State v. Christopher Baron

Annotate this Case
Download PDF
2009 WI 58 SUPREME COURT CASE NO.: COMPLETE TITLE: OF WISCONSIN 2007AP1289-CR State of Wisconsin, Plaintiff-Appellant, v. Christopher Baron, Defendant-Respondent-Petitioner. REVIEW OF A DECISION OF THE COURT OF APPEALS 2008 WI App 90 Reported at: 312 Wis. 2d 789, 754 N.W.2d 175 (Ct. App 2008-Published) OPINION FILED: SUBMITTED ON BRIEFS: ORAL ARGUMENT: June 23, 2009 March 6, 2009 SOURCE OF APPEAL: COURT: COUNTY: JUDGE: Circuit Jefferson Randy R. Koschnick JUSTICES: CONCURRED: BRADLEY, J., concurs (opinion filed). PROSSER, J., concurs (opinion filed). DISSENTED: NOT PARTICIPATING: ABRAHAMSON, C.J., did not participate. ATTORNEYS: For the defendant-respondent-petitioner there were briefs by Daniel P. Dunn and the Dunn Law Office, Madison, and oral argument by Daniel P. Dunn. For the plaintiff-appellant the cause was argued by Jeffrey J. Kassel, assistant attorney general, with whom on the brief was J.B. Van Hollen, attorney general. 2009 WI 58 NOTICE This opinion is subject to further editing and modification. The final version will appear in the bound volume of the official reports. No. 2007AP1289-CR (L.C. No. 2006CF496) STATE OF WISCONSIN : IN SUPREME COURT State of Wisconsin, FILED Plaintiff-Appellant, JUN 23, 2009 v. David R. Schanker Clerk of Supreme Court Christopher Baron, Defendant-Respondent-Petitioner. REVIEW of a decision of the Court of Appeals. ¶1 ANNETTE KINGSLAND ZIEGLER, J. Affirmed. This is a review of a published court of appeals' decision1 that reversed the decision of the Judge. Jefferson The County circuit Circuit court Court, Randy concluded that R. Koschnick, Wis. Stat. § 943.201(2)(c)(2005-06),2 which punishes the unauthorized use of another individual's personal identifying information in order to harm the individual's applied to Baron. 1 State N.W.2d 175. 2 v. reputation, was unconstitutional as The State appealed, and the court of appeals Baron, 2008 WI App 90, 312 Wis. 2d 789, 754 All subsequent references to the Wisconsin Statutes are to the 2005-06 version unless otherwise indicated. No. 2007AP1289-CR reversed the circuit court. Baron petitioned this court for review, which we accepted. We affirm the court of appeals' decision. ¶2 This case requires us to decide whether Wis. Stat. § 943.201(2)(c) is unconstitutional as applied to Baron because it violates his First Amendment right to freedom of speech. We conclude that the State has shown beyond a reasonable doubt that § 943.201(2)(c), as applied to Baron, is narrowly tailored to achieve a compelling government interest and therefore does not violate Baron's constitutional right to freedom of speech. I. BACKGROUND ¶3 Christopher Baron worked as an emergency medical technician for the city of Jefferson under the direction of Mark Fisher who was the director of Jefferson's Emergency Medical Services. ¶4 2006, As alleged in the criminal complaint, on August 10, Baron accessed Mark Fisher's e-mail account by Fisher's password, which Baron had previously acquired. accessing Fisher's e-mail account, Baron found a using After number of e-mails allegedly showing that Fisher was having an extramarital affair. Baron organized the various e-mails into one e-mail message and then sent the message to people in the Jefferson community. was such The similar subject line of the e-mail message sent as: "What's Mark been up to." The e-mails were discussions between Fisher and a woman other than his spouse about their sexual activity and sexual preferences. Even though Baron was the one who organized and sent the e-mails, he did so 2 No. 2007AP1289-CR in a manner that made the e-mails appear to come from Mark Fisher's e-mail account. The day after Baron sent out the e-mails, Fisher committed suicide. ¶5 When questioned by authorities, Baron admitted that he had sent the e-mails to get Fisher in trouble. Baron stated that he originally intended to send the e-mails only to Fisher's wife, but he then sent them to other people so they could see that Fisher was not "golden." ¶6 Baron was charged as follows: criminal defamation in violation of Wis. Stat. § 942.01(1), which was voluntarily dismissed by the State; two counts of obstructing an officer in violation crimes of Stat. violation in Wis. of § 946.41(1); Wis. Stat. two counts § 943.70(2); of computer and identity theft in violation of Wis. Stat. § 943.201(2)(c). ¶7 The only charge at issue in this appeal is identity theft violation under Wis. Stat. § 943.201(2)(c). the With regard to that charge, the complaint provided that Baron "did intentionally use personal identifying information or personal identification documents . . . of Mark G. Fisher to harm the reputation of consent representing by [Fisher] without [Fisher's] that was he authorization [Fisher] . . . ." or The information, which was filed on November 13, 2006, clarified that the personal identifying information that Baron used was Mark Fisher's name. ¶8 Baron filed a motion to dismiss the Wis. Stat. § 943.201(2)(c) charge because he argued that the statute was unconstitutional as applied to his conduct. 3 The circuit court No. granted the motion. The circuit court 2007AP1289-CR reasoned that § 943.201(2)(c) contains a defamation element, which interferes with Baron's First Amendment right to free speech, i.e., his First Amendment right to defame a public official. The circuit court concluded that while it was not a clear cut case and there were reasonable arguments on both sides, it had concerns about the chilling effect that would arise by applying this statute to Baron's conduct. ¶9 The decision. court of appeals reversed the circuit court's It concluded that Baron's logic was flawed because he focused on the "purpose" element in isolation. The court of appeals are replete may otherwise stated provisions that that "Wisconsin criminalize statutes conduct that with be constitutionally protected, if that conduct is carried out in an unlawful manner."3 As a result, Baron petitioned this court for review, which we accepted. II. STANDARD OF REVIEW ¶10 The constitutionality of a statute is a question of law that we review de novo. State v. Zarnke, 224 Wis. 2d 116, 124, 589 N.W.2d 370 (1999). A presumption of constitutionality generally exists for a legislative enactment, and as a result, 3 The court of appeals, relying on an argument made by the State, also reasoned that Wis. Stat. § 943.201(2)(c) was constitutional because if Baron's logic was followed, the bribery statute Wis. Stat. § 946.10(1) would be unconstitutional. We decline the opportunity to evaluate the constitutionality of the bribery statute because that issue is not now before the court and it is not determinative in our evaluation of § 943.201(2)(c). 