From eeb2685f7ec9bf72b58cc77635793477a77a1625 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" Date: Mon, 5 Aug 2024 04:34:13 +0000 Subject: [PATCH] deploy: 9a1c1fe28c38c1be96c46235a2d379441a58494f --- access/access_control.html | 2 +- access/lullabot_vpn.html | 2 +- access/password_managers.html | 2 +- access/passwords.html | 2 +- access/shared_accounts.html | 2 +- access/shared_passwords.html | 2 +- access/two_factor_authentication.html | 2 +- appendix/appendix.html | 2 +- appendix/device-checklist.html | 2 +- appendix/iso-27001.html | 2 +- appendix/links.html | 2 +- communications/cloud.html | 2 +- communications/communications.html | 2 +- communications/email.html | 2 +- communications/email_groups.html | 2 +- communications/gpg.html | 2 +- communications/slack.html | 2 +- index.html | 2 +- physical/acceptable_use.html | 2 +- physical/backups.html | 2 +- physical/device.html | 2 +- physical/hard-drive-encryption.html | 2 +- physical/locking.html | 2 +- physical/lost-devices.html | 2 +- physical/malware.html | 2 +- physical/physical.html | 2 +- policy/leadership.html | 2 +- policy/signature.html | 2 +- security.pdf | Bin 2044181 -> 2044179 bytes 29 files changed, 28 insertions(+), 28 deletions(-) diff --git a/access/access_control.html b/access/access_control.html index 5248070..0bcf232 100644 --- a/access/access_control.html +++ b/access/access_control.html @@ -557,7 +557,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Access Control","level":"1.3","depth":1,"next":{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},"previous":{"title":"Leadership and Review","level":"1.2","depth":1,"path":"policy/leadership.md","ref":"policy/leadership.md","articles":[]},"articles":[{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]}],"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/access_control.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Access Control","level":"1.3","depth":1,"next":{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},"previous":{"title":"Leadership and Review","level":"1.2","depth":1,"path":"policy/leadership.md","ref":"policy/leadership.md","articles":[]},"articles":[{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]}],"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/access_control.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/access/lullabot_vpn.html b/access/lullabot_vpn.html index 0e46168..7a80690 100644 --- a/access/lullabot_vpn.html +++ b/access/lullabot_vpn.html @@ -572,7 +572,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"next":{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},"previous":{"title":"Access Control","level":"1.3","depth":1,"path":"access/access_control.md","ref":"access/access_control.md","articles":[{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/lullabot_vpn.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"next":{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},"previous":{"title":"Access Control","level":"1.3","depth":1,"path":"access/access_control.md","ref":"access/access_control.md","articles":[{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/lullabot_vpn.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/access/password_managers.html b/access/password_managers.html index 95ab4db..695ca0e 100644 --- a/access/password_managers.html +++ b/access/password_managers.html @@ -568,7 +568,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Password Managers","level":"1.3.3","depth":2,"next":{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},"previous":{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/password_managers.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Password Managers","level":"1.3.3","depth":2,"next":{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},"previous":{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/password_managers.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/access/passwords.html b/access/passwords.html index b847b3d..f2bd26e 100644 --- a/access/passwords.html +++ b/access/passwords.html @@ -568,7 +568,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"next":{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},"previous":{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/passwords.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"next":{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},"previous":{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/passwords.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/access/shared_accounts.html b/access/shared_accounts.html index c990c42..793516f 100644 --- a/access/shared_accounts.html +++ b/access/shared_accounts.html @@ -578,7 +578,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Shared Accounts","level":"1.3.6","depth":2,"next":{"title":"Physical Security","level":"1.4","depth":1,"path":"physical/physical.md","ref":"physical/physical.md","articles":[{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]}]},"previous":{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/shared_accounts.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Shared Accounts","level":"1.3.6","depth":2,"next":{"title":"Physical Security","level":"1.4","depth":1,"path":"physical/physical.md","ref":"physical/physical.md","articles":[{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]}]},"previous":{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/shared_accounts.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/access/shared_passwords.html b/access/shared_passwords.html index 4e986f1..d982b5c 100644 --- a/access/shared_passwords.html +++ b/access/shared_passwords.html @@ -594,7 +594,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Shared Passwords","level":"1.3.5","depth":2,"next":{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]},"previous":{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/shared_passwords.