OMB Control No. 3060-xxxx Estimated Time per Response
Month 2023 5 hours
Not Yet Approved by OMB
Schools and Libraries Cybersecurity Pilot Program
Description of Services Requested and Certification FCC Form 471 (using FCC Form 471 and ECF FCC Form 471 information collection requirements approved pursuant to OMB Control Nos. 3060-0806 and 3060-1286)
(Note: This is a representative description of the information to be collected via the online portal and is not intended to be a visual representation of what each applicant will see. Where possible, information already pre-filed in the system portal can be carried forward and auto-populated into the form. Also, where the system has the input to automatically generate calculations and other information for the form, it will provide that information).
Item Number |
Section |
Field Description |
Purpose/Instructions |
1 |
Basic Information |
Applicant’s Form Nickname |
To create a unique identifier for this submission, the applicant simply enters a nickname (e.g., 2016 FY ABC School Form 471). |
2 |
Basic Information |
FCC Form 471 Application Number |
Auto-generated by the system: This is an Administrator-assigned unique identifier for this submission. |
3 |
Basic Information |
Applicant Name |
This is the name of the organization submitting this form—school, school district, library (outlet/branch or system) or a consortium of those entities (schools, libraries, or schools and libraries). If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
4 |
Basic Information |
Pilot Funding Year |
Auto-generated by the system based on the applicable funding year of the Schools and Libraries Cybersecurity Pilot Program: This is the Pilot Funding Year for which equipment and services are sought. |
5 |
Basic Information |
Entity Number |
Auto-generated by the system: This is the Unique identifier assigned by the Administrator to the organization listed in Applicant Name. |
6 |
Basic Information |
FCC Registration Number |
This is the unique FCC identifier for the organization listed as the applicant. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
7 |
Basic Information |
Unique Entity Identifier (UEI) Number |
This is a unique identifier for the organization listed as the applicant. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
8 |
Basic Information |
Mailing Address |
This is the mailing address for the applicant. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
9 |
Basic Information |
Telephone Number |
This is the main telephone line for the applicant which may/may not be the same as the telephone number for the person who should be contacted with questions about this application. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
10 |
Basic Information |
Type of Applicant |
Options are: school, school district, library/library system, consortium, or statewide consortium. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
11 |
Basic Information |
Applicant Attributes |
Attributes for a School or School District include: Public, Private, Charter and Educational State Agency (ESA). Attributes for a Library System include: Public and Private. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
12 |
Basic Information |
Contact Person’s Name |
Provide the name of the person who should be contacted with questions about this application. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
13 |
Basic Information |
E-mail Address |
E-mail Address of the Contact Person. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
14 |
Basic Information |
Contact Person’s Telephone Number |
Telephone Number of the Contact Person. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
15 |
Basic Information |
Holiday/vacation/summer contact information |
This line will collect the name, phone number, and email of the holiday/vacation/summer contact. |
16 |
Basic Information |
Website |
Website URL for school, school district, library, or consortium, etc. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
17 |
Basic Information |
Consultant Information |
System will ask for consultant name, registration number, consultant’s employer, street address and telephone number, and e-mail address. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
18 |
Entity Information |
Entity Number |
Unique identifier assigned by the Administrator to each school, library outlet/branch, or NIF. |
19 |
Entity Information |
Name of the Individual School or Library Outlet/Branch, or NIF Name |
If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
20 |
Entity Information |
Physical Address |
Physical address of each Individual School or Library Outlet/Branch. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
21 |
Entity Information |
National Center for Education Statistics (NCES) School ID or Federal-State Cooperative System (FSCS) Library ID |
For each school, this line will collect the NCES School ID. For each library, this line will collect the FSCS Library ID. (This line is not applicable to NIFs.) This information will pre-populated into this submission by the Administrator, if available. |
22 |
Entity Information |
Urban or Rural |
The system will automatically determine the Urban/Rural status of the entity based on the physical address associated with that entity. |
23 |
Entity Information |
Tribal Entities and Tribal Affiliation |
For each Tribal entity, this line will collect their Tribal affiliation. If the entity qualifies as Tribal, they will also include their Tribal Affiliation. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
24 |
Entity Information |
Non-Instructional Facility (NIF) |
Indicates whether the entity is a NIF. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
25 |
Entity Information |
State Local Education Agency (LEA) ID |
