Chasity Shirley v. Commonwealth of Kentucky

                     RENDERED: JUNE 4, 2021; 10:00 A.M.
                           TO BE PUBLISHED

                Commonwealth of Kentucky
                           Court of Appeals

                              NO. 2020-CA-0373-MR


CHASITY SHIRLEY                                                      APPELLANT



               APPEAL FROM PULASKI CIRCUIT COURT
v.          HONORABLE DANIEL J. VENTERS, SPECIAL JUDGE
                     ACTION NO. 19-CR-00071



COMMONWEALTH OF KENTUCKY                                               APPELLEE



                                OPINION
                        REVERSING AND REMANDING

                                   ** ** ** ** **

BEFORE: CLAYTON, CHIEF JUDGE; K. THOMPSON AND L. THOMPSON,
JUDGES.

THOMPSON, K., JUDGE: Chasity Shirley appeals from the judgment and

sentence of the Pulaski Circuit Court following a jury trial in which she was

convicted of the offense of unlawful access to a computer in the first degree, a

Class C felony, for a shoplifting offense involving use of a self-checkout register
and scanner. We reverse and remand because we agree with Shirley that she had

Walmart’s consent to use the self-checkout register and scanner.

             On October 5, 2018, Shirley went shopping with her mother and

daughter at a Walmart store in Somerset, Kentucky. Walmart loss prevention

employees observed Shirley on security cameras as she shopped. After walking

around the store and picking up a few items, Shirley proceeded to the self-checkout

register. One Walmart employee, Wendy Douglas, would later testify that she

observed Shirley pretending to scan a rug and a slip cover for a couch. Instead of

scanning the correct barcodes, Douglas would allege that Shirley instead scanned

the barcode from a toothbrush. Douglas noted that the items she observed on the

camera did not match the items scanned by the computer. The difference in price

between the rug and slip cover purportedly purchased and the toothbrush was

$80.80.

             As Shirley attempted to leave the store, Douglas requested that

Shirley talk to Douglas about her purchases. Shirley agreed and she, along with

her mother and child, went to an office area with Douglas. Shirley and her mother

produced their drivers’ licenses for Douglas, who looked on a computer database

to see if either had shoplifted from Walmart in the past. Shirley’s mother and child

left the store a short time later because the child was getting restless.




                                          -2-
             Shirley grew agitated and argumentative with Douglas. Eventually,

Shirley allegedly pushed past Douglas toward the exit. Douglas would claim that

Shirley elbowed her into a door while fleeing. Shirley then left the store. Douglas

acknowledged she had no lawful authority to detain Shirley.

             Thereafter, Shirley was indicted on one count each of unlawful access

to a computer in the first degree pursuant to Kentucky Revised Statutes (KRS)

434.845 and robbery in the second degree pursuant to KRS 515.030. Prior to trial,

the robbery count was amended to assault in the fourth degree pursuant to KRS

508.030.

             Following a jury trial, Shirley was found guilty on the charge of

unlawful access to a computer in the first degree and not guilty on the assault

charge. Shirley waived jury sentencing in exchange for the Commonwealth’s

recommended sentence of five years in prison. Shirley ultimately received a

probated sentence and was placed on conditional discharge for thirty days.

             Shirley argues that the trial court erred in denying her pre- and post-

trial motions for a directed verdict of acquittal on the charge of unlawful access to

a computer in the first degree. She maintains the record conclusively demonstrates

that Walmart consented to her use of the self-checkout register and scanning

machine; therefore, an essential element of the offense—the owner’s lack of

consent to access the computer—cannot be proven.


                                         -3-
             In Commonwealth v. Benham, 816 S.W.2d 186, 187 (Ky. 1991), the

Kentucky Supreme Court restated the rule for a directed verdict as follows:

             On motion for directed verdict, the trial court must draw
             all fair and reasonable inferences from the evidence in
             favor of the Commonwealth. If the evidence is sufficient
             to induce a reasonable juror to believe beyond a
             reasonable doubt that the defendant is guilty, a directed
             verdict should not be given. For the purpose of ruling on
             the motion, the trial court must assume that the evidence
             for the Commonwealth is true, but reserving to the jury
             questions as to the credibility and weight to be given to
             such testimony.

“To defeat a directed verdict motion, the Commonwealth must only produce ‘more

than a mere scintilla of evidence.’” Lackey v. Commonwealth, 468 S.W.3d 348,

352 (Ky. 2015) (quoting Benham, 816 S.W.2d at 187). On appellate review, the

test for determining if a directed verdict of acquittal was required is whether

“under the evidence as a whole, it would be clearly unreasonable for a jury to find

guilt[.]” Benham, 816 S.W.2d at 187.

