[Congressional Bills 119th Congress]
[From the U.S. Government Publishing Office]
[S. 765 Introduced in Senate (IS)]
<DOC>
119th CONGRESS
1st Session
S. 765
To prohibit the use of DeepSeek by the executive agencies, and for
other purposes.
_______________________________________________________________________
IN THE SENATE OF THE UNITED STATES
February 27, 2025
Ms. Rosen (for herself, Mr. Husted, and Mr. Ricketts) introduced the
following bill; which was read twice and referred to the Committee on
Homeland Security and Governmental Affairs
_______________________________________________________________________
A BILL
To prohibit the use of DeepSeek by the executive agencies, and for
other purposes.
Be it enacted by the Senate and House of Representatives of the
United States of America in Congress assembled,
SECTION 1. SHORT TITLE.
This Act may be cited as the ``No DeepSeek on Government Devices
Act''.
SEC. 2. PROHIBITION ON THE USE OF DEEPSEEK.
(a) Definitions.--In this section:
(1) Covered application.--The term ``covered application''
means the DeepSeek application or any successor application or
service developed or provided by High Flyer or an entity owned
by High Flyer.
(2) Executive agency.--The term ``executive agency'' has
the meaning given that term in section 133 of title 41, United
States Code.
(3) Information technology.--The term ``information
technology'' has the meaning given that term in section 11101
of title 40, United States Code.
(b) Prohibition on the Use of DeepSeek.--
(1) In general.--Not later than 60 days after the date of
enactment of this Act, the Director of the Office of Management
and Budget, in consultation with the Administrator of General
Services, the Director of the Cybersecurity and Infrastructure
Security Agency, the Director of National Intelligence, and the
Secretary of Defense, and consistent with the information
security requirements under subchapter II of chapter 35 of
title 44, United States Code, shall develop standards and
guidelines for executive agencies that require the removal of
any covered application from information technology.
(2) National security and research exceptions.--The
standards and guidelines developed under paragraph (1) shall
include--
(A) exceptions for law enforcement activities,
national security interests and activities, and
security researchers; and
(B) for any authorized use of a covered application
under an exception, requirements for executive agencies
to develop and document risk mitigation actions for
such use.
<all>