Managing Fraud With EMV

2015-01-11

: Mc Managing Fraud With Emv Managing_Fraud_With_EMV

Open the PDF directly: View PDF PDF.
Page Count: 4

DownloadManaging Fraud With EMV
Open PDF In BrowserView PDF
For acquirers, effective end-to-end event 	
management should entail:

— S haring information about known security
vulnerabilities of software and payment devices
that have led to past data compromises

• Establishing an operations plan that includes ADC
event severity matrix rating protocols
• Creating a core incident response team consisting of
cross-functional management groups
• Methodology to assist the payment brands with

Risk Communications Guidelines
During a data breach event, most organizations

Managing Fraud with EMV –
A Risk Manager Checklist
for Deploying Chip Technology

struggle to keep up with the demand for information
from various stakeholders. The pressure of knowing

outreach to the breached entity and the commitment

what to say and to whom can be reduced by develop-

Worldwide rollout of EMV continues to gather pace. Several markets and regions around the world have the

to stay engaged during the entire ADC event lifecycle

ing a risk communications strategy before an ADC

completion of EMV migration in sight or are making large strides as they begin to introduce the authentication

Proactive Data Security and Education

event occurs. Elements of a robust ADC event

technology in their regions:

Both issuers and acquirers must be committed to

communications response framework should include:

helping educate and reinforce appropriate data security

• A dedicated ADC event communications response

practices to their customers, whether they are

team that includes members who have direct

cardholders, merchants, Third-Party Processors, or other

interactions with all the stakeholders that may be

types of Data Storage Entities and Data Providers.
• Often, savvy cardholders are the first line of defense

• Much of Southeast Asia and parts of Africa also operate EMV-enabled payment networks

affected by a breach event
checklists for response activities based on triggers or

from being compromised; therefore, issuers should

event timing, contact information for all team

focus on cardholder education by:

members, and template response materials that
include “evergreen” messaging that has been vetted

— Recommending cardholders review their payment

by the response team and legal counsel

card statements often

• A stakeholder communications matrix that matches
key audiences against internal and external

such as phishing and skimming

communications channels, delivery dates, and

— Promoting the use of online protection measures,
such as anti-virus, anti-spyware, and firewall

the internal staff responsible for disseminating

software

the messages

— Offering tips on what to do if customers believe

• Canada and Mexico are in the early stages of EMV deployment

• An ADC event communications plan that includes

when it comes to preventing their payment accounts

— Providing information about popular fraud scams,

• The Single European Payments Area (SEPA) will have a cards payment market that is largely chip-based as of 2011

During an ADC event, consider the following:

they are the victim of an ADC or identity theft event
— Providing elements of what makes a strong online
password

• Use simple language without industry jargon
• Rely on facts, not speculation

Countries where there has
not yet been preparation
to migrate

Countries in which one or more
banks are migrating, or have
completed migration to EMV chip

Countries where penetration of
MasterCard Branded EMV cards, EMV
POS, or EMV ATMs exceeds 50 %

• Express empathy for affected audiences and inform
• Acquirers also need to ensure that they are doing all

them what to do to mitigate any possible negative

they can to protect the integrity of payment card
account data, including:

impact of an ADC event
• Share information regarding what actions are being

— Educating value chain partners such as merchants

taken to protect customers

and processors about what types of sensitive

• Incorporate, when possible, zero liability language

payment card data can and cannot be stored

into cardholder response materials to help address

— Establishing an effective Payment Card Industry

financial impact concerns

Data Security Standard (PCI DSS) program to drive
merchant compliance. MasterCard’s acquiring
partners can leverage the MasterCard Merchant
Education Program to support PCI compliance
training activities for merchants

Javelin Strategy & Research; Data Breaches: What Should

1

Banks, Payments Firms and Merchants do to Protect Brand
Equity and Customer Loyalty? Oct. 2008.
2

Ponemon Institute; U.S. Cost of a Data Breach Study, 2009

As of Q2 2009, there were 487 million MasterCard
branded cards (including Maestro) compliant
with EMV, 14 million EMV capable POS terminals,
and over 3,000 active MasterCard Chip migration
projects underway in 119 countries

(www.mastercard.com/us/merchant/support/
merchant_education.html)

6

MasterCard Academy of Risk Management

MasterCard Academy of Risk Management

7

The secure data authentication provided by chip

When a chip transaction does occur, the additional

EMV provides a significant opportunity to manage

technology protects both online and offline

chip authorization data will give issuers additional

down the risk of card transactions. Use of the chip

transactions against counterfeit fraud. Given the

information that can be used to detect fraud attacks.

cryptogram to properly handle chip card and POS

ongoing spread of EMV technology around the world,

The following key authorization checks should

authentication means that valuable fraud resources

what other steps should issuers take to protect their

be considered:

need not be directed to checking out the authenticity

investment as the chip infrastructure matures?

• Authenticate the card using the cryptogram received

of transactions which are obviously not counterfeit.

Card Issuance Considerations

in the authorization message. Although an invalid

The technical platform provided by EMV is very

The first and most important consideration in deploying

cryptogram can be caused by data integrity issues,

powerful. However, it is crucial that banks also

EMV technology is to ensure that there is no risk of

an invalid cryptogram is a clear indication of a higher

consider how EMV, and in particular the introduction

track data cross-contamination with data stolen from

risk transaction

of PIN, impacts cardholders. Simple measures that

one interface being used to produce counterfeit cards

• Review the Terminal and Card Risk Management

encourage cardholders to use and remember their

using a different technology. Simply personalizing chip

information received. This will reveal why the

PIN are important to a smooth transition. For example,

cards without the complete magnetic stripe track 2 data

transaction came online and subsequent tracking of

offering PIN change functionality at ATMs enhances

By verifying this dynamic signature, the terminal can

this information across a sequence of transactions

the likelihood of cardholders remembering their PIN

authenticate the card and confirm the legitimacy of

will help to identify unusual card usage patterns

without writing it down for a fraudster to discover.

