ࡱ> M ]7bjbjd&d& 7LGiLGi. |||||8t~RRRh~j~j~j~j~j~j~$=b~|RRRRR~||4~&"&"&"R^||h~&"Rh~&"&"Jv\ }3odxBT~~0~xz2 }| }4RR&"RRRRR~~! RRR~RRRRRRRRRRRRR X B:  Table 1 Mandatory Core Offence legislation NumberSubject NameAimIndicative intended Learning Outcomes- by the end of each learning activity the student will be able to: 1.1Fraud Act 2006To provide an understanding of the Fraud Act 2006 and its impact on the criminal law relating to fraud.List the three ways in which fraud may be committed under the Fraud Act 2006 Explain what is meant by dishonest intent Explain the terms gain and loss within the Act Give examples of articles for use in fraud Explain the offence of obtaining services dishonestly Explain what might constitute carrying on a fraudulent business under section 9 of the 2006 Act.1.2Money Laundering Regulations 2003 and 2007.To provide an understanding of the requirements of the Money laundering Regulations 2003 and 2007Explain the elements of Money Laundering and the associated legislation Explain and demonstrate the use of the Money Laundering Regulations 2003 and 2007 Show an understanding of the role of the UKFIU and the reporting regimes1.3Proceeds of Crime Act 2002To provide an understanding of the requirements of the Proceeds of Crime Act 2002.List the investigative and intelligence tools available to intelligence officers under the Proceeds of Crime Act 2002 Explain the main concepts behind confiscation and money laundering Define what constitutes proceeds of crime as defined in POCA 2002 Explain the concept of tipping off Table 2 Mandatory Core Procedural legislationNumberSubject NameAimIndicative intended Learning Outcomes -by the end of each learning activity the student will be able to;2.1Criminal Procedures and Investigations Act 1996To provide knowledge of the legislative and procedural requirements governing the disclosure of unused material in criminal prosecutions.Explain the principal legislation governing disclosure Explain the terms undermine the prosecution and assist the accused within the terms of CPIA 1996 Explain the roles played by the investigating officer, the officer in charge, the disclosure officer and the prosecutor Explain the difference between sensitive and non-sensitive material Understand how to complete relevant forms and schedules Explore how to Manage Digital Material Understand the use of Disclosure Management Documents2.2Regulation of Investigatory Powers Act 2000To provide an understanding of the requirements of the Regulation of Investigatory Powers Act 2000.Explain the activities covered by the Regulation of Investigatory Powers Act 2000 Explain the purpose of the Regulation of Investigatory Powers Act 2000 and who is charged to abide by it Explain when an authority for activity as defined under the Regulation of Investigatory Powers Act 2000 might be required Evidence understanding of the term confidential material used in the Regulation of