ࡱ> mpjkl vbjbj 6ËËmnw(($P,:xi'|@U:W:W:W:W:W:W:$<8?{:ii{::C C C pU:C U:C C U/|=0Sj/A::0:/Z??$=0=0X?0 C {:{::?( H: Internal Control Self-Assessment Checklist Management throughout the University is responsible to establish internal controls to keep their operations on course toward financial goals, ensure proper use of resources, to help achieve defined missions, to minimize surprises and risks, and to allow the organization to successfully deal with change. Internal controls are defined as activities undertaken to increase the likelihood of achieving management objectives in three areas: Efficiency and effectiveness of operations Reliability of financial/timekeeping records Compliance with laws and regulations Some internal controls are established at the institutional level; others are established at the department level. To achieve success, management needs to (1) be knowledgeable about, and support, institutional controls, and (2) implement practical and effective internal controls specific to the department utilizing a cost benefit approach. (unless required by local, state or federal regulations). The following checklist is provided as a tool to facilitate a self-assessment of internal controls by management of individual departments. It is intended to address general aspects of internal controls. Use of this checklist is voluntary and is not required. Organization of the checklist is consistent with the five interrelated components of internal control defined by the Committee of Sponsoring Organizations of the Treadway Commission (COSO).  COSO INTERNAL CONTROL FRAMEWORK We encourage department heads, financial managers, business officers and anyone involved in entering or approving financial transactions and/or time records to use this self-assessment checklist to evaluate internal controls in their areas of responsibility. This checklist can be modified and you can add to the checklist other controls that you think apply specifically to your department. The checklist is not intended to be a one size fits all document and some sections may be N/A for your area. The Office of Internal Audit and Consulting is available to offer advice upon request. You can also consult with the Responsible Office and Responsible Official noted on various University policies. Index 1. Control Environment Integrity and Ethical Values Commitment to Competence Management's Philosophy and Operating Style Organizational Structure Assignment of Authority and Responsibility Human Resource Policies and Practices 2. Risk Assessment Organizational Goals and Objectives Risk Identification and Prioritization Managing Change Links for additional information about internal controls.  HYPERLINK "http://www.coso.org/" COSO INTERNAL CONTROLS FRAMEWORK  HYPERLINK "http://www.aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AU-00316.pdf" CONSIDERATION OF FRAUD IN A ֱ STATEMENT AUDIT AU316  HYPERLINK "http://www.acfe.com/rttn2016.aspx" ACFE ANNUAL GLOBAL FRAUD REPORT  HYPERLINK "http://www.gao.gov/greenbook/overview" GAO GREEN BOOK INTERNAL CONTROL SYSTEMS  HYPERLINK "http://umwa.memphis.edu/umpolicies/index.php" UOM POLICIES AND PROCEDURES  HYPERLINK "http://www.memphis.edu/bursar/handling_guide.php" GUIDE TO CASH HANDLING  HYPERLINK "http://bf.memphis.edu/bfguide/10119.htm" PCARD GUIDELINES3. Control Activities Written Policies and Procedures Control Procedures Controls over Information Systems 4. Information and Communication Access to Information Communication Patterns 5. Monitoring Management Supervision Outside Sources Response Mechanisms Self-Assessment Mechanisms  Assessment FactorIndication of Stronger ControlsIndication of Weaker ControlsAssessmentStrong - Weak12345Section 1 Control Environment1 - Integrity and Ethical Values1.1 Acceptable business practices.Department management (faculty and supervisory staff) understand the University's policies covering matters such as legitimate use of University resources.Policies are poorly understood1.2 Codes of conduct.Department management understands the University's policies governing relationships with sponsors, suppliers, creditors, regulators, the community, and the public at large.Policies are poorly understood.1.3 Conflicts of interests.Department management understands the University's policies regarding potential conflicts of interest.Policies are poorly understood.1.4 Integrity.Department management sets a good example and regularly communicates high expectations regarding integrity and ethical values.Management does not set a good example and/or does not communicate high expectations regarding integrity and ethical values.2 Commitment to Competence2.1 Job descriptions.Responsibilities are clearly defined in writing and communicated as appropriate.Responsibilities are poorly defined or poorly communicated.2.2 Knowledge and Skills. Department management (faculty and supervisory staff) understand the knowledge and skills required to accomplish tasks.Management does not adequately consider knowledge and skill requirements.2.3 Employee competence.Department management is aware of competency levels, and is involved in training and increased supervision when competency is low. Management is not adequately aware of competency levels, or does not actively address problems.3 