State school IDs (LEA code and school code). If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
26 |
Entity Information |
State School ID |
State school IDs (LEA code and school code). If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
27 |
Entity Information |
Endowment Amount (Dollars) |
Schools and school districts will be asked if they have an endowment and the amount of their endowment. This is related to the certification they make that they are eligible for Schools and Libraries Cybersecurity Pilot Program funding because they meet the statutory definition of an “elementary” or “secondary school” as defined in 47 CFR § 54.2000, do not operate as for-profit businesses, and do not have endowments exceeding $50 million. |
28 |
Entity Information |
Maximum number of students on school premises at the same time |
This field is defined as the maximum number of students on the premises at the same time. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
29 |
Entity Information |
Maximum student count based on estimate (Yes/No) |
Indicate if the maximum number of students in the school is based on an estimate. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
30 |
Entity Information |
Alternative Discount |
Applicant will indicate if they used an alternative discount methodology, such as a survey. Applicant will also indicate whether it has adopted the Community Eligibility Program (CEP) and if so, provide the percentage of direct certification students. |
31 |
Entity Information |
School Attributes |
The list of attributes for a School includes: Public, Private, Pre-Kindergarten, Head Start, Adult Education, Juvenile Justice, Dormitory, Charter, Tribal, New Construction and ESA. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
32 |
Entity Information |
Annex |
Captures the following fields for an Annex: Name of Annex, Name of Associated School/Library, Entity Number for the Associated School/Library, Physical Address of the Annex, Square Feet (if a Library Annex), and Status (Values are: Active or Closed). If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
33 |
Entity Information |
Total Square Footage of library outlet |
Used to determine the Category Two budget for libraries. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
34 |
Entity Information |
Library Main Branch? (Yes/No) |
Used to determine if a library is a main branch. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
35 |
Entity Information |
Billed Entity Number |
The Administrator assigns a billed entity number (BEN) to the entity who pays the Service Provider for equipment and/or services delivered to eligible schools and libraries. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
36 |
Entity Information |
Library Attributes |
The list of attributes for a Library includes: Public, Private, Academic, Research, Tribal, Tribal College or University, Bookmobile, Kiosk, New Construction, Main Branch and State Library Agency. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
37 |
Entity Information |
Institute of Museum and Library Services (IMLS) Locale Code |
The IMLS assigns Locale Codes at the entity level (e.g., for each outlet/branch). Note that a library annex will have the same Locale Code as its associated outlet/branch. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
38 |
Entity Information |
Total Number of Students Enrolled in School District |
Total number of students in the school district should include all of the students in the school district as a whole, counting each student only once. If this information has already been entered into the applicant’s profile, it will be pre-populated into this submission. |
39 |
Entity Information |
Percentage of Students in School District Eligible for NSLP |
This is the percentage of students in the school district that are eligible for the National School Lunch Program (NSLP). |
40 |
Entity Information |
E-Rate Category One Discount Rate |
System determines the discount rate that applies to E-Rate Category One service. |
41 |
Entity Information |
E-Rate Category Two Discount Rate |
System determines the discount rate that applies to E-Rate Category Two services. |
42 |
Entity Information |
Consortium E-Rate Discount Calculation and Rate |
The system will calculate and display the consortium discount percentage rate, based on an average of student count data for all of the member entities participating on the FCC Form 471. |
43 |
Entity Information |
Schools and Libraries Cybersecurity Pilot Program Discount Rate |
System determines the discount rate that will apply to the pilot program. |
44 |
Contract Details |
Contract Number |
This is the number of the contract if the equipment and/or services are being received under contract. |
45 |
Contract Details |
Contract Nickname |
Applicants can provide a unique name for the contract. |
46 |
Contract Details |
Has the applicant piggybacked off another contract or can other applicants use this contract to provide a competitive bid response (i.e., can they piggy back on this contract?) (Yes/No) |
Piggybacking allows a contract negotiated by an entity to be used by other entities using the same terms of the contract. The contract issuer has to include piggybacking terms in the contract, and the vendor or contractor involved must agree. These contracts are traditionally for materials and equipment and are permitted only in certain jurisdictions. |
47 |
Contract Details |
State Master Contract |
If buying off of a master contract signed by a state, regional, or local procurement agency on behalf of eligible schools and libraries, you may use either the master contract number or the number of your own purchase agreement executed pursuant to that master contract.
