ࡱ> M qIbjbjd&d& 7LGiLGi@ |||||8MPPfff́΁΁΁΁΁΁$b|||ff4%%%^|f|f́%́%%Jy\f:o{B0M*|z!|%#M X B:  Table 1 Mandatory Core Offence legislation NumberSubject NameAimIndicative intended Learning Outcomes- by the end of each learning activity the student will be able to: 1.1Fraud Act 2006Identify, explain and demonstrate practical knowledge/use of the 2006 Act and its impact on the criminal law relating to fraud.List the three ways in which fraud may be committed under the Fraud Act 2006 Explain what is meant by dishonest intent Explain the terms gain and loss within the Act Give examples of articles for use in fraud To identify the offence of obtaining services dishonestly Define what might constitute carrying on a fraudulent business under section 9 of the 2006 Act.1.2Money Laundering Regulations 2003 and 2007.To provide an understanding of the requirements of the Money laundering Regulations 2003 and 2007Demonstrate an understanding of Money Laundering and the associated legislation Explain and demonstrate the use of the Money Laundering Regulations 2003 and 2007 Show an understanding of the role of the UKFIU and the reporting regimes1.3Proceeds of Crime Act 2002To provide an understanding of the requirements of the Proceeds of Crime Act 2002.Recognise investigative and intelligence tools available to intelligence officers under the Proceeds of Crime Act 2002 Recognise the main concepts behind confiscation and money laundering Define what constitutes proceeds of crime as defined in POCA 2002 Explain the concept of tipping off Table 2 Mandatory Core Procedural legislationNumberSubject NameAimIndicative intended Learning Outcomes -by the end of each learning activity the student will be able to;2.1Criminal Procedures and Investigations Act 1996To provide knowledge of the legislative and procedural requirements governing the disclosure of unused material in criminal prosecutions.Identify the principal legislation governing disclosure Explain the terms undermine the prosecution and assist the accused within the terms of CPIA 1996 Define the roles played by the investigating officer, the officer in charge, the disclosure officer and the prosecutor Distinguish between sensitive and non-sensitive material Practice the completion any relevant forms and schedules Explore how to Manage Digital Material Understand the use of Disclosure Management Documents2.2Regulation of Investigatory Powers Act 2000To provide an understanding of the requirements of the Regulation of Investigatory Powers Act 2000.Demonstrate knowledge and an understanding of the activities covered by the Regulation of Investigatory Powers Act 2000 Explain the purpose of the Regulation of Investigatory Powers Act 2000 and who is charged to abide by it State when an authority for activity as defined under the Regulation of Investigatory Powers Act 2000 might be required Define the term confidential material used in the Regulation of Investigatory Powers Act 20002.3Investigatory Powers Act 2016To provide an understanding of the requirements of the Investigatory Powers Act 2016.Understand the concept of Lawful interception of communications Demonstrate knowledge of the authorisation process for obtaining communications data Explain the retention of communications data requirements2.4Anti Terrorism, Crime and Security Act 2006To provide an understanding of the Anti Terrorism, Crime and Security Act 2006Demonstrate and understanding of the Anti Terrorism, Crime and Security Act 2006 Recognise the relevance of the Anti Terrorism, Crime and Security Act 2006 in relation to intelligence activities and the sharing of information2.5Health and Safety at Work Act 1974To provide an understanding of the Health and Safety at Work