Chip Security Act 2026 passed the House Foreign Affairs Committee by a unanimous 42-0 vote on March 26, 2026. It now heads to the full House for consideration. It has not been enacted yet. But for AI hardware importers, data centre operators, and cloud service providers that hold export-controlled GPU infrastructure outside the United States, the time to prepare is now, not after the President signs it. The reason is the Chip Security Act 2026 built-in timeline: within 180 days of enactment, every covered integrated circuit product would be required to carry a location verification mechanism before it is exported, re-exported, or transferred to a foreign country. For businesses operating GPU clusters in India, Malaysia, Singapore, the UAE, and Saudi Arabia, 180 days is not enough time to build the required infrastructure from scratch. This guide covers what the Chip Security Act 2026 requires, what it means operationally for AI hardware importers, what the enforcement context looks like right now, and the specific steps to take before enactment.
What the Chip Security Act Actually Requires
H.R. 3447 was introduced by Representative Bill Huizenga (R-MI) in May 2025 and passed the House Foreign Affairs Committee by a 42-0 bipartisan vote on March 26, 2026. The Senate companion bill S. 1705 was introduced by Senator Tom Cotton (R-AR). The legislation targets covered integrated circuits classified under ECCNs 3A090, 3A001.z, 4A090, and 4A003.z. These classifications cover the NVIDIA H100, H200, A100, B100, B200, and GB200 series, AMD MI300X, and products containing these chips. If enacted, the Secretary of Commerce would be directed to do the following within the stated timeframes:
- Within 180 days of enactment: Commerce would be directed to require that all covered integrated circuit products be outfitted with a chip security mechanism implementing location verification before they are exported, re-exported, or in-country transferred to a foreign country. The Act does not mandate a specific technical method. Software, firmware, or hardware-based mechanisms all qualify, provided they can continuously verify where the chip physically sits
- Mandatory reporting: Any person holding a BIS export licence or authorisation for a covered chip would be required to promptly report to the Under Secretary for Industry and Security if they obtain credible information that the chip has been diverted from its intended destination, has moved to an unauthorised location, or has been tampered with or subjected to any attempt to disable, spoof, or circumvent the location verification mechanism
- Ownership and location records: The Secretary of Commerce gains authority to verify the ownership and location of covered chips that have been exported abroad and to maintain records of covered chip products including the location and current end-user of each product
- Secondary requirements within one year: In coordination with the Secretary of Defense, the Commerce Department must assess whether additional mechanisms including tamper prevention, workload verification, and functionality modification should be mandated
- Annual reviews for three years: Annual assessments of new chip security technologies and recommendations for incorporating new mechanisms and adjusting export control procedures
Why the Chip Security Act Is Moving This Fast
The 42-0 vote did not happen in isolation. The committee advanced the Chip Security Act on the same day that Stanley Yi Zheng, Matthew Kelly, and Tommy Shad English were charged with conspiracy to commit smuggling and export control violations for allegedly procuring millions of dollars of restricted chips from a California hardware company. Three days earlier, the FBI had arrested Zheng. Earlier in March, the co-founder of Super Micro Computer was in federal custody on charges that he and two others ran a scheme to ship USD 2.5 billion in AI servers containing NVIDIA chips to Chinese customers through Taiwan and Southeast Asia between 2024 and 2025. In November 2025, four individuals were charged with running a Florida front company that received USD 4 million in wire transfers from Chinese firms to purchase and export NVIDIA chips.
The Select Committee on China, which backed the legislation, stated that China has smuggled more than USD 1 billion in controlled chips in violation of US export controls, including restricted NVIDIA chips used by DeepSeek to develop its AI model. The chips were destined for China, which under current BIS policy faces the most severe export restrictions on advanced AI chips, with direct exports of covered chips prohibited under the Export Administration Regulations. The bipartisan support is substantial. The bill’s co-sponsors include both Republican and Democratic members, and Committee Chairman Brian Mast stated explicitly that the legislation advances President Trump’s AI Action Plan. The full legislative text is published on Congress.gov H.R. 3447.
