Strengthening Legal Protection of Personal Data through Technical Protection Regulation in Line with Human Rights
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32794
Strengthening Legal Protection of Personal Data through Technical Protection Regulation in Line with Human Rights

Authors: Tomy Prihananto, Damar Apri Sudarmadi

Abstract:

Indonesia recognizes the right to privacy as a human right. Indonesia provides legal protection against data management activities because the protection of personal data is a part of human rights. This paper aims to describe the arrangement of data management and data management in Indonesia. This paper is a descriptive research with qualitative approach and collecting data from literature study. Results of this paper are comprehensive arrangement of data that have been set up as a technical requirement of data protection by encryption methods. Arrangements on encryption and protection of personal data are mutually reinforcing arrangements in the protection of personal data. Indonesia has two important and immediately enacted laws that provide protection for the privacy of information that is part of human rights.

Keywords: Indonesia, protection, personal data, privacy, human rights, encryption.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1474387

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 914

References:


[1] Badan Pembinaan Hukum Nasional (BPHN), Naskah Akademik Perlindungan Data Pribadi, Jakarta: BPHN, p. 152, 29, 31, 153, 132.
[2] Indonesia, Undang-Undang Nomor 14 Tahun 2008 tentang Keterbukaan Informasi Publik.
[3] Indonesia, Undang-Undang Nomor 24 Tahun 2013 tentang Perubahan Atas Undang-Undang Nomor 23 Tahun 2006 Tentang Administrasi Kependudukan.
[4] Indonesia, Undang-Undang Nomor 36 Tahun 2009 tentang Kesehatan.
[5] Indonesia, Peraturan Menteri Komunikasi dan Informatika Nomor 12 Tahun 2006 tentang Registrasi Pelanggan Jasa Telekomunikasi, Article 3, 17.
[6] Indonesia, Peraturan Menteri Komunikasi dan Informatika Nomor 20 Tahun 2016 tentang Perlindungan Data Pribadi dalam Sistem Elektronik.
[7] Nelayan-Nelayan Filipina Pencuri Ikan Punya KTP Indonesia, http://regional.liputan6.com/read/2631201/nelayan-nelayan-filipina-pencuri-ikan-punya-ktp-indonesia, accessed on 23th March 2018.
[8] Susi Sebut KTP Palsu ABK Filipina Berasal dari Indonesia Timur, https://www.merdeka.com/uang/susi-sebut-ktp-palsu-abk-filipina-berasal-dari-indonesia-timur.html, accessed on 23th March 2018.
[9] Bruce Schneier, Applied cryptography (2nd ed.): Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc.: 1995, p. 1, 2.
[10] Magdalena Musial-Karg, The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security, World Academy of Science, Engineering and Technology, International Journal of Law and Political Sciences Vol 11 No 9 2017.
[11] Amnesty International, Encryption: A Matter of Human Rights, https://www.amnestyusa.org/files/encryption_-_a_matter_of_human_rights_-_pol_40-3682-2016.pdf, p. 6-7, accessed on 26th March 2018.
[12] The Law Library of Congress, Government Access to Encrypted Communications, https://www.loc.gov/law/help/encrypted-communications/gov-access.pdf, p. 40, accessed on 26th March 2018.
[13] United States of America, The Security and Freedom Through Encryption Act.
[14] Program Legislasi Nasional 2015-2019, http://www.dpr.go.id/uu/prolegnas-long-list, accessed on 26th March 2018.
[15] Indonesia, Undang-Undang Nomor 12 Tahun 2011 tentang Pembentukan Peraturan Perundang-Undangan.
[16] Badan Pembinaan Hukum Nasional (BPHN), Naskah Akademik Persandian, Jakarta: BPHN, p. 31-32, 112, 107-108.