![]() Identified vulnerabilities should be taken seriously and mitigations implemented in a timely manner. Election officials use varying technological, physical, and procedural controls to help safeguard these systems and the integrity of the election processes they support. Get the Facts: Like all digital systems, the technologies used to administer elections have vulnerabilities. Rumor: Vulnerabilities in election technology mean that elections have been hacked and hackers are able to change election results. Identifying and mitigating vulnerabilities is an important security practice. Reality: The existence of a vulnerability in election technology is not evidence that the vulnerability has been exploited or that the results of an election have been impacted. ![]() Click an icon below to go directly to that section. You can learn more about mis- and disinformation from CISA’s Mis-, Dis-, Malinformation (MDM) team. Instead, this resource addresses election security rumors by describing common and generally applicable protective processes, security measures, and legal requirements designed to protect against or detect large-scale security issues related to election infrastructure and processes. It is not intended to address jurisdiction-specific claims. This resource is designed to debunk common misinformation and disinformation narratives and themes that relate broadly to the security of election infrastructure and related processes. Elections are administered by state and local officials who implement numerous safeguards to protect the security of your vote pursuant to various state and federal laws and processes. Mis- and disinformation can undermine public confidence in the electoral process, as well as in our democracy.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |