The document discusses cybercrime laws and challenges in Indonesia. It outlines several key cybercrime laws, including laws regarding electronic information and transactions, telecommunications, data privacy protection, and the criminal code. It also provides examples of how these laws have been applied, such as in cases of defamation and illegal access. However, the document notes there are still many challenges around cybercrime in Indonesia, such as a lack of regulations, low cybersecurity awareness, insufficient budgets, talent shortages, weak law enforcement, and limited research support.
The document discusses cybercrime laws and challenges in Indonesia. It outlines several key cybercrime laws, including laws regarding electronic information and transactions, telecommunications, data privacy protection, and the criminal code. It also provides examples of how these laws have been applied, such as in cases of defamation and illegal access. However, the document notes there are still many challenges around cybercrime in Indonesia, such as a lack of regulations, low cybersecurity awareness, insufficient budgets, talent shortages, weak law enforcement, and limited research support.
The document discusses cybercrime laws and challenges in Indonesia. It outlines several key cybercrime laws, including laws regarding electronic information and transactions, telecommunications, data privacy protection, and the criminal code. It also provides examples of how these laws have been applied, such as in cases of defamation and illegal access. However, the document notes there are still many challenges around cybercrime in Indonesia, such as a lack of regulations, low cybersecurity awareness, insufficient budgets, talent shortages, weak law enforcement, and limited research support.
challenges Awaludin Marwan, PhD Lecturer at Bhayangkara Jakarta Law School Global Security Index Structure of cybercrime law in Indonesia Law No. 27 of 2022 Law No. 1 of 2024 Law No. 36 of 1999 Law No. 11 of 2019 concerning data privacy concerning Electronic concerning concerning science and information and transaction technology protection telecommunication • Cyberporn (Article 27 • Foreigners conduct a • Collecting without • Telecommunication research without permit consent (Article 67) (1)); without business license (Article 93) • Online gambling (Article • Forgery of privacy data (Article 47); • Transferring specimen (Article 68) 27 (2)); without permit (Article • Defamation (Article 27 • Not providing free option 94) A); for users (Article 48); • High risk research Law No. 1 of 2023 • Extortion (Article 27B & • Not providing security without permit (Article concerning criminal code Article 29); system for government 95) Law No. 27 of 2022 • Racism (Article 243 • Fake news related to (Article 49); concerning data privacy consumer (Article 28 (1)); • Illegal access (Article 50); protection • Extorsion (Article 300/ 301) • Hacking (Article 30-34) • Confidentiality for a • Collecting without consent (Article 67) • Illegal access special telecommunication government information (Article 51) • Forgery of privacy data (article 335) (Article 68) • Computer crime (article 333-335) Invalid defamation Saiful Mahdi had criticized the university and proceeded under defamation suspicion in regards with electronic information and transaction. Despite his critique as part of academic freedom, he was arrested and punished for a couple months before he obtained amnesty. Illegal access by young hacker Mr Cakil was punished due to his action in defacing the website and sold backdoor to be used for deployment the link of online gambling From street hacker becomes IT Sec Professional
Arik Alfiki Putra Adhari
IT Sec Professional at Fintech Company Founder dan CEO SiberTren Challenges • The lack of cyber regulation; • Insufficiency cyber hygiene awareness; • Less budget for preventing and combating cybercrime: • The lack of cyber and security talent; • The absence of digital leadership; • The deficit of law enforcement; • The absence of societal participation; • The deficiency of research support and link-match between academia and industries;