RISCAuthority Guide To Cash Risk Assessment

RISCAuthority%20guide%20to%20cash%20risk%20assessment

User Manual:

Open the PDF directly: View PDF PDF.
Page Count: 26

DownloadRISCAuthority Guide To Cash Risk Assessment
Open PDF In BrowserView PDF
S18

First published 2012
Version 01

Security
Cash risk assessment and security management – An insurers’ guide

administered by

IMPORTANT NOTICE
This document has been developed through the RISCAuthority and
published by the Fire Protection Association (FPA). RISCAuthority
membership comprises a group of UK insurers that actively support
a number of expert working groups developing and promulgating
best practice for the protection of people, property, business and the
environment from loss due to fire and other risks. The technical expertise
for this document has been provided by the Technical Directorate of
the FPA, external consultants, and experts from the insurance industry
who together form the various RISCAuthority Working Groups. Although
produced with insurer input it does not (and is not intended to) represent
a pan-insurer perspective. Individual insurance companies will have their
own requirements which may be different from or not reflected in the
content of this document.
The FPA has made extensive efforts to check the accuracy of the
information and advice contained in this document and it is believed to
be accurate at the time of printing. However, the FPA makes no guarantee,
representation or warranty (express or implied) as to the accuracy or
completeness of any information or advice contained in this document.
All advice and recommendations are presented in good faith on the basis
of information, knowledge and technology as at the date of publication of
this document.
Without prejudice to the generality of the foregoing, the FPA makes no
guarantee, representation or warranty (express or implied) that this
document considers all systems, equipment and procedures or state-ofthe-art technologies current at the date of this document.
Use of, or reliance upon, this document, or any part of its content, is
voluntary and is at the user’s own risk. Anyone considering using or
implementing any recommendation or advice within this document should
rely on his or her own personal judgement or, as appropriate, seek the
advice of a competent professional and rely on that professional’s advice.
Nothing in this document replaces or excludes (nor is intended to replace
or exclude), entirely or in part, mandatory and/or legal requirements
howsoever arising (including without prejudice to the generality of the
foregoing any such requirements for maintaining health and safety in the
workplace).
Except to the extent that it is unlawful to exclude any liability, the FPA
accepts no liability whatsoever for any direct, indirect or consequential
loss or damage arising in any way from the publication of this document
or any part of it, or any use of, or reliance placed on, the content of this
document or any part of it.

2

CONTENTS
1.0 Introduction		
1.1 Purpose of guide
1.2 Scope			

4
4
4

5.0 Premises risk: out of business hours
5.1 Premises security
5.2 Safes			

14
14
15

2.0 Money risk assessment
2.1 Risk appreciation and assessment
2.2 Risk exposures and loss potentials
		
2.2.1 Staff safety
		
2.2.2 Key risk scenarios
2.3 Risk reduction approaches – basic principles
3.0 The protection of significant money risks
3.1 Security policy and management controls
3.2 Staff recruitment
3.3 Staff training		
3.4 Security installations
3.5 Operational procedures
		
3.5.1 Opening and closing procedures
			
(in normal circumstances)
		
3.5.2 Opening and closing procedures
			
(in response to an alarm)
		
3.5.3 Access management

4
4
4
4
4
5
6
6
6
6
6
6

		
5.2.1 Resistance grades and overnight limits
		
5.2.2 Certification bodies
		
5.2.3 Product identification
		
5.2.4 Location and fixing
		
5.2.5 Locking arrangements
			
5.2.5.1 Key locks and key security
			
5.2.5.2 Combination locks, PIN locks
				
and code security
			
5.2.5.3 Dual locking
			
5.2.5.4 Time locks
			
5.2.5.5 Electronic locks and safe
				
management tools
		
5.2.6 Deposit safes
5.3 Strong-rooms 		
5.4 Cash out of safes / strong-rooms
		
5.4.1 ATMs		
		
5.4.2 Other customer interface and

15
15
15
15
16
16

			
cashier support machines
5.5 Intruder alarm protection and CCTV
5.6 Security fog systems
5.7 Banknote degradation and
		
unique tagging systems
6.0 External transits		
6.1 Professional carriers
		
6.1.1 Contractor credentials
		
6.1.2 Contract terms
		
6.1.3 Money transfer precautions
6.2 Transits by own staff
		
6.2.1 Transit limits
		
6.2.2 Personnel
		
6.2.3 Conveyance methods and security
		
6.2.4 ‘Roundsmen’ risks
7.0 References

19
19
19
19
20
20
20
20
20
20
20
20
21
21
22

Appendix 1: Surveyors’ aide-memoire
Appendix 2: Bullet resistance comparison guide

23
25

3.6 Contractors and visitors
4.0 Premises risk: business hours
4.1 Cash and wages offices
		
4.1.1 Location
		
4.1.2 Construction and security
		
4.1.3 Access control
4.2 Security control rooms
4.3 Hold-up alarms
4.4 Duress alarms		
4.5 Money in safes
4.6 Cashier counters
4.7 Till points		
4.8 Customer interface cash payment, dispensing,
		
changing, gaming and vending machines
4.9 Cash transfers within the business premises
4.10 Additional hold-up defences and deterrents
		
4.10.1 CCTV		
		
4.10.2 Security fog systems
		
4.10.3 Coded forensic identification
			
(unique tagging) spray systems
		
4.10.4 Banknote degradation and
			
unique tagging systems
		
4.10.5 Signage

6
7
7
7
8
8
8
9
10
11
11
11
11
12
12
13
13
13
13
14

16
16
17
17
17
17
18
18

14
14
14
3
2

1. INTRODUCTION

the insurer may provide indemnity under Employer’s Liability,

1.1 Purpose of this guide

Public Liability and Business Interruption covers.

This guide has been produced to assist commercial insurance
underwriters and risk control surveyors in their assessment of
UK-located risks presenting significant money exposures, and in
their specifying of security precautions in order to improve those
risks where existing loss prevention measures are considered to
be inadequate.

2.2.1 Staff safety

A model aide-memoire has been included as Appendix 1 for
use by risk control surveyors (with augmentation or adaptation
according to individual insurers’ risk appetite and risk
assessment practices).
1.2 Scope
The guide is focused upon the potential for significant loss (and
the risk management of such potential) arising from the criminal
actions of third parties, within the context of the cover typically
provided by the money section of a commercial insurance policy.
It thus does not extend to address those risks that are the subject
of fidelity or theft by employee insurance policies; nor does it
address the theft of money by fraud or electronic means.
For the purposes of this document, a significant money exposure
is deemed to be one where there is the potential for the theft of
money in excess of £30,000, and the guide is therefore intended
to address the money-related risk management of businesses
such as medium to large retailers, cash and carry outlets, visitor
attractions, exhibition centres, sports stadia, cash centres, casinos,
bureaux de change, banks, building societies and the like.
Whilst the guide has been produced with a clear focus on
the security of cash, much of its content is equally relevant to
significant exposures of vouchers, stamps, banker’s drafts and
other negotiable instruments typically covered by commercial
money insurances (though it is recognised that insurers will
often apply tolerances in respect of non-cash negotiables, as
regards the level of exposure permitted before enhanced security
measures are required as a condition of cover).

2. MONEY RISK ASSESSMENT
2.1 Risk appreciation and assessment
When carrying out a money insurance survey, it is important
that the surveyor appreciates the extent and detail of money
insurance conditions applicable to the case in order to avoid the
risk of unwittingly undermining the policy’s intent, for example by
implying acceptance of circumstances that pertain at the time of
survey which may breach those conditions.
Such conditions may typically relate to key security, use of intruder
alarm systems, cash carrying precautions, money in vehicles, etc.
2.2 Risk exposures and loss potentials
The loss of money by theft can occur through a variety of methods
and the key risk scenarios faced by large cash risk (which are
described in paragraph 2.2.2 below) should be assessed in
terms of cash loss potential, relative likelihood and adequacy of
precautions currently in place to prevent or minimise losses.
In many cases, it will be determined that 100% cash losses are
conceivable with some risk scenarios.
In addition to the loss of money, some criminal methods involve
the risk of personal injury to staff (and perhaps also to the
policyholder’s customers and other third parties at the scene of
an attack) and/or significant interruption to the business for which
4

All staff involved with cash exposures, whether front-line
customer-facing, back-room cash-office, managerial or security
personnel, face jeopardy and potential personal injury risks
arising from their duties. Even those with no direct custody of, or
authority to access, money could find themselves involved in a
threatening situation simply through their presence at the scene
of a criminal attack.
The business is, of course, obliged by the Health and Safety
at Work Act to provide a safe place of work and safe systems
of work, and also to provide adequate training and instruction
for employees. Furthermore, the Management of Health and
Safety at Work Regulations require risk assessments to be
undertaken and recorded for all significant and reasonably
foreseeable risks. Employee records should show the content
and date of the training provided and employees should sign
an acknowledgement to indicate they have received the training
given. Training records are to be maintained for all employees to
assist in the review process and also to provide evidence that
training has duly been provided as these may assist in defence of
any potential civil claims.
The risks to staff safety arising from the threat of criminal
attack reflect the degree of target-appeal to criminals, but can
be mitigated very significantly if the policyholder adopts a
responsible approach to health and safety issues, carries out risk
assessments in a professional manner and ensures that security
measures are in place that are commensurate with the risk. In
many cases, the safeguards that are introduced to protect cash,
particularly during working hours, will generally also contribute to
staff safety and vice versa, especially when those safeguards are
obviously robust, since an evidently high standard of security will
help to deter an attack.
2.2.2 Key risk scenarios
Each of the following key risk scenarios should be considered in
any risk assessment of a large money risk:
Robbery at the premises during working hours
(i) During trading hours
Most cash-heavy businesses present an open-door welcome to
the public, and even those that restrict transactions to certain
categories (eg minimum age, trade-only or members-only) will
generally not keep their customer entrance doors secured during
trading hours.
A robbery during trading hours often involves minimal inside
knowledge or planning, but can be very violent and frightening to
both staff and customers.
(ii) Out of trading hours
The periods at the beginning and end of each working day, when
staff are on the premises but the business is closed to the public,
may seem a more attractive proposition to criminals who are able
to research their target since, provided they can gain access to
the premises (eg by ‘tail-gating’ a member of staff as they arrive
for work, or hiding themselves within the premises during ‘openhours’ and emerging from hiding after the premises have been
closed to customers), they then have a better prospect of a more
manageable raid, more time to maximise their haul, and a better
chance of escaping unchallenged.

Theft from the premises out of business hours

2.3 Risk reduction approaches – basic principles

For those criminals who have the skill, knowledge and

Having determined the threats facing the business in terms of
theft of money, and the extent of any possible loss in the event
of a determined and successful criminal attack, it is necessary
to evaluate existing precautions aimed at mitigating such threats
and preventing or reducing such losses.

organisation to successfully penetrate secured premises and
tackle locked safes and other secured money containers whilst
avoiding discovery ‘in the act’, a burglary out of business hours
can offer maximum cash rewards without some of the attendant
risks of violent crime (ie eye-witnesses, ‘have-a-go’ heroism,

It is not unknown for key-holding members of staff to be accosted

The various precautionary measures that should be adopted (or
at least considered) for the protection of both staff and money
are examined in the following sections of the guide, but the basic
principles that need to be addressed – in combination – are:

outside or well away from the business premises (eg on the

Target hardening

hold-up alarms, sentencing policy if caught and convicted, etc).
Staff duress and tiger kidnap

way home from work after the premises have been secured
for the night) and forced under threat of violence to return to
the premises and co-operate with robbers in opening up the
premises, unsetting intruder alarms, and unlocking safes, etc.
Alternatively, though much less common an occurrence, with
detailed ‘inside knowledge’ of a large cash risk’s procedures and
protections, a well organised tiger kidnap might be planned by a
criminal gang that is prepared to play for high stakes in pursuit
of large rewards. A tiger kidnap generally involves the taking
hostage of members of the family of personnel who have the
means to permit access to cash or valuables, in order to coerce
them into facilitating the theft (either by allowing access to the
criminals or even by stealing the target themselves and handing
it over subsequently).
Robbery during transit
There is very seldom a perfect balance between on-site cash
receipts and on-site cash payments for any business and
there will therefore be a need for surplus cash to be banked or
for cash depletions to be made good by bank withdrawals. For
some businesses (eg bureaux de changes and amusement
arcades) there can be a frequent need to re-stock particular
currencies, denominations or coinage. All such money in transit
exposures involves an element of risk which can often be severe,

All significant cash risks must be defended against criminal attack
to a standard that is at least commensurate with the perceived
level of threat. For most large cash risks this will include a mix of
physical, electronic and organisational security measures aimed
at protecting staff against attack and money against theft. Target
hardening can be achieved by both passive and active defences.
In terms of ‘physical’ defences, for example, cashiers may be
protected by fixed security-glazed screens or alternatively with
button-operated rising screens.
Minimising the appeal
Part of the risk management of significant money exposures has
to do with the psychology of deterrence and threat diversion.
Large money losses generally involve a good deal of research
and planning on the part of the criminal and the risks of failure and
arrest will be important factors in determining whether an attack
is launched. If the premises appear to be well defended, the staff
professional and well disciplined, and there is considered to be a
real possibility that physical defences may prevail, that an alarm
would be raised and responded to before the raid is completed,
or that other defensive measures would be successfully deployed,
then the criminal will hopefully be deterred, and deflected towards
apparently ‘softer’ targets.

depending on a number of factors such as cash amounts carried,

Minimising the reward

frequencies, pattern detectability, vulnerability of routes and

Introducing measures that will significantly reduce the amount of
cash at risk of theft are not only of value in regard to minimising
the size of a potential claim, but also reduce the likelihood of an
attack, at least by criminals who research their targets beforehand.

transportation methods.
In addition to transfers to and from the bank, other transits – both
routine and occasional – may feature in the course of business,
and all should be considered as part of the risk assessment in
terms of the potential for money loss and injury or trauma to staff.
Theft or collusion by employee, director or partner
Whilst the scope of this guide does not extend to include the risks
that are intended to be addressed by fidelity and theft by employee
policies, it is recognised that money insurances will sometimes
include an element of ‘fidelity’ cover as standard (ie without
particular underwriting consideration or policy extension), subject
to a discovery of loss restriction normally excluding thefts not
discovered within a few days of the occurrence.
Where such cover is provided (whether explicitly or not) for a
large money risk, the risk assessment should extend to address
such contingencies (eg enquiries concerning recruitment and

In some cases, if the customer is able (and prepared) to introduce
significant changes, it may be possible to reduce cash exposure
to zero by, for example, switching to a cashless transaction trading
model, at least within some parts of the business operation, or
at some key stages of the business cycle. Where this can be
successfully achieved, the risks of injury and loss through violent
attack will be significantly reduced, and much of the cost of
additional security measures can be avoided.
Physical and procedural arrangements can be deployed which
will, for example, limit the amount of cash immediately available
at vulnerable cashier positions or on cash-collection rounds.
Other security measures can be installed that stain or otherwise
degrade stolen banknotes, with consequent impact on their
disposal by thieves.

vetting procedures, cash-handling authorisation policies and staff
supervision are advisable as are investigations into the extent of
the separation of security responsibilities so that no one person
acting alone can access large cash sums).
Furthermore, it must be recognised that many large theft losses
(including thefts of money) involve ‘inside knowledge’ and
sometimes also active participation on the part of a member of staff.
5
4

3.0 THE PROTECTION OF SIGNIFICANT MONEY
RISKS

contractor-supplied manned security personnel.

3.1 Security policy and management controls

3.3 Staff training

Insurers will wish to be satisfied that senior management takes

Crime awareness and incident procedure training should be

seriously its responsibility for ensuring the safety of its staff

provided to all staff employed at high cash exposure locations,

and the security of the business’s cash and other assets, that

together with generic crime prevention and security precautions

there is a comprehensive and coherent policy addressing these

training. In addition, security procedure and equipment training

responsibilities and that security measures and procedures are

should be given as appropriate according to the needs of

in place, enforced and regularly reviewed to ensure that the risks

specific roles.

to staff and the business from criminal activity are continuously
monitored and minimised.

Topics to be addressed in the generic training should include:

The company’s Health and Safety Policy should take appropriate

• An awareness of the potential risks faced in the work place

account of the risks to staff of criminal attack and there should be
properly documented safe working procedures for all staff whose

(and away from the work place for certain roles such as keyholders and managers)

duties may expose them to such risks.

• The company’s security policy

For large, well managed, cash risks, it should be expected that a

• Avoiding breaches and lapses in security (eg security of

security manual (or equivalent documentation) will be maintained
detailing the security policy, and the various specific measures
and procedures to be employed in support of the policy, such as:
• Access control arrangements: site (if relevant), building, staff-

access

codes/tokens,

visitor/contractor

identification/

validation, improper use of fire exit doors, etc)
• The identification and reporting of suspicious incidents,
vehicles, persons and behaviour

only areas, restricted staff areas (eg cash office, vault, etc)

• Raising an alarm: means and correct circumstances

• Procedures for daily unlocking and re-securing of departments

• What to do during a robbery (noting descriptions, etc)

and buildings
• Specific precautions relating to the security of money both
during and out of business hours and whilst in transit
• Security equipment and systems: standards, extent, selection,
procurement, deployment, responsibilities and maintenance
• Control and security of keys and access codes to doors,
gates, safes, vaults, ATMs etc
• Security personnel selection, training, duties, supervision,
equipment and communications
• Incident management, alarm response procedures, postincident procedures and records
• Contingency plans to address failures and disruptions in
security provisions.
Senior management should ensure that there are clearly
understood security-related responsibilities and accountabilities
at all managerial and staffing levels and ensure through
continuous supervision that there is no neglect or breach of such

• What to do after a robbery (preserving the crime scene, calling
the police, persuading witnesses to remain until interviewed,
attending to any first-aid needs of staff and customers, etc).
Depending upon specific staff roles, further training should include:
• Till-float management
• Premises locking and unlocking protocols
• Safe/vault locking and unlocking protocols
• Alarm

setting/unsetting,

testing,

fault/failure-to-set

contingencies, keyholder duties/response procedures
• Receiving

and

dispatching

cash

consignments

by

professional carriers
3.4 Security installations
The security policy should make clear that the commissioning and
purchasing of security services, systems and hardware should
take full account of the safety and security risk assessments, and
both the general and specific requirements of insurers.

responsibilities.

3.5 Operational procedures

3.2 Staff recruitment

3.5.1 Opening and closing procedures (in normal

The policyholder’s staff recruitment process should ensure that

circumstances)

all new staff (including temporary and agency staff) are subject to

Criminal attacks are often planned for the beginning or end of

the following checks:

the business day since there will be fewer staff and customers

• Identity verification

to contend with, less chance of an alarm being raised or other
interruption, and fewer witnesses. Personnel carrying out

• Right to work in the UK

opening and closing duties are at particular risk during such times

• Employment history

and policyholders that employ security staff will often assign them

• Previous employer and character references
• Criminal record (CRB basic disclosure)
• County court judgements, bankruptcy and credit reference.
Staff recruited for security roles, and other staff in particularly
sensitive positions, should be subject to extended screening, in
line with BS 7858: Security screening of personnel employed
in a security environment.

6

licensable roles (eg door supervision in licensed premises) and all

these responsibilities.
There should be well defined, documented and observed
procedures for the opening and closing of premises at the
beginning and end of both (i) the working day, and (ii) customeraccess hours. The procedures should stipulate that there must
always be at least two persons (preferably more than two) present
at both initial unlocking and final locking of the premises. Persons
assigned premises unlocking and locking duties should not

The licensing requirements of the Private Security Industry Act

include those who have the means to unlock safes, vaults, ATMs

must be observed with regards to any staff directly employed in

or other cash containers.

Premises opening
Upon arrival at the premises, the outside of the premises should
be checked for any signs of intrusion or suspicious activity. If all

As with opening and closing responsibilities in normal operating
circumstances, persons assigned to alarm/emergency keyholding
duties should not include those who have the means to unlock

appears well, one (preferably two) personnel should unlock the

safes, vaults, ATMs or other cash containers.

entry door, unset the intruder alarm and ensure that all appears to

All of the best practice advice contained in the RISCAuthority

be in order – both from a visual check of the interior, and according
to the alarm keypad display, whilst the second (preferably third)
remains outside the building, acting as look out and ready to call
the police if anything untoward occurs, whilst awaiting a message
or signal from those inside that all is well.
Entrance doors should remain locked until customer trading
hours commence, with access during the interim available only via
supervised entry doors to staff and authorised visitors/contractors.

guide S6: Electronic security systems: Guidance on keyholder
selection and duties should be followed, with particular attention
to those recommendations that relate to ‘target risks’.
3.5.3 Access management
It is imperative that an access management system is in place
that will prevent access to staff-only areas by unauthorised
persons. The system should further restrict access to sensitive
areas such as cash offices, cash transfer bays/routes and security

Customer entry doors should be unlocked at the appointed time,

control rooms to those personnel with appropriate job-holder

but only after checks are made to ensure that all internal doors

responsibilities only.

from public to staff-only areas are properly secured.

The system should individually identify all users and should be

Premises closing

actively managed and supervised so that:

There should be a strict observance of closing times and a

• All cards/tokens are accounted for at all times

systematic process for (i) denying public entry close to the end
of trading hours, (ii) clearing the building of remaining customers
and (iii) searching the premises for any unauthorised persons who
may be in hiding. All tills and other cash containers not suitable

• Cards/tokens are retrieved from staff who leave the
policyholder’s employment
• Any lost or stolen cards/tokens are deleted from the system
and rendered inoperative

for holding money out of business hours should be emptied, and
all cash locked away in safes or strong-rooms. Emptied tills and

• Activity records are regularly supervised for inappropriate

other day-time-only containers should be left unlocked and open

or unexpected usage patterns (eg those that may suggest
borrowing/sharing of cards/tokens, the propping-open of

in order to minimise damage in the event of overnight intrusion.
One or two personnel should leave the premises ahead of their
colleagues to check the environs outside the exit door for signs of
suspicious activity and then, from a safe distance, communicate
the ‘safe to leave’ status to their colleagues within. They should
then continue to watch the locking-up process until it is safely
concluded. The bulk of the staff should leave together where
possible, with one or two persons left briefly inside to set the
intruder alarm whilst a number of their colleagues remain outside
the final exit door until the duty keyholder has locked the final exit
door and the alarm setting procedure is completed.
Note: More comprehensive advice concerning opening and
closing procedures is contained in the RISCAuthority guide
S6: Electronic security systems: Guidance on keyholder
selection and duties.

doors or tailgating)
The relevant Standard to which any new electronic access control
system should be installed is BS EN 50133-1 System requirements
for access control systems and, depending on the security risk
assessment a Security Classification of either 2-B or 3-B as
defined in that Standard is likely to be the appropriate specification
for access-controlled doors in most large cash risks. Note: Helpful
guidance to the specifying of access control systems can be
found in the BSIA publication Form No.132: A specifier’s guide
to the security classification of access control systems which
is freely downloadable from the BSIA’s website1.
The design of the access control system should take due account
of the potential emergency escape needs of staff and customers
and, depending upon the fire risk assessment, it could be that
some access controlled doors would need to be fitted with panic

3.5.2 Opening and closing procedures (in response to

exit devices or emergency exit devices and/or their access-

an alarm)

controlled locking arrangements interfaced with, and overridden

There should also be well defined, documented and observed

by, the premises fire alarm system. Great care must therefore be

procedures for attendance at the premises outside normal

taken in the design of both the access control system and the

working hours in response to an alarm activation or some other

designated emergency exit routes to ensure that unauthorised

reported emergency.

access into staff-only areas, and particularly high security areas

Calls purporting to be from an alarm receiving centre, the police
or some other authority requesting keyholder attendance should

such as cash offices, cannot be achieved by simply activating the
fire alarm system.

be validated by ring-back to known (pre-stored) numbers before

Note: Helpful guidance on securing emergency exits can be

keyholders set out. A minimum of two keyholders should attend

found in RISCAuthority Guide S11: Security of emergency exit

in every instance.

doors in non-residential premises.

Whether the policyholder appoints in-house staff to keyholder

Staff should be thoroughly trained in safe access control

duties, or contracts approved professional keyholding services,

procedures, particularly as regards movement between customer

an on-call duty security manager or other senior member of

and staff-only areas.

management should also be contacted at the outset, appraised
of the situation, and should then remotely monitor developments
via frequent telephone communications with the attending
keyholders until satisfied that the situation is resolved and the
premises have been re-secured.

