OMB Control No. 3060-1323 Estimated Time per Response
[Month] 2025 15 hours
Not Yet Approved by OMB
Schools and Libraries Cybersecurity Pilot Program
Schools and Libraries Cybersecurity Pilot Program Application (FCC Form 484)
(Note: This is a representative description of the information to be collected via the online portal and is not intended to be a visual representation of what each applicant or participant will see, the order in which they will see information, or the exact wording or directions used to collect the information. Where possible, information that was pre-filed in the system portal as part of the applicant’s or participant’s profile will be carried forward and pre-populated into the form.)
Item # |
Field Description |
Category |
Purpose/Instructions |
1 |
Applicant/Participant Name |
Entity Information |
This is the name of the applicant submitting the first part of this application form or the participant (applicants become participants if selected to participate in the Pilot Program) submitting the second or third part of this form—school, school district, library (outlet/branch or system) or a consortium of those entities (schools, libraries, or schools and libraries). If this information has already been entered into the applicant’s or participant’s profile, it will be pre-populated. |
2 |
Entity Number |
Entity Information |
This is the Unique identifier assigned by the Administrator to the entity listed in Applicant/Participant Name. If this information has already been entered into the applicant’s or participant’s profile, it will be pre-populated. |
3 |
Application Number |
System Generated |
Auto-generated by the system: This is an Administrator-assigned unique identifier for the first, second, and third parts of this application. |
4 |
FCC Registration Number |
Entity Information |
This is the unique FCC identifier for the applicant/participant. If this information has already been entered into the applicant’s or participant’s profile, it will be pre-populated. |
5 |
Employer Identification Number (EIN) |
Entity information |
The EIN is also known as a Federal Tax Identification Number, and is used to identify a business or non-profit entity. If this information has already been entered into the applicant’s or participant’s profile, it will be pre-populated. |
6 |
Mailing Address |
Entity Information |
This is the mailing address for the applicant/participant. If this information has already been entered into the applicant’s or participant’s profile, it will be pre-populated. |
7 |
Telephone Number |
Entity Information |
This is the main telephone number for the applicant/participant which may/may not be the same as the telephone number for the person who should be contacted with questions about this application. If this information has already been entered into the applicant’s or participant’s profile, it will be pre-populated. |
8 |
Contact Person’s Name |
Entity Information |
Provide the name of the person who should be contacted with questions about this application. If this information has already been entered into the applicant’s or participant’s profile, it will be pre-populated. |
9 |
Contact Person’s Title or Position |
Entity Information |
Provide the title or position of the contact person. If this information has already been entered into the applicant’s or participant’s profile, it will be pre-populated. |
10 |
Contact Person’s Telephone Number |
Entity Information |
Telephone Number of the Contact Person. If this information has already been entered into the applicant’s or participant’s profile, it will be pre-populated. |
11 |
Contact Person’s Mailing Address |
Entity Information |
Mailing Address of the Contact Person. If this information has already been entered into the applicant’s or participant’s profile, it will be pre-populated. |
12 |
Contact Person’s E-mail Address |
Entity Information |
E-mail Address of the Contact Person. If this information has already been entered into the applicant’s or participant’s profile, it will be pre-populated. |
13 |
Responding Person’s Name |
Entity Information |
If different from the Contact Person and/or the person authorized to make all required certifications and provide all required signatures (Authorized Person), the name of the person who is responding to the questions on this form. |
14 |
Responding Person’s Title or Position |
Entity Information |
Provide the title or position of the Responding Person. |
15 |
Responding Person a Consultant or Consortium Lead |
Entity Information |
Indicate whether the Responding Person is a consultant or consortium lead. |
16 |
Responding Person’s Telephone Number |
Entity Information |
Telephone Number of the Responding Person. |
17 |
Responding Person’s E-mail Address |
Entity Information |
E-mail Address of the Responding Person. |
18 |
Responding Person’s Network Experience |
Entity Information |
Number of years of network experience of Responding Person. |
19 |
Consultant Information |
Entity Information |
