The threat of misuse of personal data in Indonesia is increasing, in particular since the government introduced the electronic identity card (e-KTP) program and plans for the police to use it to build the Indonesian Automatic Fingerprint Identification System (INAFIS). However, the plan was eventually canceled by the police because seen overlapping with the e-KTP program. Then the government records personal data, and the private sector such as banks and telecommunications service providers also records the data. The purpose of this paper is to analyze electronic data protection which has become a Cyber Cream in the current era of globalization as well as What is the review of the criminal policy formulation in the electronic data protectio...
As technology progresses, there are many facilities available online. Developing this technology can...
This research focused on how positive law provides legal protection against the use of personal data...
The development of information technology is like "two sides of the sword," because, on the one hand...
The Digital Economy as a support for economic growth in Indonesia has spread to almost all aspects o...
Searching and seizing voluminous data is a challenge that Indonesian law enforcement authorities sho...
The development of information technology might control the pattern of people's behavior in digital ...
Searching and seizing voluminous data is a challenge that Indonesian law enforcement authorities sho...
Personal data crime is a type of crime that arises due to technological advances. In Indonesia, the...
The problem of this research is the criminal law enforcement policies in prevention efforts of infor...
Abstract: Internet technology-based activities are now no longer a new thing in the information soc...
The development of information technology might control the pattern of people’s behavior in digital ...
The era of rapid technological development has resulted in many changes as well as new problems in s...
Data leakage is one of the high potentials for criminal acts in cyberspace. The Indonesian governmen...
The rapid development of information technology has given birth to a variety of services with a vari...
E-commerce in Indonesia is increasing, especially since the Covid-19 pandemic. Electronic transactio...
As technology progresses, there are many facilities available online. Developing this technology can...
This research focused on how positive law provides legal protection against the use of personal data...
The development of information technology is like "two sides of the sword," because, on the one hand...
The Digital Economy as a support for economic growth in Indonesia has spread to almost all aspects o...
Searching and seizing voluminous data is a challenge that Indonesian law enforcement authorities sho...
The development of information technology might control the pattern of people's behavior in digital ...
Searching and seizing voluminous data is a challenge that Indonesian law enforcement authorities sho...
Personal data crime is a type of crime that arises due to technological advances. In Indonesia, the...
The problem of this research is the criminal law enforcement policies in prevention efforts of infor...
Abstract: Internet technology-based activities are now no longer a new thing in the information soc...
The development of information technology might control the pattern of people’s behavior in digital ...
The era of rapid technological development has resulted in many changes as well as new problems in s...
Data leakage is one of the high potentials for criminal acts in cyberspace. The Indonesian governmen...
The rapid development of information technology has given birth to a variety of services with a vari...
E-commerce in Indonesia is increasing, especially since the Covid-19 pandemic. Electronic transactio...
As technology progresses, there are many facilities available online. Developing this technology can...
This research focused on how positive law provides legal protection against the use of personal data...
The development of information technology is like "two sides of the sword," because, on the one hand...