logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 서울서부지방법원 2014.05.28 2014고단694
정보통신망이용촉진및정보보호등에관한법률위반(정보통신망침해등)등
Text

A defendant shall be punished by imprisonment for one year.

However, the execution of the above punishment shall be suspended for two years from the date this judgment becomes final and conclusive.

Reasons

Punishment of the crime

From March 2, 2013 to December 23, 2013, the Defendant was a person who attended C University Law School from March 2, 2013 to December 23, 2013, and was killed in the professor and research room of the subject the Defendant attended at the said law school, and received in advance examination questions stored on the computer and received them to prepare for the examination.

1. On March 13, 2013, around 08:25, the Defendant, a building at C University University Law School, located in Seodaemun-gu Seoul, Seoul, went into the victim F’s laboratory, where the Defendant was a professor in charge of “E” under the Contracts Act, to verify in advance whether a password is set on the victim’s computer, the Defendant, prior to the victim’s attendance, went into the victim’s room by opening the door of the said laboratory and cleaning the inside, and going into the victim’s room through the entrance, which would be pretended to be the victim’s lighting.

In addition, from around that time to December 10, 2013, the Defendant intruded into the room of the victims, who are professors in charge of the subjects the Defendant attended 16 times in the same manner as the attached list of crimes (1).

2. No person who violates the Act on Promotion, etc. of Information and Communications Network Utilization and Information Protection (Violation of Information and Communications Network, etc.) shall damage another person's information processed, stored, or transmitted through an information and communications network,

Nevertheless, around September 23, 2013, the Defendant intruded the victim G’s laboratory located in Seodaemun-gu, Seoul University Law School Building 208, with the foregoing paragraph 1, and installed at will a system monitoring program, which functions as a system monitoring program with key input monitoring, Internet mail monitoring, monitoring results, etc. on the victim’s computer, and then arbitrarily installed a system monitoring program, which is a system monitoring program with e-mail. The victim stored and printed on the computer.

arrow