Commonwealth of Kentucky v. Chasity Shirley ( 2022 )


Menu:
  •                                             RENDERED: SEPTEMBER 22, 2022
    TO BE PUBLISHED
    Supreme Court of Kentucky
    2021-SC-0254-DG
    COMMONWEALTH OF KENTUCKY                                              APPELLANT
    ON REVIEW FROM COURT OF APPEALS
    V.                           NO. 2020-CA-0373
    PULASKI CIRCUIT COURT NO. 19-CR-00071
    CHASITY SHIRLEY                                                         APPELLEE
    OPINION OF THE COURT BY JUSTICE HUGHES
    AFFIRMING
    Chasity Shirley used the self-scanner at the Walmart in Somerset to
    purchase two items, paying $80.80 less than she should have paid based on
    the prices at which the items were offered for sale. She accomplished this by
    exchanging the barcodes on the two items she purchased with barcodes on two
    less expensive items. While Shirley clearly committed a criminal act, the novel
    issue before us is whether her conduct justifies conviction for unlawful access
    to a computer in the first degree, a Class C felony. Kentucky Revised Statute
    (KRS) 434.845 sets forth the elements necessary to establish unlawful access
    to a computer in the first degree. One of the elements is that the person must
    not have the “effective consent” of the owner when accessing the computer.
    While a person may have “effective consent” to begin with, it is lost if the
    consent is “[u]sed for a purpose other than that for which the consent is given.”
    KRS 434.840(9)(d). In this case of first impression, this Court is required to
    construe “purpose” in KRS 434.840(9)(d) and more specifically whether
    purpose refers to an unauthorized computer-related purpose or a broader
    fraudulent purpose. Based upon our conclusion that KRS 434.840(9)(d) refers
    to a computer-related purpose, we ultimately conclude, like the Court of
    Appeals, that the circuit court improperly denied Appellee Chasity Shirley a
    directed verdict on the unlawful access to a computer in the first-degree
    charge. Accordingly, we affirm the Court of Appeals’ reversal of the circuit
    court’s denial of the directed verdict and remand this case to the Pulaski
    Circuit Court for proceedings consistent with this Opinion.
    FACTUAL AND PROCEDURAL BACKGROUND
    On October 5, 2018, Chasity Shirley shopped at a Walmart store in
    Somerset, Pulaski County, Kentucky, with her mother and daughter. Shirley
    checked out using a self-checkout register. Loss prevention personnel, using
    security cameras, observed Shirley using the register. Specifically, they
    observed Shirley moving a rug and a couch slipcover across the register’s
    scanner. However, the computer monitoring the register indicated that Shirley
    was purchasing other less expensive items, a toothbrush or toothbrush holder.
    The total difference in the price was $80.80.
    As Shirley left the store, the loss prevention personnel approached
    Shirley and escorted her to a nearby office to discuss her purchases. Shirley
    remained in the office for a short period after her mother left with Shirley’s
    2
    restless child. When Shirley later left, she allegedly pushed and elbowed the
    loss prevention manager as she hurriedly exited the store.
    Shirley was charged with unlawfully accessing a computer in the first
    degree and second-degree robbery. The robbery charge was amended to
    fourth-degree assault prior to trial. The jury found Shirley not guilty on the
    assault charge but guilty of first-degree unlawful access to a computer.
    At trial, Shirley moved for a directed verdict on the charge that she
    unlawfully accessed a computer in the first degree. She argued that the
    Commonwealth failed to show that she lacked effective consent to access
    Walmart’s self-checkout register, an undisputed computer. Shirley argued that
    she had effective consent to use Walmart’s self-checkout register and despite
    scanning a barcode not reflective of the item with which it was paired and thus
    engaging in theft behavior, effective consent was maintained because she did
    not use the register for a purpose other than that for which consent was
    given—she scanned barcodes and while not paying full price for the items, paid
    something. The Commonwealth responded that Walmart invites and gives
    consent to customers to scan and pay for all items, not to scan and pay for
    some items, and Walmart cannot consent for someone to commit a crime as
    Shirley did when she paid less than the full price. The circuit court denied
    Shirley’s motion for a directed verdict.
