<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "https://jats.nlm.nih.gov/publishing/1.3/JATS-journalpublishing1-3.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="1.3" article-type="research-article"><front><journal-meta><journal-id journal-id-type="issn">2549-5615</journal-id><journal-title-group><journal-title>Jurnal Jurisprudence</journal-title><abbrev-journal-title>jurisprudence</abbrev-journal-title></journal-title-group><issn pub-type="epub">2549-5615</issn><issn pub-type="ppub">1829-5045</issn><publisher><publisher-name>Universitas Muhammadiyah Surakarta</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.23917/jurisprudence.v14i2.4266</article-id><article-categories/><title-group><article-title>Comparison Of Protection Laws Private Data In Indonesia, And The Philippines</article-title></title-group><contrib-group><contrib contrib-type="author"><name><surname>Amiludin</surname><given-names>Amiludin</given-names></name><address><country>Indonesia</country><email>tsamanytrans@gmail.com</email></address><xref ref-type="aff" rid="AFF-1"/><xref ref-type="corresp" rid="cor-0"/></contrib><contrib contrib-type="author"><name><surname>Nurhalisa</surname><given-names>Siti</given-names></name><address><country>Indonesia</country></address><xref ref-type="aff" rid="AFF-1"/></contrib><contrib contrib-type="author"><name><surname>Umara</surname><given-names>Undang Prasetya</given-names></name><address><country>Indonesia</country></address><xref ref-type="aff" rid="AFF-1"/></contrib><contrib contrib-type="author"><name><surname>Hidayatullah</surname></name><address><country>Hungary</country></address><xref ref-type="aff" rid="AFF-2"/></contrib></contrib-group><aff id="AFF-1"><institution-wrap><institution>Universitas Muhammadiyah Tangerang</institution><institution-id institution-id-type="ror">https://ror.org/01gngef73</institution-id></institution-wrap><country country="ID">Indonesia</country></aff><aff id="AFF-2"><institution-wrap><institution>University of Miskolc</institution><institution-id institution-id-type="ror">https://ror.org/038g7dk46</institution-id></institution-wrap><country country="HU">Hungary</country></aff><author-notes><corresp id="cor-0"><bold>Corresponding author: Amiludin Amiludin</bold>, Universitas Muhammadiyah Tangerang .Email:<email>tsamanytrans@gmail.com</email></corresp></author-notes><pub-date date-type="pub" iso-8601-date="2024-12-30" publication-format="electronic"><day>30</day><month>12</month><year>2024</year></pub-date><pub-date date-type="collection" iso-8601-date="2024-12-30" publication-format="electronic"><day>30</day><month>12</month><year>2024</year></pub-date><volume>14</volume><issue>2</issue><fpage>171</fpage><lpage>191</lpage><history><date date-type="received" iso-8601-date="2024-2-6"><day>6</day><month>2</month><year>2024</year></date><date date-type="rev-recd" iso-8601-date="2024-5-25"><day>25</day><month>5</month><year>2024</year></date><date date-type="accepted" iso-8601-date="2024-6-10"><day>10</day><month>6</month><year>2024</year></date></history><permissions><copyright-statement>Copyright (c) 2024 Jurnal Jurisprudence</copyright-statement><copyright-year>2024</copyright-year><copyright-holder>Jurnal Jurisprudence</copyright-holder><license xlink:href="https://creativecommons.org/licenses/by/4.0/"><ali:license_ref xmlns:ali="http://www.niso.org/schemas/ali/1.0/">https://creativecommons.org/licenses/by/4.0/</ali:license_ref><license-p>This work is licensed under a Creative Commons Attribution 4.0 International License.</license-p></license></permissions><self-uri xlink:href="https://journals2.ums.ac.id/jurisprudence/article/view/4266" xlink:title="Comparison Of Protection Laws Private Data In Indonesia, And The Philippines">Comparison Of Protection Laws Private Data In Indonesia, And The Philippines</self-uri><abstract><p>To compare private data protection regulations in Indonesia and the Philippines and understand dispute resolution related to private data cases in the two countries. This research method uses literature review studies derived from books and journals or articles that have been published. The research findings reveal a comparison between the Private Data Protection Act in Indonesia and the Philippines. It is noted that the Philippines already has an independent supervisory body, whereas Indonesia does not, despite the establishment of such an institution being regulated by the Private Data Protection Act number 27 of 2022. Additionally, the study aims to understand the dispute resolution mechanisms in case of private data theft in both Indonesia and the Philippines. This study compares the regulations of the Private Data Protection Act in Indonesia and the Philippines, focusing particularly on the establishment of an essential independent supervisory body that needs to be formed in Indonesia. Subsequently, the case resolution mechanisms through Alternative Dispute Resolution can be considered to eliminate practices that tend to be slow, complex, and