Act 1974Demonstrate an understanding of the Health and Safety at Work Act 1974 Identify how it impacts on intelligence activities with specific reference to associated riskTable 3 Mandatory Core Background subject areas Number Subject NameAimIndicative intended Learning Outcomes -by the end of each learning activity the student will be able to;3.1Human Rights Act 1998To provide an overview of the legislation and recognise how the Act may impact on an intelligence officers work.Explain key Articles of the European Convention on Human Rights State and explain each key Article of the Human Rights Act 1998 Recognise the impact these Articles may have on an intelligence officers role Describe the core principles and features of the Human Rights Act 1998 State ways in which Human Rights as defined in the 1998 Act may relate to equality and diversity issues3.2Data Protection Act 1998To provide an understanding of the Data Protection Act 1998.Define the term personal data Be able to list the eight Data Protection Principles State how the eight data principles might have an impact on an intelligence officer Describe procedures necessary to process data legally Recognise and deal with straightforward data subject access enquiries Identify the powers held by the Information Commissioner and procedures for notification Describe methods for dealing with complaints made under the Data Protection Act3.3Freedom of Information Act 2000To provide an understanding of the Freedom of Information Act 2000 and how to apply its principles.Describe the structure and core provisions of the Freedom of Information Act 2000 Identify the key issues in handling requests made for the provision of information under the 2000 Act Follow set procedures for dealing with complaints made under the 2000 Act Provide a detailed explanation of each exemption Explain the ways in which the 2000 Act relates to other legislation3.4Courtroom Procedures, Skills and Rules of EvidenceTo provide an understanding of the court systems in the UK and the rules of evidence Recognise the different types of court in the UK Explain how a court of law works Describe the judicial process and the roles played by different parties Describe the range of offences dealt with by the courts Demonstrate the procedure for taking the oath or affirmation Describe the layout of a typical court Discuss the ethical and professional issues in relation to the giving of evidence Display appropriate and professional courtroom behaviours Describe the different types of evidence and their admissibility3.5Risk AssessmentTo provide an understanding of the legal requirements relating to the identification and management of riskUnderstand the risk assessment process Understand how risk assessment impacts on operational intelligence activity Demonstrate completion of a risk assessment relevant to operational and/or other intelligence activity3.6Case Law- Applicable to Role and OffencesTo provide an understanding of how case law can impact on intelligence processes and activitiesUnderstand which case law specifically impacts on aspects of intelligence work Apply the processes developed to take account of any applicable case law Table 4 Mandatory Core General Intelligence Gathering & Prosecution Principles Number Subject NameAimIndicative intended Learning Outcomes -by the end of each learning activity the student will be able to;4.1Identification, Acquisition and Exploitation of Communications DataTo provide an understanding of the legal requirements and processes involved in identifying, acquiring and exploiting communications dataRecognise communications data that may have an impact upon intelligence casework Understand the legal and procedural