ࡱ> g PbjbjVV Mr<r<kMgg@u@u   $DDDP`<DRX ďsl ߮`R R R R R R R$rU$X-R @٤-R@uz ďBR}}}~Rď ďR}R}}~"yď}= \QXR0R X1LXyyX w|A}-R-R}RXg t:  Contents  TOC \o "1-3" \h \z \u  HYPERLINK \l "_Toc367179742" 1 Background and context  PAGEREF _Toc367179742 \h 3  HYPERLINK \l "_Toc367179743" 2 Scope of this paper  PAGEREF _Toc367179743 \h 4  HYPERLINK \l "_Toc367179744" 3 Freedom of expression and the Internet  PAGEREF _Toc367179744 \h 5  HYPERLINK \l "_Toc367179745" 3.1 Freedom of expression in human rights theory  PAGEREF _Toc367179745 \h 5  HYPERLINK \l "_Toc367179746" 3.2 Freedom of expression and information in Australian law  PAGEREF _Toc367179746 \h 6  HYPERLINK \l "_Toc367179747" 3.3 Right to freedom of expression and information in human rights instruments  PAGEREF _Toc367179747 \h 7  HYPERLINK \l "_Toc367179748" 4 Permissible limitations of the ICCPR right to freedom of expression  PAGEREF _Toc367179748 \h 7  HYPERLINK \l "_Toc367179753" 4.1 Provided by law  PAGEREF _Toc367179753 \h 8  HYPERLINK \l "_Toc367179754" 4.2 Permissible purposes  PAGEREF _Toc367179754 \h 8  HYPERLINK \l "_Toc367179755" (a) Respect for the rights or reputations of others  PAGEREF _Toc367179755 \h 8  HYPERLINK \l "_Toc367179756" (b) Public morals  PAGEREF _Toc367179756 \h 11  HYPERLINK \l "_Toc367179757" (c) Public order  PAGEREF _Toc367179757 \h 12  HYPERLINK \l "_Toc367179758" 4.3 Restrictions must be necessary for a permitted purpose  PAGEREF _Toc367179758 \h 12  HYPERLINK \l "_Toc367179759" 5 Current issues of Internet censorship: bullying, discrimination, harassment and freedom of expression  PAGEREF _Toc367179759 \h 13  HYPERLINK \l "_Toc367179760" 5.1 Cyber-bullying  PAGEREF _Toc367179760 \h 13  HYPERLINK \l "_Toc367179761" 5.2 Cyber-racism  PAGEREF _Toc367179761 \h 14  HYPERLINK \l "_Toc367179762" 5.3 Cyber-sexism/sexual harassment  PAGEREF _Toc367179762 \h 14  HYPERLINK \l "_Toc367179763" 5.4 Cyber-homophobia  PAGEREF _Toc367179763 \h 14  HYPERLINK \l "_Toc367179764" 6 Some regulatory challenges  PAGEREF _Toc367179764 \h 15  HYPERLINK \l "_Toc367179765" 6.1 Balancing of rights  PAGEREF _Toc367179765 \h 15  HYPERLINK \l "_Toc367179766" 6.2 Permanency  PAGEREF _Toc367179766 \h 16  HYPERLINK \l "_Toc367179767" 6.3 Ubiquity  PAGEREF _Toc367179767 \h 16  HYPERLINK \l "_Toc367179768" 6.4 Anonymity  PAGEREF _Toc367179768 \h 17  HYPERLINK \l "_Toc367179769" 6.5 Issues with law enforcement  PAGEREF _Toc367179769 \h 18  HYPERLINK \l "_Toc367179770" 7 Are current regulatory responses sufficient and appropriate?  PAGEREF _Toc367179770 \h 19  HYPERLINK \l "_Toc367179771" 7.1 Federal anti-discrimination laws  PAGEREF _Toc367179771 \h 19  HYPERLINK \l "_Toc367179772" 7.2 Regulation of offensive behaviour  PAGEREF _Toc367179772 \h 20  HYPERLINK \l "_Toc367179773" (a) Overview  PAGEREF _Toc367179773 \h 20  HYPERLINK \l "_Toc367179774" (b) Regulation of workplace (cyber)bullying  PAGEREF _Toc367179774 \h 21  HYPERLINK \l "_Toc367179775" (c) Regulation of Internet providers and content hosts  PAGEREF _Toc367179775 \h 21  HYPERLINK \l "_Toc367179776" (d) Regulation of producers of content and upload of/access to content  PAGEREF _Toc367179776 \h 23  HYPERLINK \l "_Toc367179777" 7.3 International (cross-jurisdictional) regulatory initiatives  PAGEREF _Toc367179777 \h 24  HYPERLINK \l "_Toc367179778" 7.4 Non-legislative initiatives  PAGEREF _Toc367179778 \h 24  HYPERLINK \l "_Toc367179779" 7.5 Other proposals for responding to discrimination, harassment and hate speech online  PAGEREF _Toc367179779 \h 25  HYPERLINK \l "_Toc367179780" (a) Legislative reform  PAGEREF _Toc367179780 \h 25  HYPERLINK \l "_Toc367179781" (b) Other measures  PAGEREF _Toc367179781 \h 26  HYPERLINK \l "_Toc367179782" 8 A right to access the Internet  PAGEREF _Toc367179782 \h 27  HYPERLINK \l "_Toc367179787" 8.1 At the international level  PAGEREF _Toc367179787 \h 27  HYPERLINK \l "_Toc367179788" 8.2 At the domestic level  PAGEREF _Toc367179788 \h 29  HYPERLINK \l "_Toc367179789" 9 Conclusion  PAGEREF _Toc367179789 \h 30  HYPERLINK \l "_Toc367179790" 10 Questions for discussion  PAGEREF _Toc367179790 \h 31  HYPERLINK \l "_Toc367179793" 10.1 Addressing discrimination in terms of access to (and use of) the Internet  PAGEREF _Toc367179793 \h 31  HYPERLINK \l "_Toc367179794" 10.2 Balancing rights online  PAGEREF _Toc367179794 \h 32  HYPERLINK \l "_Toc367179795" 11 Further information  PAGEREF _Toc367179795 \h 32  Background and context The Internet has been in existence since the 1960s, and the World Wide Web since the 1990s. Cyberspace, however, remains a relatively new terrain in terms of the questions it raises about human rights and responsibilities. The International Telecommunication Union estimates that almost 40% of the worlds population, and over 76% of people in developed countries, are now internet users. Government, businesses, and organisations in civil society are increasingly using cyberspace platforms in the communication of information and the delivery of services. More than any previous communication medium, the Internet also offers individuals the ability to be active publishers of information on a large scale, rather than only recipients. Accordingly, the Internet has become a major vehicle for the exercise of the right to freedom of expression and information. The International Covenant on Civil and Political Rights (ICCPR) states (in article 19(2)): Everyone shall have the right to freedom of expression; this right shall include freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in writing or in print, in the form of art, or through any other media of his choice. The United Nations Human Rights Committee (HRC) has provided extensive commentary on this article in its General Comment number 34: Freedoms of opinion and expression.  The HRC has stated that the freedoms of expression and information under article 19 of the ICCPR include the freedom to receive and communicate information, ideas and opinions through the Internet. Article 19(3) provides that: The exercise of the rights provided for in paragraph 2 of this article carries with it special duties and responsibilities. It may therefore be subject to certain restrictions, but these shall only be such as are provided by law and are necessary: (a) For respect of the rights or reputations of others; (b) For the protection of national security or of public order (ordre public), or of public health or morals. This means that (like many other rights) the right to freedom of information must be balanced with other rights. The UN Human Rights Council has stated that the same rights that people have offline must also be protected online (mentioning in particular freedom of expression). Laws seeking to balance rights and responsibilities often distinguish between public and private conduct. The rapid development of the Internet in terms of its use in daily life has blurred these lines. People are increasingly using the Internet for activities that they would perceive to be private communications (i.e. staying in touch with friends, family, social groups). However, defamation law, for example, requires only that a person be identified in material which is established to be defamatory, and that the material be published (communicated to someone other than the aggrieved person). Publishing can no longer be thought of as restricted to traditionally off-line mediums such as newspapers, television, radio broadcasts, books, posters or handbills. Arguably every time anything is posted on the Internet it constitutes an act of publication for the purposes of defamation. One question is: are peoples expectations of privacy different in cyberspace because they are using an online medium, or does it depend on the context? Anti-discrimination laws identify and apply to specified areas of public life (e.g. employment; accommodation; education; provision of good and services). These areas have themselves been rapidly expanded by the use and application of the Internet in employment and education, as well as in the delivery of goods and services. But what about activities which do not necessarily fall within a public area in themselves, but might be considered public because they are conducted through the Internet? In the case of discrimination conducted through the Internet, even where public behaviours are identified, there is a question whether the person or people responsible can be identified. Further, how can rules in anti-discrimination or other laws be enforced in relation to conduct on the Internet where there are questions about where the act complained of occurred? The premise of this paper is that the creation of the Internet has not unleashed a set of new behaviours rather it largely reproduces pre-existing behaviours within an online medium. What has changed is the impact of these behaviours, and challenges regarding the regulation of such behaviours. Scope of this paper This paper is intended to contribute to discussion; it is not intended to comprehensively or conclusively cover all issues surrounding human rights in cyberspace. The 鱨վ (Commission) has worked and continues to working on a range of human rights issues connected with the Internet, including access and accessibility for people with disability access and online safety for older Australians racial discrimination and vilification in online environments sexual harassment over the Internet cyber safety for children and cyber-bullying online safety in Indigenous communities The Commissions has also been conducting a series of RightsTalks seminars on human rights and the Internet. Links to the full range of activities by the Commission on issues of human rights and cyberspace are available on our project page on human rights and the internet. In this paper three issues in particular are raised for consideration: freedom of expression and Internet censorship effective responses to racism, sexism, sexual harassment and homophobia on the Internet rights to access the Internet. Freedom of expression and the Internet The Internet has opened up new possibilities for the realisation of the right to freedom of expression. This is due to the Internets unique characteristics, including its speed, worldwide reach and relative anonymity. These distinctive features have enabled individuals to use the Internet to disseminate information in real time, and to mobilise people. The United Nations Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression (Special Rapporteur) asserts that: Unlike any other medium the Internet facilitated the ability of individuals to seek, receive and impart information and ideas of all kinds instantaneously and inexpensively across national borders. By vastly expanding the capacity of individuals to enjoy their right to freedom of opinion and expression, which is an enabler of other human rights, the Internet boosts economic, social and political development, and contributes to the progress of humankind as a whole. Insofar as freedom of expression is concerned, the Internet presents a compelling platform for the decentralising of information and of institutional control at its best it acts as a leveller to access to knowledge. However, as the Special Rapporteur acknowledges, like all technological inventions, the Internet can be misused to cause harm to others. Freedom of expression in human rights theory The right to freedom of expression is deeply rooted in historical thought and underpinned by a number of largely interdependent rationales. Of these is the truth rationale where true opinion can be identified, and false ideas exposed through criticism a process facilitated by a free-flowing marketplace of ideas. The democratic rationale identifies freedom of expression as necessary for the functioning of a truly representative government. The HRC has emphasised the importance of press and media freedom for a democratic society: A free, uncensored and unhindered press or other media is essential in any society to ensure freedom of opinion and expression and the enjoyment of other Covenant rights. It constitutes one of the cornerstones of a democratic society. The free communication of information and ideas about public and political issues between citizens, candidates and elected representatives is essential. This implies a free press and other media able to comment on public issues without censorship or restraint and to inform public opinion. The public also has a corresponding right to receive media output. A core rationale for freedom of expression is the self-determination rationale, in which free speech is conceived of as an aspect of self-realisation and individual autonomy. The ability to relate our thoughts and experiences is seen as an intrinsic part of being human, and therefore restrictions on this ability are viewed as inhibiting both individual autonomy and the ability to attain self-fulfilment. In this vein, the HRC has also noted that freedom of information and expression, while central to democratic governance, is not restricted to political information and expression; it includes the expression and receipt of communications of every form of idea and opinion capable of transmission to others, subject to the provisions in article 19, paragraph 3, and article 20. It includes political discourse, commentary on ones own and on public affairs, canvassing, discussion of human rights, journalism, cultural and artistic expression, teaching, and religious discourse. It may also include commercial advertising. Accordingly, the right to freedom of expression has been described as an enabler of other rights such as economic, social and cultural rights (i.e. rights to education and to take part in cultural life) as well as civil and political rights (i.e. rights to freedom of association and assembly). Freedom of expression and information in Australian law In Australia there is no express Constitutional or legislative protection of the freedom of expression at the federal level (in contrast to human rights legislation in force in the ACT and Victoria), Despite this, the courts have an important role in interpreting legislation consistently with human rights where possible. Although not expressly protected at a federal level, freedom of expression does enjoy some implied and residual protection. The Australian High Court has held that an implied freedom of political communication is an indispensable incident of the system of representative government which the Constitution creates.  The freedom of political communication found by the High Court to be implicit in the Constitution is unlikely to have the same breadth of subject matter as article 19(2) of the ICCPR, insofar as the latter goes beyond political matters. However, the very fact of restrictions being placed on freedom of expression on other subjects including on grounds such as decency - may in some instances itself give the restricted or prohibited expression the status of political communication. A number of potential restrictions on the right to freedom of expression are contemplated by Australian laws, including in laws on sedition; national security; telecommunications; racial hatred; copyright; defamation; perjury; contempt of court; fraud; privacy, and censorship in classification and broadcasting. A number of these laws are based on valid grounds for restriction referred to in article 19(3) of the ICCPR. However, questions remain as to whether some of these laws would meet the levels of transparency and proportionality required by article 19(3). These questions raise broader concerns about censorship and the Internet. In particular, the Special Rapporteur notes the use of arbitrary blocking or filtering of content where such mechanisms are used to regulate and censor information on the Internet, with multi-layered controls that are often hidden from the public. An example of such a system close to home was the Australian Governments now discontinued mandatory Internet filtering proposal. This attracted wide-ranging criticism as providing broad and imprecisely defined parameters on what constituted refused classification materials, resulting in websites being captured by the filter which were described by critics of the proposal as relatively innocuous. As the Special Rapporteur points out, excessive censoring can occur where the specific conditions that justify blocking are not established in law or are legislated for in an overly broad and vague manner. In addition, even where justification for blocking exists, blocking measures may constitute a disproportionate means to achieving the purported aim, and content may frequently be blocked without the possibility of judicial or independent review. This situation requires the balancing of freedom of expression against other rights and considerations that should be taken into account in achieving the appropriate balance. Right to freedom of expression and information in human rights instruments Human rights for the purposes of the Commissions work include the rights and freedoms recognised in the ICCPR, including the right to freedom of expression and information in article 19. As discussed on the Commissions webpage on the right to freedom of information, opinion and expression, this right is also recognised and expanded on in the Convention on the Rights of the Child (CRC) and the Convention on the Rights of Persons with Disabilities. Freedom of expression and information is also recognised in article 19 of the Universal Declaration of Human Rights. The following discussion will focus on the right to freedom of expression as recognised by article 19 of the ICCPR. Permissible limitations of the ICCPR right to freedom of expression As noted above, article 19(3) of the ICCPR permits limitations on the rights recognised in article 19(2), but those limitations must be: (1) provided by law and (2) necessary for respect of the rights or reputations of others, for the protection of national security, public order, or public health or morals. The HRC in its General Comment 34 has emphasised that: when a State party imposes restrictions on the exercise of freedom of expression, these may not put in jeopardy the right itselfthe relation between right and restriction and between norm and exception must not be reversed.  Australias Joint Parliamentary Committee on Human Rights has similarly made the point that: Given the fundamental nature of this right, international human rights bodies have scrutinised with great care any limitations on freedom of expression, including the introduction of regulatory schemes for media. They have insisted that States demonstrate convincingly the need for measures which prevent or restrict the operation of a free and independent media, and have been especially concerned about content-based restrictions and restrictions which might inhibit the expression of views that contribute to public and political debate.  The HRC further stated that: Paragraph 3 lays down specific conditions and it is only subject to these conditions that restrictions may be imposed: the restrictions must be provided by law; they may only be imposed for one of the grounds set out in subparagraphs (a) and (b) of paragraph 3; and they must conform to the strict tests of necessity and proportionalityRestrictions must be applied only for those purposes for which they were prescribed and must be directly related to the specific need on which they are predicated. Provided by law The requirement for limitations regarding freedom of information and expression to be provided by law is an important guarantee of the rule of law. It includes a formal requirement of legality - that is, that there be a legal basis for restrictions. It also includes substantive requirements. The HRC has noted: For the purposes of paragraph 3, a norm, to be characterized as a law, must be formulated with sufficient precision to enable an individual to regulate his or her conduct accordingly and it must be made accessible to the public. A law may not confer unfettered discretion for the restriction of freedom of expression on those charged with its execution. Laws must provide sufficient guidance to those charged with their execution to enable them to ascertain what sorts of expression are properly restricted and what sorts are not.  Permissible purposes Respect for the rights or reputations of others Article 19(3) provides that freedom of expression may be limited where those limitations can be demonstrated to be necessary for ensuring respect for the rights and reputations of others. A range of rights may present possible justifications for limitations on freedom of expression through the internet, including: freedom from discrimination (article 2 of the ICCPR) freedom from cruel, inhuman or degrading treatment (article 7 of the ICCPR and article 37(a) of the CRC) the right of children to special protection (article 24 of the ICCPR and article 3 of the CRC) freedom from arbitrary interference with home, family, correspondence or reputation privacy (article 17 of the ICCPR). Whether particular restrictions on freedom of expression which are designed to protect these rights are justifiable will depend on more specific consideration of the restrictions concerned and the circumstances. Freedom from discrimination Article 2(1) of the ICCPR requires parties to ensure the rights contained in that covenant to all individuals without distinction of any kind, such as race, colour, sex, language, religion, political or other opinion, national or social origin, property, birth or other status. Article 2(2) of the International Covenant on Economic, Social and Cultural Rights (ICESCR) is to similar effect. In addition, article 26 of the ICCPR states that: the law shall prohibit any discrimination and guarantee to all persons equal and effective protection against discrimination on any ground such as race, colour, sex, language, religion, political or other opinion, national or social origin, property, birth or other status. Article 20 of the ICCPR further states that [a]ny advocacy of national, racial or religious hatred that constitutes incitement to discrimination, hostility or violence shall be prohibited by law. It should be noted that Australia has made (and maintains) the following interpretative declaration and reservation regarding article 20: Australia interprets the rights provided for by articles 19, 21 and 22 as consistent with article 20; accordingly, the Commonwealth and the constituent States, having legislated with respect to the subject matter of the article in matters of practical concern in the interest of public order (ordre public), the right is reserved not to introduce any further legislative provision on these matters. The HRC has similarly indicated that article 20 of the ICCPR is required to be interpreted consistently with article 19: Articles 19 and 20 are compatible with and complement each other. The acts that are addressed in article 20 are all subject to restriction pursuant to article 19, paragraph 3. As such, a limitation that is justified on the basis of article 20 must also comply with article 19, paragraph 3. The principal provision in federal law which is intended to address the requirements of article 20 of the ICCPR is s 18C of the Racial Discrimination Act 1975 (Cth) (RDA). Section 18C provides: It is unlawful for a person to do an act, otherwise than in private, if: the act is reasonably likely, in all the circumstances, to offend, insult, humiliate or intimidate another person or a group of people; and the act is done because of the race, colour or national or ethnic origin of the other person or of some or all of the people in the group. However, the application of s 18C of the RDA is subject to a wide range of exceptions (set out in s 18D) for things said or done reasonably and in good faith. The protection against discrimination which is required by articles 2 and 26 of the ICCPR includes a broader range of grounds than are currently covered by any vilification provisions (such as 18C) under Australian anti-discrimination law. Any further legislation to implement articles 2 and 26 which restricted the right to freedom of expression would have to meet the requirements of ICCPR Article 19(3), including the requirements of necessity and proportionality. In order to avoid impermissible limitations of the right to freedom of expression and information, particular caution would be required in the design and administration of any provisions addressing vilification on the basis of religion or belief. The Human Rights Committee has indicated: Prohibitions of displays of lack of respect for a religion or other belief system, including blasphemy laws, are incompatible with the Covenant, except in the specific circumstances envisaged in article 20, paragraph 2, of the Covenant. Freedom from cruel, inhuman and degrading treatment Article 7 of the ICCPR provides that [n]o one shall be subject to torture or to cruel, inhuman or degrading treatment or punishment. The right to be free from the types of ill-treatment listed in article 7 is not confined to actions affecting people in prison, in detention or in institutional environments; nor is it confined to actions by or on behalf of the State itself. The Commissions strategic priorities include violence, harassment and bullying. Bullying in particular can be regarded as conduct (in whatever context) which could in more technical terms be referred to as cruel, inhuman or degrading. The specific right of children to be free from cruel, inhuman or degrading treatment is recognised in article 37(a) of the CRC. The Committee on the Rights of the Child has described cruel inhuman or degrading treatment in relation to children as including treatment which belittles, humiliates, denigrates, scapegoats, threatens, scares or ridicules the child. Any measure which is designed to protect children from being bullied over the Internet needs to balance: the CRCs interpretation of the right to protection from cruel, inhuman or degrading treatment (which the Commission endorses in relation to children), and the rights to freedom of expression and information (including for children- see article 13 of the CRC), and the requirement that any restrictions of those rights be provided by law and necessary and proportionate. Right of children to special protection Higher levels of restrictions on the right to freedom of expression and information, as engaged by conduct affecting children, may be justifiable having regard to the rights of children to special protection under the CRC. Article 24 of the ICCPR states that children are entitled to necessary measures of protection, on the part of their families, society and the State. Article 3(2) of the CRC requires States parties to ensure for children such care and protection as is necessary for their well-being, and take all necessary legislative and administrative measures to achieve this. In this regard, article 17 of the CRC, which recognises the importance for children of access to information and material through the mass media, requires States parties to (among other things): Encourage the development of appropriate guidelines for the protection of the child from information and material injurious to his or her well-being, bearing in mind the provisions of articles 13 [freedom of information and expression] and 18 [recognition of responsibilities of family]. In summary, while restrictions on access by children to some material on the Internet may be permissible (and in fact regarded as required), governments applying such restrictions are nonetheless required to justify with regard to the criteria for permissible limitations of the right to freedom of expression. Right to privacy, family, home, correspondence, honour