ࡱ> }| 2}bjbjT~T~ :662uppd+L'wwwwwRRRk'm'm'm'm'm'm'$),D'RR'ww'Rwwk'k'r$T%w`7IUY;%W''0'I%,_,%%,&R^4LRRR''/RRR',RRRRRRRRRp y: Conducting Human Subjects Research at ñ Transcript for HSRWorkshopFall2010 [Slide 1] Welcome to this session on conducting human subjects research here at ñ. My name is Kevin Brown, and I am the chair of the Institutional Review Board (IRB) which is responsible for reviewing all research projects which involve human subjects. [Slide 2] Lets first look at some examples of human subjects research being done on campus. Members of the History department have taken oral histories of prominent individuals, in Psychology, students are often given surveys about their opinions, in Education, new teaching methods are evaluated, and Womens Studies has looked into womens health issues by interviewing human subjects. [Slide 3] Here are more examples from Kinesiology, Entrepreneurship, Sociology, and Criminal Justice. [Slide 4] And yet more examples from Computer Science, Social Work, Anthropology, and Communicative Science. You can see that the projects span many departments and that the subjects typically participate by submitting to an interview or filling out a survey. Sometimes we see more elaborate participation such as the language treatment interventions done in the Department of Communicative Disorders or the video modeling done in Kinesiology. [Slide 5] The principles of protection of human participants in research were established in the Belmont Report in 1979. The Belmont Report was prepared by the National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research at the request of the Secretary of the Department of Health and Human Services (DHHS). The report identified three principles essential to the ethical conduct of research with humans: The first is Respect for persons, which consists of acknowledgement of autonomy, and protection of those with diminished autonomy (children, prisoners, the elderly), Essentially, prospective research participants must be told what they need to know in order to decide whether to participate in a study or not. There should be no pressure to participate and ample time to decide. Respect for persons demands that participants enter into the research voluntarily and with adequate information. This is called informed consent. In addition, special provision needs to be made when participants are considered incapable of informed decision making (such as with children or people with severe developmental disorders or dementias). Even for these persons, however, respect requires giving them the opportunity to choose whether or not to participate in research activities to the extent they are able. The second principle is Beneficence, which consists of do not harm, and maximizing benefits while minimizing possible risks. So first off, you cannot run a project at all where you know the participants will be injured Then the problem posed here is to decide when it is justifiable to seek certain benefits despite possible harms or risks. Balancing risks and benefits is an important consideration. The goal of much of the research we do at ñ is societal benefit from publication of the project results as opposed to personal benefit to the individual; however, in the interest of benefiting society; you may not harm the individual. The last principle is justice, which deals with how the burdens and benefits of research are distributed. For instance, if the research may lead to a new drug treatment which benefits all society, the burden of acting as research subjects should not fall solely on the poor. The concept of justice may be questioned when deciding who will be given an opportunity to participate, who will be excluded, and the reasons for exclusion. When making such decisions, the researcher must ask: Are some classes of persons being selected simply because of their availability, their compromised position, or their vulnerabilityrather than for reasons directly related to the problem being studied? These three principles formed the foundation for the conduct of research, including guidelines for obtaining informed consent, respect for privacy and confidentiality, and risk/benefit assessment. [Slide 6] The Belmont Report was developed partially in response to one of the worst lapses in ethical treatment of human subjects in the United States, the Tuskegee Syphilis study. The study was meant to look at the effects of untreated syphilis. More than 400 African American men with syphilis participated, and about 200 men without syphilis served as controls. The men were recruited without informed consent and, in fact, were misinformed that some of the procedures done in the interest of research (e.g., spinal taps) were actually special free treatment. By 1936, it was apparent that many more infected men than controls had developed complications, and 10 years