Tanggung Jawab Hukum Perusahaan Teknologi Atas Penyalahgunaan Data Pengguna : Studi Kasus Di ASEAN
DOI:
https://doi.org/10.51903/jaksa.v2i4.2268Keywords:
Personal Data Protection Law, Big Data, public awareness, data protection policyAbstract
This study examines the legal responsibility of technology companies in protecting user data in the ASEAN region amidst the increasing risks of data misuse in the digital era. The research adopts a qualitative approach, analyzing existing data protection regulations in Indonesia, Malaysia, and Hong Kong, and compares these to the General Data Protection Regulation (GDPR) in the European Union. The findings reveal significant regulatory disparities within ASEAN, with countries facing challenges in enforcement and public awareness regarding data privacy. Case studies of data breaches highlight the need for stronger security measures and transparency from technology companies to protect user data. Additionally, this study underscores the importance of regional collaboration among ASEAN countries to establish harmonized and effective data protection standards that align with global best practices. Strengthening data protection regulations and enforcement mechanisms can foster a safer digital environment, promoting user trust and supporting sustainable digital economic growth in the region.
References
A Bimantara. (2022). The Normative Enactment of International Cybersecurity Capacity Building Assistance: A Comparative Analysis on Japanese and South Korean Practices. Global: Jurnal Politik Internasional, 24(1). https://doi.org/10.7454/global.v24i1.684
Alibeigi, A., Munir, A. B., & Asemi, A. (2022). A decade after the Personal Data Protection Act 2010 (PDPA): Compliance of communications companies with the notice and choice principle. Journal of Data Protection and Privacy, 5(2), 119–137. https://doi.org/10.69554/yqug8122
Andrew, J., Baker, M., & Huang, C. (2023). Data breaches in the age of surveillance capitalism: Do disclosures have a new role to play? Critical Perspectives on Accounting, 90. https://doi.org/10.1016/j.cpa.2021.102396
Asgarinia, H., Chomczyk Penedo, A., Esteves, B., & Lewis, D. (2023). “Who Should I Trust with My Data?” Ethical and Legal Challenges for Innovation in New Decentralized Data Management Technologies. Information (Switzerland), 14(7). https://doi.org/10.3390/info14070351
Beccia, F., Rossi, M. F., Amantea, C., Villani, L., Daniele, A., Tumminello, A., Aristei, L., Santoro, P. E., Borrelli, I., Ricciardi, W., Gualano, M. R., & Moscato, U. (2022). COVID-19 Vaccination and Medical Liability: An International Perspective in 18 Countries. Vaccines, 10(8). https://doi.org/10.3390/vaccines10081275
Bentotahewa, V., Hewage, C., & Williams, J. (2022). The Normative Power of the GDPR: A Case Study of Data Protection Laws of South Asian Countries. SN Computer Science, 3(3). https://doi.org/10.1007/s42979-022-01079-z
Calzada, I. (2022). Citizens’ Data Privacy in China: The State of the Art of the Personal Information Protection Law (PIPL). Smart Cities, 5(3), 1129–1150. https://doi.org/10.3390/smartcities5030057
Chen, X., & Yang, Y. (2022). Different Shades of Norms: Comparing the Approaches of the EU and ASEAN to Cyber Governance. International Spectator, 57(3), 48–65. https://doi.org/10.1080/03932729.2022.2066841
Cheryl, B. K., & Ng, B. K. (2022). Protecting the Unprotected Consumer Data in Internet of Things: Current Scenario of Data Governance in Malaysia. Sustainability (Switzerland), 14(16). https://doi.org/10.3390/su14169893
Curtis, H., Hogeveen, B., Kang, J., Le Thu, H., Rajagopalan, R. P., & Ray, T. (2022). Digital Southeast Asia. In Australian Strategic … (Issue 57). www.aspi.org.au
Dehbi, F., & Martin-Ortega, O. (2023). An integrated approach to corporate due diligence from a human rights, environmental, and TWAIL perspective. Regulation and Governance, 17(4), 927–943. https://doi.org/10.1111/rego.12538
Fiero, A. W., & Beier, E. (2022). New Global Developments in Data Protection and Privacy Regulations: Comparative Analysis of European Union, United States, and Russian Legislation. Stanford Journal of International Law. Summer2022, 58(2), 151–192. https://web.s.ebscohost.com/ehost/detail/detail?vid=43&sid=84cbea20-4a76-4b13-8276-f7e1c6d77d8c%40redis&bdata=JkF1dGhUeXBlPXNzbyZzY29wZT1zaXRl#AN=158842953&db=a9h
Ismagilova, E., Hughes, L., Rana, N. P., & Dwivedi, Y. K. (2022). Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework. Information Systems Frontiers, 24(2), 393–414. https://doi.org/10.1007/s10796-020-10044-1
Justine Chilenovu Ogborigbo, Odunayo Sekinat Sobowale, Emmanuel Iyere Amienwalen, Yemisi Owoade, Adeyemo Taiwo Samson, & Joshua Egerson. (2024). Strategic integration of cyber security in business intelligence systems for data protection and competitive advantage. World Journal of Advanced Research and Reviews, 23(1), 081–096. https://doi.org/10.30574/wjarr.2024.23.1.1900
Metcalf, K. N., & Papageorgiou, I. F. (2022). Increasing Trust in the Digital Market Through Regional Rules: the Case of Asia. Asia Pacific Journal on Human Rights and the Law, 23(2), 245–279. https://doi.org/10.1163/15718158-23020004
Morgan, P. J. (2022). Fintech and Financial Inclusion in Southeast Asia and India. Asian Economic Policy Review, 17(2), 183–208. https://doi.org/10.1111/aepr.12379
Nampewo, Z., Mike, J. H., & Wolff, J. (2022). Respecting, protecting and fulfilling the human right to health. International Journal for Equity in Health, 21(1). https://doi.org/10.1186/s12939-022-01634-3
Nguyen, M. T., & Tran, M. Q. (2019). Balancing Security and Privacy in the Digital Age: An In-Depth Analysis of Legal and Regulatory Frameworks Impacting Cybersecurity Practices. International Journal of Intelligent Automation and Computing.
