CASE Logo
  Citizens’ Alliance for Secure Elections
Dedicated to secure, reliable and voter verifiable elections in Ohio !

Old Glory

Now you can
Donate to CASE!

Please Click Here



This website is a work in progress, designed and maintained by volunteers. Thanks for visiting.

Best Practices

to ensure secure, reliable, and honest elections in Ohio


The following is a composite summary of the most significant “Best Practices” procedures recommended by the following organizations, with primary emphasis on the the EAC. The separate details of each organization’s suggestions can be found by selecting the appropriate link:

Elections Assistance Commission (EAC)

Cal Tech/MIT Voting Technology Project
(download pdf 95 pages)


Brennan Center for Justice (NYU School of Law) and the Leadership Conference
on Civil Rights

(download pdf 14 pages)


NSF / Harvard Symposium on Voting

National Ballot Integrity Project

League of Women Voters
(download pdf 16 pages)

C.A.S.E. Best Practices Crucial Summary pdf (download 3 pages)

C.A.S.E. Best Practices Combined Details pdf (download 29 pages)


(download pdf of this webpage - 9 pages)


For ease of reference this page is divided into several sections. Select a link to navigate to the specific section desired:
I. Administration & Security
II. Punch Card Voting Systems
III. Optical Scan Voting Systems
IV. Direct Recording Equipment (DRE)


I. Best Practices in Administration & Security for All Voting Systems


Voter Outreach

1. Sample ballot and, if practical voting machines, should be taken out into the community – shopping malls, churches, high schools, public meetings, etc. – to demonstrate how to properly complete it.
2. A voter education program should be conducted to inform people who move, who change their name, who are released from jail after a felony conviction, etc. of need to reregister in order to be able to vote.
3. A voter education program should be implemented using the media, video clips and public service announcements to educate voters about the voting process.
4. Include explicit instructions when sending out absentee ballots to inform the voter that the ballot will not be counted if it is not received in time, or if it is soiled or bent.
5. Pre-election Notices to the Voters as to when and where they should vote.

Poll Workers

1. Implement a “Partners in Democracy” Program to Attract and Retain Younger Pollworkers: College Pollworker Program, High School Student Pollworker Program, Adopt-a-Poll.
2. Include training on Help American Vote Act (HAVA) requirements. For maximum retention by pollworkers, training should occur as close to Election Day as possible (optimally not more than six weeks prior).
3. Consider multiple shifts for precinct workers. One might split the day into two eight hour shifts.
4. Consider shorter shifts to handle the peak hours, as is done with many service operations.
5. Evaluate pollworker performance via analysis and tracking of errors to a specific precinct. Use the analysis to constantly improve your training approach and materials … and to help select the best pollworker teams.

Election Operations/Security

1. Test every piece of voting equipment prior to deployment, using the ballot styles for that election. Invite the public and media to a “public test of the system.”
2. Ensuring Transparency to bolster public confidence, take steps to make every component of administering your voting system as transparent as possible. Invite the public and media to view all aspects of testing.
3. Require staff and pollworkers to keep an Election Day “problem log” for all problems that are reported and how they were handled.
4. Establish a chain of custody to protect all ballots in the polling place (including provisional ballots, emergency ballots and absentee ballots dropped off at polls).
5. Security tape with sequential serial numbers must be used. A log should be maintained each time the seal is broken. The log should include the date, time, and person accessing the secured item, along with the serial number of the old security tape that was broken and the number of the next security tape that is placed on the secure item. If the serial number of the new security tape is not the nest sequential number then a breach
6. If you are modeming in your unofficial results, use a phone line – not a wireless connection – and ensure the modem encrypts the information.
7. Voter-verified paper ballots for all federal and state offices (including printed ballots, optical scan/mark sense and punch card ballots, as well as voter verified paper ballots produced by touch-screen machines). Those jurisdictions whose equipment does not produce such ballots must use printed ballots for all state and federal offices.
8. Hand-counting of all votes (cast both in-person and absentee, with witness signature) for federal and state offices, conducted by the election judges at the precinct/polling place, with citizen oversight and assistance, immediately upon close of polls, with the results of this hand-count serving as the official tally.
9. Vote totals recorded immediately upon completion of the hand-count in triplicate on official report forms and signed by all election officials and observers present.
10. Immediate public and prominent posting at the polling place of one signed copy of the official hand-count. All ballots sealed in the ballot box, along with all tally sheets and one signed copy of the official report form. The sealed ballot box and remaining signed copy of the official report form are to be delivered directly to the controlling election officials.
11. Official election results will be compiled directly from the signed tally sheets/report forms from each polling place. No central servers or other tallying mechanism(s) manufactured, sold, leased or promoted by any manufacturer or vendor of any type of electronic voting equipment may be used to aggregate these results. Election authorities must retain all paper ballots, tally sheets and all signed copies of the official report form, in a secure location until the statute of limitation expires.
12. The paper ballots shall be the only instruments possessing legal vote status, and the hand-count will serve as the official basis for all 2004 state and federal election results at each level and phase of the process.
13. Require bipartisan or third-party monitoring of sensitive election procedures.
14. Require transparency in the operation and management of voting systems.
15. Make “random” spot checks truly random by using a transparent and public method for random selection.
16. Allow the press, and any citizen, to audit if they pay for it. If they discover that the election was miscounted, reimburse them. Find ways to do these audits inexpensively.
17. Allow each party to select a handful of precincts to hand-audit. Discretionary audits shine light into any precincts deemed suspicious.
18. Require audits for insufficient randomness (e.g., three candidates get 18,181 votes; voters arrived in alphabetical order).
19. Consider a 100 percent audit of the paper ballots.

