当前位置:网站首页>The 29 year old programmer in Shanghai was sentenced to 10 months for "deleting the database and running away" on the day of his resignation!
The 29 year old programmer in Shanghai was sentenced to 10 months for "deleting the database and running away" on the day of his resignation!
2022-07-02 13:38:00 【Python researcher】

Hello everyone , I'm brother Chen ~
Another programmer “ Delete the library and run away ” Sentenced .
2 month 10 Japan , Red Star capital Bureau learned from Shanghai Yangpu District People's court , a 29 A year old programmer recorded a without the permission of the company , On the day of resignation , Privately delete all the system codes of JD home platform that will be launched soon , Constitute the crime of destroying computer information system , To be sentenced to fixed-term imprisonment 10 Months .

The criminal judgment of Shanghai Yangpu District People's court shows ,2021 year 3 month , Recruit someone to a company in Shanghai , Responsible for the code research and development of JD home platform . Same year 6 month 18 Japan , Record a resignation from the company .
After recording a deletion code , To ensure smooth operation of the system , The company spent 3 10000 yuan to hire a third-party company to restore the database .
The court said , The defendant recorded a violation of state regulations , Delete the data stored in the computer information system , The consequences are serious , Its behavior has constituted the crime of destroying computer information system , Later, he was sentenced to 10 months' imprisonment .

It is worth mentioning that , The programmer “ Delete the library and run away ” Sentencing is not uncommon .
2020 year 2 month 23 Japan , Weimeng group, a Hong Kong listed company (02013.HK) a IT Operation and maintenance staff he mouyin “ Life is not good 、 Inability to repay online loans ” Wait for a reason , Connect the company's virtual private network through computers in their personal residence 、 Log in to the company server and execute the deletion task ,4 All data in the wechat server will be deleted in minutes .
He Mou's “ Delete library ” Behavior leads to 300 More than ten thousand users are unable to use wechat SaaS product , The failure time is as long as 8 God 14 Hours . Micro Alliance “ Delete library ” After the event , Opening the next day , The company's market value is more than 6 Million Hong Kong dollars .
2020 year 9 month , He was sentenced to fixed-term imprisonment 6 year , The verdict revealed , He said that he was unhappy after drinking 、 Inability to repay online loans and other personal reasons lead to “ Delete library ” Behavior .
Except for Weimeng , Chain home has also encountered “ Delete library ” The crisis .2018 year 6 month , Han, the database administrator of the chain company, deleted the company's financial data and related applications , The company's financial system cannot log in , Leading to chain companies spending 18 10000 yuan recovery system . Later, he was convicted of the crime of destroying computer information system , Sentenced to seven years in prison .
Finally, quote Has been IT It is widely spread in the circle Delete the library and run away ” Paragraph : Delete the library for a while , The consequences are serious . And cherish it .
source : Red Star News
END
Guess you like
No, 50W Betrothal gifts , My girlfriend was forcibly dragged away , What am I gonna do?
20 Zhang let the boss praise the large visual screen , Attached source code template !
30 A minimalist Python Project code , Take it and use it ( It's dry )边栏推荐
- 记忆函数的性能优化
- Record idea shortcut keys
- De4000h storage installation configuration
- Three talking about exception -- error handling
- Quantum three body problem: Landau fall
- Gee learning notes 2
- Engineers who can't read device manuals are not good cooks
- [cloud native database] what to do when encountering slow SQL (Part 1)?
- net share
- Solution: Compression Technology (original version and sequel version)
猜你喜欢
![[技术发展-22]:网络与通信技术的应用与发展快速概览-2- 通信技术](/img/a7/44609a5acf25021f1fca566c3d8c90.png)
[技术发展-22]:网络与通信技术的应用与发展快速概览-2- 通信技术

Independent and controllable 3D cloud CAD: crowncad enables innovative design of enterprises

Unity skframework Framework (XVI), package manager Development Kit Manager

Unity skframework framework (XIII), question module

Unity SKFramework框架(十六)、Package Manager 开发工具包管理器

How to explain binary search to my sister? This is really difficult, fan!

Redis数据库持久化

上海交大教授:何援军——包围盒(包容体/包围盒子)

Node. JS accessing PostgreSQL database through ODBC

When tidb meets Flink: tidb efficiently enters the lake "new play" | tilaker team interview
随机推荐
Achievements in science and Technology (27)
Android kotlin broadcast technology point
Why is the default of switch followed by break?
Essential for operation and maintenance - Elk log analysis system
Redis数据库持久化
How to modify the error of easydss on demand service sharing time?
Unity SKFramework框架(二十一)、Texture Filter 贴图资源筛选工具
基于ssm+jsp框架实现的学生选课信息管理系统【源码+数据库】
What are eNB, EPC and PGW?
Unity skframework framework (XVIII), roamcameracontroller roaming perspective camera control script
[cloud native database] what to do when encountering slow SQL (Part 1)?
Fundamentals of face recognition (facenet)
Nohup command
(7) Web security | penetration testing | how does network security determine whether CND exists, and how to bypass CND to find the real IP
Independent and controllable 3D cloud CAD: crowncad enables innovative design of enterprises
(6) Web security | penetration test | network security encryption and decryption ciphertext related features, with super encryption and decryption software
Chinese name extraction (toy code - accurate head is too small, right to play)
最近公共祖先LCA的三种求法
2022 Heilongjiang provincial examination on the writing skills of Application Essays
记忆函数的性能优化