Recruit

Recruit

recruit img2

Academic Program

The KITECH Micro Joining Center operates various student researcher programs. We welcome students aspiring to pursue related degree programs and engage in cutting-edge research in the field of advanced packaging, connecting academia with industrial practices.
(Please refer to the recruitment announcements and guidelines on the KITECH-School website and UST website.)
A program for obtaining master’s and doctoral degrees that utilizes the educational curriculum of partner universities and the research infrastructure of the KITECH. This program aims to cultivate advanced research professionals with a focus on on-site research.
A degree acquisition program offered by the University of Science and Technology (UST), specializing in Convergence Manufacturing Systems Engineering (Industrial Materials/Smart Manufacturing Engineering) for master’s and doctoral degrees.

Research Position

Openings exist for outstanding individuals with a Ph.D. degree in advanced packaging research.
Undergraduate students/graduates interested in the field of advanced packaging research are welcome to participate in our internship program.

Academic Program

한국생산기술연구원 마이크로 조이닝센터는 다양한 학생연구원제도를 운영 중에 있습니다. 산업 현장 연결 첨단 패키징 분야 연구를 수행하고, 관련 학위 과정을 희망하는 학생들을 환영합니다.
(채용 공고 및 안내는 KITECH-School 홈페이지UST 홈페이지를  참조하세요.)

학·연협동과정  석·박사학위과정 제도

협약대학의 교육과정과 한국생산기술연구원의 연구인프라를 활용한 석·박사학위 취득 과정으로,

현장연구중심의 고급 연구 인력 양성을 위한 제도

UST-KITECH School 석·박사학위과정 제도

University of Science and Technology(UST)

융합제조시스템공학전공(산업소재/스마트제조공학) 석·박사학위 취득 제도

Research Position

포스트닥터 연구원

첨단 패키징 연구 분야에 관심있는 박사 학위자

현장실습생 제도

첨단 패키징 연구 분야에 관심있는 학부과정 학생/졸업자

Privacy Policy

('https://apic.re.kr/' hereinafter referred to as 'Advanced Packaging Integration Center of Korea Institute of Industrial Technology') establishes and discloses this privacy policy to protect personal information and handle related complaints promptly and smoothly in accordance with Article 30 of the Personal Information Protection Act.

Article 1 (Purpose of Processing Personal Information)

The processes personal information for the following purposes. The personal information processed will not be used for purposes other than the following, and if the purpose of use is changed, necessary measures such as obtaining separate consent under Article 18 of the Personal Information Protection Act will be implemented.

1. Provision of Goods or Services
Personal information is processed for the purposes of goods delivery, service provision, sending contracts and invoices, providing content, offering customized services, identity verification, payment and settlement of fees, and debt collection.

  • Collection Method: Website
  • Retention Period: 3 or 5 years
  • Related Laws: Records on collection/processing and use of credit information: 3 years, Records on consumer complaints or dispute resolution: 3 years, Records on payment and supply of goods: 5 years

Article 2 (Categories of Personal Information Processed)

The processes the following categories of personal information.

  • For the purpose of providing goods or services
  • Optional: Email, mobile phone number, name, company name

Article 3 (Procedures and Methods for Destroying Personal Information)

The will destroy personal information without delay when it becomes unnecessary, such as the expiration of the retention period or achievement of the processing purpose.

1. Destruction Procedure
selects the personal information for which the reason for destruction has occurred and destroys it with the approval of the personal information protection officer.

2. Destruction Method
Information in electronic file format is destroyed using technical methods that make the records irreproducible.

Article 4 (Rights and Obligations of Data Subjects and Legal Representatives and How to Exercise Them)

1. Data subjects can exercise their rights to request access, correction, deletion, and suspension of processing of their personal information at any time to the .

2. The exercise of rights under paragraph 1 can be made to the by written, email, or fax in accordance with Article 41(1) of the Enforcement Decree of the Personal Information Protection Act, and the will take action without delay.

3. The exercise of rights under paragraph 1 can also be made through a legal representative or a delegated person. In this case, a power of attorney must be submitted in accordance with the form of Notice No. 2020-7 of the Personal Information Processing Method.

4. Requests for access to personal information and suspension of processing may be restricted according to Articles 35(4) and 37(2) of the Personal Information Protection Act.

5. Requests for correction and deletion of personal information cannot be requested if the personal information is specified as a collection target in other laws.

6. The confirms whether the requester of access, correction, deletion, or suspension of processing is the person or a legitimate agent.

Article 5 (Measures to Ensure the Safety of Personal Information)

The takes the following measures to ensure the safety of personal information.

1. Minimization and Training of Personal Information Handling Staff
The implements measures to manage personal information by designating and limiting the number of employees handling personal information.

2. Technical Measures against Hacking, etc.
The installs security programs, periodically updates and inspects them, installs systems in areas with restricted access, and technically and physically monitors and blocks them to prevent leakage and damage of personal information by hacking or computer viruses.

3. Encryption of Personal Information
Users' personal information is encrypted and stored and managed so that only the user can know it, and important data uses separate security functions such as encrypting files and transmission data or using file lock functions.

4. Storage and Prevention of Forgery and Theft of Access Records
The uses security functions to prevent forgery, theft, and loss of access records to the personal information processing system.

5. Restriction of Access to Personal Information
Necessary measures are taken to control access to personal information through granting, changing, and canceling access rights to the database system that processes personal information, and unauthorized access from outside is controlled using an intrusion prevention system.

Article 6 (Matters Concerning the Installation, Operation, and Rejection of Devices that Automatically Collect Personal Information)

1.The uses 'cookies' that store and retrieve usage information from time to time to provide individually customized services to users.

Cookies are small pieces of information that the server (http) used to run the website sends to the user's computer browser and are sometimes stored on the user's PC hard disk.

Purpose of using cookies: Cookies are used to provide optimized information to users by identifying the visit and usage patterns of each service and website visited by the user, popular search terms, and security access status.

Installation, operation, and rejection of cookies: You can refuse to store cookies by setting options in the privacy menu of the tools > internet options at the top of the web browser.

If you refuse to store cookies, you may experience difficulties in using customized services.

Data subjects can contact the personal information protection officer and department in charge for all personal information protection related inquiries, complaints, and damage relief that occur while using the services (or business) of the . The will respond and handle inquiries without delay.