logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 의정부지방법원 고양지원 2015.02.27 2015고단2
컴퓨터등사용사기등
Text

Defendants shall be punished by imprisonment for ten months.

Reasons

Punishment of the crime

At the end of November 2014, the Defendants: (a) received a proposal from a person who was unable to receive the amount of damage, (b) in China, and (c) received the payment from the victims, and (d) received the payment from the victims, and (e) subsequently conspired to participate in the said crime by having been aware of the fact that the Defendants were committing a crime under the tentatively named “Sing” method; (b) thereby, by taking part in the said crime, the Defendants conspired to take part in the said crime by taking part in the act, such as preparing an account for receiving the amount of damage and withdrawing the amount of damage.

1. No person who violates the Electronic Financial Transactions Act shall take over the means of access used in electronic financial transactions;

Nevertheless, around December 12, 2014, the Defendants, in collusion with the above-mentioned person, acquired one physical card from the bank in the name of G, which was delivered with the F4th floor in the Dong-gu, Gyeonggi-si, Gyeonggi-si, and then acquired 11 physical card through nine times in total from around that time to December 20, 2014, as shown in the attached list 1.

2. Around December 18, 2014, the Defendants in collusion with the aforementioned person’s name in order to enter the information pertaining to financial transactions, such as personal information and password of the new bank’s Internet banking system, and immediately transfer 880,000 won from the account of the victim H to the I’s account in attached Table 1 5 attached hereto, the Defendants in collusion with the victim in the name of the victim, installed the malicious code capable of deducting the information pertaining to electronic financial transactions stored in the computer in the victim H’s computer, and put the victim H’s h’s computer into a pop-up shop. The Defendants illegally acquired the information pertaining to financial transactions of the victim H by allowing the victim H to enter personal information and the information pertaining to financial transactions.

In this respect.

arrow