Download:
pdf |
pdfProtecting
your data
is our
priority
The security
of your information
is serious business
We can’t have a successful survey without the cooperation of
respondents like you. We’ll always do everything we can to earn your
trust and ensure that your information is secure. In fact, if we don’t
protect your data, our jobs could be in jeopardy.
RESPONDENT
PRIVACY
CYBER
SECURITY
$
DATA
PROTECTION
IDENTITY
THEFT
DATA & INFORMATION SECURITY
What are NIST
protocols and why
are they important?
Your information is stored
on secured systems utilizing
NIST protocols. These are
guidelines used to maintain
the integrity, confidentiality,
and security of data and
information systems.
If you have questions or
concerns, please contact us,
and we’ll be happy to assist you!
Call 877.504.1086
Text 312.835.1905 with your full name
Email [email protected]
Maintaining your privacy is paramount
Below are some of the measures we take to ensure that your
information remains confidential.
• We never put the survey name on the outside of an envelope, on a postcard,
on an answering machine message, or anywhere that someone else could
see or hear it. We do not sell or provide your name to any mailing lists.
• Your name is never kept with information from your interview so no one can
identify you by your answers. Personal information is stripped out of data before
it’s released to researchers. Respondent IDs are used to keep your data private.
• The U.S. Bureau of Labor Statistics (BLS), NORC at the University of Chicago,
and CHRR at The Ohio State University staff receive annual training on
information systems security and privacy awareness and the Confidential
Information Protection and Statistical Efficiency Act (CIPSEA). If someone
causes a data breach, they can be fined or imprisoned.
• The laptops used by NORC interviewers have many levels of security, including
password-protection and data encryption. After your interview, your data is sent
by a secure connection to our data bank, also protected by layers of security.
• Some researchers apply to BLS for permission to get information about
respondents’ geographic area of residence. These researchers are vetted and
participate in the same security training as BLS, NORC, and CHRR staff. They
also can be fined or imprisoned for violating the confidentiality of respondents.
File Type | application/pdf |
File Title | NLSY97 cyber security card |
Author | CHRR |
File Modified | 2025-06-30 |
File Created | 2025-06-30 |