Skip to content

Deployment & Management


Standardised processes have been developed for setting up devices. Two process flowcharts have been created: one for third parties that provide IoT devices as a service to land managers and farmers, and another for site managers and rangers. All can use the flowcharts to assure multiple nature tech devices.

Third party process to set up records

This flowchart is a guide for third-party organisations to record relevant information when setting up nature tech hardware and data systems for a land manager:

Third-party Nature Tech Hardware Setup Flowchart

Keyword Explanations

Log Frequency
A devices log or sampling frequency refers to the number of times a device is sampling or measuringa physical qunatity. For example, if you are using a sensor to measure temperature, the record frequency would be the rate at which the sensor is taking measurements and storing the data. In this context, the record frequency is determined by the capabilities of the sensor and the requirements of the application. A higher record frequency may result in more accurate or detailed measurements, but it can also increase the amount of data that needs to be stored and processed.

This flow chart presents the key areas of device information that site managers should verify in the hardware’s delivered document pack. Third-parties can refer to it to identify any missing information:

Site Manager Check Flowchart

The third-party can use the self assessment device data capture template to record the flowchart elements.

Jump to self assessment device data capture template download

Site Manager process to setup records

This flowchart provides a step-by-step guide for site managers to record device details.

Site Manager Process Flowchart

The Site Manafer can use the Compliance Tracker template to record the details required by the flowchart.

Jump to Compliance Tracker V1.3 – Blank Download

Device Robustness & Physical Security

Devices need to be selected for the application they are intended for and the environment they will be situated in. If the environment is industrial or agricultural in nature then methods of physically securing the device may be needed to improve the devices survivability.

Methods of securing devices can be simple forms of outer protection:

or more developed forms of anti-theft protection:

Data Security

Data can be stored and recorded either locally or remotely, and the user interface can also be either local or remote, depending on the nature of the data and the device being used.

When data is recorded locally, the security of the device becomes a critical concern since malicious intent can lead to data loss through theft or damage. Physical protections such as USB locks or secure enclosures may be necessary to ensure that data remains safe until it is collected.

On the other hand, remote data storage may offer advantages since the risk of data loss due to device failure can be minimized. However, access to the remote source of data must be protected just as physical access would be. It is important to note that more vectors of attack are present with remote data, as any digital device used by staff members could potentially be used to gain unauthorized access. To address this issue, security guidelines such as those provided by Cyber Essentials have been developed to help organizations and individuals secure their devices and safeguard themselves and their equipment against unwanted access.

Cyber Security Basics Introduction:

Cyber Essentials Generic IoT Guide:

User Interface

A user interface can be availiable for devices through a physical screen or app. these normally present a login screen for credential authentication to proviude a layer of security for that device.

Simpler devices dont have a user interface and instead rely on external applications to process locally collected data.

Templates & Documentation

Self Assessment Device Data Capture Form:

Compliance Tracker Template:

Compliance tracker example:


Look to the following examples of specific device types for more detail of real world devices and what information to collect about the hardware.