Opinion
Plаintiff InterSource, Inc. (InterSource), requested information from defendant State Controller (Controller) 2 about warrants the Controller had issued to state vendors which were unpaid. The Controller refused to provide the information. InterSource then filed a petition for writ of mandate in the superior court to compel the disclosure of these public records. (Gov. Code, § 6258 [undesignated section references will be to this code].) The court issued a judgment directing disclosure under the same terms as its judgment in a case involving a similar request entitled Argent Research and Recovery, Ltd. v. Davis (Super. Ct. Sacramento County, No. CV380212) (Argent). 3
The Controller has petitioned us for an extraordinary writ directing the superior court to set aside the present judgment, and requested a stay. (§ 6259, subd. (c).) We issued an alternative writ and a stay pending our plenary review of the matter. We now grant the writ only to direct a modification of a portion of the judgment and dissolve the stay.
For reasons set forth in the unpublished portion of the opinion, we draw our facts not only from the present record but from the record in Argent as well. To avoid confusion, we will change references as necessary to reflect the identity of the present parties and to account for the procedural posture of the present case.
*606 Facts
I *
II
InterSource is an Oklahoma cоrporation which searches public records for unpaid warrants payable to vendors of goods and services. It then offers its services to the payee vendors for recovery of the funds.
Pursuant to the California Public Records Act (the Act), section 6250 et seq., InterSource sent a letter to the Controller in August 1994 requesting information. (§§ 6251, 6256). InterSource divided its request into two steps. First, it wanted the month and year of issue, amount (to the nearest $100), and number for all outstanding warrants over $3,000 predating August 1, 1993. After perusing this list, it would then request the payee, requesting-agency code, and control number (the latter only if kept in the same file) for specified warrants. It also wanted the same information for all canceled warrants. 7 It offered to reimburse the costs of responding to the request. The Controller denied the request on the ground the information was not subject to disclosure under the Act.
InterSource consequently commenced this litigation in November 1994. The Controller demurred, asserting InterSource could not maintain the action because it was not a “person” within the meaning of the Act (§§ 6250, 6252, subd. (c), 6253, 6257, 6258) and because it was not certified to do business in California. The superior court sustained the demurrer with leave to amend in order to allow InterSource to qualify to do business in California. Inter-Source filed an amended petition in February 1995 alleging it was now registered to conduct business in California. The Controller answered, alleging InterSource was “not qualified to do business in California” and transmuting the other basis for its demurrer into the affirmative defense that InterSource, as an Oklahoma corporation, was not within the Act’s “purview.”
In her opposition to the writ, the Controller cited the catchall provision of section 6255, which states, “The agency shall justify withholding any record by demonstrating . . . that on the facts of the particular case the public interest served by [nondisclosure] . . . clearly outweighs the public interest served by disclosure of the record.” (Italics added.) She thus argued the public had an interest in nondisclosure because providing the records would *607 increase the threat of counterfeit warrants and the presentation of false claims. She analogized as well to the specific exemption for the investigatory and security files of law enforcement agencies. (§ 6254, subd. (f).) 8
Another basis of her opposition was the principle that there is a public interest in nondisclosure where an agency will incur expense and inconvenience in segregating exempt from nonexempt information.
(American Civil Liberties Union Foundation
v.
Deukmejian
(1982)
The Controller also disparaged any claim that these records furthered a public interest in insuring the state’s accountability for the public fisc. She claimed these records would not illuminate the manner in which her office operated. She also argued disclosure would do no more than echo her own efforts to identify outstanding warrants and issue duplicate payments to the payees.
In support of her arguments, the Controller submitted two declarations. The first was from John Henry, who is the Controller’s chief investigator. The Controller established his office in the 1980’s in response to complaints by banks, check-cashers, and businesses about forged or counterfeit warrants; many businesses had begun to refuse to cash warrants, which worked a hardship on individual payees who did not maintain checking acсounts. He cited individual examples of past instances involving forgery or counterfeiting. In his opinion, if the Controller were forced to provide all the requested information to any member of the public, anyone could produce a warrant which the Controller’s verification procedures could not detect unless the real payee eventually came forward. Moreover, even if there were not a flood of counterfeit warrants, to provide the public with all the requested information would allow the criminally disposed to present false claims for duplicates of “lost” or “misplaced” warrants. Since forged and counterfeited warrants аre charged back when detected to the institution honoring them, an increased problem with fraud could disrupt the Controller’s relations with major banks.
