Text
1. The defendant shall be punished by imprisonment with prison labor for six months;
2.Provided, That the above sentence shall be executed for a period of one year from the date this judgment becomes final and conclusive.
Reasons
Punishment of the crime
Since around 2005, the Defendant came to know that he had access to the internal computer network used by the Nonghyup, and entered the name and date of birth in the Agricultural Cooperative’s internal computer network used by the Agricultural Cooperative. From around 2010, the Defendant had been aware of the fact that he could have known the phone number through customer information inquiry. From around 2010, the Defendant had been able to contact with personal information, such as using obscene phone numbers for the confirmed phone number.
1. No person who manages personal information in violation of the Act on the Protection of Personal Information, Promotion of the Utilization of Information and Communications Network and Protection of Information, etc. shall use personal information beyond the scope of the purpose of collection, and no one shall intrude into an information and communications network without legitimate access authority
Nevertheless, at around 11:11 on March 31, 2010, the Defendant confirmed the victim's telephone number by accessing the internal computer network to communicate for personal purposes at the NAF Office, inputting the ID and password, inputting the name and date of birth of the victim F, and making customer information inquiries by entering the name and date of birth of the victim F. On February 15, 2012.
From that time to July 14, 2012, the Defendant: (a) as indicated in each of the separate records Nos. 241 through 775 in attached Table 1 of the List of Offenses Nos. 241 to 775 in order to use a telephone for personal purposes, including obscene telephones; and (b) as the facts charged that the prosecutor changed 472 times verbally overlaps with part of the facts charged that the prosecutor changed 595 times; and (c) thus, the Defendant excluded the overlapping parts reported as clerical errors from the duplicate.
The personal information was intruded into the internal computer network beyond the authorized access, and the personal information was used in excess of the scope of the purpose of collection by phone call to the victims as shown in the 1st list of crimes in the attached Form.
2...