Tech for All > Security

Semiconductor Technology Security

We are well aware that it is critical to keep our semiconductor technologies secure not just for our own benefit but also in the interest of various stakeholders. We continually reinforce our security measures for such information assets.

Information Security Management System

We conduct a regular annual audit* to prevent any incidents in relation to our security systems and products, while ensuring the security management of our partner companies as well. Through our efforts to evolve our information security we have earned third-party certifications including ISO 27001 and Common Criteria.

* In 2021, we reinforced our security system for internal document management, network vulnerabilities, and growing cyber security threats detected through the regular audit.

Semiconductor Security Response System

Our semiconductor technologies are designated as South Korea’s National Key Technologies* and National High-Tech Strategic Technologies. As such, they are protected by the Act on Prevention of Divulgence and Protection of Industrial Technology, and the Act on Special Measures for Strengthening and Protecting the Competitiveness of the National High-Tech Strategic Industry. We have implemented security management guidelines and designated executive-level managers for individual technologies. These managers are responsible for examining technical security procedures and approving measures to protect such technologies.

* Designated by the Korean Minister of Trade, Industry and Energy, the National Key Technologies are recognized as having tremendous technological·economic value in domestic and international markets or having huge industrial potential.

10 Key Semiconductor Technologies Designated as National Core Technologies

A table summarizing the 10 Key Semiconductor National Core Technologies
Core Technologies
01 Technology for the design, processing, devices, and 3D stacking of DRAM of 30nm class or lower
02 Technology for the design, processing, and devices of 3D stacking of NAND flash with 64 layers or more
03 Technology for the 3D assembly and testing of DRAM
04 Technology for the 3D assembly and testing of NAND flash
05 Technology for the assembly and testing of advanced system semiconductor package
06 Technology for the processing, devices, and 3D stacking of foundries of 30nm class or lower
07 Technology for the design and processing of mobile application processor SoC
08 Technology for the design of LTE, LTE advanced, and 5G baseband modems
09 Technology for the design, processing, and devices of image sensors with pixels of 1μm or less
10 Technology for the design of OLED Display Driver IC (DDI) for display panel driving

8 Semiconductor Technologies Designated as National High-Tech Strategic Technologies

A table summarizing the 8 Semiconductor National High-Tech Strategic Technologies
Core Technologies
01 Technology for the design, processing, devices, and 3D stacking of DRAM of 16 nm class or lower
02 Technology for 3D assembly and testing of DRAM of 16 nm class or lower
03 Technology for the design, processing, and devices for 128-layer or higher stacked 3D NAND flash
04 Technology for 3D assembly and inspection of 128-layer or higher stacked 3D NAND flash
05 Technology for the design, processing, and devices of image sensors with pixels of 0.8μm or lower
06 Technology for the design of OLED DDI(Display Driver IC) for display panel driving
07 Technology for the processing, devices, and 3D stacking for foundries of 14 nm class or lower
08 Technology for the processing, assembly, and inspection of FO-WLP, FO-PLP, FO-PoP, and SiP, which are advanced packaging for system semiconductors

Information Security for Our Corporate Customers

We conclude a Non-Disclosure Agreement (NDA) with each corporate customer and allow only authorized employees to access relevant information. To keep our confidential information, we also employ an email filtering service called Compliance Guide Service (CPGS) to filter outbound email messages containing any information on our corporate customers.

Organizational Units Dedicated to Information Security, and Information Security Activities Catering to On-site Needs

To safeguard our key technologies against the rapid changes in the IT industry and internal and external security threats, we run the Integrated Information Security Center dedicated to information protection. We also operate an effective, specialized information security system led by the Executive Vice President-level Chief Information Security Officer.

Our frontline staff members are designated as Security Agents empowered to protect the key technologies and intellectual assets of their respective organizational units and establish a flexible security system centered on the needs of the business frontier. Our Security Agents are responsible for carrying out security training, inspections, and the identification of vulnerabilities, while raising internal awareness on the importance of information security.

Last updated June 27, 2025