The Controller also submitted a declaration by John Larrea, an assistant deputy controller. On the average, the Controller issues 125,000 warrants daily. These appear in a microfiche register in numerical order on the date issued, and the Controller updates the register daily. The Controller also *608 updates daily an “outstanding warrant file” on microfiche. A warrant is considered “outstanding” immediately upon issue until either paid by the State Treasurer or canceled after four years. As an example, on March 28, 1995, there wеre 2,100,000 warrants in this file. Access to the outstanding warrants file is limited to the employees who update it and the management team. The Controller regularly denies requests such as InterSource’s. Mr. Larrea claimed the fields of data in the request are not contained in any one file, and omitting individual payees would require a manual search of the microfiche. To assemble these data and delete individual payees would require greater personnel resources than the Controller has available. Mr. Larrea also described the Controller’s own program to identify outstanding warrants. As initiated in 1990, the program located warrants more than three years old in аmounts over $3,000 in order to issue duplicate warrants to the payees. By 1995, this program was to include warrants outstanding more than two years in amounts over $2,000, and the Controller ultimately hopes to be able to identify warrants in amounts over $1,000. On the issue of security, Mr. Larrea noted the Controller electronically verifies warrants and thus a person with all the requested data could present a counterfeit warrant which could not be identified as such unless the real payee came forward. At present “there is little concern that the payee [of a lost warrant] is not being truthful,” but if the public generally obtained all the requested data, false claims could increase.
Wayland Witten filed a counterdeclaration in support of disclosure. Until his retirement in 1987, he was John Henry’s predecessor. He explained the concern expressed by the Controller regarding forgeries is irrelevant in the present context because forgeries are the result of stolen warrants. Moreover, false claims for “lost” warrants would not be a problem so long as the Controller demanded appropriate verification of identification. Thus, he averred the only true security concern is with counterfeited warrants. He pointed out that if one accepted the security arguments made by the Controller, then her own locator program could be a breach because unscrupulous employees with sufficient information to search for outstanding warrants could pass these data to outsiders equally capable of counterfeiting. He therefore assumed (since the locator program began after his retirement) that the only way in which the Controller could insure against internal fraud would be to provide the employees in charge of the program with sufficient data to locate the warrants but not to duplicate them. He was also “puzzled” by Mr. Larrea’s claim the Controller would be forced to compile data from several files, because during his tenure the outstanding-warrant file contained all the requested data. Thus, he did not believe it would be any mоre burdensome or a greater security risk to make available a similar degree of information to the general public. In the alternative, the court could require *609 the use of an editor program to delete one or more of the requested fields of data, so that the codes which appear on the warrant itself could still detect counterfeited warrants electronically. 9 This editor program could also automatically delete warrants from the file which were payable to individuals (forestalling the Controller’s claim this would require manual manipulation of data). He further noted the Controller’s unclaimed property division currently providеs data similar to that requested in the petition at $600 per microfiche, with sufficient data deleted as a protection against false claims.
In a supplementary declaration, Mr. Larrea stated the security of the locator program had been certified by the Controller’s internal audits division. Moreover, employees who researched outstanding warrants were not authorized to issue duplicate warrants.
As the superior court asserted at one hearing, it could not imagine “a much more public thing than these warrants." In its view, “We may not personally as individuals care who are the payees on unpaid warrants. But we have an interest fundamentally in the idеa that our public business is public. And what could be more public than the payment of public taxpayer money to somebody, right? What’s more public than that, as to who gets our tax dollars?” It did not accept the Controller’s argument that nondisclosure would prevent fraud. “I mean, anyone, a counterfeiter of a state warrant doesn’t have to have additional data to counterfeit. He can just go counterfeit one today. Makes up a number, . . . [names] Chevron Oil Company, and goes down to the Bank of America and convinces the bank that he is a due representative of the Chevron Oil Company." The court concluded that if the Controller provided only thе payee, date, and amount of outstanding warrants, “some counterfeiter is going to have to hit an eight[-]digit [warrant] number. That’s a heck of a shot.” It also rejected the claim disclosure would result in undue burden, particularly if the writ required the requesting party to provide a computer program at its own expense to find the data outlined by the court. However, it gave the Controller the opportunity to return with additional evidence of burden.
