Crystal Gail Ramsey v. Commonwealth of Virginia , 65 Va. App. 694 ( 2015 )


Menu:
  •                                          COURT OF APPEALS OF VIRGINIA
    Present: Chief Judge Huff, Judges Decker and AtLee
    PUBLISHED
    Argued at Chesapeake, Virginia
    CRYSTAL GAIL RAMSEY
    OPINION BY
    v.     Record No. 0123-15-1                                   CHIEF JUDGE GLEN A. HUFF
    DECEMBER 29, 2015
    COMMONWEALTH OF VIRGINIA
    FROM THE CIRCUIT COURT OF THE CITY OF NORFOLK
    Everett A. Martin, Jr., Judge
    Adam M. Carroll (Wolcott Rivers Gates, on briefs), for appellant.
    John W. Blanton, Assistant Attorney General (Mark R. Herring,
    Attorney General, on brief), for appellee.
    Crystal Gail Ramsey (“appellant”) appeals her thirteen misdemeanor convictions of
    computer invasion of privacy, in violation of Code § 18.2-152.5. Following a bench trial in the
    Circuit Court of the City of Norfolk (“trial court”), appellant was sentenced to 210 days in the
    Norfolk City jail, with 180 days suspended. On appeal, appellant contends that “[t]he trial court
    erred in finding sufficient evidence, specifically that [appellant] intentionally examined
    identifying information of another person without authority through the use of a computer
    network, in violation of [Code] § 18.2-152.5.” For the following reasons, this Court affirms
    appellant’s convictions.
    I. BACKGROUND
    On appeal, “we consider the evidence and all reasonable inferences flowing from that
    evidence in the light most favorable to the Commonwealth, the prevailing party at trial.”
    Williams v. Commonwealth, 
    49 Va. App. 439
    , 442, 
    642 S.E.2d 295
    , 296 (2007) (en banc)
    (quoting Jackson v. Commonwealth, 
    267 Va. 666
    , 672, 
    594 S.E.2d 595
    , 598 (2004)). So viewed,
    the evidence is as follows.
    Between August 1, 2012 and April 1, 2013, appellant, a state trooper with the Virginia
    Department of State Police, ran inquiries on fifteen individuals1 using the Virginia Criminal
    Information Network (“VCIN”). Some individuals, such as appellant’s girlfriend, Sara Jensen
    (“Jensen”), specifically asked appellant to run inquiries on their criminal history or personal
    information through VCIN. Several other inquiries that were run on other individuals were run
    on appellant’s own initiation. Appellant admitted to the investigating officer, Master Trooper
    Eric Bruno (“Bruno”), that the inquiries were not run for any criminal justice purpose.
    In her position as a state trooper, appellant had been granted access to VCIN, which
    allowed her to access DMV information, “wanted person” information, and driving records. To
    access someone’s criminal history, appellant had to make inquiries through a dispatcher who,
    after appellant gave the purpose for her request, would then forward her the information. The
    dispatcher would not verify the validity of the request but would assume the request was made
    for a proper purpose. Such was the case for one victim, Michael Evans (“Evans”), who was
    Jensen’s supervisor at the time appellant made inquiry into his criminal history. To obtain
    criminal history information on Evans, appellant requested dispatch to forward her Evans’s
    criminal history for use in a “firearms case,” even though Evans had neither owned a firearm nor
    applied or otherwise sought to acquire one. Appellant had never met Evans and had not opened
    an investigation file on him.
    Dispatcher Senior Tina Wilson (“Wilson”) testified that she trained appellant on the use
    of VCIN. Wilson confirmed that each time a VCIN inquiry is made, the user will see a message
    1
    Each of these inquiries served as the basis for a separate charge. The trial court
    dismissed two of these charges because one individual was deceased and there was insufficient
    evidence of the existence of another individual.
    -2-
    that states “information obtained from VCIN may be used for criminal justice purposes only.”
    Additionally, on the VCIN recertification test, which appellant took, question 7 states:
    “True/False: DMV information obtained through VCIN can only be used for criminal justice
    purposes.” Wilson testified further that she instructs everyone she trains that not even a person
    with the highest level of access is permitted to use VCIN to run inquiries on themselves or
    another person for non-criminal justice purposes. Bruno also confirmed that “[s]tate troopers are
    only to use VCIN for law enforcement purposes, not to learn things about their neighbors,” or
    other non-criminal justice purposes.
