Securing the Information and Communications Technology Supply Chain (Executive Order 13873)

Policy Details

Policy Details

Last Action
Published in the Federal Register
Date of Last Action
May 17 2019
Date Introduced
May 17 2019
Publication Date
May 17 2019
Date Made Public
May 17 2019

SciPol Summary

This Executive Order restricts the acquisition and use of critical information and communication technologies (e.g., 5G spectrum devices) developed, installed, and/or purchased by a foreign power. Via the authority of the International Emergency Economic Powers and National Emergency Acts, the President issued this order to mitigate the economic and security risks posed by compromised communications technologies, operations, or data flow. 

The designation of restricted communication technologies is to be determined by the Department of Commerce (DOC) and with the consultation of the Departments of Treasury, State, Defense, Justice, Homeland Security, the United States Trade Representative, the Office of the Director of National Intelligence, the General Services Administration, and the Federal Communications Commission.

Pursuant to the provisions of this order, the DOC is also authorized to terminate any current contracts or agreements between Federal agencies and designated communications technology providers. Further, within 150 days of this order the DOC, with the assistance of the other agencies listed above will establish and publish regulations regarding how the Department is to specifically enforce these authorizations.

Following the implementation of this order and establishment of regulations, the DOC, with the Department of State, is publish reports to Congress on the state of and actions taken under this national emergency. In addition to the DOC's reports, the Office of the Director of National Intelligence is required to continually assess threats posed by communication technology manufacturers and report its findings to the President and DOC. Similarly, the Department of Homeland Security is required to assess communication technologies for vulnerabilities and publish its findings annually for the DOC's consideration.

SciPol Summary authored by