    After the jury found Shirley guilty of first-degree unlawful access to a
    computer, a Class C felony with a minimum sentence of five years, Shirley
    waived jury sentencing, accepting the Commonwealth’s recommendation of a
    3
    five-year sentence pending presentence investigation. After spending 203 days
    in jail, Shirley was sentenced to five years in prison, but the sentence was
    suspended, and Shirley was placed on conditional discharge for a period of
    thirty days.1
    On Shirley’s appeal, the Court of Appeals in a 2-1 decision reversed the
    circuit court’s denial of the directed verdict. This Court granted the
    Commonwealth’s motion for discretionary review.
    ANALYSIS
    Kentucky Revised Statutes Chapter 434, titled “Offenses Against Property
    by Fraud,” contains a section dealing with unlawful access to a computer. This
    section includes: 1) KRS 434.840 Definitions (codified in 1984 and revised in
    2002); 2) KRS 434.845 Unlawful access to a computer in the first degree
    (same);2 3) KRS 434.850 Unlawful access to a computer in the second
    1  Former Justice Venters, serving as a special judge after the prior judge left the
    circuit court, entered the final judgment and sentence.
    2   When codified in 1984, KRS 434.845 stated:
    (1) A person is guilty of unlawful access to a computer in the first degree
    when he knowingly and willfully, directly or indirectly accesses, causes to
    be accessed, or attempts to access any computer software, computer
    program, data, computer, computer system, computer network, or any
    part thereof, for the purpose of:
    (a) Devising or executing any scheme or artifice to defraud; or
    (b) Obtaining money, property, or services for themselves or another by
    means of false or fraudulent pretenses, representations, or promises; or
    (c) Altering, damaging, destroying, or attempting to alter, damage, or
    destroy, any computer, computer system, or computer network, or any
    computer software, program, or data.
    4
    degree (same);3 4) KRS 434.851 Unlawful access in the third degree (codified in
    2002);4 5) KRS 434.853 Unlawful access in the fourth degree (codified in
    (2) Accessing, attempting to access, or causing to be accessed any
    computer software, computer program, data, computer, computer
    system, computer network, or any part thereof, even though fraud, false
    or fraudulent pretenses, representations, or promises may have been
    involved in the access or attempt to access shall not constitute a
    violation of this section if the sole purpose of the access was to obtain
    information and not to commit any other act proscribed by this section.
    (3) Unlawful access to a computer in the first degree is a Class C felony.
    3   When codified in 1984, KRS 434.850 stated:
    (1) A person is guilty of unlawful access to a computer in the second
    degree when he without authorization knowingly and willfully, directly or
    indirectly accesses, causes to be accessed, or attempts to access any
    computer software, computer program, data, computer, computer
    system, computer network, or any part thereof.
    (2) Unlawful access to a computer in the second degree is a Class A
    misdemeanor.
    KRS 434.850 currently states:
    (1) A person is guilty of unlawful access to a computer in the second
    degree when he or she, without the effective consent of the owner,
    knowingly and willfully, directly or indirectly accesses, causes to be
    accessed, or attempts to access any computer software, computer
    program, data, computer, computer system, computer network, or any
    part thereof which results in the loss or damage of three hundred dollars
    ($300) or more.
    (2) Unlawful access to a computer in the second degree is a Class D
    felony.
    4   KRS 434.851 states:
    (1) A person is guilty of unlawful access in the third degree when he or
    she, without the effective consent of the owner, knowingly and willfully,
    directly or indirectly accesses, causes to be accessed, or attempts to
    access any computer software, computer program, data, computer,
    computer system, computer network, or any part thereof, which results
    in the loss or damage of less than three hundred dollars ($300).
    (2) Unlawful access to a computer in the third degree is a class A
    misdemeanor.
