← Back to all briefings
Infrastructure 6 min read Published Updated Credibility 90/100

CHIPS Act guardrails

Commerce finalized CHIPS Act guardrails limiting recipients' investments in China and other countries of concern. If you are getting CHIPS money, you cannot expand semiconductor capacity in China for 10 years.

Verified for technical accuracy — Kodi C.

Infrastructure pillar illustration for Zeph Tech briefings
Infrastructure supply chain and reliability briefings

On 22 September 2023 the U.S. Department of Commerce issued the final guardrails rule that governs companies receiving CHIPS and Science Act manufacturing incentives. The rule cements a ten-year prohibition on materially expanding advanced semiconductor capacity in countries of concern, narrows the circumstances in which legacy-node expansion is permitted, and extends the guardrail framework to joint research, technology licensing, and certain intangible property agreements with foreign entities of concern. Commerce also detailed a compliance monitoring regime that includes mandatory notifications of significant transactions, recordkeeping, and clawback authority. Governance teams must translate the rule into standing oversight structures, program managers need to operationalize eligibility controls across portfolios and supply chains, and privacy officers must ensure the data collected for guardrail compliance can be produced within statutory DSAR timelines without jeopardising confidentiality obligations.

What changed in the final rule

The rule finalizes guardrail provisions first proposed in March 2023 and clarifies ambiguous definitions based on stakeholder feedback. It defines “advanced” semiconductors to include logic devices below 14/16 nanometers, memory chips with 3D stacking, and compound semiconductors critical for quantum and military applications; recipients cannot engage in material expansion of this class of manufacturing in China, Russia, Iran, or North Korea for a decade after receiving federal support.

For legacy chips, Commerce permits at most a 10 percent capacity growth in countries of concern, conditioned on notifying the Department and demonstrating the expansion addresses an unanticipated supply need that does not bolster sensitive military applications. The final rule also codifies a $100,000 threshold for reporting significant transactions, extends prohibitions to joint R&D, talent sharing, and licensing that could transfer know-how to foreign entities of concern, and clarifies that back-end assembly and advanced packaging facilities are covered. Enforcement mechanisms span suspension of disbursements, clawback of prior incentives, and potential civil actions if recipients misrepresent activities.

Commerce paired the final rule with a compliance program that includes desk reviews, on-site inspections, and an ongoing requirement to maintain auditable documentation showing adherence to guardrail commitments. Recipients must supply annual certifications, make ad hoc disclosures when pursuing new equity partnerships or equipment transfers in countries of concern, and cooperate with interagency reviews managed by the CHIPS Program Office and the Office of Strategic Competition and Technology.

Because the guardrails extend to subsidiaries, joint ventures, and controlled affiliates, governance teams need consolidated visibility into global manufacturing footprints and technology partnerships. The final rule also dovetails with the Treasury Department’s outbound investment screening framework, making it critical that legal and public-policy teams maintain a single interpretation of what is prohibited advanced semiconductor activity.

What this means for governance

Boards overseeing CHIPS-funded projects must treat the guardrails as a long-term covenant with federal agencies. Governance committees should document how they will supervise compliance, including designating an executive guardrail officer with authority to halt disbursement requests if risk thresholds are breached.

Charters for audit and risk committees need explicit references to guardrail reporting, periodic scenario analysis, and integration with export-control oversight. Multinational groups must document the decision rights between U.S. entities receiving incentives and overseas affiliates that might otherwise pursue expansion in countries of concern; boards should require quarterly attestations from regional leaders confirming no guardrail-triggering activities are planned.

Also, board calendars should include deep dives on supply-chain resilience and technology partnerships to evaluate guardrail exposure. The final rule’s joint research restrictions mean corporate venture capital arms and innovation labs require board-approved diligence protocols before collaborating with foreign universities or start-ups.

Directors should insist on an enterprise-wide registry of semiconductor-related agreements, capturing technology licensing, design services, and packaging arrangements, so that cross-functional teams can flag any connection to entities of concern. Given the rule’s 10-year horizon, governance documentation—ranging from risk appetite statements to crisis communication plans—should outline how teams will manage disputes or sudden enforcement inquiries.

