People v. Childs

Related Cases

    Filed 10/25/13
    
                           CERTIFIED FOR PARTIAL PUBLICATION*
    
    
                  IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA
    
                                    FIRST APPELLATE DISTRICT
    
                                           DIVISION FOUR
    
    
    THE PEOPLE,
            Plaintiff and Respondent,
                                                         A129583, A132199
    v.
    TERRY CHILDS,                                        (City & County of San Francisco
                                                         Super. Ct. Nos. 207523,
            Defendant and Appellant.                      2376395)
    
    
    
    
            A jury convicted appellant Terry Childs of disrupting or denying computer
    services to an authorized user. (Pen. Code,1 § 502, subd. (c)(5).) It also found true an
    enhancement allegation that damage caused by his offense exceeded $200,000.
    (§ 12022.6, subd. (a)(2).) He was sentenced to four years in state prison and ordered to
    pay more than $1.4 million in restitution. (§ 1202.4.) In two consolidated appeals from
    the conviction and the restitution order, he contends inter alia that subdivision (c)(5) of
    section 502 was not intended to apply to an employee.2 We affirm the conviction and the
    restitution order.
    
            *
             Pursuant to California Rules of Court, rules 8.1105(b) and 8.1110, this opinion is
    certified for publication with the exception of parts III through V.
            1
                All statutory references are to the Penal Code unless otherwise indicated.
            2
             Section 502, subdivision (c)(5) makes it a crime for any person who
    “[k]nowingly and without permission disrupts or causes the disruption of computer
    services or denies or causes the denial of computer services to an authorized user of a
    computer, computer system, or computer network.”
                                                    1
                                              I. FACTS
    A. Employment Context
             From the time he was employed in April 2003 until July 2008, appellant Terry
    Childs served as the principal network engineer for Department of Telecommunications
    and Information Services (DTIS) of the City and County of San Francisco. DTIS was
    responsible for administering the city‟s computer network, providing computer services
    to city departments such as access to the Internet and to each department‟s database. It
    maintained the network, operated it, repaired it if it failed, and made any needed changes
    to it.
             As part of the job application process, Childs was asked about his criminal history.
    On the first application, he reported that he had no prior convictions; on the second, he
    admitted that he had suffered one. In fact, Childs had been convicted of multiple
    criminal offenses in another state. Later, he admitted that he intentionally omitted giving
    accurate and complete criminal history information to the city at his hiring.
             Childs worked at the city‟s data center at One Market Plaza in San Francisco. As
    DTIS‟s highest level engineer, he was highly knowledgeable, but he was also very
    sensitive and working with him could be difficult. Senior network engineer Glacier
    Ybanez assisted him. Childs reported to Herbert Tong, the manager of DTIS‟s network
    engineering unit. In February 2006, Richard Robinson became chief operating officer of
    DTIS and Tong‟s supervisor.
    B. The FiberWAN Network
             In 2005, Childs was assigned to configure, implement and administer the city‟s
    then-new fiber-optic wide area network—FiberWAN—using Cisco devices. He had
    lobbied to be allowed to implement the new network himself, rather than have Cisco do
    so. When he took on a project, he took ownership of it.
             The FiberWAN network was set up side-by-side with the city‟s legacy computer
    system. When transfer from the legacy system was complete, FiberWAN could provide a
    single network infrastructure to most city departments, offering access to email,
    databases, encrypted information and the Internet. This single infrastructure operated at a
    
                                                   2
    higher speed and for a lower cost than the legacy system. Information could be shared
    between departments or segregated to a specific department, as needed.
           FiberWAN devices were both physically connected by cables and logically
    connected by the path along which data was transmitted between devices. Five core
    FiberWAN routers3 were set up in three locations—two each at secondary sites and one
    at the One Market Plaza data center.4 These key devices were linked so that an isolated
    disruption would not bring down the network. Instead, traffic was redirected through
    another router on the network. This design redundancy allowed the FiberWAN network
    to continue to operate while part of the network was being repaired, or if one device
    suffered a power failure. City departments had customer edge (CE) devices located at
    their sites. The DTIS routers and the city department CE devices were also linked to
    allow DTIS to provide computer services to each department.
           As its principal network engineer, Childs developed the FiberWAN‟s
    configurations—the instructions needed to make the computer system work—based on
    standards set by the DTIS network architect. To protect the security of this critical
    infrastructure, all FiberWAN configurations were confidential.
           Vital network information is usually stored in a computer system‟s non-volatile
    random access memory (NVRAM). Information “saved” to NVRAM can be accessed
    again if the computer is powered off and is then “rebooted.” By contrast, information
    stored in volatile random access memory (VRAM) is lost once a computer is powered off
    and back on. If network configurations are stored in VRAM, they are lost when the
    system powers off and the system cannot reboot itself.
    
    
    
           3
               A router is a device that chooses the best path to direct data.
           4
            The data center had only one device because of DTIS budgetary constraints.
    DTIS‟s long-term plan was to acquire a second core router for the data center. In the
    meantime, the risk of failure of the single PE03 core router located at the data center was
    thought to be less than at the other two sites because the data center was staffed around-
    the-clock. Physical entry to the data center required multiple levels of electronic card
    reader approval.
                                                    3
           Experts recommend that network configurations—or a backup copy of them5—be
    stored in NVRAM so that a power loss will not compel a complete reconfiguration of the
    network. To rebuild the configurations would cause a significant network disruption that
    might last for days. Likewise, network devices should not be run on VRAM, even if the
    security of the information in those devices is sensitive because the risk of losing that
    information in the event of a system crash is too great.
           Childs had full administrative access to the FiberWAN computer system. Only a
    person with this access may make administrative changes to the network. Administrative
    access is essential in order to log into the network, to review network configurations, to
    troubleshoot problems, to add city departments, and to modify the network. To obtain
    administrative access to the network, a person must know the programmed password.
    Because network configurations are so vital to system administration, it is typical for
    several network engineers to have access to them.
           Some FiberWAN computer devices have a password recovery feature that allows
    retrieval of backup configurations in case the primary configurations become corrupted.
    Password recovery is conducted through a device‟s console port. With physical access to
    a device through this console port—which is typically password-protected itself for
    security reasons—an administrator can access the network, clear out corrupted
    configurations and replace them with backup configurations, as long as the system can be
    rebooted. There is no way to reboot the network without powering off the computer and
    powering it back on again.
           Configurations can also be restored by means of a modem connected to the
    network. A system administrator can access a network remotely to obtain what is called
    “out-of-band management” of the network—authorized access made by means outside
    the normal network flow. At two secondary computer sites, Childs installed devices that
    allowed him to dial into the computer network remotely if an emergency arose and he
    
           5
            A backup copy of the configurations may be stored on a laptop computer. It
    appears that Childs used a laptop when he physically reloaded configurations onto core
    devices at a secondary DTIS site after a March 2008 fire.
                                                  4
    was not able to be physically present at these locations. Such remote access by means of
    a dial-up modem poses a security risk, because it could permit undetected “back door”
    access by an unauthorized person. A record of the users entering the FiberWAN system
    was crucial to its integrity. Childs knew that when he used a modem to access core
    devices, no record of his use was tracked.
    C. Childs Assumes Sole Control of FiberWAN
           During the first months of work on the FiberWAN network, its configurations
    were available to all network engineers. Childs and his assistant Ybanez both had and
    used the password needed to access the FiberWAN. In 2006, the first city department
    was connected to FiberWAN, with other departments regularly added afterward.
           Gradually, Childs became more possessive of the FiberWAN network. By July
    2006, Robinson had received numerous complaints about network outages and service
    disruptions, some of which he believed were caused by undocumented FiberWAN
    changes. A memorandum went out to the network engineering staff, reminding them that
    all configurations changes were to be tracked, and noting that repeated failure to track
    changes could result in disciplinary action. Apparently, Childs regarded the
    memorandum as a personal attack on his authority. He responded by threatening to take
    a stress leave if DTIS outsourced any FiberWAN installations.6
           In March or April 2007, Ybanez returned to the FiberWAN project after being on
    another assignment for many months. During that assignment, only Childs worked on
    FiberWAN. When Ybanez returned, he learned that the administrative access passwords
    had been changed and backup configurations had been moved off of a server once
    available to more of the network engineering staff.7 Childs refused to give Ybanez
    administrative access to the FiberWAN, concerned that if pressed to do so, Ybanez would
    
    
    
           6
            There was other evidence that Childs opposed outsourcing of any FiberWAN
    work, preferring to do it himself.
           7
            Childs testified that Tong told him to take FiberWAN off this server, to prevent
    an unskilled person from modifying it.
                                                 5
    reveal the access codes to management. Ybanez replied that he would tell management
    the access codes if asked, because the access codes did not belong to him.
           From thereon, from the spring of 2007 on, only Childs had administrative access
    to FiberWAN. In May 2007, a city department had difficulty accessing a state database
    while Childs was away from DTIS without his cell phone or laptop—devices that would
    have allowed him to connect to the network from a remote location. When Tong
    instructed Ybanez to resolve the problem, Ybanez told Tong that he did not have
    administrative access to the network.
           As Childs‟s supervisor, Tong was torn about his employee. Childs was an
    experienced and hard-working—albeit volatile—network engineer with a strong sense of
    responsibility for the network. Tong was under pressure to complete FiberWAN
    implementation, which Childs was working hard to accomplish. He hoped the
    implementation would be finished in another six to nine months. However, Tong knew
    that Childs‟s sole administrative access to FiberWAN made him the single point of
    failure, posing a danger to the city‟s computer network. The system could not function if
    Childs could not access it. Tong expected that eventually, Childs would give Ybanez
    access to FiberWAN. He also believed that Childs would not harm FiberWAN, as this
    would reflect badly on the principal network engineer‟s skill and expertise.
           When Childs returned from vacation, Tong chose not to confront him about the
    limited access issue, fearing that Childs might retaliate by reducing his productivity.
    Instead, he hoped that the implementation would be completed soon and Childs would be
    reassigned to another project before the access issue became a problem. If DTIS did not
    have the FiberWAN password by that time, Tong believed that the password recovery
    feature would allow a new administrator to create a new one.
           When Childs took extended time off, he delivered a sealed envelope to Tong that
    he said contained the FiberWAN passwords. Tong had no need for administrative access
    to FiberWAN during these absences. When Childs returned to work, Tong returned the
    unopened envelope to him to prove that he had not used them. Tong did not want Childs
    to speculate that someone modified the network configurations in his absence.
    
                                                 6
          In December 2007, the city‟s Human Services Agency (HSA) experienced a
    power outage. When power was restored, its computers could not connect to
    FiberWAN—the configurations of its CE device had been erased because they had been
    saved to VRAM. Childs reloaded the configurations and got the system reconnected.
    When the HSA information security officer learned that the CE configurations had been
    stored in VRAM, he protested to Childs that this was unacceptable. Citing security
    concerns, Childs explained that he wanted to prevent a physical connection to the CE that
    would allow someone to obtain the configurations using the password recovery feature.
    He suggested disabling the password recovery feature instead; the information security
    officer agreed. Tong also agreed to this solution, as it would address a concern about
    hacking into the HSA‟s CE device. Soon, Childs disabled the password recovery feature
    on all CE devices citywide, and there were no backup configurations on any of the city‟s
    CE devices. As the password recovery feature could not be disabled on core PE devices,
    Childs erased their configurations that had been stored on NVRAM.
          By the end of 2007, the city was planning how to connect the city‟s law
    enforcement functions on FiberWAN. The combined system would allow users access to
    state and federal databases. For security reasons, all DTIS employees had to pass a
    criminal background check in order to have access to the law enforcement system.
    Childs had adult felony convictions that he had not revealed when he applied to work for
    the city.8 When asked to submit to a voluntary background check, Childs balked.
    Instead, he made a temporary arrangement with Tong and law enforcement officials to
    have Ybanez—who had passed his background check—escort him when Childs was
    
    
    
    
          8
             In February 2005, a San Francisco County sheriff told Childs that he needed to
    undergo a criminal background check. Childs offered both his California and Kansas
    driver‟s licenses to the sheriff, prompting an out-of-state inquiry. The sheriff discussed
    his findings about Childs‟s criminal history with his supervisor, who agreed that Childs
    could work on the project. Months later, the sheriff acknowledged to Childs that he knew
    of this criminal history when he praised the network engineer for “turning his life
    around.”
                                                7
    required to work on the law enforcement network. This procedure continued to be used
    through July 9, 2008.
           In February 2008,9 Ybanez was assigned to work on a police department network
    project that required him to have FiberWAN administrative access. Tong instructed
    Childs to give Ybanez administrative access to FiberWAN; Childs refused. When
    Ybanez asked what to do if FiberWAN went down and he was asked to support it, Childs
    responded that Ybanez was to call him.
           Childs also told Ybanez that FiberWAN‟s password recovery feature was set up so
    that if Tong or other managers—whom he deemed to be unauthorized users—tried to
    reboot the system, it would erase the configurations, which were stored only in VRAM.
    Ybanez thought this was crazy; if there was a power failure, FiberWAN would cease to
    function, resulting in significant downtime. For his part, Tong knew that Childs had
    sought to run some configurations on VRAM. He instructed Childs not to do so because
    of the risk that the network would lose its configurations and because the practice
    inhibited password recovery. Tong did not know that Childs had placed all FiberWAN
    configurations in VRAM.
           Tong instructed Childs to give him the FiberWAN passwords; again, Childs
    refused, fearing that Tong would pass it along to his manager. He opined that he was the
    only person capable of administering the network. He also cited another reason for his
    “refusal”: because he had copyrighted the city-owned FiberWAN configurations as his
    own intellectual property.
           By this time, Tong had a different view of the wisdom of Childs‟s sole access to
    the FiberWAN network. Initial implementation of FiberWAN to city departments was
    nearing completion, while Childs was becoming more uncooperative and unpredictable.
    At Tong‟s request, Cisco was asked for technical support about obtaining administrative
    access to FiberWAN.
    
    
    
    
           9
               All dates refer to the 2008 calendar year unless otherwise indicated.
                                                   8
           Tong also notified Robinson that a decision had to be made about their principal
    engineer. By then, Robinson knew that Childs had not passed his background check. He
    sought out more information about the engineer‟s criminal history. Reviewing the
    reports that Childs gave during the hiring process, Robinson saw the discrepancy between
    his initial job application reflecting no prior convictions and his time-of-hiring forms in
    which he admitted that he had once been convicted as an adult. Tong believed that
    Childs had suffered a juvenile conviction, but Robinson learned that Childs had been
    convicted of a criminal offense as an adult. The adult conviction and the perjured filing
    of personnel records were both grounds for dismissal.
           Meanwhile, in March 2008, a fire at the Department of Public Works resulted in a
    power loss at secondary DTIS sites. Both core routers went down, but traffic was taken
    up by other core routers. In the past, Childs had asked DTIS to purchase terminal servers
    for both secondary DTIS sites. Those requests were denied on the ground that these
    additional devices were unnecessary and insecure. After the fire, Childs installed his own
    terminal servers at these locations. He also connected modems and telephone lines to
    these servers. Together, these links allowed him to have “out-of-band” management of
    those core devices, so that remotely, he could restore the configurations from another
    location—even from his home. This connection also allowed him to enter the FiberWAN
    system undetected. The terminal servers were password-protected; only Childs knew
    those passwords. In the One Market Plaza main data center, Childs often worked in a
    locked laboratory. No one else worked in the laboratory unless he was present.
           By March, Childs had intentionally configured the core FiberWAN devices so that
    if a power outage occurred, the configurations stored in VRAM would be lost and these
    core devices would be offline until he physically uploaded a backup configuration. If the
    configurations had been stored to NVRAM instead, they would have automatically
    reloaded onto the devices shortly after power was restored. The same result would occur
    if someone attempted a password recovery or if an unauthorized user attempted to enter
    the system.
    
    
                                                  9
           By May, DTIS employees had been notified about the possibility of layoffs.
    Childs was unconcerned. “They can‟t screw with me,” he told a coworker. “I have the
    keys to the kingdom.”10
    D. Workplace Violence Concerns Arise
           In June, concerns about Childs‟s conduct came to a head. DTIS was moving its
    One Market Plaza data center to a new location. Its new security manager—Jeana
    Pieralde—sought to inventory FiberWAN‟s devices at the data center in preparation for
    the move. This inventory required a computer scan of the network in order to generate a
    report of what devices were on the network and their configurations. If a computer was
    turned off, she had to turn it on in order to complete the scan. In the late afternoon on
    Friday, June 20, Pieralde came to the data center to conduct the inventory, having
    obtained keys to enter any locked areas.
           Childs had not been notified of Pieralde‟s plan to conduct this inventory. He was
    very upset by her presence, ranting at her in an agitated manner. He confronted her,
    taking photographs of her with his cell phone. Concerned by his aggressive response,
    Pieralde locked herself inside an office and called Robinson to report this incident. At
    least one DTIS staffer left the site, fearing the potential for violence.
           Childs called Tong to complain about Pieralde. When Tong did not share his
    concern, Childs said angrily “This means war and I am ready.” Later, Tong reported this
    statement to police. Childs also called the city‟s chief information officer to complain.
           In response to Pieralde‟s complaint, Robinson made his own call to Childs. He
    told him to stop interfering with her work. Childs challenged Robinson‟s authority to
    conduct an inventory, accusing him of creating a hostile work environment. Angrily, he
    said: “ „I know what you are up to. I am ready for you.‟ ” In a loud and combative tone,
    he threatened to come to Robinson‟s office. Robinson ordered Childs to leave the data
    center and said that he would revisit the issue on Monday.
    
    
           10
             Childs admitted saying this, but said that this was a joking reference to his
    superior skill level.
                                                  10
           This incident left DTIS management concerned about Childs‟s potential for
    workplace violence. In the next few weeks, the issue was discussed at several meetings.
    Robinson talked about this with his supervisor, with representatives of the city‟s Human
    Resources (HR) Department, and the city attorney‟s office and—because of his employee
    safety concerns—with police.11
           At this point, Robinson learned that Childs was the only person with
    administrative access to FiberWAN. He consulted Cisco officials about ways to allow
    the city to recover control of the network.
           Meanwhile, an HR representative sought to meet with Childs about this matter.
    He did not respond to her requests until July 3, when he indicated that his issues had been
    resolved. On July 7, the HR representative replied that concerns raised by other
    employees still needed to be addressed.
           In early July, it was decided that Childs was to be reassigned. At July 7 and July 8
    meetings, representatives of DTIS, HR, the city attorney‟s office, and the police
    department discussed about how best to obtain administrative access from Childs. A
    union representative was advised of a planned July 9 meeting at which Childs would be
    informed of the reassignment. The representative was advised that the meeting would not
    be a disciplinary matter, but that it could become one if Childs refused to disclose the
    user ID and password. The union representative declined to participate in the planned
    July 9 meeting, concluding that DTIS had a right to know this information.
    E. Reassignment
           On July 9, Childs and Ybanez went to the Hall of Justice‟s data center to connect
    the police department‟s computer system to FiberWAN. Childs used the city laptop he
    removed from his backpack to do some of this work. A coworker called him on his cell
    telephone to tell him that he would be reassigned and removed as the FiberWAN network
    engineer. Soon, the police department‟s acting chief information officer escorted him to
    another room for a meeting. Childs brought the laptop and his backpack with him.
    