             Whether essentially undisputed facts are sufficient to withstand a

directed verdict depends on the proper legal interpretation to be given to the

controlling statute. Commonwealth v. Montaque, 23 S.W.3d 629, 631 (Ky. 2000).

                    The interpretation of a statute is a matter of law. A
             reviewing court is not required to adopt the decisions of
             the trial court as to a matter of law, but must interpret the
             statute according to the plain meaning of the act and in
             accordance with the legislative intent. When reviewing a
             question of law rather than a question of fact, the
             reviewing court has a greater latitude to determine

                                          -4-
            whether the findings of the trial court were supported by
            evidence of probative value.

Floyd County Bd. of Educ. v. Ratliff, 955 S.W.2d 921, 925 (Ky. 1997).

            Therefore, we examine KRS 434.845 and the related statutes. KRS

434.845 provides as follows:

            (1) A person is guilty of unlawful access to a computer in
                the first degree when he or she, without the effective
                consent of the owner, knowingly and willfully,
                directly or indirectly accesses, causes to be accessed,
                or attempts to access any computer software,
                computer program, data, computer, computer system,
                computer network, or any part thereof, for the
                purpose of:

               (a) Devising or executing any scheme or artifice to
                   defraud; or

               (b) Obtaining money, property, or services for
                   themselves or another by means of false or
                   fraudulent pretenses, representations, or promises.

            (2) Unlawful access to a computer in the first degree is a
                Class C felony.

(Emphasis added.)

            The lesser degrees of this crime all begin with the same statutory

language as that contained in KRS 434.845(1). See KRS 434.845(1), KRS

434.850(1), KRS 434.851(1), and KRS 434.853(1). Second, third, and fourth

degree unlawful access specifically link the amount of “loss or damage” incurred

to the penalty, with KRS 434.850 penalizing a loss or damage of $300 or more as a


                                        -5-
Class D felony, KRS 434.851 penalizing a loss or damage of less than $300 as a

Class A misdemeanor, and KRS 434.853 penalizing such an act with no loss or

damage as a Class B misdemeanor. The definition of “[l]oss or damage” includes

“theft.” KRS 434.840(12).

              KRS 434.840(9) defines “[e]ffective consent” as follows:

              “Effective consent” means consent by a person legally
              authorized to act for the owner. Consent is not effective if
              it is:

              (a) Induced by deception or coercion;

              (b) Given by a person who the actor knows is not legally
                  authorized to act for the owner;

              (c) Given by a person who by reason of age, mental
                  disease or defect, or intoxication is known by the
                  actor to be unable to make responsible property or
                  data dispositions; or

              (d) Used for a purpose other than that for which the
                  consent is given[.]

(Emphasis added.)

              The language used in each degree of the crime of unlawful access to a

computer is written in a very vague, expansive, and overbroad manner when all the

definitions contained in KRS 434.840 are incorporated into these statutes.1 For

example, the definition of “[a]ccess” includes “approach.” KRS 434.840(1). We

1
  KRS 434.840 contains detailed definitions for the terms access, computer, computer network,
computer program, computer software, computer system, data, device, effective consent,
financial instruments, intellectual property, loss or damage, owner, property, and services.

                                              -6-
must act judiciously in interpreting such language to avoid further broadening the

reach of KRS 434.845 in an inappropriate manner.2

               Shirley argues that Walmart invites the public, as licensees, into its

stores to purchase the products it sells and then provides self-checkout machines

with attached scanners for the public to use in making purchases. She argues that

Walmart clearly gave her “effective consent” to use the scanner and its employees

did not revoke that consent even as they watched her use it under suspicion of

attempted theft. Shirley maintains she used the scanning machine in precisely the

way or purpose Walmart intended, to scan bar codes.

               The Commonwealth argues that Walmart’s consent only extended to

Shirley using the scanner for the limited purpose of completing a lawful business

transaction. Under its reasoning, when her actions exceeded the scope of that

consent by using the scanner to commit a theft, the consent was no longer

“effective” as defined by KRS 434.840(9)(d).

               The Commonwealth interprets the definition of “effective consent”

too broadly. There is nothing in the statutory definition which causes revocation of

Walmart’s consent under these facts.

