2026 Regular Session
Link to Bill History on Legacy Website (Click Here)Summary: Creating WV Task Force on Election Integrity
PDF: sb1050 intr.pdf
DOCX: SB1050 INTR.docx
WEST VIRGINIA LEGISLATURE
2026 REGULAR SESSION
FISCAL NOTE
Introduced
Senate Bill 1050
By Senator Rucker
[Introduced February 21, 2026; referred
to the Committee on Government Organization; and then to the Committee on Finance]
A BILL to amend the Code of West Virginia, 1931, as amended, by adding a new section, designated §3-1A-6A, relating to creating the West Virginia Task Force on Election Integrity; and charging task force with identifying optimal, timely, fully secure, fully transparent, and auditable vote tabulation and election management methods and/or systems.
Be it enacted by the Legislature of West Virginia:
ARTICLE 1A. STATE ELECTION COMMISSION AND SECRETARY OF STATE.
§3-1A-6A. West Virginia Task Force on Election Integrity; charged with identifying optimal, timely, fully secure, fully transparent and auditable vote tabulation and election management methods and systems.
(a) As used in this section, "Task Force" means the West Virginia Task Force on Election Integrity established by this section.
(b) The West Virginia Task Force on Election Integrity is created and shall be organized within the Office of the Secretary of State, subject to the chief executive authority of the Governor.
(c) The Task Force shall be composed of the following members:
(1) One ex officio, non-voting member from the House of Delegates, appointed by the Speaker of the House of Delegates.
(2) One ex officio, non-voting member from the State Senate, appointed by the President of the Senate.
(3) The Attorney General or his or her designee.
(4) The Secretary of the Department of Homeland Security or his or her designee with experience in election security and election cybersecurity operations.
(5) One member representing the cybersecurity industry with experience relevant to the work of the Task Force, appointed by the Governor with the advice and consent of the Senate and House members of the Task Force.
(6) Four citizen members representing the election integrity citizen network with experience relevant to the work of the Task Force, appointed by the Governor with the advice and consent of the Senate and House members of the Task Force.
(7) Two county clerks with experience relevant to the work of the Task Force, appointed by the Governor with the advice and consent of the Senate and House members of the Task Force.
(8) One member from the West Virginia Fusion Center with experience in election security and election cybersecurity operations.
(9) The Chief Information Officer of the Office of Technology or his or her designee with experience in election security and election cybersecurity operations.
(d) The Governor shall designate the Chair of the Task Force, which designee shall be in addition to those members listed in subsection (c).
(e) The responsibilities of the Task Force shall include, but not be limited to, the following:
(1) Investigation of all feasible, secure methods and secure technologies in order to identify and recommend the optimal choice for a timely, fully secure, and fully transparent and auditable vote tabulation and election management method and system; and proposing legislation for the adoption in West Virginia Code of the Task Force’s recommendation; and
(2) In its investigation of all feasible, secure methods and secure technologies, the Task Force shall research thoroughly:
(A) The technical specifications of any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information related to critical election infrastructure;
(B) Any equipment, systems, software, services, software as a service, and/or cloud computing used as or in conjunction with any critical election infrastructure;
(C) The feasibility of hand counting hand marked paper ballots at the precinct level as a method of timely, fully secure, and fully transparent and auditable vote tabulation; and
(3) In investigating any and all technologies under consideration for use as or in conjunction with any critical election infrastructure, the Task Force shall:
(A) Thoroughly monitor, review, consider and abide by any information, reports, findings or orders issued by the U.S. Director of National Intelligence or the President of the United States or his or her designee, regarding known or suspected, malware, malicious code or source code, system design or operation vulnerabilities, or other internal or external threats in the sphere of digital application or cybersecurity in the broadest possible application of those terms in investigating any technologies for use as or in conjunction with any critical election infrastructure, and ensure that any recommendations of the Task Force shall be subject to any restrictions or prohibitions applicable to critical election infrastructure mandated by federal law or Executive Order of the President of the United States;
(B) Thoroughly investigate and assess in all methods and technologies considered the degree to which such prospects, including software, hardware, tabulating equipment, printers, and any other accessories, do or may incorporate hardware or software designed, produced, owned, or licensed by any person or entity owned, operated, or majority-controlled by a foreign company, domestic company registered in another country if a domesticated subsidiary of a foreign corporation, or by a person who is not a United States citizen, or is produced, in whole or in part in a foreign country, which would be prohibited under federal law as information and communications technology or services (ICTS) supplied by persons owned by, controlled by, or subject to the jurisdiction of foreign adversaries;
