guc h1

Environmental, Safety, and Health Policy

Global Unichip Corporation (GUC), a SoC (System on Chip) Design Foundry providing design and turnkey services, recognizes environmental protection, safety and health (ESH) issues as an important cornerstone of the company's business and operations. With the continuing drive for quality of services and products, we are therefore committed to achieving "safety and zero accidents, environmental sustainability", and becoming a world-class ESH benchmark enterprise.


To achieve the above ESH goals, we have been implementing and continued the following policies:

  • Ensuring that operations and services comply with or exceed applicable ESH regulations and standards.
  • Operating in a more environmentally-sound manner, so as to realize green designs and provide green products and services.
  • Constructing a safe working environment, preventing occupational injuries and diseases, and maintaining the physical and mental health of employees.
  • Paying attention to global ESH issues, assessing their risks, and taking effective risk management or control measures.
  • Strengthening the awareness and responsibility of all employees in ESH issues, and establish an ESH-friendly culture.
  • Constructing a green supply chain and continuously improving the safety and health management system, and enhancing the overall ESF efficiency through experience sharing and joint cooperation.
  • Strengthening communication and participation with all stakeholders, taking the initiative to disclose and share relevant information and experience, and promoting the benign improvement of the industry and society.

Download

File

Download

Download

GUC ISO 45001 Certification

GUC ISO 14001 Certification

Quality Policy

GUC encourages all employees, with the spirit of constant innovation and improvements, to provide high quality ASIC service, production service and IP to our customers. We strive to listen to customers' voice and to be the most reliable and valuable partner.

GUC follows international quality standards, including ISO 9001, ISO 13485, and IECQ QC 080000 to establish its quality system infrastructure.


  • ISO 9001 : GUC is committed to providing competitive advantages for improving the efficiency and productivity of the organization, enhancing customer satisfaction and promoting continuous improvement
  • ISO 13485:GUC has medical chip design and effective mechanism.
  • IECQ QC 080000:GUC has adopted Green IC design and makes constant efforts for elimination of hazardous substances in accordance with technology innovation.
  • Product Design and Life Cycle Assessment
  • UC has adopted Green IC design and strictly requires suppliers not to use harmful substances in manufacturing, and do not contain restricted hazardous substances in product packaging materials, ensures green IC production. GUC has always aimed to avoid entirely or minimize the use of hazardous substances that may pollute the environment, such as global warming, Ozone Depleting Substances and other aspects.
  • The assessment of potential environment impacts

Download

File

Download

Download

GUC ISO 9001 Certification (Quality Management System)

GUC IECQ QC 080000 Certification (Green Product)

GUC ISO 13485 Certification (Medical Devices)

GUC Sony Green Partner Certificate

Policy & regulation

Information Security Policy

I. Information Security Governance System, Goals and Strategies

GUC aims at building a tight and effective information security defense network as its information security vision. With consistency in information security governance, the Company is gradually improving its comprehensive protection capabilities, and hopes to become an enterprise with outstanding performance and maturity in information security governance. The Information Security Department is in overall charge of the information security system and relevant compliance. It also promotes the implementation of relevant operations to continue the improvement of information security awareness and professional capabilities. Through the application of technologies, the information security risks and weaknesses are identified, for which effective reinforcement measures are taken to build up a sound governance system and comprehensive information security protection capabilities, and meanwhile to cultivate employees' information security awareness.I. Information Security Governance System, Goals and Strategies.

II. Security Policy ImplementationII. Security Policy Implementation


1. Formulate information security management guidelines in line with regulatory and customers’ requirements.

2. Build a consensus on the comprehensive implementation of information security protection through all employees’ awareness.

3. Protect the confidentiality, completeness, availability and legal compliance of the Company’s and customers’ information.

III. Security Organizations

1. Security Committee


The "Information Security Committee" is responsible for the management and planning of information operations security, and the establishment and maintenance of information security management systems. As the top information security supervisors, they oversee the execution of the company’s entire information security operations and the efficacy of the information security risk management mechanism, report to president, update the progress in the management meeting of senior executives each quarter, and present the execution outcome of the overall information security management organization related information security operation and system to the Board of Directors each year to ensure that senior executives and Board members fully understand the company’s current information security management status and enforce management’s requirements for information security policies. Act as the highest-ranking officer responsible for information security. A “meeting of information security representatives” is held at least once per year and the meeting participants cover the responsible personnel of relevant information systems and external information security consultants in a number exceeding 13 persons to review the information security development plans and implementation results, and to announce policies related to information security and implementation focuses.

