ࡱ> 2Fe(f~'bC JFIF,Photoshop 3.08BIMAdobed    o!1AQ"aq2 #BR3$bC4% rS&cD5Ts6'E7F򃓣dU()8GHVe*9:IJWXYZftugvwhijxyzi!1AQa"q2#BR 3br$’Csc%4S5&DTdEU' ()*6789:FGHIJVWXYZefghijtuvwxyz ?㞯W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{V)炖 jfZzjugv7335 yLV߈*|FrL,x|OSWTxjFݪcm߳Ϧh&q 1(q3 (}B8c1 tYk%QSƷ$*OO'6{ T&>jYE@h=?5~-9rzx'2ªmsO½fc_?GuY?{kO~}ţ3.QO=;2L\:}~-9rzy_Oe^{shƿ˔̲/*4`+Gf5\{wWeWt^Z?31r#, ?? >癍(秞d_Ui>¿?̰G=<'2¯msO½fc_?GuY?{kO~}ţ3.QO=;2L\:}~-9rzy_Oe^{shƿ˔̲/*4`(Z7(Y7M]túÂ2UsVVOb0J\6URjE'YܢhJbV+ }n+O5Kh:`kџSYn1MV*豊(HYkZXdK,XHGPu'QB*Yݍg1H? .Ct0s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^z͞ E1PF1 h cU#¥oe6ܜ>yIpHe%*ҁ=f c.!8C$WGys=^s=^s=^s=^s=^s=^s=^s6ښN5x"meO=vJesW)tku$$pQUY *s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^bWnތi˿fd<+{O8}U|9u׹ZѬ΁ 263S24aaqJe%u4aݰd9Eᵺp %Ghn_]i /yۊ8?m" _٧a׿ţV Q{uH½٧aK?|n\|\) q\*U2,P3XbA'wf۪+Y m&i̛AZ 8J|^z^;hկW]m^zCz_l 8EV9SHMrXj@ UdD'i  vKrۧMQ`[yۊ8?ȻuH…}@{YZ?`eaW:+}@{YZ?`eaW:+}@VǬoDޡ7|Kcis&Rbv/Mf![) hՌ|˰67G|ؿf%E$F f=ŋ(8b8yQMঊz˝6uK \6c/c񬶷<-xs=^s=^s=^s=^s=^s=^s=^s:yj҈!P1.{j|8˷ yd檋+g_?!K}ԇ(m!I3)G8QgZ;]n+-%/Nf")=7=UGm6uBc ԩV:sYqNz+QU5N1%82ե( ٔ7yzv'nU7Wc1 ?mb{V,,:ՏJl^ +5z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^լO*џ-9w`l̒\Qi絛'3Π=^&/пgoze_WJzEY&aJ w3[ -7?W3`Us=^s_O/'+'!?ҹsQBvsz^_ĺ3[.sKޯ ?/OUG2J=^M]d_C9 k-!K^#zWzWzOZ> Hud$n[Uc5D[@|Zċ[֙go`!)fR+]Q𪾄i_KέUExΙ%+l.÷; ' }<H`A\WQҐ|™5P5'o-xDj/&jGu#U$}iww[ z~5w[G=tJs_A&YٲԂ$UyjviN!Vutԩ}-k2KRԩwK,^UR +O:*OhMoN䴘m yI43wuVwϟ5jw/q.q'㻬3|WW׿GriXD*f:zdvvttq" ؃11&F[hv2%4&xtv|K6cɳp}jZ{xҮ;T}!,6z4 I$I$H+V%$IZ<5{_UK?E9N|n?ߕZs$8s.tuA.1sُPƲ:zWzWꏠ>:w[OQ=Oza) %=elUw 2QW9'mYC9Ki<:T HQ@?Lm9CMNNNbQlB=3j\1NwΘh,m̵ׄt+ݍYhMztǻLpS*ֱy:gf\[96by8c׌WbxldFL0FIYeVL%vI:)5=^s=^s=^s=^s=^YQT N91_HFuqj,o~1w,UGVlPQatU(@dA 7FR*ec\5VyEڣJ(V$`BdH"z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^լO*џ-9w`l̒\Qi絛'3Π=^&/пgoze_WJzEY&aJ w3[ -7?W3`Us=^s_O/'+'!?ҹsQBvsz^_ĺ3[.sKޯ ?/OUG2J=^M]d_C9 k-!K^#z*+;D@K16 I$հ&L?D}&?/JaޡFfs@YnTTR:#QX) 72!xׅ#6Upu%zAwzF#ՏPLzk$iQMCIH))՘UkxqjY]e}nZe(u@'{W{W>a9c26,RTT1({y`vR;L8Ɩ_BێS P^ +*v ;QUe-+JI+HW4tK7QQҩzr3Qfz`$l۹}{瓭A)h8ƙpΒu[87L-ZYh\JyJs(Xxr?sIԷH+H c87lVZ:l'NȩxˋWOeBu.턎*2]=(^ y[GP֦ƞyfԢe2ʐͺx[}6uxs AaoQbOEQ|_&t}JTm*de X3cv.By#z7.hJt$!C!=~^}cX'Rs UzͅgOVW aia@@eJt eV ҭ[KE`P%J p#$!$m+uz^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^zZ¯ݽӗ/xhWu'qs< s\n xغQ+!>Z<5{_UK?E9N|n?ߕZs$8s.tuA.1sُPƲ:zo[ޚ= t7:f\#7c0OB|ٚC9{M+1R7fݔg{l[xG劌xA8VGS0}V<̔-rh"lrfySOκ?G!7WQu~ P6iʞ+uQhfwg &VP%GH=/SqZpw/Q:`E,C"r,Hu?Ұ7=Kioh3kUk".13RgV3 x%{[W)6Ʊ;z>@ O𴔷ڣV1l+OӿOY!SX0\aHʻB-eZҡls77O:qj'^z^z^z^r(P -o=[VzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWXU?Zrٿ%O n?U_>NgA5z_KM_WP;*?d?gG&g kzEȸTz}gl\,PJa^\>G"QrW9lG܅0dS7 %@TG,~ g_Lk?W& ? [Яm{Y-?οԮ{Cy9oBfKS:cYR ?  ׿/LgJd7HH+s+Fҿ[^r'CΜ4Ub9_5^QA$jpyls{\ K˱|::1H\W"JW{Wϗgloy.Ӿz+?V*+zyc1쫙f=Eڜo05PQPAyg8Gvfs}d~5U*CL@ H$ğ*S/ǦitnO-=w]1(\,:KJ$H\e3 3J|-bzx~ľonFݝ+s%{Aq/~z7~P nij.+Pf 'd0ơcp‹ @Ӏ(ɮnem,K,bR#ԝ*$Ě x +zt'>t9z yòL˱~> `IekXan+JDoVeK,j`y$O[~>h>z"vo_.x%TeS!򧮑ME AC] OOG m?^weV[ IU*AVK3c==xnFɹzOL h]DpSQqƺU! H W#V#:SQPS!IeBPN8&NQQ]fHAqJR$UAZzA:러V9^Y̹g*r/&qS,dWUUQRYUNU-Cd+"#^emnێ;F(ԄFFڸ2W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{V?7oF2KsG= |:kz4Bu?.9wT ~Ͽ喏5|M^!*׹{W{W{W{W{Wϗgloy.Ӿz+?V*+zO> /OrTeΑVWѢFcS*Tȷ!Xnpxs'^ ؗa{{kdwBu:F>#Q Oz^|߆+G]Qꡩ鮷ɨd Je>dPѬY:^|wOU]߉A6A o}C;mKgXNfUc%lvbq{},Za0~{Vw9'Jv!Bv״Ĩ+WzWzWzWz9.;gNAi%Kbe 74v;k~mO!;Hqaw+r+M"w7FՏ¥Mp߬/xO4똪{! ikL̝rjy1e<"u҅F6{i?`$dW]/4nRq~_.Vt*^?lA)ݞ:uE*ςc.>f;4S-j!Pmj:OdO[>DW p:'o~r?n5yXW[bY\s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^bWnތi˿fd<+{O8}U|9u׹}.?7i~<]_sC|-jBT5s=^s=^s=^s=^s=^/*%џ"wc\}7PWizʭb9UW./?8IN~&oYW. =8z^߫&LGyּ)h)Mu]CG-:gU \yZP$7~;@nfO%IQH'ҷ4;Z窷/*,|̣K6O^#;=-O#ϞcGԗ {CaGd5r?÷ߢ7|<I׿6O^#;=-O#ϞcGԗ {CaGd4筿F=]8?O:OO?dl5W|,]4PC$Vc` ,s3FK:iڥ6&Htqf(te^z_>_UK?E9N|n?ߕZs$8sp/ç|RX.**j'$qEfwf *$.h X?_c9mem-d%)m$`1$? ^__N%Tt1 k)‘N0`[v8VvϓV w# f{1pB;+uM>>@:鮲ϧN<ɝ貀ѶSr~CwO)NؑД GPm^(]{QzQ1Qf,N( T3N9Ecy8Aи6dոz8ԷObžW=\ԠSAWTV^@}`<},$Ъ$-dZ<5{_UK?E9N|n?ߕZs$8s~??D3*澌*cM$Xq2K,qUJ5h#X1לvw+euxvo[f- #@GeDpVs*sfY/d9c/Wf?Xm_/C){o]#'I״^Ѝ>Rut&SZoy0u|sǛz Ɉ YPE8TdI嶨m-2 J@ IƑ|׹{W/ZIEK~ilk*Y+a0su# 6JQ?)p?7*A=S@vavI |Cw/Lً' ZAǫmx\-9ĺւ'snZTo1<Me}JjqK{vE^-r)Oά.5TuS`9KrJڙWcc H_ -c{67MgPUooINYdP@zQ-I=~~}K`MꈄQ֌Pe14n)򡧢U>9Ccv{;״M-*Tp֥Ae3&WzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWXU?Zrٿ%O n?U_>NgA5z_KM_WP;*?d?gG&g kzW_L3•g-[~[ng:X^z^t_<'/OWNCӥs*-f}57+#kzW tg]7~wGt7v]֛z(=I0Z-d:|;I\yT5vTL i -L7Ԕ mwYT}eL"վ W=]0 WKضmoQns"Ab{W{Uy𞐿?_9N;ӳܬs=^/*%џ"wc\}7PWizʭb9UW}ߧu C0<(\b*H7>2Fg(;I swR GYgWiOӬSyX JgP t>螳p6pnM~NJٲ2<',}E +a(PD* J$\{W{W{W{W{P;׮{K/Yz(zw̫|K/)Vh驢[QS)RAANgA5z_KM_WP;*?d?gG&g kzW_L3•g-[~[ng:X^z^t_<'/OWNCӥs*-f}57+#kzW tg]7p=糢O#ݨ`V)*C(پ/q7秞a eGUWP.sR9(zٝrpr 6jK/UB6IdU}H=~͇\PB\A&S {ᖹlII_5tNWzW7_鯭sp'iVTI cE6!V*jmCb6"3#̷qkduZ `&I;`lЗt/ZP&OH? =<ޯWdSw+a+^ L{7eW_t{^%2_rf!_,  /KǬZ/wRW"`]-0[0R4ËRɈKNS[ )[0݀nad3xme(Ap'5iowxIUT%ʁzK fSs?h}ˈ(Oû7r%~O9ϪXE"LWX!WBۅB Vw6Ӿ](m8Sң L߆{e2uԌhMOYq8<*G]4DLŞv0#y`{[]?q?5*'?񤟻`W, <$Us:]s[[G8\X~$ȑC1!!UUA, O4LS4J$Uz z6+&dGԼ?̌$`pT VI&TC(۵Ʋ߳/n,?#O jzBvZϖ' p<9i[Gƶ 7s a#Y˹A$*x۩ZBU?uOׇNMU'U=UMYy=VjW Q(*0NѫA ӷ ݿ}rwW*L6GuzhVTOWW;U;IUU#3$řXrO~$&4!)HJDXy{W{W{W{V_XLcaLR[%= #:;{\W:zWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWXUrIuu6uq` $fԹav̑]#@Bۨ@&WzWzWzWzWzWzWzWztmX/N:Aq~|2 ASMۜEJDh5wk*X Sk J:Fe9#w7P%K! xFxi8 ۋTL'S{ȧ]E_GbmU.ݏ{>fWװV; ߖ?[}ۦ]_8E4\:f%K1${M% ׹ڮnS,ʔI>6—͢ ֬حun)VˉbxTb8D4I$I gwbK1$nx&k̲@ Sz^gXXP˕h+n uά咂G}[ڷ<p [P 觩/HZ쩊J&1*M_aew*؃쨳5r,;@q*>$ǭ#Z絝!յ)ʉ8;mY3mD k=.EQs{zea[+{S*fF dhqO@87'_OY%9&dzS6!86&#U ḃM[7j=sw9QMhhxJ:Kf|/uQ:)`h p+^k32|F*?.OlT;JSN/gc-~ Ϝ'Htcm{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{WbxieVyv7335 yT`bMUϪw!E}B9 Hdx&*JkJYAf]gVmTd}.-TGcj(u*]=i=J~ _&zHTeb7"7R3PSb9R7$ ;{?,Ȳ— P5YH; MkQr6g3Psf%sacٯı*C$5$6ُ+Zd5^Ukcn-@)1х{R#\ݗN#skJ<9/()rͶI7UH(:I8 sabe!.)~ɆUINQ1 F>{{ii&| FYf{1wq»-n1?I;?X 2U9.`?&e,4Ty{,ᴰPP@# zeH@U Ѐ\3SϭKqfTI'i$OYZ׹{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{P[twN\:%Qs&=a1R MT;"@] O>* nyжeo *1c`I8›?OWΓ8afHk\p!.- IL'?lˍ [tYOBש^‡B?U,ѦŠ›YiOap@,s{U(2OH0RB J8T[UW+&|+} mE5F f[( X< kdkܥ;qПCs|w7e]Khgr~4oSF0 $+|h7~p>7W?u" AQ>Vv#My(f(1b{XloEW;Iw lufQ}Qɽ+b*9w7{zޛjW0\Q.#Jc?XV pEs&X Mo}-SGF6A_Qtο⻝ᒒLr@?Ѱ\ ZԋQ8yڿ(o}vuhdYu^>ꯎ?P׫Ēv`+G/mwj p\OLA6zPR}H}MOC:=^s=^e;?V?f%A jlƺ̘|\4df*˶Ic$md'rsw7)۪#PFfQR+}A_?)LJg&/|F }mV*ˋtm KLZ֧)}7Vոzx`xUXPd6?_*N؁X js=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s"ܯ}Oޢ193?Ba291ωZ*we*D(#yʝLo`PfWݢRa\o񵖶t ʜW[O|̄ kC{Տ_cu;ר~u5ִC<0&xh4\͹c],ɮng96X <rWY Qtz׹{W{W{W{W{Qԟ=lSxe/[MÅQHl&1 3cc,蠵ٺhݦd[iJ|nmyj#6z[ aE7JiQg R&ˊb&T)tpė,Dqs%8`Hhvqp>XIG}~ YC)AZh瘐-*#dɸ_N?9fS\2&`?HG,V$+L Juoϭa>Xب-a˵?A*~ N\=e`DWqU#blO p~>DjVQ𵵹[n>Mc>X\-Zaڥix?o-Rx'Ȩ*+,՝rm>0Q ݯ89yj,I) mnO4+7~7?& Eh+߅nMj翓Z@Wgwr/{G^n/ ro3VG=C;{? v/ih)u J\?Oj?R{=tBVPŕ=zM.PkܿWI86AWxFjYx2(1ǽr.V4Xe6x-&^-&CM %4JP(@ % y QZI$v5{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{V?, T.Y3?.dRDf0: *PWw_2B }f8fw'iV{i Ak+yc H5.ڃMzM♃1:=6G%[EM#_ x%]nٯ2cIn*q[ WΧ&~+#Y*Z!2^V)aB = ;R3MM\$҉u+,М)MRku"bF:{8eF{qe G.'C[=-rDBсRnM:֖)p:` 1 b8FX̸sY{8e|NjTnSbn5Fws]fjizI F;@u vh-!-p_Aps4^wW4jdc(+lɋ.t7V;cuKDUapUL#Tr@Ü-ۍJ$ +e*;HBg iM{W{W{W{W{W{W{W{VWJ]<1k).!e,C15 뢽͸\Lh}\ ӚFT0RX9}r\ۆ:a(X{ң E[W۴gQ~:Nf˶`er!SԜ.JD@DYP-6-]#q!^R&=6QFafwҶ쯡'#wG+"xgKdlj7tσS`smLP{xTD!yW_T27үm zF3͸D5ךfӇ [rpS-6ERy٘;[=9.ٲ\BL F11 [gh<~B=7~'>^u nq uC4uN-6ZqIWf~%AM@Fwl)- I)8z*~]*& ?[Ҟ`IJ^zO3+dEU*i'H*p4PʌvRT+pVv,Ѱlv)d$ |Du1,ZTP1=Tw)n7瞝Qʲf g(M=$Ave8[k"ul(nf) =Vhjj#׾zgTԼ#?ҏ3`q@&HeQgd rr;̹ۃ:2fm)'7}#LK#u#6e&!YJ3ʍH#z:yc:<3T$=;ݞ5l8%-Y H"̷/VT8 ~{Sbqb%ҽcXQ% [_6]sټL6GT`c&ӯ?O~r}Lլy, ERPIV,U4m!G  ٿʟnSkq'ּ8%yq.+XhZq-US&Y`ʍMlwhҜPvR(0mSjs)Xy*3X>P f  Y/:Oq2A^?!CA7{FR`!*:q R+3}&u72GNc8ϱDTCP ؍l0vvJ[KZi~вŘ*)5t=#OHOX'Ur6&J̊hJWp%N5^-\!MpP uкѭ'cB!_IPWbš Zڂ  PIt@ 6P$Mx/93wzy)̲#* mrŽVOC=zxՎL =9k^3KJoA2Jv.