<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-vcon-consent-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="vCon Consent Attachment">Voice Conversation (vCon) Consent Attachment</title>

    <author fullname="Thomas McCarthy-Howe">
      <organization>Strolid, Inc.</organization>
      <address>
        <email>thomas.howe@strolid.com</email>
      </address>
    </author>
    <author fullname="S. Lasker">
      <organization></organization>
      <address>
        <email>stevenlasker@hotmail.com</email>
      </address>
    </author>

    <date year="2025" month="July" day="07"/>

    <area>Applications and Real-Time</area>
    <workgroup>Virtualized Conversations</workgroup>
    <keyword>conversation</keyword> <keyword>consent</keyword> <keyword>vcon</keyword> <keyword>CDR</keyword> <keyword>call detail record</keyword> <keyword>call meta data</keyword> <keyword>call recording</keyword> <keyword>email thread</keyword> <keyword>text conversation</keyword> <keyword>video recording</keyword> <keyword>video conference</keyword> <keyword>conference recording</keyword> <keyword>SCITT</keyword> <keyword>transparency</keyword> <keyword>privacy</keyword> <keyword>GDPR</keyword> <keyword>CCPA</keyword> <keyword>HIPAA</keyword>

    <abstract>


<?line 89?>

<t>This document defines a consent attachment type for Voice Conversations (vCon), establishing standardized mechanisms for recording, verifying, and managing consent information within conversation containers. The consent attachment addresses privacy compliance challenges through structured metadata including consenting parties, temporal validity periods, and cryptographic proof mechanisms.</t>

<t>The specification defines the mandatory and optional fields for consent attachments, including expiration timestamps, party references, dialog segments, and consent arrays. It supports granular consent management through purpose-based permissions and integrates with the AI Preferences vocabulary for automated processing systems. The attachment type incorporates SCITT (Supply Chain Integrity, Transparency, and Trust) for cryptographic transparency and provides integration patterns for consent ledger services.</t>

<t>Key features include automated consent detection during conversation processing, auditable consent records with cryptographic proofs, support for consent revocation through superseding statements, and integration with existing privacy regulations. The consent attachment enables organizations to maintain compliance while providing sufficient structure for automated processing and verification of consent throughout the vCon lifecycle.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://example.com/LATEST"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-vcon-consent/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Virtualized Conversations Working Group mailing list (<eref target="mailto:vcon@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/vcon/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/vcon/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/howethomas/vcon-howe-vcon-consent"/>.</t>
    </note>


  </front>

  <middle>


<?line 97?>

<section anchor="introduction"><name>Introduction</name>

<t>Voice conversations often contain sensitive information that requires proper consent management. This document defines a consent attachment type for Virtualized Conversations (vCon) that enables automated consent detection, structured consent recording, and proof mechanisms for compliance with privacy regulations.</t>

<t>A vCon (Virtualized Conversation) is a standardized container format for storing conversation data, including metadata, participants, and conversation content. vCons support extensible attachments that can carry additional structured data related to the conversation. These attachments enable the association of various types of information with the conversation, such as transcripts, analytics, or consent records.</t>

<t>The consent attachment type provides a standardized mechanism for recording and managing consent information within vCon containers. This attachment captures essential consent metadata including the consenting party, the specific dialog or conversation segment covered by the consent, temporal validity periods, and any associated proof mechanisms. By embedding consent information directly within the vCon structure, implementations can maintain the integrity of the consent record and ensure it remains associated with the relevant conversation data throughout the lifecycle of the vCon.</t>

<t>The consent attachment addresses key privacy and compliance challenges faced by organizations handling voice conversations. It enables automated consent detection during conversation processing, provides auditable consent records, and supports regulatory compliance through structured consent management. The attachment type is designed to be flexible enough to accommodate various consent models while providing sufficient structure to enable automated processing and verification.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC8174">RFC2119</xref> when, and only when, they appear in all capitals, as shown here.</t>

<section anchor="core-terms"><name>Core Terms</name>

<t><strong>Consent</strong>: Any freely given, specific, informed, and unambiguous indication of the data subject's wishes by which they, by a statement or by a clear affirmative action, signify agreement to the processing of personal data relating to them <xref target="GDPR"></xref>.</t>

<t><strong>Data Subject</strong>: The identified or identifiable natural person to whom personal data relates <xref target="GDPR"></xref>. Also referred to as "consumer" in some jurisdictions <xref target="CCPA"></xref>.</t>

<t><strong>Data Controller</strong>: The natural or legal person, public authority, agency, or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data <xref target="GDPR"></xref>.</t>

<t><strong>Data Processor</strong>: A natural or legal person, public authority, agency, or other body which processes personal data on behalf of the controller <xref target="GDPR"></xref>.</t>

<t><strong>Personal Data</strong>: Any information relating to an identified or identifiable natural person <xref target="GDPR"></xref>.</t>

<t><strong>Processing</strong>: Any operation or set of operations performed on personal data <xref target="GDPR"></xref>.</t>

</section>
<section anchor="vcon-specific-terms"><name>vCon-Specific Terms</name>

<t><strong>vCon</strong>: A standardized container for conversational information, including metadata, participants, dialog content, analysis, and attachments <xref target="I-D.draft-ietf-vcon-vcon-container"></xref>.</t>

<t><strong>vCon Instance</strong>: A vCon populated with data for a specific conversation <xref target="I-D.draft-ietf-vcon-vcon-container"></xref>.</t>

<t><strong>vCon Instance Version</strong>: A single version of an instance of a conversation, which may be modified to redact or append additional information <xref target="I-D.draft-ietf-vcon-vcon-container"></xref>.</t>

<t><strong>Party</strong>: An observer or participant to the conversation, either passive or active <xref target="I-D.draft-ietf-vcon-vcon-container"></xref>.</t>

<t><strong>Dialog</strong>: The captured conversation in its original form (e.g., text, audio, or video) <xref target="I-D.draft-ietf-vcon-vcon-container"></xref>.</t>

<t><strong>Analysis</strong>: Analysis, transformations, summary, sentiment, or translation typically of the dialog data <xref target="I-D.draft-ietf-vcon-vcon-container"></xref>.</t>

<t><strong>Attachment</strong>: A data block either included or referenced in a vCon <xref target="I-D.draft-ietf-vcon-vcon-container"></xref>.</t>

</section>
<section anchor="consent-specific-terms"><name>Consent-Specific Terms</name>

<t><strong>Consent Attachment</strong>: A vCon attachment of type "consent" that contains structured consent information for one or more parties to a conversation.</t>

<t><strong>Consent Statement</strong>: A structured representation of consent that includes the consenting party, purposes, temporal validity, and proof mechanisms.</t>

<t><strong>Consent Ledger</strong>: A SCITT Transparency Service that maintains authoritative consent state and provides cryptographic receipts for consent operations.</t>

<t><strong>Consent Proof</strong>: Cryptographic or other evidence that validates the authenticity and integrity of a consent statement.</t>

<t><strong>Consent Purpose</strong>: A specific use case or processing activity for which consent is granted or denied.</t>

<t><strong>Consent Status</strong>: The current state of consent (granted, denied, revoked, expired) for a specific purpose.</t>

<t><strong>Consent Expiration</strong>: The point in time when consent becomes invalid, either through explicit expiration or revocation.</t>

<t><strong>Consent Revocation</strong>: The withdrawal of previously granted consent by the data subject.</t>

<t><strong>Consent Verification</strong>: The process of validating that consent is current, valid, and applicable to the requested processing activity.</t>

</section>
<section anchor="technical-terms"><name>Technical Terms</name>

<t><strong>SCITT</strong>: Supply Chain Integrity, Transparency, and Trust - a protocol for maintaining append-only transparency ledgers <xref target="I-D.draft-ietf-scitt-scrapi-05"></xref>.</t>

<t><strong>SCRAPI</strong>: SCITT Receipt API - the interface for interacting with SCITT Transparency Services <xref target="I-D.draft-ietf-scitt-scrapi-05"></xref>.</t>

<t><strong>COSE</strong>: CBOR Object Signing and Encryption - a standard for creating and processing signed, encrypted, and MACed objects <xref target="RFC8949"></xref>.</t>

<t><strong>COSE Sign1</strong>: A COSE structure containing a single signature <xref target="RFC8949"></xref>.</t>

<t><strong>AI Preferences Vocabulary</strong>: A standardized vocabulary for expressing preferences related to automated processing systems <xref target="I-D.draft-ietf-aipref-vocab-01"></xref>.</t>

<t><strong>Clock Skew</strong>: The difference in time between different systems, which must be accounted for when validating temporal constraints.</t>

<t><strong>Referential Integrity</strong>: The consistency of references between consent attachments and the vCon elements they reference.</t>

<t><strong>Data Minimization</strong>: The principle of limiting personal data collection to what is necessary for the specified purpose <xref target="GDPR"></xref>.</t>

<t><strong>Privacy by Design</strong>: The principle of embedding privacy considerations into the design and architecture of systems and processes <xref target="NIST-PRIVACY"></xref>.</t>

</section>
<section anchor="regulatory-terms"><name>Regulatory Terms</name>

<t><strong>GDPR</strong>: General Data Protection Regulation - the primary data protection law in the European Union <xref target="GDPR"></xref>.</t>

<t><strong>CCPA</strong>: California Consumer Privacy Act - a state statute intended to enhance privacy rights and consumer protection for residents of California <xref target="CCPA"></xref>.</t>

<t><strong>HIPAA</strong>: Health Insurance Portability and Accountability Act - a US law that provides data privacy and security provisions for safeguarding medical information <xref target="HIPAA"></xref>.</t>

<t><strong>Right to be Forgotten</strong>: The right of data subjects to have their personal data erased <xref target="GDPR"></xref>.</t>

