야간건조물침입절도등
A defendant shall be punished by imprisonment for six months.
Punishment of the crime
[2015 Highest 987]
1. On December 9, 2014, the Defendant: (a) around 23:08 on December 9, 2014, the Defendant: (b) opened and opened a window on the part of the victim C, which was not corrected, in the “D cafeteria”; and (c) deducted KRW 13,000 in cash owned by the victim in the carcter, in which the Defendant was an employee.
In addition, the general telephone (E) installed in the "D cafeteria", input information without authority as if it was a legitimate user of the general telephone, and make a filling of mileage amounting to KRW 100,000 and make a settlement by means of the general telephone, thereby acquiring property benefits equivalent to the same amount.
2. On December 11, 2014, the Defendant entered “D cafeteria” in the same manner as “D cafeteria,” and entered information without authority by means of a general telephone, and acquired pecuniary benefits equivalent to the same amount by charging mileages equivalent to 5,000 won and making payment by means of a general telephone.
[2015 Highest 1109] On November 30, 2014, the Defendant: (a) entered the “H” restaurant operated by the victim G located in Y in Yansan-gu, Seoul Special Metropolitan City, with no authority; (b) entered the computer network to acquire unlawful acquisition by means of inputting the information; (c) connected the Internet site of “I items” by using a computer installed therein; and (d) connected to the web page, processed the information by inputting the resident number of the damaged person and the certification number transmitted to the victim’s general telephone (I) with no authority; and (d) entered the “I items mileage” in the amount of KRW 100,000,000, from around December 3, 2014 to around December 3, 2014; and (e) entered the information into the computer or any other information processing device without authority to manage the information, as recorded in the attached Table on the computer network; and (e) entered the information in the computer or any other information processing device over two occasions.