ࡱ> {}z MbjbjVV .n<<E     !!!!Lm<!+\\\*******,T/6* \\\\\*  *```\:  *`\*``/&|&N!&**0+&6//$&&6/ )*l\\`\\\\\**`\\\+\\\\/\\\\\\\\\ : January 24, 2012 Computer Services has received requests to move from our current email system to Googles Gmail. We have discussed this in our Technology Meeting and we agree that this move would be beneficial to GBC. Below are listed some of the main benefits for us to move to Gmail. We would like to get a consensus from the senate for this move. Here are some main reasons for moving to Googles Gmail. Larger storage. User accounts for GroupWise are set to 250 megabytes due to limited storage space, whereas Gmail offers 25 Gigabytes or 100 times more storage space. Hardware costs for us to upgrade to larger storage would at a minimum $50,000 and for the same storage capacity as Gmail it would be several time this amount. User storage includes backup storage and addition backup software costs. This cost would have to be repeated ever 4 or so years for hardware upgrades. Gmail is free for higher education. This move would free up time spent training, upgrading software and maintenance on existing servers. There would be less down time. Gmail has similar capacities as our current email system plus extras that we have not been able to host here, such as non-sensitive file sharing and shared document editing. This would allow e-mail access to more mobile devices. Elko County School District and SCS have moved to Gmail. There are other NHSE intuitions also looking at moving to Gmail. I have included the link to Googles website that describes the services they supply for higher education and frequently asked question. I have also included some of the pages from Googles website.  HYPERLINK "http://support.google.com/a/bin/answer.py?hl=en&answer=139019" http://support.google.com/a/bin/answer.py?hl=en&answer=139019 1. Students will love you for it Schools tells us that when they ask their students what email they'd prefer, they overwhelmingly say Gmail. Our students approached us about a year ago, saying that we needed to improve our email and collaboration services. We actually had our student government tell us, 'we want you to implement Google Apps.' Wendy Woodward, Director of Technology Support Services, Northwestern University  2. Free up your IT Focus your IT on activities that add value instead of worrying about the uptime of your email services. Google Apps has allowed us to get out of providing these commodity type services - such as maintaining an email and calendaring system - and focus on the things that we are uniquely equipped to do, like providing more resources to be able to better support teaching, learning and research. Todd Sutton, Assistant Vice Chancellor for Application Services, UNC Greensboro  3. Easy to deploy No software to install, no hardware to buy, just validate your MX records and create your accounts to get started. To integrate with what you already have, we work with open standards, have created a multitude of APIs, can point you to  HYPERLINK "http://code.google.com/apis/apps/open_source_projects.html" open source solutions for common integrations, and have  HYPERLINK "http://www.google.com/enterprise/marketplace/search?orderBy=rating&query=education" approved partners with experience deploying Apps in schools. After struggling for several months to try to implement an alternative web hosted e-mail solution, we eventually turned to Google Apps which we were able to get up and running within a matter of hours. Jhonny