Legal Safeguards for Victims of Data Dissemination Crimes and Cybercrime Protection
Abstract
In the digital age, legal protections for personal data are insufficient, leaving individuals vulnerable to financial losses from data theft and criminal dissemination of personal information. This research focuses on assessing the effectiveness of existing regulations, such as Law Number 27 of 2022 Concerning Personal Data Protection. Employing an empirical juridical approach for field research and a conceptual approach for theoretical analysis. The analysis underscores that personal data, crucial for identification, is a frequent target for malevolent actors seeking financial gain, leading to profound consequences for victims. Incidents of personal data theft, often orchestrated by fraudsters, extend beyond financial losses, compromising personal information available for purchase on clandestine online platforms like the dark web. Despite existing regulations, the research identifies a significant gap in providing clear guidelines for safeguarding individuals in the digital era. The study concludes that the current legal framework, while foundational, requires a more comprehensive focus on the Personal Data Protection Law due to inherent weaknesses. This research contributes valuable insights into the evolving legal landscape surrounding personal data crimes in Indonesia, ensuring a comprehensive understanding of legal protections for victims amidst technological advancements.
Keywords
Full Text:
PDFReferences
Books:
Dittrich, David, and Kenneth Einar Himma., 2006, Hackers, crackers, and computer criminals, Handbook of Information Security, Bakersfield, California State University;
Fitsanakis, Joseph., 2020, Redesigning Wiretapping: The Digitization of Communications Interception. Berlin, Springer Nature;
Landau, Susan., 2011, Surveillance or security?: The risks posed by new wiretapping technologies. Mit Press.
Pratama, Bryan., 2019, Data Pribadi, Data Privasi Dan Komersialisasinya, Semarang, Binus University;
Sodiki, Achmad., 2010, Kejahatan Mayantara, Bandung, PT. Refika Aditama;
Master Theses and PhD Dissertation:
Mirto, Aimee., 2022, Detecting cyberstalking from social media platform (s) using data mining analytics, PhD. Dissertation, London, University of West London;
Ramadha, Bagus Satryo., 2021, Kemampuan Hukum Pidana Terhadap Kejahatan Siber Terkait Perlindungan Data Pribadi Di Indonesia, Master Theses, Yogyakarta, Universitas Isam Indonesia;
Conference Proceeding:
Mansell, Robin., 2018, Inequality and digitally mediated communication: Divides, contradictions and consequences, In Critical Perspectives on Media, Power and Change, pp. 1-16. London, Routledge, 2018;
Sullins, Lauren L., Phishing for a solution: domestic and international approaches to decreasing online identity theft, In Computer Crime, pp. 73-110. London, Routledge, 2017;
Journals:
Abu-Ulbeh, Waheeb, Maryam Altalhi, Laith Abualigah, Abdulwahab Ali Almazroi, Putra Sumari, and Amir H. Gandomi., Cyberstalking victimization model using criminological theory: A systematic literature review, taxonomies, applications, tools, and validations, Electronics, Vol.10, no.14, 2021, https://doi.org/10.3390/electronics10141670;
Afzal, Ayesha, Saba Fazal Firdousi, Ayma Waqar, and Minahil Awais., The influence of internet penetration on poverty and income inequality, Sage Open, Vol.12, no.3, 2022, page.21582440221116104, https://doi.org/10.1177/21582440221116104;
Al Mutawa, Noora, Joanne Bryce, Virginia NL Franqueira, and Andrew Marrington. “Forensic investigation of cyberstalking cases using behavioural evidence analysis.” Digital investigation, Vol.16, no.21, 2016, https://doi.org/10.1016/j.diin.2016.01.012;
Ali, Shaukat, Naveed Islam, Azhar Rauf, Ikram Ud Din, Mohsen Guizani, and Joel JPC Rodrigues., Privacy and security issues in online social networks, Future Internet, Vol.10, no.12, 2018, https://doi.org/10.3390/fi10120114;
Alkhalil, Zainab, Chaminda Hewage, Liqaa Nawaf, aand Imtiaz Khan., Phishing attacks: A recent comprehensive study and a new anatomy, Frontiers in Computer Science, Vol.3, no.4, 2021, https://doi.org/10.3389/fcomp.2021.563060;
