logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 창원지방법원 2012.02.17 2012고단138
정보통신망이용촉진및정보보호등에관한법률위반등
Text

Defendant

A Imprisonment with prison labor of one year and six months, and each of the defendants B and C shall be punished by imprisonment with prison labor of ten months.

However, Defendant B and C.

Reasons

Punishment of the crime

The Defendants purchased malicious programs in G and China and disseminated in Korea, and acquired game money so that they can see the plaques of game participants visiting Korea-based games using the said programs, and sought money by cashing it.

Accordingly, G plays a role in purchasing and distributing the above program; the Defendants connected the Korea Game Magazine using the above malicious program, and will take the role of commercializing it after obtaining the game money; and the Defendants paid 400,000 won per day (hereinafter “day”) to G in cash and conspired to divide the remaining profits into three equal parts.

1. No person who violates the Act on Promotion of Information and Communications Network Utilization and Protection, etc. shall destroy, destroy, alter, or forge an information and communications system, data, program, etc., or transmit or spread a program that is likely to interfere with the operation thereof (hereinafter referred to as "malicious program") without any justifiable ground;

A. From February 1, 201 to February 24, 2011, Defendant A, in collusion with G, placed Internet users on the Internet website, H and I, including the Internet website, with a view to having a ethyl or integrated program installed, and, if users receive an advertisement to download the installation program to install the said program, Defendant A, which is a malicious program, continuously connect the computers where the said program is installed and the malicious program storage server, which is a malicious program, continuously connects with the computers where the said program is installed to prevent the malicious program from being placed on the white program, and if users of the computers where the malicious program is installed access to J, which is an online game site provided at NHN, the malicious program, which is capable of controlling the user’s computer, shall be installed as automatic program.com with the program.

arrow