and reputation Article 17 of the ICCPR states that: No one shall be subjected to arbitrary or unlawful interference with his privacy, family, home or correspondence, nor to unlawful attacks on his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks. The HRC has indicated its view that this right is required to be guaranteed against all such interferences and attacks whether they emanate from State authorities or from natural or legal persons. However, the Committee has also observed that [a]s all persons live in society, the protection of privacy is necessarily relative. Balancing the rights to privacy and/or protection of reputation with the rights to freedom of information and expression presents challenges. It is clear however that measures to protect these rights which limit freedom of expression and information must comply with the requirements set out in article 19(3) of the ICCPR. Public morals Respect for public morals is a permissible justification for restricting the right to freedom of expression and information, subject to compliance with the conditions provided in 19(3) of the ICCPR. In its General Comment No. 34, the HRC stated: The Committee observed in general comment No. 22, that the concept of morals derives from many social, philosophical and religious traditions; consequently, limitations... for the purpose of protecting morals must be based on principles not deriving exclusively from a single tradition. Any such limitations must be understood in the light of universality of human rights and the principle of non-discrimination. As noted earlier, restrictions on this ground are also required to be sufficiently precise to comply with the requirement that restrictions be provided by law. Public order Article 19(3) permits restrictions aimed at protecting public order (ordre public). The Commission has noted that this concept: is clearly wider than the concept of public order in the sense usually understood in Anglo-Australian law (dealing with prevention of breaches of the peace, offensive behaviour etc). It extends to the sum of rules which ensure the functioning of society or the set of fundamental principles on which society is founded. It equates with the police power in United States jurisprudence, permitting regulation in the interests of legitimate public purposes. This power must itself, however be exercised in a manner consistent with human rights. Restrictions on promotion of unlawful activity would appear to be permissible under this heading (subject to the requirements of necessity and proportionality being met). The HRC has considered this point specifically in relation to counter-terrorism measures such as offences of encouraging, praising or justifying terrorism. Restrictions must be necessary for a permitted purpose The HRC has made clear its view that the requirement under article 19(3) that a measure limiting freedom of information and expression be necessary imposes a substantial burden of justification on government agencies. It has stated that this equates to a requirement that any restrictive measures must conform to the principle of proportionality: they must be appropriate to achieve their protective function; they must be the least intrusive instrument amongst those which might achieve their protective function; they must be proportionate to the interest to be protected The principle of proportionality has to be respected not only in the law that frames the restrictions but also by the administrative and judicial authorities in applying the law. The principle of proportionality must also take account of the form of expression at issue as well as the means of its dissemination. For instance, the value placed by the Covenant upon uninhibited expression is particularly high in the circumstances of public debate in a democratic society concerning figures in the public and political domain. The HRC further stated that: When a State party invokes a legitimate ground for restriction of freedom of expression, it must demonstrate in specific and individualized fashion the precise nature of the threat, and the necessity and proportionality of the specific action taken, in particular by establishing a direct and immediate connection between the expression and the threat. Current issues of Internet censorship: bullying, discrimination, harassment and freedom of expression The Australian media has increasingly reported on a wide-range of issues relating to forms of Internet censorship, including tracing Internet-based child pornography rings; calls to shut down racist memes sites; courts ordering the removal of Facebook hate pages involving suspects of crimes; or calls to regulate bullying or offensive behaviours. Unsurprisingly, discriminatory behaviours that occur off-line in everyday life, also occur online. The Commissions statutory responsibilities regarding discrimination and protection of human rights have required the Commission to focus on behaviours involving the Internet such as cyber-bullying and online racism, sexism/sexual harassment and homophobia. Cyber-bullying Perhaps the most well-known cyber form of offensive behaviour is cyber-bullying. Cyber-bullying can be defined as a person (or a group of people) using technology to repeatedly and intentionally use negative words and/or actions against a person, which causes distress and risks that persons wellbeing. In June 2010 young people aged 14 -17 years old had the highest rate of Internet use in Australia, with 91% spending time online every week. Cyber-bullying affects at least one in ten students in Australia. Cyber-bullying can impact on a range of human rights, including: The right to the highest attainable standard of physical and mental health: Bullying can impact negatively on a persons physical and mental health causing harm in the form of physical injuries, stress-related illnesses, depression and other health issues. Rights to work and fair working conditions: Bullying can lead to higher absenteeism from the workplace, poor or reduced performance and an unsafe working environment. The right to freedom of expression and to hold opinions without interference: Bullying can impact on a persons freedom to express feelings or opinions as they no longer feel safe to do so. A child or young persons right to leisure and play: Bullying often occurs where children and young people play and socialise, such as in school playgrounds and on social networking sites. All children have the right to participate in leisure activities in a safe environment. The United Nations Committee on the Rights of the Child, in its report on Australias compliance with the Convention on the Rights of the Child, raised concerns about bullying and the importance of protecting children and young people from exposure to violence, racism and pornography through mobile phones and other technologies, including the internet. The right to an education (as cyber-bullying it can make a person feel unsafe and unwelcome at school and impact on how well they do). The right to be free from violence, whether physical or mental. Cyber-racism There are many examples of cyber-racism on the Internet, from racist individual Facebook posts to group pages specifically set up for a racist purpose. An example of cyber-racism that gained considerable media notoriety was an Aboriginal memes Facebook page that consisted of various images of Indigenous people with racist captions. It was reported that Facebook had classified this memes page as controversial humour despite the fact it was said to have depicted an entire race of people as inferior drunks who sniff petrol and bludge off welfare. It was further reported that while the creators of the page had ultimately removed the content, Facebook had not deleted the actual page (still classified as controversial humour). Cyber-sexism/sexual harassment Instances of cyber-sexism are similarly numerous. The Commissions Workplace Sexual Harassment Survey of 2012 revealed that 17% of those surveyed had been in receipt of sexually explicit emails and text messages and 4% had experienced repeated/inappropriate advances on email, social networking websites and internet chat rooms. Other examples of cyber-sexism/sexual harassment include creep-shots where men take pictures of intimate body parts of unsuspecting women snapped on the street and load them on to a publicly accessible website.  Another instance of cyber-sexism, which was subject to an online petition, was a page that published photos of young girls posing in pictures that had already been posted on the social media site on their own pages. The pictures were then branded with lewd tags and posted on a page entitled 12-year old sluts. Cyber-homophobia The incidence of homophobic cyber-bullying has increased greatly in recent years with the proliferation of online social networking tools. A homophobic language audit tool has been developed that measures in real time when certain homophobic words are used on Twitter, and keeps a record so that usage can be measured over time. It demonstrates the high rates of casual homophobic language used in every day interactions on Twitter and how common their usage has become. There have been high profile cases of LGBTI young people being bullied and harassed online that have resulted in self-harm and suicide. A much publicised US case on the use of technology in homophobic bullying involved a university student who killed himself shortly after discovering that his roommate had secretly used a webcam to stream his sexually intimate actions with another man over the Internet. As highlighted by the examples listed above, it is clear that the Internet is being used in different ways to facilitate various forms of discrimination and harassment. This raises the question: how do Australian laws respond to and regulate these behaviours? Some regulatory challenges Balancing of rights The challenge of finding the appropriate balance between rights is not one which is specific to the Internet. It is difficult to know if Australian laws that limit freedom of expression in the interests of other rights, or on other permissible grounds, have drawn the line appropriately without a comprehensive review of such laws. In New Zealand, a legislative review undertaken by the New Zealand Law Commission indicated that much of the law is expressed in terms of flexible principle which is technology-neutral and which can work perfectly well in the new environment. But even if these laws cover cyberspace, the question may still remain whether they allow for an appropriate balancing of rights. From a human rights perspective it is clear that any limitation should be assessed against the criteria specified for permissible limitations in article 19(3) of the ICCPR. In looking at, for example, the balance between protecting freedom of expression and prohibiting advocacy of racial hatred, some critics have argued that the vilification provisions contained in s 18C of the RDA set the threshold for the limitation on free speech too low. Others argue that to read s 18C in isolation from the exceptions in s 18D fails to recognise that freedom of expression is adequately protected. While debates will continue as to what is the appropriate balance between freedom of speech and other rights, it should be asked, how does cyberspace change the equation if at all? It is arguable that while the types of behaviours which people engage in online are not new, what has changed is the way these behaviours are manifested online, and consequently the impacts of these behaviours. As the New Zealand Law Commission noted: For the first time in history, individuals with access to basic technology can now publish, anonymously, and with apparent impunity, to a potentially mass audience. This facility to generate, manipulate and disseminate digital information which can be accessed instantaneously and continuously is producing types of abuse which have no precedent or equivalent in the pre-digital world. The New Zealand Law Commission summarised the additional regulatory challenges presented by the Internet as: the viral nature of cyberspace and the potential for information to be disseminated instantly to worldwide audiences the ubiquity of the technology which means communications are no longer constrained by time and place but can be accessed anywhere, anytime by anyone the persistence of information disseminated electronically the ease with which digital information can be accessed/searched and the facility for anonymous communication and the adoption of multiple online personae. These particular features of cyberspace have meant that even where laws are drafted in technology-neutral terms which would cover activities in cyberspace, enforcement challenges exist which in turn raises issues of where to draw the line. These issues are further compounded by a lack of knowledge of the law and/or about the availability of redress on the part of both victims and enforcement officers. These cyber-enforcement challenges are considered in further detail below. Permanency The instant any material is published on the Internet, a snapshot in time archive of the material is created and will remain cached or stored and potentially accessible via web-searches on a likely permanent basis. This process also means the information is searchable and easily capable of duplication. This feature of the Internet can significantly undermine the utility of a court ordering the removal of material from the Internet. For example, in 2012 a Deputy Chief Magistrate ordered that material on the Internet relating to man accused of murdering Jill Meagher be removed prior to his trial, as it was deemed to prejudice the administration of justice. The Deputy Chief Magistrate was reported as stating that while it had been argued that an order to suppress material about the suspect was futile given the anarchic nature of the Internet, the court had to do its best to protect the administration of justice. The Victorian Court of Appeal has acknowledged that: As observed by the High Court in Dow Jones v Gutnick once an item is on the internet it is available to all and sundry without any geographic restrictionthe immediate accessibility of such informationposes substantial challenges for the administration of justice. Ubiquity Another of the unique characteristics of the Internet is the way it facilitates the instant and global dissemination of information. It is this feature in particular that renders the Internet a powerful tool for freedom of expression, resulting in the Internet being attributed with everything from increasing access to information and facilitating active citizen participation in building democratic societies, to being the driving force in accelerating progress towards development in its various forms. Yet with the advantages that global communication offers, also come disadvantages. This is most clearly illustrated by the problem of online defamation. The global reach and instantaneous nature of the Internet means that the potential repercussions of defamatory statements can be far more damaging to a persons reputation than statements published off-line. The Special Rapporteur argues the opposite view, citing the ability of the individual concerned to exercise his/her right of reply instantly to restore the harm caused. However, quite apart from the global damage to an individuals reputation and the variable value of a right to reply, the issue of permanency and caching may mean that a right to reply is of limited value if it is not cached in the same places that the original comment appears on the Internet. The effectiveness of take down notices is also questionable where material is cached on the Internet. Anonymity A further (and related) issue raised by Internet communications is that of anonymity. The Internet offers users an unprecedented ability to communicate anonymously and, if desired, set up multiple personae or online identities. The ability to be anonymous online can have beneficial effects in terms of the realisation of the right to freedom of expression. As the Special Rapporteur states: throughout history, peoples willingness to engage in debate on controversial subjects in the public sphere has always been linked to possibilities for doing so anonymously. The Internet allows individuals to access information and to engage in public debate without having to reveal their real identities, for example through the use of pseudonyms on message boards and chat forums. The Special Rapporteur points to instances where certain States have used popular social networking sites such as Facebook to identify and to track the activities of human rights defenders and opposition members. A number of States are also introducing or modifying existing laws in order to increase their power to monitor the activities and content of Internet users without adequate safeguards against abuse (in terms of who is allowed to access personal data, what it can be used for, how it should be stored, and for how long). However, commentators have also noted that such anonymity can have a disinhibiting effect where people end up saying and doing things online that they would never dream of doing face-to-face. As one academic describes it: people disconnect a little bit and forget that what they are doing is just a continuation of other forms of communication rather than something that is fundamentally different. An example of this disconnect is clearly highlighted in the recent media controversy over cyber-trolls and anonymous abuse. The New Zealand Law Commission cited two examples of anonymous abuse. The first involved female students at Yale Law School, who sued those responsible for a sustained campaign of anonymous sexual harassment launched by a group of young males on the college admissions web forum. The female students contended that the postings about them became etched into the first page of search engine results on their names, costing them prestigious jobs and infecting their relationships with friends and family. The second example involved a 45-year-old British woman in the UK who became the target of abusive behaviour after posting supportive comments about an X Factor contestant on her Facebook page. Anonymous attackers responded by creating a false profile in her name using her picture to post explicit comments and vilifying her. In a landmark case in June 2012, the High Court granted the woman a disclosure order to compel Facebook to reveal the IP addresses and account details of those responsible for posting the offensive content. It should be noted that not all so-called cyber-trolls engage in abusive behaviour, although they usually maintain anonymity as trolling is a game about identity deception. Cyber-trolls are diverse in their aims - some may wish to join a group with the intention of swaying opinions and to sow fear, uncertainty and doubt within the group, or more generally simply to provoke an argument.  While these behaviours can be annoying and unpleasant, they do not necessarily always amount to conduct which would clearly justify a limitation of the trolls right to freedom of expression. The HRC has noted that article 19(2) of the ICCPR embraces even expression that may be regarded as deeply offensive, although such expression may be restricted in accordance with the provisions of article 19, paragraph 3 and article 20. Accordingly, many unpleasant behaviours may be entirely consistent with cyber-trolls right to freedom of expression. But where the actions of cyber-trolls contravene domestic laws and/or are a recognised limitation to the right to freedom of expression, the issue of their anonymity becomes challenging in a regulatory sense. The New Zealand Law Commission identified that anonymous communications on the Internet raised issues for complainants because: the complainant cannot approach the communicator directly to seek redress the complainant may experience particular distress in not knowing where the communications originate from, and the extremity of the communication may be intensified under the cloak of anonymity. Issues with law enforcement The existence of confidentiality agreements between service providers (such as Twitter and Facebook) and users, as well as the potential application of information privacy laws, can hinder the ability of people to access informal solutions in situations where other users have potentially infringed their rights in some way. The New Zealand Law Commission found that while the existing criminal and civil law could deal with many types of harmful digital communications, problems arise where people are required to initiate formal court proceedings in order to compel disclosure. These problems include: legal processes not operating within internet time when information is disseminated virally and globally within minutes the cost of civil proceedings and restrictions on legal aid place access to the civil jurisdiction of the courts beyond the reach of many ordinary citizens and given the evidential and legal complexities that surround litigation of online matters, self-represented litigants face a daunting task difficulties in bringing a criminal prosecution, primarily because the evidence gathering process can be complex and multi-jurisdictional, and police investigative resources are limited. A further obstacle to the effective enforcement of laws in relation to behaviour on the Internet is the cross-jurisdictional nature of online publication. It may be difficult to predict how an Australian court order would or could be enforced on a company or individual based overseas but whose Internet service or site is accessed in Australia. Given the number of major Internet service providers based in the United States, it is instructive to consider the Yahoo! case in 2000, in which the Paris Superior Court rejected the argument that Yahoo! was protected by the First Amendment because it operated out of the US. The French court relied for jurisdiction on the fact that the effects were felt in France, and accordingly ordered Yahoo! to take all measures to prevent French citizens from accessing auction services for Nazi paraphernalia. Yahoo! were given three months to comply with the order or face a penalty of 100,000 Francs (US$13,300) for every day of non-compliance. Yahoo! subsequently won a motion in the United States District Court, with that Court declaring that the French courts order could not be enforced as it would contravene the First Amendment of the US Constitution. The Yahoo! case raises serious doubt about whether Australian court orders regarding behaviour in cyberspace which would involve multiple jurisdictions could be effectively enforced within a country like the United States. For a discussion of some regional and international initiatives designed to try and address obstacles to the effective enforcement of laws targeting cross-jurisdictional criminal activity over the Internet, see section 7.3 below. Are current regulatory responses sufficient and appropriate? Federal anti-discrimination laws Current federal anti-discrimination laws would generally apply to cyberspace to the extent that discriminatory behaviour (or harassment) online relates to a protected attribute, and could be said to have occurred in one of the stipulated areas of public life. This is particularly clear in relation to the prohibition on sexual harassment under the Sex Discrimination Act 1984 (Cth) (SDA), as this Act was amended in 2011 to ensure that online sexual harassment was captured. So, for example, if someone is cyber -sexually harassed at work by a colleague who is using a work computer (or work mobile phone), there would be a strong argument that this situation would be covered by the SDA. Concepts such as the workplace and an education institution have been interpreted to include sufficiently closely related cyberspace within their boundaries. However, within these defined areas of public life, a number of exceptions exist in terms of potential coverage. Further, the areas of public life currently covered by anti-discrimination laws will not necessarily extend to cover purely social or informational contexts. Online socialising through social network sites may be at once both a private and a public activity but is unlikely to fall within the ambit of, for example, employment, the provision of goods and services, accommodation or education. Yet despite this, many forms of cyber-discrimination and harassment have occurred and continue to occur on social networking and/or social media sites. In contrast, the provisions of the federal RDA could potentially apply to these contexts. Unlike the SDA, the Disability Discrimination Act 1992 (Cth) and the Age Discrimination Act 2004 (Cth), the RDA is not limited to specified areas of public life. Rather, the general discrimination protections simply require that the act had the purpose or effect of nullifying or impairing the recognition, enjoyment or exercise, on an equal footing, of any human right or fundamental freedom in the political, economic, social, cultural or any other field of public life. Similarly, the racial hatred provisions contained in the RDA apply to acts done otherwise than in private. This broader construction of public life under the RDA means that race discriminatory actions on online socialising or informational/social media platforms could be covered by the Act. For example, under the racial hatred provisions, the placing of anti-Semitic material on a website which was not password protected was held by the Federal Court to be an act not done in private, and therefore subject to the protections of the RDA.  Accordingly, To the extent cyber-trolls and others engage in cyber-racist behaviour on social networking and media sites, their actions could be covered by the provisions contained in the RDA. There are limitations to the protection under the RDA, such as those in s 18D (which excludes from s 18C things done reasonably and in good faith in the context of artistic works, discussions and debates, fair and accurate reporting and fair comment expressing a genuine belief). One important limitation of the coverage of the RDA is the ability to actually enforce orders against hosts of such information. The RDA has an ancillary liability provision which makes it unlawful to assist or promote unlawful acts of discrimination,  which could capture the actions of hosts (as opposed to the creator of the information). However ancillary liability provisions do not apply to the racial hatred provisions. The need then to pursue the individual responsible for actually posting the offensive material creates significant difficulties where sites allow people to create and post information on websites or blog/socially network anonymously or pseudo-anonymously using multiple personae (issues of anonymity are discussed in detail above).  