    
           11
                Pieralde had also filed a police report about the incident.
                                                    11
           Robinson and an HR representative were waiting for Childs. A speaker phone12
    was connected to the DTIS data center, where Tong, DTIS workers and Cisco personnel
    listened in. They could test whether the passwords Childs might provide would allow
    DTIS to obtain administrative access to the system.
           Robinson told Childs that he was being reassigned. He asked Childs for user IDs
    and passwords to FiberWAN‟s core devices. At first, Childs said that he no longer had
    administrative access to FiberWAN; Robinson knew this was untrue.13 Later, Childs
    knowingly provided incorrect passwords that did not allow access to FiberWAN. He also
    told Robinson that DTIS management was not qualified to have the FiberWAN user IDs
    and passwords.14 When asked for backup configurations, Childs said that there were
    none.15 Robinson ordered Childs to reveal them, to no avail.
           After 40 to 60 minutes, San Francisco Police Inspector James Ramsey joined the
    meeting. He advised Childs that his failure to cooperate could be a violation of Penal
    Code section 502.16 Childs made no response to this statement. Ramsey pleaded with
    him for cooperation, but he was not able to obtain the desired information from Childs,
    either.17
    
    
           12
             Three experts testified that it was unwise to give an administrative password and
    user ID over a speaker phone.
           13
                Childs later admitted that he had changed the password on the morning of the
    meeting.
           14
             A defense expert testified that it was not a best practice to give management
    access to network devices. Generally, management does not require administrative
    access to its computer network.
           15
                At trial, Childs admitted that this was untrue.
           16
             Ramsey did not advise Childs of his Miranda rights at any time during this
    July 9 meeting.
           17
              At one point during this meeting, Childs asked for an ambulance, saying that he
    did not feel well. He later testified that he experienced chest pains, but witnesses testified
    that his demeanor did not change noticeably before he made this request. He was offered
    an ambulance but later declined that offer. He admitted that he never consulted a doctor
    after these pains arose.
    
                                                    12
           It became apparent to Robinson that Childs would not provide FiberWAN access.
    Childs was placed on administrative leave for failure to do so. Robinson accepted
    Childs‟s city identification, keys, pager, and cell telephone, but the engineer did not offer
    the city-owned laptop that was inside his backpack. Childs left the meeting with
    Ramsey.18 After receiving a receipt for the city property he relinquished, Childs left the
    building.
           Childs later admitted that when he was at the meeting, he had the FiberWAN
    access codes and a backup of its configurations on a DVD in his city-owned laptop inside
    his backpack.19 With this DVD—which was itself password-protected and encrypted—
    and his laptop, Childs could have remotely connected with the network if he had Internet
    access.
    F. July 9-July 21 Events
           Back at the data center, DTIS staff searched Childs‟s workspace and locked
    laboratory looking for FiberWAN configurations. In his laboratory, they were surprised
    to find two filing cabinets, each secured by a cabinet lock and two padlocks. Each
    cabinet had a hole manually cut out of the side, through which cables had been fed
    leading to a computer device. These active devices could permit someone without
    physical access to the data center to access the FiberWAN network. The possibility that
    Childs might have undetected remote access to FiberWAN heightened security concerns
    and led to a more intensive response than merely recovering administrative access.20 The
    devices were physically disconnected from the network but were left running. By
    July 11, new devices monitored any unauthorized FiberWAN intrusions.
    
    
    
    
           18
               About this time, Ramsey also gave Childs a written copy of section 502. He
    testified that he recalled making specific mention of violating subdivision (c)(5).
           19
                Childs testified that he always had these backup configurations with him.
           20
           On July 10, Childs contacted police to say that he would not attempt to access
    FiberWAN.
    
                                                  13
           DTIS had no administrative access to the FiberWAN network. Outside
    consultants and DTIS employees began intensive efforts to recover control of the
    FiberWAN network. No configurations could be found.
           Meanwhile, on July 10, Childs received a letter advising him that he had been
    placed on paid administrative leave until an administrative hearing planned for July 14
    would be conducted. If it was determined that he had refused to give DTIS management
    access to FiberWAN, his administrative leave would then be unpaid.21 He contacted HR
    and arranged to have the review hearing postponed to July 18. Childs also asked police
    for return of his terminal servers located at the two secondary DTIS sites.
           Childs drove to Nevada, taking his city-owned laptop and the backup
    configurations with him. Needing money and an attorney to assist him at the July 18
    administrative review hearing, he withdrew almost $10,000 from his bank account on
    July 11 and 12. This left less than $200 in his account. On his return to his Pittsburg
    home on the night of July 12, he was arrested. He had more than $10,000 on his person
    at that time. This money was seized. Questioned after his arrest, Childs invoked his
    privilege against self-incrimination.
           At first, DTIS efforts focused on obtaining FiberWAN access without interrupting
    city computer service. Once DTIS‟s lack of administrative access to its computer
    network became publicly known, pressure increased to restore that access. By July 17, it
    became clear that non-disruptive efforts would not soon succeed and efforts to recover
    access became more aggressive, even at the risk of disrupting ongoing computer service
    to city departments.
           Before his suspension, Childs knew that a July 19 power outage was scheduled at
    the data center, to allow maintenance work to be done on the building‟s main power
    supply. Technicians realized that losing network power before first regaining
    administrative control of FiberWAN risked the loss of the configurations, which could
    severely disrupt city computer services. DTIS postponed the planned power outage.
    
    
           21
                Ultimately, Childs would be suspended without pay.
                                                14
           On July 21, Childs—through his attorney—gave the correct FiberWAN passwords
    and backup configurations to then-Mayor Gavin Newsom.22 After an initial attempt at
    access failed, Childs provided additional information that allowed DTIS to regain
    administrative access to FiberWAN through a specific device.
           During the period from July 9 through July 21, DTIS was effectively locked out of
    the FiberWAN network. Neither DTIS employees nor other computer experts were able
    to obtain administrative access to the network until Childs revealed the access codes.
    There were no network service outages, but in the next two weeks, neither DTIS
    employees nor computer experts hired by the City were able to access the network in
    order to administer it. They could not diagnose problems, maintain the network, review
    or change its configurations, or update it to serve the more than 65 city departments then
    on the network. In addition to postponing the power outage, plans to add two city
    departments to the network in mid-July had to be postponed. The city was unable to add
    new city departments to FiberWAN, nor could it remove Childs as system administrator
    and appoint a new one.
           Within days of the city‟s recovery of administrative access to FiberWAN, the
    network became a team project. By the time of trial, a new principal engineer and other
    network engineers had administrative access to FiberWAN. A backup copy of the
    configurations was again stored on a server that could be accessed by several DTIS
    engineers. Network recovery work continued through late November. The city paid
    outside consultants $646,000 for evaluation of FiberWAN. DTIS staff time spent to
    regain access to FiberWAN was worth $220,000. An expert testified that if
    administrative access had not been recovered, rebuilding the FiberWAN configurations
    would have cost the city $300,000.
    G. Charges and Pretrial Matters
           In mid-July, Childs was charged with one count of disrupting and denying the use
    of the city's computer network. He was also charged with three counts of illegally
    
           22
             Childs testified that because the access issue had become public knowledge, he
    wanted to provide FiberWAN access in a manner that could be proven.
                                                15
    providing access to the network through the modems. The complaint alleged an
    enhancement based on the loss of property worth more than $200,000. (§§ 502,
    subd. (c)(5)-(6), 12022.6, subd. (a)(2).) He was held on $5 million bail. Childs pled not
    guilty and was held to answer on all charges after a preliminary hearing. His motion to
    suppress evidence of his July 9 statements was denied in December.
           In January 2009, an information was filed charging Childs with the same four
    offenses and the one enhancement. (§§ 502, subd. (c)(5)-(6), 12022.6, subd. (a)(2).)23
    Later that month, Childs demurred to the three modem counts and renewed his motion to
    suppress evidence obtained as a result of his July 9 statement, without success.
           Childs also moved to set aside the information on the ground, inter alia, that there
    was insufficient evidence to support the charges. (§ 995.) The prosecution opposed the
    motion. In August 2009, after hearing, the trial court dismissed the three modem
    counts.24
    H. Trial and Sentencing
           1. Prosecution Case
           Childs was tried on the remaining charge of disrupting or denying computer
    services to an authorized user. The prosecution‟s theory of the case was that Childs acted
    as if he—not the city—owned the FiberWAN network and that he believed that his sole
    
    
           23
              Sections 502 and 12022.6 have been amended since July 2008. (See former
    §§ 502, subds. (c)(5), (6), (h)(1) [Stats. 2000, ch. 635, § 2, pp. 4147-4149]; 12022.6,
    subd. (a)(2) [Stats. 2007, ch. 420, § 1, p.3675].) As the current versions of these
    subdivisions are identical to those in effect on the date of the offense, we do not make
    repeated references to the 2008 versions of the statutes that we apply. (See §§ 502,
    subd. (c)(5), (6), (h)(1) [Stats. 2011, ch. 15, § 378]; 12022.6, subd. (a)(2) [Stats. 2010,
    ch. 711, § 5].)
           24
              Each side challenged aspects of this ruling by writ petition. We denied both
    petitions in October 2009. The People also appealed this order, but after Childs was
    convicted of the remaining charge, the appeal was abandoned and we dismissed it on the
    People‟s request. At Childs‟s request, we took judicial notice of the record in this earlier
    appeal in 2011, without making an initial determination of relevance. As this record
    contains crucial documents that we did not find in our record on appeal, we now find the
    prior record to be relevant to our determination of the issues in the current appeal.
                                                  16
    access to the computer system gave him job security. It put on evidence that by
    preventing anyone else from having administrative access to the FiberWAN network,
    Childs sought to keep from being laid off or from having his work outsourced. He knew
    he could not pass a criminal background check that threatened to force his removal from
    the FiberWAN work. He also developed means to have undetected access to the
    network.
           Much of the six-month trial was devoted to understanding the technical
    capabilities of the FiberWAN network and the manner in which Childs modified them.
    The prosecution put on evidence that by failing to reveal his administrative password,
    Childs deprived the city of part of its network. By locking the city out of the FiberWAN
    network, he disrupted the city‟s computer services. Besides the evidence of sole
    administrative control and running the FiberWAN configurations on non-stored VRAM,
    the jury heard other evidence of Childs‟s conduct:
           Disabling Console Ports. The jury learned that if the console port—the physical
    means of access to the network on the device itself—is disabled, then the administrator
    cannot login to the system using what is regarded as the “port of last resort.” On July 8—
    the day before he was placed on administrative leave—Childs disabled the console ports
    on all five core devices, preventing the possibility of any password recovery.
           Applying Access Controls. Childs also applied access controls to core devices that
    required that all administrative access had to be achieved by means of one particular
    computer, even if the access codes were known. He set up these access controls on core
    devices on the morning of July 9.25 After regaining control of FiberWAN on July 21,
    DTIS learned that all CE devices also had these access controls applied to them. All
    FiberWAN core devices had been set up to inform the network administrator if anyone
    other than Childs tried to logon to one of them and from what specific location the
    attempt was being made. According to a prosecution expert, that information could allow
    the administrator to deny DTIS access to the network merely by changing the password.
    
           25
             Childs testified that he did this because he knew he would be working at the
    Hall of Justice that day and wanted FiberWAN access while he was there.
                                                17
           Filing Copyright Documents. In July 2007, Childs applied to copyright a slightly
    sanitized version of city‟s FiberWAN design and configurations as his own intellectual
    property. In January 2008, he filed an updated submission. He did so despite having
    acknowledged that these configurations were the city‟s intellectual property and were
    protected from disclosure by federal Homeland Security considerations. The design and
    configurations that Childs provided with his application showed the physical locations of
    some network devices that were not publicly known. That information was deposited
    with the Library of Congress where it was available for public inspection.26 The
    publication of this confidential information made the FiberWAN network more
    vulnerable to intrusion.
           The jury heard expert testimony that DTIS had no administrative access to
    FiberWAN if the sole person with administrative access refused to give network
    management access to network devices, the configurations were not on the device,
    backup configurations were unavailable, the console port has been password-protected
    and the devices were run on VRAM. If power to the system was lost, the configurations
    would be wiped out and would need to be completely rebuilt, denying access to the
    computer system for a significant time. In the view of prosecution witnesses, Childs‟s
    refusal to reveal the access codes caused a denial of services because DTIS was unable to
    add new city departments to FiberWAN.
           Childs made himself to be a single point of failure for the FiberWAN network,
    creating the possibility that the network could collapse without him in a system that was
    intended to have backups and redundancy to prevent disruption of the network.
    Prosecution witnesses told the jury that it was in the city‟s best interest to have more than
    one person with administrative access to FiberWAN in case one person was unavailable.
    DTIS‟s inability to access its network meant that something within FiberWAN was
    “radically wrong,” posing a very difficult problem to resolve. It was also unusual—less
    than 1/10th of 1 percent of all Cisco networks worldwide required the kind of
    
           26
             Childs testified that he was unaware that the documents would be available to
    the public.
                                                 18
    intervention that FiberWAN did. At the close of the prosecution‟s case-in-chief, Childs‟s
    moved for acquittal without success. (§ 1118.1.)
           2. Defense
           Childs testified in his own defense. He admitted much of the conduct that formed
    the basis of the prosecution. He admitted that he had exclusive administrative access to
    the FiberWAN network, that he lied to his managers when he said that he did not, and
    that he sought to copyright its configurations. On July 9, the network was encrypted with
    a password that only he knew. He had control of the backup configurations, which were
    not available to DTIS and which had been encrypted. He had disabled the password
    recovery feature on the CE devices and had disabled the console ports on all devices. He
    admitted that he ran FiberWAN core devices on VRAM. If an engineer attempted a
    password recovery of a core device, he knew that the device would shut down, and when
    it was rebooted, it would be blank.
           Childs testified that he acted as he did to protect the security of the FiberWAN
    network. He believed that DTIS management was too lax about network security.
           The prosecution put on evidence to undermine this defense. It noted the risk to the
    city from his copyright application, which Childs admitted filing. He had failed to cite
    network security reasons for his decisions at the time that he made them. He did not
    mention security concerns on July 9 when he refused to reveal the FiberWAN password
    and user ID. Instead, he refused to give Robinson FiberWAN access because he did not
    believe that Robinson was authorized to have administrative access to the network.
           3. Argument and Verdict
           The prosecution reasoned that Childs‟s conduct had damaged the city in several
    ways. He made the network vulnerable to intrusion; he precluded DTIS from
    maintaining, troubleshooting or adding new city departments onto the network; and he
    required the city to spend large sums of money to regain administrative access to its
    network.
    
    
    
    
                                                19
           For his part, Childs urged the jury to conclude that his dispute with the city was an
    employment matter, not a criminal act. He claimed that he acted within the scope of his
    employment, a defense to the charge. (See § 502, subd. (h)(1).)
           He also argued that he did not knowingly disrupt or deny computer services to an
    authorized user because other DTIS officials such as Robinson lacked the skills needed to
    implement the FiberWAN network. Childs argued that after he was reassigned, no one at
    DTIS was a qualified user. The city brought the problem on itself by threatening him
    after the June 20 incident, by ambushing him at the July 9 meeting, and by failing to
    respect his professional stature. Childs claimed that his conduct was reasonably
    necessary to protect the FiberWAN network from unauthorized intrusion because no one
    else at DTIS was competent to administer it.
           Childs also disputed having denied computer services to the city because
    FiberWAN continued to operate during the July 9-21 period. He reasoned that no harm
    was done. He did not believe that he denied or disrupted computer services; if he was
    mistaken, he argued that his reasonable mistake negated the required criminal intent to
    find him guilty of violating subdivision (c)(5) of section 502.
           The jury found Childs guilty of the charge and found the enhancement allegation
    to be true. (§§ 502, subd. (c)(5), 12022.6, subd. (a)(2).) His motion for arrest of
    judgment was denied, as was his motion for new trial.
           In August 2010, Childs was sentenced to four years in state prison—a midterm of
    two years for the offense and a two-year consecutive enhancement term for excessive
    taking. Based on his prior convictions, the trial court rejected his claim for additional
    presentence conduct credit.27 The issue of restitution was reserved.
    
    
    
    
           27
             Childs challenged this presentence credit determination in his opening brief,
    but—as he has already completed his prison term and his rights are no longer affected—
    he concedes that the issue is moot. (See DeFunis v. Odegaard (1974) 416 U.S. 312, 316;
    Keefer v. Keefer (1939) 31 Cal.App.2d 335, 337; see also 9 Witkin, Cal. Procedure
    (2008) Appeal, § 326, p. 375.)
    
                                                 20
           In May 2011, Childs was ordered to pay $1,485,791 in restitution to DTIS.28 His
    motion for return of $10,74429 seized from him at the time of his arrest was denied and
    that sum was applied toward the amount of restitution owed.30
                                           II. HACKING
    A. Employment Dispute
           Several challenges that Childs raises to his conviction turn on a single argument:
    that subdivision (c)(5) of section 502 was meant to apply only to unauthorized computer
    users—hackers—and not to an employee who was authorized to use the computer system
    but did so in a manner that vexed the employer. (See pts. III.A.2, III.C.1.b.i, III.C.2,
    III.E., IV.B, post.) He asserts that his acts fell within the scope of employment defense
    set out in subdivision (h)(1) as a matter of law. As this underlying issue is pivotal to so
    many interrelated question, we address it first.
           When analyzing statutory language, we are charged to examine the language itself,
    the legislative history of the provision and case law construing the crucial language, in
    that order. (People v. Heitzman (1994) 9 Cal.4th 189, 200; see In re Noreen G. (2010)
    181 Cal.App.4th 1359, 1375.) We conduct those inquiries below.
    B. Evolution of Offense
           Childs reasons that the charged offense is inapplicable to him as a matter of law
    because no employee has yet been convicted for refusing to reveal a computer user name
    and password to an employer on demand. The correct inquiry is not whether an
    employee has ever been convicted of the charged offense on the basis of similar conduct
    in the past, but whether the legislature intended to hold criminally liable one who acted as
    Childs did.
    