Oliveira, IT Manager, University of Lisbon  4. Save money Outsourcing the maintenance of servers to Google frees up resources that would have been spent on additional licenses and upgrades. This helped our IT staff understand that their focus should be on strategic enterprise solutions to help us reach our educational objectives, not just overseeing commodities like email. Had we not gone with the Google solution, we'd be looking at proposing a significant increase in student fees. Eric Hawley, Utah State University Associate Vice President for Technology  5. You're not alone Thousands of Universities are using Google Apps and are happy to talk about it.  HYPERLINK "http://www.google.com/support/a/?hl=en" Talk to other customers on our Google Apps for Education community group or read and watch our  HYPERLINK "http://www.google.com/apps/intl/en/edu/customers.html" customer case studies.  6. Google protects your privacy We take privacy very seriously. Our business is built on our users' trust: trust in our ability to properly secure your data and our commitment to respect the privacy of the information you place in our systems by not giving that information to others or using it inappropriately. More specifically, read our  HYPERLINK "http://www.google.com/support/a/bin/answer.py?answer=60762&src=top5&lev=index&hl=en" FAQ on privacy, visit our  HYPERLINK "http://www.google.com/intl/en/privacy.html" Privacy Center, and  HYPERLINK "http://googleblog.blogspot.com/2006/03/judge-tells-doj-no-on-search-queries.html" review how we've handled challenges to users' privacy in the past.  7. Security as powerful as... well, Google The security that is provided to Google Apps customers is the same security that we rely on to protect www.google.com. In addition,  HYPERLINK "http://youtube.com/watch?v=s_a-gn0dYmk" we run our company on Google Apps. We're confident that Apps can meet the needs of the most demanding enterprises, because we're one ourselves. Google is a complex, global company in a fast-moving and competitive industry, and everything we do is powered by Apps. To get that kind of adoption here, it means Apps has passed a daunting bar for Enterprise suitability. If it can work for us, surely it can work for you, too. Ben Fried, CIO and Vice President of Engineering, Google  8. Innovation in real-time What better way to prepare your students for the newest technology in the workplace, than by giving it to them as a part of their education? The response from the university community has been extremely positive because we are now partnering with cutting-edge technologists who understand that we're trying to provide the latest, most innovative technologies available today. Roy B. Roberti, Director of Information Technology Planning, Hofstra University  9. Collaborate globally Google Docs, our word processing application, doesn't just give you access to the same document, it actually allow students to work on the same document at the same time from anywhere in the world. Collaborative projects really make for an excellent education experience not only because students bounce ideas off each other and improve each other's writing skills, but also because the process itself teaches them how to work well with others - a valuable skill for everyone. Richard Ellwood, Technology Coordinator and Digital Arts Teacher, Columbia Secondary School  10. We've got your back Need help? We're here to help you when you need it either through our  HYPERLINK "http://www.google.com/support/a/?hl=en" Help Center, our  HYPERLINK "http://groups.google.com/group/apps-edu-circle/topics" education customer group, or directly through the  HYPERLINK "http://www.google.com/support/a/bin/answer.py?answer=77928&hl=en" phone and email contact information provided in your administrator dashboard.  