Com. v. Derr, E.

J-A27025-22 2023 PA SUPER 54 COMMONWEALTH OF PENNSYLVANIA : IN THE SUPERIOR COURT OF : PENNSYLVANIA Appellant : : : v. : : : ERIC BRADLEY DERR : No. 290 MDA 2022 Appeal from the Order Entered January 11, 2022 In the Court of Common Pleas of Lycoming County Criminal Division at No(s): CP-41-CR-0000222-2021 COMMONWEALTH OF PENNSYLVANIA : IN THE SUPERIOR COURT OF : PENNSYLVANIA Appellant : : : v. : : : ERIC BRADLEY DERR : No. 291 MDA 2022 Appeal from the Order Entered January 11, 2022 In the Court of Common Pleas of Lycoming County Criminal Division at No(s): CP-41-CR-0000507-2021 BEFORE: DUBOW, J., McLAUGHLIN, J., and COLINS, J.* OPINION BY McLAUGHLIN, J.: FILED: MARCH 31, 2023 The Commonwealth of Pennsylvania appeals from the order granting Eric Bradley Derr’s pretrial petition for a writ of habeas corpus. The Commonwealth argues the court erred in determining it had not presented a prima facie case that Derr had committed Unlawful Use of a Computer and ____________________________________________ * Retired Senior Judge assigned to the Superior Court. J-A27025-22 Other Computer Crimes (“Unlawful Use of a Computer”). See 18 Pa.C.S.A. § 7611(a)(2). We reverse. In December 2020, the Commonwealth filed a complaint charging Derr with several crimes, including Unsworn Falsification to Authorities, Tampering with Public Records, Obstruction of the Administration of Law, and multiple counts of Unlawful Use of a Computer.1 The latter charges were under subsection (a)(1) of the Unlawful Use of a Computer statute. That subsection provides that a person commits an offense when the person “accesses or exceeds authorization to access” a computer, computer system, computer network, computer database, or certain other things, “with the intent to interrupt the normal functioning of a person or to devise or execute any scheme or artifice to defraud or deceive or control property or services by means of false or fraudulent pretenses, representations or promises[.]” 18 Pa.C.S.A. § 7611(a)(1). The complaint alleged that Derr, a police officer for the Williamsport Police Department, had become romantically involved with a woman he encountered during a drug arrest. Criminal Complaint, Docket No. CP-41-CR- 0000222-2021, 12/15/20, at 6. Derr thereafter assisted the woman, and her “drug associate,” to avoid encounters with the police and evade criminal ____________________________________________ 1 See 18 Pa.C.S.A. §§ 4904(a), 4911(a)(1), 5101, and 7611(a)(1), respectively. The Commonwealth also charged Derr with Hindering Apprehension or Prosecution, Official Oppression, and Criminal Coercion, but later withdrew those charges. See 18 Pa.C.S.A. §§ 5105(a)(3), 5301(1), and 2906(a)(4), respectively. -2- J-A27025-22 prosecution. Id. Derr “r[a]n her license [and] registration” to “check to see if she had any warrants and whether she still had a license.” Id. After the relationship ended, Derr continued to “run” the men she dated. Id. The complaint further alleged that Derr had investigated another woman for a summary retail theft offense, but did not file charges against her, despite telling the store that he would. Id. at 7. Derr obtained oral sex from the woman in exchange for resolving the case without prosecution. He also falsely wrote in the police report that the stolen items had been recovered. Id. at 7- 8. Derr later responded to an emergency call to the woman’s home when she overdosed, and she claims he took a bag of heroin from her during the incident. Id. at 8. According to the complaint, the investigation into Derr uncovered that Derr had used his access to the Pennsylvania Justice Network (“JNET”) for personal reasons, which violated the user agreement and was prohibited by the Williamsport Police Department. Id. at 9. The complaint alleged that, “between 6/14/2015 and 12/11/2019, Derr ran a total of 93 illegitimate JNET checks on 28 different women.” Id. Following a preliminary hearing, the Magisterial District Court dismissed the Unlawful Use of a Computer charges. The court found that the Commonwealth had not presented prima facie evidence that Derr had violated subsection (a)(1) of the Unlawful Use of a Computer statute. The court bound the remaining charges for trial and assigned them a Common Pleas docket number (the “Unsworn Falsification docket”). -3- J-A27025-22 The Commonwealth refiled the Unlawful Use of a Computer charges – 28 counts – this time under subsection (a)(2). That subsection states that a person commits an offense when the person “intentionally and without authorization accesses or exceeds authorization to access, alters, interferes with the operation of, damages or destroys” any of several enumerated things, including a computer, computer system, computer network, or computer database. 