J-A21036-17
2017 PA Super 404
COMMONWEALTH OF PENNSYLVANIA IN THE SUPERIOR COURT
OF
PENNSYLVANIA
Appellee
v.
JON ERIC SHAFFER
Appellant No. 435 WDA 2017
Appeal from the Judgment of Sentence Entered March 9, 2017
In the Court of Common Pleas of Butler County
Criminal Division at No: CP-10-CR-0000896-2016
BEFORE: BENDER, P.J.E., OLSON, J., and STABILE, J.
OPINION BY STABILE, J.: FILED DECEMBER 21, 2017
Appellant, Jon Eric Shaffer, appeals from the March 9, 2017 judgment
of sentence imposing an aggregate 6 to 12 months of incarceration followed
by 156 months of probation for possession of child pornography (18 Pa.C.S.A.
§ 6312(d)) and criminal use of a communication facility (18 Pa.C.S.A.
§ 7512). We affirm.
On November 25, 2015, a computer technician was attempting to save
files from the failing hard drive in Appellant’s laptop computer when he
discovered explicit photographic images of young girls. The technician
summoned the police, and the police arrested Appellant and charged him with
the aforementioned offenses. Appellant filed a pretrial motion to suppress the
evidence from the warrantless search and seizure of his laptop computer. The
J-A21036-17
trial court conducted a hearing on July 7, 2016, and denied the motion on
October 3, 2016. On November 10, 2016, the trial court, sitting as finder of
fact, found Appellant guilty of both charges. The trial court imposed sentence
on March 9, 2016, and Appellant filed this timely appeal on March 14, 2017.
The trial court summarized the pertinent facts:
[Appellant] delivered his laptop computer to CompuGig for
repair and completed an initial work order form that is dated
November 25, 2015. On the form, in response to the question,
‘What problems are you experiencing?’, boxes next to
‘Spyware/virus’ and ‘Can’t get to Internet’ are marked. Additional
information provided by [Appellant] at the time he delivered the
laptop to CompuGig indicated that ‘Customer’s son downloaded
some things and now there are a lot of pop-ups. Internet has
stopped working.’ After running initial diagnostics, [computer
technician Justin] Eidenmiller believed the computer had a failing
hard drive. A telephone call was made to [Appellant] by
CompuGig’s administration. During that call [Appellant] indicated
that he wished to replace the hard drive on the laptop. Mr.
Eidenmiller was not privy to the phone call. Mr. Eidenmiller
attempted to ‘take an image of the hard drive and put it on a new
hard drive at the customer’s request.’ While the hard drive was
able to be imaged, the procedure of transferring the image
successfully was unable to be completed. Another call was
apparently placed to [Appellant] regarding the matter. In an
attempt to move data from the failing hard drive to a new drive,
Mr. Eidenmiller manually opened various portions of the data
contained in the failing hard drive. In doing so, Mr. Eidenmiller
observed the evidence which [Appellant] is seeking to suppress.
Mr. Eidenmiller fist [sic] attempted to copy the entire folder that
contained the evidence at issue without opening it, but was unable
to do so. He then opened the folder in order to copy the within
files manually. At that point he observed the files at issue in the
form of thumbnail images. Mr. Eidenmiller notified his boss of the
discovery.
The police were then called and Officer [Christopher]
Maloney arrived, he spoke both to the owners of CompuGig and,
after being handed the work order and escorted to the tech area
by the owners, to Mr. Eidenmiller. Mr. Eidenmiller then went to
-2-
J-A21036-17
where [Appellant’s] laptop computer was located on a bench
inside the tech area. Mr. Eidenmiller showed Officer Maloney, at
the officer’s request, the evidence [Appellant] is seeking to
suppress. Mr. Eidenmiller prepared a statement for Officer
Maloney and Officer Maloney took possession of the computer and
hard drive that had been delivered to CompuGig, as well as other
equipment. At a later date, warrants to search the laptop and
accompanying hardware were secured by Detective Matthew Irvin
of the Cranberry Township Police Department.
Trial Court Opinion, 10/3/16, at 2-3 (record citations and footnotes omitted).
