Symantec Control Compliance Suite Content Third-party License Agreements Readme. Version 10.0



Similar documents
Enabling Windows Management Instrumentation Guide

kamai Technologies Inc. Commonly Accepted Security Practices and Recommendations (CASPR)

Harmonizing Your Compliance and Security Objectives. Bonnie A. Goins Adjunct Professor, Illinois Institute of Technology

CASPR Commonly Accepted Security Practices and Recommendations

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

Symantec Enterprise Security Manager Agent for Linux PPC 64 Release Notes

Symantec ESM Agent For IBM iseries AS/400

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4

Policy Based Encryption Essentials. Administrator Guide

Achieving Governance, Risk and Compliance Requirements with HISP Certification Course

Program Overview and 2015 Outlook

JMH User Access Request Form

Symantec Response Assessment module Installation Guide. Version 9.0

A Flexible and Comprehensive Approach to a Cloud Compliance Program

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard

GLOBAL STANDARD FOR INFORMATION MANAGEMENT

Executive's Guide to

Certification for Information System Security Professional (CISSP)

THE BUSINESS COUNCIL OF WESTCHESTER Website & Internet Services Terms And Conditions of Use

Impact of New Internal Control Frameworks

Information for Schools and Colleges. So you want to. Know more about the BS EN ISO 9000:2000 family of quality management system standards

Self-Service SOX Auditing With S3 Control

Security Information Lifecycle

Patch Assessment Content Update Release Notes for CCS Version: Update

FME SOFTWARE LICENSE AGREEMENT

Quick Start Guide for Symantec Event Collector for ForeScout CounterACT

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Cybersecurity and the AICPA Cybersecurity Attestation Project

The Cyber Attack and Hacking Epidemic A Legal and Business Survival Guide

Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide

Symantec Backup Exec Management Plug-in for VMware User's Guide

WEBSITE TERMS & CONDITIONS. Last updated March 27, 2015

SOC Readiness Assessments. SOC Report - Type 1. SOC Report - Type 2. Building Trust and Confidence in Third-Party Relationships

IT Governance Dr. Michael Shaw Term Project

Symantec Endpoint Encryption Device Control Release Notes

IT Security & Compliance Risk Assessment Capabilities

Altius IT Policy Collection Compliance and Standards Matrix

Patch Assessment Content Update Release Notes for CCS Version: Update

Cyber Risks in the Boardroom

ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT

Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors

FINRA Publishes its 2015 Report on Cybersecurity Practices

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)

Compliance Risk Management IT Governance Assurance

Trends in Information Technology (IT) Auditing

IT Security Management 100 Success Secrets

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Our Commitment to Information Security

NetSuite End User License Agreement for Mobile Applications

Symantec Control Compliance Suite : Reporting and Analytics ReadMe Update

Auditing your institution's cybersecurity incident/breach response plan. Baker Tilly Virchow Krause, LLP

Veritas Cluster Server Getting Started Guide

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1

Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT

Symantec Security Information Manager - Best Practices for Selective Backup and Restore

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives

Page 1 of 15. VISC Third Party Guideline

IT Security Compliance PCI DSS FOR MERCHANTS THE PAYMENT CARD INDUSTRY DATE SECURITY STANDARD WHITE PAPER

Securing the Cloud Infrastructure

Real-Time Compliance Monitoring

What Should IS Majors Know About Regulatory Compliance?

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note

I. U.S. Government Privacy Laws

Symantec Enterprise Security Manager Modules. Release Notes

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1

AGILE RISK MANAGEMENT LLC MASTER SOFTWARE LICENSE AGREEMENT

6. MODIFICATIONS. Licensee may modify, adapt and create improvements to the SOFTWARE subject to the following conditions:

IBM Lotus Protector for Mail Encryption

ADP Ambassador /Referral Rewards Program. Terms and Conditions of Use

Oracle Binary Code License Agreement for the Java SE Platform Products and JavaFX

