J N N N J J N N J N W N {•^^ H H B'•^ F- F-^ f ^' N N '^ ❑ u:p vl of l In u"+a cit '', ❑ vz ❑ W Y Y Y Y '.�.'"k^ W w W w Y O ... m o m O LnU o Y Y d a si a a a a& rcL ci". t� a a a a a a a a a a a a a tR r o0 O �'W V1 N V Ill ID w m WIN IN©I�1i NaO M N In m M O1 ID r m n EW�IOo l0 m m n r 00 n 0000o'='al000000 I:* A o 0 0 0 0 0 a-1 00 M to oo A a lD O N l0 W V V c O O N , � tt N 00 n In .ti VI R A a -,Fo0 � o ko tD O M oo A R O V o In -;TN '.. 00 C N R A lD C m V lD n D1 uu L '-1 , N iR Vf A R N N iA Vf Vf lA a a rti cL D. cL a d CL D_ CL D_ CL ¢ d Q a aa N N N N N N N J N N N N H ♦- H H H H H N F N H F-- H ❑ ❑ ❑ ❑ ❑ ❑ ❑ FO ❑ F ❑ ❑ ❑ VI Vf Vl VI VI N Vf ❑ ❑ of of N N a a a w w w w w w w a w a w w w '.. ]G Y Y Y NI:w Y w Y Y leo Ln In O Vl O Vf O Y N Y O Iil O ri c-1 N N M m '-I N a a a a,a a a a a a a a¢¢¢ r � � F tD YL YL St m O Vl VI O m flz g N O o0 O O O O O o O a lD m O m 'i m A A ti l0 00 N l0 O V cbA 6 rj 0 v1 l0. �..� R a In lD n N m V1 N w 'TR O m n m a 4 R a 0 o O cy c-1 N m m V' m a ''.. u g tO v .-1 tD � c0 a a 0� c c L' o In o ", In o o sa a a v ,-i m m Ln m a R A A to N'.. of ui n o N ui'., n o m a A A v 0 to to M lD A ''', a R U N ao M to N M N m n to ti R A R n N .. LD V tD o R R A A N N M Vl 00 r-I to Ql N Ol A R rl N N V lD Ol A u 'It, A A A A V4 in a a a a o 0 0 0 0 xl o O O o 0 0 0 0 0 0 A A A A 0 0 0 0 O A A A a R 0 0 0 0 0 0 0 0 0 0 X M O Ill u1 Ol Vl a-1 W M n N to V lD 00.0 N C lD a R R a N `~ w O R A A 4 A n n LD V- 00 lD Pn O n A a A a N o .--1 O t0 A A a''.R A. D1 V Ole O1 N m m 00 N m R A R a o M lD m'. 01 R R A A A Vl N W v n Ol N n T A R A A O Vl O .1 tD A A a a R N m m w m N lD al N Vl A a A N N M Vl n �--1 '-1 e-I N N R R A'R vy of ih of th R • .._ _._ d a d d a a a D.. a s Q a a a a a a¢ a D_ D_ o_ o_ a o_ a a a m m,, a a a 9-¢ a a a a a L a >- r>- r a r r i i r a r> a JNH❑VI JNVVH❑1 V�NH❑JNH❑C �}�JNJ❑N~ }��NF-I�NH❑ll 'V�NHl '.. V�NHl Uw�PIm�^�W"^ryryJI .. W{mNF�^.Ay.^i I'..fl�Nl-'1 V{JNF/l� iJ- d rvN}~VJI mJer�tV-I m❑ ❑❑❑ Ir�JcNi V-I 'rJN-I 'A ¢.aW Vl V1 d 01 VI 'VI VI Vf Vl VI a m In vl a m EL a a a m .al w w w a w a w w w w w w w a w tl w w w w w w w Y Y Y w Y Y Y Y y Y' Y le Y ue o Y c Y Y Y Y I7 O M o Y� m ]C O V1 0 00 ul O Y� Y Vl O m O N m M V c-I N Vl .-1 'i N N m. M R .--I N' Vl .--1 .--IN N N M m '4 Ii D_ a a a �F�<-; � �,r��rr H-aaaaa a a a a a a a a a a a a a a a a a a _ N E z E > > > > >I> > a a a E a a E a 7 a 7 a a a E a 7 a a E a a a a E c c •- ------ ° a o o'o 0 0 0 o d o a o 0 0 0 0 0 0 a 4 a o 0 0 0 0 0 o a 4 a o 0 0 0 0 0 0 do '0ao 0,,' D 0 D _ �aaaEaaaEE a` d a 0- ¢ a a a a a a a a` n` a a d i io m m m m m m 1O 2 m m m io io m m a fO m m m m 1 io m m a �0 i0 m m m m m iv K r G< > T> w w Y> a is m a m m a m m a m a a a a a a a a a a a a a a a a a a a a a a a a E a a a r r <-I ,� CL d D. ' a `� N `u v U w SLY l.M k.Y 6l.. r z r r r r r r r r ac r r r r r r r ac a z r r r r r r r o N,o r r r r r r,r r N N N N ry N N r M r m m m m m m m r r v v v a v v a r 'r vl VI m Vl In In ,n ",.,,. u - ✓2 '" 1 u u u u u u ^l a ^� u v u u u u u a u v u u u u u u ep In ^-" Ln c « as u. u a„u u' a c c c c c c r t.I 0!' q1 01 4ti Oi U y� tD {d! ffiY N 4Ji Qy wy U v N I I 01 � . ". � 0 1 4V 1, U1 w OA G c ' v c all Ob q;M 4J 01 ill "".. y�y W5 i.,- o, �4...%.1 v "w. 1 > »:' '�' 4f R! dNM , I , C � !� u1n M IC C' WE C: C. w � C w �� C C G � � � � � C 0: C C � 'C 'C y Ill y O Vl O�le N O v) O }} > > ? > OY "� i17 > > ? ? c c > > > PJ > Ok 4b C ay c CU 01 of 'CA N 'bCN 0d .-I N Vl .-I .-I N N QJ CW dAp 4S 9il &p N > > > > OA of Oy > �. > > > } } > QJ OY OY 4A 41 qd OJ > > W W 01 Q Q tld 01� > 41 OA Op Y 0•% N 4ti 4V L L L L L L L L L L Y le Y Y Y Y �.0 y 4Y Y Y Y Y Y Y Y 4M. Y Y Y Y Y Y Y Y y Y Y Y '.. Y Y Y Y U U ` U U U U ` Y 0 0 0 0 O Ill O he 0 Y O 0 o In O 0 o Y M Y 0 0 0 V1 O N O Y N Y O Vl O ''. Vl O V1 O N N t0 N la N N r0 N f0 N M r-I .-1 N N m M V .--I N Vl a-1 '.. rl N N M m V rl N N c-I c-I N N m M V c-I N Ill H rl N N M M V of N N N v N W N W o) ` ` ` ` u .c L L L L L u L L L L u u t a N m ` ` U ` L U U ` ` ` L U U ` U ` i ` U ` ` U ` ` U ` ` U ` ` ` C.0 c c c c e c o1y� c c a m m m m m m m m m I`o m m m m m m m m m of m m m m m m m m m m m m m m m m m vp m �C�'}} p GJ"a 9 o o 0 N N N N N v N Ol N N N W 01 W N N N N of N W W of W N W W of N N W N W N W U/ 01 01 v ,..B ,_W J J VI N Vl VI Vl VI t/1 Vl Vl Vl V1 Vl VI to Vl '.. Vl Vl In VI Vf In '... V7 VI VI VI Vl t/1 Vl Vl Vl VI Vl VI Vl VI Vl VI 0 Vl 00 00 Op OC. W 00' 00 w r4 Ow w 04 no w ca m0 Oo 00 u w W w 0o co to k0 w tw w C'mma'.. W 4915. MO W W 'la0'.. t�dY bx O O L L L L L L L L L L 0 a� 0 0 a 0 0 0 0 0 r 0 0 0 0 0 0 a 0 0 0 a 0 0 0 0 0' 0 0 0 0 0 0' tz u u I' ;u u .1 J ...1 �. ...9 ,� ,•..1 J ..,J .,,d ...Y J J .. J ...•p ,.� 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o a o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Y i Y i y Y i v w v v v v v v v v v v v v v v v v a1 v v a1 v v v m v v v v v v v v v v v v v N W U1 Ol N U1 N v W N of v w '.. w w O1 w v v O1 w v w O1 N v N v v N v v w v v U1 Ul v v L L L L L L L L L L ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑',.❑'❑ ❑ ❑ ❑ ❑'❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑,,❑',,❑ ❑ ❑ ❑ ❑,❑ O ❑ ❑ ❑ Vf In Vf Vf VI vl VI Vf Vl Vl E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E'E E E E E E E E E o` o `0 0 `o `o.`0 2 0 0` o` o` `o `o o..`o `0"0 0 `0 0..0 0 `o `o o o o —0 0` `o `o'''`o.—`o o 0 0` o'.,o o `o..o o `o —0 —0 0 0 `o m m m m m '.. io m m m m m '..M m m m m m m m M m m is m m m m u m m m M m m m m m m m m m m m m m m m m a E E a''a a:a E E E E E E E. E'a a E a E a 0.. E a a E a a E a'D_ E a E E E a E E E E E 0] 01 pLW 04 tlq hi f0 SO 40 iIW t0 CC Ol N 10 mw0 M dC aq o^p r6 f0 +ro, m! ep 16 �`5 ti7a e"0 f0. sla W11 � GO Ai0 mu M m .. 'm m ea m m p '/;', c. 0;,` C C' c C c c C c c c C c C c c c c c c c c c c aaa'az s a aaa a ¢aaa aaa¢ aaills: a¢a aaaaawc a�z'¢aa caaaaaa[ 0/ `1 v v N `J 9J 1 CWI. CLI OY 01 `1 W `1 01 01 2 `1 w1 � � 01 i � 2 v 2 v v 2 v v F, a OA NU it Ol 2 T v v w 0/ 01 ' v WC'. .c .C.' ,LC '. L •.L e,.c .c .i ,:c L L L ,G .5:. .L .c .c .c .c• .0 .C' JG. L L .0 .c .c ;;CC ,�• .G .c .� .c .IC`. L L L ,C ,C .C: L= Z" H F- F-. �. N^" M Y F-- S- F N^ M-' H F h^ pe }.. F- p_, A... V-' N" F^ �.._. p.... H ♦- F- @^-' I- F-• 1.... 'k.^.. P•- I M^ &^ k'_. H ♦- F- fl^ f- � F^ k-- (LI11 v 01 41 pu v wIN 41 W v w wII N ry v v v NII v N W N w wpwVwVuIwIw[wIw11wlwIw11wVLLVwVwILLVwIwIM11LL V O LD O O O O O O O LD O V 0 0 00 00 O 00 O N 0 0 0 0 0 0 0 0 0 0 0 0 a O O O j m N m-;I- lD w O N'T N o0 li WIZT N O W 10 V li N O� W W O N ItW Id:W n N 00 C O W N 00 lD O C 0 0 0 0 0 0 '.. LA n 00 t -1 oq lD '. M O O N N Ln 00 '-I r w O1 N 0 01 M 00 n lO LD zr m 0 N O '-I lD N 00 m m V m N 00 d' LO 0N V Ln .--� n m Ifl lO 00 O N a -I ci ci N M N W n W O N 'i N M N n M �--� M 0' N N M Ln r O N Ln n O N M M LO m N0 O lD OI N O T 111 lO 01 N Ln m N O O O O O j 0 O c c 'i c Lr c c Ll1 O Ln LD 0 0 C c c e-I e-I 'i '-1 N c N C 0 L!I 'i LD r1 n m l0 Ol N tb Lr '-1 n V N LA OD O lfl '. 0 o O m O 00 1� n LA N O n 111 N O V O lD O O O O O O O O N Ln Ln I� O N Ln n o n lD to m 01 lD m 01 lO Ln LD n m Ol w Na) Ln N n V '-I Ol V 01 m a0 m 00 O T to lD Ol N N 00 '-I V m '-1 m N m Ll1 LO ... n 00 $ m m Ln m 00 00 00 n n In w '- It I LO N 00 I m 0Ln lD 00 O LD m '... m N O m I� m .-I m N m Lr LD n O1 O '-I V LD 00 N lD O - 00 $ N N m Vl 00 -1 n O M ri 'i N N '...'Y1 M V N '-1 N (Yf ; Lr L!1 LD '-1 .--I N m T m lD I, Ol '-I '-I '-I N V Lll n 00 Ol d' 1/T 1n a/T &A7. V} V} lA..,ih 1h N N,, i/* iA LT V} V} N Lf VT'1A N th V} t/f V? N VT i/? L? V} V? VT iA V? L? VT VT VY N• # to to V1 iA VT N N.. N,.rn 0 O 00 O O O O O O 0 0 0 O O O O O O O O O O O O O O O O O � O O O O 0 0 0 0�� 0 0 0 0 0 0 0 0 0 O O O O O O O O _ 0 0 0 0 0 0 a 0 C7 0 0 0 0 0 0 0 0 0 0 0 O 7t 0 0 0 0 0 0 0 0 Y& tk O O O 0 0 0 0 0 O 0 O O 00 O N 0 0 0 0 0 0 0 a 0 lO 0 0 0 0 O O 0 a 0 0 0 0 6 0 m lD r N w O LD N Z Ln V N W N D O V 00 N N 0 Q N W V O D N 00 O 00 to 0 V N O 00 D 00 O N O O O O O D l D N W M O to '... V T W m n N lO O Ln M 'i M rf V LO O0 Oi '-I N '-I 00 O n lO Ll1 V N '-I W O M N 00 V O lD n Ol 'i 01 W tb n n lD OY ''., m m 00 00 n n lD lD Ln m� w w N lD O Q m m m '.... w 00 1� LD Lll V T N SL 00 M 00 N O 00 r-I` 3& Yk N O O1 a -I N M Vl lD -1-L '-I V n Ol 01 V D7 V Ol r n LD V N 01 n V 'i m m m LA m O m m m m y m N V V r m .-1 V� u n V O a0 N LD O V 00 Ln LD n N Ol Ln N 00 M '-I n m '-I al al 00 00 00 W n O N Lr Ln 00 '-1 V n c � N LD Ol N 00 V .-i n U :mN m 7 LO O fY1 r O M M V m c-I '-1 N m 4 Ln LD I� '-1 '-I '-I N m m LD 1, Ol � '-I '-i N RI V L6 00 al In V} V} Iq Vf VI . V) V? V} ih Vk In Vf In Vl V? M} 2X N in N 'f} 1n 1n N V1. V) to V! N 4A i/1 V1 N, N L Q Li a a a ri. Li li a a Q a a a a li Li a a a a li a d a a a a a a Li Q Li Q a a a a a a Li a a a a a a a a a di a a,i i aiaid aid i i i i M a a V V v v N J N T to M V V M J Ln to to Ln M � LJI J J N In Ln J N Ln J N Vl J J J N VI !n !n V1 J J VI VI N J J N J J J J J J Ln J J J J J L%I J J J J J I%I J J J J J N L%I J J J N J N N N N N N N J J N N N N N N N J J N N N N N N N N J N N N N N N N J N N N N N N N to N N VI N N to tn. to N yl N Ln N Ln t/1 On Ln Ln N N N to t/1 N L/1 N N N to N L/1 V1 !n L/1 L/1 M N N L/1 to ✓1 Ln to ✓1 N Ln Ln ',Ln IA In In V1 Ln lA !n lA N N !n VI N V) VI N V1 N !n Ln V1 V1 V) ✓1 V) VI V) V) !n N Ln V) N VI V) to V) !n Ln N V1 to N Vl to Ln Ln L/l m VI N N Vl N t/1 to Vl N N m VI N VI N Lil N Ln Ln !n 'Vl Ln Ln N VI to N to to Ln N N to VI to Ln N N Vl ''.... a d N 11 Ln D_ O_ O_ Ct O_ ll ll. V1 d M d O_ O_ d d d d Ln d M d d O_ L1 0_ 0_''.. d Ln V7 1 W d W W W W W W W D_ W D_ W W W W W W W d W d W W W W W W W 1 W d W W W W W W '.. W d W W Y W Y Y Y Y Y Y Y W Y W Y Y Y Y Y Y '.. Y W Y W le ]2 Y Y Y Y Y W Y W Y Y Y 2 Y ]G '.. ]2 W Y W Y Y Y Y Y Y Y Y O L11 O M O N O Y Y O L!1 O L!1 O LP O Y m Y O Ln O Ln O Ln O Y ]C O Ln O m O Ln O Y ]G O L!1 O LP O Ln .� N N Ln c-I 'i N N m m v 'i N Ll) c-I '-I N N m M Q a..'..,¢ ¢ a..Q Q Q a Q a Q a Q..'..,Q Q'..Q Q Q Q 0- a_.......a a a a a Q a li a s Li a s o_ a a d d d a a Lid< - r r a a a a a a a a a a a a a a a aaaaa a o_ a a a a o_ o_ a a a o d< a o_ a< D_ a s o_ a s D. o o a d F F F F< < << ;- F E E E E E E E E E E E E'E E E E E E E E E E E E E E E E E E E E a o a a o 0 0 0 0 E E > > > > > > E E > > >,> > > > E E > > > > > > > E E > > > > > > > o, o. . c c c c c c c c c c c c c c c c c c c c c 5 c c c c c c c a a` D` a li Li Li i � a` .2 .2 .2 •T .2 .2 io m m •m .m .m io •- m m m m m m m m m m m m m d a a a a a a a m a m a a a a a a a m a a 12 a a a a a j2 a m a m a a a a a a a a 'a a d a a a a o_ a 0' ce CC fK [C K K K K K K K C C tY K 2 w > }Lr}}rrrrrsM>-rrr}rrr >zr},}rr}} }Lzrrrrrr} > rrrrrr } N } N N N N N N N } T '.., } m m m T M M M } V } .., V V } M } In Ln u lu.0 u a -I .0 N N�J U U U �/ V U u M U U u U U U V V u u V V U U U V V Ln N u V V U U U V N 'u u V U V u V V 0a� N 4� Ol O1 al N u Ivry U O1 al aD N aJ N m U V O1 a/ N N O1 al H U V Ol al a1 N O) O) a) U U N N N N a) a! a/ N CU '�' yry� Ol � 4U ul O1 N O1 � � vUi u\i vUi � L\i1 U C w C C C G C C C C+ C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C N C a/ a✓ S1 5] O) W al C 'a'' C O1 Ol 0Y al al O1 al C U C O1 a) al al W m a) C C Ol al al a) N Ol O) C j C al al a1 O) N al N > a] > > > '> > > > aJ a>A > > > > ',. > > > v N > > > > > > > a! > Ol > > > > > > > al N O1 > > > > > > > ;. m sia ar ar m m > > w w j sal m ai ar ar > > ai a m al al v m > > m ar ai m aj ar m > > v m m w ar w N Y OY Y Y Y Y Y Y Y U Y � Y Y '. Y Y Y Y Y N Y N Y Y Y Y Y Y Y O Y al Y Y Y Y Y Y Y O Y al Y Y Y Y Y Y Y Ln Y O LP O m O m '.. O Y u? ]e O Ln O m O Ln O Y M Y O Ln O Ln O m O Y L" Y O m O Ln O m O Y Y O Ln O m O m r1 N LA N N m T a c-I N Ln 'i rl '.., N N m M N Ln 'i 'i N N M '..... m a a-1 N Ln ti 'i N N M m 4 '-I N V7 .--I ci N N m m u L L L L L L L L L L L L L L u L L L LNJ L u L U Ln Ln vi vi Ln vi '..., Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln to Ln In m O O� OI O 01 O O O OI O O1 OII O� O O) OY OI 0 0 D Q Q Q QII RY . R Q D R RII RII RII QII QII 0 0 0 QII QII 0I 0 0 OI O S N N w w N w la IO IO N f0 LO 10 w 10 l0 w w w w w w N N w w w w f0 w w LO LO w w w w w LO w w N w w w w w w m OJ al O) OJ aJ al N m N Ol O! aJ N O/ Ol al N aJ a/ O! W N aJ N N W N a/ N N aJ a! O/ al OJ N a! a! N al al N aJ OJ Ol Ol aJ al O) !n !n N Ln to N to N to Vl Vl L/1 N to '.... to to vl to to L/1 L/1 M N Vl Vl N to to L/1 N vl !n N to L/1 m Vl to M vl Vl Vl N !n N ✓1 to Vl vl t+ a+ a+ a+ a+ ✓ a+ a+ a+ a+ a.+ s+ a+ a+ a+ a+ �+ a+ a+ a+ u �. a+ a+ a+ s+ r+ a+ ++ ++ t+ a+ a+ a+ a+ a+ +� a+ t' t' t' +• t' '',,, }+ a+ a.+ a+ t+ a+ O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O L L L L L L L L L L L Ln to '... VI V1 N M to N '.., VI N V1 V1 M Ln V1 Ln Ln N N V1 VI N V1 V1 Ln !n N VI Ln V1. M !n to VI LA Ln N M VI VI Vf u, lA to VI u, VI VI VI E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E 0 00 `o 0 0 0 0 `o `o o 0 0 `o o `o o` o o` `o `o `o o 0` o 0 0 0 0 0 `o 0 0 `o `o o` o` o o `o `o 0` o `o `o `o m m m m m io m m m m m m '', m m m m m is m m m m M m m m is m m m m m is m m m is m m m m m is m m m m m m d a d a a a d a a a a a',a a a a a a a a a a a a a a a a a a.......a a s m: a: a s a,....a a s aaaaa a a a m 0Y. ¢p al al ra m Lo ro La *0 m0 f0 f0 A5P fO 10 fO 10 N N IO N ',. N f0 Lo m m m i m m m m m m m C C C C C C C C C C C a Q a a a Q Q¢ a a a fa fa 10 f0 '., fO IC f0 f6 (O fO f0 ar ar w a w v v v m w ar v v v ar a, ar ar ar a, a v ar w ar v MEL LL LL LL 11 11 11 LL LL I.L Il Il LL LL 11 LL LL LL LL 11 1�.1.. 4,L 11WWN.a)LL WW LL .. LL LL LL LL 11 16 f0 fO fO 10 ''... l0 f0 'I N L L L L L .. L L L I-1-1-��,F-ram El w p ''... ' 0000 m ON L"D o LINT LmD � L^D 0Nl 00 m ti '. N No ODD Lila n taD vNi N M r-i M Lri w ''. o m n o v n LO M M o Lri 0 wri o Lo .ti N w ri M o r a" w �--� LD rl N m 111 H 00 V O c-I m I\ m 00 w N*+ I" w LD N N M Ln to O M w O LD N 01 Ln r C M Ln LM) - Ol o0 W n l0 6rP! 'aa' M '.. N '-I N Ln W O V1 c-I lD M V M H w m m w m N LD e-I Di n D1 ''., 01 a 0fl c l Ol 01 cr LD 0Y l0 Rl 01 N M l n n M '... rl W r\ N ID Ln Ln V .--I M 1D N W do 'rS' M N H - w N n Ln W M 7 Ln r- H rl M Ol Ln .--1 n n to O t\ l0 tin 'La' M N .--I Ol H t m l!1 t M cri m a -I N a -I '-I N N m 't -;I-L--I ''.. rl N Jq'1. `FN Ln lC n '., eel a --I N m -;T '.... m n 0 0 0 0 0',0 0 0 0 0 0 0 0 0 0 0 0'0 R 00o0000 O N w' +Yt' w w O N � LO l!1 00 e-I lD V N O +' 0 cp' pip 00 N IDm L-1 01"t E`Y fiY. 7 LO I, 00 Ol Ol LO MV +�' tiSW f4 00 N MLD Ln V M N N w r n w V m m p ca Ln LO N I� Ln c-1 c M tln I- D1 '-I M Ln o0 N I� tA5 00 c-I V r� O N+Y" YN! kd I� r-I Vl D1 N N a0 w^A W eepp N o D1 n m a N N cp LD M m e-I LD M m w, m N M Ln L--I oo r-Ln w ba, M O� n O '... n V o0 O N O o O c-I ''..� r-1 +-# O M w N p;t w_ N H ri N M a Ln N r-I N M V Ln LD n 06 V Ln LD 00 rn 4n LT to to VT In .TAT CNT vn v9 . aIQ a a C.5 ai Q cL a& CA. G4. CL d d Q D- a D. f1 d 0_ d d m a m m Sa. a a d d{ a d M a cL M cL d D. a d d d d a a a .� i r ry�'p^ryl �avryry sv YeC�Tap aqi ypNp�p N m rrn ygMyg�A Trfa r+ty q/Mq cMC�p �Mry� ycyprpryry� � N N J VI N N N ..A N N 11 14 N N N N N J N 4'+8 N N N J J ..A N', N N N, NV Vl N '., N LdY 4n afY w�X V4 5+h 18Y N N Lh N Vl Vl WY LVB 'M7 N N tln N L+'3 6Ati M Ln N L.±1 L!k', Le7 W/'I L+h tr'a U`1 vl V7 w^D V7 vl vl WY L�"L Ln Ln Ln un aev nn vt +nLa'b rr"n 'n w'a Ln +,'!� vi en Ln Lrs an vre Ln °'"' yr Ln ua +'.r v2 d Ln w m a. a Q. d. a d Ln 'a Ln a. a a a Q- a n Ln D� vA cs. a s a s w a w d w wW w W wo w a d w w w w twL w LLn a w a W w LFtl w w Y W Y W Y Y Y Y :. "" Y Y W1.1 w Y ]4 he: ]e! '.d. Y Y W ''�` LUA Y ]d `AC °w4 '. le, O Y Y O Ln O N M1O cn'4 $„ ' Y Y O Li 1 O Ln O o 5 Y ". ti;y Ln o 45 O N N m M "x?` r-I �Md', LI1 .--I ei N N Mk M'A W" .--I Nx4 FCA em9 c-1 hd Pti M a a a a d a a i ci d d a a a d a d a ci N a a a a a a i a a¢aaaQaQaaaa,as aaaaRRRR�aaaa eta R a- M- a- r•- a- d- s �- w-• s-• r w-- .. �..�.. W V M CD Gn o O O O oIt' 2 O W LD C w 0O N OtDTI N w d'' O O u Ln m m 00 Nw l0 01 co Ul n 00 in t, vi C rva .--I u .-I m o V N n W O Ln V '.. 00M La0 LDhFlm 00 g w m Ln 00 M O m w O m 00 0q rc^. LO �vq m L-1 m $ y>= Ol O O N D1 m f\ N �n Tn .n an an <rn In .A>• I�, _ an 1/. yr .n .n 41� V-, an O # O o o o p o o a S A '.. o O o o o O '.. 0 O o a o o 0 0 0 0 o a xa a o o p O o o O O 00 =F Vl O Ln O O 6 O $ S O o0 00 N w 00 O O lD N co m ID N O :m:m Ln Co O M m n 00 m V 01 N I -I H O n n 4 >Z M. 7. Ln D1 V Ol M $ IL YF O 00 c-I W N N V n V i7:. l0 O V O ci rl N Yg it Yk ei c-I N N lD ei n Ln tC M n O C --oc Ln 3k 7L - .--1 .--I ' .--I a -I N N m M Ol u c-I '-I N m Ln o o0 g YL In � Vl 4n ih V} 7n',,iR ih � R 2F yn 4P& V1 V1',.VT iR to VT a CL a a d d n. l d d d a a. 0. m RL m '... d d d '^ Ln Ln Ln Ln Ln q;� ry'nrprv�i a v to 6YT Lry ...A N N N N N N hp NQ N O S O'.. LJ � wMY M N Ln, N ud1 Ln S.+V N 4J1 4AD Ln m 5n M ' In Ul Ml1 N Vp Urd MAE WT MR � 0 m CO lb ''. m m WAY t%1 � � vl un N rlq V4 4'b bL"k G+p m � m N an`I Ln V7 ', N a d Ln ✓{ D.d D. a a a a,. N N d a d d d a W w w w w ad Ie a w d w w w w w bMA ';, Y Y Y Y Y Y' W Y w Y Y Y Y Y m p Y N HG O Ln O Ln O 0.f7� M"�'L. Y� ... Y O GFY O Ln o M V H d W LP'1 w-1 .--I d`+p Y^a im !m .--I N Ln '-1 �wM N N m cx, Li d. a s ey. aW a d d i ad d d a ci.. d a d a s a,a a a Q a a a a a a a a aIQ a a a d D,d 2 o a° a o 0 0 0 0.0 o a 2 d o 0.0 0 0 0 o a o a'o 0 0 0..0 0 o a o d o o o o..o o 0 a`'' d Li......a . aC: C: a` a` ` .aLi a a` a` a a..''a a` a` ' w m fO m m m m m m. m f0 m io m m m m m m m m m 2 m m a: a: a a m a m a a a a a a a m a m a a a..a a s a......... d' d a• a..., d a d a >- lY K D_ 0: K K K ' 2 K K C LY K K C d' 2 K 0: K K 0: ' K w w= d' K W- r Z }''I > r Y r > > } K > fr > > > > } > > of > cr > Y > } > > > � > z > > Y > > } > �--� > N} N N N N N N N Y Ms,X >. M M M M M M M> Y R 7 V * V V V} } In Ln Ln. Ln M Ln V) N N U U U U U V kA m 0A M Ld U U U U U W U Ln U Ln Nu p� a m m a a w a p u p u a p m w A c C C C C C 0: �' � w1 C C C C C C: O ,w �' C C C C G C C � Ov: C C C C C C� OA C C OA O) Ol 01 0A dyl M1O C CW C 00 Ga ad oA 07 pJ 07 C C OAS oA a v a u c > u c a > u> a>>> > o 0 0 0 0 > c > > > > > > > >,> > > > > > g �r > '> > > > > > p w > > > > > > > o C7 0 as > aA > +x✓ m m v w �a mr > ' '� S m v m cA w Qaa pM > �° > w pA akb Lv �A w � �. '� > ail w c� NJ+v W a � � � l7 l7 l7 C7 C9 ]e 'A'I'' Y 0A le Y Y Y Y Y ]e 4W ;a0 le Y Y Y Y Y Y Y" Y Y Y Y Y Y Y' Y Y Y Y Y le Y Y K C:, Y m V ei YOH neON LN Om LM OV L-e-I w to .0.--I .-I ON mN oM LM O.-A N n N N lfe-I .nn M M V ti N Ln ti N N N M M O> e-1 } y�..� }L..� }}.--I } L L L '..L' L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L ,Q L L L L" kY c'A U yy q„y yA y;,y � � �' s4.a., U U U u U U i u u U � U U U � U U i � U E U U � u U U � u u Q U i u U sin U � ryh� +fin u�r o�ia N (0 N n'p N N CO N L0 N N f6 L0 !O f0 N N N !C f0 w t0 fO w f0 w t0 w w 01 0/ N W 01 0/ N OJ Ol O/ OJ O) 01 N 01 01 N Ol 01 0) 0A Ol 01 O) OJ 0) OJ 01 01 to Ln M m vl to Vl vl t N N vl N N M t to Vl vl D M V1 vl M vl v1 M to M M Vf vl m to N V1 Ati vl Ln to C uy' C' C C� t fW;N WP' raps a C C 91[q oMl � MLp Oda op 4Ma 0p 0Ny Lvp to Op OAb Ckp Aap iM0 OAA Oip 00 40 LM6 w 0�0 to Cap 'w oa to PHI..'. oo- to pp Op to 00 C � C 0A OY +JY pN o9 L o: ' C C R: C' C C C� G C C. C C C C C 0': C C 'C C C 0C C C C 1C C C C I.� ]L w Ol pY a MAV e O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O Y N Y O Ln o Ln O L L L L -C -CL L L L L L -C -CL L -CL L L L L L -C -CL L L L L L L L -CL L L L -CL L ~ N Ln Y rl N N M i U i i i i u U u u U u u u u U U U U U U U U U N N N N N f0 f0 w w w w w w w w w w w w N w w w w t0 w w w w w t0 w w N w w w w W W N Y aa+ ate+ ate+ Y✓ ate+ ate+ N Ol 01 OA Ol Ol OJ Ol Ol 01 0) OA Ol N O/ O) Ol Ol O/ O/ O) 0A 0A Ol 0A OJ Ol 01 Ol Ol 0A O) O) OJ 01 N O/ O/ O/ 0A O/ VI V1 to '., N M to V1 M f m N M VI to M f VI V1.Ln Ln M V1 V) V1 N VI VI to M Ln N M VI V1 M VI M M '...",... f] t+ a+ a+ �+ a+ a+ r+ a+ a+ a+ a+ +.. a+ s+ a-+ a. a+ �+ a+ a+ a+ a+ a+ a+ a+ t ♦f a+' tf +_f tf t. i. a+ r+ �+ s+ u a+ t tf 0A 0A 0A 0A 0A W''... 0A O1 O O O O O O O 0 O O O O O O O O O O. O O L L L O O O O O O O O O O O O O O O O 0 O O O 0 L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L0 f0 N IO f0 [0 M LO to '... N E In Ln N N N to N N Ln L/1 In VI Vf N N N VI M to VI M N VI VI to In L/1 to N M VI VI Ln V1 ''... m m CO m ''... m m m m E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E 0 `0 0 0 0o 0 0 `0 0`o o `o o `o `o o `oo o `o `o o a'o` -0 -0 0 0 00 0 0 0 `0 0 m i0 m m m io m m m m m m m m am sm am '.am m ....,,diam m am .am ns am m i0 m m ils m m m m m i0 m m m io m m m rp aei nu' m Nm NO m m m ro rm Cp ro ra Lo a rp rw ra m re Ip ira —Fo i iu io io ip `mrp ro as f0 . f0 N M N0 M'A IC! fCA 1'U' f0 f0 f0 10 fO f0 IO 19 IO Lq 1'p Np: 115 na [Q:, !0 l0 fO f0 f0 tO (O li !T ICa tliC 'RS N IO f0 f0 t0 RL Rl f0 fO ar I` WE H r H Ih- Fmm r- w-' �-- p.'"" 'p-- -C L L L L'. ., s L L .r.', H H H M1L- Wes- hL-_ '!. w H H H FaL- h iM M Ol01i N iu iM-2-72L W Ol 011O101NN0!lUWWO)0/WN0AOl >>>>>>>>I_H��I�� w ww w w w w01O1 OAO1 Ol `A `1 Y1 LL Il LL LL Il lL Il LL LL 11 Il M Ll LL LZ Ll_ LZ 11 Ll_ M LL M M L.L ly µ„ µ, M LT LL LL El O LO I� It NO Ol l-ZilD M O W lNfl O rN-I Mr, 1N I'.O a m N LO o V m N w O C O m m N m m 0 LD N m a 0 1p N m V O LD O 'tC N LD O Ln M'T m N n H W 0 Ln W m Ln 1\ Ln m M .--! N 7 wn m O N V Ln O N m N M Ln n m O N V N n M Ol H O C Ln t\ O t n O V rh H - m H Ln CY m N C{ LO M Ln O lD H lO H lD H n N n N l0 m M O 1� �--� m LD M O r, V m m a V N m �-'� LD o� m m 1, N o O o m n Ln o N m N n m O N m N w m m �'-� N LO 1, 0 V H m 1� d' N C m Ln R1 H C Cl r% LO N r*-N m m m a Ot Ln O LO c-1 LD N m M LO al m Ln m N Ln m H V n O V n '.. 0 T O m R1 00 N r,N r,N LD .--I LD N n O r w '-I r t\ LD LG N N V. V r-V --V 'n m N 00 O LO LO 0) e•-I I LA O 00 m r, I 'D O 01 V V m m D1 V O m H w N n LT o H N m ''., w V Ln lD f\ ma) O H N m V Ln m m 1` LT N 00 Ln H r V O r'm a LD N m H N M V 7 N lD LD r, r, 00 ''... 00 H N N N m V Ln LD n m a) '... O N '... m y Lr lR 1% '... N m m m m LO m a' H m v LD m 0) H M V LD m a y H e . -I '-I �4 N N N N n.'A 'J� Aj�'MQ� 0 0 0l0 0 0 0 0 0 0 o O o 0 0 0 a 0 010 0 0 0 0 0 0 0 0 0 00 0 0 0 a o 0 0 0 0 O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0'00 0 0 0 0 0 0 0 oo 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0l0,0 0 0 0 0 0 0 0 0 0 0 0 N m C O LD N m IT w O w w V w w O N a <D m a N ;tw m O N O V� w T V O m LO -ITN O m LD a N a m O N N m r O '.... LO H N N m V m O r,H LD m m w r,m m O N m a m w m m Ln w N m m m -;tO r, V H m -;tH m Ln N m O Ln M tD LD LD Ln Ln ; 7 M M N D1 M ,;rN M H 0� T N N H O Ol m n W N M M W M Ln N M N O M m W 0 -tN H 0 m m m m O Rl LD O1 N N W e-I V I� O n N LO ; O Ol Ln H n m LT N O LD N m V H 6 M, V LO Lr ; M N O Di 00 n LD Ln V M e4 r4 L'i 7' V O LD N M Ln H m V o N M V Dl C m N Ln m O M Ln m H M LD m H m Ln l0 V LD cn v m N H 01 m n l0 Ln V M N a n m V N N LD D n m m Dl O N N N N a N LD t\ m O H N m Lq LD 1\ m O m m m V LD r Ol H M Ln LD m o N a f 00 O V -;t'-I eti H. L--I rl H H H N e-1 rl H '-I e-1 N N N N N. m' '.1/T 1A to N IA In Vf w"4 V$ V} a/} in VA l/) Vf In to ih N V? N N i/1. V} In N i/f N 1n N,. t/T N 4A iR t/? NIn to to N N to to to N N N N N N Ln Ln N N N N N N N Ln Ln Ln N m to N N N N N In N N N N N V1 N N > r > } > Y r } } > = N > > N H} } N N N N N NNN N N N N> T Y M M M M M M M m M m m T m M M rM 14 M M T}> m m m m m m m m m m O m❑ m mlm m".m m m m m m m m m cD m❑ m ❑''',m m m m co m m m m m Co m m 0D m❑ m❑ Ln Ln Ln Ln LA Ln Ln vl Ln m Ln m '.LA Ln Ln Ln Ln Ln LA Ln Ln Ln EA to Ln Ln Ll m Ln m Ln Ln Ln Ln vl LA Un Ln LA Ln vl Ln Ln Ln vl m a m O_ d ''. C D_ N D_ to fl O_ d O_.L1 2 d ll 0_ <Z D_ lL tl O_ O_ V1 ll N D. D_ O_ m '... D_ D_ D_ 11 m m m d m D_ d LI w to O_ W a MIMI wwwwY aY Y W Ln W Y Y Y Y Y Y 0 Y Y Y Y Y Y Y 0 W Y W Y Y Y Y Y Y Y Y Y W W Ln O m O Ln 0 0 0 N O Y N Y O N O Ln O Ln O Ln O Ln O Ln O Ln O Y N Y O O m O N O N 0 0 0 Y Ym H N Ln H H N N T T V V Ln Ln O lD t\ n m H N Ln H V V Ln Ln T LO 1� n m H N Lnm a add m a d a' d m a a d m a a dd a d d d d a�a a a a¢ a a a a a a a s a a a a a a a a a a a Q a a a a a a Q aa Q a a a Q ''r'r r r r r r r r r r r r r r r r r. N N to N N N N N N to N N N N N m N to N N N to N N N > > > > > > > > > > >O > > > > > > > > > > > > > > > m > > > > > > > > > > > > > > > > 7 >O O O O O O O O O O O > > O O O O O O O O O O O O O O O > O > O O O O O O O O O O O O O O O > > l7 C7 l7 C7 l7 C7 C7 l7 l7 C7 C7 l7 l7 C7 ''.... C7 l7 U' C7 l7 l7 C7 C7 l7 V' 'V l7 C7 '� C7 0 (D 0 (DC7 0 0 l7 (D U' l7 o C7 C7 l7 0 w C cc 2' cc w w K oc K w w K ' C ' K K K lY LY wtL' cc cc m K CC cc K i } } > } } } > > } } > N K >- >- >-} >- >- >- >- >- >- >-} >- >- } } } N N N N N N N N N N N N N N N } M } M M M M M M M M M M M M M M M } } N u N m u M u u u u u u u u u u u u u u u V u u u u u u u u u u u u u u u u u u u u u u u N N w O) 0 N w w N N U u N w w 01 N N w w H w w Ol Ol u H u u N w w w N N w N N N w N N OJ H u N u Le N C C '. C C C C C' C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C > > > > > > > > > > N y W > > > > > > > > > > > > > > > Ol y O) > > > > > > > > > > > > > > > N N 0/ O1 O1 O) O/ O1 OJ N W W O) > > w w w w w N w w w w w N w w w> > w w w w O) W OJ O1 O1 LU O/ W O1 OJ O1 Y OJ Y Y Y Y Y Y Y Y Y Y N Y Y Y Y Y Y Y Y le Y Y ]e Y ]G Y Y w Y Y Y Y ]e ]e Y Y Y Y Y Y Y Y Y Y Ln O Ln O Ln O Ln O Ln O Y u? Y O Ln O Ln O Ln O Ln O N O Ln O Ln o Y N Y o m a Ln O Ln O Ln O m O Ln O Ln O ]e N ]e m v -t Ln Ln LO w n r, m H N Ln H H N" m m -q� N m w LO r,n m H N N H H N N m m Q -;tm N w w 1, N m H N Ln u u u u u u t u u u Y U U u u U u u u u u u u U u u u V U U V u u u u u U U u u u u u u u u t u u mw O1 O/ Ol lU Ol OJ OJ O/ Ol lU Ulmmmm Nmmmmmmmmmmm Nm Ulmmmmm Nm"'.mmm O/mmmm U/mmmmm U1mm Ulmmm lU O1 O1 Ol O) Ol LU O1 Ol O1 O/ Ol OJ O1 O1 Ol '''... LU lU O/ N OJ O) LU N Ol OJ Ol '''.... N N Ol O1 O1 � O1 Ol O) N 01 N O1 O/ O/ N O1 Ol O1 lU N O/ mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm mmmmmmmmmmmmmmmm m m m'....m in m m m m m m m m m m m'.....en m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E `o o `o o `o `o 0 0` o` `o 0 0 `o a` `o `o 0 0 0 `o o `o `o o` 0 0 0 0 0 0 w o 0 0 0 0 w m m m m m m m m m m m m m m m m m m m m m m m m m m mmm m m m m m m m m m m m m m m m m m m m m ala a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a,a a a a a a a aaaa H: a a a a fO f6 N lD N 10 N N N N N fO N (O N f0 N N (6 N N N f0 fO fO f0 IO f0 f0 N f0 N N Il] N IO LO N f0 t0 F. (6 IE L9 N f0 f0 fO N '. C C C C C C C C C C C C C C C C mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm v v v v v a v v ry Lv ar Lv Lu w v a lu v v ar Lu v v a, ar m v w v ar a v a, m v v v Lu w v Lu Lu v v ar v Lv m w L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L r r r IL�Ll r r r r r r r r r ar Lv ar w m m lu v ar>> - - - - - I1 W W LL 11 LL LL LL LL LL LL W LL LL LL Il 11 4A„ LL 11 LL lL LL Il El lD a R O N O 00 0 0 0 0 0 0 8 O O o O O o O o 0 0 0 0 l0 lD V lD l� o N� l0 00 o N a lD m T O W N 'i O 0l Ok4 AD M M N O In m m N M M lD N m 7 0 w N m V O 0 0 'D Ql m N m lD M O I- N Ol 'r m 0 Cl Ol .-1 O' rl m m rl 00 tm N 0) to M 0 1- n '7 7 a-1 m m c-I 0 m N w V m e-I O 01 N r-I 0) O V N n m O N m Vl n m O N d' m d' N m N O m m a.U'. Vn V N a-1 O m Vl m V7 N w w m Ln rl w N m V 0 w N I, m m rl m r� c-I x-I m m O 1, � r-I 00 LD m O V N V eT N lD O n 00'. Ot O .--I '... N m m V Vl N M m O fV �--I O m I� 4/1 V m ati O 00 I� O m V m m lD 00 lD V e-I 01 1, V N O m In M N In V R1 N e-I C LTi 01 00 I, 6 N O n n V ll) ry 0'0. M ^ O V 00 N , l0 '.' O. V n e-I l0 T 1l7 00 T O gi 00 M 00 N 1� N. n N '... l0 .-I n N Ol " m km 1, D7 c0 N ID 00 O 00 e-I N V lD N 4PM � rl M lD m '-I '', 00 40 M O 00 Ol . O O N Ol T 1� N 00 T Ol O VI ci ' CD V) I� QI O M to 711Ol =.p' lD m O N N V V7 V7 lD 01 rl M lD 01 to m '-I t+l e-1 .-1 .--I .--1 N N 0t m V V Vl Z w n n - mN c-I N N N N M. Rl..' m rl H c-I x N '... N lV M Rl, m m r� '.... iR � ih � V} W VA UT 'A aJh 1n in N N VT 1? In N in• in. VT Bn Af 4n til?. 51} 'VF to to In N i/} In ih Vf VM 1A'tt"4 N.. V6 V, 'VA In lff VT Vl in '. V1iA O C;i O O O '.. 0 0 0 O O O O O O 0 0 0 0 0 O O o 0 0 0 0 0 0 o O 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O O 0 o Oo 0 0 0 0 0 0 0 0 o ,� 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0,0 0 0 0 0'0 0 0 0 0 0 0 0 0 0'0 0 0 m N N O V m 0) w O V 00 N"m O 00 ?.'O 0 0 0 O'0 0'.0 O O o 0 0 0 0 0 0 0 0 m w tV m m 0 w N m� O w N m V N 0Y� ati N lD Ol .1 V tD m .--1 m lD 00 to V V LD 01 M O CO w R N O m lD V N ''... O m In m O M 01 I, m M M a O W ati 1� N m V1 z M 1 Ol n m a N O m r` an M M 0 W M M M W V N O 04In M ati 01 r% V V 01 N 11 rH O t\ r` lD lD W In M V V M N 041 ', O Ol O N V l0 00 O .-I ' m m r- 0�, N -d 6 O.. O Lr Rl 00 M 00 M I, N 1� N ID rk lD O 00 .-1.. m.. N 4f1 a t`, 0Rl l0 01 N N 00 '-I Ln w N e-1 lD x--I lD x-1 n N h N I� N 4+TF OY O C N N n m 0 e-I m V O n m O N m rl 'i N V N w a -I n , O w N m to .-I m Vl 0W O N Vl r% C N In '... I� C N W'p n %'' an Ln w r� .-i M Vf m N m m .-i 1� O V p'w O .--I .-I c-1 c-I N N m M-;t m V1 w lD 1� m m N N N N M M M% fv q' '-I r-1 ti e-I N N N C, M M V -;F 'i Vl iA ,'I✓b V} 'A In',M lR Vn 1A i/L VT +6!'p 4A 'VA 1^ V�',^A VT V/ VT K,,.N i/T SA 14 In to ih ih lf? 14 4"Y -A '.1A VA N lA V?N ih lA N',.N u,k/Y�,. L°b to VTI14 V1 V1 VI VI V1 Vl V1 VI N V1 Vf Vf VI 0 VI 0 VI Vn 0 to V) In VI VI to V1 VI N Im vi to m Vf VI VI Vf V1 Vl Vf VY 4n N '.. VI Vl 7 } 7 } } y } y } } } } y } } y 7 7 7 7D 7 7 7 7 7 7 7 7 7 7 v1 7 0: 7 7 7 7 7 7 7 7 7 7 7 :>? 7 '>- 7 Y^ Y >L } } } } } } r y ',:>? r y. `� O ~ ❑ ❑ C' ❑ ❑ ❑ ❑ 7 ❑ ❑ ❑ M In m m-- an an ua,w an m w o m o m m m m m on m m m cap m m m o❑e d caeaca❑dd❑d❑❑ ^I❑ nra ❑ddd❑❑❑❑6666 mO,ac? � �, n : � A;, A h;� m m m m m a m 01 m m m m m m m o m� m,. m m m m m m m m m cD Da m m m '� w '^ a s D.. a s o_ D_ D_ a ea.a 1rd Y O_ w W bn'.F w W W W W w w W w w V1 V1 m°M V1 VV Vt,. x+T M1iM In Vl to N VI T N/7 m m Vti 0 L I ' LA N Vf 1N VI VS Vf �/y 'Y Y w Y d d 04 d D. 04.. al 04 C a a d d d 0.. Vl 4+% OL. 04. LL d d d O_ D_ D. LL D. C a Y In Y O nYiY -Lr,- O-''...O N O CJ'1 O N O W W W W W W W W W w W W W W W W c-I N V1 �--I rd N N M M V V lit Ild'M lD lD p ',+,' Y Y Y Y Y Y Y Y J w Y W Y Y Y Y Y Y Y Y ,`,, Y Y Y Y Y Y O 1/1 O n11 O m'ti O V'4 O M O 117t. O 4n ,'} Y Y O rF'a O M O o O Vl 8 cn 'O o O T O O_ a D° d o_ d a d d ci" d o_ a c-1 .-i N N M RM'tl ^%A' ID T 1� M gddro e-1 RV Gpn .-d ,^f N N m m a a am why, '�D aua n n ax Q Q Q C, d *'S Q Q Q Q¢ Q 4Q Q Q n 0.. 0.� �, c L M_. N... W- 0. D. H Hp.w.. H H H H ¢ F R' R g ^ +9,' , UQ-'. M W, z z s z z VI Vl VI VI V) VI Vl, VI V) VI VI VI Vl N 0 '', > > > > > > > > a > > > > > >O � >O O O O O O O o O O O O O O 8 'V U' C7 . C7 -? U' V' C7 -? Vf V) VI N VI VI N V1 V1 V) N V1 V), Vf H V1 N N VI VI V1 V1 V1 Vf VI VI VI VI V1 Vf VI I } - w = = w C K K 2' K cc 77 7 7 7 7 7 7 7 7 Vt K OC ''} r r y r r r r 7 7 7 7 7 Vt > 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 r '~ >-.� .--1 .-1 z m >- >- >. ry .--i e-1 N ti r-1 .--1 '-1 r•-1 c-1 > > > > > > > > > > > > > > > ',. 0 7 > > > > > > > > > > > > > > > ci u r-I u lY O O O ".. O O O O O O O O' O O O O> j a U a U v u (OD� > 0 0 O '.. O O O O O O O O O O O O uuyy u�r' C7 l7 l7 l7 C7 l7 '. C7 C7 C7 C7 l7 C7 C7 C7 V' l7 C7 l7 C7 C7 l7 C7 l7 17 l7 l7 U' l7 C7 C7 C7 w v�i w N �'. � '�. � '.e �:'�. �. � e •w � w y Y r } } r Y y } } } } } } } 00 r } } r y r } } Y Y y r r y r > V u R a a a a 7 a V a V V V u r r In '.... au in In in in iu In in In '... in In in m an c> c w w w w w w w w w w >) v u u' a.r a u au u', �up u u ur u u u an c.a a +r u u xx is u u ay,� a4yp a w u w w .... w > >' > :, > > > > > �,„„ a.. OiN w uww rwn uwiM1 � w vw4 uwM,uw'� u�m rmwk w w Lb wwM 4!� w w w � w w w pa w w Ol w w �' w � Y W w w w w w w "t w W !h WM xix N Y I Y Y Y Y Y Y Y Y Y Y Y xe. VZ 'E G+v •,,, ,^ •" rc'h c�A xtA u4 w O Vl O T O Vl O Vl O N O V) O C IC C C O C C C C C C C N N ll'I c-I '-1 N N M M V a Vl N tD lD I� w w C v, C C C C C C �C C w 'w w w w l'R 'OJ w tl! %U w Ol Y1, W 0.J C >., j IL Od 01 w 9J 4J' W U U U U U U U U U U U U U U U U a > > :w > �> w > > > > > a s > +u ,„,a '> > '. > > ''... Y v :: °: -W w w w w w w w , w w w w w w w w w ar� 4 w e e w w 'w w w > w w w w w aw w w w w w w w w w Y Y Y Y Y Y o Y.Y Y..Y Y Y Y Y w Y w' Y Y Y'..Y Y Y Y ]e '.Y ]4 ]C Y'Y Y Y w w w w w w w w w w a) w w w w O V1 O V1 O V1 O N O V1 O to O N O Y Y O ul O V1 O N O v1 O V1 O V1 O VI O ❑ ❑ ❑ ❑ ❑ O ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ lD I� t\ m H N Vl .--I '-I N N M M V7 N lD lD 1� t\ m w w w w N w w w w w w w w w w w a+ u u u u u U a+ u u U u u Y u u Y u u V u u u u u U u u lJ y u U u m m m m m m m m m m m m m w m m m m m ''... m m m m m m m m m m m v v v v w v v a v w v v w w v m v v v w v a v v v m a w v v w v E E E E E E E E E E E E E E E E ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ C) ❑ ❑ ❑w ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ C� ❑ ❑ ❑ ❑ O �o o O O O o o O " o O 0, o'',.. o 0 w w w w w N w w w w w w N N w w w w w w w w w w w w w N w w w w w w m w n ca m m....m m m''..m m m m m m m m m m m m m m m m im m m m m m m m m m_ m m m m m m m m..m m m'm m m m m m"m..m m m m'm m m m m m m m m m m m m o `o 0`o o 0 `o 0 0 0 `o o `o 0 0 `o `o 0 0` o 0 0 0` o 0 0` `o o > 5i > m m m m m m m m m ''. m m m m m m m is m m m m m m m m m m m m m m m m usr ms im "fo m m m m mr ep '+m m m m�, m, 0: C C 4w C a a a a a d a d a to u' a v a a m, u r` yr u`�`�r a *ws. a "c a�.� ar 4_.'' uM"'. ar' a m n aa' a io io io io m io is m m is is na uo io io io _L �S« >. aY s" a.. �.. a. > > a a. m m m MO m a9B mtl5 m m m fGm Yq� m m m m mII, m m m m m mm f0 r0 m m 9Ad mn mm m C a C C C. C C C C C 0: C O C C C C c '7 ~~~~~~~ Y'w" N=1^ H H 1- ¢ ¢ Q ¢ Q Q ¢ Q ¢ ¢ ¢ Q ¢. ¢, m im im m mo im im 7 m m m u"a. m7. is io T im m mm eaA ro Fq iv is is is io m m is 'm rra m ra m m im is is Iv m ru m" L w w v v w w w 1n, C C C L L '... L L L .6:' ,C, .0 dW' 0 .0 L': .0 L L L J0; .C' .0: L C' ' L w w w w w w w w w w w w w w w w W'..' W,., '�.... k-- h g.... tl•- H H H I- P-- L^- f.- h' �, tl^^ F-" k- 4-°' � ',, F h- t^° 1... lw` k^. H•^ .�..... H K K C C z i K d' ', K K OC '.. 1' a)G. ,.. AK tr S K ______ w w w w w w w w w w w w w w H > >. > > >> > > I >>> > > > > > > L.. > LL LL >.....> > > > > > > > > >. > > > www w wwwwwwwwwwww w w w w w w w w w w w w w w w w ww w wwww w w ''..ww _LL LL W LL LL LL LL LL LL LT LL LL' W LL LT 'LL LL ', W LE LL LL {{„ W W W LL LL LL '.LL LL LL LL LL El 0NLO olf1 WNw0-4w''W lO wOww L0 V N 00 O Olwm n N'DOOl C -N w ^m N N 0ma TO Ln n m m a-1 m a m n O C n O t o L--I -z:- w H Ln V w N-zd- w M N O w c-1 I L --I w .-i n N n N w w M Ol a w M o ZT N m H w O V m m n N w O m m n Ln Ln N m N n 01 O N 0 LD w M N V w n O M V r M N O M w LJI M L! O al n w N n N w m w r m Ln O w L1 w N M m tq Ol w 111 w N to '-I V n O '... V n O M O w� N� V Ln LD LD r, f-I LD N n O r\ LD li n n tO l0 Lrl Lfl � d' V M M N 00 O LD LD Ol N c-1 Ln O m r, Ly LD O V Ol V 4 ati Ln M N Ln V. m' N.. rl. N r of 0 c-I Ln w w V m LD n w 01 O �'-� N m V M w ati Lti w n T N w Ln �'-� V O n T O LD N w 'i N r-I n N of e-I m Ln n O0 w c-I N N N m V Ln lD r ''... O0 m O N lYl � N LD t\ N m m '.... m u) w w 01 e-I T lD w m .1 m V LD m 7 V Lfl n Ol O m LP t\ Dl L-1 Ly 4r c-1 '-I N N N N V! V! V1 1^ V} V. VT //1 V} VT VT',, VT i/1• V} VT V} V} N VT. V1�I V} V} VY....,V} Vf Vf Vf V? Vf VY.V} VT V? V?'1) V?.... VT Vl 'A Vl to 0 0 00 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o O o 0 0 0 0 00 0'.o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O LD o w w V w LD O N V LD w O N V w w O N O Ti wr v. o w LD V N o w LD V N O w O N N w N N o V w N LD zr of o r` Lti to m o w r` w m O N M V m w w m LA LD N T of M V o n V w 7 .-I w Ln N w o Ln m N Ol Lti N V LD m L--I e N al al V N m Lti T ''... V m N N e O ''... m w N w m m m w m Ln N m N O m w 0 N';t N e-I o w w m w o r` m Lti m n m C V n o r,. N.. LD V• O a Ln Ly r- M Cl Ll O LD N 00 V 4 LD M IF LD LA V M N O of 00 n w Lfl V M n V N Ly 4 Lcd o Cr; o. N.. V.. LO ;TO N M V LT C m N ''... Lf1 w o m Ln w Lti m w w Lti M M LD -;T LD of V m N 11 m m n w o a m N V n w m w w o Lti w rti w Ol c N N N N 4 Ln Lo n w 0 e-I N ff Ln LD n w O m m m qt w N m Lti m m w w o N V w w o V 7 V Ln w e N Ln n o N e- 1 e e-1 L--I L--1 e-1 L--1 N rl 4 L--I L--I r-1 N '... N N N N m '-I .-i L--1 '-I N " In V) V} VT VT......., Vl Vl',, V) VT VT Vf Vl VY'... Vl V? V} V/ Vn 'A V1 V} V}.., V1 VY In Vf VY V1. 4/l,. V} V! V} V}.., VY VF V} VY V1 Vl Vl.'.., Vl V1 V) V} V/ V1 VT In V}. VI to N N Ln lA N Vl M M Vl In !n !n M m to N m Vf !n Vf Vl Vl Vl Vl Vf VI Vl m N Vl N In � L/l L/L Vl Vl N to Vl to ati ati i i N N N N N N N N N N M M M m m❑ m'❑ m.m mm m m m m m',,m m m m m m❑ m❑ m m m m m m'...m m m'.m m m m m m❑ m.❑''.m m m m m m m m Vl N m d m til M V7 to VI to Vl N M N N V7 N to Vl m d m to Ln VI Vl Vl Ln Vl til M til N N to Vl to m d m N til Vl Vl Vl Vl til til LL LL n n LL a a D a LL LL LL a s LL LL LL LL LL J J LL a o LL LL LL LL LL a a LL LL LL LL LL n w n LL a LL LL LL a LL LL w w LL L" LL w w w w w w w w w w w w w w w LL w LL w w w w w w w w w w w w w w w LL Y LL w w w w w w w w Y D w lL Y Y Y Y Y Y o Ln ]0 Y Y Y c3 Ln Y ie w Y Y Y Y Y Y Y Ln Y Y Y Y Y Y Y w m Id Y Y Y o cD Y Y Y V7 O Y Y O Ln O N O LP O Ln O L!1 O Ln O N O Y Y O Vl O LJl O Ln O L!1 O L O LA O LP O Y Y O Vl O LA O N O Lfl n w ti N Ln L--I ati N N fh m V lfl Ln lD LD n n w Lti N T L1 Ln N N 0'1 T V V Ln LA lD Lo n t\ w 'i N LI'1 Lti '... Li N N M T V V LL a a Li Li D_ d d d LL o_ LL LL ri D_ LL LL cLLL Li L a LL LL D_ o_ a d m D. m m a o_ m a m m a o_ a a a a ri m m m a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a'a a a a a a a a a a a a a a a a a a F F F F F F F F- F F F F7 r, F H ,, H t j H F F H F '7 '7 F F, F- F H F F F F F F F F F F F F F F H F F F F z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z m m m m m'......� m.,m m m m m m m s m m m m m m m m.� m m or m m s m m m m m m m w m......w m Lr m m m _w.. Ln ,,� > > > > > > > > > O> > > > > > > > > > > > > > > > > > >O > > > > > > > > > > > > > > > > > O > > > > > > > > O O > > O O O O O O O O o O O O O o O> > O O O O O O O O O O O O O O O > > O O O O O O O O V' l7 So l7 l7 I u l7 1. 1. l7 l7 V' L7 U' C. U` 1. 1. C. C7 V' C7 UL (7 l7 l7 m Lr y- s m m o r m m m z m o m m z cr } s m Lr m of m s m of m m mcc} m m m m s m z r >- >- rmr>>r>>>>rr r'>>rrccTmrrrrrr>rrrrrr>rm�mrr>rrrrr Y Y N N N N N N N N N N N N N N N } } M T T m m M T m M T m M T m m r r V V V 7 C V V U U N UU N U u U U U u u u u U U u u u U M M U U U U U U U U U U U U U U U a YUU1 U U U U U U U U U H N N N w N w 0J w w N I Ol O1 01 U V W H N 01 Ol N O1 01 H w N O1 w w 0J u V O1 01 W Ol Ol 01 01 N V C C C C C C C C C C C C C C C C C C c C C C C C C C C C C C C C C C C C C C C C C N 01 C > C 01 01 N OJ O1 0! Ol O1 N 01 lU O1 Ol > > C > C > > > > d N Ol W N O) OJ OJ 01 0/ W C > C 0J 01 N OJ N OJ 01 N > > > y Ok > > > > > > > > > > > > > > > O) N Ol > > > > > > > > > > > > > > > w y Ol > > > > > > > > > Ol > N Ol lU '... W N 01 Ol 01 N 01 OJ OJ N N 01 > > w Ol Ol 01 O/ N w Ol w N N Ol w w Ol > > Ol Ol N Ol N Ol 01 01 Y Ne 4! Y Y ]L Y Y Y Y Y Y Y Y Y Y Y Y O) Y N Y Y c, Y Y Y Y Y Y Y Y Y Y Y Y 01 O Y Y Y Y Y Y Y Y Ln O Y Y O Ln O Ln o Ln O to O m o Ln O o o ]C Ln Y o Ln O L/1 O m o m 0 m o 0 0 Ln O Y Y O Ln O o O m O Ln N w L--I N '., Ln L--I '.., c-I N N M ''... M V C N Ln to lD n N w e-I N Ln e-1 Lti N N M m V Ln Ln lD lD t` f\ w c-I N lfl c-I c-I N N T M V '.. u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u U u u u u u u u U U u 01 41 Ol 0) 01 N N N W O1 0J N 01 O1 OJ N OJ 01 01 OJ OJ N 01 N 0! 0! W N O) 01 O1 Ol N Ol N 01 N W Ol O1 N 01 01 N O1 01 O1 N N ''. U1 O1 N G1 Ul Ol U1 W N O1 U1 U1 O1 Ol N N N N O/ O! W N N 4J Ul Ul N N O1 U1 U/ Ul U1 Ul Ol N U1 U1 Ol W N N N N O1 N GJ O! N v l m v m al m w w m v ar w a, v v a v w a v a Lv a, w a! v v a N w ar w w ar ar v ar m v v v v v m v m w v N m'mmmmmmmmmmmmmmmmmmmmmmmmmmmammmmmmmmmmmmmmmmmmmo m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m E'E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E o'o` o `o o `o o `o o `o 0 0 0 0 0 0 0 0 0 o 0 0 `o 0 0 `o 0 0` o `o 0 0 0 0 0 `o `o 0 0 0 0 `o o `o 0 0 `o 0 io m io io io is m io is iv m m io io io m is is is m m io io m m io is m m io io m m io m m m is io is io m m is is io m io io a a a a a a a a a a a a a a a ", a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a _u u= u u_ u_ u- u u u== °' u== u u== >5 >>?i m m m m m m m m m m m m m m m m m m m m m 6 m m m m m m m m m m m m m m m m m m m m m m m 5 m m m C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C a a'a a a a¢ a a a a a a a a¢ a s a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a � a v v v v v a, a, v F F� F7F {-- 17 F H H F F7 F7 F7 F F7F H H FF FT F7F H F F F F F7 F7H '7F F7 H H '7 F7 r- F F H H H H H F7 H H F7 mm�m�mmmmmmmmmmm 3 3 3 3 313 3 3 3.3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 a w m w as ai w 3 w '..... m m m v m w m m m v m m w m ar m m Lu v v v v v m m w w m v Lv w v Lu v lu v a, v w w C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C y r ar c ar ar w m m z m m m m m m m m m to pc m m m ''... o: w cc m m m m Lr m m m m m m m m lr m m m m m m m m m cc m m m m m 01 0/ N w w O/ w Ol N w w Ol w w w Ol 01 N Ol w Ol w w O/ Ol w w w N w O/ O/ O/ w N 0/ w w N w w w w w w w w w 0/ W W W '. lL W W W W W W W W W W W W lL W W WW lL W W W W lL W W W W W W lL W W W W W S W LL W W LL W W W W W 01 Ol O) N OJ 01 Ol W Ol N N N N 01 N 01 W 01 O/ N Ol W N N W W `1 Ol N `J Ol lU `l Ll v lU `J Ol N '', N �1 Ol O/ `1 d Ol O) N N LL M. t _ 11 _ LL _ _ r _ LL _ _ - _ _ _ _ I,� 11 LL LL LL m11 LL 11 11 11 IL LL 11 11 I1 I1 LA. w w m 11 LL T. LL IL LL LL LL LA.. IL LL LL LT11 1,1,. El 1p V N O m '-I Ol lD m IO V. M I-1 Ol O m lD V N M '-I Ol n N m N l0 N m lD N m 0 l0 N m V w N m V M n m Ol m N m lD M V M N O Ln ri ri M M m Ill O e-1 Ln O Ln O w r-I Ill O O In T m Ol w O O Ol N .--I ci O O N N r-I I --I N lIl V n m V7 m I+1 N Ol l0 '... M O lD VI M 00 n m N N N N N T M V M V V Ln T O w n Vl n M V V V Vl lD mm m Ol O Ol Ln Ol lD M lD w In N N O m m m N '-I n V Ill ID n w m O I --I N M V m ID Ol Ol cf M Vl Ol O N E l0 m O N V l0 00 O M m m m Lo M V m cr m w N M m m l0 n M Ol e•-I In O lfl O V7 e-1 O ei ID e-1 lD r-I n m V lD Ol N e-I N .i e-1 r-I N N N N N m M 00 '... O N Ol M O Ol O1 , 00 n 1p Ill O 00 I7 Lr N N r.: Ln N O n. VI , N O n ul N O ri n 4 M V L!l O t15 O Ill o' ., In O In O L i O N ., IO N In w t0 Ol O N V W m O o 0 c-1 M O V 00 V O ID '-1 n M IT V O ID N O .--I N 1. n O m n Ol O N M Vl ID m Ol '-I N V O N m O O N IO m O N vl r-I I --I ti .-i N N N M Ln Ifl 1p O n m m M N N N N V V In IO m Ol o ''.. c! N M V llln m M M M V ID n N N N N m In IYl N I-4 e-4 rl e•-I _4 e•-1 r o''o 0 0 cw O o 0 0 0 0 0 0 0 0 0 0 0 oa'o o rcn'o 0 0 0 0 0 0 0 0 0 0 0 00 ololo 0 0 0 oIo 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o O'o O o 0 O V m N ko Q' M I� 00 Ol m N In I+'1 n O V m N 4D M m r, +K' <D V w m LD V m IO V O m lD V N m IO '...' N Ol rl n V IO V lD m e•-I M ID' m n m lD M O M ei N N M m M V V Ln in 4D V m m � '-I W M V Vl ID lD n M m m O N o m n u M. r-I Ol Ol N Ill m rn LQ ID. n m Ol O m-ul M V W"tl lR Ol m In O ID ID O N V 1p m O N V l0 Ol e-1 m Ol m "I 00 lD Ill Ol 00 O r-I M Id'i! n Ol Vl V n I!1 M '. 00 O ., 10 N 00 V " e-I n M' tT IfF - , e-I Ol V '-1 ID 1. '-1 M Ln n M N t o w O M In n V _, l0 01 V N In M n m m l0 N m ID N Ol Ill N O"4 AA'1 T V Ill e-I lD Ill IO Ol N M m N Vl m e-1 N m .� V n m lD Ol M m M V Vl Vl Co n n m O5 Cl O N N N M V M ID n M O .� Il'1 V Ill n m Ol .-1 M M M V W m N N In M p'P#, M V ',, M '-I V} to Vn I/1 161 N in in in to N in [n iA in V} in In In In. Vf Rn d/5. 4n. 4b in ill, in t/!'.w in in VT''t . iR v v VT GR tin "'I ih ',tA to " NFS +,, in vl In In In to In en a'a a a a a a a a a....a a s a a a a a a a a a a a a a '..... a a a a a a a a a a a a v a v a } a � a vl h a+a an M In vl In '. In vl In ul vl N In a ul vl In In In an In M In N M a In to !n to `3 In In 7 7 O 7 7 7 7 7 7 7 7 7 7❑ 7 en 7 an :? 7 7 7 7 5 5 5 7' m7 ;❑ 7 75 5 7 7 ''. 7 7 an 7 In 7 7 7 O❑❑❑ O❑ Q' 7> 7>}>} Y Y Y Y Y}} Y Y}> 7} 7 7 Y 7 } r-1 I -I H e-I .-I .--I c-I .--1 '-I r-I I-4 ly ci ri .--I } N } rq N N N N N N } I Y4 > j } } } } T }. } } �vµ N N N N N N N} } m m M vl In IA In A In Lh ti ❑ "i ❑ ❑ Q ❑ ❑ ❑ ❑ p ❑ p ❑ d ❑ ❑ Q N O N 6 ❑ ❑ p ❑ T ❑ T a a a a a a a p m p m m m. m m m m m m m m m m m m ck Q cd to ❑❑ p p❑ ❑❑❑ w w w w w w w m❑ m �m m m m m m m m co STti m m m m m m co m m Y Y Y Y Y "u4 Y m Vl m In N 'Ih N N In In In In A In uA% In A LA m V7 m aa"1 Vl N A Ah I%'N "W"Y j, h 1n In Vl LA N M m Vf m v4'1 Vl N O In '... O In O O Vf W A a a a a a a a a a a m a a a a 0 lyaj N 4t. a a a m a O� 05. cL a a a a a a Vl ' a In GA. a s Ill L ID ID n n CA'A a a W W W W W W W W W W w W W W W a a Aril W W W u,8, y,1,N W ;p,n w W W W W W W a w a WI W w w Y w Y Y Y Y Y Y Y Y Y Y Y '.n." Y Y Y W y W '. " Y Y Y Y Y Y le Y w Y W Y Y Y O_ d d O Ill O In o In O m o to o' Ln O u5 O Y N Y O Vl O Vl O tT 'C' WF 'C✓ a,91 O u1 O t!1 O Y Y o ul y,'O Q Q¢ Q¢" �( .� Nd" u-y '-1 '-1 N ry m m v a m aaa w 'IDD n n ti N Ln „-a .� N ry M T '+'s' <t pn a,n w m a,rti+ [C z K CC d7C H $¢^ F¢" W a Nam^ a VQ- H I¢-', a w - F- Mom- ham- d o_ o_ i d a a aA'. ati. 0:5- �L :, ZZZZ i ; Q< <a¢ ar, > >'> > > > > 0 0 0 0 0 0 o a a a a a a a a a a a a a a a a 3 cw a a a a a a a a a a m a,a a a a a a a o a o 0 0 0 0 .0 .0 0 0 0 0 0 0 0 o a o a o 0 0 0 0 0 0 0 0 0 0 0 0'0 o a o a o 0 0 m z m m m m m a w a a` a s c s a` a a i a a` a a` a` o a o a a` a a` a` a a` a a a 0- a a` a` m a .12 a` a` > > } > > } > 7 N In vl In In vl In vl In In In In In In In a1 In m In In In In In In In In In In In In rn In In In Im In m In V a V V V V V 'n > In 7 7 1 7 7 7 7 7 7 7 7 7 7 7 7 7 In 7 In 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 In 7 In 7 7 7 U u. ea 'u nn S.a a 7 O,7 >,> > >'> > > > >,> > > > > > 7 > 7 > > > > > > > > > > > > > > > 7 >.7 > > > > l7 > O O O O O O O O O O O O O O O> O> O O O O O O O O O O O 0 0 O O> O> O O O mn ve O O U' 0 0 U' (D C7 0 Co o U' (D (Do '.., V' C7 00 '.... O V` O V' C7 C7 (7 l7 C7 l7 00 l7 (O l7 C7 l7 l7 U' O V` O r r r r r r r r r r r r w C N¢ z ac cc w m cc rc m m cc w m w w m s s¢ s¢ K > } } y } Y } } } } } } y } } } } } } } } } y > } } > } y } } > 0[ y } > } } '-I '-I r-I e•-I .-i r-I '-1 .ti '-I '-I r-I .-I e-1 '-1 .--I N m ,} > >>>> U I --I > } N N N N N N N N N N N N N N N} } M In WI M W d 'w' w 0n w w' w W U 4J V U Rn iN id !J' A.I 1.0 In I�.ye W N M N w 6v w M1! ,a u,r 4A 4.N W� U V d„d tiJ NJ m U T uuyy �i M1N Y Y Y Y Y Y Y " 01 w w w qN w 11.1 w w wh w U ru w w ?WA 0.p w V 07 w w 0.A w La U 4C ma Gl, N l0O l�D On n Oo0 s' � '�. � N "� O ""� �. "� "^. �. "w., w r�`.n � � °ter, "'�`+, 'ter ' � "e O, � � "a "�. "*�, � �W,.. C c c C cc C c c c C, c c di D c c C'. fW O. C> c A(7 w1 w w w w w 0 w w w w w w 'C � c' w w w w w wl w w w w w w w 0 u c 0! c w w w w w w w> .�' 'w w i4 M11b w w w ww w w w ISd IVw> } w w SU w w w w w w' w w' w w 09 'w > > w M w Q ❑ ''. p Q p ❑ Q w Y w Y Y Y Y Y Y Y Y Y Y Y NeI e Y Y w w Y Y Y O In l O IO n O Il w Y Ynw w w N '1 eN N In M V V Vl u0 ID n n m !O IOY ati N m '-1 H N N In m V V In In l0 ID n n 00 '-I N In '-1 N N N N N N N N f0 U u u V u U V u U u u u V u u U u u V u U u V u U V U a.+ u U m m m m m m m w w w w w w w w w w w w w w w w w w w w w w w w w w w ''.. w w gyUi w w N N w N w w N N EEEEEE,Ewwwwwwwwwwwwwwwwwwwwwwwwwwwwwwm'0wwwwwwwwww O o 0 0 0 0 0 ❑ p cl ❑ ❑ ❑ ❑ ❑ ',,❑ p ❑ ❑ p ❑ p ❑ ❑ ❑ p ❑ ❑ ❑ ❑ p ❑ p ❑ ❑ O p Q' ❑ ❑ ''O p ❑ ❑ ❑ ❑ O p ❑ tfl'� '� w w w w w.... w w w w w w N w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w f0 _ IO ', L= IC (O .., m m ', m m m m f0 m m m m m m m m m' m m m m m m m m m m m m m m m m m m m m m a a a a a a a m m m m m m m 'm m m m m m m m In m m m m m m m m m m m m m m m m In In m m m m m m m m u, E E'E E'E E E E E E E'E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E `o `o 0 0 0 0 `o 0 0 `o 0 0 `o `o o `o `o 0 0` o` o o `o w o o` o o` 0 -,o` `o `o o `o `o 0 8 o` o o `o c c c c c: c r ¢a:F:'E aaaaaaaaaaaaaaaaaaaaaaaaaa'aaaa,a'aaaaa 19 m w m m a0 M L1J Il &uywy 0 u1 u wA 1u�ryry y�ry+y µµ ifr Wn aA u! Va' MD v0 yyryry �y Wp d�ryy y ��pp �vpp '«M yyh/p 6a vra 4 Mk U _ 4J 4M U r.J,' U 4J "�J' U M.M wA U U . I I U 'lY M13 V 1 it 'U 6 0.A lY IpY iJ uo 'U V by v ' ... F H F7 F7 d%k 10 +'0 IW Y'0 Pd µd"J 0] IO C0 i0 fCA 01 I41 PA N0 ill r0 19 N I0 ib RY t1N GGM I5b frA, Mk Fng u1D iO fO f0 f0 C0 iN iEF RY m m i0 dW C: c C C c G C C C C c G c C L 0d CB w w w w w a0 10 "m tlm dAzalp N f0 ap a0 f0 t0 t0 � d� '', rtAf dU aW ', fO f0 a0 w fO a0 a0 ro IL N K0 a0 .� m N a0 i0 N a0 Pa.. !0 @ � ACI'. � hL^' IL- H H H H H h tl- FL^^ tlL- w w w w w w�d)Oj w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w pan w w w w w IW w w w. w w w vvwIl LL I.L LLLLIAA z LL 64. 11 LL 11 LL LL la 'uLL LL LL LL Il 11 z LL M I.L LL 11 LL M IL LT M LL IA.. 11 11 LL 11 a- I.L LL p,Z El .. O O O Lfl In Ln Ln H Vl O V n l0 O W M I� N O 1� N m '', M H O ... Ol C M N H O Ln C m N Ill Ol m LO m NO lD O a VOl .� Ln m m In � lO n w N LT O N O N m Ln LD O N N H Vl LD m m w O N 3. w� w m O N Ill Ill -t m n O N O N m N O m O N m W Ln W 1p H H n , N r, n O ''... M t o0 N m O O7 M V W Ol M ''... V W Ln m Il M W r� N H O7 M Ln O N V N m N N M P M H V m m V M m N ul H LD Lo l0 M V N ... V H l0 M Ln m 00 V 1� M n H M W m H 't LD al H ul LD O N l0 W N N N m M m N In I O N m I, O N V7 n O rn ,tN H H a0 O O O O O O O O o a o 0 a m 0'1 LD a 0 n N N O I` l/l M O m Ill m O O w m O w Ill N of 00 LD O m V.4T H LO m 00 'r Il O m W m N Ln m O V ''... m r, H m N H O m I, IO m m N H O O H M O rl N H M H Ln ',. H n H m c-1 O N N N V N Ll N I� N �� V Ill m M H H T H l0 c-I m e-I e N I+l N '.... Ln '',. N 1� N Ol N N m V n1 lD m Ln In Ill w O L--I N '-I V H I� ''... c-1 O N M N Ln N ol N H M m n m O V-cr m lD V VT,VT V} V} V). V} V} V1 v4 i^ Vf VT Vf V). VY ) V N VT V} V ) In VT'Vl V} Vl V1 In V} Vl Vl ul VT VT VT iA '.... N- V} V? VY VT Vt iA V! VT V} Vk 'A O O O O O O O O OO O O O O O O O O O CD O O O O O O O O O O OlD OOl OM OIll On O O O O O O O O CD O O O O O CD CD q OO O OOO O OOO O O OOOO O O O O O O O O O O CD O OI01 mHO N V to o0 H MN N to N w w N m O w w V w N m L Il O m O n n O O O O O m m l M Ilw m m O H m N I- m m , I, Ln m I, m O m w H N LD m V 't HO m H m LO 00 O Ln m e-I Ol.06LD4MOlaNrn H It w H e- to Ol m I� 0l O Oi H N N m M m O N a Ol O m Il r, Ol7o0 H Ln al N M r.: 00 c4 N t0 LD O 00 ❑1Vn ID mLo wNM !Yf 7 Lr Ill w wnn N r M wl O1 l Ol H M Ln W 1: m al m, H M n Vl n n n an n H W M t O Ln N lD M Ol H H N M m Ln I/1 m H H r, m V LO O Ol I� H M �' O n LD m M N I- Ill N lD M l0 n ^ l0 H Ql M Ill W 00 Ol H M V lD n al O M m LO LO m m N N W Ill al o0 N H H '-1 H H H r N N N N N 0'1 H H H H N N N N T m M M V H ' N N N M m M V V- Vl V} V1 VT I,).N Vl Vb I VY V! 1^ 'AVk A^ Vi VT... AA 'A Vn ',. Vl In Vl..., V1 VT Vl Vl N V! V? In. V) VL V1......., Vl Vf V) V} Vl....., In iA VT.V} Vf Vn V)',N Vn VI to a a a a rail Vl h VI to V1 V1 N N Vl N Vl N d a Vl ❑ N ❑ Vl ❑ V1 7 N ❑ VI 7 N ❑ Vl ❑ M ❑ V1 ❑ N 7 VI ❑ Vl ❑ N ❑ m 7 a a Ul ❑�❑ ❑ ❑ ❑ 7 ❑ 7 ❑ 7 ❑❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ 7 ❑ ❑ },,,.� '.} y } y } Y } } } } } } } } Y y } } } y } } } y } Y } > } m m r�> v a v v v v a v C a a a � d' a r In r Ln '.. Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln m 0 0❑ m m m ❑'0 m'm 0 m 0 m 0 m 0 m 0 m 0 m 0 m o ❑ m❑ 0 m 0 m 0 m 0 m 0 m 0 m 0 m 0 m 0 m 0 m ❑'0 m'm 0 m 0 m 0 m n❑ o m o Di0 m'm D mmmm O D O 0,0 m'm 0 m 0 m 0 m 0 mmmm 0 0 0 a VI N d a V1 a Vl a to a to a til a 0 m Ln a L%1 a 0 a an a m to M a m VI N m to m N a N a N a Vl a VI a Ln a Ln d Ln d Vl d Ln a an a to m til a m Vl Vl d w m N to a til d N a to a N m NI a Vl d to a N a Ln a Vl a Ln a N a to '., a Vl a w Y Y Y . Y Y Y Y Y Y Y W Y W Y W Y a W W Y a W W Y W Y W Y W Y W Y W Y W Y W Y W Y W Y W Y W Y W Y W Y W Y a w Y a W W Y W Y W Y W Y W Y W ]e! W Y W Y W Y W Y W Y W Y W Y W Y W Y H a LP O N T Ln m O V VI O Ln Ln Ln O lD Ln IO O - Ln n O 00 Y H N Y Ln O H Ln H O N Ln N O M Lf1 M O C to V O Ln Ln Ln O w Ln to O n Ln n O m Y H N Y Vl O H Ln H O N Ln N O m N m O V Ill V O Ln Ln Ln O lD Ln lD O r Lll n O m Q CL a a pia a a¢ a a.a a r a a a r r a a a 0 3 > > > > > > > > > > > > > > > > > > 3 > > > > > > > > > > > > > > > > > > > > > a` a a a a a a a m a a a a 7 a a a a a a a a a a a a.......a a a a a a a a a a a a a a a a a a a a 0 0 0 0 0 0 0 0 0 0 0 o a° a 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o 0 0 0 d a o` a a a d a o` a o a a a a D` d a d a Li a s a` a s a m a a d a` d a d a n- a a a 0-n- Ln Ln Ln Ln vl Ln �Ln Ln Ln Ln Ln a N a Ln Ln Ln Ln an Ln Ln Ln Ln Ln vl Ln Ln Ln Ln a a Ln Ln vl In an Ln 'Ln Ln Ln Ln Ln Ln Ln Ln In m Ln 7 Z3 m m m Z)=) 7 1 n Z) Z)Z) Ln Z) Ln Z) Z) 7 5 Z) 7 m Z) Z. 7 M) Z) 7 7 >O 7 7 D :D D 7 7:n Z) DZ) } > > 0 0 > 0 > 0 > 0.. > 0 > 0 > 0 > O > O > 0 > O> 7 > O> 7 > O > O > O > O > 0 > O > O > 0 > 0 > 0 > O > O > O > O > 0> 7 > > > O > 0 > O > O > 0 >. 0'. > 0 > 0 > 0 > O > O > O > 0 > O > 0 U' C7 l7 C7 l7 ". 17 U' l7 l7 C7 C7 l7 C7 C7 U l7 l7 V' C7 U' C7 C7 C7 0 V' l7 C7 C K K C K K r K r a' r K r K r..m ' ' z K r}} w w K r K r C r K r S K a' C K K K } K w K C cc K K K w K r of r a' r} K K r} C } r m m r m r m }'} m m r m m m m m m r a } d v a v v a v a a v a a a v r Ln r Ln Lu Lu Ln Ln In Lu Ln Lu Ln Lu Lu Ln Ln cu u uu w ',el u w u w w w N vuwi w w w U v a U u w u w u w u w u w u N u N u w u w u N u u w u w u w u N �........v Ln u u w u N u N u'....0 u w u w U1 u w u u N u w u u w u w u u N u u w u u w 0 h H w C C C C w C w w > c w w w w w w w w w w w 0 w w C w w w 0 w w w w w w w w C w w �Qp > > > RLN of 111 w > > > c w > c > > > > > > > > > w of > > > > > C w > > > > > > of w > > > w > > > > Ol u w w aAI w w w ^JY w w w w w >. Y > w w w Y w Y w w Y we Y w Y w Y w Y w Y w Y w Y w Y w Y w> Y w N > w w Y w Y w w ]C w Y w Y w Y w Y w w Y w Y w Y w Y w.. w Y❑ w Y Y a.fl O Y Ln Y O Y Ln Y O Y ul Y O Y Ln Y O Y Ln Y O e T Y Y O '.... H H H O N ]G Ln N O m T m O '.... V ul V O Ln Ln m O lD Ln lD O t\ Ln n O m Y H N Y lfl O H Ln H O 5 N Ln N O m T m O V N a O S Ln Ln Ln O LO to lD O I, ul o n O m N m m a 7 Lfl Ill lD lD r n m H H U N u Ln u `� 'J u u u''.. Y u V u V y u u V U u U u u U u U u u u U u V u U U u N m u u u w u u u u u u u u u ww0wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwE ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ O ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ in w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w I w w w w w w w w w w w w w w w w mmmmmmmmmmmm.mmmmmmmmmmmmmmm2mmmm2mmmmmmmmm2mmmmm M m m m m m no m m in m m m m m Co m m'....m m.......m m m CO CO m m m......m m m m'.,m CO m'..m m CO m m m m m m m m m m a.... E E E E `0 0 0 0 0 0 `o `o `0 o` o .`o o `o .. `o 0 0 o `o o `o o `o `o `o 0 0 0 0` `o `0 0 —`0 `o o —0 o `0 `o 0 0 0 —o M -Mmmmmmmmmmmmmmmmmmmmm -MMmm m mmmm a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a aia a a a a a a a a a a a wy vti = = = = " = = = = = " = = = = = = = u = = = = = = = = = = = = i.'. y > y > >, iw > > > > > > > > > > > > > > > > ii > > > >.. > > > > m m'''G C W: C' m C m C m C 0 d m C m C N m m C m C m C m C m C m C m C m C m C a m C m C a m C a m C a m C a m C a m C a m C a mmmmmm C a C a C a C a C a C a m C a m C a m C a m C a m C a m C a m C a m C a m C a mmm C a C aa C m C aaa m C m C a a vm ear a mmm a a a m a m aaaa m m m in a . a m a m a m a m a m a m ma a m aw m m m m m m m m m m m m. m m m m m m m mmww a w wwwvy rwwvaaw wvwwwv wwvwwal w v vv.vvvwwwvwwwc Wm.. � M--.�� -.:LLL .�m t- � � � F- r h- � � r � �� t-�--��rr���� � r � �m L L �- L r LL � � a1 � al aJ w w w al w w w w a, w w w w w w w a/ w w w w w w w w CC' w w w w w w w w w w w w w w w w w w w w w m w v v v w w a v m w w w w w wi. m Il LL LL E M- - 11 IA.. LL W W 11 11 LL L.L I.L 11 M LT L.L lL 11 LL LL ". LL lL 11 IA. LL _ 11 m LL LL LL - LL LL 11 LL LL w - Il - LL LL - LL - LL 11 11 LL. Lq m ID am) rri co YT�m orioN r,oN NOromHa mavZmD❑m'owmviri❑m v v a m �o o^ oo r, oo ai o ai pri m La '.... r kD a to r, w r, m o NN w N M V pn R t` mal Ori NMV V)<D a1 01 V Mpn al ON to 0o O NTlD 000m0000lDmmV 111 00 r r\OV n lD n M N pn O Vl O Lfl c-1 lD ri lD r-1 lD ci n rr pD c1 N ri ri ri'-I'-INNNN mm p0o r-1 m clVpDn Nnma0Mw O V) N t\ VI ' N O n V7 N O n V7 N O r-1 n c-I O m„ V7 O U'i O.. to O lil O Vl O an O N w N pn W IG N m n O N Ln n O O ri T o '";T0o V O p0 ri n M a) V O p0 N O �--� N n O 1 00 r' M O N m L lD oo Ol '-I N� o N m O O N lD m O oo Ln N a) 1, It�-1 �--i '-I N N '... N m 7 V lfl L!1 lD 1p r� 00 00 a1 N N N N V R m lD w o O '-I N M lD w m m m V o r, w O N M to rl w O Mri -i N ".., r-I r-I c-I ..., ri 4 N r4 ri ri c-I N v} aR N,Vh 1n &M, VA V? 1h I^ v} yn to to in in t/T vT "vv r,n'n iA vd V1 i/} i/} lA ',."V' va 1^/1 VT i/f V} ~ ooi0000csoO a7oloa 00O''O000rwoo 00 0oasc.wo r. r700 o00000 o00000000o00o00000000o 0 0 0 o a o 0 0 0 0 0 0 0 0 0 0 0 o O O O f\ w m w N a1 m N O 5d1 a0 N w aA M9 N H to v O m In e�' 00 D 7 O m D V N 00 D V N a ri . n '7 w m e o N� to 00 m w Ln o m N N oo M m wg itl7 4G4 lD -zrm w M o N Mo m '7 Vl w w r\ w m m o ri N o ri N m m w w m O r-I N M Z a N !7 m m P D i Y ri d m 7 d D 0 m Vl O CN D O N V wo 0o O N V l0 a T O W m w a a n W W ri V t` Ln m o0 Q to t'il 'aa'. 4 � n c GEM VY i n 4 m � rl y1��yY tz r-M M m f`M m N V l0 00 O rYl VI n V c-I l0 al V ti a1 W LD � M r-I al y�r N N o M n m to N� m wD N of M1AR N m Vl M a m ri 4'D in (D a) N m 00 N N oo ri Ln 00 ry N f` m lD al r+°I T 00 00 m m o0 m cr N N �ryry sMp ad% IW'I �497' n 9"w 00' 47"4 al O N N N M 'q'," d91' (D n al O a-i M to n m m ri M M m V w oo m ri M n ll al a-i M A♦ '"� ri ri a -I, c-1 ri ri .--I N VJ Vl " V1 ih " 1Mi 1^ '4/A W9 tll} qd°Y iA"4116A"'Y &PWi tCk 4h {/T V1.N', VT V1 '{iP vA 1A 'm *4h JM V} A.�"Y- V/ V}, VY VT to IA lA VT... V? SA i^ V i i/T lA 1!1 i/? 1R i/? kn q, d a d a 5. a. o. a- a,. a.., a a. a s QA. Cc. a. a s a. Cd. 5. �0 a s am CA a s D.. a a a a a a a ca I a a a a a' a. a a a a o a• a a a I m a aka a s aa, m a a a a a a� a a a a s as a a a a s a rn an vs cr' wn ua rn in Va u'Y wa ari rn 'ua o_ ^ a +rr nn.. uu Gra ter.. Ln VI m v7 pn LA N o o 0 a ob m of o o o an rn rn an +raG m m, '�..� > Y Y 7M } } >- °„�»' } `�- ❑ Y ❑ >i„ 'YM Y } Y- > ',:a^ y-' Y } Y- } 0"_. ❑ > ❑ }u .?m ,'?- A Y } > Y >+' } > ri +'1 mmW e^q ri ri ri ri ri ri r-1 6 n-u' ci rq } Y N f4 N N N ri ' Mrp r"W �. N N t^r8 rN Ay N N N} m Y a*Y a+"p M m m M M T� d+o M Q m ❑ ❑ A ❑ O ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ry '❑ N C3 ❑ ❑ ❑ ❑ Cd ❑ ❑ ❑ ❑ Y G.� } ❑ m ❑ m i5 4 Cb 6 ❑ ❑ 6 ❑ ❑ ❑mmw mmw mmmmmmm T❑ mo mlm mmmmma aDunaDTmM❑�°❑mwcDasmmmww w Vl m im V) VD T to Ln in to Vl to A 4 o V1 0 w - m v'4 to m N W"4. 'u ti V1 +a9 W9 �) !b aW"A Lr'.r G1'a m Vf m qi°k V{' a✓D 4!7 A Ln i.?I Ln oh A d a d a a a a D_ a a a a w of a. w a o. w rn a ",6 w a d m, a a a a a Qa. a m:, ut a yr d a d a`. a a a aM a s Y a w w IW 4pd w w w w w w w W W w o, a w Fa,l w w w w w w pad' IW h!J IJ,Y w w {ak a W a w AtlJ YRY w w w w w W 44x ilk w Y Y Y 'Y Y Y Y Y Y Y Y Y Y Y ke Y w Y Y Y Y Y Y Y ]C ,Y �.." Y Y Y Y „' w Y- Y Y Y Y Y Y Y Y Y Y Y le O o o o O V7 o N O m O m o m O Y Ln Y O m O pn O an' O pn S:Y cr'7 0 (a`o {' ypp O Y N Y o cP'ti O N O Vl O V1 O VA o N In ri H N m M V V T Vl w w N N m +� N N 4 r4 N N M m V V n pary M6P 4D V°• r°; N'. N M M v 'rj M uv wD d a L ei a d a L d a L a L a a d Qi d a as d a a q d a o& cL ri a m a d a t% a m, i a a L a & ti. l ¢ a ¢ ¢ ¢ ¢ ¢ Q ¢ Q Q ¢ ¢ ¢ Q a a ¢: Q ¢ ¢ a ¢ a ¢ ¢ ¢ a ar ¢ ¢ a ¢ a ¢ ........... a 2 a a a o a o o o o 0.. 0 o o 0.. 0' 0 o o o o a a o o o o o o o 0. - o o o o 0'.. o a 4 a,.. o 0 0 0 0.. 0 0 0 0 0, 0 0 a` pi n- Q- a a` D- pi ri pi a` a o......a..o a a a` a a a a n`. ''.. a` a a` n- a....— — o a c..,'a`a a L L L L M a`........L VI tl VI Vf Vl N N VI N VI m m m m m pn Ln a V1 a N Vf m N m o m m Vf o m N o m m a M a to ''., VI V) m m N m ut , 7 1 ❑ ❑ 7 M 7 7 7 7 ❑ ❑ ❑ ❑ 7 ❑ ut ❑ w 7 M ❑ ❑ ❑ 7 M ❑ ❑ M 7 7 .... > > 7 w ❑ pn ❑ ❑ ❑ ❑ ❑ ❑ ❑> ❑ > >>>>> > > > > > > > > > ❑ >7 > > > > > > > > > > > > > > > ❑ > ❑ > > > > > > > ... > > O > o o o o o o a o o o o o o o o > o > o a o o o o o o o o o o o o o > o > o o o o o o o o o U 0 C7 L9 (D 0(D U (D (D U U U (D 0 0 U` l7 U 0 Q U (D (D U' C7 (D U CD C7 l7 l7 C7 l7 l0 0 0 C7 U Q Q C7 (D C7 S cr w w C KQ o' ' K tr K a: a' K CC tr K cc w K of K w tr cc '... > K } } Y } } } } > Y } Y } } Y > K > K > > Y > > } > Y >-> > } > >-Y K > pY } } > >- >-} > Y Y } > N >- N N N N N N N N N N N N N N N Y m Y M M M M M M M M M m M td U l,i U U N U N '40 w U U U U U, U U K,Y U U U U m M U U tls. y 4i v 'U u U U U dw w w as Cu W W W U tl) U w ar v ad '.. w as N R1 a1 apa a) 01 al v U M'. 4.Y aE y a1 0) a! WY vu w iN ram+ wy", ram..y'w r: vh ,W try i"TMn^rwmua p-+uawe +"ms rNw, vim' 'aY dW aP ak C C C C C, C C a C y^ C C C C C C C a C C C C C C C C C C C C CC. C ar v v v as a@ w v w v v C c w as v v v ar a w w ag v v v w v C v> C '', w v v aB o aE qP v v v v' y o) > > > > > > .w ? > } > > > 'Tl > aP } > > > > > > 5 7 > �> > > > v a7 > > ✓ > > > > Y w yap aF v v' v v v v v v k v w v w! > > w v v as v v v iJ uffiM an v v v v v> ? 4) aJ v ar Ea as Gr9 v m Y Y Y Y 8 Y c Y Y Y Y Y Y Y c) � Y ad Y Y Y Y ]C ]e Y Y Y Y Y Y Y 1C Y v Y Y Y Y Y Y Y Y Y Ne N Y Y O M O m O Vl O V1 O Ln O pn O N co Y Ln Y O m o V1 O Ln O vl O N o Ln O m o ]G Y O''tn O pn O V1 O N O V1 O N m r-I ri N N M m V V Ln lD f r, N m ri N m r-I '... ci N N M m a a pn N lD lD t\ n mri N N m M V V pn lf1 to u U u V u U U u u U u U u U U u U u u U u U U u u u U U u u '.. u U U U U u U V u U U u u u U u t U u v OJ v v v v v v v N v v v v v v v v v v v v v v v v v v v v O) v v v v v v v v v v v v v v v $II v v N m m Ol m m W U) m Ul O1 m m N U1 G! m Ul m m W Gl m G1 m m O m m w w m m w m m m m U! ❑ ❑ ❑ ❑ O ❑. ❑ ❑ ❑ ❑ ❑ ❑ O ❑ ❑ ❑ O ❑ ❑ O O ❑ O O O ❑ ❑ ❑ ❑ ❑ ❑ '❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ a! N v al v N m N al N v v al al a) v v v O1 01 Ol v N v N al N yL Ol v N O) v v O) N v v N al v m N O1 v v 0/ O1 M M m M m m m m m m ro m m m m m ro m ro m m m m m ru m m m +9 m m m m m m m m ro m m ro m m m m m m m m m m ',. m m m m m m m m m m m m m m m m m m m m m m m m m m" m co m m m m m '....corn m m m m m m m m '..., m m m m E E E E E E E E E E E E E E E E E E E E E E E E E E E''E E E E E E E''E E''E E E E E'E E E''E E E E E 0 0 0 0` o o `o 0 0 `o 0 0 0 `o `o o `o 0 0 `o `o 0 0 0 0 amnry am4Uvu a47 a4V2i aaA aWb 'auW aU a4A a� Cu]1 � yy4dpp .L��//.d�� akNA U iA' ks uU5, U qwJ1 uU9 '', U 0.tinu v'L:l� m muW`.YY ouLAa u!� U` M`J o �U qJ t`om '� Cro� � 0 yU crk.yY r�hd t�J m+L` m m m 0000o- 00om 000 mmmm m m m m'm m.mmm mm m m m m a a a a aa s a a Caa anl .. U > a a'ma• °5 S a 5 a s > >, °a > _a' a s � a a, S a *�a `a r0 {o Jo Yo r0 ra f0 441 i1R� �q% pW iW sp �0 TO 10 Atl ml9 r0 to fa fa M Co dap ap n1 itl� la a'q ra 10 fa i0 G0 a0 N pFF' EO iW 10 fo to iti.[tl r0 N ra (0 D C C a' C C C C IC C C C C c C C C C C C C C C C P 'C, C C C C C C C C 'C C C c C IC C C C C C C C ¢ Q¢ a a Q a( ¢ a a¢ a¢¢¢ a a a a a a a a a¢ a a a a a a a a¢ a a a «x a¢ a a a a a mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm'mmm v v v v v v and duu �a v v v v v v v v v a v v �n v v v v v v v v v v v w �a v v v v v v v L L .0 aCm L L L L L L -"c L L H H F� H H H H H H H H P.... V-� p ;.. H H F� H H F H F- H H H H H H H H F- H H H F H 4-- H H H F- H F H HI N la la f6 ra fa fafa fa ra r0 fa fa f0 I'a Ya ra ra ra ra ra ra m m na3 v v v v v v v v v v v v v v v vv v v v as c� w v v v v v v v v v v var v v v v v v v v C C C C C C C C C C C C C C C C C C C C C C C C 'C C C C C C C C C C C C C 'C,C C C C C C C C C () a) a) '... v a) w a) v a) w v w w as a) a) W v v a) a) v a) v v v v w v 0) v a) a) v a) v a) v w w a) a) a) a) v v a) v a) K 2 K a! C a! K K 2 K tr arc oc w w w w w a_ w K w w w w w alE•;. K K tY K K K K N v v a) v Ol a) v al W v v N N v a) v al v Ol W a) v al v aJ a) v a) a) (u a) w () a) a) w v a) v a) v a) al 0) v v W v > > > > > > > > > > >. > > > > > > > > > >� > > > > > > > > > > } > > > > > > > > > > > W w w W w w w W w w W W W W w W W W W W W W w w w w w W W w w w W w W w w W w w w w w w W w w w w LL LL LL IL m 1.1 Lz LL a- Z LT 11 l7 E M z lA... LL. LT lL 11 lz M LT LL 11 lL LL 11 U_ M 4_ M 11 M 1.1 LL LT M lL d- LL 11 lL a- 11 LL LZ LL El O T m m m m m I� m O C m N 0 N In m T w w l0 m C m 01 T m ON I� ei 1D O Vl m N M C w ID O N N C lD m O N C m M 1� ei C l0 C N C w N V l0 O N C W m N C l0 CO M lD a N M C w m m O In In m ti m m m w m ry l0 .� In m O N w 111 m O N In '-I N l0 m m m O N C m C lD m O N C m 0 m O N .-I w �D l0 N I� N w N m M C m N O rl LD N N N C m T I� N m m N m I� lD to C M m m C In 1, m N m Ill N N N m m C C ''., C Ill Ill l0 l0 M M I� O- H N N m m C C C In M W W n lD V '-I N M C M lD N Vj 1, O M C N e-I H w 0 0 0 0 0 6 O O O O O O N O M V N m N a Ill i lD M O r':C r m In N C O 1� m N l0 O d m C H m ID O m C '... C .�-� 10 0 m H C r, O m m m N Vl m O C I� '-IN N m C C Ill lD I, r,m m m 0. -� O m C N C Ill I� m m N C In I� C C C In m m N rn w m 0 '.. M Ill I, m N V QO N N N C lD '... m O N V lD m O N C w m H m -tC m m N IO O C m N N N N N N N M m M .-i' r-I H H �"� N N N N N M M H N N N 1.16 t/f VT V} L} in 4n ^�:IY L} tn. VT VT VY V'1 tl/},5t5Vy, V} V? VT L? V? i/1 N xiA Vb Vl in. in to VY Vf ul,. ul.. LT Vl i/} VT in L} V} in Vf 11} In V'• In 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o O o 0 0 0 0 0 0 0 o 0 O o O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 a o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o O O o o O o O o 0 0 0 0 m N w N m w N m 0 t0 N m C ID N m V In m M tD m N o m e-I C I� O m w m N lfl m 0 w w N m C 0 w N C Ill 1, m m C I, Vl T N 1` m O N M Ill l0 m m 00 N C m Ill .--I W C M ti m m W C M .--� m r, ID t N 1� �--I N M m l0 M m lD O M m m m I� O �--� N M O C m M 1� V'I m M m N lD l0 N l0 m m '.. m m m m m m m m I, n n 1` n N In N m m m m 1 r- 00 m C" M m m N T m N w 0 Ill m V M N 1� c-I l0 O N lDO C m T' c4 Ol 1,: lfl M .4 Ol r, M '-I m P, Ill N m a I- M m Ill c-I I� n r 1` lD m O N M rl N m Ill I, C O n m 0 lD m M 1� rl r,H M m N lD O C r, �"� 0 m M W O W M N M N O n ul M ul I- m rl C it tD m �--I M Vm �-- l m '-I m lD I C 1� m N N N m ',. C I- m r-I C lD m a -I M lq m O T Ill m V o w m C m T m M N N N M e-1 c-1 H c-1 N N N N M m M M N N N N M M M M H N M 4l1 to VT Vn Mn lff an in to lj1 iA V) V'M Vl 4n Ui V} t/T an 4/T Vl V) V^F 'A to -V) VT In VY. 'A l/1 tR VY In u? N an V/ 4n In VY 1A 4n ❑ ❑ d d d 'Vl d d d ',, d d 0- d = d d d d d d d d d Vf Vl V7 M d d ✓1 Vl Vl In Vl Vl ✓1 Vf VI Vf Ul In Vl VI Vl 7 7 ❑ ❑ ❑ ❑ 7 ❑ 7 ❑ 7 ❑ 7 ❑ ❑ ❑ ❑ ❑ } } Y Y = Y } > } > > r i Y > > } Y > } Vl N m m ul V1 Vl Vl VI Vl VI VI Vl V7 m Ul U7 Vl m Vl V7 V7 U7 Vf V1 a a v v v V v v In �', In � 7 7 ❑ ❑ 7 ❑ ❑ 7 7 7 ❑ 7 ❑ 7 ❑ ut Z> Z) mmm m❑ m o m m m m m m m m m m m mmmm ,� }>>>>>}} Y r}> y> i N >} >''� ''' Vl Vl Vl LA m m VI Vl 'A Vl Vl LAVI Vl VI Vl V) VI VI V1 Vl Vl rl Vl .-i N N d d d d V1 V1 VI Vl Vl VI V1 N VI VI LA N LA 'AW W W W d w d W W W W W W w W W w W W U W W m N N v1 U1 U1 N U1 N V1 ul U1 M V1 V1 V1 N N Y Y Y Y w Y w Y Y Y Y Y Y Y Y Y Y Y Y Y Y'Y d VI VI Vl 'AN ul v) ul Vl VI V1 Vf Vl vl Lnd Vt Vl In In Vl m O Ill O Y ]G O m O m O Vl O Ill O VY O Vl O In O Vl W Vl d d d d d d d d 0-d d d d d d V) W Vl d d d d d d l0 I� n m e-I N In a -I rl N N M M C C Ill Ill w l0 I� n m d O d W W W W W W W W W W W W W W W d d W W w w w w D_ 5 a. 0_ d d d d 11 d li D_ d d d d d d d a_d d w Y w Y Y Y Y Y Y Y Y Y Y Y Y Y Y Id W Y W Y Y Y Y Y Y Y Y In O m o Ill O In O Vl O m O m o Y LQ Y 0 m O Ill O m Q Q a a Q Q Q a Q Q a Q a Q a a Q Q Q a Q a .-i N Vl '-I '-I N N m T C It Vl l0 l0 1� 1` m N Vl. .-i '-I N N T m H' H ~ F~~ H~~ H H~ H~~~ �, d d O_ ti O_ d d C 1 ti O_ 0-d d 0-d O_ d ti d d CL d 1 d d Z Z z z Z Z z z z Z z z z Z Z z z z z z Z z Q a a a a a a a¢¢ a a¢ a¢ a a a¢ a a¢ a a Q a a x m ac a ccac m m m m z ac ¢ m m m s m x m m CrF H H r H F H H a "= a a a a aaa a a a a a a a a O o o o d 0 d O O O O O O O O O O O O O O . O L 0- LL` A-. o a o d a d a d` a s L a a a d` d a d` Vl Vl Vl V1 d d U1 In V1 N Vl V1 Vl Vl U1 Ln m U1 N N U1 ❑ ❑ v1 ❑ u1 ❑ 7 ❑ ❑ 7 7 m 7 ❑ ❑ ❑ ❑ ❑ 7 ❑ > > > > >O > > > >... > > > > > > > > > >, > O O O o V. p U'V l7 C7 C7 l7 V' C7 C7 V' V' (7 U' l7 l7 V' V' l7 U' � V, Q: C 2 K K K m K D: K K d' K aC S K K K m m Ul Ul N M ul V7 5 V7 V7 5 In Vl Vl Ul Ul Vl Vl Vl Vl Vl Vl } r Y Y } } } Y r } } r } Y } } } Y } Vl ❑ In ❑ ❑ ❑ ❑ > ❑ > ❑ > > ❑ > > > > � � ❑ ❑ ❑ 7 7 ❑ M rrl T T r Y V a V C C C a C V a 7 C ❑ 0 7 > > > > > > > > > > > > > > > > >O ❑ > > > > > > a u a u u u u,u u u u u u u u u u u> > o 0 0 0 0 0 0 0 0 0 0 0 0 0 0> > a o 0 0 0 0 m w N N u w � � l7 l7 C7 C7 C7 l7 C7 C7 C7 l7 l7 C7 C7 l7 C7 � � � l7 l7 C7 l7 C7 l7 NN '^ - m m m m z z m of m m m of z m z y v: s z z o: m } } au u .0 .--I w w w w C> C w w w w w w w w w w w w w w w V '-I N N U U V U U U > > > > w > > > > > > > > > > > > > > > V U U U U U U U U U U U U U U V w w w w> > w w w w w w w w w w w N w w w U U w w w w w N w w H w w N U U w N N w w N Y Y Y Y w Y w le Y Y Y he he Y Y -V- Y Y Y he Y ]e N O N w \v�i N N N N N In In O Y In Y O Vl O O m O In I/1 O O O m o V L!1 In N N '^ l0 1� f\ m �--� N m '-I H N N m m -;;r C Ill Vl w w i, 1\ m a+ C C C C C C C C C C C C C C C C C C C C C C C V C w w w w w w w w w w w w w w w C> C w w w w w w U U U U U U U U U U U U U U U U U U U U U U > w w w w w w w w w w w w w w w w w w w w w.. w w w w> >>>>>>>>>>>>>> w w>>>>>> > > w w w w w w w w w w w w w w w> > w w w w W w mmm N U N m U N O m m U G m N U G w w w ww w Y ]G Y ]e he Y v v ]e le Y ]e Y Y Y w Y w Y Y ]z ]C Y Y O ❑ ❑ O ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ Y In Y O LnO I+l O N O m O to O m O ul O Y Y O m O w O m w w w w w w w w w w w w w w w w w w In c-I r-I N N to M C C Vl V7 t0 lD I, n m c-I N Ln N N m m L L L L L L L L L L L L L u L ''',L L L L L L L L u L L L m m m m m m m m m m 03 m m m m m m'm m m m m" i i m m m m m m m m m m m m m m w m m m m m m m m m m m m E E E E E E E E E E E E E E E E E E E E E E w w w m w w w w w w w w w w w w w w w w w'',w °/ 01 w °/ 01 o `0 `o 0 0 0 `o 0 0 0 0 0 0 `o `o 0 0` o `o 0 0 t t t� tf t .. tf +. .• .. -t .f t .- .- tf .f .• y tf l` Y .• .- y- m% m,m m m m m m m m,; m m,m 0 `0 `0 0 `0 `0 `0 0 0 0 `0 0 `o o` `0 `0 0 0 `0 `0 `0 0 `0 0 0 `0 0 L L L L L L L L L L L L L L L L L L L L L L L L L L L a a a a a a a a a a a a a a a a a a a a d d n Vl V1 v1 u1 V V V V V7 v1 Ln U1 N ul U1 N ul V V1 U1 U1 o ulLnV1 V1 u= u u � u u u u u 0 u u u u u u u u E E E E E E E E E E E E E E E E E E E E E E E E E E E 5 '� 5> t- '� V- S? 1> 5. 5..T 5> .T .T 5 'S } '� o 0 0 0 `o o `o `0 0 o `o `o o 0 0 0 0 0 0 0 `o 0 0 m m m m......m m m m m m m m m m m m m.....m m m m m m m m m m'....- m m m m m'....m m m m mmm m m'....m m'....m m m m m C C C C C C C C C C C C C C C C C C C C C C a¢ QQ ¢ a¢ Q a¢¢ a a Q'Q a a a a a a a a a a a a a a a a a a a a a a a a a a a mlu mmmmmmmmmmmmmmmmmmmmmuuuuuuuuuwuuu=- �= == `1 w w F- F- F- m m m m m m m m is io m is m m m m io m m io is m m m m io m C C C C C C C C C C C C C C C C C C C C C C C C C C C F� -F.76 -MF -F.-F.f f a¢¢ a Q a a a¢ a¢ a a¢ a Q a a a a¢ a¢ a a a a 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 313 w w w w w w w w w w w w w w w w w w w w w w v E w w v v w v v m w m v w w w w w w w w a w w w v w C C C C C C C G C C '' C C C C C C C C C C C C w w w w w w w w w w w w w w w w w w w w w w L L L L L L L L L L L L L L L L L L L L L L L L L L L z s '.. rG � H H r F H � w- r � � F- � � F w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w ww w'ww w w w w w�'..w w wlw'.w w'.w w w wow wwww w w w w w w.w w w w w ww w w'.w w w w w LL LL I LL- LL LL 1 11 LL LL lL 11 11 LL I1 LL LL 11 11 LL LL 11 LL LL 11 LL LL LL m M LE LT LL 11 LL I.1.. LL Il Il � LL Il LL E m LL 11 a- LL '. LT El ID 00 O N I7 I ID 00 O N m 00 m In !T N V+1 W e-1 V n O M w tT N N 00 O, V 00 N w O t 00 N w O� W..z .n... � ul O vl O M: n N w O <f M In n M In Ol N 00 V1 ci I� O w M CT M e-1 O0 Ct O 00 O0 N ID M M N O W n M� N O A# A# N 0 vl 0 M '.' M R V N Ill T lD M1A I� M Ol aWP ID N 00 T Ol u'1 O ID e-I n M 00 '', 7 O '.', m I, M e-I N M� A A w N W m O a# A$ N N kD N N ei O 0 w I, w Ill **ee,,�� 1, m m O '7 n e-I W N m m N w m m 1-1 w I, N w- N O w w N O W n# A A$ w N ID 0 I, 00 Ol al O '-1 N T SI' rl O '-I N V V1 w w IT O IN M V w I, w O c-I m M w m Ill I, m O N V lD W Ol c-I A# A A Ol I� In V N tD O T Rl n e-I ra°i' I� '-I r-I a°W M 4 Li ID n T O .y N M L . 0C] Ol c4 V l0 C N O (T n Vl fM7 '-I CJl 00 '., N N V Vl lD 00 Ol e-I N. O N N '-'$ lO 00 O N V lD (T c-1 m N t\ Ol a-1 M O ID 0Y Ill W ei tD Ol N V7 00 O M iF A $ M Imo ''.,' -I Lr Ol M I� N "R W I- M 1V O0 7 .-1 I� M'... Ol Vl N 00 O w T m w m O w V M c-I m 1� lD V N '-I m A :rr u$ O N M O IT, M V C V Ill ul LD W'0 **'I '-I N n'7 RI V V Ln ID l0 I- 00 00 Ol Ol •-I" r-I,. N RI : V Ill ID n 00 Ol D1 � # :ma c-I '-I N N VT lA K V} In U1 VY ... tiro Vl V} 14 Vl ..� VT V} N +.) +,. ... V} AAA fA Ua VA ',d'A 'K✓k 'C✓rM VT ./T ./? .4 ... ..1. ,.. iA IA IV) ^V, �yV} # # $ $ 0 0 0 0 0 0 0�p 0 0 0 0 0 0 ��;.}} o o OO o 0 0 0 0 O O u o'o 0 0 0 0 0 0 0 0 0 o a x a a xA# o 0 0 0 0 0 0 0 0 0 tit L 0 0 0 0 0 0 aJ 0 0 C.i� 0 0 0 0 0 0 0$# 0 0 0 0 00 V O w N 00 RA' O ID VI m w n w g A O N N V w w O N lD W O$ A A$$ A I11 O N Ol w N m lfl N 41"4 Vl O n M CT V -M Ol 'q' Ol - Ol M W M 00 $ # V M 111 lD Ol N lD Ol N I!1 00 N A $ # $ # # m lD M I� lD w LID Ill Vl klN T '. a Ol Il W 00 W h h w 45d N Vl V a M m IN m O W n n <0 Lq Ln V In M $�# r-I N O 00 n ll�w Ln IA .-I w w Icr;n V7 n 00 M r, '-I 1a J m In r, : �--I Ifl m M I, e-I IA # # O m w m m I, Ol .--1 M '... Ill I, m # $ A # $ A M' .-1 m m O W ul M c-I W kit M '-1 Ol N GY N IN Vo 00 m .-I N m In lD CO M $ A M O V1 O '.. TI O Ln '-I ID c-I ID rl A $ $ # A # lD W I� n 00 N n N 1� ci W '-1 <0 w W M V .--I a0 co Ill N CT # # Ol c-1 N fT 00 00 I� t\ lD w IIl Vl # # A A # $ I" I M M M M V V Vl ' ul LO VWT n '-I N N', p V PS,' Vl lD n r. 00 D1 CT U .--I rl e-I N IYI V m, IO.: n 00 al S # '., # # e-I c-1 N V1 iA N VL N VT tiA 4'b V} Vf V}..,lA V} N 'M1,t'4. Vb if , Vf VT tA''.,lh Vf l[ V # A VY,. V} Vl VT 1A dA VM VA VT N V} VT # $ $ # A $ ,.5^ vl ul In c!r In an an In In I^ Ian vl m nA an vl m yrp In In vl In vi ^'�' u� m vi In In vl vl vl an In va,. am In In wrr7l vl N N W 1 m M M M M M m M M M M m 4°nA } } QLn 7 d' r 9` a y0. } } Vi Vl fa'i u%P m �;�p Vl Vl h%•4 l�l Vl t�l V) Vl �CJJyl r.J'p 41'X '4FM 4fY U'1 Vl VI VI V1 Vl M1Xi a MA'7 to V1 V7 Vl to I!7 N Vl Vl Wp u"I vl t%1 ch 'll w^A Ill Vl m ti4Y L!d N he'1 N Vl 47� to Ln V1 Vl I!1 k() 4R9 ala &Il wYi '.: lA m N lA N fA'i N La'tl VA N M V7 VI N Vi Vi VI Vl 0 � Vl N pA ud'7 M M N Vl N ui'7 V'Y ✓1 dry, N Vi M1 N d N Vi VI r!T A o o o W] In VI Vi N VI v� � VY 4AY lA"d VI N N '.', N Vf Vi Vi N VI hA kA VI VI � GA 4rp VI M a a a D. a a a a a vi m a a a D,• a, m a a a a a a a a a vi a I+t a a a a a a a a a a a a a a a w•"a D.. In a w w W w w w w w w a w m w w w W w ran µea'. pea w w w w w w W a wLu co. w w w w w w w w w w w w w w w a w a w L W Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y w Y 1AA Y Y Y Y Y Y Y Y Y Y `..rr ',eu Y Y "�„" w Y W Y O Ili O M O o O Y O AAS O Vb O Lm O LIW O Vi O Ln O In O Y 4n"o Y IA O M O N O to O wBi O O V1 O Y Y O �' V M1A X'4 AA 4C5 n I\ CIO .-i N Vi e•-I r N C"IC T WwB V 5$' M?'W Vl lD 10 n n 06'b ir^8 Cad M1A .-I N N m m V V o I, Ly7 I, r U7 r� flr9 T e-1 4Ot a Q a a Q """� a Q a a a a ""^ Q Q Q Q a a '+� a+ " Q Q Q ^' r f H °N� tl^ 'E•^- '!._.. R56 C0. C., d [1 a ¢'�aaQa,a � s-- �- r �-- ua• tlW- a- +_- r i-, r {... � r r i-- �, � tl- � tl- tl- p�- � �-- p-- u- tl• a_ r_. 1-. r.. u-' w- pW. 11- u.. w. 5 N D N N M D 0 In N 5 m 0 M m 0 N N 5 m N 0 In In IA N In vi In In N In N fA In lA N In vi N 'A vi 7 7 7 > vl > N 7 7 an > O O O O O '' O O OO > O > O O O O O O O O O O O O O O O > O > O ''. O O O O O O O O O O '' O O O O > O > O '.,� V` ID ID (D 17 U' U l7 l7 ID LD (DU l7 (D0 - (DV' U' (D0 (D U' V' (D u U' l7 V' U' U l9 O UI O U, K K C K K C K (Y K [L K C 5 C a' [Y K [C K a' K K, '� K K K C C',.K K K C K C w K w �.� S } } } } } } y } } K } LD dMC, } Y } Y } } }''} } } } > >. >. }'K } rr } } Y Y }'} }'..,Y Y'.,} Y } } y } IY } K } N N y Ny N N N N N N} T} m m to m 0l m m m m m m m m' In m} } V C' d' V V V a� G C V V C .. 7} Lo In fL fJi IJ Wl 4i i..l u u 9J 4wN tl,� V ka et w..M R�}b U ryUa 4Y M1a C.N V.Y 0.p U �y SF U L.A 1,A N J Ln U:. 61 B1 4Y1 0n aN ae aj v an yUy vu ai ar aY aM y U 0n mY� al mti atl aJ a➢ C3 a1 mU ab ae CW 4k y�ry Le q1 "�, .. ^: »». ^:I~ w Ln wl ww w ^• ^*. ":`:. k., ^., "�,.. -TM.,. "� a as � an 0 wr as a v aJ as ?. > t v c w m > as p1 > ar as > fu a as > > > pu qa c > c ✓� . v > > > > > > > > > a a > > > > > > > > > > > > as ar e v m1 ar an awr an w > q1 atl ar a1 ar M ma an ni v as as mr a >: " a w w w w w aia aa>1 ,in w w a>i w w au oj IN Y Y Y Y Y Y Y Y Y � �' Y Y Y Y Y Y o Y Y Y Y Y Y U' Ln '�*� Y Y Y Y le Y Y Y Y Y Y Y Y Y Y Y ' O V1 O m O m 0 IA O e Y O In O In O u'1 O vl O to O IA O Y Y O Vl O IA O IA O Ifi O to O In O Vl O Y Y O V V Ifl IA IO w n n W .--I N N N M '... V M Vl ID ID r, t\ 00 4 N Ill ci .ti N N m m V M Ill IO w n n M .-1 N Ili .--I L L L L L r L L L L L L L L t L L L r L L t L L L L t L L L L L L L L L L L L L L L L z t L L U u 5 5 U i 1 N N f0 N l9 t0 IO f0 IU f0 N N 10 N IC f0 N N fa IO 10 fa N N fa N N N N m N N . . IO . . IO . . . la f0 t0 10 1'0 t0 N N al a1 01 Ol 0/ a1 al 01 al On O/ 111 a1 W a1 01 O1 V N w a1 a/ V 11 N a1 u V w N aJ O1 01 al V a/ On O1 a1 01 al O1 a/ al al and w N W Vi N V V2 N N Vi N m f VI N f N VI N N N In m f Vi N M o M If h o f m' f N IA N- If f Vf -- N BF4 f If M O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O L L L .l,". L''.L L,L L L L L L L L L L L L L .L L L L L L L L L',t L'.L L L L L L L L'.L L L L L L L L L V1 N Ln A N m V1 m N Vi m N M m N m N Vf Vl Vi M N M N N N Vl V1 N N M Vi V1 VI VI N Vi m m Vi � N N H V1 N M Vi m E E E E E E E E E E E E E'E E E E E E E E'E E E E E E E E E E E E E E E E E E E E E E E E E 000 0 0 0 0 0 0''0` o` o'`o `o 00 000 0 `o `o'o 0 0 0 0` oo `o 0 0 `o `o 0 0 0 0'0 0 0,0 0 0 0 0 `o o''`O m m m m m m m m m m m ra,m m m m m m mmmm m m m m m m m m m m'm mmm m m m'm m m mmmm m a a a a a a a a a'a a a a a a a a a a a a a s a a a a a a a a a a a: E: a: a: a a: a: a a a a: a: a c c c E c c ca *' Q a a Q a a mmam0mmmmmas ua� v v ar w ar a au m w m v v m w v m v(La1 v m ar wv v v > a > > > > > > > > > > > >!> > > > > > w w w w w w w w w w w w w w w w w W w w v IL X M M LE LL Il Z I.1 11 LZ LL E LL LL I..L LL a 11 lL 1,12052-c ram+•o romro70 r io m1--2- Jv`� aaa�sa� a¢L r- M-. r t ®� � I- w 1-I- 11�LL�LL„44p LL�LL .LL iZIMIMIMIM LZ M El An O An o An O An A R m '-1 N...M V An lD I, W O1 0 �--1 N m V m LD O N N� W oo O N V w oo O N A ID o0 o ri N N M M 7 C R a a a#It a In V W o0 o N a AD 00 �--� m m f\ Ol ri m of of Ap 0o N '., AD .-I m o) M 1- N w O V co M 0o V O ID N DD V# a R 3t N V M O m O AD s-I lD �--� to N n WtoONNNMM�VMmWI�O M m W O m R a# R# of e-I o�m 00 N I� eIw O m of V oo m N N 00 0o N 0o I, w m� T N c-I o of 0o I, 'D m W 01 r-I T M a0 0# R R a AaM M r- O -- .�-1 NNMMwmMC A A a R A #16 e4 AG .1 n R a a A# a N 'co) M V e-I 00 An N 01 l0 M O n V �--� 00 V1 N V O f� W N tO O V CO N O a o1 ''A1 I- e-I W A R a a## R o V hU'1 O 0o V N V to n 00 01 N V Vl W 00 Ol .-I ri r-I r-I N N ''... N m A A ''... # R a A R N N N� w o0 O N V l0 0o O N a AD 0o ci m v V m 00 N '.. w O-t oo M r, .--� m of M 1� N r1i 111 l6 1, 06 of 3 R# R# u# '-1 e-I H H H N N N N N m M '-1 e-I N N N M M V V V M, Vl l0 vil VT an In in V} 14 R',R A a # R a yl Ll V}'... Vf LT V} V? i/f 4n Vf V} V} V} v? v/ N +n M In to an Vf L?'..vl.'A N In vT of 'Al " U A # R o O1 0 O O O A R R R a A A R O o o O O O O ''.. o O �0000000 0 00000 0 0000000 0 0 0 0 0 0 0 0 0 0 0 0 R R R a# R a a 0 00 0 o o o o 0 0 010 0 0 0 0 0 0 O O o00 O An O m O R R R R a a 3a a m 0p M tD of N m W N O T o N An 00 O lD lD N W 416 lD N W V O LD N oo a o � w 1� Ol O N A R A R R a A R M Vl �--I AD V M .--� of W l0 V M �--I m p N V N I, .-� N T of lD M 41 lO N of LD N Dl tf1 N of - m R a 7t a A R A# to N to 01 0l cn T w 00 . W W W. n n n n N m N Q1 w 00 00 1� n r� to lD An m An a A R R 31 A a A a of of of of of al a s A A a R a a N lG V to m �--� 01 I� AA o ;T of H m M M of 1� m N M r1 n rrio of Lf;m m o M of m H n M Dl lD V1 m M N m rn 1t c-1 m W N AD O d' 1� ' oo 01 M AD O W In N m N O m An m o N Vl r1 rl 00 Ao M An '.. I- Ol e-I M An a A R a R A R# N N M V I- of �--� C W of N M N 00 O m m m Q m lD of Ol f11 00 m W N Ie N 1� �--� r-I A a A# R A .-i s-I '-I '-I N N N N M M M M ''., c-I e-I N N m M V V Vl An t0 R A R 3L R a a R 1/f CPx. In. in in Vf 7t 7F R # # # a # ln. Vl i/L in 4n V} VT 1n to 1/} N N 4/T Vl N 4A 1/f N N. V1 VF in 14 in L1,. rn VT N m to Ln m � � m M m m N An m m An m m m m to m An m An m An An to m An An to An 7 7 Y Y} Y Y> Y} Y Y Y Y Y>} N>> T} Y Y Y Y}} Y} Y> O 7 7 } > �..� �..� �••� �..� c-I e-I a -I �••� e-I a -I ei c-1 '-I ci e-I } } N N N N N N N N N N N N N N L; V1 An Vl An A L; A Lf VI A N N VI Vf VI VI to m V1 N m V1 Vl m VI m m m m m m m m m m m m An All m m m V1 m m m m In An An V1 m In V1 N m m Vf m V1 m V1 V1 m Vf m VI VI m V1 m VI m VI VI to !n Vl Vf N VI Vl Vi Vl !n Vl V7 d m VI Vl Vl N VI m m Vl VI V) m VI VI d Vl VI An V7 VI m m VI m m m Vl m N V1 VI d d d d d d d d d d d d d d d m W m d d d d d d d d d d d d d d N d W d W W W W W W W W W W W W W W W d d W W W W W W W W W W W W W W m m m V1 E E m N V1 E m m m An ie Y ie o Y Y Y Y Y Y Y Y Y Y Y Y Y Y 32 m Y Y Y Y ]C Y Y ]C d d d d d d d d d d d d d d Y Y 0 Vl O An O ll5 O m O An O V1 O m O Y m Y 0 V) O U'I O m O m O m O m O An ze le W W W e-I N m �--I rl N N f�l M V a m Vl lD lD r� 1` 0o 1- N T 1i c-I rV N M m V C V1 In lD to n n Y Y Y Y Y Y Y d' d d. d d d d d d d d d d t]. d d d d d d D_ !i d d d d d d L d d d d d CL H O'Al1 O t11 O VI O An O''.m O m O....Q Q Q Q Q Q Q¢¢ Q Q Q Q Q Q Q¢ Q Q Q Q Q¢ Q Q Q Q Q Q¢ Q Q ri N N M M m m AD lD I� f\ W F H F H H H 1- H H H H H H H N H H H H H H H H ♦- F~ H F- H H F- H H F f- d d d d d d d d d d d d d d z z z z z z z z z z z z z z z z 1 ' Q Q Q Q Q Q¢¢ Q Q¢¢¢ Q w w w d' w nr z w m. z z z z z z Z Z z Z � w w z AY Az z z w w x xx � z Z z z Z z Z Z z z'.,rxx � cc, �',z � z z.'...,�. m M m M m m An m m m m mLn :D >> 7 > > > > > > > > > > > > > > > > >> > > > > > > > > > > > > > > > l7 l7 C7U l7 l7 l7 U V' 0l7 l7 l7 l7 l7 l7 V' C7 V' l7 U' C7 C7 OC K K K K ww K wK wK w of ofC AY C IOC cc d' K K w CC K C K C m m m m m m m m m m m m m m } } } } Y Y } } } } } } Y } Y N K } } } } Y Y } } } } } } } } 7 } } c-I r-I a-1 r-I ri a -I >>> >>>>>>>>>>> iy U �y N u N u u u u U U u u u u u u u u o o o o o o o 0. o 0 o o o o > u U U u u u u u u u u u u U u u > > N > > > U1 > > > H > > > N u > u > > H > N > H > I N > > > v>i v>i l7 C7 C7 l7 l7 C7 C7 l7 l7 C7 l7 C7 C7 C7 N ! > > N N K CC OC CC K oY CC K K K K K C d' H C >- >- >- >- ++ a+ } } Y Y } } Y Y > C C C C C C C C C C C C C C C C C C C C C C C C C C C C C m m m m m m Ln m m M m m m C > C > > > > > > > > > > > > > > > C > C > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > N N N N N H >> > > Y > Y Y Y ]C ]C Y he ]C ]C Y ]C Y Y Y Y > Y> ]e ]C le ]C ]C ]C Y Y Y Y Y Y ]C ]G N N N N N N N N N N N N N Y m Y o m o An o An o An O m o An O m O ]m C ]C o m O An O m O Vl O An O'An O An a-1 N VI .-I .-i N N M M U t m m AD W n n oo .--I N m a --I a--1 N N M M C a m m AD W n n ` ` ` ` ` ``u u` ` > > > > >> > '., > > > > > > > Y Y ]G le Y ''... ] ]C Y Y Y he ]e Y le> > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > m o m O m o m O m O m O m o m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m v1 m m N N m m v a An An Ao Ao n rn oo tf r tf t t� t r r r t t tf t t t r tf t" C j tf� t r r C t r t r r ,f L L L L o o o o o o o o o o o 0 o o o o o o o o o o o o o o o o o o o o o o o L L L L L L L L L L L L L m An m m m m m m m m An m m m m m m m An m m.'..m m m m...m'...m m VI m m m m m m m m m m m m m m m m m m m m >>>>>>>>>>>>>> E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E An An An m An An An m An An An An An An t t 0 0 0 0 0 0` o `o o `o `o `o `o `o o `o 0 0 `o `o o `o `o 0 0 1 0 O o O tf 0 0 O o 0 O o 0 0 o io _m m is io io m m m io m m m io m m m m m m io m m m m m '... f0 1C M M io m m m m L L L L L L L L L L L L L L m m m An V1 m An a d d d d d d d S 1 d d d d d d d d d d dd ZEE d d d d d d d d d d.. E E E E E E E E E E E E E E=u u u== u u== u_= u_ === u_ u= u u u u_ = _u u= u_ u o `o 0 0 `o 0 0 5 5 515 >>> 5> Y i S 5 5 5>>> 5 5 5 m m is io m m is is is m m m io m 1° m m m m io m m io m m m m m m m m m m m m m io m m m m m is is ro m is io m C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C a d a a a a a a a a a a a a Q¢¢¢ Q Q¢ Q Q Q¢¢ Q Q¢¢ Q¢¢ Q¢¢ Q¢¢ Q Q¢ Q Q Q¢ Q Q Q u u u u "=_ u u__ u is m m '... m m m m m m io m m m m m io io is m m m m m m m m io m m io io m m m m v > > > > m > v v v > > v > > v v > > v > > v > > > v > v v > > v v > T T > » T > > T T ? T T L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L m m m m m m m m m m m m m m �,,. F. r F H H H H H H 17 F H H 17 H H H H H 1- H H H C C C C C C C C C C C C C C Q Q Q Q Q Q¢ Q Q Q¢ Q Q¢ m m m m m io To m m m m m m m m m m m m m m m m m m m l m m m is m m m m To mmmmammammmomawww'wwwwwwwwwwwwwwwwwwwwwww'wwwwwwwww'. C C C C C C C C C C C C C C C C F r� F... F F F H N N ♦- AY Ot ',. K Cr K K CC d' WWOC S tY K CC K K K K K x w� z w w 1>' C tr w K K K w T ?'... >. Y.,.. >^ > } Y > } >Y Y Y Y Y T > } Y >T. Y,. >• >} Y Y > Y Y } > >, >>^ Y >' >' } > > } >, >} >, >. T L_ I 1 .1 I1 W A.L ll_ IT W I1 I.A. LL W M LL m m mLL LL LL ^W LL LIf 11 LL LL LL LL 11 LL LL Il LL 11 1.1. LL 11 LL 11 LL El RRRR --- N m 00 m lD 01 In Vl CO cr V . O m In Ol N N CO O C V W N M O V M N lD O V 00 a# a R n N COI N M n a- l!1 Ol m n m M T N W Vl c-1 n� O lD m Ol Vl rl 00 � O 00 00 N lD Vl M N O 00 n Vl E N O # a a# N n N lD , O N Vl al N Vl Ol .ti t0 n m m .-I lD N 00 m m m O In r n M 00 r O m n M e-1 N M V Vl m W n 0o m O R R a a N- m 7 N O n r N m W 111 V n M m n 0 7 n c-I 7 00 N In m N lD m m n ID n m lD E N O 00 ID V N O 00 n R R a R W m m m m 00 00 W n n n V e-I O '-1 ',. N V Vl lD W Ol O N M V lD n 00 O .-I m M 00 m Ln n m O N V 1p W m r-1, #R # R, to m m n rl M m M n a -I In Ol N n c-1 �-1 N m V Vl LD n. m O .--1 N m V V7 n o0 Ol r4 � LD V' N. O al n N m c-1 Ol 00 R a R# N N� n V N Ol lD , V .--I 01 10 M N O N N V W W O N V o M M In n ''... M'` M O l0 M M W rl W Ol N l!1 W O M R R R R e-1 Vl W M Vl <0 00 O N M V1 n lD ID n 00 N 00 '-1 n m m Vl N 0o V O lD m m 00 m O lD ; M �-1 Ol n lD o N c-1 MM R R a# N N N m l0 a0 O m NLr� n In 1p '-I .--I N m m V V' Lf1 10 n 00 00 01 Ol rl.. '-1 N m V V Ln ID �.... n o0 CT Ol : R 3 a rl r-1 c-1 .-i e-I N ,n an +n +n v>• an an an an an ljv aR v..n M. an .n an to an .n v>• +h an tn,. +n .n .n +n +n .n an t.N # R '.. # 11, an v>• +r an -vr w+N ,n +n an an' an 000eaor' o0acooc000RRo srRR`�zasas o 0 0 0 0 0 0 0 0 0 0 0 o Rao 0 o,'.olo 0 o o o o o# R# a a R o 0 0 0 o 0'...a o o 0'..o o R R a R a R o o 0 0 0 0 0 0 0 0 0 0 kd '... In V m, a0 t, 4D ui cT' m N m-M C', Oi Oo ri lD R a O P+J N a� lD W O N 4D ikN O R R R R a R ri .-i a to Oi .-i m vi n Oi N Vti O n M m et 0, � q$v �k Fly .,� Oro m 00 M 00 # # � M wn %D Ol N l0 (n N XCb OO N # R a R a R lD n 7 tD V N ei m n Vl M N ".Y" Ol n IR 00 00 n n I hG} LYry R,✓"q +;J^ M m N Vl O v.1' qy n n lD In Vl '� CIb m a R R R a a N O m n lD N •7 N r-, O Ol 00 #'# R a R R [da n o0 X"+S 1ti .V'�. X.fi CCb' m-r' n X p.dT 0E"k m n .ti M R R O o 0Q rY +fb n Oi .4 m MY �"^" 01 R R a # R R o O Ol ai Qi T 01 ai 01 00 W Ol oo KP N 'q" WTI Rfl 4%1 Ol rl N m In W 00 01 a R M O to O ✓'b O II'1 c-I ''... l0 ri V0 c-1 ## R# a R V m m m V m V m Ct m V m Li0 W 00 6$n «.} r^i 0R1 ry1ry N 01 n ^q` - 00 Vl N al ## m H N Ot 00 n n lD iYi MI m R R a# a R N N M V' n M N� n Ol N� a r, m 'w7' ^4"i' 4Y1 k$'Y n n 00 Ol m xa` wW H N' m 7 to l0 n o0 01 R R R u It u R a to aA to an w,dy+ tJS to »LF1 +lM wn VY M✓S V$ w an an an R R to i^ VN th Nb 4A to �v) an tlb, 'A an # R R R R # an an an tn, to a/f to tn'.,vT an VL to Vl 'n Vl Vl Vl Vl 'n Vl Vl Xn 0 nA 0Vl In Vf vl n 0 In Vl Vl Vl In n VI 0 In Vl VP D 7 7 DD 5 D D 7 5 1n D'7 5 m vl.> > 7 D m 7>> D D D n ::7 i a a a o D a a a o a a r > > r r r r rr>r a a v n n n n n v n n N >^? r m m m m m m m a V V V a a > r r',V a a v^ N v v v n J J n u v n J J LA v n n v Vl N VI VI VI Vl Vl Vl Vl M Vf V7 VI VI Vl Vl Vl VI Vl N VI VI VI M Vf Vf Vf Vl VI. VI VI Vl Vl Vl kR1 cy VI.VI Vl Vl VI VI V7 In Vl Vf N Vl ✓1 N Vl VI Vl Vl VI V1 V) Vl VI Vl h to Vl VI m Vl ''...In VI VI Vl V) W+l c-1 m c-I Vl VI V1 VI'. VI M"X aa'"7 F%5 L"G - d w 0_ d d d d - d N W Vl d d O_ d 11 11 CL a 11 p_ o_ o_ a o_ o. m '^ Jl m vl �ro cn yr wra ua cro W d W d W W W W W W W W W W W W W W W d a W W W W W W W W W W W W W W W V1 m Y W Y ie Y Y S Y Y In Y Y Y Y o Y Y m Y uJ Y LL1 Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y V1 VT VX O Y Y O Vl O Vl O V7 O V%f O Vl O Vl O M O Y Y O m O m O M O In O m O Vl O DO H N M c-I H N N M M xy W Vl lD tD n n W .-I N m N '-I N N m m�� M In W tD n n 11 Y [L W W W W W W Lkk 'W hntlJ' W Se Y Y Y Y Y Y Y Y y d h"Y,. d d GL 0_ d CL ti d d O_ !L d d Q. ...,d [L d d [L d CL [l d [L d [L [l d [1 [1 d Ci 11 C.1.. Y Vl Y O Vl O VY O Xn O M1iP'M O Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q '^�, .--I N 4AM1 e-I .i N b'"'A '..r,N"Y M ,wa. ' Y' Nf1.. H H 0-- H H H H H H H H F H H H H H H H 0^ d [L d VI Vl Vl Vl Vl VI Vl Vl Vl ko to n Vl VI n Vl Vl V) Vl Vl Vl Vf Vl Vl Vl ''., V) VI VI VI Vl Vl v1 > > > > > > > > > > > > > > > > > > 7 > > > > > > > > > > > > > > > > a o>°> o 0 0 0 0 0 0 0 0 0 0 0 0 0 0> 0> o 0 0 0 0 0 0 0 0 0 0 0 0 0 o a o a oa f C7 l7 l7 l7 l7 C7 l7 l7 C7 l7 l7 l7 C7 l7 0 a o 3 z z'� rc �'z rc s.......s s s s.... ce ¢.cc s s s.....z s ¢ ¢ = r.......� s a vl > >>..,,r >- > s > >',r > > > > > > > > > > > > N r 1'^ r m m m m m m m m m m m m m m m r a r v a v v v a v v v -;t 't v* v v '^ - In v u u u 'wr Kr u v u r.e u o r > 'o ) o @.n `m, ¢I 0Y 0L kC ¢� 0+ ili 6! wad 0.F N �y n 0d 0ta 4A wgJi 41 N wow v�r wv wr wm O O C7 u""t wY"`r wig w "fit ,�� »: c'. c C r c c c: c a c o m u a ra n ae a a u a a v a c> c as m u v a s a a m ? 9> >� a> > v as u z c a cr w > a w a w a Y 0} Y 0i Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y y Y Y ]C Y Y Y Y IceY hod Y Y Y ».'' yUy O Y V1 Y O Vl O In O Vl O Ln O Vl C,Vl O V7 O Y Y O Vl O V1 O Ln O Vl O N O In O In O pR 00 ci '., N Vl ri c-I N N M Vl tD lD n n 00 '-I N N M m O' In In l0 lD n n 00 "^•.... "+ L L L L L L L L L L L L L L L L L L L L L L L L L L L L rCVp. U i U V U u u U u � U � E!� U 01 ` L U U ` M.. U U ` i U G' > C .. 01 Ol Ql QJ Ql QI 0) 01 N ) 4 01 QI n 01 Ol Ol 0! 01 01 n QI QI Ql QI 01 QI 0! of 01 QI 01 QI 0J QJ Ql 01 ��, V1 t t Vl N ✓1 Vf Vf Vl Vl Vl Vl Vl VI Vf VI Vl VI VI V1 Vl VI ✓1 VI VI VI Vl V1 m V1 V) m V1 VI V1 Vl Y ,� Y O o r t r t t� t t t t t t t t t t t' t t r r t t t t t r t t t tf t .-1 ry In ti O o O O O o O O o o O O o O O o O O O O o O o O o O O o 0 o O O O o o O o L L L L L L L L L VI L L L L L L L L t L L L L L L L L L L L L L L L L L L L L L L U V U U Vl V1 V1 V)'. Vl N VI Vl VI VI N VI VI '... Vl VI Vl'V1 VI 'n n V1 VI VI V) V1 In Vl Vl n Vl VI '... Vl Vl Vl In Vl Vl E E E E E E E E E E E E E E E E E E E E E E E,E E E E E E E E E E E E E E v a`0i ''af0i Omi Y `o o` 0 0 `o 0 0 0 0 0 o `o,, o' o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o m m m +m m m m m m m m m �m m m m m m m m m m m m m m m m m m m m m o o o 0 aaaa,a(Laaaaaaaaaaaaaaaaaaaaaaaaaaaaaaan V) n n �,$ u � �:n e.r � n.n � wa '+,,'� na r✓ is a 'u wr �r v u ce ar �:r vre � m m �e m rq m. rp m m m m m m m m m m m iu m a a m m m m m M M M m M m M C C C C C G C C, C C C C C C C C C C: �C a C C C' C C C C C C C� C CC C C C �aaaQQQQQaQCCQQQQQr a4 aCL m m m''....m mm m mmmmmmm m m.... m mm m m m mmm mmmmmmm o `ruin. m w v v > F F H H H F H W"" Y H H F- H F H H H H H N- F- H H H H H H H F7 F-- H 17 m m m mmmm m m m m m m m m m m m m'm rs m m m m m m m m m m m m7 m m m Q Q Q Q 3 3 3 3 3 3 3 3 3 3 3'3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3, m m m v v m m v ar v to p�' m y ar m w w v m m m av as a„ ar m a, m a! m m ar m �r utX up w v w m m al C C C C C C C C C C 01 01 QI QI 01 01 01 w 0J 0J 01 0) 01 Ol 0! 01 QI QJ QJ 0d 01 0I 01 N 0! N 01 01 QJ 01 QI 01 4N1 07 of Q1 01 L:., .,C L F- dN I N 01Llu� %iA I %J II 0k U 0G I 0 M I'U uj aaaaa 0 0 0 0 0 mN� v =Ii! m mI I mmar a ' ) a Y t,y to` 0` `0 `o L L L L 'A ut m ut E E E E E I o,o r o mmmmm aaaaa M••'®ESIM®® ®pi El W N lD O a 00 00 a LD lD a LD a N O 00 LD w LD a N O 00 LD n r-I a a LD m r-1 M Ln n m N a LD o0 O N LD w N N 00 N W a 00 m 00 r Ui n N m O . r-I o0 M r W N O D M O W M 00 M W O O 0 f` f\ n n \ a a n N N al r a r-I m a m W Ol a O m m a m m O a m a m m w lD w r� a LD O N a LD 00 O Ln n m r-I M Ln Ol n r- 00 00 O O r\ LD LD LD LD m N N F 00 w 00 n LD O m Ln m a m m N N H M 00 m m n r\ LD m a m m N ri O O Ol W a m r\ LD LD m m o n � Ln m .� crrn Ln M .� m r, m m H m rn m o H m m rl m H m m N m .� m Ln L>o o a Ln .-+ n m m H oo w m o o Lri v v m y m m oo m ao m r N r' N � .-i LD � r� rri' v' e o' o rri Lr r` of ri' v' LD o0 o i a o m m Di oo' oo r m O N a LD r N O r l LD O m n O a N ri a 00 H Ln 00 N m m m LD o m o LD N LD �--� LD N r` N N m W k m o a m O N a m LD o0 O N a Ln Ln 00 m r` ri LD O a al m r\ N LD O Vl LT lD f\ 00 m cT LD N Ol m N 00 Ln H 00 a H t\ 4 00 O .--I r, tD a m N ''... N N m'... m m ri r-I N N M m m C a m M LD LD LD .-i' rl N m m� V7 VI tD r- r-Z 00' al Ol �--I '-I e-I N m V tM1 t/T jLf lf) t/f V} Lf 1f1 tf} to 7R N in i? In N''. Vl.. t/1 t/f tR t/} V/ in to to N N V) �, to t V) Mf ah VF to LA N VT 1R to Ll to UA tn.. iA in to o..o o o 0 0 o o o Eq o 0 o o o 0.o b o 0 o o o o o o o o o o o o o o 0 o o o o a a a o o o o o 0 o o'o O O o 0 0 0 0 0 0 0 0 o o o 0 o o 0 0 0 o o O o o 0 0 0 0 0 0 0 0 o o a a a o 0 0 0 0 0 0 V LD 00 O N a a N 00 N 00 N O O aa0 a w N L O a w H m NN w r` M m m N t\ LD N 00 a W a '., LD LD a LD ao 00 LD Ln M ri m a 00 m m N w m .-i r, a O n m O LD N o H M m m 00 m '.. n N n �--�LD�'-�Or�Lna# O N M O Ln LDt\ Ln a ''..m N c-1 Ln ri lD N O a0 N M r00 lD a r-1 Ol n a N WN O N D1 Ln N W l!1 H W a r-I n a00 00 00 00 w 00 00 O O m m oD o0 00 00 r, n r-r- l0 LD LD LD N O 4 LT 00 00 o n r- r- LD LD LD Ln Ln A S S n O r-I tT 00 00 bo N N m m m m a Dl .-i rl N N m (Vi a a Li 1 m lD Lo I, r, ^ M e-I N N m'. V Ln '... Vl LD I, 00 00 Ol # l u H �. N, m.. V.. '.ih iR LL V} i/f N L* tR an th to ''..in= N N N'tn to in V} th L1 1/} to to to to to in in Vf i/f '.in VT''. VT to If, to Vl. N- Yk 3L U Vf N ln. �, to N N. d d d d d d d d d d d d d d d d d d d d d d d d d d d d d VI V1 to to M VI d d M Ln N to M Ln Ln to Ln M Ln M to M to d M d Ln N Ln Ln to N V1 N to M N to to M to d d to to VI Ln 7 7 7 7 7 7 �7 7 Ln 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 Ln 7 Ln 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 Ln 7 Ln 7 7 7 7 NN N N N N N N N N N T m} M m m M M m M m m m m m M m M Y } v a a a Val '... V�1LNn In VKl L� L2 LN N LLA VNI L-n Ln LTn LTn LTn V7 Ln l� N N VNl Ln VMl I? N N � tT Ln N VM ll% LN/1 LLn Vl Ln M Ln tN/1 N ✓7 vl In N to Ln In vl, N N Vl Ln Vl Vl to Vl VI Ln to Ln Ln to N N Ln V) h Ln N to Vl Ln to to Ln N to N Ln to to N d Vf to Vl N d N dVl d dd d d''...d d d d d d d d a d l%i d W W W W W W d W a. W W W W W W W W w W W w W W W d W d W I W W W W W W W W W W W W W d Y LL W W W W Y '.Y Y'..Y Y Y W Y W.Y Y Y.Y Y Y Y Y Y..Y Y Y Y Y..Y W Y W Y Y le Y ]C ]e ]e Y.Y Y w o M O Ln O ie M ]e O Ln O Ln O Ln O Ln O Ln O Ln O Ln O Y M ]e O Ln O Ln O In O Ln O m O o O Ln o Y � Y O Ln O m Ln lD lD n f\ W �"� N Ln .--I .--I N N m M a a Ll1 Ln 1p LD r\ r l 00 � N Ln r-I r-I N N M M a � N Ln LD lD t\ f\ 00 r-I N '.. Ln t- ri N N �� i- - d a a d d a d d o_ d a d a a a a a g o a d al¢ a Q¢ a Q Q¢ a Q¢ a a a a a a a a a s a a a a a a a a a a a a a a a a a¢ a������� F��-r� a a a a a a J d= a a a a a a a a a a aaaa a "= a= a a a a a a aaaa a a a a a "J a J a a a a 0 o 0 0 0 O d o d O 0 0 0 0 0 0 0 0 0 0 0 0 0 O d .o d O o 0 0 0 0 0 0 0 0 0 0 0 0 o d o D o 0 0 0 a s d` Li d a d a a li a a a ri a` d` a li li li a s d` a a a li a d` d a d a d` a s a` . d' d` a s d` Ln Ln vl Ln Ln Ln a Ln a Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln a` '^ °- Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln a Ln d` Ln Ln Ln ''... 7 Ln 7 Ln 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 an > Ln 7 7 7> > > > > > > 7 >O 7 > > > > > > > > > > > > > > > 7 >O 7 > > > > > > > > > > > > > > > 7 0 7 > > > > O O O O O O> > O w O O O O O O O O O O O O w> > O O o O O O O o O O o O O O O> > O O O O C7 o o V' o o C7 C7 C7 U' l7 V' l7 l7 V' l7 l7 l7 U' U' U' (7 l7 l7 C7 (7 l7 l7 V' l7 V' l7 l7 l7 L7 l7 D 0 � z ce ix � y ce cc Ll' cc s w¢ Ll' cc w m z w w ac s s Lr s w cc� s� W ef o: } z z z r r r T r r z r} r r r r r} r r'r T r r r } } r r r} r} r r r r T r r} cc a�} r r r N} N N N N N N N N N N N N N N N } M y M m M M M m M M m m M M m M M} } a a a a u u u u u u N u N u u u u u u u u u u u u u u u M u M u u u u u u u u u u u u u u u a vwui a u u u u w w w N w u u w w w N w w w w N 01 w N N w w u ywj u w w w w N 01 w N w w w N w w N u V w N w N N H N H C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C w w w w w w C> C w w w w w w w w w w w w w w w C> C w w w w w w w w w w w w w w w C> > > > > > > w w w > > > > > > > > > > > > > > > w w > > > > > > > > > > > > > > > w w w > > > > w w w w w w> > w w w w w w w w w w w w w w w >> w w w w w w w w 0) w w w w w w> > w w w w Y Y Y Y Y Y w Y w Y Y Y Y Y Y Y Y Y Y Y Y Y Y ]G w Y w Y Y Y Y Y Y Y ]e ]e ]& Y Y le Y Y w Lq w Y ]G Y Y Ln O N O Ln O Y ]G o Ln O m O m O Ln O m O Ln O Ln O Y Y O Ln O Ln O Ln O Ln O Ln O Ln O Ln O Y Y O Ln O L!7 Ln LD LD r n 00 r-I N Ln H N M M a a Ln Ln ''... LD LD r` n oo ri '.. N Ln r♦ e-1 N N m m a a Ln Ln LD LD n r 60 r-I N Ln r-I ri N N L ''.L L L L L L L L L L L L L L L L L L L L L L L L u L L L L L L L L L L L L L L L L L L L L L u u u u u i u u u u u � i i u u i i U- i E E m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m N N Vl N to N to h to M N VI Ln Vl Vl Vl N f N ''... Vl In N Vl N V1 N M N M M Vl Ln '... VI In N N Vl N N Ln VI N N Vl Ln H N M Vl t+ a+ ++ t+ s+ a+ t+ r+ a+ a+ ++ a+ s+ a+ a+ V a+ a+ a+ a+ a+ a+ Y Y L+ a+ t+ a+ ✓ u �+ a+ a+ a+ a+ t+ a+ a+ a+ t+ t+ a+ a+ a+ �-+ a+ ✓ i+ O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O 0 O O O O o o O O O O O O O O O o O L L L L L L L L L L L L L L L L L L L L L L L L L L Ln N In N M In M to Vl Ln Ln "'.tn M VI to N N M N N to Vl Vl..tn to In N N N M to to Ln N M to to Ln N to Ln N VI Vl In N Ln to N E E E E E E E E EE E E E E E E E E E E E E E'E E E E E E E E E E E E E E E E E E E E E E E E E E `o o` `o 0 0l`0 `o 0 0 0 `o o 0 0 0 0 0 0 0 0 0 `o `o 0 0l`o `o 0 0` `o --o `o 0 0 `o o o `o o `o m m m m is m m l m m m m io a a a a a a a a a a a: a: a a a a a a a a a a a a a'a aaaaa a aaaa a a a a a a aaaa a a a u = u u = = = = =..... = = = = = = u = = u = = = u = u = = = = = = = u = u = = u u u u = uI = m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m'', m m C C C C C C c C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C a a Q Q a a a a a a a'a a a a a a a a a¢ a a a a'a Q¢ a Q a a a a a a a'a aaaaa ¢aaaa a m io m m m m m m m io m m m m io m m m m m m m io m m m m m m m m m m m '' m m m m m io m m m m m m m m m w w v v w v v w w v I v v w w v v v w m a v v v w v v a w v v v w w w w m w w a m w w w v a v m v v L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L w w w w'.. w w w w w w w w w w w w w l w w w w w w w wl w w w w w w w w w all". d w w w w w w w w w w w W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W 212 w w w w w w w v w w v 212 v v w w a a w v v w w m v w w v i Il 11 LL LL "'. I.ILL 11 LL LL 11 11 LL LL 11 11 Il W W '' Il 11 LL LL 11 Il LL LL 11 11 LL 11 FA. W 11 LL LL 11 11 LL '. LL 11 LL LL LL LL LL lAm W 11 LL LL El s as a a a ............ ._ lD O fl) n DA # g R# g Vl Vl O O O M In N Vl W Vl # g R R R g R m n 00 a0 N m n .-i N m m C 00 N W O V 00 00 V g R A A R V- V 4 e-I ci 00 M N Ol l0 a s ## g R a N n N W O N lf) Ol N M Ol c-I W .-1 M 00 .ti W V) Ol Ol W n 0 01 R A a R A �y w lD M f.0 c-1 n. A .� n a R A g a R A R N N O N. V N m W ul N m n v rl Ol V M m N rl O O 00 A R R R g lD O Ol n 'AaY V7 M� N .--I Ol W g R# A g g A Iy lD Ol 01 Ol O) 00 00 00 n n n n W W lD lD Vl N N In N.n'm m y R A g R R ,n..o m m �.....� W R# g g a# R ,n M m n mrn T o n A g R A S g g R# :,:: A n n'., lD lO Vl 1l1 R R g g R N to m M �y n '-I 00 In N R R g A R a g N N I� V N Ol lD V '-1 T l0 M c-1 t70 lD Lq 'I 00 VI ri W mLo N Ol lD A A g A A W lD m n upj cr m N O m 00 # g g R R g R .--I m 00 m Vl LD W O N M Ill n 01 O N '... m o N. N O N o n N to a) g R g A R O N '-I N T y^' T lD lD n g R R A g R A N N N V W 00 O m m n m I'-1 m lD 00 O N� 7 Ill 111 tD l0 n 00 Ol g A # u R e-I e-1 r-I N p9"! V I.f�.' lG n 00 Ol g Y � � # A # ti '-I e-I '-I �-i N N N N M M M ,4 in of an an VT R A A R A an to In to 'vn V} vw of +n N an R A '... am g R # R V} 'iPl 'if4 w.+b Vf in Vl V? V? V? in fn S.4U tiM1 lA VT V} N to K O O O O O g R R g g a O O O O g A O O '..o O O O O O O O O O O O O O O O O O O O O O O a A A g a a O O O o o O O O O O a A A R R A g R o O O O o o O o o o o O O O O O O O O O N O o0 lD co R A R R a a Vj Il1 0 0 0) m ui vi ul Iri R g R R A g a# # R A g R A R R A g g R g R I� .- V W O) c-1 m A n Ol N V l0 00 O N V� N n O N In 00 m VI N N M V1 W n 00 W n v lD V N �--I m n In m N o 00 to o a A R## R m M n w N ID c V W N R A S R R# a# N O M n lD In V N ci O Ol 00 n v1 V # a# g a# g R# A a R# 'R n lD l0 Vl Ill g # g R # g .-� O '-1 00 00 - n w Ill an # # g R R A R A V O O m m Oi T al Ol Ol 00 00 00 00 00 00 00 00 00 O Ol Ol Ol D) Ol # g R# g R N m o m V m V m V 4'9'9 g R# R g g A g C Ol M D) V O) O) V Ol Ol V Ol 01 7 Ol 00 W O) IliOl O) T g R A R R g N lD v n Ol N V n i.7 R# g g R A a R N N m d' n m N G N Ol N V n m N� n m V Vl In lD n 00 Ol A g R '.. A R R may' I.y c-I N M T lD n 00 "I S 2t R# A to R g a #'R S A R# A a R''R S R A g S ... A A g # g 1n L} VT Vf 4n to t/} V? U"F V? t/} N LT V},in 'iA in in ViM1 aaa a a a a a a,a a as as 'a a a a a a a a o ut o an an m In vl'In In vl In In vl a a a a ra. a a a cL a a a a a a a a a a ae. a o_ a a a D_ a a o In 7 7 In a a a ru. a a a a a a a a. N a a a a a a a a: a a a a a o_ a a„ In In vl In an In an va r O m:.7 } ' } } � } } >} Y 'y>am� Y r } j } } } } } N V) N V1 N V) V) VI '. ✓) VA VI VI N Vf VI V) � a V4Y"A aalA aF7i iJk Ifl Vl ll) VI In N to VI VI V) V) VI V) an VI to V) uT VI Vl Vl M N N VM) VI a/'Y Vl V) Vf A!"G V1 V) V9 V'N NV�p Vl U1 i/:M V) Vl V1 V) VI V) VI d ` to VI v) Vl V) V) o V1 Vl N Vf Vp Vf V1 NT N VI to N V) VI V) VnN WA 4fi 4�A C% NA Vl VI V) Vl Vl In Vl V7 ly V) T d d fl d Vy VI VI a a W W W W W W W W W W W W W W W a Y to N Vl tiAA V1 Vl a++A yry to IjI V) Vl M >n Lry., LAt u'y w.+7 4A VI N M ''., In. VI V) Vf W Y W Y Y Y Y ]e ]e ]e V Y Y W a a a i1. a s 0k a. a a a d/w a an a a a Lk. dk. a s �1. a a a a a a a Y Ln Y lf) W w W W W W-- W W W W O Vl o o O ¢Vf O o O U) O Ln O Vf O Y Y Y Y Y Y ]G Y Y Y Y Y 6aWf Y 6lA Y Y W W W W W W W W W W W W e-1 N Ii 1 e-I .-i N N T fl I o Vl l0 (p ' n' I� 00 e-I Y Y 'Y Y Y Y� Y Y Y Y Y,Y Y aa '.,. o_ a a a a a ci rar a a a a a a a ''...aO n o Lfl O Ii'b O u..fA O ul O Y N Y O e O un O u'A O o O N O In O l OTC Mi7 4.D n N 00 v^a N an .-I IVINITMIf InInWWn,WQ Q¢ Q¢ Qddaa. LLeica.'&cLa.eL&D_as:ai.ca.ti ada io- d~� ~~~���am ���FF[Fa a, aaazzz z z z z z zF- F- d- < F- f- A- W- H F- F-- F- W- iw'-' '- h- r' P-m }- r- H z z ¢ a�' . z ale ¢ z z z z z z z 7 a g a a a a a a a a n a a a a a a o 0 0 0 .O o 0 0 0 0 0 0 0 0 0 c a 0 a2, D`_ i a` a i a L a a In In In ,� ,� a` vl a v) In In vl m In In m v)... In en In In vl In a 7 VI V) 7 7 D ZZZ)D Z D D Z) Z n VI a a a a a as aa....a a a a a a o_....a a s a'a a a a a a a �.o >> >>> >'> >>>>> >>>> >....o 0 0 0 0 0 0 0 0 0 0 o a° a o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 >>(D o 0 0 0,0 0 0 0 0 0 0 0 0 0 0 0>9 . o o - - - V' V' 0 l7 0 l7 l7 V' 0 l7 U l7 l7 C7 l7 O a` m L a` a` m m a` m a a` D` a A: a C7 VI VI V) N VI m In VI N N V) a VI a N VI VI M Vl V, V) VI o VI VI M o VI Vl ' } a' z K C z aC z z aC a' z aC z C z } 7 7 to M K z r r}}} r}} r Y Y}}}} N 7 7 7 7 7 7 7 > > > > > > > > > > > > O> 7 > > > > > > > > > > > > > ',. > > N '6Y: e}-1 .-I a -I e-1 '-I ci .0 ru a r-I r-I u au u '-I e-I r O O O O O O O O O O O> > O O O O O O O O O O O O O O O "�+ 4, " U U� C.b U '%-> u u U A.l U U N u l7 C7 l7 C7 l7 l7 e7 l7 l7 l7 U' o �' o U' CI V' V` U. C7 C7 CI CI U' CI l7 V' l7 U' a +rr' 'u a, px a, a, OY �! as au w v w G ar a 01 (D " yry S, � " z z z z z z z > ac z z z z z z z ec ce z z z z ac s z ""^ �'^.. ,N L ;�.+' Y r r} r} r}} r r z} z r r r}} r r r r r Y Y r} r O C c c c c c c 0: c c c c c c c a v V a a v a a a v v > '^ r m In m In In m In In In m In In an m In ar a a, a, m ar a, a, ra a, m a) a, a, a, a, c w m +.l m w �v > > > > > > > u ;a as a�ry u��9r a.w M,a ar 'A, a u u u 'u u u I.0 a y� na u u u u a, G, O 61A a, ax N aY aN a, u5 U a) al v I. a, w w al ad . . . as �, N N W � � N ri1 Mvr w u"w N +,,, w rv'n ad u�`y f�if fail "`ux ,�" wxu�"w ary f"iv ,•"" w ,,•.'" ,� In Y Y Y Y Y Y Y Y Y Y Y Y Y ,kC Y Y Y O In O Ln O In O Ii f O ul O v) O U"B O Y c c c C c'. c c x; c a.r w a". C C r u� M �"I N Ill .--f H N N M M V V V) In lD W n F`- W '-I N P:". c c c' C c c a& an aV a, 0k al N ar 0! ap aY c a, c, aqy i y y y y lY � aJ aM a1 a, LiY 0A' a, al ar al a, aY > � > a9 ' W al Ql QJ po au as as PAI a,}y %� quy as m N m m N m m IO m m m m m tp m m m m t0 m Y Y Y Y Y Y Y Y Y Y Y as Y Y Y Y Y Y Y Y Y Y Y Y Y Y 'z Y O O N N al N al N al a/ al al al al al a) N a) N 'Vl VI Vl N Vl VI o VI VI N VI Vl Ul VI VI V1 Vl VI VI VI M O W O T O In O T o m O Y Y O In o In O m O T O Vl O T O A O T m T v N o lD '... lD n N 0a H N m H N N N m m v '.... V m m to to n N w tf t t v tf t y t If C t t u t C t ''..... L L L L L L L L L L L '.L u L L L L L L L L L L L L ''L L L L O O O O O O O O O o O O O O O O O O O O i i i U u u ` u ` u i ` u ` VI M V) V) N VI N M v) N V) Vf VI V) VI VI VI N N VI VI V) VI m VI VI VI VI' M VI VI V1 V) V) VI N V) N "'If t t '-' " r I-' tf Y t t if tf t�+ •+ tf ++ t:a+ t t .0 O O O O O O O O T O O O O O O O O O O O O O O O o 0 0 o O O O O O O O O O O 0 0 0 0 O O O O O O O c m m e m e is 'a io m N c c m L L L L L L L L L L L L L L L L L L L L L L L L L L L L L In In In In v) In In In In en In In In In In '...en an In In In In vl an vl In vl In an ', In a a '''. a a a a a E E E E E E E E E E E E E E'E E E E E E E E E E E E E E E a- u 6' - n i p n', �� w'' o `o o` o o `o 0 0 0 0 0 o 0 0 0 0 `o `o `o o `o 0 0 0 `o 0 0 0` a y t+ 5 "'�� v- '5 c� ' r 5� ' , as c m m m Ie m c c' 6 m m ma m c m _a io m m m io m is m m m io m is io io is io m i0 ''... m m m ''.. is m m ca c a: c. c O c C c c c c c C c C C C G a a a a a a a a a a a a a a a a a a a a a a a a a a S. a d c( *, a s �,Ig ¢. a Q. ¢ a¢ ¢ Q Q¢ a. +c ..�ryy p�rryy ��ryy �'+ en wwWW wn u� w i,, < u tl.k 4NY nN n3 5.N np 4F tJ 0.� Lq _ U ti 4Y ad iy °u as 'u_ 'M e.r "ya ..y u`d U Ca 4v i0 io m m m i0 m i0 i0 i0 m is M m !0 i0 m va rq .wd ... q.a t44 `, v ar m `l '., m v` v m ar v e e ao c c m a m m m aaa c m c c as aro c c a m as m c� c c c m c m c ,� FLI- � W'�=N- ��������� Imo-' H e R"c- C c C G a: C G c c c C C C C c c C c q,,, 0: 0;, c C C C C C a: a a¢¢ a a a Q m m m m aAP m m m m m m m m m m I m I a`n 1 m m m m m m m m 'm Imb rq m io ra m m m Izy ms nl cs ro m m m m m m m m m m ma' as as m m v m m a v m a al as a v m a v a a a a m m a, w a ar a a a w m ar a a c m u' al tt C c c c c C c c c c c c c C w ELL i^^ i°'"^ i� i^ ham^ H H k•- M- ; R NLL �"^ $^ W^. H H H H F h^ 2 z z C N al m al a, al al al al al a, aJ QI qi,. a,' LLILLIWIWI'WIWCWUWIIWIIWII;� QI 41 Ul 11 w w N al al 11 a, W I all all N w 11 al al El w w r w V N 0 w w w LO V N O W ID n a-1 V V lD 0 ry 0 n M N V w 00 O N 00 N N 00 N o0 V O 10 N 10 N $t Ln In O IT.-'� W 0 .--I M N M O m '. O WM 00 M 00 O O lO n n r n n C. V R M Ln R '..-i O H n O M N LO O m n M M# w M V O Ln m a m m O C m r m M w w 0 n V w O N V to w O Vl n Ol .--I M Lfl R m n n w w O O m m w n O 6m w w w n LD LD Ln m m V m m N N c-I m w m w n n LD m qt m M N H O O m w R C V m n w O m m N e-I O o w n Ln M .--I Ol n 0 M ti M n Ln M r-I Cl n Ln 0 H m Ln n m H m 0 n m- M Ln LD 00 # O� om m Ln '... e-1 n M al V$ V m V m m 00 M. M n N n N n H LD n n N V LOO 00 O f11 Lfl r LT c-I � ID 00 O N# O Ol Ol 01 o 00 n n n LO LD Ln m n Lo O m n O T n '-I V 00 I H Ln 00 N M M M WO Ln O LD .� LD H LD N n N n m 00 # Ln 0zt m O n * ei 00 Ln N M LD # w w m n rl LD O V al M n N <0 O Ln al LD n 00 M Ol lD N Ol N N 00 L.fl r- O0 V n# 00 O '-I n lD -:t M N O 01 w 0 m# rl H N "I N m '.... m m r V 0 m LO LO 0 H H N m m V Lll VI Wn n 00 M Ol # .--I r-I '-I N f11 ; LIl LO LO n' 00 al R VT VF iA ^�F} t/}.''...1/} N''...V} 1A N iP'6 '.., VM Ll Vl 9✓F, N"A +WS, L.h LY an- ,ty 'A V{ in iA 11= WY 11F I^ 4A In L? i/T R in to Vl. Vl N V} to LF L! i/} in• N M- # OI..O 0 o O''O o'0 0 0 0 0 0 0 0 0 a o 0 00 O O 00 0 0 Oo o a a a o 0 0 0 0 0 0 0 0 0 0 o a a 0 0 0 o O o o O o o O O O o O O 0 0 0 o O O I 0 0 O O O O O# R R o 0 0 0 o 0 0 O 0 0 o O R a W W N 00 N 0 O V w V w N w 0 V w H m N N w n Ln !-I I, LD N w ### 00 V lD 1p V LD N O 00 lD 00 00 N Ol Ln N CO to .-� n V O n M O LD N O L--� M Ol M W N n �--� LO �--� Ln O## R LO 00 n to W e-I V n O N N 00 w m N O w m m H w w V ci Ol n V N W N O N Ol lfl Lll e-I 00 V e-I n v yt R# O N T O N N lD ci n N n N� R O Ol Ol Ol 00 00 '00 OO n n n n 6 w w o N I O c4 Ol o 00 n n LO LO L0 Ln Ln J. R R n O H Ol.. 00 00.. n n lD w Ln to # R w Ol Ol Ol m Ol Ol LT Ol Ot Ol m m Ol C1 Ol m n m 01 V m a m V of V Ol V R R R n lD N Ol Ol Ol Q1 Ol O1 O1 Ol MRw m'..-4OI V Ol V Ol V m7 T m V m V Ol n... 00 m C N'O1 N Ol n..a N Ol n R R R al .-1 m Ol Ol Ol M al 01 01 M Ol R # 'i H '.., N N M m V V Ln Ln LD LD n n ti N N M V Ln LIl LD n 00 D6 N u A L c-I c-I r N M ,. V LIl Lp n OO LT � R Vl VY i/1 to ^A V V P�A'i 6Ab +J&- to V} V in' V1 1A in Vl to N N- N N'IN to N Vf 'in JA in V} # # R V? i/f iR in 1^ to — — — - - - # # a a m a a a s a a a a a a a a a a a a a '.. m a a a a a a a a a a a a M to N V1 N 0 Ln N to m V1 N N N M a m Ln m ✓1 ' N M N N M m m M M N N Ln a a M M M N N 0 Ln M m M Vl m ✓l 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7� 7 Ln '.7 7 7 7 7 7 7 7 7 7 7 7 7 7 7� 7 Ln 7 7 7 7 7 7 7 7 7 7 7 7 N N LA Vl V1 Vl to N V1 Vl NLA n A NA mA v n J v LNA1 NNA mN IMLA tvno VLnA VM^ wMn VLA1 VLAI VLAl N LLAA MVI VLAI NNLA tLAo MLLAn NVLnI NILnn 'mLn VJ l NVLA1 �Lni a 0^ VNn1 V<Lnnl mVLAl to VVA11 N<An V<LAn1 NLLnn mLAA N1L%A1 TA N Ln as a ¢ a a m a E a a E a a a m s A a a m VLA1 a a a a a a a a a w w w w w w w w w w w w w w w a Y w Y ]G ]C Y Y Y o Y w LU c Y Y Y Y m Y Y o 1' Y Y o Ln Y 111 Y LU Y ]C Y Y Y Y Y Y Y ]C Y Y Y '. O to O L!1 O Ln O LA O Ln O to O Ln O Y� Y O L!1 O Ln O L!1 O Ln O In O' Vl O LA ' O Y� Y O L!1 O N O Vl O L!1 O L!1 O L!1 Ln rl e-I N N M M V V L/ Ln '... LO LO n n '... 00 e-I N Ln rl ri N N M to V a Ln N LO lO n n 00 NN m M V V Ln o lD w a aa a a a a a o_ a a a a a a m m m a m m a m a m m m m a a m m a a m m aaaaa a a'a a s¢¢¢¢ a a a a a¢ a'a a s a a a a a a a a a Q a a Q a a a a a a a a a a a a a a a a a a Q a a a F-F7 F-t�-t F-F-ttt FIF-F-F- . F7F- F- F F- F-t FT F- F-F, t F, F-F-t z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z z K[ w''.w w w 2 K K K� K C K K C K= w w x= m K K 2' w 5 K C= K w�,� K C K K C 0L K= K= K K a' a' a a a a a a a a a a a a a o 0 0 O 0 0 0 0''0 0 0 0 0 0 0 Li a s a Ln D Ln Ln Ln Ln Ln Ln Ln Ln vl ''.... Ln Ln Ln Ln 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 > > > > > > > > > > > > > > > O O O O O O O O O O O O O O � C7 l7 l7 V' C7 U' C7 l7 l7 V' l7 l7 ',, l7 C7 } N N N N N N N N N N N N N N N u U U hY. u U ''.. U U U U U U U U N Y Y Ne ]e ]e Y Y Y m ]e ]e Y Y Y ]e O Ln O Ln O Ln O Ln O Ln O Ln O Ln Ln c-I ci N N m M � � Ln Ln lD LO n n N 01 Ol tU W 01 O1 O1 O1 O/ N O) N OJ 0) N N 'C t t t t t t t" t t t t 4-f O O O O O O O O O O O O O O O L L L L L L L L L L L L L L L V1 VI VI In In In In VI In V1 In VI V1 Vl In E E E E E E E E E E E E E o 0 E E 0 0'0 0 0 0 0 0 0 0 0 0 0 ` m' m m m io m m m io io m m aaaaaaaaaaaaaaa of of nil y ) ni ull lull ull ull nil ul ull ull of u La ro ro ro m ra Lo ro La Lo Lo C C C C C C C C C C C C C C C a aaaaaaaaaaaaa Q m m m m a, a, v v a, v L L L L L L L L L L L L L L L F- H H H F- F- F- F7 F7 H H F7 F- F- F- iu is io m io is is io ro is m is is F6 ro 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 m m v m m m m c m m m C C c c C c c C C C C C C C C 01 N O/ N w w01 N 01 O1 w01 N N 01 K K wC I tY K K C K C K K K C LY D a o 0 0 0 0 0 0 0 0 0 0 Ln Ln Ln ILn Ln Ln Ln 7 h 7 7 7 7 7 7 7 7 7 7 7 7 > 7 > > > > > > > > > > > > O > O O O O O O O O O O O o co a Ln Ln C7 V' l7 C7 C7 l7 l7 V V' V' V' C [L 5 5 K K K K K lY K K r..m M rn m u u m m m,...m m u u.. U'u U C v C > > > > > > > > > > > W Y N e e 0J Ol N Ol 0J 01 0/ Oe & Y Y o Y Y Y Y''. Ln o Y Y Y m Ln O Ln O ul O m O Ln O m O .-I N Ln .--I .-i N N M T 7 '.... V Ln Ln LO L L L L L L L L L L I,L L L L N !O f0 f6 19 f0 f0 N N N ''., N N fO N 01 N O/ N LU O) N W N Ol O1 Y In N 0/ W N N M N N N In M M Vl m t t' t' t t tf t t t' t t t t 0 o O o 0 o O O O O O O O O L L L L L L L L L L '..L L L L In Ln V1 In V1 V1 Vl Ln M N ' M In V1 V1 EEE€EEEEEEEEEE 0 0 0 0 0 0 0 0 0'0 0 o O o is m m io m m m is m is is io io m ¢aaaaaaaaaaaaa La Lo ro Lo Lo La La Lo Lo ra Lo C C C C C C C C C C C C C C Q a Q Q a Q Q a a Q Q a Q a L L L L L L L L L L L L L L F- F- H H F- F- F- H F- F7 H F- F- F- 3 3 3 3 3 3 3 3 3 3 3 3 3 3 v a! a v c v v v m v v v c v C C C C C C C C C C C C 01 01 O1 Ol O) 01 N Ol 01 W w O1 Ol N K K S cc cc I K I LZ v v vI �� �� vp a)vl� vLZ � vl� � v v vow olall °hall of O �1,6o: Ol Ol o •- o o ._ ._ ._ ._ ._ a` Li a a` a N a Ln a Ln Ln Ln Ln Ln en 7 >o> >> 7 0 0> o O > O > O O O O O C7 o � o l7 V' l7 C7 l7 C7 2 } 01 C � C 01 01 W N @ @ 01 > O> N N 0J N N N 01 Y N Y N f0 N f0 f6 N N N IO N In vl In Ln vl vl vl vl vl Ln t t t t t t t t t O O O O O O O O O O L L L L L L L L L L E E E'E E'E E E E'E —o a Zia: a, ElEIlZ1lEIlElE E 0 0 as an Ln 7 7 l 17 C � V V C C O/ 01 Y ]C ID w L L E E `o `o io m as u u C C C C C C C C C C C C C C C C Q a Q Q a Q a a Q a a Q Q Q a Q v L L L L L L L L L L L L L L L L H F- H H F- F7 H H F- H F7 1- H F. is io 0 io io io io ro io m iu io 6 io io 3 3 3 3 3 3 3.3 3 3 3 3 3 3 3 3 a�i a�i m a�i a�i m aOi a�i a�i a�i m a�i a�i a�i a�i a�i i7L 0/NNiLu w w w > > > w w w �vv 2 El Ol N M to 1p n 00 a N 00 V O CoO N V lD ci CO n l0 lT N ll) W # 00 V w 00 N W , O # V7 O V1 O Ln O R R# R# R Ln n w O al a# O1 ',. W m n N### 0o M Ol r. R R Ol m Ln a0 N 1� O Ln lD O N Vl n O M w, 1p ci Ol '', .--I .--I O d' lD O O O N ci '', lD L--I D1 r-I N N u'I N N Ol N Ln N LD Ol O V W D1 .--I W n N # R O Ol M O M 00 N rl D1 to N N M R## # a R I� 0o C v1 O lD C N M a# W N ci n V n n V N M a M LD r- W ti Ln s•-I M 01 l0 N m� g 111 V 00 V LD 00 O# R Y m N Z N N O # # R # N N N m n 00 to 00 Ln I-z V m ld N LD LO Lr Lr 00 r- LD Ln a M N Ln oo 00 f, Ln 4 n'1 r R a M .y o LD V N '-1 R a# ti M N M c-I Ln r-1 w Ol al V m V L-1 Dl Ln 00 Y N o N Ln Ol m m '-I m Dl Oo r, W Ln ',0o m Oo 00 N lD m M 00 m Ol O * r� 00 . '-I m 00 # R # R r•-I r- D1 O Ln .-1 Dl n 0o M 0o Ol n a # # a a # V .ti �"� W LD O Ol O0 C' rr D1 n # 7L a -I' r-I` N N M M .ti '-I c-I N M R L6 LD r- r-I c-1 ti N V Ln. r, w A c-1 N N ff Lr n O1 N N M V I� LT A # lh V} W iA VY VF N in N in Vf V} th Vf i/} Vf V} N,'A V? In In VF In 1n v? Vn in # R a a a o o o o o o o o o o o 0 o omo 0 o o 0 o o o 0 o o o o w S O O O o o 0 0 0 O a a # O O O O O O O O O O O O O O O O O O O O O O O 0 0# R## O O O O O O R a R yt R o o O O O it R s-I OO n n O o m O o N C) Ln 00 .--1 s•-I N � N N N N ID ', � Ln Ln N o0 V N o W N w m� 00 '. N Ln # R## R a V 1 � � � w w � # R # R4. a # Ln '. O Ln O Ln # a a V LT N N V O L N N lT LD ol� DD Ln L-i O0 N N lD M O m V 00 w N N m N M Ol M m l70 N N N M M m V lf1 It It lD �..� Dl O .ti N LD M Q N R# O m w 00 M ryl O m# R #'t R## N m O O V o Lll N 00 w O Ln m c-I o Il W m c-1 O w c-I W O O O Ln W n '., '-I O I� N N o 1� I, M O Il 1, N O N e-I w r, V LD N Ln Rm O### V# a# # m lD wm m O I, .-I O ''... N to M O# a# # R a N LO V '-I N NM I� O a # # R V LD n c-I lD N 00 m Ol Ln m N N M Ln LD r- 00 O V 00 e•-I M O I� # # # C e-I 00 Ln I� O '', R R## # R a V O O N LD V# C R rl H N N M m V s•-I e-I N m V Vl LD n m e-I .--I N M lf1 LD o0 a## e-I N N V lD Ol u N M Lr'1 L, .6 a a tn # of an of +n an ztt ?t D a cL Ln VI :? > > a V } V Ln ut M 7 VI N V1 N VI : to ? Ln M Ln to Ln 7 In V) N Vl !n Ln Ln ut to Z, Vl zi M . m Vl 7 ' . In . to . Ln to !n VI Ln :? V) Ln !n 7 Ln Ln 7 Ln M :? N V1 7 N N N N N N N> M Y m m m m m M m> �, Y V V C C ? V ? '... > ? W N J J J J J J J J J J J J J J J J J J J J J J J J '... J J J J J J V J V J T L3 Ln Ln J m J Ln LA W Y Y o m W ]e o J V) w J n to m to a VI o to 0 to o ✓1 a N o i J d w n'o Ln Ln 0 N o to a Ln a Ln a V1 a J n w {%L J n Ln o Ln a VI a V1 to o n LA a N a' J n Ln w yL J n N o V1 o Ln LL'o Ln Ln o N a to o J n M o J h to a V1'Ln J r, n a a '.. W a D_ W Y Ln D_ w W Y W Y W Y W Y W Y W Y W Y D. w Y d w W ]C W Y W Y W 1-1 W W ]L.Y W 11 w Y w W W Y W Y W Y W W Y Y Y.Y w Y a o Y Y Ln O Ln O Ln O m M O 7 Y .--1 '.. Y N Ln O .-I m .-1 O N o N O M Ln IY1 O V Y .--I V? N Y Ln '..N-I N N f�Y1 N N W Y O Y Ln Y O Y Ln Y O Y Ln Y O W Y W Y Y'Y O m Y o r r a o d a o a cL LL a'o d i i o i''a o i i o i o o a a a a a o V a .-i In .--I s•-1 N N M M .--I N Ln a --I s•-I N z z z¢ a Q a a a a Q a a s a a Q¢¢ a¢¢ a Q a a Q a a a a a a¢ a a a a a a a a Q Q a aaa ¢ iaa o o i a 0 d > > O O > O 7 C7 l7 L' OC LL' } 7 V } V Ln > vi ',, to 7 V) to N 7 N 7 VI VI Ln > Ln N > V1 > to > VI VI � to V) > Ln M Ln to V1 Vl 7 M V1 7 VI 7 V) � Ln M N to V1 7 Vl 7 VI to Ln � Ln VI V1 V) µ ur $Y w y, w. > O > > > O > O > O > O > O > o.. > > O> O 7 > > o > o > o > > o > o > > O > O> > O> 7 > O > O > o > > O o > O > o> D > o> > O > o > o > O > o > O > > O> > O> > 7 > > > o l7 O C7 U' 0 L7 C7 ( '' (D O V` O ' LD G V' C7 0 U' '... 17 '', O U' O l7 V' C7 l7 V' U' l7 O O C C7 l7 V . C7 l7 l7 l7 o 17 o V' O 17 w O. re�~n K K"IK C C C C7 l7 o- } K......., 0: ¢ w K.,� U' V, of w Ll' C 2 K K 'K � ....... lY } K } 1 C } K......,w } } w } K } 2 } tr } } } > ax N s•i e-I ci ri '-I c-I .-I } T N N N N N NN} } M M M M M M M >-a Y V V a V a a} T Ln Ln LIl C Y Y w U uwa vy L,p U 4Y U N U w Nu U N w U hA w U U U vwn U ad U w n„p w M U U w M U U U w U w C,l U w w 'U 'pl n.A w U hl tip11 U w U w U w U w GJ' 4.d w N U ywy L!) y5 t.d. 91, iY 'w L.p 7ti n 000 www w '" I',, ` c 401 C m �. C C> O C G C C cn ^= u`'. C M'." C '' c, c c 9 > > a�i > w > w w >>^ w LIT > w w 'w' w w w w C w w w w w w w O C w w 9p pl' w' w wC 15 w aU as '... ul Ln V1 w N > w w Y w Y w Y Op ]C w Y w' Id w ]C :. � > '" w w Y w ]d w Y' w Y w Y w Y w' Y > w� > w w Y w ]G �, w h: w w ]e Y w Y w> Y � dl Y > w w Y w Y w Y w Y w' Y w w> LSY Y > ''�' w w Z Y N Y lfl O •i Ln .--I O N to N O M lfl m O V Y '-I LY Y N LIl O '-I Ln r-1 O N l!1 N O M Lo M '... O Y N Y O Ln '... O to O N O Y Ln Y O Ln O Ln o '.. Y Ln Y O Y Ln Y Y O Y Ln Y O 7 O '... L 7 VI O L VI L L u L U L u L i L U' L U L u L L L L L i L U L U `m L U" `m L L L u L ri L U" L Ln L rl L U" 'i L N L N M L L U U M L i V L U c-I L U`` N L Ln L ri L U ci L U` N L N L U` M L M L U. V L `" .--I L N L M L L - L s L N L E `o E `o w w w w w w w w m w m w m w m m w w m` w w w m w m w m w m w `m w m w m w `m w w w w w w w w w w w w w w Ln an ut Ln Ln Ln Ln Ln vi Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln.Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln 'Ln Ln Ln Ln Ln Ln V) Ln Ln Ln M VL Ln 'Ln Ln - u 9p c tip CxG 0 u9 9p o ss9 xtq 9p 9p 99 taG 9p L'W'k wa mp op LY0 cm Odi asp 9p 9p ti%] TN dad 9n Oo 0pb 'mn us.0 oq, Op Gs0 Op 9JN, Kgp ep 610 0A pdM kab a.9! ap. c0 04 9p' - c. c. c o o c c c c c 'c o t c c c t o c c c a c c o. c o sm c c "s a E E E `o E E E E E E E E E E EE EE E E E E E E E E E..E E E E E E E E E E E E E E E E E E E E > o o 0 0 0 0 0 0 o 0 0 `o o` `o 0 0'`0 `o o `o o `o `o 0 0` o o `o 0 o 0 `o o` o o'o `o o` o `o o` `o `o 0 0 m mm'm m.... m m m...m m m........m m m m........m m m m m m m m..m m m m -m -m .¢.aaaaasaaa:aa.....aaaa'.aaaa.,,aadaa .m .m . a..,...aaaaaaaaaaaaa.'.aaasaaaa.... m m m m m m m m m m m m m m... u mai w s a i wun a i wry wv, u uy'mas w u' a ra � u 0 6 ami -.� C9 G Ads C RV C m c m m. 99 m M m m m m m m m m m m m m C m c N G -A5b c m m f9 I9 I e[Y m u9 m Iv m m m m m m m m m m m, o m i9 a. a Q Q Q a� a a¢ Q. a Q Q Q Q¢ a Q Q ¢'..a Q a a Q Q a Q a a a QIQ: @ a a: ¢ a a a Q Q......a....a 1 N v w me Fa N N m m m m fq m..'',m LE d6 RP m m m m m m'...m ! � iR m m m m., m., m.,m C C `) w w 2 e w v, w w v w 2 w w aJ w w q 0.1 N J w _ccw w L w w w w w w > w w w w w w w w w w.......w w w w w w w w..''.w w w w w w.,w........w w w w w w >> w w w w w al w al w w w w W w w w w w '. w w w w w wW vo w w w `1 �1 LL LL LL 11 LL LL LL 11 LL LL LL LL 4.L LL lL I1, 4,. I,A.. 11 LL 11 LL 11 ll µ, 11 I1 11 11 11 LL LL LL LL I1 I,.L LL 11 11 LL ll. 4A., 4.L El ## a a Vl 00 m N m G O LO N 00 .--I n Ol C LO m .-I T Ln r c-I 00 1� W Ol N Ln W# W V l0 00 N LO O## V Ol n N W R a## 1� l0 Ol N M V M l0 n 00 V N W W 00 O N C W I� Ill d lD C T c-I Ol a# N V Ol 00 M n N a a# 00 V � u n O O m� LO w m c-I N Vl g a -I w m N IO m N Vl N N N m V M V 00 a a O M M N Ol Ill N a a a n T r 00 r ## R a M Ln N O M o Ln O LO H M O 7 O 0 c-I N N M 0 W O l0 .--� I� N## M O 00 N M# CO a## a m 00 n rl L0 N F- M 00 V 1� n d' N M V In LO n W .-1 M '-I m Cl l0 N Ol Ill V 00 -k LO W O R a� W al M C C a a a # a0 N N m W 00 n n LD lD lD Ltl V7 00 I� l0 Vl V m N 111 00 00 n m lD V N ai a# R 01 00 m 00 N ## Zr :M N N .-1 n W Ln a M N ti Ill T N m m rl Ol n Ill M W LO m m O n v .-� R a . -� m Ln .--� n M Ol a s# V V V N Cf :M 3t# R U # T Ln LO Ol Ol V Ol V Ol 00 O N M M Ol 00 00 00 00 N Ln 00 01 V 00 m 00 # R n O V 0) 00 00 n # R a V Ill LO O Ill ## a s c-I rl N N m m e-I '-1 '-i N of V Ln lD 1� rl rl '-I N C. N n 00 # Y �--I N N m Vl n m a a A ~. ~. # R # # 'n in # R R Vl L} Vl Vl q, LT th to Vf in blY� �VF in L} tn. N V! V? VT Vb Vl. in in i a # N N. N L} ..: . a a # #.,.. ## R a O O o o O o O O O O O O O O O O O O O O O O O O O O O # R R O O 000 O # a O o O O o au a a o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O O O O O O O O O o 0 a## O o 0 0 0 0 a## R 0 0 0 0 0 a# a a ~ 00 n lO m N Ill 00 H V N lO V N 00 V o LO N a0 M V N 00 n W m a a a N 00 V W a0 # R## N^ p N N Ill Ln m V 7 m m M ti N T V## R .--I O N m� R# a # M N m ## R a � N W Vl N Ol LO W M to W N lD O V W N N Ol a0 N M V Ill aR l0 Cl a -I l0 V N � it a o O V W N a a N O C tn' 00 O t,1 LD 00 - a �-. 00 O lD .4 f\ N n fN N ## /l n N '., LO 4 O a On a # n l m '"� N m a a e-1 m r-I N # a a a m o O N 00 Ln '-I n m 0 a0 o o Ln F, o N Ln n O n O .-I I� LO Ln c# a a W O H o Ln o# R a R ti m m 00 n R# R R V w n �--� W N 00 M Ol Ln Ol N 7 N m Ill LO n 00 O 0o ri M O 1� T a# R Ol 't 00 T n O## a# Ill LD n L'-t n a a a # rj r-1 N N m m V H ri N M V L11 LO n m .-i H N (•/1 Lll w 00 # au It a a -I N N ''... V lD Ol R R # VT V} T V} in Ll in Vl- R # # In N N � m VI Vl VI Vl VI VI � Vl VI N Vl Vl VI VI Uf Vl Vl m to Vl Vl VI Ln VI N VI.V) ul Ln Vf d N N N N N N } m M M M M M M } a a V a a ut In 7 7 Ly J Ly N }} Y VVVVl) LVl VVII VVII J VlVN LYn J J J V) 0 V!n VJl J VJ) VJI J J MIJ%l VJl MJ J uJl VJ l J J J VL%l VJl dL%I' Vl V) V) V) Vl V) Vl J V1 J Ln Vl VI Vl V) VI Vl r1 Vl e-I ut ut VI d VI d d d d d d d to V1 d d d d d d d VI V1 d d d d d d d V1 d to d d d d d d d J J J J d Y d W W W W W W W d W d W W W W W W W d W d W W W W W W W d W d W W W W W W W to to N Vf W W Y Y ]e Y ]e Y Y W Y W Y ]G Y Ln Y Y 0 ie Y ul Y Y c Y ]C Y Y ue Y W Y Ln Y Ln Y Y ]G J d J Vl V1 d d d d Y� Y 0 Ln O Ill O Ln O Y ]e O Lfl O Ln O Ill O Y Y O In O IJ'1 O Vl O Y Y O In O II'1 O N O Vl V) d d W W W W H N Vl ei ri N N m to c-I N Vl e-I ei N N M M C e-I N Ln rl ri N N M M C L--� N LIl ci c-1 N N m M V d Y d W W Y ]C Y Y O_ d d 0_ tl d L1 O_ tl d d ''... d n. d d d d d O_ d d L1 d d O_ O_ d d O_ IZ d d D_ d CL Q_ O_ d d d Y 'Ln Y O to Ln O m o Q Q Q a a Q a a Q Q Q a a Q a Q Q a a a Q a Q Q Q Q a Q Q Q Q Q a a Q a Q a a Q '-I N Vl r-I c-I N m M V F, FIF F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F a& a a d a d a o. C 4K 0_ K C tY of K d' K K C ',. W. W ', K o< K C ar F Q Q a a A la I-- � w w....'w cc z'.... s w cc w �'� s.� s z s Z�,Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z a F F F F Vl Vl N 7 7 7 N O H 7 7 7 w ut 7 vl Ln 7 7 7 7 7 7 7 — Ln ut 7 7 7 7 7 7 7 ut ✓t 7 7 7 7 7 7 7 7 7 7 7 7 7 7 >O 7 > > > > > > > 7 0 7 > > > > > > 7 �, > > > > > > > > 0 7 > > > > > > > > d o o > > O O O O O O O > > O O O o O O O > '> O O O O O O O > > O O O O O O O d O d O O l7 l7 V' C7 l7 U' l7 V' C7 C7 C7 l7 C7 l7 l7 L7 C7 l7 l7 C7 C7 C7 C7 l7 l7 C7V C7 w 0G K LY w of CC S C w K C K K OC ' 0C OC K K K K K K ' C ' OC K K w 5 w C m VI C VI to 7 7 7 7 .}-I [C } Y } Y } } } tY N K Y } } r } } } K M K } } r Y } } K } Y } Y } } } Vl 7 ul 7 7 r } r } y N N N N N N N } >-M m M M M M T r } 7 > 7 > > > > > > Ly U �--i ry u N m u M V U a u u u u u u u> O> O O O O O O N u u u u u u u u u u u u u u N u u u u u u u w l7 l7 l7 C7 u u w N N w N w w u w N w w N w N N w w w vwi w 01 uv+ w w w p C7 O l7 l7 }} } } C C C C C C C C C C C C C C C C C C Vl Ln Ln Ln C j C w w w w w w w C> C w w w w w w w C j C w w w w w w w C � C w w w w w w w y U w w > > > > > > > w w > > > > > > > w w > > > > > > > w w > > > > > > > vwi cu vwi > > w w w w w w w> > w w w w w w w> > w w w w w w w> > w w w w w w w U N U N H w Y w w Y w w Y w w Y w Y Y Y Y Y Y Y Ne ]C Y Y Y Y Y C) Y Y Y Y Y Y le Y he Y Y ]e Y w N w N N N N Y Y O ill O Vl O Ln o Y Y 0 Ln O Ln O Ill O Y Y O m O Vl O Ln O Y Lq Y O to o Ifl O Ln O N N e-I ei N N M M V N N to H H N N M m V N N Vl e-I e-I N ry M M' N 111 H H N N M M C N C w w w w U U ` ` E` U i U ` U U ` ` U ` ` ` ` ` ` U u U U U L ` U ` C C w w w w w w f0 a] Lo to O m al f0 a] m to N f0 to m m to N f0 m a) N N m m t0 al to N f0 N la t6 f0 N f0 to to f0 m > 0 > w w Y Y Vl O m O Vl Ln Vl V) VI Vl Ln VI Vl V) V) In N L V) V) Vl Vl VI'c V) V) Ln V1 V1 Vl Vl L Ln VI VI Vl Vl M Vl M V) V) Vl Ln Y � ie O Ln N T T O0. OD UO 1V1 00Oq 00 00', m c 00 c 00 00 = 00 00 00' c 00. c 00 c 00 c 00 c 00 c c c = 00 0a 00 00 00 c 00 00 Ly L L L L C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C L L L L L O O O O O O O '', O O O O O O O O O O O O O O O O O O O O O O O J J J J ° D O 0 E E E E'E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E 6 9 0 O O w w w w w w w w w 0 0 O O O O O 0 O �O w O O O '0 0 0 O O O O O O O O O 0 0 0 0 0 O �O O '^ 'tLtLa `^ '^ 'tw ^ OO C C 00 w .'- .� w w w �.. C C C C O OOOm...mm'...mmm m mmmmmmmmmmmm �mm - mmmmmm mmmmmm mmm mm J J J a,,,,,a a a a a a a a a a a a a a a m a a,,,,,a a a a a a a a a a,,,,,a a a a a a a a a a a ° E E E E= u , u= u u== u u= u u= u u= u u u Ou u u u= u- u u u u w u= u u= u E E E E E o` o` o `o >>5 •T5>> 5>>5 5 >5>55 i > y55 5i 5 oo `0 0 0 m m m o To m m 76 m m m m m m Lc m m m m m m m a ro m m m m m m m m o of m m m m m m m m m m m C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C a a a a a a a a ¢aaa a Q aaa Q a a a a a a a a a a a a a a a a Q a a a a a Q a a Q a a a a a =_u_m..mmmmmmmmmmmmm m mm m mmmmmmmmmmmmmmmmmm_uu== w v w w v v w w v w w w w w v w v w v w w v w w v v w w v w w v v w w w w v v w » T > L L L L L L L L L L L t L L L L L L L L L L L L L L L L L L L L L L L L L L L L = = Y y iE C C C C Q a a Q ro C C C C C im -F. -F. im is -F. F. is -F. is F iiis is io s a a Q Q a mmmm mm�amm C C C C C C C C C C C C C '. C C C C C C C C C C C C C C C C C C C C C L L L L w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w L L L L L F F F F= '... Cr0C OG Or '.. K CC C 9 K K K LY K [C C C d' C 1' CC LY LY K CC K K K K ',. K OC 0C K tr K 0C W Wrt K F F F F, H w w w w w w w w w w w w w w w w w w w w w w w w a) w w w a) w w w w w w w w w w Lu w LL > w w w w w w w w w w w w w w w w w w w w w w w w Lu w �'. w w w w w w w w w w w• w w l w w w w w w w w w w w w a w w v v a w v w w a w w v v w w v a w w v w w a w w a v w v w w v a w w w v v _ _ �_ _ _ 11 11 LL LZ 11 LL LL Il 11 M LL M L.L LL LT LL LL E LL LT M LL M LT LL LT LL LL LL LL Il LL m E LZ 1.1 LYE L M lL LL LL 11 11 LL LL LL LA. lL 11 El e-1 n '... m m- W W V V �'D N V w i 00 O a"Y n e-1 w V M ci m g w '.. w 00 00 N V c-I a-V N N M w m M N m N'..M w R M m w v 1l R I� w l!1 M 111 1p w V V N O t>D w m O V c-1 d' n O m m W ci ri I� M m l!7 O w w w N w L!1 m N## N n N M V w *f m O ci N M V Lr U N m N m V 10 0 V W N M N w W V N O 00 t0 � m, w O V tD 00 O N R A 01 lfl M N OD u•1 n w m .-� m m W In w r-I r w m N tit V m oo N w r-I ul :m :m m m N !-I w N O w O M' w O N O O c-1 .--� c-1 .i N m w C O w H N N# R r ci vl c-1 ci N N N Ivl 0'1 V ri .--I N M 4 Ln' lD n Od w4 '-I i/! 1A VT V} Vr V} in to iR Vn iR to V} 'n Y!A V: N i/F VT, VT i/} VT tR a A VT G^x 4Pi ,'Vin i/f 0 0 o O o 0 0 0 o 0 0 0 o O 0 0 0 0 0 O 0 0 0 0 0'0 0 0 0 0 0 o O o o O o 0 0 0 0 0 0 0 0 0 0 0 0 o a A a o 0 0 0 0 0 m ri m '.... ci a N N w w N 00 v o w N m w ni of ari A# R ao ap v v to N m m N w 0 w In w to N O w In m H m w N N a In n# A A N 00 w 0 w m .t 0 0o n o 0 m M o r, m o N;. 0 0 v 0 m n o a M d In an w,. V N 00 mi Vl w o0 O .-4 m c-I m o0 M rl O N R## 00 r- w O T w V1 v m N m w n w d. N O'm n w m ri r m w# a R'w N V1 N m V M m '.... � .� o N v m ry m O N v L oo ry m m ...... 0 0o a R# O m m � '.... 0 a N N M V V H e-1 ri N M V Lr r. od cn •-1 e-I N m Ln n o0 3 N' N N I� m V) i/Tof of 1n Vn � N an an in',,iR Y } Y Y Y Y } } } } > } y Y T y m m m M m M m} } V V C V V V J J J J J J J J J J J J J J J J J LA J J J J J J J J J LAJ J J J to to N w Y Y Y Y Y w Y w Y Y Y Y Y Y Y w Y W Y Y Y Y Y Y Y W Y w Y Y Y Y Y Y O VI'O ul O Y Y O V7 O T O m O Y Y O w O T O Vf O Y 'n Y O w O N'.O VI N N m m� ci N LIl .-I .-I N N M T w7' cl fV u r-I .-I N N m Pia .-I N m 'i rl N N M M d o d a a d d d o d a o a d d d d a d d d d ado d d d d d'd d d d Q¢¢ Q Q¢ Q Q¢ Q Q¢ Q¢ Q¢¢¢ Q Q Q¢¢ Q Q¢¢ Q Q Q Q Q Q Q I �- F F N O V) ifll O O # :Ft A ti SL v m I" N N� 00 w m A a a R R m 00 a A # a A M m '' W ry v## R## Coo m m o R R a R R O1 V I O O A# R a A ai W r1 cd w..w'O N N ry Vl'n iA V1 VT an LF A R I A A # u? N +J'b V} 00 0 0 0 a a u 0 O O o 0 0 0 0 .� w R O O V w A a R A A t!1 l/1 ''. n W N au A a# I� ci' Ol .--I 00 ul m O w A # Aa aR A N m m oH a a A a a la a a a vl u'i m lrl to w v1 J N w J J 'A 'A � D- N J J a Y d w LA T N Vl VI V1 Lao W Y a w a w w w w w w w Y O Y N Ln ',,H Id Y ]C 0 m 0 0 O LnO a a..a d N N T M V Q d a d a a d a Q Q Q ,...... 9 Q. Q Q Q Q Q Z Z Z Z ��r������w=o_o: � a � a E O a 0 ,o a` .0 ._ vl � N E E E E E 2 E _J E 'E E a d d _J E 7 E E E E E E E 7 a E E E E E E E 7 E 3 E E E E E E E �', �> 0 0 0 0 o a .4 a o''o 0 0 0 0 o a o a o 0 0 0 0 0 0 0 O 0 0 0 0 0'0 0 0 a o a o 0 0 0 0 0 0 >ol0 >0 7 a a` a` a` a` a° a` a a` CL CL a 0- a a a` 0- a s a` a •- a •- a a a a 0- a a` o a o a a a a` a a d C7 C7 in an in m a a in vi vi '�n m a v' a` in vi in vi en m a` 'n d in in an i 'n a vi an in vi > Z:) 7 Z) D 7 �n an 7 7 7 7 of O w l 7 �n vi 7 7 O� 0 7) an Z) D Z) D� °� ¢ Y > > > > > 7 0 > > > > > > > '� o D > > >'' > > > > 7 0 > > > > > > > > Z' > > > > > > > > O O O O O> �, > O o O O O O o> > O O O O 0 O O> > 0 0 0 0 o O O> > 0 o 0 0 0 O O W l7 C7 V' U' C7 '0 l7 C7 l7 L7 (OD C7 l7 l7 C7 l7 (7 l7 O V` O 'l7 C7 l7 l7 (7 l7 V o O l7 C7 C7 V' l7 l7 l7 .c oc z cc z s z tr s s � z w zlz w w....� �.s�........� Y Y Y} u u} Y Y K Y C} Y} m m}} >- Y C}} Y Y} Y Y >- Y R Y} Y '} }} Y C M m M T m M T Y} V V V V V a Y 'n } In T N to In In G C� v u bu 4A. 5 5J N G N '4J' 9.A N a - s,y U T ,� M aY ny 0.! q,w LLy V � R U „y u u Q u u Ln � � ti.l 4.ri u u o.d ap u � w "I > v Ow Ol 0a 0w a ymy r,r na v au OA oy ql v u '6� w Ow 0a w ON as' u v a, w a v v Otl aa. 01' a tr +�,I a Oq off, �0y N6 "mow QJ v"yr qJ� 'e. `^ ''? "tirr ^^�. I'� N O ^r "."'.w `^M;. � � "'w".. »".. :J. a''n. °",• w""°" .° .`"�.J, ."7 '�.?' .qA.J N. ' m. tl r in� r»�n „w e'�"n "u�'V' v�i �"'rr"vr ,w •«•. +n vi „� `^ O o > C 0 Km C C w w W N N 0U C Gw O C W, SU 41 , Ow Ow v C v O, 01 > "•° pJ y > > > v y 01' '> ] 7 9 N R%w �> > > > W > > w M1U> Ok .T ? > > > ? > > > v v > > > ?� > v E ` 4) m o'J pw 0A > > 0w Ob fll yaw 'aw Ow W > W W 0.a 0w Oq > > 0A 0w OF tYJ OJ Ow 07' m m m m Y Y Y le Y '0C Y O Y Y ]G Y ]G Y Y W Y Y Y Y Y Y Y Y N 6kw Y Y Y Y Y Y Y an N lf) w Y Y Y Y Y Y Y w Y 0d '' W v v O T O ul O Y Y p V7 O M O M O Y Y O M o m 0 to O ]C Y O w o m O 0 0 Y Y 0 to O T 0 0 0 N N T M V '-I N Vl .-i .ti N N m M V .--I N Vl '-I '-I N N m M V '... ci N In N N M M C .--I N m e-1 .--I N N M M V 00 Sq0 00 0'0 L L L L L L L L u 'L '.L L L L L L L tLi L L L L L L L L L L L L L L L L L L L L L L L t L L tLi c c , u i U ` u u u u '� ` ',, i u u i u u u u i u b U u i u u ` U J J 3 m m m m m m m m m m m m m m m m m m m f0 m m m m m m m m m m m m m m w w w w w w w w w w m v v v v v v v v v v v v v v v v v v v v v v v v v a v v v v v v v v v v v v v v v v v v v E E E E VI VI VI to vl w M M h N to M V1 to N N v1 w N M to to VI to to V1 T vl to to M v1'tn In VI N N In VI N to N N v1 an O � O ' O 0 aiJ 00'. Cup 00I 00 CQy '00 0q W U U IU 0ep m �, 00 00 W Q0 Wp 40 Ww W 0q W to 00 C0 CW C4 04 00 40 to ¢uC W 0L 00 W8 W tlW CYp 0p� 00 y G" 0 c c G 0,°.'; C c c O K O� C C C s= 0'. 0 c C C: C. c CW C C' C Cm� tip, O O. O. C O C.. 0: c 0,' C O d: 0•� m m i0 io O! JO O O O J O J Gib O S3 O {} J7'. '4 O Y.4"' C7 CA 6d 'P3 {P w., 1'0 i3 C7 C7 O O O CAA O CN 09 -•k --d -,-il ?1 ,�..i J J J _k .�,t .JI ..,.k a E a a E E E u u `o 0 0 0 `o 0 0 �o 0 0` w o o `o `o `o �o 0 0 0 0 `o `o �o `o 0 0` o o o `o w `o `o o `o `o `o `o .12 `o 0 0` o` o 3� a: a: E E E E E E E E a E E a E E E E E a E E E E a E E E E a E E E a: a: E E E'E E E'E E E E i it u u " iA a u' mr = = u is a '�a s p,r er v Up a i a 'I. u x e°".0 niS„" u u""".e u m -M-M.. , > ?, „"ter, a 7. 7• > > > A al* >� } �9- a a« A da LIv- 5�}" a.. a. '? S'• -m m ma m arY Ku m m m *ro �m m ra m m br as m res rcim eio iua m m �marra m m m m m m m +n rtl m n<p azn ' CCC..CC0..0 (�,0; .CQ Q ¢ Q '+ ,. &' ¢ ¢ ¢'< Q Q ¢ Q Q Q»gM io is m iC iC + re' PO iq -M m io ��uc. w v v v v v v v v v v v v v[-�-: v v v v v v v v v v v v v v v v v v v v v a, v v v v v v v v v v v w w w w w w w w w w w w w w w w w w w w w w w w w,. w w w w w 'w w w vLL LL LL LL w LL LL .iLL LL LL 11 11 � � � � � � � jLL LL LL LL LL.'...LLLL LL LL LL LL LL'.LL,LL LL LL.LL,,LL LL LL LL It M ti O Z W E W 0) El W M 0) Ln W co V V l0 N P. WW O N n... r-I LO V m r-I m# W lD...00 W N V a Ln O Ln W r-, W Ln V M N e-I O M N N M W M M N M N m V Ln r Ln V Ln m LQ M Ln W a# M OA LO V n -# a a# O1 Ol T Vl M m t al R m t m M n N W m V m m LO V W 7 a N O co l0 m 0 W m# a `i M W N W W a a :m It O V N to m N n 0 zt zt W co N V I- O m m W r, m m m O W m W n n LO Ln m LV ## n n N T V O# a a a O N LO a -I N W l0 V ei W lD M O <D lT n e-I c-I N N m V V Ol O L--1 N M LI'1 $ tt N D1 V N m V# gzut M W N N W Ln M 1D Ol N M O V IX7 N D1 n 10 LD V N O ''... W L0 V m lO.. O V M 00 O '... N a# D1 LP T N 00 # a a a M LD lb Ll'1 n n �"� M Ln lb O N lfl M n W m '-I m m W Ln W e-1 V W m N V r M W N LD '-I 0 a YC m m I, �"� W N a### 0 m LD W N m LD rl W H r�N r,L!7 C Ln O Ln .--I W C N O 0 H .--� N e-I N T lO m O W .-I r,N## r�.--� m .--� ti N a a a a N V Ln r� m O N m m LO rl N N M M V .--I r1 N M V m LD n 00 r-I ri '-i T LD r al S '-I N N -�i LD 00 R # # # 4'4 c .4 4 Ln 01 N Lf7 O LO Ln W N IrNomr, O W N f* 0 W W m N a N n## a N 0 LO O Ln e-I a a n� W t` O M Ln N 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 o## a o o o 0 o 0 a## sa o 0 0 0 0 0000000 0 0 0 0 0 0 000 0 o a## o 0 0 0 0# a a aGT m m N W 0 a N N <0 N W m O LO 00 M W N Ol M W W V V LD N mWmm O W ti v n mLn M O W I� O O Ol M n M O n V O O V O Lf) O Ll1 �--� H m I- 0 Uu## '� N dW n W .-L .-� �'-� N N N NN M V m V1 tD N 00 M LD lb O H M '-1 M w o r� O N a## m V n LD O m# a a a N I, M n c-M Ln O m 0 m 0.. m n Wo m V M N m W I -I LD m m W# a a W N 0 N m m#### N m m N m W n 0 N O n Ln N n m al Ln .-I n O N 'tT Ln n T O N C V1 W N Ln M O W a# a 0 Ln mr�O V a a## m a W W O N G Lh n LT ci N N M H N m V. M r,m m .-I �-1 N M Ln,. r l%1 ## N N N V r 01 a u# H 1R in to in to q^ to wAa AA WA th V/ to tn..'.,tn tR N N VIA 'VA 4 A. 1n, N # # # {n N 1A to in in # # a a t/} t/? an'...vl an .n'.tn in to 4n in to {n... I M N N N N N N } } M M M M M M mm o M J J J {� LJ J {%� J J In NJ N J VI J J N J an N N N N N N N N N N Ln to VI VI 0V1 N Vl V/ to VI VI 0_ n0-VmoNEd om m N Ln N N H H F H H H H Hm 0_ 0_ 0_ d O_ VID_ d D_ 11 0_ D_ 0_ N N 0_ D_ d d 0_ o_ o_ V1 Ln d lL D_ 0_''., D_ 0_ 0_ ❑H❑❑❑❑❑_W _0_W O. W W W W W W WW Y Y Y Y Y Y Y W Y W Y Y Y Y Y Y Y Y❑❑LnLn O m O Ln O Y Y O m O Ln O Ln O ]e Y O Lfl O Ln O Ln O Y N Y O LA O Ln O to O Ln Ln d 0- d S d C O. r1 N N m m V �--� N 0 ci '-I N N m M V '-1 N Ln .'-� L-t N N m m lfl e-I r-1 N N m M V O- Y 1 W W W W W I W W W W W Y Y Y Y Y Lnm a m m a Ll d L1 Ll d d O_ M' M' M' d d m m m d m D_ a a d m m d m 0_ L D_ m L Y Y Ou'i O M' O N O LnId ¢¢ Q Q Q Q¢ Q Q Q Q Q Q Q Q Q¢ Q Q Q Q Q Q Q Q Q¢ Q Q Q Q¢ Q Q¢ .--I No_ Li,.� z z z z z ¢ z z z z z z �, Z Z' Z z z z Z z z z z Zz z zZ Z. Z z Q¢ Q Q¢ Q 6¢¢ Q Q Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z Z H <- H '... H F H H H cr 2 aaaa. as a 2a Ea a a'..,aaa 0 0 0 0 0 0 9 a o 0 0 a a` a` a a Li aLaLi Li Li0 a0 0 o aa I O 0 0 0 0 0 0 o 0- ma 0 0 0 0 0 0 0 O Oa i` O ``a`ii`OO `aL M C LnLn Ln In oLn Ln Ln Ln Ln Ln Ln In Ln 0 Ln � Ln D m 5 D > > 7 7 7 Ln Ln 7 7 7 Ln Ln 7 7 7 D 7 7� In Ln 7 7 7 Z) 7 Z) D D> D > > > > > > > > > > > > > > > > >O 7 > > > > > > > >O > > > > > > > >O �, > > > > > > > > > O O O O O O O O O O O O O O O O> > O O O O '.. O O O O O l7 (� !,J lJ l7 l7 l7 l7 l7 C.J' C7 l7 C7 l7 C7 (7 0 l'J (7 U' l7 l7 l7 C7 C7 l7 (7 C7 l7 l7 l7 �' l7 W K W 2' LY W K m C LY K K W OC CC K ' K W K W C K W C ' K K LY K K 0: LY W ' K K tL K K W W W K>>.} >- }}}}}}}} } } Y } } Y D= } K Y } } } } Y } C } K Y } } Y } } } K } K } } Y } Y Y Y } >.0 a .0 au .0 c-I u .0 .0 .0 m} M m m M M m T}} 'tV V V 'It U �--� u u u u u U N u N u u u u u u U m u m u u u u U u U u U u u u u u u u y�j U N W (D H N N Ol N N Ol N N N N H N u u 0/ N N W W W N u u H N N W W N N N N C CC C C C C C'..0 C C C C C C C C C C C C C C C N C C C C C C C N C C C C C C C > > > > > > > > > > > > > > > > > > > > > > > > > > N > > > > > > > > > > > > > > > > > > 0) 0/ O) W N 01 N e 01 N 01 N N Ol Ol OJ > N> 0/ e N W O) O/ Ul > N > 01 01 N N N 01 W > N> 01 Ol 01 N N W N N Lq 0) Y Y Y Y Y Ln Y ''... Y Y Ln Y Y Y q, Y Y e Y O Y Y Y Y Y Y Y O N' e n m Y Ln Y Y Y OJ Y O ]C Y n Y Y Y g H N m O lf1 O N O m O Ln O V1 lf1 O N O m O H Y O m O N O m O Y Y O Ln O lf1 O Ln O Y Y O H O ll1 O m O e-I N T .--� =- N M M V '.. V lf1 Ln rl N N M m V e-1 N Ln rl '. ri N N m m� N N N .--I ei N N M M� L'-� N Lfl ei c-I N N m m V L L L L L L L L L u '. L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L ` ` ` ` ` ` ` ` ` U ` U ` U ` ` u ` ` ` ` U ` ` u E ` ` L6 L9 f0 N N f0 N N N N t0 t0 (O m�mmmmmmmmmmmmm m v n v m w w m w m n m v n al O m v n a w m v n w w v m n v w m ar v n ) aL Ln In Ln Ln In Ln Ln In Ln t Ln Ln In Ln In Ln Ln In Ln In Ln Ln Ln ',ln Ln In Ln Ln vi Ln Ln ''...Ln Ln Ln Ln Ln In Ln Ln Ln Ln In Ln In Ln Ln Ln In Ln .0 0 0 .0 0 tf 0 00 m c m c au c c W W''..... c c c c c c c c c c m 00 W e W W c c c W m c c m m c o 0 0 0 0 0 0 0 0 0 0 O o C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C L L L L L L L L L L L L L O O O O O O O O O O .. O O O O O O O O '.. O O O O O O 0 0 O O O O O O O O O O y W Ln M� W M Ln Ln N to Ln J J J J J J J J J J J J J J J J J J J E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 `o 0 0 `o 0 0 `o 0 0 0 `o `o `o o `o `o `o o` o o `o 0 0 0 0 0 0 0 0 `o o `o o u u u u" u u G u u u u u 'R w m w m m w °: :� °y' ar °: °y' °y' w IU f0 IO (C IO IO f0 fO IO f0 '... f0 IO 10 IO IO f0 fll 19 ', [0 f0 IO f0 10 IO 10 IU Ill f0 I0 IO Ip f0 fO IO f0 Il, N OJ 0/ N U/ N W W O/ N O) N O/ M a m a a a a a a a'''...a aaaaa a a s a a a a a aaaaa d a d a a''...a a❑❑❑❑❑❑❑❑❑❑❑❑❑ u__ u u u_ u_ u,_ u u u u_ u u_ u== u_ u= u_ u u_ =_ u u_ uu _ E E E E E E E E E E E E E > �T>>> T? � �''...T> T 5.5>> 5 i.>>-> 55>5>>> 55. 5''....55 0` o `o 0 o m `o 0 0 `o `o o w m F m m 0 m m m m m'm m m m N m 9 0 m m m N 0 m 0 N m m m N m m N' N O O O O 0 O O O O 0 0 R Rl C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C ¢¢ Q¢ Q Q ''.. Q¢¢ Q '.''... ¢ Q Q Q Q¢ Q¢¢¢¢¢ Q¢¢ Q Q¢ Q¢ Q¢¢¢ '''... ¢¢ a a a a a a a a a a a a a io is m io io iD m io is m m m io is m io is is is m = L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L= > > > > > T Y > > Y T � I-- H � H H F H H H F7 H F' f- f0 L9 N N I. fD N N N N (6 f0 f0 C C C C C C C C C C C C C m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m¢¢ Q¢ Q Q Q¢¢¢ Q¢ Q 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 m m m m m m is m m m m m m N N OJ 01 4! 01 0J 01 N OJ 01 W lU 0J 01 O1 01 01 N WN N W W 0) W Ql O/ 0J W O/ 01 N a)''. N OJ N `1 W `1 0/ 01 W N `1 N C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C r F F L L L L L L L L L 0' D: W W tY C K C K W K I W '', W W W W o_' C 0C. K tY K tY K L L L L���� H H N tU O/ > > > >W N N O/ N Gl Ol Ol N 0) N N N > tU W 0) > N N 01 tU 01 LU N N O/ W 0) 0) N N 01 N O! N W LL LL Il LL M Z E LL LL E LZ M M LL LIL M LZ M LL LL M Z LL LL LL 11 LL LL LL 11 LL 11 I.L. LL 11 11 LL LL LL LL El N WIN Ln D) a^i w >f'Y �.......,w fb Ln N1�t w M On V wN �On w Ofb N N M M7 m Ln '', N O m O C N M In V""b' m w N N N N w- m O w O t\ 00 V I� 00 O N w W N N W '-I M w w 111 "KF' w mi n N 00 m O) O Lf i_ LD N n M V n w N l0 0 r It Ln M I\ 01 ri LD N rri LD Oi Lf1 fl N I� '-I LD O o t 01 C, W N 00 O r Ln M N a O '', I� a '-n N n to CO m r-1 I\ m 4w.. Ln N N m M V Ln Ln In LD w n ci .-I O Ln 00 a) 00 V a) n ei W Ol ci N N N m o 00 H. N 00 .-1 V n m LD O N Ln 00 m� Ln 00 N n N n c-1 w H a -I N N N N eel". c-1 '-I N N N M� m . . N N M ftl -t Vf 'A W fA iA L'x VT,, Mk i/} 1A. N',. iA iR. +U? V1. i/T 'MA +W} +h '{/ V/ 0.+"Y. to iA V} Vf iA V1 VT 1A o o 0 0 0 0 0 0 0 0 0 0 o 0 0 0 0 0 0'0 0 o o o o o 0 0 0 0 0 0 rl w Ln N O O O Oo N a0 O V w N w dt w N w O '4' m O Ln N to r m LD N w Oi N m N O m I\ V ci w O O n N n M o0 D1 V O m. D Ln c-I . O Ln o o o0 w M M M V V' M Ln W LD Ln n N M o L!1 O L!) O V V 1p to M M O O O n N N O V rl W w W n Ln O ci N C w OO N m m w O) M I\ ^ r4 IN N N NN N '-I ' r-I N V j+ JjI "�JI inj")_I 1 j'A1+A tin I+ j /t.j i✓1 aaQaa aa5a,a N Vtl N N....'Ln N 'n...N N N Tk p ❑ ❑ n Da aaa w nu. w w w w O w O Ln C)Y M Y a Ln O Ln c,tm r+ rva Ln tl .-i N N M eti r a d a D d� a&& si �ca¢aaaaa«�aaaa ... p_ �.- w-- r- a a- a•- r. � a� x- a_ [Sh V Ln Ln w n I` w w Ln w N Ln N o V V N .R n o O OOo M O Ln 'n o w'n w w h N n OIN CD 1fi w w N m m N aD M 7 N 0) V O LO . w N '., n n V �--� 00 N',O O O N W N O'w rl w ri N 0 . CI? w V M V Ol OO n Vl N w w n n m m m N M .--I m m N V LO 00 O N O 01 7 tD O1 Ln w LO O 00 .. w V '. m e-I N N O W N NT LI'1 Lr 1- 00 Lfl N 0) Ln n cri o .-1... O to 4 N 00 to 0) Ln O N d' n T N [T V Ln O v m m w m a n w n m o w Ln Lr Lr o w r .--I ''.. r-I N m �r� �Ln O�N a N m R Ln N m M to V V V Ln a e-1 r4 N ft1 '... M V V LIl Vl ' LD.. LD n '.. n nA to V} iA V) 1A i/T Vf Lf [A to a a a a a Ln q1a N Vl N VI V1 V7 V7 to M✓3 N VI V1 Vl Ln N Vf m M CdR N VI Vl VI m Vl VI � N N N N N N N tail b,,, Wiry CJ d F- O O p p p p Q❑ gN,. � Laa w w w w w w w a �uu. a� 'w Y Y Y Y Y Y Y Y W Y w Y. O Ln O Ln O Ln O Ln O 12 Ln w LD n n 00 »�aaaaaaaaa��»� Ln '.. Ln Ln an to LA Ln Ln N Ln ILn Ln Ln Ln In Ln Ln o In In Ln > > > > > Ln Ln 7 > > > > > > > > > > > > > > > > > > > > > > > > O O O O O > O> O O O O O O O O O O O O O O O U l7 l7 -? U V' o > >- >- >- >- >- >- >- >- > >- >- >- >- > r N} N N N N N N N N N N N N N N N, U U U M1.A U N N U U U U U U U Ld V M1Y 4N U U t � ar ,ec c c c c c c'c c c rz c c C c c c e. ari• w w w w w w w as a� aa', w w w w > > w w > > > > > > > > > > > > > w w w w w > w w w w w w w am Y :Id Y ^x,° Y w Y Y Y Y Y Y Y he Y Y Y Y Y Y Y Y O m O In O Y v? Y O Ln O m O In O Ln O Ln O u1 O Ln O In w n Cw 00 c-1 N In c-I .-t N N M m V't Ln Ln w w r n oo L,'.L L.L L L m m m m m m m m m m m m m m w m w m m m m m m w w w w w w w w '.... w w '.., w w w w w w '.... w w w w w w ".. w m Ln Ln Ln Ln Ln en In Ln m '..., In m Ln Ln m Ln '..,tn Ln m an Ln Ln '.,. In i t t t t t t t t t t t t t t t t t t t t t t t O O O O O O O O O O O O O O O O O O O O O O O L L L L L L L L L L L L L L '.L L L L L L L L L ',L m N M o m In o `4 N Ln N or 'n m `4 V1 M Ln Ln o M m Ln O O O O O O O O O O 212 O O O O O O O O O O O G1 m N Ul Ol 7/ m m N or O1 O1 O1 W O/ O1 m GJ Ol W N OJ N E E E E E E E E E E E E E E E E E E E E E, E E I o` o 0 0 `o `o o `o `o �`o I'. o`o 0 0 `o 0 0 `o o 2 0 `o o mmmmmmmmmmmmmmmmmmmmmmmi v a!LL-ir C m m m C m. m C: m m 0 0 a 9 I m c m c c -m C:. C C C 'C; C C: C S C C C C C C C C C C C 1' m m m m m m m m m a 0 0 mmmm m m m m L''..,C. S H F H F- F- a•^ k-- N�- Pr^ I M-^ h- !- H f- H i^ h^ h '. � F w�lpwl v) E E......... wlwlw in vr� 141A nI�ilnl1n.l,, �I,^I a Q a a aaaaa a VY VI Vl to to Vl N N V1 Vl V1 Sri m m m m m M m m rn m 4n m VI Vf VI Vl to N Ln pa"4 to yr Ln vt Ln Ln Ln Ln m to rrr Ln t"V N N N N N N N N N N ura Ln '' vt � Ln to Ln Ln vl an '.... vl cw a a a as a o_'.w ae.'a O O g Y Y Y Y Y IJ'R Ln o Ln O tfb O Ln N or m a zw T m w 41 t+ n m a a d a s D_ m ei r a'Qaa Qaaaa"a'a O O o 0 0 0 0 0 O 'O 0 0 0 0 0 0 O O O w V w O o0 V 00 N m c ld L V n O w M O V Ln w w m m .--i n n o o w N N c-f LD V O O V w I\ m m N Ln N in ili III �INllm/ a a a a a a 4t"1 " N Vl Vl to to 3, Olti"k �.❑ ❑ ❑ � ao�n�>p',vvvcv ❑ Ln In Ln to t� uJlf Y v5. e-I IN In a'a a a a Ln '... In Ln VI Ln h In In to Ln N In Ln N In {n In In V) o In >..'> 7 > > > > > > > > > >I> Ln w > > > > > J >O > > > > > > > > > > > > > > > > > > > > > > > > > O O O O O O O O O O O O O O O > O > O O O O O 70 U U tD L7 U (.D U Q (D lD U tD U U' U 0� 0 0 U' l7 U LD cm rrrr>}rr.}r>}>> U m m m m m m m m mm mm m m m m m}} a vv'v U U U U U 0.J LJ U i.N U 4a u,Y U 7 U V U ° w w w w 0 U U w w w w . - e-zo w , C C C a)D C" c c O c O C C 0 c c O wa c C c c C '. c � w au w w ai w w as w tar w ' w m Y Y Y Y Y Y Y Ln Y Y Y Ln Y In c) Ln e Y Y Y Y Y Y O Ln O Ln O M O to O m O w O r- O Y �? Y O Ln O LA O i N w .--I '''-I N N M M R� V1 In w w f, n 00 c-1 N Ln .-I rl N N M L L L L L L L L L L L L L L L L ! L L L L L L L L L U `` U ` ` L U U L U ` ` U U i. U ` ` L L o m m m m m m m m m m m m m m m m m 1 VI Vf V1 N m N M m Ln V1 ' VI to N V1 VI to VI m N V1 V1 m N VI m t t t t t t t t t t }' , t t t a+ t a+ t t t t t t t s+ 0 0 0 0 O O O O O O O O 0 0 0 0 0 0 0 0 0 L L L L L L n L L L L L L L L L L L VI to m VI N N N N I. M 4 N V7 ''. In N Kia VI h m u u u u u u u u u u u u t u w of w w w w w w m w w w w w w w w w w 1 N wm Ol Gl Ol m U! wm Ul wm m ww w w w w w w Uw w J w w w w w E E E E E E lofm E E E E E E E Ecoommoo C' E E E E E E E EmommoclooE E E i `o 0 0` 0 0 0 0 0 0 0 0 0 0 0` 0 0 0 0 0 0 `o 0 0 `0 0 i m m m m m m m m m m m'm m m m m m m m m m m'm m m : a a a a a a a a a a aia,a a a a a a a a a n uu m m n0 ecF m m m m tti a7 m e'0 m m dql m a c m m c .c C.. C C C C C C C C C '� � a Q a a. Q a +� a +� ^� Q a a a Q a a Q L L, aaa �L�Csr' w� I a v w v v v w v �a'f m�u G� rf�a � v w ami v v a`mi N I- F- f- f- H I- F^, w w w w w w w w v v w v LL LL 11 lL w wl wl �wl wl wl w v N w �QDOQDD'i©� El N 00 P� tp Vl m lD f� m. N.. ID I, N 00 V a w 7 00 c-I 00 V m O w m Dl O Dl O w lD 111 m O O O 1� w N m7 N .--1 Ol O. m I� 00 N N 00 Ol n V V H m I� N 111 w : o V 0 V LO m� r-1 m '.... lD M 0 111 I.I'1 1� m LnO I� 0 Vl e-I m In to N �--� w lD LnO n ci rri c-I V 00 Ol rl O lD N . V1 00 W ti r1 01 m r N O Ol C c-I 00 r w Dl N 111 N 1l m 00 O o0 M o n -;T o N 00 w Vl r Ln r-I N 1, In Ql N m VI O w 01 m Dl O m O w 111 O 0.1� m''.,lD N o 00 w O ul RI ci l0 I, mO Ol V O Vl 1- m w o V lD m Ol 111 00 1� 1, I� Ol 00 OlN- S S S 3 S ik S S it YL Ik a g a if 3L S s W n �y lD '-I 00 lD l0 T V N '-1 I� l0 lD N 111 1- f\ m N-4 lD o c-I N m Ol m V V I� N w O m V m Ol n O N m m Vl m lD o N Ol .� Ol m O Ol I� m m w m 00 M -4 W O Il 00 06 m m ~ C m to I, 00 M n N O 00 -t lO 00 'i Ol rI In M l/1 m L' w n O N In m m N w M N N VT u1 o M w 01 m N VT m �--� w ul In N L? lD m N m N N V? ID m m n CO N to0 V m m M lfl m O O O co, O O O O a O O O O O O O O O O O R O O O O O o O O O O O 0 0 0000oo 0 000ooa0 00lD V N O 00 lD V N "i S�= to O to O m O LI1 O In o Vl S a n V V 1p l/1 w 1� N O w I� m V N O ''., m 1- to m w o0 Nlfl lD 00 I� O1 00 O 00 c-I Dl N O a to', S zi a u N Dl VI m N O n c-I R r lO ti w V Ol w O .-1 N In m 00 V 3T S a y S Dl N M -! 1� O N '.... N m M 01 '-1 Ol 00 I� lD V V N N O O 00 I� w LQ m rl '-1 Ol 00 I� t0 m V 00 to lD NOOO.--c-i''r-r-'c-S InI� O � lLi I� T Vl O V1 r1 lD c-I lCi S YC S S S O[I u'I M C lD rl W '', N lD O V I, r-I Vl Dl N 1DO O t0 O lD O O Ol lD '.. 0 m 0 O 0 I� 0 O O 00 S S S- a w w I, w m M lD lfl M V 1% m m N N rl O O I� w Ln 1� N <D a 7k S S S S 3i S * S N .--I w .� O N V m �--� In N I, �--I m o .--I W N n V In w m w N O o N W M n Vl M 1 V Ol 111 N M m O V V m l0 r% n 00 (3 (3 � '-I N M V m l0 1� n 00 Ol Yk a S u u S �--I '-1 '-I ti .--I` N N N N N N a S 1n Vl Lf V? [/f 1n V} Vl iA VT M, lh Vl.'1A VT VT t/f in 1/f In N ¢ ¢ a a ¢ ¢ ¢ ¢ ¢ a a ¢ ¢ ¢ ¢ ¢ a a. o_ D. I a a_ D. a a o. Vl Vl VI VI 7 Vl :? Jl 7 Iil 7 N N 7 VI a vl ¢ In :? J1 In N N an In N J1 J) V1 J1 N Jl Jl LL d N vl N N N N vl N vl In In m vl 7 :? an m 7 d vl d vl T > lfl Vl Vl ul > > ,� .� ,� .� ,� •� ,� e-I c-I rti ri c-I a -I rl r-I Y ^' > V V Vl VI V V V C V V Vl V Vf V Vl l/1 Vl Vl VI Vl V1 Vl VI Vl In VI 6? N Vl Vf ul I11 VI l/1 N Vl VI Vl Vl N N N Vl an VI N N Vl V1 Vl V1 N an Vl Vl N N N Vl Vl Vl V1 Vl V1 VI VI Vl VI Vl In In Vl Vl Vl V1 VI VI Vl Vf N VI In VI V1 an Vl Vl V1 N Vl VI VI Vl N V1 VI VI Vl Vl Vl VI Vl Vl V1 Vl Vl VI Vl Vl Vl ✓1 N V1 N N N N N N N N N N In N In N N N N N N N N N N N N N H N H N H N N ~ V1 N N H N H N H N F-- N H N H N N F N N H N H N H N F N H N H N N F.., vl N o o J J v v1 v J J J J J ❑'a ❑ vl n Jl J v J v v v J v n J, n i J❑ a❑ n J J v v J v n v n Jl J J J❑^❑ W W W W W W W W ". W W d W Q- W W W W W W W W W W W W W W W d w Y d W W W W W W W W W W W W W W W LL Y CL Y Y '.. Y Y Y Y Y Y Y Y w Y w Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y w Y w Y Y O Y Ln Y O Y m Y o Y In Y O Y m Y O Y In Y O Y In Y o Y m Y O W Y� w Y o O m a m V O N In ul O LD o lO O I� N n o 00 Y .-1 N Y l!1 o 0 c-I l/1 c-I O N ul N O M Vl m O V l/1 V O Vl V1 Vl O lD l+'1 lD O 1� VI r O 00 '-I N Ifl '-1 ri N N m M V V 111 M t0 lD I� r 00 s-I N Vl m LL �'',.a a a..a a a a a........a a a a a a a � a. o o o '.. o o o o o ''.. o o o o 0 0 o a o a •- .- vl vl vl vl vl vl vl vl vl vl vl a` vl a '. o vl' vl vl vl In vl vl vl vl o vl vl vl a` vl a vl vl 7❑ vl 7 cn O vl 7 vl 7 vl 7 vl 7❑❑ vl vl v7 vl 7 vl ❑❑ > vl > m 7❑ > vl > 7❑❑❑❑ > > > > > > 7 > 7❑ > > 7 > 7 > j 7 ❑ > 7 > 7 > 7 > Z) > 7 > 7❑❑ > > > 7 > 7❑❑❑ > > > > > > O > > > > > > > > > > > O l7 O V' 07 (7 C7 l7 17 C7 O O O l7 O 07 O C7 O l7 O l7 O l7 O V' O l7 O l7 O C7 O l7 O l7 O l7 O l7 o U' O V' O l7 l7 17 0 C7 C7 (7 l7 l7 ?o 07 07 l7 l7 l7 07 07 U Io7 V> C C r r r}>} T> r r r C C>>> r r Y>> r r r> r> r C C T V u u .4 U V u V u ' V u V U r>> V U u wN V > U M > Ln U r Vl U } In u w r} o U wv '.... In u m u Vl u o U v 111 U w m U w m to u wv o U m u V1 u o U w '.. r H u r>-I u } H u ei U w e-I U w01 H U c-1 f-I u w ei u N c-I V wN c-1 .--I u h ci u H '-I U H ei U U rl U U H u N r'1 U > N u N U N u N w w w 01 N w � N YUUI � w N N \/1 H \Uyl u�i \UI vUi v�i v � N V\1 N N N N� 'A N N N N N N N N V\I N C C C C C C C C' 01 C' 0Y C C O, C C C > C C > C C v C C C v C C > C v C m C C C C C C C v C C > C C > C m C > C > C > C > C m C > C > C v C > C > > > > C > C > > 01 0/ '&W 01' 01 > 01 Si > v > 01 v > m > w > wv > w > wv v m > 01 > 01 > 0/ > m > O1 > 01 01 > v > 01 v v 01 01 0/ m 01 01 m 01 01 01 01 01 > 1 > Y Y In O Y In Y O Y In Y O le Vl Y O Y Ln ]d o O Y Y O Y he o Y to Y O Y In ]e o he In ]e O Y In Y O Y In Y O Y m Y O ]e In ]e O m Y Y v Y Y O Y l/1 ]C O Y In Y O Y In Y O Y In Y O ]C In Y S O ]e lfl Y O o he l/1 m Y O o Y� ,. Y M 7 T to In tD w N r� 00 .--I N to r-1 .--I '.... N N M M V V V) lfl w w I, n w .--I N l/1 N N M M T V Vl l/1 w N N l!1 L L L L U U U U U U U U U ` U U ` ` ` u L U L ` L ` L ` L U U ` m m ` m U m U m U m U` m m ` '., m U m U` m', m L m ` m ` m '... m m m ` ` ` ` ` ` ` i L ` ` i 01 01 Vl N 0 Vl 0 VI w ✓1 wm V1 Vl w Vl w ''.. Vl 0 VI wwwm Vl VI VI Vl v V1 v '. Vl v VI 01 V1 01 ''.. V1 v Vf 01 VI w In 01 Vl 01 VI m V1 01 VI v VI w VI 01 Vl m V1 m Vl v Vl m Ul 01 Vl 01 Vl 01 Vl. v N v Vl v VI m Vl m Vl 01 Vl 01 VI w VI m Vl 01 V1 v Vl w Vl 01 VI t' t' t' t' t t t' t' t t t t t t t , t "'" t t t t t t' t t' t t t t t t t �' t ',, t t t' �' Y t t t tf t t t t ',.. O o O O O O O O o O O O O O O O O O O O O O O O O O O o O O O O O O O o O O O O O L O L o L O L O L O L O L O L O L N VI LnVl Vl VI In VI Vl Vl Vl '. VI VI In In Vl VI VI VI In V1 Vl VI VI N VI VI VI V1 Vl VI to In V1 N Ian '.. V1 Vl N to N an VI N N ✓1 LnVl V)'.. O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O u O u O u O u O u O u m 0/ 01 O1 v 01 01 v v 01 001 u 0/ u 01 u 0/ u v u w u wv u u v u v u w u wv u u w u w u ww t u v u w u wv u u m u w u wv u u QI u v u 01 u m u 01 u v u v 0J 01 01 v 0J 01 '... -(u v N O/ OJ N w N O1 U1 U/ 71 N N N O1 OJ O1 N O! N N O1 O/ Ol N U1 O1 N W N O1 O1 Ol O1 N U1 O/ Gl W O1 O1 O1 N 71 E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E'E E E E E E E E E E E E E E E E `oo o` o `o 0 0 0 o o` o 0 0 `o 0 o `o 0 0 0 0 o 0 0 `o `o 0 0 o `o `o o `oI`o 0 0 2 o o 0 0 0 -o -o o 0 o o o io io m m m io io m m m m m m io is m m m m m m '.... m is m m m m a s a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a'a a a a a d a d a a a a a aia a = = u = = ''' m m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C m C a¢ m C m C a m C a m C a m C a m C ¢,aa m C m C m C a m C a¢F- m C m C i w-rr F r�',� `1 N m 01 �/ `/ 11 `l 01 01 ` it 11 `1 01 0! 01 11 `1 Ol 0! Ll v 01 01 `l `1 QI 01 01 01 m `1 v v Ol 01 01 01 v `I v OJ v 01 `1 ' 01 01 01 11 LL LL 11 w w LL w'.11 Il LL LL LL LL'.w 11 LL LL LL LL 11 11 LL 11 iy w'w lL LL 11 LL''Il LL LLLL LT izLLs 11 LL LL LL iz LL W',11 E LL 'Il El n Ln M N '', N W O V 1p l0 O� La O N w O N O wNu , 00 O N o0 O La o0 O q r00 -!�.] N V V La Ln -! n N O W n c +4 (V O 0 n ".O 00 N m n .zr W la O Pw 4l`a 1"x➢ M n M N '-I ci .-I n N O N 00 V tin rl n M '-I M 7 O N Vl ci W O m V m n Ln N N N Ln m m 00 r n m o O Rj* a n m N n N Cf 00 00 m N M 4b W r`^ Ci H. N m LO r M w m r c-I m m n 00 L(1 M"T m N 00 n L r-I m La 7 rl m o ob 0 m .(o' m N N V N O l0 N m V1 w�+l ' n M O M1dA N w' (a La O O Ln La V m m 00 m m m 00 m m cr 4 00 oo V ci m n Ln N O% L m m O o6 LO m m m rD N m 2T N m N' m Ln R La n m 00 n n N 00 m m V o Ln ti m a) Ln m 00 m as i, m - m rn c7 m acS ws m m 00 (: oo oo " � m o m c anti n v= t ao v ui r-: c ai r, r, w o vi A Ln v v m m. Ln m e m Ln n m Lf M Ln r, m ti' vn M M m v of m n m m m 'm n of °m ,. m n v n O m m 0 ai m n .� Ln m m n .� Ln tra N Ln m N Ln 07 .� Ln Lp .� ^ax n ,w' M .g Ln oo m ao m oa m oo m rM. ry n N r•* a Lo v Ln n ri n Ln ti oo. v .� n m O (o m N N RI RI R tip' V1 adw wP M1tY n n c-1 - N m M V V1 lA LO n n 00 v>• u* v} 14 1^ u} .n....''an in u* v>,,.,.+w, cn vl ,vk'%A ,n v* ut u} U* 4 +nvv vz 00000o0 o oogo000000000000oco00o0oc""a-�o00l0000000 o000'0 o ca l c? o 0 +x s«y� o Li'J m o txi:.. a e7 ter c ts'r w*n ni oo Ln 4 N w o wci ❑ r.. , aru aW Lo Lc wryd. o mu oo (xd e7 ry x;p +a sate ea v'ti Wn 7"+ <d'h fi2 m Ln .-a G0 N Cd M m u1 O' 0dp C N n .-n 9k per. .--i g 00 r-a Ln co j -4 A a, N w n '... m O O c!L W Wi1 C0�00 r^+tl M } uo CT 4a Prr m ^q^ O nn. rti 4iM ttV n M 4F5 task 'Cf N ID O 4xS hp]i O M aa7� O m Io O (*"b 4C? Y,,,!"v M rl ' Ln m m m� n WU as n 1 m S7' 'H N as ni N n ads u-. 1 wki crt rcrs" [ai ax•a evi l' nr^a ai N aci rru 'uw 'eca' rcx'o er" N rri +�} (nd aci cs " m o r4 Lo w6 1.�' ndi �ti Lda ea ua 4 k iP^. ^rt ,'"e di' n Err o m 'w cn o d�^r 'H w17 ,q L1M a•-tl 'UT e^+ n na '... ,ti w ,^^M n Isr 2a r+ +� 1 r aKr pCl g "ry uv 4a aA 'C,M a1y5 N U"1 M Wt7 A w. ,-.0 0.ry !PF3 m '+tr• to [a , i aw an fi%a ^ar ero rdp Cw.. ttw .+; ea Ln W t,3 M '. dq' w Rai ru a'kl� 'Lisp M7 C9 r4 +H a'"w Ceti C+tl PEA rrrn cmp «.' ^.y" "FI^ n4ti uda' vf4 +mm1i ,-M Nl awl. o) r^n`.. v w at'b' lcp '(ai n n G o6 w4' m, N m gq1..'m �n w°. n 0d Di (T vw va an'ao- v> vM to'v+ 0 vt an +n v v* u* nnn'Ada w ti* yr '� in 'An'ws vti n i^ xn ur xn u*VV (41 Av sn W. iA sa, ta. a. oL. a. a,. cL rtiol.. 4. m. a'.a aM. ri 2 a. cp, aM a.. Z ox.. ML ' �. aa_ tai... di. � zr. ea. A. o A A 0L in dk. Lm a.0 i>.. 04 dk. 0L 0k. cY. ti �' l O� 0L. 1, a. a. a. Q, a 4 M M lc. 0L 0i. 0r. 0. O° d. 0L. 0Y. a,. a. (k. t!. 41. CA 0k. Ch� D D n LVW in a.dw cPa (!1 an V7 i.+tl Ln arh W 4A. 04 ax1 In w,d7 0 0 4F'X Vs ads uM wry, w) wY u5 lYo an a. °j°L 0- a aPu V1 VM D- o. an a. o- cL dl"b tv'F ma M r^ >a cp c car der r r "�` 'Aub un oury Ln wrs r.,an" u'a ''. vs aiv axe an afro an Ln an wry urn a.iw ais (n a✓a v5 4'rr Lr'a au'^rr sn qq,x/'yy ` "�'," aio (n (n u'( aA'r wet x+'d vu 'vw V1 4PR §ry Vi an 4/3 LA'p 4LA U°B N V! yry adL VI 0.n V1 M an (W't' yya�ry pn (/F Vl a+"r idT (/9 4Po V1 VN Va CJ5 4R� V4 M yry, VI axs an W`X 5x5 dd`6 to N N 9wY NN N Vwd� N N N Vr rdV N {�•vrqg N a'"'f N N N N N N N N N N N wn Nan N rJ V•'- k- k- b•- k-^' 1-- k-- W-• H 1- ?- R-' �^- N-• N 1 ❑ N f- 9- 9•^^ q-- Y- F'- H F^^ M-- !'-d' W°-•'tl-- h^^ 6^ N 8' N 'k'- ♦- q-- h F- i-- 4- tl^- h- F Cd A]', ❑ CN ❑q L7' ❑ fvu ❑ ❑Y '', ❑ ❑ w" i-• 1� ❑ �❑' ❑ C] b" ❑ L"1p' C1 C_i ❑ ❑ ❑ ❑ i••-'ib�'�I�� ❑ ❑ ❑ ❑ G"N CL ❑ ❑ ❑ CS (n sir xir (ew Ln nx".0 ¢r1 arM nn, Ln a.n aid N uir ra `�' Ln x+"4 wiry uiv (ia ria ut cdr ris +dl, niv a'n cd'a u'R Lim ❑' aPp u/r N w>'q Lsp (n air an aid L<'a va a aa. aa... tr. ea., a. cp. rta. w W.. e✓� ca p. a14 W W W Uy fpa W'. ktlA FA.I M1al W W W W W W 10, C0.. W W LW W W 11A W len W W W W 44d 4A W.,, 0, : th t-d itJ hl. x he W W W W W 44 W4 O to O tin O pPs O O Ln O Ln co) Vl O 5d `L O Ln O uti' O eh. O 4ds O Ln 4 r,n O 'Ldb O Y Y O tP'y O LWq O Ln O Ln O u"PLj� O u"s M Ln by La n n 00 'm^A N Ln .--I rtl N M'W 4'+N m V "(A L!1 M 4iN ME4 pw f'w 00 H �' 41'7 m^4 n^tl N N M m o Ln N u) . 4Q�. Li n. raL aJ ci. a. eL. a. r..d n°. aaa Li &a 4 ry.�a. ai. ca, a;i a'L d. cL d...�a.. a. ca, ti.. tz..dr daamar && Fa„ 9¢- H H Q F F' <' F s^S. pQ« 'a...h Q ¢ R ¢', a Q ... M-- 3-- s r� r- k- F5�"- a a a a a a a a a a a a a a a 7 a J a a a a a a a a a a a a a a a a m a a m a a a a a a a a i 0 0 0 0 0 0 0 0''0 0 0 0 0 0 0 a° a o 0 0 o 0 0 0 0 0 0 0''.o 0 0 o a o a 0 o 0 0 0 0 0 0 0 0 0 0 o` a` a` a a a o` a a` o a •LD (n m ut (n (n ut (n (n ut ut (n m (n m ut a' (n a ut ut m (n m ut (n Ln ut (n h in vs ut ut ❑ ❑ 7 ❑ 7 ❑ 7 ❑ 7 7 ❑ ❑ ❑ ❑ 7 A ❑ Vt ❑ 7 ❑ > > ❑ ❑ ❑ ❑ 7. ❑ 7 ❑ 7 7 of ❑ w ❑ ❑ 7 ❑ 7 '❑ ❑ ❑ 7 ❑ ❑ 7 > > > > > > > > > > > > > > > 7 > 7 > > > > > > > > > > > > > > > 7 > > > > > > > > > > > > > 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 >'0 > 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0> 0> o 0 0 0 0 0 0 0 0 0 0 0 u� V` u0 u u ID LD u u u u u u u u u u u 0 a �'.., u u u u 'u u u u u u u' u cc K 2 K '.. Of Of 2 lY f f = w K K K 5 K tr K LY K LY K C lY K C lY lY 2 C tY tY C C K > r r r r >- >- r> r r r r r s r r >- >- r..r r r'.r r r r r> r r= >'''.> r> N N N N N N N N N N N N N N N r m> M M M M'.M M M M M M M M M M m> a Y u u u u 10 u u u u as a U u u u m ' m u 0 rd Ord 0) 6BP �'S y�9 v � � � v dW W' � u y� 1.0 9�6a � � i �. 0�Y (w4Jd � 0�J � �� � � y t,� °J v v O' C c c r .','�' C c. ,O' c a c c c c: c c C '. ' O Lm C c c c C' C C C C v v v v v v ar v aM v v v a v v c y c a v v n v v a v n v v v v v c y Y Y v c v v Y Y Yv Yv Yv Yv Yv Yvv Ya>v)cv v> > > > > > > > v s m v v v w va a 'a v Y Y YYY Yav a le he Y O Y ' Id YO CD N O n O O m O n O he O (n O N O Ln CD (n O M O O M OYLn Y O O 0 O ONO m O mM V W La 00 N -N N M M V ';t N 0 W r, r, 0 N n N N '... M m V V M Ln LO LO r L L L L L L L L L L L L L u L L L L L L L{y 5 u L L L L L L L L L L L t L L L L L L L '.., m v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v..... N (n A A M V1 to A Va VI Vf VI A A AVI V1 VI Vf '... V1 ux1 ut Vf V1 VI VI V1 M V1 V1 V1 Va. V1 V1 VI'Vl V1 V1 Va V1 VI Vf M M V1 M Va V1 ''.,( t t It t tr If t t '... t t' t t' t t t t t' t t a+ a+ tt' t' N t' t' t' tt' t' O O O O O O O O O O O O O O O O O O O O O O O O O 0 O O 0 O O O O O O O O O 0 O O O O O O O 0 0 L L L L L L L L L L L L L L t L L '..L '.. L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L_ VI VI M V1 m V1 VI N VI VI Ato '... VI VI (n N A M A N V1 VI V) A A A M VI (n ''... M Va M V1 V7 A A VI Vf M A VI V N V m V V VI l O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O u u u u u u u u u u u u u u u u u u u u u u v v v 0 v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwvwwwwwwwvvwl ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ i0 ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ C E E E E E E E E E E E E 0 0` 0 a o 0 0 `o 0 0 0 0` o` o o o ``o 0 0 0 `o `o'o o `o o `o o` `o 0 0 0 `o `o 0 00 0 0 0 `o 0 0 0 0 00 `o m io mo m w m m m w m m m is i0 m w m io m w m m m w m io m io i0 Itw m io w m m m m m w m m i0 m w m m m 4 a a a a a a a a d a a a a a a a a a d a a a a a a a a a a a a a a +n ra buryry ear n wr .' I r'. v V Y v .L ax .� �r a a wr w a� � xJ 6S 5,r•'. 4a aJ Cr YJ v hA4a U ieY'I., 11 u V m m m m m m m m m am m m m m m m m m m m Aq C C C c c c c C'. a c a c c 0 c c c C C C is is 7; 1 m I i0 io is air ro16id m m "W ma am m io is i0 io F F IL- i-- F F 6L- F F. PL- YL- I.ar- H F +a m m m m, m a a` a` a` OmJ , N N Om! N N f lai �Iiz a i(.g ill El o u o o m �n o m o o o �n �n o o o st a; t st '. I, o' m w r, w o a m N v o lD ID v lD o 0O lD c rl o m v .-, c� N Ol O # Ol Ol lD N Vl 00 R Ql # 00 N O W O lD O V a0 I� r-I O Ol # It It # w '-I O 00 N 00 al T m m N N o lD Vl I� 00 00 W 00 00 m O N # I, M w1, r O 00 ci V 00 N tD Ol N # # 3t # O M I� N 00 01 I� M c-I lD V Vl a0 n T Vl rl n ri O .--I 00 N lD T M 1� N O m M m O N .--I lD O d' Ol M I� N It a m m N N M V7 W lD V N lD lD Vl V lO �--� I� M Ol V Ol Ol a0 ID O I� l0 O T Yn7 # 00 00 m 1, lD I, n lD tD Vl V t11 fY) # # k # N 01 1� O V) n M 00 Rl 00 V W V O O Vn,. n n lD lD n `-1 O 10 N, c-1.' lG O m# m .--I 00 m V M 01 Ol 01 DI Ql 41 (l (n # '... ## m .--I O m I, N N O V F, lD m N O V) o r e-1 00 In O) n N m N a0 N N m Vl # m I, 00 � N .--I m - Vl T c-I T I, m # i R # m -qr m 00 N I, cj lD O -4: lD a0 O r, VI 4 T N O al m N VI VI 00 - VI 00 cj Dj '-I N f/1 09 V VI lD r- n W Dl ## a R '-I e-I N N M M •-I c-I N m V m w In e-1 e-1 N m m lO n m Vf # Vf L? i/? Lf Lf in L} V} V) Nn '/ 'n V} ..'.. V1 In Vl Vl .... N V} V} V? 1/T in Lf V} N Lf to V} in V? V). Vl o # IC O O O ON lO 01 o M N O O 6## # 3t 3t Owl Om1 L. O O~1 O O V NO O W 00 N W O V 00 14 O O OO O CC? M N O 00•• TIf r o o 0 0 o 0 0 0 o x u u a- o o o 0 0 0 o o 0 0 0 o o o 0 o o o o 0 o o o 0 o o a co o 0 0 V1 O o Co O O O V1 m O N O O1 V N m m N Ol lD N OO m V N lD I, w Vl V) W n O N M O O V# A M V lD M # # # # # 3 '. a) e-I VI 00 V V OI V Ol W T N 00 t` N N V # # # H m Vl ci c-I Ln (rl N '-I O 00 it # # S # # r7 c-I M I� V7 V7 00 W W I, m (Yl tD V .--I ' I� lO l0 Ill m Vl m rl r n lD V7 ir # # V N e-1 N W O m r-I m o I, a0 # # # # # # 00 a0 a0 N lO w m m W m lD lD lD Ill m 1� Ol 01 01 Ol V V V T Ol l!1 al Ol # Yt # lD 00 O I� Vl tD Vl Vl M N .--I # # # 7t # # M Vl Dl al V Ol V Ol 1� Ol .-I Dl OI al Ol al Dl al a -I C 1� OI m al V 01 N m V Vl l0 I� a0 Ol # 3 YC at Yt .d .-i N N m m c-1 '-I N M V Vf lD I� rl '-I '-I N a V1 I- 00 # 1n d 1 d a d'd d d d d d dd d d ¢ ¢ Q d d'a V) n v n v n m J J n J n n n a a ! } V) Vl Vf V) ci ci c-I } N } N N N N N N '' N } m } M M T M M M VI VI � Vl VI VI VI V1 VI V1 Vl VI VI V1 V) VI VI VI VI VI VI J �V/ll {V/ll to N V1 VI J �V/II IV/II �V/ll VI J �/l VI VI V1 Vl VI Vl Vl V) M Vl VI VI V) VI Vl Vl V) Vl VI Vl Vl Vl I�l VI J J J J J J In Vl J J J J J J V) Vf J J J J J N N V1 N ul N N N N N N N N N N N N N N N J N J N N N N N N N J N J N N N N N N N J N J N N N N N N H H lV e ❑ VI ❑ ❑ V1 ❑ ❑ VI ❑ ❑ VI ❑ Vl VI ', V) IA N Vl VI N VI '., N VI In N to VI an VI VI VI an V7 N N In N V1 an VI VI VI Vl VI V1 V) VI VI VI d d V1 lydj N d d d d d d d d d d d d d d d V1 d VI d d d d d d d VI d to d d d d d d d t%) d to d d d d d d Y Y W Y'.W Y Y Y'..YY'..W Y V) O ]e m he O In O V) O o O N O o O o O V) O Y N Y O Vl O VI O o O Y Y O. O N O Vl O Y Y O In O Vl O N I, 00 H N ''., o ff ci N N m m V� Ill m o W N N ''... W �"� N V7 .--� ci N N M m .-I N VI rl .--I N N M m V c-I N V) .-I r-I N N T M a a a a a a a a a a a a a a a a aaaaaaaaadaaadadaaaaaaaaaaaaaaa ¢ Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q¢¢ Q Q Q¢ Q Q Q Q Q¢ Q¢ Q Q Q¢ Q Q Q Q Q Q Q Q¢ Q¢ Q Q ad 7d 7aaaaaaaan- o o d 3 d o o o 0 o o o o o o o 0 0 o o - - o ' o -- •- - •- -- -- - - - - - - - - d` a a a,..a d` a d a a........a d`''....a- a a i a.......a VI Vl d N d Vl V) In 0 VI V) VI ''... VI V) ''... V) VI VI Vl VI Vl Vl '.... V) Vt VI VI V1 Vl VI VI VI VI VI Vf VI Vl Vl VI '... 0 Vl N VI V) V1 O O > O > O O O O O O O O O O O O O O O > O > > > > > > > > > O > > > > > > > > ' > O > > > > > > > V C7 UO p l7 p O O O O O O O > V' p U' l7 l7 C7 l7 O O l7 l7 l7 l7 l7 l7 0 l7 U' C7 V' C7 l7 l7 U, 8 '' � � � � I � � 0l7 2 C C K d' K ... d' K >' ,rl 5 } } } r r } } } r r r r r } r } } } } r r } } d' r > r } } } r r } '.. d' } C } } } } } } a v r r ul In vl In In In m In In In � In In In In .� N m } } .0 e-I u .0 '-I ci c-I } } ry N N N N N N r } T m M m T M u U M u In u u u V u u u u u u u u V U u �y u iy N u N M u M w N u N u N N Ol N N N N N m w N Ol Ol W N N u u u V V u u Ol V u u u V u u V V u u _ u u N al N Ol N OJ OJ V u OJ O/ O/ O1 W N N V u N Ol Ol N N Ol N N N N O N N N N C C C C C C C C C C C C C C C C C C C C C w O1 C C Ol W Ol OJ O1 a) al al N OJ O1 N Ol OJ Ol N C C C C C C C Ol C C C C C C C C C C C C C > > OJ N > > > > > > > > > > > > > > > > Ol > w > > > > > > > Ol > Ol > > > > > > > nl > N > > > > > > N OJ > > al al W N OJ O) a) O) UJ N W Ol Ol N 01 O1 Ol Ol > > Ol al O1 Ol O) N N > > Ol a) O/ OJ 4! O) W > > Ol O/ OJ OJ W O1 Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y O/ Y O1 N Y O1 OJ Y Ol Y Y Y Y o ]C Y Y Ln c Y o Y Y o Y Y m Y Y Vl O Y m Y O V) O M O VI O V1 O Vl O V7 O Vl O Y Y O V) O V7 O V1 O Y Y p V) O ul O Vl O Y �! Y O Vl O Vl O Vl I- 00 '-I ''., N - r-I .--I N N M M 7 V Vl Vl lD lD - n 00 `-I N V1 rl ci N N M M d' a -I N VI rl r-I N N M M V �--I N V) N N M m u L L L L L L L u L L L L L L L L u L L L L L L L L u L u L N m m N T m m m N l0 m N m m m fa N !0 N f6 f6 N f0 N N N fa f0 fa N N la N N N R fa fO N.. IO . N N m N f0 f0 v m v v ar ar v v v a a! v w ar v v m w v ar w v v v w v w m w v m w w m v ar ar v a m v w m ar ar oa w v v V) VI. VI VI V1 VI VI VI VI Vl VI VI VI VI VI VI N VI VI Vl VI VI V) VI V) VI Vl VI Vl V) V) VI V) N V1 Vl VI N Vl V1 VI V) VI VI V) V) VI VI Vl t t�� " it t t If tf C t t t r t t r tf m. m m m oO m m m w Opp an ao be m m OD w m Oa w an d m l m an an Ila cc m a O O O O O O O O O O O O O O O O O O O O C '.. C C C C C C C C C C C C C C C C C C C C C C C C C C C C L L 'L L L L L L L L L L L L L L,L L L L O O O O O O O O O O O O O O O O O O O O O O O O O O O O O VI V) Vl Vl V) V1 V1 (A V) V1 V) VI V1 Ln V) N V) VI V) V) J J J J J J J J J J J J J J J O 0 0 0 0 O O O O O 0 0 0 0 0 0 O O O O O O O 0 0 O O O O O O O O O O O O O O O O O O 0 0 0 0 0 O u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u M u u u u u u u u u u u uOUNln))Gl O1 Ul Ol O/ Ol N O! OJ O1 in W Ol E E E E E E E E E E E E E E E E'E E E E E E E E E E E E'E E E E E E E E E E E E E E E E E E E E E `0 0 `o `o `o `o 0 0 `o `o o` 0 0 `o `o o `o `o o` o` o `o o `o 0 0 `o `0 0 0 `o `o-`o `0 0 0 0 `o `0 0 0 O,o o` o `o.`0 0 0 Z m m m m is m is m m m '.... m m m m m m m l m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m iO a a a a as a a a a a a > > T > > T Y > > T T > ? >, T > >',. T ?. T > T T ? T >',. > ? } T',. > > j > > •T >. >. > > > > T T > > > > fa la N a5 f0 N dX1 N N fa c c c c c N c c a a] c c c c c c IO c c c c c la N la f6 N (a " !0 l0 fa 16 f0 a] IO N N f0 f0 C C C C C C C C C C C C C C C C C C C C C C C C' C C C C C C C C C C C C C C C C C C C C C C C C C f0 fa (0 f0 (a fa Py ICY 4'a la (a f0 t0 f0 fa f0 (0 fa la f0 N N fa 10 fa f0 fa f0 'RI m m m f0 m la m m m Ia m m m m m m m f0 m F-F- H A— L L L L L L L L L L L L L L L C L L L L L L L L L L L L L L L L L L L H.,.H H H. HF H H H H.. F, � H.:A— � fl— �..� H H N H.H F-A- vN �1 v1'd ("I vN vN v w w w v1 w� N N N v vN N 9 N N vB vN vN 1 vN vN v vN vN v N vN vN v WIIWIEILLIILLIIEll Mil WIEll LLIMIWiEll MIZ]E111E� EIEIEiElLLILLIWIIWIIWIIWIIWlLL11LL11WV� lWlWl 11 i@ Y�Y�!7A'�L El w 0 N N w N O c o M o v n N N 00 c-I n Vl M N M O O1 to m lfl 3 Di... n m O '-1 '', O u5 Yk N n N 0 0 e-I m m ct zlv m w 2- H N M m lO 00 N N N N N N N R sc oo 0 0 0 0 o u o 0 0 0 0 0 0 A V O 1D w V lD O tt v �D n m v m v � W Ol m O N O m o m m - m eo am 0 lD O e N N m Ln Ln ci 7 L IR m .� n ....rn '-I to to H w '., n � m m <n.'....n m lD O M N M lD N N N 1^ MIN o'o 0 0 0 0 u O Vl o ui O o m v n Ln n IX7 m M M V7 l0 Ol Ol 111 lD Ol 00 O O ei 00 N N m y m oo m m N� 1011.1NIN a a a Q a a a a a a a Q Q a vi v1 1n N 1n vl 1n a '.'� a v1 vi v1 > 7 a 7} Y>>>>} 7} 7> T Y M ''.. > a cr a a a a v� ",� i 1n {Ln�� V1n� J U1 J J J J J J J N J J J J N J F J N N H N ❑ N H H H H H H H N ❑ N 0 H 0 1n ❑ a❑ J Ji 'n ui 0 J Ln❑ a❑ J n 1n fL vl w fn a a a a a a d w a Y fl W w w w w w w a Y d w w w Y W W Y Y Y Y Y Y W Y Y Y O Y N Se Ln O M O t!1 o LnO Y Y O V1 O N N M M'zr aaa-L aD aaaaaaaaaa a a a a a a a a a a a r•�a a a a a a 1111 T O rl D1 N n V N 0 ul VJ O N w V V 00 V O 10 M O M n w c-1 N W M M O .--I N N w N 00 N tD VJ O M M N d' W In al m O ul W W Ol ID ci d0 Ql Ol 00 M e-1 e-I N lD 00 00 fXl '.. W m w fN M N n n M M N Ol M M O �D Ol c-1 M ul V Ol W n ci ' W N N lD O lD M Ol O .--I N 0 00 m O1 N lD n ei Ol N c-I W '-1 00 ul N '., � N Ol e-1 N N m n W Ol N M O1 n M 00 O N N M M N M M N n O Ln Ln w nM n . w c-I 4 w O w N .--I n n M y rvl W m O 0o m m W m W t0 r>o n N M n m O 0 N m n 0 v W N M V u'I 00 m W N n c-1 lD lD W '', O n W W l!1 } M M O m ul lD ', O V W N eti r-I N N M M r c-1 N M V Vl lD n .-i rZ N V ul tD 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 m o m s to r-I N lD o 1n w o w V N N V 1n m N m o N n o v n ,� co Zr n .� v v O O N r N O lD R c-I 00 r-I e-I V N V O M 1 V N l0 6 V7 M'..'', 00 M n N N v N 00 O n O O r N M 00 N V n Ol 0 c-I N Ln n n V' Lnw e ul O W W .�-1 00 O N O..O - N N N M M V '-1 - N m V Ln a Q a N d a 1M WW a a a a '.. a 0 a as a u1 VI 0� tl N W+t N N Vl VI N tl O_ VI Vf ydp ry v1 J J J J J J J N J N J J J h a ❑ n J ui ❑ a❑ m m w Jl n o a a M a M w <n o a W W Q. Y flw�W W w W W w D_ Y M]C Ye lx1 Y Y le Y le Y' Y.w w Y Y<n O V.O 1n o m o uY O Y O N T .-N1V aaaaaaaaaaaa aacaaaaaQaaaaaaaa 00000'00000 0 0 o O o 0 0 0 o O N n a-i '. N lD V tD O '. O N lD ul M 00 lD 00 n u'1 14 M v m o m n o n v M T N T 00 O lD N 00 C n 06 c-I '-I ti rl 4: lD n" m VA VY N N N a s7 LL a a a a 7 7 Bey 7 1n 7' 7 7 7 7 0 r 7 M M M M M J'..� N H J J N N N N N O D,H ❑ H O � O',.�,,O a .aai w a Y 1a w w w w w N w w Y Y heY o .N-I o ry o iaaaaaaaaa aaa a a a a a a a a o a v1 'n ut 1n ut ut ut 1n '� ut 1n 1n ut 1n 1n a` 1n a` r1on uat uat ' 2 ro 0 0 r0 0 O d o o .2 i` aa LL a s0 ao`a a'. o' o 0 0 0 O Oaaaaa 7 of 7 1n 7 7 7 7 7 7 7 7 an 7 7 7 7 7 7 7 1n 7 ut 7 7 7 7 7 7. 7 v7 7 7 7 7 7 7 7 7 ut 7 of 7 7 7 7 7 > 7 7 > > > > > > > 7 >> 7 > > > > > > > 7 >O 7 > > > > > > > 7 7 > > > > > > > 7 > 7 > > > > > o > > O O O O O O O > > O O O O O O O > > O O O O O o O > > O O O O O O O > O > O O o O O l7 0 U` ID U' 0 (D 0 LD 0 U' 0 U' (D l7 (D U' U (D o V' 0 (D D 0 tD '....(D U` 0 C07 UO C7 C7 C7 L Oo l7 U' U UO l7 U' U' C7 3 K K K >- C K '... K K K K S K C tY K K K K K C K R K K w K C fL 0' K fY K . r z> r r r} Y r r} s''> r r r> r> rz } > Y v z> Y> r> r r oc z»} r r}> w > Y>> r M} > cf V} Y In Vl u1 ul Vl l!1 N r } .y .--� �--1 ri .-I rl ci } N} N N N N N N N} m Y m M M m m u it"y w V V u !u' a W M y'� uJ G Lu W U gS3� `~ U '� u 4.A 4k 0..Y 4n ki N U N V V tJ u m YP M 01 dNl 01 01 01 W VW fly 0d H Pdq N M V' yy U Ol 0l 90 M 0Y 0J N U N H 01 iU uw u�ry sk U 0J 5J A1! �', qWl wf 0D 0tl vp uM dl'. ^r 4d WI WY wW ur qy N v `'^+1' 01 in yY wi`"" v^mi N kY - N ti a w�'- '^^w Nanu1 ^-� am", c Z 'I ," ,� N ? 0.M O rj o ALV GUI N 01 "1„i 0d 0! '. dd C,a 0q 0k 0J N qd C ? C ON kl G (Vd' 1g1 01 l:' j C 01 ''., u w +:6 0d N 0J c C w w w w w ✓' Y w o N o w 01 > 6! wkd MCA F 1 C>1' N �01 ✓ j 9>0 0>.N Ok J'. 9A SJ q7 I > N 4! 93 iU ill 0! ."w O > +aP ikb 1ti tlU aY+ m 0l > > > > '^+ > 01 01 > > > > > Y Y 4k Y Y Y Y Y '. Y Y Y Y m Y Y Y Y Y Y Y ,. O Y M Y O ut O N o to O Y u! Y O Vl. O ul O N O Y N Y O VI O ul O Vl O Y ]C O Vl O Ln O M O Y T Y O u1 O ul O rl N ul r-I ri N N M M V .-i N In e-I c-I N N m M .--I N 1!1 c-I a -I N N M M V e-I N u1 a -I '-1 N N T m CT rl N Vl a -I .-i N N M L Aul-ul-G LLLLLuL U` ` U ` ` U U` L U U L U ` ` ` ` U U u ` U U U ``mmmm mmmmmmmm m N 01 01 0J G1010/Ol010101Ol VI VI' N VI VI VI V1 Ul ., VI V1 In V1 Vf VI 'I, VI.. V1 V1.., to m V V7 VI Vl. N Vl V1 Vl V1 V1 V1 V1 V1 V1 V) M VI Vl N V1 VI V1 Ul VI N m gN �1 21 gN 21 �� 21 �1 2 12- 1-� � 1 -� oN --2 1-1 °1 °i °1" °1°� � 1°1 °1 °1 °N °1 of °1 °h °1 °h °u °r °� R 1°1°1°�.°� °�.°� ° °g of ° v v v v v v m m v v v a v v v v v v v v v v v v w m a m m a a m m v a a a w v v v v v v v v v v v E E E E o E E E E E E'E E'E E E E E E o o -0 -0 o o o m o o -0 -0 o o m o 0 0m m mm m m m m m m mm m m m m m m m m m m m m m m m m m m m m aaaa a a a a a a'..a.'....a a: H: a a a a s a a a a a a a a a aaa a a s a a a a a a a u! J- Vs a a v w a::r u W u it a 'ae ri a Ki 'fir "�" u u u u u% u �r i„ er u a u l u a r a r a >> a a 7> a. a > i 5- s a a 1'0 m t em Rl CW ep +%I m m (0 mp y aCN r0 *6 m d{Y iEN C6 m 5§ ryl m f0 tlhA nl my IW PR m f0 d0 +!N a1i 90 PO fU m M M fly 10 M iti rD TO m M C' i cC',', a a a. *5 a 'a. a, a a a 'G'. a a a a a a a a a a a a a a a a a s ^ t ,,lOC! I `! ,,C`C1 M^^ gyp- d,'.. Imo. d^^• 6^^ F^ @,^ a.... L i— lu �.. r^ F F- .0 eC L .i H H W'•' F- N^^ C'. JC ".` .�C; .G� 01 W W 01 UJ 01 Ol OJ Ol N W W Ol N O/ O1 N O) LL w LL LL LL LL lL tl Ol m 01 N N N 01 OJ 0/ Ol QI N m W LL L ` LL W �> > >> > >, > >> > > > > 01 01 W m 01 O/ N O1 O1 W w 01 01 w O1 O1 0J O1 O1 > > > > >, > >. > > > > > > > > > > > > > > > > > } Y. > > W w W W w w W W W W W W W `1 `1 ®1 v 01 Z 11 LL.LL LL LL l;. LL lL LL LL''LL LL LL LL LL LL LL LL LL LL LL LL w LL LL".w W LL LL El rn m m vD m n o m rn v v oo o ti O N m m y v� N N m v~i n m[rCI4' v rn o v m o O N O V w CO 00 w )/1 O 111 �•1 O In # R# N O DD 0 0 0 0 0 0 0 0 w o 0 0 0 w 0 w o t7 It M N 0 A A w Vl 0 m .--� m a a R R v w w N l0 O C w N N DD O W. a A# a # a A aw rn w w R A## A R a a Wa0w .-I tll Ol 1 a0 m## a w a rl w )n W.. # O )n O O v O )ll O )n O O O O O O O O O O 0 Vl O O 111 O )nlD # )le-I O O t/'I O A # # N rM - - A # # # N Ol - I� ....', O N. - - O N - 00 O - - )ll O Vl W I� n L'N O 1, w A Ol w M I, m Vl m R a '... A� O w w m w# A# R N m m N '-I A R a r� N w V w O R# a A N N m m w �'-� v w m N� Vl w �--� w N w m m w w O w Lq m NOj a ti e-I N rr Vl r, Ol � lt .4 N N V lD Ol R l 'ce.N N f i lr '-I c-1 N m Vlf) �, N, in vT N vl A # # # VT v/ +/? VY Vf in Vl In Vf v/ vT L} v1 Vl.. of N N N N i/! 'A 'n 'n � +j),0 0 0 0 0 0 O O O O O g o o00 O O OO O O o o O o oO o o o o O o o O R R O O O O O O a A## O O O O O A A# a a O O O O O O O O O O O O O O O O O O O O O O O O O O O a a w O N o0 V V# a a R w O �'1 V1 O## A R# w O 0 0 0 0 0 0 0 N 0 W O O o 0 o o 0 w o N O 0 o 0 R R m w m V N w A R# a m iy O0 m R R R A A n N w V w w O N V w m V N 00 N w O V o0 N N w m N oo V O A A N M o0 .1 - o a A A# N V ti w O A u A R n^^ w O rl oo w M 0 I� 111 V M of M I" N w 0 111 M c-I Ol m v w 00 a '.a A a a a R R a a R R# v v oo c o a ct# a ui o .-i o A A R a A of v of rn v oo" m' oo m r� of m rn o0 00 vi of v o0 06 N' w o YF SL o N V O In V# a 3C A O M w M M# a# R# m N oo V n Ol N V 1, O1 a--1 C N CT V 01 V Ql V 01 1� n w V N 01 I� R# w O V .--� r1 m A R# a o m o w R A a a# N m m w Ol N w an N Vl m w r, N al m N w lfl .-� I, m rl m m w w a R �4 N N w 00 a a A R N N M' V) r. a a a # a �--j �.-� rj N N r-I" rl' N ry f/1 V Vl '-1 .--� N M v R a # # # a # # A A # R # , i.{A 4AA t/f -} vA A A A R 4/1� 1n W4 vn VA A A R R a V} V} V} N Vl Vf V1 1/f V} t/} th 4/1 'A N N Inif Vl VT in in V? vn 'A In N )cif vai a a )mil vai vai v�i v�i vai vai a a v�i v�i vai vai vLLi>> 7 7 vl Q Q Q Q Q Q vl vl Q 'n a vl vl vl 7 7 7 7 ul vl 7 vl �n 7 > > of v) M m } V } Vf V � �i J N Vl � �� N J N Vl ✓1 c-I VI ei N J N m VI M J J J J J J J J Vl J V1 N VI J N N J N N N N N N N J J N N N N N N N J N J N N N N N N N J N J N N N N N N N J N J N N N N r r N r N r r r r r r r N r N r r r r r r r N N )n V1 Vl V1 V1 Vl N N N Vl VI Vl Vl VI Vl to N N Vl Vl V1 N O ❑ r ❑ r ❑ ❑ ❑ ❑ ❑ ❑ ❑ r ❑ r ❑ ❑ O ❑ ❑ ❑ ❑ Vl Vl N VI V7 Vl ✓1 Vl Vl to Vl Vf Vl V1 Vl Vl '... N Vf N Vl VI VI Vl ❑ VI ❑ ❑ Vl ❑ Vl VI Vl VI Vl VI L7 Vl N VI VI VI Vf V1 V1 Vl V1 VI V1 V1 VI V1 Vl VI V1 VI Vl VI V1 V1 V1 VI Vl N Vl Vl VI '. Vf to 0. V1 N N N o_ a vl LL o- a o_ w o_ M w o_ m w vl o_ o_ a a o_ a o_ vl a vl o_ o_ a a vl n. - - a w w o_ w LL w w w w w w w a w a w w w w w w w a "-� a w w w w w w w a �'"� a w w w w w w w a Y w w w w w Y Y Y Y W Y Y Y Y Y Y Y w W Y Y Y Y Y '..Y Le w Y Y Y Y Y Y Y w W o Y Y Y o Y Y Le W Y Y Y Y o ]C Y WLn V1 O Y oC o Vl O )n O In O Y Y O )n O ll1 O )ll O Y Y O )l1 O l!1 O )l1 O Y Y O )ll O In O )l1 O Y Y O )ll O lfl M V e-1 N L l 1- �--� N N M m .--1 N )ll .-I �"� N N m m V r- N T .-I 1- N N M M V ti N Ul �--� .--I N N m M V i N Vl rl ei N N a a o_ a o_ a a o_ a a a a a a a a a a a o_ o_ o_ a o_ a a a a a ri. o_ a o_ o_ a o: a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a r r r r r r r r r r r r r r r r r r r r r r r� r r r r r r r r r r r r,r r r r r r r r a a o_ 2 a a m a a a a o_ a )n )n vl '^ vl vl vl vl )n vl vl Ln vl cn vl 0 o d o a o 0 0 0 0 0 o a o d o 0 0 0 .. o 0 0 ,'� �n 7 7 Z 7 )n )n 7 7 7 7 7 7 Z) )n )n D 7 7 D 7 > > > > > > > > � > p > > > > > > > 7 > > > > > O O O d o > o> o o O, O o O O> O> O o O o O o O> O> O o o O a d °" �" a d '' � l7 l7 l7 ill C7 l7 l7 l7 o G u 0 l9 l7 u (D to to 0 l7 0 G LL vl vl vl vl o_ o_ Ln '.. m > > >o > > > > > > > o > > > > > > > > o< o< cc cc z w w r w c[ f cc w cc oc cc z w >o >o > > o o o o o o o > > o p o o'o o o z w T >- } } > > >-ac > > >- >- >- >- >- >- } > } } > > (j C7 >-`~ >. H T N} N N N IN N N N> m} m m m m l7 U' O p l7 C7 l7 C7 l7 V' C7 O p l7 C7 'V l7 C7 l7 l7 V. l7 C7 U `u V u u u u u u V u u N u U u u u u y u u u u s z v: or ce s v aui v uvi v v w vui v w vwi uvu u uwi vvi v aj m m} } v v v v v v v> } ul )n vl Ln )n ul Ln U U U u u u U u u w u Ln U U U V U V V C C C C C C C C C C C C C C C C C C N w U V w w H w w w U U w N w w N N C C w w w w w w w C> C w v w w w v w C> C w w w w vwi w w N w > w > > > > > > > w a) w > > > > > > > w w w > > > > H V�1 V\I i�it N N N\ N N w v�i > > w w w v w w w> > w w w w w w w> > w w w w C C C C C C C C C W C C C C C C C w Y Y Y Y Y Y Y w O Y Y Y Y Y Y Y w Ln O Y Ln Y Y w w C C w w w w w w w C C w w w w w w w Y Y O In o to O lfl o Y Y o In 0 m O Ill o Y Y O ul O )ll > > w y w > > > > > > > w N w > > > > > > > d' H N Vl a -I .--I N N M M C r-I N w w> > w w w w w w w> > w w w w w w w L L L L L L L L L L L L L L L L L L L L L L L L L L L Y ]e O Y w le Y m ]e Y Y Y w Y O Y ]e Y Y ]C Ne Y u ``` u ` u U ` u i u ` u u u ` u `` u U V ` ` Ln o Y m Y O lfl o Lno m O ]C Y O Vl O )/1 O In o to )0 aJ fa ". t0 f0 a] ". to f0 m" f0 Ip f6 !0 N f0 a] aJ a] N m m a) t0 m V H N In ci c-I N N M m C N N Ln ci N N N M m V w '... w 0) w w w w w w w w w w w w w w w w w w w w w 0) w w L L ".L L L L L L L L L L L ", U ` '. U U U U ` ` U ` u ` u ` U ` ` ` ` ` ` ` ba, Ob o0 00 00 Oa �. 00 00 00 DD o0 00 00 to o0 00 Co 0G o0 00 oa o0 Od DQ bQ oa Ma1 10 a] N a) O O al C C C C C C C C C C C C C C C C C C C C C C C C C C C O w w w w O O O O O O O O O O O O O O O O O O O D O O O O O O O N N h v) N N N In o N N N N J J J J J J J J J J J J -o'w w w w O w w O O O O w w w w O 00 0o'.. oa o0 oo m m m m w w w 00'. w 00 w w 00 00 00 w 00 0 O O O 0 0 O 0 0 0 O O O O O 0 0 0 0 0 O O O O 0 0 O C C C C C C C C C C C C C C C C C C C C C C L L L L L L L L L L L L L L L L L L L L L L L L L L L J O O O J J J J O O O O O O J J JO JO J ',, J u U U u i u i i E u i u O O O O O O O O O O O O O O O O O O O. O O O O )o m a N � O )u O m )a m m )o )o . m O m O O ra )o w w w w w w w w w w w w w w w w w w w w w w w w w w w u u u u u u u " u ., t .. .. .. i. .. .. ... }. .. .� +� tf +f +tf +• +• +• +• +� .. +� +• +• +� w v w v v w w v v w v v v w v v w w v v w w � � � o `o `o o` `o o` `o `o 0 0 `o `o o` `o o`oo o `o `o `o `o `o o` `o o `o L L L L L L L L L L L L L L L L L L L L L L L L L L L '.,, ❑ ❑ ❑ ❑ '.,. ❑ ❑ ❑ ❑ '.,. ❑ ❑ ❑ ❑ '., ❑ '., ❑ ❑ ❑ ❑ ❑ ❑ '... ❑ ❑ ❑ VI '. V1 Vf V1 VI VI '... V1 Vl '. Vl Vl VI '. VI V1 V1 Vl Vl V1 V1 Vl )n Vf VI V1 N Vl Vl V1 E E E E'E E E E E E E E E E E E E E E E E E E E E E E E E E E E EE E E E E E E E E E E E E E E E 0 0 `o `o'o 0 0 o 0 0 `o o `o 0 o 0 0 0 0 `o o `o o `o 0 0 `o o 0 `o 0 o `o,o a` `o `o `o `o 0 0 o 0 0 o 0` o o `o is m m m m io m m io m m m m m m io m m m m is m m m m is m m m m l m m m j is m m m m m m m m m m m m m m m a a a aa aa a a a a a o. a s n. a a a a a a Y Y Y Y Y Y m m m m m m m m m m m m m m m m m m m m m ra m m m m m m m m', m m m m m m m m m m m m m m m m m m m C fa f0 fa f0 f0 fO f0 fa fa i 10 (a fa fa to f0 fa Ia t0 fa (a fU fp f0 N IO IG f0 (0 !a fa f0 fa fa IU f0 IO to fa fa fa fa IC 19 f0 la IO fa fa f0 `) N w W `J 2w w L L L L L L L L L L L L L L t L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L r r r r r r'r r,r,r r r r) r r r r r r r r'r r r r r r r r r r r r r w w w w w w w w w w w (u w a) w w w w a) w w a) w v w w w w w w..., w w w w w v ,a) w w w w w w w w w w w w awi awi ` L v w v` v awi " awi w` m v awi m` j m w L`� m awi awi v v l m w" awi ` I a w awi ` awi ` m v" w v i LL ll Il 11 L1.. µ, ll Il LL LL 11 11 LL LL Il LL 11 11 11 I.{. LL Il 11 LL LL ll LL 11 LL 11 LL 11 LL LL LL LL LL 11 11 LL Il 11 LL 11 LL LL LL LL 11 El N��II1DIaI1Dl� c�c I111 tea, m�O 0 o 0 0 0 O O O o o O O 0 O V O 16 O N w 0 00 o 10 r-I N - w 10 r\ r-I 01 M m Ln Of 00 n O N 0 m O O O O O 0 CIO O o V 0.11R N c0 1D O C O O N 00 m Cl to N W 7 o N n r,0 o N m m w m rn ri ci ci rl N O Vl O O vl O O O O O O N Vl VI r, N 00 c-1 C m ci Ol N m V1 1O 11Of O .-i V 111o0 N N V n O�1 N o I m m m�Owitl l�rf N N m w 00 O N G lD O c-I M 10 m O N o w W O N m .-r Ol N m m N Ln c-I 00 vl N r,V c Vq Di 16rn m 1p rn a w w w rn N r, N M c-I r l O m ei r ti N N Ali© igim 1 m WHE 00 N 1D O � OO m n N o w O m r,c N m Ln H 00 Df Ln'.n o...m .--i to Di m 16 e 00 r,n LD � m rn s N N N 0 n o 0 0 0 x o 0 0 0 0 O O 0 ii 'al0 O O o ds. p 0 0 0 o O O 0 O 0 O p 0 0 0 000oao000000oaao000 00o O o00000000000 000000 0 0 0 0 O a u vi 16 n N V O lD N 00 O N V V VJ o0 O N V <D N W NNO O O O o w In V c-I lN w m Of Vf C' N e-I 00 lD m N w a O 1D � 3 n0101000 t` n 0J l0 Vl Of N 00 n 0] In C rn N N O0 ul V M N$ 00 M 00 n O G 00 r-I y# N O 01 r N m a V1 l6 n V7 c-I 00 M u5 n Ol '-I M ttl 00 N Of Ol Ol 0 u N N m N w 't r-I N Si u n m O o0 N 1p O c W c-1 lD V N O Ol n lf1 rl N O YC N 10 Of N W V '-I n A 7L N m V lD O M n O M t\ - 10 00 m 0 N V O N w O Vf�tA 'VT aA to V} Vf�V?V} VT to In. Vf Vf N to VT VTc-1 '-I e-I N N N N M a to to 4n VT,,', i/T ih N dVS *J'k. 44k to Vf lA 1A VT i/} i/} i/} [Ab to iA LT Vf a¢ a Q ¢ a¢ a'a a¢ Q a¢ ¢...¢ a¢ a ¢..a a a a d a s a a d a .---- a a d d a a a a a a a a a a o_ a o_ a a a a a D. o_ rz a s N h Q In ¢ V1 N h N In V1 ¢ In ¢ 1%7 In '...� Vf In S D C d In In rn o M In In m d h M In In to In rn d 7 7 7 �f 7 of 7 7 7 7 7 7 7 Ln 7 rn 7 7 7 7 7 7 7 v1 7 rn 7 7 7 7 7 7 7 �f 7 In 7 7 7 7 7 7 7 In } } } 7 } 7 m m M Y '.,> zr V V} } o Vl VI N M Ln M> N N N N N N N} J too Vf '-I J r-I No N M N N N J N J N N rV N N N N J J N N N N N N N N J N N N N N N N J N J N N N N N N N J o N V1 N N vl V1 Vf vl N V1 ✓1 N N N VI to N V1 vl N V1 N N N V1 N N h V1 N V1 .., N o N rq N V1 to V1 V1 V1 N N N N vl V1 to V1 V1 to V1 V1 Vf to to 1%1 V1 N V1 to N vl to N to Vf N ✓1 rn V1 to V1 to ro m V1 m to ', o N N V1 V1 N L d Vf VI V1 V1 V1 V1 N d V1 N N N '., m V1 N e d V1 N o to N o o 'A d N ✓1 to Vf to N N N a a a J n a D_ m m a a n w'w w a W a w w w..w w w w w'w w w.w.a ''-' a w w w.w w w w '+' a LL a a s w w m Y Y Y W Y w Y Y Y Y Y Y Y w Y w Y Y Y Y Y Y Y W Y w Y Y Y Y Y Y Y W Y w Y Y Y Y Y Y Y W O o O Y Y O VI I O V1 O m O Y m Y O rn O In O In O Y Y o u'f O M O M O Y Y O V1 O Vl O V1 O Y m M V '-1 N 1f1 .� '-I N N m M c-I N VI r-I rl N N m .--1 c-I a a'a a a a a a a a a a a a o_ a o_ d a a a a d d d o_ a a a a d a d d a a a d a a a a a a a¢¢ a a a a a¢ a a a s a a a a a a a a a a a a a¢ a a a a a a a a a a a a a a a a a -< A- J- < ;- H F H F- H m, .'. F- H. H H H H H r- H f- F- H A- H H F- r- H H - N H ti N N F- r, 0) 00tDo 00 ID 0 r, wIm ��lf� 0° 0 0 0 0 0 o O a° a o 0 0 0 0 o O a 3 a o 0 0 a` a a`....o` a a a a` a`. a...a a`.o` a a..a- a N Ln VI Vl N V1 V1 V1'V1 N V1 N m o o o V1 d N LL V1 N V1 V1 ✓1 N Vl d V1 LL M N V1 V1 N VI VI d V1 d vl V o 7 7 7 7 7 7 7 .1 7 7 7 7 7 7 7 an 7 of 7 7 7 > > 7 7 7 7 7 7 7 Z) > rn 7 of > >,.. > 7 O ' > > > > > > > > 7 0 7 > > > > > > > 7 > 7 > > > > > > > 7 > 7 > > > > > > > 7 > 7 > > > O O O > > O O O O O O O > > O D O O O O o > O > O o o O O o O > O > O O o O o o O > O > O o 0 l7 l7 l7 Vo U` 1. 1. 1. V' C7 l7 l7 V' ''., 17 V' l7 U' U' 17 � l7 0 V' 0 (D V' C7 U` U' U' V' l7 U' V' l7 V` U' l7 (D CC K 2' OC C 2' C C 2 C �' K C CC K K ' C Q' K IL , C ac K K } } } K K } y } } } } , } (r ' } } } } } } } } } Y ' } } } } } C } } ', } } } } } } } Y } m m M Y } c} V Y } to 1n In M N In In } } N c-I i--� cy `y iy �--� } N Y N N N N N N N} m} m m M 0.d B.Y u u u Ld u hi nJ S%' V U W✓ 4A NJ `� �""� A.9 4d a M.Y N ry I w w U U u 0.3 m U m 4.Y �1,1 4.N ' �aa ra wo 11.1 w a, Oa ar raa v N av N w c w c c c '0 c c w" c c e c c c' c e c g o a 0 c- r c c w w w C C OF w w> w F3w w C> C, w w w of 0a 4! 31 w C w ✓Jd w w w w C° C OD 05 w Ow w w w C ^� C w w w w > > w w w 7^ > > > > > > w w. > ,> > :� > > > w �oy > > > �+ > > > w > w > '> > > > > > > &! > > ',> w w w> Y w E w w w w n w> w w w w> > mu w w w w >"> a w w w w w w w,w w Y Y Y 0} Y Y Y Y Y Y Y w Y w' Y Y Y Y Y Y Y w Y "w w Y Y Y ]G Y Y Y Y Y Y Y Y Y Y e Y O vl O Y Y O v1 O 1/1 O In O Y Y O Vl O V1 O V1 O Y v! Y O In O vl O V1 O Y u? Y O o O m O o O Y u? Y O V1 O M m N N m m a H N o e-I .ti N N m m 7 H rV Ln N N m m V .--I N V1 e-I .-I ry N M M V H N to 5 m N L L L L L L L L L L L L L L L L L L L L L L L u L L L L L L L L L u L L L L L A U ` U U U U u U ` ` ` ` ` U ` u U ` U u U U u U ` ` U U ` U U U U ` f0 www w w w w w w w w.w w w w w w w V10 N o VI N V1 V1 V1 N o o N N o o o o '... o '... o o o VI N m o .a o O p J J .-00 -2 0 a Jo Jo o o o 2Cr '. 'o ✓ Ks o 0 0 0 O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O L L L L-c L L L L L L L L L L L L L L L L L ''L L L-c L L L L L L L L L ',L 'L L -cL L L-c L L L L L L r0u u u U U u u U u U E U i U U U ` i U U U u u u u U w ''. r0 fO r0 r0 t0 r0 ro N N M. f0 f0 t0 fO rO f0 r0 f0 tO fO (0 r0 r0 f0 rO r0 f0 r0 t0 r0 t0 N r0 f0 r0 rO r0 r0 r0 f0 r0 rO r0 tO rO f0 f0 <n to V1 <n to V1 N V1 vl N <n N VI V1 V1 V1 V1 to N V1 V1 N VI V1 VI V1 V1 v1 VI V1 V1 vl N V1 VI vI N N V1 V1 V1 v1 V1 to V1 N V1 vl In .. .. .. .f a+ t+ a+ t-+ .. .. ... .. .. ,. t. .. ..+ .. ,. .. .. ,. .. t O O O O O O O O 0 O O O O O O O O O O O O O O O O O O LO O O O O L L L L V1 V1 Vf N V1. ✓f '., to V1 Vf V1 Vf Vf N Vf o Vf Vf N V1 vl N V1 Vf N V1 vl, N H Vf N N to Vf V1 N of Vf V1 Vf N 0 '.... Vf Vf o to Vf N Vf Vf E E E E E E E E E E E E E E E E E E E,E E E E E E E E E,E E E E E EE E E E E E EE'E E E E E E E `o 0 0 `o `o 0 0 �`o `o o` w o `o `o 0 0 �o o `o "o o `o `o o `o `o o `o o` `0 0 `o 0 0. o o`.. o oo o `o w o o —o 0 0 `o 0 m m m mm m m m m m m m a E E d E E E E E E E ''E a E E E E E E E E E E a d d m m ra ro m rO m an uO av ro wO rO ra eO rci m mra c c c c c o c c 0 c. c c C c C C ca a a a a a¢¢ a a a a a¢¢¢ a a mmmm -carommmmmm mmmmm w w w aw w v v p w- L L .c L L ,C LLUSE) W LL�wjr!]T2�Z..1I � W P LL R LL � IN LLII w P LLIWII WI WI MILLI A= h:: I1.lI LLI1h:: c c c wpm c a rn r c c c m c c c c c c� C C C C C C C [� � C C. C �.� C C C C C C m w w v w w v v w ar aww s� � v ar°i m y ar°i v vN v� a) w w w1 vl v w w vl vfl LLI,,LLI LLILLf..WI.wN wb LLT LLI Wa Wj W�WuW El O LD 00 ''... Ol LIl O I� N 01 01 V to Vl VT 0 0 0 0 O co V O. m N a -I M .� .i M tD Vl..''...N N .--I lD lD 01 lDO VT 0 0 tD I, ',. O W ti I, V) m N lD Ol 4A 0 0 V V al m N 00 Vl 0 N N 01 V? 0 0 O tD O 0) o V1 m m w N lD V} 0 0 C N 00 M tD rn e-1 V? tD lf1 a-1 M M VT 0 0 m m't m lD M tD .--I V}''.,V/ lD n M 111 m V1 0 o w tD 1� N � N V lD O 00 to 0) Ln m m Vl 0 0 N n V `-I Ol o V' V) N N I� O c-I tD V n V Vl 0l0 0 m Ol N U) In v to VT O V V T tD N M. al Ln V} 0 O N '-1 m '1 oo tD VT 00 N lD .'-! cn -I .-I n VI 0 0 R V Ol N 00 " 00 V} tD e-I m tD to O M 00 V} ola o m# w$ n$ lD R 01 V} V O r1 N N m m in a '.. :w :m It Vl r� N Vl tD w r rl In o o to N m tD m '-I Vk o tD 111 c-1 M m V N V? 0 0 O oo V O � e-1 V1 �/1 a m I� Ol I, '-1 V) 0 o m m Ln V O N VT 0 N .-i M to w Ol N VT 0 0 O LD Vl 01 O v M VIV}''N.. 0 m I� 7 01 V V V VU 0 0 O V M V a-1 .� to 0 C V m tD N m cn to Vf 0 0 O N .--� Ol .--I oD W O O m al 1� Vl ''. N -zt n VT 0 o O O� 01 rr N to 00 V>• O w .--1 lfl Ol oo m m 00 Vn a '., k x ;m $ g = 3L u is a � a x h A u u� u ZZ :m Y{ � u R Yk R R a',O u $ :ft ax ''ft �--� O N O m V} o M N to ul Vl M 1D M N c-I '.. r .4 o 0 m a m V1 'n O N N n N to Vl 0 0 O w O tD VY 01 '., O V V V tD N- 0 0 n o V 1-Z 11 O r� to m w Ol Vl 0 o O e-I .--I e4 .ti N m al O M m c4 .--I Vl.. 0 O V to N (Y1 .� Vl M Ol N Ol w m' .--� V) 0 O m m '... 1� L6 e-I V1 Dl lD e-1 Cn r tD . -� 'A 0 o 1, m m 00 c-I A to V O Il ."� Gl .-� n 0 0 m en O N N 'n V M m O m '-I N V} 0 0 N oo .� Vl N V).....N o .--I I� a w a N V1 0 0 o m M 00 N lD m to 00 m n N in 0 0 w C\ .'-I m '.V) ry m V N -! O m V)'...tA 0 0 m N 1p -i m f) m M m tD 00 N m 0 0 V r, n n M VT 1- c-I O lD tf1 T N 0 0 e-I N Ol O m O -m W M V1 0 0 m w O V Dl m 1, O .--� V '. V) 0 0 I� .--I N 1-: to i� .-i m tY1 V Vl 0 0 m t0 T o N O. N lD 01 V1 0 0 w V O e4 lD -� to T O .y 1A 0 0 m m m .4 O V V V N o .-� Vl 0 0 O N '-I N CO .--I m 00 m N .'-� V} 0 0 R e-I 00 V O � rn T Oi .--� V},. 0 0 O N N N tD al W O M N VI 0 0 m O m tD tD m 00 M I, N in, 0 0 m 1� V c-I d ai a a s D_ ''.. 1 [. CL O_ C. CL a Qi a a Q O_ D_ a [. d O_CL a a s a a N a a a N a N a N a N a N a N a N a N a N a N a N d N a N a N d N a a N a a a N d N a N a N a a M N a m a N a a Vl a a N d !n d N a to a to s m d !n a m N ❑ a' a a N s to to N to Vl to N a N H a H a F- a N a H H H H H H H F H H H N,.a ''> > } } > j > �..'.,� ❑ } ❑ > } > } > > > > > Y > } > Y ❑ ❑ ❑'.> T > Y > > Y > Y ❑ } a } a } Y > Y } > > } } > > > > > } N > N Y N > N Y N m m m r T Y a r a C V 7 V C > to to > vl Ln Ln ul to Ln 1f1 to ti ❑ m ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ '. ❑ m❑ N ❑ m ry ❑ ❑ m ❑ m ❑ co ❑ m N N N N J J N J N J N J N N N -N N J N J J N J N N N J N N N J❑ N m Vl ❑ 0 m m N m m m m m Vl m � m m m m � CD V) m h� m N m d m Vl tX N Vl to VI Ln VI N N N N N tolA a N a a a a to a a d to a to a to a a E a E a a a VI w to o d a d a V1 �n Vl �n N N N m m d w Y a W W W w W W W w W W W w w w N d a Vl d N a Vl to a Vl to a to a N a to a m '.. a m d Vf a h a N to a D- d to a Vf a to a to a to a w Y Le Y 0 o Y lfl O 0 Y to Y O Ln Y O ]C 117 Y O Y ul Y O Y U1 Y O Y Vl o O le Y w Y Y O Y to Y O Y to w w Y Y w Y w Y a W w Y a W w Y w Y w Y w Y w Y w Y w Y a W w Y a W w Y W Y w Y w %L W Y w Y w Y `y N V1 a -I N N m m T a t/1 N D_ tD O_ t0 o_ I� o_ r m 1 c-I 0_ N 0_ to a e-1 m ei 0_ N o_ N to O '', N. O ]G M Y O to O m O M ul M O o Y .'-I N Y lfl o .-1 m '-I o N to N O m m m O a 0_ Q a Q C a o_ Q C_ a S a D_ a a a a a a a m a CL a a a a a m a a a a a a a a 0_ a C D_ a a H F D_ a H a a F 0_ a F CL Q H 0_ a H 0_ a H D_ a N d a �� C a O__ a H 0_ Q ,� a a �IH 0_ a¢ O_ H m a H 1 a H d a H O_ a H D_ a H 0_ a H a a H a a F- L ❑❑ a C 7�� O_ D_ O_ ❑ O_ 7 D_ �. D_ 7 C 7 d 7� a O_ 7 7�m �❑❑❑❑ 7❑❑ 7 a: a: a 2 a2 a a..d a a a a,,',. O O O O a .� d O O O O O O O a O a O o O O 0 0 O . a a a a O '� a O '- L d ',. a CL L L [L 'Oo a O 'i d . N m V1 V1 a to d VI Ln to N N N m a to d N m to 7 ❑ > > > 7 > > j j > > j a ❑ > to ❑ > ❑ > 7,D > > ❑ > ❑ > 7,a > o a O O O O O o O O O O O O O O O a O a O O O o O 0 o C7 0 l7 0 l7 > > o > O l7 O l7 O 'l7 O l7 O C7 O C7 O C7 > O > O l7 O l7 O l7 O ''.... 17 O C7 O l7 O C7 O d m a a a` a` a a a` a a a a` a a a a` a a a to m in_= m in =mmm =mmm = m m in= m in K K s}} K [C K r m r '... m r K r 2 r m Ln} ' K d' } K r}}} K '... K d' C r K r m d a O m a d a a a a a a a a a a a a a a a0 a- ° a0 a a a a m m m m> } v v v v v v v r u m N M ul m N LnO o 0 O O O O O O O O O O o O O O O O o O u u u U a' a u u m u w u m u a, u w u u m m u °1 m u u m u w u''U m w u w u m u w E E E E E E E E E E E E E E E E E E E E E NC N C E 7 7 C 7 C_ 7 C 7 C 7 C 7 C 7 C 7 C 7 C 7 C 7 C 7 C 7 C 7 C 7 C E 7 C E 7 7 C 7 C 7 C 7 C C N C y C N C C 7 C m C C m C' C C w w w C w C...� C.w C C w w C w C w C w C w C j C C w w C w w C w C w.w C m a mmm a =_ m m m a m m a m== a m a in"m a d a m a m d m a m a > > > > w >> w> w > ai >> ai..... w > w > w > w> w w w > > w > w > w > w > w >> w w a a a a a a a a a a a a Y Y m O Y Ln Y O w Y� Y w Y Y O Y to Y O Y m Y O Y M Y o w Y w Y Y O Y M Y O Y to Y O Y ul Y O > >' >}}} CC y}}} D: K m r}}}}} K K m K" K ' } N ' K K r K r OC r w r N M L L m L L L L L L L N L N L m L m L t L r-I L N L U Vl L . -I "', L e-I L N L N L m L m L L L } .ti . -I U w } •'"� U .i U e-I U c-I U w e-I U w e-I u w .-I u w r1 U r-I U w e-I U w .--I u N a-1 u w .'-� U w .-I U w e-I u w a -I ''. U N Y N U U N N U N u w N U w N U w N U w ` N N N vwi w w w w w w w w w w w w w w w w w w w '... w w w V1 w to w N C N C C C C C '\�' C N C C C C m m w V1 w In w m mN !n 00 to w V1 to to m to t, m E0 Ln 0o V1 00 to to N m M m to 00 m 00 V1 w1 N W m m �., tw bd H C C C w C w C w C w C w C w C w C w C w C w w w w w w C w > C w w w w C C O O C o C O C O C O C O C O C O C o C O C o C O C O C O C O C O C O C O C O C O C O C O C O > > > w w w w w w w w w w w w w w w > > w w w w J J J J J J J J J J J w Y w Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y w Y w Y Y Y Y O O O O O O O O O O O O O O O O O O O O O O O O Y ie O m O to O Ln o m O N o to O Ln O ''... Y m Y 0 to o Vl L L L L L L L L L L L L L L L L L L L L L L L L ci N to :- .�-I N ''... N m m V a u to u m u tD u tD u r� u n u m u rl u N u In u u u N +-' N u u i EE " u i i` u` i` u u `m " ` " i u w u w u u u u u u u u m m m m m w m w w m w m w m w w m w m w m w m w w w m w m w m w m w m w m w m w w w v w w w w w w v w w v v w w w....v v w w w v w w In Vl Ln m I to V q '... V to M V L m N to to to N to to '.. N to to ❑ ❑ ❑ ❑ ❑ ❑ '.,,. ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ In ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ `o r" t''', "" C"" `o '' """ t "" w w w w w w w w w w w w w w w w w w w w w w w w w o L L o L o L o L o L o L O L o L o L o L o L o L o L o L o L L o L o L o L o L o L o L o L m fC (0 m f0 ID ''. 10 m f0 IO IO f0 IO IO t0 m m fC IO m f0 f0 10 IO m m to to to to m m N to M In In N m to In In to N to N N Vf Ln m m m m CO '... m in m m m m m m m m m m m 0] m m m m m m O 0 .. 0 0 0 ,o O O O O o O O O w o w O O O o O o 0 o 0 O O O ,. o 0 0 ,o O O o 0 o O O o O O o O O O O O m a'm ammm�mmMmmmmmmm ammmmmmm.m..mmm�ammmmmmmmmmmmmmm a s aaaa a a a a a a a a a: -E a a a a a a a a a a a a as a a a a a a a a a a a a a',a ¢ a a a a 2, 21m mmmm m m m m m m m m m m m m mmm m mmmm m m m m m m m m m m m m C m C m C m C m C m C m C m'm C C mil C m C m C m C C C a s C a C a C a C a C a C a C a C a¢¢ C C C a C a C a C a C a C a C a C a C a C a C a C a C a C a C a C a C a C a C a C a C a C a C a C a a a a a a a a a a a a a a mmmmm,mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmlmmm� w w v v w a v m�a,1 w m v w v w a v v w w a v w w a v w w v w w w w w w a v.w w w v v w wv v w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w v w v w v w w v w w m w w v w v v v a v v v w v v v w w w w w w w w w a w w v v w v w w w v w w w w •- - LL LL •- LL •- LL .- LL.LL •- - LL .- LL '_ LL Z LL '- LL - LL LL.,LL = '- Iw •- LL •- LL .- ll.. .- LL LL Z '- LE, LL M '- LL — LL •- LL LL E .- LL — LL LL - LL IL '�.M LL. W 11 "LL t.L 11 tl 11 LL T lL LL LL LL LL LL LL El to O ti' .-i of w N Oo ri O o l0 �o r`i O ry oo o ,-i O O �:........ ni o m c'i aq ni o N ao tO mry rri .-i lD rri ao rri eo rci In O o Sri o O ao lD M W N n N N O ko N M cr N N M Ol 0) n 0l 'i N V 111 n m O N m Rn N O m n t0 N n N oo m m Ol Ill O tD 'i n N n m M m N n N t` N lD rl r. V m m M cl Rll O N I!1 n Ol '1 m m W O'.. N R N r- O n lD e-I n n m lD Ill m V -* F M m N O 00 N MCIS M Or V O kLfiD '-I l0 00 00_4 lf7 Iil Om 00 C '-I M N IA M N O w w M H M O '-I Ill ''.. 00 l0 R Ill lD r,00 cr O '-1 N ('Rl V Lr , Vl T T M lD 1p r n 00 m .� '-I '-1 .-I N m V Ct Ln lD n m Ol In O N m '-I N ''.. N N m T Vl w N m m O N m t m w N N N 1/T 1R iR VT VT'A- Vi In iR Vf to 1/T N LT to N Vf tA'l i/f VT 494 aAti, i/f to V) h Vf LT VT N i/l. L? ih i/f N VT.th N VT N V'M w.lk oo a 0 0 �4 o m o 0l0 0 0 0 0 0 0 0 0 0 0 l0'0 0 0 0 0 0 0 010 0 0 0 0 0 0 0 0 0 0 0 0 010'0 0 0 0 0 o o c'a o o o'...o 0 0 0 0 0 0 0 0 0 o arcs o 0 010 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 V O 0l N. 0 ci O N Cr .--I N 4D O "<E,E` 00 4^'.I'. M n .--I In N tD O m O lD lD m O m O N 16 V lD 00 O m In n n lD AD VI 41%' f V PdY' m M lD 7 m N M m H ''. W O ". 0) M t"+. N O O N al 01 M d' N V H IA V V N N 'i O Ol m n lD lD .-I V r`C Cr 4D 0 J"+4 1i4 00 m-4 a n V7 m '-I N m r N lD 'i ury 01 'K$ 00 m n N lD O O n N lD C O Ql m '-I (` M Ol N O lD N m lD n n a O M1$1' N 0'i' 4Fl '-I q(7 R O lD h m N M m N\ w w Ln V 10 fw �. N N '-I '-1 N 0l V 01 V IRl N 0 00 0 0'l Vl 00 _ m 1p 00 cis r M M V m kn w w rl m 00 0l o 'i r% 0 N M M a M W �M1 00 Ol O N M 'Y N N N N N V Ill ID n m O '-I N M M lD n '., m O N N I v>• 'wrr .n �^a 'wa.. I. v>. ,n in +n ,n in 'urw v°R.n 'vs,n v>• '4rR ,n an. an I vu ,n .n''......n an v>• an. � an ,n v>•. v>• .n {n ,.n. erg 'wa ar4 I r� I vl � .n .n a. a a. a a a a a N N N N N N N N N N N a N a N ryry N N N N N N N N N N N N N a N a N N N N N N N N N N N N N N N a N I-- H N F- a r>rra�'arr „ y c v v ❑u6dd�acs000o ^�I"?666 3❑oddo6666d�"❑❑❑d❑d❑od❑c�'�ourad m m m m a? m m m m m❑ ❑ m i��mM m K'ir m m m m m m m m m m m❑ tj m m m m m m m m m m m QYY m t47 m o m N V1 '.. VI Vl Vl V/ LA Vl N (A N m m Vl ✓P I � 'I.%1' Vl Vl ✓I Vl Vl Ul LA VI N N ' VI m C%3 '. m Vl ' Vl VI Vl M ' Vl Vl Vl N VI 4✓"'l WY Vl L✓7 an m a yy,. ' a a a a a a a a a D- w w a a a a a a a a a a IA D` I A a a a a a a a a a a a a a M a In w w w w w w 4�.a 4.4.e w w w w a ?x0 a w paw Aw w w w w w w w w w w W a a w w w w w w w w w w w w w w w a Y 5✓ Y Y Y " ".w� Y Y Y Y w Y w Y W V. le." Y Y Y Y Y Y Y Y Y' Y Y w Y W Y Y Y Y Ne Y Y ]e Ne Y to Y Y O N O ul O 0.AY tll O Vl O Y Y O I.I'l O Gx5 0 0 0 N O m O Vl O In O Y Y O 0 O N O m O N O Ln qO� 1Aa O Ln O ]G M M a N 4J"Y lD n n m 'i N 1n '-I hH N r`l T m� V m m O ID n n 00 r 4 N Ill 'i 'i N N M m IA m M1A AD n f� W c-I S".tl a a a a a q a a a a d a a d (L a a M 'aaa a a d a d a a a 0. t� i a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a ala a 's O_ a s wa nl_aa ti.a a a a a a '... a a 0- a Ci.. d. d a a a a a a a a a a Ca, py. a a a E E a a E a E a J a7 a'E a a a a a a a E'a a a E a J a =" a a E E a E 0 0 0 0 0'0 0 0 0 0 o a o a o o o o o o o o 0 o''o 0 0 00 a o a 0 0 0 0 0 0 0 0 0 0 0 0 0' 0 o a o d a` a a` Ala a s a` a'a a a`'a.a a` a s Ni...i a a,....o a` a`,....a a`...d a a`....'a` 0 a......... a a a m m '... m m '-- m m m '.. m m m m m .. a a a a a a E a a a a- a '0 aaa a E a a aE a H: a: a: a E 1O a fO a a a a E..Fa E.E.......am a E a a a a o'0 0 0 0 0 0 0 0 o o a$ a o 0 0 0 0 0 0 0 0 0 0 0 0 0 o E o a o 0 0 0 0'o o o o 0 0 0 0 0 o a 0 E E E E E E E E E E E o E o E E E E E E E E E E E E E E E o E o E E E E E E E E E E E E E E E o C C C C C C C C C C C C C C C 7 7 C C C C C C C C C C C C C C C 7 1 C f0 •f0 (O N _ N f0 IC f0 t0 19 C C fp (p IO IO f0 f0 (O 2 N . . M f0 IO f0 C (0 f0 IO 'IO •f0 .(O 'fO •fp .� .N -2 -2 •f0 .19 'f0 f0 y 10 �'I',a a a a a'.a a...a a s a'a a s a'.a m a a a a a a a a -2 -2 a a'..a a a....... m a > z rr z �'''.w.....cc z z m...,cc.s z N ry N N N N N ry N N ry > m m m m m m m m m m m m m In m> > a a a v v a v v v v a s v v v> U lY U U W V' LLk t.R U m' u M U reJ U U &Y. to Y,.F U A U U U U U V U 4.N UU U U U. N� U e.,Y 4„A M1J 4J' fiS i�U 4 Wdo 5S5! -5 C ,hN u8RY ' ah� *W�w. .. C +LI 4id Ol 4Y4 01 OR 01 l4Y OF CU N Aw C 0d GI' W fl} N 4U 0J 4l' L 0J ql 1Gtl tlJ . . C . C C C' C C C C C C C C C C C C ilCY > C 0J 0R CI' 0A kM 0/ CV �P 4Y 4ll v 0Y FU 1A 0Y C 7 > > > > > > ? ? :"�' > of 0] '} .+ > ? > > `� > > > :+'. %' 1!d 0>J pk > > > ,> ..�" > ? > ?^ > > 9d N �F N UA Ol W 4yJ 1G W ? > Rtl aSA oR oY ql N 4A Rk pJ It4 W 'AJ oR 0 e > '^� d! '+� P8! YU 11p qti ql C8 dr of W 01 ti1R 9,Y G' Y Y Y Y Y Y Y Y Y Y Y 01. Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y 40 Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y O l!1 O Ifl O I1'1 O IllO ,m O Y''� Y'O V7 O VI O Vl'O V7 O Ill 'O Vl O'�u10 Y m Y O m O lit O Ifl O N O Vl O 111.0 I11.0 Y,,, lfl M M V V Vl Ill l0 tD n n m 'i N Vl c-1 '-I N N m T V N M SD l0 n '., n m .-i N N '-I 'i N N m m V V m Ill lD lD n n m '-I N V u U N U U u u t u u u u u t u u u u u u Y u u U u U u V u y u U u u U V t t t t t Y 01 01 0! N 01 Ol 01 O1 W 01 01 w w01 w w0J 01 0/ N OJ O/ N N 01 71 01 0A 01 0) 0! N O) N 01 0J OA iil ..,. Ol ''... N N Ol 01 N N 0R W 0U1 O1 O1 U1 UA O1 UA OR Ul Gl N U1 O/ O1 Ul O1 N N N O/ O/ U1 0A U/ N O1 Ul U1 O/ N N 0A U/ U1 U1 N U1 OJ RlA N OJ UR N O/ UJ U/ N tld Ol N 01 N O/ 01 0A 0) 01 O1 01 01 N 01 0R 01 0/ 0R 01 of 01 N N 01 Ol N 01 01 0J N 0/ 01 01 W 0R 0R 0R W W. N W O/ Ow 01 Ol O/ 0R W N Ow m m '..., m m m '..., m m m is m m m m m m m m Nv m m m m m m m m m m m m m m m m m m m m ro m m m m m m m m m m M m m m m m m m m m m m co m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m E E E E E E'E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E o` `o 0 0 `o 0 0 `o 0 0` o 2 `o `o `o o `o `o o `o o `o `o o ``o0`o```````` m' is m m m is m m m m m iv' m m is m m is m ..... m m is m '.. m m m m .... m m m.' m m, m m m m m ... m M m m m m m m '..... m m m a a E E a E EE'.a a E a H: a: E a a a E a a a a alE E a E E aia E a.a'.a *^ +n wro wr r.m . Um we ay I 15- w . A a µ sR ur r a ea u as w waa U a"P"r 4r: r�R + ner is .A W.a x.:i v L u Io M! JAR M fO M M awl ry +0 d0 4W wtd J0 N f0 N i0 Jo JCl J0 ep 'RV PO J0 JAR M J0 M M +'0 V Ji 70 J0 RY a Jm A M N M i M MI r0 M MMp C C C C C C C C C C C C C C C C C C C C C C C C C C C C c C C C C C C. C C G C C C C C C C C C a a a a a a a a a a a¢ a a a a s¢ a a a a a ala a a a �e a a a a a a, a a' a a< a'a a a a a a m Er aN v a m v m ar a ur mr �w w v v v aR a w w w aw a w s 'IV w w w w w a, A R E '2 `1 `! TM `1 `1 2 cis aR' 4-^ 1-^ b H H H 5^^ NW P-- h^ F H F-- k-- p... h^^ P•- }..° R^- M^- F- M' ♦- F- F- F-• I'.... k^_ @^^ N-- .0 L. L. L EHL ..", vlIV IVI"I"I�I"l"luI"I"I�I �I vh�vlM vH El O O 00 V a DD N O VOl Ol m ' -I Ol n W m n to Ol Ol N to a0 m0q N 00 N V N 00 00 V O to N Oo o� O to M Ol N M T Ln to n Ol O O c-I T V Ifl lD 00 lD lD Ol Vl 11 n O M Vl W O O M lD 00 • lD lD O M 1, Ol I, Vl V w Ol c-I M Vl I, O M Ifl r 01 e-I M Ln Ol R ci w N w M I� .-i V1 o w O V w to N N m tD 1f1 Ln V T N N .ti O O m w .-i r1 w O N O tD .-I to c-I I, N n N n M w to m M I, o c-I c-I N N T M V V ul Vl V1 M N T tD ''....--1 00 Vl N OI l0 ''.., M O I, '.. M O o tD 1, O t r� c-1 d' 00 '-I Vl e0 N to al N tD N O M V ri a0 Vl N OI w T O I- C ' w N oo I, 00 ''... N lfl O T tD O V 00 Ln M O N t+l O - c-I c N N N T M T c v � V1 Vl O V n. N N M a V Vl t0 r': r, w Ol N M V M tD 00 Ql O '.. N M to w n Ol O N T V Vl w w Ol o .1 N M V Vl w N N N V LD w O N d' w w O N C w In. N VT L1 lj1 V1 lf1 V},N H V} to N, Vf Vf iA V?'...N iA N N N in N Vl, 'n N N 0 0 0 0 0 0 0 o. o 0 0 0 o o 0 o 0 o 0 o o o 0 a o o o o o o o 0 0 0 0 o 0 o o o o o'o 0 o o o o o o o' 0 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O V1 O O m lf1 Vl O O O O O Vl to V1 to N r• -, co* I� n tD N't M N N .--I O m a0 I� to V ID N tD C a N o w to V 1* N O co o M m I, Ol M rl H o Ol M 1� o a w N M .--� M Ol Ol Ol Ol M M Ol m Ol M M 00 oo Co Co tD N <D M M al Ol al 00 a0 oo Co Co Co I' M O V7 N to V e-I al l0 M .••1 W 1p M O 00 lD. a0 n n ID M C M N H O Ol 00 I� lD Vl V M N lD V w M Ol I- Vl T .-i al n Vl M O rl Vl t0 o0 V o ttl H n M o0 r o t0 e-I H m VI co to n m .--I m VI Il co O N V tD C6 O M rz r-I r� e-I o w N '. t0 O V rl, H Vf al M Pn to tD rl Ol H N V Vl n a0 O N M to a-1 'i H N M V Vl I- a0 '... Ol O N M V Vl to I, Ol N N M '... V n Ol H V tD Ol H M tD w O H H N N N N . r '-I " H H H .--I H. " H N N N N m V} V? VT.VY...,N iA lA 1/T 4/T VT N iR N In ih V/ N fA 4 N ih VT i/T VT iA 'f i M 'nU} i/T N VT. 1n d a a d'd d d d d a d d d d a a d m � N o d N N N N N N N N N N N N N N N a N d N N N N H H H F H H H H H F- F H H H F-- NH H H H H H F-- H H H H H H H F- N d N H H H H m H H H Ndaddaadddddada r a d d a s d d a d d d d a d d � H d d a d d d d d d a d > r i>> r> r r r r'> r> r a N d r r> r r>> r r> r> > to Ln vl to to ul Lq ul vl T to to .V � Y ? .y .ti ." � .y e-I e-I � •y �.-� •--� •y c-I e-I e-I ri } } N N N N N N N N N N N N O O O O O O O O O O 0 O O e-I `� to Vl to to VI Vl Vl to VI Vt to Vl Vl Vl N Vl N ul V1 to Vl to to Vf to V1 Vl ul to Cl m C0 m C? m m m m m 9 ? m m m m ul to to Vl Vl In Ln V1 Vl Vl V1 Vl Vl VI to VI Vf Vl Vl � V) VI Vl Lp V1 Vl VI Vl Vl to Vl Vl to m V1 VI V) VI to VI V) VI V1 o Vl LA L1 A LI d Vl to VI V) Ln Vl V1 to N ''... V1 V1 V1 Ln N V1 Lo ul VI VI V1 V) VI VI N V) V) V1 Vl V) vl a a d a a a a a.a a s a..a a s en a a a a a a a a as a a a a a''... vl w an a a''...d a a a a a a a a a d w w w w w w w w w w w w w w W a w a W W ". W w w w w W W w w w w w W a a w w w w w w w w w W w w Y'..Y Y Y Y Y Y Y Y Y Y Y Y Y w Y uJ o Y o Y Y Y Y 7 Y Y Y Y Y O to O t/1 O Vl O Vl O O Vl o ut O Y� ]e o to o T O ul O O to O m o to O Y N Y O Vl O ul O N O V) O N O �/1 Vl H ci N N M M Gf a Vl Vl tp to I� n 0o a -I N VI H .� N N M M V V Vl Vl tD tD I� n 00 c-I N to a -I '- fV N T M V T Vl lD LD d d a a a d CL a o_ a d d d a a a a a a a a cL d d CL a a- a a a a d d a d CL a s o_ d d a o_ d a a d a a a a a aaa aaaa aaaaa a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a d d a d d d CL d d d a d d d d d d d d d d m d 1 d d 1 d d a a a d d a a d d CL d d CL 1 a d d o- d C 7 .7 . 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7, .7) 1 7 7 7 7 7 7 7. 7 7 7 7 7 '. ¢ a a a a a a a a a a a a a a a a a a a a a a a a a¢ a a a a a a a a a a a a a a a a o d a o o ,o o ,o ,o .o 0 0 0 0 0 0 .o 0 0 0 0 0 C 0 0 .o .o 0 0 0 0 0 0 0 0 0 0 0 0 0 ,o o .o 0 0 0 o a o o� o a a a a a a a a a` a a a a a a" a` a a a a` d` a` a a` a s a` • a a a a` a a a a a a` a a a a a` a' a a` a d mmmmmmmmmmmmmmm fO mmmmmmmmm....mmm mmmmmmmmmmmmmmmmdm mam Ma a a a a a a a a a a a a a a a a a a a a a a a''a a s as a a a a a a a a a a a a a a a a o a a:o''o o o o''o o o o o 0 o o 0 o 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 a 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o E E E E E E E E E E E E E E E E E E E E EIE E E E E E E E E E E E E E E E E E E E E E E > > > > > > > > > > > > > > E E E E > > > 3 > > > > > > > C C C C C C C C C C C C C C C C C C •- - - - - C C mmmmmmmmmmmmmmlm' �' mmmmmmmm mmm mmmmmmmmmmmmmmmmam' mam m a a a a a a a a d a a a a a' a a s aaa aaaa a a a ¢ a a a a a a a a a a a a a a a a a a... a , cc z s � � z rc s z z C r} Y Y} Y Y r r} r} r Vl ul to V T Vl to Ln to V Vl to to V V Y U i r r .i ri ' i 'i } } N N N N N N N N N N N N V u V U U V U u V U V V u u U N U U V V U U U u U U V U U U u N N U V U U U u u U V V U V U u N N w w N w w H w w h N w w U V w w w w w w.... w H w., w H N u w w w w w w w w w N w w w w N w N w N w C w w w. w w w w w w w w w w w w C>C> C w w w w w w w w w w w w w > > > > > > > > > > > > > > > w w > > > > > > > > > > > > > > > w w w > > > > > > > > > > > > w w w w ''... w w w ''... w w w w w w w w w> w N'., w w w w w w w w w w w w w w w Y w w w w w w w w w w w w w Y Y Y'..Y Y Y'..Y Y'.Y Y Y Y Y Y Y N '.Y he ]e Y Y Y Y Y ]e ]C Y Y Y Y Y � ]e Y,Y Y Ne Y Y Y ]C Y Y le Y O ue o N O u5 O Ln o Ve O Vl O Vl O Y M O N O Vl o o V1 O Vl O m O T O Y Y O to O to O Vl O Vl o Vl O m Ve o Ln N N o M o� ''... o Vl o o o r o rl N V7 '.. .--I '-I N N M T r V m Vl w tD I, r, 00 .--I N Vl e-I e-I N N M T V V Vl Vl tD tD L L L L L L L L L L L L L L L u L L L L L u L L L L LL L L L L L u U U U U U U U U U U U U U U U u ` U ` U i L u ` U ` V L i U U ` i U U i U Y Y i aw+ Y Y Y Y Nw N Y w aw+ w bw+ m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m w w w w w w w w G1 w wI Ul w w w w w w w w w w w w w w w w w w w w w w w w w w' w w w w w w w w w w V) Vl to V1 Vl VI f Vl Vf N 'f V1 Vl Vl Vl f f f Vl VI V1 Vl Vl Vl V2 a• a+ a+ a+ .. r+ a+ a+ ✓ a-+ a+ a+ a+ a+ a� s+ a+ .. i+ a+ O 0 0 O O O O O O O O O L O m O O 0 0 O O O O O O O O O O O O O O O O t0 Io (O f0 10 IO t0 m m m m m m m L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L m m m m m m m m m m m m Oa m m Vl VI Vl Vf VI V1 Vl. V1 Vl VI V7 Vl Vf VI Vf Vf VI V1 VI VI VI Vl Vl Vl Vl VI V7 V7 Vl VI Vl N N E E E E E E E E E E E E E E E E E E E'E E E E E E E E E E E E E E E E E E E E E E E E E E E E' E `o `o `o `o `o 0 0 0 `o `o `o o `o o `o 0 0 `o o o `o o `oo o o o` o `o 0 0 0 `o `o 0 0 `o `o o `o o `o o 0 0 `o o o `o mmmmmmmmmmmmmmmmmmmmm�mmmmmmmmmmmmmmmm�mmmmmmmmm aaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaa'aaaaaaaaaaaadaaa .T .? .T .' .T .- .� .> .? *zl .� ., 2- .? .T > .> .> >. > > > >'.. > > > > > > > >. > > > > y > >.. > > HW2 >ymm m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m....m mC C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C aa a a a a a a a a a a a a a a,a a a a a a a mmmmmmmmmmmmmmwwwww.LLLLLm m m w w w w w w w ai w w w w w '''... w w w '.. w w w '... a/ w w w w w w w ai wwlw w w w w w ww w > w >��> > >.>, >.. >',.> > > >.> > >.>.ww v w i lL 11 11 11 LL LL LL I1 11 11 I LL LL LL I 11 11 LL LL LL 11 LL I1 LL LL LL 11 LL ''. LL LL tl.. '. w IL 11 11 I LL .. LL LL LL LL LL '' ww El .N-I M tao VNA T 0�1 r^-I .^� daft m T n rN-I crvi L! OOA. N l.0o O V t+wl N W '.. O lOfl Vw1 O lOD �N-1 l-ztD• ,w-� ,w-� lw0 N n N n '.. N NO IAA Om0 OVA• T too. N MVGA w w rl to m m N w N �7'• O m ''... m o w ui w m m .ti fM. Qi 0xV t+i r+:. vi ri lD R m e-I O N O Oi r tD V ft'i m t0 of e-I 00 lD n 0o W ai to m m N 0 Ln e-I to N' a%'Y v o1 vl c-I w N W m OA N O n VD C• 1t N T Cf to to n 00 0A O 0 t--I N m V m 00 N N 00 r 0 lD N 00 co to N m o o .� m N' N m m v tn. An to ry '... N w rat v O rn w N w 0 v w N t0 o to m m ry .� An m o v An N o 05 An m o 01 O e-1 O lD r-I N R1 'at kP1 iO n w m O e-I N M V Ln i C7 'od '']Y N� a m n' 00 O1 ty N V N lD 00 al .-1 N O O 00 M V1 : 06 O N V 00 .� m m m V to OA N VW iM7 '., .-i V n .--I V n O m t0 m t v +,n m N w O V w m n'., Ol .. m r N to m l0 w O Ln O to rl to a-1 N M T ri mN m^9 N N N M m M -I-V 'Y'j` .-I r-I N N N M M V Q to N w t0 .ti '-I N N m m V In iR V? V? VY N to 1^ 4"k..^Vti V? in V} ih �'.. LT',,1n VT N VT 'Vt V} U'} iA 'n VJp o o ololo 0 0 0 0 0 0 c ca o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0'..0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0..o O o 0 0 o O..OIo tD ' N lD OA M 00 m N 0V 40 'LLJ' m O n V '-I 00 00 N N 00 00 V O l0 N W 00 O tD N 00 V O to m O N V1 O m O to n t'. n of M T [P OA Ol 00 00 0'0 P'+ f� N N yw w w w to N to N O1 00 00 lb 00 n n to l0 t0 tO An An a a tO lD to O1 l>D 00 00 n r w ti M]ry'.. n 00 V r-I M O n V .--I Oq a1'Y N GL Cffi m O '.. n V !-I 0 N m H h m OA m ci n m oA An -1 n m m m. o to O1 V Ol � OA � Ol m w O V c-I n ' n N 00 a C51 ACb T-li W67 N od a Ol, ln.. a -I. l0 lfl N trl N O n to Kl O C0 V1 M .--I 00 tO m'. rl W Ol Oo 00 00 n n l0 t0 1l1 M m m M V n O V n c-I 'R•A` p'0 N n m N O 01 m N to to Ol C Ol m /b M w N n N n c-I O N w N l0 n rl '., n m m M M m .ti '-I ti N N N'� T m m '!.M '.... V V lxl to �-I .--I N N m 0l 4 4 N m to w n n r-I ci N N m -Zll i�I�I���©�Q�©®IOW©�®��®�©©©©Yil®�©�f0` Ck. a a a 0^ CL a ilk. a 0k CA, a a a a. a a a a. a LL. a N a na a. 0. a {1. O., a C'a a t9,. P,Y. GA. a•• ••C1. 2A P4 4 N & o„ d'v{i F.- i,^^^ fr•P }.. p_. M"-. pa M.." R- W`• F- F dm- �^' M-• k..' p.. I-• N ~ N �"". W- F^- y._ k'"" i- M^ R^ @-- p... M-- �""` !-• C•- N ~ g-. W°' �• �"'" 9'.' M."' %'-.. xa. a ia, ciu. a a a aa a a da. sa a s a s µ.-. a F•- a ew- a a a xa a t�., r:n. tk hw a r } " r r } a a > rx } r CNN} ""mmmmmmMmmmmm mm vavc w v s ^} r wro nw n n n an vA v °"°a m Ln rn vA u'a +Av +Jro ary LA vA u'S ch "; u� vA LJA '^�. L^ � a✓5[LLn' to uw erw +xv An Ln ✓A to � V) 0 �,. � nru to � V5 uro u'a C� va w"n Ln t!fl VA 4✓I 4A5 an VA 1A1 1f V'M VV 111 L/l VA VA 1d1 0 0 aA"I, VA Vl V'a nJi V1 VA 9!9 an iVA VA Ln VI VI K!d V1 T 4P1 V5 4Ati � 0 FA'S 4Wtl U°d FA"a 4n'a a'A9 VA v5 vA wn '�' ''�`" I T An ,% 41 an to vA 0 t;w to to vA vA ^✓,'r �n vw a�°r JA vw vA ua JA vA JA JA as cn ava w� vA ua w w.n � T Iu"A K, K, K, vA a a a n° m a 0. a I� a� d a m a m a a s wro a'A a a a L zw a a a a m a a a a A a� m IL a a m a m w w Y. a w a w up -Y, w w U 4 w '... w w w w Aw w w w w m w 0. w w 1x.N w w w w w w w w w Uj w a w &7. w I.uu w w w tau w O to O AJ Y O 1i'b O lxA Y YY Y !awn Y Y Y Y Y Wd Y w OO ",y,": Y, Y Y Y Y Y le Y Y 'aC Y w' Y w Y '.aG. Y Y" Si Y f� n 0q rM fww iW'A� '-1 m f.. 07 bn G9 lxl O M1A^tl O en O ul O '.� Y��p^'y� G0 Yf7 O to O to O to C? to t' iG Y 1W'U[`? tPv ti"7 W"M. O N N m m m to wn1'1 tO tO U•+• n 00 v N to q `'aa CLta.Cmaada0a maaac aadadLaamiar a mCLmaLCLa0-dm(Laacw Q,m m and�Q Q ¢ ¢.Q ¢ nS ¢ Q Q Q ¢ Q¢HW�tlHF- �h- F� F- HFH H 1 H H-, - HHd a a a a a ti a a' a s ti, a d a a a a a a a a t a a a a a a a a a a a a M a ma aa„ a a a7 7 =77 .:3' .mY ].7 Z)� 7 Z) D !, Z) 7' '7 O 'O I:.D'' D 7 Z) a a a a a a a a a a a a a a a a a a a a a as a a a a a a a. a a a a a a �...........a...'a a,........a a a a o'o o a a o 0 0 0 0 0 0 0 0 0 0 0 0 0 o a o a o 0''0 0 0 0,0 0 0 0 0 0 0 0 o a o a o 0 0 0 0'0 0 0 0 a` a a` a a` a a` a a` a` a` a s .o a .o a` a 0- d a a a a a a a ` a a a.2a m d a d !O d N,. Q.,d d d a a a a a a a d'd 2 '2 d d '..a d d d a....a d d 1 d d d E d 1 R d R d 1 a:d n. d a:0 0 o a 0 a''o 0 0 0 0 0 0 0 0 0 0 0 0 0 o a'o a 0 0 0 0 0 0 .2 .2 0 0 0 0 0 0 o a 0 a o 0 0 0 0 0 0 E E E E 2 E E E E E E E E E E E E E E E 0 E 2 E E E E E E E E E E E E E E E E 0 E E E E E E E J J 7 E 7 E J J J J J J 7 7 7 J 7 J J J J E 7 E 7 J 7 7 '.. 7 7 7 7 7 7 7 7 J 7 7 E 7 E 7 7 7 7 7 7 7 C C C 7 .0 J C C C C C C C C C C C C C C C J C 7 C C C C C C C C C C C C C C C J 7 C C C C C C C C C C C C C i0 10 f0 R N !p f0 f0 i9 A9 f0 t0 10 f0 Ai0 2f0 f0 — R i0 f0 (0 f0 i+ R i+ f0 IO f0 (0 .. N f0 IO a.......a a m a �a a a a a a aa. a s as a a a a a= a m a aR :aR R asR dR d d aR dR R R R a n. 2 1 d m a �a a........a d as a a..... a s a s a a'. a' C CC z C K K K C K K lr C K a' K C 2 K lY 2 K K [C of ',. = m w= K K oC CC CG } Y } } C } } } } } Y } } } } } Y } } } K } C Y } } } } } } } } } } } } } } K } [C N N N} M Y M m m m m m m m m m m m m m m} } a C a V a Cryy } to y m ,n ,n vy m ivA vA G U 'U m m to w.5 4A M1,N u. U !I U U' V u Lq a to � U u U u 4 u U U U U U U U U W oU5 U U u U 0Ua 54 tlwA w w U 4.a ON 0M GV 0W 4C 0A OY 05 ok 0+ aEA RW 0'A W AJ M °ma U 0A 11ti O,r S'Y fLY yb a' w N 0A R 01 05 01 tA�"'e N ^r.y�ny �M'' ^e '! "�. '"� w � awn � � "O "w: ^w "�. � w '�'• �v�r � "r 'V � � h � � � � O5 � � � C: 0„ G' 0: C C', 0d Ol 0.5 LIx Od 0a d'J 01 0A? 05' 0s 01' 0Y M W 0; 05' OI 05 > :' ' 0b 0x' > > ? � `✓ > ] > '. ]+ >. ? CP > N 0l5 fiJ 0/ 0A 0A N N tlA a°U 05 Awl C j C W 05 4a > m! > > 0x 05 OA > ', qM 01 01 Ca 0A ON 'qN W 0q tL OA 05 0x' 0I 0k ?' > 0,1' W OA 4d w]N 0Y 05 v 05 v W 0A 015 V5A 6A > N > ma aaa N 0x Pih 4PY W Y Y Y Y Y Y Y Y Y Y Y Y 0x Y Y Y Y Y Y Y Y Y Y Y Y " Y Y O, Y t Y Y Y Y Y Y Y O to O Y Y O In O l!1 O '.. u'I O t+l O vA O tAI O to O Y u? Y O vA O to O Vl O to O vA O to O vA O Y Y O tAl O to O to O n n W L/5 m m a V Ifl to t0 w n t� 00 .-I N In rl '-I N N M T V V In to tO lD t� n W .--I N In , Ln . N N T m S L L L L L L L L L '.L L L L L L L L L L L u L L L L L L L L L L L L L L L L L L L L L L L L L L L L ` L U U i ` U ` L ` u ` U ` U U ` U ` ` U i ` U ` ` U U ` ` ` U i U u R R R R R R '., R R R R R R R R R R R R R R R R '., R R R R R R R R R R R R R R R R R R R R R R R R R R f0 OA Ol 0A OA Ol lU Ol N OJ OJ 01 O) Ol O/ lU O) 01 Ol N lU OJ Ol Ol N lU NNW lU lU lU OJ QA 01 lU OJ lU lU OA OA lU lU N 0A w w w w w 0A 0 'VA 0 to to VA V1 VI VA N VI VA VA V) w VA VI w to (n V1 m ul VI VA VI V1 N V1 VI N V1 V1 In VA VA VA ul V) V1 ''.. N N V1 N VA VA VA VA u u u u u u u t.+ u u u u u u u u u u u u u u u u u u u t+ u u O O O O O O O O O O O O O 0 O O O O O O O O O O O O O O O O o O O O o O O O O O O O O O O L L L O O O O L L L L L L L L L L L L L L L L L L L L L L L L L L L VA Ln to N Ln VA 0 Ln U1 V1 to Ln 0 0 0 ' 0 0 VA Ln VA to VA V1 VA VA V1 0 V) m VA VA 0 VA VI 'tn VA VI V) I VA Ln '... V1 VA to VA VI m VA VA 'I U1 E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E o `o o -20 0` `o o `o `o o `0 o 0 0 0 0 `o `oo 0 0 `o 0 0` o'oo o `o `0 `o o` 0 0 `0 0 `o o `0 0 0 0 0 0 0` o `0 0 R R R f0 R R m R R '.. R R R R R R R R R R R R '.. R R R R R f0 R IO R R fO R R R R R R (C R R R R R R R M R R a as a a � u !ii '� a �... � � �' w u v u a""u v '. a.a a ', i sa ae a id a`✓°rva v it ', � � ,a. 'ai' u�. c�� v `"� s'_"i 'rA".1' �:r i � u '"ru m. .. >». a = a 2. ' '• a� a. " . a'• a-, a. as a. x- 5. �'.s. ?. S. i ' :. a a'�". a�., am aa� - �'�, w. aw.:v. s. ae. `;w • :.ram R R M R MG M n1 m m R R R IV m R R R R R uLY C0 —1 dry A0 [CV [0. lTJ R R i1�0 %5 9 N 90 R R5 Cd R11YG R IO f0 R IA d0 efA R9 IFS PO C C C C C C C C C C O' C C G C C C C Q Q Q Q Q -¢ Q¢ Q Q ',, Q Q Q Q Q¢ Q. ¢ "•$ ¢ '- - fO m m fO m m m m m m MI5 tQ5 Pp N f0 t0 IC fO f0 t0 t0 h1 Pt} 4G N 10 !O N m m m Vp9 a'@ aa3 R IO f0 f0 Ip 19 (0 fp f0 fO R �RF .i:.., C L L L L :G rC, 4- w` �F^- h• H H H 'u•••,... u- tl- ro••- !� I:,._ H H F- h- p,,. u.m.. A- ''- 'a,,,- S•'- N-' F H H I- h•- @•-' %-. P'-^ Y-- F- ffin t1,r n,A dx SU aL' tL "ktl W 'Gt O �. ara O uNa '�w5 } T T T ]• ,, r T •- 7'. a. 7• A'.. 7+ 7•? Y• a w 0 w w.0 w 5xd w w w w w w w w tw w w w w w w w eu w. w.r w w w u.a w aax us u.0 aan w w w w w w '., rxa w w nnx w w w w was naa w 0A FU ^ 5 AU 4! 5 5 I,$X y55 �a 01 `1 n 6D b OJ 01 0J F RL4 9x 0d v Cut 45N #,F 0,C l 0x S4Y 05 Y qk v 0A M 2 L 4� 0J 0A 05' 0Y tL pvA. %Y kl. tl4 Lz MIX[ LL AL LL Via. Lx., ii LL ts. � la„ 4d. w. Ak.LL Wa.. ux, Y-0m Aa.. bL. tw it LL nZ aw U. a n.t, X Z iZ iZ ' iZ •LL N.C. !Z jz x LL ,z nw tY. LL W El O O lfl O tfl....o lfl O I� M 0o O V W 10....0..0 V V V V rl Ol o VI '-1 <0 .--I lD rl 00 N N O 0 00 W 00 00 00 u1 N N w m rl 00 �'.., 'i N lD .-I m m W ci m O C to N m 00 n M N ri O Ol 00 00 Ifl i� O O T n O V O Ill n lD ; tD � ry 0 00 M O m lfl l0 r n 00 m O N W d. N O w 0 M O O Ln a -I a m m o a -I 1-, N V M o m H w 0 7 N V o0 1� O lO N r m w V w N O lO m m w m N w w n'� ci N V Ill w n w O W ID m ci C( lO V r1 ; 1-1 l0 Ol � Ol M w m w w N N m w w n n w lD N V M W N N .--I Vl O V w Ill m w r 1p 111 V m N c-1 ul n m e-I N V lD w H w O w m n N l0 c-I Ill N N e 1-:' lD to V rf9 N. i V 00 e-I w O m n O V n N a N uY M H m 1, m m r, w .-I w N n N n N N N m ''... T n m N V n m T Ill w Ol r m V m V m N n m 3. N '., m ID V r-I w 00 O N '., 0) Ol Ol 00 W 00 00 O C to N lD w r n 00 '-I '-I 'i rl c-I a -I N N M M H N N m V m 0 ti e-I rV N M Ill W V% V1 � .. .... lA VT.V} iR iR i/} Lf LT VY Lf to Vl. N, VY 'A In tX;r +nV}.,N in in IiA N ih LT N N to V? V} V? i/? 0 0',.o 0 0'.,0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o 0 0 0 o 0 0 0 0 0 0 0 o 0 0 0 0 0 0 0 0 0 Ill o m O ul o. m V o m r w .--I lD .-i N o0 w o O N N N N N m I, N O ul M w m 0o M C tD O O V V V V Ill w w to 0 V V m m N V .--I I� O r, ci � w d' m N V '. .-1 w Vl N Ol lD l0 d' ei ei N N m M 00 Ol IA 00 N lD O N 00 N O V Ol V C V Ol V Ol W O N N C ul Lo o0 Ol O N O V Il'1 00 o f/1 lD 00 '-I 00 A U0 00 N W O V oo N V .-1 00 O lD H n N r m' ei Vl � V M m N N e-1 a 0 o w V N O 00 l V1 m O o N I00 o H n m O M O lfl w M 1, N ID C Ill 00 O O Ill 1- O N ul n O m T Ol lfl .-I n M Ol Ln N T M Vf 00 c-1 V lD of N a W n H lO N W M of 0 n M 0 W Ill M N O M n of N V N M 0 W n W O N ul ul lD n n 00 00 Ol N M m V r-I .--I N M V m Ill lD c-I H N M V IA w r m .-I 4^ 1n iR V} l Nn iR SA N 1^ V'1 Vl. i/Y.. to to to VT.VT iR N N'..iA 2A A!% Vl 4/1 1n to V}.,� 1A 1R th ih '. VT 1n N i/1 th N i/f tR i/l In 4/Y N VI... in Vl o_ D. a a a a',a a.''..a a a a a,m CL a a m m CL a a CL a m a a a a a a a m a N N N N N N N N a N a N N N N N N N a ry a N N N N N N N a N a N N N N N N N a N m N N N N N N N a F- F- N d N F- F- F- F- H F- F- N d N F- F- F- F- F- F- F- N ¢ a a a a a s D_ a a a a 9- F- Il'1 Ill ul ul U1 ul Ill r N N N N !V N N} fY1 } M M M M M M T r Y? V a a r Vl VI V1 Vl Vl Vl V7 U7 IN/l N Vl Vl J N N Vl Vl Vl J I/l N J T M N V1 N J {/l �/l I/l a V N Vl �I//ll �I//ll �V/l1 {I//ll to Vl M M Vl Vl V1 N J N J J J J M J J J J J Vl J J V) J J VI J J N m CL m !n N 0- CL m h m N w N In E E m a E m E m E N w a a a a w a a Vl ''. a ul W w a a a a a U] CL I!1 a a a a a a a Vl a m a a a a a a a v w v a a a a a a a Vl w w w w w w w w a'I" a w w w w w w w a a w w'..w w w w w a IL' a w w w w'.w w w a a'..w w w w w w w a Y Y Y Y Y p Y Y Le m Lu Y ]m Y Y Y Y Y W Y w Y Y '.. Y Y Y Y Y Le Y W Y m c Y Y Y Y IL Y w '.. 0 Y Y m Y Y Y Lu ul O ul O ul O ul O Y N Y O ul O N o Vl O Y N Y O Vl O N O m O Y Y O Ill O Vl O ul O Y Y O ul O N O to O Y � 111 ul l0 lD 1� n 00 r-1 N to ri e-I N N M M V '-I N lfl rl �-1 N N M M V e-I N Ifl .'i ei N N M M V .-i N Ifl e-I r1 N N a a a m a a a a a a a a a a a a d a a aaa a a a a a a a a a aaa a a a a a aaa a a a a a a a a a a a a a a a a a a a Q a a a a a a aaa a a a a a a aaa ¢ a a a a a a a as ¢ a a a a a a a a'.d a a a a'....a a m m a a a a a a a a a a a a a a a a aa'.a a a a a a a a'.a ... 7 7 7 7 7 7 7 717 7 7 7 7 7 7 DID 7 7 7 7 7 '',.7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 1 i a a a > a a a a 0 0 0 0 0 0 0 2 E o'E E o E a o a a o a E 0 0 0 0 0 l 0 0 0 0 0 0 0 0 0 0 I o 0 0 0 0 0 0 o a ,o 0 C 0 0 a� aala a2 a o� a....a a a` a.....a o a 0 aa` a a a d a� a �..a a a i o`. a a' m m m m m m m m a m a a a i a a m'mmmm'mm a a a a .. a a a m mmmmEO m mmmmm E �mmimmam amamaa aaa aa a mm m a 0 0 0 0 0 0 0 0 E o E 0 0 0 o OID 0 D° a o 0 0 0 0 0 o a° a o 0 0 0 0 0 0 0 0 0 o a E E E E E E E E,2 E 2,E E E E E E E E E E E E E E E o E o E E E E E E E E E E E E E E E 7 7 7 7 7 7 7 7 E 7 E 7 7 7 7 7 7 7 E 7 E 7 7 7 7 7 7 7 E C C C C C C C C 7 C 7 C C C C C C C .(p. •ip •(p .fp .f0 •Ip •(O .IU m m N m m f0 m m m m 0] m m m '., m m N m m m m m m m m m m. m m m EEE a E E E E m E m'. m a m m a m m m E. E E'E EEE E a a a E a E'E E E E E E E E E a,a a a a a cc s z w w w w w w a: s w w w w oc w of w s wmr. w w ce Ir w w Ce CC w w' r r r r r r} s r r r r r r r r ul ul N u1 lfl Vl M Ill �--I N M `7 y } r ci ci r u} } N N N N N N N} r m m m m m m m r Y V V a V V V r U U V U U U U U .-i U c-I N U N T U M C U U U U U U N U U U U U U U O U U U U U U U � U U U U U U U O1 0J H 01 Ol O) O) H U O U O) N N O1 OJ 0J U U 01 O) 01 O1 O1 U U O1 vOi N N � 01 U O1 U 01 01 Ol O) � O) N U i�i1 I�ii v�i N N H 01 N 01 N N w N Jail N 0 N, - w N N N N N 01 N N mil Jail v\i V�1 V�1 01 N N N H C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C 01 OJ OJ O1 0J 0J W OJ C C OJ 0) O1 0J O1 N 0J C C > > > > > > > C > C > > > > > > > C > C > > > > > > > C > > > > > > > > > > > 0/ 01 01 01 01 OJ N OJ > OJ > > > > > > > > O! OJ O1 > > > > > > > 01 y O1 > > > > > > > O1 y O1 > > > > > > > N > > 01 0/ 01 '. 01 O1 OJ 0J > > 01 O) 0J 01 01 01 Ol > > 01 01 01 0) O) 0) 01 > > 0J 01 01 ''.. 0/ 01 Ol 0/ > Ne ]C Y Y, W Y 01 0/ Y 0/ N Y 01 0/ Y 01 O/ Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y aN n w ]e Y O Ill O ul 0 ul O ]e L! Y O tI'r O w O Ill O Y N Y O Ifl O Ill O M O ]G Lr! ]e O ul O Ill O ul O Y Ln 'i N ul H r N N M m V .--I N Ill H rl N N m m '.. v r1 N Ill r-I .-I N N m m zr e-I N m .--I 'i N N m m C L L L L L L L L L L L L L u L L L L L L tL L L L L L L L L L L L L L L L L L L L L L u L L L L L L i E U U L U U u u U U ` i U U ` U i U U � I U � i 01 N N m m m m M N fO f0 (0 m IO m m N N f0 fO f0 m m N N 10 N N N f0 0] N fO f0 (O N fO f0 N N [0 IC IO f0 N t0 f0 N f0 VU1 N Vwl w VaJ1 %1 %7 N Ol OJ O/ O1 01 O1 01 w w w0 ww w w w01 w ww wO1 01 ' 01 O1 OJ 01 01 01 Ol O1 O/ 01 0J 01 01 O/ 01 O1 Ol O1 VI N Vl VI to N V1 N VI M u] In Vl VI N Vl m to M N N M Vl Vl 1VI V1 Vl M N Ul Vl Vl u] Vl M In M M M M Ul t a+ a+ 00 00 00... Om b0 00 00 00 0q.., 00.E 00 00. 00 00 00 00 00 O0 00 00 00 00 00 0G'.'. 06 DO 00 m 00 00. 00 00 Da W bD 00 00 m. 00. O O O O O O O O C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C L L L L L L L L O O O O O O O O 0 O O O O O O O O O 0 0 O O 0 O O Vl Vl Vl I/l {/l Vl N t/1 J J J J J J J J J J J J O J J J O J J J J O J J O J J E E E E E E E E E E E E E EIE E E E E E E E E E E E E E E E E'E E E E E E E E E E E E E E E E E E o` `o 0 0 0 `o 0 0 0 0` o `o 0 0 `o `o `o `o `0 0 0 0 0 0 `0 0 0 0 0 `0 0 0 0 0 0 0 0 `0 0 `o o `o 0 0 `o 0 0 `o 0 mmmmlmmmmmimmmmmmmmmmmmm mmm aaaaaa mmmmmmmmm mmmmmmmmm a a a a E E E E E E E E E E '''..E E E E E E E E E E E E E E E E E a a a a E E E E a E E E a E E a E E Z, = = = u = = u = = IU R m fO '., m N N N N N 70 . f0 70 N IO 1p t0 (6 IO f6 (O fO fO 0l (U IO (0 f0 f0 f0 fO 01 N 70 tO f6 N N f0 FN N N i0 N N f0 N C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C a a a aaaaaa a a a a a a a a a a a a a a a a a a a a a a,a,,Q a a a a Q a a a a a a a a a a a mmmmmmm'immmm�mm!mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm `1 01 p 2 p 01 Ll `! 2 01 01 01 2 2 2 `J v F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- ',. F- H F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- F- 01 01 01 01 w 0/ 01 01 01 jw . 01 '... . . 01 0/ 01 N . 01 01 01 w 01 01 0/ '. 01 w w w'. w' w ww w w wW 01 0/ 01 01 01 W WW 11 ' W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W 01 01 01 01 01 w 01 �1 Ol OJ N N Ol 01 `1 O1 01 `1 O1 0/ OJ 0J 11 OJ `1 L1 Ol 01 01 01 w `1 d w 01 w w w 0/ L_ _ _ _ _ _ _ _ _ _ _ = _ _ L 11 11 LL lL ll 11 LL LL 11 11 LL 11 LL 11 11 W W LL W--- I1 LL LL W lL LL v ' W LL LL M LL LL LL LL W LL LL LL El 0 01 W A oN O ' m VY VT,,th o MAl Co ^dp ol, N O to 4^+ V*" to N a ~ W- Rti. } ..l. w uw Y a Y N ap'9�. d rc: Q +' f- F� a a . . ...... O Vl VnMWmO '* c4 N<D n r-tN * w N T t/f o o �O NP3 M N ,lag O ORN hq AY vd a Pam. LS. 7- n R*b nn 'wl IA a a W W n ]d Y O In '-I e-I a d ¢¢ 17 H a Cl- m 0 m O In C Ill al w �-- V W In N an O O 0l k'w. M w Kw6' (YJ o cn- i+7 G a a d m Y Gn '. ul �y°p Vl a a W w Y Y O Vl N N a a Q¢ H H a a 111 o I� I/1 N '-I m w m l0 '', N m t/? V}vT o e1'Y O on m C:7 I� $' "�" pG 'KF di.a ti/k 'GAY m m 0. qy, u Ld ann a?A 7 ..Y MD v"U rca a w W Y Y O 0 M M D a Q¢ #- F- d rs. Vl N O m O m un O 'cY' L m^A' dAY a '�. L�p aal� a kkl Y o "RS' a- !-- a c-I N O m V V} d`n N Yn kn el4 ra l m L l O_ W Y� r-I �i h a, m O Ill f, N n c-d N VI Vl 'AVT. Co DV C7 eB' 1�gl m ip Ld'Y In VA N ❑' ❑ m❑ yy,.. m NA Y 0. to ]C, EW AJ"6 m < Q. F- W� a. ar... f11 O..... --- a "i 7 Wfmn 6 W''. LD o1 In to o o 'Fw O O . -I '0.T e-I n' c-I e-I 1^ tA- 0 0 M1P7 VI > r ❑ ❑ m m N Vl a s w w Y Y O lfl rl '-I d a Q Q F- H a a Fm-. '- r•-I 1n cod �+ey� a!7 N 1'a7. m"A ull rw „19 ?M ❑ m h D_ w Y O N d Q H a M T N lD m .� to o of M n t1 wd i^ '.� 0 f/d ❑ w�i� v'v a lod Y In N eL Q F ki O1 W .--1 '., lD e-I to in o I"v Cc5 Cq v H'� v) tifW. C7^ kn •• ❑ m hn L+"l a W Y O ¢!'N M & +'% Ih �- P�- a Ill V O m .-I O m I� O c-1 m lD o1 N V '-I N N in t/Y o cod lFti N Ci M m M o �-1 m f U Gik N N hY to aI> UN t/5 t.'7 } } ❑ ❑ ❑ w m myy til ¢/'1 a a D_ W W W Y Y Y O UY m V 'C� a' d a Q: Q ^¢ H IM• . d a W m LIl m M n N to eo'a AaT W. KC PMA 44n CFb r ❑ m c W Y S7' 4f'l s Q k•- m N W V N O m ih o W N +;D Yl'R iA } ❑N rt'ti1"j�. Wll a W 'S,",. Llti Wti m Q W-' & m 1� M T N O m ei o lD O i m 1 N Ill 00 m m m to 'n to o* V w-'r al I� N cD I� KC.rM n O 'yC m "+7 *Sr,'tb vw -An'Vd YAY un w"4 > 7- T ❑ ❑ ❑ aY.7 m m W'!fi Vl Vf a a m W W w m ]C ]e Vl O lD m a a Q Q Q N•- H H sa. a s D1 lfl I" lf1 m N 1� c-I o m c. fn V V to 1A a o A^w In z-Y t0 N m n V! to Vl > > ❑ d�r m VI G'4 a D W W Y Y W O m a' Q Q H H '''.. a s N O O t•-1 lD T rR W ��,pp O' 'n k�," ry m m o a w Y� a Q H a W O N ei 'f N C M Ill 66 H .--1 +ul, in d O D"I �"# 4h wr. a^I a"J *A to m O ❑ N m❑ V7 m a v W a Y w Y N N a a Q¢ F H o_ a W O W c-I m c-I e-I m M to m M O N o1 "i .--I H N to v} 2 cod o 7" O m +wt N O m N T '+' rN IO VM 1'.ta trh N udfi kT1 Rag 7• '3°- t] C: G3 m m 6 Vl � a cs D W W W Y Y Y o 0 ri N a d s Q Q¢¢ H y.•- M•- s rw. ti. W VI m M n N — Co., cdd rl *'�A +:�' WF N Nd'Y ?, C' m�L 7 Q. a :!„ aPl N7 cw f- a... m m W m N m t/} o � I� I� f� m Nb N CY1 a t"S A a Y O a Q' Fes, a;". O m O w c-I M m GO ff M V Vf of o ^'r O 4' n lD O M C7 V W5 'WY 'U} N N Kf1 N!y ❑ ❑ m m N Vl d a Y Y Ill O m V d d Q Q F- H a o N V H D1 1� N n of V V Ill Nth co O 4 MD An W G8'a w,D nY 'n to 'a6b Mb N N 0 0 In VI C1 ❑ n m 4eA LA �a a %� I Y G�OtN O d I it en a '*' Q h• H s a V m N O l0 o hd aa'Y Ni qM; z A/> N (g eJ ❑ m n/1 s Y In lfl d Q F- a lD w N N Ifl W m '¢l" YdT Wro Ih WI'4 r4YM ❑, m 9%k D Y O lO a' Q F� m C l0 N O O m N kD r-I ''., 16 N N o N m cc}� M cd7 '-1 rowi aC6 o oo «A', 5l'Y '0 4JY YXM 'Y ❑ ❑ m as Q a a W w Y Ic m O '... t0 I� d d Q¢ F� H a d wO I., m In m H lD N n m m o *s' O M M wT n ^S' 9'4:w m C7 VT 4J"b 0 0 V1 vry - '.5Y• Ct Cl m m❑ N Vl a a W W Y ]G Ill O I� m a a Q Q H H a m ''.. m O M a-i V a .--I 6fi'a uiT MIT to '^' M m n a w� m r1 a Q F� m m m w N M L6 o C. v0� iaa I� t1A r"" m aa'k W R*i i Q B-' m o WO W .--I ',. m ul eoa' O 'sd,'Y r4 fiC 1'ib C,,,)° '']'' �l m J A W !e 6!5 a` Y` N m ll of •y" ihk mek Cw'. 1n V9 y, ❑u m a. o- Y "& k- L '..... a 7 0 a a a m a a.....a 7 a 0 a s 0 a'''.a a n. a a a a......m a s a a _�',a m° a a: a: a a a a a a m aid d a d a a a 0 M.•- 0 0 0 0 0 00 0 '- 0,o '- a 0 0 0 0 a 0 0 0 0'0 0 0 0 o o oo- o 0 0 0 0 0 0 0 0 00 0 0 0 o a o a o a a` a N IO a a f0 (0 a` a 10 IO s i0 Vl ❑ a In a` M M 7 7 a` N 7 o` N ❑ a` N N ❑ ❑ d M to N ❑ ❑ d N D d M m d a` D` N N vl ❑ 7 ❑ o` M Vl a kn LL N a ❑ N N o Vl Vl o Vl N N Vl vl Vl N VI h a M ❑ m '.. M a m o a a a a a a a a ❑ O>. 7 > > o 0 > 0 > 0 > > 0 0 > > 0 0 > 0 > 0 > > > 0 0 0 D ❑ > > 0 0> ❑ o > 7 o> ❑ > o D m > > 0 0 m > 0 ❑ > 0 ❑ ❑ > > 0 0 m ❑ > > 0 0 m > 0 ❑ ❑ 7 > > > 7 ❑ > > In 7 > o> o m ❑ > o o 0 0 0 0 0 0> o U' t7'> o W (D (9 (7 (D 0 (7 0 'D l7 C9 (S LD (7 ''..... u 0 o V' o Ua CJ l7 l7 l7 l7 U' l7 V' (7 0 0 0 C7 (�V 0'0 l7 l7 > o ID 0 o E E E E E E E E E o o o o 0 0 0 0 0 0 0 010 0 0 0 0 0 u o(D 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0''� $ o C 7 J 7 c c 7 J c c J 7 c c 7 c In N In VI N Vl N N M In In Vl M M VI N Vl VI Vl N m M N VI Vl Vl Vl Vl N N Vl M O N c N> �,❑ > In > ❑ o >'. ❑ 7 > > O o ❑',7 > > ❑ ❑ > > ❑ ❑ > > ❑ > 7'.❑ > ❑ 7 > > > m ❑ > > N ❑ an > ❑ o ❑ > 7 ❑ ',, > > ❑ > ❑',,.❑ > ❑.m > > ❑ > > > m ❑ ❑ > > > ❑ ❑ > > In ❑ ❑ > N 7 ❑ > o_ f0 d a a a a a a a V' (g l7 O C7 O U' O O C7 U O O (7 C7 O C7 O U' O O O (7 V' U' O O> (7 (D 0 > V` o O C. O O C. 1. o l7 O l7 O O l7 U' O O V' C. O V. O '.. coO U' 1. O O> 1. O> V' O Nm s Y s s }I} Ifl N m z } r Lf1 N m m r } ul In m } u1 z r s, N m m z } } m } m } w m } } m w r } m¢ } } kr m s } } } s m } r U' s l9 N m ¢ } m z } } z r m } m m } } z z r r z } . 2 m m } } r . s } } m cc UO z C7 > AC N W 1,,tl 'V U V q1 U U A7d OJ U N e-I V 'i UJ V U' V V W Q nJ +J U o U A V N V N W U u U U U l.! tiF S? LM Cp U V Ln T V '.. } M m N 'U wl OI vi ^... �UeS -».. •aWUV °'w kW� "+. "^w. ., wry n' w�i, R` ,y�ry 01 ' tl `^w. ou "°w "N W 41 w w ^�• w w "'• w O1 v w P18 41 9A fli O1 Ol OP M "`. ^yy w '... '4N O✓ 4L C mew Nsi r C c C C uf' C G C; C Iry C U. v�i C C v�i�"' C C wi w'"m wi v�i C G CI O,a Wi fU dwN > `✓ 48 Ol > Ol C C Gsi PM N Od w $,9 > > C C C C CA C } C OJ CRY O/ N N .. C c AW C C 0! OJ c aY3 C C dy Ol fU 4d' CiN C '!„' ay1 Y Y 9F 0d' O In fU IXY O vl 7i W O In W O > Y } N Cd pF Y Y ry Y Op Y ✓1) wy Y Y 4:+' VLtl Y Y Qp Y > N Y ? > d41 dyq G! Y Y Y > > F11 Ge Y Y..'Y 4U Y CO au 7 aLN > 'dd Y > > 'CY Ol Y Y > OJ Y > OJ Y > SAP w Y Y > > kW O1 Y Y > 03 Y > > > 'W N U1 YY Y 4'll C,Y Y Y Qk Y Y N N ei c-1 N N m m V e-I Y N N O ul a --I '-1 O N vl N O In m m O m V C O IP In l!1 O In O kD W r, ul O n 00 Y ti Y N In O a-1 In O e-I N ul N O m In O m V ul O V In Il'1 In O Vl O GD W n v1 O n m Y '-I N N Y N O .--I L L o L t u L L i E L L � L i U V U U U U U U U U U U U U U U U U V U U U U U U U U t V U U V U U V U U t U U N m N O1 N N O) fU N N Ol w '.. N IU N O1 N N aV+ OJ aU+ O1 N (U N O/ C1 O/ Ol C1 N O/ OJ N N m v N N (U N O/ O/ O/ O1 N W OJ C1 Q O1 O1 Cd w O1 C1 W Ol C1 N O1 w W N w Cl 4J N fU Cd OJ W C1 O/ fU W N Cl O1 Cl N O1 W W W Cd O1 O1 N C/ O) w O/ w ''. O1 N W C1 n kn.� In an m In v of ❑ ❑ ❑ ❑',,❑ ❑ O ❑ ❑ O.❑ ❑'..0 ❑ ❑ ❑',❑ ❑ ❑ ❑,❑.❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑''❑ ❑ ❑'❑.❑ OCO C C C Wf.17...ua w Cw'.. O/ fU N Od N O) N OJ '., O/ Ol N w Ol OJ Ol Od wN O/ ''., N N Ol (U Ol N v W O .,.� ,...a O o &2 .3 q'.m - m m m - m m mmmmm m m m m - m m m m m m cD m m m m m m m m m m m m as m m m m m m m m m m m m m m m m m m m m m m m m m m m E E `o `o E E E E `o E E E `o E E E'E E `o E'E E E E E E E E E E E E E E E E E E E E E E''E E E E E E E E E E E E 0 0 o 0 0 0 0 0 0 0 0 0 `o o `o o` o 0 0 0 0` o `o o o o 0 0 0 `o o` o `o `o 0 0 0 0 0 0 o 0 m m io '... m m is m m m is m m m m m m m m m m m m m m m m m m m m- m m m m m m m m- m m m m m is 0` m o' m i a a a a a: a a a a:a a. a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a w� V vvpp nrr�pp a./i V wNryp V Lp .,5 ,,nn V 4A� ul {�,ryn ra V h.N u. Nr W' V t�ryq +r w ✓+ an m« KJ R ke. a td .a µY "> _}>.. I.0 Y4M r0� Rd C i'CI ay C C m C m C,' (0 m C C m }Y C C N C f0 C tt] AY a C C nY t0 M9. ITl. s0 fO N N N a M +4l ARS PO '. ",' #Ll i6 RO rbL all N ill da d0 '., e0 Q. ¢ Q ¢ Q < Q ¢ < < Q < Q ¢ Q iC.". Q ¢. Q. C .� " '", '0"u� Q Q Q C Q C Q C C '� ¢� C ¢ '°c C 'a C C C c `" Q 'C C Q c C °"c C 'c C c C R9 ilq N Itl k0 PG' CSF fC f0 f0 M f6 a@Y MO dTH lfl aitl f0 M IO f0 IO f0 e0 19 N � mfA aW N f0 10 IC f0 10 10 N0 aNa" JT5 JO rt'Q al fO f0 f0 f0 'c IC "'. pJ. �. �•^' N^^ F^ .Yi'. L F� H L H L F- L M^ 4- 5. d...^. L W'..' C i^. L L }^" F^ L L k^'°' H L F L F- L ,:w' .0 f Y^ N' L L F", L }_� L H L L H F- .C. M^ L. Y- .0 L @^- W-' C A^^ L Lc M-° d,_' L L H - L F- ,'C X iF^••, W '.. 11 Ol >>>,,>>>>>>>>>>>>>»>>>»>>>>>>>>> LI W N y W k Wl O) w W W w Cl W W al W dU W w w W W w w W W w W w W W w W NW' w N W W w > W OJ W O/ 19.V OJ w W W W O/ W W N W N N W W O/ W N S»>>> W W 4f L0.1� Ol W fU O) W N Ol }»> O! N Ol J' > Ol N >>> N O/ >> N a ]1 N `1 Od (U W v `1 Ol `/ 01 Of fU W fU `1 W qJ L/ N N al 01 Ol `1 v W v N W W W 11 W W W W i{,O:X Ol 0/ OJ' W W Ol Ol W v W W W w W w L 11 w tk. LL •— LL w LL 11 LL LL �..� LL .— LL LL Il LL — LL LL .— LL W Il — 4.n AdM LL L — 11 LL LL I,l LL 11 11 B,.j,,. py„ L LL LL 11 11 W LL 11 El O Ol 1� o Vl m N o O m Wm l0 m -;I,r-I oo lT o n m Vl m 'rN o N vi O as W m O m m I\... N l0 r O m lD m O� a v 00 vl� N COm N IO O m Vl o lit O o m V1 m O O O m o 0 01 M ui � I� N m Vl .--1 N r-I 1� M .� O T O l0 N O N 00 l0 N fl'1 '-I l0 e-I M m m m m N O VI O to m �'-� O m V V m N c-I l!1 Ol M m l0 O m Ol m I- m rl N C m 1l m O N m m N O m I, lO N I� N m m m 'Tm m O l0 a-1 Il N I� lO N N l!1 l0 Ill Vl Vl m N N m N lO c-1 m O O O N 01 M Ol Vl O N Vl Il Dl rl m Vl m O N V N f� O I� lO a -I I, n l0 tO Vl 'r!l V V V m M N O m M N N.. T lD rl m m' 7 m N Ln 00 c-I Dln 1, Vl M N O 00 wVl m rl Ol c)rl Vl 00 to � Vl l0 I, 0o Ol o N N M V wI, Vl * N Ill N lO. N m oo V 1� Vl oo wm N Vl of 0) o rr N m O Vl 0I, m 0 m V C Vl t0 I, m 0) Ol o rl NM '-I N N N m cT m o r m m o N m c m M ......, Vl V}: V} VT LT Vl Vl '', V} Vl Lf''...iA V} VT V} V4 V} VT Lf VT V} VT VT'... V} VIA VT VT Vl" VY V? V} VT.VI. Vl VI.,I.. V1 VT V} i^ 0 0 0 0 0'0 0 0 0 O 0'0 0 0 0 O o 0 0 o O 0 0 0 0 0 0 0 0 0 O 0 0 o O 0 0 0 0 o O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o O o 0 0 0 0 0 0 0 0 0 O o 0 0 0 0 0 0 0 0 0 0 0 M l0 t0 T O O V 0 m d' m m I� N N m l0 f� O r-I Vl V1 m N m lO m- O m N o V lD .--I lD Vl m V 0 V m N O N N .--I C O 0 m V m l0 1� m t0 O to m .-I V1 V O 0 Vl m O m O I, 0 m m m Ill ''... r, o ci O VI O O1 O m O m O 0 Vl m M F, r-I N O c-I li 1 al V 00 m 1� N T C O r- N lO � O m 111 c-t I� M Ol Vl O lD N oo V to I, m O In N o V �'-I al l0 m r 00 j m lO m M O rn 0) n tO lO m V V m M N N e-I e-I N m't m-* M N In m O m Vl m e-I M lD w m_ r- Ol O I� 111 tD 00 E O M �--� n M 00 V O l0 m m T O l0 Il m m O '-I N m� m N N N N.1 VI 0, m O e-I N M Vl lD m O N N m m 0 IO I, m .-I N� V1 n m ri O N N N M N N V} VT N V} VT V1 [n Vl Vf in VT VT V} Vl VT V} VT V} iA VL V} 1A V} VT V} V? M iA V} V} VL u? InVIII Vl VT VT Vl'.. N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N Val Val " l�n V�1 l�n In V�1 Val tin N 7 N 7 N 7 7 (D 7 l7 VI t�/1 7 Val 7 V�1 7 V�1 7 V�1 7 V�1 7 tin 7 l�n 7 V�1 7 tin 7. Val Val 7 Val 7 Val 7 l�n 7 C7 ✓� 7 V Vl l�n 7 N 7 Ian 7 Val 7 Val 7 V�1 7 In 7 l�n 7 l�n 7 Ian 7 V�1 7 Val l�n V�1 7 r> '... 7 7 r 7 r 7 Y 7 }} 7 7 r> 7 7 T>> r r 7 a 7 v v v v c c v c v v v v a v> 7} 'n 7 > In 'n In In In In In m In In r> l'l In Y an Y In m 0 m m 0 m m 0 m m 0 m m 0 m m 0 m m 0 m m 0 m m 0 m m 0 m M 0 m M 06 m m m m 0 m r> 0'''..19 ❑ `t ❑ c 0 m 0 m 0 m 0 m 0 m ❑ m....m 0 0 m 0 m 0 m 0 m 0 m 0 m 0 m ❑❑ ap0 m❑ T 0 m 0 m 0 m 00 m m'.m 0 0 m 0 m 0 m 0 m''...m 0 m m ❑ C9 Vl V1 N to N a Vl o_ N a to a to a Vl o_ Vl o_ N o_ Vl o_ In a m m d m In In o_ In a Vl o_ Vl a to o_ V1 a VI ''... a N a to o_ Vl o_ VI o_ Vl o_ to o_ V1 a Vl o_ m '.'A d m Jl In o_ h a V1 D_ to a V1. a Vf D_ to o_ Vt a VI a V1 o_ to a VI a VI D_ Vl o_ W Y W Y W Y W Y W Y W Ne W Y W le W Y W Y W Y W Y W Y W Y O_ W Y Y W Y Y Y O C Y m Y O Y m Y 0 Y Vl Y O Y m Y O Y 0 Y O Y to Y O W Y Y N w Y Y O Y Vl Y O Y ul Y O Y N ]e O ]6 V) Y O ]& ul ]e O Y In ]4 O ]e Ln Vl c-I O N 0 N o T m M O V 0 '7 O V7 m ll1 O tD In l0 O I� m n O m e-I N V7 O rI Vl ci N N T m C V V7 VI lD l0 I� n m M V C V7 Vl m l0 n r, n aaaa a aaa aaaaa aaaaa a a a a a a acL a a aaa a CL a aaaaaaaaaaaaaaaaaaaaaaaaaaaaaa a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a o_ 7 a �Z) n. 7 a 7 s 7 o_ 7 a 7 o_ 7 a 7 s 7 D. 7 ''.... a ''',.7 a 7 a 7 o_ a o_ 7 o_ 7 '.... o_ ''. 7 a 7 D. 7 o_ 7 a 7 a 7 a 7 a 7 o_ '. 7 D_ 7 a 7 7 7 7 '. 7 7 7 7 7 7 7 7 7 7 7 7 7 7 . 7 7 7 7 '.. 2 7 'Ea 7 7 7 s a a a 7 a� ....... a a a .... a a a a a a a d a a a a a d d s a a a a .. 0 0 0 0 0 0 0 0 0 0 o O 0 0 a° a,0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o'O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 d a d a a i o_ '2 a a a a a a a a` ' a s o` a s a` o_ d d VI VI Vl Vl In In Vl V) N 7 VI 7 V1 7 Vl 7 Ul 7 Vl 7 d �l V1 7 d In VI 7 V1 7 Vl 7 Vl 7 VI 7 Vl 7 - 7 Vl 7 VI 7 VI 7 - 7 Vl 7 Vl 7 VI 7 V7 7 V1 In 7 w Vl 7 In 7 Vl 7 Vl 7 VI 7 Vl 7 Vl 7 VI 7 VI 7 Vl 7 Vl 7 - 7 Vl 7 Vl 7 7 > '.. 7 > 0 7 > 0 7 > O 7 > O 7 > O 7 > O 7 > O > O > O > O > 0 > 0 > 0> >0 7 > > O > o > O > O > O > O > o > 0 > ''. 0 > 0 > 0 > O > O > O > 0> 7 >O 7 > > O > O > O > O > O > O > O > O > 0 > O > O > O > o > O 0 0 0 u' l7 (7 u' W W0 u' 0 (D (D u' O C7 0 u' 0 u' l7 u' u' (D( (7 ( 0 Lo 0 0 (7 ° ° 0 Lo u' O u' O 0 O u' O 0 O L9 O 0 O ID O u' O (D O (7 O u' O O V1 O VI O Vl O Vl Vl 21 O V1 O N O Vl O N O V) O V1 O Vl O Vl 0 y0 � 0 O Vl O VI O VI O V1 O VI O V1 O V1 O VI O V1 O Vf O Vl O VI 0 Vl 0 Vl O VI Y � 7 O O V1 O Vl V1 V1 '. VI Vl V1 Vl Vf Vl VI Vl Vl VI 7 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > In 7 7 >O ut 7 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > ut 7 >O ut 7 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > 7 > > O O O O O Lo O 0 O u O 0 O (D O u O Lo O (D O (9 > > O (D O (7 O l7 O '' 0 O 0 O (D O w O (7 O 0 O (7 O (7 O 0 O (D O 0 O 0 > > 0 0 (7 O (7 O (7 O 'D O q 0 'D 0 (D O o O (D(7 O O u' O (7 O (D 0 1 (7 to Y (0 m cc I} s z r cc r cc r s r cc r m r w r v: r w r m rlr Of cc r cc r m r m M m rn m m m m m m m m m m r a r a v a v a v a v a v v v a a a r r In In In In In In In In In In In In In In u u u u u u u u u v u v u v uv u v u lui au v u u u u v u v u v u v u u v u v N u v u v u N u m u u v In u u u u'', u N u u u u u u u u v v N v v N N N N N u—i - C C c C C C C C C C C C c C c C C C C C C c C C C C C C C c> N c C C C C v v v v v v v v v > v v > v v > v v > v v > v v > v v > v v > v v > v 0 > v v > v v > v v > v v > v> c> v v c v > v > v v > v v > v v > v w > v v > v v > v v > v v > v v > v v > v v > v v > v v > v v > v> v v v > v > v 0 > v v > v v > v., v > v v > v > v > v > v >,.. v > v > v > v > v Y Y Y Y Y Y Y Y Y Y Y Y Y Y O Y m Y Y Y '.. Y he O Y Y 0 Y Vl '.. ]e O ]e In Y O ]e m Y O Y In Y 0 v "', Y Y O Y Y o Y ul Y O Y Lo ]C "'. O Y Vl Ne O ]e In ]d O Y Vl ]e o ]e In Y O Y Vl u'1 a -I O N V7 N O m In M O C Vl T O Vl u'I Vl O lD V7 l0 O n V7 r O m Y .-I N ]e W o c-I Vl .-I O ',. N In N M In m V V Vl Vl tD to I� r oo '-I N m rl c-I N N M m V V Vl m tD lO n n 01 m m m O1 O OJ m 01 m 01 O N m 0/ m v m m m m N v w v N m m O1 m OJ m 0J m OJ U m m'm 10/ 0! mmm O1 O1 m U m m'G '.. O1 01 U m m OJ m v m m m 01 m Ol O m m OJ m 01 U 01 m m O m m O1 m m Ol v m v m m U m m v 7 OJ m 01 U O1 m v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v a v v v m m m m m m m m m m m m m m m m m m m'.m m m m m m'.m m m m m m m m m m m m m m'..m m m m m m mmm m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m l m m m m m m m m m m E E E E E E'E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E 0a 0 ` ` `00 0 ` ` ` ` ` 0 0 0 `'o 0 0 o ` 0 0 ` o- 20o00002 a a a a a a a a a a d a a a a a a a l a a a a a a aE a a a a a a a a a a a a a a a a a a d a a a d u = = = = = = = u u - - u u = = u u u = u u = = u u - u u = = u'. = = u u = = = = = m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m C C C C C C C C C C C C C C C C C C a C a C a C a C a C a C a C a C a C a C a C a C a C a C a C aa C C a C a C a C a C a C a C a C a C a C a C a C a C a C a C a mmmm�mmmmmmmmmmmmmmm�mmmmmmm�mmmmmmmmMMmmmmmmmmmm - ` - - ` d - v L L L L L L L L L L �. v v v v v v v v v v v v v v v v v v v v v v v v v v v v v vl v v v v v v v v v. v v v v v v v v v v W W W W W W W W W W W W W W W W W W W W W W W W W W W W W m W `1 W W W W W W W W W W W W W W W W W W W LL 11 LL LL 11 LL LL LL lL LL W 11 11 LL LL LL I1 11 LL LL 11 11 11 LL LL LL W `1 LL 11 11 LL LLLL LL L LL LL 11 LL LL � LL LL LL LL LL W LLILL 11,. LL El V1 V' n w M m N M 00 e-I C '... V Ih O M aD al N 00 N V N w w". O w N w 00 lD -;a,',. Vl N 00 M m N m M V1 lD N Ol O O .--I m Vl w w lD W m m n 1\ O M m w O O on aD 00 -1 fn w 1n m m 1\ r-I '-I Lq m M W N o 00 O VI O lD rl w e On N N N n m w on m m m N O H H N N M T V C V1 lmn 111 w w n 1n V1 N eN-I w N W V m O O tD f\ ... O et' r- N 4 00 ."i m w N m m N lD N O m V ati W w N m lO M O I� V r-I 00 Vl N M O O e-I '-I N N M M Del Orq ryi NO M V M w n w Oml O .rvi M-I N M V M LD ON N N T w, w O N r w w O N V w w on 0n m V l0 Oml N 1n w .^-I N .ti H - '-I '-I ti c-I '-I '. c-I - .--I c-1 ' N N N N '.. N on m '.... H '-I '-I N .A 'A I, in ,, vt• in v} to 1-1� i../1, TA .� ,, p^.. an AA .n %A vw..,.� .n yr i In ,.h v>• +n «.^� 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o o O o O o'o 0 0 0 0 0 0 0 0 000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o o 0 0 o 0 0 0 0 0 0 0 0 0 0 0 0 o o O o 0 o 0 o O o LI1 N m rl 00 1.n lD l!1 M '., N N .--I O O1 W P"w lD V k.D N 4D ' N O 00 lD N O 00 tD V [V o CIl AI V .'-I r-1 00 V1 N N M .--I M Ol Ol CIl CT CIl Ol Dl Ol 01 01 G1 00 00 p.'N 00 ID N CDCOY CPT Dti D1 Ol 00 OO DO 00 O0 00 11 n n n W M M 't C71 C71 O0 00 N 00 <D '... 00 n f` lD Vl V M N '-I O C71 W t` w N *.F' M N kD V uCM P'% w-tl Ol n l,D M rN N N M m Mo mo 1, 00 C ati M O n V .-1 N e-I rl M li l M IA n Ol ,'-I m ' Vl n 00 O N V t0 O M n e-I rl x-fi Ln 00 N ..... lD C] V n e-I V1 Ol M l0 O - e-I n .1 n N 00 V ...., 31 M .-1 rl '-I N M V Vl I- W C11 O .-i M V '.. Vl l0 6^+: CIl N N n9 V T' C) .-I V lD M e-I '... M w O0 O M Vl 00 M V I- O V N .--I r-1 .�-I e-I .-i .-I N N N N '., M M M M .--1 r-I c-I N N 1/Y VT Vf V} L1'V! "f VR to LA to n VT to to <PI. } AA aA * ' njvV ih iR in NeqN N N N N N N N N N N N N N N .:J N N N N N N N N N 0 N C7 l7 l7 C7 (D (D l7 ''' 0 C7 l7 0 0 C7 (D 0 N N Q C7 U' 0 (D (D 0 0 C7 0 ut vl Lnen ut of in ut an an vl vP en in "�`' N N N N N ' N N R#3 O Vl Vl !n V4 4f1: Vl V1 V1 Vl Vl VI Vf !n to fi'I N Xn C^W, to to LA V1 Vl N VI LIM m VI N V1 61 VI Lib {PSG. N V1 VI V1 V1 V1 In VI V1 In VN LR VI Vf Vf V1 Vl V1 VI eery a. d N N '... to V) WM h+l., V1 V) vl V7 VI VI N VI l%1 n/1 VI In an N Vl to Vl wn a an w Vl a a a �m a a LL a a a a a a a +,n uy m m a a a a a a w a a w w w w. w w W w w w w w w w w a ''�' a w w w w w w w W 05 w g W Y m o Y Y Y Y Y q Y Y m Y Ln Y :e Y. Y Y Y Y Y Y Y Y O Y Y O m O u!1 ;,� M O V1 O N O vl O V1 O Y� Y O vl O H O ul O ta"T 00 e. N an H 1- N N M M V V Vl V1 lD aD n n Of7 H N .-i .-1 N N m M a d d CL O_ d LL d 0. CL a CL a Cl d CL O_ 0_ a Q Q Q a a a Q Q as ry a aaa Q a a¢ Q a Q H f- ♦- H F� f- H +- +°- H H H H H 17 H H P-,- +- +•^ 1 � H H H f- H a a a a a a a ca. ci, ri o_ a as a a a a m„ ta., aamL.,. a a a a a a o_ a S% Ol Ln O m 0 1 N N �'a arb ut in vl � U c» l7 ': vl ut ut cn !ira aYb M vi vl a >r>i rr> >wa•>ir N N N N N N} M} M on M V+ry M on M ', on M W'b oe'1 V1 Vl Vl VI M aU"AA M Vl to Vl VT u/q Va Vl V1 V1 FIY 4R VI N VI V1 VI to V1 Vl Vl 4qb tin A/T VI VI to 4T V1. V1 VI Vl to N Vl o Gb 4A V1 Vl VI a. m a a a w w w W aaa LU w w w Y Y Y Y Y Y w Y W Y Y Y Y Y Y Y Y Y AeP Oyp� M O Vl O Y M Y Ln O ub C,;,P i O Ln O lfP T' lD n 1\ 00 1- N M 1� 1i N N' M m 1T � Ll ca rcr a a m m d m m a d m c6 d a o a a a a Q a a a a a a a a a a a a a a zi... a m a a a m a a a a a" a" ai.. a a m a s aaa s a a a a a a a ala M a a s a'.a a a a a_ c- a a a a J a J a.'a a a a a a..,a a 0 a o , a a o a 0 o a 0 0 ,o o ,o ,o 0 0 0 0 0 0 0 o a o 0 0 0'',0 0 ,o o'' o 0 0 0 0 0 0 o a a'' 0 0 0 0 0 0 0' 0 0 a s a` a a` a s a`,a a a`.a..a` a s a o,,a`'a` 0- a CL o. . Z a` a s a` a` a a a• '., ri .0 a a` a` a d a a a a` vl � ut vl an In In an ,a` . vl In '.., vl vl m in ,, � M in ''., an � an ', � vl In a` M a � vl an � M 7 71� 7.� 7 7 In M'..7 7'� 7 77 7 7.''7 7 V5 ut 7 7 D 7 D 7'7 7 ) > D > > > > > > > > > > > >. > > > >O > > > > > > > > > > > > > > > .n > > > > > > > > > > >> O > O O O O O O o O O O O O O o 0 > > O O 0 o O O O o O o O O O O O ? O > O O O O O 0 O O O O O O U' l7 l7 (D Q l9 l7 '.,0 0 l7 l7 0 0 0 U' O O U Q U' U' l7 U' U' (7 Q U` U O C7 l7 C7 C7 l7 'V C7 l7 l7 V' l7 V' l7 l7 'V U' O O O 0 O 0 o 0 0 0 O. O O O O O O O O O l7 O O O O ':. O O O O O O O O O O O U 0 l7 O O O O O O O O O V) VI'VI VI to V1' V1 m VI VI V1 V1 V1 V1. V1 YO VI V1 V1 VI V1 V) In VI V1 Vf V1 VI V) V1 N V1 Vl V1 VI VI V1 VI V1 V1 Vt M� 2) > of � Z)� Z) M 7�� 7 Z) 7 7 7 Ln > > ut 7 7 7 7 ut of 7 7 7 Z) > > > > > > > > > > > > > > > Z) > > > > > > > > >, > > > > > > > 7 > > > > > > >. > > > > O > 0 O O O O O 0 O O O O O 0 p 0> O > p O O O O O O 0 O O O O O O O > O > O O O O O O O O O �.Oj C7 l7 C7 l7 l7 C7 l7 U' U` l7 U U' C7 C7 l7 l7 C7 C7 l7 l7 U' l7 l7 l7 l7 (7 C7 U 17 Q U l7 U' U U 0 C K K 0_ 0_ 2 w K C CC K K K.,M LL' C K 2 2'.......,or K .Ty ti N N ti N rT-I eT-I N N ti N} N T N N N N N N '... N N N ,, N N N N N N Y M } M M M M M M M M M '� U, `~ U U u U U U L,A M1�A U U U U N VJ N U 4Y U 1J U U Ui aJ U a3 M U M GG,,!! 4Y 4,a U u>i u>i > > > ti4 > qa tl�,yy 4P uu,,LL t,p SY V Wl U U U CY GUY N > > a1tl G! > > U 4.P > w 61., Ol qM 0.dM dl'N fiN 41 &N 'pJ 01 V "I Q w w 01 0 '""7 " > > > a,4DY �N > ma > > > > > > > > > > ;� > Tu > ^"' > C4 ? 0Y > > > > �a > 4P > 4ll > 9a1 aaa Ga 0J ^� W W W ,R O>J w 9 r>u W a 0>a 21., 4n N > '' } m+4N N N p>J 4n GY 0>1 > > Y Y Y Y Y ]e Y Y Y he Y Y Y Y Y Y O Y > Y Y Y Y Y Y Y Y Y Y Y Y Y e Y > Y w Y Y Y Y Y Y Y Y Y i' Y M Y O M a M O M O ul O M O M O M O Y N Y O M O Vl O vl O vl O M O m O 1n O Y Lq Y O Ln O M O: ul O M O O .-i N lfl e-1 .-1 N N m m li I Vl lD ''... t0 '... I� 1� 00 .--I N Vl .--I .-I N N m M V ' Lon Vl l0 lD I� I� 00 .e N Vl .�-I e-I N N M m V lfl L L L L L L L L L L L L L .L L L L L L L L '.L L ,L L L L .L L L IL L ..L L L L L L 'L L L L L L L L, L L U i i U U U U U i U u u U U U i i i U �, U U U U �' U N M M l0 M- (0 M M f0 M M M (0 f0 M M M M M f0 M M M M M M fO M f0 f0 M M M IO M N M M M M f0 M IO f6 M r0 M M > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > � VI VI N V) Vl V1 V1 ''Vl V1 V1 V1 V) N VI VI VI V1 Vf VI V) V1 VI VI VI VI , VI V1 V1 V) V) VI V1 VI V1 '... V1 V1 N V1 V1 VI VI V1 V1 V1 V) V1 V1 V1 O O O O O O mME LVE1 LVEl LVE) tVEI LVEI LE LVEI L LVI LVI OE LV0 1 LVOI EO EO OE LVOI EO 0E LV0 1 OE LVOI OE OE LV0 1 LV0 1 'LIOn LVOI OE OE O VL L Ln LVL'L 'L LVL LVL L L L L L LM L LVVLf L LVLVto E o,o o `o `o oo o `o o` o o `o `o `o o `o `o 0 o w o oo 0 0 0o 0 0` `o `o o `o o `o moo` o oo o o o `o 0 0 0 `o io m m m m m m m m m m is m m m m m m m m m M M M M M M m. M M M M M M m m m m m is -M m m m m m m m m aaaaaa'aaaaaaaaaaaaaaaaaaaaaaaaa'aaaaaaaaaaaaaaaaaa ccffyy ry Wry +n yM vs ur wn w+� uvP w+ WW w Vp wa w µ a+r wp 0 nro vw ,gyp µ zi ry yry 4y U U 4.1 ib w.5 ain 4.a ar as ump A.Y a 0.J yl U Md uru, �6Y a`i' u�. is '4.Y �..r�a, hL A..Y a c.aw a +,1 Ls r"ry.+ yY +4Y "r"r'tr'mml' 1`"ryJ r m'" �y M lz �0 PY uG "tCV M f0 Y"a MM C: PO M M M M>> MM M @ ffP ra M M M [S) M M M M M FO aiftl a iY5' 70 R utl N IO dG MM M M M r 0: q C C C C U c c c c c M C C c C C C C C c c a C C C C c C 0 C C cC 0:. 0: C C C c c C c as �[a ¢ ¢QaQaaaaa �¢aaa',Qaaa aQ Q[ QQaaQ < 4iaaaQQaaQ a Q a�P u M 05 RI M M M M N fO ip Cd. d'a1 fp IO f0 f0 l0 N 10 f0 M aU - aVa fR M f0 l0 IC IO f0 19 M S5 Imo' Paa R4 M M f0 !O f6 f0 IO mPi 1UGam# > pd dl' > > > N W > N ^Y1 N� $J d :. `1 v > N > `1 &" L iC p...L P✓- L I-r L'. a^ L hL > > > 'law > > > Pa1 > > > > > > > > > > > > > > > > > > >' > > > T >+ >. T> >. T ?>> T >,, T T> T,' T T Y> T> T T T> T>> >,, T L W W W W W W tNJ W W W W W W W W W W W W W W W W W W w W W W W W W W W W W W W W W W W W W W W W w�J' `1 > w `1 > SLI > > i L L 1 LL 1.1 M it LL Il Yk, LL 11 ll_ LT iZ I,.L l.L M E LL lL LL LL LL 11 11 LL LL L9., LL LL LL 11 {L LL LL LL M l.L LL M LL M 11 µ, M lL LL M M iZ El a-1 O 01 00 1� LD lD V aO V w w W O N V w w W O N V w 00 O omO Vl m O M O o O o N O m O m O I M w O mr� N Ln Ol N w O 7 M N 00 O Vl VI O w .-1 w �'-� rl w N 1� N fl N N VI W M m Gl w N m Vl N N 00 N H W V ti N w 1n c4 00 V '4 f` Ol 01 m r, to n w� m r4 O N O M I, w V M M w M H r-I w Il W W M O Vl M w 1� n W Ol O N w V N O W N w m m Vl O I� w V a --I N M . Vl w 1� w m o O ''.. H N m n m a0 N N '... 00 r o w N w Vl H Il m m m H 1l N V M Ln M e w ID w 1� n w a V O I� W N w O C w N w o Vl QI M I� �--� Vl O V ul N O 00 LI1 m O a0 w m .� oo w v .ti V �--� w m V m m c-I N m C Ln w C) a0... N� Ln n 00 01 - N V Vl l0 OO m H N o o w m VI I, w O N V V7 n cn H N a 6 00 rl w O 00 M I� N V 1� o m w m V V VI W N w O V OO m I-- H m M M t\ N w Ln w w o m O m H w A w H w N I, N r N '. N N m V m, O1 N M M 7 d' V �--I H N N N M m V V V Vl Vl w w - .--I N N m m-4 V o V) w w N n w s-I VI 1A i/f VT N, 14 v) V1 M iR In i VI'... do v. VI i/T %A +Vh OVA tf1 in V} ih N in iR In. a V1 1 A jN in iA '... V/ VI N in VI '.. VI iA 1h in 1A-in N M,. N 0 0 0 o o '. o 0 o .. o o o 0 O O 0 0 0 o a o o 0 0 '.. o o o o o 0 0 0 0 o O O o o o o o o O O o O O 0 0 O o o o 0 00 0 0 0 0 0 0 0 0 0 0 0..0 0 0 0 0 0 00 0..0 0 0 0 0 0 0 0 0 m o I� a H w w N - N w w V O w N w w * o w N w a 0 VI m o 1n o O Ln O V1 O O V1 O V1 O Ln O .--� m V O V1 .--� w f� n w w w V1 N Ifl N Ol a0 W 00 00 I� n w w w w V1 Ln V V w w V1 m w w w 1� N w w w m V V m m N V .--� n O V I- w m O 1� V t•-I o N m H r� rr 01 1n c r- m Q7 VI �--I n M Ol V1 c-I O w m V m V '... m * m mm 01 V Ol Ol V Ol w O N N V to w N w T m Ln c-I w Vl N Ln I O I� Vl m O w o m' H a0 LO r e4 W cr OO o0 00 I-Z n w w Li V1 * V m M N N .-4 a O Vl w V N o Ol N w m m 1, V m w m m m w M w N 1- N n H w e-I w V1 w I, H 1� m m V1 H I, m m VI H 1, m m Vl N M mM 7 '... V V Vf V1 H N N M m V V Vl N w w '., n n - H N N m V V Vl Vl w rl n w w m4A 4 iA A^j 4n VI VI in 1^..'.1R i/I Vf Nih 1R to 1R �,,. V? in N...'.N VI VI in i/I V1.VI In Vl- VI iA a/I 4A to tA.. Vn in VI to N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N� N N N N I 0 (D Q U' (D 0 N N C7 U 0 (D (D U 0 0 0 0 0 U 0 0 0 N � N U' (7 l7 U' l7 (7 l7 l7 U U' l7 l7 C7 C7 l7 N (7 N 0 U' 0 C7 ut ut ut of o MnU 1A 0 ut N Ln ut ut ut ut o1 ut ut o ut ut U �^ l7 ut N ut ut ut ut ut of ut ut ut ut ut v1 ut 0 'n l7 of � o1 � v1 � o) m 7 D D m.� R.� R� 7 7: DO 01.E 7 R 7 7 7 ut ut 7 Y> Y Y Y} Y}} Y Y Y 7 T Y> Y Y Y Y? Y> >> Y Y= N Y}} m m m m m rn Y > v c v a v a v c a a v c g a v> > v1 v1 Ln v1 vl L l Ln vl Ln vl �n L l �n �rl Un > r �,/�1 �./�1 Ln N Ln N VI N V N ai Vl to Vl VI Vl Vl Vl Ln Ln VI Vl V1 VI V1 to L'l V1 Vl IA V1 M V1 to VI Vl N V1 VI V1 0 N Ln N ti J ~ J J N A N VI ut V1 VI V1 VI V1 VI 111 V1 V1 V1 V1 1? V1 V1 VI V1 V1 Ln V1 V) Ln V1 V1 V1 V1 V1 VI Vf VI Lit V1 ut N LI VI V1 Vf V1 Ln J J V) VI VI VI V1 V) d VI V1 V1 V1 V1 V1 VI VI V1 V) V) M IA VI VI V1 VI V1. V1 1A ul V) V1 J d J V) VI V1 VI a. a a a a a ul w vt a LL. m a a a a a a a a a a a a V1 w N a a a a a a a a a a a a a a m In w V1 a a a a w w W W w w a Y D. w W W w W W W w w W W W w w W a Y W Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y w Y w Y Y Y Y Y Y Y Y Y Y w W Y Y Y Y Y Y Y Y ]e Y Y Y Y Y Y w M O Ln o m O Y "! Y O Ln O 1n O m O m O m O m O 1n O Y Y O Ln O V1 O V) O V1 O V1 O N O V1 O H N Ln O 1n O w Ln w w r� I� a0 e-I N Vl rl 1- N. N m M V V V7 Ln w w 1� n OO e-I N V1 '-I ci N N m m V a V1 Vl w w I� n 00 �--� N lf) d a a a m m d a L L d a d a a d a d a a d o a a a a m a d a d a a a a a d d a m d d d m d d o_ o a a a a a a aaaa a a a a a a a a a a a a a a a a a a a a a a a aaa a a a a a a a a a a a a a a a a a a a '.... a ri. L a a a a a a a a a a a a �,',,� 7 Z) 7 D a a a a a a 7 a a a a a a a a a a a a a a a a a a a a a a a a a a a a m a m a a a a a a a o o O O O O a0 o a0 o o o o o o o 0 o o O O O O o a0 o a0 o o o O o o O O o o o o o o o a o o- O •O O O a a a a ,..... a s a a a a a a a` a` a` a a` cL a ', a a` a a` a s a` a a` a a a a i d a s a a° d o M a s a` Ul Ln VI Vl '.... VI M a a Vl V1 V1 V1 N Vf V) VI VI V1 VI. Vf VI VI v1 d 1n VI V1 VI M VI V1 ul VI V1 V1 N M Vl VI V1 a VI d V in V1 V 7 7 7 7 7 V) > ut 7 7 7 7 7 j >> 7 7 7 7 7 7 7 7 7 7 7 7 1n : D 7 7 D > > > > > > 7 O > > > > > > > > > > > > > > > 7 p > > > > > > > > > > > > > > > 7 > > > > > O O O O O O> > O O O O O o O O O O o O O O o> > O O o O O O O O O O O O O o o> O> O O O O (D LV U' (D U' 0 O l7 0 '' 0 U' U' (D 0 (7 (D U' (D U' ( U' U' l7 (7 O 0 O U' U' (7 (7 U' Q l9 U 0 0 (7 U` l7 U' Oo O (D O (7 U ( (7 0 0 0 0 0 0(D y0 U O O O O O O O O O O O.. O O. O O(D o'U O O o o o o o o o o o O'. O o o (D O (7 O O. O O p p O O V1 N VI Vl V) Vn VI of VI VI V) VI V) V7 VI VI V1 V1 V1 VI N VI V1 VI V1 VI VI Vf VI V1 VI V7 V1 V1 N VI VI InVl V) VI 7 7 N Ln7 7 7 7 ut ut 7 7 7 7 7 7 ut 7 ut 7 7 7 7 > > > > > > >O 7 > > > > > > > > > > > > > > > O > > > > > > > > > > > > > > > > > > > > O O O O O O > > O O O O O O O O O O O O O O o > > O O O o O O O O O O o O O O O > o > O O O O LD U (7 (D U' (D to � oo (D (D U` U' (7 (D U (7 V u u' C7 C7 (D U' 0 U (7 (D 0 0 (7 (D lV l7 CD U' (7 Q Q 0 to U to ( U (D (7 cC 2 K K OC K K K CC K K K } ' K K K K a' K 2 K 2' K K 2 C K K C i a. a. w Y Y > > Y Y > > Y > Y > Y Y > Y S Y Y Y Y M m m m m m > > v a v v v a a a v v a '..... >-1n m m �., m 1n of v, 01 v, Y •� Y .� .� '......� ,-, u u u u u u v a u u u u u u u u u u u '... u u u u �+ �, 1n u u u u u u u u u u u u u u u r, u H u u u u N w w N w N u u a) w a) w w w w w w w w w N w u u w w w w w w w w w w w w N N u ,�,, w � C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C w w w w w w Cw w w w w w w w w w w w w w w w C> C> w w w w w w w w w w w w w w C w C w wI w w > > > > > > > w w w > > > > > > > > > > > > > > > w w > > > > > > > > > > > > > > > w > w > > > > w w w w w w> > w w w w w w w w w w w w w w w> > w w w w w w w w w w w w w w w> w> w w.. w w le le Y he Y Y w Y w Y ]e Y ]e Y Y he he Y Y ]e Y Y Y Y w Y w Y Y Y Y Y Y Y Y Y Y he he Y Y Y w Y w le Y OC hem O V7 o mO Y ]e o m O LnO m o VI O mO Ln O mO Id O m O m O m O Vl O m O mO m O Y V1 Y o VI"O 0mw w n n w '.... H N mH H N N m ''... M V V mLn w w I� n w �--� N o'-I .--� N N m m V V7 VI w w N N w N L L L L L L L L L u L L L L L L L L L L L L L L L L L L L L L L L L L L LLL L L L L L L L L L L L U U ` ` U U ` u ` U U L i U u u u ` u ` u ` U i U U U ` ` U ` u U ` ` i u L ` u ` U U ` U U ` ` r`o m m m `m r`o m m m `m 1`0 1`o m m m m m w w w w w w w w w w w w w w w m w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w V1 VI VI VI VI V1 ''... VI VI Vf V1 VI V1 '.... VI VI M VI V1 V1 V) N VI V) V) VI VI VI V1 V1 V1 VI VI V) V) V1 V) v) V1 M V) VI N VI V1 VI V1 V1 Vf VI VI O O O O O O O O O O O O O O O O o O O O o O O O O O O O O O o O O O O O O O O O O O C C C C C C C L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L O O O O O O O VI V1 V1 V) V1 V) V) V1 V1 V1 V1 V1 V1 VI VI VI (n V1 V1 V1 N N VI V) V1 VI 0 V) VI M V1 V1 V1 V1 V1 V1 V1 M V1 V1 VI VI J J J E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E EoE E E E `o `o`o o `o o `o `0 o ` Lo ` ```o ``0 o `o `0 0 0 ` 000 0000 o20000000000 m m m m m m m m'm m m m m m m m I m m m m m m m m m m m m m m m m m m m m m m m m Im m m m m m mlm m a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a '''.. a a a a a a a a u__ u__ u u u u u u u u u u u u u u u u u u u u_ u u u u u u u u > i•......> > i. •>,> > Si > > > > > i > !;L >....> > y > > > > > i > > > > > > >. >..> > > > > >,... S> 5. m m m m m m m m m m m m m m m m'm m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C Q a Q Q Q a Q a a Q Q a Q a Q Q a Q Q Q a a Q Q Q Q Q Q Q Q Q a Q Q Q Q Q Q Q Q a Q a a Q Q Q Q a mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm w w a v w212, w m m L L L L Lv a L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L F- F r F- F- F w F- w F- F ♦- F- ♦- F- A- F- F- F- F- F- H F- F- F- F- ♦- H F F- H ♦- F- F- ',. F- F- F- F- F- ♦- ♦- ♦- F- `1 w w v v v v w 2 w w `/ 2 w 11 11 11 lL 11 11 LL LL LL LL I1 LL LL '. I1 11 11 LL I'.. LL W LL LL LE LL Il I I1 LL E 11 11 11 I LL. E LL I 11 LL 11 LL LL LL w w LL LL LL aio v vai r1Ov m a0o �Im N N o'....m o~0 0°10 u^�'.... on to o m.....,^ o a o.''., v`�i n v�do mN o o00o'm,..., .--ilm...''uoi m a"o �........M ry v ,"-io1Oo v m Ln TV ON OV 00 aw n N O)O �tD N HN 1� l0 T 00 .--I wm OV l0 O nN wo l0 w n N V w m H H O V m m N N N N H .-1 m O cf N m O r Ln N Ln O N N r, l0 al m l0 01 N LD W n V rl N V N lD 1� W O N W 1� t0 to V N )--I O 01 N lD m t` W m W 00 N N O) ', 00 W n n lD 1p N V 0) W N I� .ti an '... O R lD an all 00 I� ' l0 Vl V '. m N c-1 h a --I I� '-I Vl 01 m '... n lD N Ln N N H V M N .--I w H w O m N O T n o V N Ln m H m Ln M O m V n Ol H V l0 01 V N 0) V m W 0) V' 0) V 0) -;T O o n M V N 0) w V A a0 00 O N 0) 0) 0) 00 00 a0 00 O m l!) V w 00 ci m m N It H H H .--I N N m m H N N m V N Ln .-i .--I ci N m�t Ln w N H .--I - N m V w n W m �. VT ! u? VT v}vvT of ofV 4A U} MVu^,U4^ vTV,Vk AAuv}uN OO OO O O O O O O O O O CY 0 o 0 O O 0 0 o O O o O 4 O O o O O O o 0 0 0 0 0 o 0 0 0 0 0 0 0 o 0 0 0 0 0 O O O o� O O O O O 'O O V' N O O H l0 .--I N 00 00 d O N r4 N N N M I� N O m m m m 00 PA'S' 4 w %65 O O V V V d' 7 an an 0 0 Ln v) O an O �/) N V O 1� M l0 '+y' r^M 00 LV3 N Ol l0 l0 7 e-I H N N m m "I to m 4n W N l0 O V 00 N O ', V n Vl N O 00 In M O an O V 00 O' W Z O5 Q O N O V t Oy O m D W 00 r 0 W N D O V OD tl r 4 O 0. N m r N O m O m O V o m m 07 O O G A N w m m O m O o 00 M MN N Cw O Ln 00 O 8.7 Vl r, O N Ln n O m O l0 e4 N N ry V V m LO 01 N Kp l0 I� n•f r,0 N 00 M 41 lf1 n 01 O l0 Ln M N O T Pw M N 'cS N M Ln O n 00 O N m I, 00 N l0 O r 00 N w4 N N m m Zt r-I .--I N R) V Ln N tb H rN N T V Ln w I, 0) .-i .-I ri N V a!) N 00 '... m W vT V} V1 vb V} V} m,/F 'LIA VT 8e"b VT vT.., l/? V} v} v} 4A uT of vl,+h u} Nak v} Wr1 iA Ut of v1 VF V! U• ih v} UT v/ vT v} Uti ur VT....,Vl vW vA «")'f "u"M vl''A"1 i!"W N N N N ,`,.1 N N N N N N N N N N N N N N N N N N N N N N N� T+d N N N F! ti"wq N N --- N N ¢;� C7 U' l7 l7" r«..y" rve r+a C„*A k»p CA` h l7 C7 l7 N N U' l3 w7 S, (D ( _ 0 N U" 4:1 k7 !av an ut 4"J _y eere en an an un wn L.°b L"P ".n 493 u'a yr rn an an m v) C7 "'4 t.,7" an u2 nn nn VI un an l7 °' Lra www a,n s.!'p '�sy w 0 >- I � m >- >- N In :.'k O } } Y W ciM CO (O O) c1 J'�k N N N hA gt,*rryM N ym Y4r'�ryy1 p0"�1 �Fp1, t45 M m M a M1d1 .yyC��p'"�,, ��v�gpryry ag' Yy'q' 'e�' {u�yy V, Y >^ iJ9 lf) ppLgq11�y p�N yW uu�Pi, ye�yAr'ggY vb loll 00 0) T 01 O) J�1� J yqy N^"y�J�J{� aJ J J J J ..tly ...A ..NNn J a ,�4 J J 1.wIY�aJ"! .-1 wJ ...J ...tl O Oi O O O O 'A L% Vl '^"�' GAA Vl V7 Vf 7W"V vl "'� A p� V'g V1 MA an L l N ""'� LfM l!N WY wy WM YIY Vl a�N °'"'�. 4/N V) 0.fl VM 4JY u"4 +�^A O OP O O O O a a a an v a a a a to aL a w a r a a a a a) t o u u u u W w , x a ea ca a a a a J r rsx a aw a cx a cr w w w a CY. ax7 w w w W w w a O,• w w w txa w w w a i W Le.r �w w ta, a.a,t w a w a76. w w w w Ww W W O m O Y Y 54 `eL'� Y Y Y Y. Y Y w Y w "„ Y Y Y Y Y Y w Y w Y Y Y �3G, �'�" Y w Y w Y Y Y Y Y ,G, O an O an O v) O 'dC Y O ca^q +:' idk O u'I O Y u? Y O a 'O 0.t'4 'O M•4 O Y �? Y O an O an O In O �"'�.'. 4ry Ln acc/) Vcc1 Ln T m '., a --I N 111 w'Wt 1- N N T M V N t", - w^M H N C^�tl M M V .--I N Ln a -•I 'H N N m M', - c-I N M!'M1 c-I a -I N N m T Cl C G G G i s i s ai e p i a a e d a d ci a d n cs a a d a a d m d a d Q. i a m a a ri v u u u u u aaaaa ¢ a a a a a a a a a a a a a a a a a a a a a a'� a a a a Q a a a a a a a " 7 = cc [ Ci Z Z a'a a a a a a a O O' 7 7 7 7 7 �'� :. O ;'' �'� U �.� U 7 7 GC '.Z Z Z z O) M 0) 01 0) O1 OT) 6 0) 0) O) 0) O) O) O) O) 0) CDO �.aaaa.......aaa0oCc, COD 00 o o o a o a o o o o o o o a O a o 0 o o o o o a .o a o 0 0 0 0 0 o a o a o o 0 0 l o 0 o an an an m ,2 N a a` a d a d a a` a s a` a d a a a a a` a` a` d CL a cL a a. a s a` m a d ai aO fO w m m m a an a` ai an a a an a` w w w w w w V1 N h � D N V) V) V) D M) V) D V) N D V) Z) an V) Z) D D � N a N a V) 5 V) V) V) V) N } } r } } } > > > 7 > > > > > > > > > > > > > > 7 > > > > > > > > > > > > > > > > > O O O > > 5 > > O O O o O O O > O > O O O O O O O > O > O O O O O O O > o > O O O O O O O -O l7 l7 l7 O O l7 l7 U' '.... 17 '(7 C7 V' O U` O l7 U' V' (7 l7 V' ''., U` O U O l7 l7 C7 l7 V' V' U' O U` O l7 V' V' V' C7 l7 l7 O 17 7 O O 7 O O O U yO l7 p 010 O O O O U �O U 0 0 O O O O O U YO (.7 O O O O O O O V O O O 0 0 O O U V U U U U y0 O O O O O O O N N V) Vl h N Vl V) N In VI N N V) V) to V1 Vl N '... Vl V)'., T Vl N V) 1n V) V) VI '., V) V) 7 U.� an 7 Z) 1'� w �'.� 7 c' G > > > � > > > > > > > > 7 > 7 > > > > > > > 7 > 7 > > > > > > > 7 > > > > > > ) > "aa O w w w �0 0 o� o>(Dt9(D(D(D0u o� o17������ 0� 0Lq(D(D(D((D(D O'17,0 0 0 0 0 0 0 0 E E E E E l7 C7 , V' 0 U 17 u U, U` l7 'U U ad w �ta K d' C C K K K aY C K C K K az K K C 0C K K , 2 K K K K K K m, +4 r4 M1S n0 R } r r s r z} r r} r r} >- }>.} r r r r r r o: a z r r} r >- >- r z ,> oc r r r r} r r ro. � N N ry N N} m} m m m m T m m} } v v r } an Ln an an >- an )n U u N N u u u w m m a u v ar u u v a u u u Q a u an n a a u u u u quX nui w q' w )+'emu w w w 0 w 11.1 w> w "c w u', `7' � xn *`3 C 4C c a.a O C. 0' C w C '" c O C c' c �'+ O' r' C c c c'. C O ',, � a w > Z> w a a w c w w w w w w w�° c 0 u w w c c c c 0 c w w w w 08 w >y w' > > > > A > y ,>w`�^ dj a %CJ' > ICC3 ,� w ? ',. .�1 N T VI V) C11''.. i i w w ✓Ad > > �p +Nd y w w w w> w w OU w ON w w a>'r w w w w> w? +.V 0'+ '... w w as i&q w w w w w w w Y Y Y w R8 Y Y Y Y Y Y Y 01 *"^' Y Y Y he Y Y Y T T .Y .O]G ]G w Ne O fO Y O a1O fO n he N m M V N NNm m V Y Y le OY he len Y mOLn O se N an 0- ON nN m Vm OO O O O O O O cc cc cc cc cc cc L L L u L L L L L L L L L L u ',L L L L L L L LLi L L L L L L L L L L L L L tLi ''L L L L L L C C C G G G f0 10 f0 (O N tp 10 f0 N N fO N IO t9 f0 f0 N N !0 tO N N fO rd 10 m fO m fO f0 N IO 10 N N a9 f0 a9 N f0 fO f0 N C C C C C C w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w O O O O O O N N 0 an V1 VI N VI V1 N N VI N M V) T V) V1 o V) V) V1' T T N V) N VI T Ln VI V) V) T V) V) N Vw N Vw N N p:i0 UdN 4A.'.. {W4 tifY nA �3G7 tW: ON RO 04 q@ 4 Spq 0'A mG 00 CAp CMp kMl 00 Otl Ofi do to W OVA w UD to a mo bo bo mry to w still IYdR � a59 IC C O O P C:'... O C C, O O C C C C O C, C C: C C C O O O G c C C O. C C G C C O C C o r O C C w w w w w w O C JO O O 0 0 JO O O O O JO O O O' O O 0 CAD O O' O O O Cw7 � O O� O Cal JW" p O' ri� � JO Cr7 p O J J .J - J ,a. J J J J ..s ..! ,J 0>`l ` 0>`J & ` 0`>1 E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E a a a a a a `o `o o 2 o` o o `o o `o `o `o o `o aIO af0 IO f0 IO a a `2`0 0 o`2 o o o`o`o`o`o fILaaaa- 0 1M (`o 0 . a aa a'a 0` fo`0 fop 'ofO of0 t`op ofO Lv La Lw Lv Lm.... Lmw a a a a a a....a a a a d a a a a a a s u ea v aa' a wx u u tin �,r aTr u � r' u nx +n ro M M Mm am aai Mmm m mra m m m mo mm "m "01010101010 m m au m m a. m m M:. m M m is m m m m m ro m C C C. C C C. C C c C C C C C C C. C C C C C C C C a Q Q' a Q a 'Q a "• Q Q Q a Q Q Q. Q Q a Q. Q a a s 'a a a a '" a Q Q Q mf0 N f0 f0 fO �s rtti m m m m m m m iv ra is +i+ m m m m ac mem r""n rti *� m m m 3 3 3 3 3 3 E Ea w v a w w v v a Ea Ea v a w a v v v v v Eu E Er v v a v w wd w a' w y v w w w w w w L L C L L'. C „C' L '.. w- Y..' AY %^^ k-• H H H^"' h I"'.` r 4- Y- �.^^ ka'. H H F-- 1' z az z K C w w w w w w w ww w w w w w w w w w w w w w w w w w w w w w w w w w w w w..' w w w w w w w w > > > > > > > Y > >• > > > > > > > > > >, > > > > > > > } > > > > > > > > > > > > > > > > > > W w W W W W W w w 9Y.N w W W w w w w W W w w W W W w w w w W W W W w W W W W W w W W w W W w W w w w a w w w w v w w v w w v w mu v w a v v w w w' � w w w w w w' w w w '.. w w w w w w w w w w w LL LL LL LL 11 4, LL w LL w LL lL LL a.L ' Il a9. LL 11 LL LL LL LL m Il LL LL 11 LL LL I.ALL 11 LL LL LL LL LL LL ll LL LL ll l4, Il ll 11 El m O w .-I V o m O O DO o V ci L1 In N M N m O O t0 M W9 V lD N� m O O N r, t6 ID Ll m O N n m in m n N H O lD m N i..r ILn O '! w N O O O M t/T O N N m O ''.. O O- m ih n . O r O O m N lD m O O m o cy i/? Ll T O O m N iA O mm m V O O o Ll iR M m m O ul t\ lD L1...,N O fn m n O O O. m t\ N m N O O -� N 1h c L1 lD m O O N V N T m m V o n m VI N n n o w O tD Ll n m n T c-I o O n .--I N m m m N o O T to M m m m O m Ll V Vw C N M m o N .� LD �µ�y, m to oo . N C �--� N O o O O a m e-1 N All, V} m m N to O m r M V} Ll m m V O O Ll V? V V o r-I LL O 0 N I' -I -vf m m o N iA O o V N ''... VT m c-I m N VT O V N T lr} m Ll r\ rn VT O N m V th Ll w m L7 m i/? O 0 m m m ^IIn VF'...'n, Ll tD m r L V} O O Ll m m VY. VT w N Vl IA 1A V?.. Vf.. n...w m o m t VT LT O n O .