Elections Security: Learn it. Live it. Love it.
from: EAC Staff on
Jun 21, 2011
EAC staff recently conducted a training class with election officials about security. Topics included risk management, physical security and computer security.
We spent a lot of time talking about authentication mechanisms used in the field of information security. For elections, authentication may be used for staff access to buildings and warehouses as well as computer systems. Authentication examples include handwritten signatures, employee access cards, fingerprints, DNA and digital signatures. Although this is not an exhaustive list, we recommend the following when establishing passwords:
- Do not use default passwords!
- Use different passwords for different accounts.
- Use different passwords for different people.
- Use different passwords for different elections.
- No names or dictionary words. Example: JoshElection4.
- Randomness is key.
- At least 8 characters.
For more information, read EAC’s Election Management Guidelines chapters about system security, physical security, chain of custody procedures, acceptance testing and technology in elections. Also check out the security requirements in the next iteration of the Voluntary Voting System Guidelines. It’s a draft, but you’ll find lots of information about voting system security.
Back to Blog List