ь*i_18'=\h٬vXv}T}3~7svqm4NɘpRackV?N;5)(l)bBP ?뗫G}A)r!tx,WGU\ub)w_wnPND|.vHFst 8Hr)A>*f\"_6\|GyO ,U{ :F25b"/2zu ،Qamm?wݼͦRH-Qĩ>ޫ7ʰoh:<]xsΥM4r0RV:܈u60>Gaв4N:ch _@W_}Nz{>zǗ=jYkF 9+ixؙPG`5""ݻѥ8:DǙYE}lN$ujs)Us`y61!*؜1Ive;G m-sukiny!?ꠛݢe8 ~qI ~/IV*'M=.xyPu muOK?Y̾}BKb2rφ@&Y0b*JՌ^C~E˸YO2L%>B|=ⰣѰ4rxjn*祮],3=Mό:308*Vӱ";XYͯegl.-X+mS!kg n%C„L޿=zŢ6%黮8oS0ŇԊq\6"Q+$wiik9ܤK[KA@h\81OHҌ< -,+Nݢ&z|ξ 5jռɅ 4$ 6[US{ML@XgI󊇨kX1QOg r->+,ӪIg'=,jv\QOv"u[^}7o3IނG36Z>c𚻎>/Ovt=\uP 6TY/"s.|r6Dz o[j I(\U*s=^sT3t[_:?:y;6fi;5[$? ?+9}S*Oebߛ1S{WƋ3Oyt>7&?f^?˜O0[ UM]k+jJj*jʄGWX8Գ;T tƔ`bMIdT7^/5_R@8cu.Kñ,6?apY?}>kp _NJb~Pd'Nuo-`\}}/TgU[$}H`lNlB )Yd Ѽ2 GQ(v^֬s|zC=I`}!hzwE_ʩI?5oar)ǑvYe.\! H)&=bnX]Kk߷Ҭg j*jʄGWX8Գ;T tJI01&LUE-9o0zY 2v>  l@ZX(I'W׻떰`'Oa1jڜaKxVBe\7*ox_N ?Y&ZLI˧O?W97ԽPXX~X8Ty䐅8bGcc\-r 0T+DQ ҕ8|pճ+0tp 87Ar+"4IN#~}"zJ3fiÆ-`x~9X8qL @<]l{ l.!& #Ď-೴XKH?!P}5~%`kAPιsMMMQRMTb4IkaR_޽ >s%)A N$rⲻYCK OP1b9Bs4c0Ϙum2Tmb #ysÁ'aY󊽢-VDDOg•? .c>3Byp+,:0=# Ձ3AC#Pc@/*zxx׮Z| Ӎ5VɅό&LFiiL{٬tyS`cƐZܛ:G_L.?ɧi/GSUzцV1#ʽEXm<LUPSa%qDlt"< ͳVVˊG݈3GheY%i ٷZ"Œ}azmꇡ/T:AL'i)1:4Faī %qJjg'ʙkߧr|֯-NH"MͭRU@'5W,߇n3oe |/1MW v_AtԲw8[ 9e[j LII@z,.] Tv<1 JJJDyju8K31U@'@8JI01&;_ǧ^-S3RɔlEe`kx%)Y H`|46r>wh`'G^ ^Z䞩>񇾉O*G͂V GYUrMF[ܠ۸N SϼdL??I+.W~4iz/~jr(o8JJLbrb#Wv)Ps·?B^FV{Ґص逸# ׌irߪ\u|49+8 Vm yu27NV>+ܳʡ(;NսχF`MV7םS򰿪8ʧ\Ӏؾ+;<_7KPwGu;]`~zsw7\11_D`Ou+;?Ӈ+K? jC,G3ZR#_Պ^zV<3)AJ*BjOb>bPAð3#.Mzic $Nb1e.dK=UgI$9yNQOWu|[ ʙz|>r1UbӉOiL0_1k5s"wcaR=p)>u(ZZs0VWᯟ PT!.9>S>؆je*V" b"DYJ0o{jf}1'Bt30bp8H#fu$x9ԟNW~zF8z%GaPҥodjtr.}ܢ(BJm``0p0Vav-H.a_ 뭟 ,LK#aǩ_UXQXlW)e,q8)8j`A^wOKp[ {OH]J%!]l;}C_W ~|_#KC]]. e|.X!2Ω=1G#+%p쯴wkľf8``|;Вu%[͛G-?SWxT9+X9+N9H)I7RuEcj$l$碾Z`'_]sRC]p-I׻IU_T)hp>+ʱAYV'2r /Z $'5wwojYԵnW/t=]u33x 6d!Ke2ia;`g4*OfN\bT z 5.坙%_QR|ϟB7^e*>|UX'RT؅=nOFRcxDV")&vC۳JTP$ 0bL8 $7ی&{I(A'UJ?TRO_V?WGCnqܾm0t-,7+1ҧi[mrX\R#۷;O:G8W;TJs~/ե~BG4KGue`AsvMIJ!@{%^P-6E|l9jĪOA:A[V=4-W3U|5Y],P ̘ ЈPJ^8ϯr-}A=N*! a'b Eb`4%('i>Vk%; 7fOsiAoݭ#?Qݽ:Q0ԏi'5@/V2wB:KԾu 8)3UZ &JV%$o=՘s#(޾EBVG1鬗C )}JKzO'كb\'Ϩ3Y0l*&ڛ"gn6Yd)cĨG0d3.8p8>}5yO' =_t;*Y o?L"=;0ǏŠ:Zi VBS VvM@L8E gͲyE)V6Lv'%̡P=BAhCXtwvn\*M[SA]a$^fV W-50EhGxa*D QVӄlS]ܺ‰$8lc=.W.8ϓTKlfj,NL QK:#o)WUa;ͻ6yS Q[=hq _U΄[}Z28H>8|X#p 6<wYs@ >Y3eؒWgxYs 1e4JƗ ].ב;3ndLO*=$ cVozuÉ:lNqMw^BCy+]<^X 4;LSUԵ+U" F Xj_PwYnb;$)J"#a&qH{W6|X0ì㶌L?ܷSҎ}͹?]81<{ X#C`8XE Q4PM2V9wEb7%5RYz)$ BLNDF9gaKd` p֒9 >NLnܕUlTxtM[A[LHH*GF2YeM:(AAuaCa7>cdliS~gG2cSWKq{H*@,w"o,G[G eG|4:H>5')_h9O?2AQ~I $^cni=-f #ԍF C>sAUS#I)ic-̲WKa&W#qh$Qd'/+G:]V;z|J u>K- ]l:!6dR^{ iOwl%Fc=uԒe:ga`?ûgP3&{12 s=E gI%41ZwIaieecoi%*Ioʣˮ;H="#C<qJ:yo3NZMIJ]qB3/Hn;nH I)A$yPmf`_F>s=^s=^O?gKWQ󧝏ӳk mQԧYk7짜r3u&."q>FbyTw0K^n'1r晳HR$ 4Ď&7:R0 caՕF 6uDDwbv<ڇi۵furH$NfO ~Cٳa%doR]K:beŎVUi °ʓmh63Sfq}P?銔?jIwB `diwV= zϾzc9t p@-+D8eo#F)/Gzmsl}1j#Ͳl K8[qyҗ&koBp1,j1œב(sȮP}3&:Yt’6%{p c0&-UݶYt$:|§sg?N} \W:e[isoWVN%UPTY( =$P]I}2nUי8?f'h ;KΝ&&z/c8C%C2iԹeO$8e9z-ݹ8$c#&Znv {ꭶ:a !%ar(Cdh]=̃t1K4*Ҕp+_UOwûFO^>u(vZp{_W{23~u+W]|8KYF砯i~Vy%Rwõ[MeZݼa@A۴mw-X ~Dp4"^s&e\Śgf>X/X2D~5tGKBm r:G ޤ#*_?gLZ xĠà\]I?Q>~ +f?Ŀz~喿4E|ъNJi~%:F=(`*ϛZ?;°vmq>W}ۻ k.λS^\+{vUg+x_-z4LcY kߤ?[V #-K쳴5 NOOEC{ѻ^Kzȝ:MOqTOg?`1uGa?e { HXo;Zv¾w2_!Zp&bvzS_.zlj7ȾWIJf<+Amۥ IOK?>.TiRU@RCnyL66=4NSzze9[7sz)LORb58vB5d7 n ~79%Z<CdJZ~^eKPt; Drd JGGg͘Kp|6zW/^ǰ" BzCXqxh2_T;jv$%ҽ #I 8c\U25@>٫ ٞ^C-oOIt3do𯘗:IX_bMn++厗/h=:ߍe]Q𡧄WzWzWzWzWzWzWzGzvފ??$Rf\ɻ z8ZF9ϙaB[RN$<A'b<ҾT$G 1JbAffc`OaΟeD{o_ɨ`YjlOgƱy~ZڹU 9]6ΟJt<)ywY! cq>/SdϊS jó5ą|p V`mTUR,){ +x%)8x A2/6ga}+Τfu7[ }118ElulE!q4}fysWva(q%'Ȉ5[\)IzW۠fʾNde^e'0yW,V:sC)-Og;}}ͨ#VUXݦᔸkGVw^&W4~o5ڇX>f'k-U2TIYzu bCoٶx3Yq(M~䯁9YZAºb.zS^JU(Tx d<"C(,bu18DVS@R=e΍J ]i*Et#=,7#w3ʞmZJdr{]! 3w:y_*ه̣*Xe+ڽGRgB}^BϦhWpF0Èb=M@9% FAnGӽS3vРڤ'"Й[! m'2ƢBƱa_X qJrd1'Vby-e-+Np=59Rʲ[O诓:X_H/LNR/~q3'U3Vkij/Lv+&L w=K1f=>]U6)m 5i?έЌ( TI>VhwZ·?ݽ#y_Jй?1VзxyݨӹwԿv?[Ž3)? R48 ]Jf*\Fa{$J#{U}>Xh뤁@|+PHҾgc}q0t!/ư=>pDhb*nm$BCf[LkvCm 쩹)Y&܍_>K*K+ͱX! RL<$<"+^?eS)?gxJ +®CǢzlz-fv,\;Unik***hbRU*_js!/H Dzж(f[J#$jNǮ] Y`tx'68Mv7'D@Q(K}qt% >NAw+ RHcI*􏣙.QvE<)==ӭ545'j揩 p IĘN#lъSt~#Ni0:# u'`L @<7/wH{^D=4{J/4[euq~2~ kOD%eG9<_㟀f5-i Cuaf:Ph?_~$ ?_òIE[v=nai Աq/Cmx '˒?2[sjl[q>JͿgʦڅ{j?U].%A0'8HD\rcW!e41bۏ},_?{/eM{n?0a`72MUK:ښf[F`Q$ԇS }SaJi W=bP׮Ҽ~y$̏XMcǽgn-YN! z$ ˷ YTOleר09.cmYN(y}{p(Щ/Tf]0ʵ#Uu5rUM.›SJ ( [̹ՖWz8jL61dnbR+6,kXOB޻zzuŸ{=Fj4>7O TqC,i^)ՔYXmȱ-tAl$b%Ο{kn+ooOoN 7ǧl|fMSA}^i#l.:\}--lC@Vôu` OV#~5a[|K.8-4 @SGMj$@!WĭWVnwfLq&RHnL^,>&^/zbu:z1[㦇4e |B*6Y*.ʃq63̂Et&cQ&'lM첫kbKH "gpax3gXMCňh_sgLjQ%]GH:}3+5SP{Hx1<>I_Cٽ^e'RO|}TT V nXeyxM4:R4ОNNކ6:$n)GH>̓{뺱 ]SZ^U`+0ygjpnw7-mt4j"J RWh+ňC뫘0uxMC6+TJ&Q:AyT!#E}'|ϺC=z_庨pL%d0Hh\ UrdsK$m#YQv5eՂT$DRz8j)ϳs p0W' @ub(r"}9B?ߓ[;†~١m).mK sU(V?Xy-Xe:? xOK+zWzWzWzWzWzWzWCU:Fg2}ÆgUn|a?\7lVyLع,x:S*v?ͨS[>gg|kVt=F`8|xrB Xn#bpGK"^bUXݗYIɌݽO(AT@JmuC`$f .*<_hL[,Ԗex<_)YC[IP9a xԐAXtXZ T @ L(:A1bo2aY1e{Vzz'TxУ@Z)"Ahh)$V?_UOG@Ǐ_1}1clNJN@}ku ,9S[\ӏȀ}59vk5SNL#د,wЦňho? .xFou];><59!H/W__C_]3{UC}tk_*X8&ۿչ?順Q35!3$NW_CCs-⋯QUDsk_*'Ÿ2Kw.ڗ5nZ|keW^*rϠ_ kVIfңU0auBow}߽_2VW[; ?GMrdP=,e2ujXbt8} *eye¤hblYvŽ/%($xiC(mJlODZ?oY883{oCc&t1jlkz3$]2 ])JTy`<,BcYlI$ߐS\O|\QWG3C!aW:X_KM_WP;*?d?gG&g kRV[o12[Z?'Կv? SŸ2{w.ڗ5nZ|kyR^ı—X argx2M.=mR?V5 k .lB?jg Dp#:Uu}71FaVǩip2UDqTB€#aN5V&? ~896мWi?+rY֟įyoG=f}<ò!Yx}~8e>:j䧞8% #5h+pOۛƌ @*040D hxZN\La8Iz֏TP}dPu 3]ΰD])a-֊Q&r <6m<ĝ$ko޹p*Q[j~>u74פֿfK(9jj\* 3jy& A,vsmx\ I0:D&gl w{e.*aY"*)OJ>ыt[ҾY3VC2N0:erT@@;ji~n.RVB`Yݛ V[lq8&kΘV6[`Zz%.+*9>?d1kH/Rs3keA`?W?%`|nm:hGƷTZ'·?}#yJϹ? 7)by𞐿?_9$vNn;ӳܬs=^sT3t[_:?:y;6fi;5[$? ?+9}S*Oebߛ1S{WƋ3Oyt>7&?f^?˜O0[ UM]k+FK(SCeяجCx SEOM(Cjd v͵b<RNOƾ13DP^jÊ !p#%έO##1oxI>N}99tt(ζ:=ԁZ8¹J)mؖ3U\> M~SH>fқJJT EC=wR?̫fųrѓ^/Sk4Y3bZ㑒0ÒnIkun'@+OU7$} L?FG|sV.9ۗBjҦ1=%}\r U29K-̟l8.-'aJF`@/fVͫJ֐z wś^CYw$̴yg:ώtFO9C=YHc:?]ҞRjiLYYVDe\mlͪ AAD FTŷD({H2YَgDyE9#.guj%i\:bO|R%U7bgvhFcljҴ$fUxyFêv~GYy?G^/mB%C,G3@%6Qį3`2"O[p9_~oHM^],o5j\Ĩ?*O*I٣9(#ʾ<F#EU;bY pyqX>U馚rj|SʇCE7c򯙷:7X_@?'/bGW쩋'原.ڊ$ 8YE=%]Zv)jsV7y);B[WPe}:m: ޗ l(_Ymoy ;W Ϳc5 #O ?Q';*.ZcS_H>sҲ~/ħNGdW=?tLPQgsfclEe3SQlġLy,FbBvJIBdē3.rma;q$ lu3d\:knb=[ Ҋ#%**vxժjڞ]#D*ڧiՒ\)넄&`a$lĒ@{uiy3)~u݋+]"1VW߇a?˰E6>wB\ B@Wlw-gjJ {XSMw_]ȝ+x7MN LFPp,# 4W{W{W{W{W{W{W!\gޫgIpl\dzn*mO4rWT=$G _S{wa+Z@&3sp+V H$Wg]GPf01bU!s"]TS#:hvCPs55jB|b}N'α[1Uu[TIʷzS8MA8_Z#) 0) M\vzV=.Yp@֯3}@䪖{04<'R{WecM>JKf9[C7NCJ_ϧmT|vݩ>çв} Z?ޫģ#YӼDL$(d Rci==pJ7y' Iٟڿ ?NL#دgXMv#O[ t+a ~wd(ZW笇 ]}ޗ=v RGU ѯ%|?;G?c_ܘ{nVT-FԇϬ:]= ̶R.GUͯ5|X{_[ ~Q˼<.ܻj_qkqOD/\w7ߥ$W:*zZIQCU8?zaӸ>Ѽ=J0ӀG ( ꚜ&UJ1ZNG}kҞgus}Z>ه0X\3Z"ԕF3ɰ(%'Bzpu C.b8=6,% n4Ix5S?^U5vKj:G$zG [G~C_>Έ,O|Bl74`S4F$OX&BC*dԕ 9.smZjmbAap]rۂy @ޖOO:F ӭ%CUQA?UOP*Y|rd(c`WuiTR I8# 3oշ´"'gLуEB~]ߨ{X 맨,VyNUb4Lu}T0AyaGpUTRns.鄨j"T N;$KjAkpìtY۫(tæn8gRYK,FeChNrHga3hžyA-I&n!TL_F__L?}EӚ5̙<3b(F#QsRjEH'Mn~җ\\O iRSyL#q |yǺ9_i^ t0|qJj:6*ê頒ZzGK;],7=1qVZIIL6Noŋ+BQHZ@~3'@sоdWzϕTF CU+Vյ+EFEgP*쯰Ż^fI 4դJLA8Dc4W;n 6ZׄJ:HhA BKIK_oPj:oSb\"WAAN>KSL:1{6m+Ĥe(@5@3r7f_)_h9_O?2G=Q~I I\OO7_U?϶_{oP[ *j[q>JͿgʦڅ{j?Y%=lduM-3>YP5ۍ1ҏ# ;E7"]x|՛ \kxΨtkb}<8ʂ|I`^j:]IMUNU&0$G #]vSs_jDqN bq[}nJCՌ·_K2Fi:H`Gx~'.ޱ5 O ~yv+9[(RY{%:dV_w 7C1u rLK:;+ fz=XUSNꥶX81ήʷ nReJFFq0&*ޜpH<]fG38dWBz)#67:jwаY1ϩiҌ::xS$N3Rf Hq?!U xj;_j!&zX!Me2,VҳYF *rImZn(ԢT]e±|椪: 榯I4DrFcFQyP=Hjk[@`Ș12g pw%)%PAqS:W>#YQ?}Dw*w Fg [օ }KKl)mhY~!BXe<:Y:[sUoCSj$Ī1꣆xWT&U{r8+R.:!816 o|-}=?X%#PQdmYOt%eZ̝rFRS0X_$0; H)iOb}P%2AT:|f9sOL|R[W U,wЦC,G3Z0//FzYꃦyűΎb bxSyMY)+*$UPU>ZE"Óno9f  A`.Qip? ۲( ~}@49udje=MeuH|Tf|K-}=o;6u3}RG״ JRz? Ek)~3 z~EAXً8b3>>R4LRCQ6;k]O-Kda]߬iҙ'a$&#_MOv2xUU~󏯟W}*._'5UXK 43DiFhEr5 tzd뾺KCgGt_[(ҒȱRċqGlQ@ "{Q;8;@+?_4tZ˝6uK \6c/c񬶷uF=-6+>ij󮷲ܠBR1Ͱ;j752<1FtOZ/}%MH:MCS!r,9*,FPHk;([/3V:W5D8H m 3Mf%Ǡc[u3*iCsE%+taT9K@88|ϝoC'AOVeu!9B7PVbUcx>; EM6/ KD|:Crܘ3hCpHTF5܌·L$¶o:z'L1];f\g%cMUD՘mwRL`ތXxt(v1cۼ4p(H0Ck#eJtU)PIZ_5~tRݺVV/9%_{u 'GCO e{W{W{W{W{W{W{Q\{ èP1e~GM3&^4i5 5t5S#C:,ueǂmU/MSA&G]hS$mcCTO'l0Tb?V}1ѯNzhY$z|K Ji$yemɟqtβV2dlJ@J u exg6| R= ̩OXCS-Lk}QJ/ʭm7G&&>[3քG2Rִ/5s*:<W;!