II 119THCONGRESS 1 STSESSION S. 765 To prohibit the use of DeepSeek by the executive agencies, and for other purposes. IN THE SENATE OF THE UNITED STATES FEBRUARY27, 2025 Ms. R OSEN(for herself, Mr. HUSTED, and Mr. RICKETTS) introduced the fol- lowing bill; which was read twice and referred to the Committee on Homeland Security and Governmental Affairs A BILL To prohibit the use of DeepSeek by the executive agencies, and for other purposes. Be it enacted by the Senate and House of Representa-1 tives of the United States of America in Congress assembled, 2 SECTION 1. SHORT TITLE. 3 This Act may be cited as the ‘‘No DeepSeek on Gov-4 ernment Devices Act’’. 5 SEC. 2. PROHIBITION ON THE USE OF DEEPSEEK. 6 (a) D EFINITIONS.—In this section: 7 (1) C OVERED APPLICATION .—The term ‘‘cov-8 ered application’’ means the DeepSeek application or 9 any successor application or service developed or 10 VerDate Sep 11 2014 04:43 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00001 Fmt 6652 Sfmt 6201 E:\BILLS\S765.IS S765 kjohnson on DSK7ZCZBW3PROD with $$_JOB 2 •S 765 IS provided by High Flyer or an entity owned by High 1 Flyer. 2 (2) E XECUTIVE AGENCY.—The term ‘‘executive 3 agency’’ has the meaning given that term in section 4 133 of title 41, United States Code. 5 (3) I NFORMATION TECHNOLOGY .—The term 6 ‘‘information technology’’ has the meaning given 7 that term in section 11101 of title 40, United States 8 Code. 9 (b) P ROHIBITION ON THEUSE OFDEEPSEEK.— 10 (1) I N GENERAL.—Not later than 60 days after 11 the date of enactment of this Act, the Director of 12 the Office of Management and Budget, in consulta-13 tion with the Administrator of General Services, the 14 Director of the Cybersecurity and Infrastructure Se-15 curity Agency, the Director of National Intelligence, 16 and the Secretary of Defense, and consistent with 17 the information security requirements under sub-18 chapter II of chapter 35 of title 44, United States 19 Code, shall develop standards and guidelines for ex-20 ecutive agencies that require the removal of any cov-21 ered application from information technology. 22 (2) N ATIONAL SECURITY AND RESEARCH EX -23 CEPTIONS.—The standards and guidelines developed 24 under paragraph (1) shall include— 25 VerDate Sep 11 2014 04:43 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00002 Fmt 6652 Sfmt 6201 E:\BILLS\S765.IS S765 kjohnson on DSK7ZCZBW3PROD with $$_JOB 3 •S 765 IS (A) exceptions for law enforcement activi-1 ties, national security interests and activities, 2 and security researchers; and 3 (B) for any authorized use of a covered ap-4 plication under an exception, requirements for 5 executive agencies to develop and document risk 6 mitigation actions for such use. 7 Æ VerDate Sep 11 2014 04:43 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00003 Fmt 6652 Sfmt 6301 E:\BILLS\S765.IS S765 kjohnson on DSK7ZCZBW3PROD with $$_JOB