Professional Documents
Culture Documents
0 CHAPTER I
Arranged
(110110170303)
Faculty of Law
Padjadjaran University
2020
A. Background
In the current development, globalization has made the legal system converged. The
meaning of the good development of all sciences is also growing very rapidly and
law is no exception as well. That is because an integrated legal system
alone will not be enough to provide optimal solutions to problems that arise.1
1
Anthony Ogus, Competition Between National Legal Systems: A Contribution of Economic Analysis to Comparative
Law (Int'l & Comp. LQ405, 1999) p.48
2
Ralf Michaels, "Two Paradigm of Jurisdiction on", Michigan Journal of International Law, Summer 2006.
3
Pierre Legrand, "European Legal System Are Not Converging", 45 Int'l & Comp. LQ 52, 61-62 (1996)
4
Deris Setiawan, Computer Security Systems, (Jakarta: PT E Lex Media Komputindo, 2005) p.70-77
c. Law No. 36 of 1999 concerning Telecommunications or Law No. 11 of
2008 concerning the Internet & Electronic Transactions.
d. Law Number 15 of 2002 concerning Money Laundering Crimes
The development of the age of giving birth to new crimes in the field of information
technology, factors that influence include:5
5
Pokrol Bung, CyberCrime in http: //www.hukumonline. Com / clinics / details / cl2824 / criminal-cyber-crime
are accessed on Monday, March 30, 2020 at 04.08 WIB
In accordance with the background discussion earlier and in the explanation from 2
expert's point of view which states unification and legal culture that make the ideal of
convergence law is still being debated until now. The problem was elaborated through
an explanation by Mochtar Kusumaatmadja, arguing that problems in a developing
society that must be regulated by law in general can be divided into two broad groups,
namely:6
a) problems that are directly related to one's personal life and are closely related
to the cultural and spiritual life of the people;
(b) issues relating to society and progress in general are "neutral" in terms of
culture.
These two things can be used as a solution to create legal reform because it can be
seen that it includes things from the cultural and economic factors that exist in the
community contained in the second point in the "neutral" clause. Where it covers all the
problems that a da in society. Effectively become the main key in enforcing the
laws and regulations that will be made. For mela l ui legal sense alone that
therefore legal sense adequate should not only look at the law as a sua t u device
rules and principles that govern human life in goodness' rakat, but should also
include institutions ( institutions ) and processes ( processes ) needed to bring that law
into reality.7
P The government established its own legal convergence which has 3 types of
thinking, namely:8
a) First thought, that it has become a general understanding that the sovereignty of
the parties involved in a commercial transaction especially with foreign private
parties remains a consideration that causes foreign private parties to submit to a
national law if a choice of law is made in national courts.
6
Dr. Danrivanto Budhijanto, SH, LL.M., FCB. Arb. , Cyber Law 4.0 , (Bandung: Logoz Published, 2019) p.28-29
7
Mochtar Kusumaatmadja, Legal Concepts in Development, Center for the Study of Archipelago Insights, Law and
Development ( Bandung: PT. Alumni, 2006) p. 30
8
Dr. Danrivanto Budhijanto, SH, LL.M., FCB. Arb. , Op.Cit , pp.30-31
b) Second thought, the relationship between the parties and their
sovereignty will still be subject to the application of public international law. It is
no longer a debate that foreigners relating to the sovereignty of a
country will only become the jurisdiction of the international judiciary / tribunal.
c) Third thought, the increasing number of private parties has greatly influenced the
development of the principles in bilateral, regional and multilateral trade
agreements, particularly the principle relating to the limitation of actions /
behavior of foreign parties towards the sovereignty of other countries.
That the spread of crimes committed through social networks cannot be equated with
crime in general. The crime is quite difficult in its settlement stage because the crime of
Information and Electronic Transactions is a modern level crime which is a condition
with the sophistication of a communication system that requires intelligence a set of
technology i. To maximize existing laws continue to run , based strander conduct a da n
law will require two things:9
Legal Principles
9
Jawade Hafidz, Juridical Study in Anticipating Cyber Crimes , Journal of Legal Reform Volume I January 1 - April
2014 , p.35
Conduct Legal Review of National Laws that Are Directly or Indirectly
Related to the Issues Arising from Transaction Development through
Internet-Technology
For example; The Copyright Act, the Trademark Law, the Broadcasting Law are
continuously controlled every time a case is caused by cybercrime. Then protection
against the misuse of the internet and computers requires a review and formation of
modern law. This means that modernizing material law and criminal procedure is
not exclusively prevention based. But the revitalization of modern law is an obligation for
the government. So that protection of victims of cybercrime meets the policy
The formation of the law itself especially cyber law also creates a perception if
foreigners, where in the topics discussed on institutionalization, in this case
Indonesia already has an ID-SIRTII, which is an extension of the Indonesia Security
Incident Response Team on the Internet Infrastructure. The team was assigned by the
Minister of Communication and Information Technology (Kominfo) to help supervise
telecommunications network security based on internet protocols.
