Text
A defendant shall be punished by imprisonment for two years.
However, the execution of the above punishment shall be suspended for three years from the date this judgment becomes final and conclusive.
Reasons
Punishment of the crime
On July 2003, the Defendant entered and worked as a full-time director in charge of the technology development of the victims' Internet telephone exchange (name D) of the victimized company (name D) with the existing telephone line connected to the existing telephone line of the victimized company, and is a product of "IP-PBX" replacing the existing "PSN-PBX" method, which is a device to connect the victim company to make telephone possible by using the Internet.
In addition, the “E” company, a computer program related thereto, included the development cost of several billion won each year from 2004 to November 2005, and developed “E”, which is a computer program related to “D”, and registered with the Program Deliberation and Regulatory Committee on July 7, 2006.
(Registration Number J. (hereinafter referred to as "D") (hereinafter referred to as "E" and "E") were comprehensively in charge of the development and management of the program of the victim company "", and was established and operated on June 30, 2006 by the Co., Ltd. and on October 17, 2006, the defendant company of the same kind of company "the defendant company" (hereinafter referred to as "the defendant company") was in office as a director.
At around 2010, the defendant changed the name of the company to K, and the head of the technical business team and the director were assigned to the office of representative director.
The defendant should not arbitrarily leak the technical essential assets of the victimized company as its employees, and even if they are kept in custody, the defendant company's Internet telephone exchange product name which is similar to the Internet telephone exchange machine of the victimized company by appropriating the source code of the victimized company's program in violation of his/her duties and inserting a similar Internet telephone exchange program by taking advantage of the source code of the damaged company's program in the event of retirement.