later, a report of the study indicated that the death rate among those with syphilis was about twice as high as it was among the controls. In the 1940s, penicillin was found to be effective in the treatment of syphilis. The study continued, however, and the men were neither informed nor treated with the antibiotic. When the studys existence was made public in 1972, public outrage led to government regulation of federally funded research using human subjects. [Unfortunately, there are many other examples such as injection of institutionalized children with the Hepatitis virus, injection of cancer cells into chronically ill patients, the governments experiments in exposing people to radiation during development of the atom bomb, etc.] [Slide 7] By 1981, the Department of Health and Human Services had published guidelines for human subjects research and by 1991, 17 federal departments and agencies has agreed to use the same guidelines the common rule. These regulations are published in 45 Code of Federal Regulations (CFR) 46. They provide for the establishment of IRB and procedures for assuring that human subjects are protected. In fact, the regulations specify the minimum requirements that an institution must enforce. An institution may adopt procedures that are more stringent than the federal regulations. By law, the regulations apply to federally funded research, but the institutions policies may apply the regulations to all research. When the institution files its Assurance that it will comply with the regulations, it is asked whether it will review only federally funded research or all research. Most institutions review all research and in fact, in 1980, CUSEB elected to review all research rather than only federally funded research. [Slide 8] There are some gray areas in the regulations, specifically regarding some definitions. Research is defined to be a systematic investigation designed to develop or contribute to generalizable knowledge. At ñ, we take that to mean anything which is published. This includes Masters theses and even class projects if they are published. [Slide 9] Another important definition is that of Human subject. This is a living individual about whom an investigator conducting research obtains: Data through intervention or interaction with the individual, or Identifiable private information [Slide 10] So many people want to know: What isnt human subjects research? Journalism is not because the stories are not considered generalizable knowledge.. Research on publicly available data is not because the data must be private to be considered HSR). An example of non-HSR would be research done using census records. Research in which the information obtained is not about a person is not HSR. For example, if you interviewed engineers regarding the construction techniques used to build the new Bay Bridge. If you interviewed them regarding their opinions about whether it was wise to charge an extra dollar toll to finance the bridge construction though, that would be human subjects research. In order for it to be considered HSR, the individuals studied must be living. Gathering historical information may be research but it is not under the IRB's jurisdiction. In addition, the information has to have at least one of the following characteristics: Either it is gathered through intervention or interaction with the individuals studied, and/or it contains identifiable private information. So observation of individuals without interaction or identity determination does not count as "human subjects research". For example, watching crowds and counting the number of individuals wearing Old Navy Jackets who pass by does not count as "human subjects research", but as marketing information. Also studying identifiable public figures without interaction or the collection of private information is not "human subjects research". For example, analyzing magazine covers which feature Jennifer Aniston is not "human subjects research" by this definition. Collection of identifiable private information in a form which cannot be associated with an individual may or may not be considered research. For example, asking students to anonymously evaluate a course is an example of private information not associated with individuals and is not HSR, but asking students to anonymously provide stories from the childhood is. If you are at all unsure whether your project is HSR or not, please contact the chair of the Institutional Review Board. [Slide 11] If your project is human subjects research, then you must submit a research protocol (which Ill describe in a moment) to the IRB. The IRB screens the protocol to make sure that human subjects are involved. If so, it then determines if the project falls into one of several exemption categories. If so, it can be reviewed by the IRB chair and approved pretty quickly. If