Attachment J: 2018 Reabstraction Burden
Form Approved: OMB No. 0920-0234 Exp. Date xx/xx/20xx
	NOTICE
	– Public reporting burden of this collection of information is
	estimated to average 1 minute per response, including the time for
	reviewing instructions, searching existing data sources, gathering
	and maintaining the data needed, and completing and reviewing the
	collection of information. An agency may not conduct or sponsor, and
	a person is not required to respond to, a collection of information
	unless it displays a currently valid OMB control number. Send
	comments regarding this burden estimate or any other aspect of this
	collection of information, including suggestions for reducing this
	burden to CDC/ATSDR Information Collection Review Office, 1600
	Clifton Road, MS D-74, Atlanta, GA 30333, ATTN: PRA (0920-0234). 
	Assurance of
	confidentiality-We
	take your privacy very seriously.  All information that relates to
	or describes identifiable characteristics of individuals, a
	practice, or an establishment will be used only for statistical
	purposes.  NCHS staff, contractors, and agents will not disclose or
	release responses in identifiable form without the consent of the
	individual or establishment in accordance with section 308(d) of the
	Public Health Service Act (42USC 242m) and the Confidential
	Information Protection and Statistical Efficiency Act of 2001
	(CIPSEA, Title 5 of Public Law 107-347).  In accordance with CIPSEA,
	every NCHS employee, contractor, and agent has taken an oath and is
	subject to a jail term of up to five years, a fine of up to
	$250,000, or both if he or she willfully discloses ANY identifiable
	information about you.  In addition, NCHS complies with the Federal
	Cybersecurity Enhancement Act of 2015.  This law requires the
	federal government to protect federal computer networks by using
	computer security programs to identify cybersecurity risks like
	hacking, internet attacks, and other security weaknesses.  If
	information sent through government networks triggers a cyber threat
	indicator, the information may be intercepted and reviewed for cyber
	threats by computer network experts working for, or on behalf, of
	the government.  
	 
	 
	The Cybersecurity Act of 2015
	permits monitoring information systems for the purpose of protecting
	a network form hacking, denial of service attacks and other security
	vulnerabilities.1 
	The software used
	for monitoring may scan information that is transiting, stored on,
	or processed by the system.  If the information triggers a cyber
	threat indicator, the information may be intercepted and reviewed
	for cyber threats.  The Cybersecurity Act specifies that the cyber
	threat indicator or defensive measure taken to remove the threat may
	be shared with others only after any information not directly
	related to a cybersecurity threat has been removed, including
	removal of personal information of a specific individual or
	information that identifies a specific individual.  Monitoring under
	the Cybersecurity Act may be done by a system owner or another
	entity the system owner allows to monitor its network and operate
	defensive measures on its behalf.  
	 
	 
	1
	“Monitor” means “to acquire, identify, or scan, or
	to possess, information that is stored on, processed by, or
	transiting an information system”; “information system”
	means “a discrete set of information resources organized for
	the collection, processing, maintenance, use, sharing, dissemination
	or disposition of information”; “cyber threat indicator”
	means “information that is necessary to describe or identify
	security vulnerabilities of an information system, enable the
	exploitation of a security vulnerability, or unauthorized remote
	access or use of an information system.”   
	 
	
	
	
	
| File Type | application/vnd.openxmlformats-officedocument.wordprocessingml.document | 
| Author | CDC User | 
| File Modified | 0000-00-00 | 
| File Created | 2021-01-20 |