RENDERED: JUNE 4, 2021; 10:00 A.M.
TO BE PUBLISHED
Commonwealth of Kentucky
Court of Appeals
NO. 2020-CA-0373-MR
CHASITY SHIRLEY APPELLANT
APPEAL FROM PULASKI CIRCUIT COURT
v. HONORABLE DANIEL J. VENTERS, SPECIAL JUDGE
ACTION NO. 19-CR-00071
COMMONWEALTH OF KENTUCKY APPELLEE
OPINION
REVERSING AND REMANDING
** ** ** ** **
BEFORE: CLAYTON, CHIEF JUDGE; K. THOMPSON AND L. THOMPSON,
JUDGES.
THOMPSON, K., JUDGE: Chasity Shirley appeals from the judgment and
sentence of the Pulaski Circuit Court following a jury trial in which she was
convicted of the offense of unlawful access to a computer in the first degree, a
Class C felony, for a shoplifting offense involving use of a self-checkout register
and scanner. We reverse and remand because we agree with Shirley that she had
Walmart’s consent to use the self-checkout register and scanner.
On October 5, 2018, Shirley went shopping with her mother and
daughter at a Walmart store in Somerset, Kentucky. Walmart loss prevention
employees observed Shirley on security cameras as she shopped. After walking
around the store and picking up a few items, Shirley proceeded to the self-checkout
register. One Walmart employee, Wendy Douglas, would later testify that she
observed Shirley pretending to scan a rug and a slip cover for a couch. Instead of
scanning the correct barcodes, Douglas would allege that Shirley instead scanned
the barcode from a toothbrush. Douglas noted that the items she observed on the
camera did not match the items scanned by the computer. The difference in price
between the rug and slip cover purportedly purchased and the toothbrush was
$80.80.
As Shirley attempted to leave the store, Douglas requested that
Shirley talk to Douglas about her purchases. Shirley agreed and she, along with
her mother and child, went to an office area with Douglas. Shirley and her mother
produced their drivers’ licenses for Douglas, who looked on a computer database
to see if either had shoplifted from Walmart in the past. Shirley’s mother and child
left the store a short time later because the child was getting restless.
-2-
Shirley grew agitated and argumentative with Douglas. Eventually,
Shirley allegedly pushed past Douglas toward the exit. Douglas would claim that
Shirley elbowed her into a door while fleeing. Shirley then left the store. Douglas
acknowledged she had no lawful authority to detain Shirley.
Thereafter, Shirley was indicted on one count each of unlawful access
to a computer in the first degree pursuant to Kentucky Revised Statutes (KRS)
434.845 and robbery in the second degree pursuant to KRS 515.030. Prior to trial,
the robbery count was amended to assault in the fourth degree pursuant to KRS
508.030.
Following a jury trial, Shirley was found guilty on the charge of
unlawful access to a computer in the first degree and not guilty on the assault
charge. Shirley waived jury sentencing in exchange for the Commonwealth’s
recommended sentence of five years in prison. Shirley ultimately received a
probated sentence and was placed on conditional discharge for thirty days.
Shirley argues that the trial court erred in denying her pre- and post-
trial motions for a directed verdict of acquittal on the charge of unlawful access to
a computer in the first degree. She maintains the record conclusively demonstrates
that Walmart consented to her use of the self-checkout register and scanning
machine; therefore, an essential element of the offense—the owner’s lack of
consent to access the computer—cannot be proven.
-3-
In Commonwealth v. Benham, 816 S.W.2d 186, 187 (Ky. 1991), the
Kentucky Supreme Court restated the rule for a directed verdict as follows:
On motion for directed verdict, the trial court must draw
all fair and reasonable inferences from the evidence in
favor of the Commonwealth. If the evidence is sufficient
to induce a reasonable juror to believe beyond a
reasonable doubt that the defendant is guilty, a directed
verdict should not be given. For the purpose of ruling on
the motion, the trial court must assume that the evidence
for the Commonwealth is true, but reserving to the jury
questions as to the credibility and weight to be given to
such testimony.
“To defeat a directed verdict motion, the Commonwealth must only produce ‘more
than a mere scintilla of evidence.’” Lackey v. Commonwealth, 468 S.W.3d 348,
352 (Ky. 2015) (quoting Benham, 816 S.W.2d at 187). On appellate review, the
test for determining if a directed verdict of acquittal was required is whether
“under the evidence as a whole, it would be clearly unreasonable for a jury to find
guilt[.]” Benham, 816 S.W.2d at 187.