means that if chip transaction data is compromised,
then it cannot be used to create a counterfeit magnetic
stripe card (i.e., using a Card Validation Code [CVC]
1 in the track 2 equivalent data element on the chip so

sensitive data, including the AC and the proof that the
card has verified the PIN.

that track data copied to the magnetic stripe can be
detected).

used for the transaction. It is particularly important to
validate that the card that supports PIN has successfully

The big advantage of CDA is that it not only provides
the dynamic aspects of DDA (hence protection against

The opportunity to switch from signature verification

• Check what cardholder verification method has been

checked the PIN if the terminal supports PIN
• Manage the use of signature fallback. Many issuers

cloning), but also ensures the integrity of sensitive data

will allow signature to be used instead of PIN,

communicated between the card and terminal, hence

especially as cardholders become accustomed

protecting against complicated wedge attacks.

to using PIN. But the exception can be a trade

addition, replacement of signature with PIN is a

Optimizing Authorization Processes

off between customer service and fraud risk and

positive step for merchants resulting in reduced

Although chip technology gives the issuer the

exception handling and streamlining POS processing

opportunity to manage the volume of online

(e.g., signed slip handling, objective acceptance).

authorizations — so they can match their risk control

In addition, issuers should take appropriate steps to

against their operations and performance objectives —

employ appropriate authentication technologies

it must be remembered that chip technology should be

moving beyond Static Data Authentication (SDA).

used hand-in-hand with transaction fraud controls and

While Dynamic Data Authentication (DDA) provides a

predictive fraud systems to fight the fraudster.

higher degree of security that protects against chip

A primary consideration is transactions that have been

data cloning, the most secure EMV implementation

completed as technical fallback from chip to magnetic

uses Combined Dynamic Data Authentication/

stripe. These transactions can be fraud prone as the

Application Cryptogram Generation (CDA), where the

fraudster seeks to avoid the protection of the chip by

card produces a dynamic digital signature on a random

disabling it. The risk of fallback transactions should be

challenge that it has received from the terminal and

carefully considered and action taken either to contact

other sensitive data, and on the value of the Application

cardholders or decline transactions where there is

Cryptogram (AC) generated by the card.

significant risk. The frequency of fallback should be

to PIN is another option to consider. Issuer-controlled
PIN is a step forward from subjective signature-checking, which relies on the diligence of the merchant. In

Although the migration to the chip technology gives
the banks a vital tool in the fight against fraud, it is
not the technology alone that creates a total solution.
Rather, it is the way the bank uses the opportunity.
By following the above simple steps, banks can deliver
on the business case for the investment in chip and
give a better service to their cardholders.

once PIN is well established, signature fallback
transactions should be considered as higher risk

tracked and cards that appear prone to failure should
be quickly replaced.

8

MasterCard Academy of Risk Management

MasterCard Academy of Risk Management

9

The secure data authentication provided by chip

When a chip transaction does occur, the additional

EMV provides a significant opportunity to manage

technology protects both online and offline

chip authorization data will give issuers additional

down the risk of card transactions. Use of the chip

transactions against counterfeit fraud. Given the

information that can be used to detect fraud attacks.

cryptogram to properly handle chip card and POS

ongoing spread of EMV technology around the world,

The following key authorization checks should

authentication means that valuable fraud resources

what other steps should issuers take to protect their

be considered:

need not be directed to checking out the authenticity

investment as the chip infrastructure matures?

• Authenticate the card using the cryptogram received

of transactions which are obviously not counterfeit.

Card Issuance Considerations

in the authorization message. Although an invalid

The technical platform provided by EMV is very

The first and most important consideration in deploying

cryptogram can be caused by data integrity issues,

powerful. However, it is crucial that banks also

EMV technology is to ensure that there is no risk of

an invalid cryptogram is a clear indication of a higher

consider how EMV, and in particular the introduction

track data cross-contamination with data stolen from

risk transaction

of PIN, impacts cardholders. Simple measures that

one interface being used to produce counterfeit cards

• Review the Terminal and Card Risk Management

encourage cardholders to use and remember their

using a different technology. Simply personalizing chip

information received. This will reveal why the

PIN are important to a smooth transition. For example,

cards without the complete magnetic stripe track 2 data

transaction came online and subsequent tracking of

offering PIN change functionality at ATMs enhances

By verifying this dynamic signature, the terminal can

this information across a sequence of transactions

the likelihood of cardholders remembering their PIN

authenticate the card and confirm the legitimacy of

will help to identify unusual card usage patterns

without writing it down for a fraudster to discover.

means that if chip transaction data is compromised,
then it cannot be used to create a counterfeit magnetic
stripe card (i.e., using a Card Validation Code [CVC]
1 in the track 2 equivalent data element on the chip so

sensitive data, including the AC and the proof that the
card has verified the PIN.

that track data copied to the magnetic stripe can be
detected).

used for the transaction. It is particularly important to
validate that the card that supports PIN has successfully

The big advantage of CDA is that it not only provides
the dynamic aspects of DDA (hence protection against

The opportunity to switch from signature verification

• Check what cardholder verification method has been

checked the PIN if the terminal supports PIN
• Manage the use of signature fallback. Many issuers

cloning), but also ensures the integrity of sensitive data

will allow signature to be used instead of PIN,

communicated between the card and terminal, hence

especially as cardholders become accustomed

protecting against complicated wedge attacks.

to using PIN. But the exception can be a trade

addition, replacement of signature with PIN is a

Optimizing Authorization Processes

off between customer service and fraud risk and

positive step for merchants resulting in reduced

Although chip technology gives the issuer the

exception handling and streamlining POS processing

opportunity to manage the volume of online

(e.g., signed slip handling, objective acceptance).

authorizations — so they can match their risk control

In addition, issuers should take appropriate steps to

against their operations and performance objectives —

employ appropriate authentication technologies

it must be remembered that chip technology should be

moving beyond Static Data Authentication (SDA).

used hand-in-hand with transaction fraud controls and

While Dynamic Data Authentication (DDA) provides a

predictive fraud systems to fight the fraudster.

