scholarly journals The Law Enforcement Of Hate Speech Crime In Polda Lampung

Ius Poenale ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 45-52
Author(s):  
Ridho Grisyan ◽  
Sunarto DM ◽  
Heni Siswanto

Criminal acts related to hate speech are one of the crimes that occur as a result of the misuse of information technology carried out by a person or group by conveying forms of provocation, seditious actions, or in the form of insults to someone or certain other groups in terms of various indicators, namely race, skin, gender, religion and others. Research problems: how are the efforts to deal with the criminal act of distributing electronic information containing hate speech at POLDA Lampung and why there are obstacles to efforts to overcome the criminal act of distributing electronic information containing hate speech at the Regional Police located in Lampung Province. This type of research is a normative juridical research. The data analysis was done qualitatively. The approach to the problem used is the statute approach. The results of this study indicate that the law enforcement of hate speech using social media is carried out by the Sub-Directorate for Cyber Crime of POLDA Lampung through non-penal and penal means. Non-penal efforts are carried out by carrying out cyber patrols and socializing the prohibition on hate speech using social media. Penal efforts carried out by investigation and investigation. The factors that hinder efforts to overcome criminal acts of hate speech by using social media are in the aspects of legislation, aspects of law enforcement officials, facilities and infrastructure, community conditions and cultural aspects of these factors, there are dominant factors being weaknesses, namely in the aspect of law enforcers who are not yet competent and have mastered the development of types of crimes related to information technology, precisely at the Cyber Police Unit in Lampung Province.

2020 ◽  
Vol 8 (8) ◽  
pp. 1202
Author(s):  
Ni Luh Ketut Dewi Yani Putri

Tujuan penulisan ini untuk memenuhi dan melengkapi persyaratan untuk memperoleh gelar Magiter Ilmu Hukum pada Fakultas Hukum Universitas Udayana. Tujuan khusus dari penulisan ini yaitu untuk mengetahui pembuktian serta yurisdiksi kejahatan mayantara dalam persidangan dan konstruksi hukum dalam peraturan perundang-undangan di Indonesia. Metode yang digunakan merupakan metode penelitian hukum normatif melalui pendekatan perundang-undangan dan pendekatan konsep. Teknik yang digunakan melalui studi kepustakaan yang diperoleh langsung dari bahan hukum primer berupa peraturan perundang-undangan dan literatur hukum yang terkait. Hambatan proses pembuktian dan yurisdiksi cyber crime yakni belum diaturnya alat bukti elektronik secara sah dalam KUHAP, masih diperdebatkannya kesaksian de auditu, serta sulit menemukan saksi yang berkompeten dalam menyaksikan kegiatan cyber crime. Mengenai yurisdiksi dalam kegiatan cyber crime juga perlu diatur kembali mengingat sangatlah sukar untuk memastikan dimana kejadiannya, kapan dilakukannya dan bagaimana perbuatan pelakunya, mengingat kejahatan ini merupakan global crime yang tidak jelas yurisdiksinya di samping berkaitan dengan cyber space yang pelakunya tidak kasat mata. Adapun Kebijakan Terhadap Kejahatan Mayantara (Cyber Crime) yakni melalui  modernisasi hukum pidana adapun beberapa alternative seperti Menghilangkan beberapa pasal- pasal pada Undang- Undang Cyber Crime yang tidak dipakai lagi (usang), Mengamandemen KUHP, Mengamandemen KUHAP, Mengamandemen Undang-Undang Teknologi Informasi, Dalam Pembuktian cyber crime aparat penegak hukum terutama hakim harus berani melakukan “rechtsvinding”. The purpose of this writing is to fulfill and supplement the requirements for the Magiter degree of legal sciences at the Faculty of Law of Udayana University. The specific purpose of this writing is to know the evidence and the jurisdiction of crime between the law in the trial and the construction of laws in Indonesia's laws and regulations. The method used is a normative legal research method through a statutory approach and a concept approach. Techniques used through literature studies obtained directly from the primary legal material in the form of legislation and related legal literature. The barriers to the proving process of cyber crime and jurisdiction are not in the legitimate electronic proof tool in the criminal CODE, still in the testimony of De Auditu, and difficult to find witnesses who are competent in witnessing cyber crime activities. Regarding the jurisdiction in cyber crime activities also need to be rearranged considering that it is difficult to ensure where the event, when it does and how the perpetration, considering this crime is a global crime that is unclear its jurisdiction in addition to the cyber space that the perpetration of invisible eyes. The policy on Cyber Crime is through the modernization of criminal law as some alternative such as eliminating some of the articles on Cyber Crime laws that are not used anymore (obsolete), amend KUHP, amend KUHAP, amend the Information Technology law, in proving Cyber Crime law enforcement officials, especially the judges must dare to do "rechtsvinding".


