Acquisition Flow Chart - Figure 8 From A Proposed Secure Remote Data Acquisition