Prohibits the use of the DeepSeek application on government devices, with exceptions for law enforcement, national security, and security research under specific conditions.
Josh Gottheimer
Representative
NJ-5
The "No DeepSeek on Government Devices Act" prohibits the use of the DeepSeek application on government devices, with exceptions for law enforcement, national security, and security research. The Office of Management and Budget is tasked with creating guidelines for executive agencies to remove DeepSeek from their information technology. Any authorized use of DeepSeek under the exceptions requires documented risk mitigation actions.
The "No DeepSeek on Government Devices Act" is pretty straightforward: it bans the use of the DeepSeek application on any devices used by federal executive agencies. This isn't just about phones – "information technology," as defined in the bill (section 11101 of title 40, United States Code), covers a wide range of gear. The main goal? To boost security by getting rid of software that might pose a risk.
Within 60 days of this Act becoming law, the Office of Management and Budget (OMB) has to come up with a plan for removing DeepSeek from all government IT. They're not doing this alone; they'll be working with the heads of the Cybersecurity and Infrastructure Security Agency, the Department of Defense, and the Office of the National Cyber Director. This means that agencies will have clear instructions on how to ditch DeepSeek, ensuring that the process is consistent across the board (SEC. 2).
Imagine a federal employee who regularly uses DeepSeek for data analysis. Under this new law, they'd have to switch to a different, approved tool. This could mean anything from adopting new software to changing how data is accessed and processed. For someone in a research-heavy role, this shift could be a hassle at first, requiring training and adjustments to their workflow. On the flip side, IT departments across these agencies will need to update their systems and ensure compliance, which could involve significant time and resources.
Now, it's not a total blackout. The law allows exceptions for law enforcement, national security, and security research (SEC. 2). So, if you're an FBI agent using DeepSeek to track down leads, you might still be able to use it. But here's the catch: any agency using DeepSeek under these exceptions needs to document how they're mitigating the risks. This paperwork trail is supposed to keep things transparent and accountable.
This bill is walking a tightrope between security and practicality. On one hand, getting rid of potentially risky software could prevent data breaches and protect sensitive information. On the other hand, forcing agencies to switch tools could slow things down, at least temporarily. Plus, there's the question of whether the "risk mitigation actions" required for exceptions are clearly defined enough to prevent loopholes (SEC. 2). It's a classic trade-off: tighter security often means more rules and potentially less convenience. How this plays out in practice will depend on how strictly these guidelines are enforced and how well agencies adapt to the change.