DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Data Loss Results in Convicted Murderer Getting a Re-trial

Posted on January 17, 2012 by Dissent

From Damien:

It has been confirmed that Randy Chavianowho, who was sentenced to life in prison in 2009 after being convicted of second degree murder will be given a new trial. Chavianowho, who is from Florida, USA, was found guilty of fatally shooting Carlos Acosta. Lawyers who were working on an appeal case discovered that the majority of the court transcripts from his trial could not be found.

It soon became apparent that Terlesa Cowart, the court stenograph (sic) for Chavianowho’s trial, had transferred the  transcripts to her personal computer and deleted the files from the stenograph. However, Cowart’s personal computer became infected by a virus and all of the files on it were deleted, including the vital transcript notes.

Read more on Backup Technology.  The data loss was previously reported on January 1 by David Ovalle of the Miami Herald and is a great example for infosec pros to use as an example of the importance of backup and what can go horribly wrong if you don’t have one.

Category: Breach IncidentsGovernment SectorLost or MissingU.S.

Post navigation

← Israeli Banking System Downed By attackers
UK: SDT suspends ACS:Law founder for two years →

1 thought on “Data Loss Results in Convicted Murderer Getting a Re-trial”

  1. SFJD says:
    January 30, 2012 at 6:52 pm

    This is a really bad situation for the family of the victim, but justice demands that the defendant, no matter how guilty he is, gets a fair trial. We can’t be sure that that happened unless there’s a written record to refer to. I have no doubts that he’ll be re-convicted, and that this incident will be nothing but a small bump on this man’s road to a life sentence.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • CoinMarketCap Hacked, Scrambles to Remove Malicious Wallet Verification Popup
  • Montana Attorney General launches investigation into Lee Enterprises data breach
  • AT&T gets preliminary approval for $177 million data breach settlement
  • Aflac notifies SEC of breach suspected to be work of Scattered Spider
  • Former JBLM soldier pleads guilty to attempting to share military secrets with China
  • No, the 16 billion credentials leak is not a new data breach — a wake-up call about fake news (Updated)
  • Tonga’s health system hit by cyberattack (1)
  • Russia Expert Falls Prey to Elite Hackers Disguised as US Officials
  • Proposed class action settlement in In re Netgain Technology litigation
  • Qilin Offers “Call a lawyer” Button For Affiliates Attempting To Extort Ransoms From Victims Who Won’t Pay

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill
  • Officials defend Liberal bill that would force hospitals, banks, hotels to hand over data
  • US Judge Invalidates Biden Rule Protecting Privacy for Abortions
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.