Charlie Daniels Arkansas Secretary of State HAVA Compliant Voting Systems Security Considerations General Recommendations to Enhance Security and Integrity.

Slides:



Advertisements
Similar presentations
CANVASS Canvass defined in GS Canvass defined in GS The entire process of determining the votes have been counted and tabulated correctly.
Advertisements

Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Creating Online Presentations. Creating a Presentation To create a presentation 1.Open PowerPoint. In the task pane under New select From Design Template,
2010 ELECTION TRAINING POLL CLERK. PRECINCT OFFICIALS The precinct team consists of: The precinct team consists of:  Republican  One Inspector  One.
Elections Process. You are the IEA-NEA Proper conduction of elections is your responsibility ! Labor organizations are governed by the Landrum-Griffin.
ELECTION DAY ACTIVITIES. Checklist of contents of the box PCOS machine and its power adaptor Thirteen (13) rolls of official thermal paper Three (3)
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Election Observer Training 2008 Elections Certification & Training Program
FINAL TESTING AND SEALING ACTIVITIES. The BEI shall check the contents of the PCOS box based on the checklist found inside the PCOS: Checklist of contents.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
First of all, set your Keyboard Language. This may have changed correctly when "Time and Currency" option was selected, if not change as needed. Click.
Guide to the Voting Action Planner Voting is the way we elect government officials, pass laws and decide on issues…
Optical Scan Ballot. January Prior to Primary Election Establish Election Precincts Establish Election Precincts Absentee precincts Absentee precincts.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Digital Logic and State Machine Design Installing Xilinx WebPACK 12.4 CS 2204 Digital Hardware.
Voting Systems.  DS200  DS850  AutoMARK Voting Equipment.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
1 INITIAL SETUP OF THE ST ScI ELECTRONIC GRANTS MANAGEMENT SYSTEM BY AO DESIGNEES September, 2000.
1. Chapter 25 Protecting and Preparing Documents.
ERM ELECTION REPORTING MANAGER. ERM SIMPLY A PLACE TO LOAD IN RESULTS, VIEW RESULTS AND MAKE SPECIALIZED REPORTS.
Process Manual Using Your GL Account for Off-campus Access to the Internet By: Louisa Au May 5, 2003 English 393 Technical Writing.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Georgia Electronic Voting System Testing and Security Voting Systems Testing Summit November 29, 2005.
Downloading and Installing Autodesk Revit 2016
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Microsoft Office XP Illustrated Introductory, Enhanced Started with Outlook 2002 Getting.
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
Idaho Procedures M100 OPTICAL SCAN PRECINCT TABULATOR.
Canvassing, Reporting and Preserving Results 27 th Annual Election Law Seminar Ashley Fischer.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
 The following slides contain information on special voting procedures.  These procedures include: Assisting voters; Provisional voters; Poll watchers.
2016 Poll Worker Training: Absentee Ballot Canvassing Officials Provided by the: State Board of Election Commissioners 501 Woodlane, Suite 401N Little.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send messages,
DS200 PROCEDURES SPEAKER TOUCH SCREEN DISPLAY
Idaho Procedures M650 GREEN LIGHT OPTICAL SCAN TABULATOR.
August Millhopper Montessori School is excited to announce new procedures for troubleshooting computer issues. A new Help Desk has been created.
Establishing a Chain of Custody NC State Board of Elections March 14, 2006.
HELP STATION ASSISTANT HELP STATION ASSISTANT. WHAT IS REQUIRED TO VOTE? 1.Voters must state their name and address. (and party if it is a primary) 2.Only.
EA Tablet ® Poll Worker Training Setup and Use of the EA Tablet ® Ohio Version – Fourth Edition © 2014 Election Administrators, LLC C ONFIDENTIAL N OTICE.
Poll Managers Closing the Polls 2015 ECAM Convention Presented by: Mississippi Secretary of State’s Office Elections Division.
Computer Security Sample security policy Dr Alexei Vernitski.
Association of World Election Bodies Contents ICT–based Election Management Voter Registration and Identification Voting and Counting Examples.
2015 Touch Screen Voting Device Training For AVPM and Non-AVPM TSX Counties Presented by: Derrick Cooper Elections Systems Training Specialist Mississippi.
1 Touch Screen Voting Device Training Election Systems & Software.
Touch Screen Voting Device Training Election Systems & Software Presented by: Bill Lowe.
1 Election Day Operations for TSX Counties Prepared and Presented by: Matt Grubbs, Director of Elections/HAVA.
2012 Touch Screen Voting Device Training The Mississippi Secretary of State’s Office, Elections Division 2012 Prepared and presented by: The Secretary.
Election Inspector Training
Calhoun County Chief Deputy Clerk of Elections
STOP!! Let the PCs boot up. This might take a minute or two.
STOP!! Let the PCs boot up. This might take a minute or two.
E-voting …and why it’s good..
Continuous Random Variables
Welcome to Employee Self Service
Improving Reliability of Direct Recording Electronic Voting Systems
iVotronic Precinct Worker Training Presentation
Texas Secretary of State Elections Division
واشوقاه إلى رمضان مرحباً رمضان
Accu-Vote Tabulator Preparation
Election Security Best Practices
Continuous Random Variables
Texas Secretary of State Elections Division
Central Counting Station & Central Accumulating Station
Election Security Best Practices
Presentation transcript:

Charlie Daniels Arkansas Secretary of State HAVA Compliant Voting Systems Security Considerations General Recommendations to Enhance Security and Integrity of the Ballot This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these action items during your presentation In Slide Show, click on the right mouse button Select “Meeting Minder” Select the “Action Items” tab Type in action items as they come up Click OK to dismiss this box This will automatically create an Action Item slide at the end of your presentation with your points entered. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting System Security Why Is Security Important? –Electronic Systems required by HAVA face intense scrutiny by the media and voter advocacy groups. The machines themselves are secure PROVIDED proper measures are in place to prevent fraudulent activity. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting System Security How Has Security Changed? –Some of the same security procedures election officials followed pre-HAVA still apply in a post-HAVA environment, including appropriate chain-of-custody and access to machines, etc. PEOPLE are just as important as machines! Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting System Security What Must I Know About Security? –Security Incident Reporting Arkansas has a mechanism for reporting ANY breach of security, suspicious practice/procedure, or damaged/missing equipment. Form available on Elected Officials Only page of or by requesting copies from the SOS office. All Local Election Officials should know about the form and if possible, make the form available to poll workers. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting System Security What Must I Know About Security? –Security Incident Reporting Forms should be filled out as completely as possible and faxed to the Secretary of State’s legal office IMMEDIATELY at The SOS will follow up with the appropriate entities to conduct an investigation. Security Incidents may be reported by voters, poll workers, or election officials. The important thing is to document the incident! Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Physical Security Who Has Access, When, & Where This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these action items during your presentation In Slide Show, click on the right mouse button Select “Meeting Minder” Select the “Action Items” tab Type in action items as they come up Click OK to dismiss this box This will automatically create an Action Item slide at the end of your presentation with your points entered. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting System Security Important PHYSICAL Security Do’s & Don’ts –DO keep all voting machines, PEB’s, Memory Cards, ballots, and peripheral equipment in a secure location with restricted access. –DO allow access to election equipment to authorized personnel ONLY (ID is a plus). –DO seal memory cards in the machines. –DO seal communication packs and PEB envelopes. –DO keep track of all keys to the voting machines. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting System Security Important PHYSICAL Security Do’s & Don’ts –DO make sure you can track ballot custody from signoff to tabulation. –DO secure the voted RTAL roll. It is the official ballot for a recount! –DO deliver PEB’s & Memory Cards separately from machines. –DO NOT leave the voting machines unattended for ANY reason until the machine is closed to voting. –DO NOT allow a voter to vote multiple ballots without canceling prior votes. –DO NOT leave PEB’s or memory cards at the polling site! Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Password Security General Password Tips This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these action items during your presentation In Slide Show, click on the right mouse button Select “Meeting Minder” Select the “Action Items” tab Type in action items as they come up Click OK to dismiss this box This will automatically create an Action Item slide at the end of your presentation with your points entered. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting System Security Important PASSWORD Security Do’s & Don’ts –DO run standard password controls. –DO change passwords regularly. –DO NOT share user name or password information. –DO NOT share passwords with poll workers for any function other than the main menu. –DO NOT write passwords down. –DO NOT allow a terminated employee’s password to remain active. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Network, Hardware & Software Security Tips About Unity Laptops This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these action items during your presentation In Slide Show, click on the right mouse button Select “Meeting Minder” Select the “Action Items” tab Type in action items as they come up Click OK to dismiss this box This will automatically create an Action Item slide at the end of your presentation with your points entered. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting System Security Important NETWORK Security Do’s & Don’ts –DO use your Unity Laptop ONLY for Election Management. –DO NOT install unauthorized software onto ANY election PC. –DO NOT connect your Unity Laptop to the Internet or other unsecured network. –DO NOT modem results from the polling site. –DO NOT allow installation of Unity Software on other PC’s. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting System Security Important SOFTWARE Security Do’s & Don’ts –DO make a backup copy of your EDM file and store in a secure location. –DO limit password access to the Unity software. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting Machine Security Checking and Double- Checking Your Machines This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these action items during your presentation In Slide Show, click on the right mouse button Select “Meeting Minder” Select the “Action Items” tab Type in action items as they come up Click OK to dismiss this box This will automatically create an Action Item slide at the end of your presentation with your points entered. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting System Security Important VOTING MACHINE Do’s and Don’ts –DO perform Logic & Accuracy Tests, including the reporting of results through ERM. TEST TEST TEST!!! –DO clear and test the machine before Election Day. –DO clear and test the PEB’s before Election Day! –DO clear test results from ERM before Election Day! –DO make sure the machine public count is ZERO before voting begins. –DO NOT allow a voter PEB access! Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting System Security Important BALLOT INTEGRITY Tips –DO periodically check machine public count with the poll book count. –DO have separate people receive and scan the ballots. –DO validate precinct results with ERM report. –DO NOT allow unauthorized access to paper or electronic ballots. –DO double-check & record materials delivery and complete a ballot accounting log. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting System Security Security and Integrity of Your Voting System: Reference Documents –Election Incident Reporting Form –Election Information Sensitivity Guidelines (What Voting System Information Is Prohibited from Release?) –ES&S “Tips for a Secure Election.” –Materials Available at Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Frequently Asked Questions About Security of HAVA Compliant Voting Systems What Everyone Reads in the Paper This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these action items during your presentation In Slide Show, click on the right mouse button Select “Meeting Minder” Select the “Action Items” tab Type in action items as they come up Click OK to dismiss this box This will automatically create an Action Item slide at the end of your presentation with your points entered. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting System Security Frequently Asked Questions –How Do I know My Vote Counts? Voter may verify his or her vote on paper record at the machine. That (RTAL) record is the official ballot in the case of a recount. The vote is recorded internally (3 different locations), on a separate memory card, in the PEB and on the RTAL printout. When in doubt, these records can be cross- checked against each other. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting System Security Frequently Asked Questions –How Do I know My Vote Counts? For optical scan, the original paper ballot can be consulted in cases of a recount. For all machines, precinct totals can be verified against countywide totals produced through ERM. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting System Security Frequently Asked Questions –Can the results be manipulated by Internet hackers? Arkansas DOES NOT modem results from the precinct to the Courthouse. The Unity laptop should NOT be connected to the Internet. Neither the Internet nor networked machines/PC’s are involved in reading and tabulating results. Reporting of results to the is done through a secure network with user name and password login. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting System Security Frequently Asked Questions –Can a voter insert something into the machine to destroy the programming or manipulate the election? The voter does not activate the machine. Only the poll worker has access to the PEB’s. The PEB only “talks” to the machine and the PEB reader at a secure location. It cannot be read or inserted into any other computer. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting System Security Frequently Asked Questions –What about studies that say Windows programs are vulnerable to hacking? Arkansas’s voting system uses proprietary software that performs Election functions only, nothing else. The software is NOT Windows-based. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State Voting System Security Frequently Asked Questions –How Can I Be Sure the Votes are Tabulating Properly? TEST TEST TEST! This cannot be stressed enough. When you receive your Election materials you MUST test them to ensure the machines AND the ERM software are programmed accurately. Successful testing ensures accurate results. Mark Martin Arkansas Secretary of State

Charlie Daniels Arkansas Secretary of State HAVA Compliant Voting Systems Security Considerations General Recommendations to Enhance Security and Integrity of the Ballot This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these action items during your presentation In Slide Show, click on the right mouse button Select “Meeting Minder” Select the “Action Items” tab Type in action items as they come up Click OK to dismiss this box This will automatically create an Action Item slide at the end of your presentation with your points entered. Mark Martin Arkansas Secretary of State