<t><strong>Right of Access</strong>: The right of data subjects to obtain confirmation of whether their personal data is being processed and access to that data <xref target="GDPR"></xref>.</t>

<t><strong>Right of Rectification</strong>: The right of data subjects to have inaccurate personal data corrected <xref target="GDPR"></xref>.</t>

<t><strong>Right of Portability</strong>: The right of data subjects to receive their personal data in a structured, commonly used, machine-readable format <xref target="GDPR"></xref>.</t>

<t><strong>Lawful Basis</strong>: One of the six legal grounds for processing personal data under GDPR: consent, contract, legal obligation, vital interests, public task, or legitimate interests <xref target="GDPR"></xref>.</t>

</section>
</section>
<section anchor="requirements"><name>Requirements</name>

<section anchor="consent-attachment-requirements-summary"><name>Consent Attachment Requirements Summary</name>

<t>The vCon consent specification establishes standardized requirements for managing consent information within voice conversation containers. The specification addresses privacy compliance challenges through structured consent attachments that capture essential metadata and proof mechanisms.</t>

<section anchor="core-requirements"><name>Core Requirements</name>

<t><strong>Mandatory Fields</strong>: Consent attachments must include four essential fields:
- <strong>expiration</strong>: RFC3339 timestamp indicating consent validity period
- <strong>party</strong>: Zero-based index referencing the consenting party in the vCon parties array<br />
- <strong>dialog</strong>: Zero-based index referencing the specific conversation segment
- <strong>consents</strong>: Array containing the actual consent records and permissions</t>

<t><strong>Optional Fields</strong>: Additional fields may include terms of service references, status monitoring intervals, consent ledger URLs, and cryptographic proof mechanisms.</t>

</section>
<section anchor="temporal-management"><name>Temporal Management</name>

<t>Consent attachments must implement proper expiration handling with configurable clock skew tolerance (default maximum 5 minutes). Indefinite consent is supported through null expiration values but requires periodic revalidation mechanisms.</t>

</section>
<section anchor="referential-integrity"><name>Referential Integrity</name>

<t>The specification enforces strict referential integrity between consent attachments and vCon elements. Party and dialog references must be validated against the vCon structure, and modifications to the underlying conversation data require corresponding updates to consent attachments.</t>

</section>
<section anchor="status-monitoring"><name>Status Monitoring</name>

<t>Consent status must be verified at configurable intervals based on data sensitivity:
- High-sensitivity data: 24-hour verification cycles
- Standard business data: 7-day verification cycles<br />
- Low-sensitivity data: 30-day verification cycles
- Public data: 90-day verification cycles</t>

</section>
<section anchor="terms-of-service-integration"><name>Terms of Service Integration</name>

<t>Terms of service references must be immutable and support both URI references and embedded content. Implementations should maintain local caching with proper HTTP cache control compliance.</t>

</section>
<section anchor="compliance-and-audit"><name>Compliance and Audit</name>

<t>The specification enables automated consent detection, auditable consent records, and regulatory compliance through structured consent management. It supports various consent models while providing sufficient structure for automated processing and verification.</t>

</section>
</section>
<section anchor="consent-attachment-structure"><name>Consent Attachment Structure</name>

<t>The consent attachment MUST be a JSON object that is included in the vCon attachments array. The consent attachment MUST contain the following top-level fields: "expiration", "party", "dialog" and "consents". Implementations MUST reject consent attachments that are missing any of these required fields.</t>

<t>The consent attachment MAY contain the following top-level fields "terms_of_service", "status_interval", "consent_ledger", "proof".</t>

<t>The consent attachment SHOULD include appropriate metadata fields as defined in the base vCon attachment specification, including "type", "start", and "signature" fields when applicable.</t>

</section>
<section anchor="temporal-validity-and-expiration"><name>Temporal Validity and Expiration</name>

<t>The "expiration" field MUST contain a timestamp in RFC3339 format indicating when the consent becomes invalid. Implementations MUST compare the current time against this expiration timestamp and SHALL reject expired consent attachments.</t>

<t>The expiration timestamp MAY be set to <spanx style="verb">null</spanx> to indicate indefinite consent duration, as defined by local policy or applicable regulations. When the expiration field is <spanx style="verb">null</spanx>, the consent is considered valid indefinitely until explicitly revoked. However, implementations SHOULD provide mechanisms for periodic consent revalidation even when indefinite consent is granted.</t>

<t>When processing consent attachments, implementations MUST account for clock skew and SHOULD allow for reasonable time differences between systems. The acceptable clock skew tolerance SHOULD be configurable but MUST NOT exceed 5 minutes by default.</t>

</section>
<section anchor="terms-of-service-integration-1"><name>Terms of Service Integration</name>

<t>The "terms_of_service" field MUST contain either a URI reference to the applicable terms of service document or an embedded terms object. When using URI references, implementations MUST support HTTPS URLs and SHOULD support content integrity verification through cryptographic hashes.</t>

<t>The terms of service reference MUST be immutable for the lifetime of the consent attachment. If terms of service change, a new consent attachment MUST be created rather than modifying the existing reference.</t>

<t>Implementations SHOULD maintain a local cache of terms of service documents to ensure availability during consent verification. The cache SHOULD respect HTTP cache control headers when fetching terms documents via URI.</t>

</section>
<section anchor="party-and-dialog-references"><name>Party and Dialog References</name>

<t>The "party" field MUST contain a zero-based integer index referencing an entry in the vCon parties array. Implementations MUST validate that the referenced party index exists in the vCon and SHOULD verify that the party has authority to grant consent for the specified dialog.</t>

<t>The "dialog" field MUST contain a zero-based integer index referencing an entry in the vCon dialog array. Multiple consent attachments MAY reference the same dialog entry to represent consent from different parties or for different purposes.</t>

<t>Implementations MUST maintain referential integrity between consent attachments and the referenced vCon elements. When a vCon is modified through redaction or amendment, consent attachment references MUST be updated accordingly or the consent MUST be invalidated.</t>

</section>
<section anchor="status-monitoring-and-intervals"><name>Status Monitoring and Intervals</name>

<t>The "status_interval" field MUST specify the maximum time interval, in seconds, between consent status verifications. Implementations MUST perform consent status checks at least as frequently as specified by this interval.</t>

<t>The status interval MUST be a positive integer value. A status interval of zero indicates that consent status MUST be verified on every access to the associated dialog content.</t>

<section anchor="recommended-interval-values"><name>Recommended Interval Values</name>

<t>The following intervals are RECOMMENDED based on privacy regulation requirements and operational considerations:</t>

<t><list style="symbols">
  <t><strong>High-sensitivity data</strong>: 86400 seconds (24 hours) - For medical, financial, or legal conversations</t>
  <t><strong>Standard business data</strong>: 604800 seconds (7 days) - For typical business communications</t>
  <t><strong>Low-sensitivity data</strong>: 2592000 seconds (30 days) - For general customer service interactions</t>
  <t><strong>Public/transparent data</strong>: 7776000 seconds (90 days) - For non-private communications that do not contain personally identifiable information not in the public domain.</t>
</list></t>

<t>Implementations SHOULD consider the following factors when selecting intervals:
- Data sensitivity and regulatory requirements (GDPR, CCPA, HIPAA, etc.)
- Risk tolerance and compliance obligations
- Operational overhead of frequent verification
- User experience impact of verification delays
- Consent revocation patterns and requirements</t>

<t>When the status interval expires, implementations MUST either verify consent status through the consent ledger mechanism or treat the consent as potentially invalid until verification is completed. Implementations MAY continue to honor consent during brief verification delays but MUST NOT exceed twice the specified status interval without successful verification.</t>

</section>
</section>
<section anchor="consent-ledger-integration"><name>Consent Ledger Integration</name>

<t>The "consent_ledger" field SHOULD contain a URL referencing a SCITT Transparency Service that maintains the authoritative consent state. Implementations MAY use this URL to verify current consent status and detect consent revocations.</t>

<section anchor="scitt-transparency-service-interface"><name>SCITT Transparency Service Interface</name>

<t>Consent ledger services MUST implement the SCRAPI interface as specified in <xref target="I-D.draft-ietf-scitt-scrapi-05"></xref>. The consent ledger acts as a SCITT Transparency Service that:</t>

<t><list style="numbers" type="1">
  <t><strong>Registers Consent Statements</strong>: Consent attachments are registered as Signed Statements using the <spanx style="verb">/entries</spanx> endpoint</t>
  <t><strong>Issues Receipts</strong>: Provides cryptographic receipts proving consent registration</t>
  <t><strong>Enables Verification</strong>: Allows verification of consent status through receipt validation</t>
  <t><strong>Supports Revocation</strong>: Handles consent revocation through statement updates</t>
</list></t>

</section>
<section anchor="consent-statement-format"><name>Consent Statement Format</name>

<t>Consent statements MUST be formatted as COSE Sign1 objects containing:</t>

<t><spanx style="verb">json
{
  "protected": {
    "alg": "ES256",
    "kid": "consent-issuer-key-id",
    "cty": "application/vcon-consent+json"
  },
  "unprotected": {
    "consent_id": "urn:uuid:consent-identifier",
    "vcon_uuid": "urn:uuid:vcon-identifier",
    "party_index": 0,
    "dialog_index": 0
  },
  "payload": {
    "consents": [
      {
        "purpose": "recording",
        "status": "granted",
        "timestamp": "2025-01-02T12:15:30Z"
      }
    ],
    "expiration": "2026-01-02T12:00:00Z",
    "terms_of_service": "https://example.com/terms"
  }
}
</spanx></t>

</section>
<section anchor="consent-ledger-operations"><name>Consent Ledger Operations</name>

