Tanggung Jawab Hukum Perusahaan Teknologi Atas Penyalahgunaan Data Pengguna : Studi Kasus Di ASEAN

Authors

  • Maulana Fahmi Idris Universitas Sains dan Teknologi Komputer
  • Joni Laksito Universitas Sains dan Teknologi Komputer
  • Widya Ariyani

DOI:

https://doi.org/10.51903/jaksa.v2i4.2268

Keywords:

Personal Data Protection Law, Big Data, public awareness, data protection policy

Abstract

This study examines the legal responsibility of technology companies in protecting user data in the ASEAN region amidst the increasing risks of data misuse in the digital era. The research adopts a qualitative approach, analyzing existing data protection regulations in Indonesia, Malaysia, and Hong Kong, and compares these to the General Data Protection Regulation (GDPR) in the European Union. The findings reveal significant regulatory disparities within ASEAN, with countries facing challenges in enforcement and public awareness regarding data privacy. Case studies of data breaches highlight the need for stronger security measures and transparency from technology companies to protect user data. Additionally, this study underscores the importance of regional collaboration among ASEAN countries to establish harmonized and effective data protection standards that align with global best practices. Strengthening data protection regulations and enforcement mechanisms can foster a safer digital environment, promoting user trust and supporting sustainable digital economic growth in the region.

References

A Bimantara. (2022). The Normative Enactment of International Cybersecurity Capacity Building Assistance: A Comparative Analysis on Japanese and South Korean Practices. Global: Jurnal Politik Internasional, 24(1). https://doi.org/10.7454/global.v24i1.684

Alibeigi, A., Munir, A. B., & Asemi, A. (2022). A decade after the Personal Data Protection Act 2010 (PDPA): Compliance of communications companies with the notice and choice principle. Journal of Data Protection and Privacy, 5(2), 119–137. https://doi.org/10.69554/yqug8122

Andrew, J., Baker, M., & Huang, C. (2023). Data breaches in the age of surveillance capitalism: Do disclosures have a new role to play? Critical Perspectives on Accounting, 90. https://doi.org/10.1016/j.cpa.2021.102396

Asgarinia, H., Chomczyk Penedo, A., Esteves, B., & Lewis, D. (2023). “Who Should I Trust with My Data?” Ethical and Legal Challenges for Innovation in New Decentralized Data Management Technologies. Information (Switzerland), 14(7). https://doi.org/10.3390/info14070351

Beccia, F., Rossi, M. F., Amantea, C., Villani, L., Daniele, A., Tumminello, A., Aristei, L., Santoro, P. E., Borrelli, I., Ricciardi, W., Gualano, M. R., & Moscato, U. (2022). COVID-19 Vaccination and Medical Liability: An International Perspective in 18 Countries. Vaccines, 10(8). https://doi.org/10.3390/vaccines10081275

Bentotahewa, V., Hewage, C., & Williams, J. (2022). The Normative Power of the GDPR: A Case Study of Data Protection Laws of South Asian Countries. SN Computer Science, 3(3). https://doi.org/10.1007/s42979-022-01079-z

Calzada, I. (2022). Citizens’ Data Privacy in China: The State of the Art of the Personal Information Protection Law (PIPL). Smart Cities, 5(3), 1129–1150. https://doi.org/10.3390/smartcities5030057

Chen, X., & Yang, Y. (2022). Different Shades of Norms: Comparing the Approaches of the EU and ASEAN to Cyber Governance. International Spectator, 57(3), 48–65. https://doi.org/10.1080/03932729.2022.2066841

Cheryl, B. K., & Ng, B. K. (2022). Protecting the Unprotected Consumer Data in Internet of Things: Current Scenario of Data Governance in Malaysia. Sustainability (Switzerland), 14(16). https://doi.org/10.3390/su14169893

Curtis, H., Hogeveen, B., Kang, J., Le Thu, H., Rajagopalan, R. P., & Ray, T. (2022). Digital Southeast Asia. In Australian Strategic … (Issue 57). www.aspi.org.au

Dehbi, F., & Martin-Ortega, O. (2023). An integrated approach to corporate due diligence from a human rights, environmental, and TWAIL perspective. Regulation and Governance, 17(4), 927–943. https://doi.org/10.1111/rego.12538

Fiero, A. W., & Beier, E. (2022). New Global Developments in Data Protection and Privacy Regulations: Comparative Analysis of European Union, United States, and Russian Legislation. Stanford Journal of International Law. Summer2022, 58(2), 151–192. https://web.s.ebscohost.com/ehost/detail/detail?vid=43&sid=84cbea20-4a76-4b13-8276-f7e1c6d77d8c%40redis&bdata=JkF1dGhUeXBlPXNzbyZzY29wZT1zaXRl#AN=158842953&db=a9h

Ismagilova, E., Hughes, L., Rana, N. P., & Dwivedi, Y. K. (2022). Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework. Information Systems Frontiers, 24(2), 393–414. https://doi.org/10.1007/s10796-020-10044-1