For example, it has been reported that in 2012 Facebook was ordered by the UK High Court to provide the email and IP addresses of a number of so-called cyber-bullies so that a complainant could proceed with a private prosecution. While Facebook may informally agree to comply with orders such as these, formal enforcement of such orders in an overseas jurisdiction remains problematic (issues of multiple jurisdictions have been discussed above). The Commission faces similar difficulties in compelling disclosure of such information when trying to resolve complaints. Website hosts and social networking sites have informally complied with requests by the Commission to remove information. Yet despite the Commission having the power to compel disclosure of such information, this cannot actually be enforced without the overseas counterpart jurisdiction ordering such enforcement in compliance with its own jurisprudence (of which there is no guarantee). Regulation of offensive behaviour Overview Where offensive and/or bullying behaviour occurs that falls outside of a defined area of public life and does not attach to a protected attribute for the purposes of anti-discrimination laws, other laws may apply. At the domestic level, the regulation of cyber-bulling and other forms of offensive behaviour are regulated by a complex array of federal and state laws. Federal and state workplace bullying health and safety regulations cover forms of cyber-bullying to the extent that they occur within the workplace. In terms of the regulation of offensive Internet behaviour more generally, the focus of federal laws is on regulating the conduct of Internet service providers or content hosts of potentially offensive material. A somewhat anachronistic addition to this is a broad-ranging provision in the federal criminal law which prohibits the use of a carriage service in a manner which a reasonable person would find offensive. In contrast to the federal focus on regulating content hosts, State and Territory laws impose obligations on producers of content. A number of non-legislative initiatives also exist focusing on monitoring and educating the public about content on the Internet. These forms of regulation are described in further detail below. Regulation of workplace (cyber)bullying Cyber-bullying has brought the issue of the regulation of offensive behaviour on the Internet to the forefront of government, media and community attention. As discussed above, the issue of cyber-bullying clearly engages a number of human rights recognised under international law. In Australia, bullying which is not covered by anti-discrimination laws may be covered by work health and safety legislation, by criminal laws in Victoria and by the Commonwealth Criminal Code Act 1995. Uniform work health and safety legislation has been adopted by the Commonwealth, four States and the Territories since 2011. The Work Health and Safety Codes of Practice 2011: How to manage work health and safety risks operates under the Work Health and Safety Act 2011 and applies to all bodies and persons having duties under the Act. The Code includes bullying in the definition of hazard, and describes workplace bullying as a work-related health issue. The effect of this is that employers and officers have a duty to prevent workplace bullying, and workers and other people at the workplace have a duty not to engage in workplace bullying. Similarly, in Victoria and Western Australia (jurisdictions which have not adopted the uniform legislation) bullying has been interpreted as included in concepts of health and safety risk and hazard. There appears to be nothing in workplace bullying provisions to preclude coverage of workplace cyber-bullying. As for the provisions contained in Victorian and Commonwealth criminal law, these are not limited to the workplace and cover behaviours that constitute cyber-bullying. These provisions are covered in further detail below. Regulation of Internet providers and content hosts At the federal level, apart from the workplace-specific bullying regulations described above, the focus of the regulation of offensive behaviour centres on those who host offensive content on the Internet (as opposed to those who create it). The Broadcasting Services Act 1992 (Cth) aims to restrict access to or prohibit certain types of offensive Internet content, and provides a complaints mechanism. It prohibits Internet content that is (or would be) classified as Refused Classification (RC) which applies to publications, films or computer games that: depict, express or otherwise deal with matters of sex, drug misuse or addiction, crime, cruelty, violence or revolting or abhorrent phenomena, in such a way that they offend against the standards of morality, decency and propriety generally accepted by reasonable adults to the extent that they should not be accorded a classification other than RC; or describe or depict in a way that is likely to cause offence to a reasonable adult, a person who is, or appears to be, a child under 18 (whether the person is engaged in sexual activity or not); or promote, incite or instruct in matters of crime or violence. These provisions apply to very serious forms of offensive content which may include extreme forms of cyber-bullying. This scheme does not target, for example, hate speech. As a result, this scheme does not represent an avenue of redress against a person or group who is vilified by Internet hate speech in Australia. However, in extreme cases where online content incites crime or violence (which could, for example be racially based), the Australian Media and Communications Authority (ACMA) could issue a removal notice. ACMA investigates complaints about online content that may be prohibited content according to criteria of the National Classification Code (set out above). Where the content is classified as prohibited, ACMA issues a series of notices to Australian-based hosts requiring either the removal of the content, or restricted access within a set timeframe (failing which a penalty applies). Where Australian-hosted prohibited content is considered to be sufficiently serious, ACMA must notify law enforcement agencies. Apart from providing filtering software options, where sufficiently serious prohibited content is hosted outside Australia, ACMA notifies a member hotline in the country where the content appears to be hosted or in the absence of a hotline, notifies the Australian Federal Police for action through Interpol. A co-regulatory framework based on industry codes also forms part of the scheme under the Broadcasting Services Act 1992 (Cth). These codes may be developed by the industry, or required by ACMA, and are registered and enforced by ACMA. Two industry codes that have been developed impose various obligations on content hosts, ISPs, mobile carriers, and content service providers, including: obligations in responding to notices requirements about what information must be provided to users requirements about making filters available requirements about establishing complaints procedures and the appropriate use of restricted access systems. There are, however, significant regulatory challenges in attempting to enforce classification laws in relation to online media content, including: inconsistency in offence and penalty provisions between Australian jurisdictions; the quantity and mutable nature of online content; the number of persons producing content and its hosting all over the world; and the difficulty of determining age and of restricting content. Regulation of producers of content and upload of/access to content Certain state and territory laws contain provisions directly regulating the actual production and use (as opposed to hosting) of online content. For example, the Classification (Publications, Films and Computer Games) (Enforcement) Act 1995 (Vic) makes it an offence to use an on-line information service to publish or transmit, or make available for transmission objectionable material, child pornography or material unsuitable for minors. In addition to these provisions, all Australian jurisdictions have laws dealing with cyber-stalking a behaviour that can form part of cyber-bullying. A number of states have explicitly extended the definition of this crime to include the sending of electronic messages. At the Commonwealth level offences relating to behaviour on the Internet includes cyber-fraud and stalking; threats to kill or cause serious harm; making hoax threats; and most relevantly, engaging in conduct that a reasonable person would find to be menacing, harassing or cause offence. It is instructive to consider that similar legislative provisions in the UK have been used to prosecute individuals for various forms of offensive behaviour in cyberspace. This includes situations where a teenager made offensive comments about a murdered child on Twitter; a young man wrote on Facebook that British soldiers should go to hell and a third posted a picture of a burning paper poppy (a symbol of remembrance of war dead). According to news reports all were arrested, two were convicted, and one jailed. Concerns about the impact of these prosecutions on freedom of expression led the UK Director of Public Prosecutions to release guidelines on prosecuting cases involving social media communications, in recognition that an excess of prosecutions chills free speech and that a higher threshold for prosecution was required. The interim guidelines are intended to strike the right balance between freedom of expression and the need to uphold criminal law. The guidelines state that if someone posts a message online that clearly amounts to a credible threat of violence, specifically targets an individual or individuals, or breaches a court order designed to protect someone, then the person behind the message may be prosecuted. People who receive malicious messages and pass them on (i.e. by re-tweeting) can also be prosecuted. However, the guidelines provide that online posts that are merely grossly offensive, indecent, obscene or false must reach a higher threshold before the conduct would be considered for prosecution, and in many such cases a prosecution is unlikely to be in the public interest. In Australia, other offences aimed particularly at the protection of children on the Internet include laws criminalising sexual grooming (targeting the use of a carriage service, the Internet or mobile phone for sexual activity with children), and using a carriage service to send or receive child pornography (which may capture some sexting). Distributing images can be a form of cyber-bullying if a young person is coerced into posing, or if images are distributed without consent. Further, in 2011 the SDA was amended in 2011 to give legal protection to young people who have experienced sexual harassment (including online) at an educational institution by permitting students under the age of 16 to lodge a complaint under that Act. Criminal offences also exist against the promotion of suicide on the Internet. International (cross-jurisdictional) regulatory initiatives An example of a regional approach to regulating racist hate speech on the Internet is the European Additional Protocol to the Convention on Cybercrime. The aim of the Additional Protocol is to limit or at least reduce the amount of hate material online by requiring States Parties to criminalise the making available or distribution of racist or xenophobic material through a computer system within their jurisdictions. The Protocol creates a legal framework for international co-operation in the prosecution (at the domestic level) of cross-jurisdictional hate speech in cyberspace. The Australian Government has ratified the European Convention on Cybercrime, which focuses on international cooperation to combat cybercrime. However it has not signed or ratified the Additional Protocol dealing with racist hate speech online. At the international level, non-mandatory principles in relation to conduct on the Internet have been proposed for domestic adoption. In 2001 the Durban Declaration and Plan of Action was adopted at the United Nations World Conference against Racism, Racial Discrimination, Xenophobia and Related Intolerance. The Durban Declaration contains principles relating to racism on the Internet which recognise both the capacity of the Internet as a tool to promote tolerance and educate others, and the need to avoid use of the Internet which promotes racism and intolerance. The Plan of Action includes calling on States to impose legal sanctions in respect of incitement to racial hatred through new information and communications technologies, including through the Internet. In 2003 at the United Nations World Summit on the Information Society a Plan of Action was produced, which stated that: All actors in the Information Society should take appropriate actions and preventive measures, as determined by law, against abusive uses of ICTs [Information and Communication Technologies], such as illegal and other acts motivated by racism, racial discrimination, xenophobia and related intolerance, hatred, violence, all forms of child abuse, including paedophilia and child pornography, and trafficking in, and exploitation of, human beings. The idea for an International Criminal Court or Tribunal for Cyberspace has also been raised by a number of advocates. However the draft proposal is limited to the most serious violations of international cybercrime law and may not capture or resolve all the issues raised here. Non-legislative initiatives Alongside formal legislative measures, a number of non-legislative measures are being utilised in regulating offensive forms of online behaviour. Importantly, a number of these measures are aimed at preventative behaviour-change (as opposed to reactive legislative responses). Such measures include the development of company policies; co-regulatory measures (between industry and a regulator(s)); voluntary codes of practice and general educative/attitudinal change initiatives. In Australia, examples of such measures include: Self-regulation by websites through the adoption of codes of conduct (see, for example, Facebooks Statement of Rights and Responsibilities). This includes unofficial regulation by internet service providers/content hosts in responding to informal requests to remove material. The Cybersmart education program created by the Australian Government and ACMA. This program is designed to providing information and education to children and young people to empower them to be safe online, and to support parents, teachers and library staff. It aims to build resilience through cyber-smart behaviour and an awareness of rights and consequences. The Australian Governments Cybersafety Help Button initiative, which provides users (particularly children and young people but also parents/carers and teachers) with easy online access to a wide range of cyber-safety and security resources to help with cyber-bullying, unwanted contacts, scams, frauds and inappropriate material. Back me up, a social media campaign run by the Commission to encourage young people to take positive action to support friends or peers who are cyber-bullied. It offers young people information about how to take safe and effective action when they witness cyber-bullying. The Consultative Working Group on Cyber-safety (in which the Commission participates). The Group considers those aspects of cyber safety that particularly affect Australian children, such as cyber bullying, identity theft and exposure to illegal and inappropriate content. It provides advice to the Australian Government on priorities and measures needed to ensure world's best practice safeguards for Australian children engaging in the digital economy. Other proposals for responding to discrimination, harassment and hate speech online Legislative reform A number of legislative reforms have been proposed in relation to the regulation of the issues discussed above in section 5 of this paper. For example, in relation to the cyber-safety of young people, the Parliamentary Joint Select Committee on Cyber-Safety has identified privacy laws as an area in need of cyber-reform. The reforms suggested by the Committee included: amending the small business exemption where these businesses transfer personal information offshore; developing guidelines on the appropriate use of privacy consent forms for online services; imposing a code which includes a 'Do Not Track' model; ensuring privacy laws cover organisations that collect information from Australia reviewing the enforceability of provisions relating to the offshore transfer of data. In addition, the Joint Select Committee recommended that training be provided to all Australian Police Forces as well as judicial officers to ensure they are adequately equipped to address cyber-safety issues. It also recommended that a National Working Group on Cybercrime be created to undertake a review of legislation in Australian jurisdictions relating to cyber-safety crimes. The report also explored the proposal of creating an online Ombudsman to deal with cyber-safety issues. It is interesting to note that the New Zealand Law Commission recommended a number of legislative reforms in that jurisdiction in respect of harmful digital communications. This included the creation of a new communications offence targeting all types of digital communications (including through social media) which are grossly offensive or of an indecent, obscene or menacing character and which cause harm. It also recommended making it an offence to publish intimate photographs or recordings of another person without their consent, and to incite a person to commit suicide, irrespective of whether or not the person does so. It further proposed the establishment of a specialist Communications Tribunal capable of providing speedy, cheap and efficient relief outside the traditional court system. This Tribunal would in effect operate as a mini-harassment court specialising in digital communications (using mediation to resolve trivial matters), and providing civil remedies such as takedown orders and cease and desist orders. The New Zealand Law Commission proposed that it would be the option of last resort, and that the threshold for obtaining a remedy would be high. Other measures Over the next 3 years the Commission will be partnering with academia as part of an Australian Research Council project on cyber-racism and community resilience. The project will include a review of the Australian legal, regulatory and policy framework that surrounds racist speech on the Internet. The aim of the project is to contribute towards the development of new approaches to the regulation of cyber-racism and to co-operative work between industry and regulators to improve responses to cyber-racism. The Joint Select Committee on Cyber-Safety in its report on Cyber-safety and young people proposed various educative measures, including: development of an agreed national definition of cyber-bullying introduction of a cyber-safety student mentoring program national core standards for cyber-safety education in schools a national online training program for teachers and students that addresses bullying and cyber-bullying the introduction nationally of Acceptable Use agreements governing access to the online environment by students and the use of resources such as the CyberSafety Help Button the incorporation of cyber-safety materials into teacher training courses, including advice about available processes in the event of cyber-bullying the promotion of self-assessment tools, and investigation of the information made available to parents at point of sale of computers and mobile phones. increasing affordable access to crisis help lines enhancing the effectiveness of cyber-safety media and educational campaigns including making materials available through a central portal. The Joint Select Committee also proposed industry-based initiatives, including that the Australian Government encourage the Internet Industry Association to increase accessibility to assistance and complaints mechanisms on social networking sites, and negotiate protocols with overseas networking sites to ensure the timely removal of offensive material. The non-legislative recommendations of the New Zealand Law Commission included: requiring all schools to implement effective anti-bullying programs establishing on-going data collection (including measurable objectives and performance indicators) for defining and measuring covert and overt forms of bullying and developing reporting procedures and guidelines consideration of the use of Information and Technology contracts which are routinely used in schools, to educate students about their legal rights and responsibilities with respect to communication the development of consistent, transparent and accessible policies and protocols for how intermediaries and content hosts interface with domestic enforcement mechanisms. A right to access the Internet While there appears to be no express right of general application to access cyberspace/the Internet stipulated in any of the major international human rights instruments,  it has been argued at the international level that such access is critical, particularly in terms of the right to freedom of expression, and in the redressing of structural disadvantage. Accordingly a number of countries have, in varying forms, formally recognised human rights to access the Internet. These trends are considered below, along with developments within the Australian context. At the international level The Special Rapporteur argues that without Internet access which facilitates economic development and the enjoyment of a range of human rights, marginalized groups and developing States remain trapped in a disadvantaged situation. This has been characterized as the digital divide, being the gap between people with effective access to digital and information technologies, in particular the Internet, and those with very limited or no access at all. The Special Rapporteur asserts the positive obligation on States to promote or to facilitate the enjoyment of the right to freedom of expression and the means necessary to exercise this right, including the Internet as a means of overcoming this divide. According to the Special Rapporteur, access to the Internet is seen as critical to combating situations of inequality, by ensuring that marginalized or disadvantaged sections of society can express their grievances effectively and that their voices are heard. He argues that the Internet offers a key means by which such groups can obtain information, assert their rights, and participate in public debates concerning social, economic and political changes to improve their situation. It also offers an important educational tool in making accessible previously unaffordable academic material to people in developing countries. However, the Special Rapporteur acknowledges that disadvantaged groups often face barriers to accessing the Internet in a way that is meaningful, relevant and useful to them in their daily lives. One academic, Cees Hamelink, argues that if the right to freedom of expression is interpreted in more than the classical negative sense (that is, as a positive right and not merely as a liberty), it becomes a claim-right. This means a person not only has the right to express opinions, but also, by implication, to the related entitlement to facilities for the exercise of this right. The recognition of freedom of expression as a positive claim-right is particularly important in situations where the voices of some people are systematically excluded. Mr Hamelink further argues that human rights in cyberspace should not only be articulated as individual rights, but also recognised as collective rights. A collective right of access to the Internet for communities, he postulates, is critical given that there are certain groups of people who tend to be excluded from full access to the Internet (he mentions women, ethnic minorities and lower socio-economic groups). He argues that collective claims can also include the right to development (of communication infrastructures), and a right to the sharing of knowledge and skills resources. The recommendations of the United Nations 2003 World Summit on the Information Society reflect the need for specific attention to be given to vulnerable groups. The Plan of Action adopted at that Summit included that States promote research and development to facilitate accessibility of ICTs for all, including disadvantaged, marginalized and vulnerable groups. It was proposed that: national e-strategies address the special requirements of older people, persons with disabilities, children, especially marginalized children and other disadvantaged and vulnerable groups, including by appropriate educational administrative and legislative measures to ensure their full inclusion in the Information Society. Full inclusion would extend beyond mere access rights, and would include initiatives to build confidence and security in the use of the Internet. In practice, this could include Governments establishing sustainable multi-purpose community public access points and providing affordable or free Internet access to their citizens. Practical developments at the international level in respect of the right to access the Internet include, as part of the Millennium Development Goals, a formal target calling upon States in consultation with the private sector [to] make available the benefits of new technologies, especially information and communications. Other initiatives include:  the One Laptop Per Child project (supported by the United Nations Development Programme), which aims to spread the availability of the Internet into developing countries (currently this is being progressively implemented in countries such as Uganda and Rwanda) the Indian Governments public-kiosks program the Brazilian governments computers for all program offering subsidies for the purchasing of computers. The Special Rapporteur has reported that Internet access has been expressly recognized as a human right in some economically developed States: For example, the parliament of Estonia passed legislation in 2000 declaring Internet access a basic human right.52 The constitutional council of France effectively declared Internet access a fundamental right in 2009, and the constitutional court of Costa Rica reached a similar decision in 2010.53 Going a step further, Finland passed a decree in 2009 stating that every Internet connection needs to have a speed of at least one Megabit per second (broadband level).  