4 No. 2007AP1289-CR those challenging a statute's constitutionality must show it is unconstitutional because Wis. beyond Stat. a reasonable § 943.201(2)(c) doubt. implicates Id. However, First Amendment rights, the State has the burden to prove that the statute is constitutional beyond a reasonable doubt. Id. at 124-25. As discussed in ¶¶31-32, the State must, therefore, prove that this statute passes either strict or intermediate scrutiny to be of an deemed constitutional. III. ANALYSIS ¶11 Wisconsin individual's Stat. personal § 943.201, identifying "Unauthorized information or use documents," provides in relevant part: (2) Whoever, for any of the following purposes, intentionally uses, attempts to use, or possesses with intent to use any personal identifying information or personal identification document of an individual, including a deceased individual, without the authorization or consent of the individual and by representing that he or she is the individual, that he or she is acting with the authorization or consent of the individual, or that the information or document belongs to him or her is guilty of a Class H felony: . . . . (c) To individual.4 ¶12 harm the reputation . . . of the The First Amendment5 provides: "Congress shall make no law respecting an establishment of religion, or prohibiting the 4 We limit our analysis and decision in this case to the portion of Wis. Stat. § 943.201(2)(c) that was charged, i.e., the portion of the statute that prohibits the intent to harm an individual's reputation by the unauthorized use of the individual's personal identifying information. 5 No. 2007AP1289-CR free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances." ¶13 Pursuant to Wis. Stat. § 943.201(2)(c), Baron was charged with one count of identity theft; the State alleged that Baron "did intentionally use personal identifying information or personal identification documents . . . of Mark G. Fisher to harm the reputation of [Fisher] without [Fisher's] authorization or consent by representing that he was [Fisher] . . . ." ¶14 In order to determine if Wis. Stat. § 943.201(2)(c), as applied to Baron, violates his First Amendment rights we must address regulate two crucial speech6 or questions: conduct First, alone? does If § 943.201(2)(c) neither speech nor expressive conduct is being regulated, we need not utilize a First Amendment analysis because the statute does not implicate the First Amendment. Second, if speech or expressive conduct is being regulated, is the statute's regulation content based or content neutral? scrutiny whereas intermediate A content-based statute must survive strict a content-neutral scrutiny. In either statute event, must it is survive the only State's burden to prove that § 943.201(2)(c) is constitutional. 5 Section One of the Fourteenth Amendment to the United States Constitution incorporated the First Amendment so that it applies to state governments. DiMa Corp. v. Town of Hallie, 185 F.3d 823, 826 (7th Cir. 1999). 6 Speech includes expressive conduct. U.S. 397, 403-04 (1989). 6 Texas v. Johnson, 491 No. ¶15 2007AP1289-CR Baron argues that the charge must be dismissed because Wis. Stat. § 943.201(2)(c) is a content-based statute that does not survive strict scrutiny, and in turn, the charge against Baron violates his constitutional right to free speech. In response, the State argues the following three points: First, this statute regulates conduct and not speech; second, if speech is being regulated, the statute is content neutral and survives intermediate based, it scrutiny; survives and third, strict if the scrutiny. statute We is content conclude that § 943.201(2)(c), as applied to the facts of this specific case, is content based and regulates speech in addition to conduct,7 and as a result, the statute should be analyzed under strict scrutiny. However, because, as applied to Baron, the statute is narrowly tailored to achieve a compelling government interest, it is nonetheless constitutional. 7 This statute regulates conduct because it regulates the use of another's identity and the distribution of reputationharming materials. In this case, however, the statute also regulates speech because speech i.e., the e-mail's content was used with the intent to harm another's reputation and this is also the basis of Baron's criminal conduct. While Wis. Stat. § 943.201(2)(c) regulates conduct and speech in the case at hand, this may not always be the case. Potentially, conduct alone could constitute identity theft used with the intent to harm the individual's reputation. We do not decide that issue today. 7 No. 2007AP1289-CR A. Speech or conduct ¶16 In order to determine if a First Amendment analysis is required, we must first consider whether conduct alone or speech, which includes expressive conduct, is being regulated. See Texas v. Johnson, 491 U.S. 397, 403-04 (1989); State v. Robins, 2002 WI 65, ¶41, 253 Wis. 2d 298, 646 N.W.2d 287. speech or expressive conduct is being regulated, the If First Amendment is implicated. In Johnson, 491 U.S. at 404, the United States Supreme ¶17 Court considered considered whether speech the such act that of it flag desecration possessed was "sufficient communicative elements to bring the First Amendment into play." The statute provides in at issue, part: "Desecration "'(a) A person of commits Venerated an Object," offense if he intentionally or knowingly desecrates: . . . a state or national flag.'" Id. at 400 (citing Texas Penal Code Ann. § 42.09(a)(3) (1989)). The defendant burned the American flag while at a protest demonstration. his actions were Id. at 399. "'sufficiently The Court concluded that imbued with elements communication'" "to implicate the First Amendment." (citation omitted). First Amendment of Id. at 406 As a result, the Court continued with a analysis and ultimately concluded that defendant's conduct was protected by the First Amendment. the Id. at 407-20. ¶18 the In United States v. O'Brien, 391 U.S. 367, 376 (1968), Court considered whether 8 the act of destroying a No. "registration certificate"8 constituted speech. 2007AP1289-CR The statute at issue in O'Brien subjected a person to criminal liability if he "'knowingly destroys (or) knowingly mutilates' a certificate." Id. at 375 (citation omitted). The Court noted that the statute "plainly does not abridge free speech on its face" and "on its face deals with conduct having no connection with speech." The Court stated that "[w]e cannot accept the view Id. that an apparently limitless variety of conduct can be labeled 'speech' whenever the person engaging in the conduct intends thereby to express an idea." Id. at 376. Nonetheless, the Court undertook a First Amendment analysis "on the assumption that the alleged communicative element in O'Brien's conduct [wa]s sufficient to bring into play the First Amendment." ¶19 In Robins, 253 Id. Wis. 2d 298, ¶¶39-44, this court considered whether the child enticement statute regulated speech or conduct. The statute, Wis. Stat. § 948.07, provides that "[w]hoever, . . . causes or attempts to cause any child who has not attained building, felony." the room or Id., age of 18 secluded ¶25 years place (citing to is Wis. 8 go into guilty Stat. of any a vehicle, Class § 948.07 BC (1999- The Court described the registration certificate as follows: "When a male reaches the age of 18, he is required by the Universal Military Training and Service Act to register with a local draft board. He is assigned a Selective Service number, and within five days he is issued a registration certificate." United States v. O'Brien, 391 U.S. 367, 372-73 (1968). "The registration certificate specifies the name of the registrant, the date of registration, and the number and address of the local board with which he is registered." Id. at 373. 9 No. 2000)(original emphasis omitted)). 