logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 서울중앙지방법원 2016.08.24 2016고단4217
정보통신망이용촉진및정보보호등에관한법률위반(정보통신망침해등)등
Text

1. Defendant A shall be punished by imprisonment for eight months.

However, the above sentence shall be executed for a period of two years from the date this judgment becomes final and conclusive.

Reasons

Punishment of the crime

"2016 Highest 4217"

1. Defendant B

(a) No person who violates the Act on Promotion of Utilization of Information and Communications Network and Information Protection, etc. (violation, etc. of Information and Communications Network) shall destroy or alter an information and communications system, data, program, etc., or convey or distribute a program that is likely to interfere with operation thereof, without

On May 2015, the Defendant is entitled to pay money with an interview program from around C.

D. A proposal was received to the effect that N. N. D. will support living expenses and the father’s subsidy hospital’s non-support.

After accepting the above proposal, the Defendant discovered the “pfgrad.ex” file that is newly installed in a malicious program (hereinafter “ beauty program”) to prevent the other party from seeing the other party’s plaque in the event of a game, such as one kind of online game site, Baduk, etc., at the set-up set-up by the system business managed by the victim company.

The defendant knew that the aforementioned “pfgth rate.” file was carried out at the same time, and the malicious program was installed in the package server of the pfgm computer, and that the defendant was designed to be installed in a normal “pfgm.ex” file, and he had the mind to spread the “pfgth rate.” file to the head of the nation’s skin where the injured party manages.

On September 2015, the Defendant searched the information from the Defendant’s house, G 505, the Defendant: (a) saved the information from the Defendant’s house, which was operated and managed by the victim, using the program of “H”; (b) entered the skin of the skin into a computer located in the 450 scambling region in attached Form 1, such as the “J” located in the 450 scambling region, in which the victimized person manages by using the program of “H”; and (c) transmitted the file via the 690s cambling server, which was opened by the victimized person, to the cambling server of the said cambling computer.

Accordingly, the defendant conspireds with C.

arrow