expensive, as well as to stop corrupt practices in the courts, ensuring that the Indonesian community feels secure and protected. No specific research has been found that compares the regulations on Private Data Protection in Indonesia and the Philippines. This includes the establishment of an independent supervisory body to aid law enforcement authorities in identifying perpetrators of private data theft, providing education, and addressing public inquiries about private data. Additionally, the resolution of cases involving private data theft through alternative dispute resolution is deemed superior to the judicial route due to the frequent practices of being slow, complex, expensive, and corrupt, which can erode or even eliminate the trust of the Indonesian public in law enforcement authorities.</p></abstract><kwd-group><kwd>Data</kwd><kwd>Data Protection</kwd><kwd>Legal Protection</kwd></kwd-group><custom-meta-group><custom-meta><meta-name>File created by JATS Editor</meta-name><meta-value><ext-link ext-link-type="uri" xlink:href="https://jatseditor.com" xlink:title="JATS Editor">JATS Editor</ext-link></meta-value></custom-meta><custom-meta><meta-name>issue-created-year</meta-name><meta-value>2024</meta-value></custom-meta></custom-meta-group></article-meta></front><body><sec><title>INTRODUCTION</title><p>The growing era followed by rapid technological advances like today makes accessing anything via the internet easier, assisted by electronic devices such as cellphones, computers, laptops, and others that are supported by a good network <xref ref-type="bibr" rid="BIBR-24">(Meliala, 2015)</xref>. Increasingly sophisticated technology makes small data can be easily transferred to devices and applications such as email, websites, and others, making it easier for humans to access other people's private data. Advanced information technology creates a relationship between individuals and data controllers <xref ref-type="bibr" rid="BIBR-6">(Dewi, 2016)</xref>. private data that is stored, processed and collected and sorted according to its type needs to provide clarity to the data owner about what the data is used for <xref ref-type="bibr" rid="BIBR-1">(Aliu, 2019)</xref>. A worrying possibility is that the data can be misused by hackers or the company that stores it to be sold secretly to other parties for profit <xref ref-type="bibr" rid="BIBR-5">(Bunga, 2019)</xref>. This is difficult to avoid because the increase in internet users in the world has an impact on private data security. This is due to free access by individuals, government agencies, and parties who misuse data or hackers.</p><p>The sophistication of hackers in stealing other people's private data always follows the times (Maskun et al., 2020). So that it can easily hack into the country's security system. Subsequently, Indonesia genuinely must have a regulation that expressly manages the private data. Many parties will exploit data without regulation <xref ref-type="bibr" rid="BIBR-29">(Prabowo et al., 2020)</xref>. Data is closely related to online trust as a cornerstone of security; if misused, users can suffer financial losses that threaten their safety and security <xref ref-type="bibr" rid="BIBR-38">(Rosadi &amp; Pratama, 2018)</xref>. In Indonesia, for example, there is an online loan case in ruling no. 438/Pid.Sus/2020/PN.JKT.UTR ensnared a debt collector as a suspect. In its verdict, the North Jakarta District Court stated that the suspect DS was sentenced to one year and a half year and an auxiliary fine of Rp 100,000,000, -or three months imprisonment. In this decision, there is also injustice in it, because there is a party, namely his superior named T, who is the deputy director of the company, who did not receive criminal sanctions for his actions (Prasetio, 2020). In addition, the rise of online crime that occurs uses more sophisticated methods so that it seems that it does not leave evidence (Susanto et al., 2017). In the Philippines, for example, there was discussed in NPC decision 21-086. The plaintiff, RTB, filed a complaint with the National Privacy Commission (NPC) alleging that East West Banking Corporation (EWBC) had unlawfully handled and unveiled its confidential data to an outsider assortment organization. After reviewing the complaint, the NPC decided to dismiss RTB's complaint against EWBC after concluding it was done under legitimate criteria. As a result of EWBC's negligence, NPC awarded RTB a compensation (privacy.gov.ph). Until now, no case of personal data has reached the Supreme Court, as only Supreme Court decisions are publicly accessible.