User Rating: 4 / 5

Star ActiveStar ActiveStar ActiveStar ActiveStar Inactive

Latest version of SkalarkiIO Profiler 5.1 included new signed USBD driver for all SKALARKI devices. This is one only driver which can be used for all devices. New driver will not be removed after each major Windows update and needs to be installed for only one device. All other connected devices will install driver automatically.

To install new USB driver:
1. During installation process, please check Skalarki I/O USB Driver

Driver files will be installed in SkalarkiIO Profiler installation folder, where we will point Windows once will ask for driver source.

2. Before installing new driver please remove drivers for all installed devices with their files. (Is this is working simulator, might be good idea to wait for major Windows update, which will remove drivers anyway, then proceed with this procedure).

3. Windows might ask you to reboot after drivers removal. Then reboot system.

4. Go to Device Manager, where you should see list of Custom USB Devcies without driver.

5. Right click on first one from the list and then hit "Update Driver", then follow onscreen instructions. Use Profiler location for Windows to look for driver. Yuo don't need to point to lower directory. Poin ting to Profiler will be enough.

6. once driver is located, you will see this message:

Hit Install and driver will be installed without asking for permission in future.


7. Now reboot PC again and after that all other devices install their drivers automatically.

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

SkalarkiIO Profiler 5.1  is an next version of Profiler 5 with some major updates and improvements. As  previous version SkalarkiIO Profiler 5.1 dedicated for SKALARKI I/O boards and SKALARKI P&P devices only. Use and configuration is extremely easy and doesn't require to write even single line of code. Implemented SDK functionality gives to developers complete access to all devices from custom coded applications. From user point of view version 5.1 can work in old style (using predefined profile and aircraft related .dll) or in SDK mode.

As in version 5 all functions and events for specific aircraft are predefined in supplied .dll modules and ready to use at any time. User can install only one or more modules if needed. Having few modules allows to use different aircraft's at any time. Like in previous version along with .dll module installer will install corresponding profile. Please be aware, that supplied profiles are only for users with P&P hardware. For all non P&P hardware, user needs to create own profile.

Brand new features in Profiler 5.1 are:
- implemented licencing system, which gives access to different Profiler features based on licence keys,
- signed USB driver one for all devices.

1. Software Installation.

Software is supplied as a .exe file with packed all needed components.


Hit Next to proceed to Custom Setup options. Here user can select features and options for installation. Picking any aircraft will install all needed modules, profiles or any other required files. There is no need to add any other files after installation manually. Whole procedure is fully automated.



Sample installation of ProSim and JeeHell FMGS support - simply select ProSim A320 then JeeHell FMGS, SkalarkiIO SDK and SkalarkiIO USB drivers.

Hit "Next" to finish installation process.

Change default installation folder only if you really have to. There is no reason to change default location and don't advice to do this.


Correctly installed application will creates SkalarkiIO Profiler 5 folder inside c:/Program Files (x86). Folder structure is always same and shouldn't be changed. Count of installed files might vary depends on options chosen during installation process.


Then in  default ..\Documents|SkalarkiIO Profielr 5.1 folder new "Profiles" folder will be created, if doesn't exist, with profiles for installed aircrafts.


 then in default AddData locatition, SkalarkiIO Profielr 5.1 folder will be created with Settings.config file.

2. Main window description.

To run SkalarkiIO Profiler just double click on SkalarkiIOProfiler 5.1 link (created on desktop) or directly in installation folder. Once software is running Main window looks like below. Some of the buttons are disable or enabled depends on which aircraft support was installed.

SkalarkiIO Profiler 5.1 Main Window

In Main window user can find: 
- Profiles section with controls for Profiles managing Panel.
- Hardware Status tabs for P&P and non P&P hardware.
- Connected software Status Panel.
- Settings Button for specific software settings software and hardware related.
- IO Test Button for connected hardware test.
- Firmware Update Button for updating I/O firmware.
- SDK Button to run SDK mode.

Buttons description:
 - Starts profile highlighted on the Profiles list.
Stop - Stops Running profile.
About - Opens information window, where user can find actual installed firmware versions for all connected Devices.
Edit Profile - Opens new dialogue window where customer can edit highlighted Profile.
Add Profile - Allows to add new Profile to Profiles list.
Delete Profile - Deleting highlighted Profile from Profiles list.
Settings - Opens new dialogue window where some specific configuration can be done.
IO Test - Opens new dialogue window where user can test I/O boards connected to system.
Firmware Update - Opens new dialogue window for managing hardware firmware update process.

Software and Hardware Status Bars:
On each Status Bar user can see connected or disconnected software and hardware devices:
If label background is Red - software or device is not working or there is no open connection. If label background is Green - software or device is connected and is working properly.

Status Bar with no connections to hardware and ProSim as chosen aircraft.

2. Adding New Profile (empty Profile).

To add new empty Profile just click on Add Profile button from main window.

New dialogue window will be shown. Enter new Profile name (New Profile) and click OK. 

New, created Profile will be shown on the Profiles list in Main Window.


3. Deleting existing Profile.

To delete existing Profile, first highlight Profile name you want to delete, then click Delete Profile button.

One more click to confirm. And profile deleted.


4. Running Profile.

To run Profile, first highlight required profile then click Run Profile Button.

To make FSUIPC connection active start Flight Sim and wait for FSUIPC and/or JeeHell A320 FMGS background becomes green. Once labels are green press button Run.

Running JL A320 FMGS profile without hardware connected, without simulator running and without connection to aircraft. Profile is running but Profiler will wait until all boxes on the left are green.


To stop Profile just click on Stop button.



5. Editing Profile.

First click on Profile name which you want to edit, then hit button Edit Profile to open new Edit Profile dialogue window.

New Profile Editor dialogue box will be displayed.

Click on the "+" next to the Groups label to open tree of existing definitions.

Going deeper into definitions tree all definitions are available to check or edit. 

Working with Profile is quite intuitive and easy for first time users.

6. IO Test.

IOTest window is designed to test and detect possible hardware problems. In this mode user will be able to check all inputs and outputs for every connected device. IOTest is an important step in problem detection process and should be performed right after first device connection. P&P devices comes assembled and tested, then there is no need to perform this test, but if something is not working, user can quickly find out if this is hardware or software problem. This way exact information can be send to SKALARKI Support.

IOTest window displays tabs for every device. Each connected device has got "(connected)" label next to name of device.

To test Inputs simply start pressing buttons. Active button will cause change of state. You might to scroll grid to see actual pressed button. If pressing button doesn't reflects in Inputs tab by changing its state - means there is hardware problem. No connection from button or missing GROUND connection. Please make sure all hardware (buttons, encoders, etc...) is correctly detected before proceed to creating and editing Profile.

