RENDERED: SEPTEMBER 22, 2022
TO BE PUBLISHED
Supreme Court of Kentucky
2021-SC-0254-DG
COMMONWEALTH OF KENTUCKY APPELLANT
ON REVIEW FROM COURT OF APPEALS
V. NO. 2020-CA-0373
PULASKI CIRCUIT COURT NO. 19-CR-00071
CHASITY SHIRLEY APPELLEE
OPINION OF THE COURT BY JUSTICE HUGHES
AFFIRMING
Chasity Shirley used the self-scanner at the Walmart in Somerset to
purchase two items, paying $80.80 less than she should have paid based on
the prices at which the items were offered for sale. She accomplished this by
exchanging the barcodes on the two items she purchased with barcodes on two
less expensive items. While Shirley clearly committed a criminal act, the novel
issue before us is whether her conduct justifies conviction for unlawful access
to a computer in the first degree, a Class C felony. Kentucky Revised Statute
(KRS) 434.845 sets forth the elements necessary to establish unlawful access
to a computer in the first degree. One of the elements is that the person must
not have the “effective consent” of the owner when accessing the computer.
While a person may have “effective consent” to begin with, it is lost if the
consent is “[u]sed for a purpose other than that for which the consent is given.”
KRS 434.840(9)(d). In this case of first impression, this Court is required to
construe “purpose” in KRS 434.840(9)(d) and more specifically whether
purpose refers to an unauthorized computer-related purpose or a broader
fraudulent purpose. Based upon our conclusion that KRS 434.840(9)(d) refers
to a computer-related purpose, we ultimately conclude, like the Court of
Appeals, that the circuit court improperly denied Appellee Chasity Shirley a
directed verdict on the unlawful access to a computer in the first-degree
charge. Accordingly, we affirm the Court of Appeals’ reversal of the circuit
court’s denial of the directed verdict and remand this case to the Pulaski
Circuit Court for proceedings consistent with this Opinion.
FACTUAL AND PROCEDURAL BACKGROUND
On October 5, 2018, Chasity Shirley shopped at a Walmart store in
Somerset, Pulaski County, Kentucky, with her mother and daughter. Shirley
checked out using a self-checkout register. Loss prevention personnel, using
security cameras, observed Shirley using the register. Specifically, they
observed Shirley moving a rug and a couch slipcover across the register’s
scanner. However, the computer monitoring the register indicated that Shirley
was purchasing other less expensive items, a toothbrush or toothbrush holder.
The total difference in the price was $80.80.
As Shirley left the store, the loss prevention personnel approached
Shirley and escorted her to a nearby office to discuss her purchases. Shirley
remained in the office for a short period after her mother left with Shirley’s
2
restless child. When Shirley later left, she allegedly pushed and elbowed the
loss prevention manager as she hurriedly exited the store.
Shirley was charged with unlawfully accessing a computer in the first
degree and second-degree robbery. The robbery charge was amended to
fourth-degree assault prior to trial. The jury found Shirley not guilty on the
assault charge but guilty of first-degree unlawful access to a computer.
At trial, Shirley moved for a directed verdict on the charge that she
unlawfully accessed a computer in the first degree. She argued that the
Commonwealth failed to show that she lacked effective consent to access
Walmart’s self-checkout register, an undisputed computer. Shirley argued that
she had effective consent to use Walmart’s self-checkout register and despite
scanning a barcode not reflective of the item with which it was paired and thus
engaging in theft behavior, effective consent was maintained because she did
not use the register for a purpose other than that for which consent was
given—she scanned barcodes and while not paying full price for the items, paid
something. The Commonwealth responded that Walmart invites and gives
consent to customers to scan and pay for all items, not to scan and pay for
some items, and Walmart cannot consent for someone to commit a crime as
Shirley did when she paid less than the full price. The circuit court denied
Shirley’s motion for a directed verdict.
After the jury found Shirley guilty of first-degree unlawful access to a
computer, a Class C felony with a minimum sentence of five years, Shirley
waived jury sentencing, accepting the Commonwealth’s recommendation of a
3
five-year sentence pending presentence investigation. After spending 203 days
in jail, Shirley was sentenced to five years in prison, but the sentence was
suspended, and Shirley was placed on conditional discharge for a period of
thirty days.1
On Shirley’s appeal, the Court of Appeals in a 2-1 decision reversed the
circuit court’s denial of the directed verdict. This Court granted the
Commonwealth’s motion for discretionary review.