2007AP1289-CR The defendant argued that that his conviction violated his right to free speech because statements9 he had made to entice the child were used in his conviction. Id., ¶39. This court concluded that the statute did not regulate speech or any variation of speech, such as expression. Id., ¶¶41-43. The court, citing to Giboney v. Empire Storage & Ice Co., 336 U.S. 490, 498 (1949), stated that "[t]he United States Supreme Court has rejected the contention that the First Amendment extends to speech that is incidental to or part of a course of criminal conduct." "It is not 'an abridgement of freedom of speech or press to make a course of conduct illegal initiated, merely evidenced, or because the conduct carried out by either spoken, written, or printed.'" means was of in part language, Robins, 253 Wis. 2d 298, ¶¶41-42. 9 Robins, who was 46 years old had internet conversations with a minor that included in part: WI4kink: So you ever get to Milwaukee? Benjm13: sometimes withmy [sic] mom WI4kink: cool so how would we ever meet? Benjm13: i dont know u can come here if u want . . . WI4kink: could just get a room somewhere Benjm13: oh that would be cool-like a motel WI4kink: yup State v. Robins, N.W.2d 287. 2002 WI 65, 10 ¶6, 253 Wis. 2d 298, 646 No. ¶20 Robins Id., 2007AP1289-CR Rather than regulating speech, this court concluded in that ¶43. the child This enticement court statute reasoned regulated conduct. Robins' internet that conversations did not constitute the crime of child enticement, but rather, his internet conversations were evidence of his intent to entice a child." "circumstantial Id., ¶44. Just because "some of the proof in [a] case consists of internet 'speech' does not mean" the First Amendment has been implicated. Id. ¶21 In the case at hand, Wis. Stat. § 943.201(2) provides in relevant part: "Whoever, for any of the following purposes[, e.g., to harm the reputation of the individual,] intentionally uses . . . any personal identifying information . . . of the individual . . . without the authorization or consent of the individual and by representing that he or she is the individual, . . . is guilty of a Class H felony." ¶22 We conclude that, as charged and as applied to the facts of this case, Wis. Stat. § 943.201(2)(c) regulates speech in addition to conduct. The statute punishes a person for using another individual's personal identifying information with the intent to harm that individual's reputation.10 Under the facts 10 As provided in Wis JI Criminal 1458, the elements of Wis. Stat. § 943.201(2) in this case are as follows: 1. The defendant intentionally used identifying information of [the] individual. personal 2. The defendant intentionally used personal identifying information of [the] individual to harm the reputation . . . of the individual. 11 No. 2007AP1289-CR of this case, the statute regulates conduct because it restricts the use of another's identity and the distribution of reputation-harming materials, but speech is also being regulated because the content of the e-mails is critical in order to evidence Baron's intent to use personal identifying information to harm Fisher's reputation. Therefore, this is not a case as in Robins where the conduct was merely initiated, evidenced, or carried out in part by speech. Rather, this is a case where the reputation-harming portion of the charge is evidenced by the content of the speech, i.e., the content of the e-mails. ¶23 Unlike in Robins, where speech was used to show the defendant's intent to entice a child, speech in this case is not used to show the defendant's intent to use another individual's personal speech, identifying which were information. used with the Absent intent the e-mails, to harm i.e., Fisher's reputation, Baron has not committed an element of the crime as alleged. Therefore, just as communicative elements were being regulated in Johnson and O'Brien, being regulated in this case. communicative elements are Under the statute as charged and applied to the facts of this case, it is the content of the e-mails, i.e., the speech, that evidences the defendant's intent to use personal identifying information to harm Fisher's 3. The defendant acted without the authorization or consent of [the] individual and knew that [the] individual did not give authorization or consent. 4. The defendant intentionally represented that he was [the] individual. 12 No. reputation. 2007AP1289-CR Thus, here, speech in addition to conduct is being regulated.11 ¶24 Wis. The Stat. State is that personal intended to the prohibited is § 943.201(2)(c) individual's that argues the unauthorized identifying harm information another conduct and individual's under use of an not speech reputation. Therefore, under the State's argument, it is only conduct that is being regulated and not speech, and thus, the First Amendment is not implicated. WI 89, ¶17, 236 The State relies on State v. Derango, 2000 Wis. 2d 721, 613 N.W.2d 833, and bases its argument on an analogy to the child enticement statute, Wis. Stat. 948.07. The State explains that the child enticement statute criminalizes the act of causing a child to go to a secluded place rather than the underlying sexual misconduct that is set forth in subsections (1) through (6) of the statute. ¶25 The child enticement statute applied in Derango reads: Whoever, with intent to commit any of the following acts, causes or attempts to cause any child who has not attained the age of 18 years to go into any vehicle, building, room or secluded place is guilty of a Class BC felony: 11 Arguably, under the current statutory language, if Baron had used Fisher's identity but did not do so in a manner to harm Fisher's reputation, the State would be relegated to charging another subsection of the identity theft statute or some other statute altogether. While this may not have been what the legislature intended, that is, the legislature may have intended to criminalize the unauthorized use of another's identity, the current statutory language, under subsection (c) of Wis. Stat. § 943.201(2), would seem to allow such use of another individual's identity if that use is not harmful to the reputation of the individual. 13 No. 2007AP1289-CR (1) Having sexual contact or sexual intercourse with the child in violation of s. 948.02 or 948.095. (2) Causing the child to engage in prostitution. (3) Exposing a sex organ to the child or causing the child to expose a sex organ in violation of s. 948.10. (4) Taking a picture or making an audio recording of the child engaging in sexually explicit conduct. (5) Causing bodily or mental harm to the child. (6) Giving or selling to the child a controlled substance or controlled substance analog in violation of ch. 961. Id., ¶16 (citing Wis. Stat. § 948.07 (1995-96)). Wisconsin Stat. § 943.201(2) provides: Whoever, for any of the following purposes, intentionally uses, attempts to use, or possesses with intent to use any personal identifying information or personal identification document of an individual, including a deceased individual, without the authorization or consent of the individual and by representing that he or she is the individual, that he or she is acting with the authorization or consent of the individual, or that the information or document belongs to him or her is guilty of a Class H felony: (a) To obtain employment, benefit. credit, or any money, goods, other thing of services, value or (b) To avoid civil or criminal process or penalty. (c) To