SlideShare a Scribd company logo
1 of 19
Download to read offline
Cyberlaw and Sovereignty




                Oleh :

  Dr. Edmon Makarim, S.Kom, SH, LLM
Outline
• Apakah substansi Cyberlaw = Internet Governance ?
   – Law of Info-comm sesungguhnya lebih luas dari Internet Law
   – Internet Governance adalah tata kelola pemanfaatan Internet utk
     melindungi dan mengembangkan kepentingan nasional (bangsa
     dan negara)
• Apa dan bagaimana “trustworthiness” terhadap Internet ..?
   – Sejauhmana cybersecurity => accountability + responsibility/liability
• Apakah yang selayaknya menjadi Fokus Materi
   – Hukum dalam arti luas ataukah dalam arti sempit ?
• Apakah yang menjadi “mimpi” atau cita-cita besar kita
  sebagai bangsa dan negara dengan pemanfaatan Internet ?
   – Melihat posisi strategis maka tampaknya kita layak menjadi Hub
     atau bahkan mungkin Sentra komunikasi dan informasi dunia.
Source: Jovan Kurbalija, An introduction to Internet Governance, Diplo Foundation
Law of Information & Communication
                               Sistem hukum yang berlaku dalam konteks cyberspace.
ICT Law => Telematika


                         Cyberspace law

                                              Cybersecurity
                               E-commerce

                                               cybercrime
                           E-government




  Sources: Cybersecurity (ITU) + Redesigning E-gov
Keterpaduan Paradigma ICT Law/Cyber
       Law/Internet Law + Internet Governance
Cyber Law Paradigm:       Internet Governance   Ethics & Law of ICT
Libertarian vs            Paradigm              (global common good/national
                                                  public interest):
  Paternalistic /         (main issues,5        • Privacy,
  Conservative                 basket):         • Accuracy,
• Sistem hukum yang       • Resources           • Property,
  berkenaan dengan        • Economy             • Accessibility/ Availability
  cyberspace baik dalam   • Legal               • Responsibility
  lingkup nasional        • Development
                                                • Accountability
  maupun internasional.                         • Due Process
                          • Socio-cultural      • Liability
• (Andrew Murray,
                          (Jovan Kurbalija)     (AM De joie et.al + Kenneth C
  Cyberspace                                      Laudon
  Regulation)



               Global Cybersecurity Agenda (ITU)



                            Indonesian Commitment to
                     Internet Governance + Law of Info-comm
Internet Governance
The WGIG Report (2004),                        Jovan Kurbalija                    Fokus Materi IGF ala
Identified four main areas                     (five baskets)                     Indonesia
• Issues related to infrastructure and the                                        Perspektif hukum dalam arti luas
management of critical Internet
                                               Infrastruktur dan
resources.                                     Standarisasi                       bukan dalam arti sempit
• Isues related to the use of the Internet                                        • Constitutional Rights and ICT
including spam network security and
                                               Legal:
cybercrime.                                    -Jurisdiction                        (New Technologies) => Privacy &
                                               - Cybercrime (include IPR’s)
                                                                                    Data Protection
                                               - Alternative Dispute Resoultion
• Issues relevant to the Internet but have                                        • Internet Cryptography + Security
an impact much wider than the Internet
                                               Economy
and for which existing organisations are
                                                                                  • Infrastruktur & Standarisasi
responsible such as in Intellectual                                               • E-government + e-ID
property right (IPR) or international trade.
                                                                                    Management (access to e-public
• Issues related tot the developmental                                              services)
aspects of Internet governance in
                                               Development
                                                                                  • E-commerce + ADR
particular capacity building in developing
countries.                                                                        • Cyber-crime (including IPR)
                                               Socio Cultural                     • Jurisdiction
Constitutional Rights & ICT                                  Intenational Instruments of
                                                                Human Rights:
                                                                • Freedom of Expression
Ethics:                                                         • Access to knowledge
• Privacy,                                                      • Access to technology
• Accuracy,                                                     • Access to administration
• Property,                                                     • Privacy, Dignity & Reputation
• Accessibility/Availability                                    • Right Against Self-Incrimination
                                              Constitution      • Due Process of Law                          Other
• Responsibility
• Accountability                             UUD-NRI 1945                                                    Countries
• Due Process                                 (Amend 1-4)                                                   Constitution
• Liability


                                                                    Public Interest and
                      Individual Rights:
                                                                    Public Trust Obligation
                      • Freedom of Expression
                      • Privacy (Anonymity, Reputation)             • Freedom of Expression and the Press
                      • Property                                    • Public infrastructure
                      • Access to Public Information                • Administration
                      • Rights Against Self Incrimination           • E-voting
                                                                    • Security




