Nasrudin, Fadhi Khoiru (2023) Perlindungan Hukum terhadap Konsumen Kartu Sim yang Mengalami Kebocoran Data akibat Peretasan. (Legal Protection Against The Consumer Sim Card That Leaked Data from Hacking). Undergraduate thesis, Universitas 17 Agustus 1945 Surabaya.
Text
ABSTRAK.pdf Download (1MB) |
|
Text
BAB I.pdf Restricted to Repository staff only Download (1MB) | Request a copy |
|
Text
BAB II.pdf Restricted to Repository staff only Download (1MB) | Request a copy |
|
Text
BAB III.pdf Restricted to Repository staff only Download (1MB) | Request a copy |
|
Text
BAB IV.pdf Restricted to Repository staff only Download (342kB) | Request a copy |
|
Text
LoA.pdf Download (115kB) |
|
Text
JURNAL.pdf Restricted to Repository staff only Download (174kB) | Request a copy |
|
Text
JURNAL TURNITIN.pdf Restricted to Repository staff only Download (2MB) | Request a copy |
|
Other
lightbox.jpg Download (0B) |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Download (0B) |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Download (0B) |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Download (0B) |
|
Other (Thumbnails conversion from text to thumbnail_preview)
preview.jpg Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Thumbnails conversion from text to thumbnail_medium)
medium.jpg Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Thumbnails conversion from text to thumbnail_preview)
preview.jpg Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Download (0B) |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Download (0B) |
|
Other (Thumbnails conversion from text to thumbnail_medium)
medium.jpg Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Thumbnails conversion from text to thumbnail_small)
small.jpg Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Download (0B) |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Download (0B) |
|
Other (Thumbnails conversion from text to thumbnail_lightbox)
lightbox.jpg Download (0B) |
|
Other (Thumbnails conversion from text to thumbnail_preview)
preview.jpg Download (0B) |
|
Other (Thumbnails conversion from text to thumbnail_medium)
medium.jpg Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Thumbnails conversion from text to thumbnail_lightbox)
lightbox.jpg Download (0B) |
|
Other (Thumbnails conversion from text to thumbnail_preview)
preview.jpg Download (0B) |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Download (0B) |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Download (0B) |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Download (0B) |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Download (0B) |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Download (0B) |
|
Text
Abstrak Fadhi.pdf Download (0B) |
|
Other (Thumbnails conversion from text to thumbnail_lightbox)
lightbox.jpg Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Thumbnails conversion from text to thumbnail_small)
small.jpg Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Restricted to Repository staff only Download (0B) | Request a copy |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Download (0B) |
|
Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt Restricted to Repository staff only Download (0B) | Request a copy |
Abstract
The development of the concept of personal data cannot be separated from the development of the internet. Information technology today has developed very quickly and rapidly. This is because information technology is able to erase the boundaries of space, distance and time so as to significantly increase aspects of productivity and efficiency. The existence of Cyber Crime (cybercrime) has become a threat to human life, so that it is difficult for the government to keep up with the techniques of crimes committed with computer technology, especially internet networks. So the main issues in this research are 1. How can the Personal Data Protection Act protect SIM card consumers against hacking of personal data? 2. What is the legal protection for consumers against personal data leakage due to hacking? The type of research used is a type of research that includes normative legal research, said so because the approach to this problem is to use methods by reviewing the terms of the laws and regulations that have been in effect and are generally obeyed by the community. In general, the meaning of data protection refers to binding practices, safeguards and rules that are enforced to protect personal information or data and ensure that the data subject remains in control of the information. The result of the first problem is that the legal basis that can be used as a basis for filing a lawsuit if a data leak occurs due to hacking is Article 12 paragraph 1 Personal Data Subjects have the right to sue and receive compensation for violations of processing Personal Data about themselves in accordance with statutory provisions and Article 46 paragraph 1 In the event of failure of Personal Data Protection, the Personal Data Controller is obliged to provide written notification no later than 3 x 24 (three times twenty four) hours to the data subject and institution. While the results of the second problem, namely the legal basis that can be used as a basis for protecting the public from hacking, are 1. Article 35 which reads that the Personal Data Controller is obliged to protect and ensure the Personal Data it processes. 2. Article 36 which reads In processing Personal Data, the Personal Data Controller is obliged to maintain the confidentiality of Personal Data. 3. Article 39 which reads In processing Personal Data, the Personal Data Controller is obliged to maintain the confidentiality of Personal Data. 4. Article 47 which reads that the Personal Data Controller is obliged to be responsible for the processing of Personal Data and show responsibility in fulfilling the obligation to implement the principles of Personal Data Protection. Keywords : Law, Protection, Technology
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | Hukum, Perlindungan, Teknologi |
Subjects: | K Law > K Law (General) |
Divisions: | Fakultas Hukum > Program Studi Ilmu Hukum |
Depositing User: | 1311900270 Fadhi Khoiru Nasrudin |
Date Deposited: | 06 Mar 2023 04:53 |
Last Modified: | 06 Mar 2023 04:53 |
URI: | http://repository.untag-sby.ac.id/id/eprint/21725 |
Actions (login required)
View Item |