harm the reputation, estate of the individual. property, ¶26 an enticement According statute to the shows State, that Wis. person, analogy Stat. to the or child § 943.201(2)(c) prohibits only conduct and does not regulate speech. Under the State's theory, the prohibited conduct is the unauthorized use 14 No. of another individual's personal identifying 2007AP1289-CR information, and therefore, subsections (a) through (c) are simply ways to carry out that identity theft. unpersuasive because The State's argument in this regard is the subsections of the child enticement statute are not analogous to the subsections of the identity theft statute. ¶27 The child enticement statute criminalizes one act, i.e., the act of causing a child to go into a secluded place, but the act has Derango, 236 Derango that six different Wis. 2d 721, multiple possible ¶¶15-25. acts were modes This not of court being commission. reasoned punished in because multiple prohibited acts arise and "warrant separate punishment when [the prohibited significantly acts] different are in separate nature." in time Id., or ¶21. are Under subsections (1) through (6) of the child enticement statute, "a defendant might very often possess intention when enticing a child." more Id. than one prohibited For example, intent to have sexual intercourse "also encompasses intent to expose or cause the child to expose a sex organ; or, a defendant may entice a child with the dual purpose of giving her drugs and exploiting her sexually." ¶28 statute, Subsections on the Id. (a) other through hand, are (c) of the identity different in nature, and thus identity theft can occur in multiple ways.12 As 12 significantly theft Cf. State v. Sauceda, 168 Wis. 2d 486, 499-500, 485 N.W.2d 1 (1992) (concluding that the sexual assault statute, Wis. Stat. § 940.225, intended multiple punishments and thus prohibits multiple acts). 15 No. a result, the prohibited conduct simply the use of Fisher's identity. charged 2007AP1289-CR includes more than The way in which the State charged the offense here involved the use of Fisher's identity to distribute communications reputation of Fisher. that were intended to harm the Therefore, this statute prohibits the combination of the use of the individual's personal identifying information with the intent to harm the reputation of that individual. Since in this case, the use of another's personal identifying information was coupled with reputation-harming speech, i.e., the content of the e-mails, we conclude that, in this case, Wis. Stat. addition to conduct. § 943.201(2)(c) regulates speech in As a result, we must proceed further with a First Amendment analysis to determine whether § 943.201(2)(c) is content based or content neutral. B. Content based or content neutral ¶29 The State, relying on the court of appeals' decision in this case, argues that the statute is content neutral because it does not impose any cognizable burden on political speech. Baron, on the other hand, argues that the statute regulates speech based on the ideas or message expressed, and as a result, it is content based. ¶30 "At the heart of the First Amendment lies the principle that each person should decide for himself or herself the ideas and beliefs deserving of expression, consideration, and adherence." Turner Broad. Sys., Inc. v. F.C.C., 512 U.S. 622, 641 (1994). "Our political system and cultural life rest upon this ideal." Id. 16 No. ¶31 is 2007AP1289-CR As a result, government action that regulates speech appropriately limited. However, if speech is being regulated, the regulation must survive strict scrutiny if it is content based or intermediate scrutiny if it is content neutral. Id. at 642. ¶32 Determining when the regulation of speech is content based or content neutral can prove difficult. rule, laws that "distinguish favored Id. speech As a general from disfavored speech on the basis of the ideas or views expressed are content based." Id. at 643. However, "laws that confer benefits or impose burdens on speech without reference to the ideas or views expressed" are generally content neutral. Id. A review of, primarily, United States Supreme Court precedent is helpful in delineating between content-based and content-neutral regulations. ¶33 For example, in Boos v. Barry, 485 U.S. 312 (1988), the Court concluded that the statute at issue was content based. The governing statute provided that "'[i]t shall be unlawful to display any flag, banner, placard, or device designed or adapted to . . . bring into public odium any foreign government . . . within 500 feet of any . . . embassy . . . .'" (emphasis added)(citation omitted). Protestors Id. at 316 claimed the statute prohibited them from engaging in "expressive activities" that were critical of the Soviet Union and Nicaragua. 315-16. Id. at The Court concluded the statute was content based by reasoning that "[w]hether individuals may picket in front of a foreign embassy depends entirely upon whether their picket signs 17 No. are critical of the foreign government." 2007AP1289-CR Id. at 318-19. While favorable speech is permitted, "[o]ne category of speech has been completely prohibited." ¶34 Id. at 319. In Burson v. Freeman, 504 U.S. 191 (1992), the Court concluded that the relevant statute was content based. The governing statute provided that "'[w]ithin . . . 100 feet from the entrances, and the building in which the polling place is located, the display campaign materials, of campaign distribution of posters, signs campaign or other materials, solicitation of votes . . . are prohibited.'" and Id. at 193-94 (emphasis added) (internal brackets and citation omitted). A campaign official challenged the statute because it "limited her ability to communicate with voters." Id. at 194. concluded that the statute was content based. "[w]hether individuals may exercise their The Court It reasoned that free speech rights near polling places depends entirely on whether their speech is related to a political campaign." ¶35 Id. at 197. On the other hand, in Members of City Council of City of Los Angeles v. Taxpayers for Vincent, 466 U.S. 789 (1984), the Court concluded the ordinance at issue was content neutral. The governing ordinance provided that "'[n]o person shall paint, mark or write on, or post or otherwise affix, any hand-bill or sign to or upon any . . . electric light or power or telephone or telegraph or trolley wire pole . . . .'" (citation omitted). Id. at 792 n.1 A group supporting a candidate for public office attached cardboard signs to various utility poles. at 792-93. Id. Pursuant to the ordinance, city employees removed 18 No. 2007AP1289-CR the signs, which resulted in the group seeking an injunction against enforcing the ordinance. Id. at 793. concluded the ordinance was content neutral. The Court It reasoned that "there is not even a hint of bias or censorship in the City's enactment or enforcement of this ordinance," and "[t]here is no claim that the ordinance was designed to suppress certain ideas that the City further stated finds distasteful." that the "text of Id. the at 804. ordinance The is Court neutral indeed it is silent concerning any speaker's point of view." Id. ¶36 Similarly, in City of Renton v. Playtime Theatres, Inc., 475 U.S. 41 (1986), the Court concluded that the ordinance at issue was any prohibited content "'adult neutral. motion The picture applicable theater' ordinance from locating within 1,000 feet of any residential zone, single- or multiplefamily dwelling, church, or park, and within one mile of any school." Id. at 44. The Court acknowledged that the ordinance did "not appear to fit neatly into either the 'content-based' or the 'content-neutral' category," but it ultimately concluded the ordinance was content neutral. Id. at 47-48. The Court reasoned that "[t]he ordinance by its terms [wa]s designed to prevent crime, protect the city's retail trade, maintain property values, and generally 'protect and preserve the quality of the quality city's of neighborhoods, urban unpopular views." life,' not commercial to suppress districts, the and expression the of Id. at 48 (citing Young v. American Mini Theatres, Inc., 427 U.S. 50, 82 n.4 (1976) (brackets omitted). 