logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 대구지방법원 2018.04.04 2017고단6101
정보통신망이용촉진및정보보호등에관한법률위반등
Text

Defendant

A Imprisonment with prison labor of one year and four months, and Defendant B shall be punished by imprisonment with prison labor of six months.

However, for two years from the date this judgment becomes final and conclusive.

Reasons

Punishment of the crime

On August 24, 2016, Defendant A was sentenced to imprisonment with prison labor for a violation of the Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc. (Violation of Information and Communications Network Utilization Act, etc.) at the Seoul Central District Court on August 24, 2016, and the execution of the sentence was terminated at the Ansan Prison on June 8, 2017.

In 2014, the Defendant, along with G and G’s female-friendly job offer B known at the Gu and Sinsi in 2014, visited the Noh PC computer managed by the Defendant’s Had Had PC program to a manager-based game, such as Mad, Baduk, etc., and distributed the music program, xreg. Doll, Pcsvsdd. D.D., Singul (hereinafter “instant music program”) to enable the Defendant to view the other party’s plaque by obstructing the technological operation measures set to prevent the other party’s plaque from being observed, and then, G and B visited the PC room using the Defendant’s remote connection program at the place where the Defendant was identified in advance, and then visited the Defendant to keep the remote connection number and password by obtaining the Defendant’s remote connection program from the Defendant’s computer in his place of residence.

1. No person who violates the Act on Promotion of Utilization of Information and Communications Network and Information Protection, etc. and any person who violates the Act on Promotion of Utilization of Information and Communications Network and Information Protection, etc. and Promotion of Utilization of Information and Communications Network and Information Protection, etc. shall intrude into an information and communications network without legitimate access or beyond the authorized access authority, and shall not transmit or spread a program that is likely to damage, destroy, alter, or forge an information and communications system, data, program, etc. or hinder operation thereof without justifiable grounds

arrow