Text
Defendant
A Imprisonment with prison labor of one year and six months, Defendant B and C shall be punished by imprisonment with prison labor of six months, and Defendant D shall be punished by imprisonment with prison labor of eight months.
Reasons
Punishment of the crime
No one shall deliver or spread any program (hereinafter referred to as "malicious program") that is likely to damage, destroy, alter, or forge an information and communications system, data, program, etc. or hinder the operation thereof without justifiable grounds, and shall not intrude into an information and communications network without legitimate access authority or beyond permitted access authority.
G receives from H a program “Stour” (hereinafter “stove program”) from H to provide it to Defendant A and I; I, with the help of J, took advantage of LN PC’s total nationwide marketing with LN PC (a company with approximately 10 to 20% share of n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to n to the maintenance and management program of LN PC; and the role of managing the interview program to be installed in the nationwide PC; Defendant D, Defendant B, and L to n to n to n to n to n to see the role of an unspecified and multiple users to exchange the program with other digital games; Defendant D and Q to n to n to n to see the following instructions to use the program.