<section anchor="registration"><name>Registration</name>
<t><list style="symbols">
  <t><strong>Endpoint</strong>: <spanx style="verb">POST /entries</spanx></t>
  <t><strong>Content-Type</strong>: <spanx style="verb">application/cose</spanx></t>
  <t><strong>Body</strong>: COSE Sign1 consent statement</t>
  <t><strong>Response</strong>: 201 with receipt or 303 with location for async processing</t>
</list></t>

</section>
<section anchor="status-verification"><name>Status Verification</name>
<t><list style="symbols">
  <t><strong>Endpoint</strong>: <spanx style="verb">GET /entries/{entry-id}</spanx></t>
  <t><strong>Response</strong>: 200 with receipt or 302/404 for pending/not found</t>
</list></t>

</section>
<section anchor="receipt-resolution"><name>Receipt Resolution</name>
<t><list style="symbols">
  <t><strong>Endpoint</strong>: <spanx style="verb">GET /entries/{entry-id}</spanx></t>
  <t><strong>Response</strong>: 200 with current receipt or 404 if not found</t>
</list></t>

</section>
</section>
<section anchor="consent-revocation"><name>Consent Revocation</name>

<t>Consent revocation is handled by registering a new Signed Statement that supersedes the original consent:</t>

<t><spanx style="verb">json
{
  "protected": {
    "alg": "ES256",
    "kid": "consent-issuer-key-id",
    "cty": "application/vcon-consent+json"
  },
  "unprotected": {
    "consent_id": "urn:uuid:consent-identifier",
    "vcon_uuid": "urn:uuid:vcon-identifier",
    "supersedes": "urn:uuid:original-consent-id",
    "revocation": true
  },
  "payload": {
    "consents": [
      {
        "purpose": "recording",
        "status": "revoked",
        "timestamp": "2025-01-03T10:30:00Z"
      }
    ],
    "revocation_reason": "user_request",
    "revocation_timestamp": "2025-01-03T10:30:00Z"
  }
}
</spanx></t>

</section>
<section anchor="implementation-requirements"><name>Implementation Requirements</name>

<t>When a consent ledger URL is provided, implementations MUST:</t>

<t><list style="numbers" type="1">
  <t><strong>Support SCRAPI</strong>: Implement all mandatory SCRAPI endpoints</t>
  <t><strong>Use HTTPS</strong>: All communications MUST use TLS 1.2 or higher</t>
  <t><strong>Authenticate</strong>: Implement appropriate authentication as specified by the ledger service</t>
  <t><strong>Handle Failures</strong>: Gracefully handle service unavailability</t>
  <t><strong>Verify Receipts</strong>: Validate all receipts using SCITT verification procedures</t>
  <t><strong>Cache Strategically</strong>: Cache consent state within status_interval limits</t>
</list></t>

</section>
<section anchor="error-handling"><name>Error Handling</name>

<t>Consent ledger services MUST return appropriate HTTP status codes and Concise Problem Details objects as specified in SCRAPI:</t>

<t><list style="symbols">
  <t><strong>400</strong>: Malformed consent statement</t>
  <t><strong>401</strong>: Authentication required</t>
  <t><strong>403</strong>: Registration policy violation</t>
  <t><strong>404</strong>: Consent not found</t>
  <t><strong>429</strong>: Rate limiting exceeded</t>
  <t><strong>503</strong>: Service temporarily unavailable</t>
</list></t>

</section>
<section anchor="privacy-considerations"><name>Privacy Considerations</name>

<t>Consent ledger services SHOULD implement privacy-preserving mechanisms:</t>

<t><list style="symbols">
  <t><strong>Minimal Data</strong>: Only store consent metadata, not full vCon content</t>
  <t><strong>Access Control</strong>: Implement appropriate access controls for consent queries</t>
  <t><strong>Audit Logging</strong>: Maintain audit trails for compliance purposes</t>
  <t><strong>Data Retention</strong>: Implement appropriate data retention policies</t>
</list></t>

</section>
</section>
<section anchor="cryptographic-proof-requirements"><name>Cryptographic Proof Requirements</name>

<t>The "proof" field MUST contain an array of proof objects that provide cryptographic evidence of valid consent. Each proof object MUST include a "type" field specifying the proof mechanism and a "value" field containing the proof data.</t>

<t>Proof objects MAY include various types of evidence:
- <strong>Dialog-based proofs</strong>: Consent statements or confirmations given verbally or textually within the conversation dialog itself
- <strong>External document proofs</strong>: Signed consent forms, terms of service agreements, or other legal documents referenced by URL or embedded content
- <strong>External site proofs</strong>: Consent granted through web interfaces, mobile applications, or other external systems that provide cryptographic attestation</t>

<t>Implementations MUST support digital signature proofs using algorithms specified in the IANA COSE Algorithms registry <xref target="COSE-ALG"></xref>. The proof SHOULD include a timestamp indicating when the consent was granted and MUST include a reference to the consenting party's cryptographic identity.</t>

<t>When multiple proofs are present, implementations MUST verify all proofs and SHALL reject the consent attachment if any proof fails validation. The proof verification process MUST include validation of the signing key authority and certificate chain when applicable.</t>

<t>Proof objects MAY reference external proof data to minimize consent attachment size. When external references are used, implementations MUST verify the integrity of externally referenced proof data using cryptographic hashes included in the proof object.</t>

</section>
<section anchor="granular-consent-management"><name>Granular Consent Management</name>

<t>The "consents" field MUST contain an array of consent objects, each specifying a particular permission granted by the consenting party. Each consent object MUST include a "purpose" field identifying the specific use case and a "status" field indicating whether consent is granted or denied.</t>

<t>Standard consent purposes MUST include "recording", "transcription", "analysis", "storage", and "sharing". Implementations MAY define additional purpose categories but SHOULD use standardized purpose taxonomies when available.</t>

<section anchor="ai-preferences-vocabulary-support"><name>AI Preferences Vocabulary Support</name>

<t>Implementations SHOULD support the AI Preferences vocabulary as defined in <xref target="I-D.draft-ietf-aipref-vocab-01"></xref> for expressing granular consent related to automated processing systems. When using the AI Preferences vocabulary, consent objects MAY include the following standardized categories:</t>

<t><list style="symbols">
  <t><strong>tdm</strong>: Text and Data Mining - Automated analytical techniques for analyzing text and data</t>
  <t><strong>ai</strong>: AI Training - Training machine learning models or artificial intelligence</t>
  <t><strong>genai</strong>: Generative AI Training - Training AI models that generate synthetic content</t>
  <t><strong>search</strong>: Search - Building search indexes or providing search results</t>
  <t><strong>inference</strong>: AI Inference - Using assets as input to trained AI/ML models</t>
</list></t>

<t>When the AI Preferences vocabulary is used, consent objects SHOULD include a "vocabulary" field set to "ai-pref" to indicate the use of this standardized vocabulary. The "purpose" field SHOULD use the corresponding label from the AI Preferences vocabulary (e.g., "ai", "genai", "tdm").</t>

<t>Example consent object using AI Preferences vocabulary:
<spanx style="verb">json
{
  "purpose": "genai",
  "status": "denied",
  "vocabulary": "ai-pref",
  "timestamp": "2025-01-02T12:15:30Z"
}
</spanx></t>

<t>Implementations that support the AI Preferences vocabulary MUST follow the hierarchical relationship rules defined in <xref target="I-D.draft-ietf-aipref-vocab-01"></xref>, where more specific categories override general categories unless explicitly stated otherwise.</t>

<t>Each consent object SHOULD include additional metadata such as the timestamp when consent was granted, any restrictions or conditions on the consent, and references to applicable legal regulations.</t>

<t>Implementations MUST support fine-grained consent evaluation, allowing different consent decisions for different purposes. When multiple consent objects apply to the same purpose, the most restrictive consent MUST take precedence.</t>

</section>
</section>
<section anchor="consent-withdrawal-and-revocation"><name>Consent Withdrawal and Revocation</name>

<t>Implementations MUST support consent withdrawal mechanisms that allow data subjects to revoke previously granted consent. When consent is revoked, the consent status in the ledger service MUST be updated immediately and all processing of the associated dialog content MUST cease.</t>

<t>The consent withdrawal process MUST provide confirmation to the data subject and SHOULD include a timestamp of when the revocation became effective. Implementations MUST honor consent revocations even if they cannot immediately delete or modify existing vCon instances.</t>

<t>When consent is revoked, implementations SHOULD notify all parties that have received copies of the vCon containing the revoked consent. The notification mechanism MAY use the SCITT transparency service integration described in related vCon lifecycle specifications.</t>

</section>
<section anchor="privacy-and-data-minimization"><name>Privacy and Data Minimization</name>

<t>Consent attachments MUST implement data minimization principles by including only information necessary for consent verification and audit purposes. Personal information SHOULD NOT be duplicated in consent attachments when it is already available in the referenced vCon elements.</t>

<t>The consent attachment design MUST support privacy-preserving verification mechanisms that allow consent validation without exposing sensitive personal information to all parties in a consent verification workflow.</t>

<t>Implementations SHOULD support consent attachment redaction techniques that allow sensitive consent details to be removed while maintaining the ability to verify that valid consent was originally present.</t>

</section>
<section anchor="error-handling-and-validation"><name>Error Handling and Validation</name>

<t>Implementations MUST validate consent attachment syntax according to the JSON schema defined in this specification. Malformed consent attachments MUST be rejected with appropriate error messages indicating the specific validation failures.</t>

<t>When consent validation fails, implementations MUST NOT process the associated dialog content and SHOULD log the failure for audit purposes. The error handling process MUST distinguish between temporary failures (such as network timeouts during ledger verification) and permanent failures (such as invalid cryptographic proofs).</t>

