SK hynix system ic will continuously strive to generate values based on SUPEX Spirit for all stakeholders, not only staff members and customers but business partners and investors.
We contribute to improve core competency by protecting tangible and intangible assets including technologies and talents.
We comply with security related laws and regulations, and commit to protecting the information security of stakeholder companies and our business partners.
We raise a culture that encourages initiative protection of industrial security, and reinforces the security awareness of all members through consistent education and promotion efforts.
We will build up, manage and continuously improve our security system based upon voluntary participation, designate specialized personnel in each division to form specialized organization for security activities.
To implement above-stated principles, we use independent third-party security diagnosis to utilize results for industrial security activities.
Industrial Security Report
In case of the confidential information such as leading-edge technologies developed by SK hynix systemic was leaked, it may impose severe damage to company and national security.
In case of anyone witnessed a commercial espionage or suspicious activities, please contact the security office immediately.
* The content of the report and the informer’s identity are strictly kept confidential.
Scope and Objective for Personal information Collection
SK Hynix systemic(so called ‘Company’ below) conduct information collection and processing in accordance with the Personal Information Protection Law, andin the purpose of protecting users’ personal information and interest 1) Personal Information Collection Scope
Company Name, (User) Name, Email, Contact, Q&A
2) Purpose
Q&A is available in the Homepage, data will be collected due to ‘Reply to Q&A, personal demand, complain, and ensuring efficient communication’ service
3) Time Limit
All the data collected is restricted to designated purpose and will be discarded once it was obtained, it would only be used ‘Internally’ and based upon the Agreementby the users, meanwhile in accordance with relevant Regulatory and Rules regarding Personal Information Protection
4) Reject and Consequences
In case of the User do NOT agree with the data collection, it is unavailable to access to Q&A