scholarly journals Development of Cyber Crime and its Regulations in Indonesia

Author(s):  
Muhammad Iqbal ◽  

The development of information technology is like "two sides of the sword," because, on the one hand, it brings convenience, speed in doing work. Still, on the other hand, it raises legal problems that are done using information technology. This problem is called Cyber Crime. This article was prepared to discover the development of information technology, the development of Cyber Crime in Indonesia, and its arrangements in Indonesia. The research method used is normative juridical, using secondary data consisting of primary legal material, namely legislation related to Cyber Crime and examples of Cyber Crime cases in Indonesia. This study also uses secondary legal materials, namely books and journals related to Cyber Crime. The legal documents were collected through a literature study and analyzed descriptively analytically. Based on the research results, it is known that the necessary statutory provisions of the Cyber Crime are in the “Criminal Code, Law Number 11 the Year 2008 concerning Information and Electronic Transactions, Law Number 19 the Year 2002 Regarding Copyright, Law Number 15 the Year 2002 Regarding Money Laundering Crimes”.

Author(s):  
Supanto ,

<p>Abstract<br />The research conducted to inventory of the various laws (the legislative products) relating to the regulating in the field of information technology crime, to identify its adjustment in globalization, to describe the conduct proscribed as a crime of the Information and Electronic Transaction, as well as reviewing the formulation of criminal sanctions. Studies based on the idea that regulation Law Number 11 of 2008 is aimed at setting the utilization of information technology, particularly the information and electronic transactions, in order to be implemented properly and maintain the safety and benefit of humanity. However, their use potentially criminal, which must be addressed, including the use of criminal law, therefore there is a provision in the law of criminal sanctions, in this case defined the prohibited acts and penalties specified criminal, offense. Conclusions obtained, In line with an information technology and The Law of Infromation and Transaction of electronic (The Law No. 11 of 2008/UU ITE), inventoried some legislation which can be understood as an attempt arrangement of information technology, especially as a crime, as in the Criminal Code (KUHP), the Law on Telecommunications, the Law on Copyright / patent, the law of terrorism . The adjustment of The Law Number 11 of 2008 on the Information and Electronic Transactions with global regulation and a comparative assessment of the demands that must be met in order to harmony especially on the cyber crime law. In addition, the formulation of a threatened criminal sanctions in offenses under the Act remain as types of criminal sanctions prescribed in the Penal Code,<br />which is a kind of imprisonment sanction fines and criminal sanctions, but not formulated an additional  criminal sanction. Therefore, its system is no innovation typical types of criminal sanctions for offenses in the field of information and electronic transactions.<br /><em>Keywords: Cyber crime, criminal policy,information technology</em></p><p><br />Abstrak<br />Penelitian yang dilakukan bertujuan untuk menginventarisasi berbagai undang-undang (produk legislatif) yang berkaitan dengan bidang kejahatan teknologi informasi, untuk mengidentifikasi penyesuaian dalam era globalisasi, untuk menggambarkan perilaku terlarang sebagai kejahatan Informasi dan Transaksi Elektronik , serta meninjau perumusan sanksi pidana. Studi didasarkan pada gagasan bahwa UU Nomor 11 Tahun 2008 bertujuan untuk pengaturan pemanfaatan teknologi informasi, khususnya informasi dan transaksi elektronik, agar dapat dilaksanakan dengan baik dan menjaga keamanan dan kepentingan kemanusiaan, namun penggunaannya berpotensi pidana, termasuk penggunaan hukum pidana, karena ada ketentuan dalam hukum sanksi pidana, dalam hal ini didefinisikan tindakan yang dilarang dan hukuman yang ditentukan pidana. Kesimpulan yang diperoleh, Perlu penyesuaian UU Nomor 11 Tahun</p><p>2008 tentang Informasi dan Transaksi Elektronik dengan regulasi bersifat global dan penilaian komparatif dari tuntutan yang harus dipenuhi untuk keharmonisan terutama pada hukum kejahatan cyber. Dalam UU ITE, terhadap perbuatan yang dilarang diancam sanksi pidana. Adapun jenis sanksi pidananya adalah sanksi pidana penjara dan sanksi pidana denda. Jenis sanksi ini sudah dikenal dalam Pasal 10 KUHP,   dan tidak ditentukan jenis pidana tambahan. Dengandemikian tidak ada pengembangan mengenai jenis pidana khusus yang ditujukan bagi pelaku tindak pidana di bidang informasi dan transaksi elektronik.<br /><em>Kata Kunci: Kejahatan Dunia Maya, Hukum Pidana,Teknologi Informasi</em></p>


