recommended reading

FCC likely to take up incentive auction plan next month

Pavel Ignatov/Shutterstock.com

The Federal Communications Commission is likely to take up a proposal at its Sept. 28 open meeting outlining rules for a new set of auctions aimed at enticing broadcasters to give up some of their spectrum for use by wireless carriers.

The FCC appears set to vote on a proposed rulemaking implementing the "incentive auctions" authorized by Congress in legislation signed into law earlier this year. An FCC spokesman would not confirm whether the incentive auction item will be on the agenda for September's meeting, but several industry sources said they expect the commission will take up the issue at the meeting.

The auctions would allow TV broadcasters a chance to offer bids on how much they would take to give up their spectrum and get out of the business or to share a channel with another broadcaster. The FCC adopted rules in April that would allow broadcasters to share channels.

Wireless carriers and other technology industry officials pushed Congress to pass legislation in February as part of a payroll-tax-cut package to authorize incentive auctions as a way to free up more spectrum for mobile broadband. But it remains to be seen how much spectrum the proposal will actually generate. While FCC officials say they have heard from interested broadcasters, industry representatives have countered that few station owners have indicated that they are likely to participate.

The National Association of Broadcasters pushed for protections in the incentive auction legislation to ensure those who remain in the business will not be harmed by the process of clearing swaths of spectrum that can be auctioned off to wireless carriers.

"NAB continues to support truly voluntary spectrum incentive auctions. Truly voluntary auctions will ensure that viewers retain access to the local news, emergency information and quality programming on which they rely, and will also safeguard viewers' ability to take advantage of broadcast innovations on the horizon," the group said in on its website.

NAB has called on the FCC to ensure the rules implementing the incentive auction legislation are "transparent," will ensure that broadcasters who do not participate can retain their service areas, and will give broadcasters "ample time" to consider whether to participate in the process.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.