<t>Implementations SHOULD provide detailed error reporting to assist with troubleshooting consent validation issues while avoiding exposure of sensitive information in error messages.</t>

</section>
<section anchor="interoperability-and-versioning"><name>Interoperability and Versioning</name>

<t>Consent attachments MUST include version information to support evolution of the consent attachment specification. Implementations MUST handle version mismatches gracefully and SHOULD support multiple consent attachment versions during transition periods.</t>

<t>The consent attachment format MUST be designed to support extensions while maintaining backward compatibility with existing implementations. New fields MAY be added to consent attachments but MUST NOT break existing validation logic.</t>

<t>Implementations SHOULD support consent attachment format negotiation when multiple parties exchange vCons with different consent attachment version support.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>All consent attachments MUST be integrity protected using the vCon signing mechanisms. Consent attachments containing sensitive information SHOULD be encrypted when the vCon is transmitted outside secure environments.</t>

<t>Implementations MUST protect consent ledger communications using TLS and SHOULD implement additional authentication mechanisms to prevent unauthorized consent status queries or modifications.</t>

<t>The consent attachment design MUST prevent replay attacks and consent forgery through appropriate use of timestamps, nonces, and cryptographic binding to the specific vCon instance and dialog content.</t>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?></t>

<figure><sourcecode type="json"><![CDATA[
{
  "expiration": "2026-01-02T12:00:00Z",
  "terms_of_service": "https://example.com/terms",
  "party": 0,
  "dialog": 0,
  "status_interval": "30d",
  "consent_ledger": "https://ledger.example.com/consent/123",
  "proof": [
    {
      "timestamp": "2025-01-02T12:15:30Z",
      "type": "verbal_confirmation"
    },
    {
      "url": "https://example.com/consent-form.pdf",
      "type": "external_asset"
    }
  ],
  "consents": [
    {
      "value": true,
      "consent": "recording"
    },
    {
      "value": true,
      "consent": "transcription"
    },
    {
      "value": true,
      "consent": "analysis"
    }
  ]
}
]]></sourcecode></figure>

</section>
<section anchor="attachment-fields"><name>Attachment Fields</name>

<section anchor="required-fields"><name>Required Fields</name>

<t><list style="symbols">
  <t><strong>expiration</strong>: ISO 8601 timestamp indicating when consent expires</t>
  <t><strong>party</strong>: Index of the party in the vCon parties array</t>
  <t><strong>dialog</strong>: Index of the dialog in the vCon dialog array</t>
  <t><strong>consents</strong>: Array of consent objects with value and consent type</t>
</list></t>

</section>
<section anchor="optional-fields"><name>Optional Fields</name>

<t><list style="symbols">
  <t><strong>terms_of_service</strong>: URL to the terms of service document</t>
  <t><strong>status_interval</strong>: Duration string (e.g., "30d") for status check intervals</t>
  <t><strong>consent_ledger</strong>: URL to external consent ledger for audit purposes</t>
  <t><strong>proof</strong>: Array of proof objects supporting the consent</t>
</list></t>

</section>
</section>
<section anchor="consent-objects"><name>Consent Objects</name>

<t>Each consent object MUST contain:</t>

<t><list style="symbols">
  <t><strong>value</strong>: Boolean indicating consent status (true for granted, false for denied)</t>
  <t><strong>consent</strong>: String identifying the consent type (e.g., "recording", "transcription", "analysis")</t>
</list></t>

</section>
<section anchor="proof-objects"><name>Proof Objects</name>

<t>Proof objects provide evidence of consent and MAY contain:</t>

<t><list style="symbols">
  <t><strong>timestamp</strong>: ISO 8601 timestamp when consent was given</t>
  <t><strong>type</strong>: Proof type identifier (e.g., "verbal_confirmation", "external_asset")</t>
  <t><strong>url</strong>: URL to external proof document (for external_asset type)</t>
</list></t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="vcon-attachment-type-registration"><name>vCon Attachment Type Registration</name>

<t>This document requests IANA to register the following vCon attachment type:</t>

<t><list style="symbols">
  <t><strong>Type</strong>: consent</t>
  <t><strong>Description</strong>: Consent information for voice conversation participants</t>
  <t><strong>Reference</strong>: This document</t>
</list></t>

</section>
</section>
<section anchor="how-to-use-the-consent-attachment"><name>How to Use the Consent Attachment</name>

<section anchor="creating-a-consent-attachment"><name>Creating a Consent Attachment</name>

<t>To create a consent attachment for a vCon:</t>

<t><list style="numbers" type="1">
  <t><strong>Identify the consenting party</strong>: Reference the party index in the vCon parties array</t>
  <t><strong>Specify the dialog segment</strong>: Reference the dialog index in the vCon dialog array</t>
  <t><strong>Define consent permissions</strong>: Create consent objects for each purpose</t>
  <t><strong>Set expiration</strong>: Define when the consent expires</t>
  <t><strong>Add proof mechanisms</strong>: Include cryptographic or other proof of consent</t>
  <t><strong>Include in vCon</strong>: Add the attachment to the vCon attachments array</t>
</list></t>

</section>
<section anchor="example-usage"><name>Example Usage</name>

<t><spanx style="verb">json
{
  "type": "consent",
  "start": "2025-01-02T12:15:30Z",
  "expiration": "2026-01-02T12:00:00Z",
  "party": 0,
  "dialog": 0,
  "consents": [
    {
      "purpose": "recording",
      "status": "granted",
      "timestamp": "2025-01-02T12:15:30Z"
    }
  ],
  "proof": [
    {
      "type": "verbal_confirmation",
      "timestamp": "2025-01-02T12:15:30Z"
    }
  ]
}
</spanx></t>

</section>
<section anchor="processing-consent-attachments"><name>Processing Consent Attachments</name>

<t>When processing a vCon with consent attachments:</t>

<t><list style="numbers" type="1">
  <t><strong>Validate structure</strong>: Ensure all required fields are present</t>
  <t><strong>Check expiration</strong>: Verify the consent hasn't expired</t>
  <t><strong>Verify references</strong>: Ensure party and dialog indices are valid</t>
  <t><strong>Validate proofs</strong>: Verify cryptographic or other proof mechanisms</t>
  <t><strong>Check ledger status</strong>: If a consent ledger is specified, verify current status</t>
  <t><strong>Apply permissions</strong>: Use consent status to determine allowed operations</t>
</list></t>

</section>
</section>
<section anchor="privacy-considerations-1"><name>Privacy Considerations</name>

<t>This document describes mechanisms for managing consent information within vCon containers. Implementers MUST ensure compliance with applicable privacy regulations, including but not limited to GDPR <xref target="GDPR"></xref>, CCPA <xref target="CCPA"></xref>, and HIPAA <xref target="HIPAA"></xref>.</t>

<t>The consent attachment provides structured mechanisms for recording and verifying consent, but implementers are responsible for ensuring that their implementations properly respect and enforce data subject rights, including:</t>

<t><list style="symbols">
  <t><strong>Right of Access</strong>: Data subjects must be able to access their consent records</t>
  <t><strong>Right of Rectification</strong>: Data subjects must be able to correct inaccurate consent information</t>
  <t><strong>Right to be Forgotten</strong>: Data subjects must be able to revoke consent and request deletion</t>
  <t><strong>Right of Portability</strong>: Data subjects must be able to export their consent data</t>
  <t><strong>Consent Withdrawal</strong>: Data subjects must be able to withdraw consent at any time</t>
</list></t>

<t>Implementers SHOULD follow privacy by design principles <xref target="NIST-PRIVACY"></xref> and implement appropriate technical and organizational measures to protect personal data throughout the consent lifecycle.</t>

</section>
<section anchor="security-considerations-1"><name>Security Considerations</name>

<t>Consent attachments contain sensitive information that requires appropriate security measures:</t>

<section anchor="cryptographic-protection"><name>Cryptographic Protection</name>

<t><list style="symbols">
  <t>All consent attachments MUST be integrity protected using vCon signing mechanisms</t>
  <t>Consent attachments containing sensitive information SHOULD be encrypted when transmitted outside secure environments</t>
  <t>Implementations MUST use strong cryptographic algorithms as specified in <xref target="COSE-ALG"></xref></t>
</list></t>

</section>
<section anchor="access-control"><name>Access Control</name>

<t><list style="symbols">
  <t>Implementations MUST implement appropriate access controls for consent data</t>
  <t>Consent verification SHOULD be performed with minimal privilege</t>
  <t>Audit logging MUST be implemented for all consent operations</t>
</list></t>

</section>
<section anchor="network-security"><name>Network Security</name>

<t><list style="symbols">
  <t>All communications with consent ledger services MUST use TLS 1.2 or higher</t>
  <t>Implementations MUST validate certificate chains and hostnames</t>
  <t>Implementations SHOULD implement certificate pinning for critical services</t>
</list></t>

</section>
<section anchor="data-protection"><name>Data Protection</name>

<t><list style="symbols">
  <t>Consent data SHOULD be encrypted at rest</t>
  <t>Implementations MUST implement secure key management</t>
  <t>Implementations SHOULD support hardware security modules for key storage</t>
</list></t>

</section>
<section anchor="threat-mitigation"><name>Threat Mitigation</name>

<t><list style="symbols">
  <t>Implementations MUST prevent replay attacks through proper use of timestamps and nonces</t>
  <t>Implementations MUST validate all cryptographic proofs to prevent forgery</t>
  <t>Implementations SHOULD implement rate limiting to prevent abuse</t>
</list></t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC3339">
  <front>
    <title>Date and Time on the Internet: Timestamps</title>
    <author fullname="G. Klyne" initials="G." surname="Klyne"/>
    <author fullname="C. Newman" initials="C." surname="Newman"/>
    <date month="July" year="2002"/>
    <abstract>
      <t>This document defines a date and time format for use in Internet protocols that is a profile of the ISO 8601 standard for representation of dates and times using the Gregorian calendar.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3339"/>
  <seriesInfo name="DOI" value="10.17487/RFC3339"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC8949">
  <front>
    <title>Concise Binary Object Representation (CBOR)</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="December" year="2020"/>
    <abstract>
      <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
      <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="94"/>
  <seriesInfo name="RFC" value="8949"/>
  <seriesInfo name="DOI" value="10.17487/RFC8949"/>
</reference>