requirements in order to access data Interpret and analyse the data4.2Surveillance and Surveillance ApplicationsTo provide an understanding of relevant Law and authorisation processes involved in surveillance and the skills necessary to carry out surveillance activityDemonstrate awareness of risks surrounding the use of surveillance and when it is appropriate to use it for intelligence gathering. Demonstrate an understanding of the processes and authorities required for covert surveillance Recognise the circumstances in which surveillance authority is required by law Carry out effective surveillance activity using appropriate tradecraft 4.3Case HandlingTo provide and understanding of how to recognise the different stages of an intelligence case and the need to record, organise and retain all relevant materialApply the intelligence cycle in a case handling context State the importance of recording case decisions and the rationale behind those decisions Organise, record and manage casework and all material generated in accordance with legal and other considerations4.4Record Keeping; Note Taking and Original NotesTo provide an understanding of the purpose and objective of note taking and to enable students to take effective notes and know what should and should not be included within those notes.Apply best practice for note taking during intelligence case building To take contemporaneous notes State rules and best practice governing note taking and record keeping Describe court procedure and disclosure issues in respect of notes and records Recognise the appropriate methods of notes and records preservation4.5Preparation and Taking of Witness StatementsTo provide an understanding of the knowledge and skills needed to plan and write witness statementsExplain the purpose of a witness statement and how it is used Identify and explain the different types of witness statement Produce witness statements to the standards required by CPIA 1996. Understand CPS guidelines on obtaining telephone/remote statements Table 5 Mandatory Core Intelligence SkillsNumberSubject NameAimIndicative intended Learning Outcomes -by the end of each learning activity the student will be able to;5.1The Intelligence CycleTo provide an understanding of the Intelligence Cycle and how it impacts on intelligence activityIdentify and explain the key elements and purpose of the intelligence cycle and the NIM Recognise how the intelligence cycle impacts on your organisation Demonstrate application of key elements of the Intelligence Cycle and where required, NIM5.2Intelligence Sources, Terms of reference and Types of IntelligenceTo provide an understanding of the wide range of sources available for exploitation, the categories into which the intelligence falls and Terms of ReferenceIdentify, understand and explain the different types of intelligence; operational, tactical and strategic Identify the range of sources of information both within and outside their organisation Understand what legal and other considerations must be taken when exploiting a source of information Identify and explain how to produce TORs and facilitate the understanding of stakeholders 5.3Intelligence; Understanding and communicating fraud threats Types of Fraud and RiskTo provide an overview of the counter fraud landscape in the UK and the principle agencies involved, how they interact in terms of gathering and exchanging information and intelligence.Explain how different types of fraud could affect their organisation and others and the role of Intelligence in preventing this Demonstrate a wide knowledge of fraud types and risk that affect their organisation Define the roles of agencies and organisations involved in counter fraud