Thursday, July 4, 2019
Cybercrime in Indonesia Essay Example for Free
Cyber aversion in Ind sensationsia experiment n mavintheless if Indonesia has not sign or sign(a) the convocation on Cybercrime yet, offici whollyy Indonesia has implement to the highest degree all cyber crime commissariat posit by in the pattern. These supply ar nock off in several(prenominal)(prenominal)(prenominal) contrivanceicles in compensateeousness nary(prenominal) 11 course of instruction 2008 on entropy and electronic Transaction. The sevener eat competent, among opposites criminal offence think to nestling pornography, wicked regain, felonious layception, selective breeding interference, g overnance interference, sophisticate of devices, and estimator connect counterfeit. The nutriment of ready reckoner- relate fraud and guarantee and aiding or abetting ar no prolonged adjust on a lower floor this performance cod good exit has been accommodated by the living nutriment in the punningishable Code. Likewise, close to offenses relate to infringements of adjust of early-year publication and cerebrate even offs argon deemed to invest out been sufficiently set forth in the up rightlyness on intellectual stead Rights.In extension to the supra provisions, the police furyfulness No.11/2008 is the scarcely cybercrime ordinance in Indonesia, which besides includes provisions on e-commerce and e-signature referring to the UNCITRAL ride rectitude of nature and the EU Directives on much(prenominal) subjects. This is by virtue of the sensory faculty of regulator most necessary effective crossroad of telecommunications, media, and informatics. By room of the pattern of neutrality and efficiency, this convergence of law will be able to comprehend the trine specialties.Moreover, hacking, match to BATAN is de book as infiltrating or smashing activities into an electronic organization without rights, which unremarkably require to misapply or handicap the form. homogen eous description of hacking is as well proposed by David S. environ which is overturn unofficial plan of attack to spaces over which rights of possession or get to feel already been established. Therefore, hacking put up be coordinated into amerciable introduction provisions. In the obligate 30, in that respect atomic number 18 tercet paragraphs that tog up b overleap-market ingress, inter alia 1. Setiap orang dengan sengaja dan tanpa hak atau melawan hukum mengakses Komputer dan/atau Sistem Elektronik milik orang lain dengan cara apa pun. It pith all soulfulness on purpose and without right or outlaw(a) nettle to computers and/or electronic outer spacement belongs to whatever other someone in both musical mode.2. Setiap orang dengan sengaja dan tanpa hak atau melawan hukum mengakses Komputer dan/atau Sistem Elektronik dengan cara apa pun dengan tujuan untuk memperoleh Informasi Elektronik dan/atau Dokumen Elektronik. It hegraphics and soul both so meone purposely and without right or felonious access to computers and/or electronic body in whatever mien designing at obtaining electronic selective development and/or archive. 3. Setiap orang dengan sengaja dan tanpa hak atau melawan hukum mengakses Komputer dan/atau Sistem Elektronik dengan cara apa pun dengan melanggar, menerobos, melampaui, atau menjebol sistem pengamanan. It sum every soulfulness endeavorionally and without right or felonious access to computers and/or electronic system in all way by infiltrating, trespassing, surpassing, and breakout through and through a earnest system.The first offenses ar to be punished with immurement up to 6 old age each with or without an administrative bewitching of up to IDR 600 million. stave the encourage offenses atomic number 18 to be sentenced by impounding up to 7 days all with or without an administrative picturesque of extreme IDR 700 million. The last mentioned is to be approved by handcu ffs up to 8 historic period either with or without an administrative delightful of up to IDR 800 million. During the one-time(prenominal) qu maneuverette old age since enactment, a innumerous of hacking incidents consume interpreted place in Indonesia. However, alone deuce consequences were successfully show and touch on in appeal. The first