<reference anchor="I-D.draft-ietf-scitt-scrapi-05">
   <front>
      <title>SCITT Reference APIs</title>
      <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname="Jon Geater" initials="J." surname="Geater">
         <organization>DataTrails Inc.</organization>
      </author>
      <date day="2" month="July" year="2025"/>
      <abstract>
	 <t>   This document describes a REST API that supports the normative
   requirements of the SCITT Architecture.  Optional key discovery and
   query interfaces are provided to support interoperability with X.509
   Certificates, alternative methods commonly used to support public key
   discovery and Artifact Repositories.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-scrapi-05"/>
   
</reference>

<reference anchor="I-D.draft-ietf-aipref-vocab-01">
   <front>
      <title>A Vocabulary For Expressing AI Usage Preferences</title>
      <author fullname="Paul Keller" initials="P." surname="Keller">
         <organization>Open Future</organization>
      </author>
      <author fullname="Martin Thomson" initials="M." surname="Thomson">
         <organization>Mozilla</organization>
      </author>
      <date day="18" month="June" year="2025"/>
      <abstract>
	 <t>   This document proposes a standardized vocabulary for expressing
   preferences related to how digital assets are used by automated
   processing systems.  This vocabulary allows for the creation of
   structured declarations about restrictions or permissions for use of
   digital assets by such systems.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-aipref-vocab-01"/>
   
</reference>

<reference anchor="I-D.draft-ietf-vcon-vcon-container">
   <front>
      <title>The JSON format for vCon - Conversation Data Container</title>
      <author fullname="Daniel Petrie" initials="D." surname="Petrie">
         <organization>SIPez LLC</organization>
      </author>
      <author fullname="Thomas McCarthy-Howe" initials="T." surname="McCarthy-Howe">
         <organization>Strolid</organization>
      </author>
      <date day="19" month="March" year="2025"/>
      <abstract>
	 <t>   A vCon is the container for data and information relating to a real-
   time, human conversation.  It is analogous to a [vCard] which enables
   the definition, interchange and storage of an individual&#x27;s various
   points of contact.  The data contained in a vCon may be derived from
   any multimedia session, traditional phone call, video conference, SMS
   or MMS message exchange, webchat or email thread.  The data in the
   container relating to the conversation may include Call Detail
   Records (CDR), call meta data, participant identity information (e.g.
   STIR PASSporT), the actual conversational data exchanged (e.g. audio,
   video, text), realtime or post conversational analysis and
   attachments of files exchanged during the conversation.  A
   standardized conversation container enables many applications,
   establishes a common method of storage and interchange, and supports
   identity, privacy and security efforts (see [vCon-white-paper])

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-vcon-vcon-container-03"/>
   
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="GDPR" target="https://gdpr.eu/">
  <front>
    <title>General Data Protection Regulation</title>
    <author >
      <organization>European Union</organization>
    </author>
    <date year="2018"/>
  </front>
</reference>
<reference anchor="CCPA" target="https://oag.ca.gov/privacy/ccpa">
  <front>
    <title>California Consumer Privacy Act</title>
    <author >
      <organization>State of California</organization>
    </author>
    <date year="2018"/>
  </front>
</reference>
<reference anchor="HIPAA" target="https://www.hhs.gov/hipaa/index.html">
  <front>
    <title>Health Insurance Portability and Accountability Act</title>
    <author >
      <organization>U.S. Department of Health and Human Services</organization>
    </author>
    <date year="1996"/>
  </front>
</reference>
<reference anchor="NIST-PRIVACY" target="https://www.nist.gov/privacy-framework">
  <front>
    <title>NIST Privacy Framework</title>
    <author >
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="COSE-ALG" target="https://www.iana.org/assignments/cose/cose.xhtml">
  <front>
    <title>COSE Algorithms</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>

