Skip to main content

Broadband Infrastructure Playbook 3.0: All Modules

 

Since early 2022, NTCA and FBA have collaborated to help state broadband offices and interested stakeholders prepare for funding from the Broadband Equity, Access, and Deployment (BEAD) program in ways that will have meaningful and lasting impacts. As states develop their plans for the distribution of BEAD funding, NTCA and FBA have released a series of Playbook 3.0 modules providing deeper dives into key aspects of what states will need to tackle in their initial proposals. Below you will find all published modules to date.

 

The Rural Broadband Association and the Fiber Broadband Association (FBA) have released the first module from the new “Playbook 3.0,” the latest iteration of the joint “Broadband Infrastructure Playbook.” The first module is dedicated to permitting and will be followed by other modules that will address issues like cybersecurity, supply chain risk management, and broadband coverage challenge processes.
The Rural Broadband Association and the Fiber Broadband Association (FBA) have released the second module from the new “Playbook 3.0,” the latest iteration of the joint “Broadband Infrastructure Playbook.” This module covers “Extremely High Cost Threshold” (EHCT) and how to determine whether to deploy fiber to locations in the hardest-to-reach places. 
The Rural Broadband Association and the Fiber Broadband Association (FBA) have released the third module from the new “Playbook 3.0,” the latest iteration of the joint “Broadband Infrastructure Playbook.” This module covers how to approach improvements to the accuracy of the National Broadband Map through additional challenge processes. 
In this Playbook 3.0 module, we summarize the NOFO’s cybersecurity and supply chain risk management baseline requirements and provide recommendations on how states and territories can work with prospective subgrantees to address these requirements. These include simple steps to provide potential subgrantees with educational materials related to the NIST Cybersecurity Framework as well as recommendations for how to develop a safe and secure process for collecting copies of subgrantee plans since they may likely contain confidential information.