                                                 Legislation Products and Cases
Keranjang Hukum
•    Fokus Materi (pemanfaatan internet yang
     sesuai dengan kepentingan nasional)
1.   Yurisdiksi => Ekstra-teritorial +
     multilateral
2.   Keberlakuan HKI (Hak Cipta)
3.   Keamanan critical public infrastructure
4.   Cybercrime (Mutual Legal Assistance)
5.   Alternative Online Dispute Resolution =>
     Badan Arbitrase + BPSK
Fokus Materi (1) dampak Crossborder:
    Sovereignty  Jurisdiction
  (Negara Mana Yang Berhak Menghukum ?)

                                   • Warga Negara Siapa ?
                                   • Dimana dilakukannya (apakah delik
                                     formil) ?
                                   • Dimana Victim dan Akibat serious
                                     damages-nya (apakah delik materil)
                                     dan bgmn kepentinga nasionalnya ?
                                   • Dimana bukti dapat diperoleh ?
                                   • Dimana Suspect dapat ditangkap?
                                   • adakah perjanjian ekstradisi ?
                                   • Dimana Ancaman Pidana Yang
                                     Sesuai Nilai Keadilan
                                   • Dimana Fair Trial / impartial


                                     Transfer of Proceedings
Fokus Materi (2) : Property vs Propriety
  • Mungkinkah IP Abuse =>
     – Larangan melanggar
       Kepentingan ekonomi nasional
       + unfair competition
     – Jangan membuat barriers for
       access to knowledge
     – Jangan mensalahgunakan
       Pendaftaran, Pencatatan krn vs
       Prinsip Originalitas Ciptaan
     – Sham litigation => eksploitasi
  • Kriminalisasi Pelanggaran
      – TRIPS mengamanatkan piracy
        on commercial scale bukan
        commercial use ?
• Indonsia perlu Aturan ttg IP Abuse
• Indonesia perlu membuat Watchlist             Source: Jovan Kurbalija,
                                        An introduction to Internet Governance
Spectrum of License




     All rights                  Public Domain:
     reserved
                                 - Moral right
                                 - Economical Rights
Haruskah didaftarkan ?
Fokus Materi (3) : Security + National e-Authentication
                Perlu aturan ttg
                • Kebijakan Kriptografi
                • classified Information
                • Privacy & Data Proteksi
                • National Root CA + BridgeCA
                • National Gateway ?
                                           Cross Recognition




                Models Regulations of PKI
                 • Self-Regulation
                 =>communities PKI
                 • “Mesh” PKI =>
                 Peer-to-peer
                 • “bridge” CSP.
Fokus Materi (5) =
Conducive/Cost Effective + Efficiency Economy + ADR
• Penerapan e-Apostile (Hague Agreement 1961) => Mengilangkan
  Inefisiensi Lintas Authenticity Document utk National dan International
  Private Transaction => Cybernotary/e-Notary (setidaknya untuk RA dan
  pembuatan salinan otentik elektronik)
• Cost effective terhadap Tax (reporting dan clearing house dan Duty-
  stamp ?
• Voluntary Accreditation/Accredited-List bagi para penyelenggara
  layanan (IS Provider) dan Profesional Penunjang TIK
• Forum dan Mekanisme untuk Coercive Self-Regulation
• Kejelasan aturan E-payment system dan e-Transferable Records (e-
  money)
• Komitmen untuk mengembangkan National Data Centre
• Consumer Protection Right => White-list (paling tidak harus ada notice,
  choice dan consent serta jaminan limitation purpose dan “preventing
  harm”)
• Mediasi dan Arbitrase => BAM-HKI dan Badan Penyelesaian Sengketa
  Konsumen
Terima Kasih
LAMPIRAN
Konvergensi Industri
• Telematics Convergence =>
  content, network & services
   – Industry restructure <=>
     ICT/multimedia
     orientation
   – Scope of content industry
     => digital works &
     services (text,                                            US$ 25.000
     picture/images, audio,                                     Enthropia
     video, etc)                                                Universe
       •   Database
       •   Computer program
       •   Games
       •   news
       •   E-book
       •   Photograph                                           US$ 800.000
                                            US$ 299
       •   Music                                                Point Blank
                                 Virtual    Wolrd of Warcraft
       •   Paintings
       •   Maps                  Property
       •   etc
(ITU => Cybersecurity)
•   “Cybersecurity is the collection of tools, policies, security concepts, security safeguards,
    guidelines, risk management approaches, actions, training, best practices, assurance
    and technologies that can be used to protect the cyber environment and organization
    and user’s assets.
     – [Organization and user’s assets include connected computing devices, personnel,
         infrastructure, applications, services, telecommunications systems, and the totality of
         transmitted and/or stored information in the cyber environment].
•   Cybersecurity strives to ensure the attainment and maintenance of the security
    properties of the organization and user’s assets against relevant security risks in the
    cyber environment. The general security objectives comprise the following: Availability;
    Integrity,( which may include authenticity and non-repudiation); Confidentiality
•   The Global Cybersecurity Agenda has seven main strategic goals, built on five work
    areas:
     1) Legal Measures => cybercrime legislation
     2) Technical and Procedural Measures => End users and businesses (direct
         approach); and Service providers and software companies
     3) Organizational Structures => highly developed organizational structures, avoid
         overlapping,
     4) Capacity Building & User’s education => public campaigns + open communication of
         the latest cybercrime threats
     5) International Cooperation => Mutual Legal Assistance of the LEA’s
Extra Teritorial Jurisdiction
• Pasal 2 :
   Undang-undang ini berlaku untuk :
   – Setiap orang yang melakukan perbuatan hukum sebagaimana diatur dalam UU
     ITE;
   – Baik yang berada di wilayah hukum Indonesia maupun di luar wilayah hukum
     Indonesia;
   – Yang memiliki akibat hukum di wilayah hukum Indonesia dan/atau diluar
     wilayah hukum Indonesia dan merugikan kepentingan Indonesia.


