<div dir="ltr">Of interest in the announcement: ICAM software is now within the definition of "Executive Order - Critical" software. <div>I believe that this might result in an increase in interest in product conformance to standards...<br clear="all"><div><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr">







<p><b>Andrew Hughes </b><font size="1"><span>CISM CISSP</span><span> </span></font><br><b>In Turn Information Management Consulting</b></p><p><span style="color:rgb(33,33,33);font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;font-size:13.2px;line-height:19.8px">o  +1 650.209.7542<br></span>m +1 250.888.9474<br><font size="1">
5043 Del Monte Ave., Victoria, BC V8Y 1W9</font><br><span><a href="mailto:AndrewHughes3000@gmail.com" target="_blank"><font size="1">AndrewHughes3000@gmail.com</font></a></span><span><font size="1"> </font><br></span><font size="1"><font color="#0000ee"><u><a href="https://www.linkedin.com/in/andrew-hughes-682058a" target="_blank">https://www.linkedin.com/in/andrew-hughes-682058a</a></u></font><br></font><b><font size="1">Digital Identity | International Standards | Information Security </font></b></p></div></div></div></div></div></div></div></div></div></div></div><br><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">---------- Forwarded message ---------<br>From: <strong class="gmail_sendername" dir="auto">NIST Cybersecurity and Privacy Program</strong> <span dir="auto"><<a href="mailto:csrc.nist@service.govdelivery.com">csrc.nist@service.govdelivery.com</a>></span><br>Date: Fri, Jun 25, 2021 at 8:34 AM<br>Subject: NIST Issues Definition of Critical Software Called for by Cybersecurity Executive Order<br>To:  <<a href="mailto:andrewhughes3000@gmail.com">andrewhughes3000@gmail.com</a>><br></div><br><br><u></u>



    





<div style="line-height:1.4;margin:0;padding:0;width:100%!important">



<a name="m_-6919947956107449036_gd_top" id="m_-6919947956107449036gd_top"></a>

  



  
  <table width="100%" cellpadding="0" cellspacing="0" border="0" align="center" class="m_-6919947956107449036gd_tbl_wrap"><tbody><tr><td style="background-color:#f2f2f2;margin:0;padding:0;width:100%!important" bgcolor="#f2f2f2"><table class="m_-6919947956107449036main-table" width="600" align="center" cellpadding="0" cellspacing="0" id="m_-6919947956107449036yahoo" style="width:600px;border-collapse:collapse">

<tbody><tr>
<td>
<table class="m_-6919947956107449036main-table" width="100%" align="center" cellpadding="0" cellspacing="0" bgcolor="#FFFFFF" style="background-color:#fff;border-collapse:collapse">

<tbody><tr>
<td id="m_-6919947956107449036columns-bg" style="background-color:#000000" bgcolor="#000000">
<table class="m_-6919947956107449036main-table" width="100%" align="center" cellpadding="0" cellspacing="0" style="border-collapse:collapse">
<tbody><tr>
<td width="50%" align="left" valign="top">
<table width="100%" align="left" cellpadding="0" cellspacing="0" style="border-collapse:collapse">
<tbody><tr>
<td id="m_-6919947956107449036left-column" width="100%" style="padding:10px 15px">
<img class="m_-6919947956107449036govd_template_image" src="https://content.govdelivery.com/attachments/fancy_images/USNIST/2019/04/2487463/2805250/nist_crop.png" style="width:107px;height:auto!important;max-height:auto!important;border:none" alt="NIST" width="107" height="32">
</td>
</tr>  
</tbody></table>
</td>
<td width="50%" align="right" valign="top">
<table width="100%" align="left" cellpadding="0" cellspacing="0" style="border-collapse:collapse">
<tbody><tr>
<td id="m_-6919947956107449036right-column" width="100%" style="padding:8px 15px 0px">
<p style="line-height:1.1;margin-top:10px!important;margin-bottom:10px!important;color:#e8b40f;font-family:helvetica;font-size:13px;text-align:right" align="right"><a href="https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMTA2MjUuNDI0MTQ5NzEiLCJ1cmwiOiJodHRwczovL2NvbnRlbnQuZ292ZGVsaXZlcnkuY29tL2FjY291bnRzL1VTTklTVC9idWxsZXRpbnMvMmU1NjdlNyJ9.KIbSEcMyFh7jQn8GtJf-THP68ku-6J2DYgu-ITJi0yk/s/1376030715/br/108446640018-l" title="View As Web Page" rel="noopener" style="color:#e8b40f;text-decoration:underline;word-break:break-word" target="_blank">View As Web Page</a></p>
</td>
</tr>  
</tbody></table>
</td>
</tr>
</tbody></table>
</td>
</tr>  
  
