|
April 1, 2019
Proposal 18-3 & Election Administration Online Course
A new course will be assigned to election administrators in the eLearning Center today. This course, Proposal 18-3 & Election Administration, covers the changes to election administration from the passage of Proposal 18-3 in November and subsequent law changes.
This course is required to be completed by all election administrators. The course can be found in your eLearning Center transcript.
|
Reporting Saturday and/or Sunday Hours
Any jurisdiction having a May election must report the hours the clerk's office will be open for absentee voting the Saturday and/or Sunday prior to the May election. Law requires the clerk's office to maintain a minimum of eight hours over those two days. The time may be split between Saturday and Sunday or all conducted on one day. This information must be entered in to QVF no later than Monday, April 8. This information also must be posted with other township or city postings in a central location.
To enter this information in to QVF:
Select Clerk Contacts from Lookup, select your jurisdiction and tab to the Hours/Location tab. Enter your Business and Pre-Election Weekend Hours and add any Additional Registration Locations using the Add Location button if needed. Select Save before exiting.
See Chapter 11 - Clerk Contacts of the QVF Refresh Manual for further instruction.
This information will be presented under the Election Information Local Clerk tab on the Michigan Voter Information Center website to assist your voters.
|
Beware of Phishing Emails
Earlier this week, the EI-ISAC (Elections Infrastructure Information Sharing & Analysis Center) sent out an alert regarding an increase in phishing and credential harvesting attempts specifically targeting the election community. Please stay alert, be wary of links and attachments, and remind your employees to do the same. There is no shame in calling or emailing someone directly to confirm that they meant to send an email. If you get a phishing email or any other suspicious email, please send it to the ISAC as an attachment: submission@malware.cisecurity.org.
Some jurisdictions have reported receiving official-looking emails that actually are forged to appear to be from someone else. A phishing attack is often in the form of an email directing you to an official-looking website, link, or attachment. This can make your computer and office network or data vulnerable to malware, spam and additional phishing attacks.
A little diligence and precaution can go a long way to protect yourself and your office. Before opening attachments or clicking any links in emails you receive be sure to:
- Check the shown “From:” email address is the actual sending email address Name@Organization.com versus “<hacker@spoof.com >” The actual email sender can be forged to look like someone else.
- Displaying the Full email message Header is an easy way to identify phishers. This varies by email program.
- Scrutinize incoming emails for noticeable typos or mistakes.
- Analyze emails that request payment, reference invoices or imply urgency.
- Use spam filters in your email program to put unknown senders automatically in spam or junk folders to review later.
- Install and run anti-virus and malware detection software.
- Avoid accessing organizational email on public Wi-Fi connections.
Do not forward suspicious emails to anyone else. Report suspicious activity by saving the email and attaching it to a new email to those who assist you with IT issues, as well as to ISAC as indicated above.
|
|
|