The only issue before us is whether the trial court properly suppressed
evidence from the initial warrantless search and seizure of his laptop
computer. Our standard of review is as follows:
[An appellate court’s] standard of review in addressing a
challenge to the denial of a suppression motion is limited to
determining whether the suppression court’s factual findings are
supported by the record and whether the legal conclusions drawn
from those facts are correct. Because the Commonwealth
prevailed before the suppression court, we may consider only the
evidence of the Commonwealth and so much of the evidence for
the defense as remains uncontradicted when read in the context
of the record as a whole. Where the suppression court’s factual
findings are supported by the record, [the appellate court is]
bound by [those] findings and may reverse only if the court’s legal
conclusions are erroneous. Where ... the appeal of the
determination of the suppression court turns on allegations of
legal error, the suppression court’s legal conclusions are not
binding on an appellate court, whose duty it is to determine if the
suppression court properly applied the law to the facts. Thus, the
conclusions of law of the courts below are subject to plenary
review.
Commonwealth v. Smith, 164 A.3d 1255, 1257 (Pa. Super. 2017). Article
1, Section 8 of the Pennsylvania Constitution precludes warrantless searches
of private property. PA. CONST. art. I, § 8. “Absent the application of one of
a few clearly delineated exceptions, a warrantless search or seizure is
-3-
J-A21036-17
presumptively unreasonable. Commonwealth v. Williams, 73 A.3d 609,
614 (Pa. Super. 2013) (quoting Commonwealth v. Whitlock, 69 A.3d 635,
637 (Pa. Super. 2013)), appeal denied, 87 A.3d 320 (Pa. 2014).
Both parties and the trial court rely heavily on Commonwealth v.
Sodomsky, 939 A.2d 363 (Pa. Super. 2007), another case in which a
computer technician discovered child pornography on a customer’s computer.
The Sodomsky Court concluded, under the circumstances there present, that
the customer relinquished his privacy expectation in the contents of his hard
drive. The Commonwealth and the trial court find Sodomsky controlling,
while Appellant argues that it is distinguishable and/or that it should be
overturned.
In Sodomsky, the defendant took his computer to a Circuit City and
requested installation of an optical drive and DVD burner into his computer.
Id. at 364. The store informed the defendant that it would run tests to confirm
the DVD burner was working, but did not describe that testing process in
detail. Id. In order to test the newly installed DVD burner, the technician ran
a “general search for a video” to be burned to a disc. Id. at 365. The search
returned a number of files, some of which “appeared to be pornographic in
nature due to their titles which included masculine first names, ages of either
thirteen or fourteen, and sexual acts.” Id. at 365-66. The technician clicked
on “‘the first one’ that appeared questionable, and the video contained the
lower torso of an unclothed male, and when a hand approached the male’s
-4-
J-A21036-17
penis, [the technician] immediately stopped the video.” Id. at 366. The
technician summoned police, as he had been told to do by a state police officer
under such circumstances. Id. Police responded, viewed the video clip the
technician had seen, and seized the computer. Id. Subsequently, they
obtained a warrant and discovered child pornography. Id.
The trial court granted the defendant’s motion to suppress. Central to
the dispute was whether and to what extent the defendant abandoned his
privacy interest in the computer while it was at Circuit City for the requested
work. The trial court reasoned that the defendant did not expect his
computer’s contents to be published to anyone other than Circuit City
employees. Id. at 367.
In canvassing the law of abandonment, the Sodomsky Court noted,
“[t]he issue is not abandonment in the strict property-right sense, but whether
the person prejudiced by the search had voluntarily discarded, left behind, or
otherwise relinquished his interest in the property in question so that he could
no longer retain a reasonable expectation of privacy with regard to it at the
time of the search.” Id. at 366-67 (quoting Commonwealth v. Shoatz, 366
A.2d 1216, 1220 (Pa. 1976)). Furthermore, “the Fourth Amendment protects
people, not places. What a person knowingly exposes to the public, even in
his own home or office, is not a subject of Fourth Amendment protection. But
what he seeks to preserve as private, even in an area accessible to the public,
-5-
J-A21036-17
may be constitutionally protected.” Id. at 367 (quoting Katz v. United
States, 389 U.S. 347, 351-52 (1967)).
In light of these principles, the Sodomsky Court determined that the
proper inquiry was whether the defendant’s “expectation of privacy in the
videos on the computer that he relinquished to Circuit City employees for
repairs was reasonable or whether he knowingly exposed the computer’s video
files to the public such that he voluntarily abandoned his privacy interest in
them.” Id. In other words, did the defendant “give access or knowingly risk
access to his video files.” Id. at 368. This Court disagreed with the trial
court’s analysis because “if [the defendant] exposed the video contents of his
computer to Circuit City employees, he abandoned his privacy interest in those
computer contents because those employees were members of the public.”