2021 ◽  
Vol 24 (01) ◽  
pp. 25-36
Author(s):  
Aulia Anastasya Putri Permana ◽  
Shafarina Intan Khomsah

The purpose this paper to interpret the content of a law, namely is the regulation regarding the ethics of delivering criticism through social media as regulated in the ITE Law. Article 28 Paragraph (2) of the UU ITE is considered to limit constitusional rights of opinin and expression. The explanation of Article 28 Paragraph (2) transctional and electronic information law is gives different interpretations as fragments of paragraph “spreading informaton” and “causing a sense of hatred/hostility”. This considered an unclear limitation on the right to freedom opinion and expression on social media. The problem in study is how to interpret the restrictive and application the law solving problem of hate speech on social media. The method used in this study, normative juridical approach, is the carried out based on the main legal material by examining theories, concepts, legal principles and laws regulations. It can be concluded in Indonesia a legal state where every action citizens is regulated in laws, the regulatin of submitting criticism through social media which is regulated in Law no. 11 of 2008 UU ITE. The Article 28 Paragraph (2) transactional and electronic information law, gives rise to the vage normen (blurred norms). It is can be abused silencing freedom of opinion and even becoming a political weapon. In the application of this law, it is indicated that there is duplication of criminal acts which are actually vulnerable to legal uncertainty so that it has the potential to cause turmoil in society.


2021 ◽  
pp. 1279
Author(s):  
Cindy Cindy ◽  
Lydia Imelda Rachmat ◽  
Yahya Abdi Nugroho ◽  
Tatang Ruchimat

Information technology has important functions both now and in the future. Advances in technology make it easier for us to get information, but apart from having a good impact, technology can also have a bad impact, such as breaking the law. One example of a violation of the law on social media is cyber crime, which uses computers as a tool or target for criminal means (Widodo: 2011). The spread of fake news is an example of cyber crime that is quite rampant in Indonesia. no exception in the current pandemic, it also makes people afraid of information on social media and sometimes panics. The rise of this incident has made law enforcement in Indonesia run a cyber patrol system with the aim of monitoring the activities of spreading fake news (hoaxes), or the movement of terrorist networks, as well as other crimes related to social media. This is regulated in the ITE Law, Article 390 of the Criminal Code, Articles 14 and 15 of Law No.1 Year 1946 which is the legal basis for handling cyber crimes. The police are trying to overcome all the impacts of hoaxes and cybercrimes by establishing the Directorate of Cyber Crime. using research methods that focus on secondary data processing and data analysis is carried out qualitatively using deductive logic (Soekanto and Mamudji 2007). The results of this study are known that cyber crimes, especially hoax news, create panic in the community and solutions that can be done in overcoming these crimes that occurred. Teknologi informasi memiliki fungsi penting baik sekarang maupun di masa depan. Kemajuan teknologi mempermudah kita untuk mendapatkan informasi, namun selain berdampak baik teknologi juga bisa berdampak buruk, seperti pelanggaran hukum. Salah satu contoh pelanggaran hukum di media sosial adalah cyber crime, yang menggunakan komputer sebagai alat ataupun sasaran untuk sarana kejahatan (Widodo:2011).Penyebaran berita bohong merupakan salah satu contoh kejahatan siber yang cukup marak terjadi di Indonesia .Persentase penyebaran berita bohong sangatlah tinggi tidak terkecuali di masa pandemi seperti saat ini,juga membuat masyarakat menjadi ketakutan dengan informasi yang ada di media sosial dan  terkadang membuat menjadi panik.Maraknya kejadian ini membuat penegak hukum di indonesia menjalankan sistem patroli cyber dengan tujuan untuk memantau aktivitas penyebaran berita bohong (hoaks), atau pergerakan jaringan terorisme, serta kejahatan lainnya yang berkaitan dengan media sosial. Hal ini diatur dalam UU ITE, Pasal 390 KUHP, Pasal 14 dan 15 UU No.1 Thn.1946  yang menjadi landasan hukum terhadap penanganan kejahatan dunia maya. Kepolisian berupaya untuk menanggulangi semua dampak dari berita bohong (hoaks) maupun kejahatan dunia maya dengan membentuk Direktorat Tindak Pidana Siber.Artikel ini dibuat dengan tujuan agar masyarakat bisa lebih kritis terhadap setiap berita yang disebarkan di media sosial dan semakin bijak dalam menggunakannya .Dalam artikel ini menggunakan metode penelitian yang berfokus pada data sekunder pengolahan dan analisis data dilakukan secara kualitatif dengan menggunakan logika deduktif(Soekanto dan Mamudji(2007). Hasil dari penelitian ini diketahui bahwa kejahatan siber terutama berita hoaks membuat panik masyarakat dan penyelesaian yang dapat dilakukan dalam mengatasi kejahatan-kejahatan yang terjadi


