logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 부산지방법원 2018.10.12 2018고합195
특정범죄가중처벌등에관한법률위반(보복협박등)등
Text

A defendant shall be punished by imprisonment for three years.

Of the facts charged in the instant case, B accounts are relevant.

Reasons

Punishment of the crime

[criminal records] On December 15, 2016, the Defendant was sentenced to a suspended sentence of ten months of imprisonment with prison labor for special intimidation, etc. at the Busan District Court, and on December 23, 2016, the Defendant is still under the grace period, which became final and conclusive on December 23, 2016.

[2] On September 1, 2017, the Defendant, while living together with the Defendant’s house located in the Defendant’s house located in the building D in the Busan City City, Busan City, was taking a hedging with the Defendant on January 1, 2018.

1. Crimes committed on January 1, 2018 (injury and damage to property);

A. On January 1, 2018, the Defendant: (a) around January 1, 2018, around D Buildings E; and (b) the victim would have hedging.

For the reason that the victim's clothes were put in the face of the victim, covered the victim's body with tear, and then put the victim's body with drinking and shot, so that the number of days of treatment can not be known to the victim.

B. The Defendant, at the same time, at the same time as paragraph 1(a), and at the same place as that of paragraph 1(a), satisfy with the victim, and satisfyed with the victim by cutting the opon smartphones from the floor, and damaged the smartphones worth KRW 1 million at the market price.

2. Around January 14, 2018 (Violation of the Act on Promotion of the Use of Information and Communications Network and Protection, etc. of Information and Communications Network (Violation of Information and Communications Network, etc.)) committed the Defendant around January 14, 2018: (a) around January 14, 2018, the Defendant reported the assault under paragraph (1) to the police; and (b) had access to the Internet F Account used by the victim; (c) arbitrarily changed the password; (d) had access to the authenticated e-mail address of the said account; (e) had access to the I Account used by the Defendant; and (e) arbitrarily changed the password; and (e) had access to the I Account used by the victim; and (e) had the authenticated e-mail address changed to the said F e-mail address used by the Defendant.

Accordingly, the defendant processes, stores or keeps them through information and communications networks.

arrow