To test connected outputs, simply tick check box in Output number row. Once check box it checked LED connected to I/O should be powered and visible as ON. No action after ticking check box means - output is not connected properly (LED has got reversed polarisation or connection is missing) or is not connected at all. Each 16 outputs means one outputs socket on I/O (this applies only to I/O GLARE, I/O PEDESTAL and I/O OVERHEAD).

In similar way 7-segment displays can be tested. Type any digit in display row and press Enter to send digit to I/O. Putting space " " in Test field will cause clear digit. Again no action on displays means problem with connection between hardware and I/O.

If potentiometers for ADC are connected and appropriate configuration is done in Settings Window, ADC can be tested as well like other Inputs. Turning potis will reflect by changing values in corresponded line. As ADC is up to 12bits resolution we can expect readings between 0 and 2048 for each channel.

Stepper motor Tab is only available for TQ. By changing slider position, stepper motor will move Trim Wheels to required position.

7. Settings

Settings dialogue window includes some important and useful configuration options. Click Settings button to open Settings window.

Settings window is divided into sections related to software and hardware specific settings.


Default settings / "Run Default Profile as Start"
By checking this check box, user allows default Profile to start automatically after SkalarkiIO Profiler has been launched and software connections has been established. This is exception when software connection doesn't need to be established before Profile was started. In this case SkalarkiIO Profiler is waiting for software connections minimised in system try. Right click on system try icon will display some options to manage running program.

To make selected profile as default - simply click on Set Default Profile button.

Default profile has got "(default)" label added to its name. From now SkalarkiIO Profiler will always start in auto mode and minimised to system try.


Server Settings
This panel is only available for JeeHell FMGS users, once JeeHell FMGS is chosen as aircraft. If SkalarkiIO Profiler is working on the same PC as FMGS Server - there is no need to change configuration. But if SkalarkiIO Profiler is working on networked machine, IP address must be changed to IP address of PC with FMGS Server running. Please leave port number unchanged.

If selected aircraft is supported by SDK then Server Settings panel looks bit different. in this case we need to set IP address of the machine where Profiler is running. If PC IP address is static we need to type it in Server IP box. If PC is using DHCP with dynamically assigned IP, then please use default local address:


TQ Settings
Settings only for users using SKALARKI TQ. Here you can setup some TQ related features. Depends on Aircraft style selection 2 levers are available for A320 and 4 levers are available for A330/A340.


GLARE Extensions, PEDESTAL Extensions and OVERHEAD Extensions
In these panels user can define what kind of extra features should be activated for each I/O board. Only available options for each I/O are selectable. As standard in complete configuration in PEDESTAL section INPUTS extension is needed and in OVERHEAD INPUTS and OUTPUTS extension is needed.
For legacy hardware only full OVERHEAD config with Radio and Audio panels included extra DISPLAYS extension is necessarily. With new firmware release all I/O boards can be updated with ADC feature, which means analogue axis (potentiometer) can be connected to each I/O board. Glare I/O for example can handle PFD, ND brightness adjustment for both CS and FO side. I/O PEDESTAL can handle Flaps and Spoilers actions etc... 
In all new P&P modules user can enable/disable some features depending what is user's current configuration.

Important note: If ADC inputs are not used - they can't be configured as available - this can cause I/O malfunctions!

Once configuration is done - hit "Save" button to store all settings for the future. Settings are stored in .xml file located in Application data user default folder inside \SkalarkiIO Profiler 5.1 folder.

8. Firmware Update.

Firmware Update mode allows user to program panels with latest firmware version. Firmware updates will add new functionality to panels and/or will fix problems not found during testing procedure.
To update firmware, user will need boot device in a special programming mode. See point 9 for details.

Once device is in special programming mode, button Firmware Update becomes available. Clicking on this button will open Program Device dialogue window. Next click on Load button and point to folder where .hex file is stored. 

Once .hex file is loaded press Program button.

Confirmation message informs about success of programming procedure. Click OK then Exit to close Program Device window and finish Firmware Update procedure.

After programming is completed, switch updated device Off and then after 15 seconds On. If for any reason programming wasn't successful, procedure has to be started from beginning.

9. Starting P&P Units in bootloader mode


1.  FCU PROVersion 2014, 2016
  - Switch OFF power supply.
- Press and hold SPD/MACH button then switch power ON still holding button.
- Go to point 11
2.  Upper Pedestal 2014, 2016
   - Switch OFF power supply.
- Press and hold EMER CANC button then switch power ON still holding button.
- Windows should detect new USB device.
- Go to point 11

 Lower Pedestal 2014, 2016

  - Switch OFF power supply.
- Press and hold RESET button then switch power ON still holding button.
- Go to point 11
4. ATC TCAS 2014, 2016
  - Switch OFF power supply (remove USB plug).
- Press and hold IDENT button then switch power ON still holding button.
- Go to point 10
5. MCDU 2014, 2016
  - Switch OFF power supply.
- Press and hold BRT button then switch power ON still holding button.
- Go to point 11
6. RMP 2014, 2016
  - Switch OFF power supply (remove USB plug).
- Press and hold NAV button then switch power ON still holding button.
- Go to point 11
7. ACP 2014, 2016
  - Switch OFF power supply (remove USB plug).
- Press and hold PA button then switch power ON still holding button.
- Go to point 11
8. TQ 2014, 2015, 2016
  - Switch OFF power supply.
- Press and hold FIRE ENG1 button then switch power ON still holding button. 
- Or press and hold both red ATHR take over buttons on TQ handles, then switch power ON still holding buttons. 
If above methods are not working button on TQ IO needs to be used.
- Press and hold BROWN button then switch power ON still holding button. This needs removing TQ from Pedestal and this is rather for older TQ versions.
- Go to point 11
9. CLOCK, Rev1, Rev2, Rev3  
  - Switch OFF power supply (remove USB plug).
- Press and hold SET button then connect USB cable back, still holding button.
- Go to point 11
10. ABRK Panel, Rev03, Rev04, Rev05, 2015, 2016  
  - Switch OFF power supply
- Press and hold RST button from ISIS Panel and still holding button pressed connect Power back.
- Go to point 11.
11. - Windows should detect new USB device.
- If driver is not loaded automatically, please load driver manually pointing to SkalarkiIO/USB drivers/BOOTLOADER folder.
- Once driver is loaded please follow instructions from point 8 (Firmware Update).

 end faq


Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive


Please read all these terms and conditions.

