The landscape of federal contracting and cybersecurity has been significantly reshaped by a pivotal piece of legislation. At the heart of this transformation lies the “889 text,” a regulation with far-reaching implications for businesses across the globe. This article delves into the specifics of Section 889, its core prohibitions, and what companies need to know to remain compliant.
What is Section 889?
Section 889 of the 2019 National Defense Authorization Act (NDAA) is a U.S. federal law designed to mitigate national security risks posed by certain telecommunications and video surveillance equipment. The legislation specifically targets technology and services from particular Chinese companies, aiming to prevent the U.S. government from using technology that could be exploited for foreign intelligence purposes. The core of this regulation is found within the specific 889 text of the statute, which outlines two key prohibitions.
The Two-Pronged Prohibition of the “889 Text”
The 889 text establishes a dual-sided restriction that affects how the U.S. government and its contractors operate. Understanding both parts is crucial for compliance.
Part A: The Ban on Federal Procurement
The first part of the 889 text prohibits federal agencies from directly purchasing or obtaining any telecommunications or video surveillance equipment or services from a list of “covered” Chinese companies. This is a straightforward ban on the federal acquisition of these specific items from the named entities. The covered companies include Huawei Technologies Company, ZTE Corporation, and several others specializing in video surveillance technology.
Part B: The Broader Ban on Contracting

The second, and arguably more complex, part of the 889 text extends the prohibition to federal contractors. This section, often referred to as Part B, forbids executive agencies from entering into, or extending or renewing, a contract with any entity that uses any equipment, system, or service that incorporates covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system. This means that even if a company does not directly sell to the government, its internal use of “covered” technology could render it ineligible for federal contracts.
Who is Affected by the “889 Text”?
The impact of the 889 text is wide-ranging. It directly affects:
- U.S. Federal Agencies: They are responsible for ensuring their procurement and contracting practices align with the law.
- Prime Contractors: Companies that hold direct contracts with the federal government must certify their compliance with Section 889.
- Subcontractors: The compliance requirements flow down from prime contractors to their subcontractors at all tiers.
- Any Business Seeking Federal Contracts: Any entity wishing to do business with the U.S. government must scrutinize its supply chain and internal systems to ensure they are free of prohibited technology.
Navigating Compliance with the “889 Text”
Compliance with the 889 text requires a proactive and thorough approach. Companies are expected to conduct a “reasonable inquiry” to determine whether they use covered telecommunications equipment or services. This inquiry should include a comprehensive review of their supply chains and internal technology infrastructure.
Key steps to compliance include:
- Understanding the Scope: Familiarize yourself with the full 889 text and the list of covered entities.
- Conducting a Supply Chain Audit: Identify all telecommunications and video surveillance equipment and services within your operations and supply chain.
- Certifying Compliance: Be prepared to make accurate and timely representations and certifications to the government regarding your compliance status.
- Implementing a Compliance Plan: Develop and maintain a robust compliance program to ensure ongoing adherence to the evolving regulations.
The implementation of the 889 text signals a significant shift in the federal government’s approach to supply chain risk management. By understanding the nuances of this critical piece of legislation, businesses can navigate the complexities of federal contracting and contribute to a more secure national technology landscape.
