STATE of Wisconsin, Plaintiff-Appellant, v. Christopher BARON, Defendant-Respondent-Petitioner.
No. 2007AP1289-CR
Supreme Court of Wisconsin
June 23, 2009
2009 WI 58 | 317 Wis. 2d 60 | 769 N.W.2d 34
Oral argument March 6, 2009. (Affirming 2008 WI App 90, 312 Wis. 2d 789, 754 N.W.2d 175.)
PROSSER, J., concurs.
ABRAHAMSON, C.J., took no part.
For the defendant-respondent-petitioner there were briefs by Daniel P. Dunn and the Dunn Law Office, Madison, and oral argument by Daniel P. Dunn.
For the plaintiff-appellant the cause was argued by Jeffrey J. Kassel, assistant attorney general, with whom on the brief was J.B. Van Hollen, attorney general.
¶ 1. ANNETTE KINGSLAND ZIEGLER, J. This is a review of a published court of appeals’ decision1 that reversed the decision of the Jefferson County Circuit Court, Randy R. Koschnick, Judge. The circuit court concluded that
¶ 2. This case requires us to decide whether
I. BACKGROUND
¶ 3. Christopher Baron worked as an emergency medical technician for the city of Jefferson under the direction of Mark Fisher who was the director of Jefferson‘s Emergency Medical Services.
¶ 4. As alleged in the criminal complaint, on August 10, 2006, Baron accessed Mark Fisher‘s e-mail account by using Fisher‘s password, which Baron had previously acquired. After accessing Fisher‘s e-mail account, Baron found a number of e-mails allegedly showing that Fisher was having an extramarital affair. Baron organized the various e-mails into one e-mail message and then sent the message to people in the Jefferson community. The similar subject line of the e-mail message sent was such as: “What‘s Mark been up to.” The e-mails were discussions between Fisher and a woman other than his spouse about their sexual activity and sexual preferences. Even though Baron was the one who organized and sent the e-mails, he did so in a manner that made the e-mails appear to come from Mark Fisher‘s e-mail account. The day after Baron sent out the e-mails, Fisher committed suicide.
¶ 5. When questioned by authorities, Baron admitted that he had sent the e-mails to get Fisher in trouble. Baron stated that he originally intended to send the e-mails only to Fisher‘s wife, but he then sent them to other people so they could see that Fisher was not “golden.”
¶ 6. Baron was charged as follows: criminal defamation in violation of
¶ 7. The only charge at issue in this appeal is the identity theft violation under
¶ 8. Baron filed a motion to dismiss the
¶ 9. The court of appeals reversed the circuit court‘s decision. It concluded that Baron‘s logic was flawed because he focused on the “purpose” element in isolation. The court of appeals stated that “Wisconsin statutes are replete with provisions that criminalize conduct that may otherwise be constitutionally protected, if that conduct is carried out in an unlawful manner.”3 As a result, Baron petitioned this court for review, which we accepted.
II. STANDARD OF REVIEW
¶ 10. The constitutionality of a statute is a question of law that we review de novo. State v. Zarnke, 224 Wis. 2d 116, 124, 589 N.W.2d 370 (1999). A presumption of constitutionality generally exists for a legislative enactment, and as a result, those challenging a statute‘s constitutionality must show it is unconstitutional beyond a reasonable doubt. Id. However, because
III. ANALYSIS
¶ 11.
(2) Whoever, for any of the following purposes, intentionally uses, attempts to use, or possesses with intent to use any personal identifying information or personal identification document of an individual, including a deceased individual, without the authorization or consent of the individual and by representing that he or she is the individual, that he or she is acting with the authorization or consent of the individual, or that the information or document belongs to him or her is guilty of a Class H felony:
. . . .
(c) To harm the reputation of the individual.4
¶ 12. The
¶ 13. Pursuant to
¶ 14. In order to determine if
¶ 15. Baron argues that the charge must be dismissed because
A. Speech or conduct
¶ 16. In order to determine if a
¶ 17. In Johnson, 491 U.S. at 404, the United States Supreme Court considered whether the act of flag desecration was considered speech such that it possessed “sufficient communicative elements to bring the First Amendment into play.” The statute at issue, “Desecration of Venerated Object,” provides in part: “‘(a) A person commits an offense if he intentionally or knowingly desecrates: . . . a state or national flag.‘” Id.