(,Otp5}Ik`ҥ{O)챰h#G𭓽+$M-ɧXw|C1c@ׯjK" 2Ɨ#gwF)]5!e94<6x?8 L >7IQIY็#YU{ )RC[ÙaX~Uҕ ;Z~`(D&}HLXFAH;fvDF7%wU+O[{1];RZ fe:)餥niVlQ,AMEܩ!Y$q#~[7h}A,N ꝥGGvv$ _N=]YC A4&j=fbzΘR:_J4TKUe; Cgs,SOA5)vbLpլ*,#ȽͲC7( HI)\u>e3MGg6 +l=UA U˜*:}WS2 mL~mm$VBO` '.]1~u ptZL<+ %+M2" v3*R$u40ȷ"Axc?y+ԏQ?Uaӝk*q ̀a8YzڹDS/59ً$u>P b_Q]nB_J@ $Q=$ ۳K J gKoÓ.]-M3u_>LV/Rax^ m&&jUS6͓%{h=] ,A&JiFlk*P p7Oߦ^[@鳾ceɳԄܧ:[ԠL:(5޴y綠Q͙~y <4u^tH EvyCO#LĚYۤ\) 'Pc*9P*玚guG6d GU^Q5V y6i{:vv[L6'T o1*Z#/?<} 闪n=_22|~]: }ȫkx \2,iȒ5OAXI#h9>Y\Dvb뭀9PWzW]OUK}CgvsP2i+&-xceM$IH>o MA2v>9/acK +b4ؗ*g7ҨՈ:_;c;T0h@BJffOM籗:V(#*жWVw1v_S!ƪ*!Gfi.(\&X@HeUE(j6 ~,}'>{Ϲ,GG5P: [ML^e:7'[r&KC((N1OzhWۼ\B ŽV:E1Y ?O3l&0,V**}UрdHd`H n4ouj8x7%yqkӿ,(+iaxO0^U1 3Tùcۙ#Qfl &=AO *9fZYGQ(4,P%w& ʉ}JA8,_k8?e1^ 0Ǎz45&K&?yZ\"pSE\0ѣa{;#_6[JmxJ0z lPSGNp> °p/ *|7 !qqPXsqKQRԀ l?Z]*ר $J*#榮1x㬠h槝.Fe'۱W=иYB ~ /L+YHzGu 2垃/fAIf , +=)QO|j9쵢eb},4YTddH ̈a BPNx# EO`Z=*:maY_^7*E ;/ֲja欮(H!w{7AMhbxR}4uaٝf]Q_V>_3Gr>\J^܁i֗-e " 8P*,ij1՘bI'7o)V⌒LRl!V?NL#دm},)W|?NA]SEQușקyS*hh"H@ARp_|(iq(abRR|~'scij_QXB(+y Jj| P>~Q߰E)xI|ȅ|0K+("G;ÎQ՟[RfO;˹)(-^'T O%[S갔C.G$OR+~ugDށ=2~4~1uWfUN#(mF {dkY}s]cbF Hd$ԍv-hDNIzS/KP>aErl"Z@)cxY "nFf;uڑ$#g#EEo~ևF̈́mU5 ZY XQV.ڞ F[OdC?Uwa>;TԲ=~4_eNv1;ԯLQ?S3KOͅaXNPeٌѣUe,fIoo\e ȓ$ lGF8ȷ +T Y7;=0|-U,fl< xh3&gCc4CñiސS% E6";C$TiLxƆ;Ӷ$' ©Y1eq!*秒 6qk*}+h Gɹ XVVOΖ6:4y<0Z ƻtTIh {)WĴ{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{VG?zdNcAY_% SZ1Y}CInYFTeSᇐqJ;-UgCO!XʐAJ.6$t_MYof_vRU.{GP`jWHGbxqރuc 6B\ o)$cKyOIX@i;O'/բzDg?Zȝ&xTq ^j˸\!ji*:*ji}g3eږ$ u 2PJ <>7 hT~:ׁ?È<$a-DUo[ۂ-,7wiN62`R(1ͭv ҩ>§? ̫WWE2Sb $`fk]t4QQ'${iyzLy"_yZlўU¥za9WDIi|~9FY#~,]R%ULuڕA@N}ypN]tFr1WUfHaAy$\? g;Ӊ#[7|$D`P*;;X'a~nuߣ^r)u3N@+365[  + "CiG JERtMfmS :IR[mѭq5D}PD/P>DzWæu \׉`I_ n~w9ݵԥRUi9r 'RGƒ| GG;\> Xi%|uf?]}/gYWTNi$?OHW\O黮^pQ.եN iAwf/=D%iWG"-9 ݴRB  =T-ʷ=&!Pa4خ+]QbU4IeBH ]ԵI;iJITO`r/Uq^cK4xOR, %Oa K| @Yl20ҀT=@meV{ &qs `;ؒ9%O©ry n{p^~ݙ+nOƬiܣuNbA rTjuJ5seH^$Rxn÷+AqMwKgTz`]1GnGHV ߳WȎė37_:ӏQ*b=pIcRK3k?6_owV-hT%0Z{( JCkqV'? 0\FW:_3*.B=nE)Zh٧WGni"a:vpƬJ<_<كǩJ|c+d|:2imCaD`UK{~fMvO(']l%z}=^+Э=J&.ⴻOQU ߸*E]mcrAp|vGA+?._æ??ṚiDcRzU ;Tr@6ˋk\yLw*&v`O ZG"a]NQn jx}>!HdUVx]fM̉t:2!,&|p6t>m)'G˘zΩy_^ >XtR 6cofV›TJ68;h2GNvV?^lGM1)1uC<o&SOG-FbTA#AT$e*VOXqҒ&qEcytqJ$UyOHNGzϵ2؞UQ82*!q8 6O8kTZӱ-g| TҘGE x,PxƢ#vOEnE"\U&-KgZx<˦/k{ t&>RO:bp#l*"~[~V+,bޠb='lY'`4X &ϵ DHvM}ː-:a#|:x$읛!;1`ΝE}e|_ a=l$lfD:Q/d#t7-e Ԣ.k1LaKr -Z&0 >E({z ?ϖz׊n91FY?΂vbY$8~=L 3.-z2,Pbٷ+F{Re*pugP5&k߼Ԁ۽HV?a4״lc&sOXf ^'1y˞ S-E9mţŧP hmor A I1;ޙ\|VON#I; EbU_rؕ2`{oVIS? ~891мWi??r/swDz R\:_l }.*8abIS-|a v<坞Z0[(Q W18˝eGIN͵MYc~J\?'|JE3.8:DA'MIg~4`=’? μ3(b3zűV 6?`Ԙ~b%v+MN,$$p?xKJ^ovI>4ôi$ =褫))k*&HEVA(l"EHkuz^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^[`z˞0uԖiT ^)pbA>D WY,0.W﹚MZ#kq>Oقmm$O=N%Ι1u 8191۞1:c4c31ijNjfrnKI,O:ghݻ)i@Wy8bI_R/> N]0Yu2xضn~S-*FE?9>O*П$a#̂Z=?-i|>C4ϩ/N™~fzɈs\c3fNoͲf.+.G)~z0^n;\df K$YGRfYdkQL~1ntd'0+veSj #kkbIs`u;/.fvtCvGh0r#&[R*gyKzSئe+@JԮ'P< vX߾7 >:#4x?c߈f@7Qٯ~\&S˽5S)0bzƎIbġXcn%-lW贴J{ŧYR$错&GUnN3~ڝt WL?ўyó'C6TαfO>H﷘4NE ~[S$)=#el dh5̘9~?S%UTPMvTyru$gkϛwAi*"*q B;A9z2Gn{Ȕ4ͪŎUk$Ѭ&gcw{l;[[BTj<Yr* _8/WWP}AYҶi0!J, #54d"(Ս݋;3nZO*=$Xf>]p}àyVѿ7'JY ՗_U=]lJ|,#*gQU=LR˚4D*3\h{|-cdjQ$8&1RN5ͨ}N13mKYϤuOT9zpl~1c4O$0$S*`n}CfM}ƜPLɀD@"v6l4cZ&KbRv1Z89ۤ)/&g܍_M,A)A,R . ҿf2BX CL> _[L>hӢ3A3O\垜<5y0Tfnwl8'z+)2=hՄ&U?RY9vWYEЮ4h_ V(kjQVJgtFw䲀 qR Y$j>շ ܽ럣}Pw#t2VVR"ϓpڎ HLv/vۻ%Е !3$$ `U[{;z碭SW%keb,>ԲK0\Éyc 5VX̱qnF9p|88*c1})X%+&AF:|x+ҮtQT͇;U=4&uxXIVj-e'ad)RPE}>O_?w{&e^* d0̵X'9 9SCR''yAYyῳ W0>cƵ2~&Y76g_LQJɘçxD0ZH-YˮOw?‘#Fqu&-o~U!|% NTX:TRLRP#* [? #K=vX u! 1"zd &@Oumy3N$mɏXoH3|pm+]eKT^] }#$hNIh:HTgʥ5i@*GI9תctX1ӊ 4]O~_Ly~}4rnb9wxЀ#=cPsL=#ȿ0oP:ޣ0b5(qzӔpʌ:i\hDsyw b7ԞcpBٯh#a3'i5-vq8jp@=0>ի֫(=ӳk wZN[Aa a0·})Q=:WWAzceL_v!g I,h!Cm(+%)Sn&:w-  !=dzVބ&f_\z5{+ 꺟M/^R^Pϋb~PdRHcB̭ޖ\ōA$$O@ơ+UY5iV/;Ye`ه 殡qO8cur.A $B^}F;!h@<4}Mw%0AQ$ev ~}@gvgqu[ްRRxPJf:@v}`A[>tsw7?s&IU/ p|. -d!u1by{EͶR$q${Unm-Z 3OOFku5QV?i ze~[gvNZ*$q>J?܍m:hGoPW~#ٓSt\'*ڬ|II G,7[ϳR_n P'Ozho_E:O=5O:{3yOsW:٘)p.Yűc#|Irl̯%Dé:\ծURXRe -I<ʩk[I}NNMmTc*i(uPMGre׮Ws&% QcK&=q:ZZo>Z)ecp3cqV(HtqI 21(!Sd;A-m?SyS sc+C%M-R֊~ 10u?)_~ng-[~>?+kΰV*_7ş(ྥOu4fH=DT8/dH(hŪ+MCФBRB,9l }D| ΩTb*f0!轚 <@#>5j^?'> ubyr+bq^*i0V }c}RfHe8 J ta=4&߻=ի#hˌ^\ ư:|6e-=U4 :̎Hf/%$"A5 -&_GL\Z? ,U(Qp\"I(0w]oMac؆_y?K\`?T}E=f[Eگ=Z~[M]8Y0YձY\u|JI"Rou$rw}Q?t ))!?+Ÿa 7w-N>C "D"`9bMe h ʙ[~}X`xwky5;1eZ'Ҧ[~.xwOXڂ y?T-~]>?A=Uzdoă?d6B\/$TLXqXnVuH|Ӊ@yWssOQU>G0kCgIkOzrVa/̴ILH+1,?hIY$ӳeV.*'l5(&ᔄ;TJzpzQ[)%vюΚ$?Ws?E0lS ^u&a WQKS,rm`G؛F}vYRnK̂'Gh ދ Nv~+#fh\;ԇ,B]Zv*Ux9v׿1=ZZ8: P>Tcڅu>XդziW1t3P38UTK$e5IO幇 *ę%|wA1咣J@Ǖ 2̞ 5iYC5U"`%T6Qp+ ff&(흷><;{VN18ЙfN@+~}j:2w&q z'Քg1y)6(Eefތ7cdvg=Y]mCkG8Da1x}T<aG(׫o%top^ºkE5Nյ WR0J Yvvh33*+3?x(Ȃ1ԓA[wb+CQ9{oFsgC%0b̰|L9cZ4u بa{ȚboC Xd,)xnBxSCCGCAOL0AKGKiP`{s}.5LS*ĝE{z i:8h/ѓpfRH0C3Ɔ%-QNPiasr?-[K² d7bG+=W}hT_3%8^&6gveKçdi,uzbצuTLJҨXվlGG\@?:Hv\SNfaLo iLn-s+bB?UihZO?m {+x˨?կz:?՗P17gGε^يq@.l~dئ'hlKH"l}F (bML}T6/.m >a5╜0>Z}.^kW**=Z~nuiXLcp2y*HVX`9%nkyMkkW[`' Mӱwu2|)#{Si%3?e[̘/Meu#,&Nh3PB 6&oojylXR%#p&RB_=OΗkZ{?Nͯji;5l ϐ/Շ:Uo*=/z.>U,.:Yi]3BkTNDɏ:rk.*6H\w)3^NgPVRR\=Q5-U9TSӹGhIgCR.ݮ[hsS*EiI (zDA7s\I?$GE?/Mxupt#sEjnJz͉`N 6eBGx,~3r?gߠ|htsmJ ~5WNsM]̕zk}'M:yES|EijjI**rUBDn~λ4ݶTk*$ >IxwaK%;#z35-=ӫs*OW?_Rs>NNOyԎ˿ܴjGV0o?]kgoH\_ȟC~_WMHsw?:SR|C_xOW|`[ʫrk9o;+r7}}eC⏍#?Y黦}1\sUfՋPT ύlNJRGPx#LI(mrΐbX"yr6_X.)XJe6`Qkku 5 -@ւD}+yΪjo$Pg§f_@0cH6 !/C{1%Z7ɐx kΚ5WBu\X㴘|/#Ub(K=q/)6i;w;O-O5N?*-" [V'Oi74;od&Orב.E4)*\7:Vz~qE+E9=YVSnN?Ebn.Jf76P}QBܩ_ڑzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzK,p$HCV!UUE$6&M|?V>uub ]q^L#Qe\,Z5bv|q|̊4%sΤvg&"*XٰuX/V 0=55oQ,t? sOk"0EQ-rQTD\l?j֐H.)GL(4,OQfoEh?=kƌfwت[F1N}92 g3>>Ѵ$װ.+Ჹ!{<@TI_>ЛwÊ2p <:i2(摎!P:C$sC#E4L)Tee7 <0k-az?N|ZُPIm\с;`أ:)tR>ĊnAӴ9>vO>c 9dx,1K2fr%;a,u55E5DA =ݛoA >ӻǗb:"6u?]/ Oz9xyU]̀TTIO,D Y{Gv}onHaTTtj#̟*{trkJD&>{IKM6c~Q͈V,t?aTm60!+mÂnJKO* M* YeÞ1V}@}IU3WNYóU^1U53t="̌Aaa}o}j[!m8tx>qJW/Ew+EʳTYʭe01 !; jiRM u$RԐ=Ԓ*`݁e3v}OZ\: i2AU@۳7[AS vW{Nk=t6};&KZpʙ1 [eVS ɻ mB"Ap+ A)P+Q#"ԌO bsu6H<8JEuaMUiIoݷ0C,w&84C0UdTs+08~&|qM|ys.7_Bތq*_;źUXtl,)Ro*o;J5¬# 6 ѥ|?LnZebIYxC de;;Hsp6waŭնOJT-GX۾k=`{w_\[&aYhpJ<,Q>3]]hJ %U}%@:o%-6 U\Z%Z|D@<w֙{fH GOU{_++h:fl3.3_0:,;Z |J 1YJ(E\ݱvC_()R*$ I y3֫(]ӳk ZN[Aa a0·}¤?l吽t4L|: ^8}U%4UZ$jcH_e}õuo$)aZQ< T:< ֻI]JŲ %]}578~#>L&/IUu; U.aCL¥|ɞJYL. s̈~Wk;%G` =B]+}OtDj:9|~IxYBm7x6z27-cju`=M ӎtwfCK:o豌NL $J7hi0@܀].ۯ)KQKrTI;WKi%X :*??;G?c_ܛ{nVT[-FԇϬg/?7nu#w-?ڑ-?):'P|ߪUSR?eOη$Ա_1?P +:G:VZ*$q>J?܍埳:߳oPVhmwϳ̽+0nM]<%}i" Q*E, #}&yJƏ3G /[8W'C p͍S`6е-q%v=l]{T('AsFX=Wʷ;gFl(d\zr_jGWtQ̥N9g.Gvk%FO G|ӚƊ_iF.Ź?ܯe~&ÑU kk7]w:ǶjoV*?ckwJZsCcGO_ rN?S[;sjFs=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^sꦿǓruuh:Ӱ*T,ن Se4tu.(dwk- m+݃QDK}_ꏹ~5J++?zR>OO(—4:&R !ӴC~so2tT*LAql2qB*fY{͹ʙ˹1UQVvnTwӁh0A#TqA߬_OϤTy4t3bxNL\\sp¾H\X Գp6ܻ='>鳢ܰ&Ƕ;>< QT]S'qGGᕐ=eWS`X]ULrDdzRMv#oۖ[NZ$l* Ԡ<9r2/"V]KvPsK:2}%WܹT9+h%FXh<<1f/2quB(5 53tLrD"piZ!E L *CD#2}8}.(i"D 'hSՒ풇Uic?S[yƲYb eN2'*"Ī)yc4@)s-|%ֻ(RfI:H 2[%*֮O`v/_ O |g9xL6I$ Ͷ8I\!VB m5Rrvy9b]2oVu(IlOjjg'0y btmj[y>)!@P k#_&6jYpbAم|??BN=N瞄g Dս'ϯf\Qr)W~ jW,.Kjv?ӿ '֍f+zVt3-[`5-Y%OEbML:BЄRcl}\H$$ꈔ I @b1q#NApVjקX;<22Còg֕_9]0=!qAڌl9d?N[spps:I0:M&\dJA@v͝O3ӝzZfjJe$JZpZIHp;s=,m$C-$ N)I^u˗+Yk*DyO:n*l֔IaIEOO,pE$Xd$=Nط9r[?@Ў6' ; 0}z|֫_8c!O%kz)X4r<8tJI⪰ab6iLawdӞy CH,Qh ٹG{zDXT\[rno֪Z`gإ F$auJ34o :oI ݹTl]i,RPKRN1)=ht7sPն6ᰊܻnS2RzqN( dzLUUcnOFhR91 S m{βOFO=kD}^gQO,Gt'M*M>0dg3LIQ0+*s8{7ܔnR@u(IQQC:MB[ŝ*D tڿDy귬`ޢ􎆡:ʸDT͈?U2iÏqԜW6[hfJ8摷h*R&[L׀}Oµfg~u:~dc>&MVoX_*oXe_c vm޹{)=fXu&qUQIYF(jYlI'6`0cΚ{$]ѧ #A=(%"9*Om  Y?\sf[=6͘%~Q8pʑ:(~ߋI G[}?PݚsG3H7]vW[^mf91RP Qn],D/.fΖ$JڣՉg UR8|=+zϞJ^FV]!S2Al(*7USI-< ʮmyo>ﱛZ9:È#U봸KړǮtUgf ,cXO͸UA@dEn'M*+\+abUN?}aK$eNֽe@*QI "?t:ECT>#'^G \apj P  4qUv&sKK_@tf'IL`$A=T]j2Ic`__Z]0\Q-*"0e {ę+ԯl9fQr$(&' h7Oz#5^wd\su#9v+b1|w&υbGRMzyHPN}}3ʛu$%r$Dp8`q;5Bµ,$GL;ԅ^zTazxn \SAW'asmlNW_lg)ڤ|iXƭ+G'0|O d =@`B `h' $Ukzxղްghl#DyP*\APVX껮C41Cz B*2çuTb)>իƞ(ҿ†7),Vھu%>:$Ũl JC$kJigoi<<4m0 zA)F[Zn\?3b:44O j\n힢WݸcbY#L#gIC5v/Bq3oG:c6gI8dۧebu6WI ~F%t9;SȽAʸ~wY3&SŨ :OJȦ׳=nq-&A=DSo2R< k+zAs CgrWK$s1ޭFNŭ,_=@CCq ^4Kdb=/$S!mFE}ۏOs [ < zuf5?