Text
A defendant shall be punished by imprisonment for six months.
However, the execution of the above punishment shall be suspended for two years from the date this judgment becomes final and conclusive.
Reasons
Punishment of the crime
1. The Defendant A was appointed as a police officer on August 29, 192 as the public bond, and served at the Nowon-gu Police Station from March 1995 to July 2004. From March 2006, Defendant A served at the Gwanak-gu Police Station from March 2006, and was promoted from July 2010 to November 27, 2012.
2. Criminal facts;
(a) A criminal defendant who violates the Personal Information Protection Act or the Promotion of the Electronicization of Criminal Justice Process Act shall not use personal information beyond the scope of use where it is inevitable for performing his/her duties provided by Acts and subordinate statutes as a personal information manager, and shall not use it for unjust purposes, such as disclosing, processing without authority, or providing for another person to use it
However, although the Defendant, as a police officer, could conduct multiple times only for the purpose of investigation, such as arresting a person, he/she was willing to visit the E-Regional Housing Association’s association that borrowed his/her money, and confirmed F’s personal information, specific frequency of distribution, such as the name of the offense, arrest, etc., and in order to prepare measures to recover his/her claim, such as demanding the F to pay back his/her debt, and attempted to peruse F’s fee-raising materials through the Police Computer Network.
At around 19:50 on March 19, 2012, the Defendant entered the Defendant’s ID and password into the police computer network at the Seoul Gwanak-gu Seoul Special Metropolitan City Seoul Special Metropolitan City Seoul Special Metropolitan City Office D District Office D District Office (hereinafter “Seoul Special Metropolitan City Seoul Special Metropolitan City Office D District Office”) for the above purpose, and then entered F’s personal information (the name and birth year) into the police computer network after accessing the police computer network and met it, and used it to check whether F’s number is possible to peruse it and check whether F’s personal information, such as the material, resident registration number, and the name of the crime.