Investigatory Powers Act 20002.3Investigatory Powers Act 2016To provide an understanding of the requirements of the Investigatory Powers Act 2016.Understand the concept of Lawful interception of communications Explain knowledge of the authorisation process for obtaining communications data Explain the retention of communications data requirements2.4Anti Terrorism, Crime and Security Act 2006To provide an understanding of the Anti Terrorism, Crime and Security Act 2006Evidence understanding of the Anti Terrorism, Crime and Security Act 2006 Recognise the relevance of the Anti Terrorism, Crime and Security Act 2006 in relation to intelligence activities and the sharing of information2.5Health and Safety at Work Act 1974To provide an understanding of the Health and Safety at Work Act 1974Demonstrate an understanding of the Health and Safety at Work Act 1974 Explain how it impacts on intelligence activities with specific reference to associated riskTable 3 Mandatory Core Background subject areas Number Subject NameAimIndicative intended Learning Outcomes -by the end of each learning activity the student will be able to;3.1Human Rights Act 1998To provide an overview of the legislation and recognise how the Act may impact on an intelligence officers work.Explain key Articles of the European Convention on Human Rights Explain the key Articles of the Human Rights Act 1998 Recognise the impact these Articles may have on an intelligence officers role Explain the core principles and features of the Human Rights Act 1998 State ways in which Human Rights as defined in the 1998 Act may relate to equality and diversity issues3.2Data Protection Act 1998To provide an understanding of the Data Protection Act 1998.Explain the term personal data List the eight Data Protection Principles Explain how the eight data principles might have an impact on an intelligence officer Understand the necessity to process data legally Explain data subject access enquiries Explain the powers held by the Information Commissioner and procedures for notification Explain how complaints are dealt with under the Data Protection Act3.3Freedom of Information Act 2000To provide an understanding of the Freedom of Information Act 2000 and how to apply its principles.Explain the core provisions of the Freedom of Information Act 2000 Recognise key issues when handling requests made for the provision of information under the 2000 Act Explain set procedures for dealing with complaints made under the 2000 Act Explain each exemption Explain the ways in which the 2000 Act relates to other legislation3.4Courtroom Procedures, Skills and Rules of EvidenceTo provide an understanding of the court systems in the UK and the rules of evidence Recognise the different types of court in the UK Explain how a court of law works and the range of offences dealt with by the courts Explain the judicial process and the roles played by different parties Explain the procedure