In a world where the internet flows through our veins – connecting us, making work easier and entertaining us until there’s literally nothing left to watch – there’s also that darker-side. This borderless digital world has also given birth to new, more sophisticated and harder-to-trace forms of crime. That’s why the knowledge of the law for cyber criminals not only becomes an academic study, but also a guidebook so that each individual, company and OTT service provider in Indonesia could find a way for themselves to avoid being criminalised.
Cyber law, also known as cyber crime law, is legislation related to the internet and technological devices which is used as a method of fraud. From slander on social media to mass data breaches, everything comes under the applicability of this.
This post will be your all-encompassing guide. We’ll discuss the definition and fundamental basis of the law (the ITE Law), some common cybercrime cases, explore how authorities in Indonesia are responding to these crimes, and offer you tips for safer Internet use. So let’s take this journey toward becoming a more secure and legally savvy digital citizen.
What is Cyber Criminal Law? Definition and Scope
Simply put, cyber criminal law is a branch of criminal law that specifically regulates acts categorized as crimes or violations in cyberspace. Its scope covers:
- Technology Using Acts : Crimes in which technology (computers, smart phones, web) is the method used to cause some sort of more traditional crime that we thought up before our break-ins and Ponzi schemes.
- Acts Targeting Technology: Those crimes in which technology is the target, including hacking, virus spreading and Denial of Service (DoS) attacks.
- Acts Against Data and Information: Crimes that focus on stealing, corrupting, or misusing data, including personal, financial, and state secret data.
Unlike conventional criminal law which handles physical crimes, cyber criminal law has unique characteristics:
- Virtual Crime Scene: The “crime scene” is no longer a physical location but rather a server, network, or IP address that can be anywhere, even in another country.
- Digital Evidence: Evidence like activity logs, emails, chat histories, and metadata is highly volatile and can be easily lost, altered, or deleted. Its handling requires specialized expertise in digital forensics.
- Anonymity: Cybercriminals often hide their identities behind avatars and anonymous accounts, making the identification process a significant challenge.
- Cross-Jurisdiction: The internet knows no borders. A crime committed from one country can harm a victim in another, creating complex legal jurisdictional issues.
The Basic Law: The Basic Understanding to the ITE Act and Its Amendment
The main regulations related to cyber criminal law in Indonesia is Law Number 11 Year of 2008 on Information and Electronic Transaction (ITE). This legislation has subsequently been heavily amended by Law 19 of 2016.
The ITE Law is not all about crime but also, regulates other objects in the digital::
- Electronic information and documents as evidence in law.
- Electronic signatures.
- Electronic transaction systems as organizational networks
- The protection of personal rights.
- Responsibilities between application providers and network providers.
However, for our discussion of cyber criminal law, our focus is on Chapters V and VI of the ITE Law, which address Crimes of Information and Electronic Transactions and Investigation, Prosecution, and Examination in Court.
Some of the crucial articles in the ITE Law that often form the basis of law enforcement are:
- Article 27: Regulates the prohibition of distributing content containing:
- (1) Pornography.
- (2) Gambling.
- (3) Defamation and disparagement.
- (4) Violence or threats of violence.
- Article 28: Regulates the prohibition of distributing information intended to incite:
- (1) Hatred or hostility towards individuals and/or specific community groups based on ethnicity, religion, race, and inter-group relations (SARA).
- (2) False and misleading information (hoaxes) that result in consumer losses.
- Article 29: Mandates electronic service providers to block or remove illegal content.
- Article 30: Prohibits illegal access into electronic systems and/or electronic data.
- Article 31: Prohibits the interception of electronic information.
- Article 32: Prohibits the intentional insertion, transmission, or dissemination of Electronic Information and/or Electronic Documents containing threats of violence or intimidation directed at an individual.
- Article 36: Prohibits the distribution of information intended to incite hatred or hostility based on SARA.
Each of these articles has its own criminal sanction stipulated in Chapter VII, ranging from fines to imprisonment for a specified period.