At the domestic level Within the Australian context, the Commission has developed World Wide Web Access Advisory notes which provide guidance on the requirements for compliance with the Disability Discrimination Act 1992 (Cth) The Advisory notes provide important practical information on how to make websites more accessible to people with a disability who, like the rest of the community, rely increasingly on the Internet to access a wide range of often critical information and service provision. The notes also provide information about how web designers and website owners can minimise the possibility of disability discrimination. The Commission has also considered the right to Internet access in the context of older people in its submission to the Joint Select Committee Inquiry into Cybersafety for Senior Australians. The Commission submitted that due to the speed with which the information technology revolution has occurred, many older people in Australia had found themselves on the wrong side of the digital divide. Internet access to essential services and social networking potentially provides older people with the option to live autonomously in their homes for longer. Yet many older people, particularly those aged 65 and above, missed the information technology agenda that is now part of mainstream education, resulting in a lack of confidence to engage with the Internet at a high level. This can preclude their full inclusion in accessing mainstream information technology and in making independent decisions about their lives. The social and economic consequences of the relative disadvantage experienced by older Australians in using the Internet has led Age Discrimination Commissioner Susan Ryan to characterize this disadvantage as a form of age discrimination. Evidence from the Australian Institute of Criminology (AIC) indicates that older people in Australia have difficulties managing their online security, and that people over the age of 65 are more likely to be victims of online financial fraud than any other age group. The Australian Crime Commission has highlighted that organised criminal networks take advantage of new technologies to expand their reach, commit crimes from a distance, create the appearance of legitimacy and exploit the lack of clear jurisdictional authority. This in turn increases the threat and harm caused to the Australian community, particularly to older people who might be more specifically targeted. As mentioned above, the Australian Government has ratified the European Convention on Cybercrime. Prior to ratifying the Convention, the Australian Government enacted the Cybercrime Legislation Amendment Act 2012 (Cth) (the Cybercrime Act), to ensure that Australian legislation meet all the requirements under the Convention (subject to certain reservations). The main objective of the Convention (and therefore the Cybercrime Act) is to pursue a common criminal policy aimed at the protection of society against cyber-crime, especially by adopting appropriate legislation and fostering international co-operation. While the passage of the Cybercrime Act and Australias ratification of the Convention is an important step, it represents a largely reactive approach. To be truly effective, a preventative approach must also be undertaken of educating users on cyber-safe practices when engaging with information technology. However, evidence suggests that despite some success, current Internet training arrangements for older people require more targeted initiatives to engage segments of the aged population who do not respond to current programs and schemes. These issues of access, confidence and security do not just affect older people in Australia and people with disability, but can impact on people from culturally and linguistically diverse backgrounds, remote communities where ICT infrastructure is most deficient, and people from lower socio-economic backgrounds who cannot always individually afford access to these technologies. In order to ensure that information is truly accessible to all people in Australia, government departments and/or private companies should audit online materials to ensure they are user-friendly for new Internet users; institute educative initiatives on the secure use of the Internet and increase opportunities for meaningful access to the Internet of marginalised groups. Only when these measures are in place can structural vulnerability be identified, full inclusion be achieved and any notion of the right to access the Internet be truly realised. Conclusion It is clear that the Internet provides unparalleled opportunities for the promotion and advancement of human rights, most centrally the right to seek, receive and impart information. The Special Rapporteur on that right has described the Internet as one of the most powerful instruments of the 21st century for increasing transparency in the conduct of the powerful, access to information, and for facilitating active citizen participation in building democratic societies. He has accordingly stated that facilitating access to the Internet for all individuals, with as little restriction to online content as possible, should be a priority for all States. However, the Internet also provides a new (and powerful) medium through which persons can (and do) publish hateful or discriminatory comments, and intimidate and harass others, in a manner which undermines the human rights of those who are targeted. Accordingly, societies use of the Internet raises challenging questions about the appropriate balancing of rights in cyberspace. Difficult questions of how to simultaneously protect potentially competing rights are not unique to the online environment. But the particular features of the Internet (its global (and therefore cross-jurisdictional) and instant reach; its creation of an effectively permanent record of communications, and the ability to communicate anonymously) present new obstacles for governments seeking to protect against harmful behaviour. These types of issues must be addressed in order for Australia to fulfil the theoretically simple (but practically very challenging) requirement that the same rights that people have offline must also be protected online. Questions for discussion There are two broad challenges regarding human rights and use of the Internet which emerge from the discussion in this paper, namely: How do we as a society achieve an appropriate balance between competing rights in an online environment? What steps should be taken to address discrimination in terms of the ability of certain groups to access (and safely utilise) the Internet? Addressing discrimination in terms of access to (and use of) the Internet The growing importance of the Internet to all aspects of life (including delivery of services by business and government) means that the digital divide between those with effective access to the Internet and those without limits the latter groups ability to enjoy a range of human rights. In order to effectively address this gap in enjoyment of rights (particularly the right to freedom of expression and information), consideration should be given to the following: What groups in Australia are affected by the digital divide? To what extent does this impact on their enjoyment of rights? What measures should be taken to address the difficulties that the following groups may experience in accessing the Internet: people with disability older Australians Indigenous Australians Australians living in remote or rural areas? To what extent would the digital divide be addressed by ensuring access for all Australians to Internet facilities? How relevant are issues such as digital literacy and cyber-crime to the effective enjoyment of rights through the Internet for these groups? Balancing rights online A key challenge in terms of ensuring that individuals rights are protected online is achieving an appropriate balance between protecting the right to freedom of opinion and expression in cyberspace, and protecting people from online bullying, discrimination and harassment which breaches their rights under the ICCPR. The types of issues which need to be explored include: How prevalent is online hate speech (i.e. racial vilification, hate speech against women, LGBTI people) - is it only a small minority who posts this extreme content, or is there a wider problem? Are online hate speech, discrimination and verbal abuse different to hate speech, discrimination and verbal abuse that occur in the offline world - does the potential reach and permanency of internet content change the impacts of these types of behaviours? Are (reactive) legislative measures, rendering behaviour unlawful or criminal, an appropriate (and/or effective) way of achieving a balance between the competing rights in an online environment? For the purposes of the application of anti-discrimination laws, what should be considered a public vs. a private space in the online world? To what extent are (preventative) educative measures an effective way of addressing online hate speech and discrimination? What type of laws, polices and/or practices do we need to create safe online environments for children, to ensure that they enjoy their rights in cyberspace (including the right to freedom of expression and to information)? Further information As mentioned above, the Commission has worked and continues to work on a range of human rights issues connected with the Internet. Further information can be found on the Commissions webpage Human rights and the Internet, at  HYPERLINK "http://www.humanrights.gov.au/human-rights-and-internet" http://www.humanrights.gov.au/human-rights-and-internet. This includes links to the Commissions work relating to: access and accessibility for people with disability access and online safety for older Australians racial discrimination and vilification in online environments sexual harassment over the Internet cyber safety for children and cyber-bullying online safety in Indigenous communities.      鱨վ Short document title, Short description Date   鱨վ Human rights in cyberspace, September 2013  PAGE 2 Australian Human Rights Commission everyone, everywhere, everyday  See D Connolly, A little history of the World Wide Web,  HYPERLINK "http://www.w3.org/History.html" http://www.w3.org/History.html (viewed 27 August 2013).  International Telecommunication Union,  HYPERLINK "file:///C:\\Users\\dicda\\AppData\\Local\\Microsoft\\Windows\\Temporary%20Internet%20Files\\Content.Outlook\\12XAFZSH\\Key%202006-2013%20ICT%20data%20for%20the%20world,%20by%20geographic%20regions%20and%20by%20level%20of%20development,%20for%20the%20following%20indicators" Key 2006-2013 ICT data for the world, by geographic regions and by level of development, for the following indicators, at  HYPERLINK "http://www.itu.int/en/ITU-D/Statistics/Documents/statistics/2013/ITU_Key_2005-2013_ICT_data.xls" http://www.itu.int/en/ITU-D/Statistics/Documents/statistics/2013/ITU_Key_2005-2013_ICT_data.xls (viewed 27 August 2013).  Opened for signature 19 December 1966, 999 UNTS 171 (entered into force 23 March 1976) (ICCPR), art 9(1), at  HYPERLINK "http://www.austlii.edu.au/au/other/dfat/treaties/1980/23.html" http://www.austlii.edu.au/au/other/dfat/treaties/1980/23.html (viewed 27 August 2013).  Human Rights Committee, General Comment No. 34 Article 19: Freedoms of opinion and expression, UN Doc CCPR/C/GC/34 (2011). At  HYPERLINK "http://tbinternet.ohchr.org/_layouts/treatybodyexternal/TBSearch.aspx?Lang=en&TreatyID=8&DocTypeID=11" http://tbinternet.ohchr.org/_layouts/treatybodyexternal/TBSearch.aspx?Lang=en&TreatyID=8&DocTypeID=11 (viewed 27 August 2013).  Human Rights Committee, General Comment No. 34, note 4, para 12.  See the Commissions page on permissible limitations on human rights at  HYPERLINK "http://www.humanrights.gov.au/permissible-limitations-rights" http://www.humanrights.gov.au/permissible-limitations-rights.  The promotion, protection and enjoyment of human rights on the Internet, Human Rights Council Resolution 20/8, UN Doc A/HRC/RES/20/8 (2012), para 1. At  HYPERLINK "http://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/RES/20/8" http://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/RES/20/8 (viewed 27 August 2013).  At  HYPERLINK "http://www.humanrights.gov.au/human-rights-and-internet" http://www.humanrights.gov.au/human-rights-and-internet.  F La Rue, Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, Report to the Human Rights Council, 17th session, UN Doc A/HRC/17/27 (2011), p 7. At  HYPERLINK "http://www.ohchr.org/EN/Issues/FreedomOpinion/Pages/Annual.aspx" http://www.ohchr.org/EN/Issues/FreedomOpinion/Pages/Annual.aspx (viewed 27 August 2013.  F La Rue, above, p 7.  F La Rue, above, p 19.  F La Rue, above.  D Rolph, M Vittins and J Bannister, Media Law: Cases, Materials and Commentary (2010), pp 23-26.  D Rolph, M Vittins and J Bannister, above, p 23.  Human Rights Committee, General Comment No. 34, note 4, para 13.  D Rolph, M Vittins and J Bannister, note 13, p 23.  Human Rights Committee, General Comment No. 34, note 4, para 11 (emphasis added).  F La Rue, note 9, p 7.  See the Human Rights Act 2004 (ACT) and Charter of Human Rights and Responsibilities Act 2006 (Vic).  See the Commissions page Common law rights and human rights scrutiny for more discussion:  HYPERLINK "http://www.humanrights.gov.au/common-law-rights-and-human-rights-scrutiny" http://www.humanrights.gov.au/common-law-rights-and-human-rights-scrutiny.  See Brown v Classification Review Board (1997) 154 ALR 67, in which French J stated (at 76): A person may say and write anything he pleases except in so far as he may not. See also Lange v Australian Broadcasting Corporation (1997) 189 CLR 520, in which the High Court stated (at 567): Within our legal system, communications are free only to the extent that they are left unburdened by the laws that comply with the Constitution.  Lange v Australian Broadcasting Corporation (1997) 189 CLR 520, 599. See Nationwide News Pty Ltd v Wills (1992) 177 CLR 1; Australian Capital Television Pty Ltd & New South Wales v Commonwealth (1992) 177 CLR 106, and the discussion in D Rolph, M Vittins, J Bannister, note 12, pp 32-43.  See the urging violence offences in ss 80.2 80.2B of the Criminal Code Act 1995 (Cth).  See, for example, the restrictions which may be placed on communication by certain individuals who are made the subject of control orders or preventative detention orders: Criminal Code Act 1995 (Cth) s104.5(3)(e) and ss 105.15, 105.16, and 105.34.  See the offences in Part 10.6, Div 474, Sub-div C of the Criminal Code Act 1995 (Cth).  See, for example, Racial Discrimination Act 1975 (Cth) s 18C; Anti-Discrimination Act 1977 (NSW) s20C; Racial and Religious Tolerance Act 2001 (Vic) ss 7 and 8.  See the Copyright Act 1968 (Cth).  See the discussion in N ONeill, S Rice and R Douglas, Retreat From Injustice: Human Rights Law in Australia (2nd ed, 2004), Chapter 17.  See, for example, Crimes Act 1900 (NSW) s 327.  See the discussion in N ONeill, S Rice and R Douglas, note 28, Chapter 16, particularly the section entitled Contempt by Criticising or Scandalising the Courts.  See, for example, Crimes Act 1900 (NSW) s 192G.  See the Privacy Act 1988 (Cth).  See for example Classification (Publications, Films and Computer Games) Act 1995 (Cth) and the Broadcasting Services Act 1992 (Cth).  F La Rue, note 9, p 9.  A Moses, Filter was white elephant waiting to happen, The Sydney Morning Herald, 9 November 2012. At  HYPERLINK "http://www.smh.com.au/technology/technology-news/filter-was-white-elephant-waiting-to-happen-20121109-2923o.html" http://www.smh.com.au/technology/technology-news/filter-was-white-elephant-waiting-to-happen-20121109-2923o.html (viewed 27 August 2013).  F La Rue, note 9, p 10.  F La Rue, above.  See  HYPERLINK "http://www.humanrights.gov.au/right-freedom-information-opinion-and-expression" \l "other" http://www.humanrights.gov.au/right-freedom-information-opinion-and-expression#other.  Opened for signature 20 November 1989, 1577 UNTS 3 (entered into force 2 September 1990) (CRC). At  HYPERLINK "http://www.austlii.edu.au/au/other/dfat/treaties/1991/4.html" http://www.austlii.edu.au/au/other/dfat/treaties/1991/4.html (viewed 27 August 2013).  Opened for signature 30 March 2007, 2515 UNTS 3 (entered into force 3 May 2008). At  HYPERLINK "http://www.austlii.edu.au/au/other/dfat/treaties/ATS/2008/12.html" http://www.austlii.edu.au/au/other/dfat/treaties/ATS/2008/12.html (viewed 27 August 2013).  Universal Declaration of Human Rights, UN General Assembly Resolution 217A(III), UN Doc A/810, 71 (UDHR) (1948). At  HYPERLINK "http://www.un.org/en/documents/udhr/" http://www.un.org/en/documents/udhr/ (viewed 27 August 2013).  Human Rights Committee, General Comment No. 34, note 4, para 21.  Parliamentary Joint Committee on Human Rights, Parliament of Australia, Examination of legislation in accordance with the Human Rights (Parliamentary Scrutiny) Act 2011: Bills introduced 12 14 March 2013, Fourth report of 2013 (2013), para 1.69. At  HYPERLINK "http://www.aph.gov.au/Parliamentary_Business/Committees/Senate_Committees?url=humanrights_ctte/reports/index.htm" http://www.aph.gov.au/Parliamentary_Business/Committees/Senate_Committees?url=humanrights_ctte/reports/index.htm (viewed 27 August 2013).  Human Rights Committee, General Comment No. 34, note 4, para 22.  Human Rights Committee, General Comment No. 34, note 4, para 25.  The permissible grounds for restrictions listed in article 19(3) include restrictions on the grounds of public health or national security, but discussion of circumstances in which these grounds might justify a limitation on the right to freedom of expression and to information as exercised through the Internet falls outside the scope of this present paper.  Opened for signature 19 December 1966, 993 UNTS 3 (entered into force 3 January 1976) (ICESCR). At  HYPERLINK "http://www.austlii.edu.au/au/other/dfat/treaties/1976/5.html" http://www.austlii.edu.au/au/other/dfat/treaties/1976/5.html (viewed 27 August 2013).  Human Rights Committee, General Comment No. 34, note 4, para 50.  Human Rights Committee, General Comment No. 34, note 4, para 48.  See the Commissions Violence, Harassment and Bullying page:  HYPERLINK "http://bullying.humanrights.gov.au/" http://bullying.humanrights.gov.au/.  Committee on the Rights of the Child, General Comment No. 8 (2006) - The right of the child to protection from corporal punishment and other cruel or degrading forms of punishment, UN Doc CRC/C/GC/8 (2006), para 11. At  HYPERLINK "http://tb.ohchr.org/default.aspx?Symbol=CRC/C/GC/8" http://tb.ohchr.org/default.aspx?Symbol=CRC/C/GC/8 (viewed 27 August 2013).  Human Rights Committee, General Comment No. 16: Article 17 (Right to Privacy), The Right to Respect of Privacy, Family, Home and Correspondence, and Protection of Honour and Reputation, UN Doc A/43/40 (1988), para 1. At  HYPERLINK "http://www.refworld.org/docid/453883f922.html" http://www.refworld.org/docid/453883f922.html (viewed 27 August 2013).  Human Rights Committee, General Comment No. 16, above, para 7.  Human Rights Committee, General Comment No. 34, note 4, para 32.  Human Rights and Equal Opportunity Commission, Letter to Ministers dated 9 May 1991 (Initial submission on proposed ban on political advertising) (1991), p 12 (citations omitted). At  HYPERLINK "http://www.humanrights.gov.au/right-freedom-information-opinion-and-expression-0" \l "Submissions" http://www.humanrights.gov.au/right-freedom-information-opinion-and-expression-0#Submissions  See Human Rights Committee, General Comment No. 34, note 4, para 46.  Human Rights Committee, General Comment No. 34, note 4, para 34.  Human Rights Committee, General Comment No. 34, note 4, para 35.  For a definition of an (Internet) meme see:  HYPERLINK "http://netforbeginners.about.com/od/weirdwebculture/f/What-Is-an-Internet-Meme.htm" http://netforbeginners.about.com/od/weirdwebculture/f/What-Is-an-Internet-Meme.htm (viewed 27 August 2013).  This definition is drawn from definition used by the National Centre Against Bullying: see  HYPERLINK "http://www.ncab.org.au/whatisbullying/" http://www.ncab.org.au/whatisbullying/ (viewed 28 August 2013). It should be noted that there are numerous and varying definitions of bullying.  Australian Communications and Media Authority, Australia in the digital economy, shift to the online environment, Communications Report 2009-10 Series, (June 2010), p 13.  See the Alannah and Madeline Foundations Bullying Hurts brochure at  HYPERLINK "http://www.amf.org.au/FactSheets" http://www.amf.org.au/FactSheets (viewed 28 August 2013).  UDHR, art 25; ICESCR, art 12(1); CRC, art 24.  UDHR, art 23; ICESCR arts 6 and 7.  UDHR, art 19; ICCPR, art 19.  CRC, art 31.  The Committee also encouraged Australia to develop programs and strategies to use mobile technology, media advertisements and the internet to raise awareness among both children and parents on information and material injurious to the well-being of children: see Committee on the Rights of the Child: Concluding Observation: Australia, UN Doc CRC/C/15/Add.268 (20 October 2005) paras 33-34. At  HYPERLINK "http://tb.ohchr.org/default.aspx?Symbol=CRC/C/15/Add.268" http://tb.ohchr.org/default.aspx?Symbol=CRC/C/15/Add.268 (viewed 28 August 2013).  UDHR, art 26; ICESCR, art 13(1); CRC, art 29; Committee on the Rights of the Child, General Comment No. 1 - Article 29 (1): The Aims of Education, UN Doc CRC/GC/2001/1 (2001), para 8, at  HYPERLINK "http://www2.ohchr.org/english/bodies/crc/comments.htm" http://www2.ohchr.org/english/bodies/crc/comments.htm (viewed 28 August 2013).  UDHR, art 5; ICCPR, art 7; CRC, art 19.  A Moses and A Lowe, Contents removed form racist Facebook page, The Sydney Morning Herald, 8 August 2012,  HYPERLINK "http://www.smh.com.au/technology/technology-news/contents-removed-from-racist-facebook--page-20120808-23tr1.html" http://www.smh.com.au/technology/technology-news/contents-removed-from-racist-facebook--page-20120808-23tr1.html (viewed 27 August 2013).  A Moses and A Lowe, above.  A Moses and A Lowe, above.  鱨վ, Working without fear; Results of the Sexual Harassment National Telephone Survey (2012) p 23. At  HYPERLINK "http://www.humanrights.gov.au/working-without-fear-results-sexual-harassment-national-telephone-survey" http://www.humanrights.gov.au/working-without-fear-results-sexual-harassment-national-telephone-survey (viewed 27 August 2013).  J Maley, The disturbing phenomenon of creep-shots, The Sydney Morning Herald, 27 September 2012. At  HYPERLINK "http://www.dailylife.com.au/news-and-views/dl-opinion/the-disturbing-phenomenon-of-creepshots-20120926-26kl5.html" http://www.dailylife.com.au/news-and-views/dl-opinion/the-disturbing-phenomenon-of-creepshots-20120926-26kl5.html (viewed 27 August 2013).  J Sinnerton and S Healy, Facebook sluts page makers vow to return, Herald Sun, 13 October 2012. At  HYPERLINK "http://www.heraldsun.com.au/news/james-silverwood-and-dom-terry-creators-of-banned-12-year-old-sluts-facebook-page-vow-to-return/story-e6frf7jo-1226494768239" http://www.heraldsun.com.au/news/james-silverwood-and-dom-terry-creators-of-banned-12-year-old-sluts-facebook-page-vow-to-return/story-e6frf7jo-1226494768239 (viewed 27 August 2013).  J Sinnerton & S, Heal, above.  L Hillier, P Horsely and C Kurdas, It made me feel braver, I was no longer alone: The Internet and same sex attracted young people in J Nieto, Sexuality in the Pacific (2004), p 15.  See the site No homophobes at  HYPERLINK "http://www.nohomophobes.com/" \l "!/all-time/" http://www.nohomophobes.com/#!/all-time/ (viewed 27 August 2013).  See for example J Schwartz, Bullying, Suicide, Punishment, The New York Times, 2 October 2010. At  HYPERLINK "http://www.nytimes.com/2010/10/03/weekinreview/03schwartz.html?_r=1&ref=tyler_clementi" www.nytimes.com/2010/10/03/weekinreview/03schwartz.html?_r=1&ref=tyler_clementi (viewed 27 August 2013).  Times Topics, Tyler Clementi, The New York Times, 16 March 2012. At  HYPERLINK "http://topics.nytimes.com/top/reference/timestopics/people/c/tyler_clementi/index.html" http://topics.nytimes.com/top/reference/timestopics/people/c/tyler_clementi/index.html (viewed 27 August 2013).  New Zealand Law Commission, Harmful Digital Communications: The adequacy of the current sanctions and remedies, Ministerial Briefing Paper (August 2012), p 78. At  HYPERLINK "http://www.lawcom.govt.nz/project/review-regulatory-gaps-and-new-media/publication/ministerial-briefing/2012/ministerial-briefing-harmful-digital-communications-adequacy-current-sanctions-and-remedies" http://www.lawcom.govt.nz/project/review-regulatory-gaps-and-new-media/publication/ministerial-briefing/2012/ministerial-briefing-harmful-digital-communications-adequacy-current-sanctions-and-remedies (viewed 28 August 2013).  S Joseph, Free Speech, Racial Intolerance and the Right to Offend Bolt before the court (2011) 36(4) Alternative Law Journal 225, p 226.  New Zealand Law Commission, note 81, p 27.  New Zealand Law Commission, above, p10.  New Zealand Law Commission, above, p 100.  D Fogarty, Suppression order on Bayley background, The Sydney Morning Herald, 11 October 2012. At  HYPERLINK "http://news.smh.com.au/breaking-news-national/suppression-order-on-bayley-background-20121011-27f3j.html" http://news.smh.com.au/breaking-news-national/suppression-order-on-bayley-background-20121011-27f3j.html (viewed 28 August 2013).  General Television Corporation Pty Ltd v DPP & Anor [2008] VSCA 49, [70] (citations omitted).  F La Rue, note 9, p 4.  The promotion, protection and enjoyment of human rights on the Internet, note 7, para 2.  F La Rue, note 9, p 8.  New Zealand Law Commission, note 81, p 10.  F La Rue, note 4, p 15.  F La Rue, above.  F La Rue, above.  N Galvin, Just hook it into our veins, The Sydney Morning Herald, 21 October 2012,  HYPERLINK "http://www.smh.com.au/digital-life/digital-life-news/just-hook-it-into-our-veins-20121018-27s6e.html" http://www.smh.com.au/digital-life/digital-life-news/just-hook-it-into-our-veins-20121018-27s6e.html, (viewed 28 August 2013).  T Leaver, quoted in N Galvin, above.  New Zealand Law Commission, note 81, p 42.  New Zealand Law Commission,above.  New Zealand Law Commission, above.  New Zealand Law Commission, above.  New Zealand Law Commission, above.  J,Donath, Identity and deception in the Virtual Community in M Smith and P Kollock (eds), Communities in Cyberspace (1999), p 45.  A Cox, Making Mischief on the Web, Time Magazine, 16 December 2006,  HYPERLINK "http://www.time.com/time/magazine/article/0,9171,1570701,00.html" http://www.time.com/time/magazine/article/0,9171,1570701,00.html (viewed 28 August 2013.  Human Rights Committee, General Comment No. 34, note 4, para 11.  New Zealand Law Commission, note 81, p 119.  New Zealand Law Commission, above, p 101 (quoting a submission from Judge D Harvey).  La Ligue Contre La Racisme et LAntisemitisme (LICRA) and Union Des Etudiants Juifs De France (UEJF) v. Yahoo! Inc. and Yahoo France (20 February 2002). For a general discussion of this case in English, see I Nemes, Regulating Hate Speech in Cyberspace: Issues of Desirability and Efficacy (2002) 11(3) Information & Communication Technology Law 193, pp 202-203.  Yahoo! Inc. v. La Ligue Contre Le Racisme et LAntisemitisme, 7 November 2001, Case Number C-0021275 JF, Docket No 17.  The Sex and Age Discrimination Legislation Amendment Act 2011 (Cth) amended the SDA to expressly provide that the Division relating to sexual harassment (Div 3 of Part II) applies in relation to acts done using a postal, telegraphic, telephonic or other like service (within the meaning of paragraph 51(v) of the Constitution). The Explanatory Memorandum to the Amending Act stated that the power in paragraph 51(v) of the Constitution has gained significant relevance in the context of sexual harassment given the ubiquity of new technologies such as social networking websites, e-mail, SMS communications, and mobile telephone cameras.  Racial Discrimination Act 1975 (Cth) s 9 (emphasis added).  Racial Discrimination Act 1975 (Cth) s 18C.  Jones v Toben [2002] FCA 1150 (the judgment in this case was upheld on appeal: see Toben v Jones (2003) 129 FCR 515).  Racial Discrimination Act 1975 (Cth) s 18(D).  Racial Discrimination Act 1975 (Cth) s 17.  See J Hunyor, Cyber-racism: can the RDA prevent it? (2008) 46 Law Society Journal 34, pp 34-35.  J Hunyor, above, p 35.  J Hunyor, above, p35.  See J Swift, Bains Cohen takes on Facebook in internet bullying case, The Lawyer, 12 June 2012. At  HYPERLINK "http://www.thelawyer.com/bains-cohen-takes-on-facebook-in-internet-bullying-case/1012919.article" http://www.thelawyer.com/bains-cohen-takes-on-facebook-in-internet-bullying-case/1012919.article (viewed 28 August 2013).  Broadcasting Services Act 1992 (Cth), Schedule 5.  Criminal Code Act 1995 (Cth) s 474.17.  See Joint Select Committee on Cyber-Safety, Parliament of Australia, High-Wire Act: Cyber-Safety and the Young (2011), pp 305-7, 313-324. At  HYPERLINK "http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=jscc/report.htm" http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=jscc/report.htm (viewed 28 August 2013).  Work Health and Safety Codes of Practice 2011: How to manage work health and safety risks. At  HYPERLINK "http://www.comlaw.gov.au/Details/F2011L02804" http://www.comlaw.gov.au/Details/F2011L02804 (viewed 28 August 2013).  Work Health and Safety Codes of Practice 2011, above, at 1.2 and 2.1.  