The Controller did not submit any additional evidence of undue burden. In its response to a proposed form of the judgment, the Controller specifically objected to the failure to include a requirement that the requesting party prоvide a computer program “necessary to enable the Controller’s staff to retrieve the information . . . .”
Ultimately, the superior court signed a judgment prepared by the Controller. In pertinent part, it provides,
*610 “In support of a motion to compel discovery, [InterSource] acknowledges that the information it seeks is related to warrants issued to state vendors. . . .
“Following extensive briefing in [Argent], this Court ordered disclosure of certain information regarding State Controller vendor warrants and, because the issue herein is the same, now makes the same ruling in this case . . .
“1. The Petition for Writ of Mandate ... is Granted.
“2. [The Controller] is directed to produce to [InterSource] information relating to warrants that were drawn or issued by the [Contrоller] in favor of companies and corporate vendors that provided goods and/or services to the State, but which have not been cashed or paid .... The information to be produced is as follows:
“a. the date of each outstanding warrant;
“b. the amount of each outstanding warrant; and
“c. the name of the payee of each outstanding warrant.
“3. [InterSource] is to provide to the [Controller] a computer program which will enable that Office to retrieve the information ordered disclosed herein.
“4. The information to be disclosed shall relate to all outstanding warrants beginning with the date six months prior to the date the computer program provided by [InterSource] is functional and going back in time to the date the outstanding warrants become void.” The Controller filed the present petition in December 1995, which has awaited the resolution of her petition in Argent.
Discussion
I
As a threshold consideration, we consider the claim by the Controller that InterSource is not within the “purview” of the Act. She relies on the last three words of the codified declaration of policy appearing at the outset of the Act, which provides, “In enacting this chapter, the Legislature . . . finds and declares that access to information concerning the conduct of the people’s business is a fundamental. . . right of every person
in this state.”
(§ 6250, italics added.) She also cites two decisions which describe the public’s access to government records as “a fundamental right of
citizenship.” (Rogers
v.
Superior Court
(1993)
First of all, the cases cited by the Controller are inapposite, as neither adjudicated the right of non-Californians to enforce the Act. Cases are not propositions for matters not expressly considered.
(Honey Baked Hams, Inc.
v.
Dickens
(1995)
Moreover, the legislative intent evinced by the Act is directly contrary to that inferred by the Controller. Section 6250 originally concluded with thе phrase “every citizen of this state.” (See Stats. 1968, ch. 1473, § 39, p. 2946.) In 1970, the Legislature amended section 6250 to its present form, “every person in this state.” We presume the Legislature is aware of the distinction between “citizen” (defined in section 241 as all persons either bom in California and residing within it, or citizens of the United States residing in California) and the more inclusive “person" (defined in section 17 as “any person [or]. . . corporation . . .”). Nor did the Legislature limit the Act’s definition of “person” to domestic corporations. (§ 6252, subd. (c) [“ ‘Person’ includes any . . . corporation . . .”].) As the Corporations Code demonstrates, the Legislature is capable of expressing the distinction in usage betweеn domestic and foreign corporations. (Corp. Code, §§ 167, 171.)
This lack of limitation on those who may enforce the Act is by no means an inadvertent effect of ill-considered language employed by the Legislature. “Implicit in the democratic process is the notion that government should be accountable for its actions. In order to verify accountability, individuals must have access to government files. Such access permits checks against the arbitrary exercise of official power and secrecy in the political process.”
(CBS, Inc.
v.
Block, supra,
II
We thus come to whether, under section 6255, the Controller satisfied her burden of demonstrating a public interest in nondisclosure that clearly outweighs the public interest in disclosure on the facts of this particular case.
(Times Mirror Co.
v.
Superior Court, supra,
A
The Controller posits three interests of the public in nondisclosure. We consider them in turn.
1. The Controller suggests the public interest in nondisclosure may be based on purely speculative security concerns. However, her authority does not support so broad a proposition.
A court may indeed consider
potential
threats; for example, the Supreme Court acknowledged a public interest in nondisclosure of then Governor Deukmejian’s appointment schedules and calendars because of “the potential threat to the Governor’s physical security.”