¶ 18. In United States v. O‘Brien, 391 U.S. 367, 376 (1968), the Court considered whether the act of destroying a “registration certificate”8 constituted speech. The statute at issue in O‘Brien subjected a person to criminal liability if he “‘knowingly destroys (or) knowingly mutilates’ a certificate.” Id. at 375 (citation omitted). The Court noted that the statute “plainly does not abridge free speech on its face” and “on its face deals with conduct having no connection with speech.” Id. The Court stated that “[w]e cannot accept the view that an apparently limitless variety of conduct can be labeled ‘speech’ whenever the person engaging in the conduct intends thereby to express an idea.” Id. at 376. Nonetheless, the Court undertook a
¶ 20. Rather than regulating speech, this court concluded in Robins that the child enticement statute regulated conduct. Id., ¶ 43. This court reasoned that Robins’ Internet conversations did not constitute the crime of child enticement, but rather, his internet conversations were “circumstantial evidence of his intent to entice a child.” Id., ¶ 44. Just because “some of the proof in [a] case consists of internet ‘speech’ does not mean” the
¶ 21. In the case at hand,
¶ 22. We conclude that, as charged and as applied to the facts of this case,
¶ 23. Unlike in Robins, where speech was used to show the defendant‘s intent to entice a child, speech in this case is not used to show the defendant‘s intent to use another individual‘s personal identifying information. Absent the e-mails, i.e., speech, which were used with the intent to harm Fisher‘s reputation, Baron has not committed an element of the crime as alleged. Therefore, just as communicative elements were being regulated in Johnson and O‘Brien, communicative elements are being regulated in this case. Under the statute as charged and applied to the facts of this case, it is the content of the e-mails, i.e., the speech, that evidences the defendant‘s intent to use personal identifying information to harm Fisher‘s reputation. Thus, here, speech in addition to conduct is being regulated.11
¶ 25. The child enticement statute applied in Derango reads:
Whoever, with intent to commit any of the following acts, causes or attempts to cause any child who has not attained the age of 18 years to go into any vehicle, building, room or secluded place is guilty of a Class BC felony:
(1) Having sexual contact or sexual intercourse with the child in violation of
s. 948.02 or948.095 .(2) Causing the child to engage in prostitution.
another subsection of the identity theft statute or some other statute altogether. While this may not have been what the legislature intended, that is, the legislature may have intended to criminalize the unauthorized use of another‘s identity, the current statutory language, under subsection (c) of
(3) Exposing a sex organ to the child or causing the child to expose a sex organ in violation of
s. 948.10 .(4) Taking a picture or making an audio recording of the child engaging in sexually explicit conduct.
(5) Causing bodily or mental harm to the child.
(6) Giving or selling to the child a controlled substance or controlled substance analog in violation of
ch. 961 .
Id., ¶ 16 (citing
Whoever, for any of the following purposes, intentionally uses, attempts to use, or possesses with intent to use any personal identifying information or personal identification document of an individual, including a deceased individual, without the authorization or consent of the individual and by representing that he or she is the individual, that he or she is acting with the authorization or consent of the individual, or that the information or document belongs to him or her is guilty of a Class H felony:
(a) To obtain credit, money, goods, services, employment, or any other thing of value or benefit.
(b) To avoid civil or criminal process or penalty.
(c) To harm the reputation, property, person, or estate of the individual.