Types of Cybercrime Regulated under Cyber Criminal Law
To gain a deeper understanding, let’s break down the various types of cybercrime that most frequently occur in Indonesia and how the ITE Law addresses them.
1. Defamation and Hate Speech
This is one of the most reported cyber offenses. Social media has become a primary vehicle for spreading such negative content.
- Defamation: Regulated in Article 27 paragraph (3) of the ITE Law. This is the act of attacking someone’s honor or reputation by uploading, sending, and/or disseminating electronic information and/or documents that contain defamation and/or disparagement.
- Example: Writing a Facebook post that accuses someone of being a fraud without strong evidence, or spreading an edited screenshot of a private conversation to ruin someone’s reputation.
- Sanction: Article 45 paragraph (3) of the ITE Law threatens the perpetrator with a maximum imprisonment of 4 (four) years and/or a maximum fine of Rp750,000,000.00 (seven hundred fifty million rupiah).
- Hate Speech: Regulated in Article 28 paragraph (2) of the ITE Law. This is the act of distributing information intended to incite hatred or hostility towards individuals and/or specific community groups based on ethnicity, religion, race, and inter-group relations (SARA).
- Example: Publishing posts or videos containing foul and provocative language against a particular religious group, or spreading negative stereotypes about a certain ethnicity.
- Sanction: Article 45A paragraph (2) of the ITE Law threatens the perpetrator with a maximum imprisonment of 6 (six) years and/or a maximum fine of Rp1,000,000,000.00 (one billion rupiah).
2. Online Fraud
This crime exploits the ignorance or negligence of victims to gain illegal financial benefits.
- Legal Basis: Article 28 paragraph (1) of the ITE Law. This article prohibits any person from intentionally and without right distributing and/or transmitting and/or making accessible Electronic Information and/or Electronic Documents containing gambling, extortion, or embezzlement.
- Types of Online Fraud:
- E-commerce Scams: Selling non-existent goods, sending items that do not match the description, or not sending anything at all after payment is made.
- Fake Investments: Offering unrealistic returns (profits) through online platforms to attract investors.
- Phishing: Sending emails or messages disguised as legitimate institutions (banks, e-commerce sites) to trick victims into providing sensitive information like passwords and credit card data.
- “Money Mule” Schemes: Asking someone else to receive and transfer money from criminal activities in exchange for a commission.
- Sanction: Article 45 paragraph (1) of the ITE Law threatens the perpetrator with a maximum imprisonment of 6 (six) years and/or a maximum fine of Rp1,000,000,000.00 (one billion rupiah).
3. Hacking and Illegal Access
Hacking is the act of entering a computer system or network without permission. The motives can range from mere curiosity to stealing data or damaging the system.
- Legal Basis: Article 30 paragraph (1) of the ITE Law. “Any person who intentionally and without right or against the law accesses a Computer and/or Electronic System belonging to another person in any way.”
- Examples: Breaking into someone else’s email account, defacing a government or corporate website, or accessing a company’s customer database.
- Sanction: Article 46 paragraph (1) of the ITE Law threatens the perpetrator with a maximum imprisonment of 6 (six) years and/or a maximum fine of Rp600,000,000.00 (six hundred million rupiah). If the act results in damage, disruption, or the malfunctioning of the Electronic System (Article 30 paragraph 2), the sanction can be more severe.
4. Theft and Misuse of Personal Data
Personal data is a valuable asset in the digital age. Your name, address, phone number, and even your internet search history can become targets for crime.
- Legal Basis: Article 26 paragraph (1) of the ITE Law states that “unless stipulated otherwise by laws and regulations, the controller of Personal Data is prohibited from collecting, processing, analyzing, storing, displaying, transmitting, announcing, and/or disseminating the Personal Data of the data owner.”
- Examples: An application company selling its user data to third parties without consent, or a hacker stealing a customer database and selling it on the dark web.
