Funding Models


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Funding Models

  1. 1. Funding Models Steve Updegrove Tammy Closs Net @Edu ICS Feb 6, 2005
  2. 2. AGENDA <ul><li>The objective of this segment is to review and discuss financial, operational, regulatory, and legislative aspects associated with convergence of services. </li></ul><ul><li>  </li></ul><ul><li>Financial </li></ul><ul><ul><li>Brief recap of prior related Net@Edu presentataions/discussions </li></ul></ul><ul><ul><li>Comparisons </li></ul></ul><ul><ul><li>Convergence Impacts </li></ul></ul><ul><ul><li>Trends (if any) </li></ul></ul><ul><li>  </li></ul><ul><li>Operational </li></ul><ul><ul><li>Division of responsibility </li></ul></ul><ul><ul><li>Organizational structure </li></ul></ul><ul><ul><li>Skills integration </li></ul></ul><ul><li>  </li></ul><ul><li>Regulatory/Legislative </li></ul><ul><ul><li>IT budget and operational impact </li></ul></ul><ul><ul><li>IT related highlights </li></ul></ul><ul><ul><li>Non-IT related highlights </li></ul></ul>
  3. 3. Some history <ul><li>Net@Edu ICS (VoIP) review with Georgetown in 2001 </li></ul><ul><li>Net@Edu ICS (VoIP) review with Northwestern, Cornell, Berkeley in 2002 </li></ul><ul><li>Net@Edu ICS (VoIP) review with Penn State 2003 </li></ul><ul><li>Benchmarking focus meetings </li></ul><ul><li>CIC Networking, etc. groups </li></ul>
  4. 4. Differences <ul><li>Institutional funding sources </li></ul><ul><li>Relationship with state government </li></ul><ul><li>Internal budgeting philosophies (eg, LCF) </li></ul><ul><li>Cost allocation philosophies (eg, subsidy) </li></ul><ul><li>Cost recovery philosophies </li></ul><ul><li>Technology and other designated fee use </li></ul><ul><li>Use of incentives </li></ul>
  5. 5. Common threads <ul><li>No one-size-fits-all solutions </li></ul><ul><li>Monthly/flat fee approaches are popular </li></ul><ul><li>Usage-based solutions fair, but overhead and have-not impacts may result </li></ul><ul><li>Technology fees play key role </li></ul><ul><li>Subsidy from LD is mostly history </li></ul><ul><li>Service refresh/replace plan is important </li></ul><ul><li>CALEA, regulatory impacts of concern </li></ul>
  6. 6. Convergence impacts <ul><li>Entwined technology/architecture issues </li></ul><ul><li>Need to orchestrate among broader groups of personnel and services </li></ul><ul><li>More detailed cost management and plans </li></ul><ul><li>Maintain ability to audit accurately </li></ul><ul><li>Organizational integration </li></ul>
  7. 7. Trends <ul><li>Less subsidization across services </li></ul><ul><li>More reliance on technology, etc. fees </li></ul><ul><li>Increased complexity/interrelated budgets </li></ul>
  8. 8. Operational Aspects <ul><li>Organizational structure </li></ul><ul><li>Accountability for budget items </li></ul><ul><li>Coordination/dependencies </li></ul><ul><li>Schedule integration </li></ul><ul><li>Surveys/feedback </li></ul>
  9. 9. Structure <ul><li>Vestiges of voice vs data vs video </li></ul><ul><li>“ Deputy” CIO positions emerging </li></ul><ul><li>Functional/responsibility realignments </li></ul><ul><li>Fixed term vs part time vs full time staff </li></ul><ul><li>Professional development/categorization </li></ul>
  10. 10. Skills integration <ul><li>Cross-training </li></ul><ul><li>Broadbanding </li></ul><ul><li>Criteria for performance reviews </li></ul><ul><li>Successor strategies </li></ul>
  11. 11. Regulatory/Legislative IT Budget and Operational Impact <ul><li>In CIO Magazine, Jon Surmacz reports that, “Companies will spend billions in 2004 to comply with industry rules, self-imposed policies, and laws enacted by federal and state governments. In today’s regulatory climate, compliance spending has become another cost of doing business.” These increased cost may include: </li></ul><ul><li>Personnel in the form of network security, legal, policy and procedure development, compliance monitoring/reporting and others that may put more demand on existing employees or require hiring of additional. </li></ul><ul><li>Training </li></ul><ul><li>Network services including fees and surcharges </li></ul><ul><li>Authentication/authorization </li></ul><ul><li>Hardware/software to provide redundant/reliable service levels </li></ul><ul><li>Storage/retrieval systems </li></ul><ul><li>Accessibility equipment/software </li></ul>
  12. 12. Regulatory/Legislative IT Related Highlights <ul><li>Universal Service </li></ul><ul><li>E911 </li></ul><ul><li>Access for the disabled </li></ul><ul><li>Intercarrier Compensation </li></ul><ul><li>ITFS </li></ul><ul><li>Access to Wireless Networks & Devices </li></ul><ul><li>Do Not Call/Fax/Spam </li></ul><ul><li>P2P File Sharing </li></ul><ul><li>Broadband over Power Lines </li></ul><ul><li>NPRM for IP enabled services </li></ul><ul><li>Rewrite of the 1996 Telecommunications Act </li></ul>
