X

Thank you for sharing!

Your article was successfully shared with the contacts you provided.
OPINION BY CAVANAUGH, J.: �1 This is an appeal from judgment of sentence imposed after a juryconvicted appellant of five counts of unlawful use of a computer, 18Pa.C.S.A. �3933(a)(1), five counts of theft by deception, 18 Pa.C.S.A.�3922, and two counts of bad checks, 18 Pa.C.S.A. �4105(a)(1). Appellantwas sentenced to an aggregate term of imprisonment of three to six yearsand a consecutive term of two years probation. �2 The facts, as gleaned from the record, are that from April through June1997, appellant used an e-mail account on the Internet to sell and to receivevarious items of aquarium equipment. Certain items for which he hadreceived payment from the victims were not delivered by appellant to them.Other items which were provided to appellant by several victims pursuant toe-mail contacts were not paid for because appellant remitted checks drawnon closed accounts. Contact between the victims and appellant was made through e-mail accounts and web pages maintained on the Internet byappellant and others advertising the merchandise. �3 Appellant presents two issues for review challenging the sufficiency ofthe evidence and the legality of his sentence. We have reviewed the meritsof each and find that no relief on appeal is warranted. Accordingly, we affirmthe judgment of sentence. �4 The first issue questions the sufficiency of the evidence to support theconvictions of unlawful use of a computer. Appellant argues that use of e-mailthrough the Internet fails to fall within the statutory prohibition ofunlawful use of a computer, 18 Pa.C.S.A. �3933(a)(1), in that the Internet isnot a “computer system” and the use of e-mail is not “accessing” a computersystem. �5 The relevant statutory provisions are as follows: Offense defined A person commits an offense if he: (1) accesses, alters, damages or destroys anycomputer, computer system, computer network,computer software, computer program or database or any part thereof, with the intent tointerrupt the normal functioning of anorganization or to devise or execute any schemeor artifice to defraud or deceive or controlproperty or services by means of false orfraudulent pretenses, representations orpromises;Definitions- As used in this section the following wordsand phrases shall have the meanings given to them inthis subsection:”Access.” To intercept, instruct, communicate withstore data in, retrieve data from or otherwise make useof any resources of a computer, computer system,computer network or database.”Computer network.” The interconnection of twoor more computers through the usage of satellite,microwave, line or other communication medium.”Computer system.” A set of related, connected orunconnected computer equipment, devices andsoftware. 18 Pa.C.S.A. �3933(a), (c). �6 Appellant was charged in the information filed against him with fivecounts of violation of �3933(a)(1). Each of the five counts alleging violationof the statute quoted the complete definition of the offense as contained in�3933(a)(1), and added, “to wit, did access a computer system, the’internet,’ to defraud or deceive or control” specified merchandise or U.S.currency. Therefore, appellant was charged with violation of �3933(a)(1)through any actions or means specified by the above-quoted statutorylanguage. �7 “The Internet is an international network of interconnectedcomputers.” Reno v. ACLU, 521 U.S. 844, 117 S.Ct. 2329, 138 L.Ed.2d874, 884 (1997). “Individuals can obtain access to the Internet from manydifferent sources, generally hosts themselves or entities with a hostaffiliation.” Id. “Anyone with access to the Internet may take advantage of awide variety of communication and information retrieval methods[including] electronic mail (‘e-mail’)”and the World Wide Web.” Id. “E-mailenables an individual to send an electronic message – generally akin to anote or letter – to another individual or to a group of addressees.” Id. at885. “The best known category of communication over the Internet is theWorld Wide Web, which allows users to search for and retrieve informationstored in remote computers, as well as, in some cases, to communicate backto designated sites. In concrete terms, the Web consists of a vast number ofdocuments stored in different computers all over the world.” Id. �8 The record demonstrates that appellant communicated with each ofthe five victims through e-mail either to sell or to buy merchandise.Although telephone communications were also established, each victim waseither the initiator or the recipient of e-mail communication with appellantvia the Internet. �9 Appellant argues that no expert evidence was offered to prove that theInternet is a “computer system.” We find that the apt description of theInternet, as contained in Reno v. ACLU, supra, as “an internationalnetwork of interconnected computers” has become commonly understood bylaypersons and this causes it to fall within the definition of “computernetwork” contained in �3933(c) without need for expert testimony.Therefore, sufficient evidence was presented to establish the element of theoffense that appellant accessed a computer network. �10 As noted above, the information charged appellant with, inter alia,accessing a computer network. The fact that it referred to the Internet as a”computer system” is of no relevance since a variance between the information and the proof at trial is not fatal as long as the defendant hadadequate notice of the nature of the crime and it does not cause prejudicialsurprise. Com. v. Lohr, 503 Pa. 425, 468 A.2d 1375 (1983); Com. v.Johnson, 719 A.2d 778, 783, n.4 (Pa. Super. 1998). �11 Appellant does not maintain that he was surprised or in any mannerprejudiced by the, perhaps erroneous, reference in the information to theInternet as a “computer system” rather than a “computer network.” We findno prejudice in the inconsequential use of the statutory language. �12 The next basis upon which appellant challenges the sufficiency of theevidence is that use of e-mail is not within the statutory definition of”access.” We find that the evidence supports the finding that appellantcommunicated with or otherwise made use of resources of a computernetwork. The sending of an electronic message over the Internet falls withinthe statutory definition of access. �13 Sufficient evidence is in the record to sustain the convictions ofunlawful use of a computer. �14 Appellant’s second issue is whether the theft by deception convictionsmerged for sentencing purposes with the convictions of unlawful use of acomputer. Where an actor commits a single criminal act, the sentences formultiple convictions based upon that act merge if one offense is a lesserincluded offense of the other. Com. v. Rippy, 732 A.2d 1216, 1223 (Pa.Super. 1999) (citing Com. v. Anderson, 538 Pa. 574, 650 A.2d 20 (1994).A lesser included offense is one whose elements are a necessary sub-componentbut not a sufficient component of elements of the other crime. Id. (citing Com. v. Comer, 552 Pa. 527, 716 A.2d 593 (1998)). �15 The statutory provisions for the offense of theft by deception are asfollows: Offense defined- A person is guilty of theft ifhe intentionally obtains or withholds property ofanother by deception. A person deceives if heintentionally: (1) creates or reinforces a false impression,including false impressions as to law, value,intention or other state of mind; butdeception as to a person’s intention toperform a promise shall not be inferred fromthe fact alone that he did not subsequentlyperform the promise; (2) prevents another from acquiring informationwhich would affect his judgment of atransaction; or (3) fails to correct a false impression which thedeceiver previously created or reinforced, orwhich the deceiver knows to be influencinganother to whom he stands in a fiduciaryconfidential relationship. 18 Pa.C.S.A. �3922(a). �16 Appellant argues that theft by deception is a lesser included offense ofunlawful use of computer. He is mistaken. The offense of unlawful use ofcomputer does not have as an element the obtaining or withholding propertyof another as does theft by deception. The offense of unlawful use ofcomputer is committed where a person accesses a computer network withthe intent to devise or execute any scheme or artifice to defraud by means.J.S98007/99of false or fraudulent pretense, representations, or promises. The actualobtaining or withholding of the property is not an element of unlawful use ofa computer. The sentence imposed is a legal one and no merger ofsentences is necessary. �17 Judgment of sentence affirmed.
Pennsylvania v. Murgallis IN THE SUPERIOR COURT OF PENNSYLVANIA 2000 PA Super 167 COMMONWEALTH OF PENNSYLVANIA, Appellee v. MICHAEL MURGALLIS, Appellant NO. 189 MDA 1999 Appeal from the Judgment of Sentence Entered November 20, 1998 In the Court of Common Pleas of LUZERNE County CRIMINAL NO. 4066 OF 97 Filed: June 2, 2000 BEFORE: CAVANAUGH, MUSMANNO and BROSKY, JJ.
 