3.6 Contractors and visitors
Contractors and visitors (other than walk-in customers whose
business can be transacted within customer-access areas) should
1

www.bsia.co.uk

7
6

only be received (i) by prior appointment, (ii) with appropriate
management authority, and (iii) subject to identity verification
upon arrival.

entrance doors kept normally locked but remotely released by
staff after viewing the caller and the immediate environs outside
the door. Other types of business premises (eg cash collection
centres) may be able to operate a strict access control regime
with external doors only opened to admit positively identified
individuals. Wherever practicable, premises presenting large
cash exposures should be encouraged to introduce as much
control as possible over entry to the building.

Contractors and visitors should be signed in and out, should be
properly supervised/accompanied whilst on the premises and
be required to wear visitor badges. They should also, as far as
possible, be excluded from sensitive and secure areas. Where
this is not possible, due to the nature of the contracted work or
purpose of visit, special temporary precautions may need to be
taken to minimise the ready-access to cash and cash containers
for the duration of the work or visit.

4.1 Cash and wages offices

The company’s security policy should anticipate and address such
a contingency, setting out the precautions that should be deployed.

4.0 PREMISES RISK: BUSINESS HOURS
Any business with large sums of money in its custody must
be considered to be at risk of attempted robbery during
business hours.
The majority of such attacks are so-called ‘counter demands’
from publicly-accessible areas within the building and, alongside
protecting vulnerable staff in such areas with screened counters
and ‘safe havens’, another key precaution lies in tight cash
exposure management. When till limits are maintained at a low
figure, it not only serves to minimise the size of a money claim, it
can also reduce the likelihood and frequency of counter demand
robberies as the modest rewards available to raiders become
known.

For operational as well as security reasons, cash accumulations
are frequently best managed within a single office or suite at the
policyholder’s premises.
For the purposes of this document, reference to ‘cash office’
should be taken to include ‘wage office/payroll office/cash
payments department, etc’ whilst acknowledging that such
latter functions are comparative rarities today, with most salaries,
wages and other payments being made by BACS, cheques and
other cash-free means.
4.1.1 Location
Cash offices should ideally be located well away from areas
where the public have access, preferably on an upper floor
(generally speaking, the higher, the better, so maximising the
deterrent effect to raiders of having to negotiate several floors
with the attendant risk of being trapped within the premises by
responding personnel/police).

Every attempt should be made to keep cash exposures in
customer-facing areas as low as possible, and to move excess
sums to a better defended location well away from the ‘shop floor’.

If an upper floor location is not available, then the cash office
should, if possible, be located as centrally as possible within the
basement or ground floor, away from the building perimeter walls,
and maximising travel distances from external doors and from
publicly accessible parts of the premises.

Whilst large retailers, banks, and many other high cash exposure
businesses necessarily trade with an open-door operating
model, other businesses with a more manageable number of
walk-in customers (eg some bureaux de change) may be able
to apply a degree of customer access control, for example with

It should not be possible for those outside the cash office to view
its interior. Where a cash room is situated against an outside wall
therefore, any windows (including upper floor windows that are
overlooked by other buildings) should be effectively screened in
some way (see 4.1.2).

Ceiling - solid concrete floor
215mm thick
external brick
walls
Cash office
Partition wall preventing
view of cash office from
customer area
Cashier
positions

CIT
collections
and deliveries

Full height
215mm thick
brick walls

nsfer
Cash tra
hatch

Access
control
lobby

CCTV cameras
(images monitored
from within cash office
and from security
control room)

Customer
area

Zero-aperture
bullet-resistant
cashier screens

Figure 1: An example of a cash
office built to bullet resistant
standards.

8

erture
Zero ap stant
resi
bullet- unter
co
,
en
scre
tray
saction
and tran

Bullet-resistant
transaction trays
and counters

Interlocked security doors
(inner door - at least should be to
bullet-resistant standard)
Video intercom
panel for access
authorisation

4.1.2 Construction and security

(eg the surrounding frame-work) have been successfully tested

Depending upon the risk assessment, the cash room should be

to an equivalent (or close to equivalent) severity of impacts as

built to at least a ‘manual attack resistant’ (formerly referred to

those against which the glass itself has proven resistant during

as ‘anti-bandit’) specification, with walls, ceilings, doors and other

BS EN 356 tests, in order to verify that the glass cannot easily

openings all constructed of solid, robust materials.

be dislodged.4

Where the assessment indicates that there is a reasonably

If it is operationally practicable, such glazed areas should be

foreseeable risk of a robbery involving firearms, the cash room

fitted with internal blinds which should be kept closed to preserve

design should take full account of the enhanced risk and it should

privacy other than during necessary transaction times or for

be ensured that all potential attack or threat-facing elements

purposes of identity verification / access control.

(screens, counter tops and fronts, surround panels, transaction

Where the risk assessment suggests that bullet resistant

trays, transfer hatches, doors and partitions) are to an appropriate

screens are needed to protect staff, they should be specified to

bullet resistant standard in order to protect staff within.

an appropriate class (typically BR4/SG1 NS or BR4/SG2 NS) of

In either case, if the cash office incorporates a customer interface

BS EN 1063: Glass in building. Security glazing. Testing and

point (eg a transaction counter), the design should include a ‘safe

classification of resistance against bullet attack. 5, 6, 7

haven’ retreat for cashiers so that they can instantly withdraw

It should be ensured that the bullet resistant barrier extends to at

from an exposed position into the safety of a rear office into which

least a height of 2m.

a raider has no view.

Although ‘stepped glazing’ panels (allowing vertical and

Where the walls and ceilings offer insufficiently robust protection

horizontal speech gaps) have sometimes been used in bullet

against penetration using sledge hammers, axes, wrecking bars

resistant screens, they do not represent safest practice and,

and portable power tools, they should be either replaced (eg

with the advances in electronic speech transfer technology, it is

substituting lightweight prefabricated office walls with proprietary
prefabricated ‘manual attack resistant’ walls) or reinforced by

now the norm to use such systems as the preferred means of

lining internally with either a proprietary ‘manual attack resistant’

communication and to protect staff with a gap-free bullet resistant
screen. An added bonus of such systems is that an induction loop

lining, sheet steel, expanded metal sheeting, and/or plywood.

can also be incorporated to assist those with a hearing disability.

Where it is determined that cash office walls need to be bullet

Attention must also be paid to the design of any transaction trays

resistant, then any light partitioning (including light concrete
block constructions, timber and virtually all composite materials)

in the cash window counter top. Shallow trays present a possible

will need to be replaced by a more resilient barrier such as solid

risk to staff as a low velocity bullet, or shot from a shotgun, fired

(minimum 215mm thick) brickwork or else lined with mild steel

into the tray could ricochet into staff on the secure side. On the

(minimum 6mm thick).2

other hand, a deep tray unit presents the possibility of a handgun
being held in the tray and directed at the staff. The recommended

If the cash office is fitted with a ‘false ceiling’ it should be ensured

compromise is a tray depth of approx. 100mm with a plastic slide

that the cash office walls (or alternative, effective barriers) continue

(usually polycarbonate) that is normally kept closed on the staff

up beyond it to a suitably substantial structural floor or roof above.

side and is controlled by the staff. Below and around the tray

Whether the determined level of security is to be to manual attack

there must be a suitable bullet catching box (usually constructed

resistant or bullet resistant, proprietary door-sets, cashier windows,

of minimum 6mm mild steel).

screens, shutters and similar products should normally be specified
by reference to appropriate published, testable standards.
An example of a cash office designed to bullet-resistant standards
is illustrated in Figure 1.
Cashier windows and other glazing
Glazing used in counter screens or cash office partition walls
which are required to protect staff against manual attack by
robbers should normally be specified to an appropriate resistance
category (typically P5A) of BS EN 356: Glass in building.
Security glazing. Testing and classification of resistance
against manual attack.3
Unfortunately, this standard does not address the attack
resistance of non-glazed components, so where glazed
structures, modules or assemblies are marketed with a claim
of compliance with BS EN 356, it should be checked that the
suppliers also confirm that the non-glass elements of the product
Whilst a single-brick (100/110mm thick) wall might provide adequate bullet
resistance (depending on the quality/density of the brick used) it is unlikely
that it would provide sufficient manual-attack resistance.
2

Existing glazed panels used in counter screens or cash office partition
walls which are found to be to BS 5544: Specification for anti-bandit
glazing (glazing resistant to manual attack) should generally be
acceptable where required to protect staff against manual attack.
3

Loss Prevention Standard (LPS) 1270: Requirements and testing
procedures for the LPCB approval and listing of intruder resistant
security glazing units was introduced in November 2010 to certify
glass products in terms similar to those used in LPS 1175 (see footnote
8). As such, LPS 1270 is perhaps of particular value to insurers in relation
to the protection of valuables against a sustained attack (eg glass used
in ‘treasure’ showcases out of business hours) rather than in relation to
day-time cash raids, where the need is generally simply to allow time for
cashiers to retreat to a safer location and for the alarm to be raised.
4

Similar considerations apply with regard to BS EN 1627: Pedestrian
doorsets, windows, curtain walling, grilles and shutters. Burglar
resistance. Requirements and classification.
Any cash office glazing, screen assemblies, etc encountered in situ that
meet an appropriate security rating under LPS 1270 and/or LPS 1175 and/
or BS EN 1627 would, however, normally be considered acceptable.
The NS (‘no splinters’) suffix indicates that the glazing is minimum (or
zero) spall, and this additional performance standard should be specified
whenever staff are likely to be positioned within 2m of the inner face of
the glass.
5

Existing glazed panels used in counter screens or cash office partition
walls which are found to be to Class G2/S86 of BS 5051: Bullet resistant
glazing. Specification for glazing for interior use should generally be
acceptable where required to protect staff against 44 magnum handgun
and 12 bore shotgun attack.
6

A helpful bullet resistance comparison guide is reproduced at Appendix 3
by kind permission of Stafford Bridge Doors Ltd.
7

9
8

Any external glazing to the cash room should, if it is accessible

The cash room should be sufficiently equipped with hold-up

from outside (eg situated at ground floor level, or accessible from a

alarm buttons that there can be a high level of confidence that at

flat roof, balcony or fire escape staircase), be to the same security

least one member of staff will be able to activate the alarm in the

standard as applied to its internal glazed areas. Where the risk

event of an attack (see paragraph 4.3).

assessment indicates such glazing to be ‘normally inaccessible’,
the risk of attack from the roof of the building (eg using window-

4.1.3 Access control

cleaner cradles, abseiling techniques, etc) should still be

It is absolutely vital that strict access control policies and

addressed, and fixed (non-opening) security glazing should be

protocols are established with regard to the cash office and

considered. Furthermore, if normally inaccessible windows offer

that management controls are in place to ensure that they are

the possibility of line-of-fire threat from neighbouring properties,

rigorously adhered to.

external fire escapes, etc into a cash office that is otherwise
protected to bullet resistant standard, then such windows should

The access control policy should establish that access is normally:

also be fitted with bullet resistant glazing (or alternatively bricked-

• available during specified working hours only

up or shuttered with minimum 6mm mild steel).
Security glazing, whether bullet resistant or manual attack
resistant should be installed in accordance with BS 5357: Code
of practice for installation and application of security glazing.

• restricted to cash office staff only
• denied to all persons other than those designated as
‘authorised’ by management
• controlled from within the cash office only, once occupied by

Doors
Entry into the cash room should be via a proprietary security doorset to either manual attack resistant or bullet resistant standard,
according to the risk assessment.8, 9
Where the desired standard is bullet resistance, the door-set
should be specified to an appropriate class (typically FB4/FSG NS

and protocols should entail the deployment and consistent use of
fail-safe systems that:
• deliver each key element of the access control policy

of BS EN 1522: Windows, doors, shutters and blinds. Bullet

• are operationally convenient

resistance. Requirements and classification).

• produce an alert in the event of misuse or failure

Wherever possible, access into the cash room should be via a

• are easily monitored by management

security lobby comprising a pair of ‘in series, interlocked’ security

• are regularly reviewed and audited.

doors such that neither door can be unlocked and opened
unless the other door is closed and locked, and passage into
and out of the room is thus via a quarantined area (often referred
to as an ‘airlock’). Where such an arrangement is in place, it is
recommended that the ‘security line’ (ie the barrier maintaining
the manual attack or bullet resistant integrity of the cash office)

In practice, this will generally require the use of both (i) an
electronic access control system and (ii) an operational procedure
that relies upon authorised staff within the cash room positively
identifying the person(s) seeking admission and unlocking the
access door(s) for them (either directly or remotely).

is focused on the inner door of the pair and the inner partition

Generally speaking, the interests of security are best served

of the lobby (separating it from the cash office interior) so that

when the person seeking admission has both to use some

cash office personnel can safely validate persons within the
lobby before releasing the inner door. The outer door, and outer
partition to the lobby, thus need not necessarily be constructed
to the same high resistance standard.

form of unique possession (eg biometric ID or individually
addressed card or token) and be visually identified and admitted
by a colleague within the safe confines of the cash room. In the
majority of cases however it will be found that only one such

Access doors should normally open outwards from the cash

authorisation is required and the normally preferred procedure

room, so that the door frame rebate can lend support to the

(which avoids the risk of entry using stolen tokens and minimises

door’s locks and bolts in resisting any attempts to kick or hammer

the risk of duress entry) is that during the working day, when

open the door. (Where such a door must, for logistical or safety

the cash office is occupied by an adequate complement of staff,

reasons, open inwards, it should be ensured that the door-set

access via the cash office entry door will be under the virtually10

has been certified against attack on the face in question).

exclusive control of staff therein who will be able to identify the

Any emergency exit door from the cash room should be to at least

caller via CCTV or directly via a bullet resistant viewing panel. A

the same standard as the access door(s), fitted with high quality

sufficiently panoramic view should be available to cash office staff

locks/bolts (whilst allowing for emergency egress during working

of the area outside the entry door so that they can establish that

hours, see RISCAuthority guide S11: Security of emergency

(i) the authorised person requesting access is not under duress

exit doors in non-residential premises) and alarm protected

or liable to be tail-gated, and (ii) the area outside the door is safe,

on a 24-hour circuit.

when they are about to leave the office.

Loss Prevention Standard (LPS) 1175: Requirements and testing
procedures for the LPCB approval and listing of intruder resistant
building components, strongpoints, security enclosures and freestanding barriers.
8

Door-sets certified to the higher security classes (eg Class 5 or 6) of
BS EN 1627: Pedestrian doorsets, windows, curtain walling, grilles
and shutters. Burglar resistance. Requirements and classification
might also be considered acceptable for such applications depending on
the risk assessment.
9

10

an adequate complement of staff
• permitted only following positive identification

Note: see also the recommendations within paragraph 4.1.2
concerning the use of a security lobby for controlling access into
a cash room.
Note: for health and safety purposes, an emergency access facility
should be provided using means not readily available to unauthorised
personnel (eg a management-only code) so that assistance may be
provided to any person within the cash room who is unwell, unconscious
or otherwise indisposed.
10

4.2 Security control rooms
Most large cash risk businesses will employ security personnel,

It should be noted that the ACPO Policy states that duress alarm
facilities are only permitted with BS EN 50131: Alarm systems.

either directly or contracted. Heavier risks will warrant a level of

Intrusion systems and hold-up systems Grade 4 and BS 7042:

surveillance and security management that will necessitate the

Specification for high security intruder alarm systems

establishment of an on-site security control room from which

in buildings alarm systems, although individual applications

security personnel can supervise the premises from a location

for duress facility may be considered for BS EN 50131

that is itself well secured against criminal attack. The room should

Grade 3 systems:

be equipped with:

1. in premises that require high security, where duress has
been identified as an essential requirement from the risk

• CCTV management systems, monitors and recording/play-

assessment;

back facilities
• alarm annunciation equipment (for the notification of non-

2. where duress is notified separately from the hold-up alarm
signal; and

alarm receiving centre (ARC)-transmitted alarm activations
such as those from 24-hour circuits, and the ‘copying-in’ of
ARC transmitted signals such as hold-up alarm activations,
faults, etc)
• access control system event alert facilities (to notify malfunction
and misuse)
• on-site and off-site communications equipment
• hold-up alarm buttons (fixed devices within the control room
and mobile personal attack alarms for patrolling, locking-up
and other external duties).

3. where duress is not initiated by using a digital key (fob).
In practice (due to the technological solutions employed by the
alarm industry), duress facilities cannot be easily applied to some
of the unsetting arrangements permitted by BS 824311, and in
most instances, in order to achieve police response for a duress
alarm and to provide a sufficiently secure means of unsetting, the
choice is limited to unsetting option 6.4.3 of BS 8243, namely:
“Prevention of entry to the supervised premises before all means
of intruder alarm confirmation have been disabled”.

Since a major, well planned criminal raid may seek to neutralise

Duress alarm facilities built into an electronic access control

the security control room at the outset of any attack, the control

system or supervised digital safe lock would generally need to be

room should be afforded the same considerations as the cash

‘local’ only (eg raising an alert at the policyholder’s security control

office in terms of its location, construction, security and access

room) and then separately ‘police-called’ after local verification

control provisions (see paragraphs 4.1.1 to 4.1.3 above).

(e.g using on-site CCTV), unless such facilities are confirmed as

4.3 Hold-up alarms
A hold-up alarm system should be installed in all significant
cash risks.
Due to an unacceptably high level of false calls from the incorrect
use of hold-up alarms however, the police have introduced within
the ACPO Security Systems Policy a lower false alarm threshold
before withdrawing response and will then insist upon the adoption
of ARC intervention measures (audio, visual or call-back) before
response will be reinstated. It is thus necessary to ensure that all
staff with access to the alarm receive full training in its use.
The hold-up alarm should be silent at the risk address, and
the deliberately operated devices used to activate it should be
distributed and positioned such that they can be readily accessed
and operated discreetly by both those most at risk of personal
threat and by their colleagues witnessing such threat from a safer

being BS EN 50131-compliant ‘ancillary control equipment’ and
properly integrated with the premises IHAS in which case police
response might be available without the need for verification.
4.5 Money in safes
Money that is not required to be immediately available to cashiers
and other staff (ie in tills) should ideally be kept in locked safes
(though practicalities and customer service issues often require
some cash to be held in other types of container about the
premises (see 4.8 below)).
Safes should always be installed in secure, staff-only, areas and,
for any safes holding significant sums, only in areas to which
designated staff (eg cashiers and/or managers) have access.
Safes should never be positioned in locations to which the public
have access.
They should be kept locked at all times other than when it is

location (including security personnel viewing the scene from

necessary for the safe door to be opened for purposes of removing

within the security control room).

or depositing money in the course of normal business operations.

In addition to sending a hold-up alarm notification to the ARC, any

A time-delay lock will provide an additional deterrent to criminals

activation of a hold-up alarm device should also register a discreet

contemplating a day-time raid. Such locks, which introduce an

alert to senior staff at the risk address, away from the immediate

electro-mechanical delay into the process of unlocking a safe door

threat area so that they can activate the hold-up contingency plan

(whether legitimately or under duress) can be programmed for

detailed in the company security manual.

varying delay durations. The delay must be of sufficient duration

4.4 Duress alarms
For very heavy cash risks, consideration should be given to the

not only to unnerve an unprepared criminal into aborting their
raid, but also to deter those who have access to security-relevant
‘inside information’ and may be prepared to plan for a moderately

possible need for duress alarm facilities to be incorporated into

prolonged raid and delayed escape. The police often recommend

electronic security systems such as the premises intruder alarm

a programmed delay of around 20 minutes, depending on

system and perhaps also any supervised digital locks on cash
safes or strong-rooms, so that a member of staff unsetting an
alarm or unlocking a safe or strong-room under duress can
comply with the assailant’s instructions whilst at the same time
sending a discreet duress signal to an ARC (and/or the in-house
security control room).

BS 8243: Installation and configuration of intruder and hold-up
alarm systems designed to generate confirmed alarm conditions.
Code of practice. (Superseded DD 243: Installation and configuration
of intruder alarm systems designed to generate confirmed alarm
conditions. Code of practice in 2010).
11

10
11

anticipated maximum police attendance times, as ‘professional’
criminals will normally factor-in a reasonable expectation of
an alarm being raised and the police being called to attend.
Experience suggests however that many policyholders will argue
that a safe time delay of 20-minutes or more is impracticable with
regard to the normal operational needs of the business and it may
be necessary to settle for a shorter delay (possibly insufficient
to maximise the chances of police intervention but nevertheless
sufficient to deter the majority of potential raiders). An absolute
minimum delay of 5-minutes is recommended.
An alternative compromise solution is sometimes found with the
use of a safe ‘coffer’ built-in or retro-fitted within the safe which
is used to contain the bulk of the cash, and is fitted with the
time delay device whilst ‘on-call’ cash is left outside the coffer,
though still within the locked safe. Depending on trading patterns
and other operational factors, it may be possible with such an
arrangement to introduce a more significant time-delay in relation
to the large loss scenario.
It is important to display clear signage in support of the intended
deterrent effect, confirming the deployment of such devices, and
the inability of staff to circumvent them (ie to avoid or shorten
the delay).
In cases where there will be frequent placements of cash into
the safe during the working day, but more than one or two
withdrawals from the safe are not needed, it may be advisable
to install a ‘deposit safe’ so that the person responsible for cash
receipts can ‘post’ them into the safe without opening the safe
door, and thus need not be issued with a key, combination
number or PIN. Another member of staff (usually a more senior
person) is authorised and equipped to open the safe door to
remove deposited receipts, typically one per day or once per shift.
If practical, it is safer to do this when the premises are closed
for business, customers/visitors have left the building and the
premises are secured.
As with time-delay devices, good signage notifying potential
raiders of the fact that staff do not have the means to open the
safe, will help to maximise the deterrence value.

manual attack resistant and bullet resistant screens, etc.)
As an alternative to fixed screens, ‘open’ counters may be
constructed to incorporate fast-rising (normally bullet-resistant)
screens, activated by staff who may feel personally threatened
or who witness a colleague under threat. Such screens typically
rise from the counter to the ceiling within a fraction of a second,
totally isolating cashiers from customers. Further guidance on the
deployment of rising screens is available from the BSIA publication,
Code of Practice for Rising Screens (BSIA form No. 321).
Whether integral with the cash office, or remote from it, the
design of the cashier counter position should allow for a ‘safe
haven’ retreat so that cashiers can immediately retreat into a
place of relative safety away from customer view should they
feel threatened.
As with cash offices, the denial of access by unauthorised
persons, and the attack resistive quality of construction of remote
cashier counters are matters requiring careful consideration
taking full account of the likelihood of attack. Where large
amounts of money are at risk and, in the view of the insurer, the
protection afforded to the cashier by the design and construction
of the remote cashier counter is inadequate but the policyholder
insists upon maintaining an ‘open-counter’ or ‘open-plan banking’
style as an important facet of their corporate image, it may still
be possible to reach a compromise solution by reducing the on-

Note: see also paragraph 5.2.5.4 concerning the use of time
locks as a defence against hold-up.

demand availability of cash at the counter to a level that serves

4.6 Cashier counters

could be achieved by introducing a well-advertised (by means of

In some cases, cashier counters provide a direct transaction
facility between the staff within the cash office and others (staff or
customers) without, and the counter will be built into a wall of the
office. In these circumstances, it is vital that the counter maintains
the integrity of the surrounding wall in terms of its penetration
resistance (and may well need to exceed it in terms of bullet
resistance). It should thus comprise a proprietary cashier window
with in-built transaction tray (preventing ‘line of fire’ access beneath
the screen). Where transactions include the passage of large
bags, a proprietary cash-transfer hatch or hopper to the requisite
resistance level should also be provided. (Note: see also paragraph
4.1.2 concerning construction and security of cash offices).
In other cases, for example in some casinos, there may be a need
for cashier counters with a significant cash exposure potential
which are remote from a central cash office. Such counters will
also need to offer a level of protection to cashiers (and the cash
for which they are responsible) that is commensurate with the
assessed risk. It is important that any screens installed to protect
cashiers continue up to the structural floor above (ie through
any false ceiling). (Paragraph 4.1.2 describes the standards for
12

Figure 2: Transaction tray

to reduce the likelihood of a violent or threatening attack. This
signage) transaction limit, supported by a secure and rigorously
applied cash transfer system (eg vacuum tube/air-pressure
transfer – see paragraph 4.9), or transaction-limiting system (eg
teller-assist technology).
4.7 Till points
Retail till positions should preferably be positioned well away
from external doors in order to minimise their vulnerability to both
snatch attacks and violent or threatening opportunist raiders.
Strict cash-in-till limits should be applied to minimise the potential
cash loss – and in consequence also reduce the likelihood of a till
raid by any criminal with inside information.
Cash-in-till exposures can be managed by the use of a secure
cash transfer system (eg vacuum tube/air-pressure transfer, or
transaction-limiting system (eg teller-assist technology) or by the
use of at-till or local-to-till secure deposit facilities, whereby staff
can post surplus receipts into a robust, anchored container the
keys to which, for the purposes of removing deposits, are held
by other, non-front-line staff, or by a cash-in-transit (CIT) firm
who will make collections at safe times of day (preferably during

non-trading hours). Such systems/containers (other than some

the safest (not necessarily the shortest) route, avoiding potential

of the more robustly-made machines) are generally not intended

high-risk areas (eg immediately adjacent to customer entrance

to hold cash out of business hours, and are not constructed to a

doors, emergency exit routes, shared or non-staff-only corridors

standard that would withstand a determined attack with simple

and lifts – unless they can be restricted to security and cash-office

hand-tools.

staff use only). Agreement should be reached on the number of

4.8 Customer interface cash payment, dispensing,

personnel that must accompany each consignment, the means

changing, gaming and vending machines

of transportation (see below) and the maximum amount that may

Many businesses (and particularly those within the financial

be transferred per journey, and such limit(s) should be ensured

services, retail, leisure and entertainment sectors) provide

through management supervision.

customer accessed services via stand-alone and/or networked

It is generally preferable for staff-accompanied cash transfers

cash payment, recycling, dispensing, changing, gaming and
vending machines. These may be owned or leased by the
business itself, or supplied and managed (including replenishment
and withdrawal services) by a third party. Ownership and
responsibility for the cash within such machines needs to be
established for insurance purposes.
Such machines are, of course, intended to hold sufficient cash
funds for projected daily use during normal working hours, and
some (eg ‘through-the-wall’ ATMs and ticketing machines) may
also be expected to hold cash out of normal working hours. As
such, the security issues presented by cash-holding machines

to be transported within a proprietary (or otherwise purposedesigned) cash trolley incorporating attack-resistant cash
container(s) which are either permanently bolted or securely
locked into position, and with the means to remove cash (with
or without cash container) not available to those accompanying
it. There are a range of such products available, some with antisnatch alarm facilities, raising a local audible alarm in the event
that the trolley is separated from its custodian (normally wrist-link
operated), but generally speaking, the bulkier the trolley, the more
likely that it will be a deterrent to day-time snatches/raids.