Anggraheni, Palupi, Novi Tri Setyowati, and Harry Harry., Social media and political participation in indonesia: restrictions access at announcement results of 2019 presidential election, Aspiration Journal, Vol.2, no.1, 2021, https://doi.org/10.56353/aspiration.v2i1.23;
Angkasa, Angkasa, Filep Wamafma, Ogiandhafiz Juanda, and Bhanu Prakash Nunna., Illegal Online Loans in Indonesia: Between the Law Enforcement and Protection of Victim, Lex Scientia Law Review, Vol.7, no.1, 2023, https://doi.org/10.15294/lesrev.v7i1.67558;
Aniqoh, Nur Aini Fitriya Ardiani., The role of digital economy to enhancing sustainable economic development, International Journal of Social Science and Business, Vol.4, no.4, 2020, https://doi.org/10.23887/ijssb.v4i4.28881;
Aslan, Ömer, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz, and Erdal Akin., A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions, Electronics, Vol.12, no.6, 2023, https://doi.org/10.3390/electronics12061333;
Astuti, Sri Ayu., Penerapan Uu Ite Dan Surat Edaran Kapolri Mengenai Ujaran Kebencian Hate Speech Terhadap Penyimpangan Penggunaan Kebebasan Berekspresi Dalam Kajian Pasal 28 Uud 1945 Tentang Ham Di Ruang Maya Cyber Space, Lex Publica, Vol.2, no.2, 2016;
Banterle, Francesco., Data ownership in the data economy: a European dilemma, EU Internet Law in the Digital Era: Regulation and Enforcement, Vol.5, no.12, 2020, https://doi.org/10.1007/978-3-030-25579-4_9;
Beduschi, Ana., Rethinking digital identity for post-COVID-19 societies: Data privacy and human rights considerations, Data & Policy, Vol.3, no.2, 2021, https://doi.org/10.1017/dap.2021.15;
Benito, Iñigo Gordon., Online harassment and cyberstalking: a case study, Sortuz: Oñati Journal of Emergent Socio-Legal Studies, Vol.13, no.2, 2023;
Bernoth, Maree, Elaine Dietsch, Oliver Kisalay Burmeister, and Michael Schwartz., Information management in aged care: Cases of confidentiality and elder abuse, Journal of Business Ethics, Vol.122, no.3, 2014, https://doi.org/10.1007/s10551-013-1770-7;
Delpiero, Maichle, Farah Azzahra Reynaldi, Istiawati Utami Ningdiah, and Nafisah Muthmainnah., Analisis yuridis kebijakan privasi dan pertanggungjawaban online marketplace dalam perlindungan data pribadi pengguna pada kasus kebocoran data, Padjadjaran Law Review, Vol.9, no.1, 2021;
Douglas, David M., Doxing: a conceptual analysis, Ethics and information technology, Vol.18, no.3, 2016, https://doi.org/10.1007/s10676-016-9406-0;
Duijn, Paul AC, and Peter PHM Klerks., Social network analysis applied to criminal networks: recent developments in Dutch law enforcement.” Networks and network analysis for defence and security, Vol.13, no.7, 2014, https://doi.org/10.1007/978-3-319-04147-6_6;
Fitsanakis, Joseph. Redesigning Wiretapping: The Digitization of Communications Interception. Springer Nature, 2020.; Stephen C. Thaman., The Use of Information and Communications Technology in Criminal Procedure in the USA, Cybercrime, Organized Crime, and Societal Responses: International Approaches, Vol.3, no.17, 2017, https://doi.org/10.1007/978-3-030-39919-1;
Gabisch, Jason Aaron, and George R. Milne., The impact of compensation on information ownership and privacy control, Journal of Consumer Marketing, Vol.31, no.1, 2014, https://doi.org/10.1108/JCM-10-2013-0737;
Goel, Diksha, and Ankit Kumar Jain., Mobile phishing attacks and defence mechanisms: State of art and open research challenges, Computers & Security, Vol.73, no.4, 2018, https://doi.org/10.1016/j.cose.2017.12.006;
Gojali, Djoni Sumardi., Identifying the Prevalence of Cybercrime in Indonesian Corporations: A Corporate Legislation Perspective, International Journal of Cyber Criminology, Vol.17, no.1, 2023;
Hasbullah, M. Afif., Identifying the Effects of Cybercrime on Business Laws: Implications for Businesses and Consumers, International Journal of Cyber Criminology, Vol.16, no.2, 2022;
Hisbulloh, Moh Hamzah., Urgensi Rancangan Undang-Undang (RUU) Perlindungan Data Pribadi, Jurnal Hukum, Vol.37, no.2, 2021, http://dx.doi.org/10.26532/jh.v37i2.16272;
Jaccoud, Lachlan, Lorena Molnar, and Marcelo F. Aebi., Antifa’s political violence on Twitter: A grounded theory approach, European Journal on Criminal Policy and Research, Vol.29, no.3, 2023, https://doi.org/10.1007/s10610-023-09558-6;