</p><p>In accordance with the 1945 Constitution, Indonesia is a constitutional state that guarantees equality for all people under the law. Emphasizing that every individual has the right to acknowledgment, safeguard, security, regulatory certainty, and equivalent treatment under the steady gaze of the law. However, the public authority once in a while disregards the freedoms of its residents because of reasons of "public protection and security" <xref ref-type="bibr" rid="BIBR-26">(Nugraha, 2018)</xref>. The presence of regulation is very important to control humans because it is binding so that humans are expected not to create chaos in the country. Law aims to maintain stability, security, justice, certainty, and usefulness in order to create a prosperous society <xref ref-type="bibr" rid="BIBR-22">(Mawardi, 2015)</xref>. This goal can be realized if the government, law enforcement and the community have legal awareness. In addition, the law must adapt to the times, especially given the social conditions that continue to change due to technological advances <xref ref-type="bibr" rid="BIBR-3">(Atmasasmita, 2014)</xref>. As a state of law, it is necessary to have a legal system because it is a combination of components that form a complex unit that has its own function and is connected into a system according to a pattern.</p><p>Different regulations in different countries based on their legal systems. Until now, Indonesia actually complies to the Continental European legal system, a Dutch heritage regulation that is closely related to the element of legal certainty realized by law enforcement. If a crime occurs, it can be processed criminally because there are laws that are regulated in writing. This system consists of statutes, and customs. Dissimilar to the Philippines, which complies to a mix of the Common Law and Civil Law legal system. The Common Law legal system is constitutional law, procedure, taxation, and more. Conversely, the Civil Law legal system covers succession, property rights, family relations, and more.</p><p>Although law aims to maintain stability, security, justice, certainty, and usefulness. However, legal issues in this digital era are often problematic regarding private data security. One of the state's efforts to protect private data is to make regulations on private data protection <xref ref-type="bibr" rid="BIBR-31">(Putri et al., 2021)</xref>. The conversation of the Personal Data Protection Law (PDP Law) began because unrest over violations felt by individuals, companies, or related organizations which would certainly cause both material and non-material losses (Djafar, 2017). However, the above laws do not explicitly regulate private data, so the PDP Law was passed which is a standardization that can be applied in various sectors that can follow the characteristics of the industry to guarantee and protect the basic rights of citizens to private protection, ensuring that people receive services from corporations, public bodies, International Organizations, governments, and others. This regulation is made to protect human rights as the basis of individual privacy that can identify the owner <xref ref-type="bibr" rid="BIBR-30">(Priscyllia, 2019)</xref>. In Indonesia, there is a need for digital literacy education so that no private data is misused <xref ref-type="bibr" rid="BIBR-7">(Djafar, 2019)</xref>.</p><p>Meanwhile, in the Philippines, the Data Privacy Act of 2012 (DPA) enacted to conserve human rights, serving as the foundation for individual privacy. In addition, the above has become the duty of an independent oversight institution called the National Privacy Commission. The public can use the various platforms provided by this institution if they have questions about private data issues that are being experienced. In addition, this institution can assist law enforcement in addressing issues related to private data leaks. Independent supervisory institutions in Indonesia have been regulated in the PDP Law to establish supervisory institutions for data control and processing. However, the law only contains more Amiludin et.al in-depth content regarding the watchdog agency as there are no rules regarding its institutional structure, position, and authority.</p><p>Therefore, Indonesia needs to follow the example of the Philippines by establishing an independent oversight institution so that there is no intervention from any party. Moreover, this law applies to individuals and public bodies in various sectors <xref ref-type="bibr" rid="BIBR-19">(Khansa, 2021)</xref>. If there is no supervisory institution, it is feared that in the future it will not be easy if it only relies on the Ministry of Communication and Information. Private data collected is also stored in extensive data systems need the government's attention by providing assurance and certainty that the data is protected and ensuring that cases of private data leakage such as those that occurred in 2021 and 2022 do not occur again. The following is the anomalous traffic of cyber attacks in Indonesia in 2021 and 2022 sourced from the Annual Report of the National Cyber and Encryption Agency (BSSN) "cybersecurity monitoring" (cloud.bssn): </p><table-wrap id="table-z0c858" ignoredToc=""><label>Figure 1</label><caption><p>Chart of Private Data Cases in Indonesia</p></caption><table frame="box" rules="all"><tr><td