</references>



  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA+V963LbVrbmfz4FjvKj7YxIXew4serUnFZkJ9aMHetIsru6
U102CG6SiEGABxuQzKTSzzLPMk8267ovuEhqp+fXSaUsEgT2Ze11X9/emE6n
kyZvCnOSvK/yzCRnVXljaps2eVUmj27g62O8Zk3ZJKdNk2brDXycpPN5bW5O
Erxh6PcsbcyqqncnSV4uq8lkUWVluoFeFnW6bKY3WVVOM35seng4se18k1sL
fTa7Ldx1/vL6hyT5KkkLW50ke3m5MFsD/5TN3n6yZxZ5U9V5WuCX89Pv4U9V
w6fL6x/2JmW7mZv6ZLKAEZxMuA/b2pOkqVszgSE/maS1SaHV0+22yDOaqU3S
cpFcmrSYXucbsze5repPq7pqt3Df+7xu2rTIfzWLiDx2b/LJ7ODOxckkmSZZ
8JN8x+nhR5wu/j17cUm/pEWRLEyT5kVSmwwacFc3cDWBoafuCt+Qlyu8Yjb4
TLOGCdAzjfnc9Dq+yRemip/jS3Dj0tSmzIyMT77F916dnV9fU+N1Wtptirfs
8Pu2zm9S/vjjiwuaydnZxSn+fXV+cXo6uTFlCzRPkgdQLkl4pff+ApSGnpMf
8Rm8jlOE60izP+emWc6qeoXX0zpbw/V102ztycEB3oaX8hsz09sO8MLBvK5u
rTnABg7wwVXerNs5PlrdmmZdbVJLP07xe8SKeHcBfGObk0T7MZ/TzbYws6za
HLw+vX55dT2ZpC00U+OqwwNJsmyLgrn7mlpP3mRnad2sd9NX0APdAoNLy/xX
mv1JctXUVZEv9pPzMpvR74ZnzaOb4cD+bPkm7Ljf0dUseZ3aT6YOn7aNgSUo
6Pqf11WDV+nxsqo30PUNLc7lD2fHR0fP5eOTJ0/043dH3z7Vj8+f0tXz6YsZ
SyySeGqzvGng3zrd5tPDbwbuSPNtbZbTmypL59PDo4E7iN5KdBCBEoV1gloi
GCPy1wlNrUnrlQmWY7XY1jPTHvCPrLn2fjTQSlokL0Bwkou6akxG+uvSrNqC
aL5H97t1S2RNTpKXbV1tTVom70oSH/iPNEdyfHj0HXxFDh8eSZWuZlk6W1U3
ByIZB1m2TaOBnQHzw8TKPCUl2W5MDeOjm5PTrBkd1VUDY0iqZeIb6A+NhG54
bLe3t7P12tLg1vk2TQ9QhX6erZtNEQ3wFai8Zg18aFuQdlAFF1XdpPO8yJsd
6cTTLKva0l26a9DvZsCVLwxojAZtAA5fmseGXrUboPKVqW/AzNhgNkfPnz+D
rz+dX11PLy7P35+e/XV8UmVum5Dk02UN8oDaOpoWNuYI/YPeMjryn4hHgIGA
DtBEy7SHRSgXab1g43BtsnVZFdVqF63E8SEyydurl9PT1z+OjztPy5Q1FFi5
VYn0sQdZBWoK/5l97i0MNpmcFmBDQXtt7OjQz09/Op1MptNpks5BY6RZM5lc
r3ObgMVtaRkWZglCBpNQi5Skzk6TEk6AwQasvxXzv5+APkznRW7XqKetUIWU
+gaIAnrNbiw14uzIfgLN5MsdfUTqwdqnK3xcx+AEHsT0FqaYl5EdS5xysDPQ
qmZo7OliURtrYWrCDHATqOqc+BjGVRSmXMGvYC6rdrWGkddt1rQ1jbtJ0crC
MLKiXQQDw4/Iwbmx+2BeN9sKFcsNiOEC+X8L06oWlieV1bttU61AG67zDAZR
AdN4isxwIUxitybLl+JnuMVo4JcNEhIcGRa0ais8uMxNsWB69icNPfshm8/b
vOZ2G/BaYGU2W7gBh7+DtRDrDlcW4CtVsHRmJW3Q6LXxuk53QOXzJrHtFubb
WDDgaQma04+A1s8wywg5t229Bd6dzlMLFAXCiAfH4pKX4ADWaEtpeWnCp+cg
k25YCRkJ7GVHkwXmBuPXYFt1Bb9b4rYdGLWN8ECXb4ESVY0LhL2Q25I8uoIp
FLvkbA3MA+KMg4B120+uA2eG539dt7Z5zHSOFjL0e+hOGA86UNZNCim+hdGY
uowXqjCLFah4K1oOWOB/G5idSZHtrCydCaaqD4I3KDZr0dbCjl4YPEFg6LD2
KI5eJFjqhM4DPAnrLQsbjRX890q40klIC8sIqyly3piAXcK5U0/mM+hiEheR
vtpZ23GZNSUO3Ub+EEhDhV4fCXwow7frHKbJ1KchtUsQpBzbcbI8zjo4aNJC
KnsgnToimXDVNsSYFMWAoTXZLgNXj/XpJl8sCjOZfIVsVFeLltZnMmFNmUWa
slo2xumsBCOOHF2ZSMs16xSJ/l9tXpPKArdjSL6QdF+gvsc8bY3hqHel/h38
tx+qyZjDnDLvajphK79uyB5DXDGZnDKtH42N93GS41QjI+NMQcLEpO4sRoBd
OUGVHipIVfOsE4F1tmmo/mJrQ7TH0VknLhBd4VKisAUqmGmZgTeTge7coR3K
RXcHtCPzUpuCyAwM3qxjpiERsXHDvD50K/gJVZY7xr1Jwe60lhYc2a1nP3vt
o9Bn4HpZ1mdZnW956mmxA1JYipk7KkRM1hijOT2YjngBsRPwYMNPLBEbfOQC
33uWblmBorkHGw2UdoLTt+SNn4Jac1D5TWCL1SAyBTwbiIGEi3ANJjbfhY3d
6w+k5c6tm+mLySz5fgeh2twsFmMEWYBuyBqwX0IZp5wcYwF7YziKwxQBR0Z0
2hMfyNXqIZ8E45eVoaFiTgSUZ44X8WEbDtzxE7CvuUnLpi9lXQ3qlKf2iaMe
Zyfvun0C+6iqgsVyyIVbphkvR2w3gLCLAml509fJ5NA8QOHda3A9149ZXl59
5zyJxkPHLpjNgBc6rPwH/BwwBwbDBtYkc1D5BVhfHIkpqVG4mkKgttlUGJc4
beE6qBamsA+zp9CUqKEHWdUZGshrdP4kOKIlx1W9Jadk7827q2vM0+Hf5Ke3
9Pny5X++O798+QI/X706ff3afdA7rl69fff6hf/knzx7++bNy59e8MNwNelc
enP61z1ekL23F9fnb386fb2XkGSEVjXlmc5ZWuptbXCeKREaVCXIKD7z/dlF
cvQ0+VlSJn+nT5gm+TvQ0pTcTVWivNJXYHzg4u3WgOcMj2P6DlQXME2BPAJ2
ZV3dlskadAuS7SuwfDAMJJ6dTL7+WtKoX399kpyCJlnWxkDLK/AjUJmL6toX
fWEW3Htbppt5vmpxuSHGD3wdlEISVdvOfwFe/xN6iBZsDsoRsEJGMg6aEb6m
3t1DpUhXQJhhGimwiCRmgMXEsAArQnCXpCsYIrMp27eAT2AA6EuSVfSmkNQz
3btJfsYkz99nOHPK21zxMHH6yEI5ZnthxrASMCL9RoxZojsN7XIH2ODtutoM
9QeTlW4glrYVB0U1ixGsx14mSRniEFttTPILaAMLZGQF8zOmf4IxwhJhVq4w
tQ5TxwJjLMzKDQrURgshcyYhO4UgIOMUfMCtFVAAyFwtZCXgx6IqDf70SwUc
KRaA78MADtgTRUwiRwm9ONLamJQ80HtXoEvwC763ormc/otmoiNAFzfqHRZq
bkCjLwOrJLQMR3ahD+EQVRRCExnyEVi+h7NJ2ImjkvaAzrhIDoZvlLxy12gq
LHQ4jRGqgjyj0ZteqZPhBBsvM43H/drI/kDbwZQf4tGKQyN+rLh5NlfHJPAx
f74/H8tEIr8DE2Jovnj4dGlbbdvC+wlEBArCvHsV2dIv6zB5Dw3kjm4wd1jR
G76Gi4NLr7fi147vy7y4SXeo4sH8MYc0qAEWoMZwlVFPI2289x6y2YNHfYHu
JbNRUs0x8ocFheaD9Rly//cTk5PobDEjeEOij/oVPj246xe06KqJxEnuRDag
1/IG4+0cvHDMLsEMk0dmtprtU/WIEwoVyTJViR4/vP9TYTKevTIchRuOkJR8
2GzSGtQFeeQb4k/oje4rJDbebXOsdjmXVfiZJezB43FszlxDT8+LKvukxJYE
DOkKl4kiU58ycz+wL7LdXL3si3u/HBpIT+Db4VTRvdvT6pMEltyRHfIUQw5F
mRObsUE/QrKWpBfjSDMc1JXaeVVIro/agBdkNa6IsyVpo6SzI+GVmqSBIGk4
aRCN6jXlzXhInMgL83VaNeCBaKxjnUVi70RHS55MnLeLk2LgtRsMhqNsmFf2
0cAucNQ4rrOoCWf4DHZQ6tBoxuR1UAgPw0MiZVpLiQKzNB4wef9Rz0xQWSZl
staioFta9dArR82BDeOUWPc5luFsbsNMD4MFRdjjiNY6LdKCf+SoGDDBI2ll
X9rYpwTiJ/xAeWizeNw1A8ITUW8vXc5ae9yiw0MeOugGcqRdn3OIrzaUNyXK
Op2psRR0XCB5w0w4SbZmNqOuL91l7RoNGAj7LXo94C3Bcxg2odMtFHMD2fXc
6ajp90FE5ObFy8PZG+ILTk6wiOvaCL33E5khmWsGJlAqqJJA/L9aY7uhmCw6
6yOqT6ES9YqIJAmH808mxZMprCJ01FRZRRbDyRx1S3ZzSmFPlCrn5Hffw+hU
jVlXX51dnl6c0+BI3i9ZKBO4iNADSWPUGPjTCOgbzhhGQH7HuJp44AiwwkaS
/f3by+QtrWlyhZGNRLkvS1IbyFPTIOMlBQPDyylqxpUrKEgHPuVnNUh7c3qG
4kd9WA4inz997odB/R6xqNN3H46LNaC+1A3CXqii0GmqU1957+orA85np/gC
AlTLHLZBE0H+8q7yTI/gHRiAzJQs8dUnc6siAm6ZQlBU/uemuTWmdD812ofz
6ZBB54byHS0JKes8eCYUMzVCKGrApcA+rNgveXKUQ3SS4JQf3JxDb8hMILYB
IXRYAxU5WmGXqDOcm7OcC3At+KjrDSzmRjJYXlWAdc23nD0r4Ge2rFGckWGo