(C) Thoroughly investigate and assess in all methods and technologies considered whether the prospect contains within its hardware components a wireless modem, cellular, Bluetooth, or other wireless computer networking, intranet, ethernet, internet, other computer networking capability, and forensically investigating any residual vulnerability even if the operational system, software or firmware purports to disable the wireless connection capability;
(D) Thoroughly investigate and assess in all methods and technologies considered the particular and aggregate risks of ballot harvesting, ballot trafficking, algorithmic manipulation of votes or vote tabulations, cyber-attack or manipulation, inaccurate voter registration rolls, manipulated electronic tabulation of votes by any electronic voting system, the compromise or corruption of the tabulation of votes, and of votes being electronically counted or tabulated with decimal values instead of a whole numeric value of one per vote;
(E) Thoroughly investigate and assess in all methods and technologies considered the particular and aggregate risks of any vote tabulator, electronic voting system, electronic poll book (or "e-poll book"), and computer connected to the electronic voting system network of being connected to, or being capable in its internal hardware of being connected to, any wireless or cellular network, or by actual physical connection, or by the transfer of data of any kind to or from a tabulator or electronic voting system via portable hard drives or similar hardware;
(F) Thoroughly consider the feasibility of defining in code "Public Election Related Information and Data" as meaning all data contained within, or transferred to or by the Election Management System database, except for cybersecurity and individual voter personal identification information, including, but not limited to any and all executable code, data transferred via secure physical or wireless network, specifically including any routing through any Albert Sensor or analogous device or system to any external servers or cloud based servers, data transferred by and/or executable code contain within portable drives, system log files, audit log files, data files, system audit files, and all other files of every kind and nature including all election definition files, cast vote records (or "CVRs"), election summary with group detail, precinct summary report(s) with group detail, numbered key canvass(es), results corrections log(s), system log(s), machine log report(s) as CSV (comma separated values) files, precinct, county and state election management system audit log(s), administrative audit events report(s), and/or election audit events report(s), or any electronic data performing the same or functional equivalence of the previously listed categories of data, with the widest possible presumption of inclusion within the category to be given; and
(4) Determining and making recommendations regarding whether the Task Force should be extended to monitor, analyze, and make findings and recommendations to keep pace with future changes in Election Integrity methods and technology and uses of such methods and technology;
(5) Taking an inventory of the current or proposed vote tabulation and election management methods, technology and systems within the state and each county within the state;
(6) Other topics related to Election Integrity that may arise from testimony or reports to the Task Force submitted by its members, invited guests, or the public, or from federal authorities.
(f) The Office of Technology and the Fusion Center shall provide technical support to the Task Force with full transparency granted to the member representing the cybersecurity industry.
(g) All initial appointments to the task force shall be made not later than 60 days after the effective date of this section. Any vacancy shall be filled by the appointing authority, as applicable, within 30 days of such vacancy arising.
(h) The Task Force shall hold its first meeting not later than 90 days after the effective date of this section and shall meet quarterly thereafter with options to either attend in-person or online.
(i) The Task Force shall submit an interim electronic progress report six months after its first meeting, and shall submit an annual electronic report by July 1, 2027 to the House of Delegates, Senate, and the Governor and present the report to the Joint Committee on Government and Finance covering the Task Force's findings and recommendations related to the responsibilities under subsection (e). The Task Force shall submit reports in a like manner for a second year at six months and by July 1, 2028, unless the Task Force concludes that it has satisfactorily fulfilled its charge upon the filing of its first annual report.
(j) The Task Force shall terminate on July 1, 2028, unless the Task Force concludes that it has satisfactorily fulfilled its charge as of July 1, 2027, or the Governor directs by decree that the Task Force’s charge must be extended in order to satisfactorily fulfill its charge.
NOTE: The purpose of this bill is to create the West Virginia Task Force on Election Integrity.
Strike-throughs indicate language that would be stricken from a heading or the present law and underscoring indicates new language that would be added.