2.Proprietary Information Protection (PIP) Committee

PIP Committee: The PIP is constituted by the representatives designated by supervisors of the respective divisions of the entire company (including its branches throughout the world). The committee has a total of 21 colleague members including the chairperson; the executives at the vice general manger level holds quarterly meetings, responsible for the research/discussion, establishment, audit, promotion, etc. of all the Company’s proprietary information control operations. Protecting proprietary information is GUC's commitment to customers, shareholders and the Company’s employees. GUC understands that proprietary information protection is closely related to the Company's current and future competitive advantages. Thus, the《Proprietary Information Protection (PIP) Policy》has been formulated to clearly define the Company's proprietary information protection management procedures and regulations, by which the Company can properly control its trade secrets and undisclosed confidential information related to GUC to ensure the best interests of the Company, shareholders, employees, customers and suppliers. GUC's proprietary information protection is carried out based on the management cycle of Plan-Do-Check-Act (PDCA), which continuously strengthens the ability to protect proprietary information, and enhances personnel's correct concept about and vigilance over proprietary information protection, thereby reducing the risk of proprietary information leakage.GUC has also formulated management measures to incorporate information security and ethical management within employee performance evaluations.

2.1 Inspections are conducted on a quarterly basis to ensure the implementation of the Company's proprietary information protection measures.

2.2 Raise the awareness of proprietary information and the rules to follow through everyday work and various occasions.

2.3 Conduct educational training to improve employees' information security awareness and capability. In addition to listing proprietary information control as a mandatory topic for new employees’ training, all employees should also be re-trained twice every year to continuously strengthen and enhance their information security awareness.

2.4 Regarding PIP violations, management measures have been formulated, and reporting mechanisms have been established to assess responsibility and administer penalties.Relevant punishments and required corrections have been made in accordance with the cause of the violation and the degree of the impact, and dissemination as well as educational training has continued. The PIP violations occurring over the years are listed as follows:

The total number of violations resulting from employee’s failure to comply with the proprietary information protection procedure in 2024 accounts for 0.12% of the number of employees.2.4 Regarding PIP violations, management measures have been formulated, and reporting mechanisms have been established to assess responsibility and administer penalties.Relevant punishments and required corrections have been made in accordance with the cause of the violation and the degree of the impact, and dissemination as well as educational training has continued. The PIP violations occurring over the years are listed as follows:

The total number of violations resulting from employee’s failure to comply with the proprietary information protection procedure in 2024 accounts for 0.12% of the number of employees.

PIP training

PIP training

Total number of employees in the prevailing year

Ratio of employees who completed the training

2022

2023

2024

759

819

839

100%

100%

100%

PIP Violation

PIP Violation

Number of violations by colleagues

Number of violations by outsourcing suppliers

2022

2023

2024

1

1

1

0

0

0

IV. Security risk management framework countermeasures

1. Information security defense capability reinforcement and maturity evaluation:

Conduct regular information security tests for system strengthening, and continue the implementation of business continuity drills. Develop cybersecurity incident response plans, and take corresponding reporting and recovery actions. At the same time, risk analysis is conducted through third-party verification (3rd-Party Risk Assessment), utilizing objective results and threat intelligence from platforms such as Security Scorecard and Panorays to further enhance the information security management framework.

The target score for Security Scorecard in 2024 is set at 95 or above, with the score maintained at 98 or higher since January 2024.

The target score for Panorays in 2024 is set at 90 or above, with the score maintained at 97 or higher since January 2024. 

The frequency of External Vulnerability Scan has been increased from once per week to currently once per day. Any high-risk vulnerability being identified can be fixed at once.

To further reinforce its anti-hacking capabilities, the Company engaged a locally-renowned white hat hacker team to simulate offensive and defensive assessments with a Red Team in 2022 and conducted penetration testing in 2024. Apart from taking the initiative to understand hacker’s thinking and strengthening employees’ anti-hacking awareness, such experience has been used to continue to improve the intranet automatic joint defense system.

2. Information security management procedures upgrade:

GUC successfully met the ISO 27001 international standard for information security in 2021 and obtained certification. Through annual surveillance audits, the company continuously improves its information security management system.

In response to the International Organization for Standardization (ISO) officially releasing the ISO/IEC 27001:2022 standard on October 25, 2022, the company completed the document review and on-site audit in October 2024, Passing the transition review and re-certification audit with no nonconformities.

3. Risk management

The major risks concluded from the analysis of various possible combinations of threats and weaknesses assessed in annual risk assessments are as follows:

3.1 Fraudsters use fake emails to trick company’s employees into sending money or making transactions.

3.2Those who commit industrial espionage or a company’s competitors use hacking techniques to continuously hack into the company’s internal hosts and steal the company’s internal information.

3.3 Crime groups work with hackers to distribute contents with malicious links through emails, text messages, social software, and communication software. A victim's computer data may be encrypted and kidnapped, and a high ransom will then be asked for the recovery.

3.4 Hackers launch a large number of connection requests through the Internet, interrupting the normal operations of a company's network.

3.5 Internal employees use illegal software, or copy the company's confidential and sensitive information to portable storage devices, which may lead to information leakage if the devices are lost, stolen or sold.

3.6 Information software/hardware may be damaged due to natural or man-made disasters, resulting in service interruption or data loss.

3.7 The evaluation suggests that likely losses resulting from the overall information security risk is still low and falls within the range of self-protection. The results of annual evaluations are also reported to the Board of Directors.