-� O V Vl lh 1A n m m V V} O O o L1 t/1. m O a N- n N V i/1,'A m N r` 11 i/Y O 0 0 n c-I n N m C m N, Vl O O 0 0 0 Ll '-I m VD'A Ll m N N N m N 'A w l0 m Do Vl O 0 O i/1 N m N m O 0 O T N Ll tD r o 0 O �^-1 N O n oo o 0 O in. M c-I m o 0 o O In ...� m.m 2 c w w Y Y Y Y Y Y Y Y Y Y Y Y N Y M Y V Y �"� Y N Y Y Y Y Y Y Y Y Y Y N T V K w N C ai d, d, o� a� a� d, of d� of a, d, ai on a, a, ai a, a) di m m ai on a on o o o o a D- � '^ `" � m m m m m m m m m . m m m m m m m m m m m m m m m m m o o o 0 0 o o o m a m » �S ti w N w w m m m m V m V m V m m m m m m m m m m m m m m m m m m m m m m m m� m m C m V m V m m m m m m m 0 O o 0 m N ❑ o_ a w ul (A o>> m O u m n o o o o p 0 0 0 0 0 0 0 0 0 0 i c a a n r� 0 n 0 m m 0 0 m 0 m 0 o .� 0 0 .� 0❑ `i w 0 o O O '-' 'i F o o 0 o o 0 0 u u 0 U l o U cG 0 u cG 0 u 0 u 0 u 0 u 0 u 0 u 0 u 0 u 0 U 0 u 0 u 0 u 0 u 0 u 2 0 u 2 u 2 u u u u u cG u �'� u u u JQ U p U m o L✓ T o T Vl u m Vl u ,� O W F H F 3 0 o '-I 0 .� 0 w 0 m 0 ,4 2 2 Vl Vl 2 Vl V7 V1 Ul Vl Vl Vl Vl Vl Vl V) N N V) V7 Vl V7 V) V7 Vl V1 V7 V1 V7 V1Vl V1 L1 3 = u> V7 VI VI K �' 7 a Q Z Z W W 0 o 0 o O o O o o O X w w LL w a w o_ n>>>>�� O O O O O U U U U V U U U U V u U V V U U U U U U u U U U U U V u u U X Y Y Y Y N N ul ul ul N a M ul D_ O ci e-1 O O z z z z z z z z z z '... z z z z z z z w z z nf z cc z z¢ z z z w w z m z z ¢ z z z z z s p o m p c m a F d a M a n C7 l7 M l7 M a C7 l7 l7 l7 m m m N N sz cc a s s w¢ s cc w s ac ¢ m ce o X Q w O w u c cL E o U c w E m m m m m m m m m m m m m m. m m m m . m m m m w m oo m m m m m m m m m m m m m m m m m m m m m m m m m m c c m m . m m m m m m m m m m m m m m m m m m r� m .� m N m .� m a m a m v m v a r� a r� c r� v r� m m m m m m o o o 0 01 1O z .� ,V a v v v m m m m 0 0 0 0 0'0 0 0 0 0 0 0 0 0 0 0 0 0 0 o E O o o o o o a o o o'o o o 0 o 0 0 0'o a c) o o o o o o o o olo o'o o o o o o m o o 0 o 0 a 0 o o o o'o o"o a 0 o o o o o o w> m t- z 0.. r O 0 o o 0 N 0 N 0 N o L1 o L7 0 o o m o '-I o e-I 0 '-I o f-1 o N o N 0 N o N o L1 o L1 o L1 o L) m m I f\ o n n n o .--I o ci 0 '-I o a--1 m C J Z c G i0 m m m m m m m m m m m m m m m m m m m m m m m m w O 0 z Q iwil . m w w m w m w m w..w m w w w.w w w w w Y w Y w Y w Y w Y> w w Y w Y w Y> w w Y w Y> w w Y w Y w Y w Y r^ w Oc 0 O a ,y Y Y Y>> H N m Y T Y a -I Y N Y m Y Y '-I Y> N m V c-I N m 'r �--� N m d' N N m -CTc-I N m V Y '- C a F O v v v a v v v v v v v v v v v v v v v v v v v -c -o v v -o v o p m m E 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o o o a J.O o ~ u u u u -2 u -2 u u u u u u u u u u u u u u u u u u u u u u u u u y c E o',a a C C C C C C C C C C C C C C C C C C C C C C C C C C C C C C O J a j j ;� E m O a w w E E w E w E w EE w w E w E w E w E w E w E w E w E w E w E w E w E w E w E w E w E w w E E w E w E w E w E w E w E p g m,>>;, c •, E; J w w to w m w Ca w ea w w1� w Co w w w cn w Ca w m w to w w Ca w Oa w w w m w to w tw w wN'' w m w m w w to W w W w w w w w to w tw w> w7 v a a o m m C C m c m. c C m C m c m c m C m C m. c c m C m c m c m c m c m c m C m c m c m c m m m c c mm m C mm m c m m C m m c mm m C m m c m. c O o NyC f N ) a a C w m m cG CC mm G m c mm G mm C m C m c m c m CC m C m c m CC c mm c m c m CC mm G m CC m C m C G G G G G CCGcCC m m m m w7 i`+ > > > . > > > > > >, > > > > - - - - a}+ - a>+ - a>+ - Y - - a>+ - Y` - N - N - Y - a>+ - L uwwi N vuwi " a E ,,. o a v C u u u u u > u > .. u o u o u u o u o u > u > u > u o u > u > u u > u > u > u > u u > u > u > u > u 3 u o u a °/ c c c c a. w .w, 7 o c u o E w w L L w L w L w L w L w L w L w - w L w L w L w U w V w L w o1 w w L w L w L w m w L w w L L w - w V w L w L w L w L w a o w w w w J u = \' t+ \, - _ w w w w w w w w w w '., w w w w w w w w w w w w w w L >>>> w w w w L N c O a'.. N N, L L L L L F >° Y ]e ]e � ]C N c O yo O O O O O O O O O O O O O O O O O O O O O O O O o o O O O O w U u w t! 7 U w C E ` s O c ` u 'i w '., L u E N a Z C C O O C O C O c O C O C 0 C 0 C O C O C O C O C O C O C O C O C O C O C O C O C o C O c C O O C O C O C O C O C O C O m V1 w ut w N w w C w O C w UE C O — L ~ C C Z G m w w w qj C C C C c C C C C C C C C c C c C C C C C C C C C C C C C C t t t E p O tD 0 LL w w > > w > w > w > w > w > w > w > w > w > w > w > w > w > w > w > '.. w > w > w > w > w > w w > > w '.. > w > w > w > w > w w > o U o o o o m' '~ 7 E C w G. wN a.. �' K E O v a v v a v m w v v v v v a v w l w m a v v v v v v a m a a n a v vLi V1 V1 tL/1 I vi o m r4 N u O u w w w N IO f0 m m m m m m m m m m f0 10 f0 fO o` fp (O fO f0 fa f0 IO N (0 f0 f0 fO f0 w E 0 E 0 E O E O C E N w w J c 7 c� C y y V E `1 d w 22w 2 w 2!w w ` N L `1 w `1 w `J `1 v w `1 ww L L ww L L w L v L ` L O V 4 w f0 m m C _ _ J 7 .y 7 •y w w+ oa s w wa m oo o2j m L L F F L F L F L F L F L F L F L F L F L F L F L F F L F L F L F L F L F L F.- L F.-F L L F F F F F F F F w u am Y E E w w u w w w w w w v w m w w v w w v w w, w w, v a w w v w w m m w w �........ _ �_ o,, >,',..> > j > >,... v _u z u co co GGo co co co cco cc0 a a. � ? � a a a s a a n a " %f N co cco G C co G cco C cco G cco C co C cco G cco L cco G cc0 G cc0 G cc0 G CC0 G c0 C cc0 G cco L co C CCo C co G cco L cco G G C G C C G G C a a Q C C C C a a ", a n a a E. Q lL m m O Q Q Q Q Q a Q Q Q Q Q a a. n.. Y m m 3 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m m 3 3 m 3 m 3 m 3 m 3 3 3 o c m,°z- oa op oti oa oo ea w c w w w w w w w w w w w w w w w w w w w w w w w w w w w w w w m m v w w v o mr O O l c ac oc s o cw w m z s z� '', � F F F F LD '.... 0 l7 (.9. (D fa (7.. Q �v.. J .'.❑ w w } > w > w > w > w } w > l w > w } w } w > w > w } w > w > w } w > w } w > w > w > w > w w > > w > > wELm w w >> w w > w }. w > w w haiOo w . w m, w . w w oaOahaw2M. w w v WLO w vv_ o 00000oOo�0�-�I O O O O O Ovawwawaa LL Zll iz LL I1 Il W I. 11 LY LL LL I1 LL LL LL ". LL LL 11 Il LL I1 LL LL LL LL LL LL �.A. LL Ci :7 (:J U' iJ U• U �.I El m m n co rn w w 0o a n n m m� M lO In o m m m m ko In o o m -- o In M Io m� Wo � m m n n n l m o0 m o m w n w w w In m m'm r' m o m m m n m m o N N n n n n n n m m m v v c v In N o 0 0� m m n N v n c w M n n n n 7 w m m n n n n n n n n n lD 7 m Vl Ill w m N N N. n n n 00 n 00 O1 00 m 00 Vl n n n n Ill n Vl a0 n n Ql n n Ill m 01 Ol Ol Ol 01 01 Ol Ol n n n R N Ol Ol Ol lD Ol V G _ to n Ol V Ol C',.. V c{ �,01 Ol Ol 01 Ol Ol a,''.� 01 ,,. Ol Ol m'� N N'' 01 01 Olm.........m,m m m......... m� In o o o o o 0 o o o 0 0 0 0'0 0 0 0 0 0 0 0 0lo o o o o o 0 o o 0 o 1i1 0 0 o o 0 0 0 0 0 0 0 0 0 n o.o 0 co 0 0 o 0 0 0 0 0 o o o 0 0 0 0 0 0 0 0.......o 0 0 0 0 0 0 0..0 0 0 0 0 0 0 0 0 0 0ao o'..o o o o o o o 0 o 0 0. o 0 0 0 0 0 0.0 0000oo0o0000oIri'o00 0 0 0 0 0 O O O O O OOO O O o O O O O O O OO InNOOO O O LnulvOOO O Vl O Vl "-1 In In In 0 C c 0 c 0 0 0 0 .ti O c c O m m c-I e-I r-1 c-1 .ti '-I O '-I N N N 00 M M Mm0 0 mO r-I N c-I --I -I --I N-I N IIll O e-1 c-I .--1N'ti In N c-I' V In VT�tAOthOLTOlhiR V}�ihPV} O'O O H r m Z O O O O O O Q > > 0 0 H N M m m m m� o O O O O O O O O O O O O O O O O O O O CDO O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O a v v v v v v v v m z Z O J U J u J O J N O O Q Q z Q o Q Vl w n r, W w 4 In m O O N N N N m m m O O O O O '.. O O O O O O O o O O O O O O O o O O O O O O O O'.0 OO O O'O o O O '' O O O O O O O v a v v v v v v v �II�II�P�I �Il�ll�f'�II�II� Q 0' Q Q K Q w e^.I V7 M 00 O V lD o l"W v In o . . . r, r, n O o o O O O O O o o o o o 0 O o o .^M O O O O O O O o 8 �r v v v v v v v or wr o ff< co N o o< ca Z N O B^ Q 0 N N N N N O O O O O O O O O O O O O O O O O O O O O O Og O O O O O O O O O O O O •4 rl '-I r-I '-I '-I ci .-I .-� rl ri v-tl b°vvvvavvvvv�:- �� ti ti N ti�� ti N ti � � z C z K Q cu Z c c c c c c O It V K Z '.. 2 Ul OJ Ul Ol N Ul o` rr c z u z a: = z z z c E E E E E E v w z z w z z m o v v v a v w c 2 u z s s Z� rr U Z c¢ Z Z Z z z . 3.',.. ? m t c c c c rr o cD am "p � w .¢ � cc v ov°�c0 0ma iR � uc ar uz z o 0 xa ssa zO E 5o 0 o uo vu ocSUOC *U C C U UpO O O OQU OU1 �zU K uN Up[C1 Cm ,uO sOai UN xUHvoVuo e, om m m m u u u m m m m m o; . vcv v v OOOOGlCJOOOOOOOum O-0O CVmVm C U C vL 0 CH a N "O -0 OU OWNw QQQQQQVXo 0 O m OO' OC _' O O O O U U OC vv.uCmCmCti va"uC U N O 0c. U UU u u O iO O OCL Z 0U Z VU m CL iu u u u 3 -o6•p ooo ° 0)>LLU V U > vHQ > >LL C-mCm-I aItCJIF�7I IF Ii IF I �31 F3sammangsaffal 'IM15415A II � 81I819I8111918- �I�gcu818 c08 0a-V�I�Icr4-6l!_5ll-ll- El In 0 M O V N N M �/1 .-I O M M D\ Ol of D1 r r o O O O O O N of m m w m e O '.. m O r M m m O V m r m 0 tD m o m ID m r ''... m I oa fn V Vl al m r M �--I .--� c\ m m m V V V : �n lD m o o m N O� V w r m r O r m o O o0 I- m lD 't O m w r r m m 1, of V Cm w N r m m- m o w w w lD o .--I O m om of m .-1 dl W lD cT lD 00 N Cm I� m CO Cm w r m m zr m m o Dl r to N N H V u) m V r r to H Vl m m m m N N N m m N O m to m N m V ci m m r Vl m a m r m N m o m m oT N VI .-1 .i a-1 '-1 ',. a --I rl lD a -I ci Vl V1 Vl V r V V 00 e-I m 00 oo W 00 r r r r VT V1. VT V} V) V} V} VT V} VT VY VT L}.....,N V1 IA. V1 V1 V}.,..., Vl V} In V} VT Vn VT'..V? LT'...tA Vh VY-t/1. In In V1.. In In VY o o 0 o o oo o o O o'o o 0 o 0 0 0'o O o o o o 0 o o o o o o o o 0 0 o o'o o o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O o o m O m o V1 o m ul o o o o 0 o 0 0 0 0 0 o N m 0 0 0 0 0 0 0 o 0 o O N 0 0 m o O O o �n O Ln o 0 o o 0 r Lo m N N V r o o m m o 0 to lD O O o O N m m V V ul In V r 0 w O m c-I r o r w V In O r O N o 0 O L' r-I o1 c-1 N tI1 lD ' '-1 c O O.o to c-I c1 ID Vl lD e-I c-I ul r Vl m m m m V} V?...., V} In Vn in V} V} V? VT V) V) V1 Vl Vl..''.N V} Vf Vl V} VT VL VY.''... V} Vl V}...'.N V} VT V? VT VT V) VT Vf V1 VT Vl� VL V} Vh VY VL VI V4 V) V1 VI,V} c� x x= o o o o 0 o o o o o o o o o o o o o u m x m v v m m m m o o U o o -Zr m m .� .� .� ry m o 0 0 0 0 0 0 0 0 o a u 0 o LL o o o o o o o o o o} � om o o .� .� v o .� o f- ¢ z l7 C7 C7 l7 C7 V' l7 O O O O o 0 0 0 o O K¢ L2 o 0 0 0 0 0 O O O O Z o C7 V' l7 2 2 2 2= H H¢ O¢¢ 00 00 N N N N N N N N V ID I- o m tD r oo m lD r co ci V m o n tD r oo m �'-� a -I N N N N N N N N N N N� o m 0 N N M m m m m M M o 0 0 N M M V1 In In n W W ID ID O O O M M 111 M 0 In O o o m m m m m M m m m m m m m v O O O O O O o o O O O o o O O O o O O o o o o O O O O O o O O o o O O O O o O o o O O o O O o o O o O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O o O O O o O o o O O O O O O O O O O O O o o o O O O o o O O o o o o o o o o o O O o o o O O O O o O O O o o O o O o o o O O O O O O O o H H, ti fo ti � .� ci .� ti .� .� .� O o o o O O o O O O O O o O .--� �--� e-I �'-� e-1 .-'� c-I c-I '-I O O O e-I H �'-� O O O O O O O O O O I.O O O .--1''-1 e-I '-I rl ei c-I rl rl O.O o r-I r1 �'-� o o o O .--I e-I v o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 � � o Co'o,o 0 0 0 0,0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 � � � z s z E W W CC Inc E E—" ' E E E E' �', m s c �, E '�, E E o u o E a aa:ieE E Euuu°u 'aZ zcc'z� o<��� Eu0 E o ou au E E� Ala a s o a w Z m z v m... w oo u... a u.0 U a a a. o u o D C9 o o U a L d d c �,.Z + co Z w Z 3 + a U o o l9 0 o N u a E a',� ao ..�. a Y Y a w v v n s o rn m m ° m N....a �o u °'......... °° ,� v z �.....� °�' v w w r`a m m .� ,� ry M v v N m C in o w v N m m m a m� T o 6 0 0 1O c c w w c c w w z o o m .� �n .ti V v ,� -D aa) w m m O O O O O Y a s m Ca aw- Y Y aw+ a s as do O O O m LA c o O in .� V .1 ry m u m m m m m m m m m m m N v m u U u u '� >>> oc U u u u Z Z +� r in a s uu I s >>,.>��m��� m >>>>`Z.v oo`000r�u uu w w C C r r s z v¢ s .. - x o: o< o: = .. +. .. j r a.. a. a a a oa oa w w w c c o o o o o o o= w c c c c m m m c c c U. E E o a n a a a a a a s c, c c c a a n n a a a z v z v z Z w w w w&&&: g m�� g w w w w w -D -o -D -a a a o cc o'o c > .-. D O D O C — 0 0 0 u u° a a a a a a a w w o-- o'o 0 o a a d a a a 2 2 2 2 a a u u U o o a a a a a a a m u L L L L o 0 0 0 �. a _� _m, m m n n a a a a o 0 0 o a o o 0 U, C7 l7 0 V' V' ( m m m a o o m m. °0 °0 m m m m U U a E E E l7 0 0 0 0 0 0 0 0 o F- a v U U a a a x m m m m m m m = x x M w w w .. .. .. .. .. .. .. v N .. L. .i .. o o o ti . .. oa >> L L L L L L L U V � E � i w N w w ay, 71 w w W a) a) N N N L L '... L L ....,. L L L L O U U u u U V V U u U U U V U U '] '� J m oo m oo N N N >> >> 3 3 3 3 3 3 3 a v u u z m v v v v v v w v v v v oc z v w w w ti, y 3 3 3 3 3 3 3 3 3 3 U u V1 Vf �n VI Vf Vf Vf V1 VI N V1 Vf N V1 VI U1 V1 -w u u u u w w C C C C C C C a� w w w w w w w w w w w w w w w w w w w w w w w w w C C C C c C m c c m w w w w c C m m m m m m m w U U U U U U U U U U U U U U V U U U U U U U m m m m m m m m m m C C C C c C m m m m m m m m m m m m m m m m m m m m m m m m m m m'.. m m m 3 3 3 m m m m m m m m m m c c c c o o d a,a a a a a a a a a a'a a a a a a a a a a a a a a n,n a a o 0 o a a a a a a a a a a o o o o u u- - - - - -- m n n n m ' a a a _--- -I- -- u u u u to to N I V1 N VI VI N Vf V1 VI Vf VI Vl VI VI Vl V7 Vf N N Vf Vl N V1 VI Vl VI V1 ~',OlcClaCrC%Cra0c7 C7 C7c71UrrrUUUUrUUUrrM U0C0''CYCYCYc7a El m m M Ol N N &iF Vf. O 0 C7 O O O 0 O 0 VT I1/f tT 1 C.� irN T O O O x'•w mW, m lD c-I T m n N VT in 0 0 O O O O 0 W O N '4d"W V? u�u''�u�u�u0unu00OO000000ay c-1 a, V V O O 0 0 O O '-I .--� t0 M N N N 0 O O W N t/f m Vl O 0 O .-i O M m n to 00 O N r` V1 Q V) m O 0 O e-I rl Olzr M T n 1h O vl r KA} O lD O 0 O N r-I lD W In N 0 O 0 lD G3. Q V lD O 0 O .--� H c-1 .y V l0 00 m VT O O 0 µD V'p K lD Z 0 0 O .--I ti c-� n m 00 lD 00 V a N N',. VT Vf O O O O 0 0 vl l0 M i/f iA Q Z O N I� O 0 0 0 0 O O '-1 .--� .--I O H O O V l0 00 In V? O O 0 O w Lf O m O 0 0 O '-1 O O STY kD ei 0 ILT. a/"x ', O O 0 O tD VT m 'O O O 1 q O C,Ol lD m to ^4f% O O O O AD V7. C qT C5 O O 0 0 NwW O LS7 v^P I�t w te"Y O O O m AD V} Z O 0 0 N 0 '.. O 1p m LNl 'VA O O '' 0 0 lD Vl O O lO O O O 0 0 N 0 O l0 o0 m tAdA O p O 0 lD V} O p n O O O O 0 0 N 0 O l0 00 m VN O p O 0 l0 to O 0 00 O O O O r-I 0 0 N 0 O a 1p 00 m 'CA O O O 0 w iM1 O 0 m O O O ''. O r-I O 0 N 0 H O lD 00 m 'V1 O O O 0 lD i/} O 0 O .-I O O O .--I O 0 N 0 H O lD m N Mla O O O 0 lD — O 0 H . -I O O ''. 0 .-i O 0 N 0 'i O l0 00 In lh O O O 0 to 1A O O N c-I O O 0 e-I O 0 N 0 e-I O 7 O W Ill VT O O O 0 lD — O O m H O O 0 e-I O 0 N 0 '-I O N 00 'l0 M ih O O O 0 V - O O V a-1 O O 0 O 0 N 0 H lD N W l0 M ih O O O 0 V +Jl- p 5�F a,CA +rvl. C; O 0 �yy[[� 0 N O e-1 lD N 00 O m LT', O O '. O O V - O O lD d0 O O ''. O N O O m N N �--1 VT O O O O N I- 4Ca vH Oa, C3 p1 d �yy C N O O N 00 lD Ill VT O O o O V 0 O O 4'tl'r o^tl O O O wM O[O O N p. n�0 O m N N rl ili O O 0 O Nt - V n ' .-a Oy Cy O wyi q;T N p +H µp N 00 t0 m i/1 O O 0 O - 0 O O 00 H O 0 0 0 O 0 N p a --I O 00 N N +^M PdF O O 0 O N — U 00 ei O 0 0 0 O 0 R p '. H LO N tY.9 ka m MA1 O O a O C — 0>.o,yo''u�zoor O O m .-I O 0 0 r-I O 0 N p H O M N"S N e-k an O O O O N — m H O 0 0 0 O 0 N p rl to N Tdl CD 'm, +,d•M O O O O V — O O O N O 0 0 0 O 0 N p I H ID l0 RS Lo 0n N/A p O O O O — O N O 0 0 0 O 0 N 0 H <D N Tdq &D'.' M i^ 0 O O O V Vf O 0 H N O 0 00 0 O o N 0. H NM M 00 V M4, 0 O'O O 0 N N O 0 0 0 c-I H V -d H M V N Qa 0 O In N 0 m I, O 0 0 0 .-i .--i N O N T 0) N N O O O O m N V I, O 0 0 0 ci d' e-I H O N T Ol N *.d"I«''VJ O O O O M O 0 m I, O 0 0 0 H a -I t . -I H N M Ol N O p O m 0 0 m 00 O 0 0' O O O In .� ',. a-i Ol O Ol '. m V} O O O V 0 0 r"a R7b u'D O Wry w-r w4 N N .--I m VT''... O o N m caca'r�cr000 0 O 4, al �OO O' µn H H O V O to '.�.. .--1 V O a C7' %PI n�5 T:7 O O ^^SS��0 W"a r-a H N In O {? M Vl O 0 O 'O � 6�nry H ', 14 .--1 O '''., .--I V} vl to .-I CD O n^I K`.! O Sw7 0 Ln ,-1 m^i OMN tT Ol e-1 N V} O O m N N O O N O O O O O O Ill e-I H Uf m e-1 VT O O O N O O m O O O O O O '.. Ill H M ''.. Ol N V} O O O M O O V O O O O O O Ill H Of M C K ry O E C E fc0 (0 C 0 0 t — Q E Q U n D :R p 0 dM a2, ea a M a .M. K aC p p p rC" w"fl K C C C E E N EEEEE E E u' u u u u v U ik.. �p U c c c c c 0 (D Q C 't'l.. K'.l. a CL Sa. K CC w C w K C O H H O i H m m 2 ,Sy A 2,, v0 C K Z tL w K Z K Z 2 tr ar Z K Z C s rY Z 2 u C w V a G) Ol a w O O O O p p O K Z O K Z K Z O O C Z C '', Z O O Z W Z m O '-I I� N2 C p9 CC ac cc u u u .ti '_' io m to r0 i0 ¢ , rr K a L i s a Z. a o s v io C�. 'op' m v Y 0 0 w t o v dy c .o c 0 c 0 c o c 2 Z— z z m cc z z = z� w z� s z c E� a n E m�, E>> c C", IE Eva C >> amp. E ma Ea C > C o C, �i u N u as m m m rr g a f1 c d C C.�:., C .� C ¢� z z C C m z z e rr z c e m z e s z c a N z a a as 01 m N ec cs,.cd. N rr Ol sa.. a N s „u a H o 0/ C K dr l7 ri cc' C un ?a0 O O a Q a Q v Q a Q a Q a °' a a a a Iti t3 '!- m a m a '' a a Ca a a e1, O,. I 0k. O: a Q O U O Ul � m mW0 oA' la0 Cl r0 0l c c C C c a1 C 5 v C u v u v u v u" av E w a ns E ru "E > a j s rrN E E a m E'� E v rn E"o E du E E v E Q. 4. E E E E Q. E ,Gt. E I u x m o N C v L m l7 �3 0 � a:. O 3� v 0 O O i '', U O U N N C C C C C C c C C v C fY a iCL. 0/ K N fY °. a y C a pl C di ,w 1 •. D.,. N 1' O N O PEA M O m M, O m� O eY5 O do O wn O V7 O Y6ry O nkT 4tl5' N C m O V O E V �..� rl N Cn •- LL N C Gl C O O N N O D d y U '., y O U O U O U O V O O. U a Q O, DL. {a. CL E F4 O.'., E a� O. E to E S.L E m O a0 O m O W W O a0 0 W 0 W 0 ',,, W 0 W '.. O W W o0 O O F- C O H U m � V ', 2 O> a �' N E Ul E m 0 m 0 U 0 U O U O U 0 V Q O O AlQ O O< Q O Q 'O Q O "'� C3 Q P Q O' Q O Q O Q O N N N U O 06 ♦- O/ p> C m in ( J ,y,. µ"�' N `A r•& m ¢,v > m N N T m dAA >> In l0 LD vOi IO L vOi m L vOi N L vOi m L vOi f0 L vOi m L vOi m L l0 L v�i m L vOi m N f0 h N . vOi p yy s y. O N "t O N O N o N O N m O N a0 O N a0 O d)0 O 00 O a0 . O 00 O m O a a a a a a a a a L a L a t a L, a Y ?`.a' "&f ?:. 0 U 0 U O U O U O U O U O V O U O U M1kJ u oa t by t Q7 t 4aH . bxq ,--� '-1 .ti N N N N N N M M m M T M M m M M m m m _ t` __ __ C C <LV N N W N N N CJ N dll pJ i9d nar fi12 N N Gl Ol N W N N W N 46 (41' C dzP c O 4d' O O a O 4�A O uP O 'U' O O' 'V �Y.. O 1 O d O a O C O a O d O C O a O tL O CA. O Ga„ O 4a.. O C'L.. 0 a 0 f1 O fi O a O M 3 O d 3 O a O a O O_ O a O �A.,. g ¢L,.. O �N C O a C O 'I..Y C O '�w„�' a y I.L a W LL o a N ,0 LL w a�� I.L w a LL N a LL W a C�� LL w. a LL a LL n In of In ASl +✓a vl vl In ' In 4"A t✓l v'N vd, In N of en N N u+'h In In u"M k/M1 Ar"4 U"e ul dn yr yAr�ay do u5 U'4 µn[cr aeraecxe�eresatraac�e�e�eserere�esCrctccrrtrtrsscaoe� crrA^^a- F-- t^^ h"° A" IH X+• F- d-, 4^^ F- H H It M d' O Z E L 0) El lD n m o0 n m rn o o �n m m m v o �o o .� m m rn o 0 0 o rn n o m m m rn m o o N wm n m n m o o 0 0 w wlD 00 00 '7 to N N N c t IA m V w wm m Ol N ui O N V 1D lD o N M m In In Ill m N m m O m n rI v V V V Ol m V m V N 00 O o m m n-tr R .-I 41 n m oa V n N lD lD Ol Ol m LD O O n zj.IA tD lD m O O N c-I 00 N n lD LD W LD 00 ci V N ci �-1 ci N V7 Vl m m H O w N m OD n" o n N m n V w m w w -;I-m N 00 n w V 00 m m W N o lD .-I m m '-I OD N IA m n T m N '... V m m '... m V n w .-1 Ql lD n V- - .-I e-1 NLLIn e-I 00 n m oo VT iA, 4P1 VT V? V} V} V} Ln Vl VT Vn V} V} VI 11 lj} V? V} V} VT In V) VT In VT Ll Lf V} L}...''.V} V} V},tA VT in V1.. VT V7 O O O O O N M N O O O O O O O O O o o O O O O YO O O o o O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O o O V1 o V1 m O1 o o .-I lA o n m o o o o m O O o o o o o V1 O m o o o o o cS u1 ll1 co O Ln O o o o o o o o o a-1 IA N r-I N N N O l0 IA Ol N N m M V 0 V7 O N '7 m lD V O IA O O n n 7 N c-I t o LD m O o o o ''... N c m V N m w e-I m LD ''... rl m N lA m n a O N Il) D1 m m Ifl 00 tD N O 00 n v O O O O N e-I e-I e-I H N N V H M IA' .--� O O O O '.... 00 00 00 OD VT 1n CA V1= VT V} VT 1h N VT'.V 9fA UY V4 '.'G"F In V} V! Vl''... V1 V? in VY VT 1R iR Vf V) i/T V? �, VT 1n V} iA VT VT 1n VT VT V} V1 iR VT VT un VT VY. VY 0 0 0 0 0 0 0 0 0 0 0 o y o U o U o U o U o 0 0 o o o 0 o o o o y o y o y o y o y o y U 3 0 0 o o 0 o o m o o o m o o u o y o y o y o y o o o oio o o o o o o o u o u o u o u o < O LL o o O O O O O O O O O O O O O z O z o z O z O O O O O O O O o O O O O O O O Ot' a N O O V7 tD N m� to ID n 00 01 ei N A rl '-1 N N m' M '7 C o n Oo m I O ci N T V lfl w t0 1, n 00 00 m m O O O O O .-I .-I .-i r-I '-I e-I �--� N N N O O O O o o o O o o o 0. -I . -I e-I . -I e-I c-I '-I '-I �••� ti r-I '.I c-I .--I N N N N O O O O m m .--I o o 0 o 0 o o 0 0 0 O O o o o 0 o o o o o o 0 0 0 0 0 0 O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O o O O O o O O o �cN, o O o O O O O o O O o O O O O O O o o o O O O O O O OoO O O O O O o o OO OOOOOOOOoO O O O O O O O O '... O O O .--� ri '-I .--� H H H e-1 ri o ei o o o o .-I '-I o o o o o o e-I .-1 r-1 ri .--� .--I '-I ei .--I r-I '-� .� '-IO OO O O O O O OOOOOe-Il rl '-Iti.-ir-Ic-I '-I '-I rl ci rl r1 c-1 c-I '-I H c-I r-I cOOO rl c-I '-I.--I a-I.-i r-I0000Doi -I --I ti H O O O o o O O O O O O O O O O O O O O o o o o o N N N o o N N N N oN o M �. ci e-I rl .� '-I ',. '-I '-1 '-I ei ', e-1 .e-I r1 .--I .--I .--I a�-1 O O O O O O O O O OOO O m IA n o m u•IVl lfl IA lf1 lfl lfl N N N N N N N N N N N N N N N Nr-1 ei �-i ci ei a --I -I K K K cc Kc C G w w E s a, s Im z'.. oc w e a°Ji �.... ac z o a°0 z z o z o z s z E zg Az s�o z2��z��r m s E ;r, m o: Y s o: s o: u m 3 z 0 00 l7 m a c � � > `° , c o v 0,� m �= 3� z m z c cc v Evv Z vv Evv K K K C K C K m C m m C C m m C C m m C C C C C C O1 N o z s a a m °° s rr z z z a o m > >> 3> >> o o o o u u E'v E Evv E Evv E Evv. n 3> o m °° a3 a �° c c c c s m m z m w w a ar a m m m m m��� ma� a a o: o: a a� z a a�� o m v a z °: 1L7 v' en o •,� a, e o a` i v v �' � v v �' v Z• � v a a a a a a a a n a'�� a. a Cl a.. ea oD oa L- .-I v o c c c c c c c c N ti n v c. E m m>> m m m m m m° E E E E E E E E E E E E E E o 0 0 o a c a a a a a a a a a a a a a a c 00� o >-O °0 ai�va E Evv E Evv Ev Ev Ev Ev00000000000 000 0 o Q. a o f v v o w m a! w m m' v v U U U U W W >¢ m in l7 a s 1O a` a` z m a` d s s a s a w a s a oc N N M M M M> lA I> I> lD lD lD lD U U > a a a a a,. a a a a a a a a m o0 oo oo m m m m m oo 0o m m m++++ m m v v •- � oc oc w� o: w� °� o E E E E E E E E E E E E E E EE E EE o 0 0 0 0 0 0 0 0 0 0 0 0 o z z z z a a U L3 O m O ry a a a a a a a a a a a a a a a a N N N N N N N N N N N N N N 0 o o 0 0 0 0 0 0 0 0 0 0 0 0 0 o m a a a m m w m N m m m m N N '... M M V1 If7 lD lD E E o> o 0 0>> 0 3>o >° m>>> >.> > > > > > > > > > > > m m m m m m m m m m m m m m Y Y Y Y o 0 O 0 0 0 0 _O 0 0 O O O O t 0 0 0 0 0 O O O W m m m a0 m m m L r t t L t L L L L L L L L o o 0 0 U U U U U U U U U U U U a N N N N N N N N O O o o 0 o o O d d a a o_ o_ a o_ o_ o_ a o_ o_ o_ O O O O _ M .--I a -I .--I H r-I '-1 N N N N N N N N m m m m M m m m M m m m M m U U !` ILO (0 I`O f` f` f` I` v v v v a v v v v v v v.3 o o o o o o o o o 3 D o o o o o o o o o o o 3 o o o 3 o o 3 o o c o r..y a a a w a m a m a m a a o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0° o 0 0 o Y LL LL LL LL LL LL LL LL LL 1A.. LA.. ', 4l.. ' Q. d a O_ 1' a o_ O_ D_ C O_ '. D_ O_ a 0_ a 4 4 a 1 D. O_ D_ 0_ a O_ a a a a D.. 41. d D_ a 0 0 H H H H H F aaaaaaH H . aH FN- HaH aaaaaaaFaaH aH H H H H F Fes- H H H H HaaH. Fa, HaHaHaHaHaHaHaaH HaHaNFa- HaHaHdaMa It M d' ti O Z E L 0) El oco � o lO O O O O N O VT. V) m&n o o O O c-i VT w o�rvo M Ol p o o 0 o 0 O O O p 0 o O O VW Vf V} r 0 0 O In .-1 V1 v 0'0 0 O O N V} m O O O ^a"4 N o O O N VY m m a v m m M m M M VT N v o M N v VT....'VT v� O M N v m lD ID lD V! o m .-f O V} o 0 o o m o ry N .--� N N N o O O O VT VT V? V}'. 0 O N O V} 0 O N o VF o M m 0 N o m m o lVb o o V} n' m V 0 o 1f1 '. Y,/k o Vn V 0 tniA o V} V 0 0 VF 0 Lon o V1 o V} 0 O .--i V? o 0 L1 V} 0 0 o o '- .--i V! V} 0 V},, 0 o e-i V} 0 Vt• o 0 - ^L"G 0 V? 0 o ti Vk 0 0 VL VT 0 0 o o VT V} o 1Y^r 0 '.. O V?...'', 0 uM o O Vt• 0 lh o O V),', V} m o V} d,nT m O VT ri L? v V� V! ti V} t Vl..,..., v in fn Ol V) v vl. Ln aj Vf a V) m M V}''4A a Lf- Lo a) t^n o fn V} o 0 O O O O 'O o O O o 0 0 o 0 O O O O o O 0 o O o p p 0 0 0 0 0 0 O O O O O o O O o O O o O o o O co co o ✓.mY O O 0 o O p O O O o O o o o o o o o o o o o O O C'J O O O O o O 0 O 0 O 0 O 0 O 0 o O O p O O p O O O O rl ll1 o p I� O m O .�I O N N V1 lY Y O .--I N N o p t+l o V O V7 O M m 0 p O 4i9 q of N m m ^«i V7 an W O M,a , 0 o0 lD 0 lD m 0 0 O cn vl lD 0 I- m 0 O N 0 O V 0 m w O{ Kp" c-1 .�-tl rR5 0 v ',. 0 0 M 0 c-i 0 m 0 N 0 6 0 N ''. 0 O 0 o0 O a6 p A p tN O V O V O O O O O O O O O O O O O O O O O O O p O x-# tt4ii2 p p O O O 0 0 0 O O O O 0 O O o O O o O O O O O .� p O 9 O O p. O PO OC7 O o O O O �y o M tli C'�i i O O O O .ti O O O O O O O O O O O .-f O O O O O O O O. O O O -I O O O xWtl IrvM O O O p „3CY rC f p O 1:. w"d .^tl rw .-I 0 O O . -I .-I M m 0 0 O O O O ti ti O 0 O O H l0 .-� O O o H O O O o m O. O O o V -I O O o I� O. O O o Vl O O o h. O q S,.1 0 spry O O o an an O C"5 F.l` l0 ti O O ''. O a -I O O o O O O O o wo O O O O O O O O lD a^# a^i wo m^I tD A# Tir# 4O a -I O O e 1 O o wD I, n O O n O O n o o n H H Vl H � H ^9 c-I r4 '.4 v^9 Ln 0.YN Ln nn "k rU w e +"1 o H e-I In e-f c-1 In H H •^I r-I V1 Vl H c-1 V7 H '-I V1 O O vl e-I c-I m-i. w^'4 r^# •4 a-d -4 m4i O O O O O O O o O O O .--i !"I e-I H ci .-I '-1 H . -1 H '-I ti ei .-i -1 ,rp r-d m^d -V cd N a -I e-I '', ow O O. r-1 e"I ow O '-I ow o O O O •^I '-I N O eW p H p rtl O O O e-I N r-I O ci O 'i O a -I e-I r-I .ti e-u N +W wX xM � N ' In e-I 0.Pi O O z-i N rM m, ? M O m O O .--� '.. e-I In an Ln In an Ln Ln Vl m nA 6d'M Ilw. v-N l!1 o lfl m e-1 ri rl '-I e"I r-I '-I rvi � +^M � ci '-I e-I a -I ri rl e-I e-I �-# '^I W rW H e-I '-I '. m oc D aC m Cc cc 2 2 z� m K m C13 2 cc _ m m H :] .�-� 17 a ti m m co Z a C j Z Z CC m m C- m m m tRd C7 P `~ m 'o 9Q8 4D '-' y +-� m `."� 2 > O J y LL m m CY Z pY T a1 al Cp t 4 Py '`° #n 1m.7 . -I U N U � 4 J 0, '.., z d v m +�+ in V1 ) r #i C o¢ U Z m is m e t# e4� u u '` cit m m tW] H m tU an. d' m ¢ C R '-Ii '> v1 ° an. '.s- O Z a ' m Z 0 m �+ z+ s E c E uvi c m o(D?m w Mm` c o s c7 v �+' E, a m m m mzZ z m m s Z E u w v o .°1- in c �a c> L. 0 Y z u y ° rm ::7 ca,❑ J m` in C7 H m n mwc s E z E as Nv o m C7 o v z u m cc m m y E c nWs a r"sea .ti e o e o l7 v e ° c7 .'. E o$ o E ° p EO 4 w "' v ti v e � u j e z u u oD d_. W ua a "e^.. o 0 0 m m m O '.. a m O m m N —' 7, N N va Z '9d' o j U>> u J 7 u C„1 E v O m O cu o (9 o v ll 0 .v. . a U = N c ca°aa �{'' c v�mv✓ 7 7 m 7 v 4d1� v o� Fq a m r v J u u y v U 7J u u Ul y v v J a V � y "O n O y °. ° an g ra R a pp w m a„ °" C:a ra a c o c 0 c 0 0 N 0 o J o 7 o yUj m 7 L o v m u u_ .� u. u_ U ` -y 70 aJ ai Jo Jo w E '- Ul '7. :3 v e c ti? o vi vp a ,E E "q u u o. u a m u in u m U N u m u o '-' ti , y Z 2 w v Z m '> Z v w w fn E .• 'CY u o U m w u U . v ac w N f m m u m NL m a a N ... a _. ' ,' w Q w "u r` N ,? Y• nr kWk r`. C' U' ui U w utu au , w u :C c } "C1 171w1 > S `! vA 4A ary U u N ,n N M 5 rsr ter. ar7 < ci CY fn N N m m c� w c saw i ,c ua '.. %, ¢ w U wWr 0 'C m G w m 0 s O G CC 0 a > CY > CY Gi,. va ua J an nn () nn v r 6U1. . .7 > R'.7` "a �C. u�a ''.., on, n w m � lua w d' 0 m '~~ems-~~~~~~~~~~~~w YUUCYdCY'C7CYUUUUUCYUC7ClO ~~~~~~~~~~~~~~~ UU cf 7O cf CYUCYUUUUUU~~~ aaIcr ~~~~UOUdC7''C7C7CYCYdUC7C7 Ln ~ N r ~ ~ ~ ~ ~ N ~~ ~ El v v m 0 O V V O n m m m N M m M m m M O Ol O M O O O\ N N e ', m V V V V V V V M O O O O O M T M 1� n n lD tD UD l0 In r! ... LQ "I V1 M V1 N V V V V M M M m m m M m In N N m m 1� w lD lD w lD w w V7 m m M M m �--� O N N a V V a w t0 l6 66 w l0 Ol M a V m m T m m m m m m m m m m m m m m N N N N N N N N N N N N N N N N M m V� Ln Lo Vl Ln Ln Ln O n n n n n n V1 Vl VT V? V? Vl V} V} V} Vl In Vk Vl V1 1n V} 0 0 0 0 0 OO 0 0 0 0 o oo O In o o o o O o o o O o'0 0 0 0 O•P 0.,0 o OOO OO o o OO o oo o'o Ln Ln o o 0 0 0 0 0 0 0 0 0 0 0 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1� n N M M to m w w m m m m m .--� N m V m m m I- n n n n n n O O O O �/1 O O O O O O O In �/i V1 li I i -n O N N N N N N N N N N N N M M 0 0 Ln O W LD W �O W W W I- n n n n m iA V/ VT Lf VT Vl to VT VT Vf'... V1 iA VT VT N N V1 in "... UI V? V1 V} VY VT V} V? VL iA V} V) V1 V! VT tn, VY. Vb V} In VT VY VT Vt V1 V? V) V N Vl VF O O O O O O O O O O O O O O O O O O O O O O c-I O O O O O O O O O O O N O O O O O O 0 0 0 0 O O O O O O O O O O O O O O O O '. O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O o O O O O 0 1 0 O 0 1 0 O O O O O o rl m m V V N N M N w '... m O 1, w 111 r, �-, N I, M M o w o V e-1 M M V o C V1 M M M tD I, m m M c-1 W Ln W r� m O M 01 l!1 O m V n l0 m C I� m V lD O r-I Vl w m In N N N w In Ln lO rl �'-� �-'� N M I� O N o '-I '-I M V V V O In In In o M ci o-oo o o.-ioo. . oo oo-000. o. . -000o o-0000000 00000 o co, 0 0 0 0 0 0 0 0 o o o 0 0 0 0 0 o 0 o 0 o oo o O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o 0 0 0 0'0 0 0 0 0 0 0 0 N 0 0 0 o 0 o 0 0 0 0 0 o o o o o o O o 0 0 o 0 o o o o 0 o 0 o o o o 0 0 0 0 0 0 0 0 0 o O o 0 m o o o o o o o o o o o o o o o o o O o o o o 0 o o o,o o O o 0 o .�.,.,.-,o o 0 0 o o'I o o 0 oLn o �„ m m Ln m m v, m m m Ln Ln m m w m m o m Ln w a m m Ln m m A m m m m m o o m m m m m r, I m m z L .3 v c m m 0 to a, w o c ar u T m z a Q1 m > m m v a m n o m ,, m -oZ - m u ar m oa m ° x m z > m a00i m w z z Z m L a m �n m . z m m �e 3 3 a Y m m c m E a v o -o n c d m D: a m m y ovo z o '� a0) 3> i m a n. u i v O° o Y a a. .OJ m E c `w y'v o a a > o z m > m O m 'n " Y 3'� 2 0 in w o v w m e a m V m a E O m L c z c > N y c m a lL7 v c �_ `" a a00 w m m V C °m° c> o° z oa o 3 3 3 N c m v o o o_ o m `-' ti c m a`i 1. 'n m m> c m❑ v `� u° -° 3 -v Y m v Z a Z v U > m m Y �. m O L d N O C 7J m� C C CL' C C C C a (6 Z c Q v m c d m ¢ (3 'o w c> Z Z c w m m m 7 m w c z v u Q o, o_ m m v `o v p v? p d c? m z z v C7 Z `-' aJ ° � O a ° o `m o v a o,¢ ¢ v a ° a blD o o w ° Jo o v as a s ` a v° o° 7 a m v m a y •„ v u c ¢ ❑ o V❑ ¢ ❑ 5❑ g 3> m m❑ z m c 5❑> > m m oU ? u¢ m e .� > m o m> c mv¢ n m>° O>> J ° a o Z> c '� a m o c n n n o v c" v (7 v v a L v -o v ..... c> v v -o c> o v -o -o y v, m r o u v v ar v >> a c c 1° L fO 1C N v'~ 7 0 O J 7 7 l7 J J N 7 J O - J 7 7 N N N J J - - W 7 o .. u o o v o o o E v''CO m v O o m 3 0 0 o E m m L E o o v¢ m m m Y ° u- " o u v -t u u m u Z) u u y z a m u u D c o u u u y m m in ❑ u u m io v o o a v a a 3 i. >. i• u in -O O Q U D_ U o U v v U V a - aJ a/ a1 U 2 m O N 0 L L L� v�i ¢ a m w v01i > w +' w v°1i Q" E v�i w w 3 c c> in in w w �v >' ¢ Q m> a a a in c av a ,n a v, a a a in �n o v N a a.. v �i a a a in �n in .° o u a a. m v v v v� a Q 2 x x Ell m a m m m m m¢ m m¢ m m m m - ¢ v v 7 Q Q Z>> 2 vc_ c c w v al m m v- m aJ a! m-- Y .°J. m m m - - +' ♦' m> a.+ m +' �' C m C C m m> m C C m >> C C C m m m "O V> C C m> ._ >>> m m m G m D' m m C W❑ �, W O W❑ W O W" W ❑ 0 Q a O W W ',. o d d W W W❑ o o - Q Q d W W❑ d> d d d❑❑ O O Q❑ O❑ W Vf ''... N VI VI V1 V1 N VI V1 N V1 V1 VI Vf VI V1 V1 Vf N Vf Vf VI V1 N Vf V1 V1 V1 to VI Vf to N V1 VI V1 VI V1 VI N � d d C7 d d d o d d O d d d d d d d C7 d d d r r r r r r r r r r r r r r r r r r r r r r r,r,r r r r r r r r r r r r r r r r r r r r r,d d d d d •''dddrlc7ddCJddddd0'ddd'ddddd El 00 m�0l OlYM O1 "^I N�"^-IU^ N N�N N MIM 1Z -zj- "ll"I �a��' ID�I'O ON 1, m (n 0) 0) C) 0) 0) M ����i--I V�O 4z*' N N .lD-I�N 01� l'O� III 00 C...,m olr. o 0 0 o m o o 0 0 0..0 0 0..0 0...0 0 0 0 o m m o 0 0 0 0 o o..-il !Hlo o o� m n ri m m 0 o o 0.0 o 0 0 0 0 0 o m o 0 0 01 o 0 0 0 0 0 0 0 o g v o 0 0 0 0 0 o a a v o 0 o o t. r m D o 0 o N o 0 0 O .-d 0 0 0 0 Ol O O O to vl yRtl. vl Vl O O O O O O O 'o Ol to M 0 0 0 0 O N N N M N to tD N m V M O vl O Ol O O O N N N M V all Vl In Vl m an W lD n r` O O O O O O O O N N N� O W N N n N O lD r, o 0 .--I c-1 '-1 rl r-I a-i c-1 ei ci N "--I N N N N N N N N N N N '-1 rti wi ei e-i e-I H Ln r, ©©��©�®�I�I���'�Y��If�111 W ��! W iY'��©©©©�©®W iillCLi������lif.d131(i.'�i©i•Ji�®©©©�©� 0 0 0 O 0 0 0 0 O O O O e m O 0 O O O O O O O c 00 0 0 O O O o 0 0 0 0 0 0 0 0 o 0 0 O 0 0' O O O O O OO O O O O O O O O O O O O CO O 0 O O O O O O O O O 00 O O O O O O O O O O O O O O O O O O O O 0 0 0' O 0 0 0 O O O O O O O O O O O O O O O O O O O O 4 O O O O O O O O O O O o O O �'.} O O O O V7 N lD H e^I r�aDy fitly T m Vl T .-1 M T lD CI1 N C:"Y 01 O N N lD E N O .-i N M N V lD ati r- M e-1 N T '', Vl lD m ".? r-1 M M W O O tD N r+1 Ktk .-1 O 4n O O N N V O O m-N N m u'1 V. -I N 01 V O O O O O O O r' m 0 0 0 0 0 0 0 a•M 14 R` 0 0 an o O o 6 O 17 O O o o o O O O O a O 04 o O- o O o. -I O o O 97 O O O O O. O O o o o o o 0 S7 O O O O O O 0 O O O O O O' O O O O O O o o O O O O O O O O O O o o O O O o o O O o O {�7 o 0 0 O O O 0 0 0 O O O o O O O O O o o o O O O O O O o O O O O o O o 0 o o O O o O a C.'0 ou" O O O O .-a "^^� "� 'w' "'-� O .1 .--i O O O O SO�py O O O O O N .-a O o o O O O o .ti .•-� eH e-I a7 o o O O O ' O .�-I .~-I O O ''... O Cam:- O . -I e-I .ti .--� O '-I.'-I +^N rM '-I O "--I e-1 O r-I '-1 '-1 ri r•I O . e-I e-I ',, .--I .y e-I .-I e-1 e-I .�-I .�-I .--I 9'^l' m-d e-d O O .--I O r'1 '-I r•M wW r-I O '-1 '-I O u) m 4 N iPb Vl vl Ln vl vl Vl r` r\ r` f` n f` d'w l+w f� m m ul vl rn o rm� axa cry m m m m m In w an a.ra vl In In m rn In vl vl vl vl drr O ,� ntil w*d O O O .--i ti ti o o o o O O OO O O o .ti .�a .•-4. N N ti o N ti .� .--� ti ti . -i .y . -i .--1 .� �-a w, MMr .--i .--� ..-i .� . -i .-4 ti .--i .� .--� ti .ti .,w .•e .--i .� .� 2 s o o o o m tl9 m c Cl E m L t C L O C O E c v E o E w � na � m ' c � c om uar '� m � F mom•E H an 0 l7 a'm Z O,w In c' l� O o •� E ,o � o R0 C j C N — Q N ¢ C Q to 7 C cy C a m o V U m s E In 0; k r O 3 In O v v a v v v m 3 m m V L N L O a L G U C zn al ali z 7 W c W rc r rr Y 0 3 s z N m s u 3 v x O Z v°l :3... o... vc o c '� cc'o c u w no ¢ s s Z o c m c aj 3 v m E c O s� �'-' x .x z ¢ m ae o w 4 x c m _ Z v w+ u m z 'r z¢ LL „rs c rr a ai m m z s .� c c m— aR as O z 3 v v v E c ¢n o" m v z z rc u z c Ij o -as c m 3 rm rcm z 0 0 m m Ru'. a� Poe c z c m m au Z E E `4 • z ai :� w w ro ems c c u v 7 3 3 a rs s s `y W rc ti N a0. ,1 $ a tx tvx x's z a4 m m "o E m. E m ry a cc �'t". c cr m ma c ay c e u ,u a'3 c cvv c m �z c� o m Rryc nn� s m m as U 0 l7 >> 7 m m m c z¢ mr c rc aay 'au. ,... av m m m o 'tr u ar cz rcuw v u u a`i a` o z ac ma"... E c v ai c ec ew v U LiP VLF toy PA U C v O 'kF m C G O Cm k'4y CLflF a6tp k'A to vl G vzxx� a a a .m ay "r Z Zug mu 3 N'r. N c ea •u va v a, v u o� o ,O 'y S E c c' � oS v 2 uv v u _u v E E o x '- m v m al o o oil o'J o2S o� ¢'�,.a m o_ ca v vl 7 o c 7 o 'p ` o to — 2 7 — c J v v a s b pa C u 3 v v ¢ 4, m m z wa u v v O .. f0 ar 7 7 c E C' ti� E E' .v. " >> °^ z yr c c 3 c c o io y v vl >7 c N In In w!.a. E g J u vl vl In o o w o I..'o o is o o c c 4u •c m m m m _ O .""+" u u 2 �' M1b1Y mm 2 2 2 C 2 m '.,Y r'Ob. C C .C; to i O O O u .0 a; y c 3° rs. ¢muo-o u, w vvvv'c c E W OO MW'P, io ylp m m a4) .0.. > "Yy rU 3 J O O m Z ' �_ " C CC. K m wu tU as - O O al al N aJ C7. �• K 'O u u u u in o o ¢ c5 ae.^ '° :. ¢ m Q vl o `o u^M m w w w w m m w. c�. In `^d' m m m E E G `p m ',, C ',, '� m "tiro wn L L 7 � C C K 7 U .... .,n tr aC CC K ' Zoo o,zso"00>QQOOo0ZzuacuKun w nwomwcwa¢��o UE915MLI 8i 8, ll88888 wOO-'87 Urt-u-b45588. 88 o urC-rw-1pCwOUUUUg�9ClonN�o �m,� nnnrrInd v El O m m m m to tD M n 0l 0l m m a0 m n n tD O M M M M M m m m N n m m C m Kati m e m o l0 m m w O Cl m N 0 0 to to M Ol M m tD tD C C N m N 0 Ol `-I m m M n M fn m M m rn M N O n 0 to to C a --I N O n N In m m w m n n Cl ;a. n m Ol n m O n a v v N C O ti 0 6 m m m m C C C C C V C 0 ''... m 0o N m m m Ol r-I N O tD n n N 0 0) 0) m lD to 0) N n n N c-I a --I e-I N 0) m n to C C tO m C C C C C C C to tO to n n n 0 a m V. N tD 0) Ol ati m m C to 0) m lfl t0 m Ol c-1 n - M a-i ci N N N N N N N N N N N N N N m M M M M m M M C C C C C C N to 1p 1q0 AA ab V} V} 'n A Vl V) VT 'n VT Vl Vl V} VY VF V/ V! VT V} Vl 1/T V} V} V! In VT Vf V} 'n VT VT in 'n V} 'n V} V! V} V! L1 Vl VI Vl V1 V)'VI VT 0 0 0 o O o 0 0 0 0 o v o o m! o 0 0 ry O o 0 0 0 0 o N n o v o o a ti m o m o m D o o to to m o O m 0 0 0 O O O O O O �--� O m O O tD m dl 0 m o n 0 v tD O a --I Ill C O O Q1 O O O O m m In to O O M O M H n o 0 m m 0 0 0 O O O O 0.- I M m 0 to to to m o m 0 tD rl N O O O C m 0 to n 0 0 N N ay ati N O -CT n tD Ln Ln w m Ill to Ill Ill Ill Ill m w n n n m m �--1 N M Ill Ill n O o N C Ln to n o O n n Ol O r-I n N M a-i e-I N N N N N N N N N N N N N N M M m M M m C C C C C C C Ill t0 t0 to Vl V1 VT Vl VN AV) Vl V1 ......., Vl VY V} V}..,..' V V} In VT VF Vl VL Vl 'n Vl.. 'A Vl Vl VT Vl Vl- V1 'A Vf Vl Vl V) Vl Vl 'IV '... tn VT.. V} VT 'A V} ...., Vl Vl Vl VT...,. iA V} www m. O O O O O O O O O O O 0 O O O O O O O 0 o O O O O C O O O 0 O O 0 o O O O O O O O O O.-I 0aH .O-I Oa -I 0 .-1 0e-I O CD o o O o O O O O CD O CD O O O O O O O O O O O O CD O O O O O O OOO O O O O O o O N_mCmm1m n m CV w m C N I, N d. w lw M m w O w 0 W I� n N I� C I� m o I, 1O,, Cr', On On O uOl Oti OamOOOOOOOOooOOOOOOOoOOOOOOOOOOOOO OOOOOOOOOOooOOOOOO to Nl 0 -- 0 0 o CD N N O O O c, ul m c, o o m O C o 00 0 o 0 O0 0a00 co, 000000oOO C O O lDO O O O O O O a00 0 00 ti O O O 0OOO OO OO O O O O O O �C) OOi O O o 0 O O o o O O O O O o o O O O o O O O O O O O O o 0 0 0000 0 0 0 O OOO ar-.rtitirO O 0 H O O O o O O O CD O 0 OO o O 0 0O o O -o H 'i ,CD CD O 0 oO O O O O O O O O o O O O o H 0 IlIl Ln Ln LnNm m Ll IlNIlm o n n n n m m m lto llm m N m lm m m m m m N m m m m mNm m ll m H O O o O o O O O o o O O O O O O O o 0 aO 0 0 a..atir-O O O O O O OOOO OOOOOOO O ooCDOOOOOOO O OO O O O O O O --ti ati m o r Y U L m of m c m n m 0 al E L C N p L ° E w O t o C E n E'm a F n CL m K 'w 0 '� C m oa m r 0 r c m m o `o v o 00 o c M UO p cn an m 0O ` ❑ N o i'j L C Q K 0 c_ K m Q Z om0 C C 0 ,- ¢ a/ u aJ 0 C c c m m cc� Q N bo Q E a m o }? o E E n m 1° O l7 oma c a a n v o n u O v •N 'o w •3 vl v n m + U O M" O L c Inm y m a 3 v a ° `o o t a `o �-2 V E w v E t U •� p "J J c a p 6 u J u Vl K `1 y C K OC a) IE CL p v E = w to aJ C OC a ? N oo fL J c�c [1.. o) v p K N C 3 C C Vl Ln 3 n v x o° no w y a m °3 a z m L x z > a j p e �e v o c o: CJ u m y O °: I° v w o. o c a m al "` `° ar o `° «; z., rr m li m �' m u > u cu s w u° �,...� a m +°1' w •E aaJ 7 Z........ c= o a 3 c z 3 c c J wr'c �',> g Zn O v a; m s,a° v -0 ° �, 00 y K u p o ',,. > N C Ol O/ K •U a c c K C c O O_ C .0 o. CQI m m m C N .� m U U CL aJ J W Z J m 3 Q C p0 ¢ u oo — .. c 3 c c> r z ¢ U on m 3 a w x 3 o c m x aZ ° o o 'n o z v w m v c cc z z v N z° V1 m' U ¢ n O U v�i U Y a o0 Vl to K 3 z? li ` u m c C O C c N C c m z K c U c E E a m> a v m rr Jo c a0 a° x '- > Z p m m m N ._ s m E m z z n a ai z E> E m❑ m c.7 .. o c c J m > L `° " `° '° x c z m °O L al X — ar c= a! a u c w u a m m— o_ z v m O O ut U ' 'c 'cn ;; c O U ° oo a V Co v oo oo. ar .. m a c V) O N m Q a n a Q c z m e m¢ c= N j m O E m U c .+ '" C Y N 7 7 7 m O C C w o M vl N Cf N 3 m o. m L N +'G 0_ oo c m 3 C In m j •- o c M c °- o m E 0 0 0 m m m s 0 0 O p> x to ,3 ° r 0 0+ > c m E In fO O m L a z m o f0 mILI u❑ a s ❑ o mllu a a a a 3 a a a v a v a 3 a"as v a a aO o v a=OC 6 K a¢ Q a¢ U OO O m m N N of � m al ¢ 0 a al J—❑ N al a 01 o— °F ° c Ima tm6 I�0 u m v x Z O Ida O m c N m 2 IdamZ> >> >> O ar U m 'c -cam c c c c c Q c c c c c u 3 0 c 3 c c 3 >wvo o o m m m m j vvwv d d � In Ndr�'r`d/lr�dl'r�dlr`d/lr�dlr�dlr�dlr�d`rd/lr�Clr`dIlr�dl,r�CYlr�dlr`dIl r�d 'rd^- ,Nrc7rdo VrOVrdIr d d Lrmc dO NrUrdo 'rdn Vr0 rA Nrrrn rn VrNrVrrn rn rn rn rn Vr dldddddddC7 dddd'd El �-I l° m Rn 9 LCY In m m Vl l0 fn N N V Co v IT w R3" m' m Vl V O m m m Vl bC) Vl M m m M ',, m m h .-i h M Vl w Vl rl w m m V 7 5Y aq m m m t/1 l0 l° w h m W M 'K[ 'rH w M ap,' re^9 acr h c-I w M '-I c-I .-I 4aA '., VJ M O m M .--I O N m M P• h Vl CT m N c-I N rcn M tAA N 4% m w N VV M W'7 Vb O N N N h a M O m O O V) m h W w7 O I N M h e-I m a-1 m dl£Y tl'k e-I M w w m N N w an m a0 w LY] Grt4 �,• m w v o O O W tlM. N lD a V7 V7 w V w V M m 0'+"' V lfl Vp W "rcT n 'X7 I,'V7 M."k V V V 1 h ri N. W m••A' m' M' +i 44 ifw o *8 G V' ff 11 - ' m 4✓Y. A m^N a•y N ', uti .^•N N. m w-d M h - m h mwN t/1. +JM 4o'°k MJ"4 tidy iIY r.PM1 RF'W u"w 14 in a/f V) vl of v? "4 Vt V? tiff Vb V? to U"n u'n to 1^ '*r+? to an tA vC iAh vn +I7 yr %fn VI• Vn 4/'b /S h v` Oft V5 0 0 0 0 0 0 0 0 0 o o 0 o 0 0 0 0 0 0 0 0 0 0 0 0 0 o o 0 0 0 0 0 0` o a o o 0 0 0 0 0 a o 0 0 o 0 0 0 0 0 ca o ea o o 0 0 0 0 0 0 ¢a o 0 0 0 0 0 0 0 o 0 o, 0 o ou;r mo n uiv vo o czcao r,r' o0o0000000 uim ov o000 000ovi N m , o � a m o v v� o cw cr o e oo o o o N ra N Lo o� w 't w w m v o w Q n Li, cs; � oo oo ry a N wvoowa" cn oo vvr c o mh v hwac m d el+ "7 m M '-i m ao �•w �i' nr, axw an I an I cr... in an wrw 'u-µ w'xnn arp +rr '' . _ u"w +n �'n � +rs <n .n �tin. vs, •gin va u'�- w^� ars ar« a,.ro wro vas Arr �r an an .n +n in +ra. u u u u u u m `14 6o N w 40) O H'. N m' R Lf0 V V) V] k'*" alk m 0 e-I N m n�'1 V� V1 w 0 a-1 m m 0 0�5�y N m� V) O .-I ry N m mE4- inM M 4P5 m M ++i', m y $' v a v vVI In Ln in wo 1n lD V7 l0 V] V7 tDw to 14' w w 1p to h m �I m m m m oOOo O oo wrs un In u-avMnrro an fn ui m fn fn u� i,ry v1 m m m fn in m fn ,� ,Vw .•"r .� ,� ti .� •Y ,� .� .ti .� m m m m mmxmm � .�14 .--i .� .� N ti .� ti .� .� m mr�rr �avvv o o 0 0 o,ca o00 0 0 0 o00oo oo00o000000 00000000o C+p N N N N N N CW N N N N N N 4 4 N N N: N R N N N '... N N N N '.., N Md N P4 N N T`1q N N N N N N N N N N 4'+0 � O j � a z o u u I "'" as ° sJ v E o� w w �' E Z; c c ac v aui v tj !� c" d ' w 'CCooae E m E E 0 CE u vo o v o pu 0 , in v 12 Q 0 l7 c w a U U c J c o x x x x x 43 ¢ �G7S > `p w '.W lWEer.o x x JOA op.pE E wwwmcmc0 0 E E c a E Ec -0a-a_6 E E qj� W iCL CL0. N O$d c >O >E u ac OCoEco °° o 0 EoEEEE OO Wvv' E c o0 C O oC w al v v w7 p ao Ea6 o w w vw vw 1 0 o a -0 '�e C c C ccc cEccuu u w a a v a J o J J J 0 `s = J J J J J, o` o o ca is Ea as a v v u Uu v E E E E E E E E' E E E E E E c ti W w a 2 i v J w E E° o. 0 o v a v¢ y a u u v u E E E E E E E E E E E E E E u o o y a ¢ p p a o o -E c a w fn in c c c � u u u u u u o c c0 O O O O O o O O O O O O O O m a• in a1 +' O U' d w W U-0 V O O O O >> vl fOn '., to U U 4.3 U hJ U U 4„� U U U U. U U V —0O u V U ut a ut ut `` ut ` y `y v `y a`r `w a`i v ara WA 0r CJ Q w C E c •` Q w J J J J J J J v a n s o 0 0 0 0 0 0 0 0 u u u o 0 0 0"° v°° ° E E E E E E E E E E E E E E E p u In c c o o u u u u u u u a s so a o 0 0 0 0 -0 E a� m u u c c c c v v v E E E E E E m ro . p O 0 ad al ;6 !a d `1 v `1 2 `1 0 s 5 3= j j j j j O' C' C' w N �. QI C C @�' 9s qS "61R N O/ a1 Z V U? a a a a a a d a a V u V V U u U U U u V V V u uxu 8 U, � Ip1 2 w U u vn -+ wi un n 0 In E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E EIEE E E E E E E E E E 0 0 p o 0 0 8 0 0 0 0 0 0 0 0 0 p o 0 O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 p 0 E 0 0 u u u u u u u u u u u u u u u u u u tx u u u u u u u u u u u u u u u u u u u u u v a Q u u aS m a Cuai a s a a a a a a a ai ai ai a ai ai ai 0 u ai ai 0 a a a a m a a s m a a ar W. a a u a u u u u E u u u u u u u u u u u u u u u u u u u u u u u u uu u u u u a '+,.+ u u 0 0 o� O O O 0 O O O o o o 0 0 0 o O O wCl O 0 0 O O o o O O o O O 0 0 O O O O O O O O O O Yi 2 2 O O ar qr r. v w v a) v m al v v v v v v uT""ir v v al ai v v v v w w w w a v v v v v m a v v m mr a v P—q — — — —— r 6h 2w tl% VO5 4✓ lPp In to to '... N "tn to 1 4NW a 1. "6 V1 Vr..U1'... to t/�1 N�1 V11 In to N�1 uYA XA KAtl CI'll In o ''. o V�1 to 1/�1 In 1/�1 In In Nm1 A M Y.�Ro LA en...... nn El w N T W c-I C w w Ol w .-I Vl Ol lA N 111 1� N ll/ w w Vl N r� n n an l!1 O1 Ol Ol Ol Q1...n w M DD v N o m m w M w Lfl N ul 1� to M M lfl 00 N N N I� V n N N N a-t N M M M M I� I� m m I� N DD N N .--I N 00 C N V w V Vl e-1 w N N C c-I I� t\ n N N to to T l!1 T to n n t\ w r� V w w w o tD w V N M w 1- n n N n n n n N I� r w w I, N I, w w w w N I\ V V V V V a w oo w w w H m m m m M I, o O Ill 01 ci e-I w V1 .-1 '-1 .-I .-i lfl rl ul lfl N W •-I H lfl w N N N oc of I, n n n n n N N N N N N m N N Vl �Il ul Ill Vl Ln ci rl `i ci iR Vl VT +h to In. ih i? Vl V} iR ih ih LT VT.''...LY iA iR LT V} Vl. Vl- N N..,'ul ul V/ Ll Ll Vl Vl Ll Vl iA V) 1/7 to Vl Ll Vl t/f'N VT N N in LT'... Vf V1 0 0 0 0 0 0 0 oio 0 0 0 0 o o o o o o o o _ o 0 o 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o o o o o 0 0 o o o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o o o o 0 0 0 0 0 0 0 0 0 o lD o w o w o o a o m o o o 0 o a0 0 oo o 0 0 0 o o o O o 0 o o o 0 0 0 0 0 0 Lll o o o o o uj o o o N o N w N m w w to W O w O M O m O m m as O oo 0 0 0 o o 0 0 0 0 0 0 0 0 m O H O O O o O N N w rl ei N w I, r-I •-1 '-I '-I w rl LD w N m H '... .--I w m m M m O C O O C O c O m m M T V1 to M V Lq V rci N m m M W LD W W LD LD Vl Vl ill N. ill Vl i/1 ''ln in in N''...tM1 1/k i/1 Vl ih iA Ll Vl Vl t/1'... iA V} Vl Vl iA N N Ll to i/1 Vl Vl ih U U U U U U U U U U U U U Lo f� n oo ow Dl Dl O r-I .�-I N N T M V t M Ill w l'D 1� 00 Ol Cl H N M V Vl w N W D1 O H N M �'Zt Zr In - w I, - oa -- O'. O O o O O O .--I H H e ci �--� .--I . -1 '-I ci .-I .-I .-i c-1 ci e-I N N N N N N N N N N T m T T M M m m m M M M m T V V V M m m m M m m m m M m M m M m m m m M m m m M M M m m M m m m M m m M M M T M M M M m m m M m m m m m m , m M M M M M M m m m m m m N m m m m m m m m m m m m a -I m m m o o o o o o o o v v o o o o o o o o o o o o o a o o o o o o o o o v o o a o o o o o N O N N O O O O O O O O O O N 'O N O N oo O N O O N O N O O O O O O O O N O O O O O O N O O O O O N V � v N O v O O U U U C c .Q ° .E v v E E p o C w 7 v E c E E c c U U C al W Oa by C C W❑ C C w v C C N aJ na 0_0 O O w 7 oa m. j o O Q O O c l7 O W Ul C U U O C C C C `O C C Ol a1 Q Q. O O a s O C C C c +' O O O O n Q .'_^ '-o g p o o v. v aj ? a w x-- v v a a !-^ w Tl c u' v v v v O p m LO Oa ' u u _ _ v •v C � v-o io w w w w O O p al w '^ '^ O o. a o a v o p o o c,... c = ? `w `w a a 3 3 u u a. n w -- w' a) ana . v v o p Q Q a o o a a> > cL '^ n n' c °1 `w `w .E E cwwvv E E u v avxx o 0 3w y Y.E.E po = ` C C E N iwil - O 7 w al w c u V u O o w w O O x x C C C C l7 a w W _ n Q. 2 2 l7 a w w 7 7 ` - yv, Y O > > O C .Q .a .Q N c h0 0, 06 C6 tp `al o_ w U u 17 Q) c +� o 0 0 L v v v v n. Q. ao `a `o `a `o 00 __ >>> m n Q `o 0 6 0 o `o O aw+ -c N C C C C c v al w-a }' +-' m m N❑❑ O O v al aJ v v v C m' U' C C C C al ,O O O O > > w v v v v O O '^ W w E + ++ 'a+ i+ O O N w V V u �' t' L v v v v m m n Q n n, Q. O p C C Y Y Y Y E E U� - W v w al L N O O Q, Q Q Q n Q Q 0_ ----- ,� w i. O O V U U U v C W W w w C C C C n , Q' M Q. Q Q. N la •- --- - al w aJ Ql v v- W a w w > v N o a o o E ° o 0 o c c o ❑0 v v v v v v u u u u u u C av D_ a s o_ o > a a o 0 o >> u u u u u u w w v v v v (D D •- - :: :: v v '. .' c o E o o o ❑❑-6 v v v -o v n Q a. a a. n o v v m oa m m c v v C7 0. a' w w ,�,� w w O 0 o o v v v v v v n a `o_ a `a. n _ .� u Y Y -O p in v� V V E C C .-I L L L L L L D] CD D7 D] m m v _v __ w w v `v - v v �''....� a a w O c c u u u u u u m m m m m....m v o- E E o o 3 o al a c c c _ v a Q Q c== °°---- n v0 0 0 0 0 0° c 0 0 0 o v v v ,E E w w>> a Q ¢¢ m m a w m c c c co -->> » E E v v� v v v- v o 0 0 0 0 o o o 0 0 0 0 7❑ Y Y Y Y C C C c N Y - .- v v E E U U U '.. 7 -p V l/l V V to 'v V Vl Vl V. V Y Y U` v v v v a w w>> c c c c c c c a a a¢¢ ¢¢¢¢¢¢ O O O O w w 0 0¢¢ a v v v v v v v v v v v ro > > > > ¢ ¢ w a a v >>>> v v v v -- m m m m m m m m m oo,. u u u u u u w w m m E E E E E E E E m a o c c a a a a a v v v o o a o 0 0 0 o c c c_____ u _� _ o o` `o `o `o o `o 0 0 `o o` `o 0 0 v v v _v u u u u u u u '.. u o 0 0 0 U U U U U U Y yw. aw+ aw+ aw+ — 'y� Vl VI N V1 VI N Vl N VI VI Vl V1 C C 3 3 3 3 w a a a a a a v _ I >>>>>> m m m mm m o 0 0 o u u u u u u u �vv v a m o m m to . Q n v L c c c c O O O O O O o O-o-o-O c C C C C C c to m. a I a]U U U U U Y Y Y Y LL LL LL LL LL LL u ¢ ¢ ¢ ¢. ¢ ¢ ¢ ¢ ¢ ¢ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ W. W LL E E E E E E E E E E E E'E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E o o o o 0 0 0 o o o o o o o o o o 0 0 o o o o o o v o o 0 o o 0 o 0 o o o o o o o o o o o o o o o ai ai ai ai ai ai v ai ai v ai ai v ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai u u ai ai ai ai ai u u ai ai ai ai ai ai ai ai ai ai u u u u u u l u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u wO O `o o` `o`o o `o O `o `o 0 0 `o O O `o O `o o `o O `o `o 2 `o `o o U1 U1 UJ O/ OJ N U/ N 7J N U1 N '... U1 Ul N Gl Ul U1 N UJ 41 41 U1 U1 W 41 al N G/ G1 N U1 Fu O1 G1 OJ O1 7J G1 Gl G1 Ul N Ul O1 Gl m m m m m m m m m m m m m m m m m m io m m m m m To fa fO IO 70 fa lO to fa Ia Ia fa R (a lO I0 fa IO IO m m m m m m All V) Vl Vl Vl In '.. N N Vl V1 N Ul ✓1 Vl lIl N l/1 N N Vl w w w to N Vl vl N N N Vf N N F/l 1/7 Vl Vl Vl Vf Vl Vl l/1 Vl VI VI o Vl m A/l El M QO N w n lD e-I n i/f VT 0 0 0 o W W c-I al u l7 N m v mmm''m 00000a O O m r-I tA& 0 a o1 V P'I U (D M v m of M lD Ol m V +A 0 o O O c w R V v to r- n N of . of iA 0 0 O O c w 01 V1 a m N n 1!1 In W f1'1 oo VT 0 0 O O 0 N H lD s m c-I c-I n VTmL-n n m VI. 0 0 O O 0 t m C+ va m r o V} 0 0 O O l0 1A W v m a V? o 0 O O lD i/? m v m'm N V1 ul V? o o O O W Vl O n V1 m oo 7 V Vl '... V1 Vf VT o 00 o o O O o o tD ID VT V? c-I N In In m' m vvvaavvvr ooc0000Ooa n N n N 0 O 0 m 1A m Ln m n N n NNm N 0 0 O 0 m, VY n m rl Ol 7 '-1 iA 0 0 o N i/? Ilf In m N '.,. n N n N 4✓} o 0 0 O M i/? '.. N m N V1 m V Vl re+Y 0lo 0 0 o lD VL to m N N oo 01 N Vti 0 0 CT N V/ O1 m N n m; m *4" ..:-f i, t+A.Vlth o 0 0 OT m c-I VT.,.1A O n m 44 N N W N N N 0 0 0 N .--I r m ,w N n M m M V e-1 0 0 0 o In .--1 N N n r'r" ,� N n m m N 1� rl i/1. 0 0 0 o C '', oo .-i iR m n m .� �' N a -I m V ei .-i Vf 0 o 0 N ci N q• n m rw N 'i m V ci e-1 V} 0 o '.. O N H 9d`M. to n m .� 4444 0000000a't� N e-I of V ei ei in o 00 O N a- 9J'Y lD n m .1 N '-I ❑1 7 c-I e-1 i/! o o N 'i FJ4. n n m .� N rl O 0l ci V of e-I r1 '.... rl r-I V? V? 0 0 0 o 0 0 N 0 rl N c-I. V? iA W O1 rn n m m .� .� N N of V Vl n Vl w"n 0 o 0 o O ID.. ih O o0 m .� '44 N n V m m N 1� ei MT'1--', o 0 O 0 O oo '-1 tA'... .� oo m .te N e-I m� V V7 V n m tiPT o 0 O 0 O O. <D t/f m g V n lf1' uw 0 o O 0 O l0 iA g�vg�'. n" C m m N n '-I kPY o 0 O O O a0 '-I ih moo m,m M yr N of Ln t � n Ln do o 0l0 O O O O ID V} m V C n Vl rA 0 O O O lD iA me ar Ywf to Dl w o0 Ol N N to 0 o O O O V N VT n m N rl of 111 o � m q/ 0 o O O c O LD V}..'..,1A 0.Y'NmlDv oo m -a N N w of O of -4 .--IN Vf 0 o O O c O N rl era rm g44444' �NNNNNa000aO N ID D1 c0 w Cn N to 0 cr 4:! ry C7 c¢ N ti!"F m m N N H Cl 7 In V m VT 0 o 0 O C O to y, m m m N N w O o of Vf o 0 0 O O O N c-I a m m m N w m V r VT o 0 W a mrn m m N c-1 01 D1 rl ".. N ci O o o 0 0 0 0 N N a-- V W"b. +JM m m . -i m N N m c-I o O o 0 0 N d' tAS m m mmmrr00000'o' v N n N W 0 0 O O m ifx m m N co of O1V 0 o O O C N c-I i/1 rn m N O m� 0 v N L1 rn avr N of 0 o N a-i i/T f'+Y a O o' U O, c w C E E _ gqyypm :�. ? dam' ri rJw C C O > O w Qa G ,..... -.Qj o nE rzoa o rry o c own m`a rru,. Q' E' j 01 E r ,E c 0 as ._ w ,-....ca. v v cz. w v Eo v Em E ° E.' I'' c •gip o v w v E v E on c• `EQ p_ a E v ¢¢ E v " -o c v v w or w o v c o '.- c p ;. c ° as a a s v s°� w" p E o m z z t z �1 zo ao g o f o o E m m o z o o 00Y c) o E> u o. o.. W Idyl W "6 � A W m v w � O ," O ". w7 tl�R O V.'O' rw O .-i `q O C7' a- 4Yti - O ".^_ O O '� 'O' C O a a p ''"" "'", v a• IT�ta q u Ca o a, o E o v :^ - m .--. m m m - m W W E a `m a hia psa as r10 E �x E .0 w Qo o a w y a Er w t w r m ^ o ^ao u Y n a w in y y C'r o o .m o o C o y p r o m z e v w s v- 3 a w c W e c yo Q m c- c - ._ c E E E o u n v '"ea n �p to 4 .. n "ta n -o a v a a v a v a v a a m c 3 `w v w ro o m n w w w W o u 4 G1. O u :3 a O u J a O a o o p H :: w ;�' a :: 7>> o o o o>>> o 0 o 0 v o o a o m a o a `o m a w 3 c 3 c n aQ w 49 m> a a a m ao u u v u u a> a/A 4fV U1O Y Y O ,ram^ Ol qy W of '>' 45i O O O O m m m a CA C i'C' D, C � C C W u_ OJ u G1 u N u 91 u 0l +L� u E E w 4W w Qi w w w C>> '' 0 �' O'., O Z Z Z _u Cam" .n in C y w ".ed'. J J ccO 2 �0 a tPfi 3' LA a0+ IA s0+_ M VI a0+ Vl � � � ¢ +[� ¢' ¢, pZ Kj, K[, �',", Q VI VI V1 N 99tl U U �. ... e/y U � VI U U E rE E E E E E E E E E E E E E E E E E'E E E E E E E E E E E E E E E E E E I. u u to u O u O u O u O u CY u O u o u p u o u 0 u 0 u 0 u o u Qa u o nr 0 u 0 u 0 u 0 u 0 0 u u ,,,. 0 U 0 u 0 u <a u o u 0 U o U sa L? O sr O u OOOOOoo u u u v u UO.E o u 0 u u u u u +°e'M u u '''. u u a ww u ''. u u w u e'en Qe w u w u w u w u w m u w u w u m u w w as w u w '.., u w is Q m U w u w u m u m u v �. u is U . '' u ai u ai u O O o O o o o "O O O L7 O 0 0 0 4 0 �y.. 0 0 0 O o o o O o e O oo o O o O O O O O x.n C C] o O O a to; w as v v v v aw""'i v ar. w. * •� w „O Al`r"a w ,. re -- .".. —m. — `. w bJJ' Ul 151 qY N Ul Gl '... OJ W OV O/ N Ol 41 41 m.N qP'7 W ''., Ol h t A u"0 - Vm'B 1"1 m L✓q g In � . emiv M1Ia 'A aNy V7 WS1 ryN m S,I m to m VI m N m N m m Vf In m to m N are 4dk m Lh m a/a m 1n^I m N!4 m U°D m tCY m N m Vl 76 N m M m V1 m m t/r 4fp "mq"•. 4Aa Mm i/n m 5Pq mm CA1 Adl El N Om) O) m V O0 OOl Ql N n m m m Off) ILD n ei L!1 V I••I Q1 m N Ol I� rl O N m I� Q1 O) r oo c-I N w m m V M m m m m M e-I m lD O) m W Ol I� m I� O N Ol I� N O V N M Ill IA Ol Oo tD N .--I N I� t\ a I\ O) IO m m O) m O N I� m m O V m N Ill Ill m O to N I., m w .-I c-I ul N vt n Ol Vl I� f` lD rl lD LD C m m m c-I m w W Ill N O W o w I cy Ill 01 I� N M V O) Ill I--� IR V � V 01 N Iq m Ol a-1 Vl Ol o Ill m O) Oo I -I Oo lD O Oo N V7 O cq m m V O) O) ci O T m W V V Ol N .--I V V LD m 1, ... n n V' n , W ., I� M V V W ID 00 N O) I, '. rl '-I s-I M N V 01 m lD O W 01 Ol I� .•i V lfl � V 01 m .--I V e-I m '-I r-I n w N Ill V1 Ln e-I '-I N V N M I� n a M m lD C N N V m m m w Vl a) .-i N.. IO o N m O) M rl to r-I O m M I, Oo O) Il'1 ul ci N Ill V rl N Oo N i/1. VT Vl Vl V}''..,1R iR in in, N.. ih LY in M......., t/} to Vf t/F LT L} V}...'i. Vl. tN v! VT V} VT'.... UT In V)� in In V) V1 1A 'n ) N ah ih N VT iA iA.. N 1A M V) O oI O O o o 0 o O o 0 o o no o o o O o o O o o o O o o O O o o o O o o o o o O O o o O o o o o o 0 0 0 0 0 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0'0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o o o o o o o o o o O o o O o o o O o o o O o o o Vi m O V e-I m .-i m o o o o O o 0 o o o o o o o o O O o o o a o o O O O o o o o o o o o o o o w N o N m I, to .1 w V I O o O o O O N N o o o o o o O O O O O N O o O O o o 0 o m o o Ill o o o o 0 w In O .--� I•-i .-i M N O O o o o o o o o w O V O O C O N W ''... W a0 r-I N I o Ol M lD lD ID N '-I rri U N OO o V m N r6 Ol L6 N O O O O Ill Ol a e-I tD Ol N f N V 7 O Oo ci M O) C ei W e-Io W O) d' 1� O Vl lD .N-1 NOo V e-I C 00 N v m .ti m t/f 1/f to iA N N I1A iA to i/} tA.. iA to 1R 1R ih th IA in to Vl iA in,'.N N to to iA., VU iA. N in N V .AA 'n V1.. i^ v1 iA Vl to to 1A V) i/) iA 1A Vl.. ri N T a m 1p n W IoIN m V o w 1 m m O ei N M a to W n W Ol O '-I N T V IA ID I� Oo Ol O .-i N m V V7 ID n m m 0 0 0 OO O O O .--I.--I .--I .ti .� a -I ci r-I '-I N N N N N N N N N N T T m m m m m mmmd' Ct V 7V aa v v v v v a v v a a v v v a v v a v v v a v v av a vvv vvava '-I c-.--I cvvvvvv v o 0 0 0 o O o O o N N N O OO N N NO O O O O O O O O O O O O O O N O O O O O O O O O O O O N N N N N N N N N N w H C w u t O o o w N o U m O o O N. 01 ON o+ Ti V O O 'mo' o C O o O O V ! V Ln cq w O O O c c O O O c C - > � u u u j u u u cbI a a n a a a o `o a N Q¢ Q a a a ¢ ¢ ¢ m v j o E a` a`) w -a v v a o o o o a.� c E n n n (7 l7 l7 w _^ c ,o `o o (D n ¢ Qc w x o v LL F c o o 0 0 o w m ai w w w c o o o o o u 2 3 3 u u w L L L L = L O C C C C c p o a u u u u u u �O p w w w O A. x OO 00 Ln N vl N Ln Vl o al w OwO OwO c c c c c c c c o n w a si2-- In o u ` •` Z N N + f- o `o w w w w w w L v m O o o N O1 o E o vw a) vw x 0 > W x oa oa as E E E E E E v a `p m m y c c o w m c c c>>>> >> v) u a c c rr `m m m v m m o o u u u u u u o 0 o f c c c c c c c o¢ Q Q Q Q¢ y w m° o 1- -o > j C — C j w w w O O `w 'o 'o +� +� Co ` m a u O .o o E E E a to w? e o 0 0 o `o w o w w w v v a t0 m '' o c} w w w v c c m m o u m m m N p m m w c w •v "O -O w to m m v v t'' O O C C Ol Ol U! 7/ Ol Ol ¢ O m m m Y v y O m m m Q Q O w W p Y Y Y '- m u a m c c c u . Q Q u u u o o c E E u u IA a >7��'�jj L o. c= c m c m c u E m m m N IA In LL~ I- u o u m m m - o 0 o 0 0 a m o¢ E H v vl w a>> o` •`o_ x U c c c c c c A a a a `) c p o u u u u v .gym - r o - a u u u p m m c c v o .o o o o o w v v v c :° u E E u m >. w> w a oa o- O 3 °° c c w w a` `m v ._ Y v o>> w IS u .� H a p O U a a a a to IA w •C Q¢ VI V) wl m m C" C O O O — Q ¢ Oa., Y Y p u a� o E p H o o o m vl In - c m m m w v v v v v m C > m m m m C C c U W W W W W W w U U u m m w U O IA a -I M a H H F H m w) V 1> .w �., m w m w m p c v 'v v v m m m -o v -o v -o a m m on w w u w w C. a u w'. c c c c c c c c c c c w w w w� c �.....� m p c c c2 2 Io --Oa ao ¢ d O d 0 c w w w o o o c p o o 0 0 0 0 0 m r . v v v v v v Y m m m fo v a v 13 -O '6 'O '6 V V C 1n N N N N N u W E w w d d d N Y>>>» m D>> v v v v v v v v v v v v m v v¢ Q Q¢¢ Q ¢ Q Q¢¢ m m m v v v v v > v v a v v v m w D o p o 0 o E E E E E E m _>>>>>> 3� o,m' z s z z s'', z s s,rr rr m o A n vl n a a a u W W w W w w 0 22 2 m m m m m m m m m m m, E E'E E'E E E EiE E E E E E E E E E E E E E E E E E E E E E E E E E',E E',E E E E E E E E E E E E E 0 0 o o o c o o o o o o o o o 0 o.o o o o o o o o o o o o o o 0 o o o o o 0 u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u N a/ aJ ai al al N w u al a) aJ u u u v aJ aJ ai N OI al al al al al al aJ ai ai ai al Ql u al al aJ u u u al u u u w ai ai ai al u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u v u O O O O O O O O O O O O O O O O O O O O O O O O O O O O .r 2 .ti w O O O O O O O O O O O O O O O O O O O'. O .r 4- N wwww'wwwwwwwwwwwwwwwwwwwwwwww,wwwwwwwwwwww,wwwwwwwww — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — -F. m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m N to M IA N N , to V) !n N '... N to N Vl H V1 N VI Vf N IA N N IA an V) N N '... M ✓1 IA N VI VI '., All t/1 '.. N El 00 m tll m N aD l0 10 w V ci m l° n' .-I n n n n 00 00 - N N m m w '-1 w m co . N O% W M Ol �--I , e~ M 00 7 00 n M N O N m N M V '-I O aD Dl aD O H O 00 n Ol 00 N .ti Ol n M n W n a v c t Ifl N .--I M n n l0 n lD O N a0 O n M N n n lD O OR Ol N O 00 aD a0 00 00 rl H m '-I n n aD a O 00 M 00 m O (n 00 � , N 1* N ID D1 -ZTm 1;31m Cll (n O Ol N N ci .� al) c 00 D) N V N 7 V c0 n O V n lD N N m V V) N m w Ln M ''... N Ln ',, .--I .ti Ln V1.,tA Vf in u). 14 VT ih N iR VT V} iA VT L1 V} to '.V} iA N N i/F V1 Vf V} Vf +/f V?.,tA N Vn VT., t/f V1 A^ d/4 1J%,. N L1,{,IE to LF VI VT. tA. N, 414, iA aO m o o N N m oN � `°OD � 001 � Owl nOo'1 � O O O O W O 0 0 N O 0 0 I 0 0 0 0 0 0 0 O O O O O O O O O 0 O fo' O O O o O O O O O O o O O O O C�o O o O O o V1 O CJ C'a (,ry.li O O K� O O O O O O O O O O O O O O O O O O %+1 O O lD O Ci C7O F9 O O O O O O.O O O O O O O O O O O O 0 0 0 0 o O Ci o o 0 0 o co O O Ci 0 O O O O O o O N N N T lD c-I N 0o V O V O% ' A' a^% C' �:J W �D O O O lD O O c a a V N .-1 . -1 N 0 Ln oa `, rl e-I 0 00 N M o'S i o^I N ri m O 000 r4 ' m N c c M m M e-I c ID N Immimlowl ©C4 U U U U U U U' u' , u u u O Ln'., V m to lD tD n n Lfl N l!7 lfl htl'} a17 4/W lf) V7 ID vavv r� �r vvvvvv,v vava N N N N N b'^rp N N N i"^k N N N V -O O 0 U u O JO C C U u J E a u ° (D Q) U C C C C C O O O O > E C U '... (0 C C W W W W c c c ° 0 0 0 0 0 0 > o a v o l7 w ,�"+ ' w w c c c c C -0 v •O O, O 0 C'. C C C w w......v v c c c c'.... W w o o ¢y sx E E a, m c c f •L u u O 0 "Z O O OS C C C C 0 �VI v77 n.0 u�r 7.7 f0 IO vi Aa u Ae'L" C C C W GJ w Y 0,i. !G14 i"Cr . 97.E' O M as AMA ° u o as ae m >^ N C_ Y.` C O' 0d7 4Ya a� Su5 E E E E a0 tf > cu E E E' E E E E'EIE E E E 0 " di a+ ai ai ai di ai ai ai ai a a+' J O O O O O O O O O O 0 O w iih C11" LL yL,. 0.0.. LL LL LL LL LL LL LL LL 4,e. E E E',E E E E E E'EE EIEE E 0 0 0 O 0 o u u u u 4 y o u0 o 0 0 �� o 0 ai ', ai ai ai ai ai ai ai ai ai ai ai ai ai v 2 2 o `o o 0 0 0 m m a m m m m m m m m m m m it Vl N L+% M1 tla7 W tNL lr'li tlA'1., Vl N N V'! N 1s"b N ^Ilnl",N N Ln e-I r, N..n U U U�* U U U U U K7' 00 00 Ol LD O [ r, W w ti N N V w aD 00 '.... 00 00 0 [y a-1 N m V U7 46i Md aD - u a0 u n n n u O u 00 00 W 00 00 N- 00 ' 00 00 CSa "" -d N- - ' •r�'�zavvvvv�t�r�erarvvvvvvvaaaa wr�t,vvv .• •ar v v a v v v v v v v «.r ..�^^ 'v v v v v v v v v r �O 4 i✓ O 0 0 0 0 0 0 0 0 O OO O O O. o o 0 0 0 0 0 0 O` O O �O. 0 N N N N N N N N N N PWd N N N N N N N N N N N N N �N N N N N U J � ° 0 J U v u o v o u y O J J C E J O O u'i a1 C C,. u u u , c E `: a ac ac E v E o aj > v .c s c � c l7 'o .c a0 0 o o as c 0 0 0 E E o v v cr E E c �' a n E E E .a E aE aE aE w -a O O O 0 C3 IfG t�P:..'N�, o O 0 C al '00 (,�y O O O Ul as W � E E ._ is c c v � O C Y . . . . a3a W7 0b @%19 kYa W c Ll ° ° ° v w ° aE aE w w w aE° ° a° °', "o u ro' E E E s 27 ,?' �7 `c 'c c E c c 'c c I'c E o 3 J J J W C C Om C', C J O J J 0 E E E U J J J J z E E E E E E E E E w o'',ti v a v E E E E E E o o o 0 0 o a v v ro u ki 0 a a n o o E E E a u u u u u u u'u u v Jo Jo Flo 0 0 0 0 o u u to u u u c v `w v `m `w `w v v Jo u u vt u u u u u u N m`m u E E E E E E E 'E 'E U wr a➢ tt5 C C C C O' D O O O 0 0 0 mn 0 0 � a.. a a a � r� u' u' u' u' u' u' Q a 3 an ai any E E EE',E EE EIE E E EIE E E E E E E EEIEE E E E E 0,0 0 0 0 0 0 0 u u u u u u u w w w 0a ai a+ i � ai ai ai ai ai '''. ai ni ci� ai ai � ai '' ai ai ai ai ai ai w o 0 0 a ro _v au a v v v v v v as ra..-- --�--------- aap ro ry as as m as ro vv m ro m vas aro m ro ro ro m m ea .�a C+'d a/% M1/Y Vb V4 Vl VI VI M N N N ' VI Vl V1 N VI VI to 1e°Y C al W E u E c m > ��, E E o a a o u o 0 Y Y Y al o` O O 0 El 00 r-I N InM W N m m W Vl a-1 ci w lD N Ol N r-I w .ti W W N Ol N T w W w Ol O .--I o N w 0a w CT!. O --I O N w N V tD m lD N o0 m O w M w .ti In t m n C V O m n o w '., rq m O lO � N '... ao ri 01 n N V N lO 00 m Ill w H w e-I W n Vl In r-I c-1 CO H a0 n V1 In .-i H lD o Ol o Ol w n N In Vl of O of w n N 111 m O H .-1 w w W V m m c-I w - W l0 V m m of H M N m N c-I n m V V e-I to as n m tD w N n e-I m 7 N Ol am of Lfl I i r-I n O ''... m n w m H V lO V n w V lD Vl lD Ol lO L l0 0l N M n m V m n m V o ei m lfl o m m O m n n. N w n o o w n o a V m o m V T O lD In N n N N o o Ol m n N N 6 O m N 'ry-1 m N rq -It in N rl N m VT V} V!. V1.VT to N VT L?...th L/ LT t/f Vl L4 N., Vf VT iA iA VT V1 VF V? LT ih VT L1 Vf o 00000..0000000000000000000..00 o o o 0 o o o o o o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o 0 0000OO00000O0000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 OlO0000 o o o o o o o o 0 o o o o o o o 0 o 6 0 o o 6 O 6 o 0 o 0 O o o 6 o 0 O o O 6 o 0 0 0 0 6 l0 6 O o O v n v V v ti o 01 o lD v O1 r� v c-1 M v m V ui ''.. n m N I n o Ln o O o 0 Vl O o O O T N l!1 O O O 00 o O c O c O 0 W c O O c lD N O l!1 o V o O o O 0 V1 o V O O N I/1 O O O Vl O O O Ol 00 W c-I a -I N '', .�-� M N C M c-I 01 lD N m w w O m w o o- C M lD Ln 4 V M <0 Vl N 1- V N Ill O In I, N m O IA N � N e-1 N '-1 N m m IA V} Vf LY VF Vn lf} V} V, V} V) 4n V? V? VY VY VT..1/T V) V). V} Vl V) V} VT VY to In, V} V? Vn VT VY VT VL V} VT VT V1 IA d Vl ❑ m LL m d m VI d ❑ VI m LL m a m '. IA d VI ❑ CD m d m ❑ LL m m LL m In m ao m Ol m O o ci o N o M O er O m O lD O n. O o Ol o O H '-1 N .-1 .--� �--� w . n. r �--� Ol N N N N m l Vl m lD N n N a0 N d o O a 0 o VI o o VI o o V1 o o d a-1 O d 1/7 N �--� O o N �--i o VI. ei o d N 0 d N 0 VI N 0 VI N 0 VI N O VI Vl m m O O VI m O v a v v m m m vl o m v ,n vl n n vl o o m o o m In , .. In vl m m m vl m m m m m m m m m m M M M m M m m m v o v o v o v o a o v 0 v o v o v o v o v o Iv 0 v 0 v 0 v 0 a 0 v 0 v 0 a 0 v 0 v'a 0 0 v 0 v 0 v 0 v 0 c 0 v 0 v o v o a o v o v o v 0 v o Iv 0 v o v a 0 0 v 0 v o Ia 0 v 0 v'v o o v o v v o o v o N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N o n n o w` a E o,2 �.� E N _ � t y L C O E a) N 2 N 2 C C O/ O C 00 CO c O '.. ^^ `m v al -a E C O O O O o o o 0 0 00 o O J O J J o O O O O O n O O p J o N> o d a` > al L E E E N 0 N 0 '� 0 In O O O O O N .--i m N O O O O O O O C O > in w a.. H O a. o U a1 a j,. O u a� ^y' co, a/ m O C •'a C O 'C L' t �' C o O 0 O 0 O 0+++++ O t' t' t' t' o N o !� o V o N C m d u o W w>— U t+ w a Ia Q,Q o O u 0 0 0 0 Ca o o 0 n M a a 0- m a a — o n o a o a o a o+++ a + N a a > n O u' an u u v� ❑ m d u u w u al v— U— >- Y 0 N o O M m o 0 O O o O a a a a O a > t O t� O O t O a. 3 a. 3 a O a.. > a O O O t O O w o y o U N+ Vl "" X V VI V O m D Ii d V, V V Q O o o ] N > M ] Vl Vl Vf Q a.. a s VI Vl VI.VI N a a a a Q a U V >— L'' N N O o x x x o x o x ''.. o x o x O o o 0 o N O/ U! 41 U/ a a. 7 a. O a n OJ U/ N O/ U1 a 7 a O 7 7 Vl u >❑ w D m d. O1 Ol x o o O x x x v n v m v -D v - v x `'�.- x x x•E E E E E in E E E E E ul vl in + in x x x aEi v m m m E E �° �° v v �° c C m C m C m C m C m d d L L N a i./ `/ `J N a N E Q1 E Ql E N E `! N a �l N a `1 W E al E aJ E N E O O O d c d to c c Vl c Vf c v a v a C C Ic C C C m m C m •E v (u a w w v vI w v v c m c m vI v c m vI v c m vl w v d I d w `w d v y v d m d i d v d d �, `m � a d w v ` v d ` a v d v d v d v d E v E y v C v C vI v C vI o 'J 0 0 y 0 Y 0 .Y C o C C c 0 C 0 C c 0 '^ `n C C 0 0 '^ C 0 -o v vI a, a d In •o E E E E E C m C 'm C 'm C .� E E E E E C tc. C na C as C no E E E E E C m C 'm C m C oa.,.. o 0 0 0 ., 0 m m m m io w w w w u C ar cc C ar cc C v cc G w cc G ar cc C O O O J O J v cc C w cc C v cc G m cc G ar cc L O O J O J O J m cc C m cc G w cc C v cc C v cc G O J O O J O J - 'O "O c o c C o O 2 c O qacu c O w A 'u N a1 �/I N N w VI m a?+ Y Y aT+ a?+ N N Y y y s?+ _?' aT+ _ N _? _� C ate+ C N _ C a_}+ C 2 C Z C a?+ C Z C 4? C Y C Z C 2 C W j W > W j W j W j 'vI in N a a a 6 Q aw •— . am+ C O C 3 C J C O C J C 3 C J C > C > C O C 3 C 3 C > C > C > > > 3 3 J J J O J O > > O O O O O O O O O O Y N N E E E EIE E E E E E E E E E E E E E E E E E E E E E E w w X �'�j (7 d a d d a w w w w w> E E E E'E E E E E E E''E'E E E E E E E E E E E E E E E w❑ n �'v o v v v 6 �'v a E 0 u 0 u 0 u 0 u o u 0 u 0 u 0 u 0 v 0 u 0 u 0 u!u o O u O u O u O u O u O u O u O u O u O u O u O u O u O u E E E> 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 g a`I `m `w v a`I w `w `mm a`I `m '..... `m a w `w v `w a`I `m v a`I m `w w a`I `m m` o u o u 0 u u u u u u u u u u u u u u u u N E C t• C t' C t' y C t' C C t+ C t' C t' C t' C t' C t' C ',, t' C t' C t+ C t+ C t+ C �' Y y C t' C L' C C C t' C t' C t' C t' al E a/ E a1 E al al al QI aJ N N al a) aJ al al al N al I al d d aA. 4 d ''... d d d 1 1 d d d d d d d d d d d d d d d '.', d d LL LL LOi N VI VI m A,/I m Ln m VI m m Vl VI m ✓1 m Vl m Vl m Vl m IA m VI . m � m VI E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E EIE E E E'E E E E E E E E E E E E o u o u c u o u o u o,......o u u o u o o u o u 0 u 0 u 0 u 0 u 0 u o u 0 u o u o u o u o u o u o u o u o u o u o u o u o u c u o u o u o u o u o u o u o o u u o u o u o u 0 v 0 u o u o u o o u,.. u 0 u ai ai ai ai ai w. a 6 w ai ai ai ' i ai ai ai w o w w w w w w o w w w u w u w u w u w w u w w u u w u w u w u w u w u w u w u w w u u w u u 0 u 0 u 0 u 0` u `o u o u `o u a o` u o` u `o u 0 0 u 0 u `o u `o u `o u `o u `o u 0 u 0 u 0 u 0 u 0 u o u o `o u oo u u o `o o `o o'o 0 0 `o o `o o `o olo o` o o 0 0 wwwwwwwwwwwwwwwwwwwwwwwwwwvvvvvvvlmwwlw'wwwwwwwvvw,as m to m VI m In m N m VI m VI m VI m Vl m N m N m N m N m N Fo lII m V1 m M m to m V1 m Vl ro Vl m IA m VI m VI m Vl io Vl m VI. m V1 io V) m An m In m 41 m Vl m Vl m '... V1 m VI m N m VI m m '... VI VI m VI m Vl m VI m V1 m V1 m IA m V1 m' m N Vl m Vl El to I II I mII NI.n � NI� N^m�N���m N nII tD O�`3- m.NU0 m N r-,LD ml m�`,� w�nII N�N N -II Ln N�� m r- w 01 1L0� w,,..., m II m r, Nl.m-I ©I�i7©I©I©IV7�ID�i7©©ICI©I��©I�II©©©I©I®i®I®®©Idl©I�©©dll�'II�AI� a: �fl111m � m" mm-�m�a�`0 Ot 'a* °�w N LID W nLn m N�� w 'zt w I- m 0 wo w� * r, N m r N N .r o w oo oo�w�o�o w�omw .4 .4 W ¢, O LL a l ut n.a. LL LL LL w LL a ut O w. ra. vY O LL O LL al O LL a O m m m m m m m m m an d in m iaa txa V La. to m m V m m m m m m m cx7 YYN V 4L ul l7 a rtx. wn m-a aero a a m m a a re7 m ut ut ut ut an ut an a a ut w+v Arn a ut an l7 ut ut vi an ut ut ut an wre r.,i" d7.: a at r' tVa Ln In N N w ID 49 �a n n n m W 0a 01 Ol rn cAY In In nlr cJ'a e�1 a7s m m m o 0 0 o w to w n r^r o`« ';m rt7 I° Gd O O O 0 0 0 0 0 0 0 (' Ca O O O O O 0 0 0 O m m m m m m. e-wy m m m m m m m m: m m m m m m m m m m m m rrY m qry m pm"u m m m m m m m m V V V V ^CC 7 do o Ln .� ,� .� .� .� .� .1 .� »r .-a , a w�+ t .-i .� m .� m m .� .� ti v v s xt vvvv v v v r 4 4 �c' v v v v v �r se s v l e �• v 0 o ca a o o 0 0 0 0 0 o cr o ray o 0 0 0 0 cro r ea rcj o 0 0 0 0 0 0 0 o c oa ads o N N N N N N N N'.. N N N N N N N N N N N N N N N N N, N N N N N N N N N N N R"�t., N N N N N o v ° 0 m v o it v-0 -o o v as 0 0 0 U u J o. a u c c c c u u c u in u re C. u c U s t ° ar TY O u, a• V d� y,.l O m m m m m m a u u> a'u a. 95 O O ut u J m u u, a cN, cx % . a an ut ut ut an ut ez, c J u pa.. as cr. n. u o g..y m v Jk �`. a. U u v v ° as _ c c c is o �n J CY an. C1 ? C� + J U of J m V N +L U'. iG C u m O O 0 0 O O aa. R V O+ V1 al ,W C0. N N E x x x � u u cr E x x x E v w` o o O a J° J � ar a •.- - y [a 0 O° E o n + 'n J cif au xm v v v� v v u v �0 u.. w v n c 0 0 0 E E v v v',c `y v o 0 0+ w w w w w w u ar- E E v v w vvv o 0 0 v v c c c x x x ar v u m ` v c c n c x x x. ° m m m y -a_0 -0 O O O X x X in ',, J ,.. O. O C C L d l7 a a w ut ut E E v v v n O° o '" ._ °' °' m+ an l7 a LL m m o o 0 0 v v c.. c c a _ C7 in '....� 000000�aan'n�vw�cc����°°EEE xxx00000 ����nvi v `y o 0 o c c c c° _ ._ c c a u ar 0 0 0 0 c c c c c c a a in m fO m c c -E E E v v v :. :. :. yr vn vi c c c 0 0 0 0 0 '^ w e c' cv v c c c o 0 0 c c c c c W +Lwr 7 7 vvvv c c c_ v N W W W W W W •�. 'yi tr 'H C m m m W W W W W _ �. O O O O O C C W W W W O O O �' .- }' J O VO° Y Y Y Y Y Y a [l Vl V1 V1 - V U U u u U SiM U' J 'WJ -O a+ 'r+ "O -O O w W W W W W W m �p �a �a m m c o c c o 4 Z W W W u N ma mp m ca vvvv o 0 0 0 0- c p; 01 ° v v v U u m m eaw m m in m m in m m m w w w w w -0 w v a a a d a a i+ rG ffi'.. O. w w w W u al J u c c c c c c c c c c c c a w w m'w w a m u ar E E E E a m m c c c c,n m m m. m m m v min rise rtvad mp ' m c+a v v „v v v a: °�' ar w •o 0 0 0 0 0_ m w w v ra oy sy w w w w w u u m m m + y `a C. 8..� siw. as � � mi as eta ar mr zb» ad w aa' rna w �. � > > � � m rcm u --m u u u u m 2 w 2 N v to as o w. E .E .E 0 0 0 0 0 0 ewm a�.. ax. a..c c__ c c c c c� E E ...E '00 '0 '00 > E E Cm yin., m m Y O O O O 0 0 C C C° O O O O O O O O aJ v al O v `l C C C C C C C c �c c C O IC C.. a` a a a a` a w w a a� >>> sin me as ae me 'x a n o E E E E E E E .E E 0 0 0 0 0 0 v zz v v v v rs v v u u u u u u a v v v v v v v v vvv v v v v v v v v c c. c c' E¢ s ^K rt d¢ J J J J J J J J J J J 7 J J J J J J J J Liu w w w w- O -OO o O O O O O O O O O o O O O O O o O 0 0 `�'" -O J J J W W W of Jo OJ of Jo o u u u u u U U u u U u u u U u u U u U UlE E E E E E E E E E E E E E J J J°°° E E E ° o o o o o o o o o o o o �x o 0 o 0 0 0 o 0 0 u u u U u u a m w a u a m m w m w u m ro as uw u u u u u u u u u u u u u y _U 5�H to 4J LA U La U u U U U_ U_ U V W a M1.r Li Ulu V al m u U U U Z 2 Z Z 2+I a a a a a a a a a a m �'� u a a a v v w w v 2 u E'E E E E E E u u v v v .� Z.� E E m m m m m m a a m ma re a a w a a a 0 0 o� 0 0 0 `o 0 0 `o 0 0 `o `0 0 rm m m w w ar o o o 1n Va 6+9 to VI Ln VI MA"F 4'ai Orr ¢F'b 4T W Vp 4+A Vf VI VI VI vain m'Y a✓'d C✓a lir'M LL W, LL LL LL LL LL W LL LL LL LL LL LL M+n to VI Vl Ln N LL LL LL E E E E E E E E E E E E E E E E E E E E'E E E E E E E E E E E E E E E E E E E E E E EIE E E E E E 0 0 0 0 0 ol0 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o a o 0 0 0 0 0 u u u u u u u u u u u u u u u u u u u u u u u u u u u u u a1 N al ai ai 4V ai al al N a! a) w ai w w cu ai a) w a) a/ ai al w w w al 6 a) aJ 6 al 6 '... N v a) 6 6 6 6 6 6 6 W 6 N W u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u i u u u u u u u u u u 0 0o o` o o� `o 0 0 0 0 0 0 `o 0 0 0 0 0 `o o `o `o o `o 0 0 0` o `o `o 0 0 0 0 0 0 0 0 `o o `o o `o `o `o o` `o m v v v v v a v v v v v v v v m m v v v m v v v v v v v v w v v v v v v v v w v v v v a v v v v v m m m m m m 'i'm, m m m m m im m m m m m m im m im m m m m is m m m m io m m m m m m m m m m is m m m m m m of !n to v) y1 Va 4/k vl N Vl VI v Vl Vf V1 ',.tn V1 (n V1 Vf VI V1 of va V1 VI Ln N N to Sn V1 In '.� In Vl VI N Vf '... to to en VI A/1 N VI Vl vl V1 El w 0a w al W Ql M 0a Ol T 01 Vl Ol 1n n a -I W al V H r-1 W V rl w 0 n O o lD lD N M.. a1 m n V al N w a1 m 0a N co m M N., 111 a� n w O c'1 O n 'i O n V n N n M '.. 01 al ry o n lD N O n lD O .-i In O a0 't n N N lD o m lD m a1 m al Ol M m n n lD w Vl Vl m n w n V w n V 1/1 N m N lD V O n mm ci n V m H w n m M n IT� w n N H m 1/1 .--I m n ''... a as n N w O n m m V n w r w" V w H V V m m � m H m a M lD V O m w Ln lD m m w A m N m n a1 V V m to al lD m m N H m N H In m m ll'1 M n as lD as V q m r-1 m al L c-1 Vl N 0a r-1 N M Vl w N m m n V o0 lD M lD .-I m n an V In N m N H c-1 m O In w n O o n o �--� 1/1 O ll1 N (tlto Ni l0 m m LD V N W ri N al a0 n In .-1 to '•I N m m H w m o H n m a1 �--� ry n N e-I •-1 N N 1p lfl '-I T to VA VT VA In In UA VA VA VF lr 'In''t VT Vf in Lf ',,lR �, V1 VT ih Vh VT th in Un 1n In Vl I{A W V} V} Vf i/f VT VA i/AIN ice' N- i/T to VT Ln to VA in 0 0 0 0 0 0l0 0 01O10 0 o c o 0 0'O o 0 0l0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O10 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o O o 0 0 0 0 m m N O o o O o O O O O O O O O O O O O o O O O cc o O O O o O O O O O O O O cc O o O O O W O o V w m V m V O m V lD O O o o O N o 0 o V 0 0 0 V O O O O O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 N c-I M In m 1n m 0 0 c 0 V1 H e 0 O lD as alD 0a o O N c w N o 0 111 uY O N C lD N O V to n V o 0 0 to M W m e-I H M 1n H M m In --I aVo H M In N V O N N n to M n an0 N H H N. rn V n, o � rl m rl '-I CO N ''... N e-I N VA Iq VA 9!'l AA %A In VA to tM1 in MJ'Y VA i/}',qn r!l1. VA �n �4"F.. 1R L? 2n V? V} in to V} to in LA in to LT Vf iA VF VfIVY V? N V1M N, N, VY i/1in. LL 1n LL a V O LL LL O LL 0_ U U U U a VI m U a V7 L% a Vl m U a N m V a m N CO m 1m Co m m m LD 0 l7 a a v1 C7 a a C7 a a 1n l7 a a In C7 a 1n lD ID l`no n i� n n au oo ry m v 1n lD n m rn m m o O m m .-1 .� .•-1 e-1 r-1 N N N N m m T m T V V V V V 1n V1 lfl .••1 N N N N N N N N N N 00 W m W m 00 W m n n W 00 00 00 n n n n n n n n n n n n n n n n n n n n n n V < In In In 1n In 1n 1n In 1n 1n In In In 1n 1n In 1n 1n v v v v v v V v v a v v a a c v v ''... v v v a a c a v v v v lD Q r1 ci '-I c-I '... '-I r1 v v'v a v v v v v v v v v a v v v v v v v v v v v v v v a a v v V v v v v v v c v v v a v v V v 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o 0 0 0 0 0 0 0 0 0'0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N. N N N N N N N N N N N o N i O, a a) o O Gl O L N j a U J O U J N 'O 7 _ 7 al U c O U ',. d O aL+ L' u C L u C V N U C O C O 00 a E o c E n ww E c ° ac ac o E C w w E E v w E E c ^ o w _ Cu E w > E a N E 0 g E c E C C L w u ai > o E E r' as . oa o c ma 'o ° c7 m o.o v >..00 m o me >o oa >o E� u o,� aj aoo > o o 0O 0O Cu w l7 ,. _. Y p 1n C7 o O o J U 0 0 l7 0 w -D E E o o 0 w w o o + S. c -- -o y o c c Y 'c u o u v E E v w A I a a o E a a c p o o o o J. m ai c c a s In E E a n o o 0 o J o `o 0 0 � o E a o a o E E 7 J v v J J a a o N a a o N a r 0 0 o 0 0 o cw c n n X n n N a a o a a o a E J vA O N Q O O O O C G p 7 J N C C J J C C 7 p' d T L O O O O �_ 41 -a 0 o al al C C pa pq m pp Oa 1n U N d > a O O o In O O O O O O to w X o O x O O. O o o V o 0 0 o E E v o o E E p o w w p J w w p J w w a > J o an o o In 1n v v o o v v J n o o ) o o E u n o- o u o o m u E w o t2� o o N a a n o a o 0 E E o o E E o o E p o p p— p o o v u _ 'E a a, w w w i �, �, `` o o v a o o w v o o m a u O u > u >y m 0 0 O n E E E E a v v v v` a a` w v `� o LL 5 c ° A d L L L L L L -5 u a1 '-" a o v a > `LLJ d ac a fO D a w `- aj a a a a o o E E E E E E E E E.c c c b c c c c c c c c o f x x x C w a, 2 2 2 J a, v w a, a, w m m v m 'on 'oa 'oa 'oa 'oa 'oa 'aa 'ea 'oa 'oa ' on ,o .. o o o E x x x o 0 o Q,> o n u cc cc cc cc cc cc cc cc cc o 0 o 0 0 o o 0 0 0 0 o 0 o C O O O w-o L Q C> -O J Y Y -- -- y� C c C C G G G G G J J J J J J J J C o d L L d d I] aJ O 7 X O m a C C C C C C >' Y ate+ +T+ a?+ Y N Y a?+ Y N Y y�i' ..',. sue+ aT+. Y. Y y, Y ate+ +>+ U C C C �, �i m w u O C r >O C C C m 1a n J U J J I J J J 7 C •� •� •C C C � •� C C C 'C 'C 'C '... C C C C C C C C fU t0 fa 1n Vl 1n V w O m E E '.. E E E E J J J J J J J J J J J J J J '... J J J J J J 7 J C- In v1 v1 V' 1n 1n v1 w w w v v v -a v — •� O m ra x x x L Q J 7 J In m o o'...o o o o E E E E E E E E E E E E E E E E E E E E E E o> In o 0 0 m y u u'u u u u E E E E E E E E E E E E E E E E E E E E E E w E'E E E E E E E E E m u u u 8 m m o o o o o o o o o a o o o o o o o o o o o o— _ m U V U U U U U U u U U U U U U U U U U U U U �,2 uo o o o o o o o o o c____ v o v °'°a a a u o`E E E E E E w w `y w w w w w w w w w w w w w w w w w w w.Q al w w u al w. ''. al . al t' >> T. T 2 O N O O O O O O C C y Y C C C C C C C C C C C Y C C C C y C Nu EEEEEv ro ro 10 c r r C C r Ca1C C C C O m _ J J J J J J m al m m m m m fa a) a] fa f6 f0 a] fa to a] al IO fa a] a] - fa ._ LLQ Q Q Q V LL U U U U U u a D_ a d D_ a.. Dm m a a a a D_ a a a a a ''... o_ a a w u_ —. E E E E E E E E E E E EIIE E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E o o o o o o o o o o o 0 a o o o o o o o o o o o o o o o o o o 0 o o a o o o o o o o a o o o o o 0 u u. u u u u u u u u ai ai a ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai w w w ai ai w ai ai ai ai ai u u u u u u u u u u u u u u u` u u u u u u u u u u u u u u u u '.. u u u u u u u u u u u u u `o 0 0 `o 0 0l0 0 0 0` o o `o `o `o 0 0 `o 0[Rl�[Rluo o000o`00 0 0 0`o 0 0 o0000o`owwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwvvvwwwwwm iommmmm m m m m, m is m m m m Fo m m is mVI VIN l/1 N? M V1 V1 Vl V1 '.. N Vf VI V1 ''.. VI. V1 N VI '.. ✓1 V1 V1 N1 '. In In V7 V1 Vf Vf V1 VI El m P-2 N N ONO O m mV V w oo ONl m cN-I H M m z V.-I m rl n n m ONO ONO m .a1(1-I NO N N N N N N a M M T n V i/} i/T , V?., V? iA V} V} N VT.,VT to i/} �/? N 1A aA ih V! Vf VT'.VT V}'td"W µn. 9�'M W✓4 +.M1 Ftb 4n L1Lf V/ V} 4/} lh Vf.VT V} VY V} iyy. +✓? *1b 4 A, M1✓M•. Vf LT i/} �"k O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O OOo00o0 O O O O O O O O O O O O O V C O O N O O m o W O N O '�O lD cowN`--�th 0 0 O lo CO"F Ms iMk 9'n m w a m an m m m m m a in a u l7 LL o m m vl vl �nvl a a m m '... a In In o m In In a a m m a o a U o C7 m m a a vmi a lu7 LL m'a m m a o m vl u'm (7 vl a m vl o m In m a o m In am a o m vl a u l7 m vl o m vl a m vl vl'm a , In m vl m vl a a .� n lD v n v .� vim r+ ti a .� v .� n v m n v v In n v v v ',l0 rn .� m v n v v n n c v v m c v .� m .� v n m v v v v .� m n n .� m m In vi v N n m �Dam v H n m n m oo v �n v m In m m N In v nv vlD aIn w o l0 lD o l0 l0 H .-i lD c lD O - H . l0 lD N H w w . � w w lD HH _ w _ l0 ,�Vv w lD tD l0 l0 a 'D o w W W l0 l0 W l0 l0 lD w W l0 lD lD O W 0 0 o o o 000000000000000000000000000000000000000000 v v v'v v v vv El�m v a v v v v v N N N N N N N N N N N N N N N N o N 0. O N O O U 'c u C7 Ck dO u aM ap u O U 3 u O U C al O > as .. a ? V N x o',. In , aJ Cp x u,y O O + E x aj a `y cL u t v=7 au.. o u m E E x a v" u n v .`_3 u 7° u _`m E E x ° o 2 x v v¢ in °, v o �° c p In ea a �..., + E X a m v a ,,, in o s, .- m a` � l7 In c' w w u> wg E v c o '° ro, Lll� E CID ar w a' > c c ° � u ° o c o ca 4 .E c o � 0 c c ca o a w d o n �,, a Uo o f X' E a al w v ar ° •c aEi c c a Rm c t'.a. al c E w c q" �A o f ° ° ,, � � a��v��,� ° � � a � � n � v � o w to ae v � >> > o ° ,, w o o , o o o E N p E p p a/'! al u _t E O m E E > al al ...a O o `� a ..s O -a O u u > u k^1' az,, o '"""d' p a o C7 N N rin w C N w w w pB w O O CP O .%^ in ..... w O N y 75, .ice ..... al o O mil O� in ap w p en x O a O a a -DE o O n Eu O O w O O O x o 8 — w O c ` x o E x p C5 SO a a C7 i o a ° w o E v E v E n a E a E v C5 E `am >>> o "c ao o E v ".�.' c .v E c E v o aE as o a Cro Cu v ai0 '',. a '=' to m >` p .,° a x a a a a° a In > ° C7 m In p a g v vl it o t`,. :.: �° "' ,�' >° �;." "�± y i'�, c `° E E o c ........E w _ r' c aj °' o � w w w � w E v E 'E E E'F. u a E E E +� E E E, E w E E E E ° E E, E E E E E E m E a w E E E E E E E E E E E w E �... E '' c E E E E E E a E v E ....,E a' m a E E E E° E E E E E a >° E E E E E E -,W o' er a E E E.. E E E 0 ;uu 0 o° ° U r�u o p °, uu ° Euuuu��uUut ° o 0 o o o rs d a- °u�u o 0 Euu���� 0 0 E 0 ° a a E °''a E E ° u ° v °n u u u ww�wwHwwwuwwwwal E p wwwwow�w�ww�o'HH o 0 0 0 0° aj o- a) E o u o u w w a' p E E E E EL� O E O E O E w O C E'E o E E O O O 2 E E O O E E o O O N E O b al E O w C E O E O al W al al w C E O E O H N w C ''... E O g w C w; C E O E O o o g E O E O E O in O u O V J U 0 0 U 0 v u O U'U a',U 0 0 u u u? 0 O O E u u 0 0 U U 0 0 U E u a U U E al E ar E ar E v a V u m v a U a a U U J g wv h.o '�'• "C 2 �p�.r -1 Me �w a.� „?A, 7- vp trfi�� „O,�IO �wvY r �^' 7- O �n O wm O 0� w l,r^ �.� "�^ O yf O O yr O 0 w� a O O wM1 O va O „'°,� �O yam• a O r�•r O rvn O zn 4.vu X al iJ u a} .m.M U as 'plN qqyy ;O ae Al' al' h� A.N as aY tl,S aA wi qqy,y 6Y a9 ay 'C 3 O �J t!' a! al 1J WN C, N Bmtl VdY C ] ��yy al xx,�tl aY a aY iq Etin am C C C y,� 'l3 as 4Y dl >^ G.W a/ aY ad v al v NJ u a0 'E "C ap aV 1 xa as .a E �x 0 sa m q m za 'E E -a ca a ix E 'sa E e? sa sa ;D E, D E E O E so as E sa :s� ',Era > cn ca ea 13 E.', ] E D E 9k a O ci O ci N O In H O H o 0 U c-I 0 c-I o 0 ci c-I o H o O O c-I N c-I o E a 0 0 ci ci O O o c-I ci o ci 0 0 ci 0 ci o 0 0 c) aE1 6 o c-1 O c-I o c-I E E O H O o o 0 0 0 E o E 0 0 0 C a u C — C C -- C C rO C C' n1 1a C C.. C, = _-- a) O C u ai N w M C U m flf of u of u an u ar a �, la m N �j la la U w uvp �SY I] `, u u u ry YO f0 Ea > o 0 0 o 0 0 0 o O o, as o nc - E E o o C C 0 o E o E C o o a _ o E E H E E c o c 0 c 0 a c o c zs E o c c a al' E ar E v� E c o c o' c o • l xs-o m a m 'sa�'�vvv -o -D -o m 'gip oazti 'a -o 'o as xc a a v to �vv v v s xa�a ='co "ar �oa�vv ^sa 2 v v =° �av �vv - ma ¢ ¢ u ¢ ¢ ¢ ¢ ¢ aw', ¢ ¢ c„p a '�'� ¢ ¢ ¢ u ¢ u ¢ ¢ ¢ [ u u u u.k ¢ ¢ ¢ a ¢ ¢. u ¢ +�C. ¢ ¢ u u u ¢ = E E E E E E E E E E E E E E E E E E'E E E E E E E E E E E E E E E E E E E''E''E E E E E E E E E E 0 u 0 u 0 0 u u 0 u 0 0 u u 0 u 0 0 u u 0, u 0 0 0 u u u 0 0 u u 0 0 u u 0 0 0 u u u 0 u 0 u 0 u 0 u 0 u 0 u 0 u 0 u 0 u 0 u 0 u 0 u 0 u 0 u 0 u 0 u 0 u 0 u 0 u 0 u 0 u 0 u o u 0 u 0 u 0 0 u u u ai u u ai u ai u ai u 0.0` u u u u `o.`o ai u E u ai u u u o` `o.`o ai ai u u 0 0''0 ai ai u u 0` u ai u. u `o `o ai u 0 ai u u u ai u `o.`o ai u ai u ai u `o ai u `o ai u `O ai u o ai u `o ai u `o ai u pi u ai u `oo ai u ai u ai u ai u `o ai u ai u ai u `o m ai u ai u u 6 u ai u o 0 0 o` o,o oo ,o o 1 N N Ul 7l N — Ul Ol ',, N 71 a) _ Ol Ol w- Ul — Ul 71 '', 41 N N Ul N '', N Ul Ul N Ol 7l N Ul U/ -w N Ol al Ul Ul Ol Gl N w Gl Ul Gl i m I V1 m VI m m Vf VI m '... to m m I V1 m In m m lIA 1/A m Vl m m m VI V1 to ',. m m N lA m m M M m m h 1/1 M m m m VI m m m VI m VI m an m an m., N m - m - m V1 m An m Vf is , m In m Vm m VI m VI m N m VI m VI To V1 V1 In V1 N In El 001 M M 0^0 0^0 O^0 Co m^ Co Io n Val a n N N 1� n n n Ill m 1� c-1 m ID ID ID l0 w w T 10 o m n n n m m o .-I m m a s ri '-I rl '-I O 0l CO CO m Vl V1 V1 Vl Ill Vl V N a a O O O m al m 1, In Vl M M M O to Vl '... CO CO w m m m m 1, a V m N O O m m m m m w M N e O I n f\ n n n vl N O O m m m w w ID N O O w w w N Vl o r, N N N N N N o m m N N e-I H w w w w w N m e-I a m o Vl Vl o m In H O o o w m w a a a w N N M m m m m o m m m m m Vl Vl w lD lD N N w m m m m w m m m O c O ......... V} L} M Vl I^ Vn tR +n .n VT an .n vw vw v: +n 4.1p +rti..n an an to to +n +n tl} to to to vl .n ,n in +n to to .n vi. in {rt ut +rt +n +R .n .n . 0 0 OO c, OO O10 OO OOO o o o o o 0 o o o 0 o 0 0 o o o' o 0 0 o 0 o O o o o'.O O o o o o o o o 0 0 0 o o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 o m lD VJ o 0 o 0 0 0 0 o o 0 o o o 0 o o 0 0 0 0 0 O o 0 0 o 0 0 0 o 0 o 0 0 0 0 0 0 0: o 0 0 0 o o 0 a n O O O O O O O m N N Vl O a a O O O O O N In m N 0 0 0 0 0 0 l0 Vl O O V a 0 o O N m m 0 0 o Vl M Vl VI tD LD w''. wVJ w w wn n �, r w wm m m m m m01 O O O ti N N N N N N N M a a a a a '., mIA V7 to l0 '... VI m Ca m an th to it"4 C±"W. '�. MAA tR i/T tR W✓4 tFY ti>Y 1/T to '�Pti MAS- ^0.AY uT Vl to Vl',. 14 t/1 tn. N 'A',1A lff Lf N Vl In Lf to In. VT th Vf to t/} tR to to Ml t/l t/l In lff i/1... w In a p ❑ ut o_ w ❑ O O v7 0_ a o_ u_ ❑ ut a ❑ In ❑ vl ❑ LL ❑ u m a m m m n u m a v m n u m n m m m a n m m m m m D_ vl m m a m o m u m u m m l7 vl a In In ut a C7 m a d ut o_ C7 In o_ ut ut vl N o_ m vl ut ut D. w m a w m o_ N o_ m (7 m U N o o V1 Vl O 01 m v m m N I� Ol rn a .� m I- N m m lD V O m N m m N m LO m W a N M N M N m Ol N M l0 O T m N N 0 .� a a o .� m a n r` m ti VIM In .� m m v In v a n .... a m a In w n m N an v v v .� m y In In In .� .� N to w w w O w l0 lD a a a ID ID a Lo ID ID V) VI lD to a lD lD lD m w to VJ a w w w w w w w w LD L V) lO l0 LD l0 O N N O O O O O O O O O O O O o O O O o O oo O o O O o O O O O O O O O O O O O O O O O O O O O O O a V V a N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N N O o a` a D o `w n...... o.. o. a n. o m n o'. w u u v', n o a u a` o o u 0 w u w> _ u u V u w U 3 p>j 0 p ?, u VI VUOI O O �, 7 v v n' w E o "' °' x o m u + > a' > E x v w x o n - `w �,.. w '� w c c >o E Vimo -, m n Y a E w o� v❑ >� o In. v a c c vl m v a u x a x o m L L D_ L In 0 N d L d N Ia L° L l7 V1 C C L O_ L C L L E L C L C O CO C L L O O C O o C r- `J C ° O C L O O D- In C C ° i `m o> o o v D o a o E a N 2, o o v ?, o o N u o a m �� c w 1 n c v o o .0 c' o> w c ° u m c c o c o E m o u o F o E v o E F c a> o o o aI v v u oa 0 N u- o 'Eo `oa o u E 'oa u w o u u w bD o E w v w ea o a > J > o U o o o o u w o'- - o o m a cc cc o 0 0 :O O C1 w U a Y V1 J m w V p J .--I ] O .--. LL VI w J N G u p. O G J J u U a O O '� U O O O OCL ',.O ` V E X 0 0 0 '� I+ O O m O cD O w S 00 '- O O x m 0 0 0 O O ri a -I Ul — N X L U w O x O ° O O w O O d H o _ X X O w O V1 V) O O O w IL N u m a v u- ,� ° ✓t IA N L `w In ,� o o E o n u1 N+ In .� .� E x a>i 0 c c c E a w a....c x v c_ o v c c a° E c v a v> c E E o n o n a � E v m o p CD .� ,, Vl V bai C v 3 C O m m J C w `1 J O L o C 0_ C w J Vl ba C J J L 0 0 o n r a E X o E C7 n o a 'aa a a a a caE o N o n y v a a a EL o l a a d o T T aL+ Y C ` L L Y --- aL+ N Y Y o> r. Y'', Y. m G Y V U C L> Y Y >. C T,.. > Y Y ° m L E C �+ yI O an w -O C in a• vI O_ C C �+ a+ a+ vI �+ r+ V1 L a� Y In O C a+ a+ a+ a+ d o �+ - -- a• U� VI C .� 'c w o E w` `m > c o 'c v '� '� y c o c 'c 'E 'c g E 'c 'c 'c m a �I� `m c v 'c o w E E E E E N E E E N E E E� N N E E E E E E-.. E u V E c c E E c E w w c w E w E c c E E E E w E E E E E N m w m E E E E E'm E E E E E E 0 o v• a o 2 ou a w 'm g o w .� .� o 0 o a o o w o as g o F o o o o w o o o o o w w u u o u ° o u o o u u E u u v E u m o c o u U u u J u u u u E E J o o E E o o o o o o 0 a v w `w o 0 o v v v O o `m v u w o a`i y o u `w m o w 0 0 `m v v v o o w` v `w v o o o In o v o ,� o o V v Y o o E E o f o aw o E o o E E E E E v E m o o E E E E o E E E E r O O N O N N O N N O O C O O O ' C 0 ❑ m m '� O O O O O O O O O O O UJ N O O w N vi w Y N O ul ei ' L L '-I c� ' L 1] �' 1] 'C t' ro . L '-I N I c c v c c>> m E>> a` m e a E.c u u' u' u' u U u u n a u u c u E E E u E u u a u u u a'o u O j 'ea w 'aa w>> as w w oa 'aa w E i w o E o E E O o a a ° o o o_ d o O cc o ° O o 0 0 O o cw o o o J a o ° CFO o ccw ,a 0 0 o cw ccw d '^ ¢ rY+ Y Y N Y .Y. y Y N C y aY+ vi in In an Y an In C h an Q LL --o sY+ .>. >• to an to C Y u u u u u u 'C 'C U C C C C C C C U C y C C u u u u 'C U u Y u U - 'C 'C C U V u u 'C aj U it U y y 'E w w E>> w w>>>>>>> w 3 w w w w w w w w>> c w w w w= w w w w- o:- E E-o00 E E E E E E E� E E E E E E E E >> E c o o E E E o m E E E E E E E 0 E E E E o 0 0 o E o o E o o E E E o 0 00 E E o 0 0 o E E E Y o o v o 0 o c o 0 0'0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o m,m m o 0 0 0 0 0 0 0 0 0 0 0 0 .� .� w .� E .� .� al, � N .� E .� ,� - ,� .� - E .� .� .-i .� E E d u u U u u' u u u u u o u u-- - u o- , u u u-- - o u --- o o U fp fa is w .a m m is m ra io m is ❑❑ p m m io m U m m m m U U C C E w w C ` w' w w w w w w C w U w w C C C C w C C U C C w w w C C C C w C C C C w o o'O E E o o EI E E E E E E o E v E E o 0 0 o E o o v o'o E E E o o o o v E o 0 0 o v v E Y 'ate a+o - ._ s+ i.+ 'a+ - '�+ i+ O O O O O O a+ 'Y 'F+ 't- C O 'a+ i+ 'a+ i+ C C O m O O Mo'. O o o O O O = O C O O +• _ O +' C i' _ _ -- a v .. �, v w �,. ,� V a t a v v v v v � v 16 aaa N ,� �, a -a v a r -o -o -a a t n �.. >>>>>> a m>> a a a a a a m a a m m m>>> a a a a m 3 a a a a m m 0 2 Q Q D u U Q M U u.....0 U U U U Q U m U U Q Q Q Q U Q Q D_ Q.Q a. o. a U U U Q Q QIQ a U Q Q Q Q a a U E''E E E E E E E E E E E E E E E E E E E E E E E E'E E E E E E E E E E E E E E E E E E E E E E E E o olo o o o o c 0 o o o o o o o o 0 o o o o o o o o o o o o o o'o o o o o o o o o o o o o o o o 0 u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u v u u ai w w w w w w ti ai w a w a ai w w w ai w w w w w w w u w ai ai w w w w u w w ai ai w w ai ai w w w w w w u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u O O O O O O O o o O O O O O o o O O o o o O O O o O O G/ N O1 O/ 2 71 Ul Gl Lu T N U/ U/ N U/ 2 Ul 21 Ul Ol N N G1 O1 N ': U1 OJ O1 Gl O1 N Ol '... O1 U1 Ul Ul U/ m W O1 N N Ul N N G1 O1 Ul Ol m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m '..., m m m m m m m m m m m m m m m m m Vl ut N VI ul ul ul VI N Vl V1 Vl Vl lIl V) 4Il N M M V1 ut i Vl Vl Vf VI V1 Vf V1 Vl V) N A/l F/1 4I1 V1 Ul V1 Vf N VI VI V) Vf Vl Vl Vl Vl N V1 El C C V V V a V O O �--1 e-I m i"W d N N i NjN M �NLnw lO��Uu-I�NNN NIlllllllpRm m Ob pga^IIIti lllm m m m m m m vi tln c ao w mm n W o0 0 0 m m M V m to lD lD to n n ',. nN N P'w.p, � ,r+l G`d N N u* '. ti* u* vw v'�- ur ark. 'Y,n yr etn ut +n ua u* ut .n 0 01 olo 0 0 0 0 0 0 0 0,10� 0 0 0 0 0 0 0 0000 0 0 0 0 0 0 0 0CD .o ci OOOyy o 0 0 0 0 0 0 0 o 0 0 0 0 0' o 0O O O O O N N lD YO ul 0 0 0 0 0 0 0.0 0 000Ol 01 tiV n n '... n n n'-1 H N N N N N N N N Cttl N v* vk +n u} I 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0'0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 O O 0 0 0 0 0 0 0 0 0 O O O O O O O O O O OO BOO O O V'.O o0 O N N 0 0 0 0 0 0 0 O O O O l0 l tD - o O N M m In Vl In In o0 oa o m m' rim m ni m m v v a v v v v v v v v a >n• +n 'v� v* vs arn. u} an vF vx v} vt u* uti I+R tit u* ti* vt v* v} ,in urr srn' wku v} u* .n u* v* in an an v>• ur u* in � I vw +.ka, 'cn.. aYy, cnyr v` vt uw uL ur i a tl vl C1 a an v7 O a a W,. 4'7 0. u,. ✓1 of O a Y.Y.. k0.. Yi....., C3. C] i3 O N Q N cT1 vl ct7 r�'1 u!p V m d a m M m ¢xa a'S cil Y.+b p'al +✓b Zm t/1 v0°i a vmi ate. a vmi lU7 awn vmi a mN vmi m l7 a a"M wn 0. l7 pa��''�� a a a tln an V5 Y,rY ca. u'.I ct wa a an a tln '..... a m 49.1 lD W Vl 00 N N Ln 'o ara Yn Ol N N 10 O W N V7 tl.1P ^? K%9 d71; O N T^�I V r-I 00 N m m V oq N O .i m tlg} ,. agp r.„ to N � l0 O a0 m V tln n W V 7 V '�t m .--i m V vl n n ao m m crt n n W a m tln n W W V In {*. aq In N m. tr r�s m Lrl In " t Yn to tlo 0 v v ao 0 wa to tlo v v wp ao at �'r to In � tlo v v v � to ^d. 'ar � %D aas, +„p, a,ty ww> � L � Lo to ko N N N N N N N N N N N A 9 N N N N N N N N of o N +Y...N R^A tW O O O O O N �C^A rOW N rt'V WV N N o 0 0 0 0lc�� 0 0 0 0 0 0 0a a r� gag 0 0 0 0 0 0 N N N N N N N N O',.CL U o N N 0 0 C 0c1 Ci N u u w o VI R C X v� G VO u u VI C °X w q..tl X Ri C5. + + > J E v v `m E m s m C1 v w` l7 nn I0xvv` p. olw°7 oawn m uJw d din 0 0i n Iw _ow oOwm Eva NOcGcE w g m 0 e,co a �a a cu > .� maEN N >E a E o0 E E 0 N t n 0 0 M a NW w° w w 0a 0v u 2 v v w ouas o c"y0-u a o o E a a 0 E o °o u— E u0 wE wo oo E a ejGw oO 0 )" N ° Y p O 00oi 0eto ° o o oo o E 0 o o0+Ln o O0N o`E o o E° ow m nw m ya Nu�a Nd C> C w w Vf m w NJ w w vka a' s a a >� µa c n c L a a c a a 0 a n a a v `eapr ,.. c m c' ' ; c' ,..+ «, c o" ,' . .Y w,>- y 'n' „�`.., c >" 0� 'c 'a "c E w ° c c `' °c ° �c cs cn 0 ° ay w y,,"�e is c0 "c `" 0 'c,, c •'2 ° ^^ �c c c 0 c J J J 0 E J J C3 u E J E' sz -0 J J J w E -,. J J a E w 0 c 0 . E E E E E E E E E w E E "t E E Ew E E ra ca ? J J J o E E E E E w ,c E ,E E E° E. w c c c cu!� E E E o w E E c E E 0 0 0 0 o 0 0° v o 0 ca a "c o o c—�a o o E E E E o .c �a E E c E ou,uuu ouu au Eou v0 oo�ouS E'uuu o uu oy you roa0vu°O 'oc w w w w � N w w w 0 N O 0 0 O O U O O O O V a,Y O O O ti.,. O ,m.. O G1 Ul r•t J O O w� !C w w O w !2 O.. E E 4� E E -.Y U E O E E C U o E E E E O E E E E o' E o o E v E E o E o E E v E 0 v E o o E E 0 0 0 O O w "'ti".. O O 0 O •-+ O N 0 3 al — rl `-' O N N c O O N O O O c O p c O 0 In o 00 w ,,w 3>> E c 3>> Pa n w .° ti an N U u u u v u u u u - E u '> m E ;E ,o G E E c,? E c c>> E c m J m J m c w E w a m u w w u u u w wa °ac' u u w a n u M u u a a E o° o` o `o o �° `o 2° -'0 0 0° o u `o a `o `o a l o `o 0 0 C w 4'X Ob5 B 'I° � PiP 1iY o,A X:' C', C 49k w Q O C Imo. C q'q '.•Qw U 4L 4l C c e,,,f U, "'O. Ml � , 48 k.Y q,} C C uVvb a„ U J J, J .'J J J J J J J RiN J J w w ! J ''7Y J J J w w :S J. v '.' Sil, ql J J CdY Lry CS 0 0 fl 0 0 CS 0 �? �c m f.7 {y 'J ICd~ C� {� Q^ �! m Ck �C7' � C) E E' E E E E E E E E E E E E E E E E E, E E E o 0 0 o E E o 0 0 0 E E E J E E E E, E E E E E E E E a E E E E O 0' 0 0..0.0 0 m o 0..0 0 0 0 0 0 o O o 0 0 0 o iI, '.o m u u u u u u E u u u u u u u u u u b m m m m 6R4 m m +si. 04, �. m m m U' 0.— U U U is E aoa oc co o E E E c00 o o E E E c` u w c w E c c r E_ E E w c c w e c w c c v v u o E E E E a E E o o E E E tz E E o o E o O E E= 0 y or0 o 0 0 00 0 ° 0 0 o y o' o 0 0 0 o r o o o o o a s xs "E v va ea v v as w v v as rr °6 L6 �� v rca ro 5 ca E J 'O ,7 "SS '"CP J ';5 TM„ V J J J $& J m :� J 1 J iS J J "O T5 3 Y ,' ' J 'O J J 'u m-0 J .0 73 J J "p xJ m "ICF u Q Q Q Q u u,¢ Q u u u Q a a u 'u u u 4 u¢ Q Q u Q u y Q 'L U Q d Q u¢ Q u u Q Q a Q am E E E E E E E E E E E E E E E E E E E EIE E E E E E E E E E E E E E E E E E E E E E E E E E E,E E 0 0 0 0 0 0 0 0 0 0 0 0 o 0 0 0 0 0 0 0° 0 0 0 0 0 0 0 00 o° 0 0 000 0 0 0 0 0 0 0 0 0 0 0 0 u u u u u u u u u u u u'.. ul u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u w w w u w a1 w w w w w w a) al a/ of a/ al al 0 ai ai ai w w w w 0 w w w w al w w w w w w w of w w w w w w w w uu u u u..0 u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u uu u u u u 0 0 0 0 `o `o'`o o `o `o `o o `0 `o `o o `° o 0 0 `o 0 0 0 0 0 `o `°Io `o `o `o `0 0l`0 `o o` R o o `°',`o o` o` o 0 0 `0 `o a w w m v v v v v m a v v v v m v w m v v w a v w v m v v v w v v v v v v a w ai v v w w v w v v v — m m m m m m m m m m m m m m m m m N V1 m N VI V1 N V1". N N In An. N V1 VI ', VI VI VI N V1 to '. V1,an m N A/} N m m h m VI N V1 V1 N m N 4n N m V1 ', VI VI m VI VI N VI El V) V1 Vl V1 V) Vl VI N V V m m m m Ill V1 O O O lO.. ID M C n n r r n n r lD lD V V jM M 7 V N..N.. c-I ••'� to lD O O O O m of M m m D] W m m W m V) V) 00 V M m M ri M m m r r m V) V) D) Ol V V r r n r\ O o o 0 0 0 0 00 m of m m m m H- w w w r r r r r n m M O N Vl Vl V) V) m V1 V) V V m m m N N V V m m m m m m m W Oo ID to ID ID l0 ID to to Ol D) N N N N V V to Ill V1 r n r r IN n D1 0) N n al T Cl O) 41 D) Cl N N W CO W rl.. - M m lD 10 lD l0 v v v a v v v v v v In In' vi Iri Iri' Iri' In vi m' ui' L Iri vi Lr Iri Ili v ID to to to to to ID w to r, r, r, r, r, oo oo as oo oo oo oo oo in /} VT In N„ N L1 iA u) N In VY VT N Ll. VT.....V} Ll. V} iA Vf N N Vl'.,N Lf i/} i/} V! V} L} to th V} v) VY VF i/Y V1< VT N 1A 0 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 000 oo o o o olo 0 0 0 0 0 0 000 oo 0 0 0 0 0 0 0 ".o 0 o 0 o o o o o o o 0 o o o o 0 oo o 0 o o 0 o o o o o 0 o 0 o o o o 0 0 o 0 o o o o o o o o o o o 0 0 o o o o. O o O O O o o to O o 0 o o o 0 o w w lD O o o O O o N N m o O O O O o o O o O o o o O O V V o o O o oc m Ili m w 00 m 00 c-I c-I V V V V lD lD r n n O o 0 c o C - �--I V o N N N N N N llVl V) ri ci ri c V lD lD Cl 0 Cl 0 V V V V V V' V V m In o m V) m V) V)' Vl V1 V) to w w w to lD w w lD n r\ ri N N ri r` ri ri N w w w w w w w m m m m In In t/Y t/Y In an an 'A N M V} ih'iA 1/T N ih iA V} t/? i/1 VI V} in 4A V) V} V? iA �/} iR N L1.In VY V1 IA i V) In VTI V) m o_ V)�% m N m �% m Ica m m U m m d m m VI d m Vl d m m d V7 U m �% m 0- m U d V1 D_ d (.7 V) d V) C7 V) l7 N Vl tl V) V1 a C7 Vf L7 Ol O N V1 r D) N O M M O V V V) w M O O D) N lD lD m lD � m m o lD O ti N W D1 V1 LD lD O N O D1 to to D) D1 O W Ill m V1 lD lD lD lD w n V) m� N V) V) V1 N V) a V R '-I m y lD lD 00 V V V1 N N N M �'V1 V1 m m N V) r N N V v N N m m w w w lD w to m ID LO lD ID ID ID lD ID w w w w m m lD l0 to V w lD to ID lD m ID ID ID ID lD o a w w V to ID w w w w lD lD v v v v'v v a v v v v v v a v v v v v v v v v v v v v v v v v v v v v a v v v a'v v v v v v v v N N N N N N N N N N. N N N N N N N N N N N N N N N N N N N O O O O O O O O O O O O O O O O O O O O w u N N N N N N N N N N N N N N N N N N N N O O O O O O O O O O O O O O O O O O O O O O o O o o o O J d u O O O O U- 7 U U u U U c : a 75 w m a 7 4 E L O > c o t' n a > v �,� u o u + a + E x l07 vmi t l7 of m L a` '^ '° L o v -D O L L C L L L m CO a! L L m `C d >O O 0_ d E C C O C C C d � cl O E E ,d.. [L O N O_ U' V) 0_ �'. V y O O O O O y a) N a N vl wN a v o N N o o `w a`i a`) n, Jo L p \\ C \\\ L C N o o L h to a) d c N V N L J d i L d E v o c_ �_ •� �_ c c E .o o o o E al a v n E 'w u > a E u p u E E u > O ha cm O m m.. c0 aJ J O O a) U u E al O 7 w V U— al w > C o o o J>° c 2 o 0 0 0� �o g 3 a w g J n a c a ar o a u o n n o n o + x o v a_ E o o 0 0 0 o 0 0 o o o o+ v o 0 o w w`_ O Q) o E xlo o u x E 0 o v o 0 o u o 0 0 o m n o v o o o— o o o o c v v o > v o In o > o v in m V) C L U V) M N m a -I N N N 't' to L .O V) a 0 E VI N N W C Q VI 'E U L N N 7 > m E J a c E E E o v m> p n c o j ul ca) U1 j 7 J m J C C J _ L cv cO J v U X d J J 7 d d Vl X 7 d o 7 J o o aL+ _n aL+ c o j Y 'E .>. y .�. Y .:. o o Y o Y E y Y .>' r w v .>. Y Y o o w .�. •.>. Y o c c a 'c E 'c v 'c 'c 'c c 'c ? Y 'c c c E N c 'c 'c c a c 'c 'c ^ c o o c c U % 7 N J 0_ J J 7 o J J 12 g J J J J o E J J J E E � 7 >000� E,�E�EEEE>�E��'E,c-oEEE?vvEEE���vEw?,?EE�N\^\^ -o u v Y E o E E E v E E E° E g E E v c ,c \ m o E o E E E E E E E E E E 'oa — oo o c u c o 0 o o-D o 0 o F .. o o m o 0 0 0 E o o o o= o o E o c, o o- 'oa o 0 o Q u o v E u u u as u o o u g o u v o u u u oo E m uuu 'E o ar u o 'o 'a u u E o J o= m v oD s N u U O O O o O N W 41 al v 0 Vl `y O J N Ol 0 0 .m `m v ao E v v v a`+ o o `E o v v v o N v a 0 o c u y o 0 o 0 0 0 0 0 V E> o v m E E E E E 0 E v v E o E a o E E E o 0 o E E E o o f 0 o E E o o m w 0 3= a o v o 0 0 0 0 c:. o c co_ w .�.. 0 0 o 0 o ,n v o 0 o 3 ul v o o v o O o 0 o o p C L V) N '-1 t' �' 'e N e-I V1 N 4 H aJ ' L V) la '-I c-1 V) N Q O J J J J J J m m J N C J y C J J 7 , J J J C , J , J J , C c uuu u E u' u u u' w o a u u u u E u v u> E u E u u u c c °' c a, E o a •o > > > a, w 'o w ar > > > > o 0 ¢>>o.�m o�oa000a0000`a o� 000aao�ol`oo� �oo�ao ooaa a > v o y Y ul ,>, In �, �, ,>. �, v y ul > .>. y >' o_ y s' Y '^ y a >., ul ¢ Q¢ U w c u u u u u' u u u u >' u u u u u u u u u' u u' C C C C , C C 'C C C C C C C C C C C C C ' m a1 al al N a! a) al al al N ' N W N a) al al a/ aJ W N J J J y J J J J J J J J J J J J J J J J aEHEn�� E-cna��E���En�� E EEE���=EE'E-EEE:-EEEE m m m m m m O O O O O O O O O o m m 0 C 0 O O O c O O O a a E E E E E E E E E E E J E E E E E E E E E E m m m m m m o O, p O p O O O p O o o O p O cc m p O O O o o o O O O O E O O O O O O O O O o u u u u r E u u r u uuu uuu u u u uuu u m 0 m m m m m m m m m E m m m m C v C O C C C N C C C C U a! C O O C C C a5 N al N C C C O O aJ c al N O C C al W al N " E o E o E o 0 o E o 0 0 o E o E o c o E'E E E o o o u E E E o E E E o o E E E E 0 0 0 0 0 o w ',� o ;= o :� .� :- o :_ '.� .� '�= c o += o 0 0 '.� +� :� o 0 0 0 ;� u o 0 0 :� o 0 0 :� '+= o 0 0 0 v v-2-E v v u v �, v �, v-D v �, v v v v v -O V v v v v v v �, �, v v v m m m m m m U -O J 7 -o J -D-a m J m m J a -D -D J J J J '... -O 7 J 7 J "o J J J J J J J a Q u¢ U¢ Q Q U¢ Q Q¢ a. u 4 c1. a u¢¢ Q u u u u¢¢¢ D- u u u Q u u u Q Q U U U U ..�.. E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E'E E E EIE E E E E EE E E E E E o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o'o o o o'o o o o o o a o o o o 0 u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u V u u u u u u u u u u u u u u u u aJ a ar ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai w w w w w w w w w w w w w wai w wai wu u u u 88 u u u v u u u 0 `o o o `o 0 0 o `o 0 0 o o 0 0 `o o o o o `o `c `o 0 0'o o `o `o `o o'`o 0 o o` o 0 w w w� � w w� w v d v v a v v v v a m v v a m al w m v v v a v w v m m a w a v v w v v w v v w v v v v v v w m w al is io m io io is m m m io m io io io is is is iv io m m m io is m m is m m m m io io is m is io io m m m io io m m m m m m Vl V1 Vl Vl V) Ul V) ul V7 V) V) V) VI V) VI Vl Vl VI N Vl Vl Vl V) VI V) Vl ul V) V) Ul Vl Vl V) V1 Vl Vl N N V) VI V) In VI Vl In V] Vl Vl Vl. El ri wM c-1 e-I n N f\ n tq GT9 tD m lD W' lD lD 00 00 a9 V1ti✓"d V7. V}. co o'000 cr o o o cS O O aA, O O a 01 6 Ob iJ?,,,tA'vF LL VI Ln a a a lD r-I Ln m m m m 00 <0 lD lD a gyp' o 7 V O O O N � O m m T V V O O O lD l0 LD N N N m of 01 V? iA V} olo 0 0 0 o 0 0 O O O lD l0 lD o1 !r Ol aA a a � zn N N 40 m d' in LO LD '4D c) o* O O u N N N to N to I, m 01 V} 0 0 N n ❑1 .V} LL. D O an 4n WD M1D '"9' 4'7 N L!1 lD N O lD m n l--I m V 01 O V} iA 0 0O 0 0 0''0 N co n m 01 O '-1 to a am to O O N M1Wa O O N N Co O Ska w•i '+'7 d 9d"4 0 0'0 00 O. '-I t/f „" , O N � .u�"7^ tl'MY lD O lXl c-I O e Vf 000lo 0 Do m O .--I vT'',.ah u Ln l0 � to O m l-i R O �-1 V} 0 0 00 O '-I p m oM A!b lF'R � 44w1�a 'r"� N lD lfl n Vl e-I c may. 0 0 0 0 N ei to V7 a a N m ID � N N N l0 WD N 4"R n P"'• vl 4!"h c-I H ilT +u`% 0O 0 0 0 O'o 0 .. O 0 0 N N a -I e-1 -- O a m m vi Ln 0l '-I m m ID lD � � N N N l0 Ln 1, c-I - VT,'BdW 0 O O N rl VT- VI o a O N lD � N N N l0 lD GfM.. Ln E"* I� 4h N a^p' e-I,.. m N' N o 0 0 0 0 0 0 0 O O N '', N N r-I u! a m m T w 00 lD v � � o N n lD c-I O V7 N V? 0...0 0 tay m N rWB 4-=qp4. Ln a 00 m lD � o t` n lf1 N N N N O O m Al a c-1 V?N 0 0 0 0 0 O O T m 0.1 M rl ci - � vi a a n N N m rID.� wwLLo � � �y q n N N O M '•1 ih 0 0 0 O ul M e-1 - N a a of N a '., O 01 W M e-I ut 0 0 0 O V 4 '•I - H W w � C O m '... m T '-1 A,tR 0 0 0 O r 4 r-I to � a 'D H lD ~ c7 O 01 W O7 e•I ur 0 0 0 O a ',. r-I - u l7 N m to "lD � V O 01 m M 'i 0 0 0 O V V N to LL m in N m w o N V C ''., O O Ol m t>0 m T M '-I '..--I Y V} V} 0 0 0 0 0 0 O O v V r-I '... '-I VI - LL u m C7 ID LD Ln o to to '.' o o O O N Ol Lo a ri V? 0 0 0 O o In N In O m Ln M N l° O o N lf1 !r Lo V V c-1 V1 0 0 0 O 0 V1 ri - M a a 'i 111 to o O '., N to Ol to V 7 .--I M1n 0'00 0 0 O o Lll rl — !n a a M OCp K$ �A o '-I to 01 Ol O 00 W n m Ln N l0 n lD '... O V Ln lD ci rl '-I Qw 'KTb In 0 0 0 0 0 0 0 O O m m N N Ln LO n ei c-1 '-1 - — — Lx. C3.. Ln m ai o m m T 01 R�5 M I(r m 14 ar '*4d�r �C"3 R;3 QV N 9O�tl M M lD m I, e VT 0 0 0 O o 00 ri — a m vu t> N +,Ra M V m lD m n ' i? 00 0 0 o ''. O 00 'i - u i3 rV A7'Y .r�-c�r NU` M V M tD m n c V1 0 0 O O fA' ti -'.,-'- m in a -I N lD CC^N3 M V M to m n " VT 0 0 0 O O lD ci m yr N im kD S3 Q M... V M lD m t` a V? 000 0 0 O O 00 ci cr lfl lD O N M M lD m n a i/1 0 0 O O o 00 - m Ln M m v O N l0 O C V m N '. I^ 0 0 O m N +.1"n a N N W O N m 01 u•i V N ll 00 0 0 O Ln LA N - a a T m lD O N M O O Ln N 'VF 0 0 - N Ln N a' u l7 m m ID O N M O O Ln N lj1 0 0 0 N al '.., Ln N — mum an 00 m ID O N VI V '... O '., lD. N V} 0 0 0 O 0 I� N — l7 n N LC) O N Ln C O lD• N V1 0 0 0''0 O 0 n N M Ln n N to O N to V O l0 N V} 0 0 O 0 n N — Ln a au N Vda O r"J m T O tD N V} 0 0 0 O cc N N - °« ' I,A" . N On m uJ N J �A U E X u+ U ,, ta) E v v al. E ,, al > c s7, O Diu Ln N E µpi' x O u J J• W E a x' c ° to to ...e. N o N E U '.. 10 N N E x N CY in o al v v d d C C 'uui v Ol c m E <n 0 'C E d U1 E y Ji O ."J• O J CA. o° u U a E v'- u N t v m E n E n E ","�„ u — N> v v c v J 'a v u u .. o a. O a D, E E (u to >� as Mo a J m u J N m � a '"` � � U U J � U V c u � I, J N A"A ia. V VJI u a u — J ,"` OJ cO) C OCcJ G c— � "^v'. u u o U -r m VI ,--„ o U o .... V E o o °' N y N C G O O ° O'. u o o+ Z o ` m o ss, 7 0 '^ °' ,D ' E x a p + w J. '^ w,. o a. o 0 0 00 ..J Oo m v o �° 0 0 E 0 0 o N al m v d o o o 0 lf1 Ln u c 0 0 N o 0 N v E'O ' o E v N E W o N v •E n al c x° -8> ` �o C a o E v x o f E 4J t°a o'o o o N Oo v C o w E .a E I aM ,w E W E C x O m O N m a m`, w >> E x>> , E m ,� > a 0 v J v .E aJ > ° c o m N x a `1 a v a, c m O m , 3 , J J m.....Ln n J v TJ �m O p cm E ` j °cu e a a in un a O m a a a H vi «,.. a N en o a a a a a'aw N o a o ii` ?" O c E w , c ri"! E .E -C y +'" al 'hr O o D "�'r L,"",., +n v v C C'. m n *; O d rw -fin a L u {A v -a ! c c E J J o l7 m n c a J E E J E E c c a ° E E E E c J— E' E w .E c a c J `E J c J E J E a E a w "� c o c o 0 E c E E 'Ea w E c E E E E E m v E E E E 0 2 I � E � � a, 2 cu 2 s E "d° Eu a: E E E E 'a4 a E o o Juu0ou "2 o o° E a J E Euuo o 0 o E E c= E p E o E E c E 0 c mo o a� —° E E u° 20 o f E � c E o E 0 E 0 E n Eo o E E E E c "D "a E o J a! al O J E E'cx L^ N Ol A E N al E E v ai N a/ Ln N o U N E o° N o J Ln N Ln N E E O a) 0 0 ° 2, U77 u al u m u a/ j u al cy ca G o ri o U o u au ,° 1 a O N n o o ry o 0 0 0 0 o� E 0 E o w E o 0 v 0 o E 0 o o O E a`, o E o E 0 E 0 E 0 y....o ,� `m..,, `m o 0 o E a3 uoi r m a on a,a v v r,� Ln o 0 u u v u' u' V U u' v Li u' w, a u aa) v '. w w u `rigs: m m a u' u u u' •� E a Li U o o oas m o o a a o`o o o a a m c�`o o u m aar ,�^ w+r yr a• w" M, aa. we wmZ,w °"" c c u e vL a m d c c" Oe 9 Z :E c v c c C) C 7 c q J E E en Ci is 0 J E as'""e ra rca Cb C) - c D E' a' J E ca J E Q `E J E J E _ 'E 'E E ^ J E J J .�'' E E a ,, E ov ar to a ru i J E J E c J E J E E an ° E E a o o°° E J 0 o c 0 0 E E 0 0 E 0 0 J m E E Cy E o E' E E J J E E E E CJ E C3 C) E E E 0 E E E 0 ri E u E — °° u u .-i ei ° u ei .-i E E m °� c u o 'i 0 ° ri u— o u 0 o o 0 u o u E E E E o u 0 0° u o 0 u u 'i 0 u 0 'i 0 i 0 i 0 i 0° u u g u 0 0 a u e7 u 0 u 0 r E c E u c u° E �x c c c o m E a E c g c o a E c c° o o 0 ou c va c w` O Y u v E v E o o U U E cz u E v `m c,a E E o E c o c o e ca c o c '0 E° EO O O O 6 "a � O .a^L' "CS .C] "'21 'O O O "O tl '"O a "a "a � O O � '. "O 'C9 CEJ 'O O` C ", � '' O O - d d a �A '#� O O O v O � 'L'ti is is " "s ' ^ �LkO. Q Q U U ". Q u Q Q Li ei M s Q+ d Q U 2 a u U 2L Li U< u U U Q U Q<° t °5 M1,.d 4.A Q ^axr' u u U Q E E E E 5 E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E EIE E E E E E E E E E E E 0 o 0 J V U U 0 0.0 U U U 0 0 U U 0 u 0 U 0 V 0 V o U 0 0 U V 0 U 0 0 U U 0 V 0 0 V U o V 0 V o U a V o V 0 0 V 0 U 0 U 0 U 0 0 0.0 U U U U o U o V o U 0.0 U U o U 0 U a U o V 0 U 0 U 0 V 0 V L al N a1 N N N N N al a! O1 N lOi a) Ua71J UaNl uOl uO/ EO/ aOl) E711 uG ply1 W U U U V V wNI uNf U V V aWl O w O O O O O O O O O O O O O V O GUJ UE/ l UUall UU/ Ow1l Oa/Jl Ow m on m oN ' no INu n 76 LUu1 n VUuJI VONl1 ., VWUuI [OuJ n%N LU1 75 VVU1l 'nVI VUO1l m VU1l VNu1 t7o/ VaG1l mVVVVV / El C 11 00 m 00 00 r V V a V N N r� n 'n r/1 Vl In m In O e-I N N l0 to ID 1� n n o- m m Ol ! (n 01 41 m Vl O O c-I V M M M V V C V O O O O O m m .--I c-1 m m m [0 m 00 m 1� N N V7 Vl Vl V V N N N N o O O O m m I- n w� V �n m a -I rl r-I .-I Ol al m m m I- N V ko w w o w w M I, N N m m wN N N r-I .--i o O a0 oo oo 00 m N m m 1� '... V V n n r V O m m o0 00 m m m m m N N Vl o N N N N N N n n n 0 0 o o 0 0 m m m m I, n n r O H m Ln C V H H N O O 1� n n n 01 al Ol Ol al t11 V1 N N Il n n n n n �"� O lD 1 V' V C m rn m 00 m C O m m 00 w m i V m 'n m m m 0o N N.......,N N N N NN N N N N N N m m'...A A M M A T.....m m �w a).....'V'Q V V V V V V V Ln Ln V^),. V^1 If Ln w w o w 1, m m m m 00 iA i/T iA LT LT V} t? Vl VY i/T L} in, V} t/}',VT L} VT'.... u} N LT L\ 'n VT'....L} Lf Ll Vl'... L1 t/Y N, Lt VT V?......'14 V} LT.L} LT u? Ll N VT VT L} V} 'A L) LT Ll 0 0o olo o o o 0 o o 0 0 oo o o oo o 0 0o o o 0 o'..o o o 0 0 00 0 00 0 0 0 0 0 0 0 0 0 0 00 o 0 0 00 0 0 0 0 0 0 0 00 0..o 0 0 0..0 o o 0 0 o 0 0 0 0 0 00 0 0 0 o 0 0 o o o o o o o o o o o 0 o o o o o o o o o o o 0 o o o o o o o o o o o o 0 o o 0 o o o o o o o o o o o a o o o o o o o o o o a o o o o o o o o o o o o o o 0 0 o 0 0 o o o o o o o o o o o o o c c m m o0 m O O O O O l0 IO a W O O o O O O In In N N O c O O O O tD l0 c 0 0 c 0 0 o0 Ln O c O V V 0 0 0 I� oo 00 00 00 00 o 0 o o o o o N N lD W w o l0 w n o M m m Vl o m m m m m t V o 0 o o 7 r� N N o l0 o o o 0 N N N N N N m m'm m M m''....m m m m m M. m.....m m m V V V C a V V VT Kr a V Vl VI lD w o w w w n Vl. Vl,,... i/} Vl4/f u? VT LT 'A Lk LL LL a -a VI - LL N a LL N V1 LL VI LL a LL LL a Vl LL VI �. LL a.m umm m m a m U m m a m �n m a a u m �n a m m U m u m m m a in �n U m a m u m m rn l7 vi rn vi �n a �n l7 rn rn a rn a in a a 0 ',in a a rn of C7 vi l7 of �n vi a a m l7 m m m N �0 m .� m �0 0 .� a �n m m N o o .� m rn �n a o N .� .� m m o N an �0 ry N m m v m m .� m v rn m m m m m m v Vl N .--I r1 N V M m m m m T T N In N N N m In m m N N N N N m m m lfl N N N N .--1 N m In r-I N M m N .--I M N N N m m �o �o Zo m v c v v �0 i0 m �0 io m m I0 a v �0 m m m m v I0 i0 o m m m w LD m w L0 m w io V0 0 0 0 0 0 0 0� v v v v v v v v v v v v v'v v v v v v v v v v v v a v v v v a v v v v v v 41414 N N N N N N ry ry o O o o o o O O o a O O O o O O O o o O O O O O O O O O O O O O O O O O O O O O O ',N',N N N N N N N NN N',N N.N N N N N N N!N'_N N. N'N N N N N.N N'..N NN N N ry N N N N a 0 0 o a o a u a c LL J L 'n>O_ a . U O E% o v o o a >w a`o f 0 U o> a E ua `> 0 mUv E ° - >�pi v u LL oo O La LL u.'ug - v J 7 aJ � OV o x v On v n o o v LLn o u u o E x u o n uwx o ov uE aiv`0EEtoJu Ev LL .. 75 ao 0vmE 0 o es ai O ai x> d�cwJv nai c x rn ` c v o o aaa Uo >oN LL j aiE xCO 0 E O OC -0 E o vC O OoO O C E 7 ^c o rN -0 m aE Ln m L m v> O y a �c 8 o nN y N E E ELL n .> c v Y Y a Y J o 0 0— J E v c F v v J E J c,aE v aE m c k2 E `m c J v c'c `v 'c v v `w EE �'� �o o p,,o �o E v n J E a c J o n c v a J E n J s J 0 E as E E E - E E E E E E E E E E E o c c c E 0 0 0 0— o 0 o E o E 'oa o o E E E v on o o -0 E E 'an m v o 2 v v v v v U na 'ea 'aa v u o 0 0 0 0 o v u E v a E U o o v v v o 0 o E' v v o 0 o E u E E E 0 0 0 0 0 0 0 o o 2 0 o ,n 0 E o 0 0-- 0 0 2 0 0 2� 2 °. � o Ln �n o o 2 v u v o n N u o u v o u u o u v v v o 0 0 0 o O o 0 0 0 0 o ry o o o rry o 0 E o 0 0 o E o o o 0 E 0 0 E o 0 0 0 0 0 `w o 0 0 o ry o v E n o v v o n y o 0 0 0 0 0 0 0 o n 0 0 0 0 o c 0 V o 0 0 0 o c o'o o o o c o c c o coo 0 0 o �n v v v w o O u1 a a) O In V1 0 0 v v 3 0 0 0 0 o i y ci N N N L L L d ul N N' L In N N c-1 N L d W V1 Vl N N ci t' N N L P'� P'� N J J C E EC C E E u J `Ej j o a Nv a r j j E E mJ mooJ mv a am tiesv v h0Oa W j J J 0j a/ v aao a aJ E aJ E amo a aEv oam aJ aJ aJ a,0>,o o > > >>>>>» >»� >»>>»>> 0 a »>>a > 2 >� >2 4 >>> u -C ,, Y� ,,,..0 U .E -E -E -E -E .0 .0 .0 u 'C 'E 'E U u *E 'E 'E 'E C E E C U v C C C 'C �:- 'C v v Y C N v C Y C C C 01 J.'...• J m J J 7 J J J J J mJ' J J J J J J 0 E''3 3 E-0 E E E E E E E E-0 E E E-0-0 E E E E E E E''E E �'" E E E E= E 0 0 E E E E E O O O O O 0' c 0 0 O O O E E E E E E E E E E E E E E E E E E E E E E'E E o E E E E E E E E E E E E E 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o a o 0 0 0 0 0 0 0 0 0 o E o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 u o',o u r u u u u u u u u u 0 u r u u u u u u u u u E u u u u our r o u r u o r u u u v u u v c a v a m` `m v m c `m v v c c `w `w v v v v `w a`e v c 0 v v v `v U `m c c u v c c v u c v v v o E v v E 0 E E E E E E E E o E E E o o E E E E E E E E' E 0. E E E E v E o o v E o o E v o E E E '- o c c o 0 a a 0 0 0 0 o a o 0 0 0 0 0 0 o a o E 0 0 0 0 o o� o c 0 0 0 IS J m m J ra 7 7 7 rin "n rn rn '.'... rn ur rn n 3 77O 3 J J J 7 7 7 J 7 J J m 3 m J m J J J Q U [� a u <L'. 'k.9 U u u U U U U¢ u u u¢¢ u u u u u u u U U Q..m u u u u a u¢¢ a u¢¢ U a¢ U U u ElE E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E o..o 0 0 0 0 0 0 0..0 0 0 0 0 0 o..a a o 0 0 0 0 0 0 0 0 0 0 0 o O O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u ai '..... ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u l u u u u 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ,O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 '.. 0 0 0 0 v W O/ OJ 0/ 71 Ul T T 2 G1 N N Ol N Ol Gl U1 2 71 N Gl Ol 71 N G1 Ol N O/ O/ W LU W Ol 2 N O/ 2 Gl 2 Ol Ol 2 U1 U/ 01 N N U/ — m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m V] N N Vl VI Vl Vl N ', N m Vl Vf V1 m V# LI1 N !/1 m Vf N N N Vl V1 0 N VI ✓1 N N VI Ln ln,,,„F/1 4n V1 to Vl Vl Vf Vf N N Vl ' VI VI Vl N El M m m m v m m H n ry o m m m. H '.... H m w m m a v m l w ,, ry ao N o w a W m N, m w c W I Ln -! 0 n Vl 7 lD lD w ID V N N W N N N N m m cT 'IN m m to - H m W of o0 fn W Ol O to 7 In O .� 1� t\ r,n� N O H w m to w m o n to o O ;t * V 7 N N 0 m m m .-I w m m o H .-1 m m m N lD H ci c-I c-I c-I o M W N to Q H H N N O M M N m m m m c H M H H N H O o W H W W '7 W H N O M lD I� N W W W W W lD m rl In f\ n O O N N M LID W N W W IC lD 1l to m V lD ''... V1 Ol N m t\ o H m� m m � N W W W O V lD lD l0 lD N W V m m Ln to N O O '... o6 V-:F l0 rrm m r, e-I .-i D1 N oo n O '4 7 ry N r-: N M m rl e-I LD m m m m m M O O N '... N m m m a v Lo n r� N 1, m m m N ''... m N H e-I c-1 - e-I .-I H c-I H .-IN N N � to i/f iA V} V? V} if 'ih LT v1 Vl V} U0110 t to iA Lf i^ to In VT In In VT tit in 'A '..tn-I Vh V} ,T V? IA 1/? O O O O O O O O O O O O O O O O o O o O o o O O O O O o O O O O O O O O O O O O O cc O O O o O O O O O O O O O O o O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O o O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O N O O O tD O O O O O O O a O QD O O O O O 0 0 0 0 0 0 0 V1 O O lD lD O O O O O O O O O O O O O In O m O N u1 r-1 V7 O lD V to W N N m O ti O o o 0 0 w N w N o o m o A o a 0 0 N o 0 0 0 o O O N D1 ao O N a ', V N n a m - c-I `ti ' n M N N Ol D1 Ol T D1 O O '-1 .Ni .N-I 'N-I rrvi .m-I ..�-I 'Vl-1 W W W m N N o No e -I N i ©®©©©©©©©©©©©J]I©©©©©©©�®©iGWi®IWlfi!rtl: VI Vf a s LL LL V7 to LL LL a o o o V1 9rN Vd!'VR Vl to VI vy o V, a a m m m m a s a s vy cry l7 yn (7 vy a s a yn v'r wn a o �n o o a a a a a a o yn a a a a a a a a o nn m m m v W m o N aq m o m m o W m m v yn 1D m mr wn�,cw m¢ m N yll W W •-I m .-I N qWp Mkt '-I r-I N N N W W N �--I N W W m^1 m .-i lD W r, r, Fd3 lD 1� W W n n n ID ID M M lD kD 4D 5D M 9i'! lD '... lD lD lD V v lD tD lD '+c�^ "C lD lD lD lD 1p Ct v W lD lD V W' 4D UiHII�O� '7NU,toNIn0oN0u1u� v v. v v I v v v d v 0 0 0 0 0 0 O0 0 0 0 0 0 0 0 '..0 0 0 0 0 0 0 0 0 ca 'G7 O O 0 0 NN N N N N N N N N N N N N N N N N N N /^4 tiYUN N N CW N N N N N N N N N N N N N N N N N N N N q E E V J J u to w A LL... w tm t �? c V La"1 S x O 'G: ?" J ` .J nP Ul w Q 0 a C yJn `w_ u o u y_y o "' v u ,.,.� o u �.`. w a ea. M ca o U O1 X u ` V X Ii.1 J up Q1� MJV W .0 4' CS° (A, J o v E J u o v c u— v E J o v M n yn ca c7 ca D a p a v yn v :m v c N, .-...po Nma m+��coacu mam_ �v�ww wmmlmrx Iv D+v xo m `m , "" � v o a C v J nn v o n a e n p a .c E n c c n E v i o 0 o ao E J va E aEi n` .E aE v J w v c o c v w e v a E v 'u o a v o o v ca E cu n v v x c a a o E 0 0> az N o� v N .aa E E ev ',..�, :"� � v � v a a v v a a o I m o a mI E No ° E E g E v v a o E E �' a N 0 vy N v °' v v �° � o 'C �. t t,�:'. o o E v r E v �,", v c �'. 'E E c E v wIE v` v w w E 0 E 0 0 0 0 0 0 c ty v v e v e v n «e O o.. o M M a ¢x D. a o o� a e�� a c� m vy°i c:: �. E v eo v v g oa w E Ea E c E u o 0 o as ea. a ca ax a a o ra E o f E n� v o v v l v m v awe un J J J J J J x x E o w O v E o v v E E n a E o E m m n n o o n p wz u C. o C O o 0 0 x x x x 0 0 v v v E E n xs E v 0 o v cs n an u c a o 0 o v o v o �a o o E o 0 0 0 o v v v v v a`_j v v o o o o� o o 0 0�� o 0 0 � o o oo n� n� E E E E E E °a E c ° � E a v no ,o r o00 pogo nno vvv� E v wmS E 0 E v aal0 ri o o u^w o 0 0 0 0,. o yn o yn �o c c c c v v v w v v yn m v- v �yv o. O E O O w ul o o� Vl o 0 0 O O N O � N � N m. m m � w 0 0 O �0 O �. O O O .M o O 0 0 0 �.-i o O ,.-,, V7 v1 v1 vy a a a a a a N° N' N N LA N ON +-�- t-' w ` w w w ` w w w ` i v al O Cat 0 O O O O u E w E'n E c n a E c E c n a n n a n n a'n a E E^^ ry a J v E v E J v o E E J J J vo J E J v..E E E E E E E E E..E E E a `o •.,� `r�u v ao v v a a a a v m ..w v o v v v v v v v v v v v a a a D. a a a a a a a a C u Z. E y., C' � O C E 'a,,I y, E C E 'C E .�",.' � C C C � t�,1 .>+, w"'mi w'"J^' w .�+ ,w "'N` ,.'>.rcm z J Gd J J L `.t '7C '„d ','� E" E E E E E E E E E E E E E E E E E E E3-0 E >> E E E E E E E E E E E E E E E' E E E E E o E E E E E E E E E E E E E E E E E'E E E E° E E E E E E E E' E E E E E E E E E E E E E E E E E 0 y o e 0 0 0 0 o o o 0 0 0 0 0 D o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 u D .o Eu �uuu o uuuuuuu Euu a E� E E E E E E E E E E E,uuu auuuuuuuuuu 0 0— o 0 0 o 0 0 o er 0 0 0 au "rrr, v% v w w` u u v w v v w` a� % v v '4,t 10 u u u u u u u 4.1 u u o E v E E E v v,E E E E E E F E E o E E E E E E E E E E E E E E r c o 0 0 c,o 0 0° a �' v `v `v v v `m `m v `v v`w En C' O «O" au y c C C c C C C,„'. O O 2 O O O O O O O O O O J !1} N J J J (p (o J J J J !S1 J J :A !o tp a] N to f0 fO a] yO fO t l9 J J D J J J J J J J t.N ¢. u u aa. WS a u u u a a u u u a,d.. u V,.,Y a. u u u m¢ a a a a a a a a '.., a mL m a aJ 'u� �u u '.... u u u u '..... u '... u u u u E E'E E E E E E E',E E,E E E'E E E E E'E E E E E E E E EE E E E E E E E EE E E E E E E E E E E E 0 0 0 0 0 0 0 0 00 0'0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 u u u u u u u u u u u u u u u u u u u u u u u u u u ',. u u u u u u u u u u u u u u u u u u u u u ai ai ai v ai ai ai E E u u u u u E ai ai ai ai ai ai ai ai ai ai ''.. ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai ai u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u O O 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o O 0 0 O o 0 0 0 0 0 0'.. `o `o F. F. a N F. F. N F. F. 5 ,E Fu 41 5 N N FG 71 is Gl '' N G1 U1 71 Fa N Gl N 41 41 O/ O/ F. ' FD U/ m m io m m m m m m m m m. m m a m m m m m m m m m m m m m m m m m m m m m m m m m m m m m io m m m..... m V1 to N N VI V1 '., o V1 {n {n V1 A/}'., V1 VI VI V1 VI VI N V1 V1 ',. V1. V1 V1 V1 An VI yn VI VI Vf VI In V1 Vf In Vf V1 VI V1 4n 0 N1 '. to V1 to ' VI V1 VI El n n v n m ti H N* m rn rn m m m m m m ' m m N to n of Ol m m rl H rl N N N N 0 0 01 lD D1 to lD N m to to N N n n cl ol m 0 0 0 0 0 0 m m ao m m N N n o m m m m lD w m m m n n n rl: V V ',.., - w m m m .u1-I .--I e-I e-I �--I .--I N N N N N N N 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 O O O O O O O O O O O O 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0'0 0 0 0 0 o v m C C 0 0 0 0 0 0 0 o O� 0� 0 o Oio 0 m oo � O O O N O O m o1 an O O ��. V V• O m m m o 0 �--I H H N N N N N N N N N r-I nVinII�V�II�I I I�II�I�II�II ICI II I�II�fl�V lV�lUll'U� , �uNd-dM- N. NINIINI NI N I'.N J 0 u Q C O 0 O U U E J ej > c O o n C7 v v ... rcN o c _ C7 vi `m `m v n d N n L o a, A w w E-0 w C E w E 2 c o o 0......0 020 c K K O O CD O 0 Ou O C 0 N N 6 0 N a 0 w ❑ ❑ ¢ O S� Si 12 N H `w a`i v N m m t>o L L d V � N y>, v a m "E > > >,.....E > ¢ ¢ m sJ.^.. .. . ,. J .; C V "6 E'. J J '.. J E J E E E E E 0 0 0 0 E E E 0 E u V U U o 0 0 0 m m c as v m m m m in N ', N lzt w m m m rl� .--I . O m O.ID m'm m a -I V T N m N O 'i N a o1 a m an m O N m m a w of r, w r- v '.....� N N m ID 'm-I ID rmi O O O O O O O o O O O O O O O O O O O O O O O O O O CD O O 0 0 0 0 0 0 0 0 0 ID O C C C O C C O N N V a lD N O O N N M n a -zr n -zr V� II -,� II -V� II � II U'� II lu" II � II V� I ahNlv� v m m i M rn am o n ml -lv m mn m w v v d o ID w oo m .� lD 00 m o a m N O w c T V O N m l0 w O n n c mw N n c ml0 m 0 � N M N V V O m .�-� �D Ili" n M a" r, '..... Ln m m rI .-i '..... Ln ri m .� Vl. VT'N..'',.ln V} iA iR ih t/} i/F VT Vf VY"I V1= In, i/f lff O O O O O O O O O O 0 0 0 O O o O o O O O O O O O O O O O O O O O O O 0 0 0 0 0 0 '.. 0 00 0 0 0 0 0 0 0 to"0 n 0 0 0 O W V O m m N O n r 0 N O N O V to to O m M '-� O n V N W M c-I M m m M m ,.... c-I c-I l!1 c-I N' N in N V N 1R 1 in ',,4h t VT.V in ^ "} u m U U u u m m U m a a in at D- a a m a m l7 0_ m l7 m l7 l7 r, a, '... a m m m m o o_ a V l0 O M m M N W� n N 0 lD v m m lD to ID ID n n n a n n m 01 O1 Cn D1 D1 O1 D1 0 o O o W '-I M V �--� N M N N m m rw m n n n n n n n n m m � n n n n n n n n n n m m m oo v o 0 ID lD lD lD lD w to ID V �D 7 V T V v d' C V . 7 V to to w w w o w to lD w w w l0 l0 ID o o o o v',v o v o o o o o o o o o o o o o o o v o o o o v o o o o o o o o o o O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O N N '.. N N N N N N N N N N N N N N N N N N N N. N N N N N N N N N N N N N N N N "N 41 u V J m + v `v u '... u E > w " J v 0 EO + C 4_ V u u\ v .E 'o t J m C ',,. T O O d` N w U N d t U C U m \L•`acovE-I ,' nCux ybOm c .. a GVv/ + =c �LX C .O -E°ow d x m O > o 0 2 c N �m ow c E0 uE>` °N aj NEoo-0 w .91 to > 00 w EE E o > �pmEv oc pa0 0moa'^.2 m'E0 cL 0Eyw� 0rr0 0 E C'E CO o u Z' oE .J� oo 0 w °x o E E o E w E E o o o O000utg go� oou2 oo 00 0U00 ) '0 O J 0 N O O O w O O -E -0 mONO O0 0O w m `w U 0_ m N D_ m L d w m w `m c .......E E......E c > C� w u � �� J J u w C m[s; C C C C Cmoa o w m a o a a `o m was 'aa 'oa 'oa 'm'O 0Y0000O_'E 'E U 'C C C C C C m c o c a'UJ a E -' r- E E E C E E>>; 3 3 0 E 0 E E. E E 0 E E E E E E E E E E E E E 0 0 0 0 0 0 0 0 0 u E u u u u E 0 u E E E E E E 0 0 0 0 0 0 0 0 u — o 0 0 0 0 0 o u C `v C 0 o `c y` a`� C v v U U U U U U o E o v E 0 E E 0 E a E a v vmv v E E E E .= o '.- aCv` 0 >0> v'o m m m m m m>o 0>0>0 u Uu u Q u ou > mc a a D. d o_, o_ U U u u¢ j 4 a U n p �n u O O O in N U a u 12 u u > — U N u J w U c j m❑ li d C V to E m+ x o o E vi + O N w 0 m-0 C OJ w > N W ICo tco E c l7l0 0_ 0 O 0 o O O O O O O O v v -0-0v v v a v v v w w w w w w w w w w w m ° w a a a n. o.. 'E E E E C-ccw w w w w w wc c C c :D Z) n Z) u u u u u u u u u u u w v v v v v w w w w w C C C C C c C C C C C C C C C C C C C C C C O O O O O O O O O O O U U U U U U U U V U U C c C C c c C C C C C w w w w w w w w w v w E E E E E E E E E E E C C C C C C C C C El w w w w w w w w w w w > > > > > > > > > > > 0 0 0 0 0 0 0 0 0 0 0 U 0 (D l7 U U U l7 C7 U'U J J J J J 7 J J J J 7 0 0 0 0 0 0 0 0 0 0 0 U U U U U U U U U U U w w w w w w w w w w w u u u u u u u u u u u ` .2 .2 .2 .2 .? .� .� .` .2 .L w ai ai w al w v w v v ai E''E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E'E E E E E E E E E E E E,E E 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0'0 0 0 0 0 0 0 0 0 V U U V V V U U U U V V U U V U U U U V V U U U U U V U V V U U U U V '. U V V V u E ai ai u u ai ai u u u ai w ai u ai u u u u E E E E u u ai ai ai ai ai ai ai u u u u u ai ai ai ai ai ai ai ai v u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u O O O O O O O O O O O O O'.. O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O O 0 v v a v v v v v v v v w''. w v a v v v a v w v w w v v v v v w ai v v v v v v w v v v v v v w v vl m y m m m m m m m m m m m m m -- m m m m m m m m m m m m m m m m... m m ✓f m m m m '', m '. m m m m 0 m ''. m "'� Vml to to Vm1. VI N In N V) - V7 to to to VI '., 1% VI �n m m m m m m m m 0. 0- m m m m m I m m M '., e-I N V w W V N 0 In N 01 w w 00 N J'N Gl la V m V1 V CIl W N N M m V l0 N '... m 1� '-I M .--I lD In n •7 ul n to'... M V n V M N ''., rV T w t I� w O Yn M W a, O lD V N O '-1 N 00 O m I� Ol N d' Ol 00 c-I M O 1� a1 I� lD N I� Vl M Ol 00 m Ol O N O m H Ol M w ✓1 N N N V M H N w H r-I c O w m m N m 01 W N n p e-I .-1 N� R V l0 .-I N M co '', N .--I lO .-I 'n lD o l0 V� l0 Rl cl) a) l0 V a N -,I a) N, N O m W n co W m a m 00 N lD In e-I W W lD O O lO V O' N 1R 00 M Cq V7 m m O e-I a1 N M1Cb N I- m 01 W n 00 N V YT n ul �"+ r�4 .. 00 N O C O� V 10 N 01 a0 V o N T 1� m N w m N m V w o ul n Ln N N Lr M r^M. and N N rj. rj' M N M N ti c-I N V N M -zt '-I 00 a) n M rn u�r''�n Lf ih V} th in N 1R i!} V} t/f tR N'n MPW e,pty taY to Lf In L? V} L} V} V} If). LT lA V- Vf V'k #✓X. At"r "h.,�id"A Vl N Vf iA i/f W w,OM R+"w WM Vl in in o 0 0 0 0l0 0 0 0 0 o o o o o o o o o 0 o o o o o o o o o o o 0 o o 0 0 0 o o o o o o 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O O O O O O m O O O O O O O O O O O O O O O O O O O O N O W O O O O O O O O O O W O O O O O O O O n N n O lD 0 V O O O N O O V O O 0 o 0 0 O m O N O V n 0 W O O N V N D 00 W O O a 0 0 o o 0 0 0 Z N W N W 01 O 0 O O N u) O V n 00 N N O1 O O O 0 V V N O O W M T M O N M p u Ln ccO O c-I r-I ID M N OD V ',. ri r-1 n M N N .--1 M N V '-I .ti M Vl M M �--1 V O O O .N-I p o W v?,V1 v? VT N Vf lA. N in ^W W L 0) Q O O O a-1 FA'M O O rl N m V l0 1D n 00 T O N N m '�Y' an. lD I� 0p Ol 01 O O O c-1 N T V Rn LCN tl^« GU CC5 O .-I N M V lD I� 00 0o m oo m N m m m m m m 'o o m n rM a. uw n t. n n r. n n m m rn Yr m rn Y.n qrr m nm cn o 0 0 0 0 0 0 0 0 m m u� o Ln m Ln o m �n o o m Ln Yn Ln ub n n w o�� N N N w w cn m m m ui u'v m um m u'm o �o o o o �o �o o m 0000poo 'vvvvvv *"ass d vvvvvvvv r o- yrsoa o0000 vvvv�ip0000Ooroacs ac7OOOOOO0000csca N N N N T'WI N N N N '., N N N N N N N N N N N N N N any Ary N N N N N N N N N N N N N N N N. N N N N N N N N i 'O aL A cl x x n c o o e c c c u U Ka a, 6& Y"& O O O y C O, M C cu a. '= a+ a 7, i6a'n E t Cif s o cx w w w qa E m v Al .^sO' _v x ° a v v a`i >> 7n E E > o n E m O+ E v x v c E a o m a x a c ,. '—' l7 t7 v v a` w E a a o� an M u1 c c •� an rta c s E c` E v c;'' W.C' N »..C N x"cx '. d 1 p W� 'o a"` 9 S1'M O C G O a c O c O O u a ° Q o c u ° c °IE E 5 3 7 C w L U .G• c v -a c iffiY .1T .'� dl .a C al arb ran Q)w dui LL 4 aEY J° E � c E w"�+ wr a `-a c c c m a.n o C> y 0 0 0 > 'E c r m cpro I o o o o o a c c c c > sr U V U a a=. a o? : w N Nt. C .i nu l7 >o o p o c as "c C C C )( W W N " j J 7 7 J 7 7 7 J J 7 7 7 C C .0 N N ''. M Ln 7 'o o o v ar ar a w c "°'' c c w cu �" LL a a a a a a. a '.... LL a d a d a a o o _E 43 �p p C C C X C '»' ,7'• Y w_ 7^ 'l` 1- �T 'Y Y Y —c Y "° V J + © 8Q §cl C1' >> al c c C d O c'. ' C C c c z5 C c c C c c c c c c d:. G U C C C C C Yn C Gn M1n CS O O O O m CO m }' 7. J 7 J 7 7 7 7 7 7 7 'J 7 ', p p a v c m m m m m E E E E E E E E E E E E E E E E E c m` -a °; l7 ''.... C7 l7 M a... a, E v v �r x x x x x a„ M v v a" o..'. a, v L ¢ E E E E E E E E E E E E E E E E E E ct � a, ;g ° u' x x x x x ar -- 7 7 7 ¢ Q Q Q N Vl o O O O O O O O O O O O O O O O O C7 �' u I O, In LL m LL LL LL LL LL d me c c c c .O O O O U V U U W..A V V V M1«A U V U U U U U V U $. � al 'y Q i = m 2 w w w Qj u u u E E E E m % 2% w c o c> xA ca ca 0 0 0 o c c �m v m as v u au a `w `w v a` v a u m e au E E E E E E E E E o v o ar u u u u o m E E E E E E E E E E E E E E E> I a > o �n ° r° o o o o c o u¢ o ' �a�++, o oo g a o o o 0 0 o cA o o u a• �+ a u u u u u u u c c, c i'.. 4. 4.....'., 0 1u.. AGN - C1 cL a. S1 ..... R: %, Y Y - Y I N Y Y Y VuJ - a'A N!Y N N N VY MPo V1 N aA w as CY o a o o v Ic v° 7 7° a a a a o 7>>> 7 5 E E E E° c w o w w a w ar a v v v 4n Nn lJb VN 4. Nx. u u U U u u u u u Q u U U U U U W W W W LL An p er. f i p 0 0 0 O 0 0 p O W u4y Y�.0 V.Ak m. E'E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E'E E E E E EE E E,EE E E E E o o o o o o o o° o o o o o o 0 o 0 o o o o o o o a° o o o o o o o a o 0 0 0 0 0 o° o'o o 0 0 0 u u u u u u u uu u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u ai ai ai ai ai ai ai ai ai ai ai u ai ai ai ai ai ai ai ai ai '.... ai ai ai ai ai ai ai ai ai ai ai v fliflii i i i ai ai ai ai ai ai ai ai v ai ai ai U U U U U U U U U U U V u u u u u u u U u u u u u u u U u u U V U U U U u u u u u u u U 0 `o 0 0 0 0 `o `o 0 0 `o o `o o` `o `o 0 0` lm� o `o `o 0 0 `o `o `o `o 0 `o o `o `o `o o `o o` `o 0 wwaiwwwwwww m m m, m m m m m m m m' m m m m m m m m I m m m m'..,m m m.m m m m m m mmm m n m m m mN Vf Vl VI M V1 N N VI Vl Ln VI VI ''... VI Vm Vl El O O M M V M M lO lD O m l/1 LD O V w 0 .--I m V lD r` () 0 00 m V m N w m V1 r\ ci ei 0) 0 .-� N N f\ r\ r` N� V , O V Z. Ol m '-I m) M N 0) 0) I, m c-1 M MIN .--I O M w r C\ M N N� M lO lO N Up w O N C` 0) m H V t\ ci C l0 m N LQ oo r\ o) M Vl H `i M r` n M al M N N N o O m e-I LD m `-I o w N m m O H 0 m O e V V 00 V I- c O ID 'Ab ', v✓ AYM VT iN v1• If). VT +n in +n v)• Vw, v* v} ,n '..n v4 vT v) v v) vF v) Vlvl•',,n VF vF V) .n .n vT vl.In v? v) of In in O O O O O O O O O O O O O o O IlD o rl w w m N O O o N V O O O O O O O o 0 o O O O O o o c, O O O c, O O V) 7 0 o O O O O O O 0 O O O O O O O O O O O O O O O O r-Z n lD t\ n V V o o o V O to N N N N N N N N .--I .--I .-I f` w m r\ w N m r` m M m m H O m w m m m m V) m 0 o o w w V m c-I N N w m m w r` N O m r, l0 m V V V m N m m lO 7 m N ci O m m w lD l!) w c-I '-1 r-I m ei N N '-I '-I rl 'i r-1 '... '-I c-I N r-I lD r-I .ti 00 in li yr N v).vr vR t^ t^ ur U! VY VI Nv)V) v) N v� V} {/! v) M v) V) v1 v1 N. V) ut v/..... LT V1.....in In V! N VT u1,1R in in.. v) v4 ci N M V In <0. n w 01 e-I a-i N M a If) lD n co 0) '-1 N M a M lD r, 00 0) a -I ti cM-I O 7 1p a -I VI V O) w t\ N m Vl O V lf) u) Vl V1 VI ll) N Vl T In ul to M r)') M f+') tYl fit M T Cal M R V V V V a V V V V V V a r, v- a v v v v 1 n n n m m m M m m m m m m m m n o v In in Ln n n n n n n m m n m Ln n m m n m m m N o r, o 0 0 0 '..... o r- r, N m m 0) In In Ln In Ln m In m m In n r.. I, r, rn r, rl r I, r� N I, r� n rl r, r I, r, I, n rl 0 0 o ry o 0 0 O O N N 0 O N ry N ry N N N N N N N N N M M M M m m m M M m M M M m m M M M M M M M M 0 0 0 0 0 0 0 0 0 0 0 0 0 0'0 0 0'0 0 0 0 0 0 0 0 0 0 0 0'0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 w w w w w w w w w w w w oo w Oo '... w w w w w w w w m w w w 00 w w w w w w w w o0 0o w oo w w ''. w w w o0 00 00 00 w w w w w w w w w w R' 00 m m m m ra M m m CO as W Ol �' m m b0 m CO m m �' ' m Y Y Y Y Y Y ". Y Y Y Y m m m m m m m m m m m U U w u u u u u u u u u u a a a a a a a a a a a m m N m m m m m m m m m m m C 7 Y Y Y ` Y Y i i Y Y Y a a a a 0- a a a a C C C C C C C C C C C ....'. tlO p0,'.. o w w w J ryj m m m m m m m m m m m v v v v v v v v v v w w w w w w w w w w w C C j u E E E E E E E E E E E m m m m m m m m m m E E E E E E E E E E E'E E w `w> w u u c c c c c c c c c c c 3 3 3 3 3 3 3 3 3 3 w w w w w w w wlw w w W vwi w N u Z Z O 0 0 O O O O O O O o w w w w w w w w w w m 00 m m m m w m w) m no m m p w !_^ ❑ w u a Q 'a• .� .� .. .• .• .� r� a� s z s¢ s oc o< o< m m m m m m m m m m m J w .w. E w 7 m E w w w w m>> ai ar a) al a) m ai m ai ai w o6 0 o6 ca o6 oii o'J o� oil 03 m m m m m m m m m m m v v > m 00 w w u N w 7 7 7 7 7 7 7 7 7 7 7 w m '-^ d U U C! C! CS CY CY 0 C CY E E E E E ........E E E E E � u u o 0 o O O O O o O O C C C C C C C C C C C C C w m v) )n m o In c c n n a n n n n n s I w v v w w a w a m v>> w _ v v a, -o m m w w 't 't 't 't 't 't 't r- 't 't w (0 m C m y ry C C C U U w w w w w w w w w w 19 m m m m m m m m o E E EEEEEEEEE a o_ a a a U V W .a M ^Y 'o O C C EO OO m m oO o0 00 M 00 00 mH in h m N N in N Roc'o'� `o o `o o`o o `oo o`o oo m W U a to Ln V) N a H Q u u C C C C C C C C C C C U U U U U U U U U U U U V U U U U U U V U U U C a• w w w w w w w w w w w m m LL m m m m LL m m m m m IN IN m m m m LL m m m C C C C C C C C CL C C LL LL LL LL LL LL LL LL N LL N H LL H N oro on m oo °0 on m.. eu en on m m Q 7 S E E N E E N N E N N N a v v a v w a� m v a v m E E v v w v a v m w m w a v a v m m a m v v v a m 7 m m w w w w w vwi N u U U U U U U U U U U U U U U U U U U U U U U p p p p❑ p p❑ p p p❑ w E E m m m w u u u u u u u u u u u u u u u u u u u u u m m m m m m m m m m m m a Q Q Q v) to to to to V v7i N V N N vl N v7i v7i v7i N v7i '... to )n V) V7) V7) a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a Q a a a a a a a a a a a a a'a Q a a a a a a a a a Q a a a a a a a a a a a a a a a a ¢aaaa a M) NI 4n In V) {/1 {n VI V) V) V) V) to V1 V1 VI V) VI N 1./1 N N < a a a a a o_ LL a a a a a a a a D_ a a a a a a a a a a a a a a a a a a a a a a a D_ D_ a a a D_ LL a a a a a Q a a a a a a a a a¢¢¢ a a a a a a a¢ a a a a as a s aaaa Q Q Q a a a a Q Q a a Q Q a N N N. VI V) N N N V1 V1 V1 I N V) VI V1 V1 V) V) VI V1 V) V).tn An V1 M M El MJMJ l, tnj rJ cn� �� C Jcl�co� lo� ml -J NJ -� -J -1 -1 a, JpJ NJ -J: wR �I',..to OJI 'r -II m�mII mIIw r mIw N�N N��N NII NII wIIw to mII mII m�m to r NON m r, 0 V�V N,,,N,w to C�m m N N N N�N�m T,,N yr ut +n u* i8z" i-i ii, erau*ve. in .n vv u .n 1^ "A t ^are. v� ua 1^ to rn� v>• 'A 0 00 I0 o 0 0 0 o 0 0 0 0l0 0 o 0 0 0 o o o o 0 0 0 0 0 0 0l0 0 0 0 0 0 0 0'0 c o o 0 o O o 0 0 0 0 0 0 0 O o 0 o 0 0 0 0 0 O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 M V1 n T N m Vl lD c-I m .-1 N n n T O O N N n N l0 1p r T m m N O m n m .. m N Dl .--I <D N m lD V N r-I V Ln V N n T 0 I, Vl m r-I w lD to V m m w LD to v m ''... m m m N N m m N Ill ',. V Zr' V m ro N N N N N to to V V m m T N N N N ylp v*II�l.. y*I M I u t�-I eto I W, r, m Lnm J tin to an Ill T to P, m m m m m m co 0 0 o o 0 o 0 o o o DID oo �m w 00 ma tnlyl�vfll+l,Ivrl yflanlyt•I vrl+nl+n N m N lD n O w-i O w^9 N N C+d N N N N N r4 r4 lr • f^+. rw P'« r, r, to an to to to to m l!1 nA'y O, 01 fib Ol D1 D, i7ti Tlb d11� 4^. Pti M1 9"- P°w S"4 n n n n to T m m m m'm m m m m m m m dM'4 m m m m m m m' 0 0 0 0 0 0 0 0 o 0 o m o 0 0 0 0 000o0o�0000aca cyoo oo m m oo 00 oo m m m 0o oam o0 0o ma' m m oo m oo InI�II"lv�IIlj�11�IwI,�l,�I / lIvgv*fv*Iv*I� L,I.I',1Im1D,Io- ., I�10�� m�100�III 0 0 0 0 0 0 0 0 0 O o 0 O o 0 O O O O O O O O '.. O O O _ _ _ 00 m0 w am wm m�. am zvop. m m m m m m m m m m m a ai a w O O O O O O O O O O O e e e e e e u u u u u u u u rba 0a, to 09 psl w00 w 0 0 0 0 O O O O O O O O ._ ._ ._ im m m m M a0 m m. m .iYc ie >> �.. v � u H i N i 0 m m m m m m raa to amto 0n to ora um In m m m m m o 0 0 0 c c c.. c c c. a a zn. a a a D. ro.. cx, a a 0m 0n 0 00 00 ca0. 00 ar0 aKa al0 0c m m c E E E c 'c E (7 l7 l7 C7 C7 l7 l7 l7 l7 l7 '.....�c ., ac st ,x :ae .x .ae ,ar: ;+x E E E E E '... E rm wio m m m t`o t`m m .� .m to .lo .lo .m .to to to ro ro rup. re um m', ru0 uum' ap m vl to to to to to m3 03 o3 o3 03 0 o3 � 03 o3 w w w.... w w w w w w w g J w -O a D. a. a a a a mk. a s a. O O O O w U u w u u u w u u uIn— M V -0 w 'w "I SJ' w fly w �w w to to w w w w w 1L W 4l w w c c c c c c c c c c 1 W wl wt NI w w w w w w m m m m m m m m m mC uuuuuuuu ���-6 EEEEEEEEEEememmmce & e e a R a E, C1 Et el O. C2 O, LA O. O..a Ca. O,. >>>>>>> w 4li w w kF w w w w w w w GY 4d w w w 7 7 7 7 7 7 O O O O O O O O 0 O " C L O v v v v v v v m m m m m m 't 't 't 't 't 't 't 't 't E E E c c c c c c c' c c c c c c c c c a c c c c w w w w w w w w w w` o ca Q Q a Q Q Q a Q w w w w w w ua w wee �a w� w w w�. ua w Ixu Icy uat u u v v v v a a a a a a a a a a u O o` 0 o `o `0 0 `0 0 0` o` o` o` `o `o `o o` `o `D `o `0 0 0 0 0 0 0` `D 0 `o o w w w w w w 0 0 E `o o `o k2 `o `o `o `o `o `o u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u s m m z m ''.... m u u u u u u u u u u u u u M m m tti tm m m ti m m ttm tm m m ttm m m tm li '... m m m m m m m ti m m ti ti '° m ti tm LL m tli° li m m m li LL LL N LL LL N LL LL LL LL LL LL LL LL LL LL N N �m303Qi�{'m3 � N LL, NLL N wwwwwwwwwwwwwwwwww'wwwwwwwwwwwwEEEEEEwwwwaiwwwwwwww u u u u u u u u u u u u u u u u u u u u,u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u O O O O O O u u u u u u u u u u u u u 7 J 7 7 7 7 J 7 7 7 7 7 J J J 7 7 7 7 J 7 7 7 J 7 7 7 J 7 7 7 J 7 7 7 7 V1 m m to VI m In VI VI N N m m to VI m !n VI to Vl V1 m N V1 N N V1 N m VI i1 w w w w w VIVI VI N V1 VI N to m Vf Vl VI to aasg'. aa¢ a C a a a a 0. a Px.. a. a a a pmq 0. C�N[[., 1 D_ a a O_ CL KL CS,. em� P.ti.. d. R. D.. td''� fi!S LIB a^T VQl 1Qn m tQ/1 N J'N aarl Wa'7 Co to N to VQl to N VQI 4a/N kAtl a�% NQo VQY k19 ULL'A W!S. Vl !n Vl VQI N N SaRE caa'Y i._ t I 1 �C''11.L 1 j.... l f U M1 N 0 1 10 a a a a a a a a a a a a a a a a a a a a a a a a. a a a a o, a a Q Q Q Q Q a a a a a a a a a a Qa a a a a Q a a a a a a< Q a Q Q a a a a VI I86 W9 Gy Yo ,0l m to to to to Cn 'Vl O< N IR V'9 m VI to to to to Cl'M 4+4 4// L�1 dn' do to VI m N In m N to 0 El ID M .-I N 0 N V} 0) l0 m H V} 0 N V} .-I 01 lD H In 0 rl V} N O LO ci V} 0 ei i/f m ti Vl ci i/1 0'0 00 SCqgq-,qN a-1 i/} 7 N V H '.... 1n c-I to M M T L--1 Vl 0 a -I te+Y N 00 m M to 0 M z,+b Vl e-I rn VI 0 00 M •tC! N LD Ol M V �--� N N 1^ V) o o 0 N N -0lG= VT M lD m .--I Vl qc +h e-I Ol lD H V! 0 '-I i/f N O lD L--I - 0 0 ci V} M ri 111 ci - 0 0 a -I V} : ". N V '... ri - 0 0 e-I th lfl M T a -I - 0 0 '-I V} m lD Ol Cn - 0 0 1A .. m 00 O7 '., 00 N.. 0 0 O to n m m n N 0 00000 m %A? LT L--I M W VF 0 n N� Ol N a Ln Vl 0 w In m Ol W V VY,. 0 0 IN 00 N l0 C Vf 0 Ln N �"� lD M /} 0 0 -zr V} M W .-4 a ih 0 000 V't VY .. V1 O O 3 N 0 in N O V) O M• 0 m Vl, V M V 0) Vk 0 lD O i/Y o lD T 00 l/1. 0 V m to Vl l0 111 n In 0 Ln w T/} M Vl m ID to 0 n n V} N Vl O w VI 0 m LD Lf ei N N Vl 'A 00 01 m V1 Ln 01 ", m IT �V7 0 Ln ''.. Ln to M M VI -;I- 41f 0 0 '-1 0 Vl m m e-I V 0 0 n V N L--I r M e-I N n m V �n Vl 0 0 0 0 T M M LA i/Y i/Y m 00 N V 00 0 n V N- m M n m Vl 000 N V 4/T N m T m a/Y 0 00 m t/1. w N 0 m i/l..'A 0 zt m 'A �--� m Vl N 0 000000 O1 N 4/f- N T N VI... 0 00 N i/) l N N N N, 0 Ln N 1/1- ID T N N Vf 0 N iA. M Vl n N VT'A 0 n Vl.. T e-I Ln N -:3, 0 O1 V? Ln lD I� 00 01 a -I N M V lfl 1p r m T �--� N M V LA l0 n m Ol N N M LP l0 r m Ol '-I N M N V N Ln N 10 N I, m m N N a-i N m m M m m M m V V n n V r V n V n V n a r V n V n V r aL LD 0) W 0) AD LT ID 0) ID Ol '... Lo LT w 6 ID Ol 10 O7 ID 'i n e-1 n rl r rl r '-1 n !i n ti r ci n N n '� n N N n r n r n n N n N n n r O r O n n n r n n n n n n n n n n n n n r r n n n n m r m r m n m n m r m n m n'n m m n m n m n m n m r m n M n m n m n m n m n m n m r m r m n n m m r m r m r m n m r m n m r m n m n m r m m 0 m 0 m 0 M 0 T 0 T 0 M m T 0 0 0 m 0 M 0 M o M O m o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 m 0 m 0 00 0 M 0 m 0 w 0 m 0 00 0 ',. w 0 w 0 m 0 w 0 m o w O m o m 0 m 0 w 0 w 0 m 0 m 0 00 0 00 0 00 0 0 m co 0 m 0 co o m O W o 00 0 00 m 00 lb 00 00 00 O0 OQ m 00 m m m m W 00 l%7 w c to c c C w w c w c w c w c w c w c w C w c w 2 2 2 2 2i 2 c N c N E E E E E E E E E E 0 0 0 0 0 0 0 0 0 0 0.0.0.o.o.a 0 0 0 0 0 0 n.Q 0 0 O 0 a0000000000 o m m m m m m m m m m u _ to t0 C c uo C m '.. C t0 C to C to C to c m C m C > > > > > > > > > ''., > f` f` f`0 m fy0 t` f` f` fy f` ? > +U+ T.... +_+ T Y_V ? emu+ > +u+ > }U }, > +U > •C C C C C C c C C C .0 Yu_ C C C C C C w w C O w w O w O w O w O w O w 0 w 0 C C C C C C C C C C C C C C C C c c C C m m m m m m m m m m m m 0 0 0 0 0 o o� ob o6 o6 n6 o6 l6 03 t6 c6 w u w u w u w u w u w u w u w u w u w¢¢ u a a a a¢¢¢¢ a a a a a a a a a a Q Q jp jt jp �0 jp j0 �0 C C C C C C C C C C w w w w w w w w w w w u w u w u w ` w ` w ` w ` w i w ` w ` w w ` ` w ` w ` w i w ` w E w E w E w w w C C C C c C O O c- O O O O O O O O O O O O O O O O O O Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y E E E E E E E u u u u u u u u u u a a a n. a a a a 0. a `o o` `o `o o `o `o `o o` o` `o o `o oo `o `o `o `o `o `o o'' o o o o o o 0 7 J 7 7 7 J J J J J E E E E E E E E E E 3 3 3 3 3 3 3 u u u u u u u Ln Ln Ln Ln Ln '.. Ln Ln an an Ln w w w w w w w w w w `o o o o o'o `o `o `0 0` O` `0 0` `o `o `o `o o` o` `oo 12 `0 `o `o `o `o o`o o` `o `o o `o `o o` 0` o` `o 0 0 `o `0 `o `o o` `o `o `o `o u'u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u Lm m - m LL u m u Li m LL m LL Lm LL m LL m LL m LL Li m LL m LL Li m m m LL m Li Li Li - LL Li m N LL m LL m LL m LL Lm m LL m N ''. LL m - m LL m Li LL Li f0 N LL Lm m LL m LL Lm m LL m N Li w w w N w w w w w w w w w w w w w h- w w w N w w w w w w w w w w w w w w w w w w w w w w w w w w w w w U w U U U U U U U U u U U U U U U U U U U J 7 U U 7 U U J V J U U 7 U U J U U J U U 7 U U 7 U U J U U J U U J U U J U U 7 U U J U U J U U J U U 7 U u J U u 7 U U 7 V J U J U U 7 U U 7 U U J U "', U 7 U U 7 U U J V U U U J 7 U U J U U J U U 7 U U 7 V J U U 7 U U 7 U U J U J U 7 7 V1 7 N J !n J to 7 to J N J !n N VI to to Ln V1 VI M VI In to M !n to In lA lA VI M to M to to '... V1 an !n to ''. M In to to V1 to to M N Ln VI M M Ln VI a a a a a a a a a s a a a a a a s a a a a a¢ a a a a¢ a a a a a a < 1 a¢ D_ 0_ a D. a a a '.. a a a¢ a a a a a try N All A/1 N {/1 to N Vl Vl vl VI to M a a D_ a < a < a < a a. s a a a a a a a a a a¢ n. a a s a a a a a a a a a a a ''.... a a o_ a o_ a LL a¢ a a a o_ a D. a¢ o_ a a s a¢¢ o_ LL o_ a a a a a o_ a o_ a a a a LL a¢ ''.. o_ ''.. o_ a o_ a Ln Ln V1 to N1 A/1 t/1 to V1 to to N M N N '.... Ln VI !n M V1 VI an to N ... to VI to VI In M M L/1 N !n to N to !n m VI to VI N A!1 M NI N an an Ol m V w N n V m m V w h m � �..., GD .-I N �'., V V' V) w o m w w m n� n ''... �-1 m h "I.h n o '-I M OD rl N m lD Ol OD ci c-1 d' O m h rn ob tD -I Ol O .--I N In n N rl l0 Ol r-1 .-i N Vl w V l0 h rn OD Ill rl lD M O n �--I pl O '-I N V V1 h N .--I lD Vl Vl M N O w m n m lD lD fV Ol n VI N O m w c� V M m M lD N N N wVl cr N c-I m W h w O ID �--I 1-1 c-1 �--I �--1 �-i ''... N N N N �-i c-I c-I r-I ci Lo o o CIO L? 1n LT N 1A 1/T. iA Vf VT Vf iR iA'..,th V} ERM te"P'. N ih 1n..,...,N tR 1n in rn i/f...',.VL V?"'..L} to 'A v), u'}.I OO O O O O O O O O O O O O M m, O' O O O O O O O O O O N M '', N lfl Ln n V ". m m O o o 0 o 0 o o Dl m O O O O O O O O O O O O O O O O M Ol V O O O O O O O O O O V V .--I ID .-I n M O n V 0 0 0 O O O O M Ol V O 0 .--i h '... VI N 00 M tD .-I Ol 00 n lD V M ''., .--I Ol h h 00 lD lD Ill N O h 'T N '-1 Ol V1 to d' V m m M N N Ol OD h lD V M .--I Ol h h m V N H o w w n n rl Z '-I W V1 Vf to to 1A 1A V} V} Vf V} 1A V1 VT V! IA to N VT 1R N N 1n N VT ih,N iR V} mx1 4+i ''M'R MlY CJh in V! tR Vf 1A i/1......,ih to V? NFM *u`b,U'h t7b N Vf.V? ^W W L 0) Q M V Ln lD h a0 M ci N M Vl lD h 00 al �-i N M `7 an lD h 00 m r-1 N M '7 to lD h 00 Ol c-I N m V Vl lD h '... �0 Ql Oo c-I 6 0 0 0 0 0 0 o R m ni m ni m m rn n m m i m i m m n m o 0 0 0 0 0 0 0 0 o n v J u n n ul ul u J rn h n h n n h n h o 0 0 0 0 0 0 0 0 0 lD lD 'D tD �D lD lD lD lD tD m m m m m m m m m m �D tD lD �D kD lD lD 1D lD �D n n o n o h n h n lD lD lD lD lD ID lD tD ID �D h n n h n h h n h n h n n h h n h h n n w �D tD lD LD lD ID lD cD ID n 0 0 0 0 o m m m o 0 0 0 0 0 0 0 0 o m m m m m m m m m m o 0 0 0 0 0'0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o o 0 0 0 0 0 0 0 0 0'0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 m o 0 m 0 0 0 0 0 0 0 0 0 0 0 J. 0 0 0 0 0'0 0 0 0 0 0 0 0 o a o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o as OQ oD as oD ro wao eD oo eo aD as aa. as Da ro oo m ao m m oa w ro as oa a m m oo ao m W aD oD oD as m ro oo ro oo ao 00 0. CL l a a a l ca. l� ea.'. i:�,icY.�00000� a yzy y, ? E E E W E c f7 .Z 'E o w m FYI W M SaIY md5 adD N�q, m ocw m m m m m aqp m m df�Y bup htl R,1&Y Is9 rg9 �A d,p qwA Ol "oeN ryl '� YLN fG iU n ,� .� J J - /'C C C' E E C C C ` U t2 ` 2 m `m '4 mq "o a:0 roiq ap eap (`o `m m 40 o ? s rro r d am a J r c e E c v III `w v v v w v 0, ay t v��w v w C .bC J J J �...! .,U E E w '` „c � .� ,� � •�. � � � 7 7 � 7 � � � � � � � ,,,,0 Ul mm,u > N Na) N Ol wOl Ul 71 E '^ 7 7 7 7 m �n v1 m �n �n w v� u u" .0 u u u u u u 7 O O O O O O o O a a a a a B Q Q a a 7J m m Ol N O/ m O! m N O O O O O 0 0 mu O O m N Gl m U1 UJ m m m dyY u u u u u u u u>>>>>>>>>? u u u u u u u u u u m m m m m m m m 6 ra >>�>>>>>>= LL m m m m m m m LL LL m LL m m LL m m LL c c c c c c c c c c " LL LL LL LL LL u U u u u m m LL N LL 0 0 0 0 0 O O O O A Q Q Q a ¢ a a Q a N �n vi �n �n vi in ¢ Q a Q Q Q Q a Q Q in U1 O! OJ N v W m OJ 27 '47 "O "O 'O b v v v v U/ O1 OJ U! G/ Gl W GJ N u u u u u u u V U is 'rP r0 r0 r0 f0 r0 rR r4 N f0 U U U U U U U U qa ¢FU LA' dIl 41 �1 Y y U U V U U U U U U N N N m m m m m m' C C C C C C C C' C C U U U U U U U U U U U U U U U U v�i In v3i v�i v1 1n In E ,E E E E E E E v `w v v na In vl vl vl vl H vl en vl x x x x x x a x ac x vl rA, as D. D. + , a. p. F F H N 1 n P; � 4' w w w w w uu It'eea w ra, I'„ u. n�:.. LL ii a ¢ ¢ vp vai vLLi LL in n n' ✓d vLLp w v`a WLL1 vl v"i v1 vLLi ii LL c a kid _ Vl Vl VI VI BUT 'i W? VfN iYA CN va vb WY7 to Vf Vl VI V1 a a a a a a a D_ a o_ a o_ LL a a a D. a a a D_ a a a o_ ¢ a a¢ a a,a a a a a a¢ a a a a a a a a¢ a¢ a a a¢ a¢ a a a a¢¢ a a a¢ a a a a¢¢¢ a a Vl Vl Vl to Vl {/1 t/l Vl VI Vl to Vl N VI VI {/1 A/l VI V1 VI VI ✓l VI VI to VI N 47 1/f 4A Vl VI VI VI Vl ', Vl Vl Vl Vl Vl Vl i A/1 VI V1 V1 Vl Vl VI Vl El V r o0 lD M w N r M w w Q1 M O m w d' lD G m r m .� V1 w N V1 m m w w n w m �--� n o c m O N w r 00 O� V Vl o al V Cl V M V lD r O �"� lD '... N r m O r-I M m w N Lq O M e-I N N m M V Ln ID Ol N M Ol w w ri lD m M w lD w m lD m N w V O m N O m w n LD tCi m m N r-I m ''., r� N m l0 M m N N r-I ti O m w w �'-� w w w w m o V m M N N r Ill V m m N N N c-I cl ci m M N N N N e-I H" N N N N N N '.. " �--� " +ltii/1. Lf aA VY ve l L} Vf Vf N- U), V4 'U7 r„tl"N LT lA 'n to 1A V? '4 V}'.,N VT 'A to V V1 NA'... V}. In N VT VT Vf 'A V} V} N, N VT VF Vf u} VT '1 . 'n VT 0 0 _....m O O O O O O O o o 0 N m N l0 �+1 N O O '' O o O O o o o 0 0 o 0 0 0 o O O o o o m w vl a o ti n c-I O r O O O O O O O O O O O O O Ol Vl O C O 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 d' O m Vl w N r N Ol lD M N V n N m m VI V N .--I O1 r r r w w w m m- m m N w V1 w o Ln V V M N .--I M lD M O r r w LD V m M m N m w m T M m N '.. N c-I ci r-I ci M m m M N N N �--I ri N N N N N N N N -v} VY iA''... V} N Vf Vf 'n a+`a 'n to t4 Vl to IA in V? VT....N 'A 'n V} V! N, AA 'n VI i/T. /A� SA VT 'n V} In In t/Y L? � N N,N to N Vf 1A Lf M N V1 o N M V lf) l0 1� m D1 �--� N m V ul O r w 01 rl N m ul lD n r w Ol li N ��,2 V? l0 r w Ol I r� r� m m m m f+i v� �n �n ui Ln �n �n �n ui vi m m m Ln �n ui �n �n in �o �o �D �o �o �c �o �c �o �o �o Lo oo oo oo n n r r r n r r r r r r r r r r r r LD Z W %D lD lD LD W W W LD W W W W ID ID ID ID W lD oo m w oo oo oo w oo w w r r r r n n r r r r n r r n r r r r n r r r r r r r r r r r r r r r n r n r n D1 al 01 01 Ol D1 41 T D1 01 0 0 0 0 0 0 0 o m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m o 0 0 0 0 0 0 0 0 0 0 M M 0 0'o 0 o o o o o o o 0 0 o o o o o o o o o o..o o o o o o''..o o o o o o o o o o o o o o o 0 M 0 0 0 0 0 0 0 o o o o o 0 0 0 0 0 o o o o o o o 0 a o o 0 o o o 0 o o o 0 0 o o o o 0 0 o o 0 o 0 o p o o'o 0 0 0 m- ea na m m m ep m m m w m f0 fO fO IO fO IC IC C C C C C C C C C C C C a f`0 f`0 F. f` f` N lY ly `m `m `m `m r`a `m m` 5 > 5 5 5 aci aci aci aci w aci aci aci g g 2 2 2 m —a is m. m m u u u u u u u u m a0 m m w m ou on as tx c c c c c c c c c c C C C C C C C C C C oo pp, o0 00 op, m,. 00 m o0, 00% m m o0 00 00 Od m o0 w OQ O0 a a a a Q<< a a a C C C C C C C C C C C C N 0y N N N N 41 01 72-E V V-2-2 -O -2-2 V C C C C C C C C C i+ a+ a+ a+ a+ w� a+ a+ c 00 c s m o0 00 COl 00 bpi Y Y T T T Y T T.. N. IC f0 m m m m. m a+ a• ±+ a+ . a+ a+ C C C C C C C. C C C O O O O O O O O O O O O O O o O O O 2 2 i i � i 2 i D, 2 7 Cl. C. O. C1 Q a a a � � •� � .L E C ` C ` C C ` C C 1] V U U U V V U U V U U U C C C C C C C C C C U V U V U V U U U f0 f0 f0 f0 IO N f0 0l f0 fo of N O! N N N W of of N W N W N N 0J of N N N W N J J O O J J W v w '''... w w w w w w w '''... O O O O O O O ''.. O O O ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ � ¢ ¢ '' ¢ ¢ ¢ ¢ ¢ ¢ ¢ ' ¢ ¢ J J J J u uu l``````` ````` o o o 0 0 o o o o ooo uo oo R o o o o o o o o o uo o o o o o o o o o o o o oo o`o`o u u u u u u u u u u u u u u u u u u u u u u u u u V iu u u u u ` u u u u '.. u u u u u u u U m m im LL ra O LL ii LL m m LL LL m m LL LL m m LL �o ra is LL LL O O LL LL �o O O LL O O ii m LL ii O O m LL O O N N LL N LL LL N NLLil N LL N H LL LL N LL LL LL LL LL LL LL N LL NLLil V� LL N Ol N w N of w w of w w w N w 0/ w of w w w w w w w N w 01 0/ 0J of w W N w w w w w w W w W w w of w w w w V u U U U V U U U MMU U U U U U U U U U U V U U U V U U U V V U U V V U V u U U U u U U V u V V U U U U U U U U U U U U U V U U U u U U U V V U U U U U U V V U U V U U U U U U V 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 Vf VI Vf V1 VI VI VI VI VI In< < a a a a a a aaaaaaaaaa V1. IA N VI N tI1 V1 V1 ''.. VI A/1 N VI IA V1 Vf VI VI V1 N V1 ''... Vl V! 1/1 6/1 IA {/1 N ', V1 VI V1 N V1 VI VI VI V1 V1 Lfl l/1 a a a a a a a a........a a a a a a a a a a as a a a a a a al <<<<<<<<<<<<<<< a a a a a a a a a a a a a a a a a a a a¢ a a a a a a a a a a a a a El V MdIM O N�NpN N N co VN17,,..., I �,,...,V 'T T F fan M m N N N NN� N��Hi� m,,. N N N�� Iq � ��c�i l ��m � m�W�N�NI O1 W .1\�.._I� wa ar nn a a w n n � 'A rrw crw +ub: „a .� .� _ 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0'0'0 0 0 0 oIo'o o a o 0 0 0 0 0 0 0 0 0 o m ti b 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0. 0 0 0 0 0 0 0 0 0 0 0 0 o v o 0 0 o v aD o u'ID 1 an V m N N N N N N to 1f1 V1 Vw M '., m m m m M N N N c-I c-a a�—I N N N N N a -I N a-i r-I a —I Ol 00 W H N u"Mk V an tD I� CTti H N m wd'X n m 01 M N m 'M1}' aY'X 45L I� ap Qw e-I N m a %ab a43 k �+ a11�" a b a7 W rNi m^N N m V' 1I1 W n w Do W n n n n . N:. . . r^5 r�k rd � rl c-1 sti '-I 4 t� Kp cF °59'''GW' *:x V +��.^^ r n n n r` irw G"•. N, R'M N hh r,, w m m 00 a0 a0 m (5,7 m a0 W t>D a'Fa RAS CN7 tD Mi3'., tiD VGw 'U7 uyi t0 W lD aD 'uD ad. M1D a,ab In ID YD w lD aD aD W aD aD w aD w w aD 4D lD lD lD aD l0 W m o0 w Coo m Coo ao ao m m a ¢ co m co u m as a 5 oa 0a 0o n r r m m m m m m a o o o a c cs r m a o o o o r n a no n. m m m m m a o o o o o 0 0 0 0 0 0 0 0 o a o 0 o ca o C CJ ou 0 0 0 0 o a o o o 0 co t a o 0 0 0 0 a o0 00 00 00 0o xa oa oc ca o 0 0 o m m r mmm ", o a 0 0 0 0 m c co a r m m ao 00 0o m ao E EIE E E E E E E E 00 Oo 00 00 00 00 00 00 O0 00 m m m m m m m m m m 1N21r1r1II E E E E E E E E E W W Aa.N W 41 41 iW' 11 W W C C C.. '.: C C C C '. a a O O O' O O AD O O w w w w w w w w w w w w z z z, z z z z z z z E E E E E E E E E E E E aiG 64 asap a7n qSa tdtl axn ww9 a� 4n R p aqua m as m m E c c c c, E E E c c as atiti uwa ra rti m rn Xar a� a na ara oc 0a' w na w 0n m w reo E E 'E E c "E "E E c c c c c c c c c c c c C K r c E E C E E a6 rta m N Ca rX5 PGb ap as a+s Ca aci aci a)tow aci w aci w aci aci �"......°.' 2 2 vuuuuuuuuu E E E E E E E E ''' no aao nmw 1n yawn w0 mn'oq w as aw " aX w e o a a o o a 0 a rr v v a v a v a a'a v E E E E c c c c E E E aw wG .% as w J J w w ,.wo �" C1 O dA SS O S7 O O O O .,.a J J J aw+ aw-r aw+ aw+ aw+ aw+ Y "++ x.. r i i Xa N <D fa fa N N N N fa x2 2. 2 2 i i 2 2 ... ix n �x ea qa c1. ii u� avvvvaa va a u u u w u w u v E E E E E E E E E E w w w w a`, w w w w w m a m o w a' w #a w w w w w w w ay w ] > > > > > > > ) u u u u u 4W lLX anJ C'J W W 4YJ W W W N u'1 N N iGK CXC� qC tr K o_ K it ('w cc Lw a2". D D 3 J J > E E 2 v» va � »n > > � > > ''.. > > 7 � � � a a a a a v a aalaala'aaaaa o 0 0 0 0 0 0 o` `o o`o o `o o `o `o o` w w w w w w w w w o` o` `oo o `o `o `o `o `o a 12 `o `o `oo o12 ` o`o 12 `o'`o o `o u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u u a a` a s ri ri a LL Lao 'LL as as LL Xa m m m m ao m w m m m m LL ro LL ao ao as LL ao ao LL Xo ao ro LL m m LL m ro as LL ro c c'. c. c c c c N LL LL''...- m m m m m m m m m....m LL '',LL N LL N LL LL LL LL LL LL LL LL LL LL O i5 O' O O O O.. to wwwwwwwwwwwwwwwwwwwGow Al u u u u u u u ` ' ?� ?". u u u u u u u u u u u u u u u u u u u u u u v� v "s u u u u u u u u u u u u u u u u u u u u u c c c c c':. c c 0Q u > >> > >'> D > > 3 3 > > >> > D > > > D > E vX vw an .g a aa aaaaan ut an ut an an an an an an in vX an an an an 0a a < '" aan can tarn aaiw vaw vai vai vai <LLaLL ca:.. . rL a a a a a LL �..� VI l/w Vb NI vi M1n 4J"A SPt.. vw vX an VI N 'A Un V) 'v4 u�M1 wWd tLLfa uLLv �. aaaaaVl OR VI V V VI N 'n� fl. C4. 27L CIX. &%. LL tL fl fl fl LL fk. ZS. AJ.Ck. 0.. d d d 2 LL aasx. rd. at ai caYccraa c.........�Naa(W,aaaaa...a,........ "z'.,..aa'a a..a _ Ln�an��� ��anan El w h Ln '-I c-1 .-i h w oo V h h Ln 0) m N N e-I N h T Vl w d' m C' m w h w w o V w 01 V N e-1 N '-I .-I e-I O Vl w m w M h w N N al al Ol lfl l0 lD w N lf1 T O w N N W N l0 M V Ol Ol h N O w lD V N e-I o m w w O O m o Ln O Ln N d' h h to N w LD w w W w 'i O o h W N M N .--I T V ti W O O N m O N .--I 'i �-i r-I r-I �--� o O O m V M T N N ci �-1 m oo h w ~ ci ~ •~ ~ m m N m LLn '..... O o0 o0.. '.. LD oo rq 1in '.. vA ^IA o' MA o vti� (n ql�'',. V' VT V} th VT N V} iR L? lj- .ih lf1 1h V} ih VT mD 0 o o o w o o o o o v n N w N c h o o v v a Ln w N w m O O h LD ''. Ln n m o 0 0 0 o 0 o o~o o ry m ,Nil 0 0 0 o0 0 0 I M o N T e-I w LD V N c-I .--� O c l LD LP Gl rl! w N LD V O O o0 V O h h h m m m M N N w h LD m N N o6 w m . w .--� h o e-I M .-� O N N .-1 'i �--� .-� .--� �--� �--� o Ln C' T M N N .-4 ri (n oo h �� mmo;m o� ''... Ol Ql Ol V' N N i/} i/f Lf iA iA N'N In N In un iA 1A V} VT t/T to V1 N.N.. Vk N'A N ll ,iA V? VY VTi VY an i/} Ll Vl N- t/1 In VY in In In VY Vl M? V? 1A 1n Vf c-1 N N T V Ln lD h w 01 OH '-I N T a Vl LD h w e-I N T In w 01 a -I N T a Ln l0 h w Ol ei e-I ei N m . .. m 00 00 W W oo W oo N oo N w N oo N oo N o0 N 00 N oo N oo N oo N oo N o0 N N N T N m V w oo V h N N T c-I N Ln N Ln T to w h V Ln V Ln to V Ln 'Ln V Ln to ''. Ln to Ln Ln Ln to Ln N _ Ln Ln Ln Ln Ln Ln Ln Ln T M o M 0 h o h o h o h-zro O h 0 h 0 h o h o h 0 h 0 h o h o lD T tD T 0) o m o T o h o Ln o O1 T O1 T O1 T h T a-1 v c-I '-I ri e-I '-I v rl rlL--I �,t `� O O O O o 0 o 0 o o o O o o o o o o o o o'o o o o 0 o o o o o o 0 o 0 o o 0 o o o o o o o 0 o o 0 o o o o o o o o o 0 0 o o 0 o o 0 o o 0 o o 0 o o 0 o o w w 0 '.. w 0 w 0 co 0 oo 0 oo 0 co w 0 w 0 w 0 w 0'0 w w 0 w 0 w 0 w 0 w'....w 0 0 w 0 w 0 w.w 0 0 w 0 w 0 w 0 as o 0 w 0 w 0 w 0 w 0 w 0 w 0 w ._ 0 w 0 w oo 0 w 0 w 0 w 0 w 0 w 0 w ao ao w w w w c c o o c + v w o .- w w v v m o n c c ar o `o 0 U lL V 11 U LL w u al u w U u J V J U J c to to vl O d a d ¢ a a o - Ln � Ln v c c c c m be o o o 0 o o o o y m u m u m m V t C a c c C c c C C c c C-o m m O O O O O °p' a a a o'0 i+ a+ 0 a+ 0 i+ 0 a+ 0 �+ 0 a+ 0 0 o v v v a a m •- - Y C O C O c? O> -6 i5 :E; m J Q J O. J [l, J Q '... J O.. J Q. J Or n. C V � C s+ � d C C N C N C m O u N' al m m m a/ N W al m m m N w N m aJ aJ V N m V N I a! w N "6 aJ w N vmi ---- vOi N N J p X X X T u C u C u c u c u C u c u c u C u C u c C u C u C u C u C u C u c u c a+ u � m N m m m m m m m m m m m m m m m '... m m m m w w a/ O N m W Y > -o > V > -a-a-D > > > > > > -O > -6 > > > > V > m > "O m > m > m Yo+ C w C m sV+ C m 1w+ C v C aL Ly m m m m m m m m m m m m m C U U V m m m m m m m m m m m m m OJ O C m C C C C C C C c o C C C C O C C O C O C O o O c O O C O C O C O C O J J J d d.� L A A -o _8 U c U C C O m O � __ N O O O O O O O O O O O O N O O O J J J J J "'.. J Y N (�5 O d d d T E m m 2 M m f`0 ` m m f`0 O - O fm O m O m O m O ` O 2 O m O m O m O j j j O O O O O O O O O O O O �. c O O m m m m m m m m m m m m m m m m m m m m m m m c C C c c c c m m m `y m m d. .. U U _O U O O O O O O O O O O O O O O O O O O O O O O O m is o O O O O o O O O O O O C O C O c d _ a Q¢ N'V U U U U U U V U U U U U U U U U U V V U U V "0 "O U to in in U N V y a+ a+ i c L cc G U E E� E� E E E� El E� E� E� E� E� E�� El E� E� El E� J c c�J -------- N h — C U am+ LJn O Q a¢ J m m m m m m m m m m m m m m m m m m m m m m m o o LL W a7 Ma. Y to Y LIPN Y Y T Y N Y VI Y VI Y Vl Y to Y V1 Y VI Y to Q -o a O y¢ O m 2 d 2 d d d d d d d d d d a d d d a d d d d d d d d d d d LL kL 4L LL ". LL LL 1.1 LL LL l.L ll ll LL In LL to LL Ln LL to LL !n O fA m 0 LL 6/1 LL L/1 LL LA Q w Q {n Q N Q lA Q !n Q h Q '... VI a to Q¢ to !n a Ln Q¢ LIt 5/1 Q Ln Q N Q¢ to to a to Q¢ !n N Q Vl Q to Q¢¢ !n !n VI Q L/1 Q I/1 4I1 LerA l!'tl tIl cn Ln to to !n !n to to a a d d a d d d a s d a a d d a a a d d a d d d a a d d a d d a a d d a a d a a d a a d d d a s d an to !n VI VI Vf N N Vl L/1 V1 lI1 L/1 Ln N Vl to to N to Ln ' VI N to N LA N Llf L/1 4n 41 to to to to Vl Vl V1 to Ln to V1 N1 L/} Ln Ln VI Vl to El N lD a m m V' n W n n m 00 m m 0 Vl 0 0 0 0 O O m N 00 c n .-1 m M O ci N m m Vl O m 0 0 0 Vl 0 0 0 In O O o n o WO rn .� n m m in .� o .1 o m O o O O N m a .� �n .� v o m in Un o v n o vi f ''.... n Ln o M N N H .ti c-1 a-1 m l0 n 0 0 0 to Vl N n N 0 m l0 V N m m M m m 0 Ol n m l0 M n m l0 M n m O V O V v n M M N H H O m M N O m n n W C M H V In W N W W N N to N N lf1 M T lO M .--I '-I ei .-I .--I '-I LO V m In N V m '... In N V m O +:V? '6/N t/? 1A V�,,,in Vf Lf th vT +/T Lf Vf b�> krM1 Mftr 4'A ''N1 i/f Vl Vf V) i/} VT v1luT N +/1 A^ t^', fin, sn �A N of of v?',.ah ",tA W'V� AA td?.. ll . N. Vf N v} v m m �0 �-+ m WO m m m ,� n N mm N o o o 0 0.....o 0 0 0 o 0 0 0 0 0 0.0 0 0 00 0 o'o 0 o O o o 0 0 0 0 l0 N m n 0 l0 N m w H. N n m .--I 0 0 0 0 0 O 0 0 0 0 0 0 0 0 0 o 0 0 vl 0 0 0 O O O O O O O O O O O V1 7 m m m N N c-I � m m N lV ci .--1 '-1 to O O O '... O O '.. O N m N l0 m '.. m .-1 n In m m N n Vl O N O O O Vl O O O V1 O O M O n 0 0 0 0 0 T m N .--I 01 V N c-1 01 m m n to O N In O t0 n Ln O l0 N 00 N '-I In C C M Ll H '-I N ci '-I N N N .--I r-I N N c-I I N N LID n m0' M N m In .--I N M eT W°A WO n I Uo uSa' eM^, ria r*x m m 00 oo w m po a6 co 0 Q m an Ln m Ln m ',. m m m m m +xa m nn +rl u2 4p w ID w O O O O O{ O O u. " 0 o 0 0 o w m a om M co o o o a Pi][�7©©i©©©ICrlIP.3 »�' wn u� .� 00 01 N N N N N N m ID '... ID 1p ID cT m m 40 'W m M' m m m l m m m In In in vl a M m n n n an n m Ln n m m m m m m o o m m M M M: M m m 'm m T m o o o ocaoa 00000 o o o o as o 0 o o o o o Do m m co W%a sG eq. m oa m m m m m m m m n rd N IT 'I" -- I N IT V ci N 40 0 O 0 O O N N N N' — 4n kn u0 W 4O WO l0 l0 0 0 0 l0 Sn m m m m m m m m M m'm m M m m m M m m m m m m oo. 00 co o 0 0 0 o m m m m cca m m m m w m C CL' Cry C C C C C C C C 9-0 m .1 L^ O O O O O O O '.... O -0 m ^ ., ^EL Ca m ro m m' [2 m m m 'O 'O a t vv-0—a crvvv E E E E s c c m m m m m m m m v W O li i7' O O E E m OJ v m1 v m Ol v C m� C V V u u C C C C u U_ C C O O O � •> > ', •� � � •� 0 m C c '„�.. y. 5+ y.. ». ^%? "O "o v — — O .'Y7' A d7 SS „t3 .2k w C Ot' CW} wh C C N N N O/ OJ N O1 Ol C C C: C E C C W6 V u I O O i Y C m [-'�c^^�= 'UJ 7 J J 7 a+ ,pe y m C am+ C V E E E E' E E' O Y Y Ym m m m O, Ca %R.. O. Rm.S O O O � O h w n7F '6Y PJ • O O O O O O O O O E E E E E ca cx u u¢ u � 3 3 3 3 3 3 3 3 3 3 v v v v v Y '� Y` Y Y m v v v v v v v as m y c C c c C C E 3 v v v v v m v v v v c c . X X x z is o 0 0 o` 0 0 0 o m c c. ¢ j>>>>> '. '�' ',,' z z z z z z z z z z v v v v v v v v 3 3 3 3 3 3 3 3 v cy ,. c C. C, a cL... Es. `mm u v v v v v v v v v v v v v a m-8 O v W Vl U U u U U U V U •C` J:i.' ^C'. L L L L C7 CY E S:� O CJ C1' Q E' 0} O f3 C) O 1 p -9 ^2 6a we ;E'. C C c c C c C C ,n X~ Fwlk txd WG m mp tip C C m m m m m m m ''., m %m %m m m cam tts +o:. w¢ c c o o v -o v -o ".. v-0 v m m M m m M m m: m m �x o o,o o o 0 0 o cs o` p is a r q',o` `o O w O O N w n as z z: v Us zr rts o o cti cs o o 'sv o ow^W" ¢ �_ �_ C C C C C C C c u u u u ul u u u u u � CL a a v v `m a w w m w Q¢ Q Q¢¢¢¢ U u u u u u 'V u u u u U C.n u u U U N G/ m m v 01 Ol '... v m m °a J 7 J J 7 7 JI J 7 J E'E E E E E E E E''E'E E E E E E E' u t% m m m m ilo� mmvv�a J 7 ;a v O O n Ln n v n v v E E E E E E E E o 0 0 0 00 20 00 2 n. o_ o_ q}, p;Kt 'L ap LN m a Q Q . -' A: Q Q Q ¢ un vH un vi vi _ +ry aea m < < Vh < < o_ a a a a cs ra a� ¢a. o. o_ a a a a a es. ma. os. c.. �. ar ea., a a a a a a. ea. a., �. I �. aa. a. a o_ a a o_ o_ v¢i vai vai v¢i vai uai vai v¢i vai ue' 3 w¢na'n r'rr a'rr v¢i vai vai v¢i vai W, ° ¢ ^�T aL + Q Q Q Q Q ¢ ®, ctro nrr aru amv wra vi an vi vi El o o 0 0 0 0 0 0 0 0 o n o m m n 0 o n 0 N m m o 0 0 0 0 �'� �'� v m m 0 0 o c m m t-I c al a n rn n m yr n m 0 m O m N o n m v' I M m a m v O n of n n 0 0 0 0 o v' rn a o, oo .� .� O Ol O tD of V Dl n to to m o ri o N. v N o o w r-i o m v w ri w w m rry v .-i o a a m m- 0 m o 0 m w m w w vi m o v vi w w M v M n w N w m V N O ID m V n m m V V t"I m w N m Vl m N H to N m Ill m o m H ci m m m V N m N O Vl N m m N N N C m N '-I ri N .--I a-1 V of m It V a n t-I n tD ri r-I to C m m n VT In. V) V} VT V} Vl V1,',. In VT V} V} VL Vf N LT VT VF Vl V} VT V? VY Vf V} 'n Vl VT VT V} VI,,,N V) V} 14 VT VY V} t4 VT VT 4A Vl o o 0 0 0 0 0 00 0 0 om o 0 0 0 0 0 0 o u0i• o ono 0 0 00 0 0 0 0 0 0 0 0 0 0 0 00 oIo 0 0 0 0 0 0 0 0 0 0 0 0 ri0000000000ootntnNol nmoLn 4 W 00000vlMMLnM rn 0 0 W M MAD m m rn to m N 0 n O n O n to M of n M to o m N .-I .� 0 0 0 0 0 0 In O m 0 .� .-I 0 o n In m .� w N n M LD V N N N N V N N e-I ati N c-I e-I �--� O al O Vl O O '-1 r-I '-1 0 Vl rl N t•'1 Ln -t m m n ei ri Vb to Vf''...N Vl. VI,',.a V) V! V} VY VY VA An n VT VT Vt V} V} V? V? Vl N VT Vl V}.......,V}'.,V} V1_ VY V) Vb Vl. VT Vl-. VT V) V? VT V1 Vl. Vl e T V r-I N M V Vl '-I N M V V1 '-I N M V '.. ul rl N M c-I N a -I c-1 Vl ul u1 Vl to m C VI '.. VI Vl V1 Vl lD n m Vl N O O O m Ol 01 Ol Ol 01 m n V m to tD n n oo ci Vl w m m �,q n w tD V� V t V N N N N N M N to t0 to lD lD tD tD 3 N �,o tD l0 to w In m to to In O oo O m O O O W ID m m m M� m m w w tD w w w to w tD lD In m ,-I ri r-I ri e-I c-1 '-I c-I 0 m m m 0 m m m Qt m m O O O O VI In Ol t•'1 ''1 01 Ol O O o 0 0 0 0 0 0 0 O O O O O O O O O O O O O m 0 m 0 m 0 m 0 0 m m 0 0 m .� m 0 0 0 O O O'm m m 0 0 n 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 m m O O O O O O O O O O N m m m m m m m 0 0 0 0 0 0 0 0 0 a 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o a o 0 0 0 0 m o m '... m m m m .''...m m m, m m m m m no 00 m m m m i m m m m m m m m m m '.,m m m Im m m m m m m m m m m m m m 00 c w ou E c J c o O v v ewa > E m O 0 0 w o > — In w w w w w L Q m O d o E E E E E N .. w v a v v v a u o wv p C_ C_ J J J J J w •- � m Q C E E w m af0i ami ami .w == E E E E E v :E m> o o o o o v `w `w v v C CC C w N w w N w w .Y yy m JV V U V V V U J u m o vOYoC UC,O -O0 0 U Vw w w u u u w 0 `` J w w w w w w w w w v v v v v m m y -O m vOi o N Y Y w N w U1 OJ w VI In Vl ul V) Vl Vl Vl Vl J J J J J o IO f0 3 o C C 0 `o `0 0 0 0 0 0 n v v v v v v 2 2 v o 0 o a o m m m m m o o u v v o u 3 3 d` d a d d` c m m m m m m m m m u u u u u a a o. ii o_ o n w 5 m m .w w v v Jo L L L L L O w .� N N > C E v C C Z Z C C C C C w w w w w w C C C C C C C C C w w w w w U_ H w ".o 0 0 0 o E E E E E> y m m m m m m m m m y v y v v m m m m m v Z i5 on.. u. L ;;c .w w w w w c oo c c c c c c c c c m oa o0 on en 3 3 3 3 3 c v `w a v v v w `w w o oar ao nu on 00 0 w °Y w Y y; w w m m m m m w w w w w� ai ai W E E E E E E E E E"> m m m m m U 13wO d C c CCGccccc V U 'uO O>O O> O>O> OJ O3 O awc+ awc+` ''m m >O O O O O w o> d d d a p U U u U u u U U U w w to c u u u u u c c vwl Vwl a aawn uwt u>w > > > > > >t. w>wt u>wt5.2.2.2.2 ut o Vl � v—UoOp IvOo voO vo 0 u c cu uuIu uuO uau O O O O O OOOOOO O O O U U UO O ,pmC, udaCup>> > >> -O -O wa-p O000OOOOO O Wc c dd U U U U U O¢ U U.UOOO U.0 U U mm m m m mm m d d d.d d d d d C 0 , 0 0 U.0 u u U Ud d d-2 -2 -2 -2 L ^e -2 -.2 -2 -2 L -2 d d d d d J J J J d d d dd Q aaa a a aaa a aQa C.1 U U m ut ut. ut,vf.vf. ut ut ut m '... cn to to d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d d En a¢ a¢¢ Q a a Q¢ a a a a¢¢ a Q Q Q¢ Q a¢¢ Q a a¢ a¢¢¢ a a Q¢ a a a¢a¢¢V1 Vl VI VVl VI VI VI V1 Vl Vl VI In Vl Vl Vl VI ''... VI V1 Vf Vl '... VI Vl VI V1 Vl V1 Vl. Vl Vl Vl Vl VI'Vl VI V1. L 9 VI El M O O I- O M N c 7 w 00 '.. 1, m H- l H l0 - m N m N O r-I r . H O 00 m N rl N Ln 00 m N I� N m m wN r� N O m 00 '-1 O O w'... N H m O w al N N H o0 w N V ''... o o M r-I I, of m n n N 1D of N O m w Lll I* n O 00 to O I, ',. n o 00 ID O O t t m lD Vl O VI V n n lD to m c-I Vl 00 '-1 M m I, lD N o O n R M In n ._ N M l!1 I, a Vl N N w m ri oo e-I ei N m w In a M M N 00 M ID R m N 00 m M N m 00 m C H m o M N e-1 r o m to N c-1 � to to to M T o to Ol V oo to r-1 '-I H M V oo M o O c N M N of 1� D1 N M N Cl rl c of Lr 1l N M `""� e-I N V. Ln H N V I, N N ti'. N n N N N Ln O +. v* an .n rrw 4n •vo- r✓r �,rs wax crs. rn +� .n ,n. ve .n n v* .n �n..., .n an +n .n an ,n +n in'...n an ,n +n ,n ,n +n Vv +n ,n o e� o o 0 000o rn v 000 o lo o 0 0 o v o 0 0 0 0,.0 0 0 0 0 0 0 0 00 00 0 0 0 0 0 0 0 0 0 o 0 0 0 0 0 0 0 0 O1 N 00 .-I 'T o m M m m O N N m M 00 Ln N N m m 00 N N N oo m m co N N a -I O O ci N O 1� to m a M N V M w Vl O V o r-I c-1 M m M c-I u1 n M O t0 n O I, M O N n O n M O ti M M cdb Vl Ol 00 '-I ei N e-1 rl 7 V1 e-I m 't lv v lD .. Ili to r` 01 r` a M lD Il m N V M N O I. ID V .--1 •--1 N t0 •--I N V CO M ri N V o0 � M M to 010I W IW ©©®© '7 m O O O o O O 4� T m N to Ln o o o a:dti oo O O O oo cc oo oo oo M 4/? w w E E 7 7 u u 0 0 v v 0 70 uu a a co Q^ Q" m wom nm m m W w w w U 00 to N N m aW�} kW E ibip m N N LIl .--I O m m U w vOi z O Y" 7 7 7D 7 7 -0 _0 JiJ OL E m m m m Ur M ID r-I N Vl '-1 m LP m Q o �' u o 0 O o 0 0 o a o_ o v m m m m m C7 C7 l7 d. v v v v v - m 0 N Kkp0 c m (:J (D V' d. l7 l7 W lD N N w t t Z CL O,. U U U U U U U y� -D c t6 U 00 to N N N V N m O N N N N N O O O 7 7 7 W U O O w w w w w w w w C C d O f0 E V N Ln '-I O M �D rl N N '-I N 0 ',, O o - V C 7 L U t`o t 0 e-I N vl .-I O '., O O O O O-0 L-0-0-0 V V V w w '� '� '� '� '� '� 7 O N m ewr u vYi d O w w w w N- i+ 'a. c c c m m m m m m m w v L 7 3 m 'c E u u u u u "a v v v-0 0 0 o a o E E E'. 2° 7 v v w w w w w w w ? u o.. cc�. .. a 'E l7 C7 0 2 Z w w w w w w kaa ca, - :Mr T T O + C c c c c c c c w 0] Y E E C ID i O N V w w w w w vwi w w vwi H vwi �..s . ,a ..0 .0 C U E'. E (O fO f0 t0 m m m� ', � E B. C {� {� � m M Q U M lD U w w `1 ` w fa f6 ai m m m O O O O �.? m 7 0 a E E'' E E E E 7 7 w w u n n c c n a n a c c c c c c ca as ra v a E E w w w a w w o o 7 7 7 7 w n E 0 ra ,t 'ot 'ot 'ot '' 'Ot 't v v ti.r u u u rm+ u ac w w E a zz Y u u 2>>> v u uw L w vd u u u y L u u u v v v a s a a a a ca c S a w w w w �, a>' a _70 07 _7o u u u u u u u n n w Ir ao w w w w w w w nu' as �ma w _ ci w i a` o. as ex ca cz D� v. m` � vw rn uv va w 0 a a EIll cy as o o a sa C t w rya m m tD m m can m ca m ra m U U U O O 'O� O O O O w w 1U w w ' '^x. Q Q f0 * C C C C Cy C1 CS. G'] C1 d'.i dnkS Ll' Ch Gq Ca 0 O O .% .0 .t: .,C .0 a i °"*y' ~ a ¢,Q Y Y ` `Y Y` . i Q a Q Q Q Q Q VI VI a Q Q a,.Q'Q 'Q Q Q QIa ¢ Q a¢ Q QQ ¢ Q Q O O 0 �p Z Z Z O O O O 0 0 O "" .^ Z Z Z Z Z Z Z a a Z Z Z Z Z Z Z Z Z z Z Z Z Z Z Z Z Z Z Z Z c c e w¢¢ Q o Q a,a Q Q Q a u u¢ Q Q a Q Q a a Q¢ a a a a a a Q a a a¢ acaaucc x x x 3 3,3 3 3 3 3 q a, x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x aa, m a a a a a a cew. rca aa. D. D. aa.. as. 'a„ d a a a a D. Ca a- a c m ¢. va. m o_ a a a a a a ¢ Q Q ¢ ¢ ¢ a ' ^ dam' '» T eY' ¢ Q ¢ a Q eL 4, +�C aC '4 eZ '�eE '+7G a Q Q Q ¢ Q Q VI VI VI VI YJtl %n Wi IPO k✓1 NY1 US VI V1 V7 Vf VI N UY U4 V+ WM U7 Vn Vl Vl Vf VI VI WW Vti. Ifi 4'/5 W5 V7 V9 0 0 Vf 0 Vl VI to �'� V I l V N oa-liiv �i '' 1 I I�I��Na��I� ' N I d l I�,I�I Lnuati �� El 1ND N vl O V a N^ N co 0 0 0 0 0 0 0 0 m n O O N m 0 0 N 0 AO M c-I 1p m N w n w O O O m V w tD m M n N N m m O �--� M V1 M O -i N Vl rV '., 1� O N Ol O O O l0 Ol O 2. �--� tT 1., Ol Ol a al m u1 0 m Ot lD M M O M n e-I N 1" w m i, N M V1 Ol O tD N Vl m 0 w m m lfl M m O O m M N V m N m �--� m T c-I .-I .-i V N w O m Ol .-I c-1 M N n O N m V 0 r� O N m m 1, AD N m m n AD IN �-1 M 1i 1" W N N Ot V -4 N I� d' N m rl m N N m W V Ol lit t` m lD a' V lD Ol m V m 01 m V Ol 0) N tT m m to cn M Ol O w N Il'1 O O H w H m c-I rn rn r-I V n m un un Vn un un un L1..., uW un Vn V} In'.Vn un 4 V}''., un in V1 Vl Vn VT Vn u! un Vl Vn V).... Vl Vn Vn V} V}', VT VT Vn Vl. Vn Vl...,'. Vl Vn VI. Vn V} Vl In -tin OVVl O o O O O O O O O o O O 0 O OO o O O O O 0 O O m 010 O O O CD O CD 'O O VO O O O O O O O O O�--� O O OO O O O O O O OOOOOO O O O O O O O O OO O m o O ONOVN"D N o O O O O OOOO O m m m 0 N N m T m 00 0 O OO O O O N o O O m m O O o m V r m N in O O f\ w V V V t` m .4 AD O m m M� O o I, OlmnO m <nNV mm- O m N m Ol N O- V mNN N M f` m M N O V rl m N n C m on- C m I N m Il c N V N V m w to M AD N M ID 1N M m m N n c-I m a N V m .--i !V V m Vn un Vn'.. Vn un., un un Vn Vn V} /1. Vf Vn un Vl..,'..V) ul''., Vn un 4,'n un un Vn V) un un if '1/1.,Vn V} VI Vl Vn''... Vf Vn in 14 Vn ul.. 11 V1 VT V}'.,, VT In In un a -I N M V M tD m n m Ol O .ti O �--� N M V Vl AD I� m Ol T V M lD lO n O T .--I N '-I m m a Ol .. lO '-I m O N M V m tV N N M V V N m m m V m m m Ol m V V V a '.... m m In m m e-I a -I e•-I 7 .-i e-I O-d Vl N ri O V V N I� lD M W O� N N m m m m m O O M m M to m m M M m Lin Ill to u1 Ill VI Ill N Vl Vl Ill Ill Ill o o 1n m tT Ol M Vl r•-I lT lT M n t\ N �--1 e•i '-I O Vl n n n n n t•-I N m m m M M m M m m m m M M m M M m m m m m m V M m O N N N m m m M M O O m V d' m V m O O O O O V V 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 m m m m m'm m m m m m m m m m m m m m m m m m'm m m m m m m,m m m m,m m,m m m m m m m m m m m m m m m o ;_, 4 o v a Cm7 lm7 m I�il N N m —_ O W a) 0 y a s U u m N V N N e-I O E la a 00 f0 e a C lU tU L m m U m I Ill rl in E N — O lU O N 'O O aaa _0 -0 x E 19 x y c.- c `m �_ 3 c a s N tU W N O C C C C C O m O a O ry E E E E E E o 0 0 0 0 v '� N c c c o c Y E u _° C C C O O O O O u u U U U U a C p 0 w O w O N a (J Z O O O >>> > > a a✓ i+ U d c lU m m m . m m m f0 m m ¢ a a a a Cp a v v o a '� '- v tli a7 to l7 l7 C7 to a d o E o 0 0 0 0 m° m v v w e c w u u w ° o v a a a u a v ttai aai n'.. a n a g a m- ? m a sti.. a a a to .� w a E m O p v w> !-t c E w w w m_ oa a a a v a a N ro v v w O .� m'^ u p d 0 vOi --- wU. c E E o 0 0 0 0 o v m m c c c e o en m w m m m a m o �0 `o a a a a a n E o p o 0 o c E a a s- a n n u v o > `w c c c c > c x E 1O x C C C C c Q ',,, E m c E a c u u to o 0 0 0 o ro c c C c c c c W w W W W W w w W W m y a O O C C O p N C O U H - N C 0 0'0 0 0 o v n v n u n n v v n E E E E a n a u > >'oo u a o a ¢ a a ca, a c c c c c c¢¢ a Q a a a a¢¢ c c c c ^^ c o v v w O O O O O O O O lO Y L a 0 u u u U y U U m o a v v v u v a m a v v v v u m v v mmmm u u �.m.m u u m m~ c ac o' u o a a a w m 5 5 u u u U u u u u u u u u u u u u u u '` p p p v y w aaa¢ Z 2 mmoomZ Eu a nu uvvvv� m m Z Z Z Z Z z Z Z 2 Z Z Z a v v v p; N 0 c c G/ dl N lU N lU ',. lU tU v N N tU N tU tU W lU tU N a a a a VI Vl yO. :: :: V1 VI m U U O 0 > In UPI.. VI Vt VI Vl In Vl Vl V1 VI Vl Vt In A Vl V1 V1 V1 0 o > a a C C C C YO ` u0 O O y a N O O O O O ¢ ¢ m m m m m m m m m m m m m m m m m m m o 0 0 o a a- -- a cLE E 0 0,tn a v u u u u 0 0 a o 0 m 0 u u u u a¢ m a a a a a lv m o m v w v 0 o m m m m o 0 ¢ a a a a a a¢ a s a¢'a'¢¢aa¢aaaa¢aa a'o'o'oaa'ms cc� as z z z z z z z z z z z z'z z z z z z z z z z z z z z z a a o o �'� a a E E > a a a¢¢¢ a¢ a a s a a a a a a a¢ a a¢¢ a a u u u u a a u u u 3 0 0 0 o u u o J 0 0 x= x x x x x x x x x x x x x � x[ x xix x x x z x x a a a a x x x x x F x x LL J J u u Val U/$ Un N Val tan < Ian Val Val tan Val Val N V'3 lal Aan tan N tan Vat x x x x Val Val Val lan Ian aM 6an Val < < < tan Vat Vat last tan Val Val .V1, Vt o_ 0- a a.a d a d a o_ o_ a s o_ a a a a ¢ a a¢ a a¢ a¢¢¢ a a a a a a a a a a ¢aaa ¢ a¢¢ ¢aaaaa ¢ a a a a a¢ ¢ a a a a a a Vt V) N V1 VI V1 Vf.Vl Vl V1 Vl N In Vl N VI Vt Vl VI Vl Vl Vf Vl a VI VI Vt' N V1 Vl Vl Vt Vt V1 Vt Vf Vf Vt Vl V1 '.... V1 Vl Vl V1 VI Vt V! V1 VI El 0) co 0 N O m C O w m M m W n co 00 O O O O O '', O O O Vl l0 rV VI N an Vl LD Oa N l0 O) C 01 N O Ol 1p N O N O W I- O lf7 n t0 m W [b M M O O N O 0 o O 0 ''. an l0 n0 ar O O L" W N N 41 N O O) T T C N- O) o C I� m 0 o w l0 w V) m m C m 00 l0 .--1 ' m w n m m N O t O .-I C w C 111 w m m m w O C O m r\ w '-I O Lf) O w 0 m n m m w e-I w N e-I T I� r n Ln C N w C m w C N N N e m C C N C m 01 rl n c-1 0a .--I 10 N V) O O VI T 01 C71 m C M n l0 N rl ci N c-I m .--1 .-I enz ',. va +n .n an v>• u* .n ,n v�. +n +n .n +n v>• .n e a. wn...n {n �n an .n an v>• +n v>• va .n va vlr 'A V$ %6 +nv, an 'n v in. in .n V� yr ooQ00000000 c),00010'0000,00000001000000000000000o n!0000 0 0 0 0 0 0 0 0 0 o c o 0 0 0 0 0 0 0 0 0 o N N m o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o y o o n o .-I N O W vi C9 N .--i n N N m N rV 0 0 0 0 0 0 0 0 0 0 0 0 0 vi n u1 tD n O O O n O an rl 0 0 0 .--i .--I lD O O N N O al l0 t0 O N c-1 LD *.7' m w C C O O an O N m O O ul ul N N N O Vl u1 N '-I u'1 O O a -I '-1 T'VI '-I x/•a an 14 M 1D lD l0 a -I N M N lf) N O N N n ,D - N c, M N N N N �T I lD .--I N N no� D ',, c-I tY1 ',, i--j" mmmmmmmmm o�oloO oN �00� Ia�VRaaolq¢ 0 sxa xoawllo 0 oollao� �cz o o o o 0 0 0 o o o o 0 o o o OU s m a W o C n to > rda j pw.., rn aD M 3 vwi ar r C C an to an f5` 0a M 0' N 7 ai> w co m m o0 o o v'ni ~ r. ~'• 0 n J oo do an Q z > 0..0 o o .� .� '+ a„ o' o Q ra rcTo�roo Q Z 0 0 0 0 0 0 0 0 0 l'J Z O LL q 40 '', 2 LL cao..aoo0000cc� o�u.0...o'���u� G7 w o_ 'f = 0 0 C ar it c.l z > ,' � O � I � � w Q o_ Q-- a o. ,u - w gag' w u Q Q LL Z �a, m... O a ouUuuUuuwwuu�xa uZuuuu O 0 z z z Ln z z z z z z z z z w u'zi� u rz, n'zn u� �: C � O c � U v � v c W w w w w o M Y w N > ? to w w y w ess w w w w >', �a SY c7 • E a a tc z d d w a I 4i 2 "l0 "0 2 Y m u q,i d ti "0 +0 and w m m m m 2 cup aaa c l7� o"� c w j 7 w 7 c l7 l7 o> w a 'CP' 07 c v o .. c m I ti N Q z z z z t7 -o o a o w _ Oc0 a w c ¢+ m m m m Q m M 2 m v v •�' v v _ 7 7 w O '',. vwi U ."A C •C N X d". N Jw+ aw+ aw+ m (� l7 l:J o OU 0y ? ° raa '.0 C m 4Cu', > w 0 a+ a+ a+ a+ l7 00 t0 N N c... C• 0 O u u CO d m d u' uCLv °o 'S• m -CCE c c c c c c c c )a ay ro c c y w 7 Q as c c `� c c c c c c CC c e c us. o_O.W an O O m 0 0 0 O m O O O O O O 0 0 �O 0 0 m i0 0 0 0 muEcG U U 3 7 7 7 7 7 7 . 7'.'.. 7 7 7 7 7 w w !' 'CS v N ° 0 o me o 0 0 o ma o 0 0 0 0 0 0 0 0 0 0 v u z uu is uuuucauvuuuuuuuuu¢¢¢ ; o, a.. c. a a , m aa. a a a o_ a o_ a aa. a o.. ez. yoag... n. A. 5+Qa 9LM s�P6.. VQ) VQ) 1Qn N lail VQ) tQ/1 9% oa"E w'iY M1i"V Van YM1 AQlV )R'9' aa. d iWi.li Vf E 7 E •c w v 0 z w v O z m c C E v a' c E E �o E S o z 0 N w u u v v o o o _ v v 'I v ° u' 00 C O 0 Oj w' 0 v d u i o E E z " v LL it: w m o LL v j ?lo C 7 7 C ° V o) of �3 1 E C `w a 2 w d 2 7 u : w •_ g a E w w= c �, 7 0la o= 7 p u w ` ate+ K ..U..: z `` E z a�i o c 0 m Q) °� E ^> w 3 sa' E a e C w ti N w E w w u o w, . 0 a; a`) g° m. cy v as v o ,c, LL LL E 3 0 cc „ Z m z o oE u° ^ v m v o , v �Ql^ o" w U w SVd iYif m LL C w w 7 qL a�nyy �. O E . m w o dfla Y g« w V cc O� o O o twi aCo v ecw ;C5 0 cu, u aai E •E r0 cp fCo i E y vw' r y u c c Q E s o.. o w M 0 0. 'u c o '^ an o Q U u 0 w arc ai LL U F-� Z O O O o_ aM N Mb YM1 My Qb tlq kY® aW ® 0 e ® 0 ® ® Md aG iIN 3 3 3 3 3 3 3 3 3 3 3 3 o ra o 0 o 0 o o o o o o o 0� o z z z z z z'z z z' z z Rn z z z z z z z z pw w w u w w w w w w w w w m w w .. u u u- rga u. wr er �u u u u u u u rMe r w w w as w w. w w w' w w wLo [n SAL KPU M°6 6/a Va Yn 4)'N Vl VI VI h N &Ply U'Y. Un' 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 O o '.. 0 0 0 0 0 0 0 0 O 0 0 0 0 0 0' 0 0 0 0 O Olz zzz'z z z z z z z z z z z z z z u u wr u u u ua o_ a CL ,acrl� CL .C.e�L a.t,.r,.cw. sa. o_ LL a o_ a o. o_ ax. ska, es ca. o.. a, > 3" .r"" .'Q Q Q Q NfIQFEQVMQQNNNaN Ul Vwl V) N '... V) In 'W !n an CAY iVy WN) Nlw1 Uw9 4sl a✓wa N V7 N Vw) 0 VI ' < VI.. < W't El m m m V m- N w Ln V N O o co n C m n� w W n V n 7 w T M LD n n m o m Ln m m LD C lD n M Ln Ln M lfl Ln Ln n. V d' '... V n m M m N n m ID.-i M mLn n m a1 T c-I n n N m N W O w Lb wLb w m m V m N O n t Ln m m m LD lD n lb a0 m C V n O O n m O m n In o Ln n N n Ln o Ln O N m N m m V. w W m lfl V w w W V m V m� O N N N m lb n m al m M n n m O V n LD m n o w O m m n m O m m H N ei �--� e-I N �--� m m N N n G w w m Ln m w N m � m ID '... O �-1 N V O N lA Lf1 Lq d' o6 O N LO o N V o6 N N LO O W V 1p c-1 c-1 r-I H _... V? VT i/f Vf Vt• Vr In if V* .� V> Vn VI. In u+ +n Vt Vl V!VT Vl V} "I.�h V? V)I,L} Lf V}ah V? V .. VT V1V.,V>- VIN V1 u♦ VT V} VY VT VT VT N V} , 0 0 0 O O O N m n O''n m V n C'O m 0 LD n M LD Lll O O O O OO 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o 0 0 o o o v m W o LD m m lD m o m o LO LP m LD n o 0 0 0 0 o 0 0 0 0 o a o 0 0 0 0 o 0 0 0 0 0 0 0 0 0 0 0 LA to g O m W O lD m T lD M O m 0 W W T W O O O T O O Ln n n v w Ln I, n O m O m O Ln O m Ln L o o m O o O m n M N o W m w w M O w Ln rl W m LD N O O N N c-1 c-I rl N c-I O O N m n m m m m LD w m N N N M V Ln LD M C c-I ff Ln O N '., V '-I m s--I N c-1 '-I '... '-I N rl N N o Ln Ln V lXl O N W O N V w N N l0 rl 'i r-I N r1 r-I ia"q Vz.. +il}• LY......,iA V) Kn ull ti11- 16 V)....'In, Vf V? V! V}.....,.i/f V) Vl. V} V? V}. Vf in V} VT'...tA V}. N lr 'V} V) V} V} V} Vf VL V? Vl V1 V? VT Vl VT V! Iq VT Vl V} C r vsl n L c all (D v ` 2 w LD z N N a m d W n rl D D❑ lD W w LD. LD m LID J W m W N to .ti H~ U>❑ m m m m m N m v Ln T V L!1 L!1 N W W C❑ a Q m oo F F- ❑ Ln M* a m m n LD a ti p❑ u Ln u H Q v v n n [C Q �"� N M V M e-1 e-1 c-I e-1 N N N M fl'1 V VH n Ln Do m m Q O N d Z z o o p p F H H H H F H H H H H H H F F F O O a U' V' OOi .N-i ooi Doi m Q V> O> g 9- a"' 4- n oNo 'ta w 7 m m a Q a a a¢ a a Q Q a Q a Q¢ Q Q Q❑❑ d d u v u u u U u u M u u u u u u o o a v❑❑❑❑❑ w >i w❑ w d �fa�`� m m m o oq LL LL N > > > lY K> O o O N LY rc O O O O m m m m m m m m m m m m m m O 0 u m Lr 0 0 0 0 O❑ Ln O Ln W W K w w'...w D D O 7 O 7) 7 7 7 D D D O C w> W W W cc K w C tY J w w w W W W o o O C d d d a a LL d d d d d d d M. d d d d d d d d Ln N to N d LL d d d w 2 d 2 N to 6/B YA ❑❑❑ i i O u�uu���uuu�uu�uu��uu���uuu��uuuGLLu�uuuuu000 z z z z z z Z Z z z z z z z z z z Z z Z z z z z z z z z z z Z z z z z z z z z z z LY K K.-` Vl N LIA In F/} N Vf.. N N [A !n !n. N to LA N to N ''..Vf N Vl to VI t/1,V1 I.n to V1 N Ln N N N to to Vl VI V1 N In .0.fl RA9 L/E i1. d d > > d Y L o Y a o 33 L p (7 Y L O t O oti E c z 7 w o r' > E o O' v Ln m L N E c (D7 s0+ O o C O Y a Oaj - O 7 a..�......... >.>_._>>>>>,. v E o o O 7 E avi........ L L L L L U 7 a 7 Z E Cf E C� 000 U L L C C ',, L C C C C C 4t E ^, C O E 7 7 E 0 v o f E c c o o c o 0 0 0 o v E > V E a o v 7 a s Y c y o v m E o Y c v" w w '�' w w w w w c o O' m z j v t w` a)O C N m 7 7 al 7 7 7 J J o ~ C C O O N 7 7 l7 CT =1 O' 6 V Q D- > in al v j m N= O N O' u v v Q v m m v v v1 u_ io is ❑ v v m= v= w Lz s cR > L a`i u p E D v v n= a v z m m m m m rn m m m c .` c a a L v m m m m m m m m m m '- O Y v U a` v a N 0 Q' a u m m m m m m m m m m c g L-o v= g > ,5 S v 7 "' v u Q > m m m m m m m m m m m v c `� m w op .� Y w +�' L m m m m m ''... m m m m m J C aa+ e-I m N Vl m N Ln N N Ln O' v O U 7 L7 C C C C v U +m' •!'' >> boo 000o000000E�g�?o�z�a3 ooD°o �cc c n n O a a a a a a a a a a 7 0 c L V E oca� U o o° o c d 0 0 0 0 ? > ? > > > E N E o 7 ac v > o N M v Ln m a Ln v Ln Ln E N j ° v C E "_o > > E v v w »S>> v v v v `m_ `m a v v v w w c❑ m > .E T N v v E m m m 0 ou w o 7 E r L Y L v a v v O m m N v H H H H H H H H i- u 7 u `m v E o v n y o» V V N a c c O u c 0 0 0 c o o o o o o 0 0 0 m u 0 z u 'c: OO v a a` m N N N m m v p N d 0°° `m '` ° m c° o .0 w u w t _ u u v v j u c _ _ m v v v `m v a o `n Z Z b` v t 7 T>> v N O ci -i m V u1 F F- H H 1= F- H i- H H N>> LL C Y D ` j o W `1 .+- n y n Z Z v v v v v v E E E E E E E E E E v p '� v oN 7 c v c c N N Q Q Q F m m w v O'O O O O O O O O O w❑ E '� LL,> o' v 7 O�>> N m v C a~~~~~ LL LL LL LL LL LL LL w LL LL U o O j Y Y Y o v '- y y u U u lOi L� lOi ��- LL= H y Y Y m m m al N aJ v m v v m 0 y ''77 7 Lp p O U O u C 7 7 Y C Y m m m p vl Ln Ln Lw z c v vl Ln c E E E m—c o a Q Q Q Q Q do Co 00 0o w bD m1 0o Uo m C Y C C C L 'a N E E is Q N N N 3 d Q O O O ,� N v v v v v v a a a a a a a a a a c c c v v v na a H o Lm c c c o o m m m m m LY >»>> 7 O O>> o oz >i w aEi w w Ln o c o c aEi aEi Y >. > a Li a a Q Q p p UO m UO LtD m 00 UO Uo m! m m CYGi UO lLl Uo 00 i Li E O N N N L L L u v�i a J m N N m al v v v v C O O O O O O O o o o O O o o o O v v O m C C C U u u a1 Q C C C K O O N am+ am+ am+ am+ am+ Y am+ H +m+ am+ am+ am+ r 7 f0 m m m m MU u ` u cm m ULY tLD DQ cc cc c »j C V1 L/7 L/1 C C C m m m d d m m m m m m m m m m m tW m m m m a U C C C 2 U . E E E E u u u u u u U v u u u a u u u u y y v v v v v v v'v v Lj N Z L Z v v v v v r C o u u u u u u u u V V u u u u u u u u •- - u u u u u u u u u v LU u u _u u u t m o a n n n n n 7u 7u.Z Z Z Z 2 2.Z lEuv Ua� 2 2 2 v vIv a a a U1 N d 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 al al v w al al al al a) v al ' m v v v v L-{ d d d d a d d d d d d d d d d d d d d d d d N Ln Ln N Ln m N to N VI Vf H ii 2 W x to Ln Ln to N lY K w) p p a ® ® ® ® ® ® o ® ® ® ® ® ® ® a ® ® ® ® ® ® ® a e ® a ® ® ® ® ® ® ® a ® ® ® ® ® ® ® a a Ln ® o 0 o 3 3 3 3 3'3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 313 3 3 3 3 3 3 3 313 o o o o o o o o c o o o o o 0 o 0 0 o o o o 0 0 o o 0 o o o o o o o o olo o o o o o o o o o¢> dQ z z z z z z z z z z Z Z Z Z z z z Z Z Z z z Z Z z z z z z z z z z z z z z z z z z z z z z z m v a) v al m a) al v m al a) al w al m v v al al m v al v al w al v v m al al m v al al v m v v v al v al v v w p = Z y 2 y 2 2 y Z Z Z Z v a .0 u= .0 == u u u ,u u u = ,u = u=== Y= u u u ,u u= u u v> > > > .Z Z Z Z Z Z L Z 2 2 Z Z Z Z Z Z Z Z L Z Z Z Z Z Z 2 z 2 Z Z'Z z s v v v v v v v v v v v v v v v v v v v v v v v v F F s Z Ln Ln Ln Ln Ln Ln Ln Ln Ln Ln in vl Ln Ln �.,. vl Ln Ln Ln Ln Ln Ln Ln Ln Ln in > > v v v v v v v v v v v v v ,n In lvn In vi �. Ln Ln m Ln Ln Ln Ln Ln vl 3 3 3 3 3 3 33 313 3 3 3 3 33'3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 o o o o o o o o o o o o o o o o o o o o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o o o o o o o o o o o z z z z z z z z z z z z z z z zzzzzz z zzz z z E z z z zzz z z z z z z z z z z v v v v v v v v v v v v v v vv.,..v v v v v v v v vvv v v v v v v v v v v v v v v v v > > > > > > >> > > > > 'i > '> > 2 2 > > > � > > > > > '> > r fi L � � � � =v v v v v v v ��.z v v v v v v v v v v v v v vv v v v vNI/1toMV v) !n N Vl V1 In N VI Ln N In N N VI N N VI.VI, M Vf N > El OO m m m m m m vi m m ", o m rn m r- m o N N- am .� ti o o an o m o o in o-- a- m n O O O O O -!-I 8 W 00 O 'O O O 7 V '. D1 cl lD Co lD lD 1, m m N m N lt) N T m 00 m m T m N lf1 m M Vl n c-I N N N N N 00 m V V Vl O CO tA"R F,A'b. @Xb N Ni 0 AD n r, 00 m aT Ol n n m ^-1 00 O 00 O O Ol Ol m Vl m Vl n N lD N .--1 Ol O r, .-i M m m T M 00 N I� an w M Ln m m' m m m� Ln vl m m O O lf7 Ln V a m V ei m m t\ n w w N o A m w D1 N M N N N N N V M n D1 V D1 m *q kr m m Vl Ln m M N N !b W 00 00 '-I Ol D1 O O O O T M ^-1 N 1� 1p N N ar '-I wi '425 0.1? n h wD m n n Lr L .fit N n t` 00 '.. 00 Ln an LD to O N N V} Vt• V} V) V} V} U% 'A°A'%A lA In V} V} V},,.VT V). V} V} Vb VT V? Vb VT VY VI V? V} V} u? V} u} UT VT VT in V} Vy V} V? V? V} V} lA) dii '.,'InY, VA O O O O O o 0 oo 0 0 lD ID o O O O a1 D1 rl '-1 a V o O O o o� O O N e-I N N O I OOOOOlo OOO 01OOO Vl O t0 tD 01 D1 ul T n h.. tD 1p00TD NNO O OOOOO aTO OOl O Ol m O O N O V m M Ol Ol Ol oo T m.. oo oo 0o 0o O bn (n .--1 (n m m N N M T V� O T O oO O an O vl Vl V v) Ln 01 M O4 O O lD O N w 00 00 V 00 m 0.67 4fY t\ n M T V) V ci .--I r-1 n nMMNN M N wll lD c-1 Atl n N N N N N V O al T 1f1 '.... O 1l1 D1 01 m oo O O m Q'p M mq Ol Ol V V t>0 m N O ',. D1 '-I N c-1 m a0 t` r- n r, ',. n n i,A7. w m an 00 00 D1 m N 1p lD Vl. Vl �,. V} V1 V1• V} 1A VT V} "1s✓A 'V? +J"d..Vb. iR V? iA VT V} N N M'J.M1 VT V} V} 1A AA4, 'V"A Vk VA A t6 w j kA N 46 wA Vt V,,, I� to 'V-" YO u a Y'O u Ncc to F �~, LAY m m m m m F F F� N N N N F F LL Or d Ce Z aru a F F F ti ti p •-� ° m"". •~ F F F F N N an a+R ey ti ti ti aD aO Z LL Z ap, w tan wrp U ut aAA j> CA rA „o C .-1 '-I ti 2 .;G� ',' 2 N N ,. N N 2 2 v1 Vl ',' 2 S u u 2 ,' a ul In Vl V1 } .'> } } U VI V) u Ja z Z O 6 O O O O Z z O O O O}} "' +�" O O z Z O O O O F F F �-- � �� �' `� "�� > .� N u7an en " R R an R an an OA 00 an vi en an an an l7 l7 C7 d� Q wdr•. v1 0 'i N F 04F., i� m m D. d c-I N .--I z:- N 1" N .-1 N 'i rV .-i N i N 'i N .--I N E E a Q a a a a Q Q Q'a a a a a a o 0 0 a a a¢ a a a a u'� a u LL G a e` sa E a x n J x x x x Y 2 x x x x x 2 x LL l lIL , 2 x x x 2 x x z z z z>> z N N N" w w w we :? O, w LL a H F H H H v a,� uro T 2 cc n J J wn ri r w n an vi uv uuuxuuxxxx' a 'xx2x2xxs3t w u2 xxx'Sxxuuu uuuQuuuU E u A. yr m c u �' ^ E o. a d wan a T mo wn O; OI vri w'M u wn v, m e m c a a m ccu " w 2A psi voi `ru, mu ' ' E C)0- 'E ' .'' 'D ay a .a, aag 'nu a a Z Z Cup 23 o ¢a a a` ur o a u ci vA a a v a a E > zz n, xxzz"A w a,�2� u i wa µ 2 2 a°n v°7i'. 2 S 2 2 m m 2 S> Y qEJ o 0 w m m an vA o o m m CL voi a°n a° ^n u'w in o `o a° an u a w m qn `oo o o u vti `o `o `o `o a `o '...... `o a a m a o o > °., Al a" .c w �.... u w LL u u u u s"� p u m U a a a as a s c, c a a a ar a a' a c c c c a a. a a '� -o u u u u u u u u u u u u e 41, 0, ary re' m c u u aCA a m e m ca m m m,. ""w—"y rcd ,ro a y_ w`z., r. ,cn c a a v+ g a u w a __ _ LL _, a CL o. c i._ c a a a � u CL cu a o n ce ¢ Q ca cw a s ca a o o. o Q ¢� a r� ct O LL LL c E •` -O Vb r/M " . '", °°, a a a Tti "CS ¢ a ¢ ¢ $ , N a F 4'x. Gt. CL SS v C aj m u_ �C.p� wp w m m Cci Ai v m "a 'ea v o crp Rd0 M 0fY lag c, 4GY 00 10 00 etitl um: Y e a c C C e pG .. ° .0 J a b0 m a M m m ra m m m m nn m m m,� o ay m +a@ a«a m m na a J c c a +' _ " "a pp 'E E. '', 2 � >` M. m �.' m C,7Ca m m m m m ro � c m m m m m mr m m m m o m 3 o c o_ 7^ LGb u Z z z Z m z vy OO m �vaaaa...aazzaaaaaa m m m-o..a'QaQaaa¢ c c -, u r J LL Cs O m J J Z z Z Z Z Z a a Z Z Z Z Z Z u u u v Z Z x 2 2 x Z Z C7 Ck u u a a LG LC .®p Q Q Q Q Q Q Q Q= S Q Q Q Q Q "O 'O m 2 S x m m 2 2 2 x „', 2 a a a L 2 2 m m m m=_ CL. Cy„ w 51d Cy, CL m ai F F 0 O ut > U o l7 0 wS co QELm > :7• c', c >' > Vk } ALa. 47r�„ x-a r•tl r-I r•i ei .-I rl e-1 N N dW N 1'etl ~ P W N N '.... N N m m l!1 lfl b:f'll b1'N ti6% 4f5 '.... W W ',' c. a c ay m 'C A: � a a C c A, w A.wa Lu E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E E m m m m m m m m m m m m m m m m m m m mw m m m m m m m m m m i0 m m m m m m m Id'. m m m m m m � u 2 2 ` J w U J J J J J Y El N In M n In O ry M m N W O W O o Vl m m n n IA W o O .-I M In N o m m n o In c n v n .� W .-I O '..... ,� O o In In N In W o O o L11 m m o M o L!1 o Ifl W n o O o O In n m N m m w N n m W N n W N m m O m V � O v m m n In m M N M W m M m m W O oo ID M N M W V m W W m O w oo M V m W W N m N m W W Vl N n o o .-i c-I O N O .--I O O O O N oo m N N N V N W n m m N V M m N N V m o m N m V o to M N w w In o W V '.. W Vt• VT V} VI IMpY. I'WMb uN V}r 1^ M1J'f WT ',. Vri. V} V)'., VF V/ Lf V} V} V) Lf.'A Vl- V} In VT VT 'A.'n 'A 'A VY V). VT V).'Vf 'VT 'n Vl VY Vl 'A VI VA V} Vk yn VT.... O o O n 0 u'1 '.. to O O V oo o m o o 0 O m n m n m 0 0 0 N m o 0 o 0 o 0 o O o Vl o 0 O 0 O 0 o 0 o 0 0 0 a 0 o 0 o O o m o a Ln m O o0 m m m N m u1 W .-I n M V o0 W c-I N a O O ,{ In In W Vl m O Vl N .-1 N e-I O O In N n .--i M O O O N W O vl O O O In o O m m n n .-i W In to In o O n� 0 O O N O O In xi m O O N e-I O N O .--I O O O O N n N c-I O N N M M lfl N n m �••I o N In N In n to Ifl r-1 N N n c X, m .--I rl O e-I N O c-I Ln ''. `-I '-I W e-I In N M O N O N n N N M n Vf ''... V} V} V} N V} Vl VI V}..,ih cob. i iA V) V! V} i/T VT.''... VT V} Vl V? V1.... tYi. xn Vl V} Ut V1....1A• Vk Vf Vl VY VT N VT VT Vf Vl VI.VY V1 Vl.. VI 'A V), V%,'n V}� H w W F w vri F r w> u In In u z F- p w Z w Z ut ut u v>i u W F- � °• u u u u 0 a u e_ U a U a u a w z w z> z In m J > z ui r r V1 r N Qm ILm cT d W ❑ N LL u N u V u m> u 2 d N',v V1 N > V1 = > a J O J w C' O w d' o J w O w V1 Q Q m V1 W LL e-1 N m >j m LL m J C m m u> J 1.1 0_ In U J ��--JJ V 2 2 3 N m 'i m to J m M J Q Q J x S❑ VI V1 W J Vl W J VI J V1 W J V) W J 'A J VI J V) W J Vl J D- n C [L U�� 2 [l 2 [L Q 0 Q 0 Q tY Q e'i Q N Q N Q M Q m m CC ❑❑» � O -% J% cc C �L. m m Z z>> d O_ lY m K N VI N N N VI ul N VI m m m m -" H H H I- 200000 > 2 ,, a a a 3 ❑❑ 3 >i a s o_ o. H H H I- H H H F- 2 > > > Z r z Ii en v9 In z z — — z z vI ut v9 In In ✓t ut an vi an vi ❑ ❑ ❑ ❑ In In In m In In In In L U U V - V1 U V1 U A U Vl U V) U ' V A VI U U ' V Vl U VI '.. U U V ' '.0 Vl U V1 u Vf u VI U VI U V1 U U ''. U U V V U U U U U U V U U V U u U V U U V U V V U T m � r L IC O a) 'a) m E d I L 3 v c d 2 w In v v `n m M Y v maj v W m c c mo Q Q > — c v w E 3 w �� m m m o _ m u w E a0.' w z = w _O V > > N N II oo m fQ o Cl - - U ;; j` In a aZi w ,.-. m m > .-I In O Q Q V II V oo ^ J ai m U a. n C v > w v E aw+ E aw+ o V o V d p m U m U w m s Q oii O ❑ ❑^ cLLc C cc G 2 m E V p O an d C > v j M v ?? n u w w a) 1 N oo It W m Vr 00 Q u 7 D_ 2 u m m >> > j j_ O_ u w Vf 'i N w V -m m I^ ` a "" m O C O c- O w w �' G m ',: V V -6 A ob ^ �i x>> m N II � > Q x w H u W❑❑ � w-- m m❑❑ U U Z Q m O N O �' ri V N U u U a) U •i aJ U •` Y C d d U V II V �h A - m = p p C V w V w > C 0 ). c 'O C Y u u w 3 3> In In > w In w w LL 3 E lwJ S u w= v N❑❑ In In w w w w c m h>>>> v U a V U a u >.. L o_ Q o_ Q a Q �_ o_ u w u w p a0.' � E c p m p_ aw+ p m m m M m w w .- - O w w r w tl •- LL W n M w m 3 N 2 0 N v VI v W N a m m O_ Vf Vf U) > a, 3 O. O O d m u n - m u U a m u •- a tml O a w vwi vwi li li m C -O -6 W w vi -O a) N C O C o "O j j X O C X J C` w U II V II V II V A O w O O O Y u m Y U [L O J w 2' O J w K J C C-D c c m U 2 U m LL w a a) m c LL L LL L 3 m O m d d w w N w w N w vwi uwi vwi a vwi n... m j U a a w w c c w w w w 'o u o u ''' •3 v 3 v m c m m o y u- m y w m In y 3 v 3 c v c v Y >• `„ y N_ v a ^ a o Cla `m n. v Cl `w a.. w C a. v C a `w C a w C `w C C E O O �''., Z• w y C m C m C C U +w-' O m O U w In J p V N N>> U w U w YyUI C w C w C w w w w w w w T In >° In E E m N Y Y U 0 0 E E o E a 0❑ a m Z m z F z u C❑ w w In o J w V1 a p N I^ m m m m m m m m Vf Vl v Q¢ v C w .mow' C w❑>>> w X X X x X 3>>> X X X X c Q❑ Y u o Y u 0 Y U Y U U 0 U 0 O U O w w w l c c a a a a c w v w w w o 0 J Q Q m m 0 m o m m m m m a V > U > U > U m V N J 7 m m w J m O O `u O `u O 3 O 3 O 3 O 3 N J N J U U m 2 m S o E J W J W J W J W J W J W J W J W W ❑ m ❑ z Z Z - - `w _ `w_ _ t r m Ito t m y In <n va)i m} 2 u ._ .cc- .c- w w w w n 3 n v w v w w>> n n n 7 v n O v 7 n n v 7 Q H Q H ¢¢ v y v v v O J C> >< cm G C Z Z z z>> of to N N V1 Vf VI Vf Vl Vf Vf V1 2 S �. H H A- H H H E E E'E E E E E E E E E E E E E E E E E E E E E E E E'E E E E'E E E E E E E E E E E E E E E E m E m E m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m 3 3 > > y > > >.........� Y Y y > > y y Y L 4,,f�I�......� tf f > > > > > > > > > > > It M d' ti O Z W E L 0) El n ,-1 o O m In O o 0 0 m 0 o V. m 'n 0 0 0 0 M lD In m ti m v m .-1 m o In m o 0 0 0 0 o m m o m A m o o 0 0 0 0 m m N o A O to N m rn lD O Ct -i m .-1 ' N' In 1p O N n N N '.., m 'I w M N O M" o O O O Up 'i ri V7 m n ld In In V1 N N O In n M M m In O N'r m V m N lD Gn �-- t 1 O m c-1 n n c-1 r-I ID n n m M lD 10 m 0 0 0 N d' M M m a N O a V m OR .--I m m 1p N w ri m a -I w v m lD N c-I O m m V Ln ci m to V N n V n N m n M c-1 n o m w m N n LD In o M M lD it 0 o 0. V V t ''... m N en M m lD O f-1 to In N m V IS T V m ci m lD W m lD O .--I l!1 M T O V V r-I '-I 1p p V '-I In N m wV '... m .-1 m N N N M .y N N c c-I In N N H c-I .. V?'.aA VT Vs VS r,/M rt.AT to +Wti li^ V? A^ 5V'B. xFp 'A vaA of L} V} V1 IA,Ul,,N V} in V? in. V} Vf V} VT ih LT V} a/f V} V} V} V}i.. VT4/f N Vf 4/T lYW LF tld"b i ono 0 0 0 0 0 0 o n o In In o 0 0'0''0 o n o o n o on n n o 0 0 0'0 0 0 0 0 0 0 0 0 0 n o 0 0 o N o 0 0 0 0 0 0 0 0 O n n 0 0 0 0 O In N O O N O p n n N W'1 O Vl M O O O O O O In vl O 9c, O0 0 m m O O m V7 O O O O n t';..4 O W M N O VI O O N e-I to uj lD m in m m l0 n 0 N N 0 0 0 O O O N N O Vl M O OO mmOlDn0O 111 c-I •• N M O to M V7 V1 In •-I T N n O N N lD m 0 m Vl m O n O 0 o O N lD lD In n V o lf) lf) O .-I N V 1n W N nn O m N n m .ti n Vl M O m lD V lD 4p '-1 O OV N T LD mrl lD m m N lfl fYl n V e-I M N c-I N N f+"Y c-I m N '-I N l0 * N '-I , c-1 N ���I©�©i©����I©�eeeeeeeeeeeeeeieieieieeeieeeeeieieeeee� > u a xx xxrF ^In>> zz❑❑ > >o g > _ _ I? 1n N> 5 x U x x a a= Q Q r1 m K.A m w w w w v~i 1n vi .� .ti l7 in a Z e•-I H Q a a Q ❑ } In U nn ,,>.� e > Q Q z 4„9 vi 2 = _ = 2 x z ti �°° 5 ti ti ut In l7 E _ m > r e s m n .m 0 E� z a m Ln z D m n z a u iy u mcr zz❑ozz❑0 LLmd a U w ac ¢ ut z ,', z z Z Z O o: K vro H F- H H lL w w txp > a s p• C1 O �.7,. O O O 0 0 s¢ tx �� av ti a w� c �''� �,�''� y a o 47 0 0 o O p rci r �,� » 0 o O lh In In v w an.. a• a Q a a a a s> Q yr wn Q In In Q Q v+ 1n Q a a¢ Q'.. a Q a a a x x>>: ^tea >>>> :� 6— q•-- F- H H H H H an ar, z z va r z z 1n ut z z a H H r- r;' H H H N H¢ IF v, .r'ro z uuuu�"�uuuuuuuua:uuuuuuuuuuuuu11 ucuruuuuu0000tu�® I v o p. n- rr cIo m w a O Z. w u v E o u a a,, o U o U tiD x O to 7 C% U1 w i x ` O x S1d5 c - LL w w -0v o¢ O' o v o E E E Ct »: u a v E E a K 5 u u > "K7 m ^CJ' Cfi, .-,.. COe, „� ',`"' is m✓ u>I v01i in w v wu a E u u a y m w m O O E x w-c ctr LL c C q1 2 > v v E v awi z EE aka LL LL am+ a s m,. >> E ca, v v E u c n cwi cwi Q Q O O m m v'm m ._ ? ,c c E. c o o o O A 1n w rt 0 m u 't 2 in in W. j= pcy en dI U imu N m d m u w w Ul w L"7 n n w o° as o o LL,� a a c c c c ,w+ Le c m m 3 i9 71 a CO CD M M ,Y ? ccm ,, 'ql Qom,° Q m m m o v 1C ` 7 u ,2 2 �wY, L L " Eb 0 C2ai Cc c cc c >> CL0, >>u❑w 0o0L 'L0L0 E E EIE EI'E'E E E I E E I E E E I E m m a v v w v v v v v v v Coalcx yr ��N a. m c w t' O m o 0 m ma 0, [�y ❑ . 1, 03 u � c � O .-1 N x u u � u , 1, 'w^ c 0 0 C LO c 2 2 O IV 0 v v zx o o ` w a LL in 'rn x x ar �� > 73 c c o 'c c r' , n � u `m 3 Y c E a. � o. N ,y 02 o o>> o lL L SAID w c c ''. O/ ~ r iW Wf A� U U m fill U U of vr+fit. > ❑ ❑ N Uul 4,. u u .-1 Ol OiM qd U7'', 64 v) VI 't 't H H w w u w7 arra v c>> 0 un '" ,� o_ o_ m H F c m m m m °1 O D O O v to vta c m c c� c c� 00 vai V CL C. Q¢ .E v E m .s m m .es' ar v � V 2 2 VI v v v 2 aE o_ ti o 0 0 0 6 Z C C C c c U U U U U m m m m c C U U U U 7 Y Y Vb' vm N ri �� 1n in in "� m m 3 a a a a m c d111 N `1 W O/ `l ;Cl u ,W m m rd rg vl in N tea cnW iW:� 9A1 O',. o O > u u LL1I u y. 0 y a 0 0 0 0 r t t r c° �n p o c c c c x °� 'j o 0 0 o v �a c1, 'cam ,.c .:c w ,: v 3 ar a� ww m v v v 70 0 O 0.0 0, O O O m z an F-- 4•- k-• M, arr• m '..... m u u c r.. vl v� v4 w� @11 v� v� v� w� ami 11 W, ami E E E E'EIE E E E E E E E E E El E, E m m m m m m m m m. m m m a m v v v v m v a v a v a v v m J J J 7 3 J 3 J 3 J 3 J 7 J y El Lrf O.. O.. O O O O vl ., LnwN N al '.. V1 to l+l W e-I N - N s-I V - O N '-I lD ci �i I O O w . -1 R O W N .--i l0 M a0 O vl o - M - O CD N M lD wV n n N T Ln c-I r� n mN N O n n r� O N O O lD Ln �--1 ml -1 N O O 3 �--. . . t\ N Vl O 00 lD tD N N lfl m lD wm l O N w w lD m r� M w w N '-I w O w wN w O e-I O O w wm. w to r\ tD c; O M w V W m m c-I o0 0o m m wkD V C o w V .� r� n o vl m O r\ r� ww o m n r\ w wo m N In m m wm lD m m O wV wV wW N U+ N N ''... Zr V :Ic [O c-I o0 n N N al M al c N N N N m wNJ" N rl e-I N w w V to m V n W lD n T N m wO rl m O e-I e-I N V c-I N rl e-I N V H M �--I . V lD N a �4 I' -I 4 r-Z' re N V V e-I rig e4 vl ux ira to .n vl an vl .n vl .n .n, .n +n vl �n In.. +n in .n 't/} V1 in- N to, N N N t/1: In In lf) V} v1 lf1 I VT o o o o O O O O O a lD lD lD O O O O V tD O O V 1D O O O O V V V 0 0 0 lD OI M lD In O1 t0 O D1 M m V D1 m O 0 0 0 O O o 0 0 0 00 .ti .-I o O O o V1 m .ti o o m l0 0 0 0 o Rl M m o 0 0 0 00 n W 0 01 N tD o0 lD lD Rl o't 00 o O O O O O O Vl m O Ol O O m m V1 n T Ol l!) � T r4 m O N Vl m m m �/) o O V lD 00 m M o0 V m .-I In n m lD f\ n 00 Ln O o to O O N N N r` n c-I r` n N 2 0 :. 00 N n n oo Ol N O M n 10 O M N O O M r\ H L N O 00 m M m N m ID n N Rl V N N N N Ln r �--I o V al Dl m m''... '-I O N M M lf1 N '-I O T M Ln r m l0 c O m ul -t C 00 00 lD r n r� w lD �"� rV c �--� rl H m a ''.... -i' N c-I e4 '.. M a '... N M �--I e-1 ''... 1� M VI '-I i--I -zf I-z M t/1 V1 Ln rV H H e-I aAb SA} iA in iA VT V} ./1 Vf V/ VL....., iA 1A ./l Vl ./} lA Vl V} 'A lf? V?':. A In V} Vf .A .A i/? -LA '..../l N N, N to M'i Vf...n .A .A N N ih 1n N N 7n, In N cF-1 eF-I F F F F F F F F F �'�— F �.,� LL LL LL LL LL LLLL LL LL LL LL LL LL �-1 X X �"� "'� �--I ei N e-I ei rl si rl '-1 ci ci ci ei e-I ti c-I e-I 'i e-1 rl F F rZ D_ d <Z LL LL d d m d Jl u u u u i v J r z a a Jl s s a'a n o r 2 d (L LA z s a'd 1,c[ o a a,cL cL i a z a,a a s¢ d a U U u u u U • H N N N N N N e-I :. H e-1 rl vi r N N N N N N rl �'-� �'-� �: N N N N H r H r N N N N X X X X X X X N N N N N N N N N N N N M m m m m m M M M M T M N N N N N N N rfl M M M m M m m M N c-1 N .�1 N N N .-1 N ti N 'i N N N H N N �--� N H- N .-i N N N N H N ti N z) ❑ z)❑ 7 O ❑ ❑ ❑ ❑ ❑ 7 7 ❑ ❑ ❑ ❑ ❑ ❑ ❑ 7 7 ❑ ❑ 7 O 7 y❑ 7 ❑ `i N 7 7 7'❑ ❑ 7 7 7 ❑ ❑ 7 7 ❑ z z z z z z z ' o_ a. a a a a n. a a. n. n. D_ o_ a D. n. n o_ : a o_ a o_ o_ a ¢ � o_ o_ a o_ o_ D. o_ n. C. o_.. U U V u U u u U u I i u 0 01 0 of o 0 0 o To m......... m m io m......... m m'.. Y C C �"� N C C rI N C C �--� N C C rl N .--I N •--� N .--I N u U O O V U O O u V O O U U O O U U U u U U U V � VI Vl f0 fo Vl VI to fO "', VI Vl ''., fo f0 Vl Vl '. f0 to N Vl VI VI � Vl VI Vl C C O C C N O O m (p O O m v C C v m i - 3 3-- 3 3 3 3 3 3- 3 3 3 3 3 3 3 3 Q O== o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 .-I N . -� N rl N . N �--� N .--� N .--I N a u u a DL u u a a u u a U U a a u u a a u u a a u U LL u u Y Y C C am+ sm+ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ U m m�� u U U m m�� U U �"� N ❑❑ a a❑❑ a a❑❑ a a❑❑ a a a s :a a a a a a V N U U N C C to V1 C C V1 Vl C C N N C C C C C C C C C C N u u ❑ ❑ u U 7 7 7 7 7 7 7 7 7 7 7 N N 7 7 v v a a W v a a m v a a v v �n vl a s v v a a v a a a a s a s v❑ ❑'....� ❑❑ v v 3 3 v v 3 3 v v 3 3 v v 0 0 .� N v v 0 3..v v 0 0 v v 0 0 v v 0 0 m Z) m o_ n a s o: a a, a s z s z rr z s o o o o o o o o u u o 0 0 0 0 0 0 0 a \\Ia a L\.\o_ D. �\\a a ❑ ❑\.\LL a\..\a o_\\D_ LL\.\..o_ rz 0c u u c c u u n Z Z n Z' n v>> Z m m Z Z m m m m m m m m m v v m m m m `w `w m m m m `v v m m m m v v m m m m, m m m m m m m m m m m m m m m m vl v v c c c c 3 3 E E E E 3 3 E C c cO o o Na >Ns DN` aN oOO_ oOo_ OaaO aO Oa aNO. oNp_ aO-- -O 0 0O 0anau uU >> > > > > > > > > > > > > > >aN >aN >I.>.>aO_ >aO >Oa >Na N>a >Na >aN >oO` >aO` >aO > >> O O O 0 0 0W O O O O N N W 0 0 W W D mO O O O 0 0 0 W O O O O W 0 W s0OOO O N N N N N N N N 7m m m m m m m m m m m m M M Mm Tm mm mm Tm Tm m Um m Qm Qm Q Q Q OQxN Q Q QQQQQ Q Q Q Q Q Q Q U O 0Cl.O O O O OoCD O OO O O OO O O O O OO O O O O O m m o O O O O O Q Qm Qm Qm QO QO OQ OQ OQ CD U U u u uNN N NN N NNNN MMm M 1' K N N NNN N m M m m m M EEEEEEEEEEE E E E EEEEEEEEmmmmmQmEE E E E E E E mm m m m m m m v v vv m v v vv v v v v v m v a vv v mmm N �� 7 7 Y 7 7 7 7 7 7 7 7 J 7 7 7 7 7 7 7 7 7 7 7 7 N 7l N 7 7 i 7 7 7 7 7 7 Y 7 7 Y a7+ s7+ Y `` ` > > > > > > >.> > > > > > > > > > > >.>> > > >........,> > >...,.? El O O O Vl ul n n M M lD lD N N lD lD O O O M 1� O O m 0 O O N �m-I N lD V1 m m lO n O N N O O O O O V V N N N N .... N V Dl Ol lD lD N .., N Ol N T vl of 00 m m 1, of 'A m r-I oo N r, N N rl V Ln 0o Ill m N M O O O O Ol Ol m m m m lD tD 1, n ri a -I rl c-I O O 1� Ol lD Dl Ln c-I i' m N Dl M r `, Ol m N tD o tD to w Ln oo to rl Ill 00 N In O O O tD V N N N .1 .--I rl .--I m m rl .--I N N N M N 0o ri m s-1 n Ill Ol .--I v V N of fl'1 w m M N rl T ID I� n N O o0 ID T c-I Vl N M l0 V M rl N f+# N N R7 rl N N r1 O u'I - rl N V).,'. V1 VT.., V} 'n Vl V). Vf',,N V) V} V? V} V} VL InmmOoo000om noommo 0oo oInm000000moo nooln nulo00000000 N N N O O O O O In Vl m O O O Vl O n n O O O O O an N O O N O O nn.N Vl O T T 010 00 0 m m M O O O In In w m M m In N n n O O O 1� O O m M LIl O Vl O O N c-I T T l0 Vl In 00 ''., M lD 1, O N N O O O O O M M T lfl Vl In n n m 0o d' V N N rl ' O U' 4Y9 ci *^# N M O Ill M In V7 ll•I c-I M N I� O N N w Ol O m In 0 O I� '.O O O. O ul Ifl T N N N a-1 rl rl c-I m m e-I rl N N M 1N'Y o�CU N Wf,. O tD N ' M c-1 I� In m O tD w V tD tD c -T tD (l O o0 r1 O O 0 d' ro^v�. YAY fYl M n V rl M N rl N N M - '..., m N e-I N tD V IMMSMIMMKOMMMIM xxxoo XX �I a x 2x u, n�,_F-F-zz❑o00 r },o J~�> n m m Z Z w w H V U U U U U U U U U U g 2 2 w w 2 2 2 2 Z~} xxxxxacxxxxxxYYao e ee ¢v o cpzam zam zd Q m .ti N m ti r14 .ti N ti N .�1 ry .ti N t'"° u'° a.dr w s¢ Z '" 'p C Z Z❑ O Z Z❑ O Z 2' �• m a ¢ Q Q Q ecc zz zz zz Ozz��FFF3 >>>> .' 7>>>>� N �........� 47 CV ia�u OO O0 z z z z Z Z Z Z Z Z Z Z¢¢ a o `C ¢ Q¢¢¢¢> Q v J n¢¢ J n Q Q Q¢¢ Q¢¢ Q¢ ' " F H ure iap .°�"' Z arr Z Z In vl Z Z In ~ U U U U u U u �L1 +: h„ i c:,X U U U U U U o U U V r„y 1,y u u U u U V 6 U U U U u 0 0 0 U U U U U u� � ` ' N„y U" ty lJ ❑'❑ ❑❑ 4 ❑❑ A:S. ❑❑ O❑❑❑❑❑ y❑ u U U U....0 V U U Q U U LJ U u U U U U U.0 U U u U U U'L.3 L1 []11,11H W u n Q n 0 ba a aA .�.-�, O. 0 0 r r NA UO N -D t C ae w ` Vl Vl 'hA oY q9 +' C ❑ 2 .Cu .D ,. O 7 N W ❑ 1. ti 'C m U l7 vl c a > su na qj•.> .j U U = - o . Q ❑ 4 a3 raw U ❑... sz D m m m a c x c� n p cz E E o oiS r a) m rt m >> a N N o¢ a o E S E E CL > NU u e v x E ¢ m pK°A.. d. a. 0 '-1 N o ,, o m l7 ¢ C u u 3 a a ro u! .c c ra"ro ; u u m 3} v� , v v '¢Y "I of In U U c-I N U U � i O p . V i W. m � .0 .0 � Y L L qLN oLN L L } � � E � E' o= i +'2 ❑ ❑ ❑ Q a O i V1 m U U "'m p 0Y al � eery OJ � x 2 0l � a5 C y, � C. L L U U s•. s > a iA i1.: a � V � � ❑ ❑ al oP w�^ a U '"� V U m �m al o) U U rl al � aJ 0y m aW C U V In vl �01 0'G° :. d sG a !Y C E N Ol Ol »pgry N of U wCN to tp m` m m v v 7 O m m m n7. -0 Q Q m m m v .. �^°� C C C c u u i C C ..G' C '~..^'','u a 0_ m m m c c v v c m' U V v a ma W U c 0, Q Q O O rn In ' Q Q v E + m mm aKw = x= n n n U c c c E -v 'c 0 o a xs O O N a v ru O O n v c o— N Gl m m J m U 2 0 o c c 3 3 x x z 9 v m' v c a v v o v c c c c a C C `1 a m o) m v a) o '14.1 a dS. m m m m ^L'V C U U U U U u o o N N 0 0 0 0 0 o. °� °� c o D_ v m a> J 7 7 J m a a o 6 c o w a a ¢ w,ro c c c c a s '. a s �;I a ,.i 0 0 0 0 O. U C C j C C C.... C C C M M O O vl wn Y Y m Cam., "w Vl U f0 m >> N Ol ¢ 7 J J 7 C C C C m m m m m U U V 0 0 0 0 0 0' u U o' u u m o w w> v wa v .v v > n m m m m a w w w n n n n c¢ v¢ Q Q¢ V U u U U u o U c.`J amc W E v m C c .> 7o E 2 v 7- U v v v a v v a1Y m a v v! E> u u u a a a a a a o o m 0 7 0 0 0` o 0 0 11, to o o` o 0 0 •.'� 7 J J 7 J N N i% C,e. W Ol y m Cl.. d C U OJC7 p L L .% L L ,. D U d O O O O 0 O O . y E E E v z o 7 a o x c c v K7 CA. O O O. O O O 0 0 m L D O W � m Ol O m X w a) 0 '� C C C C C C C C,, C C C � C o�,p W g w � U � of ua u� u u u u u u u u w S x x .,e �e o_ u❑ w m o_ to ..._ O 0... O O O 0 x o_ In LEIE E EEE EEEE E EEEEIE E E EIEIE'EE E E E E E E E E' EIE E E E E EE E EE E ,,7:, Y 7 7 7 7 7 , ,3 J J j. v J Y J L W El I� m m N m I� O m m ci m a1 Vl W O N v M Vl W ID co m Vl W O N v (Y7 m q N �--� lD r-1 m N m m v M ri OO 7 V m e-I O m m m kD N N Vl w m r- N VA Wm m a-1 ry N n N N .� W In, m 00 .--I o R rl VA', m e-I m lD ti Vl v" I- m N N N LD I166 m OO o w '-I WA"4 01 �--I w w .� Ln vk m m m m .� N v) V m V N m 00 vA m a N m co a --I A o Vl m I, m V *A rl N V m oo w ', IY4 m a N m ct 4 v} N n m m m m M v} N '., O N to m M N m V O I, m V7 L1',.tA N N m O c m V m R o Lq N ''... '-1 V} lD 1, V �--� o V1 N of w n a� H o m N vA w m In m w rl L1. w W I, N ''.. o '... n 'n eel m V Vl al Do 'n w, rn r, N �D n u} m Vl m r Oo in m m m w oo Ln vA Vl m m m N m 'JA,. m m m m ti M, vA Vl m m m r M m .-I o- m N m m m m N w m m w co V1 w m m w 0o Vl I, m V1 m n 00 n m m N m I- vT ''... w m m m .! a1 un O V m o oo c-1 v)• m m co a--1 v N of m 7 1- o N O 0 0 0 oIo 0 0 0'0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0lo m m o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o m m o 0 0 0 0 0 0 0 0 kD ui o ui M o M o o w o o M o M M o w M M o o vi m M M o o o 0 0 0 0 0 0 0 o M m vi M 0 to 0 c 0 V1 0 o 0 VA o lD Ln 1� r, m m� lD lD w N w N Ln m m N W N Ln oa m� N N Io I� n m rQ V m I� N a n m v Zr m V m e m n m o m o m m m m m m m m O o o o 0 VA 0 VA 0 V1 0 N 0 O 0 O 0 o 0 o o VA m m m O n V ry W I, O M m Vl m e M '-I e-I '... N N N N tD N L, o w N '.. m w N Im e-I c-I I� m a V m M Vl m N '-I Vl N Vl N 00 e-1 � 1l a 00 V m m w M M m N '.. T lD lD 01 n a1 N N O '... 1^ iR v1 v} of 'v} V} 'm 'V0 v) 1.+' v1 to VA VT •iJ"M IJ",w ''+Jk V} of VA '4Th 'V"A v1 MlA V} v} '9Xh V} v} 14 V) N in qft %A Vl'�v5� to Id!M 1% vT''... u* v} VAS In V} l.L LL LL w LL IJ.I LL V1 LL CL w w ^ LL LL¢ LL u LL LL LL LL LL LL LL LL LL D- ❑ � Q LL LL w u O LL O OO O 00 X W W O VI O d X LL w LL ut LL a w w w V) LL a LL W LL VI LL a LL w w 'n LL W O LL V7 o LL a> W V Vl Z �y,� CL O ; LL LL LL w LL > LL w LL N e-I m rl m N W O Vl O V¢ u� u m ui in ut ut ut ut ut ut '., O O x O O X O vA O uA x In O O iD x w a[ w w a aQ 'n LL m a❑ > u ut ❑¢ "� U > ry J N a u O a LL s w s w s w u U U V V u u u U u '.� 3 m U m U m U H LL H LL F LL vWi v�i U U U U F= Y r 2 Q ''a. w (7 r¢ = x m❑ x x x x a x >'> >" X a "' Z _ H H H>> N N S N S N S N S p p p p p p❑ p ...... ❑ X VA X V1 x VI u_ u C u_ O V1 O V7 VA VA '.. V1 N Ul N N N VI N VA N Vl N N N Z m Z m Z V1 W V1 W X VA W X V1 W VA W X W �% Li J 2 F- w_ —❑ 0 U U 7❑>> C7 S Z O z O Z O Z O Z>>>>>>>>>>>>>>>> O {n ❑ �.� ❑ ❑ >> p p >. ❑ ❑ ❑ LQ ❑ Z ❑ Z ❑ Z ❑ C ❑ C ❑ C ❑ p.❑ >>>>. ❑ ❑ ❑ Z 0 Z 0 Z 0 Z Z 0 Z 0 ¢ Q g ¢ Z Z 0 Z Z Z Z Z O Z Z Z g a g Q g>> ¢ ❑ p u u U u u w w w w w w W W W W W W W W W W W W W W u u '... u U u V '... U H E-- A- u U l.J u C.1 l..l U U u U U W E ° c o C W N m p• Caj m O O w L-' L L L O O O E >,>> E .''. m y N Ol a) io m m m m m c v C a a. N a,. m a m a �'� cl al c a E c, o cu E O C w a o ° v E m v v v i- ar ` E c m E c o c m` o w Y in m Y a c c cc m o 0 o E `1 O_ C O'a OO _ C OD ._ C O C d O C o w C m _w a f` C m C W w , a O C O X "' VA N Z lxn Z E -�. '� f` G m t"' Y '-I N ., �--I Ol N Ol ° C U' u U W C L, vl C al E C ' vmi w Vxi w N Oa. m a H F- H C •_ > v O O w a c x o 0 w a a O O>>> ,`0, m `o °1 E m m ar v c c c O O w D 0 $= ._ m o o m m m a w e `v c ° ,� al o r°pa m m m m a ❑� C - ai .. m .. N ul Vl In VI LQ VI o 0 0>>> Y a O O X W>> 6 m C m C m C E u C ccm G N cM C E m >> O>Ql w c C c C c C as m oa m O mc W O C OUJ m c' OO m c OO m c >> a a > a" m >? m m Y V m Y U t`p U m ' o 0 o V m ccm C ccm G ccm G of Ol = Z v m O m> C > u o J v y 3 H c am-i N C C p% q, ^• ++m�^ cmm m O o o O O O vl u1 Ln m to m X �l �l �l � y y >> O/ m O m° U L i` C � N C E O t+ v O U O m Ol c C J o R O na •c xo C G L L L L L L V LL V LL V LL > > > .D J to O m 7 m a a N y VI m% a O¢ U C U a U ea N u > > t a m E o v v Y a U Q a U Q > ea j oa Q a�i >o a�i o o 0 0 °°° Y Y +� m m m ar o0 m w 00 m N N 0 o u c 0 u c o u E O E v c m c C v v V y C - m u 'C o u u a 'C ,L. o- N m^ ,L ,L E E m L Q ea m C e o E m u C m u C m u C c O c O lO c - E u° c ai E u aA u a u m c ao c 00 c 0o a a a N a x N a x N a x C m C m C m E E m -- -- m y u m a- u Q w u L u ¢ m u x ° 3 3 E v Y m _' -a v t u m L u m L u-- w u u o a V aJ O e t s y o y v v v >>> w oo w m w eo a d v a a e e y i m a o- > v~ u L m v `l v v v Q H F- F- Y Y v> do r in in Iny ❑❑❑ v aci y c c e>>> O O - Y>> S 2 m D_ y e m v U u> o u u u v E m C m v v` c c O m N m VA u VA 0$ °j m y `m v c c o Y o Y o 00 A. 00 U m rm+ 7- i `` �m a ¢ m 3 m 3 m-- 3 v v o m m m c m c a .° c m c m L a r a t a❑ u u ❑ u a 3 3 3 0 U 0 u o u t a r a L a L'.t a a a m s m �` m m t v a> m > x w m v c m c 3 m>>> 3 3 al a+ K a+ VI +' U a+ U > U > U > V1 > Ul > Vl > ❑❑❑ VA ',. VA V N C m C m C - -- - - VA > Vf > Vl > VI > Vl > LL > LL > LL > LL > a > 2 V ¢ m m m ❑ C L CL C C C OO...-i U > L .. _v U U U U U m m m m ''., m m C C C C C C m `l m d m v m d m v m v m d m `l m N jy `1 m `/ m 11 m `l m �1 m `1 m `! m v m N m L! m `! m v m `l m ❑ ❑ ❑ `1 m N m m m m m m m 3 m 3 3 m 3 3 3 3 3 3 -- -- 3 3 3 3 3 3 3 3 3 E 3 3 3 3 3 3 3 3 3 H c 3 3 3 3 K K u 3 3 u 0 u 0 0 w'O o m m o00 m o f a a a VA o Vo VA Vo Vo > > > > > > > > > X X X I` f` > > > > > > > > > > > > > > > > > > U > > > > O O ❑ > > m N m m m m m m m m m m m f`0 m Z M Z N Z m G1 m Ul f`0 m W m Gl m Gl Fa m Ol m '' Ol m U1 m m Ol m N m Gl m Gl !` m Ol m U) m U/ m U1 Fa m m W m UJ m Ol Fa a/ m N m N m N m m v v v v v v v v v v v v v v v v v v a v v O/ v v v v aJ v v v v m v v v v v a/ v v v v v v v v v v v v v v ll 4L1 lL ll laL Ll LL LLl 11 Ll ". ll LLOJ. 111 LL 3 3 3 3 LL 111 111 ll) 111 - t11 - w 111 - 111 lal LL - - - - LL LL 11 111 - LL - VA - VA - VA lLl Vl 111 U) VA '.. V1 VI p VI p Vl p>>> c3 G cc3 C >'',> ",.� > VI p0 UA VA Ut Ul VI Vl Vf p VA p Ul 7 VA p ut p VA p Ul", p,',.p ul V7 plp VA VI p VA p UI O VI N VI M m m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 3 > > > > > > > > > > > > > Rt. > > > > > > > > > > > > >'> > > > > > > > > > > > > > > > > > > > > > El M ''. N O1 M m o C O o DA N N Ln w O N fT Vl O M O .--1 V c-1 n 01 N M f70 O Ln I� C m l!1n e-I D1 N m W w O O D1 00 m r I� Ln o O N N O 11 fT O1 Ol O Vl N ID O .--1 I� oA N M tb L-I M fD tD n 1� Ln '-I e-I M O r,[LztO e-w m. c-1 N c'I Ln Ln tD w H N O N n m LD T m mti T W m T w O D1 N -,- t\ n O tla M m V m ei N .--I ei Ln n O w M m V O lD N M n M m lD m O ', I,T N N f\ V LD lD a Vl D1 O W n O IXa m m V V Ln d� Ln Ln I, m tl1 n m lflm ONN '.. o c t>D ID lD LD L-D �-1 N lD e-I n tD V M In Lda aA LD m M W lD O c-I LD lD O v N Ln mlD v m n r � '., n do ri In e-Im Inmal NfV N c O N N 1p N N N N N N N Lp c-1 n rl ci m 01 N N '-I m H .--I ll � o V V Ln Lp V V Ln dV V a m T m a -I t•1 c-1 c-i '-I 7 '-1 H m Ln Ln M' cn N V' V) 'Al V) V} V} Vf 1^ VT In VT Va Vf VA V} VT V} V} Vf V} VT', V} lf? V} V} In V} Vf if 'VT L} VA Vf V} V} VT V? iA VT VT m,o 0 0 0 0 0 o,,m 0 o o 0 o o 0 00 0 0 0 0 o op 0 o 0 0 0 0'0 0 0 o o 0 0 o'o 0 o o o o o o O o O o o olo 0 0 0 olo 0 0'..0 0 o 0.0 0 0 0 0 0 0 0 0 0''.,0 0 0 0 o 0 0 0 0 0 0 o'o 0 0 0 0 a, N LD In ,,,o w N w w 0 0 Lo N w w-- Ln 0 m m n m m o o O N ri V o Ln m n w m m 7 o W Lao m o o O m m .-I m w o Ln o V Ln I� w M m - o Ln m I� m m o o o .-i 0 O o O m m o O o N m m O N o N LD O f70 Ld <D w LD w LD N N t0 LD w t>D tq to LD n M Ln N c LD n T � LT Ln c-I LD e-I '', I� ri ' m M V LD I� M n c-I Ln O L!1 '... L!1 N o V N N N N O N N l0 N N N N N N N Lo r-I m '-I e-I M O M m '.. '-I M e4 e-I m V rti V Ln n V Kt Ln m V V� m m c-I M ei H e-1 m H c-I N Ln Ln '... m o M m 7' N VT V) V} V? V1 V1.. V1 V} VL rwaa VS Vf VF V? V} VL tiAF iJ'w VA 4d%VA AA'a 'k+7 'Vb VT V} Lr'S.. V1 VA ,'gip Va V} VT VT VT LL d LL C X x ,,..... LL LL LL LL LL LL LL W O LL V1 O LL Il x LL LL w ''. Ln LL w W W Ji ai LL lil LL va LL LL LL LL w W LL LL. 1 X LY LY LL LL LL w vi Ly LL LL W O LL V1 O LL d x W Ln 1.1 a LL W W Ln LL a LL 0 LL 0 LL LL Li LL W O LL O LL x LL 0 0 X O O x 0 0 0 0 x 0 0 LL X Lil O Ln a O X 0 x O O x O O x H LL F LL F LL O x O O x x Ln ''', LL U ❑❑ 2� � O❑ � ¢ Q ¢ ❑ ❑ ❑ Li a vi va Ln O Ln p Ln O Ln Lz H H H Z z z z 3 U Ln v Ln v Ln v I~1 LL L~L 7 Q 7 ¢ 7 ¢ Ln Ln Ln Z L.fl Z Ln z Ln c C Ln C G Ln C C p Ln x Ln O❑❑ g O Ln ',. c> a C V1 v V1 a vl.Ln a v v a M V1 Vl v V1,V1 v''v V1 v v N N a Vf v v V1 N v L/1 v N a.,a to V1 a v Ln Vf v VI v..v VI'V7 a V1 LL ❑ LL''LL ❑ ❑ v v In vl a In v N a vl v V1 U N U U 3 N 3 V1 3 V1 Ln U v, U Ln U L~i N ''� to Ln .� U LA .� U .� U o > > > > > > > > > > > > > V) > 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 W W W W W W W W W W' W W' W W W '. W W W W W W W W W W C N E o c `c w cCL Y m d C c Ca i ' o c Cu cx uati i� Lai; as a4, Laci v am >. o o c O O w Lu Cu a c 01 E 415 v m E c ra m m ' c v c .. m o c o QY E o c o c ° v m ,,,, v m cu ww ri, > ar E c° Raja) a � aY E c p O X w w y a E � E c v E c `c w a w c ._ LL' in c m ma 7 7 7 v m > E c o o ° �» .... c ar - o c 0 o c° o f c o o c C ; ._ e w c O X p Xi ° E c c c W o u o u O u w x w e a LL as m m p:. "�' p a z O. C p O C u' w a C w v a o O C m E X w W c_ Y ¢a. Cb O X4mN w W O O O -- a,'ry c o m o. x " u w c QY .�-' n Ln '>° ax c w m m aJ m ar 2 w m c c .m. n, c x ti Y '- c w c m v a c o as e �' m X, a «wn +7 «w' w,r w✓A >> uA c W c v a .�.' ,,, v� 3 m 3 m 3 a p c P1 C j� p.. O O O O c c x O w 'p' O X in ° p p LL Fyn. >, as G' m m C C C y Ll > > > O a(7 E C O' O W Y m m❑ LLl 11'1, O. p' C X O W W QY d WV Ub n. id'9 ^�y� Y Y Y N9 C IC4 C 'C9.. O C O X W .. iL� SU 9J' 7i C Q! a) aJ tA ..r ��Ll@I ,. Sd Lkb "C _ """"', WP aa(a kWb �'' do C O rc4a dRA ^P g 'C+ Y YY•• U U f` U 1` f0 H f` F f` !m rC m _ Rma C:T O AYa b4 Na O X W aL+ Y ward aL'• �. al n- 4N Y/1 Y M Y m _ m m m p' a a' a ❑ a a! m � � .%3 m n0 �sa' �(A da m a! 1a 41tl fb C' C'"� O X '.. W C m Y U Y U Y U � � '. a+ s+ � +' ++ m +' �+ m '.. � � O C G m o 0 0 0>>> c c c o o Lwy u +'S ra u Q O M O ca. O O o O O as sa 3 3 3 u E E LL Llm LL >> y y c c VY WF In `p L .C' C Z Z Z F' LL LL LL C C C '+ 3 3 3 L. L., Cam. ice, G G C nb C C Na tiMa kW mSa fa %a m b15 m bG Ya t7oa QYA Aada QA w O N S] al Ain - Ln - N 7.. Y +' f0 Y a al m a m 1a 1a fa O C7 Z Z Z U U .A CK� m� da Ra tl! CVa C O C m m m C m C m C m m tl C C m t9 m C m 1CL C C — 7 .&] Jl 7 7 m m m +ii C m LL LL dp LL U U U E E E U __ d'yX $0 H? ':A+ 9d O❑❑ qy G G Ta m m G Vl N N O q L 3 L L 3 U C1, O Ga 'Ck' fa m m >>> m O O O m am" m L m L m' L +-' cooO' rC B'^^" B®' Q ¢ Q Q C C 2i am.' am-' m LL ro Ci. �i A. ,,L 65. , O ad T dll aJ' 'aM m ad N m al m Sad aY m w 'gip dad' �! N G QY Qa w W�iY ''SW Stb QI fU Qa a! al C4' �! V al V al y C Lla � ¢N �' AfY � al' �' m al Qd a) Cad pY 4p Abd qA ' ZZ V1 VI CI t G Q Rpy '.. .c, ]a E1 .a; ...c 4'.1, is L 90. L r ,c CA.. R. aa. .c C1 .c Rh. w ,c di qY .c. 'a'. 46+ ,c LA SkP b1M ,rc', .c a1, C]. aY .c Ci aY t 4 a) t G?. V ;c a8.. ad. as ac' = CR O. ad = t:t w .c. O, Ia = L"$ V 3 aY 3 W 3 al dU $ ..c .c CS iL. pY' ..c A"S. w aJ Ca. daY .c @. as :c' R iiJ .c i%. �' ,c l:L. QA .c ❑i, FLY ..c C4,. aM >Lw CIL. c QY c Qa c al QA .c q! : ': O, 7 O a 7 O a 7 O .c > a ' y ° a a 9 > :, a a " " M kaA > q.+a try .Ara r:nn A.+a +w+v LA qg U U U Ly,. m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m '', 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 m 3 m 3 m 3 m 3 v�-Fu m��-�6 mam m m m mm m �al mm 2N 2m mm mm E � U a D m a a a o a a a a D a qm aam '.. u m LL aY , LLLL m LL LL , LL m LL m- LL'. as w m m LL LL LL m Lm LL ar w w LL li - ', waa m LL. LL m LL Lw m'- LL'. LL - 01 LL -- v LL LL' LL as LL w LL LL LL m LL aY LL LL m LL aY LL LL aL w ar �� LL'. -- a' LL'I 1 N m N Va Va Va M N +}k. A/A V1 to N Ln Va M V1 m Va Va V1 Vd LFB N V1 N M rn V1 Va N Va m Va Va vi LA N N Va Ln !n V1 T Lnt:DZ:) Li '. 7 7 7 7 7 7 7 '''.. 7 7 7 '❑ 7 j 7 7 7 7 7 7 7 7 7 7 7 .'7 7 7 7 7 7 7 7 7 7amdaYvmmao m m m m m m m m mm m m m m m m m m 3 3 3 3»> >'>> > > » > > > > > > >,,> » >,> > » >> >> > > > > >,> >> >> > >> > > > > El rl N r-I m M C)N Ln W ID O N N In �'-� O m m O N V1 '-1 M M m m M. 0... r� 0m �'-� n m N d' 1- N m al Ill W W N Ol Lq w V1 N .--I O I� 0 c1 � w r�N W m V N fA LA N N m m m' I .--I Ln lD N ti 7 m LA rl N Vl lfl O V m Ll w M M to M O lD M w M c-1 ci Ill w m m w M r�w M '., w r� w O w N m� N c-1 Ill m ID m M m M W m m N m o m w O M -;a-M M L w m M M N N w m N M I, M M e c)M V c-1 m'-I N n c-I M V N Ln LD N Il w m m w m m a -I m 'i n m OR ID ID V M ID I -I N Ol ID LD I -I N In V o w m w rl N LD V. M V c-1 O N w l0 V M ei LD .--I N w ID m M w w r� V e-I ID l0 N w m H m c-I N N N Ip m N N N M e-I c6 N N .--I N N N '-I M e-I N O N M LG '4 to 'i lD r4 V1 Ll'1 LO r ID V c'i N N w N '-I m m ri N M N w N Ol N '... e-I N N '-I I11 N M .-I N VT V} VT Vl..''Vn V} V} V} V} In Ll L? V} t/l. V} V} V} 1A V} 'A V) V} V? V} V} Vf V/ Vl V1 VT V1',. VY N V1'Vl VT. VA V1 V} V} VT V} V! V} V} V} if In VT 0 0 0 0 o 0 o 0 o o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o o o o o o o o 0 o o o o'o o 0 o o o o o o o o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0,0 0 0 o..o o 0 o 0 0 0 0 o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o m m o m Ln o In m N m O m Ill m o Ill O m Ill o m Ln O Ln Vl Ln M Ln o o o lD In O N O O N O IA Lli O o O O o o o LA I� V m Il m Ill w c-I m m m w m m m N O N m o ID V m n N N w m O Ill Ln I, ID In m O O Ln m m Il m O o t m o N I� n lD I� M w tD N O r� w tD N Ol Ol '.... Ol c Iz '.... c '.... ID LD N w L- M V w O '... N Ln ID 1Q M N m N M o N n V n M 00 m N ID I m M n M� m ci N N N Il M N N N � m N N N N N N e-I M N' 0 N M n �--� m e-I w N In L+l' I- N r. C M V N l0 N' lT �--i M ''... '-I N M N ID m Ol N r1 N N V} V} In VA V} i V? Vf V} V} V} Vy V} Vl'..V}. to V1 V! VT VA V}. In VI.. Vl VA Vl VF VY V} V} V} VT V1 V} Vl. VI 1A. V? V} N VT V} VI VT VT VY . VD, VT LL LL i O O LL W VI LL LL LL W d LL ''...LL LL ..LL N d W..0 LL LL LL LL LL LLL.I VI LL m= K C M LL ry LL LL LL LL LL LL W� LL LL LL LL LL LL O O X LL O O X O "'. O X LL W lA IZ LLLL !n LL LL x W W W W W V1 x LL LL W VI a LL LL LL a M d o_ O O X O 0 w vl a a 0 0 X w vl o. O O x lLi1 ) LD LD ~ lI l7 l7 J LL O O x O O x J d v C7 O O x O O x W' O O x A a O O x Ln m '.. Ln A c-1 rl O X 'N-I '' e�-1 N O N .ti r-1 M Ln In Ln � Ln O Oi � ID IO t tZ I~i o O x u u u J_ u u u � F- � a a o > N> n Ln n n n z z z D D w w m a a a LL m m m z z z vl vl.. Ln In ui In In a a a Ln vl In In In Q Q ¢ o_ o. o_ LL m m m ¢ ¢ a z l7 m In Ln V) ¢ Q a — 0 0 0 0 o m m m LL o 0 0 a t� LL z z z o 0 0 c� u 3 3 xLn Ln =_ 0 0 o z > N N U U U D D O D U U U N N N N N N U U U U U U U U U V U N Vl to m m m U �ulu �...',0 0 11 �.,� O 0,,,,p 0 w 0 0 0 0 0 0 0 w 0 0. OW w,,w w w w. w W w w 0w w w w w w w w �U w w w...'',w w 7 7 Z) D D 7 m Z) Z) m D m z z z 0 m � 7 _ _.® _ .. c w c aci E C w E c o E c — o 0 0 C Q � W w d C C w E d E C w .w a W C m w o n X O w C m In w C E O N w O C a X o O W uc.1 w.a o w w d Oo w O w c c c ac i7i` AIf00000oIo 0 0 0 O O w aCi In � O c w °O 06 06 >>> 7 7 7 i v_ c C >>> O O o 0 0 0 O O w y Y Y Y t w w V1 N IA In Lli Iri E c N E m m m o o o m m m N N W o w C C c E c O E c F- H H im im im m m m E i`2 2 o u u u >> j LaC.1 ai a o ° `c o o •� v '^ w v w 01 w w m W +w. IU ti m `/ `1 d E va w c ul Ln �. aCi in m Lu .w. w C c y v Ii LL E E E 7 7 o c c c N o c o 0 0 0 0 a. C L� o 0 o a a a- c c w o o o c c c Y a w ul ul o. c X 0 0 0_ c X>>> E E o o o W y d n. a s O w m m m in m E �, O O w o 0 w v v v u U U acLL I L`o w w w 0 w w E c — 0 0 w w ri ri r 3 3 3 c c c° o c X v v v >>>= o O w o 0 0 0>>> vl In in Lri Lli O O O w aLL w m m m m ., O O w c C c 0 ommm o c w o` a o ri n ri>> D o>>> tw 0p to m m m C LL w w w O O O> >> w w>>> L L L 'a+ i+ a+ w w w w w c �.ou+ Ln °' `^ H..... t...t rmltwn m- m mm o 0 03 3 3 0 0 o w w w m..mlmt7_nm7_a m m m m m Lw w > O O w M OL a t; N .`, m m m x x x c C c U u U m m m� .�. u u U U m m m d C X 'pp Vl Vl v1 H !� C C c Ln ltl m O O O C C c o O O C C c IA In c c c O O w w >>> 'E E E m m m 2 2>>> o„ c c c m m m , r` w v '= •- w w w m m m a Ln Co m coi u° u° c c ,� ,=1 .� F F .�-'� .-i .-i `� o o `o v v v v v v 3 7 3 3 3 o o o E E E a>>>>> i>,' m m a, >>> ¢ In w > Y y¢ Q¢ w w w= x x w w w -= "= '- N N C C C N 111 Vl E -- 7 7 7 w' Z N Z v v v C C C =-- O O O>>> m Lu y C C C Ll0 00' a0 m m m 0 O O U— LL LL U« 7.....,'J .J C C to - in C C C C C C 7 L L L L L L u v m an - c u u u o o O C— ' cc � o o- m m m c m c m c m m m v Coo CC o c o c o c o c o cL w w w V U U y0 O U V U aw+ U O C N n V N N m U U U V u L L L O O O G C G w w w G C G G G C O O a a a .0 ....... u u Y Y m m t` Q � v � w m -D -D -E •E c ...= — = .m.. .m. 3 � >i uj uj , N vl ul Oa Oa oc a aX ww vwi Lwn vw- wwi O O O m m m *' c c c m m m +m. +m. .m. >>> w aLL aLL - ui ui w w w LL D. a 0 .• a u u �u '� wa c m m m t`a tm Lm c c v v v w w w c c c N w N c Mw - ro OO c � c 0 0 O c c c w w w mm m to w wvvw> L L L !` I` f` w w w w w w w w m m m m m m , , Y Y ` .. " w w o. c a m m m w w w C U UU m m m c C C LL I.L LL p pO O O O O O IA IA V cccc HHHw K 1'W W W W W W > > > > i t0 0D m0 > > > w O O O ii> > > G G >>> w L L L L L L v v v m tcm m v w m. v w 3 .,.,> j 3 3 3 u u u v u y w v v a v w v v w m v a v v v u u u u u u m m m m m m m p p p m m m tm N N N m m m m m m m m m m m m m m m. m m m m M 3 3 3 3 3 p p p 3 3 3 3 3 c = z z z 0 0 0 0 0 0 g g g g g v v v g g g a m m v v v v v v v v v g g g g g g g g a g a 7 7 7 7 7 7 J 7 7 7 7 J > > > > > > > >> > > > > > > Q Q Q Q ¢ a > > > >'> 3 3 3 >'> o 0 0 >'> > n(D U o 0 0 0 0 0 0 0 0 m m'm m m g w v m m u u u m m m m -o v u u u u u u u u u m m m m m m m m'� m m m m m m m m m m '> > >>> '.....c c>>>> >,> >>> w w w w w w w w w w w w w w w w w w w w w wwwww ww wwww v v v a v v v v v v w v a a v v v v v v v v a v v v v a v v v v v v v v v v v v v v v v Li li li Ll LL m m m IL LL m m m Ly li LLLL lY > m m m m m m m m m t - LLLL - - ILL — LL ti LLLL Li lLLL lLLL LL LLLL ti w LL lL li Li lLLL 3 3 3 3 3 3 w o 3 3 3 3 3 3 3 3 3 vi vi vi vi ui � � � In '^. � � � Lri vi vi Lli a o � � � � � 2 � � � vi vi vi Lri a/i Lri Lri vi Ili a/i a/i Lri Lli Lri vi vi vi vi Lri vi ✓i v w a w w w v w w w a v w a w v w w v w a v w l w v a w v v v v w v a v w v v a w v w v v v w a v m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3'3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3'3 3 3 3 3 3 > > > > > > >,> > > > > > > > > > > > > > > > > I > I > I > > > > >'> > > > > > > > > > > >I>JL> > > >'L> El m m n m t0 f\ N 01 N N T 1� n 01 al O1 N N 01 fT �-1 I� 01 Ol M O T Ol N N Ot N i N ul Ol MIN N N n O1 O1 O Uf to CD I� N t` O V r--O .-I N w 01 m r� O Jt N m 01 m ci n Ol to C n O C r,- O rn m N N N M W r1 to N m O N to O 7 m '... M m c-i lfl '... N lfl l0 Ol N '-I lfl .-1 N N N Op 7 N c-I M l0 t0 W e-I Lfl N ci Ln N 01 W I� (\ N l0 N c-I lfl N W 7 I- V 01 m m m W N N m N m l0 m m l0 e-I M V N 111 1p T m V7 m m w m m m r` e-I e-I to M N V7 l0 ci M V N lD l0 N M N W Ol C m m N M t0 _! 1D '-I O to m 1D V m rl tD _ Ol _q O O m M O N m to t rl O m m rl lD W l0 M m e-I tD M m M t0 N t0 rl A V M M ''-I.. M '-I W� to m O m . r; ', i "i m r-I, N O N M to m N Ln m ry l!1 to m '...... M N n n vI .n .n 11 �n I . jj v> n l n v* in ,I. 'n v* U* n in n an v: v* u* +n .n +n u* n 'A n n 0 o ao 0 0 0 0 0 0 00 00 0 0 0 0 0 0 0........o 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0000 O o 0 0 0 0 0 o a o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O O O O O O Ln O't0 N tri to O O O N to O N ul N O O O t0 M O M v1 O vl Vl Vi O A A O O Ln Ln V O O M O to to O N V7 O N m r, c-1 � N 1, V O O In t0 mo m N 1 n V Vl Ln n t0 rn W lD N CO N n 7 N N V lf1 n N ID O l0 <D VI p0 W m M t0 Ol M m M I� 1-I _ M V M N n N m '., N '-I M lD n M N m N N m N c-I M V r-I m V t0 V '... t0 C t0 V '... N O N Ln r, a V M m n N w N 111 : ' M e. M '-I tD N N tD N M V 7 M V V rn 1 e-1 N O '... N V Ln t0 N Vl m N M m ci to In M *nl+npv*ICI+�*I'�*Il+nl�nf+nl�nN+nV+nfv* LLILL LL LL LL W W "In O O X O O X C G L LL O N N N Q Q Q d 1 d'.O O Y he Y 0 O O H to 3'3�33333300 Q Q Q Q Q Q Q Q Q m 2 ❑ cocoon Moo 7 7 7❑ 7❑ 7❑❑ 7 w w w w w'..w w I w I w I w w �nVinVv*I+nlv*Iv+ vJj i * LL w LLILL LL LL LL LLILL LL LL LL LL W LL LL LL w W LL LL W N d W VI d XO O X O O X WO oO Xd LL . WO 0 x C) 0 0 DO OLLw �OLL+ XLLdl 0O 0W 0 ID m9Vwl mn a x LLw LLyr LLd LL w O O X LL LL LL lD U_ U_ U U U U LL LL w u U_ U_ u_ U_ U_ to ❑❑❑ O X LL LL LL ❑ w LL LL ❑ ❑ ❑ H F - a z z z'u u ❑ ❑ ❑....Lb tD tD u u u x x x x x ''' x� Q Q Q v S y Q Q Q Q Q Q O Q Q Q m m❑❑❑ 0 0 0 ❑ to vt dz .. m tr u u u O O O s¢ dz dz m z z vi in N to in m to 2 2 2 2 Z Z Z Z Z Z vl vl N > > > > > > > > > > > > > > > > > > > > > > > > n* d c o o 2 u ro m a W m E U C aO O W C ❑ i W O O , c c 0 0 5 � � °n ° m c W C — O O E U w u u W c p o f c E c o wmd _ o........E c.W W O d W U W dq 0 f9 C a✓ �, t1 C C Ul C N C W E E o a n � o` 2 mm W e a w Y a C N `r `r v E c w a O' Oc 'L ca, c x �' N z,. c E O O w 3 W wa c 3 o c o a c c 12 ° °�^' '^r r v m d K7 O w 4' O w_ o Ew 1w O O O Y a {7 O w E c M w+ N N x as Y E c w y • C ro O ,v'd y Rfa` tGa k0 n I^. f'. O C O 0'. C X GS. O. a3: E C O. C X vN x^f vd aI Y Y Y Y '� '� > > `�' W U V1 c O O 1 w W W W p o O O w r6 � td c `m m� mto ` m r"`o •� � A W W y ❑❑❑ i ^✓.... ",✓.." w B d O C 0 N pp kr�l 'ai7� strl naW w d O O 5 k c W radw a s a c W c +rim �y ccr H H H c E ry rm ry gag rm c w C j^ 1`O GW dtp 4�p C C C C w yW,, 0. N N N Y Y Y W �+ Y Y W �itl C C C C G C W C .I c ro ra ro W c' in wa w M ` ` m 'o c is W ra m m E E nro to cco 0 rcco 0. E 0 2 x- > . O W W LL LL LL E aY W .`. G C G O O W O` •'. `° :° :° o o" c x ... F- .~. a^ aM W a ar E 'Ear' " u u u w O O w W W c c c _ p� [7 'CA CY eap C c t,¢m ter ti� m u ro a O O O a a a C C C d1p 'pq. pp- N N dht Gw•C. �p O i1 'O S O C C C w +G rib wso LL ti W w0 Y0 C C C aA W rcaa pa W &G ptlY 1m4 ads 'tW by C > .,_,,,, F F F W Vl uu u v a�i a`mi S c y; y ^crr' uoa rca' y y ,� :' U a (3 1 Ci 21 � c c e � c � as aN aJ y .� .. ,.. ¢�.,. c ' X >> O :^.. W } .,'?� nJ -0-0-0 W W O O w rid. a to ti N O O w w w w air d,, o O >. a a. Eu per Wr I, w � rip rpm .t0. '�' rco rca rco 3 v v u' U U u u u rr",i wcn m in >. c c 0 c c c C' m O O .1°. Y Y ,fO- m Y a 0 O 0 a 0 N N N C C Ci. Ca. ,Q wrp 0 Lp -4 m m R9 C �' " .- r, ° 0 0 pa w as � 6p „wa ca o �n win W W war +«:: �.:. 4:. c a: E `," , E E E c c c c c c '.... E a a s 7❑ Q [} C C C ryn 6F dgl W p! O 0 0— — O C C C X W .. .. .. O w l"1 d❑ ❑ W ;5 wka T >^ `✓- T 'r^, �yL1 A'',. 45. a s a U U w..a !.. pip ❑❑❑ w- w w C C C C C C w N ro ro n w a s a' C C C O 0 O O O �' L L L O O O O O O"'"" �'•^ W m E a m p —_ >a 3 r au p c c c Y ." • y „� 0 0 3 ca m sa san s m o m yo 4W 4a m o 0 0 O O 0 O O O:. C'. C Keb sll dV C c: m ra rp iv m m is io ip ro aa.Gq 'Ck. rEa wm• O S' ° ° w0 v' v o m ,qaw arp c c c u d0 0 0 0 0 0 0 3 qq�� aVl W wWn vWi to m O m O W^.d ❑ W W O Q Q Q °>>> O O Q Z Z Z d'a O W W W Y Y Y > 0>>> v W ¢¢¢¢¢¢ W¢¢¢ am ?` ro a2. ta... ea Ea c c W W ar c c c "'�' Q Q Q ro ra ro H W N r H N va in to 12 2..,'>>> 0 �L.c..c o o,� j�� 3 3 3mm�m.........mm 3 > > > t.: ..c .cW.^ www xu Gcw a ra s n o '0 o` vx A A A In A .° a) 0 0 0 0 > > > W W r � � s � � r_ r C� o cz to ca a �r ce 2 '3• z z z z z z in in u u u > > > > y�ry wa rn un 1d un rn L L L L L L L L L VI > > > > > > > > > > ✓ ? > >"* '3 �':+ U '... U U U U U U U U N N W ` C C C `1 '., W `1 `1 W yl `1 v W W `1 W W W N N 11 v 2 mm m ip ip is m is is io m m ro O O O m O O do ra m ro rp rp io ro a,m `m ro ro m ra 3 rp ro m M is W to to m ro m ¢¢'aaa'a> »,> Sx x >>>>>>>>>>> >>>>>> >>>>>>>>>>> m m m m m m m m m m m m m m m Tp m m m m m m m m m m m m m w` a❑wto ',,a❑LLVf aV❑l aLLV❑l at❑LLo aV❑f aV❑I aLLe/3 atVU4 WaLL '., ❑LLVf ❑LLM M❑LL ❑LLM LLt❑`mo tM❑`ar LLN❑`m a❑VI aVI aLLM a atVti ''.. aLL LL`at`t`w LL`tLL `t`LL LL` W LL` WWWWWWWWW W W LL W N LLLL W iW LLLLNNWWaa a a a aa LLp`a tW LLW atu`r atW aLL`W aLL`m aW aLL`m aLLp`r aLLw ' aW aW W W W W W W W W LLW W WW WW W a) LL W W W a)A N N M N In NNVl to V1 A A A A 56 ✓LLvepWWuruWm ❑ ❑ ❑ O IN` MINI v gm W g3q ra m rp m `m m m mm m '.:> m m m m m m ra m m m m m m m m m m 33 3 3 3 3 3 3 3 3 3 3 3 3 > > > >I> > > > >> > > > > > > > > > > > > > > > > > > > >,> > > > > > > El w m� m m m N to 1\ m..O m N m m m m N m m LD M m m (\ m LD N N w m w V .. M m n e-I a-i V M m n ci .-i at T ci h '... 1� W Ln M Ol N Ln t` N 1\ O V 00 in O Ln N O m N O N V r1 w Ln n N N rl l!1 n V w w o m O1 V lD m O m Ol M N to d' Ln lD V N N N l0 m lD V N 1f1 N m m M N a m W O m m m N m N r-I N e•-1 O m m m m't m c-I H m m V Ln N H N H a -I m V m O n n n w W O d' m Ln LD N M M m H M W LO n H N w 1-1 w v m M I in /A.. "1 iR In N N iA N Nh In Vh 0 0 o o o 0 o o o 0 o o 0 0 o o o v o 0 o o o o o o 0 o o 0 0 0 0 0 0 0 0 o o O o 0 0 0 o 0 o 0 0 O O O O O O O 0 o 0 o O o O O o N m o O O O O O O O O O O o O O O O o O O O O O O O O O O O O O O Ln N o to m e-I m m O w m .-I m m o m m m Ln w m r1 c-I N lD O LO 01 N O N O1 O M M m W N LO m. -� m '.... 01 O V N I, Ln M M m Ln r N M m Ln N e•-I N N L--1 e-1 V o O ei n W m m O N m M LD n m m m M V w m n m N N LD m 10 ri M 1� e•-I e•-I N N N N 'T V r-I ei ei L-I N N M M '... C rl '-I e-1 rl ei e-I m m in in V! Vf in, 1n, 11n N in in an in N +n aA N iR iR'.>h in in in an A to in N, N, 1h vl, NA in 1h . in in in N'.- - in - N, N - N W W W LL W W W W W LL W W W W LL W LL W W W lL LL, W W W LL d :.7 d LL W (D d d LL LL W LL w W :� d V d LL LL i7 d (7 d LL LL (7 d d W W i7 d OLO OLO XLD N❑..'N❑ M❑ M❑ C❑7 ,,B❑N❑ NO m M 0 M Ld+1 l7 ri.N N m® M C7 d N N m I? ❑ ❑ 7 ' '.m l7 O_ N N MpM i7 d N N m m l:J d7N N m❑m❑❑ ❑ ❑ ❑ ❑ ❑ '', ❑ ❑ ❑ ❑ ❑ ❑ ❑ J In !n In In J J J J J J J J J J .J d d d d d 5 5 J J J J J J n N n n U U V U U U V U U V U U ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ O O O nn O O U U U V U V❑❑❑❑❑❑ d N VI N In d 0_ d d B. d Ll d d d d d d d d d d. cwc Vcc1 VCcI V1 Vcc1 VCcI VI t%1 Lccn Vcc1 VI V1 tc%1 VcI VCcI VCcI VCcI Vcc9 VCcI ucVCCI tcc%1 VCcI oc Vcc1 oc NC c�C Vcc1 d d d d d d W d d d d d d d d d d G C C G C cG C G C C G G G C G G C G G C G C C G C Q Q Q Q ¢ Q ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ Q Q ¢ ¢ ¢ m m m m m m m m m m m m m m m m m m m m m TIT m m m m m m o D .� c c c c - c - c u u c u w w m w 11 a o n O O N X X z X O •u u p, u a 7 a W W W W In <n N C r C C C -- - O O O O u �. \• d u\ L O O L O 0 o o a .a a u u u u r ' a a o a a a. o a o" `u o `u u u_ u u_ o o y o 7 a a 7 a i v7 7n a n U u p. U a 7 7 a 7 7 7 7 7 7 7 a 7 a. C C u a C 0 o n n n o d d d d n n o o n a o o a o ' L'u 7 a 7 7 n 7 " n w w Elm o,. c c 7 n vi Ln '^ o o o a o o In n: o U 7 7 Ln U 7 N 7 u m a a c �. a " a. a .a a. u u" Ln u -° o o o v o o�� o� a a•o� a n 7 7 ry 7 my w m w 7 a M. t' 7 a r 7 7 7 7 yw, aw+ aw+ i0+ u v v m U- w m a d o m d v M. Ln a o vl \ C C w C C o O O 7 Ln N N a. M Ln 7 7 7 a 7 Cl c c 'u a c �.... w w v w w m d a m m a u m m m 7' Ln !n a Ln a o o a o n 7 n m c m m m !n m m c a o o n a o n u V J u a C C C c c m m N N N Yw n V V V V b w a, a 7 7 Ln V 7 a o o o O m m m m m m w w w w w +' 7 u 7 '., U 'O v \ ._ -o 7 - w VI V1 h N VI IA •'' w v 1 v v m -o � V1 Ln u u Ln u o o o .� io ., m m m in w m 7 7 Lp 7 Lp 2 7 C W 7 7 7 7 7 u v'..v m= v m a d` o m a `-' E E E E v v v u vv O.� w u. u w u u Oc..... 0 0 o ELL o o c o o c 7 7 o 0 E c c v c c O Ln ra Ln Ln in Ln Ln la 7 7 7 - - - m m- d` m m a` m m m 7 m m m > j O= 3 u u u` u u Z a -' 7- -' m m m m m m H w v,. ar w w Z Ln Ln Ln Ln �+ Ln Ln Ln `n Ln Ln Ln Q Q o Q Q c c c c c v Z w u u w u u w m m m m m u m m m m m m m H N Z H Lwa �. .� - m `1 c •5 > •> > •� w www w w a) w a) w w m m w Ln vi Ln Ln Ln Ln _ _ w ._ _ u u u w u u L m O m m m m m > '>> ❑ '> '> Ln L c ❑ ❑ ❑ u ❑ ❑ N w w w w w m w m w w w w Ln v v v u v v u u u w u u LL v a) 2 K z s 0 0 r•-I 0 tw N p c-1 r1 r-1 '� 7 7 7 C 7 7 C C C C C T 7 T > > >> w v w au w O O O w w u u u- u u=-- 7 -- m u ,� o o v o o Ir''r' u w z ❑ �' v C C C w C C w w w u w w m C m W <n U ym. U �. U U u U u O w O �O ✓1 C w O -- O LU C C C C 7 N Ln w 7 7 7 7 7 w w w > w w>> •> >> T w T O y O O O v 'o O '... in " aJ E O O O O O a/ a w U U w w w '.., " w aJ w U w >>>❑ •> '> ❑❑❑ V❑❑ '""� u •> U M C to C w C C 7 7 7 U 7 7 C O YO In C U U U w U U 0 7 w w w .-i w ai .� .� .� .> ,� .� o •> w> o w w o w m o 0 0 v p o O w E UD. 0 v v v !^ v v E ❑❑❑ ❑❑ w w❑ w x x z x v u u o u u w `' > w Y: E° w w z3 '-I ,y w O❑ O O w❑ Ly ❑ w w❑ w E w w -O m -o j.. C' m N m m Ll m f0 K O u ri 'i U v m ` �J d u `1 m m 0 v u u u u u p_ O O O O '> yj O �j > 7 m 7 m 7 7 m m m a m T O Q' N D v n v w 7 7 7 7 7 7 w w O y. w w w C w w ❑ O 0❑ O v O O O L L L w L L N_ T w O❑❑ O❑❑ ._ O m C O O o O 0 O O U m U V U Ln to ❑ Ln V7 = K w Li w 7 7 7 V 7 7 0 0 0 m V u �--� O 7 o ci y w M- ' C w E c o 0 o �-o o o v v v v v o v m 7 c c c c c c m •o w O D U U w U U w w w •E w w '� w U w L V d_D L L o o o o'.. o O 7 L m u O o o o O O L U E v v_o m v v m m m `/ m Im oo L- L o 7 7 7 m 7 7 u Y= C N w H m m m d u d L d d a a n n a a c 3 a a n a a a 3 E w m m v m m v v v d v v w H L H m m w 3 w w u `u `u `u vui u w �_ w 0 u `u `u `u `u `u w❑ O C !n L L L w L L w w w C w w _ N E 'i w N V7 to ''...❑ V1 N❑❑❑ OI❑ ❑ 1 VI L u u u u Q. C X i U U V U N . . . a N 7 7 7' 7 7 7 � E H� E 7 7 O o w m m n n n n n n E m E v Ln n n Ln 12 Ln .D LL C C C C C C C C C C c c N c ja m> > >> L.. ' o o o o o 0 o o o o o o o E v E v v ~ 3~ Q v Q v Q Q m m m m m m d a d w o_ m m mmm m d Ico ¢ a a s oa n a a a n,,a a'. d n � >. >. >>>> c O c m O> i. >> i• > c v m y `u u `u `u `u `u `u `u `u `u u `u m Q `u ¢ c .w+ O a y M Ln .� .� N N O d Ln a a a u v v 0 0 o O .o o w w w w w w w w n,v w.w w w w w E _w Y w �...... L L L 7 7 7 7 7 7 7 7 7 7 7 7 m 7 m � '� a+ a• �+ r+ to to In !n to V1 M N N Ln to to Q 3 In 3 Q J 7 7 7 7 7 7 In 7 In 7 7 7 7 7 7 w 7 Y Y Y ` ` E .� E] E E Ln Ln !n Ln Ln Ln N !n -O C N In Ln (n Ln Ln N O O O m m m m m m m m m m m m m j O Ln O In O O C C C C C C C w C w -p w C C C C C C Vr c L C y w w w w w w w w w w w w m w m 7 7 7 7 w w w w. w w m w Y w w w w w w w 3 3 T T» T T T T T T T T T c c E E Q Q m pa LN m m L•n .� .� N rry rn Ln .� N N N�o 3 Q a' Q w Q Q E E E E E E E w E ww$ w E E E E E E v E u c c C N N N N N N C N C N E H E H H w w w m w w w a0. w a0 Ua w w w m w wto w D m as Oa ua� m� ha aq m Ca m m. Oa w 0a- w as m 0ai LU 000 oom 000moomm o>000>�mm mmm cccc ccccacwc me ccccccccc❑ o o o o o 0 o o o 0 o o o o o,2 o p m m w m w w 0 m m m a s m m m m m m m m m m m m m m m +' 2 C C C m K � E N � � i:7 � m w w w `w `w `w w `w v w` v v `m w `w o o w m> m>> w w u` `u cc cc L L L L L L L L L L L L L - i C v G C C C C C C C as C m C C C C C C !n 3 Ln C j 1-3 U u V u u u V U u V u u- L V d w w m w w w m c w d C w w w w m w N O to w. m m m m m m m m m m m m ,o- 7 1a 7 a m w m m m m w a w w d v v m 11 v m` w a w w w m m a u 0 0 o w w w w w w w w w w w w Ln w Ln 3 7 3 7 3 3 c c m N m o � � u � „ -2 m 2 m � � � � � L.9 LD o` � o W o C7 C7 l7 17 17 17 n > n l7 n L L L L L Li L L L L L L p L p L > L > L > > L L L L L L L L ,L L L L L L L L L L L L L L L ui w ui u u u u u tu u u u u u 7 a u a 7 u u u u u u u u u u u u u u u u u u u u u u u u u o2 ja o2 41 N m m i0 m N m N N N !a f6 m to N m m N m m (a m is n a a C m 3 �'3 m 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 ''¢'''' 'aa¢a¢¢aa¢aa¢>>>aa¢aaa¢aa Qaaas aaa¢aaa¢aa¢ w.wao ww``wm`vd`w``w`vd`d`ww m m m m u Ln m m Fa m -j5 -�m m m m m m m m m m m m m m m m m m m m m m m m 3 3 3 3 3 3 3 313 3 3 3 3 3 3= v 3 v- 3 3 3 3 3 3 3 3 3 3 3 33 3 3 3 3 3 3 3 3 3 3 3 3 a° o o v v v v > > > > > > > >,I> > > > > > > m d > d m..11 ll l,> LL Li > > > > > > > >.> > > > > > > > > >.> > > > > r`,m m m m m m mm -Fa -Fa m m m m ra m m mm......lri `� Lrilm Lri vi m m m m m mm..2 m m m m m m m m m'.,m mm mm v v `m v w `w m `m m v w m` `m m `w '... w v `w w m m `al w `w a`) w `w a w `m `w v m` `m `w `m m `w m w v v v v -o 'o v v v v v v -a v v v v -o v v 7 v 7 v 7 7 v v v v v v v v a v v v v v v v v a v v v v v LL LL LN w w LL m - LL. m-- m w w LL LL m LL M w J w N Ln m LL m m- LL w w.LL w w LL LL w LL w w w.LL m w LL LL W W W LL W W LL LL W J W W J J LL W W W W W W LL W W W W W VI V1 '... to VI VI VI N to VI In '... N N V1 to Ln VI to !n M V1 d to d I� d d V1 In !n VI M V1 V1_ M In Ln !n Ln Ln !n Ln In to Ln VI Ln Ln m to 7 7 7',7 7w7 7.H 7 H�7 A-7.7 7 7 7 7 7 7. 7 w w w w w m 2 2 2 7 EJ>>l v `1 W `1 d `1 ' v vvvvd`1vvyJ`1`1.`/dW`1dvv ` � L_ >_ >_ � � m m m m m m m m m m m m m m3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 33 3 3 3 33> > > > > > > > > > > > > > >>>> > > > > > > > > > >> > > > > > > > > > > El '-I n n NmM N O N 00 O O ulN lD '. mO W O N M C WN^mryIl I,M..o O m 7 N m m o m O m MNry N N mmmm7w w w In N .-1 N .--I N Vmoom W m d' m m l!1 r-I T- M ''., HM 1p M m V m ci m NNV m lD m V O m Vl �mm m m O l0 N r` m N e-I w O O m O I- M V R n N N M O c-I N c-I V Vl 1D o lD r` m n m N m N m r, N '.... n lD O m o O a m m ----------------------------------------- o O O w N I O O N O o l o .o 0 O ', o 0 0 0 0 o 0 0 0 0 o 0 O. O o O 3N o o o O O O O O 0 0 0 w O O o ^ o o O m m m o o0 m O m o 0 m m 0 o 0 O O m O m o .--i 0 0 m m 0 N 0 N 0 .--i 0 m 0 w 0 m O w .--I O o 0 O N o 0 'm m 7 o e-1 0 m 0 r, o m O O o N 0 O 0 0 O 0 O o O' O o o O 0 O 0 O o O O lD m m o ti m .� ry o ti H ti m a m m m ti m ti v o ,--� ,� �� m ti� w m n N o .� ti ti v v ry m .ti ti Ln ti ti u?,,,'N in. LL V}IN i/T VT Lf i/T': V} iA i/? V! Vf V} N..,.CM1 i/f V} L? Vf 'Mb to u? iA iR iR i)Yi iM1 8J"T Y'a^k to v4 V? i/? 6A V'S WA V? t/f N VT t/T 1A iA VT LL a LL LL m M C7 a M m l7 a C9 a U' a" LL l7 a 0a"" LL LL i7 LL a LL s 4.L LL C7 a `'"-` l7 a (J a" 'i d a a LL LL D_ LL N LL LL ❑ ❑ 7 ❑ J �,,0 ❑ :? :? :? ❑ ❑',,❑,❑,,O ❑ ❑ ❑ ❑',,❑ O ❑ C! ❑ 0 ❑,❑ ❑ �,,� ❑ ❑ M ❑ M ❑ l7 ❑ ❑ N ❑ N ❑ m ❑ m ❑ l:J ❑ ❑ N m ❑ a J O Ja '.. a v1 VI uVtI N uVtI ❑ ❑J ❑ J❑ ❑ ❑J ❑ ❑ ❑ ❑ ❑ a a a Ja J LAo ut u? moNf v L� ..❑ u u ❑ O O O O oav O a Zn V uuu u u❑❑❑J ❑❑ OJa Oa a O�u c cc c c c cc cc cc cc cc cc u C J J u J u u u J u u J u u J J u J u u J J u J J >> m m m m m m m w m m m m m m m m m m m m m U J u u U U J U J U.0 J U -u U'U J U J U U J u U J J U U U V u J u U u J U J U U U J U J J J J > > > > > > > >'> > > > > > > > > > > > > > > > > > > > > > U > U > U > U.0 > > U > U'..U'..0 >'>'> C O X W C p ma Xo O 7 O O jd U a p M d 7 ti. '� = Vct ai C3 E c O c d . a a..a o o o° n_ n ratan i� u c4 u o a... d o ?''., a is a u n d d o o u" a o u `� � un L' " � o m.',. n sti `u a of w s «"�., °n C �w,. w N ,,�` L 7 '"" t✓b = J r� '^•. +"° n. 7 V! Ll, d :3 n C J U A �. .] ,D O CL O d. an 'C V '. MT '"-r .7, dr1 A. j V 7 wn O 'C '[] C4N ' 4 I� C I� iip W C n n m N a C O d C C vLui '^Mw Y ? , kn uu "�� ^� O. O vy M1PA aY'1 .tl5 7 ,fl '7 d �' m g ° g g n "} an. 7 7 uz �+ .d d p d O ^M d u n p O � d d C c O d c d 7 d � O I d d � YJ o 'VIi c t,If c c .` m E m m N m w m " o 0 0 ,n v7 d CL o 7 :: E, Q n o O u u n O u ea d as o yr c ta. �,p v) c ca 7 .o E c o E E I,ryJ, >, a. N m t0 a m a f0 m a °�' c d c c d^!V c J J v 7 O O u ,� o ° 7 -oO m ,' V .1 vt m ',, m ut ut m m ut m ut m vt d. aR. O u v7 u- .� pW O 7 u m O O n. a` m O a v'b V ,va U u 7 u 7 m U 7 u a 0 'C 0 Qam E w Q Q a) m O ,.., o "` m u v7i v7i u 7 -o 7 m" 7 Ln 'n o a m o m a a` m.. m= ^-' w m m> v U u > y U ' > m N "GY U) O) v 'O O1 v N v N'^ v m m m O v m O v) m v m o m m VI m m m m ul Vf m m V7 m m vl ''.. m ul m v) a Vf a v1 m 1O m m V) D_ VI m m of m m m m a) Q z N> m w ai m m w o❑ w w° o 7. 'u 7 7 u u 7 u 7 u 7 u m m..... m a`'a m m m '^ m a m m l wr �n m vmi m )n m v) m umi m:. m m v vi a�i > U .- O>> .ti m c c c c c c m V) m m m N awa m m 7 N 7 7 �7.. %" i u+ "O N w w C m m O w �O Gl N w w w w w a.) TJ o uN �) w Ol C0 Z �' G C S T5 L� '�O,J u u CC c 0 0 .0 ? U ❑ °> U u .> •> u .> u .> u •> m w '13 w 'o w Ica. 'c7 u 2 '., u v ..�. ,....� T ' J .7 7 F ,D C c C > C w >> X _ C ° U ;y' ❑❑❑ .-I rl ei O❑❑ m m 'o rl V )q u C 2 u c V c w u u C e > u '.. u > > u > u > 4mU y, O O w W ".,. ." :..:�. u > .... .... u > u > u •> 7 o w v) w m ` 'p w w am E -O `) w E 3 ut O O O c-1 O c-1 O �--I O O >' w O w -...� w >. ..c w O, a) ,w. U w > ,,.. w w w ❑ w w ❑ O w ❑ w ❑ ci w u a) u U .> ,`�' M w U .> w U .> w U .> w ❑ w U •> w u �> w ❑ w ❑ w ❑ c w C w 7 v O w w w +" ' m'. m t w Oa' m c. v v -o V -a ,y u_ u u > m u > u > u w > ❑ u u .ti '> > ti .-+ .� .� o >> w w w ❑ p w ❑ w ❑ w O .-i w ❑ w ❑ .� .� .� LL w X w w p Vl E U LL u vi vi C m N , c m w' 7 E O D 7 7 O O 7 O 7: O 7 O O>> w w w ❑ o w ❑ w ❑ w .ti ❑ O w a) O ❑ ❑ O O O O w❑❑ m ci .--i r-I 0 ti '-I �O w0 ,FO 7 w C. w U U U U U U w❑❑ V ci r-I w V •--I r-1 '-I '-I ci 7 o 7 J 0 0 V J 0 7> D 0❑ E E O . > w O O O w -O 7 O O 7 7 J 7 O O a c w c w yu, w w w w w w w O O O g w O O O 7 ',, O O D U u u u O O o V -O 0 0 0 0 - raU u w w w w w w d v mm '.. U m mm V U U m V m❑ U w �--I a)v 7 ''... ❑�vv .y J 7 °uvv.vvvv O U 7 7 N w N yl ` �..� E U w w U w v 7 O u �y J O u 7 O J o-o V 7 O 7 O U -p V V U u C y j E u u u C C C L L ':.. v w v a w w v w D w w >> O L L o U ° _o u 0 u o U w 0 o U U L L L L L °u L L E O u u a; u u °: : m m v V m m m v v Y.. m r.rr 'w m o o❑ o❑❑ u w.....0 v m u m v w v v v '.. m m u v-a �.......� ° �....... ut w N u m u m w m w w m N m v m u `! m y m u..0 v ....... -a U V L¢ w U Q Q Q m w C L O c [7 O C' O C� O C> `1 m > v m `1 m `) m v v `) m m C, �C C' C C~ H ',, N 0 vLi vLi 0 u n U C C m ^ n n C C C¢ T _ Q U dc d d CY. 2 C4. L U Q¢ m L N L U L V1 L M L w VI ❑ L L C'Y Vf Vf d C7 Q o O L Q Q C L i� c c i C � � u ,, o m> 3 v O O O .m it m- aj .- `) m u ..._ u� .. t � v v c a) m 3 r- c c c c 4t. N:k Vi d ,� v m , V m 3 O C7 O O o a 3 (; Q n E¢ n �° m E E E 3 v) m 3¢ A a „O 7 7 m a 3 m 3 C) n., u m Q O d O d O O 'ea• d Ea 4T vui d sx >> >' ¢ m 3 m 3 N ❑ Q d a.. .. d � cx zz d ck , a. o v is O o 0 0 J J 7>49f, v vd rry hru yr vv v ❑ w .,c, m •- ¢ 3 m¢ Q¢ p E `p 3 w w w w w w 3 p `ps ... 3 .a sa .t) ,a'� ,ra w as w ftl w m w m 3 ° 7 va m m 3 v) cn x.n wa yr rn nru yr � H N H H "� '� m o � > N � >* ry rr � M 7 .�a> .� 7 jq ,'� va :'a 'f �' O T w 7 7 >- vw u5 N" Y � Y ?• w w m m m `m im m m m m v oC ¢ aj w ay Ck m m E.b Kd. o °: as apy 1 m0 k)aw 4,T as CY O > 2 O ,qy rt� A3. m mi d > w w w w w w m O S3 q ?3 C3 > p v° � w Vd > o w Nw w w w "' w �>M w w w a > c w D: Q) > > > N 2 2 B B m a `u �� � M A�� ry a� m� c° I� E E c' M E i1"N E .-I E '-I E 6`h8 E C'W E Cis E tlY'i..' E e4. E v 0 v m y c a u am a) w ° a u u u o s 0 0 0 0 0 0 0 0 0 m u 3' s m m m 3 3 '.., 3 rua j vi a. O. ¢a i'S. d m d d d n„ a O„ d Ra m "°7: va v v a) v-o W W w -w v a) W a v� d O'. d d a« � � yo� Od'. N � W _OU/ N v N N N N N N >V > M w>>> L ',. ¢ L ¢ .q, L L Q L Q ¢ L > t '..0 > > L > t > > > > � < < 4 `u "'q°�- - F- w F m'. w w w w w m a w (` m a >� w f` fY0 ,O O n n w m O d d ,o ."'+ Y m w aV+ m m w m u m Y m J3 7 d °�'w") d Y +V+ Z3 w m N m u L Y m m L L L Y aw+ aw+ m m m L t au+ m m L au+ m L aw+ m d d. d o: ll m aw+ m """� N m y m +u+ m U m au+ au+ u V m u g 3 N 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 o 3 3 3 3 3 m 3 m 3 m 3 3 m 3 C- li li C Q C Q¢ Q Q Q Q d. C C¢ C C a> d u Cam. O O O„ y71 O O Q ".'. Q Q Q Q¢ Q Q Q Q Q Q d 0 O Q Q d d Q Q Q Q Q Q Q Q Q vi � uw U m L.1 v) m m m m m m '✓V u U m m 1lA m m v v m m w ., w w m m m w v m m v m m 7 v) u U v m v m D !Y w m v m w m w m v m w m v a w m 3 m m m m o LL a > '.. a m > > > > a a > > m > > > > > a am t`0 t`p !` fa �^. m f`0 m fa fO > > > > > > m a a > > m > > > > > > > > > ryyp, yyy ddvmvmm'mvmwmmmw�mvmmmvmw N to to f`0 N M f0 (a N to f0 fa N ',. N fa to !` fa fa fa N t0 N fa i0 f`0 N m f0 N t0 f0dw v m LL w J LL ,ti a J J J w LL LL LL w LL LL w w LL w w LL LL LL'� 7 w LL V w a w LL ° w LL v LL v LL'.., V O w w LL LL -a '9r9 LL w w LL 4L v m )i. w ' LL v m LL v) w w LL w LL i LL LL VI VI a C6 0.,. V) VI VI VI Vl VI VI VI VI VI vi ')11 vi V) VI V) VI VI VI Vt VI vb is'V Vd 4FA Vf V) VI Vl VI VI V) Vl VI LL ut uW LL yIl LL VI VI V) LL V) LL V1 ) v w w a w a mw vw m m m vv m m v . w v w m w m v m w m..mm m w v w v v v w v v w w w w w w w '' w w v w MIM 3 3 3 333 ,> > > > > > >'> > > >,> > > > > > > > > > > > > > > > > > >'> > > > > > > > > > > > > > El N m V 1A O O rl Ln tJF LL a m a O J uuuuuuu m N H to O o m rl i✓M LL C7 a O J O1 .--I H VT o o m. '-I th. 4.L a d O J V ci N N'<!'h- o O o N 'nf4 LL J J a > J H �--I ID Ln O c-1 In LL V m �' v J M lD e-I Vl 0 No M e-I N LL a m N Vt n J M 00 Vl 0 V U} LL l7 V1 V) > J Ol n rx o O N to LL ',a v J V Ol lf7 w ri iJ"M 0 O m n rl Lf N ❑ U O uuu'uuu'uuuvuuuuuuut�t?c�c��c�t��coco�c�t�t�����,7y .... ul Ol n , lf} 0 O m m ci l vd a N....M ❑ V o O Ol Vl N m N V).' o O M V N vV ❑ J u J O O n N m N 0 O 4 LD N to a" m ❑ J u J 0 lD O W w in 0 O N m in l7 ❑ U 0 �.._ N n ul m V? o O o o rl 'A '� a ❑ u❑❑ 0 1f1 ci O N N V1. o O o m N 'A'n C� N ❑ J 0 r-I ul 7 M N ru"& o O ul IT N a N ❑ J 0 n �'-� m O m ui 0 O m N m :, M ❑ ❑❑❑❑ J 0 n ., N m N m V 0 0 V v m VT a m ❑ J J 0 m n O '-I Vn o o N N .-I C7 ❑ J 0 M V V N 'n o O o m ci LL a.', ❑ J 0 C C �--I Ol 'n o O 0 o N LL J a J 0 M �--� lD O t/1 m W 0 c-I LL T {%) Vl n J 0 ul M l0 N %A o O N M rl LL a m V1 Vl 0 O N O V V! o O N V LL (7 V7 0 w 00 n 7 ah o 0 o Ln In LL a❑ M VI u J O 00 O m LT o o 00 m V)) LL (D N ❑ U u C V1 ul V m i/Y o O N O '-I aA LL m N ❑.❑ O J U Y C N O\ n N N o o 00 M '-1 to LL C) T '❑ J U N c V1 Vl N m 1A 0 O M a '-I i/f LL a T,17 ❑,❑ ❑ J U Y c O N w V V} 0 O N-zt o l . u' ❑ U v C lD O O m LT'.1/f o O N 14 " CL ❑ ❑ J U Y C m w m '.. n o O Zt m c-I V} LL (D N ❑ J U Y c ZT N n w V/'iR o O N O N to LL a N 7 ❑ U Y C M. H N Vl o O N n N V} LL (D T 7 ❑ U Y C M M N w VT O O m m '... N 4/} LL a M ❑ J U n c 00 C� Lnm m iA O O m O c-I th LL Y ❑ J U J c m i m Lf O O n O eel of LL a 7❑❑❑❑❑❑ ❑ U❑❑❑❑❑❑❑❑❑❑❑❑ J c to rl N �-i V} O O '-I N rl M LL U N O J J C n m o H (A O O m N e-I tR LL a N ❑ n C m tO w m th o O m LD rl N LL U T ❑ c >>>>'>>>>>> N N N LD V} O o Ln n ei N LL a m ❑ J C N M m 1l1 iA o O V w a/T LL y O J n C w H .--� w VF O O to to V? LL a ❑ u G V' V7 rl N In o O m m N ah LL U N ❑ G ID Ol w N 'A o O n V N Vn m a N ❑ J J C w V H H m VA O O w m m Vn LL m T 7 ❑ G . m n o N m Vb o O to V m N. LL a M 7 ❑ I N n n H . yA 0 O n N 'A LL (.7 ❑ J in . m C c-I N c M.. 0 O m In LL a ❑ o a o� a o a, o u u p u _ C U U c U a.. a. c p a O 7 � � 7 ul o ut ut \ O O O Q m ,� a. 'o •� o o ra o C a n a, o n. Y �' o a c o c o n. d c o a a o c c a 7 o c a 7' - 7 0 L.N C U U C O U a o o `^ Q, U 7 7 m u 7 a. y O V O O O 7 Ln c a O a .Q�.. 7 '.... 7 ut a. 7 ut - 7 v v m m .0 v m a a o m Q_ o .Q a- m a o a m o m o a v) m o m u m Q a m m a m to 7 o a o= a 7 o d. V1 Vf V1 u` cdn. O �, a a LJ a m VI m VI m Vl a m m V) m m Vl t um N Vl In 7 7 a V1 C Vl C o a N C w w w 7 w w 7 .O 7 7 m 7 7 m lw m m m m \! U -D O Q, 7 o o a 7 o V -6 u-D-D C 7 7 U c V C u C N u C V C w >. v 7 w > w w w > = p N m ',, dLn U' V 7 N U 7 7 U 7 U 7 U "" u U �• •-• 7 �..• M u c-I I N > m > ~ `� a co U 7 V C C C w C c w u w u w u U w u w u m C `o m m o m a m m m m M o o d o d G w G w G w> .0 w v> '> > c c? >> m .� w m > > M > .� > U m Vf a` N VI m VI Vl u u u w ❑❑❑❑ u u w w w w❑❑ U w w `� ar U u > ai U M O m w m w O O M u U O m 7 ut ut of m❑❑ of ❑ ❑❑ > ''. `o O m❑ ❑ w> m ❑ >> m `8 um U O m a m s a O v a v v v w .ti .� N N .ti w v o v o v pw v o` v '> y u '> o o am a" Y, O O w '--' w 7 J 7 ., 7 7 O w 7 O 7 O 7 O O 7 O 7 0❑ w Y o -p y al ❑ Y Y Vl Vl d L ry^ a a u C U U '> U c U c U c U c U C 7 7 7 U 7 7 0 0 0 m U U .-I m '., 7 o N .--I N m ''. O "p w p 0 _> m `..� �. _. o U 0 U 0 U y o U o U- v v y v y !^ E m :'. -o & °1 C U C .. Y a s ',�� m m V u 4 N ry u ❑m ❑w w w w w w m m m m m '7 w -p w 7 N O N O N c c > w v a u w v u u u `1 a u v E w '... E m v > > v w w Q `o 8>>>>> o .� .� .-i .� H m m m m m y a/ v w v w C v w v w C w OD m = w 0➢ C N N.. N �- m U Q Q W o? `p `o `o `o `p ❑ ❑❑❑ o❑❑ E E v m m n n ^ v D O O 7 7 7 7 7 C 0 C 0 C 0 C O c O C O C O C O C O C O C O C O w N m a, C O m w m v m n n Q Y c o Y' U C ,o Y u C o Y u w w Y u iy w E',a u u O O O O O' n a a a a a a a a d a n - a m C c �n m a m a m a m a c m a m v io u''u v v u u u v `u `u `u `u u `u u `u `u `u `u `u L a m Y m^ n n n w c u m c o D E o 0 E o y O° E O o p c o aEi a u -o-o u Y w y aw y L L w 7 y L au+ w 7 a v� �n 7 a 7 m 7 U 7 7 a 7❑ a a ❑ a E E c w w U U U U 7 7 7 vi 7 7 7 7 in 7 ut 7 7 7 m 7 ut m m 7 m m N W m N m p Q Q a U V U U u ¢ w O o 0❑ ❑vvvvv 0 c ._ c w N 'm O w N a N w N - vwi w N -� O m OJ m N GJ vwi N =� a_ vmi a c c c ❑❑❑❑❑ w >>>>>>>>>> w w w w w w w w w w >> w y m a w > Q>> m m m w m w¢$ ._ m w ._ n m a a a a a- m•-' 0 0 0 N m M A H N N .--I >) 'O w N w N> K K > w N-w> CG D' N V V "O E!, w N a Q....a 0 0 0 0 O .Q..........��� '3��� •7 •� •� '� '� Q 3 3 a v m m v v m .� c w a y> c w v '- v v v a a v c c w v c w m w c w .- m w d - `u `u N Vl VI Vl VI Vl Vf VI VI VI V1 Vl N cc G Vf > N c m w OG w K m 3 c m m 3> w 1' n m 3 n m 3 O. c m c m c m c m m ^ m >' n n w 7 ,Q 7 �'� u c c c c a c c c c c a c w m> 3 w o m 3 n >> y v> n> v c o> c o> m a n iz n zz� n n' vi n c o> c> o v c> o v m m m v n v7 v7 w E w E w E w E w E w E w E w E w E w E w E E� c E c> m m c '^ c m' 3 m c m c 3 3 T >«> m m m m m m w m w m w m w m w m w m w m w m w ea w m w> ea o w as o �O v C 3 3 cc G o v C o e C E o E o n C a C w C v C a C m w C E O o E O cc E p w > w > w > w > w > m C m C m C m C m C m c m C m c m C m C m m C m m C m p .0 m C m C O O O n > C Q C E O E O E O N N m M e-1 m m m m m m m m m e 0 u C O m C O C O u m u O Q u Q U N m m m m v m Q U Q O O O w O w O w O w O w w w w '.� w w w w w w w w w a.. w 9 a= w a a 7 w !'� 7 O.. w = 7 w !� 7 E '.. w !`- w N w N w N C w H w H 7 w '_ �. w' .^� a. w w w w F. w V >> 'p >,> -o-o > 7 m 7 m 7 m 7 m 7 m 7 m 7 m 7 m 7 m 7 m 7 m 7 m `u.... 7 7 m 7 m w is m `u �\C V7 io m" w m 7: - m m N- m w r..¢ o m w ___ m w m w m w '^ m m w - m w _ m w „u, io w _ U _ u _ u _ u _'.= u u _ u _ u _ U _ u = U _ V = U r u = U = u = u = u _ u _,. 7 o d = V O a 7 > 7 L 7 o a > o a 7 > p a > p, Q' w p > 7 Q, > > 7 M m m m m io m m m m m m m m m m m m M m '� a m a a v a.. I v Q v a= v v v v m '^-' v m v m n. d m v m 0 i 0 m 3 C 0 r 0 N m 3 0 m 3 vi C m 3 v7i C w m 3 m 3 m 3 3 v m 3 3 C 3 o 3 o Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q d C Q c o Q a a Q d a C O C O a a O> O > > O n. Q. > o. a m m m m m m m m m m m m m m m .o j v• m 7> 7 Ul 7 j > 7>' > v>>>> m v>> m j >.7> 7 m m 3 m 3 3 m 3 3 m 3 3 3 3 3 3 3 3 3 3 3 3 3 3 v 3 v u w u u o w - u w w 3 w w w w 3 w w o w u w' u o ° �vvvv�vv�-pmv� > > > > > > > > > > > > > > > > > > > > ',. m a > a m ll m m a LL a m LL a LL a > 11 LL LLw. L1 > ll LL a LL m LL m m m F m m m 6 m m m m m m j m m `w m m m m m m m m V1 m m m m V1 m m m VI m VI m ui m ui m -wo -owvv-ow -ovvvvvv�.v-Do w w ''.. w w w w w w w w w w w �v w w w w w w w w >>v>>v�vm w w w w v LL LL lL Ll IL Ll LL LL LL LL w LL wv........�avvv LL tal tl lL LL I LLLL Ll J lL w 11 w Lwl � _w 11 w�-w LL J LL J w LL w LL J J J J LL J J LL J, LL J aj LL LL vi 11 vi ll vi 11lL vi vi ''. vi vi vi vi vi vi vi vi vi vi vi vi vi vi vi vi vi vi vi a vi vi vi - a a vi vi a a vi a a vi vi a a a a a a a a a a a s vi a a vi a s vi � ',.� 7 �.7 a N,� F � m m m w m m m w m m v v m m m m a m v m w m m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 m 3 3 m 3 m 3 3 m 3 3 3 3 3 m 3 m 3 m 3 3 3 3 3 3 El ......._ ...... V1 N tD V1 Ol m O N M n n m ID .ti n 0 00 M V V1 v n m Ol lD n n M Ol O Ol O l0 N N M. M O O1 .1 n lD 7 N N N m n M V) n n rl v1 111 d' M M 0 m M N 00 lD a0 N W_ C1 O M M O O W 00 7 C o M M N V V ti c-I N Ill CC 0- '. M O m n N M O N V V O V N N n M n U) M M O W H kO LO N M W N rM M V In N m O M .--I N OM O n'n O O M ct N M c N D N N N N W N N m O O V 0 ti N V V 0 D N N D 0 fT Ol T M N N T m c c c V> VT VT V• VT VT V} VT VF VT,. U) V1 V? V} VT,. VT VTVT V! V} Vt• V} VT V1 Vk VM V} LT V?..,ilF V} V?, VT V) VT i/1•..,V/ V? VT V} i/} VT W6,V: V) Vf VT VT Vf O 'O O O O,O O O V N O O.V O O O O O O O O O O O�O'O lD O O O OO O O O O O O O 00 O O'.O O O O.O a0 0 0 0 0 0'O O O O M O O V O O O O o o O O O O O O o0 M 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O'.O.VI lD Ol tD rl O N o O M V '-I M M l0 .-� In 4 a M O M n m r-1 w N M O V lD n V lD V Vl 00 0 l0 m tD n M VI N N N M O O n n O V V V1 O N m r1 ei N l0 N N N N W rM-I N N Ol O Ol to l0 N N lD l0 N N ID n O1 Ol M M N ''... N M M r-I e•-I N e-I —II—I'—II—II—II—II—Y—I—II—II-II,nlv*I+ IV I -?I -�I+ I /�V -�I�IIV-01 -. ©©MMIM®©MMII©I©M9011010I10 LL LL LL LL LL a a� a LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL '. LL LL LL LL LL LL LL LL LL ',. N T T i:J a dy Iy T m V a m m U' a LL LL N N T M O LL LL V a"" U a I.7 a" 'i l.J a V a LL LL N N m m U a I.L ❑�'T M l7 11 N N m M l7 '..a N N m.m l7 d LL m J J J❑ 7 E ❑,,,0 ❑❑ 7 7 �,,,7 ❑ 7 7 7 7 7 7 7 7 7 7 7 ❑'❑ ❑ 00 ❑❑❑ �'❑ ❑ �'...❑ ❑ O❑❑ a'a LL a a J 'an N V1 LA LA In N N ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ J..'',Vl VI N VI ❑ ❑ VI VI h V) VI h Vl VI J J J J ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ J J J J O O O O O a a VI VI V1 {/� ul h U❑ U V U U V U a VI V7 Vl t/) J J J J '.. vi h do Ji 0 Ji 0 va '..... ut en vi ut do u u u u u u ❑❑ 0 0❑ o O o O '.... O O O a OO 2�comcommmmCoIammmM, M, aom, M, mmm 2❑❑❑❑❑❑❑❑❑❑ z z z z z z z z z z z z z z z z z z z z - - - - - 21212 - - - - - - - - - - - - - > > o n t+ as dx n v ve o `u 4 •w, 'ca o c c o c ' 0 q�,:. r°i, a o cpi.. o ��,y�y' cs a as o o u o as �a o c 3 CLc u u u u �t .AO .S5 V1 u -0-0 U a +r'oi� •� ... ` O o o oo as m a m aC a. m a aa. o magma m m o urn Va u m m a tti. m m a m m m m m o' oL w v m m iv vi N In ut do In va In In " a Pi. CL Cl, O a a a a -0m m m m m m O ut > > > > > vi rn In In vmi va d/'a YJ1 U C C C C C 'Yi 'w1 a a s a 'am a 41i u U m u u umO -2 -2 7 i 0 w ar a %r a 'rCr m m V u u u u u m m m M .--I UU S.r C.P U U.. .-. ».... .✓. 4+ w w > N N V w w w w w q O ,.� M ut 'n ea �a ¢n .� .--i ti .--i ti ry v v w m y iv v❑ v 7 7 7 7 7 u u p�. p' O'' w i o O O O 0 0 7 7 7 0 7 7 7 7 7 .N N y y m G w w w w w c i O O w O O❑❑ O -. •� rn in N O w r0 O O O j,,� M1wa O O.U', M,,. `', r.�j u u u, m N OEE E N,.S j �,� a 7 a a a O a a 0 0 O 0 0 0 O p. v w..,.o •� .� >. w a a a a r„ 'i do do 'o ~ o o' o o' -2 -0 a a a..a .� w .' D_ «,_., u^d w w❑ c c c '.... c c, - is U ,w, U u U w u U aw, m w w m a -+ a' ? 7 7 w❑❑ w 0 0 0 0 o w u E E u �--� �.-� `~ u 7 a j a a a m a a m m m m m N `1 tir m a w In E E v va w a v u v v u u u u u a.. n,. a w o` o> o > c c c c� c w w a a c c u w ecir aria w c7 f3 o G'r 4 c �h4 w m m m m v m m v v v v� C ❑ ty 4 ❑ ^. m y L L L L w L L w w w w w c m a a m m .� � D .� Q,.', 'ray, �..� � E m m ut ut rn va ❑ do rn ❑ ❑ ❑ w ❑ ❑ O O in r`a m` do > ., C w c e OC c Kr c •.0 c n a s a. a �e o o uro ° o y w u u a C va C N U v Q U tia: U U q 4^1 U p tim wa u+ as '0. O O CY O O Sr 47 O 2> O O e 2 C Vl m vl C w m U J m m m a �0 S7 d 10 ,i"p m m 7 mm �.. SS. CL gip, s O. a0. C m VI VA VY e✓tl ✓0 ro„ n .- .. n 0^ .- m. m m of p VI U1 m m U m v I u u u U w nv V U u �, O ,� D O ca,. ca. a O- O O u ca. U y t:a. w cu w ama w Y y ,2r w . i s7 as as .t'S m „i5 , .a � .xa CL as N..w. m.0 do in in "-: E n w w D. m m c'ar >- a. >. aT > m m °Z > > > > M m a,re m r.ra ava vs irr v v w c c N 0 O O p ❑ ❑ "' ?� 2 c w ^' rw N r^cp rrr �ti, m � � +�°v � m wra do do V) do tin +w voi yr e rn I k,^ M. a G1. Mll m m a a s r e. L 47 U L Y N w w -,u L w L asp mqM m m N4M A� m m m m rrY FkY v m u m am u w a u Q u u Y¢¢ w L .- .- .- .0 ¢ Q w p y w w w w w w w w w w w w w L9Y C C C m d `! ,. ❑ m J > > > 3 m ?` :, m ?" } >• 'Y T '?* >^ > Y ."-� > rp O m > !_' > > ui C1. m m U .-� do VI Vl Va Vl 3 m m ry py 3 T T w=d wWd d"aq - ,,c w a a a a Wit. w w _ :: _ ,w- :: :: «% :: °: -W •� °: °: .w- Iw`v m ami a am) m o¢ c c¢ ami ¢ a¢ 3 3 0 Q acr M aj w Q 3 3 +' cc z m m m v v v E E E E E v > > ¢ > > 3> n> 3 c^ a n> n n a D >> w w w w w >>^ n v n u u-) n n u n u✓ n m u n C C't%1 Vl V1 C C C>> m as w m m m A•+ > a> ° > O o n n m n o v o g^ v 3 0 o w p 3 m m. - 9 3 0 o r c 3 a Ic c "e e w c c c¢ m m m c v 'iv m f 0 io io a: c .-gym dti. m rcu m'�w w aw a w a pr w ad ur try E an w w as ,E E E E E''E E E E E E E E E E ^ 3 E 3¢ E v m° w E 3 E E y> p er > >a cs w w> w w w w w w w w w m w w ar w > '. c c c a _' rag as sag aaa A , 9 aw 9 as , c' w Mo awa and C0. p> p> i5 X O I!1 O> O O r*ro N� O p .O, 0 O I c7. ti'tL a a, 0. O m m p �M uw7 m m M M M R1 m m m M M O J 7> >^> >> m y r3O p ICk �3' . C m C c C. c V O O O vui u m m CL CL CL O. D O ai m m C m m m m m m m m m '. m m m m ¢a E w c w w w v w w w w u u L� u u' m m dy 3 p N p - N N C N N N N_ w w J - w w w w w w w w w w w o II"X Ip '! - m •m 'f0 N IO 10 f0 w w C iY. CL EL airy A+D"1:. J J •' D J J J J J J J J J 22> w w w w w' w w H F- a ...� Q Q o o ,moo` o o` a } m m m m M m is m m m m m m m m m a ,&0 .dd O K K K m K K A C m L tL ,! �', A L L C7 L L L L L ,gyp ®.. �, L L ,(p L '.... L L L L L L L L L u L L L H> 2>>> H>> >> U N y .ur yu, u u y w` w D KY.'. O, p' y ak ai u u� u u u u u u Y u u u Y y U -.,w� -' v v m m Ce, m m „V%� m m m m m a&. CS.. m m m m m m m m m m m m m m m m w a m� 11, m m m m� m m o m m 3 3 N N 3 3 3 3 3'''3 m o 3 0 � 3 3 3 3 m 3 3 ar 3 3 p o > �o�2 a 2 >a 2aa o oaaaaaaao oaa ¢aaaa'aaa¢a¢aaa '� v > > > > > v > '> > v v o w v v v a v :. v w 3 a w w v v v a v w w w v w w m f`0 E N (` (` m m % 3 j m m VI m m m m Q J m m m m m m m m m m m m m m m m O° m..,� m °° v v v.........v'� v v m v v m.O° O° 2t 2 m .?: m...... o o 2 2 m 2 2 2 2 2 2 2 �....2 2 :E 2 2 a > m lw m d LL L) LL u > Lw li m,,LL w > > m a. a > > m > > > > > m a a > > m >'> > > > > > > > > > > >,> m N In N ',., l/1 N m m 2 m m f`0 m m f`0 m m m m m r`0 m m f`0 0 m m m m m m m m fu m m r`0 m w w w v m w m `w w m `w w a`j'.. w w w w w `w w` w `m m` w..... m w w v' w` `w w `w `w w w v'....v v 7 v v 7 7 7 a 7.7 a 7 �.a a a a a a a a a a a a a -o -o a s a a a a a'a'a -o a -p a a a a a a LL w w Ill N N J LL .--1 J w J a LL w w w w LL ti w w w LL w w w w LL w w ti w w LL w w IN w w- Ii w w LL w LL LL J LL LL J J J ".J LL J LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL 'LL LL LL- LL Vl VI V a Vl !✓,i. tti. a d a Vj a. a Vj a a. Vl VI 1«ti V} q✓9 Vi VI Vl VI '.. Vl ul VI VI Vl VI Vb u'ii Vf VI Vl V1 VI VI VI VI VI V1 V 4t4 4/W VI Va VI 7 7 7 W 7 7 7 7 7 7 7 7 7 0 7, 2 7 7❑ 7 7 2 7 7 7 7 .., ❑, 7 7 7 El m tD N a to m m M A,.',.V m I� C O 00 M m to m l0 I� m LA m O N 'M-I VT m m lD 'M-1 V} n Il m VT m w a � to N m lfl ea4 iA m w 0) H Vf w r� �"� N ''... a/T a N 1� W Vl m N a l0 Vf n M l0 1n �n N Il Vl N w Vl n N. w 'tN a O N lO O M m N m M� N O N 0 V1.'.. LD 00 I, V M, O m n N V) m m N M VT T Vl O a to v V N H In m a a N, O V m a in a M 111 a ins m H m a In, v O r� n m m V In m Cr a a In O m a N a m m a V} m a m a VT ;tO I- In iA n LO n N m 0 '', O In m m r� a m �'-� n m N m O V t m m 4 V m N a ID n a T''...N LD n m ''... N m m m N O O O O O O O! O O O O ''. O O O O O O O O O O O 'tN O O O O O O O O O O O O O O O ''. 00 N O O O O O O O O N O O O O O O O O O O O O O O O O O O O M O O O O O O O O O O O O O O O N m O O O O O O O O m-zi V1 o0 N m m N V a In m lf1 V l0 w m lD a O N O m N m N V w m w Il N V l0 m m n O m I, N m ID V n V V w ID w V N In N a m O M V Vl In N N 10 1l l0 LD n O a V Vl N M a a a a a a a a a a a 4✓'h to in N 4/? Vl Vl V}'iA 1/T''.,1h ...� N- N ..... 'A 'n to N N 'n ®.. th V1 an 'A N V1 In 'n ... 'A VA N. N, In 'A to t/! Yn n to to 'AIn N 'A V) VT In i/Y in N LL LL LL LL LL LLLL LL LL R LL LL 0 LL LL LL LL C_ LL LL LL LL LL "'. LL LLC7 LLO_ LL N❑ LL 0_ N❑ LL ::I M❑ LL LL M❑ " LL C❑7 U� N❑ LL 0_ N❑ LL l:J T❑ LL d M LL C❑7 LL C❑ LL (7 mT lLLvJ) LL�n_ LL C LL N C❑ LL M U❑❑ LL rn "C❑❑7 LL D❑❑_ LL LL l7 O 0 M m Q) N N LD M C7 U N [ lJdm _ LL M Mmm ❑C. ❑ 0 ❑❑ ❑❑❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ J J J J J J J ❑ J ❑ J ❑OS J J v) oOf ❑q V1 N� � ❑' Q � � Q � � � D � Q J J J J J to VI N V1 U U U U U U❑'❑ ❑❑❑❑ D- V1 Vl V1 Vf U U U U U V v u u u u u u❑❑❑❑❑❑ o 0 0 0 0 o n 3 3 3 3 3 3 3 3 3 3 3 3 3 3 y Y y y z z z H H J F J H J H J H J J J J J '. J J F- J - J J' F- J H '. J J H H H J I- Q c Q¢ CC c Q cc Q¢ c cc Q cc Q cc Q cc Q¢¢¢ cc cc cc c Q¢¢¢ c c c G m c m cc m m m m — J C u C u O � 0 a 0 o o :3 3 .u. a. a a o o n. > o n_ a .a `u O_ a c o u a c..0 O A 'c C C .0 •U o n C .0 �" o c 0 •a c o a a a m a C u a c o u a 3 a: D _ c c O O O o o n o a.. a a `^ V1 a VI Q\\ L L ` .Q L 'n u\\ O O u p O a .a a .0 a> N t > vui .N O C O L L C" O_ m o a. a o C in ,n a.. n C, o \ a C .a `u u` c o ,a `u > j o ate+ `o vLi o .Q vai v�i a �n m u M a a a s a N a a C �; Vl N a Vf a>> n s a n J VI vi Y m \>> n a o n\ cn a. u N y. Y,. `o u N y, `o m N o o_ m o- a a> in �n a a t o �+ 0 n a e o e- c `u w a a c `u y i y O o r 0 c m c a o U 0 a c n o a a a m m m w v v w v 0 COL c o c o a o a c o a `^ '� O `^ .o U o n...... o a a ° s a a. a a a a o o^ u a .o � a a, a^ .' ", -> t a w >> w a J J 7 a.. n U U u n; V7 U u a>> '^ u o m a J a '^ n O a In > > U U f6 o U o Cl, vi C C o a. w C la m .� u C a) u C u C u C u ._'.. 7 -O 7 -O 19 m U ._ O 'O f0 m O d O d t' O t0 m O 1 {' O '., V1 C'.... VI C t+ O VI C u U u>> m 'O O V O m v) U ._ io O a J U o U n,: J w > 0 0 '-' w >. -- -- m O O an m O v) v) n a a m m a a •o o 'U a. n o m m D` a` m m a >> �n u > y N 01 w m w E w u w m �....� o_ a vi �a m m �+ a` in m m m m w m a '^ w m w m a U a '^ U a m ut �n m ut ro m m m ,n w w u o o o >>> ''... m m m vi. w '.. m "''.. m vi 01 in w vi w u w v�.........'n w u > O > O u O m N m ut m V1 m N m V1 v m N m N m E a m E w •~ •� w ❑❑ ❑ Vf Vl Vf ul N -0o 'g 3 m>> N m D_ L t6 m a `m ` m a) w m m o v v v v v w ,. w .. w w w m _a C '..... w m v U C u C u, C � U C u C w. w w w w m '.. a1 > y -D J> r6 w w >>> a) v v 7 v O v 7 u C v J v O 3 u J> u >, u 7 u a >> y) � 00 a w w w J U C O u C O U" C J u c J u— c aJ -' '-' a) ,,..0 J am— w w 7 O "6 3 V O J M u C a � N M a u C �. vi N u C O. u C �. u C �. w C C `. C .- C .-" u C `. C .... •�,'. •� w w> E E E "� - > __ > u > u > u C .0 > u > U �. U c c'' u c u c a u c �. fa w > o- w o O w> Y a O v O > m °; ''. `. a) w u '> w u '>''> w '.. u w u '> w '.. u v E a) w E w v fO n v w v u •N u u w ❑ u u > w p w p w p w u_ w p w p w u w u_ w u w u_ w u a w u •> u > w u '> m 0 m` 7 7 p uwiCU .� 7 p w w w w > w w m oa m L w c c c,,❑ N N a > a a a > >>> >> o w❑ w 0 7 a 7 s a a a a 0 a a O❑❑❑❑ E C m C m E O O O ❑❑ ❑❑ 0 0 0 w p o o❑❑❑ w w w w ❑❑ w u O 'i ❑ u wwi O N O O o> v O O a a a a a w, �:'',,. c o w m a a O a O> D a O a O>> -0 -0 `� 'O � a a a a s •> '..� x p .� >❑ O O ❑ V V O V o w 0 w 0 .� 0 w 0 w C w 00 w pa a vwi C O O O O O O O 3 O O >> O O O O O O O w p x w p a u w u w O O a>>> O O O U>> O O w i_n a) _ aj aii _ vwi _ O c N c w u p O a s >>> u a u u L) u u w w w w w a LO c a 0- LO c a E u E u u u w m u u E E E E E w o 0'a a .. w d d o U 0 U 0 U -O w 0 U o U v aw+ v aw+ v w E v ✓ aw+ E E E E E X o u Y U L Y X o O U w L u L u v v o U w v v v y v `m a a v a a o v o v a as a m >>> � N v v v v v v m u_ v N v w m u m u_ v m _ v v o_ m U a m u v v a v a w a> w U v a v a-� n C v `) n C w m L w m L m L m L w ❑ m L L C O C O C O C O G O O > ` w y n O w L V1 w L Vf w L VI v w ❑ L VI w L Vf v w ❑❑❑ w w C O❑ w w ❑ C O C O C O❑ w C O C O U Q m L V1 Q U U Q Q C U C C C C C C C C C C C U Q _ Q w L U m M rl C C C~ c c C w O O O O O O O O O 0 0 m w w N fO w w w C o C 0 C 0..0 C C 0 C 0 C 0 C 0 C 0 C 0..0 C C a u u .0 u u u u u u .0 a a n a a n a a n n a n a a a a a g g u a v>> c c v c c c `u u� `u� u `u `u `u u u� u aj v w v a �n v in v) v) > > m M A 3,0 E E f0 3 w w w a a s a a 3 0 0 3 3 0 0 cc3 o w w cc E E E O J 3 J O 7 3 O J J O 7 O VI d J �n Vl O N al w G f0 al f0 N fa fa fa �0 fa 01 N 00 Oa G w w w V1 U In Vl V1 Vl Vl VI V1 Vf Vl Vl VI Vf N of 0 > C O C O > > C O C O a O C > wC a0 0] !0 m' N m m m m m a] !0 10 fp f0 to a] f0 f0 w c-1 a] mw m m m T Al > Al > > > > '... Y > > > > '... > N > M > > > N > N c > u c C u u E E c E E E E E E E E E E E c u u w w c O 2 X X ci X ri X N x' N x [n X x X x X .x X N '.. X X X X x .x X w L X X• O X g O O -0 O U O O U O U O U O U O U O U O U O U O U 0 U 0 U 0 U O n•> d aa; C as C a w O w J w J o L 0 L 0 0 la 0l0 la L 0 L 0 D 0 Q 0........0 L d 0 L 0 L 0 L o L u N o L o L a a �n o L a in a a,> �n > �n w w w a w w w w w w w w w w w w w w w w w w w w w w w N > M m m ' m m m C C ..O C C C C C C C C C C C C C C C v`Ui "o C L t U L u L t H L H u L L L L L H H L L H L �-- H L H L L t O O L O L u L u u u V V u u u u V u u u U u u u U U U V O a U N O n > 'n > 'n O a O a U N V N 'n U m U m U N u m U is U N U is u m U m u i0 u N O a a a n U i0 U m M N m m N N m m i0 to N N m (a m N N m N f0 N 3� �n a 3 a a ' a. 3 3 3 3 3 3 3 3 3 3 3 3 3 Cl a¢¢aaa"aaaaaaaaaaaaaaa Qoa o n°aao oaa naa¢aa"aaaaaa w w w n;o oaa v v w v a w w ca v la v a] a N v fa a N v a1 a N w fa w m a al v f0 a la v al v t0 U v al U a Vl U U w N v C' f0 V% w N w N w N w la a] v fa v fa w al fa la w N a VI U U v...... v a. N N a1 la al m v' 3 v' > > > > > > > > m 1 > D_ m m d d > > m > > > > > > > > > > > m O_ D_ > > m > m > > > > > > F > m > ra > F > > > m M m�� - ��� m m m m m m m `w ''.... w w w w v w w v v m w w w` w `w w w w w w w w w w w w w w w w w w w w w w v w w w w w w` w w w.. w w i i i w w LL LL w LL w w LL LL w LL w LL w LL ".LL LL LL LL LL LL LL LL LL v i a w LL LL ".LL LL Vl p Vl p Vl p LL to LL VI p VI p V1 p Vl p VI p V1 p Vl p Vf p VI p V1 p Vl 7 VI p N p Vl. Z) Vf n Vf p VI 7 VI Z) V1 p N p VI p Vf 7 VI p L6 7 Vf 7 Vl p Vl VI 7 Z) 0 7 A p VI Z) In Z) VI p N VI p V1 7 Vf p Vf Vl p VI p VI p VI p Vl"'. 7 VI p U) p w m w m w '. m a w w m v v a m w (o a (0 v ra w m w �a v is w i`a w m a fa w i`a v ''. m v m a O w m v m a '0 w `m v m a f0 w `m w v m m v O v O v m v O v ns a mm w v m v 10 v f0 a m w 'o w v a w v to ro f0 r0 ntm ',> > > > > > > > > > > > > > > > > > > > > > > > > > > El m m� N� N� m� T� H. N� H O N..m �Im m m m r " H ��w�wIw LD n n O O M O' V I, c, O ci �'ul ul lrl ON N O N N T '^ `^ "^ `^ `^lIIA I,,I�,II�I•�II�. 0 0 kD M w r- oUoIN IN o m O O 0 0 `N" �I O9m .Oo rcOOiIa IVOOi IOI o^M VOOI'�0 o °00' O op O�v�.O -I-1—II"0 l,�ll�4II�krNv� ,/� a �m U). II -V� 1'. ,� II � III L. w w w LL w Ly w LL LL w w 1.1 w LL w LL w LL 0a 0 a" ci 0 a 0 a w LL V,' a' w w 0 a 0 a w LL 0 a 0 a 6 w 0 a u a w w l.L w LL LL LL w w w w w w N N T cn C7 a N N T T C. d w M T 6 d N N V a N N m T (7 d N N In m l7 d w m' m l7 a (7 a 0 a Lh ` O c-Q ❑ ,, O 0 O ', ❑ ❑ ❑ ❑ ❑ ❑ ❑ , ❑ ❑ . ❑ ❑ ❑ . ❑ ❑ ❑ ❑ ,,., ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ N N . m M U d N N M ❑ ❑ ❑ ❑ ❑ ❑ J J J J J V1 VI VI VI ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ J J J J J ❑ ❑ ❑ ❑ ❑ ❑ U J J a a a a d a J VI lA ... V1 N J J J J J .. J d d d d a a J N I, VMI IY% ❑❑❑❑❑❑❑❑ ❑❑❑❑❑ 0 0 0 0 0 0 O a vi u u u u u u o❑❑❑❑ 0 0 0 O O O O a Yn m in Yn u u u u u v d uLn u m m m m m m m m m m m m m m m m m o ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ o ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ 2,� > > > > > > > > > > > > > > > > > > a > > > > > > > > > > > > > > > > > > > > > > > > > > > > > I ro. 0 xa o c 'S -'8 c c C Cr r 'w weA. a O. .. 2 ;O m0 o a wn c w ci p p 3 u u •^+,. "�.. a '^«. at 7' j O CLL P CAN' p u u V1 Cl a 'CA' A 0 .�,,, ,A p Y cl a 9A CL 7 7 _R 7 p O {y 7 CV.. 7 7 ,:% p.+9 4!1 4P'0 G' C C ,'t'' ^iA, ! CL 1 O 0 VI V1 urV u 'R. i' '"`... + O ry a 'Cpl O.. 0 0 Rn E 7 0 p 0 E a p ¢� 0 o st n w 0. o o o> j ^ ^� ^ o cu n R 0 c ,u XI > > U .� 0 ° m ° o fix,. a "a 'u' `¢i. "`' ez. Z " ti,. .`_' a a m = a m a a 0 0 CL o :, •� ".,-p' \ u -p p 0 m ° vi m a ut zo vl vi vY ;' '� an +n a a a m a a M m a ro M m - N r+v 7 '�, ur9 7 ',' O -57 `O ",� O. &A � ib. A C, � � � 22 M m eo ro ro ro m u u OCIL, 7 sx, 7 7. ut an a a a zan wn p can +�°� an vn 'ca. ca, M YOa m cn ut m o o °'..° �z ��" C c'° c �"•, •�....� ,.ae ,n N vl w Gr #.a w w.. m a` a m a cY 'vn un cL, O va O, ,O O O. O t° xra ,,,y- +fin M O kn 7' 7 w w w w w O' O O w� O 4Y'S V u eYp u O. C C K2 C to '0 a,. u a a ;,x a '�.r U u ^;o a a a a ¢'.. u tt7, . U 7 7 V 7 0. o g cs.0 vl VJS,. U p O O u7p u u y , u O C O u u u =• u u ^..•' ..... +.:. ;:.. .. u u u u u u- 0 m u a m a a` m ',.. a .� v v v IM g c c: c C c .. C. c c C c - o p o c c ......^.. — uwi uvi w v w w w ca m Q. a` m m a` m m m m m m a a m a c °: rum N N m❑ N w❑>> >> u u u u u m to m m m m O Ix arr. ❑ ❑ ❑ j .--i ti ti ti .� '> > '> '> > m M M m vn of in in cn a"'i m`pa a' a w iwdw ,'�° ,`�° ,M In In vc0i w v v a to '0'¢�i a ,� .� „. ❑ ❑ ❑ ❑ ❑ a aaa a 0' 7 0 7 7 7 w 7 C c w r"'.a 0 a''�a u w p p t'r .F`p aaa a s iy ry W C!' w w tDl N V 7 7 7 7 7 7 w w a a 'U a u 'p, a U u u %a u U a a a p a aM AD O O O O O O O O O O 7» ?w 7 1 ti 7' 7 C C C C C .... .«..� �........., A a 7 7 7 u 7 7 u u u U'u m ti u u u u v w w w v 7 0 0 o a o o a a a a s �_ L �_ �_ o` o —c m C C c v c cwm v `m `m > '> > '> > O U O O O u u u w u u w°° w.� E E 'E E E a .- v w v v v a 0 7 7 7 ❑ ❑ ❑ ❑ ❑ vti u nm. a an aPr aaa io a w u m w ro ro v v v v. w ,y w w v w ti w w ti N N ti ti ry, w a:i x: w v v u w w u u u u u. v v m m m m m m 'o U �v 'a '., a a a a a o❑ w❑ 7 7 ti .--i .ti N ti c c c c L L L w L L w w w w w C C C C C .-� �y �y O wy wy O O O O O O O O O O O a O ea O O w ut cn ❑ an ❑❑❑ ❑❑ O O O O O w` ui fii w o o ,° ° p > j N w N c v c v c c ,-�, . o� v l c c c c c C c c c a c c c a aaa p a a o 0 0 0 0 _° c° p p a p a a ca o f 0 a a a c E E E E E x x n z is n N., C C 7 �..� 7 7 7'U 7 7 U U'..0 u u v v E v v w> w' w w _ _ c wn c IN O. La. O. O. R. O. C3 a2 21 is ca.''.. y m m o o o O a o o a a a a a a a a a a aaa O a a F, «..a:. O .N.r u u U u u u y Y- w- 7¢ 7 7 7 uui rumY Wi wui� c O O a aaa u a w. u u u u e e e C e O n O E O O❑ E❑ as � a5�,ss .d� as .aer � �a ❑ ,�r sa sr � ss �� 7 w 7 w v w u v w u u u u 0 0 O,o o U u E u u u E u 7' 7 7 7 7 7 s m% .2 `m m `m m `m m m` � 16 v -o v u o u o u u U o u �V7 Vl M VI V7 M§ +JT T . . N. VI . L L L L w L L w w w w w �., c � '...- M as is M v uq +0 M M P6 rp ai I>'A Fa !a O ul C VI N Vl ❑ Vr Vf ❑ ❑ ❑ ❑ ❑ O O p, O 4� S7 fa L 7 d d 4Y J fXY w' w w as w w w a ° rx rcz ci eti s% a' E a7 ¢ a' a ca Q Ca. y, ',+>. 'a•. .^.. qs >°• >. :'.+. >�... i` C m C C C C C C C C c� C c O H SST HCL . O O s7' O O Cy p O O 0 0 C7' C7 6 a a ._ T pMrn *A w^N N N M u4 x^�d 4 M N N frvk m d*'4 c-I p uVr uVro aUn uwi w a; w y an w w w ar v. °: °; :i Y ;= L� ".fin � 7 w �a v v� _ a o E a cr 'ct a o �7, cap ca ra ass .c Q u w u u w 7 7 7 7 J 7 J :� , S 'J •S .S •S .S .S (a to _ V V U U rv�n 5+Y w^v U U 4) a7 8N V'y h Vf j H > > > > ❑ a>' N VI T VI VI VI VI VI VI VI Vf VI M ul VI VI O �'-� O ua y�ry u 3 3 as .. u .t to A OA a �a o cn �> ee C9 a a a s v vl c r E c v e + ',a^e v'I Y'n vo. 'c c a as >a � ace � acr aci � acu w w w w aY w w � > > ro E E E E E E E E E E E E E E E E E m s re a `' ro a `a a N N n M c> c C c C c w 0 w w w u w w w, w w w w w w w w 3 0 o w� 3 v � � act aer V4 per pa adp w w w Yip awb w w w w pa w w '... O .2 > O O .2 > O c°a m ° ro + w°a E w mn m pn ra rn ra c c•. a. a� >, >.. :•�... a. >.... `w a`a ae v v m c c c C c c e c C as c c c C C C C> 0 ra r�Y a. > m M .-+ +=e r+u av m m .•w xu "a "�"' is 3 m c m ro is a io ra +sn ma m m ra �r i*r °''� M M M rcr ra pa wa w 3 3 3 3 E E ,9 E E E .9 E m 0 w w o w w v w m v w w w cw w w o o p o o v -2 -2 vv o> o o 0 0 0 a w w ro w w w w w re w w w w a w w C u c c C c c c c c c c c c w C c m` m` Ct m w7 C pa dp pdN 4na tM '14 pYa RpCti as 1'Lp tc pa fiAp .iP � 7 7 CY 7 7 7 7 7 '... 