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Shared Passwords","level":"1.3.5","depth":2,"next":{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]},"previous":{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/shared_passwords.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/access/two_factor_authentication.html b/access/two_factor_authentication.html index 8b88316..ac5d8fa 100644 --- a/access/two_factor_authentication.html +++ b/access/two_factor_authentication.html @@ -579,7 +579,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"next":{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},"previous":{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/two_factor_authentication.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"next":{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},"previous":{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"access/two_factor_authentication.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/appendix/appendix.html b/appendix/appendix.html index 3b5bb4a..27288a1 100644 --- a/appendix/appendix.html +++ b/appendix/appendix.html @@ -557,7 +557,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Appendix","level":"1.6","depth":1,"next":{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},"previous":{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]},"articles":[{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]}],"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"appendix/appendix.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Appendix","level":"1.6","depth":1,"next":{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},"previous":{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]},"articles":[{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]}],"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"appendix/appendix.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/appendix/device-checklist.html b/appendix/device-checklist.html index 22bdb21..4aa5f07 100644 --- a/appendix/device-checklist.html +++ b/appendix/device-checklist.html @@ -614,7 +614,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Device Checklist","level":"1.6.2","depth":2,"next":{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]},"previous":{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"appendix/device-checklist.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Device Checklist","level":"1.6.2","depth":2,"next":{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]},"previous":{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"appendix/device-checklist.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/appendix/iso-27001.html b/appendix/iso-27001.html index e222b0a..2b4599f 100644 --- a/appendix/iso-27001.html +++ b/appendix/iso-27001.html @@ -1040,7 +1040,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"next":{"title":"Acknowledgement and Signature","level":"1.7","depth":1,"path":"policy/signature.md","ref":"policy/signature.md","articles":[]},"previous":{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"appendix/iso-27001.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"next":{"title":"Acknowledgement and Signature","level":"1.7","depth":1,"path":"policy/signature.md","ref":"policy/signature.md","articles":[]},"previous":{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"appendix/iso-27001.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/appendix/links.html b/appendix/links.html index f2e8a5a..5f95103 100644 --- a/appendix/links.html +++ b/appendix/links.html @@ -563,7 +563,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"next":{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},"previous":{"title":"Appendix","level":"1.6","depth":1,"path":"appendix/appendix.md","ref":"appendix/appendix.md","articles":[{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"appendix/links.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"next":{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},"previous":{"title":"Appendix","level":"1.6","depth":1,"path":"appendix/appendix.md","ref":"appendix/appendix.md","articles":[{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"appendix/links.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/communications/cloud.html b/communications/cloud.html index 42c0055..1985416 100644 --- a/communications/cloud.html +++ b/communications/cloud.html @@ -607,7 +607,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Security in the Cloud","level":"1.5.2","depth":2,"next":{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},"previous":{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/cloud.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Security in the Cloud","level":"1.5.2","depth":2,"next":{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},"previous":{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/cloud.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/communications/communications.html b/communications/communications.html index d7e2fc2..51fddcf 100644 --- a/communications/communications.html +++ b/communications/communications.html @@ -557,7 +557,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Communications","level":"1.5","depth":1,"next":{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},"previous":{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]},"articles":[{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]}],"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/communications.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Communications","level":"1.5","depth":1,"next":{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},"previous":{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]},"articles":[{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]}],"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/communications.