ANALYSIS
Kentucky Revised Statutes Chapter 434, titled “Offenses Against Property
by Fraud,” contains a section dealing with unlawful access to a computer. This
section includes: 1) KRS 434.840 Definitions (codified in 1984 and revised in
2002); 2) KRS 434.845 Unlawful access to a computer in the first degree
(same);2 3) KRS 434.850 Unlawful access to a computer in the second
1 Former Justice Venters, serving as a special judge after the prior judge left the
circuit court, entered the final judgment and sentence.
2 When codified in 1984, KRS 434.845 stated:
(1) A person is guilty of unlawful access to a computer in the first degree
when he knowingly and willfully, directly or indirectly accesses, causes to
be accessed, or attempts to access any computer software, computer
program, data, computer, computer system, computer network, or any
part thereof, for the purpose of:
(a) Devising or executing any scheme or artifice to defraud; or
(b) Obtaining money, property, or services for themselves or another by
means of false or fraudulent pretenses, representations, or promises; or
(c) Altering, damaging, destroying, or attempting to alter, damage, or
destroy, any computer, computer system, or computer network, or any
computer software, program, or data.
4
degree (same);3 4) KRS 434.851 Unlawful access in the third degree (codified in
2002);4 5) KRS 434.853 Unlawful access in the fourth degree (codified in
(2) Accessing, attempting to access, or causing to be accessed any
computer software, computer program, data, computer, computer
system, computer network, or any part thereof, even though fraud, false
or fraudulent pretenses, representations, or promises may have been
involved in the access or attempt to access shall not constitute a
violation of this section if the sole purpose of the access was to obtain
information and not to commit any other act proscribed by this section.
(3) Unlawful access to a computer in the first degree is a Class C felony.
3 When codified in 1984, KRS 434.850 stated:
(1) A person is guilty of unlawful access to a computer in the second
degree when he without authorization knowingly and willfully, directly or
indirectly accesses, causes to be accessed, or attempts to access any
computer software, computer program, data, computer, computer
system, computer network, or any part thereof.
(2) Unlawful access to a computer in the second degree is a Class A
misdemeanor.
KRS 434.850 currently states:
(1) A person is guilty of unlawful access to a computer in the second
degree when he or she, without the effective consent of the owner,
knowingly and willfully, directly or indirectly accesses, causes to be
accessed, or attempts to access any computer software, computer
program, data, computer, computer system, computer network, or any
part thereof which results in the loss or damage of three hundred dollars
($300) or more.
(2) Unlawful access to a computer in the second degree is a Class D
felony.
4 KRS 434.851 states:
(1) A person is guilty of unlawful access in the third degree when he or
she, without the effective consent of the owner, knowingly and willfully,
directly or indirectly accesses, causes to be accessed, or attempts to
access any computer software, computer program, data, computer,
computer system, computer network, or any part thereof, which results
in the loss or damage of less than three hundred dollars ($300).
(2) Unlawful access to a computer in the third degree is a class A
misdemeanor.
5
2002);5 6) KRS 434.855 Misuse of computer information (codified in 1984 and
revised in 2002); and 7) Venue (same). See 2002 Ky. Acts ch. 350 §§ 1-7; 1984
Ky. Acts ch. 210 §§ 1-5.6 The 2002 revisions and newly-enacted statutes
followed the Court of Appeals’ decision in Commonwealth v. Cocke, 58 S.W.3d
891 (Ky. App. 2001). In Cocke, the Court of Appeals affirmed the Jefferson
Circuit Court’s decision declaring then KRS 434.845(1)(c) void for vagueness.7
When amending KRS 434.845 and KRS 434.850 and enacting KRS
434.851 and KRS 434.853 in 2002, the General Assembly made the lack of
effective consent by the computer’s owner an element of each degree of
5 KRS 434.853 states:
(1) A person is guilty of unlawful access in the fourth degree when he or
she, without the effective consent of the owner, knowingly and willfully,
directly or indirectly accesses, causes to be accessed, or attempts to
access any computer software, computer program, data, computer,
computer system, computer network, or any part thereof, which does not
result in loss or damage.
(2) Unlawful access to a computer in the fourth degree is a class B
misdemeanor.
6 Unless context indicates otherwise, “computer” is used to refer to “computer
software, computer program, data, computer, computer system, computer network, or
any part thereof,” which all four degrees of unlawful access to a computer identify as
accessible.