[O_T.O,SREXUo{|nB 6m$M r|MΑӶ3๫yc˝L)VS qÖC*jZјwdn/k$AM:%3 :EY)BuTcCTO%Ol0Tb?U4 ٿ8؎k+ \JZD09bBq9nӑWh}fʦP֭:tLʌ;hWvI1z+.SzS?5)0x4Yv˕(#g3]`B&vdr,m6PQ>%(7K;ۅ<,)Q/ᙝ:mź8>n}44ufpl erij0Ms26PHl4 1*m-Jlďl|hQTo7w5+0&/LUObWTSQU9 ny,gm9Hi y ST72Z4N5Ox$cTIz4cY7 )nE]4iˠIYOƂj챩_ =6ص+֎g~D-.pʫ9;*>۰>ɰ츿ќ}$ݦڞ&ճұ,1Au3ﭲt3zx*+ޢ[2uwY/q:%E n5KN>U%y@buBeRyCl)\'*?ʉ;GV{6z1͙^Ry6b8l«k;82! n,K@^&(JҀ @*ڍrⲼՖV1boܰZ2¸1j_V,W"5 vO?C_'p\+89.-LG*1erhNrvTHP7&kLPW@'?zrN:iOOU*h355uZEU]FϛPF旨aK.,01ܛVK;qeA>ޅ S-|fbu,jj8JXSFUmW ݡ廾* K7Aɍy K:]ו|9[X6'Y`͔L~E.!PcbGmQV_/)z;IG7ZN=D ˏeOćІ)1YlBy cYOKU,N#@]ju7EFKB'!H 2qz]ΥԵNzu`Ia+(v +Ap#ҕRk r+RS"'z*p?E=[ƩmOIӌR 8slA \Ǻ s1I}U9a_glQ{Wzq31ʹm5]p^L\vٹNÿj}'_sX=oM=y0U kV@gjRSw:pwnWiO<* +[sr{UI]AҔhNv*WU}p2°2a4Q"1\(䌑+W/ յDN3^z^z^z^z^z^z^z^z^z^z^z^z^z^z^zZ'·?}#yJϹ? 7)ՃL̽HO0W%Qe ؇՟\#S=4u;,ZZZLË`3Ihi)kaV2S(;ao#F`!%m@T# i"LtmP?|iԋ#!x?L_4GXI~VOs> lkAsx͵}^i3,yk<Z4ƭ.kxճCiCi F&eJAqQhꉒ8yFY&aJ3[ 37?Wʧ7PH}fzG~ěȝ0vBYX**sU%Y0$C0Yt7vG`aP9{kgn5<͡@-iJDI[#_ްқWl7Ւ[ęFCJGFHe3us-[#_A} Bw\ Cb{ p)VڤoGT ]J("fP;+jl|S$ r54G<$vP=uvۙbm0Va&8[z2ˆ๧xT>-}^=JP9vxE%L$wBWW\sgz3^ck Ԏ901UW痲^X=]ʘ YZ1bQG@RXw{|˥ǔVm*$N&yjKL95e|Dq,י(2be="cttT6,zYBOU;zt}zMdN`u :ok)$P'斒 ̦S6썎'Xe&t ɮ~7xki#[*F4 Vb7)b1_T4Աl7lEcFj[q )QJn^W{W{W{W{W{W{W{W{W{W{W{W{W{W{W{VH%c|^fҷOB ~5`/RSaL'/ol1T}FBC zZyYLs=Nli >2I$yjYT99Es"jqx l8l _7lu Nڨi󃒯 Ɠ+J ;ދOH)K9 >8EY0xʶ)OsS=׸3|{8ͲW (; 飜x/ ӷ6лo  3[ UnnR˙8f WVi(쵖)嫯1 ꔦZIfGTD@Y'$M%[|lܥ/m( $NV߇o&kꏯR^sT6"@l"H!qG < @]*WGm^6ViU$<"LORm?P~ _Ox*pNtHzwL91j5ևSHyS|pţx8 -:R }FVυcZ{*#eL[tQM: t(`+q׻eB!.qR=IUA'P=^z,ԪՑjqɌb0!Db.\_I7#%Pil Ag WIZ= 1XD1HE3ȫ%Mf',bXԗ՚GN-}P¢eմSJ 6.( @30ā}[_7y~o@۹{\Y)}s>"5<ԖWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzNnF+6s:jK(oSՙzž a<}SaJ5g__pOF݈m2B=[C+ΘV6VOؾK$V/;+~uW_L3•]ŷk¥,#sE| |lk^f<NjR{M+qvxhs<<QwbI tU|UcZhM$jq $I579 WWJǺU>FO:IP%Sápb OrYZu%yyP XvL1)ɷcU1{A8֝1ח_ޤ}Au:EM'TۋOM$EHa@M]sk<$7idJGY'eJ=$^?.8^~uX>`ʯG(wԬ(V`)l%?k_KHþtz܈AY@SW~é @I;0||x#g*Fďưx75YU`<ҷ>2pzkM 4T p$DDUUVqOP{ɺx_N=NW ~LWSi`x42H*Jt l[8e0'J +Q =]{T0KTIiqY+U%Wl`FЇ^˳Si`ҖIBڥ`$ 29_Yw$5M:LTk)A4-/JZW{W{W{W{W{W{W{W{W{W{W{W{W{W{W{VH%c|^fҷOB ~4L/+gI1O5ajl9IdCQAl>)mۇ{[K_c.-oބiI7S|j;ci~‘WOHlzN:_ժ:|>na4x*Y©M”^gq>ɳf Xlmzz(<d6F3=72?^e?tVJ4j:3m\mtTqN/=NXZlW OU.ADz:oFXQ8֊(*0ŝ\ ۊ;%>ߴrݭ*$Wb#ޥ°3򚩴ǸD<vշ;T;sՌ~QWҳk seٙpZH67e|)+裶].F ?E%_ށo!硟ƒ- ]E~5VѦ1(e1JTitЄ}G9b`8\߮7\(x͖ҟP'ڣ*H c#JĚ2Xy9_QY}}ybq]+['ЫO"xK9U's7_4 b3?$3W(&ƽm(*"Xf5s%Dڒlǹ$i/6V՟mOjeu>&үUp=_dTX5Y8\eS%C#Z3YEو$JVI&+ˬ![4 &R:A+뷓ʬ(l*8m 5bܢX)'y|oە;G-HkzWzWzWzWzWzWzWzWzWzWzWzWzWzWzW/³_AʸS:ޱVaGP:Q%'͸; %6mՓ@!$R l7qD=ʄ;\ݍqV@\OAr %C *3y׭XU_2>L 0Έ{i\_°x~gͺx >@yQ~?ozg?s;Jo̩ \(}!Q1l͹FK'N=y}_X=* u6O-Gۡޑ/ziu:[B$!Q0F^^śM}#x3?]:@ZR<:Gb8Uz^z^z^z^z^z^z^z^z^z^z^z^z^z^z^z^zDW/VYc̐>T448`O)-t8 -76jXñ- –HJz %\b*3w*ZdNEq_N[m C6'kjlt"$++2U_AOxSIk fr 4h՝?Ayge鯢(1 s:D@KIOAT\-ƻn4Gܧ_*1HB'JǶ/Wߏ 2g>t2fD *f}JG4q[uVQviy^)@HAG^YN6RfΠoXy%"hn$3|6v*=xTol;dA# F&8[~oA`]FTԽ"ǩ(fRTnLBP*9ԫDcܷ"iO]?rO|{ʭ&ݤ?5Up:WzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzWzv'CAh}MtǢ=8d=.D EEpp:}UJG%尪I7<vIH$w{;盷mETw 8P ?z:jDŽdnIQm6  ]ike{t<5pCJyE6},+?O>C[OA(V̽F*r%;֝]J.r>S1y{MGUᠵÖN?CQ}S [iQ uC ̞(e|M,+_~ᣨ)k# 䱰5fPed+@< k,ei?Ox!(GƶBLzs쟄t F }:77vk]#m% }ܪTD)Sg+Yb^ppׁJj?3̀RCU^з)fk$26AΓj&A0G3G:s=^s=^s?[}]zu?B5!u#8KfʻXX}ZMh=Is 7]K#I4skw.%[H1QθO1|,¶kʲ϶ێ(YmNʼWܻ*"=zϰ«zϰªMuޟ=?ٓ5usϲщ溬қ/:2/{IݽʲwK%">"s즯+U1_OŻ^!ҍfc>ϰ±GaLYׯco#z3}gAqCժZASW %UE4Ȋl!xslnu,c#hYvZԔ8{=JTz]wNrUE\5)M.%S&1ԈqCԘleKB[IԦy3 ˔ 8`Cp"Jwz2?nd'Ugwn~&R2wRQeH3nRjb"6tĪ*40wG [[+8m U ^pgn9bJ!OGD=wK|+͇sDlwpٶX1ćۈSE&%Tt6PReFvcdM_3hB<8`qR`t FmcvA($zxƉ߯ޙSH/ſs@0*S'+ ӦIez&Z *'a*I$_̳A٩/ND0/1<x*\N-A4u,ʖ)Cn_p{an% l# p𑨍2!^})g)y]$\v zoNJGIbjgźTTVfÇac:7sQ {]sإj! BBIgFͺ5GL}ƋѮz֎enasx]]f3ˊauˉ #TP7Y cݦ\ouM 1"+[߻M̦(/TN&xNAR#|s1dN؆©'zZbNc48ON1Bm=o]Y@!I}0̜̭'%ftO*f'=Jң:ukߥQ+kWf;{uWK0 < %BGv[͒2pI+81Wz1跤K^:Y8c|KN`59\i1"zSj֟i ] Jĝo3[muv:(L011feVKS3$ɓ<68Vk6%[U26|Դ\5:wM8  QjzYσ+B!P24I@,ܽvXV) 58n_k{^|Cؑu嚙laTnw&<8|CMHN Jy `QVe[s gs=^s=^s=^s=^s=^s=^s=^s꬯ ;uzm_ΰ2PTAb*DI-0̦wrֳ֞XC-xʇ0AMTjՇU dj^oYYΎŖ\JƦÔXT8@I3s6X)H@#ON@Pow76( à`hz#N_t)|bESQtG3bi3.!9!W8*ݾls~8|ը$q)˜f;f(Hg1=ʿwz?53^؏K4˧y½zi_Ʒ9~.ts[CMW Ğ)ȣI\-}-ͽ}Зt M%#`H#^LᗐBtIQ'A}u~Y~.Uzq9_/c8n`q3$|cuezv^9 `7u`iIH28qS{ki'`3>FL7| ;[%Gmv5bdJxZ@L*'Dh"ygwK+MMH &LFwkZ` y8 /}W[FkroBvͧP&=Y³IW,Ӽ̍laþҷ*+6 }R`Ғv04vK3Za  e@u{#7oANFkz:Q 0V^lzbt5Bⶃۧ=خYfMvӡ rt Z<񥴝INݘcM?/Z}Wr菣z+G/U:5+CUX$פ+Y`a6K ,u*.&dۮ1w8\#V1+SjGxh/ӯLOy1;6 izA|RGQj3L0bQuMMMDՒG­NDq^Gx۳`L'MYiͳ +Ji;|[x3e^K@?ů׫ ["{Ε6ΘN1GUB19OE5bս%lQROcc 0ޜx7U͋E )DHv]h*&#<)_J67= y1g츱:)tpKem5,Y,A$.͵XY6=^鹓&?MBÒ yvj3Tx 0;" E?[::>ba"ujjlFǟŰHik%_S"l4k8Ee7kdˡOԘ24 ĈᶗnGvrL!EppCGզzzwy3[qɿ/TJZOm\*O(;b7]|znpp2d#NfY%>b$y%VO@^]9tNO8Tg\fJ 0Xv.7)r˖ g&|15EwwrښNΞS㬞[ty~Ld,Ʉܵ C-v#[I -h,REUO"RTM13$Xaw p/mع[@m!Fga#I3/36̕0ÞK?>OҿP96 .&k8lُT1SiV)>R:TryJ.=fֹgp$qRgco]}[6 z;?u'dޚ<5[Ӗ M&1Tl3q *2:V*HNR!%pgg+ yw*A HA b1` c;p9$q$tmǬQ,~DY[ށz9 *JhjSax!H "=5o0=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^sY_\^[:_)3ADX+ICDV),5EKIX|y!iIhF@0poV&Q\U< {W{W{W{W{W{W{W{W{W{W{W{W{W{Uo~-^~ x˽!}Mh$ԓB!^JҧB^:YPRN$zZFk;> 7}PÖ(2c'= nOE=2~z]'Mr[ԭUTy6^Bw)QB[qHڔ%C z:Tvp_)>SduVsShĺy0 ŊdyQVHK+HCG[ٞsY fTB@=x bs]峲V*# zz ֜Jɚ&)L>'YU"*UYL1dܪ{yafnR)ĩ 6D)%ؾh@oסEҾ.l0 jcY`5)H*v]Z(]ԆU*o;Fw2_@ Q O\N&8 SYY/C&=^ zϵ}%S<26sJT4HG"e 緷%clODpZwzW4賨Ω&2LKO*8JxevY!vEge,RH>\H3Uwj&`WzFH/Xe\Ʋ^/bX.a%}4+am%Ԗ#(r[Rx6OXjnKJp ^/J[9ɹ [AQI\e=`3?.ޣLѼч`MmQ#uXuJ9uO*du,w{!qAJ H38 E?mlK_ ?t`U ~3u}xf7^-C>_ tv*׍Z)"-R#7n] m_a$e#{YS8a:tћsPV^\!LQdu8*/C.j1hm1cĤo[[`ݤ) +;t$FgmsSCz#4$(k7(oɸgRsU_*sFP؞1RI>uþ3pC`[!„`ZQQK.7.me!EQH3:ä[8t{XV/uR*l%*֯ Ix>h,8 ͻ>ͬsXޗ ' *0![6qÌQͦhB vm9‰ ,;&R 'qNRơc2SOSyT#"o7p@ў7Owji)ىZcɓ Q2,OPh"E(!Yc6f_L\6B;\B 0X$jY&Q 卙 V[VP >LԢuIclN h&oK&chE>WzWzWzWzWzWzWzWzWzWzWzWzWzs=z:Ϡ^PʟpǙz$؎)] 6-M&4@'٫7$v/EZf IQx )["NHdWgaŲozE$m`91~KꡠKIX*(`ĸf#wdewOn3JT *I2&h{s#re, #>U}"d oBb^:鏭XM[.Śih/fL)MT0xVX dJD{qw;wngd`{))'R xBl m|5P?7]"kL_O1" 쏛lTWO5FTSlY5-$2  (&q޽]e @PA  <8e0d8HF1GU^rλ^ T7Ƚ]4Rt3ѷP%\Jz E=G²RɄO$W_(lIPYc$W2ڔg{v^W0? aqfN.su5]HrX7bWHT^e+>CP BO%DlG+;DJ}n#ش aL^tϭx z>W,[ӥdU,INao7 Wf..AEf{԰Q. QY>}tЇis>u9;f,N)qښ kSȆޡ?na1,ނ[.>da:i5ux]LuJWsӲFNdry}Q];j:C 8V>f=B4ȭQYza)Ql0lS6,WeM4߃oShqH^0t y2W{W{W{W{W{W{W{W{W{W{W{W{W{U2t?gJ޵c\jx1:-W tRSKU=$Orm4WI~nmv=oxn}JR*P@ )^em:eEǍ%0_[՛=qy>| iֹzL>dYǟ`guj6%GIAva#0MK?eex>W*~ 9wgMK9c}& .)Z& !iN"qe~_o?lN]eˬEJ`8I+f%< L})?'Bóg oѷ\k.yyئ Q,xfæÍ?29&)%XkQ9vant}ٌ+f@ &WFӇl  iETԯV}r}\zNU\hi0pª*)hR,/j4E>vadfojf L '4SyO' ldžvROӇ}[zGW 3AaS*dju6xLsZTe%`T[ۦa}[%mP1  tY~ų%Ȟ#ւ>=鏱5ڏѲ-=p<,| MUC&,؞$KT򱩆#Iw=3n7 &D8A)p$0褶{m%O'ƇA_f_1S.cx7к,6\n:z)1SUG3J(ZeHb\({+enRT $铦dIKrMM X#O8‘ށ} ,>SbXe& $ bLD)F +ߞ[ϬoY%8tȑ=ƙ1VjC2S?@穼BZp_TPa)n P؃bls&"񺸱Q<%n0 J2fpǪ"inEMXGEO,P'?q/I]Q)8&iq𷧕cE*m>P=\m% [yFH ,or$[>Э'd{vѰ0zu3禜qw4[7]AK65Q/` QRBib,LX-ݰfjHM1Ѱ 3wFRI. A;2g||\SNmũi(a(RZ'[|)@DN£8Kws F\m**>@| 7~ZgVOXΤ=kJ{Ç}q60I@h 8GE^ꖕj~D,s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^s=^su(@  t Xhttp://www.ftc.gov/opa/2008/10/redflags.shtmXhttp://www.ftc.gov/opa/2008/10/redflags.shtm6http://www.aha.org/redflags6http://www.aha.org/redflagsz(www.aha.org/redflags6http://www.aha.org/redflagsz(www.aha.org/redflags6http://www.aha.org/redflags/ 0DArialr New0llT0"DWingdingsw0llT0 DCourier New0llT01F$ .  @n?" dd@  @@`` YYQ|(  (*         )7     x7     6r   yy           y  6r ;(     &      "              :      6r  "              6r                 6r                6r           0 1  $  0      '/      2       )     6r          @    " + 3 # }         9      6   ? '      '  ' ?     ,                (!2             '   I )   ''          ' =  4'               9       !   $   $     666;   s       $  S  % %         a,        !"#$%&'()*+,-./01/XR$(f~'bC eR$-o0%eZawmce 0e0e     A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||s " 0e@        @ABC DEEFGHIJK5%LMNOPQRSTUWYZ[ \]^_ `abN E5%  N E5%  N F   5%    !"