|
48 |
Contract Details |
Billing Account Number With Service Provider |
The account number that the Service Provider has established for billing purposes. |
49 |
Contract Details |
Allowable Vendor Selection/Contract Date |
The system will determine and display the Allowable Vendor Selection/Contract Date based on the date of the posting of the establishing FCC Form 470. |
50 |
Contract Details |
Contract Award Date |
The date that the contract for the equipment and/or services was executed. |
51 |
Contract Details |
Service Start Date |
Provide the date when services will start in the funding year for which you are applying. |
52 |
Contract Details |
Service End Date |
Provide the date when services will end. |
53 |
Contract Details |
Contract Expiration Date for Current Term |
The date the current contract term expires. |
54 |
Contract Details |
Contract Expiration Date if all Extensions are Exercised |
If the contract includes a clause that permits the parties to extend or renew the agreement at the end of the current contract period, indicate the expiration date of the contract if all extensions and renewals were exercised. |
55 |
Funding Request |
Applicant Funding Request Numbers (FRN) Nickname |
Applicants can provide a unique name for each FRN for their own recordkeeping purposes. |
56 |
Funding Request |
Funding Request Number (FRN) |
A system-generated unique number or FRN to each funding request. |
57 |
Funding Request |
Continuation of an FRN from a previous funding year, based on a multi-year contract? (Enter FRN) |
An applicant will be used to allow the system to copy FRN data from a previous funding year. This will allow applicant to bypass the need to reenter data for this FRN and make only the changes that have occurred since the previous year. |
58 |
Funding Request |
Equipment or Service Type |
Applicant to provide a description of the type of equipment or service requested. |
59 |
Funding Request |
Establishing FCC Form 470 or Competitive Bidding Exemption |
Applicant identifies the establishing Schools and Libraries Cybersecurity Pilot Program FCC Form 470 for the FRN or specifies an applicable competitive bidding exemption. |
60 |
Funding Request |
Number of vendors who provided a responsive bid |
Provide the number of vendors who provided a responsive bid for the eligible equipment or services for which support is being requested in the funding request. Note that the criteria for responsiveness must be established in the original solicitation. This field is not required when support is requested for equipment or services that are exempt from the requirement to post an FCC Form 470. |
61 |
Funding Request |
Service Provider Identification Number (SPIN) |
The 9-digit SPIN for the Service Provider that will provide service(s) for the funding request. |
62 |
Funding Request |
Service Provider Name |
The online system will populate the full legal name associated with the SPIN entered. Applicant will manually input this information if the Service Provider information is not already in the system. |
63 |
Funding Request |
Service Provider Contact Information |
Name, Address, and Phone Number if the applicant is using a Service Provider who does not have a SPIN number. Applicant will manually input this information if the Service Provider information is not already in the system. |
64 |
Funding Request |
Tariffed or Month-to-Month Services |
Indicates whether this funding request is for a non-contracted tariffed or month-to-month service.
|
|
If the funding requested above in the “Funding Request” section is for “Services,” applicants fill out the “Funding Request – Line Item for Cybersecurity Services” section.
