Difference: AuditingUseCase (11 vs. 12)

Revision 122017-01-24 - NealMcBurnett

Line: 1 to 1

Auditing Use Case

Line: 12 to 12
  This use case may also provide the opportunity for discussion of additional auditing types or approaches as well. Different auditing approaches may make use of different kinds of election process information and utilize different strategies in order to establish their conclusions. For example
  • evidence-based elections require good evidence that the chain of custody of the paper ballots has been securely preserved.
  • targeted auditing of specific audit units (individual ballots, precincts, batches or other auditable collections of ballots) based on timely reporting of results by audit unit, mark density information in Cast Vote Records, indications of breaches in chain of custody, and other evidence or claims that the audit unit deserves scrutiny
  • poll book accounting or ballot reconciliation processes compare evidence of how many voters showed up at the polls or properly returned their ballots and cast votes, with the number of ballots counted. Discrepancies should be investigated, documented and factored into the overall assessment of the evidence. Secure and auditable methods of preserving event logs that document voter authorization, signature verification, ballot casting, ballot counting, etc. can be used to facilitate these forms of accounting.
  • security checks can be performed on seals, seal logs and surveilance tapes, and event logs can be checked for anomalies
More information is available at
This site is powered by the TWiki collaboration platform Powered by PerlPLEASE NOTE: This wiki is a collaborative website. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. All the material on this website is in the public domain, including any text, diagrams, or images, unless indicated explicitly. Don't share anything on this site that you do not want to be public. Do not pass any proprietary documents or put any on the TWiki with implied public disclosure. If you do, it shall be deemed to have been disclosed on a non-confidential basis, without any restrictions on use by anyone, except that no valid copyright or patent right shall be deemed to have been waived by such disclosure. Certain commercial equipment, instruments, materials, systems, software, and trade names may be identified throughout this site in order to specify or identify technologies adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the systems or products identified are necessarily the best available for the purpose. Any data provided on this site is for illustrative purposes only, and does not imply a validation of results by NIST. By selecting external links, you will be leaving NIST webspace. Links to other websites are provided because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other websites that are more appropriate for your purpose.