xBkrCnhTUh+lwaXQVQxynLhOrH7jwIczbaDPXlBGaXAEPkfpC6tAmIULh4Ca
rJc4LcVKC7E4mFNDvoRGlDUCCUHJDMv84kld+nyZU104ZBzb/cgO0RYwUnQy
mVZbf2OR3iaSF42hHiFZMMonVXA3XEP1ABhG/BdhAqiWygVLiCnXFI64yke+
Wgt7aJ4hHBnnyi2FrDbGeoR5B0J54OC+AKpBA353RUQgw+M8IiGTz7taA5aI
Mtp4C9dxqc6SLoHUaS3R54IsTBQo0QB5rJc4Y8mr/VDVq6oB6iiLETlwnqEV
JXd1nd5Q0SOvOzwPS4+15WClLrURmCxw1P1tV3OpKpaSx2LXFvSFeBL9XnMU
d+Z+ZltOmafUI1tkIGU3peJGdonr23UG7pk8hGYZ0B85qyv1NVYERogQcMD9
HZHbO0JoCoB8LLCfUC4ZLTw4nPB1A8oOYp8p4g7JL5FKXDCo1+ntsi2S71MJ
CN+WrhZg88+SUkJgYCnghsCMxIOBO2BlCALmSy+ULQL7vy8tVfMiX0kkfYMZ
VvYQwEmyLmPVpPbTvuSzQKWi9fJ3BYkbWDKqypLiDoO7IISL7gGHikJaTnZr
+Yqd+Qju4ZAzxsbmtw5bYw/rAXWyXpWjB5OJu/8DCJkhQyd1T0ozBKU4V4Ib
CfO+0kx3TOavv37jADA/EOaFVPBAv2TyFTuxrNo66JzRMieTafL11yaKLQTc
6KExLj8eULlTyKNmtprR+ZupK4G3EHzOmfOxKmMSluw0Hid8TZJQ0wuXsbm3
7eFkmlQoqTHpndMv1EngLFIAmmGNvYcToWXycB1cibcKPvILcerzYoJIwmya
rgKmo8loCdQlghuRcYT7qzKXKj1J3Q2VQXQ0ApV5d/n6oWiqryjKEb/ujauZ
TSbjPKOlUoVbBHGiqx0ybAbtwwo0MJX3yFG14KiC3iwMW9tHC7NM2wLzD5/z
TbtJvkk2eQk+gH08A6NMMA3wf8LYTiqC6B2IgJVtUYSDAJK06F22ITKEOJHy
FOrQwp09Sgw6skOQM4OKJCMFVOdZoytFD/qMxH0ObuTczhLKetIPkqkLfGX1
0DUbAqZzhfmaAGsTlLOphEEJWoXii29JZqDYDYI8lFpsH+22Ksk/abeSfamG
5iGE43xH8sZxp2cgZVydAEX1OP4mZhDHzglLsI5KgT9AUNRIr8AWT4NrdNNJ
cvx0ukYlFoGTqHhu4SFFnQJTWCz4WHnq2+kC5G/gGVItr6vbgZ6eHI49BI9c
sJHkO5+P3ylyJ/KuqbhzDwcDphvXBo6Y+WbTcvU8KJYn8wqE793lefgE4RMo
BJEiCRXGzzuwBws0LBYe+QAyi7qOHJWVQpBI6F9dX1/QD67mFJhBZ5+cXSRX
Gkv9w8L0AATVPUCBP4QPCFGaf6TM/2DY3GzMIbrStkZRHlTyx1A9+V9Xb3+S
/Idkk63PxYdGM1I7aNNGkYTUuBg8en4JAXJ1y5XB7bQwN8Z5B8me17mIESBj
jR9Yee0xXEDt6V6f2aiz2tD4Rz0jxBSQUSUqainDGlVWCxnOOCzmzelfHzil
ZI8s8Idq+UFkDqfD+uuDqie8JL18YHNLk0fLujc+CAFcOKzqFsWoRmSQ9/Rk
EISXQHiiW0TUh71CRyRCYTVzD+sfMvC6UdiGS2/taT+U3fFZUU14iivwXn04
ytq5heYJhivPzcWck0b+oXMaJb4JPEYaQ4im6iSnR5gGJZzAJkFunRJd3iaC
LAwhuWk6DIoRzpM8+4htw9kOtoNcBVKIVW0wjB/RB/mIn2RyhhzQjveyaGtZ
rWCN5zvRstsKVmInRVRNVUfw378otYIRMfVhtjyE/YiauXVJJsxOIkWDcWEg
Ch5L4TL+xU7LD7MEN1mBxuoj44STJenRBaw6P8sr6cDfwp1UvOYD1PE1FaA7
TTVQoAOr0x8a8YakMDmj7H1OXncaeoryL5miFENkqgkg+/jUqU9OxmD5LDPb
ZtyflR7mJnZt0BVVqBZQOzOwGs7TRQ4QN1hl8E63AOWvp6eGpFDqOmnsCqgn
GNZDup6GQ3QhM5beb5AbuVTD7NjS8sTOxsjKqHuCrsMVxSjhquiv4psEXnTk
P6lFjwObdYrZAJHX8TDKGU/vN2mGF7GWxAMdeKdnONBFy37byP0r9LiTEjjh
DntN1Q1MUqSSI0OEKbroO40sHfY/THB39Z9Qy3loaeCj8eDHFtNyOpUgqukN
bvSUnKbHanL0HvopAoLAtqVnjAxQbw44gGuTLrBWRRIO5GSvkQfkR3GTE0cy
r/uQh3EXGoHhbjZmdXYrhq3Mr2G8D+xCYIRu3I8MDOO7I48wYmU01GJHhCuG
Dt2gqQnsjRbOxi6XZ2zetOUb4SeBYz34C1eGdJ9bhH7hgb0qYXHnY/2LySJx
p1DlDagkKl8MeWdoAAOlgmNNNw5jwk1TglQAEH5qdbUJKlG6EhUjtoIfBPww
IAQ0XycCXxZ7d9azE4qTbhP4Sm4DsJOoH0Y8SWkc5l0uNppR7SqAIAhTXcAh
NWW/GdVfkN0P9Y7TVKWL+FliepE2zeZcg2fhj67TGjIK89ROtstx3oVUn969
T8BN8MRKjK66hJR4PlQTdkSCBOHXfRR0RvYJ9yIkBRjgBr2hJRXjCaOJkF7H
9YQRyK0bmu7/44b0ahAUAcvoLiHmfMoGzbhSGz0DKhIFxXlsmoqNx6otu7QF
uzG4QyUoXZgQ6R/DBl1mCbP/XNbSxUInu1VF58MSnwhBHzdAYvvESH8fUJz8
5r2PUlqUbKUvNZ5MKNU5mEnBLOV3z54eHioDJI+OnyaYWrGPkykWoLRgtQ88
VYLXk+NHh28Ns0qWuhnOvWA/zw6ffhd29C38snPdCHzNP4YEbEuX0eLk71CO
Bts+/ub58WHY+JPDqPWV1ECz1kK87rcXekyEjp9TOgceldG4Tr799ttnUSfP
407KqpzSUpGbG42ey10V3OLAaa5iA0IQYW7DqgXeLxpbCjKLCjXhLBn1FXTx
O9HvEiZZqbW2hurgIfdhsu1FJwHXTbVETPcIaz/7tLl/n/fR7yfgBMweQ0OX
uf0U+MmdTSm+7oQkfxswLu4ZQrcCpVV1RKR64P53lpPQcJVRDxAcZlSuizzH
hSlgaeD+Mx+a6F5Nt++U5xdWVFzQ1dUfHDiOObvifIvx7ygVtSKhwpfUvd/2
RWhOI06DsysWNFzDxg7ZhK2DxHHRdCn2w5Gh5eirZ0mKQAhCEcG6KgPcnniE
cyDoIBEHA5rmNldHwKnvLs0wg4i7m2xLyhNrm+NpMcYvDkQ/nfSL2DbP7eIG
QYQRezz/BApSoYYjSMhhgiKOkKwV9gxE1cWXDEWHCSjPT/nNMFiu1KJKXn18
xOcK5fKp9s5OaV4iX6/BSTFELMCBReY274N1ezCvKHcoPaZYDkeP9j4Sg+k5
miWIGFohJgjUT4iYZJkbq1iiNazlOd5XdMXbt/yjEo7iRD8eoA8KnuVHcEYX
hIecHGPX59ZieUiwcdTbxT2YVkp2BCESj0J48gk2+lJS2F3M4ilqWzu6Zbqj
D6TDxKdMJk+x9StNTsdoy1dYbTN2gH2CxLfuQJIyjmbmO0RHcwUWJq7aCE3V
BWIjJFu6PMLOQfB8oRRW+ePHj7+AMZv8NkkoO9oQ4GLvJPmNDtrYS4sVfNl7
eXX8zbO9fb72KccbVLynOS5UPf1kdlP4Qe7JIBiEe1J/zNRBeNjQ/8BO8VyP
3/H+vbYc6FrVB/fW1uVJ2+aLE9etbn6ptU/s4APeE91P3fZvpvDuA8VbcPuh
XGWf0F92I9ymu6JK+6OzcOVnOZPkN/mLt3NQhANxW4KlZ/qdGQp/llxa+KPL
XuLvx4fH30wPj6aHx9dHxydH35w8Ofzbntz7O/39u4w9SPbyc8/8c4eH8P/f
dO69tFRwtFR45BPdR6s0+R05JWZK0fvODWCeJUibl7opCR3LNcrCx4u3wKVO
5un3M/bAp9e7LUG+P4Zcg0fE8G3fVwtCJgQsnXWlgG68pKIow8ePD4+4HqYy
C+bzyeETvlaoGFJByO7KLMhlymwkjnsf+zKdSf340s/p4DcKqoHlfv84MJzD
geEcHzw9fCp5WSrmHqD7uES4kKMp3w5tVUX7rxqEWrxgMDiQfJnE/bsl93rN
a6BAm+WyK5kDQrUBbNMx7da1A2zN9eAN2TngduvI4v53VlKeNNHdSqKp70af
8KuxJ6f+/X/XYFKLuF+DPbk+OgT1RZpoUIP5wX/glD/NGpTUB9kD0J/lhwd1
Femv2CXsALMkodQH6iBzSzFlMRxLqM8kXkDiUf6uR9oV7Y8+EidP/R7Ljg/E
SZx7F8ekG5KSnUcf9vr1VXI0O0axXecrCGPYxznVrTcgZZ3eg3Jm6u8itFwv
m2M6biq7OOzLJD+keYGHUhBMGcJwg6fz7UT6XYzelmECe/INNvCene3QrXuv
CVw58pGdOXYR2U+N/DJS0QvsffIMWzzjtDdaHNA4tJOO8czZuhMOKJawk3Vj
1Lm4XC/rGuj5SgBS9/jstWlAKCO6Ur5dE2jVQiAd0EqWw5KBBwv+5yZ5QQdg
WueTdb175gxJAD09PMQJvUkL2Yc7bPaeHvIuinhhtf4utzwhdGBgobWeeZNX
hbduYAZC996bA/rx+Dm1gtN1gH2OLqWfb7gfF1FwtbrOqZQpPEHHC2FpQXJk
Z1Hua5zwWqIP4G18Gh4lsOsbxmprtVNISBsPgo3VbxHei8foeA7xu4tptghW
c2ezKIkZeK074e8QLr5PCi7xZjtQZGihuT0EyySvq9VKtmO/cfUi+gU3bxS9