                                                                        Crime




 Merugikan kepentingan Indonesia: meliputi & tidak terbatas pada merugikan kepentingan
 Ekonomi indonesia, perlindungan data strategis, harkat dan martabat bangsa, pertahanan
 & keamanan negara, kedaulatan negara, warga negara, serta badan hukum Indonesia.         18
Ketahanan Bangsa
 mampukah menghadapi AGHT => pengaruh dari luar dan
 mengendalikan hasrat dari dalam …???


• Orang => Warga • Privacy, Dignity & Reputation
  Negara, Bangsa (HAM setiap orang)
  dan Negara
• Sumber Daya    • Kesejahteraan (ps33 UUD 45)
                   dan Utilitas Publik
• Pemerintah dan • Melindungi atau menghianati
  Sistem Hukum     konstitusi (cita2 luhur bangsa)

More Related Content

What's hot

Cross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property IssuesCross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property IssuesKarl Larson
 
Outline D
Outline DOutline D
Outline Dbutest
 
My IGF 2017 Experience
My IGF 2017 ExperienceMy IGF 2017 Experience
My IGF 2017 ExperienceYingChu Chen
 
Basics of trade secret in India
Basics of trade secret  in IndiaBasics of trade secret  in India
Basics of trade secret in IndiaVipin Maurya
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianDamar Juniarto
 
TIK_4. pengelolaan informasi_20161__rev
TIK_4. pengelolaan informasi_20161__revTIK_4. pengelolaan informasi_20161__rev
TIK_4. pengelolaan informasi_20161__revjackpopo
 
Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...Maurice Dawson
 
Abc Copyright Unesco
Abc Copyright  UnescoAbc Copyright  Unesco
Abc Copyright UnescoELF MACHINE
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipsll906
 
Thainetizennetwork globalcybercrime 07272009
Thainetizennetwork globalcybercrime 07272009Thainetizennetwork globalcybercrime 07272009
Thainetizennetwork globalcybercrime 07272009Eddan Katz
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...sabrangsabrang
 

What's hot (13)

F2C12: Vint Cerf
F2C12: Vint CerfF2C12: Vint Cerf
F2C12: Vint Cerf
 
Cross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property IssuesCross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property Issues
 
Outline D
Outline DOutline D
Outline D
 
My IGF 2017 Experience
My IGF 2017 ExperienceMy IGF 2017 Experience
My IGF 2017 Experience
 
Basics of trade secret in India
Basics of trade secret  in IndiaBasics of trade secret  in India
Basics of trade secret in India
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital Authoritarian
 
TIK_4. pengelolaan informasi_20161__rev
TIK_4. pengelolaan informasi_20161__revTIK_4. pengelolaan informasi_20161__rev
TIK_4. pengelolaan informasi_20161__rev
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...
 