¶ 26. According to the State, an analogy to the child enticement statute shows that
¶ 27. The child enticement statute criminalizes one act, i.e., the act of causing a child to go into a secluded place, but the act has six different possible modes of commission. Derango, 236 Wis. 2d 721, ¶¶ 15-25. This court reasoned in Derango that multiple acts were not being punished because multiple prohibited acts arise and “warrant separate punishment when [the prohibited acts] are separate in time or are significantly different in nature.” Id., ¶ 21. Under subsections (1) through (6) of the child enticement statute, “a defendant might very often possess more than one prohibited intention when enticing a child.” Id. For example, intent to have sexual intercourse “also encompasses intent to expose or cause the child to expose a sex organ; or, a defendant may entice a child with the dual purpose of giving her drugs and exploiting her sexually.” Id.
¶ 28. Subsections (a) through (c) of the identity theft statute, on the other hand, are significantly different in nature, and thus identity theft can occur in multiple ways.12 As a result, the prohibited conduct charged includes more than simply the use of Fisher‘s identity. The way in which the State charged the offense here involved the use of Fisher‘s identity to distribute communications that were intended to harm the reputation of Fisher. Therefore, this statute prohibits the combination of the use of the individual‘s personal identifying information with the intent to harm the
B. Content based or content neutral
¶ 29. The State, relying on the court of appeals’ decision in this case, argues that the statute is content neutral because it does not impose any cognizable burden on political speech. Baron, on the other hand, argues that the statute regulates speech based on the ideas or message expressed, and as a result, it is content based.
¶ 30. “At the heart of the First Amendment lies the principle that each person should decide for himself or herself the ideas and beliefs deserving of expression, consideration, and adherence.” Turner Broad. Sys., Inc. v. F.C.C., 512 U.S. 622, 641 (1994). “Our political system and cultural life rest upon this ideal.” Id.
¶ 31. As a result, government action that regulates speech is appropriately limited. However, if speech is being regulated, the regulation must survive strict scrutiny if it is content based or intermediate scrutiny if it is content neutral. Id. at 642.
¶ 32. Determining when the regulation of speech is content based or content neutral can prove difficult. Id. As a general rule, laws that “distinguish favored speech from disfavored speech on the basis of the ideas
¶ 33. For example, in Boos v. Barry, 485 U.S. 312 (1988), the Court concluded that the statute at issue was content based. The governing statute provided that “[i]t shall be unlawful to display any flag, banner, placard, or device designed or adapted to... bring into public odium any foreign government... within 500 feet of any... embassy....‘” Id. at 316 (emphasis added) (citation omitted). Protestors claimed the statute prohibited them from engaging in “expressive activities” that were critical of the Soviet Union and Nicaragua. Id. at 315-16. The Court concluded the statute was content based by reasoning that “[w]hether individuals may picket in front of a foreign embassy depends entirely upon whether their picket signs are critical of the foreign government.” Id. at 318-19. While favorable speech is permitted, “[o]ne category of speech has been completely prohibited.” Id. at 319.
¶ 34. In Burson v. Freeman, 504 U.S. 191 (1992), the Court concluded that the relevant statute was content based. The governing statute provided that “[w]ithin... 100 feet from the entrances, and the building in which the polling place is located, the display of campaign posters, signs or other campaign materials, distribution of campaign materials, and solicitation of votes... are prohibited.‘” Id. at 193-94 (emphasis added) (internal brackets and citation omitted). A campaign official challenged the statute because it “limited her ability to communicate with voters.” Id.
¶ 35. On the other hand, in Members of City Council of City of Los Angeles v. Taxpayers for Vincent, 466 U.S. 789 (1984), the Court concluded the ordinance at issue was content neutral. The governing ordinance provided that “‘[n]o person shall paint, mark or write on, or post or otherwise affix, any hand-bill or sign to or upon any... electric light or power or telephone or telegraph or trolley wire pole....‘” Id. at 792 n.1 (citation omitted). A group supporting a candidate for public office attached cardboard signs to various utility poles. Id. at 792-93. Pursuant to the ordinance, city employees removed the signs, which resulted in the group seeking an injunction against enforcing the ordinance. Id. at 793. The Court concluded the ordinance was content neutral. It reasoned that “there is not even a hint of bias or censorship in the City‘s enactment or enforcement of this ordinance,” and “[t]here is no claim that the ordinance was designed to suppress certain ideas that the City finds distasteful.” Id. at 804. The Court further stated that the “text of the ordinance is neutral—indeed it is silent—concerning any speaker‘s point of view.” Id.