Managements Philosophy and Operating Style3.1 CommunicationDepartment management engages in open disclosure of financial or business issues with appropriate University personnel.Management is secretive and reluctant to conduct business or deal with issues in an open manner.3.2 Laws and regulations.There is active concern and effort to ensure compliance with the letter and intent of laws and regulations.Management is willing to risk the consequences of noncompliance.3.3 Getting the job done.Management is concerned with and exerts effort to get the job done right the first time.Management is willing to get the job done without adequate regard to quality.3.4 Exceptions to policy.Exceptions to policy are infrequent. When they occur they must be approved and well documented.Exceptions to policy are the norm and are rarely documented.3.5 Approach to financial accountability.Managements approach shows concern and appreciation for accurate and timely reporting. Budgeting and other financial estimates are generally conservative.Financial accountability is given low priority.3.6 Emphasis on meeting budget and other financial and operating goals. Realistic budgets are established and results are actively monitored. Corrective action is taken as necessary. Management either shows little concern (climate of laxness), or makes unreasonable demands (climate of fear).3.7 Approach to decision making. Decision-making processes are deliberate and consistent. Decisions are made after careful consideration of relevant facts. Policies and procedures are in place to ensure appropriate levels of management are involved.Decision making is nearly always informal. Management makes arbitrary decisions with inadequate discussion and analysis of the facts.4 Organizational Structure4.1 Complexity of the organizational structure. Complexity of the structure is commensurate with the organization. Lines of reporting are clear and documentation is up-to-date. Lines of responsibility are unclear or unnecessarily complicated for the size and activities of the entity.4.2 Organization charts. Documentation exists and is up to date. Documentation does not exist or is out-of-date. The documented structure does not correspond with actual responsibilities.4.3 Size of the management group. Size is commensurate with the complexity of the department and its growth.Size is not appropriate (e.g., too many levels, too dispersed, or too "thin").4.4 Stability of the management group.Low turnover.High turnover.5 Assignment of Authority and Responsibility5.1 Delegation of authority and assignment of responsibility for operating and financial functions.Delegation of authority and assignment of responsibility is clearly defined. Individuals are held accountable for results.Decisions are dominated by one or a few individuals. Roles and responsibilities of middle management are unclear.5.2 Authority limits.Authority limits are clearly defined in writing and communicated as appropriate.Policies and procedures covering authority limits are informal or poorly communicated.5.3 Delegated signature authority.Appropriate limits have been placed on each delegation of signature authority. Management reviews and updates signature records as turnover occurs.Signature authority is delegated without adequate consideration. Delegated authority is not in line with employee knowledge, training, or competence.5.4 Knowledge and experience.Key personnel are knowledgeable and experienced. Management does not delegate authority to inexperienced individuals.Key personnel are inexperienced. Management delegates authority without regard to knowledge and experience.5.5 Resources. Management provides the resources needed for employees to carry out their duties. Management does not provide necessary resources.6 Human Resource Policies and Practices6.1 Selection of personnel. A careful hiring process is in place. The Human Resources Department is involved in identifying potential employees based on job requirements.The hiring process is informal, and sometimes proceeds without adequate involvement by higher-level supervisors.6.2 Training.On-the-job and other training programs have defined objectives. They are effective and important.Training programs are inconsistent, ineffective, or are given low priority.6.3 Supervision policies. Personnel are adequately supervised. They have a regular resource for resolving problems.Regular supervision does not exist or is ineffective. Employees are frustrated and feel they have nowhere to go with issues.6.4 Inappropriate behavior. Inappropriate behavior is consistently reprimanded in a timely and direct manner, regardless of the individual's position or status. Reprimands are not timely, direct, or are not consistently applied (climate of favoritism). 