not, then protocol undergoes either expedited or full review by some set of the IRB members. Full review requires a board meeting whereas expedited review can be via mail or email, so it is typically faster. The regulations specify what types of research may undergo expedited review. Once reviewed, it is often the case that the IRB requests that modifications be made before granting approval in order to protect the human participants of the project. After approval, on at least a yearly basis, the research is reviewed again. This is called continuation review. The longest period of approval allowed by federal regulation is one year. [Slide 12] The regulations state that the IRB may find certain types of research exempt from review. The first exemption is: Research conducted in established or commonly accepted educational settings, involving normal educational practices. This exemption often applies to research done within the College of Education and Allied Studies. The second and most commonly applied exemption is: Research involving the use of educational tests (cognitive, diagnostic, aptitude, achievement), survey procedures, interview procedures, or observation of public behavior. The caveat here is that the exemption may not be applied if i) the subject may be identified and ii) Disclosure may result in risk of criminal or civil liability or damage to the subjects standing or reputation. So if you give a survey in which you ask about criminal behavior, drug use, child abuse, or disease status, unless the survey is completely anonymous, the project may not be found exempt. [Slide 13] There are additional exemptions as well, but I have seldom seen them applied here at ñ. [Slide 14] Please remember that the P.I. may not make the determination of exemption themselves. That is done by the IRB. In many cases, research that fits into an exemption category but which still poses some risk to the subjects is reviewed by the board. Also, there are exceptions to the exemptions. For instance, exemptions do not apply to research involving prisoners. The survey/interview exemption (exemption 2) does not apply to research involving children and the observation of public behavior exemption (exemption 2) does not apply to research with children except where the investigator does not participate in activities being observed. Plus there is a clear conflict of interest in allowing a P.I. to make the exemption determination themselves. [Slide 15 The Research protocol] Now that youre ready to submit a research protocol, what should be in it? Basically, youll describe your project, how you plan to use human subjects, the risks they might experience, and how you plan to mitigate those risks. Youll also describe how you plan to obtain the consent of the subjects. The protocol template we use here at ñ is available on the IRB website. Again, this is the form you will submit to the IRB to request approval for your project. Lets go through the sections and talk about what goes in each part. Some sections are self-explanatory but others could use some clarification. [Slide 16 Protocol Elements] Beyond the title and names and whatnot are the starting and ending dates of the project (Section III). Please be aware that IRB approval must be given prospectively, before the research is done, and even before you start to recruit potential participants. Federal regulations do not allow retrospective (after the fact) review and approval. Given the different types of review, there are different lead-times. 1-2 weeks for exempt research, 3-4 for expedited, and 4-5 for full board review. Full board review requires an in-person meeting of the board and is pretty uncommon. Most projects are reviewed as exempt or expedited. Of course, the board tries to get them reviewed as quickly as possible, but you should give them adequate time. Section IV Qualifications. If the investigators will be doing anything for which they need qualifications, those should be listed here. For instance, if the investigator or assistants were going to take someones blood pressure, do mental-health counseling, or put participants through stress tests, they should have the appropriate training or certification to do so. [Slide 17 Protocol Elements] In Section VI (Involvement of other organizations), you should identify any other organizations which are involved in the research project. For instance, if you are a teacher doing a study on your students in a K-12 school, you would need the permission of the principal of the school. If you want to study your colleagues at work, you would need the permission of your manager or perhaps Human Resources. You should submit a letter or email message from the gatekeeper of the organization stating that you have permission to do research on the site with your application. In Section VII, briefly describe your hypothesis, what