for taking the oath or affirmation Describe the layout of a typical court Explain appropriate and professional courtroom behaviours Describe the different types of evidence and their admissibilityTable 4 Mandatory Core General Intelligence Gathering & Prosecution Principles Number Subject NameAimIndicative intended Learning Outcomes -by the end of each learning activity the student will be able to;4.1Case HandlingTo provide and understanding of how to recognise the different stages of an intelligence case and the need to record, organise and retain all relevant materialExplain the intelligence cycle in a case handling context Explain the importance of record keeping and decision making in a case building context 4.2Record Keeping; Note Taking and Original NotesTo provide an understanding of the purpose and objective of note taking and to enable students to take effective notes and know what should and should not be included within those notes.Explain best practice for note taking during intelligence case building Explain the need for contemporaneous notes Explain rules and best practice governing note taking and record keeping Explain court procedure and disclosure issues in respect of notes and records Explain the appropriate methods of notes and records preservation4.3Preparation and Taking of Witness StatementsTo provide an understanding of the knowledge and skills needed to plan and write witness statementsExplain the purpose of a witness statement and how it is used Explain the different types of witness statement Explain good practice for taking/writing witness statements Understand CPS guidelines on obtaining telephone/remote statements Table 5 Mandatory Core Intelligence SkillsNumberSubject NameAimIndicative intended Learning Outcomes -by the end of each learning activity the student will be able to;5.1The Intelligence CycleTo provide an understanding of the Intelligence Cycle and how it impacts on intelligence activityExplain the key elements and purpose of the intelligence cycle and the NIM Recognise how the intelligence cycle impacts on your organisation 5.2Intelligence Sources, and Types of IntelligenceTo provide an understanding of the wide range of sources available for exploitation, the categories into which the intelligence falls and Terms of ReferenceExplain the different types of intelligence; operational, tactical and strategic Explain the range of sources of information both within and outside their organisation Explain the legal and other considerations that must be taken when exploiting a source of information 5.3Intelligence; Its place in the UK Fraud landscapeTo provide an overview of the counter fraud landscape in the UK and the principle agencies involved, how they interact in terms of gathering and exchanging information and intelligence.Explain how different types of fraud could affect their organisation and others and the role of Intelligence in preventing this Explain