ࡱ> @ ojbjbqq h4>l6666BBB4h42P p JJJOOOOOOO,Q SnPBJ^VJJP66  J6l R Ov6666JOFX, "HF D+bZG(HPPGlYTYTHProcedural Requirements for ISPS Code Certification  Note: 1. This Procedural Requirement applies from 1 July 2009. 2. Rev.1 of this Procedural Requirement applies from 1 July 2011. Introduction This document provides the Classification Societies with the methods and criteria for carrying out Ship Security Plan (SSP) approvals and for issuing International Ship Security Certificates (ISSCs) to ships following verification by audit that their security systems and any associated security equipment comply with the requirements of the ISPS Code and the provisions of the corresponding approved SSPs. The Classification Societies may conduct approvals of SSPs or amendments thereto and verification of SSPs necessary for issuing an ISSC on behalf of Administrations. Certificates will comply with the format required by the flag Administrations. 1. Scope and Application 1.1 This document establishes the procedures for: (i) review and approval of SSPs (ii) verification of compliance with the requirements of the ISPS Code (iii) issue of Interim, Initial, and Renewal ISSCs (iv) intermediate verification (v) additional verification (vi) withdrawal of certification 1.2 This procedure is to be applied by Classification Societies when acting as RSOs on behalf of Administrations in the conduct of SSP approvals, audits and the issue of certificates in accordance with the ISPS Code. 1.3 The scopes of the verifications carried out in accordance with this procedure shall be restricted to the Requirements of SOLAS Chapter IX-2 and the ISPS Code Part A taking into account ISPS Code part B/8.1 to 13.8. 1.4 For minimum requirements relating to non-routine ISPS Code certification scenarios, please refer to Annex 1. 2. Definitions 2.1 Auditor means a person trained, qualified and authorized in accordance with PR 10 to carry out SSP approval and audits. 2.2 Convention means the International Convention for the Safety of Life at Sea, 1974 as amended. 2.3 ISPS Code means the International Ship and Port Facility Security Code, (consisting of Part A and Part B), as adopted by the IMO. 2.4 Ship Security Assessment (SSA) means an exercise carried out to identify possible threats to key ship board operations and the likelihood of their occurrence and an evaluation of existing security measures and weaknesses in the infrastructure, policies and procedures. 2.5 Ship Security Plan (SSP) means a plan developed to ensure the application of measures on board the ship designed to protect persons on board, the cargo, cargo transport units, ships stores or the ship from the risks of a security incident. 2.6 Security System is the system in place on board the ship which implements the procedures, documentation and required records which are examined to verify compliance with the requirements of the ISPS Code. 2.7 Security Equipment is equipment used in the implementation of the security measures specified in the SSP. 2.8 Company Security Officer (CSO) means the person designated by the company for ensuring that a ship security assessment is carried out; that a ship security plan is developed, submitted for approval and thereafter implemented and maintained, and for liaison with the Port Facility Security Officer (PFSO) and the Ship Security Officer (SSO). 2.9 Ship Security Officer (SSO) means the person on board the ship, accountable to the master, designated by the Company as responsible for the security of the ship, including implementation and maintenance of the ship security plan and for the liaison with the CSO and the Port Facility Security Officer (PFSO). 2.10 Security Incident means any act or circumstance that theatens the security of a ship, a mobile offshore drilling unit, a high speed craft, a port facility, a ship/port interface or any ship to ship activity. 2.11 Security Level means the qualification of the degree of risk that a security incident will be attempted or will occur. 2.12 Security Level 1 means the level for which minimum appropriate protective security measures shall be maintained at all times. 2.13 Security Level 2 means the level for which appropriate additional protective security measures shall be maintained for a period of time as a result of heightened risk of a security incident. 