youre trying to prove or understand given the results of your study. Also describe the value or benefit of completing your project. Usually the value is a contribution to your area of study, but it could also be a cure for cancer. [Slide 18 Protocol Elements] In Section VIII, Research Method and Design, you should briefly describe what procedures youll use to gather your data, the setting in which the data is gathered, and how you will use the raw data to produce results. For instance, you might gather data on peoples heights by measuring them when they come to the student union, then do a statistical analysis. One important factor here is the methodology that is used in the study. The IRB is responsible for ensuring that the benefits of doing the research more than balance out any possibility of harm to the subjects. If a project will not actually produce any usable results, then the benefit is zero and no risks are acceptable. This is not often a problem, but be careful to consider sample sizes and other factors if doing quantitative research. [Slide 19 Human Subjects Involvement] The last section was about what you as the researcher hope to accomplish. In Section IX, the involvement of human subjects should be described. You should list the activities that the subjects will participate in chronologically and describe them in detail. You can think about this from the subjects point of view. What will they be asked to do? Where will they do it? How long will it take? Who will be interacting with the subject at each point? Here you can also describe the training, experience or supervision of the investigator or their assistants, especially where that training is required by law. [Slide 20 Human Subjects Involvement] Then describe the subject population, e.g., the number of subjects you hope to use, their ethnic background, gender, state of health, and especially their ages. Minors are afforded special protections by federal regulations, so the board needs to know if any subjects will be under 18 years of age. Also explain why you have chosen to use your specified population. Are the characteristics appropriate to address your hypothesis or are the subjects convenient, such as college students in your classes? Are there reasons for which you would exclude potential subjects? For instance, if they were ill, had trouble hearing or seeing, or were of a particular political party? There are certain populations that the federal government considers vulnerable. These include children, prisoners, the cognitively impaired and others. There are special regulations which apply when working with vulnerable populations. [Slide 21 Human Subjects Involvement] In section IX.C or as attachments, please be sure to include any surveys, questionnaires, or interview questions that you intend to use when you submit your application. Then describe your recruitment plan. How do intend to recruit your subjects? You might send then an email message, or an actual letter. You might approach them in the parking lot of a clinic (with permission.) You might also ask your own students to participate in a study. Its important, especially in this last case to eliminate any degree of coercion that the subject might feel to participate. If you, as their instructor, ask them, they might feel like they have to participate. We suggest that you have another instructor ask for you or ask after final grades are given. If your subjects may directly benefit in some way from the research, list those benefits in Section IX.E. These would be benefits to the subject like cash payments, gift cards, or possible increase in motor functions from physical therapy, not the certain benefits to society from your paper being published. Participants may not be coerced into participating though by offering inducements which are too large to outweigh their better judgement. The largest amount that might be paid would depend upon the subject group. For instance, if the participants were housewives, then a $50 payment would not be considered undue coercion, but if it was homeless drug users, it might be. [Slide 22 Human Subjects Involvement] The next 2 sections are possibly the most important. You should discuss any possible risks to the subjects and how you plan to mitigate or reduce those risks. Risks might include breach of privacy or confidentiality, stigmatizing subjects by identifying some sensitive characteristic of theirs, embarrassment, deception, concealment, or physical harm. For each risk, state what will be done to reduce the probability of occurrence or to mitigate it. At ñ, most people do very low risk research. The two main risks we see are: Emotional upset (from asking questions regarding death, disease, relationships, racial tensions, etc.) One way to mitigate this risk would be to have a debriefing afterwards where the researcher talks the