Text
A defendant shall be punished by imprisonment for not less than eight months.
However, the execution of the above punishment shall be suspended for two years from the date this judgment becomes final and conclusive.
Reasons
Punishment of the crime
On September 14, 2009, the Defendant joined the Victim El electronic Co., Ltd. (hereinafter referred to as "victim Co., Ltd.") and worked as an agent at the E Team in charge of the discovery of new agencies, management of existing agencies, and discovery of new customers in Korea from September 6, 2014, and was dismissed on or around May 20, 2015, and served as the Vice Minister for Technology and Business Team from December 1, 2015 to (State).
The Defendant received education on “information security regulations” with the content of “where a company’s confidential information is prevented from being leaked to the outside and is sent out to the outside, the Defendant shall obtain approval from the relevant officer or employee,” and the Defendant signed a “a pledge of confidentiality” with the content of “where the company’s confidential information is not disclosed, delivered, divulged, or disclosed to a third party without the company’s prior written consent, and at the time of retirement, the original and copy of all confidential information under its management will not be used for any purpose other than the company’s business, and at the time of retirement, shall be returned to the company without the company’s prior written consent.” The Defendant signed a “a pledge of confidentiality” with the content of “where the company’s confidential information needs to be maintained, in particular, or where research and development information, technological information, business information, and other business information, etc. generated from the company is sent to the outside.”
2. Where a company-related information is sent outside for business purposes, the time of dispatch after approval by the head of the Department in accordance with the Regulations on Information Security of Wars.
3. All notes to be outside are monitoring to protect company's information assets.
When all of the above contents are recognized, monitoring of external transmission e-mail is regularly conducted, such as destroying a warning sign called "I consent to monitoring."