logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 수원지방법원 2020.02.07 2019고단8009
정보통신망이용촉진및정보보호등에관한법률위반(정보통신망침해등)등
Text

Defendants shall be punished by imprisonment for one year and six months.

However, as to the Defendants, it is for two years from the date of the final judgment.

Reasons

Punishment of the crime

[Crypt fact] C, etc. is a kind of electronic currency recorded in a computer, etc. and traded through the Internet without real cause, which is operated by a diversification system utilizing the block chain technology.

In itself, it is possible to exchange with coaches even in the state of token, because it is not possible to build a new block chain platform unlike Coiner and Coiner to borrow another block chain platform such as C and D.

[Basic Facts] The victim E purchased 304.11 (market price equivalent to 300 million won) via F Exchange, etc. from January 2018 to February 26, 2018, and then was in custody of 304 of the above CCoin in the electronic wallet address opened through G, an electronic walleter program, which can manage and keep coins.

On February 2, 2018, the Defendants used the victim’s information on the victim’s domicile account at a remote opportunity for Defendant A to intrude into the victim’s electronic wallbook, and conspired to divide profits by disposing of Ccoin owned by the victim.

【Criminal Facts】

On February 26, 2018, at around 22:22, the Defendants came into the victim’s electronic wall account by accessing the victim’s electronic wall address and password from the PC near the I University located in Pyeongtaek-si H without authority by using the said computer to enter the victim’s electronic wall address and password, and then acquired property benefits equivalent to KRW 300 million by transferring the victim’s market value, which is the victim’s ownership, to the electronic wall address managed by the Defendants.

As a result, the Defendants conspired in collusion with the information and communications network without legitimate access, and without legitimate authority, the victim is the data processing device such as computer.

arrow