6.5 Evaluation of personnel. An organized evaluation process exists.The evaluation process is ad hoc and inconsistent. Performance issues are not formally addressed.6.6 Methods to compensate personnel. Compensation decisions are based on a formal process with meaningful involvement of more than one level of management. The effect of performance evaluations on compensation decisions is defined and communicated.Compensation decisions are ad hoc, inconsistent, or inadequately reviewed by management.6.7 Staffing of critical functions. Critical functions are adequately staffed, with reasonable workloads.There is inadequate staffing and frequent periods of overwork and "organizational stress."6.8 Turnover. Particularly turnover in financially responsible positions.Low turnover. Management understands root causes of turnover.High turnover. Management does not understand root causes.Section 2 Risk Assessment7 Organizational Goals and Objectives7.1 Unit-wide objectives.A formal mission or value statement is established and communicated throughout the department.A unit-wide mission or value statement does not exist.7.2 Critical success factors.Factors that are critical to achievement of department-wide objectives are identified. Resources are appropriately allocated between critical success factors and objectives of lesser importance.Success factors are not identified or prioritized.7.3 Activity-level objectives.Realistic objectives are established for all key activities including operations, financial reporting and compliance considerations.Activity-level objectives do not exist.7.4 Measurement of objectives.Department-wide and activity level objectives include measurement criteria and are periodically evaluated.Performance regarding objectives is not measured. Targets are not set.7.5 Employee involvement.Employees at all levels are represented in establishing the objectives.Management dictates objectives without adequate employee involvement.7.6 Long and short-range planning.Long and short-range plans are developed and are written. Changes in direction are made only after sufficient study is performed. No organized planning process exists. There are frequent shifts in direction or emphasis.7.7 Budgeting system. Detailed budgets are developed by area of responsibility following prescribed procedures and realistic expectations. Plans and budgets support achievement of department-wide action steps.Budgets do not exist or are "backed into" depending on desired outcome.7.8 Strategic planning for information systems.Planning for future needs is done well in advance of expected needs and considers various scenarios.The information system lags significantly behind the needs of the business.8 Risk Identification and Prioritization8.1 Identification and consideration of external risk factors. A process exists to identify and consider the implications of external risk factors (economic changes, changing sponsor, student and community needs or expectations, new or changed legislation or regulations, technological developments, etc.) on department-wide objectives and plans.Potential or actual external risk factors are not effectively identified or evaluated.8.2 Identification and consideration of internal risk factors. A process exists to identify and consider the implications of internal risk factors (new personnel, new information systems, changes in management responsibilities, new or changed educational or research programs, etc.) on department-wide objectives and plans.Potential or actual internal risk factors are not effectively identified or evaluated.8.3 Prioritization of risks. The likelihood of occurrence and potential impact (monetary and otherwise) have been evaluated. Risks have been categorized as tolerable or requiring action.Risks have not been prioritized.8.4 Approach to studying risks.In-depth, cost / benefit studies are performed before committing significant unit resources.Risks are accepted with little or no study.8.5 Process for monitoring risks.A risk management program is in place to monitor and help mitigate exposures.Exposure is dealt with on a case by case basis. Regular efforts or programs to manage risks do not exist.8.6 Consultation with external advisors.External advisors are consulted as needed to supplement internal expertise.Internal expertise regarding risk and control issues is inadequate. Assistance is never sought from outside sources.9 Managing Change9.1 Commitment to change. Management promotes continuous improvement and solicits input and feedback on the implications of significant change.Management promotes the status quo, even when changes are needed to meet important business needs.9.2 Support of change.Management is willing to commit resources to achieve positive change.Management offers no resources to facilitate change.9.3 Routine change.Mechanisms exist to identify, prioritize, and react to routine events (i.e., turnover) that affect achievement of unit-wide objectives or action steps.Procedures are not present or are ineffective.9.4 Economic change.Mechanisms exist to identify and react to economic changes.Procedures are not present or are ineffective.9.5 Regulatory change. Mechanisms exist to identify and react to regulatory changes (maintain membership in associations that monitor laws and regulations, participate in University forums, etc.).Procedures are not present or are ineffective.9.6 Technological change. Mechanisms exist to identify and react to technological changes and changes in the functional requirements of the unit.Procedures are not present or are ineffective.Section 3 Control Activities10 Written Policies and Procedures10.1 University policies and procedures.Department employees are aware of University policy and procedures that apply to the department.Knowledge of