19 No. 2007AP1289-CR The Court further stated that "'if the city had been concerned with restricting the message purveyed by adult theaters, it would have tried to close them or restrict their number rather than circumscribe their choice as to location.'" Id. (brackets omitted). ¶37 In United States v. Brock, 863 F. Supp. 851 (E.D. Wis. 1994) affirmed by United States v. Soderna, 82 F.3d 1370 (7th Cir. 1996), the applicable statute provided that anyone who "by force or threat of force or by physical obstruction, intentionally injures, intimidates or interferes with any person because that person is or has been, or in order to intimidate such person or any other person or any class of persons from, Id. at obtaining or providing reproductive health services." 856 (citing in relevant part 18 U.S.C. § 248(a)(1)). The district court concluded that the statute was content neutral because it sought to "protect[] ingress to and egress from clinics," id. at 861, and it was "'justified without reference to the content of' any regulated speech." Id. at 865 (citation omitted). ¶38 In the case at hand, we conclude that Wis. Stat. § 943.201(2)(c) is content based because whether Baron's conduct is prohibited depends entirely upon whether Baron's speech, i.e., the content of the e-mails, was intended to be reputationharming speech, which is similar to the content-based provisions in Boos and Burson where the prohibition was dependent upon whether signs were critical of foreign governments or related to political campaigns. However, we do not decide today whether 20 No. 2007AP1289-CR subsection (c) of Wis. Stat. § 943.201(2) must always be deemed content based under all circumstances as we do not address potential situations where something other than speech is used with the intent to harm another's reputation. ¶39 Unlike Taxpayers for Vincent, Renton, or Brock where the statutes were not designed to suppress certain ideas, this statute under the facts of this case, suppresses reputationharming speech when it is accompanied by intentionally using another's identity. There is no identity theft in this case unless the trier of fact determines that Baron used Fisher's personal identifying Fisher's information reputation. Therefore, with the Baron intent harm prohibited is to from disseminating speech that is intended to be harmful to Fisher's reputation when that speech occurs through the unauthorized use of Fisher's personal identifying information. As a result, Wis. Stat. § 943.201(2)(c), as applied to Baron, is content based. ¶40 The State, in effect, argues that the justification behind the identity theft statute is to punish people for using another individual's identity without consent, and therefore, the statute does not regulate a specific category of speech. While the State may be correct with respect to the application of the identity theft statute to other factual scenarios, under the facts of this case and as charged here, the content of the e-mails was critical to the charge in that Baron must have used Fisher's personal identifying information harm Fisher's reputation. 21 with the intent to No. ¶41 2007AP1289-CR In Boos, 485 U.S. at 320, the United States Supreme Court stated that "'are justified regulations without regulated speech.'" are content reference to neutral the (Citation omitted.) when content they of the For example, "[s]o long as the justifications for regulation have nothing to do with content, i.e., the desire to suppress crime has nothing to do with the actual films being shown inside adult movie theaters," the regulation can be analyzed as content neutral. Id. ¶42 Wis. The Stat. e-mails district attorney's § 943.201(2)(c) because that is is what justification based is upon the intended to for charging content of the be harmful to Fisher's reputation, and thus, the e-mails, i.e., speech, is necessary proof of an element of the crime. When the Wisconsin legislature included intending to harm another's reputation as an element of Wis. Stat. § 943.201(2)(c), the justification, in part, and under the facts of this case became based on the content of the speech. ¶43 We conclude that, under facts of this case, Wis. Stat. § 943.201(2)(c) is content addition to conduct. based and regulates speech in However, this may not be the case under all circumstances given that one may be able to intend to harm the reputation of another without using speech. ¶44 Accordingly, the State bears the burden of showing that the statute overcomes strict scrutiny in order to survive Baron's as-applied challenge. 22 No. 2007AP1289-CR C. Strict scrutiny ¶45 To survive strict scrutiny, the State has the burden to show that the "'regulation is necessary to serve a compelling state interest and that it is narrowly drawn to achieve that end.'" Boos, 485 U.S. at 321 (citation omitted). ¶46 In Burson, 504 U.S. at 193-94, 211, the Court concluded that the applicable statute, which prohibited a person from displaying or distributing campaign literature within 100 feet of a polling station, survived strict scrutiny. The Court asserted that it "has recognized that a State 'indisputably has a compelling election result, interest process.'" the State in preserving at Id. had a 199 the integrity (citation compelling of omitted). government its As interest a in preventing voter intimidation and election fraud, which history reveals founding. has been a persistent Id. at 200-06. battle since the country's In addition, the Court also concluded that the statute was narrowly drawn to achieve the government's compelling interest. Id. at 211. The Court reasoned that the "minor geographic limitation" does not constitute a significant impingement. It asserted that the state of Tennessee has made the constitutionally sound decision that "the[] last 15 seconds before its citizens enter the polling place should be their own, as free from interference as possible." ¶47 concluded In contrast, that the the statute Court at in issue Id. at 210. Boos, did 485 not scrutiny because it was not narrowly tailored. 