Attachment L3
Main Verification
Form Approved
OMB No. 0920-0314
E
Public
reporting burden of this collection of information is estimated to
average 5 minutes per response, including the time for reviewing
instructions, searching existing data sources, gathering and
maintaining the data needed, and completing and reviewing the
collection of information. An agency may not conduct or sponsor,
and a person is not required to respond to a collection of
information unless it displays a currently valid OMB control number.
Send comments regarding this burden estimate or any other aspects
of this collection of information, including suggestions for
reducing this burden to CDC/ATSDR Reports Clearance Officer; 1600
Clifton Road NE, MS D-74, Atlanta, GA 30333; ATTN: PRA (OMB No.
0920-0314)
Assurance
of Confidentiality – We take your privacy very seriously. All
information that relates to or describes identifiable
characteristics of individuals, a practice, or an establishment will
be used only for statistical purposes. NCHS staff, contractors, and
agents will not disclose or release responses in identifiable form
without the consent of the individual or establishment in accordance
with section 308(d) of the Public Health Service Act (42 U.S.C.
242m(d)) and the Confidential Information Protection and Statistical
Efficiency Act of 2002 (CIPSEA, Title 5 of Public Law 107-347). In
accordance with CIPSEA, every NCHS employee, contractor, and agent
has taken an oath and is subject to a jail term of up to five years,
a fine of up to $250,000, or both if he or she willfully discloses
ANY identifiable information about you. In addition, NCHS complies
with the Federal Cybersecurity Enhancement Act of 2015 (6 U.S.C. §§
151 & 151 note). This law requires the federal government to
protect federal computer networks by using computer security
programs to identify cybersecurity risks like hacking, internet
attacks, and other security weaknesses. If information sent through
government networks triggers a cyber threat indicator, the
information may be intercepted and reviewed for cyber threats by
computer network experts working for, or on behalf of, the
government.
Hello, my name is [NAME] with the Institute for Social Research at the University of Michigan. Our records show that one of our interviewers recently contacted you/your household regarding the National Survey of Family Growth. I’m calling to verify that one of our interviewers, [IWER NAME], spoke with someone at your household on [DATE OF IW] for the National Survey of Family Growth. Do you remember [IWER NAME] contacting you?
[IWER NAME] would have asked you about child bearing, contraceptive use, sexual activity, marriage and divorce, and your attitudes about marriage, children and family life. Do you remember a visit where someone asked you questions about such things?
How long did the interview take?
Was the interview conducted over the phone or in person?
To verify our records, what is your date of birth?
For MINOR Rs: Did you sign a form on the computer agreeing to participate in the survey?
For ADULT Rs: Did you sign a receipt on the computer for the token of appreciation you received to participate in the survey?
Did you receive a token of appreciation for completing the interview?
Did you enter some of your responses into the computer yourself?
In your opinion, did the interviewer conduct herself in a professional manner?
Are there any additional comments that you want to share about the interview or the interviewer?
These are all the questions I have. Thank you very much for your help with this study.
File Type | application/msword |
Author | nkirgis |
Last Modified By | SYSTEM |
File Modified | 2018-04-25 |
File Created | 2018-04-25 |