logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 서울중앙지방법원 2013.06.28 2013노1014
업무방해등
Text

The judgment of the court below is reversed.

Defendant

A, in eight months of imprisonment, Defendant B shall be punished by a fine of 5,000,000 won.

Reasons

1. Summary of grounds for appeal;

A. The copyright holder of K Program is a corporation S (hereinafter “S”) and there is no obligation that the copyright holder shall inform the other person of the password, the only means for the protection of the copyrighted work.

K program is not an implementation program, and it is possible to use a password by inheritance even after the password, so it is not possible to use the G program, so it does not affect the Gu operation of the G program.

B. The sentence of unfair sentencing (one year of suspended sentence in six months of imprisonment) of the lower court is too unreasonable.

B. The Z system program produced by Defendant A (as to the violation of the Computer Program Protection Act against the Defendant) was produced using AA, K, and AB program, which is a subordinate program of the AE system program registered by the victim E, a request for issuance of deposit management tax invoices, a request for issuance of deposit management tax invoices, a issuance of deposit management tax invoices, a production management information, and a deposit management payment receipt program.

K and AB programs are independently protected by the Computer Program Protection Act, which is a small program of T and AC among S's Q programs.

Therefore, using AA program, which is a work separate from K and AB program, is a copyright infringement act.

【Unjustifiable sentencing (Defendant A)’s sentence against Defendant A is too unhued and unfair.

2. Determination

A. In the first place of the facts charged in violation of the Computer Programs Protection Act against Defendant A at the trial, the ex officio determination prosecutor added “no person shall infringe another person’s program copyright without a legitimate title by means of reproduction, adaptation, translation, distribution, publication, and transmission.” The “Z system,” which is a G system, is produced and sold, and then the victim’s program is operated.

arrow