Security

All computers are inherently susceptible to vulnerabilities, threats and risks. Computers fail because of design flaws, poor programming techniques, hardware failure, operator error, power supply interruptions, intentional tampering, or malicious code. For this reason, it is prudent to maintain a higher degree of security protocols in the adoption and use of electronic voting systems. Until electronic voting systems are proven to be accurate, reliable, and secure the technology should be treated as suspect, and required to produce a voter verified paper ballot for the purpose of tabulation and recounts in determining the outcome of public elections.

Principles:

  • Currently deployed direct recording electronic (DRE) voting technology must produce a voter verifable paper ballot, which is retained for tabulation and recount(s) to determine the correct outcome of public elections.
  • Voters should have the option to verify their choices on a voter verifiable paper ballot by means of a reader to allow privacy in authenticating their ballot prior to submitting it as a permanent record of their vote(s) in a public election.
  • Develop and apply uniform principles of sound ballot accounting practices to be used by states and local governments to ensure accuracy and equity in the tabulation of all voter verified paper ballots.
  • Conduct routine audits of votes cast and method of tabulation on the precinct, county and state level.
  • End the use of the Digital Millennium Copyright Act and any Uniform Computer Information Transactions Act (UCITA) laws or contract provisions that prevent the public investigation of electronic voting technology and the disclosure of findings.
  • Provide alternative means to voters to cast their ballots in public elections when available direct recording electronic (DRE)voting technology is not equipped to provide a voter verified paper ballot.
  • Prohibit the centralization of voter registration records until the security, reliability, and risks of identity theft, fraud, misuse, and abuse are reviewed and the resulting report provided is to the relevant House and Senate Committees and appropriate policy changes are made to guard against these threats.