FILEMAKER PRO ADVANCED SOFTWARE LICENSE

The Intersection of Internal Controls and Cyber Security

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

CERT Resilience Management Model (RMM) v1.1: Code of Practice Crosswalk Commercial Version 1.1

Paychex Accounting Online Terms of Use

Backup Exec 15. Quick Installation Guide

MASSIVE NETWORKS Online Backup Compliance Guidelines Sarbanes-Oxley (SOX) SOX Requirements... 2

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013

Altiris Asset Management Suite 7.1 from Symantec User Guide

CONSULTING SERVICES AGREEMENT

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

The authority documents tracked by the UCF

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

Symantec Critical System Protection Configuration Monitoring Edition Release Notes

Transcription:

Symantec Control Compliance Suite Content Third-party License Agreements Readme Version 10.0

Symantec Control Compliance Suite Content Third-party License Agreements Readme Legal Notice Copyright 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo, Bindview, and bv-control are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.

Symantec Control Compliance Suite Content Third-party License Agreements This document includes the following topics: Control Compliance Suite Content Third-party Legal Notices E-Government Act of 2002 Gramm-Leach-Bliley Act Sarbanes-Oxley Act of 2002 ARRA (HITECH) Instruction Number 8500.2 "Information Assurance (IA) Implementation" Industry Self-Assessment Checklist for Food Security (April 2005) Office of Strategic Trade Importer Self-Assessment Handbook (September 2005) CobiT 3rd Edition CobiT 4.0 CobiT 4.1 IT Control Objectives for Sarbanes-Oxley 2nd Edition

4 Symantec Control Compliance Suite Content Third-party License Agreements BS EN ISO 9001:2000 Quality management systems BS OHSAS 18001:2007 Occupational health and safety management systems AICPA Audit Committee Toolkit - Internal Control: A Tool for the Audit Committee AICPA Audit Committee Toolkit - Conducting an Audit Committee Executive Session: Guidelines and Questions AICPA Audit Committee Toolkit - Evaluating the Internal Audit Team: Guidelines and Questions AICPA Audit Committee Toolkit - Evaluating the Independent Auditor: Questions to Consider AICPA Audit Committee Toolkit - Guidelines for Hiring the Chief Audit Executive (CAE) Sarbanes-Oxley: The IT Dimension Sarbanes-Oxley Compliance Toolkit - Audit Committee SOX Compliance Checklist Sarbanes-Oxley Compliance Toolkit - Corporate Governance Compliance Checklist The US-CCU Cyber-Security Check List (Final Version 2007) Technology Risk Checklist (May 2004 Version 7.3) Information Assessment Protection Kit (IPAK) NIST SP 800-53 NIST SP 800-53 Rev. 1 NIST SP 800-53 Rev. 3 NIST SP 800-53A NIST SP 800-66 Rev. 1 E-Mail Rules - A Business Guide to Managing Policies, Security, and Legal Issues for E-Mail and Digital Communication (Book authored by Nancy Flynn and Randolph Kahn ESQ) Security Assessment Checklist Security Awareness Culture

Symantec Control Compliance Suite Content Third-party License Agreements 5 Monthly Quizzes Treasury Board of Canada: Privacy Impact Assessment Guidelines TRUSTe Security Guidelines 2.0 (November 2005) On the Recommended Practices on Notice of Security Breach Involving Personal Information (SB 1386 law included) PCI Materials License Sedona Conference COSO United Kingdom Office of Public Sector Information (OPSI) - UK Statute Law Database (SLD) - Data Protection Act of 1998 (plus updates) Defense Information Systems Agency (DISA) Agency s ACCESS CONTROL IN SUPPORT OF INFORMATION SYSTEMS SECURITY TECHNICAL IMPLEMENTATION GUIDE Version 2, Release 2 Hospital Pandemic Influenza Planning Checklist Business Pandemic Influenza Planning Checklist Pandemic Preparedness Planning for US Businesses with Overseas Operations Health Insurer Pandemic Influenza Planning Checklist Travel Industry Pandemic Influenza Planning Checklist Long-Term Care and Other Residential FacilitiesPandemic Influenza Planning Checklist Medical Offices and Clinics Pandemic Influenza Planning Checklist Home Health Care Services Pandemic Influenza Planning Checklist Faith-based and Community Organizations Pandemic Influenza Planning Checklist Emergency Medical Services and Non-Emergent (Medical) Transport Organizations Pandemic Influenza Planning Checklist Correctional Facilities Pandemic Influenza Planning Checklist Colleges and Universities Pandemic Influenza Planning Checklist Child Care and Preschool Pandemic Influenza Planning Checklist