Whether essentially undisputed facts are sufficient to withstand a
directed verdict depends on the proper legal interpretation to be given to the
controlling statute. Commonwealth v. Montaque, 23 S.W.3d 629, 631 (Ky. 2000).
The interpretation of a statute is a matter of law. A
reviewing court is not required to adopt the decisions of
the trial court as to a matter of law, but must interpret the
statute according to the plain meaning of the act and in
accordance with the legislative intent. When reviewing a
question of law rather than a question of fact, the
reviewing court has a greater latitude to determine
-4-
whether the findings of the trial court were supported by
evidence of probative value.
Floyd County Bd. of Educ. v. Ratliff, 955 S.W.2d 921, 925 (Ky. 1997).
Therefore, we examine KRS 434.845 and the related statutes. KRS
434.845 provides as follows:
(1) A person is guilty of unlawful access to a computer in
the first degree when he or she, without the effective
consent of the owner, knowingly and willfully,
directly or indirectly accesses, causes to be accessed,
or attempts to access any computer software,
computer program, data, computer, computer system,
computer network, or any part thereof, for the
purpose of:
(a) Devising or executing any scheme or artifice to
defraud; or
(b) Obtaining money, property, or services for
themselves or another by means of false or
fraudulent pretenses, representations, or promises.
(2) Unlawful access to a computer in the first degree is a
Class C felony.
(Emphasis added.)
The lesser degrees of this crime all begin with the same statutory
language as that contained in KRS 434.845(1). See KRS 434.845(1), KRS
434.850(1), KRS 434.851(1), and KRS 434.853(1). Second, third, and fourth
degree unlawful access specifically link the amount of “loss or damage” incurred
to the penalty, with KRS 434.850 penalizing a loss or damage of $300 or more as a
-5-
Class D felony, KRS 434.851 penalizing a loss or damage of less than $300 as a
Class A misdemeanor, and KRS 434.853 penalizing such an act with no loss or
damage as a Class B misdemeanor. The definition of “[l]oss or damage” includes
“theft.” KRS 434.840(12).
KRS 434.840(9) defines “[e]ffective consent” as follows:
“Effective consent” means consent by a person legally
authorized to act for the owner. Consent is not effective if
it is:
(a) Induced by deception or coercion;
(b) Given by a person who the actor knows is not legally
authorized to act for the owner;
(c) Given by a person who by reason of age, mental
disease or defect, or intoxication is known by the
actor to be unable to make responsible property or
data dispositions; or
(d) Used for a purpose other than that for which the
consent is given[.]
(Emphasis added.)
The language used in each degree of the crime of unlawful access to a
computer is written in a very vague, expansive, and overbroad manner when all the
definitions contained in KRS 434.840 are incorporated into these statutes.1 For
example, the definition of “[a]ccess” includes “approach.” KRS 434.840(1). We
1
KRS 434.840 contains detailed definitions for the terms access, computer, computer network,
computer program, computer software, computer system, data, device, effective consent,
financial instruments, intellectual property, loss or damage, owner, property, and services.
-6-
must act judiciously in interpreting such language to avoid further broadening the
reach of KRS 434.845 in an inappropriate manner.2
Shirley argues that Walmart invites the public, as licensees, into its
stores to purchase the products it sells and then provides self-checkout machines
with attached scanners for the public to use in making purchases. She argues that
Walmart clearly gave her “effective consent” to use the scanner and its employees
did not revoke that consent even as they watched her use it under suspicion of
attempted theft. Shirley maintains she used the scanning machine in precisely the
way or purpose Walmart intended, to scan bar codes.
The Commonwealth argues that Walmart’s consent only extended to
Shirley using the scanner for the limited purpose of completing a lawful business
transaction. Under its reasoning, when her actions exceeded the scope of that
consent by using the scanner to commit a theft, the consent was no longer
“effective” as defined by KRS 434.840(9)(d).
The Commonwealth interprets the definition of “effective consent”
too broadly. There is nothing in the statutory definition which causes revocation of
Walmart’s consent under these facts.