7 7 7 7 O" 7 7 w w w w w ¢ p ¢ � '... Q Q Q � ¢ C C c c C C c C c c C c c cic r is m m m m m m m'm m m m x m m EL ._N K>w (>N.N2Ta2a,M, a OoOO� mmm uuUuuVuUUUuuVuUO 0 0 0 o O 0m0 j 0 0 5 o u oOoroo o° ea -C -C -C -C X- c -C -C -C S-- 2 2L K f1N fN a O O O O O O O O O > 7> w > O. -0 -0 M -0 d N d -0 ea M M N M fir., 3 3 3 3 3 3 3 3 3 3 3 3 3 3 2 2 T 2 2 R2 3 2 M a M- 0 0 0 0 0 0 0 0 o c o 0 0 0 3 0 3 '^ 3 3 3 3 0 0 0 V u V U U S.Y u U Q U V¢ Q Q Q¢ 2L c 7 N `1 `1 v p' O O m m m M m m m m m m m m m m m m ve u" m m `m m m m m `m `m m ra `mm> cn > '� >>> '� > 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 v7 a7 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 �° p7 a7 >,,> > >.> > > > > > > >'> > > > > m a a > >.m > > > >'..> > > > > > > >,> > > > > m m m m m m m m m m m m m m m m m m m m m m m m m m rto m m m m `m w v w` `w `w w v `m `m w vw v v v `w v w` a m` v `w `m w v `w vi vi m` vi vi vi vi a a a a a a is a a a a ''...a a a a a a a a '.. a a a a a a a a a a a ''a a a a a a a 'sn a a a m a>>> a w w w '.... v Iw v v LL v w LL w v LL v v v LL w w w LL w v w v w eN w w w w LL v LL w v LL w m v J w J J a w J LL w w w w LL w lL w 11 w w lL w w'w w w lL w lL J w LY J 1.1 VI VI VI u!"b VI 4rM V1 VI VI '... VI VI VI V1 M N'a V) V4 VW. Vn, VI v, M V1 VI V1 N VI VI to VI VI V7 VI m Ul N'L 4d1 a V1 a Vf A.. 6..- a Vj $, w w `1 v v `1 `/ d `l l v v w w wm3 2 m3 wm 'm m ro Ya 'm m Ya wm w w `Y3a m3 3m lw`m3 3w w`m3 m`mw wm` w"3w 3`wm`3mw `mw w`m m/ m`mw 3m 3 3 w`m 3 El ci 00 W N VI O N �r, VI N V r r1 Vl M N O m m O r c-I .--1 O V lD al oo LD O H O.. m...w w w w !-I M d' w w O O O lD r O lD r '. � al VI M M w V N m '. : al r L'i O m V 0 al r V O r 7 lD Ln N V r N M O M lD lD 10 al M m lD LD lD M M m tD a C0 �-i tD .--I r N 00 lD r O m� 4 al .--I M V al M V N LD a) a0 d' m w V r M m r m M r m m m r m r to 00 m M M N m al N N rl N N m r m lD r w r LD oo M V o0 a) N M ;T V LD m M d' rl H r 00 '... N m r M r m 00 o0 a) r r m oo oo r r r m N r M M N N m m M r al V V V M m N O V v r r .-1 v al -1 Ln v ui ai t-: m ri N V! i/T VT V} V} Vl- V1 V} V1 V} VT V? V} V} V) Vl V!'.V1 V1 Vl V) V1 V}....V} VT VT V! VT V} L1. V4 V1 V! VT N V} In'AVl Vf V) O O O O O O O O O O O O O O O O O O O O O O O O N O o LD O O O O O O O O O O O O O O O O O O O O O O O.O O O O''10 to O O Lq V O O o o o O O O'.0 O O O O O O O O O O O LO N r m m m r-I m w m * W al ID .-1 M m O Co M N Cl O M r to 00 ID N Ol to O O O O O O O O O O o 0 0 0 0 0 0 0 M N N M-t m o r r r m w m V m m m M m V o r V M V .-i '-I r m N M o N O O O O O O O m O O o o o o 0 0 m rl r-1 c-1 '•I r-I N ''.. N N M M e-I '•I ei '•I '... ci L!1 r O M In M '... lf1 Vl 00 N o M c c N Ln c N Ln f-1 C m M r o o '-1' N r1 Vl V1.. Vl Vl- Vf N 'n V} 'n N. V? V? VT VT Vf'V} VI.VT V? VY..V} Vl in V1....V} VT V} Vf Vl V)'.. VT Vf VT V? VT VT In V} lt- Vn 1^ Vl V? V} iA w LL LL LL LL w LL � LL LL LL LL LL LL LL LL LL LL LL LL w LL LL LL LL LL LL LL O LL LL LL LL LL LL w LL, LL w LL.w W a d M w d W a l7 d l7 a l7 ri. T a (7 a T a m a M oe H Ul d 1n a m o: �^ w LL 1n O m C7 d N N m M C7 0_ ry N m m l7 a. N N m m C7 ri. u. LL m m l7 a m m l7 o_ ¢ Z V7 w LL 6 �+ J J U LL F u a D❑❑ 666❑❑ 7 7? ❑ O O❑❑ 0❑ 7❑ 6 66 3❑�❑ > ❑ ❑ ❑ ❑ ❑ ❑ O O ❑ ❑ ❑ ❑ ❑ ❑ ❑ -) J 1n vl an 1n 1n 1n 1n m J > en vl U O O O vl ❑ d ¢ 1n CO J J J J J J d d d d d d W > > V1 O V) Vl VI Vl N M VI In > VI N V1 VI W W u u u o❑❑❑❑ o o❑ o 0 0❑ 0 0 0 0.. n a 2 '2 1n n v n v u a a >i 3 ro W 2 2 K z z D 1n v1 vl vl v1 vl In v1 vl 1n v1 vl vl vl v1 vl 1n vl vi v1 1n 1n vl vl vl 1n Q Q d Q Q Q m m m m ❑ ❑ ❑ ❑ ❑ w w w 222222 22222222222222222222 J J .1 J v J n i J J J J IA 'A n1l O o 0 0 0 0 0 0 0 0 0 0 O O O O O O o 0 0 0 0 0 O O O O O O 6) d d d d d d d d d d d d d d d d d d > > > > > > > > > > > > > > > > > >„ > > > > > > > > > > > > > >O1> > > > > > Y' Y U V m m d d y � '^ ''.O 0.... o 12 co m u w w in in w w w w 7 >,. a. n. > > w 1/1 u m w w Y N u u M u j w ate+ a w w m o o d a'.. w am C Ce r� r d' Y Y V7 N Y 1n Y a O m O o ,n mO 1n o '..... >, o O a d m u1 d vl c ul a V y v c w o cq M v c . m e O m E o ry O O c c o N0 c po w p ? O j O O w 1n M o o ? o Z )i o v ry m Q u Q a c c w w N c m m w m o ,o c. o w a w v o o )x )z o o > w l L E oa 1n X O _ O m Ln — C C C �C C M Y C w m w w w W U w U 7 w C C Vl d O �C Y ja Y d>> C u w w O u ° d w Y o d ° LL o C w y U U 1y U U )p U U U U U w Nua d�alN mup�oav�ua " o? auo u w�v aci� n� n 3 '� 1° 1n o o n a _o vl a Ln w w E E o y c 7 O Y O O U E O U U 7 O 7 N U Y N 7 w LL F C O > m u u U n `o ° u u d m d u u p '^ d LL w w O E o c d u > w a) M m Ln u 1n > o> j N a V N N m '^ O 0 lu w c w a c w v "O N d N N Ol L L_ _ L d N _ - E_ p> K 01 W U ~ n U c Vl C 7 C a V1 U Q c 7 7 C 7 E ~ y0 ❑ c H a n n o c a n w v > o a c o p o d o a w w w m o d d o d p° w w v 1 w w w O m o v❑ v d -- w w .w. v a3 o" y v m w c LL m y c ar ❑ E > 111 -O w w O m 'n in In Y Y O Y Y C N C w C N LL LL C ._ _ C C C m - V C •- C U U c U M Q w w u w �, w Q .a W W W d w Q W 1p m W LL w p w C w w O a d r w o w w o v r r> w `m w r w r r w o w y`w r d d r w v c °- E 7 m o f aLL as 7 o In C > C 7 c `1 C C C C Ln Ln C E w w > V N m r ` ❑ O V 'O VO O O O O O 7 C C O O O C C O N. O w E w c O C w m U 7 J Q 7 J W W• 7 y W C 7 W U LL w 3 7 C w r O r o w o r o r m a m 3 o r r m o m m r w o r m>> m m c E oo w E aa) w a oaO > c) c u c E u,,w u c u c w E w E u c c E u E E c..w U c E.....v E d p a E >❑ �_ c. '° °' o u o o ul° u o= o I o �,o > u o o o Lj o o o u o o o Ln c c w °,w E E o 7 o u U) � 7 L 7 l7 m D m 7 YO d 7 Ol 41 J ❑ a m m m m mm m7�m OO w vv uwac a Q707 7 '.>Q>¢ 7 ¢7QQ 07 Q.n„aQ❑ acww a.. vl Ev E a E d d E d E D d E E w d w w E d E w n; a w u c c p w ❑,m w E ❑ o O N_ w U wo w �O Q N¢ N cu U w _ w N N y0 u yo N o o N u v m LL-D C C ❑ C _ c -- 7 w 7— Q m' c c c w 7 d 0 0 w 2 w c 7 r m r m m m m m N N m ¢ Q w a L a¢ a Q c w c w> a Q Q w a w o) ¢ L U Q w G C 7 o O w E O C y C E C '� O O> w a) w 7 o C o K w w K K K w 7 C w K O O K w E U p O f`0 C ba N❑ N> ai d `m H yw` N> > Q w H N> y`w, >> N a> .>❑❑ > a E m> r y of >> o w �. u a c fO f0 C H C m C m m m r c m m v C v `I N-o-o N v VO �O W °> C 00 7 O C N2 1` O '> ~ U u -O a) w m w •- w w w w E m E m w w w m w m m w¢ w m `m °° 00 a p 7 7 c c oa c¢ w u c r m r n r �.r z o o c r m z 1. s c r r r a u w vl,� d w ,n n m > > 3 > > 3 3 0 >> 3 3 3> > 3 3 w c p w w ? 7 o c c `m c 'c 7� 7� c v v g c g g v.> c� g c c�❑ w � v a c cic E E� c�� e vl m v v v v Q ¢ m o 0 0 o o ❑ u v w w w w w w ;; w o > o c o o > > >>> v> > 2 m w° c m m m m N N E m m m m o -a m 7 E E E °p ` E m m> r`o 3 m 3 c m ' m 3 3 _- c •- c o 0 3 3 c m c c 3 Q m 3 c m m c w e dj-> w w c c w u u o v o E o f 1` E 2i E m o °° c E ° E o o r E o E E o r m c c o o m 0 o c o o w w o o c o 0 o cCU > > o. O > > m a m n, Q >> a n .a > c > a a o `m H o vwi aai c c N w o o~ c m c m 7 m m c c m m E ¢ o w Q m Q O¢ O v c) w u H Q o o U Q `u `u CO ,O Q o Q Q m u a u r o a 2 w w m u a 'w' ° w s w w w •- w •- a w n E H '- N H E" ¢- o u 7 7 u c E w w w w m m 7 7 N 7 w w O a 7 m J w= a Q J ^ J 7 o O ._ D 7 ._ _ 7 o¢ a s 7 J O O O vl - 3 1n 3 vl o' 1n vl 1n 1n m '� 1no v w` a w w ` m m w v v m m c m u m � cc v�ui \ `u c c d Q K H> m m ❑❑ U U❑ U F- d' ¢ d' K > t-' > t- ` m n a o w Q m r m m Q m u u L L L L L m m L L L L L L L m > °a > N>>>>> °a > o > 7 7 °a > n a 7 w, > 7 a>> n w cc 3 u Y y y Y c 3 c 3 y y Y y Y Y Vl `) vl a v ._ `1 N ` vl E a` a. 3 d\ 1/1 a a� a 'n •_ `1 In a v a =' G m m m m m m m C G m m m m m m m m 7 m m m m w 7 w J m t m m 7 m> ], �• > 1n w 1n 1n 1n 1n 1n w 1n 1n w 0 3 o c 3 m 3 0 3 o LL c w c> 3 a a c 3 c c °o cc 3 °a c 3 3 c s n n-D a a o > a a o LL o a a o o o a> a o o> L¢¢¢¢¢ Q '¢ L L¢¢¢¢¢¢¢ u 7> 7 > w> 7> 7 N> 7 J > 7 `l > J >> v U w w `1 N `l w N U U v v `l Ll `l `l `l Vl vl V— m 1n — N N V '-) _° — N Ln V— '� '� LII m— Uf0 f0 m fO m f0 m m m m m m m m m m m u f`0 u 3 u m v m° v -o �v v ro ai o w o n v m' m'° v °° m -o ° -o -o'° 2 2 m LL m d LL> LL m LL m a d` m) (u m m d LL d d m> LL m a.LL LL,.,d > Q>>>>>>> Q¢>>>>>>> a I`O N l`0 m Vl m m 00 m pa m f`O m m f`0 t` f` m m m I`O VI a w w v w w w'. w w w w w w w w a w w w w w w w w w w w w m w w w v p m v a v p v p'..v v a Div -o v v v v v -o -o >.v 1w m w w N w M w .-i tw J w N LL w Ln 1w w w i 1w w w a -I o w .-I N �i `i w LL ii ti w w LL w w 1i ii ii w LL w w �i 1i J-- J J LL J LL J LL J LL LL LL LL J LL J J LL LL LL LL'ILL LL LL LL Vl d N M d V d Ln d V1 d Vl d Vl N d VI N N d M Vl N to d Vf Ln d d Vl Vl Vf Vl VI N N Vl Vl N M N VI Vf VI VI N M Vl V1 w a v v v w v v w w w v w w m v v a v v w m v w v v m m m m m m m m m m m m m m m m m m m m m m m m m m 3 3 3 3 3 3'3 3 33 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3I3 3 3 3 3 3 3I3 3 3 3 3 3 3 eaaaa2:2i2aaa���������������I�������� > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > El .......... n O O M Ol N 1l'1 N O N O O M Ol tD Ol O N Ol N D1 O N V1 lD m m N O N N O lD Ol O D1 lD D1 <0 O V1 O N O M t n Itm InOMOlM MW m lDOMmlDalO M m M m m m m lD Ol M C) N M o lD '-I m n m c-1 lD lD N mlOMmm,Ol lD M O Ln m W lD N M lD M nulR!T01OlmlDMN00OlN m lD MNlDmnlO V lD m .-1 lD V N n n V 7 M n lD N M M O M C lD n V N 111 m Nl o N H zr n oo vi N O m N oo l. m h co n n cn lD00 n r V V M '-I '-I V c-1 n cn V Ol Ol n Ol c C I '-I V V Ol Ol o Ol n l0 V H V n 111 V fin o H �--I N Ln n H N c-I '-I N M N N H c-I N rn H N lD m of m N e•-I e-I c-I R Rl Ol V r-I '.... a 01 LD N ID In Vy VT V} in llT VT ) Vl VT'a Vf'vV1 Vy Vf SA"N Nh LM,,. Vy Vl VT Vy V} VY'',, V} V} Vy VT V? 1^ VY VT May +a'F "vl .An V? VT VT VT A^ V) _ oo o o 0 o o o o o....,. 0 0 a oF 0'..0 0 0 0 0 0 0 0..0 0 0 0'0 0 0 0 0 0'0 0 0 0 0 00 00 0 0 0 0 0 0 0 0�y' o 0 0 0It 00000D OooO gO G],. 0 0 00000000000000000 0000000vi000 0 O. VI N o m vl Vl O tl'O . to u•I O O 40 VOO' o O O O O o O O o O o O o O o o O O o o O O o O O O Dl ' H O O r, O n n M an a N N M!l '-I r O Vl N en r O' O ul N N M Vl c c N O O n r/7 N m a0 N N m M- O O N c c c Dl lD Ill o mO a-/ a --I ".., N Vl M c-I c-I a --I f^J'. M +q� Rl N '-I r-I N M N M tD , O M c) frl O N ti c, O '" lM0` �%V}II V*Il+l*I V*I V*Iv*I V}II VyI Vy%� a. I.L {, u„ LL W LL cry a [u. LL ,i lrA. LL �=- LL LL VI cL wJ. LL c LL LL LL,. LL O In In In a a O in l7 a W O In I'°" 'w• e•� arr y.7' LL LL as M p. w W 'A 1 N K LL N p I rc✓1 � sC m C N K &ry ..A W'" nt. �� Yrb u's Vl J J .9 J V7 LL ❑ ti. U U /7F. il. V7 LA � M4Ly « L4., d Lm W. ❑ �' a cr. > > vl In O. cn a LL W D.. u p Da ❑❑ Q Q cY f.'9 a s ,. 7 7> u'l 7 en ¢ Q cc `n �" p "•° LL U O O O a. � m vl wws ¢ aC m m �] ..a � V' O O O O O Q� a � a�'�"'aC Ur. Ovyn n a sNz _i t.�D �m uu+.n err On u pn. m m muUUu?t ,O� 222 l7 l7 l7 l7 L7 0 0 :r T- 2 :E 0Ww�a aLL WQ LL vh vuia d a ica q, aaJ Q. uv v ro wa .xan J n 7y c.Di.D.u .�> > > n. > > > > > '> > 7> > > > > > >' >> >a w w LL w E w LL n. v v c `o a i E c w E w w c O p H w. O w c w w O E o O C w w LL Z - Sls Z O w c O LL l.L w L V- w w LL tw N O w la) rx w E w E v E W c w c w LL E - C w >• w m." O w a)'2 LL w w to 7-w cu w w c� w E E w w w u w w w w E E c c LL w w m Q LL H ❑, w ID W w w w w w T F w w Vl r+ w c w O O E p LL t c o aa) , 0 E c �_ O v? E w w '., li F- c o m u ♦- w p E LL Q w E o❑ ta. E c w w O E r^ w w O w u W � E. 'S v. v ai.... c ,� w w I2 uo w e m w w w.... c w wr c E S u w w a c LL O m^' m E + c c w a` o ❑ c y� E O m c O D .� > E -E a', a o p m o �, N R p E u..E3 p c ar v a $........ '.w w o E. v N E O O w C w w N w Y C Im O c `1 O C O E' C cL N i'Y C lL w a o w 7 m oo 00 lw 'E�, O r w, pe O v w eg E O w LL Ca o o e ,ti y o O a v E w w E c w wE v w a w a E %x. o o O c w o ''i c' O w v m w c w a❑ LL w 0 c a E w w R I'` o as w cc_ro Cva O v w o pMI o o E ou LL E y u O l`7 N w cL ¢ C>Y ❑ W,y Y E o oj E v _Ea Y o LL a >. O. ❑ C d v gyp E Cy 4lN ply y, C a C'.: C7� 2 p C ~ w O ''.. cx cs w 3 N a o p❑ o w ca c wa 3 o w v[ ra w o O N ca w Q v w E E w R w w N w a o c E 1 .vvi 11 t- c a a c ci c mwi ,,, ❑ c C1 ._ c O qr' c O w V w o tU v w❑ E r N w m o e O a m o❑ a a� a E E a c❑ +w w w m c w w LL a w E v w E E w cy a w e c. a s a v c a s E w q c v LL w w a LL ca E o a u 0 w° E❑ c w v, E a a oc R l LL w a E O E u zwa w [> ❑ E a a n ¢ a a c� c m O c❑ w yr ro as c �a o E 0 o c v v w 0 c c a a a ,E a c c E c Q. w o E ms v c u O c c E 'o c o O O c ¢c7� c +� a O O m, li F a za� o c a~ w w O y w o 0 0 p u w ;� ma R o c a warn oe c O v w v t:. w ❑ p m c c E ❑ +. c w ai w c' o (: ,w- ° a v '[v w u ❑. a ) u o .- w O w `w w w >•. c' o, ma u' u O ._ .= v mz. c E m O w LL L LL Y is E 2 IX 4 Rp 3 M,.. w aw+ aw+ N N❑ 7 i.Y C4PI m� m pYM7 w 1:Y > O "R9 In �7 w m O E Vl N O u c h.,J' 4a c a C N K:a. w 'MIA p L ?. C > C dm v 3 v ° o cwt c o c La o f>> c w c a c w E E o ar cy a m a w U `1 m a .:t Ayp U n n o n E w U R mo to c U v n w o c m v a w ar u a p ac w w v w u ro O E (D O n a ~ Ey R I- UI E..... C C C C. a C" C (,Y a d E E U" R 'R, m W.1 C Imn p C . c C c IE E w w u ;�».y y m m= O m L O aF w aJ W w m .. c; u Q Q 3 R C w m .&.'r w =a w mu w aaa w o c o `o w> u u w w n c o o aw I o c o c E E �o v w� �� � n O rca. E E E E �o ma c c p c a u O m m 3 a a s o In ` av o o w v w vry R m ,, O w c^ o c u c w cr c c❑ Q m c E� w cu a a m "' .0 O O W W9 M C C m w u U C C m#M1 ,' O m w w w &Wl NM m m O N aw-, w O +`�' ❑❑ C C >> w o O O m w❑ C7 l7 C7 m m m m m m ;a:a u a❑ L L .w. 3 a u u u m m u m R_ r^ ra UL Gk w wn E �w m io " N wn wn O, cL sa, a- o vw.a ww5 R R m Ri .- L C H O O a U w w w R m w H N U W ',.. W W m w w C D :7 'O', d°rl C o O U O m m U U w C qp O❑❑ as kkll - .0 Cb Vl V+ E „. O N 4Ay NI. O El v v> y 3 E `w c, a a a a o m` ¢¢ o o c> Q •`-' m cm uca O O a O u u 3 o voi c In In S o '� c 'o v v w ro `1 `1 `l o m v fO WTI .' =a :S' y w C ` Y Y O U �l O ` `/ w C C � +�! m �U w 0 � yea aa.r l7 C7 l7 l7 2 a U Q m w D•,' az O O' O a a a ., an W W a vy vr� c I- LL H 7 R R R R R m m L L L L L L L L L L L u L L L L L L L L L L L t L L L L L u L L L L y -m y Y .u. .0 c3 c 3 Y y u cc 3 cc 3 cc 3 y Y u cc 3 y 3 y u �u Y u c3 c 3 a ¢¢ 3 Y u Y cQ3 c 3 c 3 ---" Y y Y y u Y C C R m f0 G G G R R IO (a G R+ m f0 R m m C C fa C R fa R R G m C C !a m R f0 R R 16 R m f0 R 3 3 3 3 3 3 3 3 3? 3 3 3 3? 3 3 3 3 3 3? 3 3 'oI>slo 3 3? 3 3? 3? 3 3 3 aaaa`aa aaaa aaaa a a¢aaasa <�'<<<a -;tom, a aaaaaaaaaaa L L L L L L L L L L L L L L L m a v v v v u u v w a u u u v v v v u v u v w v v `I u u w u v d v u R R m R R R ja m R m R m m R m' R R R ja R jp m R R R '. R R fa R R m R R ja m R R 19 m R m R R m R R m m R R m'...-76....m m m m m w m m id w m m m m m m m m m m m m m,F m m m m m m...m....'w m m....m m'm m `w m v v `w v w` v w a a a a a is a a a a a a a a a a a a a a a a a a a m a a m '•a a s '.a a a m a a a a a a a a a a a a a 11 lL ILL 11 lL lLL ll 11L LLwl Ww LLL1wwww1w1LLww1wmlaa)N Vl VI VI 4Yy W^I N M NMrb Vl Vl m VI N h Vl N Vl VI N +s'i 4i VVV'7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7� 7 7 7 7 7 7 7 7 7 7 7 7.. 7 7 7 7 w w lu Nf0mmm m mQ m fO m f0 3 3 3,3 333 3 3 3 3 S 3 3 3 3 3 3 3 3 3 3 3 3 3 El N O N I� O 01 H V O O D1 N lD I� N M m V lD 1� N T O1 V' M M lD O1 V O M Ol CO I� Q1 N V1 lD �--� lD I� t1'1 N lD 111 O1 O lD O M m m O m H H lD Vl M 01 m 7 M w 1, H H V M 00 n H H Ol lD H 1� n a0 lD O 00 1� Ld DD l0 n Vl N H I� lD 7 N N N W 00 T N Ol Ol N Ol Vl N Ol 1� H Ol V l0 W O 00 Ch V lD 00 O W Df M N 111 Vl m N lD D1 H m m H 1� H M N Vl H lD m O I� n ;t n O N n 111 r tIl m O M O M M V V1 H H m m V lf1 H H N H H '... m m .m-I .m-I V V7 O O m V C N v m m H n m m n m m m m to 0 w N M Vr VT In V'M in V? V} V} VI V} VT V} VY Vl Vb WA ''WA 'A VT V} J'F Ll tIb FW& 'J'J 'Mh �dFi Af"b � VY. V1 V} V} V} VT Vf Lw V? VT V} Vf VT Vl V1 V! VT V} Vl 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 o 4-0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 V 80 O 0 O O O O O O O O O O O O O O O O O O O O O " DO O I O O O O O O O O O O O O O O O O O O O • O 0 0 0 0 O O O O O O O O LD w H M 0 O l m H M m O m M V1 m w w N w M N V .-� �/1 m m V w lD m 0 �'"� O N• m O O O O 0 o O O m O O O m M V) Vf H N m M m Ln H N N H H m O H-zr ul N Ho Hw w N n o H V t N N V1 No '.. m N m Ill Vl O Vl O O N H V '... 1� ti H 0 lD H W M V H VL In R.+4 V/ V} V} V} Vt V! UA V} Vl• V4 V) 9.f%- q/1 '+wA VI V} V} VT Vf V1 V} ".CCb Vk V! V} SpA VA V1 V1 VT V} V} V? Vf i/b V! N Vf V} VT Ut V1 V} Vl...V}. Vl. w LL LL Vf � LL a LL LL ILL N a � N LL O LL a LL LL VI N❑ d LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL " a LL a V O u- LL LL �- LL LL l7 a l7 a " l7 a C7 a l7 0. M m � a l7 0- l7 a. (7 a l7 a l7 a N N m m l7 a N N m m l7 a N ry m m (7 a w m M M l7 ri. H � ❑❑ 0 �❑ O O �❑❑ � 0 0 � 0 � � 0 � 0 0 O O vi a u 0 ❑❑❑❑ 0 0 0 0 0❑❑ O o o o O cl❑ o o f� U O c C a a ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ J J J J .J V1 �ry N cC cc❑❑❑ p❑❑❑❑J N Vl V1 V1 J J J J J a a a a a a U V m m C G J J J J J J J J N VI VI U V V U U U ❑ ❑ ❑ ❑ ❑ ❑ O O O O O O a V5 a a u u ❑...❑ ❑ ❑ u u u...0 u u ❑ ❑ ❑ ❑ ❑ ❑ a �n v, v� �., v� V7 ''., vi �n �n v9 o �n vi �n m �n H F 1- f- f- 1- F- H H H H 1- 1- H H f- 1- > > O > > 7 > > > > > O O > > _ > > O O a m a a a a m a. '..m a a a a m n. m'...a a a a a a m m a a m a a Of m m m m m s m m m w z m m m m OF OF C C C O O O a'a O a O U u 0 o O• o 0 a J 7 U a 7 vui t t In t' _ a U \ \ U \ 7 o o C 7 o U O O O C u r t N t vl a a',. O V1 n C v7i °a. a N a. �n m a ✓ai v7i o_ Y a,. a, 0 Y a 0 O Y o O O C C `u `u p_ C `u C 0 V) a In a ,° o u a. OQ. O O o u t in Ln o o u a o u n v v a' o" O" o `u `u •`u '^ a V7 Vf " O O t O 'u Q 7 a 7 a n ' c o- o o vn Oc u v m a a °a Co a •u •U `u `u \ a: a o '^ a a c o O O Vl N N VI V1 a VI Vl m Y \, a. ° Z m a a IwO m a N N N 7 N m m n o a o o m `^ a t u m �n �n w �n �n w v v '�, y v ,'�° t ,� t N t ,� > j '- - u a.._ o L a aaa waa o 0 o v v '� n ma Cw w w 7 w w 7 7 7 m 7 7 w m a CO a.. CO a' CO U U -o m U a V1 Cu a a a u a a u u u u u w a w a . n.. a, . Cl 7 7 7 C 7 7 C C C C C > 7 > U j� V f0 [0 V1 f0 f0 N LLu u u u u u= 7" m u H - 7 " 7 7 m m a a m m a in vi w c c c w c c w w w w w caa `_' a vi in �n �n in vi (uc- c u" c u u u c u u w o c o w o 0 o m m m m m m 41 01 �i m E " u u 01 w u u w w w w a>i > w u w> m a m a m w"~.OE•>>'>❑•g.�❑❑❑u❑.......❑`-'u>..�mwwvvmm `m `mw vw.........v7ai mCC..... E Cu e w E w w w H w w H H H g H H o•w w v o a a a a a a w w a E O T Cw H ❑ ❑ ❑ ❑ ❑ w p ❑ p 7 7 7 7 7 J > > 7 7 7 7 C 7 7 w w m o w w H H o o 0 o p o o u H H H u u u u u u u H u n u u u u u u u c w `w M w C o 0 o a °` o a a s H a a .� ` .> c C c C C c �`p o o �-c. 1O C `-c. w �-c. 'a '� C Y O 7 7 7 7 0 7 7 w w w w w w w w> T O _ E o 0 0 0 0 0❑ w °❑ ❑❑ O a a a a s a w LL w C a N 7 7 7 U 7 7 u V V w u U H 3 7 3 H H N N m H H H LL w w 0° m w o 0 0 0 0 0 0 >>>>>> > >>> > w E a u u u !^ a s o w w w w w w o>> o w LLLL � i? u L c> u u u w u u w w w E w w v m u m v❑❑❑❑ o❑ H H H H H H O H'',H o w E WC w w LL c o c O o a -° a m a a m M M v m m w a w H H H H H H w o o° °1 0 o `o `o `0 7 7 w w a 3 a v v v u w v u u u a u u 3— v— 3 E w .E E w E w N N w° m m m m a w 6 'v a v v o a m a o —oo 0 0 `o 0 o j w w a � a a s ° a a o o w >' LL +' H E E w ._ _ E❑ L L L w L L w w w C w w m O L o m a s ° w w H O N '', E E> Vf VI VI ❑ n VI ❑❑❑ O❑❑ w N h N H N h H H 7 H 7 7 7 U 7 7 U U c w v______ >> o 0 0 0 o o O a E C C w d.. _ v O N L L O L L U O U U U w U U w w w O O c w c c c c c c c c c c c c a c a E E E E E E w Y Y w "❑ 1 0❑ E a a o E o 0 0 0 0 0 0 0 0 0 0 0 0 Y 0 «u o w v a v v v v � a a a u v w u 7 w c c a c❑ v I.� w f6 a a a a a a> m m v > w v v L_ c w w a 7 a a a a a a a a a n a a'a a ?� 3 `m m m m m m m O E E w O O N a L L C C C C C C L L L L L L w L L w w E >, >. E° c r y c `u `u u u `u `u u u `u `u `u `u « Q `u Q y O O O O O O Y Q¢ y in ❑ vi in ❑❑ w a w a C 7 7 7 7 7 7 7 7 7 7 7 ''. 7 `1 d C C C C C C 3 C C C C C C C C C m C E w w n' ~ O o f V2 f L2 f v1 ------ i m� m � O O O O O O � m O _ O O O O 0 0 O O > > 3 3 w p>❑ p w ,� c a o -a w w m w w w w w w w w a Q 3 w 3 Q a s n, a.. a a Q a Q n.. n a. a a. a a n oa c ❑ w w v w w w w w w w w w w w w > w •u `u `u `u `u `u >> `u ti `u `u u` `u u u u a `o a ._ 7. N c a E E w w > > > > > > a > > > > > > j E O _ w w m OwC a a M M H H N ry m M H H N N L L-0 L-0 d -D d N v U E E E m m u w 7 7 7 7 7 7 7 m 7 7 7 7 7 7 7 7 7 a a v m w c c c C w N a`i `m v w` a`i v v v v c v c �n �n v� in in �n c c �n 7 �n �n O m m w w m m 3 3 3 3 3 3 3 3 3 3 3 3> c 3 0> m` `m `m `m `m `m > o o m` `m `m `m u w u O m c �.�,� a> a> o 0 o o° o o o o o o o o'a o .Q o w w w w w w o w n o w.w w w w w w w w w w w Vl O 3 3 Q Q C C N N m m H H C `u `u H a C m a a a a° 0 w w w w w w w w w w w w O u N O O O v v o 0 0 0 0 0�� o o� o,o 0 0 0 0 0 0 7 7 °p1 00 O O hq °p a a a a a a a a a a a � a L w w w w w w a 7 7 w w a w w w w w w w w a C`C m m m m--' Y } m m O O O O O O O O O O O O= 7 O 7 a a a a a a a� a a a a a a a a a a w Q. c c c c �n �n I•- ❑O w wccwccw» w`a w`o ccwccw��������'���� `u � �u`�>'>>>'>'> uuu >> �'>'..>>'»>>'> L L G G L C C L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L L u u u 3 3 Y ,u, y Y Y y Y Y Y Y y 7 0 Y o 7 Y Y Y Y Y Y 7 0 0 Y 7 Y Y .u. Y« Y Y ._ - m m m m m m m m m m m m m m m m m '^ a n m m 33i2 i2 c 33'>> a3333333 o m 3'333 r 3 e333 ?3 �'�'3? 3?33??33 w w w o o u ua o o Q Q n'Q Q¢¢¢ a Q Q Q �� ¢ Q L u Q 4 Q Q C 0 c c 0 0 Q Q¢ Q a ¢ c a Q Q Q Q Q¢ a. w a v w v a v w u v v v w w w v v a v v v w v 7 w m m m m m m m m iC fO m m m m m m m m m m m m m m j t0 7 M m m t0 m m m j j m m m m m m m m m m 3 3 3 3 a a 3 rL m ° o (a2 2 2 2 m o ° is rL > > > > > > > > Q Q > > > > > > > > > > > > > > m a > a m > > > > > > m a m > > m > > > > > > > > -Fam m m m m� � m- m m m- m m� m m m m — m-- m m� m� m m m m''..m m m m m- m m m m m m w w w a !3) `aww`wvw'w``w wE``````a a a a -a a a a a 'a a la a a a a a a a a a a a a a a a a a a a a a a a a a a a aLL LL'w w LL', w w LL LL w w LL w LL LL w w LL w LL LL'.. w w LL i w i LL w LL LL LL LL LL LL LL LL LL LL w 0 0 0 7 7 0 O 'O wmill-m > > > > > > > > > > >i> > > > > > > > > > > > > > > > > > > > >''> > > > > > > > > >' El DO M Lq �j ol aj �jl CT! Iq m �IO NILn LOI^�m�IN�.m r, 00YO IH V t m V V1�I�IN�NO N m..,M ci�H V V to w NI NNIV 'zl- lMp N NI 00 00 N w' wi V r' ON N m `M c-I 'A V'^II"*I'^IIvV'^V'^Ilv*V'/ll+ j-1-1-III*II-ITV NV�V�IIi*II+�+q�Ili+V�Vv*Ily. mT " nM MIWI NN m.ol O m�W M �1.O M C'� ol V N 0 0.,,,, NI.M M In Im N OM IID N Ln o �OICI�O�O�CIICI�O�C,�C,�C,�CIII-I � OPm�� O m ...Ilv*II'^Vv*Ilv>I.^pv> Ivtily*Iv*Vv*Illy*Ilv*II�II.�Vv.11v*Il.�lv.11...11.� ll.�lly+ �%v%—II—II—%—II—II+nN�ll�ll,� LL LL LL LL LL LL LL d LL LL 17 d C7 d,LL',LL U' d 'U d LL' LL LL LL LL LL... L6 LL a C7 a d LL LL LLLL LL LL LL LL LL LL LL LL-0 n. C7 ,,LL LL LL m LL LL LL LL LL T l7 CL N N T m ''C7 CL N ry m '' m C7 d l7 a l7 u. l7 a C7 a l7 l7 C7 d 0 Q LL m T C7 n. N N M m C7 [L N N T T C7 CL N N T T Y al N N M T lJ a N N M T C7 7 7..,7 7 7 7 7 7 7 7 7 7,,'7 7..�'�.'.,T ❑❑ ❑,, ❑' ❑ 0 7 7 7 7 7 7 ❑ 0 ❑.❑ 7 7 7 7 7 7❑ ❑� ❑❑❑ an an � ❑ ❑ ❑ ❑ ❑ ❑ ❑ O ',, ❑ O ❑ O J an an an an ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ',, ❑ ❑ O ❑ ❑ ❑ '. ❑ O O ❑ ❑ ❑ ❑ O ❑ � � � � N J J J J J J �. N N J J J J J J J J J J J J J J J d d d d d U U U U U U❑❑❑❑❑❑ d U U U U U U U U'..0 U U U❑❑ ❑❑ ❑❑❑❑❑❑❑❑ Q Q o d U f- u H 7 7 7 U V U V U U '..... V > > > > > > > > > > > >'> > > > > > > > > > > > >,> > > > > > > > > > > > > > > > > >'> > > >I> > d c c c b Vq ca 0 0 o o a� vu 0 'ca T as 0 n a n .ia acre sn u0 a Ln oc,;...u, _I,'""' pro. c c'', a c c p o �... 0 .cr , +.n u+� p w E ca o o d o O td ary, 4R O CL.. G"tl N"k O cv1 p u u p, .'' a a5:. O O an. a. p O'', 53_ 7 an u u '... 7 to u C C� d M17i., SSO"M SS'a OL O O. C C A, C r`»,, .[} d V .0. ? V -M . `U1 N1 U J J W✓1 O p tin•7 0 n p o o e, o_ a A u u o u v v .� a u c c ,a p c ro a+ yr an „aa v'r 0 0 `" 0 0 0 wry. R 0 O 4Tf CL u u Rt% lJ U "•.., �,,,.y U m V 3 "3 p' 0 '0 td, .t1. V Ci, U O O U 3 71 yry U' 'im. O O O M1n O. U p ro a v m v 0.. as. c ro tx, m d C p m d ''. c U p O "w...CS O ra M m ..� O. Gl °� C'A. N VI V7 % Vl Vl O O N C ri5 ✓t O O in p p p arr O 0 arL '� 'O Cy m d d m m d O � Z m m m O m m .Lk � m .'_' v m d d m d` u cu,. 0. p an as an an an `N° 0 an w Ln an �n vi `^ �n vmi D. + i +ry d o ci m° o n v o n n v n vpM n p m m m m m o c c u p c u u m 10 0 cz.,""°N an vi mA m m p„ o 0 0, .4 m an d c c ,� c .,p iyny�w — ,.�`n v v v .m m m m N vl of T T v1 C O O &%. O aJ �J w ar w 7 qn yy m m m m m °'m m � O "L1 '8a', 'ea U •C1 v u v v •^w u u ems, CS Ca. C d2 C V/1 Vl Ln v to vl W cl N Ul Vl > f0 '. > O :9 C O O 0 '�,,* O C S= C v C C > > V :q "Oi T,q U_0 u u N N v N N O Cl 7 O J 3 � "O m V tiJ u m d a O m d-M...e. O -... p p� > OJ U/ O/ Cl Oi m Ol m O O O G C a m C C t"l. N N m al m 'a. C C i.R u� u-0-0 u v F v v u u m m' :µ _V �,,, to v1 M U 7 O J O J C O 0. C c c C C aJ �_ 11P m d d m m d •••• ••• m m m O' N N •U U U C = U Q O O Ca -0 .� v u V V u ,..,....... =. .- 'a' 'a M in in m al v v> v w m m m Fjp m m a>i w a>i '"` a>i w u�'o U U N M u .--I Vm U V U v U U t/1 N Ln N N O` N C C C C Y' C in m m m m m •> > .> ❑ '> „> xiM U VI ❑❑❑ u❑❑ V U m m m m m r/w aJ O O V N N Vf V N l/1 Ql m v ma ik o �o ai an dO aO ❑❑❑ ❑❑ "o .0 "0 o m ❑ `o `o n n n o w oo `o 0 0 0 0 a o 0 0 o o c c v 0 v v v v a u p v v v c 0 v v o-O v v v m' v v o 0 0 o p p w wO '� J O ','� >>> J 3 imif N w am-' h-: U ....° °,""�.,., O O J U J J U U U C u u U U U U U C C C u V a 0 .O -0 O O O O 0 7 M 7 W al v> w v O O -2 -o O O '> '> '> > '> ,-0 V -0— S 9 U u u u u v v v v v c o 0 o u a o u 0 0 0 u ,ti an 0 w '� '> .> '> ❑ •> •> U U u .m. U u❑❑❑ m❑❑ .v. v m E O -0 v v m-0-0 �+ U U V U v v V v v am-' .m+ v al al .ti m m y v v u .ti .-i N ,ti ti m is io v m m v m v u u c0 Y u u v y .... v v v .. u ❑❑❑ ❑ '.... ❑ v v > u u u u u '> > •> •> U U U m V M u m fa m fa "7 aY r '3 'i .� rl N .H m m m 2 m m p O' V`OF W O O D M 'O d M-0 a) w v v N W N v `! d'.. U w ` U U U U VI E v E. N L t t m t L ❑ v v m C 4J al ❑❑❑ ❑ VI Vl N ❑ Vl H .--I ❑ O ❑ Q ❑ ❑ �--I V--I '-I ci ❑ ❑ ❑ m m m '., t t t aJ t t N a! N a) al C Via'. r �Ca E J J O 0 O 0 .ti '-I ci Vl T Vf ❑ to T O '.. ❑❑ ❑❑ Ox Oi V O -p C C'. C C C C O O O 0 O O bM C G'. C C C O O O O E m O O O U O 7 O '2 R O O O D U U U U ,O O p 2 O O O O '',. O K; C' C; C C C C C C' C C aEl O O O O O vmi vmi vmi w p Ca. cx O. �A.. `� v v v O. :a, Ci z• Co.. ca„ u v v v o o sz p p p c a p c ca M U U U v U u v° p E P. 'o o' o' p ca za 0 E o i t E ra c o a 3 c v v v o v u- '� m m m v m m un a` % .Z. ZU ` aE aE w •v w ° Vq O m `1 `l v V `J v .C9 .R] ,ii .L] .C'A U U U V '... U d d d❑ d U U U `u .. a b v u ±:r a `u �`„+' .i:7'� v ie, w m m m m m O O O v 'o v d v .' .C7 v v v .a " 'a Lo , , 9 3 r .w r 3 vti vti o vti vti +. wrp yr �rn yr +✓a o a7 O o vz a✓e arOi� ar'u un va c c c c .v y :: m m m V) LrN Ln 0 wn c+7 Ln � Ln u V)i an ° y Y o a 4a m m rqm m rai�aap H rct O u u u > W m m N C C C C c C r r T r., ?. v m% m a m m a m m v m m r v r E E' 0 0 E P 0 a 1s 0 a 2 2 Er a 9 v v N aJ Ot ntA a7 Gd 0J CD as qA ❑ OR rtY �wU m m i=u Sri' t+ar+¢ r�l rt'+1ark r•a dµb q,� ❑ ❑ ❑ r 3,I A r r ..x'w "�. r >. u _ L1 i ° (x 2 °CY. am-, am+ am+ _ am+ CL. '0, C° Cd CL �,., OS �, W v m W v M M r% W N N M fdL ri N 9^d Q { •w U a+ f0 reM' Q N 0 J J 7 •O •O U C'k. m Y N m N al N N v •• al +m+ `1 am+ v W1 +.M xry FY2 N aCY , ._ ._ "a � as ,A3 S .Aa mO °O an vi an an � >a�5 , in v3i an - vOi an in v3i v3i ' `. vOi an Q 3 an 3 an an r✓a a m ura rrc c c c �� � �'. an an Ln w vn u^a mcr cps � aca � m an an an � vpw >> 0 :a ro ro 3 0 p >> o 0... d axQ au vU raa ar ar as mu m ro v m E E'E E E E m m c e 'E "t.'° c c c v v `m ais am E ar v v v v v v � >�> E E E E E m n m m a+ O E � 4B of m E m >, �». �O E E E E E E E E E E E 3 o E o 3 a m m M r .+ N m c m c ra m ny m m m E m v m u u a : v mry v g v g c c M c c c W M W N aW c c c c c c a) M •-a p, rya T IX!1 Lw5 qC' Laa C]O ad} L'ub title v,'Yap m as Aa C TO !C'. > v v 1 N N m m m m m J m u u v a) N m m m m m m u u u ov v M m m a m m m m m m m> a E, > u u u u u u* u u u u u u 2 Z% u u u s u w a m recv m m CM cm CM rca m o c c E' a: , .> .> .> .> .> .> > > .> '> '>:E 2 > > > '> y m m' 0 0 m o v v v v v v cA 0, ax ¢a a 0• v v v v v v l C, o g g. ra, 0 v v v o T ro ''� m ❑❑❑❑❑❑ 00a 2 p ar❑❑❑❑❑❑z C o o p o❑❑❑ 0 0 0 3 3 3 3 3 3 3 3 3° 3 3 .E W 3 a w w v° v v 0 ro a� Cs �a 0 v m v v v w n ai cs a. C�OL CL v_ v w CL v al al al O O O O O O O O O d O O O n t J J J J �p. �.� J J ...,Y 'O V — O — O R O O O O O O O O O O O O O O O O O. O v m v w m v m v v v v'.. rra van 'O.°........° o o° 2 20 2.� 2'20 o 0 0 2 o...o m > > > r r r r r r r r r � r r �' > � � � 2 2 2 2 � g g _s 2 ,p u ,:1 u t t t t t t t t L L,t t .0 t'..t t t t t t t t t t t..L t t... aV, Y U Y y Y N U Y y U V U O U V U U U U U. U U U U'.. U U U U' U U V U V U U V U U V U U U m ml m...''.m m m m m m....m m m m m m CB.. M CL, m m m m is m m m io'm m m...m m io m is ym m io m m.''.. is m m...,m ym a a a o a 'a a a a a a a a a a a o¢ o °Q,< a a a a a a¢¢ a s a a a a a¢ a a'a `a a a a a a a a a v v a v w v v m m a v v v v v .- v v v a v v v v a v v v a v a v v a w....... a a v a v v m v v v v m m m m m m mmm m m m m m m Ln u m U tm m m m m m m m m m m m m m m m m m m`.m m m m mmm m m m m > > > > > > > > > > > > > > > m d > d '.. m > > > > > > > > > > > > > > > > > > > > > > > > > > > > > m m m m m m m m m m m m m m m m m m m m F— m m m m` m` '' v v `m v a `m v '.', v v v `m `w m v v v`m w` v v v '., v `m `m v w` v v v v v `m `m v v m` v v `m `m `wm v w' v m v LL a! '. LL w v LL v v LL w LL LL M'i --a, 77 7 7 7 7 7 7 7 7 7 '.... 7 7 7❑ 7 7 7 7 7 3 3 3 3MW MJ" 3 3 3'3 3 3 3 3 3 3�m m m m m m m m m m ` v v v v v v > > > > > > > > > > > > > > > > > > > > >,� >,>,> > > > > > > > > > > > > > > > > > El V d' m .-I T M m N ram. an n m O .-� m a O m o .-+ m V o...0) 0 .-I m V o ct r-4 M M m 0 V s-I 0 w N M c-1 n� '-I � d•...lo In V -4 N e-I lD m h N N W N C V M .-� t\ t\ d' C M N t\ n V rp1 �--i n n �"� N lD oo I, V W m r" n m V m n AD O m VI o I/1 N ai o0 o ni rri 4 o � r- m ri m ui w vi w -i m vi w ui Iri ,� m vi as m tD of o r`i m v rl o of r`i in o v t� oo v ao ' � � v vi T N N N ry .--i N N �-+ ti N ti ti .-i N N r, oo m m m N N M T I, I m In rn n VL �. In 'wrp tin Vf th v? aJti 4Y"F N in RfM v>• v? an N in-+n ww'A 44 an an an V1 N a/4 N. M• vY L1 to +n an +n In t/t• N N an v) vl art +n v} 'A'n an co O AD o o o N O o 0 0 0 0 o 0 0 O O O O O O o O O O O O w0 to O O o o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O o 0 Vl N O O .--i O O O O O O O 0 0 0 0 0 0 0 0 0 O 0 0 0 0 lfl N O O m O O O O O O to O All ul N O ul T O O O m d' m ti w w o N V AD m o r� N 7 O m w h N AD m lD n O O m V Vl m n n O m .--i m m 0 W e-I N V e-I .--� N N e-I a -I c-I r-I ci .-1 r-I '-I r-I a -I �"� �rl N e-I ati W m m O m N N m a n m M n W in Sn 1A N to N VT 4n lh iA In t/? All. i/T�ry, i/T vi VY 4iM Ln Vl NFF'4`F Vn� 'VF M.. to V} VF V1 +JI"r N in in t/} t/} in N. iA. Vl. in• in. V1 M V} t/! in VT . LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL V LL LL Vr 6. V LL V D_ U 0. C7 LL LL LL.LL LL LL LL LL,,, U' D_.l7 LL LL LL l7 LL C7 0_ LL LL l:J LL C7 LL LL LL U) LL u" LL p p O 7 7 0,7,❑ ❑ p p❑❑ p p LL W LL M M C7 0_ T m l7 LL N N M m C7 Q N N M M C7 d. N N M m l7 LL LL m M l7 LL p ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ O p ❑ ❑ O p ❑ ❑ ❑ p OJ u OJ m J yr .. rn u ❑ u ❑ O ❑ ❑ O ❑ J p❑❑❑ p p p p J J J J J J U U❑❑ LL In t/1 U V U U❑❑❑❑ LL J '... An An An V1 An An An In ❑ ❑ ❑ p ❑ ❑ ❑ ❑ p ❑ ❑ ❑ILL LL LL LL LL p_ J m N In to O LL d In In yr rn In vi u U u u u u❑ ❑❑❑❑❑ O O O O O O a yr In An In m m m m m m m m m m m m m m m J J ',. J J J J J J J J J V1 IVI--I V1 V1 VI V1 V1 V1 VI V1 VI IVI--1 N VI VI III--n VI V1 V1 V1 VI IVI--I VI U� VI CJ U� V� 0 0 0 0 V� 0 u� VD U U� 7 H N H H H r I I > > > > c > > > > > > > > > > > > > ` > > >I> > > > > > > > > > > > > > > > > > > > > > > ° Q a o Q o o u o o a, a .� o u U n o V a 7 7 a 7 C C C CO O.. d m O O u u N to to O O O u u m 7 L 7 L a> >" a" Y Y. u Y o.. a in to o a a o a O vui uui o vui L Y = o. o o. o o O\ O\ 7 7 7 L L d 7 {�'' 7 7 o \ n, a, t' Q t' N N a Vl l 7 7 '... 0. 7 N a O � O 3 0. >'' d Q a o n o o In In In �. n, n C o n 7 7 n ' 7 n, _= u n= u\\ u! �-' n: Q 7 t' ',,'a m In C VI O cl o an rn a'' o .n Q o o n o C o 7 7 u o o c n.. c c 7 c 7 7 o o o cL rn rn c Q '- n o u o u a .u_' a o o u j' o u v !_' v �l a a........ n �' = c 7n 3 u m u m `u ,n u u An u o 0 0 7 7 7 In o o 7 In 7 In m m 9 m 77m 7m tm Inrn In U _o cnc 7 m -a -o m ., V V m a d ° m a ° c C O c j n N O\ O Gl N N rn m o o rn m ° rn In An a rn In a ''.. o 0 0:.o m v v E u r' LL a LL v m m a` m m LL m m m z) m m 7 7 m o 0 o v u o u 7 7 o a m m m m ,� m m u u ,n u ,n w 7 a 7 ,� u m u rn rn In An In An yr In vi 'In An 7 7 7 o_ N LL v Q 7 ° c m c Q n m ` m m m m m u ,u v v u v ,�, N m rn 7 '° 0 7 o rn In In N Vl to m w w w w w O O O In m m m U to a s w w 7 rn v v v v v v m fO In ` m w m w , C m U Ol U rn u m u .y v w m° v m 7 7 7 m 7 7 m LL o_ m LL `m N m vi Y rn c m o m '� > c - '" v v v u v -o u u u u u v v v v m w v w m 1 a o v v 7 w 7 w p m m C m 7 7 7 C 7 7 C C C C _ Y 7 > m 7 3 7 U p u ❑ w m "'� 2 w U u u "" u u "" '—'' "' J 7 7 7 7 7 ` m U a1 H O w y C C u >' Ln w U w Y C C C w C C w w w u w w U u u U u m m u w u >• C n C 0 C r-1 v rl U U m �+ v U �, �, U U U = U V C C C C C w O O w C U C T W u —. w p w p p > > > w w w > w w > > > _ > > �. �. > w Y LL U O vl w p w U U V Q U U p p❑ w p p w w w w w rl U .0 M w w O j U to U> w> w >>> >> U U U u U U > U❑ U c An> '> w w LL m m m u w w w w w ti>- N '> '> '> > '> o w° w `o '> '> o w w On w❑ E❑ E v w v w 0❑ 0 p❑ w w w w w w ❑ .. ❑ ❑ .-I c-I > 7 >. 41 O sw+. N ,o e-I .ti O O O p O O ❑ ❑ ❑ 0 ❑ w ❑ .� ❑ w GG. 0 >w 'J .-I Ul ''I c ami ❑ w c w v ❑ o o a ? .� -° ? .� .� .� .� .� Y o Y '� a. `i o o D o _ o 5i v v v° v v o 0 0 0 0 0 0 0 0 0 o p❑ `p Q: `O w w u 7 0 7 0 w U u m c u c 7 7 7 u 7 7 u u u w V U w w w w w 7 7 7 r °a = LL 5 uw o o u D .> > w -° w '= o o o -o o o v !^ -o v _� �_ �_ �_ �_ "' O 'n 3 a u w .E `" .E u o u o > o` In w p w o E v E v u u u w u u w.r w. .w.r E w .w.r E E E •E E. c u c- o c o n m v v 0 w C ❑ N❑ w �'" CwO... C -O -D- m-D m m m N m m `1 `l w `1 w w w '7 U O U C 7j C D. LL d a w n U w ,-I e-I u m '', vLi m w v `! m u v m u u u a u U LL LL o` D_ a. '...In E v m m m .> E ui o ai o>i cv I E m m m v m m v v v c v y c c c c c c m L wm o v ° ❑ " v `-' p _ vLi vLi vLi ❑ vLi ILii ❑ ❑ p O ❑ p O O O O O w In w a. o CO Y > 7> ,� ° m l I I I I I I I I E m l m E a, `° o C 0 0 0 oi•a p C C C C C C C C C C C C C C C C C C w 2 C'2 a) N¢ N V o -D O j O O m o�. 'E u m w U w V 2 n m o O o o o O o 0 0 0 0 0 0 O O O o m o m p w❑ L w w .a O n 'a w n w H N 3 3 n. Y w 'wa v wJ Q.ann,annaanQa.a,a.an Qa,=ooaom=a a. t° N LL y `u y m ❑ O O m° p 7 `u u roil vui u U IViI vVi u vui IViI H IViI u N `u U/ N al O y p A aw+ w O 7 .� N OJ 3•aL J L L L m L m 7 7 7 7 7 7 7 7 7 7 "I 7 7 7 7 7 m 7 7 L 7 L = In U Vf VI VI L aV+ O aV+ w JU-r J to VI Vf tn'rn V7 to VI Vl to N N to rn v) 7 to Vl +U,r Ln Y Y d V w m �- > > O > V V N° 7 m N m m w m w o m m m m O m m m m m m m m m m m m m m m w m m} w Y Q. C w m a, ❑ j, j. ❑ y❑ 'i w w w w w w w w w w w w w w w w w a L L Q L Y.. Y>> Y> Y> w >> V _ I>, L 7 7 L w m E a I V _ N Vl '., y u w y m = N N w M w u m m Q u a N Q 7 a N M r9 e4 c-I N N M M rl 'i N N N7 C!1 a-1 LL N N m a �--I Q m m a m LL 00 LL w O w w pip w to L L +wr -a, Y aa+ rw+ Y Y aw+ aw+ 2 aw+ aw+ Y aw+ rw+ a0+ +w+ aw+ w w 3 CO m C m f`0 m 7 m 7 7 ` m m = m 7 m m C m 3 J 7 ._ ._ .� ._ .3 .7 .J .J .' ._ .7 .7 .� .7 m •] m? m Y w e m O Q O. 0 0 S O K 'n Q Q 3 - 3 Q 3 w 3 Q rn In In 'A o An rn '.an An In In In An rn An vi ¢ 3 rn 3 Q m 3 N ¢ > m n `u `O o m v v m 2 v Z E 2 w v v 3 3 v .-I w w c c c c c c c c c c c c c c > c > > > > w> w .w. Y w mm > wmwm w w w w w w w w w w w w w w w w w w m w m m 7 0 7 0 0 0 3 E E E E E E E E E E E E E E E E E E 3 o E o 3> o''> 3 a o m w u u u u 3 N c cc cc C cc w w w w w w w w w w w w w w w w w w w 2 Q O U m to Vl C C L L w w C w w w w w C w = C m = OG Od Cd m.. b0l W OW bL OQ m 00 b0 t10. b0 OG�. Op Otl OLb C OfY C C U E u>> O = O> o O> m m m m m m m m m m m m m m m m m m> ° m o> Y O Y> 7 U o m w Y U C Y C '> > C C C C C C C C C C C C C C C C C C C U U N Q > i U w u w 0 O O a 0 a O n OQ p_ O m m m m m m m m m m m m m m m m m m O a m Q''., O n, JO O N L Q J M J E E c c c_ 2 2 2 2F 2 2 2 2 2 2 a c 'u 'N c 'N c u Y ...E m m v o o N w o N a o 0 o o a- v o m 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 Y w e m m y u Y w m yw m 0 0 0 O'. 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O L 3: C C m C v C C m C m o O fl. In w rn �' O o c c w = O UJ O O O `u `u �, �'u o u v w v a+ v v m w v w v w v m a m a v `u �.} u u .. U `U W'..H ¢ 'O V u u 2 u ? > > > > > > > > > > > Y Y > Y > r c L L L L L L L L L L L L L 'L L L L L L L L L L -2 L L tLi L L u L w C L L L L L L L -u 7 7 a «ur a 7 a" o.'. 7 y y Y l .ur y Y Y Y Y Y u .ur Y Y u Y 7 cl u a 7 a Y 7 +ur m Y u y" +Ur Y Y y m rn rn a m Q 'n a m a''n m m m m m m m m m m m m m m m m m m Ln a m a m Q m m m m m m m m 3 tf� 3 D v 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 r �, 3 r 3 3 �'3 g v 3 3,: 3 3 3 3 3 a,cl M= a= a= a= a�a a a........a a a a a a a a a a a a a a a a o a o to 3: a o a a»'a'a a'a "a a s v n c O w O j o m o �' `l w `1 `1 w `l w `/ N N w `1 d W `l `1 w w j. ' `/ 7' `) w 7` d w lu `l w `J `1 w `l d `1 m In to u m u An u m u In m m m m m m m m m m m m m m j m 7 rn m j m In m m m m m m m m m m 3= 3 3 m 3 3 3 3 3 3 3 3 >.mm o_ > o_'....m a > LL'm > > > > > > > > > > > > > > > > > > m LL > D_ m >....LL > m > > p,> > > >..> > > > 2 �a �a io m is m io m m m m -a m m '.''. m m m m `m o w w `w `m v m v m v `m v v v v v v v v v v v v v a v v v v v v v v v a v v v v v v v v v v v v v v v v v v v v a a a ri w LL w w w w w w w w w w w w w w i i w LL w w i w LL i w i i w i i w LL i w LL i i w w w w i. i w w i '. LL LL LL LL LL LL LL LL LL LL LL LL LL LL 'ILL LL LL vi Vf i N to rn i An An An m V1 to VI N to VI VI to to m to N In !n VI VI N m to VI fr Vf An rn to to VI V1 V1 to V1 In to V1 N m m In . m . ' . . . p p❑❑ p p p❑❑ p p ::ip p p p p p :D p p 7 m p m) p p p p :D p p 7 p p� p p p p p p p p p p m, 1211'21! m m m m m m m m m m m m m m mm3> > > > > > > >>>>> > > > > > > > > > > > > > > > > > > > > > El O ..N m rmn V im, c0-I N N V Ln N m Vl N N T a0 O m O O N Ol O O N Ot 0 V A+1 N w ^ '. W to N N w 10 00 N. t11 ul LD Ln 'A in +n +n '..+n V} .n 1n V} In 1/f %^'.. vl VT Nn ti/'Y V} VT i/? V? V?..i/! 1/T in V} ua *Ja. 'A A^ V} .n.....,. vl• �''+JY iSP4...V? in VT V}�, if k4 u^H V! 1/} 1A In .n 0 o o o m v en o o o o o a o m o a^ � Lon 0 o o o o Lq o m o o o o o o o 0 o 0 o 0 0 O O 0 0 O O 0l0 O 0 O O 0 O 0 0 0 O O Lq 0 0 0 O N O 0 N 0 O 0 Vl 0 O 0 0 vl O 0 O 0 O 0 O 0 Vl 0 ul LQ 0'0 N O o� M V V .--I N N u1 V7 N N lZr V7 N N N -Zt ooi 00 7 .--1 '-I c-I No N N O e-I c-I .ti .--I N N N O c-1 .ti N '-1 N N w lD m ID to N 0a V M T lD m lD N M 00 M W AD D1 W W m' m N N lD m m m w .--I lfl n m 4n ♦R N 14- 1^ In VT In t/?.VT V} 1n V} lR V? V1 V? VT In V1,� W In V} Vf 1n 1n.'''V11/f in.......,in in,,'N an in in in r.A'M RA...U'Y In 4n N to +n N 4.^k �n� LL LL LL LL LL Al^. LL LL LL LL '. LL LL LL LL LL LL d LL '', LL l:J d LL LL d L.L LL O d LL O l.L d W LL O LL LL LL d Ud LL LL LL LL LL LL d LL LL LL LL LL LL d LL O W ',. d LL O❑ J ❑ ❑ ❑ ❑ ❑ J J CS'.. ❑ ❑ J ❑❑ .., 0 0 7 7❑ 7 7 0❑ ❑ ❑ ❑.. 7 m ❑ ❑.❑ J an rn ❑ ❑.❑ O ❑ ❑ d d y vi ✓f ❑ ❑❑ ❑❑❑❑ ❑ J VI J J J a O O d vi u^r u u r.U'❑ ❑❑❑ O O d m r.,•a u u u v❑❑ ❑..❑ O 0 r"aa. v�i v�i u u u''u 0 O a �'O O a v�i Iv �.0 u ❑.❑ mmmm19yyIgQLOcot9L'�i7�t7 m Cm r6 co m m m om m m 0 �c���������' 0 0 O O O O' O O O 0 O ���c.>.>.>- O r r i i i r>' r r> r r r 7 0 (7 (D (D 0 Q 0 Q(7 C7 l7 7 '... C7 l7 C7 l7 C7 l7 ! C7 l7 U (7 l7 C7 '... C7 l7 C7 C7 k:� C7 l7 l7 l7 f7 C7 l7 l7 l7 C7 l7 l7 l7 l7 l7 l7 l7 V`� l7 l7 =. > > >✓ > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > m o p .... zxCi o 7 o a a o-D a v '� c a o a u .w? u u w c o a c o c n o m m u o `u -to `u \ 'C m '^ m °.. ''�'�' a v7i `u C t z m m ,n en w tt c a.... o c 0 c 0 \Ln-o '', C ma........ u •a 1n V u a' m cy a 7 o a a 7 o C a° vl N m m n n u c a o p a a 7 t' c C o o m a ,^ p- rp m Vl f0 en VI u c a a O a - a c o c O p Vl n a UJ V1 Ol m u � `u a en u m 7 A,y *may u 0 .a u m An 7 3 n a fi. d In 3 m W 7 u U �7a H vUi a s `u 7'.. v ❑ 7 s fN0 7 m C a o c`-' m,,,.Wk >> a 7 o O`\.'\\�a.m 7 7" u u u o,..v 'qU ,...? M.mo C ?. 7 pg 7 DV `Vy'. "a 'C 7 Ci c .^- `m' aY Loi 4.. Lk �n 'S m ,'.O O j o 'u j '.:: m U ,—c..,. V,, .0 ,ry o o ow. �^ 0� co a m a 30 'a, 5'tn, ° ySl„ 7 'my C O7 -,.., VI m C to U a O = ',, o o '^ .... a a 7 O C In 'u O -° 0'Y In 7 7 7 a 14 ',. m °. ra 0L O. a �^ p p oo ',, m u N u E u ,^0 &n Ln u W O an w •u m...v d m m fY^ =+ 7 U u o O an d m OL d m uR U v O u ° u Oc 4Y'71 ar c IA v7i@. a v v a v 7a m xx m 7 a v v d m a m a >' a a...u'"� v v :.^ 7 7 a u m v '.... m 7 " 'm aai m z'. o c 0 c.........' 0 ua m en " v, m ..... m u 'n m L d m C O C Vl v 7 V m VI v 7 U m m wm v m L U N a .-r O O C d ^""" m 7 V7 U C m N W m a C U »'^... m U wn en V a u u OCR 7 d .,^,,,. a u 7 a u 7 a m u m u a *'^..- N a v Y N e O m N m a to v 7« v ~ N> 7 U 7 n u U L v N C❑ w U v m v a N 7 v "ID , 7❑ m v v V❑ v v > v ❑ m a o V7 U m a 0 a` 0 d` m m VI v❑❑ i n m c ca 'Cp. m v L • c Lt '=:� , p VI Ql U uI ❑ •� U C Imo •> > O o CF �; > m> Vf N ❑ u U ai 4J 'C, m> m 'n m> N Vl VI N m N > y •i.b ICk. 4n U a ~ v v ❑ m ❑ a a -I a 4T. y�, n 0 ci wry, " 7 ~ Ol ❑ Ul ❑ C SmmJ? C IRA u aJ ❑ m 41 �y Vl a m Vf tmo Vl Ol ❑ .CA iE aY m u C "mm"' m u 'C C Td =^^ A LY a ".., > V A '-I N .� '> 7 a .--r u '> �"� 7 V c .. u ". � .ri .. O V c-I o V S 7 u 0 N C9, G:. r 'j u m o vI 3 O` wY a 7 o V �� m m v m 0❑^ aJ 7 o v o° m '^" -> .a 7 v '> a> r] � v 0 a 7 L O ci +..�. j U `M,a LA ^"" c ..W. 7 j u.✓M. 41, > al N a > In " > `m v u w In E w �_I� E v ❑ n ;Iv v .� en❑ v o u � E `m o,; u ° `v y o c v u c r _ > v o,v u_ v o u❑ „'❑ c a O v7i U a 7 •- c-I v v a v d a v 7 d c-r a 0p,,'.. V1 y 7 .= `p -o al a .--I v .� `1 a d a rl a y v 3 °: '> U 7 > ',.a N u .ti v •> v u •> u •> N ❑ a E as ah m 7 ❑ E C .0 °❑ c 7 °❑ C 'G4, 7. N ar'. N E N [04 60 O m O L 7 O C 7 O O m w L VI VI .-r m C❑ m m O L❑❑❑ w v r-1. O C L ay L' 4A j In j 7 m as O Ryy a u a R14 7.. a v c.. u a a:.. c 7 w E E. " a 7 c U a c U a a 7 '�' c E r avi .O E AAa a ti 7 ti ti o a 7 yr e n E c4 N❑ > N o❑ u ti O ',.. u E C c �a +cct5 c to 0 0° W 'D m U ° o o .�,, u Y Ova a .. C '.'. ° o O U .. v CL m p u Ci v m9 t14M Jy v no W o 0 p, 0 7 ° O c O m C m. C. y OA a p a v `1y O 'a+ ❑ C m v 3 a tmi V O 3 v ;y tmi v `'7 C amen� 'm O m xY" i+ v am+ _ .. u a C& u u a v c m m CG N m u o U a a 7 v u'o a 7 0 s 7 0° U U v m �I m U o H m m en m a•• o v am 7 c o m .v L rs > n o [i L c 3 W v o m L v ❑ a❑ v m L a C as m a m a U L U U m io m 'A'a 4N tw tiiJ v3 J' E r E v 7 m in 7 v a wry 7 In 7 '^ � E E 7 3 a —v m r ° u v E� +n 7 c In a c � 3 n+n o v 7 v> 7 a� a vi 7 v In a v a w u L yr c u�r.. �� c v v d c' �' v d c.• 3 o c o 0 m o.. o c ra p a....'cn, m c Cy0 mr W7., o o v c m r> v c m °„..... *0 'a � c m m r m o en¢ In o ar c m C m L a5 v �n m L In m L In v ❑ C r_a pyi O v o O o O �. O .�? ,°° as v v m yv,. ,E'•' n o Y �4 v cr^ C7'' N C C C "., C a. > fV U C 1] C r u SS N N N qYa U VI wen SSiI +sVY Ol "m ,c m •A"Y V 3 M1fl U 7 OlA W U i3 L VI Nf •_ V 7 bfp L N U yy v V .0 7> m 4., �V,A am+ O1 7 Vf am+� '7 uA. W ✓1 k0 u o' UJ 67 p • C7 V, ate+ •- O) 7 vl sm+ - 7 N m ''.. G. :a FAd 7� Y M1fN C e a>i qu v m ❑ E C C wr m A v ❑ � ,' 4J a>i ❑ m a1 a>i v7i ❑ « m v lu `n. r' 'C nG m m ,Sa v li > v ❑ 'un .> m m ❑ u•p ❑ en a -I � •> '^ N ❑ C c 4i t m ay 7 > c In v V N `u rrr 7 'S C' ar4^tl G"• �_ Q Vr, m is v7i c e F CWY w C tA4 al' L 4J a "©, ',. �, r m�A aA ,90^ f*y A ¢ m '' aJ ,,V T '0! ,,. rtwi '7 RF 4+ 4P E E C:. s 4'4 RA ❑ ^O j. aib Y k d In L Vf .L] Ln m ❑ E w p G 3 v 4/'M ba V7"A CV4 . c c ,] m m tC C' m v m "a tea,.. Y ?� c m m E>w"'.. q �. w % '"'Y p m CI .x Y e a4 u `m m 2 q Q N 4tlb 7 o gym., .. C'.. m r;� N o air m C m c m aU+ en m c v m' M No eqp m ro',. m rra CO p nv c to m c> m c c .. as tw p 0 , w v ° m°° 4C d" v ra m 3 :. o "o `o D. O ;. o m 3¢ ;, o w N m m m p N' j. .Q ia1. ' m v c m y Ta . dw "> m W o o o,, y W> 4,. C v e m v 7 m > w m o 0 fo 3 o v W v ; v v m y W 3 v v 3 v 3 v 3 v a W v (u O v :a 3 ^* 3 v'' 3 o O a 0' o u .v. u s v o O" 0 m 3 0 a .v. u N u> -° 7 3 m v c7 v> m C7 0 3 v5 >> '> > v `J '� C7 v l7 p v >> t v c 2' m In > E E E c' c m` > v c c E E E c c m` v v c 'n E E E `n Y o 0 °'E r L o c� i' L as ° a o a E 4a o 0 0> o r tc! c ° cv^ E u c p v J E u u> o o a o v 0 0 0>> w a v o 0 u 0 u o m a o CC� 0 Z 0 w o n o o n Cp a1 V U typ m f0 '., fO V c' Q ae 6A ha C f0 wM Ci aA aF C Q as N U V U C is m en C7uVi Q 41 iv �'' 4YY 04, c c Q 4! E'. L al ✓ L aU+ L .o', Y u... C 4 Q E J WJ' J J Q G' L 0.F aV+ L Y L N J pS Q o. Q Y ct 3 ,:° 00 m' .m+ o�^Io m Y m' wu4 cm 3,vo m - � .m. m' o c yen,, o o m m >i� m m a t? tG .m. c m c Y c y ca m m m �'3 m .Cm. c Y c m U rG U cm C Q¢ Q �-A m C ;5 U aC U U 'iR' ems. 'i cm C Q Q Q a"�`+ y m U u U U m +� �C. Q¢ Q ',. u co G U Co'� C¢ t0 d7 L L Y L y L Y L Y ,v o S1 d `J v .CS m m m 7 o, O, L rr. Y L L V Y L L .u+ H L `/ .V1 m v m �1 „o O 7 m L L "" y Y u L Y L+ y L `J Y `l d L Y u ... L Y u 3 3 C 3 �' • m m 7 a.� c 3�? m m m .- E [a 7 ''.. !✓I' 3 3 3 ^r,.. Q,. -.. m m m m m m 3 3 Q w 3 7, ,,, m m m m m y^r,` m 3 3 3 m m m m 3 n Q > > > c tt v 4 Q 4 Q Q '°?'' c>>> o c "'o Q Q Q Q Q 'o Q>>> c °a a a¢a'a'a a> ¢ >> a¢¢¢ > v ui ai aaa f0 AA'W �G p •° ]' m v a u 7 U v v v v uaa p air 4J' + 7 ca o u v v m m m v m m a m v pa m ar p a� © u 4V1 v v v m m m v v aa' m v v en a�u is v a v v U 3 a> n -23 3 3 o m>>>>>>> 3 3 3 3 a ° v .N'a e10 £1m 3 3 3 3 3 3 3 m 3 a m, 7 a 2 L m>>>>>>>> 3 3 3 m 3 m 3 3 m 3 3 3 3 3 3 .>>>>>>>> D>>>> 9 '.. m m m f`0 m '.. m !` N m f`0 m m m m m m m m f`0 m en 76 m m -6 m en (`0 m m m en m m f`0 m en (` ''.. L m v m v G) m al N m v m m m N '.' m v m al v v '., v v Ol m v m en al m N m en v m m 1`0 m en f`0 m m !` f`0 7 a a a n v LL.. v '.. LL '.- a a a a a a v m v LL LL v LL LL LL a LL a v LL -c a-o v LL LL LL a a a a v LL v v LL LL LL a v LL a -° LL v LLLL a a v v LL a a v LL LL a v LL a a v LL LL a v LL a a a LL m v LL m QJ a a a v v LL LL LL m a v LL m a v LL m a v. LL al a v ''... m v a a '....a v al LL m a v v a LL v a v W a v m y a a LL v w+•6 CrM ] 7 Vl o In o VI VI 7 7 -.®7 VI of N nfi 7 NT '❑ N VI L6 N 7 7 7 7 Vl 7 Vl Vi 7 7 N VI 7 7❑ W5 V5 u"M N VI 7 7 Vf 7 VI Vf Vf 7 7 7 VI c11 A/i 7 `, t✓1 ','> AfY. �'. 7 Vl 7 LL VI 7 LL is N VI 7 Vl LL N VI LL rn LL U'tl LL u"1�i „„ 7 7 7 7 7 7 :❑ u v a v v v w v v a v v a v v v m v a v v v m v v m v v v v v v v v v v v v v v v v v v v a v v v 3'3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3'3 3 3 3 3 3 3 3 3 3 3 El ri �1T In m,c�i�N V�V�a m.,..., w 11^ c�1 N1 M�a�i�Num�N N H N MZD IJO h FZ it a -I H in m OO Vl Ln O 0In I l�0 a�-1 eT-I cT-IN NNN ON V�II l�9 V.�II �V•�II�+V +i,V,.V-.VU+I-VNI'-I-V—1 1—]i*Vv+nj1 I�^4v�I-LnInII'nI-V-B-1I-N ^ ^a�M�Mfl NCB O v W 0D�� O IUD In O�m m�IDD O m�m�`0O O O M 0� 0 0 N O W M 0 00 O,,O W umi oN o,,.W vmi W' o� � 0 0 0 �II�IMRII�I�I,�I�I�I�V�f�I�-U���I�l���l'�Iwl�•u�[0�11�11���1�II�V�II�V�V�1'�I�I�I�V�I�.��Iti�Nu�uv, LL L.L LL LL LL LL LL LL LL LL l7 a C7 a C7 a l7 a LL l7 ri. 7 5❑6❑❑❑6 O 6 6 L,A hn Ln ❑ O ❑ ❑ a J Ln Ln Ln Ln Ln U U ❑ O O O n. vl Ln l7 C7 O O ILD 0 Q 0 ED Q (7 s❑ v s m 3 u O O c O 7 JO yOj C> U V71 N � 7 v m `m o `w aa, O r In Y O NN p_ Y -u aJ O O o > } N C N U J rl N N N VI t U J N al U Ln Ln N C❑ v U U ❑ c C C ro ro Lo m v a v v v v v v :II�I�IIZ2II LL LL LL L'L LL LL LL lL LL LL LL LL L.L L.L LL LL LL C7 Li LL O a, l7 a l7 a LL U a. ❑ ❑ ❑ ❑ ❑ ❑ ❑ � d J to VI ❑ ❑ ❑ ❑ J '., V1 In U U U ❑❑❑❑ O O a u V O. n. L�iL v�i m m m m m m m® m m m m 7 0 0 0 0 0 0 0 0 O O O O 0 0 0 0 O O O l7 (D l7 Q l7 ED ( LD l):D 11 l7 (D (D (7 l7 0 C7 C7 (DC7 > > >,> > > > > > > > > > > > > > u u U o� m D o c o c''Ln Ln m s m f0 Ln O m LO m N a. to N n'•u Ln Ln Ln LO m m _ o `u O O u a s 3 aJ ' B o m\ Li Ln a. \ a u u v .a. Ln 3 3 u Ln m 0 `u m c c n `u c= oa u u c o o a= c o n, a— a n O a 7 J 7 u a to a s O m A m a \ m 0 0 O D Ln a o '^ a u u a L' " o _n u o O 7 u 7 d O u 7 a a O o m u a c m Ln a: m c v a+ u a n ,� m a u cu m — 7 m (a fa a a Ln Ln N l9 u to al VOl Ln VI w u u al Ln N o N O U N u fO s U a a fa C N N L t VI O O wN u a in W �. W V m N❑ O ° 41 a m N ❑ m❑ J m m ❑ i ',. N u j Ln j C N ti a...... .� u a .� c c'❑ O > C 3 O o a u V u o O O u Cu— a u '> 2 u u ❑ c-I Ivl N '> U U J VUI ❑ = ❑ V) VI Y u u y lV u aJ ❑ y O al > ❑ a/ yN., N J C a -I C ci .7 .+ O u u u..� m u. •�� y. v o v o Ln.Ln a Ln _ y U U C v au o v w w c c �,v n m o v w ❑❑ u❑ u❑ v m n p o p o E E o O ,� u o, E E c ,� u ,� u v C u C > u C W aJ a a N as t o a f is w `1 ❑.a �� f�E0 E eva m...t y rIS 3........ L N N vsi n O v.Ln n v v f0 v....c v cc p Q o^ �^ o o o J a> o m m 3 a n m o •" O > ¢¢ o c c c¢ o 3'9 E E E 2 Ln >> c o o o> c 12 W aJ E s s s E C C N u u u C W o_ a o. Q Q `u t C 3 3 3 c o > > > o m a Q >>> a s Ln vOi a v v v Ln v u u La [2 [2 r(o u m m� aanm� mm>>I>>m> io m m m m m m �'Di IL1ILI71D�'I�D DD u a w o 0 0 0 O 'C o o w o �' :% y w j U C U U Ly r C L C N Ln t !n lU VI U C C av+ a G N V O `m O > > u >❑ v w- s s n E E ;» Q u N m m m c c to ovca c 0 u O a` v v LL LL L. LL lL LL LL LL LL LL L'L" LL LL LL y Li Y 0. O a l7 a LL l:J a l7 Li U Li LL ❑ ❑ ❑ ❑ ❑ ❑ a a S Ln Ln ❑ ❑ ❑ OJ J J u u❑❑ ❑❑ O O a ni �i u u ❑❑ a rrir>-rrrirr��>>> O O O O O O O O O O O F H H H 7 C7 l7 l7 (7 l7 l7 C7 (7 C7 l7 l7 U' l7 C7 l7 C7 > > > > > > > ',> > > > > > > > > u =3 n u C O o u a n o�m noo a o m o m n° Ln u �p C = u Lm m u a m w '> w m m v a M a u ❑ 3 Ln O C a-i C 4 C > u o > N U C V a ❑ •E N N cu u ❑ > a n .> N o a c o 0 0 r Q Q w a o u o hC C v si s O O o o o u Ln In ow w .�, w 1 m v 2 m c w c v m 3 '> m '5 O O ova > o > o C7 C7 Q - E E` ;� u Y u E o 0 E E c Y c o o u u 0 0, v O a a w E s L L JO Q ¢ y u u c 3 c p Q Q Q u u C ¢ Q Q U L `1 N al s u L .... L N LJ `1 O s m ro Lo u u " Lo ra ro a, u fO 3 3 3 f0 `° fO 1O 3 3 3 af0 a>>> a Q a Q>>> 0 a v a) a) w a v m v w ui v t w a a a m a a u � a a n :E2 n n a E 2 > > > > > 7 a > a a a a a a a a a a a a a Y❑k ❑'',,❑P❑u?u OO ❑!09 ❑I ❑ O�pR v w m v v` a a Lu m v I vvLuvvwvvmvvvdwvav 2 v Nm fM �� �� �� �� �� � > � > � > 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 o` Y c u 21,212 a u n u .2 C: m O n •� a ro n a u v `u a (-u n O f0o O u 0 c n:. U mIn m o Lna aia a n. u 3 v > > a. a O O u u w m M �% V m y a O N ❑ � m m � O O V t � N ❑ � N � fa a .-+ o ❑ Ln u 10 L O N = a o . al 2 U G,,•u C V O u n n u O O '> Uu N n ❑ c ac o _o u c E C (U a U o u E ava O a p... m a m ova,�u LsiL A Q °' c vo o 2 3o u u 14 O Y O a ! Ln .a,.. Q al � U' i. c � La g v w m Ua Il�nIli IM2l�l'I fl�yR' IIM)InlI i m v v m m v 3 3I3 3 3 3 3 El m m No 0 o N m m,m m m c M M m ono o �,NIo���N�m � N ^l�pNl� mo m Do ��m�^ n a���� � �I�NJ'�- T-...vn n m �-+ v m v m aDO0ON tDn O '.7 aD m apLn 0 Ol Ol m lD m a0 ti Dl o O m V7 Ol m o I� m D1m ti .� vi m m n 1� ov v m Ln m m m � I /� I In I �n II V1- III IItn �I�M-1�1 nilIB^IIln Vn11V*II,*f njvnjvnjvnI.npanI�n 01oo°�coov OC� �1^oo'I� °oo° oo' mo vl� oo^�omlolc'l Lq lm v^a m�M�vooi �IN Ln ,oaoo o�m�M�Ln o °oo���o��^� 0000la000, M o�vpacl �� � o,o 0o-1 o� cl� mo�� mN l.L LL LL LL LL LL LL LL LL .... LL LL LL LL LL LL LL LL LL ,,,, LL ', l7 a,,, 17 a l'J a LL C7 a,, (7 a l.7 a,.LL O a t7 a C7 a l7 a" LL LL LL LL LLLL LL LL LL LL '',LL LL LL,,,.LL LL LL 7 ❑❑❑❑❑❑ 7 7 7 7 7 7 7 7 7 t7 a l7 a `i LL l7 a l7 a"" (7 a O m" LL• l7 a l7 a LL VI N❑❑ J N N❑❑❑❑ J V1 Vl O❑❑ ❑'., N N M M l7 CL N N M t�1 U` CL N N M m D_ N N T m l7 d N N VI V1 J J J VI V7 J VI V) J J J V7 VI ❑ ❑ ❑ ❑ ❑ ❑ 7 7 ❑ ❑ ❑ ❑ ❑ ❑ 7 7 n 7 7 ❑ ❑ Vl VI V U ❑ ❑ a....0 VI U U ❑,,,,❑ a m V7 U U ❑ ❑ a VI Vl ❑ ❑.❑,,,❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑',,❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑ ❑J J � 7 U U U U U U U 7 7 m 7 7 7� 7 ���� 7 7 J J '. J J J J J J J J J J J J J J J a s H H > > >........> > > > > > > > > >> }.r........r.} r r } U uu U U U V U U U U U ❑ ❑ ❑ ❑ ❑ ❑ ❑ O ❑ ❑ ❑ ❑ 0........0 t� ����� t� �� cb ���� t� � t� t� ���� t� ❑ d d d o d d d d o d d d d o 0 0 o d d d rj d d d d 7 7 7 '7 7 7 7 7 7 7 7 R7 7 7 7 7 > > > > > > > > > > > > > > > > > > > > > > > 7 > > > > > > > > > > > > > > > > > > > > > > > > > > 'S! m u p R] n m m CL O C7Ch OO'.C�. . ri, '+C = .,.'u CO C m iu AML�CLOp mO O uc v O O to �. u C O O a CL •0 �O O OO =O p. d Ira 1D a u u w t m m o � 0 r `m v -0 -0u U "^�" . m � u u m m p u C N C VI'g C i VI } Vl C v U e a'> ww ❑ ❑ .... .8 c u c `~ ❑ >... ua>i "=' °! m_ wow au)❑ cvi v o n ❑ W O O a0+ > 7 '> u N p U U m O N w V7 ci ❑ O m E E 4uM w � UO > w im L u u acp E re., v 3 "EL m c Sm O C. O Or u ti a m m P.L a m 1'a u o u m [ ❑ ❑ U C O m " "Q � ❑ a) ip O u 3 v mu v �' c Q C C O C p O N a � O G'. v ak CS v ua C m O u LL" . J C eu. E.. > ,q t '., O r m a � e c 2; ° c 0C a U 3 VI In VI t3. L L'Y — a a O 4 0 m vui pC! aCJ SCU Uw m .0 0 O CL a E E ER. 4a Jm A.. pY m n mY ca V yy N a m a M. m f` qmw� m m apa� 1Sw 2 0 E C C O v m m y al div> W C W> u '3 u > l7 (D o > O > ^ C' O o O Ca Y> .as u W <'. < CL 0 E 0 s r t - o vLi N al al � m m m m m m �v •� � V� 0 c c c c c s5 >> 2o 2u°O,�u°up aa''¢uU pp u2uu L L L L L L d m `1 L O x M,L u L Y Y Y H u y au+ O. mu., O au+ u m m m m m m 3 3 3 m ra. m m io m 333333���3L� 333 aaaaaa>>>Qloa aa'a v a v w v v 0 as 0 v m v m F m m m F m m m m. m m m v v v v v v v v a w v v v v a) v v ''.... a) v v v v ''.... v I7) L'in m DIDImIDUnlmlmfD-IDAmM-I- a v v v v v m m v a m v m m to `m la la m `m m m m m 3 3 3 3 3 3 3 3'3 3 3 3 > > > > > > > U �• Ulm 7 u n O U nI5 � u0y N U m C CL.V1 O CL y Ky O V1 w� dt a c � �L Ln c C •u 0 ar�ro 0 c ca U •- u u '- U .... V7 =1 f6 7 w U o a` m a ve +n u i c u v u a m v > > a E E c -au '^-" a as v O C u C AME®R" 11®.F,' i m m m E m m m m e , Vl m m m m m aro O O ... o } v v j OI. OR all v -0 -0 -0 v>> 7 7 7 0 0 2•~ •� c .iA A7 U U �' ,0 7 7. w J J 3 U = J ',,. � e r a ' U U U U U w w q 5p S J iy �y O O O-, O O v va 3 3 :: o u u u m u u o 0 0 0 0 m a m a m>> m m _ C 7 to la 7 m -p O is is m CL) U u O O xpl E ♦+ m m O m m m- `m m o 0 0 M N F44 a6 06 S,{d 'U 'U u t L L L m L L , 0 0 m v v> v m� V do [tip G%p d0 m aJ Ip O O VI VI V) ❑ Vf VI U U U w U U ❑ ❑ ❑ m ❑ ❑ v '... m E C e .0 u c. u ut m y U v v m v❑ ip m O^ 01 C:L >> m _m Ll `l m C IG D c c C `1 `1 `1 V `1 `l c c c y„ m O„ ❑❑ u m m m •u O O �ri O O f] m m m. m m O 0" O O -O � 3 ° v eavrvL�ovLLn ra ra,mm 5 Q. a.o 0 aJ C. C C d C >> C uUry uUi. �U3 V C C G C C C WU'I V w Ux c' c > . O O O O m 'Ca m mp :0 .O .L5 d7 O O 0 O O O 3 0 01' v 3 aI a c T2L V5 Wp 5!'a Vf VM1 to aa. Ti GL..01 pa VI V5 4n 'D" yA VI a'n Lk. 0' as a� a m m ar as ar CL CL 0, i'^ N Cm RfVµ, m"; in W3✓ J VI Y--- m mig 0 0 0 0 gip. 7- c c c c c c ,va y, c c c 0 c c yv,....• u ¢¢ Q w w a a` a` a` a` 1 nh � L u L L a) a)`1 -S a+ a+ „Eq L L L L r L H a+ a+ a+ a+ L L L L L t a+ a+ Y .u. y m m m O Om m O . ap. �Uau.. U u U u m m to m m �a « Y Y Y m y 5' Tfi^ " , m m m m m m u u u u u m m m m m 3 m V�33 ° v3vau°° 33'`° 0 ° � °aaa-<<<<aaaaaaa 0 ,. v v v a) v v'v v v v a v a) m m a v v v v v m M m m M R'm to j m m (A m m m m m m m m m m m f0 m m m m m m 3 3 3 3 u v p 3 3 Y 3 3 3 3 3 3 3 3 3 3 3 3'3 3 3 3 3 3 3 3 ct ca st > > > > O 7. 7 m a a > > m > > > > > > > > > > > > > > ''> > > > > > m m m m m m m m m m m m m m m m m m m m....m � m m m...m m m m m `v a`i CIDv a`) v v v `m v `w v `m rcu v `v v v `m '.... m` v v v v v v -0 -0-0 -0 -p m-0 m -0 -0 -0 -0m a -0 LLv v v LL v v- v v LL v v v v LL w v v v LL, v v v LL LL v v LL v v w v LL LL LL LL LL LL '... LL LL LL 4Y.. LL LL '., LL LL '., LL LL LL LL LL LL LL LL VF Vn VI VI Vf VI N VI VI Vf VI LA iA u'1 4n VI VI VI Vf 'n VI VI VI VI VI VI Vt. VL i,Y% tin Vl VI VI 7 7 7 7 7 7 7 7 7 7 7 n 7 7 U 7 7 7 7 7 7 7 7 7 ;. 7 7 7 7 O 0 O, O l-a q J = TJ' c ri a O O C, C C a...... c r. w o.._ O. O O m a, O uIt 'A Y u u u 7 3 m 0 G.L O„ O -,,,, Ck, o p m a O O Cyry m a` a m a a m a e e e CL e VI Vf Ln VI Vf 4 O O O m m m m m to rv�aryl la N =7 Vv u ,',' U vl vl of Vml to to as VI to � N � 7 .. c 2' 2u m ut. m an an C C C � � v c c rmm rfOa m rmp r1Oa '•...• I,Y.,.. �•.., U_ U_ _U p>j U_ U > > > v > >0!>> Uc -0vv v m m r-I al v m 0 0 o v `o o M w J w r-I >> 7 0 0 0 0 v v v v v v v v m m 1`o a`o to la m to m ro to m 1` > > > > > > > > > > a la m r`o m to `m m im to m `m `m la m m m m m m 3'3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3�3 3 3 > > > > > > > > > > > > > > > > > > > > > > El N M Ol d' N m w N T w Ill O V ID IO 00 N I� CD N O 00 N n N m Ol In O Ol m M n IZ N N 01 In N tD O 70 .1 01 m 0� m I� '-I N I, d' -! '... N P lD m m T fl9 01 In m I� N Ol o N I% l0 el o Ol M 01 .4 l0 r O N o Ol m Ol 11•I l . m H d' 1- N m M e-I m O m m w I, Ill O m n N n N V e-I O m In I, O m m m m m N m ID w m Lll m m m lD Ill m m n w m N n m m w m m m H c-1 0 H m m 0 H O N l0 m N N N m �--� N I --I N V lD N V m V I� w 00 0 �--� I, O M O N 10 lD lD Mm m 00 I0 N lCl �-i '-I 10 '. c-1 In V} V} V). V} Vl VT Vf V} V} "I. V} Vn VT Vn V} i/T V} V}...,lh iA 'A v, VA Vl Vf ih V? V} VT iR VT if .V/ V1 VT V} VT V1 In Vl V1 VT. V! VT Vf '.. pN O O O O O O O O O O O O O O O O O O 0 0 O O O O O O O O O O O O 0 O O O O O O o o O O V N YO O o 0 0 0.0 o m .� o o m.ID o.0 O o 0 0 0 0 0 0 0 0 o p o 0 0 0 0 0 0.0 0 0 0 0 0 0 o a o 0 0 0 0 0 0 .� m m o 0 o Iri '-i m y �...... of m m .� 0 w m N r, 0 m of to m m v m w c-i v m 0 v m of I� o0 00 o vi ui ed Iri o vi vi vi In In ei N M IO e-I N m m a -I a -I rl N m O N, N m m H N M m V N V N N w w In r, cl to w m Ill N I, m V Ill I� N n N N N m rl r-I V Ill tD N N N N m m e-I .-1 V V w lD N N ri .--� I- w m w lD r� M m m N ID rl �m-I, H Uf Vf In VT V} V}...'',� V} V} N Vt• V} 1A V? Vf LF V} VT V} VT In V? Vl• VF 4l1 '.4i1 ti'fi. A^ V} VY In VT V} V) V1 ll 'V1 VY In Vt V/ Vl Vl V} Vl Vl'.V} V1 LL LL LL LL LLl N aL LL LL LL LL LL LL w LL LL LL LL LL u- LL LL LL LL LL W !n a o O x LL LL LL LL LL LL LL LL O O X l9 CL W Ii LL U" w LL l7 a M M `I' U' 1 a m a u' l7 d O m LL l7 1- l7 m LL LL U a LL N N N m m 6 d ly iy, m M V d m M l:1 d N N m M l7 d N N IY) M l7 d N N m M l7 a N N IY) m I7 [l N N d lfl Ill In Ill X, Vl LL w a d d � � � O D ❑,,.� ❑,,'� 0 0 C1 0 7 6 6. ®® 7 O O O 7 O x d d d x x x 0 0 ❑ Q ❑❑ ❑❑ 7 0 0 0 J c� ¢¢¢ W w W Q''o d d d d J J I%1 Vl VI VI Vl Vl Vl Vl J J J J J J J _ J vl vl v+ ut In In In w u u u u u u u u u U u u ❑❑❑❑❑❑❑R ❑❑❑ O O u cc O Q o Q d d I/i.Vl V7 N an In ffil> Vl In VI VI In L% Vl Ul to VI VI Vl In Ul Vl Vl2 2 2 U U U G > > D D > > D > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >. 0 - - - - b - - c `` u u -C o a n 7 7 a u 7 0 4 - \ \ - o..... C u u .2 .0 n 0 0 0c u a 7 ,4. 7 7 a 7 aa ... a N o vl In ut . G, d U ,�. 7 aa o a 7 7 7 a C In 0 ut In a 0 In In a. Vl VI n L In N °n 4 to a Q o O" Q p o `o a a o a 0 0 0 o r a a o M a o 7n n n C' n u u D n u n'', o a._ a ._ a 7 7\ O ] - U 7 O C C 7 ° C U v U 7. C C C u U c u c0 a �' 5 J m ut a O O In n 0 10 O O t' O In j 0 0 0 �� o� _ 7 �vvm.`-'v 7 u u= 7 um d`d` 0 a '^ o o� o `^ 7 7 m 7 In In ut a vl In o 0 O m u O mmm 7 m m CO d N O vl , vl ., In m In In m' In m In vl In `^ vl In vl vl L O° d O L m m m m m m m d d m m d u m m 7 a 7 7 a n 7 a. 7 vl vmi In In w In vl vl vl In In h In al w w w w M In a s In a m v m m m m m v v v fO v v 0 'C vl vl In In vl vl In In In u u u u u v v d 7 °a p, c C n, C a IO N V C N w w 7 al aJ C C C C C 7 7 a �^ a s O 0 a: O O, w w u u U u "' U u 0 v v U v v `-' 7 "' U U t' m to U U N U In >> 7 C c c., u V c 7 7 7 C 7 7 U U U U U C• C O V 7 7 U 7 U ` m .--I u In �' •� U U V �" U u .� •� .> - •� ... m d` d` an d m m w w w ti w w v v N v v .� .� .� g .-i .� N .7-i E v Y v v v m v w m ❑❑❑ p❑❑❑ `o `o o p o `o - o 0 o v uvvv m>> `o y N N 0 d an d 7 7 7 7 7 ri ri rl 0 c-I .--I � v v `~ O O c u u u u u O 0 0 7 O O -O m C C O-D O O O 7 O O O O O Vml Vl Vl U w u. u' u, m, U .-I in e-I to '.,N 7 '-1 O O O O 0,,,� U 3 v !^ '6 U u w ai w '> Iaa '> '> '> 'S c io iw' ° y u u u Y u u o 0 o v o o Y y w v w v v O O w v v v w w w w w w o" o w E c u v O v m v o u u u 7 7 7❑>❑❑❑❑ w > '3 w w 'j `1 W `1 U W In E E v vl m m m `m m a v u w v �v dvv u u c c c > w w wv `m m w w w c w w -0 -0 In In In Qv o c r ILiI ✓Li ILiI ❑ vLi vLi ILiI ILiI vLi vLi vLi ❑ ❑ ❑ O ❑ ❑ 0 c ''.. c c N N N N,� N N N E m m E c c c c c c " c c c c c o 0 0 w c 0 0 oti dEvc ❑w•• dc d d d C ❑ c u `w O O O O O 0 cu sC w ° m0 0 0 0 0 0aa0 0E E E E.a a aasa aaCl u c Y y Y a v w wwcan naaaa ` ```a p '7 m pi u u ``u w c c c c c c o In O v Q Q Q Q u v 7 7 a 0 E E E L L w L L 7 m w N N N 7 7 7 7 7 7 Vl VI V1 V1 Vl t/1 7 7 O V v v C 0 0 0 Y w c w y u 7 w L ut n u u v n ¢¢¢ w u u u c c c c c m m m m `m Y v E o d` o 0 0 0 m d` C7 m a l7 a w w w w w m m m m m m w w w w w w m m x d v v v L w L>>> >> w ai w w w ai >>>> >, w w w u u u o N N W 'a lLJ :a a a n. VI u > y > > > > > > > > w w m M c-I c-I N N M M �'-� N N _ C C C u u u `u m `u `u `u `u ¢ ¢ m m¢¢ d m M M H .� ry N In Irl a c x m m m c .w, v N y :� Y y Y y sw. O O w>>> w Y v w w 2� m .w. w m; v a n v v v c w '> w w 7 7 7 7 O m m m m !' f7>>> 3 7 9>>> ¢¢¢ w N ❑ w❑❑ n '¢ n v v n 3 a 3 3 3>> n n n n n n 3 3>>> v n m v v v 7 3 Q Q In ul Q In In m ut vl In In In w o' o o v v v O O ❑ w .N v m v c c c c c c c c c c c oa >i n n c c c o~ o o ami m m ami ami ami >> m m>> w w m w w w w w w c c c c c c w w w w w w'c c m>> >,m m m > >>>> E E E E E E w w w w w w E E E E E E a a c a a a y v v .a M 3 0 7 `0 3 3 0 o E E 3 w w w w w w E E E E E E w w w w w w E E m a a a -==to to 7 d.. n. N N M m .� Vl g w w 00 as to W as w w w w''... w w W m as W as m w w N 'u 'N m> �, c c>> c c oa m> m m m m m m as W W to m as m m m m m m m oa ¢¢¢ c c a a a o °o °o °o °o o w o o 0 m m c c c c c c m m m m' m m c c c c c c m m d c c c C C m m m m m m c c c c c c m m m m m m C C L t t C C C m m n..>, a° ° a a m m °,2 2 2 2..2 2 m m m mIm m m '° o7a,� H r w w w n d n n c c c c �'� - v v v x x x n v v v w w N N N N w w w w w w w w w w w w w w w J J m w m m L L L L L w C C 00 tlo m as ap- as C C C C C C as c c as c ad c C .. .. .. w w w u u u u u w w c c c c c c w w w w w w c c c c c c w w u° 3 3 3 >`> w m .°. m m m m N ,C to a a. IJ N w w Q f` fYO m m m m w w w w w `1 ``` 2 E E N Y/ aw+ aw+ aw+ ,w. w rl d N N `u a `u `u ` l7 l7 u` O O O O 0 O l7 l7 l7 l7 l7 l7 O Q O O O O l7 (D m>>> w w w w w O L O L L O O L L L L L L L L L L L L L L L L L L L L L L L of y L L U U U u; '° Y u m aU+ 7 m w Y .u. a aU+ a 7 7 a 0--, " 7 aU+ •,+ U- Y, aV+ Y Y- --� - aV+ % aV+ N iU+ aU+ " aV+ C C C C � m- m In m m m m a m a a a m m '^ m m m m m m m m m m m m m m m m m m m m 3 3 3 0 0 0` v 'u i>> u u o In vl o o In vl o? ?????? v o 0 o m m m m m v°l ¢ v°l v°l ¢ a ¢ Q ¢ ¢ c ¢ c a a.. c c ¢ ¢ a ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ ¢ > E E E 3 3 a o 4 a a 0 o a m m m o 0 0 w `1 w w w 7 w w `1 w' w. 7 7 w w 7 w w w w w w `1 w w w w `1 `1 w `1 w w `! w w w ry ry >> m m m m m In m m m m j m u j m m In m m m m m m m m m m m m m m m m m m m m m m m Ia ¢ ¢ ¢ 3 3 3 3 3 3 3 3 3 v 3 v Y v v 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 7 7 7 c >I> >.........> > m > > > > d,> d m m d......d > >,..m > > > >......> > > > >'.> > > > > > > > > >.....> >',> > > o 0 0',> 0 ui j m m m '., I`0 m m Fo m m m m f`0 m m m m m m m m m m m m m m f`0 m m m m m t`0 m m (` m m m m m C C C U U U m m v v w v v v v v v w w'v v v w v v v'o 0 0> >,v v v v v v -0 v v v v v v v v v v v v v v v v w'w LL LL w w LL LL w Iw LLLL w w LL LL w w LL LLw w LL LL LL w LL LL LLLL w w w Iw w LL w w w LL LL u u u m m m LL LL LL LL LL LL LL LL LL LL LL ''LL LL LL LL LL LL LL LL LL LL 3 3 3 VI Vl VI Vl Vf VI Vf. Vf VI VI VI. Vl Vf V1 Vl, V1 Vf Vl VI N Vf V1 VI VI Vf Vf Vl V1 Vl. Vl Vf Vf VI VI VI VI Vf VI In Vl V) Q as Q VI Vl O O 7 7 7 O D O O� '. D, :3¢¢¢>>> 7 0 v w w m v w v w w w w v w w v w w w v v w v v v w v v v v a w v a v v v w wl w v m w v v v m. m y m m m m m,.., m m 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 > > > > > > > > > > > > > > >'> > > > > > > > >,> > > > > > > > > > > > > > > > > > > > > > > > >, El O m m lD kD n I n 0) D) n O ul V1 V1 O O N O m n m D1 ," m m a t N D) .-i m m o v n n aT a) o o -1 ,! m m LD LD Lq n -! n an v ao ".. rry m m)D)' N ao N an rn an V m N n n n n M M m 00 M M O W O N ID ll) o V 00 '',. W M to c-I 00 V N N O n M M M n D) M ',00 CO 00 00 n n N' N m N Vl lD D) O N r D 00 N m m D an lD -i D lD O V) lD m m m V N N a--1 �-i ... N .--I ei .-I '., aD 00 n N m,V m 0,N T---OO-00-0 v1+n .n an1v* —I+n1an +n.inO OO O O 1 O OO O o O O O O O O O m N O O O �.. llo O O O O OOO O O O O O O O O O O N I--! O o N O m lD O O o o o ari an o 0 0 0 0 0 o v m o an o o .-I n n m an ari o .-I ari ari�l i I 'o m mlm o m o0 0 0 0 o o n o o m D n m N m'v D r nm nitiO u) O, �+1 N N c-I . -I ei N . -I c-1 O in o m an m ', .�, LL LL LL LL LL CW W. '' y,iy 1 LL LL alL ', LL � LL LL LL C7 a. d1•. � �. G9.. X 4k... IL Lm,' LL VI LL N 6p. VC 0 4.y,� ❑ ❑U'' ❑ Qp J J J d u cy �' m g' u U u a a rt. c' W q` u u 4,b Ua u 0 0 Y r 1 Ca. a. va 4n arl J U� �❑w 4v>.aa ' ua'.uu uu au uu u ..an yr wa irr an a>n arn c7+ - vo r2Ir°�a >2r 2 2 vra .wyary 2 >>> > > OaOOu Oa a>y r'ase-d 01 0 0' o 0 14 + ti ri o ~ N O N v v v a 2 v v 2 U u U U 0'o O o...'0 0 o a a a+ a m L o `~ a) an W O v N N LL LL 1? n 4- N LL LL N M Va 0 LL LL LL > 2 2 > n v A Y N t%9 to V) 0.V9 r r r r r m J u � O c E u d -a m a J „ o OuLi U �w � c o. S = v I.O O. O .� O O �' CJ a U J U '.'. J 7 u J' J J V 'v'..... .v o wt an o ) __ a CO o o a a m 10 fa f0 ,7 J J -D w uti ro p O u O ,n C C C J J M C w Ul w c c as :� :� u Urn u p u u u u>>> �p v v m ti-.ti ti + ui o y v J J 7 a ❑ U U U N~ 0!' as N as O w ai y _ c. U c. m m m v n w 'w .a w E v E m v � v ai' a a a a to m 0 0 � ....... I °ru O O O O� .. O 'r° , E E c to c Ic c CP N p p p'ic, p O O .« m 'C4' ❑ 2k ". O,G'L...rc O' as 7 7 N N LLLL U a = > ,❑0 o 0 G iU+ Y 2 v m v an v an a �w .Ca 'j x"J .i✓ 00,O 0 u u U '"O U T8 11 '3 7 J 7 C J 7 J J Y 4n Y C p n11 LF1 ` N N c 0 ma 0 ra O C 0 aia c w' m m m :cc Q p an an an 10 a CL - rcx. p p, a 'rw 0 u oa +v - 3 O as .6 c v an.... LL 2 [t. a ?" cay. yv" � u a. Q Q i u u c a) uc " ,,,_,+ cv N x+a as Al en m •^ E' > > Y' c v v° .v u u Z .Z v v v _ m '� as ❑❑ L v x v v v v v a 011, v an >> > 7 5 3 an 3 u L pJ� m an an an a en an an an Q w v w •° a p to � ca caa' Cc �. c c E` > aci > io 0 0 is a cm c 4n c na c.OD c 00 v C� vp..c a�a °C � c C c� �� E E aEr ER 3 Ev' E w m 5 v �4a v w v v u a _ c c c p c i2 sv 7 -e i m mri >CE E E m k..� -�; O rma pip cG c cc Na Na M re Ca as O O O C n u 'bfr.� C 5a c C 0: C'. c C C as 4 O O a� Y o'J v u ro *c ma. 4a ro as as as `tp° , 'a. � v to o tw v v u Q c c v Y v m c m c v c m .. c c c .2 c c c c u u u u w E E v c v v v v v v v w` to >, 4ac ,ev O v v v v .E+- Q) v v v J E D 3? 3 a .7. v — „E c c "E a l7 0 l7 ID l7 l7 l7 C7 l7 `? 'O '•� is B 'Q Q Q U c O C p C p C p J G. 6I1'. 'y L L L u L L L L L u, L I,, al ./ W > > U U U N U 00 C L lia' O Y Y Y Y 7 yU., aV+ N G]. Y CL 7. as m .0 io m mu ro ao m CL. ro CL wn ro I$ Y{w'.. 3 �`"C' , ? ti 70 3 � � cv yIn ��y Y'aa'aaa a•a'a'a c,a > > " v v v_ v v a v a a v v v v° v° o a u m v u > v = u u � 7 p0 •� J ro ao ao ao as as an 4a ao `m mm a,a'4 T7 Cl ao `m c o u u u u u v 3 v7 = 3' 3 ;.7 u to GO,Y to J' C u z an to a a an > > > > > m > > > > D_ > d m ': D > > m m m m m m m m m m A m m 6 m 6 m m m m m 0 F j6 m m m m m m m N " N N v A) 7/ l0 N 01 a v •v , ,lU Oa Ul ,al W Gl .v N U/ Ol G) N aJ W ''... v v ''... N v v '... v W al 0 0 = 0 _ '.. an an an an n�'4 an an an an ' an an an 'wa a✓m ar4 � apr�an ''.... an an an an yr an vi ari a.ri4x3 Via. 0UJ2 2 N v W 'Ai au 4L4 aJ `l m aJ 0A2 2 m3 fo3 N3 to3 N3 HIM!` N I'll' N v v v W Wao 3 Agreement No. 7434 S RESPONSE TO THE State of Utah REQUEST FOR PROPOSAL Dint Master Agreement for Cloud Solutions SOLICITATION NO. CH16012 Technical Proposal Thursday March 10, 2015 CARAHSOFf TECHNOLOGY CORP. 1860 MICHAEL FARADAY DRIVE, SUITE 100 RE'SI O'N, VA 20190 WWW,CAR'AI-ISOFTi .COM Agreement No. 7434 March 10, 2015 State of Utah Division of Purchasing 3150 State Office Building Capitol Hill Salt Lake City, Utah 84114 Rei, Carahsafts Response to the State of Utahs Request for Proposal for NASPO luePoint Master Agreement r Solutions, o r . Dear Mr. Hughes, Carahsoft Technology Corp. appreciates the opportunity to respond to the State of Utah's Request for Proposals/Qllnformation for Project Description. Carahsoft Technology Corporation understands that they may required to negotiate additional terms and conditions, including additional administrative fees, with Participating Entities when executin a Partici� atin � Addendum.. When writing this response Carahsoft utilized the OEMs being proposed as a part of this response to assist in preparing this response. Staff responsible for creating this proposal include Robert R. Moore - Vice President, Jack Dixon - Contract Specialist, & David Holl - Proposal Coordinator. Carahsoft Technology Corporation is not currently suspended, debarred or otherwise excluded from federal or state procurement and non-procurerent pro rams. Carahsoft Technology Corporation acknowledges that a 0.25% NASPO ValuePoint Administrative Fee and any Participating Entity Administrative fee will apply to total sales for the Master A reement s awarded from the RFP. Carahsoft Technology Corporation is including an all -encompassing list of solutions in this response which covers the SaaS, PaaS, & IaaS categories. Services completion/deployment will vary based on manufacturer but will utilize either the manufacturers own integration policies and procedures or a third party subcontractor specializing in servicing the manufacturers' ecic solution. • Carahsoft can provide varying levels of data risk support based on customer requirements, manufacturer, and solution Please see our res ones to Attachment H for further detail. Please feel free to contact me directly at 703.871.8504/Robert.Moore carahsoft.corn or Jack Dixon at 703.230.7545/Jack.Dixon0carahsoff.com with any questions or communications that will assist the Agency in the evaluation of our response. This proposal is valid for 90 days from the date of submission. Thank you for your time and consideration. Sincerely, Robert R. Moore Vice President ftyu..uNIR➢LUI9A,RAI�Ck%DRIVE J-`i,ArYwo�REwgO'w.�,.�!tl.u�a8tbj"���. dv:j&81 .0')1k N,"0,,1rig 180'j1' V",,"CA&,'0154'd'FTh(Jid Agreement No. 7434 SOLICITATION # CH16012 TABLE O F CONTENTS �� RFPSignature Page...........................................................................................................1 Acknowledgement of Amendments.................................................................................. 4 ExecutiveSummary............................................................................................................6 Prime Contractor: Carahsoft Technology Corp ................... ................ ...........................,.....,........... ,... 6 MandatoryMinimums.........................................................................................................8 BusinessProfile................................................................................................................12 OrganizationsProfile........................................................................................................21 TechnicalResponse.........................................................................................................23 Confidential, Protected, or Proprietary Information.....................................................183 Exceptions and/or Additions to the Standard Terms and Conditions ........................185 InSummary.....................................................................................................................186 Supplemental Information..............................................................................................187 Agreement No. 7434 SOLICITATION # CH16012 _Lead Request ifbr" per ..+ and signed. Please fin� —belCw C""'a'r'ahsofrs RFP Signature Page below, ..... r , Agreement No. 7434 State of Utah Vendor Information Form zoos Legal Company Name (include d/b/a if applicable) Carahsoft Technology Corporation Ordering Address 1860 Michael Faraday Drive, Suite 100 Remittance Address (if different from ordering address) 1860 Michael Faraday Drive, Suite 100 Type ❑ Proprietorship ❑ Partnershi p ❑Government ® For -Profit Corporation ❑ Non -Profit Corporation Telephone Number (include area code) 703.871.8504 Company's Internet Web Address www.carahsoft.com 0fferc:,r Authorized Representative's Signature Type or Print Name Robert R. Moore Position or Title of Authorized Representative Vice President Date: 3 110la0/G Federal Tax Identification Number 52-2189693 City Reston City Reston Company Contact Person Robert R. Moore Fax Number (include area code) 703.871.8505 State of Utah Sales Tax ID Number 9721863-0143 State Zip Code VA 20190 State Zip Code VA 20190 Email Address robert.moore@carahsoft.com 12/15/2014 Agreement No. 7434 3/1/2016 Request for Proposal.htrnl State of Utah Request for Proposal Legal Company Name (include d/b/a if applicable) Federal Tax Identification State of Utah Sales Tax ID Number ' Number Carahsoft Technology Corporation 52-2189693 9721863-0143 Ordering Address City State Zip Code 1860 Michael Faraday Drive, Suite 100 Reston VA 20190 Remittance Address (if different from ordering address) City State Zip Code 1860 Michael Faraday Drive, Suite 100 Reston VA 20190 Type XCompany Contact Person Corporation Partnership Proprietorship Government Robert R. Moore Telephone Number (include area code) Fax Number (include area code) 703.871.8504 703.871.8505 Company's Internet Web Address Email Address www.Carahsaft.com Robert.Moore@Carahsoft.com Discount Terms (for prompt payment discounts): Days Required for Delivery After Receipt of Osier (see attached for Not Applicable any required minimums) By submitting a proposal in response to this RFP, the Offeror acknowledges and agrees that the specifications„ terms and conditions, or other elements of the RFP are not ambiguous, confusing, contradictory, unduly restrictive, erroneous, or anticompetitive. The Offeror further acknowledges that it has read this RFP, along with any attached or referenced documents, and this document, including the General Provisions. Offeror's Authorized Representative's Signature Date 3/10/2016 llwe� Type or Print Name Position or Title Robert R. Moore Vice President NOTICE file:///C:/Users/dholllAppDaWA-acalfremprremp16 selectedDocumeft.7jp/RequestI.2Ofor%2oProposal.hlml 1/3 Agreement No. 7434 SOLICITATION # CH16012 4 __ Agreement No. 7434 ACKNOWLEDGEMENT OF AMENDMENTS TO RFP (SOLICITATION CH16012) This attachment represents that the Offeror has read, reviewed, and understands the totality of Solicitation CH16012, including the final RFP document posted on February 10, 2016. By signing below, the Offeror attest to reviewing the documents listed above. Carahsoft Technoio y Cor oration Offer Rep esentative Signature Agreement No. 7434 SOLICITATION # CH16012 EXECUTIVE SUMMARY The one or two page executive summary Is to briefly describe the Offeror's Proposal. This summary should highlight the major features of the Proposal. It must indicate any requirements that cannot be met by the Offeror. The Lead State should be able to determine the essence of the Proposal by reading the executive summary. See Section 5.4 of the RFP. • • • 1711, •• • r Carahsoft Technology Corporation understands that the State of Utah & NASPO ValuePoint is seeking a Master Agreement for Cloud Solutions. Carahsoft has assembled a team from our vast portfolio of over 200 hundred vendors that includes our premiere network of cloud solutions, resellers, and subcontractors as the best solution to meet the State of Utah's requirements. The intent of our proposal is to deliver the highest value proposition at the lowest possible cost to the State of Utah, NASPO ValuePoint, & all participating entities for the acquisition of cloud solutions. Carahsoft understands the need for high quality cloud based service providers that have the ability to provide a menu of cloud solution offerings. Carahsoft's superior contract management and network of Cloud Solution Providers will ultimately increase the State & Participating Entities overall efficiency, reduce costs, improve operational salability, provide business continuity, increase collaboration efficiencies, and all for expanded flexibility. Carahsoft Technology Corp. is an IT solutions provider delivering best -of -breed hardware, software, and support solutions to federal, state and local government agencies since 2004. Carahsoft has built a reputation as a customer -centric real-time organization with unparalleled experience and depth in government sales, marketing, and contract program management. This experience has enabled Carahsoft to achieve the top spot in leading software license GSA resellers. VENDOR RELATIONSHIPS — Just as each state, territory, and participating entity is unique in how they employ cloud solutions, Carahsoft's cloud offering follows a unique business model focusing on providing superior sales and marketing execution, a track record of success, high integrity, and a focus on strategic vendor relationships. PROVEN EXECUTION (Growth and Experience of Sales) — Carahsoft has been supporting the IT needs of Government and Education Customers for more than 12 years. Our Public Sector Sales Team supports the Government, Education, and Healthcare vertical markets and is an enormous component of Carahsoft's ongoing and continued growth. In 2014, Carahsoft had revenues of over $213 in the public sector market. Our State & Local Government Sales Force is solely dedicated to supporting the unique needs of Higher Education, K-12 Schools, State Government, and Local Government customers. CONTRACT VEHICLES — Over the past ten years Carahsoft has acquired and maintained a wide variety of purchasing contract vehicles for agencies at the state, local, and federal levels. Carahsoft holds statewide contracts in many states across the country, and we have a great deal of experience with contract transitions. Associated with all contracts are dedicated and experienced contract management resources. Agreement No. 7434 SOLICITATION # CH16012 Carahsoft has leveraged its vast contracting experience and extended it to quoting and order management. Carahsoft seamlessly generates quotes within 30 minutes or less and processed over 56,000 orders in 2014 that were each completed the same day received. GROWTH & STABILITY — Carahsoft has continued to show impressive growth year after year, turning annual revenue from $3.4 million in our first year in 2004 to $1.065 billion in 2011, $1.465 billion in 2012, $1.8 billion in 2013, and $2.45 billion in 2014. In September of 2014, 7,501 orders were processed worth over $626 million. We are a stable, conservative, and profitable company and have received numerous accolades including the 2013 GovCon Government Contractor of the Year Award in the greater than $300M revenue category. Carahsoft was also recognized in the following areas: Largest GSA Schedule 70 Contract holder for software' ° "C 7rn of the Washington Business Journal's 100 Largest Private0Companies List for 2014 � ���' 2012 Federal 100 Winner, Craig P. Abod, President and CEO 2013 Federal 100 Winner, John Lee, Vice President of Cloud Services As a part of this response Carahsoft has utilized multiple Cloud Solution Vendors, covering all of the Cloud Solution Categories; SaaS, IaaS, PaaS. Carahsoft's strong vendor relationships and partner ecosystem have created an efficient and cost effective response which encompasses all vendor solutions into a single, easy to utilize vehicle. While the technical requirements of each solution vary, Carahsoft strives to consolidate these specifications and responses into a cohesive unit. Agreement No. 7434 SOLICITATION # CH16012 MANDATORY MINIMUMS This section should constitute the Offeror's point -by -point response to each item described in Section 5 of the RFP, except 5.1 (Signature Page) and 5.4 (Executive Summary). An Offeror's response must be a specific point -by -point response, in the order listed, to each requirement in the Section 5 of the RFP. 5.1— Signature Pro Page _ osals must be submitted with a .... p vendor information form, located on Bidsync as an attachment to the RFP, which must contain an ORIGINAL HANDWRITTEN signature executed in INK OR AN ELECTRONIC SIGNATURE, and be returned with the Offeror's proposal, Please find Carahsoft's Signature Page completed above. 5.2 — Cover Letter _W ........ ..... ........... ........ Proposals must include a cover letter on official letterhead of the Offeror. The cover letter must identify the RFP Title and number, and must be signed by an individual authorized to commit the Offeror to the work proposed. In addition, the cover letter must include: 5.2.1 A statement indicating the Offeror's understanding that they may be required to negotiate additional terms and conditions, including additional administrative fees, with Participating Entities when executing a Participating Addendum. 5.2.2 A statement naming the firms and/or staff responsible for writing the proposal. 5.2.3 A statement that Offeror is not currently suspended, debarred or otherwise excluded from federal or state procurement and non -procurement programs. 5.2.4 A statement acknowledging that a 0.25% NASPO ValuePoint Administrative Fee and any Participating Entity Administrative fee will apply to total sales for the Master Agreement(s) awarded from the RFP. 5.2.5 A statement identifying the service model(s) (SaaS, laaS, and/or PaaS) and deployment model(s) that it is capable of providing under the terms of the RFP. See Attachment C for a determination of each service model subcategory. The services models, deployment models and risk categories can be found in the Scope of Services, Attachment D. Note: Multiple service and/or deployment model selection is permitted, and at least one service model must be identified. See Attachment H. 5.2.6 A statement identifying the data risk categories that the Offeror is capable of storing and securing. See Attachment D and Attachment H. Please find above Carahsoft's Cover Letter addressing these requirements. Agreement No. 7434 SOLICITATION # CH16012 f.3 — Acknowled ement of Amendments g the RFP is as a ded the Offeror must acknowledge each amendment with a si n acknowledgement form provided with each amendment. Failure to return a signed copy on the g opy of each amendment acknowledgement form with the proposal may result in the proposal being found non- responsive. Carahsoft acknowledges all amendments. Also please find below Carahsoft's Acknowledgement of Amendments form completed,. 5.4 — Executive Sum Offerors must provide an Executive ry of its he major features of an Offe or's proposal. Briefly describe l the p proposal innomore ve rthan three ary ld 3 ig )Pal9es t ig ( The evaluation committee should be able to determine the essence of the proposal by reading the Executive Summary', Any requirements that cannot be met by the Offeror must be included. Please find above Carahsoft's Executive Summary addressing these requirements. 5.5 — General Requirements 5.5.1 Offeror must agree that if awarded a contract it will provide a Usage Report Administrator responsible for the quarterly sales reporting described the Master Agreement Terms and Conditions, and if applicable Participating Addendums. Carahsoft agrees that if awarded a contract they will provide a Usage Report Administrator responsible for quarterly sales reporting described in the Master Agreement Terms and Conditions, and if applicable Participating Addendums. 5.5.2 Offeror must provide a statement that it agrees to cooperate with NASPO ValuePoint and SciQuest (and any authorized agent or successor entity to SciQuest) with uploading an Offeror's ordering instructions, if awarded a contract. Carahsoft agrees to cooperate with NASPO ValuePoint and SciQuest (and any authorized agent or successor entity to SciQuest) with uploading Carahsoft's ordering instructions, if awarded a contract. 5.5.3 Offeror must at a minimum complete, provide, and maintain a completed CSA STAR Registry Self Assessment. Offeror must either submit a completed The Consensus Assessments Initiative Questionnaire (CAIQ), Exhibit 1 to Attachment B, or submit a report documenting compliance with Cloud Controls Matrix (CCM), Exhibit 2 to Attachment B. Offeror must also represent and warrant the accuracy and currency of the information on the completed. Offerors are encouraged to complete and submit both exhibits to Attachment B. ror ease or access ana evaluation, c;aransott has provided these Assessment documents under separate cover. All copies have been submitted electronically per the instructions of the RFP. Please note that specific assessments have been labeled as confidential- additional information is provided in the Confidential, Protected, or Proprietary Information section. Agreement No. 7434 SOLICITATION # CH16012 5.5.4 Offeror, as part of its proposal, must provide a sample of its Service Level Agreement, which should define the performance and other operating parameters within which the infrastructure must operate to meet IT System and Purchasing Entity's requirements. SERVICE LEVEL FRAMEWORK The service levels ("Service Levels") applicable to the Services specified in Sections 1 and 2 are set forth in Schedule B to this SD ("Service Levels for Cloud Platform Services"). The framework that governs all Service Levels is set forth in this Section. Commencement of Service Levels Commencing thirty (30) days from the Service Start Date (as set forth in the applicable Order Form), Virtustream's performance of the Services will meet each applicable Service Level. If Virtustream's performance of the Services does not meet the applicable Service Level, then Virtustream will use commercially reasonable efforts to restore its performance to meet such Service Level. Service Level Reports Service Levels will be calculated and measured monthly by Virtustream on a calendar month basis and reported each month for the previous month. The reports will be provided to Customer by the tenth (10th) working day of the month following that to which such report relates, commencing on the second (2nd) month following the Service Start Date and each month thereafter. The monthly service level report will contain at least the following items: (i) Uptime statistics for the month concerned; (ii) an analysis of reported incidents over the previous month, broken down by type for discussion; (iii) action plans for items giving rise to concern; (iv) comments and observations on any issues arising from Virtustream's performance monitoring activities; (v) recommendations on service delivery strategies to maintain or enhance the service level; and (vi) review of general business requirements ("Service Level Report"). Cloud Platform Services (CPS) has its own specific service levels as described in this document. Cloud Cover Services (CCS) has service levels that pertain to the CCS offerings and are reported separately. Not all Virtustream customers have CCS but all Virtustream customers use CPS. Service Level Review Meetings Monthly Service Level review meetings will be conducted by Virtustream with Customer where the monthly Service Level report specified above will be discussed. If any of the Service Levels measured over the previous calendar month period is not achieved in that month, then Virtustream will include the steps taken to rectify the problem in the next monthly Service Level Report. In addition, the issue shall be an agenda topic for discussion at the next monthly service review meeting. Additionally, after restoring service or otherwise resolving any immediate problem as specified in this SD, if Virtustream fails to provide Services in accordance with the Service Levels, Virtustream shall: a. Promptly investigate and report on the causes of such problem; b. Provide a Root Cause Analysis of such failure as soon as practical after such failure or at Customer's request; c. Correct such problem that is Virtustream's fault or responsibility, as soon as reasonably practicable and coordinate the correction of such problem if Virtustream does not have responsibility for the cause of such problem. d. Advise Customer of the status of remedial efforts being undertaken with respect to such problem; e. Demonstrate to Customer's reasonable satisfaction that the causes of such problem (that is Virtustream's fault or responsibility) have been or shall be corrected on a permanent basis; and f. Take corrective actions to prevent any recurrence of such problem (that is Virtustream's fault or responsibility). Root Cause Analysis Promptly following Virtustream's failure to meet a Service Level, Virtustream will perform a root cause analysis to determine the reason for that failure. Upon Virtustream's determination of the cause of such failure, it will provide to Customer a preliminary report citing the cause of such failure. If Virtustream determines that the failure was due to Virtustream, an additional report will be provided that details the root causes of the failure, and which details any measures that should be taken to minimize the possibility that such failures will re -occur. Virtustream will correct the problem and use reasonable commercial efforts to minimize the re -occurrence of such failures. Service Level Exceptions Virtustream shall not be liable for any failure to meet the Service Levels, to the extent such failure was caused by one or more of the following: a. A failure of Customer or any of its employees, agents or contractors (including any of Customer's third party service providers) to perform any of its responsibilities under this SD; 0 Agreement No. 7434 SOLICITATION # CH16012 b. Any act or omission of Customer or any of its employees, agents or contractors (including Customers third parry service providers or other third parties acting on behalf of Customer); c. Any hardware, software or other product of a third -party or Customer equipment; d. Any failure of Customer to secure the proper access rights or maintenance and support services with respect to any component of the Services (e.g., hardware, software, network, maintenance) for which Virtustream does not bear operational responsibility; e. Downtimes resulting from a Virtustream's scheduled maintenance windows; f. Customers reprioritization of the tasks to be performed by Virtustream where such reprioritization causes Virtustream to miss a Service Level; g. Viruses; provided that the infected Virtustream-provided system had virus protection for which the virus protection software updates were up to date; h. An election by Customer to purchase a base commitment that is not sufficient to run Customer's system (e.g., If a customer elects to size a NVM pool that is insufficient to run the designated workload); i. Issues occurring outside of standard working hours (as defined for business level customers) — for which the Service Level Objectives (SLOs) do not apply; j. Cloud Cover Services (CCS) offerings — for which the Service Level Objectives (SLOs) do not apply; k. Resolution delays due to lack of client response and/or Customer provided credential based information; I. Priority levels not agreed upon by both customer and supplier; m. Claims of performance degradation not substantiated through Customer provided diagnostic testing results. 5.7 Recertification of Mandatory Minimums and Technical Specifications Offeror must acknowledge that if it is awarded a contract under the RFP that it will annually certify to the Lead State that It still m exceeds the meets or exce technical Ica capabilities discussed in Its proposal. Carahsoft acknowledges that if awarded a contract under the RFP that it will annually certify to the Lead State that it still meets or exceeds the technical capabilities discussed in this proposal. Agreement No. 7434 SOLICITATION # CH16012 BUSINESS PROFILE �.� _ ....... This section should constitute the Offeror's response to the items described in Section 6 of the RFP. An Offeror's response must be a specific point -by -point response, in the order listed, to each requirement in the Section 6 of the RFP. 61— Business Profile Provide a profile of your business including: year started, organizational structure, client base (including any focus by region, market sector, etc.), growth over the last three (3) years, number of employees, employee retention rates (specific for employees that may be associated with the services related to the RFP) over the last two (2) years, etc. Businesses must demonstrate a minimum of three (3) years of experience providing cloud solutions for large scale projects, including government experience, to be eligible for award. Carahsoft Technology Corp. was started in Reston, Virginia in 2004. Carahsoft remains headquartered in Reston Virginia employing over 500 people that specifically support the Public Sector (Federal, State, Local, and Public Funded Educational Entities Nationwide within the United States.) Carahsoft has built a reputation as a customer focused organization with depth of experience in government sales, marketing, and contract program management. Carahsoft is one of the largest sellers of Cloud (including SaaS, PaaS, and IaaS) to U.S. the Public Sector. Carahsoft's organizational structure allows for very focused and individualized support of any customer. The Executive Management team at Carahsoft is responsible for all aspects of day to day running of the organization. Reporting to the Executive Management Team are Directors. It is the Director's primary responsibility to oversee a particular technology area(s) and to monitor and manage all aspects of the staff, customers, and business within that area. An example of a Technology Area at Carahsoft is the VMware Virtualization practice. A host of technology offerings that use VMware at their core are supported by a single business unit overseen by a single Director that has reach back and access to the Executive Management staff. The Director's are then supported by a group of Team Leads. Each Team Lead Oversees a business area (typically defined by customer type (i.e. State Customers) or technology type (i.e. Virtual Desktop). Each team lead oversees a staff that is responsible for executing and managing the activities within that business unit. At its' core, this organizational structure is lean and efficient, lacking layers of middle management, and empowering individuals with decision making capability in order to support all customers quickly an efficiently. Carahsoft boasts an excellent employee retention rate. Specific benchmarks that we track include employee retention at 2 years of employment and 4 years of employment with rates of 65% and 90% respectively. Carahsoft has been providing cloud solutions since opening its doors in 2004. US Public Sector entities have relied on Carahsoft to provide a wide variety of cloud technologies. Carahsoft serves as the cloud distributor and provides access to the core cloud technology with the core technology being supported by companies such as SalesForce, Google, ServiceNow, etc. Carahsoft currently support a state-wide implementation of Service Now's cloud technology within the Commonwealth of Pennsylvania. This implementation is known as the Enterprise Information Help Desk and manages all incident requests. Additionally, in 2013, Carahsoft has contracted with the State of Ohio to provide a cloud solution built around the technology from Salesforce. Ohios' Department of Administrative Services has contracted for Carahsoft to provide a variety of services including Service Cloud, Radian6 and Marketing Cloud as well as others. Both the Ohio and Pennsylvania cloud solutions are still being provided to these organizations. Contracts similar in scope and size of this NASPO Cloud RFP: 1� 12 Agreement No. 7434 SOLICITATION # CH16012 California Multiple Award Schedule ........ �......._ California CMAS 3-12-70-2247E Delaware Salesforce Contract _......� _._._.. Delaware SE-CLD-001 Florida Commercial -off -the -shelf Software Contract _ Florida CO-TS 43230000-14 ____.- 4-01 Iowa Salesforce Contract ...........�. _ ........ Iowa 2015-BUS-004 Ohio Master Cloud Services Agreement - — ....... Ohio MCSA-0016 �......... Ohio State Term Schedule _._....� _ _._ .................. Ohio STS 534354 ........ Texas DIR Salesforce Contract _..... ....... .... - DIR-SDD-1793 ....... _.... _ Texas DIR Emergency Preparedness Contract _.......... DIR-SDD-2035 Tex_.._ �....�......... as DIR Software/SaaS Contract — _.... _ ..... DIR-TSO-3149 _...... VITA Desktop Productivity Software Contract _w...... VITA VA-140401-CARA 6.2 — Scope of Experience Describe in detail the business' experience with government or large consortium contracts similar to the Master Agreements sought through this RFP. Provide the approximate dollar value of the business' five (5) largest contracts in the last two (2) years, under which the Offeror provided Solutions identical or very similar to those required by this RFP. Government experience is preferred. CONTRACT VEHICLES — Over the past ten years Carahsoft has acquired and maintained a wide variety of purchasing contract vehicles for agencies at the state, local, and federal levels. Carahsoft holds statewide contracts in many states across the country, and we have a great deal of experience with IT Master contracts accessible to numerous public agencies. Carahsoft has extensive experience in successfully launching, maintaining, and managing these contracts and projects over a wide range of government customers. The range of government projects include agency/ county/ city wide project, state-wide efforts, and multi -state contracts, as well as supporting projects that cross a wide range of Federal government customers. Examples of some of these projects include: TEXServe Multi jurisdictional Purchasing Program: Carahsoft promoted and managed the Texserve Contract -allowing the full VMware Products & Services portfolio to be procured by Texas K-12 Users at a discounted price. TEXserve services including: VMware Technical Support, Pre -sales licensing configuration & design, contract promotion, ad hoc revenue reporting, and customer nurturing/ upsell campaigns. Carahsoft worked with Texserve, K-12 customers, to partner with a select number of VMware Premier and Enterprise Authorized Resellers utilizing their expertise under the Texserve contract. ONENET Purchasing Consolidation: Carahsoft serves as the prime contractor and program manager for the ONENET contract serving the entire ONENET community providing the ability to procure VMware software (licensing/support) through a trusted network of strategic partners at a discounted rate. Carahsoft has a proven track record of providing the highest level of technical support while ensuring that members receive the proper software products and services conveniently under the ONENET Contract. TX DIR Contract Sales: Carahsoft maintains a number of purchasing vehicles with the State of Texas Department of Information Resources (DIR.) 2014 DIR sales accounted for greater than $50M in revenues. Carahsoft actively markets these contracts and has grown revenues at greater than 10% annually for the past 5 years. Total GSA State & Local Sales: Carahsoft holds a US General Services Administration (GSA) Schedule 70 Technology Contract. This contract is open to State and Local agencies to purchase as a form of Cooperative camhsoft 13 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Purchasing. Carahsoft markets the availability of this contract to eligible users and maintains sales revenues to eligible State and Local entities at greater than $50M annually. As a whole, Carahsoft's five largest public sector contracts have totaled approximately $211,571,007 in sales in the past 2 years. Carahsoft GSA..S..-.,.. ._- ............. .......� Schedule GS-35F-0119Y _..._ � ........ .. $127,242,948.95 ..........__._. � ........... ..._ Texas DIR Emergency Preparedness Contract TX-DIR-SDD-2035 $ 39,007,058.19 Texas DIR BMC Contract TXDIR-SDD-1727 $ 15,734,306.68 ................. -- . Texas DIR Salesforce Contract TXDIR-SDD-1793 $ 14,876,679.26 Texas DIR Adobe Contract TX-DIR-SDD-2504 $ 14,710,013.43 Total Sales: $211,571,006.51 These contracts make up close to 2/3 of the total sales on contract that Carahsoft completed in that span. All of these contracts are currently in place with government entities. 6.3 Financials Offeror must provide audited financial statements, of the last two years, to the State that demonstrate that an Offeror meets at a minimum Dun and Bradstreet (D&B) credit rating of 3A2 or better, or a recognized equivalent rating. Please provide the Respondent's D&B Number and the composite credit rating. The State reserves the right to verify this information. If a branch or wholly owned subsidiary is bidding on this RFP, please provide the D&B Number and score for the parent company that will be financially responsible for performance of the agreement. Carahsoft has deemed its audited financials to be considered confidential. Additional information is provided in the Confidential, Protected, or Proprietary Information section. For D&B report along with additional clarification, please see page 360 in the Supplemental Information Section. 6.4 — General Information 6.4.1 Provide any pertinent general information about the depth and breadth of your Solutions and their overall use and acceptance in the cloud marketplace. Carahsoft has assembled a team from our vast portfolio of vendors that includes our leading premiere network of cloud solutions, resellers, and subcontractors as the best solution to meet the State of Utah's requirements. They include: AODocs, CA, DocuSign, FireEye, Google, QTS, Salesforce, SAP, ServiceNow, Virtru, Virtustream, VMware Carahsoft is submitting as the exclusive offeror for all Google, Salesforce, and ServiceNow solutions and services for the NASPO Cloud solicitation. These manufacturers have deemed Carahsoft as the prime contractor who can effectively and efficiently manage the NASPO cloud contract on their behalf. As a part of this response Carahsoft has utilized multiple Cloud Solution Vendors, covering all of the Cloud delivery models; SaaS, IaaS, PaaS. Carahsoft's strong vendor relationships and partner ecosystem have created an efficient and cost effective response which encompasses all vendor solutions into a single, easy carahsoft 14 _ Agreement No. 7434 SOLICITATION # CH16012 to utilize vehicle. While the technical requirements of each solution vary, Carahsoft strives to consolidate these specifications and responses into a cohesive unit. For example: CA Technologies is a leader in IT Management Solutions in the industry. CA has be steadily moving its premier on premise management solutions to the cloud. CA Clarity Project and Portfolio Management (PPM) is one of the leading solutions used by state governments today. Google's SaaS offering, Google Apps, has been commercially available since 2006 and presently has —5.3 million paying customers covering 26m+ end user licenses. Google Apps represents a combination of the most popular consumer products that have been prepared for Enterprise use through the means of adding Administrative and Compliance Controls to the suite. Gmail is the anchor product in the SaaS offering. Google has over 1 B consumer users of Gmail and from that success designed a means by which customers could bring their own email -enabled domain name(s) into this managed service to replace legacy on -premises systems at a significantly reduced price. The straightforward means of migrating data as well as configuring the service and the knowledge that a majority of these business users may already be familiar with Gmail via personal use has made the adoption of Google Apps a logical choice. Examples of the evolution of this SaaS offering include: • Acquisition in 2007 of one of the leading email security and compliance vendors and the integration of those services to the Gmail Advanced Settings options. These features include the ability for customer System Administrators to set Spam, Content, Attachment and TLS policies to meet their specific requirements. • In 2011 Google launches the Google Apps Status Dashboard, a publicly accessible website with RSS feeds to keep the world apprise of current system status. • In 2012 Google increases the Gmail storage allocation from 10gb to 25gb, no change in price • In 2013 Google modifies the storage space to unify email and Drive storage and increase the allocation to 30Gb, no change in price • In 2014 Google offers a new premium SKU that offers unlimited unified Storage • In 2015 Google enhances the Gmail Advanced Settings features to include pre -defined lexicons to support Data Loss Prevention scanning in email. The above list is a short list of the variety of services, support offerings, features and best practices that Google has adopted into the service delivery of the SaaS offering. In addition to the wide use of GMail, Google has six other products with over a Billion active users. Those are Google Search, Chrome, Android, Google Maps, YouTube and Google Play. Chrome as a browser and an operating system are further evidence of strong usage and market acceptance. In a report released by Net Applications in April of 2015, Chrome browser held 25.68% market share while IE11 had 25.04, followed by IE8 at 16.0. The increase in adoption by Enterprise customers is attributed to the real time updates against emerging threats and the Chrome for Enterprise browser controls. Chromebooks, the laptops that run Google Chrome as the OS, are seeing a rapid increase in sales in the K-12 market worldwide. This is attributed to the low-cost and the easy -to -manage machines. carahsoft 15 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Google's PaaS/IaaS offerings entitled Google Cloud Platform was first announces in 2008 with Google App Engine, a platform to develop and host web applications. Early success on this platform included The Royal Wedding Website and BestBuy moving their online Gift Card/Registry service to the platform. Over the years, and based on market demand, Google began to externalize off PaaS/IaaS service offerings that Google developed originally for their own infrastructure and platform utilization. Google continues to expose the benefits of Google's infrastructure to outside entities. Or, put differently, Google lets customers use the same infrastructure that allows Google to return billions of search results in milliseconds, serve 6 billion hours of YouTube video per month and provide storage for 1 Billion Gmail users. Salesforce is the enterprise cloud computing leader dedicated to helping companies and government agencies transform into connected organizations through social and mobile technologies. Since launching its first service in 2000, Salesforce's list of over 150,000 customers span nearly every industry worldwide. The company's trusted cloud platform is creating a connected government experience for over 1000 government agencies including all federal cabinet government agencies and the majority of US States. With the world's leading cloud platform, Salesforce is freeing government data from legacy systems, empowering citizens and connecting agencies to administer government in powerful new ways. Government agencies are using Salesforce solutions for a multitude of government functions including grants management, constituent communications and correspondence management, incident and case management, call/contact center management, outreach programs, learning management, volunteer management, project management, and even donor management, among numerous others. SAP is the fastest growing company at scale in the cloud with a user base of over 95 million subscribers. We also have the largest cloud portfolio of over 30 solutions for all lines of business as well as business suites. We also have 41 data centers in 21 locations in 11 countries. 6.4.2 Offeror must describe whether or not its auditing capabilities and reports are consistent with SAS 70 or later versions including, SSAE 16 6/2011, or greater. Security is a multidimensional business imperative that demands consideration at multiple levels,, from security for applications to physical facilities and network security. In addition to the latest technologies, world -class security requires ongoing adherence to best -practice policies. To ensure this adherence, our various cloud providers continually seek relevant third -party certification, including ISO 27001, the SysTrust audit (the recognized standard for system security), and SSAE 16 SOC 1 audit (an examination and assessment of internal corporate controls, previously known as SAS 70 Type II). SOC1, SOC2 and SOC3 audits are performed by third party auditor annually at a minimum. Additional audits and certifications include: CSA'Consensus Assessments Initiative', JIPDC (Japan Privacy Seal), Tuv (Germany Privacy Mark), and TRUSTe. Some examples include: ServiceNow's security framework is based on ISO/IEC 27002 and has been ISO 27001 certified since 2012. Annually, ServiceNow undergoes ISO 27001 Surveillance audits and well as SSAE 16 attestations for both SOC 1 Type 2 and SOC 2 Type 2. Customers under an NDA can request these reports annually in assisting with both their vendor management and regulatory or compliance programs. ServiceNow provides Security Event Logs using Application Level Audit Logs and Infrastructure Monitoring, carahsoft 16 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Application Level Audit Logs. The ServiceNow application writes detailed audit log information that is stored in tables within a customer's instance. Since this is considered customer data and is stored within a customer's instance, ServiceNow does not attempt to monitor or view this data unless specifically requested by a customer. As a result the customer is responsible for monitoring the contents of these logs files and, at the customer's choosing, exporting the logs through the capabilities provided within the platform. Infrastructure Monitoring. All components of the infrastructure supporting the private cloud feed alerts and logs into the SIEM. In addition, ServiceNow has deployed an Intrusion Detection System (IDS), positioned to listen to all inbound network traffic, with all events going to the SIEM as well. The SIEM is configured to automatically send alerts for common attacks. ServiceNow is responsible for managing the SIEM environment and securing the logs. ServiceNow retains all infrastructure logs for at least 90 days. The Security Operations Center (SOC) is also responsible for completing a daily checklist across a range of security domains, including privilege account usage, IDS alerts, file integrity monitoring (FIM), and database access. The daily checklists and captured events are managed through an instance of ServiceNow. Any variances that are discovered are raised as incidents for tracking, notifications, and investigation. CA SaaS environment is compliant with SSAE16 for services where infrastructure and application are managed and maintained by CA. CA Agile Management currently does not hold SSAE16 certification. For SaaS offerings where infrastructure is managed by a third party, provider's SSAE16 reports are available upon request. 6.5 — Billing and Pricing Practices 6.5.1 Describe your billing and pricing practices, including how your billing practices are transparent and easy to understand for Purchasing Entity's. Carahsoft's Order Management team works to ensure that billing and payment are completed in an efficient and simple manner. Purchase Orders and Invoices are provided to the customer early to ensure that payment can be completed whenever the customer is ready and within the confines of the agreed upon deal. Our OM team is available to answer any questions a Purchasing Entity has in order to assist with the process and confirm that they have everything needed for payment. Carahsoft's pricing is dictated by the manufacturers- Carahsoft ensures that the Purchasing Entity's receive the best possible price by working directly with the manufacturer and ensuring that pricing meets or exceeds the contract being used. In addition, Carahsoft works with the manufacturer to ensure that all pricing changes are accounted for within the contract, as applicable. 6.5.2 Identify any typical cost impacts that a Purchasing Entity might need to consider, if any, to implement your cloud solutions. .,..... , ..,, x, , , , a .�, , When a purchasing entity determines they need implementation services to their cloud solutions, the Carahsoft offering provides these additional services. For Example: ServiceNow Response: Customers typically engage ServiceNow for the initial implementation and training services and then for any major new future application implementations to get the best -of -breed expertise carahsoft 17 carahsoft Agreement No. 7434 SOLICITATION # CH16012 for good standard solution support. ServiceNow developed the platform and applications so anyone could support changes to the configuration without having to hire outside consultants. The customer is empowered as they gain experience either by shadowing ServiceNow consultants during initial implementations, as they talking to other customers through the Community website, or by asking for technical support through the portal. So initial costs typically occur for ServiceNow when it is first implemented and there might be requested services as customers add new application support but there are no ongoing costs typically. CA Cloud SaaS solutions are fully operational multi -tenant solution that are fully ready to use at outset. These Solutions are typically complex management solutions that do require setup and training. For example many customer will purchase a limited time block of consulting to help with loading data, and configuring reports. Training is also available for all applications to either augment start-up packs or walk customers through basic tasks. In addition to the licensing fees there are optional Google services that a Purchasing Entity may find meet additional mandatory requirements. Examples would include adding on other SaaS solutions like Virtru for end to end encryption or AODocs for Document Management. The key benefit to moving to Cloud based vendors is a new set of transformative tools that are more productive and most cost effective than traditional client server solutions. Other additional costs may come into play of the Purchasing Entity wants to outsource all of the configuration and migration work to the selected reseller leading to additional time and materials expenses. The Salesforce solution is available immediately for use via the internet after a Purchasing Entity makes a purchase of the solution. Other additional costs would include any implementation fees to be performed by a certified Salesforce implementation partner. These fees vary based on the type of project and length and complexity of implementation. 6.5.3 Offeror must describe how its Solutions are NIST compliant, as defined in NIST Special Publication 800-145, with the service models it offers. Carahsoft's cloud solution offerings all it within the guidelines liste'di NISI publication 800-145 and repeated in Attachment D of this response. Please see response 8.1.5 for a more detailed explanation. 6.6 — Scope and Variety of Cloud Solutions .,,. 6.6 Specify the scope and variety of the service models you offer under this solicitation. You may provide a list of the different SaaS, IaaS, and/or PaaS services that you offer. Carahsoft proudly offers a number of SaaS, PaaS, and IaaS supported by the cloud technologies as listed below. Many of our top tier cloud vendors also provide subscription and utility based pricing models which would be available to the State. Below is a list of each manufacturer being proposed in this response, along with the specific type of solution (SaaS, IaaS, and PaaS) they fit into: SaaS — AODocs, CA Technologies, DocuSign, FireEye, Google, QTS, Salesforce, SAP, ServiceNow, Virtru, VMware PaaS — Google, QTS, Salesforce, SAP, ServiceNow, Virtustream IaaS — FireEye, Google, QTS, Virtustream, VMware carahsoft 18 carahsoft Agreement No. 7434 SOLICITATION # CH16012 6.7 — Best Practices 6.7 Specify your policies and procedures in ensuring visibility, compliance, data security and threat protection for cloud -delivered services; include any implementations of encryption or tokenization to control access to sensitive data. Carahsoft utilizes varying procedures for ensuring visibility, compliance, data security and threat protection for cloud -delivered services. Please see the below examples of potential options for meeting the State's expectations: ServiceNow Response: ServiceNow applications have the advantage of being built on a single cloud platform that consists of one user interface, one code base and one data model; delivering holistic visibility into processes, creating a single source of truth, irrespective of whether the processes and systems are within the customer's environment or hosted in the cloud. ServiceNow invests significant resources in providing its services in a secure manner. This includes global teams delivering 247 operations and technical support from ServiceNow staff. ServiceNow currently has offices with staff focused on the management of the private cloud in Australia, the Netherlands, the UX, North America, and Asia. The ServiceNow environment is a private cloud, fully owned and operated by ServiceNow, which supports a logically single tenant architecture. Customer data is isolated from other customer data by leveraging an enterprise -grade cloud architecture and a dedicated database and application set per instance. This gives ServiceNow customers cost reduction through shared infrastructure, while having the security benefits of customer -specific isolation at the application and data layers. In addition to the security features that come standard within the platform and each customer instance, customers can leverage the additional security features within ServiceNow to augment the security configuration of their instances based on their own needs and risk profile. CA Response: This is addressed throughout all of our policies and procedures. CA SaaS Operations and Delivery runs an Information Security Management Framework (ISMS), which includes security organization, documentation, monitoring, and continuous improvement cycle. The security documentation comprises of CA SaaS Operations information security policies, procedures, guidelines and checklists. ISMS documentation is reviewed along with applicable controls annually. CA offers a variety of SaaS solutions, details for each offering has been provided in Exhibit 1 and 2 of this proposal. Salesforce Response: Salesforce has many customers that are subject to laws pertaining to the processing of personally identifiable information (PII) or personal data. Salesforce offers its customers a broad spectrum of functionalities and customer -controlled security features that its customers may implement in their respective uses of the Salesforce services. Salesforce believes that these provide its customers the flexibility to comply with laws with stringent privacy and security requirements. Encryption options vary based on Salesforce Commercial Cloud or Salesforce Government Cloud offering. Government Cloud Encryption: As part of the Salesforce Government Cloud, Salesforce is capable of responding to FIPS 140-2 cryptographic implementations for data being transferred between the State's web browser and Salesforce. Data that resides within Salesforce's protected boundary does not use FIPS 140-2 validated encryption as compensating/mitigating controls are in place to protect data. Additional information is provided below. Data In Motion: carahsoft 19 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Salesforce employs cryptographic mechanisms to protect information during transmission. All transmissions between the user and Salesforce are encrypted by default with a 2048- bit Public Key. Our service uses International/Global Step Up certificates. We support one- way TLS, in which customers create secure connections before sharing private data. Secure routing and traffic flow policies ensure that customer traffic is encrypted entering Salesforce until the load balancer decrypts the traffic. The load balancers decrypting the traffic are APS 140-2 compliant and are located inside of the Salesforce Government Cloud isolation boundary. Data At Rest: NIST SP 800-53 Rev. 4 states in SC-28, "Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an organizational information system." SC-28 also states, "Organizations may choose to employ different mechanisms to achieve confidentiality and integrity protections, as appropriate." All secondary storage media (hard drives, disk drives, and tapes) containing customer data are maintained within Salesforce's secure production data centers until the media has been sanitized and destroyed. Salesforce relies on physical access controls as a compensating control to protect the data. _20 Agreement No. 7434 ORGANIZATIONS PROFILE This section should constitute the Offeror's response to the items described in Section 7 of the RFP. An Offeror's response must be a specific point -by -point response, in the order listed, to each requirement in the Section 7 of the RFP. 7.1 — Contract Manager The Offeror must provide a Contract Manager as the single point of contact for management of the NASPO ValuePoint Master Agreement, administered by the State of Utah. The Contract Manager must have a minimum of three (3) years' experience managing contracts for cloud solutions. Contract.g• you • • a Master • Bethany Blackwell Senior Manager 703-230-7435 (office) 703-501-1134 (cell) Bethan .blac welq carahsoft.com Working hours: 7am-7pm EST M-F 7.1.2 Describe in detail the Contract Manager's experience managing contracts of similar size and scope to the one that will be awarded from this RFP. Provide a detailed resume for the Contract Manager. The proposed contract manager, Bethany Blackwell, has over 5 years of experience in managing SaaS contracts in both the State and Local and Federal markets. Bethany developed and manages contracts and associated terms for cloud contracts in more than 10 states. The combination of the State and Federal contract vehicles and BPAs being managed is valued at over $300M. Annually, she oversees 1000+ SaaS transactions off of these contract vehicles which include licensing and implementation that provide end to end cloud solutions to public sector customers. Name Position Carahsoft Senior Account Manager — Bethany II Will serve as the NASPO ValuePoint Contract Manager Background 0 Senior Manager for cloud solutions products, including Salesforce.com, DocuSign, BMC Software • Vendor/Partner manager for 20+ complimentary solution vendors and 25+ implementation partners and system integrators • Graduated Virginia Tech in 2010 - dual degree with concentrations in Psychology and Political Science • 5+ years of experience at Carahsoft Skills Agreement No. 7434 SOLICITATION # CH16012 • Expertise in negotiating SaaS contract vehicles and terms at State level • Knowledge of contract vehicles, BPAs, multi -year deals, multi -vendor deals • Management of enterprise size product contracts • Establish and maintain positive customer relationships through proactive communication • Maintained interactions with customers to ensure quick, accurate quotes; facilitated easy ordering process for customers Relevant Experience • Oversees the management and execution of 900+ individual SaaS contracts, valued at 85M+ annually • Maintain the annual recurring subscription renewal bases to ensure no customer's lapse in service • Oversees the ordering and distribution of licenses on statewide enterprise licenses agreements and various BPAs • Established vendor specific terms and conditions for 10 different statewide contracts • Assist customers in shifting buying strategy from perpetual to subscription licensing model 7.1.3 Describe in detail the roles and responsibilities of the Contract Manager as they apply to the NASPO ValuePoint Master Agreement that will be awarded from this RFP, The Contract Manager assigned to this contract will be in charge of all coordination and organization efforts between Carahsoft and NASPO ValuePoint. This includes, but is not limited to: • contract negotiation • roll -out plan • amendments completion • renewal execution • reseller/subcontractor additions • contract pricelist updates and upkeep • contract compliance • marketing coordination carahsoft Z2 carahsoft Agreement No. 7434 SOLICITATION 4 CH16012 TECHNICAL RESPONSE This section should constitute the Technical response of the proposal and must contain at least the following information: A. A complete narrative of the Offeror's assessment of the Cloud Solutions to be provided, the Offerors ability and approach, and the resources necessary to fulfill the requirements. This should demonstrate the Offeror's understanding of the desired overall performance expectations and clearly, indicate any options or alternatives proposed, _ In response to the State of Utah request for Solution _ p q lution Proposals, Carahsoft has assembled a response that includes a number of Cloud Solution Offerings from within the Carahsoft Cloud framework. These offerings are all supported in part or wholly by twelve leading cloud technology providers. Each provider's technology is an integral part of Carahsoft's proposal. Within this framework, Carahsoft will orchestrate, assemble, and execute on all activities necessary to support this contract, engaging each cloud technology provider as needed in the delivery of a particular service or solution offering. The Carahsoft Cloud framework will provide for all requirements of the State of Utah Request for Proposal to be fulfilled. Carahsoft will be able to provide Cloud Solution Offerings to the State of Utah as well as to those entities that may participate via the cooperative purchasing program. The Carahsoft Cloud proposal provides for the provision of PaaS, IaaS, and SaaS offerings that are compliant with all requirements as outlined by the State. Carahsoft will provide dedicated resources to supporting this agreement. Carahsoft will insure that adequate resources are supplied to fully support this agreement during all phases from contract launch through termination. Usage requirements and demand resources fluctuate over time and Carahsoft's Cloud offering has been constructed in a manner that provides for the ability to scale without interruption, disruption, or any other similar interruption of customer service and solution availability. -- — —.m .� — ...._._ww B. A specific point -by -point response, in the order listed, to each requirement in the Section 8 of the RFP. Offerors should not provide links to a website as part of its response. Offeror's should focus their proposals on the technical qualifications and capabilities described in the RFP, Offerors should not include sales brochures as part of their response.. For the purposes of Carahsoft's response to the technical requirements (section 8) of this RFP, please note that any response provided related to a specific manufacturer should be treated as a response to the following categories: SaaS — AODocs, CA Technologies, DocuSign, FireEye, Google, QTS, Salesforce, SAP, ServiceNow, Virtru, VMware PaaS — Google, QTS, Salesforce, SAP, ServiceNow, Virtustream IaaS — FireEye, Google, QTS, Virtustream, VMware 8.1— Technical Requirements Agreement No. 7434 SOLICITATION # CH16012 _... _ .............. ........ _. CA APM CA APIM SaaS offering helps accelerate, secure and manage APIs. CA is responsible for development and management of application. AWS provides IaaS services to CA for management of the underlying cloud infrastructure. MAA CA Mobile App Analytics stimulates collaboration between business analysts, developers, operations and support in order to accelerate mobile app delivery and improve end -user experience. This service is hosted at CenturyLink Data center and the infrastructure is mana ed and maintained b CA SaaS 0 send fJlive CA Agile CA Agile Central is a SaaS offering that is generally used to document and manage work within the SDLC. mASM CA App Synthetic Monitor AS provides end —� ( M) p -to-end transaction response -time visibility into cloud, mobile and Web applications. Application utilizes Rack Space IaaS services. Google rase Cloud Service onse we will describe the various othat we ndto tions forlusin include Goo Seas, PaaS, and IaaS.. In our p p g g Apps under the SaaS model and the functions of Google Cloud Platform under Paas and laas. AODocs The Cloud Service Models that we intend to provide is SaaS. Virtru All Virtru services are cloud -based and accessed via browser or downloadable browser extensions and qu ins, SaIesforce Salesforce's d _- eployment model is a "public" cloud infrastructure, as defined b NIST 800-145 ServiceNow Cloud service a ._ rvice model: Software as a Service (Baas) Dedov ent vate oud . QTS "QTS sma leading ng national provvider of Infrastructure as a Service (IaaS) data center nter solutions and fully managed cloud services and a leader in security and compliance. The company offers a complete, unique portfolio of core data center products, including custom data center (Cl), colocation (C2) and cloud and managed services (C3), providing the flexibility, scale and security needed to support the rapidly evolving hybrid infrastructure demands of web and IT applications. With 12 data centers in eight states, QTS owns, operates and manages approximately 4.7 million square feet of secure, state-of-the-art data center infrastructure and supports more than 850 customers. QTS' Critical Facility Management (CFM) can provide increased efficiency and greater performance for third -party data center owners and operators. QTS offers a number of IaaS solutions. SAP Ariba Our solutions are offered and delivered in a true subscription -based model and shared service (multi -tenant) offering. There is no software to install, no hardware to buy, no maintenance or support costs and no need to hire consultants or tech specialists to run the system. We deploy and manage the infrastructure. Customers only need a web browser for access. Subscriptions include system maintenance, automatic upgrades, enhancements and application of service packs, Level 1— 3 help desk support, professional services and best practices built directly into the aeration. Fieldglass The SAP Fieldglass application is exclusively offered in a software as a service (SaaS) model _ Hianna SAP HANA Enterprise Cloud (HEC) is a pry _. ate managed isolated &deddatedcated ladnscape (single tenant) offering end -to -end cloud -based infrastructure and managed services for SAP applications powered by SAP HANA. It is a fully scalable, enterprise -ready, mission -critical, secure and high -availability cloud service. Hybris The SAP Hybris Commerce, Cloud Edition offering are all single tenent hosted VM environments. Customers have their own VM's with SAP Hybris instances de to ed to those VM's. The SAP Hybris Commerce„, Cloud„ Edition current 24 carahsoft Agreement No. 7434 SOLICITATION # CH16012 _._.. _ has Development, ..._. ........ pment, Staging, Testing, and Production environment. More w environments can be added as required. Success Factors Our solutions are delivered through a private cloud using a multi -tenant architecture. We refer to this as a Controlled Cloud. It includes a contractual framework reflecting applicable data privacy regulations, implementation and maintenance in accordance with Technical and Organizational Measures (TOMS) and regular audits by an independent third party for industry compliance and transparency. a' _re- .. y y ._.._.._ . Horizon Air IaaS — Public r►aunit VMware vCloud Air IaaS — Public, H� brid„ Com __ _-- Desktop & Ap_ps vCloud Suite IaaS — Private, Hybrid, Communi� Airwatch IaaS — Private SaaS — Public ... _�... ...... .. Horizon 6 IaaS Private Realize Air SaaS — Public Complaince _.. ._.. SocialCast SaaS —Public FireEye All FireEye cloud offerings included in this response fit the SaaS cloud service model and private cloud deployment model. VirtueStream Virtustream solution is fully NISI compliant for Essential Characteristics, as the Infrastruct ureasa Service (IaaS) Service Model, with all deployment options — Private Cloud, Community Cloud, _Public and Hybrid Cloud. 8.1.2 For the purposes of the RFP, meeting the NIST essential characteristics Is a primary concern. As such, describe how your proposed solution(s) meet the following characteristics, as defined in NIST Special Publication 800-145: 8.1.2.1 NIST Characteristic — On Demand Self -Service: Provide a brief written description of how the cloud solutions proposed satisfies this individual essential NIST Characteristic. Attest capability and briefly describe how self-service technical capability is met. CA APM N/A. This is a SaaS _—._.._ __ —access ... ......._ service and clients do not have direct access to the underlying infrastructure in order to provision computing capabilities. CA is responsible for the management and maintenance of the infrastructure and will make any necessary adjustments as part of providinq this service to its clients MAA This is _aSaaS offering and On -Demand service is not available, however, MAA customers are enabled to manage their accounts and carry out configuration changes r_ equired. o m nage rnqbiLe.apdications. CA Agile We are a fully multi -tenant environment and do not provide the On -Demand Self - Service oa a,bilit . _ ASM This does not apply as this is a SaaS service. ASM customers are able to manage all aspects of their accounts, create sub -accounts, and make any configuration changes necessa for their monitors. Google SaaS, Google Apps administrators have access to an Admin Panel that allows them to perform user administration, service configurations, reporting on demand. Paas/IaaS, Google Cloud Platform is an integrated set of Compute tools, Storage Tools, Networking Tools, Big Data analytic tools, Management tools and Services APIs. A customer can ..... use an of these services on demand via the Developer's Console. AODocs SaaS, AODocs administrators have access to an Admin Panel that allows them to perform user administration, roduct configurations reportIn og n demand 25 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ....... ...... ._.........__ Virtru All required services can be provisioned immediately when required. Users only need to install application to get single -user capability, or login to administrative dashboard for administrative features. Salesforce Salesforce PaaS and SaaS solutions are delivered on -demand via the web and can be accessed with a browser and internet connection or mobile device. No additional software or infrastructure is required. Salesforce hosts the entire solution, thus freeing up customers to manage their mission, not manage an infrastructure solution. Additionally, Salesforce is browser agnostic and supports all major browsers (Firefox, Chrome, Safari, IE). No installations on users' laptops or desktops are required and thus the solution is accessible from anywhere an internet connection and supported browser are available, includin mobile devices. ServiceNow Customer instances are provisioned p automatically after an agreement between a customer and ServiceNow is executed. ServiceNow actively monitors customer instance performance and can automatically scale its application servers out horizontally by adding them to the load balancer ,pools for a particular instance. Docusign DocuSign's DTM® solution is ISO 27001:2013 certified and many of the ISO 27001 2013 controls are mapped to the NIST 800-53 requirements; we can provide additional information upon _ request. QTS On -demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. SAP Ariba The solution provides self-service user profile management. Users profit from the intuitive, minimal -step nature of the user interface with little or no training. Chan es to user rofp ile includes workflow ca ability for Profile changes. m Fieldglass All system resources are available to all customers without limitation. The system is highly configurable with most configurations being available to the customer's administrators. Hanna HANA Enterprise Cloud is a private managed cloud therefore infra & services could be requested (added or decommisioned) on demand by placing change requests with SAP HEC teams. HEC roles & responsibilties document clearly articulates what is included in the monthly HEC pricing and what is available on -demand in addition to scalin u or down on the infra/compute. H bris N/A SuccessFactors All self-service is in one place, including benefits and payroll if those products are in scope. Self-service is an intuitive experience. We provide the ability for employees to have configured permissions to take action in the tool such as field or data updates for personal information, benefits changes, payroll actions, completing workflow for assigned activities in the tool, etc. Self- service for both employees and managers is configurable to fit your business ... rules and organizational requirements. _._........ ...... VMware VMware's IaaS and SaaS offerings complies with the On -Demand Self -Service characteristic, because once purchased, a user can unilaterally provision compute resources with no human interaction with VMware. The subscription includes access to two self service consoles: My VMware for account management, and the VMware vCloud Air Console which is the primary interface for access consumption and management of cloud resources purchased from VMware. See doc for a complete list of products/ features that comply) FireEye FireEye is offering 4 distinct SaaS cloud solutions each featuring self-service features specific to the unique capabilities of the offerings: 1.Email Threat Prevention (ETP) Email Provisioning carahsoft 26 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Once the ETP infrastructure is provisioned, customers can self-service the acceptance of up- stream mail and delivery to user mailboxes by configuring their own domain settings. No user mailbox provisioning is required as ETP will automatically check the validity of the email recipient with the downstream service. 2.Mobile Threat Prevention (MTP) User Provisioning Once the MTP infrastructure is provisioned, customers can self-service the creation of service users by integrating with an LDAP service or manually adding the users via the user interface. Device Provisioning Once the MTP infrastructure is provisioned, customers can self-service the creation of managed devices by instructing users to install the FireEye MTP Application on their mobile device and having a valid user account provisioned. 3.Threat Analytics Platform (TAP) User Provisioning Once the TAP infrastructure is provisioned, customers can create and assign role -based access control to user accounts. The enrollment process includes the ability to create two -factor authentication for newly provisioned users. Data Sources Once the TAP infrastructure is provisioned, customers can configure new data sources to feed the TAP instance without the assistance of FireEye. The TAP communications broker accepts data feeds in the following formats: syslog, flat files, TCP/UDP streams, and JDBC connections. 4.FireEye as a Service with Continuous Vigilance (FaaS CV) User Provisioning Once the FaaS infrastructure is provisioned, customers can create and assign role -based access control to user accounts via the on remise Fire a sensors. VirtueStr..._ ._ _ - ................_ eam Virtustream IaaS provides a self-service portal called xStream, where users can access, view, edit, provision, and modify compute, storage, network and application services based on granular Role Based Access Control, which can be integrated with Active Directory or LDAP. Virtustream portal that enables the user to provision VMs, order services through a catalog, add storage, upload service templates., and run various reports all through the same oortal. 8.1.2.2 NIST Characteristic — Broad Network Access: Provide a brief written description of how the cloud solutions proposed satisfies this individual essential NIST Characteristic. Attest capability and briefly describe how network access is provided. CA APM The APIM service is accessed via —HT TPS on a suppo_..... rted browser with no requirements for a workstation client install ; mobile friendly and optimized for use with iOS and Android tablets _— MAA Upon native authentication, MAA dashboard is accessible by any host over public CAInternet Also, mobile devices connect to the service urn REST API. A Ile All access to the application Is throu h .. a_ browser ASM The ASM dashboard and API are accessible from any host connected to the public Internet. The API and dashboard require authentication, and each account is only . customer . Goo le SaaS, Goo le A accessible sdevice, account m and owner ���� 9 -mmmmm 9 pp platform network agnostic. As a pure play cloud -based solution the services can be accessed via any modern browser from any network access point. Customers that have requirements to limit access to trusted devices or trusted access points have access to Device Management tools via the Admin Panel at no additional cost. PaaS/IaaS, Google Cloud Platform management services can be accessed via any modern browser from any network access point. End -users can accesses services through one or more carahsoft 27 carahsoft Agreement No. 7434 SOLICITATION # CH16012 appropriate tools (browser, CLI, APIs, etc.). Administrators can also monitor and manage services througha mobile app AODocs TSara_S,'X_ODocs is service, platform and network agnostic. As a pure play cloud -based solution the vics can be accessed via any modern browser from an network access oint. Virtru All Virtru services are — -W ' available on the publically available internet. Salesforce Salesforce PaaS and SaaS solutions are delivered on -demand via the web and can be accessed with a browser and internet connection or mobile device. No additional software or infrastructure is required. Salesforce hosts the entire solution, thus freeing up customers to manage their mission, not manage an infrastructure solution. Additionally, Salesforce is browser agnostic and supports all major browsers (Firefox, Chrome, Safari, IE). No installations on users' laptops or desktops are required and thus the solution is accessible from anywhere an internet connection and supported browser are available, including_ mobile devices. _ ServiceNow ServiceNow's physical architecture is deployed into ServiceNow s managed ' g dedicated colocation cage space. Multiple diverse Internet connections terminate within the dedicated cage space providing redundant access from the Internet to the ServiceNow environment. All users, administrators and developers connect to the ServiceNow private cloud over HTTPS, leveraging TLS, for communication to and from a ServiceNow instance with all normal interactions via a web browser. There is no requirement to install any client software on any desktop, laptop, - ServiceNow instance. tablet, or smart hopnee used to access a S IT�, Docusi n Please see above. QTS Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations). QTS recognizes that the connectivity challenges of today are largely driven by consolidation, virtualization and adaptive architectures. Our agile connectivity solutions provide you with both unification across your communication infrastructure and with built-in network scale, reliability, and high-performance. QTS metroConnect is a fast, reliable, high bandwidth connection to hundreds of network and service providers inside the local Carrier Hotel. With access to the numerous networks at the carrier hotel, QTS delivers the interconnection necessary to support your connectivity, business continuity and application collaboration needs. metroConnect offers redundancy and diversity options that ensure your content is always available. -High availability -Backed by a 99.999% SLA •24x7x365 monitoring and management -Carrier-neutral model -Convenient access to an array of Carriers and Internet providers -Dedicated, secure, and highly resilient connectivity with speeds of 100Mbps, 1Gbps or 10Gbps* -Supports all connectivity redundancy, business continuity, and collaborative application needs QTS data centerConnect Service Data centerConnect is a secure, scalable, cost-effective way to connect your primary and secondary sites between two or more client environments located in different QTS data centers providing a reliable interconnection option for any size business. QTS data centerConnect enables data replication and recovery through its resilient and redundant network. This ensures your business operates successfully with seamless, day-to-day transactions over a high-performance, low latency connection that supports business continuity, data replication and other IT business application needs. With QTS data centerConnect you get: •Hioh Availability — Resilient network architecture provides high availability and reliability Agreement No. 7434 SOLICITATION # CH16012 Dedicated and Secure Dedicated bandwidth with secure MPLS encapsulation •Scalable Bandwidth — Easily scale your bandwidth (from 10Mb up to 1 Gb -Flexible Network Configurations _ Supports multiple network topologies -Cost-effective, Bundled Solution — All inclusive, bundled offer -Fully Managed, End -to -End — End -to -end, proactive monitoring and management, 24x7x365 QTS internetConnect Service internetConnect provides a multi -homed, high performance, dual access, multi -carrier network that meets all your Internet service needs. We ensure maximum uptime, guaranteed availability, and various bandwidth speeds through our flexible, high performance, carrier -neutral offer. For enterprises and government agencies conducting business over the Internet, QTS internetConnect Service provides a highly reliable, secure connectivity solution for production environments. -Direct access to multiple ISP backbones gives unmatched reliability and guarantees maximum uptime Dual connections with direct access to multiple ISP backbones Diverse, redundant paths to multiple backbone providers Dual paths, with diverse entry points into the QTS Data Center •Anti-DDoS Mitigation Services provide an additional level of protection and security -Dedicated with burstable bandwidth options provides resiliency and flexibility -Backed by an industry leading 100% SLA -Optional service plans to meet your needs QTS ethernetConnect Service You need to be able to connect your employees and customers to your applications and to the outside world. Whether hybrid cloud, disaster recovery/disaster recovery as a service, data replication, data migration or other applications, you need the ability to seamlessly and conveniently connect your business together and to the outside world as if there is no distance between you. QTS ethernetConnect offers a variety of connectivity options. You can centralize your services with a single provider. And since QTS can handle everything from ordering to billing you have a single provider for a complete solution — "One Stop Shopping". QTS understands your needs and will tailor your end -to -end solution for your business. -High Bandwidth — Speeds are available in select increments of 100Mb to 10Gb -Data Privacy — Data is separated from IP traffic as it traverses the carrier backbone -High Performance Options — Solutions can be developed to fit your specific performance or reliability requirements -Consistency — Ethernet circuits travel over a single carrier's infrastructure and data follows a consistent path, SAP Anba Ariba uses Cisco Rou �._.. -_ ers and Catalysts (high-speed switches) for ensuring maximum network connection performance. They deliver enterprise -class versatility, integration, and power to Ariba. Together, these routers provide the required support for Internet/intranet access with firewall security _. _.._ Fieldglass Customers are only required to use a standard web browser with default wsetlin s to access and use the Fiei iris solution. Hanna Cloud Capabilities are available over the network via secure ._.....— p ( MPLS or VPN network connectivity) and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms such as mobile phones, laptops. HEC is an extension of customers existing netwerk and uses customes IP range and /24 ran e, Hybris All capabilities of SAP Hybris are available over the network Furthermore, they are accessible by standard mechanism including heterocienous thin or 29 carahsoft Agreement No. 7434 SOLICITATION # CH16012 thick client platforms through either standard web technologies or through the _ hybris OCC REST web service APIs. ...... g g SuccessFactors Our solution was designed from the outset for high availability. We provide a system availability SLA of 99.5%. Every component (hardware and software) is completely redundant. There is a redundant piece of equipment or software for every hardware or software component for every layer of the infrastructure stack (server, software and network). We load balance at every tier in the infrastructure, from the network to the database servers. F5 load balancers are used to route traffic to an available web server to process the request. Application server clusters are enabled so that servers can fail without interrupting the user experience. We maintain an N+1 approach for all equipment in the hosted cloud environment, so that there is never a single point of failure. All customer database backups are encrypted and streamed in a secure manner from the customer's "primary" data center to their "alternate" data center, allowing for a timely restoration of service in the event of disaster. Based on the terms of the agreement, we will designate one of the data centers as the customer's "primary" data center, with an additional data center designated as the "alternate" for data redundancy and disaster recovery purposes. Load balancers will automatically detect a software or hardware error and take the servers out of service if needed without interrupting the user experience or application. They also allow capacity addition or reduction without interrupting service. All of the JBOSS application servers are clustered. Each is designated as a primary and a secondary, so any application server can fail without any loss of service or interruption of the application or user experience. The database servers are also clustered using a Veritas high availability cluster. The Veritas suite will detect any hardware or software errors in the database machines and automatically fail them over to a sta! db set r`!eC _W.......- VMware VMware's IaaS offerings complies with the Broad Network Access characteristic. All fo these products' capabilities are available over the public internet and can be used by heterogeneous thin or thick client platforms. Consumers only need internet access to access these resources. Additional capabilities exist including the ability to secure communications over the public internet including IPSEC VPN, SSL Client VPN, and the ability to consume via WAN connectivity. VMware's SaaS offering AirWatch can be accessed over the internet or private network through standard mechanisms. FireEye All FireEye cloud offerings included in this response meet the definition of broad network access. Each of the solutions performs its designed functionality over standard internet-facing services and is accessible via a web browser from any internet connected device when valid credentials are provided. -.._._. ......._........ VirtueStream Virtustre am IaaS provides Broad Network Access, where it can provide landing zone for any private network (Point -to -Point, Virtual Private Label Switching, Multi -Protocol Label Switching, or Direct Connect), public network (Internet, Trusted Internet Connectivity as landing zone, IPSEC VPN and SSL VPN) and also extranet connectivity (shared network, i.e, Cloud Connect, Cloud nge, etc.) which is growing rapidly as option for connecting cloud resources. Excha .... 8.1.2.3 NIST Characteristic - Resource Pooling. Provide a brief written description of how the cloud solutions proposed satisfies this individual essential NIST Characteristic. Attest capability and briefly describe how resource pooling technical capability is met. 30 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Carahsoft's multiple Cloud Service Provider's solution provides for Resource Pooling, as defined by NIST, in a variety of methods. Each method optimizes the cloud subscriber's experience while optimizing the availability of compute, network, and data resources. Each service provider provides Resource Pooling, see below for details. ..... _.. .... .uu CA APM CA API Management SaaS (SaaS APIM) has been built from the ground up to be a multi -tenanted, SaaS-based offering that leverages Amazon's infrastructure to scale appropriately; utilize a continuous integration model to provide for frequent updates; and fail over across multiple availabilit zones MAA MAA core service utilizes dedicated infrastructure layered with virtualization capabilities. It doesn't share computing resources with other services. Tenants are se rega!q ft_a !ication containerization capabilities. CA Agile We monitor all system resources and have alerting mechanisms when resource constraints have reached a defined threshold. We can easily scale our systems to accommodate any additional capacity. If we determine a single user is using a significant amount of resources we will proactively reach out to them to understand what they are trying to accomplish and help them to formulate more performant aeries. ASM All ASM core servers are dedicated physical servers. ASM Public Status Pages are served from dedicated web servers (used only by CA ASM) in the Amazon Cloud, on shared tenancy virtualization. Amazon Cloud virtual machines used by ASM are many d by an ovisicDed by CA ASMws sterm administrators. ....... Google SaaS, Google's global infrastructure is a shared pool of resources that dynamically serve each end user with a primary data center access point that may rotate throughout the session without the end user being aware while at the same time replicating any data across at least two additional geographically dispersed data centers which also may rotate through the session. PaaS/laaS, Google Cloud Platform also operates across the global Google infrastruture. The elements of this service can be defined within the Developer's console to run within a higher level of abstraction which covers four regions; Central US, Eastern US, Western Europe, East Asia where each region has three or four zones. AODocs AODocs infrastructure is hosted in Google App Engine and data of our customers on Google Drive This protection is insured by Goo le. Virtru Virtru Services are offereq In a Fuliy_ multi -tenant mode if the customer requests. �_m ........... _ Salesforce Salesforce is a multitenant cloud -based subscription service. Multi -tenant cloud solutions provide a single, shared infrastructure, one code base, one platform that is all centrally managed, with platform -based API to support all integration traffic, and multiple release upgrades included as part of the subscription service. Multi -tenancy and the Cloud Computing model remove unneeded tasks from the process of delivering, managing, and integrating software. Salesforce customers will not need to maintain any hardware or software. Without multiple versions to support, integrations don't break during updates; they are simply updated automatically. As a result, both the initial integration and its continued maintenance are simplified. More resources can be focused on creating a better product, with a faster cycle of innovation, instead of having to manage the complexity of many different versions to support a vast installed base. Salesforce's position as an online service enables us to roll out all levels of improvement, from patch releases to major upgrades that are largely transparent to the end users. When a bug is fixed and tested, it is rolled out to the application as part of regular maintenance; the nature of the service prevents special patches and code branches for individual customers, so all fixes can otentiall benefit all customers. ServiceNow The ServiceNow environment is a private cloud, fully owned and operated by Servic&Now, which ...... supports a logically single tenant architecture. Customer data is isolated from other customer data carahsoft 31 carahsoft Agreement No. 7434 SOLICITATION # CH16012 b leveraging an enterprise -grade cloud architecture and a dedicated database n y g gand application set per Instance. This gives ServiceNow customers cost reduction through shared infrastructure, while having the security benefits of customer -specific isolation at the application and data layers. In addition to the security features that come standard within the platform and each customer instance, customers can leverage the additional security features within ServiceNow to augment the security configuration of their instances based on their own needs and risk profile. Customers share a hardware platform (no virtualization), but access entirely separate individual instances of the ServiceNow platform. ........___..........._ _......._ ... — Docusi n QTS Resource pooling ..T .- .............. The provider's computing resources are pooled to serve multiple consumers using a multi -tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Exam )les; of resources include stora e, processing, memo , and network bandwidth. SAP Ariba Ariba recognizes that customers need the highest -possible availability and reliability. To that end, Ariba infrastructure is scalable and redundant at all tiers. To provide high availability and reliability, Ariba has extensive error handling and fail -over capabilities. In order to ensure the highest availability, Ariba uses such best practices as frequent systems backup and maintenance, redundant systems, proactive customer notification of unplanned down -time and international support coverage. Fieldglass Fieldglass is offered in a SaaS model. All customers access the same Fieldglass application version in a multi -tenancy database. The system is hosted in a secure hosting facility. All system resources are available to all customers without limitation. Hanna SAP HEC does not pool resources for critical business systems as it's a managed private cloud, which is dedicated to one particular customer. However, network routers, availability reporting & monitoring could be shared. Details can be rovided during HEC technical assessment worksho . Hybris All computing resources of the data centers are pooled to serve multiple customers. Each customer gets their own separate VM's and their own instances of hybris deployed to those VM's. SuccessFactors Load Balancing & Server Clustering We load balance at every tier in the infrastructure, from the network to the database servers. Application server clusters are enabled so that servers can fail without interrupting the user experience. Database servers are clustered for failover. We maintain an N+1 approach for all equipment in its hosted environment, so that there is never a single point of failure. Complete Redundancy - Every infrastructure component is redundant. There are at least two of each hardware component that processes the flow and storage of data. Backup & Restore - the Data center runs full data backups weekly and incremental data backups nightly VMware All VMware's IaaS products comply with the Resource Pooling characteristic (except for the Hybrid Cloud Manager which is Not Applicable). vCloud Air provides a pool of vCPU, vRAM, Network and storage on the shared physical infrastructure. vCloud Air provides the required location independence and requires that the customer directly specify location of the datacenter that will host their cloud at time of instantiation. Note VMware's SaaS is also Not A licable. FireEye The FireEye cloud infrastructures consists of web and application servers, operating systems, and databases in a hosted environment and are comprised of both physical and virtual devices. carahsoft 32 camhsoft Agreement No. 7434 SOLICITATION # CH16012 Computing power and resources are load -balanced across infrastructure and replicated to redundant datacenters in the event of a disaster. Client -specific data stored in databases are I'o ncall sy eparated from other clients' data providing se mgnlakion and isolation. VirtueStream Key to'VIrtustream solution is its proprietary and patented solution of uVM technology, which is effectively a granular solution for resource pooling, providing application performance, pay for consumption only and segregate resources for security and compliance, but aggregate for cost efficiency. In addition, Virtutream is currently one of very few Cloud Service Provider with capabilities for Geo-Fencing and Geo-Tagging of the virtual machines to a specific data center, and getting down to cluster and host machine level. The resources are pooled based on two specific criteria: -ONLY Accessible Using Private Network - We call this pool "Enterprise" which most of Virtustream's IaaS workload is residing. There is no direct access from Internet into this pool. This is protected via a pair of routing and firewall from any other zones. 8.1.2.4 NIST Characteristic - Rapid Elasticity: Provide a brief written description of how the cloud solutions proposed satisfies this NIST Characteristic. Attest capability and briefly describe how rapid elasticity technical capability is met. __ _......_..............._� ......� __ .... __....... CA APM CA API Management SaaS (Baas APIM) has been built from the ground up to be a multi -tenanted, SaaS-based offering that leverages Amazon's infrastructure to scale appropriately; utilize a continuous integration model to provide for frequent updates; ....._ .p availability zones. and fail over across multiple availabil _......__ MAA The pool of web" —an d application servers can be grown or shrunk when necessary. Any changes to the size of the pool remains transparent to end -users and customers, and would-pnl boneA MAA systems administrators. CA Agile This is a SaaS service, therefore, CA monitors all system resources and have alerting mechanisms when resource constraints have reached a defined threshold. Data storage and network capacity are monitored and scaled to meet current client demands. Compute resources are scaled to meet client processing requirements _..... ASM All ASM core servers are dedicated physical servers; there is no elasticity. The ASM Public Status Pages are served from web servers in the Amazon Cloud, and the pool of web servers can be grown or shrunk if necessary. Any changes to the size of the pool would be transparent to end -users and customers, and would only be done by CA ASM systems administrators. Since this is a SaaS environment the CA SaaS Operations and delivery along with RackSpace are responsible for management of the ca acit and monitori�ng. Google Saas, Google Apps can scale from 1 user to tens of thous - 9 9 pp and users. The usage of the services included are designed to horizontal scale within the confines of the per user storage allocation. Google Apps can be purchased with a 30gb per user allocation or with unlimited storage. Paas/laaS, Google Cloud Platform was designed to scale on demand both in terms of available resources for applications designed and running on Google App Engine but also Compute Engine resources and more. - .................._... ....... �...._ AODocs AODocs can scale from one user to tens of thousand users. The storage is based on the Google Apps storage which could be from 30Gb to unlimited storage depending on the Google Apps subscri tion. Virtru Presently we over -provision services by 2.5x peak traffic in order to handle spikes. We are in the process of implementing horizontal scaling of all services and expect to have that work completed in the second half of 2016. Salesforce .... User Authentication Logon is form -based. When users log into the Salesforce application, they submit a username and password, which are sent to Salesforce via an TLm S-encrrvpted session. 33 carahsoft Agreement No. 7434 SOLICITATION # CH16012 • • 0 • Security features are developed by Salesforce and built into the application. Third -party packages are not used for development or implementation of security internal to the application. In addition, single sign -on and two -factor authentication may be used to authenticate users. Some organizations prefer to use an existing single sign -on capability to simplify and standardize their user authentication. You have two options to implement single sign -on —federated authentication using Security Assertion Markup Language (SAML) or delegated authentication. Federated authentication using Security Assertion Markup Language (SAML) allows you to send authentication and authorization data between affiliated but unrelated Web services. This enables you to sign -on to Salesforce from a client application. Federated authentication using SAML is enabled by default for your organization. Delegated authentication single sign -on enables you to integrate Salesforce with an authentication method that you choose. This enables you to integrate authentication with your LDAP (Lightweight Directory Access Protocol) server, or perform single sign -on by authenticating using a token instead of a password. You manage delegated authentication at the profile level, allowing some users to use delegated authentication, while other users continue to use their Salesforce-managed password. Delegated authentication is set by profile, not organization wide. You must request that this feature be enabled by Salesforce. Salesforce can be configured to utilize Active Directory directly via Delegated Authentication, or indirectly via Federated Identity using either SAML 1.1, or SAML 2.0. Additionally your users can be loaded from information drawn from your Active Directory servers and modifications made in Active Directory can be propagated into Salesforce. Customers can use their own SAML Identity Provider, or license one directly from Salesforce with our Identity Connect product.User Provisioning User provisioning and management is performed through the Salesforce Administrative Setup environment and is performed by Salesforce customers. Users, their profiles, permissions and passwords may be managed, edited, activated and deactivated as needed by those with appropriate permissions. An administrator (appointed by the customer and not by Salesforce) with appropriate privileges can manage session timeout, password policies, IP range login restrictions, delegated authentication/SSO, and requirements as part of this process. On first time login or password reset request, users are required to change their passwords to gain access. Salesforce also offers delegated authentication, enabling customers to provision and deactivate users from an external directory service.User Access ProfilesSalesforce enables administrators to manage roles and relationships between roles from within the application, in a single easy to read page depicting the role hierarchy. All users and application -level security are defined and maintained by the organization administrator and not by Salesforce. The organization administrator is appointed by CSBS. An organization's sharing model sets the default access that users have to each other's data. There are four sharing models: Private, Public Read Only, Public Read/Write, and Public Read/Write/Transfer. There are also several sharing model elements: Profiles, Roles, Hierarchy, Record Types, Page Layouts, and Field Level security. Details about sharing models and sharing model elements are provided below: Private Only the record owner, and users above that role in the hierarchy, can view, edit, and report on those records. 34 M Agreement No. 7434 SOLICITATION # CH16012 Public Read Only All users can view and report on records but not edit them. Only the owner, and users above that role in the hierarchy, can edit those records. Public ReadMrite All users can view, edit, and report on all records. Public ReadMrite/Transfer All users can view, edit, transfer, and report on all records. Only available for cases or leads. Profiles A profile contains the settings and permissions that control what users with that profile can do within Salesforce. Profiles control: Standard and custom apps the user can view (depending on user license) Service providers the user can access Tabs the user can view (depending on user license and other factors, such as access to Salesforce CRM Content) Administrative and general permissions the user has for managing the organization and apps within it Object permissions the user is granted to create, read, edit, and delete records Page layouts a user sees Field -level security access that the user has to view and edit specific fields Record types are available to the user Desktop clients users can access and related options Hours during which and IP addresses from which the user can log in Apex classes a user can execute Visualforce pages a user can access User Roles Every user must be assigned to a role, or their data will not display in opportunity reports, forecast rollups, and other displays based on roles. All users that require visibility to the entire organization should be assigned the highest level in the hierarchy. It is not necessary to create individual roles for each title at the company, rather a hierarchy of roles should be definedto control access of information entered by users in lower level roles.. When a user's role is changed, any relevant sharing rules are reevaluated to add or remove access as necessary. Record Types If the customer's organization uses record types, edit the record type to modify which pick list values are visible for the record type. A default pick list values can be set based upon the record type for various divisions. Field Level Security Field -level security settings let administrators restrict user's access to view and edit specific fields on detail and edit pages and in related lists, list views, reports, OfFline Edition, search results, email and mail merge templates, Custom Links, and when synchronizing data. _.. ......... _._._. .... .._ ...... _......_..... carahsoft 35 carahsoft Agreement No. 7434 SOLICITATION # CH16012 The fields thatmis and see in detail and edit pages are a combination of page layou n d field -level security settings. The most restrictive field access settings of the two always apply. For example, if a field is required in the page layout and read-only in the field -level security settings, the field -level securitv overrides the pa e la out and the field will be read -one for the user. ....... ServiceNow ServiceNow is a multi -instance architecture that gives every customer its own unique database, which means that it is impossible for your data to be commingled with any other customer. The multi -instance architecture is not built on large centralized database software and infrastructure. Instead, we deploy instances on a per -customer basis, allowing the multi -instance cloud to scale horizontally and infinitely. For our multi -instance cloud, we deploy separate application logic (Apache Tomcat Java Virtual Machines) and database processes (MySQL) for every customer. This allows ServiceNow to scale its application servers out horizontally by adding them to the load balancer pools fora particular instance. QTS Rapid elasticity. Capabilities can be elastically prov isioned and released, in some cases automatically, to scale rapidly out ward and in ward commensurate with demand. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be appropriated in any quantity at any time. Delivering scalable, secure, high -performing, virtual data centers for government applications QTS is committed to not only giving your cloud the most secure home, but also the ability to utilize best - of -breed technologies. Flexible, high -performing, future proof infrastructure: Built upon the VMware vCloud® Suite, you'll benefit from reliable, high -performing infrastructure using a platform that includes VMware, EMC and Cisco. This compatible solution easily integrates with private VMware environments and provides a pathway to a hybrid cloud.Our scalability increases agility, efficiency and productivity: Your technologists can focus more time on your business and customers, and less time on your infrastructure. Rapid provisioning and improvements in utilization enhances your speed to market, delivers applications faster, and gets projects out the door. Virtually unlimited bandwidth and communications diversity QTS operates carrier -neutral data center facilities. This means that customers can select their communications service providers from hundreds of carriers, Internet Service Providers, dark fiber and satellite companies to meet their transport requirements. Selecting a provider from such a broad list of options gives customers exceptional route diversity and pricing options, as well as different Service Level Agreements and installation schedules. Customers who need very high amounts of bandwidth to conduct their business efficiently will never have to worry about running out of capacity at a QTS facility. Similarly, customers who require exceedingly high communications security have the benefits of selecting from physically diverse routes between their ends points and dark fiber that is not shared with any other users. In short, there are virtually no limitations to the type, amount, or security of communications available at each QTS data center facili SAP Ariba There are no scalability limits with our products. We can scale accordingly to fit any data amount or user volume scenario. Field lass The hosted Field lass solution can .. g � g be horizontally and vertically scaled very quickly as the web server farm is fully virtualized. Only the SQL server is bare metal b dey sign _.............._...... . Hanna SAP HEC can be rapidly scaled to provision infrastructure &services on demand per customer requests. SuccessFactors Our solution was designed and developed, from the outset, to be a highly scalable application. We also use the concept of "PODS," from a hardware erspective. A POD is a fault tolerant cluster of application & DB servers carahsoft _36 Agreement No. 7434 SOLICITATION # CH16012 . _ ........ . .......... -._._ ........................ ... .... designed, as a scalable unit, to provide core processing and data storage services for fixed increment of customers. Attributes include: A POD is designed to support millions of subscribers. Our current 2nd Generation POD is scaled to 5M+ Multi -Vendor High Performance Blade Servers with 40GBps backplane fabric interconnects Multiple redundant Application Engines Clustering for availability and performance Hardware load balancers to route each new incoming session to the most available web and application processor Designed to support a high rate of concurrent connections while maintaining sufficient redundant capacity to meet SLA requirements New production PODs undergo a verification process before being brought into service Excess capacity PODs are always available on standby (scalability-on- demand) We will increase capacity if data center utilization surpasses the 70% threshold VMware All vCloud Air offerings partially comply with Rapid Elasticity, vCloud Air can be purchased as a pool of vCPU, vRAM, Network and Storage on shared or dedicated physical infrastructures that can be elastically provisioned and released. VMware's vCloud Air On Demand is fully compliant because capabilities can be elastically provisioned and released. VMware's SaaS Products i.e. AirWatch, does comply but the NIST requirement is not relevant to SaaS offerings. Note the vCloud Air Hybrid Cloud Manager is not Applicable. ....- ... ......._. FireEye FireEye cloud environments are continuously monitored by cloud service operations (CSO) personnel to help ensure secure operation and available of the system. Capacity is actively monitored and pro -active upscaling is conducted to ensure resources are always available to end - users. Procedures are in -place for rapidly adding resources in the event the infrastructure approaches capacity. ........ VirtueStream Virtustream's self-service portal, ticketing system and also the Technical Account Manager, who is the single point of contact for State of Utah allows for provisioning and deprovisioning of resources and services. In addition, Virtustream is uniquely positioned to provide application level provisioning as part of its standard automation and orchestration tool. Resources can be scaled based on application size, memory, storage, network requirements. xStream utilizes a supply chain to define resource profiles, attributes and offerincis than can be provisioned. 8.1.2.5 NIST Characteristic - Measured Service: Provide a brief written description of how the cloud solutions proposed satisfies this NIST Characteristic. Attest capability and briefly describe how measured service technical capability is met. ......-�_... CA APM Continuous monitoring of all service components (infrastructure and application) is._._ deployed to proactively identify any component or service trending towards failure or approaching capacity. This portion is handled for the underlying cloud infrastructure by AWS with active partici ation b CA including escalations of issues. MAA CA MAA systems administrators track the resource consumption of each virtual machine in use. ITIL flows are utilized to ensure service delivery. MAA customers do not need this information in order to use the service, nor do they have access to view it. 37 carahsoft Agreement No. 7434 SOLICITATION # CH16012 CA Agile Continuous monitoring of all service components (infrastructure and application) is deployed to proactively identify any component or service trending towards failure or approaching capacity CA"s best -of -breed monitoring solutions are deployed and supplemented with vendor specific diagnostic tools where appropriate 24x7 staffed network operation center (NOC) to analyze and respond to automated monitorin alerts _... ........_ .... ASM CA ASM systems administrators track the resource consumption of each virtual machine in the cloud. Since this is a SaaS service, ASM customers do not need this order to use the service, nor do they have access to view it. Google Saas, Google Apps ils already optimized for unlimited use by all end users. Google ensures high availability, low latency and fault tolerance as a part of the contracted services. No metering or rate limiting would be required as Google does not charge based on bandwidth use. Paas/laaS, Google Cloud Platform includes application development tools, Google App Engine, compute resources, Compute Engine and Container Engine, data storage solutions and networking solutions. The pricing model is based on actual usage and that usage can be monitored with Google's Cloud Monitoring Service which also includes options to autoscale a project. AODocs AODocs is already optimized for unlimited use by all end users. AODocs ensures high availability, low latency and fault tolerance as a part of the contracted services. No metering or rate limiting would be required as AODocs does not chased on bandwidth use. Virtru All services in our system monitored for availability, stabiity, security, and intrusion using a combination of tools, such as Dtrace, LogTrail, CloudWatch, DataDog, ElasticSearch and AlienVault. Salesforce Subscription -based Service The Salesforce PaaS and SaaS offerings are subscription based and in a per user/month or user/year format billed annually with some of our products offered as total logins per month or by defined number of members billed annually. Bandwidth Salesforce is designed to use as little bandwidth as possible so that the site performs adequately over high-speed, dial -up, and wireless Internet connections. While average page size is on the order of 90KB, Salesforce uses compression as defined in the HTTP 1.1 standard to compress the HTML content before it is transmitted as data across the Internet to a user's computer. The compression often reduces the amount of transmitted data to as little as 10KB per page viewed due to the lack of image content. The site was designed with minimum bandwidth requirements in mind, hence are extensive use of color coding instead of images. Our average user also is known to view roughly 120 pages from our site per day. Our application is stateless; therefore, there are no communication requirements in the background once the page loads, like traditional client server applications, e.g., Outlook. Therefore, once the page loads, there are no additional bandwidth requirements until a user queries or writes information to Salesforce. System Overview In addition to our Trust site (http://trust.salesforce.com/trust/status), you will also have access to a System Overview, which will help Salesforce customers monitor performance and usage of their own Salesforce org. This overview includes: Schema - # and % of custom objects and data storage Business Logic - # and % of Rules, Apex triggers and classes, as well as % of code used Licenses API Usage - # and % of requests in the last 24 hours User Interface - # and %of custom apps, sites, flows, custom tabs and pages 38 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ........ . Portal The above list is of all the possible metrics that Salesforce customers may have in their system overview. _..... ......... _.... _........... .. ... . .... _www_. ....... ServiceNow ServiceNow is a subscription service measured by number of user accounts or number of managed nodes. ServiceNow has a documented capacity -planning model, which is used to determine sizing requirements and scaling options. The need to address capacity and horizontal ... s item satin is in the back round, taent to our customers. Do- cusi n QTS Measured service. Cloud systems automatically control and optimize resource use by leveraging a metering capability I at some level of abstraction appropriate to the type of service (e.g., storage„ processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported,. rovNdin transparencyfor both the orovider and consumer of the utilized service. SAP Ariba We have an Internal Tools Development Team which has established active monitoring systems with alerting and automated escalation. This includes log monitoring from the backend of the systems and this is tied to established internal processes related to security incident management. The environment, policies, tickets and reports are reviewed under ISAE 3402 assurance audit eve six months. Fieldglass Fieldglass utilizes various methods to ensure the system is available and is operating as expected. • Our network performance monitor ensures that all servers and devices are available and performing as expected. • All devices and servers on our network log into our enterprise SIEM tool. All activity is monitored by the Fieldglass security team to ensure activity does not vary from our known baseline. • An Active Performance Monitor has been built into the Fieldglass system. This monitor logs all system activity and enables Fieldglass engineers to drill into data such as concurrent user count, thread count, memory, CPU, SQL duration,, server duration, client duration, page hits, etc. This data can be drilled into by day, hour, minute, server, and user. • Customer SLAs are tracked and communicated on a monthly basis. For 2015 we have a 99.4% success rate in meeting all customer page response time SLAs. _.M._. ......._... ...�. �� ......... Hanna �_ �. SAP HEC services are measured via SAP solution manager and reports are shared with the customer on a monthly basis as well as via self-service reports. SAP HEC operations team monitors the customer landscape and any disruption is addressed after reaching out to the customer and associated a roved, _.._ ._._.w.w ........ Succes..s F.... �actors Our hosting sites are designed to accommodate customers _ desiring a high level of managed service performance. In order to achieve such a level of performance, proactive monitoring is available through a variety of on-line tools that are implemented and managed by Cloud Operations. At a customer management level, the Cloud Operations monitors a series of "key metrics" that measure the results of various processes involved in supporting the business operations and service reliability. These metrics include reports of transaction volumes, latency, system availability, capacity, change management, and help incident response times as compared with established service level goals and standards. To facilitate required system performance, we monitor and tune the use of resources, and makes prons of future caacil _requirements. We em to carahsoft 39 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ......... .. ._...... ... a variety of services to monitor and enhance application performance, The network makes extensive use of high availability architecture, and is monitored on a 247 basis at multiple levels. We utilize real time web applications performance monitoring software to do the following: Sample web traffic in real time via performance analysis software Track web application errors, (e.g. http 4xx-5xx errors) Monitor end -to -end user performance trends Detailed session analysis for session troubleshooting This data is reviewed on a daily and weekly basis by Operations Support, and is further supported with automated alerts. We proactively gather performance statistics, set triggers to alert on capacity thresholds, and regularly review utilization trends for ca acit _planning. VMware VMware's provides automatic monitoring and metering services to their IaaS and SaaS offerings. Note the vCloud Hybrid Manager is not applicable as it is not metered, because it is for mans ement. ............_.._.......... .......� _...._ ..� _. ....... FireEye � FireEye cloud environments are continuously monitored by cloud service operations (CSO) personnel to help ensure secure operation and availability of the system. An internal monitoring system operates 24 hours per day to assess system availability and performance. The system is configured to send email alert notifications to FireEye operations personnel on a real-time basis communicating potential issues with the production systems VirtueStream The fundamental of Virtustream solution is based on uVM Technology, which is very unique in terms of billing. Virtustream solution takes average consumption of compute resources, and State of Utah would only pay for actual resources based on a monthly average. This is in comparison with traditional cloud solution, where the billing is based on allocation of resources in T-Shirt size (Micro, S, M, L, XL, XXL), and if the server is up, consumer of the cloud pays, but when it is down, they don't. In case of the Virtustream solution, customer only pays based on the average of vCPU, RAM, IOPS and Network 1/0; the key is average, not aggregate and based on consumption not allocation. In addition, all storage, security, application management services are offered as a monthly fee, based on the VMs; also, Virtustream can provide consultative and project support based on time and materials. The NVM brings significant benefits: enabling application level performance SLAB — which an average VM cannot. NVMs eliminate wasted headroom in fixed size VMs, generating significant efficiency improvements (up to 40% beyond traditional virtualization) and Virtustream only charges by the NVM so you only pay for the resources you actually consume not what you might need. Using NVMs also enables applications to be used across multiple hypervisors, across multiple clouds and between different locations — enabling true hybrid clouds. NVM technology allows Virtustream to offer enterprise class clouds capable of running both mission -critical enterprise applications and web -scale a lications, delivering the full benefits of cloud to the enterprise. 8.1.3 Offeror must identify for each Solution the subcategories that it offers for each service model. For example if an Offeror provides a SaaS offering then it should be divided into education SaaS offerings, e- procurement SaaS offerings, information SaaS offering, etc. _..... -...WW..... ._. ..... ........—...... _... CA APM In addition to the ARM SaaS offering CA Technologies also offers educational services and consultancy services. CA provides education and training services to its clients.. MAA CA MAA helps app developers visualize, investigate, manage, and support user interactions with their mobile apps. It provides deep insights into the performance, user experience, crash, and to anal ics of mobile a ps. CA MAA is aimed to help 40 Agreement No. 7434 SOLICITATION # CH16012 ....._ ... _.... enterprises understand .... �_. _ __...... _.... ........ the experience of mobile app users across the DevOps application lifecycle. Enterprises can accelerate the delivery of user -experience - focused mobile applications and can achieve faster time to market by continuous applicaton delivery while ensuring robust securi ............ _......... CA Agile We provide a SaaS offering that is generally used to document and manage work within the SDLC. In addition to the CA Agile offering CA Technologies also offers educational services and consultancy services ASM CA ASM is a SaaS offering that provides customers with the ability to monitor the availability, health, and performance of network services (web sites, email servers, ) etc. . ... .... Google Education SaaS offering - Google Apps for Education Messaging SaaS offering - Google Apps for Work, Google Apps Unlimited Collaboration SaaS offering - Google Apps Unlimited Identity Management SaaS offering - Google Apps SSO eDiscovery/Archving SaaS offering - Google Apps Vault Application Development PaaS - Stora a IaaS offeringA AODocs AODocs Team Folders AODocs Document Management AODocs Retention Application AODocs Email Connector _..._ ryp _. ... Viltru SaaS email en tionp nd SaaS file epnc In tlleader dedicated to helping c Salesforce Salesforce Is the enterprise cloud com ut' g p g ompanies and government agencies transform into connected organizations through social and mobile technologies. Over 150,000 Salesforce customers across nearly every industry have successfully transformed their operations including over 1000 government agencies, representing all federal cabinet level agencies and the majority of the United States. Customer examples include: State of Texas, State of Colorado, State of California, GSA, USDA, USAID, and others. Salesforce was named one of the World's Most Innovative Companies by Forbes for the last five years in a row. Salesforce is #1 in Enterprise Cloud Computing and #1 in CRM according to IDC. Salesforce ranks as the Leader in the Gartner Magic Quadrant for "CRM Customer Engagement Centers" (SaaS), "Sales Force Automation" (SaaS), and "Enterprise Platform as a Service" (PaaS). Government agencies are using Salesforce PaaS and SaaS solutions for a multitude of government functions including grants management, constituent communications and correspondence management, incident and case management, call/contact center management, outreach programs, learning management, volunteer management, project management, and even donor management, among numerous others. ServiceNow SaaS Offerings: -Cloud and Infrastructure Management Tools -Customer Relationship Management -Project and Portfolio Management (PPM) Tools -Security -Workflow and Electronic Signature •Promposed new cate�or: Information Technolo Service Mana ement Tools 41 carahsoft Agreement No. 7434 SOLICITATION # CH16012 - _....._ - _. .. ........ ......__............ QTS QTS has built some of the worid's largest, most robust, and redundant data centers. The company's innovative 3C product set of custom data center, colocation, and cloud and managed services provides a fully integrated platform and a flexible, scalable level of service that is difficult to match. Our service categories include: IaaS Custom Data Center IaaS Enterprise Cloud IaaS Managed Cloud IaaS vCGS Cloud IaaS Federal Solutions IaaS Healthcare Solutions IaaS Financial Service Solutions Colocation Connectivity Critical Facilities Management Hybrid IT Solutions Disaster Recovery as a Service (DRaaS) Managed Services: Managed Hosting, Managed Network, Managed Systems, Managed Security, SAP Mana ed Storage&Be P,Manaed Disas ter Recove ,Data Securit Arba We solutions that allow enterprises to efficiently manage the purchasing of non -payroll goods and services required to run their business. We refer to these non -payroll expenses as "spend."" Our solutions include software, network access, and expertise. They are designed to provide enterprises with, technology and business process improvements to better manage spend and, in turn, save money. Our solutions streamline the business processes related to the identification of suppliers of goods and services, the negotiation of the terms of purchases, and ultimately the management of ongoing purchasing and settlement activities. Our solutions allow enterprises to take a systematic approach with products and services that work together. By combining software, network access and professional services into a comprehensive solution, we help customers to address six key areas of spend management: Visibility - enhance spend visibility and control across spend categories, disparate systems and corporate divisions Sourcing - identify top suppliers, negotiate procurement terms, leverage aggregate spend, and manage procurement contracts Contract Management - streamline and automate from contract creation to compliance Procurement — streamline requisitioning and procurement across all types of spend Invoice and Payment - automate invoicing and payment processes Supplier Management - optimize buyer -supplier interactions throughout the s end lifec ole _ _ Fieldglass The SAP Fieldglass Vendor Management System VMS application - ITITITy (VMS) pp cation is a workforce mans�g S offering ement Saa _..,,.! Hanna HANA Enterprise Cloud is a private managed cloud primarily for all SAP enterprise -wide SAP applications such as: ERP, CRM, SRM, BW, etc. All SAP applications can be hosted in HANA Enterprise Cloud (via BYOL or Subscri Lion Licensing model? SuccessFactors Our orig inal product release dates are as follows: carahsoft _ 42 __ Agreement No. 7434 SOLICITATION # CH16012 ...... .. __ .................. _._...... ....... . ........ .. Performance Management — 2001 Goal Management — 2002 360/Multi-Rater Reviews - 2002 Succession Management - 2004 Compensation Management — 2004 Analytics & Reporting — 2005 Learning & Development — 2006 Recruiting Management — 2006 Variable Pay Compensation — 2007 Employee Profile — 2007 Stack Ranker — 2008 Employee Central — 2009 Metrics Navigator — 2009 Goal Execution — 2010 Calibration — 2010 Workforce Planning (Acquisition) — 2010 Workforce Analytics (Acquisition) - 2010 Plateau LMS (Acquisition) — 2011 JAM — 2011 Employee Central Payroll — March 2012 On oarftq.. ac isition of KID I'Oka _2013�_._............—service FireEye Is offering 4 distinct cloud solutions that can be classified into the following service _._._._.. categories and sub -categories: 1.Email Threat Prevention (ETP) Security — SaaS 2.Mobile Threat Prevention (ETP) Security — SaaS 3.Threat Analytics Platform (TAP) Threat Intelligence — SaaS 4.FireEye as a Service with Continuous Vigilance (FaaS CV) Managed Security Service — SaaS VirtueStream Virtustream is an Infrastructure as a Service (IaaS) offering focused on mission critical workloads and applications. The solution provides as part of the response is IaaS only. Virtustream's IaaS is targeted for all virtualized, x86 based cloud solution. While we have secured and segmented infrastructure for FedRAMP, FISMA, PCI and other regulated workload, it is best suited for any and all enterprise workload as long as the workload can be virtualized and run on x86 platform. For non x 86 environments, Virtustream provides Collocated areas, which is cross connected with the cloud, 8.1.4 As applicable to an Offeror's proposal, Offeror must describe its willingness to comply with, the requirements of Attachments C & D. Carahsoft complies with the requirements in attachment C & D. Cloud service models by vendor are broken out in section 6.6 of this response per the request in attachment C. 8.1.5 As applicable to an Offeror's proposal„ Offeror must describe how its offerings adhere to the services, definitions, and deployment models identified in the Scope of Services, in Attachment D. Carahsoft's cloud vendors fit into multiple categories as listed out in Attachment D. Many of our vendors fit a hybrid cloud deployment method with ability to silo off a private cloud if security needs dictate such. Our cloud vendors are broken out by service model in section 6.6 of this response. Carahsoft's cloud vendors _ carahsoft 43 Agreement No. 7434 SOLICITATION # CH16012 also fit into many categories as listed in section 1.1.3 of Attachment D. Depending on the type of data and service requested our vendors can support everything from on demand self service delivery to a completely managed and measured service option. 8.2 Subcontractors 8.2.1 Offerors must explain whether they intend to provide all cloud solutions directly or through the use of Subcontractors. Higher points may be earned by providing all services directly or by providing details of highly qualified Subcontractors; lower scores may be earned for failure to provide detailed plans for providing services or failure to provide detail regarding specific Subcontractors. Any Subcontractor that an Offeror chooses to use in fulfilling the requirements of the RFP must also meet all Administrative, Business and Technical Requirements of the RFP, as applicable to the Solutions provided. Subcontractors do not need to comply with Section 6.3. Carahsoft will be utilizing Subcontractors to provide services and solutions for specific manutacturers wltnin this response. In other cases, Carahsoft will work with the manufacturers to provide these services and solutions to all Participating Entities. All Subcontractors shall be vetted to ensure they have the necessary qualifications to do business within the State of Utah and any applicable Participating States. All Subcontractors will also comply with the applicable terms and conditions of the RFP and subsequent contract, as well as all Participating Addendums for the States they are subcontracting in. ff . 8.22 Offeror must describe the extent to which it intends to use subcontractors t o perform contract requirements. Include each position providing service and provide a detailed description of how the subcontractors are anticipated to be involved under the Master Agreement Carahsoft will use subcontractors as a third party company to provide services in relation to the solutions provided by the manufacturer. No other functions of contract management or execution will be performed by the subcontractor. While Carahsoft cannot determine all roles and responsibilities of the positions for each subcontractor, there are multiple different standards which subcontractors utilize for these types of contracts. Here is an example set of the traditional roles a subcontractor would play on behalf of Carahsoft for this RFP: Job Title: Consulting Engineer Functional Responsibility: Working under close supervision, person provides technical or scientific and project support for multiple large-scale projects that cross -cut multiple specialization and product development areas. Applies advanced business and/or technical expertise to assist others with defining, analyzing, validating and documenting complex customer operating environments, states of technology and current engineering processes. Provides advanced technical support to others involved in applying specialized knowledge to complex customer processes and requirements. Supports complex technical investigations through advanced research techniques, analysis or development phases of engineering projects. Works with other engineering disciplines in the development and application of processes to improve quality, reliability, cost customer appeal, and satisfaction. Job Title: Project Manager carahsoT T. 44 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Functional Responsibility: Possesses a thorough understanding of the process requirements and provide both technical and management oversight of the project. Responsible for customer satisfaction, serves as the single point of contact, compliance with the Statement of Work, project planning and management, resource allocation, and reporting. Job Title: Senior Information Architect Functional Responsibility: Provides supervision, person designs Intranet/Internet/Extranet architectures and develops implementations plans; administration activity; i.e., hardware, security, firewalls. Implements security architecture using LDAP, SSL and firewalls. Installs, configures and maintains all Intranet/Internet/Extranet tools, databases and features; provides support to e-commerce and other systems. Implements server design, development, and operation as well as analyze and develop requirements for hardware sizing/capacity, data validation, security and integration points to other applications. Job Title: Information Architect Functional Responsibility: Designs Intranet/Internet/Extranet architectures and develops implementations plans; administration activity; i.e., hardware, security, firewalls. Implements security architecture using LDAP, SSL and firewalls. Installs, configures and maintains all Intranet/Internet/Extranet tools, databases and features; provides support to e-commerce and other systems. Implements server design, development, and operation as well as analyze and develop requirements for hardware sizing/capacity, data validation, security and integration points to other applications. Job Title: Senior Consulting Engineer Functional Responsibility: Provides supervision, person provides technical or scientific and project support for multiple large-scale projects that cross -cut multiple specialization and product development areas. Applies advanced business and/or technical expertise to assist others with defining, analyzing, validating and documenting complex customer operating environments, states of technology and current engineering processes. Provides advanced technical support to others involved in applying specialized knowledge to complex customer processes and requirements. Supports complex technical investigations through advanced research techniques, analysis or development phases of engineering projects. Works with other engineering disciplines in the development and application of processes to improve quality, reliability, cost customer appeal, and satisfaction. not, describe how you will guarantee selection of a subcontractor that meets � requirements 8.2.3 If the subcontractor is known, provide the qualifications of the subcontractor to provide the services; if y � g the experience requirements of the RFP. Include a description of how the Offeror will ensure that all subcontractors and their employees will meet all Statement of Work requirements. Carahsoft will be making the determination of what subcontractors to include on the NASPO ValuePoint Cloud contract upon time of award. Carahsoft will ensure a subcontractor has all of the necessary certifications to do business in the State before adding them to the contract as a subcontractor. In addition, Carahsoft will do credit checks and meet with the subcontractor on multiple occasions to confirm that they are reliable and exceed expectations as a services and solutions provider. Finally, an agreement will be put in place between Carahsoft and the subcontractor to ensure optimal efficiency with the subcontractor's responsibilities. carahsoft 45 carahsoft Agreement No. 7434 SOLICITATION # CH16012 A subcontractor will be actively involved in understanding and shaping any Statements of Work created for the services of a deal in order to make sure that they have the capacity to meet all of the necessary requirements. These Statements of Work will dictate the terms upon which the subcontractor is deployed for services, so Carahsoft will work specifically with subcontractors that are active in the public sector and understand the nuances of selling to government entities. t 8.3.1 Offeror must describe how it will work with Purchasing Entities before, during, and after a Data Breach, as defined in the Attachments and Exhibits Include Information such as Personnel who will be involved at various stages, include detail on th how the Contract Manager in in Section 7 will be involved; • Response times; • Processes and timelines; • Methods of communication and assistance; and • Other information vital to understanding the service you provide. Security is of the uptmost importance to all of the Service providers that Carahsoft is submitting. Should and actual breach occur, it is the first priority of Carahsoft and the service provider to identify the source of the breach and implement safe guards to prevent one from happening in the future. The Service Provider will promptly notify the Purchasing Entity of the incident. Notification of the breach will be provided by the service directly to the security or customer contact that is identified by the Purchasing Entity. Methods of communication could include phone or email notification. 8.3.2 Offeror must describe how it will not engage in nor permit its agents to push adware, software, or marketing not explicitly authorized by the Participating Entity or the Master Agreement Carahsoft ensures that no unwanted marketing efforts are made to customers through an easy to manage opt out system in our database. Carahsoft can also limit communications by vendor to ensure that only those vendors approved by the customer reach out with marketing materials or product updates. Carahsoft will never support or assist in the pushing of adware or unwanted software to participating customers. 8.3.3 Offeror must describe whether its application -hosting environments support a user test/staging environment that is identical to production. _ Fora applicable cloud offerings, user test/ � is are ore i pp g staging environments are available that are identical to real-time production environments. 8.3.4 Offeror must describe whether or not its computer applications and Web sites are be accessible to people with disabilities, and must comply with Participating entity accessibility policies and the Americans with Disability Act, as applicable. ®, „H .�.......... ,. . The user interfaces provided for within this proposal are accessible to people with disabilities using assistive technologies. 4.3.5 Offeror must desc "ether rior not its applications and content delivered through Web browsers are be accessible using current released versions of multiple browser platforms (such as Internet Explorer, Firefox, Chrome, and Safari) at minimum. carahsoft 46 carahsoft Agreement No. 7434 SOLICITATION # CH16012 All cloud solution offerings within this proposal that are delivered via web browsers are accessible using current releases of common internet browsers such as Internet Explorer, Firefox, Chrome, Safari, and more. 8.3.6 Offeror must describe how it will, prior to the execution of a Service Level Agreement, meet with the Purchasing Entity and cooperate and hold a meeting to determine whether any sensitive or personal information will be stored or used by the Offeror that is subject to any law, rule or regulation providing for specific compliance obligations. Upon request of the customer, Carahsoft can host meetings via Adobe Connect web conferencing software or travel in person if the need presents itself. Carahsoft is happy to support and comply with any regulations or sensitive data compliance needs that the customer identifies. Carahsoft has the ability to limit customer information to a secure and isolated database if needed. 8.3.7 Offeror must describe any project schedule plans or work plans that Offerors use in implementing their Solutions with customers. Offerors should include timelines for developing, testing, and implementing Solutions for customers. Project scheduling and work planning documents are developed in conjunction with customer requirements. Project planning activities are conducted with a focus on developing a statement of work that defines deliverables, customer and contractor areas of responsibility, as well as project benchmarks, and deadlines. Project complexity and customer requirements determine the overall timelines for development, testing, and solution implementation. .4 Customer Service 8.4.1 Offeror must describe how it ensure excellent customer service is provided to Purchasing Entitie11 s. Include: • Quality assurance measures; • Escalation plan for addressing problems and/or complaints; and • Service Level Agreement (SLA). e core of Carahsoft's business is to provide the best customer service to our government customers and vendor partners. We are an IT solutions provider delivering best -of -breed hardware, software, and support solutions to federal, state and local government agencies since 2004. Carahsoft has built a reputation as a customer -centric real- time organization with unparalleled experience and depth in government sales, marketing, and contract program management. This experience has enabled Carahsoft to achieve the top spot in leading software license GSA resellers. Carahsoft has leveraged its vast contracting experience and extended it to quoting and order management. Carahsoft seamlessly generates quotes within 30 minutes or less and processed over 56,000 orders in 2014 that were each completed the same day received. Over the past ten years Carahsoft has acquired and maintained a wide variety of purchasing contract vehicles for agencies at the state, local, and federal levels. Associated with all contracts are dedicated and experienced contract management resources. Quality and accuracy is the driving factor behind Carahsoft's successin the government market. All solutions proposals and price quotes that are sent to our customers go through a three step review process for quality. The first is a pricing review that is automatically run against the pricing database to ensure pricing accuracy for the proper contract. The second review is at the certified Account Representative level who will check pricing and configurations for accuary and also review any SOWS that are included. Finally, mangagement review confirms the quality and accuracy of the proposal that will be sent to the Purchasing Entity. Carahsoft has instituted an escalation procedure for any problems or complaints that may arise. There are four levels of escalation and include review by the Account Representative assigned to the carahsoft 47 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Purchasing Entity, followed by the Regional Manager of the territory, next to the Vice President of State and Local and finally to the President/CEO. Each stage of escalation shall have a response SLA of no more than 24 hours. 8.4.2 Offeror must describe its ability to comply with the following customer service requirements: a. You must have one lead representative for each entity that executes a Participating Addendum. Contact information shall be kept current. b. Customer Service Representative(s) must be available by phone or email at a minimum, from 7AM to 6PM on Monday through Sunday for the applicable time zones. C. Customer Service Representative will respond to inquiries within one business day. d. You must provide design services for the applicable categories. e. You must provide Installation Services for the applicable categories. Carahsoft confirms and agrees that we will name a lead representative for each Participating Addendum. The contact information will be listed on the Carahsoft website and kept current. Carahsoft confirms it will have a representative available by phone and email available 7am-6pm on Monday through Sunday in the applicable time zones. Carahsoft confirms that it will respond to all inquiries within one business day or sooner. Carahsoft will engage with our service providers to provide design services in the applicable categories Carahsoft will engage with our service providers to provide installation services in the applicable categories. 8.5.1 Offeror must describe the measures it takes to protect data. Include a description of the method by which you will hold, protect, and dispose of data following completion of any contract services Security is of the utmost importance to Carahsoft and our serviceproviders. 'o� As an example of our Service Provider's security standards, please see the government security response for Salesforce: Government Trusted Security and Infrastructure Salesforce understands that the confidentiality, integrity, and availability of our customers' information are vital to their business operations and our own success. We use a multi -layered approach to protect that key information, constantly monitoring and improving our application, systems, and processes to meet the growing demands and challenges of security. Independent audits confirm that our security goes far beyond what most companies have been able to achieve on their own. Using the latest firewall protection, intrusion detection systems, and TLS encryption, Salesforce Force.com gives you the peace of mind only a world -class security infrastructure can provide. Third -party validation Security is a multidimensional business imperative that demands consideration at multiple levels, from security for applications to physical facilities and network security. In addition to the latest technologies, world -class security requires ongoing adherence to best -practice policies. To ensure this adherence, we continually seek relevant third -party certification, including ISO 27001, the SysTrust audit (the recognized standard for system security), and SSAE 16 SOC 1 audit (an examination and assessment of internal corporate controls, previously known as SAS 70 Type II). SOC1, SOC2 and SOC3 audits are performed by third party auditor annually at a minimum. Additional audits and certifications include: CSA'Consensus Assessments Initiative', JIPDC (Japan Privacy Seal), Tuv (Germany Privacy Mark), and TRUSTe. Protection at the application level carahsoft 48 ___ Agreement No. 7434 SOLICITATION # CH16012 Salesforce protects customer data by ensuring that only authorized users can access it. Administrators assign data security rules that determine which data users can access. Sharing models define company- wide defaults and data access based on a role hierarchy. All data is encrypted in transfer. All access is governed by strict password security policies. All passwords are stored in SHA 256 one-way hash format Applications are continually monitored for security violation attempts. Protection at the facilities level Salesforce security standards are stringent and designed with demanding customers in mind, including the world's most security -conscious financial institutions. Authorized personnel must pass through five levels of biometric scanning to reach the Salesforce system cages. All buildings are completely anonymous, with bullet -resistant exterior walls and embassy -grade concrete posts and planters around the perimeter. All exterior entrances feature silent alarm systems that notify law enforcement in the event of suspicion or intrusion. Data is backed up to disk or tape. These backups provide a second level of physical protection. Neither disks nor tapes ever leave the data center. Protection at the network level Multilevel security products from leading security vendors and proven security practices ensure network security. To prevent malicious attacks through unmonitored ports, external firewalls allow only http and https traffic on ports 80 and 443, along with ICMP traffic. Switches ensure that the network complies with the RFC 1918 standard, and address translation technologies further enhance network security. IDS sensors protect all network segments. Internal software systems are protected by two -factor authentication, along with the extensive use of technology that controls points of entry. All networks are certified through third -party vulnerability assessment programs. Trust.salesforce.com is the Salesforce community's home for real-time information on system performance and security. On this site you'll find: • Live and historical data on system performance • Up -to -the minute information on planned maintenance • Phishing, malicious software, and social engineering threats • Best security practices for your organization . Information on how we safeguard your data 8.5.2 Offeror must describe how it intends to comply with all applicable laws and related to data privacy and security. Carahsoft is happy to support and comply with any regulations or sensitive data compliance needs that the customer identifies. Carahsoft has the ability to limit customer information to a secure and isolated database if needed. Under no circumstances will Carahsoft ever publish or release secure customer data. Carahsoft's cloud vendors are all FIPS certified or have equivalent security standards in place to ensure no customer data is released outside of the secure cloud. 8.5.3 Offeror must describe how it will not access a Purchasing Entity's user accounts or data, except in the course of data center operations, response to service or technical issues, as required by the express terms of the Master Agreement, the applicable Participating Addendum, and/or the applicable Service Level Agreement. carahsoft 49 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Carahsoft will use customer accounts and data only in the processing of an order and management of the customer's service entitlements. Carahsoft's vendors, as outlined in their specific Master Agreements, only us customer account data for the express purpose of providing the service to the customer. Included in that service is implementation, technical support, and training efforts. Under no circumstances will Carahsoft or its cloud partners use customer information outside of normal operating procedures. 8.6.1 Offeror must describe its commitment for its Solutions to comply with NIST, as defined in NIST Special Publication 800-145, and any other relevant industry standards, as it relates to the Scope of Services described in Attachment D, including supporting the different types of data that you may receive CA APM CA technologies understands that security is a top concern when evaluating cloud- MAA based applications, which is why CA technologies operations worldwide conform to rigorous certification, compliance and security programs and processes. In addition, we contract with independent auditors to regularly evaluate and validate the security of our service. High risks are identified, validated and remediated before production systems are made available. Medium risks are evaluated and resolved on a priority basis. CAA ile We use CIS.an g d NIST standards as baselines for hardening ouurr a systems. We are currently working towards a NIST 800-53r4 certification however this is not yet complete. We are continuously reviewing our compliance with these standards. We perform monthly scans against our Production Infrastructure based on CIS standards. We scan for both vulnerabilites and compliance best practices bases on NIST 800- 53v4 standards. Vulnerabilites are tracked and remidiated based on severity and risk. ASM Please see our response to APM/MAA _. _ ... .......... Google Google's currently maintains a FedRAMP Authorization to Operate. FedRAMP incorporates the relevant NIST SP and FIPS security requirements. Further, Google contractually commits to maintainin SOC2 and IS027001 certifications. AODocs AODocs is committed to complySOC2 a 2. Virtru Virtru's business depends on its ability to support healthcare and criminal justice markets, which requires us to maintain compliance with HIPAA and CJIS standards which both make extensive use of NIST standards ............._ 2014 Salesforce achieved a FedRAMP Agency Authority Salesforce On May 23, g y to Operate at the moderate impact level (as described in FIPS 199 and 200) issued by Health and Human Services (HHS) for the Salesforce Government Cloud. Additionally, on May 15, 2015, HHS, as the FedRAMP authorizing agency, approved the Salesforce Government Cloud authorization package that was updated based on annual attestation requirements and updates to the FedRAMP baseline which is FISMA compliant and based on the current release of NIST SP 800-53 Rev. 4. Salesforce provides contractual assurance to its customers that the Customer Data hosted in Salesforce's services will be kept confidential and not accessed by third parties except under narrow circumstances (such as a customer support issue or as required by law). In the case of customer support, the company's personnel will access a customer's Org only with prior approval and sub'i ct to confidentiality obligations. ServiceNow ServiceNow is a cloud service provider offering a SaaS solu tion deployed from a private cloud that meets the five essential characteristics of cloud computing as described in 8.1, ServiceNow applies the same data classification for all hosted customer data. ServiceNow does not inspect or monitor its customers' information and therefore has no ability tasub-classify carahsoft 50 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ._.._.. .......... ..... ........ customer data. The overriding requirement of the assigned classification is that customer data remains hosted in the private cloud until the customer terminates their subscription. It is never stored anywhere apart from the private cloud. Customers remain the data owner and data controller for all data placed into their instance. ServiceNow does not examine, inspect, monitor or analyze customers' data. Customers apply access controls to restrict access to data within their instances based on their own re uirements and needs, including their own data classification. QTS QTS understands the growing number of requirements along with the complexity of managing the high cost -risk if you are not in compliance, and makes compliance a top priority. Our dedicated QTS Internal Audit team is focused on helping you define controls and processes to meet your ever-expanding compliance requirements. We are steadfast in protecting your data with the commitment to allocate required resources, technology and controls to not only help you achieve and maintain compliance today, but to expertly support your needs as they inevitably grow and change in the future. QTS tackles compliance differently. We provide a flexible, integrated approach to meet the IT compliance and regulatory needs across a wide variety of industries — from Payment Card Industry Data Security Standard (PCI DSS) and the Health Insurance Portability and Accountability Act (HIPAA) to U.S.—EU Safe Harbor. Our approach reduces the complexity and workload to effecti ely support their com Iiance efforts. SAP Ariba Our security framework, which consists of semi-annual independent third party AICPA audit under the Trusted Services Principles of security, confidentiality, process integrity and availability as well as annual certification by an independent Qualified Security Assessor for PCI DSS, is highly aligned with the NIST controls. Our security framework and cloud services are designed to receive process and store data sets of a commercial business -to -business nature and are multi -tenant and international in scope. FISMA/NIST is designed to protect US government data that can include classified information as well as sensitive PII such as ePHI and SSN's or government identifiers. We practice data avoidance where these data sets are concerned primarily to reduce the risk to us and to our customers but also to avoid additional regulatory compliance which has onerous reporting and high costs which would have to be passed on to our customers. Where FISMA regulated entities can take advantage of our solutions, the data sets they expect to store must be validated to avoid being under regulatory requirements beyond what we can provide in terms.of both security as well as rep ortln mm Field lass Field lass has based g g its security program on the ISO 27002 security standard and has maintained its ISO 27001 certification since February 2011. However, to ensure that a robust security framework was developed, additional controls were added and/or modified based on COBIT DS5 Ensure Systems Security, specific NIST special publications, and vendor specified best practices. Fieldglass uses a SSAE 16 audit with a twelve-month audit cycle to validate that the controls defined within the security framework are o eratin effectively. Hanna SAP will show the compliance with the SAP Cloud Security Framework by the compliance audits and/or certification audits only as it pertains to the HANA Enterprise Cloud. SAP Cloud and Infrastructure Delivery's Security, Risk & Compliance Office has devei''opd the Integrated carahsoft 51 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Information Security Management System (IISMS) Framework. The IISMS Framework is based on SAP's corporate quality and security policy as well as the corporate security standards and guidelines relating to information security and business continuity. This IISMS Framework was adapted to SAP Cloud Security Services as SAP Cloud Security Framework (Cloud SFW). SAP's security, process and compliance team conducts technical security audits to validate that security concepts have been implemented successfully and to safeguard the usage of newly developed tools. Compliance Audits Cloud solutions from SAP have passed ISAE3402/SSAE16-SOC 1 Type II and/or SOC 2 Type II audits (in the following referred to as SOC audits) and can provide the related audit reports on request. Certification Audits The SAP HANA Enterprise Cloud has attained certifications according to the following ISO standards are available (related audits are in the following referred to as ISO audits): • ISO 27001:2013 • ISO 22301:2012 • ISO 9001:2008 SuccessFactors Our IT architecture is aligned with ISO 270--._ 02. We are Safe Harbor certified and in alignment with BS10012 and ISO 20000 for Service Delivery. We demonstrate an on -going commitment to protecting the confidentiality, integrity and availability ("CIA") of data from internal and external threats, making us a reliable and secure system provider. Our secure multi -tenant Software as a Service (SaaS) platform is designed for availability, security, scalability, and performance. Industry best practices and standards are adopted and incorporated. Our Network also complies with the Authority to Operate as a Moderate Risk Federal Information System by the Office of Personnel Management and Department of Homeland Security; NIST SP800-53 Security Controls; EU Privacy Directive 95/46/EC for EU and non-EU customer data; Payment Card Industry (PCI) Data Security Standard (DSS) v 2.0; Safe Harbor. We provide privacy compliant data center facilities not only in the United States but also as a Member State of the European Union (EU) or a state of the European Economic Area (EEA). Currently, such data centers are certified for ISO27001, IS09001 and PCI-DSS compliance. Our security services provide complete and thorough monitoring of all traffic on the network on a 24x7x365 basis, and include security technology, alert services and incident management support. We are audited twice annually to SSAE16 US or ISAE 3402 international accountingstandards VMware VMware is fully committed to complying with NIST and all other relevant industry standards including FedRAMP, FISMA, PCI, CSA CAIQ, etc. This is demonstrated by VMware's track record of pursuing and obtaining certifications such as those listed above. vCloud Government Service has been certified to store and secure Low Risk Level and Moderate Risk Level data as defined by FIPS PUB 199. In addition, VMware is capable of enhancing the vCloud Government Service to meet participating State's requirements to be able to store data that is defined by FIPS Pub 199 as High Risk Data. VMware is committed to maintaining compliance with all of our existing and future compliance certifications. Our ability to remain competitive as a software and services provider in the public sector depends upon it. Thus we have established a comprehensive security and compliance team to ensure that we a c maintain compliance s well as a strongITsecurety pc�strre. p _ _ 52 carahsoft Agreement No. 7434 SOLICITATION # CH16012 .. .......... _ _. _ _ . ............. VMWare supports regular internal and external audits to ensure compliance with its certifications as required. The AirWatch Information Security Program is built on the security framework laid out in NIST 800- 53. Although AirWatch is not required to register with any regulatory agencies, we provide a suite of tools for our customer's to maintain industry -relevant compliance guidelines within their mobile device fleets. AirWatch has recently been awarded the HP-IAPP Privacy Innovation Award for Most Innovative Privacy Technology by the International Association of Privacy Professionals (IAPP) for our commitment to delivering an EMM platform focused on end -user privacy. To help ensure the confidentiality, integrity, and availability of our cloud offering, we comply with the European Data Protection Directive (95/46/EC) and our top -tier data center partners have unde�ne SSAE16 SOC2 Ty e II audits and have ISO 27001 certifications. y third party certifications for SSAE 16 SOC 2, FedRAMP certifications, Model clauses, Privacy and security standards among others. The data that FireEye receives is only in conjunction with the malware ana6 sis. VirtueStream The Virtustrea mFedWeral Cloud (IaaS) has met the requirements for a FedRAMP moderate P-ATOm- The IAAS is assessed annually by a FedRAMP certified 3rd Party Assessment Organization (3PAO). The annual assessment will review a subset of the NIST 800-53 Revision 4 controls as designated by FedRAMP. Virtustream's 3PAO shall demonstrate impartiality throughout the assessment to accurately assess the status of all security controls in place. 8.6.2 Offeror must list all government or standards organization security certifications it currently holds that apply specifically to the Offeror's proposal, as well as those in process at time of response. Specifically include HIPAA, FERPA, CJIS Security Policy, PCI Data Security Standards (DSS), IRS Publication 1075, FISMA, NIST 800 53, NIST SP 800-171, and FIPS 200 if they apply. _.. _..... .......................... ....... . ............... __ ....... CA APM AWS EC2 datacenters annually undergo SOC 3 audits. _....u_ The application currently not hold a Soc 2 attestation. MAA CA MAA is certified for SOC 2,IMe_ASecud Audit. CA Agile Our data center provider has a SOC 2 audit report that can be provided upon request. Our application does not currently have such certifications. ASM Rackspace datacenters annually undergo various certification including SOC 3 audits. The a lication currently does not hold a Soc 2 attestation. Google Google has a FedRAMP ATO at the Moderate impact baseline. FedRAMP incor orates many NIST SPs and FIPS including 800-53, FIPS 199, FIPS 200), and has a specific offering. Google Apps for Education that is FERPA and COPPA compliant. Other compliance standards such as HIPAA and CJIS don't offer certification per se, but are commonly accommodated (i.e. Google will sign a BAA to meet HiTECH/HIPAA requirements, and has numerous customers who bear responsibility for meeting CJI processing requirements). PCI DSS is generally not applicable to SaaS systems (though we can do email hygiene processing to protect against incidental usage)„ but Google IaaS/PaaS does meet PCI DSS v3 standards. Google also holds and is committed to maintaining SOC2 and IS027001 certifications. AODocs AODocs doens't hold an HIPAA certifications per se, but are commonly accommodated to meet ......HIPAA requirements signin as Virtru HIPAA, FERPA, CJIS, NIST 800-53, NIST SP-800 Salesforce Salesforce and the Salesforce Force platform is ISO 27001 certified and PCI-DSS compliant. SOC1, SOC2 and SOC3 audits are performed by third party auditor annually at a minimum. Additional audits and certifications include: carahsoft 53 carahsoft Agreement No. 7434 SOLICITATION # CH16012 FedRAMP Authority to Operate from Department of Health and Human Services CSA'Consensus Assessments Initiative' JIPDC (Japan Privacy Seal) Tuv (Germany Privacy Mark) TRUSTe HIPAA In provisioning and operating the services, Salesforce complies with the provisions of HIPAA's Privacy Rule and Security and the HITECH Act that are applicable to business associates. Salesforce's customers are still responsible for complying with the same in their capacity as a covered entity or business associate using the Salesforce services. The services' features permit customers to customize use as per a compliance program for HIPAA (including the HITECH Act) and many customers store protected health information (PHI) on our service. From a legal standpoint, some of our customers have asked Salesforce to assist them in meeting their compliance obligations; for example, by entering into business associate agreements (BAA) to address formal legal requirements pertaining to use and disclosure of protected health information (PHI). FERPA Salesforce maintains appropriate administrative, physical, and technical safeguards to help protect the security, confidentiality, and integrity of data our customers submit to the Salesforce Services as Customer Data. Salesforce's customers are responsible for ensuring the security of their Customer Data in their use of the service and implementing any necessary customer -controlled settings. To aid, Salesforce offers robust security functionality that provides our customers the flexibility to use the application in a configuration that furthers compliance with local data protection laws and regulations. While Salesforce complies with applicable law in provisioning and operating the Salesforce services, it is the sole responsibility of Salesforce's customers to ensure compliance with applicable laws in their respective uses of the Salesforce services. PCI-DSSSalesforce is PCI Level 1 compliant and has received a signed Attestation of Compliance (AoC) for the Payment Card Industry Data Security Standard (PCI-DSS). Salesforce customers who must adhere to PCI compliance may store personal account numbers ("PAN" or "credit card numbers") in Salesforce, with the following caveats: - PANs may only be stored in a custom field encrypted via Classic Encryption or supported field types via the Platform Encryption functionality. PANs must not be stored in clear text fields, attached files, or any other location. - Customer administrators must configure Salesforce features to support their organization's PCI controls.NIST SP 800-171NIST Special Publication 800-171 is intended for use by federal agencies when agencies are providing CUI to nonfederal organizations (or when CUI is developed by those organizations for federal agencies) for purposes unrelated to information processing. In other words, the nonfederal organizations are not operating their information systems to process agency data, including CUI, on behalf of the agency but rather for other purposes (e.g., when designing or producing an aircraft, performing a study, or conducting background investigations for security clearances). Salesforce recommends that its customers use the classifications as detailed in FIPS 199. FIPS 140-2, FIPS 197, FIPS 199, and FIPS 200 On May 23, 2014 Salesforce achieved a FedRAMP Agency Authority to Operate at the moderate impact level (as described in FIPS 199 and 200) issued by Health and Human Services (HHS) for the Salesforce Government Cloud. Additionally, on May 15, 2015, HHS, as the FedRAMP authorizing agency, approved the Salesforce Government Cloud authorization package that was updated based on annual attestation requirements and updates to the FedRAMP baseline which is FISMA compliant and based on the current release of NIST SP 800-53 Rev. 4. carahsoft 54 carahsoft Agreement No. 7434 SOLICITATION # CH16012 As part of the Salesforce Government Cloud, Salesforce is capable of responding to FIPS 140-2/3 cryptographic implementations for data being transferred between the customer's web browser and Salesforce. Data that resides within Salesforce's protected boundary does not use FIPS 140-2 validated encryption as compensating/mitigating controls are in place to protect data. Additional information is provided below. Data Transmission between the customer's web browser and Salesforce: Salesforce employs cryptographic mechanisms to protect information during transmission. All transmissions between the user and Salesforce are encrypted by default with a 2048-bit Public Key. Our service uses International/Global Step Up certificates. We support one-way TLS, in which customers create secure connections before sharing private data. Secure routing and traffic flow policies ensure that customer traffic is encrypted entering Salesforce until the load balancer decrypts the traffic. The load balancers decrypting the traffic are FIPS 140-2 compliant and are located inside of the Salesforce Government Cloud isolation boundary. Data Transmission for Backup Media: Media containing customer data is not transported outside of controlled salesforce.com areas and therefore relies on physical access controls to protect the data. Data at Rest: NIST 800-53 Rev. 3 states in SC-28, "Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an organizational information system." SC-28 also states, "Organizations may choose to employ different mechanisms to achieve confidentiality and integrity protections, as appropriate." All secondary storage media (hard drives, disk drives, and tapes) containing customer data are maintained within Salesforce's secure production data centers until the media has been sanitized and destroyed. Salesforce relies on physical access controls as a compensating control to protect the data. Primary Data Storage: User passwords are stored in the RDBMS encrypted via the SHA algorithm with a 256-bit hash. This is a one way hash. The passwords are encrypted by the application. For primary data storage, Salesforce provides customers with a built-in capability to apply field -level encryption, using 128-bit keys with Advanced Encryption Standard (AES) encryption (as defined by FIPS 197), for a selection of custom fields included in the Salesforce Platform and CRM applications. ServiceNow ServiceNow's security policy stbased on IS027001:201designated and hasdbeenn since 2012 ServiceNo " _ g ds is fl.crypstorage, __._._._....._ ceNow also has annual SSAE 16 SOC 1 Type 2 and SOC2 Type 2 attestations with controls being based off NIST 800-53. The ServiceNow Service Automation Government Cloud Suite is a FedRAMP Compliant Cloud System with a JAB Provisional Authorization. This cloud offering has regulatory restrictions to the types of tenants that can use it. ServiceNow's FedRAMP compliant and standard commercial datacenter environments are virtually identical. The differences that do exist, such as only allowing access to specially adjudicated US citizens, exist for regulatory reasons not because the environment is su erior in some way. QTS QTS assists with ma ing between DOD IT RMF/DIACAP and NIST as well as International Standards Organization (ISO) standards and many others. QTS maintains control mappings that include: NIST 800-53/FedRAMP (LowlModerate/Hichl carahsoft 55 carahsoft Agreement No. 7434 SOLICITATION # CH16012 • DOD IT RMF/DIACAP (MAC 1/11/III Sensitive & Public) • HIPAA-HITECH-Omnibus • PCI-DSS • ISO/NATO • CNSS/ICD/DCID/NISPOM ._..�.�.. � ......_ SAP .A ._... riba .......... ...................... We are audited and certified by independent third -party auditor PricewaterhouseCoopers (PwC) for compliance with ISAE 3402 SOC1 Type 11, SOC2 and SOC3 every six months. Upon completion of the audit, an attestation letter is issued, stating our compliance. In addition, our primary hosting facility (Equinix) infrastructure is audited for compliance with SSAE 16 SOC1 Type II. The Service Organization Controls report (SOC) is aimed at three different audiences. SOC1 (aimed at financial auditors) is the same type of report as the SAS70 but also includes an attestation letter signed by both our company and the auditor. SOC2 is aimed at IT and security practitioners. The SOC3 is the publicly viewable web seal to show that we have been audited. In addition, we have attained PCI (Payment Card Industry) - DSS (Data Security Standard) certification as a Level 1 Service Provider and compliance with the Visa USA Cardholder Information Security Program (CISP) and MasterCard Site Data Protection (SDP) program. These programs were created specifically for merchants and service providers who process, store, or transmit cardholder data. The PCI DSS is a set of comprehensive requirements for enhancing payment account data security which was developed by the founding payment brands of the PCI Security Standards Council, including American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa Inc. It was developed to help facilitate the broad adoption of consistent data security measures on a global basis. The PCI DSS is a multifaceted security standard that includes requirements for security management, policies, procedures, network architecture, software design, and other critical protective measures. This comprehensive standard is intended to help organizations proactively protect customer account data. CISP and SDP reflect Visa's and MasterCard's respective longstanding commitment to information security ,,..-._....... Fieldglass SAP Fieldglass has achieved the following certifications • ISO 27001 • SSAE 16 SOC 1 and SOC 2 HIPPA Fieldglass does not store Protected Health Information (PHI) on its system and is not required to comply with the Health Insurance Portability and Accountability Act. PCI The Fieldglass application does not process credit card information. We are not and are not required to be) PCI compliant. ... . Hanna Please see response to 8.6.1 Hybris _IT IT _m The Savvis datacenter located in Boston, MA is SSAE16 Type 11 SOC I Compliant. This replaces the older SAS70 T e II audit standard. SuccessFactors We have been audited to the SOC 2 Trust Services Criteria. This signifies that our control objectives and control activities have been examined by an independent accounting and auditing firm, and that these controls fairly presented the controls in operation as of a specific date and were suitably designed to achieve the control objectives. Our SOC 2 audits are conducted semi-annually (May, November) by PricewaterhouseCoopers (PwC) We also hold US Federal FISMA Moderate carahSO'IL 56 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Authority to Operate with both OPM and NTIS. We are compliant with EU Privacy Directive 95/46/EC and are Safe Harbor self -certified. https://safeharbor.export.gov/companyinfo.aspx?id=26196We are aligned with ISO 27001 for Information Security, BS 10012 for Data Protection, and ISO 20000 for Service Delivery to create an Integrated Compliance Framework ("ICF"). Where these standards overlap in subject matter, Information Security ISO 27001 takes precedence. Our Network also complies with Authority to Operate as a Moderate Risk Federal Information System by the Office of Personnel Management and Department of Homeland Security; NIST SP800-53 Security Controls; EU Privacy Directive 95/46/EC for EU and non-EU customer data; Payment Card Industry (PCI) Data Security Standard (DSS) v 2.0; Safe Harbor. We are aligned with ISO 27001 for Information Security, BS 10012 for Data Protection, and ISO 20000 for Service Delivery to create an Integrated Compliance Framework ("ICF"). Where these standards overlap in subject matter, Information Security ISO 27001 takes precedence. Our Network also complies with Authority to Operate as a Moderate Risk Federal Information System by the Office of Personnel Management and Department of Homeland Security; NIST SP800-53 Security Controls; EU Privacy Directive 95/46/EC for EU and non-EU customer data; .... _. .. Payment Card Indust' PCII Data Security Standard (DSS) v 2.0; Safe Harbor, VMware VMware IaaS Services ISO/IEC 27001: ISO/IEC 27001 is a globally recognized standard for the establishment and certification of an information security management system (ISMS). vCloud Air continues to maintain a current ISO/IEC 27001 Certification and has recently issued updated certification for ISO/IEC 27001:2013. Achieving certification means that VMware has implemented a holistic security program that conforms with the ISO 27001 standard requirements, both in the security management system and control activities. The audit of the ISMS was completed by Brightline CPAs and Associates - an ANAB accredited certification body. HIPAA: The Health Insurance Portability and Accountability Act of 1996(HIPAA), which has incorporated requirements from the Health Information Technology for Economic and Clinical Health Act (HITECH) of 2009, established national standards for the security and privacy of Protected Health Information (PHI) in the United States. To help customers comply with HIPAA, VMware offers a Business Associate Agreement (BAA) to all interested customers using our US -based data centers. The BAA was designed in conjunction with a leading law firm with expertise in HIPAA and provides fair and reasonable terms for healthcare providers, insurers, and other organizations. VMware has completed an independent third party examination of vCloud Air against applicable controls of HIPAA. SOC 1 (SSAE16/ISAE 3402): Service Organization Control (SOC) 1 reports are conducted in accordance with Statement on Standards for Attestation Engagements (SSAE) No.16 put forth by the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (AICPS). The SOC 1 framework reports on internal controls over financial reporting for any service organization such as VMware vCloud Air. SOC 1 aligns to the International Standard on Assurance Engagements (ISAE) 3402 international reporting standards. SOC 1 examinations are specifically intended to meet the needs of the managements of vCloud Air's customers and vCloud Air's customers' auditors, as they evaluate the effect of the controls at vCloud Air on the clients' financial statement assertions. VMware has completed an independent third -party examination of vCloud Air which spans a twelve (12) month review period. ]SOC 2: The Service Organization Control 2 (SOC 2) report is composed of a comprehensive set of criteria on security, availability, processing integrity, confidentiality, and privacy and is similarly set Jorthibarthe America Institute of Certified Public Accountants (AICPA). The SOC 2 reports are carahsoft 57 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ........... _............ __....__.._ ........... intended for use by stakeholders (e.g. customers, regulators, business partners, suppliers, directors) of the service organization that have a thorough understanding of the service organization and its internal controls. VMware has completed an independent third -party examination of vCloud Air that also spans a twelve (12) month review period. SOC 3: Trust Services Report for Service Organizations Control 3 (SOC 3) reports are designed to meet the needs of customers who want assurance on the controls at a service organization related to security, availability, processing integrity, confidentiality, or privacy. vCloud Air has completed an independent third -party SOC 3 examination of VMware vCloud Air. SOC 3 is composed of a comprehensive set of trust principles including security, availability, processing integrity, confidentiality and privacy. Cloud Security Alliance: VMware vCloud Air has completed the Cloud Security Alliance (CSA) Consensus Assessments Initiative Questionnaire (CAIQ). CAIQ provides industry -accepted ways to document what security controls exist in IaaS, PaaS and SaaS offerings. FedRAMP Provisional Authority: VMware vCloud Government Service, provided by Carpathian, now has FedRAMP Provisional Authority to Operate issued by the Joint Authorization Board (JAB). FedRAMP is a government -wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. This approach uses a ""do once, use many times"" framework that can reduce government organizations' costs, time, and staff required to conduct redundant agency security assessments. U.S. government agencies can now leverage vCloud Government Service to meet the stringent security and privacy requirements of FedRAMP. FIPS 140-2: VMware vCloud Government Service is fully FIPS 140-2 compliant including hardware which provides its 2-Factor Authentication capabilities. FIPS Pub 199: As discussed previously, vCloud Government Services is certified to store and secure Low Risk Data and Moderate Risk Data as defined by FIPS Pub 199. VMware is willing to work with participating States that require High Risk Data Storage to enhance vCloud Government Services to store and secure this data. FIPS Pub 199: As discussed previously, vCloud Government Services is certified to store and secure Low Risk Data and Moderate Risk Data as defined by FIPS Pub 199. VMware is willing to work with participating States that require High Risk Data Storage to enhance vCloud Government Services to store and secure this data. CJIS: vCGS recently underwent a CJIS assessment by CoalFire, Inc. CJIS is not a certification, it is a policy that must be followed and accredited for each deployment which requires it. The goal of VMware's CoalFire assessment was to create a baseline configuration that can be reused across any CJIS opportunity to accelerate the implementation and accreditation timeframes. FERPA: Like CJIS, FERPA compliance is assessed and confirmed for each deployment that requires it. VMware's vCloud Government Service FedRamp certification and others provide evidence that the underlying infrastructure is capable of meeting rigorous information security and availability requirements. VMware will work with Participating Entities to meet FERPA requirements on a task order basis. PCI Data Security Standards (DSS): Neither vCloud Air nor vCGS are currently PCI certified at this time. VMware will work with Participating Entities to meet PCI requirements on a task order basis. IRS Publication 1075: Because both IRS 1075 and FedRAMP are based on NIST 800-53, the compliance boundary for IRS 1075 is the same as the FedRAMP authorization. This, vCGS complies with IRS Publication 1075 on the basis that it is FedRAMP certified. FISMA: vCGS is FISMA Low and Moderate compliant. Agreement No. 7434 SOLICITATION # CH16012 FireEye VirtueStream NIST 800-53: NIST 800-53 provides the core controls that must be met to achieve FedRAMP __...... compliance. VMware vCloud Government Service has FedRAMP Provisional Authority to Operate issued by the Joint Authorization Board (JAB), thus we are compliant with NIST 800-53. NIST SP 800-171: VMware vCloud Government Service has FedRAMP Provisional Authority to Operate issued by the Joint Authorization Board (JAB). NIST 800-171 outlines a subset of the NIST 800-53 requirements, and as stated above, VMware vCloud Government Service is compliant with these guidelines. Since NIST 800-171 outlines a subset of the NIST 800-53 requirements, VMware vCloud Government Service is compliant with NIST SP 800-171. FIPS 200: Neither vCloud Air nor vCGS are currently FIPS 200 certified at this time. VMware will work with Participating Entities to meet PCI requirements on a task order basis. VMWare AirWatch The AirWatch Information Security Program is built on the security framework laid out in NIST 800-53. Although AirWatch is not required to register with any regulatory agencies, we provide a suite of tools for our customer's to maintain industry -relevant compliance guidelines within their mobile device fleets. AirWatch has recently been awarded the HP-IAPP Privacy Innovation Award for Most Innovative Privacy Technology by the International Association of Privacy Professionals (IAPP) for our commitment to delivering an EMM platform focused on end -user privacy. To help ensure the confidentiality, integrity, and availability of our cloud offering, we comply with the European Data Protection Directive (95/46/EC) and our top -tier data center partners have undergone SSAE16 SOC2 Typell audits. . _....... ..... ___ Currently the standards that apply are SSAE 16 SOC 2 Type 2, with a FedRAMP ATO in place and full FedRAMP certification in process. We are also in the process of becoming FedRAMP ISO 2700x certified. -..w _.. ....... .._............. Security is the foundation of our business. Virtustream's xStreamTm cloud software assists our customers to meet mandatory Legislative requirements, and achieve and maintain SSAE16, ISAE3402, PCI-DSS 3.0, FISMA, ISO 27001-2005/2013, ISO 9001-2008, HIPAA, CSA STAR and other leading cloud certifications and compliance frameworks in the customer's own environment (when coupled with identified operational and management controls). 8.6.3 Offeror must describe its security practices in place to secure data and applications, including threats from outside the service center as well as other customers co -located within the same service center. CA APM CA technologies understands that security is a top concern when evaluating cloud - based applications, which is why CA technologies operations worldwide conform to rigorous certification, compliance and security programs and processes. In addition, we contract with independent auditors to regularly evaluate and validate the security of our service. High risks are identified, validated and remediated before production systems are made available. Medium risks are evaluated and resolved on a priority basis. MAA All MAA core servers are behind firewalls; only systems administrators have access to the servers; all data is encrypted when transmitted between data centers. The MAA dashboard and API are protected with HTTPS/TLS encryption, and users are required to authenticate in order to access these. CAAgile We use a co -located data center provider and within that environment we have a dedicated cage to which only our Operations Team has access. We also monitor all traffic across our systems using HIDS (OSSEC) and NIDS (Snort) to notify of any sus,agious cfivity, ASM All ASM core servers are behind firewalls; only systems administrators have access to the servers; all data is encrypted when transmitted between data centers. The ASM dashboard and API are protected with HTTPS/TLS encryption, and users are required to use a username and password to login to their accounts. P. carahswl 59 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Google In this DPA the obligations of Google to hold all customer g g g data as confidential and wholly owned by the customer is detailed. Google's internal data access processes and policies are designed to prevent unauthorized persons and/or systems from gaining access to systems used to process personal data. Google aims to design its systems to: (i) only allow authorized persons to access data they are authorized to access; and (ii) ensure that personal data cannot be read, copied, altered or removed without authorization during processing, use and after recording. The systems are designed to detect any inappropriate access. Google employs a centralized access management system to control personnel access to production servers, and only provides access to a limited number of authorized personnel. LDAP, Kerberos and a proprietary system utilizing RSA keys are designed to provide Google with secure and flexible access mechanisms. These mechanisms are designed to grant only approved access rights to site hosts, logs, data and configuration information. Google requires the use of unique user IDs, strong passwords; two factor authentication and carefully monitored access lists to minimize the potential for unauthorized account use. The granting or modification of access rights is based on: the authorized personnel's job responsibilities; job duty requirements necessary to perform authorized tasks; a need to know basis; and must be in accordance with Google's internal data access policies and training. Approvals are managed by workflow tools that maintain audit records of all changes. Access to systems is logged to create an audit trail for accountability. Where passwords are employed for authentication (e.g., login to workstations), password policies that follow at least industry standard practices are implemented. These standards include password expiry, restrictions on password reuse and sufficient password strength. For access to extremely sensitive information (e.g., credit card data), Google uses hardware tokens. AODocs AODocs being built in Goo le A pEn ine and Google Drive. _ Virtru Please see the Virtru Security Policies and Procedures and the Virtru Privacy Policies and Procedures provided in the Supplemental Information section of this response. Salesforce Government Trusted Security and Infrastructure Salesforce understands that the confidentiality, integrity, and availability of our customers' information are vital to their business operations and our own success. We use a multi -layered approach to protect that key information, constantly monitoring and improving our application, systems, and processes to meet the growing demands and challenges of security. Independent audits confirm that our security goes far beyond what most companies have been able to achieve on their own. Using the latest firewall protection, intrusion detection systems, and TLS encryption, Salesforce Force.com gives you the peace of mind only a world -class security infrastructure can provide. Third -party validation Security is a multidimensional business imperative that demands consideration at multiple levels, from security for applications to physical facilities and network security. In addition to the latest technologies, world -class security requires ongoing adherence to best -practice policies. To ensure this adherence, we continually seek relevant third -party certification, including ISO 27001, the SysTrust audit (the recognized standard for system security), and SSAE 16 SOC 1 audit (an examination and assessment of internal corporate controls, previously known as SAS 70 Type II). SOC1, SOC2 and SOC3 audits are performed by third party auditor annually at a minimum. Additional audits and certifications include: CSA'Consensus Assessments Initiative', JIPDC (Japan Privacy Seal), Tuv (Germany Privacy Mark), and TRUSTe. I � Protection at the application level _ I f - 60 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Salesforce protects customer data by ensuring that only authorized users can access it. Administrators assign data security rules that determine which data users can access. Sharing models define company -wide defaults and data access based on a role hierarchy. All data is encrypted in transfer. All access is governed by strict password security policies. All passwords are stored in SHA 256 one-way hash format. Applications are continually monitored for security violation attempts. Protection at the facilities level Salesforce security standards are stringent and designed with demanding customers in mind, including the world's most security -conscious financial institutions. Authorized personnel must pass through five levels of biometric scanning to reach the Salesforce system cages. All buildings are completely anonymous, with bullet -resistant exterior walls and embassy -grade concrete posts and planters around the perimeter. All exterior entrances feature silent alarm systems that notify law enforcement in the event of suspicion or intrusion. Data is backed up to disk or tape. These backups provide a second level of physical protection. Neither disks nor tapes ever leave the data center. Protection at the network level Multilevel security products from leading security vendors and proven security practices ensure network security. To prevent malicious attacks through unmonitored ports, external firewalls allow only http and https traffic on ports 80 and 443, along with ICMP traffic. Switches ensure that the network complies with the RFC 1918 standard, and address translation technologies further enhance network security. IDS sensors protect all network segments. Internal software systems are protected by two -factor authentication, along with the extensive use of technology that controls points of entry. All networks are certified through third -party vulnerability assessment programs. Secure Data Centers Data centers provide only power, environmental controls, and physical security. Salesforce employees manage all other aspects of the service at the data centers. Colocation data center personnel do not have network or logon access to the Salesforce systems. Colocation personnel have physical access to the Salesforce secure server room in the event of an emergency, but do not have keys to the individual racks containing hardware. Data centers maintain a common baseline of physical and environmental controls across data centers. The exterior perimeter of each anonymous data center building is bullet resistant, has concrete vehicle barriers, closed-circuit television coverage, alarm systems, and manned 24/7 guard stations that together help defend against non -entrance attack points. Inside each building, multiple biometric scans and guards limit access through interior doors and to the Salesforce secure rooms at all times. Access to Salesforce's secure server rooms in the datacenter is authorized based on position or role. Additional access controls enforced by an electronic key box are implemented for the dedicated Salesforce Government Cloud racks to ensure that access is limited to Qualified U.S. Citizens. Salesforce has an established process to review data center access logs to the server room. Additionally, an at least annual assessment of the data center is performed to ensure the data centers are meeting Salesforce's security control requirements. In addition to securing the data center locations, it is critical that the data center facilities maintain robust critical infrastructure to support Salesforce through the following services: carahsoft 61 Agreement No. 7434 SOLICITATION # CH16012 Temperature and d Humidity Controls • Humidity and temperature control • Redundant (N+1) cooling system Power • Underground utility power feed • Redundant (N+1) CPS/UPS systems • Redundant power distribution units (PDUs) • Redundant (N+1) diesel generators with on -site diesel fuel storage Secure Network Logistics • Concrete vaults for fiber entry • Redundant internal networks • Network neutral; connects to all major carriers and located near major Internet hubs • High bandwidth capacity Fire Detection and Suppression • VESDA (very early smoke detection apparatus) • Dual -alarmed, dual -interlock, multi -zone, pre -action dr�pipe water -based fire suppression ServiceNow The ServiceNow cloud is built for the enterprise customer with every aspect aimed towards meeting the customer's demand for reliability, availability and security. ServiceNow's comprehensive approach to address this demand is enabled by the following: (a) ServiceNow's robust cloud infrastructure runs on its own applications and utilizes industry best -of -breed technology to automate mission critical functionalities in the cloud service with around -the -clock and around -the -world delivery; (b) ServiceNow achieves flexibility and control in its ability to deliver a stable user experience to the customer by having a logical single tenant architecture; (c) ServiceNow's application development which has a paramount focus on quality, security, and the user experience is closely connected to the operations of delivering those applications in a reliable and secure cloud environment; (d) ServiceNow invests in a comprehensive compliance strategy that allows its customers to attain their own compliance to applicable laws by obtaining attestations and certifications and running its subscription service from paired data centers situated close to where its customers are located; and (e) ServiceNow's homogeneous environment where all applications are on a single platform offers ServiceNow a competitive advantage in being able to concentrate its efforts to make the customer's user experience the best possible. The "Data Security Guide" contained within the "Subscription Service Guide" included with this response describes the measures ServiceNow takes to protect Customer Data when it resides in the ServiceNow cloud. QTS The QTS Information System Security Officer (ISSO) de velops, disseminates, annually reviews and updates a formal, documented access control policy; System and Communications Protection and addresses the following: -Purpose and scope -Roles, responsibilities -Compliance QTS develops, disseminates, and annually reviews/updates a formal, documented security policy executive summary, SP Executive Summary - Information System Security Program Policies, which addresses: -management commitment -coordination among customer entities Ira Pa carahsor T. 62 carahsm Agreement No. 7434 SOLICITATION # CH16012 QTS cloud's Policies are maintained within a biometnc sec ure office located in in the Suwanee facility at 300 Satellite Blvd, Suwanee, GA 30024. It is disseminated to all individuals, including but not limited to employees, contractors, consultants, temporaries, and other personnel affiliated with third parties, who use any QTS Information Resource that is owned or leased by QTS. This policy is consistent with QTS's mission and functions and with applicable laws, directives, policies, regulations, standards, and guidance. The previously mentioned artifacts are disseminated via a centralized secure document repository among all QTS cloud's personnel who have any service operations or service delivery role for QTS cloud's IaaS offerings system environments, and is to be individually or by group reviewed semi-annually, especially by any personnel who have administrative access. QTS can provide its Information Security Policies as required: • IT_POL,03_Sstem_and_Comrnu nication _Prot cliortA.Pofic u1.2— 1/17/14 SAP Ariba We are committed to the security and integrity of customer information. We utilize security measures to protect against the loss, misuse or alteration of the information under our control. To prevent unauthorized access, maintain data accuracy, and facilitate the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect within the solution. Fieldglass Please see the Fieldglass Security and Hosting Overview provided in the _ Supplemental Information section of this .n..se. Hanna Communication between data centers is via VPN or MPLS; VPN is encrypted by default and MPLS can be encrypted as well. Internet facing customer systems are protected by perimeter protection systems using technologies such as web application firewall (WAF) or intrusion prevention systems (IPS). Perimeter protection systems operate by monitoring traffic and blocking attaches towards SAP HANA Enterprise Cloud customer systems, ... .... Hybris Both IDS and IPS are included the SAP Hybris Commerce, Cloud Edition The security infrastructure includes firewall security and hardened security policies on all servers. Log management procedures are in -place for log review for firewall, applications, network devices, including file -integrity management. SAP Hybris utilizes technologies from leading security firms for Log Management and File Integrity Management. SAP Hybris employs two - factor authentication across its network. SAP Hybris undergoes vulnerability and penetration testing. SAP Hybris validates against requirements for PCI DSS 2.0. The infrastructure also includes Web Application Firewalls and DDoS Mitigation Services. In addition, security policies and change management policies are in -place ensuring that all access and changes to customer systems and information is accessible only by SAP Hybris staff with access authorization. Security of the software application which is controlled by the Customer (or its .............. irnp Iementation partner remains the reams onsibilit of the Customer. mm SuccessFactors Technologies and measures used to help protect the security of customer data include: Redundant firewalls in a dedicated environment Network intrusion detection to help guard against attacks by monitoring all data center traffic around -the -clock and notifying operations and security teams in the event of an imminent threat Vulnerability scanning to proactively test internet-connected web servers by searching for weaknesses in the same way that a hacker would carahsoTT63 c_ t Agreement No. 7434 SOLICITATION # CH16012 _................. ................ _... _. Penetration testing at least annually Security teams monitoring the infrastructure 24x7x365 Any security issues discovered are reported in real time to information security staff and IT management, entered into our ticketing system for follow-up investigation, and tracked to resolution. All actions taken to resolve the problem are documented, allowing all problems to be tracked to completion. We provide application level memory separation between each client instance as well as data level segmentation and separation with each customer's data residing in its own schema and table space at the database tier. The database tier provides isolation and security of data, and the use of application clustering provides availability, reliability and scalability. Each customer's data is maintained in a separate database schema with its own discrete set of tables, facilitating a high degree of data isolation thus preventing potential for data segmentation breaches Flexibility to backup individual customer table spaces without affecting adjacent customers Each schema has separate authentication credentials and assigned resource rofile to restrict access rights and resource consumption VMware The VMWare Approach to Compliance Many organizations have initiatives to virtualize their Information Technology (IT) infrastructure, or to move to a Cloud Computing model. However, these initiatives are often complicated by the increasing number of regulatory compliance requirements, which require protection of data such as PCI, HIPAA, FISMA, DIACAP, FedRAMP, GLBA, and other State and Federal requirements. Organizations are increasingly concerned with the complexity, risk, and impact that a new technology can bring to their existing environments. VMware addresses these challenges by establishing a Compliance Reference Architecture Framework (RAF) that provides a consistent method for VMware, its partners, and customers to assess and evaluate the impact of regulations on virtual and cloud environments. The intent of the RAF is to provide a single framework for VMware, its partners, and organizations to address a variety of compliance requirements across an IT infrastructure. We designed our security architecture using a defense -in-depth approach to implement multiple layers of security throughout the SaaS environment and to mitigate any potential attacks through multiple safeguards, including: • Access control mechanisms, firewalls, anti-viruslmalware software, auditing mechanisms, network controls, maintaining defined configuration settings, etc. ............. We perform r�ular internal scans to assess the vulnerabllat a of our internal network. FireEye All data is stored within locked and monitored cages in secure data centers. Customer data is restricted to a need to know basis. Data is logically tagged and virtually segregated in our cloud services. Access is managed and only given to those with need to know including internal em to ees and customers. VirtueSt __ ___._�_.._ .._...... ...__ ream All data for this environment will remain in the United States. Customers can elect Intel's TxT technology to demonstrate geo-fencing of data to specific data centers. Virtustream data centers are physically accessible by designated employees and approved employees only. Virtustream employees who are assigned to the data center are issued a proximity card which is required to access the data center. Once inside, physical access to the data processing areas is further restricted to specific employees. Physical access to the data processing areas is protected by biometric locks on the doors. Data center personnel maintain a list of all approved personnel who have access to the data center offices and who have access to the data processing areas. Virtustream offers security solutions which customers can select to protect their data while in transit and at rest. Customers are responsible for the protection of their data within their customer Agreement No. 7434 SOLICITATION # CH16012 zone. Virtustream does not process, store, or disseminate customer data within the Virtustream- controlled management zone. Virtustream invokes a defense -in-depth model for monitoring the management zone with tools such as Splunk, Trend Micro, Fortinet, and Tenable. These tools are available for customers to select as a manaqed service. 8.6.4 Offeror must describe its data confidentiality standards and practices that are in place to ensure data confidentiality. This must include not only prevention of exposure to unauthorized personnel, but also managing and reviewing access that administrators have to stored data. Include information on your hardware policies (laptops, mobile etc). �._ CA APM All personnel with access to client data undergo annual mandatory security trarnang and are covered under the CA Technologies NDA. Violations of security policies are grounds for termination. All access to data and other resources used to deliver the service are granted under the leastprinciple ....... MAA Customer accounts are password protected, and users can only access their data in their accounts. System administrators have access to MAA servers, and database administrators have access to database servers. Account access is reviewed eroodically, CA Agile All customer data is treated as confidental and as a policy we do not access customer data without explicit written consent. Access to systems containing customer data is restricted to our Operations Team aocordigg to our Elevated Permissions Policy. ... ASM Customer accounts are password protected, and users can only access their data in their accounts. System administrators have access to ASM servers, and database administrators have access to database servers. Account access is reviewed freraodioal�l All data on CA laptops are encryd and a PIN is required to boot. AODocs The data stored in Google AppEngine are backed up every day. The application is hosted on Google Cloud Platform infrastructure and benefits from the network securi . V1rtru See'Virtru Security Policies and Procedures' and'Virtru Privacy Policies and Procedures' Salesforce Logical Access Control Salesforce provides contractual assurance to its customers that the data hosted in the Salesforce Services will be kept confidential and not accessed except under narrow circumstances (such as a support issue) and only for a set amount of time chosen by customer. In such circumstances, we will access your org only with prior approval and subject to a Non -Disclosure Agreement (NDA). To protect against access through the application, Salesforce employees don't have access at the application level for any customers, unless the customer grants access through the "login as" feature. Access to the production environment infrastructure is restricted to a very limited number of full- time Salesforce employees required to manage the service. Salesforce's Technical Operations team and Release Managers have logical access to servers. These employees must authenticate to the production environment via a secure server (Secure Global Desktop) using 2 points of RSA two -factor authentication. This tool provides pixel data only to these administrators. Systems access is role -based and controlled and logged. DBAs do not have login access to customer's instances (org) and do not see customer data in an assembled manner. They manage the system in aggregate -performance tuning, allocating space, building indices, etc. The Oracle tables and rows in our infrastructure do not reflect the view of a single customer instance (org) since we are multi -tenant and the data is spread across multiple disk arrays carahsoft 65 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Database administrator account activity is logged. These logs are sent to the security information and event management (STEM) system. These database activities logs are reviewed for appropriateness by the Computer Security Incident Response Team (CSIRT) team on a regular basis. This log data is also available as a forensic audit trail to support CSIRT during incident investigations. A customer's instance (org) of Salesforce is an aggregate of the raw data. The data model is very complicated, normalized, and the rows are identified by base62 encoded keys (primary and foreign). Re-establishing data ownership and a business context for the data would be very difficult to do at the database level. In order to reassemble any given customer's application (org), someone would need access to our source code in order to reassemble the raw data in a manner that could be interpreted and understood, and would need the entire set of tapes or disks/arrays supporting a given Instance, as the data for any one customer is spread across several tapes/disks. Data center engineers with physical access to the servers do not have logical access to the production environment and administrators with logical access to the systems do not have p ysical access to the data centers. ServiceNow ServiceNow applies the same data classification for all hosted customer data. ServiceNow does not inspect or monitor its customers' information and therefore has no ability to sub -classify customer data. The overriding requirement of the assigned classification is that customer data remains hosted in the private cloud until the customer terminates their subscription. It is never stored anywhere apart from the private cloud. Customers remain the data owner and data controller for all data placed into their instance. ServiceNow does not examine, inspect, monitor or analyze customers' data. Customers apply access controls to restrict access to data within their instances based on their own requirements and needs, includin their own data classification. OTS The customer will be assigned one or more Org Administrators. All users will be configured with RSA AD two -factor Risk Based authentication as a requirement for cloud portal access. ..� SAP Ariba We participate in the following national and international standards committees: WebTrust: (2001 - current) The Security, Availability, Processing Integrity and Confidentiality of our applications are based on the Trust Services Principles now incorporated into the SSAE16/ISAE 3000 SOC 2 standards SSAE16: (formerly SAS 70) certification: (Since 2011) ISAE 3402: (The International Standard on Assurance Engagements since 2014) every six months we undergo a rigorous ISAE 3402 audit by independent auditor PricewaterhouseCoopers (PwC) Payment Card Industry (PCI) Data Security Standard (DSS): (Since 2008) we have adopted and adhere to the PCI-DSS). PCI certification and compliance with the Visa USA Cardholder Information Security Program (CISP) and MasterCard Site Data Protection (SDP) program Safe Harbor: (Since 2007) Current on the Safe Harbor list for ""Online Data for the ASN and Cloud Solutions/Services A firewall separates the Ariba corporate network from Ariba infrastructure computers. Therefore, unauthorized Ariba employees cannot access Ariba data from the Ariba corporate network infrastructure. Access is limited to specific roles or functions within Ariba Operations. Additionally, access is mana ed on an "exception" basis w.hereby personnel need clearance to be carahsoT T. 66 carahsoft Agreement No. 7434 SOLICITATION # CH16012 authorized. Access is time -limited, after which time re -authentication is required. Internally, we have deployed an active monitoring system tied back to Human Resources. Logical access management reports are rolled up monthly and are part of the monthly Privacy & Security board review. All logical access management is subject to review and audit under ISAE 3402 assurance every six months and annually under PCI DSS cerfification. Wireless technology is not allowed within the production operations infrastructure where customer data is received, processed and stored. All corporate laptops are whole disk encrypted. All approved portable devices are encrypted and have a phone home capability which allows them to be wiped remotely. Fieldglass Fieldglass has the following categories for classifying information; Confidential - This is the information that Fieldglass and end users have a legal, regulatory and/or contractual obligation to protect or information that unauthorized disclosure, compromise, or destruction that results in severe damage, provides significant advantage to a competitor, or incurs serious financial impact to Fieldglass and/or our customers. Fieldglass will not disclose to a third party without signing a nondisclosure agreement requiring the third party to protect such information. Internal Use - This is information that, due to a technical or business sensitivity, requires special precautions to ensure the confidentiality and integrity of data by protecting it from unauthorized access, modification or deletion. This information is intended for use only within the company and must be limited to end users who are employed by Fieldglass or individuals that have a business requirement to access the data and have signed a non- disclosure agreement. Public - This information has been made available for public distribution through authorized company channels. Public information does not require special protection. It is information that can be disclosed to anyone without violating an individual's right of privacy. Knowledge of this information does not expose Fieldglass to financial loss, embarrassment, or jeopardize the security assets. Laptops Every Fieldglass laptop issued to employees and contractors have a DLP agent installed that cannot be modified. This agent detects whether customer data or the Fieldglass source code is being copied externally. Monthly access reviews are conducted by product and file share owners to ensure access is limited to a need -to -know basis. Privileged user account access is also monitored on a weekly basis. Hanna SAP treats all customer data stored in cloud solutions from SAP as "Confidential" according to SAP's data classification standard. Personal Data is subject to strict security and legal requirements in the legislation of several countries, for example handling of Personal Data is regulated in the European Union (EU) Data Protection Directive and carahsoft 67 carahsoft Agreement No. 7434 SOLICITATION # CH16012 _.............. ..... _ ........ ....... corresponding national laws. At SAP intercompany agreements exist, to ensure that these requirements are met in all SAP companies and branch offices throughout the world. Similar data protection agreements were executed with all subprocessors. Personal data must be classified as equally confidential regardless of whether it relates to employees, customers or third parties. Hybris The security infrastructure includes firewall security and hardened security policies on all servers. Log management procedures are in -place for log review for firewall, applications, network devices, including file -integrity management. SAP Hybris utilizes technologies from leading security firms for Log Management and File Integrity Management. SAP Hybris employs two - factor authentication across its network. SAP Hybris undergoes vulnerability and penetration testing. SAP Hybris validates against requirements for PCI DSS 2.0. The infrastructure also includes Web Application Firewalls and DDoS Mitigation Services. In addition, security policies and change management policies are in -place ensuring that all access and changes to customer systems and information is accessible only by SAP Hybris staff with access authorization. Security of the software application which is controlled by the Customer (or its implementation partner) remains the responsibility of the Customer. SuccessFactors We are aligned with ISO 27001 for Information Security, BS 10012 for Data Protection, and ISO 20000 for Service Delivery to create an Integrated Compliance Framework ("ICF"). Where these standards overlap in subject matter, Information Security ISO 27001 takes precedence. Our Network also complies with Authority to Operate as a Moderate Risk Federal Information System by the Office of Personnel Management and Department of Homeland Security; NIST SP800-53 Security Controls; EU Privacy Directive 951461EC for EU and non-EU customer data; Payment Card Industry (PCI) Data Security DSS) v 2.0 Sae Standard ( Harbor. VMw __ _... are VMware monitors for security events involving the underlying infrastructure servers, storage, networks, and information systems used in the delivery of vCloud Air over which VMware have sole administrative level control. The goal of this process is to identify security incidents and respond to them proactively. This responsibility stops at any point where customers have control, permission, or access to modify any aspect of the service offering. The customer is responsible for the security of the networks over which they have administrative level control. This includes, but is not limited to, maintaining effective firewall rules, exposing communication ports that are only necessary to conduct business, locking down promiscuous access, and other such capabilities. Proactive Security Monitoring over Internet and Social Media (e.g. searching filesharing sites for customer data, seeding data with honey tokens) VMware security teams perform OSINT monitoring on the Internet for all VMware products and services. This includes harvesting data from search engines, le sharing, and social networking sites. This data is analyzed for keywords and other specific indicators. With regards to potential data leaks, the customer is solely responsible for protecting the security of his or her content, including any access provided to employees, customers or third parties. vCloud Air provides certain software and functionality to help protect content from unauthorized access such as firewalls, load balancers, and IPsec VPNs. Customers are encouraged to deploy additional security mechanisms similar to what exists in their current data center to address other security controls such as data encryption, intrusion detection, le integrity monitoring, and other such concerns relevant to the sector and regulatory requirements that apply to the specific business of a customer. carahsm -r I68 carahswl Agreement No. 7434 SOLICITATION # CH16012 FireEye FireEye has mature and well documented security and privacy programs. The programs include third party certifications for SSAE 16 SOC 2, and FedRAMP certifications, Model clauses, Privacy and Security Standards among others. The data that FireEye receives is only in conjunction with the malware analysis. Our data protection standards includes prevention of exposure to unauthorized personnel and managing and reviewing all access to systems (not just for admin) quarterly or when employees have a role change. FireEye has standards for hardware and software such as gold images for all operating systems and hardened systems, these are managed and distributed centrally. It also includes supported and managed configurations of hardware and software on mobile devices and acceptabNe use for all F�reesources� VirtueStream Customers are responsible for the protection"' rotection and confidentiality of data within their application and/or system which resides on the Virtustream IaaS. Virtustream customers are logically separated via VLAN and VRF technologies which ensure that different customers' data is not accessible and cannot be altered. Customers are responsible for controlling access to their data. Virtustream does not have direct access to customer data within their customer zone. Virtustream employees who are assigned to IaaS must pass a Virtustream background investigation. In addition, Virtustream employees assigned to the RAS must adhere to any requirement by customers to pass federal, state, or local background investigations if they are to provide managed services to the customer zone. Virtustream offers an encryption at rest and encryption in transit managed service. This provides an additional level of protection for customer's data within their VLAN, All Virtustream employees with access to the IaaS are required to have hard drive encryption on their Laptops Virtustreamm performs quarterly privileged user access reviews. 8.6.5 Offeror must provide a detailed list of the third -party attestations, reports, security credentials (e.g., FedRamp), and certifications relating to data security, integrity, and other controls. CA APM AWS EC2 datacenters annually under o�c SOC 3 audits. MAA CA MAA is certified for SOC ?_In1 Securi Audit. CA Agile N/A - we are working towards a NIST 800-53r4 certification but that is not yet ASM Rackspace datacenters annually undergo various certification including SOC 3 audits. The a-plication currently does not hold a Soc 2 attestation. 9 ( ) 3 I __...................... Goo le SOC 1 SSAE 16 SOC 2 SOC SO 27001 ISO 27018 FedRAMP AODocs AODocs is certified SOC2 Tie 2 Virtru Vulnerability Scan and Penetration Testing by Cigital and FedRamp In Process spons ored by US De artment of Interior Salesforce Salesforce has com rehensive q p -.rf p privacy and security assessments and certifications performed by multiple third parties. The followingaudits and their frequencies are erformed, ISO 27001 - Annually (3 year certification) PCI-DSS - Annually FedRAMP - Annually SOC 1 (SSAE16/ISAE 3402, previously SAS 70) - Twice a year SOC 2 & SOC 3 - Twice a year Copies of our SOC reports can be provided to your Agency upon request and under NDA. ro 69 Agreement No. 7434 SOLICITATION # CH16012 Under NDA, your Agency can also be provided Salesforce's complete FedRAMP Authority to Operate (ATO) package, which contains the following security assessment documentation; 01 - Salesforce Government Claud System Security Plan 02 - Salesforce Government Cloud System Security Plan - Tracked Changes 03 - Salesforce Government Cloud Attachment 1 - Control Tailoring Workbook (CTW) 04 - Salesforce Government Cloud Attachment 2 - Control Implementation Summary (CIS) 05 - Salesforce Government Cloud Attachment 3 - PTA and PIA 06 - Salesforce Government Cloud Attachment 4 - E-Authentication 07 - Salesforce Government Cloud Attachment 5 - FIPS 199 Categorization 08 - Salesforce Government Cloud Attachment 6 - User Guide - Customer Configurations 09 - Salesforce Government Cloud Attachment 7 - Hardware, Network, and Software System Inventory 10 - Salesforce Government Cloud Attachment 8 - Customer Responsibilities .. - Salesforce Government Cloud Rules of Behavior - Ground Rules for Security Success 12 - Salesforce Government Cloud Disaster Recovery Plan 13 - Salesforce Government Cloud Incident Response Plan 14 - Salesforce Government Cloud Configuration Guide 15 - Salesforce Government Cloud Continuous Monitoring Plan 16 - Salesforce Government Cloud Security Assessment Plan 17 - Salesforce Government Cloud Security Assessment Report (SAR) 18 - Salesforce Government Cloud Table 4.1 SAR 19 - Salesforce Government Cloud Test Cases (SRTM) 20 - Salesforce Government Cloud POA&M o ServiceNw •ISO/IEC 27001:2013 BrightLine Certificate Number 1980700-4 (see supplemental information section for official certificate) •SSAE 16 SOC 1 Type 2 (available under NDA) •SSAE 16 SOC 2 Type 2 (available under NDA) •FedRAMP Compliant QTS QTS maintains control mappings that include: • NIST 800-53/FedRAMP (Low/Moderate/High) • DOD IT RMF/DIACAP (MAC 1/II/III Sensitive & Public) • HIPAA-HITECH-Omnibus • PCI-DSS • ISO/NATO • CNSS/ICD/DCID/NISPOM SAP Ariba As assurance collateral, we can provide the BITS SIG and CSA Cloud Service Provider Questionnaire, Our ISAE 3402 SOC 1 Type II, SOC 2 and SOC 3 reports as well as the Attestation of Compliance for PCI DSS are signed by our qualified security assessor and management. Fieldglass Independent third -party auditors conduct annual audits for the following: • ISO 27001 • SSAE 16 SOC 1 and SOC 2 ._._.�..-......... � Hanna Please see response 8.6.1 Hybris H uccessFactors We have various third party certifications inclu in ISO 27001 and BS10012. carahsoft _ 70 r _ Agreement No. 7434 SOLICITATION # CH16012 ........._.... __..... ......... VMware VMware IaaS Services The International Organization for Standardization (ISO) has developed he ISO 27001 standard which defines an information security management system ("ISMS") as a systematic approach to managing sensitive company information so that it remains secure. It includes an organization's people, processes and IT systems and the application of a risk management process. vCloud Air has established and implemented an Information Security Management System (ISMS) based on ISO 27001 standards to manage risks relating to confidentiality, integrity, and availability of information. vCloud Air engages an independent third party auditing firm on an on -going basis to validate vCloud's air adherence to the ISO 27001 standard. An ISO 27001 certificate is issued if the auditing firm has validated adherence to the standard. VMware IaaS Services The International Organization for Standardization (ISO) has developed he ISO 27001 standard which defines an information security management system ("ISMS") as a systematic approach to managing sensitive company information so that it remains secure. It includes an organization's people, processes and IT systems and the application of a risk management process. vCloud Air has established and implemented an Information Security Management System (ISMS) based on ISO 27001 standards to manage risks relating to confidentiality, integrity, and availability of information. vCloud Air engages an independent third party auditing firm on an on -going basis to validate vCloud's air adherence to the ISO 27001 standard. An ISO 27001 certificate is issued if the auditing firm has validated adherence to the standard. VMware IaaS Services The International Organization for Standardization (ISO) has developed he ISO 27001 standard which defines an information security management system ("ISMS") as a systematic approach to managing sensitive company information so that it remains secure. It includes an organization's people, processes and IT systems and the application of a risk management process. vCloud Air has established and implemented an Information Security Management System (ISMS) based on ISO 27001 standards to manage risks relating to confidentiality, integrity, and availability of information. vCloud Air engages an independent third party auditing firm on an on -going basis to validate vCloud's air adherence to the ISO 27001 standard. An ISO 27001 certificate is issued if the auditing firm has validated adherence to the standard. vCloud Government Service (laaS): FedRAMP Provisional Authority: VMware vCloud Government Service, provided by Carpathian, now has FedRAMP Provisional Authority to Operate issued by the Joint Authorization Board (JAB). FedRAMP is a government -wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. This approach uses a ""do once, use many times"" framework that can reduce government organizations' costs, time, and staff required to conduct redundant agency security assessments. U.S. government agencies can now leverage vCloud Government Service to meet the stringent securi and rivaq r�equarements of FedRAMP. FireEye We have SSAE 16 SOC 2 Type 2 certification for specific cloud services, and associated datacenters. FireEye currently has a FedRAMP ATO for ETP and are in process for full FedRAMP„ and ISO 27001 certification. VirtueStream Security is the foundation of our business. Virtusit' ream's xStreamT"" cloud software assists our customers to meet mandatory Legislative requirements, and achieve and maintain FedRAMP, FISMA Moderate, PCI-DSS, SSAE16/SOC2/SOC3, ISO 27001/9001/22301, HIPAA, NIST 800-53, CSA STAR and other leading cloud certifications and compliance frameworks in the customer's own environment (when coupled with identified operational and mana-qement controls). 71 Agreement No. 7434 SOLICITATION # CH16012 8.6.6 Offeror must describe its logging process including the types of services and devices logged; the event types logged; and the information fields. You should include detailed response on how you plan to maintain security certifications. .... CA APM CA has various log monitoringgt tools that help us keep track of live production systems in order to understand load vs. resource utilization vs. performance. CA along with AWS monitors the service and provides real time alerting when systems suddenly die, or when system loads or response times approach critical thresholds. Logs are kept for forensic examination and identification of trends in order to proactively ensure stability. MAA CA MAA servers logand data retention is all activity, anywhere from 14 to 180 days de ending on the component and volume of logs generated CA Agile All systems are required to send logs to a centralized log server. At a minimum log ............. data must contain timestam s, usernames, IP Addresses, and query parameters. ASM ASM servers log all activity, and data retention is anywhere from 30 days to 1 year __p 4 n and volume of logs generated. Google This is largely the din on the responsibility of thatio de en �_.� of the customer. Google's obligations, as described in 8.6.4, are to ensure there is no unauthorized access of Customer data. Customers are responsibility for ensuring their end users use the service according to the Customer's acceptable use policies. During the onboard process, Customers will be assisted in the configuration controls that are included to enforce acceptable use and security policies and trained in how to maintain oversight on the on omg use of the services m..s.cope. � _„ AODocs AODocs does not mana a the authentification. The auth ntlficati'on is mane e , tay Google. .. . Virtru See'Virtru Security Policies and Procedures' Salesforce Salesforce Infrastructure Logs Salesforce internal infrastructure logs are collected by various monitoring tools for activities on the systems that host Salesforce, and include: Server access Network access Firewall management events Network intrusion detection systems traffic Cache Database File integrity ty Network device configuration Anti -virus detection Log events are correlated to generate alerts. Alerts are configured to notify the Technical Operations and Computer Security Incident Response Team (CSIRT) teams. Security alerts require acknowledgement and follow up, if appropriate by the CSIRT. Firewalls and IDS systems are configured with automated syslog notifications for key events. Logs are archived and are currently stored for a minimum of (1) one year. NOTE: These logs are not available to customers. Customer Auditing Capabilities Within Salesforce, the creator and last updater, as well as timestamps, are recorded for every record. Additionally, the Salesforce Platform and Salesforce Applications have a multitude of histor r tracking and auditing features that provide valuable information about the use of an c 72 carahsoft Agreement No. 7434 SOLICITATION # CH16012 .......................................... organization's applications and data, which in turn can be a critical tool in diagnosing potential or real security issues. Auditing features include: Record Modification Fields - All objects include fields to store the name of the user who created the record and who last modified the record. This provides some basic auditing information. Login History - You can review a list of successful and failed login attempts to your organization for the past six months within Salesforce. Field History Tracking - You can also enable auditing for individual fields, which will automatically track any changes in the values of selected fields. Although auditing is available for all custom objects, only some standard objects allow field -level auditing. Setup Audit Trail - Administrators can also view a Setup Audit Trail for the past six months within Salesforce, which logs when modifications are made to your organization's configuration. This trail can be downloaded into Excel or as a csv file. While the Login History and Setup Audit Trail are available for six months within Salesforce, audit trails can be downloaded and stored locally to meet longer audit log retention requirements. Detailed application logs can be used for forensics investigations by customers. These logs are stored for 12 months and are available for a fee. Event Monitoring (Additional License Option) In addition to Salesforce's core auditing capabilities, Salesforce also offers Event Monitoring as an additional license option. Your Agency can use event monitoring to discover how often and at what times your users are logging in to and out of your organization. This includes insight into what Salesforce applications are being adopted by users, who is logging in and from where, what pages users are viewing, what reports users are running and exporting and other aspects of application usage. This capability helps you discriminate between valid and invalid login requests and also track user login patterns for future reference. Not only can your Agency now better understand how your apps are being utilized, you can also monitor if users download large amounts of data that might put your agency at risk. In addition, your Agency can also determine if an employee is unnecessarily downloading sensitive customer/citizen information, pinpointing the exact time and location of that event. Event Monitoring is delivered as an API -first feature and there are Salesforce partners with visualization tools available. Use the SOAP API and REST API resources to retrieve event log files that contain information useful for assessing organizational usage trends and user behavior. Because event log files are accessed through the Force.com SOAP API and REST API, you can integrate log data with your own back -end storage and data marts so that you can correlate data from multiple organizations and across disparate systems easily. When using event monitoring, keep the following in mind: - In the unlikely case where no log files are generated for 24 hours, contact Salesforce. - Log data is read-only. You can't insert, update, or delete log data. - Use the EventType field to determine which files were generated for your organization - LogDate tracks usage activity for a 24-hour period, from 12:00 a.m. to 11:59 p.m. UTC time. - An event generates log data in real time. However, log files are generated the day after an event takes place, during nonpeak hours. Therefore, log file data is unavailable for at least one day after an event. - CreatedDate tracks when the Goo file was generated. carahsoft 73 _ carahsoft Agreement No. 7434 SOLICITATION # CH16012 - Log files, represented by the EventType field, are only generated if there is at least one event of that type for the day. If no events took place, the file won't be generated for that day - Log files are available based on CreatedDate for the last 30 days when organizations purchase User Event Monitoring or one day for Developer Edition organizations. Businesses desire certainty that their data is accurate, complete and reliable, enabling them to meet stringent industry regulations. With Field Audit Trail, customers can track changes at the field level for up to ten years and set different policies for each Salesforce object to ensure data is purged when no longer needed. Life sciences companies running clinical trials in Salesforce, for example, can now maintain a complete audit trail of patient data so they can safeguard the integrity of clinical trial results and comply with FDA regulations. - All event monitoring logs are exposed to the API through the EventLogFile object, however there is no access through the user interface. Event monitoring can be used with 28 different file types: Apex Callout, Apex Execution, Apex SOAP, Apex Trigger, API, Async Report, Bulk API, Change Set Operation, Content Distribution, Content Document Link, Content Transfer, Dashboard, Document Attachment Downloads, Login, Login As, Logout, MDAPI Operation, Multiblock Report, Package Install, Report, Report Export, REST API, Salesforcel, Adoption (UI Tracking), Sandbox, Sites, Time -Based Workflow, URI, Visualforce. Event Monitoring Transaction Security Transaction Security policies give your Agency a way to look through events in your organization and specify actions to take when certain combinations occur. A transaction security policy consists of events, notifications, and actions. Transaction Security monitors events according to the policies that your Agency sets up. When a policy is triggered, you can receive a notification and have an optional action taken. For example, suppose that you activate a policy to limit the number of concurrent sessions per user to three. A user with three login sessions tries to create a fourth session. Your Agency can require a user to end one of their existing sessions before proceeding with the new session. At the same time, you are notified that the olicy was triggered. ServiceNow The ServiceNow application writes detailed log information that is stored in tables within a customer's instance. As this is customer data in a customer's instance, ServiceNow does not attempt to monitor or view this data unless specifically requested by a customer. As a result the customer is responsible for monitoring the contents of these logs files. The log data is protected in the same manner as all other customer data. Event logs can also be configured to feed into a customer's environment via ServiceNow's Syslog probe allowing the logs to be stored within the customer's environment in a syslog repository or SIEM and retained according to the customer's requirements. ServiceNow's application logging includes verbose transaction logs, these logs are retained within the instance for 30 days. Event logs are stored for seven days and audit histories are retained indefinitely in the instance. Transaction logs represent every click, view, and system event that occurs in an instance and as a result, will grow very large, quickly. They provide a level of detail that is frequently used for troubleshooting issues with an instance. They can also provide detailed intelligence on the behaviors within an instance. These logs can be downloaded to customers' environments, if they need to be retained for longer than 30 days. The event logs on the other hand are less granular; they will include the creation of an incident, or deletion. of problem,or anV one of the 250 standard events. They may also contain customer carahsm _ 74 Agreement No. 7434 SOLICITATION # CH16012 created events. There are a number of security events as well, including successful login, failed login, security privilege escalation, and viewing of a table. These events can either be monitored manually, generate an Incident based on a parameter or when metric is reached; such as failed logins per minute. The final aspect of logging is the audit history. Audit history may be turned on for any particular table or field. The audit log table then maintains a record of who made changes when to a table or field and what they changed. _._._ _ _..................�. ...._ —.... QTS All account activities are logged including account creation, modification, disabling and termination. Logs are monitored and notifications are sent for abnormal activity. Splunk Enterprise is used as the centralized audit log monitoring tool to centrally collect, analyze and reduce the amount of audit logs. As referenced in IT_PRO_07_Audit_and_Accountability—Procedure (v1.0—1/20/14), on -site network and security operations monitoring coverage and audit management process; to include analysis, reporting, and alerting into a central repository provided by a highly available Splunk logging service. Splunk logging service supports QTS cloud information systems for organizational —wide situation awareness. Splunk provides built-in capabilities to filter, normalize, and correlate the large amounts of data produced by QTS cloud, and then allows QTS's support staff to use Splunk's built-in capabilities to data mine, log mine, and run pre -developed and ad -hoc reports against the result sets obtained during the data and log mining sessions. Logs are centrally correlated and reviewed from devices across QTS cloud Hosting Environment by QTS's Systems Engineer or designee. Specific report categories include: -Authentication and Authorization Reports • Systems and Data Change Reports -Network Activity Reports -Resource Access Reports •Malware Activity Reports -Failure and Critical Error Reports • Vulnerability Correlations Reports -Anti-Port Correlations Reports -Watch List Correlations R�_Orts VMware VMware IaaS Services In accordance with our ISO and SOC commitments, change -related activity, including administrative actions, performed on the management infrastructure layers supporting vCloud Air are monitored and logged to a centralized logging server for a minimum of 1 year. Infrastructure logging is in place for customer interactions with the vCloud Air management and administrative consoles. These logs are only for the management and administrative interfaces. These are not in place for monitoring of individual customer VMs installed within the customer tenant org. Limited logging and activity reporting are available from customer tenant environments, with more detailed reporting, auditing and logging capabilities introduced Q4-2014. VMware AirWatch To enable user accountability, we have full auditing capabilities on all environments in the AirWatch Cloud. Customers can use the built-in event log, customizable dashboards, integrated reporting engine and AirWatch Hub to audit the web console and end -user actions. For the SaaS environment logs, our Information Security Team helps ensure that systems generate audit records containing information that establishes what type of event occurred, when the event occurred, where the event occurred, the source of the event, the outcome of the event, and the identiid y individuals or sur ecis associated with the event. FireEye FireEye auditing and log review procedures are based on industry best practices and in accordance with rgul for , statutory„ contractual and business requirements. Detailed audit carahsoft 75 carahsoft Agreement No. 7434 SOLICITATION # CH16012 records (User ID, date, time, type of event, successful/unsuccessful attempts or access secured protect _ .„files and p _t the contents of audit trails against unauthorized access, modification or deletion. _n�_n VirtueStream Virtustream offers logging as a managed service to customers as optional solution. The types of services and devices are specified by the customer and a monthly report is delivered to the customer. 8.6.7 Offeror must describe whether it can restrict visibility of cloud hosted data and documents to specific users or groups. _._._ .......... ......... ........ CA APM Users of the Portal are divided into two types: Internal users (for publishers of the API) and External users (for developers). There are a number of pre -defined roles for both Internal and External users that inherit functionality in a hierarchical manner. Portal has RBAC built in that allows you to grant access to different functionality for different users. For example, you can assign a user to role that only allows them access to update content, or access ap_ps but not create them MAA CA utilizes IaaS vendor to host the service with strict access controls in place. CA SaaS InfoSec team manages users and their associations with groups within LDAP Directory and conducts periodic access reviews to conform to governance re uirements. CA Agile Our databases are shared but logically segregated. We ensure logical security of access to customer data by implementing access restrictions between subscriptions and roles within those subscriptions to assure adequate segregation of data. There is a plugin available in the unlimited edition that allows the administrator to limit access to the application based on IPaddress. _ ASM Only Public Status Page (PSP) data is stored in the cloud, and PSP web pages are accessible by anyone. PSP data is only sent to the cloud if the customer enables this feature, and they can decide which data is made public. Google If Google becomes aware of a Data Incident, Google will promptly notify Customer of the Data Incident, and take reasonable steps to minimize harm and secure Customer Data. Notification(s) of any Data Incident(s) will be delivered to the Notification Email Address provided by Customer in connection with the Agreement or, at Google's discretion, by direct communication (e.g., by phone call or an in -person meeting). Customer acknowledges that it is solely responsible for ensuring the contact information given for purposes of the Notification Email Address is current and valid, and for fulfilling any third party notification obligations. Customer agrees that "Data Incidents" do not include: (i) unsuccessful access attempts or similar events that do not compromise the security or privacy of Customer Data, including pings, port scans, denial of service attacks and other network attacks on firewalls or networked systems; or (ii) accidental loss or disclosure of Customer Data caused by Customer's use of the Services or Customer's loss of account authentication credentials. Google's obligation to report or respond to a Data Incident under this Section will not be construed as an acknowledgement by Google of any fault or liability with respect to the Data Incident. AODocs The AODocs-specific data stored in the Google App Engine Datastore relies on a built-in multi - tenancy feature named "namespace", which define virtual "silos" within the AODocs database. Each customer is assigned a specific namespace (which is in fact the customer's primary Google Apps domain name), and all the customer's data is stored within this namespace. Virtru Key material is encrypted prior to storage, and those keys are backed by HSM. Decryption occurs only for authenticated users Salesforce The multitenant architecture and secure logical controls address separation of customer data There are no dedicated servers used for individual customers. The Salesforce Services infrastructure is divided into a modular architecture based on "Instance". Each Instance is capable carahsoft 76 c r Agreement No. 7434 SOLICITATION # CH16012 of supporting several thousand customers in a s ecure and efficient manner. Services are grouped within each Instance; with app, search, and database elements contained. There are appropriate controls in place to ensure that any given customer's org (application) is not compromised. The service has been designed to accomplish this and is robustly tested on an ongoing basis by both Salesforce and its customers. Serviceww ServiceNow includes built in Role Based Access Control (RBAC) that is based on users, groups and roles. The entitlements granted to users are built from fine grained Access Control Lists (ACLs). ACLs can be built from individual entitlements that include read, write, create, execute and delete as well as a number of other individual attributes. The attributes that are available also vary, depending on the type of object being secured. Customers have full control of the entitlements granted to each of their users and integration with customer side directory service is possible through the use of users, groups and group memberships. SAP Ariba Within our solution, specific logging takes place that is viewable by the customer administrator or their designee. Audit logs produced through use of the solution are considered customer data and are maintained within the customer's instance of the database. These logs are retained so long as the customer has an active contract with us. As a user control consideration, customers are responsible for monitoring the proper entry of data to the solution and reviewing reports generated by the ..................... system. Fieldglass The Fieldglass Audit Trail tracks a date/time stamp for each user as they lo11 g in and out of the application. Likewise, Fieldglass tracks a date/time stamp and owner of every transaction that is created, submitted and approved through the application. Similarly, actions that occur within the reporting tool are also tracked, including when reports are created and run and by whom. The audit trail log is visible by the State of Utah program office. Audit trail re orts can be created with FiOdglass' ad hoc reportong Hanna SAP has Security Information and Event Management systems (SIEM) for analysis, reporting and alerting. All critical systems and infrastructure components within the SAP Cloud need to log relevant data, which is stored for a minimum of six (6) months. This is ensured via the security configuration compliance checks and event monitoring. General security monitoring is performed 247 for all activities. Resulting warnings and alerts are processed via ticketing system and critical events are handled according to the Incident Mana ement Process. Hybris Log management procedures are in -place for log review for firewall, applications, network devices, including file -integrity management. hybris utilizes technologies from leading security firms for Log Management and File Inte ri Management. SuccessFactors The application logs the following for every transaction: Event/transaction Time, Transaction ID, Event/transaction Type, Event/transaction Status (Result of the event; if failure, includes reason), Object Attributes (Describes the object affected by the event), Originator User ID (ID of the user who initiated the event or action), Subject ID, Process User ID, Account Number, Transaction Specific Elements. The application audits changes to the major components. Examples of this are goal auditing and document auditing.... The audit trail includes who made the _ rm carahsoFl 77 Agreement No. 7434 SOLICITATION # CH16012 change, the date of the change and the ability to see the data as it existed at that point in time. The data in the audit log can be viewed with appropriate permissions. We also provide an optional Audit Framework for additional audit logging capabilities. All audit logs within the application are accessible only by customers. Therefore, the review of application audit logs as well as retention periods for the application audit logs are the customer's responsibility, and can be determined as per requirements. To detect unauthorized information processing activities, systems are monitored and all information security events are recorded. Operator logs and fault logging are used to information system problems are identified. We comply with all relevant legal requirements applicable to its monitoring and logging activities. All system logs are created with "write -once" technology so that they cannot be altered or overwritten. All system logs are maintained for a minimum of 90 days on-line and a minimum of 13 months near -line. Inter host communications are secured by multiple layers of defense including segmented separate VLANS, restricted protocol sharing, multiple levels of stateful firewalls, HOST and NETWORK IDS/IPS and constant vigilant monitoring and testing. In addition, our Operations Team maintains detailed system logs. Our internal system logs successful and unsuccessful requests for access, and our team monitors all system logs for any errors or unusual activity. Activities are logged and reviewed by various mechanisms such as: RSA, SysLog, NIDS, HIDS, OSSIM and database logging. The system logs are not made available to customers but are used to monitor the health of the application and facilitate a high level of performance. Alerts are responded to immediately and logs are analyzed daily for any issues or anomalies. The system level logs are written to servers in the data center then copied to our operations team on an as needed basis. Various logging mechanisms are used to monitor database administration activities. Logging mechanisms include: syslog, alert log and database auditing for the privileged role SYSDBA. All activities are logged under the SYSDBA role which including: start-up and shutdown of the data base, configuration changes to init.ora and also any queries/data extraction. We would be able to identify dba activities by manual review of the logs and database auditing to detect if client data querying has occurred. All audit logs are created with "write -once" technology so that they cannot be altered or overwritten. Controls aim to protect against unauthorized changes and operational problems with the logging facility including: Alterations to the message types that are recorded. Log files being edited or deleted. Storage capacity of the log file media being exceeded, resulting in either the failure to record events or over -writing of past recorded events. VMware The vCloud Air Terms of Service and Data Privacy Addendum's establish the line of demarcation between the responsibility of VMware and the customer as it pertains to data protection. In addition, security whitepapers are made available to customers to further illustrate these points or to establish transparency regarding the separation of responsibility between VMware and the customer for compliance programs such as HIPAA or PCI. Subscribers are able to use a VPN connection at multiple layers to maintain data security. For traffic in motion, VPNs can be created for a particular application and also for an entire virtual data carahsoft 78 carahsoft Agreement No. 7434 SOLICITATION # CH16012 center. A site -to -site IPsec-VPN can also be established to securely tunnel the entire virtual data center back to the private data center. For data at rest"", subscribers are provided a role -based access control, whereby specified users are not exposed to the entire infrastructure and can be limited to a single or multiple virtual data centers. Further details of the controls in place to limit exposure of these groups to customer data is documented within the ATA 101 and SOC reports, available under NDA. vCloud Air has logically separated networks that restrict Tenant access to only their own private networks. The vCloud Hybrid Service has two offerings: The Dedicated Cloud option provides physically isolated and reserved compute resources from all other vCloud Hybrid Service tenants, as well as a private cloud instance. The Virtual Private Cloud option has a multitenant compute resource mode. Both services have logically isolated networking and storage that ensures secure resource separation. Customers have complete control over the file systems and databases they deploy within the service. Access is technologically enforced and employees are only authorized the level of access to information assets that is required to meet an approved business need or perform prescribed job responsibilities. • Administrative access is limited to only those users that explicitly require privileged access. Customers do not have direct access to the SaaS environment; rather, customers administer the solution via the Web console. FireEye Each of the FireEye offerings include strong access controls including role -based access. Only E� perl authorized individuals on a need to know basis are ranted access to data. VirtueStream Virtustream does not have access to customer hosted data. Customers control access to their application or system which sits upon the IaaS. Customer would need to create the user in their own Active Directory to allow access by named users of Virtustream for soecifc system, timing,notification 8 incident levels. should take into consideration that Purchasing � �� p event of a security incident, including relating to g Entities may have different notification requirements based on applicable laws and the categorization type of the data being processed or stored. CA APM CA Technologies documents a plan and associated procedures in c ase of an information security incident. The incident response plan clearly articulates the responsibilities of personnel and identifies relevant parties for notification. All security incidents will be investigated and triaged to understand where the vulnerability exists. Software vulnerabilities will be investigated by CA engineering teams; other vulnerabilities will be addressed by the SaaS Ops team in conjunction with AWS. Affected customers will be notified and given a remediation plan MAA Clients are notified via email of any security incident that resulted in a data breach for that client promptly and no later than 5 days. A root cause analysis is then sent within 30 days. Meeting can be setup pu on request. CA Agile We have a defined Incident Handling Guide which outlines the process and responsibilities during breach investigation. Clients are notified via email of any security incident that resulted in a data breach for that client promoptly and no later than 5 days. A root cause analysis is then sent within 30 days. Meeting can be seutp upon request. ASM Clients are notified via email of any security incident that resulted in a data breach for J_. . . . . ........... ..... that client promptly and no later than 5 days. A root cause analysis is then sent within 30 days, Meeting can be setup upon request.www Google Google's focus on security and protection of data is among our primary design criteria. Google data center physical securi featiures a la ered securi model, including safe wards like custom c _ro c t Agreement No. 7434 SOLICITATION # CH16012 designed electronic access cards, alarms, vehicle access barriers, perimeter fencing, metal detectors, and biometrics, and the data center floor features laser beam intrusion detection. Our data centers are monitored 24/7 by high -resolution interior and exterior cameras that can detect and track intruders. Access logs, activity records, and camera footage are available in case an incident occurs. Data centers are also routinely patrolled by experienced security guards who have undergone rigorous background checks and training. As you get closer to the data center floor, security measures also increase. Access to the data center floor is only possible via a security corridor which implements multifactor access control using security badges and biometrics. Only approved employees with specific roles may enter. Less than one percent of Googlers will ever step foot in one of our data centers. Google operates a global, multi -tenant environment running the world's second largest IP data network providing customers with a low latency, high performing platform that runs 247. Hard Disks are assets that are tracked throughout its lifecycle at Google from arrival to final destruction. These disks are component parts that Google uses to build its own servers from other component parts including motherboards and a harden, highly customized version of Linux. Google uses a proprietary storage and processing mechanism that isolates processing of data in chrooted jails within a physical server. Access permissions restrict the ability for processes to interact between jails. In addition, tenant data is striped in chunks across many different drives with each chunk having its own access control list. This helps ensure that data is logically isolated between customers in storage and during processing. In addition to the inherent processing and storage mechanisms described above, Google's security controls including least privilege rights, logging and auditing have been implemented consistent with FedRAMP re uirements AODocs Altirnao can use multiple notification channels to communicate incident up dates pdates to its customers the AODocs status page (https://status.aodocs.com) provide status updates on all the AODocs services the AODocs customer mailing list, which can be used to send emails to the technical contacts of all AODocs customers the AODocs support platform, i.e. ZenDesk, which can be used to communicate with specific customers who have opened tickets. Salesforce Incident Response If negotiated into a final contract, Salesforce can promptly notify the Customer in the event Salesforce becomes aware of an actual or reasonably suspected unauthorized disclosure of Customer Data. Notification may include phone contact by Salesforce support, email to customer's administrator and Security Contact (if submitted by customer), and public posting on trust. salesforce.com. Salesforce maintains an Incident Response Plan and has an established Security Incident Response Process. During a security incident, the process guides Salesforce personnel in management, communication, and resolution activities. Government customers can report security incidents related to their Salesforce products and offerings via security_gov@salesforce.com. Salesforce will respond in accordance with the incident response process described above. Our incident response plan/process was created in accordance with FedRAMP moderate control requirements which include incident response requirements derived from NIST SP 800-53, NIST SP 800-61 , and the FedRAMP Incident Communications Procedure. ServiceNow Unless notification is delayed by the actions or demands of a law enforcement agency, ServiceNow shall report to Customer the unauthorized acquisition, access, use, disclosure or destruction of Customer Data (a "Breach") promptly following determination by ServiceNow that a Breach occurred. The initial report shall be made to Customer security contacts designated in carahsoft $o _ f Agreement No. 7434 SOLICITATION # CH16012 ServiceNow's customer support portal. ServiceNow shall take reasonable measures to promptly mitigate the cause of the Breach and shall take reasonable corrective measures to prevent future Breaches. As information is collected or otherwise becomes available to ServiceNow and unless prohibited by law, ServiceNow shall provide information regarding the nature and consequences of the Breach that are reasonably requested to allow Customer to notify affected individuals, government agencies and/or credit bureaus. Customer is solely responsible for determining whether to notify impacted Data Subjects and for providing such notice, and for determining if regulatory bodies or enforcement commissions applicable to Customer or Customer Data need to be notified of a Breach. See the "Data Security Guide" contained within the "Subscription Service Guide" included with this information. _ QTS Security Incident lhandlin capability and is outlined Incident g p ty p ed in the following Incident Response related procedures and plans: -FED _PLN_01_Incident_Response_Plan (v1.2 — 4/09/14) -IT _PRO_29_QTS-FC_Incident_Response_Procedure (v1.0—1/17/14) .IT _ PRO _18_ISSO_IRT_Incident_Response_Guidelines_Procedure (v1.2—12/11/13) •OPS_PRO_77_OSC_New_Incident_Creation_Procedure (0.0-1/23/14) •OPS_PRO_62_Best _ Practices _for Incident —Handling —Procedure (v1.0—12/10/13) •OPS_PRO_72_BPG_OSC_Working_and_Resolving_Incidents_Procedure (v1.0—1/22/14) •OPS_PRO_84_BPG_OSC_Major Incident_ Management_ Procedure (v1.0—1/27/14) As outlined in QTS's IT_PRO_29_QTS-PROResponse_Procedure (0.0-1/17/14) and FED_PLN_01_Incident_Response_Plan (0.2 — 4/09114): -Preparation activities, to include: -Ensuring the security of systems, networks, and applications through periodic risk assessments of systems and applications to prevent incidents. -Increasing user awareness of policies and procedures regarding appropriate use of networks, systems, and applications. -Sharing applicable lessons learned from previous incidents (particularly those involving malicious code and violations of acceptable use policies) with users so they can see how their actions could affect the organization. -Training Federal Cloud System Administrators to maintain their networks, systems, and applications in accordance with the organization's security standards. -Detecting activities, to include: -As referenced in QTS's IT_PRO_29_QTS-FC_Incident Response_ Procedure (0.0-1/17/14), review and analysis of continuous monitoring tools and related log file(s). -3rd Party monitoring services (Alert Logic): help detect and alert on changes in certain resources (e.g., Web pages) or publicly accessible services, such as Web, Domain Name System (DNS) and FTP servers. -File Integrity Checking Software: help detect any changes to important files caused by incident -IDS are set up for scanning and detection. Detection is achieved either by log analysis, packet capture review or image acquisition and analysis. -Analysis Activities, to include: -QTS IR Team is activated and incident identification is performed -Continued and targeted review and analysis of continuous monitoring tools, related log file, and corresponding applications would be performed. -If an Incident Response Team is required then at least one member of IT Security along with one or more members of QTS's IT Operations organization responsible for the affected system, as well as any necessa re resentatives from Network SAP Ariba We can provide a general overview but our full documentation is confidential. All of our security processes and procedures are audited by a third party every six months for ISAE 3402 assurance. We also hold PCI DSS certification. The carahsoft 81 carahsoft __ Agreement No. 7434 SOLICITATION # CH16012 intent of the following is to describe in a broad manner the actions we take in regard to security incidents, their management, tracking and communications in regard to internal policies and procedures. We have an established security incident plan based on internally -developed policies and procedures where documented results of all security incidents occurring during the six month audit period are reviewed and evaluated against the Trust Services Principles of ISAE 3402 and the PCI DSS standards as appropriate. Upon notification of a security incident, a documentation trail is begun by the InfoSec department and an internal ticket is created as the record of reference. The lead security manger calls a meeting including all personnel required to contain and reduce risk and impact appropriate to the nature of the incident. Tasks are assigned with milestones to be met to validate and determine extent of the incident. Communication is made to the Privacy & Security Board to alert principal membership and foster internal cooperation and awareness. An appropriate communication channel to affected customer(s) is determined based on how we were notified of the incident, i.e. from a customer, from an internal report or from a third party report. Communication is made to affected customer(s) to include the nature of the incident, actions taken to contain the incident and potential effects of actions if any, in regard to sustained business process and availability of the system. Any workarounds or hot fixes necessaryin the solutions are communicated and scheduled reporting to the customer(s) is established with an identified single point of contact within our company. Based on the nature of the incident, if required, legal counsel present at initial risk & impact meeting, will assist in communicating with law enforcement contacts. The customer is kept informed of the milestones met and at scheduled intervals until the incident is fully contained and no further risk and impact perceived. All incidents are required to be internally managed by InfoSec to include tracking and review on a weekly basis and evaluation of the actions taken in regard to our security concept. All incident reports are presented to and reviewed by the Privacy & Security Board and are formally closed with discussion and evaluation to determine what actions can be taken to prevent similar incidents. Depending on the nature of the incident and impact to customer(s), security incidents are not formally closed by the board until all affected customers are made aware of the incident and appropriate measures to remediate the initial threat are formally communicated. Fieldglass Fieldglass' security team is responsible for managing security incidents and all communication is conducted via the respective account managers to ensure timeliness. The process is defined within the Incident Response Management Standard. Customers are notified of an incident within 48 hours. Hanna SAP will notify _W via defined communication channels within 36 hours of a confirmed data security breaches to the affected customers. The report will detail the following information: • Details relating to the security incident that has occurred, known at the time of notification. • IT infrastructure and/or application affected by the security incident. • Overview of the performed mitigation actions to restore the security, documented within the incident report form. • All further applicable requirements by country regulations "on obligation to noti "will be met. canahsoft 82 Agreement No. 7434 SOLICITATION # CH16012 .,_ _ Hybris Upon a breach that directly affects a customer's environment, hybris would notify the customer as quickly as reasonably possible. Furthermore, hybris follows its information security incident management policy as well as Visa's standard process for responding to a breach. The policy includes procedures such as disclosure of sensitive information, disclosure of system vulnerability, public release of vulnerability information, system vulnerability exploitation as well as incident reporting, contacting of law enforcement and forensic invest�qp ion. SuccessFactors We have a comprehensive and approved Incident Management Policy and process. Upon the occurrence of a security incident, initial communication is distributed to the appropriate individuals and an escalation process is followed. Upon becoming aware of the incident, measures are promptly taken by the team to resolve the situation. All affected customers should be informed within at most 36 hours of confirming a potential breach in the privacy of their data. Following incident resolution, follow-up is required to ensure that the incident has been resolved effectively and that the threat is no longer present. We are aligned with ISO 27k standards for event and incident management and have formal incident management policies and processes in place. These policies and procedures are tested in the ISO 27k and SOC 2 audits. VM w, a Are VMware laaS Services If VMware determines that there has been unauthorized access to, or use or disclosure of, Your Content, or other incident VMware will use commercially reasonable efforts to notify You, taking into account any applicable law, regulation, or governmental request. VMware will provide security incident response (e.g., detection, severity/threat classification, forensics, and resolution) pertaining to management infrastructure over which VMware has direct, administrative, and/or physical access and control, such as the vCloud Hybrid Service servers, storage, applications, and network devices. Documented escalation procedures and a ticketing system are in place to guide employees in identifying, reporting, and responding to system availability issues and related security incidents. This includes an incident response policy to determine severity of an incident and a breach notification process. All alerting and monitoring at the guest OSIVM level is the responsibility of the customer. In the event of a data breach customers will be notified by VMware vCloud Air Global Support Services via their preferred contact means. VMware will provide security incident response (e.g., detection, severity/threat classification, forensics, and resolution) pertaining to management infrastructure over which VMware has direct, administrative, and/or physical access and control, such as the vCloud Air service servers, storage, applications, and network devices. Notification timeframes are agreed upon between VMware and the customer in standard agreements and contracts. Incidents are handled on a case -by -case basis, but typically occur between 24-48 hours after a breach has been confirmed. VMware will provide security incident response (e.g., detection, severity/threat classification, forensics, and resolution) pertaining to management infrastructure over which VMware has direct, administrative, and/or physical access and control, such as the vCloud Air service servers, „ stora e, a lications, and network devices. _M __..._ _ _ ..... FireEye FireEye has a developed documented process for reporting client notification for regulatory, legal and contractual issues once a breach has been confirmed. VirtueStream Virtustream shall contact customers in accordance with Service Level Agreements (SLA) and contractual obligations. There are two primary Incident types; Security Incidents, where there is a possible breach in systems or data integrity, and Services, where there is in impacted or affected service. Although there is some overlap, generally any security -related incident should be classified as a Security carahsoft 83 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Incident and the response must be managed using the'Virtustream Information Security Procedure — Security Incident Response Plan'. The purpose of this security incident response plan is to provide general guidance to Virtustream staff- both technical and managerial — to enable quick and efficient recovery from security incidents; respond in a systematic manner to incidents and carry out all necessary steps to correctly handle an incident; prevent or minimize disruption of critical computing services; and minimize loss or theft of sensitive or mission critical information including sensitive credit card data. The plan is also a guide to sharing information with other stakeholder organizations who might be impacted by such security incidents such as the credit card associations and law enforcement. The Security Incident Response Plan (SIRP) provides guidance to prepare for, respond to, and recover from potential incidents. Policy statements surrounding the IR-Plan are provided to ensure continued upkeep and standardized use. The SIRP guidance at the procedural level defines the roles, responsibilities, communication methods and flows, contact information, types of potential incidents, and immediate actions that are to be taken upon an incident's identification, and elaborates with subsequent recovery steps. Virtustream's Incident Response Policy requires the implementation and testing of a generalized plan that adheres to the International Standards Organization 27002 guidance for incident management and response, but meets specific requirements for compliance such as PCI-DSS. The Plan covers the corporate environment associated with Virtustream's IT assets, the local IT resources and the IT resources at Virtustream's Data Center. It consists of a series of guidelines (Incident Response Guidelines or "IRG") that should generally be followed as appropriate for the circumstances as when a security incident occurs or as part of the ongoing maintenance of this plan. As the incident progresses and has more impact (i.e. severity level increases), the escalation process will be used to engage appropriate resources. Incidents should be handled at the lowest escalation level that is capable of responding to the incident with as few resources as possible in order to reduce the total impact, and to keep tight control. The Table below defines the escalation levels with the associated team involvement. 8.6.9 Offeror must describe and identify whether or not it has any security controls, both physical and virtual Zones of Control Architectures (ZOCA), used to isolate hosted servers. ..... ............ m....__. _..._._._. _._.._a...._ _.__.. CA APM AWS EC2 datacenters annually undergo SOC 3 audits. mm �ITIT MAA Physical access mechanisms (e.g., access cards, biometric devices, mantraps and portals) have been implemented and are administered by local operations staff to help ensure that only authorized individuals have the ability to access the data centers. Portals and mantraps have been installed as anti -tailgating measures in most of data center lobbies. Entry to and exit from the data centers is through either a portal or mantrap where present. In data centers without portals or mantraps, the security officer monitors the entrance to prevent tailgating. Where present, the portal/mantrap bypass doors are only used in the event an individual is unable to use the portal or mantrap in case of emergency. Examples include handicap, phobia, or other restrictions on a case -by -case basis. Tours and emergency data center security operations crews will be permittedo use the portal bypass door, when raecessa CA Agile Physical access mechanisms (e.g., access cards, biometric devices, mantraps and portals) have been implemented and are administered by local operations staff to help ensure that only authorized individuals have the ability to access the data centers. Portals and mantrap 9 9s have been installed as anti -tailgating measures in most of data center lobbies. Entry to and exit from the data centers is through either a portal or p centers without portals or mantra s, the security mantra where. resent. In data cente ........ carahsm 84 _ carahsoft Agreement No. 7434 SOLICITATION # CH16012 - ..... officertailgating. monitors the entrance to prevent tailgaWhere e. t....._.. WWhhere present, the portal/mantrap bypass doors are only used in the event an individual is unable to use the portal or mantrap in case of emergency. Examples include handicap, phobia, or other restrictions on a case -by -case basis. Tours and emergency data center security operations crews will be permitted to use the portal bypass door, when necessary. ASM Physical access mechanisms (e.g., access cards, biometric devices, mantraps and portals) have been implemented and are administered by local operations staff to help ensure that only authorized individuals have the ability to access the data centers. Portals and mantraps have been installed as anti -tailgating measures in most of data center lobbies. Entry to and exit from the data centers is through either a portal or mantrap where present. In data centers without portals or mantraps, the security officer monitors the entrance to prevent tailgating: Where present, the portal/mantrap bypass doors are only used in the event an individual is unable to use the portal or mantrap in case of emergency. Examples include handicap, phobia, or other restrictions on a case -by -case basis. Tours and emergency data center security operations crews will be permitted to use the portalbypass door„ when necessary, AODocs N/A because all our data is hosted on the Go Ie Cloud Platform infrastructure. ___.. _. _ .. �.._. . _............. Virtru We require 2 Factor and Private Keys to authenticate and Virtrual Private Clouds for purposes of Inter -machine communication _ Salesforce A customer's instance (org) of Salesforce is an aggregate of the raw data. The data model del is very complicated, normalized, and the rows are identified by base62 encoded keys (primary and foreign). Re-establishing data ownership and a business context for the data would be very difficult to do at the database level. In order to reassemble any given customer's application (org), someone would need access to our source code in order to reassemble the raw data in a manner that could be interpreted and understood, and would need the entire set of tapes or disks/arrays supporting a given Instance, as the data for any one customer is spread across several tapes/disks. Data center engineers with physical access to the servers do not have logical access to the production environment and administrators with logical access to the systems do not have h sical access to the data centers. ServiceNow.._. —_ ..._ . ServiceNow's architecture is built on a ServiceNow fully owned operated private cloud. This ............ private cloud hosts the ServiceNow platform and applications that are offered to its customers under a subscription service model. The ServiceNow private cloud operates out of colocation data centers that provide robust physical and environmental controls, with ServiceNow staff exclusively providing the logical management. Access to the private cloud where customer data is hosted is only granted to ServiceNow staff based on their roles and job requirements. ServiceNow does not outsource any function that would give a third party access to customer data. ServiceNow's private cloud is a highly standardized environment from the identically configured cages in the data centers through to the consistent logical infrastructure. This private cloud is home to just ServiceNow, limiting the private cloud's footprint to only those technologies required to support this service. This allows for highly restricted networking rule sets regarding ingress and egress requirements and facilitates the ability for hardened systems, only allowing for the small number of necessary services, protocols and ports to be enabled. A ServiceNow instance represents an isolated logical environment consisting of application nodes in the web application tier and a dedicated database. Each customer will receive at least two instances, a production High Availability (HA) instance and a sub -production instance without HA. Each instance is accessed via a unique Domain name in the form of'customername.service- now.com' (for a production instance) and'customername-dev.service- now. com' as a sub - production example. 85 _ carahsoft Agreement No. 7434 SOLICITATION # CH16012 ........... _...... .._....... _ _._.. ..... _� There is no comingling of any customer data between instances and there is no single shared multi -tenant databases, with data from multiple customers stored therein. QTS QTS cloud employs security controls as needed to protect the confidentiality and integrity of the information being transmitted by utilizing Cisco AnyConnect VPN Client with SSL (TLS and DTLS) and IPSec (Internet Key Exchange Version 2 [IKEv2]). DTLS provides an optimized connection for latency -sensitive traffic, such as Vol traffic or TCPbased application access, TLS (HTTP over TLS/SSL) ensures availability of network connectivity through locked down environments, including those using web proxy servers. IPSec/IKEv2 provides an optimized connection for latency -sensitive traffic when security policies require use of IPSec and complies with applicable federal laws, executive orders, directives, policies, regulations, standards, and guidance. The QTS Federal Cloud Infrastructure (QTS cloud) is divided into two separate, isolated firewalled environments, each having its own security boundaries, which are physically and logically separated. These are the QTS cloud Hypervisor Management Layer and the QTS cloud Service Delivery Layer. QTS cloud's Hypervisor Management Layer management is made available through dynamic FIPS 140-2 validated L2TP/IPSEC or SSL 3. O/TLS 1. 0 encrypted VPN tunnels, which are authenticated against the RSA SecurlD multi -factor authentication security appliances. Once fully authenticated, only a limited RDP session to the physical bastion host (which is also protected by the RSA SecurlD multi -factor authentication security appliances) via jump domains is allowed, which prevents the presentation of information systems management related functionality at an interface for general users. QTS cloud's Service Delivery Layer management is also made available through FIPS 140-2 validated L2TP/IPSEC or SSL 3.0/TLS 1.0 encrypted VPN tunnels, which are authenticated against the RSA SecurlD multi -factor authentication security appliances. Connection to the QTS cloud Service Delivery Layer is only available through dedicated site -to -site 140-2 validated L2TP/IPSEC or SSL 3. O/TLS 1. 0 encrypted VPN tunnels or Trusted Internet Connection (TIC) monitored dedicated datelines to federal customer datacenters, which prevents the presentation of information systems management related functionality at an interface for general users. QTS cloud's Hypervisor Management Layer management is made available through dynamic FIPS 140-2 validated L2TP/IPSEC or SSL 3. O/TLS 1. 0 encrypted VPN tunnels, which are authenticated a ainst the RSA SecurlD multi -factor authentication security a li�ances _IT� SAP Ariba The Cisco Secure ASA5555 Firewall is a dedicated firewall appliance that delivers strong security and performance and creates almost no network performance impact. The product enforces secure access between an internal network and Internet, extranet, or intranet links. Ariba uses Cisco Secure ASA5555 Firewall hardware and Cisco Router access lists to control the traffic to and from the Internet, between Ariba Corporate and the Ariba system, and between servers in Ariba. The firewall servers are configured for Fail-Over/Hot Standby Setup. Additionally, Ariba uses internally developed Ariba SafeGuard software to protect customer data from unauthorized Ariba Corporate users, allowing only Ariba Operations personnel access for limited periods of time. Specifically, firewall servers are used in each level of data communication within Ariba: Between the Internet and web servers Between the web servers and the application servers Between the application servers and the database servers 86 Agreement No. 7434 SOLICITATION # CH16012 These ASA5555 Firewall servers allow Ariba Operations to rigorously protect Ariba from unauthorized access, providing full firewall security protection. The Equinix Data Center utilizes an array of security equipment, techniques, and procedures to control, monitor, and record access to the facility, including customer cage areas. All areas of the center are monitored and recorded using CCTV, and all access points are controlled. The Data Center is staffed with 24-hour security officers. Visitors are screened upon entry to verify identity, and escorted to appropriate locations. Access history is recorded for audit ujposes, Fieldglass Please see the Fieldglass Security and Hosting Overview provided in the Su lemental Information section of this response,_� Hanna The fundamental security architecture of the SAP Cloud infrastructure is the principal of a private cloud. Customers receive an isolated, logical grouping of several virtual machines and physical systems in dedicated customer private networks. Customer private networks are segregated from each other using virtual local area networks (VLAN) technology. Customer systems are deployed in the respective customer private network. Though customers are only able to view or access systems within their assigned customer private network. Design of customer private networks has to be defined in a workshop between SAP and the customer. Multiple customer private networks might be required to separate different tier levels or to implement customer data flow restrictions. SAP HANA Enterprise Cloud administrative tasks will be done using management networks. Administrative access to the management networks from the SAP internal networks is only possible using dedicated jump hosts with strong authentication. Security of the SAP internal network including SAP end user equipment is ensured using solutions like network admission control, Intrusion Prevention Systems, network filtering, strong authentication for remote access, internet content filterin , anti -virus scanner. SuccessFactors We serve our customers and end users from secure data centers around the world. Physical security features at these facilities include a 24x7x365 manned security station and biometric and man -trap access controls. The systems at these facilities are protected by firewalls and encryption technology. Operational redundancy features include redundant power, on - site backup generators, and environmental controls and monitoring. We employ a wide range of security features, including two factor authentication, data encryption, encoded session identifications and passwords. Our hosting providers conduct regular security audits of our infrastructure. We also employ outside vendors for 24x7x365 managed network security and monitoring. Every page we serve is delivered encrypted to the end user via a Transport Layer Security or TLS. We also use encryption technology in our storage systems. We continuously monitor the performance of our cloud offerings using a variety of automated tools. The architecture is designed with built-in redundancy for key components. We load balance at each tier in the network infrastructure. We also des�_our application server clusters so that Agreement No. 7434 SOLICITATION # CH16012 servers can fail without interrupting the user experience, and our database servers are clustered for failover. We regularly back up customer data. We have implemented a multi -tiered architecture leveraging a strategy of "defense in depth" with 6 tiers of virtual networks (VLAN) for separation at each delivery layer. Network traffic is logged and monitored with live monitoring through an Intrusion Detection System (NIDS), and controlled through a series of switches and routers whereas data must pass through each tier in order to get to the next tier. In addition to Physical (site) security, the logical network stratification includes the following: Tier 1 (External VLAN/firewall) - The first tier consists of the external network and perimeter firewalls. These provide an initial layer of defense and protect the following layers from unauthorized access. Note that port 443 (HTTPS for web traffic) is the only port open. Tier 2 (Internal VLAN/firewall) - A de -militarized zone (DMZ) exists with load balancers. The DMZ provides a second line of defense while the load balancers are the first layer of scalability for the service delivery. The DMZ functions as a ""neutral zone"" between the network and the outside public network. Tier 3 (Web VLAN) - The Web tier presents the User Interface to the application, and separates the application, reporting and utility servers from the other tiers. Tier 4 (Application VLAN) - The Application tier contains the business logic and transaction servers, and is managed through clustered, high availability (HA) servers. Pre -configured as "Pods", additional servers can be added as needed to provide scalability and performance. Tier 5 (Database VLAN) - The database tier is protected by an additional set of perimeter firewalls. The database processing is executed on database servers leveraging a multi -tenant, fully qualified database schema. Tier 6 (Storage VLAN) - Data is persisted to disks with include a Storage Area Network (SAN). Prior to store, data is encrypted by way of data appliance with AES-256 bit encrry tip on, _ wwwwwwww_ VMware VMware IaaS Services At the tenant level firewall services are provided via the vCloud Networking & Security Edge Gateways for customers to configure and maintain. Firewall policies can be used to restrict and manage public/Internet-based traffic and create DMZ zones for multi -tier applications. Firewall policies can also be used to configure access policies between internal IP networks and VxLAN segments. Stateful inspection firewalling can be applied on the external interface of the vCNS Edge Gateway. VMware architects, provisions, monitors and manages the vCloud Hybrid Service infrastructure and surrounding components. As described in the AT 101 (ISO 27001) report, access points such as delivery and loading areas and other points where unauthorized persons may enter the premises are controlled and, if possible, isolated from information processing facilities to avoid unauthorized access. The details of this control are not disclosed publicly. VMware AirWatch We implement multiple security measures to protect hosted servers, including physical and logical controls. Due to FOIA requirements and the competitive EMM marketplace, we cannot provide s ecific architecture details at this time. 88 carahsoft Agreement No. 7434 SOLICITATION # CH16012 _ - � _..._ � .... ........ ......— ............... FireEye High-level architecture diagrams following industry best practices utilizing both virtual and physical controls are available and contained in the SOC 2 report. VirtueStream Virtustream utilized a virtual local area network (VLAN) and virtual route forwarding (VRF) to logically segregate all customers in the IaaS environment. Every customer chooses their own IP Address range, as there is no ability to overlap IP Addresses between customers. In addition, every customer is logically separated with Firewall Context with their own rule, where by default evervthinq is denied except specific rule. 8.6.10 Provide Security Technical Reference Architectures that support Infrastructure as a Service (IaaS)„ Software as a Service (SaaS) & Platform as a Service (PaaS). MAA m OnlySaaS As_provdded network d��graam can be_ rovided upon si nin NDA A APM Only SaaS is provided, network g can be provided upon signin Ng �A CAA ile These can be provided when a NDA is in place. Salesforce Salesforce offers g et leading SaaS solutions. Salesforcen Ng n ASM Onl SaaS is rgvided„ network dia ram can be rovrded upon si na market leading PaaS and mark does not provide IaaS as a direct service offering to our customers, it is an underlying part of our PaaS and SaaS offerings. The Salesforce Platform is built for cloud computing, with multitenancy inherent in its design. To meet the high demands of its large user population, Force.com's foundation is a metadata-driven software architecture that enables multi -tenant applications. Force.com combines several different persistence technologies, including a custom -designed relational database schema, which are innately designed for clouds and multitenancy—no virtualization required. Force.com's core technology uses a runtime engine that materializes all application data from metadata—data about the data itself. In Force.com's well-defined metadata-driven architecture, there is a clear separation of the compiled runtime database engine (kernel), tenant data, and the metadata that describes each application. These distinct boundaries make it possible to independently update the system kernel and tenant -specific applications and schemas, with virtually no risk of one affecting the others. Every logical database object that Force.com exposes is internally managed using metadata. Objects, (tables in traditional relational database parlance), fields, stored procedures, and database triggers are all abstract constructs that exist merely as metadata in Force.com's Universal Data Dictionary (UDD). For example, when you define a new application object or write some procedural code, Force.com does not create an actual table in a database or compile any code. Instead, Force.com simply stores metadata that the system's engine can use to generate the virtual application components at runtime. When you need to modify or customize something about the application schema, like modify an existing field in an object, all that's required is a simple non - blocking update to the corresponding metadata. Because metadata is a key ingredient of Force.com applications, the system's runtime engine must optimize access to metadata; otherwise, frequent metadata access would prevent the service from scaling. With this potential bottleneck in mind, Force.com uses massive and sophisticated metadata caches to maintain the most recently used metadata in memory, avoid performance -sapping disk 1/0 and code recompilations, and improve application response times. carahsoft 89 carahsoft Agreement No. 7434 SOLICITATION # CH16012 The multitenant architecture and secure logical controls address separation of Customer Data. The Salesforce infrastructure is divided into a modular architecture based on "instances". Each instance is capable of supporting several thousand customers in a secure and efficient manner. Salesforce uses the instance architecture to continue to scale and meet the demands of our customers. There are appropriate controls in place designed to prevent any given customers Salesforce instance from being compromised. This functionality has been designed and undergoes robust testing through an _ on -doing process by both Salesforce and its customers. QTS The QTS cloud makes use of unique managed s _. ervice provider architecture layer(s). Information systems, particularly those based on cloud architecture models, are made up of different service layers. The layers of the QTS cloud that are defined in its System Security Plan, and are not leveraged by any other Provisional Authorizations, are: Infrastructure as a Service (laaS). Note: Please refer to NIST SP 800 145 for information on cloud com otin [qk Jtecture models. w SAP Ariba Ariba recognizes that security is a critical component of effective electronic commerce architecture and takes necessary security measures to protect any information passed between buyers and suppliers. Ariba implements security using a variety of hardware, software, and procedural best practices. Full details about our security mechanisms and procedures are available in Chapter 3 of the Ariba Cloud Technical Infrastructure White a ems_ Hanna N/A, HANA Enterprise Cloud is a private managed cloud . ....Suc.. .......- _. essFactors We understand the critical importance of information protection and recognize the contribution that information security makes to an organization's strategic initiatives and overall risk management. We have implemented security controls and practices designed to protect the confidentiality, integrity, and availability of customer information. We continually work to strengthen and improve those security controls and practices as well. The current best practices associated with information security involve a layered approach, what the industry calls "defense in depth." Regardless of the software delivery model, security cannot be implemented at a single "make or break" point. For a SaaS provider to facilitate data security for sensitive information, it must have a comprehensive, multifaceted security program in place. We take a holistic approach to information security, implementing a multilayered defense at all the touch points in the information flow —both the physical and logical, applied across the database, middleware, application, and network and communication layers —to offer complete data privacy, transparency, and audit controls ...__ ... ........... __.... VMware Compliance Reference Architecture Framework (RAF) that provides a consistent method for VMware, its partners, and customers to assess and evaluate the impact of regulations on virtual and cloud environments. The intent of the RAF is to provide a single framework for VMware, its partners, and organizations to address a variety of compliance requirements across an IT infrastructure. This includes: Product Applicability Guide (PAG), Architecture Design Guide (ADG), and a Validated y� g — (_R _. industry P ............ .._._. �. Reference Architecture VRA . FireE a Hi h-level architecture diagrams followingindust best practices utilizingboth virtual and physical controls are available and contained in the SOC 2 Type 2 report. ... VirtueStream Virtustream Cloud Platform Security (for the Infrastructure -as -a -Service environment) is designed, built, and operated to provide highest level of infrastructure security available. Proposed State of I tah Seouri Arch teoture 90 Agreement No. 7434 SOLICITATION # CH16012 ......._.. Figure 1. xStream Enterprise Architecture Internet Front End Penmeter wV U E ��. m a DMZ Client A Client B Network Network Landing Zone o� E: IL Core Portal Separate intrusion Detection Firewall Platform State of Utah end users would access the hosted SAP environments via a MPLS connection (Provided by State of Utah). Additionally a VPN connection has been sized at 100Mbps however this can be decreased or increased depending on the exact requirements. State of Utah end users accessing our enterprise platform would first hit the landing zone in a dedicated virtual local area network (VLAN) and dedicated virtual route forwarding (VRF). The next hop into the enterprise platform is a dedicated firewall (FW) context on a Cisco Firewall services module. After traversing the core, traffic hits another dedicated VRF and drops into the platform network and compute (CPU and Memory essentially a blade server) layer. All traffic is VLAN separated. At each compute host, a hypervisor based firewall and intrusion protection system (IPS) provides a dedicated client rule set to further ensure network security. All traffic transitioning from one zone to another are monitored by Intrusion Detection and Intrusion Prevention systems. Traffic coming in via the internet hits the front-end perimeter with load balancing modules and multi - context Cisco firewalls. All traffic then passes through intrusion detection system and intrusion protection systems. As in the enterprise compute layer, every host in our demilitarized zone (DMZ) has a hypervisor-based firewall and IPS with dedicated client rule sets. Again, all traffic is VLAN separated as well. Traffic that needs to traverse from DMZ to the enterprise runs through another dedicated FW context and IDS/IPS. All of the State of Utah environments and data will be hosted in Virtustream's data centers within the continental United States. Standard Services used in Virtustream's management environment and in all client environments uncludinqi the following: 91 Agreement No. 7434 SOLICITATION # CH16012 • All Virtustream employees use Mandatory Strong 2 factor authentication (2FA OTP) Administrative Access to all systems. • Dedicated VLAN network segmentation and dedicated Virtual Route Forwarding (VRF) are used extensively to segregate environments and zones. • Perimeter Firewalls are used to segment internal and external environments as well as segregate security zones. Configuration, monitoring, auditing and logging are included. • Virtual Machine -based Firewall and Intrusion Prevention System (IDS) is installed on every virtual machine in the environment and is protected with Juniper's Security Gateway virtual firewall application and monitored service. Security Services that are standard components for Virtustream's management environment and are Optional Services for client environments including the following: • Managed Two -Factor Authentication ("2FA") is in use for all application systems. • Intel TxT Enabled Servers and Trusted Boot/Bios monitoring with Attestation Server and OS and VM support, including Geolocation and Geofencing according to NIST 7904 guidelines. • Secure operating system (OS) builds based on DoD Secure Technology Implementation Guide (STIG) guidelines are used to build Virtustream's Management and Administration Servers. • Server/File Integrity Monitoring (FIM) is installed in the PCI and VFC clouds. • Patching Regimen: Virtustream patches host servers, network devices, security devices, servers and related services in the Management Network on a specified routine (monthly or quarterly, depending on release schedules), or when there is a CERT or other authorized source of patch that requires immediate attention. Based on urgency and risk of the issue we will schedule the patch as appropriate and use change control. • Scanning regimen: vulnerability scanning is done on a monthly basis with additional 3rd party vulnerability scans done monthly. Additional scans are done when made aware of new vulnerabilities. Issues are classified and addressed according to Risk Classifications and are addressed with ITIL v3 change control processes. • Managed IDS signatures are routinely updated and the logs are monitored. • Anti -Virus is managed on all Management servers in Enterprise, PCI and, VFC clouds. • Logging Service of all servers, network devices, and security devices to a centralized log server system. • Governance Risk Compliance: We use a complete Enterprise Risk Management toolset to manage compliance reporting and continuous monitoring to all of our supported compliance frameworks. Virtustream's facility monitoring systems are complete as per specifications in NIST 800-53r3/4. We use site assessment methodologies and checklists as detailed in NIST 800-42.Our systems and facilities are monitored 24/7 for any exceptions or trends. Our tools, processes and CONUS (Continental USA) personnel monitor network, power, cooling, humidity, water leakage, fire suppression, power systems (utility power, UPS systems and generators) and site access. Virtustream's Physical Access Control Security is designed to protect the confidentiality, integrity, and availability ("CIA") of the cloud platform system and its data with the following security components: • Limited and controlled room access. • Logged and monitored access of all access control events. • Video surveillance and review of all access control events. • Biometric access control required to gain access to the Data Center. • US Data Center staff is limited only to US Citizens. rd camhswt 92 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Locked racks and -room swith key log out/in process. • Data destruction policies and procedures. • Asset in/out policy and procedures. Physical access by authorized staff is controlled by badge systems and biometric access systems. All access of any kind is recorded and logged. Access lists are reviewed every 90 days. Employees that do not have a reason to have physical access are removed from our access management systems. Multiple high resolution and IR enhanced CCTV Cameras monitor our datacenters at all egress and ingress points as well as other sensitive areas. Security video footage is stored in a secure area for 90 days. Approved Visitor Access requires VISITOR Badges and bright lanyards that are specifically different from employee badges. Visitors are required to produce and surrender a state or government issued photo ID during the visit, have a pre -approved reason for the visit, and have the escort witness the sign in and out procedure. Visitors are escorted continuously through approved areas of the facility. Visitors are not allowed access to following areas of the data center under any circumstances: • Cloud hosting areas. • Networking and telecommunication areas. • Guard areas. • Power vaults. 8.6.11 Describe security procedures (background checks, foot printing logging„ etc.) which are in place regarding Offeror's employees who have access to sensitive data,. ire ye Background verification for employment candidates is a mandatory component of FireEye's hiring process. All personnel are required to sign a confidentiality and non -disclosure agreement agreeing not to disclose proprietary or confidential information including client information to unauthorized parties. Security awareness training program is in place to maintain the skill level of personnel regarding security and privacy expectations and best practices. All FireEye personnel at all levels are trained and notified of information secu_ rind privacy reauements and personneV res onsibilities. VirtueStream Virtustream employees who are assigned to IaaS must pass a Virtustream background investigation. In addition, Virtustream employees assigned to the IaaS must adhere to any requirement by customers to pass federal, state, or local background investigations if they are to provide managed services to the customer zone which includes access to sensitive data. 8.6.12 Describe the security measures and standards (Le, NIST) which the Offeror has in place to secure the confidentiality of data at rest and in transit. CA At C_AT echnologies, we c IT __ _ .._.. omply with a multifaceted security standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures. We ensure the maintenance of vulnerability management programs, implement strong access control measures, regularly monitor and test networks and adhere to the highest industry compliance and security policies. CA offers a variety of SaaS solutions, details for each offrin has been provided in Exhibit 1 and 2 of thisg+roposal. ........ ...... Google All connections from customer end point devices to Google's Front End Servers are encrypted with enforced HTTPS sessions using Forward Secrecy. Google websites and properties use robust public key technologies: 2048-bit RSA or P-256 ECDSA SSL certificates issued by a trusted authority (currently the Google Internet Authority G2). carahsoft 93 carahsoft Agreement No. 7434 SOLICITATION # CH16012 All data in transit between Google's Data Centers traverses across Google's private fiber network using a customized, proprietary encryption technology. Google hard drives leverage technologies like FIDE (full disk encryption) and drive locking, to protect data at rest. These methods of encryption are fully managed by Google and Google's Key Management Servers based on 128-bit or stronger Advanced Encryption Standard (AES). Encryption Keys and Ciphers Supported by Google Protocols TLS 1.2 TLS 1.1 TLS 1.0 SSL 3.04 QUIC Cipher suites ECDHE RSA with AES ECDHE RSA with 3DES ECDHE—ECDSA RSA with AES RSA with 3DES Signing keys RSA 2048 ECDSA P-256 Hash functions SHA384 SHA256 SHA1 MD5 Salesforce Government Cloud Encryption Capabilities: As part of the Salesforce Government Cloud, Salesforce is capable of responding to FIPS 140-2 cryptographic implementations for data being transferred between the State's web browser and Salesforce. Data that resides within Salesforce's protected boundary does not use FIPS 140-2 validated encryption as compensating/mitigating controls are in place to protect data. Additional information is provided below. Data In Motion: Salesforce employs cryptographic mechanisms to protect information during transmission. All transmissions between the user and Salesforce are encrypted by default with a 2048- bit Public Key. Our service uses International/Global Step Up certificates. We support one- way TLS, in which customers create secure connections before sharing private data. Secure routing and traffic flow policies ensure that customer traffic is encrypted entering Salesforce until the load balancer decrypts the traffic. The load balancers decrypting the traffic are FIPS 140-2 compliant and are located inside of the Salesforce Government Cloud isolation boundary. Data At Rest: NIST SP 800-53 Rev. 4 states in SC-28, "Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an organizational information system ' SC-28 also states„ ""Or onizations may choose to employ different 94 r_ Agreement No. 7434 SOLICITATION # CH16012 ......... ..... _.. mechanisms to achieve confidentiality and integrity protections, as appropriate." All secondary storage media (hard drives, disk drives, and tapes) containing customer data are maintained within Salesforce's secure production data centers until the media has been sanitized and destroyed. Salesforce relies on physical access controls as a compensating control to protect the data. For primary data storage, Salesforce provides customers with a built-in capability to apply field - level encryption, using 128-bit keys with AES encryption, for a selection of custom fields included in the Force.com Platform and Salesforce Services. Field -level encryption ensures the data associated with des, l Hated fields is encrypted in storage. SAP Ariba Sensitive data elements, including PCI Primary Account Numbers and system account parameters for internal application communications, are stored in Ariba databases encrypted by the AES (Advanced Encryption Standard) and Triple DES (Data Encryption Standard) encryption algorithms with a minimum key length of 128 bits. Encryption technology is also applied for the client connection to the Web site and to the hosted application passwords in storage. Customer user passwords are one way hashed using SHA256 and salted with random data. Limited Ariba Operations personnel have data query -... access and monitoring r�hts for the Ariba Hosting program. Field lass IT Hanna SAP provides for enterprise -grade and industry -standard security. SAP HANA Enterprise Cloud datacenters are enterprise -class security with enterprise - class protection including data encryption, network encryption, firewalling, network isolation, and intrusion detection. HANA data is protected in multiple different ways. SAP HANA Enterprise Cloud is a managedcloud service that employs either a VPN or MPLS connection for transit. By default VPN is encrypted and MPLS can be encrypted. The customer procures the method of connection. At installation, HANA data can be encrypted using a feature called Data Volume Encryption. This encryption protects data in the persistence layer. Storage volume access is restricted to the customer account that created the volume, thus denying all other customer accounts the permission to view or access the volume that includes data isolation, masking, zoning and Logical Unit (LUN) binding,. Strict user and access management, authorization management according to the need -to -know principle for administrative accounts, and security logging and security monitoring for critical activities or ..._ access also rotegt data stored in HANA. Hybris The Hybris platform uses SSL (https) for both the web application tier (browsers and WebService APIs) as well as communicating with back office systems. Data at rest is something that has to be taken into consideration in the application requirements by the partner/customer or PS teams. If encryption is required the application teams need to work on implementing the methods to encrypt and secure the data, for example encrypting data fields in the e. databas _....� _. _ .... ..... SuccessFactors Each customer's data is maintained in a separate database schema eliminating data segmentation breaches. Each schema has separate authentication credentials and assigned resource profile to restrict access rights and resource consumption. Encryption for data at rest uses the AES256 cipher. All application access is encrypted -in -transit over HTTPS with 128-bit TLS encryption, 95 carahsoft Agreement No. 7434 SOLICITATION # CH16012 FireEye At rest: Data are collected using automated batch and re ' g al -time processes and by manual personnel -driven actions via an Analyst facing Portal. Any information that is collected may be stored temporarily within appliances attached to our customers' networks and may subsequently be transmitted back to one or more FireEye datacenters. Data transmitted from a customer's network to a datacenter travels over a strong encryption Virtual Private Network ("VPN") established by the appliances. At transit: FireEye's network sensors are configured to collect full packet capture of customer network streams, including those originating from or destined to potentially malicious IP addresses, matching signature -based network indicators of compromise, results of domain name lookups, and full e-mail messages including headers, content and attachments. This information is primarily stored on -site on the appliances and only meta data matching FireEye / Mandiant indicators of compromise are sent to FaaS. VirtueStream Virtustream's use of Intel® Trusted Execution Technology (Intel® TXT), a hardware -root of trust security feature, and Intel® AES-NI encryption acceleration helps secure and protect virtualized environments against malware and provides more of the critical infrastructure and data protection assurances needed to enable trusted multi -tenancy in the cloud. Virtustream offers solution for data -at -rest and data -in -transit encryption solution for our customers as optional service, as most of our customer environment is only accessible via private network and only to the internal users of the customer. Solutions available to our customer as follows. 1. IPSEC VPN Tunnel for data -in -transit and 2. VM level encryption for files and databases 3. Encrypted Backup (all backups are encrypted by default) The technologies of encryption available throughout the entire data Iifecycle and all are FIPS 140- 2 compliant. a) DB and File System Encryption b) Encrypts file system and volume data transparently to: i) Applications ii) Databases iii) Storage Infrastructure c) Integrated Key Management d) High Efficiency Encryption i) Centralized Key Management ii) Policy Management iii) Detailed Auditing iv) Highly Available v) FIPS 140-2 Certified Hardware Appliance vi) Very Low Encryption Penalty due to Intel AES-NI enabled chip sets used e) Encryption of Virtual Machine, OS and App i) Integration of SafeNET Protect-V ii) Logging of all image access f) Encryption in Archive g) Implements Encryption, Access Control, Auditing on Host (LUW) h) Kernel Level Driver — Win i) File System — Unix/Linux j) Support for file systems and raw partitions k) Highly efficient block encryption 8.6.13 Describe policies and procedures regarding notification to both the State and the Cardholders of a data breach, as defined in this RFP, and the mitigation of such a breach. 96 Agreement No. 7434 SOLICITATION # CH16012 _. ....... __ ..... ......... CA CA Technologies abides to contractual requirements for notification, in addition to working with legal to ensure compliance with regulatory requirements. There may be cases where incident analysis completion is a requirement for confirming the breach, and / or its impact and data leakage boundary. Prior to completion of this activity, CA may not have the needed conclusions for customer communication. Once subscriber data has been identified as part of the investigation, said subscribers will be notified as soon as possible and not longer than 5 days. A report of the incident will be available and distributed to clients within 30 days. Please note that none of the offerings proposed as considered payment products and are not intended for use of storage of cardholder data. . Google Google will take and implement appropriate technical and organizational measures to protect Customer Data against accidental or unlawful destruction or accidental loss or alteration or unauthorized disclosure or access or other unauthorized processing. If Google becomes aware of a Data Incident, Google will promptly notify Customer as permitted by law of the Data Incident, and take reasonable steps to minimize harm and secure Customer Data. Notification(s) of any Data Incident(s) will be delivered to the Notification Email Address provided by the Purchasing Entity in connection with the Agreement or, at Google's discretion, by direct communication (e.g., bjRhone call or an in -person meeting). Salesforce Salesforce will promptly notify the State (within 48 hours, reflected in a negotiated agreement between the parties) in the event Salesforce becomes aware of an actual or reasonably suspected unauthorized disclosure of Customer Data. Notification may include phone contact by Salesforce support, email to the State's administrator and Security Contact (if contact is submitted by State and contact information is kept up to date), and public posting on trust.salesforce.com. ..._ _. SAP Ariba Ariba has developed a computer security incident response team. Following policies and procedures, this team responds to suspected security incidents to mitigate risks and damage. The team conducts response and forensic analysis of systems and network traffic. This information can be used to assist with rosecution if a secure breach is detected and the offender cau hg t. ._ Field lass SAP Field lass' security team is responsible onsible for managing ..... 9 9 � Y P g g security incidents and all communication is conducted via the respective account managers to ensure timeliness. The process is defined within the Incident Response Management Standard. Customers are notified of an incident within 48 hours. Hanna SAP will notify via defined communica tion channels within 36 hours of a confirmed data security breaches to the affected customers. The report will detail the following information: • Details relating to the security incident that has occurred, known at the time of notification. • IT infrastructure and/or application affected by the security incident. • Overview of the performed mitigation actions to restore the security, documented within the incident report form. • All further applicable requirements by country regulations "on obligation to notif will be met. Hybris Since we do not allow for CC data to be transmitted, stored or processed in our environment, we regularly scan the customer environment in case this is done without our consent. However, we do have a CSIRP in place, in which we would notify the customer and our internal Forensics team in the event that a customer environment should be breached. SuccessFactors Upon the occurrence of a data breach, initial communication is distributed to the appropriate individuals and an escaGstion process is followed. Upon Irm carahswl 9: Agreement No. 7434 SOLICITATION # CH16012 becoming aware of the incident, measures are promptly taken by the team to resolve the situation. All affected customers should be informed within at most 36 hours of confirming a potential breach in the privacy of their data. Following incident resolution, follow-up is required to ensure that the incident has been resolved effectively and that the threat is no longer present. We are aligned with ISO 27k standards for event and incident management and have formal incident management policies and processes in place. These policies and procedures are tested in the ISO 27k and SOC 2 audits. FireEye FireEye has a documented policy for incident management that has been approved by management and communicated to appropriate constituents and owners. It is continuously maintain and reviewed annually. The plan has a reporting structure and escalation path. An incident response team with defined roles and response related qualifications are available 24x7x365. The team maintains chain of custody for evidence during the incident investigation. There is a process for reporting client notification for regulatory, legal and contractual issues after a breach if a breach were to be confirmed. If a confirmed breach were to occur a management team would review all the factors and develop a remedation Ian to mitigate. VirtueStream There are two primary Incident types; Security Incidents, where there is a possible breach in systems or data integrity, and Services, where there is in impacted or affected service. Although there is some overlap, generally any security -related incident should be classified as a Security Incident and the response must be managed using the Virtustream Information Security Procedure — Security Incident Response Plan'. The purpose of this security incident response plan is to provide general guidance to Virtustream staff- both technical and managerial — to enable quick and efficient recovery from security incidents; respond in a systematic manner to incidents and carry out all necessary steps to correctly handle an incident; prevent or minimize disruption of critical computing services; and minimize loss or theft of sensitive or mission critical information including sensitive credit card data. The plan is also a guide to sharing information with other stakeholder organizations who might be impacted by such security incidents such as the credit card associations and law enforcement. The Security Incident Response Plan (SIRP) provides guidance to prepare for, respond to, and recover from potential incidents. Policy statements surrounding the IR-Plan are provided to ensure continued upkeep and standardized use. The SIRP guidance at the procedural level defines the roles, responsibilities, communication methods and flows, contact information, types of potential incidents, and immediate actions that are to be taken upon an incident's identification, and elaborates with subsequent recovery steps. Virtustream's Incident Response Policy requires the implementation and testing of a generalized plan that adheres to the International Standards Organization 27002 guidance for incident management and response, but meets specific requirements for compliance such as PCI-DSS. The Plan covers the corporate environment associated with Virtustream's IT assets, the local IT resources and the IT resources at Virtustream's Data Center. It consists of a series of guidelines (Incident Response Guidelines or "IRG") that should generally be followed as appropriate for the circumstances as when a security incident occurs or as part of the ongoing maintenance of this plan. As the incident progresses and has more impact (i.e. severity level increases), the escalation process will be used to engage appropriate resources. Incidents should be handled at the lowest escalation level that is capable of responding to the incident with as few resources as possible in order to reduce the total impact, and to keep tight control. The Table below defines the escalation levels with the associated team involvement. ..IIIMVIII 98 Agreement No. 7434 SOLICITATION # CH16012 8,7.1 Offeror describe how it PurchasingEntitysafely dep ovis on ng tbefore theOfferi the end of activities of closing downaa service to a sing Ent ty s no longer contractual) obligated to maintain the service, include planned and unplanned activities. An Offeror's response should include detail on how an Offeror maintains security of the data during this phase of an SLA, if the Offeror provides for redundancy during migration„ and how portable the data is during migration, i ne ena or nre activities Tor eacn rurcnasing tntlty will vary based on the type of service they are currently using and the service that they will be moving too. All Purchasing Entities will be notified in advance of any end of life service so that the Purchasing Entity can work with Carahsoft and the service providers to develop a plan exporting and transitioning data. 8.7.2 Offeror must describe how it intends to provide an orderly return of data back to the Purchasing Entity„ include any description in your SLA that describes the return of data to a customer. At all times during the course of the Service, the Purchasing Entities will have access and ownership of their data. The Purchasing Entity is free to download or access the data through a variety of means based on the service at any time during their service period. r r. 8 81 Describe how you would respond to the following situations; include any contingency plan or policy, a. Extended downtime. CA APM If unable to resolve in a timely manner, all customers will ben ....... otified via email to the _registered_Legistered admin MAA Customers a... . _ _ . ........ _...._w�. ._._. Are kept abreast with progress during incidents, including outages. CA utilizes best -of -breed notification system which enables customer contacts to self - subscribe to different types of notifications that they would be interested in. A DR plan __. has been created should the extended down time result in DR declaration. CA Agile We would failover to our warm data center in order to restore access to the application _as quickly as possible. This is done accordina to our Disaster RecoveryPlan If ASM unable to resolve in a timely manner, all customers will be notified via email to the registered admin. Failover from the primary to DR site may be utilized if the extended amount of time warrants declaration of DR. ..... _...._ ........ _..._......... Google Due the redundant nature of the Google infrastruture there is no expectation of any extended downtime. If a data center in use by any of your end users suffers a catatrophic failure, Google's d namic health monitoring would 'ust reroute the session to a different data center. AODocs All the AODocs data is hosted on the Google Cloud Platform infrastructure. AODocs does not manage any physical infrastructure. Due the redundant nature of the Google infrastruture there is no expectation of any extended downtime. If a data center in use by any of your end users suffers a catatrophic failure, Google's dynamic health monitoring would just reroute the session to a different data center._ Virtru Notifyusers that Virtru service is unavailable, and recommend that their o _.. n they use their offline encryption tools and backups to perform emergenc functions. Salesforce Salesforce has maintained high levels of availability across all Salesforce instances since inception. As the only on -demand vendor to provide daily service -quality data on a public Web site (http://trust.salesforce.com), Salesforce proves that we are the leader in availability. And by making its track record completely transparent, Salesforce proves we are worthy of our customers' trust. To ensure maximum a time and continuous availabili ,.Salesforce provides the best 99 carahsoft Agreement No. 7434 SOLICITATION # CH16012 p facilities protection available, along with _ . _. ^ redundant data protection and most advanced fa '�' ' ' h a complete data recovery plan —all without affecting performance. Salesforce uses commercially reasonable efforts to make its on -demand services available to its customers 24/7, except for planned downtime, for which Salesforce gives customers prior notice, and force majeure events. Excellent availability statistics are critical to Salesforce's customers' success and to the success of Salesforce as a company. Live and historical statistics on the Salesforce system performance are publicly published at http://trust.salesforce.com/trusVstatus. The persistence layer underlying Salesforce Platform is proven database technology that powers all of Salesforce's products today, serving more than 150,000 organizations and over 4 billion transactions per day with an average request response time of less than .25 seconds, all with an average up time of 99.9+ percent ServiceNow ServiceNow's data centers and cloud -based infrastructure have been designed to be highly available. All servers and network devices have redundant components and multiple network paths to avoid single points of failure. At the heart of this architecture, each customer application instance is supported by a multi -homed network configuration with multiple connections to the Internet. Production application servers are load balanced within each data center. Production database servers are replicated in near -real time to a peer data center within the same geographic region. ServiceNow leverages this Advanced High Availability (AHA) architecture for customer production instances in several ways: -In the event of the failure of one or more infrastructure components, service is restored by transferring the operation of customer instances associated with the failed components to the peer data center. -Before executing required maintenance, ServiceNow can proactively transfer operation of customer instances impacted by the maintenance to the peer data center. The maintenance can then proceed without impacting service availability. This approach means that the transfer between active and standby data centers is being regularly executed as part of standard operating procedures — ensuring that when it is needed to address a failure, the transfer will be successful and service disruption minimized. RTO is 2 hours. RPO is 1 hour. See the "ServiceNow Security, Operations, and Compliance White Paper' included with this __Les ones for more information. QTS In the rare instance of failure of the commercially -delivered electrical power, back-up systems at each QTS data center start instantaneously. Batteries provide power for the first 12-15 seconds while on -site diesel generators spin up to synchronize their output with the battery -supplied feed. Once on-line, the generators can supply power indefinitely, and the IT equipment on the data floor as well as critical infrastructure components are all unaffected. While the basics of reliable power seem simple, none of this is taken for granted. Battery banks are sized to provide 15 minutes of power, well beyond the 15 seconds that it typically takes generators to come on line. Inspections are conducted daily and quarterly to ensure that the battery banks are prepared at all times. The diesel generators are inspected by running them each month to circulate and condition the fuel, then running them annually under the full simulated load of the current IT equipment on the data center floor. Factory technicians inspect and ITIT maintain the enerators semi-annually, m _f fuel sufficient to su o rat 48-72hours of ........_ vrrrnuallly. Quantities o— ._ PH carahsoft 100 Agreement No. 7434 SOLICITATION # CH16012 ........ __ operation without _ ...... _ _................ resupply are stored on -site, and re -supply contracts are in place with multiple roviders to have fuel delivered as soon as the enrators come on Nine. SAP Ariba Ariba has implemented two sites within each region. In North America the sites are currently located in San Jose, California and Sterling, VA. In Europe the sites are located in St. Leon -Rot, Germany and Amsterdam, Netherlands. The act of failing over from one site to another has a design goal for its Recovery Time Objective (RTO) of no more than four hours. The design goal for the Recovery Point Objective (RPO) is five minutes. Disaster recovery options are included for all Ariba Cloud Services. In the event of a fail -over to the disaster recovery site, no customer changes are required as all URLs that customers use to reach the applications will continue to work. Ariba will notify customers via their email addresses in the event of unplanned downtime. Internally, Ariba uses a documented system recovery plan that outlines the approach and steps for recovering the applications. This document defines roles and responsibilities in the event of disaster: Local Ariba staff maintains the hardware remotely. Ariba maintains the application software. Processes are in place to keep database and fileservers in sync between primary and backup data centers. The failover process of all parts of the infrastructure is automated. In the event of a catastrophe, Ariba will declare the primary data center "down" and locally the script will be run to switchover and start the applications at the remote data center. Ariba tests power outage backup scenarios and the Disaster Recovery Plan on a eriodic basis to ensure it is a -t+ o-date„ successful„ and effective. Fieldglass Customers are notified of unscheduled downtime immediately via email. Updates are frequently emailed out until the issue has been resolved, Customers are notified of scheduled downtime 5 days Manor via email. Hanna In case of a disaster depending on the infra &technical architecture defined during HEC technical assessment workshop, systems could fail over to HA node. If DR (optional offering) is selected, the systems could move to secondary DC that where contracted with a DR option & HEC declaring DR. Regular system downtime for patching etc. is planned in advance with the ............ customer and ally j llows customers maintenance schedules.. Hybris SAP Hybris offers continuous 24/7 systems monitoring in -place, which automatically notifies you, SAP Hybris support and optionally your designated implementation partner in the event of any monitored system problem. Tools used for monitoring include HP Sitescope and Nagios. This service ensures quick response times to emergency problems. Standard monitors are in place for basic site availability. Customer can utilize additional 3rd party monitoring services should it wish to add additional monitoring. Upon request, monthly or quarterly reviews are offered to review performance over the period. When a system problem occurs, in addition to monitor alerts sent to the customer, SAP Hybris support may send emails to a designated customer notification email address to provide status, updates or further detailed information. In addition, a support ticket would be created which would include such information. Success Factors Our infrastructure architecture is designed with high availability in mind, and engineered for resiliency. All major components are redundant, including power, HVAC, fire suppression, and the physical components of our network. Production data centers have strict access controls, and are contrnuousl carahsm 101 Agreement No. 7434 SOLICITATION # CH16012 staffed and monitored to help prevent acts of sabotage or vandalism. All production data centers are ANSI/EIA/TIA-942Tier III/IV facilities, and are ISO 27001 certified. Production data centers are also geographically dispersed to help prevent a single event from affecting more than one data center. In the event a production data center has an outage we failover to an alternate data center in the same geographic region to minimize impact to customers. Our Cloud Operations teams are also geographically dispersed, working in offices in the US, Europe, South America, and India. Should an office be impacted by an environmental event or pandemic, other offices can continue operations. Aspects of the plan are described in the SOC reports, Disaster Recovery Plan ("DRP") and Business Continuity Plan (" BCF) solutions are dependent on several factors. The customer may be responsible for parts of the recovery/contin.y.it activities. VMware VMware vCloud Air leverages proven VMware High Availability technology to minimize the risk of extended downtime. In the unlikely event that an extended outage does occur, VMware will support guide the customer's efforts to restore services to an alternative vCloud Air or vCGS datacenter. We will also provide remedies in the form of service credits as outlined in the following VMware vCloud Air, vCGS, Vmware AirWatch and VMware Identity Manager SLAs, FireEye FireEye has a mature and documented Business Continuity Plan and Disaster Recovery Plan that follows industry best practices that is reviewed and tested annually. The BCP/DRP plan has RPO/RTO timing criteria and other critical business requirements that is available for review if requested in the future. VirtueStream In the event of extended downtime affecting production systems, Virtustream and customer would jointly evaluate the situation and mutually decide on failover declaration, whereby Virtustream would then execute the failover plan to restore customer o erations to the secondary data center. b. Suffers an unrecoverable loss of data i ... ................. _. CA APM Customer data is isolated within dedicated schemas with nightly backups. The IT maximum data loss would be the previous 24hrs._ MAA MAA data is backed up fully daily. The maximum data loss would be the previous 24hrs. CA Agile We have implemented a physical standby database in both hot/Live site as well as warm/standby sites using Oracle Data Guard with real-time apply to achieve the stated recovery objectives. ......_, .... ............. _............. ASM Customer data is isolated within dedicated schemas with nightly backups. The maximum data loss would be the revious 24hrs. Google Google performs real time data replication to avoid unrecoverable data loss. Customers that configure the retention policies in Google Apps Vault can ensure that end users can not inadvertently or maliciously delete email in advance of any defined retention schedules. AODocs AODocs data are stored in Google AppEngine and Google Drive: - The data stored in Google AppEngine are backed up every day. The application is hosted on Google Cloud Platform infrastructure and benefits from the network security described in this whitepaper: https://cloud.google.com/files/Google-CommonSecurity- WhitePaper-vl.4.pdf - Data stored in Google Drive is managed by Google within its multiple servers location. Altirnao does not manage this infrastructure. Google Drive can be backed up by third party tool such as Backu ifym. 102 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Virtru Notify users that data within Virtru is unavailable, and recommend that they use their ofFline eno tion tools and backups to_perform emergency functions. — Salesforce To maximize availability, the service is delivered using multiple world -class data centers supporting primary and replicated disaster recovery instance, plus a separate production -class lab. The infrastructure utilizes carrier -class components designed to support millions of users. Extensive use of high -availability servers and network technologies, and a carrier -neutral network strategy, help to minimize the risk of single points of failure, and provide a highly resilient environment with maximum uptime and performance. The Salesforce services are configured to be N+1 redundant at a minimum, where N is the number of components of a given type needed for the service to operate, and +1 is the redundancy. In many cases, Salesforce has more than one piece of redundant equipment for a iven function. ServiceNow Please see our response for 8.8.1 a QTS QTS cloud developed a OPS_POL_54_QTS-FC_Contingency_PIanning_Policy (v1.2 — 2/6/14), detailing the policies, procedures, roles and responsibilities of key personnel in the event of an em 9er eand/or disaster . r. .......------ . SAP Ariba Our SLA provides tenant remuneration for losses they may incur due to outs es within the infrastructure. _ Field lass The maximum data loss timeframe Is guaranteed to be less than three 9 g hours; however, offsite backups are performed every 15 minutes so the timeframe is actually much shorter. Hanna Data loss is defined by RPO & RTO. HEC has a maximum RPO of 30 mins & RTO of 12 hours. _._._ ......... Hybris For a cloud solution, data backup and restore is handled by SAP. SAP shall follow its archiving procedures for Customer Data as set out in the SAP Hybris Commerce, cloud edition Services Description. In the event of any loss or damage to Customer Data, SAP shall use commercially reasonable efforts to restore the lost or damaged Customer Data from the latest back- up of such Customer Data maintained by SAP in accordance with the archiving procedure described in its SAP Hybris Commerce, cloud edition Services Description. SAP shall not be responsible for any loss, destruction, alteration or disclosure of Customer Data caused by any third party, (except those third parties sub- contracted by SAP to perform services related to Customer Data maintenance and back-up). SuccessFactors Our SLA provides tenant remuneration for losses they may incur due to autp es within the infrastructure, VMware VMWare IaaS Services ........ .... As discussed in detail in section 8.8.2.1.a below, VMware IaaS services are architected to minimize the risk of unrecoverable data loss. In addition option services such as vCloud Air Data Protection can be leveraged to further mitigate any risk. VMware's vCloud Air policy regarding data loss can be found in the vCloud Air Terms of use. VMware's vCloud Government Service policy regarding data loss can be found in the vCloud Government Service Terms of Service AirWatch Hosted Services AirWatch Business Continuity and Disaster Recovery strategies include data and hardware redundancy, network configuration redundancy and backups, and robust, regular testing exercises. AirWatch features active -passive configurations for high availability and redundancy with all components made to failover with minimal downtime. Load balancing capabilities are deployed across multiple data centers to ensure timely server recovery. AirWatch also incorporates replication technology featuring SQL log shipping or network SAN byte replication to prevent data loss. 103 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ... ........_ Due to FOIA restrictions and the competitive nature of the EMM marketplace, we cannot provide specific details regarding recovery strategies or timelines. FireEye FireEye has a mature and documented Business Continuity Plan and Disaster Recovery Plan that follows industry best practices that is reviewed and tested annually. The BCP/DRP plan has RPO/RTO timing criteria and other critical business requirements that is available for review if requested in the future. rtueStream Multiple copies of customer data exist in multiple datacent Vi.... _. ........ ers in the primary datacenter„ there is the production copy and a local backup. The local backup is replicated to a secondary datacenter and the production datastores associated with coreVM's are also replicated at regular intervals to the secondary datacenter. If NASPO feels that additional steps/redundancy are required to maintain recoverabiClty, Virtustream is open to discussion. _. _...... �� �s ,,, C. Offeror experiences a system failure _... .......___ _........ ........_ CA APM Disaster to the CA Technologies corporate network in New York will not affect customers' service. Secondary services, such as domain name services will be routed through the secondary CA Technologies network in Illinois. CA has a BCP plan in place to direct its services. The SaaS environment is separate from the CA corporate network and a service disaster recovery Plan is in place. ... ......� MAA Customers would be notified in advance, and even am�rle time to retrieve their data. CA Agile We enable all of our employees with the ability to be able to work remotely and provide remote network access to ensure business functions can continue. All corporate infrastructure has redundate systems that can be utilized in the event of failure. ASM Customers would be notified in advance, and given ample time to retrieve their data Goo le Goo Ie s corporate network is separate from it's production infrastructures manual) or via the ASM API, g g� p p p e. Google is a global organization that has support personnel located at key office installations and tests our business continuity programs annually. These tests are to validate that if corporate headquarters is off the AODocs AODocs runs business functions can be picked up by other staff _...... that ..... functions � 100% over Google's Cloud Platform infrastructure that is naturally redundant, and all AODocs internal systems such as technical support, email, collaboration, source code hosting, etc are run on cloud based services. AODocs personnel can work from any physical location without any business disruption and they do work from remote locations on a regular basis. If one of the AODocs facilities were to be temporarily unavailable due to a natural disaster, AODocs personnel would be able to erform their work without signioant interruption. Virtru Notify users that Virtru is or will be permanently unavailable, and recommend that they use their offline encryption tools and backups to perform emeTency functions. Salesforce Please see response to items a. and-b. above and d, and e. below. Salesforce has documented Disaster Recovery and Business Continuity plans for critical business functions. The Disaster Recovery and Business Continuity plans are tested at least annually. A post mortem documenting the results of the disaster recovery tests can be provided to customers with a signed NDA in place. Business continuity plans are updated each year, including the list of business processes, recovery time objectives, and key resources. Senior management is included in this process. Business continuity plans are exercised on an annual basis. Action items and lessons Teamed are tracked from each incident and exercise conducted. Action items are riordtNzed and tracked until carahsoft _ 104 __ Agreement No. 7434 SOLICITATION # CH16012 _. .. ..... .. ____�...........�._....�._ .... closed. Salesforce has developed additional procedures, processes and plans, including a Pandemic plan. Salesforce also recommends customers also devise their own backup strategy for their data, as there is a fee for customers to request for restoration from Salesforce backups. Salesforce provides multiple ways for our customers to obtain periodic backups of its data. We offer a weekly export service (WES) for those customers requiring a local backup copy of their data or a data set for import into other applications (such as an ERP system). Salesforce also supports data replication, which allows customers to store and maintain a local, separate copy of their organization's Salesforce data including the META data (logins, etc.) for specialized uses, such as data warehousing, data mining, custom reporting, analytics, and integration with other applications. Data replication provides customers with local control and the ability to run large or c ad hoc analytical queries across the entire data set. _._. _ ...... ......�_........ . ServiceNow Pleaseesee our response for �8 8.1 a ..... QTS QTS has established an alternate processing site including necessaryagreements to permit the resumption of information system operations for essential missions and business functions within [Assignment: organization -defined time period consistent with recovery time objectives] when the primary processing capabilities are unavailable. The QTS cloud hosting facilities in Richmond, VA (RIC1) and Atlanta, GA (ATL1) have agreements with each other to restore services in the event that one of the sites becomes unavailable. Both facilities are QTS managed facilities and are always available to meet the recovery time and recovery point objectives for the system. Agreements are in place to allow QTS to access resources at the alternate processing site physically and via the QTS client network. Richmond and Atlanta Datacenters are independently operated datacenters that offers disaster recovery services to customers. The contingency approach ensures that hardware and software components needed for recovery efforts are already at the alternate facility. QTS ensures that equipment and supplies required to resume operations are available at the alternate site or contracts are in place to support delivery to the site in time to support the organization -defined time period for resumption. Network circuits, networking infrastructure, storage, virtual servers, and management components re uired to resume operations are available and confi ured at the alternate site. SAP Ariba "Ariba modules automatically persist object state to the underlying relational database as users work. When a user performs a significant action, for example, adding an item to an order, performing an approval, etc., the Ariba application tier is aware of the change and automatically saves the relevant object state to the database. This provides transparent persistence of the user's work without the user having to "save" or "submit' changes to avoid losing work in the event of failure or session timeout. This in turn means that the loss of any connections between the tiers or failure of one of the tiers will not leave data in an inconsistent state. While object data is cached in the middle tier for performance, the official record is stored in the database to avoid any potential data loss or corruption. This means that recovery for Ariba modules is implicit and automatic. When the modules start, they retrieve the state of the various business objects from the underlying database as needed for user sessions. If an Ariba module fails, there is no special application recovery process other than restarting the module. The Ariba module will automatically connect to the database and as clients login and commence working, all required business object data will be retrieved from the database." carahsoft 105 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Fieldglass Fieldglass' business continuity program (BC Program) was established to ensure that, after a complete disruption of its Chicago and/or Naperville, Illinois offices, all employees and the functions for which they are responsible, are capable of continued operations in less than one business day. This includes office space as well as all equipment and supplies needed to continue its operations without an interruption in customer services. Fieldglass' BC Program is integrated into all facets of the company due to the criticality of the product that it sells and supports. As such, representatives from all areas of the company are responsible for ensuring that they are familiar with their duties and responsibilities during a disruption and how to areas after the disruption occurs recover their a� Hanna Service Level Credits Where SAP fails to meet a Service Level, SAP will be liable to Customer for the corresponding Service Level Credit as set out in this section. The Service Level Credit is calculated as the sum of the Service Level Credits for both DEV/QAS and PRD for the TA Service Level defined in section 5.1 above. SAP will deduct the amount of any Service Level Credits owed to Customer from the next invoice (or, if there is no such invoice, by bank transfer to such bank account as Customer may specify in writing). Customer agrees that under no circumstances will the total maximum Service Level Credits: (i) for any one month, exceed 100% of the Service Fee for that month; and, (ii) for any given contract year, exceed in the aggregate an amount equal to one- third of the annual Service Fee charged for the contract year (or one third of the total Service Fee charged if the Term as defined in the applicable Order Form is less than one (1) year). Customer acknowledges that the Service Level Credits defined hereunder are the sole remedy for SAP's failure to meet the specified Service Level. 5.6 Termination for Service Level Failure Customer may terminate the applicable Order Form with thirty (30) day's termination notice in writing to SAP, if SAP misses a Service Level as specified in this Supplement for three (3) months in sequence. Customer may exercise this termination right only within thirty (30) days after receipt of the respective Service Level report that documents the applicable Service Level ion right to accrue in Customer. failure that would cause such terminat� Hybris SAP isn't likely to go out of business in the near future. However, our contract states the following: Upon expiration or termination of the Agreement, SAP may destroy or otherwise dispose of any of Customer Data in its possession unless SAP (i) is requested by Customer to extend the term of the Order Form as permitted in the Order Form to allow Customer to retrieve Customer Data, or (ii) receives, no later than thirty (30) days after the effective date of the termination of this Agreement, a written request for the delivery to Customer of the then most recent back-up of the Customer Data. SAP shall use reasonable commercial efforts to deliver the back-up to Customer within thirty (30) days of its receipt of such a written request, provided that Customer has, at that time, paid all fees and charges outstanding and owed at termination. Customer shall pay all reasonable fees and expenses incurred b SAP in returning or disposing of the Customer Data. 106 carahsoft Agreement No. 7434 SOLICITATION # CH16012 VMware C AirWatch Hosted Services AirWatch Business Continuity (BC) strategies include clear policies and procedures as well as robust, regular testing exercises. Our BC recovery strategies for support and maintenance include provisions for workforce mobility, secondary support locations, and defined leadership roles and responsibilities for all recovery staff. • Multiple Support Locations — AirWatch maintains a Global Support Team, which spans multiple offices around the world. This ensures that if a disaster occurs at one of our offices, our remaining Support Team members can provide assistance to our customers. • Mobile Workforce — Should an AirWatch office become inaccessible, all AirWatch employees are equipped with laptops and can access necessary internal resources. • Defined Leadership — During a disaster, roles and responsibilities are assigned to key personnel, and a recovery manager provides leadership and documents the continuity process. Additionally, gme�y contact numbers for'key personneN are rovid'ed for all vendors and su pert staff.. FireEye FireEye has a mature and documented Business Continuity Plan and Disaster Recovery Plan that follows industry best practices that is reviewed and tested annually. The BCP/DRP plan has RPO/RTO timing criteria and other critical business requirements that is available for review if requested in the future. _........ _ ..... — VirtueStream Virtustream has built redundancy into all layers of the physical infrastructure__.. in order to deliver SLAs up to 99.999% and mitigate the risks of a system failure. Additional levels of protection include regular system backups (stored locally and replicated offsite) as well as automatic storage replication to a secondary data center to facilitate the ability to restore operations in the event of a system failure. d. Ability to recover and restore data within 4 business hours in the event of a severe system outage. CA provides an SLA __ ........_—........... of 99.k uptime, which can result in unforeseen outages of —1.5 hours per month. In the event of a failure to meet a SLA threshold , Customer is entitled to a number of days of credit. MAA Using DB clustering technologies, multiple copies of data are maintained helping in recovery of the data. CAA ile We can meet this requirement ASM Data is replicated from the primary (production) to secondary (DR) continuously, In the event of catastrophic loss of live data a failover to the DR site would be necessary, Goo le Google's RTO is zero. ......— _ .. _.......... Virtru See'Virtru Incident & Breach Policy' Salesforce Customer data, up to the last committed transaction, is replicated to disk in near -real time at the designated disaster recovery data center, and backed up at the primary data center. Backups are performed daily at primary data center facility without stopping access to the application. For business continuity purposes, Salesforce supports disaster recovery with a dedicated team and a 4 hour recovery point objective (RPO) and 12 hour recovery time objective (RTO). Additional details can be provided with the execution of an NDA between Salesforce and your Agency. ServiceNow Please see our response for 8.8.1 a QTS As defined in QTS OPS_POL_54_QTS-FCContingencyPlanning—Policy ___.. .._ cy (v1.2 — 2/6114), QTS cloud has identified the following potential accessibility problems: • Network Outage — Short Term • Network Outage — Long Term • _Facility Power or Environmental Outage —Short Term 107 carahsoft Agreement No. 7434 SOLICITATION # CH16012 • Facility Power or Environmental Outage — Long Term • Serious Facility Damage — Short Term • Serious Facility Damage — Long Term or Permanent Both the RIC2 and ATL1 QTS cloud Infrastructure is an Active/Active system and can operate independently of each other indefinitely. If QTS cloud determines that any single event (network, power, facility damage) presents a long- term threat, QTS immediately conducts an emergency meeting and plan to remedy or relocate infrastructure to a viable facility" SAP Ariba Ariba has implemented two sites within each h region. In North America the sites are currently located in San Jose, California and Sterling, VA. In Europe the sites are located in St. Leon -Rot, Germany and Amsterdam, Netherlands. The act of failing over from one site to another has a design goal for its Recovery Time Objective (RTO) of no more than four hours. The design goal for the Recovery Point Objective P is five minutes Fieldglass Fieldglass offers the following: • RTO = No more than 48 hours • RPO = No more than 6 hours. Warm site replica with 1001/16 processing power of original site. Disaster recovery site can run without need from resumption. Hanna See our RTO and RPO info below Hybris For a cloud solution, data backup and restore is handled by SAP.SAP shall follow its archiving procedures for Customer Data as set out in the SAP Hybris Commerce, cloud edition Services Description. In the event of any loss or damage to Customer Data, SAP shall use commercially reasonable efforts to restore the lost or damaged Customer Data from the latest back- up of such Customer Data maintained by SAP in accordance with the archiving procedure described in its SAP Hybris Commerce, cloud edition Services Description. SAP shall not be responsible for any loss, destruction, alteration or disclosure of Customer Data caused by any third party, (except those third parties sub- contracted by SAP to perform services related to Customer Data maintenance and back-up). Both IDS and IPS are included the SAP Hybris Commerce, Cloud Edition The security infrastructure includes firewall security and hardened security policies on all servers. Log management procedures are in -place for log review for firewall, applications, network devices, including file -integrity management. SAP Hybris utilizes technologies from leading security firms for Log Management and File Integrity Management. SAP Hybris employs two - factor authentication across its network. SAP Hybris undergoes vulnerability and penetration testing. SAP Hybris validates against requirements for PCI DSS 2.0. The infrastructure also includes Web Application Firewalls and DDoS Mitigation Services. In addition, security policies and change management policies are in -place ensuring that all access and changes to customer systems and information is accessible only by SAP Hybris staff with access authorization. Security of the software application which is controlled by the Customer (or its implementation partner) remains the responsibility of the Customer. Upon expiration or termination of the Agreement, SAP may destroy or otherwise dispose of any of Customer Data in its possession unless SAP (i) is ... ....__ requested by Customer to extend the term of the Order Form as permitted in _ 109 carahsoft Agreement No. 7434 SOLICITATION # CH16012 o _....... w_..... the Order Form to allow Customer t ...._. ..�.........._. _ retrieve Customer Data, or (ii) receives, no later than thirty (30) days after the effective date of the termination of this Agreement, a written request for the delivery to Customer of the then most recent back-up of the Customer Data. SAP shall use reasonable commercial efforts to deliver the back-up to Customer within thirty (30) days of its receipt of such a written request, provided that Customer has, at that time, paid all fees and charges outstanding and owed at termination. Customer shall pay all reasonable fees and expenses incurred by SAP in returning or disposing of the Customer Data. SuccessFactors TRPO and RTO are defined in the general terms and conditions VMware VMware Response: VMware IaaS Services VMware DR service. We can discuss specific recovery information under NDA to participating entities during task order negotiations as required. AirWatch Hosted Services We can discuss specific recovery information under NDA to participating entities during task order ne otiatons as required. FireEye FireEye has a mature and documented Business Continuity Plan and Disaster Recovery Plan that follows industry best practices that is reviewed and tested annually. The BCP/DRP plan has RPO/RTO timing criteria and other critical business requirements that is available for review if requested in the future. _.._ _._.w. _..... .... ..... . ................. ...._ VirtueStream Basic Plus microVM's are designed for mission -critical workloads and for systems that require DR, addition of reserved compute capacity in a secondary datacenter (i.e. Reserve uVM) and automatic storage replication to facilitate the ability to restore operations in the event of an outage at the primary data center. RPO and RTO for core microVM's are 15 minutes and 2 hours res ectivel . t e Describe your Recovery Point Objective (RPO�) and Recovery Time Objective (RTO) CA -WPM Recovery Point Objective (RPO): Maximum data loss: 24 hours Data that is uploaded, but not backed up within the 24 hours may have to be re- entered Recovery imq Objeotive RTO);_72 hours MAA Recovery Point Objective (RPO): Maximum data loss: 24 hours Data that is uploaded, but not backed up within the 24 hours may have to be re- entered Recayery Time O"ems R 72 hours CA Agile RTO: 2 hours RPO: 12 hours ASM Recovery Point Objective (RPO): Maximum data loss: 24 hours Data that is uploaded, but not backed up within the 24 hours may have to be re- entered Recovery Time Obt¢ve RT 24 hours Goo le RPO/RTO objectives are zero hours.. �..... ...... _� ._ .. W ._._ AODocs AODocs is hosted on Google App Engine which is designed to be highly available. Our standard SLA is 99.5% , Specific financial penalties can be discussed as part of the AODocs license contract. Goole App Engine is running in multiple datacenters on multiple continents. 109 carahsoft Agreement No. 7434 SOLICITATION # CH16012 AODocs data is backed up on a daily basis, and backups are stored on the highly redundant Google Cloud Storage. Backups are retained for at least 90 days Virtru See'Virtru Incident &Breach Polic ' Salesforce For business continuity purposes, Salesforce supports _. pp disaster recovery with a dedicated team and a 4 hour recovery point objective (RPO) and 12 hour recovery time objective (RTO). Additional details can be provided with the execution of an NDA between Salesforce and your A enc . ServiceNow Please see our re spouse for 8.8.1 a QTS QTS DRaaS will support all of your mission -critical application needs and enables you to achieve and RPO of lust seconds. _...._...... a RTO within minutes .� ___ ......�. W..... SAP Ariba See above . ......... _ Fieldglass Fieldglass offers the following • RTO = No more than 48 hours • RPO = No more than 6 hours. Warm site replica with 100% processing power of original site. Disaster recovery site can run without need from resum t 'pan,...... Hanna For disaster Recovery, SAP HEC offers the following RTO & RPO 1. HANA Database RTO -12 hours, RPO - 30 minutes 2. Sybase ASE Database RTO -12 hours, RPO - 30 minutes H bris In the case of catastrophic failure to o _. y p your primary production data center, we offer anywhere from best efforts to enhanced DR solutions. Enhanced DR options translates to either RTO of 8 hours and RPO of 1 hour for a warm standby solution, or RTO of 30 minutes to RPO of 30 minutes for a hot -site. Customers have 3 choices in DR sites: • as part of our base offering, best effort DR, we would bring your site back up in an alternate datacenter which is a minimum of 500 miles away from the primary datacenter. We would actually push your project server images to the alternate datacenter, but we would still need to set up your various interfaces, 3rd party services, etc, which could day a few days. • 2nd would be to have your DR site managed by hybris Managed Services. • 3rd would be to use your own DC as a DR site, We would need to set up a technical call with our combined teams to synch up on the replication strategies. • Our DR services utilizes VMware Site Recovery Manager with storage -based replication. • For enhanced DR, we would include one annual DR test, but more can be added if required. It also includes a customer specific DR and Business Continuity plan. Success Factors Within the contract/subscription agreement, there are provisions for data recovery in the event of disaster. SLA's for RTO (Recovery Time Objective) and RPO (Recovery Point Objective) are defined in the contract. We will prioritize data recovery based upon our contractual obligations for each customer, concernn RTO and RPO. carahsoft _110 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ware VMware IaaS Services Provide the RPO and RTO for DR, point to SLAs for others. RTO — 4 hours or less RPO —15 minutes to 24 hours — time is configurable by user but there is a bandwidth consideration for shorter replication times. VMWare AirWatch AirWatch Business Continuity (BC) and Disaster Recovery (DR) strategies include data and hardware redundancy, network configuration redundancy and backups, and robust, regular testing exercises. • Business Continuity — Our BC recovery strategies for support and maintenance include provisions for workforce mobility, secondary support locations, and defined leadership roles and responsibilities for all recovery staff. o Multiple Support Locations — AirWatch maintains a Global Support Team, which spans multiple offices around the world. This ensures that if a disaster occurs at one of our offices, our remaining Support Team members can provide assistance to our customers. o Mobile Workforce — Should an AirWatch office become inaccessible, all AirWatch employees are equipped with laptops and can access necessary internal resources. o Defined Leadership — During a disaster, roles and responsibilities are assigned to key personnel, and a recovery manager provides leadership and documents the continuity process. Additionally, emergency contact numbers for key personnel are provided for all vendors and support staff. • High Availability and Disaster Recovery — AirWatch features active -passive configurations for high availability and redundancy with all components made to failover with minimal downtime. Load balancing capabilities are deployed across multiple data centers to ensure immediate server pick up, ensuring zero end user downtime. AirWatch also incorporates replication technology featuring SQL log shipping or network SAN byte replication to prevent data loss. Due to FOIA restrictions and the competitive nature of the EMM marketplace, we cannot provide .. ecNc details regarddnq never+ strategies or timelines. FireEye FireEye has a mature and documented Business Continuity Plan and Disaster Recovery Plan that follows industry best practices that is reviewed and tested annually. The BCP/DRP plan has RPO/RTO timing criteria and other critical business requirements that is available for review if re uested in the future. __ _u�_ VirtueStream Virtustream's solution will have a Recovery Point Objective (RPO) of 2 Hours and Recovery Time Objective (RTO) of 30 Minutes for all disaster recovery enabled workloads. The Virtustream Cloud has been designed to deliver continuous operations. The platform is architected to be highly available, with SLAs as up to 99.99%. All infrastructure systems are run in at least an N+1 model and have been designed with no single points of failure. All of the data center facilities and infrastructure has redundant power supplies connected to separate circuits from separate power feeds. Every device is connected via redundant pathways at a LAN/SAN/WAN layer. State of Utah can choose any of our FedRAMP Data Centers to host their applications and the DR location. For illustrative purposes, we have assumed the primary data center will be USDCO2 and DR data center would be USDC01. The State of Utah solution has been designed with all workloads running in our San Francisco (USDCO2) data center. In the unlikely event of a disaster at the USDCO2 facility, State of Utah's production services will be brought back online in the secondary data center located in Northern Virginia (USDC01). The target RPO is 30 minutes for virtual machines with a 2 hour RTO. All production workloads in the primary node will have reserved compute capacity in the secondary node when deployed using Reserve AVMs and replicated storage. All virtual machine disaster recovery services are based on storage replication. The primary and secondary data centers are interconnected by diverse private 10 Gbps Sonet rings from separate Tier I providers — AboveNet and Level 3. Data is rwcated a' nohconouNy and contir�uul between the two data centers. 111 Agreement No. 7434 SOLICITATION # CH16012 Virtustream also performs backups on a nightly basis and replicated offsite for further protection. The retention policies are determined by State of Utah per landscape and will be documented during the on -boarding process. Figure 2. Integrated Disaster Recovery Virtustream's cloud platform includes integrated disaster recovery (30 Min RPO & 2 Hr RTO) and backup. Vio a 'l am. i1�lG�'�ur+ Network Operations Center Fully managedserv:ce udh resource SLAs pVM's Coca CM 9 Replicated Data Center 7ransformanon Coilocation.rCr clients who msh to transition L)ara and applroanon level ... f'ephr-'stlon .. secou,r eel u P r?r eve eu orlrifefq' fr r w a unrrm, Pr rl"y Client Location lAssron Mcal clent workloads i ��y�uarrrrr��' a fY'�,I!'Ic)VI Replicated Data Center Continuously optimized platform Standard client workloads and Business Continuity workloads xStream Portal Single secure Podalfor sell -managing ail con(gurations 8.8.2 Describe your methodologies for the following backup and restore services, a. Method of data backups ................................ ... CA APM Backups are stored on disk only MAA Backups are stored on disk onl , s nc'd between data centers for DR purposes. Agile Full database backups are taken once ........_ CAA g p per week, both to onsite and offsite (our warm data center, not a separate 3rd party) systems. Incremental backups are run nightly. Backups are retained for 21 days after which time they are simply aged out and over- written. In addition, snapshots of database transactions are taken every hour to an disaster recovery site allowing for emergency disaster recovery with maximum of 1.5 hours of data loss due to catastrophic onsite failure (fire in cage, natural disaster, etc. at data center). Backups are tested monthly and a full disaster recovery process to the offsite a lication cluster is tested semi-annually IT �. ...p ASM Backups are stored on disk only, s nc d between data centers for DR ur oses. Google Keeping in mind that Google stores customer data in encrypted chunks or shards on several servers at several data centers backups should not be considered customer specific. Daily backups of each server are performed to encrypted tapes at each data center. Virtru We perform live database replication to a separate redundant database in Oregon and offline as well in a separate Amazon AWS Region ..... ....... _... _ _._..... Salesforce Customer data, up to the last committed transaction, is replicated to disk in near -real time at the designated disaster recovery data center, backed up at the primary data center, and then cloned to the disaster recovery data center. Disaster recovery tests verify our projected recovery times and the integrity of the customer data. carahsoft 112 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ......... ....... Backups are performed daily at each data center facility without stopping access to the ..... application. Backup cloning is transmitted over an encrypted network (our MPLS network across all data centers). Tapes never leave our secure data center facilities, unless they are to be retired and destroyed through a secure destruction process. The backup retention policy is 90 days (30 days for sandboxes). Deleted / modified data cannot be recovered after 90 days (30 days for sandboxes). If customers want a longer retention, they can use the weekly export feature available in the system. ....... ... ._._..... ServiceNow While Advanced High Availability as described in 8.8.1 is the primary means to recover data and restore service in the case of a service disruption, in certain cases it is desirable to use ServiceNow's more traditional data backup and recovery mechanism. This data backup and recovery system works in concert with AHA and acts as a secondary recovery mechanism. ServiceNow stores production instances in two geographically separate regional data centers, with sub -production instances hosted in a single data center. Backups of the two production databases and the single sub -production database are taken everyday for all instances throughout the private cloud infrastructure. The backup cycle consists of four weekly full backups and the past 6 days of daily differential backups that provide 28 days of backups. All backups are written to disk, no tapes are used and no backups are sent off site. All the controls that apply to live customer data also apply to backups. If data is encrypted in the live database then it will also be encrypted in the backups. Regular, automated tests are run to ensure the quality of backups. Any failures are reported for remediation within ServiceNow. _.... �....._ ._....�..._ ._ �.......�. .. ........ QTS QTS operates and manages high-performance, multi -tenant platforms on which customer system and data file backups can be created and retained for rapid restore of files/volumes. Data can be stored on tape or disk, depending on QTS location, and can reside locally in a QTS data center or off -site. If there is a need for off -site data retention, the backup medium is tape. QTS can also replicate the backed up data from the primary site to a secondary (remote) site to address geographically remote storage and DR requirements. Secure: QTS utilizes a separate, secure gigabit backup network with private VLAN security. Physical security is monitored using a priority badge access system to limit access to the tape libraries, disk arrays, servers, and network infrastructure. From the application, the backup software controls access to the data stored on tape, and access security is limited to QTS staff only. Scalable: QTS backup systems are hi hl scalable, and ca aci can be quickly added as needed. _.....W SAP Ariba Our primary data center is Equinix, in San Jose; CA. Ariba's backup data center is CenturyLink in Sterling, VA. We make many copies of our data to insure no data loss happens: Data is stored in databases on high -availability storage disk -based system in primary datacenter Data is copied as backup to high -availability disk storage in the primary datacenter Data is copied to tape and kept in the primary data center Data is copied to tape and kept in an off -site tape storage facility (Iron Mountain) in Union City Data is replicated to databases high -availability storage disk -based system in the backup datacenter Data is copied as backup to high -availability disk storage in the backup datacenter Data is copied to to a and kept in the backup datacenter camhsoft 113 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Data replication to the remote datacenter happens in near -real time. Data is backed up to the backup disks multiple times a day (in each location) Data is written to tape once a day (in each location) These processes and procedures are audited against the ISAE 3402 standard. Our auditor verifies we can restore from these backup methods. Fieldglass All data in the Fieldglass system is stored within our clustered databases. Full backups daily, 15 minute incremental backups, and replication from center to center of backup data continuousl . Hanna The backup of SAP systems in HEC is executed on EMC DataDomain deduplication storage. This is done using EMC Networker for backup and administration. The backoa . Site A are also repljeated to remote Site B. SuccessFactors Data backup is undertaken as follows: storage system snapshots every 24 hours, nightly incremental database backups, and weekly full database backups. These are all standard and provided as part of our hosted service. All backups are stored on disk in the primary and backup data center facilities for 30 days. Database backups are encrypted and stored at a customer's "primary" location, as well as the "alternate" warm -site location for redundancy and disaster recovery purposes. If the customer's primary location is defined as the data center in Amsterdam, NL, then copies of their database would be encrypted and streamed in a secure manner to the data center based in St Leon -Rot, DE, and vice versa. The backup is stored on Storage Area Network systems encrypted with AES-256 bit by encryption appliance. Backups are retained for 30 days. Our Log File Retention Policy is designed to meet or exceed the most stringent industry standards. Archiving of data is the customer's res onsibility. VMware VMware will provide the following services to participating entities with respect to Data Recovery: -Data protection, such as routine backups, for the vCloud Air infrastructure, including top -layer management and user -management interfaces owned and operated by VMware. -Data and infrastructure restoration for the vCloud Air infrastructure, including top -layer management and user -management interfaces owned and operated by VMware. Participating entities will be responsible for the following services with respect to Data Recovery: -Data protection, such as routine backups, for the data and content accessed or stored on vCloud Air virtual machine's or storage devices, configuration settings, etc. -Data, content, virtual machine and configuration restorations for assets accessed or stored on your vCloud Air account. Data Protection is an optional service that provides secure, image -based backup and recovery capabilities that enable you to protect important virtual machine data and content hosted in your vCloud Air IaaS environment. Through the Data Protection administration interface available in the vCloud Air Console, vApps and their virtual machine members can be selected for policy -based backup and recovery operations. Data Protection feature subscription and activation may be requested via My VMware and is subject to additional service fees based on the amount of backup data capacity. Backup data capacity for the service is measured in front end terabytes (FETB). Once activated, vApps and their virtual machine members may be registered and unregistered with Data Protection features on a self-service basis through the vCloud Air Console. As part of this service, VMware will: -Implement and maintain central service components (backup software appliances, backup and archival storage media and associated network topologies) needed to support Data Protection features. -Perform routine configuration, maintenance and optimization services on behalf of the Data Protection environment and in conformance with industry best practices. Agreement No. 7434 SOLICITATION # CH16012 _........ .. P g capacity ._ ........ Allocate requisite backup storage based on ca acI selections made at the time of subscription enrollment. •Guarantee storage locality per geographical region for all backup data. -Provide necessary Data Protection service reporting as it is requested. Participating entities will be responsible for: -Subscribing to Data Protection as an add -on feature via My VMware and selecting an amount of backup storage capacity commensurate with your requirements. -Creating custom backup protection policies that may include, but are not limited to: affinity settings per VDC, scheduling, and retention periods. -Registering and unregistering individual vApps and their virtual machine members for scheduled backups using Data Protection. -Performing any on -demand backups per vApp and its virtual machine members. -Performing in -place or out -of -place restores per vApp and/or individual virtual machine. -Managing any in -guest recovery tasks, including restore operations at the operating system, file systems and/or any application level. -Managing backup storage capacity and consumption that may include, but is not limited to: activity reporting, ordering additional storage capacity via My VMwareTM and deleting any backup data in inventory to free up space. _ FireEye All backup and restore procedures are in compliance with SOC 2 specifications. Data and server IT __ ima es are backed up dlpitally and re licated to datacenters in geographicali different locations. VirtueStream Virtustream performs backups on a nightly basis and replicated offsite for further protection. The retention policies are determined by State of Utah per landscape and will be documented during the on -boarding process. Virtustream provides OS level files are protected with a File System backup and then protect the application with an integrated solution. Some of the databases would dump to a flat file format and ........ those files would be protected with the standard file system backuo. b Method of server Image backups M................ ____ APM N/A MAA Automation tools are used to manage the configurat! on"...-- Of Of MAA internal servers, and b can e used for recover. _... ... .. CA Agile Systems are not backed up as we have determined rebuilding is faster than restoring. Chef and he ASM Automation manage et systems arre used tomanagehte configuration of ASM nter al serversuration cookbooks are , ups and can be used for recovery. Virtru All ima es are backed u onto cloud storage 9 p ��. P _._.... p systems ._.� t Salesforce Each server has been allocated a different volume group so It can fall over � p aeon o se arate provider s s to its backup server within the instance Independently of the others. ServiceNow Please see our reonse to 8.8.2a _ ww QTS Your data storage requirements are growing exponentially and a scalable comprehensive solution for storage and data protection is absolutely necessary in today's marketplace. Implementing and managing this necessary storage infrastructure to meet both your application and compliance requirements can be extremely time consuming and costly. Outsource your storage needs to QTS. With our portfolio of high-performance and cost-effective managed storage services, your data will be secure and guaranteed to be available when you need it. By leveraging market leading hardware and software, coupled with certified processes and crsonral„ QTS delivers dependable, auditable solutions. 115 Agreement No. 7434 SOLICITATION # CH16012 Managed SAN (Shared and Dedicated)- a fast, reliable Fibre Channel (FC) and iSCSI SAN attached storage solution that easily scales to meet your business requirements. SAN-to-SAN Replication - provides block level asynchronous replication of your Managed SAN FC service between two of our state-of-the-art data centers for our disaster recovery needs. SAP Ariba See above Fieldglass Fieldglass does not run server image backups All systems are designed to be created through a series of templates and scripts. .................. Hanna The defined backup package includes a file system, operating system files, and the database backup. The frequency in which the backup is executed varies for each of the components mentioned above. This depends on the standard HEC service schedules and the service levels agreed on with the customer. W VVMware will p g _ . ._m.....- VMware will provide the following services to participating entities with respect to Data Recovery: -Data protection, such as routine backups, for the vCloud Air infrastructure, including top -layer management and user -management interfaces owned and operated by VMware. -Data and infrastructure restoration for the vCloud Air infrastructure, including top -layer management and user -management interfaces owned and operated by VMware. Participating entities will be responsible for the following services with respect to Data Recovery: -Data protection, such as routine backups, for the data and content accessed or stored on vCloud Air virtual machine's or storage devices, configuration settings, etc. -Data, content, virtual machine and configuration restorations for assets accessed or stored on your vCloud Air account. Data Protection is an optional service that provides secure, image -based backup and recovery capabilities that enable you to protect important virtual machine data and content hosted in your vCloud Air IaaS environment. Through the Data Protection administration interface available in the vCloud Air Console, vApps and their virtual machine members can be selected for policy -based backup and recovery operations. Data Protection feature subscription and activation may be requested via My VMware and is subject to additional service fees based on the amount of backup data capacity. Backup data capacity for the service is measured in front end terabytes (FETB). Once activated, vApps and their virtual machine members may be registered and unregistered with Data Protection features on a self-service basis through the vCloud Air Console. As part of this service, VMware will: -Implement and maintain central service components (backup software appliances, backup and archival storage media and associated network topologies) needed to support Data Protection features. -Perform routine configuration, maintenance and optimization services on behalf of the Data Protection environment and in conformance with industry best practices. -Allocate requisite backup storage based on capacity selections made at the time of subscription enrollment. -Guarantee storage locality per geographical region for all backup data. -Provide necessary Data Protection service reporting as it is requested. Participating entities will be responsible for: -Subscribing to Data Protection as an add -on feature via My VMware and selecting an amount of backup storage capacity commensurate with your requirements. -Creating custom backup protection policies that may include, but are not limited to: affinity settings per VDC, scheduling, and retention periods. -Registering and unregistering individual vApps and their virtual machine members for scheduled backups usina Data Protection. 116 Agreement No. 7434 SOLICITATION #t CH16012 -Performing any on -demand backups per vApp and its virtual machine members. -Performing in -place or out -of -place restores per vApp and/or individual virtual machine. -Managing any in -guest recovery tasks, including restore operations at the operating system, file systems and/or any application level. -Managing backup storage capacity and consumption that may include, but is not limited to: activity reporting, ordering additional storage capacity via My VMwareTM and deleting any backup data in inventory to freed space,. ....... _ . ............ FireEye All backup and restore procedures are in compliance with SOC 2 specifications. Data and server -images are backed a Lftbq and replicated to datacenters in 9gographically different locations. VirtueStream OS level files are protected with a File System backup and then protect the application with an integrated solution where available. Otherwise databases would dump to a flat file format and those files would be protected with the standard file system backup. Additionally, core microVM's are automaticalt r replicated to a seconda datacenter for DR purposes. ...... 1 C. Digital location of backup storage (secondary storage„ tape„ etc.) 1111 � CA APM Backups are securely replicated to an alternate location (within the same geographic location (e.g. N. America MAA Daily differential and full backups reside in the primacy site with weekly data backups residing offsite. CA Agile Backups are stored in our warm data center, ASM CA has an alternate site approximatelv 900 miles from our primary site. Google Virtru All backup storage is hosten in two separate cloud storage regions Salesforce Backups are performed daily at each data center facility without stopping _ - access to the application. Backup cloning is transmitted over an encrypted network (our MPLS network across all data centers). Tapes never leave our secure data center facilities, unless they are to be retired and destroyed through a secure destruction_process. ServiceNow Please see our response to 8.8.2a QTS Managed Tape Rotation and Off -site Storage This service provides off -site storage for data backup, and helps many customers who must store data separately from a primary IT site to comply with various laws and regulations. QTS has contracted Iron Mountain — a nationally recognized leader in off -site data storage services — to move the data storage media (tapes) to and from a secure, off -site location. The service enables data security, integrity, and restoration in the event of an outage. Off -site data storage via tape ensures that a customer's information is securely stored in multiple locations. In the event of an emergency, QTS and Iron Mountain deliver the customer's media back to their IT environment or wherever they request delivery. Secure: QTS staff adheres to storage -industry best practices and security procedures. QTS facilities have earned SSAE16-SOC1 accreditations. All media is maintained in a secure environment and locked in secure media containers during transition from the QTS environment to the off -site storage location. Compliance and Tracking: QTS's partnership with Iron Mountain provides the ability to offer logging and tracking information about the customer's off -site media via the SecureSync Web SAP M Ariba I See above carahsoft ii1 Agreement No. 7434 SOLICITATION # CH16012 Fieldglass Fieldglass houses all backup data vaults within its production data centers. Replicas of the vault are performed continuously across data centers more than 1,000 miles apart SuccessFactors All data is backed up to the secondary site and can be restored from there in the event of a disaster recovery event at the primary site. _.._..._y._.. e P 9 o..._.. disk VMware VMware vCloud Air Data Protection rovides backup storage to di _.. FireEye All backup and restore procedures are in compliance with SOC 2 specifications. Data and server .. c __......_ data centers in geo�pra hicall dy ifferent locations. VirtueStream Virtustream performs bacgkups on a nightly bass ._ .._... and replicated offsite for further protection. The retention policies are determined by State of Utah per landscape and will be documented during the on -boarding process. Backup data is stored on local enterprise class disk storage systems and can be replicated to systems in a secondary Virtustream datacenter. All of Virtustream backup is disk based solution. Encryption keys are generated at the time of backup application install on the Client VM(s). Encryption keys are at least AES-128 but can be AES-256. Keys are stored on the backup system databases using the encryption key management tool, the data about the keys on the database is in a unreadable format and cannot be decrMed d. Alternate data center strategies for primary data centers within the continental United States _. ........ ................. CA APM The location where data is stored is generally in the country where the contract is executed. MAA e MAA service is currently available from one data center one,..... CA Agile We have a hot/warm data configuration with both data centers located within the US but —1300 miles apart ASM__i_ASM has a warm sta ndby with near time data replication between the data centers. t u Google Google does no ....... use the N+1 data center assignment due to the risk of cascading failures. Google's infrastructure makes a dynamic decision for each unique login session which data center is the closest, most highly available data center and which data centers will be used as secondary and tertiary. This assignment would shift for that session throughout the day based on availability and is done com le�tely seamless to the end user. Virtru We utilize multiple availability zones in AWS, and backup all data stored in our database to separate datacenters_ Salesforce Customer Data for customers in Salesforce's Government Cloud is stored in two of our U.S. data center locations. The Salesforce service performs near real-time replication at each data center and annual disaster recovery tests for the service verify the projected recovery times and data replication between the production data center and the disaster recovery center. The disaster recovery site is a 100% replica of the primary production site of capacity (host, network, storage, data). Data is transmitted between the primary and disaster recovery data centers across encrypted links. Additionally, back- ups of data are performed and data is retained on backups at the geographically separated disaster recovery data center location. ServiceNow Please see our response to 8 8.2a QTSThe QTS lou d alternate storage sites are located at the following data centers: Richmond VA, Atlanta, GA, and Suwanee, GA. The entire QTS cloud is a unified standalone Active cloud architecture and is backed up in both Atlanta and Richmond to include: Customer data in the Service Delivery Hypervisor Cluster, and; CloudHyH r ep rvisor Management Infrastructure and Configuration backups. carahsoft 1119 Agreement No. 7434 SOLICITATION # CH16012 The QTS cloud Security documentation is backed up in alternate site located Suwanee, GA to include: Software/operating Systems, Configuration Data and Security Documentation QTS cloud Management Infrastructure and Configuration Data: Richmond, VA: The Richmond Cloud Management Layer (Cloud Hypervisor Management Cluster) and Customer data in the Service Delivery Hypervisor Cluster, and Configuration data is backed and staged locally in Richmond on the management layer then backed up across the Site -to -Site Management VPN to Atlanta, GA. This process is separate and independent of the Customers Service Delivery Layer. Atlanta, GA: The Atlanta Cloud Management Layer (Cloud Hypervisor Management Cluster) and Configuration data is backed and staged locally in Atlanta on the management layer then backed up across the Site -to -Site Management VPN to Richmond, VA. This process is separate and independent of the Customers Service Delivery Layer. This process maintains both local and remote management layer data and configuration backup for both locations. Suwanee, GA: software/operating systems, configuration data and security documentation at Rocstor Rocsecure Amphibious X7s with Secure -Encrypted Two -Factor Authentication, Utilizing AES-256 CBC Real -Time Hardware Encryption, with NIST and FIPS 140-2 Certified Cryptographic Modules, in a firerated safe located at Suwanee, GA. SAP Ariba We have a warm site for failover. E uimx Our primary data center is located in San Jose, California and our disaster recovery site is located at CenturyLink Data Center in Sterling, Virginia. The act of failing over from the main data center to the recovery site data center has a design goal recovery time objective (RTO) of four hours. The design goal Recovery Point Objective (RPO) is five minutes. In the event of a fail -over to the disaster recovery site location, all URLs that customers use to reach the San Jose data center will continue to work. We will notify customers via their email addresses in the event of unplanned downtime. Internally, we use a documented system recovery plan that outlines the approach and steps for recovering the applications. The document defines roles and responsibilities in the event of disaster: Local staff maintains the hardware remotely We maintain the application software Processes are in place to keep database and fileservers in sync between primary and backup data centers In the event of a catastrophe, we will declare the primary data center ""down and our local staff will follow a script to start the applications at the remote data center We test power outage backup scenarios and the Disaster Recovery Plan on a periodic basis. Fieldglass Please see the answer to Question 8.8.2A. above. Fieldglass' backup data center is located in San Jose, CA. _..._. _ _......... Hanna The backup of SAP systems in HEC is executed on EMC DataDomain deduplication storage. This is done using EMC Networker for backup and administration. The backups on Site A are also replicated to remote Site B. For example, site A &B may be Santa Clara, CA and Sterling, VA, respective . _..... ._.... .._.... _.. Hybris In the case of catastrophic failure to your primary production data center, we offer an here from best efforts to enhanced DR solutions. Enhanced DR carahsoft 119 carahsoft Agreement No. 7434 SOLICITATION # CH16012 options translates to either RTO of 8 hours and RPO of 1 hour for a warm standby solution, or RTO of 30 minutes to RPO of 30 minutes for a hot -site. Customers have 3 choices in DR sites: • as part of our base offering, best effort DR, we would bring your site back up in an alternate datacenter which is a minimum of 500 miles away from the primary datacenter. We would actually push your project server images to the alternate datacenter, but we would still need to set up your various interfaces, 3rd party services, etc, which could day a few days. • 2nd would be to have your DR site managed by hybris Managed Services. • 3rd would be to use your own DC as a DR site, We would need to set up a technical call with our combined teams to synch up on the replication strategies. • Our DR services utilizes VMware Site Recovery Manager with storage -based replication. • For enhanced DR, we would include one annual DR test, but more can be added if required. It also includes a customer specific DR and Business Continuity plan. SuccessFactors Each client has a designated primary and backup data center which is geographically separated as well as existing on different power and telecommunications cgrids.� VMware Customers can purchase Rackware to providegeographical HApand COOP but this s p p s service is not provided as a core capability of vCA or vCGS. VMware AirWatch AirWatch backs up the production environment from the primary US data center to the secondary US data center. Due to FOIA restrictions and the competitive nature of the EMM landscape, we cannot provide additional backupschedulin or image securi rocedures� FireEye All backup and restore procedures are in compliance with SOC 2 specifications. Data and server Ima es are back ed up digitally and replicated to datacenters in geograhically different locations. VirtueStream State of Utah can choose any of our FedRAMP Data Centers to host their applications and the DR location. For illustrative purposes, we have assumed the primary data center will be USDCO2 and DR data center would be USDC01. The State of Utah solution has been designed with all workloads running in our San Francisco (USDCO2) data center. In the unlikely event of a disaster at the USDCO2 facility, State of Utah's production services will be brought back online in the secondary data center located in Northern Virginia (USDC01). The target Recovery Point Objective (RPO) is 30 minutes for virtual machines with a 2 hour Recovery Time Objective (RTO). All production workloads in the primary node will have reserved compute capacity in the secondary node when deployed using Enterprise Reserve NVMs and replicated storage. All virtual machine disaster recovery services are based on storage replication. The primary and secondary data centers are interconnected by diverse private 10 Gbps Sonet rings from separate Tier 1 providers — AboveNet and Level 3. Data is replicated asynchronously and continuously between the two data centers. Virtustream also performs backups on a nightly basis and replicated offsite for further protection. The retention policies are determined by State of Utah per landscape and will be documented during the on -boarding process. 8.9 Data Protection 8.9.1 Specify standard encryption technologies and options to protect sensitive data, depending on the particular service model that you intend to provide under this Master Agreement, while In transit or at rest �CA .....__ APM All data is encrted via TLS Mutual Auth during transit carahsoft 120 carahsoft Agreement No. 7434 SOLICITATION # CH16012 MAA HTTPS/TLS encrypts the data in -transit. Sensitive data rest is encrypted using native encryption of SQL and NoSQL vendors. CA Agile All data in transit is encrypted - we support TLS 1+. For data at rest we have both database and disk level encryption. DB encryption utilizes Oracle TDE w/ AES-256. ASM .�._.. All data..t......�..... �..�. _.. transmitted between data centers is encrypted in -transit. HTTPS/TLS is used �....... b the ASM dashboard and API, Google All connections from customer end point devices to Google's Front End Servers are encrypted with enforced HTTPS sessions using Forward Secrecy. Google websites and properties use robust public key technologies: 2048-bit RSA or P-256 ECDSA SSL certificates issued by a trusted authority (currently the Google Internet Authority G2). All data in transit between Google's Data Centers traverses across Google's private fiber network using a customized, proprietary encryption technology. Google hard drives leverage technologies like FDE (full disk encryption) and drive locking, to protect data at rest. These methods of encryption are fully managed by Google and Google's Key Management Servers based on 128-bit or stronger Advanced Encryption Standard (AES). Encryption Keys and Ciphers Supported by Google Protocols TLS 1.2 TLS 1.1 TLS 1.0 SSL 3.04 QUIC Cipher suites ECDHE RSA with AES ECDHE—RSA with 3DES ECDHE_ECDSA RSA with AES RSA with 3DES Signing keys RSA 2048 ECDSA P-256 Hash functions SHA384 SHA256 SHA1 MD5 AODocs All data in transit is encrypted via SSUTLS Vendor interfaces are available only via HTTPS Email is exchanged via SMTPITLS All AODocs data are stored in Goo le aft i�ne. Virtru AES-256 in CBC mode, TLS 1.2 ECDHE Salesforce Encryption Capabilities Salesforce has many customers that are subject to laws pertaining to the processing of personally identifiable information (PII) or personal data. Salesforce offers its customers a broad spectrum of functionalities and customer -controlled security features that its customers may implement in their carahsoft 121 carahsoft Agreement No. 7434 SOLICITATION #t CH16012 _._. .... _.............. ........ ......................... respective uses of the Salesforce services. Salesforce believes that these provide its customers the flexibility to comply with laws with stringent privacy and security requirements. Data In Motion All transmissions between the user and the Salesforce Services are TLS encrypted with a 2048-bit Public Key. The Services use International/Global Step Up TLS certificates, with AES 256-bit encryption by default. Data At Rest Salesforce includes a feature to encrypt custom text fields (ECF): The fields can be masked appropriately for specific data types (i.e., credit card number, Social Security Number, National Insurance Number, Social Insurance Number). Access to read the masked parts of the fields is limited by the ""View Encrypted Data permission, which is not enabled by default. Customers can manage their encryption key based on their organization's security needs and regulatory requirements. Encrypted fields are encrypted with 128-bit keys and use the AES (Advanced Encryption Standard) algorithm. Additional Salesforce Encryption Capabilities Apex Code extends the powerful and proven success of the Force.com platform by introducing the ability to write code that runs on Salesforce servers. This language makes possible the development of a new class of application and features deployed entirely on demand. Using Apex, your Agency can create user interface classes that utilize the Apex crypto class to encrypt field level data up to AES 256-bit encryption. Third Party Encryption Solutions (Additional License Option) Should additional encryption be required, third party solutions such as CipherCloud, Skyhigh, and PerspecSys are available on the Salesforce AppExchange. These solutions offer data loss prevention, user activity and monitoring, malware protection, as well as data protection with encryption and tokenization. Data can be encrypted and masked at rest, keys managed and stored in p _ ...._ Salesforce, and compliance controls to revent unauthorized access to data and keys. ServiceNow ServiceNow makes use of encryption for both data in transit and data at rest. ServiceNow provides optional capabilities with regard to the encryption of data at rest within the system, which customers can apply at their own discretion. Encryption in Transit ServiceNow customers access their instances over the Internet using forced Transport Layer Security (TLS) encryption (AES128/256) for all user access. The level of encryption is based on the browser and must be configured by the customer as ServiceNow does not modify any browser settings. All attempts to access ServiceNow over HTTP are redirected to HTTPS. Integration Encryption For integrations such as LDAP and Web Services, ServiceNow provides customers with the ability to encrypt traffic. LDAP can be configured to run over SSL, this requires customers to provide a certificate for the specific LDAP server. Certificates may also be stored within an instance to allow encrypted transmission for Web Services integrations. FTPS and SCP can be used as file transfer methods to securely transfer files to ServiceNow. Email Encryption Customers may configure their instance to generate emails to their users from the instance. ServiceNow provides the caabili to receive email over TLS. Customers are able to configure their carahsoft 122 carahsoft Agreement No. 7434 SOLICITATION # CH16012 .......... _ ____ _ _.. _ ....... email system to send email to ServiceNow over TLS and ServiceNow will receive that email over TLS. Encryption at Rest ServiceNow can provide three types of encryption for data at rest that are implemented by the customer or by customer request in the case of edge encryption and dedicated hardware. -Column encryption of customer added fields and attachments: Provides data encryption using AES128/256 or 3DES symmetric key encryption. The customer provides the keys for this encryption. Data stored in these fields cannot be searched or reported on and this does not support out of the box fields. -Edge Encryption Proxy: With optional additional cost Edge Encryption, the customers create and control their encryption keys within their own network. Edge Encryption includes a proxy application that resides in a customer's network. This encrypts data before it is sent (also encrypted in transit) from the customer's environment to the ServiceNow instance. The data always remains encrypted whilst stored in the instance and the data along with the keys and the encryption configuration is never accessible by ServiceNow. Requests for encrypted data must also be made through the proxy application and is therefore decrypted only within the customer's network before being sent to their end users client browser. Please note that data encrypted with Edge encryption cannot be used by back -end scripts or processes and searching and reporting behavior is also modified through its use. -Full disk encryption: Provides via self -encrypting hard drives with AES256 bit encryption. This encryption capability is only available through the purchase of dedicated ServiceNow hardware at an additional cost. This delivers "at -rest" protection only and is focused solely on preventing data exposure through the loss or theft of hard disks holding customer data. Wherever possible, ServiceNow leverages existin Flg PS 140-2 certified technologies Docusign Secure, private SSL 256 bit viewing session Anti -tampering controls Signature verification of signing events Unalterable, systematic capture of signing data Digital certificate technology Customer configurable data retention program SAP Ariba We enforce minimum AES 128-bit encryption using Transport Layer Security (TLS) for all sessions. We encrypt only PCI-DSS data in the database where appropriate and in support of PCI-DSS compliance. All backup media is en tee using AES 256 bit ciphdr for to trans oriarng_to off -site stora ems_ Fieldglass Our application provides a high level of application -level security through a combination of encryption, page -level access checking, document envelopes, and activity logging. Application security is handled through a combination of programming checks, application server configuration, and database server configuration. Fieldglass uses 2048-bit SSL (HTTPS) encryption for all data transmissions over the public Internet, including data shared between the product and end users and data shared between the product and back -end systems. Data is decrypted on the internal VLAN to allow IDS monitoring. Passwords are hashed using a one-way hash based on the SHA-256 encryption algorithm. The hash value is saved within the database; not the password. The base Fieldglass application does not require data that would require breach notifications if compromised. While customers should not store sensitive personal data, custom fields may be defined by the customer that can be encrypted with AES-256 to capture any pertinent and permissible data points. These fields can also be optionally masked from view while entering and viewing the fields in the application . carahsoft 123 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ........... . ........ __ ...... ........ .....�......... ..- Hanna Initial encrypted data load - physical encrypted data transfer possible Encrypted connection to HEC DC - SAP solutions support various VPN-device vendors and specifications that can be used to setup a secure and encrypted tunnel between cloud solutions from SAP on the customer network segment and the customer site. Optional Data at Rest encryption - HANA encryption at Rest activated during system build upon request. Moreover data at rest is properly protected against unauthorized access, these controls include -Physical security controls in SAP HEC Datacenters in place -Physical separation of "online" storage and backup (physically separated DC sections) -Strict User and Access Management (segregation of duties) -Authorization Management according to the need to know principle also for administrative accounts, e.g. DBAs have limited authorizations to perform DB operation only -Security Logging and Security Monitoring for critical activities / access Optional encryption in transit can be configured on customer request which retygres a different subset ' bset of DC's from delivery perspective. _mmm Hybris Encryption is provided through SSL connectivity at the web application layer as well as VPN secure encrypted tunnel for back -office integration connectivity. Further encryption capabilities are available through the hybris Advanced Security Module (optional SuccessFactors All data in the system is treated as highly sensitive information. The application and infrastructure offers Strong Encryption, Encryption in Transit and Encryption at Rest, including the following (some of these are options that are not included in the base services): Transport Layer Security (TLS) technology, consisting of a public key and a private key, to protect sensitive information. The public key is used to encrypt information and the private key is used to decipher it. When a Web browser points to a secured domain, a handshake authenticates the server (website) and the client (browser). An encryption method is established with a unique session key. Customers may then begin a secure session that facilitates message privacy and integrity. Hitachi SAN storage arrays provide a reliable safe, secure data storage environment. We use AES-256 bit encryption to secure data at the block level of our storage systems. Backups are performed ""disk to disk"". Data is transported over 3DES VPN and stored on enptetl disk using Data Domain replication technolo VMware ...._ ��_�.I VMWare IaaS Services Data in transit will be encrypted based upon the customers selected method of transport (SSL or IPSEC VPN). Data at rest encryption is the responsibility of the customer. By example HyTrust is an endpoint encryption choice for many vCloud Air customers. VMWare AirWatch AirWatch leverages strong, non-proprietary encryption algorithms to protect applicable data at rest and in transit. Due to FOIA restrictions and the competitive nature of the EMM landscape, we cannot provide specific encryption algorithms and protocols. FireE a Each of the FireE a offered solutions have their own and y y implementations and practices concerning ency on: carahsoft 124 carahsoft Agreement No. 7434 SOLICITATION # CH16012 1.Email Threat Prevention (ETP) ETP offers TLS encryption support for data in transmission. ETP only stores email found to contain malware or malicious content and does not encrypt this data. 2.Mobile Threat Prevention (MTP) All data in transit is protected using standard TLS encryption. The database itself is not encrypted. However, all systems are under strict security and access control rules, in compliant with SOC 2 regulations. 3.Threat Analytics Platform (TAP) All data in -transit between a customer environment and TAP instance in Amazon AWS is encrypted with a 256-bit Twofish key. No customer data is stored on disk, however data stores leverage Amazon AWS S3 encryption settings. 4.FireEye as a Service (FaaS CV) FireEye appliance communications, and FireEye as a Service (FaaS) non -person entity (NPE) secured inter -process communications employs industry standard HTTPS encrypted web interfaces, and multifactor SSH management access for the end -to -end protection of sensitive customer data. In addition, FaaS communicates with FireEye appliances with additional layers of protected symmetric e channels h for information. VirtueStream Encryption keygenerated at of backup application install on the Client VIV(s). Encryption keys are at least AES-128 but can be AES-256. Keys are stored on the backup system databases using the encryption key management tool. The data about the keys on the database is in an unreadable format and cannot be decrvoted. 8.9.2 Describe whether or not it is willing to sign relevant and applicable Business Associate Agreement or any other agreement that may be necessary to protect data with a Purchasing Entity, purpose p Quid bwillingto sign Business Associate Agreements or similar agreements that are set forth with a ur se of protecting customer data. .......r 8.9.3 Offeror must describe how it will only use data for purposes defined in the Master Agreement, participating addendum, or related service level agreement. Offeror shall not use the government data or government related data for any other purpose including but not limited to data mining. Offeror or its subcontractors shall not resell nor otherwise redistribute information gained from its access to the data received as a result of this RFP. Hgreea ana unaerstooa. Uarahsott and its' subcontractors will not use any government data for purposes other than those outlined within the frameworks of this contract. 8.10 Service Level Agreements 8.10.1 Offeror must describe whether your sample Service Level Agreement is negotiable. If not describe how it benefits purchasing entity's not to negotiate your Service Level Agreement. 125 carahsoft Agreement No. 7434 SOLICITATION # CH16012 _... _..._._._ _ . ....... Salesforce Salesforce does not typically offer Service Level Agreements as part of the base service offering. Our approach is to offer a service with high availability and fast resolution of problems. If a customer requires an SLA it will be negotiated separately. The persistence layer underlying Salesforce Platform is proven database technology that powers all of Salesforce's products today, serving more than 150,000 organizations and over 4 billion transactions per day with an average request response time of less than .25 seconds all with an average up time of 99.9+ percent. Salesforce uses commercially reasonable efforts to make its on -demand services available to its customers 24/7, except for planned downtime, for which Salesforce gives customers prior notice, and force majeure events. Excellent availability statistics are critical to Salesforce's customers' success and to the success of Salesforce as a company. Live and historical statistics on the Salesforce system performance are publicly published at hftp://trust.salesforce.com/trusYstatus. Salesforce has maintained high levels of availability across all Salesforce instances since inception. As the only on -demand vendor to provide daily service -quality data on a public Web site (http://trust.salesforce.com), Salesforce proves that we are the leader in availability. And by making its track record completely transparent, Salesforce proves we are worthy of our customers' trust. To ensure maximum uptime and continuous availability, Salesforce provides the best redundant data protection and most advanced facilities protection available, along with a complete data recovery plan -all without affecting performance. ServiceNow ServiceNow's SLA is not negotiable. ServiceNow delivers the same level of world -class support to all customers as described in the "Subscription Service Guide" included with this response. ServiceNow's homogeneous private cloud environment where all applications are on a single platform offers ServiceNow a competitive advantage in being able to concentrate its efforts to make the customer's user experience the best possible. The ServiceNow environment is a private cloud, fully owned and operated by ServiceNow. ServiceNow's experience & understanding of its private cloud and the benefits provided by a consistent infrastructure and standardized processes allow it to provide a high level of security, �a�vail,ability, p eliable manner. and erformance in a cost effective and rDocusicgn es LA's can be modified per contractual agreement, __... _. SAP Ariba Our SLAs are not negotiable. As mentioned above, the SAP Ariba Cloud Service Level Agrreement includes a 99.5% uptime. ........ ...... . Fieldglass Our SLA is designed to (i) meet the expectations of our customers and (ii) fit with our operational protocols and capabilities. Because of this our ability to make significant changes to the SLA is limited. However, we are always willing to work with a customer to try and determine how our SLA can address ....a_particular business. Hanna Our SLAs are not negotiable for Support. Under our SLA, System Availability is 99.5% during each month for productive systems. Customers may claim a credit of 2% of Monthly Subscription Fees for each 1 % below SLA (not to exceed 100% of Monthly Subscription Fees). This credit may be applied to a future invoice relating to Cloud Service that did not meet the System AvailabilitSLA.� Hybris Our SLAs are not negotiable for Suppor t. _ Under our SLA, System Availability is 99.5% during each month for productive systems. Customers may claim a credit of 2% of Monthly Subscription Fees for each 1 % below SLA (not to exceed 100% of Monthly Subscription Fees). This credit may be applied to a carahsoft 126 carahsoft Agreement No. 7434 SOLICITATION # CH16012 future invoice relating to Cloud Service that did not meet the System Availabili SLA. SuccessFactors Our SLAs are not negotiable for Support. Under our SLA, System Availability is 99.5% during each month for productive systems. Customers may claim a credit of 2% of Monthly Subscription Fees for each 1 % below SLA (not to exceed 100% of Monthly Subscription Fees). This credit may be applied to a future invoice relating to Cloud Service that did not meet the System Availability SLA. VMware VMware's SLAs are specific to the product or service, and are subject to the product's Terms of Service (which are also provided). The SLA is specific to the product rather than to the customer, to define the expected availability and recourse should the product not meet the stated availability levels. VMware's existing customers include Federal, State and Local government customers as well as commercial customers, who successfully utilize our products in accordance with the current SLA and Terms of Service and their applicable, mandatory laws and regulations. Accordingly, VMware is confident that the existing SLA meets the state and local government requirements, as it is being utilized currently. VMware IaaS Services To best work with our customers and improve our terms in alignment with market requirements, VMware is willing to review the terms of its SLA during negotiations of the Participating Addendum to identify how the existing SLA meets the state's applicable and mandatory laws and regulations. If it becomes apparent to the parties that it is necessary to revise VMware's SLA to comply with the state's applicable and mandatory laws, VMware will enter into discussions about how to best address these requirements Vmware SaaS Services VMware AirWatch AirWatch Service Level Agreements are non-negotiable. AirWatch has a guaranteed uptime SLA of 99.9%. Please refer to the AirWatch Hosted Services Policy for additional information. VMware AirWatch acknowledges that if it is awarded a contract under the RFP that it will annually certify to the Lead State that it still meets or exceeds the mandatory minimum requirements and technical specifications of the RFP. FireEe ITmm� SLAs are negotiable. VirtueStream Virtustream's Service Level Agreement is generally not negotiable. Our SLAs are one of the strictest in the market place. To change the SLA would mean either changing the design or create operational disruption and higher cost by engaging in non-standard processes and practices. For example, Virtustream's SLA for Tier 1 storage is 10 ms latency. For Virtustream to change this latency means changing the design for Tier 1 storaae. 8.10.2 Offeror, as part of its proposal, must provide a sample of its Service Level Agreement, which should define the performance and other operating parameters within which the infrastructure must operate to meet IT System and Purchasing Entity's requirements. below is a sample of virtustream's Service Level Agreement: SERVICE LEVEL FRAMEWORK The service levels ("Service Levels") applicable to the Services specified in Sections 1 and 2 are set forth in Schedule B to this SD ("Service Levels for Cloud Platform Services"). The framework that governs all Service Levels is set forth in this Section. Commencement of Service Levels Commencing thirty (30) days from the Service Start Date (as set forth in the applicable Order Form), Virtustream's performance of the Services will meet each applicable Service Level. If Virtustream's performance of the Services carahsoft 127 carahsoft Agreement No. 7434 SOLICITATION # CH16012 does not meet the applicable Service Level, then Virtustream will use commercially reasonable efforts to restore its performance to meet such Service Level. Service Level Reports Service Levels will be calculated and measured monthly by Virtustream on a calendar month basis and reported each month for the previous month. The reports will be provided to Customer by the tenth (10th) working day of the month following that to which such report relates, commencing on the second (2nd) month following the Service Start Date and each month thereafter. The monthly service level report will contain at least the following items: (i) Uptime statistics for the month concerned; (ii) an analysis of reported incidents over the previous month, broken down by type for discussion; (iii) action plans for items giving rise to concern; (iv) comments and observations on any issues arising from Virtustream's performance monitoring activities; (v) recommendations on service delivery strategies to maintain or enhance the service level; and (vi) review of general business requirements ("Service Level Report"). Cloud Platform Services (CPS) has its own specific service levels as described in this document. Cloud Cover Services (CCS) has service levels that pertain to the CCS offerings and are reported separately. Not all Virtustream customers have CCS but all Virtustream customers use CPS. Service Level Review Meetings Monthly Service Level review meetings will be conducted by Virtustream with Customer where the monthly Service Level report specified above will be discussed. If any of the Service Levels measured over the previous calendar month period is not achieved in that month, then Virtustream will include the steps taken to rectify the problem in the next monthly Service Level Report. In addition, the issue shall be an agenda topic for discussion at the next monthly service review meeting. Additionally, after restoring service or otherwise resolving any immediate problem as specified in this SD, if Virtustream fails to provide Services in accordance with the Service Levels, Virtustream shall: a.Promptly investigate and report on the causes of such problem; b.Provide a Root Cause Analysis of such failure as soon as practical after such failure or at Customer's request; c.Correct such problem that is Virtustream's fault or responsibility, as soon as reasonably practicable and coordinate the correction of such problem if Virtustream does not have responsibility for the cause of such problem. d.Advise Customer of the status of remedial efforts being undertaken with respect to such problem; e.Demonstrate to Customer's reasonable satisfaction that the causes of such problem (that is Virtustream's fault or responsibility) have been or shall be corrected on a permanent basis; and f.Take corrective actions to prevent any recurrence of such problem (that is Virtustream's fault or responsibility). Root Cause Analysis Promptly following Virtustream's failure to meet a Service Level, Virtustream will perform a root cause analysis to determine the reason for that failure. Upon Virtustream's determination of the cause of such failure, it will provide to Customer a preliminary report citing the cause of such failure. If Virtustream determines that the failure was due to Virtustream, an additional report will be provided that details the root causes of the failure, and which details any measures that should be taken to minimize the possibility that such failures will re -occur. Virtustream will correct the problem and use reasonable commercial efforts to minimize the re -occurrence of such failures. Service Level Exceptions Virtustream shall not be liable for any failure to meet the Service Levels, to the extent such failure was caused by one or more of the following: a.A failure of Customer or any of its employees, agents or contractors (including any of Customer's third party service providers) to perform any of its responsibilities under this SD; b.Any act or omission of Customer or any of its employees, agents or contractors (including Customer's third party service providers or other third parties acting on behalf of Customer); c.Any hardware, software or other product of a third -party or Customer equipment; d.Any failure of Customer to secure the proper access rights or maintenance and support services with respect to any component of the Services (e.g., hardware, software, network, maintenance) for which Virtustream does not bear operational responsibility; e.Downtimes resulting from a Virtustream's scheduled maintenance windows; f.Customer's reprioritization of the tasks to be performed by Virtustream where such reprioritization causes Virtustream to miss a Service Level; g.Viruses; provided that the infected Virtustream-provided system had virus protection for which the virus protection software updates were up to date; carahsoft 128 carahsoft Agreement No. 7434 SOLICITATION tt CH16012 h.An election by Customer to purchase a base commitment that is not sufficient to run Customer's system (e.g., If a customer elects to size a NVM pool that is insufficient to run the designated workload); Ussues occurring outside of standard working hours (as defined for business level customers) — for which the Service Level Objectives (SLOs) do not apply; j.Cloud Cover Services (CCS) offerings — for which the Service Level Objectives (SLOs) do not apply; k.Resolution delays due to lack of client response and/or Customer provided credential based information; I.Priority levels not agreed upon by both customer and supplier; m.Claims of performance degradation not substantiated through Customer provided diagnostic testing results. Specify our data disposal procedures and policies and destruction y p confirmation process. The disposal of data will vary based on the type of service that is being provided to the Purchasing Entity by Salesforce. As an example, please see Salesforce response for disposal of government data: Data Disposal and Destruction In the event of termination of the Salesforce service, requests by your Agency made within 30 days after the effective date of termination or expiration of the Subscription Agreement, Salesforce will make your data available to you for export or download. Once the export has been completed, an email will be sent to you containing a link where you can download a .zip file that contains multiple .csv (spreadsheets) files, each representing your Salesforce objects. Your data on disk is flagged within the database and set to inactive status or what can be referred to as a ""soft delete."" This data is no longer available or accessible to the application but is backed up in the full database backup process. The data remains in this state for 180 days; this is done in the event that the customer decides to resume services or needs the data for a legal reason. At 180 days, the data is marked for deletion (""hard delete"") and will be deleted after 30 more days. Once this ""hard delete"" is executed the customer data is physically deleted and non -recoverable from the database. Following the purge, the data will remain on backup for an additional 90 days prior to being overwritten and unrecoverable. Media Sanitization Salesforce has an established process for sanitizing media consistent with industry guidelines and consistent with NIST SP 800-88 Guidelines for Media Sanitization [MP-6]. 8.12.1 Describe your ability to guarantee reliability and uptime greater than 99.5%. Additional points will be awarded for 99.9% or greater availability. ..... ...... CA APM CA SaaS .-...__ _ .__ .. S production environments have an SLA at 99.8% uptime calculated arrear month. 1 hr response, for P1 issues .._. ......._......_ �_.......... . MAA CA MAA SaaS production environments have an SLA at 99.8% uptime calculated arrear monthly 1 hr response for P1 issues. CA Agile For Rally SaaS Unlimited Edition customers, our goal is to provide 99.9% up -time during each calendar quarter. If in any calendar quarter an up -time of 99.5% is not met and our customers were negatively impacted (for example, were unable to login to Rally), we will provide a service credit equal to one month of fees for use of the Rally Service. _ ASM CA SaaS production environments have an SLA at 99.8% uptime�_. calculated arrear monthly. 1 hr response for P1 issues. carahsoft 129 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ... ............ W............... __ -......... Google Google Apps services will be operational and available to the customer at least 99 9% of the time in any calendar month. If Google does not meet the Google Apps SLA, the customer will be eligible to receive service credits. AODocs Altirnao agrees to use commercially reasonable efforts to meet or exceed the Availability Service Level. The Availability Service Level means the Service is available for use by Users for not less than 99.5% of the time excluding the Exclusion Events as defined below). Virtru Virtru provides � ......... the same SLA as Gmail _... _....._. Salesforce Salesforce has maintained high levels of availability across all Salesforce instances since inception. As the only on -demand vendor to provide daily service -quality data on a public Web site (http://trust.salesforce.com), Salesforce proves that we are the leader in availability. And by making its track record completely transparent, Salesforce proves we are worthy of our customers' trust. To ensure maximum uptime and continuous availability, Salesforce provides the best redundant data protection and most advanced facilities protection available, along with a complete data recovery plan —all without affecting performance. Salesforce uses commercially reasonable efforts to make its on -demand services available to its customers 24/7, except for planned downtime, for which Salesforce gives customers prior notice, and force majeure events. Excellent availability statistics are critical to Salesforce's customers' success and to the success of Salesforce as a company. The persistence layer underlying Salesforce Platform is proven database technology that powers all of Salesforce's products today, serving more than 150,000 organizations and over 4 billion transactions per day with an average request response time of less than .25 seconds all with an average up time of 99.9+ percent. Salesforce does not typically offer Service Level Agreements as part of the base service offering. Our approach is to offer a service with high availability and fast resolution of problems. If a customer re tyres an SLA it will be negotiated separately. .. � — _ ........ ServiceNow ServiceNow's Availablity SLA Is 99.8%, excluding Excused Downtime of up to two hours per month. This is achievable through the use of the Advanced High Availability (AHA) architecture described in 8.8.1 that provides failover capabilities for maintenance and service disruptions to minimize downtime. _ Docusign DocuSign offers carrier class bank grade, "always on" availability. This means DocuSign has eliminated monthly maintenance (taking 0 minutes of planned downtime per year). We are a multi- year 99.99% operation. Please view the DocuSign Trust site (trust.docusign.com) for additional information. QTS TIA 942 requirements for the design, construction, and management of Tier III facilities is the design basis for all QTS data centers. Using best -of -breed technologies, QTS's highly trained, certified data center professionals tailor efficient and reliable solutions to meet individual customer requirements. Primary commercial power is delivered to facilities through diverse, redundant paths to eliminate single points of failure between the nearest electrical substation (usually on -site) and each piece of customer IT equipment. QTS allows users to inspect the engineering drawings to validate that truly redundant N+1 architectures are in place and that the 99.999% uptime guarantee is supported by sound engineering and operational policies. Meaningful Service Level Agreements are backed by financial penalties spelled out in tailored Master Service Agreements with each customer. _ SAP Ariba Our data centers have 99.99% uptime. Our application maintains a PP 99.% official SLA with the last 12 months, seeing 99.98% uptime.. Fieldglass For customers hosted in US data centers, we commit to a 99% availability standard. For customers who choose to be hosted in EU data centers, our availabilit standard is 96.7%. If we fail to meet the availability standard, the carahsoft 130 carahsoft Agreement No. 7434 SOLICITATION # CH16012 customer may be entitled to receive a credit equal to two percent (2%) of its transaction fees for the service for that month for each one percent (1 %) (or portion thereof) by which we fail to achieve such level, up to one hundred ercen!j:j. °f° of the fees for such month. Hanna The SAP HEC offers a 99.5% uptime availability SLA for production (PRD) instances and a 95% uptime availability for quality assurance (QAS) and development (DEV) instances. This means that after taking in to account the monthly maintenance window, the TOTAL solution will be available 99.5% of the time - not that we expect it, but this equates to about 3 hours of unscheduled downtime per month. The concept of "total solution" is important because the HEC provides Holistic Solution Availability - our single SLA covers the FULL SOLUTION STACK which means it covers the Infrastructure, Operating System, local DB, the HANA in -Memory DB, and the Application layers. We do not offer individual SLAs on individual layers because if one layer fails„ the entire solution is down Hybris The environment is completely redundant and based on a high availability architecture. The hybris private cloud is based on VMWare virtualization and is fully load -balanced. Customer systems reside on a redundant server infrastructure ensuring that if one server (or part of the server infrastructure) fails, a backup is in place to ensure that systems remain operational. The infrastructure is load -balanced ensuring high availability of the system during peak usage periods. The load -balancing allows the systems to support large volumes of simultaneous users balancing the load of activity across multiple servers ensuring peak performance of all systems. Redundancy of Infrastructure Components: • Multihome connectivity to the Internet backbone. Multiple connections to the internet, allows optimizing the best route as well as redundancy. • At an individual component level, all devices have dual physical power connections to protect against any individual power supply failure • Redundant Firewalls • Redundant Routers, • Redundant Load balancers • Virtualized Application and Web servers • Clustered Database - active active cluster mode for enhanced redundancy • High performance SAN storage- from Netapp„ with built in redundancy at the disk level (NetApp proprietary RAID technology, similar to a RAID 5) • The data centers provide diverse power (Uninterruptible Power Supply), backup generators and air conditioning systems required to ensure equipment remain online with optimal performance 24/7/365. • SLA: contractually we provide a guarantee on the performance of your ...._ a h(latrort at 99.90/.vaiiabil( _ _�mmITITIT SuccessFactors We contractually guarantee a minimum of 99.5% system uptime, with the xc tp iorro °f reguNrl scheduled and emergency maintenance. carahsoft 131 carahsoft Agreement No. 7434 SOLICITATION # CH16012 VMware VMware's SLAs for vCloud Air. Our Availability Commitment ranges from 99.99% - 99.95 based on the Class of Service. The SLAs are subject to the terms of the applicable Terms of Service for the VMware vCloud Air Service Offerings. Dedicated Cloud 99.99%, Virtual Private Cloud 99.95%, Data Protection 99.95%, Disaster Recovery 99.95%, Virtual Private Cloud On -Demand 99.95% Availability Commitment. IaaS Object Storage: Object Storage powered by Google CLoud Platform (standard) 99.9%, Object Storage powered by Google (durable reduced availability) 99.0% and Object Storage (nearline storage) 99%. vCloud Government Service Dedicated Cloud 99.95% and Virtual Private Cloud 99.9% Availability Commitment. FireEye -TieEye undertakes all reasonable efforts to ensure the availability for 99.9% of the time during each calendar month. In the event the solution does not meet the monthly service availability, FireE a will provide a credit as outlined in the SLA. VirtueStream Virtustream solution for VM workload includes the uptime of 99.99%. " 8.12.2 Provide your standard uptime service and related Service Level Agreement (SLA) criteria _ CA_._._..............APM _ U time. ___...�..._...........�................ p SLA target is 99.8% CA runs test scripts using application monitoring tools on the Production system to verify that the CA SaaS service is available. Test scripts are run approximately once every ten (10) minutes, twenty-four (24) hours per day, seven days per week, throu hout the contracted term of the service. MAA U time SLA target is ..........�.-..... p g 99.8% CA runs test scripts using application monitoring tools on the Production system to verify that the CA SaaS service is available. Test scripts are run approximately once every ten (10) minutes, twenty-four (24) hours per day, seven days per week, throughout the contracted term of the service. CA Agile See above. ASM Uptime SLA target is 99.8% CA runs test scripts using application monitoring tools on the Production system to verify that the CA SaaS service is available. Test scripts are run approximately once every ten (10) minutes, twenty-four (24) hours per day, seven days per week, throughout the contracted term of the service w Google Google Cloud Platform SLA: Google's Cloud platform has SLAs ranging from 99.9 - 99.95% uptime. Salesforce Please see response to 8.12.1 above. Salesforce does not typically offer Service Level Agreements as part of the base service offering. Our approach is to offer a service with high availability and fast resolution of problems. If a customer requires an SLA it will be negotiated separately. Salesforce uses commercially reasonable efforts to make its on -demand services available to its customers 2417, except for planned downtime, for which Salesforce gives customers prior notice, and force majeure events. Excellent availability statistics are critical to Salesforce's customers' success and to the success of Salesforce as a company. Live and historical statistics on the Salesforce system performance are ublicl �ed„ ServiceNow I DEFINITIONS (a) "Available" means that the Subscription Service can be accessed by authorized users. carahsoft 132 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Docusign QTS SAP (b) "Excused Downtime" means: (i) Maintenance Time of up to two (2) hours per month; and (ii) any time the Subscription Service is not Available due to circumstances beyond ServiceNow's control, including without limitation modifications of the Subscription Service by any person other than ServiceNow or a person acting at ServiceNow's direction, a Force Majeure Event, general Internet outages, failure of Customer's infrastructure or connectivity (including without limitation, direct connectivity and virtual private network (VPN) connectivity to the Subscription Service), computer and telecommunications failures and delays, and network intrusions or denial -of -service or other criminal attacks. (c) "Maintenance Time" means the time the Subscription Service is not Available due to service maintenance. (d) "Availability SLA" means the percentage of total time during which Customer's production instances of the Subscription Service are Available during a calendar month, excluding Excused Downtime. AVAILABILITY If Customer's production instances of the Subscription Service fall below the Availability SLA of ninety-nine and eight -tenths percent (99.8%) during a calendar month, Customer's exclusive remedy for failure of the Subscription Service to meet the Availability SLAs is either: (1) to request that the affected Subscription Term be extended for the number of minutes the Subscription Service was not Available in the month in accordance with the Availability SLA; or (2) to request that ServiceNow issue a service credit to Customer for the dollar value of the number of minutes the Subscription Service was not Available in the month in accordance with the Availability SLA (determined at the deemed per minute rate ServiceNow charges to Customer for Customer's use of the affected Subscription Service), which Customer may request ServiceNow apply to the next invoice for subscription fees. REQUESTS Customer must request all service credits or extensions in writing to ServiceNow within thirty (30) days of the end of the month in which the Availability SLA was not met, identifying the support requests relating to the period Customer's production instances of the Subscription Service was not Available. The total amount of service credits for any month may not exceed the subscription fee for the affected Subscription Service for the month, and has no cash value. ServiceNow may delay issuing service credits until such amounts reach one thousand U.S. dollars ($1,000) or gquiyalent currency_s ecified in the applicable Order Form. Our industry -leading, global support model is there to back you up, no matter where you do your business. We provide you access to the expertise you want, whether through our communities, our knowledge base and on -demand training, or our team of experienced technical support rofessi2gals, who know you and your solutions 99.999% u time guarantee. Meaningful Service Level Agreements P 9 9 g eements are backed by financial penalties spelled out in tailored Master Service Agreements with each customer. .. Ariba We guarantee a 99.5%system availability percentage during each month for production versions, with the exception of regularly scheduled and emergency maintenance. Hanna Technical Availability for PRD systems - 99.5% Technical Availability for non PRD systems - 95% SAP shall track and report to Customer the "Technical Availability" in a monthly summary report. SAP HEC can offer a contractual SLA of 99.7 on a case byr,case basis. Hybris SLA: contractually we provide a guarantee on the performance of your application at 99.9% availability. carahsoft 133 carahsoft Agreement No. 7434 SOLICITATION # CH16012 SuccessFactors We guarantee a 99.5% system availability percentage during each month for production versions, with the exception of regularly scheduled and emergency maintenance. ._...................... VMware AirWatch Service Level Agreements are non-negotiable. AirWatch has a guaranteed uptime SLA of 99.9%. Please refer to the AirWatch Hosted Services Policy for additional information. VMware AirWatch acknowledges that if it is awarded a contract under the RFP that it will annually certify to the Lead State that it still meets or exceeds the mandatory minimum requirements and technical specifications of the RFP. FlreEye FireEye cloud solutions are available 99.9% of the time in any calendar month, other than mutually agreed upon and scheduled downtime. -VirtueStream Virtustream IaaS Compute is comp rised prised of computing resources hosted in secure data centers that replace the physical computing hardware traditionally housed on Customer site. These resources include physical servers which are logically divided into VMs (virtual machines), each with an allocation of CPU and memory, and linked to storage. Terms used in the detailed descriptions below: •NVM. Pronounced "micro VM," this is Virtustream's fine-grained unit of measurement designed to accurately measure the actual consumption of cloud resources. A pVM is a unit of computing resources, comprised of CPU, memory, storage IOPS, and associated local network bandwidth. The usage of each pVM resource component (CPU, memory, storage input/output, and network bandwidth) is measured at five minute intervals — one unit each for 200MHz of CPU, 768MiB of memory, 40 storage fabric input/output operations per second (TOPS), and 2Mbps of local network bandwidth. The highest of the four is averaged per hour, and the hour values averaged across the month to determine the overall pVM usage for the month. Note: The measurement is performed at the aggregate level — across Customer's entire pVM resource pool. Bandwidth usage is only within the data center. -Basic Plus uVM. These terms differentiate the two ways Virtustream offers NVMs services. "Basic Plus" pVM services are limited to a single Virtustream data center and have 99.99% availability for the Customer's committed level. "Reserve" pVM service is an equivalent quantity of Basic Plus NVMs reserved at Customer - designated secondary Virtustream data center for on -going operation during disaster events and during scheduled disaster recovery (DR) exercises. In both cases, overage resources required ("surges") up to 20% above the committed level from the contract /order form are provided at the same availability level. If Customer experiences consistent overage above this level, then Customer should reset the committed level. -High Memory. Virtustream offers competitive pricing on compute services for applications that require large amounts of memory (64GiB or more). -Enterprise These terms identify the "zones" within which AVMs are made available for consumption. The "Enterprise" zone is for use by non -Internet facing workloads. Systems deployed into the Enterprise zone are not directly accessible from the Internet. Enterprise Basic Plus pVM (IC-uVM-BASP-ENT) Enterprise Basic Plus NVMs reside in a single Virtustream data center, in the Enterprise zone. Resource availability is 99.99%, and only at the designated data center. Overage resources required ("surges") up to 20% above the committed level from the contract /order form is provided at the same availability level. If Customer experiences consistent overage above this level, then Customer should reset the committed level. Service Level. 99.99% availability for the Customer's committed level. Billing. Monthly, based on resource usage. Tier 0 Block Storage - Local Only (IC-STO-TOA-LOC) Block storage with a Latency Service Level of 3ms that is maintained in a single data center with no replication capability. Billing. Monthly fee, based per GB of storage allocated. Allocated storage is measured every 30 minutes, averaged across the month. carahsoft 134 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Tier I Block Storage - Local Only (IC-STO-T1A-LOC) Block storage with a Latency Service Level of 10ms that is maintained in a single data center with no replication capability. Billing. Monthly fee, based per GB of storage allocated. Allocated storage is measured every 30 minutes, averaged across the month. Tier II Block Storage - Local Only (IC-STO-T2A-LOC) Block storage with a Latency Service Level of 20ms that is maintained in a single data center with no replication capability. Billing. Monthly fee, based per GB of storage allocated. Allocated storage is measured every 30 minutes, averaged across the month. Tier III Block Storage - Local Only (IC-STO-T3A-LOC) Block storage with a Latency Service Level Objective of 40ms that is maintained in a single data center with no replication capability. Billing. Monthly fee, based per GB of storage allocated. Allocated storage is measured every 30 minutes, averaged across the month. Tier 0 Block Storage - Replicated (IC-STO-TOA-REP) Data storage with a Latency Service Level of 3ms that is persisted in Customer's primary Virtustream data center, and replicated to a second data center with an interval to provide a Recovery Point Objective (RPO) of 15 minutes. Service Level. Recovery Time Objective (RTO) of one (1) hour, and a Recovery Point Objective (RPO) of fifteen (15) minutes. Billing. Monthly fee, based per GB of storage allocated. Tier I Block Storage - Replicated (IC-STO-T1A-REP) Data storage with a Latency Service Level of 10ms that is persisted in Customer's primary Virtustream data center, and replicated to a second data center with an interval to provide a Recovery Point Objective (RPO) of 15 minutes. Service Level. Recovery Time Objective (RTO) of one (1) hour, and a Recovery Point Objective (RPO) of fifteen (15) minutes. Billing. Monthly fee, based per GB of storage allocated. Tier II Block Storage - Replicated (IC-STO-T2A-REP) Data storage with a Latency Service Level of 20ms that is persisted in Customer's primary Virtustream data center, and replicated to a second data center with an interval to provide a Recovery Point Objective (RPO) of 15 minutes. Service Level. Recovery Time Objective (RTO) of one (1) hour, and a Recovery Point Objective (RPO) of fifteen (15) minutes. Billing. Monthly fee, based per GB of storage allocated. Tier III Block Storage - Replicated (IC-STO-T3A-REP) Data storage with a Latency Service Level Objective of 40ms that is persisted in Customer's primary Virtustream data center, and replicated to a second data center with an interval to provide a Recovery Point Objective (RPO) of 15 minutes. Service Level. Recovery Time Objective (RTO) of one (1) hour, and a Recovery Point Objective (RPO) of fifteen (15) minutes. Billing. Monthly fee, based per GB of storage allocated. 8.12.3 Specify and provide the process to be used for the participating entity to call/contact you for support, who will be providing the support, and describe the basis of availability. CA AP M CA Support can be engaged by telephone or online via CA Support Online at http://www.support.ca.com. CA Support is available 247065. Technical support will be delivered in accordance with customer preference, and will likely include both telephone and email communications. CA Support Online is available 24 hours Der carahsoft 135 carahsoft Agreement No. 7434 SOLICITATION # CH16012 day and allows customers to manage their cases (i.e. log, view, set severity level, update and close cases). CA Support Online also provides various other useful features, for example: a knowledge base search; product and documentation downloads; fixes, service pack and patch downloads; support utilities; automated notifications; access to communities, beta programs; subscriptions for hyper notifications, etc. While working with CA Support engineers on cases, email communications and a remote access capability can also be used to deliver support services. Secure File Transfer Protocol (FTP) and a secure FTP web client allow for the protected transfer of case file attachments to CA Support, with the web client additionally providing case file transfer protection from CA Support. Files are encrypted and stored securely while on CA s stems Optionally unsecure_FTP transfers also are supported." _ MAA CA Support can be engaged by telephone or online via CA Support Online at http://www.support.ca.com. CA Support is available 24x7x365. Technical support will be delivered in accordance with customer preference, and will likely include both telephone and email communications. CA Support Online is available 24 hours per day and allows customers to manage their cases (i.e. log, view, set severity level, update and close cases). CA Support Online also provides various other useful features, for example: a knowledge base search; product and documentation downloads; fixes, service pack and patch downloads; support utilities; automated notifications; access to communities, beta programs; subscriptions for hyper notifications, etc. While working with CA Support engineers on cases, email communications and a remote access capability can also be used to deliver support services. Secure File Transfer Protocol (FTP) and a secure FTP web client allow for the protected transfer of case file attachments to CA Support, with the web client additionally providing case file transfer protection from CA Support. Files are encrypted and stored securely while on CA s stems. Optionally unsecure FTP transfers also are supported " CA Agile Support is available 24/7 and a contact number will be provided upon completion of the contract. _ ASM CA Support can be engaged b tele hone or online via CA Support Online w__�PPy p pp at http://www.support.ca.com. CA Support is available 24x7x365. Technical support will be delivered in accordance with customer preference, and will likely include both telephone and email communications. CA Support Online is available 24 hours per day and allows customers to manage their cases (i.e. log, view, set severity level, update and close cases). CA Support Online also provides various other useful features, for example: a knowledge base search; product and documentation downloads; fixes, service pack and patch downloads; support utilities; automated notifications; access to communities, beta programs; subscriptions for hyper notifications, etc. While working with CA Support engineers on cases, email communications and a remote access capability can also be used to deliver support services. Secure File Transfer Protocol (FTP) and a secure FTP web client allow for the protected transfer of case file attachments to CA Support, with the web client additionally providing case file transfer protection from CA Support. Files are encrypted and stored securely while y also are supported. " on CA systems. 0�n� unsecure FTP transfers a Google Customers are entitled to direct Google support in additional to whatever Support Services the reseller has to offer. Google has a published Technical Services Support Guide for both Google Appsand Google Cloud Platform that des cribe the hours of operation, how 1p_2et after hours carahsoft 136 carahsoft Agreement No. 7434 SOLICITATION # CH16012 support, how to set the priority on a case, ow to contact GoogleITresponse .. o pp p ' ty h ,and what the target response times are. _._. ..._ ......... ........