participant down before they leave. If counseling is available (for students on campus for instance), this would be another way to mitigate the possible harm. Risk of loss of privacy from asking questions about sexual orientation, drug use, criminal or medical history, legal status, etc. Loss of privacy may be handled by ensuring anonymity or confidentiality. [Slide 23 - Confidentiality] Various levels of confidentiality may be maintained by: Locking files in a filing cabinet or encrypting files on a hard drive. Using codes rather than names on survey forms and questionnaires. Giving an anonymous survey where no connection is maintained between the survey forms and the list of participants. In some cases, even making the list of participants public could lead to loss of privacy, say if it was a study of people with AIDS. In this case, it may be necessary to make the study completely anonymous by not recording the list of participants at all. If a researcher is planning to research illegal activity, there is the possibility that the police may subpoena the research documents or require that the researcher testify in court against the participants. In these cases, the researcher may obtain a Certificate of Confidentiality so that the researchers may not be compelled in any Federal, state, or local civil, criminal, administrative, legislative, or other proceedings to identify such research participants. Please note that certain information must be disclosed to third parties by law, including: information indicating a risk of harm to others (usually homicidal thoughts), information indicating a risk of harm to self (usually suicidal thoughts), disclosures about child abuse, and disclosures about infectious diseases required to be reported to public health authorities. [Slide 24 Risk/Benefit] In the risk/benefit section, show that the study has been arranged so that the benefits outweigh the probable risks. In most studies, the risks are negligible, so a contribution to society via dissemination of the study results is an acceptable balance. Studies with higher risks would require more compelling benefits to society or the participants themselves. [Slide 25 Consent Issues] In the next section, well address consent issues, essentially how consent will be obtained, by whom, and how that consent will be documented. [Slide 26 Requirements for Informed Consent] So to ensure that our participants really enter into the research program voluntarily and with adequate information, we must obtain informed consent from the participant. There are 5 aspects of consent to consider: Be obtained from the subject or the subjects legally authorized representative if the subject is a minor or not able to provide legal consent themselves. Be obtained under circumstances that provide the subject sufficient opportunity to consider whether or not to participate and that minimize the possibility of coercion or undue influence. Be in language understandable to the subject or the representative. This is especially an issue for participants who are not native English speakers or who have diminished mental faculties. Not include any exculpatory language through which the subject or the representative is made to waive or appear to waive any of the subject's legal rights, or which releases the investigator, the sponsor, the institution from liability for negligence. Be prospective (no retroactive consent permitted). So you must obtain consent before beginning your research. [Slide 27 -Consent Form] Consent is normally obtained by providing a consent form which describes most of the elements we just discussed. Typically two forms are provided, one which the participant signs and returns, and the other which they keep. Very often, it may be necessary to discuss the points included on the form to ensure that the participant really has read and understands the form before signing. The consent form you intend to use must be included with your application. Lets look at the elements of informed consent now, and we can discuss some of the issues as we go along. 1. An explanation of the purpose of the research, the expected duration of the subject's participation, and a description of the procedure. There is no need to describe the details of the design, especially if this will affect the subject's responses in ways that jeopardize the validity of the research. It is necessary only to describe what the subject will experience in terms the subject understands. Jargon, legalistic terminology, and explanations that are irrelevant to deciding whether to participate should be avoided. 2. A description of any foreseeable risks or discomforts. 3. A description of any benefits reasonably to be expected. 4. A description of the alternatives to participation, where appropriate. 