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/communications/email.html b/communications/email.html index 5b87fd4..f3483c7 100644 --- a/communications/email.html +++ b/communications/email.html @@ -594,7 +594,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Email Security","level":"1.5.1","depth":2,"next":{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},"previous":{"title":"Communications","level":"1.5","depth":1,"path":"communications/communications.md","ref":"communications/communications.md","articles":[{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/email.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Email Security","level":"1.5.1","depth":2,"next":{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},"previous":{"title":"Communications","level":"1.5","depth":1,"path":"communications/communications.md","ref":"communications/communications.md","articles":[{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/email.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/communications/email_groups.html b/communications/email_groups.html index d043e1c..8c41c67 100644 --- a/communications/email_groups.html +++ b/communications/email_groups.html @@ -577,7 +577,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Client Email Groups","level":"1.5.3","depth":2,"next":{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},"previous":{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/email_groups.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Client Email Groups","level":"1.5.3","depth":2,"next":{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},"previous":{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/email_groups.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/communications/gpg.html b/communications/gpg.html index 4808686..5b556bb 100644 --- a/communications/gpg.html +++ b/communications/gpg.html @@ -608,7 +608,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"next":{"title":"Appendix","level":"1.6","depth":1,"path":"appendix/appendix.md","ref":"appendix/appendix.md","articles":[{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]}]},"previous":{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/gpg.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"next":{"title":"Appendix","level":"1.6","depth":1,"path":"appendix/appendix.md","ref":"appendix/appendix.md","articles":[{"title":"Security Scams and Hacks","level":"1.6.1","depth":2,"path":"appendix/links.md","ref":"appendix/links.md","articles":[]},{"title":"Device Checklist","level":"1.6.2","depth":2,"path":"appendix/device-checklist.md","ref":"appendix/device-checklist.md","articles":[]},{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]}]},"previous":{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/gpg.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/communications/slack.html b/communications/slack.html index 25d2ca5..3c6a763 100644 --- a/communications/slack.html +++ b/communications/slack.html @@ -576,7 +576,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Slack Channels","level":"1.5.4","depth":2,"next":{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]},"previous":{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/slack.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Slack Channels","level":"1.5.4","depth":2,"next":{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]},"previous":{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"communications/slack.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/index.html b/index.html index 499cb79..2bff57b 100644 --- a/index.html +++ b/index.html @@ -553,7 +553,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Lullabot Information Security Policy","level":"1.1","depth":1,"next":{"title":"Leadership and Review","level":"1.2","depth":1,"path":"policy/leadership.md","ref":"policy/leadership.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"README.md","mtime":"2024-07-29T03:07:13.583Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":".","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Lullabot Information Security Policy","level":"1.1","depth":1,"next":{"title":"Leadership and Review","level":"1.2","depth":1,"path":"policy/leadership.md","ref":"policy/leadership.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"README.md","mtime":"2024-08-05T04:32:24.539Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":".","book":{"language":""}}); }); diff --git a/physical/acceptable_use.html b/physical/acceptable_use.html index 8de162a..3ad66aa 100644 --- a/physical/acceptable_use.html +++ b/physical/acceptable_use.html @@ -586,7 +586,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"next":{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},"previous":{"title":"Physical Security","level":"1.4","depth":1,"path":"physical/physical.md","ref":"physical/physical.md","articles":[{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/acceptable_use.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"next":{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},"previous":{"title":"Physical Security","level":"1.4","depth":1,"path":"physical/physical.md","ref":"physical/physical.md","articles":[{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/acceptable_use.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/physical/backups.html b/physical/backups.html index 3dd39a5..8118e6b 100644 --- a/physical/backups.html +++ b/physical/backups.html @@ -578,7 +578,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Backups","level":"1.4.4","depth":2,"next":{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},"previous":{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/backups.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Backups","level":"1.4.4","depth":2,"next":{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},"previous":{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/backups.