  13. 13. IT Related <ul><li>Universal Service: The federal Universal Service fund provides subsidies for telecommunications services in K-12 schools and public libraries, rural health facilities, and in high cost areas such as rural areas. Telecom carriers contribute directly to the fund according to a percentage of their interstate and international long distance revenue which is set quarterly by the FCC. Universities contribute to the fund indirectly, through charges that carriers are permitted by FCC regulations to pass through to their customers. </li></ul><ul><ul><li>Eligible Services: The FCC is currently considering whether the list of services eligible for subsidies should be expanded to include high speed Internet access and other advanced technologies. If enacted this change would be likely to increase the cost of the universal service program. However, subsidization of high speed access could be beneficial to students in rural areas and could facilitate distance learning opportunities. </li></ul></ul><ul><ul><li>Contribution methodology: The FCC is currently considering alternative methods of calculating the carrier contributions to the fund, because dwindling long distance revenue will cause problems for the fund down the line. This issue is expected to heat up within the next 3-6 months, although it could also be addressed in a re-write of the Telecom Act of 1996 currently under discussion in Congress. </li></ul></ul>
  14. 14. IT Related, continued <ul><li>E-911: Currently owners of multi-line telephone systems (MLTS) are not required by federal law to comply with E911, although a few states have such requirements. The FCC is currently considering whether E911 requirements should be expanded to MLTS. </li></ul><ul><ul><li>E911 is also linked to Voice over IP, and poses unique challenges because phone calls made using laptop computers are inherently The VoIP industry is working on standards to resolve these issues. The FCC’s NPRM on IP-enabled services also requested comments on the need for mandatory E911 compliance for VoIP services. </li></ul></ul><ul><ul><li>For universities, a pressing issue is E911 for cell phone users. Many students use their cell phones on campus. The cellular industry is currently under an FCC mandate to phase in E911 service, so that students calling 911 from their cell phone somewhere on campus can be located. That system is far from being perfected, but the industry is currently working toward compliance. </li></ul></ul>
  15. 15. IT Related, continued <ul><li>Access for the disabled: Colleges and universities are required to comply with the Americans with Disabilities Act, providing reasonable accommodations for the communications needs of disabled faculty, staff and students. This includes many requirements for physical accessibility of telephone equipment and the provision of assistive services when required. All new telephone equipment that is purchased must be hearing aid compatible. Recent developments include FCC approval of Internet based telecommunications relay services for the hard of hearing, and even video relay service. </li></ul><ul><li>Intercarrier compensation: This relates to access charges that carriers charge for completion of calls on their local facilities. The impact on universities is both direct and indirect. FCC rules prescribe certain line charges that appear on the institution’s phone bill, which for large institutions amount to thousands of dollars per month. In addition, when carrier costs go up, they pass these costs on to consumers. </li></ul><ul><li>ITFS: ITFS spectrum was originally used by educational and non-profit licensees for Instructional Television Fixed Service . Now it may be used for two-way broadband data transmission. As such, the spectrum has become more valuable. ACUTA has been part of a higher education coalition seeking to preserve the spectrum for educational purposes. Under the current law, institutions may lease out their excess spectrum. In June 2004, the FCC amended the ITFS/MDS band plan and rules to encourage the development of wireless broadband services. This decision is considered a “win” for ITFS. The FCC decided that the educational eligibility requirements for ITFS would remain in place. Commercial entities may lease ITFS spectrum, but they cannot buy it. </li></ul>
