Screener Verification

National Survey of Family Growth

ATT_L2 _Screener Verification 091917

Screener Verification

OMB: 0920-0314

Document [doc]
Download: doc | pdf

Attachment L2

Screener Verification

Form Approved

OMB No. 0920-0314

E

Public reporting burden of this collection of information is estimated to average 2 minutes per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. An agency may not conduct or sponsor, and a person is not required to respond to a collection of information unless it displays a currently valid OMB control number. Send comments regarding this burden estimate or any other aspects of this collection of information, including suggestions for reducing this burden to CDC/ATSDR Reports Clearance Officer; 1600 Clifton Road NE, MS D-74, Atlanta, GA 30333; ATTN: PRA (OMB No. 0920-0314)

Assurance of Confidentiality – We take your privacy very seriously. All information that relates to or describes identifiable characteristics of individuals, a practice, or an establishment will be used only for statistical purposes. NCHS staff, contractors, and agents will not disclose or release responses in identifiable form without the consent of the individual or establishment in accordance with section 308(d) of the Public Health Service Act (42 U.S.C. 242m(d)) and the Confidential Information Protection and Statistical Efficiency Act of 2002 (CIPSEA, Title 5 of Public Law 107-347). In accordance with CIPSEA, every NCHS employee, contractor, and agent has taken an oath and is subject to a jail term of up to five years, a fine of up to $250,000, or both if he or she willfully discloses ANY identifiable information about you. In addition, NCHS complies with the Federal Cybersecurity Enhancement Act of 2015 (6 U.S.C. §§ 151 & 151 note). This law requires the federal government to protect federal computer networks by using computer security programs to identify cybersecurity risks like hacking, internet attacks, and other security weaknesses. If information sent through government networks triggers a cyber threat indicator, the information may be intercepted and reviewed for cyber threats by computer network experts working for, or on behalf of, the government.

xp. Date xx/xx/20xx


  1. Hello, my name is [NAME] with the Institute for Social Research at the University of Michigan. Our records show that one of our interviewers recently contacted you/your household regarding the National Survey of Family Growth. I'm calling to verify that one or our interviewers, [IWER NAME], spoke with someone at your household on [DATE OF INTERVIEW] for the National Survey of Family Growth. Do you remember [IWER NAME] contacting you?

  2. According to our interviewer, your household includes no one between the ages of 15 and 49. Is this correct?

  3. In your opinion, did the interviewer conduct herself in a professional manner?


  1. Are there any additional comments that you want to share about the interview or the interviewer?


Those are all the questions that I have. Thank you very much for your help with this study.

1



File Typeapplication/msword
Authornkirgis
Last Modified BySYSTEM
File Modified2018-04-25
File Created2018-04-25

© 2024 OMB.report | Privacy Policy