PEOPLE OF MI V CHRISTINE ANN MULLEN

Annotate this Case
Download PDF
STATE OF MICHIGAN COURT OF APPEALS PEOPLE OF THE STATE OF MICHIGAN, UNPUBLISHED June 29, 2004 Plaintiff-Appellee, v No. 244700 Ingham County Circuit Court LC No. 01-077566-FH CHRISTINE ANN MULLEN, Defendant-Appellant. Before: Hoekstra, P.J., and O’Connell and Donofrio, JJ. PER CURIAM. Defendant, Christine Ann Mullen, appeals as of right her conviction by jury of felony embezzlement by agent or trustee, MCL 750.174. The trial court sentenced defendant to two years’ probation, including thirty days in jail1 and 300 hours of community service, and ordered her to pay restitution in the amount of $29,748. We affirm defendant’s conviction, but vacate the order of restitution and remand for further proceedings. In this case, the prosecution alleged that defendant, as a Family Independence Agency (FIA) employee, was entrusted with supervisory authority and control over the FIA’s inventory of computer equipment. In that capacity, defendant allegedly caused two new computer servers to be delivered to her children’s school system, the Olivet school district, without the knowledge or consent of the state. Further, the prosecution maintained that defendant concealed the transfer from the state by refusing to allow the school district to acknowledge the transfer of the computer servers, telling the school district that the computer servers were utilized as part of a pilot program that was nonexistent, and reporting on inventory records filed periodically with the state, as administratively required, that the computer servers were stored in a state controlled warehouse. On appeal, defendant maintains that the trial court erred in denying her pretrial motion for dismissal and her motions for a directed verdict2 because, at most, defendant made an 1 The jail-time was suspended pending exhaustion of any appeals. 2 Defendant moved for directed verdict at the close of the prosecution’s proofs and renewed her motion at sentencing. -1- unauthorized loan of the computers to the Olivet school district, which is insufficient to establish the “fraudulently dispose of” element of embezzlement alleged by the prosecution. Defendant also challenges the sufficiency of the evidence presented at trial. We review a motion to dismiss on legal grounds for error, but if the challenge is based on the factual sufficiency of the evidence, our review is for an abuse of discretion. People v Davis, 209 Mich App 580, 584; 531 NW2d 787 (1995). “In assessing a motion for a directed verdict of acquittal, a trial court must consider the evidence presented by the prosecution to the time the motion is made and in a light most favorable to the prosecution, and determine whether a rational trier of fact could have found that the essential elements of the crime were proved beyond a reasonable doubt.” People v Riley (After Remand), 468 Mich 135, 139-140; 659 NW2d 611 (2003). Our review of the trial court's decision on a motion for directed verdict is de novo. People v Werner, 254 Mich App 528, 530; 659 NW2d 688 (2002). Further, “[w]hen a defendant challenges the sufficiency of the evidence in a criminal case, this Court considers whether the evidence, viewed in a light most favorable to the prosecution, would warrant a reasonable juror to find guilt beyond a reasonable doubt.” Id. At the time of the alleged criminal act, MCL 750.1743 provided in relevant part: Any person who as the … employee of another, or as the trustee, bailee or custodian of the property of another, … or of this state, … shall fraudulently dispose of or convert to his own use, or take or secrete with intent to convert to his own use without the consent of his principal, any money or other personal property of his principal which shall have come to his possession or shall be under his charge or control by virtue of his being such … employee, … as aforesaid, shall be guilty of the crime of embezzlement …. Here, the information alleged that defendant embezzled by fraudulently disposing of the state’s computer servers, and consistent with CJI2d 27.1, the trial court instructed that this element of embezzlement is committed if “… the Defendant dishonestly disposed of the property.” In her brief, defendant argues that embezzlement by fraudulently disposing of personal property is distinguishable from embezzlement by converting to one’s own use. Defendant contends, in essence, that because the phrase “fraudulently dispose of” is not defined in the statute, the trial court should have engaged in statutory construction and ascertained the meaning of those words. This Court has stated that Michigan’s embezzlement statute recognizes two distinct forms of embezzlement. People v Wood, 182 Mich App 50, 53; 451 NW2d 563 (1990). The first of the two is at issue here and “occurs when an individual fraudulently disposes of or converts to his own use money or personal property of his principal.” People v Artman, 218 Mich App 236, 241; 553 NW2d 673 (1996). The other occurs by concealing with intent to convert. Id. Consequently, the fraudulently dispose of or converts to his own use section of the statute does not denominate separate forms of embezzlement, but rather describes only one form of 3 This statute was amended by 199 PA 312, effective January 1, 1999. -2- embezzlement that is potentially committed by either disposing of or converting to one’s own use. In this context, the apparent distinction to be drawn is whether the property is transferred to the possession of another or is retained by the individual. In either case, however, the statute sanctions, like any embezzlement statute, the fraudulent dispossession of money or personal property from the one entitled to possession. In this case, defendant did not retain the property, but rather caused the transfer of the computer servers to the Olivet school district. Consequently, we conclude that the charges made against defendant conform to the statute and no further definition of the statute was required. Next, defendant claims