?N@ABC DEFFGHIJK5%LMNOPQRSTUWYZ[ \]^_ `ab M3@38h ʚ;Wq8ʚ;4KdKdTx 0Fp0p0ppp<4dddd8A10l0 <4KdKd8c20l <4!d!d8c20lg49d9d`z 0p pFV___PPT106 .AHA.___PPT9(&(D44Bv&&2>&f&4F68*?  %am  B FTC s Red Flags Rule: Understanding and Meeting Compliance Expectations December 2008 Lawrence Hughes AHA Assistant General Counsel Advocacy and Public PolicyZXI I,3I3 Presentation TopicsClarify what the Red Flags Rule is and is not Provide insights into the FTC s expectations for compliance and strategy for enforcement Offer some suggestions for how to get started with compliance $ Red Flags Rule - Overview Related set of rules concerned with preventing and detecting identity theft Two in particular are most likely to affect hospitals:  Creditors with  covered accounts must develop a written identity theft prevention program Users of consumer reports must respond to address discrepancy notices from a consumer reporting agency]L   ]O" Application to Hospitals Hospitals are likely to meet the rule s broad definition of  creditor and have patient accounts that fall within the scope of  covered accounts Key aspect of definition is  Do you provide service for which you defer payment? Most hospitals do4  Application to Hospitals  Many hospitals use consumer reports in their financial assistance processes Requirement is more about accuracy than about identity theft Key question is whether the report really is about the individual it purports to be about Not covered further in this presentation" Z)" f   Z &  Red Flags Rule Is . . . $Risk-based What are the risks to your patient accounts? Flexible Programs must be tailored to the size and complexity of specific organizational operations E.g., small providers that know all their patients by sight may run little risk of identity theft and may have a very simple policy - ]w    -  Red Flags Rule Requires . . . Reasonable response when a warning sign is present/detected Is it just clerical error? Consider the impact of other laws on appropriate response e.g, EMTALA, HIPAA s restrictions on sharing PHI Is individual breach notification required? Do we have to offer creditor monitoring services? Periodic assessment to identify new and emerging risks ( red flags ) and how to respond to them<PPFPP  2   , ,  Red Flags Rule Is NOT . . . $Specifically or solely about technology Rather it is principally about processes and procedures, behavior change Requirements for data security or a mandate for specific responses to a data security breach Requires recognizing and responding reasonably and appropriately to warning signs/suspicious activities that suggest potential identity theft HIPAA privacy and security requirements complement, but do not specifically address the same issues(PIP]" PP( B]   FTC S ApproachKey term is Reasonable The FTC expects that hospitals will: Undertake a risk assessment What are the risks to your organization and its specific types of patient accounts? Cannot rely on some generic list of risks Have a written policy Reasonable practices for identifying and responding to signs, suspicious activities/behaviors, patterns, practices that suggest potential cases of identify theft*ZZ%ZZZ~ZZt0Z20Z    % ~   ,FTC S Approach (cont.)The FTC expects that hospitals will: Obtain board approval of the initial written policy Put the policy into actual practice within the organization Does the organization actually do what its policy says it does will be a key consideration in any FTC eventual review You can t have just a generic policy or rely on a template policy you just stick on the shelf%p % L   ,FTC S Approach (cont.)The FTC expects that hospitals will: Periodically review and revise policies Identify and respond to new and emerging signs, suspicious activities/behaviors, patterns, practices x%(f % (d    $FTC S Jurisdiction FTC has  and continues to in the context of this rule  assert jurisdiction over not-for-profit and government hospitals Hospitals are subject to the FTC s jurisdiction when they are engaging in activities that a for-profit entity would engage in  [w]here they defer payment for goods and service  see FTC s July Guidance  New  Red Flag Requirements for Financial Institutions and Creditors Will Help Fight Identity Theft Bottom Line: Industry best practice; benefit hospital s billing operations and patientsTzPP~" PPPL 0P!0P `/I2{  Z 0FTC s 10/28 AnnouncementXCompliance deadline remains November 1, 2008 FTC will suspend enforcement until May 1, 2009 Additional time to develop and implement written identity theft prevention programs Does NOT affect enforcement of: Nov. 1 compliance deadline for institutions subject to oversight by federal agencies other than the FTC (banking, financial services) Requirement for users of consumer reports to respond to address discrepancy notices from a consumer reporting agency Nov. 1 is still the compliance deadline Includes hospitals FTC s announcement can be found at http://www.ftc.gov/opa/2008/10/redflags.shtm Read Text of the FTC Enforcement Policy (link at right-hand side of the Web page.P0PTPP PP;PPQPQP T            e;"/P    T0.Z 0FTC s 10/28 AnnouncementSBottom Line for Hospitals: Make a good faith effort to comply as soon as possible TT# Compliance ExpectationsFTC does not expect your organization to spot every case of identity theft or apprehend every identity thief That s practically impossible FTC recognizes that your organization is primarily a health care provider, not an investigatory/detective/law enforcement agency Key operational concept is  could indicate identity theft Not every sign, pattern when investigated will show that identity theft is occurring or has occurred (e.g., documentation mistakes, key stroke/data entry errors, merged records)m; 1 m; 4FTC s Enforcement StrategyNOT viewed by the FTC as an opportunity for GOTCHA Are you making reasonable progress toward compliance? Example: You have a written policy but are awaiting your next board meeting  which does not convene until next quarter - for approval Don t use this as an excuse for delay or, worse yet, doing nothing A warning from the chief of the FTC division in charge of the program: If next year at this time you ve done nothing, there may be a real problem3D% t 06 B 4FTC s Enforcement StrategytFTC enforcement through  industry sweeps to check compliance Responsible for compliance of lots of organization in many different fields Likelihood of an immediate focus on health care is low FTC aware that health care organizations (among others) only recently learned about the Rule s application; lead to 10/28 announcement of enforcement delay Again, this should not become an excuse for delaying your organization s efforts to comply>! >! >         4   Other Enforcement0NO private right of action States attorneys general have enforcement authority under the Rule Likely to follow an FTC investigation/imposition of sanctions State consumer protection laws may be a source of individual right of action P!PC P>P!P 0P4!0P$$C$>   $O$ A Proper Perspective4Good business practice for hospitals It s about protecting your patient accounts and your patient relationships Warning: If you don t do it, there are likely to be additional requirements imposed from the outside Proposals (more onerous) currently pending at federal, state levelspfDp    \ D How To Get StartedCompliance required by November 1, 2008 Step 1: Read the Rule There is no substitute here and you may have to read it multiple times! Pay particular