           28
                The City Attorney‟s separate request for $32,933.71 in restitution was denied.
           29
              The record suggests some confusion about whether this amount was $10,744 or
    $10,774. We assume that $10,744—the amount ordered to be credited against Childs‟s
    restitution order—is correct.
           30
             In this consolidated appeal, we have considered the records in both of these
    pending appeals. Thus, we need not also take judicial notice of the record on appeal from
    his conviction in the appeal of the restitution order, as Childs requested.
                                                  21
           To determine the legislative intent, we first review the evolution of section 502.
    There have been many revisions to state law banning computer crimes since a
    predecessor statute was first enacted in 1979.31 That provision made two types of
    computer use criminal—accessing a computer system to commit fraud or theft; and
    accessing, altering, deleting, damaging or destroying a computer system. (See Stats.
    1979, ch. 858, § 1, pp. 2968-2969 [adding prior version of § 502].) In 1985, the prior
    version of section 502 added a third computer offense—unauthorized accessing of a
    computer—and amended another offense to ban the malicious destruction or disruption
    of a computer system. (See Stats. 1985, ch. 571, § 1, pp. 2076-2077.) In all of these
    early versions of computer crimes, accessing the computer system was a key element of
    the offense.
           In 1987, when the prior statute was repealed and a new version of section 502 was
    added, the law set out seven distinct computer offenses. One made the knowing and
    unpermitted disruption or denial of computer services a public offense—the same offense
    with which Childs was later charged. (See Stats. 1987, ch. 1499, §§ 2-3, pp. 5782-5786.)
    Two more offenses—introducing a contaminant into a computer system and using
    another‟s Internet domain name to send damaging email messages—were added in 1989
    and 1998, which brings the total of computer crimes to nine. (See Stats. 1998, ch. 863,
    § 3, pp. 5484-5488; Stats. 1989, ch. 1357, §§ 1.3, pp. 5736-5740.) In 2008 at the time of
    the offense charged against Childs, some of the nine computer offenses specifically
    required unpermitted access as an element. (See § 502, subd. (c)(5); compare § 502,
    subds. (c)(1)-(2), (4), (7) [access]; see also § 502, subds. (c)(3) [use], (6) [providing
    access].) Some did not—the charge against Childs among them. (See § 502, subds.
    (c)(5) [disruption], (8), [contamination], (9) [sending false email].)
    
    
    
    
           31
              Section 502 has been enacted, amended, repealed, added anew, and amended
    again—both before and since the date of the 2008 charged crime. For convenience, we
    refer to the predecessor statute as “prior section 502,” and the statute in effect at the time
    of the offense as “new section 502.”
                                                  22
             In 1987, section 502 explained the purpose of the statute. By its express terms, the
    Legislature intended “to expand the degree of protection afforded to individuals,
    businesses, and governmental agencies from tampering, interference, damage, and
    unauthorized access to lawfully created computer data and computer systems. [The]
    proliferation of computer technology has resulted in a concomitant proliferation of
    computer crime and other forms of unauthorized access to computers, computer systems,
    and computer data. [¶] [The] protection of the integrity of all types and forms of lawfully
    created computers, computer systems, and computer data is vital to the protection of the
    privacy of individuals as well as to the well-being of financial institutions, business
    concerns, governmental agencies, and others within this state that lawfully utilize those
    computers, computer systems, and data.” This statement of legislative intent was
    unchanged in 2008, when Childs allegedly violated subdivision (c)(5). (§ 502, subd. (a)
    [Stats. 2000, ch. 635, § 2, pp. 4144-4145]; see Stats. 1987, ch. 1499, §§ 2-3, pp. 5782-
    5783.)
    C. Evolution of Defense
             The prior statute enacted in 1979 was silent on the applicability of the computer
    crimes statute in an employment context. (See Stats. 1979, ch. 858, § 1, pp. 2968-2969.)
    By 1985, one of the three computer offenses then codified—unauthorized computer
    access—specifically provided that it did not apply to one who accessed an employer‟s
    computer within the scope of employment. (See prior § 502, subd. (d) [Stats. 1985,
    ch. 571, § 1, pp. 2076-2077].) The 1987 enactment of the new statute set out an
    employment defense applicable to all section 502 offenses if an employee acted within
    the scope of his or her lawful employment.32 (See § 502, subd. (i)(1) [Stats. 1987,
    ch. 1499, §§ 2-3, pp. 5782-5786]; now § 502, subd. (h)(1).) In 1999, the Legislature first
    defined the scope of employment defense. “For purposes of this section, a person acts
    within the scope of his or her employment when he or she performs acts which are
    
             32
             The statute also provided a defense for employees acting outside the scope of
    employment, but that defense is not at issue in the case before us. (See § 502,
    subd. (h)(2).)
                                                  23
    reasonably necessary to the performance of his or her work assignment.” (See § 502,
    subd. (h)(1) [amended Stats. 1999, ch. 254, § 3, p. 2292].) The same statutory language
    was in effect in 2008, when Childs was charged with the current offense. (See § 502,
    subd. (h)(1) [Stats. 2000, ch. 635, § 2, pp. 4144-4150].)
    D. Statutory Construction
           1. Subdivision (c)(5) Offense
           Childs contends that the language of subdivision (c)(5) must be read in light of the
    legislative purpose set out in subdivision (a) stating that the law was intended to protect
    against unauthorized access to computer systems. He reasons that subdivision (c)(5)—
    which contains no express requirement of access—must be read to imply one in order to
    be consistent with the legislative intent behind section 502.
           This claim of error requires us to apply basic rules of statutory construction. The
    interpretation of a statute and its applicability pose questions of law for us to determine
    on appeal. (People v. Cole (2006) 38 Cal.4th 964, 988; Estate of Madison (1945) 26
    Cal.2d 453, 456.) The overriding goal of statutory construction is to ascertain the
    legislative intent behind the statute, in order to give effect to that intent. (People v. Mejia
    (2012) 211 Cal.App.4th 586, 611.) In this analysis, the text of the statute is the best
    indicator of legislative intent. (Tonya M. v. Superior Court (2007) 42 Cal.4th 836, 844;
    People v. Johnson (2006) 38 Cal.4th 717, 723-724.) When interpreting statutes, we begin
    with the plain, commonsense meaning of the language that the Legislature used. If that
    language is unambiguous, then the plain meaning of the statute controls. (People v.
    Mejia, supra, 211 Cal.App.4th at p. 611; Surfrider Foundation v. California Regional
    Water Quality Control Bd. (2012) 211 Cal.App.4th 557, 575.)
           On its face, subdivision (c)(5) is unambiguous. (See, e.g., People v. Albillar
    (2010) 51 Cal.4th 47, 55.) Its plain meaning seems to be that Childs—who was given
    authorized access to the FiberWAN network—may be convicted under its terms.
    However, he contends that subdivision (c)(5) contains a latent ambiguity when read
    together with the “unauthorized access” language in subdivision (a) in the statement of
    legislative purpose behind section 502. A latent ambiguity exists when a literal
    
                                                  24
    interpretation of a statute would frustrate the purpose of the statute. (Varshock v.
    Department of Forestry & Fire Protection (2011) 194 Cal.App.4th 635, 644.) When
    faced with a latent ambiguity, we must determine which interpretation of the statute is
    most consistent with the legislative intent. We infer that the Legislature intended an
    interpretation producing practical, workable results, not one producing mischief or
    absurdity. (Gattuso v. Harte-Hanks Shoppers, Inc. (2007) 42 Cal.4th 554, 567.)
           For many reasons, we reject Childs‟s claim that the Legislature intended that
    unauthorized access is an implied element of subdivision (c)(5). We find his focus on the
    “unauthorized access” language of subdivision (a) to be too narrow. When determining
    legislative intent, our analysis does not turn on a single word or phrase. We must
    construe the language in the context of the statute as a whole, giving meaning to every
    part of it. (Tonya M. v. Superior Court, supra, 42 Cal.4th at p. 844; People v. Zeigler
    (2012) 211 Cal.App.4th 638, 650.) Subdivision (a) sets out a series of evils deserving of
    protection, of which unauthorized computer access is one. The Legislature expressly
    stated its intent to protect against “tampering, interference, damage, and unauthorized
    access” to computers. (§ 502, subd. (a).) Disrupting or denying computer services to an
    authorized user could reasonably be read to fall within “interference” with computers,
    even without a showing of unauthorized access.
           Childs‟s related argument—that the reference in subdivision (a) to the need to
    combat “computer crime and other forms of unauthorized access” to computers requires
    us to read an unauthorized access element into all subdivision (c) offenses—is somewhat
    more plausible. However, as we shall explain, other principles of statutory construction
    lead us to reject this argument, too.
           Significantly, Childs‟s interpretation of section 502 fails to acknowledge
    differences among the wording of subdivision (c) offenses. Four of the section 502,
    subdivision (c) offenses include access as an element. (See § 502, subds. (c)(1)-(2), (4),
    (7).) The provision under which Childs was charged does not. (See § 502, subd. (c)(5).)
    When different words are used in adjoining subdivisions of a statute that were enacted at
    the same time, that fact raises a compelling inference that a different meaning was
    
                                                 25
    intended. (People v. Albillar, supra, 51 Cal.4th at p. 56; Metropolitan Water Dist. v.
    Superior Court (2004) 32 Cal.4th 491, 502; Yao v. Superior Court (2002) 104
    Cal.App.4th 327, 333.) The Legislature‟s requirement of unpermitted access in some
    section 502 offenses and its failure to require that element in other parts of the same
    statute raise a strong inference that the subdivisions that do not require unpermitted
    access were intended to apply to persons who gain lawful access to a computer but then
    abuse that access. (See Arden Carmichael, Inc. v. County of Sacramento (2001) 93
    Cal.App.4th 507, 516 [every word excluded from a statute is presumed to have been
    excluded for a reason].)
           2. Subdivision (h)(1) Defense
           We are also persuaded the Legislature did not intend to imply an access element
    into every subdivision (c) offense because the legislative history of the employment
    defense codified in subdivision (h)(1) is inconsistent with this reading of subdivision (c).
    The unlawful access of an external hacker is inherently inconsistent with the permitted
    access of an employee, making the scope of employment defense relevant to this issue.
    When statutory language is ambiguous, we may consult extrinsic aids such as legislative
    history to help us interpret the statute. (People v. Cole, supra, 38 Cal.4th at p. 975;
    People v. Mejia, supra, 211 Cal.App.4th at p. 611; see People v. Rodriguez (2002) 28
    Cal.4th 543, 549-550.)
           When the Legislature defined the “scope of employment” defense in 1999, this
    was intended to “[close] a loophole that allows disaffected employees to maliciously
    tamper with a company‟s database” and to discourage “a malicious employee‟s
    victimization of an employer.” (See Assem. Com. on Public Safety, Rep. on Assem. Bill
    451 (1999-2000 Reg. Sess.) Apr. 6, 1999, p. 6; Sen. Com. on Public Safety, Rep. on
    Assem. Bill 451 (1999-2000 Reg. Sess.) June 22, 1999, p. 9 [same].) These legislative
    sources make clear that one effect of the 1999 amendments to the employment defense
    now set out in subdivision (h)(1) was to broaden its application beyond external hacking
    and to encompass employee misconduct. Since the amendments took effect in 2000, the
    scope of employment defense no longer shield employees from prosecution for acts that
    
                                                 26
    were not reasonably necessary to the performance of the employee‟s work assignment.
    (See § 502, subd. (h)(1).) This conclusion is also supported by the legislature‟s 2000
    expansion of the definition of “injury” to a computer network to include the denial of
    access to a legitimate user. (§ 502, subd. (b)(8) [Stats. 2000, ch. 635, § 2, pp. 4144-
    4150].)
           3. Subdivision (e)(1) Remedies
           Childs also argues that the 2000 amendment of the scope of employment defense
    in subdivision (e)(1) supports his conclusion that section 502 was not intended to punish
    any employee. In fact, the legislative history supports a contrary view. At one time,
    subdivision (e) of section 502 required that a criminal conviction be obtained before a
    victim of computer crime could seek the civil remedy provided in that provision. In
    2000, the Legislature amended section 502 to allow a private civil action “regardless of
    whether a criminal conviction has been obtained.” (Sen. Rules Com., Off. of Sen. Floor
    Analyses, 3d reading analysis of Assem. Bill 2727 (1999-2000 Reg. Sess.) as amended
    August 25, 2000, p. 5.) If section 502 banned Childs‟s conduct, the statutory language is
    clear that the prosecution had lawful authority to charge him with a criminal offense,
    regardless of whether his actions could also constitute the insubordinate employee
    conduct.
           In a related argument, Childs reasons that his conduct was merely insubordinate
    and should have been resolved by civil means as an employment dispute, rather than by a
    criminal prosecution. (See § 502, subd. (e).) His reasoning is unpersuasive. It assumes
    wrongly that if a civil action is proper, insubordinate employee behavior can never be so
    grievous that it might also justify the filing of criminal charges. It also fails to appreciate
    the role of the separation of powers in this issue. The prosecution—as part of the
    executive branch of our government—ordinarily has sole discretion to conduct criminal
    cases, including determinations of whom to charge and what charges to file. (Manduley
    v. Superior Court (2002) 27 Cal.4th 537, 552; Dix v. Superior Court (1991) 53 Cal.3d
    442, 451; Gananian v. Wagstaffe (2011) 199 Cal.App.4th 1532, 1540.) A prosecutor‟s
    decision about filing criminal charges arises from complex law enforcement
    
                                                  27
    considerations that are not generally subject to judicial supervision. (Manduley v.
    Superior Court, supra, 27 Cal.4th at p. 552.)
           4. Conclusion
           These principles of statutory construction combine to convince us that the
    Legislature did not intend that subdivision (c)(5) could only be applied to external
    hackers who obtain unauthorized access to a computer system. It appears that
    subdivision (c)(5) may properly be applied to an employee who uses his or her authorized
    access to a computer system to disrupt or deny computer services to another lawful user.
    E. Analysis of Case Law
           Despite the statutory language, Childs asserts that case law lends support to his
    claim that subdivision (c)(5) was not intended to apply to an employee as a matter of law.
    Case law is significant to statutory construction because once a statute is construed by the
    courts, we presume that the Legislature is aware of that construction. If the Legislature
    does not alter that construction by subsequent legislation, we presume that it approved of
    the judicial construction. (People v. Hallner (1954) 43 Cal.2d 715, 719.) We have
    conducted a careful review of the cases that Childs cites, but none of them persuade us
    that subdivision (c)(5) may not lawfully be applied to an employee who misuses the grant
    of authorized access he was given to his employer‟s computer system. We conclude that
    each case is distinguishable from the situation before us in a significant manner.
           In Mahru v. Superior Court (1987) 191 Cal.App.3d 545, an employee—acting at
    the behest of his employer—took steps to ensure that a third party user of the employer‟s
    computer system could not use it any longer. The employee was charged with
    maliciously altering a computer system under a statutory predecessor to section 502.
    (See Stats. 1979, ch. 858, § 1, pp. 2968-2969 [adding prior version of § 502]; Stats. 1985,
    ch. 571, § 1, pp. 2076-2077 [subd. (c) as charged in Mahru], Stats. 1987, ch. 1499, §§ 2-
    3, pp. 5782-5786 [repealing prior version and adding current version of § 502].) The
    term “maliciously” is defined as a wish to vex, annoy or injure a third party. (§ 7,
    subd. 4.) The appellate court ruled that the predecessor statute did not apply, because the
    computer system allegedly altered was not owned by the third party, but by the employer.
    
                                                28
    (Mahru v. Superior Court, supra, 191 Cal.App.3d at pp. 548-549; see Facebook, Inc. v.
    Power Ventures, Inc. (N.D. Cal. July 20, 2010, No. C08-05780) 2010 WL 3291750,
    p. 8.)33 This case is clearly distinguishable from the one before us. Unlike Mahru,
    Childs acted against his employer‟s wishes in a manner affecting the employer‟s
    computer system.
           In dicta, the Mahru court went on to assert its view that the Legislature “could not
    have meant, by enacting section 502, to bring the Penal Code into the computer age by
    making annoying or spiteful acts criminal offenses whenever a computer is used to
    accomplish them. Individuals and organizations use computers for typing and other
    routine tasks in the course of their affairs, and sometimes in the course of these affairs
    they do vexing, annoying, and injurious things. Such acts cannot all be criminal.”
    (Mahru v. Superior Court, supra, 191 Cal.App.3d at p. 549; see Chrisman v. City of Los
    Angeles (2007) 155 Cal.App.4th 29, 36-37 [echoing this dicta] (Chrisman); People v.
    Gentry (1991) 234 Cal.App.3d 131, 141, fn. 8 [same].) Childs reasons that this language
    supports his conclusion that section 502 was not intended to apply to employees at all, as
    a matter of law.
           We accept the underlying logic of Mahru and the cases that cite it that the
    Legislature did not intend that all employee misuse of a computer is criminal. However,
    we do not apply this logic as broadly as Childs does. This dicta raises doubts about
    criminalizing routine computer misuse, but his case involves employee computer
    misconduct that is anything but routine. The cited principle cannot reasonably be read to
    decriminalize the acts of a system administrator who used his computer expertise to lock
    out every other potential user and to wipe out system data if anyone other than him
    attempted to access his employer‟s computer system.
           Childs also cites us to Chrisman, supra, 155 Cal.App.4th at pp. 33-39. In that
    case, a police officer was terminated from employment for using a police department
    
           33
              Since the Mahru decision, the Legislature amended section 502 to specifically
    provide that acts taken at an employer‟s request are not criminal. (See § 502, subd.
    (c)(1)-(9); compare with prior § 502, subd. (c) [Stats. 1985, ch. 571, § 1, pp. 2076-2077].)
                                                 29
    computer to obtain non-duty related information. The termination was based on a
    violation of a provision prohibiting unpermitted access to a computer system. (§ 502,
    subd. (c)(7).) The appellate court reversed, finding that the department had given the
    officer access to its computer. Subdivision (c)(7) applied only to those who hack into the
    computer system from without, not to an authorized user who misused that authority.
    (Chrisman, supra, 155 Cal.App.4th at pp. 34-35.) As subdivision (c)(5) does not contain
    an access requirement, the gravamen of Chrisman does not apply to Childs‟s case.
           In dicta, the Chrisman court added its reflections on the subdivision (h)(1) “scope
    of employment” defense. Relying on civil tort case law, it stated that “showing that an
    employee violated an employer‟s rules does not determine whether the employee acted
    within the scope of employment.” (Chrisman, supra, 155 Cal.App.4th at p. 36; citing
    Mary M. v. City of Los Angeles (1991) 54 Cal.3d 202, 209; Perez v. Van Groningen &
    Sons, Inc. (1986) 41 Cal.3d 962, 967-971.) Applying these tort principles, the Chrisman
    court concluded that “an employer‟s disapproval of an employee‟s conduct does not cast
    the conduct outside the scope of employment.” Otherwise, it reasoned, every employee
    misstep, mistake or misconduct would be criminal under section 502. (Chrisman, supra,
    155 Cal.App.4th at p. 37.) As the case before us is a criminal one in which tort allocation
    of the risks and cost of employment injuries is not relevant, the cited language loses some
    of its force. (See Mary M. v. City of Los Angeles, supra, 54 Cal.3d at p. 209; Perez v.
    Van Groningen & Sons, Inc., supra, 41 Cal.3d at pp. 967-971.)
           Even if we embrace the logic of the Chrisman dicta that an employer‟s
    disapproval of an employee‟s conduct is not definitive on the issue of whether the
    employee‟s conduct was within or outside the scope of employment, that would not
    compel us to find that no employee could ever be convicted of violating subdivision
    (c)(5) as a matter of law.34 The misuse of a employer‟s computer to make searches
    
    
    
           34
             At his request, the trial court in Childs instructed the jury on this language taken
    from Chrisman. Apparently, the jury found his conduct more egregious than mere
    misuse of an employee computer.
    