university policy and procedures are not well known in the department.10.2 Department policies and procedures. The department has documented its own policies and procedures if applicable. They are well understood by department employees.Department policies and procedures are not well known or documented.11 Control Procedures11.1 Senior management (University or College) reviews.Senior management monitors the department's performance against objectives and budget.Senior management does not monitor department performance.11.2 Objective performance reviews by department management of major initiatives.Reviews are made of actual performance compared to objectives and previous periods for all major initiatives. Management analyzes and follows up as needed.Analyses are not performed or management does not follow up on significant deviations.11.3 Financial performance reviews by department management.Reviews are made of actual performance versus budgets, forecasts, and performance in prior periods for all major initiatives. Management analyzes and follows up as needed.Analyses are not performed or management does not follow up on significant deviations. 11.4 Direct functional or activity management by department management. Performance reviews are made of specific functions or activities, focusing on compliance, financial or operational issues.No performance reviews occur.11.5 Performance indicators. Unexpected operating results or unusual trends are investigated. Operating results and trends are not monitored.11.6 Financial transactions, timekeeping records and reconciliations. Financial transactions, timekeeping and reconciliations are completed timely. Management performs a diligent review and approval by signature and date or electronically.The activities are not performed timely or regularly. Management does not carefully review or formally approve.11.7 Sponsored project account management.Sponsored project accounts are reviewed and reconciled. PIs certify the expenditures timely. Department management monitors the portfolio of sponsored accounts for compliance and fiscal responsibility.Sponsored project accounts are not monitored; reconciliations and certifications are not timely.11.8 Use of restricted funds (gifts).Restrictions on use are well documented, and are understood by employees who administer the funds. Usage is monitored by management, accounts are reconciled. Restrictions are not clearly documented. Restricted fund accounts are not monitored; usage may not match restrictions.11.9 Information processing.Controls exist to monitor the accuracy and completeness of information as well as authorization of transactions.No information processing controls are in place.11.10 Physical controls. Equipment, supplies, inventory, cash and other assets are physically secured and periodically counted and compared to the amounts shown on control records. (if applicable)Equipment, supplies, inventory, cash and other assets are not protected. Control records do not exist or are not up to date.11.11 Training and guidance for asset custodians.Adequate guidance and training are provided to personnel responsible for cash or similar assets. No training or guidance is provided.11.12 Separation of duties.Financial duties are divided among different people (responsibilities for authorizing transactions, recording them and handling the asset are separated).No significant separation of financial duties among different employees.11.13 Record retention.Unit employees understand which records they are responsible to maintain and the required retention period. Records are appropriately filed. Unit employees do not understand which records they are responsible for maintaining. The filing system is inadequate.11.14 Disaster response plan. A disaster response and recovery plan has been developed and is understood by key personnel. No disaster response or recovery plan exists.12 Controls over Information Systems12.1 Local information systems and LANs. System operations are documented; software is appropriately acquired and maintained; access to the system, programs and data is controlled; the system is maintained in a secure environment; applications are appropriately developed and maintained.Inadequate controls over local information systems or LANs.12.2 Application controls. The department controls its computer applications by diligent and timely response to edit lists, rejected transactions and other control and balancing reports. Controls ensure a high level of data integrity including completeness, accuracy, and validity of all information in the system. Application controls are not used. 12.3 Back Up. Key data and programs on LANs or desktop computers are appropriately backed up and maintained. Off-site storage is adequate considering possible risks of loss. No formal back up procedures exist. Management has not informed staff of back up requirements. Assessment FactorIndication of Stronger ControlsIndication of Weaker ControlsAssessmentStrong - Weak12345Section 4 Information and Communication13 Access to Information13.1 Relevant external information. Department members receive relevant information regarding legislation, regulatory developments, economic changes or other external factors that affect the department.Relevant