Defendant appeals a judgment of conviction for multiple charges, including one count of identity theft, ORS 165.800. Defendant assigns error only to the trial court’s denial of his motion for judgment of acquittal on the identity theft charge. ORS 165.800(1) states, in part, that a person commits identity theft when he or she “converts to the person’s own use the personal identification of another person.” While in custody at the Marion County Jail, defendant had his cellmate place a call to defendant’s girlfriend, whom defendant was prohibited from contacting. The jail’s telephone system required the cellmate to use a personal identification number (PIN) to make the call. After the cellmate entered his PIN, called defendant’s girlfriend, and spoke briefly with her, the cellmate voluntarily handed the telephone to defendant. Based on that telephone call, defendant was convicted of identity theft on the ground that he had converted his cellmate’s personal identification to his own use. On appeal, defendant argues that, by simply taking the telephone from his cellmate, defendant did not “convert [ ] to [his] own use the personal identification of another person.” ORS 165.800(1). We agree with defendant and, therefore, reverse his conviction for identity theft.
We state the facts in the light most favorable to the state. State v. Langley,
Inmates are prohibited by jail policy from attempting to evade the telephone system’s controls. The jail’s “Inmate Handbook,” which is provided to every person booked into the Marion County Jail, states that unauthorized telephone use, including “using another inmate’s pin, using another inmate to make calls or any other activity that circumvents the phone system,” constitutes a rule violation, and can result in a variety of sanctions enforced by the jail. Additionally, a set of telephone rules are posted by the jail’s telephones, which state, “Use of another inmate’s PIN is identity theft,” and, in larger font, “WARNING: STEALING ANOTHER INMATE’S PIN IS IDENTITY THEFT.”
In violation of those rules, defendant enlisted the help of his cellmate to place a call to defendant’s girlfriend, C. Defendant was prohibited by court order from having any contact with C, because she was the victim in defendant’s pending domestic violence
Based on that call, defendant was charged with identity theft and found in contempt of court for violating his no-contact order by talking to C. The identity theft charge was consolidated with the pending domestic violence charges, and other charges, and tried in a bench trial. The state submitted a recording of the telephone call into evidence during the trial, and called C as a witness, but did not call defendant’s cellmate. Regarding the telephone call at issue here, C testified only that she had received a call from defendant, and that, in her experience, the jail’s telephone system usually identifies the name of the caller, but in this case, “[i]t wasn’t anybody’s name. It just came over like a prepaid account [,]” without identifying who was on the line. The state also called an employee at the Marion County Jail who described the features and operations of the jail’s telephone system, as detailed above.
At the close of the state’s case, defendant moved for a judgment of acquittal, arguing that he “could not have obtained, possessed, or converted [the cellmate’s] personal identification number” because “the actual phone call itself was made, apparently, by [the cellmate]The state responded that “defendant is circumventing their jailhouse rules, their Telmate rules, using someone else’s pin number in order to essentially try to have secret contact with the victim.” The state further argued that “it is not the State’s position that [the cellmate] is the victim” of the identity theft, but rather that “[t]he victim [of the identity theft] would be the jail and Telmate,” and that defendant “convert[ed] *** [the cellmate’s] pin number for his own use to contact [his girlfriend], which he is prohibited from doing.” The trial court denied defendant’s motion. At the close of trial, defendant again argued to the trial court that the state presented insufficient evidence to convict defendant of identity theft. The trial court denied defendant’s renewed motion, concluding that defendant “used and converted another person’s personal identification to his own purpose,” and did so with the intent “to deceive and defraud *** with regard to the rules of the jail.”
On appeal, defendant renews his argument made in the trial court that, in taking over the telephone call that the cellmate made with the cellmate’s own PIN, defendant did not convert that PIN to his own use, and, accordingly, the state presented insufficient evidence of that element of identity theft. The state, however, contends that the cellmate’s PIN provided ongoing authorization for the call and, when defendant took over the call, defendant took over use of the PIN. Therefore, the state argues, there was evidence from which the trial court reasonably could have found that defendant converted the PIN to his own use.
The parties’ arguments raise a question of statutory interpretation: whether the legislature intended the phrase “converts to the person’s own use” in ORS 165.800 to reach defendant’s conduct here.