    For running these inquiries without a criminal justice purpose, appellant was charged
    with violating Code § 18.2-152.5. During trial, appellant moved to strike on the ground that the
    evidence was insufficient to show she did not have authority to access the information.
    Specifically, appellant argued that no manual defining the scope of authority had been submitted
    into evidence and that the VCIN warning and recertification test only restrict the use of
    information obtained from VCIN.
    Following a bench trial, the trial court found appellant guilty of thirteen counts of
    misdemeanor computer invasion of privacy. Specifically, the trial court concluded that appellant
    “had no authority to examine [the] identifying information” of the thirteen individuals she ran
    inquiries on and, therefore, was in violation of Code § 18.2-152.5. This appeal followed.
    II. STANDARD OF REVIEW
    When considering on appeal the sufficiency of the evidence presented below, we
    “presume the judgment of the trial court to be correct” and reverse only if the trial court’s
    decision is “plainly wrong or without evidence to support it.” Davis v. Commonwealth, 
    39 Va. App. 96
    , 99, 
    570 S.E.2d 875
    , 876-77 (2002) (citations omitted). We do not “substitute our
    judgment for that of the trier of fact.” Wactor v. Commonwealth, 
    38 Va. App. 375
    , 380, 564
    -3-
    S.E.2d 160, 162 (2002). Rather, “the relevant question is whether, after viewing the evidence in
    the light most favorable to the prosecution, any rational trier of fact could have found the
    essential elements of the crime beyond a reasonable doubt.” Jackson v. Virginia, 
    443 U.S. 307
    ,
    319 (1979). In doing so, this Court “gives full play to the responsibility of the trier of fact fairly
    to resolve conflicts in the testimony, to weigh the evidence, and to draw reasonable inferences
    from basic facts to ultimate facts.” 
    Id. In addition,
    any matters of statutory interpretation are
    reviewed de novo on appeal. Scott v. Commonwealth, 
    58 Va. App. 35
    , 48, 
    707 S.E.2d 17
    , 24
    (2011).
    III. ANALYSIS
    On appeal, appellant contends that the trial court erred in ruling that the evidence was
    sufficient to find that she was without authority to use VCIN to examine the personal and
    criminal history information of others. Appellant argues that she had the authority to access
    VCIN for any purpose and that the only evidence of any limitation to this authority was the
    VCIN warning and the question on the recertification test, which only restricted her use of the
    information obtained from VCIN.
    Under Code § 18.2-152.5(A),
    [a] person is guilty of the crime of computer invasion of privacy
    when he uses a computer or computer network and intentionally
    examines without authority any employment, salary, credit or any
    other financial or identifying information, as defined in clauses
    (iii) through (xiii) of subsection C of § 18.2-186.3, relating to any
    other person.
    (Emphasis added). For the purposes of Code § 18.2-152.5(A), an offender acts “‘without
    authority’ when he knows or reasonably should know that he has no right, agreement, or
    permission or acts in a manner knowingly exceeding such right, agreement, or permission.”
    Code § 18.2-152.2. “Examination” is further defined as reviewing the identifying information of
    -4-
    another “after the time at which the offender knows or should know that he is without authority
    to view the information displayed.” Code § 18.2-152.5(A). In summary, to be convicted under
    this section the evidence must establish that the offender viewed identifying information of
    another “when he knows or reasonably should know” he is without right, agreement, or
    permission to do so or “act[ing] in a manner knowingly exceeding such right, agreement, or
    permission.” Code §§ 18.2-152.2, 18.2-152.5; see also Plasters v. Commonwealth, No.
    1870-99-3, 2000 Va. App. LEXIS 473, at *3 (Va. Ct. App. June 27, 2000) (“The evidence must
    establish the offender viewed the information after she knew or should have known she was
    unauthorized to do so.”).
    The only Virginia appellate case concerning violations of Code § 18.2-152.5 is the
    unpublished decision in Plasters, 2000 Va. App. LEXIS 473. In Plasters, this Court upheld the
    appellant’s conviction, concluding that the evidence was sufficient to find that the appellant, a
    police dispatcher, knew she only had authority to access VCIN for criminal justice purposes. 
    Id. at *3.
    Significantly, this Court found that it is the unauthorized use of a computer or computer
    network to access data that constitutes a violation of Code § 18.2-152.5, without regard to
    whether the information is subsequently used. 
    Id. at *5-6.