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/physical/device.html b/physical/device.html index aab432d..15e3fee 100644 --- a/physical/device.html +++ b/physical/device.html @@ -575,7 +575,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Device Maintenance","level":"1.4.7","depth":2,"next":{"title":"Communications","level":"1.5","depth":1,"path":"communications/communications.md","ref":"communications/communications.md","articles":[{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]}]},"previous":{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/device.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Device Maintenance","level":"1.4.7","depth":2,"next":{"title":"Communications","level":"1.5","depth":1,"path":"communications/communications.md","ref":"communications/communications.md","articles":[{"title":"Email Security","level":"1.5.1","depth":2,"path":"communications/email.md","ref":"communications/email.md","articles":[]},{"title":"Security in the Cloud","level":"1.5.2","depth":2,"path":"communications/cloud.md","ref":"communications/cloud.md","articles":[]},{"title":"Client Email Groups","level":"1.5.3","depth":2,"path":"communications/email_groups.md","ref":"communications/email_groups.md","articles":[]},{"title":"Slack Channels","level":"1.5.4","depth":2,"path":"communications/slack.md","ref":"communications/slack.md","articles":[]},{"title":"Using PGP/GPG for Secure Communications","level":"1.5.5","depth":2,"path":"communications/gpg.md","ref":"communications/gpg.md","articles":[]}]},"previous":{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/device.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/physical/hard-drive-encryption.html b/physical/hard-drive-encryption.html index 92db810..a912835 100644 --- a/physical/hard-drive-encryption.html +++ b/physical/hard-drive-encryption.html @@ -564,7 +564,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"next":{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},"previous":{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/hard-drive-encryption.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"next":{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},"previous":{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/hard-drive-encryption.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/physical/locking.html b/physical/locking.html index 8a62920..0e1097c 100644 --- a/physical/locking.html +++ b/physical/locking.html @@ -571,7 +571,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Device Lock Screens","level":"1.4.2","depth":2,"next":{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},"previous":{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/locking.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Device Lock Screens","level":"1.4.2","depth":2,"next":{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},"previous":{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/locking.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/physical/lost-devices.html b/physical/lost-devices.html index 16bf39d..226e0ad 100644 --- a/physical/lost-devices.html +++ b/physical/lost-devices.html @@ -624,7 +624,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"next":{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},"previous":{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/lost-devices.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"next":{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},"previous":{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/lost-devices.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/physical/malware.html b/physical/malware.html index 62f15b3..e105133 100644 --- a/physical/malware.html +++ b/physical/malware.html @@ -628,7 +628,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Malware and Viruses","level":"1.4.6","depth":2,"next":{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]},"previous":{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/malware.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Malware and Viruses","level":"1.4.6","depth":2,"next":{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]},"previous":{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/malware.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/physical/physical.html b/physical/physical.html index 64621c7..c2d8297 100644 --- a/physical/physical.html +++ b/physical/physical.html @@ -558,7 +558,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Physical Security","level":"1.4","depth":1,"next":{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},"previous":{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]},"articles":[{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]}],"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/physical.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Physical Security","level":"1.4","depth":1,"next":{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},"previous":{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]},"articles":[{"title":"Acceptable Use Policy","level":"1.4.1","depth":2,"path":"physical/acceptable_use.md","ref":"physical/acceptable_use.md","articles":[]},{"title":"Device Lock Screens","level":"1.4.2","depth":2,"path":"physical/locking.md","ref":"physical/locking.md","articles":[]},{"title":"Hard Drive Encryption","level":"1.4.3","depth":2,"path":"physical/hard-drive-encryption.md","ref":"physical/hard-drive-encryption.md","articles":[]},{"title":"Backups","level":"1.4.4","depth":2,"path":"physical/backups.md","ref":"physical/backups.md","articles":[]},{"title":"Lost or Stolen Devices","level":"1.4.5","depth":2,"path":"physical/lost-devices.md","ref":"physical/lost-devices.md","articles":[]},{"title":"Malware and Viruses","level":"1.4.6","depth":2,"path":"physical/malware.md","ref":"physical/malware.md","articles":[]},{"title":"Device Maintenance","level":"1.4.7","depth":2,"path":"physical/device.md","ref":"physical/device.md","articles":[]}],"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"physical/physical.