fraud types and risk that affect their organisation List agencies and organisations involved in counter fraud intelligence activities Explain the application of strategic intelligence Explain the use of appropriate technology to address key and emerging threats5.4Collecting information and developing IntelligenceTo provide an understanding of the requirements of the collection and development of information and intelligenceExplain how to use a range of sources to gather information Explain the ability to develop information and intelligence to close intelligence gaps and identify threats and trends Explain how to protect information using appropriate security classifications Explain option for tasking other teams/people to develop relevant case building objectives Explain how to identify when intelligence cases are not progressing as necessary Explain plans for gathering intelligence Explain the difference between overt and covert intelligence and the relevant legislation that governs these 5.5Recording Intelligence To provide an understanding of intelligence management procedures, pathways and how they relate to the receipt and recording Intelligence MaterialExplain types of intelligence product and subsequent use Explain who needs to be made aware of fraud risk and intelligence referrals inside and outside their organisation Adhere to procedures and legal requirements when receiving and recording intelligence, including any statutory pathways, secure gateways and public interest considerations Explain how to record intelligence securely, accurately and in a manner that enables analysis Explain use of appropriate handling codes Explain the use of intelligence reporting risk assessing 5.6Intelligence ProductsTo Produce and report Intelligence PackagesExplain how to produce Intelligence Packages Explain how to review and develop intelligence from various sources resulting in a valid foundation from which to further intelligence case building or an investigation 5.7Intelligence Products - DisseminationTo provide an understanding of correct dissemination processes, decision making and pathways.Explain how to sanitise intelligence for dissemination both inside and outside their organisation Explain dissemination via legal gateways Explain the identification of restrictions to dissemination of intelligence depending upon the recipients Explain the difference between intelligence and evidence 5.8The use of Human Intelligence SourcesTo provide an understanding of the value and potential for exploitation of human intelligence and the relevant legal considerations.Understand the importance of the use of human intelligence in an operational intelligence environment Explain source definitions, organisational policy and Status Drift regarding human sources of intelligence Explain organisational processes for using covert human sources Understand the additional risks that are associated with the use of human