WorkSafe Victoria, Your guide to workplace bullying prevention and response (October 2012), p. 2. At  HYPERLINK "http://www.worksafe.vic.gov.au/__data/assets/pdf_file/0008/42893/WS_Bullying_Guide_Web2.pdf" http://www.worksafe.vic.gov.au/__data/assets/pdf_file/0008/42893/WS_Bullying_Guide_Web2.pdf (viewed 28 August 2013).  Department of Commerce, Bullying and violence: frequently asked questions (see question 7: What are the duties of the employer under the Act in relation to bullying?),  HYPERLINK "http://www.commerce.wa.gov.au/worksafe/content/safety_topics/Bullying/Questions.html" http://www.commerce.wa.gov.au/worksafe/content/safety_topics/Bullying/Questions.html (viewed 28 August 2013).  See Crimes Act 1958 (Vic), s 21A.  Criminal Code Act 1995 (Cth) s 474.17  Broadcasting Services Act 1999 (Cth) schs 5 and 7.  See Broadcasting Services Act 1999 (Cth) sch 7 ss 20-21 and National Classification Code 2005 (Cth) items 1(a)-(c).  I Nemes, note 107, pp 204-5.  Australian Law Reform Commission, Classification- Content Regulation and Convergent Media: Final Report, Report No. 118 (2012), para 2.24. At  HYPERLINK "http://www.alrc.gov.au/publications/classification-content-regulation-and-convergent-media-alrc-report-118" http://www.alrc.gov.au/publications/classification-content-regulation-and-convergent-media-alrc-report-118 (viewed 28 August 2013).  Australian Law Reform Commission, above.  Broadcasting Services Amendment (Online Services) Act 1999 (Cth) schs 5 and 7.  Broadcasting Services Act 1992 (Cth), Division 4, s 130M.  Broadcasting Services Act 1992 (Cth), Division 4, s 130N.  Broadcasting Services Act 1992 (Cth), Division 3, ss 101, 89, 90.  See Australian Law Reform Commission, note 131, para 2.29.  See Australian Law Reform Commission, above, paras 15.42-15.54.  See Australian Law Reform Commission, above, para 16.34.  Classification (Publications, Films and Computer Games) (Enforcement) Act 1995 (Vic), ss 57, 57A and 58.  See for example Crimes Act 1958 (Vic) s 21A; Crimes (Domestic and Personal Violence) Act 2007 (NSW) ss 7, 8, 13.  Criminal Code Act 1995 (Cth) Part 10.6, Div 474, Sub-div C.  Criminal Code Act 1995 (Cth) Part 10.6, Div 474, Sub-div C, s 474.14  Criminal Code Act 1995 (Cth) Part 10.6, Div 474, Sub-div C, s 474.15  Criminal Code Act 1995 (Cth) Part 10.6, Div 474, Sub-div C, s 474.16  Criminal Code Act 1995 (Cth) Part 10.6, Div 474, Sub-div C, s 474.17  See for example the Communications Act 2003 (UK) ss 32, 127. See also Chambers v DPP [2012] High Court Justice Queens Bench Division Divisional Court Case No CO/2350/2011 (27 June 2012); J, Lawless, On-line rants land Facebook and Twitter users in legal trouble, The Sydney Morning Herald, 19 November 2012. At  HYPERLINK "http://www.smh.com.au/technology/technology-news/online-rants-land-facebook-and-twitter-users-in-legal-trouble-20121116-29gf7.html" http://www.smh.com.au/technology/technology-news/online-rants-land-facebook-and-twitter-users-in-legal-trouble-20121116-29gf7.html (viewed 28 August 2013).  See J Lawless, above.  See J Lawless, above.  J Lawless, above.  K Starmer (Director of Public Prosecutions, UK) quoted in D, Casciani, Prosecutors clarify offensive on-line posts, BBC News UK, 19 December 2012. At  HYPERLINK "http://www.bbc.co.uk/news/uk-20777002" http://www.bbc.co.uk/news/uk-20777002 (viewed 29 August 2013).  Director of Public Prosecutions (UK), Interim guidelines on prosecuting cases involving communications sent via social media (19 December 2012), para 12. At  HYPERLINK "http://publicintelligence.net/uk-cps-social-media-guidelines/" http://publicintelligence.net/uk-cps-social-media-guidelines/ (viewed 29 August 2013).  Director of Public Prosecutions (UK), above, para 2.  Director of Public Prosecutions (UK), above, paras 12(4) and 13.  See the offences in the Criminal Code Act 1995 (Cth) ch 10, pt 10.6, div 474, sub-div F.  See the offences in the Criminal Code Act 1995 (Cth) ch 10, pt 10.6, div 474, sub-div D.  Joint Select Committee on Cyber-Safety, note 121, para 11.77.  See Sex and Age Discrimination Legislation Amendment Act 2011 (Cth) s 56, which removed the requirement in s 28F(2)(a) of the SDA that a student who suffers sexual harassment must be an adult student (i.e. 16 or over) for the sexual harassment to be unlawful under the SDA.  See the offences in the Criminal Code Act 1995 (Cth), ch 10, pt 10.6, div 474, sub-div G.  Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems, opened for signature 28 January 2003, CETS No. 189 (entered into force 1 March 2006). At  HYPERLINK "http://conventions.coe.int/Treaty/EN/Treaties/Html/189.htm" http://conventions.coe.int/Treaty/EN/Treaties/Html/189.htm (viewed 28 August 2013).  See the Explanatory Report to the Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems, para 3. At  HYPERLINK "http://conventions.coe.int/Treaty/EN/Reports/Html/189.htm" http://conventions.coe.int/Treaty/EN/Reports/Html/189.htm (viewed 28 August 2013).  Convention on Cybercrime, opened for signature 23 November 2001, CETS No. 185, (entered into force 1 July 2004). At  HYPERLINK "http://conventions.coe.int/Treaty/EN/Treaties/Html/185.htm" http://conventions.coe.int/Treaty/EN/Treaties/Html/185.htm (viewed 28 August 2013).  See also the Cybercrime Legislation Amendment Act 2012 (Cth).  Durban Declaration, adopted at the World Conference against Racism, Racial Discrimination, Xenophobia and Related Intolerance, (endorsed by GA Resolution 56/266), UN Doc A/CONF.189/12 (2001). At  HYPERLINK "http://www.un-documents.net/durban-d.htm" http://www.un-documents.net/durban-d.htm (viewed 29 August 2013). .  Durban Programme of Action, adopted at the World Conference against Racism, Racial Discrimination, Xenophobia and Related Intolerance, (endorsed by GA Resolution 56/266) (2001), para 145. At  HYPERLINK "http://www.refworld.org/docid/3db573314.html" http://www.refworld.org/docid/3db573314.html (viewed 29 August 2013).  World Summit on the Information Society: Plan of Action, UN Doc WSIS-03/GENEVA/DOC (2003), para 25(c). At  HYPERLINK "http://www.un-documents.net/wsis-poa.htm" http://www.un-documents.net/wsis-poa.htm (viewed 29 August 2013).  See, for example, Judge S Scholberg, An International Criminal Court or Tribunal for Cyberspace, (Paper to the 13th International Criminal Law Congress, Queenstown, New Zealand, 12-16 September 2012). At  HYPERLINK "http://www.crimlaw2012.com/abstract/11.asp" http://www.crimlaw2012.com/abstract/11.asp (viewed 28 August 2013).  Judge S Scholbery, above, p 2.  Available at  HYPERLINK "http://www.facebook.com/legal/terms" http://www.facebook.com/legal/terms (viewed 29 August 2013).  See  HYPERLINK "http://www.cybersmart.gov.au" http://www.cybersmart.gov.au (viewed 29 August 2013).  See  HYPERLINK "http://www.dbcde.gov.au/online_safety_and_security/cybersafetyhelpbutton_download" http://www.dbcde.gov.au/online_safety_and_security/cybersafetyhelpbutton_download (viewed 29 August 2013).  See  HYPERLINK "http://somethingincommon.gov.au/backmeup" http://somethingincommon.gov.au/backmeup (viewed 29 August 2013).  See  HYPERLINK "http://www.dbcde.gov.au/funding_and_programs/cybersafety_plan/consultative_working_group" http://www.dbcde.gov.au/funding_and_programs/cybersafety_plan/consultative_working_group (viewed 29 August 2013).  See Joint Select Committee on Cyber-Safety, note 121, Ch 5  Joint Select Committee on Cyber-Safety, above, Recommendation 4, pp xxvii and 151.  Joint Select Committee on Cyber-Safety, above, Recommendation 6, pp xxvii & 163.  Joint Select Committee on Cyber-Safety, above, Recommendation 8, pp xxvii & 174.  Joint Select Committee on Cyber-Safety, above, Recommendation 9, pp xxvii & 174.  Joint Select Committee on Cyber-Safety, above, Recommendation 11, pp xxviii & 175.  Joint Select Committee on Cyber-Safety, above, Recommendations 21 and 22, pp xxx & 330.  Joint Select Committee on Cyber-Safety, above, Recommendation 23, pp xxx & 335.  Joint Select Committee on Cyber-Safety, above, Chapter 13, pp 355-373, paras13.1-13.55.  New Zealand Law Commission, note 81, pp 14-15.  New Zealand Law Commission, above, p 15.  New Zealand Law Commission, above, p16.  New Zealand Law Commission, above, pp16-17.  New Zealand Law Commission, above, p 18.  New Zealand Law Commission, above, p16.  New Zealand Law Commission, above.  Joint Select Committee on Cyber-Safety, note 121, Recommendation 2, pp xxvi and 63.  Joint Select Committee on Cyber-Safety, above, Recommendation 3, pp xxvi and 117.  Joint Select Committee on Cyber-Safety, above, Recommendation 14, pp xxviii and 263.  Joint Select Committee on Cyber-Safety, above, Recommendation 19, pp xxx and 274.  Joint Select Committee on Cyber-Safety, above, Recommendation 14, pp xxviii and 263.  Joint Select Committee on Cyber-Safety, above, Recommendation 14, pp xxviii and 263.  Joint Select Committee on Cyber-Safety, above, Recommendation 17, pp xxix and 269.  Joint Select Committee on Cyber-Safety, above, Recommendation 18, pp xxix and 272.  Joint Select Committee on Cyber-Safety, above, Recommendation 24, pp xxxi and 430.  Joint Select Committee on Cyber-Safety, above, Recommendation 25, pp xxxi and 438.  Joint Select Committee on Cyber-Safety, above, Recommendation 26, pp xxxi and 438.  Joint Select Committee on Cyber-Safety, above, Recommendation 27, pp xxxi and 464.  Joint Select Committee on Cyber-Safety, above, Recommendation 29, pp xxii and 499.  Joint Select Committee on Cyber-Safety, above, Recommendation 30, pp xxxii and 507.  Joint Select Committee on Cyber-Safety, above, Recommendation 31, pp xxxii and 508.  New Zealand Law Commission, note 81, p 19.  New Zealand Law Commission, above.  New Zealand Law Commission, above, p 20.  New Zealand Law Commission, above.  New Zealand Law Commission, above, p 19.  Note however that articles 9 and 21 of the Convention on the Rights of Persons with Disabilities, expressly refer to access to the Internet for people with disabilities, including through the use of accessible formats.  F La Rue, note 9, p 17.  F La Rue, above, p 17.  F La Rue, above, p 19.  F La Rue, above, p 17.  F La Rue, above.  F La Rue, above.  F La Rue, above.  C Hamelink, Human Rights in Cyberspace,  HYPERLINK "http://www.religion-online.org/showarticle.asp?title=283" http://www.religion-online.org/showarticle.asp?title=283 (viewed 29 August 2013).  C Hamelink, above.  C Hamelink, above.  C Hamelink, above.  World Summit on the Information Society: Plan of Action, note 166, para 10(c).  World Summit on the Information Society: Plan of Action, above, para 9(e).  World Summit on the Information Society: Plan of Action, above, para 10(d).  F La Rue, note 9, p 17.  See F La Rue, above, p 18.  F La Rue, above, p 18 (citations omitted).  鱨վ, World Wide Web Access: Disability Discrimination Act Advisory Notes,  HYPERLINK "http://humanrights.gov.au/disability_rights/standards/www_3/www_3.html" http://humanrights.gov.au/disability_rights/standards/www_3/www_3.html (viewed 29 August 2013).  鱨վ, Submission to the Joint Select Committee on Cybersafety Inquiry into Cybersafety for Senior Australians (January 2002). At  HYPERLINK "http://www.humanrights.gov.au/inquiry-cybersafety-senior-australians-2012" http://www.humanrights.gov.au/inquiry-cybersafety-senior-australians-2012 (viewed 29 August 2013).  鱨վ, above, para 6.  See, for example, The Hon S Ryan, Age discrimination and the internet-older people in the 21st century (Ruby Hutchinson Memorial Lecture, 14 March 2012). At  HYPERLINK "http://www.humanrights.gov.au/news/speeches/ruby-hutchison-memorial-lecture-2012" http://www.humanrights.gov.au/news/speeches/ruby-hutchison-memorial-lecture-2012 (viewed 29 August 2013).  S Ross and R G Smith, Risk factors for advance fee fraud victimisation in Australian Institute of Criminology, Trends & issues in crime and criminal justice No.420 (August 2011). At  HYPERLINK "http://www.aic.gov.au/publications/current%20series/tandi/401-420/tandi420.aspx" http://www.aic.gov.au/publications/current%20series/tandi/401-420/tandi420.aspx (viewed 29 August 2013).  Australian Crime Commission, Submission to the Joint Select Committee on Cyber-Safety Inquiry into Cybersafety for Senior Australians (2012), p 6. At  HYPERLINK "http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=jscc/senior_australians/subs.htm" http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=jscc/senior_australians/subs.htm (viewed 29 August 2013).  Australian Crime Commission, above.  See Explanatory Memorandum, Cybercrime Legislation Amendment Bill 2011 (Cth), para 1. At  HYPERLINK "http://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id%3A%22legislation%2Fems%2Fr4575_ems_ecca7d37-7fb2-4218-9837-da3ab80f531e%22" http://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id%3A%22legislation%2Fems%2Fr4575_ems_ecca7d37-7fb2-4218-9837-da3ab80f531e%22 (viewed 29 August 2013).  Explanatory Memorandum, Cybercrime Legislation Amendment Bill 2011 (Cth), above, para 3.  See, for example, Australian Bureau of Statistics, Computer and Internet use by People with a Disability, 4429.0 - Profiles of Disability, (2009). At  HYPERLINK "http://www.abs.gov.au/ausstats/abs@.nsf/Lookup/4429.0main+features100142009" http://www.abs.gov.au/ausstats/abs@.nsf/Lookup/4429.0main+features100142009 (viewed 29 August 2013).  F La Rue, note 9, p 4.  F La Rue, above.  The promotion, protection and enjoyment of human rights on the Internet, Human Rights Council Resolution 20/8, UN Doc A/HRC/RES/20/8 (2012), para 1. At  HYPERLINK "http://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/RES/20/8" http://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/RES/20/8 (viewed 27 August 2013). September 2013 Background paper: Human rights in cyberspace '()GHIJ`ab|}~rmcmVcmcrrmcmjh4Ujh4U h4 hmtGh4CJOJPJQJaJh8fh40J$hWgjhWgUh>_jh>_UmH nH uh>_h>_5h>_h@@B*PJ^Jphhh=B*PJ^Jph.h h=56B*CJKH PJ\aJph#{h=h=CJH*jhmtGUmHnHu!C 2 I m  @.(^`.gdS9"(gdS9!gddy(gd9Zq7$8$H$^gd>_7$8$H$^gd=m$ gdFm$   gd=! " # = > ? @ A B C D b c f g ܾ˾ܤs_ss&jwh4h4CJUaJ jh4h4CJUaJh4h4CJaJ&hmtGh456CJOJPJQJaJh4h40J$CJaJjh4Uh8fh40J$hWg hmtGh4CJOJPJQJaJjhWgU h4jh4Uj}h4U"    , - . / 0 1 2 3 Q R U V W ƺߋƺwnh8fh40J$&jqh4h4CJUaJhd0J$CJaJ&jh4h4CJUaJ jh4h4CJUaJh4h4CJaJh4h40J$CJaJhWgjhWgU&hmtGh456CJOJPJQJaJjhWgCJUaJ% ' ( ) C D E F G H I J h i l m | } ~ ¾±l`¾±jhWgCJUaJ&jkhdyh4CJUaJ jhdyh4CJUaJhdyh4CJaJ&hmtGh456CJOJPJQJaJhdyh40J$CJaJhWgjhWgUjh4Ujh4U h4h8fh40J$ hmtGh4CJOJPJQJaJ#     K L M g h i j k l m n ïvevQeveÂvev&jeh4h4CJUaJ jh4h4CJUaJh4h4CJaJ'hmtGh46CJOJPJQJ^JaJh4h40J$CJaJhWgjhWgU&hmtGh456CJOJPJQJaJjhWgCJUaJhdyh4CJaJ jhdyh4CJUaJ&jhdyh4CJUaJ        3 4 7 8 p q r ïyeyyïQy&hmtGh456CJOJPJQJaJ&j_hdyh4CJUaJ jhdyh4CJUaJhdyh4CJaJhdyh40J$CJaJhWgjhWgU'hmtGh46CJOJPJQJ^JaJjhWgCJUaJh4h4CJaJ jh4h4CJUaJ&jh4h4CJUaJ 9:;=>?@A_`cdrsïzmzz``Th4h4CJaJh4h40J$CJaJjYh4Ujh4U h4 hmtGh4CJOJPJQJaJh8fh40J$hWgjhWgU&hmtGh456CJOJPJQJaJjhWgCJUaJhdyh4CJaJ jhdyh4CJUaJ&jhdyh4CJUaJst  *+,FGHJKLMNlmpqïïnï&jh4h4CJUaJ&jSh4h4CJUaJh4h40J$CJaJhWgjhWgU&hmtGh456CJOJPJQJaJjhWgCJUaJ&jh4h4CJUaJh4h4CJaJ jh4h4CJUaJ+@M]M0P7B>O [.(^`.gdS9!gddy"(gdS9q"#&':;<Vֶ|wmw`mwm|jh4Ujh4U h4 hmtGh4CJOJPJQJaJh8fh40J$hWgjhWgU&hmtGh456CJOJPJQJaJjhWgCJUaJ&jMh4h4CJUaJ jh4h4CJUaJh4h4CJaJh4h40J$CJaJ"VWXZ[\]^|} !*+ïςïnï&jA h4h4CJUaJ&j h4h4CJUaJh4h40J$CJaJhWgjhWgU&hmtGh456CJOJPJQJaJjhWgCJUaJh4h4CJaJ jh4h4CJUaJ&jG h4h4CJUaJ++,FGHJKLMNlmpq )ïïyhycYcjh4U h4 hmtGh4CJOJPJQJaJh8fh40J$&j; h4h4CJUaJh4h40J$CJaJhWgjhWgU&hmtGh456CJOJPJQJaJjhWgCJUaJ&j h4h4CJUaJh4h4CJaJ jh4h4CJUaJ )*+-./01OPSTtuvܺuiܺU&j h4h4CJUaJjhWgCJUaJ&j5 h4h4CJUaJ jh4h4CJUaJh4h4CJaJ&hmtGh456CJOJPJQJaJh4h40J$CJaJhWg hmtGh4CJOJPJQJaJjhWgU h4jh4Uj h4U! !$%-./IJKMNOPQopst0ǶǶnǶ&j h4h4CJUaJ&j/ h4h4CJUaJh4h4CJaJ'hmtGh46CJOJPJQJ^JaJh4h40J$CJaJhWgjhWgU&hmtGh456CJOJPJQJaJjhWgCJUaJ jh4h4CJUaJ*01245678VWZ[ !;<=?@AïςïnZ&j#h4h4CJUaJ&hmtGh456CJOJPJQJaJ&jh4h4CJUaJh4h40J$CJaJhWgjhWgU'hmtGh46CJOJPJQJ^JaJjhWgCJUaJh4h4CJaJ jh4h4CJUaJ&j)h4h4CJUaJ#ABCabef789;<=>?]^abtuvǶǢǶǶǂǶnǶ'hmtGh46CJOJPJQJ^JaJ&jh4h4CJUaJjhWgCJUaJ&jh4h4CJUaJ jh4h4CJUaJh4h4CJaJh4h40J$CJaJhWgjhWgU&hmtGh456CJOJPJQJaJ(   ,-.HïςïylydWdjhdyh4Uhdyh4hmtGh4OJPJQJhdyh40J$&jh4h4CJUaJh4h40J$CJaJhWgjhWgU'hmtGh46CJOJPJQJ^JaJjhWgCJUaJh4h4CJaJ jh4h4CJUaJ&jh4h4CJUaJHIJLMNOPnorsӵpdӵP&jh4h4CJUaJjhWgCJUaJ&jh4h4CJUaJ jh4h4CJUaJh4h4CJaJ&hmtGh456CJOJPJQJaJh4h40J$CJaJhWghmtGh4OJPJQJjhWgUhdyh4jhdyh4Ujhdyh4U     +,-.89:TUVXYZ[\z{}~ûtjh4Uj h4Ujh4U h4 hmtGh4CJOJPJQJaJh8fh40J$hWgjhWgU&hmtGh456CJOJPJQJaJjhWgCJUaJh4h4CJaJ jh4h4CJUaJ&[Jf }!!%"?# $%&Vx^`VgdV 7x^7gdV & FgdM7^7gdPp|gd>_ & Fgd(gddy"(gdS9!gddy'()CDEGHIJKijnoلlلch8fh40J$&jh4h4CJUaJhWgjhWgUjhWgCJUaJ&jh4h4CJUaJ jh4h4CJUaJh4h4CJaJhd0J$CJaJmHnHsH &hmtGh456CJOJPJQJaJ$h4h40J$CJaJmHnHsH !.MNvwx6ﱥysjdsjsjsj[s[sh.h^J hzR^Jhfh^J h^Jjh0J(U^J h~^J h>_^Jh.h>_^Jh>_ h.h>_hdy5\mHnHu jh>_5U\mHnHujhWgUjh4Ujh4U h4h8fh40J$ hmtGh4CJOJPJQJaJ#LMW]询ysymgya h^J hlR^J h%^J h>_^J hp^Jh>_jh0J(UhD|h0J(h}h6hhPp|hCJ^JaJ hPp|hCJ^JaJmH sH jh0J(U^JhG,h6^Jhh^Jh.h^J h^J!jh.h0J(CJU^J%   . / : N d e f }!!!!!!!!"%"""""=#>#?#@#D#L#r######òÌvpggggh.h>_^J h3^Jjh30J(UmH sH hgmH sH hg^J#h:h6CJ^JaJmH sH hCJ^JaJmH sH hVhCJ^JaJmH sH h^J hMhjh0J(U^J h^J h{*'^J hV^J h>_^J h%^J h^J'##### $$$$$$$ %=%%%%%%%%&&(&-&C&&&&&&&&&''$'/':';'_'`'{''6(X(t(u(((((((((,)L)S)U)V)))))))***$*ʻʻʵʻֻʻʻʻֵֵֻֻֻ֯֯ hE2^J hK^Jh\Yh>_^J h2y*^J h5&^J h +^J h>_^J h1^Jh.h>_^J h?^J hG,^Jhfh>_^JE&_'(V)*+ ,N----.@.h.~///L0k002q47^7gdO & FxgdYzm$ & Fxgdm$xgd6 & Fgd R & Fgdgd>_$*O*******+4+5+6+=+S+`+w+++++++ ,,,?,T,d,t,~,,,,,,,,-;-B-C--.@.R.h.i.y..........M/ƽhw?h>_^J h*^Jhih>_^J h5^J h% ^J hS^Jh0h>_^J h0^'h>_h+h>_^J h ^Jh-h>_^J h^Jh.h>_^J hE2^J h>_^J9M/N/{/|////////80L0j0k00000 1.1:1n1o111111122)2*27282I2J2R2S2]2^2i2j2t222n4o4ܻz%jhOhaT0J(CJU^JaJhOhaTCJ^JaJ!jh.haT0J(CJU^J h.haThYzhYz^J hYz^Jh.haT^Jh_haT^JhUhaT^J haT^JjhChaT0J(U^JhCh>_^J hC^J0o4q4565L5Y5|55555555566666K7L7M7N7Q77777-8~::::::0;1;2;;;Ļ䰷ulf h#^Jh.h>_^JjhaT0J(U^JaJhGhaTCJ^JaJjh.haT0J(CJU!jh.haT0J(CJU^J h.haThaThghaT^JhOhaTH*^JjhOhaTH*UhOhaT^J haT^Jh.haT^JhOhaTCJ^JaJ(q4M55666N7-8:<<>??2ArBYDEEFF & F7^7gd=W & Fgd=W & F7^7gdh& & Fgd>_gd>_ & F S^`gd%gdOgd>;;;;;;<<*<0<w<<<<<<<< =K========= > >>>[>\>>>>>պre_ h^Jh=WhCJ^JaJ/jh0J(PJU^JaJmH nH sH tH /h=Wh>_CJH*PJ^JaJmH nH sH tH /h=Wh>_5CJPJ^JaJmH nH sH tH ,h=Wh>_CJPJ^JaJmH nH sH tH hY'h=Wh>_h+h-= h>_^J hG^J h#^Jh.h>_^J%>??$?%?&?6?}???????? @@g@h@i@@@@@@@/A0A1A2AAAAAǵЩ|vm\!jhBhl0J(CJU^JhBhfu^J h:s^J hfu^JhF'Uh>_mH sH jht0J(UmH sH htmH sH ht^Jjht0J(U^J hbAT^J h`^J hQ^JhBh>_^J h@^Jh>_ h>_^J!jhhPh0J(CJU^J h^JhhPh^J!AAAnBoBpBqBsBCCCDC_CCCYDZD^D~DDDDDDDEEEE*E+E7E8EAEBEUEVE]E^EgEhEEEEEEEEEEEEEEFǿǹ hm^JhBha^J!jhBha0J(CJU^J hj^JhBh>_^J h>#ۓ>#;l!l0(䴳KWKKKK¼³hdh#h^Jhyh^J!jh.h0J(CJU^Jh.h^J h^JhBh^J!jhBh0J(CJU^J h98^Jh.h>_^J h $^JhBh>_^J h>_^J4FvIwIK:LzN{NN4OOOnPPQQT & F7^7gdN? & Fgd>_ 7x^7gdwxgdwVx^`Vgdwxgdh & Fgd & Fgd5gd>_gd>_K L9L:LLL`MaMMMMMMMMMNNNN=NANRN\NwNxNyNzNNNNOOљymga[aWShh>_ hJ1M^J hT^J h^Jjh0J(U^J hd86^JhnqXh>_6^Jh.h>_^J hnqX^J h>_^Jh.Yh^Jjh.Yh0J(U^Jh.Yh.Y^J h.Y6^Jh5h6^Jh5h^Jjh0J(U^Jh.h^J h^Jh h.h OO3O4ODOYO{OOOOOOOOOOOOOPP7PUPmPnPrPvP}PPPPPQ&QQQQQQxiehTrh!{hTrCJOJQJaJ%jh!{hTr0J(CJU^JaJh!{h!{0J:CJ^JaJhqCJ^JaJh!{h>_CJ^JaJh'h>_6^J h!{^Jhwh>_^JhnqXhnqX^JhnqXh>_^J hh^J hgD=^J hnqX^J h>_^Jh>_hhZ&QTTTT"TUUtUuUVVVV-V.VeVVOW\WiWͶqZKD=95959h+h>_ hIhI hR:h>5<CJ\aJ,hF,hTrCJPJ^JaJmH nH sH tH 9jhN?hTr0J(CJPJU^JaJmH nH sH tH &hTrCJPJ^JaJmH nH sH tH &hF,CJPJ^JaJmH nH sH tH ,hN?hTrCJPJ^JaJmH nH sH tH hTr%jhN?hTr0J(CJU^JaJhN?hTr0J(CJ^JaJhN?hTrCJ^JaJT"TVVVVV.ViWYYYZ[:[[\y\ & Fxgd R & Fxgd[ & Fgd,gd, 7^7gd+ & Fgd>_gdQ$$ & Fh@&gdQm$ & F7^7gdF, & Fh^h`gd>_iW}Y~YYYYYYYYY ZZ1ZQZdZZ[[ [8[:[;[U[o[w[[[[[[[[[\w\\\\\-]L]M]T]i]]ֿ|sh[h[^J ht.h>_h>_OJQJh|phHhM,hFh.Yh@h_)jh-h_)0J(56Uh&h>_,h+h+CJPJ^JaJmH nH sH tH jh+0J(Uh+h+0J:,h+h>_CJPJ^JaJmH nH sH tH -y\M]i]^(_<`accd{eeQff|gPiqj & FgdXm & FnWx[$\$^n`Wgd R & FVx[$\$^`Vgd R & Fxgde & F7^7gd & F7^7gdV_ & Fgd>>]]]]]İ^^^^'(:<`aaa$a(a-a=aKajavaaaabtke^^^^^kQhhiCJ^JaJ h |hi hi^JhV_hi^JhV_hiCJ^JaJ2hV_hiB*CJ^JaJfHphq h Jhi^Jhijhi0J(Uh[h>_6h>_h[*h[h[B*^JfHphq *h[h>_B*^JfHphq h[h[^Jh[h>_^Jbbccddddddde"e(e,e8eQeWe]e^eyeze{eeeee0f6fsbO$hh3ACJOJPJQJ^JaJ hh3ACJOJQJ^JaJ$h3Ah3ACJOJPJQJ^JaJ h3Ah3ACJOJQJ^JaJ h9ch>_ hJh>_ hJhJ hJ6hJh>_6hJh>_h3Ahh>_CJ^JaJjhi0J(U^JaJhihhiCJ^JaJh2Mhi6CJ^JaJ6fQfffff gEgIgPg|ggggh hhhh4hBhhhhhhhiiOiPiiiiijj>jpjqj>kLk\k]k¾¾¾¾ºº¶§£§Ÿ˜zphXCJ^JaJ hXh>_CJ^JaJnHtHhXh>_CJ^JaJ h9Ih>_hoDhXhy hC` h>_hJxehh[}hHcHh>_h=hXm$hh3ACJOJPJQJ^JaJ hh3ACJOJQJ^JaJhCJOJQJ^JaJ+]k^k_kfk]m^m_msmmmmmmnnn!n$n+nenyn}nnnnnn ooolomonooooooooooop7pMpnpspup}p˿˿˿˿˿˻˻˲~zhWh+K/h]]h3h1T;h~eh hh1Ljh0J(U^Jhh^Jhh>_^JhhN0hshb }h>_jhw-0J(Uhw- hthw-hXhw-CJ^JaJjhw-0J(U^JaJ0qj_kk mnoootpKqsqRrstuvy & FgdU & F7^7gd\U & Fxgdi & Fgd= & Fxgd+K/gd+K/ & Fxgd & Fxgd R & Fxgd+!" & Fgd & Fgd>_ & FgdW{gdt & F^gd>_}p~ppppppp qqqq+qJqtqqqqqqqqqqqq;rPrQrRrSr]rjrrrrrrrrrsssqssssssLtMtjt}ttttthiQCJ^JaJh\Uh8\CJ^JaJ hih8\h06h8\hihM<hXzh% hhM<h= h6hh6hh+K/hZh>_hUhhW9ttuu vv+v,v/v`vvvvvv(w5w_^J hm^Jhhyh>_CJ^JaJhhyCJ^JaJhh>_CJ^JaJh hth>_h>_hUh06hs fh8\h\Uh8\CJ^JaJhiCJ^JaJ"vwCwwExyzz{}}~,~~πW & Fgd]Ngd& & F7^7gdgd?i & F7^7gd gd, & Fgd>_ & Fgdt & FSx^S`gd R & Fxgd#YgdtyyyyyyyUz\zzzzzz {{/{y{{{{{{{{{{{|}{}|}}}ȼᩜvdWh h CJ^JaJ#jh 0J(U^JaJmH sH  h h>_CJ^JaJmH sH (h h>_CJ^JaJmH nHsH tHh h>_CJ^JaJ ht6h>_hmh,h>_6h,h,6h h,hZ>><h@h>_hK h<^J!jhK h<0J(CJU^J }}4~c~q~}~~~~̀΀πt?W_n݂n۶|sjW$h]Nh>_PJ^JmH nH sH tH h]Nh]N^Jh]NhB^Jh]Nh>_^Jhmh&h>_jh 0J(UhG,hh @ CJ^JaJmH nH sH tH %jhh 0J(CJU^JaJ"h CJ^JaJmH nH sH tH (hh CJ^JaJmH nH sH tH h|h 6hBh HKLMƆdžƯhRE>73>hH hh hhmhBh>_CJ^JaJ+hlh:H*OJPJQJmH nH sH tH /jh:0J(PJU^JaJmH nH sH tH /hQh>_CJH*PJ^JaJmH nH sH tH ,hQh]NCJPJ^JaJmH nH sH tH ,hQh>_CJPJ^JaJmH nH sH tH ,h]Nh>_CJPJ^JaJmH nH sH tH $h]Nh]NPJ^JmH nH sH tH hQPJ^JmH nH sH tH dž)\kr] bqVugd & F SSx^S`gd R[gdX'"gdX'"gd>_gd>_gd & F7^7gdH  & F0^`0gdB & F7^7gdBdž'()2PRS]klwx^_`։ډ3RZ *+3H{r{rhEmhF^J hX'"^J h,^J hF^J!jh.hF0J(CJU^Jh.hF^J hF^Jhrh!hGh h.hFhFhH hFCJ^JaJ/jhF0J(PJU^JaJmH nH sH tH ,hH h>_CJPJ^JaJmH nH sH tH ,H[\kɌ,-/opŰŢŢŰŰŢŔʼn{q\Oh-hX'"^JmH sH )jh-hX'"0J(CJU^JmH sH hX'"^JmH sH h-hX'"\^JmH sH hdy\^JmH sH hdyOJQJ^JmH sH hX'"OJQJ^JmH sH )jh.hX'"0J(CJU^JmH sH h.hX'"OJQJ^JmH sH hX'"OJQJ^Jh.hX'"OJQJ^J hX'"hX'" hF^J hX'"^Jߎ]k6FPQِڐÒ B^_`aboл뭣{njhFhZAhX'"^JmH sH h^x\^JmH sH h-hX'"5\^JmH sH h-hX'"^JmH sH hX'"^JmH sH h-hX'"\^JmH sH )jh-hX'"0J(CJU^JmH sH hdyhX'"^JmH sH hdyhX'"\^JmH sH hdy\^JmH sH hdy^JmH sH 'op|x'ݕSTUVuӘnoЙљ~t^^*jh.hqM&0J(B*CJU^Jph"""hqM&B*^Jph"""hJy6hqM&0J(CJ^JhH;hqM&B*^Jph"""hH;hqM&^J!jh.hqM&0J(CJU^J hVy^JhH;h>_^Jh>_ hH;h>_*jh.hF0J(B*CJU^Jphh.hFB*phhFB*phhF h.hF!uҙ›Z_{WYdeV˧a & FSx^S`gdRHJm$xgdRHJ7^7gdowK^gd>_gd>_gdy Vgdgdgd>_љҙmnp›IJKXYZ_Kߟ1;Ӡ̻Ӵ~xkakakakh>_OJQJ^Jh.h>_OJQJ^J hZ^Jh!O.h>_5^Jh.h>_^Jh>_ h.h>_h0^'h>_^J h^JhMh>_^J h&,hq2!jh.hqM&0J(CJU^J h.hqM&)jh.hqM&0J(CJU^JmH sH h.hqM&mH sH hqM&h.hqM&^J$ӠԠABNVWXYy5;MQ\eưƟ}l[Qh>_OJQJ^J!hnXh>_B*OJQJ^Jph!hzRhAMB*OJQJ^Jph!hzRhOB*OJQJ^Jph!hzRhwB*OJQJ^Jph!hzRh>_B*OJQJ^Jph*jhzRh(B*CJU^Jph!hzRh*OJQJ^Jphh.hJQJ^JhJQJ^J!jh.h(CJU^JУأ2uݤ Bbde"8󰟌~md^d^d h{W^Jh.h{W^J howKh{WCJOJQJ^JaJh{WCJOJQJ^JaJ%jhowKh{W0J(CJU^JaJ howKh>_CJOJQJ^JaJ hb>h>_h*OJQJ^JhTIOJQJ^Jh>_OJQJ^Jh=LOJQJ^Jh[tOJQJ^JhbCOJQJ^Jh.h>_OJQJ^J$8RV789IeȩxϪЪѪ)*N_]b%6ABFNhkrĭ񷳭wwh.h>^J h/-^J hj,i^J hF^J h>^J hZ.^Jh.hm^J hQ^J hm^Jh>_h.h>_^J!jh.h{W0J(CJU^J%jhRHJh{W0J(CJU^JaJhRHJh{WCJ^JaJh.h{W^J h{W^J-a9) õ͵\ݸ gd>_7^7gd6E)gdIgdc;7^7gd=0cgd:gd:gd>_ & FSx^S`gdRHJm$ĭȭϭ$Cɮʮˮ!4 LeȰ|naZTKEKE h`)^Jh.h>_^J h<^J hc;h>_hc[h=CJ^JaJjh=0J(U\aJhc[h=CJ\aJhc[h=6CJ\^JaJhc[h=CJ\^JaJh[Yh=OJQJh.h=^J h=^Jh.h=B*^Jph jh=0J(B*U^Jphh>B*^Jphh/-B*^Jphh.h>_B*^JphȰհ!.3YZgB+,.7@Yմܴõ̵͵ص>Aֶ[\۸ܸݸ'Wz˳ h^J%jh6E)hx0J(CJU^JaJh6E)hxCJ^JaJhx h.hx hx^Jh.hx^J!jh.hx0J(CJU^J h&^Jh.h>_^J hk^J;ֻ3VjlĽν'()<klrs 񾴾{{j]h.hJOJQJ^J!jh.hJ0J(CJU^JhROJQJ^JhOJQJ^J!jh.h0J(CJU^JhU6OJQJ^Jh>_OJQJ^JhPnOJQJ^Jh.h>_OJQJ^J hNq^Jh.hj2^J hj2^J!jh.hj20J(CJU^Jh.h>_^J h>_^J )ESпѿVW[x&'(~+3=GJNX_bwxyz{˷˦uh.hKQ OJQJ^JhCDlhKQ 0J(CJ^JhKQ OJQJ^Jh.hKQ OJQJ^J!jh.hKQ 0J(CJU^Jh>_OJQJ^Jha>qOJQJ^Jh.h>_OJQJ^J!jh.hJ0J(CJU^Jh.hJOJQJ^JhJOJQJ^J. )*z{4~Ea:h% 7$8$H$gd>_ & FS^S`gdu? & FSx^S`gdZxgdPYgdZ & FS^S`gdPY & FSx^S`gdPYxgd~Agd>_ijkvw*24BCDEQ`aýóЩИЋsssish2nOJQJ^Jh.h>_OJQJ^JhP hZhZhX)h>_OJQJ^J!jh.hKQ 0J(CJU^JhPYOJQJ^JhaOJQJ^J hKQ ^Jh2hKQ OJQJ^Jh.hKQ OJQJ^JjhKQ 0J(U^JhKQ OJQJ^Jh.hKQ OJQJ^J%fg"#%LM tGXYc'\!"&*BRgyżżżżżżżżżżżżؼżżŶhVh>_ h.h>_ h6$*^J hiw^J hTZ!^J hk^Jh.hQ^J hQ^Jh.hQOJQJ^J!jh.hQ0J(CJU^Jh.h>_OJQJ^JhZOJQJ^J:^ $CgdSgd>_gdJhgd>_gd gd  7$8$H$gd>_Yx_`{#(29FNSXe7]^hTs񫱫 h ^J h>_^J hO^J h aI^J h)C^J h^J hA^^JjhL0J(U^J hL^Jh aIh~B6^J h~B^J hz^Jh.h>_^J hBHN^J<#Oc ()*49GR_`NOPQ^!/3K/01LMQYd/01񿶰hh0J:CJ^J h^J hRaf^JhdhQ00J(CJ^J hQ0^Jh.hQ0^J!jh.hQ00J(CJU^Jhh>_5^J hO6^JhOhO6^J hO^Jh.h>_^J h^J4123234GIN\pyOqOX#$ý÷ÛÏÉx!jh.hwH0J(CJU^J h^J hS^J hl^J hJh^J hS~hS~hS~ h.h>_hJh h>_^J ht^Jh.h>_^J hI}a^Jhx_hl0J(CJ^Jh.hl^J hl^J!jh.hl0J(CJU^J/AR{VWX3:C#^x*uud[h.hUg^J!jh.hUg0J(CJU^Jh.h>_6^J h ^J hq2^Jh.hq2^Jh- hSh>_h.h>_^Jh.h>_]^J!jh.hwH0J(CJU^J,jh.hwH0J(CJU]^JmH sH h%^JmH sH h.hwH^JmH sH hwH^Jh.hwH^J#;atu#$567 .2XY!(8@CFNz̛̻̫̥̥̥̑̄~̄̄uh.hzh^J hEv;^J hzh^J h:6^Jh.h>_6^JhEv;h>_5^J hk7^J h.h>_h.hk7^J!jh.hk70J(CJU^Jh.h>_^J!jh.hUg0J(CJU^J hUg^Jh.hUg^Jh.hUg6^J, ?e~H{xgd R & F#xgd Rm$xgd R dd[$\$gd>_ 7$8$H$gdO} & FS7$8$H$^S`gd Rm$ & FSx7$8$H$^S`gd Rm$ x7$8$H$gdfAgdS>?de 6`el Y @PŴyyyyh*,^JmH sH hO}h*,CJ^JaJ-jh9JYh*,0J(CJU^JaJmH sH h9JYh*,CJ^JaJ h9JYh*,CJ^JaJmH sH hfAh*,^JmH sH h.h*,^JmH sH h*,^Jh.h*,^J!jh.h*,0J(CJU^J/$%BMkqrstq|~yǽvaaaǽTh Rh>_^JmH sH )jh.hG0J(CJU^JmH sH h.h+{^JmH sH )jh.h+{0J(CJU^JmH sH hHhG6^JmH sH hG^JmH sH h.hG^JmH sH h+{^JmH sH h.h>_^JmH sH )jh.h*,0J(CJU^JmH sH h.h*,^JmH sH h*,^JmH sH yz{`ab%&'(l]()<=ƵƤƖraTaTaTaTaTah.h8OJQJ^J!jh.h80J(CJU^Jh.h>_6OJQJ]^Jh.h>_OJQJ^J hSh>_hvdh>_OJQJ\^J!jh.hK?0J(CJU^J h.hK?OJQJ^JmH sH h.hK?OJQJ^JhK?OJQJ^Jh RhK?^JmH sH )jh.hK?0J(CJU^JmH sH c(l+etA  Kgd6$* 7$8$H$gd6$*gdk [-DM gdT dd[$\$gd>_ [-DM gd>_8gd>_gdS & Fxgd R+bcde6pqrsʶxkakakKkKk>h.h>_B*^Jph*jh.h80J(B*CJU^Jphh8B*^Jphh.h8B*^Jph)jh.h80J(CJU^JmH sH h1^JmH sH h.h8^JmH sH #h.h8OJQJ]^JmH sH &h.h86OJQJ]^JmH sH !jh.h80J(CJU^Jh.h86OJQJ^Jh.h8OJQJ^Jh8OJQJ^Jst>?@AS T U         & L   ޾sjsj]S]I]IhVOJQJ^JhQ[OJQJ^Jh.h>_OJQJ^JhR5hk*^J!jhR5hk*0J(CJU^JhR5h>_^J!jhR5hcR0J(CJU^JhR5hcR^Jh8~B*^Jphh.hcRB*^Jph*jh.hcR0J(B*CJU^Jphh1B*^Jphh.h>_B*^JphhJB*^JphhXtB*^Jph   / 0 2           K[cmԶp_[RIRCR ht^JhS=h6$*^Jh.h6$*^Jhk!hTh*B*OJQJ^Jph!jhTh*0J(CJU^JhTh*OJQJ^Jh*OJQJ^Jh.h*OJQJ^J!jh.h*0J(CJU^Jh.hH>ϴ!Ti0(䴳Tiϴ.iϴ!.i0(䴳,-.;<ҷұwkh.htX5\^Jh.htX\^J htX\^Jh.htX^J!jh.htX0J(CJU^Jh.hB^J hB^J h;*X^Jh" h6$*6^J!jh.h6$*0J(CJU^J h6$*^Jjh6$*0J(U^Jh.h6$*^Jh;>%h6$*6^Jhqh6$*^J)LM Ÿ~rlhd[U[U[ h^Jh.h^^Jh^h hk^Jjh6$*0J(U^J!jh.h6$*0J(CJU^Jh.h6$*^JhtXhtXCJ^JaJ%jhrhtX0J(CJU^JaJhrhtXCJ^JaJh+A,htX^JhP^JmH sH hL6^JmH sH htX^JmH sH h.htX^JmH sH htX^J%?  )!_gdS & F!xgd Rm$xgdhLgd^gd 7$8$H$gdtX7^7gdtX8;FIM}>?Cq| OPʱʱʱʱʱʱʱʷӱ%jhhhL0J(U^JmH sH hhL6^JmH sH hH-$^JhYH}hhL^J hhL^JhhLhhL^Jh.hhL\^Jh.hhL^JjhhL0J(U^J hR^J hY'^J h^^Jh.h^^J hJC ^J.4578Wy    :abcdmn D N      )!ǽ䰠vpvvpvie^ hh*h* hR5hR5 h"w^JhRh^^JhRh^^JmH sH h"w^JmH sH hhL^JmH sH jhhL0J(U^JmH sH hRhhL^JmH sH hRhhL6^J hhL6^Jh"whhL^JhhLhhL^JmH sH hhL^Jh.hhL^JhhhL^JmH sH #)!*!5!_^J hZ`^Jjh*0J(U^J h^J h*^Jh.h*^J h.h*h*hh-<\$G&((*+,--.B..\//00Q123 x7$8$H$gd4jgd & F"xgd Rm$xgd3} dd[$\$gd+A,gdD6 7$8$H$gd>_gdrvF&G&e&&&'0'H'j'r''''''''(d(e(f(((((((q)r)s))* * * **@*ʽ}tj}}t^ʽ}}th>*^l+*.>*.>0(*䴳.>6B*^"<h>5B*]^Jphh>B*^Jphh.h>B*^Jphh.h>B*\^Jphh.h>_B*\^Jphh.h>_^J hl ^JhZ`h>_^J$@*C*\*]************++,,--$-*-Y-b-------...@.A.B.tnentnet\h3}hk^Jh@hk^J hk^J!jh.hk0J(CJU^J hm8^Jh@h>_^J h@^Jh.h>_^J h^Jh+A,h>_^JmH sH hD6hD6mH sH hD6h>_ h.h>_hshD6h.hF^J!jh.h>0J(CJU^Jh.h>^J h>^J$B.L.....//;/Z/[/\//////////0000000000111N1O1Q1r11111G2H2I2J2W2222222233Ŵhh6^Jh.h6^J h6^Jh]h6^J!jh.h60J(CJU^Jh]h>_^Jh]hk^Jh3}hk^J!jh.hk0J(CJU^Jh@hk^J hk^J733!3,3K3L3M333334"4#4$444444445555555c6d6e6f66666667+7n7ӽӽӰyrnnjfhH"hEhj^ hA_hpm[!jh.hpm[0J(CJU^Jh:h:0J:CJ^J hA_h>_ hzkYh>_ h.h>_h-"h4jh>_B*^Jph*jh.h60J(B*CJU^Jphh4jh6B*^Jph!jh.h60J(CJU^J h6^Jh4jh6^J(3M3$4455777778:T=>L@M@B7$8$H$^gd>_ 7$8$H$gd>_ & F S^`gd%$$ & Fh@&gdf<m$gd>_gdzkY & F$x7$8$H$gd4jm$n7t777777888888+93999:::;2;S;;;;;; <(<<<Q=R=S=T=]==>>>>(>Ͷ͖ͧ{{{{{{{nh.h>_B*^Jph hY^JjhY0J(U^Jh.hY^J!jh.hY0J(CJU^J h-^Jh.hA^J!jh.hA0J(CJU^J hH"^Jh.h>_^J h.h>7&<hf<56<B*CJaJph hA_h>"*(>9>>>?