23 U.S. survive at 324, strict In Boos, the No. 2007AP1289-CR statute, which was only applicable to Washington D.C., made it unlawful to display anything within 500 feet of an embassy that brought "into public foreign odium government." Id. or at public 316. disrepute The Court . . . of compared a the statute with another provision, which was applicable outside of D.C., that criminalized "willful acts or attempts to 'intimidate, coerce, threaten, or harass a foreign official or an official guest or obstruct that while narrowly the ¶48 a D.C. ordinance dignity tailored; available." official in the Based on this comparison, the Court concluded the protecting foreign Id. at 324-25 (citing 18 U.S.C. performance of his duties.'" § 112(b)(2)). a a of less "may foreign serve an missions, restrictive interest [] in it is alternative is not readily Id. at 329. In the case at hand, Baron concedes that the State has compelling interest in preventing theft.13 identity He, however, asserts that the statute is not narrowly tailored to achieve Amendment that interest right information. to The survives strict tailored in because defame State, scrutiny that it in a it eliminates public turn, because applies official argues the only Baron's that statute when First with the is the true statute narrowly defendant intentionally uses an individual's personal information to harm 13 Baron's strict scrutiny argument is limited to asserting that this statute, as applied to Baron, is not narrowly tailored. Baron further states: "We do not contest the fact that the State has a compelling interest in protecting the victims of identity theft." 24 No. that individual's conclude that reputation. this is one We of agree those with "rare 2007AP1289-CR the State cases" government regulation survives strict scrutiny. and that a See Burson, 504 U.S. at 211 (stating "we reaffirm that it is the rare case in which we have held that a law survives strict scrutiny"). As applied to Baron, the statute is narrowly tailored to achieve the government's compelling interest. ¶49 First, as the State asserts, § 943.201(2)(c) has limited applicability. Amendment right to defame a public Wis. Stat. While Baron's First official is somewhat curtailed by this statute because it impacts whether Baron can use Fisher's identity to dispense the harmful information, the restriction is limited. revealing the The statute does not prevent Baron from reputation-harming information so long as the method chosen does not entail Baron pretending to be Fisher. Just as the statute in Burson was limited because it set forth restrictions only within 100 feet from polling places, this identity theft statute is limited in that it applies only when one has stolen another person's identity and proceeds to use that identity with the intent to harm the individual's reputation. Specifically, a defendant, with the intent to harm a reputation, person's must use the individual's personal identifying information without consent and by representing that he or she is the individual. ¶50 See Wis JI Criminal 1458. Second, this statute does not chill Baron's right to free speech because he could have intended reputation without pretending to be Fisher. 25 to harm Fisher's For example, Baron No. 2007AP1289-CR could have disseminated the information through Baron's own email account flyers. or stood on the street corner and distributed As a result, it is not the case that this statute punishes Baron for criticizing a public official. Rather, the statute punishes Baron for intentionally using an individual's personal identifying information with the intent to harm the individual's reputation. ¶51 Third, unlike in Boos where a more narrow statute could have been drafted, we can find no alternative way to draft the statute interest. and still achieve the compelling government A "get out of jail free" card could not have been intended for someone who uses a public official's e-mail account without authorization in order to send reputation-harming e- mails. There are far more civilized methods that are authorized by law to ensure that our officials are appropriately conducting the peoples' business.14 ¶52 Baron argues that for Wis. Stat. § 943.201(2)(c) to be narrowly tailored, it should not criminalize harming a public official's reputation with true information. In other words, Baron essentially argues that this statute eliminates his First Amendment right to defame a public official. Baron relies on New 254 York Times Co. v. Sullivan, 376 U.S. (1964) and Bartnicki v. Vopper, 532 U.S. 514 (2001), to assert that he has a right to disseminate truthful information about a public official regardless of its defamatory nature or his defective 14 See generally Wis. Stat. § 19.35. 26 No. method of dissemination. 2007AP1289-CR Baron is, in effect, arguing that he has an unlimited right to defame a public official by utilizing any method he chooses so long as it is not done with actual malice. ¶53 Baron's arguments are unpersuasive for three reasons. First, while speech that is intended to be harmful to one's reputation is implicated by the statute, the State does not need to prove that the speech was false or done with actual malice, which defamation.15 could be required if Baron was charged with Under Wis. Stat. § 943.201(2)(c), truthfulness and actual malice are irrelevant considerations given the language chosen by the legislature. The crux of the issue before the court involves the combination of (1) the inappropriate use of the individual's identity that reputation of that individual. (2) is intended to harm the Therefore, Baron's emphasis on truthfulness or actual malice is irrelevant. ¶54 Second, while Baron is correct that he has a First Amendment right to defame a public official under Sullivan, 376 U.S. at 279-80, nothing boundaries. suggests that this right is without In fact, the Supreme Court has asserted on a number of occasions that there are limits to the First Amendment. See, e.g., Taxpayers for Vincent, 466 U.S. at 804 (citing Schenck v. 15 If charges are pursuant to Wis. Stat. § 942.01, "Defamation," the State must show the statement was false if a private citizen is being defamed, and if a public official is being defamed, the State must show the statement was made with actual malice pursuant to New York Times Co. v. Sullivan, 376 U.S. 254, 279-80 (1964). Otherwise First Amendment protections can arise. 27 No. 2007AP1289-CR United States, 249 U.S. 47, 52 (1919) (stating "[i]t has been clear since this Court's earliest decisions concerning the freedom of speech that the state may sometimes curtail speech when necessary to advance a significant and legitimate state interest"). We are aware of no case that holds that one has a constitutional right to intentionally use another individual's identity without reputation. First consent Therefore, Amendment right in we is order reject to harm Baron's unlimited. So that individual's argument long as that Wis. his Stat. § 943.201(2)(c) survives the requisite level of scrutiny, it is perfectly valid and no precedent exists to the contrary. While the requisite level of scrutiny may at times be difficult to satisfy, this does not eliminate a government's right to, at times, disallow certain fraudulent methods of disseminating support Baron's speech. ¶55 Third, Bartnicki does not argument that so long as the information is true, he has an unlimited right to harm a public official's pretending to be that official. reputation even while In Bartnicki, 532 U.S. at 518- 19, a radio host aired an unfavorable audio clip that he had obtained from a third party who acquired it illegally. While the issue Court stated that enforcing the provision at "implicates the core purposes of the First Amendment because it imposes sanctions on the publication of truthful information of public concern," id. at 533-34, the Court did not set forth an unlimited right to publish such information while intentionally and falsely pretending to be that public official. 