Privasi Digital dan Kejahatan Phishing di Indonesia: Evaluasi Kritis terhadap Efektivitas UU ITE dan UU PDP

Authors

  • Devi Anjheli UIN Sunan Kalijaga Yogyakarta

DOI:

https://doi.org/10.14421/990epf27

Keywords:

phising, kebocoran data, privasi digital, hukum siber, UU ITE, UU PDP

Abstract

The rapid development of information technology has given rise to new and increasingly complex challenges, one of which is phishing. This study aims to evaluate the legal aspects of data breaches caused by phishing in Indonesia and assess the effectiveness of existing regulations in protecting users’ digital privacy rights. Using a normative juridical approach and descriptive qualitative method, this research reveals that current regulations, such as the Electronic Information and Transactions Law (UU ITE) and the Personal Data Protection Law (UU PDP), do not comprehensively or specifically address the elements of phishing crimes, particularly in the form of malicious APK files. The 2001 phishing case involving Bank Central Asia’s internet banking service is presented as a historical benchmark for analyzing the weaknesses in Indonesia’s legal framework. The findings show that phishing leads not only to financial loss but also to serious repercussions on users’ reputations, privacy rights, and data security. This study recommends the formulation of a specific regulation on phishing, stronger enforcement of the PDP Law, and enhanced public digital literacy and cybersecurity emergency response systems. The limitation of this study lies in the lack of empirical data from victims or law enforcement authorities; thus, further interdisciplinary and field-based research is highly recommended.

 

Abstrak

Perkembangan teknologi informasi telah melahirkan tantangan baru dalam bentuk kejahatan siber yang kian kompleks, salah satunya adalah phishing. Penelitian ini bertujuan untuk mengevaluasi aspek hukum dari kebocoran data akibat phishing di Indonesia serta menelaah efektivitas regulasi yang ada dalam menjamin hak atas privasi digital pengguna. Dengan menggunakan pendekatan yuridis-normatif dan metode kualitatif deskriptif, penelitian ini menemukan bahwa regulasi seperti UU ITE dan UU PDP belum secara spesifik dan komprehensif mengatur unsur-unsur tindak pidana phishing, khususnya dalam modus melalui file aplikasi (APK). Studi kasus serangan phishing terhadap layanan internet banking BCA tahun 2001 menjadi titik tolak analisis historis tentang lemahnya kerangka hukum nasional. Temuan juga menunjukkan bahwa phishing tidak hanya menyebabkan kerugian finansial, tetapi juga berdampak serius terhadap reputasi, hak privasi, dan keamanan data pengguna. Rekomendasi penelitian ini mencakup perlunya pembentukan regulasi khusus mengenai phishing, penguatan penegakan UU PDP, serta peningkatan literasi digital dan sistem tanggap darurat keamanan siber. Keterbatasan penelitian ini terletak pada minimnya data empiris langsung dari korban atau aparat penegak hukum, sehingga disarankan untuk dilakukan studi lanjutan yang bersifat interdisipliner dan berbasis lapangan

References

Abdullah, Varatisha. “SOSIAL MEDIA SEBAGAI PASAR BAGI MASYARAKAT MODERN (Sebuah Kritik Terhadap Budaya Populer).” Jurnal Dakwah Tabligh 18, no. 1 (2017): 1–15. https://doi.org/10.24252/jdt.v18n1dnk02.

Affeldt, Fabrício Sobrosa, and Sady Darcy da Silva Junior. “Information Architecture Analysis Using Business Intelligence Tools Based on the Information Needs of Executives.” Journal of Information Systems and Technology Management 10, no. 2 (2013): 251–70. https://doi.org/10.4301/s1807-17752013000200004.

Anderson, Ross, Chris Barton, Rainer B¨ohme, Richard Clayton, Carlos Ga˜n´an, Tom Grasso, Michael Levi, Tyler Moore, and Marie Vasek. “Measuring the Changing Cost of Cybercrime.” In Workshop on the Economics of Information Security, 2019. https://doi.org/https://doi.org/10.17863/CAM.41598.

Artanti Zahra Adisa, and Andriyanto Adhi Nugroho. “Perlindungan Hukum Terhadap Korban Phising Terkait Pengiriman File Apk.” Justisi 10, no. 1 (2024): 242–56. https://doi.org/10.33506/js.v10i1.2980.

Arya Budi Mahesa, Septian. “Optimalisasi Undang-Undang Nomor 11 Tahun 2008 Tentang Informasi Dan Transaksi Elektronik Dalam Penanganan Perkara Tindak Pidana Phising.” COMSERVA Indonesian Jurnal of Community Services and Development 2, no. 11 (2023): 2686–96. https://doi.org/10.59141/comserva.v2i11.670.

Bhavsar, Vaishnavi, Aditya Kadlak, and Shabnam Sharma. “Study on Phishing Attacks.” International Journal of Computer Applications 182, no. 33 (2018): 27–29. https://doi.org/10.5120/ijca2018918286.