How to implement this

program and operations leaders need a structured setup plan that aligns business strategy with guardrail compliance. Priority steps include:

  • Map covered facilities and activities. Create a full inventory of fabs, pilot lines, assembly plants, and R&D sites, tagging each with node sizes, product classes, ownership interests, and geographic details. Link that inventory to legal entity hierarchies and capital expenditure plans so expansions or tooling upgrades in countries of concern are automatically flagged for review.
  • Embed guardrail checkpoints into investment governance. Update stage-gate templates, capital request forms, and procurement workflows to require confirmation that proposed projects do not violate the 10-year restrictions. Procurement teams should verify suppliers’ ownership structures to prevent indirect transfers of equipment or IP to entities of concern.
  • Stand up transaction notification processes. Implement a workflow that collects the data Commerce expects in significant transaction reports—counterparty information, transaction value, technology scope, and mitigation measures—and routes drafts through legal, trade compliance, and government-affairs reviewers before submission.
  • Coordinate with export-control and CFIUS teams. Align guardrail analysis with existing export-control screening and outbound-investment procedures to avoid duplicative diligence and ensure consistent interpretations of technology classifications.
  • Develop monitoring and audit protocols. Establish key risk indicators such as capacity utilization by geography, changes to joint venture agreements, or engineering collaboration requests that implicate guardrail definitions. Internal audit should plan targeted reviews of recordkeeping, annual certifications, and IT controls supporting reporting obligations.

Implementers must also prepare for Commerce inspections. That entails maintaining facility-level binders—digital or physical—that combine ownership charts, license inventories, and copies of any filings, supported by version-controlled policies describing how exceptions are escalated. Training curricula should extend beyond compliance teams to include business development, supply-chain, and HR leaders in overseas subsidiaries, emphasizing the consequences of violating the guardrails.

DSAR and privacy operations

Although the guardrails focus on industrial policy, they create data governance obligations that intersect with global privacy laws. Recipients will collect sensitive business information, employee records, and partner data to substantiate compliance. Privacy officers must incorporate guardrail datasets into records of processing activities, ensuring lawful bases are documented for retaining counterparties’ contact details, facility sensor logs, or workforce deployment metrics. Because Commerce can request documentation with little notice, DSAR teams should design retrieval playbooks that separate guardrail evidence from personal data that may need redaction before disclosure.

Teams operating in the EU, UK, or jurisdictions with strong access rights should map how guardrail records flow across borders. If compliance files include employee assignments or contractor performance data in countries of concern, DSAR processes must support rapid response while preserving trade secrets and national-security information.

Legal teams should prepare standard language for DSAR responses that explains statutory reporting obligations under the CHIPS program, cites relevant exemptions (such as national security or confidential commercial information), and documents any partial denials. Data retention schedules ought to align guardrail monitoring periods with privacy minimization principles: maintain detailed records for the 10-year compliance window plus any statutory limitation periods, then archive or delete personal data that no longer serves legal or evidentiary purposes.

Finally, privacy, security, and compliance teams must collaborate on access controls. Guardrail documentation often includes design schematics, supplier pricing, and workforce rosters; restricting access to need-to-know personnel reduces both insider risk and inadvertent DSAR disclosures. Implement logging that tracks who accesses guardrail datasets, and integrate those logs into DSAR fulfillment so that privacy teams can evidence appropriate safeguards when responding to regulators. By hard-wiring DSAR readiness into guardrail compliance, recipients can satisfy Commerce monitoring without compromising obligations to employees, contractors, or customers.

With governance oversight, disciplined setup, and privacy-aware operations, CHIPS beneficiaries can honor the final guardrails while continuing to pursue global semiconductor leadership.

Continue in the Infrastructure pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

Cited sources

  1. Industry Standards and Best Practices — International Organization for Standardization
  2. Cloud Security Alliance Guidance
  • CHIPS Act guardrails
  • Department of Commerce
  • Semiconductor supply chain
  • Export controls
Back to curated briefings

Comments

Community

We publish only high-quality, respectful contributions. Every submission is reviewed for clarity, sourcing, and safety before it appears here.

    Share your perspective

    Submissions showing "Awaiting moderation" are in review. Spam, low-effort posts, or unverifiable claims will be rejected. We verify submissions with the email you provide, and we never publish or sell that address.

    Verification

    Complete the CAPTCHA to submit.