>>>>>>>>>=????Ѱ@5ѴAAAAA_B*phhYhYB*^Jphh.h646B*^Jph*jh.h640J(B*CJU^Jphh64B*^Jphh.h64B*^Jph jh640J(B*U^JphhW-HB*^Jphh.h>_B*^JphhB*^JphhbB*^Jph)@CECSCeCjCsC D DD"D$DhEiEkEEEEFFFFHHH HHHHH Hϻzq`qZqZM`ZhY7h,A)0J(CJ^J h,A)^J!jh.h,A)0J(CJU^Jh.h,A)^Jjh,A)0J(B*Uph!jhdh,A)0J(CJUaJhdh,A)CJaJh,A) h.h,A)h.h,A)B*ph&jh.h,A)0J(B*CJUphh.h>_B*phhLB*phhdB*phh{Gh{G6B*phh{GB*phB$DkEF H'IWIIQJ'L=LN8P4SUIXJXpZqZ[ 7$8$H$gd>_ & F S^`gd%7^7gd/gd/ & F%xgd)n+m$xgdY7 & F7^7gdd & Fgd>_ HCHDHyHzHI&I'I3IFIVIWIIIIJJ*JIJQJ$L%L&L'L/LLLLM M M Mη}y}q}b[ h.h1Tjh.h1T0J(CJUh.h>_6h2 h.h>_hyh/h,A)CJ^JaJ%jh/h,A)0J(CJU^JaJh/h,A)0J(CJ^JaJh/h,A)CJPJ^JaJh,A)PJ^Jh/h,A)PJ^Jh/h,A)^J h2^JhY7h,A)^J h,A)^Jh\h,A)^J MNgOhOOOO3P4P5P6P7P8PPdQeQCRRR2S3S4SSSSS?T@TATKTտշumumuZuOh.h#B*ph%jh.h#0J(CJUmH sH h#mH sH h.h#mH sH  h.h#jh#0J(UmH sH hkmH sH h9m mH sH h.h>_mH sH  h.h>_h/2mH sH jh1T0J(UmH sH h1TmH sH h.h1TmH sH h1Tjh1T0J(U h.h1Th.h1TmH sH KTpTFUGUUUUUVV>VsV{V}VVVVVVVVVVVWEWFWGWɾvocWcWKjh -t0J(U^JhKB*mH phsH hB*mH phsH  h6^JhKh^J hC^JhKhK^J hK6^Jh.h6^J hK^Jh" h6^Jh.h^J h^Jh.h#mH sH &jh.h#0J(B*CJUphjh#0J(B*Uphh.h#B*phh#B*phGWHWLWWFXGXHXJXXY+YYqZZZZ/[y[z[[[^^*^+^^^^_úyunaWaMhB*^Jphh'B*^JphhhB*^Jph hvdh>_hgh>_B*^JphhLB*^JphhH.B*^Jph*jh.hH.0J(B*CJU^Jphh.h>_B*^Jphh.h>_^Jh.h>_^JmH sH hC^JmH sH  hC^J!jh.h -t0J(CJU^Jh.h -t^J h -t^J[[^+^``aaccddseeifjf$$ & Fh@&gdk1m$ & F'x7$8$H$gduNm$ & F'x7$8$H$gd)n+m$ x7$8$H$gd & Fgdz 7$8$H$gd` 7$8$H$gdMJ & Fgd 7$8$H$gd>_____````'`B`J````````aaaŷ򕊂tiYNiF>F>6himH sH h7 mH sH hmH sH h0J76mH sH jhMJ0J(U]mH sH hMJ0J76mH sH hMJhMJ0J76mH sH h!8PJ^JhMJhMJPJ^JhMJhMJB*^Jph)jh>h0J(CJU^JmH sH hMJh6^JmH sH hMJh0J76^JmH sH hMJh0J76mH sH hMJh6B*^JphhMJhB*^Jpha3b>b@bIbbbbbbbbbcOcncocsccccccccccdddddddde e eиаа|umemh]mH sH h7 mH sH hzhO hOhOh7 hDmH sH jh`0J(UmH sH hCh`mH sH h`mH sH h$9mH sH h&(mH sH hUsmH sH hzmH sH h EmH sH h0mH sH h9mH sH hRBmH sH h&mH sH hPmH sH % ee)e0e1e9eFeheseeeeeeef"fFfhfifkfffghZhjhphhhhhhh iнЌЄ|tldllhDHmH sH h(O.mH sH hGSmH sH hvmH sH hX}mH sH hdmH sH %hk1hk15<CJ\aJmH sH huNhuNmH sH h>huNmH sH huNmH sH h>h&mH sH h&mH sH h<mH sH h]mH sH hxHmH sH h7 mH sH h8mH sH "jfkffhhhh i iiiiijjj & F+nx7$8$H$^n`gddm$ & F*7x7$8$H$^7`gddm$ 7^7`gdd77$8$H$^7`gdd & F*77$8$H$^7`gdd7$8$H$^gd&gd&$$ & Fh@&gdk1m$ i iKioi{iiiiiiiiiiiii j!j"j2j;jBjVjljmjnj{jjjjǼڼڼҼumeZOZhdhgmH sH hdh;4mH sH hZmH sH h;4mH sH h=h;4mH sH hKomH sH h=h{mH sH h=hUmH sH h=hZmH sH h8h8mH sH h&mH sH hvhvmH sH h8hvmH sH huNmH sH hvmH sH hYmH sH hYh(O.mH sH h(O.h(O.mH sH iiijkllMmNmOnPnoooss 7^7`gd qq 7$8$H$gdE5 & F(77$8$H$^7`gd)n+ 7$8$H$gd,gdk1 & F*7x7$8$H$^7`gddSQx7$8$H$^S`Qgd;4 & F+nx7$8$H$^n`gdd jjjjjkkkrkkkkk1lRlVl[l_lelllllllllllmmmm.m/mLmMm·{wsohshsh]htahK~8mH sH hh`RhfhK~8hhh[hPhDmH sH huNmH sH h%mH sH hK~8mH sH hQJmH sH h`RmH sH h,hDmH sH hAEmH sH h&mH sH h+`mH sH hk1mH sH hdh&mH sH hZmH sH hdhgmH sH $MmNmQm^mymmmmmmn7n8n9n>n?nLnMnNnOnPnQnnnnnoooo:ozo}ooooooooooڎ|xmh|_hDmH sH h|_h|_h|_mH sH hhUhIhoh G9h G9mH sH hmH sH h G9h%mH sH h G9hp}8mH sH h G9h[mH sH hfhfmH sH hfh% hhEh#9<h?GhhdZhE5hK~8mH sH )oo!p"pqqrrsXs|ssssssssssssgdmL & FgdOgdZ & Fgdzgd, & F(77$8$H$^7`gd)n+ 7^7`gd qqopp p!p"p.p/p=pApMppppppppqqqq,qqqqqqqqqǢ|tltltd[U hZt^JhZthZt^JhB@mH sH huNmH sH hZmH sH hZhOhuemH sH h,hd_mH sH h,h7mH sH h,hDmH sH hd_h[h, hh[ h[h[h,h[mH sH h,h,mH sH h,mH sH h|_hDmH sH hGmH sH h|_mH sH qqqBrCrzr{r|r}rrrrrrrrrssssssssssssssssttûќ~laYah%CJaJhbrh%CJaJ"jhWgCJUaJmHnHuh%jhWgUmHnHuhqnjhqnU hO^JhkhZ^Jh%@mH sH hB@mH sH hZtmH sH hkmH sH hk^J hZt^JjhWg0J$U^Jh_!hZt0J$^JhWgjhWgU h%^J"sst4t5t6t7t9t:t;tt?t@tAtBtCtEtetfttttttŹ߃xpeZND> h%0J^jh%0J^UhvVh%6CJaJh%56CJaJh}h%CJaJh%CJaJhbrh%CJaJjhWgUmHnHuh% h]h%h]h%5@CJ( h]h%6B*CJ^Jphh]h%5@^J%jhWg5@U^JmHnHu h_h%hWg h%6aJhbrh%6aJhbrh%56aJ=t>t?t@tBtCtfttttqomomaWmO$a$gd* $a$gdL/ $<a$gd}kd|$$Iflrdb!m( R tm(44 lalyt<^ tttttttttttttttttttt#u%u&uRuSuqu̶{wm{g^T^LLAhh%0J$^JjhWgUhh%6^Jhh%^J h%^Jjh%0J(Uhqnh% h]h%h]h%5@CJ( h]h%6B*CJ^Jph hkh%h]h%5@^J+jhmtGhmtG5@U^JmHnHu%jhWg5@U^JmHnHuhWg h_h%hNo0J^mHnHujh%0J^UttttttttttT$Ifgd l $Ifgd l $Ifgde+l d$&dIfPgde+l  NJ$If^gd l  tttttu:xOyzqomm`K``7$8$H$^`gd{t &^`gd{tkd$$IflCrxH!( R tm(44 lalyte+quruuuuuuuvvKwLwQwRwwwx x:x;xxxxxx4y5y6yNyOyPyQyRyjyyyyyyFzGzzzzzzzzz { { {{V{W{{{{{{{{{{+|||}|||}}} }!}"}%}&}k}l}Ӷꡗhh%6^J h%^Jjhh%0J(U^J hh%0J$>*B*^JphjhWg0J$U^Jhh%0J$^JhWgjhWgUhh%^Jhh%^JmH sH ;z {{}}%>XlH~ӀUY4?q^`gd{t &^`gd{tl}}}}}}}}&~N~P~}~~~~~  %&'(>?@AXYZ[lmno5HIJKno~ӀԀՀր ௫hWgjhWgUhh%H*^Jhh%6^J h%^Jjhh%0J(U^Jhh%^JjhWg0J$U^Jhh%0J$^JCMUVWXr  UVXYZ[\`>>\{Ԅ()4567tζήzkekeke h%^Jjhh%0J(U^J hh%CJ^JaJmH sH jhWg0J$CJU^JaJhh%0J$CJ^JaJhWgjhWgUhh%6CJ^JaJh%CJ^JaJhh%CJ^JaJ!jhh%0J(U^JaJhh%^Jhh%6^J'AWˆ*FT{"%'?@ABTcqrst/>MNOPXhpqrsÉ҉hh%B*^Jphhh%6B*^Jphhh%H*^Jhh%6^J h%^Jjhh%0J(U^Jhh%^JFMp~uđLHP:Ě  ^`gd{t &^`gd{tMPQf|}lm%&z{|~/0lmލߍ񛌛hh%B*\^Jphhh%B*^Jphhh%^JmH sH jhWg0J$U^Jhh%0J$^JhWgjhWgUhh%6^Jjhh%0J(U^Jhh%^J h%^J7ߍ./pq56Z[uvwx6dgԿԿԵԤsaMs&hh%6CJOJQJ]^JaJ#hh%CJOJQJ]^JaJ#hh%6CJOJQJ^JaJh%CJOJQJ^JaJ hh%CJOJQJ^JaJ!jhh%0J(U^JaJhh%6^J h%^Jjhh%0J(U^Jhh%^JjhWg0J$U^Jhh%0J$^JjhWgUhWg78đőƑǑߑ   #9LMNOhi”Ô۔5HIJKмﭤ}jhWg0J$U^Jhh%0J$^Jhh%6^J h%^Jhh%^Jjhh%0J(U^J'jhWg0J$CJOJQJU^JaJ$hh%0J$CJOJQJ^JaJhWgjhWgU hh%CJOJQJ^JaJ1ޕߕ –56OPQSk /0klϘ':;<=dešÚĚŚƚǚ  '=ӻӻŬӦӻӬӦӻӬӦܦӬӦӻӬӦӻ h%^Jjhh%0J(U^Jhh%6^Jh%jh%0J(Uhh%^JjhWg0J$U^Jhh%0J$^JhWgjhWgUA Pm Qwϡ"MǤʩMŰ &^`gd{t=PQRSkÛě$%wx()OP4YlmnopЙyyЙhh%6]^JmH sH jhWg0J$U^JmH sH hh%0J$^JmH sH hh%^JmH sH jhWg0J$U^Jhh%0J$^JhWgjhWgUhh%6^J h%^Jjhh%0J(U^Jhh%^J/ !"#)18DHPQRSTZvwxyz~ՠ45{|ΡϡСѡ꾰󘔘ujhWg0J$U^JmH sH hh%0J$^JmH sH hWgjhWgUhh%6]^JmH sH h{th%]^JmH sH h{th%^Jhh%]^JmH sH h%^Jjhh%0J(U^Jhh%^Jhh%^JmH sH .ѡҡ֡סء&cѢҢ!"#$%)@CLMNOP;<߿߷ߋ|ߋ|rghh%0J$^Jhh%6^Jjhh%0J(U^Jhh%^JjhWg0J$U^JmH sH hh%0J$^JmH sH hWgjhWgUhh%6]^JmH sH hh%5\^JmH sH hh%^JmH sH hh%]^JmH sH h%^J$ǤȤɤʤ*zgh֦noEOefɩʩ˩̩ͩÿôÿôÿß1jhmtGhWg>*B*PJU^JnH phtH (hmtGh%>*B*PJ^JnH phtH hh%0J$^JhWgjhWgUhh%6^J h%^Jjhh%0J(U^Jhh%^JjhWg0J$U^J4̪ͪ 12MNOPij䯫wgjhWg0J$U^JmH sH hh%0J$^JmH sH hh%6^JmH sH jhWg0J$U^Jhh%0J$^JhWgjhWgUjhh%0J(U^Jhh%]^JmH sH hh%6]^JmH sH hh%^JmH sH h%^Jhh%^J%ͬά23ĭLM#$  sŰưǰȰ Unde޲߲Ehh%\^J h%^Jjhh%0J(U^JjhWg0J$U^Jhh%0J$^JhWgjhWgUhh%^Jhh%6^JCWqγ.Vϵַ[7$8$H$^`gd{t &^`gd{tEWXYZqrstγϳгѳ ':;./01VWXYϵеxȶն89yzjhWg0J$U^Jhh%0J$^JhWgjhWgUhh%6^J h%^Jjhh%0J(U^Jhh%^JG÷ַ׷[\]^˹̹͹ (EFJɼʼ˼&456DK̽ܽݽ޽̿̿|hh%6^JmH sH hh%^JmH sH hh%6CJ]^JaJhh%6CJ^JaJh%CJ^JaJhh%CJ^JaJ!jhh%0J(U^JaJhh%6^Jhh%^Jjhh%0J(U^J0˹(Eɼ4ܽ m$M[% &^`gd{t&^gdQ E7$8$H$^`gd{t7$8$H$^gdQ E޽  K_mntuտֿ$%&CMNZ[AFG&`z{@A[\uhiƺƺƺƺƺjhWg0J$U^Jhh%0J$^JhWgjhWgUjhh%0J(U^Jhh%^Jhh%6^JI%&'EZ[`~Yde789Wstu67deqrs ;PQRhǻ h%^JjhWg0J$U^Jhh%0J$^JhWgjhWgUjhh%0J(U^Jhh%6^Jhh%^JG%Z7s6qPc.FZi( &^`gd{th4cde{xy./FGZ[()NOij TU()BXǻǻǻjhWg0J$U^Jhh%0J$^JhWgjhWgUhh%6^Jjhh%0J(U^Jhh%^JG6/6zIbP,)}&^gdQ E7$8$H$^`gd{t &^`gd{t %^67Pf4/09HI\]q3Ӷ񤠤񤠤񤠤񤠤jhWg0J$U^Jhh%0J$^JhWgjhWgUhh%6^Jjhh%0J(U^Jhh%6CJ^JaJhh%CJ^JaJ!jhh%0J(U^JaJhh%^J h%^J635678RT23_`z{|FGIabc01ij56PQVW˼ӣ˼˼˼˼hh%H*^Jhh%B*^JphjhWg0J$U^Jhh%0J$^JhWgjhWgUhh%6^Jjhh%0J(U^Jhh%^Jhh%\^J< qr{|%,-)*}~./ 89bc  `a  _` bc  a׾ h%^JhWgjhh%0J(U^Jhh%^JjhWg0J$U^Jhh%0J$^JjhWgUK}. 8b ` _ b a ` 9^ &^`gd{tab  `a  ()2379:\^_z<./ABTUb|~ùèjhWgUhh%6^J!hh%B*CJ^JaJphh%CJ^JaJhh%CJ^JaJ!jhh%0J(U^JaJ h%^Jhh%^Jjhh%0J(U^J:^.AT.CXD^{(] &^`gd{t7$8$H$^`gd{t./CDXYZ/CDE^_{|hiWkl ()]^ԻԻԻԻݡԻԻhh%B* ^JphI}hh%B*^Jphhh%6^Jjhh%0J(U^Jhh%^JjhWg0J$U^Jhh%0J$^JjhWgUhWg:[\:o01KLjrs34501ʾʾʾទmʾ$hh%6B*CJ^JaJph!hh%B*CJ^JaJphhh%CJ^JaJ!jhh%0J(U^JaJjhh%0J(U^JjhWg0J$U^Jhh%0J$^JhWgjhWgUhh%^Jhh%6^Jhh%6H*^J*K4:2MNOP & FgdOgdGNgdF&gd` &^`gd`&7$8$H$^`gd{t &^`gd{t:;./z{ #]^?LMNOPǻާǻҷ~oңi hO^JhGNh%B* ^JaJ8phph%B* ^JaJ8phph--h%B* ^JaJ8phph%CJ,^JaJ,hqn h%^Jjh%0J(Uh%jhWg0J$U^Jhh%0J$^JhWgjhWgUhh%6^Jjhh%0J(U^Jhh%^J)< 0 0&P 1h:pK. A!"#$n% G0P&P 1h:p$=BP. A!"#n$n% Dpn{D r qPNG  IHDR1 pHYsgRtEXtSoftwareAdobe ImageReadyqe<:IDATx @@`g8T+16D4iw7Mof۴nwmm4I6k71albE%Q9yqf@{>掠TEȢ(dQY(, Y@E ȢEdQȢ(, Y@, @EdQȢ(#Ƈ"0x6{NQ=(x{iSppFЬE!, @Uz dQJO@/Τ.ȢԵ4@!, @U dQ(Ȣ` dQZ6]@E _(-(ȢT(ȢFQE. P]FA6, ` edQj(ȢFQE-H3/XG9, @U+LdQZE Pd(Ȣm(ȢFQE. P]FAh_(UOQEki"YdQZ83BYAtY2 (S PUF", @] _(e2 (u-K.ȢEQE-D!, @UA:5(u-A3]EkQ"C, @]F, @]y:dQZ1f P/YLq2 (u%b|}(Ex, @]KedQ*3edQJO@L#t/ƶ-͝gL ppZSZK9,:b۳59ee ּ]ck],jzO#{^@ iP1 TL1K .>\޵zVr?z'{ o,9V:z)2=!,1\ I+?QpzQggԞ(U~Dd3{iZX5jJga OgMD&d~w޲\iii<3Ί 7ȾT'ŃA4Zpdņ-K?(d =YdQj_o浒)7}lP쥱eVM..ڶ&qUZD %&BYYms_E TmZe0yik~oyq|eѴWI&)Hmutu+g[tMѺ]sekI]:Zh\[YGדNJ=#|A0E(E{ݛ7k"q!SxSzD1 Ȣ s [;k0K!~_2F0ojs3oۺ`"Zh@j Bޭ]cǎڵK~ =K<2j=zuFDw{,11Q,L.` >\DQ`2gSWK{EoL{7o(몱kTP?ia%GT[VG~ES->_WV3ŧchM|6C399z>7x0FE1襪NkN|vQZ6ms%*\Ʌ~R?p݂&u˃Tw#ƫGDsZ= W^$0,NпxrlRM bih}OVַԶo!qy<ڛoS?ijVN:2ĉ1,+EC5)&Zb@'m~O[.x䷏i߻tm8st/zƣ^5}ק2uj丮KMMwF~J2wtQlYV:?];{T59[9?^^UIQ~ƺ/uK]32T_ E;UqN(=u,]W;TX/>:|[h6Jkg&%˛߿FX#~ Ɗ:nܹb|4 ^*,;`@@@(3zTX,v̊[S -Kos/\(--kM&#w^^ȢKU5_rK"ͼ>bBu\&]j՞Kcy/ Bْ K!y9==gm#R.Eݝȓʏd?.27K9SpLZb2YTF\[oY\R"\r$rҖoٲE>vr;㷲&Q<};J_|M `K ֐Eq=M|E5M]y /Ow\c(Kz|eZE^,),E;3e%p;vmcpH8_\qk☮AT&>vٽmnyvoF ѣ HF"i`e. _?l_n羅ۼ螙Q4*::/F٧Oˑz>˒W,߻׃#;;鷡۴ǽ/*33ZR'"Ƈ|hThn/YYܴU*==]l`4xb_W\R"7%%%)9yqtժU}$U3X^^n)+3NK=&.X:fs~~S{NLh)1!&I aFt4wͮl[0*޴7dճڻ/|\TsjXݣVcsMu__~gs#N˘55xmmm/<֩jvv,Cu ;vpZ)k׮ $^?ط/''yyy:4p-p~OIca2adQ/"^u iXHOW4f076zmUu VNftoFgRa툰X,mBjTY2E$m)W & v,:(byѲ3bO(J3fK,W74^k6W5(o$ rfѿK3-*%.hGŏ}a೽UZeؑ*s ~(ARa8kfу(GURȈ˖%:8?vdg+9sJCsg}P&; /3(&n=hMMYώyt_גUd?QjZq"Dݖ%^۫Z*+gJJڋ[<5O H/H;c˻rޟ/,*"P# G0r;b wF񪫫+//=s_{vDTֈnݶm8],LBMM -ei"Y6:wLeE6^n<{adOTb}5L[&_>0=6t^\@EM /ML*U >hnvGtMrAA=B 1Eۺr V[:lOq*/ilnDz(/t?n!\P 7is{g¡8zIYߖʉF5 ?^FCvQP oviZqLe'eQ"~mA7u:,ݫVnkk>}ZyW"_g&%{?$ga&d=vۑ^8U g)ޏߖCYշWY'rX[KJ.4YZMa;6[55 ᡾9H^^<-^,qT*rnR8'X+?;->^@Wyb SC7j&| _z%+ 2=Yt9p\Zv{8txٰٞ B["v[l)IOwn9TXi 4 )C~(/GFD8@:QN4*`e9ZDV|`fe}G0[mSY|S|^ܳgG)&S[[\r!UΝ=εkk] '5:, ES6Cq+S"sUpì^Zmuߤru8ϿIZZ9`GDSd &@WY9f7._O;Ǫ^yRM~V%_wdQqMjYͷwRgݴp˜iS5\!K@y{{6I9_wz ,:a\kmjX=lsG׏><\׏t>ݿpJE3`HOȢFcP\yg}_NM?@+N q>7e7qMdHSGWE{ǚ&C freL 'EWimak ]9|aje<5?3-zi49 P.jZ,קlu;Fl)-nҟ өGy|lpu@漢= n[tUs#,2ť s.J5nk_&S/ݦnAm'ŝ6+>tYTg}V~c4oV~AR֭S"#"ް!##c2gF 8yyy ݸ_`dĄPd σn̵ƭogWGܿ`6 M+, GԔ5[Ghvh4ܖ%5DmxO_?>UUWرRV6"_]]ݫ"t3#na2E'+ ?HIܲf?'.cF6 fkˊO,;[j[j5j I>;+e=XݗB]/YFǷ$fggxC'SȢ㉟ > vu?;Hc _5=b ~gEXnlZrbMsC{H]6%ny䕞Y*2k'1t2嚶Ǐ)]KG1ce07|@>?'LJ u ئJr[4><#!<rX츘"nݶ-77.qLJKKG8*s۷+JKG+4zay{ՊSt萴1xg򣏺eL,eYQybA\xݹv}t ۮy6ou:t{gntꏏ_|z߰``I ,:qBowM7CvۊWY=՞=MJ1=Z*.kWJ{n{8]юN0-//wmGr;ȇEFrW_#ȉ5*529%GȌ5VU]嚛NZTTߨBp)nSOKKdvs8jgR0 Ϛ`f%N sc ?֧fx{T)x~hei[lkO7ڥp^^bAdTCo=Eܹu׮.2"޼⺀Ĭ')-tR˵ܸ;2X|ڸө+<TqAzzX[S<䖮2sAfXb24ʷ/_|yJm sʕҘIjWde~Ehb_(KUܔ?!dQĚG*^ps0S,9e9戡Mot,-l1>1샻چCz"}GތO=ӯ~kRQ}Yy}]_kZ|233)K/nDN+Eo-]ӇbX"cDLu[Wt۶IW.zlYT3IfjEu71t4 ۾=qoXpS/^(ȢwQA:UX޹EONѸ˗/Ց$w]+w_ouRSm!VYjjeԡfсL"yyyT)J n:)7g!verlmmRRR̝+.@O3~3e,:ttp7̍18}합.<_8Ԑ9.cN tCt~SFzV,_KنvLJ!ռ "AtmMNNV䩴 =}MޥΑ&0x cjrv<]@H[DV$.,hdE5N&:-{Fgy^q񊌈[V ,hSZK9j&UJk{uH-<26!%/Q[u ~-ˏ# *ҊzD\O讷9߳gk;wPcU.- PUm.t 0e z 4ztvhߗ&M7n9'^[;^=sty}[R}Z/6;:TCv=M:ڧxW;ؼYuS9.YlQ$.f0M[F< :EEEjzhM fS(lu7e ȢFEkON=:m~Na\".W7r"Bi]ǁ.R_7>])cn$rWy@˗+_vpIP]dŭ9 t)ծ_<:Q+W8s۞=r7EM%ɢdq˫۹ź7p1r,ȟ;&DkUʷğUMG.];YVW1#xg?ťcQuON^WzMleU^~~H/R {{oTO-Z{7nڤNno+u`o۾}wZJ{~!q=vr٘)zK fEt8ӺA6 ֝kj(ȢBeQIGm\MY8UT412XXξR/CYYzD)^oiҎqnʪ<~~55Ν񁎜81曷~Np6U^E崨J"6UQ⒒^$y[)7Y|yڜ9Gekc (͉ &Eǩ!5 oSk'V|Mg%D!:cAӗkUV5X;;-R3`gD>zǴ7NXyAcgOpw j ֍ɳ%@mUS~4bccSL&PdQvDsZ崥qӦ6->^&y|+ȢR̼>+i[~-#_K([D)>bxj:>_z9VNqmK{G^wz}dZKM h?^?XPϖ~uq?xoOlIwkEىrX9>cdMzjcΟ]GFDoEV߿'Xu۶ ɮ[NYznS^ 2J3aECNV Znb}bxyiSF̍ ˘!3scK^|ycy*2\q::-+kgo7_>b GύNTf\ti$y}llۗߓSRƌ q.a8P?Pl6d4g&% nzHۋlG̝>bm:K,w 7mOPɣG D3w 9RZZZRR"ӊ Q# $=9BhvDm;n vNOlsH{ 5vyeOLX}z>iFzBESs{Wq66I-o҂ צl[}+ S}ťޕ5<71T?w퓖}U[ۥh=k}+BlwD>W?-**>晲(10HjtY,:NZ50ȃ"lzzxM !=\7{0lilUSi{OVxtvV.ONA}_5%g*Rķq& /QdhN^ʢJљjSɊFq_(;諾 ުp3:WU^qJc[Ug&՚fôe47+GT9dZ|ʕ+)+0;!Wwϊ]8JRrH+ҠH"V5xGe}Z(vwCƴ.[]M )g4th>t*_A误\8+/kz L,IF(YtOmdV:m=c >@rDΑO/|'YMKK+**X,5=JѨ F'Di4)ȢQz!ρyԪWp5Ms%͉>:P`H"Eǩ%6wt*!MjugQøT~?r^^ޥRyM$Qll$fj5TT{IlQAsr S_^dW'><xÊV*%ph䶳b~A={RLM7YAy911QXx2+K'P_1BuxMċņE6kx /s;5GJmnX(| I/ׇr wgFo\r=zgjToiv" ?~DRqTnV RFTpTx.,WXQbl9xUk½sn[1Rs RQ՚l+>ط=4,/Vvҥ&' _tTڱ3rvE}{ԝM۳gݞyVzhK#ͿȋJFT{@rŖ}nt38m-nd~j5 p<{ 3_>/wTO~RU]-}':Z,oW6/3 74p+KJ>ڨΰ)r篰iچP(ٳOFߔֽ3?ʤ(2fڴں$9!3WuSkIS[eKOV')H%#xqce~VrZ#n- mI[oK{[h'yw̏^ʤȈ#NsZ/?Tu\٩=yeeeI646"߿M{{-(&D||Xn?NOOw:tR)rximiI3Gz;O:%|R)رTTT/^X^sӢJd21saқc=t.G_Ͳf]ʘy^BXkgLjWo+ϫhȭjkyZhҫlWzi5:دߝx{]8~|h?ub0~{eݝV,qqW^w{;׮&VZ|s/?СT% D7ސ۵ʭovGsg˙V/**^;qmw_/'r-N`/ߗ8R{fWqS'O۔׋ھ@K(wsfn۱c"._:-">5K/i܊Ku֎Ǝn⥧mz5ZP4o}R'N5=ps'.v8=sFK\bQ6 In*2hqIIvvk`D.2eth"yx9p}6r{饗t:elll#N'T6;JGYNH81&&F>cFQDJ>=zTl"ʦ"WKq5>JE*Ʀ`e$5G(2asius_PJ?.KK I[0-A AĈ\xZ5MݥMmMNfĄn7΅Qb́kǜ5MNRLks8xʾ"mܴIHfYNA ]]_oqqʏGjv r*s8}`f#Zu+Λ7ofR8ȷnu^\-e媈Bwq?+**r%sSԥ˖ٳ߉`̥'Qd _V޾3xKM.Uji|)! [cB7Vzq+m]W}NPo /`1 SᵏJz&cm;Ey+ G{Z5jVTVЉ$>bMS&T P٨<ԐINNVVueq;%8==iwKy9s:}*b2![,,t;`Z|r k:Mƿ4Ϛ:?l̮hꙉ+*/B7eI|xbd̨Ə^f?Y"fbH,ϙ;7--mo.c d@q[m;zr VǐKĤC~E5;&Xsb NrܭOZnf&e;vMECO.ͭ#xa=Uvg3b=༫&q+ jkgEGWRA4JT_?>hJxfRrXlC=\' PT{ \wU3kAD|rٜV98`ϽpaYuKxQ$|1g Ȣ?CFc!9;z~4o o4@o(Uf{,9X}=oZfQNҟ)ZMMMU?ܳgX#rrP I|!" j(f1k;wTPVZGwreϳ(**z嗝`<43)I1y#(mBBEIs' -MQZsFvƎWCGWU%=G~`htU{ۧzj"Vi̊e?FyWVX_g}Vܻ"r;vL(11Q9T?,Rr{eh>|a Z%"sH[Sߚ` arL73?ΰ>a꾢J}'4Ũgݵhh_FFƥBeOw]+7-.)9VlGq#::1)hٵkWٜ/KyhXgΟw̤ǡ?+Qsɉokks3wo:0,g"D򅅉"ֽrdҥVkibt5>V>!) [mSkz٬HN)Tލ'WNdȿ߲EI"uLdo)uG}nv9֊Rݲe˨0JRbB(k2'|%=w"gY">vbrDo333εk#+=2" Dii~'LX\8'WLq _4ɩ]栗޿Tiag!F1h}9;J< 4)hH B# ovJ1#"N;vQϩC. n;c({{fߞc/Z k HJN)kFbBu䎔#eۈs 8Z1< Ê[T:yyyJIInS4.rp[c").`F,j>вm k/~r&;77,ꂄ`Վ u܆xfQLn4ӝ|&n/ْ%mCz}evTȝc޳QH_P:lgѐ)>Rf!P|t{RFyWSU\{Ml7/zi5Έ|Ks˷ :]L9E'玙K^^Q:ѡ Q=o^qc~YEmŭ6E]Kҗ [ֻY_y@l\,ߜ↎nSB!P";ԃZX`im<_`ijvutuɭv]*h?'F6~@HRP͍mBr,z{M{Jq]mm6kWis͢g͢suȸy&a"wZ7RF#GYtpcRXMԅJ _D%6I%uUm7fQrDgQFΟhwmBKW{\&@5I_hj;.9iK1/1귬>UG1S7wªš֎.ۍ HoV/譝K6ޕfN$ FEmPdQhrK: *{;R3Xƺ{>8=*İ<LJ;((&%/x,AO!E@U _D%ɢdQPW/Ɨ(ɢ , JȢEɢ.SdQPW,Je YTEdQPE@m _D1|YE@m _D1|YEdQPE` ȢhE@]c%Lt%ғ((Ȣ6/"ڌz , HSdQPUtɢ ϼ`@U͉b(](+5,JubȢdQPW,JuEb|}((*#*B %)(*&)Fɢ.S\@U%ɢdQP]@!E@UFE@ec)(KQ(+=9B e, EQ(CnV)15ŲxɻNC]GU+weوjnj0x;᳢ذ~ܳٳڌ<=*@΅Qjnj̡nMw(uJorRCW/NPNDZN)PyG0FB!E@UAYTC(YkȢ0 , j[L!E@Ut%zE@]z , J22(YȢ(/"%e, QdQPUi]Ȣ0 , j[L!E@UPE@]ԋE@]LBuEF, *gQ_@UeDPdQPUjt@U((K(YԕF!E@mم, J%%)(L!E@U1 , J22 YT&fdQPWjt@Ut%2օ, QdQP7((-hȢhf%YTe^, J2Eɢ O@UeDPdQPCE@m)1ԋE@] , JOȢy: , J%%)(*&zQ(tɢ6%`(](tɢ6%J, jc(](tɢ0J, jc(](tɢ6%J, jc(](%J, jc(](tɢ6%J, s\X,/WԶm]%/+?oPwoy0W<7t(nj03ayS)vo>CM {|S K߽eßͪB^;\* qϯO-W^D(>e#)!%.u"X"<ӕsҲXo]%nAJ؃M)g075M |WC&CoPMЕ7CWԄ~&0p~}1xOR k߻$6HE/񶵮1_Y;l 3#Gˑ~]ڻDϭġZcRn jYr(+Է,PӣġY-ySʃR`nj3țL(ăMM>>tR+oJ ЇMCίa>,ynLnfU| A]CE@mI zt>1>YTB!E@U4%YTe^, b(](-H8dQP]@!E@U0@uޟB 2YޝywG83\q(FVlVӸ.K/==hM#m@CK EmԕAmˎZI-$ErHLYF!9%I3RyiQh.E6U#hQP#}JWv^TĪĨ6<Z ɣFТNTLW:t(@ѡ(@;EBv^TE(@pAD;32h- ֓AA:VעZ V5Z ɣFТNT]eT:ЧE(@ѡ(@;EBv^TE(@pAD;j- je](@aE(@zZ `Z ԑբ*ޝA:f- jiQEZ ֱKjQXղ.ҢN7.Z ˺hQhC#hQP#hQP AvdjQp'e#hQP.Z ˺hQh.E.Z`.Z ˺hQh.E.ZۓWڇvn?濲6s6=&զ'̡'=I=P}%o|uѢw淗?/C-=?Ҳ?ʵC-=.<+1?TtR1W;#T4gjrfT>~R?d_>-K/V`d*{3?8K3X8=n:9wzN/ߓS)owպqwxWjݷov쯞ܛC=HCL՘_%{Ojzj!R?®&T4gjrfTa>O1+'Uws)%+w!|e](@4uѢhQ;yZ Z;3ujoZ HZ EJFТիFТe]EbA8/E4UqjTVZ VZ ԱaoEb *AĶ`(@ӻ}UEZ 萷/ҢjeE(@SEТvh(@zwf- ޚ(@ZZ pZ TZ ֱ(@]e#hQ1vԨuOjQX#ZT@Z ԱzZ TA:2R1Uq^T;۷jQX#hQPCeTĪբ\bTDsQ- ~#hQ(@ѝ4@+EТvZ- Pl.1EТOӻFТjFТF*FТjeE(@cu/EbU˙(@##_TĪ8/EĨZ KjQh.1EFТKFТv9/E[tZ Z;3 ^Υwn߿<-}WO濔@~_ru|v&WyKX>tҡrGH6Huٴ;#ˏy=_:)˟y44:ɛw|ӻɩg䰨ɮ䟾5ʳPGݲu<՞jOj'G'ڼ?λpޕyk=꩕xw[*^ d#hQPdž+FТhQB;yZ- PtwWEBռ6:t(@ZyQ- _65E(@a-EТwx!K)Y`}zK]FXE6ޝA:j- ((•}µ?|4u~p=Շo7.?8?xڡV}C=p&?'MO*O*>&iӓjP̓ܯd=ߞwgE$፯}opK?>,տ}wv,M;c|*?Nj#YyCƖ:c~s>'8gSTC|$+զ''}k> ~%oImWߞ~{voo}tӟk}~^i?߿2}K?h?/K)YݦyQ(Z(Z'voZ ԕ{EТhQТER@12E"5EТhQТhQy#hQ(Z(Zݼ`- ֔)YJ ~hQ(49h- [sFТhQ(hQ(M{ڔ(Z- Z- @s~|}Z- - (@sFТhQ2YJ^ FizumrZ ؽ(Z- Z55>Z- efR @\7Ü@E@tK_TĚn,AEТе{ FТ&FТl,d"9/ F\EČ(Z- ZS}tsZ- - ޽:g- @`gfEТhQТFТhQ(RJVhn.a5΋EТ̜Ԣ>oAEТ)tѢAExZe) @띝5jh.ҢhQZ ص^EТhQZԢ(@lN~Q- @JAd)%+yQֻ40u^jQ(ZֹxkZ- .N,A?E(Z&FWĺ00@Eh77@Ehw(@9-EТvkjO1@ZtrO(ZM5FWĺ00@EMBo^o- @U>.Z-)K)Y5Vsh˷FWĚӢZ- PlL4EBMz@ىY#hQPc բhQq7IYJhjhQt(@sDWE탉y#hQP^EТFТhQТrq<AE mfyQ- y#hQ(@MyxZ- Phwu~kt(Zn&kd2 iq^- i޻Mt(ZئFТ.{@)E(@ #hQ(@qݸg5RJVX9Uf΋E:7EТvcyQ- kբhQb;w{Z XcZ (@w( KIZE6ТS..EТε(Z.Ou~kt(Z.O@Em>۴ݏK>΋E:..E-5E.k\$,*dvq, ׻%YTpkteQ~գ;gpPUeEc,ɢ(@^T\L*#ʢy=EYT(@fM=  z&YYVE(gsU`D*((icSg"ȢȢgvE2@"Y E*SY EE:Tq, WSO"$  s$R\tAȪ(@^="qDoY w{, ׁ,*\>(@>(@V@ȫW]Y #, WK&(@^(@^{* dV9(@>, , pfkҸHȫfQY nYT됇ʢ5+, OOJE:ԧ(@^@HE(@^- dU@Y MɢUAȪ$ʢy}PQY ^dQ:Aݒ,*䵻 (@^mEeQ{#YY.(@^%7ʢtˢ(@^ d\>(@>AȪ@E@Y 7tEr@Y 7tEr@Y +tEr@Y 7tEr@Y 7tEr@Y 7tE@Y 7tEr@Y 7tEr@Y =EEjs, S{L$seQz=EȫfQY wK, ȢYU=EȪT(@VG@Ȣyt(, Uʢ5+, OOE:ԧ(@^@ȫ, WK&(@^΋ʢy5*, O{($AE dQzAȪ["Y RyQY M} S꓃dQ9'*d~H dQ:KʢytSY eEeQGAȧWE>(@^AȪ["Y Ȣy5+, {zEEEeQZ4ѕEиHݒ,*䵩OdQ|*ɢuy, Y!5E, (, UK&(@^{* So8/*d, [5Ez<(@VGA@EeQ΋ʢ >(@^ʢi+䦉, &(@nʢYi+䦉, &(@nʢi+䦉, &(@nʢi+䦉, &(@nʢYi+䦉, &(@nʢi+䦉, &(@nʢq, WK1EESQY @}[yQY R"ȢYRY Β&(@^ʢmSY R#u9QY AEE(k\$fȢy5+, {zEE@EjDWȫ"ȢY(k+\v^TȨWE2gCj Yr, WK1EESQY Rߌ(@F@ȫkPdQY[]Y EeQzAȧWE>(@^5ѕEj8(@V{* Sox, QW^dQZ4.E(@WEEjWY ^FȫȢyq, WK&(@^{* SVq^TPȢyt *, 7vk+䵷"ȢY5eQY ^qFȜE, >dQ-SY M} ^^dQEeQ/*, UsQEESQY RߌȢuVY ^dQZAjo&(@F,*dUWY .dQ:ʞ,*&(@fM= +Ȣ!5EfQY 3dQ4.EzT(@Vˢ(@^z,*}LdQ6u), E(@nɢi\$q, E(@Vɢi\$q, E(@nɢYY j ;(@VGAjwOEdQ|J}3*"dq, E(@nɢmSY J du,*ug@dQZ=YTK"Y +dQ4.ErӸHM"Y 7dQ4.ErӸHM"Y ;dQY ~EEiSdQYȢyv, כ, E(@Vɢt *, 7YTloQEE 7eQY R"ȢYi\$]Y =EE)hSY j f׀"ȢYt@WkSg"ȢWWY eQY 7:5.Ez[EjWY ^DȫkPdQY͢(@f{{*, OoFsYE28(@^mɢdt7U l]YtZٲys:܏7gذaCl֦< x^˫?hѢ_r| |ꩧxjqzmK6F{4\06u)Y;;o_ k֬_o!'ȑ#7n7 .LS!s^gΜ9}H'byw1TT>miTyTt38;7|?yMU$ޕ+{R7jՃncw,^.[gL,zC7x7{Tow ?i4`<,5/b^1gμyOwq|7W_)‹./~ƍ+u)ENAtkhiSSuRzjL7:AN^z.z]Ϟ]8MM"ERtns_xE/}cޯ~k78]… ?uRukc>%-gŊz͛f]._=sgK[is^yM7_}5c'b]NTlKjmm9͛GGSIpŨ tMԘs 5C=%^=Xsx.ݓvx]7;vl>1`uCW/6- u_G;js666sۋk(rǿ%K?H?i Q3)xMUǮC{TzA6`5p0RALtHGl6nx%cR.?sϾ[qjժxY4~g8^8$-0rHrriBˉW]uUpYԞ"Km۶f͚պk׮[nFjEӠSH^ʴZbq=ߍ4\0|xc|"V闿ob|g捖|R6ӟH H?~Xn]Hwh߹3]cߏ|r?^=1j2ъM?Xff1oƣK"YtzIW^~e9ϩ;n|R-,YRvoݛBuBjOz߽'R;=BQfΜ+R -'Q;/s-'ժLwE%'??#EECPmO_L dNEeHAzipD_f5+GWdf<(E `K.-Np#\~}uO׭]֞wV:[MfCNɄ*6:78 kPZ~ݢ5KzWX`qs`q:s8?ط#1}ĕxʄ6tucS{'mhMkkn/=Plx/rKŋ8 ~6Ɣ^ \pA1eXuȑ zMcSվ_-־x׿^\\OSqdB\[*!1~WIJEei0RDdp$x?\WEw֦-7vq< ]gέr'>156wVͨf͚U|C=#ÇK}Iè䆗Տc[b_T{;KS&]y*;f͟ND+6:ԴfѳF72WLwC ]jq8?\MX DMr<^\Wdɒ'aʙc\l8ssWgӽ ~h}^,sx·OtOFM&Ti]83fU,:m"JMG_>uvMq" Dmmm]tg /ᢇgL;7<1f˖ŷhm&}hbTogժU6l*o! gpk2ъ[ jtw,f+&{n:~s߽ uę `lz&rT,ϩZδsJ6/_7/*R4 *uزeKD(Kj3Ï[[G % }Gfz(h+&FXHԺs +yO0N ]Vl M=զ#^YQxVۼ}1%Ŷmۮr?wq4_WsOwΚuqEbb- ]1 ="d#ر=Vt҉ƕZZ`A~[Q#aTTm]+WbĿwߙwy;FbŊUVM2ײe14%%~\|7!GbfTúR yꩧ* |LbӴpfh1y〻nvsxn3ߏ8QEgϞ"bO:y>u5ϻɒ%ۿڍ!>'<Q-4Er<ܩZ5[vOQ9٪Wµ [c-3Z _vَweBnܙ347(7|mqt|ͱm"]Ǟ/s`uUY@π" Y!"y5h\,{^=D)&$-g^Y,6lyrkSR5Ȣf͚xJ@KEEbՃ.\pmԵ-7?)8lkEo('g'Fwf9R}[:Pp^8Wk}]b3 _8Cv̓[؛_zu?ؿo_oG;|zJ.Z(؜I҈+J3)V۰aC9c5sz0nL5cWW3կ}zuk*F#nǖV-Mxꩧj>Opx͢L,:g_ݳ'^yfSS}S=;ˆ3,>?Ս1$w-[o.\а~hl֭{Gꪹs1Sn\q=+/zE1O̰e1O|63T"E۱c{|7D%׬YzC5q4*J1Xc7~w1gk_XYXBL/'{n Q1'?11^c]]]S23 ohg>O0;śW~:zD_| ĽCG1s&cg??3k|0>^XxIn4i~^tQЙT?^| q̺kڮAlwV=h #(~䌱E\F.{]|б(?^xGu-hśeFfK[jke\SY7|cJ)7M.c3+f|[biJjs|#cB{`Z 7h\oNE#544đ}q/_$o߱Xsҏc$fa >^\''HKZo_t{ʓ5''"\E_z|bE)Ԭ _bйYtiuMHἺɬYy_sxn2c01eWX1ε\PL=4gu9O)Y^x?vh{`Zn72h[_O?+fgϞp#-[~VWul:O>޼͊4=-6ՠ{"?邰կܾ3ϊ7ݲ:<<;feDpap]KƳ/nlqF3Mշ};B["Pc=.Ζcx qLŜ9(C}kZ[[bH/ґ},*`CCó:BcXK/M)4ݭ$Kg>#+'/=՝{߫ L;&g ٍ[l]254:΅6g1zw/kѩ;'I{ ELȢ dWiy#iïcs.L4eȆW;::~Y]_Ư95|;ZD&/Mn΢CBuwhU}kVl ?le͜iJOziJ]sLM=Yt1z-t30yCq;"|VƼ/lܸ1h^݆ t-?I~EMMTN1&ֵvMNZED+' 8kΝ/!MzbChY2V7Ѯ4%%~\|vǖ&Z=g,uCh_oE#U{{dQF0-/N'Mݞq?bt9n]fC&i#Lb"<&Ո3g?Տzk /eQw~+W~7U7tdبo.=h%KE-)Μ!m㐺ǁ[8=n"^~ڪ_h%]jF2νpJ}3˲(#עKv3˗/763 Ձᴴ=z%@π" rZxi׮+Sןc8c!2s"ݵlYm۶?5wVoWF~Qrj-?KҌ7g^sNL;ow͸{EEk%u`DNOsA٧Ȣ@>(9RdQ =,, 䵵ӓEE+շU(, dF" YQQdQ Rߌ&Ȣ@FY.7"y!"UzYȧɢȢ@^-], di.Ȣ@^:YȧW@r((=v{((NOE2zTV9Ȣ@>YjAOEr((UoEEw(,, BGEE|J}3˚"YY͢Ȣ@nnE ԻYY꿺Y.7"y!"UzY͢Ȣ@nnErs((EE,, fQdQ 77"YYȪW@2gCj, QE@" YYȭkPEVYȧ2PɢnUƩwl_uDK5ȢȢ  , , (((ȢȢ  , , , ((ȢȢ   , 0F,IENDB`}DyK _Toc367179742}DyK _Toc367179743}DyK _Toc367179744}DyK _Toc367179745}DyK _Toc367179746}DyK _Toc367179747}DyK _Toc367179748}DyK _Toc367179753}DyK _Toc367179754}DyK _Toc367179755}DyK _Toc367179756}DyK _Toc367179757}DyK _Toc367179758}DyK _Toc367179759}DyK _Toc367179760}DyK _Toc367179761}DyK _Toc367179762}DyK _Toc367179763}DyK _Toc367179764}DyK _Toc367179765}DyK _Toc367179766}DyK _Toc367179767}DyK _Toc367179768}DyK _Toc367179769}DyK _Toc367179770}DyK _Toc367179771}DyK _Toc367179772}DyK _Toc367179773}DyK _Toc367179774}DyK _Toc367179775}DyK _Toc367179776}DyK _Toc367179777}DyK _Toc367179778}DyK _Toc367179779}DyK _Toc367179780}DyK _Toc367179781}DyK _Toc367179782}DyK _Toc367179787}DyK _Toc367179788}DyK _Toc367179789}DyK _Toc367179790}DyK _Toc367179793}DyK _Toc367179794}DyK _Toc367179795$$Ifl!vh#v#v #v#vR#v:V l tm(,55 55R5alyt<^DdA?  A*?\ HREOC-Globe_PMS_POSPicture 1Description: Description: HREOC-Globe_PMS_POS"RHlQ$'h5$F<FlQ$'h5JFIF,,CExifMM*bj(1r2i-'-'Adobe Photoshop CS3 Macintosh2008:08:18 16:05:14Ҡ&(. HHJFIFHH Adobe_CMAdobed            " ?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?TI%)$IJC"j6*]gbǸ쥀'QyQ7zٖ]፞WXK&ǻG9zyzn Np~[\NN[YX̀7l7Kʊ뾬}iǯ31d;o͟g~?*#hʚe)#?W8ĜϩXd04U,;;'~Ρ-w*?krVzUzq3]`?E~A[\ tԠEË6-S?כ(:''{??=}%G$}k?%t澱/3j~&-??԰ڜşAt%մI%?TI%)_'=#ذڲѷ2賦ǷJx,յZߥܰZ搴ꫜ/]ʴ|<3qd?#m, .wz^Y/Mq:GUߏ֛6cR->tòpĝKk7MIdT2J>!X}xp~W Oȑeqot޽:\7ЎqaWYuh}_eaY<ۄC'kY%E7ۉ ㋩g&HY8y űY.Ew1iGUDAwտu Y zOҫ<ݥX5dbבSA?שtOYnC!ٓO<:Y\+8|g<8'i$TXwK$5mNm͈&WCVO, b$k\udq&NwIV]ֿ0%.scGg]_. L9nc姃4D貦m=Z,{ ںz>Per%1NɊ}z`7Zu= ^cpZ]n1ɟ;{{r1v6m;uvrcSŵ9ߢ꽾寉}q 6u16?'[g3=rrqq]*(qZnhfnkx ֭kꋺL?(Ʒcǔun{(?jgkW\cGQIØX>p߸rE.W6~\bHڨp,jxQL0L` \k@I֏s˯Aq33E~7? ?e1U=2 +b6w~-V'##H >5n^ṹ9=&Ţ?+/ݱ>+`_OY'̦ר?<'Z湡!pF'\>r°0ާͯ9KRr?4浘fָ|6k.rϪ؝LH̏5_Υ1Ɓ{G.ྦྷ/(ˏ y10=#'+9c-ߩo]]mʬkkuYߪwy,?j |90ejp|Ɵj5%E1I"d"dJ2v=ah%59]=0bQb6Kn?x$dVHcA>Ԍafm0[\\e|RUu+NU9U P[kw7wsIu%{\H>EeBN3;j?; 01ENŴ]R׏Ϲ~_O8l\5kjY$Yc72ߤ7151;2굻a,@/wL21wCWU^ɳ귟BſAO1syXXvzyU>L~㾋c fY a2NdɲCOWX*BEr&UEUdruM_YY7Ƈrk>{nS(+_ѹQ;Lq=?a쮗QPsvCxk2+?Q D9r>ߣ//8ô7ʴ3.ۨJş9+dz.ʸ,oԼ*u*?c’.kpǛo˳ܓ/Oѕ֝ٱ`3۔?ձij2՞`ʆ,{tßͺe9lul<ܙ'>%9L#1$HݖpG^^l;Rj\OcJl|krl5 nm~]s2gu~zE*.uC[\[ک|H|()>]kxO-}Oj1rmu6w,1167:)tWze~ӘgU 1= b23$qDT.׌f} h {5ow{W]kX=dhӟ4;^~TJ|\r\OX|W?Ts}\piݨ~;zV>,뉕գڷh_ոG7-4ʳ=<~L^Re<%\#-gc_Ƣ?Mm]C_[wL5t}~gZnu~WޜF-'ݏoNb?6!/}ߑJ# bu@驎A2~?ԲQ[ OPʴh&~lgRp"vϔ$L|F8ݷXzQfYk5e_U( d?1Ŋ?$Ld g??"Sqpj7eWֽ%xt}5ZtLC0csl 5n^Dt) %Ԉ_Uu]wK>Dw{|{7٬ӱeu _ :zMZ z:;I`×k'ͬʬuVߤǂ]P+ЫW:M:6A?Ts~XKAzOi+ dƟ¦G/8燁޼ReCcmMhu/O5dbcɦ cV |ȴ|ƈJdbXb1D$,TL)9rɊtȥb:c(b]OԱk?s{6IZn/K7u'86jI#^}yW:\rD~w&h`DOKvIkXE-ah8z{b^n& T_im^uƆ[)oV/1)}CrF,Q?/U1<H ZऒJ|ׯtwAK{%_E'Z@ l 1{Mvc~[uvXlj󎡁򝋔ݶ7PGs{Y[9Z82,xfܮNW'8t15s끑E7r[Y >FN-F\Zd?^Lp5_On#4~侂ۭF(;Iɮxu2RyHr~/0b {GD ʹy V^˒XϠ7#07~VCk;VC#̼0:lo+ @ɸ|-IEٹ웈!9?3/cxؙSplsO%^K?GhHCc/=o13%ϫ a7'@.pY- nOs_??,ϪV_. T}k_?105hUyNt/G3&_ũ?dI,UTI%)VYY揣j'=aYIH6 "QHS7`亣nǷ^ר'm-hBJ+,nQ6ƻr۽ ې±42P!?|#;NF5ԏvۚ{m}51FEo= \^Oޖύ[\~N%͗+_x0e(yuvuv>U[խ@9Q|3K)ZyHt13!rIԾZzM>|j bkDglR?H1gsp/v'jW@6}V.~Rwlʰُ[Z>=Ƕ}Ұ'1ۺ֫p< Lj sDՄWHwVB̌cc_pcmƩQsU~a^[L5M>,Zߐ?G'Oc|,}__ jkmU0W[k@5 i$*I$STIL (n{&,%5csKJiIN]ٴhZuҲ2_MqEn?Q5o5ӻ@ќI c?'X~OMVwDx.ƞ?aZܩIL<+:?J?5n i) Z]'1GL*?SCK\LB]oXFۖ{}$htȍhP$،cQ#G@^1-.b@R :J]$IO=Photoshop 3.08BIMLogo Options S38BIM%"[+ +65>8 com.apple.print.PageFormat.PMHorizontalRes com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMHorizontalRes 72 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2008-08-18T06:04:16Z com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMOrientation com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMOrientation 1 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2008-08-18T06:04:16Z com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMScaling com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMScaling 1 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2008-08-18T06:04:16Z com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMVerticalRes com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMVerticalRes 72 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2008-08-18T06:04:16Z com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMVerticalScaling com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMVerticalScaling 1 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2008-08-18T06:04:16Z com.apple.print.ticket.stateFlag 0 com.apple.print.subTicket.paper_info_ticket com.apple.print.PageFormat.PMAdjustedPageRect com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMAdjustedPageRect 0.0 0.0 783 559 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2008-08-18T06:04:16Z com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMAdjustedPaperRect com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMAdjustedPaperRect -18 -18 824 577 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2008-08-18T06:04:16Z com.apple.print.ticket.stateFlag 0 com.apple.print.PaperInfo.PMPaperName com.apple.print.ticket.creator com.apple.print.pm.PostScript com.apple.print.ticket.itemArray com.apple.print.PaperInfo.PMPaperName iso-a4 com.apple.print.ticket.client com.apple.print.pm.PostScript com.apple.print.ticket.modDate 2003-07-01T17:49:36Z com.apple.print.ticket.stateFlag 1 com.apple.print.PaperInfo.PMUnadjustedPageRect com.apple.print.ticket.creator com.apple.print.pm.PostScript com.apple.print.ticket.itemArray com.apple.print.PaperInfo.PMUnadjustedPageRect 0.0 0.0 783 559 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2008-08-18T06:04:16Z com.apple.print.ticket.stateFlag 0 com.apple.print.PaperInfo.PMUnadjustedPaperRect com.apple.print.ticket.creator com.apple.print.pm.PostScript com.apple.print.ticket.itemArray com.apple.print.PaperInfo.PMUnadjustedPaperRect -18 -18 824 577 com.apple.print.ticket.client com.apple.printingmanager com.apple.print.ticket.modDate 2008-08-18T06:04:16Z com.apple.print.ticket.stateFlag 0 com.apple.print.PaperInfo.ppd.PMPaperName com.apple.print.ticket.creator com.apple.print.pm.PostScript com.apple.print.ticket.itemArray com.apple.print.PaperInfo.ppd.PMPaperName A4 com.apple.print.ticket.client com.apple.print.pm.PostScript com.apple.print.ticket.modDate 2003-07-01T17:49:36Z com.apple.print.ticket.stateFlag 1 com.apple.print.ticket.APIVersion 00.20 com.apple.print.ticket.privateLock com.apple.print.ticket.type com.apple.print.PaperInfoTicket com.apple.print.ticket.APIVersion 00.20 com.apple.print.ticket.privateLock com.apple.print.ticket.type com.apple.print.PageFormatTicket 8BIM,,8BIM&?8BIM 8BIM8BIM 8BIM 8BIM' 8BIMH/fflff/ff2Z5-8BIMp8BIM@@8BIM8BIM[HREOC-Globe_PMS_POSnullboundsObjcRct1Top longLeftlongBtomlongRghtlongslicesVlLsObjcslicesliceIDlonggroupIDlongoriginenum ESliceOrigin autoGeneratedTypeenum ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongRghtlongurlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT horzAlignenumESliceHorzAligndefault vertAlignenumESliceVertAligndefault bgColorTypeenumESliceBGColorTypeNone topOutsetlong leftOutsetlong bottomOutsetlong rightOutsetlong8BIM( ?8BIM8BIM8BIM ), JFIFHH Adobe_CMAdobed            " ?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?TI%)$IJC"j6*]gbǸ쥀'QyQ7zٖ]፞WXK&ǻG9zyzn Np~[\NN[YX̀7l7Kʊ뾬}iǯ31d;o͟g~?*#hʚe)#?W8ĜϩXd04U,;;'~Ρ-w*?krVzUzq3]`?E~A[\ tԠEË6-S?כ(:''{??=}%G$}k?%t澱/3j~&-??԰ڜşAt%մI%?TI%)_'=#ذڲѷ2賦ǷJx,յZߥܰZ搴ꫜ/]ʴ|<3qd?#m, .wz^Y/Mq:GUߏ֛6cR->tòpĝKk7MIdT2J>!X}xp~W Oȑeqot޽:\7ЎqaWYuh}_eaY<ۄC'kY%E7ۉ ㋩g&HY8y űY.Ew1iGUDAwտu Y zOҫ<ݥX5dbבSA?שtOYnC!ٓO<:Y\+8|g<8'i$TXwK$5mNm͈&WCVO, b$k\udq&NwIV]ֿ0%.scGg]_. L9nc姃4D貦m=Z,{ ںz>Per%1NɊ}z`7Zu= ^cpZ]n1ɟ;{{r1v6m;uvrcSŵ9ߢ꽾寉}q 6u16?'[g3=rrqq]*(qZnhfnkx ֭kꋺL?(Ʒcǔun{(?jgkW\cGQIØX>p߸rE.W6~\bHڨp,jxQL0L` \k@I֏s˯Aq33E~7? ?e1U=2 +b6w~-V'##H >5n^ṹ9=&Ţ?+/ݱ>+`_OY'̦ר?<'Z湡!pF'\>r°0ާͯ9KRr?4浘fָ|6k.rϪ؝LH̏5_Υ1Ɓ{G.ྦྷ/(ˏ y10=#'+9c-ߩo]]mʬkkuYߪwy,?j |90ejp|Ɵj5%E1I"d"dJ2v=ah%59]=0bQb6Kn?x$dVHcA>Ԍafm0[\\e|RUu+NU9U P[kw7wsIu%{\H>EeBN3;j?; 01ENŴ]R׏Ϲ~_O8l\5kjY$Yc72ߤ7151;2굻a,@/wL21wCWU^ɳ귟BſAO1syXXvzyU>L~㾋c fY a2NdɲCOWX*BEr&UEUdruM_YY7Ƈrk>{nS(+_ѹQ;Lq=?a쮗QPsvCxk2+?Q D9r>ߣ//8ô7ʴ3.ۨJş9+dz.ʸ,oԼ*u*?c’.kpǛo˳ܓ/Oѕ֝ٱ`3۔?ձij2՞`ʆ,{tßͺe9lul<ܙ'>%9L#1$HݖpG^^l;Rj\OcJl|krl5 nm~]s2gu~zE*.uC[\[ک|H|()>]kxO-}Oj1rmu6w,1167:)tWze~ӘgU 1= b23$qDT.׌f} h {5ow{W]kX=dhӟ4;^~TJ|\r\OX|W?Ts}\piݨ~;zV>,뉕գڷh_ոG7-4ʳ=<~L^Re<%\#-gc_Ƣ?Mm]C_[wL5t}~gZnu~WޜF-'ݏoNb?6!/}ߑJ# bu@驎A2~?ԲQ[ OPʴh&~lgRp"vϔ$L|F8ݷXzQfYk5e_U( d?1Ŋ?$Ld g??"Sqpj7eWֽ%xt}5ZtLC0csl 5n^Dt) %Ԉ_Uu]wK>Dw{|{7٬ӱeu _ :zMZ z:;I`×k'ͬʬuVߤǂ]P+ЫW:M:6A?Ts~XKAzOi+ dƟ¦G/8燁޼ReCcmMhu/O5dbcɦ cV |ȴ|ƈJdbXb1D$,TL)9rɊtȥb:c(b]OԱk?s{6IZn/K7u'86jI#^}yW:\rD~w&h`DOKvIkXE-ah8z{b^n& T_im^uƆ[)oV/1)}CrF,Q?/U1<H ZऒJ|ׯtwAK{%_E'Z@ l 1{Mvc~[uvXlj󎡁򝋔ݶ7PGs{Y[9Z82,xfܮNW'8t15s끑E7r[Y >FN-F\Zd?^Lp5_On#4~侂ۭF(;Iɮxu2RyHr~/0b {GD ʹy V^˒XϠ7#07~VCk;VC#̼0:lo+ @ɸ|-IEٹ웈!9?3/cxؙSplsO%^K?GhHCc/=o13%ϫ a7'@.pY- nOs_??,ϪV_. T}k_?105hUyNt/G3&_ũ?dI,UTI%)VYY揣j'=aYIH6 "QHS7`亣nǷ^ר'm-hBJ+,nQ6ƻr۽ ې±42P!?|#;NF5ԏvۚ{m}51FEo= \^Oޖύ[\~N%͗+_x0e(yuvuv>U[խ@9Q|3K)ZyHt13!rIԾZzM>|j bkDglR?H1gsp/v'jW@6}V.~Rwlʰُ[Z>=Ƕ}Ұ'1ۺ֫p< Lj sDՄWHwVB̌cc_pcmƩQsU~a^[L5M>,Zߐ?G'Oc|,}__ jkmU0W[k@5 i$*I$STIL (n{&,%5csKJiIN]ٴhZuҲ2_MqEn?Q5o5ӻ@ќI c?'X~OMVwDx.ƞ?aZܩIL<+:?J?5n i) Z]'1GL*?SCK\LB]oXFۖ{}$htȍhP$،cQ#G@^1-.b@R :J]$IO8BIM!UAdobe PhotoshopAdobe Photoshop CS38BIMhhttp://ns.adobe.com/xap/1.0/ Logo Options S3 !Adobed@7   12A ! B0@ P"3`C79 !q1AQa"2r# B30@$RC4D%57 Pbң&'G(cseuFVfW8  !1AQaq "2B#0@Rbr3тCScs$P҃4DTd5&67`t%u @5a֌Jƽ'9 u9~{ +<.Xͼkv6+.U I4Ű/;^4sW{}2||^Fю.6uJnZ%<0GM6̢\w|zŽAg3Cj׮KYu fVa2صrYD> <<?C~@+х\؞%ﱯn:a|KW>ڽ˵eR=뛖6jn-\WMO>w{O/zMε廜"_"|Q{;!