Cyber Law Compliancy and Electronic Voting

.

 

India has created history of sorts this time by conducting the entire election process using Electronic Voting. The Electronic Voting Machines (EVM)  used in India have been appreciated by several international observers and hailed as useful, innovative and tamper proof.

However, it is often said in Jurisprudence that "Justice is not only to be done but should appear to have been done". In this context, the agitation of some villagers near Bannur in Karnataka alleging a suspicion that "Votes cast for BJP and JD (S) were added for Congress " (As reported in Indian Express, 27th April 2004) highlights the possible doubts in the minds of th public when they sue the EVMs.

Today, the Indian EVM s work on the basis of trust reposed on the Election Commission officials who are responsible for the configuration of the EVMs and checking done before they are put to voting. There is no visible evidence provided to the public that can prove that the configuration was not manipulated.

During the manual ballot paper time, there were possibilities of "Booth Capturing" where bundles of pre-stamped ballot papers could be thrust in the box. In the EVM era, this can still happen if the Booths are physically captured. However, the Election Commission (EC) has effectively addressed this issue through higher security at the polling stations and ordering of repolls whenever there is a doubt. Though this has made the election a 3 week affair negating the advantages of the EVMs and inroducing the new controversies on "Exit Polls", the fairness of the election process has been ensired through better physical security.

However, security in the EVM scenario cannot end at the physical level. There is a distinct possibility of the EVMs being malconfigured to count votes cast in a pre determined way. This can happen either at the machine level or during consolidation. The EC officials cannot be expected to have the necessary expertise in monitoring such possibilities and have to depend on the expertise and integrity of the officials of BEL (Bharth Electronics Ltd), the public sector corporation which produces the EVMs.

While not casting any aspersions on the integrity of any officials of the EC or the public sector BEL, it is necessary to state that the system is amenable for misuse by any single inidvidual who may be corrupt in the system. If the recent leakage of question papers in the IIM examinations or CBSE examinations or the Telgi scam are any indication, one must accept that the EVMs are also amenable for misuse, particularly sine the stakes are far grater than event he Telgi scam.

The principle of security that we need to remember here is that "If there is a possibility of a fraud, one day or the other, one person or the other may be tempted to commit the fraud".

It is therefore necessary that rather than making our EVMs and the Indian Election Process subordinate to the integrity of the officials, there must be a legally accepted accountability built into the system of Electronic Voting.

The EVMs which are being used in India were designed when India did not have Cyber Laws in place. Today, ITA-2000 is the law of the land and any electronic document is subject to the provisions of the ITA-2000.

Question therefore arises whether the EVMs are Cyber Law Compliant? and whether they follow the provisions of ITA-2000 wherever it is relevant?

It is difficult to pass a judgement in this regard since the software driving the EVMs is not in public domain and the manner of the internal functioning of the EVMs is not made public either by the EC or BEL.

In the United States, there is a concerted effort to oppose Electronic Voting precisely for this reason  of lack of transparency. (Refer http://www.verifiedvoting.org for details of the movement). This movement advocates the need for transparent, reliable, and publicly verifiable elections. One of the features demanded is the publishing of the software source code used for Electronic Voting and the other is maintenance of a paper trail for voting. The US is therefore considering alternative Electronic Voting systems that address these needs.

From an external observation of the EVMs in India, it does not appear that the system is designed to comply with the laws as provided in ITA-2000. There is therefore a ground to believe that the Indian EVMs are not "Cyber Law Compliant".

An attempt has therefore been made now to bring in Cyber Law Compliancy to Electronic Voting Systems and one such system is being designed by an entrepreneur in Chennai. The details of the system will be shared with the public at the appropriate time.

While the elections 2004 has successfully gone through, and there has been international appreciation for the Indian EVMs, we can be proud of our achievements. At the same time it is necessary for the EC and BEL to start looking at developing the next generation EVMs that are not only functionally acceptable but are also Cyber Law Compliant.

Naavi

April 27, 2004




For Structured Online Courses in Cyber laws, Visit Cyber Law College.com

 

Back To Naavi.org