[Congressional Bills 119th Congress]
[From the U.S. Government Publishing Office]
[H.R. 1121 Introduced in House (IH)]
<DOC>
119th CONGRESS
1st Session
H. R. 1121
To prohibit the use of DeepSeek by the executive agencies, and for
other purposes.
_______________________________________________________________________
IN THE HOUSE OF REPRESENTATIVES
February 7, 2025
Mr. Gottheimer (for himself, Mr. LaHood, Mr. Moolenaar, Mr.
Krishnamoorthi, Ms. Stevens, Mr. Vindman, Mr. Fitzpatrick, Mr. Deluzio,
Ms. Tenney, Mr. Moskowitz, Mr. Moulton, Mrs. Cherfilus-McCormick, Mr.
Davis of North Carolina, Mr. LaLota, Mr. Landsman, Ms. Wasserman
Schultz, Mr. Moore of Utah, and Mr. Torres of New York) introduced the
following bill; which was referred to the Committee on Oversight and
Government Reform
_______________________________________________________________________
A BILL
To prohibit the use of DeepSeek by the executive agencies, and for
other purposes.
Be it enacted by the Senate and House of Representatives of the
United States of America in Congress assembled,
SECTION 1. SHORT TITLE.
This Act may be cited as the ``No DeepSeek on Government Devices
Act''.
SEC. 2. PROHIBITION ON THE USE OF DEEPSEEK.
(a) Definitions.--In this section:
(1) Covered application.--The term ``covered application''
means the DeepSeek application or any successor application or
service developed or provided by High Flyer or an entity owned
by High Flyer.
(2) Executive agency.--The term ``executive agency'' has
the meaning given that term in section 133 of title 41, United
States Code.
(3) Information technology.--The term ``information
technology'' has the meaning given that term in section 11101
of title 40, United States Code.
(b) Prohibition on the Use of DeepSeek.--
(1) In general.--Not later than 60 days after the date of
the enactment of this Act, the Director of the Office of
Management and Budget, in consultation with the Administrator
of General Services, the Director of the Cybersecurity and
Infrastructure Security Agency, the Director of National
Intelligence, and the Secretary of Defense, and consistent with
the information security requirements under subchapter II of
chapter 35 of title 44, United States Code, shall develop
standards and guidelines for executive agencies that require
the removal of any covered application from information
technology.
(2) National security and research exceptions.--The
standards and guidelines developed under paragraph (1) shall
include--
(A) exceptions for law enforcement activities,
national security interests and activities, and
security researchers; and
(B) for any authorized use of a covered application
under an exception, requirements for agencies to
develop and document risk mitigation actions for such
use.
<all>