6 Symantec Control Compliance Suite Content Third-party License Agreements Control Compliance Suite Content Third-party Legal Notices School district (K-12) Pandemic Influenza Planning Checklist Law Enforcement Pandemic Influenza Planning Checklist NERC CIP version 2 Control Compliance Suite Content Third-party Legal Notices Copyright 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, BindView, bv-control are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, Rights in Commercial Computer Software or Commercial Computer Software Documentation, as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Certain third-party software may be distributed, embedded, or bundled with this Symantec product or recommended for use in conjunction with the installation and operation of this Symantec product. Such third-party software is separately licensed by its copyright holder, unless otherwise noted. Use of separately licensed third-party software must be in accordance with its license terms. This appendix contains the licenses which govern the use of third-party software and its copyright holder s proprietary notices. E-Government Act of 2002 individuals or organizations, U.S. Congress: E-Government Act of 2002. Gramm-Leach-Bliley Act individuals or organizations, U.S. Congress: Gramm-Leach-Bliley Act.

Symantec Control Compliance Suite Content Third-party License Agreements Sarbanes-Oxley Act of 2002 7 Sarbanes-Oxley Act of 2002 ARRA (HITECH) individuals or organizations, U.S. Congress: Sarbanes-Oxley Act of 2002. individuals or organizations, U.S. Congress: ARRA Act of 2009. Instruction Number 8500.2 "Information Assurance (IA) Implementation" individuals or organizations, U.S. Department of Defense (DoD): Instruction Number 8500.2 Information Assurance (IA) Implementation (February 6, 2003). Industry Self-Assessment Checklist for Food Security (April 2005) Most information presented on the USDA Web site is considered public domain information. Public domain information may be freely distributed or copied, but use of appropriate byline/photo/image credits is requested. Attribution may be cited as follows: "U. S. Department of Agriculture." Office of Strategic Trade Importer Self-Assessment Handbook (September 2005) CobiT 3rd Edition individuals or organizations: U.S. Customs and Border. This product includes COBIT 3rd Edition, which is used by permission of the IT Governance Institute (ITGI). 1996, 2000 IT Governance Institute. All rights reserved. COBIT is a registered trademark of the Information Systems Audit and Control Association and the IT Governance Institute.

8 Symantec Control Compliance Suite Content Third-party License Agreements CobiT 4.0 CobiT 4.0 CobiT 4.1 This product includes COBIT 3rd Edition, which is used by permission of the IT Governance Institute (ITGI). 1996, 2000 IT Governance Institute. All rights reserved. COBIT is a registered trademark of the Information Systems Audit and Control Association and the IT Governance Institute. This product includes COBIT 3rd Edition, which is used by permission of the IT Governance Institute (ITGI). 1996, 2000 IT Governance Institute. All rights reserved. COBIT is a registered trademark of the Information Systems Audit and Control Association and the IT Governance Institute. IT Control Objectives for Sarbanes-Oxley 2nd Edition This product includes IT Control Objectives for Sarbanes-Oxley 2nd Edition, which is used by permission of the IT Governance Institute (ITGI). 2007 ITGI. All rights reserved. BS EN ISO 9001:2000 Quality management systems All rights reserved. The material on ISO Online is subject to the same conditions of copyright as ISO publications, and its use is subject to the user's acceptance of ISO's conditions of copyright for ISO publications, as set out below. Any use of the material, including reproduction in whole or in part to another Internet site, requires permission in writing from ISO. All ISO publications are protected by copyright. Therefore and unless otherwise specified, no part of an ISO publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, microfilm, scanning, without permission in writing from the publisher. BS OHSAS 18001:2007 Occupational health and safety management systems individuals or organizations: British Standards Institute (BSI): BS OHSAS 18001:2007 Occupational health and safety managements systems.