Abc Copyright Unesco
Abc Copyright  UnescoAbc Copyright  Unesco
Abc Copyright Unesco
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Thainetizennetwork globalcybercrime 07272009
Thainetizennetwork globalcybercrime 07272009Thainetizennetwork globalcybercrime 07272009
Thainetizennetwork globalcybercrime 07272009
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 

Viewers also liked

CCNA 200-120 Latest Dumps
CCNA 200-120 Latest DumpsCCNA 200-120 Latest Dumps
CCNA 200-120 Latest Dumpsslotiopo
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certificationdkaya
 
CCNA Exam 200-120 pdf
CCNA Exam 200-120 pdfCCNA Exam 200-120 pdf
CCNA Exam 200-120 pdfMadhan Banda
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
 

Viewers also liked (6)

CCNA 200-120 Latest Dumps
CCNA 200-120 Latest DumpsCCNA 200-120 Latest Dumps
CCNA 200-120 Latest Dumps
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certification
 
CCNA Exam 200-120 pdf
CCNA Exam 200-120 pdfCCNA Exam 200-120 pdf
CCNA Exam 200-120 pdf
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
 
CCNA ppt
CCNA pptCCNA ppt
CCNA ppt
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 

Similar to idigf - hukum - ui - edmon makarim

Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and TechnologyMr Shipp
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationHinne Hettema
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Making Better Internet Policy: An Analysis of the National Information Infras...
Making Better Internet Policy: An Analysis of the National Information Infras...Making Better Internet Policy: An Analysis of the National Information Infras...
Making Better Internet Policy: An Analysis of the National Information Infras...Jeremy Pesner
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy RegulationMercatus Center
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
Hacking Portugal , C-days 2016 , v1.0
Hacking Portugal ,  C-days 2016 , v1.0Hacking Portugal ,  C-days 2016 , v1.0
Hacking Portugal , C-days 2016 , v1.0Dinis Cruz
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesAdam Thierer
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxMuhammadAbdullah311866
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Othersnealbd
 
Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethi...
Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethi...Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethi...
Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethi...Eddan Katz
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanismGanesh Chindanuru
 

Similar to idigf - hukum - ui - edmon makarim (20)

Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Making Better Internet Policy: An Analysis of the National Information Infras...
Making Better Internet Policy: An Analysis of the National Information Infras...Making Better Internet Policy: An Analysis of the National Information Infras...
Making Better Internet Policy: An Analysis of the National Information Infras...
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy Regulation
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Hacking Portugal , C-days 2016 , v1.0
Hacking Portugal ,  C-days 2016 , v1.0Hacking Portugal ,  C-days 2016 , v1.0
Hacking Portugal , C-days 2016 , v1.0
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Others
 
Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethi...
Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethi...Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethi...
Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethi...
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Cyberlaws
CyberlawsCyberlaws
Cyberlaws
 

More from IGF Indonesia

ID-IGF 2018 Dialog Nasional Ringkasan dan Laporan
ID-IGF 2018 Dialog Nasional Ringkasan dan LaporanID-IGF 2018 Dialog Nasional Ringkasan dan Laporan
ID-IGF 2018 Dialog Nasional Ringkasan dan LaporanIGF Indonesia
 
ID-IGF 2019 National Dialogue Summary and Report
ID-IGF 2019 National Dialogue Summary and Report ID-IGF 2019 National Dialogue Summary and Report
ID-IGF 2019 National Dialogue Summary and Report IGF Indonesia
 
ID-IGF 2019 Dialog Nasional Ringkasan dan Laporan
ID-IGF 2019 Dialog Nasional Ringkasan dan LaporanID-IGF 2019 Dialog Nasional Ringkasan dan Laporan
ID-IGF 2019 Dialog Nasional Ringkasan dan LaporanIGF Indonesia
 
Pengantar Tata Kelola Internet
Pengantar Tata Kelola InternetPengantar Tata Kelola Internet
Pengantar Tata Kelola InternetIGF Indonesia
 
Kebijakan Cybersecurity Dalam Perspektif Multistakeholder
Kebijakan Cybersecurity Dalam Perspektif MultistakeholderKebijakan Cybersecurity Dalam Perspektif Multistakeholder
Kebijakan Cybersecurity Dalam Perspektif MultistakeholderIGF Indonesia
 
ID IGF 2016 - Opening - Mengenal Tata Kelola internet
ID IGF 2016 - Opening - Mengenal Tata Kelola internetID IGF 2016 - Opening - Mengenal Tata Kelola internet
ID IGF 2016 - Opening - Mengenal Tata Kelola internetIGF Indonesia
 
ID IGF 2016 - Hukum 1 - Privasi Online dan PDP
ID IGF 2016 - Hukum 1 - Privasi Online dan PDPID IGF 2016 - Hukum 1 - Privasi Online dan PDP
ID IGF 2016 - Hukum 1 - Privasi Online dan PDPIGF Indonesia
 