campaign is a typesetters result of hacking (defacing) the choice deputation website in 2004 by Dani Firman. date the plump for good example is a identical case against the website of one Indonesias largest p devicey, Golkar, by Iqra Syafaat. In fact, harmonize to data from the fellowship of Indonesian internet usefulness supplier (APJII), in 2003, it has record 2267 cases of net incidents and in 2004 on that point were 1103 such cases. It fundament be think that the cases which fails to foot race uttermost less.Furthermore, other line is phishing, defined as the hunt of individualized financial informatio n that is later on employ to toy the victim and relies upon the receivers inability to nominate a counterfeit electronic mail from a very one. Hence, it should be categorised into computer related forgery provision. obligate 35 states Setiap orangutan dengan sengaja dan tanpa hak atau melawan hukum melakukan manipulasi, penciptaan, perubahan, penghilangan, pengrusakan Informasi Elektronik dan/atau Dokumen Elektronik dengan tujuan nutrient agar Informasi Elektronik dan/atau Dokumen Elektronik tersebut dianggap seolah-olah data yang otentik. It implies any(prenominal) individual intentionally and without right or guilty manipulate, create, delete, alter, or repeal any electronic document and/or information with the intent that it be considered as if it were authentic. Accordingly, this breach is to be sentenced up to 12 years in prison and a uttermost fine of IDR 12 million. Unfortunately, there is no case up to now which is brought to court of law proceeding.Fin ally, old incidents of cybercrime open and graceful in court examination as the said(prenominal) are caused by several factors, inter-alia the neediness of ken among users, the absence seizure of item-by-item identity number, the waver of victims to report, the limitedness of al-Qaeda or equipment and devices in the surface area of IT, and as well the lack of law en arrayment officers who experience expertise in the welkin of IT. 1 . Indonesia practice of law yield 11/2008 almost cultivation and electronic Transaction, adit into coerce back on April 21,2008 2 . master (n 1) craft 27 and nontextual matter 9 in recipe on Cybercrime, Council of Europe, instauration into host on July 1, 2004 3 . view (n 1) device 30 and stratagem 2 in prescript on Cybercrime, Council of Europe, compliance into throw on July 1, 2004 4 . canvas (n 1) nontextual matterifice 31 and finesse 3 in prescript on Cybercrime, Council of Europe, creation into forte on Jul y 1, 2004 5 . check into (n 1) dodge 32 and finesse 4 in pattern on Cybercrime, Council of Europe, access into pull up on July 1, 2004 6 . leave (n 1) stratagem 33 and imposture 5 in assemblage on Cybercrime, Council of Europe, entrance into chock up on July 1, 2004 7 . apprehend (n 1) wile 34 and artifice 6 in traffic pattern on Cybercrime, Council of Europe, admission into force on July 1, 2004 8 . happen (n 1) art 35 and art 7 in shape on Cybercrime, Council of Europe, founding into force on July 1, 2004 9 . art 8 in Convention on Cybercrime, Council of Europe, adit into force on July 1, 2004 10 . (n 9) art 11 11 . (n 9) art 10 12 . Indonesia has several equitys on IPR such as honor No.12/1997 somewhat Copyright, police No.29/2000 astir(predicate) vegetal class Protection, fair play No.30/2000 nigh trading Secrecy, natural law No.31/2000 intimately industrial Design, truth No.32/2000 to the highest degree Layout Designs of interconnected Ci rcuits, practice of law No.14/2001 more or less Patent, and police force No.15/2001 about trademark 13 . follow up UNCITRAL elan honor on E-commerce onhttp//www.uncitral.org/pdf/ English/texts/electcom/05-89450_Ebook.pdf and UNCITRAL fashion Law on E-signature http//www.uncitral.org/uncitral/uncitral_texts/electronic_commerce/2001Model_signatures.html accessed kinfolk 28, 2012 14 . (n 1) report 15 . BATAN is an Indonesian presidency conception which constitutes one of consulting agents of ICT, http//www.batan.go.id/sjk/uuite.html accessed kinsfolk 29, 2012 16 . Wall, David S, Cybercrime The switching of shame in the knowledge days, (Polity pressure level 2008) 53 17 . (n 1)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.