Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Finding a fix for Indonesia’s data protection problems – Monash Lens
Tech

Finding a fix for Indonesia’s data protection problems – Monash Lens

AdminBy AdminJuly 7, 2024No Comments7 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


The increasing incidence of data breaches across government and private sectors in Indonesia has underscored the need for stringent data protection protocols.

In 2022, more than 21,000 companies in Indonesia experienced data breaches. The incidents affected critical sectors, including healthcare, finance, e-commerce and utilities, and highlighted widespread cybersecurity challenges for the country’s business operations.

In one notable incident, the healthcare sector encountered significant security breaches due to unauthorised access to the electronic health alert card (e-HAC) system and the Social Health Insurance Administration Body.

In addition to data breaches, the government’s potential misuse of data for surveillance and its risks to privacy have become serious issues.

The most pressing concern is use of the data for illegal or unethical purposes (such as suppressing legitimate political opposition or targeting vulnerable communities).

The worry is about more than just losing privacy. It’s about the dangers that arise when strong governments control a huge amount of surveillance data, which can lead to abuse of power and erosion of individual freedoms.

A balanced approach is needed

Addressing the risks of data breaches and government surveillance misuse requires a balanced approach that respects national security and individual privacy. This means legal reforms, community vigilance, privacy-centric technologies, alignment with international standards, and promoting ethical practices in government and tech companies.

The active participation of civil society, media and technology companies is critical. By adopting these measures, Indonesia can forge a more transparent and accountable surveillance framework that better-respects individual privacy.

The Personal Data Protection Law, or Act No. 27 of 2022 (UU PDP), is a significant advancement in this respect. There are still uncertainties, however, surrounding its execution, particularly regarding the legal classification of data breaches.

Despite this, the law provides a broad provision stating that individuals whose data has been compromised have the right to take legal action against the data processor and seek compensation.


Read more: So, 83% of Australians want tougher privacy laws. Now’s your chance to tell the government what you want


It’s not yet clear whether this law aligns with the European Union’s General Data Protection Regulation (GDPR) approach, which is mainly civil, and allows individuals to assert their rights in civil court.

The GDPR, which took effect in May 2018, is a comprehensive data privacy law that has significant implications worldwide. It sets stringent requirements and threatens substantial penalties for non-compliance.

The UU PDP doesn’t measure up to the GDPR concerning penal measures for intentionally unlawful data processing and failure to adhere to directions from supervisory authorities.

These aspects of the law require clarification to evaluate its overall effectiveness and scope.

General Data Protection Regulation (GDPR) concept, with abstract computer network background

Implementation doubts

Additionally, the UU PDP has expressed reservations regarding the practicality of implementing the required authority (namely, the Personal Data Protection Authority/PDPA), putting forth the notion of intensive governmental supervision and prioritisation.

The PDPA will be established within the president’s office, and report directly to the president. According to this interpretation, the president has the authority to obstruct the PDPA’s responsibilities in the functioning of the state on the grounds of serving public welfare.

These doubts are dispelled when considering the limited authorities conferred on the PDPA. These authorities encompass the formulation of crucial policies aimed at enhancing the protection of personal data, oversight of personal data protection practices, implementation of administrative regulations, and facilitation of alternative dispute resolution mechanisms.

Consequently, the PDPA predominantly wields administrative authority, further reinforced by its distinct law-enforcement competencies.

Undoubtedly, it’s not nearly as far-reaching as the all-encompassing, independent and resilient personal data protection authority established by the GDPR.

The implementation and enforcement of robust privacy laws similar to the GDPR is critical in Indonesia, so it’s important to learn from the GDPR experience, and to understand that data protection laws can be complicated and may have both positive and negative implications for innovation.

Legal flexibility required

Legal flexibility is essential, such as adopting a risk-based approach that customises data protection techniques according to the level of risk, from minimal to unacceptable.

This flexibility also involves recognising legitimate interests that permit organisations to process personal data without obtaining explicit consent, provided they have a valid business justification that supersedes the individual’s right to privacy.

Further, exceptions for “statistical” processing, which allows for the growth of big data and artificial intelligence, is also crucial.

However, the use of sensitive labels requires rigorous justification, as the processing must be absolutely necessary for the benefit of a significant public interest, rather than merely beneficial for narrow interests.

These laws are crucial in delineating the boundaries of government surveillance.


Read more: Spyware, and the future of public-private collaboration against cybercrime


Establishing independent oversight bodies is necessary to complement these laws to monitor government surveillance activities. Without independent oversight bodies, there’s a greater risk of unchecked, unaccountable government surveillance.

Further, the lack of transparency leaves the public uninformed about the motives and outcomes of surveillance, potentially eroding trust in government actions.

Consequently, surveillance initiatives may face increased scepticism and resistance from the public.

Stylised image of a crowd from above walking over binary code

Community involvement is crucial

Preventing data breaches and mitigating the risks of data misuse also require community involvement. Educating citizens on their digital rights is essential. Public awareness campaigns can effectively convey the extent of these rights and protect privacy.

Additionally, establishing community-based surveillance watch groups can be a vital link between the public and government, overseeing and reporting potential abuse.

Equally important is implementing robust protection for whistleblowers who reveal illegal or unethical surveillance practices, as this promotes internal accountability within government agencies.

The role of civil society and the media cannot be overstated in this context. Non-governmental organisations and civil society groups are instrumental in monitoring government actions and advocating for citizen rights.

Free and independent media is crucial for exposing any misuse of surveillance powers and holding the government accountable. Public protests and advocacy campaigns can effectively push for policy change and increase accountability.


Read more: Disinformation in the city: The challenges facing Australian and Indonesian local governments


Technology also offers solutions for enhancing privacy. Promoting privacy-enhancing technologies, such as encryption and anonymising tools, can protect individual communication and data.

Other technologies that can play a significant role in preventing data breaches include multi-factor authentication, firewall systems to block unauthorised intrusions, intrusion detection systems to monitor network traffic, secure cloud storage solutions, and regular software updates to address security vulnerabilities.

Collectively, these tools enhance cybersecurity and reduce the risk of unauthorised data access. Moreover, government agencies should be encouraged or mandated to adhere to data minimisation principles, collecting only the data essential for a defined purpose and retaining data no longer than necessary.

Meeting the global standards

International collaboration and alignment with global standards are equally important.

Indonesia should align its national surveillance laws with international human rights standards, as set forth by the Universal Declaration of Human Rights (UDHR) and International Covenant on Civil and Political Rights (ICCPR).

Participation in international dialogue (with United Nations bodies, regional forums, bilateral engagements, and relevant international conferences and summits) can offer the opportunity to learn from the experiences and challenges of other countries.

Technology companies and data controllers are also responsible for this. Companies handling significant amounts of data should adhere to ethical practices and resist unjust requests for government data.

Companies can also collaborate with civil society to develop and promote tools that protect individual privacy.

This article was co-authored with Saru Arifin, a tenured lecturer in the Faculty of Law, Universitas Negeri Semarang, Indonesia. 

Originally published under Creative Commons by 360info™.

 



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Indonesia poised to upskill workers in AI, analytics — People Matters Global

July 29, 2024

Imagining the future of the digital economy in Indonesia

July 29, 2024

Mandiri Capital Indonesia partners BTN to launch prop-tech focused fund through BTN Fund

July 29, 2024

How a Chinese rocket failure boosted Elon Musk’s SpaceX in Indonesia

July 29, 2024

Hyundai and Kia Showcase Integrated Air Taxi Service Technology in Indonesia

July 29, 2024

Indonesia’s digital success deserves more attention

July 29, 2024
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025

Testing the handle only to meet the requirements? Time to change your approach

May 15, 2025

5 BCDR Essentials for Effective Rushing

May 15, 2025

New Chrome vulnerability allows for a cross -out data leak through a forklift policy

May 15, 2025

Bion and Ransomexx Exploit SAP Netweaver Nafice for deploying Pipemagic Trojan

May 14, 2025

Samsung Patches Cve-2025-4632 used to deploy Mirai Botnet via Magicinfo 9 Exploit

May 14, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.