information is not available.13.2 Management reporting system. An executive information system exists. Information and reports are provided timely. Report detail is appropriate for the level of management. Data is summarized to facilitate decision making.A formal reporting system does not exist. Reports are not timely or are not at appropriate levels of detail.13.3 Management of information security. Information is evaluated and classified based on level of integrity, confidentiality and availability. Individuals with access to information are trained to understand their responsibilities related to the information.Information used by the unit has not been evaluated and classified. Employees are not trained with respect to information security.14 Communication Patterns14.1 Trust.Management promotes and fosters trust between employees, supervisors and others within the Department.Interactions among faculty, staff and/or with other units is characterized by low levels of trust.14.2 Policy enforcement and discipline.Employees who violate an important policy are disciplined. Management's communications and actions are consistent with policies.Violations, while not condoned officially, are often overlooked. Management's actions are inconsistent with official policies.14.3 Recommendations for improvement. Employees are encouraged to provide recommendations for improvement. Ideas are recognized and rewarded.Employees' ideas are not welcomed.14.4 Formal communications. Formal methods are used to communicate unit policies and procedures (e.g., manuals, training programs, written codes of conduct, and acceptable business practices).To the extent that they exist, policies are buried in unused manuals and documents.14.5 External communications. Standards and expectations are communicated to key outside groups or individuals (e.g., vendors, consultants, donors, sponsors, subcontractors, sub-recipients).No external communication of standards and expectations.14.6 Informal communications. Employees are kept informed of important matters (downward communication) and are able to communicate problems to persons with authority (upward communication). There is effective functional coordination within the department (lateral communication).Most information is received by the "grapevine."14.7 Communication with evaluators.Information is openly shared with outside evaluators.Information is kept secret from outside evaluators.Section 5 Monitoring15 Management Supervision15.1 Effectiveness of key control activities. Management routinely spot-checks transactions, records and reconciliations to ensure expectations are met.Management never performs spot-checks.15.2 Management supervision of financial and timekeeping activities. Knowledge of University financial and timekeeping policies are known by those with those responsibilities in the department.Policies are ad hoc or poorly communicated.15.3 Management supervision of new systems development. Policies are defined for developing new systems or changes to existing systems (cost/benefit analysis, team composition, user specifications, documentation, acceptance testing, and user approval).Policies and procedures are ad hoc, poorly communicated, or ineffective.15.4 Budget analysis. Budgets are compared to actual results and deviations are followed up on a timely basis. Adequate consideration is given to commitments. An analysis of actual versus budgeted results is not performed, or management does not follow up on deviations.16 Outside Sources16.1 Industry and professional associations. Data is used to compare the units performance with peers or industry standards.Comparative data is not regularly monitored.16.2 Regulatory authorities. Reports from regulatory bodies are considered for their internal control implications.Response is limited to what is necessary to "get by" the regulators.16.3 Sponsors, students, suppliers, creditors, and other third parties. Root causes of inquiries or complaints are investigated and considered for internal control implications.Inquiries or complaints are dealt with case-by-case, with little or no follow-up.16.4 External auditors. Information provided by external auditors about control-related matters are considered and acted on.Findings are referred to lower levels or are explained away.17 Response Mechanisms17.1 Management follow-up of violations of policies.Timely corrective action is taken. Follow-up is sporadic.17.2 External or internal audit reports. Audit report issues are considered and immediately acted upon at appropriate levels. Consideration of issues from audit reports are delegated to lower levels or is given low priority.17.3 Changes in conditions (e.g., economic, regulatory, technological, or competitive).Changes are anticipated and routinely integrated into ongoing long- and short-range planning.Responses are reactive rather than proactive.18 Self-Assessment Mechanisms18.1 Monitoring of control environment. Management periodically assesses employee attitudes, reviews the effectiveness of the organization structure, and evaluates the appropriateness of policies and procedures.Assessment processes do not exist.18.2 Evaluation of risk assessment process. Management periodically evaluates the effectiveness of its risk assessment process.Assessment