ID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi Multilateral
ID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi MultilateralID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi Multilateral
ID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi MultilateralIGF Indonesia
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberIGF Indonesia
 
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security FrameworkID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security FrameworkIGF Indonesia
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkIGF Indonesia
 
ID IGF 2016 - Infrastruktur 3 - Tim Tanggap Darurat
ID IGF 2016 - Infrastruktur 3 - Tim Tanggap Darurat ID IGF 2016 - Infrastruktur 3 - Tim Tanggap Darurat
ID IGF 2016 - Infrastruktur 3 - Tim Tanggap Darurat IGF Indonesia
 
ID IGF 2016 - Sosial Budaya 3 - Literasi Digital Keniscayaan Perlindungan Anak
ID IGF 2016 - Sosial Budaya 3 - Literasi Digital Keniscayaan Perlindungan AnakID IGF 2016 - Sosial Budaya 3 - Literasi Digital Keniscayaan Perlindungan Anak
ID IGF 2016 - Sosial Budaya 3 - Literasi Digital Keniscayaan Perlindungan AnakIGF Indonesia
 
ID IGF 2016 - Sosial Budaya 3 - Literasi Digital dan Penapisan
ID IGF 2016 - Sosial Budaya 3 - Literasi Digital dan PenapisanID IGF 2016 - Sosial Budaya 3 - Literasi Digital dan Penapisan
ID IGF 2016 - Sosial Budaya 3 - Literasi Digital dan PenapisanIGF Indonesia
 
ID IGF 2016 - Sosial Budaya 3 - Literasi Digital untuk Keluarga
ID IGF 2016 - Sosial Budaya 3 - Literasi Digital untuk KeluargaID IGF 2016 - Sosial Budaya 3 - Literasi Digital untuk Keluarga
ID IGF 2016 - Sosial Budaya 3 - Literasi Digital untuk KeluargaIGF Indonesia
 
ID IGF 2016 - Sosial Budaya 3 - Trends internet dalam eksploitasi seksual anak
ID IGF 2016 - Sosial Budaya 3 - Trends internet dalam eksploitasi seksual anakID IGF 2016 - Sosial Budaya 3 - Trends internet dalam eksploitasi seksual anak
ID IGF 2016 - Sosial Budaya 3 - Trends internet dalam eksploitasi seksual anakIGF Indonesia
 
ID IGF 2016 - Sosial Budaya 3 - Indorelawan
ID IGF 2016 - Sosial Budaya 3 - IndorelawanID IGF 2016 - Sosial Budaya 3 - Indorelawan
ID IGF 2016 - Sosial Budaya 3 - IndorelawanIGF Indonesia
 
ID IGF 2016 - Sosial Budaya 2 - Aktivisme Digital ala Indonesia
ID IGF 2016 - Sosial Budaya 2 - Aktivisme Digital ala IndonesiaID IGF 2016 - Sosial Budaya 2 - Aktivisme Digital ala Indonesia
ID IGF 2016 - Sosial Budaya 2 - Aktivisme Digital ala IndonesiaIGF Indonesia
 
ID IGF 2016 - Hukum 2 - Cybersecurity dan HAM
ID IGF 2016 - Hukum 2 - Cybersecurity dan HAMID IGF 2016 - Hukum 2 - Cybersecurity dan HAM
ID IGF 2016 - Hukum 2 - Cybersecurity dan HAMIGF Indonesia
 
ID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilience
ID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilienceID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilience
ID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilienceIGF Indonesia
 

More from IGF Indonesia (20)

ID-IGF 2018 Dialog Nasional Ringkasan dan Laporan
ID-IGF 2018 Dialog Nasional Ringkasan dan LaporanID-IGF 2018 Dialog Nasional Ringkasan dan Laporan
ID-IGF 2018 Dialog Nasional Ringkasan dan Laporan
 
ID-IGF 2019 National Dialogue Summary and Report
ID-IGF 2019 National Dialogue Summary and Report ID-IGF 2019 National Dialogue Summary and Report
ID-IGF 2019 National Dialogue Summary and Report
 
ID-IGF 2019 Dialog Nasional Ringkasan dan Laporan
ID-IGF 2019 Dialog Nasional Ringkasan dan LaporanID-IGF 2019 Dialog Nasional Ringkasan dan Laporan
ID-IGF 2019 Dialog Nasional Ringkasan dan Laporan
 