If the applicant/participant uses a consultant to submit its application, the user must provide the name of the consulting company, the consulting company’s registration number, the consulting company’s telephone number, the consulting company’s email address, the name of the consultant(s) representing the applicant/participant, the telephone number of the consultant(s), the email address of the consultant(s), and the physical address of the consultant(s). If this information has already been entered into the applicant’s/participant’s profile, it will be pre-populated into this submission. |
20 |
Type of Applicant/Participant |
Entity Information |
Options are: school, school district, library/library system, or consortium. If this information has already been entered into the applicant’s or participant’s profile, it will be pre-populated. |
21 |
Applicant/Participant Attributes |
Entity Information |
Attributes for a School or School District include: Public, Private, Charter, and Educational Service Agency (ESA). Attributes for a Library or Library System include: Public and Private. If this information has already been entered into the applicant’s or participant’s profile, it will be pre-populated. |
22 |
Student Enrollment Count |
|
Information on the student enrollment count. If a school or school district, this information will be pre-populated from the applicant’s or participant’s profile. |
23 |
Current Number of Staff |
Entity Information |
Information about the current number of staff employed by the school, school district, library/library system, or consortium. |
24 |
Current Number of Patrons |
Entity Information |
Information about the current number of patrons served by the library/library system or consortium. |
25 |
Number of Staff and Student Records |
Entity Information |
Information about the current number of records the school, school district, library/library system, or consortium has on file for staff and students/patrons. |
26 |
Tribal Affiliation |
Entity Information |
If the applicant/participant is a Tribal entity, the applicant/participant will provide its Tribal affiliation. If this information has already been entered into the applicant’s or participant’s profile, it will be pre-populated. |
27 |
E-Rate Status |
Entity Information |
This is to indicate whether the applicant/participant participates in the E-Rate program. The applicant will select either “Yes” or “No”. If this information has already been entered into the applicant’s/participant’s profile, it will be pre-populated. |
28 |
E-Rate Discount Percentage |
Entity Information |
This is the E-Rate Category One discount percentage for the applicant/participant. If this information is in the applicant’s or participant’s profile, it will be pre-populated. |
29 |
Urban/Rural Designation |
Entity Information |
This is the urban/rural designation for the applicant/participant and will be system-populated based on the applicant’s or participant’s physical address. |
30 |
Lead Site Name |
Entity Information |
For consortia applications or applications with more than one site, this is the name of the site that is the lead for the Schools and Libraries Cybersecurity Pilot Program. |
31 |
Number and Location of Participating Sites |
Entity Information |
For consortia applications or applications with more than one site, the applicant/participant will provide information on the number and location of sites that are participating in the Schools and Libraries Cybersecurity Pilot Program. If this data is available in the applicant’s or participant’s profile, it will be pre-populated. |
32 |
Executive Summary of Project or For Participants: Executive Summary of Status of Project |
Project Information |
Applicants will provide a summary of the proposed Pilot project(s) for which Schools and Libraries Cybersecurity Pilot Program funding is being requested, including, but not limited to, information about the cybersecurity issues the applicant faces and the proposed cybersecurity action plan for the applicant and any other sites that included as part of the project.
Participants will provide a summary of the of the cybersecurity project(s) for which they have requested Schools and Libraries Cybersecurity Pilot Program funding including, but not limited to, information about the cybersecurity issues the participant has faced and continues to face and the status of its cybersecurity action plan. |
33 |
Description of How Project Funding Will be Used or For Participants: Description of Use of Project Funding |
Project Information |
Applicants will describe how the proposed Pilot project would use Schools and Libraries Cybersecurity Pilot Program funding to protect the applicant’s broadband networks and data, and address cybersecurity concerns, including, but not limited to, a discussion of the types of equipment and services the applicant plans to purchase and how it plans to use the equipment and services to protect its broadband network and data and manage and address its cybersecurity risks.