2
We note that KRS 434.845(1) is extremely problematic when applied to theft as it is difficult to
conceive of any theft-type offense that would not fit within either of the purposes required for
unlawful access to a computer in the first degree: “(a) [d]evising or executing any scheme or
artifice to defraud; or (b) [o]btaining money, property, or services for themselves or another by
means of false or fraudulent pretenses, representations, or promises.” Therefore, KRS 434.845
effectively subsumes the lesser theft-type offenses into this Class C felony.
-7-
Walmart and its employees authorize its customers to use its self-
checkout registers so long as they are open. Customers use the self-checkout
register to scan an item, allowing its identification by barcode and for it to be “rung
up” for purchase, and then submit payment for the item and receive a receipt
thereby authorizing the customer to depart with the item.
Shirley retained the effective consent of Walmart when she used the
self-checkout register for its intended purpose, to buy items. Shirley’s actions
comported exactly with this intended purpose where she scanned a toothbrush
barcode and paid for this item, thereby making a lawful purchase. The self-
checkout register worked properly and exactly as it was intended within the scope
of the effective consent extended to Shirley and all customers.
This theft was not dependent on the scanner and, indeed, the scanner
was not used to commit the theft at all. Instead, the theft occurred in Shirley trying
to use a lawful purchase, payment, and issuance of a receipt for the toothbrush to
conceal the theft of the rug and slip cover. The self-checkout register was
irrelevant to the act other than how Shirley used it to provide “cover” for the act to
evade discovery where one clerk is typically monitoring activity on multiple self-
checkout registers.
Before bar codes, a similar act would be switching price stickers on
items and then having a store clerk “ring” them up. While such an act might be
-8-
less likely to succeed when there is a human clerk performing the sale, the theft
taking place through paying the price for one item while obtaining another is
entirely external from the computer system.
We are convinced that in amending this law in 2002, our General
Assembly could not have conceived of the way that the Commonwealth would
seek to apply it to these facts. As noted by the United States Supreme Court more
than ten years ago, we are experiencing “[r]apid changes in technology[.]”
Citizens United v. Federal Election Comm’n, 558 U.S. 310, 364, 130 S. Ct. 876,
912, 175 L. Ed. 2d 753 (2010). “[T]echnology nearly inconceivable just a few
decades ago” is now reality. Riley v. California, 573 U.S. 373, 385, 134 S. Ct.
2473, 2484, 189 L. Ed. 2d 430 (2014). One example of this rapid technological
development is the advent of “smart” cell phones, which are essentially
“minicomputers[.]” Id. at 393-94, 134 S. Ct. at 2489. They are the sort of
technology “unheard of ten years ago[.]” Id. at 385, 134 S. Ct. at 2484.
Our world has changed drastically even from when Citizens United
and Riley were written. Now many more devices in the world would fit under the
statutory language of “computer software, computer program, data, computer,
computer system, computer network, or any part thereof[.]” KRS 434.845(1).
Even “smart lights” which can be remotely accessed might fit within the reach of
these terms based on being part of a computer network by being connected to a
-9-
smart phone via the internet. See Alex Colon & Angela Moscaritolo, The Best
Smart Home Devices for 2021, PCMAG (2020), https://www.pcmag.com/news/the-
best-smart-home-devices (last visited Mar. 11, 2021) (explaining that in smart
homes all the devices in people’s lives, such as clocks, lights, window blinds,
appliances, and cooking utensils can connect to the internet so as to “communicate,
send you information, and take your commands”).
A whole store may be part of a computer system where it can now
operate to “ring” up purchases without cashiers. See Catherine Thorbecke,
Amazon Opens a Grocery Store with No Cashiers, ABC NEWS (Feb. 25, 2020,
11:04 AM), https://abcnews.go.com/Business/amazon-opens-grocery-store-
cashiers/story?id=69199966 (last visited Mar. 11, 2021) (explaining that customers
select items and are charged when they walk out of the store, with this shopping
working through similar technology to that used for self-driving cars). Any
attempt to shoplift from such a store would then merit conviction under KRS
434.845 under the Commonwealth’s reasoning.
Additionally, the varied degrees of unlawful access to a computer
should be interpreted in a manner that is consistent with our other criminal statutes.
There would be an inherent unfairness in convicting Shirley of a Class C felony for
what should be a simple misdemeanor for the theft of goods worth $80.80.