5. A description of how confidentiality or anonymity will be maintained. Also state who will have access to the information (researcher, federal, state or local government, funding agency, etc.) 6. A statement of whether compensation for harm is available. [Slide 28 Consent Form] 7. Indication of whom to contact for answers to questions about the research subject's rights, or in case of a research-related injury. The contacts must include the researcher themselves and the Director of the Office of Research and Sponsored Programs. 8. Indication that participation is voluntary, that refusal to participate will involve no penalty or loss of benefits to which the subject would otherwise be entitled, and that the subject may discontinue participation at any time. The Freedom of subjects to withdraw with impunity is a right that must, by law, be respected, so youll need to make this clear to your participants. While not required by law, a couple other elements should be included as well: 9. If the research is sponsored (and especially if it is sponsored by an organization that not everyone approves of), the investigator should disclose the identity of the sponsor. 10. Where appropriate, the researcher should be identified personally. In some cases this might be a rather self-disclosing statement. For example, "I am a graduate student at ñ, and as you probably know, I'm one of your fellow members of Alcoholics Anonymous. [Slide 29 - Exceptions to informed consent] In very special cases, portions of informed consent may be waived. An example we saw recently was a psychological study that required the participants to be mislead as to the reason for the study in order to evaluate the participants behavior. Deception may only be approved if the research is very low risk. In addition, the participants must be debriefed after the research is completed. More commonly, while informed consent must still be obtained orally, the requirement for documenting that consent in writing may be waived. This might be the case if you wanted to do a web or telephone survey, or if you did not want to maintain a list of participants for privacy reasons. [Slide 30 Vulnerable Populations] Certain participant populations are considered vulnerable and are provided with additional protections. Children in particular are given special protection. While children may not provide legal consent, they must be asked for their assent, typically using an assent form similar to the consent form. The IRB requires that children 5 years of age and above be asked for their assent. If there are special considerations that would prohibit obtaining assent, include those considerations in your research protocol. Also note that assent forms must be in language appropriate to the childs age. The written assent requirement may be waived under the same circumstances in which consent may be waived. Recently, the regulations have been modified to require that you attempt to obtain the consent of both parents as opposed to only one. The IRB can waive the need for both parents signatures in some cases. Also be aware that some of the exemptions we discussed earlier do not apply to research with children. [Slide 31 Vulnerable Populations] There are other vulnerable populations as well, each with their own special considerations. If you plan to do research with these groups, please see the guidelines provided by their advocacy groups or contact the IRB. Alzheimers sufferers Non-English speakers Prisoners Decisionally impaired Terminally ill [Slide 32 Mid-Course Changes] If you need to make changes to your project after you have gained approval, simply submit those changes to the IRB. Modification review will be done. [Slide 33 Continuation Review] Please note that IRB approval may be given for a maximum of 1 year. If your study will last more than 1 year, please request a continuation review before your study approval expires. The continuation review form is available on the IRB website. Please provide 2-3 weeks for the board to complete the review. [Slide 34 Required Training] A year ago, the Academic Senate voted to require all investigators doing non-exempt research to complete a training program in conducting human subjects research before beginning that research. The board also strongly recommends that researchers doing exempt research complete the training, but it is not required. Weve contracted with an online service to provide this training. So, when you submit your application, the board will determine whether it is exempt or not. If not, you must complete the training before your project can be approved. Anyone, faculty, student, or staff may take the training if they wish, regardless of whether they intend to submit a protocol to the IRB. Several departments use the training as part of their graduate research seminars. [Slide 35 Available on Website] All the documents and guidance you need is available on the IRB website including the protocol application template and example consent and assent forms. [Slide 36 Useful Links] Here are some useful links including the IRB website and a link to a journal on Human Research Ethics founded by one of our emeritus Psychology professors, Joan Sieber. [Slide 37 - Questions] If you have any questions or comments, please contact the chair of the IRB. ,NOPYZ[S T \ ] _ ` D N      tiw㹵㟙ككhFB*CJphh;]56CJ\] h;]CJ hFCJhFhF5hFh|5hFh|htw h;]5\ h|5\htwB*CJphh;]B*CJphh;] hP hP hP h;]5B*CJ\ph1,OP[S T ` C D N    ^iGH&` ^`^$a$gdP $a$DFHalm%).