뺿)tZ;dKI5|{֌FDsde2e/_s a4۞3U>}0ckukل]ew+>}%t >:i6 &ܩ!bɽ¢|ùpۙH 5| Li]#u/rXźa\6҉umq63Sv}>e, lîq?3*Cgדwl*.r/ﭟR7"@(|}zaxџmʢ[uweSk>O"dnQl5{/:Oeys:7{vz?-ֹUYȬ~zUNn w=V1|'\:?_oKgmYOjXźcYkv>fnEJÐ]W"AK,]w^䋛ș;uh cx_ySWme-}-K\U lΟ=ybZԹt,|mur9 ,K(J؂mu2,tdmk)Uu[K >=01S|/ݟklfg&漿B]p+ oa䞯sN[HŖ^ݏNCYЕ W!e\:*l]V^BM4-YFIbsxlY&>a{+ n?}y)z?6uQuŨYt3KJ!6G!.SU\áȲoh:S-]^ɞM,*g |BS#=l_P7^RM~EmflP,OiMw_IG*L|XK yY#򋖏|"1sjK-e1._%ׄU/d$ث7{'ZϺ ~_#~e>@Z?t[Y*gZY5ey;9;o|a-}yY1cM^fRֶ`-xeu]ȺjE..K5w9ݔd+|5:;ٯΚ 2FηmD̿ ]?@;czMrld&2aٮmu5r'zY#Aø^5\qާxϢqKz7ן_J7yk~3#=˹rXp5z/yu/49~$~g6.`@֖Vl?" _4wL}c\ַ!ɲa-M,W"-_x=fc732CyL~oE{ Aӻ=_O+X{_g0`^ȷ Kiu/4օݽYܿU% O\ͤV:k oXK|dN9zQ 0`ݖa6ɺ/M,_&ыB-nHY,G>)sW{@yS{Oq\[bfUv ͑<ҙ-Լ&?**>x_F0}s|^H[팤|Ηm>Jbwܚk{.7bhšCy4,MRuԙM{yb MWJ"y2[KɥMw~^cܞ6w;{<ڻC3lRF z?"pO%kM^S"k1,7$]siMv8U2eJK&Ϥ2[ˢ٤/wk;y!Ee H>_v֖sԵ[mx[z>`NGlɺ,jjD.>IJm^SuԴ*r o%ib$y4D[H!{y[>Wg*H@߿${|*k %Qkm}qA_P55FRL:wiҮG&ԉ\] }%9˵.u=l!B} =ҙ5nf{YYI=tߠ7?@=W_LMdu2c7U۷ןys>9O)tXU6t.@7@9O*efAS^ kU7UnQu;Q]96+/l˔ys`9O_x$W;3{ng^k9ճ-S.ݳ,\;ѷ;İڳ۳tl;&%;,󥳲ˢSs1ѽq$c!)^.ѳ/0y>ɣ؇)K3780(Wﳧ1.ݴ<؜#c3vB\)oc1P8=(icl}v=ZucciYv2`v7e~;#_rrb٘X,ZlNjHzuGb@mp>xAE]oz)M9j*ȼ&l> ;a&鰨?{7Nף<η(ga]}/=~P~Zz̘yz(c7cోcҁWqf {Pl_}k})<D1?v.׃˳vUا]w|KUY 1Wr6jZm{.]Y$e٫mq<@vŒXD67r&neXB:`:oSP +z%_aV`]LtZwހb͵]n&˳-L&9sdݱd ܻ eXAXGz}oն_ߟo\jmeوTˮK%)η} !f*UZٮU^eucciL,:%vŒXD67r&na \_Q)[8K綦3~yoUkK/ .x:*=V6ruσCZ+ŖS޶C`RKrʳF=2W>쵣n0̯8uuz,rznNզdӍeeJƿ_%]dwހ"7v^ծ]^6u!k6/b.-Ye2q01Ցo AZ#__Ro0{ 9 ![8dX 9zY,8 VaB.C\7Y6mzuσE \ٱcnb)Kʡ;-`͔ݞn%F|n:8'71_y[~/7aʢ/ou?f؏q6/`8gqbwxo${3bǶĸww^ys)Zr_ Y.lfagAH"셮9`~V1|~̗9Q{:ڽ)ou*MBJ@|mGKvL[)C9gM˿ '|Y*|VbN֡P2<9i_9ow[;=.z+ɧzQ=s=Fy >(OM63vjs>k eL7 e_ϓo;_p|go2VEm-؆rb be/s.9Sey?x,e9Lx} [IOd_z*g,T^4[oiYnn%퍦eYiCl.n7FCZћ$d\ou$_ֽ6 ?3~~_sWf)Cf7bYe䵐l.ne͐eClA7mh̤l^X[عouY /HmRF #:׽kٍؖYnԴKL"&L/{!6XUZ3)C {k&[/[ ^?G~T<׶z]Ϻ\_0Btu/(s-ȿ"*Yy%cm7-x̨\[ YVgt3qa"нj@bzzzOjXźakv>eѬ(3漟?;=ծ:ϲ7ձǰW7#Žt˥rc3x}|Xwya➗L:\^0S).1Sm~-}Pݺ` D"HuuMK(J@D/. B,BȯO3I8K[pW80Iǟ].k(y b|]$Mv9zoK3`e[lvjbSCx=Y)sqvNzrVĜ7r P 8Í(.1IƇ33[bP +H&/"oyC "yJ)rr_D@ P njn" {BQa r:>..B!İ @D( T A Ihgx\լlj28cly$~cW1uiWkn.=NM}ZQ 1 惙=+Zx_#̉^mXAQr?%؇pC:5NTN9YE߰hc'{M }iΖ{+"t~l?ncǢy~b\z&%`y-H\޻.|ݰ%2,ݭ7cvb^/̯GKDG%q( ,+#<2>ۮ<`6xt~j,-}ݛW6ʾ<9 ] G%q(D|jeh8Eym\se]\JZZygJK}~qc7 u6.8a7DMIr>@tL KD]ᯑmy;L1y|]2=U2_#A= &!OSvm\Miw^߱r9$KP1uoӁ Vv<\fV1R |9@LA|xߚmD5n uUIs V-gV >Uw*j'KI"G %+tSg\=3lVEyo7퍋I mE;w-AAXU(sR]Lʚyiyuʯ0 f|d DUBA8ײ75ߏXB.ɰeߋLʉP.̂Lx>&;Xeo&(f,vǣEzeCBytO#C C}zy2go VK-8MONJ/@b_a G"H(VmyQRȠ]AGsɬ#qVcAt)s6_F O"|'. |y $B$';;r\DN"dEUw[!!)Z-w+wUjTһl$.!z'. 3% ϧ >f_7ݝn:vd%9XGJڹ2"QD#A.kUϮrwP㭲u76%h a ~d~><~ /$Bm} ղvTWX۹qۻIRd/InD#B!Ё81[R~/RL:STRͲfc}K>YGn?GC~}]KVFzUu"j&& ˺.*]@(qO)}#;I_i\5c\g4z\N 1nP 4kkMn(Sl8)LL׋gYSlfќfNW\銫e1$]L rn6%֒_2ìA98v=FQbѕF2JTjٖMZRd% a{A%3p˸aHN 0(atO=;`U,$MVd ؇Ԝ k(&VjA X]>ԥITGGACB]%OS)cքe=-J+#O~l  KNF @D>vd&т&cxQ=1cTռ6r[9^l и]%á@D?$ǤHT  'ϮP _FG aaۆ[%9[<29&L+Af иO/tb\c\N!1T 8. I`F\:pIq8P('SqHNaL. v}kTw*PUK1M)Y^Kwp.7⮆qv̖FPeճ-k̸T7[eK pP\N!1>ݯϖs\\`3&AmkV| 'WR_N<ʲ`bP _"]50]uBWVC;]#?-*6K+~ݐT;BќVC1yP-'KD.1Uq&*kY\[[o--CkWM5ucYhѫ8^N6B`y(Hd\m{ܰ&8&q)0L{zk"3~WSdJ$fNR-2̬J岇o[(#&˓ :劑S2]Pv:kE5m}ȳHMDIMKME @ ESS:w#DAD#>L.ַ2XָUk1y8uRG7U.ý&z%ya$-VbV;TmJ*ґI@\MF-ΚTv. P8t(m8fβݭ +`" K%1_qꞟd_ RH/BD0Q/ +!Q4.mS3*6]%1/\z#Q1/BDDK䮩.\nT{cTr~s#hfg;l="]%1/I|eǪb?p#Dľ] %WTEp)$x#}$0ʯFnln7=I@ľ=%OI.= %]|.'XQ{[3wzoqM6Uij)kk-Ӭ9f+6ꅍp>|zKLAqľI%Ǣa\ACwUFڛs\n|v14/JօcWfg_)ܚd7(|| C`zQF6V]wR}̇ s!.=⿄.+沺N@tL At@a0>ݶ9~%Ճq8-NkYG/Dr00Q D'8| ?)Al~WRodKtG   >AG`P \QĂ~7ie ɶ'R&NG6m .^˟Z] w`@x<&=!sH}ɸWlA&ֿ5_lp亏Dn;cgȴݴ: cO*,ߌ+p&ɨAoO#w9ZhCί81նmnen2zݿyhϳԷgk7W}b}dϝNWƈSeFR3Trv/'KO!D͇ʫ)+ +X%^Nѫڠސ,XW7ĉi'/'apDD_fQ6yfDU.\3Z7UiX*50O ^JZ@ĭS!#Uŏ$_U!c,{m:zZZ9iB|^UCg]W© v[keԐɬW(##> &D̈30q@LL^ܗ6ϳaݞr++Ң1$c!؈&?Mmd^TEkvoX( ;2TDw0_"csJWtXf)S{Ю@!IP##G^:,̌W2"JbK6Jﲋ&Q][T;C".""vL&rtW;tfؔҰ_G2?yC!5w;Ff ?@`H3>;s G#4LP,}>d;3;>;̇C j"PF> k3ϧs/Nw"#2?cqc0DcVG;̵XߜsUk캌*Y1,6i݌o;7Lnov'po3 }ej$p{< !1(.];eY[(}MB1~?xѵ\ٳg#32h7-` vW(BbQ \"G 1NM3=)``5stg'zcG `5~5me~_/.(ĢA1G!.Z8olx ^sYeڛcG!rc-f%w&L2DĢA1DxD:&.=1-gV~d~3ffkk۶fU0L|J0LO|Og#{BXw8d&=Ј|+`ZxC+;t9MfסLʖN{ @& @M_XYT[gFϕЌj7&#"u4'D$x(&)ϥ֭wy80S3"d'>Qvt5Myѻ"~Hf !1(D18]%L\똚ɼ9gj3~8 WEUiUS.jJ9q1T=&qMD|֩k'ԯ̐Ö߾f9%ItLJ0()tLzz#x " @ijj(u=/׸Wڨvak߹/T.כ5ݽs @'x(zz#x `P]\};6\flBNQE[Ym֭ص%F\4۳.dZ=CBDu.) ($:+8+.\1sۿR>m5\ =|8qc юsY,GO'i._aU-M] cKxDAA 9`2##8'B{c4E%*NDiT0Df]Sw& !*\`l?CwlO2L߄yѝk;AA]J)1 WR+,FV_aͩӼ&vݣ7QCq=̩\mSB+&%k0^7Q&n ˶W[VDD 8 &ͩl0+5s>M"< LBzaDS*Q<Z[YXI"QP(&)0kujE=4Lvm_yn/M[s;Yz8'm`4F9fMHLbu(B`!b=QoR 6b^}g{EGH٫52jT<B`t(&BDA( !0' 8ğ>;{<(D5vX^; Ldhx"TռTpA0tOR G D|xD<IrNS!ٌwӆI۠9y(O/K󆽅ʘvNԬ-$h6RkiԸQDq Q" =ۻ}|u]il]q8o.ׇp}SXl H'O 'sÝ㍍ùLr4 {B=G46gUyDq Q" >AE*DO;/d f8j Ɨ2mlu†Of9{] Աpu#iVl%9k|) 6S=)9$'A lKjʛfjkyZqŻDJBˣzus6hӽ7S)8E|r L2j%mT| AQPh^5-ͳobR0僮"յxb\S~ɒ"Ո^vE{ poܻ#E>D} Pj+7{ ,\y;,?zaS*7߳Ұէ<|c&>ي7\W]x۰w< l߿YHLJ ]uUfȳvAܳ{GE|-=7O)E}r :6}3ϖ B_B62Gg۾oŇkuVW)>GѺQOx 4d+I>Y }t@cZMeM|ϸaXro7]B"= l**JY4O1pCPP߹~)3\ GVϖsnPw\(P=7)cuw v0[للɗW΁]o[-ϗuz++3gߢ#Р BiRf/Ӣ~2͛6x(B8( t(Kc90LSԠ~_Ba1("tVv+Nq<<!RGС/ 1L:&tLa1("]mlѳiJ3)ɪz ) @PDŽ 蘧` ?D DǢ#СGMU[SzΖ9~MsL8K)HۦcB8&ˡA>Т':9c:Z 6dXc+ئN?S1by_m]i:Ձ~,%s\zwc+%̠A1(KDDtDq-YZ ]3 t{'Jd[ș&wM2gt뺭]& 屖{4˰3nqJ6<-u NDo;쯦d򫖑kpzsujB=~$v'7EsteYSo%&L\Pjvi< klAyt4Z4}vopw>%0糾-հKպݰ`Az& z$ϹDc0(w0Qt(:KJ\6lgsƎA1@]'bQ L  (궶?l.3q]xˡȂb %&'DJ%Ǣ`PࠏTGOڴ|_xٹՓ}uJ.n!(@& PLAǢ`P:$}qwUu-:s0.Ow?ܾ˯SD3t tL *A1 BDu( zyS]f]eNqA6%_'Vr`qjaOv} DX:%o"ֱyhNg;1SGWG4`] DBw_Zsz+nA,.VI/-Wq]o Č)nC u:I6Y6Jy^e:UQWJb]vǀURUC,s-%ivTGC𝸥؍Iw݄mpN^dٌ*&cl+p0~ZAXj:u:yc(jv-ðt.dt~^Hj%kرFGW!p53c0@?.sk/j>dǺXF&\LCP1# }wwuze8{NXreSiS!|cEx+>;ڛ5.cm=ZϡDO(w/ڜ#"}B؈OD[:Ѕ>>aR ;=ױТpDxO/;I/b1؁o;ð;÷wde""ػϰ#;CCA';!"c]c0D;˸ۡ!ؿs؋Lv!܈wI>1؇b@;LS2>S}=c"nB)iqɹLVnj]܊ =m[ݖAF׾]Ls,}BGc3כVwѴ)}-8q$DZ/`,gf\閶 ffa]fJ}kq_e{tE[90p}ֽVsN}fekR;%\q8ήYmc~=SϓU'3>lƚ?q0P8x׬|Ӈ#9cua|N 2>zx>J3ԟd9zi\7QwXL)7qr&d#@=t28Ό]lwxl .B  fDW%b|i-#Ź__ 1fcifP0y0pzᵹT^Z^N^[;27;.Y3)jhq0q_%GGʹ/QTuGr󞛾6wS,Ԝym~F8.0yT x 5juܾDj>X7cxW.Į'* LUEzׇ_k-.8nn::䍍-m%2A&TqB>T b-lE_k~ro[i$B(<ۙNU2* aQPEu,QTJ47 w{fhO~8m05 fא6$>tN)T=f{} q0a@f}pzY>SS=.e鮩3^%J_9,ݳvq:%>},S>Ӌ` zάq3Yi>^g‰h^u߰T?X80`ppS!QP'G-7{ݿr1GWSv/u/s'ؕ{n2ђm73®X80qWLSQTf@UeWC}c>LWo wniТY6Kp&v>zۺ , 8~ 2|* Q_\]己G]ri&{i:ۏ9*77k8߱,<,+bd:O L>KŮ.AZC.|z"USԗԘFo50=N5n=XB0[7jUv7b~`MPQTO q!|ȻL>KCNwĸa?ϿuAp176 8{J3Qc@Pp/}|L|RϞO-z"ק8v2Nm$ āg|+\D(m fr{֗^{J[Y@AP!KpO^HFL˶v1G0c7eq>F<@* 'ŃzĞW+Ջ.ƞt*gL-%Bުz/\8ѭ;{!}[g|]o ̶s&[-&Q))^e4m3[~wwǂ5V_N~p P쏻)]nwW"'Ϧhgj%6z]1=m㝸;+YYS@aQ {^^vZL WގCs:NǷM".B?F!~ Cl%P5Č5b2wɤ| P̋W"pn]{| ;H~<1}lޮbǛu{P]ˉA¢ਬ<P([BfH9(dnw+P@PT?5@+Cf[Cšelk8㻼sӏ]̝kbSWt= Հ6VؽT8 aq >@:*'<@Erx5-}_:ϻTcݶJ[?x8*dtQxK`qĴ߸&MDGNk1U*a||p.<C8'ҖAOQSroq~VK@2=cW=Hx-L# { 3F`>D* 'ȹ.TD!|NBclc3 lK'>6(Ɋ;4&Y8辴(пѡ%/?;v.<;NUMMYM^mPfp@¹x8A@xuoe[ˏOm,$ޜ~MgKgeutTմ;_YR)$6[Y,# ݀#)>̹.u 2=N+G ^ 8no O#=Ng֗Ap!3D* AaP8>Z&MkvVc[eUWYR MMC~}l{1]ؕu5َ^h+隮 f}A\DyϦoFm-Qq%˘81b/%6ҝYc 3Q0%p +W%@eF} <qTdG|>-vk-ճW˶Ӱ.ѴDZ촳^ rXW+0A\/8C¸8dGq\4׵aQt;7쬾mVCh%kDeñ&V͈Iw}myy[yJ-QTL*%a\N=ˢrW#WB|UРȠp0+]<1(/m'wܷ@}SNO SžfpyOS[]R'K?Nא^a}Ǣ a\Ǖ+ǒW"0+QĘ#2gzqɷeM ,ݞ2>|ܤx44v 'E=N146Mb.t'A4+D]n#^3/XˏT Y*38TLy_q TD+@8b]; HVjxͳi^qW?ц} aֻvGA\H.&Os"鎽n5*PQtT]{kOC7AO-v e}m7K1wnYd L+4/T=cO齄_/ʸ (Lp\B/>0+$1=C/f߃;پɡ@2>O}?Ey:. B*k GtH@ACAhmʄ^}}مom}?H1ȾY; e[2]I^.+>¸+e ݳ}=b|jw<g&EAq ,_7f!6+L۾ț͡+7 tӦXEsZeůzP@iA8߾ ^?:A^>??`0ޭ|&~9+gw>MBd:L+>Ֆq-cٍC M⨗%egߡp0jgrT P?}]#¢a\ߨ᳚uMp'baaQT|*W_E@*J!q p(L<*'ɘѿd~Ķ<Bb1?^¶7~klt_0*q\ ,3p WE a|. GFi_MĤ@TӪKa9R,ؓ(b;PX8*q_ 3\ *|D*'\,&@X4?mэtn>֪e'}W=ɸ,7Kѳ۰β¡eؖ&$qvmXW&ə.|ȆP]ẹ$CՇPމ͔d[Is.'*3 cWIWEp1*'*-Ñx^{3uJ? Lm퇰-kvq^}}jMM5o۫#bm\7{͔cth.$;K݂|z̆ސtO_AH7we~l"p p8WEp117̓UMK{OG;]B6tl6lVw0CV_ݽZo!|bӏܰ쩘O0ݳ*̻圿i͞wTz¹/⨔W\z^ii pqc/00y>TU(*'q8(+JC\`%L'G[8r |L/ 'AQ pT /TT`%fO ڒap-M~^k_ @?TUA\Dy>'C̯/^W\?oV yxO]0ng_Dy?N" T_)L(mjUSx3$o+^}xzWC YN] 'MG؄ %;M-86ʧGj)Ѫ[:;]R`ŭ3}e1}Ccʦ U_lu~7{fY3>+!֖̻:Ǚ뽩긿L2i#,븼lَ!4W|憳ձ?$"(5;e#q;رc_ܳ<9_tܯWQ  io }rAAAU*Y cTlݑ"A_jndzUfV{:jӗ~r#@3= 8_=n-.?o[Kxw ⫙QqM՟H ܵlU,̧K3`} IBˏa2ꔉ}"Il`is?+ZeCB@ " |{#>2rvUaOPt7y2) W*1.FH+KjHg$ܟ3" LئT<ȧV pQ#!Qv2EMd*o!PQ 2T:##<ヮuVӾn|*2-%NYɗo/sIx;&g3~YiI6dJs;Ү`RTWHS2bAPgQfG,$?HȌ.X\2I#N3Tg>B}*mj6UYVBƣ*Kqf* Pi-B 2CJѨLƝX, ZD%c"!' 8D)!LRE3Ba fSBMbZE5Bʴ[Iږ)흄!OBbMJ%>D(0I0R0"(DiiJub3[slNlwZbsGY}Ic20 w[#H   l^[ JeY2DE%DR$BKtJD'̫9$K# 2 r HI~H9h0t*oIfJL.̅X]PSvY6SbX6j APc=&??@ #&A4A-idGde%,%(lR"ʐBH&DI%*T) HI_8x0}nۿ>|GG.ݾ;w ??aK**+TlW#R J(Skڕ }Q[Xi*a[T/%:DD.?VIBeY$J׏Hp72C&kohϯ<. o@Sgc|o7-f{ЁŰy݈IJq5SɲFG#ל:8)LA?e"l+շ8h!+$cJ´Džշ1/̴ը*9"P?4ͦU滶Eā}̚("I쑰R0Ɓc*!α͞j=Eϸ8R5X=ѰWǬ;!ХN)9,&89o#p|n8mJ[k${7p0I#ke7:+KTp6缓H}ciP/WIcT' af zpFjŘ8`lb<KkDh⇸*꺒3RF}Cm5n ř_il/i3뒱*@HQv$\R2clc=寗"2OG 52tgRA'̈65!V:sVcB3)Ȏ*.+oWri#*cXOJIR $N6PAv|)U?b;F N f@|҂xI~mYI APOx%zCv|O(bAϑAlR{pv"Je`y!BiݬsA1PaKTM9 k>b4{*%*fc-Z"ibRO~Ѱhi&6ŸȔ)%M*̼8}"4,F`)0}h ${;b'A9-Bin")%k\kEYBD;j'!9vaFFܲ?G8HY`>ocvѰz(p6'>_/В Wԫ+E Ȃ3b:*пNx+VH0j<4lQIZpȻPZcZ!ѴKhg?g[‰ޕu:5t4`0*w2Aƀi:Z-2Z ɦuvVHб$[iH.nA평>/]Oט@;3K$X D@$I5=>>+(r #g_ O]!lǦ$qBtf?Ivl4_W]JCDtEhF-m-2ɹ@-hEg=b.mONzVxX5{Z+m.A o;d%# Yq]&x-cxavppSx1lF.Y-FGFՁ ND0$C9cG^H|65ʀY,YᶶĎT f4U$[]}D*!8STg/u&m^"(v;'#$?fh9+-ZHiَ6%{R"PT{y uR h"oŴlo 7z#o`6u q5bKxLq^*QD \VaP9$-bMm%hFɑԕe#O~oQPGh$f!% UP(TPٻ,6^Ưf.?ڎV_j"J{eALU(ْ !>̫C'g$ZfQ\}ec=Az.OWPޡʴ*jQ115?8gsA*,)wFDі0Çb->]V :mn2\ɔPF.ԭPXYd]nn73?i6w LzWF${N*k!q"S6VrP}b_!n?L!XDȇs#G tfV緐)n1h*˜rS!"8 㣮>i`F;ɐ 9K_ \ a5xP8D ۉem;Qjk|9<Ӻ?,<3éڍYۜr7)ʙ${l}:{[3Ichڝ02{]4.%܁E>ih ׿4wV&+ 'F3# &gnGS!'UHTifˎx1CP]Y6yaaco:*㈵kX(J̤0<08G(X5;n-5a0oa5PW$/r*e I:{nIա?5J\Ϛ \ vˆ^9za Qu* GqkDx"oRCzkt)$x ޿[i309g.9H?[zJ}l(m) X,!,9#_ 6~s kNe9>8+qܠSFgS kPpHGS$ubIo)V1{nwCOp(g)plzj8g}gjg/<2j(qY[ٓPoggp?B[|bք3,u$x^UmHUTUQE2 0uPUqhG˦H}g)b;| B1ʃ,(Jc_°ڲѱh°紡wg8>ɳҰʹT_߹걨⳾ڧʰ'fu˷1津lǴհհn7Lܴʑ@q

2I_\S?Wv[^+H&3Mk_:&KӠ(4@1^8 AuLz ʹ+֙.A CNo0KAQH8/͇&h( N&7&McClMKHI~T;aFRM M(́Fx3]A! ~,78>\.˷e8‹*5<*6_"G i]F+E 5+ʡkMՠ Vof7cv8SFaơ ,nxSE(½Ҽ1HF*O63cb9mQb 6\ic*taPxS" VezG ̡5R0ܭn5 2H/ aND8JAnPHw}ETs5I#pѰ FY~ p;F诎%vazx,7cx`vcVj<^fr:|=3 ?٠wxbޭX[֒WGaf1>(4CږǾHu_S!27hRJ}(J6!Պo-J3^YGg!ph~^Ŀ.ݫzC 7pp2YkȔQ19Y <T=.hW9n49шpjȂ88b]UiiKA+}͚ dk\G-#J/RJ7JWھ /%vG0.Cc#A$fI'p2wv\[_D~t:o{-BQ\>Y#/x!5 wHJ͝FFxe%Xz6QdaVf0pA\K\Y8$PEx,80! 1-Dݒ3&f)G,kMg"Qڧ2"LAVAA^D(iyt۲$,$C3u.mHN/Τ g1p08zv5<6`PvbVtȔCE:9QVc$ Ih~8{1(0LƐbBmL$hNb}v%f%8nc)f{)tpi rJpmld*`GkHBPSw`m8Xӡo""hAAuҚL")y,ʛ1#$"iuv يmz>=;FƣŬl7*_$cļN}p\JDt4t\ V)JxC 6?_Hl˳o;fԯbU4QP; ҋ*|XԩŧU|rZi7-5dy{;;t5 **U 8`~4}V5;1*rHO1otԷҪZ%,Շ7 5ʇ<30 E+y/l̰y(Va~Y܎S5! P7ӗ@R%GNs)Va(7lIgx\#aH#pQsLqwQaS_h^F\Z˫9RhY4 4SVhq=kec冡I>\0\qk8Gܴղ8Oѥ;H҇۲ѳS,7 KL S$3Cۈקn*G:Tt-,tpƱ=T=8l;4۵SoB*- dW̦HwpAdA<),*,w,h, e+ .; a;/4^Á'Px&DW\HFnjs WXG!۔w:Jv?9}q}dw!p6MQ"x`aLd9o )W0E;bh$S 7)n1LpϘ!f kL )4Oy2W:3<ٜvyq>ńo,{"5GK:kkNλ尪Յd<XÃ.5`IՅ82%Ou0OEB~!ګ&<~}9I4t&jԪ❟/n׊ؾW ၴeُvʃ0nCKְ5=LdZ{S*~a_kg߅zEj՞;?&qQU=\Җ9WHC]q5|=a0۩75ğ8+I?qפa7l;>\۰,iP]lZkCܘeG8;LyHkG3a2̆0=b$CPVJn##"C"=SudPё@(#$މEsyΎ27s3ᱼppFVôݲ02ؾ#`7կDRx-4 j^bhY9 }I!l6Zŵd_*K9U5F TT$TO)YcW/A/tmsm R*2%Sح6:G0%i?#9ԱcMo[~Jbl㿆o/x`ma)G/˷iFぷoҽ1h5?$yL&J-X1Q]{^W{tO5,1NXc @(fB5Sңv9oķZr?SlPbcļU +څ 9N$}8_-PYB1nxHnGMӰA'#)#~2[\1VQJHy.tL|kCr8;w-pF|6obvHapiՉ=gQMU4^I.d i:+v,UbC-!]a08T:Z]T^VrjrYP1%a木EdC԰\1ݖD.[o?ڟ/1ざ$}GIXO)kLWsb> 7q g'` 1=F;[4+XτX1۞A#z ]ѳ cΪ;h ܧ b %ń*M+_ӋP;ۓ!GmnRZq;`mmmhv 7G[Yہ–Er7b{7?]kNB&!~UʁXo/mj*ģȴSZ*1z\Vz}TyդsL٘M'$S0S^_Tq~捪?6 >C)ȃJF;s b vu8."D||~ġpњq )BONÕU ߾KY|sx}Ff3Gjf c~zoD/yh}W}eaPGȟ6 (pƑ,Į %WjEtj1hT567ڍ{{8dEuo9JxE>nfew2;Xg1Ҥ/#&=ώ7콌?'"?>L.Չ!٧w./?@c=tgƁִǚ]!=ʣ7յ<%Q~s-N<xѫܲ' u('.D~~*s9|aM)_l'f_/^9ah?X1v-"4 .+vXu!3YK N8:s4pg#lTo&c6A98 gYhyR0md[i2fI)8sE65ƭv1#a΢(:UBCƾ%Txiۊp0?ɎxLEȓ^5%-.jbJwgl88oAXOGc~;Fo=.kG;xPx*ӻ GUOb _F!3 lo:?8>wI8QN 0N^͆Ḥg_Kw ɤMÆXo  n3aY]?Ά^ẈĈ9unAJ6S$..MR<-T>< ԑkjk ~ aβs~LP'R%fMkHnOV8>Է_\LIJ`mo,,I+;NdRI;nFYcZw֝,!#$B G՗WfV{38'>{{ YKD?=x8mQQ*h) `cW.ivN4b˴/<3;1,_Iddh;끰>m_ c!i6WStuڴ]2S #Mȸ2veS<958&nfF4 {; (GE 28pwwp#bb))uO!e=e{1-3Vm #*{qŶ\,s(ee  ASAa|=O8r_,N)m"0ljp> JX$m {W5Vsξ]Vњ@hvts) *ETlh 2O|WI@38;ix~= moGikVFHԻP\K}IhsĪ"@#w u-r問%!;8Ek5G' y$ M߃7ǯa|}?^`x!zG`p>t5,*31 d.:?YzXO8QA[pFbw72¹VI"E+hW<++}LX\VDI!w#ůas,>T 4[T&7WsS@=iN] }~Ӆ=u5VRc}"G+@YQIĚ^9A5OEVW}zQhyi^Wcɮdl(5UT}n;Xu" Ip1!V,S:.Rt}g 8SEn J Yj|kdRaPx݅ fF EswWQr\ZHwRhM9$6<+OPJ 'h|v;ՏXóՇl;O?Kimަ-5jIr#eREFtFKPI;[<;ߋclRaJeiU$ }5 v5T|H(zV#HFDr #x<-o$qR#r8Oɔ{CpEyNX⹴?VDxj{H`w'JK99+$G_57S/1)›N`;հ>i(mUGTEf!@yI&x2^d "*xCp4M.DC.@ yCB T[^ak) ]3My 972dLwat}H5Դ(G=XoHe'xBGyP{xi?9#8n6*hCw#ѻvwŏ^-~ôx熓Xm icWe|Yz;I'tS߇NKDkH(H=>ײѶc)9;Tw!ڝV%W=a泦<!a~〽5CJPCQp7n\!9F5`@)f5[|O@9dːEgiӶSOxPNq8fLb73ʣ-;[I<hO8fJd"h{=#x8¾`2]K]#!zvyn.iRa!+Ƨ&8S6mqO-߿q.C5YКe\uEZ˜Ss19պdJ_MFto蛸~1A{UmC:]k݆/a;M|9n wƒ;iАq+;ׂg_UgQ0μn־c?G7Mz)} gN9"Ȋeֆtui`*3Sn&zBq9JJ #Fwthm\ʩG< b1Sղ˘vc͔Z!~zVK͸|^`05 ny^rz~iNSLaJ 4rkZMHyg5= ʣ%Ph`+)+) *;Hʚpj̊?!H ]}X?+L4sFn=>G?[Ȉ7†ۿ=:bs9O|AGVf5(^u6}}o7Qd ν >:|(&f9xg7g%ď ӿtz\[5| NT|Ƿѷ:{( eYTo>?(?,9|򌻪~,M\ gݿ 04 Gq6|`#xPX [Nҫ 0}ߣug 3tU?>!Aw dS2\AF"9`5摸pQm[qa MYXa_ޜ&$o! bxWL=d_Anw!E`d2\w}ImI#U{`$4SnxH+$ne 4EYPѐזHp7PwXn(HGqQDz C>F2cv?} ;F 0VRN@Vzn6{N.U?N`}fS_ & DHj}`mu&̱jR2dq0;>N/݋l/Ӵl<^tG^f3_j&yCt s}o2,` 3i@MpCesR+t% [:W]Oq08h<ѱ?7 ؾ;NѰ `2R0"*hVb]]csCsJdY.5U(֎Eֹe^aU,c|hAq!z,Zor CyOp<on.,%; FirOFa⁋x `l?ha[ 5;N$yV82@U@;L:u}7 {TP8D_:gI&w)hr¾ΌĠO˻Ui.x !Oښ] M|U$g5( i)Pzv9c@摀8"^^c(*XpqYtmvMNœ؟.PYئ]7/w/[O{M 0v HE9Zquw|j8o09:#~")Fxd7>Ӥnq0߽y#J1A2uT8$ w8o 7DFfgxi_taTXq㋝'zSP շRWS2~3\FhLRj/qz۫FH{(ZgVj$& ?J)Ybp8209:uuV 9ہFHʴɮ 'UEÅdG<U?4>t4Q{i,/~fĈfI;T~qC,R s2P8 }XݓOVM+za"ҔkkSYB }~#[Q=o>QO_? οĜI]ԶÚ6:&^ Sن?@݊K} 䎿}}pmԵ 2M)<D_qV9c45}i\Ԯ,,SyLNn+ Gns;9IC{Nu縭E &.tRUU wT UE((;)z}3IӍU䍉U}8®|e0",G )ng<]܌[v"d:frư{&X{pe!FD_$@w*Iom  BA m?͙"m֛z8o+K3NKM+m%i5=R#O!e5|ou{9Z cݕ)ϛ?UՌW? &l"-?x8¶U^hDeW&ЪFߝX#M34HLZncv7`x># __1ݭQȪHsܡ<1$=9jWCsgSCL ݉mƭikFJ^c3e[IIO\TkͱY@*1iz8UѺ*Nht8Xm61Ɔ)1TYaWmd;E'&daB*DKҽ8Sa|"&;$T$V'>q\' xWuiL&yz8j o4 Ïܸ`ZX[aooO>Zfx-:)]q+^4=#$M-nK`JJGLIqu;IpK1=I'ĒqW@cP}F(F* GޔPF~klݎxenH? "֮.M ,Fo E|n渔sn%ݛIR1߀@uǫfCmNG SnxͳY<=ShPzYc3f6qd1ec3d1h1W\T,gnF38xqfoCv>okyّd1^+\~8c,o'׌?¸%M 8=wk}YZRdeEKo sOe31A8ףt;rIwʯqqKe'˖ey%7qvXfqP!70#PĒr$T+cơuG*sExno_>+><{23ATk5no5>ZMq4Meąn߄52⧴'NA&0s)ߒywfpZ]QҖt'T91ΐI-gMIbꎡYu[nY*d 5{Zi }9G4M^3rʢ*@4t5S3}5Σ3Y]gw,Oi$"eMӷI;̂BQO~%\K[jkEj6$/1F֑To J{"|$ s&&1kjwRhzԊQs#SJ,9VY#pѰj"73o_ugYjr,PyQh " 2jj:˺26Kc+TSLK<ҳY,jK3I$IMN38:gtӮD*@2 M#0%2xsW4n>}Txg,ՑñXڴܟɨT*H11Ʉ-/ǫi=P>Օ2>ϯ< 5I9-访fs +K'B% 9ֺǪ/a WwTE˚IqݕFgč:نvГiH"*#=IozNk@G2=nbfU::(I Hz5t[ȇs)"Ve37-ȴ-P|'s'#캖G`dке0]FF y#$WYwh$Yf#qmWn潀vXjq"qIELjbXExFGZ]LRv w.^HED5gr2S-WGO#x`UZ @J02֬ȏyC+W[[+,maUTHi<w⎣x姓/J2(DUA\袹oSEicE@}GA5hY$tԪŏ]Kp7 8MSMKPyZpT(&E5A_ïi #moIɖ.d;UT.JMS]\D;$MDA}#״ F[M^@Ku#) JseתSC|POAY ~5^h,~Պu%aebId]o?i)SL9UYun5Y DqGSʵ,Igviݴ]N%~^ܹLs5E'{쥄_Ԣw%?5%ya4 G=Ϋӥ79~LR*2*2[uN6|c=Y-ڃ0d-"=mbԬR,BPJTKXL*{@К,Q$1$'Zfn7+ݔGr29!>YDo&kS4@wqs 2e*dG6YFy0̀%A WЂg7)VVZ0e A5/wW Gmt-Tۖ-Aq,yԚiSSpJCO/+Ԁx^>v'˂8̳8tϼǛ3#)k>jxgW:Nml3o";K*  _+:N^RM̽9gڮT8skRQXU"Nm Zِ;w1m*ֹAnɦ@T~ 5  1ّSZd9yEW4^4AoRjR_Jх(`OK egZC\Y8D/K8`FN}ךe_06cm;F iK׍o$״dU@du,'BT.yc_Z@,czY:ݦ`J5CbpOf[}o.G,p]CN B HIC# V@ â>0_Eg![;kVۢ!' N)v  U7;w,<`>LHKr [HmwВ.mPNj9J H؀wJ}`m>NÁ toupxwZ*'N+W|P#,"92_JIۘXCUxC+)`A{i]N;yM*1#B˷ڞrL#$1wwcRK3I$灅6 YPs}Q7eQ^h @ l~莢ePer#uDyBE<=+[.5}O%OY|0SNft(&\^,ԋdŤ,iݮ($⺍:taVV0}^ѴaNÁ1Qt[ (i._(-"{XF#ʨ"2]1iv(~[ &jVΖL7Oٿ6NG7W >rԖG\Pݎ˔"M7RHaVHdRwjZ HKT  `j 1oVlP]ۄ@{þeI,$ն7j|sI/*2*G>Ga\tuAؗ1A4|1GBjڂǺ[:r49Fsˮt-ly@.]fkD{}|]Gߗ~_Ll;NÁ] oqH V~LU4^0CbӅ_JP?#@ğɏ/ci-m2K$aQVʺF)RBDT$dHtҾ3փmGi V%"wՖW с`b+;2+ ̬ qoij2 ywvڕӏudW}=?\ڦ qs>Զ([ tƽg[i+Z6`h$`lát˗3wL&;nwS:EV KQzo.q6Sw\0ğ'Zd6<9o񇅽N|ic߁鍇K{hIUAfc|1 ӿ50PeVbA$!:Ŏy-,fԣt,2"dwP @ ;"3;3݅RN!5>wuաzSi_qyT3T br 9\j\Z¢*=Ã3rE++(5ގ{1>۴2Ct9'3QK2ZTgr]Z"9W2 MIP /+ lSjQO5C*^&WèkVՊr_Brh&-AJ݈a뎅sIg$wQ%y{K|G]`bFnHO{GWѻՔ}\6ꎊү?^{Xd#!u={q#sXNĒַW B&9^XV?;AtGt$Vwe\h}{ܨqnOnq;out3y*{ǻ9gA^4 .>޵9TOwY+*oaPF@[}\EDP9EIjqr[uVXjrxҮkSWH`Moc4Q0){^9j0YT!1n 4fꀝ^hL`{{ XO}JS.>g~.\kl^K,ҝQ7\[&m&z3?U yY,Ql>hp]B4XBGCpwwk>ht%%H?t2k[ff&X$v bH BA8SPK/6{oǀ @7 t N au-y  RIaiЏ:ᙂSsip;1 WHkMtR!2Z][IȠu9|hI *S5#; *#S $xhVEe;=~=u ̾i |{Q2\3ImNkvw4w =k)FEcKOX݄C61\x%׻"xМW.u[ ?hZ>%~%/1Y.-3{J8ԁ)<k*i+vkS {,spE}L0΀o߉ [3P*e.FGrң $ou5wd88aټS FMPʒ0=+ltk.k Z|,MpogpS-SMzoydC31h6tM^ܷp+0&@󜨷021ڵⲵ;Yϵ;1=4΢ݱ=U<EC)]IFXĻHA&:]ZcC$B@ǕG+:{/;:8hC#}_RmO.yۍ&1$U p%&6*+B L zzh6 =3}'Eoەy0 j((:~}1m5/zR܀hn}RGoe ImRYI 1I#u„1tWt޼!ck~ۆ%+@U 3څ:Z@c.VIrC)4_=iZ樌rG,<E=l}鍃f=.,Y.OIܥJw1ԗq]W@Ět$`TOwNu݊>nk=IW^Y?ժs g0~Iu΅*!(!'FK((/!Mz ,hO RH_} =,c6EAPDq֩ӝNn{XkgUEn07:>e=Z 4F|7m8p6zHؐ<*I$̒rfN.ʯƮuOMӛ)`jJFt"sU/ U7 Ȳ(֒5ndu wA+k| ^[d=R2;-ԍƇ1\ ၍.tj#jVfHڃ7 H/ƽ#jVQmA$v -߈ތ+MKIl?+oAUs݋˾f>XYb h])"ԓq}AHEV1=sr "ĺGSWz~⸆Hd<*2"7`zq=Ns^j7*E1=DPK0Cu7_=n{m4iʑ Ā ZS.{bS$1Lw2UETE"+lݵvbV3^>^V Hci*o֡w!kyܖcbOñ06 zvJѱ?)dp&R1SխZr[Şnvxz[Ʊ 6~//GJރi=UZkw02E9H݌a@]'s{Tj;7;@ZR\t׬wC=8ZlSJǀ=ǫ:bMKs_1T8< f H6iN5֡!E 4;p 17SZc͒3pTҀռ Vv7m4F렭y'&^kPZ0s^P3VWԓF.jYfbkRI=uCZ39~U2,*om:vKf}(exېTLZ.т;plк}.0GA73½<\s8WA s\i$BwWn]o4ܵ1'OB卤%c4q3e`T7P-gŔ;\#H,o[[{B"('l$ W+x`3Bv^8 ;WTG]cMĜҮEY]5eF9J҇-m8ӏ^ czs@9-fFG &y2C`݋"GSR#׾/AmPcnƕ1ԳL'x<.t/lg)#MMACV{V%#'(,Hi`)s6EY[oi:)F W4*F@:zg7IܻKD+S1ƃVV<ҁ [0p} < Fzw6䃽ܼ O΍N"+X_Z7۰kS0cGU;F+W װb/tإzQ.Z^,5j ~`A)y^qfw0N5 X'£aʹ26SՂdCqB)LfԵ'#xsgݖn"Xw2]CL)Gi]LqY|wꮥεw\*ёN*Ec-n#4<2h ei|C~C'ӳ%>쇐ܴ/"7f*3M?ޤHTi>+nݸ?}PM:"+xIT@߉9U &q+a\#Wz $8>ѳ.Njܰ5m%ݞ=å%hiǤp&ͽb:{"ѳuE<,ٍ26Wa蓨YBPon+U*E 5FG,j> i>yҐy,VMdD}*Cjh}^{5+%w)3n4jFW~]@Z9Ć DZ΍aOD2({mcO꽵KDŽr (7}#z=֨e +A=>&Y!'t!zOQQA.C.Uj@"8Ya^P|I\$j*K$0߶zFa\F@V190":ב\L7-7֔b2s48uz[W xۼ74xaӦ7L]h*mF{$!oif)X^wjAķW.j噘bItՅ&C@w/: Z?]g\(}_k2,UDΞљ88"VT #Fh}`g_o-GfiSLӾ%k R=BEh(@x_5VQ.y:,wy_!.MZoa }f ̣9WZV=nyÏi<Ґ]kuo% ~ͼv1ȽpXծP 6=1yj9FBHд22T̅?;, >;Op}!^ ů} 5XH2@Iy= *b?RZIb?kAsF:-*.-%{Ke>IPԅp]@k QǕ.A;$9Nm5"OI2V хO+NjAzmP9ilԞUvcs k\!REGѳMFO?VlxW/mk\>;O݆={O6]uW^#m/s{%T`+nj1 YQ$zV>6ZU#(--mKT"* }$SzfCXt;"#rY޴&PCM?M}iAkaAʏ0@(cHph\cQQg1\jˢ\\IB3"}?/`v [ZtXqJY(ܑ@m,<{N":m@7Gm'wq2SrQm KBnyK{%KOk{Z+Rv e^ӥ$qE*mEc3 $tns泸U~^XNz5-1@i 1EVARA G=!gMNk l#Ӓ%W]԰iLK$H"o:ǻxw]^Տ1 s4LaC$B*_fkROE!"EEFiRI96A6p|ǸwJG[nᯭ&њ6\Y]RYNdb>]Ěee`H*AF`#q~"M9 ^((iF": b(>"|8RsOLTRᘭӮMח`־44=CCml4gfSۑ W AȎ_[eKx͜4W],43Ժ)fEtZsn5&i:_tF%58QB^4i  a\Z􇠟G7ѱx?Jb$w)QѭI\p_5YrAo8$c_iɯ@Eҩt#BNJ4 r!݆n9d?N+HP^/p;^'ʽڷ]ѱ-)%ҵ֣>oTvsL*Լ)"pW-C$TΙ1O+94."?2)MhZ ̱J OZFn.nӸ*hcl+R-iJo;MZ-sV r;PԘ﮴KDI M.[%y&,wQX9fF$@kfE#KqQ[ͽbA}x3L^ﬖ̂ )&:W䐣(Oxf\ nݮ5` iJC1"tF?qe'#w[j9kSհz-:[kSrCu2EN-s)}*1]u%wi C%{HXn2I ,2Kzvhj8S͕ &ztKC s!#=e.iOiiZsKhүݮT]݁葪trP @败'0?})N5Ĺ/Ȱ_7T<R-bo^֜):gFiViO*= `yuh)Abevp~kqK_9"iCMU%bC=q$R xbHOlRriĄZ=wnđuŭWZ*LE?.F;%k5gf%&a0|vh];i_z2i0|jX@ƨpTP=@C5($ mq`8̒F;X2lM2XU:U 2{iȴMy9K]kn$vWβkJuIJrwW^ZgJsVur?Yřy$S,ք д+dD7>HZTX;XՆv}i!c긭Mj(.+Zhz%FwUr9'P{vv?bOǏ3vv,|zEm\!"IQ]eei1JyѲx2Lu.-e3G4R#WBTG`ǫ }!մ``xl8>rCY\EK^2G4`ڝ MZV z~:G.o}yd*DԚ(xKWu z)ME5#QmAb~=Xoh>>ptm6&wq1(J}l~tJXSl-#)Q@y۽JHq.u~tU'̵}V$f9RWbIgFU:f:}bx2Q59|$o8`aôF1z+eeo$rDDRTE$@1m]}j 9lM]#!}YTΪV+ o8Rr%XiRuu*Mޟm)ci)O4.sj_ӖDZ^ Fky(*9Q(]-^n`p8]B:Sxa6`}^=|6gMZŴ2AҤ"<"5Zs$2_mp9y䮝{sWG,v/|l.3;O ?]^IƜ7HKv r#^1{bEѢ{KF;5ŧ*fnfo]ԴKo"Ƞ5nSTqutHCqsDr+!w']iEƃ=O=;m2 V&^ӵ{AR@&kv#qf >QSտ5;[d4#50miNꌳ gGN?fwN\܃֑|X:H^E$[ƪ9by^PZWu+L>JKK8)U>I>k(7ƒuVO5펖ws4Ĺb$A:es u*eaFA"j%-u9#ݍ`,kWz%R<шK3UZ}` y\);Q# [|O}fP~[[΁M؈IsZvڍ,ҊHXg+ A0A zU<_M,W8˞bIzgVմyyUeKeRt3e22ߝ%IԡQPrr[S Wkw+Zyw- dSִ݇K&q*Gӳ .8JCD$i$cتWDZ6޿$KxeHV]B]fs1h2$~b~t wB VjXDFY̩mك"0}`ڡԙX3R {8[ɤTBb@gS4*Zy.ad˙c@g\Hl۷f4w(*aTY+j6$%$bᱷܭ0ϤܻT2™e*Cu:0?p?ϸE2ͮλ<+j:tmB2ඥH24EpR֞tI3CÍq4X&M,iFYN*W=:viOg'iؾc %Pϩ/Բ_&dA= +%'yj_ 'Yq=GjE<4+H{I P$οælyӇ]P[W###s#L4[EI"1Qx;ٍK1,ĒIq]BM$R)WGSYIvbKKX䗡ytRyejSϷ2dL ijppsV*ÆDFYdpMaMDb᢮YM#Fw H!uqii&V YMiLO5NT71H۾]ybdMw\"? #sš S~{I+\~Bpv&z{5˞kz \ITwȚoƕl"ʔe~k{'xև,)SyrݘP>v#Ko8Fgh*}70 @@=[9`$0hEAdA2k kM"`-QDVܻW@imL7Tnnt^-yvTIpǔ~ Ux&Hkxh+&Vy2I$=KZU(U$Tb}"0^ɩ JD +I@0V莪-epUͷA!$Y#'wt/K:ޗ1hfPU O%,4zzH7!@xl#hekpv 4o$yϻdl `Hu"Wٚ)I!qp3p=  `Ov-Kr ,)rgVT?/<{A_,VH`>ܠHGhmVzkE0 R?Ӊ闙# 1q)nb{jTPn"Q"]9BKFOAvCЯH >6 6ÖKtwQUIJ׋VT_nUa/~-uiT5 %RG9\o|1苋ZY"ԕ/.%v<`bV^s@#oߊ֟,Iq %fT%O"&º LM7Wt#CorNMŹf5ݗHķ 7tʺ;w*~*/{yd,tjqT;lK~lfCUïVtF('۸82#u\{Yl>6 h/%Ú**f=@$0|?ٿQhnLl?W'8mcĭ3Ic+v=ɶ#*Fa [0܌= LVMBHʳ+ Q REp4~T)70Uߛ}Wr'.':GQ/s,U~ݞ8ᶋqOWg pzFۀk}$x 0&i%T -Dsq0薚/#Zz8>]>M@{ejvZn ur%_^[ڰ]-K[r:̑,%Ē9;ǴI; 7m9\,sV+Xy#eLp17ZkZ⮵Y xPg^e4RTDI_\^Zu+,7S9I#߉^%MjyPڊYgcfBi=wtu*""va%VIWs) 3SHm@5wH`H KndXI|@'aFx^{Fn`ȅT'1K;*JnzVlw>0Tn>qC]ں|YE2A-UXdR2H@ 7 f6d~lv2kdn|P<$SHֈ].^,qˀ;擦G !(VpPڙEφkh[swc/h8e~kW9lnPhyM ᡸRÔ+303~FeM-rSg_ uTb"QBˎTWJ#?HMrewm`}*WWGgpSM3\SÎ#ߢ!\eYSx"DTE;T(>?f2lgާimx!ͺI5(a^Es߉=9ksW}j]z#H%Ƒ?gVr%*ƛvn{+'iʔ㲃ng8ߍcv7mݖ+mqf3v7mnKv7c,f11wÎ?cټq猇b?jZyK^ ^C$ p zG,Tofb(4fäCrJ”(nO?CQKv!nٗƴԣ,; jJԢ0h)9Ć,;;It hջTeu*i  G `1795oYL#6]lӤ8iR 8pJRRpy қO `-)~4&X*I^Y `_Wn8D<[ 3uQ*1ZqŨ\⬀v "&cPd+tѪ|( pҪׅ}%4]zmoCK!`M@eZFwPJ!l~G \D+J1f5hj֘PoQi}j$ηuA'2?)HgNibPRTnj_J/& P"! cjbw%DԧMTeËڔ\ՠ {YOty\ڍzj|h#bY9WP b]vUtϓ2鉦)fĤ۶E;K* TU%C_eiޝ"[V)؜kR徧&T9n.DrR[KQ'(8Po IeY)mN^jcܱFjj8SnT2hZ* {2R@M>A-Q(ky̬Vj𣲕/*q\-!n&jCs7OYM;WU)ġٕqzJV ɯ.\*TV2_puKqמuEJRRs'3׃uNB_XwE@[a%_'lv6LEfR9eOU4jѼ)LT[RʖjvBC}Hһx(ŪS\QTyM4ʤ'Ebq)~$}đ&=Hi5&XbԸiE jT^Wڐaԭ\Bu"K~ɾ:mڑBt*+L:v s2i ilFCn88;iۄt?0w{pz_ۆy#>ˊi^eiuu+m֖RF`⑦i:խ6oDiώAIN SWiJ$R5Jo%eWZ.S)>8);:~==Yj9`֗&mzd#hLGLO:۟hKQ"E뤕=qPT/U(CqQuZRB;MhLc:v66aQ%@LeT["+Qt[Pu? 'iڧ]rt+KgOUC2#ΤKz>O΍ *JclszzycMvꝗ7Z-#\a t&BIb:3L7lgxv:h߃vV};6t&Fi4!iޣmrO–d3py&5pQfT4x!!/"u"JG 7P 0(!)NR6%huVEm-]O0!51Clc -*΄(kTu. -WrHIRO DbM]b\22(WuoU[F~ $Nhp$i!I$I۟6ӿ0Nۄtn⻰z񃎬[w5^ϼjj -utƳFhZ3CejiJؐӨ[kRM/HE*F؆)mgZ͸E6KMfQpq? :z5 w ^nCĚ;k %^}t{fʘב!J1\QqVǎ߈"ޣ㊧ۖ=Nem*Rֵ-V8[3mZ{jPpfT2Om+2[! {')Y1T1v]56t m#Q]RR+3A< !/DZ nN1wru`V0;Oxɓ"5\e JkVz]g϶NCѧVжÕCӋae(qaUI^GjY1fն_\kfBfzZ5wD&>= 8Yݪ-J-ƑjU3'-ڭ^_B)QMJv%;q.V&9 Iu-<%'2ZW-tVY }W P(qRW 2KrMzv22 $vU`a\"ap.y(up#<63yU{N(tmىك-1Tj3EЉ+P P'e{u`o81H2ŰQԩҞPT!>P@mH2$n)$-.e)4Pj jiG^R#TpڊR yʾҚSTubƚj]CIWeZUq`iK>dTʼn-Ũ)$éIFISisB_TY{"C_KiP>mB'9IJD)$66)ZU fnVrU61($)?ʔ]|Pkn[տ+qiV+*w-RL$i֝zZn!d(**ZҼŭtP@ӥRM3fC+)!C4䤐S u`=}<;Ս9Gf!0~8)~ڬ ݘぼcc 0zy_civU{Yk4*u[R!Mg76S둥s6FyV VF(:k)W =Gğ]zƎӕ iR^FlL7ivz#NUxbFYT%I>Fj-D!PJ,F*InSJg!ѐF@?{q6DNVh5jli/&c-&D\mԕi I Q^kjR:IF-.ս Bf-ְZl].t٪$w A$pq˟. vډE*,RxdjaT`On\,T[f\E:n2 *Pr척reVc4D34xysgѳ1a9_v"wy8N`wc?duw#S[`qpÁo8:v`v{7ύ#~s3Qy<~$9ʕ ¤KRI I)O'22ʑ}4BBZiDs5Uo9w&Wq$*m=yN~4_|N~vلt#G1K/q/Wn7vPZ.>  .BȜ-K-fѨRkqJ Enٔ4_lX!<|zse>W\ӭE\}z C&8森#]{zO%46^lnQ<`TyrNe4j$Tx&].e2OIWN)ލ.$~<\AJ$}8INv+uwruw'rn8yӎ0>ʻ07w xQ· }}2+~5 ߦS]^2:%81مG!n72!@Ui$tM2LPÂ6B$wtu"n*SI9ۿ|jMdEf˧T DsIzȒP[R#KߎJڕAI;AI.XZiEdu5͸3ՐJ&ɼ8Oط>/=vy| FmFzSipH97riiߖ%5>\T\Ll5! ͬi;cǧ_͉.ƊX7uNZJd\.ћ])O oWSC$f'ىRRu K*( j"8[b$P.pmN#0@eI鶮AkŏCjR :GGpnY@=;r4bWrΫm-\Ԉ v@ldInRvstus}p7w ǔtru ǵ8<]}XMASMt1 >+gK}Y$f~CbRH1zf 䩥t#,JZF,b܎J}}JW Xj(1*r^a4&$:#C EI'MIͧ.Ytyҩt^X1lVi>&QiQԇL2soݏOs#0S-G΄b_K6-}Jua9%D(owW2%ːHYvDR]CGa:uHmYm%JZJR ',jHLh\$fr&Xǁ*̹f6zI!08rHRvLMZҽ(hYxR1*tɍ&#Qۉ1\;fSxݪXZc`^6E6{bkiG:7Yہ?nE}Áqp}:pт}_W8qطee1kzmc{Tʇ9Đ}Վl1%fv2fd! ~ݸߘ3VsRV3IYtZe(%^{JzXUSCkG7xͿˣT(oq-]"Щ_* gJBRNXUU\ũR'E@ؗ ףTsՎa{y#7F4yV=nUqY=.N$GӨ^D>M+ؓc_W]=)R@ITTv mNQ%x[BJiҜ wy'eBBݔ{[ͼB* `+iwKO0R (AKEĥx i8G)O1{S(~uu"XLxAEoߜy_ V)ZA=}m(.@uj $ NJ Hiҕ vjj6 QC~3M6%| #nym_w.bhUM@ JR2)P>R8賢u[¤L:ճ)ѨĥP"#FVYĶĖֳ.<9drȌTO,^`*ˮFA\xx Jm߅}% IM/-SK"ٲ. x#)'bpحm= ȸP48Vl-(pZg5%^ U*{`.n F9ULw1$aZջr׫P,[MmNEV舌L NN.ۧaDq ) T*EéuuVZEVԧnGDw>,iű&%3">ȡ<:;WLj>WIʳܴS"6&Ζ㲥ʰ-ũ܎dyCӎنy#>Ë<˭ۭJA16_b(FڑaƫKiCMZH@m[PՋF𷖲V7 $ŢT#-ިNKڷR!ĩ*fEEHJ-=04Y#ñYR$ 멘]iaڜaKqT_y_S,}?_$iT?QH,!řp'BПLZԶyfH0*?ꑼWhWM \nnNq\ ChK:yuvX8=>8W_h9truO`^uUJ3ZͳP@W,RsHQgSಯŃS-EVn&*6F\Y ,_:_ xAr)q:%)P/)iW)u)W1m:(K;|@bHyA.GMoQ;.!ui< "xpqlۅjܵ2ډĥ=*< .HBsJT->ֻ긿ݲض˴*❳պ׳յʰx'ү.6+.ܦHnǷ!&9U)ܲ/8›Ⱐ<=pׅ{˾ܵwȟY6kdgww!}:y:z61^+R(}<=LΨ EaMDv ̸&R! 66UN^F՝_w.fyM@'4Hm"ӝL)p߈z%u+Y)SRR%5Oh7Ӯ-)fy !pBmaje'|yVNC,maƼ4蓜m DŖ KjBW=U-L{ngnR N)l^W`uruCw`}NNC֞}_ӏ)U:1ǀCSɄP PCjZBsRuu^^(.,|wOpjډ}UZMFK*p$-M 5Cea22!6T|?3Maw~Wvcفwq;W-6nAY­۵8j\Ԥ32" 8Rf-mP8Aji2-MHRnH-jehи.m( dOu@*[% @v3P5\'U듟ԥI%kW\?1CFٺ횃5Zv:9BiY:ۈQm֜ e攦JRc[a[oRi)^ Kd]isdT W"&jNq| g}r~OL+MmNP&S氯y%M: fLw@q(yRVUu+I~uCKSb8Aul'oS<*cݫT\u2aN9=\9LTI1S2#Iad0JV@#n=܇y:';f:n+ٗf:ՁجyWnN==:{wCr~aͿg^|PU:j˨aĐ+a-U5zδ)n/! BJEt$* P'ٟ.~V^|8}rmAG2trTԈYRBҡ ҢAg ԫ#WԘEffL k]Upeqrst12YSlYu RXMHWN4_-N 6Զ-MXxe1*n31Ж6ҡ5O̙gGfގ\qOp>>yC0wcq":G!YǯxƐix̡UnxU%~[o"yȑ#n2$e/$:S-mSU+0k-Ćh",j2׋㋚cHTU^_BIO4;M5YLc\Q5ր U@ye'FNlъEU5oH!PvSk.|-9ٸ)PIKt!(fS -ZA{nZC(E\异NR|p <)}Ԏ6ԶYsǐoG}/!.2.ƝmaHq9T.-> Ou=lŎ,6!v$")nĢ:uX4@?& -d+Ƭl-$H)km2'^o^\F\pݏy!Of^7!'Ƀ__q9:0==|`88;~+rHСG~dɏ$H8Rd8ƌI[H}儡 JQm8SݍϷ M4ʼHCO/ 9JLLt/zBWSuRjP9v r;%YB’sQ DKit.[d)iH͇!$ϥC"vtFx.mva-5%AmNy$0w|>8n_vLӈW"#V-$)l*4E?B=SuɈjKZ9.qr7$QùG.+m|&nԙ"qN2Ts\iM?i?&щJ;f)׍5Qz[oը"ծ*yU1̈K*'9YkyiT͝~*)rYEL%Mo%(/f5"hCV,Y*aёCIBӑI mzzgyO!;aWy1;ێۃ݃}_q9:Ձ=]q_!;ǐO'GO?7^({v )J.M 0`DJJFhZ VUh`8 TJ"U[O*[)kۑ2Ρ( bJg]7X[+S %#>8i=ӥ8=]]{LokĹ#dWjr]d+Q&;f2Ã4r׽^kQ9ZUO QTRɅN^4!)?OXRXZʣ~zIFk]1ɬzF\[zcZWFwP)uM8 "358SZS^k TKFZj-8=iFw"UᰀJR8x_a&֪3yխ5oܩe99*ݻJs̆N0f T4YCQ/ joHCUNdMaa$KRvF>=қ+Pуݏv㓫8<ð`8>8;~oG>׳-r՟Lj]lQ5JB%}&\/1[mDaZ6ϔ0Fn* DBo&D1ɩsG6 ]Я45V0^^i.M;2^B[hF`Yv< O:!Ң\W%^_֧H+ujUjFc~TBc˙.K*[)JR$uc?N,IZu"6GݶSVT!AldfvT Z R)M"Eӥt)ҔYLȓǎsRTTvls۫I)CV5v- 1Q* Ʌ(hQpZ\mhJq CZB)9IRN9d E2H m*-N1 ʃ5Ho ITR,ڴ&sj*[Q(]qJ99܏79:A%.36K6mJ(G:1O@ćm q2x[ʔ*i>J˛3}A5jډūM.'h>ee 4G?d2<<)++N H#..$=cyn۞r+p0m;wwN݁Ojq;NOy:N3?/>H-:u/mJ-*!$'8X$Id׬oFR n*W<8>[v{i@ K *YKJxډ_̑* m)Sd>B{\{6lt-BMOOj=QO^-64APT`?nx=qۂ["BuSp87nZ4D*Hmo!)]Vj80:ٷi*kL.)jwj+id)- JO1^%%/:ե0T-mM Y%!SL(`Gfv:݁u OVrt^j2t*u=Yn #Rm*-9dgk&S! .{[~[>a„ ֕?vk;R*FѮb.s F-K~WCEVMWI${Cn8a ťj2|Ft m@{Nya'UuJJE>mWȣR%,$+n\)+:xN:`E.9*)%>cKcl(_/C64vi + fHG>znzM~eq5 kߓ1@ޥy^Tan=OMJNKr5RJ#نO^KК]tBX!<|_>|;py|VmxB59> I?i@c:ZEwTGRB,7t(t u+Amĥi]+4 :3aR>0)!' C?Jvp5ONVyaβ+2#VM+< kB١UX@o A*̂1Z~kT )WAY-/V7VTĭ'R @aVBnM=ǧS4nα:HLgWKv Di3GiSNt Zz K.jEuCU$R:4IRV&ԫ쿮yd&E~*Y=~>*T@l(! $9:{_!ES,zye(`9>yimiI*!T) qk'$z>~$.Ɠ<ﶦa m^mE*BJH;+Zj"l8UKG;&nq?&`0ԥRP.E2M*BТ`iQ Iڕ$sp7 ǓWxW8{y؜'շg"VurZu>ڮS𷡳**#²%>Т4۴ѽ"3ձKw!˳ҳ/Ǔ&޸<.sFc4C0ejRڋ \It5n׷r2JƴԀv6}`\< uwNBP\SNY-! e fP9d,E Ll-<+UoQY" mhзrj &8 mW%)!IRҒ3 aP1.+fLg[}NŴJ[n専Fz|Y>1U_çÑ^)T-3ъt\O61f2x8OsI gHc@eȤ[(ak U3m[| ~2N_[",2A9~n 䤽^j%Hr&BKH v$́{~^N0vldzX`n\j閧DrQjzoٗ5>]V-hf%jW.fӾee t6i絫lmKLM;&XTdRkt)ZQ'بBz~LUH ۉj\u6^GФ^j SGؽ]2* f5M5i,*ի!oשγ *WgƤ\0Z/``^yer?&G_N:hp0}:1;ppzqǧ>=գذ'9ܱ0=89䐻fӲ۳4K[ɸ豫E%)L9H侱ܗ_o)󍭖u%<4ZqJ% c@9J{r&뀱r5W2&tF3(bIDXJlMư۩JBtVCMIӻb9d ȯY#1R8N|MC-ۚ$Qnz<,I}12U ($£J3nKJPb-AuQsuOUP0ʄٷ֘Ujo#iΥ2ԃ`9͚s}\8>>=}cvCNwz~y:: ]=]:Wn>?wSnOQeyZ%Nz}q"HtmR,-~aP}iTeCRcF|"L?/6MuFfDSe̷^3)s/ u$$:؎J~l^CL 65T($%^' +0rfȫ|!,)E+JsBAJA:۾ߧvwuA/*\4{j|O[mL%-ZHOQ[jAQÓ ţTq뀖[-Ko%-i/Jz%rK.-wd܋YT(? OK>!(G6u9+B6zT%2׳ĩ޳մ>%6'6޳<5,tR)6i!KC˹ը-$: !* f72:YXǧc~O'~'c1;U9'^_fN><ӧwxyكс]܃f1*ӛF.UkRj-uaW(kRR /24j\(_.vQNEh5TAƨ) ].2  㶚}oQ-JDӽLx4bR)u{S0xQO02Ji2/E]GS4:%9$~:\[_q\H@*RQw !Pvp{<Ǜ7z|ӜoN!MVmH^Į" 5f)rfI;s9Ŧkޙ׬ZrMl8%ˢ\ > <)Hbͽd)*si(.fUdzsA'=r1&N}SL%R.J==v$!W54 RpH2&v:So(PI\ڕ,:ۘV` R-~պSNUtÍQp vx"؞YChmO@iw}]RIH0F5- Gϼ~}9ss=9'wyXWсcvrNu}yNwueƍi&"=DPMKHURi(j)d|ٍBYʫ,:JZL_V36ceN5i{SXѿt׼o71k%8O@7]JJ]V[eh̕Q KRu_WmEE Ux".ZxboQc[ Bpqj#xuS}_4҄HOϪbkE,x ҟ6nܛ+tT<)Gaq>=GM*-p\y,,t)[ pwN+ӧdy#<0~;8̼ڒ]mĂPb,Zn,r=XBP2Ȍs! d6f1&c//W\\qCh]'\|xRGtMT,+/KR,dNGȖvAnV)[ }2Dgg&#bdI(-H)G}}fa䭧V[BwyyӴ͐Tꖥ1?>dIXr-ɳdᄋ H 9fzs)dQo{}maOG \uE$ NeR_m[3Jj=k3$ZxRFҗ m7Rt2 .×B)T؁iU*ՠTPrmȭG" 4ɻa m-ɜe%a X䨤9cf̱r+p<ӧcyPVWh:^Rhט$(ţ4$uqC jd!Ԭ+h<>U~=ԥC|\tÛ 1x IҩjLkK:$li5Q@q;qg,G}_rL;T߉l$ ᾔ},̸fidq%eEpīRڳ~놗hۏ}P x +'>#d%Xӿ.:N$tT7[EAsjmBsIH HSΫ!t[1SY-QJ&\wh—=݃#)Y@n.+'~麢.J]FgIp+M۩٨4z*UM%ͫJ1$2МRyWhǧs{qz!6qڃn &JmJ6>)3lﴖ˃~Xu.,  K{/l*Pwd[ô2rPv +r!/ap7}8'wyǧӦѩLh jo^:P_3Pl'fMј,!7p߶=4m͙5+UR%%J'r b;Z׮S[ʭkp9"K > xM%nSX,9J _oЮ*3y5xrW#wxWOF`LiRp )c,Ӳ/  E%hum)c$Y^ȳ#|!wM75i#<=^юnܱ >!d5$662󾱰)j$$NԼhq߳zϱ<44':fRQ$%d5xL^/M2>'rBt/I+W=dmqֵFJ6)) )!j *I9$mR٨ lэ L5GÈa^rҤQ˵2u1*#lkK|KSYY+zZ, P-Kk"VGcST+A-j׽q ꖠO@P='.-Hl龝1LN{8]NX}X={㎡9󎿧~yt`OV: Ǵcӧ'v_9W/'ȭ;NF}:07ыVĵ*s^Է*mnǤ@(6ZG,7nxk鵓oڌm59T{,O3ľ uڠzcNo>q q J)!iZ8T!YIRND[:t?P%USq W5!@qDE=/)J+w Tj7bC^NiruiWV7ݰoT <-X8qw{Fၸc׃N:`;: {pwOW(;|'C}:y_b1׃dz{1ܮô?d`o<ӣ%PV)L95R9FO@Ҧ͙%Ķ-Kqj H$G2hSS.ű$*=FHhW? o(S>)EluzmCa؉0AyNIn4X2[Y+-,xUݻ=?WN&T6=/qWe.rUR0[U/;ǧA~B2KڮVQ]f4c o$,72ERSI*IpTҐRJZׅUQQf%oZP?Ozs GE'i\D`w;F_v07 ǻ'n887w{o `nOwcp^pw|ܮ'Np>WZ-d˫E"37%S,;9O\+8QҒK^idW&K.CS leJ*!Tm3w^g!\ZzhTJ5:Rg@Ӛ =N>aӬ**RK9.dWZ;΂\7Wt *yn=0=sRz^muTǞQ61NڦޛqФ̢LP-WnUNtKƋaQZm$72հ<5J (J^\LrzDMm'hC4'f`m_QIj L=ۋvkՊslpldiƶ-iA M{2mb8հxc};9J-ՅNSa`8p2u)!G"S~[ч_.):C}%T\uVjCRʋE£yZm[%<1ڣݔ) ̪D[ެOZ9̄W z]駎>(=^\8mGjiI^oKmu.QAqIJfm?KY <ǖ`eaذ˷׃ɰ'qՀv󍞡,0̲9;ӫֲFົq=<}X-4Rjas$Q+HRs!{FY1FkgKo=Kz}SDq**w!T31<6-9M+2> aي@O#峾:ǥ3,³᩵mʝxFݍ[筶.ճ^ߨ[-k"հ±,`4ʻ0*;(6(/vJ<#KScں>2ۯ뱴5Jɵ<#''69tLp>nո ]*_K > gpZ4)t[ٖJAZpH'g!\!! $ 5fiH&KA*G|lq}uf yv֪k B*u+L蒔98P#5g4c~?SY8ՈxJrS&>20أg$5҇[e$)JH^ ^n½dNLxv  &/,iZu1nj @it9T#,fym:$?uUkMIu~M}PKA"azmԖ j͇ᧈp۫ϧ|(lN$3NzcqT-un5$3_(tj. gaʃBrj2␴p-dW(C%OykHMmSOkO-߃X9FK[b"bG9-qKZqEkqk!<)'HjmGIo7Utx-& ^ hV%*Cmj\e ]ea[>1cfnmܝ}vO&R beKB4 C!D0mO1:H 7T@([NhӪrJ9J94ҥj֦Xe鱬QV:m¬PjB鎐߼(WHS)Y2`^/-|_U! ]XL$;6YIYQnS5 pj_:-tbA/~@scQm?^{jů)]' UۄE#'<>2O p"!ԸF֪@,N)?0.RH BS!J)PqfL?3:^{[*lp/ 3eY;g rg/su&&rSΞ‰ZIR’#kFTm~Ϙ r5eġ9sRvϣn:3>I,#f֤G}?VYyRӭ:i($t taUjb_+K:, .Z χ11U{PN⡹5ʒF`eca JKSms- 9 #g:9rY9ǷpȇTZ[6ޙ)>RY]P$ Vm6hRWL꒑\G[ZE'>:3ۓ9Е婒܈oNhʰ‰(ȃ!ԝ)$";8Hʎ<_o$ ^e5jT9iReT6).f+0(ϳaH͝*DْS%}_uYq8)nJ'/!;?p_q݋gO: +06߉2SCK6O*,ݒ%.j$"*ؑLmWpnZ$*TVvÐaЦ]q ifA-Χ,ʢWc![}ŊeB}# B VHC9dzX{7dz|X}8;N˳i6`ϯn񃷤8;=:p7wU{;uz{}=x>=ոmZ<4-!N:PJiZ Hλ5/IM&5ֽ#*LFւ/+άWF `)jEp5D; /mz҂gKOM!5>J8_eJ.v[yN>HϣUa/Gy qY(%ahN:v7mǧxvzy:wcp8^ۅ{9߃pwӃa[ڜ yU#~==]xV?1N;u-$Zўi.@K㉺Ctne˛Tڵ&ݎu44HK.)NCb֞\r2kgB9MQ&nQ-ZQdyB҇R'كӁ;F:ONG& zRD?