__ AODocs Customers are entitled to direct AODocs support in additional to whatever Support Services the reseller has to offer. �.........W....W _._ .. .. Salesforce Salesforce_is proposing the Premier+Success Plan. Your Agency can cover all of its bases with this plan: support, training, and administration. It's what the + is all about. The Premier+ Success Plan gives you all the benefits of our Premier success plan, including a support rep assigned to your organization, priority case routing, 1-hour response time, 24x7 phone support, unlimited usage of our entire online course library, plus one very helpful addition: access to your own team of expert Salesforce administrators. This lets you focus on design and management while we support your configuration. The Premier+ Success Plan includes: Unlimited access to our entire online course catalog of 100+ courses • 24x7 toll -free phone support • Priority case queuing and routing s Quick 1-hour response time • An assigned support account rep • Force.com code troubleshooting • Customizable end -user course templates • Premier Success Review to measure usage and trends • Access to our pool of Salesforce Certified Administrators who can configure and maintain your Salesforce edition • Premier Success Review to measure usage and trends • Includes administration services: Get configuration help. Request 100+ routine configuration updates like creating users, reports, workflow, and dashboards. You take online administration training to learn the basics, then you tell us your business requirements. Our team of certified administrators updates your Salesforce system. Subject to the Government Cloud Premier+ Success Plan outlined above, access to systems and permissions which could permit access to Customer Data inside of the Salesforce Government Cloud storing U.S. government, U.S. government contractors, and FFRDC Customer Data will be restricted to Qualified U.S. Citizens. Qualified US Citizens are individuals who are United States citizens, and are physically located within the United States when accessing the Salesforce Government Cloud systems; and have completed a background check as a condition of their employment with Salesforce. Severity Levels & Response Timeslssues will be categorized and handled according to an assigned severity level, as follows: Level 1 - Critical Response time: 1 Hour* Critical production issue affecting all users, including system unavailability and data integrity issues with no workaround available. Level 2 - Urgent Response time: 2 Hours* Major functionality is impacted or significant performance degradation is experienced. Issue is persistent and affects many users and/or major functionality. No reasonable workaround available. Also includes time -sensitive requests such as requests for feature activation or a data export. Level 3 - High Resoonse time: 4 Hours** 137 carahsoft Agreement No. 7434 SOLICITATION # CH16012 System performance issue or bug affecting some but not all users. Short-term workaround is available, but not scalable. Level 4 - Medium Response time: 8 Hours** Inquiry regarding a routine technical issue; information requested on application capabilities, navigation, installation or configuration; bug affecting a small number of users. Reasonable workaround available. Resolution required as soon as reasonably practicable. *24/7 Severity 1 and 2 coverage includes weekends and holidays **Severity 3 and 4 target response times include local business hours only and exclude weekends and holidaysOverview of Support Escalation PathAn issue is received by Tier 1 Support Rep who will document details and attempt to resolve. In the event that the problem cannot be resolved at this level, case will be escalated to a Tier 2 Support Rep for further analysis. Occasionally, a Case may be received for which technical understanding or indicated fix exceeds the responsibility of Support. These issues are quickly brought to the attention of R&D through the Tier 3/QA channel. Throughout the lifecycle of the case, customer will receive regular updates from the case owner at regular intervals based on case severity. Customers can work with their Support Account Specialist (SAS) if assigned through the purchase of Premier Support as a point of escalation should the need arise. Step-by-step escalation path: -Case is logged via Help Portal, Phone or through Live Chat -Depending on the functional area of the case a Tier 1 Support Rep from the appropriate skill group responds to the user confirming that the issue has been received and is in process. -Tier 1 analyzes the issue from the perspective of customer provided information in the case. -Tier 1 makes contact (phone or email) with the customer and gathers more information including any access needed to reproduce the problem. -With all necessary information gathered, Tier 1 will attempt to resolve the issue with the customer.. -When resolution cannot be immediately achieved, Tier 1 Support Rep will escalate to a Tier 2 Support Rep in the same skill group. Tier 2 Support Rep will take all steps necessary to reproduce, understand and resolve the issue. -Technical Issues that cannot be resolved by the Tier 2 Support Rep are escalated to Tier 3. This escalation will provide a deeper layer of analysis with the possibility of escalation to QA/Development for Application issues and Escalation to Operation Services for Infrastructure issues as needed. -Functional Issues that cannot be resolved by Tier 3 are escalated to Product Management. -If it is an application Issue, necessary Development work will be performed, tested and a patch created. -Issue Fix Submitted to Operations for Infrastructure issues. -Issue Fix deployed. -Tier 2 Support Rep confirms success of Bug Fix in addressing the problem. -Tier 2 Support Rep contacts customer and confirms that the issue is Resolved. -Case is closed" ServiceNow Customer Support is b provided w 24 hours a day, 7..d ........ - y ServiceNowy days a week, including all holidays. Customer may contact ServiceNow using one of the following means: -Support Portal at https://hi.service-now.com/. Customer may get login access to this self-service portal by contacting its ServiceNow administrator. -Phone using one of the numbers at http://www.servicenow.com/support/contact-support.html. Customer shall contact ServiceNow's authorized reseller in accordance with its agreement with the reseller. carahsoft 138 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ............. ...... See the "Customer Support Policy" contained within the "Subscription Service Guide" included with this response for more information. Docusi n Enter rise Premier support provides 24x7 Give Phone Support. .... - _.......................................................... QTS Dedicated support staff is available 24x7x365 to generate and track incidents to resolution QTS Customer Portal provides round -the clock visibili intour environment VMware Global Support Services _. ..... WW.. ........ .._._._. FireEye FireEye offers 24/7 technical support and its technical support centers around the globe in a follow -the -sun model. -Milpitas, CA, USA (UTC -7 hours) -Reston, VA, USA (UTC -4 hours) Dublin, Ireland (UTC) -Singapore (UTC +8 hours) -Sydney, Australia (UTC +10 hours) FireEye Support is available via telephone, email, live chat, and web. Phone: U.S: +1 877-347-3393 (877 FIREEYE) Email: Support@FireEye.com Web Support: https://www.fireeye.com/supporUget-support.htmI Support Pro rare�ye.com/support/support-programs.html VirtueStream Virtustream will work collaboratively with State of Utah to develop / maintain a relationship structure that leads to quick resolution, regularly scheduled status meetings, and quarterly business reviews. Virtustream will assign multiple key personnel to State of Utah including an Executive level sponsor. The primary point of contact will be Virtustream's Technical Account Manager (TAM). The TAM is responsible for daily activities/interaction and understanding/ensuring State of Utah's objectives are met at a minimum. Optimizations and other improvements to processes/standard operating procedures are delivered by the TAM in coordination with other Virtustream staff working behind the scenes. The TAM will coordinate day-to-day operation, service level management and SL reporting. The following outlines Virtustream's approach to service desk escalation and issue resolution. Escalations within Virtustream Virtustream will provide Level 0 and Level I support and first call resolution where possible, as determined by Virtustream. Where first call resolution is not possible, the Virtustream Service Desk provides incident management for Incidents and Urgent Service Requests escalated to Level II and Level III resources as defined below. In the event that Virtustream's Response to an Incident is not acceptable to the Customer, Customer can contact the Virtustream Service Desk and request escalation to the head of the Service Desk. Virtustream shall, upon receipt of any such request, immediately escalate the issue to the head of the Service Desk or technical team as appropriate. Service Request Prioritization Service Requests are assigned a priority of either'Urgent' or'Standard' and are queued for fulfillment with the corresponding priority. All Service Requests will be reviewed by the Virtustream Service Desk, who will determine the appropriate priority to assign with collaboration of Customer. Incident Prioritization All Incidents that are reported to the Virtustream Service Desk, or that Virtustream otherwise becomes aware of, will be initially assigned a priority by the Virtustream Service Desk as set forth below. Internal escalation for Incidents to Level II and Level III resources are based on the priority level assigned to the Incident. carahsoft 139 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Major part of the system is unavailable/not operating correctly, affecting multiple users. No workarounds in place and business operations are not possible. 30 1 Or minutes Incident has a critical impact on the business (e.g., loss of the Exchange Production server impacting all users), Response time Part of the system is unavailable/not operating will be within correctly, affecting users in a single function. No indicated time workarounds in place and business operations in this beginning from 2 function are not possible/severely impacted. 60 when the Or minutes customer Incident has a serious impact on part of the business creates a ticket (e.g., a configuration change is impacting a small or a monitoring subset of users). event is Part of the system is unavailable/not operating validated. correctly, affecting users in a single Additional function. 'Workarounds in place, but business resources are 3 operations are impacted, although not severely. 4 hours engaged via Or Virtustream's Incident has a temporary impact on users and is non on Call critical or is a development issue (e.g., email is slow Process. to deliver) Incident that is causing inconvenience to the business, but not impacting operations. 1 4 Or business Incident has a minor impact on users or business, or day issue is a request for further information Virtustream will assign a Technical Account Manager starting on day 1 of the contract The Cloud Platform, Cloud Cover (managed services), and Cloud Security team's will also be assigned to State of Utah upon execution of the contract. All of the individuals assigned to the State of Utah account have significant years of experience in their fields. The TAM assigned to State of Utah will provide reports ad hoc but also on a quarterly basis. The quarterly business reviews include but are not limited to performance measurements, service requests. On a monthly basis, the TAM will provide a consumption report detailing the items consumed by each virtual machine. This delivers a very granular cost breakdown to State of Utah which will allow the data to be carved multiple ways. Also, information can be gathered by the State of Utah team any time they want from the xStream portal. State of Utah can also issue a ticket to Virtustream operations center to request information as well. The TAM will conduct scheduled meetings and be in constant contact with State of Utah. The TAM is an extension of the State of Utah team. Virtustream defines a Root cause analysis (RCA) as the formal process, documented in writing by Virtustream and approved by Customer, to be used by Virtustream to diagnose problems at the lowest reasonable level which includes a report of the corrective action to be taken and defined timelines for corrective actions, which shall eliminate, to the extent reasonably possible, repeat failures. The following details the RASCI for RCA's: carahsoft 1.40 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Request Root Cause Analysis tickets by contacting the Virtustream TAM (Customer requests Incident report/Problem R/A S record) Document, track and manage all Problem tickets using ITSM S PJA system Provide Problem management review and Root Cause Analysis (RCA) for all in -scope P 1 Incidents (preliminary report within 48 S R/A hours; final within 15 calendar days) Provide Problem management and RCA of identified Problems S RIA (e.g., reoccurring events, alerts) - investigate and diagnose 8.12.4 Describe the consequences/SLA remedies if the Respondent fails to meet incident response time and incident fix time. CA APM In the event that the Service Level Availability committed decreases below the Threshold for Service Availability Default, Minor or Major, Customer may be entitled to take action as outlined in the contract. MAA In the event that the Service Level Availability committed decreases below the Threshold for Service Availability Default, Minor or Major, Customer may be entitled to take action as outlined in the SaaS Listing. CA Agile In the event that the Service Level Availability committed decreases below the Threshold for Service Availability Default, Minor or Major, Customer may be entitled to take action as outlined in the contract. ASM In the event that the Service Level Availability committed decreases below the Threshold for Service Availability Default, Minor or Major, Customer may be entitled to take action as outlined in the SaaS Listing. AODocs If AODocs does not meet the SLAs, the customer will be eligible to receive a service credit. ........ ...�._.�.. _... Virtru Email support@virtru.com ServiceNow ServiceNow or its authorized reseller, as applicable, will use reasonable efforts to meet the target response times and target level of effort stated in the "Customer Support Policy" contained within the "Subscription Service Guide" included with this res onse for more information. SAP Ariba As part of the Cloud subscription, Ariba provides Customer Support services to help diagnose, troubleshoot and resolve functional and technical problems for all users. Ariba's award winning customer service staff can be contacted via phone (toll free), email orWeb form Monday -Friday, 2415 in multiple time zones and languages. Ariba Connect, our online support portal provides 24/7 support for service and enhancement requests. Customers may also choose to purchase ExpertCare. ExpertCare provides each customer with a named contact within Ariba that acts as an ExpertCare Manager for the customer and is knowledgeable about customer speck business process, configurations and customizations. Fieldglass Our best practice is that the program office (managed by the State of Utah or your chosen MSP) provides first -level support for end users including hiring managers, approvers, suppliers, etc. Fieldglass' multi-lingual helpdesk is available by phone, email or web form 24x7x365.Our English language helpdesk is located at our corporate headquarters in Chicago. Merlin Information Systems Ltd., a UK entity, provides helpdesk service in French, German and Japanese from its Manila, carahsoft 41 carahsoft- Agreement No. 7434 SOLICITATION # CH16012 — Philippines and Debrecen, Hungary to _ ... prepared to assist with technical, functional or administrative questions about the Fieldglass application. _ _ Hanna Customer keyusers have several options to communicate P IT p �� incidents into SAP Managed Cloud Delivery. Primary entry point: The best and easiest way to get an incident resolved is by creating and sending incidents directly to SAP Managed Cloud Delivery Service Teams via the SAP Support Portal. This communication channel ensures that all support teams are notified and therefore is the most preferred way to contact SAP on support/service related issues. Alternative option to the primary entry point: Customer key user can also communicate incidents by telephone via the SAP Customer Interaction Center (CIC) (e.g. in case of facing challenges in submitting an incident via the SAP Support Portal). Exceptional option: During business hours, customer key user may also communicate urgent incidents by contacting designated SAP Managed Cloud Delivery service contacts like Customer Engagement Service Manager (CESM) to create an incident on behalf of the customer. However — as already mentioned - this is not the preferred way of communication, but only should be applied in exceptional cases. Support times are contractually agreed upon with each individual customer organization. The SAP Managed Cloud Delivery (MCD) Service Desk and the Service Teams are spread across Europe, Americas and Asia.As a result of the global set-up across several time zones, SAP MCD Service Desk is able to provide worldwide 24/7 support to customers, throughout the entire year and according to the "Follow The -Sun -Principle Hybris Key service levels are delivered through service level objectives, which provide for uptime of 99.9 for the hosted environment. Furthermore, monitoring is in place to report and alert upon uptime and response times of the environment to ensure best possible performance. The following support is specifically for the SAP Hybris Commerce, Cloud Edition. Customers can contact SAP Hybris Commerce, Cloud Edition technical support by toll -free telephone number or e-mail 24 hours per day, seven days per week. Based on the priority level, SAP Hybris's support personnel will attempt to provide Customer with remote assistance for reported issues. Contact information for technical support is as follows: Toll -Free Telephone Number: 888-944-2664 ext 6 In the event that Customer contacts SAP Hybris support, SAP Hybris shall respond to such reports as follows: Priority Level : Characteristics Response Time Resolution Time Objective carahsoft 142 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Priority Level 1 Fatal Issue: Problem causing the Customer Website to cease from operating. This situation is generally described as a total failure. 25 Minutes (7x24) 2 hours Priority Level 2 Major Issue: Problem causing the Customer Website to experience major problems with it ability to operate. This situation exists when the Customer Website is partially failing however it is still able to function. 25 minutes (7x24) 12 hours Priority Level 3 Degradation of Performance: Problem affecting only certain non -critical functions of the Customer Website. This situation is occurring when the Customer Website is usable but has certain limited functions. 2 hours 1 business day Priority Level 4 Minor Issue: This situation includes all other non -critical problems. It is present when the Customer Website is usable however the problem results in a minor issue affecting it. 2 hours 3 business days Upon receipt of a service call classifying the priority level, SAP Hybris will deploy commercially reasonable efforts to respond and assist in the resolution of the problem. Application support for code developed by Customer or its implementation partner will be provided by Customer or Customer's implementation partner. If SAP hybris provides SAP Hybris Commerce, Cloud Edition support to a Customer as requested by Customer, and it is subsequently revealed that SAP Hybris was not responsible for the problem or the problem was not classified correctly by the customer, Customer will pay SAP Hybris on a time and materials basis for such su ort and assistance. Success Factors VMware Our Availability Commitment for VMware AirWatch is 99.9%. ITThe SLAs are s.. ubject to the terms of the applicable Terms of Service for VMware AirWatch. If the Availability of a class of service that you purchase is less than the associated Availability Commitment, then you may request Service Credits for that affected class of service. Availability in a given month is calculated according to the following formula: "Availability" = ((total minutes in a calendar month — total minutes Unavailable) I total minutes in a calendar month) x 100 A class of service will be considered "Unavailable," subject to the Service Level Agreement Limitations set forth below, if VMware's monitoring tools determine one of the following events has occurred ("SLA Event"). The total minutes that a class of service is Unavailable for a particular SLA Event is measured from the time that VMware validates the SLA Event has occurred, as defined below, until the time that VMware resolves the SLA Event such that the Service Offering is Available to you. If two or more SLA Event occurs simultaneously, the SLA Event with the longest duration will be used to determine the total minutes Unavailable. carahsoft 143 carahsoft Agreement No. 7434 SOLICITATION # CH16012 1. Each of the following will be considered an SLA Event for the Dedicated Cloud, Virtual Private Cloud, or Virtual Private Cloud OnDemand Services: a) Any of the network interfaces of the Service Offering Network are unavailable for more than three (3) consecutive minutes. The "Service Offering Network" means the network that extends from the network interfaces of physical host servers for a class of service to the outside network interfaces providing the Service Offering's public intemet connectivity. b) The data store(s) associated with your block level storage for a class of service are unavailable for more than three (3) consecutive minutes. c) The self-service console, available at https://vchs.vmware.com, cannot successfully authenticate a simulated user for more than five (5) consecutive minutes. d) Your running virtual machines for a class of service become inaccessible for more than five (5) consecutive minutes due to physical host server failures. 2. Each of the following will be considered an SLA Event for the Data Protection Service: a) The backup storage repository associated with your Data Protection service is unavailable for more than three (3) consecutive minutes. b) The start time associated with your backup scheduling window is missed for longer than thirty (30) consecutive minutes. c) The standard 24-hour recovery point objective (RPO) is missed for any virtual machines actively enrolled in the service. d) Any restore operation for a virtual machine fails to complete due to backup infrastructure failures. 3. Each of the following will be considered an SLA Event for the Disaster Recovery Service: a) Any of the network interfaces of the Service Offering Network are unavailable for more than three (3) consecutive minutes. b) The data store(s) associated with your block level storage for replication is unavailable for more than three (3) consecutive minutes. c) The self-service console, available at https://vchs.vmware.com, cannot successfully authenticate a simulated user for more than five (5) consecutive minutes. d) Your failed -over virtual machines for a class of service become inaccessible for more than five (5) consecutive minutes due to physical host server failures. e) Any built-in service functions for failover testing, planned migration, or live failover and recovery result in virtual machine replicas not powering on in less than 4 consecutive hours from the time a request is acknowledged and approved by VMware. 4. The following will be considered an SLA Event for the Object Storage service: a) A more than five (5) percent Error Rate for more than ten (10) consecutive minutes — where "Error Rate" means the number of valid requests that result in a response with HTTP Status 500 and Code "Internal Errol" divided by the total number of valid requests during each five-minute FireEye FireEye shall use commercially reasonable efforts to correct any reproducible programming error in the Software attributable to FireEye, employing a level of effort commensurate with the severity of the error, provided, however, that FireEye shall have no obligation to correct all errors in the Software. ,. ,.E �.,, .... ..... ..... ...�......... F". 8.12.5 Describe the firm's procedures and schedules for any planned downtime -- .............. CA APM Planned downtime is scheduled, and customers are notified MAA Customers ._._... .............. rs are notified at least two weeks in adv ance for planned downtime__ CA Agile Regularly scheduled maintenance (planned downtime for upgrades and maintenance) where the customer has been given at least eight (8) hours notice does not count as downtime. Unscheduled maintenance, in which the Rally Service is unavailable and carahsoft 144 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ........ ........ ..... provided t.. advance notice was not o customers, will be counted against st the the up -time SLA. ASM Customers are notified at least two weeks in advance for planned downtime. Google Google s maintenance routines are done in a manner that ensures there is no need to schedule any downtime. ......._._ ....�_....... �..._ AODocs AODocs's maintenance routines are done in a manner that ensures there is no need to schedule ay downtime, Salesforce There are two types of maintenance at Salesforce -...........................W— System Main tennaa nce and Release Maintenance. System Maintenance is for sustaining the performance, reliability, security, and stability of the infrastructure supporting our services. When maintenance is scheduled, the specific timing and availability to be expected during that time will be communicated to all customers approximately one week in advance of the maintenance window upon login to Salesforce and via a posting to http://trust.salesforce.com/trusVmaintenance. In the event of planned maintenance where the services will be unavailable for more than four hours, or that requires customer action in advance, Salesforce endeavors to communicate via email several months in advance. Please Note: If emergency system maintenance is required, customers may be notified less than one (1) week in advance. Major Release Maintenance is for upgrading the services to the latest product version to deliver enhanced features and functionality. Major release dates and times are posted on http://trust.salesforce.com/trusUmaintenance approximately one month before release to Sandbox instances. An email notification and blog post regarding Sandbox preview instructions is also sent approximately one month prior to upgrading Sandbox instances. Email notification of major release dates is sent one month prior to upgrading non -Sandbox instances. The Release Notes document describing the new features and functionality is posted in Help & Training one month prior to upgrading non -Sandbox instances. Final release reminders are communicated to all customers approximately one week prior via email and upon logging into Salesforce. Major release maintenance occurs three times per year. The instance will be unavailable for up to five minutes during the release window. Patch Releases and Emergency Releases are used to deliver scheduled and ad hoc application fixes. Patch releases are scheduled weekly and are usually deployed to instances on Tuesday, Wednesday or Thursday, with release to Asia -Pacific instances the following day. Emergency releases are conducted on an as -needed basis and can occur any day of the week. Whenever possible, patches and emergency releases are deployed during off-peak hours and without _ downtime. _ ServiceNow ServiceNow notifies customers at least 10 days prior to scheduled maintenance for infrastructure network, hardware or software that might impact service. ServiceNow targets no more than two hours of downtime due to scheduled maintenance per month Docusign Continuous availability is a necessity for mission -critical business applications in a global world. It's also a key component of the xDTM standard. Zero maintenance downtime means that DocuSign is always available, regardless of the time -of -year, day -of -week, time zone or country. DocuSign's Carrier Grade System Architecture, a first in SaaS, eliminates maintenance downtime, and ensures the highest level of performance resiliency and data integrity. This is accomplished through a combination of advanced high availability architecture, native DocuSign engineering, and both s„pecialized and commodi hardware and software components. SAP Ariba Scheduled downtime windows for maintenance, upgrades or new releases are provided in the Service Level Agreement. Our uptime percentage takes scheduled maintenance into account. ird carahsort 145 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Fieldglass Fieldglass' maintenance windows are as follows: Friday maintenance window of 11:00 p.m. — 2:00 a.m. Central (Daylight Savings Observed) • Extended maintenance windows are taken with five days advance notice and are typically as follows: - Second Friday of each of the following months: March, July, and November - Critical service packs, security issues, and other emergencies will still be taken if needed with communication as reasonable Hanna SAP performs eriodic scheduled twit security patching p p maintenance activities to maintain security patching levels, application transports, fixes, network maintenance, and other scheduled proactive activities during scheduled maintenance window (agreed to by the customer). The predefined maintenance window is 4 hours per month (for example first friday of every month) SAP may perform additional maintenance services on the Customer's Computing Environment in agreement with Customer, with at least ten (10) Business Days prior notice (which notice may be by email to Customer's nominated contact or posting) of the date and anticipated length of the maintenance window, and provided that SAP adheres to Customer's reasonable requirements as to the timing and duration of any such maintenance. SAP reserves the right to apply critical application and operating system security patches in compliance with the SAP Global Security Team's reasonable recommendations. SAP will use reasonable endeavours to provide Customer with forty-eight (48) hours advance notice regarding the critical patch deployment unless a shorter notice period is required in order to address a critical security issue. Non critical security issues shall be dealt with b Scheduled Maintenance Hybris Typically they are two-hour maintenance wind — ........-ITITIT ows, with no downtime or on occasion maintenance periods require between 2 to 10 minutes of downtime. Other rare periods which may require further maintenance could have downtime between 30 min to 4 hours. SuccessFactors To address issues such as security patches, hot fixes, updates, equipment upgrades, etc., we has established maintenance windows to perform scheduled maintenance. Scheduled maintenance events typically occur during only one of these windows, roughly every 6-8 weeks. A 14-hour/week window will be used for all critical / most emergency patches and all bug fixes (will include tech stack and application patch sets). We define scheduled downtime maintenance windows as: Midnight to 7 a.m. Fri -Sat local time + midnight to 7 a.m. Sat -Sun local time (dependent upon the data center where the customer data is hosted) We will provide customers with at least a 2 days' notice if a larger maintenance window is needed. Typically, for HCM / LMS products, customers receive a 3-5 day notification (via popup on login). When the system is not available during the maintenance there is a notification page displayed for the outage timing. W—p) n maintenanc events. onservativelhand use them sparnngl VMware VMware IaaS Services Customers are notified in advance of any expected downtime with vCloud Air services. In the event of an unexpected outages or disruption to the service, customers will be notified via their preferred contact means as soon as possible as per the terms outlined in the Service Level Agreement. VMWare AirWatch carahsoft 146 carahsoft __ Agreement No. 7434 SOLICITATION # CH16012 We maintain standard SLAs with our customers to provide for downtime • SLAs are defined within the AirWatch Hosted Services Policy Per our Hosted Services Policy, we provide outage credits in the event of a service interruption: • ""AirWatch warrants it will provide Availability of the Hosted Services 99.9% of the calendar month (the "Service Level"). To the extent that the Hosted Services fail to conform to the Service Level, Customer may request service credits ("Outage Credits") as provided herein. A failure or lack of Availability for any period of time of at least one minute during which Customer is unable to utilize the Hosted Services due to AirWatch's failure to provide Customer with the specified services constitutes an "Outage". All Outage measurements will be rounded up or down to the nearest one minute increment, with increments equal to or greater than 30 seconds being rounded up to the next minute. Outage Credits are based on cumulative periods of Outage over a calendar month. Final determinations of the length of the cumulative periods of Outage over a calendar month shall be based on AirWatch's internal monitoring equipment and records. Outage Credits will be taken aq.ainsthe Hosted Service fees for the month in which the Outage occurred."" _... ... _.�.. _. ..._._.. FireEye FireEye undertakes reasonable efforts to ensure that the service availability maintains a minimum of 99.9% availability. However there are circumstances where the system will be down due to the following: a) "Scheduled Maintenance Period" is the period during which weekly scheduled maintenance may be performed, or a maintenance window otherwise mutually agreed upon by FireEye and Customer. Customers receive notification and announcements for any scheduled maintenance period. b)"Emergency Maintenance" means any time outside of Scheduled Maintenance that FireEye is required to apply critical patches or fixes or undertake other urgent maintenance. If Emergency Maintenance is required, FireEye will contact Customer and provide the expected time frame of the Emergenc�Maintenance VirtueStream Virtustream planned downtimes start with the weekly change board meeting by the Platform Operations group. All requested changes whether requested by customers or by the operations staff are reviewed, if approved then scheduled. Depending on the nature of the change, routine and planned, the affected customers are notified as early as possible and adjusted based on customer needs. For example, if the scheduled downtime falls on a weekend that a customer plans to do their quarterly close, Virtustream will reschedule. An emergency/urgent change may have less notice for the customers. But in all cases, customers will be notified of the upcoming downtime multiple times, start of the downtime will be specified and the expected duration. Once the downtime is complete, another notification will go out to the affected ......� ., 812 6 Describe the consequences/SLA remedies if disaster recovery metrics are not met. l r ., ,� - ,,,��� carahsoft 147 carahsoft Agreement No. 7434 SOLICITATION # CH16012 _.. _ .._..... For business continuity purposes, Salesforce supports disaster recovery with a dedicated team and a 4 hour recovery point objective (RPO) and 12 hour recovery time objective (RTO). Additional details can be provided with the execution of an NDA between Salesforce and your Agency. In terms of remedies, the Salesforce Service Terms incorporated as part of the End User Licensing Agreement indicate the following regarding Termination allowing customers to terminate the contract at time of renewal: User subscriptions will automatically renew for additional periods of one (1) year at the list price in effect at the time of renewal unless You give Your Reseller notice of termination at least 30 days ....... rior to the end of the relevant subscri tion term."" ServiceNow See 8.12.2 for the Availability SLA Docusign See 8.12.4. SAP Ariba _ Please see the details provided in 8.124 response. Field lass Please see the answer to Question 8.12.4, above. Hanna Penalties and remediation for SLA violations are detailed in the —State ment of Work. Hybris Our SLA provides tenant remuneration for losses they may incur due to outa es within the infrastructure. VMware For VMware there is a service credit reimbursement structure outlined above. We ha ve detailed recovery procedures that include defined steps, roles and responsibilities and accountable personnel to help ensure streamlined disaster recovery. As conversations progress, AirWatch can provide specific details regarding our disaster recovery timelines and strata ies. FireEye FireEye has established formal Business Continuity and Disaster Recovery plan, as well as Incident Response and Recovery Plans to help maximize availability of critical customer -impacting services. 8.12.7 Provide a sample of performance reports and specify if they are available over the Web and if they are real-time statistics or batch statistics. CA _ APM A report of the Service's measured monthly SLA is available le to Customer upon re uest .......... �� Reports ._..._.._. _ _ are generated periodically and ad hoc. Customers can use their support.ca.com credentials to access private trust site which contains SLA details for the subscribed service. _ CAA ile Realtime and historical m s system _ y _�„status can be viewed at htkps:��status.raliydev.com �q P ically and ad hoc 9 9 P P Google Google does not produce customers specific � ....-� .._ ASM Reports are enerated erio is performance reports. The web based Apps Status Dashboard displays real time System Availability Details. Customers can works with their Google reseller to design a reporting system using Google Sheets based on which incident actually impacts their end users. Service availability issues are isolated to specific applications and specific AODocs AODocs h�a act all of locations and thus would not urn urmusers or urITaccount at all. cs does not produce customer specific performance reports. Customers can visit the AODocs status page: status. aodocs.ccm. AODocs provides a set a usage reports and AODocs - ., to build specific resorts �o work with the customer �m.. team can _ ...� _ interactions. Virtru .-_ actions. Salesforce System Performance Re ortsOur track record speaks for itself—Salesforce has �� Aerations and client side inter p p maintained high levels of availabilitv across all Salesforce instances since inception As an on -demand vendor carahsoft 148 carahsoft Agreement No. 7434 SOLICITATION # CH16012 providing daily service -quality data on a public website (http://trust.salesforce.com), Salesforce proves that it is a leader in availability. And by making its track record completely transparent, salesforce.com proves it is worthy of customers' trust. A few metrics that we maintain (and publish publicly via our trust.salesforce.com website) are: -Daily Transaction Counts -Daily Transaction Speeds Salesforce is hitting almost 4 billion transactions a day. These transactions are a mix of user interacting with the system and API calls where other systems are bi-directionally interacting with Salesforce. Our Average Transaction Time hovers between 150 and low 200 milliseconds. Some additional published metrics are uptime & availability, planned maintenance windows, and any performance degradation. The Purchasing Entity can view all of this information and more by going to trust. salesforce.com. Customers can also log a case to request system uptime reports for the last 6 months and last 12 months, however,, system m reportsarenot automatically distributed. _.._ ......................�__._...._ ServiceNow Administrators can view a wide range of performance metrics for their instance and for the machine on which the instance is running, displayed in a graphical format. Add these graphs and their controls to a home page to monitor the performance of instances. Some of these graphs are intended for use by ServiceNow Technical Support to troubleshoot performance issues or help tune your system for maximum efficiency. Each graph enables admins to filter the data by using different measurements, such as maximum and minimum values, means, and medians. The available graphs reflect performance in eight functional areas of ServiceNow. Database -Discovery -Disk Partitions -Linux Stats -Logging •MySQL Overview -Node Metrics -Replication -ServiceNow Servlet Docusign For real-time data, please vis_if the DocuSign Trust site (trust.docusign.com) for additional information. SAP Ariba We provide a monthly report to customers describing the system availab ility percentage. Depending on the cloud service, these reports are made available either by email„ thr.0 h the cloud service or through an online portal, Fieldglass Fieldglass executes comprehensive performance testing prior to each release to production. Performance testing is executed in accordance with the Fieldglass Performance Testing Standards document. Types of testing performed include regression, load, stress, and endurance. Results are reviewed and approved by senior members of development, QA, IT, and the Chief Architect. Our standards document can be shared upon request while under NDA. During peak periods, Fieldglass will see 12,000 concurrent users with page response times averaging 400-700ms. Across all of 2015, we have a 99.4% success rate in meeting or exceeding all monthly customer SLAs for page response times. Hanna Performance reports on -HE Care available to the customer via the SAP One Portal page. It provides the customer among other things: operational info about systems being managed, incident management, security management, �m userspecific settin s, planned downtime, etc. carahsoft 149 carahsoft Agreement No. 7434 SOLICITATION # CH16012 SuccessFactors Customers can view hostingperformance ..__ ....... ._.. . p mance and availability information real-time at the following link: https://suppoq.successfactors com/Service_StatusIT VMware VMware IaaS Services VMware vCloud Air provides Web -based capacity reporting via the MyVMware portal. For detailed performance reporting, participating entities may wish to acquire VMware vRealize Operations suite, which is a non -Web based software product which provides real-time and historic performance statistics for vCloud Air. VMWare AirWatch We can provide sample performance testing documents that validate our ability to handle anticipated workload under real -world conditions as conversations progress. We have a dedicated team for scalability and performance testing. They work with both internal teams and customers to conduct testing.. .....�__... __._._. FireEye This is not applicable as each of the FireEye offerings are classified as SaaS. The performance of the FireEye cloud environments are continuously monitored and managed by the cloud service _,operations CSO team to ensure secure operation and availability VirtueStream Service Levels will be calculated and measured monthly by Virtustream on a calendar month basis and reported each month for the previous month. The reports will be provided to Customer by the tenth (10th) working day of the month following that to which such report relates, commencing on the second (2nd) month following the Service Start Date and each month thereafter. The monthly service level report will contain at least the following items: (i) Uptime statistics for the month concerned; (ii) an analysis of reported incidents over the previous month, broken down by type for discussion; (iii) action plans for items giving rise to concern; (iv) comments and observations on any issues arising from Virtustream's performance monitoring activities; (v) recommendations on service delivery strategies to maintain or enhance the service level; and (vi) review of general business requirements ("Service Level Report"). Cloud Platform Services (CPS) has its own specific service levels as described in this document. Cloud Cover Services (CCS) has service levels that pertain to the CCS offerings and are reported separately. Not all Virtustream customers have CCS but all Virtustream customers use CPS. l 8.12.8 Ability to pant historical, statistical, and usage reports locally. M, CA APM A report of the Service's measured monthly SLA is available to Custom .. p y Customer upon re uest ..... _.... ......... MAA Same as above. CAAgile This is available ASM Customers are sent monthly SLA re ort� sue_ Goo le See 8.12.7 AODocs See 8.12.7 Fish reports locally for customers. Virtru _ We may be able to publi _ _ _ _„ Salesforce Trust.salesforce.com is the Salesforce community's home for real-time information on system performance and security. On this site you'll find: • Live and historical data on system performance • Up -to -the minute information on planned maintenance • Phishing, malicious software, and social engineering threats • Best security practices for your organization • Information on how we safeguard your data carahsoft 150 carahsoft Agreement No. 7434 SOLICITATION # CH16012 .......... ...... .. _..... ...�..�.._............. In addition to the Salesforce Trust site (http://trust.salesforce.com/trusVstatus) to monitor uptime and performance, your Agency will also have access to a System Overview, which will help you monitor performance and usage of your own Salesforce org. This overview includes: Schema - # and % of custom objects and data storage Business Logic - # and % of Rules, Apex triggers and classes, as well as % of code used License Usage API Usage - # and % of requests in the last 24 hours User Interface - # and % of custom apps, sites, flows, custom tabs and pages Portal Usage The above list is of all the possible metrics that you may have in yours sYtem overview. ServiceNow Yes. Instance performance can be viewed locally. Customers can use the Customer Support Portal to obtain information about the real availability of all their instances. Real availability is the percentage of production time that an instance is up and available for use. Docusign Yes. DocuSign offers a number ofpre-defined reports to provide detail and summary information on DocuSign usage in the account, such as by Envelope, Recipients, Velocity of signing, and User Access among many other reports. Users can modify report criteria such as data ranges and re orts can be scheduled to execute. All reports can be downloaded or Printed locally. .._..... ...... QTS Yes _ ._.. SAP Ariba User access is brow_...... _...... ser-based, so printing is enabled via the printers that are setup on the user's workstation. There are several "Print" buttons throughout the applications that will open an additional browser window with a printer - friendly format of the screen. Fieldglass Any user with the correct permissions in the system, as specified by the State of Utah, may locally print historical, statistical, and usage reports. Hanna _ Yes, available ....... VMware VMware IaaS Services At the present time, VMware does not provide end user customers with specific reports for SLA performance. VMware tracks the overall health of the environment and will report to customers in the event of an outage. However, specific SLA performance is not delivered as a report, but as an alert. It is currently the customer's responsibility to track downtime within their environments and report to VMware when they believe SLA has been violated. VMWare AirWatch Customers can export and print solution data using interactive dashboards (CSV), reports (PDF, XLS, and CSV), the AirWatch Hub ........................(PDF), and event log (CSV) _ _.. FireEye Each of the offerings in this response have reporting capabilities local to the system and users with the appropriate access ri htgs. 812 9 Offeror must describe whether or not its on -demand deployment is supported 24x365. �, �,v,..a �.�, , ,,, 7. ,,, .�, „� ���,,, ti.,eJ111 . carahsoft 151 carahsoft Agreement No. 7434 SOLICITATION # CH16012 .m ............ .......................................... ... ___. or other infrastructure hardware and software necessary. The service is always available and the customer can de Io 24x365 at their own pace m _ ......... ServiceNow ServiceNow is su orted 24365. _ FireEye The FireEye offerings in this response are se rvice ervice models. Once t ITITITITITIT � � he application or service is set up there are no further deployment steps necessary. On -demand Self-service options referenced in section 8.1.2.1 are available 24365. _ VirtueStream Virtustream's _self-service portal -allows authorized users to deployresources esources on -demand 24x365, 3 8.12.10 Offeror must describe its scale up and scale down, and whether It Is available 24x365 . ....�._.�.......................... .., _................ CA N/A. CA only offers SaaS solutions and manages all aspects of the service; monitoring and ca "acit fanning is included as part of the service. Google Purchasing entities will subscribe to an initial set of user licenses and can provision new user accounts at their convenience within that range of licenses. If the purchasing entity has exceeded or is about to exceed their user count they can place an order for additional licenses at any time. Scale -down procedures will be handled on the renewal anniversa Salesforce The Salesforce cloud based architecture will allow the State to deploy Salesforce solutions rapidly and scale at will for future needs. Customer's may scale up and add licenses at any point during their annual contract cycle. User counts are examined on an annual basis at time of renewal to ensure the customer had adequate license cove...rage. ServiceNow ServiceNow can automatically scale its application servers horizontally by adding or subtracting them to the load balancer pools for a particular instance. Scaling is managed by the ServiceNow Cloud O eratfons team. FireE a The FireE a offerings in this response are SaaS service models.. Fi y y g p reEye cloud environments are continuously monitored by cloud service operations (CSO) personnel to help ensure optimal resources are allocated to the system 24365 VirtueStream Virtustream's self-service portal allows authorized users to deploy or de -commission resources on - demand 24x365. Describe your level of disclosure with CSA Star Registry for each Solution offered a. Completion of a CSA STAR Self -Assessment, as described in Section 5.5.3. b. Completion of Exhibits 1 and 2 to Attachment B. C. Completion of a CSA STAR Attestation, Certification, or Assessment. d. Completion CSA STAR Continuous Monitoring Carahsoft is proposing a number of Service Providers that are members of the Cloud Security Alliance. For example Salesforce is a corporate member of the Cloud Security Alliance (CSA) and contributes to their research and initiatives in a variety of ways. Salesforce has completed the CSA Consensus Assessments Initiative questionnaire (CAIQ), which maps to the CSA Cloud Controls Matrix (CCM) for the Salesforce Services, including Force.com, Analytics Cloud, Communities, Chatter, Sales Cloud and Service Cloud. A copy of the current completed CSA CAIQ can be provided to prospects or customers under NDA upon request. 8.14. 1 Describe in detail how your firm processes emergency or rush services implementation requests by a Purchasing Entity. carahsoft 152 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ........... ....... ..... _.uu _...... ...... .......... CA APM CA SaaS Ops has a rigorous service introduction and update process that is governed by a central body to ensure adherence. Every step in the process is recorded, tracked and approved. _........_...._..._ ......._ MAA Standard lead times for requests can be waived for requests that have a critical business need CA Agile Standard lead times for requests can be waived for requests that have a critical business need such as a data recovery effort ASM Standard lead times for requests can be waived for requests that have a critical business need such as a data recover effort Goo le Order processing from the time a valid Purchase Order is submitted has a normal turn aro-........ 9 P 9 and time ..... of three business days. Google's sales team can be contacted to expedite orders when needed. AODocs Order processing from the time a valid Purchase Order is submitted has a normal turn around time of two business days. AODocs's sales team can be contacted to expedite orders when needed. Virfru Requests are triaged by the support and if an emergency is identified, the request is escalated by the VP of Product who immediatee assigns the issue as a top priority to a developer. Once __completed a hotfix is to production. Salesforce Subscription -based, On -Demand Service Salesforce offers on -demand Platform as a Service (PaaS) and Software as a Service (SaaS). The Salesforce PaaS and SaaS offerings are subscription based and in a per user/month or user/year format billed annually with some of our products offered as total logins per month or by defined number of members billed annually. Multi -tenancy gives applications elasticity. Force.com applications can automatically scale from one to tens of thousands of users. Processing more than three billion transactions each day, Force.com is used for large-scale deployments. Any application that runs on Force.com is automatically architected to seamlessly scale from 1 user to 100,000 users without the customer having to do anything differently. All applications (includes mobile, of line and read-only options) and data running on Force.com are deployed to and replicated across multiple data centers in different geographies. Every application, no matter how large or small, gets the full benefits of the backup, failover, disaster recovery, and other infrastructure services required for an organization's mission -critical a lications. --_-.w ....... ........_ ervi SceNow ServiceNow professional"—se" rofessional _ services organization responds to customer needs based on each request. Once a purchase order is received from the Purchasing Entity, ServiceNow contacts the Customer to discuss schedules. Resources are assigned based on the project need. If the customer has a priority issue with the system, they would open a ticket and the ticket SLA process would proceed until the issue is resolved. Every ServiceNow customer is supported based on their priority and need. SAP Hanna Rush or emergency infra provisioning can be request in exceptional situations and would be addressed on best effor pjn rty basis VMware VMware IaaS Services Initial Order - Expedite the purchasing process thro - In the event that an emergency or rush service implementation request is received, VMware's NASPO program manager will coordinate an expedited response depending on the request. - Expedited Procurement - The Program Manager will directly interface with each company in the supply chain to ensure that the order is processed immediately upon receipt by each party. - Expedited In Increased capacity carahsoft IS3 r Agreement No. 7434 SOLICITATION # CH16012 VMWare AirWatch Participating Agencies will work with thier dedicated Account Executive to procure addition services for thier AirWatch implementations. Customers can implement and update configurations through the AirWatch administrative console. Additionally, customers can submit ASK tickets for an solution issues that will be tracked through completion. W FireEye FireEye will ' make every reasonable effort to accommodate rush provisioning requests. The purchasing entity should contact their sales account team who will interface directly with the corresoond'ina imnfementation team to coordinate an expedited implementation. 814 2 Describe in detail the standard lead-time for provisioning your Solutions ,,, �,, ,.,n,. , ,.. �„ �, �,���. _ CA APM 48..._ ......� .... hour turnaround is typicallv required ervi MAA Sces do not generally require client action for provisioning, General service catalo requests have a standard 48 hour lead time CA Agile Services do not generally require client action for provisioning. General service q such as a data refresh„ catalog requests, have a standard 48 hour lead time . ASM Services do not generally require client action for provisioning. General service _ re uests have a standard 48 hour lead time Goo le Standard lead time s three bdays, �.... mmmmm_ IT ....... ....... i business days AODocs Standard lea d time is two business days. Virtru The Lead-time for provisionin is no more than 15 minutes .1.... _ ..._ .... ._..... ServiceNow ServiceNow provisions new instances or newly purchased users or applications to the instance within 48 hours after receipt of order. If users or applications are required more quickly, the customer controls access to all ServiceNOw capabilities at any time and the true -up occurs thereafter. - n DocuSi n �s._ ___..............._.�.. _.._.� ...� Docusi ....� g g intuitive and easy -to -use. Getting started with our cloud solution, standard console, can be implemented in a day. Adding integrations or API's will add to the complexity of the .. im lementation, but our Professional I Services are there to guide you every step of the way. VMware VMware vCloud Air Services VMware vCloud Air OnDemand services can be purchased and provisioned in minutes via the vCloud Air self service portal. VMware vCloud Air services other than OnDemand are purchased via purchase order. Purchase orders are typically processed on the day of order. Once services have been purchased the user can immediately begin provisioning services from the self service in tes of launch. u portal. I. These services are available within m VMware vCloud Government Services VMware vCloud Government Services are purchased via purchase order. Purchase orders are typically processed on the day of order. New environments require an RSA token that is overnighted for 2 factor authentication. Once the user has their RSA token they can begin to provision IaaS Services. VMWare AirWatch AirWatch is committed to implementing the solution in a timely manner and we work closely with customers to meet internal deadlines. Delivery and deployment models will vary depending the hosting model selected by the customer: • SaaS deployments can be implemented within several days and some within a few hours • Large enterprise deployments with numerous integration endpoints may require additional time Once an order is placed, we immediately begin working with the customer to finalize terms and conditions in a mutually agreeable manner and begin the implementation process. We schedule regular check -ins for project status updates and to discuss any questions or concerns. carahsoft _ 154 Agreement No. 7434 SOLICITATION # CH16012 y days. However, anticipates that the standard lead-time is expected to take no more than However, FireEye is willing to accommodate an n urgent request from NASPO in order to FireE a FireE five 5 business rpvlde amdeuate service to the artici tingstates. VirtueStream Virtustream's standard lead-time for provisioning can vary based of the type of deployment and requirement. Resources can be deployed on -demand basis by State of Utah. For the initial services, there is a standard which is maintained as best practice. At project kick-off, Virtustream and State of Utah will develop a detailed Implementation Plan, on a system -by -system, week -by -week basis, to ensure that both sides of the relationship have clear expectations on what is to be accomplished, by whom, and in what timeframe. Upon completion of the Implementation Plan, Virtustream and State of Utah will establish a Project Governance Plan and the Project Governance Plan will manage Implementation Plan and ensure alignment at all tiers of the organization, define expectations for status update frequency and formats, and establish an escalation path for issue identification and resolution. Virtustream offers a dedicated onboarding project team that is charged with migrating clients into the xStream® cloud. This chargeable service includes resources from our platform and SAP teams and development of an onboarding project plan with milestones and deliverables. Virtustream uses a mature methodology to move clients onto our cloud platform, a process which is continuously refined and improved. A link is established to the client site using a Virtual Private Network (VPN) or Multiprotocol Label Switching (MPLS) circuit, for customer access and testing of migrated systems. Prerequisites are put into place (domain controllers, backup systems, infrastructure, networking, etc.) prior to systems being onboarded, in a defined sequence. Virtustream SAP basis team members test the systems before turning them over to Ascend for validation. Once on the xStream® platform, Virtustream monitors, backups and maintains the systems. As a component of the Virtustream platform, all core units are replicated to an alternate data center to provide disaster -recovery capability. Figure 3. Sample Work Plan Creation of the Implementation of • Perform additional Operate Services SAP focused Migration Design 8 Plan profiling & confirm from within an Services Cornerstones deliverables resource optimized cloud • World L,esdem 0 SAP• Cloud Design • Implement Estate requirements environment Cloud Based .Transformation Plan Operational Handover - Managed Services • Project Plan to Cloud Support Team - , SAP based integration •Test Plan • Quarantine: Operate tools allowing fora Risk Mitigation& Services from within cohesive Planning isolated environment infrastructure and Operational Alignment Benchmarking against managed services ,. opq,m4,vr & align to original performance approach CA'gDONE • Implementation Sequence New Cloud Estate in line with original Strategy 8 , Confirmation of Realization of the • World DW55 SAP • Data Ma p Requirements Resources Cloud Strategy based Managed • Network Design Operational Handover Benchmarking Services • SecurityPolicies Documentation Report & Service Global Mana ed g • Data Lifecycle Confirmalion of Service Si n off g Services delivered • IT Service Continuity Migrations DR Test Management Design , Fully integrated cloud • Operational Readiness based service offering Recommendations ; -Award winning detailed transformation -Business Strategy Aligned toolsel Toolset & process Far Solutions A unique and truly l the delivery of optimised •WoMaeading enterprise cloud cohesive inking of Cloud -ISO certified processes latform Cloud infrastructure and cloud based Services p operating from world- Cloud based Managed -industry leading methodologies class hoed risk on sec Services • Mitigated risk on secure platform " Foot"s 0" 9aeoe rO'I'm: howdogm l 8.15 Back Up and Disaster Plan carahsoft 155 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ........ 815.1 Ability to apply legal retention periods and disposition by agency per purchasing entity policy and/or legal requirements CA APM Not currently available. MAA Not Available. _ CA Agile The customer is responsible for the lifecycle of their data. We will retain al l data until it has been deleted from our systems. We can remove data from our systems upon written request from the customer at termination of the contract. ASM Not available. Salesforce Salesforce customers are responsible for complying with their company's data retention requirements in their use of the Salesforce Services. If a Salesforce customer must preserve data and the retention procedures above are insufficient, they may schedule a weekly export of data or copy to a sandbox account. Exports of Customer Data are available in comma separated value (.csv) format by request via Salesforce's Customer Support department. In addition, many exports can be manually -pulled by the designated org administrators....._. ServiceNow Once notified ServiceNow has the ability to leverage our internal clone operation process. This provides a locked state copy of the instance, while the customer can continue working on the production instance. Any data additions, changes or deletes will be on the production but not on the frozen instance copy. Additionally, ServiceNow can freeze backups to prevent them from being over written. Docusi n DocuSicgn customers determine their retention olicies. QTS _ Yes QTS will work with customers to meet legal requirements SAP Ariba For the network's standard record retention is 180 days, but customers can re uest longer terms. Field I............_ _._...... _. g ass Fieldglass has many methods in which we can freeze customer data, today. We have the capabilities to restore, utilizing a point in time recovery method to a secondary system for legal review effectively delivering a system that has been frozen in time for all clients. Hanna HEC standard backup retention is 1 month for productive systems, and 14 days for non -productive systems. However retention period can be changed per TA_uest and may have cost impact. SuccessFactors A customer can configure as many ""purge rules"" as required to comply with data privacy rules. Since these rules vary by country, the solution provides the flexibility to define different retention periods for groups defined by country, department, division, location, job code and hire date. Customers can grant permissions to the appropriate users to create a request to purge data and to approve the request to purge data. These ""purge rules can be scheduled to reoccur. User records are kept in the system, for reporting purposes, but their data is anonymized. Our customers use the solution in compliance with local regulations today in almost 180 countries. VMware VMware IaaS Services Participating entities that leverage VMware Data Protection are able to specify the retention period of their backups to comply with policies and legal requirements. Data Protection leverages snapshots to take an image level backup of virtual machines. When a backup is initiated, a snapshot is taken of that virtual machine. Once the snapshot is taken it is then stored on the Data Protection storage for the duration of the retention period assigned in the policy. The policy column in the screenshot below illustrates the variety of data retention policies that have been set within a sample customer's vCloud Air Data Protection instance. In this example retention policies range from 3 to 36 1.56 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ... WAV"OEVITON 2u4 i �� 8820ea2re 10 VMWare AirWatch Customers can export and archive solution data using interactive dashboards (CSV), reports (PDF, XLS, and CSV), the AirWatch Hub (PDF), and event log (CSV), Customers in a Dedicated Cloud deployment can leverage a robust data mart FireEye Customers have access to data stored in varying cloud solutions and are accessible at any time during the length of the subscription contract. Retention periods vary per service offered. See section 8.7.2 for further information. _ VirtueStream Specific retention requirements can be accommodated on a custom basis. More d.. - etailed information would need to be provided in order to scooe, E 815 2 Describe an known Inherent disaster recovery risks and provide potential mitigation strategies y p P _......_ CA APM DR is provided only in a single geography at this point. Professional Services would need to be en aged to provide multi- eo DR MAA N/A ...._ __.. ...... ........ _ ......_........... CA Agile None - our DR Ian is tested at a minimum semi annually.. ASM one _._ ......... __....... ......- ......._....... Virtru Please see the Virtru Disaster Recovery Plan provided in the Supplemental Information section of this response. Salesforce The Salesforce service perform replication _._... s near real-time replication at each data center and annual disaster recovery tests for the service verify the projected recovery times and data replication between the production data center and the disaster recovery center. The disaster recovery site is a 100% replica of the primary production site of capacity (host, network, storage, data). Data is transmitted between the primary and disaster recovery data centers across encrypted links. Additionally, back- ups of data are performed and data is retained on backups at the geographically separated disaster recoverydata center location CP-4, CP-6, CP7, CP 9, MP-51. ServiceNow ServiceNow is divided into two distinct environments for Business Continuity (BC) and Disaster Recovery (DR). ServiceNow's corporate environment and its data center environments are physically and logically isolated from each other. A disaster in ServiceNow's corporate environment could occur with little or no impact on the ability for the data centers within the private cloud to operate. In both cases, the BC and the DR are supported by a series of SOPs that allow ServiceNow to quickly and effectively take action when it is required. carahsoft 157 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ServiceNow"s customer Did is documented in its Information System Contingency Plan (ISCP.), which covers its data center environments, and includes all customer environments as well as the instances that ServiceNow uses to run its business. ServiceNow formally tests this process on an annual basis and can produce compliance reports for customers requiring them. ServiceNow also uses the process of transferring instances to reduce the impact of maintenance on its service and will move instances out of one data center to the other on a daily basis. As a result, ServiceNow is very well practiced at the process of "failing over" customer instances. ServiceNow's BC process covers its functional offices and is a separate standard operating procedure from its customer environments. The BC Plan (BCP) has been developed in concert with the entire business including Business Impact Assessments (BIA) to understand the impact of the loss of any given systems or locations. Docusign DocuSign is dedicated to providing the industry's most secure eSignature solution through the DocuSign Security Assurance Program. QTS Not having a current copy of your information - Mitigation - QTS's DR High Availability Service provides continuous data replication of your physical and virtual server environments, ensuring you always have access to a current copy of our data, applications and operating systems. SAP Ariba Ariba has a strong disaster recovery procedure, tested every 6 months though has never required to fail over to the backup data center. The RTO is 4 hours and RPO is b minutes. Please see the SaaS Technical Infrastructure Whiteoaoer for addiitonal details. Fieldalass II None. Hanna SAP Hana Enterprise Cloud helps customers improve their Business Continuity requirements with High Availability (HA) , Disaster Recovery & Backup options. High Availability (HA) - HA is achieved by failover to staindby node Disaster Recovery (DR) - Systems are configured in the secondary datacenter. DR is an optional service that can be included as per customer's requirements SuccessFactors We maintain an N+1 approach for all equipment in the hostedcloud environment, so that there is never a single point of failure. All customer database backups are encrypted and streamed in a secure manner from the customer's "primary" data center to their "alternate" data center, allowing for a timely restoration of service in the event of disaster. Based on the terms of the agreement, we will designate one of the data centers as the customer's "primary" data center, with an additional data center designated as the "alternate" for data redundancy and disaster recovery canahsoft 158 Agreement No. 7434 SOLICITATION # CH16012 service outage or data loss in the event of a disaster. Participating entity chooses inappropriate data center service 1egraclation or ,rutage. Participating entity fails to acquire technology leading to inability to recover from disasters. Participating entity fails to ensure cloud RPO & RTO their mission requirements leading to inadequate times and data loss. VMWare AirWatch outage or data loss. In parallel, entities are encouraged to leverage 'Vf&til iata ;[Fite-c-tifur, vCloud Air Disaster Recovery, and other high formal plan is written Participating entities are encouraged to choose datacenter(s) that is Tser performance. In addition, data center should be geographically separated from primary data center. High Risk I Participating entities are encouraged to include DR capabilities in their costs estimates for cloud I deployments to ensure budget is available to acquire those services. High Risk Participating entities are encouraged to review SI-As for each cloud service that they are interested in acquiring to ensure that they meet mission requirements. Care should also be taken to ensure service SI-As do not significantly exceed mission requirements to avoid unnecessary cost. 111, "If I carahsoft 159 carahso-f-L Agreement No. 7434 SOLICITATION # CH16012 Providing a secure and stable product that mitigates vulnerabilities, reduces risk and quickly responds to the evolving threat landscape is considered a top priority. Following the guidelines established in NIST SP 800-30, regular risk and vulnerability assessments are performed against the production environment to identify, assess and remediate emerging threats. When potential vulnerabilities are discovered, we follow a documented procedure to prioritize and deploy necessary patches. -Vulnerabilities and threat -sources are identified by conducting interviews with various members of the Cloud Operations community and mapping data to the AirWatch business landscape. -We can provide additional information as conversations progress. fireEye Varies by service customer qpoyent. Wle define Virt Stream Virt stream has builtdredundancy intlo all layers lolfbthe physiidcal infra trugctgu a in ordertodeliver SLAs up to 99.999% and mitigate any known risks. To further mitigate against the unknown, Core microVM's are designed for mission -critical workloads and include reserved compute capacity in a secondary datacenter and automatic storage replication to facilitate the ability to restore operations in the event of an outage at the primary data center.. 8.15.3 Describe the infrastructure �,. ,�, astructure that supports multiple data centers within the United States, each of which supports redundancy, failover capability, and the ability to run large scale applications independently in case one data center is lost. CA APM AWS datacenters provide redundancy and failover within a single AWS EC2 zone (i.e., a single geographic location). Professional Services would need to be engaged to provide multi- eo DR MAA MAA service is currently available from one data center only. CA Agile We run a hot/warm data center configuration and have the ability to quickly failover if required. Our data centers are —1300 miles apart to ensure redundancy. We perform fulls stem planned switch over testing at a minimum semi-annually" ASM ASM core services run in one primary data center, and can fail over to the DR site if there is a catastrophic failure. .._...... ........................... ....._..... AODocs As described elsewhere in this response, AODocs is built on Google Cloud Platform (AppEngine) and Altirnao does not manage this infrastructure. Virtru _ We operate our infrastructure in multiple Availability Zones, and any given data center failure would not result in data loss. _ Salesforce Customer Data for customers in Salesforce's Government Cloud is stored in two of our U.S. data center locations. Our service is collocated in dedicated spaces at toptier data centers. Salesforce's hardware is located inside of secure server rooms designated to Salesforce and separated by concrete walls from other data center tenants. Individual racks inside of the data center are secured with a lock. Specific racks are allocated for hardware supporting the Salesforce Government Cloud. Access to the racks supporting the Salesforce Government Cloud hardware is restricted to Qualified U.S. Citizens as described in the section above. ServiceNow ServiceNow's data centers and cloud -based infrastructure have been designed to be highly available. All servers and network devices have redundant components and multiple network paths to avoid single points of failure. At the heart of this architecture, each customer application instance is supported by a multi -homed network configuration with multiple connections to the Internet. Production application servers are load balanced within each data center. Production database servers are replicated in near -real time to a peer data center within the same geographic region. carahsoft 160 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ServiceNow leverages this Advanced High Availability (AHA) architecture for customer production instances in several ways: -In the event of the failure of one or more infrastructure components, service is restored by transferring the operation of customer instances associated with the failed components to the peer data center. -Before executing required maintenance, ServiceNow can proactively transfer operation of customer instances impacted by the maintenance to the peer data center. The maintenance can then proceed without impacting service availability. This approach means that the transfer between active and standby data centers is being regularly executed as part of standard operating procedures — ensuring that when it is needed to address a failure, the transfer will be successful and service disruption minimized. See the "ServiceNow Security, Operations, and Compliance White Paper" included with this response for more information. Docusign Each component of our trusted platform - Hardware & Infrastructure, Systems & Operations, Applications & Access, and Transmission & Storage - undergoes tremendous security scrutiny.. HARDWARE & INFRASTRUCTURE Three geo-dispersed, SSAE 16 audited datacenters Near real-time secure data replication and encrypted archival 365x24x7 on -site security Annual Business Continuity Planning (BCP) & Disaster Recovery (DR) testing Third -party penetration testing SYSTEMS & OPERATIONS Physically and logically separate networks Two -factor, encrypted VPN access Professional, commercial grade firewalls and border routers Distributed Denial of Service (DDoS) mitigation Active monitoring and alerting APPLICATIONS & ACCESS Formal code reviews and vulnerability mitigation by third parties Application level Advanced Encryption Standard (AES) 256 bit encryption Key Management & Encryption Program Enterprise -class malware protection Digital audit trail Multiple authentication mechanisms TRANSMISSION & STORAGE Secure, private SSL 256 bit viewing session Anti -tampering controls Signature verification of signing events Unalterable, systematic capture of signing data Digital certificate technology Customer confquraNe data retention proaraim carahsoft 161 carahsoft Agreement No. 7434 SOLICITATION # CH16012 QTS QTS cloud utilizes alternate telecommunications services from both TW Telecom and NTT America that reduces the likelihood of experiencing a single point of failure. QTS's failover facilities in RIC1 and ATL1 are a carrier -class and carrier -neutral datacenter with multiple Internet Service Providers. QTS-FC can establish connectivity with another service provider with 24 hours in the event of an unrecoverable catastrophic connectivity failure of QTS- FC's rima /secondaryprovider, ............. �.. SAP Ariba Ariba has implemented two sites within each region. In North America the sites are currently located in San Jose, California and Sterling, VA. In Europe the sites are located in St. Leon -Rot, Germany and Amsterdam, Netherlands. The act of failing over from one site to another has a design goal for its Recovery Time Objective (RTO) of no more than four hours. The design goal for the Recovery Point Objective (RPO) is five minutes. Disaster recovery options are included for all Ariba Cloud Services. In the event of a fail -over to the disaster recovery site, no customer changes are required as all URLs that customers use to reach the applications will continue to work. Ariba will notify customers via their email addresses in the event of unplanned downtime. Internally, Ariba uses a documented system recovery plan that outlines the approach and steps for recovering the applications. This document defines roles and responsibilities in the event of disaster: Local Ariba staff maintains the hardware remotely. Ariba maintains the application software. Processes are in place to keep database and fileservers in sync between primary and backup data centers. The failover process of all parts of the infrastructure is automated. In the event of a catastrophe, Ariba will declare the primary data center "down" and locally the script will be run to switchover and start the applications at the remote data center. Ariba tests power outage backup scenarios and the Disaster Recovery Plan on a periodic basis to ensure it is a -to date„ successful„ and effective. Fieldglass We host and manage the Fieldglass system within secure Internet data centers provided by CenturyLink in Elk Grove, IL, and our disaster recovery center provided by Equinix in San Jose, CA. Both are managed by Server Central which is a Tier 4 hosting provider and a Tier 1 data provider (see the note below). All systems are ""mission -critical loads"" supported by IDC Redundant Power Management System (UPS, generators etc.). Note: Data centers can be classified by tiers, with Tier 1 being the most basic and inexpensive, and Tier 4 being the most robust and costly. According to definitions from the Uptime Institute and the latest draft of TIA/EIA-942 (Telecommunications Infrastructure Standard for Data Centers), a Tier 1 data center is not required to have redundant power and cooling infrastructures. It needs only a lock for security and can tolerate up to 28.8 hours of downtime per year. In contrast, a Tier 4 data center must have redundant systems for power and cooling, with multiple distribution paths that are active and fault tolerant. Furthermore, access should be controlled with biometric readers and single -person entryways, gaseous fire suppression is required, the cabling infrastructure should have a redundant backbone, and the facility can permit no more than 0.4 hours of downtime per year. Tier 1 or 2 is usually sufficient for enterprise data centers that primarily serve users within a corporation. Financial data centers are typically Tier 3 or 4 because they are critical to our economic stabili and, therefore, must meet carahsoft 162 carahsoft Agreement No. 7434 SOLICITATION # CH16012 higher standards set by our government. Public data centers that provide disaster recovery/backu a services are also built to h[ r standards. _., __ Hanna Infrastructure setup: * Standby SAP HEC systems at DR failover site will be shutdown / not useable during regular operations. * WAN connectivity & special requirements (e.g. acceleration services) fall into the responsibil-ity of the customer. * Customer must have independent network connections to both DR sites. * All DR -relevant systems are going to be installed according to the Adaptive Computing (AC) principle (virtual hostnames + virtual IP addresses HSR will be used to replicate data from Primary to DR site for HANA solutions, similarly Sybase Replication Server (SRS) will be used to replicate data from Primary to DR site for ASE based solutions. For more information, please refer to attached Business Continuity document SuccessFacto rs.... _ ....__,_ �....�. ............ Our infrastructure architecture is designed with high availability in mind, and engineered for resiliency. All major components are redundant, including power, HVAC, fire suppression, and the physical components of our network. Production data centers have strict access controls, and are continuously staffed and monitored to help prevent acts of sabotage or vandalism. All production data centers are ANSI/EIA/TIA-942Tier III/IV facilities, and are ISO 27001 certified. Production data centers are also geographically dispersed to help prevent a single event from affecting more than one data center. In the event a production data center has an outage we failover to an alternate data center in the same geographic region to minimize impact to customers. Our Cloud Operations teams are also geographically dispersed, working in offices in the US, Europe, South America, and India. Should an office be impacted by an environmental event or pandemic, other offices can continue operations. Aspects of the plan are described in the SOC reports, Disaster Recovery Plan ("DRP") and Business Continuity Plan ("BCP") solutions are dependent on several factors. The customer may be responsible for parts of the w y tivitles recove lerbntacult ac VMware VMware IaaS Services VMware offers several technologies to provide redundancy, failover capability and the ability to run large scale applications independently in case one data center is lost. vCloud Air is built upon infrastructure that is architected for High Availability leveraging proven vSphere High Availability (HA), vSphere vMotion, and VMware Distributed Resource Scheduler (DRS). These technologies allow participating entities to migrate live workloads and/or automatically restart VMs in the event of host maintenance or unexpected issues. These technologies also maintain a consistently high level of performance for all tenants. VMWare vSphere vMotion enables migration of live VMs to transfer your workloads during maintenance, without downtime. Unlike other cloud providers, VMWare ensures that tenants are not impacted by standard maintenance. VMware performs vMotion migrations for maintenance behind the scenes for its tenants in vCloud Air during maintenance windows without disrupting tenant applications. vMotion is also used to seamlessly migrate VMs from an on -premises environment to vCloud Air and back. Today, vCloud Air is one of only a few major cloud vendors that uses live migration to do maintenance. This capability will enable NASPO participating entities to perform live migrations to move thier applications to and from the cloud for maintenance and other pi�Toss. This carahsoft 163 carahsoft Agreement No. 7434 SOLICITATION # CH16012 technology inherently prevents the lock -in experienced when migrating to cloud services offered by others. VMware Dynamic Resource Scheduler continuously monitors CPU and memory utilization across a cluster of vSphere hosts, allocating resources among VMs and rebalancing performance during high -volume peak times. This is performed 247 within the VMware vCloud Air environment. VMware vSphere High Availability delivers the availability required by most applications running in VMs, independent of the operating system and application running in it. Whether participating entities leverage Microsoft Windows or Linux; off -the -shelf or custom developed application; single VMs or many, HA provides uniform, failover protection against hardware and operating system outages within vCloud Air. HA can: • Monitor VMware vSphere hosts and VMs to detect hardware and guest operating system failures. • Restart VMs on other vSphere hosts in the cluster without manual intervention when a server outage is detected. • Reduce application downtime by automatically restarting VMs upon detection of an operating system failure. Other cloud providers require you to build availability in to your application. In the best case scenario, this is as simple as including a load balancer in front of multiple VMs in the same tier to achieve basic high availability. However, often the technologies of other cloud service providers requires a complete redesign of the hosted application, and often network devices such as load balancers are offered at an additional cost, unlike vCloud Air. vCloud Air was built to run hosted applications as -is, providing availability down to a single VM instance, and balancing resources across multiple tenant needs with DRS. Unlike other clouds, with vCloud Air and vCGS, participating entities are not required to rebuild thier application to get the flexibility and agility that cloud can provide. Of course, vCloud Air customers usually do not just stop at moving applications to vCloud Air. Once in the cloud they start to explore features like our Advanced Networking Services and using APIs, automation, and Cl/CD tools to deliver services faster. And, where it makes sense, customers do look at application redesigns as well, but with vCloud Air it is not because they must redesign to ensure the application is always available. VMWare AirWatch AirWatch features active -passive configurations for high availability and redundancy with all components made to failover with minimal downtime. Load balancing capabilities are deployed across multiple data centers to ensure immediate server pick up, ensuring zero end user downtime. AirWatch also incorporates replication technology featuring SQL log shipping or network SAN byte replication to reue vent data loss.mmmm .......... ...... FireEye Varies by service and customer deployment. Will be defined during engagement sett w VirtueStream Virtustream's U.S. based data centers are located in Washington, DC, Las Vegas, and San Francisco. All data centers meet the highest industry standard in terms of operational protocol and have redundancy built into all layers of the physical infrastructure. Core microVM's, which are used for mission -critical workloads, provide reserved compute capacity and automatic storage replication so that these systems can be failed over to a secondary data center and have access to the compute capacity required in the event of a catastrophic outage at the primary data center. 8.16 Solution Administration �__8.16.1 Ability of the Purchasing Entity to fully manage Identity and user accounts . „,, CA Pm Customer has full control over all user accounts ......... carahsoft 164 Agreement No. 7434 SOLICITATION # CH16012 ..... _....... _. MAA CA MAA provides user management self-service to customers to manage their own accounts and create accounts for other users. CA A tulle The customer is re�siblIe for�in.g the life�of all user accounts. ASM The Purchasing Entity can manage their account and create sub -accounts within ASM. AODocs _.�......__ ..... .. Com _.... _.. ........ Virtru Virtru does not have an identity _ system. We federate authentication to Oauth and Email loop verification. .._. _ .........._............ ...�..._.......... ........WW_W_ Salesforce Identity Management Logon is form -based. When users log into the Salesforce application, they submit a username and password, which are sent to Salesforce via an TLS-encrypted session. Security features are developed by Salesforce and built into the application. Third -party packages are not used for development or implementation of security internal to the application. In addition, single sign -on and two -factor authentication may be used to authenticate users. Some organizations prefer to use an existing single sign -on capability to simplify and standardize their user authentication. You have two options to implement single sign -on —federated authentication using Security Assertion Markup Language (SAML) or delegated authentication. Federated authentication using Security Assertion Markup Language (SAML) allows you to send authentication and authorization data between affiliated but unrelated Web services. This enables you to sign -on to Salesforce from a client application. Federated authentication using SAML is enabled by default for your organization. Delegated authentication single sign -on enables you to integrate Salesforce with an authentication method that you choose. This enables you to integrate authentication with your LDAP (Lightweight Directory Access Protocol) server, or perform single sign -on by authenticating using a token instead of a password. You manage delegated authentication at the profile level, allowing some users to use delegated authentication, while other users continue to use their Salesforce-managed password. Delegated authentication is set by profile, not organization wide. You must request that this feature be enabled by Salesforce. Salesforce can be configured to utilize Active Directory directly via Delegated Authentication, or indirectly via Federated Identity using either SAML 1.1, or SAML 2.0. Additionally your users can be loaded from information drawn from your Active Directory servers and modifications made in Active Directory can be propagated into Salesforce. Customers can use their own SAML Identity Provider, or license one directly from Salesforce with our Identity Connect product. User Accounts All users and application -level security are defined and maintained by the organization administrator, and not by Salesforce. The organization administrator is appointed by the customer, An organization's sharing model sets the default access that users have to each other's data. There are four sharing models: Private, Public Read Only, Public Read/Write, and Public Read/Write/Transfer. There are also several sharing model elements: Profiles, Roles, Hierarchy, _�aouts, and Field Level secud ServiceNow Customers manage their own instances, including g g users, defining user roles and profiles, and administrating the system. ServiceNow does not have access to the Customer's instances. The ServiceNow wiki has all ServiceNow documentation available. carahsoft 165 Agreement No. 7434 SOLICITATION # CH16012 ............................................................... .. ....... ...... Docusign Yes, DocuSign allows the purchasing entity to mange identities and user accounts. DocuSign for Enterprise is customizable to meet the administrative needs of the largest organizations. Full administration rights give you total control over document custody and retention policies, how signers sign or adopt signatures, user authentication and more. The branding tools QTS 24x7x365 Operations StaffLet QTS provide the expertise and experienced i ients can easel identi documents from our or anizatlom ensure recipients staff to monitor and manage your data center facility. Never again worry about staff turnover or whether your technologists are current with data center best practices. SAP Hanna Yes ......... Services VMware VMware IaaS Sery .. ._... __ VMware management infrastructure requires 2-factor authentication and multiple layers of access control. vCloud Air customers have the ability to provide access to their designated users. User account management is maintained by the customer. control. vCloud Air customers have the ability to provide access to their designated users. User account management is maintained by the customer. VMWare AirWatch The Purchasing entity has the ability to fully manage identity and user accounts for administrators and end users through the web console. Customers can optionally integrate with AD/LDAP to inherit your existing structure and policies. FireEye User identity and account settings are controlled within the administration sections of the FireEye cloud solutions. VirtueStream Virtustream can provide solution for managed solution for Active Directory or LDAP. As standard, we provide support for managing the VM itself and all OS support. However, our typical use case is, customer manages the users and related activities, as Virtustream might not be aware of nof User Management. internal HR elements �. ... „ ,,,,,,,,...� 8.16.2 Ability to anti -virus protection for data .. 1 stores CA APM AWS provides rotectionlvirus scanning for data at rest y _. MAA Lo ical secure isITpr...... b CIamAV Antivirus. g�IT installed on all Linux hosts and TrendMicr o for Windows hosts CAA ile We have CIamAV � _ITITITmmm ASM Lo icy al security is provided by ClamAV Antivirus. Goqg le Comply _.... .................. AODocs N/A Virtru AlienVault IDS is used to perform virus and vulneral i r scans. Salesforce Salesforce runs antivirus software on the production systems that store, transmit or process customer information. The Anti -virus scans host filesystems (not customer data). The antivirus software checks for virus definition updates daily. Other controls are also used to address malware such as hardening the Operating System of our servers, firewall configuration to ensure only required ports are open and all others denied, and use of intrusion detection systems. Access to these systems is restricted to authorized personnel and all these systems, as well as the host platforms, are monitored in real time through a security monitoring system. The application only accepts http and https traffic, but Salesforce does not restrict the file types users can upload. Salesforce does not modify or clean any customer data; the system stores the information provided in an encoded format within the database. It is recommended that customers run updated antivirus and antimalware solutions to help mitigate these threats. The production system receives inbound mail as part of the workflow functionality, but this does not pose any threat to our network, a lication, the email can be executed or transferred„carahsoft or users. No code in w ITITIT 166 carahsoft Agreement No. 7434 SOLICITATION # CH16012 �... eliminatingthe malicious software risk. Email sent from the Salesforce system is not currently y scanned for viruses. _ ServiceNow If Customers want to schedule an antivirus software scan on certain computers aft er apre-defined number of days, Customer would define a model -based plan with a duration -based maintenance schedule. This would do the scan automatically to those models defined in the Planned Maintenance area. ... ...... _. ..._._.._. ._u _.- Docusign Yes, DocuSSi n maintains enterprise -class malware protection. QTS Yes - 24x7x365dependable and detailed support SAP Hanna Yes VMware VMware IaaS Services Anti -virus software is installed on all development, domain and production hardware devices owned and operated by VMware, which hold company data, passwords, or keys. These devices maintain the most recent version of the anti -virus software signature file. VMWare AirWatch AirWatch has installed a best -in -class, continuously -updated anti -virus suite on servers in the SaaS environment ....._ ..... ... _._ FireEye FireEye employs a multi -layered, continuously monitored and engaged set of active defenses to provide anti -virus protection for customer data stores that both meet and exceed traditional approaches. FireEye, and our customers, not only are prepared to reactively withstand attacks from known virus vectors, but since FireEye and our MVX technology is literally, continuously, and securely detonating viruses and other advanced malware on the way to our customers data stores�FireEye proacfively defends from zero day and other emergent attacks as they happen. VirtueStream Virtustream offers Anti-Virus_protection based on_per virtual machine, per month charge. ............. 8.16.3 Ability to migrate all Purchasing Entity data, metadata, and usage data to a successor Cloud Hosting solution provider. . — l,e"-, , , - . , ,, ., ax„ ,,,,,,—JI! Carahsoft will work with each Participating Entity to develop a cost effective plan to assist in the migration and implementation of their data into the new service that has been selected. 816 4 Ability to administer the solution in a distributed manner to different participating entities. Carahsoft will view each Participating Entity as a separate customer and privileges � can be assigned for control access even within the individual services. 816 5 Ability to apply a parficipating entity's defined administration polices in managing a solution Each Participating Entity will have the ability to work with Carahsoft and the Service Provider to identify defined administration policies to mangage the solution. 8.17 Hostin_q and Provisioning 8.17.1 Documented cloud hosting provisioning processes, and your defined/standard cloud provisioning stack. ... CA APM CA SaaS Ops has a well defined Service Introduction and update process, including review boards, staged rollouts and followups to ensure service integrity. Our cloud provisioning stack is tied to AWS EC2 services, and includes S3 and RDS for storage; RHEL instances for the applications; route 53 DNS services; cloudfront for monitoring; and ELB for load balancing 167 carahsoft Agreement No. 7434 50LICITATION ft CH16012 MAA Automation tools are used to install and configure a MAA software on CA infrastructure. SOP documents are used CA internally. CA Agile All new systems should be provisions according to our baseline standards and we use configuration management tools to ensure all systems are created with the same standards. ASM Automati _. on tools are used to install and configure ASM software on CA infrastructure. SOP documents are used by CA internally, Google Google has administrative document and Google Deployment Guides accessible on the web AODocs This is not applicable to Goo Ig e. Virtru Ub - untu AMIs provisioned„ usingnterraform and configured by Ansible Salesforce Cloud Hosting and Provisioning Salesforce's deployment model is a "public" cloud infrastructure, as defined by NIST 800-145. In the Salesforce Government Cloud, an agency dynamically provisions computing resources over the Internet on our multi -tenant infrastructure. This is a cost effective deployment model for agencies as it gives them the flexibility to procure only the computing resources they need and delivers all services with consistent availability, resiliency, security, and manageability. Salesforce provides market leading PaaS and SaaS solutions and is a multitenant cloud -based subscription service. Multi -tenant cloud solutions provide a single, shared infrastructure, one code base, one platform that is all centrally managed, with platform -based API to support all integration traffic, and multiple release upgrades included as part of the subscription service. Multi -tenancy and the Cloud Computing model remove unneeded tasks from the process of delivering, managing, and integrating software. Salesforce customers will not need to maintain any hardware or software. Without multiple versions to support, integrations don't break during updates; they are simply updated automatically. As a result, both the initial integration and its continued maintenance are simplified. More resources can be focused on creating a better product, with a faster cycle of innovation, instead of having to manage the complexity of many different versions to support a vast installed base. Salesforce's position as an online service enables us to roll out all levels of improvement, from patch releases to major upgrades, that are largely transparent to the end users. When a bug is fixed and tested, it is rolled out to the application as part of regular maintenance; the nature of the service prevents special patches and code branches for individual customers, so all fixes can potentially benefit all customers. The Salesforce Services is delivered using a world -class data center infrastructure. Each customer's org is hosted from a primary and secondary production data center, with near real-time replication occurring between the two sites. Salesforce is a pure multi -tenant web application. No software or infrastructure is required by the customer other than a computer, browser and internet connection or a mobile device. User Administration and Provisioning User provisioning and management is performed by the customer through the Salesforce Administrative Setup environment. Users, their profiles, permissions and passwords may be managed, edited, activated and deactivated as needed by those with appropriate permissions. An administrator with appropriate privileges can manage session timeout, password policies, IP range login restrictions, delegated authentication/SSO, and requirements as part of this process. On first time login or password reset request, users are s. required to chan a their asswords to am acces .....�. ITIT ServiceNow ServiceNow includes all documentation on the wiki at wiki.servicenow.com. DocuSign DocuSign hosts customer accounts in its own data centers managed by DocuSign. Upon a new contract executed with a customer, DocuSign provisions a customer account based on the 168 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ....... ...... ........_.... .—..m._................... .................... _ ........... contract terms. A designated point of contact becomes the default primary administrator who then adds additional users and other admin tasks. DocuSign's cloud stack is defined in architecture OTC documents available under se egg date confidential disclosure. ..._ ._..�........... ...... �_._._... .... ........—� ...._ .......... SAP Ariba Our solutions are offered and delivered in a true subscription -based model and shared service (multi -tenant) offering. There is no software to install, no hardware to buy, no maintenance or support costs and no need to hire consultants or tech specialists to run the system. We deploy and manage the infrastructure. Customers only need a web browser for access. Subscriptions include system maintenance, automatic upgrades, enhancements and application of service packs, Level 1— 3 help desk support, professional services and best racticds builtdirectly into the application. _.M Fieldglass Fieldglass maintains its own platforms and follows a mature change control roc s,s for In rodu new systems to the hosted environments. _.. Hanna The Managed Service includes the following: • Infrastructure operations management: monitoring, patching, software updates & maintenance up to the OS Layer • OS management: monitoring, patching, updates, and maintenance of the specific OS • Network and system administration • HANA database platform operations includes: space management revision management, security management, hardware configuration management, backup & recovery, change management coordination • Health check services, proactive monitoring, capacity management • SAP Technical Application Basis Operations (incl. SAP Basis) • Monitoring • Troubleshooting — Incident Management Level 2 and 3 • Patch Management • Housekeeping SuccessFactors We offer a cloud based solution. Our application is standardized on the J2EE technology stack with the majority of our software written in industry -standard software programming languages, such as Java. We also make extensive use of Web 2.0 technologies, such as AJAX and Flash, for improved usability and performance and to deliver a rich and highly interactive experience. Our hardware consists primarily of industry standard web servers, application servers, database servers and storage and networking equipment. Customers share the network security infrastructure, web servers, application servers and database instance, and each customer has their own set of database tables that are logically partitioned in the database containing its own unique database schema. Each company instance can be completely exported out of the database without affecting any other customer. The application utilizes the JAVA and J2EE industry standards. Integration is supported through .CSV, XML and web services standards. The application is portable to any platform and is deployed on Apache (Solaris) Web Servers, JBOSS Application Servers, and Veritas High Availeb�ter Servers„ and utilizes Cisco Networking. _.. VMware VMware laaS Services An interface that allows users to select from a catalog of pre built OS images and allows them to rovision on the tt __� carahsoft 169 carahsoft Agreement No. 7434 SOLICITATION # CH16012 VMWare AirWatch AirWatch uses industry recognized tools and follow best practices to deploy, configure, and maintain server images. We do not apply customer -supplied templates and do not share templates with customers. Our Information Security team identifies applicable security standards and the AirWatch Server Team creates a secure baseline image for deployment throughout the SaaS environment. Due to FOIA restrictions, additional information regarding capacity planning and image creation/safeuardinc cannot be disclosed at this time. mmmm _ ITITITITIT __ This is not applicable as each of FireEye's offerings are classified as SaaS. 8.17.2 Provide tool sets at minimum for: 1. Deploying new servers (determining configuration for both stand alone or part of an existing server farm, etc.) CA APM New servers are predefined by the CA SaaS 0 s toolchain. p ,and automated using AWS tooling to be able to bring up/down servers on demandmmmm MAA Same as above. CAA Agile We utilize configuration g g ation management tools to ensure consistent configuration across our servers. ASM Same as above. _ Google 1. This is not applicable to Google. Capacity planning and server deployment p yment is fully managed by Google. 2. This is not applicable. With the Google IaaS solutions all server images are provided by Google. 3. With respect to the SaaS offfering, Google Apps, if customers have not selected the Google Apps Unlimited option which offers unlimited storage, they have options to upgrade. With respect to the PaaS/IaaS offering, Google Cloud Platform, storage space is allocated dynamically based on actual usage demand. 4. SaaS, Google Apps includes numerous administrative tools to monitor end user and administrator activites." AODocs .This is not applicable._.�.. ....... _....�................�._._.._ ......�... Virtru AMIs provisioned using terraform and configured by Ansible to include all configuration parameters Salesforce This is not applicable. These services while applicable to laaS are not applicable to PaaS/SaaS where all of the infrastructure is managed by Salesforce as the Cloud Service Provider. These services are included and managed as part of the Salesforce subscription service and not directly exposed to the customer. The multitenant architecture and secure logical controls address separation of customer data. There are no dedicated servers used for individual customers. The Salesforce Services infrastructure is divided into a modular architecture based on "Instance". Each Instance is capable of supporting several thousand customers in a secure and efficient manner. Services are grouped within each Instance; with app, search, and database elements contained. There are appropriate controls in place to ensure that any given customer's org (application) is not compromised. The service has been designed to accomplish this and is robustly tested on an ongoing basis by both Salesforce and its customers. An instance consists of a database instance run on clustered database servers and physical storage subsystems. Each server has been allocated a different volume group so it can fail over to P its backup server within the instance independently_cf the others. As scalabilit needs dictate, carahsoft 170 carahsoft Agreement No. 7434 SOLICITATION # CH16012 _... .................... .......... .... additional database instances can be brought online (the application already provides for this). For additional server ca acit , one or more databases could be moved onto its own database server.. ServiceNow ServiceNow has read and understands this requirement. ServiceNow supports only a SaaS environment so there is no orw-premise offering. .......... SAP Ariba Operating systems when installed through default means and with default settings are typically not secure and often include applications and services not required. Ariba has standardized operating systems' installations based on best practices. Ariba servers are configured with just the applications and services required to run the server as designed. Services not required are disabled and binary files not required for operation are removed, which reduces the total number of vulnerabilities a system may have. Ariba standardized installation process also ensures that all servers of the same type are configured exactly the same, utilizing a process that initiates an upgrade to system binaries across all systems. Based on the system type, the configuration will remain the same. If one server type needs to receive a patch for a vulnerable binary file, that patch is pushed to all systems of that particular server type. If that binary exists on all systems, it is patched across all systems. Patches are then included in the build process as well so that future systems built are in compliance with security standards. Ariba uses this configuration process to 'harden'the operating system prior to implementing additional controls as detailed below. _ Fieldglass Fieldglass uses group policy to ensure the configuration of all servers match our securit ret uirements. Hanna HEC is a private cloud offering where servers configurations are discussed and approved by customer prior to dent _..... __ �_...... SuccessFactors We apply hardening in line with ISO 27k standards and audit key areas in the SOC 2 Type 2 report. Audit reports are available to customers and prospects u on completion of an NDA. VMware VMware a _._.. IaS Services vCloud Hybrid Service provides an interface that allows users to select from a catalog of pre -built OS images and allows them to provision on the fly. vRealize Automation is the next level for provisioning, delivering, and managing IT services on VMware vSphere infrastructure as well as VMware vCloud Air all with a unified management experience. It provides governance and blueprints to deliver services from on premise into vCloud Air. Customers can integrate vCloud Air with vRealize Automation. In this setup, users access vCloud Air primarily through the vRealize Automation service catalog which handles authentication to the service itself. vRealize Automation supports VMWare AirWatch AirWatch uses industry recognized tools and follow best practices to deploy, configure, and maintain server images. We do not apply customer -supplied templates and do not share templates with customers. Due to FOIA restrictions, additional information regarding capacity planning and image creation/safe warding cannot be disclosed at this time. FireE a This is not applicable as each of FireEyre's offering are classified as SaaS VirtueStream Virtustream offers on -demand self-service portal where State of Utah can deploy new servers as stand-alone or part of a server farm..mm _ITITITITIT 2 Creating and storing server images for future multiple deployments _.............. . CA _ APM Servers are brow hg t up on demand 171 carahsoft Agreement No. 7434 SOLICITATION # CH16012 MAA Same as above. CA Agile We utilize configuration management tools to ensure consistent confi guration uration across our servers. ASM Same as above. Virtru Provisionin s stem automatically persists all past AMIs for ability to roll -back Salesforce This is not applicable. These services while applicable to IaaS are not applicable to PaaS/Baas where all of the infrastructure is managed by Salesforce as the Cloud Service Provider. These services are included and managed as part of the Salesforce subscription service and not directly exposed to the customer. _ ServiceIl ServiceNow has read and understands this requirement. ServiceNow supports only a SaaS environment so there is no on -premise offering, SAP Ariba Ariba has standard 'realms' which are default versions of the various configurations the Ariba on -demand products can be setup for each customer with one test and one production instance. Ariba maintains all hardware, software, realms and entitlements taking the burden off our customers and suppliers whilst providing a platform to configure to each company's needs and business processes _._._. ......._._.................m Fieldglass Fieldglass uses virtual servers within our hosted environments uses the hardening confi urations to maintain the right level of security...__ Hanna HEC is a private cloud offering where servers configurations are discussed and a roved by customerpror„to dlo�t VMware VMware IaaS Services We also allow for template and gold master images to be stored on -premise and deployed to the cloud as well as storage of templates and master images in vCloud Director catalogs in in vCloud Air VMWare AirWatch Our Information Security team identifies applicable security standards and the AirWatch Server Team creates a secure baseline image for deployment throughout the SaaS environment. Due to FOIA restrictions, additional information regarding capacity planning and image creation/safeguarding cannot be disclosed at this time. FireE a This is not applicable as eachof Fire P�e'sIToffenn9� _IT s are classified as SaaS. VirtueStream Virtustream offers server images, templates, or other methods O iW..._. for VF and blueprints) for multiple deployments as part of standard solution. 3 Securing additional storage space _._ ...... CA -A _PM AWS EC2 storage is elastic, and can be ex anded on demand MAA Virtual stora a can be added when needed. CAA Agile We have redundant systems for all g y critical infrastructure and have the ability to add additional storage if deemed necessary. ASM Additional storage is added manual) AODocs AODocs storage is based on Google Apps Drive storage and with respect to the SaaS offering, Google Apps, if customers have not selected the Google Apps Unlimited option which offers unlimited storage, they have options to up ra . ........ ...... Virtru New hardware added at Cloudant Salesforce Salesforce provides extensive storage capabilities. Storage is divided into two categories: file storage and data storage. File storage includes files in attachments, the Documents tab, the Files tab, the File field, Salesforce CRM Content, Chatter (including user photos), and Site.com assets. Data storage includes the following entities/records stored within the Salesforce application: Accounts, Article types, Article type translations, Campaigns, Cam ai n Members, Cases, Case carahsoft 172 carahsoft Agreement No. 7434 SOLICITATION # CH16012 .... _ ....... .... _. _m............... Teams, Contacts Contracts, Custom objects, Email messages, Events, Forecast items, Google docs, Ideas, Leads, Notes, Opportunities, Opportunity Splits, Orders, Quotes, Quote Template Rich Text Data, Solutions, Tags: Tag applications, Tags: Unique tags, and Tasks. For file storage, Unlimited Edition is allocated a per -user limit multiplied by the number of users in the organization plus an additional per -organization allocation. For example, an Unlimited Edition organization with 600 users receives 1,211 GB of file storage, or 2 GB per user multiplied by 600 users plus an additional 11 GB. For data storage, Unlimited Edition is allocated either 1 GB or a per -user limit, whichever is greater. For example, an Unlimited Edition organization with 10 users receives 1 GB because 10 users multiplied by 20 MB per user is 200 MB, which is less than the 1 GB minimum. Additional storage can be purchased, or files can be exported and archived outside of Salesforce, thus freeing up file storagespace._ ServiceNow ServiceNow has read and understands this requirement. ServiceNow supports only a SaaS environment so there is no on-premi._.. se offering. ale QTS Services that scale _ .... to meet your web and IT infrastructure needs -QTS offers space options from single cabinets to multi -rack cages to private suites. Coupled with configurable primary and redundant power options to run your infrastructure, QTS Colocation services can be scaled to support your near term rowth wre, a rements and future expansion. SAP Ariba We carefully monitor all network interfaces. Internally we are well below capacity on our most congested interconnects. To the internet we use Border Gateway Protocol to peer with redundant Internet Service Provider's and manage the bandwidth accordingly, �.. �............._ --............ .....___ Fieldglass As a software -as -a -service (SaaS), Fieldglass automatically and transparently handles the scaling and redundancy for customers based on SLAs governing performance and availability. Fieldglass monitors application servers, database servers, bandwidth, and infrastructure for average and maximum utilization with Orion. Current utilization averages approximately 20 percent across all components with a goal of scaling the component vertically or horizontally (depending on the specific component) upon reaching a 60 percent threshold). All systems are scalable either horizontally or vertically to handle capacity requirements. This includes but is not limited to web servers, database servers, and storage. Hanna HEC is a private cloud offering where servers configurations are discussed and approved by customer prior to dployment VMware VMware IaaS Services Additional storage can be purchased and provisioned in 48 hours. VMWare AirWatch Our Information Security team identifies applicable security standards and the AirWatch Server Team creates a secure baseline image for deployment throughout the SaaS environment. Due to FOIA restrictions, additional information regarding capacity planning and image creation/safe uarding c nnot be disclosed at this time. FireE a This is not a licable as each of FireEYe's offerin s are classified as SaaS. _m a .... �.., ....,,, 4. Monitoring tools for use by each jurisdiction's authorized personnel — and this should ideally cover components of a public (respondent hosted) or hybrid cloud (including Participating entity resources). carahsoft 173 carahsoft Agreement No. 7434 SOLICITATION # CH16012 CA APM all SaaS based instances are monitored by CA SaaS Ops. With Hybrid deployments, customers can manage the on premise components of the deployment using their own too Ing or CA products .. MAA MAA is monitored internally as well as externally usingmultipletools recognized within indust CA Agile Access to monitoring tools is provisions .-...._ ' g p 'ons according to the principle of least priviledge and is on rid„ based upon business need. ASM ASM uses Nimsoft Monitor, third -party open source monitoring tools, and ASM itself to monitor the health of ASM internal services and servers. AODocs AODocs includes numerous administrative tools to monitor end user and administrator activites. Virtru Dtrace, CloudWatch earch, K ibana Dat... CloudTrail, Lo stache Elastics IT n Salesforce Trust.salesforce.com is the Salesforce community's home for real-time information on system performance and security. On this site you'll find: • Live and historical data on system performance • Up -to -the minute information on planned maintenance • Phishing, malicious software, and social engineering threats • Best security practices for your organization • Information on how we safeguard your data System Overview In addition to our Trust site (http://trust.salesforce.com/trusVstatus), you will also have access to a System Overview, which will help Salesforce customers monitor performance and usage of their own Salesforce org. This overview includes: Schema - # and % of custom objects and data storage Business Logic - # and % of Rules, Apex triggers and classes, as well as % of code used Licenses API Usage - # and % of requests in the last 24 hours User Interface - # and % of custom apps, sites, flows, custom tabs and pages Portal The above list is of all the possible metrics that Salesforce customers may have in their system overview. ServiceNow ServiceNow has read and understands this requirement. ServiceNow supports only a SaaS environment so there is no on -premise offering QTS Alert Logic's Threat Manager Intrusion Detection System (IDS) and Vulnerability Scanning functionality are designed to monitor, detect, report and alert on adverse security issues on behalf of our customers. Within this process there are a number of both automated and manual processes which are supported by our SIEM software ('The Expert System') as well as our Network Security Analysts in our Security Operations Center (SOC). Threat Manager is the Alert Logic IDS and VA scan product. It includes the physical or virtual appliances and software tools used to analyze the customer's infrastructure and monitor that infrastructure for attacks. ActiveWatch is the managed aspect of Threat Manager, providing 24 x 7 monitoring and incident response operations from the Alert Logic SOC. Threat Manager's Expert System identifies valid security events and suppresses false positives through a patented multifactor correlation process. Every security event monitored by its global network of threat sensors is analyzed in real time. When the Expert System determines that a set of events comprise a valid security threat, an incident is created and escalated according to severity via email or through an Alert Laic Network Security Analyst This approach dramaticall carahsoft i7a carahsoft Agreement No. 7434 SOLICITATION i# CH16012 _..... . __ ..._ ......... reduces false positives and keeps analysts and customers focused on real, actionable incidents. In addition, Alert Logic's security research team continuously monitors threat data and tunes the Expert S stem to respond to the most current threats. SAP Ariba Within our solution, specific logging takes place that is viewable by the customer administrator or their designee. Audit logs produced through use of the solution are considered customer data and are maintained within the customer's instance of the database. These logs are retained so long as the customer has an active contract with us. As a user control consideration, customers are responsible for monitoring the proper entry of data to the solution and reviewing reports generated by the s stern, _.._. _._._ Fieldglass Fieldglass has a comprehe nsive set of performance monitoring tools in place. Some tools are built in the application and some are external. The Fieldglass application captures every page hit and the time it takes to respond. It captures the server response time and the client rendering time separately. The average page times are available to be seen by privileged users through the application. The user can drill down to the hour or minute or a single request for analysis. The information can be displayed by time range for all users, by company, or even for an individual user. Orion Network Monitoring watches more than 1,000 different points of interest on the production infrastructure. These monitors include, but are not limited to, the following: CPU, Memory,1/0, Capacity and Synthetic Transactions. These monitors along with our custom application performance monitors are used to produce and comply with customer SLA requirements. Fieldglass also uses Splunk Enterprise Security for event/audit log collection and correlation. Events and logs are retained online for 90 days and of line for two years. Alerts are generated and reviewed as they occur. _. _m...._ ......._................... Hanna SAP HEC uses Solution Maria, er for monitorl� the infrastructure end to end. Hybris SAP Hybris offers continuous 24/7 systems monitoring in -place, which automatically notifies you, SAP Hybris support and optionally your designated implementation partner in the event of any monitored system problem. Tools used for monitoring include HP Sitescope and Nagios. This service ensures quick response times to emergency problems. Standard monitors are in place for basic site availability. Customer can utilize additional 3rd party monitoring services should it wish to add additional monitoring. Upon request, monthly or quarterly reviews are offered to review performance over the period. When a system problem occurs, in addition to monitor alerts sent to the customer, SAP Hybris support may send emails to a designated customer notification email address to provide status, updates or further detailed information. In addition, a support ticket would be created which would include such information. SuccessFactors The application logs the following for every transaction: Event/transaction Time, Transaction ID, Event/transaction Type, Event/transaction Status (Result of the event; if failure, includes reason), Object Attributes (Describes the object affected by the event), Originator User ID (ID of the user who initiated the event or action), Subject ID, Process User ID, Account Number, Transaction Specific Elements. The application audits changes to the major components. Examples of this are goal auditing and document auditing. The audit trail includes who made the change„ the date of the changLqpndd the abil�o see the data as it existed at carahsoft 175 carahsoft Agreement No. 7434 SOLICITATION # CH16012 that point in time. The data in the audit log can be viewed with appropriate permissions. We also provide an optional Audit Framework for additional audit logging capabilities. All audit logs within the application are accessible only by customers. Therefore, the review of application audit logs as well as retention periods for the application audit logs are the customer's responsibility, and can be determined as per requirements VMware VMware IaaS Services The vCloud Hybrid Service infrastructure, including the top layer management stack, the customer management stack and the computing/storage/network hardware are monitored for availability, capacity and performance. Customers are responsible for monitoring their own VMs (OS, apps). Customers can use on premise monitoring tools to manage and monitor their applications and OSes over VPN and direct connect. VMWare AirWatch The AirWatch Cloud Operations team monitors the SaaS environment. AirWatch follows the Fault, Configuration, Accounting, Performance, and Security (FCAPS) model to monitor the SaaS environment. -We have configured the system to notify support personnel of any issues with key performance items -Because the solution is built on industry -standard ASP.NET architecture, it integrates into existing management and monitoring tools. Administrators can configure log data storage to destinations such as Windows Event Viewer, SNMP traps, syslog, SMTP email alerts, etc. The solution also integrates directly with Microsoft SCCM. The communication layer includes a complete infrastructure for API integration to third parties as well as a rich set of existing APIs, web services, single sign on and authentication protocols. Integrate with security information and event management (SIEM) solutions for enhanced logging of events occurring in the console. Administrators can view events, filter by event type, category and module, and export events. Event logging settings can be configured based on severity levels, with the ability levels to external system via syslog inteqration. FireEve This is not ty to send applicable as each of FireEye's offerings are classified as SaaS. 8.18.1 Describe your testing and training periods that your offer for your service offerings. Training and testing periods will vary based on the Service provider as well as the complexity of the request that is made by the Purchasing Entity. Some of the services can be functional within a few days and some will take a few months for full implementation, 8.18.2 Describe how you intend to provide a test and/or proof of concept environment for evaluation that verifies your ability to meet mandatory requirements , Upon Request, Carahsoft will provide access to any theTechnologies �p q y of the Cloud Technoloo gies proposed. pr The precise Access to the technology may be in a limited or "DEMO" fashion. Access will be to an extent that the State may complete any necessary tests or verifications that may be required. Instructions on precisely how each technology will be accessed will be provided upon request. All of the proposed technologies are currently live/ active and support many customers. A specific instance of the requested technology would be stood up within the cloud framework to support this request. As this will be occurring within a production, the creation of the instance is a quick and straight forward process not requiring any sort of extraordinary effort. carahsoft 176 carahsoft Agreement No. 7434 SOLICITATION # CH16012 i 818 3 Offeror must describe what training and support it provides at no additional cost. Carahsoft provides the customer with free training for specific deals on a case by case basis. This can include free installation, training, and maintenance for high value customers who purchase Carahsoft's solution through the NASPO contract vehicle. In addition, Carahsoft will provide webinars with basic training on a quarterly basis, made available to any Purchasing Entity who wishes to participate. 8.19.1 Describe how the Solutions you provide can be integrated to other complementary applications, and if you offer standard based interface to enable additional integrations. The integration into other applications will vary base on the Service Provider, however it is standard practice to allow for open Als for integration development. For example Connecting Salesforce to an existing enterprise application is a common and frequently performed task. Integration options range from native Web Services support (APIs, outbound workflow, etc.) to import/export utilities to middleware integration via packaged connectors to toolkits for Java, .NET, and other open platforms. Our solution provides the ability to call out to virtually all common APIs, to enable synchronization, push / pull, and mash -ups with external apps/systems. Salesforce itself is based on web -service based APIs that in turn simplify access to Salesforce data from external systems. API -based integration is heavily leveraged by our customers. 8.19.2 Describe the ways to customize and personalize the Solutions you provide to meet the needs of specific Purchasing Entities. The Service Providers customization options are very extensive and highly configurable. For example The Salesforce Platform offers a core set of technologies that not only power the Salesforce SaaS products, but also allows your Agency to build custom apps, connect data from any system, and manage it from anywhere. The Salesforce Platform allows customers to build apps fast with just a few clicks, designed for desktop and mobile devices, all from a single canvas. The Salesforce Platform has been given top ratings by Gartner, Forrester, & Info -Tech Research. To help IT deliver apps faster, the Salesforce Platform offers a simple yet powerful set of declarative, point -and -click tools that anyone can use to achieve business goals at lightning speed. Without writing code, developers and business users alike can quickly and easily create custom apps on the Salesforce Platform with complex business logic and beautiful user interfaces designed specific to every screen. Salesforce Lightning Builder tools allows your Agency to work in alignment with agile development methodologies as IT meet business demands faster. The Platform uses open APIs based on industry standards such as REST and SOAP to make it easy for your Agency to build apps that integrate with legacy systems. For more complex applications, developers can leverage the Apex programming language. Apex is an object -oriented, on -demand language. It is like Java, with similar syntax and notation, and is strongly -typed, compiled on demand, and fully integrated into the Platform. All of the application services come right out of the box, from a powerful workflow engine to API services, integration services, authentication, event log framework, analytics, and collaboration. 8.20 Marketing Plain Describe your how you intend to market your Solutions to NASPO ValuePoint and Participatingties. Entities. �.., -p c - �,�z k O— t�a � Carahsoft offers deep experience in public sector marketing. Our dedicated team plans, promotes and executes more than 2,000 public -sector marketing campaigns and events each year, including contract - specific promotional activities. These include but are not limited to: • News announcements carahsoft 177 carahsoft Agreement No. 7434 SOLICITATION # CH16012 • Social media promotion (Twitter, Linked In, Facebook, Carahsoft Community) • Website content/reciprocal links (Carahsoft website page; content for contract sponsor page) • Marketing materials (FAQs, contract overviews, solution spec sheets, powerpoint slides) • Training documents • Co -branded tradeshow graphics, giveaways, display materials • Taadeshow participation (national, state and local government and education shows) • Digital and print ads • Webinars • Email campaigns • Proactive marketing opportunity tar available through: o National Coalition for Public Procurement (NCPP) — publicprocurementcoalition.org o Institute for Public Procurement (NIGP) — nigp.org o National Association of Counties (NACo) — naco.org o The United States Conference of Mayors — usmayors.org o National League of Cities — nlc.org o National Governors Association — nga.org o Relevant State Associations Describe the valued -added services that you can provide as part of an awarded contract, e.g. consulting services pre- and post- implementation. Offerors may detail professional services in the RFP limited to assisting offering activities with initial setup, training and access to the services. In addition to Carahsoft's quoting and configuration expertise, we also have a wide range —of Provider implementation partners that we leverage to work with Purchasing Entities in order to ensure successful adoption and deployment within a Purchasing Entity. We will help to identity needs for initial setup, training and access to the services so that it is all available at the best prices from one source to the Purchasing Entity. 8.22.1 Describe what infrastructure is required by the Purchasing Entity to support your Solutions or deployment models. The Service Providers that arebeingproposed operate on their own secure infrastructure. The Purchasing Entities will only need an internet connection to access the services. 8.22.2 If required, who will be responsible for installation of new infrastructure and who will incur those costs? The Service Providers maintain all costs for updating and building new infrastructures. Clarify how your architecture compares to the NIST Cloud Computing Reference Architecture, in particular, to describe how they align with the three domains e.g. Infrastructure as a Service (laaS), Software as a Service (SaaS), and Platform as a Service as ........................... . CA APM The SaaS portal runs inAmazonWeb Services. MAA CA MAA is a SaaS service. _.._....... .. ........ CA Aoile 0niv SaaS is being offered via a public cloud carahsoft 178 carahsoft Agreement No. 7434 SOLICITATION # CH16012 ..... nitorin service, ASM is considered to be SaaS. ASM As a mo_... _... . Virtru The capability provided to the consumer is to use the provider's applications running on a cloud infrastructure2 . The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web -based email)„ or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage„ or even individual application capabilities, with the possible exce tion of limited users ecfic appEication configuration settings. Salesforce Salesforce's deployment model is a "public" cloud infrastructure, as defined by NIST 800-145. In the Salesforce Government Cloud, an agency dynamically provisions computing resources over the Internet on our multi -tenant infrastructure. This is a cost effective deployment model for agencies as it gives them the flexibility to procure only the computing resources they need and delivers all services with consistent availability, resiliency, security, and manageability. Salesforce was the first Cloud Service Provider to attain FedRAMP Authority to Operate for both Software as a Service (SaaS) and Platform as a Service (PaaS), consistent with the FedRAMP moderate baseline controls. Salesforce does not provide IaaS as a direct service offering to our customers, it is an underlying part of our PaaS and SaaS offerings. Salesforce Government Cloud In May 23, 2014 Salesforce achieved a FedRAMP Agency Authority to Operate at the moderate impact level (as described in FIPS 199 and 200) issued by Health and Human Services (HHS) for the Salesforce Government Cloud. Additionally, on May 15, 2015, HHS, as the FedRAMP authorizing agency, approved the Salesforce Government Cloud authorization package that was updated based on annual attestation requirements and updates to the FedRAMP baseline which is FISMA compliant and based on the current release of NIST SP 800-53 Rev. 4. Testing for the ATO was performed by a third party assessment organization (3PAO). The Salesforce Government Cloud information system and authorization boundary, is comprised of the Force.com Platform, Salesforce Services (Sales Cloud, Service Cloud, Chatter), and the backend infrastructure (servers, network devices, databases, storage arrays) that support the operations of these products, referred to as the General Support System (GSS). To obtain compliance with FedRAMP, Salesforce conducted security assessment and authorization activities in accordance with FedRAMP guidance, NIST SP 800-37, and HHS guidance. As part of this process Salesforce documented a System Security Plan (SSP) for the Salesforce Government Cloud service offering. The SSP is developed in accordance with NIST SP 800-18, Guide for Developing Federal Information System Security Plans. The SSP identifies control implementations for the GSS and in -scope customer facing products (Force.com Platform, Salesforce Services) according to the FedRAMP moderate baseline and HHS security control parameters. A security assessment of the information system was conducted by a third party assessment organization (3PAO) in accordance with NIST 800-53A and FedRAMP requirements. The security assessment testing determined the adequacy of the management, operational, and technical security controls used to protect the confidentiality, integrity, and availability of the Salesforce service and the customer data it stores, transmits and processes. To maintain compliance with FedRAMP„ Salesforce conducts continuous monitoring, Continuous monitoring includes ongoing technical vulnerability detection and remediation, remediation of open compliance related findings, and at least annual independent assessment of a selection of security controls by 3PAO. As part of our FedRAMP annual assessment, Salesforce is now aligned with NIST SP 800-53, Rev. 4 controls. �_..... a Service SaaS ServiceNow ServiceNow's architecture ali ns with Software as (SaaS),, m carahsoft 179 carahsoft Agreement No. 7434 SOLICITATION # CH16012 Docuslgn DocuSign's DTM® solution is ISO 27001:2013 certified and many of the ISO 27001:2013 controls are mapped to the NIST 800-53 requirements; we can provide additional information upon request. SAP Ariba Our solutions are offered and delivered in a true subscription -based model and shared service (multi -tenant) offering. There is no software to install, no hardware to buy, no maintenance or support costs and no need to hire consultants or tech specialists to run the system. We deploy and manage the infrastructure. Customers only need a web browser for access. Subscriptions include system maintenance, automatic upgrades, enhancements and application of service packs, Level 1— 3 help desk support, professional services and best practices built directly into the application • Fieldglass Fieldglass is offered in a SaaS model. We follow the public cloud model identified by NIST. All customers access the same Fieldglass application version in a multi -tenancy database. The system is hosted in a secure hosting facility. Fieldglass manages everything from the cage in including all servers, devices, wiring, software, and configuration. Fieldglass uses the Cloud Security Alliance framework to measure itself against the recommended controls, in addition to ISO 27001 and SOC 2 controls in the Trust Services Principles of Security, Availability, Processing Integrity, Confidentiality, and Privacy, Hanna HEC is a private cloud offering from SAP that provides fully'managed' Infrastructure as a Service (laaS) following NIST Cloud Computing Reference Architetcure, Hybris rce, erce, Cloud Edition is a Private Cloud Managed The SAP Hybris Comme Service that offers a best practice multichannel commerce platform built on hybris accelerator technology, running in SAP Hybris own datacenters with a as you qrow subscription model. Success Factors Our IT architecture is aligned with ISO 27002. We are Safe Harbor certified and in alignment with BS10012 and ISO 20000 for Service Delivery. We demonstrate an on -going commitment to protecting the confidentiality, integrity and availability ("CIA") of data from internal and external threats, making us a reliable and secure system provider. Our secure multi -tenant Software as a Service (SaaS) platform is designed for availability, security, scalability, and performance. Industry best practices and standards are adopted and incorporated. Our Network also complies with the Authority to Operate as a Moderate Risk Federal Information System by the Office of Personnel Management and Department of Homeland Security; NIST SP800-53 Security Controls; EU Privacy Directive 95/46/EC for EU and non-EU customer data; Payment Card Industry (PCI) Data Security Standard (DSS) v 2.0; Safe Harbor. We provide privacy compliant data center facilities not only in the United States but also as a Member State of the European Union (EU) or a state of the European Economic Area (EEA). Currently, such data centers are certified for ISO27001, IS09001 and PCI-DSS compliance. Our security services provide complete and thorough monitoring of all traffic on the network on a 24x7x365 basis, and include security technology, alert services and incident management support. We are audited twice annually to SSAE16 US or ISAE 3402 international accountin standards carahsoft 180 Agreement No. 7434 SOLICITATION # CH16012 VMware I See section 8.1.1 for additional details. Due to FOIA restrictions, we cannot share specific infrastructure details or architecture diagrams at this time. We can provide sample architecture diagrams under NDA to participating entities during task order negotiations as required. VMWare AirWatch AirWatch partners with co -located and cloud -hosted Tier III data centers to support of SaaS offering. Due to FOIA restrictions, we cannot share specific infrastructure details or architecture diagrams at this time. We can provide sample deployments as under NDA to participating entities during task order negotiations as required. FireEye Each of the FireEye cloud solutions are classified as Software as a Service (SaaS) and leverage private cloud deployment model. With respect to the NIST Cloud Computing Reference Architecture, the following actors are integral to the overall design of the solutions: A Cloud Broker is not leveraged in the FireEye cloud offerings. FireEye has contracted independent service auditors for evaluating controls relevant to security and confidentiality, however this occurs on an as -needed basis. VirtueStream Virtustream solution is fully NIST compliant for Essential Characteristics, as the Infrastructure as a Service (laaS) Service Model, with all deployment options — Private Cloud, Community Cloud, Public and Hybrid Cloud. To that extent: 1.Virtustream IaaS provides a self-service portal called xStream, where users can access, view, edit, provision, and modify compute, storage, network and application services based on granular Role Based Access Control, which can be integrated with Active Directory or LDAP. 2.Virtustream IaaS provides Broad Network Access, where it can provide landing zone for any private network (Point -to -Point, Virtual Private Label Switching, Multi -Protocol Label Switching, or Direct Connect), public network (Internet„ Tasted Internet Connectivity as landing zone, IPSEC VPN and SSL VPN) and also extranet connectivity (shared network, i.e, Cloud Connect, Cloud Exchange, NetBond, etc.) which is growing rapidly as option for connecting cloud resources. 3.Key to Virtustream solution is its proprietary and patented solution of uVM technology, which is effectively a granular solution for resource pooling, providing application performance, pay for consumption only and segregate resources for security and compliance, but aggregate for cost efficiency. In addition, Virtustream is currently one of very few Cloud Service Provider with capabilities for Geo-Fencing and Geo-Tagging of the virtual machines to a specific data center, and getting down to cluster and host machine level. 4.Virtustream's self-service portal, ticketing system and also the Technical Account Manager, who is the single point of contact for State of Utah allows for provisioning and deprovisioning of resources and services. In addition, Virtustream is uniquely positioned to provide application level provisioning as part of its standard automation and orchestration tool_ 5.The fundamental of Virtustream solution is based on uVMTechnology, which is very unique in terms of billing. Virtustream solution takes average consumption of compute resources, and State of Utah would only pay for actual resources based on a monthly average, This is in comparison carahsoft 181 Agreement No. 7434 SOLICITATION # CH16012 _....... ..... with traditional cloud solution, where the billing is based on allocation of resources in T-Shirt size (Micro, S, M, L, XL, XXL), and if the server is up, consumer of the cloud pays, but when it is down, they don't. In case of the Virtustream solution, customer only pays based on the average of vCPU, RAM, IOPS and Network 110; the key is average, not aggregate and based on consumption not allocation. In addition, all storage, security, application management services are offered as a monthly fee, based on the VMs; also, Virtustream can provide consultative and project support based on time and materials. 6.The deployment of Virtustream cloud can be on -premise or private based on purchase of its Cloud Management Platform, Community Cloud based on its IaaS, Public Cloud based on its IaaS and Hybrid cloud based on its ability to provide software and IaaS combined. carahsoft 182 carahsoft Agreement No. 7434 SOLICITATION # CH16012 CONFIDENTIAL, PROTECTED, OR PROPRIETARY Dlo not incorporate protected information throughout he Proposal.,Rather, or proprietary Information must be included in section of proposal response. provide a reference in the proposal response directing Lead State to the specific area of this protected Information section. If there is no protected information, write "None" in this section. Failure to comply with this Section and Section 3.13 of the RFP releases the Lead State, NASPO ValuePoint, and Participating Entities from any obligation or liability arising from the inadvertent release of Offeror information. Carahsoft Technology Corporation ("Carahsoft") respectfully requests that section 6.3 Financials of Carahsoft's response be treated as a trade secret under the Utah Uniform Trade Secrets Act, Utah Code § 13-24-2 and submits this justification in accordance with Utah Code 63-G-2-305 demonstrating that its audited financials should be treated as a trade secret under Utah's Uniform Trade Secrets Act. Additionally, Carahsoft is claiming the same confidentiality of the Consensus Assessments Initiative Questionnaire provided in relation to DocuSign and FireEye offerings, as well as the Cloud Controls Matrix for DocuSign. Carahsoft has marked this attachment as "confidential" in accordance with the RFP instructions by including all confidential data into the Confidential, Protected, or Proprietary Information in our response. Carahsoft is claiming confidentiality for these specific Consensus Assessments Initiative Questionnaires and Cloud Controls Matrix because releasing these documents would cause irreparable damage and would create the potential for cyber security breach. While portions of this information are in the public domain, the information contained within is not represented or assimilated this way in any other format. Carahsoft's Audited Financial Data satisfies the three-part test of the Utah Uniform Trade Secrets Act as set forth below and should therefore be treated as confidential and by the Utah Division of Purchasing and should not subject to public disclosure as provided in Utah Code § 63G-2-305. 1. Carahsoft's Audited Financial Data is a "compilation" within the meaning of Utah Code § 13-24-2(4). Carahsoft's Audited Financial Data is a compilation of all of the Company's financial data and results for 2014. While some aspects of this information may be available, the compilation of this information is unique and the result of sustained and distinct effort by the Company's financial staff and its accountants. 2. As required by Utah Code § 13-24-2(4)(a) Carahsoft derives independent economic value, actual or potential, from its Audited Financial Data not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use. Carahsoft is a leading distributor of technology products and services to public sector customers such as the State of Utah, and throughout the United States and Canada. Sales in this market are intensely and deliberately competitive, with each sale subject to a structured bidding process in which low price is frequently the deciding factor on which contract award is based. Competition in this market is fierce, with competitors regularly competing with one another for federal, state, county and city business. carahsoft '83 Agreement No. 7434 SOLICITATION # CH16012 Carahsoft's competitors closely monitor this market, and regularly attempt to gain financial and other information about Carahsoft and other competing vendors. Allowing Carahsoft's competitors access to this compilation of financial data by releasing it in response to a public records request will damage Carahsoft's competitive position because it will provide competitors insight into Carahsoft's financial structure, including compensation, overhead costs, rental rates, profit margins and the like. Indeed, allowing insight into compensation may violate individual employees' expectations of privacy. Once competitors have this access and insight, they can use it to undercut Carahsoft in the marketplace, damaging Carahsoft's business with its customers and its suppliers, and inflicting economic hardship upon the Company. For these reasons, Carahsoft does not itself disclose its Audited Financial Data except when required by law to do so. For example, Carahsoft discloses its financial information in filing its periodic tax returns —disclosure of which is prohibited by applicable state and federal law. In this regard, we note that Carahsoft is a privately owned company. Therefore, Carahsoft does not publicly report its financial results to the United States Securities and Exchange Commission. 3. Carahsoft uses reasonable efforts to maintain the secrecy of its Audited Financial Data. The third part of the Utah Uniform Trade Secret Act's test for trade secret treatment is whether the information "...is the subject of efforts that are reasonable under the circumstances to maintain its secrecy." Utah Code § 13-24-2(4)(b). Carahsoft satisfies this test because it takes reasonable steps to maintain the secrecy of its financial information. As noted above, Carahsoft is a privately held company and therefore does not report its financial results publically to either its shareholders or the Securities and Exchange Commission. This is in contrast to public companies such as IBM or AT&T who report financial results quarterly as a matter of public record. Even within Carahsoft's business operations itself, Carahsoft's management strictly limits disclosure of this information to a few carefully selected employees, and then only on a "need to know" basis in connection with their work assignments. Indeed, each Carahsoft employee signs a Confidentiality Agreement agreeing not to disclose this information. Conclusion Based on the forgoing, Carahsoft believes it has demonstrated that its Audited Financial Data, Consensus Assessments Initiative Questionnaires, and Cloud Controls Matrix are trade secret as defined in Utah Code § 23- 24-2 . It is a compilation the content of which affords Carahsoft a competitive advantage. Carahsoft's competition cannot readily discern it by proper means. Moreover, Carahsoft itself treats this information as a trade secret even within its own business operations. Should there be a public records request for this information, Carahsoft respectfully requests that the State afford Carahsoft's requested confidential information and documents trade secret protection in accordance with Utah law and deny the request. In the event that the State determines to release the requested confidential data, Carahsoft requests that you notify us promptly so that we may provide further justification for trade secret protection of this confidential data. carahsoft 184 carahsoft Agreement No. 7434 CLAIM OF BUSINESS CONFIDENTIALITY Pursuant to Utah Code Annotated, Subsections 63G-2-305(1) and (2), and in accordance with Section 63G-2-309, Carahsoft Technology Corporation (company name) asserts a claim of business confidentiality to protect the following information submitted as part of this solicitation. Pricing/Cost Proposals may not be classified as confidential or protected and will be considered public information. An entire proposal cannot be identified as "PROTECTED", "CONFIDENTIAL" or "PROPRIETARY". ® Non-public financial statements ❑ Specific employee name and contact information ❑ Specific customer information, client lists, or subscription lists ® Other (specify): Consensus Assessments Initiative Questionnaires and Cloud Controls Matrix This claim is asserted because this information requires protection as it includes: ® trade secrets as defined in Utah Code Annotated Section 13-24-2 ("Trade secret" means information, including a formula, pattern, compilation, program, device, method, technique, or process, that: (a) derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and (b) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy). ® commercial information or non -individual financial information obtained from a person if: (a) disclosure of the information could reasonably be expected to result in unfair competitive injury to the person submitting the information or would impair the ability of the governmental entity to obtain necessary information in the future; [and] (b) the person submitting the information has a greater interest in prohibiting access than the public in obtaining access. This statement of reasons supporting the claim of business confidentiality applies to the following information in this proposal: Pac e Paragraph Reason 187-204, All See Confidential, Trade Secret, & Proprietary Information Explanation Technical Page 176-177 of Carahsoft's Technical Response Response Tem late ..._. Exhibit 1- N/A See Confidential, Trade Secret, & Proprietary Information Explanation DocuSign Page 176-177 of Carahsoft's Technical Response Excel Exhibit 1- ...... N/A _ See Confidential, Trade Secret, & Proprietary Information Ex lanation-_mm- p FireEye Page 176-177 of Carahsoft's Technical Response Excel _..... Exhibit 2- _... N/A _ ..... .... See Confidential, Trade Secret, & Proprietary Information Explanation DocuSign Page 176-177 of Carahsoft's Technical Response Excel Please use additional she. _ ...... ..__... ......_ .............._............ - if needed. You will be notified if a record claimed to be protected herein under Utah Code Annotated § 63G-2-305(1) or (2) is classified public or if the governmental entity determines that the record Agreement No. 7434 should be released after weighing interests under Utah Code Annotated § 63G-2-201(5)(b) or Utah Code Annotated § 63G-2-401(6). See Utah Code Annotated § 63G-2-309. Signed: Robert R. Moore dice President On behalf of (company): Carahsoft Technology Corporation Date: March 10 2016 (Revision 6/4/2015) Agreement No. 7434 -SOLICITATION # CH16012 EXCEPTIONS O AND/OR ADDITIONS TO THE exhibits, must be submitted in this section, Offeror must provide all pro and Co g the Proposed exceptions and/or additions to the Master Agreement Terms Conditions, including posed exceptions and/or additions, including an Offeror's terms and conditions, license agreements, or service level agreements in Microsoft Word format for redline editing. Offeror must also provide the name, contact information, and access to the person(s) that will be directly involved in terms and conditions negotiations. If there are no exceptions or additions to the Master Agreement Terms and Conditions, write "None" in this section. i ne point or contact wno wn1 oe alrectly invoivea in terms and conditions negotiations is Jack Dixon — Contract Specialist. He can be reached at — 703.230.7545 I Jack Dixon@Carahsoft.com. Carahsoft.com. 32. Transition Assistance: a. The Contractor shall reasonably cooperate with other parties in connection with all Services to be delivered under this Master Agreement, including without limitation any successor service provider to whom a Purchasing Entity's Data is transferred in connection with the termination or expiration of this Master Agreement. The Contractor shall assist a Purchasing Entity in exporting and extracting a Purchasing Entity's Data, in a format usable without the use of the Services and as agreed by a Purchasing Entity, at no additional cost to the Purchasing Entity. Any transition services requested by a Purchasing Entity involving additional knowledge transfer and support may be subject to a separate transition Statement of Work. b. A Purchasing Entity and the Contractor shall, when reasonable, create a Transition Plan Document identifying the transition services to be provided and including a Statement of Work if applicable. c. The Contractor must maintain the confidentiality and security of a Purchasing Entity's Data during the transition services and thereafter as required by the Purchasing Entity. Carahsoft takes exception to section 32 — Transition Assistance and request it includes the following. 9.4 RETURN OF CUSTOMER DATA, Carahsoft shall provide Customer Data in its standard database export format, excluding the any Core Technology, to Customer upon Customer's written request and at no additional cost to Customer, provided that Carahsoft receives such request from Customer within forty-five (45) days following the expiration or termination of a provided service. If Carahsoft has not received a request within the foregoing time frame, Carahsoft shall have no obligation to maintain or provide any Customer Data and shall thereafter, unless legally prohibited, have the right to delete all Customer Data in its systems or otherwise in its possession or under its control and delete Customer's instances of any provided service. Carahsoft takes exception to Section 13 — Indemnification. Carahsoft requests that Indemnification from the state to the customer under a certain set of circumstances. carahsoft Z85 Agreement No. 7434 SOLICITATION # CH16012 N U INIP' ARY Carahsoft Technology Corporation appreciates the opportunity to offer this solution for the State of Utah's initiative. The Carahsoft Team has proposed a superior and cost-effective solution that fully complies with the State of Utah's requirements set forth in Solicitation # CH16012. We understand the importance of your project goals, and we are confident you will benefit from this solution and our expertise. Carahsoft looks forward to the opportunity to speak with you regarding the details of this proposal, as well as the opportunity to work with the State of Utah on this project. carahsoft 186 carahsoft Agreement No. 7434 SOLICITATION # CH16012 �ieasie-F66-�le -ow Car N e carahsoft 187 r Agreement No. 7434 SOLICITATION # CH16012 carahsoft 188 carahsoft Agreement No. 7434 Carahsoft Technology Corporation Financial Statements with Independent Auditors' Report December 31, 2013 CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. Agreement No. 7434 CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. Agreement No. 7434 Agreement No. 7434 Agreement No. 7434 CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. See Accompanying Notes and Auditors' Report -3- CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. See Accompanying Notes and Auditors' Report -4- CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. See Accompanying Notes and Auditors' Report -5- Agreement No. 7434 CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. See Accompanying Notes and Auditors' Report -6- CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. See Auditors' Report -7- Agreement No. 7434 CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. See Auditors' Report -8- Aareement No. 7434 CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. See Auditors' Report -9- CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. See Auditors' Report -10- Agreement No. 7434 Carahsoft Technology Corporation Financial Statements with Independent Auditor's Report December 31, 2014 CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. Agreement No. 7434 CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. Agreement No. 7434 -2- Agreement No. 7434 CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. See Accompanying Notes and Auditor's Report -3- Agreement No. 7434 CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. See Accompanying Notes and Auditor's Report -4- CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. See Accompanying Notes and Auditor's Report -5- CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. See Accompanying Notes and Auditor's Report -6- CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. See Auditor's Report -7- CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. See Auditor's Report - 8 - Agreement No. 7434 All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. See Auditor's Report -9- CONFIDENTIAL PROPRIETARY INFORMATION All information contained in these documents is considered confidential and proprietary for the use of only the intended receiver. See Auditor's Report -10- Agreement No. 7434 SECURITY AND HOSTING OVERVIEW June 2015 SAP Fieldglass Agreement No. 7434 Security and Hosting Overview Table of Contents June 2015 1 INTRODUCTION... ... ........... ........»...,,,. .4. 1.1 SCOPE OF OPERATIONS ...... .»......» ........ .........................,.. ......... ......... ..............................5 1.2 SECURITY MANAGEMENT......................................................... » .............. —..,.................................6 1.2.1 SECURITY POLICIES, STANDARDS AND PROCEDURES ..........„„, ..., 6 1.2.2 RISK MANAGEMENT.............................................................................................................................. 6 1.2.3 ASSESSMENTS ..... ................ .,....».........., ..... ___ ........... ... .......„„ ,...,....7 1.3 APPLICATION SECURITY ......................... ,....................... »................................................................. 8 1.3.1 ENCRYPTION.... . . .... . ..,....... ......... .,......... ..,..,....,,,.,.,.., , ........... ......... .....,.,. . ....__8 1.3.2 DATABASE SEGMENTATION..,.,.,. .....„ „,....,....»...... ...................... ................. ., ..__............ ,8 1.3.3 DOCUMENT ENVELOPES......................................................................................................................... 8 1.3.4 PAGE -LEVEL ACCESS CHECKING............................................................................................................... 9 1.3.5 URL ENCRYPTION. ,.......... .......... ___ ................. ................. ....... .............. .. .,...,.., 9 1.3.6 ACTIVITY LOGGING ......... ......... ................... .......,.,.....-..,. .....,.„., ......... ............ 9 1.3.7 APPLICATION TESTING...............................................................................».........,..,.............,,..„......,......9 1.3.8 PASSWORD MANAGEMENT................................................................................................—........,......,10 1.3.9 EMAIL APPROVALS...............................................................................................................................10 1.3.10 APPLICATION PENETRATION TESTING...,..... ..,.».... ......... ......... ....,.. ...,,.....,.... , _ ..........,........11 1.4 PHYSICALSECURITY................................. .................. .............. ... ......................................... 11 1.4.1 INTERNET DATA CENTER CONSTRUCTION . ............. .__............____ 11 1.4.2 ACCESS CONTROL................................................................................................................................11 1.4.3 MAN TRAPS ........ .......... ......... ......... ... ....... ......... ....... .., . .......,........ ,......... ... .........,......a.12 1.4.4 KEY CONTROL...„...» .. ..... ................ ............................. .......... ........,12 1.4.5 ALARM SYSTEM..., ..,.,.......... . .. ........ ... .............. .... ..»,...,, .,,...,.12 1.4.6 CLOSED CIRCUIT TELEVISION SYSTEM......................................................................................................12 1.4.7 BACKGROUND CHECKS .................... ,.. .......... ..... ....,..,, .».,..... 12 1.4.8 HOSTING FACILITY SECURITY PERSONNEL ».................................. ......... ............. .......13 1.5 NETWORK SECURITY ...................................... .....................................................»»...... ........... 13 1.5.1 REDUNDANT COMPONENTS..................................................................................................................13 1.5.2 PRIVATE VIRTUAL LANs .... ........ ................ ....................... .......... ...,,.... ..,..„,.. .......13 1.5.3 FIREWALL..................... ............................... .......,....,..,, , .,.,.., ....,....,. ,.,... 13 1.5.4 24/7 MONITORING ......... .............. ..... ......... , .....,,..,......... .. ......... ......,.. .......... — ...... 14 1.5.5 ENTERPRISE SIEM .........., .......... .......... ............»,., , ......,........, ., ....,......... .. ........14 1.5.6 NETWORK PEN TESTING ............... ........... ............................ ... .......... .......14 1.6 DATA MANAGEMENT ..........,.................................................. . ......... ......».... .................14 1.6.1 DATA BACKUPS AND REPLICATION............................................................................................»............. 14 1.6.2 DATA ARCHIVING.............................................................................................................................14 1.6.3 DATA DELETION,___ ..................... ...... ...... ..,.................. ..... ....,..... ......,..15 1.6.4 DATA USAGE....... ___ ..........................,...,,.,,,. ,,. ...... ...... ..,...15 1.6.5 DATA SCRUBBING................................................................................................................................16 1.6.6 DATA ACCESS ...... ......................... .................. »...... .. ..........,..,..... ........ .....,,17 Agreement No. 7434 Security and Hosting Overview June 2015 1.6.7 DATA LOSS PREVENTION.......................................................................................................................18 1.6.8 CUSTOMER TERMINATION.......,,... .,....„.................................. ................. ---- ............... 18 2 RELEASE MANAGEMENT.......................................................................................................................19 2.1 RELEASE MANAGEMENT PROCESS ...................................................... .............................................. 19 3 DISASTER RECOVERY AND BUSINESS CONTINUITY PLAN-- .„..„...................... ......„,„....„......,, 21 3.1 DISASTER RECOVERY...........................................................................,.,...........,.................,............21 3.2 BUSINESS CONTINUITY..................................................................................................................21 ag(: 3121 Agreement No. 7434 Security and Hosting Overview 1 Introduction June 2015 This document provides a general overview of the SAP Fieldglass security and hosting infrastructure. It is effective as of the revision date indicated below. However, as security needs continue to evolve, the specific information relating to the topics covered may be subject to change overtime. Security The SAP Fieldglass solution was architected to be the most reliable and secure Vendor Management System available today. SAP Fieldglass is proud to offer our customers, subject to review and acceptance by our audit partner, the following assurances: • 150 27001 certified since 2011 • SSAE 16/ISAE 3402 Type 2 SOC1 audits conducted since 2005 • SSAE 16 Type 2 SOC2 audits in the Trust Services Principles for: • Security — the system is protected, both logically and physically, against unauthorized access • Availability — the system is available for operation and use as committed or agreed to • Processing Integrity — system processing is complete, accurate, timely, and authorized • Confidentiality — information that is designated as "confidential" is protected as committed or agreed • SSAE 16 Type 1 SOC2 audit in the Trust Services Principle for Privacy (Type 2 audit scheduled for Q3 2015) • Annual third party pen testing of our network and application This document provides an understanding of how SAP Fieldglass handles the following areas across its global operations: • Scope of Operations • Security Management • Application Security • Physical Security • Network Security • Data Management • Release Management • Disaster Recovery • Business Continuity SAP Reldglass Agreement No. 7434 Security and Hosting Overview 1.1 Scope of Operations SAP Fieldglass has global operations located in the following regions: United States Business office SAP Fieldglass 111 N. Canal Street Suite 600 Chicago, IL 60606 Active and passive datacenters Century Link Equinix / ServerCentral 2425 Busse Road 1735 Lundy Avenue Elk Grove Village, IL 60007 San Jose, CA 95131 APAC Business office SAP Fieldglass Suite 5, 48 Lovett Street Manly Vale NSW 2094 Australia European Union Business office SAP Fieldglass One Valentine Place London SE 18QH United Kingdom June 2015 III FieldglassP a g e 5 1 21 Agreement No. 7434 Security and Hosting Overview Active and passive datacenters ServerCentral c/o Equinix Laarderhoo,gtweg 57 1101EB Amsterdam, Netherlands June 2015 ServerCentral c/o Telehouse North 14 Coriander Avenue London E14 2AA United Kingdom The terms "active" and "passive" designate which of the production hosting environments is being used as the primary (active) and which is being used as the backup (passive or disaster recovery). These designations are not static and SAP Fieldglass will occasionally fail over the active hosting environment to the passive hosting environment. This practice ensures that SAP Fieldglass is capable and ready in the unlikely event a disaster occurs and we need to fail over to the passive site. 1.2 Security Management SAP Fieldglass' Security Team is responsible for implementing and maintaining the security controls to ensure that SAP Fieldglass information systems are secure. SAP Fieldglass has based its security program on industry standards and best practices. For our established datacenters, these practices are audited annually by a third party with results available to customers in October. 1.2.1 Security Policies, Standards and Procedures SAP Fieldglass maintains a comprehensive set of policies that define the information security goals and objectives. Each policy may be supported by a standard that dictates the required security requirements to ensure the uniform application of technologies and processes. 1.2.2 Risk Management SAP Fieldglass manages risk by the identification of threats and vulnerabilities to its information systems and through a control selection process. Controls selected fall into the following categories: • Policy • Physical and Environmental Security • Organizational Security • Communications and Operations Management • Acceptable Use • Access Control • Third Party Access • Information Systems Acquisition, Development and Maintenance • Asset Management • Incident Management • Personnel Security SAPIFieldglass`�� 6 1 21 Agreement No. 7434 Security and Hosting Overview • Compliance June 2015 As an element of our ISO 27001 compliance, SAP Fieldglass conducts an enterprise -wide risk assessment. Key individuals from every department are interviewed so that risks can be identified. Risks are then evaluated and entered into a risk treatment plan. This plan is managed by the Security team with oversight by the Security Steering Committee. The Security Steering Committee meets on a quarterly basis. 1.2.3 Assessments SAP Fieldglass periodically assesses the security controls to review the effectiveness of each control in addressing risk. If SAP Fieldglass' assessment suggests a need for changes, the baseline standard may be changed to include additional controls. Internal Audit SAP Fieldglass conducts quarterly internal audits for critical controls. Evidence is reviewed by our Sr. Compliance Analyst and a formal assessment report is prepared. Failed controls are made visible by this process so they can be remediated. Executive sign off on the internal audit reports is required. External Audit SAP Fieldglass also contracts with third parties on an annual basis to perform formal security audits on the following: • ISO 27001 surveillance audit * SSAE 16/ISAE 3402 Type 2 SOC1 audit SSAE 16 Type 2 SOC2 audits in the Trust Services Principles for: • Security • Availability • Processing Integrity • Confidentiality • SSAE 16 Type 1 SOC2 audit in the Trust Services Principle for Privacy (Type 2 audit scheduled for Q3 2015) • Network penetration test • Application penetration test These assessments allow SAP Fieldglass to maintain an appropriate security posture in order to protect the company and its systems, as well as its customers' data. We are currently working with our third party audit partner in bringing our EU datacenters into scope for our 2015 ISO 27001 audit and SSAE 16/ISAE 3402 Type 2 SOC1 and SOC2 examinations. SAP Fleldglass,p 7 1 21 Agreement No. 7434 Security and Hosting Overview June 2015 1.3 Application Security Our application provides application -level security through a combination of encryption, page -level access checking, document envelopes, and activity logging. Application security is handled through a combination of programming checks, application server configuration, and database server configuration. SAP Fieldglass uses 128-bit SSL (HTTPS) encryption for all data transmissions over the public Internet, including data shared between the product and end users and data shared between the product and back -end systems. Passwords are encrypted using a one-way hash with salt based on the SHA-256 encryption algorithm. The hash value is saved within the database; not the password. The base SAP Fieldglass application does not require data that would require breach notifications if compromised. If the customer chooses to store sensitive data, custom fields may be defined by the customer that can be encrypted with AES-256. These fields can also be optionally masked from view while entering and viewing the fields in the application. 1.3.1 Encryption By default, the application utilizes SSL encryption for all data transmissions over the public Internet. In addition, the SAP Fieldglass hosted application encrypts sensitive data stored on the database so that only properly authorized users (or systems) will be able to decrypt the data. Because no state information is stored on the application server, in the unlikely event of unauthorized access to the database, the sensitive data is still encrypted. 1.3.2 Database Segmentation SAP Fieldglass is a SaaS and utilizes a multi -tenancy database. Each customer is assigned a unique company code. Every record written to the database is keyed using this company code. After a user authenticates into the system, a session ID is generated which holds vital information about the user including their company code, user role, and data visibility restrictions. The session ID is cached server side to eliminate any ability for a malicious user to modify its contents. 1.3.3 Document Envelopes Throughout the system, there are a number of events that generate "documents." These are digital representations of their real -world counterparts. For example, job postings, work orders, time sheets, and invoices are all represented in the system as documents. Each document in the system has an accompanying digital envelope that stores all access to that document. For example, when a job posting is created, an envelope entry is added for creation that records the date, time, and person. When it is submitted, another entry is added recording the date, time, and person. SAP Reldglass�., I g 8 1 21 Agreement No. 7434 Security and Hosting Overview June 2015 1.3.4 Page -Level Access Checking The application has been designed so that every single web page checks for access rights before displaying itself. Additionally, each page performs a second check to ensure that an authorized user will only have access to those data elements and functionality that has been expressly authorized by the system administrator. The post -authentication session ID that is generated and cached server -side is validated prior to showing each page. SAP Fieldglass stores a non -persistent cookie in the browser and compares back to the server -side session ID. If they no longer match due to malicious activity, the user is redirected to a "You are not authorized" page. Authorization is handled through the use of user -defined User Roles. User Roles provide the customer, through its designated administrators, the flexibility to specify the type of access given to a member of that user group based on the definitions configured by the administrator. The User Role controls what areas of the application are accessible to the user group and what actions they can perform in those areas (e.g. job posting create, time sheet approve, etc.). 1.3.5 URL Encryption SAP Fieldglass does not pass any sensitive data in its URL query strings. Parameters that are used to identify users in the system are protected by anonymizing the field variable and then encrypting the associated value using AES-256. 1.3.6 Activity Logging As users access the system, all of their business significant activities are tracked and logged including failed login attempts, successful logins, approvals, submissions, etc. This activity log provides a full audit trail of what actions a particular user performed within the system and the timestamp as well. 1.3.7 Application Testing Upon request, SAP Fieldglass will provide customers with a sandbox environment where system testing can occur outside of production. This is useful when testing out configuration changes, new integrations, and/or new reports prior to making the changes live in the customer's production instance. Upon request, customer's data can be anonymized. SAP Fieldglass has the ability to scrub the data such that it is unrecognizable. Data element replacement is accomplished by an automated SAP Fieldglass utility that replaces the customer's company code, user names, business units, cost centers, and sites from a store of random variables. Any or all of these elements may be chosen for replacement. Sensitive data that has been designated by the customer to be stored in the SAP Fieldglass application is encrypted with AES-256. The encryption and decryption keys are different between production and test environments and are different between the US and EU datacenters. These keys are stored in the corporate password vault and are accessible only by the Database Administrators and the Lead Architect. SAP Fieldglass,,11 a e 9121 Agreement No. 7434 Security and Hosting Overview June 2015 Once customer testing has been completed, the Environment Management team (a team within Professional Services) destroys the environment. The database is purged and the VM is returned into circulation. 1.3.8 Password Management The SAP Fieldglass application provides each customer the ability to define a Password Policy. This policy contains custom -defined password rules that each user in the customer's instance must adhere to. The policy provides 20 different password rules such as minimum length, user lockout preference (hard lockout vs. time -based reset), days to expiration, minimum password age, etc. Also included is the ability to specify a regex pattern(s). This pattern dictates the password value syntax that each user must follow. When customer chooses to use a test instance ("sandbox"), all user password values remain unchanged from their production values. All passwords and visibility restrictions remain unchanged to ensure that users in the test instance are not able to gain access to data they're not privileged to see in production. Also, the password policy that is enforced in in the production instance is also enforced in the test instance. New user invitations are sent via email. Recipients enter their 1-time passcode and are then forced to specify a new password that complies with the customer's password policy rules. User invitations expire after 21-days. 1.3.9 Email Approvals In order to better support our growing mobile workforce, SAP Fieldglass offers customers a supplementary method for approving their work items. Via email, approvers are able to submit their approval or rejection response by simply replying to the approval work item that was sent to them. This method has been proven to reduce approval cycle times by several days since the approver does not have to be in the office. This feature has been architected with the following security controls: • Only the original recipient can approve/reject the work item. If the recipient forwards the email to another person, the system will not accept the response. • Email spoofing is not a risk. A unique ID is generated for each approval request. This unique ID along with the person ID of the intended recipient is stored encrypted with AES-256. So even if the email address sending the approval/rejection response is legitimate but the sender is not, the system will detect this anomaly and not accept the response. • A SAP Fieldglass approver can identify another user as their Proxy and/or Delegate when they will be out of the office and unable to handle the approval requests. By design, neither of these roles receive approval work items via email. So only the original recipient can ever submit an approval/rejection response via email. • If the customer created custom fields where sensitive information is stored encrypted, those fields and associated values are not allowed to be selected for inclusion in these email approval notifications. • The system audit trail is updated with all user actions including approval/rejection activities via email. This audit trail is accessible by privileged customer users and can be used to monitor user activity. SAPIRelll , III `` P a g e 10 1 21 Agreement No. 7434 Security and Hosting Overview June 2015 In order to compromise the security of our email approval feature, a malicious user would need to hack into another user's email account, locate the SAP Fieldglass approval request email, and then submit the approval/rejection response. 1.3A0 Application Penetration Testing SAP Fieldglass uses a combination of manual and automated testing to ensure the application is secure. Various automated commercial tools are used prior to each major release of the SAP Fieldglass system (three times per year). On an annual basis, SAP Fieldglass engages a 3rd party security company to conduct pen testing services against our application. This is in addition to SAP Fieldglass' own internal penetration testing efforts. SAP Fieldglass has several test environments available for customers to conduct their own application penetration testing if requested. 1.4 Physical Security The SAP Fieldglass data center provides physical security through its secure hosted facilities. The application is hosted within a secure unmarked cage. SAP Fieldglass manages everything from the cage in. Meaning, SAP Fieldglass manages all servers, devices, and software in the cage. The hosting provider provides physical security, internet connectivity, and HVAC. 1.4.1 Internet Data Center Construction Exterior perimeter walls, doors and windows are constructed of materials that afford UL Standard #752, Level V Ballistic Protection. 1.4.2 Access Control The data center uses an Access Control System (ACS), which supports a networked card reader and alarm system. The ACS uses proximity card readers to control access into perimeter doors, shipping/receiving areas, storerooms and other areas. Biometric hand scanners are installed to control access into the network control center, telecommunications node room and customer vaults. Additional access control measures include: • Designated with signage as controlled access areas • Areas within the internet data center are designated as restricted • Access into the internet data center and restricted areas is controlled by biometric hand scanners, and is limited to authorized personnel • Card access badges or contractor/visitor badges are required to gain entry • All employees, customers, vendors, contractors and visitors must be sponsored by a facilities pre -approved sponsor to gain access • Visitors are escorted at all times within the controlled access area perimeter SAP Fieldglass, Agreement No. 7434 Security and Hosting Overview June 2015 1.4.3 Man Traps The system includes the following key features: • Anti-passback • Integrated metal & explosive detection • Video monitored / recorded • Two-way intercom audio to Security Control Room Level V ballistic protection • Weight sensors limit entry to one person at a time (no tailgating) • ADA compliant • Intrusion / tampering alarm monitoring by Security Control Room • Integrated card access & biometric access control systems limits access to persons verified by hand geometry • All systems are supported by redundant power management system (generators). 1.4.4 Key Control Facilities security staff is the custodian of all security and cage keys. These keys are maintained and tracked through a comprehensive issue, retrieval, audit, and storage process. The listing of all customers, customer employees and cage assignments is updated in real-time maintained to ensure that cage access is restricted to authorized personnel. 1.4.5 Alarm System The ACS is used to monitor and log security alarms. The ACS monitors all: • Perimeter doors • Restricted Area doors • Shipping / receiving doors 1.4.6 Closed Circuit Television System Facilities employ an extensive closed circuit television system to monitor the exterior and interior of the internet data center. Exterior cameras provide views of critical support equipment and perimeter doors. Interior cameras are positioned to monitor all internet data center aisle ways, requests for entry and entry into the internet data center, shipping / receiving areas, high -security vaults and the internet data center lobby. All cameras are recorded on digital video recorders 24 x 7. 1.4.7 Background Checks SAP Fieldglass requires background checks be performed at the time of hiring on all personnel. These background checks are performed by a nationally recognized third party company. SAP Fieldglass initiates the background check request for all potential employees and independent consultants. If the independent contractor is placed through SAP Rieldglass, Agreement No. 7434 Security and Hosting Overview June 2015 an agency, the agency will conduct a background check and confirm with Human Resources whether the results were completed with/without discrepancies. If the independent contractor is placed directly, SAP Fieldglass will conduct the background check. Background checks include the following: • Social Security Trace • Statewide & National Criminal Report (7 years) • Sex Offender Registry & Terrorist Watch • Compliance Authorities Database Checks — Global (OFAC level verification) • Education verification • Employment verification (7 years) • Global Sanctions & Prohibited Parties • Credit (only for specific finance roles) 1.4.8 Hosting Facility Security Personnel The security office duties include: • Response to calls for assistance • Security facility inspections • Fire and safety patrols • Shipping / receiving security • Physical security audits and assessments 1.5 Network Security The SAP Fieldglass network infrastructure includes redundant components, firewalls, and 24/7 monitoring. 1.5.1 Redundant Components Most network components are internally redundant. For example, routers have redundant power supplies; servers have redundant drives, power supplies, and NIC cards. Additionally, all network components are redundant to provide redundancy and security in the event of a component failure. 1.5.2 Private Virtual LANs The application network architecture has been designed with multiple private virtual LANs using redundant Cisco routers. Every major network layer is placed on its own virtual LAN with rules about which protocols and ports are accessible. 1.5.3 Firewall SAP Fieldglass has implemented dual -vendor redundant firewalls between the public internet and the SAP Fieldglass private network, as well as between each virtual LAN. This SAP FIII lash g e 13 1 21 Agreement No. 7434 Security and Hosting Overview June 2015 firewall has been configured to enforce protocols and ports that are able to cross LANs with a default deny stance. 1.5.4 24/7 Monitoring SAP Fieldglass provides 24/7 monitoring of suspicious activity. Any failure is promptly reported and, after an initial analysis, escalated to the next appropriate level. LIS Enterprise SIEM Our security incident and event management (SIEM) tool has been configured to collect logs and events from all systems and devices within the SAP Fieldglass network. Forwarders are used to collect, filter, normalize and forward relevant data to an Indexer. Each installation listens for Syslog data and actively pulls WMI information from its respective environment. Security related issues are monitored and alerted on where required. 1.5.6 Network Pen Testing On an annual basis, SAP Fieldglass engages a 3rd party security company to conduct pen testing services on our network. 1.6 Data Management 1.6.1 Data Backups and Replication SAP Fieldglass has a highly available backup solution that guarantees data can be restored as expediently as possible. Our solution performs a continuous replication of data to our passive production hosting facility. SAP Fieldglass takes incremental SQL backups every 15 minutes and full backups on a nightly basis. Backups are transferred to the passive production hosting environment over a secure channel. SAP Fieldglass' solution offers continuous protection of customer data geographically without imposing performance degradation or scaling limitations. Data is encrypted both at rest and in transit with AES- 256. Data backups and replication are performed between the active and passive production environments. The US -based active production environment replicates data to the US - based passive environment. Likewise, The EU-based active production environment replicates data to the EU-based passive environment. Also refer to section 3.1 Disaster Recovery. 1.6.2 Data Archiving Data is archived throughout the year. Eligible transactional and reporting data are moved from the active database to an archive database after 24 months. Archived data can be accessed only by customer users with a user role of Administrator. Archive data is accessed using the same login screen and user interface that is used to access current data. Reports can also be generated using archive data from the standard interface. SAP i Fieldglasszii f!j e 14 1 21 Agreement No. 7434 Security and Hosting Overview June 2015 The criteria for archiving data are as follows: • Data remains in the active database for 24 months, at which point eligible data is moved to the archive database. • Data remains in the active report database for 24 months, at which point eligible data is moved to the archive report database. • Archiving begins with the worker. When a worker's end date is more than 24 months old, the worker and all associated data including the worker's work orders, job seeker record, job posting, time sheets, expense sheets, and payment -related items such as invoices are archived. • The archive process is run as a batch job on a weekly basis to move data from the active databases to the archive databases. • Data cannot be moved back from the archive database to the active database. SAP Fieldglass does not delete data from its archive databases and has data older than 7 years. In the future, if SAP Fieldglass decides to delete archived data, we will ensure that a minimum 7 years of data is retained. 1.6.3 Data Deletion Data deletion occurs only when required by a customer. SAP Fieldglass' data deletion capabilities allow customers to remain compliant with data privacy, data protection, and other related data directives. • Deletion logic is based solely on a customer's business requirements. A custom script is developed by SAP Fieldglass. • Results are verified in a non -production environment by both SAP Fieldglass and the customer prior to executing in production. • A "Preservation" flag is available for use. Customers can set this flag on any data to override logic that would otherwise delete the data. This is useful during times when litigation or eDiscovery efforts are in progress and certain data must be preserved. • Script execution frequency is determined by the customer. SAP Fieldglass is contractually obligated to retain at least 7 years of data for customers. 1.6.4 Data Usage Customer data is required in non -production environments for various reasons: • Second level help desk support for customer defect investigation and resolution. • Supporting customer requests for updating data, whether it be for desired changes or corrections for data modified by the customer in error. • Customer sandboxes — these are non -production environments configured only with the customer's data (customer's data is "sliced" out from the multi - tenancy production database). These sandboxes are required for many SAPc Reldglass15 121 Agreement No. 7434 Security and Hosting Overview June 2015 reasons, including testing of new or changed integration connectors, reports, and/or application configuration changes such as revised approval workflows. New application features can also be turned on and reviewed in the sandbox before turning on in the live production instance. Any data deletion scripts that are developed between the customer and SAP Fieldglass must be tested in a non -production environment prior to executing in production. Customer Preview testing — this is an opportunity for customers to gain early access to a future upgrade of the SAP Fieldglass application. This allows customers to gain confidence that the system is working as expected prior to the release date. Customer participation is optional. SAP Fieldglass regression testing — the SAP Fieldglass application is offered in a Software as a Service (SaaS) model. One of the services we provide is testing of the application prior to each production release. To ensure a customer's configuration, integrations, and reports are working as expected with the new codebase, SAP Fieldglass Quality Assurance uses a scrubbed production copy of the database in our regression testing. Regression testing is where we execute test cases against the current production codebase and the future codebase using a common data input. Output files from each test are compared to ensure any changes are expected. Customers may opt out of this process. However, all responsibility in ensuring the customer's SAP Fieldglass instance is properly working and maintained is transferred to the customer. To date, all SAP Fieldglass customers have declined to assume this responsibility. 1.6.5 Data Scrubbing In order to properly service our customers, access to production data is required. All customer data is classified as Confidential. SAP Fieldglass takes every possible precaution to ensure data is protected from unauthorized access and misuse. Data is protected in the following ways: • First names and last names of buyers, suppliers, and workers are anonymized by replacing with a test value. • Email addresses of buyers, suppliers, and workers are changed to a single false email address such as gLatest8@SAP Field lass.com which is configured to automatically purge all email sent to it. M Buyer and supplier company names are anonymized. • Any custom fields created by the customer remain unchanged. Custom fields that contain sensitive data are encrypted with AES-256 and optionally display masked when entering and displaying values in the user interface. There is no way to decrypt these values since the decryption keys between production and test are different. Keys are stored in the corporate password vault and { { { t ,a 1, c 16 1 21 Agreement No. 7434 Security and Hosting Overview June 2015 access is limited to only select senior members of the technology team. This access list is reviewed quarterly bythe internal audit team and by a third party in our annual SSAE 16 / ISAE 3402 Type 2 SOCI and SOC2 audits. The data scrubbing process is: • A backup of the data is taken at the location where the source database resides • Data is filtered where only the most recent 3 months of data remain • Data is scrubbed as described above • Data is then securely transferred from the production system to the test system Once scrubbed, all personally identifiable information (PII) has been removed and any sensitive custom field data cannot be read. Our test systems reside in secure third party data centers with the same controls as our production data centers. 1.6.6 Data Access Direct access to production data is required in specific cases. Access is provided based on business need and not by role alone. Access reviews are conducted monthly and reviews are subject to recurring quarterly reviews by the SAP Fieldglass internal audit team. Executive review and sign off is performed for all quarterly reviews. Access is required for the following puposes: • Professional Services Data Services team — this team receives a customer's master and/or worker data and executes data uploads into test and/or production environments. Once the data are successfully uploaded and customer has signed off on the accuracy and completeness of the upload, the data are destroyed. • First level help desk — when customers call our help desk, the caller may require the help desk agent to to view data or log in as the caller in order to help them with their problem. This is only performed when authorized by the caller. SAP Fieldglass has help desk locations in the following regions: United States SAP Fieldglass 111 N. Canal Street Suite 600 Chicago, IL 60606 SAP Reldglass Agreement No. 7434 Security and Hosting Overview Europe and APAC Merlin -IT Hungary Information Technology Services Kft. Vagohid u. 2., 4034 Debrecen, Hungary June 2015 Merlin Information Systems Philippines Inc. 6th Floor C ommerce and Industry Plaza Building, McKinley Hill Cyberpark, Taguig City, Philippines The SAP Fieldglass Security team conducted an onsite security audit in 2014 at Merlin Hungary. Contractually, Merlin must meet SAP Fieldglass' security requirements. The following security controls are in place: Help desk agents are not able to cut/paste using their secured workstation. • External media including any USB drive is disabled. 0 Printing is not supported. • Help desk agents have been background checked by Merlin using SAP Fieldglass' background check requirements (see section 1.4.7 Background Checks). 1.6.7 Data Loss Prevention Our DLP solution has been installed and configured for use on devices subject to exposure to sensitive information. It has been implemented to guard data at its endpoints and to ensure leakage of information classified as Confidential does not occur. Policies can be pushed from the central management console or pulled from an individual endpoint client. Client installs are configured to update (pull) policy changes every 90 minutes. Our enterprise SIEM tool is configured to pull data in real time from the DLP database. Dashboards are created to allow quick overviews of agent statuses/details, alert details, and logging details. The SIEM is configured to notify the Security Team in real time when an alert is detected. The Analyst then logs into the SIEM and investigates the alert to determine whether it's legitimate or a false positive. 1.6.8 Customer Termination If a customer were to terminate their contract with SAP Fieldglass, the customer's data could be sliced out of the production database and delivered to the customer on a media of their choice. The size of the data will determine what media is appropriate. SAP R l ' , f�l a: I:: 18 121 Agreement No. 7434 Security and Hosting Overview June 2015 2 Release Management 2.1 Release Management Process The SAP Fieldglass Release Management team is responsible for the management of all delivables required in upgrading the production SAP Fieldglass system. This team is comprised of key members from the Development, Quality Assurance, Product Management, Professional Services, and executive teams. SAP Fieldglass customers benefit from our release management in that the release deployment schedule repeats itself year over year; releases are deployed over the same weekends of predetermined months. SAP Fieldglass has several different release types: Major Releases In the US, Major releases occur on the second Fridays in March, July, and November. In the EU, Major releases occur on the third Fridays in March, July, and November These releases can include new product features, new or changed functionality, user experience enhacements, and changes to the user interface. These are our most formal releases and the only type of release that requires an extended maintenance window. The Release Manager and the Release Management team closely monitor all phases of the Software Development Lifecycle and analyze PKIs at each phase transition. Release notes are provided as well as an opportunity for customers to optionally participate in a customer preview opportunity. This is where users can log into a non -production environment that is running the future codebase. The benefit of participating is that customers can gain confidence the system is behaving as expected prior to the official release date. Minor Releases Minor releases occur on the second Fridays in January, May and September. These releases do not require the formalities of major releases. This type of release is used when deploying customer -specific product features and integrations to production. These releases are deployed to both US and EU customers at the same time. Service Packs Serivice packs are deployed as required to resolve product defects. These releases are deployed to both US and EU customers at the same time. IP Fieldglass,,,P a m r 19 121 Agreement No. 7434 Security and Hosting Overview June 2015 All releases are deployed to production by a central deployment team located in the US. During the deployment process, the codebase is replaced with the new codebase and data transformation scripts are executed. During this process, customer data is not viewed or accessed. Upon completion of the deploy, the Quality Assurance team executes a post -deploy verification checklist to ensure the system is ready for general availability. One such verification is verifying an MD5 hash to ensure the certified codebase was installed in production without modification. Test companies are used in conducting all testing. SAP Reldglass Page 20121 Agreement No. 7434 Security and Hosting Overview June 2015 3 Disaster Recovery and Business Continuity Plan 3.1 Disaster Recovery SAP Fieldglass maintains a disaster recovery plan with backup, hardware repair, and data restoration, along with the ability to bring up the SAP Fieldglass application at a hot backup site in the event of a declared disaster (as described in the SAP Fieldglass disaster recovery plan) where the primary site is destroyed or disabled. This plan is tested on a yearly basis. Lessons learned are recorded in the test results and the plan is adjusted and improved accordingly. SAP Fieldglass has the concept of active and passive production hosting facilities. The active environment is the live production hosted facility that all SAP Fieldglass users are actively using. The passive environment is a hot production hosting environment. Our data replication solution ensures that the passive environment is ready at anytime to be failed over to. In a disaster scenario, SAP Fieldglass changes the DNS to the passive hosting center's set of IPs. Users are then seamlessly routed to the other datacenter. There is not multi -day data migration that has to occur due to the ongoing data replication that is in place. SAP Fieldglass proactively conducted a datacenter failover from the active datacenter to the passive datacenter in April 2015. The entire failover process was conducted in just over 8 hours with zero data loss. SAP Fieldglass plans to repeat this proactive datacenter failover between 1 and 3 times per year. Also refer to section 1.6.1 Data Backups and Replication. 3.2 Business Continuity The primary objective of our business continuity plan (BCP) is to enable SAP Fieldglass to recover all functions within their respective Recovery Time Objectives (RTOs) after any type of disruption occurs which prevents SAP Fieldglass personnel from engaging in ongoing business operations. A Recovery Point Objective (RPOs) has also been defined to identify our tolerance for any data loss. This Plan is designed to support the employees responsible for leading recovery efforts to enable SAP Fieldglass to resume daily operations following a disruption. A business impact analysis (BIA) has been developed to fully quantify and prioritize restoration of mission -critical processes. SAIP Fieldglass l.n e 21 1 21 AVOLritru Agreement No. 7434 Privacy Policies and Procedures SIG evi i�: n iiiiisiI Virtru's Privacy Policies and Procedures were adopted as of [Date]. Virtru's Privacy Policies and Procedures were revised as of [Date]. Virtru's Privacy Policies and Procedures were revised as of [Date]. Virtru's Privacy Policies and Procedures were revised as of [Date]. Virtru's Privacy Policies and Procedures were revised as of [Date]. Virtru's Privacy Policies and Procedures were revised as of [Date]. Name Name Name Name Name Name Rev.2015.8.6 Agreement No. 7434 Table of Contents Fie yjsiqn_Bji� Company Document Control Information Overview: Purpose: Aapikabirst y, Definitions: POILICY, Lnforcernent- Admin-Istrative Requirements for HIPAA llm n lamentation Overview: Purpose: ARRILIcability. ROILIM. P-o—cument jLiternents. Enforcement: —Mintmurn —Necessaty-5_tandard Overview: R"r ose., Applicabirq lic Procedures: Enforcement: Qqjj�ness reements. Overview: Purpose: ApRfticabilifty- Rq1-i C-Y-. Enforcement: fl-us—inessA-gigg �eSu grgem—ents Overview: EmMose. App-licabirity- Policy: Enforcement: R9gpJiP-t,Use and DisdImure oflPe rsonal Nf-Identifia b lie Information Overview: Purpose, APP—ficabi[ln- 529dgLpgitiiiorr: Eg—licy. ,Rrocedures. Enforcement: Cop2plaint Process 2 Rev.2015.8.25 Agreement No. 7434 Overview: Purpose: A"JlcqbLlHt)c. Policy: Procedures: Enforcement: Overview: Purpose: Applicability; 5pecjal DgfinitigLis C.orpoolicies: Procedure: Enforcement: Scanner Policy Qverview: EMMose. A-"_l it c a b �irj t S Definitions corgorptg PolkigL Procedure: Enforcement: Tr�a�iining_EolLicy Overview: Purpose: Applic_---y Policy: Enforcement. Rev.2015.8.25 Agreement No. 7434 �= Virtru may be referred to as "Company." A. Document Control A staff copy of this document is available with the Virtru Privacy Officer, Will Ackerly, willackerlyna virtr . or or (202) 577-3683. B. Security Document Library These policies and procedures and related privacy and security practice information will be kept in our Security Documentation Library (SDL). The Library is located in Goo l�® Drive and backed up to a local NAS. Outdated and superseded materials from the Security Documentation Library (or Notebook) will be kept in an archive (the Security Documentation Archive) for at six (6) years after the date when they are first outdated or superseded. A. Overview The Privacy Rules place certain restrictions on the acquisition, use and disclosure of Personally -Identifiable Information (PII). These policies establish the minimum care with which PII in the custody of Virtru personnel must be maintained. Ism Purpose The purpose of this document is to provide basic instruction to all Virtru employees regarding the management and protection of Personally -Identifiable Information. C. Applicability This policy applies to all Virtru employees, which are defined for the purposes of this document to be employees of all current and future subsidiaries of Virtru. D il)efinitions Covered Entity means a health plan, a health care clearinghouse, or a health care provider that transmits any health information in electronic form relating to any covered transaction. Personally -Identifiable Information (PII) means any information about an individual maintained by Virtru, including: 1. Any information that can be used to distinguish or trace an individuals identity, such as name, social security number, date and place of birth, mother's maiden name, or biometric records; and Rev.2015.8.25 Agreement No. 7434 2. Any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information Treatment, Payment and Health Care Operations (TPO) include all the following: 1. Treatment means the provision, coordination, or management of health care and related services, consultation between providers relating to an individual, or referral of an individual to another provider for health care. 2. Payment means activities undertaken to obtain or provide reimbursement for health care, including determinations of eligibility or coverage, billing, collections activities, medical necessity determinations and utilization review. 3. Health Care Operations includes functions such as quality assessment and improvement activities, reviewing competence or qualifications of healthcare professionals, conducting or arranging for medical review, legal services and auditing functions, business planning and development, and general business and administrative activities including the creation of de -identified health information as defined by these regulations. Disclosure means the release, transfer, provision of access to, or divulging in any other manner of information outside the entity holding the information. Use means, with respect to individually identifiable health information, the sharing, employment, application, utilization, examination, or analysis of such information within an entity that maintains such information. Personal Representative means a person who has authority under applicable law to make decisions related to health care on behalf of an adult or an emancipated minor, or the parent, guardian, or other person who is authorized under law to make health care decisions on behalf of an un-emancipated minor. Employees means all employees of Virtru as well as its temporary employees, interns, independent contractors, trainees, and other persons in the performance of work for the Company, its offices, programs or facilities. Privacy Rules means the rules adopted by various state and federal agencies to implement the requirements of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and regulations promulgated under this Act as well as those obligations that arise under the privacy and security standards adopted by the Health Insurance Marketplaces, pursuant to 45 C.F.R. §155.260. 117�. Policy For details on specific requirements, refer to the appropriate policies in this manual as indicated in lbrua:°kets]. Rev.2015.8.25 5 Agreement No. 7434 1. Generally: Personally -Identifiable Information shall not be obtained, used or disclosed except as permitted or required by law. 2. Permitted and Required Uses and Disclosures: Personally -Identifiable Information may or shall be disclosed as follows: a) To the individual b) To carry out TPO activities as allowed under HIPAA and/or pursuant to and in compliance with a current and valid Authorization [Receipt. Use d Q sc1 syre Rersoaady-1--drl(iflo_IL�LoriyatioW. c) In keeping with a Business Associate Agreement Ru,4ness A. sociate Agreementl. d) As otherwise allowed or required under the HIPAA Rules or other federal and/or state laws concerning privacy of information that is used by Virtru in the course of its business operations. 3. Minimum Necessary: Generally, when obtaining, using or disclosing Personally -Identifiable Information, or when requesting PII from another entity, reasonable efforts must be made to limit the PII used or disclosed to the minimum necessary to accomplish the intended purpose. However, the Privacy rules were not intended to severely complicate business processes and Virtru may, where appropriate, use a single format to provide data containing PII for our various services ini num Necessaix.Standa14 4. De -identified Personally -Identifiable Information: PII may be considered not to be individually identifiable in the following circumstances: a) The following identifiers of the individual (and relatives, employers or household members) are removed. (This is the "Safe Harbor" method that Virtru will generally use.) - Names - Information relating to the individual's geographic subdivision if it contains fewer than 20,000 people - Elements of dates (except year) directly related to the individual - All ages and elements of dates that indicate age for individuals over 89, unless aggregated into a single category of age 90 and older - Telephone numbers - Fax numbers Rev.2015.8.25 Agreement No. 7434 - Email addresses - Social Security Numbers - Medical record numbers - Health plan beneficiary numbers - Account numbers - Certificate or license numbers - Vehicle identifiers and serial numbers, including license plate numbers - Device identifiers and serial numbers - Web Universal Resource Locators (URLs) - Internet Protocol (IP) address numbers - Biometric identifiers; full face photographic images - Any other unique identifying number, characteristic or code. b) As allowed in the Privacy Rules, Virtru shall provide a number of longitudinal identifiers in the de -identified data. These identifiers shall not allow identification of the individual who is the subject of this data in that: 1) These identifiers will be encrypted using industry level encryption techniques 2) The method of encryption shall not be divulged to the receiver of the de -identified data S. Complaint Process: Virtru has put into place a process for individuals to make complaints about our Privacy Policies and Procedures and/or our compliance with those Policies and Procedures. 6. Documentation: Virtru must maintain written or electronic copies of all policies and procedures, communications, actions, activities or designations as are required to be documented under this manual for a period of six (6) years from the later of the date of creation or the last effective date. III. Eriit" irceranent An employee found to have violated this policy shall be subject to disciplinary action, up to and including termination of employment. In the case where inappropriate access or use or disclosure of Personally -Identifiable Information was or may have been involved, such individuals may additionally be reported to the appropriate enforcement agencies. Rev.2015.8.25 VA Agreement No. 7434 A. Overview The Privacy Rules require that a Business Associate have in place appropriate administrative safeguards to protect the privacy of Personally -Identifiable Information. I.I. Purpose To provide instructions regarding Virtru's obligations relating to the implementation of administrative requirements of the Privacy Rules. C. Applicability This policy applies to all Virtru employees, which is defined for the purposes of this document to be employees of all current and future subsidiaries of Virtru. D. Policy 1. Personnel Designations: Virtru has designated and documented designations of the following: a. Will Ackerly has been designated as the Privacy Officer. 1) He is responsible for the development and implementation of corporate -wide policies and procedures relating to the safeguarding of Personally -Identifiable Information. 2) He will also be responsible for receiving complaints relating to Personally -Identifiable Information and for providing information about the Company's privacy practices. b. Persons with access to Personally -Identifiable Information are listed by title and department including a listing of individuals' names on the Risk Assessment; and will be updated if Virtru makes any major changes to processes, staff, programming or company location; or at a minimum annually. Virtru will retain the previous listing for a period of not less than six (6) years. 2. Training Requirements: Virtru shall document the following training actions: All Virtru employees shall receive training on applicable policies and procedures relating to Personally -Identifiable Information as necessary and appropriate for such persons to carry out their functions within the Company. a. Each new employee shall receive the training as described above within 30 days after joining Virtru. Rev.2015.8.25 Agreement No. 7434 b. Each employee whose functions are impacted by a material change in the policies and procedures relating to Personally -Identifiable Information, or by a change in position or job description, shall receive the training as described above within 30 days after the change becomes effective. c. Complaints handled by Committee... 3. Safeguards: _Virtru shall have in place appropriate Administrative, Technical, and Physical Safeguards to reasonably safeguard Personally -Identifiable Information from intentional or unintentional unauthorized receipt, use or disclosure. 4. Complaint process: Virtru shall have in place a process for individuals to make complaints about the Company's HIPAA Policies and Procedures and/or Virtru's compliance with those Policies and Procedures, and shall document all complaints received and the disposition of each complaint. (See Coolpl4in Process) 5. Sanctions: Our Privacy Policies call for our workforce that has access to Personally -Identifiable Information to perform certain duties and to refrain from certain actions. Failure to do so will be sanctioned according to the policy below. These sanctions apply to the designated workforce members including managers, supervisors, and staff who have access to Personally -Identifiable Information. It is intended as guidance for our business management in sanctioning information security policy infractions. We reserve the right to implement sanctions differently if, in our judgment, the situation warrants it. We define a serious infraction as one that results in known significant damage or that threatens imminent significant damage. Other infractions are simple infractions. First security infraction If the infraction is: a. A simple infraction, and b. The first infraction in the last 3 years The sanction will be retraining the workforce member on the appropriate policy/procedure and placement of a written letter of reprimand in the employee file. The letter will notify the person of the nature of this infraction and of sanctions for future potential infractions. Second security infraction or first serious infraction If the infraction is: a. A serious infraction, or Pi Rev.2015.8.25 Agreement No. 7434 b. The second infraction of either type within 3 years The sanction will include a written letter of reprimand that is given to the person at fault, placement of a copy of the letter in the employee file, and one week's suspension without pay. The letter will notify the person of the nature of this infraction and of sanctions for future potential infractions. Third security infraction or second serious infraction If the infraction is: a. A second serious infraction within 3 years, or b. A third infraction of any type within 3 years. The sanction will be dismissal from the workforce. Virtru makes exceptions for disclosures made by employees who qualify as whistleblowers or certain crime victims. 6. Mitigation efforts required: Virtru, to the extent practicable, shall mitigate any harmful effects of unauthorized uses or disclosures of Personally -Identifiable Information by the Company or any of its Business Associate Subcontractors. 7. Prohibition on intimidating or retaliatory acts: Neither Virtru nor any employee shall intimidate, threaten, coerce, discriminate against, or take other retaliatory action against any individual for the exercise of their rights or participation in any process relating to HIPAA compliance, or against any person for filing a complaint with the Secretary of the U.S. Department of Health and Human Services, participating in an investigation, compliance review, proceeding or hearing, or engaging in reasonable opposition to any act or practice that the person in good faith believes to be unlawful under the Privacy Rules as long as the action does not involve disclosure of Personally -Identifiable Information in violation of the regulations. Virtru shall document the following actions relating to its policies and procedures: a. Required policies and procedures: Virtru shall implement policies and procedures to assure appropriate safeguarding of Personally -Identifiable Information in its operations. b. Changes to policies and procedures: Virtru shall change its policies and procedures as necessary and appropriate to conform to changes in law or regulation. Virtru may also make changes to policies and procedures at other times as long as the policies and procedures are still in compliance with applicable law. Where necessary, Virtru shall make correlative changes in its Privacy Notice. Rev.2015.5.25 10 Agreement No. 7434 fim Documentation Requirements Virtru must maintain the required policies and procedures in written or electronic form, and must maintain written or electronic copies of all communications, actions, activities or designations as are required to be documented hereunder, or otherwise under the Privacy Rules, for a period of six (6) years from the later of the date of creation or the last effective date. Enforceiriejat Any employee found to have violated this policy shall be subject to disciplinary action, up to and including termination of employment. In the case where inappropriate access, use or disclosure of Personally -Identifiable Information was or may have been involved, such individuals may additionally be reported to the appropriate enforcement agencies. A. Overview The Privacy Rules place certain restrictions on the receipt, use and disclosure of Personally -Identifiable Information in regards to the amount reasonably necessary to accomplish the task being performed. However, the Privacy Rules also allow Personally -Identifiable Information to be disclosed for business appropriate needs. The policies developed by Virtru will follow this business appropriate philosophy as well as that of administrative simplification, which is the subsection of the HIPAA law under which the Privacy Rule was developed. Virtru shall use standard data formats for information acquisition or disclosure and tailor these formats to contain a business reasonable minimum necessary amount of Personally -Identifiable Information. The Company's policies establish the minimum necessary use provisions for Personally -Identifiable Information in the custody of Virtru employees. [31. Purpose To issue instructions regarding Virtru's obligations relating to the Privacy Rules to obtain, use and disclose only the minimum amount of Personally -Identifiable Information (PHI) necessary to accomplish the intended purpose. C. Applicability This policy applies to all Virtru employees, which is defined for the purposes of this document to be employees of all current and future subsidiaries of the Company. 11 Policy Virtru will make reasonable efforts to ensure that the Minimum Necessary amount of Personally -Identifiable Information is disclosed, used, or requested to accomplish the intended purpose. Exceptions to the Minimum Necessary Standard include disclosures: 1. To the individual who is the subject of the information; 11 Rev.2015.8.25 Agreement No. 7434 2. Made pursuant to an authorization provided by the individual; 3. To healthcare providers for treatment purposes; 4. Required for compliance with the standardized HIPAA transactions; 5. Made to the Secretary of HHS or his agent pursuant to a privacy investigation; 6. Otherwise required by the Privacy Rules or other law. Employees shall be trained on the policies and procedures developed to apply these principles to the use or disclosure of, or requests for Personally -Identifiable Information. E. 11ir ocedti.res The following procedures will be implemented to ensure that this policy is enforced effectively across all parts of Virtru. Each user of a system which accesses Personally -Identifiable Information shall be identified and the classes or types of PII to which access is needed and any conditions appropriate to such access will be established. It will be the responsibility of the Privacy Officer to maintain this information using the Employee Access Request Form [Forms for Employees] and System Access Log [Change Control Logs for Security]. 2. Reasonable efforts will be taken to limit the access of each user of Personally -Identifiable Information to the amount needed to carry out the individual's duties. These efforts will include internal use of PII. 3. For situations where Personally -Identifiable Information disclosure occurs on a routine and recurring basis, the PII disclosed will be limited to the amount of information reasonably necessary to achieve the purpose of the disclosure. 4. Requests for disclosures that are not routine and recurring and thereby covered by Virtru standard procedures (other than to the individual, the Secretary of HHS or his agent, or where required by law) shall be reviewed by the Privacy Officer to determine that the Minimum Necessary Standard is applied to the extent reasonable. S. Questions regarding these procedures should be directed to the Virtru Privacy Officer, Will Ackerly, ilia , e -1 virti-u.com, or (202) 577-3683. 1T , E'nf'o rcement An employee found to have violated this policy shall be subject to disciplinary action, up to and including termination of employment. In the case where inappropriate access or use or disclosure of Personally -Identifiable Information was or may have been involved, such individuals may additionally be reported to the appropriate enforcement agencies. Rev.2015.8.25 12 Agreement No. 7434 A. O e➢I viemow"" The Privacy Rules impose certain requirements on Business Associates who create, receive, use or disclose Personally -Identifiable Information on behalf of their Covered Entity partners. Vitru must comply with the requirements in this section. 13. PamV[jose To provide instructions to all Virtru employees regarding the necessity of and the requirements for Business Associate Agreements relating to Covered Entities. f App iicall[)iljty This policy applies to all Virtru employees, which is defined for the purposes of this document to be employees of all current and future subsidiaries of Virtru. M Policy 1. Generally: A Covered Entity may disclose Personally -Identifiable Information to Virtru, or allow Virtru to create or receive PII on the Covered Entity's behalf. Virtru will appropriately safeguard the PII obtained from the Covered Entity. Virtru will document these assurances through a written agreement. 2. Content Requirements: The agreement between the Covered Entity and Virtru must meet the following requirements, as applicable: a. Establish permitted and required uses or disclosures of Personally -Identifiable Information that are consistent with those authorized for the Covered Entity, except that the agreement may permit Virtru to use or disclose Personally -Identifiable Information for its own management and administration if such use or disclosure is required by law, or Virtru provides reasonable assurance to the Covered Entity to which the Personally -Identifiable Information is disclosed that the confidentiality of the PII will be maintained. b. Provide that Virtru will: 1. Not use or disclose the Personally -Identifiable Information except as authorized under the agreement or required by law. 2. Use safeguards to prevent unauthorized use or disclosure. 3. Report unauthorized uses or disclosures to the Covered Entity. Rev.2015.8.25 13 Agreement No. 7434 4. Pass on the same obligations relating to protection of Personally -Identifiable Information to any subcontractors. 5. Make Personally -Identifiable Information available for access by the Covered Entity in accordance with relevant law and policy. 6. Make Personally -Identifiable Information available to the Covered Entity for amendment, and incorporate any approved amendments to Personally -Identifiable Information, in accordance with relevant law and policy. 7. Make information available for the provision of an accounting of uses and disclosures in accordance with relevant law and policy. 8. Make its internal practices, books and records relating to its receipt or creation of Personally -Identifiable Information available to the Secretary of HHS for purposes of determining Virtru's compliance with Privacy Rules. 9. Authorize termination of the agreement by the Covered Entity upon a material breach by Virtru. 3. Compliance Responsibilities: Virtru agrees to report any use or disclosure of Personally -Identifiable Information not permitted by this agreement and any successful security incident to Covered Entity within a commercially reasonable period, but in no event later than within thirty (30) business days, after it is discovered. 1. 1'°nfor°ce nt� iiiii: An employee found to have violated this policy shall be subject to disciplinary action, up to and including termination of employment. In the case where inappropriate access or use of Personally -Identifiable Information was or may have been involved, these individuals may additionally be reported to the appropriate law enforcement agencies. A. Overview The Privacy Rules impose certain requirements on Business Associate Subcontractors who create, receive, use or disclose Personally -Identifiable Information on behalf of Virtru. All Business Associate Subcontractors of Virtru must comply with the requirements in this section. fl, Purpose To provide instructions to all Virtru employees regarding the necessity of and the requirements for Business Associate Subcontractor Agreements relating to Business Associate Subcontractors who receive, use or disclosure Personally -Identifiable Information on behalf of Virtru. Rev.2015.8.25 14 Agreement No. 7434 C: Applicability ility This policy applies to all Virtru employees and Business Associate Subcontractors, which are defined for the purposes of this document to be employees of all current and future subsidiaries of Virtru and the Business Associate Subcontractor. 1) 1:"oficy 1. Generally: Virtru may disclose Personally -Identifiable Information to a Business Associate Subcontractor, or allow a Business Associate Subcontractor to create or receive PII on Virtru's behalf, if adequate assurances are obtained by Virtru that the Business Associate Subcontractor will appropriately safeguard the PII. Virtru must document these assurances through a written agreement. This requirement does not apply with respect to: a. Disclosures made to a provider concerning the individual's treatment, payment or health care operations; or b. Uses or disclosures made to a governmental agency for purposes of public benefit eligibility or enrollment determinations where such company is authorized by law to make these determinations. 2. Content Requirements: The agreement between Virtru and a Business Associate Subcontractor must meet the following requirements, as applicable: a. Establish permitted and required uses or disclosures of Personally -Identifiable Information that are consistent with those authorized for the entity, except that the agreement may permit the Business Associate Subcontractor to use or disclose Personally -Identifiable Information for its own management and administration if such use, or disclosure is required by law, or the Business Associate Subcontractor obtains reasonable assurance from the entity to which the Personally -Identifiable Information is disclosed that the confidentiality of the PII will be maintained. b. Provide that the Business Associate Subcontractor will: 1) Not use or disclose the Personally -Identifiable Information except as authorized under the agreement or required by law. 2) Use safeguards to prevent unauthorized use or disclosure. 3) Report unauthorized uses or disclosures to Virtru. 4) Pass on the same obligations relating to protection of Personally -Identifiable Information to any subcontractors or agents. 5) Make Personally -Identifiable Information available for access by Virtru, in accordance with relevant law and policy. Rev.2015.8.25 15 Agreement No. 7434 6) Make Personally -Identifiable Information available to Virtru for amendment, and incorporate any approved amendments to PII, in accordance with relevant law and policy. 7) Make information available to Virtru for the provision of an accounting of uses and disclosures in accordance with relevant law and policy. 8) Make its internal practices, books and records relating to its receipt or creation of Personally -Identifiable Information available to the Secretary of HHS for purposes of determining the Business Associate Subcontractor's compliance with Privacy Rules. 9) If feasible, return or destroy all Personally -Identifiable Information upon termination of contract; if any PII is retained, continue to extend the full protections specified herein as long as the PII is maintained. 10)Authorize termination of the agreement by the entity upon a material breach by the Business Associate Subcontractor. 3. Compliance Responsibilities: If Virtru knows of a pattern or practice of the Business Associate Subcontractor that amounts to a material violation of the Agreement, Virtru and the Business Associate Subcontractor must attempt to cure the breach to end the violation, and if unsuccessful, terminate the agreement. If terminating the Agreement is not feasible, Virtru must report the problem to the Secretary of HHS. E, l; n orcenient An employee of Virtru or an employee of the Business Associate Subcontractor found to have violated this policy shall be subject to disciplinary action, up to and including termination of employment. In the case where inappropriate access or use of Personally -Identifiable Information was or may have been involved, these individuals may additionally be reported to the appropriate law enforcement agencies. A. Overview The Privacy Rules impose certain requirements on Covered Entities and Business Associates who create, receive, use or disclose Personally -Identifiable Information on behalf of their Covered Entity partners. B. Purpose To provide instructions to all Virtru employees regarding the receipt, uses and disclosures of Personally -Identifiable Information, which are permitted or required by HIPAA. C pp]ic;alll[)iIit This policy applies to all Virtru employees, which is defined for the purposes of this document to be employees of all current and future subsidiaries of the Company. Rev.2015.8.25 Agreement No. 7434 11 Spechal Defiii:ition Public Health Authority means a governmental company or authority, or a person or entity acting under a grant of authority from or a contract with such a public company, including the employees or agents of the public company, its contractors and those to whom it has granted authority, that is responsible for public health matters as part of its official mandate. 1 Policy State and federal law permit and require certain receipt, uses and disclosures of Personally -Identifiable Information such as those related to Business Associate Agreements. Additional uses and/or disclosures are allowed or required that related to public responsibility that require no agreement or authorization on the part of the individual who is the subject of the PII. It is the policy of Virtru to obtain, use and disclose PII only as permitted and/or required by law or regulation including the following situations: 1. Treatment, Payment or Healthcare Operations: Personally -Identifiable Information may be used or disclosed for the purposes of providing treatment, payment or healthcare operations. Such disclosures will be made only as allowed by and pursuant to prevailing state and federal law. a. Discussions involving Personally -Identifiable Information shall be conducted only in appropriate business areas including but not limited to offices, conference rooms and other non-public areas; b. Conducted only for the purpose of fulfilling a legitimate business need; and c. Conducted with regard to and in compliance with the "Minimum Necessary Standard." IMinirnac,nn leg essay Standard 2. Contained in a Business Associate Agreement: For permitted and required uses or disclosures of Personally -Identifiable Information that are consistent with those authorized by the Covered Entity in a Business Associate Agreement. 3. Required by Law: Personally -Identifiable Information maybe used or disclosed to the extent such use or disclosure complies with and is limited to the requirements of such law. 4. Abuse and Neglect: Except for reports of child abuse or neglect, Personally -Identifiable Information about an individual believed to be a victim of abuse, neglect, or domestic violence may be disclosed to a governmental authority authorized to receive such reports if the individual agrees or the reporting entity believes, in the exercise of professional judgment, that the disclosure is necessary to prevent serious physical harm. If the individual lacks the capacity to agree, disclosure may be made if not intended for use against the individual and delaying disclosure would materially hinder law Rev.2015.8.25 17 Agreement No. 7434 enforcement activity. The individual whose Personally -Identifiable Information has been released must be promptly informed that the report was made unless doing so would place the individual at risk of serious harm. 5. Judicial Proceedings: Personally -Identifiable Information may be disclosed in response to a court order. 6. Law Enforcement: Personally -Identifiable Information may be disclosed for the following law enforcement purposes and under the specified conditions: a. Pursuant to court order or as otherwise required by law, i.e. laws requiring the reporting of certain types of wounds or injuries b. Decedent's Personally -Identifiable Information may be disclosed to alert law enforcement to the death if entity suspects that death resulted from criminal conduct 7. Serious Threats to Health or Safety: Consistent with applicable law and ethical standards, Personally -Identifiable Information may be used or disclosed if the entity believes in good faith that the use or disclosure is necessary to prevent or lessen a serious and imminent threat to a person or the public, and disclosure is to someone reasonably able to prevent or lessen the threat, or the disclosure is to law enforcement authorities to identify or apprehend an individual who has admitted to violent criminal activity that likely caused serious harm to the victim or who appears to have escaped from lawful custody. Disclosures of admitted participation in a violent crime are limited to the individual's statement of participation and are not permitted when the information is learned in the course of treatment to affect the propensity to commit the subject crime, or through counseling, or therapy or a request to initiate the same. 8. Specialized Government Functions: National Security and Intelligence: Personally -Identifiable Information may be disclosed to authorized federal officials for the conduct of lawful intelligence, counter -intelligence, and other activities authorized by the National Security Act.(45 CFR 164.512(k)(2)) 9. Protective Services: Personally -Identifiable Information may be disclosed to authorized federal officials for the provision of protective services to the President, foreign heads of state, and others designated by law, and for the conduct of criminal investigations of threats against such persons. (45 CFR 164.512(k)(3)); 10. Public Benefits: Personally -Identifiable Information relevant to administration of a government program providing public benefits may be disclosed to another governmental program providing public benefits serving the same or similar populations as necessary to coordinate program functions or improve administration and management of program functions. Rev.2015.8,25 18 Agreement No. 7434 11. Workers' Compensation: Personally -Identifiable Information may be disclosed as authorized and to the extent necessary to comply with laws relating to workers' compensation and other similar programs. IF. Procedures The following procedures will be implemented to ensure that this policy is enforced effectively across all parts of Virtru. Any request for disclosure of Personally -Identifiable Information, 1) pursuant to a court order, warrant or subpoena; 2) by a law enforcement agent; 3) by a public health authority; or 4) by a national security, intelligence or other federal company, must be directed to the Privacy Officer and the CEO for review and action. Any such request will include an acknowledgement of receipt to insure that the document was actually received by the appropriate corporate individual and will retain a copy of the request. If the acknowledgement is not received within two working days of submitting to the appropriate corporate individual, then the request will be resubmitted to the Privacy Officer and CEO. G. Enforc emeint An employee found to have violated this policy shall be subject to disciplinary action, up to and including termination of employment. In the case where inappropriate access, use or disclosure of Personally -Identifiable Information was or may have been involved, such individuals may additionally be reported to the appropriate enforcement agencies. V111. Complaint Process A. 1 tverviii(�w The Privacy Rules require that Virtru provide a process for individuals to make complaints concerning the Company's policies and procedures required by these regulations and document all complaints received, and the dispositions of these complaints, if any. B P till r"llll) ose To issue instructions regarding Virtru obligations relating to the Privacy Rules to provide a process for individuals to complain about the Company's policies and procedures and the requirement to document complaints received and the disposition of these complaints. C. Applicability: This policy applies to all Virtru employees, which is defined for the purposes of this document to be employees of all current and future subsidiaries of Virtru. Rev.2015.8.25 19 Agreement No. 7434 D. 110 icy Virtru shall maintain a process to receive complaints from individuals about Company Privacy Policies and Procedures, for complaints from individuals who believe their privacy rights have been violated and from employees or Business Associate Subcontractors who believe that Virtru is not abiding by its policies and procedures and/or assurances concerning Personally -Identifiable Information. This process shall include the following: 1. Any complaints or questions should be submitted to the Privacy Officer or his assistant. 2. All service and complaint issues will be stored in the Desk.com app. Virtru shall work in good faith to resolve complaints received to the satisfaction of the submitter, where possible. E. Procedure The following procedures will be implemented to ensure that this policy is enforced effectively across all parts of Virtru. 1. Complaints shall be submitted in writing on paper or electronically. 2. Complaints shall be entered into the complaint tracking system either automatically or by the individual designated to provide information on the Company complaint process. and when manually entered shall be in the exact words provided by the submitter. 3. The Virtru Privacy Officer shall investigate complaints and make a determination as to whether or not the complaint has merit. 4. The Virtru Privacy Officer shall present complaints received to Virtru's senior executive for immediate action. If the Privacy Officer has completed the investigation of the complaint and made a determination, such determination shall be presented to the Virtru Executive Board 6. If the investigation has not been completed nor a provisional determination made by the Privacy Officer, it shall be the prerogative of the senior executive to make a summary determination or to direct the Privacy Officer to continue with the investigation and to report on the complaint at the next scheduled meeting. If a determination is made that Virtru is in violation of the privacy provisions of the Privacy Rules or that changes are needed in the Privacy Policies or Business Associate Agreement to clarify the allowed practices of Virtru, the Virtru CEO and Privacy Officer shall determine the actions that the Company shall take. Rev.2015.8.25 ac Agreement No. 7434 Complaint determinations and actions that Virtru takes pursuant to such complaints, if any, shall be reported to the submitter of the complaint, if such person is known. Privacy Officer, or his designated agent, shall update the complaint tracking system with the findings of the Privacy Officer's investigation, any determination made, direction or actions of the Virtru CEO and Privacy Officer with regard to the complaint, and a copy of any information provided to the submitter in response to their complaint. F. Echi"oro"Nnneni Any employee found to have violated this policy shall be subject to disciplinary action, up to and including termination of employment. In the case where inappropriate access, use or disclosure of Personally -Identifiable Information was or may have been involved, such individuals may additionally be reported to the appropriate enforcement agencies. ® Fax Policy A Overview The Privacy Rules require that Virtru implement appropriate administrative, technical, and physical safeguards to protect the privacy of Personally -Identifiable Information. l Purpose To provide instructions to all Virtru employees regarding the use of faxes with respect to Personally -Identifiable Information and the measures necessary to maintain an adequate level of security for such information. This policy defines rules necessary to achieve this level of protection. These standards are designed to minimize the potential exposure to Virtru from damages, which may result from unauthorized disclosure of Personally - Identifiable Information through facsimile use. C. Applicability This policy applies to all Virtru employees, which is defined for the purposes of this document to be employees of all current and future subsidiaries of Virtru. if Special Defi.niti'0111S Fax: An electronic facsimile of a document stored as a series of zeroes and ones (binary data) that can be transmitted like normal computer data. When received by a fax machine, the incoming stream is translated into dots creating a representation of the original document. Inappropriate Disclosure: The intentional or unintentional revealing of Personally -Identifiable Information to people who do not have a need to know such information. Rev.2015.8.25 21 Agreement No. 7434 E„ Corporate 1,1olicies Employees must exercise utmost caution when sending faxes to parties outside of Virtru. Faxes containing Personally -Identifiable Information should only be received on and sent to user or departmental specific fax machines and not to systems that have general access. In cases where Personally -Identifiable Information is received from outside on a non - departmental specific fax machine, the receiving department shall notify the Virtru Privacy Officer of the source of such information. The employee shall communicate the approved fax number to the external entity and record such actions. Should PHI be disclosed by fax to an inappropriate party, Virtru shall, to the extent possible, remediate such disclosures. All fax documents sent by Virtru employees shall contain the following statement: This fax is intended for the individual/individuals or entity/entities named above and may be covered by copyrights, business partner confidentiality agreements, non -disclosures or other legally binding instruments. If you are not the intended recipient, do not read, copy, use or disclose the contents of this communication to others. Immediately notify the sender by reply fax, destroy all hard copies and delete this document from all systems. Thank you! F Procedure In the cases where data that contains Personally -Identifiable Information is disclosed by fax machine use to an inappropriate party, the following procedure shall be followed: 1. The receiving party shall be contacted by telephone at the earliest opportunity and requested to destroy the fax without reading. 2. The name of the company, the person contacted, the date and time shall be recorded as well as any comments made by the person receiving such calls. 3. A fax shall also be sent to the receiving party containing the same instructions as detailed for the phone call requesting a return fax message indicating that the requested action was taken. 4. The cause of the inappropriate disclosure shall be determined and reported to the Virtru Privacy Officer. Methods to prevent a reoccurrence of the inappropriate disclosure shall be formulated and put into place. Any additional actions prescribed by regulations shall be performed to the extent possible. G. 1I1'nl'r)r-ceirnen t Any employee found to have violated this policy shall be subject to disciplinary action, up to and including termination of employment. In the case where inappropriate access, use Rev.2015.8.25 22 Agreement No. 7434 or disclosure of Personally -Identifiable Information was or may have been involved, such individuals may additionally be reported to the appropriate enforcement agencies. X. Scanner Policy A. Overview The Privacy Rules require that Virtru implement appropriate administrative, technical, and physical safeguards to protect the privacy of Personally -Identifiable Information. To provide instructions to all Virtru employees regarding the use of scanners with respect to Personally -Identifiable Information and the measures necessary to maintain an adequate level of security for such information. This policy defines rules necessary to achieve this level of protection. These standards are designed to minimize the potential exposure to Virtru from damages, which may result from unauthorized disclosure of Personally -Identifiable Information. C. Applicability This policy applies to all Virtru employees, which is defined for the purposes of this document to be employees of all current and future subsidiaries of Virtru. D. S]pecjalDefinitions Scanner. An electronic copy of a document stored as a series of zeroes and ones (binary data) that can be transmitted like normal computer data. When received by a computer, the incoming stream is translated into dots creating a representation of the original document. Inappropriate Disclosure: The intentional or unintentional revealing of Personally -Identifiable Information to people who do not have a need to know such information. E. Corporate to Policies Employees must exercise utmost caution when scanning and transmitting these documents to their devices and parties outside of Virtru. Scans containing Personally -Identifiable Information should only be received on and sent to user or departmental specific computer in an encrypted format, or sent using Virtru's encrypted email application. 1, Pr oced.ur In the case where scanned data that contains Personally -Identifiable Information is disclosed to an inappropriate party, the following procedure shall be followed: 1. The receiving party shall be contacted by telephone at the earliest opportunity and requested to destroy the scan without reading. Rev.2015.8.25 23 Agreement No. 7434 2. The name of the company, the person contacted, the date and time shall be recorded as well as any comments made by the person receiving such calls. 3. The cause of the inappropriate disclosure shall be determined and reported to the Virtru Privacy Officer. Methods to prevent a reoccurrence of the inappropriate disclosure shall be formulated and put into place. Any additional actions prescribed by regulations shall be performed to the extent possible. G. Enforcement Any employee found to have violated this policy shall be subject to disciplinary action, up to and including termination of employment. In the case where inappropriate access, use or disclosure of Personally -Identifiable Information was or may have been involved, such individuals may additionally be reported to the appropriate enforcement agencies. ® Training Policy A. llve�rvjew The Privacy Rules require that Virtru train their employees on the requirements of our Privacy Policies and Procedures developed to protect the Personally -Identifiable Information to which employees are provided access. The Company has determined that all employees of Virtru shall be trained on Privacy so that we can provide the necessary assurances for the protection of Personally -Identifiable Information to our clients, vendors and business partners as required under the Privacy Rules. B Plumose: To provide instructions to all Virtru employees regarding the requirement for HIPAA training. C. Applicability This policy applies to all Virtru employees, which is defined for the purposes of this document to be employees of all current and future subsidiaries of Virtru. 1. General: It is the policy of the Company that all employees of Virtru and its current and future subsidiaries be trained on Privacy and the Company policies and procedures created to protect Personally -Identifiable Information. 2. Duty Specific Training: Privacy training shall be appropriate to the tasks that each employee performs. In the case where an employee does not come into contact with Personally -Identifiable Information as a normal course of the employee's duties, the employee shall be trained on the corporate policies and procedures. Rev.2015.8.25 24 Agreement No. 7434 3. New Employees: New employees shall be trained on the corporate policies and procedures as part of their normal employment process and shall be trained on our Privacy Policies and Procedures, if applicable, within 30 days of being employed by Virtru. The Assistant ISO, Jordan Duggan, shall document this training and provide the Privacy Officer with documentation of this training within the 30-day period. 4. Transfers: When an employee transfers from one department to another, the employee shall be trained on our Privacy Policies and Procedures within 30 days of being assigned. Jordan Duggan shall document this training and provide the Privacy Officer with documentation of this training, within the 30-day period. 5. Material Change in Policies and Procedures: when a material change in the policies and procedures occurs, each employee shall receive training on such changes within 30 days of the implementation of the change. Jordan Duggan shall document this training and provide the Privacy Officer with documentation of this training, within the 30-day period. Any employee found to have violated this policy shall be subject to disciplinary action, up to and including termination of employment. In the case where inappropriate access, use or disclosure of Personally -Identifiable Information was or may have been involved, such individuals may additionally be reported to the appropriate enforcement agencies. Rev.2015.8.25 25 Agreement No. 7434 Security Policies and Procedures fAfter choosing r,store JNotebookj option throughout this ro; Revision History Virtru's Security Policies and Procedures were adopted as of [Date]. Virtru's Security Policies and Procedures were modified as of [Date]. Virtru's Security Policies and Procedures were modified as of [Date]. Virtru's Security Policies and Procedures were modified as of [Date]. Virtru's Security Policies and Procedures were modified as of [Date]. Virtru's Security Policies and Procedures were modified as of [Date]. Name Name Name Name Name Name Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures Virtru Document control B. Security QocumjaLLhjLaU IL -P —re -fa c-p-.aad--R-a-cIwr-ow 11 d-M —at e-r La l Overview B. Policy 111. Key Concer)ts Information Security Princes Confiden:tiafty Integrit Availability Provability Definitions Information Securitv EoEcy Primau Policy Ac-c,epta.,bje lase Polic �fo I�S 5,t—erns —Users Employmgnt Policies ih e- Standards Audience —_Who will use this document Technoiggy-an d, business m _Id coply with these Standards as a p viders shgp matter of contractual _LLI iggli o n l� ees and business units within Virtru should coutr I unless a N is ,nent has been dope and a deviatiq- Ism provedjth15-0 How the document is used Review of ', in cqn rots, aracaduLgs an t gLai riLt the Sta J, r ul aocurnentingcoff rancksLdeviat-i s ran -- -an GaP AnaNsis to determine where iMpLgygments are —needed A3isk Assessment to validate that the irnprovemenLs arQjustffiecl against the costs of the controls and the slue of the Wgrmation invo ed L CLeAJon of o�ff of a deviation -,LpIan to close 1 he aaDs OR sip Documentation of the new contrgis. �roced�ures and tools C. Maintainine this docurnent V. Roles and Res onsibilities A. Rulesfgr own(jr �hw. of information B. Information users C. Information Security QffiLer fVanagg,,awairEegrLiegsaUroL7rams relatin to securitv and.. privacy,tomcs Maintain a central record of exceons to this Standards document fvLa Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures Oversee And a-p al, Igntifiable Information (Pill collected or rocessed the Cora an VI.Information CLas Classifications and Requirements f — Overview R.T e�SecurAy&[As_sificatio_ri_p_rocess J-pfatfo s such as servers end workstzqLjons iT app�lcaflb.LLs inclucfingdAtabase transaction procesaing and email Data sets Paper copies g.fipfoLmaftQn Information tyati-tokiffy Known �tow �kforce �meni�bersjLiLh �asustomer information Developingen"ac Connections f_com titer or networks to_outside s stems or networls GranflnZ-gf amt.s. i dg--Q-rZALi z a t i o, L. The classes of, i Data Types COM-Pan.�4 _owned' data that relates to s,uchi areas as Coll', pore financials, !2�nlo-yrxient re&ort s,p ayLQI I L-Qt c, agft "n IgguLt(grTients for �Usiness con It _ _ti DiLiu ReggiM,djuptime for the information asset Reauired restoration timtj thqAat:a mqg be restored RgngirgclfMecmknm—kups RpqWir(iments, for storage of backups, tLe. -L— ecQ—very ocess -pL— Enforcement Overview Ru�ps for LLess to information assets W11. Access Cont!:gLPorIcy Overview Access levels Granting access The 150 LALt LlpLgyjdggccounts ith the rnajghihndgal riv ilegen'd_ivQthe y-v-p QLce member t tile user must d2aagg-LQ a private °Wor up2nfast -rase --o-fjtje _accQu joLL ' Len —dQra, —contrag;tors a�ad ti er outsiders Individuals .Policy Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures X Rules by Data Qassification public unclassified data, a, Private'internaldata C. Confi D, Managing data —sources E. Retention of media Brut of Record letters and Letters of uthoriatuon .e uWu sts are held CO less than ninety ( Oj-d s a�L Niew Bu General documents are held for Lig less than ninety (90) d2ey -.1 Banking staternents, are ,bgld ears, 7Ly LQr f seven _ . . . . L Workforce r-nanber reco ds are -c-fl-d for_seven MY 7 ear's, F. SanffizatigLi of Media G. I nfor rn ation sh a ri ng a tidSdya cy H. Release of company, information K Risk Analysis and Mania erne_nt Risk reviews B, Risk mane erne Increasin " fp tgction to a levO big—herhenwhatis listed In this —document _ N�rovin oversi1 or monitomin of tie risk to limit ire act and minimize response time Urn in transactions or other events to T-ninimizIgethe possible impa!; -rrisk event and Account's B. ID and agcount creation- Expiratign dates for the U,ser ID Renewal process for the User ID Documentation of thfLmle.