|
||
65 |
Funding Request – Line Item for Cybersecurity Services |
Narrative |
Each Funding Request must include a description of the cybersecurity services being requested. Applicants will also be able to use this field to provide additional information for their request and upload supporting documentation.
|
66 |
Funding Request – Line Item for Cybersecurity Services |
Type of Service |
Applicants will indicate the type of service sought in the funding request through a combination of drop down menus and narrative text. |
67 |
Funding Request – Line Item for Cybersecurity Services |
Service Function |
Applicants will indicate the functions of the services sought in the funding request through a combination of drop down menus and narrative text. |
68 |
Funding Request – Line Item for Cybersecurity Services |
Service Quantity |
Applicants will indicate the quantities of the services sought in the funding request through a combination of drop down menus and narrative text. |
69 |
Funding Request – Line Item for Cybersecurity Services |
Bandwidth Upload speed |
Only appears for services requests. Only needs to be completed if applicable to the requested Cybersecurity service. |
70 |
Funding Request – Line Item for Cybersecurity Services |
Bandwidth Download speed (if different) |
Only appears for services requests. Only needs to be completed if applicable to the requested Cybersecurity service.
|
71 |
Funding Request – Line Item for Cybersecurity Services |
Recipient(s) of Service (Entity Numbers) |
From the list of entities associated with the applicant’s profile, the applicant would select the entity(ies) for which the line item provides cybersecurity services, either directly or indirectly.
|
72 |
Funding Request – Line Item for Cybersecurity Services |
Direct Connection? (Yes/No) |
The applicant is asked whether the cybersecurity service will use a direct connection to the school, library or NIF.
|
73 |
Funding Request – Line Item for Cybersecurity Services |
Other Connection That is Not a “Direct” Connection? (Yes/No)? |
The applicant is asked whether the cybersecurity service will use another type of connection that is not a direct connection to a school, library, or NIF. These are eligible connections sought by the applicant that do not go directly to a school, library, or NIF (e.g., WAN connections may provide both a direct connection to a school, library, or NIF but may also provide connections that do not go directly to the school, library, or NIF).
|
74 |
Funding Request – Line Item for Cybersecurity Services |
Monthly Recurring Unit Cost |
Applicants will indicate the monthly recurring unit cost of the services sought in the funding request through a combination of drop down menus and narrative text. |
75 |
Funding Request – Line Item for Cybersecurity Services |
Monthly Recurring Ineligible Cost |
Applicants will indicate the monthly recurring ineligible cost of the services sought in the funding request through a combination of drop down menus and narrative text.
|
76 |
Funding Request – Line Item for Cybersecurity Services |
Monthly Recurring Eligible Cost |
Applicants will indicate the monthly recurring eligible cost of the services sought in the funding request through a combination of drop down menus and narrative text. |
77 |
Funding Request – Line Item for Cybersecurity Services |
Monthly Quantity of Recurring Services |
Applicants will indicate the monthly quantity of recurring services sought in the funding request through a combination of drop down menus and narrative text. |
78 |
Funding Request – Line Item for Cybersecurity Services |
Months of Service |
Applicants will indicate the total months the services will be sought in the funding request through a combination of drop down menus and narrative text. |
79 |
Funding Request – Line Item for Cybersecurity Services |
Monthly Recurring Cost |
Applicants will indicate the monthly recurring cost of the services sought in the funding request through a combination of drop down menus and narrative text. |
80 |
Funding Request – Line Item for Cybersecurity Services
|
One-time Unit Cost |
Applicants will indicate the one-time unit cost for the services sought in the funding request through a combination of drop down menus and narrative text. |
81 |
Funding Request – Line Item for Cybersecurity Services |
One-Time Quantity |
Applicants will indicate the one-time quantity of the services sought in the funding request through a combination of drop down menus and narrative text. |
82 |
Funding Request – Line Item for Cybersecurity Services |
Total One-Time Cost |
Applicants will indicate the total one-time cost of the services sought in the funding request through a combination of drop down menus and narrative text. |
83 |
Funding Request – Line Item for Cybersecurity Services |
One-Time Ineligible Cost |
Applicants will indicate the one-time ineligible cost of the services sought in the funding request through a combination of drop down menus and narrative text. |
84 |
Funding Request – Line Item for Cybersecurity Services |
Extended Line Item Cost |
The system will automatically calculate the total pre-discount amount for this FRN line, based on the information provided.