intelligence activities Describe the National Intelligence Model Demonstrate application of strategic intelligence to inform their organisations risk detection and prevention functions Identify, explain and demonstrate the use of appropriate technology to address key and emerging threats5.4Collecting information and developing intelligenceTo provide an understanding of the requirements of the collection and development of information and intelligenceDemonstrate how to use a range of sources to gather information and explain the relative strength of each type of source/method Explain and Demonstrate the ability to develop information and intelligence to close intelligence gaps and identify threats and trends Demonstrate knowledge of how to protect information using appropriate security classifications Demonstrate tasking other teams/people to develop relevant case building objectives Identify and explain how to identify when intelligence cases are not progressing as necessary and what action is required to continue successfully Explain collection plans for gathering intelligence Explain the difference between overt and covert intelligence and the relevant legislation that governs these methods 5.5Recording Intelligence To provide an understanding of intelligence management procedures, pathways and how they relate to the receipt and recording Intelligence MaterialDefine the type of intelligence product and its subsequent use Identify and explain who needs to be made aware of fraud risk and intelligence referrals inside and outside their organisation Adhere to procedures and legal requirements when receiving and recording intelligence, including any statutory pathways, secure gateways and public interest considerations Identify, explain and Demonstrate how to record intelligence securely, accurately and in a manner that enables analysis Demonstrate use of appropriate handling codes Demonstrate the use of risk assessment Understand and explain how to manage bulk volumes of new information and make decisions about how to evaluate and input as intelligence 5.6Intelligence ProductsTo Produce, summarise and report Intelligence PackagesExplain and demonstrate how to produce Intelligence Summaries Intelligence Packages Demonstrate the ability to review and develop intelligence from various sources resulting in a valid foundation from which to start an investigation 5.7Intelligence Products - DisseminationTo provide an understanding of correct dissemination processes, decision making and pathways.Demonstrate establishment of a network of contacts with whom to securely share areas of potential fraud and risk Explain the difference between intelligence and evidence Demonstrate how to sanitise intelligence for dissemination both inside and outside their organisation Demonstrate dissemination via legal gateways Demonstrate delivery of operational briefings using the appropriate briefing model Demonstrate the identification of restrictions to dissemination of intelligence depending upon the recipients5.8The use of Human Intelligence SourcesTo provide an understanding of the value and potential for exploitation of human intelligence and the relevant legal considerations.Understand the importance of the use of human intelligence in an operational intelligence environment Explain source definitions, organisational policy and Status Drift regarding human sources of intelligence Explain organisational processes for using covert human sources Understand the additional risks that are associated with the use of human intelligence Demonstrate understanding of how to report issues in the use of human sources of intelligence Understand the requirement for applications to use covert human