intelligence Explain how to report information from human sources of intelligence      CFPAB; Accredited Counter Fraud Intelligence Technician (ACFITech) Syllabus Update September 2023 - Final  PAGE \* MERGEFORMAT 1    ./07DHRmo׵ׄwgXI7I"h xhK-5CJOJQJ\aJh xhK-CJOJQJaJhqEhUCJOJQJaJhqEh-5CJOJQJaJh-5CJOJQJaJ"hqEhU56CJOJQJaJhqEhUCJOJQJaJhqEh25CJOJQJaJ(hlehU5B*CJOJQJaJphhU5CJOJQJaJhqEhU5CJOJQJaJhU5CJOJQJaJhUCJOJQJaJ  ./07DHlcccc $Ifgd1zkd$$Ifl|6V: ` t f0V:644 lap fytc $$Ifa$gd1$a$gdUgdU "kd$$Ifl\| 6X-% ```` t(0V:644 lap(ytc $Ifgd1. |  = & F$IfgdK- $IfgdK-  . |   = D 1 8 9 I y    4 5  C óÕÕÕÂáÕÕÂ%h2hGB*CJOJQJaJphhGCJOJQJaJ"h xhG5CJOJQJ\aJh xhG5CJOJQJaJh xhGCJOJQJaJ%h2hK-B*CJOJQJaJphh xhK-CJOJQJaJhWCJOJQJaJ+ 1 y [RRREE & F$IfgdG $IfgdGkd$$Ifl\| 6X-% t0V:644 laytc    5 NEEE8 & F$IfgdG $IfgdGkdQ$$Ifl\| 6X-% t0V:644 laytc & F$IfgdG C A<gdUkd$$Ifl\| 6X-% t0V:644 laytc & F$IfgdG & F$IfgdG !#ŸteSSSFh-5CJOJQJaJ"h xhU56CJOJQJaJhApy56CJOJQJaJh2h xB*CJaJphh xhU5CJOJQJaJ(h2hU5B*CJOJQJaJphh xhU5CJOJQJaJh"B 5CJOJQJaJ"hF-5B*CJOJQJaJph(h2hc5B*CJOJQJaJph%h2hUB*CJOJQJaJph o|kd$$Ifl|6V:  t 0V:644 lap yt x $$Ifa$gd1$a$gdU e $IfgdApy $$Ifa$gd1#cdefij$+\;Qĵӣӗyym\!h`h2L[B*CJ^JaJphhUB*CJaJphh xhWB*CJaJphh xhUB*CJaJphhWB*CJaJph"h xhU5CJOJQJ\aJh xh}b3CJOJQJaJh2h xB*CJaJphh xhUCJOJQJaJh-5CJOJQJaJh-h-5CJOJQJaJ efj) $Ifgd1kdE$$Ifl5\|z 6.+-%  t(0V:644 lap(yt x$\; & F hh$If^hgd` & F hh$If^hgdU  & F$Ifgd1 $Ifgd1"&EF\"νmmm[JJ\`aԴvddS h xhUB*CJ\aJph#h xhU5CJOJQJ^JaJh xhK-CJOJQJaJh xh}b3CJOJQJaJh2h xB*CJaJph h xhUCJOJQJ^JaJh xhUCJOJQJaJ!h xhUB*CJ^JaJphh xhUB*CJaJphhT1B*CJaJph h xhUCJOJQJ^JaJb4kd[$$Ifl\|z 6.+-% t0V:644 laytc & F$7$8$H$Ifgd1  & F$Ifgd1 $Ifgd1a8kd$$Ifl\|z 6.+-% t0V:644 laytc  & F$Ifgd1  & F$Ifgd1 $Ifgd1"#9:BOS\ѾzhhYJ;Yh xh}b3CJOJQJaJh2h xB*CJaJphh xhUCJOJQJaJ"h-h-56CJOJQJaJh2h xB*CJaJphh xhU5CJOJQJaJ(h2hU5B*CJOJQJaJphh xhU5CJOJQJaJ%h2hUB*CJOJQJaJphh xhUB*CJaJph!h xhUB*CJ^JaJphhT1B*CJ^JaJph9:BOSja $Ifgd x|kd$$Ifl|D69  t 09644 lap yt x $$Ifa$gd1$a$gdUgdU) $Ifgd1kdO $$Ifl\|A! [D6"$  t(ԴԴԴԴ09644 lap(ԴԴԴԴyt x"#I\"#X\"#=A\hoටtttttthT1CJOJQJ^JaJ h xhUCJOJQJ^JaJ&h xhU5CJOJQJ\^JaJh xh}b3CJOJQJaJh2h xB*CJaJphhT1B*CJaJphh xhUB*CJaJphh xhUCJOJQJaJh xhU5CJOJQJaJ-IX & F$Ifgd1 & F hh$If^hgdU $Ifgd1=h[RRRAAA & F $7$8$H$Ifgd1 $Ifgd1kd] $$Ifl\|A! [D6<$ t09644 laytc"#\p{"#=H\"#ƷvvhhhhFCJOJQJ^JaJ&h xhU5CJOJQJ\^JaJh xhUCJOJQJaJh xh}b3CJOJQJaJh xhK-CJOJQJaJh2h xB*CJaJphh xhUB*CJaJphhT1B*CJaJph h xhUCJOJQJ^JaJhT1CJOJQJ^JaJ(p4kd $$Ifl\|A! [D6<$ t09644 laytc & F hh$If^hgdU & F $7$8$H$Ifgd1=3K & F $7$8$H$Ifgd1 & F $7$8$H$Ifgd1 $Ifgd1#3:K\"#O\ost"#%MT\Ǹ~rcrrhSCKhUB*CJaJphhFB*CJaJphh xhSCKB*CJaJphhSCKB*CJaJphh xhUB*CJaJphh xhU5CJOJQJaJh xhUCJOJQJaJh xh}b3CJOJQJaJh2h xB*phhFCJOJQJ^JaJ h xhUCJOJQJ^JaJ&O[RRIR<  & F$Ifgd1 $Ifgd1 $Ifgd1kd $$Ifl\|A! [D6<$ t09644 laytcO%M  & F$Ifgd1  & F$IfgdSCK  & F$Ifgd1   " $ 1 5 6 ? Z \ ȸ}k[N>Nh-h-5CJOJQJaJh-5CJOJQJaJh xh-5CJOJQJaJ"h xh-56CJOJQJaJh-56CJOJQJaJhh6h-5CJOJQJaJhh6hUCJOJQJaJhK-5CJOJQJaJhh6hU5CJOJQJaJhU5CJOJQJaJhh6hU5CJOJQJaJhh6hUOJQJh xhUB*CJaJph [VVJ $$Ifa$gd1gdUkdX $$Ifl\|A! [D6<$ t09644 laytc  $ 1 5 wwwn $Ifgd- $$Ifa$gd-|kd $$Ifl|6V: ` t a0V:644 lap ayt x !! !"