Jaelani, Abdul Kadir, and Resti Dian Luthviati., The Crime of Damage After the Constitutional Court's Decision Number 76/PUU-XV/2017, Journal of Human Rights, Culture and Legal System, Vol.1, no.1, 2021, https://doi.org/10.53955/jhcls.v1i1.5;
Jokubaitis, Caitlin E., There and Back: Vindicating the Listener's Interests in Targeted Advertising in the Internet Information Economy, Colum. Columbia Journal of Law & the Arts, Vol.42, no.34, 2018;
Kerr, Orin S., Cybercrime's scope: interpreting access and authorization in computer misuse statutes, New York University Law Review, Vol.78, no.6, 2003;
Kumalaratri, Giosita., Urgency of the Personal Data Protection Bill on Privacy Rights in Indonesia, Jurnal Hukum, Vol.37, no.1, 2021, http://dx.doi.org/10.26532/jh.v37i1.13604;
Lin, Jiesen, Lemuria Carter, and Dapeng Liu., Privacy concerns and digital government: exploring citizen willingness to adopt the COVIDSafe app, European Journal of Information Systems, Vol.30, no.4, 2021, https://doi.org/10.1080/0960085X.2021.1920857;
MacAllister, Julia M., The doxing dilemma: seeking a remedy for the malicious publication of personal information, Fordham Law Review, Vol.85, no.2, 2016;
Mahardika, Ahmad Mahardika., Desain Ideal Pembentukan Otoritas Independen Perlindungan Data Pribadi Dalam Sistem Ketatanegaraan Indonesia, Jurnal Hukum, Vol.37, no.2, 2021, http://dx.doi.org/10.26532/jh.v37i2.16994;
Makarim, Edmon., Privacy and personal data protection in indonesia: the hybrid paradigm of the subjective and objective approach, Data Protection Around the World: Privacy Laws in Action, Vol.22, no.6, 2021, https://doi.org/10.1007/978-94-6265-407-5_6;
Manthovani, Reda., Indonesian Cybercrime Assessment and Prosecution: Implications for Criminal Law, International Journal of Criminal Justice Sciences, Vol.18, no.1, 2023;
Mousavi, Reza, Rui Chen, Dan J. Kim, and Kuanchin Chen., Effectiveness of privacy assurance mechanisms in users' privacy protection on social networking sites from the perspective of protection motivation theory, Decision Support Systems, Vol.135, no.3, 2020, https://doi.org/10.1016/j.dss.2020.113323;
Nakhjavan, Alicia., The Worst Law in Technology: How the Computer Fraud and Abuse Act Allows Big Businesses to Collect and Sell Your Personal Information, Brooklyn Law Review, Vol.87, no.21, 2021;
Nugroho, Agus, and An An Chandrawulan., Research synthesis of cybercrime laws and COVID-19 in Indonesia: lessons for developed and developing countries, Security Journal, Vol.36, no.4, 2022, https://doi.org/10.1057/s41284-022-00357-y;
Nurse, Jason RC., Cybercrime and you: How criminals attack and the human factors that they seek to exploit, arXiv preprint arXiv:1811.06624, Vol.45, no.7, 2018, https://doi.org/10.48550/arXiv.1811.06624;
Rosadi, Sinta Dewi, Andreas Noviandika, Robert Walters, and Firsta Rahadatul Aisy., Indonesia’s personal data protection bill, 2020: does it meet the needs of the new digital economy?, International Review of Law, Computers & Technology, Vol.37, no.1, 2023, https://doi.org/10.1080/13600869.2022.2114660;
Rudiyanto, Tri, Halley Kunda, Amy Dunn, Sharon Shenderovskiy, and Rondarrius Gibson., Ethical and Legal Concerns of Artificial Intelligence in the Workplace: Examining Current Legislations in the United States, Lex Publica, Vol.10, no.1, 2023;
Siahaan, Mona Natasha, Putu Wuri Handayani, and Fatimah Azzahro., Self-disclosure of social media users in Indonesia: the influence of personal and social media factors, Information Technology & People, Vol.35, no.7, 2022, https://doi.org/10.1108/ITP-06-2020-0389;
Singh, L. Joy, and N. I. E. L. I. T. Imphal., A survey on phishing and anti-phishing techniques, International Journal of Computer Science Trends and Technology (IJCST), Vol.6, no.2, 2018;
Sitohang, Bertrand Silverius, Sahata Manalu, Mancur Sinaga, and Niswan Harefa., The Validity of Marriage Through Constitutional Court Decision Number 69/Puu-XIII/2015 Reviewed from Law Number 1 Of 1974, Jurnal Pendidikan Tambusai, Vol.7, no.3, 2023, https://doi.org/10.31004/jptam.v7i3.9541;
Sitompul, Josua., Developing a Legal Framework of Personal Data Protection in the Indonesian Criminal Procedure Law, Indonesia Law Review, Vol.9, no.3, 2019;
Sloot, Bart Van der., Privacy as human flourishing: Could a shift towards virtue ethics strengthen privacy protection in the age of Big Data, Journal of Intellectual Property, Information Technology and E-Commerce Law, Vol.5, no.5, 2014;
