Text
Defendant
A Imprisonment with prison labor for one year, for one year of imprisonment for Defendant B, for Defendant C with prison labor for six months, and for Defendant D with prison labor for eight months.
Reasons
Punishment of the crime
[2014 Highest 1975] No person shall engage in a business of exchanging or arranging exchange or repurchase tangible and intangible results obtained through the use of game products.
Defendant
A and H, through the Internet, provided a list of PCs infected with a malicious program, which can be seen as using the counter’s card tag via the Internet, by being provided to the game using the above list through J, and operated the game money exchange business in cash. Defendant B, C, D, E, F, and G, under employment of Defendant A and H, operated the game money exchange business in cash, and operated the game money exchange business using the above list.
Defendant
A and E from October 6, 2013 to October 6, 2013, Defendant B: (a) from the police officer of the Republic of Korea on December 2013; (b) from the police officer of the Republic of Korea on December 2, 2013 to the police officer of the Republic of Korea; (c) from the police officer of the Republic of Korea on June 2, 2014 to the police officer of the Republic of Korea on June 2, 2014; and (d) from the police officer of the Republic of Korea on April 2, 2014 to the police officer of the Republic of Korea on April 2, 2014; and (d) from the police officer of the Republic of Korea on April 6, 2013 to the police officer of the Republic of Korea on March 10, 2013 to the police officer of the Republic of Korea; (d) from the police officer of the Republic of Korea on June 2, 2014 to the police officer of the Republic of Korea.
As a result, Defendants conspired to exchange tangible and intangible results obtained through the use of game products for business purposes.
[2014 Highest 2386] No person shall damage, destroy, alter, or forge an information and communications system, data, program, or similar without any justifiable ground, nor shall convey or spread any program that may interfere with its operation.
Nevertheless, M, N, the malicious program that is purchased from Defendant,O, and P from a person who has no name in China.