Product Experience
Every role. One platform.
From front-counter staff handling resident requests to the CAO reviewing council-ready reports — every role has a purpose-built journey. Explore how Civic Internet & Telephone Voting works for your team.
Watch the 3-Minute Demo
See Civic Internet & Telephone Voting handle a complete resident service request — from intake through resolution and council reporting.
Request Video AccessTry It Now
Explore the Interface
Click through the actual Civic Internet & Telephone Voting interface. Navigate between the dashboard, resident profiles, service requests, and reports to see how everything connects.
37.6%
Voter Turnout
+12pp vs last month99.99%
System Uptime
0 incidents vs last month4,218
Votes Today
+340/hr peak vs last month0
Anomaly Alerts
ML monitoring vs last monthRecent Activity
Internet vote cast — Ward 5 elector authenticated
Internet · 2 min ago
IVR telephone vote completed — confirmation #TVR-8847
Telephone · 5 min ago
Accessible kiosk vote — Municipal Hall location
Kiosk · 8 min ago
Credential recovery processed — help desk verified identity
Help Desk · 15 min ago
ML anomaly check — voting velocity normal for time period
Security · 22 min ago
Role-Based Journeys
One Platform, Every Perspective
Select a role to explore their complete journey through Civic CRM — from day-one onboarding to daily workflows and strategic outcomes.
Clerk (Returning Officer)
From Preparation to Certified Results
Follow the complete election lifecycle — from voter credential generation and system configuration through the voting period, war room monitoring, decryption ceremony, results tabulation, and post-election audit. Full control with independent verification at every stage.
Prepare
Election setup
Configure election: define offices, candidates, wards, voting period dates, and channel availability. Generate voter credentials for the entire voters list. Produce voter information letters with concealed PINs.
The Election Configuration Console sets up the complete election: offices (Mayor, Councillors by ward, School Board Trustees), candidate lists with MEA-compliant randomization, voting period dates and times, channel availability (internet, telephone, kiosk, in-person), and multi-language settings. The Credential Generation Engine produces unique PINs for every elector on the voters list. The Voter Information Letter System generates print-ready letters with concealed PINs, voting instructions, and help desk contact in accessible formats.
Test
Pre-election validation
Execute full test election with independent third-party audit. Penetration testing. Load testing at 5× expected peak volume. Help desk staff training. Public demo voting experience launched for voter familiarization.
A complete test election runs 8 weeks before the live election with independent third-party audit observation. Penetration testing by certified security firm validates all attack surfaces. Load testing simulates 5× expected peak voting volume to confirm system capacity. Help desk staff complete training on voting system operations and privacy protocols. The public demo voting experience (non-binding) launches for voter familiarization — building confidence in the technology before the live voting period.
Monitor
War room oversight
During the voting period: war room dashboard tracks real-time turnout by ward, voting velocity, channel utilization, system health, security status, and ML anomaly alerts — all without revealing ballot choices.
The Election War Room Dashboard provides continuous real-time visibility: total votes cast vs. eligible electors (turnout %), votes by channel (internet, telephone, kiosk), voting velocity by hour and ward, system health metrics (latency, uptime, error rates), DDoS protection status, ML anomaly detection alerts with investigation drill-down, help desk call volume, and credential recovery activity. All participation data is aggregate — no individual ballot information is visible at any point.
Close
Polls close
When the voting period ends, all channels are closed simultaneously. Final voters list synchronization confirms total votes cast matches authenticated voters. System transitions to decryption phase.
At the configured poll close time, all voting channels (internet portal, IVR telephone, accessible kiosks) close simultaneously. Final voters list reconciliation confirms the total number of authenticated voters matches the total number of encrypted ballots. Any discrepancy triggers an investigation workflow before proceeding. The system transitions to the decryption phase — no further votes can be cast or modified. Election officials verify channel closure and sign off on the reconciliation report.
Decrypt
Custodian ceremony
Multi-custodian decryption ceremony with witnesses. Key custodians assemble to provide their key shares (e.g., 3-of-5 threshold). Ballots mixed/shuffled before decryption. Results tabulated and published within 30 minutes.
The Decryption Ceremony Workflow guides the multi-custodian key assembly. Key custodians (e.g., 3-of-5 threshold) provide their individual key shares under witness observation. The system verifies the threshold is met, assembles the decryption key, applies ballot mixing/shuffling to ensure anonymity, then decrypts all ballots. Automated tabulation counts votes by office and candidate. Results are generated within 30 minutes of polls closing and published through the election results system. Witnesses sign ceremony attestation documents.