(Times Mirror Co.
v.
Superior Court, supra,
Moreover, existing authority explicitly rejects the Controller’s suggestion. “A mere assertion of possible endangerment does not ‘clearly outweigh’ the public interest in access to these records.”
(CBS, Inc.
v.
Block, supra,
The Cоntroller continues to argue in this court that disclosure will create the potential for presentation of false claims, citing the Henry and Larrea declarations. However, the Witten declaration maintained that false claims can be prevented by requiring appropriate verification of the payee’s identity. The Controller did not challenge this opinion on its merits (beyond highlighting the fact Mr. Witten was no longer a member of her office). Since we must resolve all factual disputes in favor of the judgment, in this conflict between declarations we must credit Wayland Witten’s.
(Beckett
v.
Kaynar Mfg. Co., Inc.
(1958)
As earlier recounted, the Witten declaration also maintained that the Controller’s anecdotal evidence regarding forged warrants was inapposite because forged warrants can arise only in connection with stolen authorized warrants. The Controller has apparently conceded the point in this court, as she does not cite this evidence. In any event, the Witten declaration is again a basis for concluding the Controller failed to establish facts supporting this concern.
This leaves the concern with counterfeiting, a potential threat which InterSource does not dispute. However, as noted above, the superior court stated at the hearing that nothing at present prevents a counterfeiter from negotiating a phony warrant. The Controller has presented nothing other than speculation in her supporting declarations that the incidence of counterfeiting will increase if she provides the requested information. This is insufficient.
(CBS, Inc.
v.
Block, supra,
2. Among the Act’s specific exemptions from disclosure are “Records of complaints to, or investigations conducted by, or records of intelligence information or security procedures” of the state and local law enforcement agencies (subject to extensive provisos). (§ 6254, subd. (f).) Acknowledging her records do not come literally within this provision, the Controller argues the outstanding warrants are “akin” to the files which are the subject of this provision because there are “security” concerns. She cites
Eskaton Monterey Hospital
v.
Myers
(1982)
InterSource incorporates the opposition in Argent, which cites numerous cases purportedly establishing the narrow contours of the Act’s express investigatory-records exception. 13 But this is beside the point. As noted, the Controller is not relying on the express investigatory-records exception, but is instead merely citing it as analogous support for its security argument. As we have already determined that the superior court could resolve the factual dispute regarding the Controller’s security concerns in favor of disclosure, it adds nothing to thе analysis to frame it in terms of a specific exemption in the Act.
3. This leaves the claim the undue inconvenience and expense in providing the requested information weighs in favor of nondisclosure. (ACLU, supra, 32 Cal.3d at pp. 452-453.)
*615 In an abbreviated argument, the Controller reiterates the contentions she made in the superior court. Pointing to the daily fluctuations in the file caused by newly issued and newly canceled warrants, she asserts she could be subjected to daily demands by numerous asset-finders. She also argues the data ordered disclosed by the judgment are not contained in a single file (forcing her employees to cull several files to obtain the information) and would require manual editing to remove the names of individual payees. She again asserts disclosure would overtax her personnel resources.
We first consider the contention there is not an existing file. Unlike Argent, where the Controller’s failure to submit evidence in support of this contention was determinative, here we have an admission by InterSource in exhibits to its petition in the superior court that the names of payees appear only in the microfiched “warrant register” of copies of all issued warrants, while the date and amount are contained in the outstanding-warrant file (along with the warrant number that is not itself subject to disclosure). While this new information gives a better picture of the process, it does not change the facts that the Controller has admitted her own locator program searches for names, dates, and amounts (over $2,000 and someday over $1,000), which is substantial evidence supporting the superior court’s implied conclusion there is an existing record containing the three data specified in the judgment. 14
Turning to the Controller’s remaining contentions, this court has previously held that an agency may be forced to bear a tangible burden in complying with the Act absent legislative direction to the contrary.
(State Bd. of Equalization
v.
Superior Court
(1992)
B
We have determined the Controller has demonstrated on the facts of this case no more than a slight public interest in the nondisclosure of the data included in the superior court’s judgment. On the other side of the balance, the Controller argues there is no public interest in disclosure of these records, so even a slight interest in nondisclosure should be determinativе.
