logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 대법원 2018.06.28 2014다20905
위자료
Text

The judgment below

The part against the defendant is reversed, and that part of the case is remanded to the Daegu District Court Panel Division.

Reasons

The grounds of appeal are examined.

1. In the absence of the Supreme Court precedents on the interpretation of the statute applicable to a specific case in a small-sum case, where a number of small-sum case at issue of the interpretation of the same statute is pending in the lower court, and there are cases where the Supreme Court has made a decision on what kind of case according to the full bench, on the ground that the small-sum case is a small-sum case, it would be likely to undermine the legal safety of people's lives if the Supreme Court

Therefore, even if a small-sum case does not meet the requirement of “when a decision contrary to the precedents of the Supreme Court is made,” which can be considered as the grounds of appeal, in the absence of such special circumstances, determination of errors in interpreting and applying the substantive law ex officio at the level of performing the intrinsic function of the Supreme Court, which is unification

(See Supreme Court Decision 2003Da1878 Decided August 20, 2004; Supreme Court Decision 2006Da50420 Decided December 11, 2008, etc.). 2. A.

Article 28(1) of the former Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc. (amended by Act No. 11322, Feb. 17, 2012; hereinafter “former Information and Communications Network Act”) provides that a provider of information and communications services shall take technical and administrative protective measures to prevent the loss, theft, leakage, alteration or damage of personal information in accordance with the standards prescribed by Presidential Decree.

In addition, the above provision provides that "1. Establishment and implementation of internal management plans to handle personal information safely."

2. Installation and operation of an access control device, such as a system for blocking intrusion to block illegal access to personal information;

3. Measures for preventing fabrication and alteration of access records;

4. Measures for security by using encryption technology and other methods for safe storage and transmission of personal information;

5. White.

arrow