As we can accept your order and make a legally enforceable agreement without further reference to you, you must read these terms and conditions to make sure that they contain all that you want and nothing that you are not happy with. If you are not sure about anything, just phone us on 07584 672 355.


  1. These Terms and Conditions will apply to the purchase of the goods by Customer. We are SKALARKI electronics Ltd a company registered in England and Wales under number 08957549 whose registered office is at Evan Business Centre, Unit 30, Middlemore Road, B21 0AY Birmingham with email address: This email address is being protected from spambots. You need JavaScript enabled to view it.; telephone number 0044 (0)7584 672 355.
  2. These are the Terms on which we sell all Goods to you. By ordering any of the Goods, you agree to be bound by these Terms and Conditions.


  1. Customer means an individual acting for purposes which are wholly or mainly outside his or her trade, business, craft or profession;
  2. Contract means the legally-binding agreement between you and us for the sale and purchase of the Goods;
  3. Delivery Location means the Supplier's premises or other location where the Goods are to be supplied, as set out in the Order;
  4. Goods means any goods that we supply to you, of the number and description as set out in the Order;
  5. Order means the Customer's order for the Goods from the Supplier as set out in the Customer's order or in the Customer's written acceptance of the Supplier's quotation.


  1. The description of the Goods is as set out in our website, catalogues, brochures or other form of advertisement. Any description is for illustrative purposes only and there may be small discrepancies in colour or size.
  2. In the case of Goods made to your special requirements, it is your responsibility to ensure that any information you provide is accurate.

Basis of Sale

  1. The description of the Goods in our website, catalogues, brochures or other form of advertisement does not constitute a contractual offer to sell the Goods.
  2. When an Order has been made, we can reject it for any reason, although we will try to tell you the reason without delay.
  3. A Contract will be formed for the Goods ordered, only upon the Supplier sending an email to the Customer saying that the Order has been accepted or if earlier, the Supplier's delivery of the Goods to the Customer.
  4. Any quotation is valid for a maximum period of 30 days from its date, unless we expressly withdraw it at an earlier time.
  5. No variation of the Contract, whether about description of the Goods, price or otherwise, can be made after it has been entered into unless the variation is agreed by the Customer and the Supplier in writing.
  6. We intend that these Terms and Conditions apply only to a Contract entered into by you as a Consumer where we, the Supplier and you the Customer, enter the Contract at any of the Supplier's business premises, and where the Contract is not a contract (i) for which an offer was made by the Customer in the Supplier's and the Customer's simultaneous physical presence away from those premises, or (ii) made immediately after the Customer was personally and individually addressed in the Supplier's and the Customer's simultaneous physical presence away from those premises. If this is not the case, you must tell us, so that we can provide you with a different contract with terms which are more appropriate to you and which might, in some way, be better for you, eg by giving cancellation rights pursuant to consumer protection law. Business premises means immovable retail premises where we carry on business on a permanent basis or, in the case of movable retail premises, on a usual basis.

Price and Payment

  1. The price of the Goods and any additional delivery or other charges for the Goods, and the total price of them and the charges, is that set out in our price list current at the date we accepted the Order or such other price as we may agree in writing.
  2. Prices and charges include VAT at the rate applicable at the time of the Order.
  3. Full Payment for Goods must be made at least 3 days in advance of delivery. You must pay by PayPal, Bank transfer or by card details with your Order and we can take payment immediately or otherwise before delivery of the Goods.


  1. We will deliver the Goods to the Delivery Location by the time or within the period agreed, or failing any agreement, without undue delay and, in any event, not more than 30 days after the day on which the Contract is entered into.
  2. In any case, regardless of events beyond our control, if we do not deliver the Goods on time, you can (in addition to any other remedies) treat the Contract at an end if:
    1. we have refused to deliver the Goods, or if delivery on time is essential taking into account all the relevant circumstances at the time the Contract was made, or if you told us before the Contract was made that delivery on time was essential; or
    2. after we have failed to deliver on time, you have specified a later period which is appropriate to the circumstances and we have not delivered within that period.
  3. If you treat the Contract at an end, we will (in addition to other remedies) promptly return all payments made under the Contract.
  4. If you were entitled to treat the Contract at an end, but do not do so, you are not prevented from cancelling the Order for any Goods or rejecting Goods that have been delivered and, if you do this, we will (in addition to other remedies) without delay return all payments made under the Contract for any such cancelled or rejected Goods. If the Goods have been delivered, you must return them or allow us to collect them from you and we will pay the costs of this.
  5. If any Goods form a commercial unit (a unit is a commercial unit if division of the unit would materially impair the value of the goods or the character of the unit) you cannot cancel or reject the Order for some of those Goods without also cancelling or rejecting the Order for the rest of them.
  6. We do not generally deliver to addresses outside England and Wales, Scotland, Northern Ireland, the Isle of Man and Channels Islands. If, however, we accept an Order for delivery outside that area, you may need to pay import duties or other taxes, as we will not pay them.
  7. You agree we may deliver the Goods in instalments if we suffer a shortage of stock or other genuine and fair reason, subject to the above provisions and provided you are not liable for extra charges.
  8. If you or your nominee fail, through no fault of ours, to take delivery of the Goods at the Delivery Location, we may charge the reasonable costs of storing and redelivering them.
  9. The Goods will become your responsibility from the completion of delivery or Customer collection. You must, if reasonably practicable, examine the Goods before accepting them.

Risk and Title

  1. Risk of damage to, or loss of, the Goods will pass to you when the Goods are delivered to you.
  2. You do not own the Goods until we have received payment in full. If full payment is overdue or a step occurs towards your bankruptcy, we can choose, by notice to cancel any delivery and end any right to use the Goods still owned by you, in which case you must return them or allow us to collect them.

Withdrawal and cancellation

  1. You can withdraw the Order by telling us before the Contract is made, if you simply wish to change your mind and without giving us a reason, and without incurring any liability.
  2. You can cancel the Contract except for any Goods which are made to your special requirements by telling us no later than 5 days after the Contract was made, if you simply wish to change your mind and without giving us a reason, and without liability, except in that case, you must return to any of our business premises the Goods in undamaged condition at your expense. Then we will without delay refund to you the price for those Goods, but we can retain any separate delivery charge. This does not affect your rights when the reason for the cancellation is any defective Goods.

