This document discusses several topics related to cybercrime and electronic information law. It defines animation as recording and playing back still images to create the illusion of movement. It also defines computer animation categories. Cybercrime is defined as criminal activity using computers or networks as tools, targets, or places of crime. The document discusses definitions of cybercrime from several experts and outlines prohibited cybercrime acts covered by Indonesia's Electronic Information and Transaction Law. Finally, it discusses the duty of care concept as it applies to using mediums professionally and competently.
This document discusses several topics related to cybercrime and electronic information law. It defines animation as recording and playing back still images to create the illusion of movement. It also defines computer animation categories. Cybercrime is defined as criminal activity using computers or networks as tools, targets, or places of crime. The document discusses definitions of cybercrime from several experts and outlines prohibited cybercrime acts covered by Indonesia's Electronic Information and Transaction Law. Finally, it discusses the duty of care concept as it applies to using mediums professionally and competently.
This document discusses several topics related to cybercrime and electronic information law. It defines animation as recording and playing back still images to create the illusion of movement. It also defines computer animation categories. Cybercrime is defined as criminal activity using computers or networks as tools, targets, or places of crime. The document discusses definitions of cybercrime from several experts and outlines prohibited cybercrime acts covered by Indonesia's Electronic Information and Transaction Law. Finally, it discusses the duty of care concept as it applies to using mediums professionally and competently.
“Animation is the process of recording and playing back a
sequence of stills to achieve the illusion of continuous motion” (Ibiz Fernandez McGraw-Hill/Osborn, California, 2002). Which means: "Animation is a process of recording and playing back a series of static images to achieve an illusion of movement." Based on the literal meaning, Animation is animating. That is the effort to move something that can not move itself. Broadly speaking, computer animation is divided into two categories, namely: a. Computer Assisted Animation, animation in this category usually refers to a 2-dimensional animation system, which computerizes the traditional animation process that uses hand drawings. Computers are used for coloring, applying virtual cameras and structuring data used in an animation. b. Computer Generated Animation, in this category is usually used for 3D animation with 3D programs [3] such as 3D Studio Max, Maya, Autocad, Blender etc. C. Cyber crime Cyber crimeis a cyber crime cybercrime) is a term that refers to criminal activity with a computer or computer network being a tool, target or place of crime. Included in cybercrimes include online auction fraud, check fraud, credit card/carding fraud, confidence fraud, identity fraud, child pornography, etc. The acceleration of technology is increasingly supra which is the material cause of continuous change in all interactions and activities of the information society. The Internet is a material symbol for the embryo of a global society. The internet makes the world globe, as if it is only as wide as a moringa leaf. The information age is characterized by very high information accessibility. In this era, information is the main commodity that is traded so that various networks and information companies will appear that will trade various network facilities and various information databases about various things that can be accessed by users and customers. In fact, in the case of cybercrime, there is no legal vacuum. This happens when an interpretation method that is known in the science of law is used and this is what law enforcement officials should hold in dealing with new dimensions of actions that have not been specifically regulated in law. In some literature, cybercrime is often identified as a computer crime. Definition of Cybercrime According to Some Experts: Andi Hamzah in his book "Aspects Criminal in Field Computer" (1989) interpret cybercrimeas Crime in the field of computers in general can be interpreted as illegal use of computers. Forester and Morrison define computer crime as: a criminal act in which the computer is used as the primary weapon. Girasa (2002) defines cybercrime as a crime that uses computer technology as the main component. Tavani (2000) provides a more interesting definition of cybercrime, namely: crimes where criminal acts can only be carried out using cyber technology and occur in the cyber world.
D. Constitution of electronic information and transaction
Information Law and Electronic Transactions are
provisions that apply to everyone who carries out legal actions as stipulated in this Law, both within the jurisdiction of Indonesia and outside the jurisdiction of Indonesia, which have legal consequences in the jurisdiction of Indonesia and/ or outside the jurisdiction of Indonesia and detrimental to the interests of Indonesia
In general, the contents of the Electronic Information and
Transaction Law (UUITE) are divided into two major parts, namely regulations regarding information and electronic transactions and regulations concerning prohibited acts. Arrangements regarding information and electronic transactions refer to several international instruments, such as the UNCITRAL Model Law on eCommerce and the UNCITRAL Model Law on eSignature. This section is intended to accommodate the needs of business people on the internet and the general public in order to obtain legal certainty in conducting electronic transactions. Some of the materials regulated include: 1. recognition of electronic information/documents as valid legal evidence (Article 5 & Article 6 of the ITE Law); 2. electronic signature (Article 11 & Article 12 of the ITE Law); 3. implementation of electronic certification (certification authority, Article 13 & Article 14 of the ITE Law); and 4. operation of electronic systems (Article 15 & Article 16 of the ITE Law);
Some material for prohibited acts (cybercrimes) regulated
in the ITE Law, include: 1. Illegal content, which consists of, among other things: decency, gambling, insults/defamation, threats and extortion (Article 27, Article 28 and Article 29 of the ITE Law); 2. illegal access (Article 30); 3. illegal interception (Article 31); 4. data interference (data interference, Article 32 UU ITE); 5. interference with the system (system interference, Article 33 UU ITE); 6. misuse of tools and equipment (misuse of device, [6] Article 34 UU ITE) E. Duty Care Where a person or an institution must be careful careful in using a medium to fulfill professional responsibilities with competence and diligence. This means that