higher degree of security that protects against chip

A primary consideration is transactions that have been

data cloning, the most secure EMV implementation

completed as technical fallback from chip to magnetic

uses Combined Dynamic Data Authentication/

stripe. These transactions can be fraud prone as the

Application Cryptogram Generation (CDA), where the

fraudster seeks to avoid the protection of the chip by

card produces a dynamic digital signature on a random

disabling it. The risk of fallback transactions should be

challenge that it has received from the terminal and

carefully considered and action taken either to contact

other sensitive data, and on the value of the Application

cardholders or decline transactions where there is

Cryptogram (AC) generated by the card.

significant risk. The frequency of fallback should be

to PIN is another option to consider. Issuer-controlled
PIN is a step forward from subjective signature-checking, which relies on the diligence of the merchant. In

Although the migration to the chip technology gives
the banks a vital tool in the fight against fraud, it is
not the technology alone that creates a total solution.
Rather, it is the way the bank uses the opportunity.
By following the above simple steps, banks can deliver
on the business case for the investment in chip and
give a better service to their cardholders.

once PIN is well established, signature fallback
transactions should be considered as higher risk

tracked and cards that appear prone to failure should
be quickly replaced.

8

MasterCard Academy of Risk Management

MasterCard Academy of Risk Management

9

EMV PAYMENT CARDS
SECURITY MEASURES TO
PREVENT WEDGE ATTACKS
Earlier this year, reports by media alleged EMV payment cards are vulnerable to wedge or “man-in-the-middle”
attacks. Wedge attacks, as described in the reports, occur when a fraudster inserts a wedge device between a
lost or stolen card and point-of-sale (POS) terminal, thereby causing the terminal to erroneously determine that
the card has been verified by the PIN. Additional allegations also claim that issuers may not be able to detect that
a wedge attack has occurred during the online authorization process.
In response to these allegations, EMVCo — the global standard for credit and debit payment cards based on chip
card technology — issued a statement to ensure that the marketplace understands the robust security measures
EMV cards employ to prevent wedge-type attacks from succeeding. MasterCard supports EMVCo’s position on
the matter. The complete statement can be read at www.emvco.com.

Understanding Terminal
Manipulation at the
Point of Sale
One of the best places to obtain unnoticed access to card data plus PIN and ultimately access to clean money can
be at the point of sale (POS). Whether acting independently, or in collusion with a merchant, criminals are
developing an in-depth understanding of the function and vulnerabilities of many of the terminals deployed
today — and they’re working around the clock to exploit that knowledge and commit fraud.
In 2008, more than 280 million account details were compromised. This resulted in the re-sale price of
account data falling dramatically. However, when track 2 data including the PIN was compromised, the price
remained high.

Terminal Fraud – Defeating the Security of Terminals
The one thing you can be certain of is that criminals are focused on exploiting the weakest link in any layer

This wedge, or man-in-the-middle attack, is technically difficult and suitable countermeasures are already

of the transaction environment. They almost invariably seek out the least challenging route to easy money.

available when the full picture of the payment process is taken into account. The interoperability and security

Unfortunately, they are also very clever, or they have access to people who are very clever.

features provided by the EMV card-terminal specifications are building blocks for the payment systems and
financial institutions that design their products and processes in accordance with wider risk management needs.

Indeed, history proves that the criminal will target the terminal that is easiest to get into. For example, in the
United States, fuel pumps are among the easiest and most attractive targets because of their location — they sit
in the open often unattended and typically have very high transaction volume. Generally, there is only one key
which will unlock every pump and grant access to the payment terminal hardware, and the physical security
surrounding the pay at the pump is poor at best.

The opportunity to launch the wedge attack is

The risks and challenges faced by fraudsters

limited and countermeasures do exist:

would be major. They must:

• The attack is focused exclusively on lost and stolen

• Steal a card

Once a criminal has access,

• Install the card into wedge electronics so that it can

investigators familiar with

fraud. This fraud type has additional controls in
place to mitigate it outside EMV and by its nature
the fraud is limited to the single stolen card
• The attack is not relevant to ATM transactions
and does not compromise the valid PIN
• Countermeasures are already available either
explicitly in EMV, or within payment system
products and networks, or within issuer host

be used unobtrusively
• Perform the attack before the card is reported stolen
• Risk detection by the merchant during the fraud
attempt with the resulting legal consequences
• Hope that the issuer does not have intelligent fraud
detection based on behavioral and geographic data

this type of attack report 
that it only takes crooks
about 30 seconds to remove
the entire card device from 
a gas pump and replace it
with an identical one fitted
with electronic skimmers.

systems. Indeed, the issuer can already detect if
the PIN has not been verified and can decline or
refer the transaction in order to minimize risks
associated with signature fallback

While such an attack might be theoretically possible, it would be extremely difficult and expensive to carry out
successfully. Current compensating controls are likely to detect or limit the fraud. The possible financial gain from
the attack is minimal while the risk of a declined transaction or exposure of the fraudster is significant.