(including replenishment) are dealt with as specific topics later in

In circumstances where the volume and weight of cash to be

this guide (see paragraphs. 5.4.1 and 5.4.2).

transferred is not great, policyholders might transport the cash

4.9 Cash transfers within the business premises
Cash transfers within the premises during business hours are often
necessary to facilitate the normal operational requirements of the
business, optimising the cash office function and minimising the
time required for cash reconciliation at the end of the business day.

in bags. A wide variety of bags will be encountered during
site surveys ranging from simple cotton coin bags to alarmed
cases to security bags equipped with smoke-and-dye packs.
Depending upon the amounts of cash being transferred, it may
be necessary to ask the policyholder to introduce additional or
alternative security measures (more escorts, improved means of
transportation) or else to apply lower cash limits per transit (by
increasing the frequency of collections/deliveries).
4.10 Additional hold-up defences and deterrents
4.10.1 CCTV
All significant cash risks should include continuously-recorded
(minimum 25 frames per second) CCTV as a component of
the overall security programme. In order to maximise both the
deterrence value and the post-event benefit of the CCTV system,
camera coverage needs to be comprehensive and recorded
image quality should be of sufficiently high standard for criminal
evidence personal identification purposes, with clear, high
resolution head-and-shoulders images available from at least
one camera of all persons entering or leaving the premises. The
advice of the police should be obtained.

Figure 3: Cash transfer unit

Whilst all movements of cash during business hours present
some risk, they more often than not, handled correctly, serve
to reduce the overall threat posed by day-time raiders, as they
help to lessen the crime incentive at the most exposed vulnerable
point: the customer-facing cashier or till operator.
Automated point-to-point delivery systems (eg those based
on localised air-pressure tube installations) generally offer the
safest and most secure means of transferring cash between
cash office and cashier/till-operator, permitting frequent cashfloat management transactions with little risk of interception by
unauthorised persons.

Prominent and sufficient warning notices should be posted
appropriately leaving all customers and visitors in no doubt that
a comprehensive CCTV system is in operation. Reference should
be made to the Data Protection Act 1998 and accompanying
Code of Practice. A copy of the Code of Practice can be obtained
from the Information Commissioner’s Office.
Camera placement should ensure good coverage of all external
doors (internal and external views), customer access areas,
cashier counter/till positions, cash office and security control
room (interiors, entry doors and approaches).
For heavier cash risks there should be active monitoring of
CCTV images from within the security control room (preferably

As a general principle, staff-accompanied cash transfers within

throughout business or trading hours, but at least during parts

the premises during business hours should be designed to take

or the working day when there is judged to be an enhanced risk).
13
12

4.10.2 Security fog systems

target businesses as both a deterrent to hold-up attacks and to

Security fog systems have been used to good effect by a number

aid the police and courts in bringing criminals to justice following

of banks and retail jewellers as a defence against day-time raids.

a raid. The system may be configured to discharge its spray in

Cashier-activated using deliberately operated devices (normally

reaction to both a hold-up alarm (ie a cashier-activated personal

personal attack buttons), anti-raid security fog systems are

attack button) and an intruder alarm (ie activation of a detection

designed to ‘push’ the attackers away from the cashiers’ counter

device when the alarm is set). In the case of the former, the spray

and back towards the street entrance door. Typically, the fog

would normally be discharged around anticipated raider escape

deployment will be accompanied by an automated, pre-recorded

routes (eg the front entrance door to a high street bank).

verbal warning intended to reassure lawful customers that the

As with security fog systems, it is important that all staff are

security system has been activated, that the fog is harmless and

fully trained in the appropriate use of the system and have the

that the police have been called and will arrive shortly.

opportunity to witness a test or demonstration discharge.

However, policyholders, advisors and specifiers such as

4.10.4 Banknote degradation and unique

consultants and insurers must carry out a very careful risk
assessment before sanctioning or lending any degree of support
for the technology in this application – an assessment that takes
account not only of the rationale and expectations of the system
but also the impact on legitimate occupiers of the premises (staff,
visitors and customers).
It is suggested that satisfactory completion of a sufficiently
thorough assessment would require collaboration with the
manufacturer’s representative and the installer of any triggering (ie
hold-up alarm) system. The fog products differ in their operation
and it will be necessary to evaluate whether the operational
requirement can be met by the way the equipment is expected
to operate including the required pattern of fog emission and the
time that elapses before the fog in the intended area of operation
reaches the required density. BS EN 50131-8: Alarm systems.
Intrusion and hold-up systems. Security fog device/systems
permits this to be different from the minimum performance
standard in that document and experience suggests that in the
hold-up (as opposed to intrusion) application significantly more

tagging systems
Automatically detonated dye packs may be inserted into ‘dummy’
stacks of banknotes within cashiers’ cash-drawers. These
particular stacks are intended only to be handed over in a raid
situation and the system is designed to permanently mark all the
stolen banknotes with a strongly coloured dye, rendering them
unusable for future normal transactions.
Whilst in the cash drawer, the dummy stack is in a quiescent
stand-by state, but once removed from the drawer, it is
automatically ‘armed’. The dye-pack is typically then detonated
via a radio transmitter positioned by the exit door (often with a
further programmed delay of a few seconds in order to ensure
that the raider is outside the premises when the ‘explosion’
occurs. Detonation is generally designed to be sufficient to
deeply penetrate all banknotes in the robber’s bag and the dye
sufficiently airborne to mark the robber’s clothing and skin. The
dye may additionally include unique tagging properties to link the
perpetrator to the crime for evidence purposes.

rapid obscuration is essential. (Steps are being taken to revise

4.10.5 Signage

the standard so that specific requirements are included for

Central to the aim of deterring attempts at robbery is the need

robbery prevention).

to ensure, as far as possible, that potential raiders are aware

Steps should also be taken to establish that the installer of the

that their chances of achieving a successful, lucrative crime are

triggering system will integrate and connect both systems in

very low. There should thus be prominent signage at each public

accordance with manufacturers’ instructions, will correctly

entrance to the premises indicating in brief and easily understood

commission the equipment and will ensure that the equipment is

terms the range of security measures deployed.

fully functional at all necessary times (eg is not left deactivated in
error following maintenance).

5.0 PREMISES RISK: OUT OF BUSINESS HOURS

Factors to take into account during the risk assessment should

When the premises are closed for business, all cash should be

include the reality that (i) the police will not enter a fog-filled

locked away in suitable containers. In the vast majority of cases,

environment but will wait until the fog has dissipated (which

this will mean that all (or virtually all) cash should be placed in

may take a considerable time) and (ii) that all persons (including

locked safes or strong-rooms. There are, exceptionally, some

customers and staff) leaving the area are potentially liable to be

other containers that an insurer might consider suitable for the

treated as potentially dangerous suspects by any responding

overnight security of significant sums of money (eg some of the

police officers waiting outside.

better quality ATMs) but, for the most part, containers such as

In the event that the policyholder decides to proceed with
deployment, having been fully involved in the risk assessment
process, it is important that all staff are fully trained in the appropriate
use of the system and witness a test or demonstration discharge.
Note: see paragraph 5.6 regarding the use of fog security systems
for protection of cash out of business hours. See also RISCAuthority
Guide S7: Security fog devices, for fuller guidance concerning the

14

vending, gaming, coin-change machines, etc offer little resistance
to a determined attack by comparison with cash safes, and they
should, wherever possible, either be emptied of cash at the end of
the business day or else the value of cash therein out of business
hours should be restricted to low figures (ie less than the limits
normally applied by insurers to the most modest of cash safes).
5.1 Premises security

selection, design and installation of such systems.

Any building within which large sums of money are kept should

4.10.3 Coded forensic identification (unique tagging)

main defence against out-of-hours theft of cash will be provided

be secured out of business hours to a high standard. Whilst the

spray systems

by high quality cash safes and strong-rooms, a good standard of

Coded forensic identification (otherwise known as unique tagging)

physical security to the building itself is also warranted to deter

spray systems are sometimes installed by banks and other raid-

and hopefully defeat attempts at forcible entry.

External doors should be of robust construction, particularly

European standards became available, or because it has entered

those in more secluded, vulnerable positions such as at the

the UK market via a non-traditional route), the insurer will need

rear of the premises. Accessible windows and glazed panels in

either to make its own technical comparison with already rated

external doors should be protected with steel security grilles, with

safes, or rely upon a third-party’s technical assessment and

the possible exception of those at the front of the building where

recommended classification (eg AiS).12

natural surveillance may render a surreptitious intrusion attempt
less likely.
The building should be fitted with good quality intruder alarm and

5.2.2 Certification bodies
Where a safe has been certified by a certification body that is
not recognised by the insurer, there could be concerns that the

CCTV systems (see paragraph 5.5).

product might not have been tested with the same rigour and

If the premises are protected by on-site security guards out

expertise as would be expected of the testing houses used by

of business hours, it is imperative that they have no means to
access (even under duress) any part of the building containing
money, or any other sensitive areas, and that their presence does
not in any way restrict the coverage or hinder the operation of a

recognised certification bodies and enquiries as to experience
and competence should be made accordingly. (It should be
noted in this context that, when testing safe units in accordance
with European Standards, decisions concerning the focus

comprehensive intruder alarm system.

of attacks, the choice of attack techniques and [within each

The most reliable means to ensure that the chosen guarding

discretion of those directing the tests, so the test outcome could,

resistance grade] the selection of attack tools to deploy, are at the

contractor complies fully with the current edition of BS 7499:

to a significant extent, depend upon the extent and relevance

Static site guarding and mobile patrol services. Code of

of the test team’s experience and expertise). In the absence

practice, and Security Industry Authority (SIA) rules, is to restrict

of satisfactory reassurance, the insurer may wish to consider

the selection field to those companies that are approved by the

whether the product in question might be awarded the same

National Security Inspectorate (NSI) or the Security Systems

nominal overnight cash limit that would apply had the certificate

and Alarm Inspection Board (SSAIB). If the customer’s preferred

been issued by a recognised certification body.

contractor is not approved under the guarding scheme operated
by either of these inspectorate bodies, it should be ensured that
it is at least approved under the Security Industry Authority’s
Approved Contractors Scheme (SIA-ACS).

Note: Organisations such as the European Fire and Security
Group (EFSG), the European Certification Board (Security)
(ECB-S) and Eurosafe UK aim to provide markets with a degree
of confidence that testing has been carried out to rigorous

5.2 Safes

standards by experts in the field through test house / certification

Not all products marketed as safes are, in fact, intended for the

body recognition schemes.

safeguarding of cash or valuables against theft, and those units that
are designed primarily to protect their contents against fire damage
(fire safes and data safes) are generally unlikely to warrant more (and
often rather less) than an insurer’s lowest nominal cash safe limit.
For significant cash exposures, the only safes likely to be
sufficiently robust to be acceptable to insurers are the higherrated free-standing (ie floor-standing) units, although some of
the highest quality under-floor safes might be accepted in some
circumstances for moderately high cash limits. Wall-safes are
unlikely to be considered to offer adequate security.

5.2.3 Product identification
Identification of modern, certificated safes is generally straightforward,
as the make, model, attack resistance Grade and certification body
should be clearly presented on an identification plate or label which
is normally fixed to the inside face of the safe door.
In the absence of such a plate or label (and/or helpful
documentation in the policyholder’s possession, such as a
product receipt or delivery note), identification can often be quite
problematic and success will largely depend upon the insurance
surveyor’s technical knowledge and experience and/or access to

5.2.1 Resistance grades and overnight limits

expert advice from within the safe industry. An expert might be

Insurers normally expect cash safes, ATM safes, strong-rooms

able to identify a safe if provided with:

and strong-room doors that are marketed within the UK to be

(i) a serial number (which, depending on manufacturer and age,

certified by a recognised certification body as having achieved

can sometimes be found, for example, on one of the hinges, on

a particular attack resistance level as defined in BS EN 1143-1:

one or more of the bolt ends, on the inside of the door, on the top

Secure storage units. Requirements, classification and
methods of test for resistance to burglary. Safes, ATM safes,
strongroom doors and strongrooms, or BS EN 14450: Secure

edge or leading edge of the door or on the front of the safe body)
(ii) photographs of the unit showing (a) the front of the safe with
the door in the closed position, showing details of hinges, locks

storage units. Requirements, classification and methods of

and bolt-throwing handle, and (b) an isometric view of the inside

test for resistance to burglary. Secure safe cabinets, and
will typically then award them a nominal overnight cash limit
according to their own underwriting policies and categorisation

face of the door with the bolts in the thrown position, and
(iii) critical dimensions: (a) thickness of safe body, (b) thickness of
door barrier (ie excluding bolt-work enclosure) and (c) overall

models. These nominal overnight cash limits will, depending

outer dimensions (height, width and depth).

upon the individual insurer’s underwriting philosophies, normally
range from the low £ thousands up to low 6-figure sums. Case-

5.2.4 Location and fixing

specific limits may vary from nominal limits (again according to

Safe design and barrier materials technology are of such quality

underwriting philosophies) depending upon risk-specific factors

within the high specification end of the safe industry that successful

such as the extent and quality of intruder alarm protection and
other security measures.
Where a safe is encountered that has not been independently
tested and certified (eg because it was produced before the

The Association of Insurance Surveyors (AiS) is a UK-based association of
insurance survey professionals. Its Safe Rating List is available to members
of the AiS and to those Insurers who are licensed by AiS to distribute it to
their technical staff.
12

15
14

attacks on high-rated cash safes in situ are a comparative rarity.

the whereabouts of any key (either supplied originally or as an

a high specification cash safe, a safe-breaking expert would still

additional copy) can not be ascertained, the safe lock(s), lever

also need to factor-in the time required to penetrate the unit and

set(s) or equivalent, must be replaced by a qualified safe specialist

the noise that may be created in doing so.

and the replacement keys assigned to the nominated keyholders.

Forcible opening of a high quality safe is a more favourable

Furthermore, safe keys must be retained in the custody of senior,

proposition for the safe-breaker if the unit can be uplifted and

authorised personnel and be removed from the premises when

removed to a location where it can be attacked over a prolonged

they are left unattended. Sometimes, for operational convenience,

period without risk of discovery.

keys to good quality cash safes are kept in another safe, often

The location and fixing of the safe are thus important features

of lesser quality. Logically, from a pure ‘exposure versus control’

for consideration in the risk assessment process. If the safe is
positioned deep within the premises, in a basement or on an
upper floor and in a location that does not lend itself to access

perspective in such circumstances, the maximum cash at risk
in the better safe ought not to exceed the overnight cash limit
available for the poorer quality unit if overcoming the latter will

with lifting equipment, then it will be far less vulnerable to removal

give thieves free entry to the former. Moreover, even this figure

than a safe positioned on the ground floor of (say) a megastore or

should be reduced by the equivalent of any cash value held in the

retail park unit, within close proximity to loading doors and with

poorer product.

only light partitioning to prevent access with the policyholder’s

The evaluation may be further complicated depending on whether

own fork lift trucks. Similarly, a 500kg safe that has been securely
anchored to a concrete floor by a competent safe installation
engineer in the manner prescribed by the safe manufacturer will
be far more difficult to uplift than an identical unit that has simply
been placed in position with no fixing to the floor or walls.
Whilst all freestanding safes should be anchored in accordance
with the manufacturer’s recommendations, it is generally an
imperative for safes weighing less than 1,000kg. Even if the safe
is positioned on a timber or raised steel floor rather than on a solid
concrete floor, a competent safe engineer can normally deploy a
compromise anchoring solution that will achieve an acceptable
degree of protection against removal.
Whilst retro-fit solutions can generally be freely specified when
unanchored safes are encountered on survey, a poorly located

the good quality safe has more than one lock, whether the key
lock in question is the primary or secondary locking device, and
what precautions are in place to ensure the non-availability of the
key – or the secrecy of the combination – to the other lock.
Such arrangements are highly problematic and are very unlikely
to represent a satisfactory compromise to either the policyholder
or the insurer. It should be generally recognised that any
arrangement whereby safe keys are left on the premises (eg
in key cabinets or in other safes) when unattended is normally
unacceptable and in all likelihood would, in any event, be a breach
of money insurance policy conditions.
5.2.5.2 Combination locks, PIN locks and code security
Mechanical combination locks and electronic PIN locks

safe can present greater difficulties, since relocating it will often

overcome the main risks associated with key locks (ie the loss

be impracticable. In particularly unfavourable circumstances,

or misappropriation and subsequent unauthorised use of keys),

the surveyor may need to consider the need for alternative

but introduce other potential problems (ie the possibility that

compensatory protections (eg a security fog system or enhanced

knowledge of the combination or PIN number will become known

surveillance) if the full money-in-safe limit is to be awarded.

by unauthorised persons).

An argument sometimes encountered when specifying a heavy

It should thus be ensured that the combination number is

cash safe for use on an upper floor is that the prescribed floor

made available to the minimum number of suitably authorised

loading limit will preclude it. Such concerns are often unfounded

personnel only (one PIN number per authorised user in the case

but, even if verified, such restraints can usually be overcome by

of electronic locks), that it is not recorded anywhere in writing

the use of floor-load spreader plates, and a good safe supply

or electronically and that the number is changed routinely (eg

company will be able to determine (in consultation where

every 6 or 12 months) and every time that a ‘keyholder’ leaves the

necessary with a structural engineer) the optimum solution in

policyholder’s employment or a breach in security is suspected.

terms of safe and spreader plate sizes.

It is also necessary to ensure through positioning of the safe,

5.2.5 Locking arrangements
Cash safes are available with a variety of locks and most modern
products are available with the customer’s preferred lock type.
The minimum number and quality of locks required is specified
within BS EN 1143-1 according to grade of safe (eg a minimum
of one EN 130013 Class B lock for a Grade 3 safe). All safes
Graded 4 and above must be fitted with a minimum of 2 locks
and, depending on Grade, these locks are required to be Class

through staff training and through management controls, that
entry of the combination or PIN numbers cannot be witnessed
by other persons.
5.2.5.3 Dual locking
Any safe that is required to hold significant amounts of money
(whether or not it is a modern ‘BS EN Graded’ safe) should be
equipped with at least two locks and it should be ensured that
(i) both locks are secured whenever the safe is left unattended

B, C or D).

and (ii) two persons are always required to be present in order to

5.2.5.1 Key locks and key security

distinct keyholders, and no one person holds both keys, or key

Where safes are fitted with mechanical key-operated locks

and combination, etc).

it is important to establish that the keys supplied with the safe
EN 1300: Secure storage units. Classification for high security locks
according to their resistance to unauthorized opening.
13

16

(they are always supplied in duplicate) can be accounted for. If

Even with the necessary skills, knowledge and tools to overcome

unlock the safe (ie the means to release each lock is entrusted to

As an added security measure, the safe ‘keyholders’ should not
themselves have the means to unlock the building or unset the
premises intruder alarm system .

The separation of keyholding responsibilities in this way will

is important to do so by reference to the current edition

significantly reduce the possibility of a collusion-linked loss as well

of BS EN 1143-2: Secure storage units. Requirements,

as the likelihood of a duress or kidnap attack.

classification and methods of test for resistance to burglary.

5.2.5.4 Time locks

Deposit systems.

The risk of duress and kidnap attack losses out of business hours

If a safe is fitted with a deposit facility that has not been certified

can also be reduced by the use of a safe time lock. The time

to BS EN 1143-2, and it is left containing cash out of business

lock should be set to permit opening of the safe door only during

hours, the Insurer should consider whether the unit warrants the

normal working hours (and for maximum benefit, during ‘core

full out-of-hours cash limit normally granted for the safe model

hours’ only, thus reducing the risk of hold-up at either end of the

in question, or whether it should be reduced in recognition of

working day when staffing levels may be lower).

a possibly significantly lessened resistance to forcible entry.

Time locks are an available option with most good quality cash
safe purchases and they can be retro-fitted to almost all existing
freestanding units.

Some deposit facilities, for example, comprise little more than a
posting slot at the top of a safe, with a baffle plate beneath to
hamper ‘fishing’ attacks (although such simplistic arrangements
are normally confined to lower grade products), and with the safe

5.2.5.5 Electronic locks and safe management tools

body’s integrity already compromised to such a significant extent,

A wide range of electronic safe locks is now available offering a

a much reduced overnight limit might be necessary.

multitude of different functions including allocation and deletion of

On the other hand, if the deposit system has achieved a

individual PIN codes, deployment and adjustment of time-locking

resistance Grade under BS EN 1143-2 that matches the Grade

and time delay functions and event audit trail.

achieved by the standard safe model itself (and certification is by

Greater management control can thus be exercised, without

an organisation recognised by the Insurer) then there should be

major cost or inconvenience, over the security of safes than is
possible with traditional, mechanical key or combination locks.

no need to discount the out-of-hours limit normally awarded for
the particular safe model.