¶ 36. Similarly, in City of Renton v. Playtime Theatres, Inc., 475 U.S. 41 (1986), the Court concluded that the ordinance at issue was content neutral. The applicable ordinance prohibited any “‘adult motion picture theater’ from locating within 1,000 feet of any residential zone, single- or multiple-family dwelling, church, or park, and within one mile of any school.” Id. at 44. The Court acknowledged that the ordinance did “not appear to fit neatly into either the ‘content-based’ or the
‘content-neutral’ category,” but it ultimately concluded the ordinance was content neutral. Id. at 47-48. The Court reasoned that “[t]he ordinance by its terms [wa]s designed to prevent crime, protect the city‘s retail trade, maintain property values, and generally ‘protect and preserve the quality of the city‘s neighborhoods, commercial districts, and the quality of urban life,’ not to suppress the expression of unpopular views.” Id. at 48 (citing Young v. American Mini Theatres, Inc., 427 U.S. 50, 82 n.4 (1976) (brackets omitted). The Court further stated that “‘if the city had been concerned with restricting the message purveyed by adult theaters, it would have tried to close them or restrict their number rather than circumscribe their choice as to location.‘” Id. (brackets omitted).¶ 37. In United States v. Brock, 863 F. Supp. 851 (E.D. Wis. 1994) affirmed by United States v. Soderna, 82 F.3d 1370 (7th Cir. 1996), the applicable statute provided that anyone who “by force or threat of force or by physical obstruction, intentionally injures, intimidates or interferes with any person because that person is or has been, or in order to intimidate such person or any other person or any class of persons from, obtaining or providing reproductive health services.” Id. at 856 (citing in relevant part
¶ 38. In the case at hand, we conclude that
¶ 39. Unlike Taxpayers for Vincent, Renton, or Brock where the statutes were not designed to suppress certain ideas, this statute under the facts of this case, suppresses reputation-harming speech when it is accompanied by intentionally using another‘s identity. There is no identity theft in this case unless the trier of fact determines that Baron used Fisher‘s personal identifying information with the intent to harm Fisher‘s reputation. Therefore, Baron is prohibited from disseminating speech that is intended to be harmful to Fisher‘s reputation when that speech occurs through the unauthorized use of Fisher‘s personal identifying information. As a result,
¶ 40. The State, in effect, argues that the justification behind the identity theft statute is to punish people for using another individual‘s identity without consent, and therefore, the statute does not regulate a specific category of speech. While the State may be correct with respect to the application of the identity theft statute to other factual scenarios, under the facts of this case and as charged here, the content of the e-mails was critical to the charge in that Baron must have used Fisher‘s personal identifying information with the intent to harm Fisher‘s reputation.
¶ 41. In Boos, 485 U.S. at 320, the United States Supreme Court stated that regulations are content neutral when they “‘are justified without reference to the content of the regulated speech.‘” (Citation omitted.) For example, “[s]o long as the justifications for regulation have nothing to do with content, i.e., the desire to suppress crime has nothing to do with the actual films being shown inside adult movie theaters,” the regulation can be analyzed as content neutral. Id.
¶ 42. The district attorney‘s justification for charging
¶ 43. We conclude that, under facts of this case,
¶ 44. Accordingly, the State bears the burden of showing that the statute overcomes strict scrutiny in order to survive Baron‘s as-applied challenge.
C. Strict scrutiny
¶ 45. To survive strict scrutiny, the State has the burden to show that the “‘regulation is necessary to
¶ 46. In Burson, 504 U.S. at 193-94, 211, the Court concluded that the applicable statute, which prohibited a person from displaying or distributing campaign literature within 100 feet of a polling station, survived strict scrutiny. The Court asserted that it “has recognized that a State ‘indisputably has a compelling interest in preserving the integrity of its election process.‘” Id. at 199 (citation omitted). As a result, the State had a compelling government interest in preventing voter intimidation and election fraud, which history reveals has been a persistent battle since the country‘s founding. Id. at 200-06. In addition, the Court also concluded that the statute was narrowly drawn to achieve the government‘s compelling interest. Id. at 211. The Court reasoned that the “minor geographic limitation” does not constitute a significant impingement. It asserted that the state of Tennessee has made the constitutionally sound decision that “the[] last 15 seconds before its citizens enter the polling place should be their own, as free from interference as possible.” Id. at 210.