Pengantar Tata Kelola Internet
Pengantar Tata Kelola InternetPengantar Tata Kelola Internet
Pengantar Tata Kelola Internet
 
Kebijakan Cybersecurity Dalam Perspektif Multistakeholder
Kebijakan Cybersecurity Dalam Perspektif MultistakeholderKebijakan Cybersecurity Dalam Perspektif Multistakeholder
Kebijakan Cybersecurity Dalam Perspektif Multistakeholder
 
ID IGF 2016 - Opening - Mengenal Tata Kelola internet
ID IGF 2016 - Opening - Mengenal Tata Kelola internetID IGF 2016 - Opening - Mengenal Tata Kelola internet
ID IGF 2016 - Opening - Mengenal Tata Kelola internet
 
ID IGF 2016 - Hukum 1 - Privasi Online dan PDP
ID IGF 2016 - Hukum 1 - Privasi Online dan PDPID IGF 2016 - Hukum 1 - Privasi Online dan PDP
ID IGF 2016 - Hukum 1 - Privasi Online dan PDP
 
ID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi Multilateral
ID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi MultilateralID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi Multilateral
ID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi Multilateral
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
 
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security FrameworkID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
 
ID IGF 2016 - Infrastruktur 3 - Tim Tanggap Darurat
ID IGF 2016 - Infrastruktur 3 - Tim Tanggap Darurat ID IGF 2016 - Infrastruktur 3 - Tim Tanggap Darurat
ID IGF 2016 - Infrastruktur 3 - Tim Tanggap Darurat
 
ID IGF 2016 - Sosial Budaya 3 - Literasi Digital Keniscayaan Perlindungan Anak
ID IGF 2016 - Sosial Budaya 3 - Literasi Digital Keniscayaan Perlindungan AnakID IGF 2016 - Sosial Budaya 3 - Literasi Digital Keniscayaan Perlindungan Anak
ID IGF 2016 - Sosial Budaya 3 - Literasi Digital Keniscayaan Perlindungan Anak
 
ID IGF 2016 - Sosial Budaya 3 - Literasi Digital dan Penapisan
ID IGF 2016 - Sosial Budaya 3 - Literasi Digital dan PenapisanID IGF 2016 - Sosial Budaya 3 - Literasi Digital dan Penapisan
ID IGF 2016 - Sosial Budaya 3 - Literasi Digital dan Penapisan
 
ID IGF 2016 - Sosial Budaya 3 - Literasi Digital untuk Keluarga
ID IGF 2016 - Sosial Budaya 3 - Literasi Digital untuk KeluargaID IGF 2016 - Sosial Budaya 3 - Literasi Digital untuk Keluarga
ID IGF 2016 - Sosial Budaya 3 - Literasi Digital untuk Keluarga
 
ID IGF 2016 - Sosial Budaya 3 - Trends internet dalam eksploitasi seksual anak
ID IGF 2016 - Sosial Budaya 3 - Trends internet dalam eksploitasi seksual anakID IGF 2016 - Sosial Budaya 3 - Trends internet dalam eksploitasi seksual anak
ID IGF 2016 - Sosial Budaya 3 - Trends internet dalam eksploitasi seksual anak
 
ID IGF 2016 - Sosial Budaya 3 - Indorelawan
ID IGF 2016 - Sosial Budaya 3 - IndorelawanID IGF 2016 - Sosial Budaya 3 - Indorelawan
ID IGF 2016 - Sosial Budaya 3 - Indorelawan
 
ID IGF 2016 - Sosial Budaya 2 - Aktivisme Digital ala Indonesia
ID IGF 2016 - Sosial Budaya 2 - Aktivisme Digital ala IndonesiaID IGF 2016 - Sosial Budaya 2 - Aktivisme Digital ala Indonesia
ID IGF 2016 - Sosial Budaya 2 - Aktivisme Digital ala Indonesia
 
ID IGF 2016 - Hukum 2 - Cybersecurity dan HAM
ID IGF 2016 - Hukum 2 - Cybersecurity dan HAMID IGF 2016 - Hukum 2 - Cybersecurity dan HAM
ID IGF 2016 - Hukum 2 - Cybersecurity dan HAM
 
