beta
(영문) 서울중앙지방법원 2016.01.07 2015고정577

정보통신망이용촉진및정보보호등에관한법률위반(정보통신망침해등)

Text

Defendant shall be punished by a fine of five million won.

If the defendant does not pay the above fine, KRW 100,000.

Reasons

Punishment of the crime

Defendant

A from March 2012 to March 2014

2. Until the end, it is the representative director who has been operating the corporation E in Busan, Daegu, Busan, Da 1316, 1317.

1. On February 1, 2013, around 15:47, the Defendant, at the office of Suwon-gu, Busan, Inc., Ltd., Ltd., the Defendant: (a) entered “LG” Web (www.co., Ltd.) and its passwords from “LG” Web (www.co., Ltd.) without permission; and (b) invaded another person’s information and communications network without due authority over access over 129 occasions, as shown in the attached Table of Crimes, at the office of Busan, Busan, Daegu, a Maritime Transportation Daegu, Do 1316, 1317, and E, around November 6, 2013.

2. On February 1, 2013, around 15:47, the Defendant: (a) entered, at the same place, the ID and password of the Mick Account for which the Victim F was granted the right to use; and (b) connected the file of “the progress of construction (2013) H.xlsx” in a computer located in the said place; (c) received the file of “the progress of construction (2013)” from a third party’s secret stored in the information and communications network; and (d) infringed another person’s secret kept in the said web site by November 6, 2013, as shown in the attached list of crimes.

Summary of Evidence

1. Partial statement of the defendant;

1. Each legal statement of a witness I, J and K;

1. Statement made by the police with respect to L;

1. Submission of a written petition and reference materials to the petitioner;

1. Report on internal investigation (the result of a request for the analysis of digital evidence by Seoul office, an investigation of visitors using the same IP connected by the person suspected of being suspected, a request for digital analysis, and the comparison of seized data with the victim's web data);

1. Application of Acts and subordinate statutes to each list and protocol of seizure;

1. Relevant Article of the Act and each information and communications network concerning criminal facts;