HYPERLINK "http://www.google.com/apps/intl/en/edu/privacy.html" http://www.google.com/apps/intl/en/edu/privacy.html A technology platform schools can trust Our business is built on your trust. We recognize that schools expect us to properly secure their data and respect the privacy of their information. We therefore take data security and privacy very seriously. Google Apps is designed to provide your educational institutions with a safe, reliable platform for its data -- offering better security and reliability than most schools could achieve on their own. Google Apps is also governed by a detailed  HYPERLINK "http://www.google.com/intl/en/privacypolicy.html" Privacy Policy, which ensures we will not inappropriately share or use personal information placed in our systems. Students are thrilled, and we feel comfortable that security and privacy issues have been met. Wendy Woodward, Director of Technology Support Services, Northwestern University The Google Apps Terms of Service contractually ensures that your institution (or students, faculty, and staff) are the sole owners of their data. Because customers own the data they put into Google Apps, we believe it should be easy for your users to  HYPERLINK "http://dataliberation.org/google/apps-for-business" move their data in and out of our systems. The controls, processes and policies that protect user data in our systems have obtained a SSAE 16 Type II attestation and will continue to seek similar attestation. Google complies with applicable US privacy law, and the Google Apps Terms of Service can specifically detail our obligations and compliance with FERPA (Family Educational Rights and Privacy Act) regulations. Google is registered with the  HYPERLINK "http://export.gov/safeharbor/" US-EU Safe Harbor agreement, which helps ensure that our data protection compliance meets European Union standards for educational institutions. No advertising to students, faculty, or staff We offer Google Apps for Education to schools for free. It's also completely ad-free -- which means your school's content is not processed by Google's advertising systems. Better protection for your school's domain Google operates one of the most  HYPERLINK "http://googleenterprise.blogspot.com/2010/03/disaster-recovery-by-google.html" robust networks of distributed datacenters in the world. The protection of the intellectual property on these servers is critically important to us -- in fact, employees at Google, Inc. rely upon the same Apps production environment used by our education customers. Google Apps brings you the latest technologies and some of the best practices in the industry for network application security and user privacy, as summarized below. Google's privacy policy protects your users: It's your content, not ours. Your Apps content belongs to your school, or individual users at your school. Not Google. We don't look at your content. Google employees will only access content that you store on Apps when an administrator from your domain grants Google employees explicit permission to do so for troubleshooting. We don't share your content. Google does not share personal information with advertisers or other 3rd parties without your consent. We sometimes scan content. And for very good reasons, like spam filtering, anti-virus protection, or malware detection. Our systems scan content to make Apps work better for users, enabling unique functionality like powerful search in Gmail and Google Docs. This is completely automated and involves no humans. Note that there are a few common-sense exceptions to the points above, like valid legal processes and maintaining the safety and security of our systems. For more information, see our detailed  HYPERLINK "http://www.google.com/intl/en/privacypolicy.html" Privacy Policy,  HYPERLINK "http://www.google.com/corporate/privacy_principles.html" Privacy Principles, and  HYPERLINK "http://www.google.com/apps/intl/en/terms/education_terms.html" Terms of Service. Google's security resources help protect your data: People Google employs a full-time information security team including some of the world's foremost experts in information, application, and network security. This team is responsible for the company's perimeter defense systems, security review processes, and customized security infrastructure, as well as for developing, documenting, and implementing Google's security policies and standards. We looked long and hard and analyzed in much detail the security that Google offered in this space and at the end of the day, a world class security team from Motorola came back and said this is ready to go. Walt Oswald, VP of IT, Motorola Mobile Devices Process Security is part of Google's DNA, and core to our design and development process. Google applications go through security reviews as part of the Secure Code development process. The application development environment is closely restricted and carefully monitored to maximize security. External security audits are also regularly conducted to provide additional assurance. Technology To reduce exploit risks, each Google server is custom-built with only the necessary software components, and the homogeneous server architecture enables rapid updates and configuration changes across the entire network when necessary. Data is replicated in multiple data centers for redundancy and consistent availability. Additional security and privacy features can also be found in the Apps products themselves, such as Gmail's exceptional spam and virus filters; default https (encrypted) access to Apps services, blocked transmission of EXE files, and more. Additional safeguards for research and teaching staff As an add-on to Google Apps,  HYPERLINK "http://www.google.com/postini/" Postini services can help your school further safeguard information and meet security and compliance requirements. Message security tools enable your administrators to create a variety of policies and filters for your school's email (beyond the strong spam and virus filtering in Gmail), while mail archiving and discovery tools allow schools to retain emails in a centralized, searchable repository for up to 10 years. Security FAQs  HYPERLINK "javascript:void%200" Who owns the data that organizations put into Google Apps?  To put it simply, Google does not own your data. We do not take a position on whether the data belongs to the institution signing up for Apps, or the individual user (that's between the two of you), but we know it doesn't belong to us! The data you put into our systems is yours, and we believe it should stay that way. We think that means three key things. We won't share your data with others except as noted in our Privacy Policy. We keep your data as long as you require us to keep it. Finally, you should be able to take your data with you if you choose to use external services in conjunction with Google Apps or stop using our services altogether.  