18 Pa.C.S.A. § 7611(a)(2). The court issued a scheduling order regarding the refiled charges, stating, “If the charges are bound over for court[,] they shall be consolidated with the [charges previously bound over for trial].” Order, Unsworn Falsification docket, 4/1/21, at 1. The new complaint repeated the allegations from the first complaint that Derr had used JNET for illegitimate reasons 93 times, including on the woman who had been part of the drug arrest and the woman who had committed retail theft. See Criminal Complaint, Docket No. CP-41-CR-0000507-2021, 2/25/21, at 4-5. The complaint also detailed that Derr had used the JNET system to run illegitimate checks on several other women, including a coworker, a coworker’s wife, and a county employee. Id. at 5. The complaint further alleged that another officer reported that when he was a student intern and riding in the police car with Derr, Derr would look up women on JNET to ask the student if he thought the women were “hot.” Id. at 6. At a preliminary hearing, Captain William Bolt testified that JNET “is the system utilized to hold special information to include PennDOT records, wants and warrants, and other electronic personally identifiable information on -4- J-A27025-22 persons who live within and outside of the Commonwealth of Pennsylvania.” N.T., 4/15/21, at 11. He stated that JNET is for law enforcement personnel and not accessible by the general public. Id. To gain access to JNET, a law enforcement officer must attend training and complete a certification exam, and Derr completed the certification process. Id. at 11-12, 13. As part of the process, personnel must agree to the JNET user agreement. Id. at 13. Officer Bolt explained that users must also agree to the JNET terms of use every time they access JNET. The terms of use include “how it should be utilized, when it can be utilized[.]” Id. at 12. He further testified that JNET is “for criminal investigation purposes only or for other official purposes. It is not to be used for personal use[.]” Id.; see also id. at 21. He said that law enforcement personnel are “specifically told” during the certification training that the ban on personal use means “not to look up your personal information, your spouse, friends, et cetera,” unless there is a criminal investigative purpose. Id. at 12-13. The Commonwealth introduced into evidence copies of JNET user agreements dated 2013, 2014, 2016, and 2019, all of which contained language prohibiting use for non-official purposes. See id. at 14-16, 48. The 2013 agreement states that “JNET data shall not be used for personal use under any circumstances. Personal use is defined as querying or viewing records that are not relevant to your criminal justice or official purposes.” Id. at 14-15. The 2014 agreement contains a similar prohibition: “[B]y accessing -5- J-A27025-22 and using JNET, you shall . . . not use JNET for personal or non-criminal justice purposes.” Id. at 15. The 2016 user agreement also contained such a ban: “[B]y accessing and using JNET, you agree to . . . not use any JNET resource for personal, non-criminal justice or non-governmental purposes. Personal use is defined as querying or viewing records that are not relevant to a criminal justice or official government purpose, including your own.” Id. at 16. Likewise, the 2019 agreement provides: [B]y accessing and using JNET, you agree to . . . not use any JNET resource or application or data provider content for personal or non-governmental purposes. Personal use is defined as querying or viewing data provider content that is not relevant to a criminal justice or official governmental purpose, including your own records. Id. at 16-17. The agreements advised Derr that a violation could result in sanctions, including criminal prosecution. Id. at 46-47. The magisterial district judge bound the charges for trial and docketed them in Common Pleas Court (the “Unlawful Use of a Computer docket”). In Common Pleas Court, the Commonwealth filed a notice of joinder for the two cases. Derr did not assert any objection to the notice or move for severance. Each docket thereafter listed the number of the other docket as a “joined” case. See Unlawful Use of a Computer docket, Printed 3/24/22, at 1, Related Cases; Unsworn Falsification docket, Printed 3/24/22, at 1, Related Cases. -6- J-A27025-22 Derr then filed an omnibus pretrial motion that included a petition for a writ of habeas corpus.2 Derr argued the Commonwealth had failed to present a prima facie case that he had violated the Unlawful Use of a Computer statute, subsection (a)(2). He later filed a supplement to the petition in which he argued the charges were contrary to the United States Supreme Court’s holding in Van Buren v. United States, 141 S. Ct. 1648 (2021). After argument, the court granted the petition and dismissed the Unlawful Use of a Computer charges. Relying on Van Buren, the court concluded that while Derr had violated the rules of use for JNET, he had not exceeded his