logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 청주지방법원 2016.03.17 2015고단2065
정보통신망이용촉진및정보보호등에관한법률위반(정보통신망침해등)등
Text

A defendant shall be punished by imprisonment for one year.

However, the execution of the above punishment shall be suspended for a period of two years from the date this judgment becomes final and conclusive.

Reasons

Punishment of the crime

The defendant secured a majority of other's e-mail address through Internet search at home, and found another's e-mail ID and password by finding out a website that can confirm ID and password only with the e-mail address. While living as a hobby to collect personal information by intrusion on the server in which another's personal information files are kept with the ID and password, he saw the defendant to have secured a secret image or photograph of a woman's e-mail, disregarding himself at high school.

1. No person who violates the Act on Promotion of Utilization of Information and Communications Network and Protection, etc. of Information and Communications Network (violation, etc. of Information and Communications Network) shall intrude into an information and communications network without legitimate authority

On May 11, 2014, the Defendant entered the e-mail address of the members known to the member’s e-mail address at the Defendant’s house located in Jincheon-gun, Jincheon-gun, by using the fact that (C) the Internet site (C) can find the member’s e-mail address if only the member’s e-mail address is known, and then collected the e-mail address of the members known to the above site through the search, such as comments on the above site’s comments and passwords, at the space of the new search site for the “Ai-fi-fi-fi-fi-fi-fi-fi-fi-fi-fi-fi-fi-fi-fi-fi-fi-fi-fi-fi-fi-fi-fi-fi-g-i-i-i-i-i-i-i-i-i-i-i-i-i-i-

In addition, the Defendant intruded on an information and communications network without legitimate access over a total of 31 occasions from January 22, 2013 to May 21, 2015, such as the content of the annexed crime list.

2. A computer is set at the home of a defendant around June 2014, in violation of the Act on Promotion of Utilization of Information and Communications Network and Information Protection, Etc.

arrow