Brandao, Pedro Ramos, and Henrique S Mamede. “Phishing and Advanced Persistent Threats.” Journal of Mathematical & Computer Applications, 2022, 1–4. https://doi.org/10.47363/jmca/2022(1)105.

Bruce, Miranda, Jonathan Lusthaus, Ridhi Kashyap, Nigel Phair, and Federico Varese. “Mapping the Global Geography of Cybercrime with the World Cybercrime Index.” PLoS ONE 19, no. 4 April (2024). https://doi.org/10.1371/journal.pone.0297312.

Caniago, Koko, and Tata Sutabri. “Tindak Kejahatan Phising Di Sektor Pelayanan Di Universitas Bina Insan Lubuklinggau.” Jurnal Riset Sistem Informasi Dan Teknik Informasi 8, no. 1 (2023): 117–25.

Denisya, Ni Putu, I Nyoman Putu Budiartha, and I Made Aditya Mantara Putra. “Perlindungan Hukum Terhadap Data Pribadi Nasabah Oleh Bank Dalam Transaksi Melalui Internet Banking.” Jurnal Preferensi Hukum 5, no. 2 (2024): 246–52. https://doi.org/10.22225/jph.5.2.8088.246-252.

Desai, C, and V P Desai. “Ensuring Data Security in Human Resource Management: Importance, Challenges &Techniques.” In Sdmimd.Ac.In, n.d. https://www.sdmimd.ac.in/conferenceproceedings/ihr2024papers/IHR2418.pdf.

Dharani, Luh Intan Candhika, Soesi Idayanti, and Kanti Rahayu. Perlindungan Hukum Terhadap Tindakan Phishing Di Media Sosial. Pekalongan: Penerbit NEM, 2024.

Dm, Mohd Yusuf, Addermi, and Jasmine Lim. “Kejahatan Phising Dalam Dunia Cyber Crime Dan Sistem Hukum Di Indonesia.” Jurnal Pendidikan Dan Konseling 4, no. 5 (2022): 8018–23.

Efendi, Sumardi. “Sanksi Kejahatan Penipuan Dengan Identitas Palsu Dalam Kuhp Indonesia Dan Fiqh Jinayah.” Jurnal Syari’ah Dan Peradilan Islam 1, no. 2 (2021): 32–55.

Fauzi, Elfian, and Nabila Alif Radika Shandy. “Hak Atas Privasi Dan Politik Hukum Undang-Undang Nomor 27 Tahun 2022 Tentang Pelindungan Data Pribadi.” Jurnal Lex Renaissance 7, no. 3 (2022): 445–61. https://doi.org/10.20885/jlr.vol7.iss3.art1.

Grabosky, Peter. Cybercrime. Edited by Henry N. Pontell. Oxford University Press, 2015.

Gulo, Ardi Saputra, Sahuri Lasmadi, and Khabib Nawawi. “Cyber Crime Dalam Bentuk Phising Berdasarkan Undang-Undang Informasi Dan Transaksi Elektronik.” PAMPAS: Journal of Criminal Law 1, no. 2 (2021): 68–81. https://doi.org/10.22437/pampas.v1i2.9574.

Harahap, Handika Saputra, Alif Allegra Rahman, Indah Suraswati, and Shelvie Nidya Neyman. “Memahami Cara Kerja Phishing Menggunakan Tools Pada Kali Linux.” Journal of Internet and Software Engineering 1 (2024): 1–11.

Haryanto, Agus Tri. “APJII Jumlah Pengguna Internet Indonesia Tembus 221 Juta Orang.” detiknet, 2024. https://inet.detik.com/cyberlife/d-7169749/apjii-jumlah-pengguna-internet-indonesia-tembus-221-juta-orang.

Hendarto, Ilfa Sholikhah. “Implikasi Pengaruh Minimnya Pengaturan Perlindungan Privasi Data Pribadi Nasabah Pada Perbankan Digital.” Journal Justiciabelen (JJ) 4, no. 02 (2024): 129. https://doi.org/10.35194/jj.v4i02.4440.

Holivia, Anjeli, and Teguh Suratman. “Child Cyber Grooming Sebagai Bentuk Modus Baru Cyber Space Crimes.” Bhirawa Law Journal 2, no. 1 (2021): 1–13. https://doi.org/10.26905/blj.v2i1.5847.

Leticia M. Malunsenge, Cornelis Dj. Massie, and Ronald E. Rorie. “Penegakan Hukum Terhadap Pelaku Dan Korban Tindak Pidana Cyber Crime Berbentuk Phising Di Indonesia.” Lex Crimen, 2022.

Levy, Adam. Avoiding the Ransom Cybersecurity for Business Owners and Managers. Magnet Solution Group Press, 2016.

Lubbad, Anas R M. “Information Technology Readiness and the Assessment and Adoption of Information Technology Innovativeness.” Advances in Life Science and Technology, 2021. https://doi.org/10.7176/alst/90-04.

