beta
(영문) 부산지방법원 2016.06.29 2016고단2441

컴퓨터등사용사기등

Text

A defendant shall be punished by imprisonment for one year.

Reasons

Punishment of the crime

On December 2015, the Defendant, by accessing C, D, E, and each other’s online online game sites, accessed the game users as pro-friendly offers, identified the information (name, date of birth, cell phone number, and radio operator) of the victim or his family members, and received a certification number and concluded a settlement by purchasing gift certificates on the game site, and conspired to divide the money acquired through the Defendant’s account by cashing the said gift certificates into money.

1. On December 30, 2015, at the GPc room located in Daegu-gu, Daegu-gu, 22:30 on December 30, 2015, the Defendant, such as a computer, was committing a game by holding an online game of the Internet, for the children of the victim H, who had been playing a game by holding an online game.

"A mobile phone number subscribed to the victim's name from the victim's children, (SKT), the name and date of birth of the victim, and the cancellation of small-sum settlement blocking by unauthorized intrusion into the account of the member communications agency, and the increase in the amount of settlement by 500,000 won at the same time. A item transaction site, without authority, entered the victim's information in the Arabic, and settled a small amount of 300,000 won,00 won, and purchased an item in total of 50,000 won by entering the victim's information without authority from the item, and settling the victim's information in total of 200,000 won from December 18, 2015 to February 12, 2016, as shown in the list of crimes in the attached list of crimes.

Accordingly, the Defendant acquired financial benefits equivalent to KRW 30,150,90 in total by inserting information from the victim without authority, in collusion with C, D, and E, and by making the victim process information without authority.

2. No person who violates the Act on Promotion of Utilization of Information and Communications Network and Protection, etc. of Information and Communications Network (infringement, etc. of information and communications network) shall intrude into an information and communications network without legitimate authority