Okorie, G. N., Egieya, Z. E., Ikwue, U., Udeh, C. A., Adaga, E. M., DaraOjimba, O. D., & Oriekhoe, O. I. (2024). Leveraging big data for personalized marketing campaigns: a review. International Journal of Management & Entrepreneurship Research, 6(1), 216–242.
Omotunde, H., & Ahmed, M. (2023). A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond. Mesopotamian Journal of CyberSecurity, 2023, 115–133. https://doi.org/10.58496/MJCS/2023/016
Paramesha, M., Rane, N., & Rane, J. (2024). Big data analytics, artificial intelligence, machine learning, internet of things, and blockchain for enhanced business intelligence. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.4855856
Pyrrho, M., Cambraia, L., & de Vasconcelos, V. F. (2022). Privacy and Health Practices in the Digital Age. American Journal of Bioethics, 22(7), 50–59. https://doi.org/10.1080/15265161.2022.2040648
Radanliev, P. (2024). Cyber diplomacy: defining the opportunities for cybersecurity and risks from Artificial Intelligence, IoT, Blockchains, and Quantum Computing. Journal of Cyber Security Technology, 1–51. https://doi.org/10.1080/23742917.2024.2312671
Santoso, J. T., Raharjo, B., & Wibowo, A. (2024). Combination of Alphanumeric Password and Graphic Authentication for Cyber Security. Journal of Internet Services and Information Security, 14(1), 16–36. https://doi.org/10.58346/JISIS.2024.I1.002
Seun Solomon Bakare, Adekunle Oyeyemi Adeniyi, Chidiogo Uzoamaka Akpuokwe, & Nkechi Emmanuella Eneh. (2024). Data Privacy Laws and Compliance: a Comparative Review of the Eu Gdpr and Usa Regulations. Computer Science & IT Research Journal, 5(3), 528–543. https://doi.org/10.51594/csitrj.v5i3.859
Shahid, J., Ahmad, R., Kiani, A. K., Ahmad, T., Saeed, S., & Almuhaideb, A. M. (2022). Data Protection and Privacy of the Internet of Healthcare Things (IoHTs). Applied Sciences (Switzerland), 12(4). https://doi.org/10.3390/app12041927
Sheng, N., Yang, C., Han, L., & Jou, M. (2023). Too much overload and concerns: Antecedents of social media fatigue and the mediating role of emotional exhaustion. Computers in Human Behavior, 139. https://doi.org/10.1016/j.chb.2022.107500
Sudarwanto, A. S., & Kharisma, D. B. B. (2022). Comparative study of personal data protection regulations in Indonesia, Hong Kong and Malaysia. Journal of Financial Crime, 29(4), 1443–1457. https://doi.org/10.1108/JFC-09-2021-0193
Widiatedja, I. G. N. P., & Mishra, N. (2023). Establishing an independent data protection authority in Indonesia: a future–forward perspective. International Review of Law, Computers and Technology, 37(3), 252–273. https://doi.org/10.1080/13600869.2022.2155793
Wylde, V., Rawindaran, N., Lawrence, J., Balasubramanian, R., Prakash, E., Jayal, A., Khan, I., Hewage, C., & Platts, J. (2022). Cybersecurity, Data Privacy and Blockchain: A Review. SN Computer Science, 3(2). https://doi.org/10.1007/s42979-022-01020-4
Zhu, F. B., & Song, Z. (2022). Systematic Regulation of Personal Information Rights in the Era of Big Data. SAGE Open, 12(1). https://doi.org/10.1177/21582440211067529