attention to Appendix A and its supplement (beginning on page 63773) Appendix A includes guidelines intended to assist organizations in developing and structuring their programs FTC has specifically said all organizations need to consider these carefully Supplement lists 26 potential red flags NOT all may be applicable to health care providers but they are a great starting point for understanding what red flags to consider, incorporate, respond to Final rule published in Nov. 9, 2007 Federal Register Copy posted on AHA s Web site at www.aha.org/redflags APHPPTPPP&0P0P0P0P(&&  8 T   &9,T0 How To Get Started0Step 2: Assemble Your Team Consider who within the organization should be part of the implementation team Remember it s not just an IT issue; BUT IT professionals will - and should - be involved Who s integral to making the program work on a daily basis: billing and financial services, admissions, privacy, security, patient care, risk management, compliance, legal counsel|OO$ How To Get StartedhStep 3: Inventory Current Practices and Procedures Many hospitals already have processes and procedures in place to detect and respond to cases of potential identity theft Seriously, write them down! It s a good start in crafting your policy Consider what s already working? What might need to change to be more effective? What s missing? What you do must be based on an assessment of the real risk your organization faces with regard to its patient accounts What risks have you already had to address? What risks have your peer organizations seen? Consider multiple sites, locations within your organization Consider outside service vendors (e.g., credit/collection agency activities)4ZyZZZxZZ-Z-y       e     How To Get StartedRA word on using sample policies May be appropriate to start with a sample policy However, the regulation requires that the identify theft program be appropriate for the organization s size and complexity and the nature and scope of its activities Therefore, each organization must adapt any sample document to address the specific risks they face and to ensure an appropriate and reasonable organizational response to them2!10P0P0P0P0P &&+  &AHA s Sample Policy,Developed in cooperation with our outside counsel Hogan & Hartson LLP Hospitals can use as a first step in developing their written identity theft programs AHA s sample policy is NOT intended to substitute for responsible legal advice Hospitals should examine the sample document as part of a comprehensive risk assessment Available on the AHA Web site at www.aha.org/redflags *F0P0PV0P0P20P70" PG 4 ?I  5>:\T0g{ DHospitals Primary New Obligations##*Under the new rule, hospitals primary new obligations are likely to be two fold: Systematizing policies in a consolidated written format Obtaining board approval of the initial written policy Only applies to the initial policyR87#R ) #   ReminderRule requires periodic reassessment of risks and, if appropriate, revision of policies and practices Build that into your policy and program from the start Specifically charge someone within the organization with responsibility for maintaining and updating your policies and program Always ask what new risks might be out there Keep up-to-date with the FTC s Web site on identity theft Consider reports from consumer organizations Listen to news coverage  Identity theft is issue of intense current interest in the media Again, not all may apply directly to health care providerste" e "  Note on HIPAA PrivacyPatients frequent complaint: Can t get access to my records when I suspect I m the victim of identity theft Patients report that hospitals cite HIPAA as the reason Patients rights under HIPAA: To access his/her medical records, and To request changes to their records Why HIPAA probably isn t a barrier: It s the patient s information It s an incidental disclosure, at most It probably involves deidentified data Remember when developing your policies and practices: It s always about your relationship with your patients*n" P8P" PKP$" PmPn" Pn8K$m<, t  ResourcesE AHA Red Flags Rule issue Web site found at www.aha.org/redflags 4F" & B&$0T00DQ  0` 33` Sf3f` 33g` f` www3PP` ZXdbmo` \ғ3y`Ӣ` 3f3ff` 3f3FKf` hk]wwwfܹ` ff>>\`Y{ff` R>&- {p_/̴>?" dd@0?" dd@$   @q` n?" dd@   @@``PR*   @ ` `2p> >0N0 YQ(  f  0 -"@  6ġ"@ ,~  C HA0AHA_ppt A ReverseLogoSm"   6l "pp@  T Click to edit Master title style! !'  0 "P   UClick to edit Master text styles Second level Third level Fourth level Fifth level20 !    VB  s *޽h ? 3380___PPT10. [ Default Design) 00N0 y (   `  s *"  6(ې "@ 3.   T Click to edit Master title style! !  0 " 0%0  W#Click to edit Master subtitle style$ $z  C DA,AHA_ppt A ReverseLogo"0P f  0 -"@  6>"@ ,P  s *޽h ?"@` 3380___PPT10.~(0 88(  8  8 N8okk z'   v* K%%KKoo 8 Nxkk  @'  x* K%%KKood 8 c $ ?da  4 8 N{kk  MU  RClick to edit Master text styles Second level Third level Fourth level Fifth level!     S 8 Tpkk z   v* K%%KKoo 8 Tkk  @  x* K%%KKooH 8 0.k ? ̙3380___PPT10.9\ ((    N7kk z'   \* K%%KKoo  N|;kk  @'  ^* K%%KKoo  TEkk z   \* K%%KKoo  T@Pkk  @  ^* K%%KKooH  0.k ? ̙3380___PPT10.997 00N0 6. &(  & & c $p # "pH & 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 @(F(  (x ( c $pp@    ( c $E#p  "pH ( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0  l&F(  l&x l& c $?pp@    l& c $KpP  "pH l& 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 (F(  (x ( c $pp@    ( c $XpP  "pH ( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 ((F(  ((x (( c $0[pp@    (( c $npP  "pH (( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 $(F(  $(x $( c $Tpp@    $( c $pP  "pH $( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 ,(F(  ,(x ,( c $(!pp@    ,( c $4&pP  "pH ,( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 0(F(  0(x 0( c $pp@    0( c $(p  "pH 0( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0  (F(   (x  ( c $~pp@     ( c $pP  "pH  ( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 PL(F(  L(x L( c $,\pp@    L( c $t4pP  "pH L( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 `P(F(  P(x P( c $ipp@    P( c $'#pP  "pH P( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 pT(F(  T(x T( c $cpp@    T( c $pP  "pH T( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 4(F(  4(x 4( c $Tpp@    4( c $dpP  "pH 4( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 X(F(  X(x X( c $0pp@    X( c $pP  "pH X( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 8(F(  8(x 8( c $pp@    8( c $|pP  "pH 8( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 <(F(  <(x <( c $@pp@    <( c $pP  "pH <( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 \(F(  \(x \( c $TQpp@    \( c $VpP  "pH \( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 `(F(  `(x `( c $@pp@    `( c $dpP  "pH `( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0  @(F(  @(x @( c $pp@    @( c $0pP  "pH @( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 0D(F(  D(x D( c $<pp@    D( c $#pP  "pH D( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 @H(F(  H(x H( c $Tpp@    H( c $apP  "pH H( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 d(F(  d(x d( c $@cpp@    d( c $pP  "pH d( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 l(F(  l(x l( c $-pp@    l( c $X3pP  "pH l( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 t(F(  t(x t( c $oSpp@  S  t( c $tpP S "pH t( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 h(F(  h(x h( c $^pp@    h( c $@pP  "pH h( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 p(F(  p(x p( c $8pp@    p( c $pP  "pH p( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 x(F(  x(x x( c $Spp@  S  x( c $ *SpP S "pH x( 0޽h ? 