Pertanggungjawaban Badan Penyelenggara Jaminan Sosial (BPJS) Kesehatan Atas Kebocoran Data Pribadi Pengguna dalam Perspektif Hukum Pidana
DOI:
https://doi.org/10.47134/ijlj.v1i2.2011Keywords:
Personal Data Protection, Data Leakage, Criminal LiabilityAbstract
BPJS Health is the Health Social Security Organizing Agency which is responsible for administering health insurance programs for the Indonesian people. However, in the era of increasingly digitalization, user data leakage is a serious problem that must be handled seriously. User data leaks have become an increasingly disturbing issue in this digital era. One of the entities responsible for maintaining the confidentiality of user data is the Social Security Administering Agency for Health. This article aims to analyze BPJS Health's responsibility for leaking user data from a criminal law perspective. This research uses normative research methods with a statutory approach and related cases in its analysis. The research results show that leakage of user data by the Health Social Security Administering Agency can violate several criminal provisions as stated in Law no. 27 of 2022 concerning personal data protection and based on Law no. 11 of 2008 concerning Information and Electronic Transactions, especially in the context of violations of confidentiality and protection of personal data. It can be concluded that BPJS Health has criminal legal responsibility for user data leaks. To minimize the risk of data leaks, the Social Security Administering Agency for Health needs to improve system security and compliance with personal data protection regulations. Apart from that, the government needs to strengthen supervision and law enforcement in dealing with cases of data leaks involving public entities such as BPJS Health.
References
Ali, M. S. (2018). Sampled-Data Stabilization for Fuzzy Genetic Regulatory Networks with Leakage Delays. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 15(1), 271–285. https://doi.org/10.1109/TCBB.2016.2606477 DOI: https://doi.org/10.1109/TCBB.2016.2606477
Amrani, & Ali, M. (2015). Sistem Pertanggungjawaban Pidana. PT Raja Grafindo.
Fadillah, R. N. (2021). Pertanggungjawaban Pidana Korporasi Terhadap Pt AkuMobil Sebagai Pelaku Penipuan Dan Tindak Pidana Pencucian Uang Dihubungkan Dengan Konsep Vicarious Liability.
Fikri, M., & Alhakim, A. (2022). Urgensi Pengaturan Hukum Terhadap Pelaku Tindak Pidana Pencurian Data Pribadi di Indonesia. YUSTISI, 9(1).
Gupta, S. (2019). Low-power near-threshold 10T SRAM bit cells with enhanced data-independent read port leakage for array augmentation in 32-nm CMOS. IEEE Transactions on Circuits and Systems I: Regular Papers, 66(3), 978–988. https://doi.org/10.1109/TCSI.2018.2876785 DOI: https://doi.org/10.1109/TCSI.2018.2876785
Hamzah, A. (1994). Asas-Asas Hukum Pidana. Rineka Cipta.
Hiariej, E. O. S. (2015). Prinsip-Prinsip Hukum Pidana. Cahaya Atma Pustaka.
Indonesiawan, R. C. S., Alroy, M., Suci, T. L., & Prasetyo, B. R. (2021). Analisis Privasi Data Pengguna Dalam Instansi Bpjs Kesehatan. Sitasi, 1(1), 174–182.
Johnny, I. (2006). Teori dan Penelitian Hukum Normatif. Bayumedia.
Lacharite, M. S. (2018). Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. Proceedings - IEEE Symposium on Security and Privacy, 2018, 297–314. https://doi.org/10.1109/SP.2018.00002 DOI: https://doi.org/10.1109/SP.2018.00002
Lidwina, A. (n.d.). Kebocoran Data Pribadi yang Terus Berulang. https://katadata.co.id/ariayudhistira/infografik/60b3bbeda4185/kebocoran-data-pribadi-yangterusberulang
Lubis, M. A., & Siddiq, M. (2021). Analisis Yuridis Pertanggungjawaban Pidana Tinjauan Yuridis Penanganan Tindak Pidana. Jurnal Hukum, 3(1), 35–65. DOI: https://doi.org/10.46930/jurnalrectum.v3i1.818
Lubis, P. R. F. (2022). Perlindungan Hak Asasi Manusia Atas Data Pribadi Di Era Digital Dalam Prinsip Negara Hukum Berdasarkan Pancasila.
Marzuki, P. M. (2016). Penelitian Hukum. Kencana Prenada Media Group.
Moghimi, D. (2020). Medusa: Microarchitectural data leakage via automated attack synthesis. Proceedings of the 29th USENIX Security Symposium, 1427–1444.
Patel, S. (2019). Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing. Proceedings of the ACM Conference on Computer and Communications Security, 79–93. https://doi.org/10.1145/3319535.3354213 DOI: https://doi.org/10.1145/3319535.3354213
Peng, X. (2020). Analysis of Magnetic-Flux Leakage (MFL) Data for Pipeline Corrosion Assessment. IEEE Transactions on Magnetics, 56(6). https://doi.org/10.1109/TMAG.2020.2981450 DOI: https://doi.org/10.1109/TMAG.2020.2981450
Ramadhani, A. P. (2020). Perlindungan Hukum Pengguna Marketplace dalam Hal Keamanan Data Pribadi Pengguna.
Rodliyah, R., Suryani, A., & Husni, L. (2020). Konsep pertanggungjawaban pidana Korporasi (Corporate Crime) dalam sistem HuKum pidana indonesia. Jurnal Kompilasi Hukum, 5(1), 191–206. DOI: https://doi.org/10.29303/jkh.v5i1.43
Saleh, A. R. (2021). Perlindungan Data Pribadi Dalam Perspektif Kebijakan Hukum Pidana. HUKMY: Jurnal Hukum, 1(1), 91–108. DOI: https://doi.org/10.35316/hukmy.2021.v1i1.91-108
Setiyono, H. (2002). Kejahatan Korporasi-Analisa Viktimologis dan Pertanggungjawaban Korporasi Dalam Hukum Pidana Indonesia. Averroes Press.
Simpson, S. S. (1993). Strategy, Structure and Corporate Crime. Advances In Criminological Theory, 4, 171.
Suratman, & others. (2014). Metode Penelitian Hukum (Cetakan Kedua). Alfabeta.
Susanto, I. S. (1995). Kejahatan Korporasi. Badan Penerbit Universitas Diponegoro.
Toruan, H. D. L. (2014). Pertanggungjawaban pidana korupsi korporasi. Jurnal Rechts Vinding: Media Pembinaan Hukum Nasional, 3(3), 397–416. DOI: https://doi.org/10.33331/rechtsvinding.v3i3.33
Yuniarti, S. (2019). Perlindungan hukum data pribadi di Indonesia. Business Economic, Communication, and Social Sciences Journal (BECOSS), 1(1), 147–154. DOI: https://doi.org/10.21512/becossjournal.v1i1.6030
Yurizal. (2018). Penegakan Hukum Tindak Pidana Cyber Crime di Indonesia. Media Nusa Kreative.
Zuo, C. (2019). Why does your data leak? uncovering the data leakage in cloud from mobile apps. Proceedings - IEEE Symposium on Security and Privacy, 2019, 1296–1310. https://doi.org/10.1109/SP.2019.00009 DOI: https://doi.org/10.1109/SP.2019.00009
Downloads
Published
How to Cite
License
Copyright (c) 2023 One Maulida , Hari Utomo

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.