that the transfer was not fraudulent because the evidence only established that she made an unauthorized loan of the computer servers under circumstances where identical computer servers were still stored in the state’s warehouse. Consequently, according to defendant, the state was not deprived of their use and, if necessary, they were available for return to the state from the school district. Under these circumstances, defendant maintains that the case should have been dismissed and that there was insufficient evidence to sustain her conviction. However, defendant’s interpretation of the evidence fails to acknowledge the prosecution’s claim that defendant’s transfer of the computers was dishonest and therefore fraudulent. The dishonesty of the transfer, according to the prosecution’s theory, is shown by the precautions taken by defendant to conceal the true nature of the transfer by telling the school district that the computer servers were part of a pilot project when none existed and discouraging the school district from publicly acknowledging the receipt of the computers or sending an expression of appreciation to the state, and by continuing to certify that the computer servers were stored in a state warehouse. Also, the prosecution showed possible motives for the act being dishonest based on the benefit to her children’s education and defendant’s elevated status and influence in the school district. This evidence is contrary to defendant’s contention that the transfer represented only an unauthorized loan and generates a fact question for the jury to resolve. Moreover, if believed, the evidence defeats defendant’s alternative argument that the evidence was insufficient. From the evidence presented, a rational trier of fact could conclude that the prosecution proved beyond a reasonable doubt the challenged elements of fraudulent disposal and intent to defraud or cheat the state. Next, defendant argues that the trial court erred in ordering restitution in the amount of $29,748. Specifically, defendant maintains that ordering her to pay the amount the servers depreciated in value was improper because the state did not show that the return of the servers was inadequate. We agree. MCL 780.767(1) provides that “[i]n determining the amount of restitution to order under [MCL 780.766], the court shall consider the amount of the loss sustained by any victim as a result of the offense.” MCL 780.767(4) indicates that “[a]ny dispute as to the proper amount or type of restitution shall be resolved by the court by a preponderance of the evidence. The burden of demonstrating the amount of the loss sustained by a victim as a result of the offense shall be on the prosecuting attorney.” Thus, the finding of the restitution amount is a question of fact that this Court reviews for clear error. MCR 2.613(C). MCL 780.766(3) provides: -3- If a crime results in damage to or loss or destruction of property of a victim of the crime or results in the seizure or impoundment of property of a victim of the crime, the order of restitution may require that the defendant do 1 or more of the following, as applicable: (a) Return the property to the owner of the property or to a person designated by the owner. (b) If return of the property under subdivision (a) is impossible, impractical, or inadequate, pay an amount equal to the greater of subparagraph (i) or (ii), less the value, determined as of the date the property is returned, of that property or any part of the property that is returned: (i) The value of the property on the date of the damage, loss, or destruction. (ii) The value of the property on the date of sentencing. (c) Pay the costs of the seizure or impoundment, or both. In the present case, it is undisputed that the two computer servers were returned from the Olivet school district to the state. Consequently, entitlement to restitution hinges on the ability of the prosecution to show 1) that return itself was inadequate and 2) if inadequate, the difference between the value of the computer servers on the date of the damage, loss or destruction or the value of the computers on the date of sentencing, whichever is greater, less their value as of the date of return. MCL 780.766(3)(b). At the restitution hearing, the prosecution established the purchase price of the two computer servers and their value at the time they were returned from the Olivet school district, and requested that the trial court award them the difference, which is essentially what the trial court ordered as the restitution. On this evidence, we find two flaws with the restitution order. First, the trial court failed to make any finding regarding whether the return of the computer servers was inadequate. The prosecution’s expert witness assumed that the servers were functional for the purpose for which they were designed and that their value decreased primarily because of technological advances, not any reduction in their functional usefulness. On this limited record, we believe a question exists for the trial court to resolve regarding the adequacy of the return of the two servers. Further, the prosecution’s proofs at the hearing assumed that the purchase price paid by the state represented the value of the computer servers at the time of their “damage, loss or destruction.” However, just as the market value of the servers declined while being used by the school district, we have no doubt that their value also declined from the moment that they first came into the state’s possession. Consequently, any order of restitution must be based on their value at the time they were removed from the state’s possession, not simply their purchase price. Accordingly, we vacate the order of restitution entered in this case and remand for further proceeding consistent with this opinion. -4- Defendant’s conviction is affirmed, but the order of restitution is vacated and remanded. We do not retain jurisdiction. /s/ Joel P. Hoekstra /s/ Pat M. Donofrio -5-

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.