Participants will describe how they have used and will continue to use Schools and Libraries Cybersecurity Pilot Program funding to protect their broadband networks and data, and address cybersecurity concerns, including, but not limited to, a discussion of the types of equipment and services the participant has purchased and plans to purchase and how it has used and plans to use the equipment and services to protect its broadband network and data and manage and address its cybersecurity risks.
|
34 |
Previous Cybersecurity Experience |
Project Information |
Applicants will provide information on whether they have previous experience implementing cybersecurity protections or measures (answered on a yes/no basis), how many years of prior experience the applicant has (answered by choosing from a preset menu of time ranges (e.g., 1 to 3 years)), and whether the applicant has experienced a cybersecurity incident within a year of the date of its application (answered on a “yes/no” basis). |
35 |
Current Cybersecurity Posture and Resources |
Project Information |
Participants will provide information on their current cybersecurity posture and resources, including, but not limited to, how current cybersecurity risks are being managed and addressed, any structural or other network protections being utilized, and the cybersecurity equipment and services the participant already has in place. |
36 |
Cyber Threats and Attacks |
Project Information |
Applicants/Participants will provide information on whether they have experienced a cybersecurity threat or attack (including while participating in the Schools and Libraries Cybersecurity Pilot Program for participants), including, but not limited to, staffing levels, the timing and length of the threat or attack, a description of the vulnerabilities exploited and the techniques used to access the system, information about the malicious cybersecurity actor(s), if known, the time it took to detect and respond to the threat or attack, the estimated cost of the threat or attack, whether/how the cybersecurity threat or attack impacted the applicant’s/participant’s operations, network, or data, and any existing or future plans to implement an incident response plan and assess its effectiveness. |
37 |
Implementation of Education Department or CISA Cybersecurity Recommendations |
Project Information |
Applicants/Participants will provide information on whether they have implemented, or begun implementing, any of the U.S. Department of Education (Education Department) or Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) recommended cybersecurity protections and which protections it will or has implemented. |
38 |
Participation in Cybersecurity Collaboration and/or Information Sharing Groups |
Project Information |
Applicants/Participants will provide information on whether they have become members of, or plan to join, any cybersecurity collaboration or information-sharing groups and the applicable cybersecurity groups they have joined or plan to join. |
39 |
Other Sources of Funding |
Project Information |
Applicants/Participants will provide information on whether they have received, or expect to receive, cybersecurity funding from any other federal, state, local, Tribal, or other program or source, including, but not limited to, information about the source of the other funding, what the other funding has been or will be used for, and whether funding from the Schools and Libraries Cybersecurity Pilot Program would be duplicative of the other funding received. |
40 |
Cybersecurity Risks Proposed Pilot Project has or will Prevent or Address / For Participants: Cybersecurity Risks Pilot Project has or will Prevent or Address |
Project Information |
Applicants will provide information on the cybersecurity risks their proposed Schools and Libraries Cybersecurity Pilot Program project will prevent or address.
Participants will provide information on the cybersecurity risks their Schools and Libraries Cybersecurity Pilot Program projects have prevented or addressed or will prevent or address. |
41 |
Pilot Project Implementation and Operation |
Project Information |
Applicants/Participants will provide a description of their continued plan for implementing and operating the proposed Schools and Libraries Cybersecurity Pilot Program project. |
42 |
Goals and Objectives |
Project Information |
Applicants will provide information on their goals and objectives for the proposed Schools and Libraries Cybersecurity Pilot Program project.