7 Note 2, supra, contains the text of KRS 434.845, codified in 1984, at issue in
Cocke. In Cocke, the defendant, a computer programmer, after his employment
terminated and he had no authority to do so, allegedly used the modem on his home
computer to access his former employer’s computer system and then to delete certain
data from the system, stop an accounting program in progress, and change a
password. Id. at 892. The defendant argued primarily that KRS 434.845(1)(c) was too
broad in that a prosecutor could indict any person for most normal activities that are
conducted on a computer. Id. The Court of Appeals concluded: “Clearly, the statute
is void for vagueness as an authorized user cannot, from a reading of the statute,
ascertain specifically what alteration, damage or destruction is prohibited.” Id. at 894.
6
unlawful access to a computer.8 Thus in addressing this case we are required
to determine whether Shirley acted without the effective consent of Walmart
when she accessed the Walmart self-scan register.
As amended in 2002 and unchanged since, KRS 434.845 reads:
(1) A person is guilty of unlawful access to a computer in the first
degree when he or she, without the effective consent of the
owner,[9] knowingly and willfully, directly or indirectly accesses,[10]
causes to be accessed, or attempts to access any computer
software,[11] computer program,[12] data,[13] computer,[14] computer
system,[15] computer network,[16] or any part thereof, for the
purpose of:
(a) Devising or executing any scheme or artifice to defraud; or
(b) Obtaining money, property, or services for themselves or
another by means of false or fraudulent pretenses, representations,
or promises.
8 Along with revising KRS 434.845 by omitting subsection (1)(c) and then
section (2), see n.2, supra, but maintaining the other prohibited purposes in
subsections (1)(a) and (b), the General Assembly distinguished unlawful access to a
computer in the first degree from unlawful access in the second, third, and fourth
degree by not including within the lesser degrees the fraudulent purpose requirement
described in KRS 434.845(1)(a) and (b) and respectively defining the amount of loss or
damage (KRS 434.840(12) defines “loss or damage”) caused by the unlawful access to
a computer as three hundred dollars or more (a Class D felony), less than three
hundred dollars (a Class A misdemeanor), and no loss or damage (a Class B
misdemeanor). See nn. 3-5, supra.
9 KRS 434.840(13) defines “owner.”
10KRS 434.840(1) defines “access” as “to approach, instruct, communicate with,
manipulate, store data in, retrieve or intercept data from, or otherwise make use of
any resources of, a computer, computer system, or computer network.” The General
Assembly amended KRS 434.840(1) in 2002 by adding “manipulate” to the definition.
2002 Ky. Acts ch. 350 § 1.
11 KRS 434.840(5) defines “computer software.”
12 KRS 434.840(4) defines “computer program.”
13 KRS 434.840(7) defines “data.”
14 KRS 434.840(2) defines “computer.”
15 KRS 434.840(6) defines “computer system.”
16 KRS 434.840(3) defines “computer network.”
7
(2) Unlawful access to a computer in the first degree is a Class C
felony.
(Emphasis added.)
“Effective consent” is defined as “consent by a person legally authorized
to act for the owner.” KRS 434.840(9). The statute further states, however,
that consent is not effective if it is:
(a) Induced by deception or coercion;
(b) Given by a person who the actor knows is not legally authorized
to act for the owner;
(c) Given by a person who by reason of age, mental disease or
defect, or intoxication is known by the actor to be unable to
make responsible property or data dispositions; or
(d) Used for a purpose other than that for which the consent is
given.
Id.
This case presents us with the first statutory interpretation issue for KRS
434.845 since its amendment in 2002.17 Given the facts presented, we focus
particularly on the “used for a purpose other than that for which the consent is
given” language used in KRS 424.840(9)(d), part of the definition of “effective
consent.”
The Commonwealth contends that the Court of Appeals incorrectly
interpreted “effective consent” as defined in KRS 434.840 when it concluded
17 Since KRS 434.845’s amendment, prior to this case, it has only been
considered by the Court of Appeals in the context of whether a conviction both for
first-degree robbery and for first-degree unlawful access to a computer violates double
jeopardy. See Day v. Commonwealth, 367 S.W.3d 616 (Ky. App. 2012).
