Ballot Details: OpenC2 Technical Committee - Standing Rule #1 (CLOSED) |
|||||||||
Ballot Question | Approve Standing Rule #1: Suspension of Standing Rules for the duration of the Meeting | ||||||||
Ballot Description | In addition to the rules defined by the OASIS TC Process and Roberts Rule of Order, the OASIS OpenC2 Technical Committee has adopted a set of standing rules to facilitate the execution of the day-to-day business of the Technical committee. Rule One; SUSPENSION OF STANDING RULES FOR THE DURATION OF THE MEETING 1. The rules of OASIS or Roberts Rule of Order cannot be suspended as they are not standing rules and always apply. 2. During the course of a meeting, a standing rule may be suspended for the duration of a meeting. A motion to suspend a standing rule is not debatable and must be called to question immediately. The rule will be suspended if any of the following criteria are met; i. By a vote of 2/3 majority of the voting members present without prior notice ii. By a simple majority vote of the voting members present with prior notice |
||||||||
Ballot Options |
VOTING CLOSED: Monday, 3 July 2017 @ 11:00 am EDT
|
||||||||
Open Date | Monday, 26 June 2017 @ 11:00 am EDT | ||||||||
Close Date | Monday, 3 July 2017 @ 11:00 am EDT | ||||||||
Ballot Type | Official, as defined by organization policies and procedures |
Number of votes cast (excluding abstentions) | 18 | |
Eligible members who have voted | 21 of 53 | 39.623% |
Eligible members who have not voted | 32 of 53 | 60.377% |
Options with highest number of votes are bold | ||
Option | # Votes | % of Total |
---|---|---|
Yes | 18 | 100% |
No | 0 | 0% |
Abstain | 3 |
Voter Name | Company |
Vote
![]() |
Time (UTC) | Comments |
---|---|---|---|---|
![]() |
Moviri SPA | Yes | 2017-07-03 07:02:00 | |
![]() |
Individual | Yes | 2017-06-30 17:17:00 | |
![]() |
NIST | Yes | 2017-06-30 14:50:00 | |
![]() |
National Security Agency | Yes | 2017-06-27 12:05:00 | |
![]() |
Moviri SPA | Yes | 2017-07-01 07:11:00 | |
![]() |
National Security Agency | Yes | 2017-06-26 20:38:00 | |
![]() |
Anomali | Yes | 2017-06-28 20:05:00 | |
![]() |
National Security Agency | Yes | 2017-06-30 14:44:00 | |
![]() |
Nteligen, LLC | Yes | 2017-06-30 14:55:00 | |
![]() |
Individual | Yes | 2017-06-26 20:47:00 | |
![]() |
G2 | Yes | 2017-06-27 16:03:00 | |
![]() |
Wapack Labs LLC | Yes | 2017-06-26 21:54:00 | |
![]() |
FireEye, Inc. | Yes | 2017-07-02 15:58:00 | |
![]() |
FireEye, Inc. | Yes | 2017-06-30 17:44:00 | |
![]() |
Individual | Yes | 2017-06-30 21:07:00 | |
![]() |
Fornetix | Yes | 2017-06-28 20:14:00 | 1 |
![]() |
NC4 | Yes | 2017-06-30 20:12:00 | |
![]() |
Bank of America | Yes | 2017-06-30 14:17:00 | |
![]() |
Northrop Grumman | Abstain | 2017-06-30 14:40:00 | |
![]() |
LookingGlass | Abstain | 2017-06-26 21:15:00 | |
![]() |
Cisco Systems | Abstain | 2017-06-30 20:37:00 | |
![]() |
FireEye, Inc. | -- | ||
![]() |
Swimlane, LLC | -- | ||
![]() |
New Context Services, Inc. | -- | ||
![]() |
North American Energy Standards Board | -- | ||
![]() |
NC4 | -- | ||
![]() |
University of North Carolina at Chapel Hill | -- | ||
![]() |
Cyber Threat Intelligence Network, Inc. (C... | -- | ||
![]() |
Lumeta Corporation | -- | ||
![]() |
New Context Services, Inc. | -- | ||
![]() |
IBM | -- | ||
![]() |
NEC Corporation | -- | ||
![]() |
New Context Services, Inc. | -- | ||
![]() |
Syncurity | -- | ||
![]() |
Symantec Corp. | -- | ||
![]() |
NEC Corporation | -- | ||
![]() |
National Security Agency | -- | ||
![]() |
Mitre Corporation | -- | ||
![]() |
McAfee | -- | ||
![]() |
McAfee | -- | ||
![]() |
ViaSat | -- | ||
![]() |
Centripetal Networks | -- | ||
![]() |
Symantec Corp. | -- | ||
![]() |
ThreatConnect, Inc. | -- | ||
![]() |
Financial Services Information Sharing and... | -- | ||
![]() |
New Context Services, Inc. | -- | ||
![]() |
SailPoint Technologies | -- | ||
![]() |
National Security Agency | -- | ||
![]() |
Phantom | -- | ||
![]() |
Electric Power Research Institute (EPRI) | -- | ||
![]() |
sFractal Consulting LLC | -- | ||
![]() |
New Context Services, Inc. | -- | ||
![]() |
NIST | -- |
Submitter | Vote ![]() |
Comment |
---|---|---|
Stueve, Gerald Fornetix |
Yes | Modify prior notice to add sufficient lead time (i.e. at least 24 hours) |