The Urgency of Increasing National Cyber Security as an Effort to Protect Personal Data
DOI:
https://doi.org/10.5281/zenodo.14438165Keywords:
Cybercrime, Cyber Security, Data Protection, LawAbstract
One form of Cybercrime is social media hacking and piracy which leads to personal data breaches. One of the cases that went viral in 2022 was that carried out by Bjorka. Bjorka once claimed to have 26 million browsing histories of Indihome customers, even confidential state documents. This can happen of course because of weak cyber security in Indonesia. This research aims to determine the legal construction of resolving hacking cases against personal data according to Indonesian laws and regulations, and how the government should make efforts to improve national cyber security. The research method used is normative juridical. The research results show that the ITE Law provides regulations that are still too general regarding the criminal act of hacking personal data. After the Personal Data Protection Law was introduced, Indonesia now has special regulations for this. However, to improve national cyber security, Indonesia must be more involved in international conventions regarding cybercrime.
References
Albert Lodewyk Sentosa Siahaan, Urgensi Perlindungan Data Pribadi Di Platform Marketplace Terhadap Kemajuan Teknologi, Jurnal Majalah Hukum Nasional, Vol. 52 No. 2, 2022, hlm 215-216
CNBN Indonesia, Hacker Bjorka Tantang Pemerintah RI: Saya Menunggu Digerebek!, https://www.cnbcindonesia.com/tech/20221226135118-37-400166/hacker-bjorka-tantang-pemerintah-ri-saya-menunggu-digerebek
Data Indonesia.ID, Survei: Generasi Z Indonesia Paling Gandrung Gunakan Internet, https://dataindonesia.id/internet/detail/survei-generasi-z-indonesia-paling-gandrung-gunakan-internet.
E-Governance Academy, National Cyber Security Index (NCSI), https://ncsi.ega.ee/ncsi-index/, (diakses 28 Oktober 2023)
Febriansyah, Financial Identity Theft : Dari Tindak Pidana Informasi Elektronik Ke Kejahatan Data Pribadi, Jurnal Hukum Samudera Keadilan Volume 18 No 2 (2023), hlm 365
Kemenenterian Keuangan republic Indonesia, Perbedaan hacker dan Craker, https://www.djkn.kemenkeu.go.id/kanwil-rsk/baca-artikel/15422/Perbedaan-Hacker-dan Cracker.html#:~:text=Cara%20kerja%20hacker%20yakni%20mencari,bidang%20 emrograman%20dan%20sistem%20operasi
Kornelius Benuf & Muhamad Azhar. (2020). Metodologi Penelitian Hukum Sebagai Instrumen Mengurai Permasalahan Hukum Kontemporer,” Gema Keadilan, 7(1), 20–33
Lilik Muladi, Seraut Wajah Putusan Hakim: Studi Kasus Prita Mulyasari, (Jakarta : Rineka Cipta, 2009), hlm. 40.
Maskun, Kejahatan Siber (Cyber Crime): Suatu Pengantar, (Jakarta: Kencana, 2013), hlm. 46.
Mukti Fajar ND dan Yulianto Achmad, Dualisme Penelitian Hukum Normatif dan Penelitian Hukum Empiris, (Yogyakarta: Pustaka Pelajar, 2010), 34
Putusan Nomor 17/PUU-XIX/2021, mengenai pengujian konstitusionalitas Pasal 32 UU ITE
Qorry Aina Fitroh, Bambang Sugiantoro, “Peran Ethical Hacking dalam Memerangi Cyberthreats”, Jurnal Ilmiah Informatika vol 11, no 1 (2023), hlm 27. https://doi.org/10.33884/jif.v11i01.6593
Rahmadi Indra Tektona, Fendi Setyawan, dkk, Kepastian Hukum Pemilik Data Pribadi Dalam Aplikasi Satu Sehat, Jurnal Legislasi Indonesia, Vol. 20 No. 1, 2023, hlm 34-35
Satjipto Raharjo. Penegakan Hukum Sebagai Tinjauan Sosiologis. Genta Publishing. Yogyakarta. 2009. Hal 25
The United States Department of Justice, What Are Identity Theft and Identity Fraud?, https://www.justice.gov/criminal-fraud/identity-theft/identity-theft-and-identity-fraud, (diakses 29 Oktober 2023)
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Febriansyah (Author)

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.