logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 의정부지방법원 고양지원 2018.10.25 2018고단1668
사기등
Text

Defendants shall be punished by imprisonment for ten months.

Reasons

Punishment of the crime

The Defendants, with the knowledge that those who became aware of each other through marketing-related E open hosting room, could obtain advertising profits by using the F P P P P PP which is used for the purpose of marketing or product promotion of companies, were aware that they could obtain advertising profits by hackinging a large number of F P P PP accounts, and had the former reader gain advertising profits by using hacking F P PP sites or sold hacking to third parties.

1. Joint crimes committed by the Defendants

(a) No person who violates the Act on Promotion of Utilization of Information and Communications Network and Information Protection, etc. shall collect another person's information or induce another person to provide information through an information and communications network;

Nevertheless, from September 27, 2017 to February 2, 2018, the Defendants conspired to establish “I”, “J”, “K”, “L”, and “L”, etc. in the middle-gu Office of Busan and the Defendants’ dwellings of H Ho, and to the users of the unspecified number of Fpets.

^^ 광고 문의 때문에 메시지 드립니다!

Durdo Internet shopping mall is in the operation of Durdododoz, and it is the same that publicity will well be made, and therefore, I will also audit for the Guide Doz as the main price.

A total of 137 another person's information was collected by transmitting the F message containing "Public Relations Data M" and inputting the ID and password to the F users who charactered the F users, and storing the information in the web server created by the Defendants.

(b) No person who violates the Act on Promotion of Utilization of Information and Communications Network and Protection, etc. of Information (violation, etc. of Information and Communications Network) shall intrude into an information and communications network without legitimate access authority or beyond the authorized access authority, nor damage another person's information processed, stored,

1) The Defendants conspired to collect around October 12, 2017 in the same manner as Paragraph 1-A of the same Article.

arrow