Symantec Control Compliance Suite Content Third-party License Agreements AICPA Audit Committee Toolkit - Internal Control: A Tool for the Audit Committee 9 AICPA Audit Committee Toolkit - Internal Control: A Tool for the Audit Committee This Internal Control: A Tool for the Audit Committee ("Content") which is included in the Symantec Control Compliance Suite and Response Assessment module under license, is the property of the American Institute of Certified Public Accountants (AICPA). This Content may not be reproduced in whole or any part without attaching this copyright notice, and without the express permission of the AICPA. AICPA Audit Committee Toolkit - Conducting an Audit Committee Executive Session: Guidelines and Questions This Conducting an Audit Committee Executive Session: Guidelines and Questions ("Content") which is included in the Symantec Control Compliance Suite and Response Assessment module under license, is the property of the American Institute of Certified Public Accountants (AICPA). This Content may not be reproduced in whole or any part without attaching this copyright notice, and without the express permission of the AICPA. AICPA Audit Committee Toolkit - Evaluating the Internal Audit Team: Guidelines and Questions This Evaluating the Internal Audit Team: Guidelines and Questions ("Content") which is included in the Symantec Control Compliance Suite and Response Assessment module under license, is the property of the American Institute of Certified Public Accountants (AICPA). This Content may not be reproduced in whole or any part without attaching this copyright notice, and without the express permission of the AICPA. AICPA Audit Committee Toolkit - Evaluating the Independent Auditor: Questions to Consider This Evaluating the Independent Auditor: Questions to Consider ("Content") which is included in the Symantec Control Compliance Suite and Response Assessment module under license, is the property of the American Institute of Certified Public Accountants (AICPA). This Content may not be reproduced in whole or any part

10 Symantec Control Compliance Suite Content Third-party License Agreements AICPA Audit Committee Toolkit - Guidelines for Hiring the Chief Audit Executive (CAE) without attaching this copyright notice, and without the express permission of the AICPA. AICPA Audit Committee Toolkit - Guidelines for Hiring the Chief Audit Executive (CAE) This Guidelines for Hiring the Chief Audit Executive (CAE) ("Content") which is included in the Symantec Control Compliance Suite and Response Assessment module under license, is the property of the American Institute of Certified Public Accountants (AICPA). This Content may not be reproduced in whole or any part without attaching this copyright notice, and without the express permission of the AICPA. Sarbanes-Oxley: The IT Dimension individuals or organizations, The Institute of Internal Auditors (IIA): Sarbanes-Oxley: The IT Dimension. Sarbanes-Oxley Compliance Toolkit - Audit Committee SOX Compliance Checklist This "AUDIT COMMITTEE SOX COMPLIANCE CHECKLIST" which is included in the Symantec Response Assessment Module under license, is the property of Easy2solve (www.easy2solve.com). This Document may not be reproduced in whole or any part without attaching this copyright notice, and without the express permission of Easy2solve, the registered owners of the "RUsecure" trademark. Sarbanes-Oxley Compliance Toolkit - Corporate Governance Compliance Checklist This "CORPORATE GOVERNANCE COMPLIANCE CHECKLIST" which is included in the Symantec Response Assessment Module under license, is the property of Easy2solve (www.easy2solve.com). This Document may not be reproduced in whole or any part without attaching this copyright notice, and without the express permission of Easy2solve, the registered owners of the "RUsecure" trademark.

