logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 서울중앙지방법원 2013.04.25 2013고단1244
정보통신망이용촉진및정보보호등에관한법률위반
Text

A defendant shall be punished by imprisonment for one year.

However, the execution of the above punishment shall be suspended for two years from the date this judgment becomes final and conclusive.

Reasons

Punishment of the crime

[The normal process of winning a contract through Baz] The National Integrated Electronic Procurement System ("Baz") of the Public Procurement Service ("Baz"), when the finance officer of the ordering office, such as a local government, etc. publicly announces the construction of facilities, such as the basic amount, situation rate (【3%), shall enter the bid price using bidder's PC certified as qualified for the public notice during the bidding period, and shall arbitrarily select two of 15 vacant spaces where the expected cost of construction (hereinafter "e.g.") is not indicated, and then store the value on the server of the Public Procurement Service. The finance officer shall form 15 examples within the limit of the basic amount of construction with a certified finance PC within the limit of 【3% of the basic amount of construction, combines them with the examples and transmits them to the server of the Public Procurement Service, and then reconcrys them with the finance officer's certificate and the process is not shown on the screen for the finance officer.

In addition, when the bidding period expires, the system shall determine the expected amount by averaging the highest four examples of the highest choice of the bid automatically selected by the bidder, and the final successful bidder shall be determined by calculating the successful bid price by again multiplying the expected amount by the bid bid rate (87.745% of the construction price and the construction price of at least one billion but less than three billion won: 86.745% of the tender price).

【Criminal Facts】

1. The Defendant, together with C, D, and E, alters the malicious program (including the order) that can be seen by hacking 15 examples (including the order) immediately before encryption in the financial PC (hereinafter “CPC music program”) and the purchaser (construction company) from among four pre-designated numbers in advance, so that he/she can arrange for the alteration to transmit to the server of the Public Procurement Service (hereinafter “tender PC music program”) and the foregoing malicious program.

arrow