_UZa[T;kh4hu׺$uUck^\e5w_@aۦ,VQ?XblG:J&tˢDQIԘ>sٞYr1vN_w"}:FӎpwNWvُO^gn'yy]y g߷iFW B]eȉs=tr)hH$Hj]4#Kv$j޼T׏fiHe FOa@yM'ʮzyV*P6i{T:o“*2 OdpŒ5 ^Lɳlzkޔ2 CvRI~S9F#J.>cǧ9*VhY%R.ztm{88jFL 8$A3Gud,t{֕MDHi괪##狛?kQZ6-Y7dX$©٫U#/U?a;Hm,\uzL}(_Vd8qA#,}X}ǵX<;iQ8W==cyW?B{qJ2QXW̔j4XrC-JJF]SSAMMZT|?BR#2^kЊCAn%(J]Zm)MmtqFlZYoV/j7R)T9/Jo{`6s7]RIwCϩ _jFUKJ7!%P4  )Q¡m"+?οWwd9_cIJR |Jr (MXUq972Sek$aPBexUQj)4ƾP F@fBx@>yBATzm~*Ko2Ry@t9rսtjmrgZx-ES l$'+%f@#A*5#×kݶ -r3d@!J•tyx(F\0j"ٔWZUaPԹ-FRR%'LICNT3Ac8N' '\!0~8_tp=;2rϰn?Wק 5^ |GL.ϋc6?$ͨTRy|S^7kel-1×]k;Qo]u{T3Wշ* lPUAQ+aK*M&kh@5qnx6<."gYm2"Vݍ"kH*A[R߭)[!֥$ {2[t=1ׅzcD;IMRT:>ڟ,8yQi$:UIĸ:KoEy.%#Po6y@pp]0W+fĕqg. ZԛQXxܕJjMb|RNLCLlJF??i}{XW]cMbMJNu)}h*,JNQW7:#Gim6e2϶=,GWjl]OqT+(m!r$-e -6em??)VoZ|b{OxP$:֨ﴧcZA~Sh#%Z}u[qy&:oS[Xˍ*kP+v4fF]im}^½sZHWfֹh)6AWWr"\=7ql9i{E Mڔ}d6}`l6m2zCHf-zZX< ShsY %-rVY/[~R VfXPO% ;JN6yS9c`ìSX\f%Nyъ7,Jiָ'TυDsr{5Xқt.J‚Ґ#,Oק f$SS))H *t2 PP'#xZ!*/Se )W: SH)$'0RIBZ 5&[+_^QR!A$pds'dԏ?Lz4NmP BBf\ $xGfEQ+oU5J6!!栟7n2sCdGO-۟c*^ۖX8 N@ ;'I4#*9Tc[Vm%\3Oi C%g8tftn2z%pP*- k \ٱ׊FD'h.ꔤּfzeWWXJϗ6$M %3Q>%5ͅ4PCShQNj)R8К.:k }xjfE2\tK*39TRߝ:[)IzT.:{R˟`Wyz G9݆*E̴Fj5ħ(z{omNd0ɎT }SI뎲Y\W%5 ٖEһ.yrd9 OS*Tt*[x>7~sm80rf[z;9>wY Z\Z5.hK%.כ]RҔ#?!-'ψMiQʌTe{D@zLr#e)KH9ITKԠr,}B3CoFB\IJ%C"*$)^r;)I(Qm攇Tr#0r?uY4Ԗ)z8[H^^#f)ci>SCٻ|^? gO,S~Z/Y 5:.NkS܃o)ؾ ;p*> qNfq+m^P]CәTA9?h>xRh*>1a(9dr)رTcи:"p+?x-#-f3ʊzyq)/}ifz /MCWT%FjW<a4/LiO2jˮ͗> uјA6Z)ΆI&B[vg]% qu>KBT2 u k4;n;jTkwO4)Hm:}RKy RHYP8q̾?)ڃq[׀PC~m.mR6@X?1+UjAI!S59jVJ5#]'oɍyL tMji%K.54y糝oH3jј>8/z#M<)(]Ø4 IШT¥U2#)Xb$8d6a:}دOn6{qϏW۸<}a_?>9/=^`OFusc> =Yُr\~}Z?1\iWdp7wU%U֚d*K%0ړz ?[:όT-5oR in`$o--*ķ.+z:.xGa2[ʨGf;1g`uztAv}C, #g?8齃v޲dGt[)(XIIa@5!ƛH91etx"|^ O+o(c[, 5e hbYV:uRḛTm)_M5 m>&հ'08$ۏ!6,0,ٱ!N~=,|3׀lۘ˱>9n'.,|6m#yۇ߾ЮN^X]y/pQNy}xY)J-KqMF(OX tuvf܌7!ukjy&5rW?^RQå ((CQ*u)Cx ySxͶk1 ; ([y JND}Yt}fmm9JTٷYd{]8/VoW>3G,ǯ}р)U?m74xw9f!~]Lamq(5v`J 0xiUVUAO }ڌ'4ٷ`"/͗/XR}Z4:}vk/E0,H􋚤NuR)qtۭ8Bju&,:]:Q)BJ(c #5;19۸eў|ob={sn6oFj=N}N}{:~l g0=r?.{=;~l͗6>G۳,:6ڱ?=0:0gӱ>#<+qˣhX#o1}?ɃџfF}X˛f='nVݙ89I9`OImтvym0'.}o8<||c/=#5egڬ_NE.6a@qd3-0r+p[}@WC%q'0p,ϗN:\hJR/q<|yih ٖP8j -W !Yfv#)!p?  QҟdtqxG7>Xۄmm0}2r=]NEYNѷfe[:6ў\]#vYm>n O[3ϛ.c{31v2qp3$s{:Fs6`tmgOnWٿ9 'wcgx=]!zGr>1ӟW˃8 ϟ2w}}y`ͼs;xFGFC|}Þ^;p}!׃~`G< 8?2#?>?g>_Flϫ~g.ludaP>gc[,F|p Ͱl.o}W@ؒy kzw`dzpNϧ>7?F2}'~N6>Ճ?OftA_oXnIg>YzexSigӖ>3;:>#>Lf|g#3c/ 9->ݳ,2n?uѷn2z?_@OGͷ-ȳ׏gsٞ636{?rV?rV62?Gh8;ٖrϷ6s{3$?l#z_ OF8IeCat| s6| ϛ?9d6e{`{eGHYt珫zmoN]]N>{mg6ڱ͗>Լٲc9e8>ޝf669Ϗ}F gS-scbF]]2;F6!$={Xv@iIt}OQLlie$m9ݏe@Ry>ӌ3?͘ް>pҹݝ9#Ӳ>g˟¦xٍ2z`矧>n:,l?ݴ??c,?_@1>  Heading 4 &@& 6\]T@T  Heading 5$$ & F@&B*OJQJph$?`Z@Z  Heading 6$$ & F@&6B*OJQJ]ph$?`Z@Z  Heading 7$$ & F@&6B*OJQJ]ph@@@\@\  Heading 8$$ & F@&B*CJOJQJaJph@@@b @b  Heading 9 $$ & F@&6B*CJOJQJ]aJph@@@DA`D Default Paragraph FontRi@R 0 Table Normal4 l4a (k ( 0No List NoN Heading 1 Char5CJOJPJQJ\aJXoX Heading 2 Char#56B*CJOJPJQJaJphNoN Heading 3 Char6CJOJPJQJ\aJLo!L Heading 4 CharCJOJPJQJ]aJ*W`1* ] Strong5\RoAR Heading 5 CharB*CJOJPJQJaJph$?`XoQX Heading 6 Char#6B*CJOJPJQJ]aJph$?`XoaX Heading 7 Char#6B*CJOJPJQJ]aJph@@@JoqJ Heading 8 CharB*OJPJQJph@@@PoP Heading 9 Char6B*OJPJQJ]ph@@@<@< _HeaderB#CJNoN _ Header Char CJOJQJ_HaJmH sH tH J @J FI0Footer< & B*CJph@@@LoL FI0 Footer CharB*CJOJPJQJaJph@@@f@fFj4pTOC 30 d# VDWD>^^`>`U6^JmHnHuB`B 4]0Placeholder Text B*phBGB _List Continue 4 x^l<m<TY1 / 1.1 / 1.1.1 F \@\dypTOC 1*!(d# VDWD^^h``5mHnHud@dFj4pTOC 2-"Sd# VDwWD^w^l``56mHnHuN@NOpTOC 4#d# ^`0 mHnHu6U`A6 ~U$0 Hyperlink >*B*phR AR @up TOC Heading %h5B*mH phsH tH D+@bD '  Endnote Text &CJaJXoqX & Endnote Text Char1OJPJQJ_HmH sH tH J*`J  Endnote ReferenceCJH*OJQJ0l0TY 1 / a / i) F @n@TYArticle / Section* F<T< TY Block Text+x]^2B2 TY Body Text,x<P< TY Body Text 2 -dx>Q@> TY Body Text 3.xCJaJLML TYBody Text First Indent/`DCD TYBody Text Indent 0x^PNP TYBody Text First Indent 21`NR"N TYBody Text Indent 22dx^PS@2P TYBody Text Indent 3 3x^CJaJ.?B. TYClosing4^>L@> 1Date 5xxa$ B*CJphYYY<[b< TYE-mail Signature6.X`q. TY@Emphasis6]f$@f  Envelope Address(8&#$+D/^@ ^JF%@F TYEnvelope Return9 CJ^JaJ&`  Footnote Reference,4_G,Appel note de bas de p,Appel note de bas de p + 11 pt,Italic,Footnote,Footnote symbol,Appel note de bas de p1,Appel note de bas de p2,Appel note de bas de p3,Footnote Reference/,Style 12,(NECG) Footnote Reference,Style 124,o,frCJH*OJQJ&@& Footnote Text,Footnote Text Char,Footnote Text Char1 Char,Footnote Text Char Char Char,Footnote Text Char1 Char Char Char,Footnote Text Char Char Char Char Char,Footnote Text Char2 Char Char Char Char Char,Footnote Text Char1,Footnote Text Char Char,5_G ;CJaJ0_0 TY HTML Acronym:`@: TY HTML Address=6]0a`0 TY HTML Cite6]>b`> TY HTML CodeCJOJQJ^JaJ<c`< TYHTML Definition6]Fd`F TY HTML KeyboardCJOJQJ^JaJRe@"R TYHTML PreformattedBCJOJQJ^JaJ:f`1: TY HTML Sample OJQJ^JJg`AJ TYHTML TypewriterCJOJQJ^JaJ8h`Q8 TY HTML Variable6].(a. TY Line Number,/r, TYList G^`020 TYList 2 H^6`030 TYList 3 I^Q`040 TYList 4 J^l`050 TYList 5 K^`606 TY List BulletL F:6: TY List Bullet 2M F:7: TY List Bullet 3N F:8: TY List Bullet 4O F:9: TY List Bullet 5P F>D> TY List Continue Qx^BE"B TYList Continue 2 Rx^6BF2B TYList Continue 3 Sx^QBHBB TYList Continue 5 Tx^61R6 TY List NumberU F::b: TY List Number 2V F :;r: TY List Number 3W F :<: TY List Number 4X F:=: TY List Number 5Y F ~I@~ TYMessage HeaderCZM NOPQ^n`^J<^@< TY0 Normal (Web)[OJQJ:: TY Normal Indent\^4O4 TY Note Heading].)@. TY Page NumberDZ@D TY Plain Text_CJOJQJ^JaJ0K0 TY Salutation`2@2 TY Signaturea^HJ@"H s<2Subtitleb(@&a$5;CJ^J@3 TYTable 3D effects 1m:Vcj#j#j#j#j.j.j.j. c-5\5B* \ph B* ph:@C: TYTable 3D effects 2:Vdj.@j#j9jj 4d5\5\p@Sp TYTable 3D effects 3:Vej.@j j j#j9jj44e2 B*ph B*ph5\5\br@cb TYTable Classic 1:Vf0  j#j#j#jj f5 B*ph6]5\56\]s@s TYTable Classic 2#:Vg0  j% j#j0 jjj%  g25\ B*ph B* ph5\Lt@L TYTable Classic 3:Vh0    jj0  j0  hEB* ph5B*\ph B* ph56B*\]phu@ TYTable Classic 4:Vi0  jj0 j0 jj iL5\ B* ph56B*\]ph B* ph5\Vv@V TYTable Colorful 1:Vj0    j% j% jj%  j<B*ph56\]56\]56\]Tw@T TYTable Colorful 2:Vk0 j% jj0  j k<56\]56B*\]ph56\]4x@4 TYTable Colorful 3:Vl0j;$ j0 j%  l5B*\phy@ TYTable Columns 1 :Vm0    j j jjjj#jj4md5\ B*ph B*ph5\5\5\5\5\5\z@ TYTable Columns 2:Vnj j jjjj% jj4np5\ B*ph B*ph5\5B*\ph5\ B*ph5\5\{@ TYTable Columns 3:Vo0j j jjj#j% j4o\5\ B*ph B*ph5\5\5\ B*ph5\ |@  TYTable Columns 4:Vpj j jjj% 4p@ B*ph B*ph5\5\ B*ph\}@\ TYTable Columns 5:Vq0    j jjj#j#4qN B*ph B*ph5\5\5\56\](@#( TYTable Contemporary:Vr0j%@ j% j% 4r0 @B*ph B*ph5B*\ph@3 TY Table Elegant_:Vs0j s;B*phnCn TY Table Grid7:Vt0t~@S TY Table Grid 1z:Vu0jj u6]6]"@c" TY Table Grid 2:Vv0jjj#j v,5\5\5\5\@s TY Table Grid 3:Vw0  jjj0  w5\5\6@6 TY Table Grid 4:Vx0  jj0 j0  x65B*\ph5B*\ph B*ph @  TY Table Grid 5:Vy0    jjj# j y5\5\$@$ TY Table Grid 6:Vz0    jj#j#j z$5\ B*ph5\N@N TY Table Grid 7:V{0    jjj#j# j {25\5\5\5\5\@ TY Table Grid 8:V|0jjj%  |<5B*\ph5B*\ph5B*\phn@n TY Table List 1:V}0  j%@ jj#j0 j4}A @B*ph B*ph56B* \]ph5\h@h TY Table List 2:V~0 j%@ jj#j0 j4~; @B*ph B*ph5B*\ph5\@ TY Table List 3:V0  j# j# j (5B* \ph6B* ]ph@ TY Table List 4w:V0    j0   5B*\ph@ TY Table List 5:V0jj#  5\5\ @#  TY Table List 6:V0j%@ j# j#  45\5\@3 TY Table List 7:V0  j%@ j% jjj# j0  4: @B*ph5\5\5\5\@C TY Table List 8:V0j%@ j% jjj#j0 4@ @B*ph5\5\5\56\]@S TYTable Professionall:V0j%  5B*\phoc TYTable Simple 1:V0  j#j# rp@sr TYTable Simple 2:Vj#j# j#j# j#j#K5\5\5B*\ph5\5\5\q@ TYTable Simple 3l:V0    j%  5B*\pht@t TYTable Subtle 1 :Vj0@ j# j# j0  j. jj45\5\t@t TYTable Subtle 2:V0j0  j0  j# j# jj5\5\pp TY Table Theme7:V0@ TY Table Web 1h:V03j  B*ph@ TY Table Web 2h:V03j  B*ph@ TY Table Web 3h:V03j  B*phF>@F TYTitle <@&a$5CJ KH\^JaJ FV` F TYFollowedHyperlink >*B* phpo p  Main Title$da$m$0B*CJ8KH OJQJ\_HaJ mH ph#{sH tH ^O" ^ QYHeader & Footer d8a$B*CJPJ^JphtH vO2 v QY Logo Type-dB#NJP5@B*CJ ^JphtH P@B P h Balloon Text CJOJ QJ ^J aJRoQ R hBalloon Text CharCJOJ PJQJ ^J aJFoa F H Char CharOJQJ^J_HmH sH tH Foq F vjEndnote Text Char OJQJ_HPo P bs<2 Subtitle Char5;CJOJPJQJ^JaJO FI*Submission Normal,No Spacing1,No Spacing11 F`0PJo FIZSubmission Normal Char,No Spacing Char,No Spacing1 Char,No Spacing11 Char,No Spacing2 CharCJOJQJaJBO B  scover addresses(aJ6 6  s cover addressB'` B Comment ReferenceCJaJ@@ @  Comment Text CJPJaJBo B Comment Text CharOJQJDj@ D IComment Subject 5PJ\Ro R IComment Subject Char5OJPJQJ\P`" P&g0Revision$CJOJPJQJ_HaJmH sH tH o1  ;Footnote Text Char2,Footnote Text Char Char1,Footnote Text Char1 Char Char,Footnote Text Char Char Char Char,Footnote Text Char1 Char Char Char Char,Footnote Text Char Char Char Char Char Char,Footnote Text Char2 Char Char Char Char Char Char,5_G Char1 OJPJQJROB R subsectionheaddd[$\$ OJPJQJJOR J  subsectiondd[$\$ OJPJQJFOb F notetextdd[$\$ OJPJQJHOr H  paragraphdd[$\$ OJPJQJLO L  subsection2dd[$\$ OJPJQJV/ V Style Endnote Reference + 12 ptTo T Endnote Text Char2OJQJ_HmH sH tH Vo V Default 7$8$H$!B*CJ_HaJmH phsH tH VO V author3&dPxNfffPPJ^JRO R  LAQ_CourtNo1 Fdhx PJaJtH RO R  LAQ_CourtNo2 & Fdh PJaJtH RO R  LAQ_CourtNo3 & Fdh PJaJtH FO F acthead5dd[$\$ OJPJQJNO N  paragraphsubdd[$\$ OJPJQJ:O" : r2dd[$\$ OJPJQJ./1 .  hps-normal1/A  st@@R @  List Paragraph ^m$:a :>_Style Numbered FOr >_Contact detailsC$$d.& 6m I %\1$7$8$H$ CJOJPJQJ^J_H mH sH Ro R >_ Char Char9&6CJOJQJ\_HaJmH sH tH Po P >_ Char Char8#CJOJQJ]_HaJmH sH tH ,o , >_~5_G Char,ACMA Footnote Text Char,ABA Footnote Text Char,footnote text Char,Footnote Text Char1 Char Char Char Char Char,f CharOJQJ_HmH sH tH tO t >__ Single Txt_Gdx*$]n^na$ CJOJPJQJaJmH sH tH Ro R `R List Paragraph CharCJOJPJQJaJPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3N)cbJ uV4(Tn 7_?m-ٛ{UBwznʜ"Z xJZp; {/<P;,)''KQk5qpN8KGbe Sd̛\17 pa>SR! 3K4'+rzQ TTIIvt]Kc⫲K#v5+|D~O@%\w_nN[L9KqgVhn R!y+Un;*&/HrT >>\ t=.Tġ S; Z~!P9giCڧ!# B,;X=ۻ,I2UWV9$lk=Aj;{AP79|s*Y;̠[MCۿhf]o{oY=1kyVV5E8Vk+֜\80X4D)!!?*|fv u"xA@T_q64)kڬuV7 t '%;i9s9x,ڎ-45xd8?ǘd/Y|t &LILJ`& -Gt/PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!0C)theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] =')),-//203678/99:<<==*=7=A=U=]=g==?sAFB=C`EEFxFILN~QQV\]c]emg qq{uxz~'_,oP_SnБmIXӘ7Ϣɦ +۰' зV&ڹiB" )O/13Vt#5ry`%(<bp>S/ ,   LbsY-De  r! "\""%&@&&'Z'''((()N)H**K++",,-d.01234Q566I88: <h=>@@%D EgG5H2K?LFMMFOFPRXX\PPe!5; T n  ^  k o &JU0c(b ^ f"# $P$%"&f&&'()6*g****,8.c.//013455c678;;;<3<==>m>>>>>>D@l@@@@ A/AABBCqCD[EGHJHHHIIIIK:KcKLM'NqOPQ;QpQQRSSTMTTT ULUUUfVVV2WyWW,ZDZ\ZpZ[\\>]]]5^L__EabcdLefxghhfiij$klBlll?mmmDnnn#oNoxoooo pvpp!quqq#rxrr"swss!tvtt"uOutuuuuvvvw1wDwWwjw/xDxYxnxx yZytyyyz>|s|}a$JPńلLPLOP < >< ccennq sqV+)0AH#$*M/o4;>AFKOQiW]b6f]k}pty}}džHoљӠ8ĭȰ 1ys )!F&@*B.3n7(>@C H MKTGW_a e ijMmoqttqu=xl}ߍ=ѡE޽h3aP      "#$&()*+-.01245679:;<>?@ACDFGHIJLMNPQRSTVWXZ[\]_`acdefhijlnoqrtvyz|}~@[&q4FTy\qjvua \$3B[jfios=tttz %}^P!%',/38=BEKOUY^bgkmpsuwx{'(Ga}">@ACb-/02Q(DFGIh}Lhjkm3q:=>@_s+GJKMl";WZ[]| + G J K M l  * - . 0 O u  . J M N P o  1 4 5 7 V < ? @ B a 8;<>]u -ILMOn   +9UXY[z(DGHJiiBjzjP X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%̕X!;hag5 J\l; ! ! k ;EDKpM3~ !"K"E### %z%%&:'' (>(())*,,,--..//0112223'445666/7778899:;<=z=P??(@ANBBJJJKpLL\MMMNNVOP~PPRSzSXYZ [>[d[\j\\``)ab^bb)crccde-e fHfuff3g\gFhhhh'iKiliiii5jjjjk*kkkwwx)z~zz{{#|}q}}~~F FقDsXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX  ,b${D r qƙ<# @~ f(    S vA?: MS word cover1WordPictureWatermark14066017C"?  S vA?: MS word cover1WordPictureWatermark14066018c"$?  S vA?: MS word cover1WordPictureWatermark14066019c"$?  S vA?: MS word cover1WordPictureWatermark14066020c"$?  S vA?: MS word cover1WordPictureWatermark14066021c"$?S(  _  L?"Text Box 1S"ñ?PK!8[Content_Types].xmlAN0EH%N@%邴K@`dOdlyLhoDX3'AL:*/@X*eRp208J妾)G,R}Q)=HiҺ0BL):T뢸WQDY;d]6O&8* VCLj"󃒝 yJ.;[wIC_ :{IOA !>Ø4 p;fɑ3׶Vc.ӵn(&poPK!8! _rels/.relsj0 }qN/k؊c[F232zQLZ%R6zPT]( LJ[ۑ̱j,Z˫fLV:*f"N.]m@= 7LuP[i?T;GI4Ew=}3b9`5YCƵkρؖ9#ۄo~e?zrPK!S>Adrs/e2oDoc.xmlTKo0 t_86F"ka@HYɢ&)_?JNҠiEO|}w]QXW.pR"4lW_n)q)ТoѻO" T),A')hɓJ4 F avQIӤ[ \8ڇHѿ')Ds܅3YYT5?!^\=0jjnMR\aMŌ`s?lI]4(ѬA+td#jc;T#ͱTg8$WCthG'mX(ۥ! G$&8Fӛm6 :M@CPPq|=CB4 Z)Գ\it:łΕ&ѧ$ؚKvPa,s _՘њ9,V 02$J*x8u? JwLφqxOn2kڢ=q b{uwfi w2pV k1~{e֜H#G=;˃YGBa`6ϗ JPK-!8[Content_Types].xmlPK-!8! /_rels/.relsPK-!S>A.drs/e2oDoc.xmlPK-!= drs/downrev.xmlPK   L?"Text Box 2S"$?PK!8[Content_Types].xmlAN0EH%N@%邴K@`dOdlyLhoDX3'AL:*/@X*eRp208J妾)G,R}Q)=HiҺ0BL):T뢸WQDY;d]6O&8* VCLj"󃒝 yJ.;[wIC_ :{IOA !>Ø4 p;fɑ3׶Vc.ӵn(&poPK!8! _rels/.relsj0 }qN/k؊c[F232zQLZ%R6zPT]( LJ[ۑ̱j,Z˫fLV:*f"N.]m@= 7LuP[i?T;GI4Ew=}3b9`5YCƵkρؖ9#ۄo~e?zrPK!78-drs/e2oDoc.xmlTێ }@g}Y;8nSU^~18F@V8&ۗ0 937C'О˕prcd( }ZOYG$%BIVgfEKV i^WuNQdu^)$8e:4ۈz'4Q FZXxsX搨0h¸c\rkny}HC=AG?:^eUjEix`įy%tz[3!?tgCc?*  d߸W薌.0HRyq@M,4Wi1YOII18)V4Ί~gde)eKvg]7eTVP(+\i]du/U: Ux~ ";I6)bG釒A P/Q n ⅳQb4$o LZe~`}#a$>HP\dY 9l=DUa8s㣰ӆo[8iԸT҆dw29ҟ![PK!n drs/downrev.xmlLAO@&͘x1v)T ҘF&j"FݶOz/}of3N`@ նU=& *F"YcҷKeZAIv ;"qi'=S+I 2 X/tzmWy48'G=<7!|5!{gï>CN=RĠ`ݭU.iAT (\,rPK-!8[Content_Types].xmlPK-!8! /_rels/.relsPK-!78-.drs/e2oDoc.xmlPK-!n drs/downrev.xmlPK B S  ?P% t>($at en.Ca@.Ca@s(:a@.Ca@.Ca@W _Toc209316062 _Toc367179742 _Toc367179743 _Toc367179744 _Toc367179745 _Toc367179746 _Toc367179747 _Toc367179748 _Toc365546437 _Toc365571912 _Toc365639224 _Toc365639336 _Toc367179749 _Toc365546438 _Toc365571913 _Toc365639225 _Toc365639337 _Toc367179750 _Toc365546439 _Toc365571914 _Toc365639226 _Toc365639338 _Toc367179751 _Toc365546440 _Toc365571915 _Toc365639227 _Toc365639339 _Toc367179752 _Toc367179753 _Toc367179754 _Toc360894422 _Toc367179755 _Toc360894423 _Toc360894424 _Toc360894425 _Toc360894427 _Toc367179756 _Toc360894428 _Toc367179757 _Toc360894429 _Toc367179758 _Toc367179759 _Toc367179760 _Toc367179761 _Toc367179762 _Toc367179763 _Toc367179764 _Toc367179765 _Toc367179766 _Toc367179767 _Toc367179768 _Toc367179769 _Toc367179770 _Toc367179771 _Toc367179772 _Toc367179773 _Toc367179774 _Toc367179775 _Toc367179776 _Toc367179777 _Toc367179778 _Toc367179779 _Toc367179780 _Toc367179781 _Toc367179782 _Toc365639370 _Toc367179783 _Toc365639371 _Toc367179784 _Toc365639372 _Toc367179785 _Toc365639373 _Toc367179786 _Toc367179787c29e _Toc367179788 _Toc367179789 _Toc355100894 _Toc355363536 _Toc355952709 _Toc367179790 _Toc367179791 _Toc367179792 _Toc367179793 _Toc367179794 _Toc367179795recom12#k(-7CFNNNNNNNNNNNNNNNNNNNNNQQQ-U_cnrrvvzz)\bVґ_{ íE()"-/////////<'DV+V+V+V\i^j^k^biKQ  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLRSTMNOPQUV$(.78D2GNNNNNNNNNNNNNNNNNNNN-NQQQhUcnrr+v+vVzVzjnty(̭`#B jJ (;"-//////// 0< 0B&]3EaHszI-| F J v"CN . RTesD`ꛭ[`P,d!Ch⹶: p}[*sq`zz>j |j",,~E^`.^`.^`.^`. ^`OJQJo( ^`OJQJo( ^`OJQJo( ^`OJQJo(hh^h`. hh^h`OJQJo( ^`OJQJo(^`OJQJ^Jo(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o P^P`OJ QJ o(^`o(.^`. L^ `L.w ^w `.G^G`.L^`L.^`.^`.L^`L. ^`OJQJo(^`OJQJ^Jo(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o P^P`OJ QJ o(^`o(()^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(()^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. ^`OJQJo(^`OJQJ^Jo(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o P^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o P^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o P^P`OJ QJ o(^`o(.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L. ^` Article . ^` Section .P^`P()`p`^``p()P^`P)P^`P)^`)P^`P.0p0^0`p.SS^S`o(SS^S`o(.oo^o`56CJOJQJo(()SS^S`o(() ^`o( .... ^`o( ..... ^`o( ...... `^``o(....... 00^0`o(........ ^`OJQJo(^`OJQJ^Jo(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o P^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o P^P`OJ QJ o(^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`CJOJQJo(^`CJOJQJo(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o( ^`OJQJo(^`OJQJ^Jo(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o P^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o P^P`OJ QJ o(hh^h`)^`)88^8`)^`()^`()pp^p`()  ^ `.@ @ ^@ `.  ^ `. ^`OJQJo(^`OJQJ^Jo(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o P^P`OJ QJ o( ^ `o(()^`o(()L^`L.| ^| `.L^L`.L^`L.^`.^`.L^`L.SS^S`o(^`o(.SS^S`o(()SS^S`o(() ^`o( .... ^`o( ..... ^`o( ...... `^``o(....... 0^0`o(........ ^`CJOJQJ.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.hh^h`.P^`P..^`...xp^`x....  ^` .....  X ^ `X ......  ^ `....... 8^`8........ `^``......... ^`OJQJo(^`OJQJ^Jo(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o P^P`OJ QJ o(77^7`o(. nn^n`56CJo(()^`o(()h^`o(h^`o(h^`o(h^`o(h^`o(h^`o( ^`OJQJo(^`OJQJ^Jo(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o P^P`OJ QJ o( ^`OJQJo(^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L. ^ `o(()^`.L^`L.| ^| `.L^L`.L^`L.^`.^`.L^`L. ^`OJQJo(^`OJQJ^Jo(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o P^P`OJ QJ o(^`o(()^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. ^`OJQJo(^`OJQJ^Jo(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o P^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o P^P`OJ QJ o(^`o(()^`. L^ `L.w ^w `.G^G`.L^`L.^`.^`.L^`L.+szI}|~"CN/>`!|#sD`F Jx)q`zaxp[`z0 p.j:,d 0BW?,,~j | jr9_N".rSSw >w UK23JzzT+,+z.[P\1UK2 5i_^b=:>.A-NaBXi_^b4-NaBX"ug>.A3JzYZ d%3q:@GVHOLV \mcwd%56)Z25>hGMPZ>_bdkvsy   og$147A8=B)CN_el|[y $00XBC@OQEZclcnyy;q4b$$%h-0I1k1>KSuYbG|8_5&569F9fkmorxuy  *w8M] {}  n 0f<GHI8MP^=gjpl}8n^5@DhImxW / 74 JC H X ^ ` p _u y {  l a   & H XL _ ga Hb Hi m 3r ] m " / T> F J n s E  0  % -5 7 u9 > Z pa Ac h 9m y z d| ~ +  x  X% l- 1 S1 KQ AV [ b dd k k l x kz t  <+08:JNgQQQVXYg`%im uuay83 & 4098@RTXV ]5gkhwkqpqt {>A)^rvzg(h/0_9;X?Q&[`g')=dIJP.\|_dup  ")J*:tGJMHNV[b`dWt##S&`)+%@EEHEKK_ciprax7}Vnc,h--0@X}]-^~gm *F]<^_bdzi~ *W]""`'*.7??B1Itv1%4<K\i:rMtTv~5k$.7:9 <yENbUXt% j$7?#-/r14n5FLNUWgX[ln ntWu9}S"#n99<<X=MP7R TUkv;@Q ,0346r?ZA]pqzB2;DL}V^ev\o%/17r92;cDRvVVhkjl-([ Z*+-4/5<zCDEJcQ`S@V_aIegds w @  ) {3 => @ K U ` f A!F!!f!"!>!jM!R!Y!TZ!^!rh!l!~}! "\ "@""+!"X'"-"2">:"'G"H"WY"i"To"w"[|"#####z"#0#5#:A#v#=v#>#v$ $V$\$G $$$$&$+$H-$e1$F$SK$S$~U$]$o$:v${$y % % %%,%2%<%;>%^C%K%M%U% W%/W%X%l%Zn%q% &y &&9&&,&2A&XD&qM&YQ&X&E^&_&h&Ri&o&8s&w&8|&'> '('*'+'.'(/'7'<'F'P'Q'Y'Z'1x'y'\((B( ( (&(-( W(c(c(+d(s(s(|(~()7))_))#)?$)@0)0)A),A)6E)X)Sj)k)Xm)An)*!*6$*B*bG*DJ*'S*9`*s*u* y*2y*a++5 +++e++!+.$+p)+H5+8+\A+'H+O+P+V+k+l+m+)n+n+s+,,,,f,*,1,6,+A,F,G,FM,M,[,],],g,., ----1----/-i5-?-xF-G-S-T-X-X-X-]-j-{-{-~-H.K.=.P'.m'.A+.O1.wH.(O.H\.Db.n.vo.~. //]/'/ 8/>/4>/B/F/+K/L/&R/V/d/"00N0*0$807J0IL0L0O0Q0T0T0[0[0W_0c0j0o0w0 111#1/11161WB1*I1J1T1j1k1l1o1Au11E222)2/252s<22?2D2K2R2j2l2l2Zm2Fn2q2C|2|2A33333$37.3:3E=3)O3U3]3_g3x3~3_44u44G4}4U34346464;4|<4N=4XC4XG4@T4|\4]4d4rf4Fj4Bq4Y}45T55 5L 5I5(5=5?5E5UG5U5e5e5f5kj5$o5q5w5}56n666a6c 6$6,6.606D;6B6hC6D6!G6U6`6p6Jy6z67H77 77&7'7+7y,747}67<7V>7S7Y7jY7f7n7d88'8!8h%8s.8(0808718F8^8l8m8v8Jy8Sz8p}8K~8S899 9V999B 9 #9$9}/929$=9F9 G9H9S9T9d9m9x9z9~9T::v":[-:'1:>:G:K:Q:R:rX:bv:z: ;;;O;;C(;1T;5V;Z;b;c;s;Ev;x;[<<m<<w!<"<0<#9<.A<M<Q<IR<P[<r]<Q`<b<~<;==:=gD=O=P=V=Y=9n==@=>n+>2>6>>>?>?>S>\>se>g>g>r>Wv>kz>l?7 ?? ,?2?4?5?QF#\FK@K NKPKi\K_KowKwL L LRLLL*LQ3L:LJ;L=LaLAmL7nLqL!rLtLuL0zLzL{L}LMM8M*/MJ1M3M9M\>MHPMWM\MhMNN NN6N9NN?NUDNGNBHNRHN-WN]NcNXdN hN'wNO|NOOOKOO(O|OOkO%O0O2Ov¸ܸ(ڸq-SQSbSkcS TT)T1T:Tp^A^1c^j^}k^k^1_5_DE_0K_XU_V_n_z_]`` ``8` *`*`4`M7`K`2O`X`Z`f`aaaaD$az7aJ8a6LaPa7_ada eaqaI}a bkbb%b(b,b.bFbfObQb Xb0YbibIjbvyb~bcgcc c6c ct#c)c,c/c=0c5c7c78c=c>cWcocyclcEd ddd!%dY%d0d$Dd0EdNdqdrdesdxd~de eeRee^%e[*e\0eC2eGeLe,`e?eeJxe~e es f f&&f%'f-)fw-f/fDfJfMf*Qf\_fRaf gg&g*g/2g2g;gYFg!HgUgZg`gagfg{g|glhhhh,h4h7hIhJhJhUh_h0ghjhthzh"|h5iiii+ij,iu/i9;inPnWnF^nfn;mnqnunAzn~noW oo'o'(o+o3o7oIAoNojo p pAplpp!pi,pCpEpHpRpepipnp|pjqqNq qq5qa>qNq9ZqhqKlq qqyqE|qXrr2r\ r(r6rP:r+BrYOrmfrkr2krxs s sGs:sss'sz0sg;sPFstQs_TsTslYsYsasyesqsysettt1 tttKt1th t#t -t}pB}YH}O}[}\}-_}r}~~P~~E~(~x/~8~iE~K~S~XS~[~[~_~`~se~f~s~py~y~z~_l !+%--R5DDlO5X]tv: 8z9*B7BKWdp~A ' 8O'5#;@VOOU_Id[ru{S L7=HSLTU_e~kt}BB !I)GFxJ*Pfkkqq{^ | &,N-005c6==AFHh>mm'n-nqKzy"Y$i%&s'6)FR^"%)k*,>AHd_TbglJI x= 6!$$7;<G IN_j:k3sx{ F+awdu* 6 s0JGV_ow IZ *w-1:W=V?B@ADPQUcgWicc#%(7-/6H:N6egjdyyq}Oap9-=P^;d=ikjn0C !)*++?4@MiQ\]^B`^nx&[( :`=L?R_{gRjknv:+JB=DeMZa[R^[`no/ug|([~_ /f7'8{GHHJLQno quDz{}C8 +;WACDLVo[$\f:h;my$(;fAkNO^Q]agttu|X'!+,623 EAEG\KMSPT#Y!*9R?g@8FK1MRR[`VfCghTps(sua~S CSIUXRYSbeUlpUv"|>&,4N\a/lqdv*^ 1oD3NP+QZ`>X,:2?LI V]^cgipyh{g  #5DDHIK=WZ^[hMjq#w&  &&%))/(:3BDKKSTW[tvz 0,^78;ABFIO&W +  6*+91269_@YMRX0aglQlln}=@%A1R=CJOQkTXh &K!$'d'(HLTk.qf;5~67;n@FxVj'tv~S I.Z.0=1m44)::C3C#QT@[u!w#wx36G:^<KAbC6EQG\lrow7z!e"C,h,, 1AVIZJ TXZ\\]K UX,988;UQR[:^w!((.0QBc|jj~ 0 j !O$X0CV@Zhim2w gc"(44467W@BRU[deSvxP 3})*'5q=LUa5 .a' %'()/F1:>>>@Lhijktxrz}UVQ %+3f8PQSTX=Z^eruy X#%Q,6FPHcirm }12<DERcRfXnoZqru| A "ArHguv7 ['23J>DHLQTX^^bdghkn1yA U(.k27-@+BiGJVN@TTvWYZ`"cwFAt17n?u?AEKNY^9hhko_ x`~**-,ILQV`!BWae~goeryR&7cR",2|7%D5OYad[ggys*HHAPQWdffnux{}  M>#h-8_9;[!j G'Q.<16C=HI[A KLW_bmooZxx#!v$&&U,G<7=B1LQ\ cfo'vz"#?ARRT Vc"psuzh" @{;QQyz'v&'(;> FFGGLTW$Z[cgn"ss7vV8 a\]d(SgyntKvB(b x %*-0;4=@BUHLVYd{|P ."$8GS*l;loww%2C4<5I6>?ENTim} U5 D*78WB JWX]jj7pkpkl' )*+36<%@J1KBXZ\"ckboq_rxD cO79>,OPs++,;<K?nEEV[]{gglmm+syz8J "i-3n8vE#JKWc w ,S1Z<O,St.~~  %CVYYKglmvFxryz+g;kT&)2z5U0XY2n;n1 C)z+/Y/FJL]Wgit}~b PA!#* +D;Uv\b!klpyz| 74@}DD:HMHLOUUZ[]i(k,w{: e.;$()/-U. @@ILnU}Va^f^x_kJlmdqwvx?b?=f6d"$*0,6<?XTYP^Us#z {~ #&s5CPQ\kNo|~\ /u&,.2Y@H"K"Q~fl } ? K$47>nLUasd,n~J-.s.1>+@EJLM0QySwU[\ mr' O ,<A[Fpa|#+/5@DJSLUX}z-0e;6HL(Q8\dvjl[n.s I$$:mw|[.06HI&KIKrSZ[ce)tftX>G368@MlRUYZfKkt{X)/N0@778P:ABR>Z~q % V"+[26Bg\^e ffhqhyF|~m &.qCmLU\M~DZ 'S,DGI JrUXbelyl}~/ [a!5]6U?ZJKMAMko=""*39JYU[ccgtV i ("$Y*i+13oBG6N`ZmottDvwH}?%&,6;;COo_takfzfl'nvyf~% 1"-)6EG IKSXXChznSQ"v'(.0\7F\iKoTr|v}v! 0=+KM;VX2Z]]+`UaKk{n&)<?IuIXY_-`dlqs  )>HPX]hjrvzX}D~S\ 8gk7IIJ&PdXtX`.mqptvY'(.K/26E?GGJdgix$, ,)r/235Z>Z]Z_nNo#pxU3 {2 .D2Pkk@PX@Unknown G* Times New Roman5Symbol3. * Arial7.@ CalibriC (PMingLiUe0}fԚG=  jMS Mincho-3 fgCMArialMTArial7@Cambria?= *Cx Courier New5. .[`)Tahoma;WingdingsA$BCambria Math"1hgg'M65(M65(!nx20kkCHP  3B2+! xx 8\\fileshare\applications\Templates\Commission\Report.dotYear Sarah DillonMatthew Bretag+              *       )    ! " # $ % & ' ( ) * Oh+'0X     ,8@HPYearSarah Dillon Report.dotMatthew Bretag2Microsoft Office Word@F#@wnp@@(M65՜.+,D՜.+,\ hp  0Human Rights and Equal Opportunity Commissionk Year Title(E 8@ _PID_HLINKSAD>) 8http://www.humanrights.gov.au/human-rights-and-internet4_Toc3671797954_Toc3671797944_Toc3671797934_Toc3671797904_Toc3671797894_Toc3671797884_Toc3671797874_Toc3671797824_Toc3671797814_Toc3671797804_Toc3671797794_Toc3671797784_Toc3671797774_Toc3671797764_Toc3671797754_Toc3671797744_Toc3671797734_Toc3671797724_Toc3671797714_Toc3671797704_Toc3671797694_Toc3671797684_Toc3671797674z_Toc3671797664t_Toc3671797654n_Toc3671797644h_Toc3671797634b_Toc3671797624\_Toc3671797614V_Toc3671797604P_Toc3671797594J_Toc3671797584D_Toc3671797574>_Toc36717975648_Toc36717975542_Toc3671797544,_Toc3671797534&_Toc3671797484 _Toc3671797474_Toc3671797464_Toc3671797454_Toc3671797444_Toc3671797434_Toc367179742L =http://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/RES/20/8FrLhttp://www.abs.gov.au/ausstats/abs@.nsf/Lookup/4429.0main+features1001420094lhttp://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id%3A%22legislation%2Fems%2Fr4575_ems_ecca7d37-7fb2-4218-9837-da3ab80f531e%22 ,http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=jscc/senior_australians/subs.htmINhttp://www.aic.gov.au/publications/current series/tandi/401-420/tandi420.aspxSQhttp://www.humanrights.gov.au/news/speeches/ruby-hutchison-memorial-lecture-2012Jhttp://www.humanrights.gov.au/inquiry-cybersafety-senior-australians-2012T{Ghttp://humanrights.gov.au/disability_rights/standards/www_3/www_3.htmlO9http://www.religion-online.org/showarticle.asp?title=283#^Yhttp://www.dbcde.gov.au/funding_and_programs/cybersafety_plan/consultative_working_group )http://somethingincommon.gov.au/backmeupRhttp://www.dbcde.gov.au/online_safety_and_security/cybersafetyhelpbutton_downloadZ]http://www.cybersmart.gov.au/?n$http://www.facebook.com/legal/terms,:+http://www.crimlaw2012.com/abstract/11.aspU)http://www.un-documents.net/wsis-poa.htm[-http://www.refworld.org/docid/3db573314.htmlS)http://www.un-documents.net/durban-d.htm6";http://conventions.coe.int/Treaty/EN/Treaties/Html/185.htm^_:http://conventions.coe.int/Treaty/EN/Reports/Html/189.htm6.;http://conventions.coe.int/Treaty/EN/Treaties/Html/189.htmL>http://publicintelligence.net/uk-cps-social-media-guidelines/PS&http://www.bbc.co.uk/news/uk-20777002.chttp://www.smh.com.au/technology/technology-news/online-rants-land-facebook-and-twitter-users-in-legal-trouble-20121116-29gf7.htmlu"~khttp://www.alrc.gov.au/publications/classification-content-regulation-and-convergent-media-alrc-report-118e{Uhttp://www.commerce.wa.gov.au/worksafe/content/safety_topics/Bullying/Questions.htmlllx\http://www.worksafe.vic.gov.au/__data/assets/pdf_file/0008/42893/WS_Bullying_Guide_Web2.pdfQu-http://www.comlaw.gov.au/Details/F2011L028040`rphttp://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=jscc/report.htmDoahttp://www.thelawyer.com/bains-cohen-takes-on-facebook-in-internet-bullying-case/1012919.articleElAhttp://www.time.com/time/magazine/article/0,9171,1570701,00.htmlUiehttp://www.smh.com.au/digital-life/digital-life-news/just-hook-it-into-our-veins-20121018-27s6e.html_Jfihttp://news.smh.com.au/breaking-news-national/suppression-order-on-bayley-background-20121011-27f3j.htmlXchttp://www.lawcom.govt.nz/project/review-regulatory-gaps-and-new-media/publication/ministerial-briefing/2012/ministerial-briefing-harmful-digital-communications-adequacy-current-sanctions-and-remediesF(`Whttp://topics.nytimes.com/top/reference/timestopics/people/c/tyler_clementi/index.htmllh]Whttp://www.nytimes.com/2010/10/03/weekinreview/03schwartz.html?_r=1&ref=tyler_clementi}6Zhttp://www.nohomophobes.com/ !/all-time/UWhttp://www.heraldsun.com.au/news/james-silverwood-and-dom-terry-creators-of-banned-12-year-old-sluts-facebook-page-vow-to-return/story-e6frf7jo-1226494768239IKTrhttp://www.dailylife.com.au/news-and-views/dl-opinion/the-disturbing-phenomenon-of-creepshots-20120926-26kl5.htmlx7Qghttp://www.humanrights.gov.au/working-without-fear-results-sexual-harassment-national-telephone-surveyNqhttp://www.smh.com.au/technology/technology-news/contents-removed-from-racist-facebook--page-20120808-23tr1.html_K6http://www2.ohchr.org/english/bodies/crc/comments.htmFKH9http://tb.ohchr.org/default.aspx?Symbol=CRC/C/15/Add.268]E!http://www.amf.org.au/FactSheetsojB'http://www.ncab.org.au/whatisbullying/rr?Shttp://netforbeginners.about.com/od/weirdwebculture/f/What-Is-an-Internet-Meme.htmns<Qhttp://www.humanrights.gov.au/right-freedom-information-opinion-and-expression-0 SubmissionsV9.http://www.refworld.org/docid/453883f922.htmll*63http://tb.ohchr.org/default.aspx?Symbol=CRC/C/GC/8ws3$http://bullying.humanrights.gov.au/[^0=http://www.austlii.edu.au/au/other/dfat/treaties/1976/5.htmlgQ-qhttp://www.aph.gov.au/Parliamentary_Business/Committees/Senate_Committees?url=humanrights_ctte/reports/index.htmN*%http://www.un.org/en/documents/udhr/\I'Bhttp://www.austlii.edu.au/au/other/dfat/treaties/ATS/2008/12.html]P$=http://www.austlii.edu.au/au/other/dfat/treaties/1991/4.html >!Ohttp://www.humanrights.gov.au/right-freedom-information-opinion-and-expressionother ^qhttp://www.smh.com.au/technology/technology-news/filter-was-white-elephant-waiting-to-happen-20121109-2923o.htmlEJhttp://www.humanrights.gov.au/common-law-rights-and-human-rights-scrutiny3{@http://www.ohchr.org/EN/Issues/FreedomOpinion/Pages/Annual.aspx>)8http://www.humanrights.gov.au/human-rights-and-internetL =http://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/RES/20/8\=http://www.humanrights.gov.au/permissible-limitations-rights<[ fhttp://tbinternet.ohchr.org/_layouts/treatybodyexternal/TBSearch.aspx?Lang=en&TreatyID=8&DocTypeID=11Q >http://www.austlii.edu.au/au/other/dfat/treaties/1980/23.htmls%`http://www.itu.int/en/ITU-D/Statistics/Documents/statistics/2013/ITU_Key_2005-2013_ICT_data.xls wC:\Users\dicda\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\12XAFZSH\Key 2006-2013 ICT data for the world, by geographic regions and by level of development, for the following indicatorscvhttp://www.w3.org/History.html  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry F Data &1TableYWordDocument MSummaryInformation(DocumentSummaryInformation8FMsoDataStore0M24DHE22PA==20Item  PropertiesUCompObj r   F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q