Help Share this Important Information
Unless otherwise noted, material presented on Vaccines.gov is considered federal government information and is in the public domain That means this information may be freely copied and distributed. We request that you use appropriate attribution to Vaccines.gov.
Many checklists and other materials are available in PDF format for ease of duplication. Note that if material is adapted or modified, all Vaccines.gov citations and logos must be removed. If copyrighted content, documents, images, or other materials appear on Vaccines.gov, it will be noted, and the copyright holder must be consulted before that material may be reproduced.
Web site managers are encouraged to link to Vaccines.gov. The Vaccines.gov logo may be used in conjunction with your link.
Endorsement Disclaimer - Links to Other Sites
Reference in this web site to any specific commercial products, process, service, manufacturer, or company does not constitute its endorsement or recommendation by the U.S. Government or HHS. HHS is not responsible for the contents of any "off-site" web page referenced from this server.
Endorsement Disclaimer - Pop-Up Advertisements
When visiting our Web site, your Web browser may produce pop-up advertisements. These advertisements were most likely produced by other Web sites you visited or by third party software installed on your computer. The U.S. Department of Health and Human Services does not endorse or recommend products or services for which you may view a pop-up advertisement on your computer screen while visiting our site.
The information provided using this web site is only intended to be general summary information to the public. It is not intended to take the place of either the written law or regulations.
This site is maintained by the U.S. Government. It is protected by various provisions of Title 18, U.S. Code. Violations of Title 18 are subject to criminal prosecution in federal court.
For site security purposes and to ensure that this service remains available to all users, we employ software programs to monitor traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. In the event of authorized law enforcement investigations, and pursuant to any required legal process, information from these sources may be used to help identify an individual.