(d) Distribution of Computer Viruses
Besides the “Use of Electromagnetic Recordsto Give Unauthorized Commands” (Article 168-2 (2)) mentioned above in (a), “Creation and Offer of Electromagnetic RecordstoGive Unauthorized Commands” (Article 168-2 (1)) are also punishable according to the same Article.