authorization to access JNET. The court also opined as follows: If the “exceeds authorized access” clause criminalizes every violation of a computer-use policy, then millions of otherwise law- abiding citizens are criminals. Take the workplace. Employers commonly state that computers and electronic devices can be used only for business purposes. So on the Commonwealth’s reading of the statute, an employee who sends a personal email or reads the news using her work computer has violated the statute. We find it hard to believe that the legislature intended to make a felony out of performing internet-based Christmas shopping on an employee’s lunch hour. In that regard the employee had access to the Internet but was violating a company policy. Memorandum and Order, 1/11/22, at 4 (unpaginated). The order dismissing the Unlawful Use of a Computer charges did not reference, and was not docketed at, the Unsworn Falsification docket, despite the two cases having been joined. Nonetheless, the Commonwealth filed a ____________________________________________ 2Derr also sought a writ of habeas corpus on the Unsworn Falsification docket. The court denied the request. -7- J-A27025-22 notice of appeal from the order at each docket. Each notice of appeal included a Pa.R.A.P. 311(d) certification that the order would terminate or substantially handicap the Commonwealth’s ability to prosecute the cases because “these two dockets arise in part from the same criminal episode” and “the Commonwealth may be precluded from proceeding on the dismissed charges by Double Jeopardy and/or Rule 110.” Notice of Appeal, Unsworn Falsification docket, 1/31/22, at 1; Notice of Appeal, Unlawful Use of a Computer docket, 1/31/22, at 1.3 This Court, per curiam, issued a Rule to Show Cause why we should not quash the appeal relating to the Unsworn Falsification docket, as it is from an order that is not entered on that docket. This Court later discharged the Rule and referred the issue to the instant panel. The Commonwealth raises the following issues: A. Should the appeal docketed at 290 MDA 2022 be quashed as taken from a purported order that is not entered upon the appropriate docket of the lower court insofar as the two criminal dockets had been properly joined by the Commonwealth pursuant to Pa.R.Crim.P. 582, arose in part from the same criminal episode, and the Commonwealth has no authority over how the Lycoming County Clerk of Courts dockets filings on joined cases? B. Did the trial court err in granting [Derr]’s writ of habeas corpus and dismissing all counts of unlawful use of a computer, 18 Pa.C.S. § 7611(A)(2), where the court incorrectly concluded that Van Buren v. United States, 141 S. Ct. 1648 (U.S. 2021), governed the interpretation of “exceeding authorization” as used ____________________________________________ 3 See also Pa.R.A.P. 311(d) (“the Commonwealth may take an appeal as of right from an order that does not end the entire case where the Commonwealth certifies in the notice of appeal that the order will terminate or substantially handicap the prosecution”). -8- J-A27025-22 in § 7611(A)(2), and that [Derr] could not be guilty of that offense insofar as he had authority to access the JNET database, regardless of whether his purpose or motive in accessing JNET exceeded his authorization? Commonwealth’s Br. at 4 (suggested answers omitted, italics added). I. The Appeal at the Unsworn Falsification Docket The Commonwealth argues that we should not quash the appeal at the Unsworn Falsification docket even though the order under appeal was not entered on that docket, does not reference that docket number, and does not directly pertain to those charges. The Commonwealth asserts that if we quash the appeal, it would be forced to go to trial on the charges at the Unsworn Falsification docket to avoid dismissal of those charges pursuant to the speedy trial rule. See Pa.R.Crim.P. 600. However, the Commonwealth argues, if it proceeds to trial at that docket, and in this appeal we reverse the grant of habeas corpus as to the Unlawful Use of a Computer charges, the compulsory joinder rule will preclude it from trying the Unlawful Use of a Computer charges because those charges arose out of the same criminal episode as the Unsworn Falsification charges. See 18 Pa.C.S.A. § 110(1)(ii) (barring second trial for “any offense based on the same conduct or arising from the same criminal episode”). Derr counters that we should quash the appeal at the Unsworn Falsification docket. He contends that the charges in the two dockets did not arise out of the same criminal episode because “each of the charges relate to different dates as well as different activities.” Derr’s Br. at 2. -9- J-A27025-22 We will not quash. Rule of Criminal Procedure 582 allows the Commonwealth to join offenses that are based on the “same act or transaction.” Pa.R.Crim.P. 582(A)(1)(b). The Rule