colspan="1" rowspan="1" style="" align="left" valign="top"><graphic xlink:href="https://journals2.ums.ac.id/jurisprudence/article/download/4266/4235/49483" mimetype="image" mime-subtype="png"><alt-text>Image</alt-text></graphic><break/><break/><break/><break/><break/></td><td colspan="1" rowspan="1" style="" align="left" valign="top"><graphic xlink:href="https://journals2.ums.ac.id/jurisprudence/article/download/4266/4235/49484" mimetype="image" mime-subtype="png"><alt-text>Image</alt-text></graphic></td></tr></table><table-wrap-foot><p>Source : (cloud.bssn)</p></table-wrap-foot></table-wrap><p>Anomalous traffic in 2022 dropped significantly by 40% compared to the previous year. Meanwhile, in the Philippines, based on 2021 and 2022 data sourced from the National Computer Emergency Response Team (ncert.gov.ph):</p><table-wrap id="table-uvk2s2" ignoredToc=""><label>Figure 2</label><caption><p>Chart of Private Data Cases in Philippines</p></caption><table frame="box" rules="all"><tr><td colspan="1" rowspan="1" style="" align="left" valign="top"><break/><graphic xlink:href="https://journals2.ums.ac.id/jurisprudence/article/download/4266/4235/49485" mimetype="image" mime-subtype="png"><alt-text>Image</alt-text></graphic></td><td colspan="1" rowspan="1" style="" align="left" valign="top"><break/><break/><graphic xlink:href="https://journals2.ums.ac.id/jurisprudence/article/download/4266/4235/49486" mimetype="image" mime-subtype="png"><alt-text>Image</alt-text></graphic></td></tr></table><table-wrap-foot><p>Source : (ncert.gov.ph)</p></table-wrap-foot></table-wrap><p>As we can see above, the number of cases in Indonesia has decreased, just like in the Philippines where it has also decreased, but by 45% in the Philippines. Previously, in Indonesia the Electronic Information and Transaction Law (ITE Law) has regulated to protection private data. However, the ITE Law needs to regulate specifically. As a result, the government created the PDP Law.</p></sec><sec><title>RESEARCH METHOD</title><p>The research method used is a literature review study taken from various references, such as journals or articles that have been published that are searched through electronic databases such as Google Scholar using keywords: data, data protection, and legal protection. As well as take data related to private data leaks taken from the official website of the</p></sec><sec><title>RESULTS &amp;DISCUSSION</title><sec><title>A. Comparison of the Private Data Protection Act In Indonesia and The Philippines</title><p>As mentioned earlier, private data must be protected, but do you know what private data is? and why it matters so much to us? There are several definitions regarding private data, as follows :</p><list list-type="order"><list-item><p>Jerry Kang defines private data as information closely associated with individuals and can be differentiated based on their characteristics.</p></list-item><list-item><p>According to Purwanto, data is a collection of information that is interpreted as a set of symbols that describe numbers, objects, actions, and so on in the form of letters, numbers, or sure signs.</p></list-item><list-item><p>According to the regulation of the minister, private data is data that is maintained, stored, and protected because it contains a person's original information content that can be distinguished according to its characteristics so that related parties try to keep it to themselves or limit other parties from spreading it to anyone and abusing it <xref ref-type="bibr" rid="BIBR-37">(Rosadi, 2015)</xref>.</p></list-item></list><p>So that explains private data; why is it so influential? Cause to achieve satisfaction or profit, for example, used to bully someone through social media, deceive someone by using someone else's identity to be sent some money until the victim is killed, defamed, and so on. Therefore, private data is very important to be stored, maintained, and maintained its authenticity and protected both by individuals and data controllers to be safe from unexpected parties <xref ref-type="bibr" rid="BIBR-9">(Gutwirth, 2015)</xref>. So, private data is essential to be stored, maintained, and maintained its authenticity and protected both by individuals and data controllers. In Indonesia, special regulations governing private data, namely the Personal Data Protection Law (PDP law). Protection, which means how to use, disclose, and share data legally with related parties so that if data is exchanged but there is no legal basis to regulate it, it is considered invalid.</p><p>The PDP law is guided in European General Data Protection Regulation (GDPR). Discuss collection, using, sharing, and disclosing data, addressing aspects such as data quality, accuracy, and data subjects. There are three things in this law include data subjects which themselves are attached to private data, such as people or corporations, data controllers consisting of individuals, public bodies, international organizations, then the data processor processes private data in the name of private data controllers with the condition that a data must be kept confidential. A data owner has the right to know what his data is used for and sue and receive compensation in case of violations when processing data, except for law enforcement and national defense and security.