An inspection robot generates and collects various data about itself, its operational environment, its missions, and the inspection points on its routes. This data is typically classified into one of two categories, which affects where the data is sent and processed.
Environmental and Inspection data: Includes both data gathered in real-time from its onboard sensors used to understand and navigate its world (e.g., depth camera feeds and Lidar scans) as well as information used by the robot to perform its missions and the gathered inspection data, e.g., mission settings, 3D maps, navigation paths, and inspection results. While most data is discarded immediately, mission and inspection data can be processed and stored on the robot and forwarded to the operator’s computer or end-user systems via the robot API. This means that the inspection output data should only be transmitted to the systems that you as the customer define.
Robot log data: Information about the robot’s activities and its hardware and software performance (e.g., steps taken, battery cycles, software logs, inspection performance). This data is transmitted to the data server and the provider’s systems, where it is stored and processed. The solution provider usually uses this data to further develop the robot solution, improve its services, and also to better fulfill customer support requests.
Integrating data from mobile robotics solutions with your management system via APIs means that the data must be secure and meet your standards for data handling. To avoid data security risks and business disruption due to data loss, integrity, authorization (e.g., GDPR in the EU), or intrusion (i.e., third-party hacking), the robotic platform and solution provider must have effective data security measures in place.
Ensure that the robotics solution provider complies with international information security management standards and implements security programs that ensure risk assessment and security controls. Also, ensure that the vendor communicates with its customers about incidents and threats, handles intermittent and unreliable connections without causing data breaches, and implements regular software and firmware updates to minimize security risks.