Codify — Article

Pick Up After Your DOGE Act mandates GAO audits and fixes for agency IT access

Requires the U.S. DOGE Service to disclose where its teams accessed agency systems and orders GAO-led security and performance audits with tight remediation deadlines.

The Brief

The bill forces disclosure and independent review of Federal computer systems that the United States DOGE Service or related teams have accessed. It requires the DOGE Service administrator to provide a full accounting within 30 days, directs the Comptroller General to begin audits within 60 days with prioritized reviews of Social Security Administration, HHS/CMS, and Treasury/IRS systems, and sets 1- and 2-year report deadlines.

Why it matters: the measure turns ad hoc access by pilot or temporary ‘‘DOGE’’ teams into a formal oversight problem, coupling rapid audits with a statutory requirement that agencies repair identified vulnerabilities within 90 days and report remediation status to House and Senate committees. That combination tightens congressional visibility into who touched agency systems and forces agencies to move quickly on fixes — with operational, budgetary, and security trade-offs for agencies, contractors, and the GAO itself.

At a Glance

What It Does

Requires the Administrator of the United States DOGE Service to submit a 30-day accounting of all Federal systems accessed by DOGE teams. Directs the Comptroller General to begin comprehensive audits within 60 days, deliver initial reports on priority agencies within 1 year and final reports within 2 years, and empowers the GAO to recommend legislative and administrative fixes.

Who It Affects

The U.S. DOGE Service and its temporary organization, agency DOGE teams, agency IT and security staffs, contractors whose software was installed or modified, and congressional committees with oversight of affected agencies (notably committees covering SSA, HHS/CMS, and Treasury/IRS).

Why It Matters

It formalizes oversight of a presidentially created efficiency program and forces agencies to remediate vulnerabilities on a 90‑day clock. The bill therefore reshapes how pilot teams, agency IT operations, and Congress interact around access, security, and third‑party code changes.

More articles like this one.

A weekly email with all the latest developments on this topic.

Unsubscribe anytime.

What This Bill Actually Does

The act opens with a narrow administrative demand: the DOGE Service administrator must, within 30 days of enactment, hand Congress and the GAO a full accounting of every Federal agency where DOGE teams — including temporary staff, volunteers, and individuals acting on their instruction — accessed systems, networks, data, or information. That accounting is designed to be the starting point for more formal reviews rather than a standalone disclosure.

Once the GAO receives that accounting, the Comptroller General must start a broad set of audits within 60 days. The audits focus on security vulnerabilities and software bugs that are linked to software the DOGE Service or its people installed, created, or modified, but the GAO can expand its review to other impacts it considers relevant.

The bill explicitly directs the GAO to prioritize three program areas (Social Security Administration; HHS and CMS; Treasury and IRS) and to consult with congressional committees when choosing additional agencies for review.Deliverables are staged: the GAO must produce initial audit reports and recommendations for the priority agencies within one year, and a broader set of reports for other selected agencies within two years. Those reports go to both the responsible agency heads and the relevant congressional committees and may include suggested legislation or administrative changes.

Upon receipt of any such report, an agency head has a 90‑day obligation to correct identified vulnerabilities or bugs and to report back to the appropriate congressional committee on remediation status.The statute is procedure-driven rather than punitive: it mandates audits, timelines, and reporting but does not create criminal or civil penalties for failures to comply beyond congressional oversight. It also ties the reviews specifically to access and to changes made by DOGE teams (including temporary organizations and volunteers), which frames the scrutiny around who touched systems and what code or configuration changes they introduced.

Implementation will require GAO access to potentially sensitive systems and coordination with existing oversight entities, such as agency inspectors general, CISA, and OMB, while agencies will need to triage fixes under the 90‑day requirement.

The Five Things You Need to Know

1

Within 30 days of enactment the Administrator of the United States DOGE Service must submit a full accounting of every Federal agency where DOGE teams or affiliated individuals accessed computer systems, networks, data, or information.

2

The Comptroller General must begin comprehensive audits within 60 days focused on security vulnerabilities or software bugs tied to software installed, created, or modified by the DOGE Service, its temporary organization, employees, volunteers, or associated agency DOGE teams.

3

The GAO must prioritize audits of the Social Security Administration, Department of Health and Human Services (including CMS), and the Department of the Treasury (including the IRS); initial reports for those agencies are due within one year.

4

A broader set of audit reports for other agencies selected in consultation with congressional committees is due within two years and may include recommendations for legislation or administrative action.

5

Agency heads must fix vulnerabilities or bugs identified in GAO reports within 90 days of receiving the report and must submit a status report on remediation to the appropriate committee of jurisdiction.

Section-by-Section Breakdown

Every bill we cover gets an analysis of its key sections. Expand all ↓

Section 1

Short title

Declares the Act may be cited as the "Pick Up After Your DOGE Act." This is purely nominal, but naming signals the bill's purpose: to make the DOGE Service account for its interactions with agency IT.