<tr>
<td>
<table class="m_-6919947956107449036main-table" width="100%" align="center" cellpadding="0" cellspacing="0" style="border-collapse:collapse">
<tbody><tr>
<td id="m_-6919947956107449036main-header" width="100%">
<img class="m_-6919947956107449036govd_template_image" src="https://content.govdelivery.com/attachments/fancy_images/USNIST/2019/09/2800392/cyber-header_original.png" style="width:600px;height:auto!important;max-height:auto!important;border:none" alt="Header" width="600" height="154">
</td>
</tr>
</tbody></table>
</td>
</tr>

<tr>
<td>
<table class="m_-6919947956107449036main-table" width="100%" align="center" cellpadding="0" cellspacing="0" style="border-collapse:collapse">
<tbody><tr>
<td id="m_-6919947956107449036main-date" width="100%" style="background:#666666 url(https://content.govdelivery.com/attachments/fancy_images/USNIST/2019/09/2800397/cyber-pattern_original.png) repeat;padding:10px 15px" bgcolor="#666666">
<h1 style="margin-top:10px!important;margin-bottom:10px!important;line-height:1.1;font-weight:bold;color:#ffffff;font-family:helvetica;font-size:26px;text-align:left" align="left">Cybersecurity Insights</h1>
</td>
</tr>
</tbody></table>
</td>
</tr>