Conformity and Guarantee

  1. We have a legal duty to supply the Goods in conformity with the Contract, and will not have conformed if it does not meet the following obligation.
  2. Upon delivery, the Goods will:
    1. be of satisfactory quality
    2. be reasonably fit for any particular purpose for which you buy the Goods which, before the Contract is made, you made known to us (unless you do not actually rely, or it is unreasonable for you to rely, on our skill and judgment) and be fit for any purpose held out by us or set out in the Contract; and
    3. conform to their description.
  3. It is not a failure to conform if the failure has its origin in your materials.
  4. Guarantee is 12 months for all supplied devices. In case of faults, we will fix

Circumstances beyond the control of either party

  1. In the event of any failure by a party because of something beyond its reasonable control:
    1. the party will advise the other party as soon as reasonably practicable; and
    2. the party's obligations will be suspended so far as is reasonable, provided that that party will act reasonably, and the party will not be liable for any failure which it could not reasonably avoid, but this will not affect the Customer's above rights relating to delivery and the right to cancel below.

Excluding liability

  1. The Supplier does not exclude liability for: (i) any fraudulent act or omission; or (ii) for death or personal injury caused by negligence or breach of the Supplier's other legal obligations. Subject to this, the Supplier is not liable for(i) loss which was not reasonably foreseeable to both parties at the time when the Contract was made, or (ii) loss (eg loss of profit) to the Customer's business, trade, craft or profession which would not be suffered by a Consumer because the Supplier believes the Customer is not buying the Goods wholly or mainly for its business, trade, craft or profession).

Governing law, jurisdiction and complaints

  1. The Contract (including any non-contractual matters) is governed by the law of England and Wales.
  2. Disputes can be submitted to the jurisdiction of the courts of England and Wales or, where the Customer lives in Scotland or Northern Ireland, in the courts of respectively Scotland or Northern Ireland.
  3. We try to avoid any dispute, so we deal with complaints as follows: We will aim to respond with an appropriate solution within 5 days."

PRIVACY POLICY updated for GDPR Compliance

At SKALARKI electronics Ltd, we are committed to protecting and maintaining your privacy. As part of our normal operations we may collect your information. This Privacy Policy describes the type of information we may collect and what may happen to that information.

This statement is designed to tell you as much as possible about how we use and manage personal information provided to, or collected by us. We believe you should be made aware of our practices so you can make informed decisions about how you allow us to use your information.

In this ever changing world we may, from time to time, review and update this Privacy Policy statement to take account of new laws and technology and changes to our operations. All personal information held by us will be governed by our most recent policy. Your continued use of the Website after any modification to this Privacy Policy will constitute your acceptance of such modification.

Any questions regarding this statement or complaints regarding privacy should be sent to SKALARKI electronics Ltd, FLEXSPACE Business Centre, Unit 30, 151 Middlemore Road, B21 0BN, Birmingham, UK.

1. What kind of personal information do we collect and how do we collect it?

We collect personal information in a variety of ways in the course of conducting our businesses. We collect this information so you can subscribe to newsletters, request a product or service from us, complete a survey or questionnaire or communicate with us by email, telephone or in writing.

Throughout this Privacy Policy, we refer to your “personal information”, which means information which identifies you as an individual or from which your identity can be reasonably ascertained. Your name, home address, home telephone number, mobile telephone number, email address, workplace contact details are examples of personal information.

2. Who is collecting personal information and why?

Our Sales, Support, Marketing, Training and Accounting teams are the ones using your personal identifiable information, in order to fulfill your service requests, solve technical issues, and deliver a quality experience with our services.

3. How we use Personal Information

The personal information collected on the Website will be used to operate the Website and to provide the good(s) or service(s) you have requested. We may also use your personal information to provide customer support, to respond to questions or complaints, to conduct customer surveys, to detect and prevent fraud and for other purposes described in this Privacy Policy.

In certain circumstances, we may use personal information for promotional or direct marketing purposes. However, you may at any time request us not to use your personal information for sending direct marketing material to you. Such a request can be made by contacting us either in writing, by email or by telephone at the contact details below. There is no fee for making such a request.

In many cases where we ask you to provide us with information about yourself, if you do not provide us with that information we will not be able to provide you with the relevant product or service.

4. Links to Third Party Websites from our Website

To the extent that our Website contain links to sites operated by third parties and not related to our products or services (“Linked Websites”), the Linked Websites are not controlled by us and we are not responsible for the privacy practices of those companies. Before disclosing your personal information to Linked Websites, we advise you to examine their privacy policies.

5. Disclosure of personal information

We respect the privacy of personal information and we will take reasonable steps to keep it strictly confidential.

We sometimes hire third parties to provide limited services on our behalf, including packaging, mailing and delivering items, sending postal mail, providing technical support, and other new services. We provide those companies only the information they need to deliver the service, and they are prohibited from using that information for any other purpose.

We may also disclose your personal information if required to do so by law or in the good faith belief that such action is necessary in connection with a sale, merger, transfer, exchange or other disposition (whether of assets, stock or otherwise) of all or a portion of a business of our company and/or our subsidiaries or to (i) conform to legal requirements or comply with legal process served on us or the Website; (ii) protect and defend our rights or property and the Website; (iii) enforce our agreements with you, or (iv) act in urgent circumstances to protect personal safety or the public.

Under no circumstances we will sell personal information without your consent.

6. How long will personal information will be stored?

For our enterprise customers, we will retain and use your information as necessary to comply with our legal obligations, resolve disputes, and enforce our agreement.

7. What are the data subjects’ rights?

As user of SKALARKI electronics Ltd services you have following rights:

  • The right to be informed –  organizations must be completely transparent in how they are using personal data (personal data may include data such as a work email and work mobile if they are specific to an individual).
  • The right of access - individuals will have the right to know exactly what information is held about them and how it is processed.
  • The right of rectification - individuals will be entitled to have personal data rectified if it is inaccurate or incomplete.
  • The right to erasure - also known as 'the right to be forgotten',  refers to an individual's right to having their personal data deleted or removed without the need for a specific reason as to why they wish to discontinue. Doing so may restrict or altogether prevent SKALARKI electronics Ltd from delivering tailored services such as Technical Support and/or notifications/updates on Technical Support request status, therefore rendering invalid on-going paid subscription contracts.
  • The right to restrict processing - an individual's right to block or suppress processing of their personal data.
  • The right to data portability -  allows individuals to retain and reuse their personal data for their own purpose.
  • Rights of automated decision making and profiling - the GDPR has put in place safeguards to protect individuals against the risk that a potentially damaging decision is made without human intervention. For example, individuals can choose not to be the subject of a decision where the consequence has a legal bearing on them, or is based on automated processing.

8. Cookies policy

We use the term “cookies” to refer to cookies and other similar technologies covered by the EU Directive on privacy in electronic communications.

• What is a cookie?