sources of intelligence 5.9Photography as an Intelligence ToolTo provide an understanding of the value of photography in the intelligence environmentOperate camera equipment effectively Demonstrate the ability to take evidential photographic images including preserving the integrity of photographic material Demonstrate the ability to preserve the chain of evidence regarding photographic material5.10AnalysisTo provide an understanding of how to conduct financial and non-financial analysis Explain the meaning and purpose of analysis within an intelligence context Be aware of financial and non-financial methods of comparison available when comparing information Demonstrate the process of weighing contradictory evidence Use comparison methods to refine key issues and hypotheses Demonstrate the ability to create innovative solutions to analytical problems Explain the techniques for presenting the result of analysis and how to evaluate the level of confidence in the analysis Explain how to draw inference from intelligence and recognise cognitive bias5.11Briefing & Debriefing To provide and understanding of how to conduct an operational briefing and a post operation debrief to support organisational objectivesUnderstand the types of briefing, methods of delivering a successful de/briefing and the advantages and disadvantages of different methods Identify the factors that contribute to a successful briefing/debriefing Demonstrate the delivery of briefings/debriefings      CFPAB; Accredited Counter Fraud Intelligence Specialist (ACFIS) Syllabus Update September 2023 Final  PAGE \* MERGEFORMAT 1   -./6CGQln E rcTBTTTTTT"h xhK-5CJOJQJ\aJh xhK-CJOJQJaJhqEhUCJOJQJaJhqEh-5CJOJQJaJh-5CJOJQJaJ"hqEhU56CJOJQJaJhqEhUCJOJQJaJhqEh25CJOJQJaJ(hlehU5B*CJOJQJaJphhU5CJOJQJaJhqEhU5CJOJQJaJhU5CJOJQJaJ  -./6CGlccccc $Ifgd1zkd$$Ifl|6V: ` t f0V:644 lap fytc $$Ifa$gd1gdU$a$gdU +"" $IfgdK-kd$$Ifl\| 6X-% ```` t(0V:644 lap(ytcE  X & F$IfgdK- $IfgdK-  X K V 7 8 < V W " h Ͽϡϡώϭώ{%h2hUB*CJOJQJaJph%h2hE?kB*CJOJQJaJphhE?kCJOJQJaJ"h xhE?k5CJOJQJ\aJh xhE?k5CJOJQJaJh xhE?kCJOJQJaJ%h2hK-B*CJOJQJaJphh xhK-CJOJQJaJ* K [RRREE & F$IfgdE?k $IfgdE?kkd$$Ifl\| 6X-% t0V:644 laytc 7 8 < W " NEEE8 & F$IfgdE?k $IfgdE?kkdQ$$Ifl\| 6X-% t0V:644 laytc & F$IfgdE?k" h A<gdUkd$$Ifl\| 6X-% t0V:644 laytc & F$IfgdE?k & F$IfgdE?k   "#,GIǷtbUEUh-h-5CJOJQJaJh-5CJOJQJaJ"h xhU56CJOJQJaJhApy56CJOJQJaJh2h xB*CJaJphh xhU5CJOJQJaJ(h2hU5B*CJOJQJaJphh xhU5CJOJQJaJ(h2h40}5B*CJOJQJaJph"h40}5B*CJOJQJaJph"hc5B*CJOJQJaJph  o|kd$$Ifl|6V:  t 0V:644 lap yt x $$Ifa$gd1$a$gdU " $IfgdApy $$Ifa$gd1Ja$0񲲲uddSS!h^Ph6B*CJ^JaJph!h^Ph4VB*CJ^JaJphh^Ph6B*CJaJph!h^Ph6B*CJ^JaJph!h^Ph4VB*CJ^JaJphhUB*CJaJphh xhUB*CJaJph"h xhU5CJOJQJ\aJh xh}b3CJOJQJaJh2h xB*CJaJphh xhUCJOJQJaJ) $Ifgd1kdE$$Ifl5\|z 6.+-%  t(0V:644 lap(yt xJa1 & F hh$If^hgd^P & F hh$If^hgdU  & F$Ifgd1 $Ifgd101256\ab!'>\ !'2\ïÌ}}}}}rcO&h xhK-5CJOJQJ\^JaJh xhK-CJOJQJaJh2h xB*phh xhUB*CJaJph h xhUCJOJQJ^JaJ"h xhU5CJOJQJ\aJ&h xhU5CJOJQJ\^JaJh xhUCJOJQJaJh xh}b3CJOJQJaJh2h xB*CJaJphh xh6B*CJaJph126b>ULLL;; & F$7$8$H$Ifgd1 $Ifgd1kdS$$Ifl\|z 6.+-% t0V:644 lap yt^P =44 $Ifgd1kd $$Ifl\|z 6.+-% t0V:644 laytc  & F$Ifgd1 & F$7$8$H$Ifgd1!':X\dlʼʫʏqbh xhUCJOJQJaJh xhK-CJOJQJaJh xh}b3CJOJQJaJh2h xB*ph h xhgCJOJQJ^JaJ h xhF-CJOJQJ^JaJh"CJOJQJ^JaJ h xhK-CJOJQJ^JaJ&h xhK-5CJOJQJ\^JaJ hB5CJOJQJ\^JaJ":Akd$$Ifl\|z 6.+-% t0V:644 laytc & F$7$8$H$Ifgdg $Ifgd1!'2HI\n!'*+,./0S\vʹʹyj[ʹh xhK-CJOJQJaJh xh}b3CJOJQJaJh2h xB*CJaJph!h xhUB*CJ^JaJphh xhUB*CJaJph h xhUCJOJQJ^JaJ h xhUCJOJQJ^JaJh xhUCJOJQJaJ&h xhU5CJOJQJ\^JaJ#h xhU5CJOJQJ^JaJI+,04kd[$$Ifl\|z 6.+-% t0V:644 laytc & F$7$8$H$Ifgd1  & F$Ifgd1 $Ifgd10S>?8kd$$Ifl\|z 6.