2016 ◽  
Vol 5 (1) ◽  
Author(s):  
Supanto

<div class="WordSection1"><p align="center"><strong><em>Abstract</em></strong></p><p><em>Th</em><em>e research conducted to inventory of the various laws (the legislative products) relating to the regulating in the field of information technology crime, to identify  its adjustment   in globalization, to describe the conduct proscribed as a crime of the Information and Electronic Transaction, as well as reviewing the formulation of criminal sanctions. Studies based on the idea that regulation Law Number 11 of  2008 is aimed at setting the utilization of information technology, particularly the information and electronic transactions, in order to be implemented properly and maintain the safety and benefit of humanity. However, their use potentially criminal, which must be addressed, including the use of criminal law, therefore there is a provision in the law of criminal sanctions, in this case defined the prohibited acts and penalties specified criminal, offense. Conclusions obtained, In line with an information technology and The Law of Infromation and  Transaction  of electronic (The Law No. 11 of 2008/UU ITE), inventoried some legislation which can be understood as an attempt arrangement of information technology, especially as a crime, as in the Criminal Code (KUHP), the Law on Telecommunications, the Law on Copyright / patent, the law of terrorism . The adjustment of The Law Number 11 of 2008 on the Information and Electronic Transactions with global regulation and a comparative assessment of the demands that must be met in order to harmony especially on the cyber crime law. In addition, the formulation of a threatened criminal sanctions in offenses under the Act remain as types of criminal sanctions prescribed in the Penal Code, which is a kind of imprisonment sanction fines and criminal sanctions, but not formulated an additional criminal sanction. Therefore, its system is no innovation typical types of criminal sanctions for offenses in the field of information and electronic transactions.</em></p><p><strong><em>Keywords: </em></strong><em>Cyber crime, criminal policy,information technology</em></p><p> </p><p align="center"><strong>Abstrak</strong></p><p>Penelitian yang dilakukan bertujuan untuk menginventarisasi berbagai undang-undang (produk legislatif) yang berkaitan dengan bidang kejahatan teknologi informasi, untuk mengidentifikasi penyesuaian dalam era globalisasi, untuk menggambarkan perilaku terlarang sebagai kejahatan Informasi dan Transaksi Elektronik , serta meninjau perumusan sanksi pidana. Studi didasarkan pada gagasan bahwa UU Nomor 11 Tahun 2008 bertujuan untuk pengaturan pemanfaatan teknologi informasi, khususnya informasi dan transaksi elektronik, agar dapat dilaksanakan dengan baik dan menjaga keamanan dan kepentingan kemanusiaan, namun penggunaannya berpotensi pidana, termasuk penggunaan hukum pidana, karena ada ketentuan dalam hukum sanksi pidana, dalam hal ini didefinisikan tindakan yang dilarang dan hukuman yang ditentukan pidana. Kesimpulan yang diperoleh, Perlu penyesuaian UU Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik dengan regulasi bersifat global dan penilaian komparatif dari tuntutan yang harus dipenuhi untuk keharmonisan terutama pada hukum kejahatan <em>cyber</em>. Dalam UU ITE, terhadap perbuatan yang dilarang diancam sanksi pidana. Adapun jenis sanksi pidananya adalah sanksi pidana penjara dan sanksi pidana denda. Jenis sanksi ini sudah dikenal dalam Pasal 10 KUHP, dan tidak ditentukan jenis pidana tambahan. Dengan demikian tidak ada pengembangan mengenai jenis pidana khusus yang ditujukan bagi pelaku tindak pidana  di bidang informasi dan transaksi elektronik.</p><p><strong>Kata Kunci:  </strong>Kejahatan Dunia Maya<em>,  </em>Hukum Pidana<em>,</em>Teknologi Informasi</p></div>


