Computerworld - State and local election officials, looking to meet federal voting regulations, are buying electronic voting gear despite a lack of best practices guidance and money.
The deadline for meeting the mandates of the Help America Vote Act (HAVA), which requires that an e-voting machine be installed at every polling location, is the first election after Jan. 1, 2006.
Governments are buying the gear in the midst of a continuing controversy over the reliability and security of e-voting machines, the lack of a so-called paper trail of votes from some systems, and the fact that there are few lists of systems and best practices certified by state or federal agencies.
Complaints last week from some election officials came days after the Government Accountability Office issued a report contending that questions about the security and accuracy of electronic voting systems are likely to continue into the 2006 elections.
The GAO called on the U.S. Election Assistance Commission to define security policies and set up a machine certification program.
HAVA was passed after the controversial 2000 presidential election in order to correct shortcomings in voting practices and equipment. It mandates a number of changes to improve the reliability of balloting systems and processes.
Voting districts not meeting the deadline face penalties issued by the U.S. Department of Justice, said a spokeswoman for the Election Assistance Commission, which is charged with helping to implement HAVA mandates.
One of the bones of contention is that no guidelines have been set up to ensure that machines meet the federal requirements, officials said. For example, a number of local officials want to implement e-voting systems that provide paper trails, but there are no federal criteria for doing so.
"The [GAO] report buttresses what we've been saying," said Ion Sancho, supervisor of elections in Florida's Leon County, which uses optical scan devices that have to be supplemented with e-voting machines under the HAVA law. "There are concerns [that] need to be addressed," he said, citing both potential electronic and human errors.
The government is forcing a rush into e-voting without having established adequate technological guidelines, said Matthew Zimmerman, staff attorney at the San Francisco-based Electronic Frontier Foundation, a civil rights advocacy group that focuses on technology issues.
To ensure that e-voting machines are accurate, the commonwealth of Pennsylvania mandated that vendors provide source code, said Leonard Piazza, director of elections in Luzerne County, Pa.
Currently, Luzerne County uses lever-activated devices, but $5 million has been set aside to buy e-voting machines, Piazza said. The county hopes to buy machines that offer paper trails but is awaiting a list ofmachines that have been certified by the state, he said.
The matter of vote validity aside, there is still the cost to consider, said some officials. For example, Lubbock County, Texas, installed $2.6 million worth of e-voting machines from Austin-based Hart InterCivic Inc., said County Commissioner Ysidro Gutierrez. The cost "was a financial burden to the county," Gutierrez said.
Read more about Gov't Legislation/Regulation in Computerworld's Gov't Legislation/Regulation Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts