![]() |
| UU ITE 2008 |
UU ITE stands for Undang-Undang Informasi dan Transaksi Elektronik (The Law of Information and Electronic Transactions. This act was designed since March, 2003 by the Ministry of Communications and Technology and then authorized as the fixed act in 2008 (UU Nomor 11 tahun 2008). This act regulated all forms of activities that exist in the virtual world or internet under the auspices Republic of Indonesia.
The contents of the law as written below:
The contents of the law as written below:
1. Website Content Violation
Pornography
Pornography is the most violation that occurred in the virtual world by displaying photos, stories or moving images inappropriate for display. We always find a case when someone manipulates the image or photograph of another person without consent, such as occurs in many porn sites.
Copyright Infringement
Copyright infringement often occurs in both the private and commercial web sites. For example, providing better facilities free download photos, songs, software, film and paper which are copyrighted.
2. Electronic Crime in Commerce
Online Fraud
Crime in electronic commerce (e-commerce) in the form, online scams, multilevel marketing scams online and credit card fraud. According Cahyana, online fraud characteristics that attracted many product prices are very low, the seller does not provide a phone number, no response to questions by e-mail, and promising products that are not available. The worst risk for crime victims are paid but never received the product, or the product was not obtained in accordance with the promised. The characteristics of this crime: the price of the products are widely enjoyed lower, the seller does not provide a phone number, no response to the question via email, promising products that are not available.
Tiered Marketing Scams Online
The characteristic is seeking to profit from recruiting members and selling fictitious products, with a 98 percent risk for the victims of this failed investment or loss.
Credit Card Fraud
The characteristic is there's mysterious charges on the card billing for internet products or services that were never ordered, the victims need time to pay off their credit.
3. Other Violations
Recreational Hacker
The beginner hacker is aimed only to break a system and show less of security system at a company.
Cracker
The beginner hacker is aimed only to break a system and show less of security system at a company.
Cracker
The motivation is to gain a financial profit by doing sabotage to the destruction of the data.
Political Hacker
Political Hacker
A political activity through a web site to attach a message or discredit an opponent.
Denial of Service Attack
Denial of Service Attack
Attack by flooding the huge data and the resulting access to a web site to be very slow or turn into jam or can not be accessed at all.
Viruses
At least 200 new viruses spread through the internet and are usually hidden in a file or an e-mail to be downloaded over a network or the Internet and floppy.
Viruses
At least 200 new viruses spread through the internet and are usually hidden in a file or an e-mail to be downloaded over a network or the Internet and floppy.
Piracy
Piracy software that eliminates the potential revenue of a company that produced such, games, business applications and other copyright.
Fraud
Activities manipulation of information, especially about finances with a target maximum profits. Examples: making a fake phone card.
Phishing
Techniques for personal information such as e-mail addresses and account numbers by sending an e-mail as if it came from the bank concerned.
Gambling
Many forms of gambling casinos operating on the internet that provide opportunities for organized criminal money laundering everywhere.
Cyber Stalking
Constitute any form of e-mail submissions unwanted acceptance and includes measures of coercion.
With the existence of this law, the owner of a work does not have to worry again about the violation on the virtual world, but it also can not guarantee that their work will not be abused, but with the law could at least minimize the piracy activities existing on the virtual world or internet.

0 comments:
Post a Comment