    5
    2002);5 6) KRS 434.855 Misuse of computer information (codified in 1984 and
    revised in 2002); and 7) Venue (same). See 2002 Ky. Acts ch. 350 §§ 1-7; 1984
    Ky. Acts ch. 210 §§ 1-5.6 The 2002 revisions and newly-enacted statutes
    followed the Court of Appeals’ decision in Commonwealth v. Cocke, 
    58 S.W.3d 891
     (Ky. App. 2001). In Cocke, the Court of Appeals affirmed the Jefferson
    Circuit Court’s decision declaring then KRS 434.845(1)(c) void for vagueness.7
    When amending KRS 434.845 and KRS 434.850 and enacting KRS
    434.851 and KRS 434.853 in 2002, the General Assembly made the lack of
    effective consent by the computer’s owner an element of each degree of
    5   KRS 434.853 states:
    (1) A person is guilty of unlawful access in the fourth degree when he or
    she, without the effective consent of the owner, knowingly and willfully,
    directly or indirectly accesses, causes to be accessed, or attempts to
    access any computer software, computer program, data, computer,
    computer system, computer network, or any part thereof, which does not
    result in loss or damage.
    (2) Unlawful access to a computer in the fourth degree is a class B
    misdemeanor.
    6 Unless context indicates otherwise, “computer” is used to refer to “computer
    software, computer program, data, computer, computer system, computer network, or
    any part thereof,” which all four degrees of unlawful access to a computer identify as
    accessible.
    7  Note 2, supra, contains the text of KRS 434.845, codified in 1984, at issue in
    Cocke. In Cocke, the defendant, a computer programmer, after his employment
    terminated and he had no authority to do so, allegedly used the modem on his home
    computer to access his former employer’s computer system and then to delete certain
    data from the system, stop an accounting program in progress, and change a
    password. Id. at 892. The defendant argued primarily that KRS 434.845(1)(c) was too
    broad in that a prosecutor could indict any person for most normal activities that are
    conducted on a computer. Id. The Court of Appeals concluded: “Clearly, the statute
    is void for vagueness as an authorized user cannot, from a reading of the statute,
    ascertain specifically what alteration, damage or destruction is prohibited.” Id. at 894.
    6
    unlawful access to a computer.8 Thus in addressing this case we are required
    to determine whether Shirley acted without the effective consent of Walmart
    when she accessed the Walmart self-scan register.
    As amended in 2002 and unchanged since, KRS 434.845 reads:
    (1) A person is guilty of unlawful access to a computer in the first
    degree when he or she, without the effective consent of the
    owner,[9] knowingly and willfully, directly or indirectly accesses,[10]
    causes to be accessed, or attempts to access any computer
    software,[11] computer program,[12] data,[13] computer,[14] computer
    system,[15] computer network,[16] or any part thereof, for the
    purpose of:
    (a) Devising or executing any scheme or artifice to defraud; or
    (b) Obtaining money, property, or services for themselves or
    another by means of false or fraudulent pretenses, representations,
    or promises.
    8  Along with revising KRS 434.845 by omitting subsection (1)(c) and then
    section (2), see n.2, supra, but maintaining the other prohibited purposes in
    subsections (1)(a) and (b), the General Assembly distinguished unlawful access to a
    computer in the first degree from unlawful access in the second, third, and fourth
    degree by not including within the lesser degrees the fraudulent purpose requirement
    described in KRS 434.845(1)(a) and (b) and respectively defining the amount of loss or
    damage (KRS 434.840(12) defines “loss or damage”) caused by the unlawful access to
    a computer as three hundred dollars or more (a Class D felony), less than three
    hundred dollars (a Class A misdemeanor), and no loss or damage (a Class B
    misdemeanor). See nn. 3-5, supra.
    9   KRS 434.840(13) defines “owner.”
    10KRS  434.840(1) defines “access” as “to approach, instruct, communicate with,
    manipulate, store data in, retrieve or intercept data from, or otherwise make use of
    any resources of, a computer, computer system, or computer network.” The General
    Assembly amended KRS 434.840(1) in 2002 by adding “manipulate” to the definition.