</p><p>Data is grouped into General and specific data in the PDP law. General data encompasses complete details such as full name, gender, amalgamated private information for individual identification and etc. Conversely, specific data comprises biometric data, genetic data, crime records, information about children, private financial data, and other data stipulated by legal provisions. Another example is a photo; a photo is not specific data but can be particular data if a picture is used for authentication. So far, the Ministry of Communications and Information Technology receives data breaches mainly related to negligence or vulnerabilities in the information security aspects of electronic systems. In case of a data leak, the processor must inform the data owner in writing within 3 x 24 hours, which contains information about the type of private data leaked, the time and mechanism of the leak, and efforts to overcome or recover from data leak.</p><p>In the Philippines, private data can be defined as human aspiration in controlling or influencing information about themselves in an effort to protect private information that comes from the wishes of individuals and is recognized by democratic societies <xref ref-type="bibr" rid="BIBR-36">(Romanou, 2017)</xref>. Therefore, the government ought to communicate the methods it employs to fulfill the desires of its citizens regarding their private data. Furthermore, the commission's decisions and resolutions play a crucial role in interpreting and enforcing these regulations.</p><p>The commission issued a circular to fill in the details, supplement the DPA provisions, or provide the means to implement the act. It provides advice to guide interpreting the law about specific data privacy matters. The commission issues advisory opinions through its advisory functions. The circular complements the DPA provisions and the IRR to strengthen private data protection. Data privacy includes all types of private information, such as private, sensitive, and privileged information. Private information is a data subject that refers to the information holder. Private information includes name, occupation, bank account number, transaction history, last known address of former employee, email, signature, and others. Sensitive private information includes information that, when processed, results in a higher potential risk to data subjects and the increased protection necessary to prevent such danger. Privileged information is data that arises from confidential communications based on court rules and other relevant laws.</p><p>The purpose of processing private data is as follows:</p><p>a. Scientific and statistical research is subject to applicable ethical and legal standards and processes.</p><p>b. Investigations are carried out by authorized persons/bodies according to laws and regulations concerning criminal, administrative, tax, and other provisions.</p><p>c. National security interests.</p><p>In the Philippines, it enacted laws to regulate private data and established an independent regulatory body called the National Privacy Commission (NPC) to protect private data. The NPC is in charge of regulating and implementing the provisions of Private data protection regulations and complying with its international standards. The NPC approach to providing education and literacy to the public is to increase awareness of data protection laws by providing education and literacy through online platforms that can make it easier for people to access information (Hasan et al.,) such as the official website of the National Privacy Commission and social media, Facebook (@privacy.gov.ph), Twitter (@privacyphp), and the AI chatbot feature on the National Privacy Commission's website is "AskPriva."In addition to providing education and literacy, the platform facilitates questions related to Data privacy laws.</p><p>In contrast, in Indonesia, which does not yet have a supervisory institution for Private data protection, a supervisory institution should be established according to the mandate of the PDP Law. If there isn’t supervisory agency, it is feared that it will be difficult. The president is responsible for establishing an autonomous supervisory body accountable directly to them, and must be free from any influence of private interests and groups, with the existence of a private data protection supervisory institution is expected to help the public not to become victims. The supervisory board for the protection of private data when it has been established will have the following tasks (hukum online):</p><p>a. Supervise the implementation of private data protection.