Id.
Applying these principles, the Sodomsky Court noted that the
defendant requested installation of a new DVD drive and was informed that
the DVD drive would be tested once installed. Id. He did not inquire about
the testing process or restrict Circuit City’s access to his files for purposes of
running that test. Id. Further, Circuit City employees discovered the illicit
material while they were testing the DVD drive in a “commercially-accepted
manner.” Id. The employees were free to choose any video file from the list
of videos to run the test. Id. at 369. In addition, the Sodomsky Court noted
that the defendant’s actions—bringing his computer to Circuit City, requesting
-6-
J-A21036-17
repairs, and failing to remove or rename the illicit files beforehand—were
volitional. Id. at 369.
The Sodomsky Court distinguished Commonwealth v. DeJohn, 403
A.2d 1283 (Pa. 1979), cert. denied, 444 U.S. 1032 (1980), wherein our
Supreme Court held that banks cannot disclose their customers’ financial
records without a search warrant. The DeJohn Court reasoned:
[T]he disclosure by individuals or business firms of their
financial affairs to a bank is not entirely volitional, since it is
impossible to participate in the economic life of contemporary
society without maintaining a bank account. In the course of such
dealings, a depositor reveals many aspects of his personal affairs,
opinions, habits and associations. Indeed, the totality of bank
records provides a virtual current biography. […] To permit a
police officer access to these records merely upon his request,
without any judicial control as to relevancy or other traditional
requirements of legal process, and to allow the evidence to be
used in any subsequent criminal prosecution against a defendant,
opens the door to a vast and unlimited range of very real abuses
of police power.
Id. at 1289–90.
Similarly, the Sodomsky Court distinguished Commonwealth v.
Davis, 743 A.2d 946 (Pa. Super. 1999), in which this Court held that tenants
retain a privacy interest in rented property despite a landlord’s right of access.
Thus, police subjected the tenant to an unreasonable search and seizure
despite the landlord’s consent to enter the property. Id. at 951-52.
Ultimately, the Sodomsky Court concluded that the defendant did not
retain a privacy interest in his video files under the circumstances of that case.
Sodomsky, 939 A.2d at 369. “If a person is aware of, or freely grants to a
-7-
J-A21036-17
third party, potential access to his computer contents, he has knowingly
exposed the contents of his computer to the public and lost any reasonable
expectation of privacy in those contents.” Id.
Appellant first argues that that Sodomsky should be overruled.
Appellant’s Brief at 11-15. That action must come, if at all, from an en banc
panel of this Court or from our Supreme Court. See Commonwealth v.
Taggert, 997 A.2d 1189, 1201 n.16 (Pa. Super. 2010) (noting that one three-
judge Superior Court panel cannot overrule another).
Appellant next argues that Sodomsky is distinguishable. In essence,
Appellant argues that he did not give or knowingly risk access to the illicit
photographs in his hard drive because the possibility of their discovery was
extremely remote, given his initial reasons for leaving his computer with
CompuGig. As noted above, Appellant stated that he could not access the
Internet and that he believed his laptop was infected by spyware or a virus.
He did not anticipate that his hard drive was failing. Nonetheless, the record
indicates that CompuGig contacted Appellant after Eidenmiller discovered the
failing hard drive, and Appellant requested that the hard drive be replaced.
Given his consent to the hard drive replacement, Appellant’s original
description of the problem is irrelevant to our analysis.
Appellant also argues that he did not anticipate—and was never told—
that CompuGig might need to access individual files in order to salvage data.
He notes that CompuGig first tried to take an image of the entire hard drive
-8-
J-A21036-17
and, when that failed, tried to copy individual folders and, when that failed,
opened folders to copy individual files. The illicit photographs happened to be
in a folder that would not copy. Appellant argues that this chain of events
was unforeseeable, and that he therefore did not legally abandon his privacy
interest in the illicit photos within the meaning of Sodomsky.
We believe Appellant reads Sodomsky too narrowly. There,
unbeknownst to the defendant, the technician intended to run a test using a
video file from the defendant’s hard drive. See Sodomsky, 939 A.2d at 364.
