Application of The Principles of Extraterritorial Jurisdiction Towards Personal Data Breach Committed Cross-Country Borders
Main Article Content
Abstract
Cybercrime is a reality that has emerged with the era of digitalization. One of the most commonly occurring cybercrimes is personal data theft. In light of Regulation No. 27 of 2022 regarding the Protection of Personal Data, which has extraterritorial application, it is essential to critically assess the jurisdiction applied to offenders involved in transnational personal data theft. The writer conducted normative research for this narrative, utilizing various scientific approaches such as statute, conceptual, and comparative analysis. This research uses Regulation No. 27 of 2022 as the analytical tool for domestic regulation towards the different conventions and regulatory frameworks within international law pertaining to the enforcement of personal data theft. The research leads to the conclusion that a domestic regulation with extraterritorial traits alone is not the ultimate solution for successfully applying extraterritorial jurisdiction for transnational offenders. In summary, an international framework that promotes and sustains intensive international cooperation is necessary to effectively enforce extraterritorial jurisdiction against offenders involved in transnationally committed personal data theft.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
All writings published in this journal are personal views of the authors and do not represent the views of this journal and the author's affiliated institutions. Author(s) retain copyrights under the licence of Creative Commons 4.0 International (CC BY 4.0).Â
References
Asean Summit. “ASEAN Declaration to Prevent and Combat Cybercrime.” Asean Summit, 2017. https://asean.org/wp-content/uploads/2017/11/ASEAN-Declaration-to-Combat-Cybercrime.pdf.
Bali, Vinita. “Data Privacy, Data Piracy: Can India Provide Adequate Protection for Electronically Transferred Data?” Temple International and Comparative Law Journal 21, no. 103 (2007).
Budapest Convention on Cybercrime (n.d.).
“Convention on Cybercrime Procedure Pertaining to Mutual Assistance Request in the Absence of Applicable International Agreement,” n.d.
Efendi, Yoyon. “Internet of Things (IoT) “Sistem Pengendalian Lampu Menggunakan Raspberry PI Berbasis Mobile".” Jurnal Ilmiah Ilmu Komputer 4, no. 1 (2018).
EUROPOL. “Goznym Malware: Cybercriminal Network Dismantled in International Operation.” European Union Agency for Law Enforcement Cooperation, n.d. https://www.europol.europa.eu/media-press/newsroom/news/goznym-malware-cybercriminal-network-dismantled-in-international-operation.
Fahamsyah, Ermanto, Vicko Taniady, Kania Venisa Rachim, and Novi Wahyu Riwayanti. “Penerapan Prinsip Aut Dedere Aut Judicare Terhadap Pelaku Cybercrime Lintas Negara Melalui Ratifikasi Budapest Convention.” Jurnal Hukum Dan Syariah De Jure 14, no. 1 (2022).
Firdaus, Muhammad. “A Review of Personal Data Protection Law in Indonesia.” Interdisciplinary Program of Information Security. Graduate School PKNU, 2022. https://osf.io/tmnwg/download.
Gercke. “The Slow Wake of a Global Approach Against Cybercrime.” Computer Law Review International, 2006.
Gercke, Marco. “Understanding Cybercrime: Phenomena, Challenges, and Legal Response.” International Telecommunications Union, 2012.
Greco, Gianpero, and Nicola Montinaro. “The Phenomenon of Cybercrime: From the Transnational Connotation to the Need of Globalization of Justice.” European Journal of Social Sciences Studies 2, no. 1 (2021).
INTERPOL. “‘Avalanche’ Network Dismantled in International Cyber Operation,” n.d. https://www.interpol.int/ar/1/1/2016/Avalanche-network-dismantled-in-international-cyber-operation.
Law no. 19 of 2019 concerning Amendments to Law no. 11 of 2008 concerning Information and Electronic Transactions (n.d.).
Law No 27 of 2022 on Personal Data Protection (n.d.).
Lund, Susan, James Manyika, and James Bughin. “Globalization Is Becoming More About Data and Less About Stuff.” Harvard Business Review, 2016. https://hbr.org/2016/03/globalization-is-becoming-more-about-data-and-less-about-stuff.
Makarim, Edmon. “Penelitian Lembaga Kajian Hukum Teknologi Fakultas Hukum Universitas Indonesia (LKHT) Dalam RDPU RUU PDP,” n.d. https://www.dpr.go.id/dokakd/dokumen/K1-RJ-20200701-114522-4891.pdf.
OECD. “Guidelines on the Protection of Privacy and Transborder Flows of Personal Data.” OECD Publishing, 2002. https://doi.org/https://doi.org/10.1787/9789264196391-en.
Park, Jihyun, and Dodik Setiawan Nur Heriyanto. “In Favor of an Immigration Data Protection Law in Indonesia and Its Utilization for Contact Tracing.” Prophetic Law Review 4, no. 1 (2022).
Pembukaan Convention on Cybercrime (n.d.).
Perloff, Alexandra, and Girles. “Transnational Cyber Offenses: Overcoming Jurisdictional Challenges.” Yale Journal of International Law 43, no. 191 (n.d.).
Pope, Henry. “Organized Crime and Corruption Reporting Project,” 2021. https://www.occrp.org/en/daily/15419-ukraine-switzerland-arrest-12-suspects-of-international-cybercrime.
Rachman, Arrijal. “3 Miliar Data Sim Card Bocor, Kominfo: Baru 15-20 Persen Yang Cocok.” Tempo.co. Accessed September 5, 2023. https://bisnis.tempo.co/read/1630609/13-miliar-data-sim-card-bocor-kominfo-baru-15-20-persen-yang-cocok#:~:text=Senin%2C 5 September 2022 14%3A48 WIB&text=Dari hasil penelusuran sementara dengan,data SIM Card yang bocor.
Ransomware Gang Dismantled with Eurojust Support. “European Union Agency for Criminal Justice Cooperation,” 2021. https://www.eurojust.europa.eu/news/ransomware-gang-dismantled-eurojust-support.
Rawat, Meetali. “Transnational Cybercrime: Issue of Jurisdiction.” International Journal of Law Management & Humanities 4, no. 2 (2021).
Stahl, William M. “The Uncharted Waters of Cyberspace: Applying the Principles of International Maritime Law to the Problem of Cybersecurity. 40 GA.” Journal of International and COMP. Law, 2012.
Suseno, Sigid. “Pengaturan Dan Penegakan Hukumnya Di Indonesia Dan Amerika Serikat.” Jurnal Ilmu Hukum Padjajaran 33 (2009).
Tech. of the H. Comm. on Sci. The Love Bug Virus: Protecting Lovesick Computers from Malicious Attack: Hearing Before the Subcomm. United State of America, 2000.
The United States Departemen of Justice (DoJ) Press Release. “Thirty-Six Defendants for Alleged Roles in Transnational Criminal Organization Responsible for More than $530 Million in Losses from Cybercrime,” 2018. https://www.justice.gov/opa/pr/thirty-six-defendants-indicted-alleged-roles-transnational-criminal-organization-responsible.
United States District Court. Nevada: United States of America v Svyastoslav Bondarenko (2019).