This legislation, known as the "No DeepSeek on Government Devices Act," aims to prohibit executive agencies from utilizing the DeepSeek application or any successor applications developed by High Flyer. It defines "covered application" to include DeepSeek and any future related services from the same developer. Within 60 days of enactment, the Director of the Office of Management and Budget, in collaboration with agencies like the General Services Administration and the Cybersecurity and Infrastructure Security Agency, must establish standards and guidelines. These guidelines will mandate the removal of any covered application from all executive agency information technology systems. However, the bill provides specific exceptions for law enforcement activities , national security interests , and security researchers , while requiring agencies to document risk mitigation strategies for any authorized use under these exceptions.
Computers and information technologyComputer security and identity theftExecutive agency funding and structureInternet, web applications, social media
No DeepSeek on Government Devices Act
USA119th CongressHR-1121| House
| Updated: 2/7/2025
This legislation, known as the "No DeepSeek on Government Devices Act," aims to prohibit executive agencies from utilizing the DeepSeek application or any successor applications developed by High Flyer. It defines "covered application" to include DeepSeek and any future related services from the same developer. Within 60 days of enactment, the Director of the Office of Management and Budget, in collaboration with agencies like the General Services Administration and the Cybersecurity and Infrastructure Security Agency, must establish standards and guidelines. These guidelines will mandate the removal of any covered application from all executive agency information technology systems. However, the bill provides specific exceptions for law enforcement activities , national security interests , and security researchers , while requiring agencies to document risk mitigation strategies for any authorized use under these exceptions.