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/policy/leadership.html b/policy/leadership.html index e418995..dd5495f 100644 --- a/policy/leadership.html +++ b/policy/leadership.html @@ -577,7 +577,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Leadership and Review","level":"1.2","depth":1,"next":{"title":"Access Control","level":"1.3","depth":1,"path":"access/access_control.md","ref":"access/access_control.md","articles":[{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]}]},"previous":{"title":"Lullabot Information Security Policy","level":"1.1","depth":1,"path":"README.md","ref":"README.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"policy/leadership.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Leadership and Review","level":"1.2","depth":1,"next":{"title":"Access Control","level":"1.3","depth":1,"path":"access/access_control.md","ref":"access/access_control.md","articles":[{"title":"Virtual Private Networks (VPNs)","level":"1.3.1","depth":2,"path":"access/lullabot_vpn.md","ref":"access/lullabot_vpn.md","articles":[]},{"title":"Passwords, PINs, and Passcodes","level":"1.3.2","depth":2,"path":"access/passwords.md","ref":"access/passwords.md","articles":[]},{"title":"Password Managers","level":"1.3.3","depth":2,"path":"access/password_managers.md","ref":"access/password_managers.md","articles":[]},{"title":"Two Factor Authentication","level":"1.3.4","depth":2,"path":"access/two_factor_authentication.md","ref":"access/two_factor_authentication.md","articles":[]},{"title":"Shared Passwords","level":"1.3.5","depth":2,"path":"access/shared_passwords.md","ref":"access/shared_passwords.md","articles":[]},{"title":"Shared Accounts","level":"1.3.6","depth":2,"path":"access/shared_accounts.md","ref":"access/shared_accounts.md","articles":[]}]},"previous":{"title":"Lullabot Information Security Policy","level":"1.1","depth":1,"path":"README.md","ref":"README.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"policy/leadership.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/policy/signature.html b/policy/signature.html index f45434d..7255e66 100644 --- a/policy/signature.html +++ b/policy/signature.html @@ -557,7 +557,7 @@

No results matching " var gitbook = gitbook || []; gitbook.push(function() { - gitbook.page.hasChanged({"page":{"title":"Acknowledgement and Signature","level":"1.7","depth":1,"previous":{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"policy/signature.md","mtime":"2024-07-29T03:07:13.591Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-07-29T03:07:40.695Z"},"basePath":"..","book":{"language":""}}); + gitbook.page.hasChanged({"page":{"title":"Acknowledgement and Signature","level":"1.7","depth":1,"previous":{"title":"ISO 27001 Cross-Reference","level":"1.6.3","depth":2,"path":"appendix/iso-27001.md","ref":"appendix/iso-27001.md","articles":[]},"dir":"ltr"},"config":{"plugins":["-sharing","typekit@0.0.2","collapsible-menu","todo"],"styles":{"website":"_styles/website.css"},"pluginsConfig":{"typekit":{"kitID":"ceq6qcn"},"collapsible-menu":{},"todo":{},"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56},"embedFonts":false},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"Security Policy","links":{"sidebar":{"Download":"/security.pdf","GitHub":"https://github.com/Lullabot/information-security-policy"}},"gitbook":"*"},"file":{"path":"policy/signature.md","mtime":"2024-08-05T04:32:24.547Z","type":"markdown"},"gitbook":{"version":"5.1.4","time":"2024-08-05T04:32:49.308Z"},"basePath":"..","book":{"language":""}}); }); diff --git a/security.pdf b/security.pdf index a8dc1a21b7d1a5e30f16739b6af09f000ded64dd..fe6501e2ebd1099b4c4a4ba47de9926aa94a7dfe 100644 GIT binary patch delta 38516 zcmai-2bfgl)%gE2L)~4vEV?_hfYC(CE^}w@+&kB<(d1LCU(6p1C`A)vM};V&V~L-d zggokKUL`SzU86)pbW9Wk3r!I<60o4GN-y?G@%z0~ch1?}kLQ`^*?aC=Pe129@8$Ln zre{Bxe)CUyrsJu&n@pxsw;UfYKX^~vxMocKNyi^~VKV(+!MW+FC%Q+RdhrqGO+MmM z&z$&|(CE2~PM#dutNjM24N017E{hJ$P98fy*f#JN|9$j;{tuk@vya!-%=+`kJ7V7lCm%ii^nt%=S(qL+ z^66t<``hAKOIk-B_Wn;-?Vd6@l-v2)VGFmme%|ZKlizTDydit<)4zS>(IpG|KDg{R zZ=QJjkmo-4By@ z-~Yk-_rATg_PCEH?Y!;T)*BD_W5(G&am)UzUw(G?y)%FO=@n;B>334d`RC?6;@3TM zP}gJTFTMYjF@Nv#&)KK`;DGm1$C*ui?tb999f#ImHu|lj{(Ae7ch=0gaQ11BtlU20 z%Y>Qr^rpXF`s07B-*(5U7pFZu`tKW?Zf_d$Ma$?xPi@<5n!qJ+`Xp%7^Do z`S5ag#YIQfT(R}aD>7T(IpWpr(=MJHKEruu*z{KqYklU{8-Mal?yU2sU3z}wpZfjy zffpC-^T~AsRvmK5uGeQ|`d>f6ownin2WMyM=YP3t$=8#f{lT|4JY4_VEnDwjvE>%; zh{Qds|JAzh(nH_rv*+1=?!SCk@2L-5{e9i|&(HZjyz;r#1ABhI><|4H{;ca`laf=1 zF8_Sp=l{C!ne$hkeVX^o{wHlb=Y;4#Uf%b*M?SoG^5n;Bo1a{oH0$qq<-YB2eYfbv ztDbrEm75=3y=F)DXQR@w^SADr^FZeFS=W9w^YO21E*SO4r zZYGDrqv!Vi_5Gm^MZq%@W{38kyZy2gdX^`bYsrRI51V`Mwbu*`1=&x>9G$)BjuF`# z?_?qC56N!e@69vw3ppe^?#>bUDYO5+b4187trtfc&B5zJ@$6AEM`ZtWM=$f|jnNu& z=*V!7?BI>f+2?@nzO&Ap*BY(4^-tqFlILr-Mvj^L{GZ+qHMF})@3bL-lRa_l-g8&q zbxuuZn;1U#p@%|Uvvi+UO9plJxv$NkGIybibp$d-VTIYsVKh!IG z=lZ(r&M}8%zgX97t_g)lXU|*T9CFR%>9Nt-b?Zl(*KZ7s&W_!1fA;c?z03uX@WI(* zAm+pCDhqvSW9JL~?@gU8)Gx5)ueMC@WTivDYUpKZyM+p*G*{mcN|_rXp^@f*NNA85 zzc|$0^o=(*o86I+U3|aIk)zGjF8m!gq30W-WzhJDa^Lm{P3(9xR=#oz288ZtFt4?Q_B0o@geHX2){e!@ z$1R~#OgbLwWtJ}v9b#@9#TNH-c(kl!-WwG;d4K98-uIcrX0F;2?P*RJ z5l)#mCWS_ZQ}M!Xk3N&#HchPB?ek~S>Fl%QZVxyMl4A0=MhY7nQoA)n` zbTt>;)7Z^?d{5(u+~L0neclNoJoD-D&>m*(3*p|m$!CXh6+*X%joge&LhlYR!EagS zt|{R@*+cJ$n}6J3>2wpIv44TeBX4BIet~K4<8Sk;8+etcID9+G#BO5qr`!l^-jY!N zyaqA1-9#U!qCw32H-%1Z!^zkGwv$bxVRQX|2Pb!EClcoMAI75D*Y4_`8#W_!P-Tw^ zL2=W%Dl|OziV0oU%`E;4^kGNmn&a(X+op#5nB)6(iJJklLL)lSwzVs_fcUvPWh`)>K@v4tP_ai4|qhu~vr&+4SY*+{L{b?QaJij&C(<;d`)_1Ze z%UWC4!&)7fuH2f9p^cp^KJ-PXM=xuK2ALtD@OU#m63+9~A?B43ilS#ITxTBp47UQp zrOXjwU~ff$l}xR9HXI&lz6sF_x)p`RjnHgUm}Vti*~4Ta;ZsAnLq*NMZc@_QT{-r$>)e;w|HdhcWEriRCwJFf`$wu0Zs{D#M{6EDkFSF>|!cwE5>H<(L* z9e&dsa5>AK7pL)AmxWI^M_8}FGahUmg(Vc z=GiO4D~jT3W={`KGQXP+M=(*H8M2s0L#_;u?GS~?YVM&c!;F6I{t!sEj6Jj>RbcNT=t z=s?XM_7S@FZ!bl==gwOg{z zW){Eg1`O(>8^aHRth^juvRe7`9G9_+0vOZNcnjeA$Rw-@Xkt@6&K2&zyaZJ!ilb=B?z=kW*2L4cUfAO9ola! z?6F-e-^PCC;@#ol9iZ3-f4QBz!w+}tyLj=uul;0eq`6{6<+}1p>XM$3i}p5)n;uG7t0JL2!ZEU2vs9Vi!QU!OybrNWIJMZBKpWMA*IXF;*7 z`E}&LGs?oz?iR0F6}h{g>ARUN655$xZHhcdgn_?(S<$=@m5wqiH$$kVO>E}akD@i% zSsPO3*e#I<%}w+(k1a(qj#<`X4&B-zQF83`N8t{(m7Bjka%@eHVnWX~@k>G@%B%MB zTz1j7kvHnio&&nH@r`Hn?b3poLjxXdy7lYQVxH;CYZ&ejlj+yxK{KmAj}_BCxj)Sl zWyZ>98q8*Z=CGDXQ+@+y4(QSuR~?i4bU>F*Tw&h~jmGN#_;q7lu6uo#X`SxqhV?