logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 서울중앙지방법원 2014.11.19 2014고단3164
정보통신망이용촉진및정보보호등에관한법률위반(정보통신망침해등)등
Text

Defendant

A Imprisonment with prison labor for three years and for six months, respectively.

However, this judgment is delivered against Defendant B.

Reasons

Punishment of the crime

Defendant

On October 27, 2011, A sentenced the Seoul Northern District Court to two years of imprisonment with prison labor for fraud by using computers, etc. and one month of imprisonment with prison labor for the same crime in the same court on January 27, 2012, respectively, and completed the execution of the sentence on May 26, 2013.

"2014 Highest 3164"

1. Defendant A

(a) No person who violates the Act on Promotion, etc. of Information and Communications Network Utilization and Information Protection (Violation of Information and Communications Network, etc.) shall intrude on any information and communications network

Nevertheless, in the course of lending a car to the victim E on December 2013, the Defendant came to know of the “F” and the date of birth of the driver’s license of a motor vehicle (G). On January 12, 2014, at the “IPC bank” located in Gyeonggi-si H, Gyeonggi-do, the Defendant combined the above NAV ID and the date of birth with the information on the said NAV ID and the date of birth, etc., conducted a combination of information on the NAV ID and the date of birth on the said NAV’s account, and invaded the information and communication network by arbitrarily inputting the NAV website’s ID and the NAV network without legitimate authority.

(b) No person who violates the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc. shall damage another person's information processed, stored, or transmitted through an information and communications network, or infringe or divulge

Nevertheless, on January 29, 2014, from around February 1, 2014 to around February 1, 2014, the Defendant obtained the card number (K), effective period, CVC number, and secret number issued to J, which had been kept in the “written payment” after accessing the victim’s four e-mail account by the said method, and obtained the following 1-C.

As described in paragraph (1), another person's information stored through an information and communications network was stolen by entering the settlement room of the Internet shopping mall site more than 125 times.

(c).

arrow