A Legal Agreement That Provides for the Management and Control of Assets

Note that this policy may change if the SEC manages to SEC.gov to ensure that the site operates efficiently and remains available to all users. By using this website, you agree to security monitoring and auditing. For security reasons and to ensure that the public service remains accessible to users, this state computer system uses network traffic monitoring programs to identify unauthorized attempts to upload or modify information, or otherwise cause damage, including attempts to deny service to users. For more information, see the SEC`s Privacy and Security Policy. Thank you for your interest in the U.S. Securities and Exchange Commission. If a user or application sends more than 10 requests per second, other requests from the IP address may be limited for a short time. Once the request rate has fallen below the threshold for 10 minutes, the user can continue to access the content on SEC.gov. This SEC practice is designed to limit excessive automated searches on SEC.gov and is not intended or should not affect anyone browsing the site SEC.gov.

Please report your traffic by updating your user agent to include company-specific information. Unauthorized attempts to upload information and/or modify information to any part of this website are strictly prohibited and liable to prosecution under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act of 1996 (see Title 18 U.S.C. §§ 1001 and 1030).