    2002 Ky. Acts ch. 350 § 1.
    11   KRS 434.840(5) defines “computer software.”
    12   KRS 434.840(4) defines “computer program.”
    13   KRS 434.840(7) defines “data.”
    14   KRS 434.840(2) defines “computer.”
    15   KRS 434.840(6) defines “computer system.”
    16   KRS 434.840(3) defines “computer network.”
    7
    (2) Unlawful access to a computer in the first degree is a Class C
    felony.
    (Emphasis added.)
    “Effective consent” is defined as “consent by a person legally authorized
    to act for the owner.” KRS 434.840(9). The statute further states, however,
    that consent is not effective if it is:
    (a) Induced by deception or coercion;
    (b) Given by a person who the actor knows is not legally authorized
    to act for the owner;
    (c) Given by a person who by reason of age, mental disease or
    defect, or intoxication is known by the actor to be unable to
    make responsible property or data dispositions; or
    (d) Used for a purpose other than that for which the consent is
    given.
    Id.
    This case presents us with the first statutory interpretation issue for KRS
    434.845 since its amendment in 2002.17 Given the facts presented, we focus
    particularly on the “used for a purpose other than that for which the consent is
    given” language used in KRS 424.840(9)(d), part of the definition of “effective
    consent.”
    The Commonwealth contends that the Court of Appeals incorrectly
    interpreted “effective consent” as defined in KRS 434.840 when it concluded
    17  Since KRS 434.845’s amendment, prior to this case, it has only been
    considered by the Court of Appeals in the context of whether a conviction both for
    first-degree robbery and for first-degree unlawful access to a computer violates double
    jeopardy. See Day v. Commonwealth, 
    367 S.W.3d 616
     (Ky. App. 2012).
    8
    that Shirley retained the effective consent of Walmart when she used the self-
    checkout register for its intended purpose, i.e., to scan barcodes and to buy
    items. The Commonwealth argues that the Court of Appeals expanded the
    definition of “effective consent” to include not only Walmart’s consent to use
    self-checkout registers to purchase items at the listed price, but also for sales
    as a result of admitted retail fraud. As before the trial court, Walmart
    emphasizes that it cannot and does not consent to customers using self-
    checkout registers to commit fraud and steal merchandise.
    While review of a directed verdict decision often only entails reviewing the
    evidence to determine if it would be clearly unreasonable for a jury to find guilt,
    Commonwealth v. Benham, 
    816 S.W.2d 186
    , 187 (Ky. 1991), this case first
    requires the Court to determine as a matter of law the meaning of statutory
    language, a de novo review. See Commonwealth v. Montaque, 
    23 S.W.3d 629
    ,
    631 (Ky. 2000); Neurodiagnostics, Inc. v. Kentucky Farm Bureau Mut. Ins. Co.,
    
    250 S.W.3d 321
    , 325 (Ky. 2008). Specifically, we must discern the meaning of
    KRS 434.840(9)(d), the provision the Commonwealth relied on as establishing
    that Shirley acted “without the effective consent” of Walmart when she used the
    store’s self-checkout register.18
    When dealing with a question of statutory construction, we begin with
    the plain text. “The cardinal rule in construing statutes is, if possible, to
    18  While the Commonwealth’s brief suggests that KRS 434.840(9)(a) is another
    basis for finding Shirley did not have effective consent to access Walmart’s self-
    checkout register, KRS 434.840(9)(a) has not been at issue in this case.
    9
    ascertain the meaning of the Legislature from the language used, and if that be
    plain, clear, and unambiguous, resort to collateral rules of construction is
    unnecessary.” Mills v. City of Barbourville, 
    117 S.W.2d 187
    , 188 (Ky. 1938).
    “Our ultimate goal when reviewing and applying statutes is to give effect to the
    intent of the General Assembly. We derive that intent from the language the
    General Assembly chose, either as defined by the General Assembly or as
    generally understood in the context of the matter under consideration.”