- Connection with the PDP Law: Currently, the protection of personal data in Indonesia is further strengthened by the enactment of the Personal Data Protection Law (PDP Law). The PDP Law provides a more specific and stringent legal framework for handling personal data, which will work in tandem with the ITE Law.
- Sanction: Violation of Article 26 can be sanctioned according to Article 52 of the ITE Law, with a maximum imprisonment of 6 (six) years and/or a maximum fine of Rp600,000,000.00 (six hundred million rupiah).
5. Dissemination of Other Negative Content
The ITE Law also regulates various other illegal contents that can disrupt social and moral order.
- Pornographic Content (Article 27 paragraph 1): Creating, storing, or distributing images, videos, or writings with pornographic nuances.
- Gambling Content (Article 27 paragraph 2): Facilitating or advertising online gambling sites.
- Threats of Violence (Article 29): Sending threats of murder or other forms of violence through electronic media.
- False Information (Hoaxes) (Article 28 paragraph 1 jo. Government Regulation in Lieu of Law No. 1 of 2023): Spreading fake news that can cause public harm or mass panic.
The Law Enforcement Process in Cybercrime Cases
Prosecuting perpetrators of cybercrime is not straightforward. The process involves several stages with its own set of challenges.
- Police Report: The first step is to file a report at a police unit that handles cybercrime, namely the Directorate of Cyber Crime (Dittipidsiber) at the National Police Headquarters or the Sub-Directorate V Cyber at the Provincial Police. The reporter must bring strong initial evidence, such as:
- Screenshots of conversations, posts, or the perpetrator’s account.
- URL links related to the illegal content.
- Transaction data (in cases of fraud).
- Activity logs or email headers (if possible).
- Investigation: The police will conduct an investigation by:
- Digital Forensics: Analyzing electronic devices (phones, laptops) belonging to the reporter or suspect to find digital evidence.
- Tracing IP Addresses: Identifying the location and identity of an internet user through their IP address, which often requires cooperation from Internet Service Providers (ISPs).
- Witness Examination: Requesting testimony from witnesses, including the victim and related parties.
- Prosecution: If the evidence is deemed sufficient, the investigator will submit the case file (P21) to the Prosecutor’s Office to then be brought to court.
- Trial: In court, the public prosecutor and the defendant’s legal counsel will present arguments and evidence. The judge will decide whether the defendant is guilty or not.
Main Challenges:
- Volatile Digital Evidence: Data on the internet can be deleted in a matter of seconds.
- Anonymity and VPNs: Perpetrators often use VPNs or proxies to hide their true location and identity.
- Cross-Border Nature: If the server or perpetrator is located abroad, international legal cooperation is required, a process that is long and complicated.
- Agency Capacity: Limited resources and expertise in digital forensics within law enforcement agencies.
Case Studies: Several Cybercrime Cases that Shocked Indonesia
To provide a real-world picture, let’s look at several cybercrime cases that have been in the public spotlight in Indonesia.
- The Prita Mulyasari Case (2009): Considered one of the pioneering cases of the ITE Law’s application. Prita, a housewife, sent an email complaining about a hospital’s service. She was then reported under the Defamation articles of the Criminal Code and the ITE Law. This case sparked a massive public debate about the “rubber stamp” articles in the ITE Law, which were seen as potentially stifling freedom of expression. Although Prita was eventually acquitted, the case became an important lesson in the evolution of cyber law enforcement in Indonesia.
- The Tokopedia Data Breach (2020): Data from millions of users of the e-commerce platform Tokopedia was suspected to have been leaked and sold on a hacking forum. This case highlighted how vulnerable personal data stored by major tech companies is and underscored the importance of layered cybersecurity for corporations. It also acted as a catalyst for the birth of the PDP Law.
- The “Kaget” Investment Scam (2023): A fake investment application promised extraordinary profits in a short time. After collecting trillions of rupiah from the public, the application suddenly became inaccessible. The victims reported the case to the police on the grounds of online fraud (Article 28 paragraph 1 of the ITE Law). This case is a real example of how the modus operandi of cybercrime continues to adapt to current trends.