  16. 16. IT Related, continued <ul><li>Access to Wireless Networks and Devices: The issue is tenants’ rights to place over-the-air reception devices (OTARDs) for licensed and unlicensed devices on their leased premises. Such devices include Wi-Fi access points, television antennas, satellite dishes, and similar devices. OTARD rules allow tenants to install such devices in areas subject to their exclusive use and control. However, the FCC’s Order exempts campus dormitory housing from this requirement because it is not a typical residential lease. Typical leases, such as apartments or homes, would be subject to the rules. </li></ul><ul><li>Do Not Call, Do Not Fax and anti-Spam Laws and Regulations : </li></ul><ul><ul><li>The Federal Trade Commission and Federal Communications Commission have enacted rules to implement controls on telemarketing, including the national Do Not Call registry. The FTC did include student numbers, with a provision that numbers must be added by the individual user, not by the university on their behalf. </li></ul></ul><ul><ul><li>The FCC has also enacted rules to implement the Junk Fax Prevention Act. Those rules are potentially problematic, because they prohibit sending a fax advertising products or services to anyone without advance written permission. That portion of the rules is currently on hold, but will go into effect in June. ACUTA is part of a coalition of nonprofit organizations seeking an exemption for individuals with whom the institution has a pre-existing business relationship. </li></ul></ul><ul><ul><li>The FTC had also adopted rules to implement the CAN SPAM act. Those rules apply to colleges and universities, and will require the development of policies and procedures throughout the institution to ensure compliance. </li></ul></ul>
  17. 17. IT Related, continued <ul><li>P2P File Sharing: The higher education community continues to work to address illegal file sharing on campus. Policies have been adopted and are being enforced. Technological solutions such as bandwidth monitoring and control are being utilized on some campuses. On 3/23/04, the RIAA filed suit against 532 individuals for illegal file sharing, including 89 individuals on 21 different university networks. Names of the universities were also released. On 12/16/04, the RIAA announced an additional 754 lawsuits, individual end-users of university computer networks at six schools were among the targeted parties. </li></ul><ul><li>Broadband over Power Lines: In October 2004 the FCC adopted rules governing access to broadband services over power lines (BPL). The rules are designed to promote the development of BPL systems by removing regulatory uncertainties for BPL operators and equipment manufacturers while ensuring that licensed radio services are protected from harmful interference. Various companies are implementing trials of this new technology. </li></ul>
  18. 18. IT Related, continued <ul><li>NPRM for IP enabled services: The FCC has initiated a rulemaking regarding the regulatory treatment of VoIP and other IP-enabled services. The NPRM incorporates questions as to what regulation is appropriate, classification of services, 911 and E911, disabilities issues, and numerous other issues. ACUTA’s comments stated that the class of IP-enabled services that do not involve the PSTN and do not replace traditional telephone service should be declared unregulated interstate information services. </li></ul><ul><li>The FCC also granted’s petition for a ruling that its Free World Dialup offering is not a telecommunications service.  The FCC found that state regulation of the service would likely be preempted because the service is an interstate information service.  The Free World Dialup service allows broadband customers to contact other customers, but does not provide access to the PSTN. The FCC also granted a 2003 Vonage Petition. The Commission concluded that Vonage’s service is an interstate service subject to only federal jurisdiction. </li></ul><ul><li>Rewrite of the 1996 Telecommunications Act: The 1996 Act was designed to promote competition and established a new regulatory scheme for the telecom industry, allowing local exchange carriers to apply for approval to provide interstate long distance service inside their service areas. It also created the opportunity for competitive local exchange carriers (CLECs) and established the current universal service system among other reforms. Congress is expected to consider major amendments to this law in the next session that may address new and emerging technologies, address the concerns of rural carriers, reform the intercarrier compensation and universal service structures, and enact other reforms. </li></ul>
  19. 19. Regulatory/Legislative Non IT Related Highlights <ul><li>CALEA </li></ul><ul><li>Gramm-Leach-Bliley Act </li></ul><ul><li>Family Educational Rights to Privacy Act </li></ul><ul><li>Health Insurance Portability and Accountability </li></ul><ul><li>Digital Millennium Copyright Act </li></ul><ul><li>Sarbanes-Oxley </li></ul><ul><li>Internet Tax Moratorium </li></ul>
