A guideline to enforce privacy and data protection regulation in Indonesia

Indonesia has enacted the first cyberlaw, UU ITE 11/2008 as legal certainty and foothold to support transaction of electronic commerce in the Internet, within the boundaries of Indonesia. Generally, the regulation can be divided into two parts, the rule about concept of information, contract, certification and prohibition of illegal practice in terms of e-commerce through statement of remedies. In article 26 verse 1; it stated about the use of every information should be based on the user’s consent. Unfortunately, the nature of UU ITE is still common and basic as fundamental law to set standard in fulfilling cyber requirement. Therefore, the primary component for electronic commerce to run smoothly resides on process of collecting the data as input to the database derived from customer submission or transaction logs. However, no clear and concrete statement in the first Indonesia cyberlaw to accommodate with this matter whereas data is the critical factor determining the successes and set inter-relationship between party. This paper will present guideline in applying privacy and data protection regulation in Indonesia, specifically in terms of commercial and administrative purpose.

[1]  M. Gordon A Framework for the Protection of Privacy in an Electronic Health Environment , 2010 .

[2]  Jens H. Weber,et al.  Beyond privacy policies - assessing inherent privacy risks of consumer health services , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.

[3]  William L. Prosser Philosophical Dimensions of Privacy: Privacy [a legal analysis] , 1984 .

[4]  Paul M. Schwartz,et al.  German and U.S. Telecommunications Privacy Law: Legal Regulation of Domestic Law Enforcement Surveillance , 2003 .

[5]  Tracy Ann Kosa,et al.  Vampire bats: Trust in Privacy , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[6]  Ali Dehghantanha,et al.  A Guideline to Enforce Data Protection and Privacy Digital Laws in Malaysia , 2010, 2010 Second International Conference on Computer Research and Development.

[7]  Mark Scherling,et al.  OECD Privacy Principles , 2011 .

[8]  F. Maulana,et al.  Information and electronic transaction law effectiveness (UU-ITE) in Indonesia , 2010, Proceeding of the 3rd International Conference on Information and Communication Technology for the Moslem World (ICT4M) 2010.

[9]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[10]  Stefanos Gritzalis Enhancing Privacy and Data Protection in Electronic Medical Environments , 2004, Journal of Medical Systems.

[11]  Adam P. Warren Right to privacy? The protection of employee personal data in the UK , 2002 .

[12]  Jeremy J. Albright Privacy Protection in Social Science Research: Possibilities and Impossibilities , 2011, PS: Political Science & Politics.

[13]  J. C. Cannon Privacy: What Developers and IT Professionals Should Know , 2004 .

[14]  Yufei Yuan,et al.  Privacy protection in electronic commerce - a theoretical framework , 2001 .