ID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilience
ID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilienceID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilience
ID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilience
 

idigf - hukum - ui - edmon makarim

  • 1. Cyberlaw and Sovereignty Oleh : Dr. Edmon Makarim, S.Kom, SH, LLM
  • 2. Outline • Apakah substansi Cyberlaw = Internet Governance ? – Law of Info-comm sesungguhnya lebih luas dari Internet Law – Internet Governance adalah tata kelola pemanfaatan Internet utk melindungi dan mengembangkan kepentingan nasional (bangsa dan negara) • Apa dan bagaimana “trustworthiness” terhadap Internet ..? – Sejauhmana cybersecurity => accountability + responsibility/liability • Apakah yang selayaknya menjadi Fokus Materi – Hukum dalam arti luas ataukah dalam arti sempit ? • Apakah yang menjadi “mimpi” atau cita-cita besar kita sebagai bangsa dan negara dengan pemanfaatan Internet ? – Melihat posisi strategis maka tampaknya kita layak menjadi Hub atau bahkan mungkin Sentra komunikasi dan informasi dunia.
  • 3. Source: Jovan Kurbalija, An introduction to Internet Governance, Diplo Foundation
  • 4. Law of Information & Communication Sistem hukum yang berlaku dalam konteks cyberspace. ICT Law => Telematika Cyberspace law Cybersecurity E-commerce cybercrime E-government Sources: Cybersecurity (ITU) + Redesigning E-gov
  • 5. Keterpaduan Paradigma ICT Law/Cyber Law/Internet Law + Internet Governance Cyber Law Paradigm: Internet Governance Ethics & Law of ICT Libertarian vs Paradigm (global common good/national public interest): Paternalistic / (main issues,5 • Privacy, Conservative basket): • Accuracy, • Sistem hukum yang • Resources • Property, berkenaan dengan • Economy • Accessibility/ Availability cyberspace baik dalam • Legal • Responsibility lingkup nasional • Development • Accountability maupun internasional. • Due Process • Socio-cultural • Liability • (Andrew Murray, (Jovan Kurbalija) (AM De joie et.al + Kenneth C Cyberspace Laudon Regulation) Global Cybersecurity Agenda (ITU) Indonesian Commitment to Internet Governance + Law of Info-comm
  • 6. Internet Governance The WGIG Report (2004), Jovan Kurbalija Fokus Materi IGF ala Identified four main areas (five baskets) Indonesia • Issues related to infrastructure and the Perspektif hukum dalam arti luas management of critical Internet Infrastruktur dan resources. Standarisasi bukan dalam arti sempit • Isues related to the use of the Internet • Constitutional Rights and ICT including spam network security and Legal: cybercrime. -Jurisdiction (New Technologies) => Privacy & - Cybercrime (include IPR’s) Data Protection - Alternative Dispute Resoultion • Issues relevant to the Internet but have • Internet Cryptography + Security an impact much wider than the Internet Economy and for which existing organisations are • Infrastruktur & Standarisasi responsible such as in Intellectual • E-government + e-ID property right (IPR) or international trade. Management (access to e-public • Issues related tot the developmental services) aspects of Internet governance in Development • E-commerce + ADR particular capacity building in developing countries. • Cyber-crime (including IPR) Socio Cultural • Jurisdiction
  • 7. Constitutional Rights & ICT Intenational Instruments of Human Rights: • Freedom of Expression Ethics: • Access to knowledge • Privacy, • Access to technology • Accuracy, • Access to administration • Property, • Privacy, Dignity & Reputation • Accessibility/Availability • Right Against Self-Incrimination Constitution • Due Process of Law Other • Responsibility • Accountability UUD-NRI 1945 Countries • Due Process (Amend 1-4) Constitution • Liability Public Interest and Individual Rights: Public Trust Obligation • Freedom of Expression • Privacy (Anonymity, Reputation) • Freedom of Expression and the Press • Property • Public infrastructure • Access to Public Information • Administration • Rights Against Self Incrimination • E-voting • Security Legislation Products and Cases
  • 8. Keranjang Hukum • Fokus Materi (pemanfaatan internet yang sesuai dengan kepentingan nasional) 1. Yurisdiksi => Ekstra-teritorial + multilateral 2. Keberlakuan HKI (Hak Cipta) 3. Keamanan critical public infrastructure 4. Cybercrime (Mutual Legal Assistance) 5. Alternative Online Dispute Resolution => Badan Arbitrase + BPSK