  20. 20. Non IT Related <ul><li>CALEA: The FCC has initiated a rulemaking addressing the appropriate level of law enforcement access to broadband and VoIP-based networks. The FCC issued a NPRM in August 2004 that tentatively concludes that broadband and “managed” VoIP services should be subject to CALEA obligations. A coalition of education-based organizations has filed comments with the FCC. This coalition continues to negotiate a potential CALEA exemption for higher education institutions with the DOJ. </li></ul><ul><li>Gramm-Leach-Bliley Act: The F inancial Services Modernization Act (Gramm Leach Bliley Act) regulates the sharing of personal information about individuals who obtain financial products or services from financial institutions. Educational institutions fall within the definition of financial institutions under this law. The GLB Act requires financial institutions to take steps to ensure the security and confidentiality of customer records such as names, addresses, phone numbers, bank and credit card account numbers, income and credit histories, and Social Security numbers. Due to the efforts of higher education organizations including NACUBO, the FTC adopted regulations that deem colleges and universities to be in compliance with the privacy provisions of the GLB Act if they are in compliance with the Family Educational Rights and Privacy Act (FERPA). However, higher education institutions are subject to the provisions of the Act related to the administrative, technical, and physical safeguarding of customer information. </li></ul>
  21. 21. Non IT Related, continued <ul><li>Family Educational Rights and Privacy Act: FERPA is a Federal law that protects the privacy of student education records. The law applies to all institutions that receive funds from the U.S. Department of Education. The Act provides students the right to inspect and review education records, the right to seek to amend those records, and to limit disclosure of information from the records. The same principles of confidentiality must be applied to electronic data as apply to paper documents. Institutional compliance requires the establishment of institution-wide policies, staff training, and policy enforcement. </li></ul><ul><li>Health Insurance Portability and Accountability: “HIPAA” is the federal “Health Insurance Portability and Accountability Act of 1996.” HIPAA and its regulations require healthcare providers to take certain measures to protect patient information from unauthorized use or disclosure. HIPAA imposes mandatory obligations on physicians, hospitals, and other healthcare providers, including those in university owned and/or operated facilities. Computer hardware and software must be capable of sending and receiving transactions in the standard HIPAA format. Policies and procedures to safeguard the confidentiality of records must be established and enforced, and ongoing staff training must be conducted. </li></ul><ul><li>Digital Millennium Copyright Act: The DMCA establishes responsibilities of universities as online service providers with respect to copyrighted materials, and provides some exemption from liability for service providers who comply with the requirements. In order to qualify for the exemptions provided in the DMCA, the institution must establish internal mechanisms for compliance and monitor these activities. Congress is expected to address proposals to reform the DMCA in 2005. </li></ul>
  22. 22. Non IT Related, continued <ul><li>Sarbanes-Oxley: The American Competitiveness and Corporate Accountability Act of 2002, also known as the Sarbanes-Oxley Act, is primarily applicable to publicly traded companies that are regulated by the Securities and Exchange Commission (SEC). Two provisions apply to non-profits at this time: 1) having a formal records retention policy and 2) having a mechanism for confidential reporting of violations of law by the organization that ensures non-retaliation against whistle-blowing. In addition to compliance with these requirements, institutions and should monitor new developments at the state and federal levels that may impose new corporate accountability requirements. </li></ul><ul><li>Internet Tax Moratorium: In Dec. 2004, President Bush signed into law a 3-year moratorium on Internet access taxes. The law extends a ban on Internet taxes that expired on Nov.1, 2003. The original version of the Internet Tax Nondiscrimination Act would have permanently extended a five-year congressional moratorium on taxes unique to the Internet, including taxes access and bandwidth. But the bill was held up in the Senate over concerns that it would allow telecommunications carriers to avoid taxes on traditional telephone service as they move traffic to voice over Internet Protocol services. A compromise version crafted in the Senate and approved by the House will allow states and cities to continue to collect taxes on telephone services, even if the calls are made over the Internet. The compromise version of the bill also allows states already collecting taxes on Internet access to continue that for up to four years. </li></ul>