Section 2

Definition of appropriate congressional committee

Provides a single statutory definition: any committee with jurisdiction over the agency that is audited. That keeps notification and reporting requirements tied to existing committee jurisdictions rather than creating a new list or special committee, so normal congressional oversight channels receive audit results and remediation reports.

Section 3

DOGE Service accounting to Congress and GAO

Requires the DOGE Service administrator to produce a full accounting within 30 days that identifies all Federal agencies where agency DOGE teams or affiliated individuals accessed systems, networks, data, or information. Practically, agencies will need to reconcile access logs and change records with DOGE Service activities quickly; the requirement also provides GAO with the mapping it needs to scope audits.

2 more sections
Section 4(a)–(b)

GAO audit mandate and priority targets

Directs the Comptroller General to begin a comprehensive audit within 60 days, focused on security vulnerabilities and software bugs tied to code or changes introduced by DOGE-affiliated actors. Subsection (b) makes SSA, HHS/CMS, and Treasury/IRS the initial priority reviews, concentrating GAO resources on systems that hold the most sensitive financial and health data.

Section 4(c)–(e)

Reporting deadlines and agency remediation duty

Establishes a 1‑year deadline for initial GAO reports on priority agencies and a 2‑year deadline for audit results on other agencies chosen in consultation with congressional committees. GAO reports may include legislative or administrative recommendations. Critically, subsection (e) imposes a 90‑day timeline on agency heads to fix identified vulnerabilities and to report remediation status to the appropriate committee, converting GAO findings into an enforceable administrative timetable (reporting-based enforcement rather than penalties).

At scale

This bill is one of many.

Codify tracks hundreds of bills on Technology across all five countries.

Explore Technology in Codify Search →

Who Benefits and Who Bears the Cost

Every bill creates winners and losers. Here's who stands to gain and who bears the cost.

Who Benefits

  • Congressional oversight committees — get a mandatory accounting and GAO audit reports that consolidate technical findings into actionable recommendations and give committees a clear remediation timeline.
  • Recipients of federal benefits and taxpayers — users of SSA, HHS/CMS, and Treasury/IRS systems potentially gain faster discovery and correction of security or data-integrity problems identified as related to DOGE activities.
  • Agency cybersecurity teams and CIOs — receive independent, prioritized audits that can reveal latent vulnerabilities and provide GAO recommendations they can use to justify funding or organizational changes.

Who Bears the Cost

  • Federal agencies (especially SSA, HHS/CMS, Treasury/IRS) — must allocate staff time and budget to support GAO audits, implement fixes within a 90‑day window, and prepare remediation reports to Congress.
  • The United States DOGE Service and associated temporary organizations or volunteers — face reputational and operational scrutiny and must provide detailed access records; any deficiencies tied to their activities will be highlighted in GAO reports.
  • Contractors and third‑party vendors — may incur costs responding to audits and making code or configuration changes if GAO links vulnerabilities to software they supplied or modified.

Key Issues

The Core Tension

The central dilemma is accountability versus operational security and capacity: the bill compels rapid, public-facing oversight of systems the DOGE Service touched, which strengthens congressional visibility and forces remediation, but that same scrutiny can expose sensitive details, strain GAO and agency resources, and create disputable scope questions that complicate timely, secure fixes.

The bill creates strong disclosure and remediation pressure but leaves several operational questions open. ‘‘Accessed’’ and the scope of ‘‘software installed, created, or modified’’ are pivotal terms: if read broadly they could sweep in routine administrative access, vendor maintenance, or background tool deployments, increasing the number of systems and stakeholders GAO must examine. Narrow readings, by contrast, could miss consequential changes enacted during brief pilot activity.

The statute does not supply a technical definition or a standards-based threshold for what counts as a vulnerability or bug, leaving room for dispute over whether an audit finding triggers the 90‑day remediation clock.

Another tension is between transparency and operational security. GAO reports to Congress are intended to be comprehensive, but they may contain sensitive or classified details about vulnerabilities, configuration errors, or infrastructure topology.

The bill does not specify procedures for handling classified material, coordinating with CISA, or redacting operationally sensitive findings before wide distribution. Additionally, GAO will need sufficient cybersecurity expertise and possibly classified access to complete meaningful reviews; the statute imposes deadlines (60 days to begin, one- and two-year reporting milestones) that may strain GAO resources and force prioritization decisions that leave other high‑risk systems unexamined.

Finally, enforcement is reporting-based: the statute requires agencies to fix flaws and report back, but it contains no penalties or specified follow-up mechanisms beyond committee oversight, creating reliance on political will rather than statutory sanction to secure remediation.

Try it yourself.

Ask a question in plain English, or pick a topic below. Results in seconds.