943.20 AnnotationMultiple convictions for the theft of an equal number of firearms arising from one incident did not violate the protection against double jeopardy. State v. Trawitzki, 2001 WI 77, 244 Wis. 2d 523, 628 N.W.2d 801, 99-2234. 943.20 AnnotationA party to a business transaction has a duty to disclose a fact when: 1) the fact is material to the transaction; 2) the party with knowledge of the fact knows the other party is about to enter into the transaction under a mistake as to the fact; 3) the fact is peculiarly and exclusively within the knowledge of one party, and the mistaken party could not reasonably be expected to discover it; and 4) on account of the objective circumstances, the mistaken party would reasonably expect disclosure of the fact. If a duty to disclose exists, failure to disclose is a representation under sub. (1) (d). State v. Ploeckelman, 2007 WI App 31, 299 Wis. 2d 251, 729 N.W.2d 784, 06-1180. 943.20 AnnotationThe intent of the “from the person” penalty enhancer under sub. (3) (e) is to cover circumstances that make stealing particularly dangerous and undesirable. Although the cash register the defendant was attempting to steal was not connected to the manager at the register, at the time of the attempted theft the manager was within arm’s reach of the defendant while the defendant was smashing the register and was in constructive possession of the money when the attempted theft occurred even if the money was not physically touching the manager’s person. The manager’s constructive possession of the money made this a particularly dangerous and undesirable theft. State v. Tidwell, 2009 WI App 153, 321 Wis. 2d 596, 774 N.W.2d 650, 08-2846. 943.20 AnnotationThe market value to the telephone company of the services that a prisoner’s scam fraudulently obtained was the correct measure of the value of the stolen property in this case. State v. Steffes, 2012 WI App 47, 340 Wis. 2d 576, 812 N.W.2d 529, 11-0691. 943.20 AnnotationThere is no requirement under sub. (1) (d) that at least one co-conspirator expressly promise that the co-conspirator will pay for fraudulently obtained property. Under sub. (1) (d), a false representation includes a promise made with intent not to perform if it is part of a false and fraudulent scheme. Because “includes” is not restrictive, other conduct aside from an express promise falls under the umbrella of a “false representation.” Providing fictitious business names and stolen personal identifying information to a phone company with the intent of setting up temporary phone numbers constitutes a false representation. State v. Steffes, 2013 WI 53, 347 Wis. 2d 683, 832 N.W.2d 101, 11-0691. 943.20 AnnotationApplied electricity that a telephone company uses to power its network is included within the definition of “property” found in sub. (2) (b). State v. Steffes, 2013 WI 53, 347 Wis. 2d 683, 832 N.W.2d 101, 11-0691. 943.20 AnnotationSection 971.36 (3) (a) and (4) allows for aggregation of the value of property alleged stolen when multiple acts of theft are prosecuted as one count. Reading sub. (1) (a) and s. 971.36 (3) (a) and (4) together, multiple acts of theft occurring over a period of time may, in certain circumstances, constitute one continuous offense that is not complete until the last act is completed. State v. Elverman, 2015 WI App 91, 366 Wis. 2d 169, 873 N.W.2d 528, 14-0354. 943.20 AnnotationIn this case, the court’s determination that the subcontractor did not prove its theft-by-contractor claim because the prime contractor was “solvent and always able to pay” was incorrect as a matter of law when the evidence unquestionably showed that the prime contractor retained and used the money it owed to the subcontractor to support the prime contractor’s general account for payment of its own business obligations. The fact that the prime contractor, almost a year after it refused the subcontractor’s first demand for payment and after the subcontractor’s second demand, placed the entire contract amount into the trust account of the prime contractor’s attorney amounted to little more than a continued refusal to pay the amount owed. Century Fence Co. v. American Sewer Services, Inc., 2021 WI App 75, 399 Wis. 2d 742, 967 N.W.2d 32, 19-2432. 943.20 AnnotationIn this case, when the subcontractor undisputedly completed the job as the contract required, a question about how much work was necessary to complete the job was irrelevant to the question of what was owed to the subcontractor under the contract. The prime contractor had no legitimate ground for withholding payment simply because it, after-the-fact, may have regretted not negotiating the contract differently. There was no “bona fide” dispute. Century Fence Co. v. American Sewer Services, Inc., 2021 WI App 75, 399 Wis. 2d 742, 967 N.W.2d 32, 19-2432. 943.20 AnnotationA landlord who failed to return or account for a security deposit ordinarily could not be prosecuted under this section. 60 Atty. Gen. 1.