2.14 Security Level 3 means the level for which further specific protective security measures shall be maintained for a period of time when a security incident is probable or imminent, (although it may not be possible to identify the specific target). 2.15 Regulation means a regulation of the Convention. 2.16 Chapter means a chapter of the Convention. 2.17 Section means a section of the ISPS Code Part A. 2.18 Paragraph means a paragraph of the ISPS Code Part B. 2.19 Ship when used in this Code, includes self propelled mobile offshore drilling units and high speed craft as defined in chapters XI-2/1. 2.20 Failure means the non-fulfilment of a specified requirement that does not compromise the ships ability to operate at security levels 1, 2 and 3. It may also be referred to as a Non-conformity. 2.21 Major Failure means the non-fulfilment of a specified requirement that compromises the ship's ability to operate at security levels 1, 2 or 3. It may also be referred to as a Major Non-conformity. 2.22 Observation means a statement of fact made during an audit and substantiated by objective evidence. It may also be a statement made by the auditor referring to the SSP which, if not corrected, may lead to a Failure in the future. 2.23 Verification is confirmation through the evaluation of objective evidence that specified requirements have been fulfiled. (See also 2.26) 2.24 Recognised Security Organisation (RSO) means an organisation authorised by a Contracting Government in accordance with SOLAS Chapter X1-2/1.16. When "Classification Society" is used in this Procedural Requirement, it is always intended as "Classification Society acting as RSO". 2.25 Ship Security Alert System (SSAS) means a system installed on board, either interfaced with another radio installation or self-contained (abbreviated to SSAS-SC in this PR), that complies with the functional requirements of SOLAS XI-2/6.2-6.4 and the performance criterion of IMO MSC.147(77). 2.26 Audit means a process of systematic and independent verification by obtaining objective evidence to determine whether the ship security related activities comply with the ISPS-Code and the planned arrangements of the SSP and whether these arrangements are implemented effectively to achieve the objectives of the ISPS-Code. 2.27 Any capitalized terms used in this Procedure which are not defined above have the meanings given them in the Convention. 3. Criteria for Verification 3.1 Criteria for verification of compliance with the requirements of the ISPS Code shall be in accordance with the applicable sections of the SOLAS XI-2 and the ISPS Code Part A. 3.2 A Classification Society performing verification of compliance with the requirements of the ISPS Code shall meet the requirements of MSC/Circ. 1074 Appendix 1, paragraphs 3 to 5. 3.3 If a Classification Society has been involved in either the conduct of the SSA or the development of the SSP or any amendments for a specific ship, that Classification Society shall not, due to potential conflict of interest, approve the SSP or conduct verifications for the certification of the ship. 3.4 A Classification Society that approves a SSP or issues an ISSC shall have implemented a documented system for the qualification and continuous updating of the knowledge and competence of auditors who perform such approvals or verifications in compliance with PR 10. 3.5 Only auditors who are qualified as required by PR 10 shall carry out approvals and verifications. 3.6 A Classification Society that approves a SSP or issues an ISSC shall have implemented a documented system for the performance of the processes involved in accordance with this Procedural Requirement. This system shall, inter alia, include procedures and instructions for the following: (i) the establishment of contract agreements with Companies in respect of their ships (ii) the scheduling and performance of SSP approvals and verifications (iii) the reporting of the results of SSP approvals and verifications (iv) the issue of interim and full term ISSC certificates 3.7 The entire SSP approval and implementation audit process shall verify: (i) that the SSP and any amendments are appropriate to the three security levels defined by the ISPS Code (ii) that the SSP is complaint with the ISPS Code (iii) that the SSP is being effectively implemented on board 4. Obligations of the Company 4.1 Where the verification of an SSP is to be carried out by a Classification Society that did not carry out the SSP approval, the Company shall provide, if requested by the Classification Society, a copy of the SSA report and the SSP prior to the audit on board. 