2020 ◽  
Vol 3 (1) ◽  
pp. 131
Author(s):  
Lilik Eko Sukaryono ◽  
Amin Purnawan

In the process of investigating criminal cases of persecution relating to the body, health, and human lives, it requires the assistance of a medical expert. The assistance of a doctor with his medical science of justice as stated in the Visum et repertum which he made is absolutely necessary. The formulation of the problem that was formed in this study is how the role of visum et repertum as evidence in the implementation of court cases of persecution in the Blora State Court, and what obstacles and solutions that occur in the form of evidence visum et repertum in cases of criminal abuse. Juridical sociology as an approach method used in this study with research specifications with descriptive methods. The data used consisted of primary data and secondary data using interview and literature study methods. Based on the research it was concluded (1) The role of Visum et repertum in the case of mistreatment in case decision number 184 / Pid.B / 2018 / PN Bla, the judge weighed on the elements in Article 351 paragraph 1 of the Criminal Code in which the result was a feeling of discomfort, pain or injury, which is based on evidence in the form of Visum et repertum on the victim's body. (2)Obstacles in proving in the form of visum et repertum in cases of torture include the qualification of wounds based on the legal needs confusing a doctor, standardization of the determination of the degree of injury to be poured on the Visum et repertum, Provisions for the signing of the post visum et repertum letter by the doctor, Request for visum et repertum which is lacking / incomplete, Visum Request Letter arrives late.�Keywords: Visum Et Repertum; Evidence; Criminal Acts Of Persecution.


2021 ◽  
Vol 1 (2) ◽  
pp. 101
Author(s):  
Elsa Intan Pratiwi

This study aims to analyze the forms of action that are categorized as body shaming crimes and criminal law enforcement against body shaming crimes on social media. This study uses a normative juridical approach. The data used is in the form of secondary data consisting of primary and secondary legal materials. The data collection method uses literature study and descriptive qualitative analysis. The results of this study indicate that, the forms of action that are categorized as body shaming crimes, namely: the words uttered contain elements of physical insult and have humiliated and lowered one's self-esteem because they can be seen/witnessed by many people, making them feel sad and depressed. Perpetrators of body shaming can be charged under Article 315 of the Criminal Code, with a maximum imprisonment of four months and two weeks or a maximum fine of four thousand and five hundred rupiahs. And if it is done on social media, the perpetrator can be charged under Article 27 paragraph (3) jo. Article 45 paragraph (3) of the ITE Law with a maximum imprisonment of four years and/or a maximum fine of seven hundred and fifty million rupiah. The police also offer a settlement process in a non-litigation context, namely by maximizing penal mediation to reduce the build up of cases in court.


Esensi Hukum ◽  
2020 ◽  
Vol 2 (2) ◽  
pp. 48-63
Author(s):  
Arman Tjoneng ◽  
Christin Septina Basani ◽  
Novalita Sidabutar