Symantec Control Compliance Suite Content Third-party License Agreements The US-CCU Cyber-Security Check List (Final Version 2007) 11 The US-CCU Cyber-Security Check List (Final Version 2007) individuals or organizations, The United States Cyber Consequences Unit(US-CCU): The US-CCU Cyber-Security Check List (Final Version 2007). Technology Risk Checklist (May 2004 Version 7.3) individuals or organizations, The World Bank: Technology Risk Checklist (May 2004 Version 7.3). Information Assessment Protection Kit (IPAK) NIST SP 800-53 individuals or organizations, Rebecca Herold:Information Assessment Protection Kit (IPAK) - 2002 ipak-e. individuals or organizations, National Institute of Standards and Technology (NIST): NIST Special Publication (SP) 800-53 Recommended Security Controls for Federal Information Systems. NIST SP 800-53 Rev. 1 individuals or organizations, National Institute of Standards and Technology (NIST): NIST Special Publication (SP) 800-53 Rev.1 Recommended Security Controls for Federal Information Systems. NIST SP 800-53 Rev. 3 individuals or organizations, National Institute of Standards and Technology (NIST): NIST Special Publication (SP) 800-53 Rev.3 Recommended Security Controls for Federal Information Systems.

12 Symantec Control Compliance Suite Content Third-party License Agreements NIST SP 800-53A NIST SP 800-53A individuals or organizations, National Institute of Standards and Technology (NIST): NIST Special Publication (SP) 800-53A Guide for Assessing the Security Controls in Federal Information Systems. NIST SP 800-66 Rev. 1 individuals or organizations, National Institute of Standards and Technology (NIST): NIST Special Publication (SP) 800-66 Rev.1 An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPPA) Security Rule. E-Mail Rules - A Business Guide to Managing Policies, Security, and Legal Issues for E-Mail and Digital Communication (Book authored by Nancy Flynn and Randolph Kahn ESQ) individuals or organizations, American Management Association (AMA):E-Mail Rules - A Business Guide to Managing Policies, Security, and Legal Issues for E-Mail and Digital Communication (Book authored by Nancy Flynn and Randolph Kahn ESQ). Adapted by permission from E-Mail and Digital Communication 2003 Nany Flynn and Randolph Kahn ESQ, published by AMACOM, division of American Management Association, New York, New York wwwamacombooks.org. Security Assessment Checklist individuals or organizations, Melissa Guenther, Security Assessment Checklist. Security Awareness Culture individuals or organizations, Melissa Guenther, Security Awareness Culture.

Symantec Control Compliance Suite Content Third-party License Agreements Monthly Quizzes 13 Monthly Quizzes individuals or organizations, Melissa Guenther, Security Awareness Culture. Treasury Board of Canada: Privacy Impact Assessment Guidelines individuals or organizations, Treasury Board of Canada (TBoC): Privacy Impact Assessment Guidelines: A Framework to Manage Privacy Risks. TRUSTe Security Guidelines 2.0 (November 2005) Portions of this Symantec product contains content provided by the following individuals or organizations, TRUSTe: TRUSTe Security Guidelines 2.0 (November 2005). On the Recommended Practices on Notice of Security Breach Involving Personal Information (SB 1386 law included) PCI Materials License individuals or organizations, California Office of Privacy Protection: Recommended Practices on Notice of Security Breach Involving Personal Information. Portions of this product are provided courtesy of PCI Security Standards Council, LLC ("PCI SSC") and/or its licensors. 2007 PCI Security Standards Council, LLC. All rights reserved. Neither PCI SSC nor its licensors endorses this product, its provider or the methods, procedures, statements, views, opinions or advice contained herein. All references to documents, materials or portions thereof provided by PCI SSC (the "PCI SSC Materials") should be read as qualified by the actual PCI Materials. For questions regarding the PCI SSC Materials, please contact PCI SSC through its web site at https://www.pcisecuritystandards.org.