<tr>
<td>
<table class="m_-6919947956107449036main-table" width="100%" align="center" cellpadding="0" cellspacing="0" style="border-collapse:collapse">
<tbody><tr>
<td id="m_-6919947956107449036main-body" width="100%" style="padding:15px">
<h1 style="margin-top:10px!important;margin-bottom:10px!important;line-height:1.1;font-weight:bold;color:#000000;font-family:helvetica;font-size:30px;text-align:left" align="left"><span lang="EN-US" style="line-height:1.1;font-weight:bold"><span style="line-height:1.1;font-weight:bold">NIST Issues Definition of Critical Software Called for by Cybersecurity Executive Order</span></span></h1>
<img class="m_-6919947956107449036govd_template_image" src="https://content.govdelivery.com/attachments/fancy_images/USNIST/2021/06/4668354/eo-improving-nations-cybersecurity_original.png" style="width:571px;height:auto!important;max-height:auto!important;border:none" alt="EO Improving Nation's Cybersecurity" width="571" height="385"><div>
<p style="line-height:1.4;margin-top:10px!important;margin-bottom:10px!important;color:#000000;font-family:helvetica;font-size:14px;text-align:left" align="left"><span style="line-height:1.4"><br>Fulfilling one of its </span><a href="https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMTA2MjUuNDI0MTQ5NzEiLCJ1cmwiOiJodHRwczovL3d3dy5uaXN0Lmdvdi9pdGwvZXhlY3V0aXZlLW9yZGVyLWltcHJvdmluZy1uYXRpb25zLWN5YmVyc2VjdXJpdHkifQ.v0VlDoGZlXVi8_ZNiDc6TvmzF8p_LDqsrMtCeaRnSzY/s/1376030715/br/108446640018-l" rel="noopener" style="color:#1f89c1;text-decoration:underline;word-break:break-word" target="_blank"><span style="line-height:1.4"><span style="line-height:1.4">assignments </span><span style="line-height:1.4">to enhance the security of the software supply chain</span></span></a><span style="line-height:1.4"> called for by</span><span style="line-height:1.4"> a May 12, 2021, </span><span style="line-height:1.4">Presidential </span><a href="https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMTA2MjUuNDI0MTQ5NzEiLCJ1cmwiOiJodHRwczovL3d3dy5mZWRlcmFscmVnaXN0ZXIuZ292L2QvMjAyMS0xMDQ2MCJ9.S8zhUV0YXBYhCB682riXguAxvk5dRay58e6KvYxNNrY/s/1376030715/br/108446640018-l" rel="noopener" style="color:#1f89c1;text-decoration:underline;word-break:break-word" target="_blank"><span style="line-height:1.4">Executive Order on</span></a><a href="https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMTA2MjUuNDI0MTQ5NzEiLCJ1cmwiOiJodHRwczovL3d3dy5mZWRlcmFscmVnaXN0ZXIuZ292L2QvMjAyMS0xMDQ2MCJ9.yYbevr4bpA-1UXq0eifkV0FuKBuSd75TwmfkFJQMIvk/s/1376030715/br/108446640018-l" rel="noopener" style="color:#1f89c1;text-decoration:underline;word-break:break-word" target="_blank"><span style="line-height:1.4"> </span></a><a href="https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMTA2MjUuNDI0MTQ5NzEiLCJ1cmwiOiJodHRwczovL3d3dy5mZWRlcmFscmVnaXN0ZXIuZ292L2QvMjAyMS0xMDQ2MCJ9.-r72GQvUhl8b8QxpImGIstl5eCkGnhNiMjJklM5ftcE/s/1376030715/br/108446640018-l" rel="noopener" style="color:#1f89c1;text-decoration:underline;word-break:break-word" target="_blank"><span style="line-height:1.4">Improving the Cybersecurity of the Federal Government (14028)</span></a><span style="line-height:1.4">, the National Institute of Standards and Technology (NIST) today published a definition of “critical software.”</span><span style="line-height:1.4"> </span></p>
</div>
<div>
<p style="line-height:1.4;margin-top:10px!important;margin-bottom:10px!important;color:#000000;font-family:helvetica;font-size:14px;text-align:left" align="left"><span style="line-height:1.4">The executive order (EO) directs the Cybersecurity & Infrastructure Security Agency (CISA) to develop a list of software categories and products in use or in the acquisition process which meet this definition of critical software. </span><span style="line-height:1.4"> </span></p>