33___PPT10i.+D=' S= @B + 00N0 |(F(  |(x |( c $pp@    |( c $pP  "pH |( 0޽h ? 33___PPT10i.+D=' S= @B +r0} 7 E G  A95!#&~=  zvr)11,n4.-79< 1(@  t Xhttp://www.ftc.gov/Oh+'0T `hx  Slide 1Heather PowersAHA1169Microsoft Office PowerPoint@)H@@ֵ@p'EGSg  )'    """)))UUUMMMBBB999|PP3f333f3333f3ffffff3f̙3ff333f333333333f33333333f33f3ff3f3f3f3333f33̙33333f333333f3333f3ffffff3f33ff3f3f3f3fff3ffffffffff3ffff̙fff3fffff3fff333f3f3ff3ff33f̙̙3̙ff̙̙̙3f̙3f333f3333f3ffffff3f̙3f3f3f333f3333f3ffffff3f̙3f3ffffffffff!___www4'A x(xKʦ """)))UUUMMMBBB999|PP3f3333f333ff3fffff3f3f̙f3333f3333333333f3333333f3f33ff3f3f3f3333f3333333f3̙33333f333ff3ffffff3f33f3ff3f3f3ffff3fffffffff3fffffff3f̙ffff3ff333f3ff33fff33f3ff̙3f3f3333f333ff3fffff̙̙3̙f̙̙̙3f̙3f3f3333f333ff3fffff3f3f̙3ffffffffff!___wwwݵݵݼ%%%%ݼݻݻ%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%ݴ%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%޽%%%%%%%%%%%%oioiݵi޽goohoo%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%ϼݻgoo%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%ݵo%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%oo%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_e_eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeRoot EntrydO)`~E@PicturescCurrent User)SummaryInformation(T՜.+,D՜.+,    "On-screen ShowMAI  Arial Wingdings Courier NewDefault DesignSlide 1Presentation TopicsRed Flags Rule - Overview Application to Hospitals Applicat      !"#$%&'()*+,-./01ion to Hospitals Red Flags Rule Is . . . Red Flags Rule Requires . . . Red Flags Rule Is NOT . . . FTCS ApproachFTCS Approach (cont.)FTCS Approach (cont.)FTCS JurisdictionFTCs 10/28 AnnouncementFTCs 10/28 AnnouncementCompliance ExpectationsFTCs Enforcement StrategyFTCs Enforcement StrategyOther EnforcementA Proper PerspectiveHow To Get StartedHow To Get StartedHow To Get StartedHow To Get StartedAHAs Sample Policy#Hospitals Primary New Obligations ReminderNote on HIPAA Privacy Resources  Fonts UsedDesign Template Slide Titles  8@ _PID_HLINKSA-http://www.ftc.gov/opa/2008/10/redflags.shtmhttp://www.aha.org/redflagshttp://www.aha.org/redflagshttp://www.aha.org/redflags_yAHAAHA_O=AHAAHA  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root EntrydO)@?E3@PicturescCurrent User)SummaryInformation(TPowerPoint Document(DocumentSummaryInformation8opa/2008/10/redflags.shtmXhttp://www.ftc.gov/opa/2008/10/redflags.shtm6http://www.aha.org/redflags6http://www.aha.org/redflagsz(www.aha.org/redflags6http://www.aha.org/redflagsz(www.aha.org/redflags6http://www.aha.org/redflags/ 0DArialr New0LLTԖ0Ԗ"DWingdingsw0LLTԖ0Ԗ DCourier New0LLTԖ0Ԗ1F$ .  @n?" dd@  @@`` YYQ|(  (*         )7     x7     6r   yy           y  6r ;(     &      "              :      6r  "              6r                 6r                6r           0 1  $  0      '/      2       )     6r          @    " + 3 # }         9      6   ? '      '  ' ?     ,                (!2             '   I )   ''          ' =  4'               9       !   $   $     666;   s       $  S  % %         a,        !"#$%&'()*+,-./01/XR$(f~'bC eR$-o0%eZawmce 0e0e     A@ A5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||s " 0e@        @ABC DEEFGHIJK5%LMNOPQRSTUWYZ[ \]^_ `abN E5%  N E5%  N F   5%    !"?N@ABC DEFFGHIJK5%LMNOPQRSTUWYZ[ \]^_ `ab M3@38h ʚ;Wq8ʚ;4KdKdTx0Fp0p0ppp<4ddddA10L0 <4KdKdc20L <4!d!dc20Lg49d9d`z0p pFV___PPT106 .AHA.___PPT9(&(D44Bv&&2>&f&4F68*?  %m  @ FTC s Red Flags Rule: Understanding and Meeting Compliance Expectations October 2008 Lawrence Hughes AHA Assistant General Counsel Advocacy and Public PolicylI(I  I,3I3JP Presentation TopicsClarify what the Red Flags Rule is and is not Provide insights into the FTC s expectations for compliance and strategy for enforcement Offer some suggestions for how to get started with compliance $ Red Flags Rule - Overview Related set of rules concerned with preventing and detecting identity theft Two in particular are most likely to affect hospitals:  Creditors with  covered accounts must develop a written identity theft prevention program Users of consumer reports m      !"#$%&'()*+,-./01456ust respond to address discrepancy notices from a consumer reporting agency]L   ]O" Application to Hospitals Hospitals are likely to meet the rule s broad definition of  creditor and have patient accounts that fall within the scope of  covered accounts Key aspect of definition is  Do you provide service for which you defer payment? Most hospitals do4  Application to Hospitals  Many hospitals use consumer reports in their financial assistance processes Requirement is more about accuracy than about identity theft Key question is whether the report really is about the individual it purports to be about Not covered further in this presentation" Z)" f   Z &  Red Flags Rule Is . . . $Risk-based What are the risks to your patient accounts? Flexible Programs must be tailored to the size and complexity of specific organizational operations E.g., small providers that know all their patients by sight may run little risk of identity theft and may have a very simple policy - ]w    -  Red Flags Rule Requires . . . Reasonable response when a warning sign is present/detected Is it just clerical error? Consider the impact of other laws on appropriate response e.g, EMTALA, HIPAA s restrictions on sharing PHI Is individual breach notification required? Do we have to offer creditor monitoring services? Periodic assessment to identify new and emerging risks ( red flags ) and how to respond to them<PPFPP  2   , ,  Red Flags Rule Is NOT . . . $Specifically or solely about technology Rather it is principally about processes and procedures, behavior change Requirements for data security or a mandate for specific responses to a data security breach Requires recognizing and responding reasonably and appropriately to warning signs/suspicious activities that suggest potential identity theft HIPAA privacy and security requirements complement, but do not specifically address the same issues(PIP]" PP( B]   FTC S ApproachKey term is Reasonable The FTC expects that hospitals will: Undertake a risk assessment What are the risks to your organization and its specific types of patient accounts? Cannot rely on some generic list of risks Have a written policy Reasonable practices for identifying and responding to signs, suspicious activities/behaviors, patterns, practices that suggest potential cases of identify theft*ZZ%ZZZ~ZZt0Z20Z    % ~   ,FTC S Approach (cont.)The FTC expects that hospitals will: Obtain board approval of the initial written policy Put the policy into actual practice within the organization Does the organization actually do what its policy says it does will be a key consideration in any FTC eventual review You can t have just a generic policy or rely on a template policy you just stick on the shelf%p % L   ,FTC S Approach (cont.)The FTC expects that hospitals will: Periodically review and revise policies Identify and respond to new and emerging signs, suspicious activities/behaviors, patterns, practices x%(f % (d    $FTC S Jurisdiction FTC has  and continues to in the context of this rule  assert jurisdiction over not-for-profit and government hospitals Hospitals are subject to the FTC s jurisdiction when they are engaging in activities that a for-profit entity would engage in  [w]here they defer payment for goods and service  see FTC s July Guidance  New  Red Flag Requirements for Financial Institutions