Cookies are small data files that your browser places on your computer or device. Cookies help your browser navigate a website and the cookies themselves cannot collect any information stored on your computer or your files. When a server uses a web browser to read cookies they can help a website deliver a more user-friendly service. To protect your privacy, your browser only gives a website access to the cookies it has already sent to you.

• Why do we use cookies?

We use cookies to learn more about the way you interact with our content and help us to improve your experience when visiting our website. Cookies remember the type of browser you use and which additional browser software you have installed. Some of the cookies we use are session cookies and only last until you close your browser, others are persistent cookies which are stored on your computer for longer.

• How do I reject and delete cookies?

We will not use cookies to collect personally identifiable information about you. However, should you wish to do so, you can choose to reject or block the cookies set by us by changing your browser settings – see the Help function within your browser for further details. Please note that most browsers automatically accept cookies so if you do not wish cookies to be used you may need to actively delete or block the cookies. You can also visit www.allaboutcookies.org for details on how to delete or reject cookies and for further information on cookies generally. Note, however, that if you reject the use of cookies you will still be able to visit our Website but some of the functions may not work correctly.

9. Information Security

We will take all reasonable steps to ensure that all personal information held by us is secure from any unauthorized access or disclosure. However, we do not guarantee that personal information cannot be accessed by an unauthorized person (e.g. a hacker) or that unauthorized disclosures will not occur. We will take reasonable steps to destroy or permanently de-identify personal information if it is no longer needed for the purposes for which we are authorized to use it.

10. Management and security of personal information

To make sure your personal information is secure, we communicate our privacy and security guidelines to our employees and strictly enforce privacy safeguards within the company. We do not store credit card details nor do we share customer financial details with any 3rd parties.

11. Accessing personal information

You may request to access your personal information held by us. Such a request must be made in writing to the address below. First, we will require you to verify your identity and specify what information you require. We will grant you access to your personal information as soon as possible, subject to the circumstances of the request.

In the same way, a request may be made to delete personal information, and all reasonable steps to delete the information will be made, except where it is required for legal reasons. Deletion of information may result in SKALARKI electronics Ltd being unable to provide you with information about certain transactions, other content, services or product information, upcoming promotion, and/or provide you with certain content, goods or services.

We may decline to process requests that are unreasonably repetitive, require disproportionate technical effort, are extremely impractical, or for which access is not otherwise required by local law. We will retain your personal information for the period necessary to fulfill the purposes outlined in this Privacy Policy unless a longer retention period is required or permitted by law.

12. Updating Personal Information

We endeavor to ensure that the personal information we hold is accurate, complete and up-to-date. We encourage you to contact us as soon as possible in order to update any personal information we hold about you. Our contact details are set out below.

13. Newsletters

If you wish to cancel your subscription to a newsletter, you can either send us an e-mail to: This email address is being protected from spambots. You need JavaScript enabled to view it., or carry out cancellation by using the respective link at the end of the newsletter.

14. Contact us

If you would like to make an access request or wish to provide feedback about this policy, please contact us by writing to: SKALARKI electronics Ltd at FLEXSPACE Business Centre, Unit 30, 151 Middlemore Road, B21 0BN, Birmingham, UK or via email [Email].

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Information Security Policy 

SKALARKI electronics Ltd, 12/10/2016


This Policy document encompasses all aspects of security surrounding confidential company information and must be distributed to all company employees. All company employees must read this document in its entirety and sign the form confirming they have read and fully understand this policy. This document will be reviewed and updated by Management on an annual basis or when relevant to include newly developed security standards into the policy and re-distributed to all employees and contractors where applicable.

Information Security Policy.

SKALARKI electronics Ltd  handles sensitive cardholder information daily.  Sensitive Information must have adequate safeguards in place to protect the cardholder data, cardholder privacy, and to ensure compliance with various regulations, along with guarding the future of the organisation.

SKALARKI electronics Ltd commits to respecting the privacy of all its customers and to protecting any customer data from outside parties.  To this end management are committed to maintaining a secure environment in which to process cardholder information so that we can meet these promises.

Employees handling sensitive cardholder data should ensure:

  • Handle Company and cardholder information in a manner that fits with their sensitivity and classification;
  • Limit personal use of the SKALARKI electronics Ltd information and telecommunication systems and ensure it doesn’t interfere with your job performance;
  • SKALARKI electronics Ltd reserves the right to monitor, access, review, audit, copy, store, or delete any electronic communications, equipment, systems and network traffic for any purpose;
  • Do not use e-mail, internet and other Company resources to engage in any action that is offensive, threatening, discriminatory, defamatory, slanderous, pornographic, obscene, harassing or illegal;
  • Do not disclose personnel information unless authorised;
  • Protect sensitive cardholder information;
  • Keep passwords and accounts secure;
  • Request approval from management prior to establishing any new software or hardware, third party connections, etc.;
  • Do not install unauthorised software or hardware, including modems and wireless access unless you have explicit management approval;
  • Always leave desks clear of sensitive cardholder data and lock computer screens when unattended;
  • Information security incidents must be reported, without delay, to the individual responsible for incident response locally – Please find out who this is.

We each have a responsibility for ensuring our company’s systems and data are protected from unauthorised access and improper use.  If you are unclear about any of the policies detailed herein you should seek advice and guidance from your line manager.

1. Network Security

A high-level network diagram of the network is maintained and reviewed on a yearly basis.  The network diagram provides a high level overview of the cardholder data environment (CDE), which at a minimum shows the connections in and out of the CDE.  Critical system components within the CDE, such as POS devices, databases, web servers, etc., and any other necessary payment components, as applicable should also be illustrated.

In addition, ASV should be performed and completed by a PCI SSC Approved Scanning Vendor, where applicable.  Evidence of these scans should be maintained for a period of 18 months.

2. Acceptable Use Policy

Management’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to the SKALARKI electronics Ltd established culture of openness, trust and integrity. Management is committed to protecting the employees, partners and the Company from illegal or damaging actions, either knowingly or unknowingly by individuals. SKALARKI electronics Ltd will maintain an approved list of technologies and devices and personnel with access to such devices as detailed in Appendix B.