10

MasterCard Academy of Risk Management

MasterCard Academy of Risk Management

11



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
Create Date                     : 2010:05:12 13:46:34-04:00
Creator                         : Adobe InDesign CS4 (6.0.4)
Modify Date                     : 2010:05:18 15:29:16-04:00
Has XFA                         : No
XMP Toolkit                     : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37
Instance ID                     : uuid:ea94fd3a-b21d-d74e-a902-62485786aa53
Document ID                     : xmp.did:74117FE420071168BEDCE2D9BE7E5883
Original Document ID            : adobe:docid:indd:3a19e4af-4b96-11de-8d6b-91f273dbfaff
Rendition Class                 : proof:pdf
Derived From Instance ID        : xmp.iid:74117FE320071168BEDCE2D9BE7E5883
Derived From Document ID        : xmp.did:05801174072068119109D5845EBC94BA
Derived From Original Document ID: adobe:docid:indd:3a19e4af-4b96-11de-8d6b-91f273dbfaff
Derived From Rendition Class    : default
History Action                  : saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved
History Instance ID             : xmp.iid:28A3F1E3E520681195FEFC9E08FD538D, xmp.iid:29A3F1E3E520681195FEFC9E08FD538D, xmp.iid:2AA3F1E3E520681195FEFC9E08FD538D, xmp.iid:2BA3F1E3E520681195FEFC9E08FD538D, xmp.iid:2CA3F1E3E520681195FEFC9E08FD538D, xmp.iid:2DA3F1E3E520681195FEFC9E08FD538D, xmp.iid:2EA3F1E3E520681195FEFC9E08FD538D, xmp.iid:2FA3F1E3E520681195FEFC9E08FD538D, xmp.iid:40AF02FDFE20681195FEFC9E08FD538D, xmp.iid:41AF02FDFE20681195FEFC9E08FD538D, xmp.iid:43AF02FDFE20681195FEFC9E08FD538D, xmp.iid:44AF02FDFE20681195FEFC9E08FD538D, xmp.iid:45AF02FDFE20681195FEFC9E08FD538D, xmp.iid:46AF02FDFE20681195FEFC9E08FD538D, xmp.iid:47AF02FDFE20681195FEFC9E08FD538D, xmp.iid:48AF02FDFE20681195FEFC9E08FD538D, xmp.iid:49AF02FDFE20681195FEFC9E08FD538D, xmp.iid:4AAF02FDFE20681195FEFC9E08FD538D, xmp.iid:0CCDBCE60721681195FEFC9E08FD538D, xmp.iid:0DCDBCE60721681195FEFC9E08FD538D, xmp.iid:11CDBCE60721681195FEFC9E08FD538D, xmp.iid:12CDBCE60721681195FEFC9E08FD538D, xmp.iid:13CDBCE60721681195FEFC9E08FD538D, xmp.iid:14CDBCE60721681195FEFC9E08FD538D, xmp.iid:15CDBCE60721681195FEFC9E08FD538D, xmp.iid:16CDBCE60721681195FEFC9E08FD538D, xmp.iid:F77F11740720681195FE8DA4F5C367D8, xmp.iid:F87F11740720681195FE8DA4F5C367D8, xmp.iid:F97F11740720681195FE8DA4F5C367D8, xmp.iid:FA7F11740720681195FE8DA4F5C367D8, xmp.iid:FB7F11740720681195FE8DA4F5C367D8, xmp.iid:FC7F11740720681195FE8DA4F5C367D8, xmp.iid:FD7F11740720681195FE8DA4F5C367D8, xmp.iid:FE7F11740720681195FE8DA4F5C367D8, xmp.iid:FF7F11740720681195FE8DA4F5C367D8, xmp.iid:008011740720681195FE8DA4F5C367D8, xmp.iid:920E180F0E20681195FE8DA4F5C367D8, xmp.iid:930E180F0E20681195FE8DA4F5C367D8, xmp.iid:9A0E180F0E20681195FE8DA4F5C367D8, xmp.iid:9B0E180F0E20681195FE8DA4F5C367D8, xmp.iid:9C0E180F0E20681195FE8DA4F5C367D8, xmp.iid:88BC9C511620681195FE8DA4F5C367D8, xmp.iid:89BC9C511620681195FE8DA4F5C367D8, xmp.iid:8ABC9C511620681195FE8DA4F5C367D8, xmp.iid:8CBC9C511620681195FE8DA4F5C367D8, xmp.iid:8DBC9C511620681195FE8DA4F5C367D8, xmp.iid:8EBC9C511620681195FE8DA4F5C367D8, xmp.iid:8FBC9C511620681195FE8DA4F5C367D8, xmp.iid:90BC9C511620681195FE8DA4F5C367D8, xmp.iid:91BC9C511620681195FE8DA4F5C367D8, xmp.iid:92BC9C511620681195FE8DA4F5C367D8, xmp.iid:B4BF6E4C1A20681195FE8DA4F5C367D8, xmp.iid:B5BF6E4C1A20681195FE8DA4F5C367D8, xmp.iid:B6BF6E4C1A20681195FE8DA4F5C367D8, xmp.iid:B7BF6E4C1A20681195FE8DA4F5C367D8, xmp.iid:B8BF6E4C1A20681195FE8DA4F5C367D8, xmp.iid:B9BF6E4C1A20681195FE8DA4F5C367D8, xmp.iid:BABF6E4C1A20681195FE8DA4F5C367D8, xmp.iid:BBBF6E4C1A20681195FE8DA4F5C367D8, xmp.iid:BCBF6E4C1A20681195FE8DA4F5C367D8, xmp.iid:BDBF6E4C1A20681195FE8DA4F5C367D8, xmp.iid:BEBF6E4C1A20681195FE8DA4F5C367D8, xmp.iid:881803BA2220681195FE8DA4F5C367D8, xmp.iid:01801174072068119109BBACC68CD06B, xmp.iid:02801174072068119109BBACC68CD06B, xmp.iid:F77F117407206811B69981835B6B7C96, xmp.iid:F87F117407206811B69981835B6B7C96, xmp.iid:F97F117407206811B69981835B6B7C96, xmp.iid:FA7F117407206811B69981835B6B7C96, xmp.iid:FB7F117407206811