</p><p>b. Enforce administrative Law measures to address infringements</p><p>c. Facilitate alternative dispute resolution outside the formal judicial process.</p></sec><sec><title>B. Court Decisions and Judges' Considerations in Private Data Cases in Indonesia and the Philippines</title><p>Litigation involves judges who, according to Cik Hasan Bisri etymologically, are the one who decide the law <xref ref-type="bibr" rid="BIBR-18">(Isnantiana, 2017)</xref>. In addressing incidents of private data breaches, law enforcement is crucial to maintain legal compliance and prevent further breaches <xref ref-type="bibr" rid="BIBR-25">(Ngape, 2018)</xref>. In delivering judgments, judges bear great responsibility not only to humans but also to God Almighty <xref ref-type="bibr" rid="BIBR-2">(Asshidiqie, 2014)</xref>. Therefore, the challenge faced lies in the ability to adapt given the ongoing social dynamics alongside technological advancements <xref ref-type="bibr" rid="BIBR-3">(Atmasasmita, 2014)</xref>.</p><p>When giving a decision in a case, the judge's contains reasons and considerations and from these considerations, one can recognize the motivation, namely to give legal certainty and justice to all engaged involved in a legal dispute. Judges must be fully engaged in exploring and achieving legal justice in every trial, not just mechanically applying the law. In a progressive legal framework, judges can challenge norms by interpreting legal texts through hermeneutics to explore the values of justice, especially in the context of laws. Therefore, judges must fully utilize their intellect, wisdom, and humanism in court to decide a case with full justice <xref ref-type="bibr" rid="BIBR-21">(Lesmana, 2020)</xref>.</p><p>As law enforcers, judges must have an understanding of the legal regulations and values that apply in society, and use reasoning in decision making. This is important because judges are seen as those who understand all laws, so the court cannot refuse to examine and hear cases <xref ref-type="bibr" rid="BIBR-10">(Harahap, 2016)</xref>. Reasoning is an attempt to reach the truth through the use of reason or logical thinking, which is used by judges to think logically and give consideration to the truth or error of a matter. Law enforcers need good legal reasoning skills to formulate legal arguments. <xref ref-type="bibr" rid="BIBR-32">(Qodri, 2019)</xref>. Legal reasoning is the process of finding the basic principles underlying a judge's ruling in a legal matter, the manner in which an attorney employs legal arguments, and the approach through which a legal expert comprehends the law <xref ref-type="bibr" rid="BIBR-43">(Vera &amp; Ainudin, 2016)</xref>. Therefore, a judge must have good skills and abilities in understanding legal reasoning.</p><p>It is important for a judge to have an adequate understanding of legal reasoning as this plays a crucial role in drawing up legal considerations when making decisions. In Indonesia, courts in making decisions and passing judgments are based on considerations that are in accordance with the right reasons and regulations. Therefore, judges are expected to act wisely because court decisions are complex matters <xref ref-type="bibr" rid="BIBR-27">(Pamungkas, 2021)</xref>. The judge should focus on the essence of the verdict, namely whether the consideration can be burdensome or mitigating the crime because sufficient consideration cannot be made of legal remedies. In the Philippines, courts generally make decisions based on evidence, and such decisions are not seen as biased against just one sector. Generally, courts make decisions based on the evidence presented, yet there's a perspective suggesting that courts might show partiality toward affluent and influential individuals <xref ref-type="bibr" rid="BIBR-28">(Panao &amp; Leon, 2018)</xref>. Also rely on evidence, while complying with the Constitution and other regulations that support the principles of social justice, human rights, and gender equality <xref ref-type="bibr" rid="BIBR-42">(Tetch, 2019-08)</xref>. Judges need to uphold equilibrium in society by reinstating the social order to its initial condition <xref ref-type="bibr" rid="BIBR-8">(Djanggih, 2018)</xref>.</p><p>The PDP Law is set to be fully enforced starting from October 2024, while currently still using the ITE Law while currently still using the ITE Law to regulate cybercrime <xref ref-type="bibr" rid="BIBR-41">(Sutrisno &amp; Paksa, 2019)</xref>. For example, in the ruling no. 438/Pid. Sus/2020 / PN.JKT.UTR this is a case in which a person is sentenced for violating the rules on data transfer. The defendant, who worked as a debt collector in an online loan company, was involved in a case where the victim felt aggrieved by the defendant's actions. The victim, who was a debtor in one online loan, was pressured in an inappropriate manner by the defendant. These include verbal intimidation with harsh words, threats via text messages, and threats to disclose information about the debts owed to the victim's family and