943.20 AnnotationBoth conversion and civil theft under sub. (1) (b) and s. 895.446 (1) require the victim to have an ownership interest in the property converted or stolen. Under the agreement in this case, the plaintiff operated a brain injury center in the defendant’s nursing facility; the defendant handled all billing and collections for the services the plaintiff provided; and, through a process outlined in the agreement, the defendant remitted the funds collected to the plaintiff. However, the defendant failed to follow through on its obligations under the contract, redirecting the plaintiff’s funds to pay the defendant’s employees and other creditors instead. When one party receives funds from an outside source and is required to remit those funds to the other party, that is enough to create an ownership interest. Milwaukee Center for Independence, Inc. v. Milwaukee Health Care, LLC, 929 F.3d 489 (2019). 943.20 AnnotationState court rulings that unauthorized control was sufficient to support a conviction under sub. (1) (d) were not an unlawful broadening of the offense so as to deprive the defendant of notice and the opportunity to defend. Hawkins v. Mathews, 495 F. Supp. 323 (1980). 943.20 AnnotationSub. (1) (b) is intended to target those entrusted with the property of another who retain or use that property in a way that does not comport with the owner’s wishes. The statute applies only to those who are entrusted with custody or possession or money or property. It does not apply to a breach of contract case over whether a purchaser has met contractual conditions for obtaining a refund. Aslanukov v. American Express Travel Related Services Co., 426 F. Supp. 2d 888 (2006). 943.201943.201 Unauthorized use of an individual’s personal identifying information or documents. 943.201(1)(a)(a) “Personal identification document” means any of the following: 943.201(1)(a)2.2. An individual’s card or plate, if it can be used, alone or in conjunction with another access device, to obtain money, goods, services, or any other thing of value or benefit, or if it can be used to initiate a transfer of funds. 943.201(1)(a)3.3. Any other device that is unique to, assigned to, or belongs to an individual and that is intended to be used to access services, funds, or benefits of any kind to which the individual is entitled. 943.201(1)(b)(b) “Personal identifying information” means any of the following information: 943.201(1)(b)7.7. An identification number assigned to an individual by his or her employer. 943.201(1)(b)12.12. Any of the following, if it can be used, alone or in conjunction with any access device, to obtain money, goods, services, or any other thing of value or benefit, or if it can be used to initiate a transfer of funds: 943.201(1)(b)12.b.b. An individual’s electronic serial number, mobile identification number, personal identification number, or other telecommunications service, equipment, or instrument identifier. 943.201(1)(b)13.13. An individual’s unique biometric data, including fingerprint, voice print, retina or iris image, or any other unique physical representation. 943.201(1)(b)14.14. Any other information or data that is unique to, assigned to, or belongs to an individual and that is intended to be used to access services, funds, or benefits of any kind to which the individual is entitled. 943.201(1)(b)15.15. Any other information that can be associated with a particular individual through one or more identifiers or other information or circumstances. 943.201(2)(2) Whoever, for any of the following purposes, intentionally uses, attempts to use, or possesses with intent to use any personal identifying information or personal identification document of an individual, including a deceased individual, without the authorization or consent of the individual and by representing that he or she is the individual, that he or she is acting with the authorization or consent of the individual, or that the information or document belongs to him or her is guilty of a Class H felony: 943.201(2)(a)(a) To obtain credit, money, goods, services, employment, or any other thing of value or benefit. 943.201(2)(c)(c) To harm the reputation, property, person, or estate of the individual. 943.201(3)(3) It is an affirmative defense to a prosecution under this section that the defendant was authorized by law to engage in the conduct that is the subject of the prosecution. A defendant who raises this affirmative defense has the burden of proving the defense by a preponderance of the evidence. 943.201(4)(4) If an individual reports to a law enforcement agency for the jurisdiction which is the individual’s residence that personal identifying information or a personal identifying document belonging to the individual reasonably appears to be in the possession of another in violation of this section or that another has used or has attempted to use it in violation of this section, the agency shall prepare a report on the alleged violation. If the law enforcement agency concludes that it appears not to have jurisdiction to investigate the violation, it shall inform the individual which law enforcement agency may have jurisdiction. A copy of a report prepared under this subsection shall be furnished upon request to the individual who made the request, subject to payment of any reasonable fee for the copy. 943.201 AnnotationBecause bail is statutorily defined as “monetary conditions of release,” and can be expressed as cash, a bond, or both, one who misappropriates another’s identity and uses it to obtain lower bail in a criminal case has done so to obtain credit or money within the meaning of this section. State v. Peters, 2003 WI 88, 263 Wis. 2d 475, 665 N.W.2d 171, 01-3267. 943.201 AnnotationA violation of this section is a continuing offense that is complete when a defendant performs the last act that, viewed alone, is a crime. An offense continues after fraudulently obtained phone and credit accounts are closed only if the defendant received a “thing of value or benefit” after the accounts are closed. Here, once those accounts were closed, the benefits to the defendant ended. State v. Lis, 2008 WI App 82, 311 Wis. 2d 691, 751 N.W.2d 891, 07-2357. 