Perlindungan Hukum Terhadap Korban Pemilik Data Pribadi yang Digunakan Orang Lain untuk Kegiatan Prostitusi. (Legal Protection for Victims of Owners of Personal Data Used by Others for Prostitution Activities).

Sari, Aulia Dean Puspita (2023) Perlindungan Hukum Terhadap Korban Pemilik Data Pribadi yang Digunakan Orang Lain untuk Kegiatan Prostitusi. (Legal Protection for Victims of Owners of Personal Data Used by Others for Prostitution Activities). Undergraduate thesis, Universitas 17 Agustus 1945 Surabaya.

[img] Text
ABSTRAK.pdf

Download (1MB)
[img] Text (BAB I)
BAB I.pdf
Restricted to Repository staff only

Download (4MB)
[img] Text (BAB II)
BAB II.pdf
Restricted to Repository staff only

Download (4MB)
[img] Text (BAB III)
BAB III.pdf
Restricted to Repository staff only

Download (27MB)
[img] Text
BAB IV.pdf
Restricted to Repository staff only

Download (2MB)
[img] Text (jURNAL)
JURNAL.pdf

Download (256kB)
[img] Text (JURNAL TURNITIN)
JURNAL TURNITIN.pdf

Download (6MB)
[img] Other (Thumbnails conversion from text to thumbnail_lightbox)
lightbox.jpg
Restricted to Registered users only

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_medium)
medium.jpg
Restricted to Registered users only

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Registered users only

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Registered users only

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_lightbox)
lightbox.jpg
Restricted to Repository staff only

Download (0B)
[img] Text (BAB IV)
BAB IV.pdf - Submitted Version
Restricted to Repository staff only

Download (0B)
[img] Text
BAB II.pdf

Download (0B)
[img] Text
BAB III.pdf

Download (0B)
[img] Text
BAB I.pdf

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Registered users only

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Registered users only

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_small)
small.jpg
Restricted to Repository staff only

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_lightbox)
lightbox.jpg
Restricted to Repository staff only

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_small)
small.jpg
Restricted to Repository staff only

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Registered users only

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_preview)
preview.jpg
Restricted to Repository staff only

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_small)
small.jpg
Restricted to Repository staff only

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_lightbox)
lightbox.jpg
Restricted to Registered users only

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_preview)
preview.jpg
Restricted to Registered users only

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Registered users only

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_small)
small.jpg
Restricted to Registered users only

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_lightbox)
lightbox.jpg
Restricted to Repository staff only

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_preview)
preview.jpg
Restricted to Repository staff only

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_small)
small.jpg
Restricted to Repository staff only

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Registered users only

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_medium)
medium.jpg
Restricted to Repository staff only

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_lightbox)
lightbox.jpg

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_medium)
medium.jpg

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_small)
small.jpg

Download (0B)
[img] Text (Abstrak)
ABSTRAK.pdf - Draft Version
Restricted to Repository staff only

Download (0B)
[img] Text (Cover, Daftar Isi, Daftar Pustaka)
Cover,Daftar Isi, Daftar Pustaka.pdf - Submitted Version

Download (0B)
[img] Text (Lembar Pengesahan)
Lembar Pengesahan.pdf - Draft Version
Restricted to Repository staff only

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_lightbox)
lightbox.jpg
Restricted to Repository staff only

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_preview)
preview.jpg
Restricted to Repository staff only

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_medium)
medium.jpg
Restricted to Repository staff only

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Text
ABSTRAK.pdf

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_preview)
preview.jpg

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_medium)
medium.jpg

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)

Abstract

The existence of the internet certainly has a positive impact on society. On the other hand, there are negative impacts that haunt internet users, such as data theft, especially internet user data, causing victims of stolen data to spread their data and falsify it by irresponsible people. The type of research used in this research is normative legal research by conducting research on the rules or norms that behave in society. This research is based on the regulations that apply, especially on the norms according to the law. The approach method used by the author is a case approach (casus approach) and a conceptual approach (conceptual approach). In accordance with Law Number 19 of 2016 in conjunction with Law Number 11 of 2008 concerning Information and Electronic Transactions or known as the ITE Law article 26 paragraph (1) it is stated that the use of a person's personal data must obtain the approval of the person concerned, which then in Article 27 paragraph (1) that people intentionally and without rights distributing Electronic Documents violate decency. If related to Article 282 paragraph (1), 282 paragraph (2), 282 paragraph (3), Article 296 of the Criminal Code, decency is defined as an act of pornography. From this action, the use of other people's personal data for prostitution is called defamation or humiliation. Keywords: Legal Protection, Personal Data, Prostitution

Item Type: Thesis (Undergraduate)
Subjects: K Law > K Law (General)
Divisions: Fakultas Hukum
Depositing User: 1311900258 Aulia Dean Puspita Sari
Date Deposited: 29 Mar 2023 01:43
Last Modified: 29 Mar 2023 01:43
URI: http://repository.untag-sby.ac.id/id/eprint/21654

Actions (login required)

View Item View Item