</div>
<div>
<p style="line-height:1.4;margin-top:10px!important;margin-bottom:10px!important;color:#000000;font-family:helvetica;font-size:14px;text-align:left" align="left"><span style="line-height:1.4">To coordinate the definition with its eventual application, NIST solicited position papers from the community, hosted a virtual workshop to gather input, and consulted with CISA, the Office of Management and Budget (OMB), the Office of the Director of National Intelligence (ODNI), and the National Security Agency (NSA) to develop the definition, the concept of a phased implementation, and a preliminary list of common categories of software that would fall within the scope for the initial phase.  Additional guidance on applying this definition in implementing the EO will be forthcoming from CISA and OMB.  NIST worked closely with CISA and OMB to ensure that the definition and recommendations are consistent with their plans.   </span><span style="line-height:1.4"> </span></p>
</div>
<div>
<p style="line-height:1.4;margin-top:10px!important;margin-bottom:10px!important;color:#000000;font-family:helvetica;font-size:14px;text-align:left" align="left"><span style="line-height:1.4">NIST also has developed a table illustrating the application of the definition of EO-critical software to the scope of the recommended initial implementation phase.  CISA will provide the authoritative list of software categories at a later date.  </span><span style="line-height:1.4"> </span></p>
</div>
<div>
<p style="line-height:1.4;margin-top:10px!important;margin-bottom:10px!important;color:#000000;font-family:helvetica;font-size:14px;text-align:left" align="left"><span style="line-height:1.4">The specific definition of critical software is included in a NIST white paper and on NIST’s website: <a href="https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMTA2MjUuNDI0MTQ5NzEiLCJ1cmwiOiJodHRwczovL3d3dy5uaXN0Lmdvdi9pdGwvZXhlY3V0aXZlLW9yZGVyLWltcHJvdmluZy1uYXRpb25zLWN5YmVyc2VjdXJpdHkvY3JpdGljYWwtc29mdHdhcmUifQ.UcfshLXxbT1go3YQ53C8QlpWK_3iWfDgcUNDP3rOSVM/s/1376030715/br/108446640018-l" rel="noopener" style="color:#1f89c1;text-decoration:underline;word-break:break-word" target="_blank">https://www.nist.gov/itl/executive-order-improving-nations-cybersecurity/critical-software</a>. The paper and website include frequently asked questions (FAQs) about the definition which provide additional context.</span><span style="line-height:1.4"> </span></p>
</div>
<div>
<p style="line-height:1.4;margin-top:10px!important;margin-bottom:10px!important;color:#000000;font-family:helvetica;font-size:14px;text-align:left" align="left"><em><span style="line-height:1.4">Questions about the definition or documents </span></em><span style="line-height:1.4">should be directed to: </span><span style="line-height:1.4"><a href="mailto:swsupplychain-eo@nist.gov" target="_blank">swsupplychain-eo@nist.gov</a>.</span></p>
</div>
<p style="line-height:1.4;margin-top:10px!important;margin-bottom:10px!important;color:#000000;font-family:helvetica;font-size:14px;text-align:left" align="left"> </p>
<h3 style="line-height:1.1;font-weight:bold;color:#000000;font-family:helvetica;font-size:17px;text-align:left;margin:20px 0" align="left"><a href="https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMTA2MjUuNDI0MTQ5NzEiLCJ1cmwiOiJodHRwczovL3d3dy5uaXN0Lmdvdi9pdGwvZXhlY3V0aXZlLW9yZGVyLWltcHJvdmluZy1uYXRpb25zLWN5YmVyc2VjdXJpdHkvY3JpdGljYWwtc29mdHdhcmUifQ.EgSdOVdKrA5Wl882r0pwn3zzQfCnFzkfFFBpcXS77ZE/s/1376030715/br/108446640018-l" title="Read More" rel="noopener" style="color:#ffffff;text-decoration:none;word-break:break-word;background-color:#0076c2;border-color:#0076c2;border-style:solid;border-width:12px 25px" target="_blank">Read More</a></h3>
</td>
</tr>
</tbody></table>
</td>
</tr>