The defendant did not ask how that would be done, nor did he restrict the
means of doing so. See id. Thus, the defendant was uninformed and unaware
of the possibility that the technician would search video files on the
defendant’s computer. Similarly, in this case, Appellant was unaware and did
not inquire into the details of the procedure he authorized. The record reflects
that, on November 30, 2015, five days after Appellant dropped his computer
off for service, CompuGig called Appellant and informed him his hard drive
was failing. N.T. Hearing, 7/7/16, at Exhibit A. Appellant authorized
CompuGig to replace the hard and install an image of the failing drive. Id.
Four days later, on December 4, 2015, a CompuGig administrator called
Appellant to “explain that we must do an OS rebuild with data.” Id.1 Appellant
____________________________________________
1 Appellant insists he received only one phone call from CompuGig after his
initial visit. Appellant’s Brief at 17. Appellant ignores the applicable standard
of review, pursuant to which we “consider only the evidence of the
-9-
J-A21036-17
was informed that CompuGig intended to install a new hard drive and transfer
data from the old one. Id. at 20.
We find this case slightly distinguishable from Sodomsky in several
respects, but in those respects it favors the trial court’s order. The Sodomsky
defendant was unaware that the technician would need to access any of his
files. Here, in contrast, Appellant was informed that CompuGig needed to
copy and transfer all his files. In Sodomsky, the technician noticed
incriminating titles attached to the illicit video files, and he confirmed his
suspicions by opening and beginning to play one of the files. Instantly, the
illicit images appeared as thumbnail files when Eidenmiller opened a folder on
Appellant’s hard drive, and they immediately appeared2 to Eidenmiller to be
sexually explicit depictions of underage children. He conducted no further
investigation. We cannot reasonably distinguish Sodomsky on grounds that
____________________________________________
Commonwealth and so much of the evidence for the defense as remains
uncontradicted when read in the context of the record as a whole.” Smith,
164 A.3d at 1257. The record contradicts Appellant’s assertion that he
received only one phone call.
2 The Sodomsky Court expressed no opinion on whether the defendant
abandoned his privacy interest in other files, such as e-mail or financial
records. Sodomsky, 939 A.2d at 369. Similarly, we do not address whether
and to what extent a person retains a privacy interest in e-mails, financial
records, or other files whose incriminating nature might not be immediately
obvious to a technician who accesses them in the ordinary course of
performing a requested service.
- 10 -
J-A21036-17
Eidenmiller’s methods were unnecessarily intrusive or unforeseeable, as
compared to those employed in Sodomsky.
In other respects, the two cases are similar. Appellant, like the
Sodomsky defendant, did not inquire about or restrict the means of
completing the requested service. The Sodomsky Court noted the Circuit
City technicians were “testing the DVD drive’s operability in a commercially
accepted manner rather than conducting a search for illicit items.”
Sodomsky, 939 A.2d at 368. Likewise, in this case, Eidenmiller was not
searching for illicit photographs. He discovered the photographs during a file-
by-file transfer after broader, less intrusive means of transferring the data
failed. Nothing in the record suggests that Eidenmiller failed to use a
commercially accepted manner of performing the work Appellant requested.
In short, we find Sodomsky controlling. As noted above, the
Sodomsky Court concluded that abandonment occurs when a person “freely
grants to a third party, potential access to his computer contents, he has
knowingly exposed the contents of his computer to the public and has lost any
reasonable expectation of privacy in those contents.” Id. at 370. If the
Sodomsky defendant granted potential access to his illicit files under the
circumstances there present, Appellant clearly did so in the instant case.3
____________________________________________
3 Appellant seeks to avoid this result by relying on United States v. Jones,
565 U.S. 400 (2012), in which the Supreme Court ruled that, for Fourth
Amendment purposes, police engage in a search when they place a GPS unit
- 11 -
J-A21036-17
For all of the foregoing reasons, we discern no error in the order denying
Appellant’s motion to suppress evidence. We therefore affirm the judgment
of sentence.
Judgment of sentence affirmed.
Judgment Entered.
Joseph D. Seletyn, Esq.
Prothonotary
Date: 12/21/2017
____________________________________________
in a person’s vehicle. Relying on Jones, Appellant claims police “physically
occupied” and “trespassed upon” Appellant’s computer when they retrieved
the illicit files without a warrant. Appellant’s Brief at 21. We find Jones
inapposite, and Appellant’s reliance on it is not responsive to the trial court’s
finding that he abandoned his privacy interest in the illicit files.
- 12 -