Thursday, May 23, 2019
Cybercrime in Indonesia Essay
Even if Indonesia has not ratified or signed the Convention on Cybercrime yet, officially Indonesia has implement almost all cyber crime provisions set forth in the Convention. These provisions are set out in several(prenominal) maneuvericles in fair play No. 11 Year 2008 on Information and Electronic Transaction. The seven provisions, among differents offense related to child pornography, illegal accession, illegal maskception, entropy interference, system interference, step of devices, and computer related forgery. The provisions of computer-related fraud and attempt and aiding or abetting are no longer regulated under this Act due consideration has been accommodated by the existing provisions in the Penal Code. Likewise, some offenses related to infringements of copyright and related rights are deemed to have been sufficiently set forth in the honor on Intellectual Property Rights.In addition to the above provisions, the police force No.11/2008 is the merely cybercrime s tatute in Indonesia, which also includes provisions on e-commerce and e-signature referring to the UNCITRAL Model Law and the EU Directives on such subjects. This is by virtue of the awareness of regulator to the highest degree inevitable legal convergence of telecommunications, media, and informatics. By means of the principle of neutrality and efficiency, this product of law will be able to encompass the three specialties.Moreover, hacking, according to BATAN is defined as infiltrating or breaching activities into an electronic system without rights, which usually draw a bead on to misuse or damage the system. Identical definition of hacking is also proposed by David S. Wall which is deliberate unauthorized access to spaces over which rights of ownership or access have already been established. Therefore, hacking can be incorporated into illegal access provisions. In the Article 30, in that respect are three paragraphs that organize illegal access, inter alia 1. Setiap orangu tang dengan sengaja dan tanpa hak atau melawan hukum mengakses Komputer dan/atau Sistem Elektronik milik Orang lain dengan cara apa pun. It means any person advisedly and without right or unlawful access to computers and/or electronic system belongs to any other person in any way.2. Setiap Orang dengan sengaja dan tanpa hak atau melawan hukum mengakses Komputer dan/atau Sistem Elektronik dengan cara apa pun dengan tujuan untuk memperoleh Informasi Elektronik dan/atau Dokumen Elektronik. It means any person intentionally and without right or unlawful access to computers and/or electronic system in any way aim at obtaining electronic knowledge and/or document. 3. Setiap Orang dengan sengaja dan tanpa hak atau melawan hukum mengakses Komputer dan/atau Sistem Elektronik dengan cara apa pun dengan melanggar, menerobos, melampaui, atau menjebol sistem pengamanan. It means any person intentionally and without right or unlawful access to computers and/or electronic system in any way by in filtrating, trespassing, surpassing, and breaking through a credentials system.The first offenses are to be punished with imprisonment up to 6 years either with or without an administrative fine of up to IDR 600 million. Meanwhile the he inventionbeat offenses are to be sentenced by imprisonment up to 7 years either with or without an administrative fine of utmost IDR 700 million. The latter is to be approve by imprisonment up to 8 years either with or without an administrative fine of up to IDR 800 million. During the past four years since enactment, a myriad of hacking incidents have taken place in Indonesia. However, only two cases were successfully expressed and processed in court. The first case is a case of hacking (defacing) the alternative Committee website in 2004 by Dani Firman. While the second case is a similar case against the website of one Indonesias largest party, Golkar, by Iqra Syafaat. In fact, according to data from the Association of Indonesian Internet Serv ice Provider (APJII), in 2003, it has recorded 2267 cases of network incidents and in 2004 there were 1103 such cases. It can be concluded that the cases which fails to mental testing far less.Furthermore, another concern is phishing, defined as the pursuit of personal financial information that is subsequently used to defraud the victim and relies upon the recipients inability to distinguish a bogus email from a real one. Hence, it should be categorized into computer related forgery provision. Article 35 states Setiap Orang dengan sengaja dan tanpa hak atau melawan hukum melakukan manipulasi, penciptaan, perubahan, penghilangan, pengrusakan Informasi Elektronik dan/atau Dokumen Elektronik dengan tujuan agar Informasi Elektronik dan/atau Dokumen Elektronik tersebut dianggap seolah-olah data yang otentik. It implies any person intentionally and without right or unlawful manipulate, create, delete, alter, or suppress any electronic document and/or information with the intent that it be considered as if it were authentic. Accordingly, this breach is to be sentenced up to 12 years in prison and a maximum fine of IDR twelve million. Unfortunately, there is no case hitherto which is brought to court proceeding.Finally, rare incidents of cybercrime exposed and processed in court trial as the aforementioned are caused by several factors, inter-alia the lack of awareness among users, the absence of single identity number, the reluctance of victims to report, the limitedness of infrastructure or equipment and devices in the field of IT, and also the lack of law enforcement officers who have expertise in the field of IT. 1 . Indonesia Law Number 11/2008 virtually Information and Electronic Transaction, entry into force on April 21,2008 2 . See (n 1) art 27 and art 9 in Convention on Cybercrime, Council of Europe, entry into force on July 1, 2004 3 . See (n 1) art 30 and art 2 in Convention on Cybercrime, Council of Europe, entry into force on July 1, 2004 4 . See ( n 1) art 31 and art 3 in Convention on Cybercrime, Council of Europe, entry into force on July 1, 2004 5 . See (n 1) art 32 and art 4 in Convention on Cybercrime, Council of Europe, entry into force on July 1, 2004 6 . See (n 1) art 33 and art 5 in Convention on Cybercrime, Council of Europe, entry into force on July 1, 2004 7 . See (n 1) art 34 and art 6 in Convention on Cybercrime, Council of Europe, entry into force on July 1, 2004 8 . See (n 1) art 35 and art 7 in Convention on Cybercrime, Council of Europe, entry into force on July 1, 2004 9 . art 8 in Convention on Cybercrime, Council of Europe, entry into force on July 1, 2004 10 . (n 9) art 11 11 . (n 9) art 10 12 . Indonesia has several Laws on IPR such as Law No.12/1997 about Copyright, Law No.29/2000 about Vegetal Variety Protection, Law No.30/2000 about Trade Secrecy, Law No.31/2000 about Industrial Design, Law No.32/2000 about Layout Designs of Integrated Circuits, Law No.14/2001 about Patent, and Law No.15/2001 a bout Trademark 13 . See UNCITRAL Mode Law on E-commerce onhttp//www.uncitral.org/pdf/english/texts/electcom/05-89450_Ebook.pdf and UNCITRAL Mode Law on E-signature http//www.uncitral.org/uncitral/uncitral_texts/electronic_commerce/2001Model_signatures.html accessed September 28, 2012 14 . (n 1) Explanation 15 . BATAN is an Indonesian government institution which constitutes one of consulting agents of ICT, http//www.batan.go.id/sjk/uuite.html accessed September 29, 2012 16 . Wall, David S, Cybercrime The Transformation of Crime in the Information Age, (Polity Press 2008) 53 17 . (n 1)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.