HYPERLINK "javascript:void%200" Where is my organization's data stored?  Your data will be stored in Google's network of data centers. Google maintains a number of geographically distributed data centers, the locations of which are kept discreet for security purposes. Google's computing clusters are designed with resiliency and redundancy in mind, eliminating any single point of failure and minimizing the impact of common equipment failures and environmental risks. Access to data centers is very limited to only authorized select Google employees personnel.  HYPERLINK "javascript:void%200" Is my organizations data safe from your other customers when it is running on the same servers?  Yes. Data is virtually protected as if it were on its own server. Unauthorized parties cannot access your data. Your competitors cannot access your data, and vice versa. In fact, all user accounts are protected via this virtual lock and key that ensures that one user cannot see another user's data. This is similar to how customer data is segmented in other shared infrastructures such as online banking applications. Google Apps has received a satisfactory SSAE 16 Type II audit. This means that an independent auditor has examined the controls protecting the data in Google Apps (including logical security, privacy, Data Center security, etc) and provided reasonable assurance that these controls are in place and operating effectively.  HYPERLINK "javascript:void%200" What does a Google Apps SSAE 16 Type II audit mean to me?  An independent third party auditor issued Google Apps an unqualified SSAE 16 Type II attestation. Google is proud to provide Google Apps administrators the peace of mind knowing that their data is secure under the SSAE 16 auditing industry standard. The independent third party auditor verified that Google Apps has the following controls and protocols in place. Logical security: Controls provide reasonable assurance that logical access to Google Apps production systems and data is restricted to authorized individuals Privacy: Controls provide reasonable assurance that Google has implemented policies and procedures addressing the privacy of customer data related to Google Apps Data center physical security: Controls provide reasonable assurance that data centers that house Google Apps data and corporate offices are protected Incident management and availability: Controls provide reasonable assurance that Google Apps systems are redundant and incidents are properly reported, responded to, and recorded Change management: Controls provide reasonable assurance that development of and changes to Google Apps undergo testing and independent code review prior to release into production Organization and administration: Controls provide reasonable assurance that management provides the infrastructure and mechanisms to track and communicate initiatives within the company that impact Google Apps  HYPERLINK "javascript:void%200" Can my organization use our own authentication system to provide user access to Google Apps?  