4.2 The Company shall carry out internal audits and reviews of security activities at least once every 12 months on board each ship. 4.3 The Company and the ship are to maintain records of external security verifications for a minimum period of five (5) years. 4.4 Any amendments made to the security system, the security equipment or the SSP and that are related to the requirements of ISPS Code A/9.4.1 to A/9.4.18, must be submitted to the Classification Society for review and approval. 4.5 At the initial installation of the SSAS, the Company shall arrange for an approved Radio Technician to test and issue a report on the equipments compliance with the requirements of SOLAS XI-2/6, paragraphs 2 to 4. A SSAS-SC may be tested and reported on by the SSO. 4.6 Following the initial installation of the SSAS, the Company is responsible for: testing and maintaining the SSAS to satisfy operational requirements according to the approved SSP; and maintaining on board the SSAS records specified in ISPS Code A/10.1.10. 5. Ship Security Plan Approval 5.1 The Company is to prepare and submit to the Classification Society a SSP for each ship. This SSP is to be reviewed and approved on behalf of the Administration. 5.2 Unless otherwise specified by the Administration, all changes to an approved SSP related to the requirements of ISPS-Code A/9.4.1 to A/9.4.18 should be reviewed and approved before implementation by the RSO that approved the SSP. The SSP and the amendments are to be accompanied by the SSA from which they were developed. 5.3 The SSP shall be developed in accordance with the requirements of ISPS Code Part A taking into account ISPS Code B/8.1 to 13.8, and shall be written in the working language, or working languages, of the ship. If the language, or languages, used is not English, French or Spanish, a translation into one of these languages shall be included. The Classification Society undertaking the approval shall only consider the version of the SSP written in English, French or Spanish. 5.4 When reviewing and approving a SSP, the auditor shall verify that the Company has taken into account relevant security-related guidance and best management practices, including the latest IMO Circulars concerning piracy, hijacking and armed robbery. 5.5 When the Classification Society approves the SSP and any amendments it should retain, as a minimum, a copy of the: (i) Letter of Approval (ii) SSP title page (iii) SSP index (iv) Revision history of the SSP The title page shall be stamped as approved. All other pages of the SSP should be marked to indicate review. The approved SSP shall be held on the ship. 5.6 The Classification Society that approves an amendment to an SSP shall determine whether any additional verification is required relating to its implementation. 5.7 Where a Company has its SSP in electronic format, the Classification Society may issue a Letter of Approval and retain a printed copy of the pages noted in 5.5 (ii) to (iv) which shall be marked to indicate approval. 5.8 During the certification period, no Classification Society shall approve amendments to a SSP approved by another RSO or an Administration. 5.9 Evidence should be sought that the Company Security Officer (CSO) has received training in accordance with ISPS Code A/13.1. If evidence is not provided by the Company or if there is objective evidence that the CSO has not received such training, the auditor should inform the Company and the relevant Classification Society. When applicable, the information should then be passed to the Classification Society (or Societies) that issues the ISSCs to the Companys ships for consideration at the shipboard audit. 6. Audit of Ships 6.1 Audits for the issue or renewal of ISSCs shall consist of the following steps: (i) verification that an approved SSP is on-board (ii) verification through a representative sample that the security system is being implemented effectively (iii) verification that all security equipment specified in the SSP complies with applicable requirements (iv) verification that all security equipment specified in the SSP, including the ship security alert system (SSAS), is operational. 