Participants will provide information on the status of meeting their goals and objectives for the proposed Schools and Libraries Cybersecurity Pilot Program project and any new goals and objectives they have identified. |
43 |
Correction of Known Security Flaws and Routine Backups |
Project Information |
Participants will provide information on any known security flaws they have corrected or plan to correct and/or any routine backups they have conducted or plan to conduct, including the storage and protection of their backup information as part of their participation in the Schools and Libraries Cybersecurity Pilot Program. |
44 |
Recommended Cybersecurity Best Practices |
Project Information |
Applicants and participants will provide information on whether they have implemented or plan to implement recommended best practices from highly-regarded cybersecurity organizations (e.g., the Education Department, CISA, the National Institute of Standards and Technology (NIST), etc.) as part of their participation in the Schools and Libraries Cybersecurity Pilot Program. |
45 |
Designated Cybersecurity Officer |
Project Information |
Applicants/Participants will provide information on the officer or other senior-level staff member they have designated as their cybersecurity officer and the tasks the officer will be responsible for, including managing cybersecurity with limited staffing capabilities. |
46 |
Data and Metrics Collected by Applicant |
Project Information |
Applicants/Participants will provide a description of the data they have collected and will collect and the metrics they have used and will use to assess the outcomes of their participation in the Schools and Libraries Cybersecurity Pilot Program, including, but not limited to, a description of how they will collect, track, and store such information. |
47 |
Cost-Effectiveness Data and Metrics Collected by Service Provider |
Project Information |
Applicants/Participants will provide information on the data they required or will require their selected service providers to collect, track, and measure to determine the cost-effectiveness of the Schools and Libraries Cybersecurity Pilot Program-funded cybersecurity equipment and services. |
48 |
Awareness and Readiness Data and Metrics Collected by Service Provider |
Project Information |
Applicants will provide information on the data they required or will require their selected service providers to collect, track, and measure to determine the impact/effect on the applicants’ current cybersecurity awareness and readiness.
Participants will provide information on the data they required or will require their selected service providers to collect, track, and measure to determine the impact/effect of participation in the Schools and Libraries Cybersecurity Pilot Program on the participants’ cybersecurity awareness and readiness. |
49 |
Non-monetary Challenges |
Project Information |
Participants will provide information on the non-monetary cybersecurity challenges they have faced or will face and if/how participation in the Schools and Libraries Cybersecurity Pilot Program will address them. |
50 |
Current Cybersecurity Measures |
Project Information |
Participants will provide information on the current cybersecurity measures that they utilize. |
51 |
Cybersecurity Training |
Project Information |
Participants will provide information about their ongoing cybersecurity training efforts, including, but not limited to, the number/percentage of students, school and library staff, and/or library patrons who receive cybersecurity training, and training participation rates. |
52 |
Free and Low-Cost Cybersecurity Resources |
Project Information |
Applicants will provide information on whether they have utilized or plan to utilize any of the free or low-cost cybersecurity resources identified/offered by the Education Department or CISA, and which resources they are utilizing/plan to utilize. Participants who have not started to utilize the available free and low-cost cybersecurity resources should explain the impediments that are preventing them from doing so. |
53 |
Impediments to Developing a More Robust Cybersecurity Posture |
Project Information |
If applicable, applicants/participants will provide information on why they have not been able to take any preventative or mitigating actions to protect against cybersecurity threats and attacks and implement a more robust cybersecurity posture. |
54 |
Ability of Proposed Pilot Project to be Self-Sustaining / For Participants: Ability of Pilot Project to be Self-Sustaining |
Project Information |
Applicants will provide information on whether/how they plan for their Schools and Libraries Cybersecurity Pilot Program projects to be self-sustaining once established and after the Schools and Libraries Cybersecurity Pilot Program ends.
Participants will provide information on whether/how they plan for their Schools and Libraries Cybersecurity Pilot Program projects to be self-sustaining once established and after the Schools and Libraries Cybersecurity Pilot Program ends. |
55 |
Network Infrastructure |
Project Information |
Participants will provide information about how their networks are structured, including, but not limited to, any separation between the internal and external portions of their networks. |
56 |
Network Access and Protection |
Project Information |
Participants will provide information about how many owned or leased end user devices have access to their networks and how many of the devices have cybersecurity protections, including, but not limited to, the name(s) of the service provider(s) providing the protections and identification information for the protection equipment and services provided. |
57 |
Network Equipment, Hardware, and Software Services |
Project Information |
Applicants/Participants will provide information on any network equipment, and/or hardware or software services they have requested or plan to request as part of their participation in the Schools and Libraries Cybersecurity Pilot Program, including, but not limited to, any cloud services or third-party managed cybersecurity services. |
58 |
Network Equipment, Hardware, and Software Reports |
Project Information |
Participants will provide information about whether their devices, equipment, hardware, and/or software can access the network, and generate reports about the protections provided to their networks and data, including, but not limited to, information about the protection of network traffic, and the number and types of cybersecurity threats and attacks prevented. |
