Desyanti Suka Asih K.Tus
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

PERLINDUNGAN HUKUM TERHADAP KEASLIAN CERITA RAKYAT Desyanti Suka Asih K.Tus
Jurnal Magister Hukum Udayana (Udayana Master Law Journal) Vol 3 No 3 (2014)
Publisher : University of Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (124.648 KB) | DOI: 10.24843/JMHU.2014.v03.i03.p09

Abstract

Requirement of originality is determined by Article 1 paragraph (3) Act Number 19 of 2002 on Copyright can be easily applied to new creations, but when it comes to creations such as traditional folktale takes more search to determine their originality. Folktale began to transferred into another form that is more interesting, but reduce the element of originality to the story so the younger generation may not know the real form of the folktale. Based on that background, this study discussed problem about originality concept on copyright in a work, Act Number 19 of 2002 on Copyright and the Berne Convention and the legal protection on originality of folktale. This study is a normative legal research, using the statute approach and the conceptual approach. The outcome of this study show that the provisions of the originality of an inventions as set forth in Article 1 paragraph (3) of Act Number 19 of 2002 on Copyright defined creativity as the basis for determining the originality of a work. Protection for the originality of folktale can be done with the passage and implementation of documentation Article 15 and Article 35 of Act Number 19 of 2002 on Copyright.
PERLINDUNGAN HUKUM BAGI KORBAN SERANGAN RANSOMWARE Desyanti Suka Asih K.Tus
VYAVAHARA DUTA Vol 16 No 2 (2021)
Publisher : Jurusan Hukum Fakultas Dharma Duta Universitas Hindu Negeri I Gusti Bagus Sugriwa Denpasar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (378.465 KB) | DOI: 10.25078/vyavaharaduta.v16i2.1939

Abstract

Data is an important part of the need in today's Information Technology era. The data of every human individual in the world has a high level of sensitivity for anyone. Data that is currently developing both offline and online data, requires a certain level of security in its access. Good data security techniques are needed in ensuring the confidentiality of a data including from attacks of several types of malware viruses and ransomware.Types of malware viruses and ransomware work with the concept of damaging, stealing and locking data with various purposes, one of which is to make a profit. Ransomware works by locking certain files that are targeted and encrypted so that the data is inaccessible. In the end, if you want to access the stored data, users are required to contact the contact of the creator of the ransoware by paying a certain amount of money in decrypting the locked data. Ransomware can be categorized as cyber extortion. Article 27 paragraph 4 of the ITE Law provides arrangements on the dissemination of information that has extortion content whose provisions are regulated in the Criminal Code. Ransomware meets the elements of the criminal act of extortion as stipulated in the provisions of Article 368 paragraph (1) of the Criminal Code. The perpetrator commits extortion coupled with acidification by closing the victim's access to his data. The government has made legal protection efforts for victims of ransomware among others through the arrangements contained in Article 27 Paragraph (4) of the ITE Law. As well as the application of criminal sanctions of confinement and fines for perpetrators of ransomware crimes. Protection of cyber space users can also be done by individuals (individuals) by building regulations in cyberspace and being vigilant in using the internet. In an effort to provide legal protection for ransomware victims, cooperation is needed between the government as a lawmaker and users (victims of ransomware) cyber space. More advanced and unconventional regulations are critical in dealing with cybercrime. Because all forms of cybercrime cannot be touched by the rule of law.