28 In fact, the No. Court stated punish the that "[a]s publication a of general truthful satisfy constitutional standards.'" (citation omitted). While matter, 'state information 2007AP1289-CR action seldom to can Id. at 527 (emphasis added) regulating the dissemination of truthful information may "seldom" be constitutional, it does not mean that such a regulation is never valid. ¶56 Moreover, the Court's reasoning for protecting the radio host's First Amendment right in Bartnicki was not that he had an unlimited right to publish such information. Rather, the Court concluded that while the government's interest justified prohibiting the "interceptor" from using the illegally obtained information, "it by no means follows that punishing disclosures of lawfully obtained information of public interest by one not involved in the initial illegality is an acceptable means of serving those ends." Id. at 529. The Court, therefore, stopped short of setting forth the rule asserted by Baron. IV. CONCLUSION ¶57 We conclude that the State has shown beyond a reasonable doubt that Wis. Stat. § 943.201(2)(c), as applied to Baron, is narrowly tailored to achieve a compelling government interest and does not violate Baron's constitutional right to freedom of speech. By the Court. The decision of the court of appeals affirmed. ¶58 SHIRLEY S. ABRAHAMSON, C.J., did not participate. 29 is No. ¶59 the ANN WALSH BRADLEY, J. majority Majority that op., the ¶57. I statute (concurring). is write 2007AP1289-CR.awb I agree with constitutional separately, as however, applied. because I disagree with the majority that the statute regulates speech as well as conduct. Rather, I believe that the court of appeals got it right this statute as applied regulates only conduct. Accordingly, I respectfully concur. ¶60 The court of appeals noted that "because the statute at issue implicates First Amendment rights, the State has the burden of proving beyond a reasonable doubt that the statute is constitutional." State v. Wis. 2d 789, 754 N.W.2d 175. met its burden, I begin Baron, 2008 WI App 90, ¶7, 312 To determine whether the State has by examining the elements of the statute.1 ¶61 Under the facts of this case, the State must demonstrate that Baron (1) intentionally used Fisher's personal identifying information (2) for the purpose of harming Fisher's reputation (3) by intentionally representing that he was Fisher 1 Wis. Stat. § 943.201(2)(c) provides: Whoever, for any of the following purposes, intentionally uses, attempts to use, or possesses with intent to use any personal identifying information . . . without the authorization or consent of the individual and by representing that he or she is the individual . . . is guilty of a Class H felony: . . . . (c) To harm the reputation, estate of the individual. 1 property, person, or No. (4) without Fisher's consent. 2007AP1289-CR.awb It is the second element which implicates First Amendment rights. ¶62 not The court of appeals concluded that the statute does criminalize each element of Baron, 312 Wis. 2d 789, ¶10. the statute in isolation. That is, this statute does not criminalize the intent to harm an individual's reputation alone. Rather, it is the whole act the use of an individual's identity for a prohibited purpose that is criminalized. that "Wisconsin criminalize protected, statutes conduct if manner." One replete may otherwise be carried out conduct is with provisions that constitutionally in an unlawful Id. ¶63 that that are The court noted § 946.10(1), particularly which apt criminalizes example bribery is of Wis. public Stat. officers. This statute is violated if the defendant (1) transfers property (2) to a public officer (3) that the officer was not authorized to receive for the performance of official duties, and (4) "the defendant intend[s] to influence the conduct of [the officer] in relation to any matter which by law [is] pending or might have come before [the officer] in an official capacity." See Wis JI Criminal 1721 (emphasis supplied). ¶64 The court of appeals correctly noted that "[t]he fourth element requires that the defendant intended to engage in conduct that, were it not accompanied protected by the First Amendment."2 2 by a bribe, would Baron, 312 Wis. 2d 789, ¶12. The First Amendment guarantees "the right of people . . . to petition the Government for redress grievances." U.S. Const. amend. I. 2 be the of No. Similarly, the identity theft statute requires 2007AP1289-CR.awb the State to prove that the defendant was motivated by a purpose which, if not accompanied by the theft of the individual's identity, would be protected under the First Amendment. ¶65 The court of appeals' decision in this case was cited favorably by the author of a three-volume treatise on the First Amendment. of See Rodney A. Smolla, Smolla and Nimmer on Freedom Speech § 24:19 (2009). After discussing the court of appeals' analogy to bribery, the treatise concludes: "The First Amendment cannot plausibly be interpreted to protect identity theft, any more than it protects bribery. . . . If the law does not protect the corrupt under-the-table influencing payments, it does of a not public protect official the by corrupt defaming of public officials by hacking into their computers and stealing their identity and e-mails." ¶66 of We have previously stated, "It is not an abridgement freedom illegal Id. of merely speech or because press the to conduct make was a course in part of conduct initiated, evidenced, or carried out by means of language, either spoken, written, or printed." State v. Robins, 2002 WI 65, ¶42, 253 Wis. 2d 298, 646 N.W.2d 287 (quoting Giboney v. Empire Storage, 336 U.S. 490, 502 (1949)). In Robins, we discussed whether the use of e-mail constituted speech in the context of the crime of child enticement. ¶67 The defendant, who was charged with child enticement, claimed that the statute violated the First Amendment as applied to his attempt to entice a child 3 through internet speech. No. 2007AP1289-CR.awb Intent to entice a child was an element of the offense. We concluded that the statute did not regulate speech and observed that "internet conversations and e-mails . . . do not themselves constitute the crime of child enticement. [the] internet conversation and e-mails are by Rather, circumstantial evidence of his intent to entice a child . . . ." Id., ¶44.3 Likewise e-mail is here, the speech the content of the evidence of Baron's intent to harm Fisher's reputation. ¶68 For the reasons discussed above, I conclude that the State has met its burden to demonstrate that the statute is constitutional. not warranted Although the application of strict scrutiny is in this case because the statute criminalizes conduct rather than speech, I agree with the majority that the statute would withstand majority op., ¶¶48-56. a strict scrutiny challenge. See Accordingly, I respectfully concur in the majority's opinion. 