Original contract between Dominion and Georgia.
Exhibit B (page 49)
Contract
Quote:
11.7 Data and Network Security. 11.7.1 Contractor is responsible for providing network security and security for such of its facilities where its servers or other network equipment are located. Contractor shall also comply with its own then current security policies and procedures, and its security policies and procedures shall comply with laws and regulations applicable to Contractor.
11.7.2 If, during the course of this Agreement, Contractor is creating, hosting, maintaining, processing or transmitting any State Confidential Information on or through any Contractor computer networks, data centers, labs, supporting environments, Web servers or other information technology resources (collectively "Contractor Computer Systems"), or is otherwise using any Contractor Computer Systems in connection with this Agreement, then with respect to all such Contractor Computer Systems, Contractor will, in accordance with industry best practices or higher standards that are in all cases no less than reasonable:
(a) Limit physical and electronic access to Contractor's employees and essential third-party contractors, on a need-to-access basis, who have signed a written agreement that is at least as protective of the confidentiality and security of State Confidential Information as those provided in this Agreement;
(b) Implement and maintain technical access controls that, at a minimum, require unique identification and authentication of all users, restrict access to all data, software, or other file-system objects exclusively to those users who need such access to perform their job responsibilities, and limit administrator-level control to only authorized IT personnel;
(c) Implement and maintain transmission controls that, at a minimum, allow only the data protocols required for the function and management of each solution to be used or transmitted and insure the confidentiality, availability, and integrity of all transmissions;
(d) Implement and maintain firewall technology and intrusion detection software configured to minimize or eliminate hacking and other threats;
(e) Implement and maintain protection against viruses, worms, Trojan horses, spyware, and other malicious code;
(f) Perform routine reviews of logs files and system records for suspicious activity;
(g) Perform regular reviews of relevant security notifications and alerts (e.g., notifications of bugs, attacks, and patches), and apply such patches and fixes as appropriate;
(h) Implement and maintain disaster recovery, backup, and other contingency plans; and
(i) Conduct regular security audits, reviews, and tests and systematically retain log files, system records, test plans, and other security documentation.
11.7.3 Contractor shall notify State immediately upon discovery or notification of any actual, potential or threatened Security Breach. Contractor agrees to take action immediately, at its own expense, to identify and eradicate (or to equip State to identify and eradicate) any further Security Breach and carry out any recovery necessary to remedy any impact of such Security Breach. Contractor's actions will include at a minimum:
(a) Confirming the attack;
(b) Denying access from the source of the attack;
(c) Investigating and evaluating the extent of the damage, if any;
(d) Backing-up the affected systems and those suspected to be affected;
(e) Strengthening defenses everywhere, not just the suspected path that the attacker used, if possible;
Exhibit B (page 49)
There are also some graphs accompanying that section that I can't import here that could be of assistance.Quote:
EQUIPMENT, SOFTWARE, DELIVERY DATES AND PURCHASE PRICE(S)
1. Democracy Suite (EMS) Software description Democracy Suite is an Election Management System (EMS) that supports all ImageCast voting channels: early votes, vote by mail votes, Election Day votes from touchscreen ballot marking devices (ICX) and Scanner, and Uniformed and Overseas Citizens Absentee Voting Act (UOCAVA) votes, from a single comprehensive database.
The structure of the election files, as well as the content of the iButton security keys, is bit-level sensitive with regards to accuracy and precision. This means that a single bit change can influence system behavior. The structure of these interfacing entities is dependent on the election domain business logic implemented within the system. Therefore, within the EMS EED application, election files and iButton security keys can only be created when the election project is in the "ballot generated" state.
From an accuracy point of view, CRC checks are implemented. From a security point of view, election files utilize SHA256 (keyed hash HMAC) or digital certificates and AES encryption for data integrity and confidentiality. The figure below presents an overview of the EMS interfaces, focusing on the Democracy Suite internal and external entities.
The Democracy Suite system includes the following Third Party Software:
EMS Standard Server Prerequisites
Microsoft Visual J#
Microsoft Visual C++ 2013 Redistributable Package
Microsoft Visual C++ 2013 Redistributable Package (64bit)
Microsoft Visual C++ 2015 Redistributable Package (32bit)
Microsoft Visual C++ 2015 Redistributable Package (64bit)
Java Runtime Environment
Microsoft SQL Server 2016 Standard -(Microsoft SQL Server Management Tools)
Cepstral Voices
Arial Narrow Fonts
EMS Client Workstation Prerequisites
Microsoft Visual J#
Microsoft Visual C++ 2013 Redistributable Package
Microsoft Visual C++ 2015 Redistributable Package 64bit Java Runtime Environment
Maxim iButton Driver
Adobe Reader
Microsoft Access Database Engine Open XML SDK 2.0 for Microsoft Office
Arial Narrow Fonts
Adjudication Workstation Prerequisites
Dell Latitude T3420 Laptop
Microsoft Visual J#
Microsoft Visual C++ 2013 Redistributable Package
Microsoft Visual C++ 2015 Redistributable Package 64bit
Java Runtime Environment
Adobe Reader
Contract