Efektivitas Kebijakan Perlindungan Data Pribadi di Indonesia: Analisis Hukum Perdata dengan Pendekatan Studi Kasus

Authors

  • Althea Serafim Kriswandaru Program Studi Ilmu Hukum, Universitas Sains dan Teknologi Komputer Semarang
  • Berliant Pratiwi Program Studi Ilmu Hukum, Universitas Sains dan Teknologi Komputer Semarang
  • Suwardi Suwardi Program Studi Kewirausahaan, Universitas Sains dan Teknologi Komputer Semarang

DOI:

https://doi.org/10.51903/hakim.v2i4.2157

Keywords:

Perlindungan Data, Kebijakan Hukum, Pelanggaran Data, Penegakan Hukum

Abstract

The protection of personal data has emerged as a critical concern in the digital era, particularly in Indonesia, where data breaches are increasing at an alarming rate. This study investigates the effectiveness of Indonesia's data protection policies, focusing on the implementation of Law No. 27 of 2022, and identifies the factors affecting its enforcement. Employing a qualitative approach with a case study methodology, the research analyzes three major data breach incidents involving Tokopedia, BRI Life, and BPJS Kesehatan. Data collection methods included in-depth interviews with legal practitioners and document analysis of relevant regulations and reports. The findings reveal significant gaps in the enforcement of Law No. 27 of 2022, including weak sanctions, inadequate oversight mechanisms, and limited public awareness of data privacy rights. Although the law provides a foundational framework, its effectiveness is hindered by insufficient penalties and the absence of an independent supervisory authority. For instance, while Tokopedia implemented policy revisions post-breach, similar incidents remain likely due to inadequate deterrent measures. Comparatively, the European Union's General Data Protection Regulation (GDPR) demonstrates higher effectiveness through stringent sanctions and robust enforcement mechanisms. This study contributes to the discourse on data privacy by highlighting the shortcomings of Indonesia’s current policies and proposing strategic recommendations. These include harmonizing domestic regulations with international standards, strengthening enforcement through independent oversight bodies, and enhancing public education on data privacy rights. By addressing these challenges, Indonesia can establish a more robust data protection framework, fostering trust in its digital ecosystem and ensuring alignment with global practices.

References

Al-Otaibi, A., Bowan, P. A., Abdel Daiem, M. M., Said, N., Ebohon, J. O., Alabdullatief, A., Al-Enazi, E., & Watts, G. (2022). Identifying the Barriers to Sustainable Management of Construction and Demolition Waste in Developed and Developing Countries. Sustainability, 14(13), 7532. https://doi.org/10.3390/su14137532

Aslam, M., Khan Abbasi, M. A., Khalid, T., Shan, R. us, Ullah, S., Ahmad, T., Saeed, S., Alabbad, D. A., & Ahmad, R. (2022). Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance. Sensors, 22(23), 9338. https://doi.org/10.3390/s22239338

Bhatt, S. (2024). Security and Compliance Considerations for Running SAP Systems on AWS. Journal of Sustainable Solutions, 1(4), 72–86. https://doi.org/10.36676/j.sust.sol.v1.i4.36

Carbajo, R., & Cabeza, L. F. (2022). Researchers’ Perspective Within Responsible Implementation with Socio-Technical Approaches. An Example from Solar Energy Research Centre in Chile. Renewable and Sustainable Energy Reviews, 158, 112132. https://doi.org/10.1016/j.rser.2022.112132

Fajardo, & Teresa. (2022). To Criminalise or Not to Criminalise IUU Fishing: The EU’s Choice. Marine Policy, 144, 105212. https://doi.org/10.1016/j.marpol.2022.105212

Ghorashi, S. R., Zia, T., Bewong, M., & Jiang, Y. (2023). An Analytical Review of Industrial Privacy Frameworks and Regulations for Organisational Data Sharing. Applied Sciences, 13(23), 12727. https://doi.org/10.3390/app132312727

Gibson, D., & Harfield, C. (2022). Amplifying Victim Vulnerability: Unanticipated Harm and Consequence in Data Breach Notification Policy. International Review of Victimology, 29(3), 341–365. https://doi.org/10.1177/02697580221107683

Kärner, M. (2022). Interplay between European Union criminal law and administrative sanctions: Constituent elements of transposing punitive administrative sanctions into national law. New Journal of European Criminal Law, 13(1), 42–68. https://doi.org/10.1177/20322844221085918

Lintvedt, M. N. (2022). Putting a Price on Data Protection Infringement. International Data Privacy Law, 12(1), 1–15. https://doi.org/10.1093/idpl/ipab024

Marín-González, F., Moganadas, S. R., Paredes-Chacín, A. J., Yeo, S. F., & Subramaniam, S. (2022). Sustainable Local Development: Consolidated Framework for Cross-Sectoral Cooperation via a Systematic Approach. Sustainability, 14(11), 6601. https://doi.org/10.3390/su14116601/s1

Neta, Y., Awanisa, A., & Melisa, M. (2022). The Urgency of Establishing Independent Supervisory Authority for Personal Data Protection in Indonesia. Constitutionale, 3(1), 19–38. https://doi.org/10.25041/constitutionale.v3i1.2535