Abstract The Corruption Eradication Commission (KPK) has become a super institution with extraordinary restraint. With the new Corruption Eradication Commission Law, some people think that the KPK has been weakened, which has been an institution loved by the public, even though the government denies that the new KPK Law has not weakened the KPK at all. One of the new things is the formation of the KPK Supervisory Body, one of which has the authority to grant permission to the KPK to conduct searches, which in fact has an impact on the problems at hand. The method used is a normative legal research method. The approach used is a statutory approach. The data used are secondary data obtained by literature study and primary data obtained by conducting interviews with related party respondents. There has been a shift in the meaning of Barriers to Justice as stated in Article 221 of the Criminal Code with Article 221 of the Corruption Eradication Law where Article 221 of the Criminal Code views Obstruction of Justice as a material offense while for Article 21 of the Corruption Eradication Law, Judicial Obstruction is seen as a formal offense. On the other hand, the actions of the Supervisory Board in granting licenses for searches, confiscation, etc. are not automatically considered a disturbance of justice unless it can be proven that the elements of wrongdoing committed by the Supervisory Board can be proven.   Keywords : Corruption, Authority, Obstruction Of Justice.   ABSTRAK Komisi Pemberantasan Korupsi (KPK) telah menjadi lembaga super dengan pengekangan yang luar biasa. Dengan adanya Undang-Undang KPK yang baru, sebagian orang menilai telah terjadi pelemahan KPK yang selama ini menjadi institusi yang dicintai masyarakat, padahal pemerintah membantah bahwa Undang-Undang KPK yang baru sama sekali tidak melemahkan KPK. Salah satu hal baru yaitu adalah pembentukan Badan Pengawas KPK yang salah satunya memiliki kewenangan untuk memberikan izin kepada KPK untuk melakukan penggeledahan, yang ternyata berdampak pada permasalahan yang sedang dihadapi. Metode yang digunakan adalah metode penelitian hukum normatif. Pendekatan yang digunakan adalah pendekatan statutori. Data yang digunakan adalah data sekunder yang diperoleh dengan studi pustaka dan data primer diperoleh dengan melakukan wawancara dengan responden pihak terkait. Telah terjadi pergeseran makna Hambatan Keadilan sebagaimana tertuang dalam Pasal 221 KUHP dengan Pasal 221 Undang-Undang Pemberantasan Korupsi dimana Pasal 221 KUHP memandang Obstruksi Keadilan sebagai delik material sedangkan untuk Pasal 21 Undang-Undang Pemberantasan Korupsi, Obstruksi Peradilan dipandang sebagai delik formal. Di sisi lain, tindakan Dewan Pengawas dalam pemberian izin penggeledahan, penyitaan, dan lain-lain tidak serta merta dianggap sebagai gangguan keadilan kecuali dapat dibuktikan bahwa unsur-unsur perbuatan salah yang dilakukan Dewan Pengawas dapat dibuktikan. Kata Kunci: Korupsi, Otoritas, Obstruksi Keadilan.


2018 ◽  
Vol 11 (1) ◽  
pp. 46
Author(s):  
Kadhung Prayoga

The world today has entered to the era of information society connected in a virtual world. Not only in urban areas, this phenomenon is also commonly found in rural areas. Farmers in the village have begun to take advantage of their use of information technology to meet their needs. The result is a response from the government to develop an extension system based on the use of information technology called cyber extension. Based on this phenomenon, it takes a study of the effect of what is caused by the existence of cyber extension and the theory behind it. The approach used is qualitative approach using descriptive method and discourse analysis. The data used are secondary data collected through literature study method. From the discussion is known that cyber extension has given many changes in the social structure and culture of farming communities. Changes that there are moving towards the positive but there is also a precisely cyber extension causing changes to the negative direction. However, the change is not because of the reason because according to Castell, the growing information technology such as cyber extension is present in order to provide a positive effect for human life. While Bourdeau view cyber extension as an arena in which there is a fight capital owned by farmers and extension workers. So as to form a new habitus and give birth to a different social practice prior to the extension activities conducted in the virtual space. Key word: information technology, cyber extension, extension, agriculture


2020 ◽  
Vol 1 (6) ◽  
Author(s):  
Ahmad Mukri Aji

Abstract:Domestic violence is a behavior that can be categorized as a violation of human rights. Because this behavior results in disruption of the social dimension of humanity, due to actions that do not humanize humans in general. Even in the context of domestic violence, the perpetrators who are supposed to protect even commit acts of violence, mistreatment, intimidation and even the loss of the victim's life. The research method uses the normative juridical method, using secondary data obtained through literature study and analyzed qualitatively. The results and discussion of this study are that there are aspects of human rights violations that occur in domestic violence behavior. So the government is obliged to take action in the form of legal protection for victims by ensnaring the perpetrators with laws and regulations. Both the Criminal Code and the Law on the Elimination of Domestic Violence.Keywords: Domestic Violence Behavior, Human Rights, Violence.