For risks with multiple locations, it is also possible to fit remotely

Safe deposit systems can sometimes be retro-fitted to existing

managed electronic locks so that the various adjustable functions

cash safes, but it can be a very disruptive and expensive process,

and parameters may be configured over an entire estate of safes,

and it is generally preferable to replace the existing safe with a

audit trails may be viewed from a central location, and event alerts

factory-made deposit safe of at least similar Grade.

or exception reports (eg safe remaining open after set time) can
be transmitted to a security manager or response officer. Such

5.3 Strong-rooms

remote functionality must, of course, not extend to allow any

Where the physical volume of cash (and/or other valuable

‘unlock’ commands.
Additional enhancements such as duress alarm facilities and
biometric (normally fingerprint recognition) can also be found in
some product ranges. It is important to recognise, however, that
besides offering a wide range of facilities, electronic safe locks
are also available in a wide range of qualities with significantly
differing vulnerabilities to compromise. Any such lock intended

property) at risk is such that cash safes would be unable to provide
sufficient capacity, strongrooms can offer a viable alterative.
Modern products tend to be of the ‘demountable’ (pre-fabricated
and assembled on site) type rather than the more traditional ‘builtin-situ’ strong-room or vault and, like cash safes, they should be
independently tested and certified against BS EN 1143-1.
Strong-room components, assemblies and doors that have

for use on a safe containing significant amounts of cash should

been certified as achieving a certain resistance grade under the

be certified to at least Class B of EN 1300 (Class C or D for higher

standard are considered to be acceptable for the same nominal

graded safes with very high amounts at risk).

cash limits that are awarded by individual insurers to cash safes

An optimum solution can sometimes be found by twinning a
modern electronic lock with a traditional high security mechanical
key lock, with both devices in use out of business hours
(maximising defences against a skilled technical attack on the
safe and also a duress/kidnap attack – assuming that key and PIN
custody are not vested in any one individual) but, for operational

that have achieved the same grading. Since strong-room doors
may be purchased separately from wall, roof and floor assemblies
however, it is important to ensure that the grades are identical. If
not, the nominal cash limit awarded to the whole assembly should
be based on the lowest graded element.
Some strong-rooms and strong-room doors marketed in the UK

convenience, with perhaps just the electronic lock in use during

have achieved Underwriters’ Laboratories (UL) 608 ratings rather

working hours.

than BS EN 1143-1 gradings and Insurers will need to determine,

5.2.6 Deposit safes
Safes with inbuilt cash deposit facilities can be specified to
good effect with the intention of minimising the risk of hold-up
(see section 4.5), particularly where large cash receipts can
accumulate quickly and a cashier or till operator is more than
normally exposed to risk (eg late evening shift, lone working and/
or unprotected by robust security screens).
As the primary aim is to deter hold-up attacks by denying raiders

when confronted with such a product, where it should stand
within their safes/strongrooms rating tables. A comparison of
the test specifications associated with each standard by experts
in the industry suggests the following approximate equivalence.
(The different approaches adopted within each standard mean
that a direct equivalence cannot be demonstrated, and alternative
claims of relative superiority might be argued):
UL 608

BS EN 1143-1

their target, the means to open the safe should not be available to

Class M

Grade 1

the cashier and this should be emphasised by clear and concise

Class 1

Grade 5

signage at the point of threat.
When recommending the installation of a deposit safe, it

Class 2

Grade 7

Class 3

Grade 9

16
17

It is not uncommon to encounter strong-rooms or vaults in

The better quality ATMs will generally have been certified by one

situ when assessing heavy cash risks and, unless the unit is

of the major certification bodies to either EN 1143-1 (or a parallel

reasonably modern and still bears its certification plate or other

test specification produced by a certification body such as

positive indicators, model (or quality) identification can sometimes

VdS in Germany, sometimes also referred to by ATM suppliers/

be as problematic as is often the case with identifying older

manufacturers as CEN grades), or to UL 29115 Level 2.

‘anonymous’ safes, and the assistance of an industry expert may
need to be sought. On close inspection or enquiry, many strongroom doors to built-in-situ strong-rooms or vaults are found to

ATM safes certified by recognised certification bodies to EN 11431 may reasonably be considered as deserving of similar out-of-

be ‘book-quality’ doors of between 12 and 25mm steel plate,

hours cash limits as are safes of similar Grade, provided that the

and nominal cash limits typical of cash safes with such door

Insurer is satisfied as to positioning and anchoring (particularly in

construction may thus be appropriate, provided that the walls,

light of the number of ram-raid attacks on through-the-wall and

ceiling and floor of the vault are assessed as offering at least

even lobby ATMs).

broadly equivalent resistance (which would generally mean castin-situ, specially reinforced concrete rather than bricks or blocks).

ATMs certified to UL 291 may be classified as ‘Business hour
service’, Level 1 or Level 2 and, of these, it is considered that only

5.4 Cash out of safes / strong-rooms

the highest class (Level 2) approximates in resistance terms to a

Money policy schedules will normally limit the cover on cash out

mid-range cash safe. Indeed, ‘Business hour service’ ATMs are

of locked safes or strongrooms out of business hours to a small

not intended (even by their manufacturers) to hold cash out of

amount only since, for the most part, other types of container are

business hours.

seldom constructed to offer any great resistance to a violent attack
on the door, its lock, outer casings or even inner ‘strongboxes’.
Policyholders may, however, argue that for operational, logistical

It is, in any event, probably true to say that the majority of
ATMs installed in the UK that hold cash out of business hours,
are ‘overloaded’ when compared to the cash limits that most

or simply practical reasons, it is not reasonable or possible to

Insurers are prepared to give to cash safes of the same (or similar)

empty other containers at the close of business each day and

Grade, and if cover is provided in accordance with customers’

request increased cover to address this particular exposure.

wishes, some additional security measures are warranted to

If Underwriters are prepared to consider such a request,

compensate to some degree for the relative vulnerability of ATMs.

particularly if the sums involved are significant in the aggregate,

All such ATMs should be securely anchored to the structure of

then the inherent resistance of the containers themselves,

the building, preferably to a concrete floor in accordance with

together with the out-of-hours security arrangements for their

the manufacturers’ recommendations, and should be alarm

location should be assessed and evaluated for the exposure

protected to a high standard (see paragraph 5.5). They should

in question.

also be protected with a good quality security fog system (see

Automated teller machines (ATMs) are likely to be found in many

paragraph 5.6).

cash-based or retail consumer focused business premises, but

If the positioning of an ATM renders it vulnerable to a ram raid

there are a host of other customer interface and cashier support

attack (eg a 24-hour ‘through the wall’ ATM in a high street location),

machines that might also contain substantial amounts of cash

it should be protected with robust steel bollards, heavy planters,

out of business hours. It is probably true to say that most such

or other barrier to deter any such attack. The RISCAuthority guide

machines and facilities can contain a great deal more cash than

S10: Guidance for the protection of premises against attacks

Insurers would normally cover out of safes out of business hours

using vehicles (ram raids) provides helpful advice in this regard.

and it can be a challenge to arrive at a compromise solution,
which might be based upon restricted exposure, restricted cover
or additional security measures.
5.4.1 ATMs
Some ATMs, particularly ‘through-the-wall’ and 24-hour ‘lobby’
machines, when replenished will hold over £100,000 (and
sometimes considerably more). Others, often encountered in
small retail businesses (which fall outside the scope of this guide)
but sometimes also in more sizeable cash-centred risks such
as amusement arcades and casinos, are commonly referred to
as ‘convenience’ ATMs14 (intended for use by customers of a
business during business hours only) and will typically hold from
£4,000 or £5,000 up to perhaps £40,000 or £50,000.
The degree to which the cash-containing compartment (generally
referred to as the ‘safe’) of an ATM can withstand a physical
attack depends upon its construction and locking specification
and, if cover is required on significant cash amounts left in the
ATM when the premises are closed for business, it is necessary to

Local Authority permission will normally be necessary for the
installation of such defences however.
ATM cash replenishment should preferably be undertaken by
operatives from a contracted professional CIT company (see
Chapter 6) and only in strict ‘quarantine’ conditions, which will
necessitate the installation of secure enclosures to the rear of
ATMs within which the operatives can replenish the machines
in safety. In the absence of such enclosures, for example
where front-loading lobby or convenience ATMs are installed,
replenishment should be undertaken at the beginning or end of
the working day when the premises are closed to customers and
external doors are secured.
In some cases, the terms of the contracted CIT service will
involve the replenishment of ATMs outside of business hours
when the premises are absent of staff as well as customers. In
such circumstances, insurers will need to satisfy themselves that
the procedures for unlocking the premises and unsetting the

understand to what standard the ATM safe has been constructed

intruder alarm upon arrival, and resetting the alarm and locking-

(and, hopefully, certified by a recognised certification body).

up the premises upon departure are sound and that key and PIN
security issues are fully addressed, and an audit trail is available.

See RISCAuthority guide S3: Convenience ATMs: Recommended
security measures for further guidance.
14

18

15

Underwriters Laboratories Standard 291: Automated teller systems.

5.4.2 Other customer interface and cashier support
machines
There are, in today’s financial, leisure and retail sectors especially,
a host of cash-handling, receiving, recycling, changing, gaming
and vending machines available and insurers will encounter
many such devices in use within policyholders’ premises, some
in back-office and customer-facing cashier situations, but more
particularly, installed in publicly-accessible areas for direct use
by customers.
Depending on the number of such machines, their cash-loading
and unloading characteristics and the operational requirements
in any particular business location, it can sometimes prove
impracticable to routinely empty them at the close of business
each day and reload them at the start of following day. Where it is
practicable however, it should be encouraged since few of these
machines offer much resistance to violent attack. Furthermore,
the cost of repairing or replacing the machine following an
attack can often exceed the value of cash contents stolen, so
emptying machines and advertising the fact (with signage, leaving
empty cash-containers unlocked and ajar) can sometimes save
significant claims payouts. Where large cash exposures (per unit
or in the aggregate) will remain in machines out of business hours
(and the Insurer has agreed to consider providing an element of
cash cover beyond the normal policy out-of-safe limit) it will be
necessary to make an assessment of the container’s ability to
withstand an attack, of the anchoring arrangements to prevent
its removal and of additional security arrangements that will
help to deter, prevent or hinder an attack. It is likely that in every
case, a good standard of alarm protection will be required and
in many instances a security fog installation will be necessary.
Many containers will be found to be constructed essentially of
sheet steel, between 2mm and 5mm thick, with doors secured
sometimes with multiple bolts but often with only a single bolt
thrown by a simple low-grade lock (sometimes just a light camlock) and are thus vulnerable to forcible opening using simple
hand-tools and elementary knowledge only.
Replenishment and removal of cash of and from such machines
should, wherever possible, be undertaken at the beginning
and end of each working day when the premises are closed to
customers and external doors are secured.
In an attempt to reconcile the relative vulnerability of some
machines with the customer’s wish to avoid the need for endof-day removal of contents, a recent development has seen
the introduction of in-safe banknote management (‘recycling’)
machines, whereby the cash-handling machine is positioned
on a rail-mounted sliding platform that extends from within an
otherwise unmodified EN 1143-1 – certificated safe for use during
working hours, and is pushed back into the safe (the door to which
is then locked) until the start of the next working day. Provided
that the safe is suitable for the maximum cash limit anticipated
and has been properly anchored, etc, there should be no need for
cash to be removed from the machine overnight.
5.5 Intruder alarm and CCTV protection
All out-of-hours cash exposures of any significance should be
intruder alarm protected to a high standard. The system should
be to Grade 3 or 4 of BS EN 50131: Alarm systems. Intrusion
and hold-up systems with Level 1 police response. It should
incorporate a dual path alarm transmission system (ATS) suitable
for use with EN 50131-1 compliant systems up to and including
security Grade 4, notification option C, ie with a performance level
of ATS5 (ideally independently certified). The system design should

ensure that a confirmed alarm will be generated before intruders
reach any cash safes, ATMs or other cash containers within the
premises. In addition to protecting normally envisaged access
points (doors and windows) and routes, consideration should also,
for such risks, be given to the possibility of intrusion through walls
or floors, particularly from any neighbouring vacant properties.
Set and unset signals should be monitored by the ARC for
compliance with notified closing and opening time windows, and
any deviations (eg failure to set, or out-of-hours/early unset) should
be immediately notified to the policyholder’s duty keyholders.
Safes, strong-rooms and ATMs holding significant amounts of
cash should be additionally protected with safe ‘limpet’ or vaultguard detectors on a 24-hour circuit as an added defence against
in-house thefts, collusion, alarm system compromise by masking
movement detectors, etc.
Irrespective of the value of cash contents, all through-the-wall cash
machines and safes (such as pavement-accessed ATMs and CIT
company serviced cash transfer safes) and any lobby installed
cash machines should be additionally protected with suitable
shock-sensing detectors so that any attack from outside the alarmprotected portion of the premises will also be detected.
Vending, ticketing and other cash-holding machines that are
installed in the open (eg in car parks, on station platforms or public
pavements) should also be alarm-protected against violent attack,
unauthorised opening of the casing or access doors and removal,
and preferably with both local alarm sounder and network-borne
alarm signal.
All ATMs and other machines holding, receiving and dispensing
cash in publicly accessible places should also be supervised by
CCTV systems with 24-hour recording facility as a minimum and
preferably also alarm-activated real-time monitoring.
Note: More detailed guidance concerning the design and use
of intruder alarm systems is available in RISCAuthority Guide S9:
Intrusion and hold-up alarm systems (I&HAS): considerations
for installers and other stakeholders.
5.6 Security fog systems
Security fog systems can be used to very good effect in protecting
business premises against large, out-of-hours theft losses, and
their deployment is of particular value when physical defences
are insufficient to prevent or sufficiently delay a significant loss,
and there is little practical prospect of improving those physical
defences to an appropriate standard.
Such systems should be installed in accordance with BS EN 501318: Alarm systems. Intrusion and hold-up systems. Security fog
device/systems and with RISCAuthority Guide S7: Security fog
devices. (See also paragraph 4.10.2 regarding the use of security
fog systems as a defence against hold-up).
5.7 Banknote degradation and unique tagging systems
As an added deterrent, safes, ATMs and other (banknote) cash
containers may be fitted with automated banknote degradation and
unique tagging systems (see paragraph 4.10.4) activated by attacksensing devices mounted within the unit. In addition to the familiar
‘smoke and dye’ note marking materials, systems are now available
that aim to render stacks of banknotes unusable by the use of an
adhesive to solidify them and prevent non-destructive separation.

19
18

6.0 EXTERNAL TRANSITS

and contractor at the customer’s premises, in particular:

Cash collections and deliveries to and from the business premises
always present a risk and the larger the exposure, the greater the
risk of a well-planned attack by organised criminals.

• Use of an estimated time of arrival (ETA) notification procedure

The transportation of large sums of money is a potentially
hazardous process which is best undertaken by well trained and
properly resourced professionals, rather than as an ancillary parttime function by in-house staff.
Health and Safety considerations alone should be sufficient to
persuade most businesses with significant cash in transit needs
to employ the services of a professional cash in transit (CIT) carrier.
When the risks of cash loss, and post incident management, staff
absence and trauma counselling costs are added to the equation,
and the potential savings available to the business through
contracting out cash carrying (and perhaps also other cash-related)
functions are also taken into account, then a sound business case
can generally be easily made in favour of contracted CIT services.
6.1 Professional carriers
Policyholders should be encouraged to use professional CIT
services for all transits of cash to and from the business premises
and when amounts in transit are sizeable (eg when they reach
5-figure sums) the use of such services becomes much more vital.
6.1.1 Contractor credentials
The most reliable means to ensure that the chosen CIT contractor
complies fully with the current edition of BS 7872: Manned
security services – Cash and valuables in transit services
(collection and delivery). Code of practice, and Security
Industry Authority (SIA) rules, is to restrict the selection field to
those companies that are approved by the National Security
Inspectorate (NSI).
If the customer’s preferred contractor is not approved under the
NSI scheme, it should be ensured that it is at least approved
under the Security Industry Authority’s Approved Contractors
Scheme (SIA-ACS).
(Note: the Security Systems and Alarm Inspection Board
(SSAIB) do not operate their own scheme for the approval of CIT
contractors, though they are an ACS assessing body for the SIA
with regard to such firms).
6.1.2 Contract terms
Aside from the very significant improvement in employees’
health and safety risks associated with a move from in-house
to contracted CIT services, another important consideration is
the fact that there will also be a substantial transfer of money
insurance risk from the customer’s policy to the contractor’s
since most CIT firms assume full responsibility for cash once it is
in their custody, provided of course that their customers adhere
to the terms of the CIT contract.
The contract will probably, amongst other things, set limits on
the maximum amount of money per consignment (and per single
cash bag), so it is important that the customer’s management
procedures, standing instructions and staff training programmes
ensure that such limits are adhered to and that other contract
terms continue to be met.
6.1.3 Money transfer precautions
Whilst the policyholder’s use of professional carriers reduces the
employer’s liability and money risks to a considerable extent, the
risk does not entirely disappear of course and attention must be
paid to the arrangements for money transfer between customer
20

• Provision of a safe and secure environment for the transaction
• Provision of a safe and secure route from the cash office (if the
transaction point is remote from it)
• Strict adherence to documented procedures, especially
identity checking of CIT personnel, validation of the presented
(daily-issued, day and duty-specific) collection authorisation
card, clear marking and checking of cash amounts
collected/delivered.
6.2 Transits by own staff
For large cash risks, the use of the policyholder’s own staff for
the transportation of money is best avoided other than as an
occasional and exceptional necessity.
Where circumstances are encountered that render the use of
professional carriers impracticable or unavailable (eg default by
the CIT contractor, strike action etc), it may be preferable to agree
to a temporary increase in the ‘cash on premises’ policy cover,
rather than the introduction of transits by own staff, pending the
reinstatement of CIT services, provided that the interruption in
service is not expected to continue for more than one or two days.
The decision will, of course, be influenced by the capacity and
quality of the safes and other protections in use at the business
premises and, it might in some cases be considered that, in the
particular circumstances, the risks associated with a well-planned
staff transit are less than those incurred through a very significant
increase in the daytime and overnight premises exposure. In
most cases, however, particularly when it is known, or confidently
expected that the service interruption will be for one day only, it is
probably preferable to permit a temporarily increased accumulation
at the risk address and a delayed CIT collection.
On the other hand, where the net flow of CIT cash is into rather
than out of the business (eg currency exchange), an interruption in
CIT service might have a more critical impact on the policyholder’s
ability to trade, and an exceptional transit by staff might be a
business imperative.
The following paragraphs address the precautions that should
apply whenever cash transits are to be undertaken by the
policyholder’s staff.
6.2.1 Transit limits
The amount of money in transit, per consignment, should be
agreed between the insurer and policyholder. The cash in transit
by staff limit should generally be very much lower than the sums
normally carried by the CIT firm in recognition of the comparative
lack of training, experience, specialist vehicles, protective
equipment and clothing, and would typically be restricted to fourfigure sums.
There may, in consequence, need to be an increased number of
transits in order to meet the cash-flow needs of the business and
to avoid exceeding policy limits on cash on the premises.
6.2.2 Personnel
Whilst all transits of money involve an element of risk, that risk
can be reduced to some extent by hardening the target in the
eyes of any would-be assailants. Whilst legislation aimed at
ensuring equal employment opportunities restricts the imposition
by insurers of tight criteria for the selection of cash carriers, in
terms of gender, age and physical capacity, another important
risk reduction factor is the number of staff that would need to be

confronted by street robbers and insurers should seek to agree a
sensible minimum number with the policyholder.
Other than for very low sums (eg topping up petty cash floats)
cash transits should always be accompanied by at least
two members of staff and preferably more. Significant sums
(approaching 5-figure sums) will often warrant 3 or 4 persons to
accompany the money.
6.2.3 Conveyance methods and security
Transits by staff should be as discreet as possible, with times,
routes and amounts known only to a minimum number of
responsible personnel, and with care taken to avoid, as far as
possible, identifiable and predictable routines.
Although it is usually the case that the shorter the time that money
is at risk in transit the better, the policyholder’s risk assessment
should help to determine which bank branch should be used
for collections and deliveries of money, bearing in mind that the
closest bank may not be situated in the safest locality, and it could
be preferable to drive to a more distant bank, particularly if the
vehicle can exit from a policyholder’s secure and exclusive car
park, rather than money being carried on foot through high risk
neighbourhoods.
It is preferable for money to be carried on the person (eg in
pockets) where it is practicable to do so, dividing the consignment
between the escorts as necessary in order not to draw attention
unnecessarily to the purpose of the journey. Where the volume
of cash is such that bags have to be used, then these should be
anonymous in appearance so that the nature of their content is
not readily evident. For large sums in transit, proprietary cash-

• the risk assessment carried out by the policyholder will
probably have concluded that it would be safer for the
accumulating payload to be secured within the vehicle, rather
than being carried by an operative on foot in public areas
whilst making further pick-ups. (Note: this may be a breach
of a policy condition or exclusion relating to money in an
unattended vehicle, unless there are two operatives carrying
out the round and one remains on watch in the vehicle whilst
the other attends to the pick-up).
Cash collection rounds should be arranged so that an agreed
maximum accumulated cash limit can be successfully managed.
This may mean sub-dividing established rounds so that collected
monies are deposited back to base more frequently during each
shift. Wherever possible, arrangements should be in place to
ensure that operatives can park the cash collection vehicle very
close to the pick-up point.
As with transits between premises and bank, lone working
operations should be avoided. Cash collection staff should be
provided with adequate mobile communications, preferably using
two-way radios providing continuously available contact with
base, and with mobile telephones as back-up.
The vehicle should be fitted with a good quality vehicle deposit
safe (either securely bolted/welded in place or of the removable,
base-plate-mounted type), to which the collection staff have no
keys, and all cash should be put into the safe immediately upon
collection. The safe should not be visible from outside the vehicle
when its doors, hatches and boot are closed, and there should be
clear signage on the safe regarding the non-availability of keys to
open or (if applicable) remove the safe from its mounting.

carrying bags (or alternatively security device bag-insert units)
should be considered. A range of such products is available,
offering audible alarms and/or ‘smoke and dye’ banknote marking
and degradation systems. Activation of the system can be initiated
either mechanically by detachable wrist-strap or by radio (either
actively sending a signal or by the cessation of a short-range
holding-off signal). Observable wrist-straps are generally not
favoured as they can attract unwanted attention, and in particular
(for staff safety reasons) chains or straps that are not designed to
detach when the bag is snatched should be avoided.
Any vehicle used for the transportation of money should also be
as anonymous as possible. The route should be planned so as
to avoid quiet isolated roads, there should be no other purpose
in the journey than the delivery/collection of money to/from the
bank and there should be no unnecessary other stops (eg for
fuel). All doors, hatches and boot lids should be kept locked for
the duration of the journey.
The vehicle must never be left unattended when containing money.
6.2.4 ‘Roundsmen’ risks
Some risks may involve the collection of cash from a succession
of remote locations (eg from sub-branches of the business or
from car parking ticket machines) by the policyholder’s staff, with
a consequent accumulation in money exposure during the course
of the round.
Similar considerations to those described in paragraphs 6.2.1 to
6.2.3 apply to roundsmen’s transits except that:
• the vehicle used for such purposes will generally be making
several stops before returning to base, with each one resulting
in a steadily increasing temptation to robbers who are
prepared to research their targets prior to launching an attack.
20
21

7.0 REFERENCES

19.

EN 1300: Secure storage units. Classification for
high security locks according to their resistance to
unauthorised opening. British Standards Institution.

20.

Loss Prevention Standard (LPS) 1175: Requirements and
testing procedures for the LPCB approval and listing of
intruder resistant building components, strongpoints,
security enclosures and free-standing barriers.

21.

Loss Prevention Standard (LPS) 1270: Requirements
and testing procedures for the LPCB approval and
listing of intruder resistant security glazing units. BRE
Certification.

22.

Underwriters Laboratories (UL) Standard 291: Automated
Teller Systems.

The following publications are referred to within this guide:
Standards
1.

BS 5051 Bullet resistant glazing. Specification for 		
glazing for interior use. British Standards Institution.

2.

BS 5357: Code of practice for installation and
application of security glazing. British Standards
Institution.

3.

BS 5544: Specification for anti-bandit glazing (glazing
resistant to manual attack). British Standards Institution.

4.

BS 7042: Specification for high security intruder alarm
systems in buildings. British Standards Institution.

5.

BS 7499: Static site guarding and mobile patrol
services. Code of practice. British Standards Institution.

6.

BS 7858: Security screening of personnel employed in
a security environment. British Standards Institution.

1.

BS 7872: Manned security services. Cash and
valuables in transit services (collection and delivery).
Code of practice. British Standards Institution.

RISCAuthority
Guide
S3:
Convenience
ATMs.
Recommended security measures, 2007, Fire Protection
Association.

2.

RISCAuthority Guide S6: Electronic security systems:
Guidance on keyholder selection and duties, 2009,
Fire Protection Association.

3.

RISCAuthority Guide S7: Security fog devices, 2007,
Fire Protection Association.

4.

RISCAuthority Guide S9: Intrusion and hold-up alarm
systems (I&HAS): considerations for installers and
other stakeholders, 2009, Fire Protection Association.

5.

RISCAuthority Guide S10: Guidance for the protection
of premises against attacks using vehicles (ram raids),
2009, Fire Protection Association.

6.

RISCAuthority Guide S11: Security of emergency exit
doors in non-residential premises, 2009, Fire Protection
Association.

7.

RISCAuthority Guide - Cash Security (A guide for business
- in preparation)

7.

8.

9.

DD 243: Installation and configuration of intruder
alarm systems designed to generate confirmed alarm
conditions. Code of practice. (Superseded by BS 8243
in 2010.) British Standards Institution.

10.

BS EN 356: Glass in building. Security glazing. Testing
and classification of resistance against manual attack.
British Standards Institution.

11.

BS EN 1063: Glass in building. Security glazing. Testing
and classification of resistance against bullet attack.
British Standards Institution.

