Government Technology

New Jersey Delays Voting Machine Paper-Record Requirement



March 9, 2009 By

New Jersey Gov. Governor Jon S. Corzine (pictured) signed the delay legislation last Friday

New Jersey Gov. Jon S. Corzine, citing the state's "critical economic situation and lack of appropriate technology" signed a bill into law Friday that delays a Jan 1 requirement that voting machines produce individual permanent paper records. The state has been wrestling with the question of voting machine reliability for some time.

According to media reports, the requirement if enacted, would cost around $20 million to fit 10,000 voting machines with printers. The bill just signed into law delays implementation "until the federal government supplies the necessary funds."

New Jersey Assemblywoman Joan M. Quigley sponsored the delay legislation which includes a pilot program to test the printing system.


| More

Comments

Valerie Lane    |    Commented March 9, 2009

I was born and raised in NJ and I care about your votes. Please learn the truth about e-voting systems, both touchscreen and op/scan paper ballot tabulation machines. In 2007 the CA Top- to-Bottom- Review of voting systems resulted in all machines made by three vendors being decertified for systemic technical system security vulnerabilities.While the Secretary of state conditionally re-approved the faulty systems if mitigating security measures were employed, we now have proof (Humboldt County Nov 2008 election) that these measures are inadequate to protect the integrity of the vote. Read the TTB R reports on SoS Debra Bowen's website. Elections>Voting>Oversight Top-to-Bottom Review. These machines were all federally certified! Don't be fooled. Insist on a completely observable vote count.

Valerie Lane    |    Commented March 9, 2009

I was born and raised in NJ and I care about your votes. Please learn the truth about e-voting systems, both touchscreen and op/scan paper ballot tabulation machines. In 2007 the CA Top- to-Bottom- Review of voting systems resulted in all machines made by three vendors being decertified for systemic technical system security vulnerabilities.While the Secretary of state conditionally re-approved the faulty systems if mitigating security measures were employed, we now have proof (Humboldt County Nov 2008 election) that these measures are inadequate to protect the integrity of the vote. Read the TTB R reports on SoS Debra Bowen's website. Elections>Voting>Oversight Top-to-Bottom Review. These machines were all federally certified! Don't be fooled. Insist on a completely observable vote count.

Valerie Lane    |    Commented March 9, 2009

I was born and raised in NJ and I care about your votes. Please learn the truth about e-voting systems, both touchscreen and op/scan paper ballot tabulation machines. In 2007 the CA Top- to-Bottom- Review of voting systems resulted in all machines made by three vendors being decertified for systemic technical system security vulnerabilities.While the Secretary of state conditionally re-approved the faulty systems if mitigating security measures were employed, we now have proof (Humboldt County Nov 2008 election) that these measures are inadequate to protect the integrity of the vote. Read the TTB R reports on SoS Debra Bowen's website. Elections>Voting>Oversight Top-to-Bottom Review. These machines were all federally certified! Don't be fooled. Insist on a completely observable vote count.


Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
Best Practice Guide for Cloud and As-A-Service Procurements
While technology service options for government continue to evolve, procurement processes and policies have remained firmly rooted in practices that are no longer effective. This guide, built upon the collaborative work of state and local government and industry executives, outlines and explains the changes needed for more flexible and agile procurement processes.
Fresh Ideas In Online Security for Public Safety Organizations
Lesley Carhart, Senior Information Security Specialist at Motorola Solutions, knows that online and computer security are more challenging than ever. Personal smartphones, removable devices like USB storage drives, and social media have a significant impact on security. In “Fresh Ideas in Online Security for Public Safely Organizations,” Lesley provides recommendations to improve your online security against threats from social networks, removable devices, weak passwords and digital photos.
View All

Featured Papers