3.8 Currently no Information Security Insurance has been taken out; however, for the above-mentioned risk concerns, several measures such as the application of information security management principles, introduction of technological solutions, and reinforcement of information security educational training are concurrently employed to establish fortified information security management mechanisms. The key measures are as follows:

(3.8.1) .Regular internal and external audits are conducted to ensure compliance. The company obtained ISO 27001:2013 certification in Q4 2021 and successfully passed the annual certification audit and transition review to the updated standard in October 2024. The company has obtained the new ISO 27001:2022 certification and continues to enhance its information security management system.

(3.8.2) Two social engineering attack simulation exercises are conducted every year. Employees who fail an exercise or who fail two consecutive exercises are required to then attend information security reinforcement training. Such training enhances employees’ sense of alertness against email fraud.

(3.8.3) Install antivirus and MDR(Managed Detection and Response) protection systems on the client side to provide real-time anomaly detection and alerting as well as forensic analysis and endpoint recovery functions. Block USB storage device connection and stop users from installing software. Moreover, provide Backup File Server for users to back up important data.

(3.8.4) With respect to the network layer, incorporate the use of firewalls to control network traffic and applications. Develop a security monitoring and management mechanism for intranet protection and database access.

(3.8.5) Employ the DRM (Digital Right Management) confidential and sensitive document management system and disk encryption technologies to protect the confidentiality of documents.

(3.8.6) Adopt mail filtering and auditing systems and Anti-APT solutions to reduce the risks arising from email usage.

(3.8.7) Introduce fingerprint identification systems and swipe-card systems in gateway management to meet the physical security requirements of two-factor authentication.

(3.8.8) Centralize the management of hosts and establish environmental control and alarm mechanisms for the data center. Perform regular data backups and carry out emergency recovery drills on a yearly basis.

(3.8.9) The multi-factor authentication mechanism has been compulsorily used for the remote access, so as to reduce the risk of password theft and credential stuffing attack. In addition, full video-taping has also been made to effectively record the use behavior and establish the audit track.

3.9 An important information system’s disaster recovery drill has been performed twice per year to ensure timely response when system abnormalities occur, reduce system downtime, and lower the impact on the company’s operations.

3.10 The Red Team Assessment was conducted in 2022 to simulate an invasion attack while not affecting the company’s operations so as to authenticate information security detection and response abilities and grasp the potential risk condition. The eight information security leaks found in the assessment have all been promptly improved upon and protection measures have been adopted.

3.11 In 2024, a penetration test was conducted to identify and remediate potential vulnerabilities in systems containing highly sensitive data. This initiative aimed to further improve and strengthen security measures. As a result, two vulnerabilities have already been addressed and reinforced.

3.12 The responsible persons of respective information systems have been weekly convened to discuss current week’s information security incidents and adopt required protection measures.

social engineering attack simulation

Total number of employees in the prevailing year

Ratio of employees who completed the simulation

2022

2023

2024

759

819

839

100%

100%

100%

4. Training

he Information Security Department also conducts Information Security Awareness-raising Educational Training for all employees on a quarterly basis. The topics are determined based on the encountered internal/external threats. The topic for each quarter of 2024 is listed as follows:

2024 Information Security Awareness-raising Educational Training

Quarterly Result

TOPIC

CONTENT

Quarter 1

What is Stealer Malware

Quarter 2

Precautions When Using Social Media

Quarter 3

How to Prevent Deepfake AI Scam Videos

Quarter 4

How to Identify Fake News in the Digital Age

V. Resources invested in information security

The Company keeps investing resources in information security related fields. Resources being invested in improving the fundamental structure for governance and technology, strengthening the equipment for information security defense, information/data monitoring and analysis, incident response drills, educational training, etc. to comprehensively enhance the information security capabilities.

VI. Incidents

A specific information security reporting and handling process has been established to report and handle information security incidents. Information security incidents are accepted and graded by the reporting point of contact of the information unit. If the incident is a major information security incident, it will be reported to the risk management panel, and the information unit shall eliminate and solve the incident within the scheduled time limit, and conduct a root cause analysis and adopt remedy measures after the incident is fully handled, so as to prevent a repeat occurrence.

So far in 2024, we have not suffered any losses due to major security incidents.

Cyber security incidents

Material cyber security incidents

Number of data leaks

Number of employee and customer’s personal information leaks

Amount of penalties resulting from information security incidents

2022

2023

2024

0

0

0

0

0

0

0

0

0

0

0

0

IP Right Management

GUC has established the following strategy by aligning the key objectives of business operation with protection of intellectual property rights. For the specific development of silicon intellectual property ("SIP") and advanced package technology("APT", patent engineers and R&D personnel review the results of research and development to evaluate the feasibility of patent applications. GUC will actively apply for patents for those cases with patent portfolio value, and keep track of the progress. To strengthen GUC's competitiveness in specific areas, this approach is also valuable to patent the SIP project/IC product and eventually achieve the goal of protecting SIP project/IC product. The relevant management between patented intellectual property and SIP can also be used as the benchmark for evaluation of patented intellectual property as well. By the date of December 31, 2024, GUC has obtained 560 patents in the world. The manager of the legal department reports to the board of directors meeting on the implementation of the intellectual property management plan at least once per year.