provides that “[n]otice that offenses . . . charged in separate indictments or informations will be tried together shall be in writing and filed with the clerk of courts.” Pa.R.Crim.P. 582(B)(1). Rule 582 is based on the compulsory joinder rule, which provides that “if all offenses arising from the same criminal episode or transaction are not tried together, subsequent prosecution on any such offense not already tried may be barred.” Id., cmt. (citing 18 Pa.C.S. §§ 109-110).4 Charges involve a single criminal episode if there is a temporal relationship between the charges and there is a logical relationship between the offenses such that, if the charges are tried separately, there will occur a substantial duplication of either factual or legal issues. Commonwealth v. Brown, 212 A.3d 1076, 1083 (Pa.Super. 2019). Rule 582’s notice of joinder provision thus works in tandem with the compulsory joinder rule and enables the Commonwealth to avoid the difficulty it has encountered here. In the present circumstances, if we quash, the Commonwealth likely will face the very difficulty Rule 582 permitted it to avoid by joining the cases. Furthermore, joinder was proper. The Unlawful Use of a Computer charges are temporally and logically linked to the other charges, as described above, and joinder thus prevented substantial duplication of at least ____________________________________________ 4We may consult the explanatory comments of the committee that worked on a rule. Commonwealth v. Lockridge, 810 A.2d 1191, 1195 (Pa. 2002). - 10 - J-A27025-22 factual issues. Although the order on appeal was not entered on the Unsworn Falsification docket, it was entered on the Unlawful Use docket, and given the propriety of the joinder, we consider the order to have been entered on the appropriate docket. See Pa.R.A.P. 301(a)(1). We decline to quash. II. Unlawful Use of a Computer The Commonwealth argues the trial court erred in dismissing the charges for Unlawful Use of a Computer. It points out that under the predecessor statute, this Court affirmed a conviction for an officer’s unauthorized use of police computer equipment. It emphasizes that we did so even though the predecessor statute only barred “intentionally and without authorization” accessing a computer, computer system, etc., and not “exceed[ing] authorization.” See Commonwealth’s Br. at 26-28 (citing Commonwealth v. McFadden, 850 A.2d 1290 (Pa.Super. 2004)). The Commonwealth further argues that the United States Supreme Court’s decision in Van Buren is not controlling, because in that case, the Supreme Court was construing a federal statute and the Court’s holding turned on that statute’s unique definition of “exceeds authorized access,” which it maintains is not present in the subject statute. Id. at 28-30 (citing Van Buren, 141 S.Ct. at 1655-57). The Commonwealth also contests the trial court’s policy rationale. The Commonwealth stresses that policy concerns cannot supplant the plain meaning of the statute’s text. It also contends that charges for using a work computer for shopping, such as the trial court described, would be dismissed - 11 - J-A27025-22 as de minimis infractions, if they were even charged. It contrasts such infractions with the instant facts, which it characterizes as a gross abuse of power. Derr responds that because Van Buren turned on similar statutory language and facts, the trial court did not err in following it. According to Derr, as the Van Buren Court concluded, the statutory words “exceeds authorization to access” “do not cover improper motives for obtaining information that otherwise would be available to” the person. Derr’s Br. at 7. He contends that he was authorized to access all the information in JNET, and therefore did not exceed his authorization when he accessed the information at issue, albeit for personal reasons. He also argues that McFadden, which considered only whether an officer acted “without authorization” in accessing a computer, should not influence our interpretation of whether he “exceed[ed] authorization to access” JNET. We review a decision to grant a pretrial petition for a writ of habeas corpus by examining the evidence and reasonable inferences derived therefrom in a light most favorable to the Commonwealth. See Commonwealth v. Dantzler, 135 A.3d 1109, 1111-12 (Pa.Super. 2016). We then ask whether the Commonwealth presented at the preliminary hearing a prima facie case of the crime charged. See id. at 1112. “A prima facie case exists when the Commonwealth produces evidence of each of the material elements of the crime charged and establishes probable cause to warrant the belief that the accused committed the offense.” Commonwealth v. Karetny, - 12 - J-A27025-22 880 A.2d 505, 514 (Pa. 2005). Whether the Commonwealth has presented a prima facie case is a question of law. Dantzler, 135 A.3d at 1112. Statutory interpretation is also a question of law. Commonwealth v. Gamby, 283 A.3d 298, 304 (Pa. 2022). Our scope of review is therefore plenary, and our standard of review is de novo. Id. This issue calls on us to engage in statutory construction. We therefore follow the instructions of the Statutory Construction Act. See 1 Pa.C.S.A. §§ 1501-1991; Gamby, 283 A.3d at 306. The Act directs us that "[w]hen the words of a statute are clear and free from all ambiguity, the letter of it is not to be disregarded under the pretext of pursuing its spirit.” 