We are well aware that it is critical to keep our semiconductor technologies secure not just for our own benefit but also in the interest of various stakeholders. We continually reinforce our security measures for such information assets.
We conduct a regular annual audit* to prevent any incidents in relation to our security systems and products, while ensuring the security management of our partner companies as well. Through our efforts to evolve our information security we have earned third-party certifications including ISO 27001 and Common Criteria.
* In 2021, we reinforced our security system for internal document management, network vulnerabilities, and growing cyber security threats detected through the regular audit.Our semiconductor technologies are designated as South Korea’s National Key Technologies* and National High-Tech Strategic Technologies. As such, they are protected by the Act on Prevention of Divulgence and Protection of Industrial Technology, and the Act on Special Measures for Strengthening and Protecting the Competitiveness of the National High-Tech Strategic Industry. We have implemented security management guidelines and designated executive-level managers for individual technologies. These managers are responsible for examining technical security procedures and approving measures to protect such technologies.
* Designated by the Korean Minister of Trade, Industry and Energy, the National Key Technologies are recognized as having tremendous technological·economic value in domestic and international markets or having huge industrial potential.Core Technologies | |
---|---|
01 | Technology for the design, processing, devices, and 3D stacking of DRAM of 30nm class or lower |
02 | Technology for the design, processing, and devices of 3D stacking of NAND flash with 64 layers or more |
03 | Technology for the 3D assembly and testing of DRAM |
04 | Technology for the 3D assembly and testing of NAND flash |
05 | Technology for the assembly and testing of advanced system semiconductor package |
06 | Technology for the processing, devices, and 3D stacking of foundries of 30nm class or lower |
07 | Technology for the design and processing of mobile application processor SoC |
08 | Technology for the design of LTE, LTE advanced, and 5G baseband modems |
09 | Technology for the design, processing, and devices of image sensors with pixels of 1μm or less |
10 | Technology for the design of OLED Display Driver IC (DDI) for display panel driving |
Core Technologies | |
---|---|
01 | Technology for the design, processing, devices, and 3D stacking of DRAM of 16 nm class or lower |
02 | Technology for 3D assembly and testing of DRAM of 16 nm class or lower |
03 | Technology for the design, processing, and devices for 128-layer or higher stacked 3D NAND flash |
04 | Technology for 3D assembly and inspection of 128-layer or higher stacked 3D NAND flash |
05 | Technology for the design, processing, and devices of image sensors with pixels of 0.8μm or lower |
06 | Technology for the design of OLED DDI(Display Driver IC) for display panel driving |
07 | Technology for the processing, devices, and 3D stacking for foundries of 14 nm class or lower |
08 | Technology for the processing, assembly, and inspection of FO-WLP, FO-PLP, FO-PoP, and SiP, which are advanced packaging for system semiconductors |
We conclude a Non-Disclosure Agreement (NDA) with each corporate customer and allow only authorized employees to access relevant information. To keep our confidential information, we also employ an email filtering service called Compliance Guide Service (CPGS) to filter outbound email messages containing any information on our corporate customers.
To safeguard our key technologies against the rapid changes in the IT industry and internal and external security threats, we run the Integrated Information Security Center dedicated to information protection. We also operate an effective, specialized information security system led by the Executive Vice President-level Chief Information Security Officer.
Our frontline staff members are designated as Security Agents empowered to protect the key technologies and intellectual assets of their respective organizational units and establish a flexible security system centered on the needs of the business frontier. Our Security Agents are responsible for carrying out security training, inspections, and the identification of vulnerabilities, while raising internal awareness on the importance of information security.