Standardised processes have been developed for setting up devices. Two process flowcharts have been created: one for third parties that provide IoT devices as a service to land managers and farmers, and another for site managers and rangers. All can use the flowcharts to assure multiple nature tech devices.
Third party process to set up records
This flowchart is a guide for third-party organisations to record relevant information when setting up nature tech hardware and data systems for a land manager:
This flow chart presents the key areas of device information that site managers should verify in the hardware’s delivered document pack. Third-parties can refer to it to identify any missing information:
The third-party can use the self assessment device data capture template to record the flowchart elements.
Site Manager process to setup records
This flowchart provides a step-by-step guide for site managers to record device details.
The Site Manafer can use the Compliance Tracker template to record the details required by the flowchart.
Jump to Compliance Tracker V1.3 – Blank Download
Device Robustness & Physical Security
Devices need to be selected for the application they are intended for and the environment they will be situated in. If the environment is industrial or agricultural in nature then methods of physically securing the device may be needed to improve the devices survivability.
Methods of securing devices can be simple forms of outer protection:
or more developed forms of anti-theft protection:
Data can be stored and recorded either locally or remotely, and the user interface can also be either local or remote, depending on the nature of the data and the device being used.
When data is recorded locally, the security of the device becomes a critical concern since malicious intent can lead to data loss through theft or damage. Physical protections such as USB locks or secure enclosures may be necessary to ensure that data remains safe until it is collected.
On the other hand, remote data storage may offer advantages since the risk of data loss due to device failure can be minimized. However, access to the remote source of data must be protected just as physical access would be. It is important to note that more vectors of attack are present with remote data, as any digital device used by staff members could potentially be used to gain unauthorized access. To address this issue, security guidelines such as those provided by Cyber Essentials have been developed to help organizations and individuals secure their devices and safeguard themselves and their equipment against unwanted access.
A user interface can be availiable for devices through a physical screen or app. these normally present a login screen for credential authentication to proviude a layer of security for that device.
Simpler devices dont have a user interface and instead rely on external applications to process locally collected data.
Templates & Documentation
Compliance tracker example:
Look to the following examples of specific device types for more detail of real world devices and what information to collect about the hardware.