Checklist for Information Security in the Initiation Phase of Acquisitions