Text
A defendant shall be punished by imprisonment for not less than one year and six months.
Reasons
Punishment of the crime
On August 25, 2011, the Defendant was sentenced to three years and six months for robbery in the Seosan Branch of the Daejeon District Court, and was released on July 4, 2014 during the execution of the sentence in the Daejeon Prison on July 23, 201, and the parole period expired on November 23, 2014.
The Defendant is an E agency employee operated by “D” in Jin-si, who is in charge of opening and opening of mobile phones at the said store and manages personal information processing affairs which are input of personal information from customers on the E computer network.
1. The Defendant used a computer or any other means of deception in mind to open and use the core chips under his/her name, which he/she had nominal owner of the opening of the mobile phone. On September 2016, the Defendant deleted the information on the core chips registered on the cell phone that connects the computer inside the said store with the user F to open and open the new mobile phone after obtaining a request from the victim F to open the mobile phone from the said E agency, and then entered the information on the new core chips stored in the said store in the said program, thereby changing the information on the opening of the mobile phone. As a result, if the Defendant makes a small payment with the new core chips issued under his/her name, the relevant settlement amount is imposed on the victim as the person who has opened the mobile phone opening the mobile phone.
In addition, the Defendant was keeping a new core chips issued in the name of the victim from around that time to November of the same year.
After being installed in the mobile phone in the G name, a small amount of money was paid from the old writing display, or acquired property benefits of KRW 2,009,478, such as the purchase of merchandise coupons and game items, etc. from July 2016 to November 26 of the same year, a total of 26 times as shown in the annexed crime sight table (1) by allowing the data processing to be processed by inputting and changing the information without authority into the data processing device, such as computer and other information processing device, such as the previous crime list (1).
2. Fraud;
(a) Sale of mobile phones;