return to top
return to navigation list


II. Punch Card Voting Systems


Voter Interaction with Voting System/ Voter Education

1. Discourage butterfly and caterpillar ballot layout.
2. In order to reduce errant punches, use a custom-punched mask containing holes only for
positions utilized.
3. Train pollworkers to go through with a demo ballot in each vote recorder to make sure it is not possible to punch through any areas where there are no contests for that election.
4. Check the clarity of ballot layout with a usability consultant or by testing with focus groups of potential voters.

Problems with “Chads” – How do you treat unreadable punch card ballots?

1. Encourage voters to remove chads from their own ballot.
2. Protect ballot from tampering during counting and post-election procedures.
3. Consult state policies or, if there are no state policies, establish county policies for what
constitutes a vote.
4. Confirm with your vendor that their perforation template is sufficient cutting depth and
position accuracy.
5. Stylus – Use a non-blunt, positive chad remover “PCR” needlepoint tip. It is more expensive but more likely to push chad through.

Providing Second-Chance Review with Punch Card Systems

1. Clear instructions and good ballot layout are critical in preventing voter errors.
2. Encourage the voters – not the pollworkers! – to clean the chad off their own ballots.

Testing/System Integrity

1. Proof to ensure vote recorder pages are pointing to the right candidate and in correct order.
2. Pre-election logic and accuracy testing--develop test deck without vendor assistance--using an incremental test pattern that tests all voting positions. Conduct a pre-test by
running the test deck through the ballot counter multiple times to verify that the test deck
has been correctly marked.
3. Store sealed memory card in locked office; secure it after Logic and Accuracy test.

Pre-election Management and Security

1. Buy new card stock for every election. Gives cleaner punches, avoids swelling and bowing.
2. Have your ballot counters professionally serviced before every election.
3. Establish policies to prevent poll workers from mishandling the punch card ballots. The
policies are designed to ensure that no one should have the opportunity to alter or change the ballot in a way that will compromise the integrity of the ballot.

Maintaining punch card equipment

1. Blow out the chad from the counters (chad receptacles) after every election.
2. Establish procedures for “chad-picking.” The process should be transparent. Have bipartisan teams do the picking. Example: Ohio Advisory 2001-04 sets policies regarding
canvass board inspection for and removing chad, remaking ballots, etc. for the purpose of
determining what constitutes a vote.

Protecting the security of printed ballots

1. Use a certified print vendor and get the exact specifications from the vendor for the printing.
2. Keep every generation of every proof.
3. Seal the tabulation machine with numbered seals when election definition is loaded and then record the numbers in logbook.

Chain of Custody

1. Keep all communications with your print vendor and your programmer.
2. Keep a log of everyone who lays out, proofs, transports, stores, etc.
3. Never let a vendor proof your ballots.
4. Require electronic transmission of ballot format to/from printer.
5. Make time to proof every ballot, every version, every correction.
6. Establish security procedures for printing and shipping of ballots.
7. Bring candidates, voters and community organizations in to review. Also, post to your
website.
8. Have security procedures in case of a disaster.

Election Day/Election Night Security

1. Develop accounting and documentation procedures to make sure you get the cards back
from polls.
2. Segregate “hanging chad” ballots for challenge board to make decision.
3. Install a security camera where your ballots are stored and where you are counting.