6.2 Initial, Intermediate and Renewal audits shall be performed only under normal operating conditions and when the ship is fully manned in accordance with the Safe Manning Certificate. 6.3 The auditor shall verify the effective implementation of the approved SSP and its documented procedures based on objective evidence obtained by interviews, inspections, review of documents and examination of records. 6.4 Following the initial installation of the SSAS, the Classification Society may approve the related provisions in the SSP and verify, by audit and the witnessing of a complete security alert test, the effective implementation of those provisions. Confirmation that the SSAS complies with the requirements of paragraphs 2 to 4 of SOLAS XI-2 will be found in the Radio Technicians report (or the SSOs report, in the case of a SSAS-SC). 6.5 At each subsequent scheduled audit the auditor shall examine the records of the testing of the SSAS, identify the SSAS activation points and verify the effective implementation of the procedures, instructions and guidance relating to the SSAS as specified in A/9.4.18. 6.6 Intermediate and renewal audits shall include a review of Failures reported following previous audits. The auditor shall select a sample of the reported Failures and verify that the company is investigating, analyzing and resolving them effectively and in a timely manner. 6.7 The auditor has the authority to ask for information from any other RSO or, if relevant the Administration, in order to check the accuracy of the information provided by the Company. 6.8 Where the audit of a ship is to be carried out by a Classification Society that did not carry out the SSP approval, the Classification Society may review the SSP either at, or prior to, the audit on board. 7 Failures and Corrective Action Follow-up 7.1 Audit findings shall be reviewed by the auditor(s) in order to determine whether they should be reported as Major Failures, Failures or Observations. 7.2 At the end of the Audit, the auditor(s) shall hold a meeting with the senior management of the ship and those responsible for the functions concerned. The purpose is to present Major Failures, Failures and Observations to the ships management in such a manner that they are clearly understood. 7.3 Failures shall be raised against the corresponding requirement of the ISPS Code, the relevant sections or paragraphs of the SSP and any specific Flag State requirements. 7.4 An ISSC is not to be issued or renewed if a Major Failure exists. Immediate action is required to restore compliance. The auditor shall verify the implementation of these measures before the ship sails and a schedule for the implementation of preventative action shall be agreed between the Company and the auditor to prevent recurrence. At least one additional audit shall be carried out within the period agreed for the implementation of the corrective action. 7.5 An ISSC shall not be issued or renewed until all identified Failures have been resolved and compliance has been restored. In addition, depending on the nature and seriousness of the Failure identified, a schedule for the implementation of preventative action may need to be agreed between the Company and the auditor to prevent recurrence. Additional audits may be carried out as necessary. 7.6 An ISSC shall not to be endorsed if a Major Failure exists. Immediate action is required to restore compliance, thereby permitting the Major Failure to be down-graded. The auditor shall verify the implementation of these measures before the ship sails and a schedule for the implementation of preventative action shall be agreed between the Company and the auditor to prevent recurrence. At least one additional audit shall be carried out within the period agreed for the corrective action. 7.7 An ISSC may be endorsed following identification of a Failure, provided that a schedule has been agreed between the Company and the auditor for the completion of corrective action to restore compliance and to prevent recurrence. Additional audits may be carried out as necessary. 