  • Employees are responsible for exercising good judgment regarding the reasonableness of personal use.
  • Employees should take all necessary steps to prevent unauthorized access to confidential data which includes card holder data.
  • Keep passwords secure and do not share accounts. Authorized users are responsible for the security of their passwords and accounts.
  • All PCs, laptops and workstations should be secured with a password-protected screensaver with the automatic activation feature.
  • All POS and PIN entry devices should be appropriately protected and secured so they cannot be tampered or altered.
  • The List of Devices in Appendix B will be regularly updated when devices are modified, added or decommissioned. A stocktake of devices will be regularly performed and devices inspected to identify any potential tampering or substitution of devices. 
  • Users should be trained in the ability to identify any suspicious behaviour where any tampering or substitution may be performed. Any suspicious behaviour will be reported accordingly.
  • Information contained on portable computers is especially vulnerable, special care should be exercised.
  • Postings by employees from a Company email address to newsgroups should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of the SKALARKI electronics Ltd, unless posting is in the course of business duties.
  • Employees must use extreme caution when opening e-mail attachments received from unknown senders, which may contain viruses, e-mail bombs, or Trojan horse code. 

3. Protect Stored Data.

  • All sensitive cardholder data stored and handled by SKALARKI electronics Ltd and its employees must be securely protected against unauthorised use at all times. Any sensitive card data that is no longer required by SKALARKI electronics Ltd for business reasons must be discarded in a secure and irrecoverable manner.
  • If there is no specific need to see the full PAN (Permanent Account Number), it has to be masked when displayed.
  • PAN'S which are not protected as stated above should not be sent to the outside network via end user messaging technologies like chats, ICQ messenger etc.,

It is strictly prohibited to store:

  1. The contents of the payment card magnetic stripe (track data) on any media whatsoever.
  2. The CVV/CVC (the 3 or 4 digit number on the signature panel on the reverse of the payment card) on any media whatsoever.
  3. The PIN or the encrypted PIN Block under any circumstance.

4. Information Classification.

Data and media containing data must always be labelled to indicate sensitivity level.

  • Confidential data might include information assets for which there are legal requirements for preventing disclosure or financial penalties for disclosure, or data that would cause severe damage to SKALARKI electronics Ltd if disclosed or modified. Confidential data includes cardholder data.
  • Internal Use data might include information that the data owner feels should be protected to prevent unauthorized disclosure.
  • Public data is information that may be freely disseminated.

5. Access to the Sensitive Cardholder Data.

All Access to sensitive cardholder should be controlled and authorised. Any job functions that require access to cardholder data should be clearly defined.

  • Any display of the card holder should be restricted at a minimum to the first 6 and the last 4 digits of the cardholder data.
  • Access to sensitive cardholder information such as PAN’s, personal information and business data is restricted to employees that have a legitimate need to view such information.
  • No other employees should have access to this confidential data unless they have a genuine business need.
  • If cardholder data is shared with a Service Provider (3rd party) then a list of such Service Providers will be maintained as detailed in Appendix C.
  • SKALARKI electronics Ltd will ensure a written agreement that includes an acknowledgement is in place that the Service Provider will be responsible for the for the cardholder data that the Service Provider possess.
  • SKALARKI electronics Ltd will ensure that a there is an established process, including proper due diligence is in place, before engaging with a Service provider.
  • SKALARKI electronics Ltd will have a process in place to monitor the PCI DSS compliance status of the Service provider.

6. Physical Security

Access to sensitive information in both hard and soft media format must be physically restricted to prevent unauthorised individuals from obtaining sensitive data.

  • Media is defined as any printed or handwritten paper, received faxes, floppy disks, back-up tapes, computer hard drive, etc.
  • Media containing sensitive cardholder information must be handled and distributed in a secure manner by trusted individuals.
  • Visitors must always be escorted by a trusted employee when in areas that hold sensitive cardholder information.
  • Procedures must be in place to help all personnel easily distinguish between employees and visitors, especially in areas where cardholder data is accessible. “Employee” refers to full-time and part-time employees, temporary employees and personnel, and consultants who are “resident” on SKALARKI electronics Ltd A “visitor” is defined as a vendor, guest of an employee, service personnel, or anyone who needs to physically enter the premises for a short duration, usually not more than one day.
  • A list of devices that accept payment card data should be maintained.
  • The list should include make, model and location of the device.
  • The list should have the serial number or a unique identifier of the device
  • The list should be updated when devices are added, removed or relocated
  • POS devices surfaces are periodically inspected to detect tampering or substitution.
  • Personnel using the devices should be trained and aware of handling the POS devices
  • Personnel using the devices should verify the identity of and=y third party personnel claiming to repair or run maintenance tasks on the devices, install new devices or replace devices.
  • Personnel using the devices should be trained to report suspicious behaviour and indications of tampering of the devices to the appropriate personnel. SKALARKI electronics Ltd A “visitor” is defined as a vendor, guest of an employee, service personnel, or anyone who needs to enter the premises for a short duration, usually not more than one day.
  • Strict control is maintained over the external or internal distribution of any media containing card holder data and has to be approved by management
  • Strict control is maintained over the storage and accessibility of media
  • All computer that store sensitive cardholder data must have a password protected screensaver enabled to prevent unauthorised use.

7. Protect Data in Transit.

All sensitive cardholder data must be protected securely if it is to be transported physically or electronically.

  • Card holder data (PAN, track data, etc.) must never be sent over the internet via email, instant chat or any other end user technologies.
  • If there is a business justification to send cardholder data via email or by any other mode then it should be done after authorization and by using a strong encryption mechanism (i.e. – AES encryption, PGP encryption, IPSEC, etc.).
  • The transportation of media containing sensitive cardholder data to another location must be authorised by management, logged and inventoried before leaving the premises. Only secure courier services may be used for the transportation of such media. The status of the shipment should be monitored until it has been delivered to its new location.

8. Disposal of Stored Data

  • All data must be securely disposed of when no longer required by SKALARKI electronics Ltd, regardless of the media or application type on which it is stored.
  • An automatic process must exist to permanently delete on-line data, when no longer required.
  • All hard copies of cardholder data must be manually destroyed when no longer required for valid and justified business reasons. A quarterly process must be in place to confirm that all non-electronic cardholder data has been appropriately disposed of in a timely manner.
  • SKALARKI electronics Ltd will have procedures for the destruction of hardcopy (paper) materials. These will require that all hardcopy materials are crosscut shredded, incinerated or pulped so they cannot be reconstructed.
  • SKALARKI electronics Ltd will have documented procedures for the destruction of electronic media. These will require:
    • All cardholder data on electronic media must be rendered unrecoverable when deleted e.g. through degaussing or electronically wiped using military grade secure deletion processes or the physical destruction of the media;
    • If secure wipe programs are used, the process must define the industry accepted standards followed for secure deletion.
  • All cardholder information awaiting destruction must be held in lockable storage containers clearly marked “To Be Shredded” - access to these containers must be restricted.

9. Security Awarness and Procedures

The policies and procedures outlined below must be incorporated into company practice to maintain a high level of security awareness. The protection of sensitive data demands regular training of all employees and contractors.