Stražišar, Borut., Alternative dispute resolution, Право. Журнал Высшей Школы Экономики, Vol.3, no.2, 2018, https://doi.org/10.17323/2072-8166.2018.3.214.233;
Suryawardani, Bethani, and Astri Wulandari., Determinant factors of customers switching behavior to customer satisfaction and loyalty in online transportation users in bandung, JDM (Jurnal Dinamika Manajemen), Vol.11, no.1, 2020, https://doi.org/10.15294/jdm.v11i1.21432;
Suyaman, Prahasti, and Temmy Fitriah Alfiany., Polemics of Interfaith Marriage Reviewed from the Perspectives of Marriage Law and the Compilations of Islamic Law, KnE Social Sciences, Vol.13, 2022, https://doi.org/10.18502/kss.v7i15.12129;
Syaufi, Ahmad, Aurora Fatimatuz Zahra, and Fatham Mubina Iksir Gholi., Employing Forensic Techniques in Proving and Prosecuting Cross-border Cyber-financial Crimes, International Journal of Cyber Criminology, Vol.17, no.1, 2023;
Tabroni, Imam, Hisam Ahyani, and Dian Permana., Philosophical Review of Materialism and Idealism Limits of Wedding Age in Indonesia; Study of Article 7 Paragraph (1) of Law 16 of 2019 Jo. Law 1 of 1974 Concerning Marriage, Muttaqien: Indonesian Journal of Multidiciplinary Islamic Studies, Vol.2, no.1, 2021, https://doi.org/10.52593/mtq.02.1.01;
Taherdoost, Hamed., Insights into Cybercrime Detection and Response: A Review of Time Factor, Information, Vol.15, no.5, 2024, https://doi.org/10.3390/info15050273;
Tewathia, Nidhi, Anant Kamath, and P. Vigneswara Ilavarasan., Social inequalities, fundamental inequities, and recurring of the digital divide: Insights from India, Technology in Society, Vol.61, 2020, https://doi.org/10.1016/j.techsoc.2020.101251;
Thaman, Stephen C., The Use of Information and Communications Technology in Criminal Procedure in the USA, Cybercrime, Organized Crime, and Societal Responses: International Approaches, Vol.3, no.17, 2017, https://doi.org/10.1007/978-3-319-44501-4_6;
Thompson, Nik, Ravi Ravindran, and Salvatore Nicosia., Government data does not mean data governance: Lessons learned from a public sector application audit, Government information quarterly, Vol.32, no.3, 2015, https://doi.org/10.1016/j.giq.2015.05.001;
Van der Sloot, Bart., Privacy as human flourishing: Could a shift towards virtue ethics strengthen privacy protection in the age of Big Data, Journal of Intellectual Property, Information Technology and E-Commerce Law, Vol.5, no.5, 2014;
Wardani, Andhira, Mahrus Ali, and Jaco Barkhuizen., Money Laundering through Cryptocurrency and Its Arrangements in Money Laundering Act, Lex Publica, Vol.9, no.2, 2022;
Wati, Reka Desrina., The Marriage Agreement in Article 29 of Law Number 1 of 1974 is Reviewed According to Islamic Law, Al Hurriyah: Jurnal Hukum Islam, Vol.7, no.2, 2022, https://doi.org/10.30983/alhurriyah.v7i2.4125;
Widiani, Ah Kholish Hayatuddin Desti., Socio-Juridical Analysis on Polygamy Requirements in the Compilation of Islamic Law (KHI), Al-'Adalah, Vol.19, no.1, 2022, https://dx.doi.org/10.24042/adalah.v19i1.10266;
Xiao, Anran, Zeshui Xu, Marinko Skare, Yong Qin, and Xinxin Wang., Bridging the digital divide: the impact of technological innovation on income inequality and human interactions, Humanities and Social Sciences Communications, Vol.11, no.1, 2024, https://doi.org/10.1057/s41599-024-03307-8;
Yanto, Oksidelfa., Criminal Charges and Sanctions on Defamation Crime as Cyber Crime in the Information Technology Development, Lex Publica, Vol.7, no.2, 2020;
Yudiana, Teguh Cahya, Sinta Dewi Rosadi, and Enni Soerjati Priowirjanto., The urgency of doxing on social media regulation and the implementation of right to be forgotten on related content for the optimization of data privacy protection in Indonesia, Padjadjaran Jurnal Ilmu Hukum (Journal of Law), Vol.9, no.1, 2022.
DOI: http://dx.doi.org/10.26532/jh.v40i2.39974
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 4.0 International License.
Jurnal Hukum Indexed by :
Jurnal Hukum | ||
Faculty of Law, Unissula | Copyright of Jurnal Hukum | |
Jalan Kaligawe Raya KM.4, Terboyo Kulon, Genuk, | ISSN 1412-2723 ( Print )e-ISSN 2723-6668 ( Online ) | |
Semarang, Central Java, Indonesia, 50112 |