    In deciding that the appellant “knew
    or should have known” that she had exceeded the scope of her authority, this Court found the
    evidence was sufficient considering she knew she could not access criminal history information,
    which was included in some of the inquiries she made, and considering the warning statement
    that displayed every time she accessed VCIN. 
    Id. at *4-5.
    This Court reasoned that the appellant
    lacked the authority to view the information on VCIN for non-criminal justice reasons given that
    “[h]er duties as dispatcher provided no separate reason to need or use the data” obtained and the
    warning that appeared each time she used VCIN stated “any ‘information obtained from VCIN
    -5-
    may be used for criminal justice purposes only.’” 
    Id. at *5-6.
    We find the reasoning of Plasters
    to be persuasive.
    The same year the General Assembly adopted Code § 18.2-152.2, Congress enacted
    similar legislation, viz., the Computer Fraud and Abuse Act. 18 U.S.C. § 1030; see LVRC
    Holdings LLC v. Brekka, 
    581 F.3d 1127
    , 1130 (9th Cir. 2009). In pertinent part, the federal act
    is similar to Virginia’s proscription. The federal act makes it a crime to obtain information by
    computer “without authorization or exceed[ing] authorized access.” 18 U.S.C. § 1030(a)(2),
    (e)(6). In United States v. Rodriguez, 
    628 F.3d 1258
    (11th Cir. 2010), the Eleventh Circuit
    affirmed the conviction of an employee of the Social Security Administration who accessed the
    personal records of seventeen individuals using the Administration’s databases “for nonbusiness
    reasons.” 
    Id. at 1260.
    In his defense, the employee claimed that he did not violate 18 U.S.C.
    § 1030 because he only accessed the information through databases “he was authorized to use”
    as an employee of the Administration. 
    Id. at 1263.
    The court rejected the employee’s argument
    as “ignor[ing] both the law and the record.” 
    Id. The court
    found that evidence of the mandatory
    training sessions, posted notices, and a daily computer screen banner notice established that the
    Administration’s policy was to permit use of its databases “only when done for business
    reasons.” 
    Id. at 1260,
    1263. The employee’s access of personal information for any reason
    unrelated to his duties as an employee of the Administration was, therefore, in violation of the
    plain language of the act. 
    Id. at 1263.
    This ruling was not altered by the employee’s argument
    that he was accessing the information as part of a “whistle-blowing operation” and that “he did
    not use the information to further another crime or to gain financially.” 
    Id. at 1260,
    1262.
    Affirming the employee’s conviction, the court explained “the misdemeanor penalty provision of
    the Act . . . does not contain any language regarding purposes for committing the offense.” 
    Id. at 1264.
    Therefore, the “use of information is irrelevant if [the employee] obtained the information
    -6-
    without authorization or as a result of exceeding authorized access.” 
    Id. at 1264
    (emphasis
    added). “[The employee] exceeded his authorized access and the Act does not require proof that
    [he] used the information to further another crime or to gain financially.” 
    Id. at 1260.
    Code § 18.2-152.5 similarly provides that “the crime of computer invasion of privacy [is
    committed] when [a person] uses a computer or computer network and intentionally examines
    without authority any . . . information . . . relating to any other person.” (Emphasis added). The
    use to which the information may be put is not relevant. Appellant argues that the only evidence
    of any limitation on her authority was the warning on the VCIN network and the question on her
    recertification test but this argument ignores the testimony of both Wilson and Bruno who
    confirmed that troopers are instructed during training that they are only to use VCIN for law
    enforcement purposes. Appellant concedes that her “authority” to access VCIN stems from her
    employment as a state trooper and to maintain this access she had to be re-certified. Wilson
    testified that during such re-certification appellant was informed that one is not even permitted to
    run his own information or that of family members through the system. Furthermore, the
    language in the recertification test and the warning message from the network itself served as a
    reminder of the department’s policy that VCIN was to be used for “criminal justice purposes”
    only. Moreover, appellant understood this “criminal justice purpose” limitation on her authority
    to access VCIN as evidenced by her use of a fictitious “firearms investigation” to gain access to
    the criminal history of Evans. Therefore, the evidence is sufficient to find appellant was without
    authority to examine the information on VCIN for non-criminal justice purposes.
    -7-
    IV. CONCLUSION
    For the foregoing reasons, this Court affirms the ruling of the trial court and finds the
    evidence was sufficient to find appellant was acting “without authority” when she used VCIN for
    non-criminal justice purposes, in violation of Code § 18.2-152.5.
    Affirmed.
    -8-