8. Issuance and Endorsement of the International Ship Security Certificate (ISSC) 8.1 The ISSC shall be issued after an Initial or Renewal audit in accordance with 6.1. 8.2 The type of ship to be entered on the ISSC shall be selected from those defined in SOLAS chapter IX Regulation 2. 8.3 The ISSC shall be endorsed at the Intermediate audit and at any additional audit required by the Administration. 8.4 On completion of the audit, to facilitate the review of the auditors report prior to the issue of the full-term certificate, an ISSC with validity not exceeding five (5) months may be issued by the auditor. 8.5 If, at the time when its ISSC expires, a ship is not in a port in which it is possible to carry out a renewal audit, the Administration may extend the period of validity of the certificate, but this extension shall be granted only for the purpose of allowing the ship to complete its voyage to a port in which the audit may take place. No certificate shall be extended more than three months. Documentary evidence of the granting of the extension by the Administration must be reviewed by the Classification Society before the extension is endorsed. 8.6 At the request of the Company, the expiry date of ISSC may be aligned with the expiry date on the Safety Management Certificate (SMC) provided that this does not exceed the five (5) year period specified in ISPS Code A/19.3. 9. Opening and Closing Meetings 9.1 Shipboard verification audits shall start with an opening meeting, the purpose of which is to: (i) introduce the auditor to the ships management (ii) explain the scope and purpose of the audit (iii) provide a short summary of the methods and procedures to be used (iv) establish the official communication line between the auditor and the shipboard management (v) confirm that the necessary resources, documentation and facilities are available (vi) confirm the time and date of the closing meeting and any interim meetings 9.2 On completion of each audit, the auditor shall hold a closing meeting with the shipboard management, as appropriate, to present the findings so that they are fully understood. 10. Reporting Plan Approvals and Shipboard Audits 10.1 A report is to be produced after every SSP approval and audit. 10.2 In the case of a SSP approval, the Letter of Approval shall include the following wording: In the development of the Ship Security Plan, in accordance with ISPS Code A/9.4, the provisions of ISPS Code B/8.1 to 13.8 have been duly taken into account and applied as appropriate for the ship. 10.3 The Letter of Approval shall be given to the company and retained on board the ship, together with a copy of the audit report. 10.4 In the case of an audit, the report must include the following: (i) the date and time of completion of the audit. (ii) the status of the implementation of the SSP. (iii) confirmation of the operational status of all security equipment and systems on board. (iv) reports of any Failures found during the audit. 11. Responsibilities Pertaining to Audits 11.1 Responsibilities of the Classification Society. 11.1.1 The Classification Society is responsible for performing the audit and certification process in accordance with this Procedure and relevant Administration requirements. 11.2 Responsibilities of the Auditor. 11.2.1 The auditor is responsible for: (i) carrying out the audit effectively and efficiently (ii) complying with the applicable procedural and regulatory requirements (iii) noting in the report any obstacles to the effective conduct of the audit (iv) organizing any special technical assistance required to verify compliance (v) reporting the audit results clearly, concisely and without undue delay 11.2.2 Auditors shall treat all the information to which they have access during the course of SSP approvals and shipboard verification audits in the strictest confidence. 12. Withdrawal of Certification 12.1 An interim ISSC shall not be issued to a ship from which a full-term ISSC has been withdrawn. 12.2 When an ISSC has been withdrawn, a new certificate may be issued only after the successful completion of an initial audit. 12.3 The new certificate shall have the same expiry date as the certificate that was withdrawn. 13. Actions Following Port State Control Detentions 13.1 When a ship is detained and deficiencies relating to the ISPS Code are given as reasons for the detention, the RSO that issued the ISSC shall carry out an additional audit. 