Justine Chilenovu Ogborigbo, Odunayo Sekinat Sobowale, Emmanuel Iyere Amienwalen, Yemisi Owoade, Adeyemo Taiwo Samson, & Joshua Egerson. (2024). Strategic integration of cyber security in business intelligence systems for data protection and competitive advantage. World Journal of Advanced Research and Reviews, 23(1), 081–096. https://doi.org/10.30574/wjarr.2024.23.1.1900

Metcalf, K. N., & Papageorgiou, I. F. (2022). Increasing Trust in the Digital Market Through Regional Rules: the Case of Asia. Asia Pacific Journal on Human Rights and the Law, 23(2), 245–279. https://doi.org/10.1163/15718158-23020004

Morgan, P. J. (2022). Fintech and Financial Inclusion in Southeast Asia and India. Asian Economic Policy Review, 17(2), 183–208. https://doi.org/10.1111/aepr.12379

Nampewo, Z., Mike, J. H., & Wolff, J. (2022). Respecting, protecting and fulfilling the human right to health. International Journal for Equity in Health, 21(1). https://doi.org/10.1186/s12939-022-01634-3

Nguyen, M. T., & Tran, M. Q. (2019). Balancing Security and Privacy in the Digital Age: An In-Depth Analysis of Legal and Regulatory Frameworks Impacting Cybersecurity Practices. International Journal of Intelligent Automation and Computing.

Okorie, G. N., Egieya, Z. E., Ikwue, U., Udeh, C. A., Adaga, E. M., DaraOjimba, O. D., & Oriekhoe, O. I. (2024). Leveraging big data for personalized marketing campaigns: a review. International Journal of Management & Entrepreneurship Research, 6(1), 216–242.

Omotunde, H., & Ahmed, M. (2023). A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond. Mesopotamian Journal of CyberSecurity, 2023, 115–133. https://doi.org/10.58496/MJCS/2023/016

Paramesha, M., Rane, N., & Rane, J. (2024). Big data analytics, artificial intelligence, machine learning, internet of things, and blockchain for enhanced business intelligence. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.4855856

Pyrrho, M., Cambraia, L., & de Vasconcelos, V. F. (2022). Privacy and Health Practices in the Digital Age. American Journal of Bioethics, 22(7), 50–59. https://doi.org/10.1080/15265161.2022.2040648

Radanliev, P. (2024). Cyber diplomacy: defining the opportunities for cybersecurity and risks from Artificial Intelligence, IoT, Blockchains, and Quantum Computing. Journal of Cyber Security Technology, 1–51. https://doi.org/10.1080/23742917.2024.2312671

Santoso, J. T., Raharjo, B., & Wibowo, A. (2024). Combination of Alphanumeric Password and Graphic Authentication for Cyber Security. Journal of Internet Services and Information Security, 14(1), 16–36. https://doi.org/10.58346/JISIS.2024.I1.002

Seun Solomon Bakare, Adekunle Oyeyemi Adeniyi, Chidiogo Uzoamaka Akpuokwe, & Nkechi Emmanuella Eneh. (2024). Data Privacy Laws and Compliance: a Comparative Review of the Eu Gdpr and Usa Regulations. Computer Science & IT Research Journal, 5(3), 528–543. https://doi.org/10.51594/csitrj.v5i3.859

Shahid, J., Ahmad, R., Kiani, A. K., Ahmad, T., Saeed, S., & Almuhaideb, A. M. (2022). Data Protection and Privacy of the Internet of Healthcare Things (IoHTs). Applied Sciences (Switzerland), 12(4). https://doi.org/10.3390/app12041927

Sheng, N., Yang, C., Han, L., & Jou, M. (2023). Too much overload and concerns: Antecedents of social media fatigue and the mediating role of emotional exhaustion. Computers in Human Behavior, 139. https://doi.org/10.1016/j.chb.2022.107500

Sudarwanto, A. S., & Kharisma, D. B. B. (2022). Comparative study of personal data protection regulations in Indonesia, Hong Kong and Malaysia. Journal of Financial Crime, 29(4), 1443–1457. https://doi.org/10.1108/JFC-09-2021-0193

Widiatedja, I. G. N. P., & Mishra, N. (2023). Establishing an independent data protection authority in Indonesia: a future–forward perspective. International Review of Law, Computers and Technology, 37(3), 252–273. https://doi.org/10.1080/13600869.2022.2155793

Wylde, V., Rawindaran, N., Lawrence, J., Balasubramanian, R., Prakash, E., Jayal, A., Khan, I., Hewage, C., & Platts, J. (2022). Cybersecurity, Data Privacy and Blockchain: A Review. SN Computer Science, 3(2). https://doi.org/10.1007/s42979-022-01020-4

Zhu, F. B., & Song, Z. (2022). Systematic Regulation of Personal Information Rights in the Era of Big Data. SAGE Open, 12(1). https://doi.org/10.1177/21582440211067529

Downloads

Published

2024-12-18

How to Cite

Idris, M. F., Laksito, J., & Ariyani, W. (2024). Tanggung Jawab Hukum Perusahaan Teknologi Atas Penyalahgunaan Data Pengguna : Studi Kasus Di ASEAN. Jaksa : Jurnal Kajian Ilmu Hukum Dan Politik, 2(4), 45–56. https://doi.org/10.51903/jaksa.v2i4.2268