정보통신망이용촉진및정보보호등에관한법률위반
Defendant
A Imprisonment of one year and three months, and Defendant B shall be punished by imprisonment of one year and one year.
, however, for two years from the date this judgment becomes final and conclusive.
Punishment of the crime
Defendant
A is the actual owner of H and (State) I, and Defendant B is the actual owner of the LAB and the KAB, and the Defendants were engaged in the overall management of each of the above companies, such as the progress of the business related to the KAB and the general affairs, accounting, and fund management.
1. No person entrusted with the management of personal information of Defendant A shall use personal information or provide it to a third party in excess of the scope entrusted by a personal information manager;
Nevertheless, the Defendant was aware of the fact that, at the office of the second floor, the Defendant was 675,927 personal information from the “M company,” despite being aware of the fact that “M company” did not obtain the Defendant’s consent to the provision of personal information to its members to the Defendant’s company, for the purpose of selling the personal information obtained through a fashion call business between a large number of members and an insurance company at KRW 2,50 per insurance company.
The Defendant continued to store and keep personal information provided by the “M company”, a media company, for the propagation call service with an insurance company even after the completion of the pertinent duties, and used it for the distribution call service with other media companies by comparing the personal information DB, stored, and stored by the DB, with the personal information DB and the personal information DB stored, kept by the Defendant company, in December 2013. The Defendant used it for the distribution call service with other media companies, such as restricting the scope of the target of personal information possession, the insurance maturity, and the duplicate subscription of the other insurance company, by comparing the personal information stored, stored, and stored by the DB, with the personal information DB.
In addition, the defendant is also the defendant.