In the Controller’s view, she exercises no discretion in issuing warrants to pay bills and there has not been any claim she has failed to pay bills, so she believes there is no public interest in holding her accountable for this ministerial task. While she concedes the purpose for which a request is made under the act is “generally” irrelevant, the Controller also claims no court has ordered disclosure solely for commercial purposes. Finally, the Controller asserts the existence of her own locator program for identifying and paying outstanding warrants expunges any public interest in outstanding warrants.
As we have previously held, “If the records sought pertain to the conduct of the people’s business there
is
a public interest in disclosure. The
weight
of that interest is proportionate to the gravity of the governmental tasks sought to be illuminated and the directness with which the disclosure will serve to illuminate.”
(Citizens for a Better Environment
v.
Department of Food & Agriculture
(1985)
As the superior court correctly concluded, the records pertain to the government’s conduct in managing public revenues. The Controller may depict her office’s part in the allocation of revenues to be drab and ministerial, but bill-paying is no less essential to the proper workings of state government than legislating (or, dare we say, adjudicating), thus there is a public interest of sufficient gravity. While the Controller may assert the public has no interest in these records because she is performing her task properly and is herself seeking out unpaid vendоrs to ensure they receive compensation for goods and services, this is akin to asking that we allow her “to exercise absolute discretion, shielded from public accountability” in the operations of her office.
(New York Times Co.
v.
Superior Court, supra,
Since there is a strong public interest in disclosure, the balance must tip in favor of access to the outstanding warrant file. We shall therefore deny the Controller’s petition.
Disposition
The alternative writ is discharged. The petition for an extraordinary writ is granted only to the extent of directing the trial court to modify its judgment to apply only to warrants over $3,000, and is otherwise denied. The stay previously issued by this court shall be dissolved as of the date this opinion is final. InterSource shall recover its costs.
Puglia, P. J., and Blease, J., concurred.
Notes
This action commenced in the waning days of the term of the present Controller’s predecessor in office. We have substituted the incumbent officeholder in the caption.
The Controller sought an extraordinary writ to set aside this other judgment, which we denied after plenary review. (Connell v. Superior Court (Sept. 24, 1996) C021229 [nonpub. opn.].)
See footnote 1, ante, page 601.
After four years, the Controller cancels outstanding warrants.
When an agency raises the catchall provision as a defense, a court may analogize to the specific exemptions provided by the Act to identify situations in which nondisclosure furthers the public interest.
(Times Mirror Co.
v.
Superior Court
(1991)
The Controller encodes warrants with several fields of numerical data to allow electronic verification. For obvious reasons, the Controller has alluded to this system only generally, and we will not insist on greater detail.
For this proposition, she cites
Neirbo Co.
v.
Bethlehem Corp.
(1939)
The Controller’s alternative purview argument—that disclosure of this information does not further the purpose of the Act—echoes her contentions regarding the absence of any public interest in disclosure. We will treat them in connection with that topic.
The Controller also cites
Procunier
v.
Superior Court
(1973)
Although
Williams
v.
Superior Court
(1993)
Although InterSource sought disclosure only of warrants over $3,000, the present judgment contains no such restriction. To forestall any argument by the Controller that searching for warrants under $3,000 is work not contained in any existing record, and because it is peremptory relief in excess of that requested in InterSource’s original petition in the superior court, we shall direct the appropriate modification of the judgment.
The Controller complains the judgment’s provision for an editor program will compel her “to open files to [InterSource] which are not open even to the majority of [her] employees” and “reveal how [her] computer records are kept.” In the first place, since this provision was added to the judgment at the Controller’s insistence, the doctrine of invited error precludes her from rаising any argument based upon it. Further, the judgment does not require *616 InterSource itself be given direct access to the Controller’s database. All that need be provided to InterSource is sufficient information to allow it to create a compatible program which will be run by the “few employees” who have access to the file. Finally, the Controller has not provided any facts to support this claim of an alleged breach of security flowing from this provision.
We hasten to add that identifying a possible misfeasance is in no way intended to impugn the operations of the Controller’s office (much as the Controller asserts her posited concern with dishonesty is not intended to impugn InterSource’s reputation).