¶ 47. In contrast, the Court in Boos, 485 U.S. at 324, concluded that the statute at issue did not survive strict scrutiny because it was not narrowly tailored. In Boos, the statute, which was only applicable to Washington D.C., made it unlawful to display anything within 500 feet of an embassy that brought “into public odium or public disrepute ... of a foreign government.” Id. at 316. The Court compared the statute with another provision, which was applicable outside of D.C., that criminalized “willful acts or attempts to ‘intimidate, coerce, threaten, or harass a foreign official or an
¶ 48. In the case at hand, Baron concedes that the State has a compelling interest in preventing identity theft.13 He, however, asserts that the statute is not narrowly tailored to achieve that interest because it eliminates Baron‘s First Amendment right to defame a public official with true information. The State, in turn, argues that the statute survives strict scrutiny because the statute is narrowly tailored in that it applies only when the defendant intentionally uses an individual‘s personal information to harm that individual‘s reputation. We agree with the State and conclude that this is one of those “rare cases” that a government regulation survives strict scrutiny. See Burson, 504 U.S. at 211 (stating “we reaffirm that it is the rare case in which we have held that a law survives strict scrutiny“). As applied to Baron, the statute is narrowly tailored to achieve the government‘s compelling interest.
¶ 49. First, as the State asserts,
¶ 50. Second, this statute does not chill Baron‘s right to free speech because he could have intended to harm Fisher‘s reputation without pretending to be Fisher. For example, Baron could have disseminated the information through Baron‘s own e-mail account or stood on the street corner and distributed flyers. As a result, it is not the case that this statute punishes Baron for criticizing a public official. Rather, the statute punishes Baron for intentionally using an individual‘s personal identifying information with the intent to harm the individual‘s reputation.
¶ 51. Third, unlike in Boos where a more narrow statute could have been drafted, we can find no alternative way to draft the statute and still achieve the compelling government interest. A “get out of jail free” card could not have been intended for someone who uses a public official‘s e-mail account without authorization in order to send reputation-harming e-mails. There are far more civilized methods that are autho-
¶ 52. Baron argues that for
¶ 53. First, while speech that is intended to be harmful to one‘s reputation is implicated by the statute, the State does not need to prove that the speech was false or done with actual malice, which could be required if Baron was charged with defamation.15 Under
¶ 54. Second, while Baron is correct that he has a First Amendment right to defame a public official under Sullivan, 376 U.S. at 279-80, nothing suggests that this right is without boundaries. In fact, the Supreme Court has asserted on a number of occasions that there are limits to the First Amendment. See, e.g., Taxpayers for Vincent, 466 U.S. at 804 (citing Schenck v. United States, 249 U.S. 47, 52 (1919) (stating “[i]t has been clear since this Court‘s earliest decisions concerning the freedom of speech that the state may sometimes curtail speech when necessary to advance a significant and legitimate state interest“)). We are aware of no case that holds that one has a constitutional right to intentionally use another individual‘s identity without consent in order to harm that individual‘s reputation. Therefore, we reject Baron‘s argument that his First Amendment right is unlimited. So long as
¶ 55. Third, Bartnicki does not support Baron‘s argument that so long as the information is true, he has an unlimited right to harm a public official‘s reputation even while pretending to be that official. In Bartnicki, 532 U.S. at 518-19, a radio host aired an unfavorable audio clip that he had obtained from a third party who acquired it illegally. While the Court stated that enforcing the provision at issue “implicates the core purposes of the First Amendment because it imposes sanctions
¶ 56. Moreover, the Court‘s reasoning for protecting the radio host‘s First Amendment right in Bartnicki was not that he had an unlimited right to publish such information. Rather, the Court concluded that while the government‘s interest justified prohibiting the “interceptor” from using the illegally obtained information, “it by no means follows that punishing disclosures of lawfully obtained information of public interest by one not involved in the initial illegality is an acceptable means of serving those ends.” Id. at 529. The Court, therefore, stopped short of setting forth the rule asserted by Baron.