�busi i �ssrg �Iction relati 1he _User Q _C.essandjobfur -n-cgig1jaM C. Account rnanag(Lnignt ftphca n Sp -s ecific ID XIL AuthentjcaLiQn qj2dp-4jswords Overview Password format Rules XHL AuthorizalignapLI-Right5 MLn (Lment General Auga-s-R-0—les Stjper Admin —Acc-m: Access to all -Lrorvt U a aLL rid duct5a—wella--[-O-d--W-P-t jld--4 Q-19ID—L-- metrics Adrain access ,—access —to—all —front (-,rid oduj:,t s-well as rLmLt-r oduci�s General Access: eccess to rod'uc metrics Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures Low_ �Aces�s8ccess to corporal-e email , sal and marketine data gnfy Amazon Veb Services Cloudant Github ELK Stack Mixpanel Kissmetrics Salesforce Access Rules UmjtingvAaL�c �ssto daitasets and types I�i rrltun,acress to ratlrNsy9_ems Limiting times of access, Tgmporary PLivAkagd-Users and,, Accouints P.A�ssi nm�entan�dRev �caflof�I—P_rocedure An Ern status. An Edit Checkljg for 11 �, i o s�. ---.a tgrmi�nat EJJO XLV, �Brc �esor _lmpffn--flssible—U-_ses Disclosures Definitions Peinetratiorrs of s stems a Ilcatiorrs networks or databases, Re LLW of service attdL.Cks Misuse or shanclfin of assets YLr.g-s-aLgjher m.�a_lw—are cooti Iransactigil errors. Breaches cif §—,onfidenj:faILi agre t4_ __aMgDj:5 or conlfa _CLS X)j. Breach Response A. Overview Confidential RepaqiM Capin ma leave voice messaeeLth,e ISO or AISO 5g�(Li Li &an email t o th e or ALSO ®r XVI. Personnel Security Screenitw for newly hired personinel,-LWL d garfles.vendors Professional quahfL . tLon� Identity checks Criminal checks Confirma'Lion, of acad-Qmic and professionaex erience, B,Trainj=andA warene .5.5 Managing rnaficious softw--- Ip viru ses j Using workstation s') securelv Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures LAana&jnIIF,p passwords and Mo:niitoring and rgpQLtLn.g suspidogs use of-3-,cc_O-u-1ntLsJ C. Terms gfgDiploy iient D, Acknowledgement E. Exit process, for users Refinouish all access to conitrol devices Rgpgrt all sr is in arse h, they person. Relinquis,h, all information stored, whether -on paper or on backup rnedia eh wish a1l_jOfQrmCion processing--de—vLcLe-5�,��g-l-v�rks-t-ci-f-o-n-s-,--w-LI . L Virtru-owned mobile —devices and others All systems access LALfll �Ije revoked.. Secu j±i Sajiction PolicV First SeCljrjtyjpff2,cj A 5iMDIeLLQ_tractjon gnd The first infraction-jn-the L!gsLIy2M Second Security Infracdcjn_p LFirst Sedotj5 infraction A serious infraction, o The seprnfractjQ a -of eWhet typ Third Security Infraction oir Second Serious Infraction A second serious infraction _within 3 years, or A third infraction of any Lype wiLl The 5anction will be dismissal from the _workforce. XVII, Legal and RggMato ryjs��tjes Le.alrocesses CDDY r' bI— -z saltd licenses C. Export controls MjlNde ware and Anjivirus Definitions p-Malft-WALM anti malty tie r uuirements Macintosh, Linux and Whones: PC Operpti qgms-. Android and Windows Phone Ooerating Systgerns: Affiliates Infected devices Empro yees' Requirements equipment withgy ermissioLn the ISO. W-Q al ( a rn i I a T- sources, Enforcement I. Chan Preface Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures B. Policy SUffident WOLMadon is _available for roper inyestigation of ease mLuseindents and performance ,Qsec.ID, event gate �and time erg aintalned Th-ne is according to a known time starnp so that events across systerns can be coordinated 4. End -to -end aCCOUn4ability i:5 always maintained Cban gg5 rn s a -!gLgpgl:ging,.,syste._pp!.icatioo code or other tools Backup-a--nd —restore events Changes affecting any cryptpographic keys or devices Stop or start of critical processes 'Transaction faidure, retry orb ication KissMetrics SeementJo 5gadgrid XX. Encryption Preface Application EnIc"ryp't.-Jon Policy D. Device Encr Lion -Pow gy Mac OS Devices: Windows OS Devices: Lino--K OS f)2yjces Android Devices Windows Phone iPhone J. Wj --R net... k —enipjLo n L, EojaLl ea-crypLiol-I G. Enforcement XXI.-Assesime[Its and Testing Overview B. Penetration t&sbn Qera ha&s Stems ADDlications Databases -Vulmabilitv assessment,tes tin or netis 'nstijjj2ggLjp 5�ide th _Q_Cq= ny Chances are made to fire waj,ls, YPNs or. o1hff Securitv control tools ChangeL arQ made to a MLeb _server-s _g�t i n�s Vg,,Ln !LIja ngeLare rn g_email servers s ConfiggfatiQn than es are inadg to datab ases Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures Configuration c Changes are nLade to encryption scherne,", D. Wireles,s access E. Password testing XXIL Use of Email Internet, Messaig� ng, Public Sites- 1131log, S-o,cia I Medi'a Poky Sexgplly exlicit material Confidential, Private or Protected Information or Internal U$Lrnatp ial, qxcepLE!, meets the HandliO-S Ssectiong 8 UL12L- Viruses Threat Ln a p offensive Lgii �ua e Language inalp-2. r oriate for the Co m an environment, Discriminatory or harassing lgngggigg Tools for hagkin &-pw—assord cracki� vuND'16111rablit y testinF, XXIII. Hardware Definitions B. Policy C. Asset maniage.oLient D. Enforcement XXtV. Networks Overview Denial of service attacks lmi)ror)er access Virus infections nauth _sa_g_e U pgLM Administration of netw k and cQmmunications connections Operations of all devices Monitoring Timely rayii�ewof a�iucfit I �g5 and response to alerts carer alarms Review of unusual patterns Of Usagg-ocja Monitoring Access control and physigal smirity Access firnited to authorized pgrsoanLl only Physical security, including RFID- -Qr.RassqDde co =11ed locks, are in L place, MDdffiLat ons updates �L_,— Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures Firewalls Internet APAroved itl1�e I5D P,eriodicallv reviewed and tested for yginerabilities Protectedbyf irewa!l�5cietectioi systems and anti-malware tools YPN-Cernote access. Wireless Telework Policy —PatchingDf s Network ha:LdeninZ XXV. Physical and Environmental Protections Definitions Com2gjjag_center's Network gg�ne(�CiQn points Media storageJocations _Locations L�_Qn_tg'ning latforprn2is which ca ri h or r -value or critical information .:---—Y h g transactions B_--5_Q_C_UTR S �tes P�QfiCv Med_a libraries ,Uec!L!!cal sum s,and :ontrols Environmental and inec! nical controls XXVI. Physical Security Policy A. Entry Police Loss of RFID key mobile dgvjce,� D. Video monitoring Alarm system Fare rottiom�, XXVIL Software Overview IB. Acaulsition of software C. Op,2n Source Software It is not used in -a irod ,r _uction environment OR Prior to use it is full v tested, documented and Viqru's Personnel are assigned to su ort it. becks to lie performed include: The souirce, of tide _softwqr(LLis..(L ocui -nented URL Pro*ect lead Contributors D_ppzioves of the use D. Documentation Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures E. QIL control and maintenance E,.O �eratingSygems G. Applications Access control Authorization �n LbErnatbn c�ajs�s—ification Storage controls Backup and restoration Confideatiafity and inteZ-tLily-Lg-q-u-i—re—n-ign-t3 Audit logs Rrivacy.ex ort �contro and other suCh re uirernerLU" H, Asset many ernent,for softwgLm- 1. Enforcement XXVIH. Rernova_bIg Media Device Polity .......... Purpose B. Scope C. Definitions D. Policy E. Usin Rcrnovabledj,@Devices F. Exceptions G. Refusal H. Enforcement Arjokation, Recovery Plan Overview Scope Data durability and refi h"may Encryption Load balancing Restoration of data G. Testing and revisioni, of lan: NgLtLwmork Attached Storap-e and Worksta ign Backup Plan Overview Poky BackLAR software Remote backups Local backups fngMtjQIi of back-ups Restoring data H. —Enforcement Information Integrity LMpnageme LPoric n ----y Overview 10 Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures a -- —p-0-1 -iC-Y Securitv Incident ManaggLr_mentPohcy Qverview Procedures L.—PO—H—Cy Segurily Overview Procedures Appandices Change Logs B. Information SeQrihiCorte , 11 Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures Virtru may be referred to as "Company." A. I)ocunientr control A staff copy of this document is available with the Information Security Officer (ISO), Will Ackerly, willackerl. 2yirtru c_om (202) 577-3683, and Assistant Information Security Officer(AISO), Jordan Duggan, jorda ij virtru rr (202) 577-3683. Il c . ruin„y 1C oc�.�rm q� jji: IIII.Riilry .uii y These policies and procedures and related security practice information will be kept in our Security Documentation Library (SDL). The SDL is located in 1s ale db ire and backup to the Synology NAS. Documentation about security practices (logs of activities, etc.) will either be kept in this SDL (or Notebook) or in a short file in the SDL that will describe where the security practice documentation resides. The intended result is that anyone with access to the SDL will be able to locate any piece of documentation associated with our security program. Outdated and superseded materials from the SDL will be kept in an archive (the Security Documentation Archive) for at least seven (7) years after the date when they are first outdated or superseded. A, Overview It is vital to the reputation and profitability of Virtru that our information and our clients' information, in all forms, be protected from unauthorized use, modification, loss, copying, etc. This document sets out the default standards, which must be met to ensure that control. Our information may exist on paper, in voice systems, on IT systems and networks, in the minds of our people, and in other forms. The information which needs protection includes, but is not limited to: 1. Client information (both for customer companies and for people as individuals) 2. Financial information, including credit cards, salaries, banking, transactions and more 3. Medical information of all types 4. Company patents, business plans and other intellectual property 12 Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures S. Company business records and planning materials, including our customer list, marketing and sales efforts, product line plans and more 6. Copyrighted materials, both which our Company creates and those which we obtain under license from others B. Policy Compliance with these standards is mandatory. Any deviation from these standards must be approved beforehand by the ISO. A. Information. Security Principles The protection of information can be described in several key dimensions:. 1. Confidentiality 2. Integrity 3. Availability 4. Provability In this document, the standards given are the Company defaults. They must be applied where appropriate, but always balanced against the cost of implementing the control, and the value of the information involved. B., Definitions To prevent confusion, these are the definitions used throughout this document. Policies: Corporate documents which set out Virtru's position regarding business processes, behavior of personnel and similar topics. Policies are a high-level statement of Virtru's position. Some of Virtru's policies, which relate to information security are: 1. Information Security Policy 2. Privacy Policy 3. Acceptable Use Policy for IT Systems Users 4. Employment Policies Standards: Rules that must be followed to enable an effective information security program. Compliance with the Standards is mandatory, but deviation is possible if approved by the ISO. Standards define the minimum baseline procedures, practices and configurations for systems, applications, controls, networks and related topics. Standards are designed to provide a single reference point for use during software development and adoption, Rev.2015.8.6 13 Agreement No. 7434 Security Policies and Procedures installation of systems and tools, and during the contracts process with vendors and service providers. Standards do not, however, give detailed command -line instructions on how to meet the Virtru's policies. Those are given in the guidelines. Guidelines: Built for each application and platform; to be followed when implementing that particular tool. A Guideline may vary a bit from one implementation to another, as long as the Security Standards are met and justification is given and properly documented. Combined, these three levels of documents provide a method for Virtru to audit itself and ensure proper controls are in place, without excess cost or risk. They also provide a means for Virtru to explain to regulators, examiners, external auditors or investors how our Company is safe, trustworthy and efficient. IV. Us n 1rhes taimd .rds A Audience: - Who will use this document This document applies to Virtru's employees, business units and any Business Associate Subcontractor supporting Virtru: 1. Technology and business process providers should comply with these Standards as a matter of contractual obligation 2. Employees and Business units within Virtru should comply, unless a Risk Assessment has been done and a deviation is approved by the ISO 13 L:I�ow the doct rneint is uuse This Standards document is a reference point to ensure a consistent framework of protections is in place. Implementing these standards involves: 1. Review of existing controls, procedures and tools against the Standards 2. Documenting compliance or deviations 3. Gap Analysis to determine where improvements are needed 4. A Risk Assessment to validate that the improvements are justified against the costs of the controls and the value of the information involved 5. Creation of a plan to close the gaps OR signoff of a deviation 6. Documentation of the new controls, procedures and tools No signoff or approvals are needed if a level of protection higher than what is given in this Standard is determined to be needed for a given information asset. Rev.2015.8.6 14 Agreement No. 7434 Security Policies and Procedures C. Maintr inhig this document This document must be reviewed at least once a year or anytime there are significant changes in software or security. Updates must be made to keep it in accord with Virtru's overall business goals and risk position. The document will be reviewed by the ISO or AISO. Any updates, improvements or suggestions should be sent to the ISO. V. Roles and Responsibilities A. Mules for ownership of Infor°rrbatiori The information and systems provided by Virtru to workforce members, contractors and representatives are owned by Virtru, which also determines appropriate usage and access rules. All data on Virtru's systems and networks is owned by Virtru, with the exception of software that the ISO has approved to be open sourced or otherwise transferred to another entity through code escrow or code exchange and/or trade. In this document, the words 'information owner' refer to the person who owns the responsibility for the information. The information itself remains the property of Virtru. 13. Inf°ornial:ion tiser°s Every user of Virtru's information must protect that information and ensure that it is used for Virtru's business purposes only. Any incidents or questionable issues in the security of our information must be reported to the ISO or AISO. Information users may not assign access rights, authorize destruction or copying of information, or change the protections given to information assets. Information users must comply with all laws, regulations and Virtru's policies and procedures. C. Ir for°imation. Sectir°ity Officer Virtru's ISO and AISO will: 1. Manage awareness programs relating to security and privacy topics 2. Maintain a etx al, �µecorci oI`ecerio to this Standards document 3. Manage changes to this Standards document 4. Provide leadership relating to new security risks, controls and technologies 5. Oversee and approve the sharing and reuse of Personal Identifiable Information (PII) collected by or processed by the company See Appendices for further information and lid firact�rrr r r,�r�tt, for a current listing of members. Rev.2015.8.6 15 Agreement No. 7434 Security Policies and Procedures VI. Information Classifications and Requirements A. Ovf,,,ir vi eW Information is classified by system to ensure that the controls applied to it are sufficient and also to ensure that the controls applied do not impair Virtru's business, ability to compete or Virtru's image. All information must have a classification for security and must have requirements set for business continuity. fl, ]II"he fiecit.rit:y c:la^ suifir°aHon. process Each information asset will go through the following classification process. Information assets include, but are not limited to: 1. IT platforms such as servers and workstations 2. IT applications including database transaction processing and email 3. Data sets 4. Paper copies of information 5. Information types typically known to workforce members, such as customer information In general, an information asset includes both the raw information itself (paper, oral or data entry), the location where it resides, the business processes which handle it and the systems and tools that handle it. Information assets will also be reviewed during: 1. Development, acquisition or deployment of software 2. Connections of computers or networks to outside systems or networks Granting of access to any outside organizations The security classification of an information asset is assigned according to the highest of these dimensions. As an example, if an asset is regulated by law, then it needs the highest classification, even if the asset is not critical to the Company's business. C. The classes o infornial:iion for Soo-t urii:y and IIIPiri:vacy This policy applies to all workforce members, management, contractors, vendors, business partners and any other parties who have access to Company or client data. Rev.2015.8.6 16 Agreement No. 7434 Security Policies and Procedures Data Types The security classification of an information asset is assigned according to the highest of these dimensions. As an example, if an asset is regulated by law, then it needs the highest classification, even if the asset is not critical to Virtru's business. Virtru deals with two main kinds of data: 1. Company -owned data that relates to such areas as corporate financials, employment records, payroll, etc. 2. Personally Identifiable Information (PII) that is the property of our clients or workforce members, such as Protected Health Information, social security numbers, credit card information, contact information, etc. D. Setting requfteinents for business continuity The requirements for an information asset relating to business continuity are not set by classification, but are specific to that asset. They include: 1. Required uptime for the information asset 2. Required restoration time if the data must be restored 3. Required frequency of backups 4. Requirements for storage of backups 5. Requirements for testing of the recovery process The default requirements for business continuity are listed in the information handling rules' section. See 1 andlin , rules s bii the ita t?aatior car" ication in this document and Disaster Recovery Plan for detailed information. This section outlines the basic rules for handling information types according to the classifications. More specific standards for platforms, processes and networks appear in each topic section of this standards document. E. Enf'orceinei 1. It is the responsibility of everyone who works at Virtru to protect our data. Even unintentional abuse of classified data will be considered punishable in accordance with the extent and frequency of the abuse. Rev.2015.8.6 17 Agreement No. 7434 Security Policies and Procedures VII. Handling Rulesfor the InformationClassifications A, Overview This section outlines the basic rules for handling information types according to the classifications. More specific standards for platforms, processes and networks appear in each topic section of this standards document. II. Inventor-y of Int'wii irn.ati n Assets and Electronic Asset. Nlan.agern.ent tog An inventory is maintained of all significant information assets belonging to, or used by Virtru. This inventory includes: 1. Serial numbers/license numbers 2. MAC Addresses 3. Model 4. Device Type 5. Manufacturer 6. The information owner 7. Username 8. Location 9. OS Version 10. The custodian of the information and repository location (database, file cabinet, etc.) 11. Purpose in our systems 12. Asset value in dollars or other suitable measurement 13. The sensitivity of the asset, due to regulations, laws, customer expectations or other requirements 14. Requirements for the asset regarding availability, uptime, etc. 15. Contact information for one or more parties who can repair, restore, replace, or recover this asset. Examples are hardware/software vendors, IT support vendors, and/or staff members This asset list contains information that is restricted to executives and super-admins, and therefore is stored securely on the Synology NAS, which itself is backed up to AWS Glacier. This inventory will be reviewed and updated quarterly, or as new assets and devices are added. Logs are maintained as the Inventory of Information Assets Log and the Rev.2015.8.6 18 Agreement No. 7434 Security Policies and Procedures Organizational Chart/Electronic Asset Management Log. A current copy of this inventory will be kept at a separate location as described in our Disaster Recovery Plan. Hailes for access to infbrwiatjon assets If any given security incident involves a breach of Personally Identifiable Information (PII), the ISO will follow our security policies and Incident and Breach Policy for handling such a breach. If a security incident includes the potential that personal information may have been obtained by unauthorized individuals, the ISO will work with the client to notify affected persons of this event, in compliance with relevant federal and/or state law. See also Breaches or lin germissibl lases Di. clo. res within these Security Policies and Procedures. V111. Access Control Policy A. Overview This policy defines how Virtru manages access to electronic information and systems. Virtru provides access to electronic data relative to the workforce member's job requirement. We limit access to categories of data and systems that each person needs to do his/her job. We require that each workforce member restrict his/her access to only those specific records and functions needed to carry out his/her job. For the purposes of this policy workforce members are anyone in Virtru who has access to Personally Identifiable Information (PII). B. Access levels The ISO will qualify the workforce member to have one of these forms of access based on the job role (in order of increasing access permissiveness): 1. Low Access to Corporate Email and Salesforce Data 2. General Access to product metrics 3. Admin Access to all front end products as well as product metrics 4. Super Admin Access to all front and backend products as well as product metrics The access will match the person's job responsibilities The ISO will keep a record of the type of access provided to each workforce member. The record will include a date and justification and will be kept in our la" l ee A -cess RegiLg. t Loy in the Security Documentation Library. Rev.2015.8.6 19 Agreement No. 7434 Security Policies and Procedures The granting of access to Business Associate Subcontractors will be done in the same way as it is done for workforce members. C Grantiwril.F a(C eSs The ISO will provide accounts with the matching technical privileges and give the workforce member the account information including a one -time -use password that the user must change to a private password upon first use of the account. 1. Only the person assigned to an account will be allowed to use that account. 2. Each time a user logs in to a system, a log will be maintained by that specific program with the following information a) When the user accessed the system b) What information the user accessed while in the program c) Tracking will be done by using the User ID and IP Address d) The ISO will maintain this log for a period of 1 year 3. The ISO and AISO will each have a special account that allows them to create new accounts. The accounts will be used: a) In an emergency when all other accounts have been disabled or locked out; b) To either reset the passwords on locked accounts; or c) To create new accounts that provide needed access. 4. When a change in the role of a workforce member requires a change in access privileges, the ISO will reassess the needs and provide new access privileges based on the policy in Access Levels in this section. a) If a workforce member leaves Virtru, the ISO will remove that member's access as soon as the access is no longer needed. b) If a workforce member takes a leave of absence and is not expected to require access, the ISO will disable the workforce member's account when he/she leaves and re -enable it upon his/her return to work. c) For other people who work around protected electronic information but are not qualified to access it, the ISO will decide which of the following two steps to take: 1) Train the person to understand his/her responsibilities 2) Supervise while he/she is exposed to the data d) For cases in which the provision of individual accounts is not feasible {e.g. access by any one person of a large help desk staff of a vendor}, the ISO will make: 1) A serially reusable account and provide a one -time -use password to the vendor's representative for each time that access is needed; and Rev.2015.8.6 20 Agreement No. 7434 Security Policies and Procedures 2) The password will be changed by the ISO on the account after each use of the account to a value not known to the vendor. f). Vendows, a:°on.trw: ctors and other outsiders Any outside organization that wishes to gain access to our or our client's Private/Internal, Confidential or Protected information must: 1. Sign a Business Associate Subcontractor Agreement; AND 2. Be willing and able to show that their privacy and security controls are at least as stringent as Virtru's controls. See Business Associate Subcontractor Agreement for details of Agreement. A written history of incidents reported by Business Associate Subcontractors (BAS) will be maintained. If the ISO becomes aware of a pattern of activity in which the BAS is not carrying out the contractually required safeguards, then the ISO will do one of the following: 1. Attempt to remedy this failure 2. Terminate the contract, if attempt to remedy is not feasible 3. Report the situation to the U.S. Secretary of Health and Human Services, if terminating the contract is not feasible. If any given security incident involves a breach of Personally Identifiable Information, the ISO will follow our privacy policies and incident management plan for handling such a breach. If a security incident reported by a BAS includes the potential that personal information may have been obtained by unauthorized individuals, the ISO will work with the BAS to notify affected persons of this event in compliance with relevant federal and/or state law. See also Bw�a°es.wr lwr� wwHrwrarssibiww ls° rs iost_wre within these Security Policies and Procedures. E. lll ridiviw:luals Individual persons who work for such an organization must also be bound to the outside organization's controls. Such individuals must: 1. Have Business Associates Subcontractor Agreement with their own company; OR 2. Have a contract with their company; AND 3. Have appropriate background checks and bonding in place. 21 Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures 17. 11olicy Virtru will not knowingly accept any confidential information belonging to third parties until that information is reviewed against our protections and the appropriate agreements put into place and signed by the information owner. The agreements should include all requirements for controls over the third -party information and the processes to be followed. , ilublic/un lassil"ied data This type of information does not require special marking or storage, except to ensure that it is available when needed. It does need to be kept safe from unauthorized modification. B f1r°ivalle/inter'nal data Access is granted on a need -to -know basis, as authorized by the manager of the user of the information. Some types of jobs are automatically granted access to data in this class. Paper products and backup media containing this type of information must be stored and handled in a secure manner. This includes: 1. Printing this class of information only to a known printers located in secure areas on secure networks. 2. Encrypting or physically securing backup media 3. Keeping paper copies of information locked or otherwise secured This class of information is not released to anyone outside Virtru without a non -disclosure agreement, a Business Associate Subcontractor Agreement, and/or without the approval of the information owner. Private/Internal use information must not be transmitted across any unsecured outside network or path without proper controls. This means encryption for files and emails or secured packaging for paper copies. C. Confideni::ui.al. or pro ec;led data Access to this type of information is on a need -to -know basis, as approved by the ISO or information owner. This class of information is not released to anyone outside the Company without a non -disclosure agreement and without the approval of the information owner. Rev.2015.8.6 22 Agreement No. 7434 Security Policies and Procedures Confidential or Protected information must not be transmitted across any unsecured outside network or path without proper controls. This means encryption for files and emails, or secured packaging for paper copies. Paper products and backup media containing this type of information must be stored and handled in a secure manner. This includes: 1. Printing this class of information only to a known, secure printer 2. Encrypting and physically securing backup media 3. Keeping paper copies of information locked or otherwise secured D. Managing data sources The key to managing Virtru's business' media and documents is to first consider the source of the information, then the media type. Virtru's media and documents containing Protected Information (PHI, CJIS, or other) require protection from inception through disposition. Regardless of the owner relationship, the Company will be cognizant of the following Media Types: 1. Hard Copy: paper printouts, printer and facsimile ribbons, drums, etc. 2. Electronic: the bits and bytes contained on hard drives, flash drives, phones and tablets. E. IllRete rit.uion o niedia. Retention: The length of time documentation and/or information is retained according to the level of confidentiality and to the business continuity requirements. System/ information owners should consult with the ISO to ensure compliance with the record retention regulations. Virtru's hard copy record retention policy is as follows: We will digitize and encrypt these records for secure storage on the Synology NAS, which will be backed up to AWS Glacier. Virtru's electronic record retention policy is as follows: 1. Agent of Record letters and Letters of Authorization requests are held for no less than ninety (90) days 2. New Business Group documents are held for no less than ninety (90) days 3. General documents are held for no less than ninety (90) days 4. Banking statements are held for seven (7) years S. Workforce member records are held for seven (7) years Rev.2015.8.6 23 Agreement No. 7434 Security Policies and Procedures F% Sanitization of`1144,4iuYa When media (hard copy and electronic) becomes obsolete, is no longer required or no longer usable, it is critical that proper sanitization is accomplished. Sanitization Types Disposal: the act of discarding media. This is often done via recycling paper containing "non -confidential" material. Reinitializing: Re -formatting drives so information cannot be retrieved by recovery utilities or any other forms including keystroke recovery attempts. This is achieved by overwriting the disk with zeros for no less than one (1) time. Purging: exposing the magnetic media to a strong magnetic field in order to disrupt the recorded magnetic domains, this is also known as degaussing. Destroying: destruction of media so it cannot be reused as its original purpose. Virtru's electronic disposal policy is as follows: 1. Hard -drives are purged, reinitialize or destroyed 2. CD or DVD disks are destroyed 3. Flash drives are re -initialized or destroyed 4. Backup tapes are purged, reinitialized or destroyed Any systems that are leased must be securely sanitized of all Company data prior to being returned to the leasing company. Any additional media (e.g. hard drives, USB drives etc.) will be reformatted then written with zeros for no less than one (1) time to ensure that the data contained on the media has been destroyed. Virtru shall maintain appropriate records of sanitization. This entails validating how, where and when media is sanitized. See Media Sanitization. G. I:rmformallioiin sti.aring and privacy In most cases the sharing and reuse of Personally Identifiable Information is governed by law, regulation and customer expectation. To ensure Virtru meets those requirements, no Personally Identifiable Information will be shared with outside companies, vendors or personnel without written approval from the ISO. Personally Identifiable Information includes: 1. Names 2. Addresses 24 Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures 3. Phone Numbers 4. Email Address 5. Dates of birth 6. Social Security Numbers 7. Ages 8. Gender 9. Personal Financial Information 10. Personal Medical Information 11. Criminal History Information 12. Personal Employment Information 13. Personal Buying Histories 14. IP Addresses Aggregated and statistical data developed from this personal information is not personally identifiable and, thus, does not need the approval of the ISO for sharing and re -use. Virtru will comply with all applicable laws and regulations regarding the privacy of personal information, including such laws as: 1. Health Insurance and Portability and Accountability Act (HIPAA) 2. Health Information Technology for Economic and Clinical Health (HITECH) 3. Family Educational Rights and Privacy Act (FERPA) 4. Criminal Justice Information Systems (CJIS) 5. Federal Information Security Management Act (FISMA) Virtru's workforce members, contractors, vendors and suppliers may come into possession of Personally Identifiable Information as a part of their relationship with Virtru. Each person must comply with all laws, regulations and policies and ensure such information is properly protected. H, Re -lease ot°r°oui.nl. any itif'wrrn: tioiiri. Virtru's information may only be released with the approval of the ISO or the information owner. This includes the posting of Virtru's information of any type onto bulletin board systems, public networks, social media or other open sharing tools. Any information released must contain proper copyright, trademark, disclaimer and patent notices as appropriate. X. Risk Analysisand Management Risks to Virtru's assets and environment should be addressed proactively rather than reactively. The controls applied to the risks must also be periodically reviewed to ensure the controls are working properly and efficiently. Rev.2015.8.6 25 Agreement No. 7434 Security Policies and Procedures A, i .isli reviews The job of reviewing risks and setting requirements for controls is the ISO's. Risks should be reviewed or assessed when: 1. Developing or deploying new applications, systems, networks or software 2. When significant changes are made to that same list 3. When business processes change 4. When Virtru enters a new geographical area of business S. When Virtru enters a new line of business 6. When incidents occur or new risks emerge 7. When new regulations or standards are set B. illisip imp nag ine'n1. Risks may be accepted, avoided or mitigated. Accepting the risk is appropriate when the cost of avoiding or mitigating the risk is greater than the expected loss. The losses considered should include the less tangible items such as Virtru's reputation, loss of market share and loss of public trust in Virtru. Acceptance of a risk requires complete documentation of the risk analysis and approval by the information owner. Avoiding the risk is appropriate when the cost of insurance is less than the cost of incremental controls. However, basic controls must always be in place. Mitigating the risk is appropriate in most situations. These situations are those where compensating controls are possible, cost-effective and manageable. These mitigating controls may include: 1. Increasing a protection to a level higher than what is listed in this document 2. Improving oversight or monitoring of the risk to limit impact and minimize response time 3. Limiting transactions or other events to minimize the possible impact of the risk event The method chosen for managing the risk (acceptance, avoidance, mitigation) must match the business value and costs involved and must be approved by the information owner. For further detail, see the Risk Management Policy and the Disaster Recovery Plan. Rev.2015.8.6 26 Agreement No. 7434 Security Policies and Procedures ® IDs and Accounts Each user shall be assigned a unique identification, called the User ID. This User ID is not considered to be sensitive, unless the User ID relates to an authentication process, systems or application management role. On sensitive systems or applications the User ID should not be easily identifiable, thus making unauthorized usage more difficult. Sharing of User IDs is not permitted, unless justified by business requirements and approved by the ISO. For any such shared User ID, the password will be shared using LastPass, and the password will not be shared with the additional user. If this password is shared, it must be changed immediately after the User ID is used to keep the shared User ID from becoming generally available and a risk to Virtru. Guest and anonymous User IDs are not allowed, unless the system involved is not connected to any of Virtru's networks and the system does not have any Company information on it. Typically, these guest or anonymous User IDs are only used during development or during marketing/sales demonstrations. 113. 111:) and acc(� njn cii'eat.ion User IDs are only to be created following a process approved by the information owner. This User ID creation process should include: 1. Expiration dates for the User ID 2. Renewal process for the User ID 3. Documentation of the role, business process and job function relating to the User ID User IDs are to be created for the purpose needed and not in a manner to compromise segregation of duties. A record of all User IDs and their owners will be maintained by the ISO. See the Change Control Logs for Security for further detail. Rev.2015.8.6 27 Agreement No. 7434 Security Policies and Procedures f Account A periodic check will be made of all User IDs and any redundant, dormant or unused IDs will be removed. The ISO must review the privileges set up for User IDs no less than once every year. 1) AppllHcation lipe ifui.cflDs Application Specific IDs and logins are used in support of automated applications, transactions, processes or batch jobs. These have non -expiring passwords. 1. Application Specific IDs must not be used by individuals. 2. Application Specific IDs must be created only with the approval of the ISO, must be documented and have strictly limited access rights. 3. Application Specific IDs must not have ad hoc or interactive capabilities on the applications, systems, transactions or data involved. I ® Authentication and Passwords A. Overview All systems, applications, databases or other information repositories shall require users to authenticate themselves prior to granting access. Authentication may be via an approved password scheme or via an access control device. All systems that support 2-factor authentication must have them enabled. The authentication method used must suit the value of the information asset, matching the cost of the authentication method against the level of protection required. In general, administrative and other high -value User or Service IDs will use the most secure methods of authentication. B. Password foi,,' ma Must be at least twenty (20) characters in length and must contain characters from all of the following four (4) categories: 1. English uppercase characters (A through Z) 2. English lowercase characters (a through z) 3. Base 10 digits (0 through 9) 4. Non -alphabetic characters (for example, ! , @, #, $) 28 Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures (",, Rules Users are forced to create a new password every 3 months. Users must not write down on paper or store any passwords; they must also never share their passwords with other users. Software is provided to securely store user passwords, with encryption. A maximum 5 attempts will be permitted prior to disabling the account. New passwords must be different from the previous three (3) passwords. Passwords must be changed immediately upon first use of a new ID. Passwords must never be stored or transmitted in clear text. Systems must not echo back the password as it is entered. Passwords must not be retained by any system or application longer than is needed to grant access. Initial passwords must be transmitted separately from the ID. A. General Access Roles Access roles are defined as: 1. Super Admin Access: Access to all front and backend products as well as product metrics 2. Admin Access: Access to all front end products as well as product metrics 3. General Access: Access to product metrics 4. Low Access: Access to corporate email, sales, and marketing data only Amazon Web Services (AWS) Users who have access to AWS have Super Admin Access. User sessions will expire after one (1) hour of inactivity Cloudant Users who have access to Cloudant have Super Admin Access. User sessions do not automatically time out, the user is required to log out at the end of a session. Github Users who have access to Github have General Access. User sessions do not automatically time out, the user is required to log out at the end of a session. ELK Stack Users who have access to ELK Stack have Admin Access. User sessions do not automatically time out, the user is required to log out at the end of a session. Rev.2015.8.6 29 Agreement No. 7434 Security Policies and Procedures Mixpanel Users who have access to Mixpanel have General Access. User sessions do not automatically time out, the user is required to log out at the end of a session. Kissmetrics Users who have access to Kissmetrics have General Access. User sessions do not automatically time out, the user is required to log out at the end of a session. Salesforce Users who have access to Salesforce have General Access. User sessions automatically time out after twenty (20) minutes. Segmentdo Users who have access to Segment.io have General Access. User sessions do not automatically time out, the user is required to log out at the end of a session. B Access i .Wes User IDs and accounts must be authorized to access only those elements needed for the user's role, including: 1. Limiting access to datasets and types 2. Limiting access to operating systems 3. Limiting times of access Access to operating systems, ad hoc transaction capabilities, software development tools, and other system devices must be controlled and limited to only those User IDs which require that access. Segregation of duties shall be established for all information asset controls to minimize the possibility that one person is responsible for an entire asset. A user (and hence User ID) that changes role or job function must have access rights updated to match the new job role or function. Any changes will be documented in the Responsibility Change Log. C. Tern.poirary Privileged Users and Accounts Temporary privileged users are defined as those who: 1. Have any control over security tools on an application, system or network 2. Can update operating systems or similar tools 3. Can directly modify data within a database or application 4. Have any special capabilities built in by the vendor of the application software, operating system or platform Rev.2015.8.6 30 Agreement No. 7434 Security Policies and Procedures Access at a temporary privileged user level shall be granted only on a need -to -know, need -to -perform basis, and then only to the assets required. Temporary privileged user access shall only be granted to those supporting Virtru's applications, networks and systems. R. Assignnent and Revocation Procedure The ISO shall electronically complete: An Employee Access Log for all new hires and/or workforce member change of status. 2. An Exit Checklist for all terminations. E. f,ci�i���utAf�ler Inactivity . f� The ISO shall verify that all users have activated a password -protected screensaver that automatically prevents unauthorized users from viewing or accessing electronic protected information from any system or device that can be used to access electronic information systems. After a maximum of 10 minutes of inactivity the system should log off and lock the device, making information inaccessible. Once logged off a user must re-enter a password to gain access to electronic protected information. A. Definitions Incident is defined as any breach of security, privacy, continuity, legal or regulatory controls over information assets of any type. Examples of such incidents include but are not limited to: 1. Penetrations of systems, applications, networks or databases 2. Denial of service attacks 3. Misuse or mishandling of assets 4. Virus or other malware contamination 5. Transaction errors 6. Breaches of confidentiality agreements or contracts 7. Legal or regulatory violations Breach is defined as an impermissible access, use or disclosure, which compromises the privacy or security of PHI. Rev.2015.8.6 31 Agreement No. 7434 Security Policies and Procedures A.Overview Virtru will maintain an effective method so that all information users, custodians and owners can readily report incidents. Incidents will be reported to the person's immediate manager or the ISO. Once the ISO has been notified, said Officer will then follow the directions in the Inci ei an l 13'rp nji Policy. The ISO will investigate incidents and will log or report significant losses or threats immediately. The appropriate authorities will be contacted by the ISO depending on the severity of incident. Incidents involving misuse by workforce members will be investigated by the ISO. Depending on the severity of the incident, the Emergency Contact list may provide additional contacts.. See the L, er enc;y Cont(ler lj °t located in the Qjl; rste c cajjL?:L� Plan. Confidential Reporting: Confidential reporting may be done either by: 1. Calling (may leave voice message) the ISO or AISO 2. Sending an email to the ISO or AISO, or; 3. ;o lei Form for dinon incurs r2 )os•tila -- A. Screm cming for newly hired peirm onnel, thi.mrd parties, vendors Proper verification checks must be made prior to granting any new workforce member, contractor, vendor, agent or affiliate access to Private, Internal, Confidential or Protected information, These verification checks will meet the requirements set, forth by the Company and may include: Rev.2015.8.6 32 Agreement No. 7434 Security Policies and Procedures 1. Professional qualifications 2. Identity checks 3. Criminal checks 4. Confirmation of academic and professional experience The ISO is responsible for ensuring that background checks are made biannually on parties who are not newly hired workforce menibers. A t1fird party will conduct background checks. B. Training and Awareness Virtru will provide security awareness training to each new member of our workforce with access to electronic Company -owned or private data Rpj" o Data Tyvs k it nrajati Cla�, ations) whose activities in the business we directly control. The . -gjL2 i-sificw— training will be provided prior to that person assuming his/her duties. The training is designed to inform the person of his/her responsibilities tinder Virtru's security policies. At a minimum, this training will include the workforce member's role in: 1. Managing malicious software (e.g. viruses) 2. Using workstation(s) securely 3. Managing passwords and 4. Monitoring and reporting suspicious use of account(s) Virtru's employees will also be trained annually on Virtru's Policies and Procedures. A record of successful completion of this training and annual retraining will be kept online by Total HIPAA Compliance. Within 30 days of starting,, individuals who are employed as developers will receive training on the security measures and mechanisms used to protect the company's systems and service. All new developers will be required to take and pass online training Modules covering secure roding w1ion using Node,.is. Developers who will be managing or developing operational aspects of the company's systems will also be required take the Security Operaligiis on AWS training course from Amazon. A record of training will be kept of training that lists the employee, type of training, date of completion, the employee's signature, and an admins signature asserting successful completion of the training. C,.Ter�itns of employrricia Compliance with Virtru's policies regarding security and privacy are a condition of employment. Rev.2015.8.6 33 Agreement No. 7434 Security Policies and Procedures D AcknowledIgerriell) i: All users shall be required to sign an acknowledgement after being trained on Virtru's security and privacy policies. Upon exiting employment or any relationship with Virtru, all users who have been granted access to any information asset shall: 1. Relinquish all access to control devices 2. Report all User IN in use by the person 3. Relinquish all information stored, whether on paper or on backup media 4. Relinquish all information processing devices, including workstations, all Virtru-owned mobile devices and others All systems access will be revoked. The ISO will verify termination is completed, and document this procedure has been followed. See Exit Checklist. F Security Sanction 11,1olicy Virtru's security policies call for the workforce that has access to electronic Protected Employee or Client Data and others to perform certain duties and to refrain from certain actions. Failure to do so will be sanctioned according to the policy below. If the infraction involves the unauthorized use or disclosure of electronic Protected Employee or Client Data, the sanctions below apply to the designated workforce members including managers, supervisors, and staff who have access to Protected Employee or Client Data. We define a serious infraction as one that results in known significant damage or that threatens imminent significant damage. Other infractions are simple infractions. The process below is intended as guidance for our business management in sanctioning Security Policies and Procedure infractions. We reserve the right to implement sanctions differently if, in our judgment, the situation warrants it. First Security Infraction If the infraction is: 1. A simple infraction, and 2. The first infraction in the last 3 years The sanction will be retraining the workforce member on the appropriate policy/procedure and placement of a written letter of reprimand in the employee file. Rev.2015.8.6 34 Agreement No. 7434 Security Policies and Procedures The letter will notify the person of the nature of this infraction and of sanctions for future potential infractions. Second Security Infraction or First Serious Infraction If the infraction is: 1. A serious infraction, or 2. The second infraction of either type within 3 years The sanction will include a written letter of reprimand that is given to the person at fault, placement of a copy of the letter in the employee file, and one week's suspension without pay. The letter will notify the person of the nature of this infraction and of sanctions for future potential infractions. Third Security Infraction or Second Serious Infraction If the infraction is: 1. A second serious infraction within 3 years, or 2. A third infraction of any type within 3 years The sanction will be dismissal from the workforce. X Legal proc,esses Responses to subpoenas, deposition requests and other legal issues will be referred to and handled by the CEO. The ISO will not respond to such legal processes without company legal counsel. 1 . laopyriglii.s and licenses Virtru may have agreements in place governing the use and handling of software, information and other tools that are owned by other entities. All users and information owners will comply with those agreements. Users are responsible for complying with copyrights regarding any material obtained via the Internet. This includes files, graphics, software, audio and video materials. Users may not agree to a new copyright license, unless given permission by the ISO. Licensed software must be used in accordance with the license agreement and only the number of copies licensed must be created or used. Rev.2015.8.6 35 Agreement No. 7434 Security Policies and Procedures C l`.,Xpo rt corulurols Information may not be exported across country boundaries without prior written approval of the Company's ISO. XV111. Malware and Antivirus A. ➢I)e1linilions Anti-Malware: malicious software that may reside on a computer, steal information or cause destruction. This can include a virus, trojan horse, keylogger, hijacker or dialer. Sandbox: A highly controlled area where programs and software can be tested before being allowed access to the rest of the system. B. li'�'�'��'�"m��1�. VY�. ��', �,w �"s�.�:��� ��.�"�.��"'��m�C���. m^:�. W, a:�.��� �M �r ���.����. iI irenn, ;'nts Macintosh, Linux and iPhones: Virtru has determined that software for anti-malware scanning on Macintosh, Linux and iPhones is not necessary due to the low probability of encountering malware, the demand on computer processing power, and loss of productivity by the user. This policy will be reviewed annually or as needed to determine if this is still valid. PC Operating Systems: Data entering Virtru's Window -based systems must be subject to an up-to-date anti-malware scanning tool that is scheduled to run at regular intervals. In addition, all emails, attachments, disks, backup media, USB memory devices and other data carrying tools must be scanned before they are downloaded or allowed access to the system. All incoming data must be sandboxed by the anti-malware program before it is allowed access to the system. The anti-malware pattern files must be regularly updated. Android and Windows Phone Operating Systems: All such devices must have anti-malware tools in place prior to being connected to Virtru's networks. These systems must be subject to an up-to-date anti-malware scanning tool that is scheduled to run at regular intervals. In addition, all emails, attachments, and SD cards must be scanned before they are downloaded or allowed access to the system. (". Affiliates Virtru and all of its affiliates, contractors, consultants, vendors, representatives or other service providers must make certain that adequate controls are in place to guarantee that data coming from their systems and networks is free from malware. Rev.2015.8.6 36 Agreement No. 7434 Security Policies and Procedures D., Infected devices The ISO will use approved tools to monitor and remove malicious software from Virtru's assets. Virus -infected computers, tablets or phones must be removed from the network immediately until they are verified as virus -free. E, Ei.yiployees' IItegtii irerruie�hats 1. Workforce members will not load software on our Company's information equipment without permission from the ISO. 2. Workforce members will not open electronic files from unfamiliar sources. 3. Will exercise best practices when using the Virtru network. The employee will not: a. Circumvent user authentication on any device b. Sniff network traffic c. Access data, servers, or accounts they are not authorized to access d. Cause a disruption of servers e. Violate copyright law by transmitting copyrighted pictures, music, video and/or software f. Export or import software, technical information, encryption software, or technology in violation of international or regional export control laws g. Use the Internet or network in a manner that violates Virtru's Security Policies, or local laws h. Intentionally introducing malicious code; including, but not limited to, viruses, worms, Trojan horses, e-mail bombs, spyware, adware, and keyloggers The workforce will be trained to know and carry out these malware protections. The ISO will generally provide permissions as required above only for actions that are intended for our Company's business and only under conditions that limit the potential for the introduction of malware. F". Enf rcenient Any activities with the intention to create and/or distribute malicious programs into Virtru's networks (e.g., viruses, worms, Trojan Horses, e-mail bombs, etc.) are prohibited, and user will be subject to Virtru's Sanction Policy, and will be reported to the proper state and federal authorities. Rev.2015.8.6 37 Agreement No. 7434 Security Policies and Procedures The ISO is required to maintain logs of systems that document any changes and access users may have to sensitive systems. The following are the retention policies for these logs. B. 1-10 I.iiucy Audit logs will be retained for at least one (1) year in raw format, preferably electronic, to preserve evidence. Audit logs must be configured to prevent overflow, erasure or tampering. Audit logs will be configured to record information such that: 1. Sufficient information is available for proper investigation of use, misuse, incidents and performance 2. User ID, event type, date and time are maintained 3. Time is according to a known time stamp so that events across systems can be coordinated 4. End -to -end accountability is always maintained Events to be recorded include, but are not limited to: 1. Login and activity by any other privileged accounts 2. Changes to operating systems, application code or other tools 3. Backup and restore events 4. Changes affecting any cryptographic keys or devices S. Stop or start of critical processes 6. Transaction failure, retry or duplication All systems and tools involved in the protection process are required to always have change logs enabled and properly configured. This includes: 1. Firewalls 2. Email servers 3. Anti-malware tools especially the administration tools 4. Security administration tools such as password resets and account modifications 5. Monitoring tools 6. Routers and other network devices 7. Github 8. Amazon Web Servers (AWS) 38 Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures 9. IBM Cloudant 10. SalesForce 11. Elk Stack 12. Mixpanel 13. KissMetrics 14. Segment.io 15. Sendgrid 16. Customer.io Logs will be reviewed and analyzed by delegates of the ISO. Reports of problems and incidents will follow the incident reporting method, listed in the Incident and Breach Policy. m Enctyption Encryption is the process of encoding messages of information is such a way that only authorized parties can read it. B. Application Encryption Policy Virtru encrypts all client data using NIST-approved cryptographic modules. Virtru uses AES 256 encryption for its application. Virtru's key length requirements shall be reviewed annually as part of the yearly security review and upgraded as technology allows. The use of proprietary encryption algorithms is not allowed for any purpose, unless reviewed by qualified experts outside of the vendor in question and approved by the ISO. C'. i ;y iiota imin Policy Virtru requires the following key rotation policy to protect all external systems. The following is the list of policies for the following keys: 1. Secure Socket Layer (SSL)Keys Virtru uses SSL keys to enable Transport Layer Security (TLS) traffic between clients and Virtru's servers. Rotation Pol:ic 39 Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures Rotation of SSL Keys is done upon SSL Key expiration. They are set to expire at 1 (one) year and rotated at that time. If there is an incident or the security keys are thought to be compromised, the keys will be rotated immediately. 2. Secure Shell (SSH) Keys The SSH keys provide a layer of authentication to get into the production servers. SSH Keys are used as the authentication mechanism to remotely login to a server. They are also used as the first factor of authentication to assume root access on the production servers. Each developer has his/her own SSH key and is responsible for keeping this key secure. Rotation Policy All SSH keys are rotated at a minimum of every three (3) months. If there is an incident or the SSH keys are thought to be compromised, keys will be rotated immediately. 3. Amazon Web Services (AWS) Access Keys Unique AWS Access Keys are given to each developer with a unique AWS Login. This allows the developer to make Application Protocol Interface (API) calls to AWS. Currently, 1-2 AWS Access keys exist per developer. Where are these stored? How do you know how many keys each developer has? Rotation Policy These keys are rotated at a minimum of every 90 days. If there is an incident or the AWS keys are thought to be compromised, keys will be rotated immediately 4. Application Keys Virtru uses these keys to encrypt sensitive key data stored in the CouchDB database managed by IBM. There is only one copy of this key. Rotation Policy No rotation requirement. Backup Policy Backup of the key is kept with Virtru's Super Administrators. The export of encryption technologies is restricted by the U.S. government. Residents of countries other than the United States should make themselves aware of the encryption technology laws of the country in which they reside. Rev.2015.8.6 40 Agreement No. 7434 Security Policies and Procedures D. Device Encr•yptiion Policy Virtru requires devices have encryption enabled for any files, folders, drives, databases, or other stored data that may have sensitive information including protected personally identifiable information. The implementation of any encryption scheme is performed by the user and the deployment of the encryption tool, including all keys, must meet industry best practices and be properly documented. Currently the minimum standard is 128-Bit encryption. Encryption keys will be managed by the user and a log will be maintained by the ISO. Mac OS Devices: Mac OS devices that store Protected Information (PHI, CJIS, etc), are required to use full disk encryption using FileVault 2. Users must provide a copy of their key to the ISO; both will maintain the key in a secure location. For devices that do not store Protected Information (PHI, CJIS, etc), full disk encryption is at the discretion of the user. However, if this is used, a copy of the encryption key will be stored by both the user and the ISO in a secure location. Windows OS Devices: Windows OS devices that store Protected Information (PHI, CJIS, etc) are required to use full disk encryption with the program Bitlocker. The encryption key will be maintained in a secure location by both the user and the ISO. For devices that do not store Protected Information (PHI, CJIS, etc), full disk encryption is at the discretion of the user. However, if this is used, a copy of the encryption key will be stored by both the user and the ISO in a secure location. Linux OS Devices Linux OS devices that store Protected Information (PHI, CJIS, etc) are required to use full disk encryption. This will be encrypted at a minimum of 128 bit encryption. The encryption key will be maintained in a secure location by both the user and the ISO. For devices that do not store Protected Information (PHI, CJIS, etc), full disk encryption is at the discretion of the user. However, if this is used, a copy of the encryption key will be stored by both the user and the ISO in a secure location. Rev.2015.8.6 41 Agreement No. 7434 Security Policies and Procedures Android Devices All Android devices that store Protected Information (PHI, CJIS, etc) will have encryption turned on and will be password protected at all times. The encryption key will be maintained in a secure location by both the user and the ISO. Windows Phone All Windows Phones that store Protected Information (PHI, CJIS, etc) will have encryption turned on and will be password protected at all times. The encryption key will be maintained in a secure location by both the user and the ISO. Whone iPhones are natively encrypted. These devices are required to be password protected and/or biometrically protected at all times. lllf ui .i 1 i'ietwokencr All wireless access points owned by Virtru are required to be protected using Wi-Fi Protected Access 2 with Advanced Encryption Standard (WPA2-AES). This password will be changed quarterly and will not be shared with users that are not employees or authorized Business Associates. Any outside users are required to use guest access points. Employees that access Virtru resources from home are required to use Wi-Fi Protected Access 2 with Advanced Encryption Standard (WPA2-AES) to protect their devices. This password should be changed quarterly. 17. E'niiail encryption, Virtru requires the use of its secure, encrypted email service to communicate with our employees about their Personally Identifiable Information, and to communicate any sensitive data. All email communication that includes personally identifiable data, and potentially sensitive data will be encrypted. Virtru uses only its secure, encrypted email service to communicate with clients about their Personally Identifiable Information. Virtru forbids the use of chat, texting or instant messaging programs by devices that store PHI. Any workforce member found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. SeeS_qnction Polrcv. 42 Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures XXI. Assessments and Testing The Security Rule of HIPAA mandates that covered entities implement appropriate information security policies and procedures to protect PI from "reasonably anticipated threats and hazards." 13. Ilenetratuiion telst:ing, Penetration testing of all servers containing PII will be conducted monthly by internal personnel, and by an external 3rd party at least annually or whenever there is a major system update. Testing shall validate the security of: 1. External connections 2. Operating systems 3. Applications 4. Databases S. Network controls 6. Security procedures, including monitoring and incident response C. y ulnerability assessment testing Vulnerability assessments will be conducted periodically on all network -connected systems devices. Any vulnerability found must be corrected in a timely manner. Vulnerability assessments also shall be conducted when: 1. A new system, application or network is installed inside the Company 2. Changes are made to firewalls, VPNs or other security control tools 3. Changes are made to a web server's operating system 4. Changes are made to email servers 5. Configuration changes are made to databases 6. Configuration changes are made to critical applications 7. Changes are made to encryption scheme(s) NOTE. Vulnerability and penetration tests will not be conducted except with the prior approval of the ISO. No user will have vulnerability or penetration testing tools loaded onto any Company system without prior permission from the ISO. D. Wireless access testing Testing of wireless access points (war -driving) shall occur regularly, to cover all wireless access points under the control of Virtru. Rev.2015.8.6 43 Agreement No. 7434 Security Policies and Procedures F'.. I[IassworId testing Password cracking software shall be run periodically to validate the enforcement of password rules. F. 3rd.. Party Secui sty Management A comprehensive list of 3rd parties with which the company does business with shall be maintained. Any 3rd party who handles or holds sensitive data or who provides a service which is critical to operations shall be required to assert that their own security practices and procedures meet or exceed that of the company's. Each 3rd party shall be assessed for conformance annually. A,. Policy Confidential, Private or Protected information and Internal Use information must not be transmitted across any unsecured outside network or path without proper controls. Virtru requires encryption for files and emails, or secured packaging for paper copies. Users are responsible for ensuring that their use of these tools complies with all of Virtru's policies, and with applicable laws and regulations. This includes all employment policies such as sexual harassment, stalking, ethics and appropriate use. These tools may not be used to access, send or receive, store or display: 1. Sexually explicit material 2. Confidential, Private or Protected Information or Internal Use material, except as meets the Handling Rules section 3. Viruses 4. Threats 5. Inappropriate or unlawful language, including: a. Offensive language b. Language inappropriate for the Company environment 6. Discriminatory or harassing language 7. Tools usable for hacking, password cracking, vulnerability scanning or penetration testing These tools are the property of Virtru and are to be used only for Virtru's business. Access may be unavailable at any time, at the Company's discretion. Users must not assume that access to these tools will be available for incidental personal use. Rev.2015.8.6 44 Agreement No. 7434 Security Policies and Procedures All content transmitted over these tools is the property of Virtru. Content, including emails, may be inspected by Virtru. Such inspections will occur with the approval of the ISO or of the Company legal department. Virtru may monitor, filter or block content on these tools. Users of blogs, social media sites such as Facebook, and other such tools must follow the guidelines outlined in Virtru's Social Media Policy. See Social Media Policy. Users of blogs, social media sites such as Facebook, and other such tools must not represent their comments as coming from, or being representative of, the business or opinions of Virtru. XXIH. Hardware . Definitions Workstations: PCs, desktop computers, tablets and mobile computing devices that are located at Virtru's home office, or at remote locations. These devices are easily attacked and therefore must have access controls and anti-malware as specified in those sections of this document. Servers: Devices that may or may not be housed at Virtru locations. Regardless of their location, these must secured in a manner that prevents them from being physically accessed without the appropriate level of security clearance. B. Policy°. A current copy of the Organizational Chart/Electronic Asset Management Log (Risk Assessment) will be kept at an off site location so it can be accessed quickly in the case of theft, fire, flood or other events that may make inventory information useful. The ISO will keep a log of events noting when a physical security mechanism is repaired, replaced, installed, removed, modified, or maintained. This Maintenance Log will contain the: who, what, when, where, and why of the change and be kept in the Security Documentation Library. Users of these devices are required to ensure that all appropriate protections are in place, including: 1. Physical security to prevent theft or misuse 2. Access controls suitable for the class of information on the device 3. Anti-malware 4. Keeping the devices locked to a desk or other secure location when outside Rev,2015.8.6 45 Agreement No. 7434 Security Policies and Procedures Virtru 5. Keeping control over backup media, as to minimize the possibility of theft or loss 6. Ensuring that the transport of these devices is secure and is safe from damage - for example, these devices should only travel in padded containers and should be locked and shut down during transit 7. Keeping all operating systems and tools up-to-date, with all updates and patches. Specific requirements for these topics are in the appropriate sections of this document Virtru"s devices InLI$t not: be used by people who are not authorized, including family members and friends. Software loaded onto such devices must follow the rules in the Software section of this document. In general, only approved software may be loaded, and shareware, games and other such software are not permitted. International travel with these devices may require special approvals or configurations, especially in regards to encryption and licensed software. Before traveling internationally, users must contact the ISO to determine if such special considerations exist. Connecting these devices to Virtru°s networks nicxst follow the roles in the e wor ` section of this document. In general, all such devices must be approved prior to connecting. Remote access fromn these devices to Virtru"s networks and devices must meet the controls specified in the Networks section of this document. In general, such access must be approved, and must have adequate controls over the security of information in transit. Devices of these types that are owned by contractors, vendors or other third parties must meet all Virtru requirements prior to being connected. C. Asset t .aiiiageinerit. The ISO is responsible for maintaining an inventory of devices; as such he shall employ software to aid in the management of hardware and software asset. See 11evidling 1yles or t'lie^ iti britiation ej_aysjWcotiowq Rev.2015.8.6 46 Agreement No. 7434 Security Policies and Procedures Uw Enforcement Any workforce member found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. See Sanction Policy. A. Overview Virtru's networks and devices shall designed, deployed and operated in a manner so as to provide proper levels of protection for the data being accessed and transported. Significant changes in network designs must be piloted before deployment. Mechanisms must be in place to alert the ISO of possible attacks and breaches, to include: 1. Denial of service attacks 2. Improper access 3. Virus infections 4. Unauthorized software installations, email, FTP or other improper usage Analysis must be conducted at least annually to validate the failure mode and recovery for all devices, network circuits and protocols. See Change Logs for details. Responsibilities must be defined for: 1. Administration of network and communications connections 2. Operations of all devices 3. Monitoring 4. Timely review of audit logs and response to alerts or alarms 5. Review of unusual patterns of usage or activity To minimize risks, any network connections or network segments should be disconnected when not in use. B kloniforirkg Virtru uses AlienVault's Unified Security Management System to monitor all traffic on their network. Notifications are set to alert the IT staff of any unusual traffic and vulnerabilities, as well as log any security events that may occur. Ac c'ess control and p h.y ical sect.urlity Sites where Virtru's network equipment or communications lines exist are considered to be high -value and are subject to the access control and physical security rules Rev,2015.8.6 47 Agreement No. 7434 Security Policies and Procedures outlined in the Physical Security section of this document. In general, these rules will require: 1. Access limited to authorized personnel only 2. Physical security, including RFID or passcode controlled locks, are in place 11 Modilii:iil::piuns, iiupiidal:es Changes to the network architecture which affect the protections must be approved by the ISO. Examples of such changes include firewalls, wireless configurations, ports and proxies. III I:iiau rneiiritation.. The ISO shall maintain an accurate set of documentation of the networks and their components. This documentation is considered to be highly valuable and will be classified "Protected". F. Network design The goal for network design is to facilitate Virtru's business, while still providing protection for Company assets. G. ei"liirieuriiatiion Virtru's networks will be segmented, in order to limit access to Confidential and Protected Information, without impacting the Company's business. There will be a guest network that will have no access to Virtru's Network Attached Storage, and other vital network resources. 11L IIII'irewa.Ilis Virtru's network and workstations in the DC office is protected using the Fortinet FortiGate 100D Firewall appliance. This device is configured to monitor and log all unusual traffic and warn Virtru of any network irregularities or attacks. Definitions Firewall: A part of the computer operating system or network that is designed to block unauthorized access while permitting outward communication. There are two different types of firewalls. 1. Software Firewall: Part of the operating system or can be a software add -on. 2. Hardware Firewall: Built into a router or a stand alone device. All computing devices will access a network through this point. Firewall Settings 1. Whitelisting: Blocks all incoming traffic, and only allows traffic from good, or known IP addresses. The user will be required to authorize connections to their device. 48 Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures Blacklisting: Authorizes all traffic as a default, and the user is responsible for denying unauthorized connections to their computing device from unrecognized or unknown IP addresses. Software Firewall Policy Virtru requires every device to have their internal software firewall activated at all times, and set to only allow whitelisted traffic. This will require the user to authorize any connections to their device. Any workforce member found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. L Internet Connections to the Internet must be: 1. Approved by the ISO 2. Periodically reviewed and tested for vulnerabilities 3. Protected by firewalls, intrusion detection systems and anti-malware tools Some Internet tools, such as FTP, Internet Relay Chat, Telnet and Remote Procedure Call are restricted in use and must be approved for use by the ISO. J. VFIN-•rernot:e access Virtual private networks (VPNs) will be used for traffic flowing over public networks to ensure the proper level of protection of Virtru's data. K. Wireless All wireless connections must have WPA2 with Advanced Encryption Standard (AES) turned on. This applies to all networks for Virtru's home office, and all telecommuting employees. L. '.�Felew walk Policy If a staff member is allowed to telework/telecommute, they must comply with the Virtru's various employment policies, remote security measures and use the provided web portal via HTTPs, VPN and SSL. They must also make sure their home WI-FI is encrypted properly. If they are accessing sites while on an unsecure router, they must make sure the sites they visit have a valid SSL certificate before proceeding. ➢MI. Pau"hing of sywi:enn,, and, applications Microsoft Windows OS Patches 49 Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures To manage the patching of Microsoft Windows operating systems (OS), Windows Software Update Service (WSUS) is used. The WSUS server automatically checks for patches once a day not during business hours. Then downloaded patches are manually released from the WSUS server to be downloaded and applied on the workstations. The ISO will evaluate all patches before they are applied; workstations will not automatically download OS patches from the WSUS server and updates will not be automatically installed. Installation of OS patches is done within a planned downtime. Apple OS Patches All Macintosh Operating System (OS) patching will be done through the App Store, and is the responsibility of the individual user to install. These should be applied within one (1) week of release from Apple. Linux OS Patches These patches should be applied and tested in an app staging environment before they are applied systemwide. The User is required to document where they received the patch, who downloaded it, what version of patching they are using, and when the patch was applied to the system. This documentation should be submitted to the ISO upon completion of the patching. iPhone iOS Patching All iPhone (OS) patching will be done through the App Store, and is the responsibility of the individual user to install. The device should be fully backed up prior to installing these patches either in the cloud or locally. All backups are required to be encrypted and password protected. These patches should be applied within one (1) week of release from Apple. Android Phone Patching All Android patching will be done through the Google Play Store, and is the responsibility of the individual user to install. The device should be fully backed up prior to installing these patches either in the cloud or locally. All backups are required to be encrypted and password protected. These patches should be applied within one (1) week of release from Google. Windows Phone Patching All Windows Phone patching will be done through the Windows Phone Store, and is the responsibility of the individual user to install. The device should be fully backed up prior to installing these patches either in the cloud or locally. All backups are required to be encrypted and password protected. These patches should be applied within one (1) week of release from Windows. Rev.2015.8.6 50 Agreement No. 7434 Security Policies and Procedures Patching of applications is done on a weekly basis, unless a zero -day exploit is found in an application that is used within the domain. If such an exploit is found and a patch is released for said exploit, an emergency planned downtime will be called for at the conclusion of the business day to patch the application in question. N. elrworhi har#iening Upon adding new devices to the network, installation procedures and set-up must be followed. Hardening will be done on network devices as well as systems (e.g. laptops, workstations and servers) and handled by the ISO or AISO. Hardening will be broken down into the following categories which include, but are not limited to: 1. Preparation and installation 2. Updates to: software, firmware and hardware 3. Setting of appropriate account and auditing rules 4. Setting of appropriate security rules S. Turning on the internal firewall 6. Turning on full disk encryption (If device will have access to PHI) 7. Other internal operations such as: a. Installation of appropriate software for workstation, server or laptop The ISO will notify all affected staff when making changes to the hardening policy and will update the Security Policies and Procedures at that time. Written approval for hardening procedures above and beyond what is currently mandated is not necessary. , I efinit:iorim: Secure sites: These are locations that require the highest level of protection. These sites include: 1. Computing centers 2. Network connection points 3. Media storage locations 4. Locations containing platforms which carry high -value or critical information or transactions 51 Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures Physical Security: These may occur within Virtru where the overall building is operated to a lower level of security, but a certain area is more controlled due to documents, assets or processes which occur in that area. 13. Secuuirre Sil:es Policy Secure sites shall be established for all computing centers and other locations where there is a concentration of high -value or sensitive information, systems or networks. Sites will be designed and operated according to best practices and in consideration of threats appropriate to the site such as hurricanes, tornados, power outages and intruders. This standard is not to be construed as a complete list of requirements for a secure site. It should be used in conjunction with expert advice, architects, fire marshals, OSHA and other regulations. Separate, isolated areas will be created within the secure site for: 1. Media libraries 2. Electrical supplies and controls 3. Environmental and mechanical controls Access to these sub -areas will be on a need -only basis. Critical assets and operations must be conducted in a secured area or secured site, with protections implemented in accordance with the risks and value of the assets, information and operations. C. Data. Centers All data centers used by the company must provide proof that they meet or exceed the security requirements and standards of the company. XXV1. Physical Security Policy A. Entry 11411oficy All Virtru's workforce members are allowed access to the physical site at any time of the day, and any day of the week. The site is secured with an electronic door lock that accepts RFID cards and a numeric passcode. RFID cards are issued by the ISO or AISO by request and after approval. B. Loss of lfll[,111) lse� y If a workforce member loses their RFID key, they will notify the ISO or AISO as soon as possible so the key may be deactivated. Any workforce member found to have violated Rev.2015.8.6 52 Agreement No. 7434 Security Policies and Procedures this policy may be subject to disciplinary action, up to and including termination of employment. See 5otictiga2olicy. fI. Mobile devices Mobile devices (laptops, netbook, tablets, Whones, Wads, etc.) must have the appropriate encryption. Devices must have a power -on password or PIN, data encryption, auto -lock and role -based access per user. See BYOD Policy (Forms for Employees). u Video inonittmrin.g Virtru's main office is monitored by a video camera. The data is stored in the Network Attached Storage which is physically secured in a locked cage in the IT closet. This data is stored for up to one (1) month. 1". Alarm s ste ii uu. Virtru's main office is monitored by an alarm system. It is attached to all doors and windows, and requires a 4-digit pin plus a modifier to deactivate. Once triggered, there is a 45-second delay before the local authorities, ISO and CEO are notified by the monitoring company. ADT is the company that is responsible for monitoring Virtru's main office. The alarm pin code is changed quarterly, or at the time that an employee is fired or leaves the Company. Virtru requires that this alarm be set by the last person to exit the office, and should be active anytime there is not an authorized employee on the premises. [", [l'ifre proter°d.on Fire protection meet all regulations, including federal, state and local. Fire extinguishers shall be deployed in accordance with regulations of OSHA and fire inspectors. Periodic testing of alarms, fire extinguishers and fire evacuation procedures shall be conducted. V L Software A Overview This section outlines the standards applying to operating systems, applications, databases and other software tools. Rev.2015.8.6 53 Agreement No. 7434 Security Policies and Procedures ll3 Acclu1isition. oi`soitware It is up to the developer to decide which software tools they will require for their workstation. All regulated software will only be download from trusted sources, such as the Apple App Store, Windows Store, or directly from reputable websites, etc. Unregulated software is allowed, but must be fully documented and approved for use by the ISO. Documentation will include: 1. The source of the software 2. When it was downloaded 3. Who downloaded it for use and; 4. The date the ISO approved the use of the software All software for Windows OS devices is required to be screened for malware prior to installation. Any unauthorized software must be approved and validated, or removed. Users of workstations, netbooks, wireless and other personal devices must not install unapproved software. f m ltpo�-n Source Soi'lwauire The use of open source shareware or open source freeware may only occur if: 1. It is not used in a production environment OR 2. Prior to use it is fully tested, documented and Virtru's personnel are assigned to support it. Checks to be performed include: a. Verify usage license (no strong or weak copyleft licenses) b. Review open CVEs and available patches c. Perform internal security evaluation d. Flag for external security evaluation during next penetration test 3. The source of the software is documented a. URL b. Project lead c. Contributors d. Whether the project is actively maintained 4. The ISO approves of the use tt, isto ct uirnental:ion Documentation for sensitive applications and the operating systems which run those systems shall be stored securely. Backups of all documentation shall be maintained off Rev.2015.8.6 54 Agreement No. 7434 Security Policies and Procedures site. Access to the documentation for sensitive applications and the operating systems will be on a need -to -use basis. E. Change Control wri.d Maintenance All proposed changes to production systems must be registered in the companies issue tracking system. Changes shall be categorized as standard, normal, or emergency. Standard changes are those that are performed frequently and considered low risk. Standard changes are reviewed quarterly and pre -approved for the following quarter. Normal changes are those which are not performed frequently and may pose some risk to the business. Each normal change must be reviewed by a minimum of two super-admins, the CTO and/or VP of engineering prior to being made. Reviewers are responsible for assessing the impact of the change in regards to the functionality, availability, durability, and security of the system. If a consensus among reviewers is reached, the proposed change is sized, sorted, and executed through the standard engineering workflow. Emergency changes are those that are required to rectify some form of degradation of the system. Emergency changes must be reviewed by a minimum of two super-admins. If a consensus is reached, emergency changes can bypass the standard engineering workflow and be made immediately. All changes to production systems must be captured in the company's issue tracking system without exception. F Operating Sryrsi.erris Only approved operating systems will be loaded onto Virtru-owned assets. Before major upgrades to systems, authorization by the ISO and AISO will be required. Default settings must be reviewed prior to installation to identify any security vulnerabilities. These settings will be communicated with all workforce members, or they will surrender their devices to the ISO or AISO for configuration. G. AVi plicA10111s All applications, whether developed or purchased, must comply with Virtru's policies and protection standards. The information owner is responsible for ensuring that these requirements are included during the development or acquisition of software. The protection requirements for applications include: 55 Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures 1. Access control 2. Authorization 3. Information classification 4. Storage controls 5. Backup and restoration 6. Confidentiality and integrity requirements 7. Audit logs 8. Privacy, export control and other such requirements All product associated applications must use HTTPS to communicate with all remote hosts, both Virtru hosted services and external third parties. HTTP and other non -encrypted communications are not allowed under any scenario. Virtru applications shall treat user credentials with the utmost sensitivity and must follow security best practices for storing and transmitting user credentials. All credentials which are shared with a client device must be sent over HTTPS or another encrypted communication channel. All user credentials which are stored in a data store, must be stored in a benign state so that leakage of information from the data store does not compromise user accounts. All application logs must be sent to a central logging cluster for aggregation and analysis. If. Cojii`ig ul.raflouliftjulri�agemeriit Where possible, Virtru applications and infrastructure follow an immutable paradigm. All changes to production infrastructure and application code is deployed on a brand new Amazon Machine Image (AMI). This allows all changes which are deployed to be tracked and audited. This also means that no configuration or application code will be modified on a production instance. All application servers have osquery installed and configured to monitor key files on the system for any change (File Integrity Monitoring). Any changes to configuration are logged and sent to AWS Cloudwatch Logs, where they trigger an alarm and cause an email to be sent to the Virtru DevOps team for further investigation. Where possible, Virtru utilizes Terraform, Ansible, and other similar tools to define their infrastructure as code. This allows the production infrastructure to be versioned in a git repository and easily audited for change over time. 1. A,ssel.rriiiana.g(,iri(°nti:'(�)aa�ot a.Vr'e The ISO is responsible for maintaining an inventory of software; as such it shall employ software to aid in the management of software assets. Rev.2015.8.6 56 Agreement No. 7434 Security Policies and Procedures 1. Eni.orcerneni. Any workforce member found to have violated these policies may be subject to disciplinary action, up to and including termination of employment. See Sanction Policy. V111. Removable Media Device Policy A. Purpose The purpose of this policy is to minimize the risk of loss or exposure of Confidential or Protected Information maintained by Virtru when it is stored, transferred or accessed on a removable media device. This policy also aims to reduce the risk of acquiring malware infections on computers operated by Company. Any questions or comments about this policy should be directed to the ISO i . lip ope This policy covers all removable media that contains Virtru's data or that is connected to Virtru's network. C. Delminil: ons Removable media: devices or media that is readable and/or writable by the end user and are able to be moved from computer to computer without modification to the computer. This includes flash memory devices such as thumb drives, SD cards, cameras, MP3 players or any other storage medium; removable hard drives (including hard drive -based MP3 players); optical disks such as CD and DVD disks. Encryption: a procedure used to convert data from its original form to a format that is unreadable and/or unusable to anyone without the tools/information needed to reverse the encryption process. Malware: software of malicious intent/impact such as viruses, worms, and spyware. 1: Policy Workforce members may use removable media in their work computers if they take all reasonable and prudent measures to ensure the safety and confidentiality of all information that is downloaded to any removable media or portable device 1. Using Iteranovabllle Media Devices PHI should be stored on removable media only when required in the performance of assigned duties or when responding to legitimate requests for information. When Rev.2015.8.6 57 Agreement No. 7434 Security Policies and Procedures Protected and Confidential information is stored on removable media, it must be encrypted in accordance with Virtru's l p cr.v-)tion SlLmdards. The workforce member shall take all reasonable and prudent measures to physically secure all removable media or to portable devices. Users shall not open or attempt to open the encasement of any removable media or portable devices nor otherwise circumvent any lock system that secures the device or its components. Users should take reasonable measures to secure device at all time and report any lost or stolen removable media or portable devices immediately. Workforce members may not copy information or other sensitive data onto personal devices, unless approved by management in conjunction with the Confidentiality Agreement for Employees. V. IIIDra.'ej Aiwins Exceptions to this policy may be requested on a case -by -case basis by petition to the ISO. G. 1f.efijsrrllll. Virtru reserves the right to refuse the ability to connect removable media devices to the Company network if such media is being used in such a way that puts Virtru's systems, data, users and customers at risk. 1.1. 17nforr r:wniemt Anyone found to have violated this policy may be subject to disciplinary action, up to and including suspension of access to technology resources or termination of employment. A violation of this policy by a temporary worker, contractor or vendor may result in action up to and including termination of their contract or assignment with Virtru. XXIX. Application Recovei-y Plan Virtru backs up of all production data hourly and stores it remotely on two separate Amazon Web Server (AWS) Accounts. These backups are a combination of both differential and full backups. These backups are durable a the same rate as S3 data, each snapshot is 99.99999% durable. 13. Scope These policies apply to all production servers and data that Virtru is responsible for maintaining on behalf of our clients. Rev.2015.8.6 58 Agreement No. 7434 Security Policies and Procedures C 1)ata dwrability and rf.Iiabllit:y Virtru uses Amazon S3 to provide a highly durable storage infrastructure designed for mission -critical and primary data storage. Amazon S3 redundantly stores data in multiple facilities and on multiple devices within each facility. To increase durability, Amazon S3 synchronously stores Virtru's data across multiple facilities before confirming that the data has been successfully stored. In addition, Amazon S3 calculates checksums on all network traffic to detect corruption of data packets when storing or retrieving data. Amazon S3 performs regular, systematic data integrity checks and is automatically self -healing. lf:) ],'n.ciryptiiion Virtru uses Server -side encryption to protect data at rest. Server -side encryption with Amazon S3-managed encryption keys (SSE-S3) employs strong multi -factor encryption by encrypting each object with a unique key. As an additional safeguard, it encrypts the key itself with a master key that it regularly rotates. Amazon S3 server -side encryption uses 256-bit Advanced Encryption Standard (AES-256) to encrypt Virtru's data. 1".. Load balarjcnln,,, Virtru uses Amazon Web Services' Elastic Load Balancing (ELB) to automatically distribute incoming application traffic, to automatically route traffic across multiple instances. and multiple Availability Zones. This is used to insure that only healthy servers are receiving traffic. F. Itestorat ion of datm:;u'I Restoration of production data is done on an as -needed basis. The following employees are responsible for restoration of the application if it is needed: 1. Reuven Gonzales, Lead Developer, or 2. Conor Gilsenan, Developer Ops. The needed backup data will not be restored "on top of the current "bad" data. The restores will be redirected to a new location, and first verified. Upon verification, the "bad" data will be removed from the drive, and stored and relabeled as "old data." Then the backup data will replace the "old data" on the drive. Once the restored data has been verified once more, the "old data" will be destroyed. G. '1'est:uong arui revision. :i f p lwn Once every quarter, after doing a full backup, Virtru will recover the saved data. During hours when the business is closed, we will operate the application using this recovered data in a test mode. The tests will consist of a set of tasks that are designed to exercise the main system functions to confirm that the data is usable and as up-to-date as we expected given the backups that were used to do the recovery. This testing process Rev.2015.8.6 59 Agreement No. 7434 Security Policies and Procedures should take an hour. The restore process should take an hour or two, once the files are retrieved. If the process does not work as documented in our policy, it will be updated to reflect the actual procedure we need to implement to achieve successful recovery and operation. Whenever we make changes to software or hardware, we will create/update and test using our Inventory of Devices/Software Assets and store this checklist in the Security Documentation Library. ® Network AttachedStorage and Workstationc a A. Overview Virtru recognizes that the backup and maintenance of data in the Network Attached Storage (NAS) and individual workstations are critical to operations. It is essential that certain basic standard practices be followed to ensure that data files are backed up on a regular basis. B. 1)oIicy Virtru will be using a Synology DS1515+ Network Attached Storage for backing up all workstations, firewall logs, and video surveillance footage. This data will also be backed up to a Amazon Web Services Glacier account. 1 1;'° a c.k uu. ui pu uG software Virtru uses Cloud Station software to perform all backups. This will be installed on all workstations and must not be disabled by the user for more than one (1) business day. The software will maintain one month of file versions for restoring purposes 1:) llernote ba.ckupp s Virtru will provide a Virtual Private Network (VPN) for employees to login to for backing up their devices. Credentials for the VPM will be provided to remote employees, and they will be expected to configure their devices properly. If they are unsure, or have issue in setup, the IT department will be available for configuration assistance. E'. Local backups Virtru encourages all users to do daily local backups of their data. These backups are to be encrypted using the encryption standards listed below. Any local backups must be surrendered at the time an employee no longer is employed by Virtru. Rev.2015.8.6 60 Agreement No. 7434 Security Policies and Procedures F. CIE cryp ion of bacV4..ups The backups of data will be encrypted on the NAS using AES 256 bit encryption. Any local backups that employees make must be encrypted at a minimum of 256 bit encryption. G. It.eslorin,g data In the event that a workstation fails, is stolen, or is damaged whether physically or by malware. It is the policy of Virtru that this device will be replaced within 24 hours. The IT department will be responsible for reprovisioning this device, and testing that the workstation is functioning properly before giving the device to the employee. 11 1°pryforce ieirit Anyone found to have violated this policy may be subject to disciplinary action, up to and including suspension of access to technology resources or termination of employment. A violation of this policy by a temporary worker, contractor or vendor may result in action up to and including termination of their contract or assignment with Virtru. XXXI. Information Into rity Management Policy A. Overview The other policies in this document contribute to the integrity of the data in our systems. Notably, the Data Backup Plan, the Access Control Policy, and the Malware Management Policy contribute to data integrity. In addition to these, we add the following policy elements. 13. 1:10 icy Virtru will configure our applications software to use the available edits on data that is entered into our systems. These edits will check for internal data consistency, reasonableness of data, and logical relations among data items. XXXII. Security Incident Mana ent Policy A., Overview Virtru recognizes that, despite having reasonable security safeguards, we may have security incidents. 11, 111,r- oc.edures To manage these incidents, Virtru will do the following: 61 Rev.2015.8.6 Agreement No. 7434 Security Policies and Procedures 1. We will train each workforce member to recognize the common telltale signs of a security incident. When a member of the workforce detects one of these signs, he/she will be responsible for notifying the ISO. 2. The ISO will maintain a set of tests to detect events in the system logs that may indicate security incidents. These tests will be written into a script and run against the system log on a daily basis or whenever needed. The tests currently are: a) Account creation/deletion b) High volume of unsuccessful logon attempts c) Alerts from our malware monitoring systems d) High volume of file or database access/creation/deletion activity for the time of day, or for day of the week e) Account activity at unusual times of the day or night f) Absence of expected log records of activity when expected g) Unusual level of record access for a given account h) Daily logs will be tested by the firewall in real time, i) User data will be reviewed weekly j) Logs for the past month will be retained. When anomalies are discovered, the script will provide a report that is immediately brought to the attention of the ISO or designee as a potential security incident. k) Account lock out due to excessive password retry failure. The ISO will determine, in consultation with others if needed, whether an event is a security incident. If an event is a security incident, the ISO (or designee) will proceed to contain and repair damage from the incident by working with staff, vendors, and Business Associates as needed. The security incident will be tracked in JIRA and treated as an application defect. A log of relevant actions taken to contain and repair the damage will be stored in JIRA. The permanent home of this log will be in the Security Documentation Library. The ISO will determine if the event involves a workforce member action that is covered under the sanction policy and will follow that policy. The ISO will determine if the event represents a security incident for which a Business Associate is responsible. If so, the ISO will follow our Incident and Breach Policy in this area. Rev.2015.8.6 62 Agreement No. 7434 Security Policies and Procedures If an event is a security incident, the ISO (or designee) will proceed to contain and repair damage from the incident by working with staff, vendors, and Business Associate relations in order to further deter future incidents of the same type. XXXIII. Security evie colic A. Overview We recognize that our underlying security risk will change and our ability to manage this risk will improve over time. To ensure that we adjust our policies and procedures to take these two factors into account, we will review our Security Policies and Procedures annually. The ISO will lead this review and involve others as needed. Documentation of the review will be contained in a document called Annual Security Review and restored in the Security Documentation Library for Notebookl. 13. Procedure At a minimum, the review process will consist of: 1. Evaluating changes in the last year that may affect our Security Policy. These will include changes in: a) Number, sizes or locations of our business sites b) Our workforce size and composition c) Hardware/software d) State or federal laws that apply to us e) Type of medical insurance that we provide 2. Reading each Policy to determine whether or not the changes may affect it and/or the practices driven by the Policy. We will make a list of changes that need to be made, then write a paragraph describing how. 3. Creating a list of changes in Policies and/or Procedures that our Company will carry out. 4. Developing and implementing any changes in our Policies and Procedures on a timely basis. Rev.2015.8.6 63 Agreement No. 7434 Security Policies and Procedures Rev.2015.8.6 64 Agreement No. 7434 Security Policies and Procedures Rev.2015.8.6 65 Agreement No. 7434 Security Policies and Procedures A. Change Logy The Change Logs are logs and reports that are reviewed, at a minimum, twice a year. It provides information on programs available and which employees have access to which programs. The actual logs are found in the Change Control Logs for Security section of the documents. 1. Annual Security Review 2. Application/Database Change 3. Employee Access 4. Incident - Disaster 5. Maintenance 6. Media Sanitization 7. Operating System Changes Audit 8. Organizational Chart/Electronic Asset Management 9. Network Change 10. Physical Entry Access 11. Responsibility Change 66 Rev.2015.8.6 Agreement No. 7434 B. Information Security Committee Information Security Officer: Will Ackerly will ackerly0vi arti.coni (202) 577-3683 Information Security Committee: Jordan Duggan lordancoftirtru.co (919) 696-7936 Reuven Gonzales, Director of Operations Cell: (949) 878-6154 r 'i j Le nL(s) it rL s,com Conor Gflsenan, Operations Developer Cell: 973-986-6650 � 10 110 1 Rev.2015.8.6 67 Agreement No. 7434 Disaster Recovery Plan for Virtru We define a disaster as any event that affects our information systems and, as a result, substantially interferes with the operations of our business. Examples are fire, flood, hardware failure of critical elements (servers), software failures, theft, chemical/radiation hazard, and sabotage. Our definition of recovering from a disaster is taking all the actions needed to restore the systems to their normal operational state. Our plan to recover from disasters is described below. 1. What we will do to prepare to perform a disaster recovery: A. We will train the workforce to recognize and report a disaster. B. We will organize the workforce responsibilities so that during a recovery we are not dependent on only one person for any critical step. C. We will report disasters to the ISO and AISO. The ISO will make the formal determination as to whether or not to classify the event as a disaster. D. We will store paper backup copies of key disaster related documents with the offsite backups. These documents will include a List of Support Contacts - vendor, reseller, and/or support group contact information for all of our software and hardware. E. We will keep an Inventory of Device/Software Assets for [Name of Business]-- a detailed checklist for each asset, such as the server, PCs, the router, network switch, databases, and software programs containing tasks that must be completed to recover that asset. The list will include key data about the device including a party responsible for the recovery whose role is to diagnose and, if needed, repair, replace, and/or rebuild a device. F. We will have current copies of system data and software available at the off site location, as our data backup plan specifies. 1 Agreement No. 7434 2. Once the ISO (or designee) has certified a disaster, we will: A. Use the ISO or designee to facilitate the recovery. The facilitator will direct the recovery process, coordination and communication of the actions of the various parties that are involved in the recovery. B. Determine which devices/software (e.g. servers, PCs, power units, AC units) are not functioning normally, conferring with the appropriate staff, vendors, and other support personnel to make this determination. When in doubt about the status of the device, we will either use a test that is described in the IT Assets Recovery Checklist for the device/system or depend on the recovery responsible party to make this determination. C. Review the Inventory of Device/Software Assets for the devices to be recovered. Each checklist will have as an initial task, "Contact the appropriate parties responsible for restoring the devices/software to be recovered." Guidance and other recovery activities from these parties are key contributors to the recovery process. D. After all of the non-functioning assets have been restored, follow the instructions in the part of the Emergency Operations Plan that deals with what to do when the system is available again. Agreement No. 7434 Emergency Planning & Crisis Management Tea (EPC T). • Will Ackerly, CTO & ISO • Jordan Duggan, VP of Product & Development & AISO • Reuven Gonzales, Director of Operations • Conor Gilsenan, Operations Developer • Zack Nelson, Director of Development Primary Disaster coordination handled through: Crisis Manager 1: Reuven Gonzales, Director of Operations Cell: (949) 878-6154 reuver �virtr�u.coa11 Crisis Manager 2: Conor Gilsenan, Operations Developer Cell: 973-986-6650 coraor vu trmu. Other e ers' Contact Information • Zack Nelson 443-834-3791 • Payam Abedi 703-656-6227 • Tyler Biscoe 301-642-8844 • Jon Gilpen 303-358-6689 • Jason Ghent 803-658-6645 Off -Site Meeting Location Used if team needs to meet to formulate an action plan. If primary location is not accessible, we may need to operate from an off -site locations such as: Employees' Home Offices Jack Rose Restaurant Extended off -site locations will be determined after assessing the severity of the disaster. Agreement No. 7434 r � � Maxim.unb. Tolerable Downtime (MTfD) The total amount of time our company is willing to accept for an outage or disruption, including all impact considerations. This guides our Crisis Management Team in determining the selection of an appropriate recovery method, and the depth of detail which will be required when developing recovery procedures, including their scope and content. Recovery Point Objective (RPO) This is the point in time, prior to a disaster or disruptive event, which our company has accepted for data loss. RPO determines the frequency of our data backups. When determining RPO, we need to consider how much newly entered data we can afford to lose. Therefore, if RPO is set to 4 hours, then we must have offsite backups maintained every 4 hours. Recovery Time Objective (RTO) RTO determines the target time for recommencement of business activity. The Crisis Management Team will determine what business functions (i.e. telecommunications, web servers, etc.) should be restored based on priority. Working Recovery'rime (WRT) This is the time our company will spend recovering lost data and work backlog, and testing and verifying data and systems. WRT usually is the difference between MTD and RTO. 4 Agreement No. 7434 (10 ✓ '00, no 0 14, N 70 0 4, hours —h o I Ihour Physical Security Example Times M'uno()�saster and Major Usaster (See next page) Agreement No. 7434 Internal Network The server and network must be functioning in order for any of our other information systems to function. We could afford to be without the server/network for ten (10) minutes without materially affecting our business. If the server/network is down for longer than ten (10) minutes, staff will switch over the mobile tethering, or will go to an approved location to continue their work. Production Servers Production servers must be functioning at all times in order for our applications to work. We cannot afford to be without the production servers without materially affecting our business. Traffic will be automatically routed to another server via Amazon Web Services' Elastic Load Balancing. Workstations If a workstation crashes, we can easily use another one with only modest inconvenience. Ideally, we would like to replace/restore a workstation within 72 hours. Printer and Fax We have two multifunction printers. We can lose all printers for up to a week with little effect on data flow. Email and Web Browser Currently, we can function for no more than 10 minutes without email or web browsing. We will tether devices via smartphones after that time. Wireless Network We have a wireless network and the office depends on it for routine transactions. A backup router is available; it is preconfigured and encrypted using WPA2-AES. IT Resources We depend on the availability of certain employees and our IT service provider to diagnose and fix problems quickly. A chain of contacts is available in this document. Power and HVAC Equipment We depend on external power and environmental equipment (especially our AC unit) to maintain the power and environmental support for our system. Failure of either of these systems could inhibit the use of our IT systems, and could also stop us from doing business. These failures are not IT -specific risks. We are comfortable enough with the track record of these services not to need more than a short term UPS to allow us to smoothly shut the network down in the event of a sustained power outage. We have to yearly revisit the question of whether or not we need Agreement No. 7434 more power/environmental backup to ensure that the satellite site will able to operate even if power/cooling at the main site is out. Agreement No. 7434 Disaster Timeframes Table fThis is a sample, Please fill in according to Virtru's standards. Functions can include departments, as listed below, or they can include more specific tasks, such as invoicing.) Minor Disaster Major Disaster Function MTD RTO WRT RPO MTD RTO WRT RPO Physical Security 1 hour 30 minutes 30 minutes 4 hours 1 hour 30 minutes 30 minutes 4 hours (office/suite) IT (server, hardware, WRT t equipment) Sales and Marketing Administration HR . . . ............ Agreement No. 7434 . • r For a disaster where you will need to leave the building: If a disaster happens during normal business hours all Company employees will meet at Jack Rose Restaurant, 2007 18th St NW, Washington, DC 20009. This will prevent Company employees from being in the way of emergency crews. A head count by managers will determine if all staff members have fully exited the building. Headcount numbers will be brought to the ISO or CEO, If the disaster happens after the meeting location has closed, employees will wait outside of the same address. For a disaster where you will need to stay in the building: If a disaster happens during normal business hours, all Company employees will meet in the Basement. A head count will determine if all staff members have fully exited the suite. See above for head count procedures. Agreement No. 7434 If or when a disaster happens, certain contacts will need to be made. Operation Employee Current enrollment processes (any Will Ackerly Notify carriers of current situation —give cell pending business) number if needed. Communications Will Ackerly ' eBlast to client list IT —phones, faxes, e-mail John Ackerly Set up remote office Payroll -Banking Notify payroll/banking institutions of disaster issues -Commissions John Ackerly and action plan 10 Agreement No. 7434 If or when a disaster happens, certain items may need to be replaced: 1. 3 UPS (Uninterruptible Power Supply) (s) (Batteries) 2. Network Attached Storage (NAS) 3. Network Switch(s) 4. Network cable(s) S. Power cable(s) 6. Power strip(s) 7. Monitor(s) / Monitor Cable(s) 8. Keyboard(s) / Mouse(s) 9. Firewall 10. Workstation(s) / Laptop(s) 11. Phone(s) & Headsets 12. Security Camera 13. Electronic Door Lock 14. Video Conference Microphones 15. Minifridge 16. Projector 17. Software a. OSX b. Windows c. Acrobat d. Office Suite 18.Paper a. Printer paper b. Sticky notes c. New Checks 19. Multifunction Color Printer 20.Office Furniture/Equipment 21. Carrier (Marketing) Supplies 22.Office Supplies 11 Agreement No. 7434 11111TATJOPIMI 12 Agreement No. 7434 If the fire alarm goes off during business hours, evacuate the building immediately. If you discover a fire or smell heavy smoke inside building: DO NOT ATTEMPT TO FIGHT THE FIRE!! 1. Pull fire alarm, evacuate the building and call 911 on the way out of the building 2. Perform head count at the designated assembly point O If anyone is missing, call their cwrz.Q�wrtai to determine if the missing individual has made contact with them. If they have not, alert the authorities. 3. Action Plan - developed by EPCMT O Re -open based on damage O If the office must remain closed: ■ Notify employees and/or employees crr°cW rNen:c oatacts. 0 If there is any impact to customer operations, email all clients with a status update and recovery plan. NOTE. First Aid kit located in the drawer of the white cabinet located to the right of the spiral staircase. 13 Agreement No. 7434 14 Agreement No. 7434 During an Earthquake DO NOT USE THE ELEVATOR DURING AN EMERGENCY EVACUATION. If you're indoors, stay there. Get under -- and hold onto --a desk or table, or stand against an interior wall. Stay clear of exterior walls, glass, heavy furniture, fireplaces and appliances. The kitchen is a particularly dangerous spot. If you're in an office building, stay away from windows and outside walls and do not use the elevator. If you're outside, get into the open. Stay clear of buildings, power lines or anything else that could fall on you. After an Earthquake • Perform head count at the designated assembly point O If anyone is missing, call their enillcn,gxency cogtacts to determine if the missing individual has made contact with them. If they have not, alert the authorities. • Shut down systems, if time permits, see Emergency Shutdown Procedures O Check for fire or fire hazards. If you smell gas, shut off the main gas valve. If there's evidence of damage to electrical wiring, shut off the power at the control box. O If the phone is working, only use it in case of emergency. Likewise, avoid driving if possible to keep the streets clear for emergency vehicles. is Agreement No. 7434 O Be aware that items may fall out of cupboards or closets when the door is opened, and also that chimneys can be weakened and fall with a touch. Check for cracks and damage to the roof and foundation of your home. O Listen to the radio for important information and instructions. Remember that aftershocks, sometimes large enough to cause damage in their own right, generally follow large quakes. o If you leave home, leave a message telling friends and family your location. 0 Action Plan - developed by EPCMT O Re -open based on damage O If the office must remain closed: ■ Notify employees and/or employees Liij _mi e c,V contacts. 0' If there is any impact to customer operations, email all clients with a status update and recovery plan. NOTE. First Aid kit located in the drawer of the white cabinet located to the right of the spiral staircase. 16 Agreement No. 7434 HTSIAT-OV 17 Agreement No. 7434 If the city or county signal a tornado warning, move away from the perimeter of the building and any exterior glass. DO NOT USE ANY ELEVATORS DURING AN EMERGENCY EVACUATION. 1. Move to the basement of the office suite. 2. Shutdown systems, if time permits, see Emergency Shutdown Procedures 3. Perform head count at the designated assembly point O If anyone is missing, call their eniergeligy r ontacrs to determine if the missing individual has made contact with them. If they have not, alert the authorities. 4. Action Plan -developed by EPCMT O Re -open based on damage O If the office must remain closed: ■I Notify employees and/or employees tcLiorrtacts. ■ If there is any impact to customer operations, email all clients with a status update and recovery plan. NOTE. First Aid kit located in the drawer of the white cabinet located to the right of the spiral staircase. 18 Agreement No. 7434 19 Agreement No. 7434 1. Evaluate the situation O Shutdown systems routine, see Emergency Shutdown Procedures O Perform head count ■ If anyone is missing, call their to determine if the missing individual has made contact with them. If they have not, alert the authorities. 2. Action Plan -developed by EPCMT O Remain open - based on damage or location M Relocate staff within suite ■' Evaluate IT requirements O Close - send staff home ■' Re -open based on damage If the office must remain closed: 0 Notify employees and/or employees e er ency 0 If there is any impact to customer operations, email all clients with a status update and recovery plan. 20 Agreement No. 7434 21 Agreement No. 7434 If the building is in a disastrous state after working hours, the EPCMT will notify employees. See Virtru Phone Tree. If re -opening on a workday at the primary location: 1. Verify location is safe for operations - including systems 2. Communications a. Emergency Contact List b. Client Blast If NOT re -opening on the following workday at the primary location: 1. The EPCMT must decide estimated length of time we will not be able to function a. If less than or equal to one day, office is closed. i. [Name of Business] will open the following work day ii. Verify location is safe for operations iii. Communications 1. Emergency Contact List 2. Client Blast 2. If office needs to move to secondary location or close for a short period of time. a. The EPCMT meets to develop a plan of action b. Determine the validity of systems i. If valid, move critical systems to secondary location ii. If not valid, retrieve necessary items and contact suppliers for new systems 1. Restore systems from backups 2. Restore connectivity a. Skeleton crew of selected staff members (possibly several from each department) 22 Agreement No. 7434 c. Communications i. Emergency Contact List ii. Client Blast 3. If office needs to move to secondary location or close for a longer period of time: a.The EPCMT meets to develop a plan of action b. Determine the validity of Systems i. If valid, move critical systems to secondary location ii. If not valid, retrieve necessary items and contact suppliers for new systems 1. Restore systems from backups 2. Restore connectivity ii. Determine staff needs - full or partial capacity iii. Communications 1. Emergency Contact List 2. Client Blast 23 Agreement No. 7434 i lil,llmf: ■ �TWO 24 Agreement No. 7434 25 Agreement No. 7434 26 Agreement No. 7434 If an electrocution occurs while working in server room, staff will pull all of the UPS cords from the outlet by the interior door. If that outlet is inaccessible due to fire or victim's position, staff will shut off the power at the breaker, located in the basement on the wall to the left of the TV. If there is a fire within the building or suite, staff should concentrate on notifying authorities. If there is severe flooding that threatens to affect the server room, staff will shutdown and unplug all equipment and move it to the second story platform of the suite. 27 Agreement No. 7434 CERTIFICATE OF REGISTRATION Information Security Management System -ISO/IEC 27001:2013 The Certification Body of BrightLine hereby certifies that the following organization operates an Information Security Management System that conforms to the requirements of ISO/IEC 27001:2013 e for the following scope of registration The scope ofthe ISOAEC 27001:2013 certification is limited to the information security management system (ISMS), which supports ServiceNow as a provider of cloud -based solutions that define, structure, manage and automate services across the global enterprise, as well as all supporting resources including global data center operations and infrastructure, applications, end -user services, and product development, and in accordance with the Statement of Applicability, approved July 28, 2015. Assets within scope of the ISMS include: internal information assets, customer data, software, hardware, people, and physical assets to host, support and operate the cloud -based solutions. The data centers in the following locations house the infrastructure used to deliver the cloud -based solutions: Virginia, California, Florida, Washington, Montreal, Toronto, London, Amsterdam, Geneva, Zurich, Sydney, Brisbane, Singapore, Hong Kong, Sao Paulo and Campinas. Additionally, ServieeNow uses Amazon Web Services (AWS) to host some ServiceWatch customers. Excluded from the scope are all operations of third party data centers and AWS. the scope of this certification includes the following locations: Santa Clara (HQ): 3260 Jay Street, Santa Clara, California, 95054, United States San Diego: 4810 Eastgate Mall, San Diego, California, 92121, United States Kirkland:4400 Carillon Point, Kirkland, Washington, 98033, United States Orlando: 3501 Quadrangle Blvd, Suite 150, Orlando, FL 32817, United States Amsterdam (EMEA HQ): Hoekenrode 3,1102 BR Amsterdam, The Netherlands London: 3rd Floor, Future House, The Glanty, Egham, Surrey, TW20 9AH, United Kingdom Sydney: Level 21, 50 Bridge St, Sydney, New South Wales, 2000, Australia Issue Date September 29, 2015 f,C[[ IdS I... IIPI (J", Certificate Number: 1980700-4 Original Registration Date Expiration Date Certificate Version December 17, 2012 September 28, 2018 Version 4 I• "j I,I vm I✓e,, 1, r v, 1+t^ ,u ^n.ial I„r tfo,ln� .r n -enul I' 'JA i ail I,,iry e�AI F rrir,l ,r an r,,, ,I , n it hrr•, +'r rll n,. � .;cl.,,°,,, ,rl ^I "ii ,�nr, ed ,, d�'rr 1. br• r d w,td, �i err: ,r ,a ii r8ry ,I 4TI1 on.-)^ ,.^ii s�i ^l. iblr fo•agi, it v, P'+ �,I.y -. t 1 rf�rr: ,r vi urPJir ,r i i�r In ., U0d A�,I,d jIn ru r„r�i er I<, � ,;nr,7 �nr � I ^.,ini ni �i rsf r r F�.i' iIFL11v ,f u,F...;^ f i j "1 ij r :r r.'rrI, Iy,I'Ir) ,I a I �di.. rr, yc. fr ii..,-.? TI en!i.i=y , I ; , r t ririty ,'nz ,N rrMl �.htt. enf ,k ;crony Agreement No: 7434 "oniptt .rit doudsolutions built for gowrn.rnent agerwies Whether spurred by the need to Increase efficiency, meet government mandates or deal with rapidly expanding data sets and workloads, more and more agencies are moving some or all of their applications or Infrastructure to the cloud. However, for many agencies, the most cost-effective, secure and efficient solution Is a hybrid cloud model that allows them to not only leverage their existing Investments In IT Infrastructure, but also extend their systems seamlessly to the technology platform that best meets their needs. VMware'5, the global leader In vlrtuallzatlon and cloud Infrastructure, and QTS, a trusted cloud operator and leading provider of hybrid cloud services and managed hosting for government agencies and enterprises, have partnered to deliver VMware vCloud'° Government Service provided by Carpathla' (A QTS Company). vCloud Government Service Is an enterprise -class hybrid cloud service designed to run new and existing appllcatlons In exactly the same way, giving government organizations application and data mobility. Being able to use existing people, processes, tools, and automation enables government organizations to focus on the benefits of the cloud to their mission, rather than taking time and resources to re-archltect for new Infrastructure. Federal organizations can securely extend their data centers to the cloud quickly and confidently, using an Integrated cloud Infrastructure with the security of a JAB -based FedRAMP Provisional Authorization. KEY FEATURES Robust Security and Compliance 9 vCloud Government Service Is a secure cloud platform that enables R Ease of Use — Leverage customers to maintain security and data protection that meets a your existing Investments In broad range of regulations, standards, and best practices Including applications and Infrastructure FedRAMP, International Traffic Arms Regulations (ITAR), RIPS 140-2, and avoid the complexity of and AT 101 SOC Type 2. re-archltecting for public cloud Efficiency and Manageability Infrastructure R Secure and Compliant — Secure Agencies can write, deploy, and manage applications In the cloud cloud platform, with security In the same way they do today, without making any changes controls designed to meet or additional investments. With management tools consistent the unique requirements of across on premises and cloud environments, you can accelerate government customers, most application deployments, streamline the deployment and update notably the FedRAMP standards process, leverage pre -built components, and reuse application Hybrid — True hybrid cloud solution models across environments, and clouds. enables both onslte and offslte IT environments to run new and Seamless Network Integration existing applications seamlessly I vCloud Government Service Is built on a seamless virtuallzed 0 Fastest Path to Cloud Value — Use network that is quickly customlzable to support your application a common platform to leverage and security needs. Network virtuallzatlon allows you to configure Internal and external cloud your firewalls and network as If they were In your own data center resources without having to retrain so that you can replicate the network your applications need to your staff, and lower overall costs operate. Get common Identity and access management across your onslte and offslte cloud locations. �M OOTS"D DATA SOLVED. Agreement No. 7434 Miy vCloudeminent Bald vCloud Government Service has a FedRAMP Provisional Authority to Operate (P-ATO) and Is generally available to U.S. government and defense organizations. It can be used for a variety of applications and workloads Including: 11 Test and development Packaged application hosting Backup and Disaster Recovery I Web hosting and customer service On -demand data center expansion Trusted Cloud Services OTS Is redefining the Industry with trusted cloud services that leverage Innovation to Improve the flexibility, scalablllty, and cost-effectiveness of cloud services. OTS Realty Trust, Inc. (NYSE: OTS) 0 We are a trusted cloud operator with past performance serving Is a leading provider of secure, compliant data center solutions the government market — Including DoD, Civilian and Intelligence and fully managed services, and agencies — across multiple programs and applications the owner of Carpathla Hosting, a OTS data centers deliver the highest levels of security and leading provider of hybrid cloud compliance, and meet many compliance standards Including FISMA, services and managed hosting. DIACAP, PCI, and HIPAA OTS' Integrated technology B We hold a number of certifications and accredltations across multiple service platform of custom data federal agencies and programs and support over 50 Federal systems center (C1), colocation (C2) and holding active Authorizations to Operate (ATO) cloud and managed services (C3) provides flexible, scalable, Security secure IT solutions for web and IT applications. OTS' Critical Facilities Management (CFM) provides vCloud Government Service operates with a FedRAMP Provisional Increased efficiency and greater Authorization to Operate (P-ATO) Issued by the Joint Authorization performance for data center Board (JAB). Built with a defense In-depth strategy that puts our owners and operators. OTS owns, customers' critical applications and data In the Innermost ring, our operates or manages 25 data people, processes and procedures ensure 100 percent compliance at centers and bsupports more than Implementation and through the Ilfecycle of the project. 1,000 customers In North America, Europe and Asia Pacific. Hybrid Options M vCloud Government Service Is a true enterprise -class hybrid cloud service, offering a seamless platform for migrating and managing workloads between dedicated virtuallzed environments, on -premise Infrastructures, third -party data centers and the cloud. 04 O 00T =:i r TSDATACENTERS.COM 877.OTS. DATA Agreement No. 7434 March 10, 2016 State of Utah Division of Purchasing 3150 State Office Building Capitol Hill Salt Lake City, Utah 84114 Mr. Hughes: As a privately owned company, Carahsoft Technology Corp. does not report to D&B. As such, the information in D&B is incorrect. To support you to determine that we have the financial resource to perform the contract we provide you the following information. We are a stable, conservative and profitable company. Carahsoft continues to grow as noted by our year over year revenue below: 2010 $820 Million 2011 $1.12 Billion 2012 $1.46 Billion 2013 $1.81 Billion 2014 $2.45 Billion 2015 $3 Billion We currently employ close to 500 employees. To support you to determine that we have the financial resource to perform the contract we provide you the following information: We maintain a $25M line of credit available (currently 100% available) with Xenith Bank. I have included a recent banking clarification letter from Xenith. Mr. Joe Humphries is the Regional President and can be reached at 703-869-3610 if you need any information from him. We have received numerous accolades including: • For the 6th consecutive year CRN's 2012 Fast Growth List • Washington Business Journal's 2012 List of Largest Government Contractors in Metro DC • Third consecutive year Washington SmartCEO magazine's 2012 Future 50 list which recognizes the metro areas fastest growing companies. Should you require additional details please call me and I can discuss our confidential financial information with you or provide you trade references that can further assist you. Sincerely, Jillian Dewey Szczepanek Controller Agreement No. 7434 Carahsoft Technology Corp. Credit Information Risk of Late Payment Higher Risk Lower Risk Risk of late payment is based on the following prioritized factors in addition to other information in D&B's files: • Proportion of slow payments in recent months • Higher risk industry based on delinquency rates for this industry • Increase in proportion of delinquent payments in recent payment experiences • Proportion of past due balances to total amount owing • Evidence of open liens Indications of slowness can be the result of disputes over merchandise, skipped invoices, etc. DUNS: 08-836-5767 Payment Performance Trend The payment performance trend for this company is Increased . Payment Trend currently is Increased compared to payments three months ago. The most recent payment information in D&B's files is: • Payments currently: 11 days beyond terms • Payments 3 months ago: 19 DAYS BEYOND terms • Industry average: 5 DAYS BEYOND terms *Note: Payments to suppliers are averaged weighted by dollar amounts. r � ,. , , . , rrrrrrrrrrrrrrrrrrrrrrrrr � i ,/ / / , // ✓ � r„ r�,,, „/ riii ✓i / u r r � / j/ � % r ,,,,,r,,,;;., „, ��,�,.:".r //r ..,,r�,,,ii/i „/rri rc, rii ✓,„,/�rr�/,. ,,,/iii/////i�/ r, � ..../ � r,. /� /i� / /.../D/, a/�. Recommendation Date: 11/18/2015 Risk Category High Conservative Credit Limit $0 Aggressive Credit Limit $0 Chief Executive: DIRECTOR(S): THE OFFICER(S) Type of Business: NA Years in Business: NA Annual Sales: I PI"i Moderate Low Line of Business: Whol computers/peripherals 1000000000 Agreement No. 7434 Employees Total: 500 The public record items reported may have been paid, terminated, vacated or released prior to the date this data is transmitted. Accounts are sometimes placed for collection even though the existence or amount of the debt is disputed_ Thisreport is prepared and provided under contract for the exclusive use of This report may not be reproduced in whole or in part by any means of reproduction. Payment Trends Address: 1860 Michael Faraday Dr, Suite 100 Reston, VA 20190 D-U-N-S Number: 08-836-5767 This is a single location. Payment Activity Total payment Experiences in D&Bs 48 File: Payments Within Terms: 72% (not dollar weighted) Total Placed For Collection: NA Average Highest Credit: $2,379,615 Largest High Credit: $20,000,000 Highest Now Owing: $20,000,000 Highest Past Due: $4,000,000 Primary Industry SIC: 5045 Description: Whol computers/peripherals Indications of slowness can be the result of dispute over merchandise, skipped invoices, etc- Accounts are sometimes placed for collection even though the existence or amount of the debt is disputed- 7434 3 Month PAYDEX® 24 Month PAYDEX® 7 5 � 7 3 A When weighted by dollar amount, When weighted by dollar amount, payments to suppliers average 8 days beyond terms payments to suppliers average 11 days beyond terms terms. terms. 75 73 100 look 120 Days Slow 30 Days Slaw Prompt '20 Days Slow 30 Days Slur, Prompt Based on payments collected over the last 3 months Based on payments collected over the last 24 months PAYDEX ® Trends - This Company, 12 Months 100 11 f i so <q 60 40 20 J 0 Jan Ntar Nlnv Jul Sep Nov 2015 2015 2015 2015 2015 2015 De_ Feb Apr Jun Aug Oct 2014 2015 2015 2015 2015 2015 .I..l,.uis Company (73) Based on payments collected over the last 12 months o Current PAYDEX® for this Business is 73, or equal to 11 days beyond terms terms • The 12-month high is 73, or equal to 11 DAYS BEYOND terms The 12-month low is 63. or equal to 11 DAYS BEYOND terms PAYDEX 0 Score Comparison - This Company to Primary Industry Comparison, 4 Quarters Agreement No. 7434 60 40 20 o 04 2014 ......._ m�, , ,.. w�� �,......�. 01 2015 02 2015 * My Compaiiny (73) ann hidusrtry Medt an () * Industry Upper Quar1fle (80) a Industry Me pan (70) Based on payments collected over the last 4 quarters * Current PAYDEXO for this Business is 73, or equal to 11 days beyond terms Current PAYDEXO for this Business is 77 , or equal to 5 DAYS BEYOND terms Industry upper quartile represents the performance of the payers in the 75th percentile Industry lower quartile represents the performance of the payers in the 25th percentile Business Payment Habit by Amount of Credit Extended, 24 Months WAR . , . / Over 100,000 24 50,000-100,000 " u 1 15,000-49,999 5 5,000-14,999 4 i 1,000-4,999 1 under1,000 MEMNON= 3 How to Read the D&B PAYDEX ® Score 03 2015 $90,200,000 $85,000 $110,000 $27,500 $2,500 $400 i O eV � sk rf 9 ltrf (',ym cvr r�ava r ar„u:'u I[:'rao`arr jjA to 30 day", w llhiirW tom) is Vd� 11M� rll,1 Risk ',I' A"a;r; ,r ty a�"¢ial' (aaWra.wafr,3 30 or Orra s I` eryorcf torrri^a) JW� �mviinuvl �aaaa r ar1r,"z 'SUJ Per 00 day", ha(,yon d uaerrl'us') r I eem ent No. 7434 ©Dun & Bradstreet, Inc. 2015. All rights reserved. Attachment p Agreement No. 7434 311I2016 AODocs Terms of Service- Version published on the Web Site AODocs Terms of Service - Version published on the Web Site TERMS OF SERVICE These Terms of Service ("Terms") are a legal agreement between Altirnao, Inc., herein "Altirnao", having an office and place of business at 221 Kearny Street, Suite 300, San Francisco, CA 94103, USA, and the person or entity agreeing to the terims herein ("Customer", "You" o "you"). By using or accessing any park of AODocs (the "Service"), You agree that You have readl, understand, and agree to be bound by all of the terms and conditions contained herein. If You do not agree to these Terms, You must not use or access the Service. If You are entering into this Terms on behalf of a company, You represent that You have the authority to bind that company to these Terms. If You have purchased a license to use AODocs through an Altirnao reseller, You also agrees to comply with the terms of any agreement between You and such reseller. In the event of an inconsistency between these Terms and any such reseller agreements, these Terms shall control. Description of Service AODocs is an online document management solution for Google Apps. The Service is offered and provided subject to these Terms and solely for Your business purposes. You may connect to the Service using any Internet browser supported by the Service. The Service requires one or more Google Apps for Business account that will be the owner(s) of all files stored and managed by the Service. The Service stores all the files that it stores and manages for You in the Google Drive account(s) that You wild assign to AOD,ocs when You deploy AODocs. You understand and acknowledge that You are solely responsible for obtaining the Internet access and all equipment necessary to use the Service, for appropriately configuring Your Google Apps account(s) and for allocating a sufficient number of accounts and sufficient Google Drive storage space to allow proper operation of the Service, as per the recommendation of Altirnao's technical support or product documentation. You also understand and agree that content you store through your use of the Service will be made available to Google as part of Google providing the Google Apps service. All fees associated with the foregoing shall be paid by You. Modifications To these Terms: Altirnao reserves the right to update and change the Terms of Service upon notice from time to time. You will be provided notice of any such modification by electronic mail or by the publishing of such on the website htt : o ocs .co - s rvice . You may terminate your use of the Service if the Terms are modified in a manner that substantially affects your rights in connection with use of the Service. Your continued use of the Service after any such changes shall constitute your consent to such changes. You can review the most current version of the Terms of Service at any time at http://`ww,w,aodocs.com/terms -of-service. To the Service: Altirnao may make changes to the Service from time to time. Altirnao will notify you of any material changes or modifications. Any updates, upgrades, additions or new features to the Service, including the release of new tools and resources, shall be subject to these Terms and may require you to agree to additional terms and conditions. https J/docs.google.com/document/d/l 76pdFCOVCRYHpWwVeStsol1 fA-6KLQe6x4nQlxky24/pub 117 3/1/2016 AODocs Terms of Service- Version published on the Web Site Agreement No. 7434 Use of the Service Access to Service: Access to the Service is only available to the Customer and the end users ("Users") to whom Customer has purchased individual user licenses and granted access. Upon registration with Altirnao, Customer will specify the email address of a Google Apps account (the "Account"), which will be granted access to the Service. Customer is solely responsible for granting the Service access to Customer's Google Apps files and revoking such access when Customer ceases use of the Service. Customer is responsible for maintaining the confidentiality of Customer's password. Customer agrees not to share its password with anyone other than Users, let anyone else access its password or do anything else that might jeopardize the security of its password. Customer agrees to notify Altirnao if Customer's password is lost, stolen or disclosed to an unauthorized third party, if there is any unauthorized use of its password or Account, or if Customer learns of any other breach of security in relation to the Service. Customer is solely responsible for any and all activities that occur through the use of Customer's Account. Li ease to ClIsLomer Subject to Customer's compliance with these Terms and the Goggle Acceptable Use Policy (available at htt s_://cloud. google .com/terms/au ), including, without limitation, Customer's payment of all applicable fees, Altirnao hereby grants Customer a limited, revocable„ non -transferable non-exclusive, non-sublicensable license to access and use the Service, solely for Customer's own internal use, and not for timesharing, application service provider or service bureau use. Customer is at all times fully responsible and liable for all acts and omissions by Users to whom Customer has granted access to the Service and Customer agrees to indemnify Altirnao for all claims and losses related to any such acts and/or omissions. Each user license ordered by Customer is specific to the email address of only one User and, once grantedto that User, may not be transferred or reassigned' to any other user unless the User originally granted the license will no longer use the Service. Any such transfer or reassignment is permanent and Licensee shall not permit the original User to use the Service after such User's license has been used by a different User. Altirnao reserves the right to terminate unpaid Accounts and Accounts that are inactive for a continuous period of ninety (gg) days, In the event of any termination, all data associated with such Account will be deleted and Customer shall be responsible for revoking the Service's access to Customer's Google Apps domain data and files. Altirnao will provide Customer with prior notice of such termination and will send a data backup to Customer by email. In case of Accounts with more than one User, if at least one of the Users is active, the Account will not be considered inactive. Restrictions on Use Restrictions on Use of AODocs: In addition to all other terms and conditions contained herein, you shall not and shall not permit others to: 1. copy, modify, adapt, translate or otherwise create derivative works of the Service; 2. reverse engineer, decompile, disassemble or otherwise attempt to discover the source code of the Service; 3. rent, lease, sell, assign or otherwise transfer rights in or to the Service; 4. remove any proprietary notices or labels from the Service; 5. use, post, transmit or introduce any device, software or routine which interferes or httpsI/docs.google.com/document/d/l76pdFCOVCRYHpWwVeStsollfA-6KLQe6x4nQlxky24/pub 217 3/1/2016 AODocs Terms of Service- Version published on the Web Site Agreement No. 7434 attempts to interfere with the operation of the Service. 6. use the Service for spamming or any other illegal or unauthorized purpose or engage in illegal or deceptive trade practices; or 7. otherwise use of the Service in violation of any laws in your jurisdiction (including but not limited to copyright laws). 8. use the Service for High Risk Activities; 9. process or store any content on or through the Service that is subject to the International Traffic in Arms Regulations maintained by the Department of State. % if you are (or become) a. Covered Entity or Business Associate., as definedin the Health Insurance Portability and Accountability Act ("HIIPAA"), use the Service for any purpose or in any manner involving Protected Health Information (as defined in HIPAA) unless you have received prior written consent to such use from both Google and Altirnao. 11. use the Service as a way to circumvent your obligation to provision one Google Apps End User Account for each User. This list of prohibitions provides examples and is not complete or exclusive. Restrictions on Use of Google Apps: You understand and agree that your use of the Service requires the use of Google Apps. You agree that you shall not and shall not permit others to: copy, modify, create a derivative work of, reverse engineer, decompile, translate, disassemble, or otherwise attempt to extract the source code of Google Apps or any component thereof; use the Google Apps or any component thereof for uses such as the operation of nuclear facilities, air traffic control, or life support systems, where the use or failure of Google Apps or any component thereof could lead to death, personal injury, or environmental damage; sublicense, resell, or distribute Google Apps or any component thereof; use Google Apps or any component thereof to create, train, or improve (directly or indirectly) a substantially similar product or service, including any machine translation engine; access Google Apps or any component thereof in a manner intended to avoid incurring fees; use Google Apps or any component thereof to operate or enable any telecommunications service or in connection with any application that allows end users to place calls to or to receive calls from any public switched telephone network; or process or store any data that is subject to the International Traffic in Arms Regulations maintained by the U.S Department of State or any other applicable law. Altirnao reserves the right to suspend or terminate your access to Service with or without cause and with or without notice, for any reason or no reason, or for any action that Altirnao determines is inappropriate or disruptive to the Service or to any other user of this Service. Google may suspend your Google Apps account if: (a) your use of Google Apps is in violation of Google°s Acceptable Use Policy, which could disrupt: (i) Googlie Apps; (ii) other users` use of Google Apps; or (iii) the Google network or servers used to provide Google Apps services; or (b) there is unauthorized third party access to Google Apps. You acknowledge and agree that Altirnao, in its sole discretion, with or without notice, may establish or revise from time to time general practices and limits concerning your use of the https:Hdocs.google.com/document/d/l76pdFCOVCRYHpWwVeStsol1fA-6KLQe6x4nQlxky24/pub 417 3/1/2016 AODocs Terms of Service- Version published on the Web Site Agreement No. 7434 Service, including withoutlimitation, establishing the maximum number of Google Drive operations that can be done on your behalf in a given period of time. In addition, Altirnao may limit, without notice, the volume of e-mail forwarding or file downloading from the Service in response to unreasonable activity (such as spannming). Altirnao may report to law enforcement authorities any actions that may be illegal, and any reports it receives of such conduct. Whien legally required or at Altirnao's discretion, Altirnao will cooperate with law enforcement agencies in any investigation of alleged illegal activity associated with the Service or on the Internet. Unauthorized use of any trademarked, copyrighted or patented materials contained in the Service may violate certain laws and regulations.. You agree to indemnify and hold Altirnao and its officers, directors, employees, affiliates, agents, licensors„ and business partners harmless from and against any and all costs, damages, liabilities, and expenses (including attorneys' fees and costs of defense) Altirnao or any other indemnified party suffers in relation to, arising from, or for the purpose of avoiding., any claim or demand from a third party that your use of this Service or the use of Service by any person using your Account (including without limitation, Your Content (as defined below)) violates any applicable law or regulation„ or the copyrights, trademark rights or other rights of any third party. Suspension Altirnao reserves the right to suspend or terminate Customer's access to the Service with or without notice if Altirnao reasonably determines that: (a) there is a threat or attack on the Service (including a denial of service attack) or other event that may create a risk to the Service, Altirnao, Customer, or any user of the Service; (b) Customer's or its users' use of the Service or Customer Content disrupts or poses a security risk to the Service or any user of the Service, may harm Altirnao's systems, or may subject Altirnao or any third party to liability; (c) Customer or any User is using the Service for fraudulent or illegal activities; (d) Customer or any User is causing performance disruptions in the Service or in Google Drive by using the Service in a way that is not recommended in the performance guidelines published in the Service's documentation or by ignoring performance recommendations provided by Altirnao's technical support; (e) subject to applicable law, Customer has ceased to continue Customer's business in the ordinary course, made an assignment for the benefit of creditors or similar disposition of its assets, or become the subject of any bankruptcy, reorganization, liquidation, dissolution or similar proceeding; (f) Customer or any User is using the Service or other Altirnao property in breach of this Agreement; or (g) Customer is in default of its payment obligations hereunder (collectively, "Service Suspensions"). Altirnao will make commercially reasonable efforts, circumstances permitting, to provide written notice of any Service Suspension to Customer, and to provide updates regarding resumption of Customer's access to the Service following any Service Suspension. Subscription terms Customer agrees to pay the subscription fee applicable to Customers and its Users use of the Service. Such fees will be paid on a periodic basis as agreed to Altirnao or to your Altirnao reseller as agreed when you registered for the Service. https://docs.google.com/document/d/l76pdFCOVCRYHpWwVeStsollfA-6KLQe6x4nQlxky24/pub 417 3/1 /2016 AODocs Terms of Service- Version published on the Web Site Agreement No. 7434 In case of non-payment for any reason (including„ if applicable, Altirnao's inability to charge your credit card or other payment; method for any reason) or any violation of these Terms, Altirnao shall be entitled -- without liability - to immediately suspend Customer's and Users' access to the Service. If you purchase your license to use the Service from Altirnao, you hereby expressly agree that Altirnao is permitted to bill you for the applicable fees, any applicable tax and any other charges you may incur in connection with your use of the Service, or charge such fees to your credit card or other payment method designated on your initial registration with the Altirnao at regular intervals for the remainder of the term of these Terms. If you cancel your Account at any time, you will not receive any refund. Customer agrees that Customer's paid use of the Service is neither contingent on the delivery of any future functionality or features nor dependent on any oral or written public or private comments made by Altirnao or any Altirnao reseller regarding future functionality or features. Intellectual Property Customer hereby acknowledges and agrees that, subject to the limited rights granted hereunder, Altirnao (or its licensors) own all legal right„ title and interest in and to the Service, including, without limitation, any Intellectual Property Rights or other proprietary rights which exist in the Service (whether such rights are registered or unregistered, and wherever in the world those rights may exist) ("Our Technology"'). For purposes of these Terms„ "Intellectual Property Fights" means, on a worldwide basis, any and all now known or hereafter known (a) rights associated with works of authorship including copyrights and moral rights, (b) trademark and trade name rights and similar rights, (c) trade secret rights, (d) patent rights and other industrial property rights, (e) intellectual and industrial property rights of every other kind and nature and however designated, whether arising by operation of law or otherwise, and (f) all registrations, applications, renewals, extensions, continuations, divisions, or reissues thereof now or hereafter existing, made, or in force (including any rights in any of the foregoing). Our Technology may not be copied, modified, reproduced, republished, posted, transmitted, sold„ offered) for sale, or redistributed in any way without our prior written permission and the prior written permission of our applicable licensors.. You must abide by all copyright notices, information, or restrictions contained in or attached to any of Our Technology. Nothing in these Terms of Use grants you any right to receive delivery of a copy of Our Technology or to obtain access to Our Technology except as generally and ordinarily permitted through the Service according to these Terms, Furthermore, nothing in these Terms of Use will be deemedto grant, by implication„ estoppel or otherwise, a license to Our Technology. Certain of the names, logos, and other materials displayed on the Service constitute trademarks, trade names, service marks or logos ("Marks") of Altirnao or other entities. You are not authorized to use any such Marks. Ownership of all such Marks and the goodwill associated therewith remains with and will inure to us or those other entities. To the extent indicated, any use of third party software provided in connection with the Service will be governed by such third parties" licenses and not by these Terms of Service. Furthermore, any comments, ideas and/or reports about the Service that you provide to us, whether in written or electronic form ("Feedback"), shall be considered our proprietary and confidential information, and you hereby irrevocably transfer and assign to us all intellectual property rights embodied in or arising in connection with such Feedback, and any other rights or claims that you may have with respect to any such Feedback. Ownership & Privacy As between You and Altirnao, you retain all right, title and interest in any and all data, files, attachments, text, images, personally identifiable information, and other content that You and. Your Users upload or submit to the Service (collectively, "Your Content"). You may not upload, post or otherwise make available through the Service any material protected by copyright, https://docs.google.com/document/d/176pdFCOVCRYHpWwVeStsollfA-6KLQe6x4nQlxky24/pub 517 3/1/2016 AODocs Terms of Service- Version published on the Web Site Agreement No. 7434 trademark, or any other proprietary right -without the express permission of the owner of such copyright, trademark or other proprietary right owned by a third party, and the burden of determining whether any material is protected by any such right is on you. You shall have sole responsibility for the accuracy, quality, integrity, legality, reliability, appropriateness, and intellectual property ownership or right to use any and all of Your Content. You represent and warrant that you have all rights, permissions and consents necessary (a) to make Your Content available on or through the Service, and (b) to grant Altirnao the limited rights to use Your Content set forth in these Terms. You agree that Altirnao may use Your Content to provide the Service and its features, including by making it available for viewing, download and modification by other Users with access rights to Your Content. You hereby grant Altirnao a non-exclusive, perpetual, royalty -free, worldwide license (including the right to sublicense through multiple tiers) to access, use, reproduce, distribute, store, transmit, modify, adapt, reformat, publicly display, publicly perform and create derivative works of Your Content as required for the purpose of providing the Service to you. You understand and agree that Altirnao does not have the ability to grant or revoke the Service's access to Customer's Google Apps domain data and files or other content and materials stored in Customer's Google Apps account, Therefore, You are solely responsible for granting the Service access to such Google Apps files and revoking such access when You cease use of the Service. Altirnao shall not be responsible and shall' have no liability for any damages that result from Your failure to grant or revoke such access. You hereby consent that, if You choose to become a paying customer of the Service, Altirnao may identify You as a Altirnao customer (using Your name and logo) and generally describe the products or services it provides to You in its promotional materials, presentations, and proposals to other current and prospective customers. If you cancel your Service subscription, your information is no longer used and Altirnao will delete your Account and data associated with your Account within ninety (90) days of your cancellation. Please note, however, that some information like billing and subscription may remain with us for accounting and legal reasons. Availability. Altirnao will make the Service available to You in accordance with the Service Level Agreement available online at https://www.aodocs-com/sla (the "SLA"). Altirnao does not make any representations or guarantees regarding uptime or availability of the Service unless specifically identified in the SLA. The Service may be unavailable at certain times as specified in the SLA, including during any unanticipated or unscheduled downtime or unavailability of all or any portion of the Service as a result of system failures or force majeure events. Warranty Disclaimer THE SERVICE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, IMPLIED WARRANTIES OF TITLE, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE https lldocs.google.comldocument/dll 76pdFCOVCRYHpWwVeStsol l fA-6KLQe6x4nQlxky24/pub 617 3/1/2016 AODocs Terms of Service- Version published on the Web Site Agreement No. 7434 OR NON -INFRINGEMENT. ALTIRNAO MAKES NO WARRANTY THAT (1) THE SERVICE IS FREE OF VIRUSES OR OTHER HARMFUL COMPONENTS; (11) THE SERVICE WILL BE ERROR -FREE OR UNINTERRUPTED (INCLUDING, WITHOUT LIMITATION, INTERRUPTIONS THAT OCCUR IN THE CONTEXT OF REGULARLY SCHEDULED MAINTENANCE); (III) ANY INFORMATION OR ADVICE OBTAINED BY YOU IN CONNECTION WITH THE SERVICE WILL BE ACCURATE OR COMPLETE; OR (IV) THE RESULTS OF USING THE SERVICE WILL MEET YOUR REQUIREMENTS. SOME STATES DO NOT ALLOW EXCLUSION OF AN IMPLIED WARRANTY, SO THIS DISCLAIMER MAY NOT APPLY TO CUSTOMER. Limitation of Liability IN NO EVENT SHALL ALTIRNAO BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTAL, INDIRECT, SPECIAL, PUNITIVE, OR OTHER LOSS OR DAMAGE WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOSS OF DATA, LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, COMPUTER FAILURE, LOSS OF BUSINESS INFORMATION), ARISING OUT OF OR CAUSED BY YOUR USE OF OR INABILITY TO USE THE SERVICE, EVEN IF ALTIRNAO HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. YOUR SOLE AND EXCLUSIVE REMEDY FOR ANY DISPUTE WITH ALTIRNAO RELATED TO ANY OF THE SERVICE SHALL BE TERMINATION OF SUCH SERVICE. IN NO EVENT SHALL ALTIRNAO'S ENTIRE LIABILITY TO YOU IN RESPECT OF ANY SERVICE, WHETHER DIRECT OR INDIRECT, EXCEED THE FEES PAID BY YOU TOWARDS SUCH SERVICE. SOME STATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE LIMITATIONS OR EXCLUSIONS IN THIS PARAGRAPH MAY NOT APPLY TO CUSTOMER. Other Terms These Terms, their interpretation, performance or any breach thereof, will be construed in accordance with, and all questions with respect thereto will be determined by, the laws of the State of California. Both parties hereby irrevocably submit any disputes under these Terms to the jurisdiction of the courts located in the State of California. Last Updated: February 11th, 2016 EAST\53456530.2 https://docs.google.com/document/d/l76pdFCOVCRYHpWwVeStsol1fA-6KLQe6x4nQlxky24/pub 717 Agreement No. 7434 W Channel Foundation Agreement U.S. Public Sector 1. INTRODUCTION 1.1 This Channel Foundation Agreement ("Foundation Agreement") specifies the terms and conditions agreed between CA and the Ordering Activity, as defined in GSA Order ADM4800.2G and as revised from time to time ("End User" or "Customer") as a foundation for their relationship as further defined in the applicable Modules. Ordering Activity understands and agrees that Ordering Activity's right to use the CA Offerings, ordered by Ordering Activity and submitted to CA by an Authorized CA Partner, is subject to Ordering Activity's compliance with this Foundation Agreement and the relevant Module for such CA Offering. The Foundation Agreement and the Module(s) incorporated into the GSA Schedule contract for the CA Offering(s) purchased by Ordering Activity will govern orders from an Authorized CA Partner for Ordering Activity's acquisition of the CA Offering and such terms shall remain binding upon both Ordering Activity and CA for that CA Offering absent mutual written agreement to thecontrary. 1.2 Modules to this Foundation Agreement include the Channel Software Module, , Channel SaaS Module, Channel Hardware Appliance Module, and Channel Education Module. 2. DEFINITION 2.1 "Agreement" means this Foundation Agreement, the applicable Module, and License Metric for the applicable CA Offering, and any document incorporated expressly therein or incorporating the foregoing by reference. 2.2 "Authorized CA Partner" means an entity having a valid, current authorization from CA to market, offer and resell to Ordering Activity the right to use the CA Offering. Ordering Activity may find information regarding authorized CA Partners here: wyww.c .com agners. 2.3 "CA Offering" means the individual offering (such as software, services, software as a service etc.) made available by CA as defined in the Module and/or, License Metric. 2.4 "Confidential Information" means any information, maintained in confidence by the disclosing Party, communicated in written or oral form, marked as proprietary, confidential or otherwise so identified, that is exempt from disclosure under the Freedom of Information Act (FOIA), S.U.S.C. §552(b) under one or more exemptions to that Act, and/or any information that by its form, nature, content or mode of transmission would to a reasonable recipient be deemed confidential or proprietary, including, without limitation, CA Offerings, Documentation, and any benchmark data and results produced. 2.5 "Documentation" means the documentation, technical product specifications and/or user manuals, published by CA or any entity within CA group of companies (each a CA entity) that is made generally available with CA Offerings. 2.6 "License Metric" means the specific criteria for measuring the usage of the CA Offering (such as MIPS, CPUs, tiers, servers, or users). 2.7 "Module" means the additional terms and conditions applicable to the CA Offering. 2.8 "Parties" means individually and or collectively CA and or the Ordering Activity. 2.9 "Prime Contractor" means the entity contracting directly with the Ordering Activity, if other than an Authorized CAPartner. 2.10 "Term" means the period for which Ordering Activity is authorized to use the CA Offering as specified in CA's order with Ordering Activity's chosen Authorized CA Partner or the Prime Contractor. 3. ORDERING AND DELIVERY 3.1 This Agreement applies to each specific CA Offering purchased by Ordering Activity from an Authorized CA Partner or Prime Contractor. Use of the CA Offerings, or of this Agreement to procure CA Offerings, by Ordering Activity's Affiliates outside of the jurisdiction specified for Ordering Activity in the order between CA and the Authorized CA Partner or Prime Contractor is not permitted unless such Affiliate signs a participation agreement with CA to adopt and adhere to the terms of this Agreement. 3.2 CA will deliver or make available a CA Offering to Ordering Activity only upon, and in accordance with, CA's execution of an order with the Authorized CA Partner. Any terms that may appear on an Ordering Activity's purchase order (including without limitation pre-printed terms), or as part of Ordering Activity's order with an Authorized CA Partner or Prime Contractor, that conflict or vary from the terms and conditions of this Agreement shall not apply to CA and shall be deemed null and void unless otherwise required by law. Version P51.0 Page 1 of 38 7/23/2014 10:36 AM Agreement No. 7434 ca 3.3 The CA Offering will be delivered by CA to Ordering Activity either by electronic delivery (ESD) or in tangible media in accordance with the terms of the GSA Schedule contract and the relevant purchase order. CA agrees to be responsible for all customs duties and clearances. 4. CONFIDENTIAL INFORMATION 4.1 The Parties agree that when receiving Confidential Information from the disclosing Party, that the receiving Party shall hold it in confidence and shall not disclose or use such information except as permitted under the Agreement. The receiving Party shall treat the disclosing Party's Confidential Information confidentially and in the same manner as it treats its own proprietary and/or confidential information, which shall not be less than a reasonable standard of care, and the receiving Party shall use Confidential Information only for the purposes described in the Agreement. Confidential Information may be disclosed to receiving Party's employees, agents, financial advisors, contractors and attorneys on a need -to know basis and the receiving Party shall ensure that such persons maintain such Confidential Information pursuant to the terms of the Agreement. 4.2 The receiving Party shall be permitted to disclose Confidential Information in connection with a judicial or administrative proceeding to the extent that such disclosure is required under applicable law or court order, provided that the receiving Party shall, where reasonably possible, give the disclosing Party prompt and timely written notice of any such proceeding and shall offer reasonable cooperation in any effort of the disclosing Party to obtain a protective order. 4.3 For the purposes of the Agreement, Confidential Information shall exclude: (i) information which the receiving Party has been authorized in writing by the disclosing Party to disclose without restriction; (ii) information which was rightfully in the receiving Party's possession or rightfully known to it prior to receipt of such information from the disclosing Party; (iii) information which was rightfully disclosed to the receiving Party by a third Party having proper possession of such information, without restriction; (iv) information which is part of or enters the public domain without any breach of the obligations of confidentiality by the receiving Party; and (v) information which is independently developed by the receiving Party without use or reference to the disclosing Party's Confidential Information. 4.4 Nothing in the Agreement will (i) preclude CA from using the ideas, concepts and know-how which are developed in the course of providing any CA Offerings to Ordering Activity or (ii) be deemed to limit CA's rights to provide similar CA Offerings to other customers. Ordering Activity agrees that CA may use any feedback provided by Ordering Activity related to any CA Offering for any CA business purpose, without requiring consent including reproduction and preparation of derivative works based upon such feedback, as well as distribution of such derivative works. 4.5 To the extent permitted by the Federal Records Act, the receiving Party agrees, upon request of the disclosing party, to return to the disclosing Party all Confidential Information in its possession or certify the destruction thereof. 4.6 For CA software (including code) and Documentation, and Ordering Activity's and/or CA's Confidential Information expressly designated in writing as perpetually confidential, the obligations of this section are perpetual and shall survive termination. For all other Confidential Information, the foregoing obligations shall extend for five (5) years from the date of initial disclosure. S. FEES 5.1 The Parties acknowledge and agree that all terms governing the fees, payments, payment schedules, pricing and discounts for the applicable CA Offering procured by Ordering Activity under this Agreement are and shall be between solely Ordering Activity and their chosen Authorized CA Partner or Prime Contractor. 6. TITLE 6.1 CA retains all right, title, copyright, patent, trademark, trade secret and all other proprietary interests to all CA Offerings and any derivatives thereof. No title, copyright, patent, trademark, trade secret or other right of intellectual property not expressly granted under the Agreement is exchanged between the Parties. 7. WARRANTY 7.1 Each Party represents and warrants that it has the legal power to enter into the Agreement. 7.2 CA represents and warrants that it owns or otherwise has sufficient rights to grant Ordering Activity the rights defined in the Agreement. 8. INDEMNIFICATION 8.1 CA will indemnify any third party claims that Ordering Activity's use of the specific CA Offering licensed or purchased by Ordering Activity under this Agreement infringes any valid US patent or copyright within the jurisdictions where Ordering Activity is authorized to use the CA Offering at the time of delivery. CA may, at its option and expense: (i) procure for Ordering Activity the Version P61,0 Page 2 of 38 7/23/2014 10:36 AM Agreement No. 7434 technologies right to continue to use the CA Offering; (ii) repair, modify or replace the CA Offering so that it is no longer infringing; or (iii) provide a pro -rated refund to the Authorized CA Partner of the fees paid for the CA Offering which gave rise to the indemnity calculated against the remainder of the Term from the date it is established that CA is notified of the third party claim. If the CA Offering is CA Software, and is licensed on a perpetual basis, an amortization schedule of three (3) years shall be used for the basis of the refund calculation. 8.2 CA shall have no liability: (i) in the event the allegation of infringement is a result of a modification of the CA Offering except a modification by CA, (ii) if the CA Offering is not being used in accordance with CA's specifications, related documentation and guidelines, (iii) if the alleged infringement would be avoided or otherwise eliminated by the use of a CA published update or patch, (iv) if the alleged infringement is a result of use of the CA Offerings in combination with any third party product, or (v) if the applicable fees due for the specific CA Offering have not been paid by Ordering Activity or Prime Contractor to its Authorized CA Partner. The indemnifications contained herein shall not apply and CA shall have no liability in relation to any CA Offering produced by CA at the specific direction of Ordering Activity. THE FOREGOING PROVISIONS STATE THE ENTIRE LIABILITY AND OBLIGATIONS OF CA REGARDING CLAIMS OF INFRINGEMENT, AND THE EXCLUSIVE REMEDY AVAILABLE TO ORDERING ACTIVITY WITH RESPECT TO ANY ACTUAL OR ALLEGED INFRINGEMENT OR MISAPPROPRIATION OF ANY INTELLECTUAL PROPERTY OR OTHER PROPRIETARY RIGHTS. 8.3 CA shall indemnify Ordering Activity against all damages, fees, (including reasonable attorney's fees) fines, judgments, costs and expenses finally awarded as a result of a third party action alleging a bodily injury or death which arises under the Agreement, provided that such liabilities are the proximate result of gross negligence or intentional tortuous conduct on the part of CA. 8.4 The above indemnities are contingent upon: (i) Ordering Activity providing prompt notice of any claim of infringement and assistance in the defense thereof, (ii) CA's right to consult with Ordering Activity at any time and to intervene in the proceedings through CA's chosen counsel at CA's expense, provided that Ordering Activity shall not have the right to settle any claim requiring CA to make a payment or to admit liability without CA's prior written agreement , and (iii) Ordering Activity not taking any actions or failing to take actions that hinder the defense or settlement process. 9. LIMITATION OF LIABILITY EXCEPT IN THE CASE OF A BREACH OF TITLE, INFRINGMENT OF CA'S INTELLECTUAL PROPERTY RIGHTS OR CONFIDENTIALITY, OR OF THIRD PARTY CLAIMS ARISING UNDER THE INDEMNIFICATION SECTION, TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW NEITHER PARTY (INCLUDING ANY OF CA'S SUPPLIERS) SHALL BE LIABLE FOR A) ANY INDIRECT, SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR PUNITIVE DAMAGES OF ANY NATURE, INCLUDING, BUT NOT NECESSARILY LIMITED TO, LOSS OF PROFIT, DAMAGES RELATING TO MONIES SAVED OR FEES GENERATED AND OR ANY LOSS OF DATA BY USE OF ANY CA OFFERING, REGARDLESS OF WHETHER A PARTY WAS APPRISED OF THE POTENTIAL FOR SUCH DAMAGES; AND B) IN NO EVENT WILL A PARTY'S LIABILITY, EXCEED THE FEES PAID AND OR OWED TO CA FOR THE THEN CURRENT INITIAL OR RENEWAL TERM FOR WHICH THE ORDERING ACTIVITY HAS PROCURED THE CA OFFERING OR AS FURTHER DEFINED IN THE MODULE. FURTHERMORE, TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, CA SHALL NOT INCUR ANY LIABILITY FOR DEATH OR BODILY INJURY TO ANY THIRD PARTY UNLESS THE SAME ARISES FROM THE INTENTIONAL OR GROSSLY NEGLIGENT ACT(S) OF CA. This clause shall not impair the U.S. Government's right to recover for fraud or crimes arising out of or related to this Agreement under any federal fraud statute, including the False Claims Act, 31 U.S.C. §§ 3729-3733. 10. TERM &TERMINATION 10.1This Foundation Agreement shall continue in effect unless otherwise terminated in accordance with this section or as required pursuant to Federal Acquisition Regulation (FAR) 52.212-4 "Contract Terms and Conditions- Commercial Items" sections (1) "Termination for the Government's Convenience" and (m) "Termination for Cause." 10.2 In the event Ordering Activity elects to terminate an order for its convenience prior to the expiration of the then current term, and such order includes licenses for CA Software, Ordering Activity shall also, within a reasonable period of time, delete all copies of such software from its systems, including copies stored for archival purposes and either destroy or return them to CA. The foregoingshall not apply, however, where such licenses were perpetual and Ordering Activity, at the time of such termination, has paid all associated perpetual license fees. 10.3 Termination does not release either Party from any liability which, at the time of such termination, had already accrued to the other Party or which is attributable to a period prior to such termination, nor preclude either Party from pursuing any rights or remedies it may have under law or in equity with respect to any breach of this Foundation Agreement or the Agreement. 11. DISPUTE RESOLUTION 11.1 Prior to the initiation of formal dispute resolution procedures regarding any dispute, controversy, or claim arising out of the Agreement or interpretation thereof (a "Dispute"), the Parties shall first meet as often, and for such duration and as promptly as the Parties reasonably deem necessary to discuss the Dispute and negotiate in good faith in an effort to resolve it. Version PS 1.0 Page 3 of 38 7/23/201410:36 AM Agreement No. 7434 ca, technologies 11.2 The provisions of paragraph 11.1 will not be construed to prevent a Party from instituting formal proceedings to the extent necessary to avoid the expiration of any applicable limitations period or to pursue equitable rights or injunctive remedies deemed reasonable necessary to protect its interests. 11.3 Disputes relating to the payments of fees, any third party products or services or otherwise relating to the terms and conditions of an order between an Authorized CA Partner and Ordering Activity, shall be between Ordering Activity and such Authorized CA Partner, or if applicable, between Ordering Activity and Prime Contractor, and Ordering Activity agrees that it shall have no right of contribution or other claim from or against CA by reason thereof. 12. GENERAL TERMS 12.1 Amendments. The terms of the Agreement may only be amended by mutual written agreement of the Parties. 12.2 Force Majeure. Except for payment obligations and obligations pertaining to non -disclosure, notwithstanding any contrary provision in the Agreement, neither Party will be liable for any action taken, or any failure to take any action required to be taken, in the event and to the extent that the taking of such action or such failure arises out of causes beyond a Party's control, including, without limitation, war, civil commotion, act of God, strike or other stoppage (whether partial or total) of labor, any law, decree, regulation or order of any government or governmental body (including any court ortribunal). 12.3 Order of Precedence. Any conflict or inconsistency among or between the terms and conditions of the documents comprising the Agreement shall be resolved according to the following order of precedence, in the order of the greatest control to the least: (1) U.S. Federal law, (2) the relevant Module and(3) this Channel Foundation Agreement. Notwithstanding this Order of Precedence, unless expressly required by U.S. Federal law in subcontracts for commercial information technology, neither an Ordering Activity issued purchase order, nor the terms of an order between Ordering Activity and the Authorized CA Partner or Prime Contractor, shall modify the terms of the documents indicated herein. 12.4 Ordering Activity Data. If Ordering Activity transfers any personal data to CA as a requirement pursuant to any CA Offering, then Ordering Activity represents that (i) it is duly authorized to provide personal data to CA and it does so lawfully in compliance with relevant legislation, (ii) CA and any entity within the CA group of companies (each a "CA entity") or its subcontractors can process such data for the purposes of performing its obligations and (iii) CA may disclose such data to any CA entity and its subcontractors for this purpose and may transfer such data to countries outside of the country of origin. CA, Inc. is Safe Harbour certified and the CA Entities have committed to comply with relevant data protection/privacy legislation. 12.5 Import Export. Ordering Activity agrees that CA Offerings, Documentation, and or Confidential Information is subject to export controls of the United States of America and import controls of any other country in which such information may be used. Ordering Activity agrees to export, re-export or import such information only in compliance with such laws and controls. 12.6 Announcements. Neither Party may issue press releases relating to the Agreement without approving the content with the other Party. Either Party may include the name and logo of the other Party in lists of customers or vendors in accordance with the other Party's standard guidelines. 12.7 Counterparts. This Foundation Agreement and any Module, as applicable, may be signed in any number of counterparts by the Parties and each part shall be considered part of the whole and valid, legally binding document. 12.8 Notice. All notices hereunder shall be delivered to the other Party identified in the Agreement either personally, via certified mail, facsimile or overnight courier. If delivered personally, notice shall be deemed effective when delivered; if delivered via facsimile, notice shall be deemed effective upon electronic confirmation; and if delivered via certified mail or overnight courier, notice shall be deemed effective upon confirmation of delivery. 12.9 Headings. The section headings used herein are for information purposes only and shall not affect the interpretation of any provision of this Agreement. 12.10Validity. In the event any term or provision of the Agreement shall be held to be invalid, the same shall not affect in any respect whatsoever the validity of the remainder of the Agreement. 12.11Third Parties. This Agreement shall not create any rights in favor of, or any obligations owed by, any third party unless otherwise expressly defined in any Module. The Parties agree that any action arising from this Agreement shall solely be brought by Ordering Activity, the U.S. Government, or CA, unless otherwise permitted by law. 12.12Choice of Law. To the extent that federal law is not dispositive of a dispute hereunder, the laws of the State of New York (excluding its conflict of laws provisions) shall govern the construction and enforceability of the Agreement. Version PS 1.0 Page 4 of 38 7/23/2014 10:36 AM Agreement No. 7434 ca, tecbnoftips 12.13Survival. Sections pertaining to Confidentiality, Title, Limitation of Liability, Termination, and Import Export shall survive termination of this Foundation Agreement. 12.14Entire Agreement. The Agreement and all documents incorporated by reference therein shall comprise the entire agreement as pertaining to the subject matter thereof and all other prior representations, proposals, and other such information exchanged by the Parties concerning the subject matter is superseded in their entirety by the Agreement. Version P51,0 Page 5 of 38 7/23/2014 10:36 AM Agreement No. 7434 ;W Channel SaaS Module U.S. Public Sector 1. INTRODUCTION 1.1. This Module for Software as a Service ("SaaS Module") specifies terms and conditions which apply to Software as a Service that CA will provide to Ordering Activity. 1.2. This SaaS Module incorporates by reference the terms of the Foundation Agreement. Any capitalized terms used in this SaaS Module shall have the meanings given in the Foundation Agreement unless otherwise provided herein. 2. DEFINITIONS 2.1. "Ordering Activity Data" means information stored in the SaaS database. 2.2. "Force Majeure Event" means an event of Force Majeure as defined in the Foundation Agreement and/or delays caused by an internet service provider or hosting facility that results in data center outages resulting from causes not within CA'scontrol. 2.3. "ISO 27001" means an Information Security Management System standard published by the International Organization for Standardization (ISO). This particular standard specifies a management system that is intended to bring information security under explicit management control and mandates specific requirements when this standard is met. 2.4. "Production" means the "live" environment of SaaS provided to process data on a real-time basis. 2.5. "Production Availability" means, for purposes of measuring the Service Level, the aggregate number of minutes during the month in which the SaaS is available for Production access and use by Ordering Activity. 2.6. "SaaS" means the online version of the CA Software specified in the Authorized CA Partner's order with CA for access to and usage by its customers via a website(s) environment. 2.7. "SAS 70 Type II" means the standards used by an independent auditor that employs procedures, policies and controls of SAS 70 Type I to verify and validate that the organization is following those procedures regarding control objectives, activities and control over information technology, and related processes. 2.8. "SaaS Support" means support of the underlying CA software so it operates materially in accordance with the Documentation. 2.9. "Sandbox" means a development or test environment that is not Production. 2.10. "Scheduled Downtime" means planned downtime of SaaS availability where CA provides notice to Ordering Activity at least 72 hours in advance. 2.11. "Service Level" means as described in the section entitled: Service Level Commitments. 2.12. "Subscription Term" means the period of the Ordering Activity's subscription to the SaaS as specified in the Authorized CA Partner's order with CA. 2.13. "Users" means the number of individuals authorized to access and use of SaaS by Ordering Activity and who have been provided user identifications and passwords by Ordering Activity (or by CA at Ordering Activity's request), measured by CA on an aggregate monthly basis by the amount of User Logins. Users may include Ordering Activity and Affiliate's employees and independent contractors that agree to be bound by terms and conditions no less restrictive than those contained herein and are acting on behalf of Ordering Activity and not a third party. 2.14. "User Logins" means the initial and standard login screen where a User is required to enter its user ID and the password. 3. SAAS OFFERING 3.1. CA shall provide SaaS to Ordering Activity during the Subscription Term directly or through a third party SaaS provider in accordance with the terms of the Agreement. 3.2. CA hereby provides Ordering Activity a non -transferable and non-exclusive right to access and use SaaS for the sole purpose of supporting its internal business use. A new User may replace a former User who no longer requires access to, or use of, the SaaS. Users may be Ordering Activity employees, Ordering Activity third party consultants, contractors or agents, which third parties may Version PS 1.0 Page 6 of 38 7/23/2014 10:36 AM Agreement No. 7434 ca, technologies access and use the SaaS solely for the benefit of Ordering Activity's internal business purposes in accordance with the provisions of this Agreement. 3.3. Ordering Activity acknowledges and agrees that in order for CA to effectively provide SaaS, Ordering Activity may be required to provide necessary information and shall not delay, prevent or interfere with CA's provision of SaaS. 4. FEES & RENEWAL 4.1. Ordering Activity may access SaaS for solely the number and type of Users specified in the Authorized CA Partner's order with CA. Additional Users, or an additional SaaS offering, if available, shall require Ordering Activity to procure with CA or an Authorized CA Partner (whether directly or through a Prime Contractor) for such users or offering. Unless otherwise agreed by CA, (i) additional Users may be purchased only in increments of 50 Users; and (ii) such additional User subscriptions shall be coterminous with the expiration of the Subscription Term. 4.2. CA may with notice prior to any renewal, replace the Ordering Activity ordered SaaS with replacement, underlying software that is generally available to customers with alternative, materially similar, functionality. 4.3. The fees for SaaS subscription are not contingent upon the delivery of any future functionality or features of the CASoftware. S. ORDERING ACTIVITY DATA 5.1. Ordering Activity exclusively owns all rights, title and interest in and to all Ordering Activity Data. Ordering Activity Data shall be considered to be Confidential Information under the Agreement. CA shall not access Ordering Activity's User accounts, or Ordering Activity Data, except (i) in the course of data center business operations if required, (ii) in response to SaaS or technical issues or (iii) at Ordering Activity's specific request as reasonably required in the provision of SaaS. CA will segregate Ordering Activity's Data from other customers' data. 5.2. CA operates and maintains a disaster recovery procedure. In case of a Force Majeure Event, Ordering Activity acknowledges and agrees that Ordering Activity Data may not be recoverable and accepts responsibility for re-entry of such data. 5.3. Ordering Activity Data will be returned to the Ordering Activity at the end of the Subscription Term or at the termination of the SaaS subscription in the manner described in the SaaS Documentation. 6. SECURITY 6.1. CA shall adhere to SAS 70 Type II audit compliance criteria and data security procedures which meet ISO 27001 status during the Subscription Term. 6.2. CA shall comply with CA's security policy and procedures, which policies and procedures are designed to provide and maintain commercially reasonable safeguards against the destruction, loss or alteration of, or unauthorized access to or use of the Ordering Activity Data in CA's possession or control and which safeguards are, at a minimum, no less rigorous than those maintained by CA for its own information of a similar nature. 6.3. Ordering Activity Data shall be stored pursuant to CA's data security procedures, which shall be provided to Ordering Activity upon request. Except as required herein, CA will not be responsible for any unauthorized access to, or alteration, theft or destruction of Ordering Activity Data, unless caused as a result of CA's negligence or intentional misconduct, in which case restoring or recovery of Ordering Activity Data shall be limited to the most recent back-up of Ordering Activity Data. CA is not responsible for loss of Ordering Activity Data arising from Ordering Activity's: (i) transmission of data in contravention of the User Guide; or (ii) failure to act on any CA provided communication. 6.4. CA shall comply with the applicable EU member states' implementation of the Directive 95/46/EC ("Directive") governing the processing of personal data as defined specifically in the Directive and CA, Inc. is Safe Harbour certified. 6.5. Ordering Activity or an independent third party may audit CA's operations within the applicable data center to verify CA's compliance with the security and technical provisions defined in this Module. The audit may take place, no more than once annually, upon thirty (30) days prior written notice subject to Ordering Activity or its independent third party having executed a CA confidentiality agreement and stating the purpose and scope of the request. Such audit shall be conducted during normal business hours in a manner that does not disrupt business operations. 7. INITIATION AND SUPPORT PROCESSES 7.1. The following processes apply to the SaaS: CA will send an email to Ordering Activity's technical contact identified in the Authorized CA Partner's order with CA setting out the SaaS URL(s) and other information necessary for initial use of the SaaS. Ordering Activity shall provide information as requested within 7 days of receiving the email. Version PS 1.0 Page 7 of 38 7/23/2014 10:36 AM Agreement No. 7434 catechnallogie,s ii. Customer will utilize the CA Support website, or other site or notification mechanism as CA may designate from time to time, to notify CA of SaaS availability issues, request other in -scope technical support assistance, or for Customer's to provide feedback or approvals on requests as applicable. 8. SAAS SUPPORT 8.1. The Ordering Activity shall be provided with SaaS Support during the Subscription Term. 8.2. For any SaaS Support requests, Ordering Activity should be prepared to provide to SaaS Support personnel, all pertinent information, in English, including but not limited to, Ordering Activity number or site identification number, incident severity, SaaS/software name, area of SaaS (Production or Sandbox), incident description, and a technical contact familiar with Ordering Activity's environment or the problem to be solved. Ordering Activity must use reasonable efforts to communicate with CA in order to verify the existence of the problem and provide information about the conditions under which the problem could beduplicated. 8.3. Upon receiving Ordering Activity's technical contact information, SaaS Support will be provided in a timely and professional manner by qualified support engineers as defined below: i. Access to CA help desk and the ability to open and manage support incidents via CA support online or bytelephone. ii. Production environment support: 24x7 for severity 1 incidents; normal business hours for severities 2-4. iii. Sandbox environment support: Normal business hours for incidents of all severities. iv. Access to CA support website (currently: http://support.ca.com) for 24x7x365 online support and access to CA software product and documentation, global user communities and regional user groups, FAQs, samples, webcast recordings and demos, usage tips, technical updates and HYPER notifications, as such are made available by CA. V. Interactive remote diagnostic support allowing CA support engineers to troubleshoot an incident securely through a real-time browser -based remote control feature. vi. Additional support such as file storage, point in time backup, periodic file refresh and basic reporting may be available at CA's discretion according to the SaaS provided. Any additional support requirements are only by prior written agreement with CA. 8.4. In order to respond to an issue raised through SaaS Support, CA may request Ordering Activity to upgrade to appropriate operating systems and or third party applications as required in order to properly operate and access the SaaS offering. Any such upgrades or installations shall be at the Ordering Activity's sole option and discretion. The costs associated with any upgrades required and any such installations are not included as SaaS Support and all such costs shall be the responsibility of the OrderingActivity. 9. ORDERING ACTIVITY RESPONSIBILITIES 9.1. Ordering Activity is responsible for all activities that occur in, or are related to, User accounts including the data, information stored or transmitted when accessing SaaS. 9.2. Because Ordering Activity may integrate or utilize third party links to other software, hardware or other service which are associated with, or otherwise available through SaaS, Ordering Activity agrees that it and its Users shall use such third party links in their sole discretion. CA shall have no responsibility or liability with respect to such third party links used by Ordering Activity's or Users' or for any act or omission of any such third party provider. 9.3. Ordering Activity shall not: (i) make SaaS available to any third party not authorized, other than to Users or as otherwise contemplated by this Agreement; (ii) send or store code that can harm or result in damage to the SaaS offering (including but not limited to malicious code and malware); (iii) wilfully interfere with or disrupt the integrity of SaaS or the data contained therein; (iv) attempt to gain unauthorized access to the SaaS or its related system or networks; (v) use SaaS to provide services to external end users and or to process data other than Ordering Activity's as an outsourcer, service bureau or consultant without written permission provided by CA. 10. WARRANTY 10.1. CA warrants that (i) SaaS shall perform materially in accordance with the applicable SaaS Documentation and (ii) that SaaS will be available online according to the performance levels described in the Service Levels defined in this SaaS Module. 10.2. EXCEPT AS EXPRESSLY SET FORTH ABOVE, TO THE EXTENT PERMITTED BY LAW, NO OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THIRD PARTY WARRANTIES, IMPLIED WARRANTIES OF MERCHANTABILITY, SUITABILITY OR SATISFACTORY QUALITY, OR THE WARRANTY OF FITNESS FOR A PARTICULAR PURPOSE ARE MADE BY CA AND CA MAKES NO WARRANTIES HEREUNDER WITH RESPECT TO ANY HARDWARE EQUIPMENT OR THIRD PARTY SOFTWARE WHICH CA MAY USE TO PROVIDE THE SAAS. Version PS 1.0 Page 8 of 38 7/23/2014 10:36 AM Agreement No. 7434 ca, techrirtlo ies 10.3. Ordering Activity warrants that (i) it has the right to transmit any data or information as may be required for the purposes of accessing SaaS (ii) it will ensure compliance to the Agreement by itself and its Users and (iii) it is responsible for all activities that occur in User accounts, (iv) it shall not misuse SaaS through sending spam or otherwise duplicative or unsolicited messages or store infringing, obscene, threatening, or otherwise unlawful material that is harmful to children or violates third party privacy rights. 11. WARRANTY REMEDY 11.1. In the event of a breach of the Warranty by CA, CA may in consultation with Ordering Activity (i) use reasonable efforts consistent with industry standards to cure the defect as defined in CA Support process outlined in this SaaS Module and or (ii) Ordering Activity may exercise its rights to termination as defined under the Service Level Commitment section below and qualify for a refund as defined therein and or (iii) mutually agree with Ordering Activity to terminate the subscription and provide a pro-rata refund to the Authorized CA Partner calculated on the number of months left remaining on the Subscription Term. Warranty remedies are conditioned upon (i) any error or defect complained of is reasonably reproducible by CA, (ii) the breach is not attributable in whole or in part to any non -CA product(s) or service(s). 12. SERVICE LEVEL COMM ITTMENT 12.1. Service Levels: The following Service Levels will apply to the applicable SaaS offering during the applicable Subscription Term: i. Production Availability of SaaS 99.5% on a monthly basis. If Production Availability falls below 99%, it shall be considered a minor failure; and if Production Availability falls below 98%, it shall be considered a major failure. 12.2. Ordering Activity will be provided monthly electronic reports regarding Service Levels and follow the procedure set out below: i. CA will investigate missed Service Levels through determining the root cause of the issue then using commercially reasonable efforts to correct the issue and advising Ordering Activity as reasonably requested by Ordering Activity of the status of efforts being undertaken with respect to the issue; ii. Provide Ordering Activity reasonable evidence to Ordering Activity that the cause of the issue is being corrected or will be corrected and iii. In the event of a minor failure, Ordering Activity is entitled to 2 additional days of the applicable SaaS offering at no additional charge. In the event of a major failure, Ordering Activity is entitled to 5 additional days of the applicable SaaS offering at no additional charge. 12.3. Pursuant to FAR 52.212-4(1), Ordering Activity may terminate for convenience its subscription to SaaS without incurring any additional charges or termination fees. In the event of such termination for convenience CA shall refund to the CA Authorized Partner that portion of the fees paid which have not yet been applied towards SaaS as of the effective date of termination. Any such refund herein shall be Ordering Activity's sole and exclusive remedy under this SaaS Module with respect to CA only and CA shall have no further liability arising out of the applicable SaaS subscription, and shall not impact termination of any other Module or the Foundation Agreement. This section does not limit the rights or remedies of the Ordering Activity under FAR 52.212-4(m), Termination for cause.The following events shall be excluded from the calculation of any Service Level failures: (i) Force Majeure Event; (ii) outages due to Scheduled Downtime such as upgrading data center infrastructure; (iii) outages based on Ordering Activity networks or domain name server issues; (iv) Ordering Activity's configuration, scripting, coding; (v) internet outages; (vi) Ordering Activity outages requested by Ordering Activity (vii) Ordering Activity changes to its environment which hinder SaaS production and (viii) inability for Ordering Activity to log in due to use of Lightweight Directory Access Protocol (LDAP) to control authentication. 13. NIMSOFT SaaS 13.1. The following sections of this Module are not applicable to Nimsoft Saastransactions: i. 2.2; ii. 2.3; iii. 2.7; iv. 5.2; V. 6.1; vi. 6.5 and vii. 12.2; 13.2. The following sections of this Module are modified or added as follows for Nimsoft SaaS (On -Demand) transactions to the extent consistent with U.S. Federal law: Version PS 1.0 Page 9 of 38 7/23/201410:36 AM Agreement No. 7434 Ca technologies i. Section 7.1 ii: "Ordering Activity will utilize the Nimsoft CA Support website, or other site or notification mechanism as CA may designate from time to time, to notify CA of SaaS availability issues, request other in -scope technical support assistance, or for Ordering Activity to provide feedback or approvals on requests as applicable." ii. Section 8.1: "The Ordering Activity shall be provided with SaaS Support pursuant of the terms of fatty;'www,nlmsoft.comfcontent/d!arnLn-imsoftJdocucrrents un-secure/aereernents ninI5oft-LrS-sq ort-a reemen - d( during the Subscription term." iii. Section 10.1: "CA warrants that (i) SaaS shall perform materially in accordance with the applicable SaaS Documentation for a period of 60 days from the commencement of the Term and (ii) that SaaS will be available online according to the performance levels described in the Service Levels defined in this SaaS Module. iv. Add the following as Section 15: "15. REPORTING AND AUDIT Reports. Ordering Activity agrees to prepare and submit monthly reports to the Authorized CA Partner and CA that shall include, without limitation, information detailing the use of SaaS pursuant to the license metrics applicable to SaaS ("Report"). Ordering Activity shall submit each Report to the Authorized CA Partner and CA on the fifteenth day of each calendar month. Overage. If the Report shows the Ordering Activity has exceeded the Authorized Use Limitation at any time during a month, such Report shall constitute a basis for a claim to the relevant Contracting Officer pursuant to the Contract Disputes Act and FAR 52.233-1. In no event may the SaaS quantity be lowered below the original numberordered. 14. GENERAL TERMS. 14.1. Any conflict or inconsistency among or between the terms and conditions of the documents comprising the Agreement shall be resolved according to the following order of precedence, in the order of the greatest control to the least: (1) U.S. Federal law, (2) this Channel SaaS Module and (3) the Channel Foundation Agreement. Notwithstanding the foregoing, unless expressly required by U.S. Federal law in subcontracts for commercial information technology, neither an Ordering Activity issued purchase order, nor the terms of an order between Ordering Activity and the Authorized CA Partner or Prime Contractor, shall modify the terms of the documents indicated herein. Version PS LO Page 10 of 38 7/23/201410:36 AM Agreement No. 7434 N Channel Hardware Appliance Module U.S. Public Sector 1. INTRODUCTION 1.1. This Module for the Hardware Appliance ("Hardware Appliance Module") specifies terms and conditions which apply to the Hardware Appliance which CA will provide to Ordering Activity. 1.2. This Hardware Appliance Module incorporates by reference the terms of the Foundation Agreement. Any capitalized terms used in this Hardware Appliance Module shall have the meanings given in the Foundation Agreement unless otherwise provided herein. 2. DEFINITIONS 2.1. "Hardware" means a single CA -supplied third party physical server or device. 2.2. "Hardware Appliance" means Hardware that is bundled with and operates the CA Software licensed by Ordering Activity and pre - installed on the Hardware. 3. APPLIANCE OFFERING 3.1. CA shall provide the Hardware Appliance specified in the Authorized CA Partner's order with CA. 3.2. The terms for license and support for the underlying CA Software is covered separately under the Software Module. 4. FEES 4.1. Ordering Activity may order Hardware Appliance with, and pay the associated fees and other charges to an Authorized CA Partner or Prime Contractor. CA will deliver to Ordering Activity the Hardware Appliance specified in the Authorized CA Partner's order with CA. 4.2. Upon CA's receipt of payment from the Authorized CA Partner, Ordering Activity will own the Hardware free of any liens or encumbrances. S. WARRANTY 5.1. Upon the purchase of a Hardware Appliance, CA will pass through to the Ordering Activity the applicable Hardware warranty. Such warranty will be provided for a period of twelve (12) months or more depending on the type of Hardware Appliance purchased. A copy of the applicable third party support warranty coverage is available under the "Get Support" section of CA's Support website located at https:Hsupport.ca.com. 6. WARRANTY REMEDY 6.1. To address a warranty issue on the Hardware, CA will provide Ordering Activity telephone assistance to access the third party Hardware support to address support issues with the Hardware. 6.2. Except for procuring third party warranty coverage for the Hardware as described above, the Hardware is provided on an "AS IS" basis and CA makes no warranties, and disclaims any and all express or implied warranties (including but not limited to warranties of merchantability or satisfactory quality or fitness for a particular purpose), with respect to the Hardware. None of the warranties specified in the Foundation Agreement or any other agreement shall apply to the Hardware. 7. ORDERING ACTIVITY REQUIREMENTS 7.1. Ordering Activity is solely responsible for use of the Hardware, including assuring proper supported environment configuration, CA software installation, and operating methods in accordance with the Hardware specifications and Documentation. 7.2. CA will not support modifications to the Hardware nor will it support the Hardware if Ordering Activity fails to comply with the terms of the Agreement to the extent such failure causes the Hardware's failure to perform in substantial accordance with the applicable Hardware documentation. 7.3. CA shall have no obligation to replace the Hardware, or provide additional hardware, in cases where future Versions or Releases (as such terms are defined in the Software Module) of the CA Software require an upgrade of or addition to such Hardware. B. GENERAL TERMS 8.1. Any conflict or inconsistency among or between the terms and conditions of the documents comprising the Agreement shall be resolved according to the following order of precedence, in the order of the greatest control to the least: (1) U.S. Federal law, (2) this Channel Hardware Appliance Module and (3) the Channel Foundation Agreement. Notwithstanding the foregoing, unless expressly required by U.S. Federal law in subcontracts for commercial information technology, neither an Ordering Activity issued purchase Version PS 1.0 Page 11 of 38 7/23/2014 10:36 AM Agreement No. 7434 ca, technofties order, nor the terms of an order between Ordering Activity and the Authorized CA Partner or Prime Contractor, shall modify the terms of the documents indicated herein. Version Ps 1.0 Page 12 of 38 7/23/2014 10:36 AM Agreement No. 7434 Channel Education Module U.S. Public Sector 1. INTRODUCTION 1.1. This Module for Education ("Education Module") specifies terms and conditions which apply to Education that CA will provide to Ordering Activity. 1.2. This Education Module incorporates by reference the terms of the Foundation Agreement. Any capitalized terms used in this Education Module shall have the meanings given in the Foundation Agreement unless otherwise provided herein. 2. DEFINITIONS 2.1. "Attendees" mean the participants authorized by Ordering Activity to attend or participate in the Education offerings as indicated in the Transaction Document. 2.2. "Course Materials" means any Education content provided to Ordering Activity in any media form pursuant to a Transaction Document, including without limitation, all publications, courseware, training manuals and materials, user guides, web portals, or virtual labs provided by CA or a CA subcontractor. 2.3. "Education" means any standard or customized education offerings, training or instruction, or related services, provided by CA or a CA subcontractor in any format or location, including without limitation, (i) instructor led training, including at CA or Ordering Activity site(s), (ii) virtual training, including online classes, courses, or course catalogues and/or (iii) class room training or testing, at a CA or third party training facility. 3. EDUCATION OFFERING 3.1. CA shall provide the Education as specified in the Authorized CA Partner's order with CA. 3.2. CA may require the registration or pre -registration of Attendees in order to attend or access the applicable Education. Ordering Activity acknowledges that CA reserves the right to refuse entry or access to any individual that cannot authenticate their registration or authorization for such Education. 4. FEES AND CANCELLATION 4.1. The Parties acknowlede and agree that all terms governing the fees, payments, payment schedules, pricing and discounts for the applicable CA Offering procured by Ordering Activity under this Agreement are and shall be between solely Ordering Activity and their chosen Authorized CA Partner or Prime Contractor. 4.2. If CA cancels a class due to unforeseen circumstances, or low enrollment, CA will provide as much advance notice as possible but no less than ten (10) business days prior to the class in which case Ordering Activity may reschedule the class to an alternative time. 4.3. Cancellation in writing by Ordering Activity must be provided at least ten (10) business days prior to the class. If such notice is not given CA may charge Authorized CA Partner up to 100% of the fees for the class. If fees are pre -paid, no refund will be provided to the Authorized CA Partner 4.4. Neither party shall be liable for any travel related fees or expenses incurred by the other party in relation to Education which such party has properly cancelled in compliance with this section. S. INTELLECTUAL PROPERTY RIGHTS 5.1. CA grants to Ordering Activity, a non-exclusive, non -transferable license to use the Course Materials for the internal use of the Ordering Activity, but limited to the specific Attendees and subject to terms of the Agreement. Ordering Activity shall be responsible for all use of the Education and Course Materials by its Attendees. 6. WARRANTY 6.1. If CA provides an instructor, the delivery of the Course Offering shall be provided in a professional, workman -like manner. 6.2. EXCEPT AS SET FORTH IN THIS SECTION, NO OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THIRD PARTY WARRANTIES, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR SUITABILITY AND/OR THE WARRANTY OF FITNESS FOR A PARTICULAR PURPOSE ARE MADE BY CA. 7. WARRANTY REMEDY Version PS 1.0 Page 13 of 38 7/23/2014 10:36 AM Agreement No. 7434 ca, technologies 7.1. In the event of a breach of the Warranty section, Ordering Activity's remedy shall be, at CA's discretion and in consultation with Ordering Activity, to re -perform the Education at no additional charge to the Ordering Activity. These remedies are contingent upon the alleged breach not resulting from Ordering Activity's failure to abide by its obligations or to conform to the Course Materials. 8. GENERALTERMS Any conflict or inconsistency among or between the terms and conditions of the documents comprising the Agreement shall be resolved according to the following order of precedence, in the order of the greatest control to the least: (1) U.S. Federal law, (2) this Channel Education Module and (3) the Channel Foundation Agreement. Notwithstanding the foregoing, unless expressly required by U.S. Federal law in subcontracts for commercial information technology, neither an Ordering Activity issued purchase order, nor the terms of an order between Ordering Activity and the Authorized CA Partner or Prime Contractor, shall modify the terms of the documents indicated herein. Version PS 1.0 Page 14 of 38 7/231201410:36 AM Agreement No. 7434 Channel Software Module U.S. Public Sector 1. INTRODUCTION 1.1. This Module for CA Software ("Software Module") specifies terms and conditions which apply to CA Software that CA will license to Ordering Activity and the Support that applies. 1.2. This Software Module incorporates by reference the terms of the Foundation Agreement. Any capitalized terms used in this Software Module shall have the meanings given in the Foundation Agreement unless otherwise provided herein. 2. DEFINITION 2.1. "Access" means use of CA Software remotely by an Authorized End User. 2.2. "Authorized End Users" means Ordering Activity as well as its employees and support contractors (but excluding any outsourcer, facilities management providers, managed service provider, or application service provider) that are bound by terms and conditions no less restrictive than those contained herein and are acting on behalf of Ordering Activity and not a third party. 2.3. "Authorized Use Limitation" means the quantity of the CA Software authorized by CA in accordance with the License Metric specified in the order between CA and the Authorized CA Partner. 2.4. "CA Software" means the computer software programs, either provided individually or packaged as a software appliance, made generally available and licensed to a Ordering Activity under this Module, including all Versions, Releases, provided as part of Support if applicable. 2.5. "Distributed" means the CA Software designated as distributed that is generally used for indepedent usage across individuals systems or hardware based on the Licensed Metric in a decentralized form of computing. 2.6. "Mainframe" means CA Software designated as mainframe that is generally used for a large capacity processor that provides links to users through less powerful devices such as workstations or terminals based on the Licensed Metric in a centralized form of computing. 2.7. "Maintenance" means the provision of new Releases made available while on active Support or new Versions if applicable to the generally available CA Software licensed by Ordering Activity. 2.8. "Perpetual License" means a license to use CA Software for an indefinite period subject to compliance with theAgreement 2.9. "Release" means a general available release of a CA software product, which may contain minor new software product functionality, code, or compatibility and incorporates all previous fixes (if any exist) since the last Version. Typically, a Release requires a new installation, rather than an overlay to the already installed software. Unless otherwise specified by CA for a particular product, a Release is tied to the preceding Version and is typically designated by a number to the right of the decimal point such as 1.1, 1.2, 1.3, etc. 2.10. "Subscription" or "UMF" (Usage and Maintenance Fee) license means a license to use CA Software for a specific period of timewhich shall include Support unless otherwise specified by CA in its order with the Authorized CA Partner. 2.11. "Support" means the provision of technical support and Maintenance provided for a particular CA Software as specified in the Authorized CA Partner's order with CA. 2.12. "Territory" is the location where Ordering Activity is authorized to install the CA Software as specified in the Authorized CA Partner's order with CA or the Prime Contractor. 2.13. "Version" means a release of a CA Software Product that contains major changes in software product functionality, code, or compatibility and incorporates the previous release (if one has occurred), fixes and service Packs (if they have occurred). Typically, a Version requires a new installation, rather than an overlay to the already installed software. Unless otherwise specified by CA for a particular product, a Version is designated by the number to the left of the decimal point such as 1.0, 2.0, 3.0, etc. 3. SOFTWARE OFFERING & OBLIGATIONS 3.1. CA grants the Ordering Activity a limited, non-exclusive, non -transferable license, for the Term: 3.1.1. install and deploy the CA Software in the Territory up to the Authorised Use Limitation. 3.1.2. permit its Authorized End Users Access to the CA Software for Ordering Activity's and Affiliates' internal business wherever located. Ordering Activity hereby expressly agrees that a breach by an Authorized End User of the Agreement shall be considered to be a breach by and the responsibility of the Ordering Activity. Version PS 1.0 Page 15 of 38 7/23/201410:36 AM Agreement No. 7434 ca, technWogie 3.1.3. make a reasonable number of copies of the CA Software for disaster recovery "cold standby", backup and archival purposes. Use of such copies is limited to testing Ordering Activity's disaster recovery procedures and effectiveness and as is necessary during any reasonable period subsequent to the occurrence of an actual disaster during which Ordering Activity cannot operate the CA Software. 3.1.4. relocate CA Software to a new Ordering Activity location within the Territory upon prior written notice. 3.2. The specifications and specified operating environment information of the CA Software may be found in the Documentation accompanying the CA Software, if available (e.g., a user manual, user guide, or readme.txt or notice.txtfile). 3.3. Upon request by CA, Ordering Activity agrees to provide records reasonably requested by CA to verify its compliance with the Authorized Use Limitation during the period in which Ordering Activity is licensed to use the CA Software and for a period of twelve (12) months after expiration including certified copies of statements or records as applicable. Such reports will be based on the License Metric for the CA Software ordered for Customer by CA. 3.4. The grant of license is contingent upon Ordering Activity's compliance with the following obligations set out under this provision: Ordering Activity agrees, that it shall not: (i) access or use any portion of the CA Software not expressly authorized by CA or the Documentation of the CA Software; (ii) cause or permit de -compilation, reverse engineering, or otherwise translate all or any portion of the CA Software; (iii) modify, unbundle, or create derivative works of the CA Software and/or Documentation; (iv) rent, sell, lease, assign, transfer or sublicense the CA Software or use the CA Software to provide hosting, service bureau, on demand or outsourcing services for the benefit of a third party; (v) remove any proprietary notices, labels, or marks on or in any copy of the CA Software or Documentation; (vi) use the CA Software beyond the Authorized Use Limitation. 3.5. CA reserves the right, on reasonable notice to the Ordering Activity and subject to any security measures the Ordering Activity deems appropriate, to conduct an audit remotely or onsite of Ordering Activity and/or its Affiliates facilities to verify Ordering Activity's compliance with the terms of the Agreement. CA agrees that such audit shall be conducted during regular business hours at Ordering Activity's offices and CA shall endeavor to conduct such audit so as not to interfere unreasonably with Ordering Activity's activities and/or use an independent third party to conduct the audit subject to terms of non -disclosure if required. 3.6. All rights not specifically granted hereunder are expressly reserved. 4. SUPPORT OFFERING 4.1. If Support is purchased by Ordering Activity, CA will provide Ordering Activity with technical support for the CA Software, according to the Support specified in the Authorized CA Partner's order with CA, to operate according to the Documentation, help desk support and Maintenance for the CA Software based on Support guidelines as described on }tt R., www,su t .a;a c rrtu. 4.2. In order to initiate an issue, Ordering Activity will provide CA sufficient information so that CA can provide assistance to Ordering Activity in a timely manner. 4.3. CA will provide a minimum of twelve months prior written notice to Ordering Activity if CA ceases to provide new Versions or Releases for a CA Software product. 4.4. CA will renew Support for Ordering Activity's use of the CA Software upon its acceptance of an order with an Authorized CA Partner for such Support. S. THIRDPARTYTERMS The CA Software may contain third -party software components. Ordering Activities are advised to review any additional terms, notices, and/or information applicable to third -party software components, which are available at LttM1LsuRportc .com arodinfo t terms. 6. PERFORMANCE WARRANTY 6.1. For Distributed Software. CA warrants that the CA Software will operate materially in accordance with the applicable specifications set forth within the Documentation for a period of ninety (90) days after delivery of the CA Software to Ordering Activity subject to Ordering Activity's compliance with the Agreement. 6.2. For Mainframe Software. CA warrants that the Mainframe Software will operate materially in accordance with the applicable specifications set forth within the Documentation for the Term, subject to Ordering Activity's compliance with the Agreement. 7. PERFORMANCE WARRANTY REMEDY 7.1. If CA has breached either warranty set forth in the section entitled: Performance Warranty, Ordering Activity's remedy is for CA to, in consultation with Ordering Activity, to either (i) use reasonable efforts consistent with industry standards to cure the defect, or (ii) replace the CA Software(s) with one that materially complies with the Documentation, or (iii) mutually agree to terminate the license Version PS 1.0 Page 16 of 38 7/23/2014 10:36 AM Agreement No. 7434 Ca technologies and provide a pro-rata refund to the Authorized CA Partner of the license fees paid and or Support fees. If option (iii) applies, the pro- rata refund shall be calculated on the number of months left remaining on the Term of the applicable Transaction Document or if the CA Software is licensed under a Perpetual License, using (only for purposes of a refund calculation) an amortization schedule of three (3) years. 7.2. Warranty remedies are conditioned upon (i) any error or defect complained of is reasonably reproducible by CA, (ii) the CA Software is not modified and is being used in accordance with CA Documentation, and (iii) the breach is not attributable in whole or in part to any non -CA product(s) or service(s). 7.3. THE ABOVE WARRANTIES ARE THE SOLE WARRANTIES PROVIDED BY CA. NO OTHER WARRANTIES, INCLUDING THAT THE CA SOFTWARE IS ERROR FREE, WHETHER EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, NONINFRINGEMENT, OR SUITABILITY AND/OR THE WARRANTY OF FITNESS FOR A PARTICULAR PURPOSE ARE MADE BY CA. 8. ACCEPTANCE 8.1 All CA Software is deemed accepted upon issuance of an order to CA from CA Authorized Partner, 9. VIRTUALIZATION When CA Software is used on multiple machines (physical and "virtual"), each such use of the CA Software shall be counted for the purposes of determining the Authorized Use Limitation for that CA Software. A "virtual" PC or server environment is created where Virtual Machine Technology (which applies to both client and server hardware) is used to enable multiple instances of an operating system(s) to run on a single computer simultaneously. 10. NEW PRODUCT LANGUAGE AND DISTRIBUTED CA SOFTWARE EXCLUSION 10.1 In addition to and separate from unspecified upgrades and enhancements to be provided as maintenance under the initial Term specified in the order with Authorized CA Partner (together with any extension(s) or renewal(s) thereof, the "Term" for purposes of this section), in the event CA develops a new release of a mainframe CA Software that it designates and makes generally available as a new product (typically containing new functions in addition to or different from existing functionality (a "New Product"), then upon CA's receipt of Ordering Activity's written request and without additional charge, such currently unspecified mainframe New Product shall be made available for use by the Ordering Activity during the Term, on the same basis as applies to such mainframe CA Software, even if CA then determines to charge a separate license fee for the mainframe New Product to CA's other licensees. 10.2 Such rights shall not extend to any Hardware provided under this Agreement. Notwithstanding anything to the contrary in the Agreement by and between the parties hereto (i) the Distributed CA Software herein shall not be construed as a "New Product" for the purposes of any prior agreement between the parties; and (ii) the provisions of any "New Product" provision in any prior agreement shall not apply tothe distributed CA Software herein or any subsequent license for CASoftware. 11. NIMSOFT ON PREMISE 11.1. The following terms are modified or added for all Nimsoft transactions to the extent consistent with U.S. Federal law: 11.1.1.Section 2.4: "Nimsoft Software" means the computer software programs, made generally available and licensed to a Ordering Activity under this Module, including all Versions, Releases, provided as part of Support if applicable." 11.1.2.Section 4.1: "If Support is purchased by Ordering Activity, CA will provide Ordering Activity with technical support for the Nimsoft Software, according to the Support specified in the Authorized CA Partner's order with CA, to operate according tothe Documentation, help desk support and Maintenance for the Nimsoft Software pursuant to the following: htt ,/P + wv ,nwrtusoi'6' a omn�cor �er:k dawn nimnsofi docijm nta un-seei�re a reementx n6ramso�'tmmuy-sus�taart ��PCec�raa�nt. ref." 11.1.3.Add as Section 15: "15. REPORTS. Ordering Activity agrees to prepare and submit monthly reports to the CA Authorized Reseller and CA that shall include, without limitation, information detailing the use of the Nimsoft Software pursuant to the license metrics applicable to the Software ("Report"). Ordering Activity shall submit each Report to CA Authorized Reseller and CA on the fifteenth day of each calendar month." 11.1.4.Add as Section 16: "16. OVERAGE. If the Report shows the Ordering Activity has exceeded the Authorized Use Limitation at any time during a month, such Report shall constitute the basis for a claim to the relevant Contracting Officer pursuant to the Contract Disputes Act and FAR 52.233-1. In no event may the Perpetual License or Subscription License quantity be lowered below the original number ordered." 12. GENERAL TERMS 12.1. Any conflict or inconsistency among or between the terms and conditions of the documents comprising the Agreement shall be resolved according to the following order of precedence, in the order of the greatest control to the least: (1) U.S. Federal law, (2) this Version PS 1,0 Page 17 of 38 7/23/201410:36 AM Agreement No. 7434 CR s Channel Software Module and (3) the Channel Foundation Agreement. Notwithstanding the foregoing, unless expressly required by U.S. Federal law in subcontracts for commercial information technology, neither an Ordering Activity issued purchase order, nor the terms of an order between Ordering Activity and the Authorized CA Partner or Prime Contractor, shall modify the terms of the documents indicated herein. Version P51.0 Page 18 of 38 7/23/201410:36 AM Agreement No. 7434 Attachment A to Channel Software Module Definitions and License Metrics APPLICABILITY The following definitions and License Metrics shall apply to the CA Software licensed by Ordering Activity to the extent such terms and/or CA Software are included in Ordering Activity's agreement with Authorized CA Partner or Prime Contractor: Arcot "Tier Servers" means single server of any tier up to and including Tier 9 Server. "Server" shall designate a specialized computer or a serial of processors assigned to store and to distribute information to and from Customer's personal computer (workstations). Linked to a company network, it enables a shared access to the files and a printing service support. "User" means a single person listed in any Customer directory or network storage location whose access and use rights can be authenticated, authorized, or administered by the CA Software. Unless otherwise specified, a User shall not be counted more than once or on a concurrent basis. CA Access Control Premium Edition "Managed Device" means a virtual or physical machine to which the CA Software controls access CA Access Control Privileged User Password Management(PUPM) "Managed Device" means a virtual or physical system or application whose privileged account passwords are being managed by the CA Software, including but not limited to operating system instances, databases, applications, Command Line Interface Software Development Kits, Open Database Connectivity/Java Database Connectivity applications, Windows services and managed tasks, and managed configuration files. When CA Software is used (i) in connection with a Managed Device or (ii) in connection with a virtual or physical system or application that leverages or interoperates with a Managed Device (a "Password Consumer System or Application"), each such use of the CA Software shall be counted for the purposes of determining the Authorized Use Limitation. CA Automation Suite for Data Centers A "Physical Socket" means an electrical component attached to a printed circuit board ("PCB") and electrically interconnects acentral processing unit ("CPU") and PCB. A CPU is the specialized integrated circuit that executes binary programs and performs most logical functions or calculations. One physical CPU may have up to twelve (12) processing cores. CA Configuration Automation program is included in the delivery of CA Automation Suite for Data Centers for use in server environments managed under CA Automation Suite for Data Centers license. Use of this program with server environments not managed by CA Automation Suite for Data Centers requires a separate license for additional fees. Systems Performance for Infrastructure Manager (SystemEDGE) and Virtual Assurance for Infrastructure Manager AIMS components are included in the delivery of the CA Automation Suite for Data Centers for use only with this product. Use of these components with other CA products requires a separate license for additional fees.CA IT Client Management solution consists of CA Software Delivery, CAAsset Management, CA Remote Control programs and is included in the delivery of the CA Automation Suite for Data Centers. Customer may only use these components to manage server class machines, including virtual machines. Use of these programs for managing desktops, laptops and other client devices requires separate licenses for additional fees.CA Asset Intelligence and CA Patch Manager programs are included in the delivery of the CA Automation Suite for Data Centers. Customer may only use these components to manage server class machines, including virtual machines. Use of these programs for managing desktops, laptops and other client devices requires separate licenses for additional fees.CA Process Automation program is included in the delivery of CA Automation Suite for Data Centers. CA Process Automation includes two Orchestrators, all non -Premium Connectors, unlimited Agents and 75 Concurrent Processes per Orchestrator. Additional Orchestrators and Premium Connectors are available as an add -on option at additional cost. "Agent" means a single installation of the agent software component of the CA Process Automation program on a specific operating system which can be identified as unique host identification on a physical or virtual hardware server. "Orchestrator" means a single installation of the Orchestrator software component of the CA Process Automation program on a specific operating system which can be identified as unique host identification on a physical or virtual hardware server. This installation can be a stand-alone Orchestrator or as a node of a new or existing clustered Orchestrator. "Connector" is the software program connecting the CA Process Automation program with specific named third party software or other CA software. For example, CA Process Automation Connector For CA Service Desk connects CA Process Automation with CA Service Desk. Each Connector may only be usedto connect the CA Software with the specific named third party software or CA software program. "Premium Connector" means a Connector identified by CA in the Order Form. "Process instance" means a single copy of a Process definition that has been scheduled to run (Queued state), is running (Running state), or has completed running (Failed or Completed state) on a particular "Orchestrator". Version PS 1.0 Page 19 of 38 7/23/2014 10:36 AM Agreement No. 7434 (3, techinaijogies "Concurrent Processes" means the number of CA Process Automation Process instances that are marked in the Running state within an Orchestrator at any given time. CA AutoSys Workload Automation "Instance" means the number of copies of CA AutoSys Workload Automation installed in your physical and/or virtual environment. CA Clarity Project & Portfolio Manager "CA Software" means the CA Clarity Project and Portfolio Manager (also known as CA Clarity PPM). CA Clarity PPM is licensed by Environment and the number of Users (Manager, Team Member or Viewer). Customer is granted the right to install and use CA Clarity PPM in not more than three (3) Environments, of which only one (1) may be a production Environment. An "Environment" can consist of any or all of the following, provided that all of the servers in the Environment function as one logical Environment: one or more application servers, search servers, report servers, background servers, and/or database servers. Typical examples of Environments include production Environments, development Environments and test Environments. A production Environment is a computer system used to process an organization's daily work on a real- time operation, not systems used only for development and testing. "Manager User" means Customer's designated users who have full use of and access to the functions within CA Clarity PPM. "Team Member User" means Customer's designated users who have limited rights to the functions within CA Clarity PPM, and may only (i) view data and run reports in all licensed products; (ii) collaboratively participate in processes, discussions and document sharing and receive notifications in all licensed products; (iii) view project tasks and calendars, and report and approve time and project status; and (iv) enter and view status of ideas. "View Only User" means Customer's designated users who have limited rights to the functions within CA Clarity PPM and may only (i) view data and run reports; (ii) originate idea workflows, and participate in the continuation of those workflows. CA Client Automation A "Managed System" is any physical or virtual computer system that can host an operating system, including, but not limited to, a desktop computer or laptop computer, used by an end -user as part of their job function to access data, applications and resources, that is administered or managed by CA Client Automation by way of a management infrastructure, whether a CA management agent resides on the system or not. This includes laptops, desktops and virtual desktops running Windows, Macintosh and Linux operating systems, and it excludes Windows Servers, Linux Servers and UNIX systems. The management infrastructure components, such as Domain Manager, Scalability Server, and System Engine, that run on server platforms do not require a separate license, except if these systems themselves are being managed by an active agent for purposes other than serving as the CA Client Automation management infrastructure. CA Client Automation consists of: CA IT Client Manager CA Patch Manager CA Desktop Migration Manager CA Asset Intelligence CA Workflow for CA IT Client Manager (it is included in the delivery of CA Client Automation for use only for automating workflows inside CA Client Automation and between CA Client Automation and other software programs) CA Configuration Automation: The CA Software is licensed by the number of Physical Sockets. A "Physical Socket" means an electrical component attached to a printed circuit board ("PCB") and electrically interconnects a central processing unit ("CPU") and PCB. A CPU is the specialized integrated circuit that executes binary programs and performs most logical functions or calculations. One physical CPU may have up to twelve (12) processing cores. CA Database Performance CA Database Performance is licensed by the number of CPUs when used as a distributed product. "CPU" means a central processing unit which is the specialized integrated circuit that executes binary programs and performs most logical functions or calculations. A dual -core central processing unit is considered a single CPU. Note that because of the use of multi -core CPUs and virtual server environments, the calculation of CPUs for licensing purposes described below will not always equate to the number of physical CPUs in the environment. A virtual server environment is created where virtual machine technology (which applies to both client and server hardware) is used to enable multiple instances of an operating system(s) to run on a single computer simultaneously. With the Authorized Use Limitation as "CPU" or "Processor", the calculation with respect to the number of CPUs on an individual server is determined as follows: Version PS 1.0 Page 20 of 38 7/23/2014 10:36 AM Agreement No. 7434 CRs 1. For non -virtual server environments, for any server with databases monitored by the CA Software with single CPUs (including, for the avoidance of doubt, dual -core CPUs), count the number of CPUs. For any server with databases monitored by the CA Software with greater than dual -core CPUs, count all cores of the CPUs. Divide the number of cores by two (2) and round up to the next whole number. 2. For virtual server environments, for any server with single CPUs (including, for the avoidance of doubt, dual -core CPUs), count the number of CPUs. For any server with greater than dual -core CPUs, count all cores of the CPUs. Divide the number of cores by two (2) and round up to the next whole number. Determine the maximum percentage of the server CPU capacity that is allocated by the Virtual Machine Technology to any operating system instance containing databases(s) monitored by the CA Software, and multiply this percentage by the number of CPUs. Multiply the resulting number by one and a half (1.5X) and round up to the next whole number. 3. For mixed server environments, for each server perform the calculations for CPUs as set forth above in subparagraphs (1) and (2) and add these amounts together to determine the aggregate number of CPUs. CA Systems Performance for Infrastructure Managers (formerly known as "CA SystemEdge ") is a separate program included in the delivery of CA Database Performance. Customers can use this program only for communication with other CA Technologies tools and/or monitoring CA Technologies software systems only. Full functionality of the program to monitor and manage servers requires a separate license with additional fees. CA DLP CA DLP includes CA DLP Enterprise Suite, CA DLP Platform & Surveillance, CA DLP Endpoint, CA DLP Stored Data, CA DLP Message Server and CA DLP Network. CA DLP Network and CA DLP Enterprise Suite (which includes CA DLP Network) require and may only be used on a licensed CA DLP Network Appliance. "CA DLP Network Appliance" means the hardware that operates the CA DLP Network. "User" means a single person, or identity, listed in any Customer directory or network storage location whose access and use rights can be authenticated, authorized, or administered by the CA Software. Unless specified on the Order Form, a User shall not be counted more than once or a concurrent basis. If an Appliance is included with the CA Software, Support for an Appliance is provided in accordance with the CA Appliance Hardware Policy published on CA Support Online located at htt suaa od C.c&corn. CA Enterprise Log Manager "Agent" means a single installation of the agent software on a specific operating system instance which can be identified as a unique host identification on a hardware server. A hardware server may have multiple operating system instances installed on it (through partitioning or virtualization). Each instance of the operating system on a partitioned/virtualized server must license an agent if required forjob scheduling purposes. "Node" means, in a communications system, a networkjunction or connection point. Any system or device connected to a network is also called a node or cluster. "Server" means a single physical or virtual computer which processes data using one or more central processing units, and which is owned, leased or otherwise controlled by Customer. CA ESP Workload Automation (MIPS Based license. Operating System is IBMz/OS) CA ESP Workload Automation is licensed by the specified number of MIPS (the "Authorized Use Limitation in MIPS"). "MIPS"means millions of instructions per second. The MIPS capacity of a computer shall be calculated by reference to CA's published schedules of the MIPS capacity and if a computer isn't listed then the manufacturer's published specifications should apply. In the event that any particular computer is not accounted for on CA's schedule, the manufacturer's published specification of MIPS capacity shall control. Further, in the event a special purpose processor, designed to perform one or more dedicated functions, is being used as a general purpose processor, CA shall treat such processor as a general purpose processor for purposes of calculating Authorized Use Limitation in MIPS. "Customer Site" means the site(s) specified at the time of licensing the CA Software or the Customer Address if no Customer Site has been indicated. Customer may use the CA Software only on the specific computers upon which the CA Software is installed to run at the Customer Site or on computers which are linked, connected to and/or which can remotely access such computers, irrespective of the platform designations of the hardware or operating systems, provided that such computer is capable of accessing, using, executing or benefiting from the CA Software, subject to the aggregate MIPS capacity not exceeding the Authorized Use Limitation in MIPS. Version PS 1.0 Page 21 of 38 7/23/2014 10:36AM Agreement No. 7434 ca, tectii ologieS CA Fast Unload for Distributed Databases: The CA Software is licensed by the number of servers. "Server" means a single physical or virtual computer which processes data using one or more central processing units, and which is owned, leased or otherwise controlled by Customer. CA Federation Manager: (a) "Federate" means to link or bind two or more entities together, enabling identity, account, attribute, authentication, and authorization federation across different trust realms. (b) "Federation" means a relationship or an association between a specific system entity's identified users, partners oraccounts. (c) "Federation Partner" means an internal or external entity (i) for which a unique federation configuration is required in order to join a Federation, and (ii) with whom Customer interoperates using Federation Manager, with or without SAMLAA. (d) "Federation Partnership Licensee" means the Federation Partner designated by Customer as licensed to use SAML AA or Federation Manager in accordance with the provisions of the Agreement and who has agreed in writing to Customer terms and conditions substantially similar to the Federation Manager and SAML AA license provisions contained herein, as well as the confidentiality provisions contained in the Agreement. Such Federation Partnership Licensee shall not have any right to further copy, distribute, or otherwise transfer such software or any rights therein, notwithstanding any provision of the Agreement to the contrary. With regard solely to such Federation Partners use of the Licensed Programs in accordance herewith, the term "Customer" in the Agreement includessuch Federation Partner. (e) "Federation User' means any user who is allowed to use a Federation via the specific configuration of Federation Manager that Customer deploys. A Federation User shall not be counted more than once or on a concurrent basis. CA GEN ENC Cross -Gen Opt Linux "Server" means a single physical or virtual computer which processes data using one or more central processing units, and which is owned, leased or otherwise controlled by Customer. "User" means a single person listed in any Customer directory or network storage location whose access and use rights can be authenticated, authorized, or administered by the CA Software. Unless otherwise specified, a User shall not be counted more than once or on a concurrent basis. "Non Tier Servers" means single server of any tier up to and including Tier 9 Server. CA GEN Implementation Toolset "Server" means a single physical or virtual computer which processes data using one or more central processing units, and which is owned, leased or otherwise controlled by Customer. "User" means a single person listed in any Customer directory or network storage location whose access and use rights can be authenticated, authorized, or administered by the CA Software. Unless otherwise specified, a User shall not be counted more than once or on a concurrent basis. "Non Tier Servers" means single server of any tier up to and including Tier 9 Server. CA GEN TRANSACTION Enabler "Server" means a single physical or virtual computer which processes data using one or more central processing units, and which is owned, leased or otherwise controlled by Customer. "User' means a single person listed in any Customer directory or network storage location whose access and use rights can be authenticated, authorized, or administered by the CA Software. Unless otherwise specified, a User shall not be counted more than once or on a concurrent basis. "Non Tier Servers" means single server of any tier up to and including Tier 9 Server. CA GEN TRANSACTION Enabler User Fnl "Server" means a single physical or virtual computer which processes data using one or more central processing units, and which is owned, leased or otherwise controlled by Customer. "User" means a single person listed in any Customer directory or network storage location whose access and use rights can be authenticated, authorized, or administered by the CA Software. Unless otherwise specified, a User shall not be counted more than once or on a concurrent basis. "Non Tier Servers" means single server of any tier up to and including Tier 9 Server. Version P51,.0 Page 22 of 38 7/23/201410:36 AM Agreement No. 7434 ca, Redinologi s CA GEN WRKSTN Cross -Gen Linux "Server" means a single physical or virtual computer which processes data using one or more central processing units, and which is owned, leased or otherwise controlled by Customer. "User" means a single person listed in any Customer directory or network storage location whose access and use rights can be authenticated, authorized, or administered by the CA Software. Unless otherwise specified, a User shall not be counted more than once or on a concurrent basis. "Non Tier Servers" means single server of any tier up to and including Tier 9 Server. CA Identity Manager "User" means a single person listed in any Customer directory or network storage location whose access and use rights can be authenticated, authorized, or administered by CA Identity Manager. Unless otherwise specified, a User shall not be counted more than once or on a concurrent basis. "Internal User" is an intranet User defined as an employee or contractor of the Customer. CAldentity Manager may be used for Customer's internal use only, by the Internal Users on Customer's local area network and client/server system or a HTTP-based Web server infrastructure. Internal Users licensed hereunder may not be aggregated by a Customer contractor with any users of CA Identity Manager separately licensed by such contractor. "External User" is either an extranet or internet User defined as an employee of Customer's authorized third parties, which may be Customer's customers, clients, or consumers, on internetwebsite(s) owned by, or under the control of, Customer. External Users licensed hereunder may not be aggregated by a Customer's vendor or business partner with any Users of CA Identity Manager separately licensed by such vendor orpartner. CA Infrastructure Insight "Device" means a network -connected device that is managed by the CA Software and uses an Internet Protocol ("IP") address, including but not limited to IP and hybrid telephony devices, routers, appliances, hubs, physical servers, single -flow interfaces, and physical machines, but excluding endpoint devices such as IP telephones. When the Authorized Use Limitation is "Device", the calculation with respect to the number of Licenses is determined asfollows: a. For network -connected devices, for any device with up to five (5) IPflow interfaces, count the number of devices. For any device with greater than five (5) IPflow interfaces, count the total number of IPflow interfaces. Divide the number of IPflow interfaces by five (5) and round up to the next whole number. b. For network -connected devices, for any device with up to two hundred (200) ports, count the number of devices. For any device with greater than two hundred (200) ports, count the total number of ports. Divide the number of ports by two hundred (200) and round up to the next whole number. For avoidance of doubt, when a single network -connected device, has greater than five (5) IPflow interfaces and greater than two hundred (200) ports, the device is included in the license count that results in the highest number of licenses. For example, a device with fifty (50) IPflow interfaces and six hundred (600) ports would be included in the license count based upon the number of IPflow interfaces (50/5 = 10 licenses while 600/200 = 3 licenses). CA Infrastructure Insight consists of CA Spectrum Infrastructure Manager and CA NetQoS ReporterAnalyzer. CA Database Performance is included in the delivery of CA Infrastructure Insight for use only for monitoring the databases included in CA Infrastructure Insight. Full functionality of CA Database Performance to monitor other databases requires a separate license for additional fees. CA Systems Performance for Infrastructure Managers is included in the delivery of CA Infrastructure Insight for use only for provisioning and performance monitoring of the systems that are running CA Infrastructure Insight. Full functionality of CA Systems Performance for Infrastructure Managers requires a separate license for additional fees. If an Appliance is included with the CA Software, Support for a CA -provided physical server platform hardware appliance which is bundled with and used to operate one or more pre -installed licensed CA software products is provided in accordance with the CA Appliance Hardware Policy published on CA Support Online located athltp://suoport.ca,com. CA Infrastructure Management "Device" means a network -connected device that is managed by the CA Software and uses an Internet Protocol ("IP") address, including but not limited to IP and hybrid telephony devices, routers, appliances, hubs, physical servers, single -flow interfaces, and physical machines, but excluding endpoint devices such as IP telephones. When the Authorized Use Limitation is "Device", the calculation with respect to the number of Licenses is determined asfollows: Version P51.,0 Page 23 of 38 7/23/201410:36 AM Agreement No. 7434 CR a. For network -connected devices, for any device with up to five (5) IPflow interfaces, count the number of devices. For any device with greater than five (5) IPflow interfaces, count the total number of IPflow interfaces. Divide the number of IPflow interfaces by five (5) and round up to the next whole number. b. For network -connected devices, for any device with up to two hundred (200) ports, count the number of devices. For any device with greater than two hundred (200) ports, count the total number of ports. Divide the number of ports by two hundred (200) and round up to the next whole number. For avoidance of doubt, when a single network -connected device, has greater than five (5) IPflow interfaces and greater than two hundred (200) ports, the device is included in the license count that results in the highest number of licenses. For example, a device with fifty (50) IPflow interfaces and six hundred (600) ports would be included in the license count based upon the number of IPflow interfaces (50/5 = 10 licenses while 600/200 = 3 licenses). CA Infrastructure Management consists of CA Spectrum Infrastructure Manager, CA eHealth Performance Manager and CA NetQoS ReporterAnalyzer. CA Database Performance is included in the delivery of CA Infrastructure Management for use only for monitoring the databases included in CA Infrastructure Management. Full functionality of CA Database Performance to monitor other databases requires a separate license for additional fees. CA Systems Performance for Infrastructure Managers is included in the delivery of CA Infrastructure Management for use onlyfor provisioning and performance monitoring of the systems that are running CA Infrastructure Management. Full functionality of CA Systems Performance for Infrastructure Managers requires a separate license for additional fees. If an Appliance is included with the CA Software, Support for a CA -provided physical server platform hardware appliance which is bundled with and used to operate one or more pre -installed licensed CA software products is provided in accordance with the CA Appliance Hardware Policy published on CA Support Online located atttt s su >aor. CA Infrastructure Performance "Device" means a network -connected device that is managed by the CA Software and uses an Internet Protocol ("IP") address, including but not limited to IP and hybrid telephony devices, routers, appliances, hubs, physical servers, single -flow interfaces, and physical machines, but excluding endpoint devices such as IP telephones. When the Authorized Use Limitation is "Device", the calculation with respect to the number of Licenses is determined asfollows: a. For network -connected devices, for any device with up to five (5) IPflow interfaces, count the number of devices. For any device with greater than five (5) IPflow interfaces, count the total number of IPflow interfaces. Divide the number of IPflow interfaces by five (5) and round up to the next whole number. b. For network -connected devices, for any device with up to two hundred (200) ports, count the number of devices. For any device with greater than two hundred (200) ports, count the total number of ports. Divide the number of ports by two hundred (200) and round up to the next whole number. For avoidance of doubt, when a single network -connected device, has greater than five (5) IPflow interfaces and greater than two hundred (200) ports, the device is included in the license count that results in the highest number of licenses. For example, a device with fifty (50) IPflow interfaces and six hundred (600) ports would be included in the license count based upon the number of IPflow interfaces (50/5 = 10 licenses while 600/200 = 3 licenses). CA Infrastructure Performance consists of CA eHealth Performance Manager and CA NetQoS ReporterAnalyzer. CA Database Performance is included in the delivery of CA Infrastructure Performance for use only for monitoring the databases included in CA Infrastructure Performance. Full functionality of CA Database Performance to monitor other databases requires a separate license for additional fees. CA Systems Performance for Infrastructure Managers is included in the delivery of CA Infrastructure Performance for use onlyfor provisioning and performance monitoring of the systems that are running CA Infrastructure Performance. Full functionality of CA Systems Performance for Infrastructure Managers requires a separate license for additional fees. If an Appliance is included with the CA Software, Support for a CA -provided physical server platform hardware appliance which is bundled with and used to operate one or more pre -installed licensed CA software products is provided in accordance with the CA Appliance Hardware Policy published on CA Support Online located athittta /'/Luport.ca.com. Version P51.A Page 24 of 38 7/23/201410:36 AM Agreement No. 7434 ca, s CA Insight Database Performance Manager "Server" means a single physical or virtual computer which processes data using one or more central processing units, and which is owned, leased or otherwise controlled by Customer.CA Systems Performance for Infrastructure Managers (formerly known as "CA System Edge") Limited Use, is a separate program included in the delivery of CA Insight Database Performance Manager. The customers can use this program only for communication with other CA Technologies tools and/or monitoring CA Technologies Software systems only. Full functionality of the program to monitor and manage servers requires a separate license with additional fees. CA IT Asset Manager "CA Software" means the CA IT Asset Manager and CA Software Compliance Manager. A "Managed System" is any physical orvirtual desktop, laptop, server, and tablet computer that may be tracked and/or managed by the CA Software, based upon user -supplied unique designations to identify such computers, regardless of use purpose including non -production, spares, or disaster recovery. If the optional component CA Software Compliance Content Subscription is listed on the applicable Order Form, Customer is granted a term license to use such content with CA Software Compliance Manager or CA IT Asset Manager beginning on the Term Start Date and ending on the Term End Date. The subscription fees for CA Software Compliance Content Subscription include the right to receive content updates during the Term of the content subscription. Such license for CA Software Compliance Content Subscription shall renew at the option of the Ordering Activity and be extended for successive periods equivalent to the original subscription Term, subject to the parties' agreement concerning fees to be paid during each such extended term. Use of the CA Software is limited as to severaIcomponents included unless separately licensed. Software technology for Software Distribution, Remote Control and Asset Discovery and Inventory (CA IT Client Management) are included with CA Software Compliance Manager and CA IT Asset Manager, however the only authorized use is the ability to import Microsoft SMS 2003 or Microsoft SystemCenter Configuration Manager 2007 through the CA Asset Converter for Microsoft SMS, importing inventory from other third party discovery tools using the Asset Collector technology and CA IT Client Manager technology. Explicitly, Customer is not licensed to use the software distribution, remote control technologies as well as the full asset inventory and discovery agents. Use of the CA Software or CA Software Compliance Content Subscription is not a substitute for Customer's compliance with any laws (including but not limited to any act, statute, regulation, requirement, rule, standard, directive, administrative order, executive order, etc. (collectively, "Laws")). Customer should consult with competent legal counsel regarding any such Laws. Use of the CA Software or CA Software Compliance Content Subscription is not a substitute for Customer's compliance with its contractual obligations. The CA Software and CA Software Compliance Content Subscription require Customer to (i) manuallyor electronically enter or (ii) make decisions regarding software license data and other information for purposes of tracking authorized use, compliance with its software license contractual obligations and other information ("Data Entry"). Notwithstanding the provisions of any warranty to the contrary, CA makes no warranty with respect to the CA Software or CA Software Compliance Content Subscription failure, error, omission or inaccuracy to the extent that any such failure, error, omission or inaccuracy relates, in whole or in part, to Data Entry errors, omissions, decisions, inaccuracies, misinterpretations or otherwise. CA IT Client Manager "Managed System" is any physical or virtual computer system that can host an operating system, including, but not limited to, a desktop computer, server, or laptop computer, that is administered or managed by the CA Software (IT Client Manager / IT Inventory Manager) by way of a CA management agent, whether it resides on the asset or not. A "Non -CA managed system" has their inventory gathered by a non -CA management agent; however, the information about that asset is still stored in the Management Database (MDB). Thisasset information may have been obtained using the SMS Connector or Asset Collector. If Customer is licensed for CA IT Client Manager Patch Subscription, Customer is granted a term license to use such program with CA IT Client Manager beginning on the Term Start Date and ending on the End Date for the subscription term. The term license for the CA IT Client Manager Patch Subscription shall renew at the Ordering Activity's option and be extended for successive periods equivalent to the original term, subject to the parties' agreement concerning fees to be paid during each extendeciterm. CA Mainframe for IBM Rational Developer for System z Unit Test (CA Mainframe Suite for RDz UT):. a) Additional license rights to the CA software program(s) referenced below ("CA Software") are provided under the following terms and conditions in addition to any terms and conditions referenced (i) on the Order Form entered into by you and the CA entity ("CA") through which you obtained a license for the CA Software and (ii) in the software license agreement between you and CA for the CA Software. These terms shall be effective from the effective date of the Order Form. b) Program Name: CA Mainframe Suite for IBM Rational Developer for System z Unit Test ("RDz UT") Version P51,0 Page 25 of 38 7/23/201410:36 AM Agreement No. 7434 Ca s c) Specified Operating Environment The license rights set forth herein apply only to CA Software separately licensed from CA for the z/OS environment and for use hereunder only in the IBM RDz LITenvironment. d) CA Software CA Software for IBM RDz UT Environment: CA 1T" Tape Management, CA TLMS® Tape Management CA ACF2TM, CA ACF2T1 Option for DB2 CA Aion® Business Rules Expert CA Auditor for z/OS, CA Cleanup CA Bundl® CA Cleanup CA Compliance Manager for z/OS CA Database Management for D62 forz/OS CA Database Management for IMS for z/OS CA Datacom® CA DeliverT"" CA Disk— Backup and Restore CA Dispatch'"" CA Easytriev0 CA Endevor® Software Change Manager CA FileMaster'" Plus, CA FileMasterT"" Plus IMS CA Gen CA Gener/OL CA IDMST"' CA InterTestT" for CICS, CA InterTestT' Batch CA JCLCheckT"" Workload Automation CA JobTracT"' Job Management CA Librarian® CA Mainframe Application Tuner CA Mainframe Software Manager - CA NetMaster® File Transfer Management, CA NetMaster® Network Automation, CA NetMaster® Network Management for SNA, CA NetMaster® Network Management for TCP I CA Optimizer®/II CA Panvalet® CA Roscoe® Version PS Page 26 of 38 7/23/201410:36 AM Agreement No. 7434 ca, f cIhrtologeies CA Scheduler® Job Management CA Spool'" CA SymDump® Batch, CA SymDump® for CICS CA Telon® CA Top Secret®, CA Top Secret' Option for DB2 CA UFO"" CA View® CA Workload Automation CA 7® Edition, CA Workload Automation ESP Edition, CA Workload Automation Restart Option EE, CA Workload Automation Restart Option for z/OS Schedulers CAXCOM'"' Data Transport® e) Licensing Model and Terms The license rights set forth herein authorize you to use CA Software for which you are separately licensed only in the IBM RDz UT environment for non -production purposes. During the term of this license, you must also be licensed to use the IBM RDz UT environment. Use of the CA Software in any other environment or in the RDz UT environment for production purposes is expressly prohibited. This restriction does not change your existing license rights to use the CA Software in a production environment. A production environment is a computer system used to process an organization's daily work on a real-time operation and is not a system used only for development and testing. During the term of this license, if you license additional CA Software, the license rights granted herein apply to such subsequently licensed CASoftware. The license rights are provided on a "per Seat" basis. "Seat" means a single person or identity whose access and use rights can be authenticated, authorized, or administered, or who has the ability to view content aggregated or managed by the CA Software. In general, a Seat shall not be counted more than once or on a concurrent (logged -in) basis. One Seat license shall authorize you to use any of the CA Software for which you are separately licensed in the RDz UT environment. The term of this license (the "Term") is the lesser of: (i) one (1) year; (ii) the term end date for the applicable separately licensed CA Software; or (iii) the term end date for your use of the IBM RDz UT environment. Any termination under clauses (ii) or (iii) immediately above shall not result in refund of any license fees paid hereunder. Subject to the limitations set forth in clauses (i) (ii) and (iii) immediately above, any renewal or extension of the license term for the separately licensed CA Software or the IBM RDz UT environment, as the case may be, shall continue the Term of this agreement for the period identified above. If you have multiple CA Software products with different term end dates, the license rights granted herein terminate as to each specific CA Software product in the lesser of one (1) year or when the applicable term license for such CA Software ends. Termination of license rights hereunder shall not terminate your license to any CA Software product. CA does not provide support for the CA Software in the RDz UT environment. Any issues with the CA Software in the RDz UT environment must be reproduced by you in the z/OS environment and reported as such through CA Technologies normal support process for the CA Software. CA NetQoS NetVoyant "Device" means a network -connected device that is managed by the CA Software and uses an Internet Protocol ("IP") address, including but not limited to IP and hybrid telephony devices, routers, appliances, hubs, physical servers, single -flow interfaces, and physical machines. Endpoint devices used solely as IP telephones are not considered to be Devices, unless the CA Software is specifically licensed by the number of phones. For the purposes of CA NetQoS Unified Communication Monitor only, endpoint devices used solely aslP telephones are considered to be Devices. When the Authorized Use Limitation is "Device", the calculation with respect to the number of Licenses is determined as follows: 1. For network -connected devices, in non -virtual server environments, for any device with up to five (5) IPflow interfaces, count the number of devices. For any device with greater than five (5) IPflow interfaces, count the total number of IPflow interfaces. Divide the number of IPflow interfaces by five (5) and round up to the next whole number. Version PS 1.0 Page 27 of 38 7/23/201410:36 AM Agreement No. 7434 2. For network -connected devices, in non -virtual server environments, for any device with up to two hundred (200) ports, count the number of devices. For any device with greater than two hundred (200) ports, count the total number of ports. Divide the number of ports by two hundred (200) and round up to the next whole number. For avoidance of doubt, when a single network -connected device, in non -virtual environments, has greater than five (5) IPflow interfaces and greater than two hundred (200) ports, the device is included in the license count that results in the highest number of licenses. For example, a device with fifty (50) IPflow interfaces and six hundred (600) ports would be included in the license count based upon the number of IPflow interfaces (50/5 = 10 licenses while 600/200 = 3licenses). CA NetQoS Reporter Analyzer "Device" means a network -connected device that is managed by the CA Software and uses an Internet Protocol ("IP") address, including but not limited to IP and hybrid telephony devices, routers, appliances, hubs, physical servers, single -flow interfaces, and physical machines. Endpoint devices used solely as IP telephones are not considered to be Devices, unless the CA Software is specifically licensed by the number of phones. For the purposes of CA NetQoS Unified Communication Monitor only, endpoint devices used solely aslP telephones are considered to be Devices. When the Authorized Use Limitation is "Device", the calculation with respect to the number of Licenses is determined as follows: 1. For network -connected devices, in non -virtual server environments, for any device with up to five (5) IPflow interfaces, count the number of devices. For any device with greater than five (5) IPflow interfaces, count the total number of IPflow interfaces. Divide the number of IPflow interfaces by five (5) and round up to the next whole number. 