HFP Subcommittee Teleconference
Participants: Alexis Scott-Morrison, Alice Miller, Allan Eustis, David Baquis, John Cugini, John Wack, Nelson Hastings, Sharon Laskowski, Sharon Turner-Buie, Tricia Mason, Whitney Quesenbery Administrative Updates:
Discussion of VVSG Version 2 Draft 3.2.7 Alternative Languages This section got muddled in VVSG 05. Some states needs this and some don't. We don't want to mandate to every vendor that they must have this capability - but if they have it this is what must be done. Add a statement about "if supporting language, then …" No objections to comments 3.2.8 on privacy already covered so this section was skipped. 3.2.9 Usability for Poll Workers This section is in the roughest shape of any of our sections. It was in a different place in VVSG 05, we're trying to pull it together. 3.2.9.1 Operation - System must be easy to operate, easy to set up and break down, and have adequate documentation. This is new material. Sharon L is talking to experts to help cover these concerns. There is also concern about testing this in a test lab. Experts may not be realistic. We need a "typical" poll worker. Statement added about documentation usefulness - "must be suitable for use at polling place." 3.2.9.2 Maintenance - Old material, clean up, but same as before. No issues. 3.2.9.3 Safety Bullet "B" about quality control is not written very well. If we don't understand it, how can we test it. Maybe it should be removed. We should ask former committee members about it's intent, if not understandable, then remove it. Bullet "C" is good, maybe we should start with it. NOTE: Reminder that this section is above and beyond what every system must do. Implication that all the usability requirements must apply to the accessibility systems. 3.3 Accessibility Requirements Hasn't changed much since VVSG 05. It was really hashed out then. 3.3.1 General Same as VVSG 05 with a little rewording. 3.3.2 Partial Vision [John C will be rewriting this section. NOTE: May want a new section on "Initiating use of voting system - mode selection aspect"] Bullet "B" - Why is this here - "how will millimeters be calculated"? Because of comments from 05. 3.3.3 Blindness No issues 3.3.4 Dexterity No issues 3.3.5 Mobility Comment received for VVSG 05 - Guarantee room for human assistant. Do we want to address this. David - Please respond to this issue via email NOTE: For the next meeting we want to post that we invite access board members to participate. 3.3.6 Hearing Moved a piece about hearing aids to this section 3.3.7 Cognition New. No specific design issues. Discussion section includes specific features. 3.3.8 English Proficiency Treated as a disability. 3.3.9 Speech Uncontroversial Next meeting November 3, 2006, 2:00 p.m. EST. ********** |
HFP Subcommittee Teleconference Agenda:
Participants: Allan Eustis, John Cugini, Philip Pearce, David Baquis, Alexis Scott-Morrison, Whitney Quesenbery, John Gale Administrative Updates:
Status Update:
Review of Report (John Cugini):
Next meeting September 29, 2006, 11:00 a.m. Taxonomy of Voting System Records Production Approaches This is a brief, high-level paper on voting system approaches for the purposes of ballot records auditing. It presents an approach to categorizing these approaches in the VVSG 2007 using the class structure. It is meant for the purposes of discussion only. We group different approaches to voting system design into two broad categories: software-independent and software-dependent approaches. Software-dependent approaches are best exemplified by today's DRE systems: the accuracy of the captured votes depends to a large extent on the accuracy of the software used to record the votes. DREs do not produce other records that can be used to positively verify the accuracy of the captured votes. Software-independent approaches, on the other hand, produce voting records in such a way that their accuracy can be verified even if the voting system software contains errors or deliberate fraud. Such approaches should be, in theory, less expensive to test than software-dependent approaches. While VVPAT is one example of this approach, some end-end cryptographic approaches are also software-independent. The category Independent Dual Verification (IDV) consists of a variety of different voting system approaches, including current VVPAT and Op Scan (combined with Electronic Ballot Marking devices), and the more theoretical Witness approaches. While some of these designs, e.g., VVPAT, are purely software-independent, other designs such as Witness are somewhat software-dependent. This bears more explanation, as follows: In VVPAT, for example, the voter's indirect verification of the DRE's electronic record is backed up by the voter's direct verification of the paper record. Furthermore, the paper record cannot be changed by the voting system after the voter has verified it, thus it can be used in useful comparisons with the electronic record(s). Of course, some software is still involved and paper can be mishandled at later stages, so further security measures are still required. But, the two records can be compared for accuracy and errors/fraud in In the Witness design, (Witness is a theoretical approach that no vendors admit to pursuing but it is useful for illustrative purposes) a camera takes a picture of the DRE's summary screen immediately after a voter finalizes his or her ballot and the voter does Thus, one indirect verification takes place - if the camera displays the photo it has taken, two indirect verifications are possible. But, the camera-related software involved is hopefully relatively small and thus more easily verified for correctness than, say, the DRE itself. Two or more records are produced, and the DRE's electronic records can be compared against the digital photos and verified. This approach would be preferred over the pure DRE approach. Consequently, some software-dependent approaches are preferred over others. More testing of these approaches is warranted, with some sort of a sliding scale going from IDV approaches (less testing) to DRE approaches (more testing). The high-level taxonomy of software-independent and -dependent approaches, then, would be as follows: 1. Software-Independent Approaches 2. Software-Dependent Approaches **************** |