beta
(영문) 광주지방법원 목포지원 2016.07.15 2016고단458

정보통신망이용촉진및정보보호등에관한법률위반(정보통신망침해등)등

Text

Defendant

A Imprisonment with prison labor of one year and six months, Defendant B and C shall be punished by imprisonment with prison labor of six months, and Defendant D shall be punished by imprisonment with prison labor of eight months.

Reasons

Punishment of the crime

No one shall deliver or spread any program (hereinafter referred to as "malicious program") that is likely to damage, destroy, alter, or forge an information and communications system, data, program, etc. or hinder the operation thereof without justifiable grounds, and shall not intrude into an information and communications network without legitimate access authority or beyond permitted access authority.

G receives from H a program “Stour” (hereinafter “stove program”) from H to provide it to Defendant A and I; I, with the help of J, took advantage of LN PC’s total nationwide marketing with LN PC (a company with approximately 10 to 20% share of n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to the maintenance and management program of LN PC; and the role of managing the interview program to be installed in the nationwide PC; Defendant D, Defendant B, and L to n to n to n to n to n to see the role of an unspecified and multiple users to exchange the program with other digital games; Defendant D and Q to n to n to n to see the following instructions to use the program.