beta
(영문) 인천지방법원 2016.07.14 2016고단2348

사기방조등

Text

A defendant shall be punished by imprisonment for not less than eight months.

However, the execution of the above punishment shall be suspended for a period of two years from the date this judgment becomes final and conclusive.

Reasons

Punishment of the crime

On April 27, 2015, the Defendant sent 4 million won per head of a Tong, clock card and password from a person in secret name, at around 10:00 on April 27, 2015.

different types.

“On the phone, the above-mentioned person was suspected of having been engaged in the phishing fraud, but was willing to transfer the physical card and password connected to the passbook under the Defendant’s name to receive money.

1. No person who violates the Electronic Financial Transactions Act shall transfer or acquire any access medium in using or managing any medium access to electronic financial transactions, except as otherwise provided for in any other Act;

At around 12:00 on April 27, 2015, the Defendant received 4,000,000 won per head of Tong from the company bank account (E) and the new bank account (F) in front of the D Hospital ruling located in Seo-gu Incheon, Seo-gu Incheon, and received 2,00,000 won per head of Tong and 4,00,000 won, respectively.

2. On April 27, 2015, at the hearing of the Plaintiff’s name or incompeting staff in aiding and abetting fraud, the Defendant assumes the lender by telephone to the victim G and, if necessary, that fact is only the case of Bosing, and does not have the intent or ability to grant the loan. In short, the Defendant assumes the lender by misrepresenting the loan company and transfers the funds necessary for the loan to the lender.

“Falsely speaking,” the Defendant was transferred from the victim amounting to KRW 3,50,00 in total on four occasions, including KRW 980,00, KRW 830,000, KRW 790,000, KRW 950,000, and KRW 950,000.

The defendant is aware that he was to be used in Washington as described in the above paragraph 1, and thus, he would facilitate the defendant's use of physical cards, passwords, etc. connected to the account under the name of the defendant by using the above person under the name of the defendant in a manner that makes it easier for the above person under the name of the defendant to receive the money from the above damage from the above person under the account under the name of the defendant.