Moreover, GUC has initiated the related management plans for intellectual property rights since 2000. The main achievements are illustrated as follows:

"The Patent Application Procedure" was promulgated in 2000. The then-current version is 22th edition released on Aug 09, 2022.
"The Proprietary Information Protection Procedure" was established in 2003. The latest version was 10th edition released on May 26, 2021.
"The Trademark Management Regulation" was enacted in 2008. The latest version was 3rd edition released on May 23, 2012.
"The Proprietary Information Protection Policy" was published in 2012.
In 2015, GUC's patent management on-line system ("System") was launched. It significantly improved the management of patent-related affairs, such as proposal management, application management, bonus management, contractor (i.e., external IP firm) management and comprehensively enhanced the efficiency of patent-related operations. Meanwhile, the System has recorded the complete internal technology and patent research/development results which cover the phases from patent proposal to submission of the said application.
"The Policy of Intellectual Property Rights Management" was formulated in 2016.

Complaint Policy and Procedures

Complaints Policy

For safeguarding the rights and interests of employees, developing mutual labor relations and establishing a complete management system, Global Unichip Corporation has established the Global Unichip Corporation Complaints Policy to institute the Company's complaint filing channels and investigation procedures, and to protect the Company's legitimate rights and interests.

Complainant may provide the above information through the following channels: Inbox: ombudsman@guc-asic.com, Mail address: No. 10, Li-Hsin 6th Rd. Hsinchu Science Park, Hsinchu City, Taiwan/GUC’s Human Resource. GUC employees shall file reports in accordance with the procedures under this Regulation. Unless under exceptional circumstances, complaint cases shall not be disclosed to external third parties (e.g. news media, public representatives, affiliated companies) without authorization. 

Whistle Blowing Policy

For the purpose of establishing a corporate culture of honest business operations, and in accordance with the provisions of Article 5, Paragraph 5 and Article 25 of Global Unichip Corporation's "Procedures for Ethical Corporate Management and Guidelines of Conduct", Global Unichip Corporation has established the Global Unichip Corporation Whistle Blowing Policy to clearly establish the Company's whistle blowing channels and investigation procedures, and to protect the Company's legitimate rights and interests.



Whistleblowers may provide the above information through the following channels: ombudsman@guc-asic.com, fax/telephone line: 03-5790696, mail address: No. 10, Li-Hsin 6th Rd. Hsinchu Science Park, Hsinchu City, Taiwan/GUC’s Internal Audit, GUC's official website for Irregular Business Conduct Reporting System, or the Chairman of the Audit Committee's mailbox (acinfo@guc-asic.com).

Download Policy

Item

DOWNLOAD

File Download

GUC Complaints Policy

GUC Whistle Blowing Policy

SEARCH

ENTER

Modal4

COOKIES

This website uses browser cookies to provide you with the best user experience. For related information, please visit our . If you choose to continue browsing or close this prompt, it means that you have accepted our website terms of use.
LATER
ACCEPT

Cookies Policy

Last updated: Jan. 01, 2022

This Notice is issued by Global Unichip Corporation. (“GUC”, “we”, “us” and “our”).

This Notice applies to websites that are operated or controlled by GUC:

What Are Cookies?

Cookies are simple text files that are stored on your computer or mobile device by a website’s server. Each cookie is unique to your web browser. It will contain some anonymous information such as a unique identifier, website’s domain name, and some digits and numbers.

Necessary cookies
Necessary cookies allow us to offer you the best possible experience when accessing and navigating through our website and using its features. For example, these cookies let us recognize that you have created an account and have logged into that account.
Functionality cookies
Functionality cookies let us operate the site in accordance with the choices you make. For example, we will recognize your username and remember how you customized the site during future visits.
Analytical cookies
These cookies enable us and third-party services to collect aggregated data for statistical purposes on how our visitors use the website. These cookies do not contain personal information such as names and email addresses and are used to help us improve your user experience of the website.

Why Do We Use Cookies?

We may use cookies to:

  • distinguish between visitors;
  • improve the use and the functionality of our Sites;
  • tailor our Sites and products to your needs and preferences;
  • analyse how our Sites are used and compile anonymous and aggregate statistics; and to show you personalized advertisements when you visit other websites or applications on the internet.

We do not use the collected information to create visitor profiles.

Cookies Used on This Website

Our Website uses single-session (temporary) and multi-session (persistent) cookies. Temporary cookies last only as long as your web browser is open, and are used for technical purposes such as enabling better navigation on our Website. Once you close your browser, the cookie disappears. Persistent cookies are stored on your computer for longer periods and are used for purposes including tracking the number of unique visitors to our site and information such as the number of views a page gets, how much time a user spends on a page, and other pertinent web statistics. Cookies, by themselves, will not be used by GUC to disclose your individual identity. This information identifies your browser, but not you, to our servers when you visit the Website. If you want to disable the use of cookies or remove them at any time from your computer, you can disable or delete them using your browser (consult your browser's "Help" menu to learn how to delete cookies). Below you will find a list of the cookies we may use on our Website:

Type of Cookie

Name

Purpose

Duration

Cookies Used on This Website

Type of Cookie

HTTP

Name

_ga

Purpose

Registers a unique ID that is used to generate statistical data on how the visitor uses the Website.

