logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 서울중앙지방법원 2014.12.10 2014고단8208
정보통신망이용촉진및정보보호등에관한법률위반(정보통신망침해등)
Text

A defendant shall be punished by imprisonment for one year.

Reasons

Punishment of the crime

The defendant lives in China and hacking a large number of unspecified sites.

1. A person who violated the Act on Promotion of Use of Information and Communications Network and Information Protection, etc. (information and communications network infringement) shall not intrude into an information and communications network beyond the authorized access authority without legitimate access authority. However, the Defendant confirmed that the C site, which is the friendship of the users of Gangseoland, is vulnerable to the C site bulletin using the Acunex program, a slickner, which makes it possible to verify the security vulnerability of the site two times before April 30, 2014 and June 8, 2014. The Defendant intentionally used the security vulnerability of the application program in the SPL in the SPj Section, which was carried out by the developer, the automated program, which is an automated program that can implement the method of hacking that could arbitrarily manipulate the database, by entering the vulnerability of the “C” in the Ha6j program, and then acquired the manager ID and password through access to the “C” manager’s member, thereby infringing the information and communications network without legitimate access authority.

2. A person who violated the Act on Promotion of Use of Information and Communications Network and Protection, etc. (the disclosure of another’s confidential information) shall not infringe, interfere with, or divulge another’s confidential information stored, managed, or transmitted through an information and communications network, the Defendant divulged 26,676 personal information on a total of 60 occasions, including 100 files containing 10 personal information, including IDs, passwords, telephone numbers, accounts, etc. of an unspecified number of persons on November 7, 2012 through D used by himself/herself, from that time to June 8, 2014, including 26,676 files that contain 10 personal information.

Summary of Evidence

1. Defendant's legal statement;

1. Each prosecutor's protocol of suspect examination of the accused (including the F's statement);

1. Each of the Acts and subordinate statutes shall report the investigation.

arrow