  • 9. Fokus Materi (1) dampak Crossborder: Sovereignty  Jurisdiction (Negara Mana Yang Berhak Menghukum ?) • Warga Negara Siapa ? • Dimana dilakukannya (apakah delik formil) ? • Dimana Victim dan Akibat serious damages-nya (apakah delik materil) dan bgmn kepentinga nasionalnya ? • Dimana bukti dapat diperoleh ? • Dimana Suspect dapat ditangkap? • adakah perjanjian ekstradisi ? • Dimana Ancaman Pidana Yang Sesuai Nilai Keadilan • Dimana Fair Trial / impartial Transfer of Proceedings
  • 10. Fokus Materi (2) : Property vs Propriety • Mungkinkah IP Abuse => – Larangan melanggar Kepentingan ekonomi nasional + unfair competition – Jangan membuat barriers for access to knowledge – Jangan mensalahgunakan Pendaftaran, Pencatatan krn vs Prinsip Originalitas Ciptaan – Sham litigation => eksploitasi • Kriminalisasi Pelanggaran – TRIPS mengamanatkan piracy on commercial scale bukan commercial use ? • Indonsia perlu Aturan ttg IP Abuse • Indonesia perlu membuat Watchlist Source: Jovan Kurbalija, An introduction to Internet Governance
  • 11. Spectrum of License All rights Public Domain: reserved - Moral right - Economical Rights Haruskah didaftarkan ?
  • 12. Fokus Materi (3) : Security + National e-Authentication Perlu aturan ttg • Kebijakan Kriptografi • classified Information • Privacy & Data Proteksi • National Root CA + BridgeCA • National Gateway ? Cross Recognition Models Regulations of PKI • Self-Regulation =>communities PKI • “Mesh” PKI => Peer-to-peer • “bridge” CSP.
  • 13. Fokus Materi (5) = Conducive/Cost Effective + Efficiency Economy + ADR • Penerapan e-Apostile (Hague Agreement 1961) => Mengilangkan Inefisiensi Lintas Authenticity Document utk National dan International Private Transaction => Cybernotary/e-Notary (setidaknya untuk RA dan pembuatan salinan otentik elektronik) • Cost effective terhadap Tax (reporting dan clearing house dan Duty- stamp ? • Voluntary Accreditation/Accredited-List bagi para penyelenggara layanan (IS Provider) dan Profesional Penunjang TIK • Forum dan Mekanisme untuk Coercive Self-Regulation • Kejelasan aturan E-payment system dan e-Transferable Records (e- money) • Komitmen untuk mengembangkan National Data Centre • Consumer Protection Right => White-list (paling tidak harus ada notice, choice dan consent serta jaminan limitation purpose dan “preventing harm”) • Mediasi dan Arbitrase => BAM-HKI dan Badan Penyelesaian Sengketa Konsumen
  • 16. Konvergensi Industri • Telematics Convergence => content, network & services – Industry restructure <=> ICT/multimedia orientation – Scope of content industry => digital works & services (text, US$ 25.000 picture/images, audio, Enthropia video, etc) Universe • Database • Computer program • Games • news • E-book • Photograph US$ 800.000 US$ 299 • Music Point Blank Virtual Wolrd of Warcraft • Paintings • Maps Property • etc
  • 17. (ITU => Cybersecurity) • “Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. – [Organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment]. • Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. The general security objectives comprise the following: Availability; Integrity,( which may include authenticity and non-repudiation); Confidentiality • The Global Cybersecurity Agenda has seven main strategic goals, built on five work areas: 1) Legal Measures => cybercrime legislation 2) Technical and Procedural Measures => End users and businesses (direct approach); and Service providers and software companies 3) Organizational Structures => highly developed organizational structures, avoid overlapping, 4) Capacity Building & User’s education => public campaigns + open communication of the latest cybercrime threats 5) International Cooperation => Mutual Legal Assistance of the LEA’s
  • 18. Extra Teritorial Jurisdiction • Pasal 2 : Undang-undang ini berlaku untuk : – Setiap orang yang melakukan perbuatan hukum sebagaimana diatur dalam UU ITE; – Baik yang berada di wilayah hukum Indonesia maupun di luar wilayah hukum Indonesia; – Yang memiliki akibat hukum di wilayah hukum Indonesia dan/atau diluar wilayah hukum Indonesia dan merugikan kepentingan Indonesia. Crime Merugikan kepentingan Indonesia: meliputi & tidak terbatas pada merugikan kepentingan Ekonomi indonesia, perlindungan data strategis, harkat dan martabat bangsa, pertahanan & keamanan negara, kedaulatan negara, warga negara, serta badan hukum Indonesia. 18
  • 19. Ketahanan Bangsa mampukah menghadapi AGHT => pengaruh dari luar dan mengendalikan hasrat dari dalam …??? • Orang => Warga • Privacy, Dignity & Reputation Negara, Bangsa (HAM setiap orang) dan Negara • Sumber Daya • Kesejahteraan (ps33 UUD 45) dan Utilitas Publik • Pemerintah dan • Melindungi atau menghianati Sistem Hukum konstitusi (cita2 luhur bangsa)