How does Everyone Counts verify that a voter is who they say they are?
Everyone Counts authenticates voters using credentials identified by the election administrator from the voter registration database. These can include any authentication required by local law such as a drivers license, digits from a social security number or date of birth, and often a voter ID number or PIN sent to the voter prior to the election for additional security.
Is a signature required?
If required by law, a voter signature can be required on returned ballots. Everyone Counts' voting systems do not require biometrics, special electronic ID devices, or smart cards, but support any of the above.
Why choose an encrypted ballot over a clear ballot?
On Everyone Counts systems, election administrators are free to provide either clear text ballots or encrypted ballots. Many administrators prefer the voter privacy of encrypted ballots, while others may choose clear text despite reduced voter privacy. Everyone Counts recommends the additional security and secrecy of encrypted ballots where ballot privacy is a concern.
How do you prevent hacking, viruses or malicious code from affecting election results?
Please download our Security Whitepaper for detailed discussion of our unique security measures to ensure election reliability.
How is the digital ballot box secured and who has access?
Ballots in Everyone Counts digital ballot box are locked and protected using military-grade encryption formulas. Only a quorum of authorized election officials can unlock a digital ballot box for decryption.