Reprints & Licensing
Mentioned in a Law.com story?

License our industry-leading legal content to extend your thought leadership and build your brand.

More From ALM

With this subscription you will receive unlimited access to high quality, online, on-demand premium content from well-respected faculty in the legal industry. This is perfect for attorneys licensed in multiple jurisdictions or for attorneys that have fulfilled their CLE requirement but need to access resourceful information for their practice areas.
View Now
Our Team Account subscription service is for legal teams of four or more attorneys. Each attorney is granted unlimited access to high quality, on-demand premium content from well-respected faculty in the legal industry along with administrative access to easily manage CLE for the entire team.
View Now
Gain access to some of the most knowledgeable and experienced attorneys with our 2 bundle options! Our Compliance bundles are curated by CLE Counselors and include current legal topics and challenges within the industry. Our second option allows you to build your bundle and strategically select the content that pertains to your needs. Both options are priced the same.
View Now
May 15, 2024
Philadelphia, PA

The Legal Intelligencer honors lawyers leaving a mark on the legal community in Pennsylvania and Delaware.


Learn More
May 16, 2024
Dallas, TX

Consulting Magazine recognizes leaders in technology across three categories Leadership, Client Service and Innovation.


Learn More
May 23, 2024
London

Celebrate outstanding achievement in law firms, chambers, in-house legal departments and alternative business structures.


Learn More

Health Law Associate CT Shipman is seeking an associate to join our national longstanding health law practice. Candidates must have t...


Apply Now ›

Shipman & Goodwin LLP is seeking two associates to expand our national commercial real estate lending practice. Candidates should have ...


Apply Now ›

Epstein Becker & Green is seeking an associate to joins its Commercial Litigation practice in our Columbus or Cincinnati offices. Ca...


Apply Now ›
04/29/2024
The National Law Journal

Professional Announcement


View Announcement ›
04/15/2024
Connecticut Law Tribune

MELICK & PORTER, LLP PROMOTES CONNECTICUT PARTNERS HOLLY ROGERS, STEVEN BANKS, and ALEXANDER AHRENS


View Announcement ›
04/11/2024
New Jersey Law Journal

Professional Announcement


View Announcement ›