Hash Value

We use hash algorithms to make sure that an attachment is the one we directly provide to users and that it has not been maliciously changed by others. You may use a verification tool to see if an attachment’s hash value matches its hash verification code listed on this website (please remember to use SHA-256). Thank you.

File Name Hash Value
Complaints and Ombudsman Cases in 2012.pdf 9E8646562F369404CD1E868A67F129A8982BB84CD0F4231E50F2E4CD9C82CFE7