    Commonwealth v. Wright, 
    415 S.W.3d 606
    , 609 (Ky. 2013). When a statute is
    plain and unambiguous on its face, we are not at liberty to construe the
    language otherwise. Whittaker v. McClure, 
    891 S.W.2d 80
    , 83 (Ky. 1995). “The
    statute must be read as a whole and in context with other parts of the law. All
    parts of the statute must be given equal effect so that no part of the statute will
    become meaningless or ineffectual.” Lewis v. Jackson Energy Co-op. Corp., 
    189 S.W.3d 87
    , 92 (Ky. 2005). We presume the legislature did not intend an
    absurd result. Commonwealth, Cent. State Hosp. v. Gray, 
    880 S.W.2d 557
    , 559
    (Ky. 1994). With these principles in mind, we consider the meaning of KRS
    434.840(9)(d).
    When reading KRS 434.840(9)(d) alone, the language “used for a purpose
    other than that for which the consent is given” appears ambiguous. Shirley
    advocates that the meaning of “purpose” is limited to a computer context and
    in this case refers to using the computer to scan barcodes and pay for
    merchandise―the purpose for which Walmart made the self-scanner available
    to shoppers. The Commonwealth advocates that “purpose” refers to the
    10
    purpose for which the defendant used the scanner―fraudulent activity. The
    meaning of “purpose” within KRS 434.840(9)(d) becomes clearer when
    considering the “effective consent” definition in KRS 434.840(9)(d) within the
    context of KRS 434.845(1) as a whole.
    Incorporating KRS 434.840(9)(d) into KRS 434.845 results in KRS
    434.845(1) reading as follows:
    A person is guilty of unlawful access to a computer in the first
    degree when he or she, without the effective consent of the owner
    [due to the computer being “used for a purpose other than that for
    which the consent is given”], knowingly and willfully, directly or
    indirectly accesses, causes to be accessed, or attempts to access
    any computer software, computer program, data, computer,
    computer system, computer network, or any part thereof, for the
    purpose of:
    (a) Devising or executing any scheme or artifice to defraud; or
    (b) Obtaining money, property, or services for themselves or
    another by means of false or fraudulent pretenses, representations,
    or promises.
    (Emphasis added.)
    The incorporation of KRS 434.840(9)(d)’s text into KRS 434.845(1)
    highlights the two express instances in which “purpose” is relevant to proving
    that a person is guilty of unlawful access to a computer in the first degree―one
    being the computer-related purpose consented to by the owner (part of the
    concept of “effective consent”) and the other being the fraudulent purpose
    intended by the criminal actor (the second use of “purpose” in the above quote,
    the purpose of devising or executing a scheme or obtaining something of value
    by false or fraudulent means). With the parties to this case focusing on
    11
    “purpose” in KRS 434.840(9)(d), the “purpose” described in KRS 434.845(1),
    the fraudulent purpose for which a person must access a computer in order to
    be found guilty of unlawful access to a computer in the first degree, has been
    largely ignored. Shifting our attention back to consideration of the statute as a
    whole brings the Commonwealth’s argument into proper perspective.
    The Commonwealth argues that effective consent is lost under KRS
    434.840(9)(d) when one’s “purpose” is to commit fraud when accessing a
    computer because a retailer cannot consent for a person to commit crime. The
    Commonwealth’s point that a retailer cannot consent for a person to commit
    crime, stemming from the foundational criminal law principle that the
    government decides whether to punish an individual for an act or omission in
    violation of the law, is undisputed. Indeed, as expressed in KRS 434.845(1),
    the General Assembly decided to punish an individual who, with the prescribed
    mental state, the method of access—directly or indirectly—being of no
    consequence, accesses or attempts to access a computer without the effective
    consent of the owner for a fraudulent purpose as prescribed in KRS
    434.845(1)(a) and (b). While the Commonwealth views KRS 434.840(9)(d) as
    encompassing the fraudulent purpose to which the owner cannot consent, a
    full reading of KRS 434.845(1) reveals that KRS 434.845(1)(a) and (b) codify
    that fraudulent purpose plainly. KRS 434.840(9) speaks to the purpose for
    which the user was granted access to the computer, e.g., a shopper granted
    access to scan items, an inventory clerk granted access to monitor inventory,
    12
    or an accounting office employee granted access to maintain accounts
    receivable.
