logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 광주지방법원 순천지원 2017.02.16 2016고단1844
사기등
Text

Defendants shall be punished by imprisonment for not less than five months.

However, from the date of the conclusion of the judgment, each of the defendants is against the defendants for one year from the date of the judgment.

Reasons

Punishment of the crime

The Defendants, who are one’s own, conspired to open the cell phone by stealing the names of male-friendly job offers C, and to receive and sell the cell phone after receiving the terminal machine.

1. Compilation, such as electronic records;

A. Defendant A wanting to open a mobile phone in the name of Defendant B’s male-friendly job offering C, who is a female student, from F, which is located in B, the work of Defendant A, a branch of around July 16, 2015, to the above D, in the name of Defendant B, a female-friendly job offer.

The term "" refers to the following.

Then, Defendant A connected to the SK Telecom Computer Network by using the tables PC installed at the same day, entered C’s name, resident registration number, etc. in the mobile phone service new contract habitats, and opened one cellphone (Carrying No. H) with the signature of “G” on the name side of the gallon ju.

And the Defendants above

7. Since around 16.1, Defendant B visited the above agency again and submitted to the above D his resident registration certificate that he received from Defendant B who was in military service at the time of military service to a door-to-door delivery.

As a result, the Defendants conspired to make a new contract file of the mobile phone service in the name of C, which is an electronic record of another person's rights and duties for the purpose of making business process smooth.

B. The defendant A

7. On June 16, 199, from the above F working by D, a man-child, who wants to open a mobile phone in the name of the defendant B, who is a male-child, to the above D, but later, he will present C's identification card.

The term "" refers to the following.

Then, Defendant A had access to the SK Telecom computer network installed at that place, had entered C’s name, resident registration number, etc. in the habitats of a mobile phone service, and had a signature of “G” in his name and opened the phone 6 mobilephones (I).

And the Defendants above

7. He visited the above agency from around 16.1 to visit the agency again and received the delivery from the Defendant B to the door-to-door service at the time of military service.

arrow