The evaluation technology assesses performance, durability, stability, and other required parameters. It involves comprehensive analysis of issues arising during evaluation, allowing for performance enhancement or supporting reliability certification through thorough fault analysis
Introduction
Mechanical properties and reliability is evaluated by using digital image correlation technics.
Introduction
This technology is used to optimize product design and understand failure physics through finite element analysis and computational fluid dynamics simulation based on a database of physical properties by the operating temperature of materials applied to electronic devices.
Introduction
Advanced Packaging Integration Center, APIC
Copyright 2023. Advanced Packaging Integration Center, APIC. All Rights Reserved.
Privacy Policy
Article 1 (Purpose of Processing Personal Information)
The
1. Provision of Goods or Services
Personal information is processed for the purposes of goods delivery, service provision, sending contracts and invoices, providing content, offering customized services, identity verification, payment and settlement of fees, and debt collection.
Article 2 (Categories of Personal Information Processed)
The
Article 3 (Procedures and Methods for Destroying Personal Information)
The
1. Destruction Procedure
2. Destruction Method
Information in electronic file format is destroyed using technical methods that make the records irreproducible.
Article 4 (Rights and Obligations of Data Subjects and Legal Representatives and How to Exercise Them)
1. Data subjects can exercise their rights to request access, correction, deletion, and suspension of processing of their personal information at any time to the
2. The exercise of rights under paragraph 1 can be made to the
3. The exercise of rights under paragraph 1 can also be made through a legal representative or a delegated person. In this case, a power of attorney must be submitted in accordance with the form of Notice No. 2020-7 of the Personal Information Processing Method.
4. Requests for access to personal information and suspension of processing may be restricted according to Articles 35(4) and 37(2) of the Personal Information Protection Act.
5. Requests for correction and deletion of personal information cannot be requested if the personal information is specified as a collection target in other laws.
6. The
Article 5 (Measures to Ensure the Safety of Personal Information)
The
1. Minimization and Training of Personal Information Handling Staff
The
2. Technical Measures against Hacking, etc.
The
3. Encryption of Personal Information
Users' personal information is encrypted and stored and managed so that only the user can know it, and important data uses separate security functions such as encrypting files and transmission data or using file lock functions.
4. Storage and Prevention of Forgery and Theft of Access Records
The
5. Restriction of Access to Personal Information
Necessary measures are taken to control access to personal information through granting, changing, and canceling access rights to the database system that processes personal information, and unauthorized access from outside is controlled using an intrusion prevention system.
Article 6 (Matters Concerning the Installation, Operation, and Rejection of Devices that Automatically Collect Personal Information)
1.The
Cookies are small pieces of information that the server (http) used to run the website sends to the user's computer browser and are sometimes stored on the user's PC hard disk.
Purpose of using cookies: Cookies are used to provide optimized information to users by identifying the visit and usage patterns of each service and website visited by the user, popular search terms, and security access status.
Installation, operation, and rejection of cookies: You can refuse to store cookies by setting options in the privacy menu of the tools > internet options at the top of the web browser.
If you refuse to store cookies, you may experience difficulties in using customized services.
Data subjects can contact the personal information protection officer and department in charge for all personal information protection related inquiries, complaints, and damage relief that occur while using the services (or business) of the