+-% t0V:644 laytc  & F$Ifgd1  & F$Ifgd1 $Ifgd1!'2=>?GH\rs{ϼxffWHh2h xB*CJaJphh xhUCJOJQJaJ"h-h-56CJOJQJaJh2h xB*CJaJphh xhU5CJOJQJaJ(h2hU5B*CJOJQJaJphh xhU5CJOJQJaJ%h2hUB*CJOJQJaJphh xhUB*CJaJph!h xhUB*CJ^JaJph h xhUB*CJ\aJph?GHrs{ja $Ifgd x|kd$$Ifl|D69  t 09644 lap yt x $$Ifa$gd1$a$gdUgdU) $Ifgd1kdO $$Ifl\|A! [D6"$  t(ԴԴԴԴ09644 lap(ԴԴԴԴyt x!%\!%2?T\ !"%\^_ !%2?A\!%23⏏⏏ô h xhUCJOJQJ^JaJ&h xhU5CJOJQJ\^JaJh2h xB*CJaJphh xhUB*CJaJphh xhU5CJOJQJaJh xhUCJOJQJaJh xh}b3CJOJQJaJ2T & F$Ifgd1 & F hh$If^hgdU $Ifgd1 "_ RRAAA & F $7$8$H$Ifgd1 $Ifgd1kd] $$Ifl\|A! [D6<$ t09644 laytc A234kd $$Ifl\|A! [D6<$ t09644 laytc & F hh$If^hgdU & F $7$8$H$Ifgd13467W\!%2?\u!%67:;\n!%2?\a ! % ӿӓӄuh xhF-B*CJaJphh xhUB*CJaJphh xhU5CJOJQJaJh2h xB*ph h xhUCJOJQJ^JaJ&h xhU5CJOJQJ\^JaJh xhUCJOJQJaJh xh}b3CJOJQJaJh xhK-CJOJQJaJ.37Wu6 & F $7$8$H$Ifgd1 & F $7$8$H$Ifgd1 $Ifgd167;n[RRIR<  & F$Ifgd1 $Ifgd1 $Ifgd1kd $$Ifl\|A! [D6<$ t09644 laytca S  & F$Ifgd1  & F$Ifgd1% S \ !!!%!2!?!O!\!v!!!!!""!"%"(")"*"-"."X"\"""##!#%#2#?#P#Q#R#S#ǷǷ}h=Q5CJOJQJaJhU5CJOJQJaJ h xhUB*CJ\aJphh xh~B*CJaJphh xhU5CJOJQJaJh xhUCJOJQJaJh xh}b3CJOJQJaJhh6hUOJQJh xhUB*CJaJph, O!v!![RRREE  & F $Ifgd1 $Ifgd1kdX $$Ifl\|A! [D6<$ t09644 laytc!)"*"."X""#NEEE8  & F$Ifgd1 $Ifgd1kd $$Ifl\|A! [D6<$ t09644 laytc  & F $Ifgd1#P#Q#R#S#T#\#]#NFFAAAgdU$a$gdUkd $$Ifl\|A! [D6<$ t09644 laytc  & F $Ifgd1S#T#[#\#]#t############$$"$'$($)$Ÿũxxh[KKKK[<h xh-CJOJQJaJh-h-5CJOJQJaJh-5CJOJQJaJh xh-5CJOJQJaJ"h xh-56CJOJQJaJh-56CJOJQJaJhh6h-5CJOJQJaJhh6hUCJOJQJaJhK-5CJOJQJaJhh6hU5CJOJQJaJhU5CJOJQJaJhh6hU5CJOJQJaJhc5CJOJQJaJ]######)$wkkkb $Ifgd- $$Ifa$gd-|kdS$$Ifl|6V: ` t a0V:644 lap ayt x $$Ifa$gd1)$*$.$K$q$r$$$%%"%2%K%M%S%%%%%%%%&&"&K&&&'''"'2'K'S'f''''''((("(K(((())")2)B)K)S))hh6h-OJQJh xh-OJQJh xh-CJOJQJ\aJ h xh-B*CJ\aJphh xh-5CJOJQJaJh xh-CJOJQJaJhh6h-CJOJQJaJ8)$*$.$r$) $Ifgd-kd$$Ifl\|~ 6.a$ @@@@ t(0V:644 lap(yt xr$$M%%%%%8kd$$Ifl\|~ 6.a$ t0V:644 laytc & F$Ifgd-  & F$Ifgd- $Ifgd-%%&'f''''  & F$Ifgd-  & F $Ifgd- $Ifgd-''((((B)[RRREE  & F$Ifgd- $Ifgd-kd$$Ifl\|~ 6.a$ t0V:644 laytc))))))**"*K*****+++"+2+K+P+S+++++++,,,",K,y,z,,,,--"-2-8-9-±ұұ h40}h-CJOJQJ^JaJh40}h-B*CJaJph h xh-B*CJ\aJph h xh-CJOJQJ^JaJh xh-5CJOJQJaJh xh-CJOJQJaJhh6h-CJOJQJaJh xh-B*CJaJph+B)))))*NEEE $Ifgd-kdU$$Ifl\|~ 6.a$ t0V:644 laytc  & F $Ifgd-**+P++++=kd$$Ifl\|~ 6.a$ t0V:644 laytc  & F$Ifgd- & F$7$8$H$Ifgd-++,z,,,9-|- & F$7$8$H$Ifgd-  & F $Ifgd- $Ifgd-9-D-G-{-|-}-~----------------.#.0.1.2.5.µˆyggggXIh xheCJOJQJaJhh6hUCJOJQJaJ"h-h-56CJOJQJaJhh6hUCJOJQJaJhh6hU5CJOJQJaJhh6hU5CJOJQJaJh40}5CJOJQJaJhc5CJOJQJaJhU5CJOJQJaJhh6h-CJOJQJaJ h^PhoCJOJQJ^JaJ h^Ph40}CJOJQJ^JaJ|-}-~--------UPPPPPPPPgdUkd$$Ifl\|~ 6.a$ t0V:644 lap yt^P ------1.wn $Ifgd x|kd]$$Ifl|6V:  t 0V:644 lap yt x $$Ifa$gd11.2.6.M.) $Ifgd1kd$$Ifl1\|| 16.$  t(0V:644 lap(yt x5.6.B.L.M.}........///#/B/G/H/I/}////////////0#0>0񢔇|m[[#h xhm 5CJOJQJ^JaJh xheCJOJQJaJhh6hUOJQJh xh3CJOJQJh xh356OJQJh xh3CJOJQJaJh xh3B*CJaJphh xhUB*CJaJphh xhU5CJOJQJaJ#h xhU5CJOJQJ^JaJh xhUCJOJQJaJ#M../I////8kd $$Ifl\|| 16.$ t0V:644 laytc & F$Ifgd3  & F$Ifgd1 $Ifgd1//00J11 2 2 h$If^hgdm  & F$Ifgd1  & F$Ifgd1 $Ifgd1>0@0B0p0}000000001#1B1J1}111112 2 2 2 22222yiYh xhU5CJOJQJaJh xhc5CJOJQJaJh xheCJOJQJaJh xhcCJOJQJaJhh6hUOJQJh xhm B*CJaJphh xhUB*CJaJph h xhm B*CJ\aJph h xhUB*CJ\aJphh xhUCJOJQJaJh xhm CJOJQJaJ 2 22e2333[RRREE  & F$Ifgd1 $Ifgd1kd$$Ifl\|| 16.$ t0V:644 laytc2#2B2`2d2e2}22233#3B3}333333334#4B4S4T4|4}44445#5B5]5;oo^^^^^ h xh3B*CJ\aJph h xh2\oB*CJ\aJph h xhUB*CJ\aJphh xhUB*CJaJphh xh2\oB*CJaJphh xh2B*CJaJphh xhUCJOJQJaJ#h xhU5CJOJQJ^JaJh xh2\o5CJOJQJaJh xh25CJOJQJaJ"3T4}44]5^5b5A8 $Ifgd1kd_$$Ifl\|| 16.$ t0V:644 laytc  & F$Ifgd1  & F$Ifgd2\o]5^5b5}5555566#6B6}666677#7B7l7m7}777778#8B8T8}88888899999ǸǸDZth xhU5CJOJQJaJh xhUCJOJQJaJh xh xCJOJQJaJh xheCJOJQJaJ hh6hm h xhm B*CJaJphh xhXB*CJaJphh xhm 5CJOJQJaJh xhm CJOJQJaJhh6hUOJQJ)b55667m77T88888 h$If^hgdX  & F$Ifgd1 $Ifgd1 899999m:[RRREE  & F$Ifgd1 $Ifgd1kd$$Ifl\|| 16.