  • Review handling procedures for sensitive information and hold periodic security awareness meetings to incorporate these procedures into day to day company practice.
  • Distribute this security policy document to all company employees to read. It is required that all employees confirm that they understand the content of this security policy document by signing an acknowledgement form (see Appendix A).
  • All employees that handle sensitive information will undergo background checks (such as criminal and credit record checks, within the limits of the local law) before they commence their employment with the Company.
  • All third parties with access to credit card account numbers are contractually obligated to comply with card association security standards (PCI/DSS).
  • Company security policies must be reviewed annually and updated as needed.


10. Credit Card (PCI) Security Incident Response Plan

SKALARKI electronics Ltd PCI Security Incident Response Team (PCI Response Team) is comprised of the Information Security Officer and Merchant Services. SKALARKI electronics Ltd PCI security incident response plan is as follows:

  1. Each department must report an incident to the Information Security Officer (preferably) or to another member of the PCI Response Team.
  2. That member of the team receiving the report will advise the PCI Response Team of the incident.
  3. The PCI Response Team will investigate the incident and assist the potentially compromised department in limiting the exposure of cardholder data and in mitigating the risks associated with the incident.
  4. The PCI Response Team will resolve the problem to the satisfaction of all parties involved, including reporting the incident and findings to the appropriate parties (credit card associations, credit card processors, etc.) as necessary.
  5. The PCI Response Team will determine if policies and processes need to be updated to avoid a similar incident in the future, and whether additional safeguards are required in the environment where the incident occurred, or for the institution.


SKALARKI electronics Ltd PCI Security Incident Response Team (or equivalent in your organisation):






Communications Director



Compliance Officer








Information Security Officer




Collections & Merchant Services




Risk Manager





Information Security PCI Incident Response Procedures:

  • A department that reasonably believes it may have an account breach, or a breach of cardholder information or of systems related to the PCI environment in general, must inform SKALARKI electronics Ltd PCI Incident Response Team. After being notified of a compromise, the PCI Response Team, along with other designated staff, will implement the PCI Incident Response Plan to assist and augment departments’ response plans.


Incident Response Notification

Escalation Members (or equivalent in your company):

Escalation – First Level:

Information Security Officer Controller
Executive Project Director for Credit Collections and Merchant Services Legal Counsel
Risk Manager
Director of SKALARKI electronics Ltd Communications

Escalation – Second Level:

SKALARKI electronics Ltd Director
Executive Cabinet
Internal Audit
Auxiliary members as needed

External Contacts (as needed)

Merchant Provider Card Brands
Internet Service Provider (if applicable)
Internet Service Provider of Intruder (if applicable) Communication Carriers (local and long distance) Business Partners
Insurance Carrier
External Response Team as applicable (CERT Coordination Center 1, etc) Law Enforcement Agencies as applicable inn local jurisdiction

In response to a systems compromise, the PCI Response Team and designees will:

  1. Ensure compromised system/s is isolated on/from the network.
  2. Gather, review and analyze the logs and related information from various central and local safeguards and security controls
  3. Conduct appropriate forensic analysis of compromised system.
  1. Contact internal and external departments and entities as appropriate.
  2. Make forensic and log analysis available to appropriate law enforcement or card industry security personnel, as required.
  3. Assist law enforcement and card industry security personnel in investigative processes, including in prosecutions.

The credit card companies have individually specific requirements that the Response Team must address in reporting suspected or confirmed breaches of cardholder data. See below for these requirements.

Incident Response notifications to various card schemes 

  1. In the event of a suspected security breach, alert the information security officer or your line manager immediately.
  2. The security officer will carry out an initial investigation of the suspected security breach.
  3. Upon confirmation that a security breach has occurred, the security officer will alert management and begin informing all relevant parties that may be affected by the compromise.


VISA Steps

If the data security compromise involves credit card account numbers, implement the following procedure:

  • Shut down any systems or processes involved in the breach to limit the extent, and prevent further exposure.
  • Alert all affected parties and authorities such as the Merchant Bank (your Bank), Visa Fraud Control, and the law enforcement.
  • Provide details of all compromised or potentially compromised card numbers to Visa Fraud Control within 24 hrs.
  • For more Information visit: http://usa.visa.com/business/accepting_visa/ops_risk_management/cisp_if_ compromised.html

Visa Incident Report Template

This report must be provided to VISA within 14 days after initial report of incident to VISA. The following report content and standards must be followed when completing the incident report. Incident report must be securely distributed to VISA and Merchant Bank. Visa will classify the report as “VISA Secret”*.

I. Executive Summary

  1. Include overview of the incident
  2. Include RISK Level(High, Medium, Low)
  3. Determine if compromise has been contain

II. Background
III. Initial Analysis
IV. Investigative Procedures

  1. Include forensic tools used during investigation

V. Findings

  1. Number of accounts at risk, identify those stores and compromised
  2. Type of account information at risk
  3. Identify ALL systems analyzed. Include the following:
    • Domain Name System (DNS) names
    • Internet Protocol (IP) addresses
    • Operating System (OS) version
    • Function of system(s)
  4. Identify ALL compromised systems. Include the following:
    • DNS names
    • IP addresses
    • OS version
    • Function of System(s)
  5. Timeframe of compromise
  6. Any data exported by intruder
  7. Establish how and source of compromise
  8. Check all potential database locations to ensure that no CVV2, Track 1 or Track 2 data is stored anywhere, whether encrypted or unencrypted (e.g., duplicate or backup tables or databases, databases used in development, stage or testing environments, data on software engineers’ machines, etc.)
  9. If applicable, review VisaNet endpoint security and determine risk

VI. Compromised Entity Action

VII. Recommendations

VIII. Contact(s) at entity and security assessor performing investigation

*This classification applies to the most sensitive business information, which is intended for use within VISA. Its unauthorized disclosure could seriously and adversely impact VISA, its employees, member banks, business partners, and/or the Brand.


MasterCard Steps:

  1. Within 24 hours of an account compromise event, notify the MasterCard Compromised Account Team via phone at 1-636-722-4100.
  2. Provide a detailed written statement of fact about the account compromise (including the contributing circumstances) via secured e-mail to This email address is being protected from spambots. You need JavaScript enabled to view it..
  3. Provide the MasterCard Merchant Fraud Control Department with a complete list of all known compromised account numbers.
  4. Within 72 hours of knowledge of a suspected account compromise, engage the services of a data security firm acceptable to MasterCard to assess the vulnerability of the compromised data and related systems (such as a detailed forensics evaluation).
  5. Provide weekly written status reports to MasterCard, addressing open questions and issues until the audit is complete to the satisfaction of MasterCard.
  6. Promptly furnish updated lists of potential or known compromised account numbers, additional documentation, and other information that MasterCard may request.
  7. Provide finding of all audits and investigations to the MasterCard Merchant Fraud Control department within the required time frame and continue to address any outstanding exposure or recommendation until resolved to the satisfaction of MasterCard.