                                                 30
    without any work-related purpose is not remotely comparable to the computer lockout
    that Childs accomplished as system administrator of the FiberWAN network.
           Childs also calls our attention to People v. Lawton (1996) 48 Cal.App.4th Supp.
    11.) In that case, a criminal defendant convicted of unauthorized access35 reasoned that
    permission granted to use a library computer terminal—its hardware—necessarily
    conveyed permission to access its software—that is, its computer‟s operating system.
    The appellate division of the superior court affirmed. (Id. at pp. 14-15; see § 502,
    subd. (c)(7).) We fail to see how Lawton has any bearing on the scope of employment
    issue before us. This lack of relevance is even more acute, given the fact that the
    decision applies a version of the statute that predates the 1999 definition of the scope of
    employment defense in subdivision (h)(1). That language and its meaning is the crux of
    Childs‟s claim of error. (See pt. II.C., ante.)
           We also find People v. Gentry, supra, 234 Cal.App.3d 131 unpersuasive. Gentry
    gained access to confidential files of credit reporting companies and had entered false
    data to make it more likely that credit would be extended to those who would otherwise
    be refused. The appellate court affirmed his conviction of a computer crime,36
    concluding that this conduct was “exactly the kind of manipulation of computer data files
    the statute was designed to prohibit.” (People v. Gentry, supra, 234 Cal.App.3d at
    
    
    
    
           35
             Lawton was also charged with the offense Childs faced—disrupting computer
    services under subdivision (c)(5)—but his jury did not reach a verdict on this charge.
    (People v. Lawton, supra, 48 Cal.App.4th Supp. at p. 12.)
           36
              Gentry was convicted of an access crime under the prior version of section 502
    that has since been repealed and replaced. (People v. Gentry, supra, 234 Cal.App.3d at
    p. 40; see prior § 502, subd. (b) [Stats. 1985, ch. 571, § 1, pp. 2076-2077]; see also Stats.
    1987, ch. 1499, §§ 2-3, pp. 5782-5786.)
    
                                                  31
    pp. 135, 140-141.) Far from undermining Childs‟s conviction, this sentiment supports
    it.37
    F. Conclusion
            After careful consideration of the statutory language and the case law that Childs
    cites, we conclude that the Legislature intended for some parts of section 502,
    subdivision (c) to apply only to external hackers and for some parts—including
    subdivision (c)(5)—to apply to users who were given lawful access to the computers.
    Thus, we reject Childs‟s contention that an employee may not lawfully be convicted of
    violating subdivision (c)(5), in appropriate circumstances.
                                III. APPEAL OF CONVICTION
    A. Statutory Vagueness
            1. General Considerations
            Childs was convicted of violating subdivision (c)(5) of section 502—of knowingly
    and without permission causing the denial or disruption of computer services to an
    authorized user of a computer, computer system or computer network. In his first of two
    consolidated appeals, he challenges two aspects of this statute as unconstitutionally
    vague. If this claim succeeds, it would render the underlying statute invalid and would
    bar his conviction.
    
    
    
            37
              Childs also cites us to two out-of-state cases which are clearly distinguishable
    from his circumstances. Neither case construes the California law at issue in our case.
    (See Arizona v. Moran (1989) 162 Ariz. 524, 784 P.2d 730; State v. Olson (1987) 47
    Wash.App. 514; 735 P.2d 1362.) The Arizona case turns on the unique wording its
    statute banning computer damage, which required an act of commission. (Arizona v.
    Moran, supra, 784 P.2d at pp. 732-734.) By contrast, Childs was charged with disrupting
    or denying computer services—an offense that, by its terms, may be committed by
    omission. (See § 502, subd. (b)(8) [denial of access to legitimate users as injury], (c)(5)
    [disruption or denial of computer services as criminal offense].) In the Washington case,
    the defendant was charged with computer trespass, an offense that requires unauthorized
    access. (State v. Olson, supra, 735 P.2d at pp. 1363-1364 [Washington statute
    criminalizes entry into computer system].) Childs‟s offense does not require access as an
    element.
    
                                                 32
           Federal and state constitutional due process require a reasonable degree of
    certainty in statutory language defining a crime. To withstand a facial vagueness
    challenge, a penal statute must be definite enough that a reasonable person can
    understand what conduct is prohibited. Otherwise, vague laws may trap innocent persons
    by not providing fair notice of the punishable conduct. The statutory language must also
    provide definite objective guidelines to police, judges, and juries, in order to prevent
    arbitrary and discriminatory enforcement of the law. (People v. Heitzman, supra, 9
    Cal.4th at pp. 199-200; People v. Guiamelon (2012) 205 Cal.App.4th 383, 411-412;
    People v. Sullivan (2007) 151 Cal.App.4th 524, 543 [subjective standard]; People v.
    Hawkins (2002) 98 Cal.App.4th 1428, 1439; see U.S. Const., Amend. 14; Cal. Const., art.
    I, § 15; Grayned v. City of Rockford (1972) 408 U.S. 104, 114; see also 17 Cal.Jur.3d
    (2010) Criminal Law: Core Aspects, § 15, pp. 37-42; 58 Cal.Jur.3d (2012) Statutes, § 21,
    pp. 397-399.) Childs‟s vagueness contentions focus on whether he had fair notice of the
    prohibited conduct. (See Kolender v. Lawson (1983) 461 U.S. 352, 357-358.)
           When making this vagueness analysis, we begin with the strong presumption that
    the statute is constitutional. Any constitutional infirmity must be clear and unmistakable.
    A statute will not be found to be void for vagueness if a reasonable, practical construction
    can be given to the challenged language. (People v. Guiamelon, supra, 205 Cal.App.4th
    at p. 412; In re Noreen G., supra, 181 Cal.App.4th at p. 1374; People v. Sullivan, supra,
    151 Cal.App.4th at p. 543.) When viewing the statutory language as a whole, if the
    ordinary meaning of the statutory phrase communicates its meaning, then the statute is
    not constitutionally vague. (People v. Estrada (1995) 11 Cal.4th 568, 581.)
           What renders a statute vague is not difficulty in determining whether the crucial
    term has been proven, but the difficulty of determining what that term means. (United
    States v. Williams (2008) 553 U.S. 285, 286, 306.) A statute does not give fair notice if
    one of its terms is so vague that a reasonable person of ordinary intelligence must guess
    at its meaning. However, due process does not require that statutory language be set out
    with mathematical precision. Even a term that is somewhat imprecise will pass
    constitutional muster if common understanding and experience renders the language
    
                                                 33
    sufficient to warn against the proscribed conduct. The test is whether the meaning of the
    language is reasonably ascertainable. (People v. Sullivan, supra, 151 Cal.App.4th at
    p. 543.)
           Ordinary terms may find adequate expression in common usage and
    understanding. (People v. Sullivan, supra, 151 Cal.App.4th at pp. 543-544.) We test the
    statutory language in the context of the charged conduct. (Grayned v. City of Rockford,
    supra, 408 U.S. at p. 112; People v. Martin (1989) 211 Cal.App.3d 699, 705.) We also
    recognize that statutes describing offending conduct arising in a narrowly-defined
    business setting is subject to a less-strict standard than statutes describing conduct that
    may be undertaken by a broader population. (See Papachristou v. City of Jacksonville
    (1972) 405 U.S. 156, 162.)
           2. Without Permission
           Childs contends that subdivision (c)(5)‟s requirement that prohibited conduct be
    undertaken “without permission” is unconstitutionally vague. He questions whether his
    refusal to allow administrative access to the FiberWAN network was done “without
    permission” because to give the access codes would have violated security policies and
    instructions from Tong to prevent unqualified persons from having administrative access.
           Our inquiry focuses on the language of the statute itself, which we consider in the
    context of Childs‟s conduct. (See Grayned v. City of Rockford, supra, 408 U.S. at p. 112;
    People v. Martin, supra, 211 Cal.App.3d at p. 705.) Childs‟s contention rests on his
    claim that as system administrator, he was responsible for the security of the FiberWAN
    network. However, by the time Robinson asked for the access codes on July 9, Childs
    knew that he would no longer serve as the network administrator. Someone else would
    be needed to perform that function. Childs knew that if he did not provide administrative
    access to DTIS officials, no one would have such access, because he had set up the
    network with that in mind.
           Considered in this context, we are satisfied that no reasonable person with sole
    administrative access to a city-wide computer network would have thought—once he was
    removed from his position as system administrator of that network—that the denial of
    
                                                  34
    computer services resulting from his refusal to divulge the information necessary to allow
    someone else to take over those administrative functions was undertaken with permission
    of DTIS officials. Childs did not act “without permission” in an abstract manner such as
    by violating a website‟s unilaterally established terms of use. (See, e.g., Facebook, Inc.
    v. Power Ventures, Inc. (N.D. Cal. July 20, 2010, No. C08-05780) 2010 WL 3291750,
    pp. 7-12 [unpermitted computer access case].) He refused the direct instruction of his
    supervisor to divulge information that his employer owned and had the right to know. No
    reasonable person would have believed that Childs had the city‟s permission to refuse to
    provide DTIS officials with administrative access to the system it was responsible for
    running.
           Past cases interpreting the term “without permission” are of little use to us. Most
    of them actually focus on the question of whether access was with or without permission.
    (See Facebook, Inc. v. Power Ventures, Inc., supra, 2010 WL 3291750, pp. 5-12; People
    v. Lawton, supra, 48 Cal.App.4th Supp. 11, 14-15.) Childs was not charged with an
    offense requiring proof of unpermitted access; instead, he was charged with disrupting or
    denying access of other lawful users of the network without permission to do so. (§ 502,
    subd. (c)(5).)
           To the extent that the reasoning of these cases is applicable to the case at bar, the
    “without permission” cases support our conclusion. Overcoming technical or code-based
    barriers to gain access to a computer network clearly constitutes access without
    permission. (Facebook, Inc. v. Power Ventures, Inc., supra, 2010 WL 3291750, p. 11;
    see People v. Lawton, supra, 48 Cal.App.4th Supp. at pp. 12-15 [gaining access to
    software unavailable to general public].) By the same logic, creating technical or code-
    based barriers that prevent the lawful owner of a computer system from gaining access to
    its network clearly constitute an act undertaken without permission, as that term is used
    in subdivision (c)(5) of section 502.
           In effect, Childs argues that he had the city‟s permission to lock its officials out of
    administrative access to its computer network. We reject this interpretation of the
    “without permission” statutory language as absurd. (See Gattuso v. Harte-Hanks
    
                                                  35
    Shoppers, Inc., supra, 42 Cal.4th at p. 567.) Whatever the exact scope and meaning of
    the term “without permission” might be, it clearly encompasses a refusal to give an
    employer access to a computer network it owned when the employee‟s removal from his
    role as system administrator required him to provide access. (See, e.g., Skilling v. United
    States (June 24, 2010) ___ U.S ___, ___ [130 S.Ct. 2896, 2933].) Construing the
    challenged term in a reasonable, practical manner, we are satisfied that Childs‟s conduct
    fell squarely within the reach of the statute under which he was convicted. (See, e.g.,
    Findley v. Justice Court (1976) 62 Cal.App.3d 566, 573; see also People v. Guiamelon,
    supra, 205 Cal.App.4th at p. 412; People v. Sullivan, supra, 151 Cal.App.4th at p. 543.)
    As Childs had fair notice38 that his conduct was “without permission” of city officials, his
    vagueness challenge to this aspect of section 502, subdivision (c)(5) fails.
    
    
    
    
           38
               In support of his vagueness claim of error, Childs cites many cases that are of
    minimal use to us beyond their most general concepts. Most involve statutes implicating
    First Amendment rights of free speech, press or association, creating the potential for a
    chilling effect on the exercise of those rights. These cases bear most strongly on the
    second prong of the vagueness test by raising the specter of overbroad application. (See,
    e.g., City of Chicago v. Morales (1999) 527 U.S. 41, 60 [criticizing broad sweep of anti-
    gang ordinance]; Hynes v. Mayor & Council of Oradell (1976) 425 U.S. 610, 611, 622
    [solicitation ordinance cannot turn on police determination of who may conduct political
    canvassing]; People v. Mirmirani (1981) 30 Cal.3d 375, 382-384 [implicating “social and
    political goals”]; Katzev v. County of Los Angeles (1959) 52 Cal.2d 360, 362, 365-368
    [ordinance banning “crime comic book” is overbroad]; see Lanzetta v. New Jersey (1939)
    306 U.S. 451, 452-458 [anti-loitering statute].) By contrast, Childs‟s claim of error
    focuses us on the first prong of the vagueness test—whether the statutory language gave
    him fair notice that he acted “without permission” when he refused to provide the city
    with administrative access to its computer network. (See People v. Heitzman, supra, 9
    Cal.4th at pp. 199-200; People v. Hawkins, supra, 98 Cal.App.4th at p. 1439.)
                                                 36
           3. Disrupts or Denies
           Childs also challenges the term “disrupts or denies” in subdivision (c)(5) as
    unconstitutionally vague. He contends that this term is insufficiently certain to give him
    fair notice that his conduct was criminal. He also reasons that on July 9, the city was
    merely inconvenienced when he refused to provide administrative access to the
    FiberWAN network. Before trial, Childs made a similar argument—that because the city
    suffered no lapse or interference with basic computer functions, the prosecution could not
    prove that he caused any denial or disruption of computer services. Rejecting this
    contention, the trial court denied his motion to dismiss the subdivision (c)(5) charge.
    (§ 995.)
           We also reject his vagueness contention. The dictionary definition of a challenged
    term can be useful in this inquiry. (See, e.g., People v. Hawkins, supra, 98 Cal.App.4th
    at p. 1439.) The word “deny” comes from a Latin root, meaning “to negate,” or causing
    to be ineffective. (See Webster‟s 11th Collegiate Dict. (2004) pp. 334, 829.) To
    “disrupt” is to “throw into disorder” or “to interrupt the normal course.” (Id., at p. 362.)
           In its most literal sense, Childs‟s refusal to provide the city with administrative
    access to the FiberWAN network constituted multiple denials or disruptions of the city‟s
    computer system. DTIS had no ability to assign a new system administrator for the
    network. It could not remove Childs from ongoing access to the network. DTIS could
    not make administrative changes to the network, add new city departments to it or
    
    
           This distinguishing factor also applies to the two California cases that specifically
    discuss the meaning of the term “permission.” In rejecting gang-related conditions of
    probation barring a probationer‟s presence at certain locations without a probation
    officer‟s permission, courts express the concern that they give the officer too much
    discretion to enforce court-ordered conditions of probation. These cases focus on the
    potential for arbitrary enforcement of the conditions of probation and their potential to
    impinge on lawful rights of association are less useful to us than Childs suggests. (In re
    E.O. (2010) 188 Cal.App.4th 1149, 1152, 1155 & fn. 3; People v. Leon (2010) 181
    Cal.App.4th 943, 954.) A third case from the United States Supreme Court turned on the
    internal inconsistency of statutes meant to be read together and is likewise distinguishable
    from the challenge Childs makes. (See United States v. Cardiff (1952) 344 U.S. 174,
    176-177.)
                                                 37
    monitor its integrity from July 9 to July 21. In each of these ways, Childs denied
    computer services to DTIS within the meaning of subdivision (c)(5) of section 502.
           Subdivision (c)(5)‟s mens rea requirement that Childs acted knowingly also blunts
    any fair notice issue pertaining to the term “disrupt or denial.” (See, e.g., Skilling v.
    United States, supra, ___ U.S at p. ___ [130 S.Ct. at p. 2933]; see People v. Hawkins,
    supra, 98 Cal.App.4th at pp. 1437-1439 [awareness or intention required].) He concedes
    that the statutory intent requirement that he act “knowingly” modifies the term “disrupts
    or denies.” The jury was instructed that it had to find that his disruption or denial of
    computer services was knowingly done. By finding that Childs knowingly disrupted or
    denied computer services, it rejected the conclusion that he committed a crime by
    accident or misfortune. (See People v. Coria (1999) 21 Cal.4th 868, 876; People v.
    Hawkins, supra, 98 Cal.App.4th at p. 1439.) His criminal responsibility was triggered by
    his knowledge that by refusing to allow anyone else to have administrative access to the
    network—by retaining “the keys to the kingdom” even after being removed as
    administrator of FiberWAN, suspended from city employment and arrested—he denied
    DTIS its full use of that computer network.
           Childs makes a related factual argument that is also groundless. In support of his
    claim that the city was merely inconvenienced by his actions, he asserts that the evidence
    established that he continued to be available to administer the FiberWAN network after
    July 9. He was not terminated from city employment on that date, but expected that his
    employment would continue at least until the scheduled July 18 administrative review
    hearing. Childs argues that a reasonable person could not be expected to know on July 9
    that Robinson would not ask him to resume his network administrator responsibilities
    after that date or that the July 18 review hearing would not occur because he would be
    under arrest by that time.
           This argument ignores other facts that the jury appears to have found more
    persuasive than that which Childs cites to us. Before July 9, Childs set up the FiberWAN
    system so that no one else had administrative access to it, deliberately locking DTIS out
    of its computer network. Any attempt to gain administrative access to the network—by
    