$ t0V:644 laytc999#9B9}99999999:#:B:m:}:::::::;;#;B;};;;;;;;;;<#<B<o<p<q<вzhh6hUOJQJh xh:{B*CJaJphh xhB*CJaJphh xh3B*CJaJphh xhUB*CJaJphh xhCJOJQJaJh xhUCJOJQJaJh xhU5CJOJQJaJh xh5CJOJQJaJ*m:;;;;o<p<q<Akd$$Ifl\|| 16.$ t0V:644 laytc  & F$Ifgd  & F$Ifgd1q<s<t<u<}<<<<<<====#=B=}===========>#>6>7>B>}>>>>>>ôí➎~oooo`h xhm B*CJaJphh xhCJOJQJaJh xhm 5CJOJQJaJh xh5CJOJQJaJh xhm CJOJQJaJ hh6h:{h xhB*CJaJphh xh:{B*CJaJphh xh:{5CJOJQJaJh xh xCJOJQJaJh xh:{CJOJQJaJ%q<u<<<<===== $Ifgdm 8$If^8gd  & F$Ifgd  & F$Ifgd $Ifgd1 ====7>>>G?[RRREEE  & F$Ifgd $Ifgd1kdZ$$Ifl\|| 16.$ t0V:644 laytc>?#?B?G?t?}??????@#@5@6@8@9@:@B@`@}@@@@A#ABAKAeA}AAAAAAAAB#BBBOB}BBB˼pppppph xhlB*CJaJphh xhXB*CJaJphh xhUB*CJaJphh xhU5CJOJQJaJh xhUCJOJQJaJh xh xCJOJQJaJh xhOCJOJQJaJ hh6hm h xhF-B*CJaJphh xhB*CJaJph,G?t??5@6@:@`@A88 $Ifgd1kd$$Ifl\|| 16.$ t0V:644 laytc  & F$IfgdF-  & F$Ifgd`@@KAAAOBBCC h$If^hgdl  & F$Ifgd1  & F$Ifgd1 $Ifgd1BBCCCC C C C#C/CBC}CCCCCCD#D'DBDaDjD}DDDDDDDDDDDǸwhǸW!h xhUB*CJ^JaJphh xhUB*CJaJph h xh~B*CJ\aJph h xhUB*CJ\aJphh xhU5CJOJQJaJh xhUCJOJQJaJh xh xCJOJQJaJh xhOCJOJQJaJhh6hUOJQJh xhXB*CJaJphh xhlB*CJaJph"CC C/CCC'D[RRREE  & F$Ifgd1 $Ifgd1kd$$Ifl\|| 16.$ t0V:644 laytc'DDDDDD3ENEEE8  & F$Ifgd1 $Ifgd1kdU$$Ifl\|| 16.$ t0V:644 laytc  & F$Ifgd1DE#E1E3EBE}EEEEEEFF#FBF\F]F}FFFFG#G$G&G(G)G@GBG}GGGGGGGH#HBHTHνufh xh~B*CJaJphh xhU5CJOJQJaJh xhUCJOJQJaJh xh xCJOJQJaJh xhOCJOJQJaJhh6hUOJQJ h xhB*CJ\aJph h xhUB*CJ\aJphh xhUB*CJaJph!h xhUB*CJ^JaJph(3EEEF]FF#G$GAkd$$Ifl\|| 16.$ t0V:644 laytc  & F$Ifgd1  & F$Ifgd1$G)G@GGTHHH  & F$Ifgd x  & F$Ifgd1 $Ifgd1TH}HHHHHHHHHHHHHHHHHHHHHHIII!I"I%I*I+I1I2I3I4I>IBIHIIIû~tghch xOJQJ^JhEAOJQJ^Jh40}OJQJ^JhoOJQJ^Jh0=OJQJ^Jh-OJQJ^JhchcOJQJ^JhEAhUjhUUh'Chh6hUOJQJh xh~B*CJaJphh xh xB*CJaJphh xhUB*CJaJph&HHHHHHHHHH[VTTTTTTTgdK-kd$$Ifl\|| 16.$ t0V:644 laytc HHHH"IIIJIKILIMIiIjIkIlImInIoIpIqIgdK-$a$$a$gd-$a$gdcIIJIKILIMINIeIfIgIhIiIjIkIlImInIoIpIqIh'Ch1hUjhcUmHnHuh|mHnHujhcUhUhEAhhc51h0:pcA .!"#$% $$If!vh#vV::V l ` t f0V:65V:ap fytc$$If!vh#vX#v#v-#v%:V l ```` t(0V:65X55-5%ap(ytc$$If!vh#vX#v#v-#v%:V l t0V:65X55-5%aytc$$If!vh#vX#v#v-#v%:V l t0V:65X55-5%aytc$$If!vh#vX#v#v-#v%:V l t0V:65X55-5%aytc$$If!vh#vV::V l  t 0V:65V:ap yt x $$If!vh#v.#v#v+#v-%:V l5  t(0V:65.55+5-%ap(yt x$$If!vh#v.#v#v+#v-%:V l t0V:65.55+5-%ap yt^P$$If!vh#v.#v#v+#v-%:V l t0V:65.55+5-%aytc$$If!vh#v.#v#v+#v-%:V l t0V:65.55+5-%aytc$$If!vh#v.#v#v+#v-%:V l t0V:65.55+5-%aytc$$If!vh#v.#v#v+#v-%:V l t0V:65.55+5-%aytc$$If!vh#v9:V l  t 09659ap yt x $$If!vh#v#v#v:#v$:V l  t(ԴԴԴԴ096555"5$ap(ԴԴԴԴyt x$$If!vh#v#v#v:#v$:V l t096555<5$aytc$$If!vh#v#v#v:#v$:V l t096555<5$aytc$$If!vh#v#v#v:#v$:V l t096555<5$aytc$$If!vh#v#v#v:#v$:V l t096555<5$aytc$$If!vh#v#v#v:#v$:V l t096555<5$aytc$$If!vh#v#v#v:#v$:V l t096555<5$aytc$$If!vh#vV::V l ` t a0V:65V:ap ayt x $$If!vh#v.#v#va#v$:V l @@@@ t(0V:65.55a5$ap(yt x$$If!vh#v.#v#va#v$:V l t0V:65.55a5$aytc$$If!vh#v.#v#va#v$:V l t0V:65.55a5$aytc$$If!vh#v.#v#va#v$:V l t0V:65.55a5$aytc$$If!vh#v.#v#va#v$:V l t0V:65.55a5$aytc$$If!vh#v.#v#va#v$:V l t0V:65.55a5$ap yt^P$$If!vh#vV::V l  t 0V:65V:ap yt x $$If!vh#v.#v#v#v$:V l1  t(0V:65.555$ap(yt x$$If!vh#v.#v#v#v$:V l t0V:65.555$aytc$$If!vh#v.#v#v#v$:V l t0V:65.555$aytc$$If!vh#v.#v#v#v$:V l t0V:65.555$aytc$$If!vh#v.#v#v#v$:V l t0V:65.555$aytc$$If!vh#v.#v#v#v$:V l t0V:65.555$aytc$$If!vh#v.#v#v#v$:V l t0V:65.555$aytc$$If!vh#v.#v#v#v$:V l t0V:65.555$aytc$$If!vh#v.#v#v#v$:V l t0V:65.555$aytc$$If!vh#v.#v#v#v$:V l t0V:65.555$aytc$$If!vh#v.#v#v#v$:V l t0V:65.555$aytc$$If!vh#v.#v#v#v$:V l t0V:65.555$aytcx002&6FVfv2(&6FVfv&6FVfv&6FVfv&6FVfv&6FVfv&6FVfv8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@66666_HmH nH sH tH @`@ UNormalCJ_HaJmH sH tH DA D Default Paragraph FontRi@R  Table Normal4 l4a (k (No List bob UDefault 7$8$H$-B*CJOJQJ^J_HaJmH phsH tH 4@4 U0Header  9r 4 @4 U0Footer  9r .)