!Q!X!\!!!!!!!!!!!"" """\"""""### #"#0#?#񸧧Ƈyyyyh h xhFCJOJQJ^JaJhFCJOJQJ^JaJ h xh-CJOJQJ^JaJh xh-B*CJaJph h xh-B*CJ\aJphhFB*CJ\aJphh xh-5CJOJQJaJhSCKCJOJQJaJhh6h-CJOJQJaJh xh-CJOJQJaJ( ) $Ifgd-kd $$Ifl\|~ 6.a$ @@@@ t(0V:644 lap(yt x Q!!!!!!8kd$$Ifl\|~ 6.a$ t0V:644 laytc h$If^hgdF  & F$Ifgd- $Ifgd-!""#G###"$  & F$Ifgd- & F$7$8$H$Ifgd- $Ifgd-?#G#N#\#######$ $!$"$#$%$&$'$T$\$$$$$$%% %"%&%'%\%b%c%Ƶ{ogg_h-CJaJhSCKCJaJh-B*CJaJphh xh-5CJOJQJaJhSCKCJOJQJaJh xh-CJOJQJaJhh6h-CJOJQJaJ h xh-B*CJ\aJphh xh-B*CJaJphhFB*CJaJphhFCJOJQJ^JaJ h xh-CJOJQJ^JaJ!"$#$'$T$$$'%[RRREE  & F $Ifgd- $Ifgd-kdZ$$Ifl\|~ 6.a$ t0V:644 laytc'%c%%%%%%%HCCCCgdUkd$$Ifl\|~ 6.a$ t0V:644 lap yt`  & F $IfgdSCKc%m%q%%%%%%%%%%%%%%%%%& &"&X&Y&Z&]&^&öÖuuuufWHh xhUCJOJQJaJh xheCJOJQJaJhh6hUCJOJQJaJ"h-h-56CJOJQJaJhh6hUCJOJQJaJhh6hU5CJOJQJaJhh6hU5CJOJQJaJhc5CJOJQJaJhU5CJOJQJaJhh6h-CJOJQJaJh`h#B*CJaJph!h`h"B B*CJ^JaJph%%%%%%%%Y&ri $Ifgd x|kd$$Ifl|6V:  t 0V:644 lap yt x $$Ifa$gd1gdUY&Z&^&u&) $Ifgd1kd[$$Ifl1\|| 16.$  t(0V:644 lap(yt x^&e&t&u&&&&&&&&'' '!'"'b'c'd'e'f'i'j'~'''''''³ޕ|m[#h xhm 5CJOJQJ^JaJh xheCJOJQJaJhh6hUOJQJh xh356OJQJh xh3CJOJQJaJh xh3B*CJaJphh xhUB*CJaJphhFB*CJaJphh xhU5CJOJQJaJh xhUCJOJQJaJ#h xhU5CJOJQJ^JaJu&&"'d'e' h$If^hgdF & F$Ifgd3  & F$Ifgd1 $Ifgd1e'f'j''7((([RRREE  & F$Ifgd1 $Ifgd1kdi$$Ifl\|| 16.$ t0V:644 laytc''(( ("(6(7(>(b(e(((((((() )) )")E)F)G)H)J)K)X)ò}n_Oh xhc5CJOJQJaJh xheCJOJQJaJh xhcCJOJQJaJhh6hUOJQJh xhm B*CJaJphhFB*CJaJphh xhUB*CJaJph h xhm B*CJ\aJph h xhUB*CJ\aJphhFB*CJ\aJphh xhUCJOJQJaJh xhm CJOJQJaJ(E)F)G)K)~)8*A888 $Ifgd1kd$$Ifl\|| 16.$ t0V:644 laytc h$If^hgdF  & F$Ifgd1X)Y)e)})~))))* *"*8*e*********+ +"+E+F+Q+e+y++++++ziizXXXX h xh3B*CJ\aJph h xh2\oB*CJ\aJphhFB*CJ\aJphh xhUB*CJaJphh xh2\oB*CJaJphhFB*CJaJphh xh2B*CJaJphh xhUCJOJQJaJ#h xhU5CJOJQJ^JaJhF5CJOJQJaJh xhU5CJOJQJaJ!8***F+y++  & F$Ifgd1 h$If^hgdF  & F$Ifgd2\o  & F$Ifgd1++++++, ,",e,q,x,,,,- -"-%-,-H-e-r-s-------.. .".H.e........潮zh xh xCJOJQJaJh xheCJOJQJaJ hh6hm h xhm B*CJaJphh xhXB*CJaJphhFB*CJaJphhF5CJOJQJaJh xhm 5CJOJQJaJh xhm CJOJQJaJhh6hUOJQJ*++++q,,%-s-[RRREEE  & F$Ifgd1 $Ifgd1kd$$Ifl\|| 16.$ t0V:644 laytcs--.H.... h$If^hgdX h$If^hgdF  & F$Ifgd1....h//0[RRREE  & F$Ifgd1 $Ifgd1kdd$$Ifl\|| 16.$ t0V:644 laytc....../ /"/C/G/e/h/u//////00 0"0M0R0e00000001 111 1"1$1G1N1Z1e1q1{1111񶧧zzzzzzh xh:{B*CJaJphh xhB*CJaJphh xh3B*CJaJphh xhUB*CJaJphhSCKB*CJaJphh xhCJOJQJaJh xh5CJOJQJaJh xhU5CJOJQJaJh xhUCJOJQJaJ/001G1111Akd $$Ifl\|| 16.$ t0V:644 laytc h$If^hgdSCK  & F$Ifgd11111111111111122 2"2e2i22222222222欬{kk[h xhm 5CJOJQJaJh xh5CJOJQJaJh xhm CJOJQJaJ hh6h:{hSCKB*CJaJphh xhB*CJaJphh xh:{B*CJaJphhSCKCJOJQJaJh xh:{5CJOJQJaJh xh xCJOJQJaJh xh:{CJOJQJaJhh6hUOJQJ111111122 $Ifgdm 8$If^8gd  & F$Ifgd  & F$Ifgd $Ifgd12222*333[RRREE  & F$Ifgd $Ifgd1kd$$Ifl\|| 16.