Google Apps integrates with standard web single sign-on systems using the SAML 2.0 standard. Organizations can do the integration themselves, or work with a Google partner to accomplish this. u   ! a b v    ! B C M P Q R Y + {    # $ + \ g q  h 5h/h'h&+$h'#h Lh _hph:h%hVh`h6-hqhP8Mb C { $ j7 dd[$\$gd/ddd[$\$gd/ddd@&[$\$gd/gd/gd 5gd% & Fgd' & Fgd% & Fgd: & Fgd: %6MNZ7-~į|įaįH1jh/h/CJOJPJQJUaJmH sH 4jh/h/CJOJPJQJUaJmHnHu4jh/h/CJOJPJQJUaJmHnHu.h/h/6CJOJPJQJ]aJmH sH (h/h/CJOJPJQJaJmH sH .h/h/5CJ$OJPJQJ\aJ$mH sH h)h/0J h/h/h/jh/Uhqh 5 -p;e1 dd[$\$gd/ddd[$\$gd/ddd@&[$\$gd/ dgd/efwxpeOPTUҷҷlQlҷ4j h/h/CJOJPJQJUaJmHnHu.h/h/5CJ$OJPJQJ\aJ$mH sH 4j< h/h/CJOJPJQJUaJmHnHu.h/h/6CJOJPJQJ]aJmH sH 4h/h/>*B*CJOJPJQJaJmH phsH 1jh/h/CJOJPJQJUaJmH sH (h/h/CJOJPJQJaJmH sH   1fg,-34j涛h4j@h/h/CJOJPJQJUaJmHnHu.h/h/5CJ$OJPJQJ\aJ$mH sH 4jh/h/CJOJPJQJUaJmHnHu(h/h/CJOJPJQJaJmH sH 4h/h/>*B*CJOJPJQJaJmH phsH 1jh/h/CJOJPJQJUaJmH sH $jR> s!"""#$$$%M%%&'gd/ddd@&[$\$gd/ dgd/ dd[$\$gd/ddd[$\$gd/j> """""#K#L###ӸӠӅӠjӠQQ1jh/h/CJOJPJQJUaJmH sH 4j+h/h/CJOJPJQJUaJmHnHu4j 'h/h/CJOJPJQJUaJmHnHu.h/h/5CJ$OJPJQJ\aJ$mH sH 4j!h/h/CJOJPJQJUaJmHnHu(h/h/CJOJPJQJaJmH sH .h/h/6CJOJPJQJ]aJmH sH ######### $ $Z$[$~$$$$$$$$$"%#%$%M%''Q'R'`'a''(y(w)x)))))|+}++̷̷̷̷̷̷̷k̷̷̷.h/h/6CJOJPJQJ]aJmH sH .h/h/5CJ$OJPJQJ\aJ$mH sH h)h/0J h/h/jh/Uh/(h/h/CJOJPJQJaJmH sH 1jh/h/CJOJPJQJUaJmH sH 4h/h/>*B*CJOJPJQJaJmH phsH *''({())*^+<,k,-D-.t//00q12|4 & Fddd[$\$gd/ddd@&[$\$gd/ddd@&[$\$gd/ & Fddd[$\$gd/ddd[$\$gd/ dd[$\$gd/++++<,k,-D-d-e-----t///08001q11j3k3333333444444g4h4x4y4|444涞涆nnnn涆n.h/h/5CJOJPJQJ\aJmH sH .h/h/5CJOJPJQJ\aJmH sH .h/h/5CJ$OJPJQJ\aJ$mH sH (h/h/CJOJPJQJaJmH sH 4h/h/>*B*CJOJPJQJaJmH phsH 1jh/h/CJOJPJQJUaJmH sH +|44>67A78:;:;+=,=-=.=/=0=1=^gd:gd/ddd@&[$\$gd/ddd[$\$gd/ddd[$\$^gd/ & Fdd[$\$^gd/ & Fddd[$\$gd/ddd@&[$\$gd/47?7A7H788;:;W;X;;;;;+=,=-=2=A=B=okgkK7jh/h/5CJOJPJQJU\aJmH sH h:h/4h/h/>*B*CJOJPJQJaJmH phsH 1jh/h/CJOJPJQJUaJmH sH .h/h/5CJ$OJPJQJ\aJ$mH sH .h/h/5CJOJPJQJ\aJmH sH .h/h/6CJOJPJQJ]aJmH sH (h/h/CJOJPJQJaJmH sH 1=2=A==> ?V??5@@BnBBDE9F4GGFH & Fddd[$\$gd/ & Fddd[$\$gd/ddd[$\$gd/ddd@&[$\$gd/ddd@&[$\$gd/^gd:B=c=d====5@6@W@X@@@@nBoBBBBBBEEEE7F8F9FGGFHNHHIII5JGJJ KKKKK>L?L@LMM̮̮̮̮虁̮}h/.h/h/5CJOJPJQJ\aJmH sH (h/h/CJOJPJQJaJmH sH :h/h/5>*B*CJOJPJQJ\aJmH phsH 7jh/h/5CJOJPJQJU\aJmH sH .h/h/5CJOJPJQJ\aJmH sH /FHHI5JJK@LMM^gd:ddd[$\$gd/ddd@&[$\$gd/ & Fddd[$\$gd/,1h/ =!"#$% Dd  A?(laptopPicture 1Description: laptop"b(psL,ʏDn|(psL,ʏPNG  IHDR00` tEXtSoftwareAdobe ImageReadyqe<PLTEqn؈[ya~}u%tKlc&vriuE.Qaupgmyxgymwk&{g{quiv硺 |R uvѐ kfHM@tRNS{DIDATxkS1 {%nPTX"B$YNUO 0sΛyK?-\#tkh/},o(D_ WtndD)e 2/al~]IQy^@Ay%,2Z<, 6Fc-<^pCc?06w N9u0}T!t+Q!)p[L\DžWM\BOl!u`s9r>Y  C rWX8NG@iܺFJ3\J%=jy+;n̘t^f𶩣Uk07eEMZ 4gB STRg5A A&0BxoxZ~/_*@Θ4E _"qfCŇdF^:ִ+ 'YB126aϽ9!e2(&O.!`7R@p}IENDB`Dd  A?(blocksPicture 2Description: blocks"b?!喇&dn\?!喇&PNG  IHDR00` tEXtSoftwareAdobe ImageReadyqe<PLTEKA;DfC"C$F2_9 =<<:;|?Th:D0b:A$E=<(E>G?ИJ.F@oKAS1G$HIP{9:>= W+UH&H<;=;;Jiv @tRNS{DIDATxkC0L+TR+"%gWjgH}}~^܎ F==NG G{Hiu{# !:~!~AH:b.m%A(@|A(ܿiMtdsi=Xq HoW 0.=xWWECEn}jecO!V`_xY6'k#<1h۶ hz_$@ 0)MȞ6$y ٢^W>K3*XL&CC/à)PI s7}sj ٶ&O6Ӝvvz⊥ap-8.O$>cvv{ve|2ozY7ƽu=K^Aiiu1Kқ& ./Ou8w)W'Zؚ۵7撛u7u֗bs;IENDB`Ddvv  |A ?&moneyPicture 3Description: money"bۄ@ \յP  nۄ@ \յP PNG  IHDR**9i`PLTEgIl8{s(kuW`KaUҏh #Q98IytRNS@fIDATx^r: `7b잉@ɑ5)#Bw,Az}TK9""D $#4/=t0L,%h\)B;}Hb|U׏+ )q' n8:[{O٥8R=0} nws!fÀsDh]=&ߖ )M*MG>!z4&-KޒٚXjչ:h\Ιٺ-FR 1@#,.*Ytq"AJ!35ԍ*6TZ .c0.;i8z@2JxDPum(-N7J1Ⱥr$W%mtg}j@xP(ڹѡK%EP|~.V,WΟ{']BxGmӺS)Rzˋf#8&{9$*eX;J7 c ]jX;1J]z`([^F35]TdUv遟}KӢ7ժ[^Z1YYm8|u<%~"3R@x:Z˻F!oQ#dybZ}X/kq8u,O0=??}bTIENDB`Ddvv  A?4chat bubblesPicture 4Description: chat bubbles"bHYwR;mINnHYwR;mIPNG  IHDR**9itEXtSoftwareAdobe ImageReadyqe<PLTEn<9~ÝWREA"C+HGN <:(D;J;Ê=ثڷȕʑ5H8bЖ>?Ե-FAL1G >ʜ3JXٰ?00?xlFI޽xx06d61V>ɛ(Ȋz$ yJq_R/haK)B?R}:Pn)Ѐ;2_- R0*}v8\uu^"ucpWyW֥DˀdA-)K:U)餜F y%kU DYD9gALwbӐZ=<WP`a>ǒ ʏmJmY*9jҽ _lr߳!;UW1վ~xZ:n:ziiRG[_ܧEȥIENDB`jDd  A?