Attachment L2
Screener Verification
Form Approved
OMB No. 0920-0314
E
Public
reporting burden of this collection of information is estimated to
average 2 minutes per response, including the time for reviewing
instructions, searching existing data sources, gathering and
maintaining the data needed, and completing and reviewing the
collection of information. An agency may not conduct or sponsor,
and a person is not required to respond to a collection of
information unless it displays a currently valid OMB control number.
Send comments regarding this burden estimate or any other aspects
of this collection of information, including suggestions for
reducing this burden to CDC/ATSDR Reports Clearance Officer; 1600
Clifton Road NE, MS D-74, Atlanta, GA 30333; ATTN: PRA (OMB No.
0920-0314)
Assurance
of Confidentiality – We take your privacy very seriously. All
information that relates to or describes identifiable
characteristics of individuals, a practice, or an establishment will
be used only for statistical purposes. NCHS staff, contractors, and
agents will not disclose or release responses in identifiable form
without the consent of the individual or establishment in accordance
with section 308(d) of the Public Health Service Act (42 U.S.C.
242m(d)) and the Confidential Information Protection and Statistical
Efficiency Act of 2002 (CIPSEA, Title 5 of Public Law 107-347). In
accordance with CIPSEA, every NCHS employee, contractor, and agent
has taken an oath and is subject to a jail term of up to five years,
a fine of up to $250,000, or both if he or she willfully discloses
ANY identifiable information about you. In addition, NCHS complies
with the Federal Cybersecurity Enhancement Act of 2015 (6 U.S.C. §§
151 & 151 note). This law requires the federal government to
protect federal computer networks by using computer security
programs to identify cybersecurity risks like hacking, internet
attacks, and other security weaknesses. If information sent through
government networks triggers a cyber threat indicator, the
information may be intercepted and reviewed for cyber threats by
computer network experts working for, or on behalf of, the
government.
Hello, my name is [NAME] with the Institute for Social Research at the University of Michigan. Our records show that one of our interviewers recently contacted you/your household regarding the National Survey of Family Growth. I'm calling to verify that one or our interviewers, [IWER NAME], spoke with someone at your household on [DATE OF INTERVIEW] for the National Survey of Family Growth. Do you remember [IWER NAME] contacting you?
According to our interviewer, your household includes no one between the ages of 15 and 49. Is this correct?
In your opinion, did the interviewer conduct herself in a professional manner?
Are there any additional comments that you want to share about the interview or the interviewer?
Those are all the questions that I have. Thank you very much for your help with this study.
File Type | application/msword |
Author | nkirgis |
Last Modified By | SYSTEM |
File Modified | 2018-04-25 |
File Created | 2018-04-25 |