59 |
Identity Protection and Authorization |
Project Information |
Participants will provide information about their identity protection and authorization equipment and services, including, but not limited to, the type and number of users protected, whether the users are registered users, the use of Multi-Factor Authentication (MFA), the implementation of any advanced protections (e.g., Media Access Control (MAC)), the service provider(s) providing the equipment and services, the identification information for the services and equipment, the ability of the equipment and services to generate reports about the number and type of cybersecurity threats and attacks prevented, and any use of advanced protections. |
60 |
Network and Data Monitoring, Protection, and Response |
Project Information |
Participants will provide information about their network and data monitoring, protection, and response services/equipment, including, but not limited to, the ability of the equipment and services to generate reports about the number and type of cybersecurity threats and attacks prevented, any requested or required threat/attack reporting by network users, and any network threat/attack testing conducted by participants. |
61 |
Network and Data System Outages |
Project Information |
Participants will provide information about whether they have closed or would need to close in the event of a network and/or data system outage, including, but not limited to, the actual or estimated length and cost of the closure. |
62 |
Cybersecurity Protections for Broadband Networks and Data Outside of the Pilot Program |
Project Information |
Participants will provide information on whether they have obtained or upgraded or plan to obtain or upgrade any of their cybersecurity protections for their broadband networks and data outside of the Schools and Libraries Cybersecurity Pilot Program. |
63 |
Implementation of Cybersecurity Recommendations or Framework Outside of Pilot Program |
Project Information |
Participants will provide information on whether they have resources outside of the Schools and Libraries Cybersecurity Pilot Program to begin implementation of the Education Department’s and/or CISA’s cybersecurity recommendations and/or a cybersecurity program or framework. |
64 |
Funding for Non-cybersecurity Equipment and Services That Support Cybersecurity Equipment and Services |
Project Information |
Applicants will provide information on whether their proposed Schools and Libraries Cybersecurity Pilot projects have funding for any non-cybersecurity equipment or services that they will use to support cybersecurity equipment or services and protect against cybersecurity threats and attacks. |
65 |
Will Service Provider be Required to Include any No Cost Cybersecurity Equipment and/or Services |
Project Information |
Applicants will provide information on whether the applicant will require its selected service provider(s) to provide any cybersecurity equipment and/or services at no cost to the applicant, including a description of the applicable equipment and services. |
66 |
Required Free and Low Cost Cybersecurity Resources |
Project Information |
Applicants and participants will provide information on any mandatory free and/or low-cost cybersecurity resources they expect their selected service providers to implement and utilize. |
67 |
Estimated Costs of Pilot-Eligible Services and Equipment |
Project Information |
Applicants will provide estimated cost information for the services and equipment that they will seek funding for through the Schools and Libraries Cybersecurity Pilot Program. |
68 |
Total Estimated Funding Request |
Project Information |
Applicants will provide the total estimated funding they anticipate requesting from the Schools and Libraries Cybersecurity Pilot Program for eligible cybersecurity equipment and services. |
69 |
Estimated Applicant/Participant Share of Cost for Eligible Items |
Project Information |
Applicants and participants will provide their estimated share of the costs for eligible equipment and services for which they request funding under the Schools and Libraries Cybersecurity Pilot Program. |
70 |
Estimated Applicant/Participant Cost for Ineligible Items |
Project Information |
Applicants and participants will provide the cost that they expect to pay for equipment and services that ineligible for funding under the Schools and Libraries Cybersecurity Pilot Program. |
71 |
Total Estimated Pilot Project Cost |
Project Information |
Applicants and participants will provide the total cost that they estimate they will incur for participating in the Schools and Libraries Cybersecurity Pilot Program. |
72 |
Cybersecurity Budget |
Project Information |
Participants will provide information on their cybersecurity budgets, including, but not limited to, whether they have separate budgets for their cybersecurity and security activities, equipment, and services. |
73 |
Sources of Support for Applicant’s/Participant’s Share of Cost for Eligible Items |
Project Information |
Applicants and participants will provide information on the sources of financial support they will use to pay their share of the cost for equipment and services that are eligible for funding under the Schools and Libraries Cybersecurity Pilot Program. |
74 |
Plan to Cover Cost of Ineligible Items |
Project Information |
Applicants will provide information on the their plan to pay the cost of equipment and services that are ineligible for funding under the Schools and Libraries Cybersecurity Pilot Program. |
75 |
Supporting Documentation |
Project Information |
Provides an option for applicants and participants to upload and submit documents to support their proposed Pilot Program project. |
76 |
I am authorized to submit this application on behalf of the above-named applicant/participant and that based on information known to me or provided to me by employees responsible for the data being submitted, I hereby certify that the data set forth in this form has been examined and is true, accurate, and complete. I acknowledge that any false statement on this application or on any other documents submitted by this applicant/participant can be punished by fine or forfeiture under the Communications Act (47 U.S.C. §§ 502, 503(b)), or fine or imprisonment under Title 18 of the United States Code (18 U.S.C. § 1001), or can lead to liability under the False Claims Act (31 U.S.C. §§ 3729-3733). |
Certifications |
The Authorized Person is required to make all required certifications and provide all required signatures.
