State v. Poling

2010 Ohio 5429, 160 Ohio Misc. 2d 84, 2010 WL 4483748
CourtHocking County Municipal Court
DecidedJune 25, 2010
DocketNo. CRB0900555
StatusPublished
Cited by1 cases

This text of 2010 Ohio 5429 (State v. Poling) is published on Counsel Stack Legal Research, covering Hocking County Municipal Court primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
State v. Poling, 2010 Ohio 5429, 160 Ohio Misc. 2d 84, 2010 WL 4483748 (Ohio Super. Ct. 2010).

Opinion

John T. Wallace, Judge.

{¶ 1} Defendant, Jacob W.J. Poling, challenges the use of evidence that the state of Ohio plans to introduce against him. More specifically, the defendant asks this court to suppress e-mails that were obtained by the mother of his underage girlfriend and were provided to the Hocking County Sheriffs Office.

{¶ 2} Defendant filed his motion to suppress on August 17, 2009. On November 16, 2009, the court held an oral hearing on the motion and asked for supplemental memoranda. On December 3, 2009, defendant filed a supplemental memorandum and a trial brief. On December 7, 2009, the state filed a memorandum contra. After consideration of the arguments, evidence and memoranda, the motion comes on for decision.

Facts

{¶ 3} The defendant is charged with a count of violating a protection order. These charges arose from defendant’s alleged violation of a civil protection order that was obtained in the Common Pleas Court of Hocking County by Jana [86]*86Kaiser. The order prohibited the defendant from having contact with Jana or any member of her family, including her 16-year-old daughter, Stephanie.

{¶ 4} On May 22, 2009, Stephanie was on the computer in the Kaiser home. The computer was centrally located in the family’s living room. The computer was used by the whole family. Jana paid the bill for the home’s computer service. Jana also made it a habit to police Stephanie’s Internet use, and Stephanie knew it. On the evening in question, Jana saw that Stephanie was on MySpace. Two of Stephanie’s young cousins were visiting the Kaiser home that evening.

{¶ 5} Jana asked Stephanie to walk the children down the block to them home. Stephanie left to escort the two young children home. When she left, she did not log off the computer or shut anything down. While Stephanie was gone, Jana checked on her daughter’s activities on the Internet. Jana copied several recent messages that had come to Stephanie’s MySpace account. She then placed the copies into a file that Jana maintained on the computer. Later, Jana reviewed the items that she had copied. The items were messages between Stephanie and the defendant. Jana then went to the Hocking County Sheriffs Office to make a report. Deputy Trent Woodgeard took a report and filed a charge against Poling.

{¶ 6} The issue in this case is whether the actions of Jana violated either Ohio or federal law and whether the e-mails are admissible against the defendant at trial. Defendant maintains that under R.C. 2933.62, the e-mails should be suppressed.

Legal Analysis

{¶ 7} Our starting point is federal law. Ohio’s statute as to the illegal interception of oral, wire, or electric communications found in R.C. 2933.51 very closely tracks the Federal Wire Tap Act, Title I of the Electronic Communications Privacy Act (“ECPA”), Section 2510 et seq., Title 18, U.S.Code.

{¶ 8} However, it appears that the Federal Stored Communications Act (“SCA”), Title II of the Electronic Communications Privacy Act, Section 2701, Title 18, U.S.Code rather than Title I of the ECPA, Sections 2510 et seq., applies to the conduct at issue here. This is important because unlike the Wiretap Act (see Section 2515, Title 18, U.S.Code, prohibition of use as evidence), the SCA does not provide for the exclusion from evidence of material that has been unlawfully accessed. The SCA provides for civil damages and criminal punishment for its violation, see Sections 2701 and 2707, Title 18, U.S.Code, but unlike the Wiretap Act, it does not provide for the exclusion of evidence obtained illegally under the Act. See Section 2708, Title 18, U.S.Code (remedies and sanctions described in this chapter are the only judicial remedies and sanctions [87]*87for nonconstitutional violations of this chapter); United States v. Ferguson (D.D.C.2007), 508 F.Supp.2d 7 (SCA does not provide for suppression of evidence as a remedy); Thus, even if Jana’s conduct had violated the SCA, the evidence in question is not subject to exclusion under the statute. Moreover, it is possible that Jana’s conduct could be deemed to be authorized under the SCA and thus lawful. Even if the conduct is not expressly authorized, it may be deemed nevertheless to be lawful under the concept of implied consent or authorization based on Jana’s parental authority.

{¶ 9} The Wiretap Act provides:

(1) Except as otherwise specifically provided in this chapter any person who:
(a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication;
* * *
(e) intentionally discloses, or endeavors to disclose, to any other person the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection;
(d) intentionally uses, or endeavors to use, the contents of any wire, oral, or electronic communication * * * in violation of this subsection.

(Emphasis added.) Section 2511, Title 18, U.S.Code. The statute defines “intercept” as “the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device.” Section 2510(4), Title 18, U.S.Code. An “electronic communication” is defined as “any transfer of signs, signals, writing, images, sounds, data or intelligence of any nature transmitted in whole or in part by wire, radio, electromagnetic, photoelectronic or photooptical system that effects interstate or foreign commerce.” (Emphasis added.) Section 2510(12), Title 18, U.S.Code.

{¶ 10} By contrast, the SCA, as its name suggests, prohibits the unauthorized access of stored electronic communications:

Except as provided in subsection (c) of this section whoever:
(1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or
(2) intentionally exceeds an authorization to access that facility; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system shall be punished as provided in subsection (b) of this section.

Section 2701(a), Title 18, U.S.Code. As explained in Bunnell v. Motion Picture Assn. of Am. (C.D.Cal.2007), 567 F.Supp.2d 1148, 1152, for purposes of the ECPA, “at any given time, an electronic communication may either be intercept[88]*88ed and actionable under the Wiretap Act, or acquired while in electronic storage and actionable under SCA. An electronic communication may not simultaneously be actionable under both the Wiretap Act and the SCA.” (Citation omitted.) Bunnell at 1152; see United States v. Szymuszkiewicz (June 30, 2009), E.D.Wis. No. 07-CA-171, 2009 WL 1873657, *9 (describing the process by which e-mails are sent and received and the history of the Wiretap Act and the SCA and their different applications).

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Lazette v. Kulmatycki
949 F. Supp. 2d 748 (N.D. Ohio, 2013)

Cite This Page — Counsel Stack

Bluebook (online)
2010 Ohio 5429, 160 Ohio Misc. 2d 84, 2010 WL 4483748, Counsel Stack Legal Research, https://law.counselstack.com/opinion/state-v-poling-ohmunicthocking-2010.