1 Pa.C.S.A. § 1921(b). Thus, “when the terms of a statute are clear and unambiguous, they will be given effect consistent with their plain and common meaning.” Gamby, 283 A.3d at 306 (citing 1 Pa.C.S.A. § 1921(b)); Commonwealth v. Kelley, 801 A.2d 551, 554 (Pa. 2002)). If, on the other hand, the statutory language is not explicit, we follow the instructions of the Statutory Construction Act to ascertain the General Assembly’s intent. We do so by considering the factors listed in Section 1921(c), which include such matters as “[t]he object to be attained” and “[t]he consequences of a particular interpretation.” See 1 Pa.C.S.A. § 1921(c). Similarly, the Crimes Code instructs that its provisions “shall be construed according to the fair import of their terms.” 18 Pa.C.S.A. § 105. Only “when the language is susceptible of differing constructions” shall a statute “be - 13 - J-A27025-22 interpreted to further the general purposes stated in this title and the special purposes of the particular provision involved.” Id. To discern the meaning of statutory language, or whether any ambiguity exists, we construe the statutory words and phrases “according to the rules of grammar and according to their common and approved usage.” 1 Pa.C.S.A. § 1903. We may consult dictionary definitions. Gamby, 283 A.3d at 307. We must also view the words in context. Id. at 306 (citing 1 Pa.C.S.A. § 1903); 308 (citing In re J.W.B., 232 A.3d 689, 699 (Pa. 2020)). The Commonwealth charged Derr with violating subsection (a)(2) of Unlawful Use of a Computer. That provision states, A person commits the offense of unlawful use of a computer if he: ... (2) intentionally and without authorization accesses or exceeds authorization to access, alters, interferes with the operation of, damages or destroys any computer, computer system, computer network, computer software, computer program, computer database, World Wide Web site or telecommunication device or any part thereof[.] 18 Pa.C.S.A. § 7611(a)(2). Here, the Commonwealth alleged that when Derr looked up information in JNET for personal reasons, he exceeded his authorization to access that computer system. Our task, therefore, is to determine whether the terms “exceeds authorization to access . . . any . . . computer [or] computer system - 14 - J-A27025-22 . . . or any part thereof” apply to the charged conduct in light of the above principles of statutory construction.5 The trial court followed Van Buren, which the Commonwealth maintains was erroneous. There, the defendant was a law enforcement officer who had used the computer in his patrol car to obtain information from a law enforcement database for personal reasons. He was charged with violating the federal Computer Fraud and Abuse Act of 1986 (“CFAA”). That act imposes criminal liability when a person “intentionally accesses a computer without authorization or exceeds authorized access” and obtains information. 18 U.S.C. § 1030(a)(2). The United States Supreme Court concluded that the defendant’s acts did not fall within the CFAA’s parameters. It observed the CFAA explicitly defines “exceeds authorized access” as “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accessor is not entitled so to obtain or alter.” See 18 U.S.C. § 1030(e)(6). The Court noted that the parties agreed that Van Buren had “access[ed] a computer with authorization” and had “obtain[ed]” information in the computer. Van Buren 141 S. Ct. at 1654. The issue was whether he was “entitled so to obtain” the information. Id. The Court concluded that he ____________________________________________ 5 The parties do not dispute that JNET qualifies as “a computer system, computer network, computer software, computer program, [or] computer database[.]” 