2
  We note that KRS 434.845(1) is extremely problematic when applied to theft as it is difficult to
conceive of any theft-type offense that would not fit within either of the purposes required for
unlawful access to a computer in the first degree: “(a) [d]evising or executing any scheme or
artifice to defraud; or (b) [o]btaining money, property, or services for themselves or another by
means of false or fraudulent pretenses, representations, or promises.” Therefore, KRS 434.845
effectively subsumes the lesser theft-type offenses into this Class C felony.



                                               -7-
             Walmart and its employees authorize its customers to use its self-

checkout registers so long as they are open. Customers use the self-checkout

register to scan an item, allowing its identification by barcode and for it to be “rung

up” for purchase, and then submit payment for the item and receive a receipt

thereby authorizing the customer to depart with the item.

             Shirley retained the effective consent of Walmart when she used the

self-checkout register for its intended purpose, to buy items. Shirley’s actions

comported exactly with this intended purpose where she scanned a toothbrush

barcode and paid for this item, thereby making a lawful purchase. The self-

checkout register worked properly and exactly as it was intended within the scope

of the effective consent extended to Shirley and all customers.

             This theft was not dependent on the scanner and, indeed, the scanner

was not used to commit the theft at all. Instead, the theft occurred in Shirley trying

to use a lawful purchase, payment, and issuance of a receipt for the toothbrush to

conceal the theft of the rug and slip cover. The self-checkout register was

irrelevant to the act other than how Shirley used it to provide “cover” for the act to

evade discovery where one clerk is typically monitoring activity on multiple self-

checkout registers.

             Before bar codes, a similar act would be switching price stickers on

items and then having a store clerk “ring” them up. While such an act might be


                                          -8-
less likely to succeed when there is a human clerk performing the sale, the theft

taking place through paying the price for one item while obtaining another is

entirely external from the computer system.

             We are convinced that in amending this law in 2002, our General

Assembly could not have conceived of the way that the Commonwealth would

seek to apply it to these facts. As noted by the United States Supreme Court more

than ten years ago, we are experiencing “[r]apid changes in technology[.]”

Citizens United v. Federal Election Comm’n, 558 U.S. 310, 364, 130 S. Ct. 876,

912, 175 L. Ed. 2d 753 (2010). “[T]echnology nearly inconceivable just a few

decades ago” is now reality. Riley v. California, 573 U.S. 373, 385, 134 S. Ct.

2473, 2484, 189 L. Ed. 2d 430 (2014). One example of this rapid technological

development is the advent of “smart” cell phones, which are essentially

“minicomputers[.]” Id. at 393-94, 134 S. Ct. at 2489. They are the sort of

technology “unheard of ten years ago[.]” Id. at 385, 134 S. Ct. at 2484.

             Our world has changed drastically even from when Citizens United

and Riley were written. Now many more devices in the world would fit under the

statutory language of “computer software, computer program, data, computer,

computer system, computer network, or any part thereof[.]” KRS 434.845(1).

Even “smart lights” which can be remotely accessed might fit within the reach of

these terms based on being part of a computer network by being connected to a


                                         -9-
smart phone via the internet. See Alex Colon & Angela Moscaritolo, The Best

Smart Home Devices for 2021, PCMAG (2020), https://www.pcmag.com/news/the-

best-smart-home-devices (last visited Mar. 11, 2021) (explaining that in smart

homes all the devices in people’s lives, such as clocks, lights, window blinds,

appliances, and cooking utensils can connect to the internet so as to “communicate,

send you information, and take your commands”).

             A whole store may be part of a computer system where it can now

operate to “ring” up purchases without cashiers. See Catherine Thorbecke,

Amazon Opens a Grocery Store with No Cashiers, ABC NEWS (Feb. 25, 2020,

11:04 AM), https://abcnews.go.com/Business/amazon-opens-grocery-store-

cashiers/story?id=69199966 (last visited Mar. 11, 2021) (explaining that customers

select items and are charged when they walk out of the store, with this shopping

working through similar technology to that used for self-driving cars). Any

attempt to shoplift from such a store would then merit conviction under KRS

434.845 under the Commonwealth’s reasoning.

             Additionally, the varied degrees of unlawful access to a computer

should be interpreted in a manner that is consistent with our other criminal statutes.

There would be an inherent unfairness in convicting Shirley of a Class C felony for

what should be a simple misdemeanor for the theft of goods worth $80.80.