What the Chip Security Act Means for AI Hardware Importers Specifically
Most coverage of the Chip Security Act focuses on chip manufacturers and exporters. The operational impact on AI hardware importers and data centre operators outside the United States has received far less attention. Here is what the Chip Security Act 2026 means for every business that imports, receives, hosts, or operates covered GPU infrastructure in a foreign country.
Every Covered Import Must Carry Verifiable Location Data From Day One
Under the Chip Security Act 2026, no covered chip can be exported, re-exported, or transferred to a foreign country without a location verification mechanism already in place. For AI hardware importers, this means that servers, GPU clusters, and networking infrastructure containing covered chips will arrive at your data centre with an embedded or firmware-level tracking mechanism already active. Once Commerce implements its rules under the Chip Security Act 2026, the export pathway for covered chips would be conditioned on the exporter having compliant location mechanisms in place before shipment. The question for importers is not whether to accept this mechanism but whether your facility’s network architecture, security protocols, and physical access controls can support location verification and reporting obligations under whatever technical standard Commerce ultimately mandates.
You Have a Mandatory Reporting Obligation if Chips Move or Are Tampered With
The Chip Security Act 2026 places a mandatory reporting obligation on any person holding a BIS licence or authorisation for covered chips. If you are the named end-user on a BIS export licence for GPU infrastructure in your data centre, and you obtain credible information that the chips have moved to an unauthorised location or been tampered with, you must report this to BIS promptly. This obligation applies regardless of whether the diversion or tampering was caused by you. A tenant in your data centre gaining unauthorised access to your GPU cluster. A logistics partner moving equipment between facilities without updating location records. A hardware maintenance event that temporarily relocates chips. Each of these is a potential reporting trigger under the Chip Security Act 2026 framework.
Your Importer of Record Structure Must Be Positioned for Compliance
The Act gives the Commerce Secretary authority to verify the ownership and location of covered chips exported abroad and to maintain records of covered chip products including the location and current end-user. This means your Importer of Record structure, the legal entity named on the import declaration for covered chips entering your country, should be positioned as the entity that can produce verified location and end-user records on demand. IOR arrangements where the importing entity is a logistics broker or freight forwarder with no operational relationship to the data centre where the chips actually sit will not satisfy this requirement. The IOR must be the entity that can demonstrate continuous chain of custody from port of entry to current physical location.
The 180-Day Timeline Is Not Enough Time to Build From Scratch
The Chip Security Act 2026 requires Commerce to mandate location verification mechanisms within 180 days of enactment. For a business that currently has no location verification infrastructure for its GPU fleet, no inventory management system that tracks chips at the serial number level, no facility security protocols aligned with BIS reporting requirements, and no designated compliance officer with export control responsibility, 180 days is not sufficient to build all of this. The businesses that will be ready are the ones that start now. The specific infrastructure requirements are:
- Chip-level inventory system: Serial number tracking for every covered chip in your facility, updated in real time, with location recorded at the rack or cage level
- Access control and logging: Identity verification for every individual with physical or logical access to covered GPU infrastructure. Access logs producible on BIS request
- Location reporting protocol: A defined internal process for what constitutes a reportable location change and who within your organisation is responsible for filing with BIS
- Tamper detection documentation: Records of physical inspection cycles, firmware version history, and any anomalies in the location verification mechanism on each covered chip
Which Countries Face the Highest Combined Compliance Burden Under Existing BIS Controls and the Chip Security Act
The Chip Security Act 2026 applies to all foreign countries where covered chips are exported. But the compliance burden is not equal across all markets. Current BIS export control policy under the AI Diffusion Rule and Export Administration Regulations already creates differentiated compliance obligations by country. If the Chip Security Act 2026 is enacted, it would add hardware-level verification requirements on top of that existing framework. The countries highlighted below face heightened scrutiny under current BIS export control policy. If the Chip Security Act 2026 is enacted, additional hardware-level obligations would apply on top of existing requirements. The countries where AI hardware importers face the highest combined compliance burden in 2026 are:
- India: Under current BIS policy, India faces quantity limits on advanced chip imports and heightened scrutiny on end-use verification. BIS India certification already requires 3-6 months for hardware holding. Under Chip Security Act, every covered chip deployed in Indian data centres must carry location verification and Indian operators must maintain BIS-reportable end-user records. India is the fastest-growing AI infrastructure market in Asia and the compliance gap between current Indian data centre practice and Chip Security Act requirements is significant
- Malaysia: Explicitly named in US government communications over chip diversion concerns under current BIS policy. The Super Micro indictment alleged a diversion route through Southeast Asia. Malaysian data centre operators will face heightened scrutiny on location verification because the country has been cited as a transshipment risk
- Singapore: Mentioned by name in US government concerns about third-country access to controlled chips enabling Chinese AI development. Singapore-based AI infrastructure operators must implement location verification frameworks that can withstand BIS review. For businesses managing Singapore hub operations and their broader import cost structure, see our guide to reducing import duty Singapore 2026
- UAE: A significant sovereign AI investment destination subject to current BIS export control documentation requirements. UAE data centre operators receiving covered chips under licence must maintain end-user records and location data that satisfies Commerce Department verification requirements
- Saudi Arabia: A major GPU deployment destination under sovereign AI programmes, subject to current BIS export control documentation and end-use requirements. SABER pre-arrival compliance already required. Chip Security Act adds location verification and reporting obligations to every covered chip in Saudi facilities
What to Do Before the Chip Security Act Is Enacted
- Inventory every covered chip in your foreign facilities at serial number level. Pull your purchase records, import declarations, and asset registers for all GPU infrastructure in each country. Identify every covered chip by ECCN classification: 3A090, 3A001.z, 4A090, and 4A003.z. If you cannot produce this list today, you cannot satisfy the ownership and location records requirement under the Act. Build the inventory now while you have time to do it methodically
- Audit your IOR structure for each country against the Act’s end-user record requirement. The entity named as importer on your customs declarations for covered chips must be able to produce location and end-user documentation on BIS request. If your IOR is a freight forwarder or logistics company with no operational connection to your data centre, restructure the arrangement before the Chip Security Act 2026 is enforced. Your Importer of Record must be the entity that operates or controls the facility where the chips physically sit
- Implement access logging and tamper detection documentation for every covered chip facility. The reporting obligation triggers when you obtain credible information of diversion or tampering. If you have no logging system, you will not know when a reporting obligation has been triggered. Access logs, firmware version records, and physical inspection documentation are the minimum baseline
- Consider Validated End User (VEU) certification for Tier 2 country operations. VEU certification by BIS demonstrates pre-verified compliance with US regulations and may reduce diversion scrutiny risk under existing export controls. For AI infrastructure operators in India, UAE, Saudi Arabia, Malaysia, and Singapore operating at scale with covered chips, VEU certification is a potential compliance strategy worth assessing now. It does not guarantee specific treatment under the Chip Security Act if enacted, as the Chip Security Act 2026 creates new Commerce rulemaking obligations whose interaction with VEU status has not yet been determined. See our guide to AI GPU import compliance 2026 for the full VEU framework
How Carra Globe Supports AI Hardware Importers Under the Chip Security Act Framework
Carra Globe provides the following services for businesses importing covered AI hardware across Tier 2 and other foreign country markets:
- Importer of Record (IOR): Operational IOR entities in India, Malaysia, Singapore, UAE, Saudi Arabia, and 170+ additional markets, positioned to serve as the named importing entity for covered chip imports with end-user documentation and location record capability that satisfies BIS verification requirements
- Global Trade Compliance: ECCN classification for every covered chip SKU, BIS export licence exception verification, denied party screening, end-use certificate preparation, VEU application documentation support, and Chip Security Act compliance gap assessment for existing AI infrastructure portfolios
- Delivered Duty Paid (DDP): AI hardware delivery into Tier 2 markets with country-specific certification confirmation before freight booking, end-user documentation aligned with BIS requirements, and import cost modelling covering duty, VAT, and country-specific charges on every shipment
- Freight Forwarding: AI hardware logistics with integrated export control documentation, denied party screening at origin, and chain of custody records from port of export to final facility location
Frequently Asked Questions: Chip Security Act AI Hardware Importers
Has the Chip Security Act 2026 been enacted?
