절도등
A defendant shall be punished by imprisonment for one year.
Punishment of the crime
[Criminal Power] On April 23, 2015, the Defendant was sentenced by the Seoul High Court to three years and six months of imprisonment for robbery, injury, etc., and on December 10, 2017, the Defendant completed the execution of the sentence in the Ansan Prison.
【Criminal Facts】
2018 Highest 7638
1. On September 19, 2018, the Defendant stolen money and valuables amounting to KRW 6050,000,000 in total by taking off one cM verification paper and one thalthular phone number from around 00:25 to 00:32, Sept. 19, 2018, in the Bupyeong-gu Budio-gu Incheon, where the victim D is in a bath room, and by taking out one cM verification paper with a total of KRW 5,450,00,000, identification card, qualification certificate, etc. within the bank of another victim.
2. On October 14, 2018, the Defendant: (a) committed theft using the gap in which the victim G was working in Seo-gu Etel F, Chungcheongnam-gu, Chungcheongnam-gu, Chungcheongnam-gu; (b) around 22:00 on October 14, 2018; and (c) with cash 250,000 won in cremation; and (d) by means of theft.
2019 Highest 45
1. On October 7, 2018, at around 03:30, the Defendant discovered that I was drunkly used by the victim I on the H-road in Mapo-gu Seoul, Mapo-gu, Seoul, and that he was salloned with nine mobile phones equivalent to 800,000 won at the market price of the victim’s grandchildren.
2. The Defendant was using computers, etc. at the above time and at the above place, using computers, etc.: (a) divers of the victim’s fingerprinting device; (b) divers from the victim’s fingerprinting device; (c) divers of the victim’s fingerprinting device; and (d) divers
The defendant continued to re-establish the J identification number using the victim's resident registration certificate in the victim's mobile phone case, and transferred 2 million won from the K Bank account in the victim's name to the L Bank account in the victim's name without authority.
Accordingly, the defendant, by inputting information without authority into a computer or any other information processing device, makes the data processed and thereby making the data processed.