logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 인천지방법원 2014.05.07 2014고단1743
정보통신망이용촉진및정보보호등에관한법률위반(정보통신망침해등)등
Text

Defendant

A 1-year imprisonment, Defendant B 1-2

(a).

-

(c) Of the attached list of crimes (1) No. 1.00 per annum.

Reasons

Criminal facts

Defendant

B On September 5, 2013, the Seoul Central District Court was sentenced to two years of suspension of execution in October due to the violation of the Act on Promotion, etc. of Information and Communications Network Utilization and Information Protection, etc. by the Seoul Central District Court, and the decision became final and conclusive on November 9, 2013,

Defendant

B The person who intrudes into the computer system managed by another person through the computer communications network without authority, and illegally uses the information or program stored therein, such as reproduction, alteration, deletion, remote control, etc., Defendant A is a person who is living together with B, and committed the crime of solicitation and collection of piracy, public conflict, and fraud to punish living expenses and entertainment expenses. Defendant C is a person who is living together with the above Defendants and handled books, withdrawal, etc.

1. Joint crimes committed by Defendant B and A;

A. On April 14, 2013, the Defendants conspired to connect the F apartment 203 Do 1004, 1004, F apartment 203 Do 1004 to the sports soil site using the computer communication network, and if they did not send money on the bulletin board of the said place, they threatened the said gambling site as if they would have “salking the said gambling site” to close it, and then received 3 million won from a fluent non-victim to C’s new bank account.

B. On August 2, 2013, the above Defendants conspired to connect illegal sports earth and gambling sites using computer communication networks at the places listed in the above paragraph (A) of “A,” and then, enter values including illegal order lines into the SPL Inform (URL window) and carry out order terms that the system wants to obtain from the system, and use the SPL inpangin.ex e., SPL (ex) automated files, and then seize manager ID and fashionboard using the seized manager ID.

arrow