*padlockPicture 5Description: padlock"b`6?I%, \EnOP߸O//\又A0U| |9_uk>wc;W`vm(8-!kY0e jY38 [=^ z)(޶NEPoӖ'U8U7V1V+ %asfp,͕w6؇Vm\ƞhY;|%.Q\'()/ oo><{}#2y~r|OFyzxBcr82_/#>M_Z'go0sQc){ usi9y.BÏx/C|MARPfB3ޢ3th&?)FQLjp8{F; lY\n6/e_Lg6IENDB`T Ddvv  A?2alarm clockPicture 6Description: alarm clock"b:υaNnυaNPNG  IHDR**9itEXtSoftwareAdobe ImageReadyqe<PLTE<گGU9-bXMq>"%#c20B͌!O+6a &$=ݘ*ٖ)lzx,Dm.un8[:QJD>|ʌnd :B@nґ%4 ޳TY-؜ _-eM;)i3ἄN\SHctSʋ ŇԒ%d̜2F߂yfה'䁺~aH6}y@)΅Oh ҇0kGSÅfЂ*w@"2j#ݞ7IݴOru~ώ#ZU\2;Xѓ)M~`M,\  $А!r]ײz?FBRVTϛ;|ۙ.}۝,r/pvI2656hLjÈRѢ9ܨ7C*EtRNSS%IDATxb텟 y0@gK;t8]\gQ;Gd n D:빣E=xaJdcWEPѐW;TTERhF;0O*QŢyՉz=m+%:NUնZPcqDmeRANuKPP.4@+@j+`g3,L t;]钅L=m*r@ jQ,K LWjF lORz;^e@Cmd?-~D{h ;^yI SjX ^gKΣY~Jg,LdaKL >P vs8]A*me@*u%< ]%*A*7Y3K$D%zF4ЫTr,sJwuI'L[/(t6FzeR P'bѕ4LUQ \'?aZP*Ds9]8P!Lsn[} F> ljWϓER -2'5g.( ])wvηG@leZX,W)ϻR{&WX *d=xsD eU(ylaJwSR&$S&8s6MHhg)p+f9a+Jj)Q$wkJ"qW.ǫF(Wc,Z xA݊6ɚZ@$Y"EK*Ӓ'5ґ^ Ya5ծ%_UP?cWr0oFDšTT{4t$I5v[PK%0q殥tQXrELS7 +u8F{,kS@MPhĉQU_4i3 bcTkO#R4hl}N*Wn_>Fÿe63nAhVT 0 k{IENDB`Dd  |A ?&booksPicture 8Description: books"b^ /<=G[P'nS^ /<=GPNG  IHDR00` PLTEord֏vdh\tjm`s3^V~qy|lÿtwiv8Ơb$^bX\NRKbv)aRWOW\SMh隈mH{o'ujAF?׹hEJBߎث.ԪɈ9v7->C<"?itRNS@f0IDATx^Ւ0-02qnƒ,C6WוLd',xl >K3ϰ«Uw80+n(јZ63i>PNG  IHDR**9itEXtSoftwareAdobe ImageReadyqe<PLTEmv8 HhV$Qm*eze#S6}Ƽ׌Cd]4܁xY+ÑF' T ,8ܥ@tRNS{DIDATxڼr0ȇAPZDZjZzwՓ }Ag|14:y7'2((ޟt.@,:)![Oyٳܱ[/Ԛvp>(TY'̟-qsIENDB`j 666666666vvvvvvvvv666666>6666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~ OJPJQJ_HmH nH sH tH J`J Normal dCJ_HaJmH sH tH DA D Default Paragraph FontRiR 0 Table Normal4 l4a (k ( 0No List 6U`6 /0 Hyperlink >*B*phPK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] E n j#+4B=M')+,./135'|41=FHM(*-0246M  e w OT f,3K Z~"Q`w!!!|###d%%%j++++,,,g,x,W333A5c5558W88n:::==7>CC>DEXXXXXXXXXXXXXXXXXXXXXXXXXX8@0(  B S  ?r x #33v=y=Eu8Aa #EEj.| H/Vt]Qw6fqJQ3e{2h ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(j6fqQ3e{H/]Q          %~c)`utO~c ,fu ~c ,x~c ,jgPmj6* |j^`hj^UA"{h_kdd`~c ,U6(]dd6*EC,l<[dd839tOddBR99rddiJZg QJMfu ddbNxddgP|vRp!Sj^pV~c ,l<[~c ,6(]iJj^jkL|`iJ a~c ,Y7dbuxddhttp://www.google.com/apps/intl/en/terms/education_terms.html}@68http://www.google.com/corporate/privacy_principles.htmlG31http://www.google.com/intl/en/privacypolicy.html0Nhttp://googleenterprise.blogspot.com/2010/03/disaster-recovery-by-google.htmlW-http://export.gov/safeharbor/;6*3http://dataliberation.org/google/apps-for-businessG'1http://www.google.com/intl/en/privacypolicy.html3j$4http://www.google.com/apps/intl/en/edu/privacy.htmlR!Ahttp://www.google.com/support/a/bin/answer.py?answer=77928&hl=en6http://groups.google.com/group/apps-edu-circle/topics|m'http://www.google.com/support/a/?hl=en s'http://youtube.com/watch?v=s_a-gn0dYmk XQhttp://googleblog.blogspot.com/2006/03/judge-tells-doj-no-on-search-queries.htmlk8+http://www.google.com/intl/en/privacy.html#"Thttp://www.google.com/support/a/bin/answer.py?answer=60762&src=top5&lev=index&hl=enJ 6http://www.google.com/apps/intl/en/edu/customers.html|m 'http://www.google.com/support/a/?hl=en7*Shttp://www.google.com/enterprise/marketplace/search?orderBy=rating&query=educationP;http://code.google.com/apis/apps/open_source_projects.html >http://support.google.com/a/bin/answer.py?hl=en&answer=139019  !"#$%&'()*+,-./012345679:;<=>?@ABCDEFGHIJKLMNOPRSTUVWXYZ[\]^_`abcdefghjklmnoprstuvwxy|Root Entry Fz~Data 801TableQ/WordDocument.nSummaryInformation(iDocumentSummaryInformation8qCompObjy  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q