|
If the funding requested above in the “Funding Request” section is for “Equipment,” applicants fill out the “Funding Request – Line Item for Cybersecurity Equipment” section.
|
|||
85 |
Funding Request – Line Item for Cybersecurity Equipment |
Narrative |
Each Funding Request must include a description of the cybersecurity equipment being requested. Applicants will also be able to use this field to provide additional information for their request and upload supporting documentation. |
86 |
Funding Request – Line Item for Cybersecurity Equipment |
Type of Equipment |
Applicants will indicate the type of equipment sought in the funding request through a combination of drop down menus and narrative text. |
87 |
Funding Request – Line Item for Cybersecurity Equipment |
Make |
For cybersecurity equipment requests. Only one make per line item. |
88 |
Funding Request – Line Item for Cybersecurity Equipment |
Model |
For cybersecurity equipment requests. Only one model per line item. |
89 |
Funding Request – Line Item for Cybersecurity Equipment |
One-time Unit Cost |
Applicants will indicate the one-time unit cost of the equipment sought in the funding request through a combination of drop down menus and narrative text.
|
90 |
Funding Request – Line Item for Cybersecurity Equipment |
One-Time Quantity |
Applicants will indicate the one-time quantity of the equipment sought in the funding request through a combination of drop down menus and narrative text. |
91 |
Funding Request – Line Item for Cybersecurity Equipment |
Total One-Time Cost |
Applicants will indicate the total one-time cost of the equipment sought in the funding request through a combination of drop down menus and narrative text. |
92 |
Funding Request – Line Item for Cybersecurity Equipment |
One-Time Ineligible Cost |
Applicants will indicate the one-time ineligible cost of the equipment sought in the funding request through a combination of drop down menus and narrative text. |
93 |
Funding Request – Line Item for Cybersecurity Equipment |
Extended Line Item Cost |
The system will automatically calculate the total amount for this FRN line, based on the information provided.
|
|
Recipient of Service Information – Requested for Consortium applications only
|
||
94 |
Funding Request – Consortium Applications |
Recipients of Service |
From the list of entities associated with the applicant’s profile, the applicant would select the entity(ies) for whom the line item provides cybersecurity services.
