Initiatives v Oligarchy

Our Founders' Warning: “Every government degenerates when trusted to the rulers of the people alone. The people themselves are its only safe depositories.” (Thomas Jefferson)

Information Technology

Implementation of the information technology shall be phased to remain within IQA budgets. Programming shall be kept to a minimum using high-level development tools, off-the-shelf self-documenting technologies, and widely-used program suites that do not require expert users.

  1. The systems shall be user friendly to the Members. Those who are familiar with computers shall not have any significant learning curve for routine work.
  2. Simplicity, efficiency, and standard features shall be preferred (especially at the IQA convocation) over meeting all user requirements (e.g., imagined or real but not vital).
  3. Records of the IQA shall be kept whenever possible on IQA confidential server(s) for efficiency, consistency and continuity of IQA functions during turnover of membership.
  4. The IQA computer monitors shall be installed in several rooms for access by the Members at any time during a Session. The entire computer system shall be designed for transportability once a year to new facilities.
  5. The public shall have the capability to search the external database using various keys including generic SQL or equivalent for the greater efficiency of the Initiative system. Citizens will wish, for example, to add their own comments, to determine what proposed Initiatives or comments on Initiatives have been submitted, to avoid duplications and unnecessary new proposals.
  6. High commercial standards shall be used, with adequate security against domestic and international security attack or misinformation. They shall assure, for example, the integrity, invulnerability, maintainability, extensibility, off-site backup and archives, safety and security of the computer systems.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.