Donate
New Democracy Maps

POLICY SPOTLIGHT: FIVE APPROACHES TO ACTUALLY SECURE U.S. ELECTIONS

Policy Spotlight: Five Approaches to Actually Secure U.S. Elections details five policy approaches that states should adopt to truly secure elections, while also ensuring that every eligible voter is able to easily cast their vote.

Election Security Approach 1: Protecting election officials from threats and harassment 
The MAP report outlines the ways that horrific threats to election officials and their families – including death threats – have resulted in a mass exodus of qualified, experienced officials. MAP’s Democracy Maps show that only three states (Colorado, Oregon, and Maine) have enacted laws that provide additional protections to election officials.  
 
Election Security Approach 2: Preventing Insider Threats 
The security and integrity of our elections have been threatened by bad faith actors working on the inside to sabotage election equipment and potentially impact election results. For example, election officials have granted unauthorized access to voter information and election results to political operatives. The resulting breaches have occurred in at least five states, including Colorado, Georgia, Michigan, Ohio, and Pennsylvania.  


States could enact laws – like Colorado did this year to increase election security by increasing penalties for facilitating authorized access to voting equipment and ensuring proper monitoring of voting equipment and systems. The federal Cybersecurity and Infrastructure Security Agency has also advised all states to adopt policies similar to those in Colorado.  


Election Security Approach 3: Modernizing Voter Registration 
Three key policies can modernize voter registration while improving election security, increasing access, and lowering barriers to voting: automatic voter registration, ensuring the accuracy of voter rolls, and online voter registration.  

 
Election Security Approach 4: Secure Technology for In-Person Voting and Voting by Mail 
For in-person voting, the use of voter-verified paper ballots is a core way to ensure the security of voting machines and guard against interference. In 37 states, the majority of voters can use secure voting machines with a verifiable paper trail, as tracked on our Democracy Maps.   


Online ballot tracking is an important way that states can further improve the security of mail voting. Nearly every state allows voters to track the status of their vote by mail ballot. Only five states – Illinois, Mississippi, Missouri, Texas, and Wyoming – don't allow all voters to track the status of their mail ballot.  

Election Security Approach 5: Appropriate Use of Post-Election Audits 
Truly independent and nonpartisan audits following an election are a best practice in election administration – assuming that those audits are legitimate and truly nonpartisan. 39 states already require routine post-election audits that are nonpartisan.  


An additional method to ensure the security and integrity of elections is through risk-limiting audits, which use statistical methods to analyze samples of ballots to ensure the accuracy of election results. Currently only 12 states conduct best-practice risk-limiting audit


Recommended citation:
Movement Advancement Project. September 2022. Policy Spotlight: Five Policy Approaches to Actually Secure U.S. Electionswww.mapresearch.org/Election-Security-Report-2022. [Date of access].

Stay Informed

Be the first to know about new reports and MAP news by signing up for our newsletter


Request User Access

A limited set of materials is restricted to the staff and board members of LGBTQ movement organizations. Click below to request user access.

Join MAP

View our privacy policy.

Sexual Orientation Policy Tally

The term “sexual orientation” is loosely defined as a person’s pattern of romantic or sexual attraction to people of the opposite sex or gender, the same sex or gender, or more than one sex or gender. Laws that explicitly mention sexual orientation primarily protect or harm lesbian, gay, and bisexual people. That said, transgender people who are lesbian, gay or bisexual can be affected by laws that explicitly mention sexual orientation.

Gender Identity Policy Tally

“Gender identity” is a person’s deeply-felt inner sense of being male, female, or something else or in-between. “Gender expression” refers to a person’s characteristics and behaviors such as appearance, dress, mannerisms and speech patterns that can be described as masculine, feminine, or something else. Gender identity and expression are independent of sexual orientation, and transgender people may identify as heterosexual, lesbian, gay or bisexual. Laws that explicitly mention “gender identity” or “gender identity and expression” primarily protect or harm transgender people. These laws also can apply to people who are not transgender, but whose sense of gender or manner of dress does not adhere to gender stereotypes.

Choose an Issue

Choose an Issue