Post-Election Management and Security/Equipment maintenance

1. Clean the chad out of the vote recorders after every election, attempted votes may not
register.
2. Establish procedures for “chad-picking” at central ballot counting site. The process should be transparent and uniform statewide. Have bi-partisan teams do the picking.

return to top
return to navigation list


III. Optical Scan Voting Systems


Voter Interaction with Voting System/Voter Education

1. Provide clear voting instructions with explanatory graphics, on the ballot if possible.
2. Provide a secrecy sleeve to cover the ballot prior to scanning and print instructions on the ballot sleeve.
3. To help voters properly cast a write-in ballot, use a secrecy sleeve. Use the language: “write in, if any” to avoid overvotes.
4. To improve ballot layout: when you design the ballot, be wary of where absentee voters may fold the ballot. On certain systems, a fold through an oval will reflect a vote, causing an overvote if another mark was made.
5. Avoid splitting races across pages and across columns to prevent over-votes.

Providing Second-Chance Voting with In-Precinct Scanners

1. Allow voters the opportunity to have their ballots scanned for error before leaving the
pooling location and dedicate a pollworker to assisting voters with the casting/feedback
function for major elections.
2. Establish procedures for resolving “unvoted” (damaged, defective or blank ballots) ballots left by “fleeing voter.”
3. Have written procedures to determine voter intent for the purpose of “remaking” or hand counting ballots. If “remaking” ballots, use labels or overmarks so that voter’s original marks will not be lost.

Testing System Integrity & Security

1. Test the calibration of every scanner prior to the election.
2. Conduct printing tests and quality control tests.
3. Lots of test ballots of every ballot style, with as many permutations and combinations of
potential ballots as possible.
4. If test ballots are prepared by the vendor, they must be supplemented with additional test ballots made up by the county and/or interested citizens.
5. Hand tally machine generated results.
6. Ballot programming should be done by the county, NOT the vendor.

Protecting the security of printed ballots

1. Use a certified print vendor and get the exact specifications from the vendor for the printing.
2. Develop procedures to make sure the printer did not mix up stacks of printed ballots.
3. Keep all communications with your print vendor and your programmer.
4. Track anyone who lays out, proofs, transports, stores, etc.
5. Never let a vendor proof your ballots.
6. Establish security procedures for printing and shipping of ballots.
7. Bring candidates, voters and community organizations in to review. Also, post to your
website.

Election Day Management and Security

1. Log all seal numbers. Don’t open it until all board members are together. Have two officials present when count packets of ballots.
2. Develop a troubleshooting plan. Define the response time - know how long it will take to get a troubleshooter to the polling place. Have satellite locations from which to dispatch technical people and replacement supplies.
3. Verify that the electronic and optical scan machines used are the same as the systems that were certified.
4. Establish procedures for determining voter intent using uniform vote counting standards
and for counting ballots that cannot be scanned. The process for counting ballots should be open and conducted under bipartisan scrutiny.

Post-Election Management and Security

1. NIST recommends against using a wireless transmission mode. There are no wireless (“Wi-Fi”) or international security standards for wireless transmission of data.
2. Have two pollworkers transport results.
3. Establish procedures for when security measures are not followed such as when materials come back unsealed or unsigned.
4. Ballot Reconciliation Audit: Do a precounting of stacks of ballots or you could compare the voter body count to the ballot count run through the scanner. This is so you know the
number going in to the machine to be read. This is especially important in processing
absentee ballots.
5. Audit of the machines after the elections. Select 5% of all the precincts, randomly selected and well-distributed over districts, with all the votes on those 5% manually counted and compared with the results of the machine count. BIP parallel testing is better.

return to top
return to navigation list


IV. Direct Recording Equipment (DRE)


Voter Interaction with Voting System / Voter education

1. Develop a web-accessible sample ballot that shows each screen, including the instruction and ending screen.
2. Track over-vote and “under-votes.” Develop Election Day procedures to help determine the nature and cause of under-votes and blank votes to determine whether they are genuine undervotes or the result of voter confusion.
3. Ask minority language organizations to review ballot translations.
4. If you find a higher percentage of voter error in certain communities, work with pertinent community groups to educate voters in those communities.

Pollworker Training and Polling Place Procedures

1. Use USB’s as machine power source; connect each machine to a USB. Daisy-chaining machines may become a single point of failure. Have a back-up plan and train pollworkers on how to troubleshoot and report alleged “power failure” problems.
2. Pollworker Accountability. Establish checklists to track pollworker performance on key steps of DRE voting processes.

Pre-Election Day Management and Security

1. Rely as little on the vendor as possible; look for outside IT expertise if it is not available in house. Have either election staff or independent consultants design and run tests.
2. Establish a deadline for patches or modifications to prevent unnecessary confusion.
3. Ensure all software, including patches, is certified.
4. Develop sound documentation of all election administration procedures that will allow you to identify