I 119THCONGRESS 1 STSESSION H. R. 1121 To prohibit the use of DeepSeek by the executive agencies, and for other purposes. IN THE HOUSE OF REPRESENTATIVES FEBRUARY7, 2025 Mr. G OTTHEIMER (for himself, Mr. LAHOOD, Mr. MOOLENAAR, Mr. K RISHNAMOORTHI, Ms. STEVENS, Mr. VINDMAN, Mr. FITZPATRICK, Mr. D ELUZIO, Ms. TENNEY, Mr. MOSKOWITZ, Mr. MOULTON, Mrs. C HERFILUS-MCCORMICK, Mr. DAVISof North Carolina, Mr. LALOTA, Mr. L ANDSMAN, Ms. WASSERMANSCHULTZ, Mr. MOOREof Utah, and Mr. T ORRESof New York) introduced the following bill; which was re- ferred to the Committee on Oversight and Government Reform A BILL To prohibit the use of DeepSeek by the executive agencies, and for other purposes. Be it enacted by the Senate and House of Representa-1 tives of the United States of America in Congress assembled, 2 SECTION 1. SHORT TITLE. 3 This Act may be cited as the ‘‘No DeepSeek on Gov-4 ernment Devices Act’’. 5 SEC. 2. PROHIBITION ON THE USE OF DEEPSEEK. 6 (a) D EFINITIONS.—In this section: 7 VerDate Sep 11 2014 06:26 Mar 07, 2025 Jkt 059200 PO 00000 Frm 00001 Fmt 6652 Sfmt 6201 E:\BILLS\H1121.IH H1121 kjohnson on DSK7ZCZBW3PROD with $$_JOB 2 •HR 1121 IH (1) COVERED APPLICATION .—The term ‘‘cov-1 ered application’’ means the DeepSeek application or 2 any successor application or service developed or 3 provided by High Flyer or an entity owned by High 4 Flyer. 5 (2) E XECUTIVE AGENCY.—The term ‘‘executive 6 agency’’ has the meaning given that term in section 7 133 of title 41, United States Code. 8 (3) I NFORMATION TECHNOLOGY .—The term 9 ‘‘information technology’’ has the meaning given 10 that term in section 11101 of title 40, United States 11 Code. 12 (b) P ROHIBITION ON THEUSE OFDEEPSEEK.— 13 (1) I N GENERAL.—Not later than 60 days after 14 the date of the enactment of this Act, the Director 15 of the Office of Management and Budget, in con-16 sultation with the Administrator of General Services, 17 the Director of the Cybersecurity and Infrastructure 18 Security Agency, the Director of National Intel-19 ligence, and the Secretary of Defense, and consistent 20 with the information security requirements under 21 subchapter II of chapter 35 of title 44, United 22 States Code, shall develop standards and guidelines 23 for executive agencies that require the removal of 24 any covered application from information technology. 25 VerDate Sep 11 2014 06:26 Mar 07, 2025 Jkt 059200 PO 00000 Frm 00002 Fmt 6652 Sfmt 6201 E:\BILLS\H1121.IH H1121 kjohnson on DSK7ZCZBW3PROD with $$_JOB 3 •HR 1121 IH (2) NATIONAL SECURITY AND RESEARCH EX -1 CEPTIONS.—The standards and guidelines developed 2 under paragraph (1) shall include— 3 (A) exceptions for law enforcement activi-4 ties, national security interests and activities, 5 and security researchers; and 6 (B) for any authorized use of a covered ap-7 plication under an exception, requirements for 8 agencies to develop and document risk mitiga-9 tion actions for such use. 10 Æ VerDate Sep 11 2014 06:26 Mar 07, 2025 Jkt 059200 PO 00000 Frm 00003 Fmt 6652 Sfmt 6301 E:\BILLS\H1121.IH H1121 kjohnson on DSK7ZCZBW3PROD with $$_JOB