logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 전주지방법원 2016.07.12 2015고단987
야간건조물침입절도등
Text

A defendant shall be punished by imprisonment for six months.

Reasons

Punishment of the crime

[2015 Highest 987]

1. On December 9, 2014, the Defendant: (a) around 23:08 on December 9, 2014, the Defendant: (b) opened and opened a window on the part of the victim C, which was not corrected, in the “D cafeteria”; and (c) deducted KRW 13,000 in cash owned by the victim in the carcter, in which the Defendant was an employee.

In addition, the general telephone (E) installed in the "D cafeteria", input information without authority as if it was a legitimate user of the general telephone, and make a filling of mileage amounting to KRW 100,000 and make a settlement by means of the general telephone, thereby acquiring property benefits equivalent to the same amount.

2. On December 11, 2014, the Defendant entered “D cafeteria” in the same manner as “D cafeteria,” and entered information without authority by means of a general telephone, and acquired pecuniary benefits equivalent to the same amount by charging mileages equivalent to 5,000 won and making payment by means of a general telephone.

[2015 Highest 1109] On November 30, 2014, the Defendant: (a) entered the “H” restaurant operated by the victim G located in Y in Yansan-gu, Seoul Special Metropolitan City, with no authority; (b) entered the computer network to acquire unlawful acquisition by means of inputting the information; (c) connected the Internet site of “I items” by using a computer installed therein; and (d) connected to the web page, processed the information by inputting the resident number of the damaged person and the certification number transmitted to the victim’s general telephone (I) with no authority; and (d) entered the “I items mileage” in the amount of KRW 100,000,000, from around December 3, 2014 to around December 3, 2014; and (e) entered the information into the computer or any other information processing device without authority to manage the information, as recorded in the attached Table on the computer network; and (e) entered the information in the computer or any other information processing device over two occasions.

arrow