Challenges and the Future of Cyber Criminal Law in Indonesia
The world of technology is constantly advancing, and cyber criminal law must continuously adapt. Some of the major challenges facing Indonesia are:
- Evolving Technology: The emergence of new technologies like Artificial Intelligence (AI), the Internet of Things (IoT), and cryptocurrencies creates new criminal loopholes that are not yet specifically regulated in the current ITE Law.
- “Rubber Stamp” Articles: Several articles in the ITE Law, especially concerning defamation, are still considered multi-interpretable. This has the potential to lead to the criminalization of freedom of expression. A comprehensive revision of the ITE Law remains a subject of ongoing debate.
- Increasing Agency Capacity: Significant investment is needed in training, equipment, and human resources to improve the digital forensics and investigative capabilities of the police and prosecutor’s office.
- International Cooperation: Given the cross-border nature of cybercrime, Indonesia needs to strengthen diplomatic and legal cooperation with other countries for the extradition of suspects and the exchange of evidence.
- Integration with the PDP Law: Synergy between the ITE Law and the new Personal Data Protection (PDP) Law must be continuously built to create a robust and non-overlapping digital legal ecosystem.
The future of cyber criminal law in Indonesia lies in its ability to be responsive, proportional, and based on the principles of justice and human rights protection.
How to Protect Yourself from Cybercrime: Practical Tips for Individuals and Businesses
Law enforcement is one side of the coin. The other, equally important side, is prevention. Here are practical steps you can take:
For Individuals/Internet Users:
- Use Strong and Unique Passwords: Combine uppercase letters, lowercase letters, numbers, and symbols. Don’t use the same password for all your accounts.
- Enable Two-Factor Authentication (2FA): This is an extra layer of security that requires a verification code in addition to your password.
- Beware of Phishing: Never click on links or download attachments from suspicious emails or messages, even if the sender appears legitimate. Verify directly through the official website or application.
- Think Before You Share: Limit the personal information you share on social media. Remember, what goes on the internet, stays on the internet.
- Use Security Software: Install and regularly update antivirus, anti-malware, and firewall software on your devices.
- Review Your Privacy Settings: Reset the privacy settings on all your social media and app accounts according to your comfort level.
- Don’t Be Easily Tempted by “Too Good to Be True” Offers: If an investment offer or product discount seems illogical, it’s most likely a scam.
For Businesses/Companies:
- Implement Strict Cybersecurity Policies: From password policies and network access to the use of company devices.
- Conduct Security Awareness Training for Employees: Employees are often the weakest link. Train them to recognize phishing, malware, and other social engineering attacks.
- Perform Regular Security Audits: Hire cybersecurity experts to test the strength of your systems and find security vulnerabilities before hackers do.
- Encrypt Important Data: Protect sensitive customer and company data with encryption, both when stored (at rest) and when transmitted (in transit).
- Create an Incident Response Plan: Prepare a clear protocol for what to do in the event of a data breach or cyber attack, including how to communicate with customers and authorities.
- Comply with the PDP Law: Ensure your company complies with all provisions in the Personal Data Protection Law to avoid legal sanctions and maintain customer trust.
Conclusion: Becoming a Responsible Digital Citizen
Cyber criminal law is a shield that protects us in the midst of the boundless digital ocean. Through the ITE Law and its supporting regulations, the state is present to provide a sense of security and firmly punish perpetrators of cybercrime. However, the law alone is not enough.
Cybersecurity is a shared responsibility. As individuals, we must be proactive in protecting our digital data and identity. As businesses, we have an obligation to safeguard the security of customer data. As a society, we must commit to using the internet ethically, responsibly, and without spreading hatred or falsehood.
By understanding the basics of cyber criminal law, we not only protect ourselves but also contribute to creating a healthier, safer, and more productive digital ecosystem for all. Let’s be smart, critical, and always vigilant internet users. The online world is a reflection of the real world; let’s work together to keep it a positive and beneficial space.






Tinggalkan Balasan