                                                  38
    other DTIS employees, by Childs‟s supervisors, or by outside vendors retained to support
    it—would have erased its contents. Even after being removed as network administrator
    and after being arrested on July 12, Childs refused to allow others to have administrative
    access to the network. At that point, no reasonable person would have believed that
    DTIS would ask him to resume his administrator role. By July 15, he had been
    suspended without pay, making it even clearer that he would not be allowed access to the
    network. Viewed in context, we are satisfied that Childs had fair notice that his actions
    constituted a denial or disruption of the city‟s computer services.39 We reject this due
    process challenge to his conviction.
    B. Privilege Against Self-Incrimination
           Next, Childs contends that the trial court violated his privilege against self-
    incrimination by admitting evidence that he failed to divulge his user name and password
    after being arrested. He sets the date of his arrest at July 9 after Inspector Ramsey
    informed him that his refusal to provide FiberWAN administrative access to the city
    could subject him to criminal prosecution. At this point, Childs reasons that he had a
    constitutional right to remain silent—to decline to provide the information that the city
    sought. He urges us that to conclude that using his July 9 through July 21 silence against
    him deprived him of a fair trial. (See U.S. Const., 5th Amend.)40
           As a preliminary matter, we reject Childs‟s claim that he was under arrest once
    Inspector Ramsey joined the July 9 meeting. At that meeting, Ramsey asked Childs to
    
           39
              In his reply brief, Childs also suggests that the term “computer services” is
    vague. He did not raise this claim of error in his opening brief. An appellant may not
    raise a new issue in a reply brief as to do so deprives the respondent of a fair opportunity
    to respond to it. (People v. Zamudio (2008) 43 Cal.4th 327, 353-354; see Varjabedian v.
    City of Madera (1977) 20 Cal.3d 285, 295, fn. 11; see also 9 Witkin, Cal. Procedure,
    supra, Appeal, § 723, pp. 790-791.)
           40
              In his unsuccessful motion for new trial, he argued that he was prosecuted for
    failing to provide the sought-after information after he was arrested, in violation of his
    privilege against self-incrimination. (See Doyle v. Ohio (1976) 426 U.S. 610, 617-618.)
    The prosecution‟s opposition to the motion for new trial noted that it had complied with a
    trial court order that it make no closing argument comment about Childs‟s post-arrest
    silence.
                                                 39
    cooperate with DTIS, saying that if he did not do so, his refusal would constitute a denial
    of computer services for which he could be criminally liable. As Childs admitted at trial,
    Ramsey told him that he was not under arrest at that time. This encounter was a
    detention, not an arrest—a fact which Childs also acknowledged when he signed a release
    of the city property he relinquished. He first invoked his privilege against self-
    incrimination at the time of his July 12 arrest.
           Regardless of when Childs was arrested, his claimed privilege against self-
    incrimination defense does not apply. This privilege bars the state from compelling a
    person to be a witness against him or herself. (Hiibel v. Sixth Judicial Dist. Court of
    Nev., Humboldt Cty. (2004) 542 U.S. 177, 189; People v. Kurtenbach (2012) 204
    Cal.App.4th 1264, 1283.) It does not bar all compelled disclosures, even if those
    disclosures might lead to criminal prosecution. (See, e.g., California v. Byers (1971) 402
    U.S. 424, 431-432 [one involved in accident may be required to stop and give identifying
    information]; United States v. Wade (1967) 388 U.S. 218, 221 [accused may be
    compelled to speak during physical lineup]; United States v. Sullivan (1927) 274 U.S.
    259, 262-264 [one may be lawfully required to identify sources of income on tax returns,
    even when that income was illegal]; People v. Kurtenbach, supra, 204 Cal.App.4th at
    pp. 1282-1287 [one may be required to disclose an event affecting insurance benefits].)
           To qualify for Fifth Amendment protection, a communication must be testimonial.
    In some circumstances, a criminal defendant may invoke the privilege against self-
    incrimination as a defense if the prosecution is based on the defendant‟s failure to comply
    with a statute requiring disclosure of incriminating information. (People v. Kurtenbach,
    supra, 204 Cal.App.4th at pp. 1283-1284; see California v. Byers, supra, 402 U.S. at
    p. 432.) However, the United States Supreme Court has set limits on the circumstances
    under which a criminal defendant may use this defense. Courts resolve the tension
    between a state‟s demands for disclosures and the defendant‟s privilege against self-
    incrimination by balancing the public need against the individual‟s constitutional
    protection. Applying this balancing test, the United States Supreme Court has
    determined that the privilege does not apply if the incriminating disclosure is required for
    
                                                  40
    compelling, broadly applied reasons unrelated to criminal law enforcement. The defense
    does not apply when a statute requires disclosure in what is essentially a noncriminal
    context. This analysis does not focus on whether the disclosure requires an incriminating
    statement, but whether, generally speaking, the statutory requirement will result in
    disclosure of incriminating information. (People v. Kurtenbach, supra, 204 Cal.App.4th
    at p. 1284.)
           Courts use a three-part inquiry when conducting this balancing test. First, we
    consider whether the statute targets a highly-selective group inherently suspected of
    criminal activity. (People v. Kurtenbach, supra, 204 Cal.App.4th at p. 1285.) The
    disclosure required of Childs to allow DTIS administrative access to its computer system
    was not inherently criminal. Second, we determine whether the statute regulates an
    activity permeated with criminal statutes. (Id. at pp. 1285-1286.) Section 502,
    subdivision (c)(5) regulates the use of computer systems—a legal activity, not an illegal
    one such as gambling or the sale of narcotics. (See People v. Kurtenbach, supra, 204
    Cal.App.4th at p. 1286.) Third, we weigh whether the statute requires disclosures for
    compelling, broad-based reasons unrelated to criminal law enforcement. (Id. at p. 1286.)
    The broad purpose of section 502 is to avoid disruption or denial of vital computer
    services. (§ 502, subd. (a); People v. Hawkins, supra, 98 Cal.App.4th at p. 1440.) The
    disclosures required by this statute serve compelling business and governmental interests,
    not law enforcement. (See People v. Kurtenbach, supra, 204 Cal.App.4th at p. 1286.)
           All three of the Kurtenbach factors weigh against the application of the privilege
    against self-incrimination in the case before us. Thus, we conclude that for DTIS to
    require its outgoing computer system administrator to reveal access codes necessary to
    allow the new system administrator to perform those functions is not the type of
    disclosure protected by the privilege against self-incrimination.
    C. Instructions
           1. Definition of Terms
                   a. Instruction Given
           Childs also raises several instructional challenges. He first argues that the trial
    
                                                 41
    court‟s instruction defining the charged offense was inadequate because it failed to define
    the terms “authorized user,” “without permission,” “disrupts or denies,” “computer
    services,” “within the scope of his employment,” and “reasonably necessary to the
    [employee‟s] work assignment.”41
           The trial court in a criminal case has a sua sponte duty to instruct the jury on
    general principles of law relevant to the issues raised by the evidence—those principles
    necessary to the jury‟s understanding of the case. (People v. Roberge (2003) 29 Cal.4th
    979, 988; People v. Estrada, supra, 11 Cal.4th at p. 574.) Childs was charged with
    knowingly and without permission disrupting or denying computer services to an
    authorized user of a computer, computer system, or computer network. (See § 502,
    subd. (c)(5).) The trial court instructed the jury on those elements in an instruction it
    crafted.42 That instruction paralleled the language of subdivision (c)(5); defined the
    terms “computer network,” “computer services,” and “computer system” as set out in
    
    
    
    
           41
             In support of this argument, Childs improperly cites an appellate case in which
    the California Supreme Court granted review. (See People v. Schade (1994) 30
    Cal.App.4th 1515, review granted Sep. 15, 1994, S040968); see also Cal. Rules of Court,
    rules 8.1105(e)(1), 8.1115(a).)
           42
             Although the record indicates that the instruction was a modified form of
    CALCRIM No. 1946, there is no standard instruction with that number. (See CALCRIM
    (2013) p. 45.) The parties agree that the trial court wrote the instruction for this case.
    
                                                 42
    subdivision (b)(2), (4) and (5); and instructed the jury on the scope of employment
    defense as specified in subdivision (h)(1).43
           If the Legislature defines a term, courts are usually bound by that definition.
    (People v. Zeigler, supra, 211 Cal.App.4th at p. 650.) In most cases, instructing the jury
    on the statutory definition of an offense is sufficient if the jury would have no difficulty
    understanding that language. The meaning of a statute is adequately conveyed by its
    express terms if the words used are commonly understood by those familiar with the
    English language and the terms are not used in a technical sense peculiar to the law. A
    term with a legal, technical meaning must be clarified sua sponte if it has a definition that
    differs from the nonlegal meaning that might be ascribed to the same terms in common
    parlance. (People v. Rodriguez, supra, 28 Cal.4th at pp. 546-547; People v. Estrada,
    supra, 11 Cal.4th at pp. 574-575.) If the trial court instructs the jury on the statutory
    language and the defendant does not seek amplification of the terms used in the statute,
    
    
           43
              The trial court gave this instruction to the jury: “The defendant is charged . . .
    with disrupting or denying of computer services to an authorized user. To prove the
    defendant is guilty of this crime, the People must prove: [¶] 1. the Defendant knew that
    he disrupted or denied computer services; [¶] 2. the Defendant knew that the disruption or
    denial was to an authorized user to the computer, computer system, or network; [¶] AND
    3. the Defendant did not have permission. [¶] „Computer Network‟ means any system
    that provides communication between one of more computer systems and input/output
    devices, including but not limited to, display terminals and printers connected by
    telecommunication facilities. [¶] „Computer services‟ includes but is not limited to,
    computer time, data processing, storage functions, or other uses of a computer, computer
    system, or computer network. [¶] „Computer system‟ means a device or collection of
    devices, including supporting devices and excluding calculators that are not
    programmable and capable of being used in conjunction with external files, one or more
    of which contain computer programs, electronic instructions, [or] input data. [¶] The
    knowing disruption or denial of computer services to an authorized user of a computer,
    computer system or computer network without permission is not criminal if committed
    by a person within the scope of his or her lawful employment. If you find the
    aforementioned elements to have been proved beyond a reasonable doubt, the People
    have the further burden of proving beyond a reasonable doubt that the defendant was not
    acting within the scope of his employment when committing the knowing disruption or
    denial of computer services to an authorized user without permission. If the People have
    not met this burden, you must find the defendant not guilty of this crime.”
                                                    43
    the instruction is sufficient. The trial court has no sua sponte duty to clarify terms that
    are not used in a legal, technical manner. (People v. Rodriguez, supra, 28 Cal.4th at
    p. 546; People v. Estrada, supra, 11 Cal.4th at pp. 574, 581.)
           The People argue that Childs forfeited the right to challenge all of these terms as
    ambiguous because he failed to seek clarification of them in the trial court.44 The record
    supports the conclusion that his written proposed jury instruction did not seek to amplify
    the terms “authorized user,” “without permission,” “disrupts or denies” as he argues on
    appeal.45 Thus, he has waived the right to challenge these claims of instructional error
    that he failed to bring to the trial court‟s attention. (People v. Hart (1999) 20 Cal.4th
    546, 622; People v. Bolin (1998) 18 Cal.4th 297, 326; People v. Stone (2008) 160
    Cal.App.4th 323, 331.)46 We address those issues that were properly preserved for our
    consideration on appeal.
    
    
    
    
           44
              The People also argue that Childs agreed to the instruction given, suggesting
    that the invited error doctrine applies. In light of our finding of forfeiture, we need not
    determine that additional question.
           45
              Much of the discussion of the jury instructions appears to have taken place off
    the record. Thus, Childs cannot demonstrate that he made any verbal request for
    clarification of any of the statutory terms. As the appellant, he has the burden of proving
    that he is entitled to relief on appeal. (See People v. Davis (1996) 50 Cal.App.4th 168,
    172-173 [appellant must affirmatively demonstrate error and cannot rely on silent
    record].)
           46
              Even without a trial court objection, we may review any instruction given that
    affects the substantial rights of the defendant. (§ 1259; People v. Gray (2005) 37 Cal.4th
    168, 235.) We are not required to do so, and nothing in Childs‟s arguments about these
    terms persuades us that his substantial rights were affected by the use of these statutory
    terms without further definition.
                                                  44
                  b. “Computer Services”47
           Childs argues that a major issue in this case was the meaning of the term “disrupts
    or denies computer services.” Childs took the position there was no disruption or denial
    of services because the system continued to be available to end users and administrative
    services were disrupted only after he was arrested. The jury instruction defined
    computer services only in terms of the statutory definition. This was inadequate, Childs
    contends, because the jury asked for a “better deffinition [sic] of the term computer
    services.” Childs further argues the trial court erred by failing to provide a more detailed
    explanation, rather than referring them to the definition already given. When the request
    is viewed in context, however, it is clear that no error occurred.
           On the first full day of jury deliberations, a hint of trouble emerged. The jurors
    sent a note to the trial court, asking what to do if one juror refused to discuss the case.
    The court reinstructed the jurors about their duty to talk with each other about the case.
    (See CALCRIM No. 3550.) At the close of that day‟s deliberations, the jurors were
    ordered to deliberate through their lunch the next day. Juror No. 12 protested, but the
    judge cut off his comments, fearing that he might reveal the jury‟s thought processes
    arising during deliberations in violation of specific instructions not to do so. (CALCRIM
    No. 3550.)
           On following day, Juror No. 12 filed a written objection to the court‟s order that
    he have lunch while continuing to deliberate. Insisting on a lunch break, he suggested
    that if he did not get his way, he would become angry and that this would “probably”
    affect his ability “to render an impartial verdict.” He also noted that the jury instructions
    were “causing jury confusion.” In a troubling aside, the letter stated that the remaining
    
    
           47
              Childs requested the following as part of his Section 502 instruction: “Before a
    defendant can be found to have knowingly disrupted or denied computer services to an
    authorized user of a computer, computer system, or computer network he must have
    interacted physically or electronically with the computer, computer system, or computer
    network and that such interaction must have caused the disruption or denial of computer
    services.” Childs‟s argument regarding this instruction focuses only on the definition of
    computer services, and not on any other aspect of this rejected instruction.
                                                  45
    jurors had concluded that Childs was guilty and that Juror No. 12 felt pressured to agree
    with them.
           The trial court read the letter into the record, concluding that it violated Juror
    No. 12‟s duty not to reveal the deliberations process. It realized that the juror might have
    to be removed. Juror No. 12 was brought into court and advised that his discussion of the
    jury‟s deliberations was improper.
           On his request for a lunch break, Juror No. 12 sought to continue his practice of
    taking a lunchtime nap in his car. He needed this for his comfort, not because of any
    physical issues. When the judge offered to take a short lunch break, Juror No. 12 found
    that insufficient; because he was disabled, he needed time to get to and from the place
    where he got his lunch. As he had in his letter, Juror No. 12 stated in court that if he did
    not get his lunch break, he would not have an open mind, but would be upset and angry
    while deliberating. The trial court allowed the jurors to have 30 minutes for lunch and
    stated that lunch would be provided to him. Juror No. 12 protested that he did not want
    lunch provided to him; he wanted an hour-long lunch break.
           After ordering Juror No. 12 from the courtroom, the trial court noted that the juror
    had an unspecified physical difference. He admitted that his desires were based on
    comfort and were unrelated to a physical disability. She also stated that Juror No. 12 had
    indicated that if she did not allow him his lunch break, he would refuse to deliberate. The
    trial court expressed concern that he sought to control the pace of deliberations for
    personal reasons, not because of any needed accommodation related to disability. She
    was also concerned because Juror No. 12 had revealed the content of deliberations. The
    prosecution asked that Juror No. 12 be removed from the jury. The trial court ordered the
    jurors to continue deliberating, and waited to see if Juror No. 12 would refuse to
    participate.
           While the trial court considered the request to remove Juror No. 12, the jury asked
    for a “better” definition of “computer services.” Without objection, the trial court
    instructed the jurors to review the definition it had already given. Soon, the jurors sent
    another note to the judge, this one stating: “We are unable to even get past the definitions
    
                                                  46
    on the jury instructions. One juror is refusing to abide by the court[‟]s definitions and
    instructions and inserting their own instead.”
           The trial court removed Juror No. 12 for failing to follow its instructions and for
    threatening to render a non-impartial verdict. An alternate juror replaced Juror No. 12
    and the jury was instructed to begin deliberations anew. The trial court declined to
    address the pending juror question for a definition of computer services; as the
    deliberations would begin all over again, that inquiry was deemed irrelevant. The trial
    court asked the new jurors if they had done any investigation of the meaning of the term
    “computer services,” but no one indicated that they had. That afternoon, the new jury
    reached its verdict.
           The law that applies when jurors request clarification of instructions during
    deliberations is well-settled. If deliberating jurors require more information on any
    pertinent point of law, the jurors must be brought into court and the required information
    must be given to the jurors in the presence of both sides. (§ 1138.) The trial court has a
    mandatory duty to clear up any confusion created by its original instructions. (People v.
    Gonzalez (1990) 51 Cal.3d 1179, 1212, superseded by statute on another point in Barnett
    v. Superior Court (2010) 50 Cal.4th 890, 898.) When the instructions already given—
    particularly those based on statutory language—are full and complete, a trial court faced
    with a request for clarification is not always required to elaborate on those instructions.
    The court has discretion to determine what additional explanation is needed. (People v.
    Beardslee (1991) 53 Cal.3d 68, 97; People v. Gonzalez, supra, 51 Cal.3d at p. 1213.)
           In this case, it is reasonably apparent that the jury‟s request for clarification about
    the meaning of the term “computer services” was generated more out of frustration with
    Juror No. 12‟s refusal to abide by the earlier instructions than actual confusion about the
    meaning of the term. In either event, when that juror was removed we presume that the
    reconstituted jury began deliberations anew, as instructed. (People v. Fuiava (2012) 53
    Cal.4th 622, 716.) No request for clarification came from the new jury. In these
    circumstances, we conclude that the trial court properly exercised its discretion not to
    
