Voting Security Amendment
In order to clarify the operations and rules for operating software used to hold RA elections, the following will be added to article 2 of the constitution:
The Scientific Council may deputize one or more citizens to provide software, hosting services, and operations support for the election of the RA. These deputies will:
1. Be bound by contract not to release data, either detailed votes or aggregate figures, nor to comment on election results to any person other than a member of Scientific Council or a designated election deputy until the polls close and results are certified.

2. Provide unidentified detailed votes as well as aggregate figures on a daily basis to the members of the Scientific Council so they may monitor the availability and accuracy of the voting software.

3. Insure that software used in the election implements the rules for eligibility, voting, and counting votes as described in the constitution.


4. Maintain server and application security, providing privileged access only to the SC members or their designates.

5. Build into software, where possible, the ability for citizens to check that their votes are correctly registered, and maintain a complete time-stamped record of every transaction that results in a vote being cast.

6. Provide copies of all software source code to the SC for review, and on request, provide detailed explanations on the operation of that software.

7. On request by the SC, provide unencumbered root user access to servers, including software, database, and log files to SC members or their designates.

None of these restrictions will be taken to restrict any deputy’s civil rights, including the right to equal suffrage, the right to hold and execute the duties of elected public office, or the right to free speech apart from the specific agreement described by this amendment.