PolicyBrief
H.R. 1121
119th CongressFeb 7th 2025
No DeepSeek on Government Devices Act
IN COMMITTEE

Prohibits the use of the DeepSeek application on government devices, with exceptions for law enforcement, national security, and security research under specific conditions.

Josh Gottheimer
D

Josh Gottheimer

Representative

NJ-5

LEGISLATION

DeepSeek Ban Hits Government Devices: New Rules Target Security Risks

The "No DeepSeek on Government Devices Act" is pretty straightforward: it bans the use of the DeepSeek application on any devices used by federal executive agencies. This isn't just about phones – "information technology," as defined in the bill (section 11101 of title 40, United States Code), covers a wide range of gear. The main goal? To boost security by getting rid of software that might pose a risk.

Kicking DeepSeek to the Curb

Within 60 days of this Act becoming law, the Office of Management and Budget (OMB) has to come up with a plan for removing DeepSeek from all government IT. They're not doing this alone; they'll be working with the heads of the Cybersecurity and Infrastructure Security Agency, the Department of Defense, and the Office of the National Cyber Director. This means that agencies will have clear instructions on how to ditch DeepSeek, ensuring that the process is consistent across the board (SEC. 2).

Real-World Rollout

Imagine a federal employee who regularly uses DeepSeek for data analysis. Under this new law, they'd have to switch to a different, approved tool. This could mean anything from adopting new software to changing how data is accessed and processed. For someone in a research-heavy role, this shift could be a hassle at first, requiring training and adjustments to their workflow. On the flip side, IT departments across these agencies will need to update their systems and ensure compliance, which could involve significant time and resources.

Exceptions to the Rule

Now, it's not a total blackout. The law allows exceptions for law enforcement, national security, and security research (SEC. 2). So, if you're an FBI agent using DeepSeek to track down leads, you might still be able to use it. But here's the catch: any agency using DeepSeek under these exceptions needs to document how they're mitigating the risks. This paperwork trail is supposed to keep things transparent and accountable.

The Big Picture: Security vs. Efficiency

This bill is walking a tightrope between security and practicality. On one hand, getting rid of potentially risky software could prevent data breaches and protect sensitive information. On the other hand, forcing agencies to switch tools could slow things down, at least temporarily. Plus, there's the question of whether the "risk mitigation actions" required for exceptions are clearly defined enough to prevent loopholes (SEC. 2). It's a classic trade-off: tighter security often means more rules and potentially less convenience. How this plays out in practice will depend on how strictly these guidelines are enforced and how well agencies adapt to the change.