    
                                                  47
    offer further instruction to the new jury on the meaning of “computer services.” (See
    People v. Gonzalez, supra, 51 Cal.3d at p. 1213.)48
                    c. “Scope of Employment” and “Reasonably Necessary to Work
    Assignment”
    
           Childs is also critical of the trial court for rejecting his proposed instruction
    defining terms applicable to a statutory defense to the charged crime. One cannot
    lawfully be convicted of disrupting or denying computer services while acting “within the
    scope of his or her lawful employment.” For purposes of this defense, a person is
    deemed to have acted within the scope of his or her employment “when he or she
    performs acts which are reasonably necessary to the performance of his or her work
    assignment.” (§ 502, subd. (h)(1).)
           A trial court has a sua sponte duty to instruct on an applicable defense on which
    the defendant relies. (People v. Stewart (1976) 16 Cal.3d 133, 140.) The trial court
    instructed the Childs jury on this defense using the statutory language. (See § 502,
    subd. (h)(1).) At Childs‟s request, it added that an employer‟s disapproval of an
    employee‟s conduct does not determine whether the employee acted outside the scope of
    employment. It rejected his other requests to define conduct within the scope of
    employment.49
           On appeal, Childs contends that the refusal of his complete proposed instruction
    on the meaning of the terms “within the scope of his employment” and “reasonably
    
           48
                For a related discussion about Juror No. 12, see pt. III.D., post.
           49
              Childs sought this additional instruction: “Conduct is within the scope of
    employment if: (a) It is reasonably related to the kinds of tasks that the employee was
    employed to perform; or [¶] (b) It is reasonably foreseeable in light of the employer‟s
    business or the employee‟s job responsibilities. [¶] (c) An employee‟s unauthorized
    conduct may be within the scope of employment if the conduct was committed in the
    course of a series of acts authorized by the employer or the conduct arose from a risk
    inherent in or created by the enterprise. [¶] (d) An employee‟s wrongful or criminal
    conduct may be within the scope of employment even if it breaks a company rule or does
    not benefit the employer. Conduct that violates an employee‟s official duties or
    disregards the employer‟s express orders may nonetheless be within the scope of
    employment.”
                                                    48
    necessary to his work assignment” left the jurors with an insufficient understanding of the
    technical, legal meaning of the statutory language. He argues that the trial court erred by
    rejecting his proposed language, which he asserts was an accurate statement of the law
    taken from applicable cases. (See Chrisman, supra, 155 Cal.App.4th at pp. 36-37;
    Mahru v. Superior Court, supra, 191 Cal.App.3d at p. 549.) He reasons that because the
    instruction given did not fully or accurately reflect those case holdings, it was
    insufficient, leaving him vulnerable to an erroneous conviction by effectively depriving
    him of a statutory defense to the charged conduct.
           We disagree. To begin with, the phrase “reasonably necessary to the performance
    of his work assignment” is itself the statutory definition of “within the scope of
    employment.” The instruction given thus accurately relates that defense as set forth in
    the statute (People v. Estrada, supra, 11 Cal.4th at p. 574), which was then embellished
    with language requested by Childs, to the effect that an employer‟s approval or
    disapproval of the acts in question is not determinative of the scope of employment. The
    remaining portions of the proposed instruction are not a correct statement of law.
    (People v. Gurule (2002) 28 Cal.4th 557, 659.) Childs relies on Mahru, Chrisman,
    Lawton, and Gentry as elucidating the “technical, legal” meaning of these statutory terms.
    Neither Lawton nor Gentry involved scope of employment issues, and we have already
    discussed and distinguished Mahru and Chrisman, which are not controlling here. (See
    Section II.E, supra.)
           As an example, Childs asked the court to instruct that “an employee‟s wrongful or
    criminal conduct may be within the scope of employment even if it breaks a company
    rule or does not benefit the employer.” [Italics added.] This was taken from the
    discussion in Chrisman, supra, 155 Cal.App.4th at page 36, of cases analyzing the term
    “within the scope of employment” for purposes of imposing vicarious liability on an
    employer for the wrongful acts of its employee. (See, Mary M. v. City of Los Angeles
    (1991) 54 Cal.3d 202; Perez v. Van Groningen & Sons, Inc., supra, 41 Cal.3d at pp. 967-
    970.) The doctrine of respondeat superior is designed to address three policy concerns:
    “(1) to prevent recurrence of the tortious conduct; (2) to give greater assurance of
    
                                                 49
    compensation for the victim; and (3) to ensure that the victim’s losses will be equitably
    borne by those who benefit from the enterprise that gave rise to the injury.” (Mary M. v.
    City of Los Angeles, supra, 54 Cal.3d at p. 209 [italics added].) Thus, it makes sense to
    apply the proposed principle in circumstances where the victim of an employee‟s
    wrongful conduct is seeking to hold the employer liable. Applying that principle under
    the facts of this case—where the employer is the employee‟s victim—would run the
    danger of nullifying the application of section 502, subdivision (c)(5) entirely.
           2. Unauthorized Access
           Childs also argues that the instructions defining the offense described in section
    502 failed to include an essential element of that offense—the unauthorized access to a
    computer. The failure to instruct on an element of an offense violates a criminal
    defendant‟s federal and state constitutional rights. A criminal defendant may challenge
    such an omission even if no objection was raised to the instruction in the trial court.
    (People v. Tillotson (2007) 157 Cal.App.4th 517, 538.) However, we have found the
    underlying assumption to be incorrect. (See pt. III.A.3, ante.) As such, we necessarily
    reject his instructional challenge.
           3. Adoptive Admission
           Next, Childs contends that the trial court erred in instructing the jury on adoptive
    admissions. Evidence of a declarant‟s statement offered against a party is not
    inadmissible hearsay if the statement is one that the party—with knowledge of its
    content—has by words or other conduct manifested an adoption or belief in its truth.
    (Evid. Code, § 1221; People v. Fauber (1992) 2 Cal.4th 792, 851.) At the prosecution‟s
    request and over Childs‟s objection, the trial court instructed that if “you conclude that
    someone made a statement outside of court that accused the defendant of a crime or
    tended to connect the defendant with the commission of the crime and the defendant did
    not deny it, you must decide whether each of the following is true: [¶] One, the statement
    was made to the defendant or made in his presence. [¶] Two, the defendant heard and
    understood that statement. [¶] Three, the defendant would under all circumstances
    naturally have denied the statement if he thought it was not true. [¶] And four, the
    
                                                 50
    defendant could have denied it but did not. [¶] If you decide that all of these
    requirements have been met, you may conclude that the defendant admitted the statement
    was true. [¶] If you decide that any of the requirements has not been met, you must not
    consider either the statement or the defendant‟s response for any purpose.” (CALCRIM
    No. 357.)
           The trial court found sufficient evidence to give this instruction because Ramsey
    testified that on July 9, Childs did not react when he explained that failure to cooperate
    with the city could constitute a violation of section 502. Childs admitted that when he
    was advised that his conduct could be criminal, he did not provide the access that DTIS
    officials sought. Instead, he lied and gave them false information.50
           On appeal, Childs argues that the instruction should not have been given because a
    reasonable jury could not have found that either he understood the contents of Ramsey‟s
    statement or that he manifested an adoption or belief in the truth of that statement by his
    words or conduct. (See People v. Lewis (2008) 43 Cal.4th 415, 497; People v. Maki
    (1985) 39 Cal.3d 707, 712.) He reasons that section 502 is so complex that he needed the
    advice of legal counsel to parse its meaning, such that he could not be said to have
    understood the import of Ramsey‟s statement at the time it was made. He also contends
    that the evidence did not show that he adopted Ramsey‟s statement by failing to respond
    to it. Finding himself in the situation he was in on July 9, he argues that a reasonable
    person might choose not to respond to the statement, fearing that he might blunder into
    some incriminating response.
           To render evidence of an adoptive admission admissible, it is sufficient if the
    evidence supports a reasonable inference that an accusatory statement was made under
    circumstances affording Childs a fair opportunity to deny it, without implicating his
    privilege against self-incrimination. If a statement is made under circumstances that
    would normally call for a response if it were untrue, then the statement is admissible for
    
           50
            Childs testified that Ramsey told him that failure to provide access to the police
    department network could be a violation of section 502. He told the jury that after he
    heard Ramsey say this, he provided access to the police department‟s network.
                                                 51
    the limited purpose of showing Childs‟s reaction to it. His reaction may constitute a tacit
    admission of the truth of the statement. Once the evidence is admissible, the factual issue
    of whether or not his conduct actually constituted an implied or adoptive admission then
    becomes a matter for the jury to decide. (See People v. Geier (2007) 41 Cal.4th 555,
    590-591; People v. Riel (2000) 22 Cal.4th 1153, 1189-1190; People v. Fauber, supra, 2
    Cal.4th at pp. 851-853; People v. Edelbacher (1989) 47 Cal.3d 983, 1011, disapproved
    on another ground in People v. Loyd (2002) 27 Cal.4th 997, 1007, fn. 12, 1010.)
           To a great extent, Childs‟s claim of error is based on his assertion that his silence
    was construed against him in violation of the privilege against self-incrimination or is
    grounded in his claim that subdivision (c)(5) was too ambiguous to be understood. As we
    have already rejected these contentions, these underpinnings of this instructional
    challenge is also unavailing. (See pts. III.A. & III.B., ante.)
           The remainder of his instructional challenge also fails. The adoptive admission
    instruction is properly given if specific foundational facts can be inferred from the record.
    The record contains evidence from which a reasonable juror could infer that Childs
    understood that his continued refusal to provide administrative access to the FiberWAN
    network to city officials could constitute a crime. The jury could reasonably infer from
    this evidence that Childs‟s failure to provide the sought-after access codes constituted an
    admission that he had committed a crime.
           Even if the jurors found the facts to be as the prosecution urged them to find, the
    instruction did not require the jurors to find that Childs admitted by his silence that he
    had committed a crime. It merely permitted the jury to make this further inference. (See
    People v. Medina (1990) 51 Cal.3d 870, 891; see also People v. Zavala (2008) 168
    Cal.App.4th 772, 780.) If a different inference was also raised by the record, Childs was
    entitled to argue that this inference was more credible. Even if Childs could offer a
    reasonable explanation for his silence, that fact weighs into the jury‟s determination. It
    does not render the evidence inadmissible. (See, e.g., People v. Geier, supra, 41 Cal.4th
    at pp. 590-591.)
    
    
                                                 52
           As the circumstances warranted presenting the evidence to the jury to let it decide
    what weight to give to that evidence, the trial court correctly instructed the jury on how to
    consider this adoptive admission evidence. (People v. Riel, supra, 22 Cal.4th at p. 1190.)
    The jury was instructed to determine whether Childs made an admission, to evaluate how
    much weight to give to it, and to view any evidence of that out-of-court statement with
    caution. (CALCRIM No. 358.) It was also instructed that Childs could not be convicted
    on the basis of the adoptive admission alone, but that it could rely on this evidence only if
    the jury concluded that other evidence showed that the charged crime was committed.
    (CALCRIM No. 359.) (See People v. Fauber, supra, 2 Cal.4th at p. 853.) We presume
    that jurors understand, correlate, and follow the trial court‟s instructions. (People v.
    Sanchez (2001) 26 Cal.4th 834, 852.) The trial court did not err by giving this
    instruction.
           Even if we assume arguendo that giving this instruction was error, any error was
    clearly harmless. Childs is entitled to reversal of his criminal conviction only if our
    examination of the entire case makes it reasonably probable that he would have obtained
    a more favorable outcome in the absence of the error. (See People v. Watson (1956) 46
    Cal.2d 818, 836-837; see also People v. Flood (1998) 18 Cal.4th 470, 502-503; People v.
    Elize (1999) 71 Cal.App.4th 605, 616.) To establish a reasonable probability, he must
    show a reasonable chance of a different outcome, not merely an abstract possibility.
    (People v. Superior Court (Ghilotti) (2002) 27 Cal.4th 888, 918; see College Hospital
    Inc. v. Superior Court (1994) 8 Cal.4th 704, 715.) The reasonable probability must be
    such that it undermines our confidence in the jury‟s verdict. (See Strickland v.
    Washington (1984) 466 U.S. 668, 693-694; People v. Jenkins (2000) 22 Cal.4th 900, 954;
    In re Sassounian (1995) 9 Cal.4th 535, 544.)
           The challenged evidence—an implied admission to an out-of-court statement
    which the jury was merely permitted to infer—paled in significance to the direct
    admissions that Childs himself gave while testifying in court, under oath, before the jury.
                                                 53
    Given his admissions on the witness stand, the weight to be given to an adoptive
    admission that the jury might have inferred from his failure to respond to Ramsey‟s
    statement is clearly less significant. Even if this were not so, much of Childs‟s
    prejudicial error argument turns on assertions that we reject—that the jury was confused
    about the meaning of “computer services” and that section 502, subdivision (c)(5) was
    ambiguous. (See pts. III.A. & III.C.1.b., ante; see pt. III.D., post.)
           Contrary to Childs‟s assertion, this was not a close case. The evidence that he
    locked DTIS out of administrative access to its FiberWAN network was overwhelming.
    At trial, he admitted as much. He admitted that when city officials attempted to regain
    access to the computer system, he lied by denying that he had backup configurations. He
    lied again by providing incorrect passwords. He admitted that he had disabled the
    password recovery feature on the CE devices. He admitted that he had configured core
    network devices to run only on VRAM without consulting DTIS management. He
    admitted that he had disabled the console ports on these core devices. He admitted that
    as configured, these core devices would shut down and their contents would be erased if
    anyone attempted to access them or if the system was powered down, even by accident.
    If required to make a prejudicial error analysis, we would find any error to be harmless.
    
    
    
    
                                                  54
    D. Dismissal of Juror No. 12
           1. Facts
           Next, Childs argues that the trial court erred in dismissing Juror No. 12 during
    deliberations over Childs‟s objection.51 He contends that the trial court did not remove
    the juror because he was unable to perform his duties, but because he had doubts about
    the sufficiency of evidence. Childs reasons that this removal violated his rights to a jury
    trial and to due process, compelling reversal. (U.S. Const., 6th, 8th & 14th Amends.; Cal.
    Const., art. I, §§ 15-16; § 1089.)
           We have already set out some of the facts related to this issue. (See pt. III.C.1.b.i.,
    ante.) During the initial round of deliberations, one juror reportedly refused to discuss
    his opinion of the case with the other jurors. (See CALCRIM No. 3550.) It soon became
    clear that Juror No. 12—who was physically disabled—was the juror in question. In a
    letter, he protested the trial court‟s order to deliberate during the jury‟s lunch period.
           His letter suggested two areas of concern for the trial court. First, Juror No. 12
    reported that the other eleven jurors had voted to convict and he was the lone holdout for
    acquittal. This report of the jury‟s thought processes during deliberations violated the
    trial court‟s instructions not to reveal how he or any other juror voted on guilt or
    innocence unless the court asked for this information. Juror No. 12 also hinted that he
    would be angry, biased, and unable to render an impartial verdict if the trial court did not
    allow him the lunch break he wanted.
           The trial court found that Juror No. 12‟s letter violated his duty not to reveal the
    deliberations process, observing that he might have to be removed. The judge conducted
    an investigation, questioning Juror No. 12. In his oral explanation, he repeated that if he
    
    
           51
             In support of this argument, Childs‟s counsel referred to an appellate case in
    which review was granted. (See People v. Valot (2002) 103 Cal.App.4th 1247, review
    granted Feb. 25, 2003, remanded May 14, 2003, S112450.) This is improper. (See Cal.
    Rules of Court, rules 8.1105(e)(1), 8.1115(a).)
                                                  55
    was not comfortable with the lunch arrangements, “I don‟t think [I] am going to [have an]
    open mind. I am going to be upset. I will be angry, and I don‟t believe that [anyone]
    needs this kind of person in deliberating.”
           Rejecting Childs‟s argument that the juror merely sought an accommodation, the
    trial court found that Juror No. 12 wanted a longer lunch break for personal reasons that
    were unrelated to his disability. It expressed concern that he sought to control the pace of
    deliberations for personal reasons, not because of any need for accommodation related to
    disability. The court was concerned that Juror No. 12 was refusing to deliberate if not
    given the lunch break he sought. Finally, it was critical of Juror No. 12 for revealing the
    content of jury deliberations. After the prosecution asked that the juror be removed, the
    trial court ordered the jurors to continue deliberating and waited to “see what happens.”
    Soon, the jurors made two inquiries which, when read together, suggested that Juror No.
    12 was refusing to deliberate. Outside the presence of the jury, Childs argued that Juror
    No. 12—who he knew was the only juror who would have not found him guilty—was
    open-minded and wanted to continue deliberating. To this, the trial court added a caveat:
    “If I don‟t anger him.”
           Juror No. 12 was removed from the jury. In a lengthy explanation, the trial court
    stated that it could not allow a juror who had already violated its instructions to become
    angry and retaliate by failing to be fair and impartial. She based his removal on the
    violation of his duty not to comment on the thought processes of the deliberations and on
    his threat to render a biased verdict if he disagreed with the trial court‟s orders. (See
    § 1089.)
    