$ t0V:644 laytc23 3"3)3*313e33333333444 4"4X4Y4Z4\4]4^4e44445 5ָxiYYiiiih xhU5CJOJQJaJh xhUCJOJQJaJh xh xCJOJQJaJh xhOCJOJQJaJ hh6hm h xhSCKB*CJaJphhF-B*CJaJphh xhF-B*CJaJphh xhB*CJaJphhSCKB*CJaJphh xhm CJOJQJaJh xhCJOJQJaJ34X4Y4Z44kd_$$Ifl\|| 16.$ t0V:644 laytc h$If^hgdSCK  & F$IfgdSCK  & F$IfgdF-Z4^44 5o556s666 h$If^hgdSCK  & F$Ifgd1  & F$Ifgd1 $Ifgd1 5 5"5e5o55555555566 6"6e6s6z66666666666666666666666777 7 7 777ỷh-OJQJ^JhWOJQJ^JhchcOJQJ^Jh[mhU[jhU[Uh'Chh6hUOJQJhSCKB*CJaJphh xhlB*CJaJphh xhXB*CJaJphh xhUB*CJaJph16666666666[VTTTTTTTgdK-kd$$Ifl\|| 16.$ t0V:644 laytc 6666 767778797U7V7W7X7Y7Z7[7\7]7gdK-$a$$a$gd#$a$gdc7777-75767778797:7Q7R7S7T7U7V7W7X7Y7Z7[7\7]7ԥȝh'Ch1hUjhcUmHnHuhmHnHujhcUhU[h[mhhch[mOJQJ^Jh"B OJQJ^Jh#OJQJ^Jh0=OJQJ^J51h0:pcA .!"#$% $$If!vh#vV::V l ` t f0V:65V:ap fytc$$If!vh#vX#v#v-#v%:V l ```` t(0V:65X55-5%ap(ytc$$If!vh#vX#v#v-#v%:V l t0V:65X55-5%aytc$$If!vh#vX#v#v-#v%:V l t0V:65X55-5%aytc$$If!vh#vX#v#v-#v%:V l t0V:65X55-5%aytc$$If!vh#vV::V l  t 0V:65V:ap yt x $$If!vh#v.#v#v+#v-%:V l5  t(0V:65.55+5-%ap(yt x$$If!vh#v.#v#v+#v-%:V l t0V:65.55+5-%ap yt`$$If!vh#v.#v#v+#v-%:V l t0V:65.55+5-%aytc$$If!vh#v.#v#v+#v-%:V l t0V:65.55+5-%aytc$$If!vh#v.#v#v+#v-%:V l t0V:65.55+5-%aytc$$If!vh#v.#v#v+#v-%:V l t0V:65.55+5-%aytc$$If!vh#v9:V l  t 09659ap yt x $$If!vh#v#v#v:#v$:V l  t(ԴԴԴԴ096555"5$ap(ԴԴԴԴyt x$$If!vh#v#v#v:#v$:V l t096555<5$aytc$$If!vh#v#v#v:#v$:V l t096555<5$aytc$$If!vh#v#v#v:#v$:V l t096555<5$aytc$$If!vh#v#v#v:#v$:V l t096555<5$aytc$$If!vh#vV::V l ` t a0V:65V:ap ayt x $$If!vh#v.#v#va#v$:V l @@@@ t(0V:65.55a5$ap(yt x$$If!vh#v.#v#va#v$:V l t0V:65.55a5$aytc$$If!vh#v.#v#va#v$:V l t0V:65.55a5$aytc$$If!vh#v.#v#va#v$:V l t0V:65.55a5$ap yt`$$If!vh#vV::V l  t 0V:65V:ap yt x $$If!vh#v.#v#v#v$:V l1  t(0V:65.555$ap(yt x$$If!vh#v.#v#v#v$:V l t0V:65.555$aytc$$If!vh#v.#v#v#v$:V l t0V:65.555$aytc$$If!vh#v.#v#v#v$:V l t0V:65.555$aytc$$If!vh#v.#v#v#v$:V l t0V:65.555$aytc$$If!vh#v.#v#v#v$:V l t0V:65.555$aytc$$If!vh#v.#v#v#v$:V l t0V:65.555$aytc$$If!vh#v.#v#v#v$:V l t0V:65.555$aytc$$If!vh#v.#v#v#v$:V l t0V:65.555$aytcx002&6FVfv2(&6FVfv&6FVfv&6FVfv&6FVfv&6FVfv&6FVfv8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@66666_HmH nH sH tH @`@ UNormalCJ_HaJmH sH tH DA D Default Paragraph FontRi@R  Table Normal4 l4a (k (No List bob UDefault 7$8$H$-B*CJOJQJ^J_HaJmH phsH tH 4@4 U0Header  9r 4 @4 U0Footer  9r .)!. U Page Number6/16 c0 Header CharCJaJ6/A6 c0 Footer CharCJaJB' QB -Comment ReferenceCJaJ<b< - Comment TextCJaJ:q: -Comment Text Char@jab@ -Comment Subject5\F/F -Comment Subject Char5\HH - Balloon TextCJOJQJ^JaJN/N -Balloon Text CharCJOJQJ^JaJff G List Paragraphd^m$CJOJPJQJ^JaJPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭Vj\{cp/IDg6wZ0s=Dĵw %;r,qlEآyDQ"Q,=c8B,!gxMD&铁M./SAe^QשF½|SˌDإbj|E7C<bʼNpr8fnߧFrI.{1fVԅ$21(t}kJV1/ ÚQL×07#]fVIhcMZ6/Hߏ bW`Gv Ts'BCt!LQ#JxݴyJ] C:= ċ(tRQ;^e1/-/A_Y)^6(p[_&N}njzb\->;nVb*.7p]M|MMM# ud9c47=iV7̪~㦓ødfÕ 5j z'^9J{rJЃ3Ax| FU9…i3Q/B)LʾRPx)04N O'> agYeHj*kblC=hPW!alfpX OAXl:XVZbr Zy4Sw3?WӊhPxzSq]y ]/' |~ #"# ?