close people if they do not fulfill the defendant's wishes. In this case, the defendant was sentenced for one year and six months. The punishment is given because the defendant has been proven to be legally in violation of the law as outlined in Article 45 paragraph (4) Jo. Article 27 paragraph (4) of Law No. 19 of 2016 amending Law No. 11 of 2008 concerning ITE Law. Here is the verdict:</p><p>ORDERED</p><list list-type="order"><list-item><p>Stating that the Defendant DEDE SUPARDI Bin H. SUPRIADI has been legally and convincingly proven guilty of committing the crime of "intentionally and without the right to distribute and/or transmit and/or make accessible Electronic Information and/or Electronic Documents that contain extortion and/or threats" as in the second indictment;</p></list-item><list-item><p>Sentenced to the Defendant DEDE SUPARDI Bin H. SUPRIADI therefore with imprisonment for: 1 (one) year and fine in the amount of Rp.70,000,000.00 (seventy million rupiah) provided that if the fine is not paid, it shall be substituted with confinement for 2 (two) months;</p></list-item><list-item><p>Determining that the period of arrest and detention that has been served by the Defendant shall be fully deducted from the punishment imposed;</p></list-item><list-item><p>Determine that the Defendant remains in custody;</p></list-item><list-item><p>Determine the evidence in the form of: - 1 (one) unit of cellphone Redmi 7 3/32 black color (confiscated from Bayu Prasetya); Used in another case; - 1 (one) unit of cellphone Realme red blue color No. 081546121647 (confiscated from Dede Supardi Bin H. Supriadi); - 1 (one) curriculum vitae (confiscated from Dede Supardi Bin H. Supriadi); Confiscated for destruction;</p></list-item><list-item><p>Charged the Defendant with paying court costs in the amount of Rp5,000.00 (five thousand rupiah);</p></list-item></list><p>Thus decided in a deliberation session of the Panel of Judges of the North Jakarta District Court, on Tuesday, June 9, 2020, by Agung Purbantoro, S.H., M.H. as Chief Judge, Drs. Tugiyanto, Bc.I.P., S.H., M.H., and Fahzal Hendri, S.H., M.H., each as Member Judges, which was pronounced in a hearing open to the public on the same day by the Presiding Judge accompanied by the aforementioned Member Judges, assisted by Ari Palti Siregar, S.T., S.H., M.H., Substitute Registrar at the North Jakarta District Court, and attended by Erma Octora, S.H. Public Prosecutor and Defendant.</p><p>In this case, the judge still referred to the ITE Law as the basis for his consideration. In its ruling, the judge ensured that all elements of the alleged violation of the ITE Law were met, in particular with regard to the private data violation. On this occasion, the author seeks to investigate aspects of private data protection in Indonesia regulates the transfer of private data of a person who must obtain the relevant permission. Violation of this provision may result in the data owner filing a claim for damages in court, but difficulties in proving cases in civil courts in Indonesia hamper the ability of data owners to legitimately highlight breaches in the security of their private data. The PDP Law allows the resolution of disputes related to the protection of private data through civil courts and alternative dispute resolution mechanisms like arbitration (Article 64). This finding is an important note for all of us. Independent supervisory authorities have an important role as a mechanism for societal oversight of governmental authority and can safeguard private data for the sake of legal progress <xref ref-type="bibr" rid="BIBR-40">(Sukmariningsih, 2014)</xref>.</p><p>In the Philippines, private data cases are handled and decided by the National Privacy Commission (NPC) whose information can be accessed through its official website. To date, no case of private data has reached the Supreme Court, since only decisions of the Supreme Court are accessible to the public. For example, in the NPC ruling 21-086. This was a case where the complainant, RTB, had previously taken out a car loan secured by a mortgage pledge with the Philippine Bank of Communications (PBComm), and then transferred the loan and mortgage to the East West Banking Corporation (EWBC). Next provided EWBC with several dated checks to repay the loans granted, but because EWBC personnel failed to deposit the checks, the complainant's account was marked as overdue resulting in a referral to a collection agency. So that the complainant received a bad phone call that was misleading and tried to take the car. Accordingly, the complainant filed a complaint with the NPC, claiming that EWBC process also disclosed his private information to a third-party collection agency in an unauthorized manner.</p><p>Discussion</p><list list-type="order"><list-item><p>The Commission resolves to close the case.