Audit
Independent verification
Independent third-party audit verifies election integrity using the blockchain audit trail. Cryptographic proof confirms all cast ballots were counted and none were altered. Post-election report generated with complete statistics.
The Independent Verification Interface enables third-party auditors to verify the complete election: blockchain hash chain integrity, ballot count reconciliation (cast ballots = counted ballots), cryptographic proof that no ballots were added, removed, or altered, and voter authentication event logs (without ballot linkage). The Post-Election Report Generator produces a comprehensive report: turnout by channel and ward, system performance (uptime, latency), help desk metrics, accessibility usage, security incident summary, and lessons learned recommendations.
Election Journey
0 / 6
Step 01
Prepare
Election setup
Configure election: define offices, candidates, wards, voting period dates, and channel availability. Generate voter credentials for the entire voters list. Produce voter information letters with concealed PINs.
The Election Configuration Console sets up the complete election: offices (Mayor, Councillors by ward, School Board Trustees), candidate lists with MEA-compliant randomization, voting period dates and times, channel availability (internet, telephone, kiosk, in-person), and multi-language settings. The Credential Generation Engine produces unique PINs for every elector on the voters list. The Voter Information Letter System generates print-ready letters with concealed PINs, voting instructions, and help desk contact in accessible formats.
Step 02
Test
Pre-election validation
Execute full test election with independent third-party audit. Penetration testing. Load testing at 5× expected peak volume. Help desk staff training. Public demo voting experience launched for voter familiarization.
A complete test election runs 8 weeks before the live election with independent third-party audit observation. Penetration testing by certified security firm validates all attack surfaces. Load testing simulates 5× expected peak voting volume to confirm system capacity. Help desk staff complete training on voting system operations and privacy protocols. The public demo voting experience (non-binding) launches for voter familiarization — building confidence in the technology before the live voting period.
Step 03
Monitor
War room oversight
During the voting period: war room dashboard tracks real-time turnout by ward, voting velocity, channel utilization, system health, security status, and ML anomaly alerts — all without revealing ballot choices.
The Election War Room Dashboard provides continuous real-time visibility: total votes cast vs. eligible electors (turnout %), votes by channel (internet, telephone, kiosk), voting velocity by hour and ward, system health metrics (latency, uptime, error rates), DDoS protection status, ML anomaly detection alerts with investigation drill-down, help desk call volume, and credential recovery activity. All participation data is aggregate — no individual ballot information is visible at any point.
Step 04
Close
Polls close
When the voting period ends, all channels are closed simultaneously. Final voters list synchronization confirms total votes cast matches authenticated voters. System transitions to decryption phase.
At the configured poll close time, all voting channels (internet portal, IVR telephone, accessible kiosks) close simultaneously. Final voters list reconciliation confirms the total number of authenticated voters matches the total number of encrypted ballots. Any discrepancy triggers an investigation workflow before proceeding. The system transitions to the decryption phase — no further votes can be cast or modified. Election officials verify channel closure and sign off on the reconciliation report.
Step 05
Decrypt
Custodian ceremony
Multi-custodian decryption ceremony with witnesses. Key custodians assemble to provide their key shares (e.g., 3-of-5 threshold). Ballots mixed/shuffled before decryption. Results tabulated and published within 30 minutes.
The Decryption Ceremony Workflow guides the multi-custodian key assembly. Key custodians (e.g., 3-of-5 threshold) provide their individual key shares under witness observation. The system verifies the threshold is met, assembles the decryption key, applies ballot mixing/shuffling to ensure anonymity, then decrypts all ballots. Automated tabulation counts votes by office and candidate. Results are generated within 30 minutes of polls closing and published through the election results system. Witnesses sign ceremony attestation documents.
Step 06
Audit
Independent verification
Independent third-party audit verifies election integrity using the blockchain audit trail. Cryptographic proof confirms all cast ballots were counted and none were altered. Post-election report generated with complete statistics.
The Independent Verification Interface enables third-party auditors to verify the complete election: blockchain hash chain integrity, ballot count reconciliation (cast ballots = counted ballots), cryptographic proof that no ballots were added, removed, or altered, and voter authentication event logs (without ballot linkage). The Post-Election Report Generator produces a comprehensive report: turnout by channel and ward, system performance (uptime, latency), help desk metrics, accessibility usage, security incident summary, and lessons learned recommendations.
Ready to Transform Your Municipality?
See Civic Internet & Telephone Voting in your environment
Schedule a personalized walkthrough with our municipal solutions team. We’ll configure a demo environment to match your municipality’s structure.