<tr>
<td>
<table class="m_-6919947956107449036main-table" width="100%" align="center" cellpadding="0" cellspacing="0" style="border-collapse:collapse">
<tbody><tr>
<td id="m_-6919947956107449036main-footer" width="100%">

</td>
</tr>
</tbody></table>
</td>
</tr>

</tbody></table>
</td>
</tr>

</tbody></table></td></tr></tbody></table>
  


<div id="m_-6919947956107449036mail_footer">
    <table class="m_-6919947956107449036gd_tbl_wrap" border="0" width="100%" cellspacing="0" cellpadding="0" align="center">
<tbody>
<tr>
<td style="background-color:#f2f2f2;margin:0;padding:0 0 20px 0;width:100%!important" bgcolor="#f2f2f2">
<table class="m_-6919947956107449036mobile-footer" style="width:600px;border-collapse:collapse" width="600" cellspacing="0" cellpadding="0" align="center">
<tbody>
<tr>
<td style="padding:25px 20px 8px;background:#d0cfcf" bgcolor="#d0cfcf" width="100%">
<h2 style="margin-top:0;margin-bottom:0px;line-height:1.2;color:#0073bf;font-family:arial,helvetica,sans-serif;font-size:15px;text-align:center" align="center">Connect with us</h2>
</td>
</tr>
<tr>
<td style="padding:0px 20px 20px;background:#d0cfcf" align="center" bgcolor="#d0cfcf" width="100%"><a href="https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMTA2MjUuNDI0MTQ5NzEiLCJ1cmwiOiJodHRwczovL3R3aXR0ZXIuY29tL25pc3RjeWJlciJ9.auPtfad79LUozJwNmOy5Wg_lxL_YzEg6s0X-tZL9DB4/s/1376030715/br/108446640018-l" rel="noopener" target="_blank"><img src="https://content.govdelivery.com/attachments/fancy_images/USNIST/2018/12/2313148/socl-02_original.png" alt="twitter" width="31" height="21"></a></td>
</tr>
<tr>
<td style="padding:0px 20px 35px;background:#d0cfcf" bgcolor="#d0cfcf" width="100%">
<p style="margin-top:0;margin-bottom:0px;line-height:1.2;font-weight:normal;color:#000000;font-family:arial,helvetica,sans-serif;font-size:15px;text-align:center" align="center">Received this email from a friend? <a href="https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMTA2MjUuNDI0MTQ5NzEiLCJ1cmwiOiJodHRwczovL3B1YmxpYy5nb3ZkZWxpdmVyeS5jb20vYWNjb3VudHMvVVNOSVNUL3N1YnNjcmliZXIvbmV3In0.cWtZC0_lKCGl1G7oHDwT6Nv6kOQXaYNHfHiYNE2vxlQ/s/1376030715/br/108446640018-l" style="color:#0073bf;text-decoration:none" target="_blank">Subscribe here</a>.</p>
</td>
</tr>
<tr>
<td style="padding:0px 20px 30px;background:#d0cfcf" align="center" bgcolor="#d0cfcf" width="100%"><a href="https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMTA2MjUuNDI0MTQ5NzEiLCJ1cmwiOiJodHRwOi8vd3d3Lm5pc3QuZ292LyJ9.h7LTD6FeDbvBM0ehmLINfLkAaB1qZCywAOxuTmFnMQ4/s/1376030715/br/108446640018-l" target="_blank"><img src="http://content.govdelivery.com/attachments/fancy_images/USNIST/2015/10/649264/logo_original.png" alt="NIST" width="282" height="37"></a></td>
</tr>
<tr>
<td style="padding:30px 20px 35px;background:#585858" bgcolor="#585858" width="100%">
<p style="margin-top:0;margin-bottom:20px;line-height:1.2;font-weight:normal;color:#fff;font-family:arial,helvetica,sans-serif;font-size:13px;text-align:center" align="center"><strong>You are subscribed to receive updates to NIST Cyber Blog from the National Institute of Standards and Technology (NIST).</strong></p>
<p style="margin-top:0;margin-bottom:0px;line-height:1.2;font-weight:normal;color:#fff;font-family:arial,helvetica,sans-serif;font-size:13px;text-align:center" align="center"><strong>Subscriber services:</strong></p>
<p style="margin-top:0;margin-bottom:0px;line-height:1.2;font-weight:normal;color:#fff;font-family:arial,helvetica,sans-serif;font-size:13px;text-align:center" align="center"><strong><a href="https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMTA2MjUuNDI0MTQ5NzEiLCJ1cmwiOiJodHRwczovL3B1YmxpYy5nb3ZkZWxpdmVyeS5jb20vYWNjb3VudHMvVVNOSVNUL3N1YnNjcmliZXIvZWRpdD9wcmVmZXJlbmNlcz10cnVlI3RhYjEifQ.ygLosEi-bBeSjtOp3huVZiRr35FRizmxKpdrOWanptA/s/1376030715/br/108446640018-l" style="color:#ffffff;text-decoration:none" target="_blank">Manage Preferences</a>  |  <a href="https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMTA2MjUuNDI0MTQ5NzEiLCJ1cmwiOiJodHRwczovL3B1YmxpYy5nb3ZkZWxpdmVyeS5jb20vYWNjb3VudHMvVVNOSVNUL3N1YnNjcmliZXIvZWRpdD9wcmVmZXJlbmNlcz10cnVlI3RhYjEifQ.OOm1rsKQlGg1FGiHRUZ2TgxQngKfGAA3Zuc9v5GnT5s/s/1376030715/br/108446640018-l" style="color:#ffffff;text-decoration:none" target="_blank">Unsubscribe</a>  |  <a href="https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMTA2MjUuNDI0MTQ5NzEiLCJ1cmwiOiJodHRwczovL3N1YnNjcmliZXJoZWxwLmdvdmRlbGl2ZXJ5LmNvbS8ifQ.naMuSspb5h3_sbblLMC7_crHmIIfxd-7krqsM2_zesA/s/1376030715/br/108446640018-l" style="color:#ffffff;text-decoration:none" target="_blank">Help</a></strong></p>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>