    Statutory construction principles direct that if there is an ambiguity,
    “purpose” within KRS 434.845(1) and KRS 434.840(9)(d) should be read as not
    creating a redundancy or an absurdity. Lewis, 189 S.W.3d at 92; Gray, 880
    S.W.2d at 559. The context of this unlawful access to a computer statute leads
    to the conclusion that KRS 434.840(9)(d)’s language, “used for a purpose other
    than that for which the consent is given,” requires determining the computer
    access purpose consented to by the owner. Although a computer owner cannot
    consent to the fraudulent purpose prohibited by statute, and an interpretation
    otherwise may be considered an absurdity itself, the owner can consent to
    another person accessing, or making use of, see KRS 434.840(1), his computer.
    The focus of KRS 434.840(9)(d), then, is the purpose for which consent to use
    the computer was given.
    While the General Assembly’s use of the term “purpose” within KRS
    434.845(1) aids in bringing proper perspective to the arguments presented,
    even if the term “purpose” were not used within KRS 434.845(1) to introduce
    subsections (a) and (b) (the prohibited fraud), the Commonwealth’s point that
    one cannot consent to fraud would lead to the same conclusion. So the
    owner’s consent must necessarily be related to a purpose for which consent
    could be given. With the context of the statute being computer access, the
    owner’s consent would be related to that, not the fraudulent purpose a bad
    actor desires to achieve. Consequently, if the individual accesses or makes use
    13
    of the computer in a computer-related manner not consented to, effective
    consent is lost.
    With the determination that KRS 434.840(9)(d) does not refer to whether
    the individual is accessing a computer to commit fraud but does refer to
    whether the individual is accessing a computer in the way consented to by the
    owner, we must conclude that Shirley was entitled to a directed verdict on the
    charge of unlawful access to a computer in the first degree. Shirley accessed
    Walmart’s self-checkout register by scanning barcodes and making payment,
    access specifically created and intended for Walmart shoppers. Changing the
    barcodes on certain merchandise prior to scanning it did not result in Shirley
    accessing Walmart’s self-checkout register in a way to which Walmart did not
    consent. She used the scanner as intended and consented to by its owner.
    Our close reading of the unlawful computer access statute is not
    unprecedented. Although the language in similar statutes around the country
    varies, the principle we have identified―for what purpose has the computer
    owner consented to its use―has surfaced in several jurisdictions. For example,
    in State v. Nascimento, 
    379 P.3d 484
     (Or. 2016), the Supreme Court of Oregon
    addressed an unlawful computer access statute that used the language
    “without authorization” rather than our “without effective consent.” The
    defendant was convicted of theft and computer crime for using a terminal
    located at her convenience store workplace and connected to the Oregon State
    Lottery system to print lottery tickets for which she did not pay. In reversing
    the unlawful computer access conviction, the Court stated:
    14
    [T]he text supports defendant’s assertion that her use of the lottery
    terminal to print Keno tickets—as she was trained and permitted
    by her employer to do—was “authorized” use. The fact that she
    printed the tickets for her own use and did not pay for them may
    have violated company policies and other parts of the computer
    crime statute (in addition to the theft statute), but her use was not
    “without authorization” as that term is used in ORS 164.377(4)
    . . . . When defendant physically accessed and used the terminal
    to print Keno tickets, that access and use was authorized by her
    employer. Moreover, there was, for example, no evidence that
    defendant circumvented any computer security measures, misused
    another employee’s password, or accessed any protected data.
    Id. at 491-92. The Oregon legislative history also reflected that the statute was
    intended to criminalize use of a computer by someone with no authority to use
    it, use by unauthorized third parties commonly referred to as “hackers.” Id. at
    492. The Court concluded that Nascimento’s impermissible use of the
    computer could lead to other criminal charges but not the unlawful access
    charge. Id. at 493. Notably, her companion theft conviction for the lottery
    ticket misconduct was not even challenged on appeal. See also State v.