and Creditors Will Help Fight Identity Theft Bottom Line: Industry best practice; benefit hospital s billing operations and patientsTzPP~" PPPL 0P!0P `/I2{  Z 0FTC s 10/28 AnnouncementXCompliance deadline remains November 1, 2008 FTC will suspend enforcement until May 1, 2009 Additional time to develop and implement written identity theft prevention programs Does NOT affect enforcement of: Nov. 1 compliance deadline for institutions subject to oversight by federal agencies other than the FTC (banking, financial services) Requirement for users of consumer reports to respond to address discrepancy notices from a consumer reporting agency Nov. 1 is still the compliance deadline Includes hospitals FTC s announcement can be found at http://www.ftc.gov/opa/2008/10/redflags.shtm Read Text of the FTC Enforcement Policy (link at right-hand side of the Web page.P0PTPP PP;PPQPQP T            e;"/P    T0.Z 0FTC s 10/28 AnnouncementSBottom Line for Hospitals: Make a good faith effort to comply as soon as possible TT# Compliance ExpectationsFTC does not expect your organization to spot every case of identity theft or apprehend every identity thief That s practically impossible FTC recognizes that your organization is primarily a health care provider, not an investigatory/detective/law enforcement agency Key operational concept is  could indicate identity theft Not every sign, pattern when investigated will show that identity theft is occurring or has occurred (e.g., documentation mistakes, key stroke/data entry errors, merged records)m; 1 m; 4FTC s Enforcement StrategyNOT viewed by the FTC as an opportunity for GOTCHA Are you making reasonable progress toward compliance? Example: You have a written policy but are awaiting your next board meeting  which does not convene until next quarter - for approval Don t use this as an excuse for delay or, worse yet, doing nothing A warning from the chief of the FTC division in charge of the program: If next year at this time you ve done nothing, there may be a real problem3D% t 06 B 4FTC s Enforcement StrategytFTC enforcement through  industry sweeps to check compliance Responsible for compliance of lots of organization in many different fields Likelihood of an immediate focus on health care is low FTC aware that health care organizations (among others) only recently learned about the Rule s application; lead to 10/28 announcement of enforcement delay Again, this should not become an excuse for delaying your organization s efforts to comply>! >! >         4   Other Enforcement0NO private right of action States attorneys general have enforcement authority under the Rule Likely to follow an FTC investigation/imposition of sanctions State consumer protection laws may be a source of individual right of action P!PC P>P!P 0P4!0P$$C$>   $O$ A Proper Perspective4Good business practice for hospitals It s about protecting your patient accounts and your patient relationships Warning: If you don t do it, there are likely to be additional requirements imposed from the outside Proposals (more onerous) currently pending at federal, state levelspfDp    \ D How To Get StartedCompliance required by November 1, 2008 Step 1: Read the Rule There is no substitute here and you may have to read it multiple times! Pay particular attention to Appendix A and its supplement (beginning on page 63773) Appendix A includes guidelines intended to assist organizations in developing and structuring their programs FTC has specifically said all organizations need to consider these carefully Supplement lists 26 potential red flags NOT all may be applicable to health care providers but they are a great starting point for understanding what red flags to consider, incorporate, respond to Final rule published in Nov. 9, 2007 Federal Register Copy posted on AHA s Web site at www.aha.org/redflags APHPPTPPP&0P0P0P0P(&&  8 T   &9,T0 How To Get Started0Step 2: Assemble Your Team Consider who within the organization should be part of the implementation team Remember it s not just an IT issue; BUT IT professionals will - and should - be involved Who s integral to making the program work on a daily basis: billing and financial services, admissions, privacy, security, patient care, risk management, compliance, legal counsel|OO$ How To Get StartedhStep 3: Inventory Current Practices and Procedures Many hospitals already have processes and procedures in place to detect and respond to cases of potential identity theft Seriously, write them down! It s a good start in crafting your policy Consider what s already working? What might need to change to be more effective? What s missing? What you do must be based on an assessment of the real risk your organization faces with regard to its patient accounts What risks have you already had to address? What risks have your peer organizations seen? Consider multiple sites, locations within your organization Consider outside service vendors (e.g., credit/collection agency activities)4ZyZZZxZZ-Z-y       e     How To Get StartedRA word on using sample policies May be appropriate to start with a sample policy However, the regulation requires that the identify theft program be appropriate for the organization s size and complexity and the nature and scope of its activities Therefore, each organization must adapt any sample document to address the specific risks they face and to ensure an appropriate and reasonable organizational response to them2!10P0P0P0P0P &&+  &AHA s Sample Policy,Developed in cooperation with our outside counsel Hogan & Hartson LLP Hospitals can use as a first step in developing their written identity theft programs AHA s sample policy is NOT intended to substitute for responsible legal advice Hospitals should examine the sample document as part of a comprehensive risk assessment Available on the AHA Web site at www.aha.org/redflags *F0P0PV0P0P20P70" PG 4 ?I  5>:\T0g{ DHospitals Primary New Obligations##*Under the new rule, hospitals primary new obligations are likely to be two fold: Systematizing policies in a consolidated written format Obtaining board approval of the initial written policy Only applies to the initial policyR87#R ) #   ReminderRule requires periodic reassessment of risks and, if appropriate, revision of policies and practices Build that into your policy and program from the start Specifically charge someone within the organization with responsibility for maintaining and updating your policies and program Always ask what new risks might be out there Keep up-to-date with the FTC s Web site on identity theft Consider reports from consumer organizations Listen to news coverage  Identity theft is issue of intense current interest in the media Again, not all may apply directly to health care providerste" e "  Note on HIPAA PrivacyPatients frequent complaint: Can t get access to my records when I suspect I m the victim of identity theft Patients report that hospitals cite HIPAA as the reason Patients rights under HIPAA: To access his/her medical records, and To request changes to their records Why HIPAA probably isn t a barrier: It s the patient s information It s an incidental disclosure, at most It probably involves deidentified data Remember when developing your policies and practices: It s always about your relationship with your patients*n" P8P" PKP$" PmPn" Pn8K$m<, t  ResourcesE AHA Red Flags Rule issue Web site found at www.aha.org/redflags 4F" & B&$0T00D7 00N0 6. &(  & & c $p # "pH & 0޽h ? 33___PPT10i.+D=' = @B +rs= "O=a 1