We begin our analysis with the statute’s text. Oregon’s identity theft statute states that “[a] person commits the crime of identity theft if the person, with the intent to deceive or to defraud, obtains, possesses, transfers, creates, utters or converts to the person’s own use the personal identification of another person.” ORS 165.800(1) (emphasis added). The statute defines “personal identification” to include “any written document or electronic data that does, or purports to, provide information concerning *** [a] person’s personal identification number.” ORS 165.800(4)(b)(M). Accordingly, and as neither party disputes, the cellmate’s PIN is “personal identification” for the purposes of identity theft.
As noted, the parties’ arguments focus on the narrow issue of whether, by taking over the telephone call that the cellmate made using his own PIN, defendant converted that PIN to his own use. The term “converts to the person’s own use” is not defined in ORS 165.800. However, the Supreme Court construed that phrase in State v. Medina,
The Supreme Court did not further explain what it meant by “appropriate.” However, the word is a term of common usage and so we look first to its plain meaning. As reflected in dictionary definitions, “to appropriate” can mean “to claim or use as if by an exclusive or preeminent right,” or “to take without permission: pilfer, purloin.” Webster’s Third New Int’l Dictionary 106 (unabridged ed 2002); see State v. Newman,
The word “appropriate” is also used in a similar sense in a related statute — theft, ORS 164.015. See State v. Klein,
Based on the foregoing, we conclude that, to “appropriate” the personal identification of another person for the purpose of converting that personal identification to defendant’s own use, and thereby committing identity theft, a defendant must take, acquire, or claim the personal identification of another person either by possessing or exercising some control over it. We further conclude, as explained below, that the phrase “converts to the person’s own use,” and, by inclusion, the term “appropriates,” must be construed to mean that the act is done without the permission or consent of the person identified by the personal identification.
In Medina, the Supreme Court explained that, historically, “the phrase ‘converts to
“‘[C]onversion of property requires a serious act of interference with the owner’s rights.’ Moving the property a short distance or using it casually is not enough. However, ‘using the property up, selling it, pledging it, giving it away, delivering it to one not entitled to it, inflicting serious damage to it, or claiming it against the owner’ will constitute conversion.”
Id. at 269 (internal citations and brackets omitted; quoting Wayne R. LaFave and Austin W. Scott, Jr., Handbook on Criminal Law 645 (1972)).
Given that context, and that the crime at issue is, after all, identity theft, it follows that a defendant does not “convert [ ] to the person’s own use the personal identification of another person” when that personal identification is used with the consent or permission of the individual whom it identifies. Otherwise, no identity has been stolen through the defendant’s act. Cf. State v. Zibulsky,
Turning to the facts of the present case, we conclude that the record contains no evidence from which a rational trier of fact could find that defendant “appropriated” his cellmate’s PIN. The record shows that the PIN at issue here was assigned to the cellmate, and, within the Telmate system, functioned to identify the cellmate and enable him to place calls.
The state nevertheless argues that, “by taking over the call, defendant used, or took over use of, [the cellmate’s] PIN,” and therefore “appropriated” that PIN within the meaning of the term as used by the Supreme Court in Medina. That is so, the state argues, because
“use of the PIN did not necessarily end after the initiation of the call. Rather, a factfinder reasonably could have determined from the evidence that the PIN provided authorization that continued for the duration of a call, beyond its mere initiation, and that by taking over the call, defendant took over use of the PIN.”
In sum, we conclude that, to “appropriate” the personal identification of another person, in the context of identity theft, a defendant must take, acquire, or claim that personal identification by possessing or controlling it without the consent or permission of the person it identifies.
Conviction for identity theft reversed; remanded for resentencing; otherwise affirmed.
Notes
Though defendant was charged in the indictment with having “obtain[ed], possess [ed], or convert [ed] to the defendant’s own use, personal identification of another,” the state argued below only that defendant “convert[ed] *** [the cellmate’s] pin number for his own use,” and the trial court denied defendant’s motion for a judgment of acquittal on the ground that defendant “converted another person’s personal identification to his own purpose.” The state raises no arguments on appeal that defendant somehow obtained or possessed the cellmate’s PIN, and “confines its arguments” to whether defendant converted the PIN to his own use.
To the extent that the PIN could be considered the “personal identification of’ the jail or Telmate — an argument the state has intimated but never fully articulated on appeal — we would similarly conclude that there is insufficient evidence that defendant “appropriated” the PIN from either entity.
We recall that the test announced in Medina had two conjunctive parts: “to convert another person’s personal identification to his or her own use, a defendant must take, appropriate, or somehow divest the other person of their personal identification and, with the requisite intent, use that personal identification for the defendant’s own purposes.” Medina,
