Supply Chain Controls

Recent presidential actions have expanded the US government’s efforts to greatly increase its oversight of US supply chains in a number of key business sectors, including technology, telecommunications, digital and data services and network equipment  manufacturing.  US business and foreign suppliers should understand their specific requirements to determine any potential impact on their operations.

The Federal Communications Commission (FCC) adopted new rules in 2022 prohibiting communications equipment deemed to pose an unacceptable risk to national security from being authorized for importation or sale in the United States. These rules are implemented through the FCC Supplier’s Declaration of Conformity process and cover equipment produced by a number of Chinese suppliers. These rules follow earlier FCC rules that bar telecommunications carriers from using US government subsidy funds to purchase equipment and services from companies that pose a national security threat, including from a number of Chinese suppliers. In taking these actions, the FCC indicated that it was informed by a number of recent actions by other US government agencies and foreign government authorities that prohibited the use of certain products and services as a means to close potential security vulnerabilities in communications networks and their supply chains.

The US Department of Commerce has established a process that provides the Secretary of Commerce with the authority to review—and potentially block—the acquisition or purchase by US businesses of a wide variety of communications and information technology hardware and software products and services from foreign sources. New rules, based on executive orders implemented under the International Emergency Economic Powers Act, authorize the US Commerce Department, working in consultation with most of the CFIUS agencies and the Director of National Intelligence, to prohibit a range of telecommunications transactions involving certain information and communications technology or service (ICTS).

How the National Security Regimes Interact

As noted in the section above on the Telecom Committee, it is clear the US government considers information and communications networks and infrastructure to be among the country’s most strategic assets. The ICTS rules specify that they do not apply to a transaction that CFIUS is actively reviewing or has reviewed. Both regimes, however, have the authority to condition approval of transactions on agreement by the parties to accept mitigation measures.

See More Detail
Read Full Article