2. For network -connected devices, in non -virtual server environments, for any device with up to two hundred (200) ports, count the number of devices. For any device with greater than two hundred (200) ports, count the total number of ports. Divide the number of ports by two hundred (200) and round up to the next whole number. For avoidance of doubt, when a single network -connected device, in non -virtual environments, has greaterthan five (5) IPflow interfaces and greater than two hundred (200) ports, the device is included in the license count that results in the highest number of licenses. For example, a device with fifty (50) IPflow interfaces and six hundred (600) ports would be included in the license count based upon the number of IPflow interfaces (50/5 = 10 licenses while 600/200 = 3licenses). CA RegFort: CA RegFort is licensed by the number of Users orlssuance. "User" means a single person, or identity, listed in any Customer directory or network storage location whose access and use rights can be authenticated, authorized, or administered by CA RegFort or who has the ability to view content aggregated or managed by CA RegFort. In general, a user shall not be counted more than once or on a concurrent (logged -in) basis. "Issuance" means any activity in the life cycle of a Public Key Infrastructure credential that is managed by CA RegFort, including, but not limited to, creation of a new credential, revocation, renewal, re -issue or update of the credential. "RegFort Client" means a portion of CA RegFort which enables end -users to interface with smartcards and tokens. Limited License Grant. In addition to the rights granted in the applicable license agreement, CA grants Customer and its affiliates a nonexclusive license to distribute RegFort Client to end -users. Customer may use Customer's logo and name with the RegFort Client. No title to or ownership of the RegFort Client is transferred to Customer. CA RiskFort: CA RiskFort is licensed by the number of Users. "User" means a single person, or identity, listed in any Customer directory or network storage location whose access and use rights can be authenticated, authorized, or administered by CA RiskFort or who has the ability to view content aggregated or managed by CA RiskFort. In general, a user shall not be counted more than once or on a concurrent (logged -in) basis. Version P61.0 Page 28 of 38 7/23/201410:36 AM Agreement No. 7434 CA Role and Compliance Manager "User" means a single person listed in any Customer directory or network storage location whose access and use rights can be authenticated, authorized, or administered by the CA Software. Unless otherwise specified, a User shall not be counted more than once or on a concurrent basis. An "Internal User" is an intranet User defined as an employee or contractor of the Customer. CA Role and Compliance Manager may be used for Customer's internal use only, by the Internal Users on Customer's local area networkand client/server system or a HTTP-based Web server infrastructure. Internal Users licensed hereunder may not be aggregated by a Customer contractor with any users of CA Role and Compliance Manager separately licensed by such contractor. An "External User" is either an extranet or internet User defined as an employee of Customer's authorized third parties, which may be Customer's customers, clients, or consumers, on internet website(s) owned by, or under the control of, Customer. External Users licensed hereunder may not be aggregated by a Customer's vendor or business partner with any Users of CA Role and Compliance Manager separately licensed by such vendor or partner. CA Server Automation "Physical Socket" means an electrical component attached to a printed circuit board ("PCB") and electrically interconnects a central processing unit ("CPU") and PCB. A CPU is the specialized integrated circuit that executes binary programs and performs most logical functions or calculations. One physical CPU may have up to twelve (12) processing cores. CA Systems Performance for Infrastructure Manager (SystemEDGE) and CA Virtual Assurance for Infrastructure ManagerAIMS components are included in the delivery of the CA Server Automation for use only with this product. Use of these components with other CA products requires a separate license for additional fees. CA IT Client Management solution consists of CA Software Delivery, CA Asset Management, CA Remote Control programs and is included in the delivery of the CA Server Automation. Customer may only use these components to manage server class machines, including virtual machines. Use of these programs for managing desktops, laptops and other client devices requires separate licenses for additional fees. CA Asset Intelligence and CA Patch Manager programs are included in the delivery of the CA Server Automation. Customer may only use these components to manage server class machines, including virtual machines. Use of these programs for managing desktops, laptops and other client devices requires separate licenses for additionalfees. CA Service Desk Manager "CA Software" and "SDM" mean the CA Service Desk Manager —Analyst License, CA Service Desk Manager- Full License, or CA CMDB Manager Servers described herein in object code form. CA Service Desk Manager -Full License and CA Service Desk Manager -Analyst License are licensed on a Concurrent Analyst basis. In CA Service Desk Manager -Full License, CA Service Desk Manager -Analyst License, the authorized users are assigned various roles based upon the functions needed to accomplish designated tasks. "Concurrent Analyst", in the context of CA Service Desk Manager, means a software license that is based on the number of simultaneous (concurrent) users accessing the program. For the purpose of SDM, all roles (for example: Analyst, Manager, Administrator), and programmatic API and/or web services calls require a license. The Software does not prohibit additional users from access, but does log a license exception for auditing purposes. Customer is entitled to have the specified number of Concurrent Analysts access CA Service Desk Manager simultaneously. For CA Service Desk Manager -Full License, CA Service Desk Manager -Analyst License, You are also licensed for End -User Self -Service, which is granted to the employee and customer roles to allow for the creation, modification, and closure of a ticket on their own behalf, but not on behalf of someone else. CA Service Desk Manager -Full License includes a limited entitlement to CA Cohesion, and use of CA Cohesion is restricted to a maximum of one hundred (100) Managed Servers. Use for additional Servers requires additional licenses for CA CMDB Managed Server. CA Service Desk Manager -Analyst License does not include the CA Cohesion entitlement. CA CMDB Managed Servers is licensed by the number of Servers. "Managed Servers" means a virtual or physical Server managed by CA Software. "Server" means a single physical or virtual computer which processes data using one or more central processing units, and which is owned, leasedor otherwise controlled by Customer. CA Service Desk Manager includes a limited entitlement to CA Business Intelligence. This entitlement is restricted to use within the context of reporting for SDM only. Specifically, SDM reports created using CA Business Intelligence may access and incorporate data created by, derived from, or used by SDM or third party data sources, provided that such data facilitates or augments data for Customer's use of SDM. Version PS 1.0 Page 29 of 38 7/23/201410:36 AM Agreement No. 7434 CA Service Desk Manager includes a limited entitlement to CA Process Management for Workflows. This entitlement is restricted to use within the context of Workflows associated with SDM only. This entitlement includes: the Service Desk Manager connector; three (3) Custom Operators; and five (5) Agents. This entitlement does not include any Premium Connectors. Multiple Orchestrators can be deployed with the constraints specified herein. There are no license limitations on the number of concurrent processes per Orchestrator, For the purpose of CA Process Management for Workflows, "Agent" means a single installation of the agent software component of the CA Process Management for Workflows on a specific operating system which can be identified as a unique host identification on a physical or virtual hardware server. For the purpose of CA Process Management for Workflows, "Connector" is the software program connecting CA Process Management for Workflows with specifically named third -party software or other CA software. For example, "CA Process Management for Workflows Connector for CA Service Desk Manager" connects CA Process Management for Workflows with CA Service Desk Manager. Each Connector may only be used to connect the CA Software with the specific named third -party software or CA software program. For the purpose of CA Process Management for Workflows, "Custom Operator" means a type of automation object within the CA Process Management for Workflows that can be created to enhance, modify, or restrict the capabilities of an existing "Connector". For the purpose of CA Process Management for Workflows, "Orchestrator" means a single installation of the Orchestrator software component of CA Process Management for Workflows on a specific operating system which can be identified as a unique host identification on a physical or virtual hardware server. This installation can be a stand-alone Orchestrator or as a node of a new or existing clustered Orchestrator. CA SiteMinder "User" means a single person listed in any Customer directory or network storage location whose access and use rights can be authenticated, authorized, or administered by the CA Software. Unless otherwise specified, a User shall not be counted more than once or on a concurrent basis. An "Internal User" is an intranet User defined as an employee or contractor of the Customer. CA SiteMinder may be used for Customer's internal use only, by the Internal Users on Customer's local area network and client/server system or a HTTP-based Web server infrastructure. Internal Users licensed hereunder may not be aggregated by a Customer contractor with any users ofCA SiteMinder separately licensed by such contractor. An "External User" is either an extranet or internet User defined as an employee of Customer's authorized third parties, which may be Customer's customers, clients, or consumers, on internet website(s) owned by, or under the control of, Customer. External Users licensed hereunder may not be aggregated by a Customer's vendor or businesspartner with any Users of CA SiteMinder separately licensed by such vendor orpartner. CA SOA Security Manager<br /><br />"Secured Web Service" means a software system designed to support interoperablemachine-to- machine interaction over a network which needs to be secured from unauthorized access, software routines or components that is or are intended to disable, erase, or otherwise harm software, equipment, or data, or cause other similar damage. This web service can be a URI or web services End point defined in a WSDL file. "URI" (Uniform Resource Identifier) means a compact string of characters for identifying an abstract or physical resource. "End point" means a specific location for accessing a web service using a specific protocol and data format. "WSDL" (Web Service Definition Language) means an XML (Extensible Markup Language) format for describing network services as a set of endpoints operating on messages containing either document -oriented or procedure -oriented information. "User" means a single person, application or identity listed in any Customer directory or network storage location whose access and use rights can be authenticated, authorized, or administered by the CA Software or who has the ability to view content aggregated or managed by CA SOA Security Manager. In general, a user shall not be counted more than once or on a concurrent (logged -in) basis. CA SOA Security Manager with Gateway CA SOA Security Manager is licensed in number of Secured Web Services and Users. CA SOA Security Gateway is licensed in number of Instances. "Secured Web Service" means a software system designed to support interoperable machine -to -machine interaction over a network which needs to be secured from unauthorized access, software routines or components that is or are intended to disable, erase, Version P6 1„0 Page 30 of 38 7/23/201410:36 AM Agreement No. 7434 or otherwise harm software, equipment, or data, or cause other similar damage. This web service can be a URI or web services End point defined in a WSDL file. "URI" (Uniform Resource Identifier) means a compact string of characters for identifying an abstractor physical resource. "End point" means a specific location for accessing a web service using a specific protocol and data format. "WSDL" (Web Service Definition Language) means an XML (Extensible Markup Language) format for describing network services as a set of endpoints operating on messages containing either document -oriented or procedure -oriented information. "User" means a single person, application or identity listed in any Customer directory or network storage location whose access and use rights can be authenticated, authorized, or administered by CA SOA Security Manager or who has the ability to view content aggregated or managed by CA SOA Security Manager. In general, a user shall not be counted more than once or on a concurrent (logged -in) basis. "Installation" means the number of copies of CA SOA Security Manager installed in the Customer's physical and/or virtual environment. CA Spectrum Infrastructure Manager "Managed Network Device" means a virtual or physical network -connected device with less than 200 ports that is managed by CA Spectrum Infrastructure Manager and uses an Internet Protocol ("IP") address, including but not limited to IP and hybridtelephony devices, routers, appliances, hubs, virtual or physical servers, and virtual or physical machines, but excluding endpoint devices such as IP telephones. CA Spectrum Service Assurance "Site" or "Installation" means use of CA Spectrum Service Assurance in a data center comprised of one or more CPUs conforming to the following conditions: Two or more CPUs will be considered part of the same site if (i) the CPUs are located in a single building, (ii) each CPU shares access to data storage and peripheral devices with one or more of the other CPUs without requiring any programming interface to another CPU, and (iii) the CPUs function as a data processing facility under common data processing operations supervision. Use of CA Spectrum Service Assurance on two or more CPUs will be considered multiple and separate sites if all of the foregoing conditions of a single site are not satisfied, regardless of (i) whether they occupy different floors or locations in the same building or share the same mailing location address, or (ii) the extent to which the CPUs are integrated within a network or serve a functional role as part of a larger data processing organization. Customer is granted the right to deploy CA Spectrum Service Assurance at the Sites with the addresses listed in the Order Form. Customer may change and amend the addresses of the Sites by notice to CA providing that the total number of Sites listed does not exceed the number listed in the Order Form. "Connection" means a data source indicated by CA Spectrum Service Assurance to have a connector status of "Online". A Connection may consist of a connection to a CA Software product (i.e. CA Wily, CA Spectrum), a third party product (i.e. HPOV), or a custom application. "Data source" means any software application that provides data to CA Spectrum Service Assurance. CA SYSVIEW for CA Wily APM Customer is granted a limited license to use CA SYSVIEW for CA Wily APM solely for the integration with CA Wily APM or CA Wily Introscope 8.2 or above ("CA Wily"). With this license, Customer is only authorized to install, configure and use CA SYSVIEW for CA Wily APM components to support its authorized use with CA Wily to provide mainframe performance metrics to CA Wily and trace transactions tagged by CA Wily that perform activity on the mainframe. Customer may not use CA SYSVIEW for CA Wily APM for other purposes. Any additional use requires a separate non -restricted license. In the event Customer chooses to increase its Authorized Use for CA Wily, Customer must also increase its Authorized Use for CA SYSVIEW for CA Wily APM and pay all applicable additional license and maintenance fees related thereto in order to use CA SYSVIEW for CA Wily APM with such increased CA Wily capacity. Additional use of CA Wily without obtaining a separate non -restricted license may be the basis for filing a claim with the relevant Contracting Officer under the Contract Disputes Act and FAR 52.233-1. CA TSreorg for Distributed Databases "Server" means a single physical or virtual computer which processes data using one or more central processing units, and which is owned, leased or otherwise controlled by Customer. Version P51.0 Page 31 of 38 7/23/2014 10:36 AM Agreement No. 7434 CA Virtual Assurance "Physical Socket" means an electrical component attached to a printed circuit board ("PCB") and electrically interconnects a central processing unit ("CPU") and PCB. A CPU is the specialized integrated circuit that executes binary programs and performs most logical functions or calculations. One physical CPU may have up to twelve (12) processing cores. If an Appliance is included with the CA Software, Support for an Appliance is provided in accordance with the CA Appliance Hardware Policy published on CA Support Online located athttp://support.ca.com. CA Virtual Automation "Physical Socket" means an electrical component attached to a printed circuit board ("PCB") and electrically interconnects a central processing unit ("CPU") and PCB. A CPU is the specialized integrated circuit that executes binary programs and performs most logical functions or calculations. One physical CPU may have up to twelve (12) processing cores. CA Virtual Configuration "Physical Socket" means an electrical component attached to a printed circuit board ("PCB") and electrically interconnects a central processing unit ("CPU") and PCB. A CPU is the specialized integrated circuit that executes binary programs and performs most logical functions or calculations. One physical CPU may have up to twelve (12) processing cores. CA Virtual Performance Management (CAVPM) "CPU" or "Processor" means central processing unit which is the specialized integrated circuit that executes binary programs and performs most logical functions or calculations. A Processor may not exceed a maximum of 12 processing cores. CA WebFort: CA WebFort is licensed by the number of User Credentials and Users. "Credential" means an attestation of qualification, competence, or authority issued to a User by the CA Software. "User" means a single person, or identity, listed in any Customer directory or network storage location whose access and use rights can be authenticated, authorized, or administered by CA WebFort or who has the ability to view content aggregated or managed by CA WebFort. In general, a user shall not be counted more than once or on a concurrent (logged -in) basis. "User Credentials" means the number of Credentials set forth on the Order Form to be issued to the Users who are authorized to access and use CA WebFort. Each User may have more than one credential for different verification methods. "ArcotlD Client" or "ArcotOTP Client" means portions of CA WebFort which enable end -users to use the ArcotlD and ArcotOTP credentials. Limited License Grant. In addition to the rights granted in the applicable license agreement, CA grants Customer and its affiliates a nonexclusive license to distribute the ArcotlD Client or ArcotOTP Client to end users. Customer may use Customer's logo and name with the ArcotlD Client or ArcotOTP Client. No title to or ownership of the ArcotlD Client or ArcotOTP Client is transferred to Customer. CA Wily Application Performance Management v9 (CA WiIyAPMv9) CA Wily APMv9 is licensed by (1) the number of CPUs when used as a distributed product or by (2)(a) millions of service units ("MSUs") and number of System z Application Assist Processors ("zAAPs") and number of System z Integrated Information Processors ("zllPs") or (b) number of integrated facilities for Linux ("IFLs"), when used in the mainframe environment. "CPU" means a central processing unit which is the specialized integrated circuit that executes binary programs and performs most logical functions or calculations. A dual -core central processing unit is considered a single CPU. Note that because of the use of multi -core CPUs and virtual server environments, the calculation of CPUs for licensing purposes described below will not always equate to the number of physical CPUs in the environment. A virtual server environment is created where virtual machine technology (which applies to both client and server hardware) is used to enable multiple instances of an operating system(s) to run on a single computer simultaneously ("Virtual Machine Technology"). When the Version PS 1,0 Page 32 of 38 7/23/2014 10:36 AM Agreement No. 7434 Authorized Use Limitation is "CPU" or "Processor", the calculation with respect to the number of CPUs on an individual server is determined as follows: 1. For non -virtual server environments, for any server with applications monitored by the CA Software with single CPUs (including, for the avoidance of doubt, dual -core CPUs), count the number of CPUs. For any server with applications monitored by the CA Software with greater than dual -core CPUs, count all cores of the CPUs. Divide the number of cores by two (2) and round up to the next whole number. 2. For virtual server environments, for any server with single CPUs (including, for the avoidance of doubt, dual -core CPUs), count the number of CPUs. For any server with greater than dual -core CPUs, count all cores of the CPUs. Divide the number of cores by two (2) and round up to the next whole number. Determine the maximum percentage of the server CPU capacity that is allocated by the Virtual Machine Technology to any operating system instance containing application(s) monitored by the CA Software, and multiply this percentage by the number of CPUs. Multiply the resulting number by one and a half (1.5X) and round up to the next whole number. 3. For mixed server environments, for each server perform the calculations for CPUs as set forth above in subparagraphs (1) and (2) and add these amounts together to determine the aggregate number of CPUs. When the Authorized Use Limitation is "MSUs", "zAAPs", or "zIIPs" (i) the MSUs shall be calculated by totaling the MSU capacity for all logical partitions, or LPARs, that run an application monitored by the CA Software, (ii) the zAAPs shall be calculated by totaling the number of zAAP engines attached to such LPARs, and (iii) the zIIPs shall be calculated by totaling the number of zlIP engines attached to such LPARs. An "LPAR" means the division of a computer's processors, memory, and storage into multiple sets of resources so that each set of resources is operated independently with its own physical or virtual operating system instance and applications. When the Authorized Use Limitation is "IFLs", the IFLs shall be calculated by totaling the number of IFL engines that run an application monitored by the CA Software. CA Wily Transaction Impact Monitor ("TIM") "Software Appliance" means the software running TIM on Customer's network feed to capture http/https transactions necessary for the Customer Experience analysis portion of CA Wily APMv9. Customer is responsible for providing hardware on which to run the TIM Software Appliance that meets CA's specifications. Customer must license a copy of the TIM Software Appliance for each physical server (regardless of the number of CPUs) on which a TIM Software Appliance will be installed and configured. CA Wily Application Performance Management (CA WilyAPM) CA Wily APM is licensed by (1) the number of CPUs when used as a distributed product or by (2)(a) millions of service units ("MSUs") and number of System z Application Assist Processors ("zAAPs") and number of System z Integrated Information Processors ("zIIPs") or (b) number of integrated facilities for Linux ("IFLs"), when used in the mainframe environment. "CPU" means a central processing unit which is the specialized integrated circuit that executes binary programs and performs most logical functions or calculations. A dual -core central processing unit is considered a single CPU. Note that because of the use of multi -core CPUs and virtual server environments,the calculation of CPUs for licensing purposes described below will not always equate to the number of physical CPUs in the environment. A virtual server environment is created where virtual machine technology (which applies to both client and server hardware) is used to enable multiple instances of an operating system(s) to run on a single computer simultaneously. When the Authorized Use Limitation is "CPU" or "Processor", the calculation with respect to the number of CPUs on an individual server is determined as follows: 1. For non -virtual server environments, for any server with applications monitored by the CA Software with single CPUs (including, for the avoidance of doubt, dual -core CPUs), count the number of CPUs. For any server with applications monitored by the CA Software with greater than dual -core CPUs, count all cores of the CPUs. Divide the number of cores by two (2) and round up to the next whole number. 2. For virtual server environments, for any server with single CPUs (including, for the avoidance of doubt, dual -core CPUs), count the number of CPUs. For any server with greater than dual -core CPUs, count all cores of the CPUs. Divide the number of cores by two (2) and round up to the next whole number. Determine the maximum percentage of the server CPU capacity that is allocated by the Virtual Machine Technology to any operating system instance containing application(s) monitored by the CA Software, and multiply this percentage by the number of CPUs. Multiply the resulting number by one and a half (1.5X) and round up to the next whole number. 3. For mixed server environments, for each server perform the calculations for CPUs as set forth above in subparagraphs (1) and (2) and add these amounts together to determine the aggregate number of CPUs. Version PS 10 Page 33 of 3g 7123/201410:36 AM Agreement No. 7434 When the Authorized Use Limitation is "MSUs", "zAAPs", or "zIIPs" (i) the MSUs shall be calculated by totaling the MSU capacity for all logical partitions, or LPARs, that run an application monitored by the CA Software, (ii) the zAAPs shall be calculated by totaling the number of zAAP engines attached to such LPARs, and (iii) the zIIPs shall be calculated by totaling the number of zIIP engines attached to such LPARs. An "LPAR" means the division of a computer's processors, memory, and storage into multiple sets of resources so that each set of resources is operated independently with its own physical or virtual operating system instance and applications. When the Authorized Use Limitation is "IFLs", the IFLs shall be calculated by totaling the number of IFL engines that run an application monitored by CA Wily APM. An Appliance is a CA -supplied physical server ("Hardware") that is bundled with and used to operate the CA Software licensed by Customer which is pre -installed on the Hardware. Support is provided in accordance with the CA Appliance Hardware Policy published on CA Support Online located at http:Z support.ca.com. Customer must acquire at least one license (per CPU, MSU or IFL) in order to purchase a CA Wily Transaction Impact Monitor ("TIM") or CA Wily Transaction Event & Statistics Server ("TESS"). Both a TIM and a TESS are required for any production installation. CA Wily Solutions for Lab Environments ("Wily LAB") is a single Appliance that contains TIM and TESS capabilities but is not supported for a production environment. The Wily LAB system includes one CPU license for CA Wily APM at no additional charge. CA Wily Customer Experience Manager (CA Wily CEM) CA Wily CEM is licensed by (1) the number of CPUs when used as a distributed product or by (2)(a) millions of service units ("MSUs") and number of System z Application Assist Processors ("zAAPs") and number of System z Integrated Information Processors ("zIIPs") or(b) number of integrated facilities for Linux ("IFLs"), when used in the mainframe environment. "CPU" means a central processing unit which is the specialized integrated circuit that executes binary programs and performs most logical functions or calculations. A dual -core central processing unit is considered a single CPU. Note that because of the use of multi -core CPUs and virtual server environments, the calculation of CPUs for licensing purposes described below will not always equate to the number of physical CPUs in the environment. A virtual server environment is created where virtual machine technology (which applies to both client and server hardware) is used to enable multiple instances of an operating system(s) to run on a single computer simultaneously ("Virtual Machine Technology"). When the Authorized Use Limitation is "CPU" or "Processor", the calculation with respect to the number of CPUs on an individual server is determined as follows: 1. For non -virtual server environments, for any server with applications monitored by the CA Software with single CPUs (including, for the avoidance of doubt, dual -core CPUs), count the number of CPUs. For any server with applications monitored by the CA Software with greater than dual -core CPUs, count all cores of the CPUs. Divide the number of cores by two (2) and round up to the next whole number. 2. For virtual server environments, for any server with single CPUs (including, for the avoidance of doubt, dual -core CPUs), count the number of CPUs. For any server with greater than dual -core CPUs, count all cores of the CPUs. Divide the number of cores by two (2) and round up to the next whole number. Determine the maximum percentage of the server CPU capacity that is allocated by the Virtual Machine Technology to any operating system instance containing application(s) monitored by the CA Software, and multiply this percentage by the number of CPUs. Multiply the resulting number by one and a half (1.5X) and round up to the next whole number. 3. For mixed server environments, for each server perform the calculations for CPUs as set forth above in subparagraphs (1) and (2) and add these amounts together to determine the aggregate number of CPUs. When the Authorized Use Limitation is "MSUs", "zAAPs", or "zIIPs" (i) the MSUs shall be calculated by totaling the MSU capacity for all logical partitions, or LPARs, that run an application monitored by the CA Software, (ii) the zAAPs shall be calculated by totaling the number of zAAP engines attached to such LPARs, and (iii) the zIIPs shall be calculated by totaling the number of zlIP engines attached to such LPARs. An "LPAR" means the division of a computer's processors, memory, and storage into multiple sets of resources so that each set of resources is operated independently with its own physical or virtual operating system instance and applications. When the Authorized Use Limitation is "IFLs", the IFLs shall be calculated by totaling the number of IFL engines that run an application monitored by the CA Software. An Appliance is a CA -supplied physical server ("Hardware") that is bundled with and used to operate the CA Software licensed by Customer which is pre -installed on the Hardware. Support is provided in accordance with the CA Appliance Hardware Policy published on CA Support Online located at litto://su000rt.ca.com. Customer must acquire at least one license (per CPU, MSU or IFL) in order to purchase a CA Wily Transaction Impact Monitor ("TIM") or CA Wily Transaction Event & Statistics Server ("TESS"). Both a TIM and a TESS are required for any production installation. CA Wily Solutions for Lab Environments ("Wily LAB") is a single appliance that containsTIM and TESS capabilities but is not supported for a production environment. The Wily LAB system includes one CPU license for CA Wily CEM at no additional charge. Version PS 1„0 Page 34 of 38 7/23/201410:36 AM Agreement No. 7434 CA Wily Introscope CA Wily Introscope is licensed by (1) the number of CPUs when used as a distributed product or by (2)(a) millions of service units ("MSUs") and number of System z Application Assist Processors ("zAAPs") and number of System z Integrated Information Processors ("zIIPs") or (b) number of integrated facilities for Linux ("IFLs"), when used in the mainframe environment. "CPU" means a central processing unit which is the specialized integrated circuit that executes binary programs and performs most logical functions or calculations. A dual -core central processing unit is considered a single CPU. Note that because of the use of multi -core CPUs and virtual server environments, the calculation of CPUs for licensing purposes described below will not always equate to the number of physical CPUs in the environment. A virtual server environment is created where virtual machine technology (which applies to both client and server hardware) is used to enable multiple instances of an operating system(s) to run on a single computer simultaneously ("Virtual Machine Technology"). When the Authorized Use Limitation is "CPU" or "Processor", the calculation with respect to the number of CPUs on an individual serveris determined as follows: 1. For non -virtual server environments, for any server with applications monitored by the CA Software with single CPUs (including, for the avoidance of doubt, dual -core CPUs), count the number of CPUs. For any server with applications monitored by the CA Software with greater than dual -core CPUs, count all cores of the CPUs. Divide the number of cores by two (2) and round up to the next whole number. 2. For virtual server environments, for any server with single CPUs (including, for the avoidance of doubt, dual -core CPUs), count the number of CPUs. For any server with greater than dual -core CPUs, count all cores of the CPUs. Divide the number of cores by two (2) and round up to the next whole number. Determine the maximum percentage of the server CPU capacity that is allocated by the Virtual Machine Technology to any operating system instance containing application(s) monitored by the CA Software, and multiply this percentage by the number of CPUs. Multiply the resulting number by one and a half (1.5X) and round up to the next whole number. 3. For mixed server environments, for each server perform the calculations for CPUs as set forth above in subparagraphs (1) and (2) and add these amounts together to determine the aggregate number of CPUs. When the Authorized Use Limitation is "MSUs", "zAAPs", or "zIIPs" (i) the MSUs shall be calculated by totaling the MSU capacity for all logical partitions, or LPARs, that run an application monitored by the CA Software, (ii) the zAAPs shall be calculated by totaling the number of zAAP engines attached to such LPARs, and (iii) the zIIPs shall be calculated by totaling the number of zIIP engines attached tosuch LPARs. An "LPAR" means the division of a computer's processors, memory, and storage into multiple sets of resources so that each set of resources is operated independently with its own physical or virtual operating system instance and applications. When the Authorized Use Limitation is "IFLs", the IFLs shall be calculated by totaling the number of IFL engines that run an application monitored by the CA Software. CA Workload Automation "Instance" means the number of copies of the CA Software installed in the Customer physical and/or virtual environment. CA XCOM Data Transport for Windows Family Server "Server" means a single physical or virtual computer which processes data using one or more central processing units, and which is owned, leased or otherwise controlled by Customer. CA eHealth Performance Manager "Managed Network Device" means a virtual or physical network -connected device with less than 200 ports that is managed by the CA Software and uses an Internet Protocol ("IP") address, including but not limited to IP and hybrid telephony devices, routers, appliances, hubs, virtual or physical servers, and virtual or physical machines, but excluding endpoint devices such as IP telephones. Mainframe CPU CA Software only The CA Software is licensed by the specified number and model of CPU (the "Authorized Use Limitation"). "CPU" shall mean the central processing unit(s) capable of running the CA Software. Customer may only use CPUs specified when licensing the licenses herein and upon which the CA Software is installed and runs ("Designated CPUs"). Customer may change the Designated CPU on providing written notice to CA provided that such replacement CPU is of the same or lower CPU tier/power rating to the Designated CPU (save that Customer may Version P51.0 Page 35 of 38 7/23/201410:36 AM Agreement No. 7434 require an authorization key from CA in order to commence use of such CPU). Should Customer wish to add to the number of Designated CPUs or upgrade the then current Designated CPU(s) to a CPU with greater tier/power rating, Customer may elect to do so by providing CA with prior written notice of such additional CPU and/or upgrade to the Designated CPU(s) and by executing an order form to effect such addition/change and purchasing the applicable license. Mainframe MIPS CA Software only The CA Software is licensed by the specified number of MIPS (the "Authorized Use Limitation in MIPS"). "MIPS" means millionsof instructions per second. The MIPS capacity of a computer shall be calculated by reference to CA's published schedules of the MIPS capacity and if a computer isn't listed then the manufacturer's published specifications should apply. Further, in the event a special purpose processor, designed to perform one or more dedicated functions, is being used as a general purpose processor, CA shall treat such processor as a general purpose processorfor purposes of calculating Authorized Use Limitation in MIPS. "Customer Site" means the site(s) specified at the time of licensing the CA Software or the Customer Address if no Customer Site has been indicated. Customer may use the CA Software only on the specific computers upon which the CA Software is installed to run at the Customer Site or on computers which are linked, connected to and/or which can remotely access such computers, irrespective of the platform designations ofthe hardware or operating systems, provided that such computer is capable of accessing, using, executing or benefiting from the CA Software, subject to the aggregate MIPS capacity not exceeding the Authorized Use Limitation in MIPS. Mainframe MSU CA Software only The CA Software is licensed by the specified number of MSU (the "Authorized Use Limitation in MSU"). "MSU" means millions of service units. The MSU capacity shall be calculated with the aggregate computing power (expressed in millions of service units) by reference to CA's published schedules of the MSU capacity and if a computer isn't listed then the manufacturer's published specifications shall apply of all computers upon which the CA Software is installed to run at the Customer Site ("Customer Site" means the site(s) specified at the time of licensing the CA Software or the Customer Address if no Customer Site has been indicated) or computers which are linked, connected to and/or which can remotely access such computers, irrespective of the platform designations of the hardware or operatingsystems, provided that such computer is capable of accessing, using, executing or benefiting from the CA Software. Customer may use the CA Software subject to the aggregate MSU Capacity not exceeding the Authorized Use Limitation in MSU. Pervasive Software: The Pervasive Software is licensed by either by the number of Server or Users. Pervasive Software may be used to build integrations that connect to any authorized CA Clarity environment. Pervasive Data Integrator Engine/Agent for CA Clarity PPM* is licensed by the number of Servers. * includes one User license of Pervasive Data Integrator Analyst Studio for CA Clarity PPM Pervasive Data Integrator Analyst Studio for CA Clarity PPM is licensed by the number of Users. Pervasive Data Profiler Engine for CA Clarity PPM is licensed by the number of Servers. Pervasive Data Profiler Analyst Studio for CA Clarity PPM is licensed by the number of Users. "Server" means a single physical or virtual computer which processes data using one or more central processing units, and which is owned, leased or otherwise controlled by Customer. "User" means a single person listed in any Customer directory or network storage location whose access and use rights can be authenticated, authorized, or administered by the Pervasive Software. Unless otherwise specified, a User shall not be counted more than once or on a concurrent basis. CA Process Automation: CA Software means the CA Process Automation software described herein in object code form only. Version PS 1,0 Page 36 of 38 7/23/201410:36 AM Agreement No. 7434 "Agent" means a single installation of the agent software component of the CA Software on a specific operating system which can be identified as a unique host identification on a physical or virtual hardwareserver. "Orchestrator" means a single installation of the Orchestrator software component of the CA Software on a specific operating system which can be identified as a unique host identification on a physical or virtual hardware server. This installation can be a stand-alone Orchestrator or as a node of a new or existing clustered Orchestrator. "Connector" is the software program connecting the CA Software with specific named third party software or other CA software. For example, CA Process Automation Connector For CA Service Desk connects CA Process Automation with CA Service Desk. Each Connector may only be used to connect the CA Software with the specific named third party software or CA software program. "Premium Connector" means a Connector identified as "Premium" by CA. "Custom Operator" means a type of automation object within the CA Process Automation Orchestrator that can be created to enhance, modify, or restrict the capabilities of an existing "Connector". "Process" means a type of automation object within CA Process Automation Orchestrator that contains connectors and other logical constructs that define a set of actions that will take place when the "Process" is executed by the Orchestrator. "Process instance" means a single copy of a Process definition that has been scheduled to run (Queued state), is running (Running state), or has completed running (Failed or Completed state) on a particular "Orchestrator". "Concurrent Processes" means the number of CA Process Automation Process instances that are marked in the Running state within an Orchestrator at any given time. "Power Pack" means a combination of Process definitions, Premium Connectors, Custom Operators and other automation objects that are packaged together to implement a specific solution. The CA Software is licensed in different editions, as set forth in this Order Form, which authorizes the use of the specified number of Orchestrators, Agents, Connectors, and Concurrent processes (the "Authorized Use Limitation"). The various editions are: CA Process Automation Player License includes: one Orchestrator, forty Agents, all non -Premium Connectors, and two hundred Concurrent Processes per Orchestrator. This license requires the purchase of either a "Power Pack' or a Services contract for the implementation of a solution that will be executed by the Player. No new automation objects may be created with the Player License. Only modifications of the purchased Power Packs and any Services delivered content is allowed. CA Process Automation Ex Tess License includes: two Orchestrators, forty Agents, all non -Premium Connectors, and seventy-five Concurrent Processes per Orchestrator. CA Process Automation Standard License includes: two Orchestrators, unlimited Agents, three Premium Connectors, all non -Premium Connectors, and two hundred Concurrent Processes per Orchestrator. CA Process Auto ation Enter rise License includes: unlimited Orchestrators, unlimited Agents, twenty Premium Connectors, all non - Premium Connectors, and four hundred and seventy-five Concurrent Processes perOrchestrator. Version P61.0 Page 37 of 38 7/23/201410:36 AM Agreement No. 7434 CA Process Automation Level 1 Orchestrator includes: one Orchestrator and seventy-five Concurrent Processes per Orchestrator. CA Process Automation Level,2 Orchestrator includes: two Orchestrators and two hundred Concurrent Processes per Orchestrator. CA Process Automation Level 3 Orchestrator includes: three Orchestrators and four hundred and seventy-five Concurrent Processes per Orchestrator. CA Process Automation Premium LQnu[ector License includes the right to use a Premium Connector to connect to a single instance of the target application or system. CA Process M'ana ement for Workflows Li snag includes: unlimited Orchestrators, five Agents, and three Custom Operators. No Premium connectors are available for purchase with this license. The only CA product connectors that are available are those associated with the product(s) providing the entitlement. This is a limited use entitlement and its use is restricted to the context of Workflows associated with the CA product(s) providing the entitlement. The component limits are not cumulative across multiple instances of the license at any individual customer. The number of concurrent processes executing on any licensed Orchestrator may be exceeded as long as the total number of concurrent processes executing on all licensed Orchestrators is not exceeded. For example, if the license is for two Orchestrators with seventy-five Concurrent Processes per Orchestrator, one hundred Concurrent Processes could be utilized on one Orchestrator so long as only fifty Concurrent Processes are utilized on the second Orchestrator. Server: "Server" means a single physical or virtual computer which processes data using one or more central processing units, and which is owned, leased or otherwise controlled by Customer. CA Virtual Assurance for Infrastructure Managers and CA System Performance for Infrastructure Managers "Physical Socket" means an electrical component attached to a printed circuit board ("PCB") and electrically interconnects a central processing unit ("CPU") and PCB. A CPU is the specialized integrated circuit that executes binary programs and performs most logical functions or calculations. One physical CPU may have up to twelve (12) processing cores. Version PS 1.0 Page 38 of 38 7/23/201410:36 AM Agreement No. 7434 DOCUSIGN, INC. CORPORATE SUBSCRIBER TERMS AND CONDITIONS 021008 These Terms and Conditions are incorporated by this reference into the Order Form (collectively referred to as the "Agreement") entered into by DocuSign, Inc. ("DocuSign") and the customer identified in the Order Form ("Subscriber"). 1. DEFINITIONS "Account" means a unique account established by Subscriber to enable its Authorized Users to access and use the Subscription Service and, where applicable, other DocuSign Products. "Authorized User" means any employee of Subscriber, identified by a unique email address and user name, who is registered under the Account; provided that no two persons may register or use the Subscription Service as the same Authorized User. "Consulting Services" means any additional professional services to be delivered by DocuSign, such as integration consulting or assistance, custom development, training, and transition services, that are set forth in an Order Form or Work Order as described in Section 15. "DocuSign API" means the application programming interface that supports interoperation of applications with the Subscription Service. "DocuSign Products" means the products and services identified on an Order Form, which may include the Subscription Service, the Repository Services, the Consulting Services and any other DocuSign offerings. "eContract" refers to a contract, notice, disclosure, or other record or document deposited into the System by Subscriber for Processing using the Subscription Service. "Envelope" means an electronic record containing one or more eContracts consisting of a single page or a group of pages of data uploaded to the System. "Order Form" means a standard DocuSign order form or any other document separately and specifically approved by DocuSign that describes the DocuSign Products to be purchased by Subscriber and is signed by both parties. "Personal Data" means any of the following: (a) nonpublic personally identifiable information, including driver's license numbers, national identification numbers such as social security account numbers, credit card numbers, digital identity certificates; (b) personally identifiable financial information regarding a consumer (i) provided by a consumer to a financial institution, (ii) resulting from any transaction with the consumer or any service performed for the consumer by a financial institution, or (iii) otherwise obtained by the financial institution, including any list, description, or other grouping of consumers (and publicly available information pertaining to them) that is derived using any nonpublic personal information; (c) personally identifiable medical or health -related information. "Process" means any operation or set of operations performed upon Subscribers data, whether or not by automatic means, such as collection, recording, organization, storage, adaptation or alteration, retrieval, accessing, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, blocking, erasure or destruction. "Repository Services" means the Contract Repository or eVaulting Services, each as defined in the Terms and Conditions for Repository Services (available at htt J ,docusi rr,comlcom an dterms-and-conditionsleoriainal v121005), that are made the subject of an Order Form. "Specifications" means the technical specifications set forth in the "Subscription Service Specifications" available at htt :Rdocusi n.coml'com an is ecifications. "Subscription Service" means DocuSign's on -demand electronic signature service, which provides online display, certified delivery, acknowledgement, electronic signature, and storage services for eContracts via the Internet. "System" refers to the software systems and programs, communication and network facilities, and hardware and equipment used by DocuSign or its agents to provide the Subscription Service. "Term" means the period of effectiveness of this Agreement, as described in more detail in Section 9 below. "Transaction Data" means the metadata associated with an Envelope and maintained by DocuSign for the purpose of establishing a digital audit trail, such as transaction history, image hash value, method and time of Envelope deletion, sender and recipient names, email addresses and signaturelDs. Agreement No. 7434 2. THE SUBSCRIPTION SERVICE 2.1 During the Term and subject to these Terms and Conditions, DocuSign will provide the Subscription Service in accordance with the Specifications, and Subscriber will have the right to obtain an Account and register its Authorized Users, who may access and use the Subscription Service. The right to use the Subscription Service is: (a) limited to its Authorized Users (accordingly, Subscriber may not resell or otherwise provide or assist with the provision of the Subscription Service to any third party); and (b) conditioned on Subscriber's acknowledgement and agreement with the following: i) Nothing in this Agreement will be construed to make DocuSign a party to any eContract, and DocuSign makes no representation or warranty regarding the transactions sought to be effected by any eContract; ii) DocuSign maintains no control of or access to the contents of any eContract, and so the content, quality, and format of any eContract is at all times in the exclusive control and responsibility of Subscriber; iii) If Subscriber elects to use optional features designed to verify the identity of the intended recipient of an eContract ("Authentication Measures"), DocuSign will apply only those Authentication Measures (if any) selected by the Subscriber, but makes no representations or warranties about the appropriateness of any Authentication Measure and further, assumes no liability for the inability or failure by the intended recipient or other party to satisfy the Authentication Measure or to circumvent it; iv) Certain types of agreements and documents are excepted from electronic signature laws, such that they cannot be legally formed by electronic signatures, and additionally, various agencies may have promulgated specific regulations that apply to electronic signatures and electronic records. DocuSign assumes no responsibility to determine whether any particular eContract is an exception to applicable electronic signature laws, or whether it is subject to any particular agency promulgations, or whether it can be legally formed by electronic signatures; v) Subscriber is solely responsible for making available to third parties (including all parties to its eContracts) all contracts, documents, and other records required by applicable law, including, without limitation, electronic signature laws and other laws that may require records relating to a transaction to be retained or made accessible for a certain period of time; vi) Certain laws or regulations impose special requirements with respect to electronic transactions involving one or more "consumers," such as (among others) requirements that the consumer consent to the method of contracting and/or that the consumer be provided with a copy, or access to a copy, of a paper or other non -electronic, written record of the transaction. DocuSign assumes no responsibility to: (A) determine whether any particular transaction involves a consumer; (B) furnish or obtain any such consents or to determine if any such consents have been withdrawn; (C) provide any information or disclosures in connection with any attempt to obtain any such consents; (D) provide legal review of, or to update or correct any information or disclosures currently or previously given; (E) provide any such copies or access except as expressly provided in the Specifications for all transactions, consumer or otherwise; or (F) otherwise to comply with any such special requirements; and vii) Subscriber expressly undertakes to determine whether any consumer is involved in any eContract presented by its Authorized Users for Processing, and, if so, to comply with all requirements imposed by law on such eContracts or their formation. 3. SUBSCRIPTION PLANS AND USAGE PRICING 3.1 The pricing, features and options of the DocuSign Products selected by Subscriber are set forth in the Order Form. The Subscription Service is sold on a subscription basis and may be limited by usage ("Envelope Allowance"), or by the number of Authorized Users ("Seats"), or both. Optional features, such as Authentication Measures or fax -back services, may be purchased on a periodic or per -use basis. 3.2 If Subscriber selects an Envelope Allowance Subscription, then Subscriber is allowed to send the number of Envelopes in the Envelope Allowance specified in the Order Form during the Term. All Envelopes sent in excess of the Envelope Allowance will incur a per -Envelope charge that will be invoiced within 30 days of the date first incurred. The total number of Envelopes used is based on the sum of all Envelopes that have been sent for signature or for certified delivery from the Account. An Envelope will be deemed consumed at the time it is sent by an Authorized User, whether or not it has been received by the recipients or the recipients have performed any actions upon any eContract in the Envelope. 3.3 If Subscriber selects a Seat Subscription, then Subscriber is allowed to manually send Envelopes from the number of Seats specified in the Order Form during the Term. A Seat is defined as a natural person manually preparing and sending Envelopes, and excludes the Processing of Envelopes using automated batch or bulk sending operations, or the use of the Agreement No. 7434 DocuSign API for sending Envelopes. If the number of Envelopes sent from a particular Seat or a group of Seats is abusive and/or unduly burdensome (indicating automated Processing), DocuSign will promptly notify Subscriber and the parties will review the use -case scenario as well as any continued monitoring and additional Seats that may be required to be purchased. The number of Seats is determined by the total number of active Authorized Users listed in the membership of an Account at any one time. No two individuals may log onto or use the Subscription Service as the same Authorized User, but Subscriber may unregister or deactivate Authorized Users and replace them with other Authorized Users without penalty, so long as the number of active Authorized Users registered at any one time is equal to or less than the number of Seats purchased. The addition by Subscriber of more Authorized Users than the number of Seats purchased in an Order Form will result in an additional charge for one Seat per additional Authorized User for the remainder of the Term, to be invoiced immediately. 4. ADDITIONAL SUBSCRIBER RESPONSIBILITIES 4.1 Subscriber agrees that it will not use or permit the use of the Subscription Service to send unsolicited mass mailings outside its organization, it being understood that the term "unsolicited mass mailings" includes all statutory and other common definitions, including all Commercial Electronic Marketing Messages as defined in the U.S. CAN SPAMAct. 4.2 Subscriber agrees that it is solely responsible for the nature and content of all materials, works, data, statements, and other visual, graphical, video, written or audible communications of any nature submitted by any Authorized User or otherwise Processed through its Account. 4.3 Subscriber further agrees not to use or permit the use of the Subscription Service: (a) to communicate any message or material that is defamatory, harassing, libelous, threatening, or obscene; (b) in a way that violates or infringes upon the intellectual property rights or the privacy or publicity rights of any person or entity or that may otherwise be unlawful or give rise to civil or criminal liability (other than contractual liability of the parties under eContracts Processed through the Subscription Service); (c) in any manner that is likely to damage, disable, overburden, or impair the System or the Subscription Service or interfere in any way with the use or enjoyment of the Subscription Service by others; or (d) in any way that constitutes or encourages conduct that could constitute a criminal offense. 4.4 Although DocuSign does not monitor the content Processed through the Subscription Service, DocuSign may at any time suspend any use of the Subscription Service and/or remove or disable any content as to which DocuSign reasonably and in good faith believes is in violation of this Agreement. DocuSign agrees to provide Subscriber with notice of any suchsuspension or disablement before its implementation unless such suspension or disablement is necessary to comply with legal process or prevent imminent harm to DocuSign's System, the Subscription Service or any third party, in which case DocuSign will notify Subscriber of such suspension or disablement as soon as reasonably practicable thereafter. 5. INTELLECTUAL PROPERTY AND TRADEMARK LICENSE 5.1 DocuSign is the owner of various intellectual property and technology rights associated with the Subscription Service, its document management, digital signature, and notary system, including patent, copyright, trade secret, and trademark and service mark rights. Except for the rights expressly granted in this Agreement, DocuSign does not license or transfer to Subscriber or any Authorized User or other third party any of DocuSign's technology or other intellectual property or technology rights. All right, title, and interest in and to DocuSign's technology and intellectual property will remain solely with DocuSign. Subscriber agrees that it will not, directly or indirectly, reverse engineer, decompile, disassemble, or otherwise attempt to derive source code or other trade secrets from or about any of the DocuSign Products or DocuSign's technology. DocuSign agrees that data and information provided by Subscriber under this Agreement shall remain, as between Subscriber and DocuSign, owned by Subscriber. 5.2 DocuSign hereby grants to users and licensees of its products and services a limited, revocable, nonexclusive and nontransferable right to use DocuSign's regular trade names, trademarks, titles and logos ("Licensed Marks") solely for purposes of identifying DocuSign's products and services. Details of this trademark license are availableat: htt //www,docusa nn.com/trademark-Vi'cense. 6. CUSTOMER SUPPORT DocuSign will provide customer support to Subscriber in accordance with the package that is identified on the Order Form, as furtherdetailedathtt 14 Av.docusu n.00mi roducts/su ort- Bans. 7. eCONTRACT STORAGE AND DELETION 7.1 DocuSign will store in accordance with the Specifications all completed eContracts sent by Subscriber until the termination or expiration of the Agreement, unless otherwise directed by Subscriber. Copies of stored eContracts may be retrieved by Subscriber at any time during that period, provided that following the expiration or termination of the Agreement, Subscriber may Agreement No. 7434 request DocuSign's assistance in retrieving completed eContracts still remaining on the System pursuant to the transition services terms described in Section9.4. 7.2 Prior to the expiration or termination of this Agreement, Subscriber may elect to purchase post -expiration or post - termination storage services for their completed eContracts. Where Subscriber opts not to purchase storage services, all copies of eContracts may be deleted by DocuSign without prior notice after the period available for transition services has expired pursuant to the terms described in Section 9.4. Subscriber may, at its option and wholly at Subscriber's risk, direct that any eContract be deleted at a time stated by Subscriber and prior to the end of the Term. 7.3 DocuSign may at its sole discretion delete an uncompleted eContract from the System immediately and without notice upon earlier of: a) expiration of the Envelope (where Subscriber has established an expiration for such Envelope, not to exceed 365 days); or b) expiration of the Term. 7.4 DocuSign will retain the Transaction Data permanently, provided that any Transaction Data that constitutes Confidential Information of Subscriber will at all times maintain that status and DocuSign will comply with its obligations in Section 13. 8. FEES AND PAYMENT TERMS 8.1 Subscriber will pay DocuSign the amounts set forth in each Order Form. An Order Form is not binding until it is executed by both DocuSign and Subscriber, at which point it will be deemed to be incorporated into this Agreement. Unless otherwise specified in an applicable Order Form, the first invoice will be submitted to Subscriber within 30 days after the Order Start Date, and Subscriber will pay all amounts due within 30 days of the date of the applicable invoice. 8.2 If Subscriber's usage under an Envelope Allowance Subscription exceeds the Envelope Allowance prior to the end of the Term, the unpaid balance of the Order Form for such Envelope Allowance Subscription shall become immediately due and payable. 8.3 Any undisputed amount not paid when due will be subject to finance charges equal to 1.5% of the unpaid balance per month or the highest rate permitted by applicable usury law, whichever is less, determined and compounded daily from the date due until the date paid. Subscriber will reimburse any costs or expenses (including reasonable attorneys' fees) incurred by DocuSign to collect any undisputed amount that is not paid when due. DocuSign may accept any check or payment in any amount without prejudice to DocuSign's right to recover the balance of the amount due or to pursue any other right or remedy. Amounts due to DocuSign under this Agreement may not be withheld or offset by Subscriber for any reason against amounts due or asserted to be due to Subscriber from DocuSign. All amounts payable under this Agreement are denominated in United States dollars, and Subscriber will pay all such amounts in United States dollars. 8.4 Taxes. Other than federal and state net income taxes imposed on DocuSign by the United States, Subscriber will bearall taxes, duties, and other governmental charges (collectively, "taxes") resulting from this Agreement or transactions conducted in relation to this Agreement or the DocuSign Products. If a tax is imposed on DocuSign by a jurisdiction outside the United States, Subscriber will not be obligated to bear that tax to the extent: (a) the tax is allowable as a credit against the United States federal income taxes of DocuSign; (b) Subscriber reduces such tax to the extent possible, giving effect to the applicable Income Tax Convention between the United States and other jurisdictions; and (c) Subscriber furnishes DocuSign with such evidence as the United States taxing authorities may require to claim the credit. Subscriber will pay any additional taxes as are necessary to ensure that the net amounts received and retained by DocuSign after all such taxes are paid are equal to the amounts that DocuSign would have been entitled to in accordance with this Agreement as if the taxes did notexist. 9. TERM AND TERMINATION 9.1 Term. Unless sooner terminated as stated below, and subject to Section 17 with respect to Work Orders (as defined below), the effectiveness of this Agreement will commence upon the Order Start Date and will continue for the term specified on the Order Form (the "Term"). 9.2 Termination for Cause. If either party commits a material breach or default in the performance of any of its obligations under this Agreement, then the other party may terminate this Agreement by giving the defaulting party written notice of termination if the material breach or default in performance is not cured within 30 days after the defaulting party receives notice thereof. Without limiting the foregoing, any failure by Subscriber to timely pay to DocuSign any amounts owing under this Agreement will constitute a material breach of this Agreement. If Subscriber fails to timely pay any amounts due for servicesto be performed by DocuSign, then without limitation to any of its other rights or remedies, DocuSign may suspend performance of such services until it receives all amounts due. 9.3 Post -Termination Obligations. If this Agreement expires or is terminated for any reason: (a) Subscriber will pay to DocuSign any amounts required to be paid under this Agreement that have accrued prior to, and remain unpaid as of, the date of Agreement No. 7434 termination or expiration (including Subscription fees, which become due upon termination of this Agreement as set forth in an Order Form, and any one-time or recurring fees through the end of the billing cycle in which termination occurs); (b) any and all liabilities accrued prior to the effective date of the termination will survive; (c) Subscriber will destroy all copies of DocuSign software, documentation, and materials within five business days of such termination, and immediately thereafter, if requested by DocuSign, provide DocuSign with a written certification signed by an authorized Subscriber representative certifying that all copies of software, documentation, and materials have been destroyed; (d) licenses to use DocuSign software and the provision of DocuSign services will immediately end; and (e) the parties' rights and obligations under Sections 1, 7.4, 9.3, 9.4, 10.3, and 11 through 14 will survive. 9.4 Transition Services. Upon expiration or termination of this Agreement for any reason, at Subscriber's request and at DocuSign's then -current standard professional services rates plus expenses, DocuSign shall provide reasonable transition services for a period not to exceed 90 days to assist Subscriber in moving Subscriber's data to another provider or exporting eContracts to external media. As part of such transition services, DocuSign shall at a minimum transfer, and cause any of its independent contractors to transfer, all data and electronic files associated with the Subscription Service. At itsthen-current standard professional services rates, DocuSign shall at Subscriber's request further cooperate with Subscriber in the development of a transition plan and shall use reasonable efforts to assist Subscriber and/or another service provider in the transition. DocuSign may at its discretion require advance payment or other adequate security for payment as DocuSign may consider appropriate in connection with or as a condition to the provision of services described in this section. 10. WARRANTIES AND DISCLAIMERS 10.1 DocuSign Warranties. DocuSign represents and warrants that: (a) the Subscription Service as delivered toSubscriber and used in accordance with the Specifications will not infringe on any United States patent, copyright or trade secret; (b) the Subscription Service shall be performed in accordance with the Specifications in their then -current form at the time of the provision of such Subscription Service; (c) any DocuSign Products that are software shall be free of harmful or illicit code, trapdoors, viruses, or other harmful features; (d) the proper use of the Subscription Service by Subscriber in accordance with the Specifications and applicable law in the formation of an eContract not involving any consumer will be sufficient under the Electronic Signatures in Global and National Commerce Act, 15 U.S.C. §§ 7001 et seq. (the "ESIGN Act") to support the validity of such formation, to the extent provided in the ESIGN Act; (e) the proper use of the Subscription Service by Subscriber in accordance with the Specifications and applicable law in the formation of an eContract involving a consumer will be sufficient under the ESIGN Act to support the validity of such formation, to the extent provided in the ESIGN Act, so long as and provided that Subscriber complies with all special requirements for consumer eContracts, including and subject to those referenced in Section 2.1(vi) and (vii) above; and (f) DocuSign has implemented information security policies and safeguards to preserve the security, integrity, and confidentiality of Personal Data and to protect against unauthorized access and anticipated threats or hazards thereto, that meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information as set forth in Section 501 (b) of the Gramm -Leach -Bliley Act. 10.2 Mutual Warranties. Each party represents and warrants to the other that: (a) this Agreement has been duly executed and delivered and constitutes a valid and binding agreement enforceable against such party in accordance with its terms; (b) no authorization or approval from any third party is required in connection with such parry's execution, delivery, or performance of this Agreement; and (c) the execution, delivery, and performance of this Agreement does not violate the laws of any jurisdiction or the terms or conditions of any other agreement to which it is a party or by which it is otherwise bound. 10.3 Disclaimer. EXCEPT FOR THE EXPRESS REPRESENTATIONS AND WARRANTIES STATED IN SECTIONS 10.1 AND 10.2 ABOVE (WHICH ARE NOT APPLICABLE TO CONSULTING SERVICES), DOCUSIGN MAKES NO ADDITIONAL REPRESENTATION OR WARRANTY OF ANY KIND -- WHETHER EXPRESS, IMPLIED IN FACT OR BY OPERATION OF LAW, OR STATUTORY -- AS TO ANY MATTER WHATSOEVER. DOCUSIGN EXPRESSLY DISCLAIMS ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. DOCUSIGN DOES NOT WARRANT THAT THE DOCUSIGN PRODUCTS (INCLUDING CONSULTING SERVICES OR RELATED DELIVERABLES, IF ANY), ARE OR WILL BE ERROR -FREE, WILL MEET SUBSCRIBER'S REQUIREMENTS, OR BE TIMELY OR SECURE. SUBSCRIBER WILL NOT HAVE THE RIGHT TO MAKE OR PASS ON ANY REPRESENTATION OR WARRANTY ON BEHALF OF DOCUSIGN TO ANY THIRD PARTY. 11. INDEMNIFICATION 11.1 By DocuSign. DocuSign will defend Subscriber, and its employees, directors, agents, and representatives ("Indemnified Party") from any actual or threatened third party claim arising from: (a) any breach by DocuSign of its confidentiality obligations in Section 13, and/or (b) alleged infringement by DocuSign of any third party intellectual property rights (each a "Subscriber Claim"). Agreement No. 7434 11.2 By Subscriber. Subscriber will defend DocuSign, and its employees, directors, agents, and representatives ("Indemnified Party") from any actual or threatened third party claim arising from: (a) any breach by Subscriber of its confidentiality obligations in Section 13, and/or (b) alleged infringement by Subscriber of any third party intellectual property rights, and/or (c) the content submitted by any Authorized User or otherwise Processed through Subscriber's Account (each a "DocuSign Claim"). 11.3 Procedures. The parties' respective indemnification obligations above are conditioned on: (a) the Indemnified Party gives the Indemnifying Party prompt written notice of the Subscriber Claim or DocuSign Claim (as the case may be, a "Claim"); (b) the Indemnifying Party has full and complete control over the defense and settlement of the Claim; (c) the Indemnified Party provides assistance in connection with the defense and settlement of the Claim as the Indemnifying Party may reasonably request; and (d) the Indemnified Party complies with any settlement or court order made in connection with the Claim. The Indemnifying Party will indemnify the Indemnified Party against: (i) all damages, costs, and attorneys' fees finally awarded against any of them in any Claim under this Section 11; (ii) all out-of-pocket costs (including reasonable attorneys' fees) reasonably incurred by any of them in connection with the defense of the Claim (other than attorneys' fees and costs incurred without the Indemnifying Party's consent after it has accepted defense of such Claim); and (iii) if any Claim arising under this Section 11 is settled by the Indemnifying Party or with its approval, then the Indemnifying Party will pay any amounts to any third party agreed to by the Indemnifying Party in settlement of any such Claims. 12. LIMITATIONS OF LIABILITY 12.1 Disclaimer of Consequential Damages. EXCEPT WITH RESPECT TO INDEMNIFICATION OBLIGATIONS OF SECTION 11, NOTWITHSTANDING ANYTHING TO THE CONTRARY CONTAINED IN THIS AGREEMENT, NEITHER PARTY WILL, UNDER ANY CIRCUMSTANCES, BE LIABLE TO THE OTHER PARTY FOR CONSEQUENTIAL, INCIDENTAL, SPECIAL, OR EXEMPLARY DAMAGES ARISING OUT OF OR RELATED TO THE TRANSACTIONS CONTEMPLATED UNDER THIS AGREEMENT (INCLUDING WITH RESPECT TO CONSULTING SERVICES, IF ANY), INCLUDING, BUT NOT LIMITED TO, LOST PROFITS OR LOSS OF BUSINESS, EVEN IF APPRISED OF THE LIKELIHOOD OF SUCH DAMAGES OCCURRING. 12.2 Capon Liability. EXCEPT WITH RESPECT TO INDEMNIFICATION OBLIGATIONS OF SECTION 11, UNDER NO CIRCUMSTANCES WILL EITHER PARTY'S TOTAL LIABILITY OF ALL KINDS ARISING OUT OF OR RELATED TO THIS AGREEMENT (INCLUDING, BUT NOT LIMITED TO, WARRANTY CLAIMS AND WITH RESPECT TOCONSULTING SERVICES, IF ANY), REGARDLESS OF THE FORUM AND REGARDLESS OF WHETHER ANY ACTION OR CLAIM IS BASED ON CONTRACT, TORT, OR OTHERWISE, EXCEED THE TOTAL AMOUNT PAID BY SUBSCRIBER TO DOCUSIGN UNDER THIS AGREEMENT DURING THE 12 MONTHS PRECEDING THE DATE OF THE ACTION OR CLAIM. 12.3 Independent Allocations of Risk. EACH PROVISION OF THIS AGREEMENT THAT PROVIDES FOR A LIMITATION OF LIABILITY, DISCLAIMER OF WARRANTIES, OR EXCLUSION OF DAMAGES REPRESENTS AN AGREED ALLOCATION OF THE RISKS OF THIS AGREEMENT BETWEEN THE PARTIES. THIS ALLOCATION IS REFLECTED IN THE PRICING OFFERED BY DOCUSIGN TO SUBSCRIBER AND IS AN ESSENTIAL ELEMENT OF THE BASIS OF THE BARGAIN BETWEEN THE PARTIES. EACH OF THESE PROVISIONS IS SEVERABLE AND INDEPENDENT OF ALL OTHER PROVISIONS OF THIS AGREEMENT, AND EACH OF THESE PROVISIONS WILL APPLY EVEN IF THE WARRANTIES IN THIS AGREEMENT HAVE FAILED OF THEIR ESSENTIAL PURPOSE. 13. CONFIDENTIALITY 13.1 "Confidential Information" means any trade secrets or other information of DocuSign or Subscriber, whether of a technical, business, or other nature (including, without limitation, in the case of DocuSign, DocuSign software and related information, and in the case of Subscriber, Personal Data and eContracts), that is disclosed to the other party (the "Recipient"). Confidential Information does not include any information that: (a) was known to Recipient prior to receiving it from the disclosing party; (b) is independently developed by Recipient without use of or reference to any Confidential Information of the other party; (c) is acquired by Recipient from another source that did not receive it in confidence from the other party to this Agreement; or (d) is or becomes part of the public domain through no fault or action of Recipient. 13.2 Restricted Use and Nondisclosure. During and after the Term, Recipient will: (a) use the Confidential Information of the other party solely for the purpose for which it is provided; (b) not disclose such Confidential Information to a third party; and (c) protect such Confidential Information from unauthorized use and disclosure to the same extent (but using no less than a reasonable degree of care) that it protects its own Confidential Information of a similar nature. Agreement No. 7434 13.3 Required Disclosure. If Recipient is required by law to disclose Confidential Information of the other party or the terms of this Agreement, Recipient must give prompt written notice of such requirement before such disclosure and assist the disclosing party to obtain where reasonably available an order protecting the Confidential Information from public disclosure. 13.4 Return of Materials. Except for as provided in Section 7.4, upon written request by the disclosing party, Recipientwill destroy or deliver to the disclosing party all of the disclosing party's Confidential Information that Recipient may have in its possession or control. 13.5 Ownership. Recipient acknowledges that, as between the parties, all Confidential Information it receives from the disclosing party, including all copies thereof in Recipient's possession or control, in any media, is proprietary to and exclusively owned by the disclosing party. Nothing in this Agreement grants Recipient any right, title or interest in or to any of the disclosing party's Confidential Information. Recipient's incorporation of the disclosing party's Confidential Information into any of its own materials shall not render Confidential Information non -confidential. 13.6 Remedies. Recipient acknowledges that any actual or threatened violation of this confidentiality provision may cause irreparable, non -monetary injury to the disclosing party, the extent of which may be difficult to ascertain, and therefore agrees that the disclosing party shall be entitled to seek injunctive relief in addition to all remedies available to the disclosing party at law and/or in equity. Absent written consent of the disclosing party, the burden of proving that the disclosing party's Confidential Information is not, or is no longer, confidential or a trade secret shall be on the Recipient. 13.7 Existing Obligations. The obligations in this Section 13 are in addition to, and supplement, each party's obligations of confidentiality under applicable law and/or under any nondisclosure or other agreement between the parties. 14. GENERAL 14.1 Relationship. At all times, the parties are independent actors, and are not the agent or representative of the other. This Agreement is not intended to create a joint venture, partnership, or franchise relationship, or give rise to any third party beneficiary. Subscriber must not represent to anyone that Subscriber is an agent of DocuSign or is otherwise authorized tobind or commit DocuSign in any way without DocuSign's prior authorization. 14.2 Assignability. Subscriber may not assign its rights, duties, or obligations under this Agreement without DocuSign's prior written consent. If consent is given, this Agreement will bind Subscriber's successors and assigns. Any attempt by Subscriber to transfer its rights, duties, or obligations under this Agreement except as expressly provided in this Agreement is void. Notwithstanding the foregoing, either party may assign this Agreement to a successor of its business without the other parry's consent. 14.3 Nonsolicitation. During the Term of this Agreement and for a period of one year thereafter, Subscriber will not, directly or indirectly, employ or solicit the employment or services of a DocuSign employee or independent contractor without the prior written consent of DocuSign. 14.4 Notices. Any notice required or permitted to be given in accordance with this Agreement will be effective if it is in writing and sent using: (a) the "acknowledge receipt" function of the Subscription Service; (b) by certified or registered mail; or (c) insured courier, to the appropriate party at the address set forth on the Order Form. Either party may change its addressfor receipt of notice by notice to the other party in accordance with this Section. Notices are deemed given upon receipt if delivered using the Subscription Service, two business days following the date of mailing, or one business day following delivery to a courier. 14.5 Force Majeure. Except for any payment obligations, neither party will be liable for, or be considered to be in breach ofor default under this Agreement on account of, any delay or failure to perform as required by this Agreement as a result of any cause or condition beyond such party's reasonable control, so long as such party uses all commercially reasonable efforts to avoid or remove such causes of non-performance or delay. 14.6 Dispute Resolution. In the event of any dispute regarding any right or obligation under this Agreement, the aggrieved party shall notify the other party in a writing describing the dispute ("Notice of Dispute"). Upon receipt of the Notice of Dispute, the parties shall arrange a meeting between their representatives. Over a period not to exceed 10 business days after receipt of Notice of Dispute ("Period"), the parties shall engage in good faith negotiations to resolve such dispute. If the parties' representatives are unable to resolve the dispute at such meetings during the Period, then each party may seek any remedies available to it in law or equity. Notwithstanding the foregoing, either party may seek injunctive relief at any time. Each party hereby irrevocably waives, to the fullest extent permitted by law, any and all right to trial by jury in any legal proceeding arising out of or relating to this Agreement. Agreement No. 7434 14.7 Governing Law. This Agreement will be interpreted, construed, and enforced in all respects in accordance with the local laws of the State of Washington, U.S.A., without reference to its choice of law rules to the contrary. The provisions of the 1980 U.N. Convention on Contracts for the International Sale of Goods are expressly excluded and do not apply to this Agreement. Any legal action by Subscriber arising under this Agreement must be initiated within two years after the cause of action arises. 14.8 Waiver. The waiver by either party of any breach of any provision of this Agreement does not waive any other breach. The failure of any party to insist on strict performance of any covenant or obligation in accordance with this Agreement will not be a waiver of such party's right to demand strict compliance in the future, nor will the same be construed as a novation of this Agreement. 14.9 Severability. If any part of this Agreement is found to be illegal, unenforceable, or invalid, the remaining portions of this Agreement will remain in full force and effect. If any material limitation or restriction on the grant of any license to Subscriber under this Agreement is found to be illegal, unenforceable, or invalid, the license will immediatelyterminate. 14.10 Counterparts. This Agreement may be executed in any number of identical counterparts, notwithstanding that the parties have not signed the same counterpart, with the same effect as if the parties had signed the same document. All counterparts will be construed as and constitute the same agreement. 14.11 Entire Agreement. This Agreement is the final and complete expression of the agreement between these parties regarding the DocuSign Products. This Agreement supersedes, and the terms of this Agreement govern, all previous oraland written communications regarding these matters. This Agreement may be changed only by a written agreement signed byan authorized agent of both parties. ADDITIONAL TERMS AND CONDITIONS FOR CONSULTING SERVICES The following additional terms and conditions apply to Consulting Services, if any, that are made the subject of an Order Form. 15. SERVICES, WORK ORDERS, AND CHANGE ORDERS 15.1 Services. Subject to the terms and conditions of this Agreement, DocuSign will, if ordered as provided hereunder, perform for Subscriber certain Consulting Services. 15.2 Work Orders. The specific details of the Consulting Services to be performed will be determined on a per -project basis, and the details for each project will be described in a Work Order that is executed by both parties (called the "Work Order" for purposes of the Consulting Services). An Order Form that lists a DocuSign standard training or consulting package as a DocuSign Product constitutes a Work Order. Once executed by both parties, each Work Order will be a unique agreementthat incorporates the terms of this Agreement and stands alone with respect to all other Order Forms. If there is a conflictbetween the terms of this Agreement and the terms of a Work Order, the terms of this Agreement will control unless the Work Order states that a specific provision of this Agreement will be superseded by a specific provision of the Work Order. 15.3 Change Orders. Unless otherwise specified in a Work Order, Subscriber may reasonably request in writing that revisions be made with respect to the Consulting Services or deliverables set forth in that Work Order ("Change Order"). If a Change Order recites revisions that materially increase the scope of the Consulting Services or the effort required to deliver deliverables under the applicable Work Order, then within 10 business days after DocuSign's receipt of the Change Order, DocuSign will deliver to Subscriber a written, revised Work Order reflecting DocuSign's reasonable determination of the revised Consulting Services, deliverables, delivery schedule, payment schedule, and adjusted fees or fee estimates, if any, that will apply to the implementation of the revisions. If Subscriber approves the revised Work Order, then the parties will execute it, and upon execution, the revised Work Order will supersede the then -existing Work Order. If Subscriber does not approve the revised Work Order within 10 business days after its receipt by Subscriber, the then -existing Work Order will remain in full force and effect, and DocuSign will have no further obligation with respect to the applicable Change Order. 16. PERFORMANCE OF CONSULTING SERVICES 16.1 Project Management. For each project described in a Work Order, each party will designate a single point of contact within its organization to manage the project ("Project Leader"). The Project Leaders will meet as necessary to managethe Consulting Services to be performed under a Work Order. Disputes will be escalated to more senior executives if the Project Leaders are unable to resolve a problem. DocuSign's Project Leader will provide Subscriber's Project Leader with regular reports on the status of the Consulting Services at least once per month. 16.2 Performance Standard. DocuSign warrants to Subscriber that the Consulting Services will be performed in a good and workmanlike manner in accordance with standard industry practice and the applicable Work Order, including any specifications Agreement No. 7434 in such Work Order. DocuSign will complete the Consulting Services, including the delivery of any deliverables, in accordance with the schedule of times and milestones specified in the Work Order. 16.3 Fees. Unless otherwise specified in a Work Order, Subscriber will pay DocuSign for Consulting Services on a time -and - materials basis at DocuSign's then -current rates and under payment terms described in this Agreement ("Consulting Fees"). 16.4 Disclaimer. EXCEPT FOR WARRANTIES PROVIDED HEREIN OR EXPRESSLY IDENTIFIED AS SUCH IN A WORK ORDER, THE CONSULTING SERVICES AND ANY RELATED DELIVERABLES WILL BE PROVIDED AS -IS AND WITHOUT WARRANTY OF ANY KIND. DOCUSIGN EXPRESSLY DISCLAIMS ALL IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON -INFRINGEMENT AS TO ANY AND ALL CONSULTING SERVICES AND RELATED DELIVERABLES. 17. TERM AND TERMINATION OF WORK ORDERS 17.1 Term. Each Work Order is non -cancellable except pursuant to a Change Order, and will commence on the specified effective date and will continue until each party's obligations under the Work Order have been fulfilled or the Work Order is terminated as provided in the Work Order. 17.2 Effect of Termination. If any Work Order is terminated in accordance with this Section 17, then Subscriber will pay to DocuSign any Consulting Fees and all other payment obligations accrued and payable for the Consulting Services performed under the terminated Work Order through the effective date of the termination. If a Work Order is terminated for any reason other than for material breach by DocuSign, Subscriber will pay to DocuSign all Consulting Fees due under the Work Order had the Work Order not been terminated and had the Consulting Services been fully performed in accordance with the schedule then in effect, which amount owing will be evidenced in a final termination invoice to be provided by DocuSign to Subscriber. The amount of Consulting Services Fees specified in such termination invoice from DocuSign will be final and binding on the parties, absent manifest error. 18. PROPRIETARY RIGHTS 18.1 Subscriber Materials. Any materials provided by Subscriber to DocuSign specifically for use by DocuSign in the course of the Consulting Services ("Subscriber Materials") will be used and disclosed solely as required to perform the Consulting Services. As between the parties, Subscriber will continue to own the Subscriber Materials. 18.2 Inventions. Except as expressly set forth to the contrary in a Work Order, all works of authorship, inventions, discoveries, improvements, methods, processes, formulas, designs, techniques, and information: (a) conceived, discovered, developed or otherwise made by DocuSign, solely or in collaboration with others, in the course of performing the Consulting Services; or (b) that form all or part of a deliverable provided as part of the Consulting Services, whether developed as part of the Consulting Services or separately, but excluding Subscriber Materials (as defined in Section 18.1) (collectively, "Inventions"), will be the sole property of DocuSign. Upon and subject to final payment by Subscriber of all amounts owing to DocuSign, DocuSign hereby grants to Subscriber a nonexclusive, perpetual, worldwide, royalty -free license to use, copy, modify, and prepare derivative works of the Inventions solely for purposes of Subscriber's internal business operations only. Agreement No. 7434 MASTER PURCHASE AGREEMENT This Master Purchase Agreement (this "Agreement") is entered into as of [DATE] (the "Effective Date") by and between FireEye (as defined below) and a corporation, with its principal place of business at ,,,,,,,, __ ("Customer"). This Agreement will govern Customer's initial purchase of FireEye Offerings and any future orders by Customer as agreed between the parties in writing. FireEye shall provide its Offerings pursuant to the terms and conditions below. For good and valuable consideration, the parties hereby agree as follows: Structure and Order of Precedence. This Agreement provides the general terms under which the Customer may use FireEye's various Offerings. The explicit rights for the Customer to use and receive Products, Support Services or Subscriptions or otherwise engage with specific FireEye Offerings are set forth in the applicable Exhibit. In the event of conflict between any of the terms in this Agreement and an Exhibit, the Exhibit shall govern. GENERAL TERMS APPLICABLE TO ALL FIREEYE OFFERINGS 1. DEFINITIONS. 1.1 "Content Feed" means all intelligence and content feeds associated with Products, which may consist of inbound and outbound feeds that are part of FireEye's Dynamic Threat Intelligence (DTI) Cloud, downloads of Indicators for use with Products, and/or intelligence provided as part of the Advanced Threat Intelligence (ATI) Subscription. 1.2 "Deliverables" means the written reports that are created specifically for Customer as a result of the Professional Services provided hereunder. 1.3 "Documentation" means the user manuals generally provided in writing by FireEye to end users of the Products and Subscriptions in electronic format, as amended from time to time by FireEye. 1.4 "FireEye" means (i) FireEye, Inc., a Delaware corporation with its principal place of business at 1440 McCarthy Blvd., Milpitas, CA, 95035 with respect to Offerings that are shipped to, deployed or rendered inside of North America (including the United States, Mexico, Canada and the Caribbean), Central America and South America (collectively, the "Americas"); or (ii) with respect to all Offerings that are shipped to, deployed or rendered outside of the Americas, FireEye Ireland Limited, a company incorporated under the laws of Ireland with principal place of business at 2 Park Place, City Gate Park, Mahon, Cork, Ireland. FireEye includes the operating divisions Mandiant and iSIGHT. 1.5 "FireEye Materials" means all FireEye proprietary materials, Deliverables, intellectual property related to Products or Subscriptions, (such as all rights in any software incorporated into a Product or Subscription, copyrights, and patent, trade secret and trademark rights related to Products, and screens associated with Products or Subscriptions), Documentation, any hardware and/or software used by FireEye in performing Services or providing Subscriptions, Content Feeds, FireEye's processes and methods (including any forensic investigation processes and methods), Indicators of Compromise, materials distributed by FireEye during Training, and any FireEye templates and/or forms, including report and presentation templates and forms. FireEye Materials does not include Third Party Materials. 1.6 "Indicators of Compromise" or "Indicators" means specifications of anomalies, configurations, or other conditions that FireEye is capable of identifying within an information technology infrastructure, used by FireEye in performing Professional Services and providing Subscriptions. 1.7 "Intellectual Property Rights" means copyrights (including, without limitation, the exclusive right to use, reproduce, modify, distribute, publicly display and publicly perform the copyrighted work), trademark rights (including, without limitation, trade names, trademarks, service marks, and trade dress), patent rights (including, without limitation, the exclusive right to make, use and sell), trade secrets, moral rights, right of publicity, authors' rights, contract and licensing rights, goodwill and all other intellectual property rights as may exist now and/or hereafter come into existence and all renewals and extensions thereof, regardless of whether such rights arise under the law of the United States or any other state, country or jurisdiction. FireEye Master Purchase Agreement (Rev. 8/2016) Agreement No. 7434 1.8 "Offerings" means, collectively, Products, Subscriptions, Training, Professional Services and Support Services. 1.9 "Order" means a written purchase order or similar ordering document, signed or submitted to FireEye by Customer and approved by FireEye, under which Customer agrees to purchase Offerings. 1.10 "Products" means the FireEye software and hardware appliances (which may include embedded software or firmware components) as described in Exhibit A to this Agreement. 1.11 "Professional Services" means, collectively, those security consulting services provided by FireEye under a Statement of Work and/or set forth on an Order, which may consist of Product -related services such as deployment, configuration or installation services; proactive security consulting such as penetration testing, vulnerability assessments or compromise assessments; or incident response or other remediative services. 1.12 "Service" or "Services" means the Professional Services, Support Services and Training. 1.13 "Statement of Work" or "SOW" means a mutually agreed -upon document between FireEye and Customer, describing Professional Services, rates and timelines (if applicable) for those Professional Services, and incorporating this Agreement. 1.14 "Subscription" means a service provided by FireEye for a fixed term, under which FireEye provides access to certain features, functionality, and/or information, as described in the applicable Exhibit for each Subscription attached to this Agreement. 1.15 "Support Services" means the Product support and maintenance services provided by FireEye with respect to each Product, and that are described in the applicable Exhibit for each Product attached to this Agreement. 1.16 "Third Party Materials" means software or other components that are licensed to FireEye by third parties for use in FireEye's Offerings. 1.17 "Training" means training in the use of Products, or on security -related topics in general, provided by FireEye. 2. ORDERS AND STATEMENTS OF WORK. 2.1. Orders. Customer may purchase Offerings by submitting an Order. If accepted by FireEye, the "Order Effective Date" will be the date of the Order. All Orders will be governed by this Agreement. For clarity, FireEye will not be obligated to ship any Product, or provide any Services, Training or Subscriptions until Customer has issued a valid Order for those Offerings. 2.2. Statements of Work. Each Statement of Work will incorporate and be governed by this Agreement. The "Statement of Work Effective Date" will be the date both Customer and FireEye have agreed to the Statement of Work, either by executing the Statement of Work or by issuing and accepting an Order for the Professional Services described on the Statement of Work. For clarity, FireEye will not be obligated to perform any Professional Services until a SOW describing those Professional Services has been agreed by both parties or an Order listing those Professional Services has been accepted by FireEye. 3. PAYMENT. Customer agrees to purchase the Offerings for the prices set forth in each Order and/or Statement of Work, as applicable ("Fees"). If Customer purchases through a FireEye partner (such as an authorized reseller or distributor, collectively, "FireEye Partners"), all fees and other procurement and delivery terms shall be agreed between Customer and the applicable partner. If Customer purchases directly from FireEye, Customer will make full payment in the currency specified in FireEye's invoice, without set-off and in immediately available funds, within thirty (30) days of the date of each invoice. All Fees are non -cancelable and non-refundable. All Fees described on an Order will be fully invoiced in advance, unless otherwise agreed by FireEye. Unless otherwise specified in a Statement of Work, all Fees related to Professional Services will be invoiced Confidential FireEye Rev. 8/2016 Page 2 Agreement No. 7434 fully in advance. Customer shall reimburse FireEye for any and all expenses incurred so long as such expenses are directly attributable to the Services or Subscriptions performed for or provided to Customer. FireEye will provide appropriate vouching documentation for all expenses exceeding $25. If any payment is more than fifteen (15) days late, FireEye may, without limiting any remedies available to FireEye, terminate the applicable Order or Statement of Work or suspend performance until payment is made current. Customer will pay interest on all delinquent amounts at the lesser of 1.5% per month or the maximum rate permitted by applicable law. All Fees are exclusive of all present and future sales, use, excise, value added, goods and services, withholding and other taxes, and all customs duties and tariffs now or hereafter claimed or imposed by any governmental authority upon the Offerings which shall be invoiced to and paid by the Customer. If Customer is required by law to make any deduction or withholding on any payments due to FireEye, Customer will notify FireEye and will pay FireEye any additional amounts necessary to ensure that the net amount FireEye receives, after any deduction or withholding, equals the amount FireEye would have received if no deduction or withholding had been required. Additionally, Customer will provide to FireEye evidence, to the reasonable satisfaction of FireEye, showing that the withheld or deducted amounts have been paid to the relevant governmental authority. For purposes of calculating sales and similar taxes, FireEye will use the address set forth on the Order or Statement of Work, as applicable, as the jurisdiction to which Offerings and shipments are delivered unless Customer has otherwise notified FireEye in writing as of the Order Effective Date or Statement of Work Effective Date, as applicable. Customerwill provide tax exemption certificates or direct -pay letters to FireEye on or before the Order Effective Date or Statement of Work Effective Date, as applicable. FireEye reserves the right to increase Fees at any time, although increases in Fees for Subscriptions or Support Services will not go into effect until the next Renewal Subscription Term or Renewal Support Term, as applicable. 4. TITLE AND RISK OF LOSS; INSPECTION. All hardware, including Products and any hardware provided for use with Subscriptions and/or Services, is shipped FOB Origin (FCA) from FireEye's designated manufacturing facility or point of origin, and title to such hardware and the risk of loss of or damage to the hardware shall pass to Customer at time of FireEye's delivery of such hardware to the carrier. FireEye is authorized to designate a carrier pursuant to FireEye's standard shipping practices unless otherwise specified in writing by Customer. Customer must provide written notice to FireEye within five (5) days of delivery of the Products of any non- conformity with the Order, e.g., delivery of the wrong Product or incorrect quantities. TERMS APPLICABLE TO OFFERINGS,. 5.1. Products and Support Services. Customer's purchase and use of each Product and Support Services for each Product will be subject to the licenses and terms specific to each Product set forth in Exhibit A. 5.2. Subscriptions. Customer's purchase of and access to each Subscription will be subject to the terms specific to each Subscription set forth in Exhibit B. 5.3. Training. Customer's purchase of Training will be subject to the terms in this Section 5.3. Training delivery dates and location for such Training will be mutually agreed upon by the parties. If an Order does not specify such dates and/or locations, then the parties will mutually agree upon the dates and locations for Training. Customer must request rescheduling of Training no less than two (2) weeks in advance of the scheduled start date. FireEye will use reasonable efforts to reschedule the Training, subject to availability, and Customer will pay any expenses associated with the rescheduling, including any expenses associated with cancelling or changing travel plans. If Customer cancels attendance at a public Training class, Customer must notify FireEye no later than two (2) business days before the date of the Training class. If Customer timely notifies FireEye of the cancellation, FireEye will issue Customer a credit for the amount paid for that public Training class, which Customer may apply toward another public Training class held within one (1) year of the date of the Order on which the cancelled Training class was included. Customer may substitute a named attendee at a public Training class, but Customer will notify FireEye in advance of any such substitution. FireEye reserves the right to refuse admittance to public Training classes to any person, for any reason, and if FireEye refuses admittance, FireEye will refund the amount paid for that person's attendance at the public Training class. FireEye does not refund or credit Fees paid for attendees who do not attend Training classes or who leave before a Training class concludes. If Customer purchases a block of Training hours (for example, 10 hours of Training), then Customer must use those hours within one (1) year of the effective date of the applicable Order. All Training must be scheduled and conducted within one (1) year of the date of the applicable Order for that Training. Confidential FireEye Rev. 8/2016 Page 3 Agreement No. 7434 5.4. Professional Services. 5.4.1. Deliverables. Subject to Customer's timely payment of applicable fees, and subject to this Agreement and each applicable SOW, Customer shall have a perpetual, non-exclusive, nontransferable, right and license to use, display and reproduce the Deliverables for its internal business purposes. Deliverables may not be shared with any third party other than law enforcement agencies. In no event may Deliverables be used for sales or marketing activities. 5.4.2. Customer -Owned Property. Customer will be and remain, at all times, the sole and exclusive owner of the Customer -Owned Property (including, without limitation, any modification, compilation, derivative work of, and all intellectual property and proprietary rights contained in or pertaining thereto). FireEye will promptly return to Customer all Customer -Owned Property upon the termination or expiration of the applicable Statement of Work or Order, or sooner at Customer's request. "Customer -Owned Property" means any technology, software, algorithms, formulas, techniques or know-how and other tangible and intangible items that were owned by Customer, or developed by or for Customer prior to the SOW Effective Date that are provided by Customer to FireEye for incorporation into or used in connection with the development of the Deliverables or performance of Professional Services. 5.4.3. Customer Responsibilities. If the Services or Subscriptions require the installation and use of FireEye equipment or software, Customer will facilitate the installation and shall provide physical space, electrical power, Internet connectivity and physical access as reasonably determined and communicated by FireEye. Notwithstanding anything to the contrary herein or in any Statement of Work, including confidentiality provisions, if Customer has hired FireEye to perform a PCI DSS Compliance Audit or a PCI investigation, FireEye may provide The Payment Card Industry Security Standards Council, LLC (PCI SSC), card companies and the relevant merchant bank with all Reports of Compliance (ROC) and all related assessment and investigative report documents generated in connection with such work, as required by PCI DSS rules. 5.4.4. Additional Assumptions. (a) estimated Fees for Professional Services do not include any hardware, software, licensing, maintenance or support costs of any FireEye or other third -party product or service suggested by FireEye in the course of performing Professional Services; (b) when FireEye's personnel are performing Professional Services on site at Customer's premises, Customer will allocate appropriate working space and physical access for all FireEye personnel; (c) Customer will make available key individuals within the security program that can best help plan and coordinate activities described in the SOW; (d) either party may elect to submit written change requests to the other party proposing changes to the Statement of Work. All changes to the requirements and Statement of Work will be made using agreed -to project change control procedures. 5.5 Evaluations. If Customer receives a Product or Subscription for evaluation purposes ("Evaluation Offerings") then Customer may use the Evaluation Offerings for its own internal evaluation purposes for a period of up to thirty (30) days from the date of receipt of the Evaluation Offerings (the "Evaluation Period"). Customer and FireEye may, upon mutual written agreement (including via email), extend the Evaluation Period. If the Evaluation Offering includes hardware components, Customer will return the hardware within ten (10) days of the end of the Evaluation Period, and if Customer does not return the hardware within this period, Customer shall be invoiced for the then -current list price for the applicable Evaluation Offering. Customer acknowledges that title to hardware components of Evaluation Offerings remains with FireEye at all times, and that Evaluation Offerings may be used and/or refurbished units. If the Evaluation Offering does not include hardware components, Evaluator must delete all software and other components (including Documentation) related to the Evaluation Offering at the end of the Evaluation Period, and confirm those deletions in writing to FireEye, or the Evaluator shall be invoiced for the then -current list price for the Evaluation Offering. If the Evaluation Offering is a Subscription, Evaluator understands that FireEye may disable access to the Subscription automatically at the end of the Evaluation Period, without notice to Evaluator. EVALUATION OFFERINGS ARE PROVIDED "AS IS", AND TO THE EXTENT PERMITTED BY APPLICABLE LAW, FIREEYE DISCLAIMS ALL WARRANTIES RELATING TO THE EVALUATION OFFERINGS, EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, ANY WARRANTIES AGAINST INFRINGEMENT OF THIRD PARTY RIGHTS, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 6. INTELLECTUAL PROPERTY Confidential FireEye Rev. 8/2016 Page 4 Agreement No. 7434 6.1. Ownership of FireEye Materials; Restrictions. All Intellectual Property Rights in FireEye Materials, Products, Deliverables, Documentation, and Subscriptions belong exclusively to FireEye and its licensors. Customer will not (and will not allow any third party to): (i) disassemble, decompile, reverse compile, reverse engineer or attempt to discover any source code or underlying ideas or algorithms of any FireEye Materials (except to the limited extent that applicable law prohibits reverse engineering restrictions); (ii) sell, resell, distribute, sublicense or otherwise transfer, the FireEye Materials, or make the functionality of the FireEye Materials available to any other party through any means (unless otherwise FireEye has provided prior written consent), (iii) without the express prior written consent of FireEye, conduct any benchmarking or comparative study or analysis involving the FireEye Materials ("Bench marking") for any reason or purpose except, to the limited extent absolutely necessary, to determine the suitability of Products or Subscriptions to interoperate with Customer's internal computer systems; (iv) disclose or publish to any third party any Benchmarking or any other information related thereto; (v) use the FireEye Materials or any Benchmarking in connection with the development of products, services or subscriptions that compete with the FireEye Materials; or (vi) reproduce, alter, modify or create derivatives of the FireEye Materials. Between Customer and FireEye, FireEye shall retain all rights and title in and to any Indicators of Compromise FireEye developed by or for FireEye in the course of providing Subscriptions or performing Services. 6.2. Third Party Materials. Customer acknowledges that Products and Subscriptions may include Third Party Materials. FireEye represents that these Third Party Materials will not diminish the license rights provided herein or limit Customer's ability to use the Products and Subscriptions in accordance with the applicable Documentation, and neither the inclusion of Third Party Materials in any Product or Subscription or use of Third Party Materials in performance of Services will create any obligation on the part of Customer to license Customer's software or products under any open source or similar license. 7. WARRANTIES. 7.1. Product Warranty. FireEye warrants to Customer that during the one (1) year period following the shipment of the Products, the Products will perform substantially in accordance with the applicable Documentation. The warranty stated in this Section 7.1 shall not apply if the Product has: (i) been subjected to abuse, misuse, neglect, negligence, accident, improper testing, improper installation, improper storage, improper handling or use contrary to any instructions issued by FireEye; (ii) been repaired or altered by persons other than FireEye; (iii) not been installed, operated, repaired and maintained in accordance with the Documentation; or (iv) been used with any third party software or hardware which has not been previously approved in writing by FireEye. If during the one-year Product warranty period: (a) FireEye is notified promptly in writing upon discovery of any error in a Product, including a detailed description of such alleged error; (b) such Product is returned, transportation charges prepaid, to FireEye's designated manufacturing facility in accordance with FireEye's then -current return procedures, as set forth by FireEye from time to time; and (c) FireEye's inspections and tests determine that the Product contains errors and has not been subjected to any of the conditions set forth in 7.1 (i)-(iv) above, then, as Customer's sole remedy and FireEye's sole obligation under the foregoing warranty, FireEye shall, at FireEye's option, repair or replace without charge such Product. Any Product that has either been repaired or replaced under this warranty shall have warranty coverage for the remaining warranty period. Replacement parts used in the repair of a Product may be new or equivalent to new. 7.2. Services Warranty. FireEye warrants to Customer that Services will be performed in a professional manner in accordance with industry standards for like services. If Customer believes the warranty stated in this Section has been breached, Customer must notify FireEye of the breach no later than thirty (30) days following the date the Services were performed, and FireEye will promptly correct or re -perform the Services, at FireEye's expense. 7.3. Subscription Warranty. FireEye warrants to Customer the Subscriptions will be provided in a professional manner in accordance with industry standards for similar subscriptions. If Customer believes the warranty stated in this Section has been breached, Customer must notify FireEye of the breach no later than thirty (30) days following the date the warranty was allegedly breached, and FireEye will promptly correct the non- conformity, at FireEye's expense. Confidential FireEye Rev. 8/2016 Page 5 Agreement No. 7434 7.4. Remedies Exclusive. Except for any Service Level Credits described in Exhibit B, the remedies stated in Sections 7.1-7.3 above are the sole remedies, and FireEye's sole obligation, with respect to Products, Subscriptions and Services that fail to comply with the foregoing warranties. 7.5. Disclaimer of Warranties. EXCEPT FOR THE EXPRESS WARRANTIES SET FORTH HEREIN, ALL PRODUCTS, SUBSCRIPTIONS, FIREEYE MATERIALS, DELIVERABLES AND SERVICES ARE PROVIDED ON AN "AS IS" BASIS WITHOUT ANY WARRANTY WHATSOEVER. FIREEYE AND ITS SUPPLIERS EXPRESSLY DISCLAIM, TO THE MAXIMUM EXTENT PERMISSIBLE UNDER APPLICABLE LAW, ALL WARRANTIES, EXPRESS, IMPLIED AND STATUTORY, INCLUDING WITHOUT LIMITATION ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, ACCURACY, NONINFRINGEMENT, OR ARISING FROM COURSE OF PERFORMANCE, DEALING, USAGE OR TRADE. FIREEYE ALSO MAKES NO WARRANTY REGARDING NONINTERRUPTION OF USE OR FREEDOM FROM BUGS, AND MAKES NO WARRANTY THAT PRODUCTS, FIREEYE MATERIALS, DELIVERABLES, SERVICES OR SUBSCRIPTIONS WILL BE ERROR -FREE. 8. INFRINGEMENT INDEMNITY, 8.1. FireEye shall defend Customer, and its officers, directors and employees, against any third party action alleging that the FireEye Materials infringes a valid U.S. patent or copyright issued as of the date of delivery or performance, as applicable, and FireEye shall pay all settlements entered into, and all final judgments and costs (including reasonable attorneys' fees) finally awarded against such party in connection with such action. If the FireEye Materials, or parts thereof, become, or in FireEye's opinion may become, the subject of an infringement claim, FireEye may, at its option: (i) procure for Customer the right to continue using the applicable FireEye Materials; (ii) modify or replace such FireEye Materials with a substantially equivalent non -infringing FireEye Materials; or (iii) require the return of such FireEye Materials or cease providing affected Product, Subscriptions, Deliverables or Services, and refund to Customer, with respect to Products, a pro-rata portion of the purchase price of such Products based on a three-year straight line amortization of the purchase price, and with respect to Subscriptions, a portion of any pre -paid Fees for such Subscriptions, pro rated for any unused Subscription Term, and with respect to Services, any pre -paid Fees for Services that have not been delivered. THIS SECTION 8.1 STATES THE ENTIRE LIABILITY OF FIREEYE AND CUSTOMER'S SOLE REMEDY WITH RESPECT TO ANY INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS BY THE OFFERINGS, FIREEYE MATERIALS, OR DELIVERABLES. 8.2. FireEye shall have no indemnification obligations with respect to any action arising out of: (i) the use of any Product, Subscription, Deliverable, or Service, or any part thereof, in combination with software or other products not supplied by FireEye; (ii) any modification of the Products, Subscriptions, Deliverables, or Services not performed or expressly authorized by FireEye; or (iii) the use of any the Products, Subscriptions, Deliverables, or Services other than in accordance with this Agreement and applicable Documentation. 8.3. The indemnification obligations shall be subject to Customer: (i) notifying FireEye within ten (10) days of receiving notice of any threat or claim in writing of such action; (ii) giving FireEye exclusive control and authority over the defense or settlement of such action; (iii) not entering into any settlement or compromise of any such action without FireEye's prior written consent; and (iv) providing reasonable assistance requested by FireEye. 9. LIMITATION OF LIABILITY. 9.1. Consequential Damages Waiver. EXCEPT FOR LIABILITY ARISING UNDER A BREACH OF ANY INTELLECTUAL PROPERTY RIGHT OF FIREEYE, OR THE INDEMNIFICATION OBLIGATIONS SET FORTH IN SECTION 8 (INFRINGEMENT INDEMNITY), IN NO EVENT WILL FIREEYE BE LIABLE FOR ANY SPECIAL, INCIDENTAL, CONSEQUENTIAL OR EXEMPLARY DAMAGES OF ANY KIND, INCLUDING BUT NOT LIMITED TO ANY LOST PROFITS AND LOST SAVINGS, HOWEVER CAUSED, WHETHER FOR BREACH OR REPUDIATION OF CONTRACT, TORT, BREACH OF WARRANTY, NEGLIGENCE, OR OTHERWISE, WHETHER OR NOT FIREEYE WAS ADVISED OF THE POSSIBILITY OF SUCH LOSS OR DAMAGES. 9.2. Limitation of Monetary Damages. EXCEPT FOR LIABILITY ARISING UNDER A BREACH OF ANY INTELLECTUAL PROPERTY RIGHT OF FIREEYE, PAYMENT OBLIGATIONS OF CUSTOMER, AND THE INDEMNIFICATION OBLIGATIONS SET FORTH IN SECTION 8 (INFRINGEMENT INDEMNITY), AND NOTWITHSTANDING ANY OTHER PROVISIONS OF THIS AGREEMENT OR ANY ORDER OR STATEMENT OF WORK, FIREEYE'S TOTAL LIABILITY ARISING OUT OF THIS AGREEMENT, THE OFFERINGS, THE FIREEYE IF AND DELIVERABLES SHALL BE LIMITED TO THE TOTAL AMOUNTS Confidential FireEye Rev. 8/2016 Page 6 Agreement No. 7434 RECEIVED BY FIREEYE FOR THE RELEVANT OFFERINGS DURING THE TWELVE (12) MONTHS IMMEDIATELY PRECEDING THE FIRST OCCURRENCE OF THE EVENTS GIVING RISE TO SUCH LIABILITY. 9.3. Applicability. THE LIMITATIONS AND EXCLUSIONS CONTAINED HEREIN WILL APPLY ONLY TO THE MAXIMUM EXTENT PERMISSIBLE UNDER APPLICABLE LAW, AND NOTHING HEREIN PURPORTS TO LIMIT EITHER PARTY'S LIABILITY IN A MANNER THAT WOULD BE UNENFORCEABLE OR VOID AS AGAINST PUBLIC POLICY IN THE APPLICABLE JURISDICTION. 9.4 SAFETY Act. FireEye and Customer hereby mutually waive and release each other from any and all liabilities relating to any claims for losses or damages of any kind (including, but not limited to, business interruption losses) arising out of an Act of Terrorism as defined by the Support Anti -Terrorism By Fostering Effective Technologies Act of 2002 ("SAFETY Act") (6 U.S.C. §§ 441-444). FireEye and Customer further agree to be solely responsible to the full extent of any and all losses they may sustain, or for any and all losses their respective employees, officers, or agents may sustain, resulting from an Act of Terrorism as defined by 6 U.S.C. §§ 441-444 when FireEye's Multi -Vector Virtual Execution Engine and any subscriptions, cloud services platform or associated services (the "Qualified Anti -Terrorism Technology") are utilized in defense against, response to, or recovery from an Act of Terrorism. 10. Export Control; Anti -Corruption; U.S. Government Restricted Rights. 10.1. Export Control. Export Control. Each party represents and warrants that it shall comply with all laws and regulations applicable to it with respect to the Offerings. Customer further acknowledges and agrees that the Products and FireEye Materials may be subject to restrictions and controls imposed by the United States Export Administration Act, the regulations thereunder, as well as European Union ("EU") or National export control laws and obligations and similar laws in other jurisdictions. Customer agrees to comply with all applicable export and re-export control laws and regulations, including the Export Administration Regulations ("EAR") maintained by the U.S. Department of Commerce, trade and economic sanctions maintained by the Treasury Department's Office of Foreign Assets Control, and the International Traffic in Arms Regulations ("ITAR") maintained by the Department of State. Specifically, Customer covenants that it shall not, directly or indirectly, sell, export, reexport, transfer, divert, or otherwise dispose of any Products, FireEye Materials, or technology (including products derived from or based on such technology) received from FireEye under this Agreement to any destination, entity, or person prohibited by the laws or regulations of the United States and the EU, without obtaining prior authorization from the competent government authorities as required by those laws and regulations. These prohibitions include, but are not limited to the following: (i) the Products and FireEye Materials cannot be exported or re-exported to any countries embargoed by the United States (currently including Cuba, Iran, North Korea, Sudan or Syria) which includes nationals of these countries employed by Customer; (ii) the Products and FireEye Materials cannot be exported or re-exported for military use in country group 'b' prior to valid 'export license' or valid 'license exception'; and (iii) the Products and FireEye Materials cannot be used for any prohibited end uses including any "nuclear, biological or chemical weapon related activities."; and (iv) the Products and FireEye Materials will not be re-exported or otherwise sold or transferred if it is known or suspected that they are intended or likely to be used for such purposes. Customer agrees to notify FireEye of any suspicious activities by any employee related to the Products. Customer agrees to indemnify, to the fullest extent permitted by law, FireEye from and against any fines or penalties that may arise as a result of Customer's breach of this provision. This export control clause shall survive termination or cancellation of any Orders. 10.2. Anticorruption Laws. Each Party acknowledges that it is familiar with and understands the provisions of the U.S. Foreign Corrupt Practices Act ("the FCPA") and the U.K. Bribery Act of 2010 ("UKBA") and agrees to comply with its terms as well as any provisions of local law related thereto. Each party further understands the provisions relating to the FCPA and UKBA's prohibitions regarding the payment or giving of anything of value, including but not limited to payments, gifts, travel, entertainment and meals, either directly or indirectly, to an official of a foreign government or political party for the purpose of influencing an act or decision in his or her official capacity or inducing the official to use his or her party's influence with that government, to obtain or retain business involving the Offering. Each Party agrees to not violate or knowingly let anyone violate the FCPA or UKBA, and Each Party agrees that no payment it makes will constitute a bribe, influence payment, kickback, rebate, or other payment that violates the FCPA, the UKBA, or any other applicable anticorruption or anti -bribery law. Confidential FireEye Rev. 8/2016 Page 7 Agreement No. 7434 10.3. U.S. Government Restricted Rights. The Offerings, Deliverables and Documentation are "commercial items", "commercial computer software" and "commercial computer software documentation," pursuant to DFAR Section 227.7202 and FAR Section 12.212, as applicable. All Offerings and FireEye Materials are and were developed solely at private expense. Any use, modification, reproduction, release, performance, display or disclosure of the Offerings, FireEye Materials and Documentation by the United States Government shall be governed solely by the this Agreement and shall be prohibited except to the extent expressly permitted by this Agreement. 11. CONFIDENTIAL INFORMATION. 11.1. Confidential Information. "Confidential Information" means the non-public information that is exchanged between the parties, provided that such information is: (i) identified as confidential at the time of disclosure by the disclosing party ("Discloser"); or (ii) disclosed under circumstances that would indicate to a reasonable person that the information should be treated as confidential by the party receiving such information ("Recipient"). The terms of any commercial transaction between the parties (including pricing related to the Offerings) shall be considered Confidential Information. 11.2. Maintenance of Confidentiality. Each party agrees that it shall: (i) take reasonable measures to protect the Confidential Information by using the same degree of care, but no less than a reasonable degree of care, to prevent the unauthorized use, dissemination or publication of the Confidential Information as the Recipient uses to protect its own confidential information of a like nature; (ii) limit disclosure to those persons within Recipient's organization with a need to know and who have previously agreed in writing, prior to receipt of Confidential Information either as a condition of their employment or in order to obtain the Confidential Information, to obligations similar to the provisions hereof; (iii) not copy, reverse engineer, disassemble, create any works from, or decompile any prototypes, software or other tangible objects which embody the other party's Confidential Information and/or which are provided to the party hereunder; and (iv) comply with, and obtain all required authorizations arising from, all U.S. and other applicable export control laws or regulations.. Confidential Information shall not be used or reproduced in any form except as required to accomplish the purposes and intent of an Order or Statement of Work. Any reproduction of Confidential Information shall be the property of Discloser and shall contain any and all notices of confidentiality contained on the original Confidential Information. 11.3. Exceptions. The parties agree that the foregoing shall not apply to any information that Recipient can evidence: (i) is or becomes publicly known and made generally available through no improper action or inaction of Recipient; (ii) was already in its possession or known by it prior to disclosure by Discloser to Recipient; (iii) is independently developed by Recipient without use of or reference to any Confidential Information; or (iv) was rightfully disclosed to it by, or obtained from, a third party. Recipient may make disclosures required by law or court order provided that Recipient: (a) uses diligent efforts to limit disclosure and to obtain, if possible, confidential treatment or a protective order; (b) has given prompt advance notice to Discloser of such required disclosure; and (c) has allowed Discloser to participate in the proceedings. 11.4. Injunctive Relief. Each party will retain all right, title and interest to such party's Confidential Information. The parties acknowledge that a violation of the Recipient's obligations with respect to Confidential Information may cause irreparable harm to the Discloser for which a remedy at law would be inadequate. Therefore, in addition to any and all remedies available at law, Discloser shall be entitled to seek an injunction or other equitable remedies in all legal proceedings in the event of any threatened or actual violation of any or all of the provisions hereof. 11.5. Return of Confidential Information. Within thirty (30) days after the date when all Orders and SOWS have expired or been terminated, or after any request for return of Confidential Information, each party will return to the other party or destroy all of such other party's Confidential Information, at such other party's discretion, and, upon request, provide such other party with an officer's certificate attesting to such return and/or destruction, as appropriate. 11.6. Privacy. If FireEye is a data processor under this Agreement, further to the provisions of Article 17 and 25 of the EU Data Protection Directive EU (Directive 95/46/EC), FireEye agrees that it will: Confidential FireEye Rev. 8/2016 Page 8 Agreement No. 7434 11.6.1 only deal with and process personal data controlled by Customer in compliance with, and subject to, the instructions received from Customer and in compliance with this Agreement and will not use or process the personal data for any other purpose whatever; 11.6.2 adopt and maintain appropriate (including organizational and technical) security measures in dealing with Customer's personal data in order to protect against unauthorized or accidental access, loss, alteration, disclosure or destruction of such data, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing; and 11.6.3 take all reasonable steps to ensure that (i) persons employed by it, and (ii) other persons engaged at its place of work, are aware of and comply with applicable data privacy laws and regulations. 11.6.4 FireEye may process or otherwise transfer any personal information in or to any country outside the European Economic Area or any country not deemed adequate by the European Commission pursuant to Article 25(6) to the extent necessary for the provision of the Offerings. If required, FireEye will enter into the EU Standard Contractual Clauses as approved by the European Commission for ensuring an adequate level of data protection in respect of the personal information that will be processed or transferred. 12. TERM AND TERMINATION. 12.1. Term. 12.1.1 Products. Products will be licensed according to the applicable terms in Exhibit A, for the period of time stated on the Order (e.g., if the Order lists a Product as being provided for "3Y," the license for that Product is provided for three years from the date of the Order). If no period of time is stated on the Order, then the Product is licensed perpetually, unless otherwise terminated as set forth herein. 12.1.2 Support Services. Support Services will begin ten (10) days from the date of shipment of the associated Product and continue for the period of time stated on the Order("Initial Support Term"). Unless otherwise stated on the Order, the Support Services will automatically renew for additional periods of one (1) year each (each, a "Renewal Support Term" and together with the Initial Support Term, the "Support Term"), unless either party notifies the other of its intention not to renew Support Services at least sixty (60) days prior to the expiration of the then -current Support Term. Customer may terminate Support at any time, for convenience, on thirty (30) days' written notice to FireEye. If Customer terminates Support Services for convenience before the end of the then -current Support Term, Customer will pay any remaining fees owing for the remainder of the then - current Support Term within thirty (30) days of the effective date of termination. 12.1.3 Subscriptions. The term of each Subscription will begin on the Order Effective Date and will continue in effect for the period of time stated in the Order ("Initial Subscription Term"). Unless otherwise stated on the Order, the Subscription will automatically renew after its Initial Subscription Term for additional periods of one (1) year each (each, a "Renewal Subscription Term" and together with the Initial Subscription Term, the "Subscription Term"), unless either party notifies the other of its intention not to renew that Subscription at least sixty (60) days prior to the expiration of the then -current Subscription Term. Customer may terminate a Subscription at any time, for convenience, on thirty (30) days' written notice to FireEye. If Customer terminates a Subscription for convenience before the end of the then -current Subscription Term, Customer will pay any remaining fees owing for the remainder of the then -current Subscription Term within thirty (30) days of the effective date of termination. 12.1.4 Professional Services; Statements of Work. Professional Services described on an Order will be provided at mutually agreed -upon times, and will continue until complete, unless otherwise terminated as set forth herein. The term of each SOW will be as set forth in that SOW. If no term is expressed in an SOW, then the term of that SOW will begin on the SOW Effective Date and continue until the Professional Services described in that SOW are complete or the SOW is earlier terminated as set forth herein. Unless otherwise stated in a SOW, Customer may terminate a SOW at any time for convenience by giving FireEye at least thirty (30) days' written notice of its intent to terminate the SOW. If Customer terminates an SOW for convenience as set forth in this Section, Customer will pay any amounts owing for Professional Services and Deliverables provided under that SOW up to and including the date of termination. Customer may request that FireEye suspend performing Professional Services during the term of a Statement of Work, and FireEye will suspend such Professional Services within 24 hours of Customer's request. Customer acknowledges that any such suspension will not affect Customer's obligation to pay fees for Professional Services rendered through the date of suspension, and that Confidential FireEye Rev. 8/2016 Page 9 Agreement No. 7434 resumption of Professional Services may be delayed if FireEye redeploys personnel to other engagements during the period of suspension. 12.2. Termination for Material Breach. Either party may terminate any Order or any SOW upon written notice of a material breach of the applicable Order or SOW by the other party as provided below, subject to a thirty (30) day cure period ("Cure Period"). If the breaching party has failed to cure the breach within the Cure Period after the receipt by the breaching party of written notice of such breach, the non -breaching party may give a second notice to the breaching party terminating the applicable Order or SOW. Termination of any particular Order or SOW under this Section will not be deemed a termination of any other Order or SOW, unless the notice of termination states that another Order or SOW is also terminated. Notwithstanding the foregoing, the Cure Period applicable to a breach by Customer of any payment obligations under any Order or any SOW will be fifteen (15) days. Notwithstanding the foregoing, this Agreement shall terminate automatically in the event Customer has breached any license restriction and, in FireEye's determination, that breach cannot be adequately cured within the Cure Period. 12.3. Effect of Termination. Termination or expiration of any Order or SOW will not be deemed a termination or expiration of any other Orders or SOWs in effect as of the date of termination or expiration, and this Agreement will continue to govern and be effective as to those outstanding Orders and SOWs until those Orders and SOWs have expired or terminated by their own terms or as set forth herein. The provisions of Section 3 (Payment), Section 6 (Intellectual Property), Section 7.5 (Disclaimer of Warranties), 9 (Limitation of Liability), 10 (Export Control; Anti -Corruption; U.S. Government Restricted Rights), 12 (Confidential Information), and 13 (Miscellaneous), and all accrued payment obligations, shall survive the termination of all Orders and SOWs and the relationship between FireEye and Customer. 13. MISCELLANEOUS. 13.1. Assignment. Customer may not assign any Order or Statement of Work, or any rights or obligations thereunder, in whole or in part, without FireEye's prior written consent, and any such assignment or transfer shall be null and void. FireEye shall have the right to assign all or part of an Order or Statement of Work without Customer's approval. Subject to the foregoing, each Order and Statement of Work shall be binding on and inure to the benefit of the parties' respective successors and permitted assigns. 13.2. Entire Agreement. This Agreement along with any Order, Statement of Work and the Exhibits attached hereto is the entire agreement of the parties with respect to the Offerings and supersedes all previous or contemporaneous communications, representations, proposals, commitments, understandings and agreements, whether written or oral, between the parties regarding the subject matter thereof. FireEye does not accept, expressly or impliedly and FireEye hereby rejects and deems deleted any additional or different terms or conditions that Customer presents, including, but not limited to, any terms or conditions contained or referenced in any order, acceptance, acknowledgement, or other document, or established by trade usage or prior course of dealing. This Agreement may be amended only in writing signed by authorized representatives of both parties. 13.3. Force Majeure. Neither party will be liable to the other for any delay or failure to perform any obligation under this Agreement (except for a failure to pay fees) if the delay or failure is due to unforeseen events, which occur after the signing of this Agreement and which are beyond the reasonable control of the parties, such as strikes, blockade, war, terrorism, riots, natural disasters, refusal of license by the government or other governmental agencies, in so for as such an event prevents or delays the affected party from fulfilling its obligations and such party is not able to prevent or remove the force majeure at reasonable cost. 13.4. Governing Law. This Agreement shall be deemed to have been made in, and shall be construed pursuant to the laws of the State of California and the United States without regard to conflicts of laws provisions thereof, and without regard to the United Nations Convention on the International Sale of Goods or the Uniform Computer Information Transactions Act. Any legal suit, action or proceeding arising out of or relating to the Offerings, the FireEye Materials, this Agreement, an Order or a Statement of Work will be commenced exclusively in a federal court in the Northern District of California or in state court in Santa Clara County, California, and each party hereto irrevocably submits to the jurisdiction and venue of any such court in any such suit, action or proceeding. Confidential FireEye Rev. 8/2016 Page 10 Agreement No. 7434 13.5. Independent Contractors. The parties are independent contractors. Nothing in this Agreement, any Order or any Statement of Work shall be construed to create a partnership, joint venture or agency relationship between the parties. Customer shall make no representations or warranties on behalf of FireEye. 13.6. Language. This Agreement and each Order and Statement of Work are in the English language only, which shall be controlling in all respects. All communications, notices, and Documentation to be furnished hereunder shall be in the English language only. 13.7. Notices. All notices required to be sent hereunder shall be in writing, addressed to receiving party's current business contact, if known, with a cc: to the General Counsel/Legal Department of the receiving party, and sent to the party's address as listed in this Agreement, or as updated by either party by written notice. Notices shall be effective upon receipt and shall be deemed to be received as follows: (i) if personally delivered by courier, when delivered; or (ii) if mailed by first class mail, or the local equivalent, on the fifth business day after posting with the proper address. 13.8. Severability. If any provision of this Agreement is held to be illegal, invalid or unenforceable under the laws of any jurisdiction, the provision will be enforced to the maximum extent permissible so as to effect the intent of the parties, and the remaining provisions of this Agreement will remain in full force and effect. 13.9. Third Party Rights. Other than as expressly set out in this Agreement, this Agreement does not create any rights for any person who is not a party to it and no person who is not a party to this Agreement may enforce any of its terms or rely on any exclusion or limitation contained in it. 13.10. Waiver. The waiver of a breach of any provision of this Agreement shall not constitute a waiver of any other provision or any subsequent breach. 13.11. Equal Opportunity. FireEye is committed to the provisions outlined in the Equal Opportunity Clauses of Executive Order 11246, the Rehabilitation Act of 1973, the Vietnam Era Veterans Readjustment Act of 1974, the Jobs for Veterans Act of 2003, as well as any other regulations pertaining to these orders. Wherefore, the parties have caused this Master Purchase Agreement to be executed as of the Effective Date. FIREEYE, INC. CUSTOMER Signature: Signature: Name: Name: Title: ................................ _� Title: Date; Date: FIREEYE IRELAND LIMITED Signature: Name: Title: Date: Confidential FireEye Rev. 8/2016 Page 11 Agreement No. 7434 EXHIBIT A PRODUCT LICENSE AND SUPPORT TERMS (FIREEYE NX, EX, AX, PX, FX, HX, SECURITY ORCHESTRATORT-, MVX SMART GRID, AND CENTRAL MANAGEMENT SERIES (CMS) PRODUCTS) The following terms apply to the FireEye NX, EX, AX, PX, FX, HX, Security Orchestrator, MVX Smart Grid, and Central Management Series (CMS) Products, including any add -on features such as FireEye Advanced Threat Intelligence (ATI). 1. Grant of License and Restrictions. Subject to the terms hereof, payment of all fees, and any applicable user/use limitations, FireEye grants Customer a personal, perpetual, nonsublicensable, nonexclusive, right to use the Product, in accordance with the Agreement and this Exhibit A. Customer will maintain the copyright notice and any other notices that appear on the Product, including any interfaces related to the Product. With respect to the FireEye HX Series Product, Customer may install the "agent" software component of the Product on the number of Nodes stated on the applicable Order. With respect to the FireEye EX Series Product, Customer may use the Product in connection with the number of attached URL engines (i.e., email accounts) ("Attached URL Engines") stated on the applicable Order. FireEye reserves the right to audit Customer's use of the Product to ensure compliance with this Agreement. "Nodes" are endpoint computing devices owned or controlled by Customer (such as laptops, workstations, and servers), on which Customer installs the agent software. Updates, preview features, Content Feeds and/or Support Services are not necessarily provided with the Software, may require additional payment or include additional terms and conditions, and may be provided on a "preview" basis for a limited period at no additional charge but then licensed for an additional fee at a later date. Customer acknowledges that Third Party Software distributed with the Products may be subject to separate license terms, and specifically, if the OracleTM Java@ software is included within the Product, that software is subject to the license found at kite 1 !+vw,c ra l .com tecl�rGptwoN°k " v vase tecrns/9ucense/jrug91—t ri!. 2. Content Feeds. Subject to Customer's payment in full of all associated fees for the applicable FireEye Content Feed, as set forth on the applicable Order, FireEye shall grant a limited, non-exclusive, personal, non- transferable, non-sublicenseable right to use the Content Feed as set forth in the Documentation for the applicable Product, for Customer's internal business purposes during the active Support Term for the applicable Product. FireEye shall not disclose to any third party any personally identifiable data or Customer Confidential Information in connection with the Content Feed unless expressly authorized to do so by Customer. The Content Feeds available to the Customer with respect to the Products may include: 2.1 FireEye Dynamic Threat Intelligence TM (DTITM) - The DTI Content Feed (currently available only for customers who have purchased the FireEye NX, EX, AX, HX or FX Product) provides continual, updated information to the Product about threats. 2.2. FireEye Advanced Threat IntelligenceTM (ATITM) - The ATI Content Feed (currently available only for customers who have purchased the FireEye NX Product) provides contextual information about malware detected in Customer's environment, such as information regarding threat groups associated with certain malware, industry verticals in which FireEye has observed certain threat groups operate and in which certain malware is used, and relative frequency of observation of various threats and malware. 3. Support Services. Subject to Customer's payment in full of all associated fees for FireEye Support Services, FireEye shall provide Support Services for the Products as set forth in Exhibit C, as may be updated by FireEye in its discretion. Confidential FireEye Rev. 8/2016 Page 12 Agreement No. 7434 EXHIBIT B SUBSCRIPTION TERMS Confidential FireEye Rev. 8/2016 Page 13 Agreement No. 7434 EXHIBIT B-1 SUBSCRIPTION TERMS FOR FIREEYE AS A SERVICE (FAAS) - CONTINUOUS PROTECTION The following terms govern the FireEye as a Service (FaaS) - Continuous Protection (CP) Subscription. 1 Definitions. 1.1 "Alert" means, individually and collectively, APT Alerts, High Priority Alerts, and Low Priority Alerts. 1.2 "APT Alert" means (a) with respect to Products other than HX, an alert generated by a Product, that is identified by the Product as being associated with a "targeted threat," which means advanced persistent threat (APT) actors or APT activity; (b) with respect to the HX Product, an alert designated by HX as XPLT, EXC, or PRE, that is triggered by a FireEye standard Indicator; and (c) with respect to the TAP Subscription, an "APT Alert" means a TAP Alert designated as an "APT Alert" in the table in Section 1.11 below. 1.3 "APT Only Service" means the Subscription level in which FireEye will provide FaaS Reports and monitoring of APT Alert. If Customer purchases the APT Only Service, FireEye will provide FaaS Reports and monitoring of only APT Alerts, and not any other Alerts. 1.4 "Covered System" means (i) a computing device (to the extent supported by FireEye) that Customer specifies as within the scope of the CP Subscription, and if the Customer has purchased the HX Product, on which a software agent has been installed to support CP Subscription delivery, or (ii) a computing device (to the extent supported by FireEye) whose network traffic is observable to support CP Subscription delivery; (iii) with respect to ETP Subscriptions, mailboxes monitored to support CP Subscription delivery; or (iv) any computing device that both Customer and FireEye agree is within scope of the CP Subscription. 1.5 "Full Coverage Service" means the Subscription level in which FireEye will provide FaaS Reports and monitoring of all Alerts, regardless of the severity level of the Alert as classified by the Product. 1.6 "High Priority Alert Service" means the Subscription level in which FireEye will provide FaaS Reports and monitoring of High Priority Alerts and APT Alerts. 1.7 "FaaS Reports" means the written reports relating to Alerts that FireEye creates and makes available to Customer through the CP Subscription. 1.8 "High Priority Alert" means (a) with respect to Products other than HX and FX, an alert generated by that Product that is classified by that Product as severity level "critical" or "major"; (b) with respect to the FX Product, any alert generated by the FX Product, including APT Alerts; and (c) with respect to a TAP subscription, a TAP Alert designated as a "High Priority Alert" in the table in Section 1.11 below. 1.9 "Low Priority Alert" means an alert generated by a Product or TAP Subscription (as applicable) that is not an APT Alert or a High Priority Alert. 1.10 "Nodes" or "Node Band" refers to number of Covered Systems within the Customer environment, which is reflected on the Subscription Order. 1.11 "TAP Alert" means an alert generated by the TAP Subscription, with a severity level assigned by the TAP Subscription (e.g., "Critical," "High," "Medium"). TAP Alerts are investigated and reported on as "APT Alerts" and "High Priority Alerts" as shown in the table below, depending on the TAP Rule Pack that invoked the TAP Alert: -........ . FireEye Rule Pack APT Alerts Highh Priori Alerts A plication Detection .�.. ................... Cloud Infrastructure - ...... _ ........ Commodity Malware All Confidential FireEye Rev. 8/2016 Page 14 Agreement No. 7434 Current Events DTI Rules Exr)loit Kits FTP Industrial Control Intel Match Linux Malware Method Phishing -.- Point of Sale Securit Tools Targeted Malware Vendor- FireEye ms Vulnerability Web Application Attacks Windows Critical ..___. hli h I Critical, Hi All All Critical, High, Medium Critical, High, Medium Critical, High, Medium Critical,, Hi�Medium Critical, H� Critical, Hi h Critical High - Critical, Hi h All All . Critical, High, Medium All .................._....,. .All Critical, Hiah, Medium Critical, Hiah, Medium 1.13 "TAP Rule Packs" means a predefined set of criteria that identifies suspicious events or threats based on the associated rule type within the TAP Subscription. 2 Scope of FaaS - Continuous Protection CP Sulascrl ttc�n. During the Subscription Term, FireEye will provide the CP Subscription as set forth in this Section 2, according to the Subscription level purchased by Customer as set forth in the Subscription Order. If the Subscription Order does not specify the Subscription Ivel purchased, then Customer will be deemed to have purchased the APT Only Service. All services Customer requests that are not described in this Section 2 will be performed at mutually agreed upon rates as set forth in Statements of Work. Unless otherwise specified, the CP Subscription is provided by FireEye personnel remotely accessing Customer's environment from FireEye's networks. The CP Subscription is available for the number of Nodes purchased (available for Customers who have purchased the FireEye NX, FX, or EX Product or the ETP or TAP Subscription). If the number of Nodes exceeds the amount reflected in the Subscription Order by more than ten percent (10%), FireEye will notify Customer in writing, and will issue an invoice for the next higher Node Band at FireEye's then -current rates pro -rated for the remaining portion of the then -current Subscription Term. 2.1 Event Analysis. (a) Time to Begins Analysis, FireEye will begin analysis of an Alert within the times set forth in the table below, calculated from the time the Alert was generated by the Product or TAP Subscription (as applicable). ll ANerts Invesfl_gated. FireEye will investigate and report on the Alerts that correspond with the Subscription level the Customer purchased. If the Customer purchased the APT Only Service, FireEye will investigate and report on only APT Alerts. If the Customer purchased the High Priority Alerts Service, FireEye will investigate and report on only High Priority Alerts and APT Alerts. If the Customer purchased the All Alerts Service, FireEye will investigate and report on APT Alerts, High Priority Alerts, and Low Priority Alerts. FireEye has no obligation to investigate and report on Alerts that fall outside the purchased Subscription level. ll Initial Investiyer�._FireEye analysts will perform an initial analysis of the Customer's Covered Systems to determine if the Alert is a true or false positive, benign or suspicious activity. ll FoaS Repgrts. If FireEye's investigation determines that the Alert indicates a true compromise, FireEye will publish a FaaS Report to the FaaS Portal within one (1) hour of the time FireEye makes that determination. Regardless of whether FireEye's investigation determines that an Alert indicates a true compromise, FireEye will publish a FoaS Report on the Alert to the FaaS Portal within the times set forth in the table Confidential FireEye Rev. 8/2016 Page 15 Agreement No. 7434 below, based on the classification of the Alert (APT Alert, High Priority Alert, Low Priority Alert). Customer acknowledges that in some cases, when FireEye's investigation is not complete, a FaaS Report may provide only an update of current status of the Alert investigation. ..... .... _ ...... Alerts Investigated (Level of FaaS Alert_ . Time to _........ Time to Time to Publish Service) Classification Begin Publish FaaS FaaS Report Investigation Report (from (when no (from time time FireEye validation of APT Only High Full Product or validates actual Service Priority Coverage TAP actual compromise; Alerts Service Subscription compromise) from time Service generates Product or TAP Alert) Subscription generates .......... ...... Alert Yes Yes Yes APT Alert L 1 hours 1 hour 24 hours No Yes Yes High Priority 7 hours 1 hour 24 hours Alert No No Yes Low Priority 24 hours 1 hour 48 hours Alert The service levels noted in the table above will become effective thirty (30) days following the Order Effective Date, to allow time for Customer to install Products and for FireEye to determine the level of staffing needed to respond to Alerts in Customer's environment. (e) Extended Investigations; Multiple Related Alerts. When FireEye has identified a true positive or suspicious activity, FireEye analysts may perform an extended investigation, and/or may aggregate and review multiple Alerts from related Covered Systems to determine the extent of activity related to the Alert. FireEye analysts may append results from the extended investigation or subsequent Alert investigations to the initial FaaS Report if FireEye determines that additional or subsequent Alerts are related, and in such cases, FireEye will not be required to issue a separate FaaS Report for each such related Alert. (f) Non -Remediable Alerts. FireEye has no obligation to notify the Customer or generate a new FaaS Report on new Alerts that are directly related to previous investigations where a FaaS Report has been published and FireEye has provided recommended remediation steps, when the Customer has acknowledged the FaaS Report but chooses not to or cannot remediate the cause of these Alerts. (g) Alert Priority. FireEye may re -prioritize Alerts, regardless of their severity classification, to provide focus to Alerts that FireEye determines may have the largest impact to the Customer's environment. (h) Continuity of Monitoring. All monitoring, investigation and reporting activities described in this Section 2.1 will be provided on a 24/7/365 basis. 2.2 System Health Monitoring and Notification. For Customers who have purchased the FireEye NX, EX, or FX Product, FireEye will provide Customer with notifications of system health issues such as connectivity problems. 2.3 Containment. When the Customer has purchased the HX Product, FireEye may, when appropriate, recommend containment of the target Covered System from the Customer's network. Containment must be executed by the Customer. 2.4 Portal Access. Alerts and FaaS Reports will be provided via an online portal ("FaaS Portal"), and FireEye will provide login credentials to the Customer to enable access to the FaaS Portal. The FaaS Portal will be available 99.9% of the time in any calendar month, other than Downtime, as defined below, and this FaaS Portal Service Level commitment will be subject to the Service Level Credits set forth in Section 3 below. Confidential FireEye Rev. 8/2016 Page 16 Agreement No. 7434 2.5 FireEye Intelligence Center. During the Subscription Term, FireEye will provide access to the FireEye Intelligence Center (FIC), which includes the Community Threat Intelligence (CTI) platform, subject to the following: (a) Permitted Use; Reports. Customer may access, view and use FIC and content appearing on FIC ("FIC Content") solely for internal use. Some features of FIC may allow Customer to generate a report (each, a "FIC Report"). FIC Reports and FIC Content are FireEye IP. Subject to Customer's payment obligations, FireEye grants to Customer a limited, non-exclusive right to produce FIC Reports using FIC, and reproduce and distribute those FIC Reports and FIC Content internally for Customer's own business purposes. (b) Additional Use Limitations. Customer may appoint up to fifteen (15) users of FIC at any time. Each day, all users on Customer's account may collectively make up to (A) one hundred (100) queries of IP addresses and domain names and (B) one hundred (100) queries of malware. Customer may request additional queries, to be evaluated by FireEye on a case by case basis. (c) User Content. "User Content" means any communications, images, sounds, and all the material and information that Customer or anyone using Customer's account contributes to or through FIC, including any contributions to or through the CTI platform (e.g., comments to FIC Content, suspected malware that Customer uploads to FIC). Customer hereby grants FireEye a perpetual, irrevocable, worldwide, paid -up, non-exclusive, license, including the right to sublicense to third parties, and right to reproduce, fix, adapt, modify, translate, reformat, create derivative works from, publish, distribute, sell, license, transmit, publicly display, publicly perform, or provide access to electronically, broadcast, display, perform, and use and practice such User Content as well as all modified and derivative works thereof. Customer represents that Customer has all necessary rights to grant the license referenced in the preceding sentence. FireEye may use and disclose any of the information it collects about its customers' use of FIC, including CTI, to the extent such information is de -identified. (d) Restrictions. Customer may not access FIC by any means other than through the interface that is provided or approved by FireEye. Customer will not collect any information from or through FIC using any automated means, including without limitation any script, spider, "screen scraping," or "database scraping" application, and Customer will not damage, disable, overburden, or impair FIC or interfere with any other party's use and enjoyment of FIC. (e) Customer acknowledges that some optional features and content appearing on FIC may require payment of additional fees. 2.6 Reseller and Partner Purchases. If Customer receives the Subscription via a FireEye authorized services or support partner (a "Partner"), Customer agrees that the Subscription and FaaS Reports may be delivered to Customer through the Partner. Notwithstanding any other confidentiality obligations between the parties, Customer authorizes FireEye to disclose information related to the Subscription and Customer Data to Partner. 2.7 Customer Networks. The Subscription may only be provided for computer systems and networks leased to or owned by Customer, and under Customer's control, up to the number of Nodes allowed, as set forth in the applicable Subscription Order. 2.8 Connectivity Requirements. Unless otherwise specified, the Subscription are provided by FireEye personnel remotely accessing Customer's environment from FireEye's networks. Customer must provide outbound TCP- based connectivity from all Products to FireEye for the establishment of a virtual private network (VPN). Details pertaining to specific network access requirements will be established in conjunction with installation activities. 2.9 Credential Security. Customer will be responsible for the following: (a) providing accurate information to FireEye for provisioning access to (and removal of) Customer personnel access to the FaaS Portal; (b) implementing and adhering to strong password standards; (c) providing accurate information to FireEye for domain whitelisting; and (d) reporting any security issues related to the Subscription (including the FaaS Portal) to FireEye immediately. 2.10 Exclusions. Notwithstanding anything else contained in this Agreement to the contrary, FireEye shall have no obligation or responsibility to provide the Subscription for (i) Products for which Customer does not have an active Subscription in place; (ii) Products that the Customer (or FireEye or another third party on Customer's behalf) has configured with a one-way feed of FireEye's Dynamic Threat Intelligence (DTI) Subscription; (iii) Confidential FireEye Rev. 8/2016 Page 17 Agreement No. 7434 Products with an installed FireEye operating system less than version 6.2; (iv) Products that have been declared end of life; (v) Products that have no active Support Service in place; (vi) Products for which software updates have not been applied; (vii) Products that have not been installed and deployed; or (viii) Products that are misconfigured or incorrectly deployed, which prevents the Products from monitoring the Covered Systems. Customer acknowledges that to facilitate FireEye's efficient performance of the Subscription, FireEye may control some features and functionality of the Products, and that such features or functionality may not be available for Customer's independent use during the Subscription Term. 3. FaaS Portal Availability 3.1 FireEye shall undertake commercially reasonable efforts to ensure the FaaS Portal availability for 99.9% of the time during each calendar month. 3.1.1 "Service Outage" is where the FaaS Portal is not available due to a failure or a disruption in the FaaS Portal that is not the result of Scheduled Maintenance, Emergency Maintenance, a force majeure event or of the act or omission of Customer. 3.1.2 "Scheduled Maintenance Period" is the period during which weekly scheduled maintenance of the FaaS Portal may be performed, or a maintenance window otherwise mutually agreed upon by FireEye and Customer. 3.1.3 "Emergency Maintenance" means any time outside of Scheduled Maintenance that FireEye is required to apply critical patches or fixes or undertake other urgent maintenance. If Emergency Maintenance is required, FireEye will contact Customer and provide the expected time frame of the Emergency Maintenance and availability of the FaaS Portal during the Emergency Maintenance. 3.1.4 "System Availability" means the percentage of total time during which the FaaS Portal shall be available to Customer, excluding the Scheduled Maintenance Period, Emergency Maintenance, force majeure events, or acts or omissions of the Customer that cause system downtime. 3.2. Remedy 3.2.1 In the event that the FaaS Portal does not meet the monthly service availability defined in 3.1, FireEye will provide a credit to the Customer in accordance to the table below ("Credit") for a validated SLA Claim (defined below). 3.2.2 For determining the Credit, the duration of a Service Outage will be measured as the time starting when Customer experiences a disruption in availability of the FaaS Portal and ending when a successful solution or workaround allowing for full restoration of the FaaS Portal is provided by FireEye to Customer. Customer must notify FireEye in writing of any Service Outage no later than fifteen (15) days after the calendar month in which the Service Outage occurred ("SLA Claim") to be entitled to a Credit for that Service Outage. 3.2.3 Any Credits earned by Customer hereunder will be applied to the Subscription Fees owed by Customer for the next Subscription Term for which the Credit applies. If Credits cannot be applied to future Subscription Fees because the Subscription Term has terminated for non -renewal or for a material uncured breach by Customer, such credits shall become null and void. If Credits cannot be applied to future Subscription Fees because the Subscription Term has terminated due to a material uncured breach by FireEye, FireEye will promptly pay Customer the amount of the Credit. 3.2.4 Customer shall not be entitled to receive a Credit that exceeds 1 % of its prorated monthly Subscription Fee for a Service Outage for the applicable calendar month. Confidential FireEye Rev. 8/2016 Page 18 Agreement No. 7434 EXHIBIT B-2 SUBSCRIPTION TERMS FOR FIREEYE AS A SERVICE (FAAS) - CONTINUOUS VIGILANCE The following terms govern the FireEye as a Service (FaaS) - Continuous Vigilance (CV) Subscription. 3 Definitions. 3.1 "Alert" means, individually and collectively, APT Alerts, High Priority Alerts, and Low Priority Alerts. 3.2 "APT Alert" means (a) with respect to Products other than HX, an alert generated by a Product, that is identified by the Product as being associated with a "targeted threat," which means advanced persistent threat (APT) actors or APT activity; (b) with respect to the HX Product, an alert designated by HX as XPLT, EXC, or PRE, that is triggered by a FireEye standard Indicator; and (c) with respect to the TAP Subscription, an "APT Alert" means a TAP Alert designated as an "APT Alert" in the table in Section 1.11 below. 3.3 "APT Only Service" means the Subscription level in which FireEye will provide FaaS Reports and monitoring of APT Alert. If Customer purchases the APT Only Service, FireEye will provide FaaS Reports and monitoring of only APT Alerts, and not any other Alerts. 3.4 "Covered System" means (i) a computing device (to the extent supported by FireEye) that Customer specifies as within the scope of the CV Subscription, and if the Customer has purchased the HX Product, on which a software agent has been installed to support CV Subscription delivery, or (ii) a computing device (to the extent supported by FireEye) whose network traffic is observable to support CV Subscription delivery; (iii) with respect to ETP Subscriptions, mailboxes monitored to support CV Subscription delivery; or (iv) any computing device that both Customer and FireEye agree is within scope of the CV Subscription. 3.5 "Full Coverage Service" means the Subscription level in which FireEye will provide FaaS Reports and monitoring of all Alerts, regardless of the severity level of the Alert as classified by the Product. 3.6 "High Priority Alert Service" means the Subscription level in which FireEye will provide FaaS Reports and monitoring of High Priority Alerts and APT Alerts. 3.7 "FaaS Reports" means the written reports relating to Alerts that FireEye creates and makes available to Customer through the CV Subscription. 3.8 "High Priority Alert" means (a) with respect to Products other than HX and FX, an alert generated by that Product that is classified by that Product as severity level "critical" or "major"; (b) with respect to the FX Product, any alert generated by the FX Product, including APT Alerts; and (c) with respect to a TAP subscription, a TAP Alert designated as a "High Priority Alert" in the table in Section 1.11 below. 3.9 "Low Priority Alert" means an alert generated by a Product or TAP Subscription (as applicable) that is not an APT Alert or a High Priority Alert. 3.10 "Nodes" or "Node Band" refers to number of Covered Systems within the Customer environment, which is reflected on the Subscription Order. 3.11 "TAP Alert" means an alert generated by the TAP Subscription, with a severity level assigned by the TAP Subscription (e.g., "Critical," "High," "Medium"). TAP Alerts are investigated and reported on as "APT Alerts" and "High Priority Alerts" as shown in the table below, depending on the TAP Rule Pack that invoked the TAP Alert: ----- _. FireE a Rule Pack APT Alerts High Priority Alerts Application Detection Cloud Infrastructure Commodity Malware .._ All Confidential FireEye Rev. 8/2016 Page 19 Agreement No. 7434 Current Events DTI Rules Exploit Kits._ FTP Industrial Control Systems Intel Match Linux _ Malware Methodoloqv Point of Sale Security Tools Targeted Malware Vendor- FireEye Vulnerability Web Application Attacks Windows Critical, High All All Critical, High, Medium Critical, High, Medium ..... ............... Critical, High, Medium Critical, Hi h, Medium Critical, High . -_.Critical, High Critical„ -Hi h� Critical, High All All Critical, High, Medium All All Critical, High, Medium ritical, High, Medium h 1.13 "TAP Rule Packs" means a predefined set of criteria that identifies suspicious events or threats based on the associated rule type within the TAP Subscription. 2 Scope of FaaS - Continuous Vigilance (CV1 Subscription. During the Subscription Term, FireEye will provide the CV Subscription as set forth in this Section 2, according to the Subscription level purchased by Customer as set forth in the Subscription Order. If the Subscription Order does not specify the Subscription Ivel purchased, then Customer will be deemed to have purchased the APT Only Service. All services Customer requests that are not described in this Section 2 will be performed at mutually agreed upon rates as set forth in Statements of Work. Unless otherwise specified, the CV Subscription is provided by FireEye personnel remotely accessing Customer's environment from FireEye's networks. The CV Subscription is available for the number of Nodes purchased (available for Customers who have purchased the FireEye NX, FX, or EX Product or the ETP or TAP Subscription). If the number of Nodes exceeds the amount reflected in the Subscription Order by more than ten percent (10%), FireEye will notify Customer in writing, and will issue an invoice for the next higher Node Band at FireEye's then -current rates pro -rated for the remaining portion of the then -current Subscription Term. 2.1 Event Analysis. u Time fo Begin Analysis,.FireEye will begin analysis of an Alert within the times set forth in the table below, calculated from the time the Alert was generated by the Product or TAP Subscription (as applicable). Alerts Investigated. FireEye will investigate and report on the Alerts that correspond with the Subscription level the Customer purchased. If the Customer purchased the APT Only Service, FireEye will investigate and report on only APT Alerts. If the Customer purchased the High Priority Alerts Service, FireEye will investigate and report on only High Priority Alerts and APT Alerts. If the Customer purchased the All Alerts Service, FireEye will investigate and report on APT Alerts, High Priority Alerts, and Low Priority Alerts. FireEye has no obligation to investigate and report on Alerts that fall outside the purchased Subscription level. Jcjj Ilr2 fiat In,vestigati srr.-FireEye analysts will perform an initial analysis of the Customer's Covered Systems to determine if the Alert is a true or false positive, benign or suspicious activity. u l=ogrts,. If FireEye's investigation determines that the Alert indicates a true compromise, FireEye will publish a FaaS Report to the FaaS Portal within one (1) hour of the time FireEye makes that determination. Regardless of whether FireEye's investigation determines that an Alert indicates a true compromise, FireEye will publish a FoaS Report on the Alert to the FaaS Portal within the times set forth in the table Confidential FireEye Rev. 8/2016 Page 20 Agreement No. 7434 below, based on the classification of the Alert (APT Alert, High Priority Alert, Low Priority Alert). Customer acknowledges that in some cases, when FireEye's investigation is not complete, a FaaS Report may provide only an update of current status of the Alert investigation. Alerts Investigated (Level of FaaS Alert __......_......... Time to Time to Time to Publish Service) Classification Begin Publish FaaS FaaS Report Investigation Report (from (when no _ ....... _...... _......._ (from time time FireEye validation of APT Only High Full Product or validates actual Service Priority Coverage TAP actual compromise; Alerts Service Subscription compromise) from time Service generates Product or TAP Alert) Subscription generates Alert) Yes Yes Yes APT Alert 1 hours..._ 1 hour _m 24 hours No Yes Yes High Priority 7 hours 1 hour 24 hours Alert No No Yes Low Priority 24 hours 1 hour 48 hours Alert The service levels noted in the table above will become effective thirty (30) days following the Order Effective Date, to allow time for Customer to install Products and for FireEye to determine the level of staffing needed to respond to Alerts in Customer's environment. (e) Extended Investigations; Multiple Related Alerts. When FireEye has identified a true positive or suspicious activity, FireEye analysts may perform an extended investigation, and/or may aggregate and review multiple Alerts from related Covered Systems to determine the extent of activity related to the Alert. FireEye analysts may append results from the extended investigation or subsequent Alert investigations to the initial FaaS Report if FireEye determines that additional or subsequent Alerts are related, and in such cases, FireEye will not be required to issue a separate FaaS Report for each such related Alert. (f) Non -Remediable Alerts. FireEye has no obligation to notify the Customer or generate a new FaaS Report on new Alerts that are directly related to previous investigations where a FaaS Report has been published and FireEye has provided recommended remediation steps, when the Customer has acknowledged the FaaS Report but chooses not to or cannot remediate the cause of these Alerts. (g) Alert Priority. FireEye may re -prioritize Alerts, regardless of their severity classification, to provide focus to Alerts that FireEye determines may have the largest impact to the Customer's environment. (h) Hunting. FireEye will conduct periodic proactive hunting techniques on Covered Systems to look for additional indicators of malicious or attacker activity. When FireEye's investigation reveals a compromise, then within one (1) hour of the time FireEye makes that determination, FireEye will publish a FaaS Report related to that activity to the FaaS Portal. (i) Continuity of Monitoring. All monitoring, investigation and reporting activities described in this Section 2.1 will be provided on a 24/7/365 basis. 2.2 System Health Monitoring and Notification. For Customers who have purchased the FireEye NX, EX, or FX Product, FireEye will provide Customer with notifications of system health issues such as connectivity problems. 2.3 Containment. When the Customer has purchased the HX Product, FireEye may, when appropriate, recommend containment of the target Covered System from the Customer's network. Containment must be executed by the Customer. 2.4 Portal Access. Alerts and FaaS Reports will be provided via an online portal ("FaaS Portal"), and FireEye will provide login credentials to the Customer to enable access to the FaaS Portal. The FaaS Portal will be Confidential FireEye Rev. 8/2016 Page 21 Agreement No. 7434 available 99.9% of the time in any calendar month, other than Downtime, as defined below, and this FaaS Portal Service Level commitment will be subject to the Service Level Credits set forth in Section 3 below. 2.5 FireEye Intelligence Center. During the Subscription Term, FireEye will provide access to the FireEye Intelligence Center (FIC), which includes the Community Threat Intelligence (CTI) platform, subject to the following: (f) Permitted Use; Reports. Customer may access, view and use FIC and content appearing on FIC ("FIC Content") solely for internal use. Some features of FIC may allow Customer to generate a report (each, a "FIC Report"). FIC Reports and FIC Content are FireEye IP. Subject to Customer's payment obligations, FireEye grants to Customer a limited, non-exclusive right to produce FIC Reports using FIC, and reproduce and distribute those FIC Reports and FIC Content internally for Customer's own business purposes. (g) Additional Use Limitations. Customer may appoint up to fifteen (15) users of FIC at any time. Each day, all users on Customer's account may collectively make up to (A) one hundred (100) queries of IP addresses and domain names and (B) one hundred (100) queries of malware. Customer may request additional queries, to be evaluated by FireEye on a case by case basis. (h) User Content. "User Content" means any communications, images, sounds, and all the material and information that Customer or anyone using Customer's account contributes to or through FIC, including any contributions to or through the CTI platform (e.g., comments to FIC Content, suspected malware that Customer uploads to FIC). Customer hereby grants FireEye a perpetual, irrevocable, worldwide, paid -up, non-exclusive, license, including the right to sublicense to third parties, and right to reproduce, fix, adapt, modify, translate, reformat, create derivative works from, publish, distribute, sell, license, transmit, publicly display, publicly perform, or provide access to electronically, broadcast, display, perform, and use and practice such User Content as well as all modified and derivative works thereof. Customer represents that Customer has all necessary rights to grant the license referenced in the preceding sentence. FireEye may use and disclose any of the information it collects about its customers' use of FIC, including CTI, to the extent such information is de -identified. (i) Restrictions. Customer may not access FIC by any means other than through the interface that is provided or approved by FireEye. Customer will not collect any information from or through FIC using any automated means, including without limitation any script, spider, "screen scraping," or "database scraping" application, and Customer will not damage, disable, overburden, or impair FIC or interfere with any other party's use and enjoyment of FIC. (j) Customer acknowledges that some optional features and content appearing on FIC may require payment of additional fees. 2.6 Reseller and Partner Purchases. If Customer receives the Subscription via a FireEye authorized services or support partner (a "Partner"), Customer agrees that the Subscription and FaaS Reports may be delivered to Customer through the Partner. Notwithstanding any other confidentiality obligations between the parties, Customer authorizes FireEye to disclose information related to the Subscription and Customer Data to Partner. 2.7 Customer Networks. The Subscription may only be provided for computer systems and networks leased to or owned by Customer, and under Customer's control, up to the number of Nodes allowed, as set forth in the applicable Subscription Order. 2.8 Connectivity Requirements. Unless otherwise specified, the Subscription are provided by FireEye personnel remotely accessing Customer's environment from FireEye's networks. Customer must provide outbound TCV- based connectivity from all Products to FireEye for the establishment of a virtual private network (VPN). Details pertaining to specific network access requirements will be established in conjunction with installation activities. 2.9 Credential Security. Customer will be responsible for the following: (a) providing accurate information to FireEye for provisioning access to (and removal of) Customer personnel access to the FaaS Portal; (b) implementing and adhering to strong password standards; (c) providing accurate information to FireEye for domain whitelisting; and (d) reporting any security issues related to the Subscription (including the FaaS Portal) to FireEye immediately. Confidential FireEye Rev. 8/2016 Page 22 Agreement No. 7434 2.10 Exclusions. Notwithstanding anything else contained in this Agreement to the contrary. FireEye shall have no obligation or responsibility to provide the Subscription for (i) Products for which Customer does not have an active Subscription in place; (ii) Products that the Customer (or FireEye or another third party on Customer's behalf) has configured with a one-way feed of FireEye's Dynamic Threat Intelligence (DTI) Subscription; (iii) Products with an installed FireEye operating system less than version 6.2; (iv) Products that have been declared end of life; (v) Products that have no active Support Service in place; (vi) Products for which software updates have not been applied; (vii) Products that have not been installed and deployed; or (viii) Products that are misconfigured or incorrectly deployed, which prevents the Products from monitoring the Covered Systems. Customer acknowledges that to facilitate FireEye's efficient performance of the Subscription, FireEye may control some features and functionality of the Products, and that such features or functionality may not be available for Customer's independent use during the Subscription Term. 3. FaaS Portal Availability 3.1 FireEye shall undertake commercially reasonable efforts to ensure the FaaS Portal availability for 99.9% of the time during each calendar month. 3.1.1 "Service Outage" is where the FaaS Portal is not available due to a failure or a disruption in the FaaS Portal that is not the result of Scheduled Maintenance, Emergency Maintenance, a force majeure event or of the act or omission of Customer. 3.1.2 "Scheduled Maintenance Period" is the period during which weekly scheduled maintenance of the FaaS Portal may be performed, or a maintenance window otherwise mutually agreed upon by FireEye and Customer. 3.1.3 "Emergency Maintenance" means any time outside of Scheduled Maintenance that FireEye is required to apply critical patches or fixes or undertake other urgent maintenance. If Emergency Maintenance is required, FireEye will contact Customer and provide the expected time frame of the Emergency Maintenance and availability of the FaaS Portal during the Emergency Maintenance. 3.1.4 "System Availabiliy' means the percentage of total time during which the FaaS Portal shall be available to Customer, excluding the Scheduled Maintenance Period, Emergency Maintenance, force majeure events, or acts or omissions of the Customer that cause system downtime. 3.2. Remedy 3.2.1 In the event that the FaaS Portal does not meet the monthly service availability defined in 3.1, FireEye will provide a credit to the Customer in accordance to the table below ("Credit") for a validated SLA Claim (defined below). 3.2.2 For determining the Credit, the duration of a Service Outage will be measured as the time starting when Customer experiences a disruption in availability of the FaaS Portal and ending when a successful solution or workaround allowing for full restoration of the FaaS Portal is provided by FireEye to Customer. Customer must notify FireEye in writing of any Service Outage no later than fifteen (15) days after the calendar month in which the Service Outage occurred ("SLA Claim") to be entitled to a Credit for that Service Outage. 3.2.3 Any Credits earned by Customer hereunder will be applied to the Subscription Fees owed by Customer for the next Subscription Term for which the Credit applies. If Credits cannot be applied to future Subscription Fees because the Subscription Term has terminated for non -renewal or for a material uncured breach by Customer, such credits shall become null and void. If Credits cannot be applied to future Subscription Fees because the Subscription Term has terminated due to a material uncured breach by FireEye, FireEye will promptly pay Customer the amount of the Credit. Confidential FireEye Rev. 8/2016 Page 23 Agreement No. 7434 3.2.4 Customer shall not be entitled to receive a Credit that exceeds 10% of its prorated monthly Subscription Fee for a Service Outage for the applicable calendar month. Confidential Fire Eye Rev. 8/2016 Page 24 Agreement No. 7434 EXHIBIT B-3 SUBSCRIPTION TERMS FOR FIREEYE THREAT ANALYTICS PLATFORM (TAP) The following terms govern the Threat Analytics Platform Subscription, including purchase and support of TAP Cloud CollectorTm Appliances and Support. 1. TAP Software, Alerts 1.1.1 TAP Software and Hardware. As part of the TAP Subscription, FireEye may deliver to Customer one or more software files (individually and collectively, "TAP Software"), and/or one or more "Cloud Collector" hardware appliances ("Cloud Collector Appliances"), which may contain TAP Software. Subject to full payment of all Fees associated with the TAP Subscription, FireEye grants to Customer a non-exclusive, limited right and license to install and run the TAP Software during the Subscription Term solely for purposes of using the TAP Subscription in accordance with the Documentation for the TAP Subscription. 1.1.2 Access; Customer Logs. FireEye will provide Customer with credentials to enable access to the TAP Subscription. Using the TAP Software, and subject to payment of Fees for the TAP Subscription and any Cloud Collector Appliances, Customer may upload Customer Logs to the TAP portal ("TAP Portal"). "Customer Logs" means any communications, logs and other content and information that Customer or anyone using Customer's account contributes to or through the TAP Portal. Customer grants to FireEye a perpetual, irrevocable, worldwide, paid -up, non-exclusive license and right to reproduce, modify, create derivative works from, publish, distribute, sell, sub -license, transmit, publicly display and provide access to Customer Logs, for purposes of enhancing FireEye's products and services, so long as (i) FireEye ensures that any Customer Confidential Information is removed from Customer Logs, and (ii) FireEye's use of Customer Logs does not in any way identify Customer or its employees or in any other way allow a third party to identify Customer as the source of the Customer Logs. Customer Logs are Customer's property, and other than the licenses granted in herein, FireEye does not obtain any ownership rights in Customer Logs. 1.1.3 TAP Alerts. Some features of the TAP Subscription may generate alerts of suspected malicious activity (each, a "TAP Alert"). TAP Alerts are FireEye Materials. FireEye hereby grants to Customer a limited, non-exclusive right to use TAP Alerts, and reproduce and distribute those TAP Alerts internally for Customer's own business purposes. 1.1.4 Cloud Collector Management. If Customer has installed Cloud Collectors in connection with the TAP Subscription, then FireEye will continuously monitor the Customer's Cloud Collector Appliances or Cloud Collector TAP Software for system health issues such as monitoring to ensure proper throughput and relay of data. 1.1.5 Cloud Collector Appliances. If the Customer has purchased Cloud Collector Appliances, then during the TAP Subscription Term, FireEye will replace any defective Cloud Collector Appliances as follows: a) Prior to any return, Customer shall verify that the Cloud Collector Appliance at issue is defective by logging a Support request via one of the mechanisms provided in the Documentation and in accordance with FireEye's RMA procedures, including providing the part number, serial number, quantity and reason for return, an explanation of all failure symptoms and other relevant information. b) Upon confirmation by FireEye of a defect, Customer shall obtain from FireEye an RMA number. FireEye shall ship via a recognized express courier service a replacement Cloud Collector Appliance to Customer to arrive no later than next business day after FireEye's issuance of an RMA number, provided the RMA number was issued prior to the business day cutoff time local to the defective Cloud Collector Appliance, provided the replacement does not require any custom pre -configuration, and provided no external-to- FireEye circumstances prevent the delivery. The replacement Cloud Collector Appliance may be a new or reconditioned Cloud Collector Appliance (of equivalent or better quality) at FireEye's sole discretion. c) FireEye shall pay the shipping costs to ship the replacement Cloud Collector Appliance to Customer, but Customer shall bear any and all risk of loss of or damage to said Cloud Collector Appliance at all times after said Cloud Collector Appliance is made available by FireEye to the common carrier. Confidential FireEye Rev. 8/2016 Page 25 Agreement No. 7434 d) Within five (5) business days after Customer receives the replacement Cloud Collector Appliance from FireEye, Customer shall package the defective Cloud Collector Appliance in its original packing material or equivalent, write the RMA number on the outside of the package and return the defective Cloud Collector Appliance, at FireEye's cost (provided Customer utilizes FireEye's designated courier service and properly packages the defective Cloud Collector Appliance according to FireEye's instructions), shipped properly insured, FOB FireEye's designated facility. Customer shall enclose with the returned Cloud Collector Appliance the applicable RMA form, and any other documentation or information requested by FireEye customer support. Customer shall assume any and all risk of loss of or damage to such Cloud Collector Appliance during shipping. Title to the defective Cloud Collector Appliance shall pass to FireEye upon FireEye's receipt thereof. e) When a replacement Cloud Collector Appliance is provided and Customer fails to return the defective Cloud Collector Appliance to FireEye within ten (10) business days after Customer receives the replacement Cloud Collector Appliance from FireEye, FireEye may charge Customer, and Customer shall pay for the replacement Cloud Collector Appliance at the then -current list price. 2. Event Volume; True -Up 2.1.1 Fees for the TAP Subscription are divided into "Tiers" based on the volume of events processed through the TAP Subscription per second ("Event Volume"). If at any point during the Subscription Term, Customer's Event Volume exceeds the Tier upon which Customer's TAP Subscription Fees were based, FireEye will not guarantee that Customer Logs in excess of the purchased Tier will be ingested and processed by the TAP Subscription. In times of Event Volume in excess of the paid Tier, Customer Logs will enter a queue. Excessive queueing may cause Customer Logs to be lost from the queue. If at any point during the Subscription Term, Customer's average Event Volume for any consecutive thirty -day period exceeds the Tier upon which Customer's TAP Subscription Fees were based, FireEye may issue a true -up invoice for the pro -rated difference between the Fees already paid for that Subscription Term and FireEye's list prices for the Fees for the Tier associated with Customer's actual Event Volume for that thirty -day period, pro -rated to reflect that thirty -day period and the remainder of the Subscription Term. FireEye will apply any discounts that were applied to initial Fees to FireEye's list prices for any true -up invoice. Until such time that the True Up invoice is paid in full, the TAP Subscription will continue to ingest and process only the Event Volume of the purchased Tier, allowing any excess Customer Logs to enter queueing conditions. The Tier for any Renewal Subscription Term will be the Tier associated with the actual Event Volume for the immediately preceding Subscription Term. 2.1.2 At the end of the Initial Subscription Term and each Renewal Subscription Term, FireEye may true -up Fees for that Subscription Term, and if the average monthly Event Volume for that Subscription Term exceeds the maximum Event Volume for the Tier for which Customer previously paid Fees, then (a) FireEye will issue a true -up invoice reflecting the difference between the Fees already paid for that Subscription Term and the Fees for the Tier associated with Customer's actual Event Volume. 3. TAP Portal Availability 3.1 FireEye shall undertake commercially reasonable efforts to ensure the TAP Portal availability for 99.9% of the time during each calendar month. 3.1.1 "Service Outage" is where the TAP Portal is not available due to a failure or a disruption in TAP Portal that is not the result of Scheduled Maintenance, Emergency Maintenance, a force majeure event or of the act or omission of Customer. 3.1.2 "Scheduled Maintenance Period" is the period during which weekly scheduled maintenance of the TAP Portal may be performed, or a maintenance window otherwise mutually agreed upon by FireEye and Customer. 3.1.3 "Emergency Maintenance" means any time outside of Scheduled Maintenance that FireEye is required to apply critical patches or fixes or undertake other urgent maintenance. If Emergency Maintenance is required, FireEye will contact Customer and provide the expected time frame of the Emergency Maintenance and availability of the TAP Portal during the Emergency Maintenance. Confidential FireEye Rev. 8/2016 Page 26 Agreement No. 7434 3.1.4 "System Availability" means the percentage of total time during which the TAP Portal shall be available to Customer, excluding the Scheduled Maintenance Period, Emergency Maintenance, force majeure events, or acts or omissions of the Customer that cause system downtime. 3.2. Remedy 3.2.1 In the event that the TAP Portal does not meet the monthly service availability defined in 6.1, FireEye will provide a credit to the Customer in accordance to the table below ("Credit") for a validated SLA Claim (defined below). Percent of TAP Portal Availabiliper Calendar Month Service Credit <99.9% 2% <99.0% 5% <98.0% 10% 3.2.2 For determining the Credit, the duration of a Service Outage will be measured as the time starting when Customer experiences unavailability of the TAP Portal and ending when a successful solution or workaround allowing for full restoration of the TAP Portal is provided by FireEye to Customer. Customer must notify FireEye in writing of any Service Outage no later than fifteen (15) days after the date the Service Outage occurred ("SLA Claim") to be entitled to a Credit for that Service Outage. 3.2.3 Any Credits earned by Customer hereunder will be applied to the Subscription Fees owed by Customer for the next Subscription Term for which the Credit applies. If Credits cannot be applied to future Subscription Fees because the Subscription Term has terminated for non -renewal or for a material uncured breach by Customer, such credits shall become null and void. If Credits cannot be applied to future Subscription Fees because the Subscription Term has terminated due to a material uncured breach by FireEye, FireEye will promptly pay Customer the amount of the Credit. 3.2.4 Customer shall not be entitled to receive a Credit that exceeds 10% of its prorated monthly Subscription Fee for a Service Outage for the applicable calendar month. 4. FireEye Intelligence CenterTm (FICTM), Community Threat IntelligenceTm (CTITM). During the Subscription Term, FireEye will provide access to the FireEye Intelligence Center (FIC), which includes the Community Threat Intelligence (CTI) platform, subject to the following: i. Permitted Use; Reports. Customer may view and use FIC and content appearing on FIC ("FIC Content") solely for internal use. Some features of FIC may allow Customer to generate a report (each, a "FIC Report"). FIC Reports and FIC Content are FireEye Materials. Subject to Customer's payment obligations, FireEye grants to Customer a limited, non-(xclusive right to produce FIC Reports and FIC Content using FIC, and reproduce and distribute those FIC Reports and FIC Content intemally for Customer's own business purposes. ii. Additional Use Limitations. Customer may appoint up to fifteen (15) users of FIC at any time. Each day, all users on Customer's account may collectively make up to (A) one hundred (100)queries of IP addresses and domain names, and (ii) one hundred (100) queries of malware. Customer may request additional queries, to be evaluated by FireEye on a case by case basis. iii. User Content. "User Content" means any communications, images, sounds, and all the material and information that Customer or anyone using Customer's account contributes to or through FIC including any contributions to or through the CTI platform (e.g., comments to FIC Content, suspected malware that Customer uploads to FIC). Customer hereby grants FireEye a perpetual, irrevocable, worldwide, paid -up, non-exclusive, license, including the right to sublicense to third parties, and right to reproduce, fix, adapt, modify, translate, reformat, create derivative works from, publish, distribute, sell, license, transmit, publicly display, publicly perform, or provide access to electronically, broadcast, display, perform, and use and practice such User Content as well as all modified and derivative works thereof. Customer represents that Customer has all necessary rights to grant the license referenced in the preceding sentence. FireEye may use and disclose any of the information it collects about its customers' use of FIC, including the CTI platform, to the extent such information is de -identified. Confidential FireEye Rev. 8/2016 Page 27 Agreement No. 7434 iv. Restrictions. Customer may not access FIC by any means other than through the interface that is provided or approved by FireEye. Customer will not collect any information from or through FIC using any automated means, including without limitation any script, spider, "screen scraping," or "database scraping" application, and Customerwill not damage, disable, overburden, or impair FIC or interfere with any other party's use and enjoyment of FIC. v. Customer acknowledges that some optional features and content appearing on FIC may require payment of additional fees. Confidential FireEye Rev. 8/2016 Page 28 Agreement No. 7434 EXHIBIT B-4 SUBSCRIPTION TERMS FOR FIREEYE EMAIL THREAT PREVENTION (ETP) and MOBILE THREAT PREVENTION (MTP) The following terms govern the Email Threat Prevention Subscription and Mobile Threat Prevention Subscription.. 1. Definitions. "Cloud Subscription" means the online, web -based applications and platform which is made accessible to Customer by FireEye via a designated website, which includes the associated offline Software components to be used in connection with FireEye Mobile Threat Prevention and/or FireEye Email Threat Prevention. FireEye Mobile Threat Prevention ("MTP") and FireEye Email Threat Prevention ("ETP") are separate Cloud Subscriptions and usage is conditional on what the Customer has indicated on an Order. "Customer Data" means data, information, applications, and any other items originated by Customer that Customer submits to the Cloud Subscription. "Customer Representatives" means any employee or contractor of Customer or Mobile Device Manager to whom Customer provides access to the Cloud Subscriptions (or any component thereof, including Software) for use on behalf of and for the benefit of the Customer and for Customer's internal business purposes, subject to all the terms and conditions of this Agreement. "Licensed Device" means (i) with respect to MTP, the registered devices that Customer may have at any time that are registered to the Cloud Subscription; which maximum number shall be based on the subscription fees paid by Customer and identified on the relevant purchase order from Customer as approved and invoiced by FireEye; and (ii) with respect to ETP, the number of email inboxes Customer may have at any time that are registered to the Cloud Subscription; which maximum number shall be based on the subscription fees paid by Customer and identified on the relevant purchase order from Customer as approved and invoiced by FireEye. For the avoidance of doubt, with respect to MTP, "registered devices" are those devices which have loaded device Software and which have been registered to the Cloud Subscription and which have not been retired (meaning unregistered). "Mobile Device Manager" shall mean a third party who has been engaged by the Customer to provide security services for Licensed Devices for the benefit of Customer. Where indicated as such, the Mobile Device Manager shall be a subset of the definition of the Customer Representatives solely as applicable to MTP. "Software" means the object code version of FireEye's proprietary computer programs delivered to Customer hereunder for use in connection with the Cloud Subscriptions, including collectively and individually the device - side software used on devices registered to the Cloud Subscription ("Device Software") and any connector software and/or any other server -side software (collectively the "Premise Software") , each which are delivered to Customer hereunder for use in connection with the Cloud Subscriptions, and any Documentation, backup copies and updates, upgrades, maintenance releases, bug fixes to any of the forgoing provided to Customer hereunder. 2. Right of Access and Use. During the Subscription Term, and subject to the terms of this Agreement, FireEye grants to Customer a non-exclusive right to (a) permit those Customer Representatives authorized by Customer to access and use the Cloud Subscriptions on Customer's behalf in compliance with the terms of this Agreement, and (b) to install, copy and use Premise Software in connection with Cloud Subscriptions in accordance with the Agreement and this Exhibit, but solely on systems and hardware owned or controlled or otherwise managed by Customer on behalf of and for the benefit of Customer, (c) to install, copy and use Device Software in connection with Cloud Subscriptions in accordance with the Documentation, but solely on devices used by Customer Representatives on behalf of and for the benefit of Customer. Notwithstanding anything else herein, the number of devices Customer and/or Customer Representatives may register to the Cloud Subscriptions may not exceed the number of Licensed Devices. Notwithstanding anything to the contrary herein, if Customer is using the Cloud Subscriptions for evaluation purposes then such Customer usage is solely for internal testing and evaluation and the Subscription Term shall not exceed fifteen (15) days unless otherwise mutually agreed upon in a signed Evaluation License Agreement. Confidential FireEye Rev. 8/2016 Page 29 Agreement No. 7434 3. Restrictions. Except as otherwise expressly permitted under this Agreement, Customer agrees that it shall not, nor shall it permit any third party to, (a) use the Cloud Subscriptions (or any portion thereof) in excess of or beyond the Subscription Term, the Licensed Device quantity, and/or other restrictions/limitations described in this Agreement; use the Cloud Subscriptions to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third -party privacy or other rights; (d) interfere with or disrupt the integrity or performance of the Cloud Subscriptions or third -party data contained therein; (e) use the Software on equipment or devices which are not specified in the Documentation; (f) Cloud Subscription specific to ETP Cloud Subscriptions, Customer shall route email through a commercially available secure email gateway for anti-spam scanning prior to relay through the FireEye network. No rights or licenses are granted other than as expressly and unambiguously set forth herein. Customer access and usage for the Cloud Subscriptions is limited to the MTP or ETP Subscription that has been paid or are being evaluated by the Customer. 4. Updates, Malware Detection Content and Support Services. Updates and malware detection content and/or support services are not necessarily provided with the Software or Subscriptions, and may require additional payment or include additional terms and conditions. However, to the extent that an update to the Software and/or malware detection content is provided, such update/content shall be deemed "Software" provided subject to this Agreement. If malware detection content/support services are provided, FireEye reserves the right to change the scope or duration of such services at anytime, and to access, freely use and distribute data collected from Customer through such services. If such services are made available, Customer may be required to pay fees or other charges for use or access to some or all such services, which fees and terms will be specified in the invoice or order form for such service. 5. Device Count Increases; Reporting; Invoice. If the number of devices that Customer or Customer Representatives have registered to the Cloud Subscription ("Actual Device Count") exceeds Customer's then current Licensed Device count or if Customer wishes to increase the Licensed Device count, then Customer shall notify FireEye (or the applicable FireEye Partner) and submit an Order for the incremental Subscription Fees due, and upon receipt of such Order, the Licensed Device count shall be amended to reflect this change. Upon written request, Customer will provide FireEye a report identifying (i) the Actual Devices; (ii) the copies of and location of the Premise Software maintained; and (iii) any other information reasonably requested by FireEye at the time as it relates to the use of the Cloud Subscription to determine compliance with the terms of this Agreement. FireEye and/or its Authorized Resellers may invoice Customer if it learns of any shortfalls, i.e. that the Licensed Device Count is below the Actual Device count. The fees charged to Customer for increases in License Device counts will be based on the then -current Subscription Term pricing. 6. Cloud Subscription Availability 6.1 FireEye shall undertake commercially reasonable efforts to ensure the Cloud Subscription availability for 99.9% of the time during each calendar month. 6.1.1 "Service Outage" is where the Customer is not receiving Cloud Subscription due to a failure or a disruption in the Cloud Subscriptions and is not the result of Scheduled Maintenance, Emergency Maintenance, a force majeure event or of the act or omission of Customer. 6.1.2 "Scheduled Maintenance Period" is the period during which weekly scheduled maintenance of the Cloud Subscriptions may be performed, or a maintenance window otherwise mutually agreed upon by FireEye and Customer. 6.1.3 "Emergency Maintenance" means any time outside of Scheduled Maintenance that FireEye is required to apply critical patches or fixes or undertake other urgent maintenance. If Emergency Maintenance is required, FireEye will contact Customer and provide the expected time frame of the Emergency Maintenance and availability of the Cloud Subscriptions during the Emergency Maintenance. 6.1.4 "System Availability" means the percentage of total time during which the Cloud Subscriptions shall be available to Customer, excluding the Scheduled Maintenance Period, Emergency Maintenance, force majeure events, or acts or omissions of the Customer that cause system downtime. Confidential FireEye Rev. 8/2016 Page 30 Agreement No. 7434 6.2. Remedy 6.2.1 In the event that the Cloud Subscription does not meet the monthly service availability defined in 6.1, FreEye will provide a credit to the Customer in accordance to the table below ("Credit") for a validated SLA Claim (defined below). 6.2.2 For determining the Credit, the duration of a Service Outage will be measured as the time starting when there is a disruption in Cloud Subscription and ending when a successful solution or workaround allowing for full restoration of the Cloud Subscriptions is provided by FreEye to Customer. Customer must notify FreEye in writing of any Service Outage no later than fifteen (15) days after the date the Service Outage occurred ("SLA Claim") to be entitled to a Credit for that Service Outage. 6.2.3 Any Credits earned by Customer hereunder will be applied to the Subscription Fees owed by Customer for the next Subscription Term for which the Credit applies. If Credits cannot be applied to future Subscription Fees because the Subscription Term has terminated for non -renewal or for a material uncured breach by Customer, such credits shall become null and void. If Credits cannot be applied to future Subscription Fees because the Subscription Term has terminated due to a material uncured breach by FreEye, FreEye will promptly pay Customer the amount of the Credit. 6.2.4 Customer shall not be entitled to receive a Credit that exceeds 100" of its prorated monthly Subscription Fee for a Service Outage for the applicable calendar month. Confidential FreEye Rev. 8/2016 Page 31 Agreement No. 7434 EXHIBIT B-5 SUBSCRIPTION TERMS FOR FIREEYE ADVANCED THREAT INTELLIGENCE PLUS (ATI+) The following terms govern the Advanced Threat Intelligence Plus (ATI+) Subscription. The ATI+ Subscription comprises two features: Continuous Monitoring ("CM" or "Continuous Monitoring") and the FireEye Intelligence Centerrm (FICTM) ("FIC"). Continuous Monitoring The Continuous Monitoring portion of the Subscription is purchased in connection with one or more FireEye Products, and includes the following during the Subscription Term for the specific Products for which Continuous Monitoring was purchased (some Products may not be eligible for CM): (a) Critical Event Notification. For Customers who have purchased the FireEye NX, FX, HX or EX Product, MVX Smart Grid with Network Smart node product combination, or the ETP or TAP Subscription, FireEye will provide Customer with proactive notifications of events FireEye determines to be critical that are logged by the Products ("Alerts"). FireEye will also provide Customer with access to a detailed description of the Alert. Alerts are not proof of vulnerability, threats or attacks on Customer. (b) System Health Monitoring and Notification. For Customers who have purchased the FireEye NX, EX, FX, HX AX or FX Product, or MVX Smart Grid w/Network Smart node combination (hardware only), FireEye will provide Customerwith proactive notifications of serious system health issues related to the hardware for Products covered by Continuous Monitoring. Customers will also be provided with metrics on critical event notifications and, for purchased hardware, the status of monitored hardware parameters. (c) Portal Access. Alerts and critical event notifications from Continuous Monitoring will be provided via an online portal, and FireEye will provide login credentials to the Customer to enable access to that portal. (d) Continuity of Monitoring. The monitoring activities described in (a)-(c) above will be provided on a 24/7 basis. (f) Reseller and Partner Purchases. If Customer receives the Subscription via a FireEye Partner, Customer agrees that the Subscription may be delivered to Customer through the Partner. Notwithstanding any other confidentiality obligations between the parties, Customer authorizes FireEye to disclose information related to the Subscription to the Partner. (g) Exclusions. Notwithstanding anything else contained in this Agreement to the contrary, FireEye shall have no obligation or responsibility to provide the Subscription for (i) Products for which Customer does not have an active Subscription in place; (ii) Products that the Customer (or FireEye or another third party on Customer's behalf) has configured with a one-way feed of FireEye's Dynamic Threat Intelligence subscription; (iii) Products with an installed FireEye operating system less than version 6.2; (iv) Products that are end of life; (v) Products that have no active support service in place; (vi) Products for which software updates have not been applied; or (vii) Products that have not been installed and deployed. 2. FireEye Intelligence Center TM (FICTM), Community Threat Intelligence TM (CTITM) FireEye will provide the FIC portion of the Subscription, which includes the Community Threat Intelligence (CTI) platform, during the Subscription Term, as set forth below: 2.1 Permitted Use; Reports. Customer may view and use FIC and content appearing on FIC ("FIC Content") solely for internal use. Some features of FIC may allow Customer to generate a report (each, a "FIC Report"). FIC Reports and FIC Content are FireEye Materials. Subject to Customer's payment obligations, FireEye grants to Customer a limited, non-exclusive right to produce FIC Reports and FIC Content using FIC, and reproduce and distribute those FIC Reports and FIC Content internally for Customer's own business purposes. Confidential FireEye Rev. 8/2016 Page 32 Agreement No. 7434 2.2 Additional Use Limitations. Customer may appoint up to fifteen (15) users of FIC at any time. Each day, all users on Customer's account may collectively make up to (i) one hundred (100) queries of IP addresses and domain names, and (ii) one hundred (100) queries of malware per day. Customer may request additional queries, to be evaluated by FireEye on a case by case basis. 2.3 User Content. "User Content" means any communications, images, sounds, and all the material and information that Customer or anyone using Customer's account contributes to or through FIC including any contributions to or through the CTI platform. Customer hereby grants FireEye a perpetual, irrevocable, worldwide, paid -up, non-exclusive, license, including the right to sublicense to third parties, and right to reproduce, fix, adapt, modify, translate, reformat, create derivative works from, publish, distribute, sell, license, transmit, publicly display, publicly perform, or provide access to electronically, broadcast, display, perform, and use and practice such User Content as well as all modified and derivative works thereof. Customer represents that Customer has all necessary rights to grant the license referenced in the preceding sentence. FireEye may use and disclose any of the information it collects about its customers' use of FIC, including the CTI platform to the extent such information is de -identified. 2.4 Restrictions. Customer may not access FIC by any means other than through the interface that is provided or approved by FireEye. Customer will not collect any information from or through FIC using any automated means, including without limitation any script, spider, "screen scraping," or "database scraping" application, and Customer will not damage, disable, overburden, or impair FIC or interfere with any other party's use and enjoyment of FIC. Customer acknowledges that some optional features and content appearing on FIC may require payment of additional fees. Confidential FireEye Rev. 8/2016 Page 33 Agreement No. 7434 EXHIBIT B-6 SUBSCRIPTION TERMS FOR FIREEYE INTELLIGENCE CENTERT- (FICT-) (INCLUDING COMMUNITY THREAT INTELLIGENCEW (CTITM)) The following terms govern the FireEye Intelligence CenterTm (FICTM) Subscription, which includes access to the Community Threat IntelligenceTM (CTITM) platform. 1. During the Subscription Term, FireEye will provide access to the FireEye Intelligence Center (FIC), which includes the Community Threat Intelligence (CTI) platform, subject to the following: i. Permitted Use; Reports. Customer may view and use FIC and content appearing on FIC ("FIC Content") solely for internal use. Some features of FIC may allow Customer to generate a report (each, a "FIC Report"). FIC Reports and FIC Content are FireEye Materials. Subject to Customer's payment obligations, FireEye grants to Customer a limited, non-exclusive right to produce FIC Reports and FIC Content using FIC, and reproduce and distribute those FIC Reports and FIC Content internally for Customer's own business purposes. ii. Additional Use Limitations. Customer may appoint up to fifteen (15) users of FIC at any time. Each day, all users on Customer's account may collectively make up to (A) one hundred (100)queries of IP addresses and domain names, and (ii) one hundred (100) queries of malware. Customer may request additional queries, to be evaluated by FireEye on a case by case basis. iii. User Content. "User Content" means any communications, images, sounds, and all the material and information that Customer or anyone using Customer's account contributes to or through FIC including any contributions to or through the CTI platform (e.g., comments to FIC Content, suspected malware that Customer uploads to FIC). Customer hereby grants FireEye a perpetual, irrevocable, worldwide, paid -up, non-exclusive, license, including the right to sublicense to third parties, and right to reproduce, fix, adapt, modify, translate, reformat, create derivative works from, publish, distribute, sell, license, transmit, publicly display, publicly perform, or provide access to electronically, broadcast, display, perform, and use and practice such User Content as well as all modified and derivative works thereof. Customer represents that Customer has all necessary rights to grant the license referenced in the preceding sentence. FireEye may use and disclose any of the information it collects about its customers' use of FIC, including the CTI platform, to the extent such information is de -identified. iv. Restrictions. Customer may not access FIC by any means otherthan through the interface that is provided or approved by FireEye. Customer will not collect any information from or through FIC using any automated means, including without limitation any script, spider, "screen scraping," or "database scraping" application, and Customer will not damage, disable, overburden, or impair FIC or interfere with any other party's use and enjoyment of FIC. v. Customer acknowledges that some optional features and content appearing on FIC may require payment of additional fees. Confidential FireEye Rev. 8/2016 Page 34 Agreement No. 7434 EXHIBIT B-7 SUBSCRIPTION TERMS FOR FIREEYE iSIGHT INTELLIGENCE The following terms govern the FireEye iSIGHT Intelligence Subscription ("iSIGHT" or "iSIGHT Subscription"). FireEye will provide the iSIGHT Subscription purchased by the Customer, as shown on the Order. 1. Definitions. 1.1 "Access Method(s)" or "Access Methods" means the MySIGHT Portal ("MySIGHT"), Software Development �it ("SDK"), Application Programming Interface ("API"), Browser Plugin, iSIGHT App for Splunk, or any other method provided by FireEye for Customer to access the iSIGHT Subscription, individually or collectively. All Access Methods are FireEye Material as defined in the Agreement. 1.2 "Application" is a software program the Customer creates, or causes to have created on its behalf, that is designed to access the Content, which includes the features of the SDK/API but adds significant functionality beyond that provided by the SDK/API. 1.3 "Application Programming Interface" or "API" means the latest version of the iSIGHT Application Programming Interface software made generally available by iSIGHT, with its developer's guide and other related material (available at http://www.isightpartners.com). 1.4 "Browser Plugin" means the iSIGHT Browser Plugin which a Customer may install on Google Chrome and/or other commercially available and supported browsers that allows the Customer to access and view the Content when licensed to do so. The Browser Plugin displays the iSIGHT logo and links to MySIGHT. The Browser Plugin includes the latest version of the Browser Plugin software, its documentation and any html embedded code. 1.5 "Content" means the cyber threat intelligence data and any reports, threat indicators, trends, events, information, documentation or functionality provided in connection with the iSIGHT Subscription. All Content is FireEye Material as defined in the Agreement. 1.6 "End User" means the Customer or the Customer's employees, as applicable. 1.7 "Software Development Kit" or "SDK" shall mean the latest publicly -available version of the iSIGHT Software Development Kit and any associated documentation, tools, libraries, technical notes, software code, or other materials. 1.8 "iSIGHT App for Splunk" means the application provided by FireEye, which a Customer may install on Splunk, that allows the Customer to access and view the Content in accordance with this Agreement. The iSIGHT App for Splunk includes the latest version of the iSIGHT App for Splunk software, its documentation and any html embedded code. 1.9 "iSIGHT Subscription" includes but is not limited to, Cyber Crime, Cyber Espionage, Critical Infrastructure, Enterprise, Hacktivism, Vulnerability and Exploitation, MySIGHT Portal, Global Response, Analyst Access, iSIGHT SDK, iSIGHT API, iSIGHT Research Reports, or the current offering(s) as listed on the iSIGHT website, and as purchased by the Customer as shown on the Order. 2. License; Access to iSIGHT Subscription and Content.. 2.1. Grant of Limited License. During the Subscription Term, FireEye grants to Customer in strict accordance with the terms of this Agreement, a limited, worldwide, revocable, non-exclusive, non -transferable, non - assignable, non-sublicensable royalty -free right and license to: (a) use MySIGHT, the iSIGHT Subscription, and any Content provided by FireEye for internal use only. The ISIGHT Subscription can be used by End Users who have a valid "need to know" within Customer's organization, typically defined as a person or group that has a direct role in securing information system or networks. FireEye agrees to provide support for the [SIGHT Subscription in accordance with Section 3 below ("Subscription Support" or "Support"). Confidential FireEye Rev. 8/2016 Page 35 Agreement No. 7434 (b) use the API to search, display, and otherwise access the Content. The API can be used to develop, display, or integrate applications, scripts, tools or workflows that interoperate with iSIGHT Subscriptions for the Customer's internal use. FireEye agrees to provide Support for the latest version of the API in accordance with Section 3 below. (c) download, install and use the Software Development Kit ("SDK") to design, develop and test an Application(s), for the Customer's internal use only, for the purpose of customizing access to the Content. The Customer may modify the source code versions of sample files, if any, included with the SDK for the purpose of creating Customer's Application(s), and may make a reasonable number of copies of the SDK as necessary to develop Customer's Application(s), provided that Customer must reproduce complete copies of the SDK, including without limitation all "read me" files, copyright notices, and other legal notices and terms. FireEye agrees to provide Support for the ISIGHT SDK in accordance with Section 3 below. (d) use the Browser Plugin to search, display and otherwise access the Content for the Customer's internal use only. Customer may install and use one copy of the Browser Plugin on a single computer per license. FireEye agrees to provide Support for the latest version of the Browser Plugin in accordance with Section 3 below (e) use the ]SIGHT App for Splunk to search, display and otherwise access the Content for the Customer's internal use only. Customer may install and use one copy of the ISIGHT App for Splunk on a single computer per license. FireEye agrees to provide Support for the latest version of the [SIGHT App for Splunk in accordance with Section 3 below. 2.2. Access Keys. Use of the Access Methods and access to the ISIGHT Subscription and the Content by Customer's End Users is provided through access keys or login credentials. Access keys in association with the Access Methods and ISIGHT Subscription shall be kept in confidence by Customer and Customer's End Users. Access keys will be issued to individual End Users by FireEye in accordance with each particular Access Method's parameters and will not be shared between End Users. Customer may not establish group accounts. Any unauthorized disclosure or dissemination of access keys by Customer or End Users shall be deemed a material breach of this Agreement. Customer shall inform FireEye of any data breach concerning login credentials in a timely manner. FireEye reserves the right to change, suspend, remove, or disable Customer's access keys to the Access Methods, ISIGHT Subscription , and Content upon notice if a material breach is suspected and not rectified upon notification. 2.3. Latest Version. The license granted to Customer under this Agreement is for the current version of the Access Methods. FireEye may release future versions of the Access Methods as determined in the sole discretion of FireEye. Nothing in this Agreement is a commitment to Customer of compatibility between the existing Access Methods and any future versions of the Access Methods. FireEye reserves the right to discontinue offering particular Access Methods (or any updates thereto) or to modify the Access Methods at any time in its sole discretion. 2.4. Multiple Copies. Customer may receive software for an Access Method in more than one medium and/or in multiple copies. The Customer's license rights are in accordance with the Order regardless of the number of copies received. 2.5. Additional Licenses. Customer may purchase additional licenses for the Browser Plugin for its authorized End Users through the Chrome Web Store. Customer may purchase additional licenses for the ISIGHT App for Splunk for its authorized End Users through Splunk. Additional licenses for the Browser Plugin and ISIGHT App for Splunk may be purchased and will be valid for the current Subscription Term as provided in the Order. 2.6. Customer Application. The Customer may allow Customer's employees to access and use the SDK/API on Customer's behalf to design an Application. The Customer may not rent, lease, sell, transfer, sublicense or time-share the Customer's Application to any third -party without the express consent of FireEye. Customer shall retain all right, title or interest in the Application and as such, Customer agrees to indemnify and hold harmless FireEye for any claims of infringement made against FireEye in connection with any Application. The Customer's Application(s) must perform in accordance with the terms of this Agreement and must ensure the security and confidentiality of FireEye's Confidential Information. Customer assumes full responsibility for any breach of Confidential FireEye Rev. 8/2016 Page 36 Agreement No. 7434 security caused by Customer's Application(s) in connection with the Content, API, SDK, and specifically to any unauthorized disclosure of any FireEye Materials or FireEye Confidential Information. 2.7. Content Modifications. Customer may access the Content from the MySIGHT Portal, via email, SMS, HTML, API, any other Access Methods as officially distributed by FireEye or an FireEye sanctioned third -party integration. FireEye reserves the right to modify, amend, augment, reduce or alter the Content's format, or Access Methods, or mode of retrieval of the Content, that in the sole judgment of FireEye is in its customers' best interests. Customer will be entitled to retrieve the Content with any updates, modifications, additions or changes in the Content. These changes may require Customer to upgrade its systems, hardware or software and FireEye will not be responsible for the costs of any such changes. 2.8. Prohibited Usage. Customer must comply with any Intellectual Property rights asserted in any materials contained in the Content. The following conduct and usage restrictions apply during Customer's download, installation, and use of the Content and/or Access Methods, and survive termination of the Agreement or Subscription Term. Customer and its authorized End Users may not: a. rent, lease, lend, sell, redistribute or sublicense any part of the ISIGHT Subscription or Access Methods to any other party; b. share the ISIGHT Subscription , Access Methods, Content or Confidential Information with any third -parties, except as expressly authorized in advance by this Agreement or by FireEye in writing; C. use the ISIGHT Subscription or Access Methods in the operation of a service or in any way to provide services to any third -party; d. create derivative works for external distribution or use based upon the Content; e. create apps, extensions, or other products and services that use Content except as set forth herein; f. display, post, frame, or scrape the Content, except as allowed under this Agreement; g. use the Access Methods for any other purpose than to access the ISIGHT Subscription and the Content; h. use the Access Methods for any illegal or unauthorized purpose to promote or provide instructional information about illegal activities or to promote stalking, physical harm or injury against any group or individual, or any use that violates the rights of privacy and publicity of others; i. create, place, or disseminate any materials or other items that are inappropriate, defamatory, obscene, pornographic, harassing, threatening, abusive, hateful or otherwise offensive, or is unlawful (including any content that infringes any patent, trademark, service mark, copyright, trade secret or other proprietary right of any third -party without appropriate permissions); j. transmit any viruses, worms, defects, Trojan horses, time -bombs, malware, spyware, or any other computer code of a destructive or interruptive nature in connection with use of the Access Methods; k. use the Access Methods in connection with or to promote any products, services, or materials that constitute, promote or are used primarily for the purpose of dealing in spyware, adware, or other malicious programs or code, counterfeit goods, unsolicited mass distribution of email ("spam"), hacking, surveillance, interception, descrambling equipment, stolen products and items used for theft; I. create any Application that exposes or provides functionality of the Access Methods to any third party; M. interfere, restrict or inhibit any other customer from using the Access Methods or Content or disrupt any services offered by FireEye through any medium; n. attempt to exceed or exceed the usage limits established by FireEye for the Customer (http://www.isightportners.com/doc/sdk-bp-docs/#/rate limiting). 2.9. Restrictions. FireEye expressly reserves the right to limit the number and/or frequency of requests for Content made through the Access Methods in its sole discretion in line with technical design and performance standards as documented in the publicly available developers guide. FireEye may limit the number of network calls that any Application may make via the Access Methods, the maximum file size, or the maximum amount of [SIGHT material that may be accessed. FireEye may change such usage limitations at any time and without notice. In addition to any other rights under this Agreement, FireEye may utilize technical measures to prevent over -usage or to stop usage of any Access Methods or any Application after any usage limitations are exceeded. The most current API/SDK documentation and developers guide can be found at http://www.isightportners.com/doc/sdk-bp-docs/#/, and these documents detail the current rates and capabilities of the API. 2.10. Customer recognizes and agrees that certain information and data that will be provided by Customer to FireEye pursuant to the ISIGHT Subscription is not owned by Customer and is not Confidential Information of Confidential FireEye Rev. 8/2016 Page 37 Agreement No. 7434 Customer. Malware submitted by Customer to FireEye for analysis under ISIGHT Global Response, and other information submitted by Customer to FireEye that is not unique to and/or developed by Customer (collectively "Submissions") shall not be considered Confidential Information or Intellectual Property of the Customer. FireEye may use the Submissions, aggregate the Submissions with submissions from other FireEye customers as well as original research and analysis, and share that aggregated intelligence with Customer and with other FireEye customers to enhance the services FireEye provides to its customers, l sreEye will anonymize all Submissions prior to distribution, and will not identify the source of any Submission without written permission in each case. 3. Service Levels. 3.1. Service Call and Subscription Support FireEye maintains a service desk in order to assist its customers with issues, trouble or general questions concerning use of the FireEye ISIGHT Products. Customer may initiate a service call as follows: FireEye Service Desk servi :edesk isirjht �or1'ners.coni, Primary, escalation and off -hours contacts Service Desk Hours 24 x 7 Service Call Response Time 4 hours for initial response ("Response Time Standard") (confirmation of receipt is immediate through an automated ticketing system) ISIGHT API General information regarding ISIGHT API which can be accessed at htt www.isi tit ariners,corri doc d i2.0 does tf Existing Clients - Contact your assigned Intelligent Account Manager at: client mentisi h 112arl r com Other resources Prospective Clients - (all other Subscription Support issues) Contact your assigned Sales Engineer at: s le -en irie(-rin O_ii ht c rtnerns. ~orri Partners, Resellers, Referrals - Contact partners program representative at: rfners01si ht artners.com FireEye will catalog and evaluate all bugs or software issues as they are reported. Such issues will be prioritized based on variables such as customer impact, security impact, etc. and will be scheduled for release accordingly. When applicable, FireEye will notify Customer of urgent patches or bug fixes. Support Services do not include custom programming services, on -site support, or other services including installation of hardware or software, or training. 3.2. Maintenance and Updates (a) When feasible and appropriate, FireEye will provide Customer prior notification about major releases at least two weeks in advance via communication from FireEye representatives. (b) Scheduled system maintenance will be performed during the targeted times of 01:00 - 07:00 UTC on Thursdays and 12:00 - 19:00 UTC on Sundays. Prior notification will be provided in the event of any impact to customer facing applications. (c) Emergency maintenance notifications will be provided by FireEye as early as possible but with a goal of six (6) hours' prior notice provided. Further, FireEye will strive to minimize the impact of any maintenance on any critical system during standard business hours around the globe. Confidential FireEye Rev. 8/2016 Page 38 Agreement No. 7434 3.3. Subscription Availability (a) The FireEye [SIGHT API will have at least 99% system uptime ("API Uptime Standard"). (b) The iSIGHT MySIGHT Portal will have at least a 99% system uptime ("Portal Uptime Standard"). (c) FireEye realizes that a failure to meet the Response Time Standard, API Uptime Standard and the Portal Uptime Standard (collectively, the "Service Level Standards") could have an adverse impact to Customer. If FireEye fails to meet any of the Service Level Standards ("Service Level Failure"), FireEye will: (i) promptly investigate and report on the root cause of the problem; (ii) advise Customer of the remedial efforts being undertaken with respect to this failure to meet the Service Level Standards; (iii) use commercially reasonable efforts to correct the problem and begin meeting the Service Level Standards; and (iv) take appropriate preventative measures designed to ensure that the problem does not recur. Confidential FireEye Rev. 8/2016 Page 39 Agreement No. 7434 EXHIBIT C FIREEYE SUPPORT SERVICES APPLICABLE FOR FIREEYE PRODUCTS 1. SUPPORT PURCHASED SEPARATELY FROM THE PRODUCTS. In the event Customer has purchased the Products and pass -through Support Services from FireEye through a FireEye authorized reseller (a "Resellel"), Customer will be entitled to all the rights herein set forth related to the level of Support Service requested and paid for by it, provided Customer: (a) is the original purchaser of the covered Products, (b) has provided true, accurate, current and complete information to FireEye included with its purchase; and (c) has maintained and updated this information to keep it true, accurate, current, and complete. 2. SUPPORT SERVICES PROVIDED BY FIREEYE. FireEye offers a range of programs for the support of its Products as described below ("Support Programs"). Customer shall be entitled to receive the Support Services specified on the applicable support invoice and described below to the extent that Customer has paid in full the applicable Fees for Support Services. 2.1 Software Maintenance Services - include each of the following: Software Updates. During the Support Term , FireEye shall provide Customer notification of bug fixes, maintenance patches and new releases which may contain minor enhancements to the features or functions of the Product ("Updates"). FireEye may designate a particular release of the Product as an Update at its sole discretion. Customer may obtain Updates either through delivery of a machine-readable copy pursuant to instructions contained in the document notifying Customer of an available Update or by downloading the Update from FireEye's server via the Internet. FireEye reserves the right to impose additional charges for releases of Products (i) that provide major enhancements to the features or functions of the Products, as determined by FireEye at its sole discretion; or, (ii) that provide additional features or perform additional functions not provided or performed by the Products. Software Error Corrections. During the Support Term, FireEye shall use commercially reasonable efforts to correct any reproducible programming error in the software associated with the Product attributable to FireEye, employing a level of effort commensurate with the severity of the error, provided, however, that FireEye shall have no obligation to correct all errors in the Products. Upon identification of any programming error, Customer shall notify FireEye of such error in writing and shall provide FireEye with enough information to locate and reproduce the error. FireEye shall not be responsible for correcting any errors not attributable to FireEye. Errors attributable to FireEye shall be those that are reproducible by FireEye on unmodified Products. If it is found that a particular error is fixed in the most current Product release, then FireEye shall have no obligation to fix the error in any prior Product release and Customer will need to upgrade to the current Product release in order to obtain the fix. 2.2 Su2port Programs (a) Platinum Support includes all of the services set forth above under Software Maintenance Service (section 2.1) and additionally: • Email, Live Chat, Web or Telephone Support. During the Support Term, FireEye shall provide Customer technical email, live chat, web or telephone support for the Products twenty-four (24) hours per day, 365 days a year. FireEye's support technician shall only be obligated to respond to Customer's fifteen (15) designated contacts. • FireEye shall use commercially reasonable efforts to respond to the request for support as detailed in the Initial Response Times table found at https://www.fireeye.com/support/programs.html regarding use or installation of the Product that is communicated to FireEye via one of the mechanisms above to the attention of FireEye's support engineers. • Product Return. During the term of this Agreement, Customer shall have the right to return to FireEye any defective Product subject to the limited warranty. Additionally, FireEye will fulfill the following Advance Return provisions below. Confidential FireEye Rev. 8/2016 Page 40 Agreement No. 7434 Advance Replacement. Prior to any return as to which Advance Replacement applies, Customer shall verify that said Product is defective by logging a Support request via one of the mechanisms described above and in accordance with FireEye's RMA procedures, including providing the part number, serial number, quantity and reason for return, an explanation of all failure symptoms and other relevant information. Upon confirmation by FireEye of a defect, Customer shall obtain from FireEye an RMA number. FireEye shall ship via a recognized express courier service a replacement Product to Customer to arrive no later than next business day after FireEye's issuance of an RMA number, provided the RMA number was issued prior to the business day cutoff time local to the defective Product, provided the replacement does not require any custom pre -configuration, and provided no external-to-FireEye circumstances prevent the delivery. The replacement Product may be a new or reconditioned Product (of equivalent or better quality) at FireEye's sole discretion. FireEye shall pay the shipping costs to ship the replacement Product to Customer, but Customer shall bear any and all risk of loss of or damage to said Product at all times after said Product is made available by FireEye to the common carrier. The support service will transfer from the defective Product to the replacement Product. Within five (5) business days after Customer receives the replacement Product from FireEye, Customer shall package said defective Product in its original packing material or equivalent, write the RMA number on the outside of the package and return said defective Product, at FireEye's cost provided Customer utilizes FireEye's designated courier service and properly packages the defective Product according to FireEye's instructions, shipped properly insured, FOB FireEye's designated facility (except that FireEye shall pay for shipping). Customer shall enclose with the returned Product the applicable RMA form, and any other documentation or information requested by FireEye customer support. Customer shall assume any and all risk of loss of or damage to such Product during shipping. Title to the defective Product shall pass to FireEye upon FireEye's receipt thereof. When a replacement Product is provided and Customer fails to return the defective Product to FireEye within ten (10) business days after Customer receives the replacement Product from FireEye, FireEye may charge Customer, and Customer shall pay for the replacement Product at the then -current list price. (b) Platinum Priority Plus Support iincludes all of the services set forth above under Platinum Support [section 2.2(a)] and additionally: • Access to Support. Customer will be provided with direct priority access to Level 2 Advanced Engineering support who shall respond to Customer's unlimited number of designated contacts. A Designated Support Engineer (DSE) point of contact, who is available during Customer's business hours (for single Customer site if Product(s) installed at multiple Customer sites), will be made available to be the focal point of contact within FireEye, to project manage Customer's technical issues. • Onsite Support. Onsite visits for problem assistance at DSE's sole discretion. • Reporting. FireEye will supply Customer with monthly reports detailing technical support provided during the previous month. Quarterly business reviews will also be conducted. (c) Government Support, if available, includes all of the services set forth above under Platinum Support [section 2.2(a)] and additionally: • Email, Live Chat, Web or Telephone Support. For the specified country, access to citizens of that country for the fulfillment of Level 1 and 2 technical support requests. (d) Government Priority Plus Support includes all of the services set forth above under Government Support [section 2.2(c)] and additionally: • Access to Support. Customer will be provided with direct priority access to Level 2 Advanced Engineering support who are citizens of that country and shall respond to Customer's unlimited number of designated contacts. A Designated Support Engineer (DSE) point of contact who is a citizen of that country and available during Customer's business hours (for single Customer site if Product(s) installed at multiple Customer sites), will be made available to be the focal point of contact within FireEye, to project manage Customer's technical issues. • Onsite Support. Onsite visits for problem assistance at DSE's sole discretion. • Reporting. FireEye will supply Customer with monthly reports detailing technical support provided during the previous month. Quarterly business reviews will also be scheduled. Confidential FireEye Rev. 8/2016 Page 41 Agreement No. 7434 (e) Special Services. FireEye agrees to use commercially reasonable efforts to respond to any requests by Customer for support services not specifically provided for above. Customer acknowledges that all such services provided by FireEye shall be at FireEye's discretion and then -current fees and policies. 3. CUSTOMER RESPONSIBILITIES. 3.1 Reguesting Support Services. When requesting Support Services from FireEye under this Agreement, Customershould have the following information available to provide to FireEye, if requested: (1) detailed problem description, including operating system ("OS") version, Product model and serial number(s), of the affected Product, and a detailed description of the troubleshooting that has already been done to try to resolve the problem; (ii) detailed system log files; (iii) configuration and login details to allow FireEye access as needed to the Products via the Internet for the purpose of providing support services and permissions needed in order for FireEye to conduct such remote access; (iv) a detailed description of changes to the environment; and (v) Customer's unique ID, Account ID, the serial number(s) of the Product(s) covered by this Agreement or other unique customer identifier as assigned to Customer by FireEye. Customer acknowledges and agrees that failure to have any or all information or access available as needed by FireEye in order to provide the Support Services may result in delays in FireEye's response, may hinder FireEye's ability to perform the Support Services and/or may cause incorrect Support Program fulfillment. FireEye will not be responsible for any such delays and inability to perform due to causes not due to FireEye. 3.2 Customer Assistance. Customer agrees to: (i) ensure that their site complies with any and all applicable FireEye published system environmental specifications; (ii) follow FireEye's procedures when requesting Support Services; (iii) provide FireEye reasonable access to all necessary personnel to answer questions or resolve problems reported by Customer regarding the Products; (iv) promptly implement all Updates and error corrections provided by FireEye under this Agreement; (v) maintain FireEye supported versions of required third party software, if any; and (v) notify FireEye promptly of any relocation of the Products from the location to which the Products were originally shipped. Customer agrees to use reasonable efforts to resolve internally any support questions prior to requesting Support Services pursuant to this Agreement. During the Support Term, FireEye may obtain information regarding Customer's email communication and Customer agrees that, as a condition to FireEye's provision of Support Services, FireEye may use statistical data generated regarding Customer's email correspondence with customer support so long as the source or content of the emails is not being disclosed. 3.3 Contact People. Customer shall appoint the specified number of individuals (depending upon the Support Program purchased) within Customer's organization to serve as contacts between Customer and FireEye and to receive support through FireEye's telephone support center. Customer's contacts shall have been adequately trained on the Products and shall have sufficient technical expertise, training and experience. All of Customer's support inquiries shall be initiated through these contacts. 4. EXCLUSIONS. Notwithstanding anything else contained in this Agreement to the contrary, FireEye shall have no obligation or responsibility to provide any Support Services relating to problems arising out of or related to (i) Customer's failure to implement all Updates to the Product which are made available to Customer under this Agreement; (ii) the failure to provide a suitable installation environment; (iii) any alteration, modification, enhancement or addition to the Products performed by parties other than FireEye; (iv) use of the Products in a manner, or for a purpose, for which they were not designed; (v) accident, abuse, neglect, unauthorized repair, inadequate maintenance or misuse of the Products; or relocation of the Products (including without limitation damage caused by use of other than FireEye shipping containers), (vi) operation of the Products outside of environmental specifications; (vii) interconnection of the Products with other products not supplied by FireEye; (viii) use of the Products on any systems other than the specified hardware platform for such Products; or (ix) introduction of data into any database used by the Products by any means other than the use of the software associated with the Products. Notwithstanding anything else contained in this Agreement to the contrary, FireEye will support all generally available ("GA") versions of the FireEye OS, for a minimum of one (1) year from GA release date, regardless of the number of supported OS GA versions. FireEye will also support the two (2) most current OS GA versions, regardless of the elapsed time from GA release date. If available, and at FireEye's sole discretion, support for any other OS versions or for other problems not covered under this Agreement may be obtained at FireEye's then -current fees and policies for such services. FireEye's complete end of life policy can be found at LLtt www Frqye.com/sur.) on su orfedrodiact,.html LAPSED SUPPORT AND UPGRADED SUPPORT, Confidential FireEye Rev. 8/2016 Page 42 Agreement No. 7434 5.1 Lapsed Support. After any lapse of Support Services, the parties subsequently may elect to reinstate such Support Services for Products for which the Support Services lapsed pursuant to the terms and conditions set forth in this Agreement; provided, however, that (i) Customer agrees to pay for the period of time that has lapsed as well as any renewal term, and (ii) such Products must be in good working condition, as solely determined by FireEye or its designee. 5.2 Support Program Upgrade. At any time during the Term, Customer may upgrade to FireEye's next level of Support Program by (i) notifying FireEye of Customer's desire to upgrade; (ii) acknowledging in writing the then - current terms and conditions for the relevant Support Program; and (iii) paying FireEye the additional Support Fee owed in connection with such upgraded Support Program. Confidential FireEye Rev. 8/2016 Page 43 Agreement No. 7434 Exhibit A Product Passthrough Terms — Google Apps for Work (for Customers) Customer has entered into a certain written agreement (the "Agreement") pursuant to which Customer has purchased the right to access and use the Product. These Product Passthrough Terms set forth the terms and conditions under which Customer may access and use such Product. 1. Product. 1.1 Facilities and Data Trnsfer. All facilities used to store and process Customer Data will adhereto reasonable security standards no less protective than the security standards at facilities where Provider stores and processes its own information of a similar type. Provider has implemented at least industry standard systems and procedures to ensure the security and confidentiality of Customer Data, protect against anticipated threats or hazards to the security or integrity of Customer Data, and protectagainst unauthorized access to or use of Customer Data. As part of providing the Product, Provider maytransfer, store and process Customer Data in the United States or any other country in which Provider or its agents maintain facilities. By using the Product, Customer consents to this transfer, processing and storage of Customer Data. 1.2 Modifications. a. To the Product. Provider may make commercially reasonable changes to the Product, from timeto time. If Provider makes a material change to the Product, Customer may be informed of such change, provided that Customer has subscribed with Provider to be informed about such change. b. To URL Terms. Provider may make commercially reasonable changes to the URL Terms from timeto time. If Provider makes a material change to the URL Terms, Customer may be informed of such change through the Notification Email Address or via the Admin Console. If the change has amaterial adverse impact on Customer and Customer does not agree to the change, Customer must so notify Partner or Provider via the Help Center within thirty days after receiving notice of the change. Upon such notification, Customer will remain governed by the URL Terms in effect immediately prior to the change until the end of the then -current term for the affected Product. If the affected Product is renewed, they will be renewed under Provider's then current URL Terms. 1.3 Customer Domain Name Ownershrig. Prior to providing the Product, Provider or Partner may verify that Customer owns or controls the Customer Domain Names. If Customer does not own, or control, the Customer Domain Names, then Provider will have no obligation to provide Customer with the Product. 1.4 Federal Information Security Mana ement Act FISMA The Provider's Product known as "GoogleApps Core Services" received a FISMA "Authorization to Operate" for a Moderate impact system. Providerwill continue to maintain a System Security Plan (SSP) for the Google Apps Core Services, based on NIST 800- 53 Rev. 3, or a similarly applicable standard. If Provider does not maintain this SSP as stated, Customer's sole and exclusive remedy, and Provider's entire liability, will be Customer's ability to terminate use of the Product upon thirty days prior written notice. 2. CustompLObfictgfions. 2.1 Compliance. Customer will use the Product in accordance with the Acceptable Use Policy. Provider may make new applications, features or functionality for the Product available from time to time, the use of which may be contingent upon Customer's agreement to additional terms. In addition, Provider will makeother Non-Google Apps Products (beyond the Product) available to Customer and its End Users in accordance with the Non-Google Apps Product Terms and the applicable product -specific Provider terms of service. If Customer does not desire to enable any of the Non-Google Apps Products, Customer can enable or disable them at any time through the Admin Console. 2.2 Customer Administration of the Product. Customer may specify one or more Administrators through the Admin Console who will have the rights to access Admin Account(s) and to administer the End User Accounts. Customer and Partner are responsible for: (a) maintaining the confidentiality of the password and Admin Account(s); (b) designating those individuals who are authorized to access the Admin Account(s); and (c) ensuring that all activities that occur in connection with the Admin Account(s) comply with these v9/23/2015 Agreement No. 7434 Product Passthrough Terms. Customer agrees that Provider's responsibilities do not extend to the internal management or administration of the Product for Customer and that Provider is merely adata-processor. 2.3 End User Consent. Customer's Administrators may have the ability to access, monitor, use, or disclose data available to End Users within the End User Accounts. Customer will obtain and maintain all required consents from End Users to allow: (i) Customer's access, monitoring, use and disclosure of this data and Provider providing Customer with the ability to do so, and (ii) Provider to provide the Product. 2.4 Unauthorized Use. Customer will use commercially reasonable efforts to prevent unauthorized use of the Product, and to terminate any unauthorized use. Customer or Reseller will promptly notify Provider of any unauthorized use of, or access to, the Product of which it becomes aware. 2.5 Restrictions on!U e. Unless Provider specifically agrees in writing, Customer will not, and will use commercially reasonable efforts to make sure a third party does not: (a) sell, resell, lease, or the functional equivalent, the Product to a third party (unless expressly authorized in these Product Pasthrough Terms); (b) attempt to reverse engineer the Product or any component; (c) attempt to create a substitute orsimilar service through use of, or access to, the Product; (d) use the Product for High Risk Activities; or (e) usethe Product to store or transfer any Customer Data that is controlled for export under Export Control Laws. Customer is solely responsible for any applicable compliance with HIPAA. 