Ludwianto, Bianda. “91 Juta Data Pengguna Tokopedia Yang Bocor Beredar Gratis Di Facebook,” 2020. https://kumparan.com/kumparantech/91-juta-data-pengguna-tokopedia-yang-bocor-beredar-gratis-di-facebook-1tkItz2vI05?

Manglik, Rohit. Cybercrime, Law and Countermeasures. EduGorilla Publication, 2024.

Maskun. Kejahatan Siber Cybercrime: Suatu Pengantar. Jakarta: Kencana, 2013.

Muftiadi A, Putri Mulyani Agustina T, and Evi M. “Studi Kasus Keamanan Jaringan Komputer: Analisis Ancaman Phising Terhadap Layanan Online Banking.” HEXATECH Jurnal Ilmiah Teknik 1 (2022).

Muhammad, Faiz Emery, and Beniharmoni Harefa. “Pengaturan Tindak Pidana Bagi Pelaku Penipuan Phisning Berbasis Web.” Jurnal Usm Law Review 6, no. 1 (2023): 226. https://doi.org/10.26623/julr.v6i1.6649.

Phishing.org. “History of Phishing.” Accessed March 15, 2025. https://www.phishing.org/history-of-phishing?

Poudel, Bishal, and Satish Kumar Karna. “What Influences a Hacker to Be a Black Hat?” Medicon Engineering Themes, 2024. https://doi.org/10.55162/mcet.06.215.

Pranata, Eko Jhony, and Lukman Ependi. “Phising Terhadap Website Bank Bca.” Jurnal Trends 01, no. 01 (2023): 34–40. https://ejurnal.ibisa.ac.id/index.php/jsd/article/view/293.

Radya Dzuhrizha Rahmana, Adhitya Widya Kartika. “Penegakan Hukum Bagi Pelaku Pembuatan Dan Penyebaran Scam Page (Studi Di Kepolisian Daerah Jawa Timur).” Risalah Hukum 2 (2022): 83–98.

Ramadhanti, Aura Nasha, Tessa Ayuning Tias, Erin Dwi Lestari, and Asmak UI Hosnah. “Cara Operasi Kejahatan Phising Di Ranah Siber Yang Diatur Oleh Positif Indonesia.” Jurnal Pendidikan Tambusai 8, no. 1 (2024): 1299–1305.

Sari, Rita Puspita. “RI Masuk 10 Besar Kebocoran Data, Hampir 100 Juta Akun Bocor,” 2024. https://csirt.or.id/berita/ri-masuk-10-besar-kebocoran-data?

Setiawan, Herdi, Mohammad Ghufron, and Dewi Astutty Mochtar. “Perlindungan Hukum Terhadap Data Pribadi Konsumen Dalam Transaksi E-Commerce.” MLJ Merdeka Law Journal 1, no. 2 (2020): 102–11. https://doi.org/10.26905/mlj.v2i1.5496.

Sinaga, Oriza, Lucysera, Khodijah Ismail, Dimas Syahpura, and Amalia Pitri. “Pengaruh Perkembangan Teknologi Terhadap Pola Komunikasi Masyarakat.” JURNAL SIMBOLIKA Research and Learning in Comunication 4, no. 2 (2021): 188–99. https://www.researchgate.net/publication/348408331_Pengaruh_Perkembangan_Teknologi_Terhadap_Pola_Komunikasi_Masyarakat.

Steinmetz, Kevin F., Brian P. Schaefer, Adrienne L. McCarthy, Christopher G. Brewer, and Don L. Kurtz. “Exploring Cybercrime Capabilities: Variations Among Cybercrime Investigative Units.” Criminal Justice Policy Review 35, no. 4 (2024): 194–215. https://doi.org/10.1177/08874034241265106.

Teo, Thompson S.H. “Differential Effects of Occupation on Internet Usage.” Internet Research 8, no. 2 (1998): 156–65. https://doi.org/10.1108/10662249810211629.

Wall, David S. “Cybercrime: The Transformation of Crime in the Information Age, 2nd Edition, Cambridge: Polity (Outline of Update).” SSRN Electronic Journal, 2024. https://doi.org/10.2139/ssrn.4707509.

Warren, Samuel D., and Louis D. Brandeis. The Right to Privacy. Boston: Lawrence University, n.d. https://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html.

Yuspin, Wardah, Alda Oktalivia Putri, Ata Fauzie, and Jompon Pitaksantayothin. “Digital Banking Security: Internet Phishing Attacks, Analysis and Prevention of Fraudulent Activities.” International Journal of Safety and Security Engineering 14, no. 6 (2024). https://doi.org/10.18280/ijsse.140605.

Zhipeng, Ye. “The Social Impact of the Evolution of Internet Language: A Critical Discourse Analysis of Popular Internet Language.” Lecture Notes on Language and Literature 7, no. 2 (2024). https://doi.org/10.23977/langl.2024.070223.

Downloads

Published

2025-05-26