</div>
<div id="m_-6919947956107449036tagline">
    <hr>
<table style="width:100%" border="0" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td style="color:#757575;font-size:10px;font-family:Arial" width="89%">
<p>If you have questions or problems with the subscription service, please contact <a href="https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMTA2MjUuNDI0MTQ5NzEiLCJ1cmwiOiJodHRwczovL3N1YnNjcmliZXJoZWxwLmdvdmRlbGl2ZXJ5LmNvbS8ifQ.yJfowh8rhqzJo119Xm7rm-6dgszg80l9UhrLVJs14c4/s/1376030715/br/108446640018-l" target="_blank">subscriberhelp.govdelivery.com</a>.<br>Technical questions? Contact <a href="mailto:inquiries@nist.gov" target="_blank">inquiries@nist.gov</a>. (301) 975-NIST (6478).</p>
<p>This service is provided to you at no charge by National Institute of Standards and Technology (NIST). 100 Bureau Drive, Stop 1070 · Gaithersburg, MD 20899 · 301-975-6478</p>
</td>
<td width="11%" align="right"><a href="https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMTA2MjUuNDI0MTQ5NzEiLCJ1cmwiOiJodHRwczovL3N1YnNjcmliZXJoZWxwLmdyYW5pY3VzLmNvbS8ifQ.tLt6DIA_SQIHNM549SrcMaDiurCuPp6CaQmSnwZM5b4/s/1376030715/br/108446640018-l" target="_blank"><img src="https://content.govdelivery.com/images/govd-logo-dark.png" border="0" alt="GovDelivery logo" width="115"></a></td>
</tr>
</tbody>
</table>

</div>

<img src="https://links.govdelivery.com/track?enid=ZWFzPTEmYnVsbGV0aW5yZWNpcGllbnRpZD0xMDg0NDY2NDAwMTgtbCZzdWJzY3JpYmVyaWQ9MTM3NjAzMDcxNSZtc2lkPSZhdWlkPSZtYWlsaW5naWQ9MjAyMTA2MjUuNDI0MTQ5NzEmbWVzc2FnZWlkPU1EQi1QUkQtQlVMLTIwMjEwNjI1LjQyNDE0OTcxJmRhdGFiYXNlaWQ9MTAwMSZ0eXBlPW9wZW4mc2VyaWFsPTE3MTM3MDU4JmVtYWlsaWQ9YW5kcmV3aHVnaGVzMzAwMEBnbWFpbC5jb20mdXNlcmlkPWFuZHJld2h1Z2hlczMwMDBAZ21haWwuY29tJnRhcmdldGlkPSZmbD0mbXZpZD0mZXh0cmE9JiYm" width="1" height="1" style="border-width:0;border-style:hidden" alt=""></div>


</div></div></div>