_b z@axL28^7-SdhqMXuZCYOzdC-s`1R)3hhJZQ{rL6gH-O(B{08!?=QoJop8WR8tsm0x zk6GrCMGe;K_A^f}Xt2%;NQ#Yg8pi(d`G!H}&6j}BT)@z1+*)gZyO|RgHJlRmiy4oFiyBVvfNApj zAb0fQhU+`F5q{cgu|{+E%MIOgwaXg%jPI1mGQ%6c>tfE0Hx_dTH;-z3$6P*&$2?O# z6>sb`HaW~`>@XGdRI>5lvLbcULc!-*{N4i^-|JP>@2?!y*peN(ezZCA=*AZF-BG0_ z%s;yGB^))HC3I*q({3T@F!I>OJIdCk{lyF$(|F>4p$J-U2sIS~p+&P;$@zCT_A)Dm zhYvP~+|A?a*(|J-Z)h=3TUg$|aAuQXdF37&V>S;lkIZhgzDmJ^E`~q*+(VOTvuILr zFJ@WT>9Z}Ys0l04_W$pI53EkKzJ{B-|K7$OoopWI92$-0{&RohuWC!$rQOZnaNiS+ zx%-}odcDob+oHYAjH4R+nQxzqjx+riHpI*&3!YI9!syuB zcgKo?)XGyhUePw)&1ug^$C_=uXi&(wbT=z4``?K6G2>r|9v4oh+ep&O zFGSD4{N=ZK_>0jAkwiSNpX&>-F9yElP1b-z*Vo*=IC{F-w8d^Zgg_2j!f-RbXE<_9 zwdNKcZBi+W-%-0XI>9{HBi7q0j#_g)kK`${p^byg_e-M_!|6h_Yc5;H1WmgOo2)Zm zE@Q-zE20f%^2@YJ5)9b@ZYvLF#Cj$|(rV2wUg7bzZ+TpEBlE7ckE{N}V}7nvmorzg zFc*K@P$C#tOV~%Yrc|7)2rkuHf$N8^DFGR^*{UwTO>8se*6IMh|&Bp=@S1{x| z&y^-T;5Byh)bn(Kn`_OJ_Hj^6X>+4qw`flmBdUj9r)!T*Aa(CInCL*;D<2xnvX7T9 zVaz=DHvBs}DUwWBhi#y_od?rrb7YX|^CtTS+HXU>xrx8c_OBS=m5*6nmz5TYE=a65 zSFWVPqi-`9>{4sKSxL*A*3k0Vb3^bUqSev2gUl!PZ_6J8%{i;+bk}RN+CDYh z(|lwfU;K_Xr?2L(dEFrR>eUPsdx<6lxV7eIZ?V(;cJY{>X8BvZ{li8c4|+R#f%)0D z(Y?%zZ!>=0gRVD+yur*UhMxCFY-H?V;_INh{vWi(R0nt z_xKCi)S7$N@Z#qm!0GeW@!0ep1NhxxOHfv4X1>SUw_2mUu^KgIkN2ZznmbP@YoLg~YRv^7!b#~*SU_w;jal;{W7WS7rN?|kv!zyi@>qN0BVJ73 zTq4df>sTn(a8I*j9qms054)XV71$B$dAxIXv{!yV^LYvf3F}-9H0cct@y;?@!f`d` z@AmQ41w7{Q*SyhkT)_(d8sy)-lpNKNO^o*Vt8DVmo0xE<6~6p5du`^$&lj+Xto`e# zg$#pp+SByf5}kCr#cqC%8@4bhuk71{ zcknjPa2Idm@!YjM<_WcZTONlt935!R-X5KV$KE=X82SVLHiv#hyF8J`e$15Xmln2l zz8TYnwc!8Om=ivs-IaAb=4X4^K0fj(?ec8#(@%N)esO8G7d~Z_yL!e7Y;n+MOy^mb zwcg}D0}(qd>ntA?sxi*z^jq=@{qQGh%wO%}zdnL4Km3Bt-TXRicj0^lW7ZdRi@yyf zqhB)guosz_eO*N6Cx)v(r^fXEimq4vn~_HD201gnqW|a*>Hq4eP*2nCYfH)eG0i}8 zH4iA62@$sc-PhnH;TM8vbLlr$1GvcPR@VB-H_@{SGFxxX`<4YfyPV<2c8%4Vjo&hS zuP<0dezu9R9jJ9xM18~PpF0!5G7$*B9i zLsRrot$E2lu3c##Ei)dri!I$?Ct33?kMnjhXU!Wtl6|c)-frH`d4a||zvAr^yBWEz z7W(989sWJDI(}i+`*<+lSlmFnn%kRVlgyf}jAJLgeI`%e)WMn9lUh?B;&H59V1A#s zhGG-UqdR%Tp46DyaBQNvJVfLCoc|M!SvAXn(!B6M^L?1EAASw-rbXy=_Sf{X^O?^h zyl8y4IH9?)3y( z5@zUbsPZI1pAYkwHF^tg3f0?(TGLV+8)L4v`f<)k$Z%I}?96Zq z`)@gBuR2BqAGchIiR7Wy++7ztC7i;Y?;5K&{d$2fCvXch{;n63oYBhK^2qGkJ2t+9 z@ZV-wayR#moz$blDAI}B>`J5A_QP2B+|WU>=;@t#Ov7{cPKmwM)qHhD%qCepv-FBs zv$<$`tmsEqaukP6kBu_ZuiynotLJvGzI=M(r&q=v3q?DMa-D<|aI!lz=VW5j{nFY} zezjli<5v&Q4amh_+chjPByRr=xnM|5{*Q#~dvOU%xyiuPJ=yf5OiI4;;;tIPa~(B= z=X<(cI&kH9zLQQWSi(scV42D~{bWiv4B~3QbUg6nfayd+!`yhF+NFZ(MV}OpCjvjI z8U{gHPMnN8@#@a;cru$)xK#s;{3aGE#-0D4sy!CK)8u z#BMyL_UI-Q7c#FRGBzh({2a>ImZs4nlQ;w1hcrZ~tAmgRIc3?qVQ8I`p zoQyMw%oBwWq!r^|d-W-&kQ73PH( z%D{9yu8^G8g5jo@B&@l(UQ zj$%g3Pg38eQVFHbQYmd`n8=Y_0IVbh74b{Knv(re7+xleDj_Qwqab zjXOx5N(aiELPy1ZtVLOqRDeB^69-6*f~Axkr2;>ZK2S9D;*O#&FvV6LjOv&L&mrTI zY0zSd<2)ykc1+&|?dV(2Nv9=oy#&;iD@z29lqwG$ENSK?N$kkJ@I_JWR0!@RQ#hS) zZyVRsOVVAzeC57*9*&f3=MkGIm=qQW?s+hvYKV8LVC_vD=t=yzrkU?3gYEf=KocC@ zuO{|=PqMw2hOFk3h3yeMt+j-gP7^8}`aDWKsVD@4N~P|{XmuD5sS16s!3tI%(5Ur6m*CyKD*kz)7UcMK8ia zid=!4kizW;K`LPu*yi#TgR5W%<4jV&?@Oo{IXW9rT9Wun(KDUEf(TTn6Q0t}SR+@> zfov7~R#Z$nNi-}6OePfi(?L=RVLH%S0uNr%IEYKP5snMu=yox25Kk**iIb<85YwX! zA(RtQ3v)O+@Cfj$gEQsCs3M7l!0{c)G}v0jT)S5PC*JqCQ+AaXFt$e?Hd1uPi|1_I`3l(=5W zY?YaShG{9Jz=)RR+Ec`~3YHFp3c|R>9Sw6z+*j1YV_*XOE8P%Tkdt`r5En;4A=eAM z!0h*Od$jNqo@(xc409RHGiqC4MDRA+$d9YlqV*J)z!18fD`QHBbU=yS+t309C%A^gglMN+r=HnBQH~hVg%A56sZPUm?vFWU@DvdCc_EaS49&Jx>nEO zClbEU)HEdPRJB3|^hpIM7>ZuQWWLHFkxDNA>g8kwlS+b}v?o}T$;h61=C$RphQe|{ zPFKuH2&g1ILG&%z0OKWdH5g`=C&xpj7xz_Rjf9g>q)a%L7j z0Fit#2RvgF*%Coy&=i?m2d)-7fd!>sj#|U7m+kPUG%TrAFGnDH5~N=3Bw<4TX&Nvx ziN2R}!HlXoButna-$bQI@qpe+NpR@GY2#|!T&>zw?zH2kFt%pDm9UdkBd*6$q+Fn< zk`j*VrIq7_!&k~NmW9vt$!p2+2-J#twZcv|oh@0%rn42ce3jgFT+-PJP3gGuWNes zNb;F7vd8--`z|LTFp+}cae^%Q*h;X!+T5Rcp>dT3V+8vsp$g~wPrAS1h7lD?#fRuuA_5zz2 z5h#Rbm6k-N1j8eyh`rJU!~)8BMPtiz9{L6)5=o>Ja=rWIk}bdHBD-ihm@8eol>p}8bdQT6+u#1h)1lpJe$bi^5CR_!uwm7HS+2gdsx?D0V2X#~|2n@_ui#RZK$_h+OV&_1` zi;VztQW-%>fJ%V@QwIaU@R;Rd@I3^#5Rj44lI@WDV&C%l8VxzRFgJdv^*yf?$8j+Q zsW7WQgoR{^mUn(2H;YA*rjWQWka9|75SK0;Fv3N#2Vh0drouurB+sN8k~mecw9G)F z%+x6wu#|M45GLUqS{5RsCk;3-m7z>v`lT5IruZJ1C#?xEUn(YGX*VNxmp}_iw&L(X zYB1_SRAdf}q=~>*f}mBXV%n7>pK??Hkm6U_nR8_gQ%5ZLt^_39tI+-cuL2pBBodrP zN>;}ymi{IDK!J!@5?`0ARss+ZrC*8`%jN-~C)FM>Us2i?6G@~2Q$$EnJS((5A$?Mq zpi+zC}ElF}UaNDqj<9PX&T7zPC+W)^NcopFn0Lk=4yOTeCrKPhLB z@d9jIKFul_UD%kwtvHAI<;JGL!^>WL(TS&tDv$w2xrBLqBTS?4PkpJ{9wtV%qZCIm z7bW4+=SO~&0}8Ah)mNAXL6cDlX=*Kf)GaF7k#~?j1%1`Q05C+NiX<=%`2>YDn>&yU zg6FF+!;z76kx3&^&|EbMb6`@XHSy>y%YbbTLI#<@II~d$s={-tMU?WR`bhfvw8OD4 zjyJT#CLT#GwL*-qXTI2+FE5ue#Oa%iEJ;8UgPJ3@*rHN}fvaGwi~5j(?iQ$~yW zBPB{!lH?pd>{8fS8{@{l6!((AQ}%@Vqp~cOu!0hnj&8yyTPL*<`n%d$w8jm$NBKRr z{z#xXiDInoY%7qdR1lbt+pKkASb3CqZ<8AhKBNt z({`3OBrJ^lmKsnVvC|F>sxV`@LG~qSk*dz&&>1Bkm@ht7UXp!9Fe}GE#?>b6>P0&e zo{A-?co8PS!Pt@wEA%xpKWQ48Q3GN7BrA}c7dFVAB0@Z|2(okv2?ST7(2KrQQx%a_ zl1}7?t0;0YXnm1(vhA?NVq#zlBUCgB|I+rAaa{%==aq6N#C1xV$i9h~$o4J!4@E_2 zVPrn!0&PgCVCc;KG*I{j42Y}ln(?0z*C_-gWGyGnDKJc#$7wF|a`u%>s{rG;Of8pk zcFEzS^~H$_eNz-*$Q@A6Qk0@L#KoDGT!k7c>F5gXI2=-oLFZSSd?qGws3wN3s>Rn5 zms2j)FkP+&uS`rdqL_fgLWKoN+f+L$Ce<8dw!J+hYDlC|iTDMCRGU<364p*mByOIj zxj31`o}ld|FWBl@se&jLSH!j1LAeE@c*XDJqe^+s3L&|JAadWJ!qlRH$>_qilL>nZgVlr$1t^Od zY{PPTvb1Ah(xIoFqqqf_EJn8NxQkH4OjFS)1C$p9Z9{X-S4{)D*x=pt{hIW>G@ofW zqa>4+wIxX_neku4U4j`=h@Nn0nZ@O-T@Z@AK#4;t!{Vk2&P18Y#5Ln_XQ!m?0JLQ5mM!p z%{IiYiAl&Xh%5;0xCbpcox4X$oso_ccFFc_la9~i@4Z_fX8>|yRIA)^lCw~$Gm{`e z?GBZx#-m(FE}9!U?W~X^+>-h!(T=cLp&x%+F5koyUKxE+>XiWt!q^X82_-5?CvKoSRiT;!|5@L6jB2ql< zoy0b1&0_%%R-}k1yA}}?^IM>-lCUs&6=oniI;N7e9GMs zVygi;43zZr$T~}&A$g-1m?|U1z_!M|(6^kSV|Si%TY;&F7#Mdc<)SIhP#Yn1RwN-s zSJjvD0b94A6bK1er5DJUD!t%yxF#_}GER9?96l)v$fbfnd{MjP9%#AT=D<#GRr=1$>>m8DGnuY);KzpJLZH{F1`X>Hnc=M2emPaatvFrBRN0 zK$7`tViiC$9`04KUD^Lb;1#!8p_MeYB|4?fWiokumP1aA`=_vlhzXKpa4R%ta-mI` zSzETFc1LDhp&IsA*rFalVGC{RN&k-%DP@RYYZ*s#=Qyn_8*Hr^j_^xi%R1mCY?b^! z?h`1t2~JYZBj{40Fso7GnYLV0nxyDs66c5`CMQh=iFPbNzNiU=3DwsIEDVv5lLWHZ z#fV}cchYK|Zza|MuC$~#wl zm98LQQ-Mi9N=47X34zpb_JmOF&R)upyx?