Nowhere else in our criminal laws would such a theft be treated as a felony, much


                                         -10-
less a Class C felony and, indeed, reforms have taken place to make crimes that are

part of the Kentucky Penal Code consistently require a $500 threshold be met

before a crime becomes a felony.3 Similar crimes that are not part of the Kentucky

Penal Code also typically make use of a $500 threshold to separate felonies from

misdemeanors.4

               Possibly appropriate charges for Shirley’s actions could have been

theft by deception, KRS 514.040(1)(a), or theft by unlawful taking, KRS

514.030(1)(a). Certainly, Shirley was obtaining “property . . . of another by

deception with intent to deprive the person thereof” and intentionally deceiving by

“[c]reat[ing] or reinforc[ing] a false impression” as to “value” by appearing to pay

for the items she stole. KRS 514.040(1)(a). Alternatively, she was “[t]ak[ing] or

exercis[ing] control over movable property of another with intent to deprive him

thereof[.]” KRS 514.030(1)(a). The “fit” with these crimes is easy to establish.


3
  See KRS 514.040(8) (theft by deception); KRS 514.030(2) (theft by unlawful taking or
disposition); KRS 514.050(2) (theft of property lost, mislaid, or delivered by mistake); KRS
514.060(4) (theft of services); KRS 514.070(4) (theft by failure to make required disposition of
property received); KRS 514.080(3) (theft by extortion); KRS 514.090(3) (theft of labor already
rendered); 2009 Ky. Laws ch. 106 (HB 369) (eff. Jun. 25, 2009) (amending KRS 434.650,
434.670, and KRS 434.690 to change the threshold for a felony offense from $100 to $500 and
amending KRS 434.655, KRS 514.030, KRS 514.040, KRS 514.050, KRS 514.060, KRS
514.070, KRS 514.080, KRS 514.090, KRS 514.110, and KRS 514.120 to change the threshold
for a felony offense from $300 to $500).
4
  See KRS 434.650(1) ($500 threshold for fraudulent use of credit or debit card); KRS 434.670
($500 threshold for failure to furnish goods, services, etc., represented in writing as furnished).
But see KRS 434.851 ($300 threshold for unlawful access); KRS 209.990(5)-(7) ($300 threshold
for exploiting a disabled adult victim); KRS 194A.990(1) ($100 threshold for illegally receiving
benefits from a governmental assistance program).

                                               -11-
Considering the value of the property taken, either charge would constitute a Class

A misdemeanor because the property taken was valued at less than $500. KRS

514.040(8); KRS 514.030(2).

             “When all else is said and done, common sense must not be a stranger

in the house of the law.” Cantrell v. Kentucky Unemployment Ins. Comm’n, 450

S.W.2d 235, 237 (Ky. 1970). As Shirley’s use of the self-checkout register to

lawfully purchase an item never exceeded the scope of Walmart’s consent, and the

use of the scanner was only peripherally related to the theft, a directed verdict

should have been granted in Shirley’s favor, and reversal of her conviction and

sentence is required as a matter of law.

             Accordingly, we reverse and remand the Pulaski Circuit Court’s

judgment and sentence.

CLAYTON, CHIEF JUDGE, CONCURS.

THOMPSON, L., JUDGE, DISSENTS AND FILES SEPARATE OPINION.

             THOMPSON, L., JUDGE, DISSENTING: I respectfully dissent from

the majority opinion. A person is guilty of unlawful access to a computer in the

first degree when she accesses a computer without the consent of the owner for the

purpose of obtaining property by false means. KRS 434.845. The Walmart

scanner at issue is a computer as defined by KRS 434.840(2), and Shirley admitted

using it to obtain property by false means. She did not have Walmart’s consent to


                                           -12-
use the scanner for an unlawful purpose. Consent is “effective” in the context of

KRS Chapter 434 only when it is exercised for the purpose for which it was given.

KRS 434.840(9)(d). Walmart consented to Shirley’s use of its scanner for the

limited purpose of completing a lawful business transaction. When Shirley’s usage

of the scanner exceeded the scope of Walmart’s consent, the consent was no longer

effective. The Commonwealth proved each element of the offense.

            The record amply supports the jury’s verdict that Shirley violated

KRS 434.845. As such, Shirley was not entitled to a directed verdict, and the

Pulaski Circuit Court properly so found. I would affirm the decision of the Pulaski

Circuit Court.



BRIEFS FOR APPELLANT:                    BRIEF FOR APPELLEE:

Steven J. Buck                           Daniel Cameron
Frankfort, Kentucky                      Attorney General of Kentucky

                                         Mark D. Barry
                                         Assistant Attorney General
                                         Frankfort, Kentucky




                                       -13-