Text
Defendants shall be punished by a fine of KRW 3,000,000.
Defendant
If A does not pay the above fine, it shall be 100.
Reasons
Punishment of the crime
Defendant
B Co., Ltd. is a corporation that operates the Internet service business, etc. that manages the website of D, Seo-gu, Daejeon, Seo-dong, 710, and Defendant A is a company director of the foregoing corporation on November 12, 2015 and is in charge of the entire business of the said corporation.
Defendant
B made profits by allowing unspecified persons to settle points available on the pertinent website when making a business route or downloading of data between members via the above web hick site. At the above site, the company opened a MPO 20's 'D 20' and posted the data linked to the upper order in order of the download net and separate points among the data set up on the above web hick site, and made it easy for unspecified members to download specific data.
1. Defendant A
A. At around November 28, 2016, the Defendant provided, at the above corporate office, a web hick space to enable unspecified users who have access to the above web hick site to receive the above videos, even though the Defendant posted D PO20’s “E” as the title “E” and used the video files, which practically sexually sexually sexually sexually sexually sexually sexually sexually sexually sexually sexually sexually sexually sexually.
Accordingly, the Defendant made it easy for the Defendant to distribute 20 obscene materials, such as the list in the attached crime list, by facilitating the distribution of obscene videos through the information and communications network as above, and aiding and abetting the distribution of obscene videos.
B. On December 21, 2016, the Defendant, at the foregoing corporate office, up to December 21, 2016, extracted from the string file the photo of six presses selected voluntarily from the original image, as the original copy, a member in the name in the name of a member of the said corporate office, referred to as “F” as the “F” title on the said “D’s website, and extracted from the string file.