No. As of April 2026, H.R. 3447 passed the House Foreign Affairs Committee by a unanimous 42-0 vote on March 26, 2026 and heads to the full House for consideration. The Senate companion bill S. 1705 was introduced by Senator Tom Cotton. The Act has not been signed into law. However, the 180-day implementation timeline built into the legislation means that businesses that wait for enactment before preparing will not have enough time to build the required compliance infrastructure. The bipartisan support and the enforcement context make enactment in 2026 a realistic planning scenario.
Which chips are covered by the Chip Security Act 2026?
The Act targets covered integrated circuits classified under ECCNs 3A090, 3A001.z, 4A090, and 4A003.z under the Export Administration Regulations. This covers NVIDIA H100, H200, A100, B100, B200, and GB200 series GPUs, AMD MI300X, and products containing these chips including complete server systems. The Act covers the chips themselves and any product in which a covered chip is embedded, meaning complete AI server racks, HGX systems, and networking infrastructure containing covered chips all fall within scope.
What does location verification actually require from a data centre operator?
The Act does not prescribe a specific technical method. Software, firmware, or hardware-based mechanisms all qualify. What the Chip Security Act 2026 would require is that the mechanism be capable of verifying the location of each covered chip, that ownership records are maintained at the chip level, that current end-user information is recorded, and that any diversion or tampering is promptly reported to BIS. In practice this means serial number-level inventory management, access logging, firmware version tracking, and a defined internal process for identifying and reporting reportable events.
Does the Chip Security Act apply to chips already deployed abroad before enactment?
The Act’s primary requirement covers chips before they are exported, re-exported, or transferred. Chips already deployed abroad before the 180-day deadline may not require retrofitting under the primary mechanism. However, the reporting obligation and the Commerce Secretary’s authority to verify ownership and location abroad applies broadly to covered chips exported under any licence or authorisation. Businesses with existing covered chip deployments should assess whether their current documentation and access control systems satisfy the ownership and location record requirements the Chip Security Act 2026 grants Commerce authority to verify.
What is the penalty for failing to report under the Chip Security Act?
The Act itself establishes the reporting obligation but the penalty structure operates through the existing BIS enforcement framework under the Export Control Reform Act of 2018. Current maximum civil penalties under enacted law are approximately USD 374,000 per violation. Separately, BIS has publicly stated it is seeking Congressional authority to raise this ceiling to USD 1.2 million per violation. That proposed increase has not been enacted and remains subject to Congressional action. BIS is also seeking to double the statute of limitations for export control violations from five to ten years, meaning compliance failures today could be actionable through the mid-2030s. The February 2026 USD 252 million settlement remains the second-largest standalone BIS penalty in history and signals the enforcement posture businesses should plan against.
How does the Chip Security Act interact with the BIS three-tier country framework?
The Chip Security Act 2026 adds a hardware-level verification layer on top of the existing tier framework rather than replacing it. Tier 1 countries face the new location verification requirements but with lower diversion scrutiny risk. Tier 2 countries including India, Malaysia, Singapore, UAE, and Saudi Arabia face the location verification requirements plus the existing enhanced documentation and end-use monitoring obligations. The combination creates a significantly higher compliance burden for Tier 2 country operators. Validated End User certification, which provides pre-verified compliance status with BIS, is the most effective structure for Tier 2 country data centre operators operating at scale. See our full guide to AI GPU import compliance 2026 for the complete Tier 2 compliance framework.