8
that Shirley retained the effective consent of Walmart when she used the self-
checkout register for its intended purpose, i.e., to scan barcodes and to buy
items. The Commonwealth argues that the Court of Appeals expanded the
definition of “effective consent” to include not only Walmart’s consent to use
self-checkout registers to purchase items at the listed price, but also for sales
as a result of admitted retail fraud. As before the trial court, Walmart
emphasizes that it cannot and does not consent to customers using self-
checkout registers to commit fraud and steal merchandise.
While review of a directed verdict decision often only entails reviewing the
evidence to determine if it would be clearly unreasonable for a jury to find guilt,
Commonwealth v. Benham, 816 S.W.2d 186, 187 (Ky. 1991), this case first
requires the Court to determine as a matter of law the meaning of statutory
language, a de novo review. See Commonwealth v. Montaque, 23 S.W.3d 629,
631 (Ky. 2000); Neurodiagnostics, Inc. v. Kentucky Farm Bureau Mut. Ins. Co.,
250 S.W.3d 321, 325 (Ky. 2008). Specifically, we must discern the meaning of
KRS 434.840(9)(d), the provision the Commonwealth relied on as establishing
that Shirley acted “without the effective consent” of Walmart when she used the
store’s self-checkout register.18
When dealing with a question of statutory construction, we begin with
the plain text. “The cardinal rule in construing statutes is, if possible, to
18 While the Commonwealth’s brief suggests that KRS 434.840(9)(a) is another
basis for finding Shirley did not have effective consent to access Walmart’s self-
checkout register, KRS 434.840(9)(a) has not been at issue in this case.
9
ascertain the meaning of the Legislature from the language used, and if that be
plain, clear, and unambiguous, resort to collateral rules of construction is
unnecessary.” Mills v. City of Barbourville, 117 S.W.2d 187, 188 (Ky. 1938).
“Our ultimate goal when reviewing and applying statutes is to give effect to the
intent of the General Assembly. We derive that intent from the language the
General Assembly chose, either as defined by the General Assembly or as
generally understood in the context of the matter under consideration.”
Commonwealth v. Wright, 415 S.W.3d 606, 609 (Ky. 2013). When a statute is
plain and unambiguous on its face, we are not at liberty to construe the
language otherwise. Whittaker v. McClure, 891 S.W.2d 80, 83 (Ky. 1995). “The
statute must be read as a whole and in context with other parts of the law. All
parts of the statute must be given equal effect so that no part of the statute will
become meaningless or ineffectual.” Lewis v. Jackson Energy Co-op. Corp., 189
S.W.3d 87, 92 (Ky. 2005). We presume the legislature did not intend an
absurd result. Commonwealth, Cent. State Hosp. v. Gray, 880 S.W.2d 557, 559
(Ky. 1994). With these principles in mind, we consider the meaning of KRS
434.840(9)(d).
When reading KRS 434.840(9)(d) alone, the language “used for a purpose
other than that for which the consent is given” appears ambiguous. Shirley
advocates that the meaning of “purpose” is limited to a computer context and
in this case refers to using the computer to scan barcodes and pay for
merchandise―the purpose for which Walmart made the self-scanner available
to shoppers. The Commonwealth advocates that “purpose” refers to the
10
purpose for which the defendant used the scanner―fraudulent activity. The
meaning of “purpose” within KRS 434.840(9)(d) becomes clearer when
considering the “effective consent” definition in KRS 434.840(9)(d) within the
context of KRS 434.845(1) as a whole.
Incorporating KRS 434.840(9)(d) into KRS 434.845 results in KRS
434.845(1) reading as follows:
A person is guilty of unlawful access to a computer in the first
degree when he or she, without the effective consent of the owner
[due to the computer being “used for a purpose other than that for
which the consent is given”], knowingly and willfully, directly or
indirectly accesses, causes to be accessed, or attempts to access
any computer software, computer program, data, computer,
computer system, computer network, or any part thereof, for the
purpose of:
(a) Devising or executing any scheme or artifice to defraud; or
(b) Obtaining money, property, or services for themselves or
another by means of false or fraudulent pretenses, representations,
or promises.
(Emphasis added.)
The incorporation of KRS 434.840(9)(d)’s text into KRS 434.845(1)
highlights the two express instances in which “purpose” is relevant to proving
that a person is guilty of unlawful access to a computer in the first degree―one
being the computer-related purpose consented to by the owner (part of the
concept of “effective consent”) and the other being the fraudulent purpose
intended by the criminal actor (the second use of “purpose” in the above quote,
the purpose of devising or executing a scheme or obtaining something of value
by false or fraudulent means). With the parties to this case focusing on
11
“purpose” in KRS 434.840(9)(d), the “purpose” described in KRS 434.845(1),
the fraudulent purpose for which a person must access a computer in order to
be found guilty of unlawful access to a computer in the first degree, has been
largely ignored. Shifting our attention back to consideration of the statute as a
whole brings the Commonwealth’s argument into proper perspective.