processes do not exist.18.3 Assessment of design and effectiveness of internal controls.Internal controls are subject to a formal and continuous internal assessment process.Assessment processes do not exist.18.4 Evaluation of information and communication systems. Management periodically evaluates the accuracy, timeliness and relevance of its information and communication systems. Management questions information on management reports that appears unusual or inconsistent.Assessment process does not exist. Department Name: _______________________________________ Date: _______________ Completed By: ____________________________________________________________________________ Name(s) ____________________________________________________________________________ Title(s)     University of Memphis Office of Internal Audit and Consulting (March 2016)  PAGE \* MERGEFORMAT 1 *+,=@b 9 = J \ r | ~  9 d m x    , \ ` z | }  ) f ȼ¼ȶȰȼȪȪݪªȪתݪȰ hm:\aJ hxaJ hq<aJ h'daJ hOaJh fh faJ hqaJ h2aJ h/aJh fhweZ5CJ$KH$\aJhweZ5CJ$KH$\aJ>+ : _  & F8$If^8gdOhdd$If[$\$^hgdO$dd[$\$a$gdq< $xa$gdU & Fxgdq< & F<gdq<xgdo $@&a$gdo qr{|-7K]ľޗ޸޸޸΂ymhOhq<5\aJh25\aJh fhUaJ h faJ h0aJ hrKaJ hpaJ h?(TaJ hxaJh fh faJ h/aJ h2aJhUhU5aJ hUaJjhUUaJ haaJ hq<aJh#rwh fCJaJh#rwhxCJaJ(3^/wp)9[qdd$If[$\$gdOhdd$If[$\$^hgdO & F8$If^8gdO/01STUuvwxMƱw_wJ(jhS h}D5B*U\aJph.t.j$hS hU5B*U\aJph.t#hS hU0J5B*\aJph.t.jP#hS hU5B*U\aJph.thS hU5B*\aJph.t(jhS hU5B*U\aJph.thS h}D5B*\aJph.thOhU5\aJhOh aJhOhq<5\aJhOhq<aJMNOnopq   '()*hӱtbJb.j&hS hU5B*U\aJph.t#hS hU0J5B*\aJph.t.j&hS hU5B*U\aJph.thS hU5B*\aJph.t(jhS hU5B*U\aJph.thS h}D5B*\aJph.t#hS h}D0J5B*\aJph.t(jhS h}D5B*U\aJph.t.j:%hS h}D5B*U\aJph.thij 9Z~ӱӱӍxoxoxxfxx]QhxOJQJ^JaJh}D5\aJhOh'aJhOhQ|aJhOhq<aJhOhq<5\aJhOhU5\aJ.j(hS hU5B*U\aJph.thS hU5B*\aJph.t#hS hU0J5B*\aJph.t(jhS hU5B*U\aJph.t.j'hS hU5B*U\aJph.tqd[ $@&a$gdockd)$$IfTl04* tr*644 lapytOTdd$If[$\$gdOhdd$If[$\$^hgdO & F8$If^8gdO MN\^hiCjz}ٽ{sksksscsc[cshYCJaJh0CJaJhS!CJaJhM CJaJhUCJaJh3)CJaJh?(ThS!CJaJh?(ThS!5CJ\aJh?(ThDcCJaJh?(ThDc5CJ\aJhjhDc5CJKH$\aJh?(Th f5CJaJh?(Th fCJaJh?(Th f5CJ\aJh?(Th?(T5CJ\aJ#$BMNEkd)$$If-44\!d280@8634-abf4$$Ifa$gd)N\]^`bdfhppppp$dL$Ifa$gdDclkd*$$If-448@80@8634-abf4$dL$Ifa$gdDchi)$<<$Ifa$gd_kd6+$$If-44ֈd2345682     0@8634-abf4y $IfgdS!zkd+$$If-48@8 ` 0@8634-abf4p k~g\\QQQQQ $IfgdS! $Ifgd) @@$If^@`gdnkd,$$If-48@8  0@8634-` abf4p Sstuvwxy !"1-FfN3Ff0 $IfgdS! $Ifgd) @@$If^@`gdnFf."&1;Gi3OQRSTU!+K)2xy|}Ǽݞݱձձձձݞݱձձh"Vh0CJaJh)hS!CJh $IfgdS! $Ifgd) }%&02FLV} ).7Lq "*/wøzzzzzzzzzrh CJaJh?(Th&:CJaJh&:CJaJh!CJaJh0CJaJh?(Th fCJaJh^)CJaJh"VCJaJh?(ThxCJaJh?(Thx5CJ\aJh)hS!CJh?(ThS!CJaJhY-CJaJhM CJaJh"VhS!CJaJ,&EFfD $Ifgd&:Ff B $Ifgd) @@$If^@`gdn P Q R S T U V !L!M!N!O!P!Q!R!FfLFfI $Ifgd) @@$If^@`gdnFfOG $Ifgd&:4 N V Z p ~ !!&!5!R!V!!!"#")"K"f"x"""""""#*#\#]#l#o#######$"$$$%$($I%M%%&&&E&k&&&&&&&' ''h0CJaJh?(ThS!CJaJh?(Th&:5CJ\aJhE|CJaJh' CJaJh CJaJh"VCJaJh?(Th&:CJaJBR!! "y"z"{"|"}"~"""z#$$$$$$$#$ $IfgdSFfQFf8O $Ifgd&: $Ifgd) $Ifgd^) @@$If^@`gdn#$$$U$$C%D%E%F%G%H%~g\\QQQQQ $IfgdS! $Ifgd) @@$If^@`gdnkdS$$If-48@8  0@8634-` abf4p H%I%c%%& & & & & &&1&|&&&&&&&&&''FfZFfW $IfgdS! $Ifgd) @@$If^@`gdnFfDU'''''''J'K'ckd(_$$If-48@8  0@8634-` abf4p $IfgdSFf-] $IfgdS!'I'K'O'''''((((f)j))*\****++Z,,,,,,2-7-E----M.W.l.o.///^/f/i/00!0"0)0J0b0c0e0m0p0000111A1B1N1n1v1111111"2+26272h:CJaJhtCJaJhLcCJaJh^ICJaJh"VCJaJh?(ThS!CJaJh?(ThS!5CJ\aJKK''*((((((((( )`)a)b)c)d)e)f))****Ff9cFf` $IfgdS! $Ifgd) @@$If^@`gdn******N+++++++++#,T,U,V,W,X,Y,Z,Ff"kFfh $Ifgd) @@$If^@`gdnFfe $IfgdS!Z,,,,2-----s\QQFFF $IfgdS! $Ifgd) @@$If^@`gdnkdm$$If-48@8  0@8634-` abf4p $IfgdS-----.e.f.g.h.i.j.k..._/`/a/b/c/d/e//FfsFf.q $Ifgd) @@$If^@`gdnFfn $IfgdS!/0f0g0h0i0j0k0l0001111111A12n2o2p2q2Ffy @@$If^@`gdnFftv $IfgdS! $Ifgd)72D2l2u2x222A3D33344 4444$4%4&4'4*494M4O4S4i4l4r444444444455Ⱥumeumueumumuuh^)CJaJhTCJaJhL\hS!CJaJh?(ThL\CJaJh=5CJ\aJh?(ThL\5CJ\aJhL\5CJ\aJh?(ThDcCJaJh?(ThDc5CJ\aJhDc5CJKH$\aJhjhDc5CJKH$\aJh"VCJaJh:CJaJh?(ThS!CJaJ'q2r2s2t222:3;3<3=3>3?3@333444444 4FfFf]~ $Ifgd) @@$If^@`gdnFf{ $IfgdS! 4%4&4N4ti $IfgdIzkd$$If-48@8 ` 0@8634-abf4p $<<$Ifa$gd_N4O4i44455555~g\\QQQQQ $IfgdS! $Ifgd) @@$If^@`gd+Xkd$$If-48@8  0@8634-` abf4p 55#556666666>6666666667{77FfhFfŇ $IfgdS! $Ifgd) @@$If^@`gd+XFf"5 535Y5555 6666#666666677{777777777777H8n8p8u8v8z888v9{9|99:;:W:^::::::~;;;;;;ʿh?(ThS!5CJ\aJhS!5CJ\aJh?(ThDcCJaJhL\hDcCJaJh(CJaJh?(ThS!CJaJh:rCJaJh^)CJaJhL\hS!CJaJh"VCJaJ:77777777*8p8q8r8s8t8u8v889v9w9x9y9z9{9Ff $Ifgd) @@$If^@`gd+XFf $IfgdS!{9|99O:::::::::2;~;;;;;;;; $IfgdIFf $IfgdS! $Ifgd)Ff $Ifgd_ @@$If^@`gd+XFfQ;;;;;<<<<<>=J=c=h=j=m=}>>>>>>? ? ??\?r?????@@O@Z@_@i@@@@@@A=AMAwA|A}AAAAfBhBmBnBoBrBBB߿߷߷߷߷߯߯ׯ߯ߤh?(ThS!5CJ\aJhS!5CJ\aJh )CJaJhwFCJaJhpCJaJh^)CJaJhQCJaJh"VCJaJh *hS!CJaJh?(ThS!CJaJh=5CJ\aJ;;;; =c=d=e=f=g=h=~g\\QQQQQ $IfgdS! $Ifgd) @@$If^@`gd+Xkd$$If-48@8  0@8634-` abf4p h=i==>???? ? ? ?)?????????@k@@FfFFf $IfgdS! $Ifgd) @@$If^@`gd+XFf@@@@@@@@ AwAxAyAzA{A|A}AAAhBiBjBkBlBmBFf $Ifgd) @@$If^@`gd+XFf $IfgdS!mBnBBBBCwCxCnWLLA $IfgdS! $Ifgd) @@$If^@`gd+Xkd*$$If-48@8  0@8634-` abf4p $IfgdIFf/BBBBBBBBCC'C(C,CPCTC]CvCwC|C~CCCCDDDDDDDDvE{E}EE9F?FoFpFqFvFxF{F9G>G?GGGHGKG]G^G_GaGµµhI5CJ\aJh?(ThDcCJaJh?(ThDc5CJ\aJhDc5CJKH$\aJhjhDc5CJKH$\aJhFQCJaJh?(ThS!CJaJh.CCJaJh"VCJaJhIhS!CJaJ4xCyCzC{C|C}CCCDDDDDDD)DDDDDDDDFf; $Ifgd) @@$If^@`gd+XFf $IfgdS!DD EGEvEwExEyEzE{E|EEBFqFrFsFtFuFvFwFF G9GFf$Ff $IfgdS! $Ifgd) @@$If^@`gd+XFfް9G:G;GG?G^G_GGdY $IfgdIzkdº$$If-48@8 ` 0@8634-abf4p $<<$Ifa$gd_FfǸ $IfgdS! aGdGtGGGGGGGHHH;HgPgrgggggggggggǼꫛuh?