IV. CONCLUSION
¶ 57. We conclude that the State has shown beyond a reasonable doubt that
By the Court.—The decision of the court of appeals is affirmed.
¶ 58. SHIRLEY S. ABRAHAMSON, C.J., did not participate.
¶ 59. ANN WALSH BRADLEY, J. (concurring). I agree with the majority that the statute is constitutional as applied. Majority op., ¶ 57. I write separately, however, because I disagree with the majority that the statute regulates speech as well as conduct. Rather, I believe that the court of appeals got it right—this statute as applied regulates only conduct. Accordingly, I respectfully concur.
¶ 60. The court of appeals noted that “because the statute at issue implicates First Amendment rights, the State has the burden of proving beyond a reasonable doubt that the statute is constitutional.” State v. Baron, 2008 WI App 90, ¶ 7, 312 Wis. 2d 789, 754 N.W.2d 175. To determine whether the State has met its burden, I begin by examining the elements of the statute.1
¶ 61. Under the facts of this case, the State must demonstrate that Baron (1) intentionally used Fisher‘s personal identifying information (2) for the purpose of harming Fisher‘s reputation (3) by intentionally representing that he was Fisher (4) without Fisher‘s consent. It is the second element which implicates First Amendment rights.
¶ 62. The court of appeals concluded that the statute does not criminalize each element of the statute in isolation. Baron, 312 Wis. 2d 789, ¶ 10. That is, this statute does not criminalize the intent to harm an
¶ 63. One particularly apt example is
¶ 64. The court of appeals correctly noted that “[t]he fourth element requires that the defendant intended to engage in conduct that, were it not accompanied by a bribe, would be protected by the First Amendment.”2 Baron, 312 Wis. 2d 789, ¶ 12. Similarly, the identity theft statute requires the State to prove that the defendant was motivated by a purpose which, if not accompanied by the theft of the individual‘s identity, would be protected under the First Amendment.
¶ 65. The court of appeals’ decision in this case was cited favorably by the author of a three-volume treatise on the First Amendment. See Rodney A. Smolla, Smolla and Nimmer on Freedom of Speech § 24:19 (2009). After discussing the court of appeals’
¶ 66. We have previously stated, “It is not an abridgement of freedom of speech or press to make a course of conduct illegal merely because the conduct was in part initiated, evidenced, or carried out by means of language, either spoken, written, or printed.” State v. Robins, 2002 WI 65, ¶ 42, 253 Wis. 2d 298, 646 N.W.2d 287 (quoting Giboney v. Empire Storage, 336 U.S. 490, 502 (1949)). In Robins, we discussed whether the use of e-mail constituted speech in the context of the crime of child enticement.
¶ 67. The defendant, who was charged with child enticement, claimed that the statute violated the First Amendment as applied to his attempt to entice a child through internet speech. Intent to entice a child was an element of the offense. We concluded that the statute did not regulate speech and observed that “internet conversations and e-mails ... do not by themselves constitute the crime of child enticement. Rather, [the] internet conversation and e-mails are circumstantial evidence of his intent to entice a child....” Id., ¶ 44.3
Likewise here, the speech—the content of the e-mail—is evidence of Baron‘s intent to harm Fisher‘s reputation.
