Mitchell Scott NEWBERGER, Appellant,
v.
STATE of Florida, Appellee.
District Court of Appeal of Florida, Second District.
James Marion Moorman, Public Defender and Andrea Norgard, Asst. Public Defender, Bartow, for appellant.
Robert A. Butterworth, Atty. Gen., Tallahassee, and Davis G. Anderson, Jr., Asst. Atty. Gen., Tampa, for appellee.
RYDER, Acting Chief Judge.
Mitchell Scott Newberger was convicted of the crimes of modifying intellectual property and making a false statement to obtain a credit card. On appeal, he argues that section 815.04, Florida Statutes (1991), which criminalizes modification of intellectual property, is unconstitutional. He also asserts that the evidence was insufficient to support his convictions for both offenses. We hold that section 815.04 is constitutional, and affirm on that point. We also find that the evidence supported Newberger's conviction for making a false statement to obtain a credit card and affirm without discussion of the law and facts relevant to that charge. We reverse his convictions for modifying intellectual property.
Newberger was a new accounts credit analyst at Maas Brothers. When a customer applied for a new credit card, the analyst would enter information from the customer's credit application into a computer. The computer would automatically transmit the information to the credit bureau, and the applicant would be approved or denied based on *420 the credit bureau report. The computer contained a feature that allowed the analyst to bypass the transmission to the credit bureau by pressing the number nine key. The analysts referred to this function as "nining" the system. When the "nine" procedure was used, the system created a record of the use. Maas Brothers authorized the analysts to "nine" the system in certain situations, none of which are applicable here.
The state charged Newberger with two counts of violating section 815.04 based on his use of the nine key in opening two accounts, and a third count as a principal based on another analyst's use of the nine key. The parts of the statute pertinent to the charges against Newberger are as follows:
(1) Whoever willfully, knowingly, and without authorization modifies data, programs, or supporting documentation residing or existing internal or external to a computer, computer system, or computer network commits an offense against intellectual property.
... .
(4)(b) If the offense is committed for the purpose of devising or executing any scheme or artifice to defraud or to obtain any property, then the offender is guilty of a felony of the second degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084.
§ 815.04, Fla. Stat. (1991)
After a bench trial, the court adjudicated him guilty of the charges based on violation of this statute.
Newberger first argues that the statute is unconstitutionally vague. He notes that it does not define two operative terms, "modifies" and "data." Thus, he contends, a person of common understanding is not put on notice about what conduct the statute proscribes. See L.L.N. v. State,
The rules of statutory construction require that courts give statutory language its plain and ordinary meaning, unless the words are defined in the statute. Southeastern Fisheries Ass'n, Inc. v. Department of Natural Resources,
While we hold the statute is constitutional, we do not believe the evidence here supported convictions for modifying intellectual property. We first looked at the plain language of the statute. We note that Newberger's acts appear to be an unauthorized use of the computer. We do not believe, however, that his use of an existing computer function "change[d] the form or properties" of the "detailed information" resident in the computer or the system. The state asserts that the record left when Newberger used the nine key is a sufficient modification to the system to bring him within the ambit of the statute. It further contends that "[e]very keystroke that [Newberger] entered into the computer in the processing of a credit application changed the data in the computer." The state reads section 815.04 too broadly. The record left in the system did not modify *421 the existing data in any way, it merely added additional material. While cases may exist where the addition of information to a computer will constitute a modification, this is not one of them.
Because no Florida courts have interpreted this statute, we reviewed the laws of our sister states for guidance. Most states have now enacted statutes to prevent computer crimes. Hurewitz and Lo, Computer-Related Crimes, 30 Am.Crim.L.Rev. 495 (Spring 1993). We attempted to find cases interpreting the word "modify" in such a statute. In New York v. Versaggi,
In light of the New York court's construction of the word "alter," we believe that statute is similar to ours and the court's reasoning could be instructive. Because the facts of this case are sufficiently different from those in Versaggi, however, we find that the same result is not warranted here. Newberger used, albeit without authorization, a computer function that had been programmed for the analysts' use. Versaggi used codes within the system to totally disable it, changing the existing function of the programs. It took technicians an hour and a half, and some forty computer commands, to restore the phone service. Versaggi's acts changed what the system was designed to do, Newberger's acts did not. As such, the Versaggi case does not assist our analysis.
A case more analogous to our facts is Tennessee v. Joyner,
Tennessee has enacted a statute that provides:
Whoever knowingly, directly or indirectly, accesses, causes to be accessed, or attempts to access any telephone system, telecommunications facility, computer software, computer program, data, computer, computer system, computer network, or any part thereof, for the purpose of:
... .
Obtaining money, property, or services for oneself or another by means of false or fraudulent pretenses, representations, or promises violates this subsection and is subject to the penalties [listed].
§ 39-14-602, Tenn. Code Ann. (1993)
Joyner was charged and convicted under the virtually identical predecessor statute to *422 the one quoted. We find Joyner's conduct similar to Newberger's. They both used the existing abilities of the computer to commit a fraud on their employers. We note that section 815.06, Florida Statutes (1991)[2], which criminalizes accessing a computer without authorization, is similar to the statute under which Joyner was charged. The chapter defines access as:
to approach, instruct, communicate with, store data in, retrieve data from, or otherwise make use of any resources of a computer, computer system or computer network.
§ 815.03(10), Fla. Stat. (1991).
It may be that section 815.06 more aptly describes the conduct Newberger engaged in. He instructed the computer to bypass the credit bureau function. As a result, new data, a record of his use of the nine key, was stored in the system. Newberger was not, however, charged under this statute, so we offer no opinion about whether his acts would have violated it. See generally Gallagher v. State,
Finally we note that Florida was in the forefront in attempting to address the new problems arising from the advent of widespread computer use. Our legislature, in 1978, was the first to enact a specialized computer crimes statute. Hurewitz & Lo, supra, at n. 144. At that time it specifically found that "[c]omputer related crime is a growing problem in government as well as the private sector." § 815.02, Fla. Stat. (1979). The other states' legislatures must have agreed because now all but one have enacted similar provisions. Our review of these statutes disclosed that some states have enacted specific provisions that criminalize behavior arguably not forbidden under Florida's statutory scheme. Missouri, for example, prohibits invasion of privacy by use of a computer. § 569.095(5), Mo. Rev. Stat.Ann. (1991) (computer tampering occurs when a person "[a]cesses a computer, computer system, or a computer network and intentionally examines information about another person"). California has criminalized the knowing introduction of a "computer contaminant" such as a virus or worm into a computer, network or system. § 502, Ca.Penal Code (1992). Because of the explosion in computer use since 1978, and the probable continuing growth in the number and variety of computer crimes committed, the Florida legislature may wish to revisit our statutory scheme.
Affirmed in part, reversed in part and remanded.
CAMPBELL and FULMER, JJ., concur.
NOTES
Notes
[1] Newberger also contends on appeal that the statute is unconstitutionally overbroad. As the state points out, he did not raise this issue before the trial court. It cannot, therefore, be considered on appeal. Even if this argument had been raised below, it does not aid Newberger. The overbreadth doctrine applies only to conduct protected by the First Amendment. Southeastern Fisheries,
[2] The portion of section 815.06 that might be relevant here provides:
(1) Whoever willfully, knowingly, and without authorization accesses or causes to be accessed any computer, computer system, or computer network; ... commits an offense against computer users.
... .
(2)(b) If the offense is committed for the purposes of devising or executing any scheme or artifice to defraud or to obtain any property, then the offender is guilty of a felony of the second degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084.