18 Pa.C.S.A. § 7611(a)(2). For purposes of this opinion, we will refer to it as a “system,” as that is how it was referred to at the preliminary hearing. - 15 - J-A27025-22 was. Referring to dictionary definitions, it found that the word “so” referred to “the previously stated ‘manner or circumstance’ in the text” of the statute. Id. at 1655. The Court thus found that the CFAA was limited to cases in which a person obtains information “from particular areas in the computer—such as files, folders, or databases—to which their computer access does not extend.” Id. at 1652. Derr does not contend that the Unlawful Use of a Computer statute is ambiguous. Rather, he argues that the plain language of the statute does not encompass the allegations against him, for the reasons set forth in Van Buren. The reliance on Van Buren is misplaced. Not only was the Court engaging in statutory construction of a federal statute, but the CFAA also differs from Pennsylvania’s Unlawful Use of a Computer statute in an important way. Key to the Van Buren Court’s decision was the statutory definition of “exceeds authorized access” and its use of the phrase “is not entitled so to obtain.” However, the Unlawful Use of a Computer statute does not employ a definition of the phrase “exceeds authorized access” or anywhere use “is not entitled so to obtain.” The General Assembly has given us a definition of “access” that applies to this statute. “Access,” for present purposes, means, “To intercept, instruct, communicate with, store data in, retrieve data from or otherwise make use of any resources of a computer, computer system, computer network or database.” 18 Pa.C.S.A. § 7601. - 16 - J-A27025-22 However, there is no statutory definition of “exceeds” and “authorized.” We therefore turn to their plain, ordinary meaning. According to Merriam- Webster, to “exceed” means “to be greater than or superior to,” “to go beyond a limit set by,” or “to extend outside of.”6 “Authorization” is defined by Black’s Law Dictionary as “[o]fficial permission to do something; sanction or warrant,” or “[t]he official document granting such permission.”7 The synthesized common meaning of the phrase “exceeds authorization” is therefore, “goes beyond the limit of official permission.” Combining these definitions, it is apparent that the “exceeds authorization to access” language of subsection (a)(2) of Unlawful Use of a Computer prohibits a person from going beyond the limit of their official permission to “access” (as statutorily defined) a computer, computer system, computer network, computer database, etc., or any part thereof. This includes surpassing limitations on permitted purposes for retrieving data. Here, the Commonwealth presented evidence that Derr’s official permission to retrieve data from JNET was limited to use for official police purposes, but that he retrieved data from JNET for personal reasons. This constitutes prima facie evidence that Derr went beyond the limit of his official permission to retrieve data from the JNET computer system, and therefore committed the crime of Unlawful Use of a Computer under subsection (a)(2). ____________________________________________ 6 EXCEED, Merriam-Webster Dictionary, https://www.merriam-webster.com /dictionary/exceed (last accessed 2/15/23). 7 AUTHORIZATION, Black’s Law Dictionary (11th ed. 2019). - 17 - J-A27025-22 We find Derr’s argument that he did not exceed his authorization to access JNET because he had permission to access all information contained within that system unconvincing. His permission was not unfettered. There was a limit. Derr’s authorization to use JNET stopped where official police work ended, and personal use began. The plain language of the statute resolves this issue. Indeed, even though the previous version of the statute did not explicitly prohibit “exceed[ing] authorization to access” a computer, and only barred “intentionally and without authorization access[ing]” a computer, we had no trouble finding that the statute encompassed the type of behavior we deal with here. See McFadden, 850 A.2d at 1293 (quoting 18 Pa.C.S.A. § 3933(a)(2), repealed eff. February 14, 2003).8 In McFadden, we held there was sufficient evidence to support a conviction under the previous statute where a police officer sent a bogus message through the computer in her patrol car. Id. at 1292. We held that because the officer was not permitted to use the computer for reasons other than official police business, and she had “accessed” that system “without authorization.” Id. at 1293. As the current statute includes this same language – “intentionally and without authorization accesses” – under McFadden, we would find the Commonwealth here set ____________________________________________ 8 Notably, the previous statute was repealed and replaced at the same time the Crimes Code was amended to provide a statutory definition for the word “access” in relation to computer crimes. See 18 Pa.C.S.A. § 7601, eff. Feb. 14, 2003. - 18 - J-A27025-22 forth a prima facie case, even without the added “exceeds authorization” language. Because we find the text of the statute “clear and free from all ambiguity,” we will not entertain the policy concerns considered by the trial court. 1 Pa.C.S.A. § 1921(b). The Commonwealth presented prima facie evidence that Derr exceeded his authorization to access JNET. The trial court therefore erred in dismissing the Unlawful Use of a Computer charges. Order reversed. Judgment Entered. Joseph D. Seletyn, Esq. Prothonotary Date: 3/31/2023 - 19 -