12.

BS EN 1143-1: Secure storage units. Requirements,
classification and methods of test for resistance to
burglary. Safes, ATM safes, strongroom doors and
strongrooms. British Standards Institution.

8.

AiS Safe Rating List.

9.

BS EN 1143-2: Secure storage units. Requirements,
classification and methods of test for resistance to
burglary. Deposit systems. British Standards Institution.

BSIA publication, A specifier’s guide to the security
classification of access control systems (Form No.132).

10.

BSIA publication, Code of Practice for Rising Screens
(BSIA form No. 321).

13.

22

BS 8243: Installation and configuration of intruder
and hold-up alarm systems designed to generate
confirmed alarm conditions. Code of practice. British
Standards Institution.

Guides

14.

BS EN 1522: Windows, doors, shutters and blinds.
Bullet resistance. Requirements and classification.
British Standards Institution.

15.

BS EN 14450: Secure storage units. Requirements,
classification and methods of test for resistance
to burglary. Secure safe cabinets. British Standards
Institution.

16.

BS EN 50131: Alarm systems. Intrusion and hold-up
systems. British Standards Institution.

17.

BS EN 50131-8: Alarm systems. Intrusion and holdup systems. Security fog device/systems. British
Standards Institution.

18.

BS EN 50133-1: System requirements for access
control systems. British Standards Institution.

APPENDIX 1. SURVEYORS’ AIDE MEMOIRE: CASH RISK ASSESSMENT

Nature and size
of business
Type and
occupation of
building
Business hours

Trade

Money exposure:

Head office/branch

normal maximum

Staff numbers

exceptional maximum

Description of building and Policyholder’s occupation
Other occupants
Staff hours/shift patterns
Trading (customer access) hours
Manned security shifts

Location

Immediate environs
General neighbourhood
Local crime rate

Loss history

Dates, amounts, circumstances, remedial action

Building security

Door and window protection
Ram raid defences
Intruder and hold-up alarm (+ duress?)
CCTV installation
Guarding (incl. key-holding / alarm control restrictions)
Security fog
Signage

Locking/
unlocking

By whom/numbers
Separated key-holding responsibilities (not cashier staff / safe keyholders)
Procedures/precautions
Key security

Site security

Fences/gates
Lighting
CCTV
External intruder alarm

Cash office

Location

Money exposure:

Construction (resistance grade/materials)

normal maximum

Staff numbers/shifts

exceptional maximum

Intruder and hold-up alarm
Access control/door security/viewing and verification
Security control
room

Location
Construction (resistance grade/materials)
Staff numbers/shifts
Intruder and hold-up alarm
Access control/door security/viewing and verification

Cashier
counters

Number and location

Money exposure:

Construction (resistance grade/materials)

normal maximum

Hold-up alarm

exceptional maximum

Fixed/rising screens
Cash float management
Sales tills

Number and location

Money exposure:

Construction (resistance grade/materials)

normal maximum

Hold-up alarm

exceptional maximum

Fixed/rising screens
Cash float management

22
23

Safes/
strong-rooms

Makes, models, location

Money exposure:

Lock types/numbers

normal maximum

Time locks

exceptional maximum

Time delay locks
Anchoring
Single or dual control
Day use/night use
Key/combination/PIN security
Alarm protection (+ duress?)
Banknote degradation
ATMs

Ownership and responsibility:

Money exposure:

(machines and contents)

normal maximum

Makes, models, location

exceptional maximum

Lock types/numbers
Anchoring
Single or dual control
Key/combination/PIN security
Alarm protection (+ duress?)
Banknote degradation
Replenishment procedures and precautions
Other cash
machines/
containers

Ownership and responsibility:

Money exposure:

(machines and contents)

normal maximum

Makes, models, location

exceptional maximum

Lock types/numbers
Anchoring
Single or dual control
Key/combination/PIN security
Alarm protection
Banknote degradation
Cash removal/replenishment procedures and precautions
Transits within
the premises
External
transits:
Contracted CIT
service

Purpose

Money exposure:

By whom/numbers

normal maximum

Methods/precautions/equipment

exceptional maximum

Contractor name and credentials

Money exposure:

Contract liability limits

normal maximum

Frequency of pick-ups/deliveries

exceptional maximum

Hand-over location and access precautions
Identification and verification procedures

External
transits: Own
staff

Purpose (banking, collection rounds?)

Money exposure:

By whom/numbers

normal maximum

Methods/precautions/equipment

exceptional maximum

Frequency
Management

Management of security and H&S
Security policy/manual
Health and safety policy/manual

Staff
recruitment &
vetting
Training

CRB, references and other checks
Probationary and ongoing supervision
Normal security procedures
Incident procedures (incl. hold-up, duress and tiger kidnap)
Correct use of hold-up alarm
Intruder alarm response

24

Visitors/
contractors

Management, identification, signing in/out, badging, supervision

Compliance with
policy conditions

eg concerning key security, use of intruder alarm systems, cash carrying
precautions, money in vehicles, etc.

APPENDIX 2. BULLET RESISTANCE COMPARISON GUIDE
Selection of the world’s ballistics

Ballistics data comparison

Doors
BS EN
1522:1999

Glazing
BS EN
1063:2000

(Old UK
Standard)

(Latest
European
Standard)

NIJ 010801

UL752

GOST
R5096396

(USA)

(USA)

(Russian)

CLASS

CLASS

CLASS

CLASS

CLASS

CLASS

FB1

N/A

BR1

1

N/A

N/A

(Latest
European
Standard)

BS
5051:1998

FB2

GO

BR2

II

1

1

FB3

G1

BR3

II

2

N/A

FB4

G2

BR4

III A

6+3

N/A

FB5

R1

BR5

N/A

7

3

FB6

R2

BR6

III

N/A

4

FB7

N/A

BR7

M14

8

5

N/A

SB6

SG1

N/A

N/A

N/A

FSG

N/A

SG2

N/A

Shotgun

N/A

Bullet Codes:						

General note:

TYPE OF
WEAPON

BULLET
CALIBRE

Rifle

0.22 LR

L/RN

Hand gun

9MM
LUGER

FJ 1) RN/SC

Hand gun

0.357
MAGNUM

FJ 1) CB/SC

Hand gun

0.357
MAGNUM

FJ 1) CB/SC
FJ 2) FN/SC

0.44
MAGNUM
Rifle

5.56 X 45

FJ 2) PB/SCP1

Rifle

5.56 X 45

FJ 2) PB/SCP1

7.62 X 51

FJ 2) PB/SC

Rifle

7.62 X 51

FJ 2) PB/HC1

Shotgun

12/70

Solid lead
slug 1

Shotgun

12/70

Solid lead
slug 1

L

Lead						

BS EN 1063:2000 supercedes BS 5051.

CB

Coned lead						

Refer to relative standards for full information.

FJ 1)

Full steel jacket (plated)

FJ 2)

Full nose bullet

HC1

BULLET
TYPE

Steel hard core, mass 3.7g
0.1g, hardness more than 63 HRC

PB

Pointed bullet

RN

Round nose bullet

SC

Soft core (lead)

SCP1 - Soft core (lead) with steel
penetrator (type SS109)
Bullet resistance comparison guide reproduced by kind permission of Stafford Bridge Doors Ltd.

25
24

Fire Protection Association
London Road, Moreton in Marsh
Gloucestershire GL56 0RH, UK
Tel: +44 (0)1608 812500 Fax: +44 (0)1608 812501
Email: administrator@riscauthority.co.uk
Website: www.riscauthority.co.uk
2012 © The Fire Protection Association
on behalf of RISCAuthority