943.201 AnnotationAlthough the purpose of harming an individual’s reputation is an element of identity theft, the statute does not directly punish for the intent to defame and indirectly punish for disclosure of defamatory information, in violation of the 1st amendment. This section criminalizes the whole act of using someone’s identity without permission plus using the identity for one of the enumerated purposes, including harming another’s reputation. The statute does not criminalize each of its component parts standing alone. This section neither prohibits a defendant from disseminating information about a public official nor prevents the public from receiving that information. State v. Baron, 2008 WI App 90, 312 Wis. 2d 789, 754 N.W.2d 175, 07-1289. 943.201 AnnotationAs applied in this case, sub. (2) (c) was content based and regulated speech because whether the defendant’s conduct was prohibited depended entirely upon whether the defendant’s speech, i.e., the content of e-mails sent using another individual’s identity, was intended to be reputation-harming to that other individual. The statute survives strict scrutiny because the statute is narrowly tailored to apply only when a defendant intentionally uses an individual’s personal information to harm that individual’s reputation. The statute does not prevent revealing reputation-harming information so long as the method chosen does not entail pretending to be the targeted individual. State v. Baron, 2009 WI 58, 318 Wis. 2d 60, 769 N.W.2d 34, 07-1289. 943.201 AnnotationUse of a stolen credit card at a gas pump constituted a representation that the defendant was the cardholder or that the defendant was authorized to use the card for the purposes of proving a violation of this section. The conduct of presenting certain documents containing an entity’s identifying information carries with it the representation of permission to use that entity’s information, and no additional overt act or affirmative express representation is required. State v. Mason, 2018 WI App 57, 384 Wis. 2d 111, 918 N.W.2d 78, 17-0620. 943.202943.202 Unauthorized use or possession of a credit card scanner. 943.202(1)(a)(a) “Access” means access, read, scan, intercept, obtain, memorize, or temporarily or permanently store. 943.202(1)(b)(b) “Credit card” means a credit card, charge card, debit card, or other card that allows an authorized user to obtain, purchase, or receive credit, money, goods, services, or any other thing of value. 943.202(1)(c)(c) “Reencoder” means an electronic device that places encoded information from a computer chip or magnetic strip or stripe of a credit card onto the computer chip or magnetic strip or stripe of a credit card or any electronic medium that allows a transaction to occur. 943.202(1)(d)(d) “Scanning device” means a scanner, reader, or any other electronic device that can access information encoded on a computer chip or magnetic strip or stripe of a credit card. 943.202(2)(a)(a) Whoever possesses a reencoder or a scanning device, with the intent to violate s. 943.201 (2) or 943.203 (2) or to access information encoded on a credit card without the permission of an authorized user of the credit card, is guilty of a Class I felony. 943.202(2)(b)(b) Whoever does any of the following is guilty of a Class H felony: 943.202(2)(b)1.1. Possesses a reencoder or a scanning device with the intent to transfer it to another person if the person knows or should know the transferee will use the reencoder or scanning device to violate s. 943.201 (2) or 943.203 (2) or to access information encoded on a credit card without the permission of an authorized user of the credit card. 943.202(2)(b)2.2. Uses or attempts to use a reencoder or a scanning device to violate s. 943.201 (2) or 943.203 (2) or to access information encoded on a credit card without the permission of an authorized user of the credit card. 943.202(2)(c)(c) Whoever uses a reencoder or scanning device to violate s. 943.201 (2) or 943.203 (2) or to access information encoded on a credit card without the permission of an authorized user of the credit card is guilty of a Class G felony if the person obtains, purchases, or receives credit, money, goods, services, or any other thing of value from the use. 943.202 HistoryHistory: 2017 a. 54. 943.203943.203 Unauthorized use of an entity’s identifying information or documents. 943.203(1)(a)(a) “Entity” means a person other than an individual. 943.203(1)(b)(b) “Identification document” means any of the following: 943.203(1)(b)2.2. An entity’s card or plate, if it can be used, alone or in conjunction with another access device, to obtain money, goods, services, or any other thing of value or benefit, or if it can be used to initiate a transfer of funds. 943.203(1)(b)3.3. Any other device that is unique to, assigned to, or belongs to an entity and that is intended to be used to access services, funds, or benefits of any kind to which the entity is entitled. 943.203(1)(c)(c) “Identifying information” means any of the following information: 943.203(1)(c)6.6. Any of the following, if it can be used, alone or in conjunction with any access device, to obtain money, goods, services, or any other thing of value or benefit, or if it can be used to initiate a transfer of funds: 943.203(1)(c)6.b.b. An entity’s electronic serial number, mobile identification number, entity identification number, or other telecommunications service, equipment, or instrument identifier. 943.203(1)(c)7.7. Any other information or data that is unique to, assigned to, or belongs to an entity and that is intended to be used to access services, funds, or benefits of any kind to which the entity is entitled. 943.203(1)(c)8.8. Any other information that can be associated with a particular entity through one or more identifiers or other information or circumstances. 943.203(2)(2) Whoever, for any of the following purposes, intentionally uses, attempts to use, or possesses with intent to use any identifying information or identification document of an entity without the authorization or consent of the entity and by representing that the person is the entity or is acting with the authorization or consent of the entity is guilty of a Class H felony: 943.203(2)(a)(a) To obtain credit, money, goods, services, or anything else of value or benefit.
/statutes/statutes/943
true
statutes
/statutes/statutes/943/iii/201/1/b/6
Chs. 939-951, Criminal Code
statutes/943.201(1)(b)6.
statutes/943.201(1)(b)6.
section
true