(ThDcCJaJh?(ThDc5CJ\aJhDc5CJKH$\aJhjhDc5CJKH$\aJh)hS!CJhCJaJh+XhS!CJaJh+Xh+XCJaJhCJaJhjECJaJh+XCJaJh?(ThS!CJaJhIhS!CJaJ+ddddddddheeeeeeeeefffffffFfC $Ifgd) @@$If^@`gdC|Y$=?eIA竨%xW{QE{@(( +=8/mWV)G4ݑb8Av?,n/x|kV?mFvsv7O6PpH+.{Z M+8꘩d= t#MfԲkI/6}|dU\)p_z7AE9hQBŏ#Z=4l@FCq6QսT<= 4UOrv4KChEQH@վa?cC%~ {V4knA$'eQ^_Ea ұR* /sQfʲw,0d~&%E,u{X^piG=gHԜj.b6\*C(:^ٛ" >c -llj6/v Eai/^)c@aX7axsH\vC+{yG 78ԼU,tzMAX!QO F8>ۍke(ULlIlF ӆº>쮥L_mن=F멛j3"?4tQE}Q@i28Qrl*3Q=Yq8PSRX^iO=̃Ym- JY !bΈ㍔Zހk'SF4"nt,(;yRGu \hqx\LN [ oHx<^HdpH!Y2Ckfkvv͊@'RIΕY#X],ğA#EM=)LjԳ0ѲH:.'پ<,cH L;t؜4ADTN:Y=+7xDJs+8=,22(>{ק¥)&hEA9. +f%!QO;Z CR!İi^mZkO34F0#1a쮼cRr>epܖ%pޟʃvxXӶU 'ɪYp!Gbg2ax6 ,7pA:ׇVߧEu*%V8>=W*V ڰ2:Ǫ׭'CDvvk^ۂg^iXX MbB/@<]1mNHIo-z@{)hM}P{z/s긦d]dnVm8Mr>"ԲϰpL5-m,?8s?ȱ䷷'1$IM9)+ʏQ+<)V)ccs5&mk+?ei%a8cHuvKޟoO Ju%N#oF1r3E$ =]oO 7!7xĵ}fl黁-ɰFďô4׮.9enҼ:;'r%x&USй-OI"!po('1ѣ28IkOE1'HSrQyDm.]6 YcVmy -@0U#] InG{ .iBs2#[3(6mb b29d-ʽ c@͜b,[N$vUSm;Y +)hRHƺ_IϸG{Sh.nld#3 Rt.TSuXgbIbnIh)Ks-Zw̄Ag dA dEfy3ɺt%X&qf&39RdIvgUZ 1sn+vdX0< ug2t:v,[2A'S~6-oEG؛M &k!neUaeKTU%JA9 \ap{uJI'=:( AYzhx5y_H1LJ6~y%sM=dʿ4xJo*Hӵ$w/m=ƖT'ʿ4m/¿~1T4y6#hyX M_<%7j;X;܏q!{b|%7hUkGr6#hyX M_<%7iGܾ sF=Ʋ0LxJo*H !yFCV'SyWF M_S|%̉*1԰Oİ,<-_\6|D̡̪)'5sjۣ6K3fLf,|h~j lzdٙang|6.jE6bm RNQt=(8]#U7WבtT^o}(uQ^ApQE^+m$nT8U.l~SԄP0w&ۍm}w䱓;r2V]=oH6u$-lEj=D9%C{v54V1>\KEyKj,FHiB,nr0=n^U/mNk4:TDBF0װk)/"hcI7nO*v9wL㨨~&e H$1R  s Dr,a%P.]KX B^EQYŠ(9R1?? SͻKf#K\ۅ+,N {hpp̱X fCmXV{bK /GV#YKFs0 J `_3q[_zm7"E:Yգ!b+ʴܥȨr}>ǢS6T峦oUKGڴv><,w["yX-*O]dO+{{*g8I2Kyn4]AXZ~(;(r6P-4|&]؞solbݺJxֹw{ ö+F̻񓮚-Q:K Iiwp:Q~W`Q, 0bFP_57/lbFf]!©<s]( ÷IOi`$1s* 9H%Ryk 62Eh&V"@v9N2V2"ۨ3gIE EYorO2lЃ35̇e67k|ò3MD7}ҟ<O^wPX 7$'؊'HV(A^!ҏspC?m}LɋQUEW` D_1](%Fˍ4Pȯ*%rrPseŪAgPR݋}E.՝O߇jQXϚ~j~̵J<JNɐJf:1іe̒%Kl.lװ$ZZrLTc1m)B,QmhpZ>W-BkSKpw ݮgnN6N\!1AYXp_V$#4x/"!V7Y$6[ xM/4YC Yw{Ƕejr-۳)=TfDݍx'Td >AضE9H!1ƣ7C:nC_MA[hmo}8p5W#il׆q[5Kۗ ؉^użHnn}-I$mU[*,TTS7*$ozcH툛 d_*]\*6X+z7e^lx m#9£B+ds"4t$UXBٱ3U-I$XSo!nO5?$vUTF K].jE,?͘EQrZ$ד)9;ݓN@rԞ@W {? ήީf] \ [E?q+s]QEtoOO+ æj}݈S Յݐ"ķV cj2YY2;XFco9O#FSԸ&.mf8Kdsř%Eӯ Hʳb ר['3Z׬S FIFeFB1B@6=eFѭȄ< {$zuwϡEyTtȹmbBgv yr?rR_Xe*Jd+hk|5yQ5=8.nob% ЗW(2%Ϙ܁ǍEmHlbls^A!W^6~SʌH.&mQF̸a.l!1Y|zg5v@b="7z#RᕜK3+OK PʩQWd,?뿱ރeˏĎ|oٯB1ο #nePvW1D*B( {sJ&eQ) ,4fV+̛D2/gO3ΧmggO3Χen<#Hw@Z%L$/R/SkjC_fM6z1GE]75 ؊XDBUv^e͘0$X.Zf`Ì{yZsѼTbF1+:e9M-ua}mRGCFUFnͣQbl[^6iv^qu?ֿ|8:_Oļ.ı鶏}$EOq,ٱᴡ-Aj<2!W2ݏGB8,ݤ1WGkJH(( [?W5Kze%YBTj,+hgjywݶV_mWfAO$#n e>kU}6+ff$|rcƤ~zhmO5nفm1$Q.m%B5ɾb4Ln͓ w1n`c ro{ڣzi=ڏs')+1"XQc{Y<^kfj^QYŋhlkv"mO5nڞjoC27hQ+&/m4sҩF*|b*,U&zrn{*wjywݶV_m5%&IIAF[21#?K$Ȫ"@ˆ|8pZVƦ~zh?m=mOr'D(ٙrO7stS$h"DUm6pĂt7FmO5nP=/҉Je !w* xǷ +4Kh.M_m޾?vS[}N~zhmO5nY$jv"`H6ڞjSt qXbE:ŵ?Rߡ˳X FH![ (!ET(( (((( (((( (((( (((ٳDyK yK Bhttp://www.coso.org/yX;H,]ą'c7DyK yK http://www.aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AU-00316.pdfyX;H,]ą'cDyK yK \http://www.acfe.com/rttn2016.aspxyX;H,]ą'cDyK yK dhttp://www.gao.gov/greenbook/overviewyX;H,]ą'cDyK yK rhttp://umwa.memphis.edu/umpolicies/index.phpyX;H,]ą'cDyK yK zhttp://www.memphis.edu/bursar/handling_guide.phpyX;H,]ą'cDyK yK hhttp://bf.memphis.edu/bfguide/10119.htmyX;H,]ą'ci$$If!vh#v#v:V l tr*655pytOT$$If!vh#v#v:V -440@86,55/ 34-f4$$If!vh#v@8:V -440@86,5@8/ 34-f4$$If!vh#v2#v :V -440@86,525 / 34-f4$$If!vh#v@8:V -4 ` 0@86,5@8/ 34-f4p $$If!vh#v@8:V -4  0@86,5@8/ 34-` f4p $$If!vh#v#v :V -40@86,55 / 34-f4kd`-$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd0$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd2$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdI5$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v@8:V -4  0@86,5@8/ 34-` f4p $$If!vh#v#v :V -40@86,55 / 34-f4kd8$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdU;$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd=$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v@8:V -4  0@86,5@8/ 34-` f4p $$If!vh#v#v :V -40@86,55 / 34-f4kdaA$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdD$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdF$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdJI$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdK$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdN$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd3Q$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v@8:V -4  0@86,5@8/ 34-` f4p $$If!vh#v#v :V -40@86,55 / 34-f4kdT$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd?W$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdY$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd\$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v@8:V -4  0@86,5@8/ 34-` f4p $$If!vh#v#v :V -40@86,55 / 34-f4kd_$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdb$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd4e$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdg$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdzj$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v@8:V -4  0@86,5@8/ 34-` f4p $$If!vh#v#v :V -40@86,55 / 34-f4kdm$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdp$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd)s$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdu$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdox$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd{$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd}$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdX$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v@8:V -4 ` 0@86,5@8/ 34-f4p $$If!vh#v@8:V -4  0@86,5@8/ 34-` f4p $$If!vh#v#v :V -40@86,55 / 34-f4kdz$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdc$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdL$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v@8:V -4  0@86,5@8/ 34-` f4p $$If!vh#v#v :V -40@86,55 / 34-f4kdX$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdA$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v@8:V -4  0@86,5@8/ 34-` f4p $$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd6$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdٲ$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd|$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v@8:V -4 ` 0@86,5@8/ 34-f4p $$If!vh#v@8:V -4  0@86,5@8/ 34-` f4p $$If!vh#v#v :V -40@86,55 / 34-f4kdA$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v@8:V -4  0@86,5@8/ 34-` f4p $$If!vh#v#v :V -40@86,55 / 34-f4kdU$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd>$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd'$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdm$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdV$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v@8:V -4  0@86,5@8/ 34-` f4p $$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdK$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v:V -440@86,55/ 34-f4$$If!vh#v@8:V -440@86,5@8/ 34-f4$$If!vh#v2#v :V -440@86,525 / 34-f4$$If!vh#v@8:V -4 ` 0@86,5@8/ 34-f4p $$If!vh#v@8:V -4  0@86,5@8/ 34-` f4p $$If!vh#v#v :V -40@86,55 / 34-f4kd`$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v@8:V -4  0@86,5@8/ 34-` f4p $$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdU$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd> $$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd $$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v@8:V -4 ` 0@86,5@8/ 34-f4p $$If!vh#v@8:V -4  0@86,5@8/ 34-` f4p $$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdI$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v@8:V -4  0@86,5@8/ 34-` f4p $$If!vh#v#v :V -40@86,55 / 34-f4kdU$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd $$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd>#$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v@8:V -4  0@86,5@8/ 34-` f4p $$If!vh#v#v :V -40@86,55 / 34-f4kd&$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kdJ)$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd+$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v@8:V -4  0@86,5@8/ 34-` f4p $$If!vh#v#v :V -40@86,55 / 34-f4kdV/$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd1$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd4$$If-4ִ!d234568     0@86    34-ab f4$$If!vh#v#v :V -40@86,55 / 34-f4kd?7$$If-4ִ!d234568     0@86    34-ab f4^ 02&6FVfv2(&6FVfv&6FVfv&6FVfv&6FVfv&6FVfv&6FVfv8XV~_HmH nH sH tH @`@ NormalCJ_HmH sH tH R@R ) Heading 1dd@&[$\$5CJ0KH$\aJ0N@2N ) Heading 3dd@&[$\$5CJ\aJDA D Default Paragraph FontVi@V  Table Normal :V 44 la (k (No List nn  Table Grid7:V04U`4 ) Hyperlink >*phDV`D )FollowedHyperlink >*phf3F^@"F ) Normal (Web)dd[$\$aJ424 /Header  H$2oA2 / Header CharCJ4 @R4 /0Footer  H$2oa2 /0 Footer CharCJPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3N)cbJ uV4(Tn 7_?m-ٛ{UBwznʜ"Z xJZp; {/<P;,)''KQk5qpN8KGbe Sd̛\17 pa>SR! 3K4'+rzQ TTIIvt]Kc⫲K#v5+|D~O@%\w_nN[L9KqgVhn R!y+Un;*&/HrT >>\ t=.Tġ S; Z~!P9giCڧ!# B,;X=ۻ,I2UWV9$lk=Aj;{AP79|s*Y;̠[MCۿhf]o{oY=1kyVV5E8Vk+֜\80X4D)!!?*|fv u"xA@T_q64)kڬuV7 t '%;i9s9x,ڎ-45xd8?ǘd/Y|t &LILJ`& -Gt/PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!0C)theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] n6>6 XXXXXXvvvy Mh}'725;BaGIQP5Vk\]bgikonqvv<>@ABDKORW]bejnrvy~qNh-Q|R!#$H%'K'*Z,-/q2 4N457{9;h=@mBxCD9GGhHuIEJMOS*UW-XY\l\\\\]`adfgghjkkl0oPoqq tvv=?CEFGHIJLMNPQSTUVXYZ[\^_`acdfghiklmopqstuwxz{|}0 T u w   N n p ' ) i nXXXXXXXXpry!8@0(  B S  ?ce-ievce-ccce-mposce-osce-aarce-hrppra-rra-mcca-cca-cisic-aiic-cm-osm-rmm-sam 3Z$3n:]APTXc6gin  3Z$3n:]APTXc6gin/ Y Z u lnmnonpnrnsnunvnxnynnnnnt7x7Fhthmnonpnrnsnunvnxnynnn333*09vvwwxxyyzz{{$019/ v w o p ( ) `````a a'a7aJaickcffggghWhphqhth#l[mlnmnynnnnnn*09vvwwxxyyzz{{$019/ v w o p ( ) `````a aJaickcffggghWhphqhth[mlnnLvJ/31p,"܂fQ"܂HT5*]&lx޸^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.h^`CJOJQJaJo(hH^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(h^`CJOJQJaJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hH&lxfQLvHT1p,*]4j4j        Dr;1oxdd!~NTDr;dd1oxed/=}?Ezr> -Nk{djFsLy1 I 2\['g ' ( < H mB b t2 ~ # ; (> S |U $,! ?,o!E|>RscvD,L| 2LJ#*X**1.Gsfoh/"C1P?nq- T !S!p!"C"H"~n"#C#<#:/$R%#&V&%(^M(-) )O&)k])D;*=*EC*j<+`,1$-.-A/-q0-K-.J .!.z.i/_I0g0,1_1Z2H92k2q 3T3g465@5 i5bx5(6;6ZH6 z7B8V8L99M9Z9{::&:;q;";Q<X<d<q<6=z!=%O>I ?u?@<@A=aABi)C.Cm/CDO$D}D' EEwFG!G1.GFcGoGPH;He+-8Zgk)jAv'))7w8:m5_QYp *8X/RF `6:Co=Wlq~UJ }J=@AkX).V!? 2JTDwFWByM |)GP[x9ANXRhk<OWe6!%*/06@H ''XalbBHZ``k 4# >8`44<?UKf'?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./012345678:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXY[\]^_`acdefghinorRoot Entry Fq@Data 91Table9@WordDocument 6SummaryInformation(ZDocumentSummaryInformation8bMsoDataStore >FHJVFIRR==2 >Item  2PropertiesUCompObj r   F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q