|
77 |
In addition to the foregoing, this applicant/participant is in compliance with the rules and orders governing the Schools and Libraries Cybersecurity Pilot Program, and I acknowledge that failure to be in compliance and remain in compliance with those rules and orders may result in the denial of funding, cancellation of funding commitments, and/or recoupment of past disbursements. I acknowledge that failure to comply with the rules and orders governing the Schools and Libraries Cybersecurity Pilot Program could result in civil or criminal prosecution by law enforcement authorities. |
Certifications |
See Item No. 76 above. |
78 |
By signing this application, I certify that the information contained in this form is true, complete, and accurate, and the projected expenditures, disbursements, and cash receipts are for the purposes and objectives set forth in the terms and conditions of the Federal award. I am aware that any false, fictitious, or fraudulent information, or the omission of any material fact, may subject me to criminal, civil, or administrative penalties for fraud, false statements, false claims, or otherwise. (U.S. Code Title 18, §§ 1001, 286-287 and 1341, and Title 31, §§ 3729–3730 and 3801–3812). |
Certifications |
See Item No. 76 above. |
79 |
The applicant/participant recognizes that it may be audited pursuant to its application, that it will retain for ten years any and all records related to its application, and that, if audited, it shall produce such records at the request of any representative (including any auditor) appointed by a state education department, the Administrator, the Commission and its Office of Inspector General, or any local, state, or federal agency with jurisdiction over the entity. |
Certifications |
See Item No. 76 above. |
80 |
I certify and acknowledge, under penalty of perjury, that the schools, libraries, and consortia in the application will comply with all applicable Schools and Libraries Cybersecurity Pilot Program rules, requirements, and procedures, including the competitive bidding rules and the requirement to pay the required share of the costs for the supported items from eligible sources. |
Certifications |
See Item No. 76 above. |
81 |
I certify under penalty of perjury, to the best of my knowledge, that the schools, libraries, and consortia listed in the application are not already receiving or expecting to receive other funding (from any source, federal, state, Tribal, local, private, or other) that will pay for the same equipment and/or services, or the same portion of the equipment and/or services, for which I am seeking funding under the Schools and Libraries Cybersecurity Pilot Program. |
Certifications |
See Item No. 76 above. |
82 |
I certify under penalty of perjury, to the best of my knowledge, that all requested equipment and services funded by the Schools and Libraries Cybersecurity Pilot Program will be used for their intended purposes. |
Certifications |
See Item No. 76 above. |
83 |
Name of Authorized Person |
Signature |
The Authorized Person is required to make all required certifications and provide all required signatures. This is the name of the Authorized Person certifying and submitting the form. |
84 |
Title or Position of Authorized Person |
Signature |
This is the title or position of the Authorized Person certifying and submitting the form. |
85 |
Date Submitted |
Signature |
Auto generated by system. |
86 |
Date Signed |
Signature |
Auto generated by system. |
File Type | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
Author | Catriona Ayer |
File Modified | 0000-00-00 |
File Created | 2025-07-01 |