Scytl Participation Administration

  • Pre-Election
  • Election Day
  • Post-Election
  • Governance
  • Professional Services

In a variety of countries, voting is not only a right but is compulsory. Scytl Participation Administration securely captures and accurately assesses information from voters who exercise their vote, helping election offices create all the necessary voter participation reports required to fully close the election administration process.

Scytl Participation Administration is an integrated, web-based management and reporting tool that facilitates reports relative to voter election participation, management of fines, sanctions and justifications. To learn more about how Scytl Participation Administration can simplify all tasks required for election closing activities related to voter participation, click the tabs below.


Click to enlarge
  • Benefits
  • Features
  • Security

Election Specific Report Generation

Scytl Participation Administration is the only post-election-centric reporting product on the market. It was developed based on the needs of election officials and voters to optimize workflows and provide interactive data through a web-based, configurable platform. Scytl Participation Administration is pre-loaded with configurable sample reports, easing the burden of creating the numerous official reports required for participation administration election closing.

Manage Reports from a Single Platform

Scytl Participation Administration uses a single platform to manage all aspects of election, voter and poll worker data and information. This dramatically reduces the time to pull and integrate all the necessary data from different sources for the required reports, fines, etc.

Customized to Fit Your Needs

Election authorities vary widely across the globe. Closing reports and voter requirements election laws are just a few of the varied elements that must be managed. Scytl Participation Administration is customized for each customer to ensure the tool is an extension of their needs. This customization leads directly to a higher efficiency in post-election management.

Voter Election Day Participation Management

Scytl Participation Administration helps election authorities efficiently manage reports and related task to voter participation. Election officials are able to securely process voter signatures and create lists of voters who have not exercised their vote.

Fines and Sanction Administration

With the participation reports generated, election bodies can then process and make the appropriate notification of fines or sanctions for voters who have not exercised their voting rights.

Justification Management

Scytl Participation Administration allows for the processing of non-voting justifications. The module manages supporting justification documentation, justification review and justification results.

Role Based Access Control
Scytl Participation Administration implements a secure authentication protocol, and a role based access model which ensures that users are granted access only to the reports they are authorized to manage.

Voter Privacy
Participation and electoral reports obtained through Scytl Participation Administration, fully protect voters' privacy. In addition to the end-to-end data encryption which ensures the secrecy of both voter identity and his/ her voting preferences at all times, the module accessing voting data for report generation will only access the participation data. This ensures the provision of correct and secure segregation of access with the encrypted data containing the voting options.

Immutable Logs and data accuracy
Any report extracted from Scytl Participation Administration matches the application data with the cryptographically protected Immutable Logs, thus ensuring data accuracy. Scytl's proprietary technology named “Immutable logs” prevents log files from being modified. Immutable logs are cryptographically protected via a patented technology ensuring it is not possible for these to be tampered with. This technology combines cryptographic HMAC techniques, digital signatures, random and temporary cryptographic secret keys, and short-time checkpoints to create a secure chain of logs that can be verified by an auditor.

Success Cases

Related Products with Scytl Participation Administration

This Website uses its own cookies and third parties’ cookies, either session or persistent cookies which are necessary for the performance of the Website or which have an analytical and statistical objective. If you continue browsing, we consider that you accept its use.
For further information click here.