Attachment L2
Screener Verification
Form Approved
OMB No. 0920-0314
E 
	Public
	reporting burden of this collection of information is estimated to
	average 2 minutes per response, including the time for reviewing
	instructions, searching existing data sources, gathering and
	maintaining the data needed, and completing and reviewing the
	collection of information.  An agency may not conduct or sponsor,
	and a person is not required to respond to a collection of
	information unless it displays a currently valid OMB control number.
	 Send comments regarding this burden estimate or any other aspects
	of this collection of information, including suggestions for
	reducing this burden to CDC/ATSDR Reports Clearance Officer; 1600
	Clifton Road NE, MS D-74, Atlanta, GA 30333; ATTN: PRA (OMB No.
	0920-0314) 
	Assurance
	of Confidentiality – We take your privacy very seriously.  All
	information that relates to or describes identifiable
	characteristics of individuals, a practice, or an establishment will
	be used only for statistical purposes.  NCHS staff, contractors, and
	agents will not disclose or release responses in identifiable form
	without the consent of the individual or establishment in accordance
	with section 308(d) of the Public Health Service Act (42 U.S.C.
	242m(d)) and the Confidential Information Protection and Statistical
	Efficiency Act of 2002 (CIPSEA, Title 5 of Public Law 107-347).  In
	accordance with CIPSEA, every NCHS employee, contractor, and agent
	has taken an oath and is subject to a jail term of up to five years,
	a fine of up to $250,000, or both if he or she willfully discloses
	ANY identifiable information about you.  In addition, NCHS complies
	with the Federal Cybersecurity Enhancement Act of 2015 (6 U.S.C. §§
	151 & 151 note). This law requires the federal government to
	protect federal computer networks by using computer security
	programs to identify cybersecurity risks like hacking, internet
	attacks, and other security weaknesses. If information sent through
	government networks triggers a cyber threat indicator, the
	information may be intercepted and reviewed for cyber threats by
	computer network experts working for, or on behalf of, the
	government.
Hello, my name is [NAME] with the Institute for Social Research at the University of Michigan. Our records show that one of our interviewers recently contacted you/your household regarding the National Survey of Family Growth. I'm calling to verify that one or our interviewers, [IWER NAME], spoke with someone at your household on [DATE OF INTERVIEW] for the National Survey of Family Growth. Do you remember [IWER NAME] contacting you?
According to our interviewer, your household includes no one between the ages of 15 and 49. Is this correct?
In your opinion, did the interviewer conduct herself in a professional manner?
Are there any additional comments that you want to share about the interview or the interviewer?
Those are all the questions that I have. Thank you very much for your help with this study.
	
	
	
| File Type | application/msword | 
| Author | nkirgis | 
| Last Modified By | SYSTEM | 
| File Modified | 2018-04-25 | 
| File Created | 2018-04-25 |