Oguejiofor, B. B., Omotosho, A., Abioye, K. M., Alabi, A. M., Oguntoyinbo, F. N., Daraojimba, A. I., & Daraojimba, C. (2023). A Review on Data-Driven Regulatory Compliance in Nigeria. International Journal of Applied Research in Social Sciences, 5(8), 231–243. https://doi.org/10.51594/ijarss.v5i8.571

Olukoya, O. (2022). Assessing Frameworks for Eliciting Privacy & Security Requirements from Laws and Regulations. Computers & Security, 117, 102697. https://doi.org/10.1016/j.cose.2022.102697

Panahi Rizi, M. H., & Hosseini Seno, S. A. (2022). A Systematic Review of Technologies and Solutions to Improve Security and Privacy Protection of Citizens in the Smart City. Internet of Things, 20, 100584. https://doi.org/10.1016/j.iot.2022.100584

Quy Nguyen-Phuoc, D., Xuan Mai, N., Kim, I., & Oviedo-Trespalacios, O. (2024). Questioning Penalties and Road Safety Policies: Are They Enough to Deter Risky Motorcyclist Behavior? Accident Analysis & Prevention, 207, 107756. https://doi.org/10.1016/j.aap.2024.107756

Reis, O., Eneh, N. E., Ehimuan, B., Anyanwu, A., Olorunsogo, T., & Abrahams, T. O. (2024). Privacy Law Challenges in the Digital Age: A Global Review of Legislation and Enforcement. International Journal of Applied Research in Social Sciences, 6(1), 73–88. https://doi.org/10.51594/ijarss.v6i1.733

Ruohonen, J., & Hjerppe, K. (2022). The GDPR Enforcement Fines at Glance. Information Systems, 106, 101876. https://doi.org/10.1016/j.is.2021.101876

Shin, D., Kee, K. F., & Shin, E. Y. (2022). Algorithm Awareness: Why User Awareness is Critical for Personal Privacy in the Adoption of Algorithmic Platforms? International Journal of Information Management, 65, 102494. https://doi.org/10.1016/j.ijinfomgt.2022.102494

Sudarwanto, A. S., & Kharisma, D. B. B. (2022). Comparative Study of Personal Data Protection Regulations in Indonesia, Hong Kong and Malaysia. Journal of Financial Crime, 29(4), 1443–1457. https://doi.org/10.1108/jfc-09-2021-0193

Susha, I., Rukanova, B., Zuiderwijk, A., Gil-Garcia, J. R., & Gasco Hernandez, M. (2023). Achieving Voluntary Data Sharing in Cross Sector Partnerships: Three Partnership Models. Information and Organization, 33(1), 100448. https://doi.org/10.1016/j.infoandorg.2023.100448

Taherdoost, H. (2022). Understanding Cybersecurity Frameworks and Information Security Standards-A Review and Comprehensive Overview. Electronics, 11(14), 2181. https://doi.org/10.3390/electronics11142181

Thomas, L., Gondal, I., Oseni, T., & (Sally) Firmin, S. (2022). A Framework for Data Privacy and Security Accountability in Data Breach Communications. Computers & Security, 116, 102657. https://doi.org/10.1016/j.cose.2022.102657

Von Grafenstein, M., Jakobi, T., & Stevens, G. (2022). Effective Data Protection by Design Through Interdisciplinary Research Methods: The Example of Effective Purpose Specification by Applying User-Centred Ux-Design Methods. Computer Law & Security Review, 46, 105722. https://doi.org/10.1016/j.clsr.2022.105722

Wang, X., Wu, Y. C., Zhou, M., & Fu, H. (2024). Beyond Surveillance: Privacy, Ethics, and Regulations in Face Recognition Technology. Frontiers in Big Data, 7, 1337465. https://doi.org/10.3389/fdata.2024.1337465

Wen, Y., & Holweg, M. (2024). A Phenomenological Perspective on AI Ethical Failures: The Case of Facial Recognition Technology. AI and Society, 39(4), 1929–1946. https://doi.org/10.1007/s00146-023-01648-7

Wylde, V., Rawindaran, N., Lawrence, J., Balasubramanian, R., Prakash, E., Jayal, A., Khan, I., Hewage, C., & Platts, J. (2022). Cybersecurity, Data Privacy and Blockchain: A Review. SN Computer Science, 3(2), 1–12. https://doi.org/10.1007/s42979-022-01020-4

Xia, L., Semirumi, D. T., & Rezaei, R. (2023). A Thorough Examination of Smart City Applications: Exploring Challenges and Solutions Throughout the Life Cycle with Emphasis on Safeguarding Citizen Privacy. Sustainable Cities and Society, 98, 104771. https://doi.org/10.1016/j.scs.2023.104771

Published

2024-11-25

How to Cite

Kriswandaru, A. S., Pratiwi, B., & Suwardi, S. (2024). Efektivitas Kebijakan Perlindungan Data Pribadi di Indonesia: Analisis Hukum Perdata dengan Pendekatan Studi Kasus. Hakim: Jurnal Ilmu Hukum Dan Sosial, 2(4), 740–756. https://doi.org/10.51903/hakim.v2i4.2157