2.6 Third PaLty Requests. Customer is responsible for responding to Third Party Requests. Provider will, tothe extent allowed by law and by the terms of the Third Party Request: (a) promptly notify Customer of its receipt of a Third Party Request; (b) comply with Customer's reasonable requests regarding its efforts to oppose a Third Party Request; and (c) provide Customer with the information or tools required for Customer to respond to the Third Party Request. Customer will first seek to obtain the information required to respond to the Third Party Request on its own, and will contact Provider only if it cannot reasonably obtain such information. 3. Technical Support Services. 3.1 E' Customer. Customer or Partner will, at its own expense, respond to questions and complaints from End Users or third parties relating to Customer's or End Users' use of the Product. Customer or Partner will use commercially reasonable efforts to resolve support issues before escalating them to Provider. 3.2 By Provider. If Customer or Partner cannot resolve a support issue consistent with the above, then Customer or Partner (as applicable based on the agreement between Provider and Partner) may escalate the issue to Provider in accordance with the TSS Guidelines. Provider will provide TSS to Customeror Partner (as applicable) in accordance with the TSS Guidelines. 4. -Sus ension. 4.1 Of End User Accounts by Provider'. If Provider becomes aware of an End User's violation of these Product Passthrough Terms, then Provider may specifically request that Customer Suspend the applicable End User Account. If Customer fails to comply with Provider's request to Suspend an End User Account, then Provider may do so. The duration of any Suspension by Provider will be until the applicable End User has cured the breach which caused the Suspension. 4.2 Emerge gy Sec, . Notwithstanding the foregoing, if there is an Emergency Security Issue, then Provider may automatically Suspend the offending use. Suspension will be to the minimum extent and of the minimum duration required to prevent or terminate the Emergency Security Issue. If Provider Suspends an End User Account for any reason without prior notice to Customer, at Customer's request, Providerwill provide Customer the reason for the Suspension as soon as is reasonably possible. 5. Confidential information. 5.1 Oblloations. Customer and Provider will: (a) protect the other's Confidential Information with the same standard of care it uses to protect its own Confidential Information; and (b) not disclose the Confidential Information, except to Affiliates, employees and agents who need to know it and who have agreed in writing to keep it confidential. Customer and Provider (and any Affiliates, employees and agents to whom ithas disclosed Confidential Information) may use Confidential Information only to exercise rights and fulfill its obligations under these Product Passthrough Terms, while using reasonable care to protect it. Customer v9/23/2015 Agreement No. 7434 and Provider, respectively, will be responsible for any actions of its Affiliates, employees and agents in violation of this Section. 5.2 Exceptions. Confidential Information does not include information that: (a) the recipient of the Confidential Information already knew; (b) becomes public through no fault of the recipient; (c) was independently developed by the recipient; or (d) was rightfully given to the recipient by a third party. 5.3 Rouired_Disclosure. Customer and Provider may disclose the other's Confidential Information when required by law but only after it, if legally permissible: (a) uses commercially reasonable efforts to notify the other; and (b) gives the other the chance to challenge the disclosure. 6.1 Intellectual Prooerty Rights. Except as expressly set forth herein, these Product Passthrough Terms does not grant either Customer or Provider any rights, implied or otherwise, to the other's content or any of the other's intellectual property. As between the Customer and Provider, Customer owns all Intellectual Property Rights in Customer Data, and Provider owns all Intellectual Property Rights in the Product. 6.2 Display of Brand Features. Provider may display those Customer Brand Features authorized byCustomer (such authorization is provided by Customer uploading its Brand Features into the Product), and within designated areas of the Service Pages. Customer may specify the nature of this use using the Admin Console. Provider may also display Provider Brand Features on the Service Pages to indicate thatthe Product are provided by Provider. Neither party may display or use the other party's Brand Features beyond what is allowed in these Product Passthrough Terms without the other's prior written consent. 6.3 Brand Features Limitation. Any use of Brand Features will inure to the benefit of the entity holding Intellectual Property Rights in those Brand Features. Any right to use its Brand Features pursuant to these Product Passthrough Terms may be revoked at any time with written notice to the other and a reasonable period to stop the use. 7. Publlici . Customer agrees that Provider may include Customer's name or Brand Features in a list of Provider customers, online or in promotional materials. Customer also agrees that Provider may verbally reference Customer as a customer of the Provider's Product that is the subject of these Product Passthrough Terms. 8. Representations Warranties and Disclaimers. 8.1 1�entattons and Warranties. Customer and Provider represent that each will comply with all laws and regulations applicable to its provision, or use, of the Product, as applicable (including applicable security breach notification law). Provider warrants that it will provide the Product in accordance with the applicable S LA. 8.2 Disclaimers. TO THE FULLEST EXTENT PERMITTED BY APPLICABLE LAW, EXCEPT AS EXPRESSLY PROVIDED FOR HEREIN, NEITHER PARTY MAKES ANY OTHER WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY OR OTHERWISE, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR USE AND NONINFRINGEMENT, PROVIDER MAKES NO REPRESENTATIONS ABOUT ANY CONTENT OR INFORMATION MADE ACCESSIBLE BY OR THROUGH THE PRODUCT. CUSTOMER ACKNOWLEDGES THAT THE PRODUCT IS NOT A TELEPHONY SERVICE AND THAT THE PRODUCT IS NOT CAPABLE OF PLACING OR RECEIVING ANY CALLS, INCLUDING EMERGENCY PRODUCT CALLS, OVER PUBLICLY SWITCHED TELEPHONE NETWORKS. 9. Term and Termination. 9.1 Term. The term for the Product will be as decided upon between Partner and Customer. These Product Passthrough Terms will remain in effect for the Term. 9.2 'Termination for Breach. The Services may be suspended or terminated, if: (i) Customer is in material breach of these Product Passthrough Terms and fails to cure that breach within thirty days after receipt of written notice; (ii) Customer ceases its business operations or becomes subject to insolvency proceedings andthe proceedings are not dismissed within ninety days; or (iii) Customer is in material breach of these Product Passthrough Terms more than two times notwithstanding any cure of such breaches. v9/23/2015 Agreement No. 7434 9.3 'Effects of Termination. If Services are terminated, then: (i) the rights granted by Provider to Customer, and Customer to Provider will cease immediately (except as set forth in this Section); (ii) neither Customer nor Partner will have access to, or the ability to export, the Customer Data; (iii) Provider will begin todelete Customer Data; and (iv) upon request will promptly use commercially reasonable efforts to return or destroy all other Confidential Information of the other. 10. Miscellaneous. 10.1 Product Development. The Product was developed solely at private expense and is commercial computer software and related documentation within the meaning of the applicable civilian and militaryfederal acquisition regulations and any supplements thereto. 10.2 Force Maieure. Due to circumstances beyond Provider's controls, Provider may not be able to provide the Product. 10.3 No Waiver. Failure to enforce any provision of these Product Passthrough Terms will not constitute a waiver. 10.4 No Agency. These Product Passthrough Terms do not create any agency, partnership orjointventure. 10.5 No Third -Pact Beneficiaries. There are no third -party beneficiaries to these Product Passthrough Terms. Customer's sole remedies will be set forth in its agreement with the Partner. 10.6 Survival. The following sections will survive expiration or termination of these Product Passthrough Terms: Sections 5, 6, 9.3, 10 and 12. 10.7 Severability. If any term (or part of a term) of these Product Passthrough Terms is invalid, illegal, or unenforceable, the rest of these Product Passthrough Terms will remain in effect. 10.8 Conflicting Terms. If there is a conflict between any terms of these Product Passthrough Terms and any other document that makes up the entire agreement as needed for Customer to use the Product, the terms of these Product Passthrough Terms will take precedence. 11. Additional Product Terms. 11.1 Ads. Provider does not serve Ads in the Product or use Customer Data for Ads purposes. 11.2 Aliases. Customer is solely responsible for monitoring, responding to, and otherwise processing emails sent to the "abuse" and "postmaster" aliases for Customer Domain Names but Provider may monitor emails sent to these aliases for Customer Domain Names to allow Provider to identify Productabuse. 11.3 Google Apps_'Vault Retention. If Customer is using Google Apps Vault, Provider will have no obligation to retain any archived Customer Data beyond the retention period specified by Customer. If Customerdoes not renew Google Apps Vault, Provider will have no obligation to retain any archived CustomerData. 12. Definitions. "Acceptable Use Polic " means the acceptable use policy for the Product available at htt //www. ago le.com/alhpI2 rntt/en ladmins/tgse oll-cy htmt,. The Acceptable Use Policy and such URLlink may be updated or modified by Provider from time to time. "Admin Accountlsl" means the administrative account(s) provided to Customer for the purpose of administering the Product. The use of the Admin Account(s) requires a password, which Provider will provide to Customer or Partner. "Admin Console" means the online tool Customer may use in reporting and certain other administration functions. "Administrators" mean the Customer -designated technical personnel who administer the Product to End Users on Customer's behalf. v9/23/2015 Agreement No. 7434 "Ads" means online advertisements displayed by Provider to End Users, excluding advertisements provided by any advertising products that are not part of the Product that Customer chooses to use in connection with the Product. "Affiliate" means any entity that directly or indirectly controls, is controlled by, or is under common control with an entity. "Brand Features" means the trade names, trademarks, service marks, logos, domain names, and other distinctive brand features of each party, respectively, as secured from time totime. "Confidential Information" means information disclosed or exchanged under these Product Passthrough Terms that is marked as confidential or would normally be considered confidential under the circumstances. Customer Data is Customer's Confidential Information. "Customer Data" means data, including email, provided, generated, transmitted or displayed via the Product by Customer, End Users, or Partner on behalf of Customer. "Customer Domain Name's" mean the domain names owned or controlled by Customer, which will be used in connection with the Product. Emergency Security Issue" means either: (a) Customer's use of the Product in violation of the Acceptable Use Policy, which could disrupt: (i) the Product; (ii) other customers' use of the Product; or (iii) the Providernetwork or servers used to provide the Product; or (b) unauthorized third party access to the Product. "End Users" means the individuals Customer permits to use the Product "End User Account" means a Provider -hosted account established by Customer through the Product for an End User. "E_ wort Control Lawns" means all applicable export and reexport control laws and regulations, including trade and economic sanctions maintained by the Treasury Department's Office of Foreign Assets Control, and the International Traffic in Arms Regulations ("ITAR") maintained by the Department of State. "]gggale Apps Core cervices" means the applicable Product purchased by Customer from Partner which are more fully described here: 9Lttt?.118oa l�omla/help"into/en/user User features.litml. The GoogleApps Core Services and such URL link may be updated or modified by Provider from time to time. "Help Center' means the Provider help center accessible at http://www.onocl1e.corn1M . The Help Center and such URL link may be updated or modified by Provider from time totime. "H_ dghml isk Aptivides" means uses such as the operation of nuclear facilities, air traffic control, or life support systems, where the use or failure of the Product could lead to death, personal injury, or environmental damage. "HIPAA" means the Health Insurance Portability and Accountability Act of 1996, as may be amended fromtime to time, and any regulations issued thereunder. "Intellectual Properly Fights" means current and future worldwide rights under patent law, copyright law, trade secret law, trademark law, moral rights law, and other similarrights. "Non -Goo le A s Products" means Provider products which are not part of the Product, but which maybe accessed by End Users using their End User Account login and password. The Non-Google Apps Productsare set forth at the following URL: http,//www.goocjle.com)support/a/bin/answ ei ?ht=en answer=18186 . The Non-Google Apps Products and such URL link may be updated or modified by Provider from time totime. Non ,oala A Product T rm " means the terms found at the following URL: htt�k/www,.g2ggke.com/gp-gas/infl/en/terms/additional services ht 1. The Non-Google Apps Product Termsand such URL link may be updated or modified by Provider from time totime. "Notification Email Address" means the email address designated by Customer to receive email notifications from Provider. Customer may provide a Partner email address for this purpose if it so chooses. Customer may change this email address through the Admin Console. v9/23/2015 Agreement No. 7434 "Provider' means the third party provider of the Product. "Partner' means the entity Customer is paying to provide access to and use of the Product. "Service Pages' mean the web pages displaying the Product to End Users. "Product" means, as applicable, the Google Apps Core Services purchased from Partner. "SLA" means the Service Level Agreement located here for applicable Google Apps Core Services: http:l/www.google,gpM)agps/i`nti/eri/tgrmiLrtseller sla-html. The SLA and such URL link may be updatedor modified by Provider from time to time. "Suspend" means the immediate disabling of access to the Product, or components of the Product, as applicable, to prevent further use of the Product. "Term" means the term of these Product Passthrough Terms, which will continue for as long as Customeris receiving Product from Provider, unless terminated earlier pursuant to these Product Passthrough Terms, or pursuant to Customer's agreement with Partner. "Third Party' bequest" means a request from a third party for records relating to an End User's use of the Product. Third Party Requests can be a lawful search warrant, court order, subpoena, other valid legal order, or written consent from the End User permitting the disclosure. "TSS" means the technical support Product provided by Provider to the Administrators during the Term pursuant to the TSS Guidelines. "TSS Gurdlines" means Provider's technical support Product guidelines then in effect for the Product. TSS Guidelines are at the following URL: htt ° 'fwwuv.a oagle.corru/ /haloLintl/en/adr7 i /tss ,h rrrl. The TSSGuidelines and such URL link maybe updated or modified by Provider from time to time. "URL Terms" means the Acceptable Use Policy, the SLA and the TSS Guidelines. v9/23/2015 Agreement No. 7434 SALESFORCE Service Terms "AppExchange" means the online directory of on -demand applications that work with the Service, located at hv, tom://wwvvwWa sq cxch nggwc,c�in or at any successor websites. "Service" means the online, Web -based application provided by aaleslorce cotrt_(sometimes referred to as "SFDC") via ktkl ://www.salesforce.com _and/or other designated websites, including associated offline components but excluding AppExchange applications. "Third -Party Applications" means online, Web -based applications and offline software products that are provided by third parties, interoperate with the Service, and are identified as third -party applications, including but not limited to those listed on the AppExchange. "User Guide" means the online user guide for the Services, accessible via htt :lp ww sales force, coni .,as updated from time to time. "Users" means Your employees, representatives, consultants, contractors or agents who are authorized to use the Service and have been supplied user identifications and passwords by You (or by Salesforc.cttl, or Your reseller at Your request). "You" and "Your" means the customer entity which has contracted to purchase subscriptions to use the Service subject to the conditions of these SFDC Service Terms. "Your Data" means all electronic data or information submitted by You to the Service. (a) User subscriptions cannot be shared or used by more than one User (but may be reassigned from time to time to new Users who are replacing former Users who have terminated employment with You or otherwise changed job status or function and no longer require use of the Service). (b) You (i) are responsible for all activities occurring under Your User accounts; (ii) are responsible for the content of all Your Data; (iii) shall use commercially reasonable efforts to prevent unauthorized access to, or use of, the Service, and shall notify Your reseller or Salc forcc.com promptly of any such unauthorized use You become aware of, and (iv) shall comply with all applicable federal laws and regulations in using the Service. (c) You shall use the Service solely for Your internal business purposes and shall not: (i) license, sublicense, sell, resell, rent, lease, transfer, assign, distribute, time share or otherwise commercially exploit or make the Service available to any third party, other than to Users or as otherwise contemplated by these SFDC Service Terms; (ii) send spam or otherwise duplicative or unsolicited messages in violation of applicable laws; (iii) send or store infringing, obscene, threatening, libelous, or otherwise unlawful or tortious material, including material that is harmful to children or violates third party privacy rights; (iv) send or store viruses, worms, time bombs, Trojan horses and other harmful or malicious code, files, scripts, agents or programs; (v) interfere with or disrupt the integrity or performance of the Service or the data contained therein; or (vi) attempt to gain unauthorized access to the Service or its related systems or networks. Agreement No. 7434 (d) You shall not (i) modify, copy or create derivative works based on the Service; (ii) frame or mirror any content forming part of the Service, other than on Your own intranets or otherwise for its own internal business purposes; (iii) reverse engineer the Service; or (iv) access the Service in order to (A) build a competitive product or service, or (B) copy any ideas, features, functions or graphics of the Service. 2. Service Provision. Salesforce.com will use commercially reasonable efforts to make the Services available 24 hours a day, 7 days a week, except for: (a) planned downtime (of which SFDC shall give at least 8 hours notice via the Services and which SFDC shall schedule to the extent practicable during the weekend hours from 6:00 p.m. Pacific time Friday to 3:00 a.m. Pacific time Monday), or (b) any unavailability caused by circumstances beyond SFDC's reasonable control, including without limitation, acts of God, acts of government, flood, fire, earthquakes, civil unrest, acts of terror, strikes or other labor problems (other than those involving SFDC employees), or Internet service provider failures or delays. Salesforcew coin„_will provide the Services only in accordance with applicable laws and government regulations. 3. Any acquisition by You of third -party products or services, including but not limited to Third -Party Applications and implementation, customization and other consulting services, and any exchange of data between You and any third - party provider, is solely between You and the applicable third -party provider. al sforee�. c am_does not warrant or support third -party products or services, whether or not they are designated by Salesforce.com as "certified" or otherwise. No purchase of third -party products or services is required to use the Service as provided by Satesforcecom. 4. i w if You install or enable Third -Party Applications for use with the Service, You ackngwledge that aalesforce.golra ,may allow providers of those Third - Party Applications to access You Data as required for the interoperation of such Third Party Applications with the Service. Salesforce.co. __,shall not be responsible for any disclosure, modification or deletion of You Data resulting from any such access by Third -Party Application providers. The Service shall allow You to restrict such access by restricting Users from installing or enabling such Third -Party Applications for use with the Service. 5. Google Services. Service features that interoperate with Google services depend on the continuing availability of the Google application programming interface ("API") and program for use with the Service. If Google Inc. ceases to make the Google API or program available on reasonable terms for the Service, Salesforce.corn may cease providing such Service features without entitling You to any refund, credit, or other compensation. C. Eroarielary Higlits. Subject to the limited rights expressly granted hereunder, Salesl'orce.coni reserves all rights, title and interest in and to the Service, including all related intellectual property rights. The Service is deemed Salesforce.com confidential information, and You will not use it or disclose it to any third party except as permitted in these SFDC Service Terms and except as required by law, upon notice to Salesforce.com. 7. Your Data. As between Sal os'for ce.com and You, You exclusively own all rights, title and interest in and to all of Your Data. Your Data is deemed your confidential information, and Salesforce,com„w shall not access Your User accounts, including Your Data, except to respond to service or technical problems or at your request. 8. If either You or Salesforce.com is compelled by law to disclose confidential information of the other party, it shall provide the other party with prior notice of such Agreement No. 7434 compelled disclosure (to the extent legally permitted) and reasonable assistance, at the other party's cost, if the other party wishes to contest the disclosure. 9. Suggestions You agree that Salesfoacc coo shall have a royalty -free, worldwide, transferable, sublicenseable, irrevocable, perpetual license to use or incorporate into the Service any suggestions, enhancement requests, recommendations or other feedback provided by You or Your Users relating to the operation of the Service. 10. Fees. Contracted for fees for use of the Service represent a firm commitment and the number of User subscriptions contracted for cannot be reduced in the middle of a subscription term. 11. ,1crminalion.. The master contract governs your termination (FAR 52.212-4(1) & (m)) and cancellation rights with the contractor, and the contract requires continued performance while any disputes are resolved (FAR 52.233-1(i)). 12. Data Staragtyou are entitled to a cumulative amount of storage per User subscription for no additional charge as set forth in the User Guide for the Service subscription type purchased. You may purchase additional storage if necessary, and you may contact Your reseller for then -current rates listed in master contract price list. 13. Support. SFDC will provide You with basic support as described from time to time by SFDC at ww.salesf rf . orn. In the event that You have purchased an upgraded support package, then upgraded support contact information will be provided to You together with your initial account set up information. 14. No Warrant . SALESFORCE.COM MAKES NO WARRANTIES OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY OR OTHERWISE REGARDING THE SERVICE AND/OR SUPPORT, AND SPECIFICALLY DISCLAIMS ALL IMPLIED WARRANTIES, INCLUDING ANY WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW. IN THE EVENT THAT YOUR AGREEMENT WITH YOUR RESELLER PROVIDES ANY WARRANTIES WITH RESPECT TO THE SERVICE AND/OR SUPPORT, SUCH WARRANTIES ARE SOLELY BETWEEN YOU AND YOUR RESELLER. This clause does not disclaim any warranties expressly provided in a contract with the U.S. Government." 15. No 1wiability, IN NO EVENT SHALL SAL ESFORCE OM HAVE ANY LIABILITY TO YOU OR ANY USER FOR ANY DAMAGES WHATSOVER, INCLUDING BUT NOT LIMITED TO DIRECT, INDIRECT, SPECIAL, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES, OR DAMAGES BASED ON LOST PROFITS, HOWEVER CAUSED AND, WHETHER IN CONTRACT, TORT OR UNDER ANY OTHER THEORY OF LIABILITY, WHETHER OR NOT EITHER YOU OR SAL*ESFORCI ,COM HAVE BEEN ADVISED OF THE POSSIBILI TY OF SUCH DAMAGES. This clause shall not impair the Agreement No. 7434 U.S. Government's right to recover for fraud or crimes arising out of or related to this Contract under any federal fraud statute, including the False Claims Act, 31 U.S.C. §§ 3729-3733. Furthermore, this clause shall not impair nor prejudice the U.S. Government's right to EXPRESS remedies provided in the Contract (i.e. clause 552.238- 72 — Price Reductions, clause 52.212-4(h) — Patent Indemnification, Liability for Injury or Damage (Section 3 of the Price List), and GSAR 552.215-72 — Price Adjustment — Failure to Provide Accurate Information). 16. Further Contact. Salestorce.com may contact you regarding new lesforcc.coni „service features and offerings. 17. TIjird EaLtX SFDC shall be a third parry beneficiary to the agreement between You and Reseller solely as it relates to these SFDC Service Terms. Agreement No. 7434 M V SOFTWARE LICENSE AND SUPPORT AGREEMENT General Terms and Conditions ("GTC") 1. DEFINITIONS. 1.1 "Add -on" means any development using SAP API's that adds new and independent functionality, but does not modify existing SAP functionality. 1.2 "Agreement" means these GTCs, any Order Form referencing these GTCs, and the Use Terms and Schedules referenced by these GTCs and/or such Order Forms. All such components are integral to the agreement, and collectively are referred to herein as the "Agreement". 1.3 "API" means SAP's application programming interfaces, as well as other SAP code that allow other software products to communicate with or call on SAP Software (for example, SAP Enterprise Services, BAPIs, Idocs, RFCs and ABAP or other user exits) provided under this Agreement. 1.4 "Affiliate" mean any legal entity in the Territory in which the Licensee, directly or indirectly, holds more than fifty percent (50%) of the shares or. voting rights. Any such legal entity shall be considered an Affiliate for only such time as such equity interest is maintained. 1.5 BuBness Partner" means a legal entity that requires access to the Software in connection with Licensee's internal business operations, such as customers, distributors and/or suppliers of Licensee. 1.6 "C o fia.1,12formation" means, with respect to SAP, all information which SAP protects against unrestricted disclosure to others, including but not limited to: (a) the Software and Documentation and other SAP Materials, including without limitation the following information regarding the Software: (i) computer software (object and source codes), programming techniques and programming concepts, methods of processing, system designs embodied in the Software; (ii) benchmark results, manuals, program listings, data structures, flow charts„ logic diagrams, functional specifications, file formats,; and (iii) discoveries, inventions, concepts, designs, flow charts, documentation, product specifications, application program interface specifications, techniques and processes relating to the; Software; (b) the research and development or investigations of SAP; (c) product offerings, content partners, product pricing, product availability, technical drawings, algorithms, processes, ideas, techniques, formulas, data, schematics, trade secrets, know-how, improvements, marketing plans, forecasts and strategies; and (d) any information about or concerning any third party (which information was provided to SAP subject to an applicable confidentiality obligation to such third party). With respect to Licensee, "Confidential Information" means all information which Licensee protects against unrestricted disclosure to others and which (i) if in tangible form, Licensee clearly identifies as confidential or proprietary at the time of disclosure; and (ii) if in intangible form (including disclosure made orally or visually), Licensee identifies as confidential at the time of disclosure, summarizes the Confidential Information in writing, and delivers such summary within thirty (30) calendar days of any such disclosure. 1.7 "Documentation" means SAP's documentation which is delivered or made available to Licensee with the Software under this Agreement. 1.8 means patents of any type, design rights, utility models or other similar invention rights, copyrights, mask work rights, trade secret or confidentiality rights, trademarks, trade names and service marks and any other intangible property rights, including applications and registrations for any of the foregoing, in any country, arising under statutory or common law or by contract and whether or not perfected, now existing or hereafter filed, issued, or acquired. 1.9 "Modification" means (i) a change to the delivered source code or metadata; or (ii) any development, other than a change to the delivered source code or metadata, that customizes, enhances, or changes existing functionality of the Software including, but not limited to, the creation of any new application program interfaces, alternative user interfaces or the extension of SAP data structures; or (iii) any other change to the Software (other than an Add -on) utilizing or incorporating any SAP Materials (defined below). 1.10 "llrcaq%;Itri,.l ervgc clatlpe" means the terms and conditions governing SAP's delivery of professional services, attached hereto and made a part hereof. 1.11 "SAP Materials" means any software, programs, tools, systems, data, or other materials made available by SAP to Licensee in the course of the performance under this Agreement including, but not limited to, the Software and Documentation, as well as any information, materials or feedback provided by Licensee to SAP relating to the Software and Documentation. 1.12 "SAP Support" means SAP's then -current SAP support offering specified in the applicable Order Forms and made available to Licensee as stated in the applicable SAP Support Schedule found at www,sLapc,om coma a yd9epal/irudex pxw,as of the effective date of the first Software Order Form issued under these GTCs. Such SAP Support Schedule is incorporated herein by reference. For the avoidance of doubt, such SAP Support Schedule shall apply to all Order Forms issued under these GTCs, unless otherwise agreed by the parties. SAP recommends Licensee prints a copy of the applicable SAP Support Schedule for Licensee's own records. 1.13 "Software" means (i) any and all software products licensed to Licensee under this Agreement as specified in Software Order Forms hereto, all as developed by or for SAP, SAP AG, Business Objects Software Limited and/or any of their affiliated companies and delivered to Licensee hereunder; (ii) any new releases thereof made available through unrestricted shipment pursuant to the respective support agreement and (iii) any complete or partial copies of any of the foregoing. 1.14 "software QrdIT r Form" means the order form for the Software and related SAP Support ordered by Licensee thereunder, including information on Software, SAP Support, fees, and other information necessary for the delivery of such items to Licensee. SAP Confidential SAP General Terms and Conditions enUS.v.5-2011 Agreement No. 7434 The Software Order Form does not include fees for professional services, which shall be billed under separate statements of work in accord with the Professional Services Schedule. 1.15 "Territory" means the world except for those countries prohibited by United States' export laws, and further subject to Section 12.4 of the GTC. 1.16 "Third Party SQ(r" means (i) any and all software products and content licensed to Licensee under this Agreement as specified in Software Order Forms hereto, all as developed by companies other than SAP, SAP AG, Business Objects Software Limited and/or any of their affiliated companies and delivered to Licensee hereunder; (ii) any new releases thereof made available through unrestricted shipment pursuant to the respective SAP Support Schedule and (iii) any complete or partial copies of any of the foregoing. 1.17 "Use" means to activate the processing capabilities of the Software, load, execute, access, employ the Software, or display information resulting from such capabilities. 1.18 "Use Terms" means, with regard to Software specified in a Software Order Form, the SAP Software Use Rights document current at the time of execution of such Software Order Form, copies of which are found at wAuw. . Q n crarip n lP ��d��..�.P and made a part hereof. Such SAP Software Use Rights documents are incorporated herein by reference. SAP recommends Licensee prints copies of the applicable SAP Software Use Rights documents for Licensee's own records 2. LICENSE GRANT. 2.1 License. 2.1.1 Subject to Licensee's compliance with all the terms and conditions of this Agreement, SAP grants to Licensee a non- exclusive, perpetual (except for subscription based or term licenses) license to Use the Software, Documentation, and other SAP Materials at specified site(s) within the Territory to run Licensee's and its Affiliates' internal business operations (including customer back-up and passive disaster recovery) and to provide internal training and testing for such internal business operations and as further set forth in the Software Order Form, unless terminated in accordance with Section 5 herein. This license does not permit Licensee (without being limited specifically to such restrictions) to: (i) use the SAP Materials to provide services to third parties (e.g., business process outsourcing, service bureau applications or third party training) other than to Affiliates (subject to Section 2.2); (ii) lease, loan, resell, sublicense or otherwise distribute the SAP Materials, other than distribution to Affiliates (subject to Section 2.2); (iii) make any Use of or perform any acts with respect to the SAP Materials other than as expressly permitted in accordance with the terms of this Agreement; or (iv) use Software components other than those specifically identified in the Software Order Form, even if it is also technically possible for Licensee to access other Software components. Business Partners may Use the Software only through screen access and solely in conjunction with Licensee's Use and may not Use the Software to run any of Business Partners' business operations. 2.1.2 Licensee agrees to install the Software only on information technology devices (e.g. hard disks or central processing units) identified by Licensee pursuant to this Agreement and that has been previously approved by SAP in writing or otherwise officially made known to the public as appropriate for Use or interoperation with the Software (the "Designated Unit"). Licensee must hold the required licenses as stated herein and in the applicable Order Forms, for any individuals that Use the Software, including employees or agents of Affiliates and Business Partners. Use may occur by way of an interface delivered with or as a part of the Software, a Licensee or third -party interface, or another intermediary system. 2.1.3 The terms and conditions of this Agreement relative to "Software" apply to Third Party Software except as otherwise stated in the Software Use Rights Schedule, a Schedule, an Order Form, or an Amendment. 2.2 Affiliate Use. Affiliates' Use of the Software, Documentation and other SAP Materials to run their internal business operations as permitted under Section 2.1.1 is subject to the following: (i) the Affiliate agrees to be bound by the terms herein in the form of Schedule A ("Affiliate Use Agreement") attached hereto; and (ii) a breach of such Affiliate Use Agreement by Affiliate shall be considered a breach by Licensee hereunder. If Licensee has an affiliate or subsidiary with a separate agreement for SAP software licenses and/or support services with SAP AG, any SAP AG affiliate (including SAP) or any other distributor of SAP software, the Software shall not be Used to run such affiliate's or subsidiary's business operations and such affiliate or subsidiary shall not receive any support services under this Agreement even if such separate agreement has expired or is terminated, unless otherwise agreed to in writing by the parties. 2.3 O am aurrir Servtic _a. With SAP's prior written consent, Licensee may permit services providers to access the Software solely for the purpose of providing facility, implementation, systems, application management or disaster recovery services to Licensee in connection with the business of Licensee for which the Software is herein licensed provided: (i) Licensee and such services provider execute a written agreement that includes provisions requiring such services provider's compliance with the terms of this Agreement prior to such access, including without limitation non -disclosure of SAP Confidential Information; (ii) Licensee shall hold the required licenses as stated in the Use Terms for all employees of such services provider authorized to access the Software; (iii) such services provider shall be permitted to Use the Software solely to install and configure the Software in accordance with the business of Licensee as set forth herein (or in the case of a disaster recovery vendor, to provide disaster recovery services only); (iv) under no circumstances may such services provider Use the Software to operate or provide processing services to Licensee or any other party, or in connection with such services provider's own business operations; (v) Licensee shall be responsible for any additional Software, migration tools, or third party software needed to effect such transition; and (vi) Licensee expressly agrees to indemnify SAP, its officers, employees, agents and subcontractors from and against all claims, liabilities, losses, damages and costs (including reasonable attorney fees) suffered by SAP arising from a breach by the services provider of the conditions of this Agreement. Upon SAP request, Licensee shall provide written confirmation to SAP that items (i)-(iv) are fulfilled. 3. VERIFICATION. SAP shall be permitted to audit (at least once annually and in accordance with SAP standard procedures, which may include on -site and/or remote audit) the usage of the SAP Materials. Licensee shall cooperate reasonably in the conduct of such audits. In the event an audit reveals that (i) Licensee underpaid license fees and/or SAP Support fees to SAP and/or (ii) that Licensee has Used the Software in excess of the license quantities or levels stated in the Software Order Form, Licensee shall pay such underpaid fees and/or for such excess usage based on SAP List of Prices and Conditions Software and Support governing use in effect at the time of the audit, and shall execute an additional Software Order Form in accordance with the terms of this Agreement SAP Confidential 2 SAP General Terms and Conditions enUS.v.5-2011 Agreement No. 7434 to affect the required licensing of any additional quantities or levels. Reasonable costs of SAP's audit shall be paid by Licensee if the audit results indicate usage in excess of the licensed quantities or levels. SAP reserves all rights at law and equity with respect to both Licensee's underpayment of License fees or SAP Support fees and usage in excess of the'license quantities orlevels. 4. .=...PA,y- !Y AND DELIVERY,. 4.1 Fees. Licensee shall pay to SAP license fees for the Software and fees for SAP Support on the terms in Software Order Forms hereto. Fees for consulting services will be paid as set forth in the Professional Services Schedule. Any fees not paid when due shall accrue interest at the rate of 18% (eighteen percent) per annum, but not to exceed the maximum amount as allowed bylaw. 4.2 Taxes. Fees and other charges described in this Agreement do not include federal, state or local sales, foreign withholding, use, property, excise, service, or similar transaction taxes ("Tax(es)") now or hereafter levied, all of which shall be for Licensee's account. Any applicable direct pay permits or valid tax-exempt certificates must be provided to SAP prior to the execution of this Agreement. If SAP is required to pay Taxes, Licensee shall reimburse SAP for such amounts. Licensee hereby agrees to indemnify SAP for any Taxes and related costs, interest and penalties paid or payable by SAP. 4.3 13Bivgr f the Softwuare_rrd SAP SupTaor. SAP will deliver the Software and SAP Support by making it available for electronic download through the SAP ServiceMarketplace (tt sctir.5ti,C47n ) to Licensee. Risk of loss passes at the time of such electronic delivery. Licensee agrees not to request any physical delivery of Software or SAP Support and should it occur that any such delivery will be rejected by Licensee. Licensee agrees and understands that the calculation of Taxes may be affected by the delivery method and delivery location of the Software and corresponding SAP Support. 5. TERM. 5.1. Term. This Agreement and the license granted hereunder shall become effective as of the date first set forth in the first Software Order Form issued under these GTCs, and shall continue in effect thereafter unless this Agreement is terminated upon the earliest to occur of the following: (i) thirty days after Licensee gives SAP written notice of Licensee's direction to terminate this Agreement, for any reason, but only after payment of all license and SAP Support fees then due and owing; (ii) thirty days after SAP gives Licensee notice of Licensee's material breach of any provision of the Agreement (other than Licensee's breach of its obligations under Sections 6, 10 or 11, which breach shall result in immediate termination), including more than thirty days delinquency in Licensee's payment of any money due hereunder, unless Licensee has cured such breach during such thirty day period; (iii) immediately if Licensee files for bankruptcy, becomes insolvent, or makes an assignment for the benefit of creditors. For the avoidance of any doubt, termination of the Agreement shall strictly apply to all licenses under the Agreement, its appendices, schedules, addenda and order documents and any partial termination of the Agreement by Licensee shall not be permitted in respect of any part of the Agreement, its appendices, schedules, addenda, orderdocuments. 5.2 End of Trrn DpUgt5. Upon any termination hereunder, Licensee and its Affiliates shall immediately cease Use of all SAP Materials and Confidential Information. Within thirty (30) days after any termination, Licensee shall irretrievably destroy or upon SAP's request deliver to SAP all copies of the SAP Materials and Confidential Information in every form, except to the extent it is legally required to keep it for a longer period in which case such return or destruction shall occur at the end of such period. Licensee must certify to SAP in writing that it has satisfied its obligations under this Section 5.2. Licensee agrees to certify in writing to SAP that it and each of its Affiliates has performed the foregoing. Sections 3, 4, 5.2, 6, 7.2, 8, 9, 10, 12.4, 12.5, 12.6 and 12.8 shall survive such termination. In the event of any termination hereunder, Licensee shall not be entitled to any refund of any payments made by Licensee. Termination shall not relieve Licensee from its obligation to pay fees that remain unpaid. TELLECIUAL P.R P JY RIGHT . 6.1 vqbJ�. The SAP Materials, and all Intellectual Property Rights embodied in the foregoing, shall be the sole and exclusive property of SAP, SAP AG (the parent company of SAP) or its or their licensors, subject to any rights expressly granted to Licensee in Section 2 and 6.3 herein. Except for the rights set forth in Section 6.3 herein, Licensee is not permitted to modify or otherwise make derivative works of the Software. Any such unauthorized works developed by Licensee, and any Intellectual Property Rights embodied therein, shall be the sole and exclusive property of SAP or SAP AG. 6.2 Protection of Rights. Licensee shall not copy, translate, disassemble, or decompile, nor create or attempt to create the source code from the object code of the Software in any manner. Reverse engineering of the Software and other SAP Materials is prohibited. Licensee is permitted to back up data in accordance with good information technology practice and for this purpose to create the necessary backup copies of the Software. Backup copies on transportable discs or other data media must be marked as backup copies and bear the same copyright and authorship notice as the original discs or other data media. Licensee must not change or remove SAP's copyright and authorship notices. 6.3 odifJcations/Add-on: ,. 6.3.1 Conditioned on Licensee's compliance with the terms and conditions of this Agreement, Licensee may make Modifications and/or Add-ons to the Software in furtherance of its permitted Use under this Agreement, and shall be permitted to use Modifications and Add-ons with the Software in accordance with the License grant to the Software set forth in Section 2.1.1 herein. Licensee shall comply with SAP's registration procedure prior to making Modifications or Add-ons. All Modifications and all rights associated therewith shall be the exclusive property of SAP and SAP AG. All Add-ons developed by SAP (either independently or jointly with Licensee) and all rights associated therewith shall be the exclusive property of SAP and SAP AG. Licensee agrees to execute those documents reasonably necessary to secure SAP's rights in the foregoing. All Add-ons developed by or on behalf of Licensee without SAP's participation ("Licensee Add -on"), and all rights associated therewith, shall be the exclusive property of Licensee subject to SAP's rights in and to the Software; provided, Licensee shall not commercialize, market, distribute, license, sublicense, transfer, assign or otherwise alienate any such Licensee Add-ons. SAP retains the right to independently develop its own Modifications or Add-ons to the Software, and Licensee agrees not to take any action that would limit SAP's sale, assignment, licensing or use of its own Software or Modifications or Add-ons thereto. 6.3.2 Any Modification developed by or on behalf of Licensee without SAP's participation or Licensee Add -on must not (and subject to other limitations set forth herein): enable the bypassing or circumventing any of the restrictions set forth in this Agreementand/or provide Licensee with access to the Software to which Licensee is not directly licensed; nor permit mass data extraction from SAP Confidential 3 SAP General Terms and Conditions enUS.v.5-2011 Agreement No. 7434 Software to any non -SAP software, including use, modification saving or other processing of data in the non -SAP software; nor unreasonably impair, degrade or reduce the performance or security of the Software; nor render or provide any information concerning SAP software license terms, Software, or any other information related to SAP products. 6.3.3 Licensee covenants, on behalf of itself and its successors and assigns, not to assert against SAP or its affiliated companies, or their resellers, distributors, suppliers, commercial partners and customers, any rights in any Modifications developed by or on behalf of Licensee without SAP participation or Licensee Add-ons , or any other functionality of the SAP Software accessed by such Modification developed by or on behalf of Licensee without SAP participation or Licensee Add -on. ammel 7.1 Warranty. SAP warrants that the Software will substantially conform to the specifications contained in the Documentation for six months following delivery. The warranty shall not apply: (i) if the Software is not used in accordance with the Documentation; or (ii) if the defect is caused by a Modification or Add -on (other than a Modification or Add -on made by SAP and which is provided through SAP Support or under warranty), Licensee or third -party software. SAP does not warrant that the Software will operate uninterrupted or that it will be free from minor defects or errors that do not materially affect such performance, or that the applications contained in the Software are designed to meet all of Licensee's business requirements. Provided Licensee notifies SAP in writing with a specific description of the Software's nonconformance within the warranty period and SAP validates the existence of such nonconformance, SAP will, at its option: a) repair or replace the nonconforming Software, or b) refund the license fees paid for the applicable nonconforming Software in exchange for a return of such nonconforming Software. This is Licensee's sole and exclusive remedy under this warranty. 7.2 xx;oress Dijscl mimer. SAP AND ITS LICENSORS DISCLAIM ALL OTHER WARRANTIES EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE EXCEPT TO THE EXTENT THAT ANY WARRANTIES IMPLIED BY LAW CANNOT BE VALIDLY WAIVED. r 8.1 Inf ngrrLAnd Defense of L(ggPcg. SAP shall defend Licensee against claims brought against Licensee in the Territory by any third party alleging that Licensee's Use of the Software, in accordance with the terms and conditions of this Agreement, constitutes a direct infringement or misappropriation of a patent claim(s), copyright or trade secret rights, and SAP will pay damages finally awarded against Licensee (or the amount of any settlement SAP enters into) with respect to such claims. This obligation of SAP shall not apply if the alleged infringement or misappropriation results from Use of the Software in conjunction with any other software, an apparatus other than a Designated Unit, failure to use an update promptly provided by SAP if such infringement or misappropriation could have been avoided by use of the update, or unlicensed activities. This obligation of SAP also shall not apply if Licensee fails to timely notify SAP in writing of any such claim. SAP is permitted to control fully the defense and any settlement of any such claim as long as such settlement shall not include a financial obligation on Licensee. In the event Licensee declines SAP's proffered defense, or otherwise fails to give full control of the defense to SAP's designated counsel, then Licensee waives SAP's obligations under this Section 8.1. Licensee shall cooperate fully in the defense of such claim and may appear, at its own expense, through counsel reasonably acceptable to SAP. SAP expressly reserves the right to cease such defense of any claim(s) in the event the Software is no longer alleged to infringe or misappropriate, or is held not to infringe or misappropriate, the third party's rights. SAP may settle or mitigate damages arising from any claim or potential claim, by substituting alternative substantially equivalent non -infringing programs and supporting documentation for the Software. Licensee shall not undertake any action in response to any infringement or misappropriation, or alleged infringement or misappropriation of the Software that is prejudicial to SAP's rights. 8.2 THE PROVISIONS OF THIS SECTION 8 STATE THE SOLE, EXCLUSIVE, AND ENTIRE LIABILITY OF SAP AND ITS LICENSORS TO LICENSEE, AND IS LICENSEE'S SOLE REMEDY, WITH RESPECT TO THE INFRINGEMENT OR MISAPPROPRIATION OF THIRD -PARTY INTELLECTUAL PROPERTY RIGHTS. leffillifflistolki8r 9.1 _Ngt ,RWQn5 . SAP and its licensors will not be responsible under this Agreement (i) if the Software is not used in accordance with the Documentation; or (ii) if the defect or liability is caused by Licensee, a Modification or Add -on (other than a Modification or Add -on made by SAP which is provided through SAP Support or under warranty), or third -party software. SAP AND ITS LICENSORS SHALL NOT BE LIABLE FOR ANY CLAIMS OR DAMAGES ARISING FROM INHERENTLY DANGEROUS USE OF THE SOFTWARE AND/OR THIRD -PARTY SOFTWARE LICENSED HEREUNDER. 9.2 Exclusion of OapTa; l it ggallilit ANYTHING TO THE CONTRARY HEREIN NOTWITHSTANDING, EXCEPT FOR DAMAGES RESULTING FROM UNAUTHORIZED USE OR DISCLOSURE OF CONFIDENTIAL INFORMATION OR DEATH OR PERSONAL INJURY ARISING FROM EITHER PARTY'S GROSS NEGLIGENCE OR WILLFUL MISCONDUCT, UNDER NO CIRCUMSTANCES AND REGARDLESS OF THE NATURE OF ANY CLAIM SHALL SAP, ITS LICENSORS OR LICENSEE BE LIABLE TO EACH OTHER OR ANY OTHER PERSON OR ENTITY FOR AN AMOUNT OF DAMAGES IN EXCESS OF THE PAID LICENSE FEES FOR THE SOFTWARE DIRECTLY CAUSING THE DAMAGES OR BE LIABLE IN ANY AMOUNT FOR SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR INDIRECT DAMAGES, LOSS OF GOOD WILL OR BUSINESS PROFITS, WORK STOPPAGE, DATA LOSS, COMPUTER FAILURE OR MALFUNCTION, ATTORNEYS' FEES, COURT COSTS, INTEREST OR EXEMPLARY OR PUNITIVE DAMAGES. The provisions of this Agreement allocate the risks between SAP and Licensee. The license fees reflect this allocation of risk and the limitations of liability herein. 10.1. Yse of Confp i? nntt at Inform eqa. Confidential Information shall not be reproduced in any form except as required to accomplish the intent of this Agreement. Any reproduction of any Confidential Information of the other shall remain the property of the disclosing party and shall contain any and all confidential or proprietary notices or legends which appear on the original. With respect to the Confidential Information of the other, each party : (a) shall take all Reasonable Steps (defined below) to keep all Confidential Information strictly confidential; and (b) shall not disclose any Confidential Information of the other to any person other than its bona fide individuals whose access is necessary to enable it to exercise its rights hereunder. As used herein "Reasonable Steps" means those steps the receiving party takes to protect its own similar proprietary and confidential information, which shall not be less than a reasonable standard of care. Confidential Information of either party disclosed prior to execution of this Agreement shall be subject to the protections afforded hereunder. SAP Confidential 4 SAP General Terms and Conditions enUS.v.5-2011 Agreement No. 7434 10.2 ELc gP; i nor . The above restrictions on the use or disclosure of the Confidential Information shall not apply to any Confidential Information that: (a) is independently developed by the receiving party without reference to the disclosing party's Confidential Information, or is lawfully received free of restriction from a third party having the right to furnish such Confidential Information; (b) has become generally available to the public without breach of this Agreement by the receiving party; (c) at the time of disclosure, was known to the receiving party free of restriction; or (d) the disclosing party agrees in writing is free of such restrictions. 10.3 uwlyd urr A er 0d Ei«i ifdons' g.011u . Licensee shall not disclose the terms and conditions of this Agreement or the pricing contained therein to any third party. Neither party shall use the name of the other party in publicity, advertising, or similar activity, without the prior written consent of the rather, except that Licensee agrees that SAP may use Licensee's name in customer listings or, at times mutually agreeable to the parties, as part of SAP's marketing efforts (including without limitation reference calls and stories, press testimonials, site visits, SAPPHIRE participation). 11. ASSIGNMENT. Licensee may not, without SAP's prior written consent, assign, delegate, pledge, or otherwise transfer this Agreement, or any of its rights or obligations under this Agreement, or the SAP Materials or SAP Confidential Information, to any party, whether voluntarily or by operation of law, including by way of sale of assets, merger or consolidation. SAP may assign this Agreement to any of its affiliates. 12. L Pl2 uams. 12.1 SevgrabrhV. It is the intent of the parties that in case any one or more of the provisions contained in this Agreement shall be held to be invalid or unenforceable in any respect, such invalidity or unenforceability shall not affect the other provisions of this Agreement, and this Agreement shall be construed as if such invalid or unenforceable provision had never been contained herein. 12.2 No Waiver. If either party should waive any breach of any provision of this Agreement, it shall not thereby be deemed to have waived any preceding or succeeding breach of the same or any other provision hereof. 12.3 _qMpLrts. This Agreement may be signed in two counterparts, each of which shall be deemed an original and which shall together constitute one Agreement. 12.4 BMtkNaJtgry f^�atter . The Software, Documentation and SAP Materials are subject to the export control laws of various countries, including without limit the laws of the United States and Germany. Licensee agrees that it will not submit the Software, Documentation or other SAP Materials to any government agency for licensing consideration or other regulatory approval without the prior written consent of SAP, and will not export the Software, Documentation and SAP Materials to countries, persons or entities prohibited by such laws. Licensee shall also be responsible for complying with all applicable governmental regulations of the country where Licensee is registered, and any foreign countries with respect to the use of the Software, Documentation or other SAP Materials by Licensee and/or its Affiliates. 12.5 Governing Law: Limitations Pgr aid. This Agreement and any claims arising out of or relating to this Agreement and its subject matter shall be governed by and construed under the laws of Commonwealth of Pennsylvania without reference to its conflicts of law principles. In the event of any conflicts between foreign law, rules, and regulations, and United States law, rules, and regulations, United States law, rules, and regulations shall prevail and govern. The United Nations Convention on Contracts for the International Sale of Goods shall not apply to this Agreement. The Uniform Computer Information Transactions Act as enacted shall not apply. Licensee must initiate a cause of action for any claim(s) arising out of or relating to this Agreement and its subject matter within one (1) year from the date when Licensee knew, or should have known after reasonable investigation, of the facts giving rise to the claim(s). 12.6 Nglices. All notices or reports which are required or may be given pursuant to this Agreement sharp be in writing and shall be deemed duty given when delivered to the respective executive offices of SAP and Licensee at the addresses first set forth in any Software Order Form. Where in this section 12.6 or elsewhere in this Agreement written form is required, that, requirement can be met by facsimile transmission, exchange of letters or other written form. 12.7 Eprrq d'�IA . Any delay or nonperformance of any provision of this Agreement (other than for the payment of amounts due hereunder') caused by conditions beyond the reasonable control of the performing party shall not constitute a breach of this Agreement, and the time for performance of such provision, if any, shall be deemed to be extended for a period equal to the duration of the conditions preventing performance. 12.8 Entire A reeMgr1t. This Agreement constitutes the complete and exclusive statement of the agreement between SAP and Licensee, and all previous representations, discussions, and writings are merged in, and superseded by this Agreement and the parties disclaim any reliance on any such representations, discussions and writings. This Agreement may be modified only by a writing signed by both parties. This Agreement shall prevail over any additional, conflicting, or inconsistent terms and conditions which may appear on any purchase order or other document furnished by Licensee to SAP. This Agreement shall prevail over any additional, conflicting or inconsistent terms and conditions which may appear in any clickwrap end user agreement included in the Software. Signatures sent by electronic means (facsimile or scanned and sent via e-mail) shall be deemed original signatures. This Agreement does not create any partnership, joint venture or principal and agent relationship. 12.9 i r A lly. The following order of precedence shall be applied in the event of conflict or inconsistency between provisions of the components, of this Agreement: (i) the Software Order Form; (ii) the Schedules; (iii) the Use Terms; and (iv) the GTC. SAP Confidential SAP General Terms and Conditions enUS.v.5-2011 Agreement No. 7434 Schedule B to the GTC "Professional Services Schedule" The parties agree that this Schedule is hereby annexed to and made a part of the GTC. In each instance in which provisions of this Schedule contradict or are inconsistent with the provisions of the GTC, the provisions of this Schedule shall prevail and govern. WHEREAS, Licensee licensed from SAP the right to Use SAP Software pursuant to the Agreement and SAP provides, through its employees, affiliates, and third party contractors ("Consultants"), consulting and professional services ("Services") including support of installation and implementation of the licensed Software in the United States. 1. Srwi. Upon request by Licensee, SAP will provide a Consultant(s) to perform, at Licensee's direction, consulting and professional services including support of installation and implementations of the applicable SAP Software ("Services"). Any Statement(s) of Work (".SOW") more fully describing the project assumptions, scope, duration and fees for the Services shall reference this Schedule. All Services of the SAP Consultant(s) will be coordinated with the designated Licensee representative. Licensee is responsible for making the necessary internal arrangements for the carrying out of the Services on a non-interference basis. 2. , o,,5fpction with P .L mL . If at any time Licensee or SAP is dissatisfied with the material performance of an assigned Consultant or a Licensee project team member, the dissatisfied party shall immediately report such dissatisfaction to the other party in writing and may request a replacement. The other party shall use its reasonable discretion in accomplishing any such change. 3. Corsnpensatipn gL5PLe. All Services will be provided by SAP on a time and expense basis at SAP's then current rates, unless otherwise agreed by the parties in a SOW. 4. Taxes. The fees listed in the applicable SOW do not include taxes. If SAP is required to pay sales, use, property, value-added or other taxes based on the Services provided under this Schedule, then such taxes shall be billed to and paid by Licensee. This section shall not apply to taxes based on SAP's income. Licensee also agrees to pay SAP for additional tax amounts if any, created by the taxability of Consultants reimbursed travel and living expenses resulting from long term assignments at Licensee's locations. 5. _Pr wick. Unless otherwise agreed to in writing by the parties in a SOW, SAP shall have the sole and exclusive right, title and ownership to any and all' ideas, concepts, or other intellectual property rights related in any way to the techniques, knowledge or processes of the SAP Services and deliverables, whether or not developed for Licensee. 6. Warranty. SAP warrants that its Services shall be performed consistent with generally accepted industry standards. SAP MAKES NO WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, NOR ANY OTHER WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, IN CONNECTION WITH THIS SCHEDULE AND THE SERVICES PROVIDED HEREUNDER. 7. Urni ti CI...p!,..' i bNlity. WITH RESPECT TO SERVICES, ANYTHING TO THE CONTRARY NOTWITHSTANDING, EXCEPT FOR DAMAGES RESULTING FROM UNAUTHORIZED USE OR DISCLOSURE OF THE PROPRIETARY INFORMATION AND SAP'S RIGHT TO COLLECT UNPAID FEES, UNDER NO CIRCUMSTANCES SHALL SAP, ITS CONSULTANTS OR LICENSEE BE LIABLE TO EACH OTHER OR ANY OTHER PERSON OR ENTITY FOR AN AMOUNT OF DAMAGES IN EXCESS OF THE FEES PAID FOR THE APPLICABLE SERVICES HEREUNDER OR BE LIABLE IN ANY AMOUNT FOR SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR INDIRECT DAMAGES, LOSS OF GOOD WILL OR BUSINESS PROFITS, WORK STOPPAGE, DATA LOSS, COMPUTER FAILURE OR MALFUNCTION, OR EXEMPLARY OR PUNITIVE DAMAGES. The provisions of the Schedule allocate the risks between SAP and Licensee. The License Fees reflect this allocation of risk and the limitations of liability herein. 8. Lermina n. The terms of this Schedule shall be effective as of the Effective Date of the Agreement and shall remain in effect until terminated by either party upon thirty (30) days prior written notice or otherwise in accordance with a particular SOW. Licensee shall be liable for payment to SAP for all Services provided prior to the effective date of any such termination, including any expenses incurred pursuant to the provision of such Services, in accord with the applicable SOW. 9. Ger1qCa1 Proyision. 9.1 SAP may subcontract all or part of the Services to be performed to a qualified third party. 9.2 With respect to the Services provided by SAP under this Schedule and any SOW hereto, the relationship of SAP and Licensee is that of an independent contractor. 9.3 This Schedule, including any applicable SOWs, constitutes the entire agreement between the parties with respect to the subject matter hereof and supersedes all prior agreements between the parties, whether written or oral, relating to the same subject matter. In the event of any inconsistencies between this Schedule and a SOW, the SOW shall take precedence over the Schedule. Any purchase order or other document issued by Licensee is for administrative convenience only. 10. 5grAjMalSections 5 and 7 above shall survive any termination of this Schedule. SAP Confidential SAP General Terms and Conditions enUS.v.5-2011 Agreement No. 7434 SUBSCRIPTION SERVICE AGREEMENT EFFECTIVE DATE: NOVEMBER 4, 2014 SUBSCRIPTION SERVICE AGREEMENT This. Subscription Service Agreement (including the Subscription Service Guide, attached hereto) ("Agreement') is made between the ServiceNow entity ("ServibeAioW') and the customer entity ("Customer') on the ordering document and becomes effective on the last signature date of the ordering document issued by ServiceNow ("Effective Date"). The Subscription Service Guide includes: (1) the Customer Support Policy; (2) the Upgrade Policy; (3) the Data Security Guide; and (4) any other attachment set forth or referenced in the Subscription Service Guide. The Subscription Service Guide is posted on www.servicenow.com/schedules.do and incorporated herein by reference. Pursuant to a separate transaction between Customer and ServiceNow's authorized reseller ("Resellee'), Customer has purchased from Reseller certain services to be delivered by ServiceNow. This Agreement specifies the terms and conditions under which those services will be provided, apart from price, payment and other terms specified in the separate agreement between Customer and Reseller. 1. DEFINITIONS 1.1. "Confidential information" means: (a) ServiceNow Core Technology (which is Confidential Information of ServiceNow); (b) Customer Data and Customer Technology (which are Confidential Information of Customer); (c) any other information of a party that is disclosed in writing or orally and is designated as Confidential or Proprietary at the time of disclosure (and, in the case of oral disclosures, summarized in writing within thirty (30) days of the initial disclosure and delivered to the receiving party), or that due to the nature of the information the receiving party would clearly understand it to be confidential information of the disclosing party; and (d) the specific terms and conditions of this Agreement, any Use Authorization, any SOW, and any amendment and attachment thereof, between the parties. Confidential Information shall not include any information that: (i) is or becomes generally known to the public through no fault or breach of this Agreement by the receiving party; (ii) was rightfully in the receiving party's possession at the time of disclosure without restriction on use or disclosure; (iii) is independently developed by the receiving party without use of the disclosing party's Confidential Information; or (iv) was or is rightfully obtained by the receiving party from a third party not under a duty of confidentiality and without restriction on use or disclosure. 1.2. "Customer Data" means electronic data uploaded by or for Customer and Customer's agents, employees and contractors, and processed in the Subscription Service, excluding the ServiceNow Core Technology. 1.3. "Customer Technology' means software, methodologies, templates, business processes, documentation or other material authored, invented or otherwise created or licensed (other than by or from ServiceNow) by Customer using or for use with the Subscription Service, excluding the ServiceNow Core Technology. 1.4. "Development Tools" means source code, application programming interfaces (APIs), executable software and tools in human readable format made available by ServiceNow for the implementation, customization, configuration, and use of the Subscription Service, such as scripts, code snippets, sample code, and development tools published by ServiceNow. 1.5. "Documentation" means the ServiceNow product documentation relating to the operation and use of the Subscription Service, Software and Development Tools, including technical program or interface documentation, user manuals, operating instructions and release notes, as updated from time to time by ServiceNow. 1.6. "Product OvervieW' means the description of the ordered products and their functionalities attached to a Use Authorization or referenced therein. 1.7. "Professional Services" means any services provided by ServiceNow pursuant to an agreed SOW or Service Description. SERVICENOw CONFIDENTIAL Page 1 (version 11/4/2014) Agreement No. 7434 servicenew" SUBSCRIPTION SERVICE AGREEMENT EFFECTIVE DATE: NOVEMBER 4, 2014 1.8. "Service Description" means the written description for a packaged Professional Service, attached to a Use Authorization or referenced therein. 1.9. "ServiceNow Core Technology' means: (a) the Subscription Service; Software; Development Tools, Documentation; and ServiceNow technology and methodologies (including, without limitation, products, software tools, hardware designs, algorithms, templates, software (in source and object forms), architecture, class libraries, objects and documentation) existing as of the Effective Date or otherwise arising outside of work under a Professional Service; (b) updates, upgrades, improvements, configurations, extensions, and derivative works of the foregoing and related technical or end user documentation or manuals; and (c) intellectual property anywhere in the world relating to the foregoing. 1.10. "Software" means software provided by ServiceNow to Customer that operates on Customer - provided machines solely to facilitate the use of the Subscription Service. 1.11. "SOW' means a statement of work for Professional Services. 1.12. "Subscription Service" means the ServiceNow software as a service (SaaS) offering identified in a Use Authorization. 1.13. "Subscription Term" means the term of authorized use of the Subscription Service as set forth in the Use Authorization. 1.14. "Use Authorization" means a written document provided to Customer specifying the services that Customer has purchased, along with the term and scope of the authorized use thereof. 2. GRANT OF USE RIGHTS 2.1. SUBSCRIPTION SERVICE. Subject to the terms of this Agreement, ServiceNow authorizes Customer to access and use the purchased Subscription Service during the Subscription Term as set forth in an applicable Use Authorization for its internal business purposes in accordance with the Documentation. Customer shall not use or otherwise access the Subscription Service in a manner that exceeds Customer's authorized use as set forth in this Agreement and the applicable Use Authorization. 2.2. SOFTWARE. ServiceNow grants Customer a limited, personal, worldwide, non-sublicensable, non -transferable (except as set forth in Section 10.1 (Assignment)), non-exclusive license during the Subscription Term to install and execute Software on machines operated by or for Customer solely to facilitate Customer's authorized access to and use of the purchased Subscription Service. The Software may include code that is licensed under third party license agreements, including open source made available or provided with the Software. Software is licensed and not sold even if for convenience ServiceNow makes reference to words such as sale or purchase. 2.3. DEVELOPMENT TOOLS. In support of Customer's authorized internal business use of the Subscription Service during the Subscription Term, ServiceNow grants to Customer a limited, personal, worldwide, non-sublicensable, non -transferable (except as set forth in Section 10.1 (Assignment)), non-exclusive license to download and make a reasonable number of copies of the Development Tools, and to use, copy, modify and create derivative works of the Development Tools, in: (a) using, implementing and integrating the ServiceNow applications with other software and systems; and (b) creating applications on the ServiceNow platform (to the extent Customer has purchased authorized use of the Subscription Service to create applications on the ServiceNow platform). Customer shall not use the Development Tools in a manner that causes it to exceed the limits of its authorized use of the Subscription Service as set forth in this Agreement and the Use Authorization. From time to time, ServiceNow may provide Development Tools subject to the terms and conditions of separate agreements which will be provided to Customer for review and to which Customer will be required to agree prior to use of such Development Tools; provided that ServiceNow shall not require Customerto agree to separate terms and conditions for any Development Tool that is necessary for Customer's use of its ordered Subscription Service in conformance with the Product Overview unless set forth on the Use Authorization. SERVICENOw CONFIDENTIAL Page 2 (version 11/4/2014) Agreement No. 7434 SUBSCRIPTION SERVICE AGREEMENT EFFECTIVE DATE: NOVEMBER 4, 2014 2.4. RESTRICTIONS. Customer shall not (and shall not permit others to) do the following with respect to the ServiceNow Core Technology: (i) use the Subscription Service with external programs in a manner that intentionally circumvents contractual usage restrictions; (ii) license, sub -license, sell, re -sell, rent, lease, transfer, distribute or time share or otherwise make any of it available for access by third parties except as otherwise expressly provided in a Use Authorization; (iii) access it for the purpose of developing or operating products or services intended to be offered to third parties in competition with the Subscription Service; (iv) disassemble, reverse engineer or decompile it; (v) copy, create derivative works based on or otherwise modify it except as permitted in this Agreement; (vi) remove or modify a copyright or other proprietary rights notice in it; (vii) use it to reproduce, distribute, display, transmit or use material protected by copyright or other intellectual property right (including the rights of publicity or privacy) without first obtaining the permission of the owner; (viii) use it to create, use, send, store or run viruses or other harmful computer code, files, scripts, agents or other programs or otherwise engage in a malicious act or disrupt its security, integrity or operation; or (ix) access or disable any ServiceNow or third party data, software or network (other than Customer's instance of the Subscription Service in accordance with this Agreement). Before Customer exercises any of the foregoing actions that Customer believes it is entitled to, Customer shall provide ServiceNow with thirty (30) days' prior written notice to legain servicenow.cerx (or, if applicable law or the relevant court order does not allow for such notice, then the maximum amount of notice allowable), and provide reasonably requested information to allow ServiceNow to assess Customer's claim and, at ServiceNow's sole discretion, provide alternatives that reduce adverse impacts on ServiceNow's intellectual property and other rights. ORDERING 3.1. RESELLER ORDERS. Customer shall order and purchase the Subscription Service and Professional Services directly from Reseller pursuant to a separate agreement specifying price, payment and other commercial terms. ServiceNow is not a party to such separate agreement but will provide the purchased services pursuant to this Agreement. For each order, Reseller or ServiceNow will provide Customer with a Use Authorization for Customer to sign and return to ServiceNow. ServiceNow will have no obligation to provide services unless and until it has received a Use Authorization signed by Customer. Reseller is not authorized to make any changes to this Agreement (including any Use Authorizations issued hereunder) or bind ServiceNow to any additional or different terms or conditions. Additional orders for ServiceNow products or services may be placed either through Reseller or ServiceNow, provided that if Customer places an order directly through ServiceNow, Customer shall sign an addendum to this Agreement setting forth pricing, payment and other commercial terms between Customer and ServiceNow. 3.2. USE VERIFICATION. ServiceNow or Reseller may remotely review Customer's use of the Subscription Service, and upon ServiceNow or Reseller's written request Customer shall provide any reasonable assistance, to verify Customer's compliance with the Agreement. If ServiceNow determines that Customer has exceeded its permitted use of the Subscription Service then ServiceNow will notify Customer and within thirty (30) days thereafter Customer shall either: (i) disable any unpermitted use or (ii) purchase additional subscriptions commensurate with Customer's actual use. If Customer fails to regain compliance within such thirty (30) day period or fails to make payment as provided in its agreement with Reseller, ServiceNow may suspend Customer's use of the Subscription Service or terminate this Agreement for cause in accordance with Section 9 (Term and Termination), in addition to any other rights or remedies ServiceNow may have. 4. INTELLECTUAL PROPERTY 4.1. SERVICENOW OWNERSHIP. As between ServiceNow and Customer, all rights, title, and interest in and to all intellectual property rights in the ServiceNow Core Technology are owned exclusively by ServiceNow notwithstanding any other provision in this Agreement. Except as expressly provided in this Agreement, ServiceNow reserves all rights in the ServiceNow Core Technology and does not grant Customer any rights, express or implied or by estoppel. 4.2. CUSTOMER OWNERSHIP. As between Customer and ServiceNow, Customer shall retain all of its rights, title, and interest in and to its intellectual property rights in Customer Data and Customer Technology. Customer hereby grants to ServiceNow a royalty -free, fully -paid, non-exclusive, non -transferable (except as set SERVICENOw CONFIDENTIAL Page 3 (version 11/412014) Agreement No. 7434 servicenow" SUBSCRIPTION SERVICE AGREEMENT EFFECTIVE DATE: NOVEMBER 4, 2014 forth in Section 10.1 (Assignment)), sub -licensable, worldwide right to use Customer Data and Customer Technology solely for the purpose of providing the Subscription Service and Professional Services to Customer. 4.3. FEEDBACK. ServiceNow encourages Customer to provide suggestions, proposals, ideas, recommendations or other feedback regarding improvements to ServiceNow's services and related resources. To the extent Customer provides such feedback, Customer grants to ServiceNow a royalty -free, fully paid, sub - licensable, transferable (notwithstanding Section 10.1 (Assignment)), non-exclusive, irrevocable, perpetual, worldwide right and license to make, use, sell, offer for sale, import and otherwise exploit feedback (including by incorporation of such feedback into the ServiceNow Core Technology) without restriction. 4.4. PROFESSIONAL SERVICES. Subject to the provisions of this Section 4.4, ServiceNow shall assign to Customer any Newly Created IP (as defined below) in Deliverables upon payment in full by Customer of all amounts due for the Professional Service under which the Deliverable was created. A "Deliverable" is a deliverable that is identified in the applicable SOW or Service Description and that is created by ServiceNow for Customer in the performance of the Professional Services. "Newly Created /P' means intellectual property in any inventions or works of authorship that are made by ServiceNow specifically for Customer in the course of performing Professional Services for Customer that is identified as "Newly Created IP" in an SOW, excluding the ServiceNow Core Technology. To the extent (if at all) any ServiceNow Core Technology is incorporated into a Deliverable, ServiceNow grants to Customer a non-exclusive, royalty -free, non -transferable, non-sublicensable worldwide license to use the ServiceNow Core Technology solely to use the Deliverable in connection with the Subscription Service as contemplated under this Agreement during the Subscription Term. Nothing in this Agreement shall be deemed to restrict or limit ServiceNow's right to perform similar Professional Services for any other party or to assign any employees or subcontractors to perform similar Professional Services for any other party or to use any information incidentally retained in the unaided memories of its employees providing Professional Services. 5. WARRANTIES 5.1. LIMITED SUBSCRIPTION SERVICE WARRANTY. ServiceNow warrants that during the Subscription Term Customer's production instances of the Subscription Service shall materially conform to the Product Overview. To submit a warranty claim under this Section, Customer shall (1) reference this Section; and (2) submit a support request to resolve the non -conformity as provided in the Subscription Service Guide. If the non -conformity persists without relief more than thirty (30) days after written notice of a warranty claim provided to ServiceNow under this Section 5.1, then Customer may terminate the affected Subscription Service and submit to Reseller a claim for refund of any prepaid subscription fees covering the remainder of the Subscription Term of the affected Subscription Service after the date of termination. Notwithstanding the foregoing, this warranty shall not apply to any non -conformity due to a modification of or defect in the Subscription Service that is made or caused by any person other than ServiceNow or a person acting at ServiceNow's direction. THIS SECTION 5.1 SETS FORTH CUSTOMER'S EXCLUSIVE RIGHTS AND REMEDIES (AND SERVICENOW'S SOLE LIABILITY) IN CONNECTION WITH THIS WARRANTY. 5.2. LIMITED PROFESSIONAL SERVICES WARRANTY. ServiceNow warrants that the Professional Services will be performed in a competent and workmanlike manner in accordance with accepted industry standards and practices and all material requirements set forth in the SOW or Service Description. Customer shall notify ServiceNow in writing of any breach within thirty (30) days after performance of the non -conforming Professional Services. Upon receipt of such notice, ServiceNow, at its option, shall either use commercially reasonable efforts to re -perform the Professional Services in conformance with these warranty requirements or shall terminate the affected Professional Services, in which case Customer may submit to Reseller a claim for a refund of any amounts paid for the nonconforming Professional Services. THIS SECTION 5.2 SETS FORTH CUSTOMER'S EXCLUSIVE RIGHTS AND REMEDIES (AND SERVICENOW'S SOLE LIABILITY) IN CONNECTION WITH THIS WARRANTY. 5.3. DISCLAIMER OF WARRANTIES. EXCEPT FOR THE WARRANTIES EXPRESSLY STATED IN THIS AGREEMENT, TO THE MAXIMUM EXTENT ALLOWED BY LAW, SERVICENOW DISCLAIMS ALL WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, ORAL OR WRITTEN, INCLUDING WARRANTIES SERVICENOw CONFIDENTIAL Page 4 (version 11/4/2014) Agreement No. 7434 S vic " SUBSCRIPTION SERVICE AGREEMENT EFFECTIVE DATE: NOVEMBER 4. 2014 ARISING UNDER STATUTE, WARRANTIES OF MERCHANTABILITY, ACCURACY, TITLE, NON - INFRINGEMENT OR FITNESS FOR A PARTICULAR PURPOSE OR ANY WARRANTIES ARISING FROM USAGE OF TRADE, COURSE OF DEALING OR COURSE OF PERFORMANCE. WITHOUT LIMITING THE GENERALITY OF THE FOREGOING, SERVICENOW SPECIFICALLY DOES NOT WARRANT THAT THE SUBSCRIPTION SERVICE, SOFTWARE, PROFESSIONAL SERVICES, DEVELOPMENT TOOLS, DOCUMENTATION OR DELIVERABLES WILL MEET THE REQUIREMENTS OF CUSTOMER OR OTHERS OR THAT THEY WILL BE ACCURATE OR OPERATE WITHOUT INTERRUPTION OR ERROR. CUSTOMER ACKNOWLEDGES THAT IN ENTERING THIS AGREEMENT IT HAS NOT RELIED ON ANY PROMISE, WARRANTY OR REPRESENTATION NOT EXPRESSLY SET FORTH HEREIN. 6. CONFIDENTIAL INFORMATION 6.1. CONFIDENTIALITY OBLIGATIONS. The recipient of Confidential Information shall: (i) at all times protect it from unauthorized disclosure with the same degree of care that it uses to protect its own confidential information, and in no event using less than reasonable care; and (ii) not use it except to the extent necessary to exercise rights or fulfill obligations under this Agreement. Each party shall limit the disclosure of the other party's Confidential Information to those of its employees and contractors with a need to access such Confidential Information for a party's exercise of its rights and obligations under this Agreement, provided that all such employees and contractors are subject to binding disclosure and use restrictions at least as protective as those set forth herein. Each party's obligations set forth in this Section 6 shall remain in effect during the term and three (3) years after termination of this Agreement. The receiving party shall, at the disclosing party's request or upon termination of this Agreement, return all originals, copies, reproductions and summaries of Confidential Information and other tangible materials and devices provided to the receiving party as Confidential Information, or at the disclosing party's option, certify destruction of the same. Provisions for the return of Customer Data are set forth in Section 9.3 (Return of Customer Data). 6.2. REQUIRED DISCLOSURES. A party may disclose the disclosing party's Confidential Information to a court or governmental body pursuant to a valid court order, law, subpoena or regulation, provided that the receiving party: (a) promptly notifies the disclosing party of such requirement as far in advance as possible to the extent advanced notice is lawful; and (b) provides reasonable assistance to the disclosing party in any lawful efforts by the disclosing party to resist or limit the disclosure of such Confidential Information. 6.3. EQUITABLE REMEDIES. The parties agree that the receiving party's disclosure of Confidential Information except as provided herein may result in irreparable injury for which a remedy in money damages may be inadequate. The parties further agree that in the event of such disclosure or threatened disclosure, the disclosing party may be entitled to seek an injunction to prevent the breach or threatened breach without the necessity of proving irreparable injury or the inadequacy of money damages, in addition to remedies otherwise available to the disclosing party at law or in equity. 7. INDEMNIFICATION 7.1. SERVICENOW OBLIGATION. Subject to the exclusions set forth below, ServiceNow shall: (i) defend Customer, its officers, directors and employees against any third party suit, claim, action or demand (each a "Claim') to the extent alleging: (A) that the Subscription Service used in accordance with this Agreement infringes any third party patent, copyright or trademark, or misappropriates any third party trade secret; or (B) that ServiceNow's personnel when onsite at Customer's premises caused death, bodily harm or damage to tangible personal property due to their negligence or willful misconduct; and (ii) pay any court -ordered award of damages or settlement amount to the extent arising from any such Claims. If any portion of the Subscription Service becomes the subject of a Claim under Section 7.1(i)(A), ServiceNow may: (a) contest the Claim; (b) obtain permission from the claimant for Customer's continued use of the Subscription Service; (c) replace or modify the Subscription Service to avoid infringement, if such replacement or modification has substantially the same capabilities as the Subscription Service; or, if the foregoing (a), (b), and (c) are not available on commercially reasonable terms in ServiceNow's judgment, then (d) terminate Customer's use of the affected Subscription Service upon sixty (60) days' written notice, whereupon Customer may submit to Reseller a claim for a refund of any prepaid subscription fees covering the remaining portion of the applicable Subscription Term for the affected SERVICENOw CONFIDENTIAL Page 5 (version 11/4/2014) Agreement No. 7434 servicenow- SUBSCRIPTION SERVICE AGREEMENT EFFECTIVE DATE: NOVEMBER 4, 2014 Subscription Service after the date of termination. Notwithstanding the above, ServiceNow shall have no obligation or liability for any Claim under Section 7.1(i)(A) arising in whole or in part from: (1) any use of the Subscription Service which exceeds the authorized use permitted under this Agreement or not in accordance with the Documentation; (2) Customer Data or Customer Technology; (3) use of the Subscription Service by Customer in violation of applicable law; (4) use of the affected Subscription Service after termination in accordance with clause (d) of this Section 7.1; (5) modifications to the Subscription Service made to Customer's specifications or otherwise made by any person other than ServiceNow or a person acting at ServiceNow's direction if the Claim would have been avoided by use of the unmodified Subscription Service; or (6) use of the Subscription Service in combination with any hardware, software, application or service that was not provided by ServiceNow, if the Claim would have been avoided by the non -combined or independent use of the Subscription Service. 7.2. CUSTOMER OBLIGATION. Customer shall: (i) defend ServiceNow, its officers, directors and employees against any Claim alleging that: (A) Customer Data, (B) Customer Technology or (C) a modification to the Subscription Service made to Customer's specifications or otherwise made by or on behalf of Customer by any person other than ServiceNow or a person acting at ServiceNow's direction (but only if the Claim would have been avoided by use of the unmodified Subscription Service), infringes any patent, copyright or trademark, misappropriates any third party trade secret, or violates any third party privacy rights; and (ii) pay any court - ordered award of damages or settlement amount to the extent arising from such Claim. 7.3. PROCESS. All of the foregoing indemnity obligations of ServiceNow and Customer are conditioned on the indemnified party notifying the indemnifying party promptly in writing of any actual or threatened Claim, the indemnified party giving the indemnifying party sole control of the defense thereof and any related settlement negotiations, and the indemnified party cooperating and, at the indemnifying party's request and expense, assisting in such defense. SECTION 7 STATES EACH PARTY'S ENTIRE LIABILITY AND THE OTHER PARTY'S EXCLUSIVE REMEDY FOR THIRD PARTY CLAIMS AND ACTIONS. 8. LIMITATIONS OF LIABILITY 8.1. LIMITATIONS OF LIABILITY. SERVICENOW SHALL HAVE NO LIABILITY FOR ANY REFUND THAT, IN ACCORDANCE WITH THE TERMS OF THIS AGREEMENT, IS TO BE PAID BY RESELLER. TO THE EXTENT PERMITTED BY LAW, THE TOTAL, CUMULATIVE LIABILITY OF EACH PARTY ARISING OUT OF OR RELATED TO THIS AGREEMENT OR THE PRODUCTS OR SERVICES PROVIDED HEREUNDER WHETHER BASED ON CONTRACT, TORT (INCLUDING NEGLIGENCE) OR ANY OTHER LEGAL OR EQUITABLE THEORY, SHALL BE LIMITED TO THE AMOUNTS PAID BY CUSTOMER FOR THE PRODUCTS OR SERVICES GIVING RISE TO THE CLAIM DURING THE TWELVE (12) MONTH PERIOD PRECEDING THE FIRST EVENT GIVING RISE TO LIABILITY. THE EXISTENCE OF MORE THAN ONE CLAIM SHALL NOT ENLARGE THIS LIMIT. THE FOREGOING LIMITATION OF LIABILITY SHALL NOT APPLY TO: (1) CUSTOMER'S OBLIGATION TO PAY FOR PRODUCTS, SERVICES OR TAXES; (2) A PARTY'S OBLIGATIONS IN SECTION 7 (INDEMNIFICATION); AND (3) INFRINGEMENT BY A PARTY OF THE OTHER PARTY'S INTELLECTUAL PROPERTY RIGHTS. 8.2. EXCLUSION OF DAMAGES. TO THE EXTENT PERMITTED BY LAW, NEITHER SERVICENOW NOR CUSTOMER SHALL BE LIABLE TO THE OTHER OR ANY THIRD PARTY FOR LOST PROFITS (WHETHER DIRECT OR INDIRECT) OR LOSS OF USE OR DATA, COVER, SUBSTITUTE GOODS OR SERVICES, OR FOR INCIDENTAL, CONSEQUENTIAL, PUNITIVE, SPECIAL OR EXEMPLARY DAMAGES (INCLUDING DAMAGE TO BUSINESS, REPUTATION OR GOODWILL), OR INDIRECT DAMAGES OF ANY TYPE HOWEVER CAUSED, WHETHER BY BREACH OF WARRANTY, BREACH OF CONTRACT, IN TORT (INCLUDING NEGLIGENCE) OR ANY OTHER LEGAL OR EQUITABLE CAUSE OF ACTION EVEN IF SUCH PARTY HAS BEEN ADVISED OF SUCH DAMAGES IN ADVANCE OR IF SUCH DAMAGES WERE FORESEEABLE. THE FOREGOING EXCLUSIONS SHALL NOT APPLY TO: (1) PAYMENTS TO A THIRD PARTY ARISING FROM A PARTY'S OBLIGATIONS UNDER SECTION 7 (INDEMNIFICATION); AND (2) INFRINGEMENT BY A PARTY OF THE OTHER PARTY'S INTELLECTUAL PROPERTY RIGHTS. 8.3. GROSS NEGLIGENCE; WILFUL MIISCONDUCT. AS PROVIDED BY LAW, NOTHING HEREIN SHALL BE INTENDED TO LIMIT A PARTY'S LIABILITY IN AN ACTION IN TORT (SEPARATE AND DISTINCT SERVICENOW CONFIDENTIAL Page 6 (version 11/4/2014) Agreement No. 7434 SUBSCRIPTION SERVICE AGREEMENT EFFECTIVE DATE: NOVEMBER 4, 2014 FROM A CAUSE OF ACTION FOR BREACH OF THIS AGREEMENT) FOR THE PARTY'S GROSS NEGLIGENCE OR WILFUL MISCONDUCT. 9. TERM AND TERMINATION 9.1. TERM AND TERMINATION. This Agreement continues until terminated under the terms of this Agreement. Each party may terminate this Agreement in its entirety either: (i) upon thirty (30) days' prior written notice to the other party, if at the time of notice there are no Use Authorizations in effect; or (ii) upon written notice if the other party becomes the subject of a petition in bankruptcy or any proceeding related to its insolvency, receivership or liquidation, in any jurisdiction, that is not dismissed within sixty (60) days of its commencement or an assignment for the benefit of creditors. Either party may terminate a Subscription Service or Professional Services upon written notice if the other party materially breaches this Agreement or the applicable Use Authorization for the affected service and does not cure the breach within thirty (30) days after receiving written notice thereof from the non -breaching party. Professional Services are separately ordered from the Subscription Service, and are not required for the Subscription Service. A breach by a party of its obligations with respect to Professional Services shall not by itself constitute a breach by that party of its obligations with respect to the Subscription Service even if the services are enumerated in the same Use Authorization. 9.2. EFFECT OF 'TERMINATION OF SUBSCRIPTION SERVICE. Upon termination of the Subscription Service for any reason, Customer shall stop using, and ServiceNow shall stop providing, the Subscription Service and all rights granted to Customer in this Agreement shall terminate. If the Subscription Service is terminated by Customer due to ServiceNow's breach, then Customer may submit to Reseller a claim for refund of all prepaid fees for the remaining portion of the Subscription Term for the terminated Subscription Service after the effective date of termination, Within thirty (30) days following the effective date of a termination by ServiceNow for Customer's breach, Customer shall pay all remaining amounts for the Subscription Term applicable to the Subscription Service covering the remainder of the Subscription Term regardless of the due dates specified in Reseller's order form to Customer. 9.3. TRANSITI'ON SERVICES. At least thirty (30) days prior to either the expiration of the Subscription Term (where Customer elects not to renew) or in connection with the termination by Customer of the Subscription Service in accordance with Section 9.1, provided that Customer signs an addendum to this Agreement setting forth payment and other commercial terms between Customer and ServiceNow, Customer may purchase the following services from ServiceNow: (i) one (1) extension of the Subscription Service for up to six (6) months ("Transition Subscription Service"); and (ii) Professional Services. Prior to the commencement of any Transition Subscription Service or Professional Services, Customer shall sign an ordering document and shall pay in advance for the Transition Subscription Service and any Professional Services plus verifiable travel and expenses. 9.4. RETURN OF CUSTOMER DATA. ServiceNow shall provide Customer Data in its standard database export format, excluding the ServiceNow Core Technology, to Customer upon Customer's written request and at no additional cost to Customer, provided that ServiceNow receives such request from Customer within forty-five (45) days following the expiration or termination of this Agreement for the Subscription Service (including any Transition Subscription Service term, if applicable),If ServiceNow has not received a request within the foregoing time frame, ServiceNow shall have no obligation to maintain or provide any Customer Data and shall thereafter, unless legally prohibited, have the right to delete all Customer Data in its systems or otherwise in its possession or under its control and delete Customer's instances of the Subscription Service. 9.5. SURVIVAL. Sections 2.4 (Restrictions), 4.1 (ServiceNow Ownership), 4.2 (Customer Ownership), 4.3 (Feedback) and 6 (Confidential Information) through 10 (General Provisions) of this Agreement, together with any other provision required for their construction or enforcement, shall survive termination of this Agreement for any reason. 10. GENERAL PROVISIONS 10.1. ASSIGNMENT. Neither party may assign its rights or obligations under this Agreement, whether by operation of law or otherwise, without the prior written consent of the other party. Notwithstanding the SERVICENOw CONFIDENTIAL Page 7 (version 11/4/2014) Agreement No. 7434 SUBSCRIPTION SERVICE AGREEMENT EFFECTIVE DATE: NOVEMBER 4, 2014 foregoing, either party may, upon notice and without the other party's consent: (i) in connection with a merger, reorganization or sale of all or substantially all of the assets or equity of such party, assign this Agreement in its entirety to such party's successor; and (ii) assign this Agreement in its entirety to any Affiliate. "Affiliates" shall mean any person or entity directly or indirectly Controlling, Controlled by or under common Control with a party to the Agreement, where "Control' means the legal power to direct or cause the direction of the general management of the company, partnership or other legal entity. Any attempted or purported assignment in violation of this Section 10.1 will be null and void. Subject to the foregoing, this Agreement shall bind and inure to the benefit of the parties, their respective successors and permitted assigns. 10.2. COMPLIANCE WITH MAWS. ServiceNow shall comply with any statutes and regulations that apply to its provision of the Subscription Service, Professional Services, Software, Documentation, Development Tools and Deliverables, under the Agreement, including but not limited to those applicable to the privacy and security of personal information, including trans -border data transfers and data breach notification requirements as required of ServiceNow by law. Customer shall comply with all laws that apply to its use of the Subscription Service, Professional Services, Software, Documentation, Development Tools and Deliverables, under the Agreement, including but not limited to those applicable to collection and processing of Customer Data in ServiceNow systems through the Subscription Service. Customer agrees to provide any required disclosures to and obtain any required consents for the transfer of Customer Data to ServiceNow. ServiceNow shall not be responsible for compliance with any laws applicable to Customer and its industry that are not generally applicable to information technology service providers. 10.3. EXPORT COMPLIANCE. Each party shall comply with United States and foreign export control laws and regulations. Customer acknowledges that the Subscription Service, Professional Services, Software, Documentation, Development Tools and Deliverables are subject to the U.S. Export Administration Regulations (the "EAR') and that Customer shall comply with the EAR. Without limiting the foregoing, Customer represents and warrants that: (i) Customer is not located in, and shall not use the Subscription Service, Professional Services, Software, Documentation, Development Tools and Deliverables from, any country that is subject to U.S. export restrictions (currently including, but not necessarily limited to, Cuba, Iran, North Korea, Sudan and Syria); (ii) Customer shall not use the Subscription Service, Professional Services, Software, Documentation, Development Tools and Deliverables in the design, development or production of nuclear, chemical or biological weapons, or rocket systems, space launch vehicles, sounding rockets or unmanned air vehicle systems; and (iii) Customer is not prohibited from participating in U.S. export transactions by any federal agency of the U.S. government. In addition, Customer is responsible for complying with any local laws which may impact Customer's right to import, export or use the Subscription Service, Professional Services, Software, Documentation, Development Tools and Deliverables. 10.4. US GOVERNMENT RIGHTS. All ServiceNow software (including Software) is commercial computer software and all services are commercial items. "Commercial computer software" has the meaning set forth in Federal Acquisition Regulation ("FAR") 2.101 for civilian agency purchases and the Department of Defense ("DOD") FAR Supplement ("DFARS") 252.227-7014(a)(1) for defense agency purchases. If the software is licensed or the services are acquired by or on behalf of a civilian agency, ServiceNow provides the commercial computer software and/or commercial computer software documentation and other technical data subject to the terms of this Agreement as required in FAR 12.212 (Computer Software) and FAR 12.211 (Technical Data) and their successors. If the software is licensed or the services are acquired by or on behalf of any agency within the DOD, ServiceNow provides the commercial computer software and/or commercial computer software documentation and other technical data subject to the terms of this Agreement as specified in DFARS 227.7202-3 and its successors. Only if this is a DOD prime contract or DOD subcontract, the Government acquires additional rights in technical data as set forth in DFARS 252.227-7015. This U.S. Government Rights clause is in lieu of, and supersedes, any other FAR, DFARS or other clause or provision that addresses Government rights in computer software or technical data. 10.5. NOTICE. Except as otherwise provided herein, all notices shall be in writing and deemed given upon: (i) personal delivery; (ii) when received by the addressee if sent by a recognized overnight courier (receipt requested); (iii) the second business day after mailing; or (iv) the first business day after sending by email with SERVICENOw CONFIDENTIAL Page 8 (version 11/4/2014) Agreement No. 7434 SUBSCRIPTION SERVICE AGREEMENT EFFECTIVE DATE: NOVEMBER 4, 2014 confirmation of receipt, except that email shall not be sufficient for notices regarding a Claim. Notices shall be sent to the parties as set forth on the signature page of this Agreement or as subsequently updated in writing. 10.6. FORCE MAJEURE. No party shall be liable or responsible to the other party, nor be deemed to have defaulted under or breached this Agreement, for any failure or delay in fulfilling or performing any term of this Agreement (excluding Customer's failure to pay amounts owed when due), when and to the extent such failure or delay is caused by or results from acts beyond the affected party's reasonable control, including without limitation: strikes, lock -outs or other industrial disputes (whether involving its own workforce or a third party's), trespassing, sabotage, theft or other criminal acts, failure of energy sources or transport network, acts of God, export bans, sanctions and other government actions, war, terrorism, riot, civil commotion, interference by civil or military authorities, national or international calamity, armed conflict, malicious damage, breakdown of plant or machinery, nuclear, chemical or biological contamination, explosions, collapse of building structures, fires, floods, storms, earthquakes, epidemics or similar events, natural disasters or extreme adverse weather conditions (each a "Force Majeure Event'). The party suffering a Force Majeure Event shall use reasonable efforts to mitigate against the effects of such Force Majeure Event. 10.7. HIGH RISK ACTIVITIES. Customer shall use the ServiceNow Core Technology within the intended business purposes described in the Documentation, and not for any purpose that requires fail-safe performance including, but not limited to, stock trading, financial transaction processing, management of hazardous facilities or applications for which failure could result in death, personal injury, or severe physical or environmental damage ("High Risk Activity'). ServiceNow, its licensors and suppliers expressly disclaim all warranties of fitness for any such use and Customer shall release and hold ServiceNow, its licensors and suppliers harmless from liability arising out of the use of the ServiceNow Core Technology for High Risk Activity. 10.8. USE OF AGGREGATE DATA.. Customer agrees that ServiceNow may collect, use and disclose quantitative data derived from the use of the Subscription Service for industry analysis, benchmarking, analytics, marketing, and other business purposes. All data collected, used, and disclosed will be in aggregate form only and will not identify Customer or its users. 10.9. ENTIRETY. This Agreement, together with the Use Authorizations, Product Overviews, SOWS, Service Descriptions, and the Subscription Service Guide (including the Customer Support Policy, the Upgrade Policy and the Data Security Guide), is the final and entire agreement between the parties regarding the products and services provided hereunder and supersedes all prior or contemporaneous oral or written agreements, representations, understandings, undertakings and negotiations with respect to the subject matter hereof. The terms of this Agreement apply to the exclusion of any other terms that Customer seeks to impose or incorporate, or which are implied by trade, custom, practice or course of dealing. Customer acknowledges that it has not relied on any statement, promise or representation made or given by or on behalf of ServiceNow that is not set out in this Agreement. Customer's orders are not contingent on, and Customer has not relied on, the delivery of any future functionality regardless of any verbal or written communication about ServiceNow's future plans. This Agreement may be executed in counterparts, each of which shall be deemed to be an original. 10.10. WAIVER AND AMENDMENT. A waiver of any right is only effective if it is in writing and only against the party who signed such writing and for the circumstances given. Any modification of this Agreement must be in writing and signed by authorized representatives of both parties. 10.11. RELATIONSHIP OF THE PARTIES. The parties are independent contractors. Nothing in this Agreement shall be construed to create a partnership, joint venture or agency relationship. Neither party shall have any right or authority to assume or create any obligation of any kind expressed or implied in the name of or on behalf of the other party. 10.12. GOVERNING LAW: JURISDICTION AND VENUE. This Agreement shall be governed by the laws of the state of California, without regard to its conflict of laws principles. The parties hereby irrevocably consent to the exclusive jurisdiction of, and venue in, any federal or state court of competent jurisdiction located in Santa Clara County, California, for the purposes of adjudicating any dispute arising out of this Agreement. Each party hereto expressly consents to service of process by registered mail. To the extent permitted by law, choice of law rules and the United Nations Convention on Contracts for the International Sale of Goods shall not apply. SERVICENOw CONFIDENTIAL Page 9 (version 11/4/2014) Agreement No. 7434 servicenow" SUBSCRIPTION SERVICE AGREEMENT EFFECTIVE DATE: NOVEMBER 4, 2014 Notwithstanding the foregoing, either party may at any time seek and obtain appropriate legal or equitable relief in any court of competent jurisdiction for claims regarding such party's intellectual propertyrights. 10.13. CONSTRUCTION. Products and services shall be provided in the English language unless agreed otherwise. The parties confirm that they have requested that this Agreement and all related documents be drafted in English at the express wishes of the parties. Les parties confirment avoir expressement exige que le present contrat et les documents de ServiceNow qui y sont attaches soient rediges en anglais. Section headings are for convenience only and are not to be used in interpreting this Agreement. SERVICENOw CONFIDENTIAL Page 10 (version 11/4/2014) Agreement No. 7434 SUBSCRIPTION SERVICE GU DE EFFECTIVE DATE: NOVEMBER 12, 2014 SUBSCRIPTION SERVICE GUIDE Capitalized terms not defined herein shall have the meaning set forth in the ordering agreement or the use agreement between Customer and ServiceNow. 1. SUPPORT During the Subscription Term, ServiceNow or its authorized reseller, as applicable, shall provide support for the Subscription Service as set forth in the Customer Support Policy attached hereto, and incorporated herein by reference. 2. UPGRADES ServiceNow determines whether and when to develop, release and apply any Upgrade (as defined in the Upgrade Policy attached hereto, and incorporated herein by reference) to Customer's instances of the Subscription Service. DATA SECURITY ServiceNow shall implement and maintain security procedures and practices appropriate to information technology service providers to protect Customer Data from unauthorized access, destruction, use, modification, or disclosure, as described in the Data Security Guide attached hereto, and incorporated herein by reference. 4. INSURANCE ServiceNow agrees to maintain in effect during the Subscription Term, at ServiceNow's expense, the following minimum insurance coverage: (i) (a) Workers' Compensation Insurance, in accordance with applicable statutory, federal, and other legal requirements and (b) Employers' Liability Insurance covering ServiceNow's employees in an amount of not less than $1,000,000 for bodily injury by accident, $1,000,000 policy limit for bodily injury by disease, and $1,000,000 each employee for bodily injury by disease; (ii) Commercial General Liability Insurance written on an occurrence form and including coverage for bodily injury, property damage, products and completed operations, personal injury, advertising injury arising out of the services and/or products provided by ServiceNow under this Agreement with minimum limits of $1,000,000 per occurrence/$2,000,000 aggregate; (iii) Commercial Automobile Liability Insurance providing coverage for hired and non -owned automobiles used in connection with this Agreement in an amount of not less than $1,000,000 per accident combined single limit for bodily injury and property damage; (iv) Combined Technology Errors' & Omission Policy with a $5,000,000 per Claim limit, including: (a) Professional Liability Insurance providing coverage for the services and software in this Agreement. Such coverage to be maintained for at least two (2) years after the termination of this Agreement; and (b) Privacy, Security, and Media Liability Insurance providing liability coverage for unauthorized access or disclosure, security breaches or system attacks, as well as infringements of copyright and trademark that might result from this Agreement; and (v) Excess Liability over Employers' Liability, Commercial General Liability and Commercial Automobile Liability with a $5,000,000 aggregate limit. For the purpose of this Section, a "Claim" means a written demand for money or a civil proceeding which is commenced by service of a complaint or similar pleading. 5. AVAILABILITY SERVICE LEVEL 5.1. DEFINITIONS (a) "Available" means that the Subscription Service can be accessed by authorized users. SERVICENOw CONFIDENTIAL Page 1 (version 11/12/2014) Agreement No. 7434 servicenow- SUBSCRIPTION SERVICE GU DE EFFECTIVE DATE: NOVEMBER 12, 2014 (b) "Excused Downtime" means: (i) Maintenance Time of up to two (2) hours per month; and (ii) any time the Subscription Service is not Available due to circumstances beyond ServiceNow's control, including without limitation modifications of the Subscription Service by any person other than ServiceNow or a person acting at ServiceNow's direction, a Force Majeure Event, general Internet outages, failure of Customer's infrastructure or connectivity (including without limitation, direct connectivity and virtual private network (VPN) connectivity to the Subscription Service), computer and telecommunications failures and delays, and network intrusions or denial -of -service or other criminal attacks. (c) "Maintenance Time" means the time the Subscription Service is not Available due to service maintenance. (d) "Availability SLA" means the percentage of total time during which Customer's production instances of the Subscription Service are Available during a calendar month, excluding Excused Downtime. 5.2. AVAILABILITY, If Customer's production instances of the Subscription Service fall below the Availability SLA of ninety-nine and eight -tenths percent (99.8%) during a calendar month, Customer's exclusive remedy for failure of the Subscription Service to meet the Availability SLAs is either: (1) to request that the affected Subscription Term be extended for the number of minutes the Subscription Service was not Available in the month in accordance with the Availability SLA; or (2) to request that ServiceNow issue a service credit to Customer for the dollar value of the number of minutes the Subscription Service was not Available in the month in accordance with the Availability SLA (determined at the deemed per minute rate ServiceNow charges to Customer for Customer's use of the affected Subscription Service), which Customer may request ServiceNow apply to the next invoice for subscription fees. 5.3. REQUESTS Customer must request all service credits or extensions in writing to ServiceNow within thirty (30) days of the end of the month in which the Availability SLA was not met, identifying the support requests relating to the period Customer's production instances of the Subscription Service was not Available. The total amount of service credits for any month may not exceed the subscription fee for the affected Subscription Service for the month, and has no cash value. ServiceNow may delay issuing service credits until such amounts reach one thousand U.S. dollars ($1,000) or equivalent currency specified in the applicable Order Form. SERVICENOw CONFIDENTIAL Page 2 (version 11/12/2014) Agreement No. 7434 SUBSCRIPTION SERVICE GU DE EFFECTIVE DATE: NOVEMBER 12, 2014 CUSTOMER SUPPORT POLICY This Customer Support Policy governs the support that ServiceNow or its authorized reseller, as applicable, will provide for the Subscription Service. This Policy may be updated from time to time. Scope The purpose of Customer Support is to resolve defects that cause the Subscription Service to perform not in substantial conformance to the Product Overview. A resolution to a defect may consist of a fix, workaround or other relief ServiceNow deems reasonable. Customer Support does not include: • implementation services • configuration services • integration services • customization services or other custom software development • training • assistance with administrative functions Customer Support is not required to provide resolutions for immaterial defects or defects due to modifications of the Subscription Service made by any person other than ServiceNow or a person acting at ServiceNow's direction. Business Hours Customer Support is available 24 hours a day, 7 days a week, including all holidays. Access Contacts Customer may contact ServiceNow using one of the following means: • Support Portal at https://hi.service-now.com/. Customer may get login access to this self-service portal by contacting its ServiceNow administrator. • Phone using one of the numbers at htk ://sgaicenow.,com/su orticontact �lrni. Customer shall contact ServiceNow's authorized reseller in accordance with its agreement with the reseller. Incident Priority Incident priority for a defect is determined using the guidelines below: Response Times and Level of Effort Customer submits an incident with ServiceNow via phone or web and with ServiceNow's authorized reseller as directed by reseller. All support requests are tracked online and can be viewed by Customer's authorized contacts. Response times do not vary if the incident was filed via phone or web. SERVICENOw CONFIDENTIAL Page 3 (version 11/12/2014) Agreement No. 7434 SUBSCRIPTION SERVICE GU DE EFFECTIVE DATE: NOVEMBER 12, 2014 ServiceNow or its authorized reseller, as applicable, will use reasonable efforts to meet the target response times and target level of effort stated in the table below. Support from the reseller may be limited to business hours only. Priority Target Response Times Target Level of Effort _ 11 P10.. 30 minutes Continuousl 24 hours r day, 7 days per � Y u week but not necessarily ...... Continuously, 24 hours per P2 2 hours'day F am 7 d.der week ... P3 1 business day Asappropriate during normal business hours P4 N/A varies Customer Responsibilities Customer's obligations are as follows: (a) Customer agrees to receive from ServiceNow or its authorized reseller, as applicable, communications via email, phone or through the Support Portal regarding the Subscription Service. (b) Customer shall appoint no more than five (5) contacts ("Customer Authorized Contacts") to engage Customer Support for questions and/or technical issues. (i) Only Customer Authorized Contacts are authorized to contact Customer Support. (ii) Customer must ensure the information for these contacts is current in the Support Portal at https://hi.servige-now.com/. (iii) Customer Authorized Contacts are trained on the use and administration of the Subscription Service. (c) Customer shall cooperate to enable ServiceNow to deliver the Subscription Service and support for the service. (d) Customer is solely responsible for the use of the Subscription Service by its authorized users. Support Resources • ServiceNow Website (http://www.servicenow.com/services/overview.html) • ServiceNow Community (https://community.servicenow.com/welcome) • Release Notes (http://wiki.service-now.com/index.php?title=Main_Page) • Product Documentation (http://wiki.service-now.com/index.php?title=Main_Page) • Knowledge Base (https://hi.service-now.com/nav_to.do?uri=kb_home.do) • Support Community (https://community.servicenow.com/community/support) SERVICENOw CONFIDENTIAL Page 4 (version 11/12/2014) Agreement No. 7434 servicenow- SUBSCRIPTION SERVICE GU DE UPGRADE POLICY UPGRADES EFFECTIVE DATE: NOVEMBER 12, 2014 "Upgrades" are ServiceNow's releases of the Subscription Service for repairs, enhancements or new features applied by ServiceNow to Customer's instances of the Subscription Service at no additional fee during the Subscription Term. ServiceNow has the discretion to provide new functionality as an Upgrade or as different software or service for a separate fee. ServiceNow determines whether and when to develop, release and apply any Upgrade to Customer's instances of the Subscription Service. 2. NOTICE; MAINTENANCE DOWNTIME ServiceNow shall use reasonable efforts to give Customer thirty (30) days prior notice of any Upgrade to the Subscription Service. ServiceNow shall use reasonable efforts to give Customer ten (10) days prior notice of any Upgrade to the cloud infrastructure network, hardware, or software used by ServiceNow to operate and deliver the Subscription Service if ServiceNow in its reasonable judgment believes that the infrastructure Upgrade will impact Customer's use of its production instances of the Subscription Service. ServiceNow will use commercially reasonable efforts to limit the period of time during which the Subscription Service is unavailable due to the application of Upgrades to no more than two (2) hours per month. Notwithstanding the foregoing, ServiceNow may provide Customer with a shorter or no notice period of an Upgrade if necessary, in the reasonable judgment of ServiceNow, to maintain the availability, security or performance of the Subscription Service or the ability of ServiceNow to efficiently provide the Subscription Service. 3. NOMENCLATURE A pending Upgrade may be a "Feature Release", "Patch" or "Hotfix." A "Feature Release" is an Upgrade that includes new features or enhancements. A "Patch" or a "Hotfik' is an Upgrade to a Feature Release that maintains the functionality of the Feature Release and does not include new functionality. ServiceNow refers to each Feature Release and its associated Patches and Hotfixes as a "Release Family." For example, ServiceNow's Feature Release "Aspen" established the "Aspen" Release Family, and ServiceNow's subsequent Feature Release "Berlin" established the "Berlin" Release Family. 4. PINNING REQUESTS Customer may submit a support request for "no Upgrade" not fewer than five (5) business days' prior to a pending Upgrade of the Subscription Service. Subject to the terms and conditions of this Upgrade Policy, Customer's "no Upgrade" request shall be granted, and the Upgrade shall not be applied to Customer's instances of the Subscription Service. 5. SUPPORTED AND NON -SUPPORTED RELEASE FAMILIES ServiceNow offers support for the then current Release Family and the prior two (2) Release Families ("Supported Release Families") as set forth in the Customer Support Policy. A Customer using a Supported Release Family may be required to Upgrade to a Patch or Hotfix within the Supported Release Family to correct a defect. At its discretion, ServiceNow may offer limited support for additional Release Families ("Non -Supported Release Families"). Without limiting ServiceNow's discretion to determine the availability of support for Non - Supported Release Families, a Customer using a Non -Supported Release Family may be required to Upgrade to a Supported Release Family to correct a defect. Any service level agreements, recovery time objectives or recovery point objectives are not applicable to Non -Supported Release Families. Details of ServiceNow support are further set forth in the Customer Support Policy. Customer acknowledges that the current Release Family is the most current feature, availability, performance and security version of the Subscription Service. Within a Supported Release Family, the most recent Patch contains the most current feature, availability, performance and security version of the Subscription Service for that Release Family. A Customer that has submitted a "no Upgrade" request may experience defects, for which Customer hereby agrees that ServiceNow is not responsible, including without limitation those that affect the features, availability, performance and security of the Subscription Service, that are fixed in the most SERVICENOw CONFIDENTIAL Page 5 (version 11/12/2014) Agreement No. 7434 SUBSCRIPTION SERVICE GU DE current version of the Subscription Service. 6. REQUIRED UPGRADES EFFECTIVE DATE: NOVEMBER 12, 2014 If Customer has requested "no Upgrade" it may nevertheless be required to Upgrade if in the reasonable judgment of ServiceNow the Upgrade is necessary to maintain the availability, security or performance of the Subscription Service or the ability of ServiceNow to efficiently provide the Subscription Service, as follows: 6.1. SUPPORTED RELEASE FAMILY. If Customer is using a Supported Release Family, it may be required to Upgrade to a Patch or Hotfix within the Supported Release Family. 6.2. NON -SUPPORTED RELEASE FAMILY. If Customer is using a Non -Supported Release Family, it may be required to Upgrade to a Supported Release Family. 7. EXCEPTIONS Notwithstanding the other provisions of this Upgrade Policy, Customer may not submit a support request for "no Upgrade" for any Upgrade to, or that is essential for, the infrastructure network, hardware, or software used by ServiceNow to operate and deliver the Subscription Service. SERVICENOw CONFIDENTIAL Page 6 (version 11/12/2014) Agreement No. 7434 SUBSCRIPTION SERVICE GU DE DATA SECURITY GUIDE Security Statement of an Enterprise IT Cloud Company ...................... EFFECTIVE DATE: NOVEMBER 12, 2014 The ServiceNow cloud is built for the enterprise customer with every aspect aimed towards meeting the customer's demand for reliability, availability and security. ServiceNow's comprehensive approach to address this demand is enabled by the following: (a) ServiceNow's robust cloud infrastructure runs on its own applications and utilizes industry best -of -breed technology to automate mission critical functionalities in the cloud service with around -the -clock and around -the -world delivery; (b) ServiceNow achieves flexibility and control in its ability to deliver a stable user experience to the customer by having a logical single tenant architecture; (c) ServiceNow's application development which has a paramount focus on quality, security, and the user experience is closely connected to the operations of delivering those applications in a reliable and secure cloud environment; (d) ServiceNow invests in a comprehensive compliance strategy that allows its customers to attain their own compliance to applicable laws by obtaining attestations and certifications and running its subscription service from paired data centers situated close to where its customers are located; and (e) ServiceNow's homogeneous environment where all applications are on a single platform offers ServiceNow a competitive advantage in being able to concentrate its efforts to make the customer's user experience the best possible. This Data Security Guide describes the measures ServiceNow takes to protect Customer Data when it resides in the ServiceNow cloud. This Data Security Guide forms a part of any legal agreement into which this Data Security Guide is explicitly incorporated by reference (the "Agreement') and is subject to the terms and conditions of the Agreement. Capitalized terms that are not otherwise defined herein shall have the meaning given to them in the Agreement. SECURITY PROGRAM While providing the Subscription Service, ServiceNow shall maintain a written information security program of policies, procedures and controls ("Security Program") governing the processing, storage, transmission and security of Customer Data. The Security Program includes industry standard practices designed to protect Customer Data from unauthorized access, acquisition, use, disclosure, or destruction. ServiceNow may periodically review and update the Security Program to address new and evolving security technologies, changes to industry standard practices, and changing security threats, provided that any such update does not materially reduce the commitments, protections or overall level of service provided to Customer as described herein. 2. CERTIFICATIONS AND ATTESTATIONS 2.1. Certifications and Attestations. ServiceNow shall establish and maintain sufficient controls to meet the objectives stated in ISO 27001 and SSAE 16 / SOC 1 and SOC 2 Type 2 (or equivalent standards) (collectively, the "Standards") for the information security management system supporting the Subscription Service. At least once per calendar year, ServiceNow shall perform an assessment against such Standards ("Assessment'). Upon Customer's written request, which shall be no more than once per calendar year, ServiceNow shall provide a summary of the Assessment(s) to Customer. Assessments shall be Confidential Information of ServiceNow. 2.2. Safe Harbor. ServiceNow shall maintain self -certified compliance under the U.S.-EU and U.S.- Swiss Safe Harbor Frameworks developed by the U.S. Department of Commerce regarding the collection, use and retention of Personal Data (defined in Section 6 below) from European Union member countries and Switzerland. 3. PHYSICAL, TECHNICAL AND ADMINISTRATIVE SECURITY MEASURES The Security Program shall include the following physical, technical and administrative measures designed to protect Customer Data from unauthorized access, acquisition, use, disclosure, ordestruction: 3.1. Physical Security Measures (a) Data Center Facilities: (i) Physical access restrictions and monitoring that may include a combination of any of the following: multi -zone security, man -traps, appropriate perimeter deterrents (for example, SERVICENOw CONFIDENTIAL Page 7 (version 11/12/2014) Agreement No. 7434 servicenow" SUBSCRIPTION SERVICE GU DE EFFECTIVE DATE: NOVEMBER 12, 2014 fencing, berms, guarded gates), on -site guards, biometric controls, CCTV, and secure cages; and (ii) fire detection and fire suppression systems both localized and throughout the data centerfloor. (b) Systems, Machines and Devices: (i) Physical protection mechanisms; and (ii) entry controls to limit physical access. (c) Media: (i) Industry standard destruction of sensitive materials before disposition of media; (ii) secure safe for storing damaged hard disks prior to physical destruction; and (iii) physical destruction of all decommissioned hard disks storing Customer Data. 3.2. Technical Security Measures (a) Access Administration. Access to the Subscription Service by ServiceNow employees and contractors is protected by authentication and authorization mechanisms. User authentication is required to gain access to production and sub -production systems. Access privileges are based on job requirements and are revoked upon termination of employment or consulting relationship. Production infrastructure includes appropriate user account and password controls (for example, the required use of virtual private network connections, complex passwords with expiration dates, and a two -factored authenticated connection) and is accessible for administration. (b) Logging and Monitorin The production infrastructure log activities are centrally collected and are secured in an effort to prevent tampering and are monitored for anomalies by a trained security team. (c) Firewall System. An industry -standard firewall is installed and managed to protect ServiceNow systems by residing on the network to inspect all ingress connections routed to the ServiceNow environment. (d) Vu6nerabi'Ilty Mana egem nt. ServiceNow conducts periodic independent security risk evaluations to identify critical information assets, assess threats to such assets, determine potential vulnerabilities, and provide for remediation. When software vulnerabilities are revealed and addressed by a vendor patch, ServiceNow will obtain the patch from the applicable vendor and apply it within an appropriate timeframe in accordance with ServiceNow's then current vulnerability management and security patch management standard operating procedure and only after such patch is tested and determined to be safe for installation in all production systems. (e) Antivirus. ServiceNow updates anti -virus, anti-malware, and anti-spyware software on regular intervals and centrally logs events for effectiveness of such software. (f) Change Control. ServiceNow ensures that changes to platform, applications and production infrastructure are evaluated to minimize risk and are implemented following ServiceNow's standard operating procedure. 3.3. Administrative Security Measures (a) Data Center Inapections. ServiceNow performs routine reviews at each data center to ensure that it continues to maintain the security controls necessary to comply with the Security Program. (b) Personnel Seggrit . ServiceNow performs background and drug screening on all employees and all contractors who have access to Customer Data in accordance with ServiceNow's then current applicable standard operating procedure and subject to applicable law. (c) Secarit Awareness and Trainin . ServiceNow maintains a security awareness program that includes appropriate training of ServiceNow personnel on the Security Program. Training is conducted at time of hire and periodically throughout employment at ServiceNow. (d) "vendor Disk _Management. ServiceNow maintains a vendor risk management program that assesses all vendors that access, store, process or transmit Customer Data for appropriate security controls and business disciplines. SERVICENOw CONFIDENTIAL Page 8 (version 11/12/2014) Agreement No. 7434 ser,vicenow SUBSCRIPTION SERVICE GU DE EFFECTIVE DATE: NOVEMBER 12, 2014 4. DATA PROTECTION AND SERVICE CONTINUITY 4.1. Data Centers; Data Backup. ServiceNow shall host Customer's instances in primary and secondary SSAE 16 Type II or ISO 27001 certified (or equivalent) data centers in the geographic regions specified on the Order Form for the Subscription Term. Each data center includes full redundancy (N+1) and fault tolerant infrastructure for electrical, cooling and network systems. The deployed servers are enterprise scale servers with redundant power to ensure maximum uptime and service availability. The production database servers are replicated in near real time to a mirrored data center in a different geographic region. Each customer instance is supported by a network configuration with multiple connections to the Internet. ServiceNow backs up all Customer Data in accordance with ServiceNow's standard operating procedure. 4.2. Personnel. In the event of an emergency that renders the customer support telephone system unavailable, all calls are routed to an answering service that will transfer to a ServiceNow telephone support representative, geographically located to ensure business continuity for support operations. 5. INCIDENT MANAGEMENT AND BREACH NOTIFICATION 5.1. Incident Monitoring and Management. ServiceNow shall monitor, analyze and respond to security incidents in a timely manner in accordance with ServiceNow's standard operating procedure. Depending on the nature of the incident, ServiceNow security group will escalate and engage response teams necessary to address an incident. 5.2. Breach Notification. Unless 'notification is delayed by the actions or demands of a law enforcement agency, ServiceNow shall report to Customer the unauthorized acquisition, access, use, disclosure or destruction of Customer Data (a "Breach") promptly following determination by ServiceNow that a Breach occurred. The initial report shall be made to Customer security contact(s) designated in ServiceNow's customer support portal. ServiceNow shall take reasonable measures to promptly mitigate the cause of the Breach and shall take reasonable corrective measures to prevent future Breaches. As information is collected or otherwise becomes available to ServiceNow and unless prohibited by law, ServiceNow shall provide information regarding the nature and consequences of the Breach that are reasonably requested to allow Customer to notify affected individuals, government agencies and/or credit bureaus. Customer is solely responsible for determining whether to notify impacted Data Subjects (defined in 6.1 below) and for providing such notice, and for determining if regulatory bodies or enforcement commissions applicable to Customer or Customer Data need to be notified of a Breach. 5.3. Customer Cooperation. Customer agrees to cooperate with ServiceNow in maintaining accurate contact information in the customer support portal and by providing any information that is reasonably requested to resolve any security incident, identify its root cause(s) and prevent a recurrence. 6. DATA PROCESSING GUIDELINES; COMPLIANCE WITH LAWS 6.1. Customer as Data Controller. Customer acknowledges that in relation to Personal Data supplied and/or processed under the Agreement it acts as Controller and it warrants that it will duly observe all of its obligations under all applicable laws and regulations of the European Union, the European Economic Area and their member states regarding the processing of Personal Data (collectively referred to as "'Data Protection Laws") including, without limitation, obtaining and maintaining all necessary notifications and obtaining and maintaining all necessary Data Subject Consents, Customer shall (I) have sole responsibility for the accuracy, quality„ integrity, legality and reliability of Personal Data and of the means by which it acquired Personal Data, (ii) ensure that data processing instructions given to ServiceNow comply with applicable Data Protection Laws, and (iii) comply with all applicable Data Protection Laws in collecting, compiling, storing, accessing and using Personal Data in connection with the Subscription Service. For the purposes of this Data Security Guide, "Personal Data", "Controller', "Data Subject" and "Data Subject Consent" shall have the meaning given to these terms in Directive 95/46/EC. For clarity, "process" or "processing" means any operation or set of operations performed upon Customer Data. 6.2. ServiceNow as Data Processor. ServiceNow shall process or otherwise use Personal Data (including possible onward transfers) on behalf of Customer solely for the purpose of providing the services SERVICENOw CONFIDENTIAL Page 9 (version 11/12/2014) Agreement No. 7434 serviceno, w", SUBSCRIPTION SERVICE GU DE EFFECTIVE DATE: NOVEMBER 12, 2014 described in the Agreement and only in accordance with Customer's lawful instructions (limited to those instructions which ServiceNow can reasonably carry out in the provision of the Subscription Service), the terms of the Agreement, and this Data Security Guide. ServiceNow shall ensure that those employees to whom it grants access to such Personal Data are directed to keep such Personal Data confidential and are informed of any additional data protection obligations applicable to such Personal Data. ServiceNow shall, to the extent legally permitted, promptly notify Customer with respect to any request or communication ServiceNow receives from any regulatory authority in relation to any data processing activities ServiceNow conducts on behalf of Customer. In addition, ServiceNow will cooperate and assist Customer, at Customer's cost, in relation to any such request and to any response to any such communication. ServiceNow will pass on to the Customer any requests of a Data Subject to access, delete, correct, or block Personal Data processed under the Agreement. If ServiceNow is compelled by law to disclose Customer's information as part of a civil proceeding to which Customer is a party, and Customer is not contesting the disclosure, Customer will reimburse ServiceNow for its reasonable cost of compiling and providing secure access to that information. 6.3. Subcontractors. ServiceNow may engage subcontractors for processing Customer Data under the Agreement, provided ServiceNow shall ensure compliance by such subcontractor(s) with the requirements of this Section 6 by entering into written agreements with such subcontractors which provide that the subcontractor will apply the Safe Harbor principles to the processing of Personal Data. ServiceNow's use of any subcontractor will not relieve, waive or diminish any obligation ServiceNow has under the Agreement or this Data Security Guide. 7. PENETRATION TESTS 7.1. By a Third Party. ServiceNow contracts with third party vendors to perform an annual penetration test on the ServiceNow platform to identify risks and remediation that help increase security. 7.2. By Customer. No more than once per calendar year Customer may request to perform, at its own expense, an application penetration test of its instances of the Subscription Service. Customer shall notify ServiceNow in advance of any test by submitting a request using ServiceNow's online support portal and completing a penetration testing agreement. ServiceNow and Customer must agree upon a mutually acceptable time for the test; and Customer shall not perform a penetration test without ServiceNow's express written authorization. The test must be of reasonable duration, and must not interfere with ServiceNow's day-to-day operations. Promptly upon completion of the penetration test, Customer shall provide ServiceNow with the test results including any detected vulnerability. Upon such notice, ServiceNow shall, consistent with industry standard practices, use all commercially reasonable efforts to promptly make any necessary changes to improve the security of the Subscription Service. Customer shall treat the test results as Confidential Information of ServiceNow. 8. SHARING THE SECURITY RESPONSIBILITY 8.1. Product Capabilities. The Subscription Service has the capabilities to: (i) authenticate users before access; (ii) encrypt passwords; (iii) allow users to manage passwords; and (iv) prevent access by users with an inactive account. Customer manages each user's access to and use of the Subscription Service by assigning to each user a credential and user type that controls the level of access to the Subscription Service. 8.2. Customer Responsibilities. ServiceNow provides the cloud environment that permits Customer to use and process Customer Data in the Subscription Service. The architecture in the Subscription Service includes, without limitation, column level encryption functionality and the access control list engine. Customer shall be responsible for using the column level encryption functionality and access control list engine for protecting all Customer Data containing sensitive data, including without limitation, credit card numbers, social security numbers, financial and health information, and sensitive personal data. Customer is solely responsible for the results of its decision not to encrypt such sensitive data. ServiceNow protects all Customer Data in the ServiceNow cloud infrastructure equally in accordance with this Data Security Guide, regardless of the classification of the type of Customer Data. Customer shall be responsible for protecting the confidentiality of each user's login and password and shall manage each user's access to the Subscription Service. SERVICENOw CONFIDENTIAL Page 10 (version 11/12/2014) Agreement No. 7434 f SUBSCRIPTION SERVICE GU DE EFFECTIVE DATE: NOVEMBER 12, 2014 8.3. Customer Cooperation. Customer shall promptly apply any application upgrade that ServiceNow determines is necessary to maintain the security, performance or availability of the Subscription Service. 8.4. Limitations. Notwithstanding anything to the contrary in the Agreement or this Data Security Guide, ServiceNow's obligations extend only to those systems, networks, network devices, facilities and components over which ServiceNow exercises control. This Data Security Guide does not apply to: (i) information shared with ServiceNow that is not data stored in its systems using the Subscription Service; (ii) data in Customer's virtual private network (VPN) or a third party network; or (iii) any data processed by Customer or its users in violation of the Agreement or this Data Security Guide. SERVICENOw CONFIDENTIAL Page 11 (version 11/12/2014) Agreement No. 7434 service ServicellMow ProductOverview Effective lDate: May 2,2016 Activity Designer Enables a user to construct reusable activities that suit an organization's business needs. Requires Orchestration Core. Activity Packs A collection of related workflow activities that allow Orchestration Core to connect to, and automate work with, external systems. Some Activity Packs require Orchestration Core and others require Cloud Management. Agile Development Provides capabilities to manage the software development process in projects including enhancement requests, defect prioritization, definition of release content, andtasks. Asset Management Provides capabilities to track and manage the physical, contractual, and financial aspects ofassets. Audit Management Provides a centralized process for Internal Audit teams to automatethe complete audit lifecycle by providing the capability to plan, scope and execute integrated, risk -based audit plans. Change Management Allows repeatable methods and procedures to be used for introducing change into the IT infrastructure by providing capabilities for creating, assessing, approving, and executing changes. Client Software Distribution Allows administrators to distribute software from the service catalog using third party management systems. Requires Orchestration Core. Cloud Management Provides the capability to automate the provisioning and management lifecycle of public and private virtual servers. Requires Orchestration Core. Configuration Automation Provides the capability to manage the configuration settings of a physical or virtual server. Requires Orchestration Core. I Cost Management Provides capabilities to track one-time and recurring costs of configuration items used by IT and allocate those costs to business units using allocation rules. Cost Transparency Provides insight for executives seeking to align spending to business goals. Users can classify general ledger records, define reporting structures and allocation rules, and view summaryreports. Customer Service Includes the following key features: Omni —channel customer engagement Management across portal, chat, email, and phone (native telephony integration requires Notify); a robust customer data model for accounts, partners, and contacts; case management with advanced skills -based routing, real-time service level agreement (SLA), service contracts and service entitlements; pre -packaged service analytics using both real-time data as well as snapshots fortrend analysis (trend analytics requires Performance Analytics use rights); and voice of customer feedback through online surveys and customer satisfaction reporting_ J ) , , a ,y I'J, I I , I I r,,Ilf .It ", h ,,fd, I m11 "'I".I.w r,d. . tlNm , .II"i!lOA ^dw',f ,.o v11 JWN a $�AC;n Agreement NO 7434 service o, ServiceNow Product Overview Effective Date: May 2, 2016 Demand Management Consolidates IT requests through a service catalog and routes them in a workflow to stakeholders who gather additional information to prioritize investment decisions. Discovery _W ...... ..._ Locates physical and virtual devices connected to an enterprise network. When Discovery locates a device, it explores its configuration, status, software, and relationships to other connected devices, and updates the Configuration Management Data Base (CMDB). Edge Encryption Resides on Customer -owned servers and encrypts and decrypts eligible data stored in their instance. Customer controls and manages the encryption keys for the eligible data in their instance. Enterprise Service Portal - HR In support of HR service delivery, provides employee self-service via an HR service catalog and provides HR the capability to assign tasks to employees. Uses prebuilt layouts, controls, and content. Requires HRService Management. Event Management Aggregates events from monitoring tools used by Customer in its infrastructure, de -duplicates and correlates inputs from such events to CMDB, and provides the ability to filter and prioritize events to create incidents for remediation. Facilities Service Management ... .............. .......... ...................... _. ......... ...... Provides capabilities to manage the service delivery of a facilities department by offering a self-service catalog and assignment of requests based on fulfillment rules. Field Service Management g Provides capabilities to create work order records for the repair P rand service of equipment. Requires Asset Management. ...-..... .__ Financial Planning .......................... ............ .......... Assists executives and budget owners in the automation of budget and forecast planning, helping to increase efficiency and simplify theplanning process. Finance Service Management Enables the finance department to define its services and fulfill requests through workflow capabilities and knowledge management, and provides visibility into resource utilization and service delivery performance through dashboards. HR Service Management g Provides capabilities to p manage HR service delivery using casemanagement to document the interactions between the employee and HR supported by the knowledge base. ..... Incident Management .. __ ._........._ ....... ..... Facilitates the process of restoring normal IT operations by providing capabilities to record, classify, distribute, and manage incidents through to resolution. Includes Performance Analytics limited to 15 key performance indicators (KPIs), one dashboard and 90 days of data captured by Incident Management. .-..... Legal Service Management ........ _._..................... ............. _._ .............� Enables the legal department to define its services and fulfill requests through workflow capabilities and knowledge management, and provides visibility into resource utilization and service delivery performance through dashboards. �_ ._ Marketing Service Enables the marketing department to define its services and fulfill requests Agreement No. 7434 s rvic r ServiceNow Product Overview Effective Date: May 2, 2016 Management through workflow capabilities g p and knowledge management, and provides visibility into resource utilization and service delivery performance through dashboards. _._ Notify _.. ..... ............. Provides the capability to initiate notification from Customer's instance of the subscription service to a supported third -party platform for SMS, voice and other communications protocols. Customer is required to separately purchase any third -party service required to work with Notify. .......... .......... Orchestration Core .... _.... Enables orchestration of activities outside Customer's instance of the subscription service. Allows Customer to automate discrete tasks or processes using graphical workflows that interact with external systems or services. Password Reset Provides the capability to reset User's passwords that are stored and pre - authenticated in a credential store outside Customer's instance of the subscription service, such as Active Directory and other supported credential stores. Requires Orchestration Core. Performance Analytics Provides advanced analytics and time series analysis for KPIs. Platform Runtime Allows customer to deploy applications developed on the ServiceNow Platform into production. PolicyCompliance and Com p a centralized process for creating and managing policies, standards, Management and internal control procedures that are cross -mapped to external regulations and best practices. Additionally, the application provides structured workflows for the identification, assessment, and continuous monitoringof control activities. Problem Management Facilitates the process of identifying the root causes of errors in the IT infrastructure by providing capabilities to record, escalate, and manage problems through to resolution. ................................ Project Portfolio Management Provides capabilities to plan, organize, and manage projects and project portfolios including associated tasks and resources. ........ Release Management ... Facilitates the planning, design, build, configuration, testing, and release of hardware and software into the IT infrastructure. _ ........ _. Request Management ........ Provides capabilities to approve and fulfill requests for goods and services defined and presented in the service catalog. Resource Management Provides a view of projects and the availability, allocation, and capacity of assigned resources. _ ............ ................... _...._.... ...... Risk Management Provides an executive view into risk to allow risk managers to quickly identify at -risk assets, perform assessments, and continuously monitor risk exposure. ......... ....... ......... .-.�... Security Incident Response _................... Enables SOC/SIRT teams to enact response plans to address security -related activities, events or incidents. Enables response team collaboration, investigation of network and non -network related activities (i.e. intellectual property theft, criminal activities, etc.) and includes the capability for automated request assignment and remediation across IT and security teams. Agreement No. 7434 services 1, ServiceNow Product Overview Effective Date: May 2, 2016 Service Mapping Discovers business services of the organization and builds a comprehensive map of all devices, applications, and configuration profiles used inthese business services. Test Management Provides a user acceptance testing framework to help project teams and business users align on project deliverables, and provides visibility into the status of the project testing when used in conjunction with Project Portfolio Management and Agile Development. Project Portfolio Managementand Agile Development are separately authorized. Threat Intelligence Provides the ability to support multiple threat intelligence feeds to enhance the context of a security incident by enabling analysts to see potential threats and related systems in an integrated view. Threat Intelligence also allows Customers to add their own custom feeds and to place confidence scores or weighting on each feed to accelerate the identification of legitimate security issues. Vendor Performance Enables Customerto manage, evaluate and comparevendors based on Management predefined criteria. Vulnerability Response Integrates with the National Vulnerability Database (NVD) and third -party solutions to generate a set of actionable reports of vulnerable assets inthe Customer environment. Incident response tasks, change requests or problem tickets can easily be opened from vulnerabilities to allow security teamsto perform further investigation or to allow IT to perform remediation. Business Service Maps Graphically displays the configuration items related to a business service, and indicates the status of those configuration items. Chat Provides real-time communication capability via instant messaging between Users. Coaching Loops Provides the capability to monitor and provide feedback on a specific behavior of an individual or group. Configuration Management Provides capabilities to identify, record, and report on ITconfiguration items (CMDB) and their relationships. Connect Provides the capability to connect people, processes and information into a unique and centralized collaboration workspace to cut down on resolution times. Features include real-time chat, document delivery, active lists to see who is working and the ability to interact straight from the activity stream. ............ ............ Content ManagementSystem . �... _........ W Provides the ability to create custom interfaces. Form Designer Allows creation of forms and tables with visual controls. Agreement No. 7434 ServiceNow Product Overview Effective Date: May 2, 2016 g p mmITITITITITmmmm Google Maps y make Google Maps available for use with the subscription ServiceNow may service. If Customer uses Google Maps, Customer agrees to the following terms: (i) Customer shall limit its use to 60,000 map views on an annual basis and additional use shall be purchased from Google subject to Google's terms and conditions, to which ServiceNow is not a party; (ii) Customer agrees, and shall cause its end users to agree, to Google's Maps Terms (http:/ImaDs.gooEle.com help/'terms, m s� h�tml or a successor URL as provided by Google), the Legal Notices (http:/jwww.rn n oo e.corn helpjlegqdI or asuccessor URL as provided by Google), and the Acceptable Use Policy (htt , www. oo le.cor enter rise earthma site al/us/maps AUP.htrni or a successor URL as provided by Google); and (iii) Customer agrees that Google may use Customer data in accordance with its privacy policy and that Google may provide its maps services to Customer. Google Maps may not be available to Customer due to location availability and• may not be available during Customer's entire subscription term. ServiceNow support and warranty do not apply to Google Maps. ._...._............... .......... _ Graphical Workflow Provides the capability to automate multi -step processes within Customer's instance of the subscription service. Each workflow can manage a sequence of activities, such as creating records or running scripts, and the condition -based transitions between them. Customer is required to purchase Orchestration Core to orchestrate activities using the Graphical Workflow that interact outside Customer's instance of the subscription service. .. ...... .............. Knowledge Management Provides role -based tools to create, store, and publish information. Provides mechanisms for version control and approvals of documents in the - reviewprocess. Live Feed Li Provides a place to post and sharecontent. ........... . .................. Mobile Provides a customizable ServiceNow interface for mobile devices. On -Call Scheduling Enables creation of on -call schedules and escalation rosters. _. ..... ...... _ OpenFrame ..... An interface technology that enables real-time communication channels such as telephone systems to be integrated into the ServiceNow Platform. OpenFrame consists of UI elements as well as a set of APIs thatsupport exchange of events and data between ServiceNow and the communications system. ...... ................ Reporting _................................. Provides the capability to create and share reports and dashboards. RESTAPI Provides the ability to integrate external systems through REST APIs using standard respond codes, header information, pagination support and streaming data on requests. to Service Catalog _ Displays a listing of the goods and services that Customer provides within g the enterprise to its employees and contractors. Service Creator Provides capabilities for building no -code service catalog items. Agreement NO. 74.34 serviceno, ServiceNow Product Overview Effective Date: May 2, 2016 Service Level Management _. ................. Establishes and monitors status of service contracts and SLAs between the organization and its customers or third -party service providers. Service Portal Designer g Provides the capability to build portals with a consumer -like experience usi P tY P P ng both ServiceNow out -of -the -box widgets and templates as well as Customer's own widgets and styles, while leveraging only HTML and CSS. Skills Management Assigns configured competencies to groups or users. __ Studio _.. ...... Integrated Development Environment (IDE) for professional and low -code (i.e., IT administration) application developers. .......�...... Survey Management _..... Allows for polling and collection of data, including configuration for specific events and/or conditions. .._... Time Cards ...___ .�._ ........ Records time worked on tasks either manually or automatically. ... _._ _ Visual Task Boards .......M . Enables a Kanban-style workspace for either individual orteam-based management of tasks. Visualizations Displays interactive 2-D and 3-D visual representations p for any logical data relationships within an instance. Agreement No. 7434 J 1 V SERVICENow EXPRESS GENERAL TERMS AND CONDITIONS GENERAL TERMS AND CONDITIONS These General Terms and Conditions and any referenced documents form the agreement (the "Agreement') under which an Order Form is executed. PROVISION OF SERVICES ServiceNow will make the following purchased services available to Customer, subject to the terms and conditions of the Agreement and each ordering document signed by Customer and ServiceNow (each, an "Order Form") and the product overview attached thereto or referenced therein ("Product Overview'), including without limitation: (a) use of the ServiceNow applications which are made available by ServiceNow as a software as a service (SaaS) ("Subscription Service"); and (b) professional services and training services ("Professional Services"). An Order Form for Professional Services shall specify ServiceNow packaged professional services (each offering, a "Packaged Service"), as described in one or more service descriptions (if not attached to the Order Form, then as set forth on "w,servicenow„coma be sohedu'I"es. o) ("Service Description") or other Professional Services described in one or more written statements of work ("SOW') signed by ServiceNow and Customer. 2. ORDERING 2.1 ORDERS AND -PAYMENT. Upon execution by Customer and ServiceNow, each Order Form is non - cancellable and non-refundable except as provided in the Agreement. Prices stated in each Order Form are final. Except as expressly set forth in the applicable Order Form, Subscription Service fees are invoiced annually in advance. Each Subscription Term (as defined in Section 3.1) as set forth in the Order Form is a continuous and non -divisible commitment for the full duration of the Subscription Term regardless of the invoice schedule. Except as expressly set forth in the applicable Order Form or SOW or Service Description, Professional Services fees are invoiced on a time and materials basis monthly in arrears. Customer shall pay each invoice in full within thirty (30) days after the date of invoice. Customer may issue a purchase order consistent with the terms of the Order Form, but a purchase order is not required. If Customer issues a purchase order, then it shall be for the full amount of the Order Form, and any additional or conflicting terms appearing in a purchase order shall not amend the Order Form or the Agreement. Upon request, ServiceNow shall reference the purchase order number on its invoices (solely for administrative convenience) so long as Customer provides the purchase order at least fifteen (15) business days prior to the date of the invoice. Late payments shall accrue interest at a rate of one and one-half percent (1.5%) per month or the legal maximum interest rate, whichever is lower. If Customer is delinquent in payment of amounts for the services owed hereunder, ServiceNow may give notice to Customer of such delinquency and, in such case, Customer shall cure the delinquency within thirty (30) days from the date of ServiceNow's written notice. If Customer fails to cure the delinquency, ServiceNow may suspend Customer's use of the Subscription Service or terminate the Agreement for cause in accordance with Section 7 (Term and Termination), in addition to other rights and remedies available. 2.2 TAXES. All payments required by the Agreement are stated exclusive of all taxes, duties, levies, imposts, fines or similar governmental assessments including sales and use taxes, value-added taxes ("VAT'), goods and services taxes ("GST'), excise, business, service, and similar transactional taxes imposed by any jurisdiction and the interest and penalties thereon (collectively, "Taxes"). Customer shall be responsible for and bear Taxes associated with its purchase of, payment for, access to or use of the Subscription Service and Professional Services. Taxes shall not be deducted from the payments to ServiceNow, except as required by law, in which case Customer shall increase the amount payable as necessary so that after making all required deductions and withholdings, ServiceNow receives and retains (free from any Tax liability) an amount equal to the amount it would have received had no such deductions or withholdings been made. Each party is responsible for and shall bear taxes imposed on its net income. If Customer is a tax-exempt entity or claims exemption from any Taxes under the Agreement, Customer shall provide a tax exemption number on the Order Form and a certificate upon execution of the Order Form and, after receipt of valid evidence of exemption, ServiceNow shall not charge Customer any Taxes from which it is exempt. If ServiceNow is required to invoice or collect Taxes associated with Customer's purchase of, payment for, access to or use of the Subscription Service or Professional Services, ServiceNow will issue an invoice to Customer including the amount of those Taxes, itemized where required by law. Customer shall provide to ServiceNow its VAT or GST identification number(s) on the Order Form for (i) the country where Customer has established its business and/or (ii) any other country where Customer has a fixed establishment. Customer shall use the ordered Subscription Service and Professional Services for Customer's business use in the foregoing location(s) in accordance with the provided VAT or GST identification number(s). The parties' obligations under this Section shall survive the termination or expiration of the Agreement. SERVICENOw PROPR ETARY AND CONFIDENTIAL Page 1 (version 10/21//2014) Agreement No. 7434 serviceno, w- SERVICENOw EXPRESS GENERAL TERMS AND CONDITIONS 2.3 USE VERIFICATION. Customer may not use or otherwise access the Subscription Service in a manner that exceeds Customer's authorized use. ServiceNow may review Customer's use of the Subscription Service, and Customer shall provide any reasonable assistance to verify Customer's compliance with the Agreement. If ServiceNow determines that Customer has exceeded Its permitted use of the Subscription Service then ServiceNow will notify Customer and within thirty (30) days thereafter Customer shall either: (i) disable any unpermitted use or (ii) purchase additional subscriptions. If Customer fails to regain compliance within such thirty (30) day period, ServiceNow may suspend Customer's use of the Subscription Service or terminate the Agreement for cause in accordance with Section 7 (Term and Termination), in additionto any other rights or remedies ServiceNow may have. 3. GRANT OF USE RIGHTS; OWNERSHIP; CUSTOMER RESTRICTIONS 3.1. t1�CRIPTIOI4_ SEC , Customer is authorized to use the Subscription Service limited by the purchased amount and subscription term ("Subscription Term") on the Order Form and the Product. Overview. 3.2. DOCUMENTATION. ServiceNow grants to Customer a non-exclusive, non -transferable, worldwide right during the Subscription Term to access and use the documentation relating to the operation and use of the Subscription Service that is provided by ServiceNow to Customer under the Agreement, as updated by ServiceNow from time to time ("Documentation"). 3.3. _CUSTOMER DATA, Customer grants ServiceNow a non-exclusive, non -transferable, worldwide right to use the electronic data pertaining to Customer and/or its users that is processed using the Subscription Service (collectively "Customer Data") strictly for the limited purpose of providing the Subscription Service to Customer. 3.4. SOFTWARE. ServiceNow may provide ServiceNow software products ("Software') for use in connection with the Subscription Service. Any Software is licensed and not sold (even if for convenience ServiceNow makes reference to words such as "sale" or "purchase"). ServiceNow grants Customer a limited, personal, worldwide, non-sublicensable, non- transferable, non-exclusive license to install and execute the Software on machines operated by or for Customer solely to permit Customer to use the Subscription Service during the Subscription Term in accordance with the terms and conditions of the Agreement. The Software may include code that is licensed under third party license agreements, including open source made available or provided with the Software. 3.5. OWNERSHIP. As between ServiceNow and Customer, all rights, title, and interest in and to all intellectual property rights in the Subscription Service, Software and/or Documentation are owned exclusively by ServiceNow. Except as expressly provided in the Agreement, ServiceNow does not grant Customer (and expressly reserves) any rights, express or implied, or ownership in the Subscription Service, Software and'/or Documentation. ServiceNow shall have a royalty -free, worldwide, non-exclusive, transferable, sub -licensable, irrevocable, perpetual right to make, use, sell, offer for sale, import, or otherwise incorporate into the Subscription Service, Software and/or Documentation, any suggestions, enhancements, recommendations or other feedback provided by Customer relating to the Subscription Service, Software and/or Documentation. 3.6. RESTRICT"NOBS. Customer shall not (and shall not permit others to) do the following with respect to the Subscription Service Software or Documentation: (i) license, sub -license, sell, re -sell, rent, lease, transfer, distribute or time share or otherwise make any of them available for access by third' parties; (ii) disassemble, reverse engineer, decompille or modify them or otherwise create derivative works thereof; (iii) access them for the purpose of developing products or services that compete with the Subscription Service; (iv) use them to operate more or different type of applications or platform not authorized under the Agreement; (v) use them to create, use, send, store or run viruses or other harmful computer code, files, scripts, agents or other programs or engage in any other malicious act; (vi) disrupt their security, integrity or operation; (vii) remove or modify a copyright or other proprietary rights notice in them; (viii) use them to reproduce, distribute, display, transmit or use material protected by copyright or other intellectual property right (including the rights of publicity or privacy) withoutfirst obtaining the permission of the owner; (ix) use them to damage the property of another; (x) use them in any manner which violates any law or regulation of the United States, any state thereof or other government authority; (xi) use them in any manner that disables, hacks or otherwise interferes with any security, digital signing, digital rights management, verification or authentication mechanisms or (xii) use them in a manner that temporarily or permanently alters, erases, removes, copies, modifies, halts or disables any ServiceNow or third party data, software or network. 4. WARRANTIES 4.1. tmIMITED SUBSCRIPTION SERVICE WARRANTY. ServiceNow warrants that during the Subscription Term Customer's production instances of the Subscription Service shall materially conform to the Product Overview. To submit a warranty claim under this Section, Customer shall (1) reference this Section; and (2) submit a support request to resolve the non -conformity as provided in the Subscription Service Guide, which is set forth on www.servicenow.com/be_schedules.do. If the non -conformity persists without relief more than thirty (30) days after written notice of a warranty claim provided to SERVICENOw PROPR ETARY AND CONFIDENTIAL Page 2 (version 10/21//2014) Agreement No. 7434 servicenow- SERVICENOw EXPRESS GENERAL TERMS AND CONDITIONS ServiceNow under this Section 4.1, then Customer may terminate the affected Subscription Service and ServiceNow shall refund to Customer any prepaid subscription fees covering the remainder of the Subscription Term of the affected Subscription Service after the date of termination. Notwithstanding the foregoing, this warranty shall not apply to any non -conformity due to a modification of or defect in the Subscription Service that is made or caused by any person other than ServiceNow or a person acting at ServiceNow's direction. THIS SECTION 4.1 SETS FORTH CUSTOMER'S EXCLUSIVE RIGHTS AND REMEDIES (AND SERVICENOW'S SOLE LIABILITY) IN CONNECTION WITH THISWARRANTY. 4.2. LIMITED PROFESSIONAL SERVICES WARRANTY. ServiceNow warrants that the Professional Services will be performed in a competent and workmanlike manner in accordance with accepted industry standards and practices and all material requirements set forth in the SOW or Service Description. Customer shall notify ServiceNow in writing of any breach within thirty (30) days after performance of the non -conforming Professional Services. Upon receipt of such notice, ServiceNow, at its option, shall either use commercially reasonable efforts to re -perform the Professional Services in conformance with these warranty requirements or shall terminate the affected Professional Services and refund to Customer any amounts paid for the nonconforming Professional Services. THIS SECTION 4.2 SETS FORTH CUSTOMER'S EXCLUSIVE RIGHTS AND REMEDIES (AND SERVICENOW'S SOLE LIABILITY) IN CONNECTION WITH THIS WARRANTY. 4.3. DISCLAIMER OF WARRANTIES. EXCEPT FOR THE WARRANTIES EXPRESSLY STATED IN THE AGREEMENT, TO THE MAXIMUM EXTENT ALLOWED BY LAW, SERVICENOW DISCLAIMS ALL WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, ORAL OR WRITTEN, INCLUDING WARRANTIES ARISING UNDER STATUTE, WARRANTIES OF MERCHANTABILITY, ACCURACY, TITLE, NON -INFRINGEMENT OR FITNESS FOR A PARTICULAR PURPOSE OR ANY WARRANTIES ARISING FROM USAGE OF TRADE, COURSE OF DEALING OR COURSE OF PERFORMANCE. WITHOUT LIMITING THE GENERALITY OF THE FOREGOING, SERVICENOW SPECIFICALLY DOES NOT WARRANT THAT THE SUBSCRIPTION SERVICE, SOFTWARE, PROFESSIONAL SERVICES OR DOCUMENTATION WILL MEET THE REQUIREMENTS OF CUSTOMER OR OTHERS OR THAT THEY WILL BE ACCURATE OR OPERATE WITHOUT INTERRUPTION OR ERROR. CUSTOMER ACKNOWLEDGES THAT IN ENTERING THE AGREEMENT IT HAS NOT RELIED ON ANY PROMISE, WARRANTY OR REPRESENTATION NOT EXPRESSLY SET FORTH HEREIN. 5. CONFIDENTIALITY AND NON-USE RESTRICTIONS 5.1. CONFIDENTIAL INFORMATION. "Confidential Information" means all information disclosed by a party ("Disclosing Party") to the other party ("Receiving Party'), whether orally or in writing, that is designated as confidential or that reasonably should be understood to be confidential given the nature of the information and the circumstances of the disclosure, including without limitation: each party's respective business plans and processes; financial and employee data; proprietary technology and product information and designs; the Subscription Service and Software and Customer Data. The terms of the Agreement and Order form(s) are Confidential Information of ServiceNow. Confidential Information excludes information that: (i) is or becomes generally known to the public; (ii) was known to the Receiving Party prior to its disclosure by the Disclosing Party without breach of any obligation to the Disclosing Party; (iii) is received from a third party without any obligation of confidentiality to a third party or breach of any obligation of confidentiality to the Disclosing Party; or (iv) was independently developed by the Receiving Party without reference to the Disclosing Party's Confidential Information. 5.2. PROTECTION. The Receiving Party shall: (i) at all times protect the confidentiality of the Disclosing Party's Confidential Information with the same degree of care that it uses to protect its own confidential information, and in no event using less than reasonable care; and (ii) not use Confidential Information of the Disclosing Party except to the extent necessary to exercise its rights or fulfill its obligations under the Agreement. To the extent necessary under the Agreement, the Receiving Party may disclose the Confidential Information of the Disclosing Party to the Receiving Party's employees or contractors who are bound by written obligations of confidentiality and non-use and non -disclosure restrictions at least as protective as those set forth herein. In the event of a court order or government regulation compelling disclosure of any Confidential Information, the Receiving Party shall provide the Disclosing Party with prompt written notice thereof, and shall reasonably cooperate with the Disclosing Party to seek confidential or other protective treatment. Each party's obligations set forth in this Section 5 shall remain in effect during the term and three (3) years after termination of the Agreement. The Receiving Party shall promptly return to the Disclosing Party or destroy (with certification of such destruction provided by the Receiving Party upon request) all Confidential Information of the Disclosing Party in its possession or control upon request from the Disclosing Party. Provisions for the return of Customer Data are set forth in Section 7.3 (Return of Customer Data). 6. LIMITATIONS OF LIABILITY AND DAMAGES 6.1. LIMITATIONS OF LIABILITY. TO THE EXTENT PERMITTED BY LAW, THE TOTAL, CUMULATIVE LIABILITY OF EACH PARTY ARISING OUT OF OR RELATED TO The AGREEMENT OR THE SERVICES PROVIDED HEREUNDER, WHETHER BASED ON CONTRACT, IN TORT OR ANY OTHER LEGAL OR EQUITABLE THEORY, SHALL BE LIMITED TO THE AMOUNTS PAID BY CUSTOMER FOR THE SERVICE GIVING RISE TO THE CLAIM DURING THE SERVICENOw PROPR ETARY AND CONFIDENTIAL Page 3 (version 10/21//2014) Agreement No. 7434 r v" SERVICENOw EXPRESS GENERAL TERMS AND CONDITIONS TWELVE (12) MONTH PERIOD PRECEDING THE FIRST EVENT GIVING RISE TO LIABILITY. THE EXISTENCE OF MORE THAN ONE CLAIM SHALL NOT ENLARGE THIS LIMIT. THE FOREGOING LIMITATION OF LIABILITY SHALL NOT APPLY TO: (1) BODILY INJURY OR DEATH; (2) INFRINGEMENT BY A PARTY OF THE OTHER PARTY'S INTELLECTUAL PROPERTY RIGHTS; AND (3) CUSTOMER'S OBLIGATION TO PAY AMOUNTS OWED FOR SERVICES PROVIDED HEREUNDER. 6.2. EXCLUSION OF DAMAGES. TO THE EXTENT PERMITTED BY LAW, NEITHER SERVICENOW NOR CUSTOMER SHALL BE LIABLE TO THE OTHER OR ANY THIRD PARTY FOR LOST PROFITS (WHETHER DIRECT OR INDIRECT) OR LOSS OF USE OR DATA, COVER, SUBSTITUTE GOODS OR SERVICES, OR FOR INCIDENTAL, CONSEQUENTIAL, PUNITIVE, SPECIAL OR EXEMPLARY DAMAGES (INCLUDING DAMAGE TO BUSINESS, REPUTATION OR GOODWILL), OR INDIRECT DAMAGES OF ANY TYPE HOWEVER CAUSED, WHETHER BY BREACH OF WARRANTY, BREACH OF CONTRACT, IN TORT OR ANY OTHER LEGAL OR EQUITABLE CAUSE OF ACTION EVEN IF SUCH PARTY HAS BEEN ADVISED OF SUCH DAMAGES IN ADVANCE OR IF SUCH DAMAGES WERE FORESEEABLE. THE FOREGOING EXCLUSIONS SHALL NOT APPLY TO: (1) BODILY INJURY OR DEATH; AND (2) INFRINGEMENT BY A PARTY OF THE OTHER PARTY'S INTELLECTUAL PROPERTY RIGHTS. TERM AND TERMINATION 7.1. TERM AND TERMINATION. The Agreement continues until terminated in accordance with its terms. Each party may terminate the Agreement in its entirety either: (i) upon thirty (30) days' prior written notice to the other party, if at the time such notice is served there are no Order Forms in effect; or (ii) upon written notice if the other party becomes the subject of a petition in bankruptcy or any proceeding related to its insolvency, receivership or liquidation, in any jurisdiction, that is not dismissed within sixty (60) days of its commencement or an assignment for the benefit of creditors. Either party may terminate a Subscription Service or Professional Services effective immediately upon written notice if the other party materially breaches a material obligation under the Agreement or the applicable Order Form for the affected service and does not cure the breach within thirty (30) days after receiving written notice thereof from the non -breaching party. Professional Services are separately ordered from the Subscription Service, and are not required for the Subscription Service. A breach by a party of its obligations with respect to Professional Services shall not by itself constitute a breach by that party of its obligations with respect to the Subscription Service even if the services are enumerated in the same Order Form. 7.2. EFFECT OF TERMINATION OF SERVICE,. Upon expiration or other termination of the Subscription Service for any reason, Customer shall stop using, and ServiceNow shall stop providing, the terminated Subscription Service. (a) If the Subscription Service is terminated by Customer due to ServiceNow's breach, then ServiceNow shall refund to Customer, within thirty (30) days after the effective date of termination, all prepaid fees for the remaining portion of the Subscription Term for the terminated Subscription Service after the effective date of termination. (b) If Professional Service is terminated by Customer due to ServiceNow's breach, then ServiceNow shall refund to Customer, within thirty (30) days after the effective date of termination, any prepaid amounts for unperformed Professional Service. (c) If the Subscription Service is terminated by ServiceNow due to Customer's breach, then Customer shall pay to ServiceNow, within thirty (30) days after the effective date of termination, fees for the terminated Subscription Service that would have been payable for the remainder of the Subscription Term after the effective date of termination. (d) Upon expiration or other termination of the Subscription Service for any reason, Customer shall be eligible to request the return of Customer Data in accordance with Section 7.3 (Return of Customer Data). 7.3. RETURN OF CUSTOMER DATA. Following the end of the Subscription Term, where Customer has not renewed, Customer shall have forty-five (45) days to request a copy of the Customer Data from ServiceNow; and, if requested, ServiceNow shall use commercially reasonable efforts to provide a copy of that data within fifteen (15) days in a mutually agreed upon, commercially standard format at no cost to Customer unless ServiceNow determines in its reasonable discretion that the data output is not routine, in which case the parties shall mutually agree on a statement of work for professional services. After such forty-five (45) day period, ServiceNow shall have no obligation to maintain or provide any Customer Data and shall thereafter, unless legally prohibited, have the right to delete all Customer Data in its systems or otherwise in its possession or under its control and delete Customer's instances of the Subscription Service. 7.4. SURVIVAL. Upon termination of the Agreement for any reason, Customer shall pay all amounts owed hereunder. Sections 3.5 (Ownership), 3.6 (Restrictions), and 5 (Confidentiality and Non -Use Restrictions) through 8 (General Provisions) of these General Terms and Conditions, together with any other provision required for their construction or enforcement, shall survive termination of the Agreement for any reason. 8. GENERAL PROVISIONS 8.1. ASSIGNMENT. Neither party may assign its rights or obligations, whether by operation of law or otherwise, without the prior written consent of the other party. Notwithstanding the foregoing, either party may, upon notice and without the other party's consent: (i) in connection with a merger, reorganization or sale of all or substantially all of the assets or equity SERVICENow PROPR ETARY AND CONFIDENTIAL Page 4 (version 10/21//2014) Agreement No. 7434 servicenow, SERVICENOw EXPRESS GENERAL TERMS AND CONDITIONS of such party, assign the Agreement in its entirety to such party's successor; and (ii) assign the Agreement in its entirety to any company, partnership or other legal entity which from time to time directly or indirectly controls, is controlled by or is under the common control with such party. Any attempted or purported assignment in violation of this Section 8.1 will be null and void. Subject to the foregoing, the Agreement shall bind and inure to the benefit of the parties, their respective successors and permitted assigns. 8.2. NOTICE. Except as otherwise provided herein, all notices shall be in writing and deemed given upon: (i) personal delivery; (ii) when received by the addressee if sent by a nationally recognized overnight courier (receipt requested); (iii) the second business day after mailing; or (iv) the first business day after sending by email, except that email shall not be sufficient for notices regarding a Claim. Notices shall be sent to the parties as set forth on the Order Form or as otherwise agreed to by the parties in writing. 8.3. EXPORT CQMPI-IhANCE. Each party shall comply with United States and foreign export control laws and regulations. Customer acknowledges that the Subscription Service, Professional Services, Software and Documentation are subject to the U.S. Export Administration Regulations (the "EAR') and that Customer shall comply with the EAR. Without limiting the foregoing, Customer represents and warrants that: (i) Customer is not located in, and shall not use the Subscription Service, Professional Services, Software and Documentation from, any country that is subject to U.S. export restrictions (currently including, but not necessarily limited to, Cuba, Iran, North Korea, Sudan and Syria); (ii) Customer shall not use the Subscription Service, Professional Services, Software and Documentation in the design, development or production of nuclear, chemical or biological weapons, or rocket systems, space launch vehicles, sounding rockets or unmanned air vehicle systems; and (iii) Customer is not prohibited from participating in the U.S. export transactions by any federal agency of the U.S. government. In addition, Customer is responsible for complying with any local laws which may impact Customer's right to import, export or use the Subscription Service, Professional Services, Software and Documentation. 8.4. FORCE MAJEURE. No party shall be liable or responsible to the other party, nor be deemed to have defaulted under or breached the Agreement, for any failure or delay in fulfilling or performing any term of the Agreement, when and to the extent such failure or delay is caused by or results from acts beyond the affected party's reasonable control, including without limitation: strikes, lock -outs or other industrial disputes (whether involving its own workforce or a third party's), trespassing, sabotage, theft or other criminal acts, failure of energy sources or transport network, acts of God, war, terrorism, riot, civil commotion, interference by civil or military authorities, national or international calamity, armed conflict, malicious damage, breakdown of plant or machinery, nuclear, chemical or biological contamination, explosions, collapse of building structures, fires, floods, storms, earthquakes, epidemics or similar events, natural disasters or extreme adverse weather conditions (each a "Force Majeure Event'). The party suffering a Force Majeure Event shall use reasonable efforts to mitigate against the effects of such Force Majeure Event. 8.5. US GOVERNMENT RIGHTS. All ServiceNow software is commercial computer software and all services are commercial items. "Commercial computer software" has the meaning set forth in Federal Acquisition Regulation ("FAR') 2.101 for civilian agency purchases and the Department of Defense ("DOD") FAR Supplement ("DFARS') 252.227-7014(a)(1) for defense agency purchases. If the software is licensed or the services are acquired by or on behalf of a civilian agency, ServiceNow provides the commercial computer software and/or commercial computer software documentation and other technical data subject to the terms of the Agreement as required in FAR 12.212 (Computer Software) and FAR 12.211 (Technical Data) and their successors. If the software is licensed or the services are acquired by or on behalf of any agency within the DOD, ServiceNow provides the commercial computer software and/or commercial computer software documentation and other technical data subject to the terms of the Agreement as specified in DFARS 227.7202-3 and its successors. Only if this is a DOD prime contract or DOD subcontract, the Government acquires additional rights in technical data as set forth in DFARS 252.227-7015. This U.S. Government Rights clause is in lieu of, and supersedes, any other FAR, DFARS or other clause or provision that addresses Government rights in computer software or technical data. 8.6. ENTIRETY. Customer acknowledges that it has not relied on any statement, promise or representation made or given by or on behalf of ServiceNow which is not set out in the Agreement. Customer's order is not contingent on, and Customer has not relied on, the delivery of any future functionality regardless of any verbal or written communication about ServiceNow's future plans. The Agreement supersedes all prior or contemporaneous oral or written agreement, representations and negotiations, including, but not limited to, any terms contained in Customer's purchase order. 8.7. WAIVER ANC) AMENDMENT. A waiver of any right is only effective if it is in writing and only against the party who signed such writing and for the circumstances given. Any modification of the Agreement, an Order Form, the Product Overview, the Subscription Service Guide, a SOW or a Service Description must be in writing and signed by authorized representatives of both parties. 8.8. RELATIONaHIP OF THE PARTIES. The parties are independent contractors. Nothing in the Agreement shall be construed to create a partnership, joint venture or agency relationship. Neither party shall have any right or authority SERVICENOw PROPR ETARY AND CONFIDENTIAL Page 5 (version 10/21//2014) Agreement No. 7434 SERVICENow EXPRESS GENERAL TERMS AND CONDITIONS to assume or create any obligation of any kind expressed or implied in the name of or on behalf of the other party. ServiceNow may at any time subcontract or delegate in any manner any or all of its obligations under the Agreement to any third party or agent. 8.9. GGVEBNIN LAW- VENLII TIME E OR BRfINGING ACTION. The Agreement shall be governed by, subject to, and interpreted in accordance with the laws of the state of California, United States of America, if Customer is located in Canada, United States or Mexico, and the laws of England if Customer is located elsewhere. If Customer is located in Canada, United State or Mexico, the parties hereby irrevocably consent to the nonexclusive jurisdiction of, and venue in, any federal or state court of competent jurisdiction located in San Diego, California, or New York, New York, for the purposes of adjudicating any action or proceeding to enforce the terms of the Agreement. If Customer is located elsewhere, then any dispute arising under the Agreement shall be finally settled by binding arbitration in London, England.. Such arbitration shall be conducted in English in accordance with the rules of the International Chamber of Commerce by one (1) arbitrator appointed in accordance with such rules. The arbitrator shall allow such discovery as is appropriate in accomplishing a fair, speedy, and cost-effective resolution of the dispute, and shall be expressly empowered to issue appropriate injunctive. relief. The award of arbitration shall be final and binding upon bath, parties, and judgment on the award rendered by the arbitrator may be entered in any court having jurisdiction thereof. Any monetary award shall be payable in United States dollars. To the extent permitted by law, choice of law rules and the United Nations Convention on Contracts for the I'nternationati Sate of Goods shall not apply. No cause of action arising hereunder or relating hereto may be brought more than one (1) year after it first accrues. The prevailing party in an action to enforce the Agreement shall be entitled to costs of bringing the claim and reasonable attorneys' and experts' fees and expenses. Notwithstanding the foregoing, either party may at any time seek and obtain appropriate legal or equitable relief in any court of competent jurisdiction for claims regarding such party's intellectual propertyrights. 8.10. CONSTRUCTION. The Subscription Service and Professional Services shall be provided in the English language unless agreed otherwise. The parties confirm that they have requested that the Agreement and all related documents be drafted in English at the express wishes of the parties. Les parties ont exige que le present contrat et ServiceNow Ies documents connexes soient rediges en anglais selon la volonte expresse des parties. Capitalized terms not defined herein shall have the meaning set forth or referenced in the Subscription Service Guide. Section headings are for convenience only and are not to be used in interpreting the Agreement. SERVICENow PROPR ETARY AND CONFIDENTIAL Page 6 (version 10/21//2014) Agreement No. 7434 v � , SERVICENOw EXPRESS SUBSCRIPTION SERVICE GU DE SUBSCRIPTION SERVICE GUIDE Capitalized terms not defined herein shall have the meaning set forth in the Express General Terms and Conditions or Subscription Service Agreement. 1. CUSTOMER OPERATION OF SUBSCRIPTION SERVICE 1.1. PA SS'4/ki'ORDS AND USER NAMES. Customer shall: (a) protect the names and passwords of users of the Subscription Service and prevent and notify ServiceNow of unauthorized use of the Subscription Service; (b) appoint up to five (5) designated support contacts for purposes of contacting ServiceNow support regarding questions and/or technical issues ("Authorized Customer Support Contacts') and ensure that the Authorized Customer Support Contacts' information is current in the ServiceNow support portal; (c) be responsible for the lawfulness of, and results obtained from, all Customer Data submitted by users to the Subscription Service and each user's acts and omissions; and (d) use the Subscription Service only in accordance with the Documentation. 1.2. ACCESS CONTROL. ServiceNow provides the technical architecture that permits Customer to use and process Customer Data in the Subscription Service. This architecture includes an access control list engine. Customer shall be responsible for using the access control list engine for protecting all Personal Data. Customer shall ensure that access to and use of Subscription Service is restricted to only users authorized by Customer. Customer shall be responsible for ensuring all such users maintain the security of any passwords, usemames and other forms of authentication to the Subscription Service. A username and password must be uniquely assigned to a specific person and may not be shared by multiple persons at any one time or transferred. "Personal Data" means information identifying a natural person; an identifiable natural person is someone who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his or her physical, physiological, mental, financial, cultural or social identity. 2. SECURITY PROGRAM; EXCEPTIONS ServiceNow shall maintain a security program ("Security Program' that includes industry standard practices designed to protect Customer Data from unauthorized access, use, disclosure, alteration, distribution and destruction. Notwithstanding anything to the contrary in this Agreement, the Security Program apply only to those systems, networks, network devices, facilities and components over which ServiceNow exercises control. The Security Program does not apply to: (i) information shared with ServiceNow that is not Customer Data; (ii) Customer Data in transit over the Internet, Customer's virtual private network (VPN), or another third party network; (iii) any Customer Data processed by Customer or its users in violation of this Agreement; or (iv) any part of the Subscription Service that is not hosted by ServiceNow. 3. UPGRADES 3.1. UPGRADES. "Upgrades" are ServiceNow's releases of the Subscription Service for repairs, enhancements or new features applied by ServiceNow to Customer's instances of the Subscription Service at no additional fee during the Subscription Term. ServiceNow has the discretion to provide new functionality either: (i) as an Upgrade, or (ii) as different software or service for a separate fee. ServiceNow determines whether and when to develop, release and apply any Upgrade to Customer's instances of the Subscription Service. 3.2. MAINTENANCE. ServiceNow shall use reasonable efforts to give Customer ten (10) days' notice of any service maintenance to the infrastructure network, hardware or software used by ServiceNow to operate and deliver the Subscription Service if ServiceNow, in its reasonable judgment, believes that such cloud infrastructure maintenance will impact Customer's use of its production instances of the Subscription Service. ServiceNow will use reasonable efforts to limit the Maintenance Time (as defined below) to no more than two (2) hours per month. Notwithstanding the foregoing, ServiceNow may provide Customer with a shorter or no notice period of service maintenance if necessary, in the reasonable judgment of ServiceNow, to maintain the availability, security, stability or performance of the Subscription Service. 4. SUPPORT During the Subscription Term, ServiceNow shall use reasonable efforts to resolve Defects in the Subscription Service (" Supports. A "Defect' means a problem causing the Subscription Service to not conform to the Product Overview. Customer may request Support for a Defect at the online portal http ://hi.servi now.com or any successor site. A Defect will be assigned a priority level asfollows: SERVICENow PROPR ETARY AND CONFIDENTIAL Page 1 (version 10/21//2014) Agreement No. 7434 SERVICENow EXPRESS SUBSCRIPTION SERVICE GU DE • A Priority Level 1 Defect is any Defect that causes Customer's instance(s) of the Subscription Service to be not Available (as defined below). • A Priority Level 2 Defect is any Defect that causes a mission critical function of the Subscription Service to fail. • A Priority Level 3 Defect is any Defect that significantly impedes work or progress. • A Priority Level 4 Defect is any Defect that does not significantly impede work or progress. Upon notification by Customer of a Defect, ServiceNow shall, in all instances, target an initial response (the "Initial Response") within the timeframes set forth in the Support Table, as measured from the time that Customer notifies ServiceNow. The initial response from ServiceNow shall include, as applicable and without limitation: (i) ServiceNow's acknowledgment or notification to Customer of such Defect, and (ii) the classification of such Defect as a Priority Level 1, 2, 3 or 4. SUPPORT TABLE ......... Response_..� ......__ Priority ....... Level Target Initial .. ........ _ ....... ......... 1 30 minutes; at all times 2 2 hours; at all times _..._.. ............ .... g Within 1 business day 4 Varies Support does not include: implementation services; configuration services; integration services; customization services or other custom software development; support for modifications of the Subscription Service by any person other than ServiceNow or a person acting at ServiceNow's direction; training or "how-to"; assistance with administrative functions; professional services; corrections of immaterial Defects or Defects that have a viable workaround; or corrections that will degrade the Subscription Service. S. SERVICE LEVEL OBJECTIVE 5.1. DEFINITIONS. (a) "Available" means that the Subscription Service can be accessed by authorized users. (b) "Excused Downtime": means (i) Maintenance Time of up to two (2) hours per month; and (ii) any time the Subscription Service is not Available due to circumstances beyond ServiceNow's control, including without limitation modifications of the Subscription Service by any person other than ServiceNow or a person acting at ServiceNow's direction, a Force Majeure Event, general Internet outages, failure of Customer's infrastructure or connectivity (including without limitation, direct connectivity and virtual private network (VPN) connectivity to the Subscription Service), computer and telecommunications failures and delays not within ServiceNow's control, and network intrusions or denial -of -service or other criminal attacks. M "Maintenance Time" means the time the Subscription Service is not Available due to service maintenance. (d) "Availability Service Level Objective" means the percentage of total time during which Customer's production instances of the Subscription Service are Available during a calendar month, excluding Excused Downtime. 5.2. AVAILABLITY. ServiceNow shall use reasonable efforts to provide an Availability Service Level Objective of 99.8% over any calendar month. There is no service credit offered for a failure to meet this Availability Service Level Objective. SERVICENOw PROPR ETARY AND CONFIDENTIAL Page 2 (version 10/21//2014) Agreement No. 7434 SCHEDULE A TERMS AND CONDITIONS TO VIRTRU PRO SUBSCRIPTION AGREEMENT 1. DEFINITIONS For purposes of this Agreement, the following terms shall have the following meanings: 1.1 "Derivative Work" shall mean a new or modified work that is based on or derived from a preexisting work, including, without limitation, a work that, in the absence of a license, would infringe the copyright in such preexisting work or that uses trade secrets or other proprietary information with respect to such preexisting work. 1.2 "Materials" shall mean the Virtru Pro software (including any object code, executable files, or browser plug -ins) or materials related thereto provided by Virtru to Customer hereunder, including, without limitation, any software downloaded from Virtru's website or from the Virtru Pro Services; any related materials and documentation therefor; and any modifications, error corrections, bug fixes, new releases, enhanced functionality (including platform integration features not generally available to non-commercial users of Virtru's software) or other updates thereto that may be provided hereunder by Virtru to Customer during the term of this Agreement. 1.3 "Third Party Services" shall mean any services used in connection with the Materials that are hosted by a party other than Virtru or Licensee. 1.4 "Virtru Pro Services" shall mean the Virtru hosted services made available by Virtru to Customer in connection with the Materials. 2. RIGHTS IN MATERIALS AND TO USE SERVICE 2.1 Grant of Rights. Subject to the terms and conditions of this Agreement, Virtru (a) hereby grants to Customer a restricted, non-exclusive, nontransferable, nonsublicensable, royalty -free (except as set forth in Section 2.3), revocable right to use, during the term of this Agreement and in accordance with the documentation provided by Virtru, the Materials (the "License"), and (b) Virtru will make the Virtru Pro Services available to Customer pursuant to this Agreement during the term of this Agreement. Except as set forth in this Section 2.1, no other right or license of any kind is granted 1 by Virtru to Customer hereunder with respect to the Materials or the Virtru Pro Services. Customer acknowledges and agrees that, unless otherwise agreed in writing between the parties, Customer shall be solely responsible for procuring and complying with any license or right to use any Third Party Services, including those offered by Customer's email services provider. 2.2 Restrictions. Customer shall not, without the prior written consent of Virtru: (a) copy all or any portion of the Materials or Virtru Pro Services; (b) decompile, disassemble, scrape or otherwise reverse engineer the Materials, Virtru Pro Services or any portion thereof, or determine or attempt to determine any source code, algorithms, methods or techniques embodied in the Materials or used in the Virtru Pro Services or any portion thereof; (c) modify, translate or create any Derivative Works based upon the Materials or Virtru Pro Services; (d) distribute, disclose, market, rent, lease, assign, sublicense, pledge or otherwise transfer the Materials, in whole or in part, to any third party or export the Materials outside the United States; (e) remove or alter any copyright, trademark, trade name or other proprietary notices, legends, symbols or labels appearing on or in copies of the Materials or the Virtru Pro Services; (f) perform, or release the results of, benchmark tests or other comparisons of the Materials or Virtru Pro Services with other programs or services; (g) transfer the Materials to any computer other than a computer owned by Customer and used by Customer in Customer's operations; (h) permit the Materials or Virtru Pro Services to be used for processing the data of any third party; (i) incorporate the Materials, Virtru Pro Services or any portion thereof into any other program, product or service, or use the Materials or Virtru Pro Services to provide similar services or functionality to third parties; (j) provide any third party with access to the Virtru Pro Services other than as expressly permitted herein or by the Terms of Service (as defined below); (k) use the Materials or Virtru Pro Services for any unlawful or tortious purpose; or (1) use the Materials or Virtru Pro Services for any purpose other than in accordance with the terms and conditions of this Agreement or Virtru's then -current terms of service (available at h JAWyy, rirtru.com/terms-of-service) (the "Terms of Service"). Customer shall ensure that all Customer end users of the Virtru Pro Service and Materials comply with Agreement No. 7434 the terms and conditions of this Agreement. Customer shall be responsible for compliance with this Agreement by each Customer end user and it shall monitor and manage all Customer users in connection with this Agreement. 2.3 Fees; Payment. In consideration of the Virtru's provision of the Virtru Pro Services and Materials, Customer shall make payments to Virtru in accordance with the terms set forth on the cover page of this Agreement. Sales and use tax, VAT, or GST are Customer's sole responsibility, and Customer acknowledges and agrees that all fees are exclusive of all such taxes. 2.4 Seats; Reporting. Customer shall initially be permitted to use the Materials and Virtru Pro Services with respect to the number of seats set forth on the cover page of this Agreement (the "Baseline Seat Count"). Each seat shall be used by one Customer user. During the term of this Agreement, Customer will report to Virtru the total number of users of the Materials and Virtru Pro Services on an annual basis. Such report will be submitted to aalel@..virtrti.com and shall be due thirty (30) days prior to each anniversary of the date of this Agreement (each, a "Reporting Date") based on the actual number of users as of the date thirty (30) days prior to such Reporting Date (each, a "Seat Count Date"). If the actual number of Customer users as of any Seat Count Date is higher than the Baseline Seat Count, Customer will pay the "Subscription Fee per Seat" set forth on the cover page of this Agreement (the "Subscription Fee") for each such additional user for any Renewal Term. 2.5 Adjustment Events. In addition to the annual reporting required under Section 2.4 above, Customer shall report to Virtru any increase of ten percent (10%) or more in the aggregate number of Customer users in excess of the Baseline Seat Count that occurs between Reporting Dates (an "Adjustment Event") and agrees to pay Virtru, within thirty (30) days following any such Adjustment Event, a prorated Subscription Fee for each such additional user for the remaining portion of the applicable term and for any Renewal Term. 2 2.6 Seat Count Audit. At any time during the term of this Agreement, Virtru shall have the right to audit Customer's usage of the Virtru Pro Services and Materials (a "Seat Count Audit"). If the actual number of Customer users as of the date of any Seat Count Audit is higher than the Baseline Seat Count, Customer will pay the "Subscription Fee per Seat" set forth on the cover page of this Agreement for the remaining portion of the applicable term and for any Renewal Term. 3. SUPPORT Virtru will provide support to Customer and its end users through Virtru's generally available online ticketing and support system. Except as expressly provided in Schedule B, which is incorporated herein by reference, in this Section 3 or as may otherwise be provided under a written support agreement entered into by Virtru and Customer, Virtru is under no obligation to support the Materials or Virtru Pro Services in any way, nor to provide any modification, error correction, bug fix, new release or other update (each an "Update") to or for the Materials or Virtru Pro Service. In the event Virtru, in its sole discretion, supplies or makes available any Update to Customer, such Update shall be deemed to be part of the Materials or Virtru Pro Services (as applicable) hereunder and shall be subject to the terms and conditions of this Agreement. 4. PROPRIETARY RIGHTS 4.1 General. As between Virtru and Customer, Virtru retains all right, title and interest, including, without limitation, all patent rights, copyrights, trademarks and trade secrets, in and to the Materials, Virtru Pro Services and any portion thereof, including, without limitation, any copy or Derivative Work of the Materials, Virtru Pro Services or any portion thereof and any Update thereto. Customer agrees to take any action reasonably requested by Virtru to evidence, maintain, enforce or defend the foregoing. Customer shall not take any action to jeopardize, limit or interfere in any manner with Virtru's ownership of and rights with respect to the Materials, Virtru Pro Services or any Derivative Work or Update. Customer shall have only those rights in or to the Materials, Virtru Pro Services and any Derivative Work or Update granted to it pursuant to this Agreement. 4.2 Feedback. Customer and its authorized users may provide suggestions, requests, recommendations and other feedback concerning Customer's use of the Materials and Virtru Pro Services (including, without limitation, any errors or difficulties discovered with respect thereto) (the "Feedback"). Customer agrees that all Feedback shall be the sole Agreement No. 7434 property of Virtru and Virtru may use such Feedback at its discretion without the consent of Customer. 5. PROPRIETARY INFORMATION 5.1 Proprietary Information. Both parties acknowledge that, in the course of this Agreement each may obtain confidential or proprietary information of the other party ("Proprietary Information"). "Proprietary Information" will include, without limitation, (a) the existence of and terms of this Agreement, (b) trade secrets, know-how, inventions (whether or not patentable), techniques, processes, programs (whether in source code or object code form), ideas, algorithms, formulas, schematics, testing procedures, software design and architecture, computer code, documentation, design and functional specifications, product requirements, problem reports, performance information, software documents, hardware, devices, designs, drawings, unpublished patent applications, data, plans, strategies and forecasts, and (c) technical, engineering, manufacturing, product, marketing, servicing, financial, personnel and other information. Virtru's "Proprietary Information" will include, without limitation, the Materials (including all Derivative Works and Updates) and all confidential information related thereto provided by Virtru to Customer in connection with this Agreement. Virtru's Proprietary Information shall, as between Customer and Virtru, belong solely to Virtru, and Customer's Proprietary Information shall, as between Customer and Virtru, belong solely to Customer. 5.2 Use and Disclosure Restrictions. Each party agrees (a) to protect the other party's Proprietary Information from unauthorized dissemination and use; (b) to use the other party's Proprietary Information only for the performance of this Agreement and the exercise of any rights under this Agreement; (c) not to disclose any Proprietary Information, or any part or parts thereof, to any of its employees, agents, contractors or any other individuals except to its employees who are under confidentiality obligations no less restrictive than the requirements of this Section 5; (d) with respect to Customer, not to disclose or otherwise provide to any third party, without the prior written consent of Virtru or as otherwise set forth in a separate written agreement between the parties hereto entered into after the date hereof, as applicable, any of Virtru's Proprietary Information, materials or any data or other information produced, obtained or created by Customer in connection with Customer's use of the Materials, including, without limitation, the existence of this Agreement and the existence and possible applications of the Materials; (e) to undertake whatever action is necessary (or authorize the other party to do so in the name of such party) to prevent 3 or remedy any breach of such party's confidentiality obligations herein set forth or any other unauthorized disclosure of any Proprietary Information by its current or former employees, agents or contractors; and (f) not to remove or destroy any proprietary or confidential legends or markings placed upon or contained within the Proprietary Information provided to such party by the other party. 5.3 Exclusions. The foregoing restrictions on disclosure and use shall not apply with respect to any Proprietary Information that: (a) is or becomes publicly known through no act or omission of the other party; (b) was rightfully known by the receiving party without confidential or proprietary restriction before receipt from the other party, as evidenced by the receiving party's contemporaneous written records; (c) becomes rightfully known to the receiving party without confidential or proprietary restriction from a source other than the disclosing party that does not owe a duty of confidentiality with respect to such Proprietary Information; or (d) is independently developed without the use of the Proprietary Information as evidenced by the receiving party's written records. In addition, a party may use or disclose Proprietary Information to the extent (i) approved in writing by the other party and (ii) a party is legally compelled to disclose such Proprietary Information, provided, however, that prior to any such compelled disclosure, such party shall cooperate fullywith the other party in protecting against any such disclosure and/or obtaining a protective order narrowing the scope of such disclosure and/or use of the Proprietary Information. Further, each party may disclose the terms and conditions of this Agreement: (A) in confidence, to legal counsel; (B) in confidence, to accountants, banks, and financing sources and their advisors; and (C) in connection with the enforcement of this Agreement or any rights hereunder. 5.4 Equitable Relief. Each party agrees that, due to the unique nature of the other party's Proprietary Information, the unauthorized disclosure or use of the other party's Proprietary Information or any other breach of any provision of this Section 5 will cause irreparable harm and significant injury to the other party, the extent of which will be difficult to ascertain and for which there will be no adequate remedy at law. Accordingly, each party agrees that the other party, in addition to any other available remedies, shall have the right to seek an immediate injunction and other equitable relief enjoining any breach or threatened breach of this Section 6 without the necessity of posting any bond or other security. Each party shall notify the other party in writing immediately upon becoming aware of any such breach or threatened breach. Agreement No. 7434 6. No WARRANTY THE MATERIALS AND VIRTRU PRO SERVICES ARE PROVIDED "AS IS" AND VIRTRU DISCLAIMS ALL WARRANTIES AND REPRESENTATIONS, WHETHER EXPRESS OR IMPLIED, RELATING TO THE MATERIALS AND VIRTRU PRO SERVICES, INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OF DESIGN, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE OR NONINFRINGEMENT OF THIRD PARTY RIGHTS, OR WARRANTIES ARISING FROM A COURSE OF DEALING, COURSE OF PERFORMANCE, USAGE OR TRADE PRACTICE. VIRTRU DOES NOT GUARANTEE THE ACCURACY OF THE INFORMATION INCLUDED IN, TRANSMITTED THROUGH OR MADE AVAILABLE BY THE MATERIALS OR VIRTRU PRO SERVICES, WHICH MAY INCLUDE INACCURACIES OR ERRORS. VIRTRU DOES NOT GUARANTEE THAT THE MATERIALS OR VIRTRU PRO SERVICES WILL BE UNINTERRUPTED OR ERROR -FREE, THAT BUGS OR MALFUNCTIONS WILL BE CORRECTED OR THAT THE MATERIALS, VIRTRU PRO SERVICES OR VIRTRU'S SERVERS ARE FREE OF HARMFUL COMPONENTS. VIRTRU DOES NOT GUARANTEE THAT THE MATERIALS OR VIRTRU PRO SERVICES ARE ACCURATE, WITHOUT ERROR OR RELIABLE. 7. VIRTRu's ENTIRE LIABILITY TO THE EXTENT ALLOWED BY APPLICABLE LAW AND NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY LIMITED REMEDY OR LIMITATION OF LIABILITY: (a) IN NO EVENT SHALL VIRTRU OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES FOR LOSS OF PROFITS, LOSS OF BUSINESS, LOSS OF USE OR DATA, INADVERTENT DISCLOSURE OF DATA, OR INTERRUPTION OF BUSINESS, OR FOR ANY INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES OF ANY KIND OR OTHER ECONOMIC LOSS ARISING FROM OR RELATING TO THIS AGREEMENT OR THE SUBJECT HEREOF, EVEN IF VIRTRU HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, HOWEVER CAUSED, AND (b) NOTWITHSTANDING ANYTHING IN THIS AGREEMENT TO THE CONTRARY, VIRTRU'S ENTIRE LIABILITY ARISING FROM OR RELATING TO THIS AGREEMENT OR THE SUBJECT HEREOF, UNDER ANY LEGAL THEORY (WHETHER IN CONTRACT, TORT, INDEMNITY OR OTHERWISE), IF ANY, SHALL NOT EXCEED ONE THOUSAND DOLLARS (US$1,000). 8. INDEMNIFICATION Customer shall defend, indemnify and hold Virtru harmless against any loss, liability, damage or cost (including reasonable attorneys' fees) in connection with claims, actions, demands, suits, or proceedings made or brought against Virtru by a third party alleging (a) that any modification or addition to the Materials or Virtru Pro 4 CONFIDENTIAL Services made by or for Customer (other than by Virtru) infringes a copyright, mask work right, trade secret, trademark right or patent of the third party; (b) in combination with any other product or service not provided, specified or recommended in writing by Virtru for use with the Materials or Virtru Pro Services; or (b) with respect to the development, manufacture, marketing, sales, distribution or use of any of the Materials or Virtru Pro Services, including, without limitation, a product liability claim or a claim for breach of any warranty or support obligations. In connection with a claim under this Section 9, Virtru shall: (i) provide Customer with prompt notice of the claim; (ii) permit Customer to control the defense and any settlement of the claim (provided that Customer may not settle any claim unless such settlement unconditionally releases Virtru of all liability in connection with such claim); and (iii) provide cooperation as reasonably requested by Customer (at Customer's expense). 9. TERM AND TERMINATION 9.1 Term. This Agreement shall commence on the Effective Date and, unless sooner terminated pursuant to the terms hereof, shall continue in full force and effect for one (1) year (the "Initial Term"). Thereafter, this Agreement shall automatically renew for successive one (1) year periods (each a "Renewal Term"), unless either party provides the other party with written notice of its intent not to renew at least thirty (30) days prior to the end of the then -current term. The automatic renewal of this Agreement will be for the Baseline Seat Count, as adjusted pursuant to Sections 2.4, 2.5 and/or 2.6, on the same payment terms as set forth on the cover page of this Agreement. 9.2 Termination. Either party may terminate this Agreement immediately upon written notice to the other party if the other party fails to perform any of its duties or obligations hereunder and, except with respect to Customer's breach of Section 2.1 or 2.2, which breach shall not be subject to any cure period, fails to cure such default within thirty (30) days following receipt of written notice from the non -defaulting party specifying the occurrence or existence of the default. Customer shall notify Virtru within twenty-four (24) hours of Customer becoming aware of any breach (other than by Virtru) of the terms and conditions of this Agreement, including, without limitation, Sections 2 and 5. 9.3 Effect of Termination. Upon the expiration or termination of this Agreement, the rights granted to Customer hereunder shall terminate, Customer will cease all use of the Materials, return to Virtru or destroy the Materials in its possession, and, upon Virtru's request, so certify such actions to Virtru. Any costs Agreement No. 7434 incurred in returning or destroying the Materials upon termination shall be borne by Customer. The provisions of Sections 2.2, 4.2, 5, 6, 7, 8, 9.3, and 10 shall survive the expiration or any termination of this Agreement. Termination of this Agreement by either party shall not act as a waiver of any breach of this Agreement and shall not act as a release of either party from any liability for breach of such party's obligations under this Agreement. Neither party shall be liable to the other for damages of any kind solely as a result of terminating this Agreement in accordance with its terms, and termination of this Agreement by a party shall be without prejudice to any other right or remedy of such party under this Agreement or applicable law. 10. GENERAL PROVISIONS 10.1 Notices. Any notice, request, demand or other communication required or permitted hereunder shall be in writing, shall reference this Agreement and shall be deemed to be properly given: (a) when delivered personally; (b) seven (7) days after having been sent by registered or certified mail, return receipt requested, postage prepaid; or (c) two (2) business days after deposit with a private industry express courier, with written confirmation of receipt. All notices shall be sent to the address set forth on the cover page of this Agreement and to the notice of the person executing this Agreement (or to such other address as may be designated by a party by giving written notice to the other party pursuant to this Section 10.1). 10.2 Assignment. This Agreement may not be assigned, in whole or part, whether voluntarily, by operation of law or otherwise, by Customer without the prior written consent of Virtru. Subject to the preceding sentence, the rights and liabilities of the parties hereto shall bind, and inure to the benefit of, their respective assignees and successors and is binding on the parties and their successors and assigns. Any attempted assignment other than in accordance with this Section 10.2 shall be null and void. 10.3 Governing Law, Jurisdiction and Venue. This Agreement is to be construed in accordance with and governed by the internal laws of the Commonwealth of Virginia (but expressly excluding the Uniform Computer Information Transactions Act ("UCITA") as enacted in Virginia) without giving effect to any choice of law rule that would cause the application of the laws of any jurisdiction other than the internal laws of the Commonwealth of Virginia (excluding UCITA) to the rights and duties of the parties. Any legal suit, action or proceeding arising out of or relating to this Agreement shall be commenced in a federal court in the Eastern District of Virginia or in state courts with jurisdiction over 5 CONFIDENTIAL. Fairfax County, Virginia, and each party hereto irrevocably submits to the exclusive jurisdiction and venue of any such court in any such suit, action or proceeding. 10.4 Attorneys' Fees. If any legal action, including, without limitation, an action for arbitration or injunctive relief, is brought relating to this Agreement or the breach hereof, the prevailing party in any final judgment or arbitration award, or the non -dismissing party in the event of a dismissal without prejudice, shall be entitled to the full amount of all reasonable expenses, including all court costs, arbitration fees and actual attorneys' fees paid or incurred in good faith. 10.5 Waiver. The waiver by either party of a breach of or a default under any provision of this Agreement, shall be in writing and shall not be construed as a waiver of any subsequent breach of or default under the same or any other provision of this Agreement, nor shall any delay or omission on the part of either party to exercise or avail itself of any right or remedy that it has or may have hereunder operate as a waiver of any right or remedy. 10.6 Severability. If the application of any provision of this Agreement to any particular facts or circumstances shall be held to be invalid or unenforceable by an arbitration panel or a court of competent jurisdiction, then (a) the validity and enforceability of such provision as applied to any other particular facts or circumstances and the validity of other provisions of this Agreement shall not in any way be affected or impaired thereby and (b) such provision shall be enforced to the maximum extent possible so as to effect the intent of the parties and reformed without further action by the parties to the extent necessary to make such provision valid and enforceable. 10.7 Relationship of the Parties. Nothing contained in this Agreement shall be deemed or construed as creating a joint venture, partnership, agency, employment or fiduciary relationship between the parties. Neither party nor its agents have any authority of any kind to bind the other party in any respect whatsoever, and the relationship of the parties is, and at all times shall continue to be, that of independent contractors. 10.8 Restricted Rights. If Customer is an agency or instrumentality of the United States Government, the Materials are "commercial computer software" and "commercial computer software documentation," and, pursuant to FAR 12.212 or DFARS 227.7202, and their successors, as applicable, use reproduction and disclosure of the Materials are governed by the terms of this Agreement. Agreement No. 7434 10.9 Reference. Customer agrees to serve as a "reference customer" that may be disclosed by Virtru to third parties (including by displaying Customer's name, logo and/or a link to Customer's web site on Virtru's web site) and, upon reasonable notice from Virtru, shall serve as a reference to potential customers, vendors, investors, or other third parties designated by Virtru; provided, however, that Virtru shall provide Customer with reasonable prior notice of its need to have Customer serve as a reference. 10.10 Entire Agreement. This Agreement, any Schedules and any Exhibits attached hereto and incorporated herein by reference, and the Terms of Service constitute the entire agreement between the parties concerning the subject matter hereof and supersede all prior or contemporaneous representations, CoNRIDEINTM discussions, proposals, negotiations, conditions, agreements and communications, whether oral or written, between the parties relating to the subject matter of this Agreement and all past courses of dealing or industry custom. No amendment or modification of any provision of this Agreement shall be effective unless in writing and signed by a duly authorized signatory of each of Virtru and Customer. 10.11 Counterparts and Electronic Signatures. The Parties may execute this Agreement in counterparts, each of which is deemed an original, but all of which together constitute one and the same agreement. This Agreement may be delivered electronically or by facsimile transmission, and the parties hereby agree that any electronic or facsimile signatures hereto are legal, valid and enforceable as originals. Agreement No. 7434 0NFMEiiY nAL SCHEDULE B MAINTENANCE AND SUPPORT SERVICES SCHEDULE 1. DEFINITIONS For purposes of this Schedule, the following term shall have the following meaning: (a) "Support Services" means the delivery of front-end support to Customer's end users by telephone, email or other methods and the training of Customer's end users, in each case relating to the use of the Materials and Virtru Pro Services. 2. SUPPORT SERVICES. Virtru will be responsible for providing Customer's end users with Support Services. Virtru will not be required to provide the Support Services if Customer has failed to pay any amount payable to Virtru under this Agreement and such amount is more than thirty (30) days overdue. 3. UPDATES. Virtru will provide Customer with one copy of each Update made generally available by Virtru to its customers that pay for customer support and maintenance during the term of thisAgreement. 4. SUPPORT HOURS. Virtru will provide the Support Services during Virtru's normal business hours, Monday to Friday, except holidays. Virtru will respond to Customer support inquiries or requests within one business day. Agreement No. 7434 vCloud Air (U.S. and Japan Data Centers] TERMS OF SERVICE Last Updated: November 5, 2014 VMware vCloud Air is an infrastructure as a service offering. By accessing any service offered through VMware VCloud Air (the " Service Offering") you agree to be bound by these terms of service between you and VMware (` Agreement`). If you do not agree to this Agreement, you must not access the Service Offering. An individual accepting this Agreement on behalf of an organization represents and warrants having legal authority to bind that organization. You" means the entity accepting this Agreement. " VMware,"` we," or " us' means VMware, Inc.. a Delaware corporation; to the extent that you are purchasing the Service Offering in the United States, VMware vCloud Service G.K., a company organized and existing under the laws of Japan, to the extent that you are Purchasing the Service Offering in Japan, and VMware International Limited; a companyorganized and existing under the laws of Ireland, to the extent that VOL) are purchasing the Service Offering elsewhere. Capitalized terms used in this Agreement are defined throughout this Agreement and in Section 14. EVALUATION PROGRAM USE. When you access the Service Offering under a VMware evaluation program, you may use the Service Offering only for non -production computing activity. Notwithstanding any other provision in this Agreement, under a VMware evaluation program, we provide the Service Offering "AS -IS" without indemnification, support or warranty of any kind, expressed or implied; and we will not be liable for any damages. Upon termination of the evaluation, you will no longer have access to the Service Offering and Your Content. 1. The Service Offering. 1.1 Generally. This Agreement governs your access and use of the Service Offering. We may deliver the Service Offering to you with the assistance of our affiliates, licensors and providers. Service Level Agreements may apply to the Service Offering. You will comply with all laws, rules and regulations applicable to your use of the Service Offering, and with the Third Party Terms, the Service Description, the Privacy Addendum, and the Support Policy, all of which are incorporated herein by reference. 1.2 Access to the Service Offering. You may access and use the Service Offering solely foryour own benefit and only in accordance with this Agreement. To access the Service Offering, you must register for the Service Offering and set up an authorized account with Login Credentials. You may monitor and manage your Service Offering account via the My VMware Portal available at www.vmware.com/accounts and through the Service Offering Portal available at hftp://vcloud.vmware.com. You most keep confidential your Login Credentials. If you set up an authorized account for an organization, you will require that all authorized users of that account (including anyone providing services to you) keep confidential their Login Credentials. You will keep your registration information accurate, complete and current as long as you use the Service Offering, You are responsible for any use that occurs Under your Login Credentials, including any activities by YOU, or your employees, contractors or agents. If you believe an unauthorized user has gained access to your Login Credentials, you will notify us as soon as possible. Neither we nor ouraffiliates are responsible for any unauthorized access to or use of your account. 1.3 Verifying; Cooperation. We have the right to verify your compliance with this Agreement. Ifwe Agreement No. 7434 seek to verify that compliance, you will provide information or other materials reasonablyrequested by us to assist the verification. We monitor the overall performance and stability of the infrastructure of the Service Offering. You may not block or interfere with that monitoring. If we reasonably believe a problem with the Service Offering may be attributable to Your Content or your use of the Service Offering, you will cooperate with us to identify and resolve the source of thatproblem. 1.4 Additional Terms; Third Party Content. As part of your use of the Service Offering; you may receive access to additional data, content, software or applications subject to separate terms. If so, those separate terms will prevail over this Agreement as to your use of that data, content, software or applications. Third Party Content is available "AS IS" without indemnification or support. and we disclaim all express and implied warranties (including warranties of merchantability, fitness fora particular purpose, and non -infringement). You are responsible for reviewing, accepting, and complying with any third party terms of use or other restrictions applicable to the Third Party Content. Those terms will be available to you through a notification within the Service Offering or in a document available at https://www.vmware.com/files/pdf/support/vmware-vcloud-air-third-party- terms.pdf. It is your responsibility to check the Third Party Terms, which may be modified from time to tirne. We may provide billing and related services associated with the Third Party Content. Wewill not provide any support for the Third Party Content unless otherwise noted in the Third Party Terms. We reserve the right to suspend cr terminate the Third Party Content at any time, but we will use commercially reasonable efforts to provide reasonable notice of that suspension ortermination. 1.5 Early Evaluation/Beta Features. We may identify and make available on an early evaluationor beta basis certain features or functionality within the Service Offering. You must use these features or functionality only for evaluation purposes and for the period that we specify. We providethese features and functions "AS -IS;" without indemnification or support and disclaim all express and implied warranties (including warranties of merchantability, fitness for a particular purpose, and non - infringement). Any early evaluation or beta features or functionality do not constitute an implied commitment to offer to you or anyone these features and functionality as part of the Service Offering on a generally available basis. 1.6 Open Source Software. You may receive open source software when you use the Service Offering and any open Source software distributed to you is made available under the applicable open source license, which can be found at: http://www.vmware.com/download/open_source.html. You may obtain a copy of these licenses and any source code (and modifications) that we are required to make available under these licenses (the " Source Files") at http://www.vmware.com/download/open_source.html or by sending a written request, with your name and address to: VMware, Inc., 3401 Hillview Avenue, Palo Alto, CA 94304, United Statesof America. All written requests rnust clearly specify: Open Source Files Request, Attention: General Counsel. This offer to obtain a copy of the Source Files is valid for three years from the date you last received open source software as part of the Service Offering or last accessed the Service Offering. 2. Data Protection and Security. 2.1 Data Protection. We will process personal data contained in Your Content as set forth in the Privacy Addendum. 2.2 Your Content and Security. You are solely responsible for Your Content. You are responsible for protecting the security of Your Content, including any access you might provide to Your Content by your employees, customers or other third parties, and in transit to and from the Service Offering. The Service Offering provides you with certain software and functionality to help you protectYour Content from unauthorized access. You will take and maintain appropriate security; protection and backup of Your Content. which might include the use of encryption technology to protectYour Content from unauthorized access. You are responsible for providing any necessary notices to your Agreement No. 7434 users and obtaining any legally -required consents from your users concerning their use of the Service Offering. You are solely responsible for complying with any laws or regulations that might apply to Your Content. You are responsible for any losses or other consequences arising from your failure to encrypt or back up Your Content. 3. Acceptable Use. 3.1 General Restrictions. You and those accessing the Service Offering through you may not: (a) resell or sublicense the Service Offering; or (b) use or access the Service Offering: (i) in away prohibited by law, regulation, governmental order or decree: (ii) to violate any rights of others, (iiilto try to gain unauthorized access to, test the vulnerability of, or disrupt the Service Offering orany other service, device, data, account or nehvork: (iv) to spam or distribute malware: (v) in a waythat could harm the Service Offering or impair anyone else s use of it: (vi) in a way intended to work around the Service Offerings technical limitations, recurring fees or usage limits: or (vii) in any application or situation where failure of the Service Offering could lead to the death or serious bodily injury of any person, or to severe physical or environmental damage. You must ensure thatyour users comply with the terms of this Agreement, and you agree that if you become aware of any violation by one of your users, you Will terminate that users access to Your Content immediately. If we have reason to believe that you or your users have breached this Agreement, we orour designated representative may review your use of the Service Offering; including your account, Your Content, and your records, to verify your compliance with this Agreement. 3.2 Content Restrictions. You will take steps to ensure that those accessing any service you provide with the Service Offering do not post content that: (a) may create a risk of harm, loss, physical or mental injury; emotional distress, death, disability, disfigurement, or physical ormental illness to anyone: (b) may create a risk of any other loss or damage to any person or property: (c) may constitute or contribute to a crime or tort; (d) contains any information or content that is illegal, unlawful, harmful, abusive, pornographic, racially or ethnically offensive, defamatory infringing, invasive of personal privacy or publicity rights: harassing, humiliating to other people (publiclyor otherwise), libelous, threatening, or otherwise objectionable; or (e) contains any information or content that you do not have a right to make available under any law or under contractual or fiduciary relationships. You are solely responsible for any software, product or service that a third party licenses, sells or makes available to you that you install or use with the Service Offering. Your use of that software, product or service is governed by separate terms between you and thatthird party. We are not a party to and are not bound by any of those separate terms. You representand warrant that Your Content does not and will not violate any third -party rights, including any Intellectual Property Rights, and rights of publicity and privacy. You will ensure that your use ofthe Service Offering complies at all times with your privacy policies and all applicable laws and regulations; including any encryption requirements. 3.3 Violations of Acceptable Use. If you become aware that any of Your Content or youruser's use of Your Content violates Section 3.1 or 3.2, you will take immediate action to remove the applicable part of Your Content or suspend the end users access. If you fail to do so, we mav ask You to do so. If you fail to comply with our request within twenty-four hours, we may suspend your account or disable access to Your Content until you comply with our request. 3.4 Notification of Infringement Concerns. If you believe that your- copyrighted work has been copied and is accessible on our Service Offering in a way that constitutes copyright infringement, please send a notice to us as further detailed in Section 3 of the Community Terms of Use available at http://www.vmware.com/community_terms.htmi. 4. IP Ownership. Agreement No. 7434 4.1 Ovvmemshipmf SerAce Waring. VVeand our Wensonaown andretAnall hghL Ede and Remo in and to the Service, Offering and any ne|a&ed Wwmre Sofbmana. indudinqi a|Amprovemenbe, enbmnoemenLs, moCjifio"jdona and d�hv��ive works thereof, and eU |nteUe(tua| PropeityRiQhbs flh(_�nsinThis inciudeoany infonmWnUhK weoo||e/t and anm[yv)inconnedmnwith theGen/ioo C)flering, such as usage patterns, user feedback and ofihor infarmehon to impn)ve and evo|veour sofW-ireproducts, ondaE)rvioemoffering&YournghLotouse the SemioeDfFehngare |im|tedlothoee express|l granted in LHs AgreemenL No other riQhba with naSpeoL Lo the ServiCe Ofl[(ring, �nyne|a�ed VMmmre SWRwane, oronyre|abad |nteUedua| Propedy RiQhba areimplied, 12 Onwnemho of Your ContewtYou and yourauthor�zed uoera nmlein aH nght. tiOe and intenastin and to Your ConLeMand all hueUeoLual PropertyRighls iheoe|n, Our rights tua000as, and uoeYour Conientans Wed hoLhome expoeso|y Qmnted 5"hieQnaemenL No otherrights vvith respooitm Your Comtentoreiny ns|ehed |nte|kecAue| Prop()rty Flights onmimp|ied, 4.3, Feedback,VVe w/iU he bee Lo use forany puqpo�e �ny [eedbaoh (auoh �s comments or sug�eetions)Lh��youprovid�housneg�rdin0LheS*rvioeCWeHng�)ouherebygnenthzueanon- exdusivm. perpetua|. irnevocebYo. roye|�^4me. Uansfenade, wmddvvide hQht and |iconsc, with thehght tosubUnOna0. toMa naproduoO, perfomn, display. diso|ooe, dishibute, modify, preparedmriveti*s monks of and otherwise exp!oit the feedback wiLhout restriction in any manner now known or inthe fu=monceivedand tomekemse.acU.offer to seU.import-anci export any �)noductorec"rvicothat incorporeteoLhehaodbaok. 5.Order, Dmfiwery, Paymment. andl'axes 5.1 GeneralUy.SooUons13(Cinaot(Anjens).5A(DeUvery).G.5(invmichNand Payment Tents) and 5.G(Texes)�ipp|yon|yLoordersYOU p|JoadineoUywiUh.anclLheSen/ioeOWe�nQyou purohase direoL|yhum .V�Wware,VVhenordWngthrough.orpurohoaingthe Service {}fferngHim, aVMm/W� aud�mr|zed oeseUer, the audhur|zed reseUer might speoify mimWmAern�s, &2CkdensdWOrdensisauedtoVKWmmreare subierLtodhetenmsofhit AQneementand arenot bindingunti|acnepAdbyVIllwar,VVe am nobnaquinsdto prov|deany Service()ffehngtoyc)uunti| you provideeU hlformationvve requireforpmoeosing yourOrder, 5'3 Dkec"Wemalorovdersp0oeddirwoI|ym/ithVMvvore.youmust issur, apunohasemnderto VMvvana hxthe iniUa| SemWe [hering onder buta purcnse orderis not nequinad for ihemonth|y biUings that000uraiterthe initia| Order biUOg. For subsequent biNings. eU 0ereo (inc|udhng oubmohpUon m*novve|s, me&ared usage oomponenbo, and other odd-onm) w�U be pHid innumzmWnoe with this AgneomenL YmurC}nderaiU be demmed aooapkd when we authori7e the punzh�e�d�en/i�� OflohnghzryourLoginCnadenfio|e. WOeUivery.VVhenWvvamaaooeWSyour()nderforiheService Offering.m/em/iUde|iv�rLhe corresponding LoginCredenda|mhoyou byemei|0oLheaddresaamooietedm/dhyoure000un1n|[ VyWm/ere ahipo a physica| ob1ed Acon necin iovvith an odd -on hsenuna Of the Semic�Ofrf'C,rin�. shipping and (�|iverytcrms are EsVVorks VMware's nagiona| QV||menLhaciU, '|NC(]TERKXS201O), 5 5Uinvoicing and Payment Ter'rmS,YouvxiUpayei||fees for useofLho Semice[)Wrinyinbe an)ount and oumenoy opooided in your invoke, vviLhin 30 days allerthe date of Me invoioe.and rega|cfleaoofyour ueage|eve|duhngabiUinQpe&id.YOU vxiHaiso bmreaponsib|efor aUaddiibii j| feeoforn �ysubsoripbonm*n/e evx�|nandme�eduoa�eoomponen�sconsumed.ondo1her subsohptiono.he-Jt�mrem,produch.servi0000radd ur -on��he�youpoheoewhhintheSemioeO1ering. Youvv|||bebiUedimadvanoeforthenlonth|yorprepaiddlargemduetoiheeubncripdoneerviceo purchasedAny meteredumgecomponenbsand any iniLie|mmnqh|yfees vvU|bebilled inarreannThe app|ioeb|eN*eafor subsoripbons(|ndudingfeatures �,indoLheravai|ab|epnnductsand Agreement No. 7434 oerv�cc.awjUbe govennedbytheUher+CuTentapNicWb|ephMet atattheUmeUheinidWLrenewa[or Won orderisaubmA�d.oraaOherwiaeapnee&V�yinonreasemr,,iddnew femsfair the Semioe [Wohngbynobfyingyou at|eemt3Odays inadwanoo. 5 6 Taxes Sorvice 0WIng Revs ara Wusive of laxos, and you shaH pay or Wadonse for all Wes orising out oftnenseotiono can Lemp|ated by this Agreement if you are required to pay or w/iLhhoid any tax for payinei-its due undor iNs A g mom enL you MmH gross youn pap nurls; A us so we awe Ne sums dminh/Uand freeofany dedudiona.You vviNproxidetmummhmvving ihmtbaxeo have��dto�here|�ven�to�ingauLhori�y�^�����''meano�ny��|eo.VAT.uee^Qno�enamai�Lm. p buoinesmand oonupat|on.and ntherWas (odhorLh�nLaxeaonourinoome),eupont amd|mporthaes. ouahnladutiesand Mmi|aroherQeoimpmaedbyany governmentoruthereutho/ity "Auhareby nonfirnnHut vvecan rdyonthonemeandoddnsssyou provide touavvhenyou agreeLQtheService [Wrin8orinoonnectionxvi1hyour paynnelmeTodaaWnQthep|aoeofeup�|yfor o-|esWeand inoometsxpurpoaeeorasboingMheofsupply for youheveooteb|iehed yourbukness, 6. It emmporary Sus�peinsicrn, ITI Ckmeral8yUponprior vurikennodoetoyou.vvemay suspend youruoomftheServioe(3%rQ|f vv(.,reanonat|ydatermine:q)payment forthe SemioeQfferin�jinnuurecrAvedm/ithin3Odays0om thedaLoonvvhiohpaymenLiadue; (b)youoryour useofdin Seale Offering|ainb/'eechmfLhie A�reemeni� (o)you fa|| to�.iddremmour request, LoLekeacbon amapecified io Baotion 31; 'd)youruse of the Service Offering powaaaenuhI�yrisk bzLheSc,�rvine[�ehng oroMeruoeroofthe Sorvice Offering; or(e)Suopenoimniorequiredpunau�lnttoofasubi,')oena.court order.oroflher request byafavvenfoncen�ent�gency� &2 Effho ofSuspeirisioin.You voiU rem-ain respmns��/afor aU fees in�urnad before or durinqthE� s'uapenoion"You WH not be anided to any sonice twedts Wer Me Servos Lem! Agramneort Mat you mighthaveofsuspenaionr 7.Teiron aridTernmination. 7.1 Termm ofAgmeemmemt.Thia Agreem�nn: wiU be in effect through the SubeoripUon Terrnr p|ua�ny nanevva|a. un|ewa t�nnina&ed ear|ieraa pennMed underthk Agreemond or the SnmwoOeachpbon. Upon teoomoedonofthe Subooripti(.'1nTmrm.theaubeAptionvvi||automotioaUyrenew aaspecified in Me ServioeDeaoriptionunksmterminotedaopermiLtedurkerthe SemioeOeacriphon, 7.2 rermminafir!)n for Cause. VNmoyLerminaheIts AgreemenaWot|mhnmodki&a|yupon sending you an mmai\ notice I (o) you bnaach oy proviaion in Sectimna 3,1 or 3,2� (b) you dn noL reoo|xeflhe undodyingosumereaWtingineouopenAonofymura000untpunsuenLboGec1ionSA (oIwIhan ouapenoiondun hoosubpmena cowl oven oruthernyquectbya|wvenforcement agency)vvithin1O days after your ecoountiasuependelor(o)you oomm|tamQeha|breoohthat cannot beoured, 7.3 Termmhirrafilon for Insolvency VVe mey&arminatethia AQnsementeffieotive immediote|yupon mendingyou anamai|notioeifyou: (o)rerminateorauopendyour buoinesa:(b)beoorneinsolvent, admitinwhbngyour inabi|itytopay yourdebts moUncXmwture.make anaasignmentfor thebenefit ofcnedihora; or(c) become outdooLto oonLrol ofa truMee, receiwerorsimi|arauthmhty orany bankruptcy orinmo|venoy,)nooeeding. T4 ENO of Terordinaflion, Upon flue, toinninadruri of Th Agreement kv any reason (a) all rights gren0ed Ur you undw this AQneemenL incuding your abUib/ to a(,oeSs Une Service [)ffehng.wiU immediate|y0mnninaW and (b)youmumipnompdydiaoonUnueWUuoeo[theSenvioeWhig and debto or deshny any of our CoOdmidal InknWay We WV Not Your Contra Rx- a period 030 Agreement No. 7434 d�ysko|oWngthe effeodwode��ofthe tenninmbon,a|thoughyou v�Ucease tohave access tothe� Service OffehngorYour Content duhngthiopehod, Afterdhe 3Odays, "our Content vviUbeda|eted, Sections 16 (Qpen Source Sufbmans). 3 (Ameptable Use) 4 (|�i:l Ownership), 5 ([}rder.Oe|immry, Payment and Toxem). 7 (kmm and Temninadon). S ([Aso|eimer), 11 (Limitabon ofL|obUity),12 (Conddenhe| |nfonmadon). 13 (Genera|), and 14 (Dehnlons), mjU survive the termination of this AgosemmnLTenminaUonoftie SemioeOffehng(except hotheexban�that the8anninadonis permiUedundmr SeoUon1213ofAds A0/eamento/SeoUonB1ofKe Service Deeoripi|on)a/i||nnl enbheyou Loany ns[unds'credibs.oroxohmngea.and you w/D|ber|iab|efor aUnionth|ybiUingfees for the remaknkerofLhe SubacripUmn Temn after bsnminadont as well as all usage and od erhses incumedopUzUnehemnhadondate. �'Supportand Subscr�ptionSemv�ces.VVhn en�pp|ioab|m.mdsut�ectkzthebanns()fUnia 4gnsmment.wexviQpnovidebzyoumuppo1f-tfor Uhe Service Cfedng|naccordaincewith the Usmns spedNed V Um SqVol PdOl We mAlrmt proide support to any and users of YourConterd, 9'MIc[akmer.TOTHEMAXIMUM EXTEVTPERIVI|TTEDBYAPPL<CABLELAVV.VVEANi:)OUR L>CENS[)RSAND SERV|CEPR[}V|OERSO|SCLA|kilALLVVARRANT|ES,VVHETHE�REXP�ESS |K4PL|ED.{]R STATUTORY |NCLUO|NG ANY |MPUEDVV=RANT|ES[]FMERCHAWTA�[3|L|TY AINDF|TNESSFOR /\P/4TT|CLJLARPURPOSE, T|TLE.NON -|NF�[-RNJGEMENTAND ANY VVARRAWT|ESAR|S|NGFROyWCOURSE C]FDEALING CNRCOURSE OFPERFORMANCE REGARDING OR RELAT|N(.;TOTHE SERVICE CJFFERNG(NRANY VIATEB|/\LSORSERV|CES FURN|SHED C}RPR[JV|f".)E)T[}YOU U00ERTH|S/\GREEMENYVVEAND OUR LICENSORS AND SERVICE PR[)V|DERSOONOT WARRANT THAT THE SERV|CE[>FFER�NGVV|LLBE UNNTERRUPTEOOf? FREE FRI[}M DEFECTS CAR THAT THE 0FFE:-Z|NGVV|LLVIEET (Q�R 6 DES�GNE�TOT)YQUF�BUS/WESBS. 10. iodennmdfhcatimm. f0.1 Umdenmmffica1Wnby CaMmrmerYou vviDdefend and indemnifyusagainsLanythird party daim ErNingQonorre|abngLoy(a)YonrContent (b)anyinfringem�ntormiaappropriabonof�ny 4nksUectuo|PropertyRQhbabyyou.your nusbzmens.your end users oryoursuNphena:(c)0o|efionof |evv by you� (d) your use of the Service Ohehng (ioduding any eotvides underymuraccount and any uae by your emp|oyees, penaonne| or end uaaro) in vio|adon of the Agoeemenl. or (e) your usoof anyThirdPriirtyConhant�VVev�U(a)pro&deyou with nodoeofthodaimvvidhinareaeonaNepehod ofdmn aRer|mamhgofU7e claim; and (b)reasonab|ycooperate inresponse Loyour requests for ossiatmnoe.You may not seWeoroompromhe any indemnifiedo|aimvviLhoutour phorahtten consent, 10.2 ��Defemse aindKndenmmiNcation. Sub/eoLUathemamainderofids Quhon1U. wem/iUdefend you againston InfringementOaim and indemnly you hom the resuiting mo,;,to and damageafn�Uy avvardedagainst you LoMat thiodparty byaoounmfoompelhintjuhadioUonmregnaedtoin sE �b|emenLYoum/iU(a}pnuvideuovviLhnobceofany |nfhngement�|eimv�thinanaasoneb|epehod Of time aftE»(|eaminQ of it: (b) eUom/ us so|a con�o| overthe ohAm! d*fenae and aai|ament eod(o) nsaaonab|y000panabainrespmnoebaour naque.stsfor askiobanoe.You may noLseMeomonprom|ae any |nhingemcntC|e|maViouLour priorvvrMencmnoanL 1 M3 Renmedlem.|fthe SemiueQ0hngbmoomea.ornouropinionin|ike|yUz�,occomm.the outjectof an |nMinjementC|oim=vviU at our and expense either (e) ProounsLhe hghto nooesaaryhrr youtokeepuaingthe 3er0ceOffering: (b)modlyornap|ace %Sen/ioe[)ReAng0omake iLnon- infrinqing� or (o) �ernxnahe this Agreement and rdund any pma-pAd Nos for the Somme(��eringpro- r,abad hzriLs nmmaining Termr I M4ExoUmshns,VVevv0have noob|kJabonunder UhieSeolon1Oormdewhevvithnespec Lmany Agreement No. 7434 dejmbased onc0)aoomWnedonof\UMwareSo%anavxd7non- VK�vareproduCtoorcontent inc�ud|ng YourCon&ant 'b) use of the Sendce Cfhhng fora purpose or in a rmanner notopeoifiedin thioAgmemrnmntortheSenjoeDesahphwn|(o)any mnddicaUmntoLho Semine00hn,madexvidhout ourexprens nwhttonapprovekor (d)enySemimaOffrxhngpi,c\id(,doneno ohorg1)ba&&TUs SeoLion1OsUbeoyour emdulveremmdyforany infMnQementactions mro|mimo. YY. Urmitaflon ofJab[Ufty. 11A Generaflhy. T3THIE MAX|KJUIMEXTENT PERMITTED BYLXVV.|NNCJEVEN TVV�LL8VE(DR OURL|CENSORSGR SERV|CEPROVIDERS BEL|ABLEFOR ANY L[)STPROFus0R BUSNESSOPPORTUmT|ES.LOSS OFUSEDFTIME SERVICE CWFERM[E.LOSS C}F REVENUE LOSS[}FGOODVV|LL.BU&NESS INTERRUPTION, LOSS [)FDAT&.ORANY INDIRECT, SPEC�AL|NC|DEN FAL,OF, CONSEC3UENlALDAMAGES UNOERIANYTHE()R�'OF L|AB|L|Tf.VVHETHERBASED|idCC]NTTR4CT,TC0T,NEGLIGENCE, PRC}OUCTL|/\B|L|TY.{}R OTHERVV|SE.l\JADE00N.OUR itNOOUR LN3ENSORS'ANOSERVICE PROV0ERS' L|AB|L|TYUNDERTH|SAGREE&8ENTVV|LLNC}T.|NANYEVEWT.REGARDLESSOFVVHETHER THE CLA|M|S BASED |WC[}INTRACT.TC3RT.STR|CTL|/\B|L|TY,OR{]TNERO/|SE.EXCEE[.:) THEGREATER(.}F:(A)THEAGC3'REGATEFEES PAU(DR PAYABLE TOUSFOR YOUR ACCESS TDAND USE OFTHE SERVICE OFFERING Y�\]THETVVELyE(12)MC}�NTHSP�F,,�[]RTD THEEVENT G|V|N(]RISE TOYOUR CLA|Kl.OR(B)$5.00OUBD(OR -THE E[}U|VALENT|N LOCAL CURRENCY! REGARDLESS C}FVVHETHERVVEOROUR L|CENS[}RS[)R &E�RV|CE PROVIDERS HAVE BEENADVISED [}FTHE PC}SS0LITYC>FTHOSE DANlA(,�ESAN[) REGARDLESS OFyVHETHER ANY REMEDY FATS {]F|TSESSENT|ALPURP{JSEAHESE =ATC)NBOF LJAB|L|TY|M THIS SEC-1 ON 11j VV|LLNOT/\PPL`yT{](A)VMVVARE'S |NDEKHN|F|CAT|(]N[}BL|GA TlCJNBUNDER TH|3/lGREEKTENT{JR(B)ANY L|/\B|LdTYVVH0H MAY NOTBEEXCLUDED BYAPPLJCABLELAVV, I t2FmdllerLkmhtmtioms.(]ur|icenaonsand samke providenswi||have no|iabiUtyofany kindunder this Agnaeme,You may noLbring ecWhiun4erLhiaAgnaementmonaban eighhaen 08)mmntha aRwrAhecause ofaobonaheea, 12. ConhdenUal [mfmrnnaHon. '12 1 IDrot(��cflon.A party mayune Cmlldwnbe| |nforn�odon of�he0herparly so|rfly to exe|rriaeita rightaand peifornitsob|ighdonaunderNis Agreementorosoihamv|mepermi�edunderUhia /\greemeKEach padywill d|mo|oseM�eCongdenUo||nformoUonoftheothmrpnyon|ytoLhc, wmp|oyee&. aerv|oe proviclers oroonboMore of Me nedpieni parlysho h�ve a need tm knovvUhE., Conhidend4|nformaUonfor purpoeeaoNhK Agreementand w/hoareunderadutyQ>onfidenUdih/ no|eaareaMcUxe than each pmy'edulhereundor,Each par�:ym/iUusereeamnoNecam uoproipc�, tecon[idendeNymfteoterparty'sConfidenha||nform�bon, lZ2 Excqghns.Thenaoiphnt'soNigatiunaunderSection12.1vvidhneoiX)ottoany{Aonfidentie| information siUternnina0a if the reoipienLoan Show bym/lntten reoorda the informadon. a|naady known to the reoip|entmtthe time ofdimo|omune bythe o�herpooiy� (b) vvaa UhsdoSed hothe reoipientbyathirdply whohad theright bomake the discoourewithout any non[idenUa|ity nanMdionx (�) ia, or through no fau|tof die maoiphnihao bemzrno. QeneraUy amsi|ab|e tm d7epub|io: or(d)was inkependonMydeno|oped by the rec[lenlwU outaocesahon oruse of. dia000ero CoNdenbm||nfonmadon.TherecipWnLRoy dimobseCmnfldentia|Information toHheoutentam, diso|oaureienaguiredbyWin ornalu|edon,ThemacipientvviUpellrt),,nodne.vvhen jonscdoeb|e, and vvU Iake reasoneb|e ahpa to conbaot and |imit the same of any nequineddisdmmune. Agreement No. 7434 13A Ass ignnment.Youmay not ask gnorbynsferthisAqnser ent.inwho|morinpart.byopensUonof |aWmrothE�rWisC.ov|thoutour priorvvraenconaen.Any a Remy hedask gnmentorVanofervuiWut th�)toon�:�f,'ntvviUbevoki,Gur)�ec±tmtheso,|imiba.thioA4nsemenLvviUbind andinurekothe ben��tof theparties enddheirrespeo1iveounceemonsand aasigno� 132 hmtice&Any nodoede|ivanedbyuotoyou underWimAgnaenlentvviUbedeUver(dbyemai|ho dheemMaddress asmmdetedv�UhyouracmuntorbypoaiingmnWar Lhe Sen/keOKerngFWAor Me MyVMsare MANi eXoeptos othenmioe set&zdh in NsAgneememL P|eaaedire(,tWga| nmducoor other oomaopondenoe to Wilwane. Ina, 3401 HU|viem&venue. Palo AU, Ce|ifmmW 943D4. United SAW ofAme�4a./\ttenUon:Lega|Depariment. 1&3NWdMcMioms.VVc.�mmyWye periodioWUytheSemioeONering,the termaofyour acnessto theServioeOfforing.thisAgneement.teSemiueOemcription.TeF"hvaoyAddendum,thoThird PanyTerms.LhaSon/ioeLeve|/4greement.oram) Suppot PoUoy, Itis your r(�,oponmibi|itytoregu|ady check theSen/ioeC)5wingoonao|e and theMyV0warmportAfor updates. VVevviUnotify youof�ny matena|.W/nuente|(,hangebzLhisAgreoment.the Ben/ioeOeocription.the ��macyAdd�ndum.th� SemioeLeve|/\greement,orthe SuppmdWUicyThemodNed/\gnaoment.SmrKeDeaotpdi�n. PrivacyAddendum, SemioeLeve|Agreement, mrSupport asapp|ioab/e.vviUbecomeeffeciixe aoofthedaLestated inTiatnc�)bNcation,|fwenuke amaWriA.detrimont�|ohengetic) the Sen/ioe [>ffehng(othOrLhanwe terminedonor mmdificationof any bstaKeituneorfunrfiona|ity),thia Agmemeni.LhcBerviceDeaoription.MePr|vocyAddendum.LheServ|oisLove|/\greemenLorLhe SupportPo|ioy.WnyoumoykrminaieLhioAgreiamentvvk.hin3Odays ofthechangc to the Service Offering orm/ithin 30 days of the noUhioaU*n, In thet evE)nt, the bsrmnnobon wiN be effecLive as ofthe, date we nao2ive yomr notiWiioM um|ees you oLeLeen effective date in yournotifiooLion Lhetiawithin 4 5 days after we receive your Wkationn In the evmH of tat temAnatlon, we %AJH refund any frepaid fees, pro-natedfro the nemo|ndero5your Suboor4NonTemi and less @nydisoounNthKwould hisn not becarned, Your oonUnueduoemf4eSorvko0feringo�erthe *ffeobvedate ofenymodif|�ation to de Agnainmant,thE.1 Service ��)emoription.ihoPdvaoyAddendum.iheThdrdP��yTerma.th� Service Load &gneemenL.orLho SuppooPo|icyvviUbedeenledaooeptanueofthemoddedtemno.as app|kable, 13.4MMINimnThe vvaiverofabnsaohofanypnov|eiioncJ�hisAgreemeMvviUnoLoonsdtu8eameiver ofany other provlsionorany |o&arbreach, W5 SevemeblRy, If any pnovioion Wh|sAgnuomenLio h6d ho be inwa|id mrunenforoeab|e.thw, provia|on wiU be enfon:ed to the maximum extent penmioib|e so as to effcicA. ih� intent ofLhoparties, and the mamakinQ provisions ofUhie AgreemantwiU namWn in hovce. 13.6 Commphanoe n= Laws; Expad ContmmU. Eaoh pany vvM comp|y vvith at W*a appUoab|e to the �chona oontemp|ated by Mnio AgneemW You aoknoW|edge bha� the Service [HAring is ofUni0ad SWhae ohgin. is prodded subjecLhz the UES. Wpok AdminishnaiKon Regulations 'indud|ng^deemed export' and "deemed re-expod regu|atimna). and may be auL)�eoLto the expottoonVo| laws of We Hpp|ivaWe &anitory, You napoesentand vvarrmnt#lat you an(." not and ans not aciing on behAfof. (1) any person mho is a Nzen, national, or WWI of, orwhu is coniroUed by dhe governmentof any country ho whioh the Unihed Sbsbss has pnohibited export aanoaot�ons� or (2) eny porson orendty Whed on He J& Treasury DeparLirn�nt |iot ofSpebaUy Desiqnated Natimna/s and B|oo�edPenaon�. orU,,S. Commerce Departrrlenq Denied Persona LisLmr EnUh/ 1 64 (b) you vviU not penniLthe Service Offering to be used for any purpooes pnnhibbed byJavv� �ndudmg anypnohibited deve|mpmk:,,nL, design' manu[aclure orprodu,tion ofmism||ea mrnoo|ear. chemioe| orbio|mQios| weapons (o) Your ConhentvviU noL b� (.�asmifed or |iehvd on Uhe United S&a0ea K8unit4o1na |iat.00nta|n defensear|m|ee.defnaes�r�oesoroonbnin|TAIRI-reWeddaba;(d)YourContentwiUnot reguinsENn exportUmsnse and ionot nesUictedTom empont toany VVWwaneg|oba|neoouroe,orpersonne|und�r app|iosb|e eqpot roAroHaws and 01 you are not subIioct, either dire("t]y or indineotJy1 to anyon1er Agreement No. 7434 Qued by any agenny cfUhe Uni0ed Wes govennmwnt revohing ordenying. in who|e orin pat your Uni&adWes export phWQee.You vviUnobh/VK8wamaimmediahe|yifyombleoome subjec±Uoany oudhonder, U?'Gxmveirnmmeint RegUUatk)ins.ForpuMoaesnfoa|estm0mwennmentendrieeintheUS,:The SapvioaOfe�ng and ibadmwumenUtionare deemedhobe^oommenri1)|gompu&ersoft.%vena"and ^oommomia� oompubar ooftvvaoe dooumenf:adon'^ neopecdma|y. punauanLho DFARS Seckn22T72D2 and FAR Panagnsph 12.212(by as app|Qob|e�Any rise, mod|fioobon, rmpno�uotion,re/e���. penfmmning, diop|aying ordioc|mminQ of Me Gemioe C}Wing and doounientaUon by or on bmhmKofih� U,S, Goxernmontm/N be gomarned aoWy by the terms and oonditionn; ofthia/\gnmoment, 118 FomaMReUme''I'Vev/Unot behab|efor any de|ayorfa�uretoperkumnany ob|oadonounder this AQreamentdue toany causabeyond ouroeasomab|eoontro.inuhudinQeotsofGod, |abor d|spuhesorother industho|disturbanoes.oyshmioedecthok&a|eammunOeUonoorOver ud|ity fAi|urem.earthquakes, storms mrother e|ementaofnature.b|ookagOo,embmrgoea.ho%act mr orders of governmenL.acts ofterroirismorvvar, 131 CkcstuctJon.TheheadingaofmeoLimnaofthisAgreemmntan, for oonvenienoeand are noVmr use m intarpnedng this AUreoment. As used in this /\greem=L. TO wnrd 1nC|uding' means'1nc|uding but not UnnHedLo," Ul 0 Govwmkg Law. TVAgreementis governed by the |�ameofUhe Sbahe ofCa|iforn�a.Unitied Slates ofAmehoa (exiduding its uonMict of rAeoy except as ha||ovvs: To the extant Lhetymu choose, aJapandata oenbarService [}inrehnQ'LhenthiaAgneementisgovennedbyihe|awmorJapan (exciudinQits conOotofWvvnu|eo)The UAW NabonsConvenUonforthe |n&mnnat|ona|Ste of Goods doegnot app|y, 1111 Thkd Pardy R�g�ifte.Uthertan aoerpnaas|ysetoutinWioAgreement.thisAgreemenLdoes noLoreahaanyrighbsforanypersonmhvimnotapadykoit.mndnopersonm/hoisnmtaportytr�this Agreemen1meyenforce any ofitatennsmrreyonanyeXc|uaionorHmn,3doncontained init, 13,12 Order of t�lmecedence Theterms ofUlioAgneemen|w|Uoupenaedeand ozntro|own any oonWngoroddiUona|Mmnaand oonditionsof any oUherpun:haoingre|oteddoroumentQuedby you, 1113 EmUnmAgmammn=ThioAgnaemenLaam�:I)berevised byue.ioMe endreagreementofthe pHrUeoregarding |bgsutrieoLmalterThis 4QnsomenLsuperoedesaUphororconLemponaneous communio�Uono.undeirsLandings and agneemenLa.vvhe\herwriiLenorons|,bebweenLheperdes nejordingiLssuNeilmoWer, 14. 0efimdbans, W Wonhdemb4UUinfornmmflom'`meanmnon-pubk,LeohnioN.buineasorotherh�fmrmadonm' rnakdAs dhdosod or othwvAse made avvdiakde by one party that am in WOW furn owd Abided ''conikentw|''ortheHQor.informWionvvhiohisprovidedunder oircums[annesreasoneb|yindioedng heir ooddenda||ty.OurConddenUe|Infomlat0iino|udem:(1)LoginCredentiah; and infonnedonormabahakre|eUng8othe Smmine()ffehnQ, 14,,2 idirigement Claim" means any third party rJairin that any VNImare Saftware, ussed topjrq vide UneGemioeWrnginfhngeaany paQnLUn*WwrkoroopyhghiofLhe flh/rdparty, or m|oappropriateootrade seoret(buLWytothe extent thotMemimpproprietionianot an*mu|tofyour ootiono)under hhc,|evvauf�(a)the UnitedStatee�(b)Canada; (o)the EuropoanEoonomioA/*y(d) Agreement No. 7434 countries are part of your places of use of the Service Offering. 14.3 "Intellectual Property Rights" means all worldwide intellectual property rights, including copyrights, trademarks, service marks, trade secrets; patents, patent applications, and moral rights, whether registered or unregistered. 14.4 "Login Credentials"mean any passwords, authentication keys or security credentialsthat enable your access to and management of the Service Offering. 14.5 "Order" means the internet order page, order document, purchase order, or purchase agreement issued to VMware that specifies your purchase of the Service Offering. 14.6 "Privacy Addendum" means the then -current version of the Service Offering Data Privacy Addendum dOCUrnent available at http://vcloud.vmware.com/legal, which we may modify from timeto time. 14.7 "Service Description" means the then -current Service Offering Service Description document available at hftps://www.vmware.com/files/pdf/vcloud-air/vcloud-air-Service-Description.pdf, which contains technical and other information and which we may modify from time to time. 14.8 "Service Level Agreement" means the then -current Service Level Agreement document available at https://www.vmware.com/supporUvcloud-air/sla.html. which we may modify from time to time. 14.9 "Subscription Term" means the time period of your access to the Service Offering. as specified by your Order. 14.10 "Support Policy" means the then -current version of the Service Offering Support Policy document available at hftp://www.vmware.com/support/services/iaas-production.html, which we may modify from time to time. 14.11 "Third Party Content' means third party data, service, content, software orapplications, including open source software. 14.12 "Third Party Terms" means the then -current version of the third party licenseterms applicable to the Service Offering that are available at https://www.vmware.com/files/pdf/support/vmware-vcloud-air-third-party-terms.pdf, which wemay modify from time to time. 14.14 "VMware Software" means the software programs listed in our commercial price list. 14.15 "Your Content' means any and all applications, files. information, data or othercontent uploaded to or published or displayed through the Service Offering by you, your users: us (acting upon your instructions as part of a service), or any third party users who access any service you provide with the Service Offering.