    
    
    
                                                  56
           2. Legal Principles
           For good cause, if a trial court finds a seated juror is unable to perform his or her
    duty, it may order that juror to be discharged and replace him or her with an alternate
    juror.52 (§ 1089; People v. Fuiava, supra, 53 Cal.4th at p. 710.) If improper, this
    discharge may implicate a criminal defendant‟s federal and state constitutional rights to a
    jury trial, to due process, and to an unanimous verdict. (U.S. Const., 6th, 8th & 14th
    Amends.; Cal. Const., art. I, §§ 15-16; see People v. Karapetyan (2003) 106 Cal.App.4th
    609, 621; People v. Fuiava, supra, 53 Cal.4th at p. 710; People v. Barnwell (2007) 41
    Cal.4th 1038, 1052.) The discharge of a juror cannot be based on his or her doubts about
    the sufficiency of the prosecution‟s evidence, as that would violate the defendant‟s right
    to a unanimous jury. (People v. Engelman (2002) 28 Cal.4th 436, 446; People v.
    Cleveland (2001) 25 Cal.4th 466, 481-483; People v. Karapetyan, supra, 106
    Cal.App.4th at p. 621.) If the substitution of a juror during deliberations is made for good
    cause, then the removal does not offend constitutional principles. (People v. Fuiava,
    supra, 53 Cal.4th at p. 716; People v. Wilson (2008) 44 Cal.4th 758, 820-821.)
           The trial court has broad determination to discharge a juror who is unable to
    perform the duties of a juror. However, our review for an abuse of discretion requires a
    somewhat stronger showing than what is ordinarily implied by an abuse of discretion
    standard of review. The juror‟s inability to perform as a juror must appear in the record
    as a demonstrable reality. The record must also show that the trial court actually relied
    on this evidence. This heightened standard of review reflects our obligation to protect a
    criminal defendant‟s fundamental constitutional rights. (People v. Fuiava, supra, 53
    
    
           52
              Childs argues that if a juror engages in misconduct, he or she may not be
    replaced by an alternate, but a mistrial must be granted. (People v. Hamilton (1963) 60
    Cal.2d 105, 127.) He fails to note that the California Supreme Court later characterized
    this aspect of Hamilton as dicta and specifically disapproved it. (See People v. Daniels
    (1991) 52 Cal.3d 815, 864-866.) We address the issue Childs raises on the basis of
    current law.
                                                 57
    Cal.4th at pp. 711-712; People v. Lomax (2010) 49 Cal.4th 530, 589-590; People v.
    Wilson, supra, 44 Cal.4th at p. 821; People v. Barnwell, supra, 41 Cal.4th at pp. 1052-
    1053; People v. Cleveland, supra, 25 Cal.4th at p. 474.)
           “Bias is often intertwined with a failure or refusal to deliberate.” (People v.
    Lomax, supra, 49 Cal.4th at p. 589.) Thus, even if there is reasonable possibility that the
    juror‟s difficulties related to his or her view of the merits of the case, the trial court still
    retains discretion to remove the juror for good cause. (People v. Fuiava, supra, 53
    Cal.4th at p. 716; People v. Thompson (2010) 49 Cal.4th 79, 137-138 [rejecting contrary
    federal rule].) If it learns that there might be grounds for discharging a juror based on
    failure to deliberate, the trial court may conduct whatever inquiry is reasonably necessary
    to determine if such grounds exist. (People v. Cleveland, supra, 25 Cal.4th at pp. 480,
    484; see People v. Fuiava, supra, 53 Cal.4th at p. 714 [not mandatory to conduct
    inquiry].)
           3. Demonstrable Reality
           Childs contends that the record does not show as a demonstrable reality that Juror
    No. 12 refused to deliberate or was unable to perform his duties as a juror. If the record
    does not demonstrate a failure to deliberate, the trial court‟s removal of that juror
    constitutes an abuse of discretion requiring reversal. (See, e.g., People v. Cleveland,
    supra, 25 Cal.4th at pp. 475, 486.) Childs reasons that the record shows that the juror
    was removed because he had doubts about the sufficiency of the prosecution‟s
    evidence.53
           We disagree. The record is clear that the actual basis of the trial court‟s removal
    of Juror No. 12 was his violation of his duty as a juror not to reveal the content of
    
    
           53
             Childs also assert that Juror No. 12 disagreed with the other jurors about the
    meaning of the jury instructions and the correct interpretation of section 502, subdivision
    (c)(5). As these assertions pose legal questions that we have already rejected, we need
    not consider them.
                                                    58
    pending deliberations and his threat to render a non-impartial verdict. An unwillingness
    to perform the duties of a juror constitutes good cause for removal. (§ 1089; see, e.g.,
    People v. Collins (1976) 17 Cal.3d 687, 694-697, superseded on another point in People
    v. Boyette (2002) 29 Cal.4th 381, 462, fn. 19.) A juror‟s willful failure to follow one
    instruction may lead a trial court to determine that the juror will not follow other
    instructions and is thus unable to perform the duties of a juror. (People v. Ledesma
    (2006) 39 Cal.4th 641, 738.) Juror No. 12‟s repeated threat that he might render a biased
    verdict if his wishes were not met, reinforced by his past refusal to follow the trial court‟s
    instructions, established good cause for removal as a demonstrable reality. (See People v.
    Fuiava, supra, 53 Cal.4th at pp. 711-712; People v. Lomax, supra, 49 Cal.4th at pp. 589-
    590.)
            Childs reasons that Juror No. 12 merely committed a trivial violation of the trial
    court‟s admonition not to reveal the jury‟s guilt-or-innocence vote that did not require his
    removal. This reasoning is thrice-flawed. First, the failure to heed the trial court‟s
    instructions not to reveal the jury‟s deliberations was not trivial. The trial court was
    charged with protecting the secrecy and sanctity of the jury‟s deliberative process.54 (See
    People v. Fuiava, supra, 53 Cal.4th at p. 710; People v. Cleveland, supra, 25 Cal.4th at
    p. 475; see also People v. Wilson, supra, 44 Cal.4th at p. 839.) Second, Childs‟s
    argument assumes that the trial court had no power to remove Juror No. 12 unless this
    action was required. By law, a trial court has discretion to discharge a juror on a showing
    of good cause. (§ 1089.) Even knowing that this juror was unconvinced of the
    sufficiency of the prosecution‟s evidence, the trial court retained its discretion to remove
    him for good cause. (See People v. Fuiava, supra, 53 Cal.4th at p. 716; People v.
    Thompson, supra, 49 Cal.4th at pp. 137-138.) Finally, this claim of error is a veiled
    attempt to reweigh the evidence before the trial court—which we may not do on appeal,
    
            54
                 We note that the trial court made significant efforts to prevent such a disclosure.
    
                                                    59
    even when applying the heightened review required in juror removal cases. (See People
    v. Fuiava, supra, 53 Cal.4th at pp. 713-714; People v. Lomax, supra, 49 Cal.4th at p. 589;
    People v. Barnwell, supra, 41 Cal.4th at pp.1052-1053.)55
           In the case before us, Juror No. 12 committed serious and willful misconduct,
    which constitutes good cause to find that the juror is unable to perform his or her duties.
    Such misconduct raises a presumption of prejudice which—if not rebutted—will nullify
    the verdict. We are satisfied that Juror No. 12 was actually removed from the jury for
    good cause which appears in the record as a demonstrable reality.
    E. Sufficiency of Evidence
           In his final attack on his conviction, Childs contends that the evidence was
    insufficient to prove that he violated subdivision (c)(5) of section 502 and must be
    reversed. Arguing that the unauthorized access of a hacker is an implied requirement of
    this offense, he reasons that his conduct did not violate that provision as a matter of law
    and thus, his conviction deprived him of due process. In effect, Childs challenges the
    trial court‟s legal conclusion about the meaning of the statute under which he was
    
           55
              Childs asserts that Juror No. 12 never made a “threat” to hold the court
    “hostage.” He did not raise this challenge in his opening brief. Raising an issue for the
    first time on appeal in a reply brief is unfair to the People, who have no opportunity to
    respond to it. (People v. Zamudio, supra, 43 Cal.4th at pp. 353-354; see Varjabedian v.
    City of Madera, supra, 20 Cal.3d at p. 295, fn. 11; see also 9 Witkin, Cal. Procedure,
    supra, Appeal, § 723, pp. 790-791.) If the issue was properly before us, we would reject
    it. Such clear language is not required. Jurors may have difficulty articulating their
    concerns in a manner that protects the confidentiality of deliberations and gives the trial
    court accurate information about why deliberations are stalled. (People v. Engelman,
    supra, 28 Cal.4th at p. 446.) The trial court was entitled to assess Juror No. 12‟s
    credibility, and we defer to this factual determination on appeal. (See People v. Lomax,
    supra, 49 Cal.4th at p. 590; People v. Barnwell, supra, 41 Cal.4th at p. 1053; see also
    People v. Bennett (2009) 45 Cal.4th 577, 621.)
            Childs also argues in his reply brief for the first time on appeal that Juror No. 12
    asked for an accommodation based on his physical disability. The juror‟s own words
    dispute this conclusion. When asked if his request for a longer lunch break was a
    physical requirement, he said it was not—that it was his custom to take a nap at lunch and
    the shorter lunch break ordered by the trial court was insufficient to allow him to do so.
                                                 60
    convicted. In such circumstances, we conduct an independent review of legal issue
    posed. (People v. Shabazz (1985) 175 Cal.App.3d 468, 473-474; see Chrisman, supra,
    155 Cal.App.4th at p. 33.) We have already rejected Childs‟s claim that subdivision
    (c)(5) can never apply to an employee who abuses computer access which he was
    lawfully given. (See pt. II, ante.) We necessarily reject this aspect of his due process
    argument.
           Childs also challenges the sufficiency of evidence to support his conviction
    because he contends that his refusal to disclose access codes to his employer did not
    cause any denial or disruption of computer services. We have rejected this underlying
    argument, as well. (See pt. III.A.3, ante.) To the extent that this sufficiency of evidence
    claim of error is a restatement of his earlier vagueness challenge, we reject it again.
           Faced with a true sufficiency of evidence challenge, the test is not whether the
    evidence supports the verdict beyond a reasonable doubt. (People v. Johnson (1980) 26
    Cal.3d 557, 576.) Instead, we review the whole record in the light most favorable to the
    jury‟s verdict to determine if it contains substantial evidence—evidence that is
    reasonable, credible, and of solid value—from which a reasonable trier of fact could find
    the defendant guilty beyond a reasonable doubt. (People v. Smith (2005) 37 Cal.4th 733,
    738-739; People v. Snow (2003) 30 Cal.4th 43, 66; People v. Johnson, supra, 26 Cal.3d
    at pp. 576-577.) We are not limited to the slice of evidence that Childs offers, nor to his
    interpretation of his conduct. We must presume in support of the judgment every fact
    that the jury could reasonably deduce from the evidence. (People v. Smith, supra, 37
    Cal.4th at p. 739.) The jurors are the sole arbiters of the credibility of witnesses and the
    testimony of a single witness is sufficient to support a verdict. (People v. Watts (1999)
    76 Cal.App.4th 1250, 1258-1259.) Applying this standard, the record is clear that by his
    conduct, Childs knowingly disrupted or denied computer services to lawful users of the
    City and County of San Francisco‟s FiberWAN network. (See pt. III.A.3, ante.)
    
    
                                                 61
                                      IV. ENHANCEMENT
    A. Taking
           Childs also raises two challenges to the jury‟s enhancement finding. In the first,
    he argues that we must strike the section 12022.6 enhancement as there was no taking as
    a matter of law. When one “takes, damages, or destroys any property” in the commission
    of a felony with the intent to cause that result, the trial court must impose an
    enhancement term. If the loss exceeds $200,000, a consecutive term of two years must
    be added to the punishment prescribed for the underlying felony. (§ 12022.6,
    subd. (a)(2).) The jury found the enhancement allegation to be true. A motion for new
    trial challenging the enhancement was rejected and Childs received a two-year term
    based on this finding.
           In part, Childs‟s argument on appeal is related to his claim that his conduct did not
    result in any denial or disruption of computer services. To the extent that this
    enhancement challenge is grounded in the same reasoning, we reject it for reasons we
    have already explained. (See pt. III.A.3., ante.) He also asserts that because no case has
    ever applied this enhancement to a section 502 computer crime, the Legislature could not
    have intended that a section 502 violation should support a section 12022.6 enhancement.
    He ignores the fact that the enhancement statute specifically makes it applicable to
    “property taken, damaged, or destroyed in violation of section 502”—the very offense of
    which he was convicted. (§ 12022.6, subd. (d); see People v. Beaver (2010) 186
    Cal.App.4th 107, 118 [by its clear terms, § 12022.6 is not limited to theft offenses];
    People v. Superior Court (Kizer) (1984) 155 Cal.App.3d 932, 935-936.)
           Next, Childs urges us to conclude that this enhancement does not apply because it
    is unclear whether the loss that DTIS suffered as a result of his conduct constituted a
    “taking” within the meaning of section 12022.6, subdivision (a). He reasons that this is a
    statutory ambiguity requiring that section 12022.6 be construed in his favor. If a penal
    statute is capable of more than one reasonable construction, we ordinarily adopt the
    construction most favorable to the defendant. (People v. Avery (2002) 27 Cal.4th 49, 57;
    People v. Garcia (1999) 21 Cal.4th 1, 10-11; People v. Beaver, supra, 186 Cal.App.4th at
                                                 62
    p. 117.) However, this “rule of lenity” applies only if other means of resolving a statute‟s
    underlying ambiguity in a convincing manner are impractical. A rule of construction is
    not a straightjacket to be followed blindly without regard to other factors that may give a
    clue to the Legislature‟s intent. (People v. Beaver, supra, 186 Cal.App.4th at p. 117; see
    § 4 [construction of penal statutes]; People v. Avery, supra, 27 Cal.4th at p. 58 [requiring
    “ „egregious ambiguity and uncertainty‟ ” before rule of lenity is applied].)
           Relevant case law gives us a window into the legislative intent behind section
    12022.6. While an earlier version of the statute required a taking or property damage to
    be an element of the underlying crime, it has since been broadened to apply when a
    sizable loss occurs in the commission of any felony. (People v. Superior Court (Kizer),
    supra, 155 Cal.App.3d at pp. 935-936; People v. Kellett (1982) 134 Cal.App.3d 949, 958;
    see § 12022.6, subd. (a).) The purpose of the enhancement is to deter large-scale crime—
    a purpose consistent with its application to Childs‟s case. (See People v. Loera (1984)
    159 Cal.App.3d 992, 1002; People v. Hughes (1980) 112 Cal.App.3d 452, 459; People v.
    Ramirez (1980) 109 Cal.App.3d 529, 539.) Although the Legislature did not intend for
    the application of section 12022.6 to turn on fortuitous circumstances, even a temporary
    taking suffices if the loss naturally flowed from the defendant‟s conduct. The defendant
    is not entitled to a reduction for later recovered amounts. (People v. Beaver, supra, 186
    Cal.App.4th at p. 118; People v. Loera, supra, 159 Cal.App.3d at p. 1002; People v.
    Swanson (1983) 142 Cal.App.3d 104, 106-109; People v. Kellett, supra, 134 Cal.App.3d
    at p. 959; People v. Ramirez, supra, 109 Cal.App.3d at pp. 539-540; People v. Bates
    (1980) 113 Cal.App.3d 481, 483-484.)
           These cases satisfy us that the Legislature intended that we give a broad
    construction to “taking” within the meaning of section 12022.6. (See, e.g., People v.
    Beaver, supra, 186 Cal.App.4th at pp. 117-118 [legal expenses incurred to reduce
    employer‟s exposure to medical expenses come within § 12022.6].) In the case before
    us, the prosecution offered evidence that as a result of Childs‟s conduct the city incurred
    far more than $200,000 in expenses during the critical July 9 to July 21 period. (See,
    e.g., People v. Swanson, supra, 142 Cal.App.3d at pp. 106-109 [fair market value is value
    
                                                 63
    of loss].) Thus, we conclude that there was substantial evidence in support of the jury‟s
    enhancement finding.56
    B. Defense Evidence
           Childs also contends that the enhancement finding must be reversed because the
    trial court prevented him from presenting a valid defense to the enhancement. He asserts
    that subdivision (e)(1) of section 502 required the city to seek injunctive relief against
    him, that it did not do so, and that its expenditure of large amounts of money to hire
    outside experts to regain administrative control of the FiberWAN network was
    unreasonable without first attempting to pursue civil remedies. (§ 12022.6; see § 502,
    subd. (e)(1).) In the trial court, during the motion in limine phase of the case, Childs
    sought to introduce expert testimony that the city was unreasonable when it failed to
    bring an injunctive action against him. The trial court denied the motion. On appeal, he
    argues that this exclusion of evidence precluded him from putting on a defense to the
    enhancement allegation, rendering the resulting finding a violation of his constitutional
    rights to due process and a fair trial.
           Contrary to Childs‟s reasoning, subdivision (e)(1) did not require the city to seek
    civil remedies before bringing a criminal action against him. We have already rejected
    this tortured statutory interpretation. That provision allows the victim of computer
    crime—which in this case happens to be the city‟s DTIS57—to take such an action. It
    does not mandate that a civil action be brought. (§ 502, subd. (e)(1); see pt. II.A., ante.)
           The evidence that Childs offered was properly excluded because it was
    inadmissible. Relevant evidence tending to prove a disputed fact is admissible. (Evid.
    
