Download:
pdf |
pdfNSFG
OMB ATTACHMENT N2
OMB No. 0920-0314
PHASE 4 SCREENER ELIGIBILITY SURVEY LEAD LETTER—Multimode (English)
From the Director of the National Center for Health Statistics:
You can now mail us your brief screening survey!
My agency, part of the Centers for Disease Control and Prevention (CDC), is conducting an
important research study called the National Survey of Family Growth (NSFG). We are asking
households that have not been able to participate to answer a few important questions. We will
not ask you to complete another survey based on your responses.
Please complete the
enclosed brief screening
survey and mail it back to us
in the postage-paid
envelope.
If you have questions or need help completing your survey, please call RTI International (RTI) at
[PHONE NUMBER] or email RTI at [EMAIL].
Your help completing this brief survey is voluntary, but it is key to the success of the NSFG
survey. By Federal law*, the answers you give are confidential and we take all possible steps to
protect your privacy. Your answers will be used for statistical research only. Information is only
presented in summary form. Individuals or families cannot be identified.
Your household is welcome to keep the enclosed $1 as a token of appreciation for your help.
Sincerely,
Director, National Center for Health Statistics
http://www.cdc.gov/nchs
*One important law that protects your confidentiality is Section 308(d) of the Public Health Service Act (42 U.S.C.
242m(d)). The other two laws are the Confidential Information Protection and Statistical Efficiency Act of 2002
(CIPSEA, Title 5 of PL 107-347) and the Privacy Act of 1974 (5 U.S.C. 552a). Section 306 of the Public Health Service
Act (42 U.S.C. 242k) allows us to carry out this survey. In addition, NCHS complies with the Federal Cybersecurity
Enhancement Act of 2015 (6 U.S.C. §§ 151 & 151 note). This law requires the federal government to protect federal
computer networks by using computer security programs to identify cybersecurity risks like hacking, internet attacks,
and other security weaknesses. If information sent through government networks triggers a cyber threat indicator, the
information may be intercepted and reviewed for cyber threats by computer network experts working for, or on behalf,
of the government.
NSFG
OMB ATTACHMENT N2
OMB No. 0920-0314
PHASE 4 MAIN INTERVIEW NRFU SURVEY LEAD LETTER—Multimode (English)
Dear [RESPONDENT],
We understand you are not interested in participating in the National Survey of Family
Growth (NSFG), but we hope you will take a minute to answer just a few important
questions for us.
This important research study is being done by the Centers for Disease Control and Prevention’s (CDC)
National Center for Health Statistics.
Please complete the
enclosed short survey and
mail it back to us in the
postage-paid envelope.
Your experiences are unique, and if you choose not to participate in the NSFG, no one can
replace you. If you have questions or need help completing this brief survey, please call RTI
International (RTI) at [PHONE NUMBER] or email RTI at [EMAIL].
Your participation is voluntary, but it is key to the success of the NSFG survey. By Federal law*,
the answers you give are confidential and we take all possible steps to protect your privacy. Your
answers will be used for statistical research only. Information is only presented in summary form.
Individuals or families cannot be identified.
Your household is welcome to keep the enclosed $1 as a token of appreciation of your help.
Sincerely,
Director, National Center for Health Statistics
http://www.cdc.gov/nchs
*One important law that protects your confidentiality is Section 308(d) of the Public Health Service Act (42 U.S.C.
242m(d)). The other two laws are the Confidential Information Protection and Statistical Efficiency Act of 2002
(CIPSEA, Title 5 of PL 107-347) and the Privacy Act of 1974 (5 U.S.C. 552a). Section 306 of the Public Health Service
Act (42 U.S.C. 242k) allows us to carry out this survey. In addition, NCHS complies with the Federal Cybersecurity
Enhancement Act of 2015 (6 U.S.C. §§ 151 & 151 note). This law requires the federal government to protect federal
computer networks by using computer security programs to identify cybersecurity risks like hacking, internet attacks,
and other security weaknesses. If information sent through government networks triggers a cyber threat indicator, the
information may be intercepted and reviewed for cyber threats by computer network experts working for, or on behalf,
of the government.
File Type | application/pdf |
Author | Stephen M. King |
File Modified | 2021-04-09 |
File Created | 2021-04-09 |