administered by



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : Yes
Encryption                      : Standard V4.4 (128-bit)
User Access                     : Print, Extract
Create Date                     : 2012:10:22 10:09:56+01:00
Creator                         : Adobe InDesign CS4 (6.0.6)
Modify Date                     : 2012:10:22 10:26:20+01:00
Has XFA                         : No
Tagged PDF                      : Yes
XMP Toolkit                     : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:08:04
Instance ID                     : uuid:ec419c57-64bf-4584-84de-88dcaee72759
Document ID                     : xmp.did:E01F7302637DE1118F0BF5753896F0AA
Original Document ID            : adobe:docid:indd:40b6456d-f2ab-11dd-8062-ad2e9a545f2e
Rendition Class                 : proof:pdf
Derived From Instance ID        : xmp.iid:DF1F7302637DE1118F0BF5753896F0AA
Derived From Document ID        : xmp.did:6E2BDF49261FE111BA56C36E289A119F
Derived From Original Document ID: adobe:docid:indd:40b6456d-f2ab-11dd-8062-ad2e9a545f2e
Derived From Rendition Class    : default
History Action                  : saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved
History Instance ID             : xmp.iid:2687CFFB2307DE11A8EEEE44B8B7F93E, xmp.iid:2787CFFB2307DE11A8EEEE44B8B7F93E, xmp.iid:14CC62213207DE119EB5D5784CE18170, xmp.iid:15CC62213207DE119EB5D5784CE18170, xmp.iid:53947B0C7B23DE11B1D58B79EF71834E, xmp.iid:54947B0C7B23DE11B1D58B79EF71834E, xmp.iid:55947B0C7B23DE11B1D58B79EF71834E, xmp.iid:56947B0C7B23DE11B1D58B79EF71834E, xmp.iid:57947B0C7B23DE11B1D58B79EF71834E, xmp.iid:58947B0C7B23DE11B1D58B79EF71834E, xmp.iid:59947B0C7B23DE11B1D58B79EF71834E, xmp.iid:5A947B0C7B23DE11B1D58B79EF71834E, xmp.iid:5B947B0C7B23DE11B1D58B79EF71834E, xmp.iid:5C947B0C7B23DE11B1D58B79EF71834E, xmp.iid:FC5C9EDC8223DE11B1D58B79EF71834E, xmp.iid:FD5C9EDC8223DE11B1D58B79EF71834E, xmp.iid:FE5C9EDC8223DE11B1D58B79EF71834E, xmp.iid:FF5C9EDC8223DE11B1D58B79EF71834E, xmp.iid:005D9EDC8223DE11B1D58B79EF71834E, xmp.iid:015D9EDC8223DE11B1D58B79EF71834E, xmp.iid:025D9EDC8223DE11B1D58B79EF71834E, xmp.iid:035D9EDC8223DE11B1D58B79EF71834E, xmp.iid:045D9EDC8223DE11B1D58B79EF71834E, xmp.iid:055D9EDC8223DE11B1D58B79EF71834E, xmp.iid:065D9EDC8223DE11B1D58B79EF71834E, xmp.iid:E4813F7F8723DE11B1D58B79EF71834E, xmp.iid:E5813F7F8723DE11B1D58B79EF71834E, xmp.iid:E6813F7F8723DE11B1D58B79EF71834E, xmp.iid:E7813F7F8723DE11B1D58B79EF71834E, xmp.iid:E8813F7F8723DE11B1D58B79EF71834E, xmp.iid:E9813F7F8723DE11B1D58B79EF71834E, xmp.iid:EA813F7F8723DE11B1D58B79EF71834E, xmp.iid:EB813F7F8723DE11B1D58B79EF71834E, xmp.iid:EC813F7F8723DE11B1D58B79EF71834E, xmp.iid:ED813F7F8723DE11B1D58B79EF71834E, xmp.iid:EE813F7F8723DE11B1D58B79EF71834E, xmp.iid:5AA2BE2F1924DE1198A9D4797DE82314, xmp.iid:5CA2BE2F1924DE1198A9D4797DE82314, xmp.iid:5DA2BE2F1924DE1198A9D4797DE82314, xmp.iid:89FCB5610733DE11B0DCB26BB855916B, xmp.iid:8AFCB5610733DE11B0DCB26BB855916B, xmp.iid:8BFCB5610733DE11B0DCB26BB855916B, xmp.iid:8CFCB5610733DE11B0DCB26BB855916B, xmp.iid:8DFCB5610733DE11B0DCB26BB855916B, xmp.iid:DBCD758B1B33DE11A17AE6161CCEDA55, xmp.iid:C12C24D42833DE11B0DCB26BB855916B, xmp.iid:0A6E187E3D33DE11B0F5D3A4651BCA30, xmp.iid:C32C24D42833DE11B0DCB26BB855916B, xmp.iid:C42C24D42833DE11B0DCB26BB855916B, xmp.iid:0FD5CCC0CE33DE118504CA100C47F746, xmp.iid:3FC41CBBD933DE118504CA100C47F746, xmp.iid:40C41CBBD933DE118504CA100C47F746, xmp.iid:42C41CBBD933DE118504CA100C47F746, xmp.iid:537FB8669334DE1189C3FB8092048156, xmp.iid:A5DECFB2CB34DE1189C3FB8092048156, xmp.iid:A9DECFB2CB34DE1189C3FB8092048156, xmp.iid:CC0AF1CC5144DE11B49682710E4ED20A, xmp.iid:CD0AF1CC5144DE11B49682710E4ED20A, xmp.iid:CE0AF1CC5144DE11B49682710E4ED20A, xmp.iid:CF0AF1CC5144DE11B49682710E4ED20A, xmp.iid:D50AF1CC5144DE11B49682710E4ED20A, xmp.iid:635A59ED7E44DE11B49682710E4ED20A, xmp.iid:645A59ED7E44DE11B49682710E4ED20A, xmp.iid:655A59ED7E44DE11B49682710E4ED20A, xmp.iid:665A59ED7E44DE11B49682710E4ED20A, xmp.iid:675A59ED7E44DE11B49682710E4ED20A, xmp.iid:685A59ED7E44DE11B49682710E4ED20A, xmp.iid:492395CE1745DE11A4739E5BFE7A79AC, xmp.iid:4A2395CE1745DE11A4739E5BFE7A79AC, xmp.iid:4E2395CE1745DE11A4739E5BFE7A79AC, xmp.iid:E5F68F4BD849DE118192898E0F05A635, xmp.iid:E6F68F4BD849DE118192898E0F05A635, xmp.iid:E7F68F4BD849DE118192898E0F05A635, xmp.iid:E8F68F4BD849DE118192898E0F05A635, xmp.iid:E9F68F4BD849DE118192898E0F05A635, xmp.iid:EAF68F4BD849DE118192898E0F05A635, xmp.iid:EBF68F4BD849DE118192898E0F05A635, xmp.iid:ECF68F4BD849DE118192898E0F05A635, xmp.iid:EDF68F4BD849DE118192898E0F05A635, xmp.iid:EEF68F4BD849DE118192898E0F05A635, xmp.iid:D385ADB8F649DE118192898E0F05A635, xmp.iid:D485ADB8F649DE118192898E0F05A635, xmp.iid:D585ADB8F649DE118192898E0F05A635, xmp.iid:D685ADB8F649DE118192898E0F05A635, xmp.iid:D785ADB8F649DE118192898E0F05A635, xmp.iid:D885ADB8F649DE118192898E0F05A635, xmp.iid:D985ADB8F649DE118192898E0F05A635, xmp.iid:DA85ADB8F649DE118192898E0F05A635, xmp.iid:DB85ADB8F649DE118192898E0F05A635, xmp.iid:DC85ADB8F649DE118192898E0F05A635, xmp.iid:DD85ADB8F649DE118192898E0F05A635, xmp.iid:E90D907A0D4ADE118192898E0F05A635, xmp.iid:EA0D907A0D4ADE118192898E0F05A635, xmp.iid:79CDDC729C4ADE11B239A4FA22B10B03, xmp.iid:7ACDDC729C4ADE11B239A4FA22B10B03, xmp.iid:7BCDDC729C4ADE11B239A4FA22B10B03, xmp.iid:7CCDDC729C4ADE11B239A4FA22B10B03, xmp.iid:7DCDDC729C4ADE11B239A4FA22B10B03, xmp.iid:7ECDDC729C4ADE11B239A4FA22B10B03, xmp.iid:7FCDDC729C4ADE11B239A4FA22B10B03, xmp.iid:80CDDC729C4ADE11B239A4FA22B10B03, xmp.iid:81CDDC729C4ADE11B239A4FA22B10B03, xmp.iid:82CDDC729C4ADE11B239A4FA22B10B03, xmp.iid:7E734C4FD04ADE11B239A4FA22B10B03, xmp.iid:7F734C4FD04ADE11B239A4FA22B10B03, xmp.iid:648CD303544FDE11AAD6D31A6B5677A4, xmp.iid:658CD303544FDE11AAD6D31A6B5677A4, xmp.iid:668CD303544FDE11AAD6D31A6B5677A4, xmp.iid:678CD303544FDE11AAD6D31A6B5677A4, xmp.iid:AB6C8CE15C4FDE11AAD6D31A6B5677A4, xmp.iid:AC6C8CE15C4FDE11AAD6D31A6B5677A4, xmp.iid:102354328F4FDE11AAD6D31A6B5677A4, xmp.iid:1B5C75B51E50DE11BAE4F9F1C3EA330E, xmp.iid:A0EF92904150DE11BAE4F9F1C3EA330E, xmp.iid:3FC82E3A4E5ADE11AB4A9A33DF1F8508, xmp.iid:43C82E3A4E5ADE11AB4A9A33DF1F8508, xmp.iid:DBBB9A3C645ADE11AB4A9A33DF1F8508, xmp.iid:DCBB9A3C645ADE11AB4A9A33DF1F8508, xmp.iid:09C7CD4D1D5BDE1192BA913CD820C447, xmp.iid:4445F081AF60DE11A53AFBA98582262D, xmp.iid:4545F081AF60DE11A53AFBA98582262D, xmp.iid:4645F081AF60DE11A53AFBA98582262D, xmp.iid:4745F081AF60DE11A53AFBA98582262D, xmp.iid:4845F081AF60DE11A53AFBA98582262D, xmp.iid:4945F081AF60DE11A53AFBA98582262D, xmp.iid:4A45F081AF60DE11A53AFBA98582262D, xmp.iid:4B45F081AF60DE11A53AFBA98582262D, xmp.iid:4C45F081AF60DE11A53AFBA98582262D, xmp.iid:4D45F081AF60DE11A53AFBA98582262D, xmp.iid:BB5051D6C060DE11A53AFBA98582262D, xmp.iid:BC5051D6C060DE11A53AFBA98582262D, xmp.iid:BD5051D6C060DE11A53AFBA98582262D, xmp.iid:BE5051D6C060DE11A53AFBA98582262D, xmp.iid:BF5051D6C060DE11A53AFBA98582262D, xmp.iid:C05051D6C060DE11A53AFBA98582262D, xmp.iid:C15051D6C060DE11A53AFBA98582262D, xmp.iid:C25051D6C060DE11A53AFBA98582262D, xmp.iid:C35051D6C060DE11A53AFBA98582262D, xmp.iid:C45051D6C060DE11A53AFBA98582262D, xmp.iid:C55051D6C060DE11A53AFBA98582262D, xmp.iid:046946DFD560DE11A53AFBA98582262D, xmp.iid:056946DFD560DE11A53AFBA98582262D, xmp.iid:066946DFD560DE11A53AFBA98582262D, xmp.iid:E33701F78464DE1197BDBF49661FE2F9, xmp.iid:E43701F78464DE1197BDBF49661FE2F9, xmp.iid:E53701F78464DE1197BDBF49661FE2F9, xmp.iid:E63701F78464DE1197BDBF49661FE2F9, xmp.iid:61EA56DEC364DE118605A642DDEE41ED, xmp.iid:A7B798324C65DE11926CD3F3AFEBD291, xmp.iid:A8B798324C65DE11926CD3F3AFEBD291, xmp.iid:E6BE288ED375DE119C86AF9D1E1ECCDF, xmp.iid:971044B0B67ADE1185E6D927BC2B92EC, xmp.iid:3599D52E97ADDE11B291E608917DB1B7, xmp.iid:3699D52E97ADDE11B291E608917DB1B7, xmp.iid:3799D52E97ADDE11B291E608917DB1B7, xmp.iid:3899D52E97ADDE11B291E608917DB1B7, xmp.iid:3999D52E97ADDE11B291E608917DB1B7, xmp.iid:3A99D52E97ADDE11B291E608917DB1B7, xmp.iid:3B99D52E97ADDE11B291E608917DB1B7, xmp.iid:3C99D52E97ADDE11B291E608917DB1B7, xmp.iid:3D99D52E97ADDE11B291E608917DB1B7, xmp.iid:3E99D52E97ADDE11B291E608917DB1B7, xmp.iid:00580F909DADDE11B291E608917DB1B7, xmp.iid:01580F909DADDE11B291E608917DB1B7, xmp.iid:02580F909DADDE11B291E608917DB1B7, xmp.iid:03580F909DADDE11B291E608917DB1B7, xmp.iid:04580F909DADDE11B291E608917DB1B7, xmp.iid:05580F909DADDE11B291E608917DB1B7, xmp.iid:06580F909DADDE11B291E608917DB1B7, xmp.iid:07580F909DADDE11B291E608917DB1B7, xmp.iid:08580F909DADDE11B291E608917DB1B7, xmp.iid:09580F909DADDE11B291E608917DB1B7, xmp.iid:0A580F909DADDE11B291E608917DB1B7, xmp.iid:935536F09FADDE11B291E608917DB1B7, xmp.iid:945536F09FADDE11B291E608917DB1B7, xmp.iid:955536F09FADDE11B291E608917DB1B7, xmp.iid:965536F09FADDE11B291E608917DB1B7, xmp.iid:975536F09FADDE11B291E608917DB1B7, xmp.iid:985536F09FADDE11B291E608917DB1B7, xmp.iid:995536F09FADDE11B291E608917DB1B7, xmp.iid:9A5536F09FADDE11B291E608917DB1B7, xmp.iid:9B5536F09FADDE11B291E608917DB1B7, xmp.iid:9C5536F09FADDE11B291E608917DB1B7, xmp.iid:9D5536F09FADDE11B291E608917DB1B7, xmp.iid:D65D8C9AA7ADDE11B291E608917DB1B7, xmp.iid:D75D8C9AA7ADDE11B291E608917DB1B7, xmp.iid:D85D8C9AA7ADDE11B291E608917DB1B7, xmp.iid:D95D8C9AA7ADDE11B291E608917DB1B7, xmp.iid:DA5D8C9AA7ADDE11B291E608917DB1B7, xmp.iid:DB5D8C9AA7ADDE11B291E608917DB1B7, xmp.iid:DC5D8C9AA7ADDE11B291E608917DB1B7, xmp.iid:DD5D8C9AA7ADDE11B291E608917DB1B7, xmp.iid:DE5D8C9AA7ADDE11B291E608917DB1B7, xmp.iid:C64DFE0E86B1DE1196DDFD5776BAC320, xmp.iid:C74DFE0E86B1DE1196DDFD5776BAC320, xmp.iid:C84DFE0E86B1DE1196DDFD5776BAC320, xmp.iid:DD652660B9B1DE1196DDFD5776BAC320, xmp.iid:DE652660B9B1DE1196DDFD5776BAC320, xmp.iid:DF652660B9B1DE1196DDFD5776BAC320, xmp.iid:E2652660B9B1DE1196DDFD5776BAC320, xmp.iid:AE11F1ABC7B1DE1196DDFD5776BAC320, xmp.iid:77AD6A1651B2DE11BF33C55EE725C7EB, xmp.iid:78AD6A1651B2DE11BF33C55EE725C7EB, xmp.iid:79AD6A1651B2DE11BF33C55EE725C7EB, xmp.iid:7AAD6A1651B2DE11BF33C55EE725C7EB, xmp.iid:7BAD6A1651B2DE11BF33C55EE725C7EB, xmp.iid:7CAD6A1651B2DE11BF33C55EE725C7EB, xmp.iid:7DAD6A1651B2DE11BF33C55EE725C7EB, xmp.iid:7EAD6A1651B2DE11BF33C55EE725C7EB, xmp.iid:7FAD6A1651B2DE11BF33C55EE725C7EB, xmp.iid:80AD6A1651B2DE11BF33C55EE725C7EB, xmp.iid:C32FD9F357B2DE11BF33C55EE725C7EB, xmp.iid:C42FD9F357B2DE11BF33C55EE725C7EB, xmp.iid:C52FD9F357B2DE11BF33C55EE725C7EB, xmp.iid:C62FD9F357B2DE11BF33C55EE725C7EB, xmp.iid:C72FD9F357B2DE11BF33C55EE725C7EB, xmp.iid:C82FD9F357B2DE11BF33C55EE725C7EB, xmp.iid:C92FD9F357B2DE11BF33C55EE725C7EB, xmp.iid:CA2FD9F357B2DE11BF33C55EE725C7EB, xmp.iid:CB2FD9F357B2DE11BF33C55EE725C7EB, xmp.iid:1117CD0D70B2DE11BF33C55EE725C7EB, xmp.iid:1217CD0D70B2DE11BF33C55EE725C7EB, xmp.iid:1317CD0D70B2DE11BF33C55EE725C7EB, xmp.iid:1417CD0D70B2DE11BF33C55EE725C7EB, xmp.iid:1517CD0D70B2DE11BF33C55EE725C7EB, xmp.iid:C03EA3CC18B3DE11BFFDC041E636E185, xmp.iid:C13EA3CC18B3DE11BFFDC041E636E185, xmp.iid:C23EA3CC18B3DE11BFFDC041E636E185, xmp.iid:C33EA3CC18B3DE11BFFDC041E636E185, xmp.iid:7C2A8E2329B3DE11BFFDC041E636E185, xmp.iid:7E2A8E2329B3DE11BFFDC041E636E185, xmp.iid:7F2A8E2329B3DE11BFFDC041E636E185, xmp.iid:802A8E2329B3DE11BFFDC041E636E185, xmp.iid:812A8E2329B3DE11BFFDC041E636E185, xmp.iid:822A8E2329B3DE11BFFDC041E636E185, xmp.iid:832A8E2329B3DE11BFFDC041E636E185, xmp.iid:842A8E2329B3DE11BFFDC041E636E185, xmp.iid:852A8E2329B3DE11BFFDC041E636E185, xmp.iid:E897BA6456B3DE11BFFDC041E636E185, xmp.iid:E997BA6456B3DE11BFFDC041E636E185, xmp.iid:EA97BA6456B3DE11BFFDC041E636E185, xmp.iid:EB97BA6456B3DE11BFFDC041E636E185, xmp.iid:C12C600207B7DE1185119681C7B13173, xmp.iid:B02FFA3119C2DE11A89992EE941FE7C7, xmp.iid:B12FFA3119C2DE11A89992EE941FE7C7, xmp.iid:B22FFA3119C2DE11A89992EE941FE7C7, xmp.iid:B32FFA3119C2DE11A89992EE941FE7C7, xmp.iid:7DB70631A8C3DE119740C03051E79CBA, xmp.iid:A6D7AA7FB3C3DE119740C03051E79CBA, xmp.iid:60103EAC90C7DE118F37A0F51272304E, xmp.iid:63103EAC90C7DE118F37A0F51272304E, xmp.iid:7D7D717D18E4DE118C23FA861268BC56, xmp.iid:106FFEE3A3E4DE11B0B5A5269D2DC650, xmp.iid:146FFEE3A3E4DE11B0B5A5269D2DC650, xmp.iid:156FFEE3A3E4DE11B0B5A5269D2DC650, xmp.iid:88FBEA26A6E8DE11B659EF0E0700F96B, xmp.iid:8BFBEA26A6E8DE11B659EF0E0700F96B, xmp.iid:8B34BB8B1C65E011B3038EEAC11BFBD0, xmp.iid:8C34BB8B1C65E011B3038EEAC11BFBD0, xmp.iid:8D34BB8B1C65E011B3038EEAC11BFBD0, xmp.iid:3971EE74A665E0118E67FB2DB296933E, xmp.iid:3A71EE74A665E0118E67FB2DB296933E, xmp.iid:3B71EE74A665E0118E67FB2DB296933E, xmp.iid:3C71EE74A665E0118E67FB2DB296933E, xmp.iid:3D71EE74A665E0118E67FB2DB296933E, xmp.iid:3E71EE74A665E0118E67FB2DB296933E, xmp.iid:3F71EE74A665E0118E67FB2DB296933E, xmp.iid:4071EE74A665E0118E67FB2DB296933E, xmp.iid:4171EE74A665E0118E67FB2DB296933E, xmp.iid:4271EE74A665E0118E67FB2DB296933E, xmp.iid:6A24FD3BAA65E0118E67FB2DB296933E, xmp.iid:6B24FD3BAA65E0118E67FB2DB296933E, xmp.iid:6C24FD3BAA65E0118E67FB2DB296933E, xmp.iid:6D24FD3BAA65E0118E67FB2DB296933E, xmp.iid:6E24FD3BAA65E0118E67FB2DB296933E, xmp.iid:6F24FD3BAA65E0118E67FB2DB296933E, xmp.iid:7024FD3BAA65E0118E67FB2DB296933E, xmp.iid:7124FD3BAA65E0118E67FB2DB296933E, xmp.iid:7224FD3BAA65E0118E67FB2DB296933E, xmp.iid:7324FD3BAA65E0118E67FB2DB296933E, xmp.iid:7424FD3BAA65E0118E67FB2DB296933E, xmp.iid:F64144C6B165E0118E67FB2DB296933E, xmp.iid:F74144C6B165E0118E67FB2DB296933E, xmp.iid:F84144C6B165E0118E67FB2DB296933E, xmp.iid:F94144C6B165E0118E67FB2DB296933E, xmp.iid:FA4144C6B165E0118E67FB2DB296933E, xmp.iid:FB4144C6B165E0118E67FB2DB296933E, xmp.iid:FC4144C6B165E0118E67FB2DB296933E, xmp.iid:FD4144C6B165E0118E67FB2DB296933E, xmp.iid:FE4144C6B165E0118E67FB2DB296933E, xmp.iid:FF4144C6B165E0118E67FB2DB296933E, xmp.iid:5F8DE12D9B69E011BB74F28FD17F9427, xmp.iid:608DE12D9B69E011BB74F28FD17F9427, xmp.iid:618DE12D9B69E011BB74F28FD17F9427, xmp.iid:628DE12D9B69E011BB74F28FD17F9427, xmp.iid:638DE12D9B69E011BB74F28FD17F9427, xmp.iid:648DE12D9B69E011BB74F28FD17F9427, xmp.iid:658DE12D9B69E011BB74F28FD17F9427, xmp.iid:668DE12D9B69E011BB74F28FD17F9427, xmp.iid:678DE12D9B69E011BB74F28FD17F9427, xmp.iid:688DE12D9B69E011BB74F28FD17F9427, xmp.iid:926B2B159E69E011BB74F28FD17F9427, xmp.iid:936B2B159E69E011BB74F28FD17F9427, xmp.iid:946B2B159E69E011BB74F28FD17F9427, xmp.iid:956B2B159E69E011BB74F28FD17F9427, xmp.iid:966B2B159E69E011BB74F28FD17F9427, xmp.iid:976B2B159E69E011BB74F28FD17F9427, xmp.iid:986B2B159E69E011BB74F28FD17F9427, xmp.iid:996B2B159E69E011BB74F28FD17F9427, xmp.iid:9A6B2B159E69E011BB74F28FD17F9427, xmp.iid:9B6B2B159E69E011BB74F28FD17F9427, xmp.iid:9C6B2B159E69E011BB74F28FD17F9427, xmp.iid:D82FC3C5AA69E011BB74F28FD17F9427, xmp.iid:D92FC3C5AA69E011BB74F28FD17F9427, xmp.iid:DA2FC3C5AA69E011BB74F28FD17F9427, xmp.iid:DB2FC3C5AA69E011BB74F28FD17F9427, xmp.iid:DC2FC3C5AA69E011BB74F28FD17F9427, xmp.iid:DD2FC3C5AA69E011BB74F28FD17F9427, xmp.iid:DE2FC3C5AA69E011BB74F28FD17F9427, xmp.iid:DF2FC3C5AA69E011BB74F28FD17F9427, xmp.iid:E02FC3C5AA69E011BB74F28FD17F9427, xmp.iid:E12FC3C5AA69E011BB74F28FD17F9427, xmp.iid:E22FC3C5AA69E011BB74F28FD17F9427, xmp.iid:609F5A3EAD69E011BB74F28FD17F9427, xmp.iid:619F5A3EAD69E011BB74F28FD17F9427, xmp.iid:629F5A3EAD69E011BB74F28FD17F9427, xmp.iid:639F5A3EAD69E011BB74F28FD17F9427, xmp.iid:649F5A3EAD69E011BB74F28FD17F9427, xmp.iid:659F5A3EAD69E011BB74F28FD17F9427, xmp.iid:669F5A3EAD69E011BB74F28FD17F9427, xmp.iid:679F5A3EAD69E011BB74F28FD17F9427, xmp.iid:689F5A3EAD69E011BB74F28FD17F9427, xmp.iid:699F5A3EAD69E011BB74F28FD17F9427, xmp.iid:6A9F5A3EAD69E011BB74F28FD17F9427, xmp.iid:5AAC90F2C569E011BB74F28FD17F9427, xmp.iid:5BAC90F2C569E011BB74F28FD17F9427, xmp.iid:5CAC90F2C569E011BB74F28FD17F9427, xmp.iid:5DAC90F2C569E011BB74F28FD17F9427, xmp.iid:5EAC90F2C569E011BB74F28FD17F9427, xmp.iid:5FAC90F2C569E011BB74F28FD17F9427, xmp.iid:60AC90F2C569E011BB74F28FD17F9427, xmp.iid:61AC90F2C569E011BB74F28FD17F9427, xmp.iid:62AC90F2C569E011BB74F28FD17F9427, xmp.iid:63AC90F2C569E011BB74F28FD17F9427, xmp.iid:64AC90F2C569E011BB74F28FD17F9427, xmp.iid:94345DB2CC69E011BB74F28FD17F9427, xmp.iid:95345DB2CC69E011BB74F28FD17F9427, xmp.iid:96345DB2CC69E011BB74F28FD17F9427, xmp.iid:97345DB2CC69E011BB74F28FD17F9427, xmp.iid:98345DB2CC69E011BB74F28FD17F9427, xmp.iid:99345DB2CC69E011BB74F28FD17F9427, xmp.iid:9A345DB2CC69E011BB74F28FD17F9427, xmp.iid:9B345DB2CC69E011BB74F28FD17F9427, xmp.iid:9C345DB2CC69E011BB74F28FD17F9427, xmp.iid:9D345DB2CC69E011BB74F28FD17F9427, xmp.iid:9E345DB2CC69E011BB74F28FD17F9427, xmp.iid:A2DACF19D069E011BB74F28FD17F9427, xmp.iid:A3DACF19D069E011BB74F28FD17F9427, xmp.iid:A4DACF19D069E011BB74F28FD17F9427, xmp.iid:A5DACF19D069E011BB74F28FD17F9427, xmp.iid:A6DACF19D069E011BB74F28FD17F9427, xmp.iid:A7DACF19D069E011BB74F28FD17F9427, xmp.iid:A8DACF19D069E011BB74F28FD17F9427, xmp.iid:A9DACF19D069E011BB74F28FD17F9427, xmp.iid:0F52EC84646AE011A2F0B8DE21C37BAD, xmp.iid:1052EC84646AE011A2F0B8DE21C37BAD, xmp.iid:1152EC84646AE011A2F0B8DE21C37BAD, xmp.iid:1252EC84646AE011A2F0B8DE21C37BAD, xmp.iid:1352EC84646AE011A2F0B8DE21C37BAD, xmp.iid:1652EC84646AE011A2F0B8DE21C37BAD, xmp.iid:1752EC84646AE011A2F0B8DE21C37BAD, xmp.iid:1852EC84646AE011A2F0B8DE21C37BAD, xmp.iid:B6F70E0C956AE011A2F0B8DE21C37BAD, xmp.iid:B7F70E0C956AE011A2F0B8DE21C37BAD, xmp.iid:B8F70E0C956AE011A2F0B8DE21C37BAD, xmp.iid:B9F70E0C956AE011A2F0B8DE21C37BAD, xmp.iid:5F47206E246BE011A4E1D0DDC0B8B744, xmp.iid:6047206E246BE011A4E1D0DDC0B8B744, xmp.iid:6147206E246BE011A4E1D0DDC0B8B744, xmp.iid:6247206E246BE011A4E1D0DDC0B8B744, xmp.iid:6347206E246BE011A4E1D0DDC0B8B744, xmp.iid:6447206E246BE011A4E1D0DDC0B8B744, xmp.iid:6547206E246BE011A4E1D0DDC0B8B744, xmp.iid:6647206E246BE011A4E1D0DDC0B8B744, xmp.iid:6747206E246BE011A4E1D0DDC0B8B744, xmp.iid:6847206E246BE011A4E1D0DDC0B8B744, xmp.iid:3675C2B12E6BE011A4E1D0DDC0B8B744, xmp.iid:3775C2B12E6BE011A4E1D0DDC0B8B744, xmp.iid:3875C2B12E6BE011A4E1D0DDC0B8B744, xmp.iid:3975C2B12E6BE011A4E1D0DDC0B8B744, xmp.iid:3A75C2B12E6BE011A4E1D0DDC0B8B744, xmp.iid:755A183CE97AE011B992FBFCC3DF1A6C, xmp.iid:765A183CE97AE011B992FBFCC3DF1A6C, xmp.iid:775A183CE97AE011B992FBFCC3DF1A6C, xmp.iid:785A183CE97AE011B992FBFCC3DF1A6C, xmp.iid:7D5A183CE97AE011B992FBFCC3DF1A6C, xmp.iid:B3FEA783AC7BE0119B57F4B6AA72B006, xmp.iid:B4FEA783AC7BE0119B57F4B6AA72B006, xmp.iid:1543825EAC7FE011AD89AE6C90B30EAA, xmp.iid:1643825EAC7FE011AD89AE6C90B30EAA, xmp.iid:1743825EAC7FE011AD89AE6C90B30EAA, xmp.iid:1843825EAC7FE011AD89AE6C90B30EAA, xmp.iid:1943825EAC7FE011AD89AE6C90B30EAA, xmp.iid:1A43825EAC7FE011AD89AE6C90B30EAA, xmp.iid:1B43825EAC7FE011AD89AE6C90B30EAA, xmp.iid:1C43825EAC7FE011AD89AE6C90B30EAA, xmp.iid:1D43825EAC7FE011AD89AE6C90B30EAA, xmp.iid:1E43825EAC7FE011AD89AE6C90B30EAA, xmp.iid:8667E48AAF7FE011AD89AE6C90B30EAA, xmp.iid:8767E48AAF7FE011AD89AE6C90B30EAA, xmp.iid:7BF368DECA7FE0119DBE90667FA57AB8, xmp.iid:7CF368DECA7FE0119DBE90667FA57AB8, xmp.iid:7DF368DECA7FE0119DBE90667FA57AB8, xmp.iid:7EF368DECA7FE0119DBE90667FA57AB8, xmp.iid:7FF368DECA7FE0119DBE90667FA57AB8, xmp.iid:CAC9926BE285E011BE8FA997D13CFD31, xmp.iid:0A6FD4D69295E011983F807100354E55, xmp.iid:0B6FD4D69295E011983F807100354E55, xmp.iid:0C6FD4D69295E011983F807100354E55, xmp.iid:0D6FD4D69295E011983F807100354E55, xmp.iid:0E6FD4D69295E011983F807100354E55, xmp.iid:0F6FD4D69295E011983F807100354E55, xmp.iid:106FD4D69295E011983F807100354E55, xmp.iid:116FD4D69295E011983F807100354E55, xmp.iid:126FD4D69295E011983F807100354E55, xmp.iid:C0974631A495E011983F807100354E55, xmp.iid:C1974631A495E011983F807100354E55, xmp.iid:C2974631A495E011983F807100354E55, xmp.iid:C3974631A495E011983F807100354E55, xmp.iid:C4974631A495E011983F807100354E55, xmp.iid:C5974631A495E011983F807100354E55, xmp.iid:C6974631A495E011983F807100354E55, xmp.iid:C7974631A495E011983F807100354E55, xmp.iid:C8974631A495E011983F807100354E55, xmp.iid:C9974631A495E011983F807100354E55, xmp.iid:CA974631A495E011983F807100354E55, xmp.iid:7CA484E2AA95E011983F807100354E55, xmp.iid:7DA484E2AA95E011983F807100354E55, xmp.iid:7EA484E2AA95E011983F807100354E55, xmp.iid:7FA484E2AA95E011983F807100354E55, xmp.iid:80A484E2AA95E011983F807100354E55, xmp.iid:81A484E2AA95E011983F807100354E55, xmp.iid:82A484E2AA95E011983F807100354E55, xmp.iid:83A484E2AA95E011983F807100354E55, xmp.iid:84A484E2AA95E011983F807100354E55, xmp.iid:85A484E2AA95E011983F807100354E55, xmp.iid:86A484E2AA95E011983F807100354E55, xmp.iid:4088D6EEAE95E011983F807100354E55, xmp.iid:4188D6EEAE95E011983F807100354E55, xmp.iid:4288D6EEAE95E011983F807100354E55, xmp.iid:4388D6EEAE95E011983F807100354E55, xmp.iid:4488D6EEAE95E011983F807100354E55, xmp.iid:4588D6EEAE95E011983F807100354E55, xmp.iid:4688D6EEAE95E011983F807100354E55, xmp.iid:4788D6EEAE95E011983F807100354E55, xmp.iid:4888D6EEAE95E011983F807100354E55, xmp.iid:4988D6EEAE95E011983F807100354E55, xmp.iid:4A88D6EEAE95E011983F807100354E55, xmp.iid:3D33BC7E5F96E01192B4D6D89D0B2336, xmp.iid:3E33BC7E5F96E01192B4D6D89D0B2336, xmp.iid:3F33BC7E5F96E01192B4D6D89D0B2336, xmp.iid:4033BC7E5F96E01192B4D6D89D0B2336, xmp.iid:4133BC7E5F96E01192B4D6D89D0B2336, xmp.iid:4233BC7E5F96E01192B4D6D89D0B2336, xmp.iid:4333BC7E5F96E01192B4D6D89D0B2336, xmp.iid:4433BC7E5F96E01192B4D6D89D0B2336, xmp.iid:4533BC7E5F96E01192B4D6D89D0B2336, xmp.iid:19D1F05D6C96E01192B4D6D89D0B2336, xmp.iid:1AD1F05D6C96E01192B4D6D89D0B2336, xmp.iid:D675ADC1479BE011BF958B1614F0C66D, xmp.iid:0588B514E39BE0118C6AC9C5A4D85B04, xmp.iid:FEFC75F30D9CE0118C6AC9C5A4D85B04, xmp.iid:0F84F63C31ADE011ABFEE9317BE54301, xmp.iid:1084F63C31ADE011ABFEE9317BE54301, xmp.iid:8BA76FA51BB1E01186A0DFE26F47B387, xmp.iid:8CA76FA51BB1E01186A0DFE26F47B387, xmp.iid:8DA76FA51BB1E01186A0DFE26F47B387, xmp.iid:8EA76FA51BB1E01186A0DFE26F47B387, xmp.iid:8FA76FA51BB1E01186A0DFE26F47B387, xmp.iid:63ABC117E3BCE011B148D96298127796, xmp.iid:64ABC117E3BCE011B148D96298127796, xmp.iid:65ABC117E3BCE011B148D96298127796, xmp.iid:66ABC117E3BCE011B148D96298127796, xmp.iid:67ABC117E3BCE011B148D96298127796, xmp.iid:68ABC117E3BCE011B148D96298127796, xmp.iid:69ABC117E3BCE011B148D96298127796, xmp.iid:6AABC117E3BCE011B148D96298127796, xmp.iid:6BABC117E3BCE011B148D96298127796, xmp.iid:A820FC99DFBCE011923AF3DCDAB5C2CF, xmp.iid:A920FC99DFBCE011923AF3DCDAB5C2CF, xmp.iid:C7E5A49516C8E0118A1AC49D3D574F65, xmp.iid:5923E1FAA20EE111B5DFB485E61F61A7, xmp.iid:5A23E1FAA20EE111B5DFB485E61F61A7, xmp.iid:5B23E1FAA20EE111B5DFB485E61F61A7, xmp.iid:5C23E1FAA20EE111B5DFB485E61F61A7, xmp.iid:5D23E1FAA20EE111B5DFB485E61F61A7, xmp.iid:5E23E1FAA20EE111B5DFB485E61F61A7, xmp.iid:5F23E1FAA20EE111B5DFB485E61F61A7, xmp.iid:6023E1FAA20EE111B5DFB485E61F61A7, xmp.iid:6123E1FAA20EE111B5DFB485E61F61A7, xmp.iid:6223E1FAA20EE111B5DFB485E61F61A7, xmp.iid:F8C4F1CEAE0EE111B5DFB485E61F61A7, xmp.iid:F9C4F1CEAE0EE111B5DFB485E61F61A7, xmp.iid:FAC4F1CEAE0EE111B5DFB485E61F61A7, xmp.iid:FBC4F1CEAE0EE111B5DFB485E61F61A7, xmp.iid:FCC4F1CEAE0EE111B5DFB485E61F61A7, xmp.iid:FDC4F1CEAE0EE111B5DFB485E61F61A7, xmp.iid:FEC4F1CEAE0EE111B5DFB485E61F61A7, xmp.iid:FFC4F1CEAE0EE111B5DFB485E61F61A7, xmp.iid:02C5F1CEAE0EE111B5DFB485E61F61A7, xmp.iid:BC7BC3E2CB0EE111B5DFB485E61F61A7, xmp.iid:BD7BC3E2CB0EE111B5DFB485E61F61A7, xmp.iid:BE7BC3E2CB0EE111B5DFB485E61F61A7, xmp.iid:BF7BC3E2CB0EE111B5DFB485E61F61A7, xmp.iid:C07BC3E2CB0EE111B5DFB485E61F61A7, xmp.iid:C17BC3E2CB0EE111B5DFB485E61F61A7, xmp.iid:C27BC3E2CB0EE111B5DFB485E61F61A7, xmp.iid:C37BC3E2CB0EE111B5DFB485E61F61A7, xmp.iid:C47BC3E2CB0EE111B5DFB485E61F61A7, xmp.iid:C57BC3E2CB0EE111B5DFB485E61F61A7, xmp.iid:C67BC3E2CB0EE111B5DFB485E61F61A7, xmp.iid:38F4F76FDE0EE111B5DFB485E61F61A7, xmp.iid:39F4F76FDE0EE111B5DFB485E61F61A7, xmp.iid:3AF4F76FDE0EE111B5DFB485E61F61A7, xmp.iid:3BF4F76FDE0EE111B5DFB485E61F61A7, xmp.iid:3CF4F76FDE0EE111B5DFB485E61F61A7, xmp.iid:3DF4F76FDE0EE111B5DFB485E61F61A7, xmp.iid:3EF4F76FDE0EE111B5DFB485E61F61A7, xmp.iid:3FF4F76FDE0EE111B5DFB485E61F61A7, xmp.iid:40F4F76FDE0EE111B5DFB485E61F61A7, xmp.iid:41F4F76FDE0EE111B5DFB485E61F61A7, xmp.iid:42F4F76FDE0EE111B5DFB485E61F61A7, xmp.iid:50E2319F680FE1118565F0D1FA77D455, xmp.iid:51E2319F680FE1118565F0D1FA77D455, xmp.iid:52E2319F680FE1118565F0D1FA77D455, xmp.iid:53E2319F680FE1118565F0D1FA77D455, xmp.iid:54E2319F680FE1118565F0D1FA77D455, xmp.iid:55E2319F680FE1118565F0D1FA77D455, xmp.iid:56E2319F680FE1118565F0D1FA77D455, xmp.iid:825171E1730FE1118565F0D1FA77D455, xmp.iid:835171E1730FE1118565F0D1FA77D455, xmp.iid:845171E1730FE1118565F0D1FA77D455, xmp.iid:855171E1730FE1118565F0D1FA77D455, xmp.iid:865171E1730FE1118565F0D1FA77D455, xmp.iid:885171E1730FE1118565F0D1FA77D455, xmp.iid:895171E1730FE1118565F0D1FA77D455, xmp.iid:8A5171E1730FE1118565F0D1FA77D455, xmp.iid:8B5171E1730FE1118565F0D1FA77D455, xmp.iid:AB07F928930FE1118565F0D1FA77D455, xmp.iid:AC07F928930FE1118565F0D1FA77D455, xmp.iid:AD07F928930FE1118565F0D1FA77D455, xmp.iid:AE07F928930FE1118565F0D1FA77D455, xmp.iid:C0FC8FEB3510E11189ABBC84C96F9B2A, xmp.iid:C1FC8FEB3510E11189ABBC84C96F9B2A, xmp.iid:C2FC8FEB3510E11189ABBC84C96F9B2A, xmp.iid:C3FC8FEB3510E11189ABBC84C96F9B2A, xmp.iid:C5FC8FEB3510E11189ABBC84C96F9B2A, xmp.iid:C6FC8FEB3510E11189ABBC84C96F9B2A, xmp.iid:C7FC8FEB3510E11189ABBC84C96F9B2A, xmp.iid:C8FC8FEB3510E11189ABBC84C96F9B2A, xmp.iid:DAF0D0A34010E11189ABBC84C96F9B2A, xmp.iid:DBF0D0A34010E11189ABBC84C96F9B2A, xmp.iid:DCF0D0A34010E11189ABBC84C96F9B2A, xmp.iid:DDF0D0A34010E11189ABBC84C96F9B2A, xmp.iid:DEF0D0A34010E11189ABBC84C96F9B2A, xmp.iid:DFF0D0A34010E11189ABBC84C96F9B2A, xmp.iid:E0F0D0A34010E11189ABBC84C96F9B2A, xmp.iid:E1F0D0A34010E11189ABBC84C96F9B2A, xmp.iid:E2F0D0A34010E11189ABBC84C96F9B2A, xmp.iid:E3F0D0A34010E11189ABBC84C96F9B2A, xmp.iid:E4F0D0A34010E11189ABBC84C96F9B2A, xmp.iid:5562893A6010E11189ABBC84C96F9B2A, xmp.iid:28D4D12A2714E11180CDEB31696EBBFF, xmp.iid:29D4D12A2714E11180CDEB31696EBBFF, xmp.iid:2AD4D12A2714E11180CDEB31696EBBFF, xmp.iid:721A143E4814E11180CDEB31696EBBFF, xmp.iid:731A143E4814E11180CDEB31696EBBFF, xmp.iid:741A143E4814E11180CDEB31696EBBFF, xmp.iid:751A143E4814E11180CDEB31696EBBFF, xmp.iid:761A143E4814E11180CDEB31696EBBFF, xmp.iid:771A143E4814E11180CDEB31696EBBFF, xmp.iid:781A143E4814E11180CDEB31696EBBFF, xmp.iid:7A1A143E4814E11180CDEB31696EBBFF, xmp.iid:7B1A143E4814E11180CDEB31696EBBFF, xmp.iid:7C1A143E4814E11180CDEB31696EBBFF, xmp.iid:7F9FFA676C1AE111A9CA8F8CEF772508, xmp.iid:809FFA676C1AE111A9CA8F8CEF772508, xmp.iid:1AC02D72AB1AE111A9CA8F8CEF772508, xmp.iid:AF560EC6321BE1118EA5A1B307AEB3E4, xmp.iid:B0560EC6321BE1118EA5A1B307AEB3E4, xmp.iid:B2560EC6321BE1118EA5A1B307AEB3E4, xmp.iid:8B108333581BE1118EA5A1B307AEB3E4, xmp.iid:8C108333581BE1118EA5A1B307AEB3E4, xmp.iid:91108333581BE1118EA5A1B307AEB3E4, xmp.iid:92108333581BE1118EA5A1B307AEB3E4, xmp.iid:E28885DF6D1BE1118EA5A1B307AEB3E4, xmp.iid:6B2BDF49261FE111BA56C36E289A119F, xmp.iid:6C2BDF49261FE111BA56C36E289A119F, xmp.iid:6D2BDF49261FE111BA56C36E289A119F, xmp.iid:6E2BDF49261FE111BA56C36E289A119F, xmp.iid:6F2BDF49261FE111BA56C36E289A119F, xmp.iid:702BDF49261FE111BA56C36E289A119F, xmp.iid:742BDF49261FE111BA56C36E289A119F, xmp.iid:2927D25D1520E111A21CB1B3EAD9FF9B, xmp.iid:2B27D25D1520E111A21CB1B3EAD9FF9B, xmp.iid:2C27D25D1520E111A21CB1B3EAD9FF9B, xmp.iid:1886589E8025E11180F6A40CB56D5052, xmp.iid:AC6136C89525E11180F6A40CB56D5052, xmp.iid:DF1F7302637DE1118F0BF5753896F0AA, xmp.iid:E01F7302637DE1118F0BF5753896F0AA, xmp.iid:E11F7302637DE1118F0BF5753896F0AA, xmp.iid:E31F7302637DE1118F0BF5753896F0AA, xmp.iid:E41F7302637DE1118F0BF5753896F0AA, xmp.iid:E51F7302637DE1118F0BF5753896F0AA, xmp.iid:E61F7302637DE1118F0BF5753896F0AA, xmp.iid:E71F7302637DE1118F0BF5753896F0AA, xmp.iid:E81F7302637DE1118F0BF5753896F0AA, xmp.iid:F1486D648F7DE1118F0BF5753896F0AA, xmp.iid:F2486D648F7DE1118F0BF5753896F0AA, xmp.iid:F3486D648F7DE1118F0BF5753896F0AA, xmp.iid:F4486D648F7DE1118F0BF5753896F0AA, xmp.iid:F5486D648F7DE1118F0BF5753896F0AA, xmp.iid:F6486D648F7DE1118F0BF5753896F0AA, xmp.iid:F7486D648F7DE1118F0BF5753896F0AA, xmp.iid:F8486D648F7DE1118F0BF5753896F0AA, xmp.iid:F9486D648F7DE1118F0BF5753896F0AA, xmp.iid:FA486D648F7DE1118F0BF5753896F0AA, xmp.iid:FB486D648F7DE1118F0BF5753896F0AA, xmp.iid:C53882609B7DE1118F0BF5753896F0AA, xmp.iid:C63882609B7DE1118F0BF5753896F0AA, xmp.iid:C73882609B7DE1118F0BF5753896F0AA, xmp.iid:C83882609B7DE1118F0BF5753896F0AA, xmp.iid:C93882609B7DE1118F0BF5753896F0AA, xmp.iid:CB3882609B7DE1118F0BF5753896F0AA, xmp.iid:0FB4A0EFBF92E1118D0BBB0C03B0BAA8, xmp.iid:552939FB8B93E1119636B37E0ECAF96E, xmp.iid:562939FB8B93E1119636B37E0ECAF96E, xmp.iid:9B9D06609593E111B19AEDF155EED391, xmp.iid:9C9D06609593E111B19AEDF155EED391, xmp.iid:4D7E62B4799EE111BD94E0CE8206BC40, xmp.iid:4E7E62B4799EE111BD94E0CE8206BC40, xmp.iid:4F7E62B4799EE111BD94E0CE8206BC40, xmp.iid:507E62B4799EE111BD94E0CE8206BC40, xmp.iid:517E62B4799EE111BD94E0CE8206BC40, xmp.iid:527E62B4799EE111BD94E0CE8206BC40, xmp.iid:537E62B4799EE111BD94E0CE8206BC40, xmp.iid:547E62B4799EE111BD94E0CE8206BC40, xmp.iid:557E62B4799EE111BD94E0CE8206BC40, xmp.iid:567E62B4799EE111BD94E0CE8206BC40, xmp.iid:5AB26AC6899EE111BD94E0CE8206BC40, xmp.iid:5BB26AC6899EE111BD94E0CE8206BC40, xmp.iid:5CB26AC6899EE111BD94E0CE8206BC40, xmp.iid:5DB26AC6899EE111BD94E0CE8206BC40, xmp.iid:5EB26AC6899EE111BD94E0CE8206BC40, xmp.iid:5FB26AC6899EE111BD94E0CE8206BC40, xmp.iid:60B26AC6899EE111BD94E0CE8206BC40, xmp.iid:61B26AC6899EE111BD94E0CE8206BC40, xmp.iid:62B26AC6899EE111BD94E0CE8206BC40, xmp.iid:63B26AC6899EE111BD94E0CE8206BC40, xmp.iid:64B26AC6899EE111BD94E0CE8206BC40, xmp.iid:B8B9EDDF9B9EE111BD94E0CE8206BC40, xmp.iid:DB2BF319399FE1118219D91F5B7B2BF1, xmp.iid:DC2BF319399FE1118219D91F5B7B2BF1, xmp.iid:E02BF319399FE1118219D91F5B7B2BF1, xmp.iid:E12BF319399FE1118219D91F5B7B2BF1, xmp.iid:E22BF319399FE1118219D91F5B7B2BF1, xmp.iid:E32BF319399FE1118219D91F5B7B2BF1, xmp.iid:E42BF319399FE1118219D91F5B7B2BF1, xmp.iid:0E526A943D9FE1118219D91F5B7B2BF1, xmp.iid:0F526A943D9FE1118219D91F5B7B2BF1, xmp.iid:10526A943D9FE1118219D91F5B7B2BF1, xmp.iid:11526A943D9FE1118219D91F5B7B2BF1, xmp.iid:12526A943D9FE1118219D91F5B7B2BF1, xmp.iid:13526A943D9FE1118219D91F5B7B2BF1, xmp.iid:14526A943D9FE1118219D91F5B7B2BF1, xmp.iid:15526A943D9FE1118219D91F5B7B2BF1, xmp.iid:B5F82E6F1EA4E111A3EABC6C25E0E4EC, xmp.iid:B6F82E6F1EA4E111A3EABC6C25E0E4EC, xmp.iid:B7F82E6F1EA4E111A3EABC6C25E0E4EC, xmp.iid:B8F82E6F1EA4E111A3EABC6C25E0E4EC, xmp.iid:B9F82E6F1EA4E111A3EABC6C25E0E4EC, xmp.iid:BAF82E6F1EA4E111A3EABC6C25E0E4EC, xmp.iid:BBF82E6F1EA4E111A3EABC6C25E0E4EC, xmp.iid:BCF82E6F1EA4E111A3EABC6C25E0E4EC, xmp.iid:BDF82E6F1EA4E111A3EABC6C25E0E4EC, xmp.iid:BEF82E6F1EA4E111A3EABC6C25E0E4EC, xmp.iid:F403C36620A4E111A3EABC6C25E0E4EC, xmp.iid:F503C36620A4E111A3EABC6C25E0E4EC, xmp.iid:F603C36620A4E111A3EABC6C25E0E4EC, xmp.iid:F703C36620A4E111A3EABC6C25E0E4EC, xmp.iid:F803C36620A4E111A3EABC6C25E0E4EC, xmp.iid:F903C36620A4E111A3EABC6C25E0E4EC, xmp.iid:FA03C36620A4E111A3EABC6C25E0E4EC, xmp.iid:FB03C36620A4E111A3EABC6C25E0E4EC, xmp.iid:FC03C36620A4E111A3EABC6C25E0E4EC, xmp.iid:FD03C36620A4E111A3EABC6C25E0E4EC, xmp.iid:FE03C36620A4E111A3EABC6C25E0E4EC, xmp.iid:8C5CD10822A4E111A3EABC6C25E0E4EC, xmp.iid:8D5CD10822A4E111A3EABC6C25E0E4EC, xmp.iid:8E5CD10822A4E111A3EABC6C25E0E4EC, xmp.iid:8F5CD10822A4E111A3EABC6C25E0E4EC, xmp.iid:0B8EE8A623A4E111A1AEED3D33FE6717, xmp.iid:0C8EE8A623A4E111A1AEED3D33FE6717, xmp.iid:BB58FE8124A4E1119263E9D35AE877B3, xmp.iid:FD92423325A4E111998D8467F8499F3D, xmp.iid:01480B3E6ECAE111B55FFD1924F2C701, xmp.iid:02480B3E6ECAE111B55FFD1924F2C701, xmp.iid:03480B3E6ECAE111B55FFD1924F2C701, xmp.iid:BB8743838FCAE111B55FFD1924F2C701, xmp.iid:C9670E7727CCE111A0A5ECB81FE539B9, xmp.iid:CA670E7727CCE111A0A5ECB81FE539B9, xmp.iid:CB670E7727CCE111A0A5ECB81FE539B9, xmp.iid:CC670E7727CCE111A0A5ECB81FE539B9, xmp.iid:CD670E7727CCE111A0A5ECB81FE539B9, xmp.iid:CE670E7727CCE111A0A5ECB81FE539B9, xmp.iid:CF670E7727CCE111A0A5ECB81FE539B9, xmp.iid:D0670E7727CCE111A0A5ECB81FE539B9, xmp.iid:D1670E7727CCE111A0A5ECB81FE539B9, xmp.iid:D2670E7727CCE111A0A5ECB81FE539B9, xmp.iid:A8B2B75B28CCE111A0A5ECB81FE539B9, xmp.iid:A9B2B75B28CCE111A0A5ECB81FE539B9, xmp.iid:AAB2B75B28CCE111A0A5ECB81FE539B9, xmp.iid:ABB2B75B28CCE111A0A5ECB81FE539B9, xmp.iid:ACB2B75B28CCE111A0A5ECB81FE539B9, xmp.iid:9B57D7E8C7CCE111AB7BF83BC86CB8A0, xmp.iid:9C57D7E8C7CCE111AB7BF83BC86CB8A0, xmp.iid:E03FBE961ECFE111A3C4CE3183C21C71, xmp.iid:6E1EE6E5B2D4E111B717E52801FBC97F, xmp.iid:6F1EE6E5B2D4E111B717E52801FBC97F, xmp.iid:AFED54F2FDDAE111AFFFDC9190311BD8, xmp.iid:B2ED54F2FDDAE111AFFFDC9190311BD8, xmp.iid:BB79519928F1E1119AC2B2A18D1E5F59, xmp.iid:8E2530AED5F1E1118FB5DD107A5E2B6D, xmp.iid:8F2530AED5F1E1118FB5DD107A5E2B6D, xmp.iid:5063E51A4411E211BE8285E67F5DCB18, xmp.iid:5163E51A4411E211BE8285E67F5DCB18, xmp.iid:5263E51A4411E211BE8285E67F5DCB18, xmp.iid:5363E51A4411E211BE8285E67F5DCB18, xmp.iid:B2899650A016E2119ECAEC0FA7B69536
History When                    : 2009:03:02 12:18:45Z, 2009:03:02 12:18:45Z, 2009:03:02 13:57:55Z, 2009:03:02 13:57:55Z, 2009:04:07 14:50:26+01:00, 2009:04:07 14:50:26+01:00, 2009:04:07 15:20:18+01:00, 2009:04:07 15:23:33+01:00, 2009:04:07 15:25:30+01:00, 2009:04:07 15:28:12+01:00, 2009:04:07 15:29:02+01:00, 2009:04:07 15:36:39+01:00, 2009:04:07 15:41:49+01:00, 2009:04:07 15:44:55+01:00, 2009:04:07 15:46:22+01:00, 2009:04:07 15:52:18+01:00, 2009:04:07 15:55:35+01:00, 2009:04:07 15:58:16+01:00, 2009:04:07 16:02:07+01:00, 2009:04:07 16:02:22+01:00, 2009:04:07 16:04:56+01:00, 2009:04:07 16:09:23+01:00, 2009:04:07 16:12:13+01:00, 2009:04:07 16:13:02+01:00, 2009:04:07 16:16:58+01:00, 2009:04:07 16:19:33+01:00, 2009:04:07 16:20:44+01:00, 2009:04:07 16:25:13+01:00, 2009:04:07 16:27:49+01:00, 2009:04:07 16:28:16+01:00, 2009:04:07 16:30:10+01:00, 2009:04:07 16:32:49+01:00, 2009:04:07 16:39:56+01:00, 2009:04:07 16:44:38+01:00, 2009:04:07 16:45:23+01:00, 2009:04:07 17:03:16+01:00, 2009:04:08 12:03:05+01:00, 2009:04:08 15:28:05+01:00, 2009:04:08 15:40:04+01:00, 2009:04:27 09:42:46+01:00, 2009:04:27 09:48:47+01:00, 2009:04:27 09:51:35+01:00, 2009:04:27 10:36:17+01:00, 2009:04:27 11:41:44+01:00, 2009:04:27 12:07:06+01:00, 2009:04:27 14:58:36+01:00, 2009:04:27 16:42:16+01:00, 2009:04:27 16:50:52+01:00, 2009:04:27 17:09:02+01:00, 2009:04:28 09:54:44+01:00, 2009:04:28 11:12:49+01:00, 2009:04:28 11:13:31+01:00, 2009:04:28 11:36:51+01:00, 2009:04:29 08:57:35+01:00, 2009:04:29 16:34:17+01:00, 2009:04:29 16:47:08+01:00, 2009:05:19 09:48:18+01:00, 2009:05:19 09:49:14+01:00, 2009:05:19 10:00:41+01:00, 2009:05:19 11:52:58+01:00, 2009:05:19 14:55:36+01:00, 2009:05:19 15:11:20+01:00, 2009:05:19 15:15:45+01:00, 2009:05:19 15:41:23+01:00, 2009:05:19 15:51:18+01:00, 2009:05:19 16:00:53+01:00, 2009:05:19 17:00:13+01:00, 2009:05:20 09:37:13+01:00, 2009:05:20 09:53:03+01:00, 2009:05:20 10:17:43+01:00, 2009:05:26 10:33:39+01:00, 2009:05:26 11:35:50+01:00, 2009:05:26 11:40:06+01:00, 2009:05:26 11:41:57+01:00, 2009:05:26 13:26:48+01:00, 2009:05:26 13:30:53+01:00, 2009:05:26 13:50:56+01:00, 2009:05:26 13:59:09+01:00, 2009:05:26 13:59:23+01:00, 2009:05:26 14:04:19+01:00, 2009:05:26 14:11:27+01:00, 2009:05:26 14:16:15+01:00, 2009:05:26 14:29:09+01:00, 2009:05:26 14:34:37+01:00, 2009:05:26 14:50:52+01:00, 2009:05:26 15:07:04+01:00, 2009:05:26 15:47:10+01:00, 2009:05:26 16:13:06+01:00, 2009:05:26 16:15:26+01:00, 2009:05:26 16:23:33+01:00, 2009:05:26 16:37:24+01:00, 2009:05:26 16:54:21+01:00, 2009:05:26 16:54:26+01:00, 2009:05:27 09:57:47+01:00, 2009:05:27 10:32:42+01:00, 2009:05:27 10:42:26+01:00, 2009:05:27 10:49:26+01:00, 2009:05:27 11:00:43+01:00, 2009:05:27 11:15:17+01:00, 2009:05:27 11:40:50+01:00, 2009:05:27 11:57:47+01:00, 2009:05:27 12:09:16+01:00, 2009:05:27 15:05:14+01:00, 2009:05:27 16:09:01+01:00, 2009:05:27 16:14:56+01:00, 2009:06:02 10:15:54+01:00, 2009:06:02 10:16:16+01:00, 2009:06:02 10:16:17+01:00, 2009:06:02 10:17:34+01:00, 2009:06:02 11:44:01+01:00, 2009:06:02 11:45:45+01:00, 2009:06:02 17:05:33+01:00, 2009:06:03 10:12:49+01:00, 2009:06:03 16:59:21+01:00, 2009:06:16 09:18:09+01:00, 2009:06:16 10:24:31+01:00, 2009:06:16 16:07:48+01:00, 2009:06:16 17:02:56+01:00, 2009:06:17 10:00:34+01:00, 2009:06:24 12:09:38+01:00, 2009:06:24 12:09:38+01:00, 2009:06:24 12:17:29+01:00, 2009:06:24 12:17:59+01:00, 2009:06:24 12:28:53+01:00, 2009:06:24 12:31:42+01:00, 2009:06:24 13:40:13+01:00, 2009:06:24 13:51:40+01:00, 2009:06:24 13:55:07+01:00, 2009:06:24 14:02:55+01:00, 2009:06:24 14:13:41+01:00, 2009:06:24 14:34:11+01:00, 2009:06:24 14:38:40+01:00, 2009:06:24 15:25:16+01:00, 2009:06:24 15:59:54+01:00, 2009:06:24 16:01:05+01:00, 2009:06:24 16:15+01:00, 2009:06:24 16:17+01:00, 2009:06:24 16:17:33+01:00, 2009:06:24 16:18:03+01:00, 2009:06:24 16:43:17+01:00, 2009:06:24 16:44:15+01:00, 2009:06:24 16:48:56+01:00, 2009:06:24 17:04:44+01:00, 2009:06:29 09:15:11+01:00, 2009:06:29 09:18:49+01:00, 2009:06:29 09:20:40+01:00, 2009:06:29 10:31:20+01:00, 2009:06:29 16:45:27+01:00, 2009:06:30 09:01:20+01:00, 2009:06:30 09:25:24+01:00, 2009:07:21 09:50:41+01:00, 2009:07:27 15:42:16+01:00, 2009:09:30 08:59:30+01:00, 2009:09:30 08:59:30+01:00, 2009:09:30 09:14:46+01:00, 2009:09:30 09:24:58+01:00, 2009:09:30 09:25:48+01:00, 2009:09:30 09:26:01+01:00, 2009:09:30 09:26:18+01:00, 2009:09:30 09:26:28+01:00, 2009:09:30 09:31:11+01:00, 2009:09:30 09:41:47+01:00, 