B69981835B6B7C96, xmp.iid:FC7F117407206811B69981835B6B7C96, xmp.iid:FD7F117407206811B69981835B6B7C96, xmp.iid:FE7F117407206811B69981835B6B7C96, xmp.iid:FF7F117407206811B69981835B6B7C96, xmp.iid:0080117407206811B69981835B6B7C96, xmp.iid:B4F1A8A617206811B69981835B6B7C96, xmp.iid:B5F1A8A617206811B69981835B6B7C96, xmp.iid:B6F1A8A617206811B69981835B6B7C96, xmp.iid:B7F1A8A617206811B69981835B6B7C96, xmp.iid:B9F1A8A617206811B69981835B6B7C96, xmp.iid:BAF1A8A617206811B69981835B6B7C96, xmp.iid:BBF1A8A617206811B69981835B6B7C96, xmp.iid:BCF1A8A617206811B69981835B6B7C96, xmp.iid:BDF1A8A617206811B69981835B6B7C96, xmp.iid:BEF1A8A617206811B69981835B6B7C96, xmp.iid:94ED5B1FB5206811B69981835B6B7C96, xmp.iid:95ED5B1FB5206811B69981835B6B7C96, xmp.iid:0180117407206811ACAFF1829C08E89E, xmp.iid:0280117407206811ACAFF1829C08E89E, xmp.iid:0380117407206811ACAFF1829C08E89E, xmp.iid:0480117407206811ACAFF1829C08E89E, xmp.iid:0580117407206811ACAFF1829C08E89E, xmp.iid:0680117407206811ACAFF1829C08E89E, xmp.iid:0780117407206811ACAFF1829C08E89E, xmp.iid:0880117407206811ACAFF1829C08E89E, xmp.iid:0980117407206811ACAFF1829C08E89E, xmp.iid:0A80117407206811ACAFF1829C08E89E, xmp.iid:083618032C206811ACAFF1829C08E89E, xmp.iid:093618032C206811ACAFF1829C08E89E, xmp.iid:0A3618032C206811ACAFF1829C08E89E, xmp.iid:0B3618032C206811ACAFF1829C08E89E, xmp.iid:0180117407206811ACAFD4C765839F6B, xmp.iid:0280117407206811ACAFD4C765839F6B, xmp.iid:0380117407206811ACAFD4C765839F6B, xmp.iid:0480117407206811ACAFD4C765839F6B, xmp.iid:0580117407206811ACAFD4C765839F6B, xmp.iid:0680117407206811ACAFD4C765839F6B, xmp.iid:0780117407206811ACAFD4C765839F6B, xmp.iid:0980117407206811ACAFD4C765839F6B, xmp.iid:F77F117407206811A6138182D9225013, xmp.iid:F87F117407206811A6138182D9225013, xmp.iid:7BAA2AB50C206811A961EDD4AAB70999, xmp.iid:7CAA2AB50C206811A961EDD4AAB70999, xmp.iid:7DAA2AB50C206811A961EDD4AAB70999, xmp.iid:7EAA2AB50C206811A961EDD4AAB70999, xmp.iid:7FAA2AB50C206811A961EDD4AAB70999, xmp.iid:80AA2AB50C206811A961EDD4AAB70999, xmp.iid:6264877F17206811A961EDD4AAB70999, xmp.iid:6364877F17206811A961EDD4AAB70999, xmp.iid:6464877F17206811A961EDD4AAB70999, xmp.iid:6564877F17206811A961EDD4AAB70999, xmp.iid:6664877F17206811A961EDD4AAB70999, xmp.iid:6764877F17206811A961EDD4AAB70999, xmp.iid:6864877F17206811A961EDD4AAB70999, xmp.iid:6964877F17206811A961EDD4AAB70999, xmp.iid:6A64877F17206811A961EDD4AAB70999, xmp.iid:6B64877F17206811A961EDD4AAB70999, xmp.iid:6C64877F17206811A961EDD4AAB70999, xmp.iid:3A79C3B724206811A961EDD4AAB70999, xmp.iid:3B79C3B724206811A961EDD4AAB70999, xmp.iid:3C79C3B724206811A961EDD4AAB70999, xmp.iid:3D79C3B724206811A961EDD4AAB70999, xmp.iid:3E79C3B724206811A961EDD4AAB70999, xmp.iid:3F79C3B724206811A961EDD4AAB70999, xmp.iid:F77F1174072068118F628D3703249777, xmp.iid:F87F1174072068118F628D3703249777, xmp.iid:F97F1174072068118F628D3703249777, xmp.iid:4079C3B724206811A961EDD4AAB70999, xmp.iid:4179C3B724206811A961EDD4AAB70999, xmp.iid:4279C3B724206811A961EDD4AAB70999, xmp.iid:B20C4D754C206811A961EDD4AAB70999, xmp.iid:B30C4D754C206811A961EDD4AAB70999, xmp.iid:B40C4D754C206811A961EDD4AAB70999, xmp.iid:B50C4D754C206811A961EDD4AAB70999, xmp.iid:F77F1174072068118899D32FDE5995B2, xmp.iid:F87F1174072068118899D32FDE5995B2, xmp.iid:F97F1174072068118899D32FDE5995B2, xmp.iid:F77F117407206811BC2CBBACA6AC7AD8, xmp.iid:F87F117407206811BC2CBBACA6AC7AD8, xmp.iid:F97F117407206811BC2CBBACA6AC7AD8, xmp.iid:FA7F117407206811BC2CBBACA6AC7AD8, xmp.iid:FB7F117407206811BC2CBBACA6AC7AD8, xmp.iid:FC7F117407206811BC2CBBACA6AC7AD8, xmp.iid:FD7F117407206811BC2CBBACA6AC7AD8, xmp.iid:FE7F117407206811BC2CBBACA6AC7AD8, xmp.iid:FF7F117407206811BC2CBBACA6AC7AD8, xmp.iid:0180117407206811BB8EBA680D433916, xmp.iid:BFF15451D8216811A7BA90A2D2806425, xmp.iid:C0F15451D8216811A7BA90A2D2806425, xmp.iid:C1F15451D8216811A7BA90A2D2806425, xmp.iid:0180117407206811B5F3896E690FB99B, xmp.iid:0280117407206811B5F3896E690FB99B, xmp.iid:0380117407206811B5F3896E690FB99B, xmp.iid:0480117407206811B5F3896E690FB99B, xmp.iid:0580117407206811B5F3896E690FB99B, xmp.iid:0680117407206811B5F3896E690FB99B, xmp.iid:0780