IMPLEMENTATION OF PRINCIPLES IN IDENTIFYING SERVICE USERS REGARDING THE PREVENTION AND ERADICATION OF MONEY LAUNDERING OFFENSE

Achmad Sulchan, Ida Musofiana, A Althof Rusydi

Abstract


The implementation of principles of identifying service users and suspicious financial transaction report submission for profession aims to prevent money laundering offense by postponing transaction, blocking, investigating and temporarily suspending transaction which is carried out by PPATK (Financial Transaction Reporting and Analysis Center). The method used in this study was juridical normative or legal doctrinal research, which is a legal research using secondary data conducted by emphasizing and juridical aspects. Legal-normative research is a library research, which is a research on secondary data including private documents, books, and official documents issued by government. The normative approach emphasized juridical issues regarding the legal rules on money laundering offense. The result of the study of the implementation of the principles in identifying service users regarding the prevention and eradication of money laundering offense isidentifyingservice user while having a business relationship involving suspicious financial transaction related to money laundering offense. The informant questions the validity of information provided by the service user, which necessitate the implementation of the principle of identifying the service user in carrying out banking transaction. The factors promoting the occurrence of money laundering offense in various countries consist of 9 aspects, namely: globalization, technological advancement, banks’ strict secrecy policy, the possibility of saving using an alias or anonymous, the emergence of electronic money, the possibility of layering practice, the confidentiality of lawyer-client and accountant-client relationships, the government unseriousness in eradicating money laundering offense and the lack of money laundering criminalization.


Keywords


Service user, transaction, money laundering.

Full Text:

PDF

References


Journals :

Budi Bahreisy, Implementasi Undang-Undang Tindak Pidana Pencucian Uang Terhadap Kerugian, Legislasi Indonesia Journal, Volume 15, No. 2, July 2018.

Febrina Annisa, Prima Resi Putri, Penerapan Program Apu Ppt Untuk Mencegah Pencucian Uang Dan Pendanaan Terorisme Pada Industri Fintech, Adil Journal, Volume 11 No. 2, 2020.

Gandhung Wahyu, F.., Joko Supriyanto, Urgensi Penanggulangan Tindak Pidana Pencucian Uang Pasa Kasus Korupsi, Recidive Journal, Volume 3, No. 3, September – December 2014.

Herlina Hanum Harahap, Pencegahan dan Pemberantasan Tindak Pidana Pencucian Uang, Amaliah Journal, Volume 4 No. 2, November 2020.

Ida Musofiana, Anti-Corruption Education at an Early Age as a Strategic Move to Prevent Corruption in Indonesia, Proceeding The 2nd Proceeding 305 “Indonesia Clean of Corruption in 2020â€, December 2016.

Khairul, Mahmul Siregar, Marlina, Kewenangan PPATKDalam Pencegahan dan Pemberantasan Tindak Pidana Pencucian Uang, Mercatoria, Volume 4 No. 1, 2011.

M. Arief Amrullah, Pencegahan Tindak Pidana Pencucian Uang Melalui Jasa Gatekeeper di Indonesia, Cakrawala Hukum Journal, Volume 6, No. 1, June 2015.

Books:

Arief Amrullah. 2020. Tindak Pidana Pencucian Uang dalam Perspektif Kejahatan Terorganisasi Pencegahan dan Pemberantasannya, Kencana, Jakarta.

____________. 2004. Tindak Pidana pencucian uang (Money Laundering), Bayumedia Publising, Malang.

N.H.T Siahaan. 2008. Money Laundering & Kejahatan Perbankan, Jala permata, Jakarta.

Sultan Remy Sjahdeini, 2004, Seluk-beluk Tindak Pidana Pencucian Uang dan Pembiayaan Terorisme, Pustaka Utama Grafiti, Jakarta.

US Geverment. 2000. Secreataryof the Treasury dan Attorney General, TheNational Money Laundering Strategi.

Yudi Kristiana. 2015. Pemberantasan Tindak Pidana Pencucian Uang Perspektif Hukum Progresif. Thafa Media. Yogyakarta.

Regulations:

Act No. 8 of 2010 concerning Prevention and Eradication of the Crime of Money Laundering.

Circular No. 2 of 2019 concerning Guidelines for Implementing the Principles of Recognizing Service Users and Submitting Suspicious Transaction Reports for Professionals.




DOI: http://dx.doi.org/10.26532/ijlr.v5i1.15492

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.


International Journal of Law Reconstruction Indexed by :

DOAJgoogle_scholarsintacrossrefMendeley onesearch  dimension


International Journal of Law Recnstruction  
Faculty of Law, UnissulaCopyright of International Journal of Law Reconstruction
Jalan Kaligawe Raya KM.4, Terboyo Kulon, Genuk, E-ISSN 2775-8885 (Online)
Semarang, Central Java, Indonesia, 50112IJLR is licensed under a