Duration

2 years

Type of Cookie

HTTP

Name

_gat

Purpose

Used by Google Analytics to throttle request rate.

Duration

1 day

Type of Cookie

HTTP

Name

_gid

Purpose

Registers a unique ID that is used to generate statistical data on how the visitor uses the Website.

Duration

1 day

If you want to restrict or block the cookies that are set by our website, you can do so through your browser setting. Alternatively, you can visit https://www.allaboutcookies.org/manage-cookies/, which contains comprehensive information on how to do this on a wide variety of browsers and devices. You will find general information about cookies and details on how to delete cookies from your device.

Privacy Policy

Last modified: August 8, 2024

I. Introduction

We are committed to protecting your privacy. This policy describes the types of personal information that we may collect from you or that you may provide when you visit the website https://www.guc-asic.com/en/ (the "Website") utilize our services, or interact with us through social media websites, and our practices for collecting, using, maintaining, protecting, and disclosing that information. This policy does not apply to information collected by a third party.

We provide this policy to explain the type of information we collect and to inform you of the specific practices and guidelines that protect the security and confidentiality of your personal data. Please read this policy carefully. If any term in this policy is unacceptable to you, please do not provide any personal data. This policy may change from time to time (see Revisions to Our Privacy Policy).

II. Information We Collect About You and How We Collect It

We collect several types of information from and about individuals, which may include information defined as personal data or personally identifiable information under an applicable law (“personal data”). For example, we may collect information – if you choose to provide it – such as your name, home address, date of birth, ID number, marital status, family information, education, contact information, working experiences, profession, e-mail address, telephone number, country, job function, company/organization name, industry. We may also collect information about your internet connection and the equipment you use to access our Website. We may automatically collect information such as your usage details, IP addresses, and information collected through cookies for limited purposes.

Information You Give to Us.

The information we collect about individuals may include:

  • Information that you provide by filling in human resource related forms (e.g., resume maintenance).
  • Records and copies of your correspondence with us (including email addresses and contact information provided through the contact form and communications with us through chat/messaging features).
  • Records and copies of your purchases and transactions.
  • Warranty registration data.
  • Payment information such as payment account or bank account information or payment history.

Information We Collect About You.

In addition to the information you give us, we may also collect information about you from third party service providers, affiliates and/or partners. For example, we may collect credit or employment information from credit bureaus or any other third parties with your consent.

As you navigate through and interact with our Website, we may use automatic data collection technologies to collect certain information about your equipment, browsing actions, and patterns, including:

  • Details of your visits to our Website, including resources that you access and use on our Website, traffic data, location data, logs, language, date and time of access, frequency, and other communication data.
  • Information about your computer and internet connection, including your IP address, operating system, host domain, and browser type.
  • Hardware and software information
  • Information about how you interact with our service.
  • Device identifiers.
  • Error reports.
  • Details of referring Websites.

The information we collect automatically is statistical data that helps us improve our Website and deliver a better and more personalized service, including by enabling us to:

  • Determine Website traffic patterns.
  • Count web visits.
  • Determine traffic sources so we can measure and improve the performance of Website.
  • Help us to know which pages and content are the most and least popular.
  • Observe Website search patterns to provide more intuitive navigation cues.
  • Determine user frequency and recency.

Google Analytics.

This Website uses Google Analytics, a web analytics service provided by Google, Inc. (“Google”). Google Analytics uses cookies, which are text files placed on your computer, to analyze how users use the Website. The information generated by the cookie about your use of the Website will be transmitted to and stored by Google on servers in the United States of America (“USA”).

Google will use this information on behalf of us as the operator of this Website for the purpose of evaluating your use of the Website, compiling reports on Website activity for us and providing us other services relating to website activity and internet usage.

The IP address that your browser conveys within the scope of Google Analytics will not be associated with any other data held by Google. You may refuse the use of cookies by selecting the appropriate settings on your browser; however, please note that if you do this you may not be able to use the full functionality of this Website.

The legal basis for the use of Google Analytics is your consent provided by accepting the use of cookies and specifically Google Analytics via our [cookie banner / cookie consent tool] when visiting our Website for the first time. The recipient of the collected data is Google. Personal data will be transferred to the USA under the EU-US Data Privacy Framework. You can locate the certificate by visiting https://www.dataprivacyframework.gov/list and searching for Google. The data sent by us and linked to cookies, user-identifiers (e.g., User-IDs) or advertising-identifiers are automatically deleted after 14 months. Data whose retention period has been reached is automatically deleted once a month.

You can withdraw your consent at any time with effect for the future and opt-out from being tracked by Google Analytics by downloading and installing Google Analytics Opt-out Browser Add-on for your current web browser: (click here: https://tools.google.com/dlpage/gaoptout?hl=en-GB). To prevent Universal Analytics from collecting data across different devices, you must opt-out on all systems used. If you click here, the opt-out cookie will be set.

Cookies Used on This Website.

Our Website uses single-session (temporary) and multi-session (persistent) cookies. Temporary cookies last only as long as your web browser is open and are used for technical purposes such as enabling better navigation on our Website. Once you close your browser, the cookie disappears. Persistent cookies are stored on your computer for longer periods and are used for purposes including tracking the number of unique visitors to our site and information such as the number of views a page gets, how much time a user spends on a page, and other pertinent web statistics. Cookies, by themselves, will not be used by us to disclose your individual identity. This information identifies your browser, but not you, to our servers when you visit the Website. If you want to disable the use of cookies or remove them at any time from your computer, you can disable or delete them using your browser (consult your browser's "Help" menu to learn how to delete cookies).

Below you will find a detailed list of the first-party cookies we may use on our Website:

First-party Cookies

Type of Cookie

Name

Purpose

Duration

Cookies Used on This Website

Type of Cookie

HTTP

Name

_ga

Purpose

Registers a unique ID that is used to generate statistical data on how the visitor uses the Website.

Duration

2 years

Type of Cookie

HTTP

Name

_gat

Purpose

Used by Google Analytics to throttle request rate.

Duration

1 day

Type of Cookie

HTTP

Name

_gid

Purpose

Registers a unique ID that is used to generate statistical data on how the visitor uses the Website.

Duration

1 day

III. How We Use Your Information

Below please find information about how we process information collected about you (including personal data) as well as the corresponding legal basis. We may process your information where the processing is:

Necessary for entering into or the performance of a contract with you. For example:

  • To carry out our administrative and service-related obligations arising from any contracts entered into between you and us and to provide you with the information, products, and services that you request from us.
  • To determine credit risk.
  • To process your job application.

Necessary for us to comply with a legal obligation.

Necessary for the purposes of the legitimate interests pursued by a third party or us (to the extent it does not infringe on any data subject's fundamental rights and freedoms). For example:

  • To ensure that content from our Website is presented in the most effective manner for you and for your computer.
  • To deliver a more tailored and personalized experience.
  • To allow you to participate in interactive features of our service (when you choose to do so).
  • To keep our Website and systems safe and secure.
  • To provide you with technical support and to improve our Website and services.
  • To provide you with information that you have requested and respond to your inquiries.
  • To notify you about changes to our service or our Website.
  • If you are an existing customer, to better understand your preferences and communicate (including by email and SMS) with you to provide information about products and services similar to those that were the subject of a previous sale or negotiations of a sale to you.
    • Subject to applicable law and regulations, in the event of a sale, merger, consolidation, change in control, transfer of substantial assets, reorganization, or liquidation, to transfer, sell, or assign to third parties information concerning your relationship with us, including, without limitation, personal data that you provide and other information concerning your relationship with us.
  • Subject to applicable law and regulations, in the event of a sale, merger, consolidation, change in control, transfer of substantial assets, reorganization, or liquidation, to transfer, sell, or assign to third parties information concerning your relationship with us, including, without limitation, personal data that you provide and other information concerning your relationship with us.

IV. Disclosure of Your Information

We may disclose aggregated information about our users, and information that does not identify any individual, without restriction. Subject to applicable laws and regulations, we may disclose personal data that we collect or you provide as described in this policy:

  • To any member of our group, which means our affiliates and subsidiaries.
  • To contractors, service providers, and other third parties we use to support our business or in connection with the administration and support of the activities noted above and who are bound by contractual obligations to keep personal data confidential and use it only for the purposes for which we disclose it to them (e.g., database hosting providers, managed services providers, developers, consultants).
  • To a buyer or other successor in the event of a merger, divestiture, restructuring, reorganization, dissolution, or other sale or transfer of some or all of our assets, whether as a going concern or as part of bankruptcy, liquidation, or similar proceeding, in which personal data held by us about our Website users and customers is among the assets transferred.
  • To fulfill the purpose for which you provide it. For example, if we are asked, via email, to contact a third party on your behalf, we may transmit the contents of your email to that third party.
  • For any other purpose disclosed by us when you provide your information or with your consent when required by applicable laws and regulations.
  • If we are under a duty to disclose or share your personal data in order to comply with any legal obligation, or in order to enforce or apply our terms of use and other agreements, including for billing and collection purposes; or to protect the rights, property, or safety of us, our customers, or others. This may include exchanging information with other companies and organizations for the purposes of fraud protection and credit risk reduction.ou with information that you have requested and respond to your inquiries.

V. Cross-border Transfers of Personal Data

The data that we collect from you will be transferred to, and stored at, a destination outside the European Economic Area ("EEA"). It may also be processed by staff operating outside the EEA who work for us or other entities acting as data processors processing data on our behalf. This includes staff engaged in, among other things, the fulfillment of your request or order and the provision of support services. We have implemented international data transfer agreements on the basis of EU Standard Contractual Clauses in order to provide appropriate and suitable safeguards for personal data being transferred to countries outside the EEA where an adequate level of protection is not already guaranteed. A copy can be obtained by contacting us at privacy@guc-asic.com. We will take all steps reasonably necessary to ensure that your data is treated securely and subject to appropriate safeguards in accordance with this policy and applicable legislation.

VI. Data retention

The length of time we retain personal data depends upon the purposes for which it was collected and how it is used to provide service, comply with applicable laws, and/or establish, exercise, or defend our legal rights. Unless otherwise required by law, we will erase personal data when it is no longer necessary in relation to the purposes for which was collected or otherwise processed; when you withdraw your consent (where lawfulness of processing was based on your consent) and there is no other legal ground for the processing; when you object to the processing and there are no overriding legitimate grounds for the processing; when your personal data has been unlawfully processed; and when it is necessary to comply with legal obligations.

VII. Choices About How We Use and Disclose Your Information

We strive to provide you with choices regarding the personal data you provide to us. We have created mechanisms to provide you with the following control over your information:

Cookie Settings.

You can set your browser to refuse all or some browser cookies, or to alert you when cookies are being sent. If you disable or refuse cookies, please note that some parts of this Website may then be inaccessible or not function properly.

Promotional Offers from Us.

If you do not wish to have your contact information used by us to promote our own products or services, you can check certain boxes on the forms we use to collect your data. You can also always exercise your right to ask us not to process your personal data for markzeting purposes by contacting us at privacy@guc-asic.com. If we have sent you a promotional email, you may send us a return email asking to be omitted from future email distributions. Please note that this does not apply to information provided to us as a result of a product purchase, warranty registration, product service experience, or other transactions.

Categories of Personal Information We Collect

  • Identifiers, such as name, address, online identifiers, IP address, email address, account username and credentials.
  • Personal Information, such as telephone number, employment history, bank account number, credit card numbers or financial information.
  • Commercial Information, such as information about products purchased and used, information about warranties registered.
  • Biometric Information
  • Internet or Similar Network Activity Information, such as log information, mobile network information, chat messages or emails sent to us and responses to surveys or requests for feedback about service, referral website data, computer and internet connection, browser type.
  • General Geolocation Data
  • Professional/employment Data, such as work history and work performance reviews or recommendations.
  • Inferences drawn about your interests in our products based on your previous purchasing history or Website visits.
  • Sensitive Personal Information, such as any account log-in and passwords you create to manage your account, precise geolocation, union membership.

Depending on your interactions with us, we have collected and disclosed the categories described above, which may include sensitive information, to third parties in the preceding 12 months. Third parties include:

  • Our affiliates and subsidiaries
  • Our contractors, service providers, and other third parties if necessary, such as software providers, analytics providers.
  • Business successor in event of a merger, divestiture, restructuring, reorganization, dissolution, or other sale or transfer of some or all of our assets.
  • Credit bureaus, upon receiving consent.
  • Government entities, such as judicial, regulatory, or law enforcement agencies when required by order, subpoena, warrant, or similar document requiring disclosure.

VIII. Your Rights With Regard to Your Personal Data

We remind you that you, or your authorized agent (upon validation of authorization), may at any time exercise certain rights you may have under applicable laws and regulations, without penalty or disadvantage. Your rights may include:

  • The right to request access to your personal data, which includes the right to obtain confirmation from us as to whether or not personal data concerning you is being processed, and where that is the case, access to the personal data and information related to how it is processed.
  • The right to rectification or erasure of your personal data, which includes the right to have incomplete personal data completed, including by means of providing a supplementary statement, inaccurate data corrected, and certain rights to request us to erase your personal data without undue delay. In some circumstances, data may be exempt from deletion.
  • The right to restrict or object to processing concerning your personal data, which includes restricting us from continuing to process your personal data under certain circumstances (e.g., where you contest the accuracy of your personal data, processing is unlawful, your personal data is no longer needed for the purposes of processing, you have objected to processing related to automated individual decision-making, or you have objected to the processing of your sensitive data).
  • The right to data portability, which includes certain rights to have your personal data transmitted from us to another controller.
  • Where data processing is based on your consent, the right to withdraw consent at any time.
  • The right to lodge a complaint with a supervisory authority.

Any requests related to the above rights may be made by sending an email to privacy@guc-asic.com . We strive to respond to all requests promptly and within any legal deadlines. Once we receive your request, we may verify your identity by requesting additional information sufficient to confirm your identity.

IX. Data Security

We have implemented measures designed to secure your personal data from accidental loss and from unauthorized access, use, alteration, and disclosure. Personal data provided to us in accordance with this policy will be encrypted in transit and at rest.

Unfortunately, the transmission of information via the internet is not completely secure. Although we will do our best to protect your personal data, we cannot guarantee the absolute security of the data. Any transmission of your personal data is at your own risk.

X. Third-party Websites

Our Website may contain links or references to other Websites outside of our control. Please be aware that this policy does not apply to these Websites. The Company encourages you to read the privacy statements and terms and conditions of linked or referenced Websites you enter. These third-party Websites may send their own cookies and other tracking devices to you, log your IP address, and otherwise collect data or solicit personal data. WE DO NOT CONTROL AND ARE NOT RESPONSIBLE FOR WHAT THIRD PARTIES DO IN CONNECTION WITH THEIR WEBSITES, OR HOW THEY HANDLE YOUR PERSONAL DATA. PLEASE EXERCISE CAUTION AND CONSULT THE PRIVACY POLICIES POSTED ON EACH THIRD-PARTY WEBSITE FOR FURTHER INFORMATION.

XI. Children Under the Age of 18

Our Website and Services are not intended for or directed to children under 18 years of age, and we do not knowingly collect or use any personal data from children under the age of 18. No one under the age of 18 may provide any information to or on the Website or to our employees. If we learn we have collected or received personal data from a child under the age of 18, we will delete that information. If you believe we might have any information from or about a child under the age of 18, please contact us at privacy@guc-asic.com

XII. Revisions to Our Privacy Policy

We reserve the right to change this policy at any time. Any changes we make will be posted on this page. If we make material changes to how we treat your personal data, we will notify you through a posting on the Website. The date this policy was last revised is identified at the top of the page. Your continued use of our Website and services after such amendments will be deemed your acknowledgement of these changes to this policy.

XIII. Data Controller & Contact Information

The data controller is Global Unichip Corporation, No. 10, Li-Hsin 6th Road, Hsinchu Science Park, Hsinchu City 300096, Taiwan. Should you have any questions or concerns about this policy and our privacy practices, you may contact us at privacy@guc-asic.com

Legal and Trademark

Please Read These Terms Carefully Before Using This Site.

The information and materials included in this website (the "Site") are provided by Global Unichip Corp. ("GUC") as a service to its customers and may be used for informational purposes only. Any promotional efforts by other company without specific written approval by GUC are restricted. Single copies may be downloaded subject to the provisions below. Your access and use of the Site, along with any services or materials contained or referenced herein, is governed by and subject to the following terms as well as all applicable laws. Please review the terms carefully, before using the Site. By accessing, using or downloading any materials from the Site, you agree to be bound by the terms.

Trademark Information:

Registered Trademark of GUC:

GUC's trademarks may be used publicly with permission only from GUC. Fair use of GUC's trademarks in advertising and promotion of GUC products requires proper acknowledgement. All other trademarks and logos are the property of their respective owners.

Copyright and Ownership:

The material contained in the Site are protected by worldwide copyright laws and treaty provisions. They may not be copied, reproduced, modified, published, uploaded, posted, transmitted, or distributed in any way, without GUC's prior written permission. Except as expressly provided herein, GUC and its suppliers do not grant any express or implied right to you under any patents, copyrights, trademarks, or trade secret. Other rights may be granted to you by GUC in writing or incorporated elsewhere in the materials. GUC may at any time in its sole discretion and without notice, discontinue, remove and/or discard the Site or any content within the Site for any reason. GUC may terminate your access to the Site for any reason, including if GUC believes in its sole discretion that you have violated or acted inconsistently with the letter or spirit of these Terms.

Feedback

Except where expressly provided otherwise by GUC, all comments, feedback, information or materials submitted to GUC through or in association with the Site shall be considered non-confidential and the property of GUC. By submitting such comments, feedback, information or materials to GUC, you agree to a free of charge assignment to GUC of all worldwide rights, title and interest in copyrights and other intellectual property rights to the comments, feedback, information or materials. GUC shall be free to use such comments, feedback, information or materials on an unrestricted basis.

Use of Your Information

Your personal information may be used within GUC or shared with GUC business locations throughout the world. GUC may also track the Internet addresses of our visitors and analyze this data for trends and statistics.

Disclaimer

THE INFORMATION PROVIDED ON THE SITE MAY BE OUT OF DATE OR INCLUDE OMISSIONS, INACCURACIES OR OTHER ERRORS. EXCEPT WHERE EXPRESSLY PROVIDED OTHERWISE IN AN AGREEMENT BETWEEN YOU AND GUC, ALL INFORMATION PROVIDED DIRECTLY ON THE SITE OR INDIRECTLY THROUGH THE SITE BY HYPERTEXT LINK OR OTHERWISE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. GUC HEREBY DISCLAIMS ALL WARRANTIES WITH RESPECT TO THIS INFORMATION, WHETHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY, SATISFACTORY QUALITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL GUC BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL OR CONSEQUENTIAL DAMAGES, OR DAMAGES FOR LOSS OF PROFITS, REVENUE, DATA OR USE, INCURRED BY YOU OR ANY THIRD PARTY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM YOUR ACCESS TO, USE OF, OR RELIANCE UPON INFORMATION OBTAINED FROM OR THROUGH THE SITE. GUC RESERVES THE RIGHT TO MAKE CHANGES, UPDATES OR CORRECTIONS TO THE INFORMATION ON THE SITE AT ANY TIME WITHOUT NOTICE.