117407206811B5F3896E690FB99B, xmp.iid:0880117407206811B5F3896E690FB99B, xmp.iid:0980117407206811B5F3896E690FB99B, xmp.iid:0A80117407206811B5F3896E690FB99B, xmp.iid:01801174072068119109BD1238DC095F, xmp.iid:02801174072068119109BD1238DC095F, xmp.iid:03801174072068119109BD1238DC095F, xmp.iid:01801174072068119109EB84AF334ACA, xmp.iid:02801174072068119109EB84AF334ACA, xmp.iid:00801174072068119109CD22A623C68C, xmp.iid:94876BA4182068119109CD22A623C68C, xmp.iid:95876BA4182068119109CD22A623C68C, xmp.iid:96876BA4182068119109CD22A623C68C, xmp.iid:ED7F117407206811A31FD31AE123DE08, xmp.iid:EE7F117407206811A31FD31AE123DE08, xmp.iid:EF7F117407206811A31FD31AE123DE08, xmp.iid:03801174072068118DBBF0ECA84B28CD, xmp.iid:F07F117407206811A31FD31AE123DE08, xmp.iid:F17F117407206811A31FD31AE123DE08, xmp.iid:F27F117407206811A31FD31AE123DE08, xmp.iid:F67F117407206811A31FD31AE123DE08, xmp.iid:962FC6244D206811A31FD31AE123DE08, xmp.iid:02801174072068119109D5845EBC94BA, xmp.iid:03801174072068119109D5845EBC94BA, xmp.iid:04801174072068119109D5845EBC94BA, xmp.iid:05801174072068119109D5845EBC94BA, xmp.iid:06801174072068119109D5845EBC94BA, xmp.iid:07801174072068119109D5845EBC94BA, xmp.iid:08801174072068119109D5845EBC94BA, xmp.iid:048011740720681191099ECD3CADBB44, xmp.iid:058011740720681191099ECD3CADBB44, xmp.iid:B86914F32420681192B0DD82714E2387, xmp.iid:B96914F32420681192B0DD82714E2387, xmp.iid:BA6914F32420681192B0DD82714E2387, xmp.iid:BB6914F32420681192B0DD82714E2387, xmp.iid:BD6914F32420681192B0DD82714E2387, xmp.iid:C06914F32420681192B0DD82714E2387, xmp.iid:74117FE320071168BEDCE2D9BE7E5883, xmp.iid:74117FE420071168BEDCE2D9BE7E5883, xmp.iid:74117FE520071168BEDCE2D9BE7E5883
History When                    : 2010:04:06 14:29:46-04:00, 2010:04:06 14:29:46-04:00, 2010:04:06 14:37:57-04:00, 2010:04:06 14:37:57-04:00, 2010:04:06 15:07:05-04:00, 2010:04:06 15:07:05-04:00, 2010:04:06 15:10:58-04:00, 2010:04:06 15:10:58-04:00, 2010:04:06 15:20:22-04:00, 2010:04:06 15:20:22-04:00, 2010:04:06 15:31:41-04:00, 2010:04:06 15:31:41-04:00, 2010:04:06 15:34:22-04:00, 2010:04:06 15:34:22-04:00, 2010:04:06 15:56:18-04:00, 2010:04:06 15:56:18-04:00, 2010:04:06 15:58:55-04:00, 2010:04:06 15:58:55-04:00, 2010:04:06 16:24:11-04:00, 2010:04:06 16:24:11-04:00, 2010:04:06 17:09:45-04:00, 2010:04:06 17:09:45-04:00, 2010:04:06 17:13:29-04:00, 2010:04:06 17:13:29-04:00, 2010:04:06 17:15:58-04:00, 2010:04:06 17:15:58-04:00, 2010:04:07 09:43:50-04:00, 2010:04:07 09:43:50-04:00, 2010:04:07 09:59:33-04:00, 2010:04:07 09:59:33-04:00, 2010:04:07 10:03:18-04:00, 2010:04:07 10:03:18-04:00, 2010:04:07 10:08:26-04:00, 2010:04:07 10:08:26-04:00, 2010:04:07 10:20:42-04:00, 2010:04:07 10:20:42-04:00, 2010:04:07 10:31:07-04:00, 2010:04:07 10:31:07-04:00, 2010:04:07 11:11:54-04:00, 2010:04:07 11:11:54-04:00, 2010:04:07 11:30:15-04:00, 2010:04:07 11:30:15-04:00, 2010:04:07 11:35:47-04:00, 2010:04:07 11:35:47-04:00, 2010:04:07 11:44:35-04:00, 2010:04:07 11:44:35-04:00, 2010:04:07 11:50:27-04:00, 2010:04:07 11:50:27-04:00, 2010:04:07 11:50:44-04:00, 2010:04:07 11:50:44-04:00, 2010:04:07 11:58:44-04:00, 2010:04:07 11:58:44-04:00, 2010:04:07 12:00:14-04:00, 2010:04:07 12:00:14-04:00, 2010:04:07 12:00:39-04:00, 2010:04:07 12:00:39-04:00, 2010:04:07 12:12:03-04:00, 2010:04:07 12:12:03-04:00, 2010:04:07 12:12:22-04:00, 2010:04:07 12:12:22-04:00, 2010:04:07 12:19:54-04:00, 2010:04:07 12:19:54-04:00, 2010:04:07 12:59:04-04:00, 2010:04:07 13:24:17-04:00, 2010:04:07 13:24:17-04:00, 2010:04:07 14:27:47-04:00, 2010:04:07 14:28:04-04:00, 2010:04:07 14:28:39-04:00, 2010:04:07 14:28:59-04:00, 2010:04:07 14:32:52-04:00, 2010:04:07 14:57:39-04:00, 2010:04:07 15:01:07-04:00, 2010:04:07 15:02:54-04:00, 2010:04:07 15:33:40-04:00, 2010:04:07 16:11:30-04:00, 2010:04:07 16:23:44-04:00, 2010:04:07 16:29:21-04:00, 2010:04:07 16:38:45-04:00, 2010:04:07 16:52:02-04:00, 2010:04:07 17:01:56-04:00, 2010:04:07 17:03:45-04:00, 2010:04:07 17:05:01-04:00, 2010:04:08 09:57:14-04:00, 2010:04:08 10:30:36-04:00, 2010:04:08 10:31:58-04:00, 2010:04:08 11:11-04:00, 2010:04:08 11:21:53-04:00, 2010:04:08 