|
95 |
Funding Request – Consortium Applications |
Cost Allocation for Recipients of Cybersecurity Service |
Enter the dollar amount provided for each recipient of cybersecurity service. |
Invoicing Mode Selected
|
|||
96 |
Invoicing Mode Selected |
Invoicing Mode Selected |
Applicants will be required to select whether they will be invoicing the Administrator for the requested eligible equipment and/or service or if their Service Providers will be invoicing the Administrator for the requested eligible equipment and services. |
97 |
Invoicing Mode Selected |
FCC Registration Number |
This is the unique FCC identifier for the organization listed as the Service Provider who agreed to invoice the Administrator on behalf of the applicant. The applicant will be asked to input this number on the application if the Service Provider’s FCC Registration number cannot be pre-populated. |
98 |
Invoicing Mode Selected |
Unique Entity Identification (UEI) Number |
The UEI number is a unique nine-digit identifier for businesses. The applicant will be asked to input the UEI number of the Service Provider who agreed to invoice the Administrator on behalf of the applicant if the Service Provider’s UEI number cannot be pre-populated. |
Certifications
|
|||
99 |
Certifications |
Signature of Authorized Person |
The form must be certified electronically with the authorized person’s applicant name and password. |
100 |
Certifications |
Date Signed |
Auto generated by system. |
101 |
Certifications |
Name of Authorized Person |
This is the name of the authorized person signing the form. This will be prepopulated based on the profile of the applicant signing the form electronically. |
102 |
Certifications |
Title or Position of Authorized Person |
This is the title of the authorized person signing the form. This will be prepopulated based on the profile of the applicant signing the form electronically. |
103 |
Certifications |
Physical or Mailing Address of Authorized Person |
This is the address (can be physical address or mailing address) of the authorized person signing the form. This will be prepopulated based on the profile of the applicant signing the form electronically. |
104 |
Certifications |
Telephone Number of Authorized Person |
This is the telephone number of the authorized person signing the form. This will be prepopulated based on the profile of the applicant signing the form electronically. |
105 |
Certifications |
Email Address of Authorized Person |
This is the email address of the authorized person signing the form. This will be prepopulated based on the profile of the applicant signing the form electronically. |
106 |
Certifications |
I am authorized to submit this application on behalf of the above-named applicant and that based on information known to me or provided to me by employees responsible for the data being submitted, I hereby certify that the data set forth in this application has been examined and is true, accurate, and complete. I acknowledge that any false statement on this application or on other documents submitted by this applicant can be punished by fine or forfeiture under the Communications Act (47 U.S.C. 502, 503 (b)), or fine or imprisonment under Title 18 of the United States Code (18 U.S.C. 1001), or can lead to liability under the False Claims Act (31 U.S.C. 3729–3733). |
The authorized person will be required to make the following certifications to be able to submit the request for funding. The certifications are necessary to ensure the applicant is compliant with the Schools and Libraries Cybersecurity Pilot Program rules and to protect the Program from waste, fraud, and abuse. |
107 |
Certifications |
In addition to the foregoing, this applicant is in compliance with the rules and orders governing the Schools and Libraries Cybersecurity Pilot Program, and I acknowledge that failure to be in compliance and remain in compliance with those rules and orders may result in the denial of funding, cancellation of funding commitments, and/or recoupment of past disbursements. I acknowledge that failure to comply with the rules and orders governing the Schools and Libraries Cybersecurity Pilot Program could result in civil or criminal prosecution by law enforcement authorities. |
See number 106. |
108 |
Certifications |
By signing this application, I certify that the information contained in this application is true, complete, and accurate, and the projected expenditures, disbursements and cash receipts are for the purposes and objectives set forth in the terms and conditions of the federal award. I am aware that any false, fictitious, or fraudulent information, or the omission of any material fact, may subject me to criminal, civil or administrative penalties for fraud, false statements, false claims or otherwise. (U.S. Code Title 18, sections 1001, 286-287 and 1341 and Title 31, sections 3729–3730 and 3801–3812). |
See number 106. |
109 |
Certifications |
The school meets the statutory definition of “elementary school” or “secondary school” as defined in § 54.2000, does not operate as a for-profit business, and does not have endowments exceeding $50 million. |
This certification only shows if schools and/or consortia are the only entities seeking funding on this application. See also number 106. |
110 |
Certifications |
The library or library consortia is eligible for assistance from a State library administrative agency under the Library Services and Technology Act, does not operate as for-profit businesses and, except for the limited case of Tribal college and university libraries, have budgets that are completely separate from any school (including, but not limited to, elementary and secondary schools, colleges, and universities). |
