Cybercrime in indonesia

National cyber and encryption agency indonesia

Data security and breach notification Security obligations Are there specific security obligations that must be complied with? One example where consent is not required is when the personal data is collected as part of a legitimate request from an authorised authority for law enforcement purposes. A broad interpretation of this provision implies that an electronic system provider must convey the collection purpose to the personal data owner at the time of collection. Once the personal data is transferred, the receiving party will become an electronic system provider and will therefore be subject to the requirements set out in the Law Concerning Electronic Information Technology and the Government Regulation Concerning Electronic Systems and Transaction Providers. Section 4. Cookies Are there rules governing the use of cookies? There are no limitations on the collection, storage and processing of personal data, as long as proper consent from the personal data owner has been obtained beforehand. Legal framework Legislation What legislation governs the collection, storage and use of personal data? In addition, the Law Concerning Electronic Information Technology applies to every person who resides within Indonesian jurisdiction and conducts the activities regulated by the law. The obligation to register applies only to public service electronic system providers. The following activities are criminalised in the Indonesian jurisdiction: the distribution or transmission of electronic material that involves: pornography or child pornography;. Is there a requirement to appoint a data protection officer? The police have decided to deploy more personnel to investigate citizens who are suspecting of violating the controversial Electronic Information Transactions ITE Law, including its draconian articles on defamation and hate speech. Scope and jurisdiction Who falls within the scope of the legislation?

What are the other significant regulatory considerations regarding cybersecurity in your jurisdiction including any international standards that have been adopted?

The police have decided to deploy more personnel to investigate citizens who are suspecting of violating the controversial Electronic Information Transactions ITE Law, including its draconian articles on defamation and hate speech.

bssn indonesia

There are no limitations on the collection, storage and processing of personal data, as long as proper consent from the personal data owner has been obtained beforehand.

The following activities are criminalised in the Indonesian jurisdiction: the distribution or transmission of electronic material that involves: pornography or child pornography.

If consent is not provided, are there other circumstances in which data processing is permitted?

Cybercrime in indonesia

In general, provisions regarding cybercrime and cybersecurity are regulated by the Law Concerning Electronic Information Technology and the Government Regulation Concerning Electronic Systems and Transaction Providers. Are there any limitations or restrictions on the period for which an organisation may or must retain records? Enforcement Which body is responsible for enforcing data protection legislation and what are its powers? There is no express provision that confers on an individual the right to delete his or her personal data. Is information regarding registered data owners publicly available? Do individuals have a right to access personal information about them that is held by an organisation? It has the authority to impose administrative penalties on electronic service providers that fail to comply with the Government Regulation Concerning Electronic Systems and Transaction Providers. Under the Law Concerning Electronic Information Technology, anyone may file a civil claim against a party that operates an electronic system or uses information technology that causes damages. There are no limitations on the collection, storage and processing of personal data, as long as proper consent from the personal data owner has been obtained beforehand. The government is preparing the Draft Law on Personal Data Protection and the Draft Regulation on the Protection of Personal Data in the Electronic System, both of which are expected to be enacted within the next two years. The Ministry of Communication and Information is responsible for the enforcement of data protection matters. Cookies Are there rules governing the use of cookies?

Enforcement Which body is responsible for enforcing data protection legislation and what are its powers? Are there restrictions on the geographic transfer of data? Data transfer and third parties Cross-border data transfer What rules govern the transfer of data outside your jurisdiction?

Which cyber activities are criminalised in your jurisdiction? Under the Law Concerning Electronic Information Technology, anyone may file a civil claim against a party that operates an electronic system or uses information technology that causes damages.

Specifically for personal data, consent from the personal data owner must be obtained before the data transfer. The Law Concerning Electronic Information Technology and the Government Regulation Concerning Electronic Systems and Transaction Providers apply to electronic system providers that collect, process and store electronic information and personal data in an electronic system.

Unsolicited electronic marketing is regulated by Section 4. Martinus Sitompul, said. The Ministry of Communication and Information is responsible for the enforcement of data protection matters.

Rated 9/10 based on 83 review
Download
Our cyber operations