!. U Page Number6/16 c0 Header CharCJaJ6/A6 c0 Footer CharCJaJB' QB -Comment ReferenceCJaJ<b< - Comment TextCJaJ:q: -Comment Text Char@jab@ -Comment Subject5\F/F -Comment Subject Char5\HH - Balloon TextCJOJQJ^JaJN/N -Balloon Text CharCJOJQJ^JaJff E?k List Paragraphd^m$CJOJPJQJ^JaJPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭Vj\{cp/IDg6wZ0s=Dĵw %;r,qlEآyDQ"Q,=c8B,!gxMD&铁M./SAe^QשF½|SˌDإbj|E7C<bʼNpr8fnߧFrI.{1fVԅ$21(t}kJV1/ ÚQL×07#]fVIhcMZ6/Hߏ bW`Gv Ts'BCt!LQ#JxݴyJ] C:= ċ(tRQ;^e1/-/A_Y)^6(p[_&N}njzb\->;nVb*.7p]M|MMM# ud9c47=iV7̪~㦓ødfÕ 5j z'^9J{rJЃ3Ax| FU9…i3Q/B)LʾRPx)04N O'> agYeHj*kblC=hPW!alfpX OAXl:XVZbr Zy4Sw3?WӊhPxzSq]y qA' xz 03% S#)$)9-5.>02]59q<>BDTHIIqI%)-0368;>BFJLQUY\^`cehknqt " 10? 36 !#]#)$r$%'B)*+|--1.M./ 23b58m:q<=G?`@C'D3E$GHHqI&'(*+,./124579:<=?@ACDEGHIKMNOPRSTVWXZ[]_abdfgijlmoprsz!@ @ 0(  B S  ?H0(  @@@@@@@@@CAHAMAhAoArA\fwU_   * 8 NRy~ 9@}psQWX_IQnuDLYe 8!A!L!R!""G#N###$$$$''<'H'((=)I))))***++++I,S,,,,-....]/l///G0S0{000011`2l2 33/3:333b4n44444556666:7F7k7s7?9J99999B:N::::;;;<&< ======> >T>\>>>L@S@@@@@@@@@@@@oArA33333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333lnKV  "#55G0 +,??QSTT)8%{%}%}%%%%%%0&@@@@@@MAhAiAkAoArAlnKV  "#55G0 +,??QSTT)8%{%}%}%%%%%%0&@@@@@@@@@@@@MAhAiAkAoArA?b5m,"\!*,X hruZV2\"?J"CcI.HR88^=^&R;=#"~>(dI?.=ijOjt]Zf^(h[_Z&LgdҌ fF{=f0@)la^naNnMjvqt huGwv8`Ozd V~9<|^hhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hH hh^h`OJQJo( 88^8`OJQJo(o ^`OJ QJ o(   ^ `OJQJo(   ^ `OJQJo(o xx^x`OJ QJ o( HH^H`OJQJo( ^`OJQJo(o ^`OJ QJ o(hhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hH hh^h`OJQJo( 88^8`OJQJo(o ^`OJ QJ o(   ^ `OJQJo(   ^ `OJQJo(o xx^x`OJ QJ o( HH^H`OJQJo( ^`OJQJo(o ^`OJ QJ o( hh^h`OJQJo( 88^8`OJQJo(o ^`OJ QJ o(   ^ `OJQJo(   ^ `OJQJo(o xx^x`OJ QJ o( HH^H`OJQJo( ^`OJQJo(o ^`OJ QJ o(hhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hH+;^;`CJOJPJQJRHd^J_H aJo(sH tH ^`_H o(sH tH " X^X`_H o(sH tH " ^`_H o(sH tH " | ^| `_H o(sH tH "  ^ `_H o(sH tH "  ^ `_H o(sH tH " 2^2`_H o(sH tH " ^`_H o(sH tH " hhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hH ^`OJQJo( ^`OJQJo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJ QJ o( ^`OJQJo( ^`OJQJo(o PP^P`OJ QJ o(hhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHruh[_ fNnI.\t]m,{=f@)l~9 huVf^2Oz^=,X "?#"~>R88a^ngdI??wvvqR;=ijO         _z                                            _z        _z                                                                       ahO>R6Fpl7VՔ                                                                                                                              ?>%p4m "}b36?V?'C@I=QUlee"hE?kcpn2\o/>rqtxApy40}:{26^AXc^P3^do4VTl|OB xW0=GEA?U+gZ"2R~1nXk;S|KK-B~lF--@@@qAp@Unknown G.[x Times New Roman5Symbol3. .[x Arial7. [ @Verdana7..{$ Calibri;. .[x Helvetica9. . Segoe UIC.,.{$ Calibri Light?= .Cx Courier New;WingdingsA$BCambria Math"1h** '7!u '7!u!20@@3q@P ?U2! xxbAA ANNEX B7070002Karen Dalgarno                         Oh+'0d   , 8DLT\ANNEX B7070002 Normal.dotmKaren Dalgarno2Microsoft Office Word@G@5o@5o '7 ՜.+,D՜.+,H hp  HM Revenue and Customsu!@ ANNEX B Title(iq} TaxCatchAll!lcf76f155ced4ddcb4097134ff3c332f  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuwxyz{|}~Root Entry F :oData vP1TableWordDocument 7SummaryInformation(DocumentSummaryInformation8MsoDataStore:o:oQNCI0SPEOPOIBB0XK==2 :om:oItem  PropertiesO1EPHPD2VA==2 :o:oItem  5Properties }CompObjr DocumentLibraryFormDocumentLibraryFormDocumentLibraryForm This value indicates the number of saves or revisions. The application is responsible for updating this value after each revision. metaAttributes"/>  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q