2018 ◽  
Author(s):  
Elpina

Customary law is the law of life (living low) that grow and develop in the midst of the community in accordancewith the development of society. Customary law who live in midst of ethnic Indonesia is very strategic to be knownand understood by law enforcement officials, legal observers and guidance in applying the appropriate legal andfair for Indonesian society. The common law does not give the right role and the same degree between men andwomen in life, social, culture, political, economic and domestic life and marriage property and inheritance.Landing directly above the law would cause problems among indigenous peoples, especially the indigenous peopleembrace patrilinieal or matrilineal kinship system, such as that experienced by the Batak people who mbracepatrilineal kindship systems knows in Toba Batak society is patrilineal system, which through the male lineage andis the next generation of his parents while girls not the generation of their parents, as a result of this system is veryinfluential on the position of girls in matters of inheritance.


2021 ◽  
Vol 1 (2) ◽  
pp. 68-81
Author(s):  
Ardi Saputra Gulo ◽  
Sahuri Lasmadi ◽  
Khabib Nawawi

ABSTRAK Artikel ini membahas cyber crime dalam bentuk phising berdasarkan Undang-Undang tentang Informasi dan Transaksi Elektronik. Penelitian yang digunakan yakni penelitian hukum normatif. Hasil penelitian yang telah dilakukan menunjukan: 1) Pengaturan hukum terhadap cyber crime dalam bentuk phising berdasarkan Undang-Undang tentang Informasi dan Transaksi Elektronik tidak dapat dikenakan Pasal 35 jo Pasal 51 Ayat (1) dan Pasal 28 Ayat (1) jo Pasal 45A Ayat (1). 2) Kebijakan hukum terhadap cyber crime dalam bentuk phising berdasarkan Undang-Undang tentang Informasi dan Transaksi Elektronik adalah dilakukannya perubahan terhadap Undang-Undang tentang ITE dengan merumuskan konsep phising dan merubah isi Pasal 35. ABSTRACT This article discusses cyber crime in the form of phishing based on the Law on Electronic Information and Transactions. The research used is normative legal research. The results of the research that have been conducted demonstrated that: 1) Legal regulations on cyber crime in the form of phishing based on the Law on Electronic Information and Transactions cannot be subject to Article 35 in conjunction with Article 51 Paragraph (1) and Article 28 Paragraph (1) in conjunction with Article 45A Paragraph ( 1). 2) the criminal law policy against cyber crime in the form of phishing based on the Law on Electronic Information and Transactions is the amendment of the Law on ITE by formulating the concept of phishing and amending the contents of Article 35.


