beta
(영문) 인천지방법원 2016.03.16 2015고단7563

부정경쟁방지및영업비밀보호에관한법률위반(영업비밀누설등)등

Text

A defendant shall be punished by imprisonment with prison labor for up to six months.

However, the execution of the above punishment shall be suspended for a period of two years from the date this judgment becomes final and conclusive.

Reasons

Punishment of the crime

From May 23, 2011 to November 10, 2014, the Defendant is a person who has been in charge of the research related to the next generation-to-household (AIT, Advance Inc., Inc., Inc., Inc., Inc.) by entering the “ELD” research institute of the victim LVPPS Co., Ltd. (hereinafter “victim”) for about three years and six months from May 23, 2011, and has been in charge of the research related to the next generation-to-generation (AIT, Advance Inc., Inc., Ltd.)., Inc., Inc., Inc., Inc., Inc., Inc., Inc., Inc., Inc., Inc., Inc., Inc., Inc., Inc., etc., in the form of a license to establish a base panel at the time of the production of the DP panel, and who has been in charge of the research related to the DPP panel.

The injured company is a company that produces display which is used for various products, such as TV set, monitoring, computer screen, mobile set, etc., from the beginning of the gold software established in 1985 to the ELD in 2008.

1. No person who violates the Unfair Competition Prevention and Trade Secret Protection Act shall acquire or use trade secrets or divulge them to a third party for the purpose of obtaining unjust profits or inflicting damage on a person holding trade secrets;

Nevertheless, the Defendant, while serving in the damaged company, had been serving in the “T&M KG” and had a mind to use confidential business information of the victimized company at the time of an interview with the intent to leave his/her job.

On September 28, 2014, around 20:18, the Defendant: (a) accessed the server of the victimized company using VPN for the purpose of preparing data to be used for 105 Dongdong-gu Incheon Metropolitan City Apartment C Apartment 105 and 1702; and (b) having access to the server of the victimized company using VPN (a service that can directly control and monitor a telecommunications network by building a data network in a Virtual work, an enterprise, etc.) for the purpose of preparing data to be used for the interview framework; and (c) Y1 technology (Y1 and accelerator of the victimized company.