2009:09:30 09:45:10+01:00, 2009:09:30 09:46:28+01:00, 2009:09:30 09:48:24+01:00, 2009:09:30 09:49:43+01:00, 2009:09:30 09:52:18+01:00, 2009:09:30 09:53:43+01:00, 2009:09:30 09:54:30+01:00, 2009:09:30 09:56:56+01:00, 2009:09:30 09:57:11+01:00, 2009:09:30 09:59:03+01:00, 2009:09:30 09:59:43+01:00, 2009:09:30 10:02:10+01:00, 2009:09:30 10:16:06+01:00, 2009:09:30 10:24:01+01:00, 2009:09:30 10:25:23+01:00, 2009:09:30 10:26:44+01:00, 2009:09:30 10:28:06+01:00, 2009:09:30 10:33:26+01:00, 2009:09:30 10:34:29+01:00, 2009:09:30 10:35:02+01:00, 2009:09:30 10:36:03+01:00, 2009:09:30 10:36:45+01:00, 2009:09:30 10:57:03+01:00, 2009:09:30 11:17:43+01:00, 2009:09:30 11:33:40+01:00, 2009:09:30 11:50:19+01:00, 2009:09:30 12:01:24+01:00, 2009:09:30 12:12:30+01:00, 2009:09:30 14:06:29+01:00, 2009:09:30 15:18:21+01:00, 2009:09:30 16:49:45+01:00, 2009:10:05 09:12+01:00, 2009:10:05 11:41:55+01:00, 2009:10:05 12:26:10+01:00, 2009:10:05 15:41:51+01:00, 2009:10:05 15:54:30+01:00, 2009:10:05 15:55:07+01:00, 2009:10:05 16:31:08+01:00, 2009:10:05 16:56:40+01:00, 2009:10:06 09:20:20+01:00, 2009:10:06 09:29:57+01:00, 2009:10:06 09:30:12+01:00, 2009:10:06 09:32:36+01:00, 2009:10:06 09:42:19+01:00, 2009:10:06 09:44:28+01:00, 2009:10:06 09:44:28+01:00, 2009:10:06 10:00:02+01:00, 2009:10:06 10:05:06+01:00, 2009:10:06 10:07:40+01:00, 2009:10:06 10:09:29+01:00, 2009:10:06 10:11:13+01:00, 2009:10:06 10:15:03+01:00, 2009:10:06 10:17:28+01:00, 2009:10:06 10:17:34+01:00, 2009:10:06 10:19:12+01:00, 2009:10:06 10:46:53+01:00, 2009:10:06 10:47:12+01:00, 2009:10:06 10:57:31+01:00, 2009:10:06 15:00:14+01:00, 2009:10:06 15:21+01:00, 2009:10:06 15:26:30+01:00, 2009:10:06 15:33:58+01:00, 2009:10:06 16:01:11+01:00, 2009:10:07 10:41:08+01:00, 2009:10:07 10:41:08+01:00, 2009:10:07 10:49:16+01:00, 2009:10:07 10:50:05+01:00, 2009:10:07 11:06:53+01:00, 2009:10:07 11:10:17+01:00, 2009:10:07 11:14:54+01:00, 2009:10:07 11:32:11+01:00, 2009:10:07 11:38:08+01:00, 2009:10:07 11:40:45+01:00, 2009:10:07 11:58:44+01:00, 2009:10:07 14:01:18+01:00, 2009:10:07 14:34:40+01:00, 2009:10:07 16:30:50+01:00, 2009:10:07 16:31:39+01:00, 2009:10:07 16:32:06+01:00, 2009:10:07 16:55:38+01:00, 2009:10:12 09:29:51+01:00, 2009:10:26 10:55:38Z, 2009:10:26 10:55:38Z, 2009:10:26 11:08:25Z, 2009:10:26 11:12:04Z, 2009:10:28 10:33:03Z, 2009:10:28 11:26Z, 2009:11:02 09:33:55Z, 2009:11:02 09:43:14Z, 2009:12:08 16:41:10Z, 2009:12:09 09:19:02Z, 2009:12:09 09:39:44Z, 2009:12:09 09:46:38Z, 2009:12:14 11:45:18Z, 2009:12:14 14:00:46Z, 2011:04:12 16:50:09+01:00, 2011:04:12 16:58:35+01:00, 2011:04:12 17:02:11+01:00, 2011:04:13 09:17:22+01:00, 2011:04:13 09:23:47+01:00, 2011:04:13 09:28+01:00, 2011:04:13 09:29:24+01:00, 2011:04:13 09:31:11+01:00, 2011:04:13 09:32:13+01:00, 2011:04:13 09:32:32+01:00, 2011:04:13 09:34:14+01:00, 2011:04:13 09:39:30+01:00, 2011:04:13 09:41:48+01:00, 2011:04:13 09:44:24+01:00, 2011:04:13 09:53:36+01:00, 2011:04:13 09:57:04+01:00, 2011:04:13 09:57:22+01:00, 2011:04:13 10:24:17+01:00, 2011:04:13 10:25:12+01:00, 2011:04:13 10:27:01+01:00, 2011:04:13 10:27:10+01:00, 2011:04:13 10:30:22+01:00, 2011:04:13 10:36:13+01:00, 2011:04:13 10:36:37+01:00, 2011:04:13 10:38:23+01:00, 2011:04:13 10:40:15+01:00, 2011:04:13 10:41:55+01:00, 2011:04:13 10:42:13+01:00, 2011:04:13 10:47:02+01:00, 2011:04:13 10:47:39+01:00, 2011:04:13 10:59:02+01:00, 2011:04:13 11:01:44+01:00, 2011:04:13 11:03:09+01:00, 2011:04:13 11:08:19+01:00, 2011:04:18 10:06:43+01:00, 2011:04:18 10:11:02+01:00, 2011:04:18 10:16:42+01:00, 2011:04:18 10:18:31+01:00, 2011:04:18 10:20:40+01:00, 2011:04:18 10:21:28+01:00, 2011:04:18 10:23:36+01:00, 2011:04:18 10:25:56+01:00, 2011:04:18 10:26:27+01:00, 2011:04:18 10:27:23+01:00, 2011:04:18 10:27:30+01:00, 2011:04:18 10:27:41+01:00, 2011:04:18 10:30:59+01:00, 2011:04:18 10:31:22+01:00, 2011:04:18 10:31:48+01:00, 2011:04:18 10:32:24+01:00, 2011:04:18 11:10:32+01:00, 2011:04:18 11:14:31+01:00, 2011:04:18 11:14:52+01:00, 2011:04:18 11:46:17+01:00, 2011:04:18 11:58+01:00, 2011:04:18 11:58:20+01:00, 2011:04:18 12:03:52+01:00, 2011:04:18 12:06:01+01:00, 2011:04:18 12:07:05+01:00, 2011:04:18 12:07:29+01:00, 2011:04:18 12:09:09+01:00, 2011:04:18 12:10:33+01:00, 2011:04:18 12:11:40+01:00, 2011:04:18 12:12:38+01:00, 2011:04:18 12:15:38+01:00, 2011:04:18 12:15:44+01:00, 2011:04:18 12:16:01+01:00, 2011:04:18 12:18:25+01:00, 2011:04:18 12:32:13+01:00, 2011:04:18 14:02:02+01:00, 2011:04:18 14:38:39+01:00, 2011:04:18 14:44:43+01:00, 2011:04:18 15:03:54+01:00, 2011:04:18 15:04:46+01:00, 2011:04:18 15:06:02+01:00, 2011:04:18 15:06:25+01:00, 2011:04:18 15:08+01:00, 2011:04:18 15:12:52+01:00, 2011:04:18 15:13:48+01:00, 2011:04:18 15:31:21+01:00, 2011:04:18 15:32:03+01:00, 2011:04:18 15:33:23+01:00, 2011:04:18 15:35:31+01:00, 2011:04:18 15:41:46+01:00, 2011:04:18 15:56:41+01:00, 2011:04:18 15:57:14+01:00, 2011:04:18 15:59:23+01:00, 2011:04:18 15:59:56+01:00, 2011:04:18 16:01:10+01:00, 2011:04:18 16:04:07+01:00, 2011:04:18 16:06:01+01:00, 2011:04:18 16:08:54+01:00, 2011:04:18 16:10:44+01:00, 2011:04:18 16:14:32+01:00, 2011:04:18 16:14:52+01:00, 2011:04:18 16:15:19+01:00, 2011:04:18 16:21:33+01:00, 2011:04:18 16:23:20+01:00, 2011:04:18 16:25:16+01:00, 2011:04:18 16:25:32+01:00, 2011:04:18 16:28:03+01:00, 2011:04:18 16:30:18+01:00, 2011:04:18 16:42:18+01:00, 2011:04:18 16:53:44+01:00, 2011:04:18 16:54:17+01:00, 2011:04:18 16:56:47+01:00, 2011:04:18 17:01:04+01:00, 2011:04:19 10:07:58+01:00, 2011:04:19 11:11:13+01:00, 2011:04:19 11:12:09+01:00, 2011:04:19 11:12:46+01:00, 2011:04:19 12:28:25+01:00, 2011:04:19 15:42:44+01:00, 2011:04:19 15:47:23+01:00, 2011:04:19 15:49:04+01:00, 2011:04:19 15:55:20+01:00, 2011:04:19 15:56:28+01:00, 2011:04:19 16:30:36+01:00, 2011:04:19 16:32:16+01:00, 2011:04:20 09:01:43+01:00, 2011:04:20 09:03:21+01:00, 2011:04:20 09:07:59+01:00, 2011:04:20 09:18:49+01:00, 2011:04:20 09:19:30+01:00, 2011:04:20 09:21:07+01:00, 2011:04:20 09:30+01:00, 2011:04:20 09:32:32+01:00, 2011:04:20 10:10+01:00, 2011:04:20 10:12:52+01:00, 2011:04:20 10:15:11+01:00, 2011:04:20 10:16:10+01:00, 2011:04:20 10:18:24+01:00, 2011:04:20 10:29:51+01:00, 2011:04:20 10:33:29+01:00, 2011:05:10 10:38:17+01:00, 2011:05:10 11:01:10+01:00, 2011:05:10 12:05:14+01:00, 2011:05:10 12:27:56+01:00, 2011:05:10 13:24:19+01:00, 2011:05:11 09:56:09+01:00, 2011:05:11 10:05:49+01:00, 2011:05:16 12:05:11+01:00, 2011:05:16 12:06:50+01:00, 2011:05:16 12:07:04+01:00, 2011:05:16 12:07:18+01:00, 2011:05:16 12:08:16+01:00, 2011:05:16 12:23:39+01:00, 2011:05:16 12:23:53+01:00, 2011:05:16 12:24:05+01:00, 2011:05:16 12:24:47+01:00, 2011:05:16 12:25:04+01:00, 2011:05:16 12:27:54+01:00, 2011:05:16 12:32:01+01:00, 2011:05:16 15:43:31+01:00, 2011:05:16 15:47:51+01:00, 2011:05:16 15:58:09+01:00, 2011:05:16 16:03:03+01:00, 2011:05:16 16:03:54+01:00, 2011:05:24 15:27:11+01:00, 2011:06:13 09:42:16+01:00, 2011:06:13 10:21:58+01:00, 2011:06:13 10:24:12+01:00, 2011:06:13 10:24:45+01:00, 2011:06:13 10:48:32+01:00, 2011:06:13 10:49:25+01:00, 2011:06:13 10:52:07+01:00, 2011:06:13 10:54:08+01:00, 2011:06:13 10:59:17+01:00, 2011:06:13 11:02:05+01:00, 2011:06:13 11:04:23+01:00, 2011:06:13 11:07+01:00, 2011:06:13 11:12:11+01:00, 2011:06:13 11:15:46+01:00, 2011:06:13 11:17:39+01:00, 2011:06:13 11:40:17+01:00, 2011:06:13 11:42:01+01:00, 2011:06:13 11:43:28+01:00, 2011:06:13 11:47:05+01:00, 2011:06:13 11:49:36+01:00, 2011:06:13 11:49:59+01:00, 2011:06:13 11:51:57+01:00, 2011:06:13 11:54:06+01:00, 2011:06:13 11:54:38+01:00, 2011:06:13 11:55:20+01:00, 2011:06:13 11:56:48+01:00, 2011:06:13 11:58:45+01:00, 2011:06:13 12:09:27+01:00, 2011:06:13 12:11:40+01:00, 2011:06:13 12:12:41+01:00, 2011:06:13 12:18:01+01:00, 2011:06:13 12:18:58+01:00, 2011:06:13 12:28:16+01:00, 2011:06:13 13:29:15+01:00, 2011:06:13 14:29:34+01:00, 2011:06:13 14:31:50+01:00, 2011:06:13 14:42:35+01:00, 2011:06:13 14:46:35+01:00, 2011:06:13 15:46:28+01:00, 2011:06:13 16:06:14+01:00, 2011:06:13 16:25:34+01:00, 2011:06:13 16:27:33+01:00, 2011:06:14 09:22:51+01:00, 2011:06:14 09:34:51+01:00, 2011:06:14 09:43:43+01:00, 2011:06:14 09:48:51+01:00, 2011:06:14 09:49:05+01:00, 2011:06:14 09:50:18+01:00, 2011:06:14 09:53:15+01:00, 2011:06:14 09:57:38+01:00, 2011:06:14 10:00:29+01:00, 2011:06:14 13:31:55+01:00, 2011:06:14 16:40:08+01:00, 2011:06:20 17:04:21+01:00, 2011:06:21 14:40:33+01:00, 2011:06:21 14:54:15+01:00, 2011:07:13 16:15:24+01:00, 2011:07:13 16:41:53+01:00, 2011:07:18 09:55:11+01:00, 2011:07:18 09:58:31+01:00, 2011:07:18 10:13:55+01:00, 2011:07:18 10:20:54+01:00, 2011:07:18 10:24:58+01:00, 2011:08:02 09:40:36+01:00, 2011:08:02 09:41:44+01:00, 2011:08:02 09:51:42+01:00, 2011:08:02 09:54:22+01:00, 2011:08:02 09:55:33+01:00, 2011:08:02 09:56:04+01:00, 2011:08:02 09:58:40+01:00, 2011:08:02 09:59:21+01:00, 2011:08:02 10:46:09+01:00, 2011:08:02 11:02:56+01:00, 2011:08:02 11:05:30+01:00, 2011:08:16 16:37:23+01:00, 2011:11:14 09:28:15Z, 2011:11:14 09:28:15Z, 2011:11:14 09:40:48Z, 2011:11:14 09:56:37Z, 2011:11:14 09:58:11Z, 2011:11:14 09:59:03Z, 2011:11:14 09:59:27Z, 2011:11:14 10:30:55Z, 2011:11:14 10:33:13Z, 2011:11:14 10:46:41Z, 2011:11:14 10:52:55Z, 2011:11:14 11:38:10Z, 2011:11:14 11:51:35Z, 2011:11:14 11:55:48Z, 2011:11:14 12:06:57Z, 2011:11:14 12:15:20Z, 2011:11:14 12:26:36Z, 2011:11:14 12:30:14Z, 2011:11:14 13:34:15Z, 2011:11:14 14:21:04Z, 2011:11:14 14:37:50Z, 2011:11:14 14:56:11Z, 2011:11:14 15:00:49Z, 2011:11:14 15:07:41Z, 2011:11:14 15:30:55Z, 2011:11:14 15:49:12Z, 2011:11:14 15:55:10Z, 2011:11:14 16:00:13Z, 2011:11:14 16:00:51Z, 2011:11:14 16:30:06Z, 2011:11:14 16:33:52Z, 2011:11:14 16:36:57Z, 2011:11:14 16:38:12Z, 2011:11:14 16:41:52Z, 2011:11:14 16:45:04Z, 2011:11:14 16:45:58Z, 2011:11:14 16:48:06Z, 2011:11:14 16:51:13Z, 2011:11:14 16:52:15Z, 2011:11:14 16:53:48Z, 2011:11:14 16:58:46Z, 2011:11:15 09:42:15Z, 2011:11:15 09:47:39Z, 2011:11:15 10:00:01Z, 2011:11:15 10:12:32Z, 2011:11:15 10:16:12Z, 2011:11:15 10:17:01Z, 2011:11:15 10:22Z, 2011:11:15 10:23:37Z, 2011:11:15 10:23:54Z, 2011:11:15 10:24:57Z, 2011:11:15 10:26:49Z, 2011:11:15 10:27:46Z, 2011:11:15 11:25:24Z, 2011:11:15 12:10:15Z, 2011:11:15 12:18:54Z, 2011:11:15 12:22:02Z, 2011:11:15 15:32:08Z, 2011:11:15 15:48:58Z, 2011:11:15 15:55:20Z, 2011:11:15 17:00:22Z, 2011:11:16 09:33:40Z, 2011:11:16 09:54Z, 2011:11:16 09:54:57Z, 2011:11:16 10:09:03Z, 2011:11:16 10:15:40Z, 2011:11:16 10:30:03Z, 2011:11:16 10:33:53Z, 2011:11:16 10:33:53Z, 2011:11:16 10:49:21Z, 2011:11:16 11:11:53Z, 2011:11:16 11:12:16Z, 2011:11:16 11:37:46Z, 2011:11:16 11:44:40Z, 2011:11:16 12:04:37Z, 2011:11:16 13:43:53Z, 2011:11:16 13:47:12Z, 2011:11:16 13:54:36Z, 2011:11:16 13:58:57Z, 2011:11:16 14:02:10Z, 2011:11:16 14:38:45Z, 2011:11:21 12:05:16Z, 2011:11:21 12:28:10Z, 2011:11:21 13:20:40Z, 2011:11:21 13:53:50Z, 2011:11:21 14:15:50Z, 2011:11:21 14:23:54Z, 2011:11:21 14:36:08Z, 2011:11:21 15:12:56Z, 2011:11:21 15:33:16Z, 2011:11:21 15:44:46Z, 2011:11:21 15:47:54Z, 2011:11:21 16:11:22Z, 2011:11:21 16:27:07Z, 2011:11:29 15:35:05Z, 2011:11:29 15:52:47Z, 2011:11:29 16:59:05Z, 2011:11:30 09:07:48Z, 2011:11:30 09:38:52Z, 2011:11:30 10:04:28Z, 2011:11:30 14:25:23Z, 2011:11:30 14:25:27Z, 2011:11:30 15:37:05Z, 2011:11:30 16:02:19Z, 2011:11:30 16:10:51Z, 2011:12:05 09:48:30Z, 2011:12:05 10:31:03Z, 2011:12:05 10:33:32Z, 2011:12:05 10:33:32Z, 2011:12:05 10:45:14Z, 2011:12:05 11:55:18Z, 2011:12:05 16:51:27Z, 2011:12:06 16:15:52Z, 2011:12:06 16:46:45Z, 2011:12:06 16:47:13Z, 2011:12:13 14:12:35Z, 2011:12:13 14:21:43Z, 2012:04:03 08:59:59+01:00, 2012:04:03 08:59:59+01:00, 2012:04:03 09:38:56+01:00, 2012:04:03 12:39:15+01:00, 2012:04:03 12:49+01:00, 2012:04:03 13:22:03+01:00, 2012:04:03 13:46:15+01:00, 2012:04:03 14:13:41+01:00, 2012:04:03 14:15:58+01:00, 2012:04:03 14:17:41+01:00, 2012:04:03 14:24:58+01:00, 2012:04:03 14:31:55+01:00, 2012:04:03 14:36:30+01:00, 2012:04:03 14:42:47+01:00, 2012:04:03 14:42:56+01:00, 2012:04:03 14:44:52+01:00, 2012:04:03 14:47:11+01:00, 2012:04:03 15:10:07+01:00, 2012:04:03 15:17:22+01:00, 2012:04:03 15:18:32+01:00, 2012:04:03 15:43:29+01:00, 2012:04:03 15:58:16+01:00, 2012:04:03 16:06:17+01:00, 2012:04:03 16:32:44+01:00, 2012:04:03 16:37:54+01:00, 2012:04:03 17:03:08+01:00, 2012:04:30 13:57:50+01:00, 2012:05:01 13:48:42+01:00, 2012:05:01 14:48:23+01:00, 2012:05:01 14:55:56+01:00, 2012:05:01 14:59:12+01:00, 2012:05:15 11:35:35+01:00, 2012:05:15 11:39:08+01:00, 2012:05:15 11:47:59+01:00, 2012:05:15 11:53:15+01:00, 2012:05:15 11:58:41+01:00, 2012:05:15 13:10:17+01:00, 2012:05:15 13:12:55+01:00, 2012:05:15 13:21:47+01:00, 2012:05:15 13:24:22+01:00, 2012:05:15 13:25:28+01:00, 2012:05:15 13:30:37+01:00, 2012:05:15 13:33:12+01:00, 2012:05:15 13:35:46+01:00, 2012:05:15 13:46:05+01:00, 2012:05:15 13:49:34+01:00, 2012:05:15 14:01:40+01:00, 2012:05:15 14:57:34+01:00, 2012:05:15 14:58:10+01:00, 2012:05:15 15:03:15+01:00, 2012:05:15 15:17:26+01:00, 2012:05:15 15:18:08+01:00, 2012:05:15 15:40:11+01:00, 2012:05:16 10:25:39+01:00, 2012:05:16 10:30:47+01:00, 2012:05:16 10:36:13+01:00, 2012:05:16 10:44:09+01:00, 2012:05:16 10:47:44+01:00, 2012:05:16 10:49:25+01:00, 2012:05:16 10:50:39+01:00, 2012:05:16 10:57:42+01:00, 2012:05:16 10:59:08+01:00, 2012:05:16 11:02:04+01:00, 2012:05:16 11:13:42+01:00, 2012:05:16 11:16:51+01:00, 2012:05:16 11:18:42+01:00, 2012:05:16 13:13:25+01:00, 2012:05:16 13:18:55+01:00, 2012:05:22 15:57:21+01:00, 2012:05:22 16:02:34+01:00, 2012:05:22 16:03:04+01:00, 2012:05:22 16:06:19+01:00, 2012:05:22 16:07:46+01:00, 2012:05:22 16:09:13+01:00, 2012:05:22 16:10:08+01:00, 2012:05:22 16:10:24+01:00, 2012:05:22 16:10:54+01:00, 2012:05:22 16:11:09+01:00, 2012:05:22 16:11:26+01:00, 2012:05:22 16:13:03+01:00, 2012:05:22 16:14:10+01:00, 2012:05:22 16:14:34+01:00, 2012:05:22 16:14:57+01:00, 2012:05:22 16:16:21+01:00, 2012:05:22 16:16:35+01:00, 2012:05:22 16:17:46+01:00, 2012:05:22 16:18:46+01:00, 2012:05:22 16:20:22+01:00, 2012:05:22 16:22:39+01:00, 2012:05:22 16:23:08+01:00, 2012:05:22 16:23:39+01:00, 2012:05:22 16:25:06+01:00, 2012:05:22 16:26:22+01:00, 2012:05:22 16:34:42+01:00, 2012:05:22 16:38:22+01:00, 2012:05:22 16:40:50+01:00, 2012:05:22 16:45:47+01:00, 2012:07:10 10:04:23+01:00, 2012:07:10 10:22:15+01:00, 2012:07:10 10:26:13+01:00, 2012:07:10 14:02:32+01:00, 2012:07:12 14:42:47+01:00, 2012:07:12 14:43:23+01:00, 2012:07:12 14:43:57+01:00, 2012:07:12 14:44:27+01:00, 2012:07:12 14:45+01:00, 2012:07:12 14:45:38+01:00, 2012:07:12 14:45:59+01:00, 2012:07:12 14:46:15+01:00, 2012:07:12 14:46:41+01:00, 2012:07:12 14:46:49+01:00, 2012:07:12 14:49:10+01:00, 2012:07:12 14:49:49+01:00, 2012:07:12 14:51:07+01:00, 2012:07:12 14:51:17+01:00, 2012:07:12 14:56:43+01:00, 2012:07:13 09:51:17+01:00, 2012:07:13 09:55:49+01:00, 2012:07:16 12:55:07+01:00, 2012:07:23 14:16:09+01:00, 2012:07:23 16:39+01:00, 2012:07:31 12:01:36+01:00, 2012:07:31 12:13:03+01:00, 2012:08:28 16:54:07+01:00, 2012:08:29 13:33:05+01:00, 2012:08:29 14:31:14+01:00, 2012:10:08 13:31:38+01:00, 2012:10:08 13:33:07+01:00, 2012:10:08 13:40:30+01:00, 2012:10:08 13:43:11+01:00, 2012:10:15 09:38:03+01:00
History Software Agent          : Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0
History Changed                 : /, /metadata, /, /metadata, /, /metadata, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /metadata, /;/metadata, /, /, /, /, /, /, /, /, /, /, /, /metadata, /;/metadata, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /metadata, /;/metadata, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /metadata, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /metadata, /;/metadata, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /metadata, /;/metadata, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /metadata, /;/metadata, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /metadata, /;/metadata, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /metadata, /;/metadata, /, /, /, /, /, /, /, /, /metadata, /;/metadata, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /
Manifest Link Form              : ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream
Manifest Placed X Resolution    : 300.00, 300.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 300.00, 300.00, 72.00, 72.00, 72.00, 72.00, 72.00, 300.00
Manifest Placed Y Resolution    : 300.00, 300.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 300.00, 300.00, 72.00, 72.00, 72.00, 72.00, 72.00, 300.00
Manifest Placed Resolution Unit : Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches
Manifest Reference Instance ID  : xmp.iid:C9A378189DC7DE11AB8189AFD2F1D12E, xmp.iid:6A0B5B5EC5D4E1119E00C866617E4EFA, uuid:4E1BF62BBD7D11DD8E79B917A3244842, uuid:4E1BF62BBD7D11DD8E79B917A3244842, uuid:4E1BF62BBD7D11DD8E79B917A3244842, uuid:4E1BF62BBD7D11DD8E79B917A3244842, uuid:4E1BF62BBD7D11DD8E79B917A3244842, uuid:4E1BF62BBD7D11DD8E79B917A3244842, uuid:fbbda26d-ff26-43d9-8c53-5ed010d8a92e, xmp.iid:05801A278E7DE111A5B9DF92B605BBA6, xmp.iid:06801A278E7DE111A5B9DF92B605BBA6, uuid:4E1BF62BBD7D11DD8E79B917A3244842, uuid:4E1BF62BBD7D11DD8E79B917A3244842, uuid:4E1BF62BBD7D11DD8E79B917A3244842, uuid:4E1BF62BBD7D11DD8E79B917A3244842, uuid:4E1BF62BBD7D11DD8E79B917A3244842, xmp.iid:C9A378189DC7DE11AB8189AFD2F1D12E
Manifest Reference Document ID  : uuid:C7AFAA24A28511DD90C0CBAB0227974D, xmp.did:670B5B5EC5D4E1119E00C866617E4EFA, uuid:4E1BF629BD7D11DD8E79B917A3244842, uuid:4E1BF629BD7D11DD8E79B917A3244842, uuid:4E1BF629BD7D11DD8E79B917A3244842, uuid:4E1BF629BD7D11DD8E79B917A3244842, uuid:4E1BF629BD7D11DD8E79B917A3244842, uuid:4E1BF629BD7D11DD8E79B917A3244842, uuid:27800821D35EE111B1BEC27A4A9EC88B, xmp.did:05801A278E7DE111A5B9DF92B605BBA6, xmp.did:06801A278E7DE111A5B9DF92B605BBA6, uuid:4E1BF629BD7D11DD8E79B917A3244842, uuid:4E1BF629BD7D11DD8E79B917A3244842, uuid:4E1BF629BD7D11DD8E79B917A3244842, uuid:4E1BF629BD7D11DD8E79B917A3244842, uuid:4E1BF629BD7D11DD8E79B917A3244842, uuid:C7AFAA24A28511DD90C0CBAB0227974D
Metadata Date                   : 2012:10:22 10:26:20+01:00
Creator Tool                    : Adobe InDesign CS4 (6.0.6)
Thumbnail Format                : JPEG
Thumbnail Width                 : 256
Thumbnail Height                : 256
Thumbnail Image                 : (Binary data 14588 bytes, use -b option to extract)
Doc Change Count                : 20612
Format                          : application/pdf
Producer                        : Adobe PDF Library 9.0
Trapped                         : False
Page Count                      : 26
EXIF Metadata provided by EXIF.tools

Navigation menu