¶ 68. For the reasons discussed above, I conclude that the State has met its burden to demonstrate that the statute is constitutional. Although the application of strict scrutiny is not warranted in this case because the statute criminalizes conduct rather than speech, I agree with the majority that the statute would withstand a strict scrutiny challenge. See majority op., ¶¶ 48-56. Accordingly, I respectfully concur in the majority‘s opin-
¶ 69. DAVID T. PROSSER, J. (concurring). In 2006 Christopher Baron was charged with violating several statutes, including
¶ 70. Wisconsin created a comprehensive criminal code in the 1953 session of the legislature. Ch. 623, Laws of 1953. As Professor Gordon Baldwin later recalled, one of the first topics of the Legislative Council‘s criminal code project “was the law relating to crimes against property.” Gordon L. Baldwin, Criminal Misappropriation in Wisconsin—Part I, 44 Marq. L. Rev. 253, 253 (1960–61). “Crimes involving acts directed against prop-
¶ 71.
¶ 72. Black‘s Law Dictionary defines “misappropriation” as “The application of another‘s property or money dishonestly to one‘s own use.” Black‘s Law Dictionary 1013 (7th ed. 1999) (emphasis added). Wisconsin‘s theft statute,
¶ 73. Subsection (1) of
¶ 74. Other “personal identifying information,” such as “[a]n individual‘s social security number,” “[a]n individual‘s taxpayer identification number,” and “[a]n individual‘s code or account number,”
¶ 75. Still another type of “personal identifying information,” “[a]n individual‘s deoxyribonucleic acid profile,”
¶ 76. In subsection (1)(a), “Personal identification document” includes “[a] document containing personal identifying information.”
¶ 77. In an information age, the legislature is concerned about the unauthorized use, especially the misappropriation, of an individual‘s personal identifying information. Yet there are limits on the state‘s authority and ability to control such information. Statutes on this subject must be drafted carefully.
¶ 78. In this case, Baron allegedly accessed Mark Fisher‘s e-mail account by using Fisher‘s personal password. Even if he acquired the password lawfully, Baron surely was not authorized to rummage through Fisher‘s e-mail account, if he did so. Baron then allegedly
¶ 79. Mark Fisher was a government employee. As such, he was inevitably subject to attacks on his reputation, especially if the attacks were true. But a lawful end did not justify these alleged unlawful means, especially the misappropriation of Fisher‘s name, i.e., the false representation of Fisher as the sender of the widely distributed e-mail.
¶ 80. If a person were to send documents from his own computer under his own name, he would have a defense, on these facts, under this statute. A person who misappropriates another person‘s name as he attempts to injure the other person does not have such a defense. If a person distributed information anonymously, he also would have a defense under this statute. A person so consumed with malice that he uses another person‘s name, without authority, to discredit that person, forgoes his defense under the statute.
¶ 81. The First Amendment does not protect a defendant accused of violating the statute in the manner alleged here, because the statute requires the state to prove that the defendant intentionally misrepre-
¶ 82. “A good name is rather to be chosen than great riches.” Proverbs 22:1. “A good name is better than precious ointment.” Ecclesiastes 7:1. This is the wisdom of the ages. Misappropriating a person‘s name is taking that person‘s most valuable possession. The legislature understood that this conduct is a grave offense and should be punished accordingly.
¶ 83. For the reasons stated, I respectfully concur.
Notes
Whoever, for any of the following purposes, intentionally uses, attempts to use, or possesses with intent to use any personal identifying information ... without the authorization or consent of the individual and by representing that he or she is the individual ... is guilty of a Class H felony:
....
(c) To harm the reputation, property, person, or estate of the individual.
All subsequent references to the Wisconsin Statutes are to the 2007-08 version unless otherwise indicated.State v. Robins, 2002 WI 65, ¶ 6, 253 Wis. 2d 298, 646 N.W.2d 287.WI4kink: So you ever get to Milwaukee?
Benjm13: sometimes withmy [sic] mom
WI4kink: cool so how would we ever meet?
Benjm13: i dont know u can come here if u want
. . .
WI4kink: could just get a room somewhere
Benjm13: oh that would be cool-like a motel
WI4kink: yup
- The defendant intentionally used personal identifying information of [the] individual.
- The defendant intentionally used personal identifying information of [the] individual to harm the reputation... of the individual.
- The defendant acted without the authorization or consent of [the] individual and knew that [the] individual did not give authorization or consent.
- The defendant intentionally represented that he was [the] individual.