14 Symantec Control Compliance Suite Content Third-party License Agreements Sedona Conference Sedona Conference This The Sedona Principles Second Edition which is included in the Control Compliance Suite 9.0 under license, is the property of The Sedona Conference. This Content may not be reproduced in whole or any part without attaching this copyright notice, and without the prior written permission of the Sedona Conference. COSO This COSO Enterprise Risk Management - Integrated Framework which is included in the Symantec Control Compliance Suite under license, is the property of the American Institute of Certified Public Accountants (AICPA). This Content may not be reproduced in whole or any part without attaching this copyright notice and without express permission of the AICPA. United Kingdom Office of Public Sector Information (OPSI) - UK Statute Law Database (SLD) - Data Protection Act of 1998 (plus updates) Data Protection Act 1998 (c.29) is reproduced under the terms of the Crown Copyright Policy Guidance issued by HMSO Defense Information Systems Agency (DISA) Agency s ACCESS CONTROL IN SUPPORT OF INFORMATION SYSTEMS SECURITY TECHNICAL IMPLEMENTATION GUIDE Version 2, Release 2 Use of the Defense Information Systems Agency s (DISA) Access Control in Support of Information Systems Security Technical Implementation Guide Version 2, Release 2 is courtesy of The Defense Information Systems Agency s Security and Privacy guidelines located at http://www.disa.mil/about/legal/security_privacy.html.

Symantec Control Compliance Suite Content Third-party License Agreements Hospital Pandemic Influenza Planning Checklist 15 Hospital Pandemic Influenza Planning Checklist http://www.flu.gov/professional/hospital/hospitalchecklist.html Business Pandemic Influenza Planning Checklist http://www.flu.gov/professional/business/businesschecklist.html Pandemic Preparedness Planning for US Businesses with Overseas Operations http://www.flu.gov/professional/business/businessoversea.html Health Insurer Pandemic Influenza Planning Checklist http://www.flu.gov/professional/business/healthinsurer.html Travel Industry Pandemic Influenza Planning Checklist

16 Symantec Control Compliance Suite Content Third-party License Agreements Long-Term Care and Other Residential FacilitiesPandemic Influenza Planning Checklist http://www.flu.gov/professional/business/travelchecklist.html Long-Term Care and Other Residential FacilitiesPandemic Influenza Planning Checklist http://www.flu.gov/professional/hospital/longtermcarechecklist.html Medical Offices and Clinics Pandemic Influenza Planning Checklist http://www.flu.gov/professional/hospital/medical.html Home Health Care Services Pandemic Influenza Planning Checklist http://www.flu.gov/professional/hospital/healthcare.html Faith-based and Community Organizations Pandemic Influenza Planning Checklist

Symantec Control Compliance Suite Content Third-party License Agreements Emergency Medical Services and Non-Emergent (Medical) Transport Organizations Pandemic Influenza Planning Checklist 17 http://www.flu.gov/professional/community/faithcomchecklist.html Emergency Medical Services and Non-Emergent (Medical) Transport Organizations Pandemic Influenza Planning Checklist http://www.flu.gov/professional/hospital/emgncymedical.html Correctional Facilities Pandemic Influenza Planning Checklist http://www.flu.gov/professional/business/correctionchecklist.html Colleges and Universities Pandemic Influenza Planning Checklist http://www.flu.gov/professional/school/collegeschecklist.html

18 Symantec Control Compliance Suite Content Third-party License Agreements Child Care and Preschool Pandemic Influenza Planning Checklist Child Care and Preschool Pandemic Influenza Planning Checklist http://www.flu.gov/professional/school/preschool.html School district (K-12) Pandemic Influenza Planning Checklist http://www.flu.gov/professional/school/schoolchecklist.html Law Enforcement Pandemic Influenza Planning Checklist NERC CIP version 2 http://www.flu.gov/professional/business/lawenforcement.html This Critical Infrastructure Protection Reliability Standards (including CIP-001 through CIP-009) which is included in the Symantec Control Compliance Suite product (including Response Assessment Manager and Content Studio) under license, is the property of North American Electric Reliability Corporation (NERC). This Content may not be reproduced in whole or any part without attaching this copyright notice, and without the express permission of North American Electric Reliability Corporation.