logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 광주지방법원 순천지원 2019.08.23 2019고단1125
정보통신망이용촉진및정보보호등에관한법률위반등
Text

A defendant shall be punished by imprisonment for four months.

However, the execution of the above punishment shall be suspended for two years from the date this judgment becomes final and conclusive.

Reasons

Punishment of the crime

No one shall intrude into an information and communications network without access authority and shall infringe, use or divulge another person's secrets processed, stored or transmitted through the information and communications network.

Nevertheless, the defendant had access to another person's IP camera, which has a function to send real-time images through the Internet network, without permission, to peep the privacy such as another person's body.

At around 20:35:20 on May 30, 2018, the Defendant used the Nowon-gu building B, which is the Defendant’s residence, through the “E,” etc., and accessed the part of the victim F’s residence, which was discovered through the use of the Nowon-gu building B, which is the Defendant’s residence, via the “E,” etc., the IPM hacking hacking program, and accessed the part of the victim F, by entering the “H” and the “H” located at the early stage in the Roster and the initial password, and viewed the victim’s image by transmitting the victim’s image, as shown in the list of crimes in the attached Form, from May 17, 2017 to August 30, 2018, the Defendant unauthorized access to the other person’s IPM over a total of 41 times.

Accordingly, the Defendant infringed on the information and communications network without access authority and infringed on the secrets of others that are processed, stored or transmitted through the information and communications network.

Summary of Evidence

1. Defendant's legal statement;

1. A copy of each police statement made to F and I, a copy of e-mail protocol, and a police protocol made to J;

1. A report on the analysis of digital evidence;

1. K e-mail and the details of outflow A, each illegal connection details, suspect cellular phone devices, and screen pictures to capture on the street;

1. Application of Acts and subordinate statutes on seizure records and list of seizure;

1. Article 71 (1) 9, Article 48 (1) of the Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc., Article 71 (1) 11, and Article 49 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc., Articles 71 (1) 11 and 49 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc., and the choice of imprisonment for each crime;

arrow