logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 인천지방법원 부천지원 2016.06.17 2015고단2194 (1)
사기방조등
Text

A defendant shall be punished by imprisonment for six months.

Reasons

Punishment of the crime

1. No person who violates the Electronic Financial Transactions Act shall lend any access medium used for electronic financial transactions in exchange for consideration, unless otherwise specifically provided for in any other Act;

Nevertheless, on March 1, 2015, the Defendant and B notified the account number so that money can be deposited from a person without the name of the Defendant and heard that money deposited in the account will be deposited in cash and decided to lend the account number of the Defendant to the lending of 9-10% of the face value of the withdrawal in cash.

On March 2, 2015, the Defendant and B informed the name infinite-si of the account number (C) of the Defendant’s corporate bank account number (C) at the location infinite-si. On March 2, 2015, the Defendant withdrawn 40 million won deposited in the said account two times at the location infinite-si, Seocheon-gu, Seocheon-si, and delivered another name infinite-si, and then received 500,000 won in return.

Accordingly, the defendant and B conspired to receive compensation and lent the access media to financial institutions.

2. The Defendant and B, as mentioned in the above paragraph 1, were aware that the nameless person who borrowed the account to the account was aware that he/she had committed a phishing crime of receiving money from another person’s account held in advance by means of lending money to the unspecified victims, trading of goods, misrepresentation, etc., and lending the account number to the above nameless person and directly withdrawing the amount of damage deposited in the leased passbook.

On March 2, 2015, the name infinites would protect the victim's deposit amounting to 40 million won by misrepresenting the investigator by phoneing the victim D at an infinite place.

The victim's name is the victim's name through the remote control, so that the victim can access the unauthorized Internet site.

arrow