The Commonwealth argues that effective consent is lost under KRS
434.840(9)(d) when one’s “purpose” is to commit fraud when accessing a
computer because a retailer cannot consent for a person to commit crime. The
Commonwealth’s point that a retailer cannot consent for a person to commit
crime, stemming from the foundational criminal law principle that the
government decides whether to punish an individual for an act or omission in
violation of the law, is undisputed. Indeed, as expressed in KRS 434.845(1),
the General Assembly decided to punish an individual who, with the prescribed
mental state, the method of access—directly or indirectly—being of no
consequence, accesses or attempts to access a computer without the effective
consent of the owner for a fraudulent purpose as prescribed in KRS
434.845(1)(a) and (b). While the Commonwealth views KRS 434.840(9)(d) as
encompassing the fraudulent purpose to which the owner cannot consent, a
full reading of KRS 434.845(1) reveals that KRS 434.845(1)(a) and (b) codify
that fraudulent purpose plainly. KRS 434.840(9) speaks to the purpose for
which the user was granted access to the computer, e.g., a shopper granted
access to scan items, an inventory clerk granted access to monitor inventory,
12
or an accounting office employee granted access to maintain accounts
receivable.
Statutory construction principles direct that if there is an ambiguity,
“purpose” within KRS 434.845(1) and KRS 434.840(9)(d) should be read as not
creating a redundancy or an absurdity. Lewis, 189 S.W.3d at 92; Gray, 880
S.W.2d at 559. The context of this unlawful access to a computer statute leads
to the conclusion that KRS 434.840(9)(d)’s language, “used for a purpose other
than that for which the consent is given,” requires determining the computer
access purpose consented to by the owner. Although a computer owner cannot
consent to the fraudulent purpose prohibited by statute, and an interpretation
otherwise may be considered an absurdity itself, the owner can consent to
another person accessing, or making use of, see KRS 434.840(1), his computer.
The focus of KRS 434.840(9)(d), then, is the purpose for which consent to use
the computer was given.
While the General Assembly’s use of the term “purpose” within KRS
434.845(1) aids in bringing proper perspective to the arguments presented,
even if the term “purpose” were not used within KRS 434.845(1) to introduce
subsections (a) and (b) (the prohibited fraud), the Commonwealth’s point that
one cannot consent to fraud would lead to the same conclusion. So the
owner’s consent must necessarily be related to a purpose for which consent
could be given. With the context of the statute being computer access, the
owner’s consent would be related to that, not the fraudulent purpose a bad
actor desires to achieve. Consequently, if the individual accesses or makes use
13
of the computer in a computer-related manner not consented to, effective
consent is lost.
With the determination that KRS 434.840(9)(d) does not refer to whether
the individual is accessing a computer to commit fraud but does refer to
whether the individual is accessing a computer in the way consented to by the
owner, we must conclude that Shirley was entitled to a directed verdict on the
charge of unlawful access to a computer in the first degree. Shirley accessed
Walmart’s self-checkout register by scanning barcodes and making payment,
access specifically created and intended for Walmart shoppers. Changing the
barcodes on certain merchandise prior to scanning it did not result in Shirley
accessing Walmart’s self-checkout register in a way to which Walmart did not
consent. She used the scanner as intended and consented to by its owner.
Our close reading of the unlawful computer access statute is not
unprecedented. Although the language in similar statutes around the country
varies, the principle we have identified―for what purpose has the computer
owner consented to its use―has surfaced in several jurisdictions. For example,
in State v. Nascimento, 379 P.3d 484 (Or. 2016), the Supreme Court of Oregon
addressed an unlawful computer access statute that used the language
“without authorization” rather than our “without effective consent.” The
defendant was convicted of theft and computer crime for using a terminal
located at her convenience store workplace and connected to the Oregon State
Lottery system to print lottery tickets for which she did not pay. In reversing
the unlawful computer access conviction, the Court stated:
14
[T]he text supports defendant’s assertion that her use of the lottery
terminal to print Keno tickets—as she was trained and permitted
by her employer to do—was “authorized” use. The fact that she
printed the tickets for her own use and did not pay for them may
have violated company policies and other parts of the computer
crime statute (in addition to the theft statute), but her use was not
“without authorization” as that term is used in ORS 164.377(4)
. . . . When defendant physically accessed and used the terminal
to print Keno tickets, that access and use was authorized by her
employer. Moreover, there was, for example, no evidence that
defendant circumvented any computer security measures, misused
another employee’s password, or accessed any protected data.
