This bill seeks to bolster the security of Federal Government devices by prohibiting the download or use of applications developed or controlled by entities linked to the People's Republic of China. An exception is allowed only if an agency head determines the application is necessary for a research or intelligence function required by law, provided strict cybersecurity safeguards are in place. Agencies must issue guidance within 270 days for any such exceptions, ensuring robust cybersecurity and documented risk mitigation actions. The Office of Management and Budget, in consultation with national security leaders, is tasked with creating and periodically updating a list of these covered applications within 180 days. Once an application is identified on this list, agencies are required to remove it from all Federal devices within 60 days. A covered application includes those developed, owned, or controlled by entities headquartered in China, those with significant Chinese government or Communist Party ownership, or their affiliates. It also covers applications deemed by the Secretary of Defense to pose an undue national security risk due to Chinese influence.
Get AI-generated questions to help you understand this bill better
Timeline
Introduced in House
Referred to the House Committee on Oversight and Government Reform.
Introduced in House
Referred to the House Committee on Oversight and Government Reform.
Government Operations and Politics
Securing Federal Devices from Chinese Applications Act
USA119th CongressHR-7121| House
| Updated: 1/15/2026
This bill seeks to bolster the security of Federal Government devices by prohibiting the download or use of applications developed or controlled by entities linked to the People's Republic of China. An exception is allowed only if an agency head determines the application is necessary for a research or intelligence function required by law, provided strict cybersecurity safeguards are in place. Agencies must issue guidance within 270 days for any such exceptions, ensuring robust cybersecurity and documented risk mitigation actions. The Office of Management and Budget, in consultation with national security leaders, is tasked with creating and periodically updating a list of these covered applications within 180 days. Once an application is identified on this list, agencies are required to remove it from all Federal devices within 60 days. A covered application includes those developed, owned, or controlled by entities headquartered in China, those with significant Chinese government or Communist Party ownership, or their affiliates. It also covers applications deemed by the Secretary of Defense to pose an undue national security risk due to Chinese influence.