2016 ◽  
Vol 4 (1) ◽  
Author(s):  
Heri Yuliyanto

Mastery of information technology is important for the banking industry has an oligopoly marketstructure, but does not guarantee a sustainable competitive advantage. To win the competition is not onlydetermined by the technologically and price (interest given), but also factors mastery of knowledge andinformation currently an issue that is very strategic.If a bank uses technology as an advantage its competitiveness, then the advantage will be temporary, because thetechnology has the properties easily imitated. However, if the advantages of information technology along withthe mastery of information and knowledge of quality management, the competitors require greater effort and along time to be able to imitate or duplicate the competitive advantage. Thus the competitive advantage thatwill last longer.Through literature study and analysis of secondary data obtained information that the national bankingmarket outlook is still widespread. In addition, the technology factor is not the major factor is the mainattraction or reason for customers to have a bank account, but the image bank safe is the main reason to haveaccounts.Keyword; Knowledge Mangement, MEA , competitive advantege, competitive strategy


Kosmik Hukum ◽  
2020 ◽  
Vol 19 (2) ◽  
Author(s):  
Krisna Praditya Saputra ◽  
Susilo Wardani ◽  
Selamat Widodo

National Development in implementing social security is carried out in the framework of complete human development and to create a society that is prosperous, just, prosperous, and equitable, both physically and spiritually based on Pancasila and the 1945 Constitution. This is regulated in Article 28H paragraph (3) which states that: "Every person has the right to social security which enables his complete development as a dignified human being." All workers should receive protection, both formal and informal, in this case, official parking attendants work for a living which is very vulnerable to the risk of work accidents. This research discusses how the implementation of the fulfillment of labor social security rights for official parking attendants in the Banyumas Regency and what are the obstacles in the fulfillment of the employment social security rights for official parking attendants in Banyumas Regency. The method used in this research, namely the normative juridical method, is carried out through a literature study which examines mainly secondary data in the form of laws and regulations, agreements/contracts, or other legal documents, as well as research results, assessment results, and other references. As for the implementation of the fulfillment of labor social security rights for official parking attendants in Banyumas Regency, namely the parking attendants' obligations to follow the BPJS Ketenagakerjaan so that social security is fulfilled for official parking attendants covered by the Transportation Agency. And what is an obstacle in the fulfillment of the employment social security rights for official parking attendants in Banyumas Regency is the low level of education which affects the level of awareness of workers in paying BPJS contributions, even though the Banyumas Regency Transportation Office requires every worker to participate in the social security program.Keywords: Labor Social Security, Parking Attendants, Department of Transportation


Wajah Hukum ◽  
2020 ◽  
Vol 4 (2) ◽  
pp. 406
Author(s):  
Satrio Nur Hadi ◽  
Tahura Malagano

Forest development is a national development target that is expected to provide maximum benefits for the people's welfare, in fact this is now very difficult to happen, because there are many cases of logging without permission from the authorized official. This is the case in the Sungai Buaya Register 45 Forest Area, Mesuji Regency, Lampung. In the case file Number BP / 83 / XI / 2010 RESKRIM to the Tulang Bawang Pokes that the suspect named Komang Salie alias Komang Bon alias Wayan Putra bin Wayan Mije, is suspected of having committed a criminal act of logging without the permission of the authorized official, in a case which is suspected by everyone. prohibited from occupying and or working and or using, encroaching, cutting trees and harvesting or collecting forest products without having the right and permission from the authorized official and carrying tools specifically used to cut, cut or cut trees in the forest area without a permit authorized officials, and those who commit, who order to do, participate in the act or those who deliberately provide assistance at the time the crime is committed or those who deliberately provide opportunities, means to commit the crime, as referred to in Article 50 paragraph (3) letters a, b, e, and k Jo Article 78 paragraph (2), (5), and ( 10) Law Number 19 of 2004 concerning Amendments to Law Number 41 of 1999 concerning Forestry, Jo Articles 55, 56 of the Criminal Code. The problem in this research is what is the role of the National Police as an investigator in the criminal act of logging without the permission of the authorized official and what factors are the factors that hinder the role of the Police as an investigator in the criminal act of logging without the permission of the authorized official. The method that the author uses in this research is to use normative and empirical approaches, primary and secondary data types, data collection methods with literature study and field studies, and descriptive qualitative data analysis. Based on the results of the research, the role of the National Police as an investigator in the crime of forest logging without the permission of the authorized official case number BP / 83 / XI / 2010 / RESKRIM at the Tulang Bawang Police, among others, before the investigation was carried out, an investigation was first carried out to determine the truth of the criminal act that occur. The investigation is based on KUHAP and Law Number 02 of 2002 concerning the Police.


Sign in / Sign up

Export Citation Format

Share Document