Once MasterCard obtains the details of the account data compromise and the list of compromised account numbers, MasterCard will:

  1. Identify the issuers of the accounts that were suspected to have been compromised and group all known accounts under the respective parent member IDs.
  1. Distribute the account number data to its respective issuers.

Employees of the company will be expected to report to the security officer for any security related issues. The role of the security officer is to effectively communicate all security policies and procedures to employees within the company and contractors. In addition to this, the security officer will oversee the scheduling of security training sessions, monitor and enforce the security policies outlined in both this document and at the training sessions and finally, oversee the implantation of the incident response plan in the event of a sensitive data compromise.

Discover Card Steps

  1. Within 24 hours of an account compromise event, notify Discover Fraud Prevention at (800) 347-3102
  2. Prepare a detailed written statement of fact about the account compromise including the contributing circumstances
  3. Prepare a list of all known compromised account numbers
  4. Obtain additional specific requirements from Discover Card

American Express Steps

  1. Within 24 hours of an account compromise event, notify American Express Merchant Services at (800) 528-5200 in the U.S.
  2. Prepare a detailed written statement of fact about the account compromise including the contributing circumstances
  3. Prepare a list of all known compromised account numbers Obtain additional specific requirements from American Express


11. Transfer of Sensitive Information Policy

  • All third-party companies providing critical services to the SKALARKI electronics Ltd must provide an agreed Service Level Agreement.
  • All third-party companies providing hosting facilities must comply with the Company’s Physical Security and Access Control Policy.
  • All third-party companies which have access to Card Holder information must
  • Adhere to the PCI DSS security requirements.
  1. Acknowledge their responsibility for securing the Card Holder data.
  2. Acknowledge that the Card Holder data must only be used for assisting the completion of a transaction, supporting a loyalty program, providing a fraud control service or for uses specifically required by law.
  3. Have appropriate provisions for business continuity in the event of a major disruption, disaster or failure.
  4. Provide full cooperation and access to conduct a thorough security review after a security intrusion by a Payment Card industry representative, or a Payment Card industry approved third party.

12. User Access Management

  • Access to SKALARKI electronics Ltd is controlled through a formal user registration process beginning with a formal notification from HR or from a line manager.
  • Each user is identified by a unique user ID so that users can be linked to and made responsible for their actions. The use of group IDs is only permitted where they are suitable for the work carried out.
  • There is a standard level of access; other services can be accessed when specifically authorized by HR/line management.
  • The job function of the user decides the level of access the employee has to cardholder data
  • A request for service must be made in writing (email or hard copy) by the newcomer’s line manager or by HR. The request is free format, but must state:
    • Name of person making request;
    • Job title of the newcomers and workgroup;
    • Start date;
    • Services required (default services are: MS Outlook, MS Office and Internet access).
  • Each user will be given a copy of their new user form to provide a written statement of their access rights, signed by an IT representative after their induction procedure. The user signs the form indicating that they understand the conditions of access.
  • Access to all the SKALARKI electronics Ltd systems is provided by IT and can only be started after proper procedures are completed.
  • As soon as an individual leaves SKALARKI electronics Ltd employment, all his/her system logons must be immediately revoked.
  • As part of the employee termination process HR (or line managers in the case of contractors) will inform IT operations of all leavers and their date of leaving.

13. Access Control Policy

  • Access Control systems are in place to protect the interests of all users of the SKALARKI electronics Ltd computer systems by providing a safe, secure and readily accessible environment in which to work.
  • The SKALARKI electronics Ltd will provide all employees and other users with the information they need to carry out their responsibilities in an as effective and efficient manner as possible.
  • Generic or group IDs shall not normally be permitted, but may be granted under exceptional circumstances if sufficient other controls on access are in place.
  • The allocation of privilege rights (e.g. local administrator, domain administrator, super-user, root access) shall be restricted and controlled, and authorization provided jointly by the system owner and IT Services. Technical teams shall guard against issuing privilege rights to entire teams to prevent loss of confidentiality.
  • Access rights will be accorded following the principles of least privilege and need to know.
  • Every user should attempt to maintain the security of data at its classified level even if technical security mechanisms fail or are absent.
  • Users electing to place information on digital media or storage devices or maintaining a separate database must only do so where such an action is in accord with the data’s classification.
  • Users are obligated to report instances of non-compliance to SKALARKI electronics Ltd
  • Access to SKALARKI electronics Ltd IT resources and services will be given through the provision of a unique Active Directory account and complex password.
  • No access to any SKALARKI electronics Ltd IT resources and services will be provided without prior authentication and authorization of a user’s SKALARKI electronics Ltd Windows Active Directory account.
  • Password issuing, strength requirements, changing and control will be managed through formal processes. Password length, complexity and expiration times will be controlled through Windows Active Directory Group Policy Objects.
  • Access to Confidential, Restricted and Protected information will be limited to authorised persons whose job responsibilities require it, as determined by the data owner or their designated representative. Requests for access permission to be granted, changed or revoked must be made in writing.
  • Users are expected to become familiar with and abide by SKALARKI electronics Ltd policies, standards and guidelines for appropriate and acceptable usage of the networks and systems.
  • Access for remote users shall be subject to authorization by IT Services and be provided in accordance with the Remote Access Policy and the Information Security Policy. No uncontrolled external access shall be permitted to any network device or networked system.
  • Access to data is variously and appropriately controlled according to the data classification levels described in the Information Security Management Policy.
  • Access control methods include logon access rights, Windows share and NTFS permissions, user account privileges, server and workstation access rights, firewall permissions, IIS intranet/extranet authentication rights, SQL database rights, isolated networks and other methods as necessary.
  • A formal process shall be conducted at regular intervals by system owners and data owners in conjunction with IT Services to review users’ access rights. The review shall be logged and IT Services shall sign off the review to give authority for users’ continued access rights.

 end faq


Our Address we are always available for you!

SKALARKI electronics Ltd
Registered office:
FLEXSPACE Business Centre, Unit 30
151 Middlemore Road
B21 0BN, Birmingham
tel: +44 7584 672 355
Company Registration: 8957549

Newsletter Subscribe join our mailing list today to get notified

Accepted Cards 100% secure payments methods