    
    Thompson, 135
     A.3d 166 (N.J. Super. Ct. Law Div. 2014) (defendants subject to
    computer theft statute because they acted “without authorization or in excess
    of authorization” when they used their lawful access to police department
    computer system as IT specialists, granted for the purpose of conducting
    maintenance and correcting problems within email system, for a different
    purpose, namely accessing and reading private emails of executive staff against
    whom they had pending litigation).
    “When presented with a motion for a directed verdict, a court must
    consider the evidence as a whole, presume the Commonwealth’s proof is true,
    15
    draw all reasonable inferences in favor of the Commonwealth, and leave
    questions of weight and credibility to the jury.” Acosta v. Commonwealth, 
    391 S.W.3d 809
    , 816 (Ky. 2013) (citing Benham, 816 S.W.2d at 187–88). A trial
    court should deny a directed verdict when the “Commonwealth has produced
    . . . more than a scintilla [of evidence] and it would be reasonable for the jury to
    return a verdict of guilty based on it.” Id. “On appellate review, the standard is
    slightly more deferential; the trial court should be reversed only if ‘it would be
    clearly unreasonable for a jury to find guilt.’” Id.
    Here, the evidence reflected that Shirley scanned barcodes, albeit
    barcodes which did not reflect the items with which they were paired. The
    Commonwealth did not present proof that Shirley accessed Walmart’s self-
    checkout register beyond the consented-to barcode scanning for completion of
    a self-checkout sales transaction. Without that proof, it was clearly
    unreasonable for the jury to find Shirley guilty of unlawful access to a
    computer in the first degree. The circuit court erred by denying Shirley’s
    motion for a directed verdict of acquittal.
    Finally, we agree with the Court of Appeals that our Penal Code has
    other possibly appropriate charges for Shirley’s unlawful actions at Walmart
    that day including theft by deception, KRS 514.040(1)(a), or theft by unlawful
    taking, KRS 514.030(1)(a). The “fit” with both of those crimes is easily seen.19
    As the appellate court also noted, considering the value of property taken in
    19   As noted above, Shirley admitted to the jury that her behavior constituted a
    theft.
    16
    this case (less than $500) either charge would constitute a misdemeanor, a
    level of criminal offense far more in keeping with the offending conduct than a
    Class C felony.
    CONCLUSION
    For the foregoing reasons, the Court of Appeals’ decision reversing the
    Pulaski Circuit Court’s denial of a directed verdict on the unlawful access to a
    computer in the first degree charge is affirmed.20 This case is remanded to the
    Pulaski Circuit Court for proceedings consistent with this Opinion.
    All sitting. All concur.
    20 Because we affirm the Court of Appeals upon consideration of the primary
    issue advanced in favor of a directed verdict, whether Shirley maintained effective
    consent to use Walmart’s self-checkout register despite replacing the barcodes on
    more expensive items with barcodes of less expensive items, we do not reach the
    alternative issue Shirley advanced. She also presented the argument that the crime of
    unlawful access to a computer in the first degree does not apply to cases in which the
    harms are under three hundred dollars. Shirley argued that with the crimes of
    unlawful access to a computer in the second, third and fourth degree being dependent
    on the dollar amount of harm involved, see nn. 3-5, the first-degree charge should
    only apply where the lesser offenses do not. Shirley argued that unlawful access to a
    computer in the third degree, a Class A misdemeanor, applies when the loss or
    damage is less than three hundred dollars.
    17
    COUNSEL FOR APPELLANT:
    Daniel J. Cameron
    Attorney General of Kentucky
    Michael Robert Wajda
    Assistant Solicitor General
    COUNSEL FOR APPELLEE:
    Steven Jared Buck
    Assistant Public Advocate
    18
    

Document Info

Docket Number: 2021 SC 0254

Filed Date: 9/19/2022

Precedential Status: Precedential

Modified Date: 9/22/2022