11:48:20-04:00, 2010:04:08 15:21:23-04:00, 2010:04:08 15:29:40-04:00, 2010:04:08 15:31:40-04:00, 2010:04:08 15:34:41-04:00, 2010:04:08 15:37:36-04:00, 2010:04:08 15:39:36-04:00, 2010:04:08 15:40:28-04:00, 2010:04:08 16:07:19-04:00, 2010:04:08 16:08:12-04:00, 2010:04:08 16:10:03-04:00, 2010:04:08 16:11:23-04:00, 2010:04:08 16:25:52-04:00, 2010:04:08 16:38:04-04:00, 2010:04:08 16:44:23-04:00, 2010:04:08 16:46:55-04:00, 2010:04:08 16:46:55-04:00, 2010:04:08 16:48-04:00, 2010:04:08 16:48-04:00, 2010:04:08 16:48:37-04:00, 2010:04:08 16:48:37-04:00, 2010:04:08 17:06:41-04:00, 2010:04:12 10:35:30-04:00, 2010:04:12 10:37:17-04:00, 2010:04:13 11:46:36-04:00, 2010:04:13 11:46:38-04:00, 2010:04:13 11:58:06-04:00, 2010:04:13 11:58:07-04:00, 2010:04:13 12:10:15-04:00, 2010:04:13 12:10:18-04:00, 2010:04:13 12:10:37-04:00, 2010:04:13 12:10:42-04:00, 2010:04:13 12:11:17-04:00, 2010:04:13 12:14:44-04:00, 2010:04:13 12:14:44-04:00, 2010:04:13 12:26:08-04:00, 2010:04:13 12:26:08-04:00, 2010:04:13 12:48:55-04:00, 2010:04:13 12:48:55-04:00, 2010:04:13 13:42:21-04:00, 2010:04:13 13:42:21-04:00, 2010:04:13 13:45:15-04:00, 2010:04:13 13:45:15-04:00, 2010:04:13 13:48:20-04:00, 2010:04:13 13:48:20-04:00, 2010:04:13 13:55:29-04:00, 2010:04:13 13:55:29-04:00, 2010:04:13 14:25:19-04:00, 2010:04:13 14:42:25-04:00, 2010:04:13 14:45:56-04:00, 2010:04:13 16:15:23-04:00, 2010:04:13 16:15:27-04:00, 2010:04:13 16:37:34-04:00, 2010:04:14 09:10:01-04:00, 2010:04:14 09:10:02-04:00, 2010:04:14 09:24:05-04:00, 2010:04:14 09:24:07-04:00, 2010:04:14 10:04:02-04:00, 2010:04:14 10:04:03-04:00, 2010:04:14 10:14:14-04:00, 2010:04:14 10:45:43-04:00, 2010:04:14 10:45:43-04:00, 2010:04:14 11:03:19-04:00, 2010:04:14 11:03:20-04:00, 2010:04:14 11:05:04-04:00, 2010:04:14 11:05:04-04:00, 2010:04:14 11:05:43-04:00, 2010:04:14 11:13:49-04:00, 2010:04:14 11:13:49-04:00, 2010:04:14 11:15:59-04:00, 2010:04:20 09:59:58-04:00, 2010:04:20 10:13:30-04:00, 2010:04:20 10:20:12-04:00, 2010:04:20 10:29:27-04:00, 2010:04:20 10:33:50-04:00, 2010:04:20 11:08:10-04:00, 2010:04:20 11:28:46-04:00, 2010:04:20 11:30:45-04:00, 2010:04:20 11:46:21-04:00, 2010:04:20 13:15:56-04:00, 2010:04:20 13:18:09-04:00, 2010:04:20 13:49:11-04:00, 2010:04:20 13:55:08-04:00, 2010:04:21 10:15:52-04:00, 2010:04:21 10:32:04-04:00, 2010:04:21 10:54:48-04:00, 2010:04:21 11:12:38-04:00, 2010:04:21 11:15:38-04:00, 2010:04:21 14:30:26-04:00, 2010:04:21 14:30:26-04:00, 2010:04:21 14:31:22-04:00, 2010:04:21 14:38:33-04:00, 2010:04:22 08:37:59-04:00, 2010:04:22 08:41:16-04:00, 2010:04:22 08:42:24-04:00, 2010:04:22 11:56:49-04:00, 2010:04:22 14:01:02-04:00, 2010:04:22 14:02:41-04:00, 2010:04:22 14:34:03-04:00, 2010:04:22 16:53:33-04:00, 2010:04:22 16:56:50-04:00, 2010:04:22 17:44:58-04:00, 2010:04:23 08:38:01-04:00, 2010:04:23 08:38:40-04:00, 2010:04:23 08:38:40-04:00, 2010:04:23 08:43:56-04:00, 2010:04:23 09:05:45-04:00, 2010:04:23 09:12:25-04:00, 2010:04:23 09:41:06-04:00, 2010:04:23 09:43:35-04:00, 2010:04:27 13:10:07-04:00, 2010:04:27 13:10:46-04:00, 2010:04:27 13:19:19-04:00, 2010:04:27 13:32:40-04:00, 2010:04:27 14:22:30-04:00, 2010:04:27 16:56:04-04:00, 2010:04:28 06:29:56-04:00, 2010:04:28 06:29:56-04:00, 2010:04:28 06:34:29-04:00
History Software Agent          : Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0, Adobe InDesign 6.0
History Changed                 : /, /metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /, /, /metadata, /;/metadata, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /metadata, /;/metadata, /metadata, /, /metadata, /, /, /, /, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /, /metadata, /;/metadata, /, /, /, /metadata, /;/metadata, /, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /, /metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /, /metadata, /;/metadata, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /, /metadata, /;/metadata, /, /, /, /, /, /, /, /, /, /, /, /, /, /metadata, /, /, /, /, /, /, /, /, /, /, /, /, /metadata, /;/metadata, /
Manifest Link Form              : ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream
Manifest Placed X Resolution    : 300.00, 300.00, 72.00, 72.00, 72.00, 160.00, 300.00, 72.00, 72.00, 72.00, 72.00, 72.00, 300.00, 72.00, 300.00, 300.00, 300.00, 72.00, 300.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00
Manifest Placed Y Resolution    : 300.00, 300.00, 72.00, 72.00, 72.00, 160.00, 300.00, 72.00, 72.00, 72.00, 72.00, 72.00, 300.00, 72.00, 300.00, 300.00, 300.00, 72.00, 300.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00
Manifest Placed Resolution Unit : Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches
Manifest Reference Instance ID  : uuid:8D71455052A611DFB18B9F042DEC2A22, uuid:8D71455052A611DFB18B9F042DEC2A22, uuid:0407AEB252A811DFA835B1BE9E8AF3C2, uuid:CACE3DB352A611DFB18B9F042DEC2A22, uuid:0407AEB252A811DFA835B1BE9E8AF3C2, uuid:092B2ABC52A711DFB18B9F042DEC2A22, uuid:092B2AB652A711DFB18B9F042DEC2A22, xmp.iid:74117FD9200711688EF1A3973E0BB6D9, uuid:0407AEB452A811DFA835B1BE9E8AF3C2, uuid:D8E5F49D52A711DFB18B9F042DEC2A22, uuid:D8E5F49552A711DFB18B9F042DEC2A22, uuid:CACE3DB852A611DFB18B9F042DEC2A22, uuid:EE02772252A611DFB18B9F042DEC2A22, uuid:208CB188D043DF1190C8FF56A2510EA7, uuid:2D8E8E9952A711DFB18B9F042DEC2A22, uuid:2D8E8E9E52A711DFB18B9F042DEC2A22, uuid:CACE3DAE52A611DFB18B9F042DEC2A22, uuid:7019EEDE52A611DFB18B9F042DEC2A22, uuid:8D71454B52A611DFB18B9F042DEC2A22, uuid:0407AEB252A811DFA835B1BE9E8AF3C2, uuid:e25bdc0f-2216-4ab8-85e3-3f18cf56cd99, uuid:EE02771C52A611DFB18B9F042DEC2A22, uuid:ee40d5df-1486-b644-9799-06021ea860b2, uuid:13a47f55-ac07-4024-ad9e-12f6a02c37f0, uuid:0d41334b-624f-4d65-82dc-d2a5d2fa949a, uuid:3fa4af1c-f4ec-4787-a1f6-635ca8998c07, uuid:cbde7080-1f2b-a243-8275-5afd9a0cc755, uuid:1b7eff5c-7f52-4844-a49b-8bbc611652f0, uuid:3b03a74c-84fb-41de-9c42-dd701ccddeb6, uuid:36e286ed-0bad-d549-a422-b660291b9f22, uuid:730DA89452A711DFB18B9F042DEC2A22, uuid:4E579CAB52A711DFB18B9F042DEC2A22, uuid:c7c79ff0-1994-4b70-801f-50b8a641f381, uuid:747cd237-5b22-4f14-8a23-4ce9ffe1b3a3
Manifest Reference Document ID  : uuid:6F0772C0D31EDE118DE29A7DB224E045, uuid:6F0772C0D31EDE118DE29A7DB224E045, uuid:0407AEB152A811DFA835B1BE9E8AF3C2, uuid:81A5863F1C42DE119E30A6B9668E6838, uuid:0407AEB152A811DFA835B1BE9E8AF3C2, uuid:092B2ABB52A711DFB18B9F042DEC2A22, uuid:A80F516A3B49DF11BB558783371F32E2, xmp.did:74117FD9200711688EF1A3973E0BB6D9, uuid:0407AEB352A811DFA835B1BE9E8AF3C2, uuid:D8E5F49C52A711DFB18B9F042DEC2A22, uuid:D8E5F49452A711DFB18B9F042DEC2A22, xmp.did:5590A534EC2468119109C188C6AD8ED1, uuid:EE02772152A611DFB18B9F042DEC2A22, uuid:1F8CB188D043DF1190C8FF56A2510EA7, uuid:2D8E8E9852A711DFB18B9F042DEC2A22, uuid:F6B8B95B3E49DF11BB558783371F32E2, uuid:AAF8911452A611DFB18B9F042DEC2A22, uuid:7019EEDD52A611DFB18B9F042DEC2A22, xmp.did:0180117407206811A261C9F60A0B8CFD, uuid:0407AEB152A811DFA835B1BE9E8AF3C2, adobe:docid:indd:16b9643b-3780-11df-9654-d036f02e338e, uuid:F17E78C04849DF1181B380B72764A517, xmp.did:92F182472D2068119297C8D70E47D78F, uuid:7BC265572237DF119CAFD2C1F9D1A928, adobe:docid:indd:a2694f6d-3b25-11de-a2d2-c471cee24a59, xmp.did:FCD89596B13DDF11AC71F3947265EBF8, adobe:docid:indd:a67d458c-31b0-11df-8d41-af77c43ff156, adobe:docid:indd:b76ba9be-8066-11de-9b16-ea6e3db7f426, xmp.did:4F8ECEE2A427DF11AD3E9E0D7955C72D, xmp.did:1ABC23D32A2168119997DE332EAB3A04, uuid:730DA89352A711DFB18B9F042DEC2A22, uuid:4E579CAA52A711DFB18B9F042DEC2A22, adobe:docid:indd:fe4613a2-3af8-11de-b68f-b47ae2ffb493, uuid:d2ee596c-d3bd-4013-b28e-d7767fd881a0
Manifest Reference Version ID   : 1
Metadata Date                   : 2010:05:18 15:29:16-04:00
Creator Tool                    : Adobe InDesign CS4 (6.0.4)
Thumbnail Format                : JPEG
Thumbnail Width                 : 256
Thumbnail Height                : 256
Thumbnail Image                 : (Binary data 6867 bytes, use -b option to extract)
Doc Change Count                : 5460
Format                          : application/pdf
Producer                        : Adobe PDF Library 9.0
Trapped                         : False
Page Count                      : 4
EXIF Metadata provided by EXIF.tools

Navigation menu