The duties and functions of ID-SIRTII include monitoring, early detection, early warning
of threats and disruptions to the network, coordinating with the most important parties at
home and abroad in carrying out the duties of securing telecommunications network
based on internet protocols, operating, maintaining and developing s ystem database
system IDSIRTII, relating to the security of network utilization, provides information on
threats and security problems securing the utilization of telecommunication networks
based on internet protocol, be the contact point with the relevant institutions on security
safeguards utilization of telecommunication networks based on internet protocol and to
design programs work in order Implemen a n work related to safeguarding security
telecommunications network utilization ya ng based on internet protocol.10
10
Article 9 Regulation of the Minister of Communication and Information No. 29 / PER / M.KOMINFO / 12/2010
concerning the second amendment to the Minister of Communication and Information Regulation No. 26 / PER /
M.Kominfo / 5/2007 concerning Safeguarding the Utilization of Internet Protocol Based Telecommunication
Networks
However, the institution has not yet arranged how to follow up and prosecute cyber
crime such as carding, typosite, etc. There only regulates state security, and the
technology is still vulnerable. K ejahatan done through social networks can not be
equated with crime in general. The crime is quite difficult in its settlement stage because
the crime of Information and Electronic Transactions is a modern level crime which is a
condition with the sophistication of a communication system that requires intelligence a
set of technology.
C) Relevant Cases
In the case of dealing with this, the authors take the case of da ri:
Where the culprit was carried out by Steven H eryanti who made the site resemble the
BCA click site and also the official sites which are BCA's official sites. This makes
confusion for customers who want to use e-banking facilities. Luckily, no naskabah was
affected by the bulging site by conducting transactions there. Finally, he himself had
declared to ask for affection and stated he did not take advantage of the "stray" PIN
number of the person on the site.
In the observation of the criminal law expert the suspect may be subject to article 378 of
the Criminal Code related to fraud because according to the expert namely Edmon said
about the clauses of a ruse there but in fact it is not enough to prove the elements. This
created a controversy in which the legal interpretation of the article could have been
carried out because there was an intention and the goods taken could not be proven by
this. Acting that he returns the site to its owner is also assessed by
Edmon that Steven's actions must be very disturbing at the same time violating the
ethics of communication. Moreover, the principle of trust which has been used as
the basis for communicating on the internet.
11
https://www.hukumonline.com/berita/baca/hol2879/itypositei-klikbca-is-fraud-murni/ accessed on 30 March
2020 at 06.41 WIB
Regarding proof which sometimes becomes an obstacle, actually there are laws that
have governed the enactment of electronic data or documents. For example, Law No. 8
of 1987 along with its PP, then regulations in the scope of Customs.
D) Conclusions
Cyber crime in Indonesia is still weak in its handling. Sometimes cyber crime is quite
difficult in legal jurisdiction, namely the activities of the cyber world that are not limited
by its tertiorial, intangible activities, and in positive law it is difficult to find
evidence. However, in breast ng to anticipate cyber-crime law itself is ITE and
Electronic Transaction Law then able to interpret the law enforcement of provisions in
force.
There is also no institution dealing with cyber crime because the Cyber Crime Act does
not yet exist. However, there must be a legal principle, namely cooperation between the
government and the private sector in developing technology and law enforcement,
which currently enforces positive law by interpreting and finding all laws as alternatives
to the oasis of legal vacuum against cyber crime.
BIBLIOGRAPHY
1. Anthony Ogus. 1999.Competition Between National Legal Systems: A
Contribution of Economic Analysis to Comparative Law.Int'l & Comp. LQ405
2. Ralf Michaels. 2006. "Two Paradigm of Jurisdiction on". Michigan Journal of
International Law.
3. Summer Pierre Legrand. 1996. "European Legal System Are Not Converging".
45 Int'l & Comp.
4. Deris Setiawan. 2005. Computer Security Systems. Jakarta: PT E Lex Media
Komputindo, 2005)
5. Pokrol Bung, CyberCrime in http: //www.hukumonline. Com / clinics / details /
cl2824 / criminal-cyber-crime are accessed on Monday, March 30, 2020 at 04.08
WIB
6. Dr. Danrivanto Budhijanto, SH, LL.M., FCB. Arb. 2019. Cyber La w 4.0.
Bandung: Logoz Published.
7. Mochtar Kusumaatmadja. 2006. Legal Concepts in Development, Center for the
Study of Archipelago Insights, Law and Development. Bandung: PT. Alumni.
8. Jawade Hafidz, Juridical Study in Anticipating Cyber Crimes , Journal of Legal
Reform Volume I January 1 - April 2014.
9. Article 9 Regulation of the Minister of Communication and Information No. 29 /
PER / M.KOMINFO / 12/2010 concerning the second amendment to the Minister
of Communication and Information Regulation No. 26 / PER / M.Kominfo / 5/2007
concerning Safeguarding the Utilization of Internet Protocol Based
Telecommunication Networks
10. https://www.hukumonline.com/berita/baca/hol2879/itypositei-klikbca-is-fraud-
murni/ accessed on 30 March 2020 at 06.41 WIB