Nowhere else in our criminal laws would such a theft be treated as a felony, much
-10-
less a Class C felony and, indeed, reforms have taken place to make crimes that are
part of the Kentucky Penal Code consistently require a $500 threshold be met
before a crime becomes a felony.3 Similar crimes that are not part of the Kentucky
Penal Code also typically make use of a $500 threshold to separate felonies from
misdemeanors.4
Possibly appropriate charges for Shirley’s actions could have been
theft by deception, KRS 514.040(1)(a), or theft by unlawful taking, KRS
514.030(1)(a). Certainly, Shirley was obtaining “property . . . of another by
deception with intent to deprive the person thereof” and intentionally deceiving by
“[c]reat[ing] or reinforc[ing] a false impression” as to “value” by appearing to pay
for the items she stole. KRS 514.040(1)(a). Alternatively, she was “[t]ak[ing] or
exercis[ing] control over movable property of another with intent to deprive him
thereof[.]” KRS 514.030(1)(a). The “fit” with these crimes is easy to establish.
3
See KRS 514.040(8) (theft by deception); KRS 514.030(2) (theft by unlawful taking or
disposition); KRS 514.050(2) (theft of property lost, mislaid, or delivered by mistake); KRS
514.060(4) (theft of services); KRS 514.070(4) (theft by failure to make required disposition of
property received); KRS 514.080(3) (theft by extortion); KRS 514.090(3) (theft of labor already
rendered); 2009 Ky. Laws ch. 106 (HB 369) (eff. Jun. 25, 2009) (amending KRS 434.650,
434.670, and KRS 434.690 to change the threshold for a felony offense from $100 to $500 and
amending KRS 434.655, KRS 514.030, KRS 514.040, KRS 514.050, KRS 514.060, KRS
514.070, KRS 514.080, KRS 514.090, KRS 514.110, and KRS 514.120 to change the threshold
for a felony offense from $300 to $500).
4
See KRS 434.650(1) ($500 threshold for fraudulent use of credit or debit card); KRS 434.670
($500 threshold for failure to furnish goods, services, etc., represented in writing as furnished).
But see KRS 434.851 ($300 threshold for unlawful access); KRS 209.990(5)-(7) ($300 threshold
for exploiting a disabled adult victim); KRS 194A.990(1) ($100 threshold for illegally receiving
benefits from a governmental assistance program).
-11-
Considering the value of the property taken, either charge would constitute a Class
A misdemeanor because the property taken was valued at less than $500. KRS
514.040(8); KRS 514.030(2).
“When all else is said and done, common sense must not be a stranger
in the house of the law.” Cantrell v. Kentucky Unemployment Ins. Comm’n, 450
S.W.2d 235, 237 (Ky. 1970). As Shirley’s use of the self-checkout register to
lawfully purchase an item never exceeded the scope of Walmart’s consent, and the
use of the scanner was only peripherally related to the theft, a directed verdict
should have been granted in Shirley’s favor, and reversal of her conviction and
sentence is required as a matter of law.
Accordingly, we reverse and remand the Pulaski Circuit Court’s
judgment and sentence.
CLAYTON, CHIEF JUDGE, CONCURS.
THOMPSON, L., JUDGE, DISSENTS AND FILES SEPARATE OPINION.
THOMPSON, L., JUDGE, DISSENTING: I respectfully dissent from
the majority opinion. A person is guilty of unlawful access to a computer in the
first degree when she accesses a computer without the consent of the owner for the
purpose of obtaining property by false means. KRS 434.845. The Walmart
scanner at issue is a computer as defined by KRS 434.840(2), and Shirley admitted
using it to obtain property by false means. She did not have Walmart’s consent to
-12-
use the scanner for an unlawful purpose. Consent is “effective” in the context of
KRS Chapter 434 only when it is exercised for the purpose for which it was given.
KRS 434.840(9)(d). Walmart consented to Shirley’s use of its scanner for the
limited purpose of completing a lawful business transaction. When Shirley’s usage
of the scanner exceeded the scope of Walmart’s consent, the consent was no longer
effective. The Commonwealth proved each element of the offense.
The record amply supports the jury’s verdict that Shirley violated
KRS 434.845. As such, Shirley was not entitled to a directed verdict, and the
Pulaski Circuit Court properly so found. I would affirm the decision of the Pulaski
Circuit Court.
BRIEFS FOR APPELLANT: BRIEF FOR APPELLEE:
Steven J. Buck Daniel Cameron
Frankfort, Kentucky Attorney General of Kentucky
Mark D. Barry
Assistant Attorney General
Frankfort, Kentucky
-13-