Case Study: Violation of Computer Information System Laws by Yang Mou – Court Judgment and Legal Analysis
The article details how Yang Mou, a former ticketing system programmer, remotely accessed and sabotaged a bus company's ticketing platform in October 2020, leading to a court conviction for destroying computer information systems under Chinese criminal law, with a nine‑month prison sentence and references to relevant statutes.
Hello, I am a top architect.
Yang Mou, a female computer programmer with an associate degree, worked for Wanhe Group's Handan Bus Station ticketing system from 2012 to August 2020, responsible for the development and maintenance of the online and self‑service ticketing platforms.
On 16 October 2020 at about 17:00, Yang used her Apple laptop to remotely access the system’s interface and entered the commands drop saleticket , drop printtotal , drop depot , deleting the ticket‑seller table, online ticket table, settlement table, ticket data table, and handheld device table, causing all ticketing channels to be unavailable from 17:20 to 22:30 and resulting in loss of some ticket data.
On the morning of 17 October 2020 at about 06:00, Yang again accessed the system using her iPhone, deleting the ticket‑seller table, ticket data table, and handheld device table, which rendered all ticketing channels unusable from 06:50 to 07:30, with additional data loss.
The prosecution requested punishment under Article 286 of the Criminal Law of the People’s Republic of China for the crime of destroying computer information systems, recommending a nine‑month fixed‑term imprisonment.
The court found that Yang’s unauthorized intrusion and deletion of system functions caused the computer information system to cease normal operation, constituting the crime of destroying computer information systems. The court upheld the prosecution’s facts and sentenced Yang to nine months in prison, with the judgment dated 1 July 2021.
Relevant legal provisions cited include Article 286, which penalizes deletion, modification, addition, or interference with computer information system functions causing serious consequences, and Article 67, which defines voluntary confession and self‑surrender as mitigating factors.
Additional notes in the article promote a “Top Architect” community and offer promotional gifts, but the core content serves as a legal case study relevant to information security.
Top Architect
Top Architect focuses on sharing practical architecture knowledge, covering enterprise, system, website, large‑scale distributed, and high‑availability architectures, plus architecture adjustments using internet technologies. We welcome idea‑driven, sharing‑oriented architects to exchange and learn together.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.