#c%^&'X)+.12 57]7 $'*,/0369<?BFILOQSWY\_b eevO !"$'%%Y&u&e'(8*+s-.0123Z466]7!"#%&()+-.124578:;=>@ACDEGHJKMNPRTUVXZ[]^`a~!@ @ 0(  B S  ?H0(  .........0/5/9/T/[/^/1<mx7APZ/9v~b d 6; bn.1@IKM#FK|@E&Xb!Wc~ 9!D!!!"""";#E#k#w#$$%$%c%r%%%&&;&G&&&(((())v))))**++++,,O,W,c-n---..f.r............[/^/333333333333333333333333333333333333333333333333333333333333333333333 ost'......9/T/U/W/[/^/ ost'............9/T/U/W/[/^/?b5m,"\!*,X hruZV2\"?J"CcI.HR88^=^&R;=#"~>(dI?.=ijOjt]Zf^(h[_Z&LgdҌ fF{=f0@)la^naNnMjvqt huGwv8`Ozd V~9<|^hhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hH hh^h`OJQJo( 88^8`OJQJo(o ^`OJ QJ o(   ^ `OJQJo(   ^ `OJQJo(o xx^x`OJ QJ o( HH^H`OJQJo( ^`OJQJo(o ^`OJ QJ o(hhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hH hh^h`OJQJo( 88^8`OJQJo(o ^`OJ QJ o(   ^ `OJQJo(   ^ `OJQJo(o xx^x`OJ QJ o( HH^H`OJQJo( ^`OJQJo(o ^`OJ QJ o( hh^h`OJQJo( 88^8`OJQJo(o ^`OJ QJ o(   ^ `OJQJo(   ^ `OJQJo(o xx^x`OJ QJ o( HH^H`OJQJo( ^`OJQJo(o ^`OJ QJ o(hhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hH+;^;`CJOJPJQJRHd^J_H aJo(sH tH ^`_H o(sH tH " X^X`_H o(sH tH " ^`_H o(sH tH " | ^| `_H o(sH tH "  ^ `_H o(sH tH "  ^ `_H o(sH tH " 2^2`_H o(sH tH " ^`_H o(sH tH " hhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hH ^`OJQJo( ^`OJQJo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJ QJ o( ^`OJQJo( ^`OJQJo(o PP^P`OJ QJ o(hhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHhhh^h`OJQJo(hHh88^8`OJQJ^Jo(hHoh^`OJ QJ o(hHh  ^ `OJQJo(hHh  ^ `OJQJ^Jo(hHohxx^x`OJ QJ o(hHhHH^H`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJ QJ o(hHruh[_ fNnI.\t]m,{=f@)l~9 huVf^2Oz^=,X "?#"~>R88a^ngdI??wvvqR;=ijO         _z                                            _z        _z                                                                       ahO>R6Fpl7VՔ                                                                                                                              GF%pV4m "B Wc!"#T1}b3}=6?V?T@'CF@ISCKU2L[U[`lee2\o/>rxApy:{2^ATXc3/si8JTlSJhOB xW0=P}G`[m+g2R~1S|K-B~l1F--u..@]/p@Unknown G.[x Times New Roman5Symbol3. .[x Arial7..{$ Calibri7. [ @Verdana;. .[x Helvetica9. . Segoe UIC.,.{$ Calibri Light?= .Cx Courier New;WingdingsA$BCambria Math"1h**'T'T!20..3q@P ?U2! xx~_ ANNEX B7070002Karen Dalgarno                         Oh+'0d   , 8DLT\ANNEX B7070002 Normal.dotmKaren Dalgarno2Microsoft Office Word@@o@o' ՜.+,D՜.+,H hp  HM Revenue and CustomsT. ANNEX B Title(iq} TaxCatchAll!lcf76f155ced4ddcb4097134ff3c332f  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcefghijklmnoqrstuvwxyz{|}~Root Entry FoData d1Tablep#WordDocument 7SummaryInformation(DocumentSummaryInformation8MsoDataStoreo3oJ4PRXO3N==2 o oItem  PropertiesOKZ5NVR2AG==2 o3oItem  5Properties }CompObjr DocumentLibraryFormDocumentLibraryFormDocumentLibraryForm This value indicates the number of saves or revisions. The application is responsible for updating this value after each revision. metaAttributes"/>  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q