I4Y0405NUOrn0lCugcON4SEJckzu41XPjSB+o3CKtv111CKXeAg8MVjLKAXp
STvJ8HFl7BB53wnb3PZB3SSmJJolL1PeTO8akhBZYRkCnpChSKJcI8oOepLx
62B4MYmrj2QxWJQfQRJBPH8RTQATBtpv7yAinQJDcLk0pmfC0eljoRAFoRqz
gwPlWz7oAtXcnDcC17Q/uaUvwXE4MRaQ89eguUyxZHfwM2bHEEquhWE/CvG9
gsLVhvardqqQ7lgLG5xwwCljXxoM6jFgKtA44i6qDmotHpFFCEGfJrrXUOPg
WzP3OQ8YwqaaI54r8NDCcRnXuuy3uYPbMCK2jfiug1UQrWwvwLlqaMi604zH
LRYpdedSxiob1wcPpEw6p1dqFmKX/KxHZUpyhrmuCzkaxmz3EDi3qd/bStvs
YgHp4QiyDlz7T90sCnuftKOSnKCNVhVl9ikRwvCOhMFcquTR0IrrM10Uz3DJ
HiMOBI0xQZak83xuJSRW3xGwNp56AGNxOzB4XyOey+NLuZTaNrXsViGAQF4O
gK362sCT1vGf1x90nB/vchucqYXrUrZ0T4fwTyAy7zq5i8K6Q9Ttp9amil0o
m8GomHWHwBg9KGKodjnR+6MeiKlSG+LPw0yvvdc4KEWEnvuJQU0fKPBUzo6g
/jxQ37F6fCqZ42YxGXHzPaOhMY2isTjecoajv9FcTIfEOvpYJJWkiPrYqGi/
uSut6X3uDJtohGGgBRbOnVwnwE091oQxg+BPrYxDDa5TDLOHwJvAsAxhCw/7
0N2RclJ9LjB8UUU4/WjDjt7epJ+rstrg7Swo6slJFnx0D24iMdFo7Ut1Ly7D
+EmpMeTyvn233b29vXNdH7jBN0JQ3TnA/S5/R95DXNaLT8Nx6yD+arPY0KY2
POKeUDe6exaenKKLL6PVEw1hTRvaA49hMqez8JdfGdgjjdDR+th6mlOgcI75
f23TfZTtbljzr/kCI6uxTVaXCuAoinxFB+pjm/CJm+Vdq1SLGekBLkubZK+5
xIv7Sncl0KhhVKJzIazB3bUcTuAnaOn7Ni8Y3c1XKF3L2JQA+c2/weqDIWNf
OddD/2X65+4lAFidJPVjreFwLC+3LR9eg8MGUp+eH7x5LQMPyo3j3JpbUeVd
puhZ/D3/lPNpGbC6l+YY14DXHWJWaYeIFQxc3tld59tiw9nVeoGQsyYNN5GA
NCPMGqE/d09OTtGB8aE6osUnpbXY7D0GbfCSs8hdhcwyNNrqSSfT51NQ0sEk
SjyxfuWrAQVPPNXopwek0yU71FVOmp58gGoiRc7STXeuc+Bp3BWekYEXbPA6
3yZ1i7Wgf0KP4eZ/g/B6jFb9zjivurH4XqPH68AS/re2LNBFCqDDFIYs2IO+
zemEkiHb2WVSbzwcEN6dsbo2gdMaHWISeKn75OLh9tNaT5jjMIgbtkkVObi6
XcQRG7W0x8JySBKfr3unV4/knq5ElnV4CHpuFeutmtlD21ydHWjud4UPQN+S
2GPuCnxKJ5CII07wO3mSYeCbyjaeMDcdcFmTfiLHGzw6o3t2nCf2F3+IC7/E
xefn76SGWx//fIAQ5x0dxMsDO6kx23vHeTFCjMAlcmflNJ2EXOvAmHGSpwfA
yzcIZkoJC08+GYcYwWl/d2K7xB81KXF7WBcP5h9FEy6GDLfO67kPAUlCAOlQ
BMe77UtBMbpCydxkyAUGGIlWfASXF6M9AtQBI/TzJR+0kaUlwY0CIoGRMo0c
j4XYZQ9aZqiknB5nNdgbWq2RHQXQlYvy9NQt5Bfayy/77JEZtrlxJzOGhxyr
FyX9eLbBdaHGNb7zKRyP2jCSEY4O3wkxYXpMe3SWqXp68Vnn8d4cK0jn4FyI
3pklw9ttO/AN4o9N8JQ/YIQ2EfgtQHTIQIQai0400UWJgl5if0oOeu3jzo0M
2/Jnx6IkLVrOoDA9hsC2vN+DWCAt8KyDnffvVUxHgbijG6rkkJRI+QwkbKMp
DmsiRw0f4CtMCaxbxR67O3x+O0QSNCEB2+ZhpScaAb4wZQmdjgP7u4o0AhIr
5jhwyYOJ+EF6+8LVAD48pDabCkWItzKGp0+RkpPdAB635E9fi8yuFgmLnaZt
mMHjAgfx03uPYxk2Gw5iP5TRAK89/ewx0qomadujzdZmk8Yb5XIbC95soLLR
Ey+iyy98GgjVrsPctqEpbVB0VsaGAXoU1gecs5T6VVf/dW4ZQw2iUKm9uNvy
BPYBL1MMyH3LLtRYkmkfG83GbdGP7NKCtXib27UDfGt1ZedmlTxS16yEe4CX
ySKBpFiFDIq9DZn+sTsbIS0pQ9xrTFGMQ6/ZeDwuKmpLmcuBRDzB2qAA6WG2
Fs+eksPX66pFkNa6qvrHVSjQgLBhLCHpTZXrK2EqqycwDb6GAndbRbzCIkEQ
PcJhBycKyRmsURGwr/U16yiHs3a0jXuXwo2gNsa3LXVlYtgh4Pqq9rYBHZk2
GWbxVr4IO7BZq+eZBv1KY441yLLmbLf4gP9x7S47RVVCw4PaO6+RwA76Cm2e
Zp9uOTG22cJEhfzxK1Y6EjhLfjK3ujlWtnemCzmGakh/RCDYOVi2T4E35HkK
xDPPvkjhCxVKiLkaeWvFbZxBF4NjPvM2NHnTBh8h3Is2+mujncvOEj2tqlsx
ZazAuAL1KWMHZAmyWnw2heTKwxc3DDF/4MsNS5rfYemOA/SesG7XIVbb5IRV
RO2EWoLO4sKnbvK6KtW7GN62wrPogjU6cAmeIWIlQl/d10h9YNuBRIRuSEUB
D97fllJD+LVTiIdgRkq7zu0OPMsHuEfaAyjGIt3xXZ/8EWrCaSvc06LlstAI
akIoeBlWWfE2z/4JM/O8DG21N5FhdBAecZK5XTI4ky9+xcHkD77iYPIHX3Ew
6b7i4P/+n6OnyW+//Zu85eD33+ULvugAvoy+6WDywDcd/Pt/FJhMnT77j/85
mUz+8Y9/+PTWA/Ga/yRaU7BeNUHbCNaqmxD1a3fPGTT35FDSaApnE8h+0BNf
mYUdys0HR8dPpFsCCCicTMFkD0jA7btbsayPL0ClSviHMPxmyNjv+3HbbV2M
0UPBcaiUZtvFst+Lls0+UNpXOpgIHq2Pj3OdMpSA8XWuUbk9BswNjvm+x+PK
zxc14WpFfk6T35H9yIIEB5nwmVe6902O6tCL/XPFzq/eJt89Ozy6o0jtcmu8
7yY+Veyc9rfq+xruPjasc2hY9KhiH0b2xI4cEdYvQLINJmpGihY5hInSOR1M
yjMdkcQuZDNJM7SzXfUSFzRi+cNnX8iJE3RMFRBSs+sol4/llV9+S6bf+xXO
U2Q2GIorMHcMZD/w4EXS475Ph6E84oR0zn+L0pF8krAdziiHRWEpcxHhscvv
q6ow9FqD3il1MvNHyOo0dJdPXgIF+BJXAh6H5KCCEVOzW+cNF9mR+oG118eS
JELCuNnGGAGNd0J8kzP9dCDyXztkcMI0ImL9lDrChfhRwczzEPiNSQ5G7CY3
pE73e/qP6QcadYiHBEygBvYRF1fD56n3x/TOQILBdLxTeUVIqHwQ8B9vF+i8
vlVgv5ZbpOwzY8o7xdTuoTv0em2mrW4qUHYloJZxixuCkbovGBg4cjJ88Yjg
6oOSYjR4JMQrrAZVuPORBqwdBe+KZ/idHqg9eMd1JYdSDL8Gkc+dRwooAPlc
+H0QKcH4z/A8gPCIhHFlTNDkq2BLevxe1X6zTkV32w0VdZIwZvkFQxQcPsKf
0MjvHzBh8kkFjViQkIKsxmQTlgmPxCftyo33IFRqoQiXfLron9/JZocj/Gz4
HQiiIp2EMyRZH5L3+8mRkpwqCri0uuPsL87VSRn1HSYrOvsg1IlRq6++Xd3c
6WY92O2804cc943u3Ddwx76nh+568v7ZmLd5hwv5RZ35vQP61igUpr6k2v5x
SHIyhZ6y2Q2jVWAdAN4dUYcc81LOgCFQfHSIWojFY8E8I78gZvv3Hiymfa9T
W/7JnaXFoie3+Upr0Pe2e9Il2WfBqVHuhGXOTcAjPKXZO8XGSxrLIM9Ca4Hu
1Rzny/6OjDxAX+53d/DyoyyKp1R77SgUVMgd/wKE0b1ojBP1JjibAe3XKFK9
+85ajjBt98ytL3obqEt84B5c3rHOS9N95WxQGx94+2x48Bzmw7BeSNB9Tpvh
iQByJjQfDCCHsHPoS2cEBGedj+Qy3Pnq0bvGh9+R7k9a3AUU2aex5eGUeTMx
7V3L9RwookCu7xNp6Ejvbpqej78kPCSfg8Qv/qTTYOMKLp9UHxBIHIeB09Zf
RMVw9zIGeVeJHjRC4/FFWzr8Mm6xd0r63Q3LOejhQekDLBR0MXAI/d09SFE/
9FLF9eJKctx8//D1u1vHvHzddAjjwGh9KMP9LWrZPmBDQpegWg+ShchAkl8S
aM7WvwNCUm9BbTZ+PwO/tWhwL0XjXjdDmaHgtayEo0gt1U0oacgZyviM987r
Y51mC97BfUeW94507INevh1OxL34QAd9MrwfRE53RcH48iTzSII5OOnjX5Rh
flhWGfodzCoz+hXu6uKlA+B/7zAGh+zn/Eq0TWgy1tMwc921d0iERukV1aw9
PfwLG8kybGTvE/J+XpgV4jV541HBG4+C4/ZUcPjFMmmw1pEp/Cr5SQqLyqae
NaLke+T5DG6hG97IOEIxX4fuIvc5T76ubFOmGzO0uL3Mf9jGNi+J1fj9Rjkj
anWgNOHOS1gmwTKQUA+xY8qwrvvXX9gT0+r+vOPxOWgtap3Wi1u0kF6OqwXB
C3Ee2JrgxPm8yjUdU/MGZrdKdQ4jhZXBSoRWHeRo6V7BgZaAaw73LiCx1kAd
OSy1SLXjIWtZR3sRgzbSOQwTJjqdUrFx8v8Aj/PotfSNAAA=

-->

</rfc>

