Best Practices for Election Technology
Election administration requires careful attention to security to maintain the integrity of the entire voting process. Election officials must develop and follow procedures to ensure the security of all components of the election process—from voter registration through final results certification. Best Practices for Election Technology highlights security features that are essential for protecting election technology.
Election officials can use this resource as a guide for assessing their own processes. Each section of this report includes a chart that provides an overview of the security measures election officials can use to secure their devices and systems. Additionally, each chart includes parts of the security process that can be communicated to the public.
This document can also be used by the public to better understand the types of security measures local election officials use to protect their election technology. While every state and local jurisdiction is unique, the security measures and procedures included in this document are common best practices across the United States.
Election Technology Security Measures by Equipment Type
Election officials and the public can see a complete list of security measures, organized by equipment type, in the interactive report below:
Click the full-screen icon to see a larger view of this report.
Election Technology Security Icons
Best Practices for Election Technology uses a variety of icons to illustrate key concepts of election security. Election officials are encouraged to download and use these icons to help communicate how they secure elections and voting systems at the local level. All icons used in the best practice guide are available in multiple formats at the link below.