Text
Defendants shall be punished by imprisonment for eight months.
However, the above judgment against the Defendants for two years from the date of this judgment became final and conclusive.
Reasons
Punishment of the crime
Defendant
A The operator of “D” established for the purpose of processing and assembling machinery parts on August 18, 2009, and the operator of “D” on May 6, 1991, who was employed by the injured private person on the part of “A” through the E Research Institute and served as the head of “E”, and who retired on May 31, 2009 when he was in charge of the development, design, business, etc. of “scale” produced by the damaged private person (a machinery component that the product sets up an object under the speed of public disclosure), “borg” (a component that sets a object) and “borg” (a component that sets a object).
Defendant
B is a person who serves as the head of the division in the foregoing “D”, and was employed as E Research Institute on March 23, 2007 as a member of the damaged company, and was in charge of designing and neglecting the “scale”, “proof-gu” (a device with vibration when processing close products), etc., produced by the victim, and retired on August 31, 2012.
The injured party is a corporation established on March 22, 1993 for the purpose of manufacturing, selling, etc. machinery and parts, and is a company that has domestic highest technical skills and know-how in this field, such as producing and developing, and manufacturing precise processing parts related to air-proof equipment, such as "scales", "proofs", and "bombs", and supplying them to 300 domestic and foreign enterprises through national and foreign business offices, including China, creating sales equivalent to about 15 billion won per year.
On the other hand, the injured party's design drawings related to precise machinery developed and produced, factory machinery, and fire-proof materials related to manufacturing-related technical data, price information, business transaction line information, etc. are installed and stored in a server with no access to the Internet, and the damaged party's business secrets are classified according to the importance of the business secrets under the internal security regulations and the defense industry law, and the right to authorize each business secrets to be treated differently.