3 See also Arnold H. Loewy, Distinguishing Speech from Conduct, 45 Mercer L. Rev. 621, 622 (1994) ("A significant number of crimes either require or frequently involve communication. Simply giving money to the bribee would be ineffective because she would have no idea of why she was receiving it unless somebody communicated with her. Similarly, perjury punishes false statements made under oath. . . . I am aware of no serious argument that any of this 'speech' ought to be constitutionally protected."). 4 No. ¶69 DAVID T. PROSSER, J. 2007AP1289-CR.dtp (concurring). In 2006 Christopher Baron was charged with violating several statutes, including Wis. Stat. § 943.201(2)(c) (2007-08).1 After argument, the circuit court dismissed the § 943.201 charge on grounds that the statute was unconstitutional as applied. This decision was subsequently reversed by the court of appeals. Baron, 2008 WI App 90, 312 Wis. 2d 789, 754 See State v. N.W.2d 175. I concur in this court's decision to affirm the court of appeals but write separately to offer a different perspective on the legal issues. ¶70 Wisconsin created a comprehensive criminal code in the 1953 session of the legislature. Ch. 623, Laws of 1953. As Professor Gordon Baldwin later recalled, one of the first topics of the Legislative Council's criminal code project "was the law relating to crimes against property." Gordon L. Baldwin, Criminal Misappropriation in Wisconsin-Part I, 44 Marq. L. Rev. 253, 253 (1960-61). "Crimes involving acts directed against property were divided into three types, crimes involving damage to property, property." trespass Id. upon property "MISAPPROPRIATION" and is misappropriation now one of the of four subchapter headings in Chapter 943, "Crimes Against Property." ¶71 Wisconsin Stat. § 943.201 has been located under this heading. The word "misappropriation" statutes and does it not appear 1 is not in defined in the § 943.201, but All subsequent references to the Wisconsin Statutes are to the 2007-08 version unless otherwise indicated. 1 No. 2007AP1289-CR.dtp misappropriation is embedded in the subchapter and is the very heart of the statute in question. ¶72 Black's Law Dictionary defines "misappropriation" as "The application of another's property or money dishonestly to one's own use." Black's Law Dictionary 1013 (7th ed. 1999) (emphasis added). Wisconsin's theft statute, § 943.20, also is included the in Misappropriation may subchapter include on theft, but misappropriation. it does not have to include theft. ¶73 Subsection (1) of § 943.201 contains two terms: (a) "personal identification document" and (b) "personal identifying information." "Personal identifying information" includes basic information such as "[a]n individual's name," "[a]n individual's address," "[a]n individual's telephone number," "[a]n individual's employer or place of employment," and "[t]he maiden name of an individual's mother." 2., 3., 6., 8. Wis. Stat. § 943.201(1)(b)1., Most of this information is not especially confidential and its release is not especially damaging. are, of course, exceptions, and those exceptions There can have profound consequences to the individuals involved.2 ¶74 Other "personal identifying information," such as "[a]n individual's social security number," "[a]n individual's taxpayer identification number," and "[a]n individual's code or account number," frequently present Wis. more Stat. § 943.201(1)(b)5., ominous 2 problems Cf., e.g., Monfils v. Taylor, 165 1998), cert. denied, 528 U.S. 810 (1999). 2 10., because F.3d 511 12.a., of their (7th Cir. No. potential "misappropriation" by people 2007AP1289-CR.dtp attempting to obtain "credit, money, goods, services, employment, or any other thing of value or benefit" without authorization or consent. Stat. § 943.201(2)(a). This kind of Wis. information is closely "personal identifying linked to theft or fraud. ¶75 Still another type of information," "[a]n individual's deoxyribonucleic acid profile," Wis. Stat. § 943.201(1)(b)11., is at the core of an individual's personal privacy. ¶76 In subsection (1)(a), "Personal identification document" includes "[a] document containing personal identifying information." very broad. Wis. Stat. § 943.201(1)(a)1. It may include an This description is individual's resume, his telephone records, his tax returns, his medical records, and his e-mails. See Wis. Stat. § 943.201(1)(a) & (b). Also included in "personal identification documents" are "cards" and "plates," such as credit and debit cards. ¶77 Wis. Stat. § 943.201(1)(a)2. In an information age, the legislature is concerned about the unauthorized use, especially the misappropriation, of an individual's personal identifying information. limits on the information. state's authority and Statutes on this Yet there are ability to subject must control be such drafted carefully. ¶78 In this case, Baron allegedly accessed Mark Fisher's e-mail account by using Fisher's personal password. Even if he acquired the password lawfully, Baron surely was not authorized to rummage through Fisher's e-mail account, if he did so. 3 Baron No. then allegedly collected embarrassing 2007AP1289-CR.dtp e-mails, "the personal identification documents," in Fisher's account and combined them into a new allegedly "personal identification transmitted the new document." "personal He then identification document," without authorization or consent, to people in the community. He allegedly did account using Fisher's name. this from Fisher's own e-mail He allegedly did this with the intent of harming the reputation of Fisher. If Baron did these things, he misappropriated Fisher's password, he misappropriated Fisher's personal Fisher's e-mail identifying account to documents, send out the he misappropriated documents, and he misappropriated Fisher's name, with the intent to harm Fisher's reputation. ¶79 Mark Fisher was a government employee. As such, he was inevitably subject to attacks on his reputation, especially if the attacks were true. But a lawful end did not justify these alleged unlawful means, especially the misappropriation of Fisher's name, i.e., the false representation of Fisher as the sender of the widely distributed e-mail. ¶80 If a person were to send documents from his own computer under his own name, he would have a defense, on these facts, under this statute. A person who misappropriates another person's name as he attempts to injure the other person does not have such a defense. If a person distributed information anonymously, he also would have a defense under this statute. A person so consumed with malice that he uses another person's 4 No. 2007AP1289-CR.dtp name, without authority, to discredit that person, forgoes his defense under the statute. ¶81 The First Amendment does not protect a defendant accused of violating the statute in the manner alleged here, because the statute requires the state to prove that the defendant intentionally misrepresented his role as the sender of the message. misrepresentation, The and statute intentional punishes intentional misrepresentation is not a than great First Amendment freedom. ¶82 "A riches." good name Proverbs 22:1. ointment." is rather to be chosen "A good name is better than precious Ecclesiastes 7:1. This is the wisdom of the ages. Misappropriating a person's name is taking that person's most valuable possession. The legislature understood that this conduct is a grave offense and should be punished accordingly. ¶83 For the reasons stated, I respectfully concur. 5 No. 1 2007AP1289-CR.dtp

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.