2020 ◽  
Vol 4 (2) ◽  
pp. 51-58
Author(s):  
Sry Wahyuni ◽  
Elwidarifa Marwenny

The subject matter of this research is the Juridical Review of the Crime of Threats in the Information and Electronic Transactions Law (Case Study of the Koto Baru District Court). This issue is divided into two sub-discussions, first, how is the application of material crimes against criminal acts of threats in the Law on Information and Electronic Transactions, second, how are judges' legal considerations in imposing crimes against threats of threats in the Law on Electronic Information and transactions. The method used in this research is to use a normative juridical problem approach. about the problem that is the object of the problem.The results showed that efforts to apply sanctions were made to overcome the perpetrators of extortion and threats, namely: firmly enforcing the existing positive laws. For subjective positive law enforcement, it may be necessary to have instruments or law enforcers who have the instinct of justice, namely "Judges" who decide all existing cases. The research implication is: it is hoped that the inculcation of social values ​​and norms in society in using social media and in UUITE is not trapped in behavior that plunges them into criminal acts / crimes, it is also hoped that the Panel of Judges in deciding cases must consider more The facts of the trial, the elements of the offense, and the consideration of the severity of the crime with reference to the defendant's situation and the victim's loss.


Author(s):  
Sujitha S. ◽  
Parkavi R.

This book chapter will be an introduction to hacking, DDOS attacks and Malware Analysis. This chapter will also describe about the cyber-crime against properties and Persons and will give a detailed description about the cyber security and privacy. This chapter will deal with the cyber-crime investigations, law enforcement policy and procedures. This chapter will also describe about the peer supporting programs for the law enforcement authorities and a detailed description about the control devices and techniques that are used by an officer. This chapter will give an opportunity to know about the evidence collecting procedures in cyber-crime and also the barriers to cybercrime investigations.


2018 ◽  
Vol 7 (3.21) ◽  
pp. 317
Author(s):  
M Zamroni ◽  
. .

Hope to have legislation that specifically set while an umbrella in running materialize advocate profession, lawyers are more confident in addition to other law enforcement officials, such as judges, prosecutors and police, as well as respected as an equal partner in the law enforcement process. But the big question is how the existence of the profession of advocate Indonesia before and after the enlawment of Act Number 18 of 2003 concerning the Advocate, as well as any constraints that occur in their implementation. The rule of law relating to the profession of advocate before the enLawment of Act Number 18 of 2003 concerning The Advocate, scattered in various laws, such as Act Number 1 of 1946 on the Law of Criminal Code, Act Number 1 of 1950 on the Supreme Court, Emergency Act Number 1 of 1951 governing temporary measures to organize the unity of the pecking order and civil court events, and Herziene Indlandsch Regalement (HIR). Before the release of Act Number 18 of 2003 concerning Advocates, advocate the use of the term in prLawice there has been no standard for the profession. In various provisions of the legislation of any inconsistency pr. For example Act Number 14 of 1970, as has been replaced by Act Number 35 of 1999, and was replaced again by Act Number 4 of 2004 as well as the latter is replaced by Act Number 48 of 2009, regarding the power of Justice, to use the term legal aid and lawyers. Birth of the Act of the Republic of Indonesia Number 18 of 2003 concerning The Advocate is the expectation of a long delayed during the 58 years since the independence of the Republic of Indonesia, the laws governing the profession of advocate a free, independent and responsible for the implementation of a judicial honest, fair, and legal certainty for all seekers of justice in upholding the law, truth, justice, and human rights.  


2015 ◽  
Vol 40 (04) ◽  
pp. 908-936 ◽  
Author(s):  
Gretchen Arnold ◽  
Megan Slusser

There is little documentation about how nuisance property laws, which fine people for excessive 911 calls, affect victims of domestic violence. In St. Louis, we found that police and prosecutors believe that the law benefits victims of domestic violence by providing them with additional services. By contrast, advocates for domestic violence victims believe that the law undermines battered women's access to housing and discourages them from calling 911. Using qualitative data, we analyze how the organizational structures and dynamics within which each group works give rise to different stocks of working knowledge. We conclude that law enforcement officials are unaware of these harms because women's voices and experiences are marginalized during the enforcement process. This research reveals mechanisms through which law enforcement policies reinforce gender inequality, and illustrates some ways in which gender relations and power come into play in what, on their surface, appear to be gender‐neutral laws.


Sign in / Sign up

Export Citation Format

Share Document