13.2 Any Failures shall be dealt with in accordance with the relevant requirements of paragraph 7 above. 13.3 If the auditor disagrees with the conclusions of the Duly Authorised Officer, the reasons for the disagreement shall be documented in the audit report. The Duly Authorised Officer, the Company and the Administration must be made aware of the auditors comments in this respect. Annex 1 ISPS Code Certification Scenarios - Minimum Requirements No.ScenarioConditionType of AuditShip Security PlanScope of Audit and Certification1Change of ships nameIf conducted by a surveyorVerification on board1.Verify correct name on all certificates and in the title page, index page and revision page of SSP. 1.Amend ISSC with new name.2.Change name on SSP Approval Letter (PAL). 2.Send copy of amended certificate to issuing office.3.Send copy of amended PAL to issuing office if appropriate.3.Issuing office issues replacement ISSC with same expiry date as the original certificate if appropriate. Note: A surveyor is not authorized to issue a PAL. Note: One RSO cannot amend or endorse the ISSC of another. If conducted by an auditorVerification on board1.Review and approve amendments to the SSP as required by PR24 6.4. 1.Issue replacement ISSC with same expiry date as previous one if appropriate.2.Issue replacement PAL if appropriate. A PAL should only be issued, if changes to the SSP apply, which go beyond the change of vessel's name.  No.ScenarioConditionType of AuditShip Security PlanScope of Audit and Certification2Change of ships flagWhen SSP has not yet been approved and when authorized to approve SSPs Additional Audit1.Carry out SSP approval.1.Verify compliance with the requirements of the SSP. 2.Issue a PAL on behalf of the new Administration.2.Issue a replacement certificate with the same expiry date as the original certificate. When SSP has not yet been approved and when not authorized to approve SSPsInterim Audit1.Check that the SSP is on board. 1.Interim verification as required by ISPS Code A/19.4.2. 2.Check that SSP addresses ISPS Code A/9.4.1 to 9.4.18. 2.Issue Interim ISSC.3.Check that a copy of the SSP has been submitted to the Administration or its RSO for approval. When SSP has already been approvedAdditional Audit1.Verify compliance with the requirements of the SSP. 2.Issue a replacement certificate with the same expiry date as the original certificate.  No.ScenarioConditionType of AuditShip Security PlanScope of Audit and Certification3Ship more than 6 months out of serviceISSC is not validInterim Verification1.Carry out a SSP approval (if required) and issue a PAL. 1.Interim verification as required by ISPS Code A/19.4.2. 2.If not authorized by the flag Administration to carry out SSP approval on its behalf, check that the SSP is on board, that ISPS Code A/9.4.1 to A/9.4.18 has been addressed and that a copy has been submitted to the flag Administration for approval. 2.Issue Interim ISSC.4Change from non-convention to convention Additional Audit1.Approve SSP and issue PAL on behalf of the flag administration.1.Issue replacement ISSC with same expiry date as non-convention ISSC.5Change of Company name and address1.Request Company to confirm that SSP contains no amendments. Issue replacement PAL. 1.Issue replacement ISSC with same expiry date as previous ISSC. 2.If SSP does contain amendments, company to submit SSP for approval. Issue replacement PAL.  Note 1: The above instructions apply in the absence of any flag administration requirements to the contrary. Note 2: The instructions relating to re-activation following lay-up do not apply to ships for which seasonal lay-ups are a normal part of their operational routine. Annex 2 Application of the ISPS Code to FPSOs and FSUs See MSC-MEPC.2/Circ.9 of 25 May 2010 GUIDANCE FOR THE APPLICATION OF SAFETY, SECURITY AND ENVIRONMENTAL PROTECTION PROVISIONS TO FPSOs AND FSUs. Annex 3 Notification of Invalidation of ISPS Certification (ISSC) Ships Name:IMO No.Company Name and Address:Certificate No.Issued by:The audit was conducted on behalf of the government of:Type of audit; Intermediate Additional Renewal (Tick as appropriate) REASON FOR INVALIDATION OF CERTIFICATION (specify): Name: Position: Society: Date: Distribution: Copy to Company Copy to Administration Copy to Port State Authority (if appropriate) Copy to Classification Society       No.24  Page  PAGE 1 of  NUMPAGES 14 IACS Proc Req. 2009/Rev.1 2010 No.24   Page  PAGE 12 of  NUMPAGES 14 IACS Proc Req. 2009/Rev.1 2010 No.24  Page  PAGE 14 of  NUMPAGES 14 IACS Proc Req. 2009/Rev.1 2010 No.24 (Rev.0 July 2009) (Rev.1 Dec 2010) End of Document No.24 (cont) 6]^ )  ^qBCI (((D(F(G(e(,<,u---;.