=B Gx}~FOPQA¾¶£Ÿ›£¶h|OJQJhtwOJQJh;]5OJQJ\h Shtw h;]5\h;]CJOJQJaJh;]OJQJh|h;] hJCJ hFCJ h|CJ h;]CJh;]B*CJphhFB*CJphhFhFB*CJph/~EFQ)*% !!E#F#Q##$A$B$7$8$H$gdJ 7$8$H$gdJ 7$8$H$`7$8$H$`m}$ % 2 C b Z!!!!!!!!!d"""###1#C#D#E#F#O#P#Q###$B$L$M$N$k$Ǽ|hGcB*aJ phhtwB*aJ phh;]5B*\aJ ph h;]aJ h;]B*aJ phhtwhJhJOJQJh;]5OJQJ\h;]OJQJ hJh;]hJh;]5hJh;]OJQJ h;]5\h;]hJhJOJQJ0B$N$$$%''()*8,,,//000224444o67777gdb(k$p$u$$$$$% %%%.%C%G%R%]%e%%%%%%%'.''''' ((j(l((()!),)G)))/*p*x**(+D+E+i++7,8,,,,,,,,,¾ƾƾƾƾƾƾƾƾƾƾƾƾƾƾƺ谦hVh;]5B*aJ phhtwB*aJ phhVB*aJ phhVhNhGch;]hNB*aJ phhRfB*aJ phhGcB*aJ phh;]5B*\aJ phh;]B*aJ ph;,,,-&-A-E-Q-^-------../.p...D/b/e////0[0n0o0000001!1)1<1=11K2283X3]33444444446766677ͩͩͩͩhb(h;] h;]5\hb(hb(B*aJ phhtwB*aJ phh;]5B*\aJ phhb(B*aJ phhB*aJ phh#"\B*aJ phhVB*aJ phh;]B*aJ ph<77778888c88H9I9r9999:::::::: ;!;=====>>???#?&?gAhAABBBBBBBBPCCCCCDŽŹŹɹͽ h-hh-hh+Txh hN5\ hJ5\ h;5\ hO7hJh-hhJhNhO7hJuh}h?hhghtwh;] hJu5\ h;]5\h;]B*aJ ph hb(hb(678G9H9:::==??&?hAiABBBDDEE [$\$gd+Tx [$\$gdN 7$8$H$gdN [$\$gdJ 7$8$H$gdJ 7$8$H$gdJu 7$8$H$gdO7DDD8DCDEEEEFKFFGGGGH#H7HkHlHmHHHHHHH I6I7I8IIIIIIIvJJ>K?KKKL-L.L/LVLYL}LLMNNNNMO϶ӢӢӽ h!'5\h!'hrh}h;h;]\h;h;\ h;h;h( h(5\ h;]5\h;h;]h h+Tx5\ h;5\h? h-h5\h-hh+TxhN9EFGlHmHHII?K@K.L/LYLMMMONOPQQ%RRRS 7$8$H$gd6! 7$8$H$gd!' 7$8$H$gd( [$\$gd+Tx 7$8$H$gd+TxMOOOPPQQQ"R\R]RgRhRrRRRSS;TJTUU-VvVwVVVVVVWWWWXXYYYZZZZZZI[J[K[L[[[[[[[[ǼǵDZǼǼǼǩh~EOJQJh}OJQJh;]OJQJh;OJQJh;]OJQJhtw hb5\h; h;]5\h;] h6!\h;h;]\ h!'\ h;\ h!'5\h!'hb hbhbh}h6!6S;TUwVVVWWWWXZZ\\2\]]]L^M^~^V__` & F [$\$gdtw 7$8$H$gdw| 7$8$H$gdH}7$8$H$ [$\$gd;[[\\\\/\2\P\\Z]]]]]]K^L^M^V^z^{^}^~^__5_6_U___`makblbbbbbbbbzd¾ºƲ|vrrrrk htw5\hv hvaJ hvh;]5aJ htwaJ h;]aJ h;]5\ hH}5\ hw| 5\hw| hH}OJQJh OJQJhH}h;]h~EhH}OJQJhH}5OJQJ\h;hH}CJOJQJaJh SOJQJh;]OJQJh}OJQJ*`nalbbbd1eBg}gghh i#i$jklmmjokopppRqgdv [$\$gdvgdw| [$\$ & Fzd~ddd ii!i"i#iiii!j#j$j kk2kkkkkZm_mmmmmmmmmmnnooooppppppqqQqRqq5r6rs s sss)s7susssDtEttŽhXbah hw| h;]5hw| h;]5\hw| hw| 5 hH}5hvh;]5\h Shv hv5\ h;]5\ hH}5\h;] hw| 5\hw| @Rq s stsusEtFttttuuuuuu v v,vvvgdXba[$\$ [$\$gdXba & F hh[$\$^hgdXbagd  & F hh^hgd ttttttttt^uxuuu vv(v)v+vvvvvvx(xxxxy|yG{P{h{{||||Ķ~o~e~~e~h B*aJ phh hgp5B*aJ phhgpB*aJ phhgp5B*\aJ phh2_fB*aJ phh2_f5B*\aJ phhlLB*aJ phhXbaB*aJ phh;]hXbah;]5B*\aJ phhw| 5B*\aJ phhH}5B*\aJ phh;]B*aJ ph hXbahXba'vvxx?xhzizF{G{j{|| ||||.}/}0}1}2}gdGc7$8$H$gdgpgd2_f| |E|Y|||||||-}.}/}0}2}ͼh;]h;]B*CJphh;]<B*ph h;]aJ htwaJ hGchGc5aJ h2_f5aJ hGch;]5aJ h;]B*aJ phhj%B*aJ phhGcB*aJ phhgpB*aJ ph8 00P/ =!"#$% Dp^ 2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH @`@ NormalCJ_HaJmH sH tH N2N  Heading 3dd@&[$\$5CJ\aJDA`D Default Paragraph FontViV  Table Normal :V 44 la (k (No List VoV Default 7$8$H$!B*CJ_HaJmH phsH tH JC@J Body Text Indent B*CJphe HTML Preformatted7 2( Px 4 #\'*.25@9CJOJPJQJaJB^@"B Normal (Web)dd[$\$.)1. Page NumberPK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] 2u k$,7DMO[zdt|2}?ACEFGIKMOQSB$7ES`Rqv2}@BDHJLNPR8@0(  B S  ? ~8|T!~8L"!~8~8C~8L/!~8^!~8?!~8@!~8#!>>B)))4uAHH)**4uB *urn:schemas-microsoft-com:office:smarttagscountry-region8*urn:schemas-microsoft-com:office:smarttagsCity=*urn:schemas-microsoft-com:office:smarttags PlaceName=*urn:schemas-microsoft-com:office:smarttags PlaceType9*urn:schemas-microsoft-com:office:smarttagsplace  4+5+I Immtt4uNRYIL;C|  !!!<"D"""$$KLM*NOVOOOP``pp4u333333333333333333333+NBBUKVcceehhllnnnp'p(pq|qOsPsst ttEtYttt1u4u+NBBUKVcceehhllnnnp'p(pq|qOsPsst ttEtYttt4uz56,N~{Nlhh^h`o()88^8`.L^`L.  ^ `.  ^ `.xLx^x`L.HH^H`.^`.L^`L.^`)^`)pp^p`)@ @ ^@ `)^`)^`)^`)^`)PP^P`)h^`)h^`.hpLp^p`L.h@ @ ^@ `.h^`.hL^`L.h^`.h^`.hPLP^P`L. ^`OJQJo(n ^`OJQJo(n pp^p`OJQJo(n @ @ ^@ `OJQJo(n ^`OJQJo(n ^`OJQJo(n ^`OJQJo(n ^`OJQJo(n PP^P`OJQJo(nzN{N5         b@$̲t'x@z*(N, h         \KRW:LbKhP槈i=cN "* bOuK$[~)bC0pR33bO3+^2wm2wmbC0pR3)W {bC0p[~+*RfP w| }F? |j%!'b((;;~EJkR S#"\XbaGc2_fgpJutw+TxVv -hgrJN6!H}lLO7;]bN2u4u@ZZ ";;ZZ2u`@UnknownG* Times New Roman5Symbol3. * ArialCTimesNewRoman9SymbolMT?= * Courier New;WingdingsA BCambria Math"qh|f|f'E}c ;}c ;!24dtt2QHP?|2!xxKB Kevin Brown    Oh+'0l   ( 4 @LT\dKB Normal.dotm Kevin Brown39Microsoft Office Word@޹@<,U@0[Y%@*doIU }c՜.+,0 hp|  CSU;t  Title  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTVWXYZ[\]^_`abcdefghijkmnopqrsuvwxyz{~Root Entry F`%:IU1TableU,WordDocument:SummaryInformation(lDocumentSummaryInformation8tCompObjy  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q