Perlindungan Hukum terhadap Konsumen Kartu Sim yang Mengalami Kebocoran Data akibat Peretasan. (Legal Protection Against The Consumer Sim Card That Leaked Data from Hacking).

Nasrudin, Fadhi Khoiru (2023) Perlindungan Hukum terhadap Konsumen Kartu Sim yang Mengalami Kebocoran Data akibat Peretasan. (Legal Protection Against The Consumer Sim Card That Leaked Data from Hacking). Undergraduate thesis, Universitas 17 Agustus 1945 Surabaya.

[img] Text
ABSTRAK.pdf

Download (1MB)
[img] Text
BAB I.pdf
Restricted to Repository staff only

Download (1MB) | Request a copy
[img] Text
BAB II.pdf
Restricted to Repository staff only

Download (1MB) | Request a copy
[img] Text
BAB III.pdf
Restricted to Repository staff only

Download (1MB) | Request a copy
[img] Text
BAB IV.pdf
Restricted to Repository staff only

Download (342kB) | Request a copy
[img] Text
LoA.pdf

Download (115kB)
[img] Text
JURNAL.pdf
Restricted to Repository staff only

Download (174kB) | Request a copy
[img] Text
JURNAL TURNITIN.pdf
Restricted to Repository staff only

Download (2MB) | Request a copy
[img] Other
lightbox.jpg

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_preview)
preview.jpg
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Thumbnails conversion from text to thumbnail_medium)
medium.jpg
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Thumbnails conversion from text to thumbnail_preview)
preview.jpg
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_medium)
medium.jpg
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Thumbnails conversion from text to thumbnail_small)
small.jpg
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_lightbox)
lightbox.jpg

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_preview)
preview.jpg

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_medium)
medium.jpg
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Thumbnails conversion from text to thumbnail_lightbox)
lightbox.jpg

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_preview)
preview.jpg

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Text
Abstrak Fadhi.pdf

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_lightbox)
lightbox.jpg
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Thumbnails conversion from text to thumbnail_small)
small.jpg
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy

Abstract

The development of the concept of personal data cannot be separated from the development of the internet. Information technology today has developed very quickly and rapidly. This is because information technology is able to erase the boundaries of space, distance and time so as to significantly increase aspects of productivity and efficiency. The existence of Cyber Crime (cybercrime) has become a threat to human life, so that it is difficult for the government to keep up with the techniques of crimes committed with computer technology, especially internet networks. So the main issues in this research are 1. How can the Personal Data Protection Act protect SIM card consumers against hacking of personal data? 2. What is the legal protection for consumers against personal data leakage due to hacking? The type of research used is a type of research that includes normative legal research, said so because the approach to this problem is to use methods by reviewing the terms of the laws and regulations that have been in effect and are generally obeyed by the community. In general, the meaning of data protection refers to binding practices, safeguards and rules that are enforced to protect personal information or data and ensure that the data subject remains in control of the information. The result of the first problem is that the legal basis that can be used as a basis for filing a lawsuit if a data leak occurs due to hacking is Article 12 paragraph 1 Personal Data Subjects have the right to sue and receive compensation for violations of processing Personal Data about themselves in accordance with statutory provisions and Article 46 paragraph 1 In the event of failure of Personal Data Protection, the Personal Data Controller is obliged to provide written notification no later than 3 x 24 (three times twenty four) hours to the data subject and institution. While the results of the second problem, namely the legal basis that can be used as a basis for protecting the public from hacking, are 1. Article 35 which reads that the Personal Data Controller is obliged to protect and ensure the Personal Data it processes. 2. Article 36 which reads In processing Personal Data, the Personal Data Controller is obliged to maintain the confidentiality of Personal Data. 3. Article 39 which reads In processing Personal Data, the Personal Data Controller is obliged to maintain the confidentiality of Personal Data. 4. Article 47 which reads that the Personal Data Controller is obliged to be responsible for the processing of Personal Data and show responsibility in fulfilling the obligation to implement the principles of Personal Data Protection. Keywords : Law, Protection, Technology

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Hukum, Perlindungan, Teknologi
Subjects: K Law > K Law (General)
Divisions: Fakultas Hukum > Program Studi Ilmu Hukum
Depositing User: 1311900270 Fadhi Khoiru Nasrudin
Date Deposited: 06 Mar 2023 04:53
Last Modified: 06 Mar 2023 04:53
URI: http://repository.untag-sby.ac.id/id/eprint/21725

Actions (login required)

View Item View Item