           56
             The Attorney General also argues that by copyrighting the city‟s FiberWAN
    network, Childs took it within the meaning of the statute. As we find ample other
    evidence to support the section 12022.6 finding, we need not address this issue.
           57
              Childs‟s interpretation would only seem to apply if the victim of the computer
    crime and the county bringing the criminal prosecution were the same entity, as they are
    in the unique circumstances of the combined City and County of San Francisco. In most
    other cases, this interpretation of the intent to the statute would require the prosecution to
    sit idle while the victim sought civil restitution—an absurd result. (See People v.
    Superior Court (Mouchaourab) (2000) 78 Cal.App.4th 403, 428.)
                                                  64
    Code, §§ 210, 350.) The proffered evidence was not about a factual matter on which
    expert testimony might be relevant. Instead, it was intended to inform the jury of
    Childs‟s legal interpretation of section 502, subdivision (e)(1). Courts may not allow
    experts to offer legal conclusions disguised as opinion testimony. An expert‟s opinion on
    an issue of law is not admissible to challenge the trial court‟s interpretation of legal
    principles to be conveyed in the jury instructions. (Amtower v. Photon Dynamics, Inc.
    (2008) 158 Cal.App.4th 1582, 1599; Benavidez v. San Jose Police Dept. (1999) 71
    Cal.App.4th 853, 864-865; Summers v. A. L. Gilbert Co. (1999) 69 Cal.App.4th 1155,
    1178-1179.) The jury must follow the legal principles that the trial court provides in the
    instructions. (Amtower v. Photon Dynamics, Inc., supra, 158 Cal.App.4th at p. 1599.)
    As the proffered expert testimony was properly excluded as irrelevant, Childs was not
    deprived of a defense to the alleged enhancement. (See Amtower v. Photon Dynamics,
    Inc., supra, 158 Cal.App.4th at p. 1599; Benavidez v. San Jose Police Dept., supra, 71
    Cal.App.4th at p. 865; see also Evid. Code, §§ 210, 350.) Thus, we affirm Childs‟s
    conviction, including the enhancement finding.
                                   V. RESTITUTION ORDER
    A. Proximate Cause
           1. Trial Court Ruling
           In a second appeal, Childs raises two challenges to the trial court‟s order that he
    pay $1,485,790.31 in restitution. He first argues that the restitution order improperly
    included $1,105,929.31 in reimbursement for expenses that he reasons were not the result
    of his criminal conduct. He asks us to reduce the total restitution order to $379,861.58
           A crime victim who incurs any economic loss as the result of the commission of a
    crime is entitled to restitution from the defendant. (§ 1202.4, subd. (a)(1).) When a
    victim suffers an economic loss as a result of the defendant‟s conduct, the trial court must
    order that the defendant make full restitution to the victim. (Id., subd. (f); People v.
    Giordano (2007) 42 Cal.4th 644, 664; People v. Harvest (2000) 84 Cal.App.4th 641, 647,
    
           58
              As permitted by statute, the trial court applied the $10,744 seized from Childs at
    his arrest to the total sum owed. (§ 1202.4, subd. (f).)
                                                  65
    disapproved on another point in People v. Giordano, supra, 42 Cal.4th at p. 666, fn. 8.)
    To the extent possible, the restitution order must be of a dollar amount that is sufficient to
    fully reimburse the victim for every determined economic loss incurred as a result of the
    defendant‟s criminal conduct. (§ 1202.4, subd. (f)(3); People v. Gemelli (2008) 161
    Cal.App.4th 1539, 1542.) The right to restitution is grounded in our state constitution.
    (See Cal. Const., art. I, § 28, subd. (b)(13); People v. Keichler (2005) 129 Cal.App.4th
    1039, 1045.)
           DTIS—as the party seeking restitution—bore the burden of providing an adequate
    factual basis for its claim. (See People v. Giordano, supra, 42 Cal.4th at pp. 664, 667;
    see also § 1202.4, subd. (f).) The trial court heard evidence that expenditures after DTIS
    regained access to the FiberWAN were reasonably related to Childs‟s failure to provide
    access from July 9 to July 21. The lockout convinced DTIS officials that an assessment
    of the network configurations was necessary to maintain the integrity of the FiberWAN
    network for the city‟s departments. Some of the information in the city‟s computer
    system was sensitive and personal. DTIS and its outside vendors reviewed the
    configurations of firewalls and other security devices to which Childs had had access, in
    part to make sure that he—and other possible intruders—did not have access to the
    FiberWAN from an outside source. DTIS sought to ensure that there would be no further
    disruptions of the FiberWAN network. A prima facie case was offered that
    $1,105,929.31 was spent to monitor and respond to security threats that came to light
    after Childs locked DTIS officials out of the computer system.
           Once the victim makes a prima facie showing of economic loss incurred as a result
    of the defendant‟s criminal acts, the burden of proof shifts to the defendant to discredit
    those amounts. (People v. Gemelli, supra, 161 Cal.App.4th at p. 1543.) Childs
    challenged the scope of the restitution order that the prosecution sought. He conceded
    that DTIS was entitled to reimbursement for $379,861 spent attempting to regain
    administrative control of the FiberWAN system from July 9—when he refused to provide
    administrative access to Robinson—until July 21 when he provided that information to
    Mayor Newsom. However, he argued that $1,105,929.31 in costs incurred after he
    
                                                 66
    provided DTIS with access to the FiberWAN system could not be lawfully attributed to
    his conduct. Childs reasoned that if he had provided administrative access to the
    FiberWAN system and resigned from city service, these costs would still have been
    incurred. As such, he argued, the later-incurred costs were not attributable to his criminal
    conduct.
           The trial court reasoned that the purpose of restitution was to make the victim
    whole. It ruled that DTIS‟s expenses to insure the integrity of the network after Childs‟s
    denial of access did result from his criminal conduct. It included the disputed $1.1
    million in the restitution order to reimburse DTIS for the cost to install a new city-wide
    security system and to investigate whether Childs continued to have access to information
    stored in FiberWAN databases after his suspension.
           2. Ongoing Security and Access Issues
           On appeal, Childs again concedes that the $379,861 that DTIS spent during the
    July 9-21 period to attempt to regain administrative access to the FiberWAN network was
    properly included in the restitution order. However, he continues to challenge the trial
    court‟s conclusion that he was also required to reimburse DTIS for $1,105.929.31 spent
    to install a new city-wide security system and to determine if he improperly accessed the
    databases of city departments to view information stored there. He argues that these
    sums were not proximately caused by his denial or disruption of the FiberWAN network
    to an authorized user. Instead, he reasons that these funds were spent to upgrade the
    city‟s computer security systems and to investigate the possibility that Childs had
    engaged in conduct which there was no proximate cause to believe that he had done. He
    urges us to conclude that $1.1 million dollars of DTIS‟s expenditures were too remote
    and too unrelated to his criminal conduct to be properly included in the restitution order.
           The right of restitution is to be broadly and liberally construed. (People v.
    Keichler, supra, 129 Cal.App.4th at p. 1045; see § 1202.4, subd. (f)(3) [making non-
    exclusive list of types of economic losses].) A restitution award is committed to the
    sound discretion of the trial court, guided by the factors pertaining to the particular claim.
    (People v. Giordano, supra, 42 Cal.4th at p. 665.) The restitution order is determined
    
                                                 67
    based on proof by preponderance of evidence, not proof beyond a reasonable doubt.
    (People v. Gemelli, supra, 161 Cal.App.4th at p. 1542; People v. Keichler, supra, 129
    Cal.App.4th at p. 1045.) On appeal, we review the restitution order for an abuse of that
    discretion.59 To warrant reversal, the order must be arbitrary and capricious, by falling
    outside the bounds of reason under the applicable law and the relevant facts. (People v.
    Giordano, supra, 42 Cal.4th at p. 663; People v. Gemelli, supra, 161 Cal.App.4th at
    p. 1542; People v. Maheshwari (2003) 107 Cal.App.4th 1406, 1409.) We presume that
    the trial court‟s ruling was correct, inferring the truth of all facts supported by the record.
    (People v. Giordano, supra, 42 Cal.4th at p. 666.)
           To warrant restitution, the victim‟s economic loss must have been incurred as a
    logical result of the defendant‟s criminal conduct. (§ 1202.4, subds. (a)(1), (f); People v.
    Holmberg (2011) 195 Cal.App.4th 1310, 1320-1321; People v. Maheshwari, supra, 107
    Cal.App.4th at pp. 1409-1410 [investigative fees]; People v. Lyon (1996) 49 Cal.App.4th
    1521, 1525-1526 [asset protection; not legal costs to oppose criminal defense discovery].)
    Courts apply tort principles of proximate cause when making this determination,
    weighing in those policies that limit a person‟s responsibility for the consequences of his
    or her conduct. (People v. Holmberg, supra, 195 Cal.App.4th at p. 1321; see People v.
    Jones (2010) 187 Cal.App.4th 418, 425-427.) Under those principles, if the defendant‟s
    conduct was a substantial rather than a theoretical factor in the victim‟s loss, then the loss
    was proximately caused by the defendant‟s conduct. The key inquiry is whether
    reasonable people would regard that conduct as a cause of the loss. (People v. Holmberg,
    supra, 195 Cal.App.4th at pp. 1321-1322.)
           Childs disputes that his conduct created a security breach requiring expensive
    redesign and remediation work. He argues that when he was the system administrator,
    FiberWAN security was high, suggesting that no improved security was required after his
    removal. His argument ignores the obvious—that once he was no longer the system
    
           59
             Some cases apply a substantial evidence test, but as Childs makes a legal
    argument—not a factual challenge—the abuse of discretion standard seems more
    appropriate. (See, e.g., People v. Baker (2005) 126 Cal.App.4th 463, 468-469.)
                                                  68
    administrator, the risk that Childs himself might make what would then have become an
    unauthorized intrusion into the computer network was a risk that DTIS was reasonably
    required to assess, detect, and prevent in order to protect the integrity of the FiberWAN
    databases. DTIS was entitled to recover the expense of preserving the integrity of its
    network after Childs‟s criminal act highlighted the risks he posed to that network. (See,
    e.g., People v. Lyon, supra, 49 Cal.App.4th at p. 1525 [legal expenses spent to preserve
    victim‟s asset properly included in restitution order].)
           Childs also argues that these expenses cannot be charged to him because there was
    no evidence that he actually made an unauthorized intrusion into the network. We are
    satisfied that DTIS was not required to wait for Childs to make such an intrusion before
    taking measures to protect itself. (See People v. Mearns (2002) 97 Cal.App.4th 493, 501-
    502 [sexual assault victim relocation expenses constituted economic losses for
    restitution]; see also § 1202.4, subd. (f)(3)(J), (L) [installation of burglar alarm and
    expenses to repair credit rating as losses for purposes of restitution].) Once the potential
    for him to make unauthorized access to the FiberWAN became known, DTIS could
    reasonably expend funds to prevent him from making that potential risk an actual
    intrusion. Those expenses are an economic loss subject to restitution.
           Childs takes a narrow view of his crime, characterizing it as no more than refusing
    to provide administrative access to the FiberWAN network for twelve days. By contrast,
    courts considering the propriety of a restitution order may take a broad view of the
    evidence adduced at trial. (See, e.g., People v. Holmberg, supra, 195 Cal.App.4th at
    p. 1322 [receiving stolen property was concurrent cause of economic loss].) There can be
    more than one cause of an injury and multiple causes can result in harm. (Ibid. [one
    convicted of receiving and concealing stolen property was substantial factor in victim‟s
    economic loss].) As his criminal conduct was a substantial factor in the city‟s economic
    loss, the related expenses were properly included within the trial court‟s restitution order.
    (See, e.g., Id. at pp. 1321-1322.)
           The scope of Childs‟s criminal conduct is not as limited as he asserts. The
    evidence adduced at trial supports findings that he configured the FiberWAN network to
    
                                                  69
    preclude anyone else from having access to it, made it more vulnerable to intrusion by
    publishing its configurations as part of his copyright application, concealed the backup
    configurations and created connections that might have allowed him to have unauthorized
    and undetected access to the system. We are satisfied that the restitution order was
    within the trial court‟s discretion. Its finding was rational, well-reasoned, based on facts
    presented at the hearing, and within its broad discretion. (See, e.g., People v. Mearns,
    supra, 97 Cal.App.4th at p. 502.)
    B. Excessive Fine
            Childs next asserts that the restitution order constituted an excessive fine and urges
    its reversal on that constitutional ground.60 The United States and California
    constitutions bar the imposition of an excessive fine, either under the direct authority of
    the ban on such fines or the due process implications of a grossly excessive punishment.
    (See U.S. Const., 8th Amend.; Cal. Const., art I, § 17; Austin v. United States (1993) 509
    U.S. 602, 607-610; People ex rel. Lockyer v. R.J. Reynolds Tobacco Co. (2005) 37
    Cal.4th 707, 727-728.) A civil penalty may violate these constitutional provisions. (See,
    e.g., People ex rel. Lockyer v. R.J. Reynolds Tobacco Co., supra,37Cal.4th at pp. 726-
    731.)
            The principle of proportionality guides our inquiry into the constitutionality of a
    sizable restitution order. We consider the defendant‟s culpability, the relationship
    between the harm caused and the restitution ordered, penalties imposed by similar
    
            60
              Childs also argues that DTIS did not show that the actual harm suffered by the
    city was the equivalent of the amount of restitution ordered. This claim of error suffers
    from two flaws. First, he made no such argument in the trial court, as he was obliged to
    do. (See People v. Gemelli, supra, 161 Cal.App.4th at p. 1543; People v. O’Neal (2004)
    122 Cal.App.4th 817, 820.) Thus, he may have waived this issue by not raising it in the
    trial court. Even if the argument was properly before us, it is without merit. The cases he
    cites in support of this claim of error turn on whether a restitution order should be based
    on the amount charged by a medical provider or the lesser amount actually paid by an
    insurer. (See In re Anthony M. (2007) 156 Cal.App.4th 1010, 1013, 1018-1019; People
    v. Hove (1999) 76 Cal.App.4th 1266, 1274-1275.) As there was no evidence challenging
    DTIS‟s ample evidence that it actually paid its employees and vendors the claimed
    amounts, these cases do not bear on our analysis.
                                                  70
    statutes, and the defendant‟s ability to pay. (People ex rel. Lockyer v. R.J. Reynolds
    Tobacco Co., supra, 37 Cal.4th at p. 728; see United States v. Bajakajian (1998) 524 U.S.
    321, 334, 337-338, superseded on another point as stated in U.S. v. Del Toro-Barboza
    (9th Cir. 2012) 673 F.3d 1136, 1154.)
            Childs argues that the $1.5 million restitution ordered was disproportionate to the
    gravity of his offense. A trial court has broad discretion to determine the amount of a
    restitution order. The key inquiry is whether the amount of the forfeiture bears some
    relationship to the gravity of the offense it is intended to punish. (People v. Urbano
    (2005) 128 Cal.App.4th 396, 406.) In making this argument, Childs again minimizes his
    conduct. (See pt. V.A.2., ante.) The record establishes that he knowingly prevented the
    city from being able to use its own computer system for a period of time, deliberately
    configured that system so that no one else could access it, set it up so that anyone other
    than him attempting to enter it would erase the data stored in it, and made the network
    more vulnerable to external attack by the filing of an unauthorized copyright application.
    This evidence justifies the restitution amount ordered. (See, e.g., Id. at p. 406.)
            He also claims that this penalty is not comparable to that imposed for more
    serious, violent offenses. The Legislature commands restitution be given for economic
    losses. (§ 1202.4, subd. (a)(1); see People v. Harvest, supra, 84 Cal.App.4th at p. 647.)
    The suffering inflicted as a result of being the victim of a violent offense is not
    compensable under this provision. It is not comparable to the economic loss resulting
    from a computer crime. As the violent and nonviolent offenses are of different classes,
    those offenses are not sufficiently similar to make this comparison persuasive.
            Childs also claims that he has no ability to pay this sum. Even if he had offered
    evidence to support this assertion in the trial court, the other factors in our analysis would
    outweigh this concern. Considering all the proportionality factors, we are satisfied that
    the trial court‟s restitution order was set in an amount that did not constitute an excessive
    fine.
    C. Criminal or Civil Order
    
    
                                                  71
           Finally, Childs contends that the restitution order was punitive in nature and thus
    violated his federal and state constitutional rights to due process and to a jury trial. He
    complains that after DTIS‟s prima facie evidence of loss, the burden of proof shifted to
    him to rebut that evidence. He also objects that the order was grounded in facts found by
    the trial court by a mere preponderance of evidence. Childs reasons that he had a right to
    a jury trial on the facts necessary to impose this fine and that those facts had to be found
    beyond a reasonable doubt. He asks us to set aside the trial court‟s restitution order and
    remand the case for a jury determination of restitution. (See U.S. Const., 6th & 14th
    Amends.)61
           Courts have held that due process does not require that a restitution hearing be
    conducted with all of the formalities of a criminal prosecution. (People v. Giordano,
    supra, 42 Cal.4th at p. 662 fn. 6; People v. Harvest, supra, 84 Cal.App.4th at pp. 647-
    650; People v. Hove, supra, 76 Cal.App.4th at p. 1275; see People v. Gemelli, supra, 161
    Cal.App.4th at p. 1542; People v. Keichler, supra, 129 Cal.App.4th at p. 1045.) In 2007,
    the California Supreme Court noted that this court-approved practice had evolved before
    more recent United States Supreme Court and California Supreme Court decisions
    establishing that the right to jury trial requires that a jury determine by proof beyond a
    reasonable doubt any fact that exposes a defendant to a greater sentence. As the issue
    was not raised in that case, the California Supreme Court did no more than note that it
    might be an issue in a future case. (People v. Giordano, supra, 42 Cal.4th at pp. 662,
    fn. 6; see Cunningham v. California (2007) 549 U.S. 270, 281; People v. Black (2007) 41
    Cal.4th 799, 809.) Childs construes this language to require that the restitution issue be
    determined by a jury.
           Subsequent case law does not support this contention. Since the California
    Supreme Court decision in Giordano, the United States Supreme Court has ruled that the
    
    
           61
             Childs acknowledges that he did not object in the trial court on these grounds.
    However, these due process and jury trial issues may be considered on appeal, despite the
    lack of objection. (People v. French (2008) 43 Cal.4th 36, 46; People v. Partida (2005)
    37 Cal.4th 428, 435-436.)
                                                 72
    Sixth Amendment does not require a jury determination about whether to impose
    consecutive or concurrent terms. That issue may be resolved by the trial court alone.
    (Oregon v. Ice (2009) 555 U.S. 160, 163-164.) The determination of restitution fines was
    specifically cited as another example of issues that the high court opined could properly
    be determined by the trial court without a jury finding. (Id. at p. 171-172.)62
           Childs‟s assumption fares no better when we consider more recent California
    appellate court decisions. The California Supreme Court has yet to rule on the issue, but
    appellate courts have rejected the defendant‟s claim that section 1202.4 restitution
    constitutes an increased punishment for crime, thus rejecting a necessary predicate to
    implicate the Sixth Amendment right to jury trial. (People v. Chappelone (2010) 183
    Cal.App.4th 1159, 1184 [citing many federal cases consistent with its ruling]; People v.
    Millard (2009) 175 Cal.App.4th 7, 35-36; see People v Wilen (2008) 165 Cal.App.4th
    270, 288-289.) We are satisfied that the trial court‟s restitution order was properly
    entered, without the need for a jury determination or proof beyond a reasonable doubt.
    (See People v. Millard, supra, 175 Cal.App.4th at p. 36.)
           The judgment of conviction and the restitution order are affirmed.
    
    
    
    
           62
             Childs criticizes any reliance on this decision, as it commanded only five votes
    and engendered a vigorous dissent. A 5-4 decision of the United States Supreme Court is
    a majority decision that is binding on us.
                                                 73
                                             _________________________
                                             REARDON, J.
    
    
    We concur:
    
    
    _________________________
    RUVOLO, P. J.
    
    
    _________________________
    RIVERA, J.
    
    
    
    
    People v. Childs A129583, A132199
    
                                        74
    Trial Court:                        San Francisco Superior Court
    
    
    
    Trial Judge:                        Hon. Teri L. Jackson
    
    
    
    Counsel for Appellant:              Philip M. Brooks
                                        By appointment of the Court of Appeal
                                        pursuant to the Independent Case System
                                        First District Appellate Project
    
    
    Counsel for Respondents:            Kamala D. Harris
                                        Attorney General of California
                                        Dane R. Gillette
                                        Chief Assistant Attorney General
                                        Gerald A. Engler
                                        Senior Assistant Attorney General
                                        Catherine A. Rivlin
                                        Supervising Deputy Attorney General
                                        Karen Z. Bovarnick
                                        Deputy Attorney General
    
    
    
    
    People v. Childs A129583, A132199
    
    
    
                                                75