T-LEAP FAQs

The following FAQs are specific to T-LEAP. To review all FAQs, please visit the Tribal Applicants FAQ page.

A1: T-LEAP is a program that assists Tribal libraries and Tribal College and University libraries apply for the E-Rate program. T-LEAP matches participating libraries with their own Tribal Library Advocate (TLA) who provides one-on-one assistance when preparing the entity’s E-Rate application, applying to the program, invoicing, and performing other post-commitment processes.

A2:T-LEAP is a program to assist eligible Tribal and TCU libraries apply for and participate in the E-Rate program. E-Rate provides funding towards eligible services for schools and libraries, including internet access, telecommunications services, related equipment, and more. To find out what is eligible under the E-Rate program, please review the Eligible Services List.

A3: The E-Rate program provides discounts of up to 90 percent for eligible internet access, data transmission services, and internal connections (e.g., Wi-Fi equipment, cabling, and basic maintenance services), potentially saving your Tribal or TCU library a significant amount of money.

A4: Participating in T-LEAP does not mean that you will receive E-Rate funding; you must still apply to the E-Rate program and comply with all program rules.

A5: No. While the program has a cap, the E-Rate program has been able to fund all eligible requests since Funding Year (FY) 2015.

A6: The Children’s Internet Protection Act (CIPA) requires that schools and libraries enforce certain safety measures preventing minors from accessing obscene content on the internet. Applicants must certify compliance with CIPA to be eligible for E-Rate program discounts on internet access and related equipment. Visit the Eligible Services Overview page and the CIPA page for more information.

A7: School and library authorities must certify that: (1) they have complied with the requirements of CIPA; (2) they are undertaking actions, including any necessary procurement procedures, to comply with the requirements of CIPA; or (3) CIPA does not apply because they are receiving discounts for telecommunications services only.

CIPA requirements include the following three items:

  • Internet safety policy – Schools and libraries must adopt and enforce an internet safety policy that includes a technology protection measure that protects against access to visual depictions that are obscene and child pornography. In addition to those two constraints, if a minor is using the internet, the internet safety policy also shields against content that is harmful to minors.
  • Technology protection measure – You must specifically block or filter internet access. The school or library must enforce the operation of the technology protection measure during the use of its computers with Internet access, although an administrator, supervisor, or other person authorized by the authority with responsibility for administration of the school or library may disable the technology protection measure during use by an adult to enable access for bona fide research or other lawful purpose.
  • Public notice and hearing or meeting – The authority with responsibility for administration of the school or library must provide reasonable public notice and hold at least one public hearing or meeting to address a proposed technology protection measure and Internet safety policy.

The details of the policy and these measures are determined at the local level by your community and not by the E-Rate program. Additionally, costs associated with technology to implement these protection measures are not eligible for reimbursement through the E-Rate program.

You may find more details on these CIPA requirements by viewing Starting Services of the E-Rate Applicant Process.

A8: USAC will not request specific documentation demonstrating CIPA compliance as part of the FCC Form 486 process, but the library must maintain this documentation in its files for audit and other review purposes.

Below are some examples of documentation retention that could demonstrate that a library is in compliance with the requirements of CIPA:

  • To show proof of an internet safety policy, keep a copy of the policy, along with any updates and records showing that the policy was adopted or approved. Records could include approval in the minutes of the required hearing or meeting or documented adoption by the library board.
  • As documentation of your technology protection measure, your library can keep a description of the filter and a report showing that the filter was in place-and-operational during the relevant funding year. For example, if you purchased filtered internet access, archive the bills or regular reports from the service provider to demonstrate that the filter is in place and working. If you installed your own filter, you can archive logs from your system that show the hours the filter was engaged for or provide a report showing the sites blocked.
  • Documentation that your library gave public notice and held a public hearing or meeting on the policy could include a copy of a website announcement for a library board meeting open to the public where the policy was discussed, an advertisement in a local newspaper of a county government hearing or meeting where the policy appeared as an agenda item, or a copy of the minutes of the hearing or meeting and the date on which the hearing or meeting occurred.

Additionally, libraries do not need to have completed all these steps to comply with CIPA in the first funding year. Instead, the library can certify that they are working towards compliance with these requirements, but they must be fully compliant starting in the second funding year. For more information, see the Documentation for Undertaking Actions section of the CIPA page.

A9: No. TCU libraries are the only libraries that are not required to have a budget that is completely separate from any schools. However, E-Rate funding can only be used to provide services within the library for eligible purposes. Any ineligible usage must be cost-allocated (removed from the funding request).