Id. at 491-92. The Oregon legislative history also reflected that the statute was
intended to criminalize use of a computer by someone with no authority to use
it, use by unauthorized third parties commonly referred to as “hackers.” Id. at
492. The Court concluded that Nascimento’s impermissible use of the
computer could lead to other criminal charges but not the unlawful access
charge. Id. at 493. Notably, her companion theft conviction for the lottery
ticket misconduct was not even challenged on appeal. See also State v.
Thompson, 135 A.3d 166 (N.J. Super. Ct. Law Div. 2014) (defendants subject to
computer theft statute because they acted “without authorization or in excess
of authorization” when they used their lawful access to police department
computer system as IT specialists, granted for the purpose of conducting
maintenance and correcting problems within email system, for a different
purpose, namely accessing and reading private emails of executive staff against
whom they had pending litigation).
“When presented with a motion for a directed verdict, a court must
consider the evidence as a whole, presume the Commonwealth’s proof is true,
15
draw all reasonable inferences in favor of the Commonwealth, and leave
questions of weight and credibility to the jury.” Acosta v. Commonwealth, 391
S.W.3d 809, 816 (Ky. 2013) (citing Benham, 816 S.W.2d at 187–88). A trial
court should deny a directed verdict when the “Commonwealth has produced
. . . more than a scintilla [of evidence] and it would be reasonable for the jury to
return a verdict of guilty based on it.” Id. “On appellate review, the standard is
slightly more deferential; the trial court should be reversed only if ‘it would be
clearly unreasonable for a jury to find guilt.’” Id.
Here, the evidence reflected that Shirley scanned barcodes, albeit
barcodes which did not reflect the items with which they were paired. The
Commonwealth did not present proof that Shirley accessed Walmart’s self-
checkout register beyond the consented-to barcode scanning for completion of
a self-checkout sales transaction. Without that proof, it was clearly
unreasonable for the jury to find Shirley guilty of unlawful access to a
computer in the first degree. The circuit court erred by denying Shirley’s
motion for a directed verdict of acquittal.
Finally, we agree with the Court of Appeals that our Penal Code has
other possibly appropriate charges for Shirley’s unlawful actions at Walmart
that day including theft by deception, KRS 514.040(1)(a), or theft by unlawful
taking, KRS 514.030(1)(a). The “fit” with both of those crimes is easily seen.19
As the appellate court also noted, considering the value of property taken in
19 As noted above, Shirley admitted to the jury that her behavior constituted a
theft.
16
this case (less than $500) either charge would constitute a misdemeanor, a
level of criminal offense far more in keeping with the offending conduct than a
Class C felony.
CONCLUSION
For the foregoing reasons, the Court of Appeals’ decision reversing the
Pulaski Circuit Court’s denial of a directed verdict on the unlawful access to a
computer in the first degree charge is affirmed.20 This case is remanded to the
Pulaski Circuit Court for proceedings consistent with this Opinion.
All sitting. All concur.
20 Because we affirm the Court of Appeals upon consideration of the primary
issue advanced in favor of a directed verdict, whether Shirley maintained effective
consent to use Walmart’s self-checkout register despite replacing the barcodes on
more expensive items with barcodes of less expensive items, we do not reach the
alternative issue Shirley advanced. She also presented the argument that the crime of
unlawful access to a computer in the first degree does not apply to cases in which the
harms are under three hundred dollars. Shirley argued that with the crimes of
unlawful access to a computer in the second, third and fourth degree being dependent
on the dollar amount of harm involved, see nn. 3-5, the first-degree charge should
only apply where the lesser offenses do not. Shirley argued that unlawful access to a
computer in the third degree, a Class A misdemeanor, applies when the loss or
damage is less than three hundred dollars.
17
COUNSEL FOR APPELLANT:
Daniel J. Cameron
Attorney General of Kentucky
Michael Robert Wajda
Assistant Solicitor General
COUNSEL FOR APPELLEE:
Steven Jared Buck
Assistant Public Advocate
18