*_N5OQqiBoH(E2y?C9J;Xo3i|P@^(4O1 za9C8$aNJT>*y4(o!WI<^ZF!6NK|kMQk;;PHaw$hsSs;}SdJ%A##axf+k$MjqD2|D)_i>G^=84%HcdUSSIjteA^z zvBDMyJyj&J{vW3@n&CLFP`tnyOGR@P0$0L=k}Fl&F>aH>7T+yUaF(zP(@4dB8k$IHT`QMRI-U*^7T z+zU#`Wu-383Rhvc9@J;B{I(~rY!SKGDqppf5d^-2QV8~wDkTk5Qj5UwZ`62YhqJ7S zY{j$GI=~1!WoMhylQ3I8t6&M~DB#G*&$^A_EP*O1Nl4PviZW!RrB%WUQk4_HY?bes z{RXQuM_#FV17HMq<{vZ{HU9RL10IvxB2%DNizgv@3*SQNLtvUdob?p@wxIUJ4`D*b3-O2H;^?i3T^v?&?1b#>K~P-2QLQ!u`~FvMO5t2pMi7FC8Az(^CT z&gRoWg9jYM{W-Pqe6~RjE1W@!@{_(fY)?Cc{7!^@B};zuFzKb+A#P!a3@TVLoUPJP zi^lVkFpk_yyioMT=-7@{w5PVJFSi?jwT&!oZIDdL08>7*g(+J?>PBWGXvbA&H8D5O zDzJQHNkhJ(Q~^Q&kVg2VbO2?XdMA8xLiLrG&h2>W^dA_Jjh;l-V$<1rRB{r^72E8j zuxMOswGl3MsX3^~$Zw=gWXUAhSv86LCWc*%{1A|ZaWbs>QiZQ!Rm#jpmUcK95m=a3 zW*9U*i8}bBud4d6Fs;mjU_e=$l{q*tPc$N1oDIpv6J{v=Wh+r66+>u15;v5RwXaSRr&*<5@RkiD=`M9#Mpi&LlJ?JQbh#P zZf)>W&>z&KC@}`6d=l=YC@}`6#2EKoi7_xG#x^n+P6_B&7kz=*B4Np5#9nQ7lGh(p zJ1a4U5tSGND~NGh{Xy-t5@TRWjDcw~aY!vKul-7gw9tI@qRP?D>krC&wG67yAy_PE z&kUGmF7}}&#tcapf>P&bEv*LdL?C4JRGPiCk9C%n#qHa zNNPWn;zGqJ0ftXBj1m|*Kjjf>6o?|$L zt#%>@3MUIfRV9%+OUhvkS1#mY_$GovHU7Ke<8~Z%j%8HH7xb%hx}kx{V?Mf>tdg|D-M28jjSX+?KR(bdG16sW#@>8n8EO0L-6 zb=G2{tJ|pKX~(Z1nV=>i6|NS8uTzBu`>6qHBUG{yDQPPvd3BGFRCmtzrI<=!#(u@E zY7*NH!>ZePt}H31A%!e*K2MGOF>^HD`2a~+j6F5E<{@% zOamiNEf26BucfYP8zV<|sb^ z6QL5V8JJKxzLX@XR6TWFDk7tROIbj2w928u4rv%DM15QPUvY};WmdHll7Lcl?D3zX zG51jwjj2h}?b^DZg<1hVnyr%~T)|R4B-KJnJ90Hu88Pltmo!}2p}}}61?R#4Do#M$ zl@-G!Q9db-nX;7j5~#!$_gR%PH7~s66>CDcbQ7I4O!aW(w7m1}RiiA*?X%yC-Nz(U#CjCe$CrVlg-v@If@zrji@N&X){AXpfWSu_f_5iC!xyYBR0*;Ks8lKT}qvXRZx+m z{ceidPdhn2ZkWltZv&l#xf0BJv!W#NjV;#rh~@0*iGaEKxi#EHIA2=*S6yU0R&kfO)}ZVwhop*gsRvLllr7kn;>PDhmBAndD#Co+B@+8eAy7Z77lW&% zcH--B3x7hflTE%V0#f89FK%)4uM-iRtt*zGuS(^R%T)m;pTSmY)?N`RVXN#e*}HGj zvT(Yoc-Ee>sdm_FNq6FBy=c}_nz-l%W$@h8WdLBZ1cE!sBoJkIgqc(76P>DjcJ`}W zDC7(e)(UnT&Lm5#JP*DkrD8SyFGJzU@VPpuRE-%6lNXVI!ER+fD!5A)h)S#y6JTVy zs>RO2+FlH?rD&G*OBG%U$oZ%Ilie@oEC;BFL$E65!$K$j>LW-T7G8R!rJ=mwFMN~D~~BN zJwAA^!;?n_M;>Vpp0RE?#X)eyPbeNZ!c82Rh#!9Bj}JTe!2hd-Srs4b^>AzU-S^1j He^T?mb|VNr delta 38776 zcma)_2bfgl_3*!$T~=6@Cen6iR!C7P3v*{~nfs4|yQY!o^;%tShhKJ{O-Bm{pk2B`oH%2DW`eo-ZAxv zC;TrDd2iwJT^g?Z^0kW|IcUY;=l*ibUw?Gin}1z3zt`~aov(iK?c|4V+3@6Z9gn|a z($1sL?sv}#-A3HB;OOh--0;x$O&`X8wQbArtH0U4zTu*|f9-kI^Y`uk(|%J=oqG9z zBW|yKU_tu8-#t*h?|;W!>D+Nw_J~_%9q{$JUp|sM;?aBh{^PnO`(79P>H3y_7Y#b$ zz4_zQ^M8Bk74shJH*-$&RkzH1b>i&C$Np32F1zsLf8G38!#&p@{j0TOPhYr4O>E%7 z_k239;l#DSIOgX2pMK{4*|V;??y9RAVn<$f$ERa%TYqq}=aWxgdHJ&wt{Z9QU%t!J z(>5kfxoPs`^%wv2@>ibdIAXVtv+qrvko(=rGRrjB|diae${_XTL?)~M`zaL!v#^6)T zX^&k!@~K~J=@}e<>*i}_Ke^Xu*N$#Fcb};r-Scwnch65ab-|de!`D5x;)z!#Z8>w3 zchCu^O=vYo|)HKhyxw?5zdtpO zS-I%sXKw80q`GW7aqZTR-#YQ^HQo06Zb;(#C+CmfbNF7DZ2Ir?j}N-w$SvJ|zU=Io zudE;b(19zuFFE-6*xNb$K9{z-ahle1BXrc>~G_)oO#usuQ>1V@kh-*Zs^cIo;UqUf6%!P z?0mqWa~Hq<#%^D(oG{_4zr6YFs%}@`HDb%+U$43EsdwHuXX3ZxUL4c&%Q5qpEqrw4 zn1{al{Km$Y_q*ueZW{;e^_Q!ohcP|R-r4&ud)atr#k9{hP8>G*vaoi-S>q?4bM}Oj z&b0rU_2LO{b}UJ_aUP5fDtnw}VgqM&J$0|TSf=^YQ6rnDo;$et&~y8k7uUqx=DPC+ z8)t3o(B{j}8`Pd!444w{ZRV|wxwGodzc<#dZun+;pJZM)W^KCQr=2<$6wt(a#0Sd_ zO~3rIUd>x??_!>+igh+eRk4>dZyOwUQjr!mueoh-%s2A~#gpc!9@S0FN8diU`L^5Y z%#bPZ&e2|)UjVYfcY-u)-k(;)+M&X%hwr?xcE?A$_x^Z?SURHdmVewE%am>Zy_tjC znb(x4d*(wA#Om9#JdR`L_f7tA*3TcQ?YQG@JpFjATP$s+SHsnAOPZR8ENvyy)k}sn z|71xQ^XHcmo%3Y+Zb=hln?3|8M?|_{X}jAj5vjv}R_v8VZf}0W%t(>S)OWB zB==aJ>tfQ|*~xUuO@0u_e+v~ z^Resy5_8MAJaR)*^LOjJn12k3_sAb$!G{0g07q?H*)Es&*)-$(_I>b|pVpa2s$zYt z)ShGpR>$g^mz_JpY^#bjLHDA}nscgSO{P;#tW0Xnht;urW2w>^%v&8m3adaW%BuNg zP3-%R(ehqRY)6a;t-So8<(rPN6Tjy~EpvLtZmTylQ?V}Qt%30oX2wwVG-@a(yz%Y^ z*VGS-4T-xcd$N({W**G*LqRR5;!fu6VX!bikqJrE#&raW}{x^WgE2VcR&! zP|&96phL}k`$KYUo}YW0Z~`-bG@i%fW;E<$W=&}S$d|3cdOf)`=C|y9a_qDARV?kB zo01sX-yGi1(cCyJUehx1lvqpAHf2nYZ>prZZTZ9G*jqi#3)dj4+eVErk6z8T=Kh{- zVSe{EgRhAVsSw>6*YNwOYdBuhlz44qa83R1fxUAzW30(FH`~YHT2StM3ASQ(J=6JG z=5b2~#awZ1`{ylMl$P#)K$6?Bk1et5W8>OATnouUpzlg#b!v&j-yE?yhE*F3%k*qyb> zTJ!G4xM$9IAGPy}w(+D2NjiRA`v)pX(g*8yWD^PTPnwVzFneQcLD3{;vTZo0K`jG6 zkF6?MdDr|b79V12V)5uSu2~w3H(|z0wtnAuys3Hqd54;R$3YxZ74MSQl5|zP$>d`3 z66aj=poLA011p*QA6Ccz2b2GBb-aB=nO+kgz2jpIY#Gxdes*7z9n9KTzn#tIf$^8k z!}jspyBkKB&V$+6yg_Wfp!Tiuc!mAp#ev`|uYv9iP^Y zHXB%VSj&Y?@zw3>`)`KDouWZ+lRE=jYKF(x2gHia^NC~e!qukJdGX`Su2Wb&F~7c> zxnWXO$~<}=tQd8EysP=>y!h#6^SSnz&l3BfXVqr%`SDlH+zaB}%v~K~UCp=);$zIa z=Ydl2QXR}&7sQV@2VKCV81L?8)P+0_yNJi@Rx!)63*%!=cp=m8c~N|gF;n;#KJiR* zQ*E-hd1y*}MJ%wUu(z3ZF_^!?wY}$?W|Ue13BdRESK|<4=L|;#^RKX-dxl@AprDcgCFf znQ|viZn8v-INz|B+=EBB{pJWp!&WoR9&U}jDQT(@j zUi&m7?jY=+60dGKWq$nNc)KCAhZ*16kjVSY4;REo^(@jWXu}8$Y`Oo9_+H)3l8td| z(MA|&LwqO_cc^)AL;OB7=~dh{VX0^Syb%)Y{2h;&v9acf4-kaLMR}j-nm>NPuP1CM z6D;3!-1NU_`>mVM_V!N`$mX-+V`5inbrpxwHthFRn^d9ii#O-BSmeQ)T!z>KQP0G zR&^@@6ViLk5Qaqpd0P`mr3ky#I`tR|(qT;?71X;m z2>rv*svQ~L!&>?dt7_j^b#tm#muzm^=lbQIRl9oT&~vKlineJCbYFcQ!D#mEs-fni zNo=cNa3jN%GLP^>%rP&W57MB??0wbQASD;&GdGYXS1mWACo^Ycntpvw)tGq3&ui7& z=Tx24o_%pHijQo$>)fhX`)cC*X42*HD86j9Ei2Ej+Vg~>bop&^@8UPAruCS*sVW~| z{(588eI~Jy?OiewzjE{koF*s+)UJ6Mfa&@HzY|NYE6YKTZg1n($G4EAciO?mNo5Na zh?doxtM({yrtLkS^-a~wz0I9FSJ#=tx>uh`>|rZ_rn*P&;&u{`&IQuVroj`hVUX z_p+2R5@zH1^JN-{O3(*nkHpI;x*s)xCh$G9I@r;s$?*xyzxsPAg7UxnQ~{h9i)=EJ8!eQPe6 z{Rhv~9~}>eoNejVW_6!I(+-~Oeh4sgp?eke53qWZDS6~ib1njnXz#_ji zZ&Cg6?TJ>wM_0ETzPSF<_T?+c=H-jTYbSH#50f=59hcU3Kk<7ME3Xfkf2JDR6`GQ{9pN-Q&~DuHZMtE2DLH9=?)8P%b7Au08wsyDs zsD_^&Y>u4K(8bn)c8+3_XYOtoTFlFjH9y@LZ_EcFv#0UHg?F>v$mS25&hD4mp&|&m ze>!-lPXjN?kA5(tp(&nCTcNwq95)^OD3Y^Dx9NLN!{A2j>h- z?7l*5vEtr_ah(fAy0#8`^^8XvT4p?w@VlD+FDAMYUGy+t%}pF{rhJg--F)Ndoy??p ziDTm#ifJQJk4^Iu$6-DT5ywtu!u-T>W{+nQc*_yk`>CX5=%8QRapB5?!rG zbj~XtKOAeaZvu-HFS{@?ChkNfk$ePZ9$m=1M{EY6pmsH8=pr`K^=)8e2DLUCt~P&N zlsM7s^ADYx@0fliNggqP+4v&!pob?}; z{QLVnMn$0y{==__cSyD_%44lL>$$|}c$m#Qu~pB3@S9iJMr3hDFJs+h-!MEn^~*fQ z(|a7BFzgdLGx< z$Hg7k=9rD~PUg7fmelrF);psr9T3O9l;~xSdK0vUh55tPnx$_h#!dYqQEv`f0sQUP zfFr4$&C@Gb>u=i_9<4QeCELBIj>)67{-ZN218daV z)Vym2H#GY!W5G*#FjHP(1Y%HYw!X`VO$ zp79<(o%~f{sSWQj&qrVK*tDK`#;(bWQ?%g9HHooR=@ha0a#sA+S}^NA=S(l!fBm@= zi!HkVZXNP|VuEoNF!#duA=qKhK`_Lk&g{F6rIyVr(C?{r4EwG#!=T?8X6ExO8i~at z>!HyxU-KA=#o!G*Hm%?>I@(`0Fs$RttlPLTF%Bj|ju{QT%^e$A?5z(Ai}m?{L%L*s zo7wBlA6VX?K+p=3p=~Uu!