Preview

Cybercrime in Indonesia

Powerful Essays
Open Document
Open Document
1297 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cybercrime in Indonesia
Even if Indonesia has not ratified or signed the Convention on Cybercrime yet, officially Indonesia has implemented almost all cyber crime provisions set forth in the Convention. These provisions are set out in several articles in Law No. 11 Year 2008 on Information and Electronic Transaction. The seven provisions, among others; offense related to child pornography, illegal access, illegal interception, data interference, system interference, misuse of devices, and computer related forgery. The provisions of computer-related fraud and attempt and aiding or abetting are no longer regulated under this Act due consideration has been accommodated by the existing provisions in the Penal Code. Likewise, some offenses related to infringements of copyright and related rights are deemed to have been sufficiently set forth in the Law on Intellectual Property Rights.

In addition to the above provisions, the Law No.11/2008 is the merely cybercrime statute in Indonesia, which also includes provisions on e-commerce and e-signature referring to the UNCITRAL Model Law and the EU Directives on such subjects. This is by virtue of the awareness of regulator about inevitable legal convergence of telecommunications, media, and informatics. By means of the principle of neutrality and efficiency, this product of law will be able to encompass the three specialties.

Moreover, hacking, according to BATAN is defined as ‘infiltrating or breaching activities into an electronic system without rights, which usually aim to misuse or damage the system.’ Identical definition of hacking is also proposed by David S. Wall which is ‘deliberate unauthorized access to spaces over which rights of ownership or access have already been established.’ Therefore, hacking can be incorporated into illegal access provisions. In the Article 30, there are three paragraphs that organize illegal access, inter alia; 1. ‘Setiap Orang dengan sengaja dan tanpa hak atau melawan hukum mengakses Komputer dan/atau

You May Also Find These Documents Helpful

  • Better Essays

    Copyright Laws

    • 2082 Words
    • 9 Pages

    Computer programs and cyber space usage has become a major part of our every day lives. Nearly everyone has to use a computer at some point, and for some it may be an all day every day affair. This being the case, every one should be aware of the laws and boundaries of cyber space usage, copyright infringement on shareware, freeware, and computer software programs. Most of the main legal issues that relate to cyberspace can be listed as: tort issues, contract issues, intellectual property issues, criminal law issues, and constitutional restraint and protections, and securities law issues.…

    • 2082 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computers have become a big part of our lives. They are being used more and more and the Internet has brought with it a big amount of computer criminals. In 1988, Victoria created the first Australian computer crime laws.…

    • 1206 Words
    • 5 Pages
    Good Essays
  • Good Essays

    This act made computer hacking a crime that is punishable by the federal law. This can result in time in prison.…

    • 527 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Regulation of Internet

    • 680 Words
    • 3 Pages

    The usage of computer, internet, smart phones and other related devices are now an integral part of our daily lives. With the exponential raise in technology, there is also a corresponding rise in Crimes specific to new technologies. The laws prevailing till 1999 proved to be inadequate to address the growing threat of the new realm of crimes in cyber space. Therefore, the Information Technology Act, 2000 came to be enacted. This Act was further amended in 2008.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Anyone who knowingly hacks into a computer with intent to steal information is going against this act. Anyone who misuses the computer in this way is going against the law as they are using it for criminal acts.…

    • 1633 Words
    • 7 Pages
    Good Essays
  • Good Essays

    The computer misuse act states that hacking via computers is illegal as well as sharing the information gained.…

    • 687 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The Internet is a system of interconnected networks able to continually amplify its range of sites surpassing its predecessor, the ARPANET (Advanced Research Projects Agency) which was developed by the American military in the 60’s (Abbate, 2000). It has progressed, with the social and economic aspect of its use becoming complex, with illegal activities reaching even the depths of cyberspace – “cybercrime” and the culprits, the “cybercriminals”, have appeared.…

    • 1677 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    The unlawful acts committed by an individual or a group using computers as a tool and cyberspace as a medium is known as cyber torts.Internet provides a reasonable amount for criminal enterprises. The various acts and laws passed by Indian government has thrown light on the advancement and progress of cyber technology.…

    • 679 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A hacker is a person who breaks into computers, but does no harm, usually for fun or just the challenge. The subculture that has evolved around hackers is often referred to as the computer underground but is now an open community. Hackers are people who are motivated by curiosity and adventurer's spirit. This adventurer's spirit usually leads them to plan and execute such acts which involve breaking into and stealing information from other's…

    • 766 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Essay on Rizal's Reforms

    • 266 Words
    • 2 Pages

    This topic relates as much in the present because of the anti-cybercrime law that the government made. It is now on hold because there were many who opposed in implementing this law. The main reason in opposing the said law is the freedom of speech and expression and the freedom of press which is also in conflict with another existing law.…

    • 266 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Internet has now become integrated in human society and the range of Internet applications have broadened and the users have become more sophisticated. With the broaden appeal of the internet greater risk has followed. These risks have led to the introduction of cyber-crime and the copyright infringement issues that plaque many businesses. Many argued that the absence of global legislation was turning the cyberspace into a place where there would be increasing worries and dangers. The legal system of today has had challenges in keeping pace with the growth of the Internet and its impact it’s had on business on the Internet. The expectation of most was that there was a need for the cyber-laws to govern the new virtual world. The aim of the cyber laws is to work in concert with the existing laws and to lessen the legal issues in the future. One notable legal issue is the ownership of information or the legal protection of the data. The illicit use of copyright material is common place on the internet as well as the spread of false and malicious information.…

    • 701 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The free flow of information, which nowadays depends heavily on the information and communication technology (ICT), promotes economic and social development. There are both uses and abuses of the ICT. Everybody feels the necessity of a guideline and related laws for prevention of ICT-related crimes.…

    • 1811 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Blue Dart Courier Ppt

    • 1727 Words
    • 7 Pages

    Offences under IT Act 65 Tampering with computer source documents Hacking computer systems Loss/damage to computer resource/utility Hacking Obscene publication/transmission in electronic form Failure of compliance/orders of Certifying Authority Failure to assist to decoy the information in interception by Govt. Agency Unauthorized access/attempt to access protected Computer System Obtaining license or Digital Signatures my misrepresentation/suppression of facts Publishing false digital signature certificate Fraud Digital Signature Breach of Confidentiality 30 46 99 2 2 4 11 0 3 9 217 25 23 86 1 0 0 11 0 3 3 154 11 2…

    • 1727 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    cybercrime

    • 889 Words
    • 4 Pages

    The Cybercrime law Act of 2012 is the first law in the Philippines which specifically criminalizes computer crime. The Act, criminalizes several types of offenses including illegal access (hacking), data interference, device misuse, cybersquatting, computer-related offenses such as computer fraud, content-related offenses such as cybersex and spam, and other offenses. The law also reaffirms existing laws against child pornography, an offense under Republic Act No. 9779, and libel, an offense under Section 355 of the Reversed Penal Code of the Philippines, also criminalizing them when committed using a coputer system. Finally, the Act provides for a "catch-all" clause, wherein all offenses currently punishable under the Reversed Penal Code are likewise punishable under the Act when committed using a computer, which corresponding stricter penalties then if the crimes were punishable under Reversed Penal Code alone.…

    • 889 Words
    • 4 Pages
    Good Essays