<.=.d1e1c2d23y4778۴ۭ۴ۭۭ۴ۭۭۭ۴ۭ۴ۭۭۤ7CJOJQJCJOJQJnH CJOJQJ7CJOJQJmHnH5CJOJQJmHnHjCJOJQJUmHnHCJOJQJmHnH5CJ(OJQJmHnHjOJQJUmHnH=6789:;<=>?@ABCDEFGHIJKLMNOP n  !n 6789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]_`gh 7 j ~    tuY%&bc;<@A?dPQRSTUVWXYZ[\]_`gh  n 7 j ~    tu^ !e* nY%&bc;<@A?@rsxyC n?@rsxyCDi+ , |!}!4"5"h#i#w$x$$$&W&&&''j''(F(G(e(f(p)q)))x*y*_+`+o,p,,,-t-u---<.=.//d1e1c2d2223393:333y4z4W5Y5557788U888 aCDi+ , |!}!4"5"h#i#w$    nw$x$$$&W&&&''j''(F(G(e(f(p)q)))x*y*_+`+o,*^*` e*n^ e*n no,p,,,-t-u---<.=.//d1e1c2d2223393:333y4  ` n n   & F n ny4z4W5Y5557788U888]999::{;|;3=4=F>G>\?@*^*` e*n n 8]999::{;|;3=4=F>G>\?@@@@AAAABBCCeEfEFFHHIJRJSJJJ$K%KKoLpLNNOOOOP9PjPPQgQQQlRmRRRRRTTTTT U=UUUUUUUUUU4V5VVV W W4WlWWXTXXXLYMYmYnYYYRZSZb8{;|;4=F>\?@@P@f@@@@@AHHIJRJoLpLNOOOOQQlRRRTTUUUU5VVV4WXXLYMYmYZZ&]+],]]]ⶪ56CJOJQJ5CJOJQJ67CJOJQJ5CJOJQJmHnHCJOJPJQJnH5CJOJQJ57CJOJQJmHnHB*CJOJQJph CJOJQJ7CJOJQJmHnHCJOJQJmHnH5@@@@AAAABBCCeEfEFFHHIJRJSJJJ$K%KKoL   noLpLNNOOOOP9PjPPQgQQQlRmRRRRRTTT *^*` e*n  e*n  nTTT U=UUUUUUUUUU4V5VVV W W4WlW$d^a$ n*^*` e*n n nW^n`W n ` nlWWXTXXXLYMYmYnYYYRZSZZZZZ[[\\!]"]#]  !n  n$d^a$ nSZZZZZ[[\\!]"]#]$]%]&]'](])]*]+],]m]n]r]{]]]]]]]]]^^x^y^|^^^^^^^^^^_______C_F__________$`%`&`'`(`C`Y`\```````````a=a`aaaaaaaaaaaaa a#]$]%]&]'](])]*]+],]m]n]r]{]]]]] $$Ifa$ ^`  !n]]]]]^^;<55555$If$$Ifl4ֈJ l$!7XC t04 l4a]^y^|^^^^^^^^^__B_C_F______$`(`\```````aaaa bPbeb}bbbbbbbHcLcOcPcQcUccccccccc dddddgdldddddee?eBe5CJOJQJ56CJOJQJCJOJPJQJnH 6CJOJQJCJOJQJehr5CJOJQJ CJOJQJ CJOJQJH^x^y^|^^$If $$If^$^^$$Ifl4ִJ }l$5&!7``XC t0    4 l4a^^^^^^^^_ $$If^$$If__$$Ifl4ִJ }l$5&!7  XC t0    4 l4a______C_F___$If __$$Ifl4ִJ }l$5&!7  XC t0    4 l4a_______$`%`$If%`&`'`(`C`Y`\`;(55555$If$$Ifl4ֈJ l$!7  XC t04 l4a\`````$If $$If^$```$$IflִJ }l$5&!7XC t0    4 l4a``````a=a`aaaaa $$If^$2$7$8$H$If^`2$If aaa$$IflִJ }l$5&!7XC t0    4 l4aaaaaaaaaaaaaaaaaaaaaa $$Ifa$aaaaaaaaaaaaaaaaa bPbQbbbeb}bbbbbbbbbbbbHcIcJcKcLcMcNcOcPcQcRcScTcUcccccc dddddddd9dLdMdPdddedfdgdhdidldddddddddddeee e>e?e@eAeBeCeDeEeFeIeeeee caaa bPbQbbb;55555$If$$Ifl4ֈJ l$!7XC t04 l4abbeb}bbbb 9$If^9$IfbbP$$Ifl4ִJ }l$5&!7``X`C t0    4 l4abbbbbbbbHcIc $$If^$$If IcJc$$$Ifl4ִJ }l$5&!7  X C t0    4 l4aJcKcLcMcNcOcPcQcRc$IfRcSc$$Ifl4ִJ }l$5&!7  X C t0    4 l4aScTcUcccccc dd$If ddX$$Ifl4ִJ }l$5&!7X`C t0    4 l4adddddd9dLdMdPddd2$7$8$H$If^`2$If dded$$Ifl4ִJ }l$5&!7X C t0    4 l4aedfdgdhdidlddddddd2$7$8$H$If^`2$If dd$$Ifl4ִJ }l$5&!7X C t0    4 l4addddeee e>e?e 9$If^92$7$8$H$If^`2$If ?e@e$$Ifl4ִJ }l$5&!7X`C t0    4 l4a@eAeBeCeDeEeFeIeee2$7$8$H$If^`2$If BeDeEee f0fAfBfVfZffffffgggghhh'h+hkhnhhhhhhuixizi}iiijjj+kPkkkkkkk-lnnnCJOJQJmHnHjCJOJQJUmHnH 5mHnH5CJOJQJmHnH 7mHnH57CJOJQJmHnH5CJOJQJ6CJOJQJ56CJOJQJ56CJOJQJ5CJOJQJ CJOJQJ CJOJQJ3eee$$Ifl4ִJ }l$5&!7X C t0    4 l4aeeeeeeeeeeeeeeeeff f0fBfWfZffffffffffffgggggghhh(h+hkhnhhhhhhhhi1i2i5itiuiviwixiyizi}iiiiiiiKjjjjjj+k,kkkkkkkkkkkkkkkkkk  `eeeeeeeeeeeeeeeef $$Ifa$ff f0fBfWfZf;$55555$If$$Ifl4ֈJ l$!7XC t04 l4aZffffff 9$If^9$If$$If^a$ff`$$Ifl4ִJ }l$5&!7``X`C t0    4 l4affffffgggg $$If^$$If gg0$$Ifl4ִJ }l$5&!7  X C t0    4 l4agghhh(h+hkhnhh$If hh$$IflִJ }l$5&!7XC t0    4 l4ahhhhhhi1i2i5itiui2$7$8$H$If^`2$If uivi$$Ifl4ִJ }l$5&!7X`C t0    4 l4aviwixiyizi}iiiii2$7$8$H$If^`2$If iii$$Ifl4ִJ }l$5&!7X C t0    4 l4aiKjjjjjj+k,kkkkkkkkkkkkkkk $a$ n ^` @ ^@ ` n^n` 0^`0 nkkkkkkkkkkkkkkkkkkkkkkkkkkkkk $a$ nkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk.l/l0l=lElFl`lplqlrl}l~lll mm$m%m&mZm[m\m]m^m_m`mammmmmmmmmmmmmmmnnnn#n.n/nBnCnTnVnnnnnnnnnnnIoKowooo `kkkkk.l/l0l=lElFl`lplhp$$Ifc0!<04 ca+$If ^` @ ^@ ` $a$ n plqlrl}l4$Ifr$$Ifc4+0!`<04 ca+}l~lll m)]$$Ifc!4!04 ca+$Ifr$$Ifc40! <04 ca+ mm$m%m&mZm[m\m]m^m_m`m]$$Ifc!4!04 ca+$If `mammmmmm=]$$Ifc!/!04 ca0$If]$$Ifcn !/!04 ca0mmmmmmmmmmnnnnnnnnn n"n#n.n/nnn ! L n``nnnnnn n!n#n%n(n.n/n0n5n:n;nAnBnCnDnHnInSnTnVnWnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnoo o o o oooooo oHoIoQoto̾̾̾̾̾̾ CJOJQJ5CJOJPJQJmHnH j5CJOJPJQJUmH 5CJOJPJQJmH 5CJOJQJjUmHnH jUGnnnnnnnnnIoJoKoQoXocokooouovowooooooooo !