=5kOkhH zYqxKCHSr@Jzp7*V(cwP)$Z~^9bQNqmc{7VUVSc^UoB72L^Xnb^G3(t>o9t^|{TNnK ztnL8*5uZSryS6ZOavciz>?cgUd^Os7z^D8$1bbwolg?)Tr|fU$PFC%#wC}lv$3Y$Q z6zptfZvlDV8Y%$8KFcd$#Ha^91MA?eg+o2?86$^&o)|^d_0vsNeaxMov)X+x6wcM} z3ud`{B}+!NMSlKY9ye^_@ysfwe*V9#^qVfMH0Kkxe$X~1 zbbJ%5OZG9(Y-8u?yx@=6j`U<)KU(VF+u6^XOW6;mzSg+kLO)_I;-6k-CJ$!U^@Zj3 z_>RZ(pXD)!EW5fr*saOrSW~??(eKvVlH<(0`FSdKHoL@lJUyPY{}{HAnd$ls3?*Ja!*sW%FQVgs&Ph}>G|o0S{O8Wh!QwFO zLi4aaXS7grU2^=b+mf~Nm|xY%it{=1v%Ox)k3Y+8NW8YXQ>dx4*_`sI# zEyzLZd8h6hH@+Uv#swsTeQB(MVuko^>FXs!K ztfye@-T33dPD<`H<76^=K;Zdi zw-(r|4w24y>JaIyAIg1X(yp2|lTj4SWL!6+#s*%iSe4kD$poRIR3=QTh24~|&gf$8 zR7Y;H7Y8_Ir0+}!y6o3Von@VRTOWaf@BV`7TxSqNB@y6W;%Jtn; z=*sn7$MsU?JWpMVX&u^ zT`!%&dJ3SQ;)?RJxs5%0DT(rtQFD`J_KR~H zdkvH_ulrpWpPhKd;`chZmv+sLK8GPSYu@|5=77q0y0sdYt9AF9* zER)iF4g#*%<~R22?Mn^xvjl%;^L)&>qDfZU1s|DCnc+`k##LzPBZ_i60R~nwFG#s+ z+W|r=`4kX=>iNQSexGG#JaFKtphMs|Dg(eqDklvI(^A0$Cs4rwfn=-yXmuafj0b*7 zSwYY$5iK4Wg<2#a9g>?4JiX~4P$n(F!Kr{c2tvI`R-3ONixZFwXSFTGVX9a+$TDGm zY}caQ4?>4B_F2y$LW*6Xn^tRuq34=87G3_7#XL%yU}sXU>ADcBB4_6y${vz`DSl?t zo=WJlX+&92A)5|ewMIHDWQ`@Of`d|?BAZDo@@GS`D7i?e4FfN2C?1nD*G6wLM4Pa8RhceoLGc4&=R!@hGMdOvu?YsHB9E_X%E5 z=E#IXfPnd$BzU~mu|**OF)I}aSSVeTlk&)BbwZTFJiiRlP*e^Hp9SU9=&syvny^Yvo3^hy%CYcLibk5+gA$FjgS%IQRlI_S z^kfKYvv(!W>5Q*zb(*xIax;iVI)f{g3*%rk%#n`Wim6@%W2ML9#?%@l!h1@fhj~#j z=%rvTH@7oi&{3O{CJa#MKH<0d7Ib9`&?;HICVq6YQYF)nPBEOJis6(w6dy@lT2EE7 z1?j9O(<(AnUui}`YLc>&0$w&ui^8vyA@EX*5TQvO%%ow8ph5=T>9IjZvW@_y6#j}-cf=gbu5crj3CPOVn@|dtw z*n0+tR0brq!cbNc9hYQKQkCkrSOb}%cI`^CQY=$!a=Fx!3%ewE3YJc($j2p~(s-~& z$_&0yFM`^ulMob0YPm?dBsDN)J~1yvvtX`&6`7GLLzSh7QIHw#UcAt}{%RW`itDNv zn=A$oY<7FCarYyoX`!YklRw8LK+|}nor2Ruf#%`Y8h6Rb`vc0iypb=lDPzl!j54+? zIWSfgb%AA7fJ7C$HJ&NeL>xB@&&0xn{%V6%gk=s*MFis{$8ue#VW?I)9vQ0Rkr!0} zBN+9aa>NLhRU1UH6cwl{Dth~ly4ZAlxW)OYwv?`%0czjvI~1i9URK!%JeX2npKBwj zF@CyuuWbJQM&p2-GRr3t4^?jLlccB#LoP>zPz5%SkTBe80xnY!bF){!$P-*LJSyJtqdqQ=(Y@p%@xTF$)QVL}_ zxPUK&XZ>>pQyzpmm!PC6?+D08bizQ6QmFkGrJuUGEG9bK_sN(t2auph@F|N=mQ+AG zl*hv(sX_tfSmm5qvQ9}s5^k;tdRAJjEQwyqoc0!ar1nG}EDaZ>P0IKGw&-fRM0#q9 z42iR;eH*P-P8oBoLg6gJKsDy=#@)xO>4{6#^n_LFlo;kpiBFLss{4Lmbc($6c4N<6 zA&W0^GV7Q62ny0dhOCl!3JS`Khm=L6K}JfIU8HTIRm97jD2lGMA9YiaD4H z*DBIT+Hz~9U{FB|aqv=DZ3U?k(c;mbAQ#4QNiP~w5zCmG)$l^nVqT)ziXF2aq~{NW+#q0vF8rf}y7O`t!z{Np;Iet!X5}-0!w)!OX1DMx(L0N1w z0mjX5`RVM!*byPRz(_*#c*WZ_fb^1?tJY`>&reF?xXvN@Gq0~fgk*u1-|&B8ANU~Y z{HT_3JtOhpkq}|B1ad`%SBPawA_OAcG78aGl&2gc>yH>Sb%zGblK~T{EDSDR!-`Ov zgh?1dV5&ZuPE#3@r?XLe#e{Y~`ay&(07i~izHo$>^<**vBIR_6NIhASn(GLuncQho zFi~UOg6S-{O7N&+_?#T<*F!e(nlWF!yFFGj-y3SxpgmZ_mF`tya3 zEgv-gco5ZaxdYvP!T{cb`Sjz)UCb{xkrZe?amg>|p|B%EHLgos<)o-aDb+!9lwsh; zsnw^HIWs7uB$#d^C7BfOl(NtqAp=_sG14Fi!mA3E!J&0#Hq4O@3Eh*I*BLGXDhJyR zV=s`tf==XOYfC}6=tNfcOH`5EP_|eEcwi|E0fifxK>|}%G*T`4mnu(8rlqI~?WvdN z@rt?)kdkl3V23N0VmYVvB(~cCV_k{o(SR?CD&W}^x)Kl7CW@#VFglhh z_1MB>12t7VI3UO3h~#{M2Wcv0fl$ZBx0O{IfLvyY(*<5eHgpNZx+fvAm8^iI)Q?Z!|5Ud;`M5 zxY({73`}0AgXhUhISZq*DaX>T6;xJfK!l@?+48Z9itJCsHgXPhTpiNxO5jn_R3d@v z7jA*>#B5loH<;T#Q6*;(XgaDi66WC*7)`{3}*ye+C<-u^5r zD8R6Xij>HVA{(y~C~8pPk%CD#VIjFH7U9Ad_I~KJDW$WxNa^aAgsyX>{a&dJ?TRKwcAq`Qp zK^Lv7xDx9F1v<@`$_CSqqnJw}P#radJ(aYJ+*P4!Ut%Pgy(ny3L@t2jW>iCz#gi{S zSQys7a;z<>6mHU6`D2UhctD{%_WeoG_2N({m(_R+Q=0}RlM9O{tML}bDZ_B8#!YTRXzbfwe+ zWd($JGDH++%vXq;kWPLgpqESVI+g{NX1%0tR)W4+~78RF)sGAJ;*(1Z~KCc6tQo^n{gWG&p{aqB5Jjlg7;xKYlQ zq$Yrn9uWVM7D+FjiK>WDPE4ZgMgotZu0X*;v<6TX-fVPAP$+gy9w)sQ^-lS=1Y^k_ z3yTy)np;lk8gd}EabluGwJ@)os?(7%Xcz(_Hf=kUq)>Co$<-&>68|e|aR$MZeCKLh z+>zR*Mp-?vFxvIx!gT*>SXn7P7rpUr2b2A%!Sa40>ZTNTMZgG_)#>c(sB%76Rso%C zj@u)>L-JcGtu(GG@{?98@)J3V3lug;^-obDbS+CF`j^O$Ym|J?gk*-|Bpgn3iEz86 z-s-k6`2wVcmA^upvmYF=K-ujL%#~jiurPu>xfxcL)WTqj?A?y_MY#xAjzm*hJ;o}2 zlF}%C^8Rh1SG7n%dND-VnMHW7QEG(Cs|MEeTl$v`&MKoqcqlwH6XGW&KgqAeO@PIt zSxHih`cs*P+4Zr?lp*8}Ih;BjenW<7jLm91RFI#LP1v91zSOtBn-G% zlad}#T$VCJu}*owfM!JTEft5HM>g>T^JLR6us~j1SQrg#g2zM)l_%!F1hxeMF2#Sm zOkWIw3jqTuxVSJQSfhJho|xNJC2(0xwG>wDyr`NG|6!PA-Utkd6DPr(sn~#2QrrjG z`N;j`Sju&3)7&JcWc-Kq5hZ&jBvF>aWwU2JAvJrougdRBp^}RG7}n zTHt8kkrp$@+xE%?^Dcns0OTaJtWX$@qv+@~q&=QdlhgoGaXi0EJRfV|PB z1TN&g@FKZd7okZ-c{^IQl&v6(Qx?PaefvQf3vciZMA)QLspmnrO<9XcrCf+BL|mi|TZ!**q>spJ%m zMM2+fB}Y+L-I09aZ45mm*ZN%~&R-%wakXBAODwe+45@<2j!zE4HHaE( zyA{gDvc5%>A04nT`SmXgqoz_eI6syUM8W6=RWRAo!hC)zCtfwNKwhJhgXw8e6RI~Z z?AT&YONpw)VdW=|HqG@(UKYyYKRWP~o#)+nar@39#BhrIgoH}CxKmfuviCvdhqLh? zy;)k|&>STT+_xxFbFHYTMcAaM#TN_IeB1|!?lm?;w4oP~U1=6i2No3Nm7PZ{Re&1W zig}(2rTC8mxHcB_kXDe(QVT9AeiHVp6H_-(>d6i(sgud zwWs;I+pfK2Zc6Ato+l2#7cON^K{TOE1TcJq8cTGeVFfKO+9t}E+$%{$B6~HVt$9g2 z6hTs*Qke`L$Qk8F-9~Y{KpVbfEz+pCL+C606uv_BRRFU+zhisss;(vZNp&LtqabJ= z1zmLfvon%rMLU8TwOe8fMLLR<8c!9ciQ;JL%#*W>7nB7Rjcu2Oq&xLFwLuzi70MZ)&hA!Gf2O zc>^%&=W49#X916Qq+9WdegdG(??6#^gtdhwV@TFeiWLif z0&dF8hJ~TET155+BQrDw7Wmnk$^nyKFtB)38N_@!nz>{&3nDGL0@1#CtrnqDt5l4O zT)7A>D>6eS8H>s}Hcu=gjp{CD*VGgAB7Ct&ZIGIsf>HF>u(A|BUngJ@io^=hm-zsA zFjV0|8V%E4i6~mFL7hfhJz^cTi0yimi!h&J3GaicMJOF8YT109`7HelDHZLs@;e%k zpa1JcxS~>`FM)b zcVK1u9$gC)k{4d>DAfrpQ0aU0{b;p8b)Cmp`AI*hN|9Y3L}c952|$!D=R`22@1zJy z-+?K8=YmA(yS+3i=X=CqYpcjieycRjk!heP4n2&&B2I9jcN#wIktvlTq zOaLwyrVUaCqqJzqx-nzRzRg^S|LEJ$rj-i~K`sVUpHmA{cayL-5);}Vl!oQ#=WJsz zFW9LGv4t9@q9Oazg_0TW<<&v*?@CAXFL^+k&}67>zptnVx8Y29RYy^VTtHEVEAtYI zTjM|87|UKJN*{%Z+>KAGe3Sw$A zwCPJK*e_>UN?ZCD$#1npo(?T(V=$NSV$v69eo<{je!Bfs4bc9#Y$T7laFJKLT*9;p zHRmsppLQuV*uDuPNsV2Qs%YO!RV<+dsQ6AsU%m$Ga|-fzMFmoDHCVkG##r^;J_}R# zgTVL@fILVxEx&TWVBS7Zn}MC>yN)((%hPf~G@?wn^0LJ(nDhq}QCneU@gH|!D$l2R zLPc~8UzrV1#z zMO4<2mZdT;mUm8kHb_}G>pa!r(6NFx72`kDU3oDoeexQYi&NF@01TZFC+1~ZWz4XH zQZREA`iPh1VEffG1=BTnUY}Iz$+fjoPg;jm7)HeyUt;}FnF;2)SCN{#GDT{d`9#Z}Bo{VWeyD)LKYe5}4&Vz#DzoN4EudU9eG=N~ z&^4-@4z)-X8`zf&rD^5WW2F&%m!WX?Qgn9IENxC1(Z3AHWxeEkzED`nCOW93k)m@; zIjn$NWhGk`8qpg6Q3O>voBfX|sME1OMQWUhUL-7JxW&WqRRvWi%nsp7R4!uQmXxx9 ztq4N%v%%chNCNThg_2qOUX|P@7jw#R(ovwtrfp%oQZKSx{V0CW3za`BG#ijCakzHZ2>6KIFfz}zl8D7*^Cn3~P6eL<#c&w}rLXVkz zk<4};h#lHei%zB)tE##-sF!S_)j}Cvy1$C?Y|&!dck!g3p{lE7))sXYo-OMN9+OQg zIVSIro2Fu_-$ei>J20REQG?_=YN3oNpQ=?6Ja0FvfC}Lvo)s3GO0SAT_)l;tgUH>T zh->KHSIzYnCf|bsX1_{QpjO^uTOj7I0F0_F!0hLN6s-Kc6zi$M<5IXdVPPy4ok})= zM>S5u=&YB$2OttCRg&7mOOP|h0X!{dEtK8@_p$u+21{IUp~8<8UFnk#}7N?tdl49hfV!|Htc5;C!W*aTE+f9 VGn-SpCOi7IKmPFnM;=)F{{eNUF!KNa