This certification only shows if libraries and/or consortia are the only entities seeking funding on this application. See also number 106. |
111 |
Certifications |
The school, library, or consortium listed on the FCC Form 471 application will pay the non-discount portion of the costs of the eligible services and/or equipment to the Service Provider(s). |
See number 106. |
112 |
Certifications |
The school, library, or consortium listed on the FCC Form 471 application has conducted a fair and open competitive bidding process and has complied with all applicable state, Tribal, or local laws regarding procurement of the equipment and services for which support is being sought. |
See number 106. |
113 |
Certifications |
An FCC Form 470 was posted and that any related request for proposals (RFP) was made available for at least 28 days before considering all bids received and selecting a service provider. The school, library, or consortium listed on the FCC Form 471 application carefully considered all bids submitted and selected the most-cost-effective bid in accordance with § 54.2005(e), with price being the primary factor considered. |
See number 106. |
114 |
Certifications |
The school, library, or consortium listed on the FCC Form 471 application is only seeking support for eligible services and/or equipment. |
See number 106. |
115 |
Certifications |
The school, library, or consortia is not seeking Schools and Libraries Cybersecurity Pilot Program support or reimbursement for eligible services and/or equipment that have been purchased and reimbursed in full with other federal funding, targeted state funding, other external sources of targeted funding or targeted gifts, or are eligible for discounts from the schools and libraries universal service support mechanism or another universal service support mechanism. |
See number 106. |
116 |
Certifications |
The services and equipment the school, library, or consortium purchases using Schools and Libraries Cybersecurity Pilot Program support will be used primarily for educational purposes and will not be sold, resold, or transferred in consideration for money or any other thing of value, except as allowed by § 54.2003(c). |
See number 106. |
117 |
Certifications |
The school, library, or consortium will create and maintain an equipment and service inventory as required by § 54.2010(a). |
See number 106. |
118 |
Certifications |
The school, library, or consortium has complied with all program rules and acknowledges that failure to do so may result in denial of funding and/or recovery of funding. |
See number 106. |
119 |
Certifications |
The school, library, or consortium acknowledges that it may be audited pursuant to its application, that it will retain for ten years any and all records related to its application, and that, if audited, it shall produce such records at the request of any representative (including any auditor) appointed by a state education department, the Administrator, the Commission and its Office of Inspector General, or any local, state, or federal agency with jurisdiction over the entity. |
See number 106. |
120 |
Certifications |
No kickbacks, as defined in 41 U.S.C. 8701 were paid to or received by the applicant from anyone in connection with the Schools and Libraries Cybersecurity Pilot Program or the schools and libraries universal service support mechanism. |
See number 106. |
121 |
Certifications |
The school, library, or consortium acknowledges that Commission rules provide that persons who have been convicted of criminal violations or held civilly liable for certain acts arising from their participation in the universal service support mechanisms are subject to suspension and debarment from the program. The school, library, or consortium will institute reasonable measures to be informed, and will notify the Administrator should it be informed or become aware that any of the entities listed on this application, or any person associated in any way with this entity and/or the entities listed on this application, is convicted of a criminal violation or held civilly liable for acts arising from their participation in the universal service support mechanisms. |
See number 106. |
NOTE: The certification below will only be required if needed. If not needed, applicants for the Cybersecurity Pilot Program will not be required to complete the certification below.
Applicants who have not provided an FCC Form 486 or FCC Form 479 certifying compliance with the Children’s Internet Protection Act (CIPA) for the current E-Rate program funding year may need to certify compliance with CIPA on the Schools and Libraries Cybersecurity Pilot Program FCC Form 471. |
|||
122 |
CIPA Certifications |
I certify that as of the date of the start of Schools and Libraries Cybersecurity Pilot Program supported services:
|
For applicants who are the administrative authority, the authorized person must certify compliance with the Children’s Internet Safety Act (CIPA) by selecting the certification that is applicable.
|
123 |
CIPA Certifications |
I certify as the Billed Entity for a consortium that as of the date of the start of Schools and Libraries Cybersecurity Pilot Program supported services:
|
For applicants who are Billed Entity for a consortium, the authorized person must certify compliance with the Children’s Internet Safety Act (CIPA) by selecting the certification that is applicable. |
File Type | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
Author | Titra Hamilton |
File Modified | 0000-00-00 |
File Created | 2024-07-21 |