$a$ LtouoooooooCJOJQJmHnH55CJCJ$>*CJOJQJooooooooo n,{. A!"#$%6 /&P 0A .!n"#$n%6,{. A!"#$%6  iD@D Normal$CJOJPJQJ_HmH nHsH tH<@< Heading 1$@&5CJ(OJQJ00 Heading 2$@&5>>  Heading 7 <@& OJQJaJ<A@< Default Paragraph Font,@, Header  !, @, Footer  !..  Footnote Text8&@!8 Footnote ReferenceH*6'@16 Comment ReferenceCJ,B,  Comment Text2B@R2 Body Text CJOJQJFPbF Body Text 2CJOJPJQJmH sH u@C@r@ Body Text Indentx^^O^ Body Text Indent Char$CJOJPJQJ_HmH nHsH tHJR@J Body Text Indent 2dx^BQB Body Text 3  >*CJOJQJ+,=i+,=@i+Wdi._ "& "& "& "& "& "& "& "& "& ^s ^s ^s "& "&Y !-\9EO+W[_dei p3!*     jjjjtt33368]Bentoo9EMlP Cw$o,y4@oLTlW#]]^^^____%`\```aaabbbbIcJcRcScddddeddd?e@eeefZfffgghhuiviiikkpl}l m`mmnoo:<=>@ABCFGHIKLNOPQRSTUVWXYZ\]^_`abcdefghijkmopqrstuvwxyz{|~?8SZaekoo;?DJ[n}#*,1<?6!!!@  %@ 8(  Z  S PFPF  HB  C DN  3   B S  ?  (  NB  S DoNB  S Doe`  c $PFPF NB   S DoNB   S Do6NB  S Do6NB  S DoNB  S Do.]hi@qswyBDhirdg5givxW !!i!j!!!""E"G"d"f"o#q##y$^%`%;&<&p&&&+','s'x''-%-1/6/m00122T2344z5|527G8[9::;O;AADQDSDDD#E%EEEnFGwHHIIIIJJ8J9JiJJKKfKgKKLLL NNNOOCOOOOOOOO3P5PPP Q Q3Q9QAQqQzQQQ RRXRaR`[f[c chKiiiii::::::::::::::::::::::::. .AMacintosh HD:Users:jennydeedman:Desktop:PR24(Rev.1 Oct 10)IGb_CLN. .AMacintosh HD:Users:jennydeedman:Desktop:PR24(Rev.1 Oct 10)IGb_CLN. .EMacintosh HD:Users:jennydeedman:Desktop:PR24(Rev.1 Oct 10)IGb_CLN.doc. .EMacintosh HD:Users:jennydeedman:Desktop:PR24(Rev.1 Nov 10)IGb_CLN.doc. .EMacintosh HD:Users:jennydeedman:Desktop:PR24(Rev.1 Nov 10)IGb_CLN.doc. .EMacintosh HD:Users:jennydeedman:Desktop:PR24(Rev.1 Nov 10)IGb_CLN.doc. .Macintosh HD:Files:QuarkXpress Files:IACS URs/UIs-Master:Aug10-Feb11 (Present Quark):Pro Requirements:WORD FILES:PR24:PR24 (Rev.1 Dec 2010):PR24(Rev.1 Dec 10)IGb_CLN.doc. .Macintosh HD:Files:QuarkXpress Files:IACS URs/UIs-Master:Aug10-Feb11 (Present Quark):Pro Requirements:WORD FILES:PR24:PR24 (Rev.1 Dec 2010):PR24(Rev.1 Dec 10)IGb_CLN.doc. .Macintosh HD:Files:QuarkXpress Files:IACS URs/UIs-Master:Aug10-Feb11 (Present Quark):Pro Requirements:WORD FILES:PR24:PR24 (Rev.1 Dec 2010):PR24(Rev.1 Dec 10)IGb_CLN.doc. .Macintosh HD:Files:QuarkXpress Files:IACS URs/UIs-Master:Aug10-Feb11 (Present Quark):Pro Requirements:WORD FILES:PR24:PR24 (Rev.1 Dec 2010):PR24(Rev.1 Dec 10)IGb_CLN.doc_Q% d*`|F/Q"K%`t3=rz*3pEt;=r*AasLIԽ,}*Ur#ZcL1`H(|=bVs-wXK=z 3}ph^`.h ^`OJQJo(pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.h ^`o(hH.hpp^p`.h@ L@ ^@ `L.h^`.h^`.hL^`L.h^`.hPP^P`.h L ^ `L.@ 0@ ^@ `0o(()^`o(. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h^`OJPJQJo(-h ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(h^`OJPJQJo(h ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(^`OJPJQJo(- ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo(h``^``OJPJQJo(-h ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(h^`OJPJQJo(-h ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(``^``OJPJQJo(- ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo( ^`hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h^`.h ^`OJQJo(h pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(h^`. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h^`.h ^`OJQJo(hpLp^p`L.h@ @ ^@ `.h^`.hL^`L.h^`.h^`.hPLP^P`L.h ^`o(hH.h ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo($D$^$`DOJPJQJo(- ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo(h^`o(.h ^`OJQJo(oh pp^p`OJQJo(h @ @ ^@ `OJQJo(h ^`OJQJo(oh ^`OJQJo(h ^`OJQJo(h ^`OJQJo(oh PP^P`OJQJo(z*3/Q"*AK=zsLIEt;`t3`|=bQ% #Zs-w,}*U1`3}_                                                                                 G"NmWnWrW{WWWWWWWWWXXyX|XXXXXXXXXXYYYYYYYCYFYYYYYYYY%Z&Z'Z(ZCZYZ\ZZZZZZZZZZ[[[[[[[[[[[[[ \Q\b\e\}\\\\\\\\\\\I]J]K]L]M]N]O]P]Q]R]S]T]U]]]]]]^^^^^^^M^P^d^e^f^g^h^i^l^^^^^^^^___ _?_@_A_B_C_D_E_F_I_________`` `0`B`W`Z``````````aaaaabb(b+bkbnbbbbbbbb2c5cucvcwcxcyczc}ccccc0f=fEfFf`fpfqfrf}f~fff$g%g&g`gagggh/hDhWhhi-_a$3a$a$a$a$@РR2iP @GTimes New Roman5Symbol3 Arial3TimesG5 jMS MinchoTimes? Courier New;Wingdings 1h&5j&5j& "T`^Wkq%>0dA2qHXHull Classification Surveys . .. . Oh+'0x   ( 4 @ LX`hp'Hull Classification Surveys 1ull. . .Normala. .12Microsoft Word 10.1@L@>$@'2@>$ ՜.+,0 hp  'IACSla`T Hull Classification Surveys Title  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry FfD1TableYTWordDocumentSummaryInformation(DocumentSummaryInformation8CompObjX FMicrosoft Word DocumentNB6WWord.Document.8