Thermo‑Compression Bonding of Cu/SnAg Pillar Bumps with Electroless Palladium Immersion Gold (EPIG) Surface Finish

So‑Yeon Jun, Jung‑Hwan Bang, Min‑Su Kim, Deok‑Gon Han, Tae‑Young Lee, Sehoon Yoo. “Thermo‑Compression Bonding of Cu/SnAg Pillar Bumps with Electroless Palladium Immersion Gold (EPIG) Surface Finish” Materials 2023, 16, 1739.

Privacy Policy

('https://apic.re.kr/' hereinafter referred to as 'Advanced Packaging Integration Center of Korea Institute of Industrial Technology') establishes and discloses this privacy policy to protect personal information and handle related complaints promptly and smoothly in accordance with Article 30 of the Personal Information Protection Act.

Article 1 (Purpose of Processing Personal Information)

The processes personal information for the following purposes. The personal information processed will not be used for purposes other than the following, and if the purpose of use is changed, necessary measures such as obtaining separate consent under Article 18 of the Personal Information Protection Act will be implemented.

1. Provision of Goods or Services
Personal information is processed for the purposes of goods delivery, service provision, sending contracts and invoices, providing content, offering customized services, identity verification, payment and settlement of fees, and debt collection.

  • Collection Method: Website
  • Retention Period: 3 or 5 years
  • Related Laws: Records on collection/processing and use of credit information: 3 years, Records on consumer complaints or dispute resolution: 3 years, Records on payment and supply of goods: 5 years

Article 2 (Categories of Personal Information Processed)

The processes the following categories of personal information.

  • For the purpose of providing goods or services
  • Optional: Email, mobile phone number, name, company name

Article 3 (Procedures and Methods for Destroying Personal Information)

The will destroy personal information without delay when it becomes unnecessary, such as the expiration of the retention period or achievement of the processing purpose.

1. Destruction Procedure
selects the personal information for which the reason for destruction has occurred and destroys it with the approval of the personal information protection officer.

2. Destruction Method
Information in electronic file format is destroyed using technical methods that make the records irreproducible.

Article 4 (Rights and Obligations of Data Subjects and Legal Representatives and How to Exercise Them)

1. Data subjects can exercise their rights to request access, correction, deletion, and suspension of processing of their personal information at any time to the .

2. The exercise of rights under paragraph 1 can be made to the by written, email, or fax in accordance with Article 41(1) of the Enforcement Decree of the Personal Information Protection Act, and the will take action without delay.

3. The exercise of rights under paragraph 1 can also be made through a legal representative or a delegated person. In this case, a power of attorney must be submitted in accordance with the form of Notice No. 2020-7 of the Personal Information Processing Method.

4. Requests for access to personal information and suspension of processing may be restricted according to Articles 35(4) and 37(2) of the Personal Information Protection Act.

5. Requests for correction and deletion of personal information cannot be requested if the personal information is specified as a collection target in other laws.

6. The confirms whether the requester of access, correction, deletion, or suspension of processing is the person or a legitimate agent.

Article 5 (Measures to Ensure the Safety of Personal Information)

The takes the following measures to ensure the safety of personal information.

1. Minimization and Training of Personal Information Handling Staff
The implements measures to manage personal information by designating and limiting the number of employees handling personal information.

2. Technical Measures against Hacking, etc.
The installs security programs, periodically updates and inspects them, installs systems in areas with restricted access, and technically and physically monitors and blocks them to prevent leakage and damage of personal information by hacking or computer viruses.

3. Encryption of Personal Information
Users' personal information is encrypted and stored and managed so that only the user can know it, and important data uses separate security functions such as encrypting files and transmission data or using file lock functions.

4. Storage and Prevention of Forgery and Theft of Access Records
The uses security functions to prevent forgery, theft, and loss of access records to the personal information processing system.

5. Restriction of Access to Personal Information
Necessary measures are taken to control access to personal information through granting, changing, and canceling access rights to the database system that processes personal information, and unauthorized access from outside is controlled using an intrusion prevention system.

Article 6 (Matters Concerning the Installation, Operation, and Rejection of Devices that Automatically Collect Personal Information)

1.The uses 'cookies' that store and retrieve usage information from time to time to provide individually customized services to users.

Cookies are small pieces of information that the server (http) used to run the website sends to the user's computer browser and are sometimes stored on the user's PC hard disk.

Purpose of using cookies: Cookies are used to provide optimized information to users by identifying the visit and usage patterns of each service and website visited by the user, popular search terms, and security access status.

Installation, operation, and rejection of cookies: You can refuse to store cookies by setting options in the privacy menu of the tools > internet options at the top of the web browser.

If you refuse to store cookies, you may experience difficulties in using customized services.

Data subjects can contact the personal information protection officer and department in charge for all personal information protection related inquiries, complaints, and damage relief that occur while using the services (or business) of the . The will respond and handle inquiries without delay.