</p></list-item><list-item><p>The Commission notes that EWBC complied with the order to pay RTB nominal damages in the amount of Fifteen Thousand Pesos (P15,000.00) as stated in the Decision dated 03 February 2022. The acknowledgement receipt signed by RTB together with RTB’s confirmation of the payment of nominal damages through his email to the Commission are deemed sufficient to prove that the payment has been made.</p></list-item><list-item><p>As regards RTB’s statement in his email that he intends to file a Motion for Reconsideration, the Commission notes that he did not file a Motion for Reconsideration within the prescribed period under NPC Circular 2021-01 (2021 NPC Rules of Procedure).</p></list-item></list><p>WHEREFORE, premises considered, Commission resolves that NPC 21-086 – RTB v. East West Banking Corporation is hereby CLOSED. Further, East West Banking Corporation’s Compliance and Manifestation (Re: Letter/Order dated 25 April 2022 and Decision dated 03 February 2022) dated 02 May 2022 is hereby NOTED.</p><p>After reviewing the complaint, the NPC based on Section 12(b) of the DPA decides to reject that, after determining that EWBC processes RTB's private information within the legitimate criteria. As a result of EWBC negligence, the NPC compensated RTB. In this context, EWBC does not comply with its responsibilities as a controller of private information based on Section 11 (c) of the DPA. The commission noted that EWBC had complied with RTB's indemnity payment. The payment was deemed to have been made based on the confirmation of payment of the nominal compensation, accompanied by RTB's signature of receipt, emailed to the commission. Despite RTB's intention for reconsideration in the email, RTB did not do so by the deadline set by the commission in NPC Circular 2021-01. Therefore, based on these considerations, the Commission decided to close the case. (privacy.gov.ph).</p><p>As the Personal Information Controller (PIC), EWBC must keep the data subject's personal information up to date as a form of accountability. EWBC is supposed to check the date of deposit of the check that has passed the date given by the complainant. Accidental failure to deposit a check past the specified date causes the complainant's personal information to unnecessarily be revealed to third-party collection agency. EWBC violated the KPR terms and conditions of the mortgage in collecting the debt by not giving prior written notice to the complainant. EWBC proved to be grossly negligent in carrying out the obligations given by the banking institution. If EWBC had fulfilled its obligations in accordance with the loan contract and DPA, then EWBC would not have needed to disclose the complainant's private information. Nevertheless, EWBC recklessness was not enough to propose prosecution. Although the processing carried out by EWBC has a valid legal basis, EWBC is still liable for nominal losses.</p></sec><sec><title>C. Theft Private Data Dispute Resolution Mechanism in Indonesia and The Philippines</title><p>In the digital age, numerous challenges are associated with the security of private data especially in Indonesia and the Philippines. International law governs the safeguarding of private data as outlined below:</p><list list-type="order"><list-item><p>Universal Declaration of Human Rights (UDHR)</p></list-item></list><p>It marks the inaugural instrument upholding an human right to privacy, the term "privacy" is regarded as a comprehensive term, encompassing the safeguarding of a range of additional rights, including family, honor, reputation and others. As time has progressed, additional dimensions of protection have emerged, covering physical privacy, dignity, privacy deciding, and privacy of information. This evolution emphasizes the necessity for regulations concerning the privacy of private data.</p><list list-type="order"><list-item><p>International Covenant on Civil and Political Rights (ICCPR)</p></list-item></list><p>Doesn't clearly mention that the right to privacy encompasses private data. Nonetheless <xref ref-type="bibr" rid="BIBR-20">(Kuner, 2014)</xref> offers a comprehensive right to privacy from guidelines that explain the extent, and it is said that the purpose of getting protection in human private life is that everyone needs to have the right to make sure a form can be understood and what kind of private data is in automatic data files. Everyone needs to know and check individuals or public/private bodies related to whether their data is wrong or has been collected/processed against the law. Hence, everyone should possess the entitlement to seek the removal of their data. Connected to the aforementioned discussion, it is evident that private data is intricately linked to the right to privacy, necessitating safeguarding. </p><list list-type="order"><list-item><p>European Convention on Human Rights (ECHR)</p></list-item></list><p>The Council of Europe, functioning; regional international organization, possesses an agreement concerning the privacy, particularly detailed in Article 8 ECHR. This article became foundation for the establishment of an additional convention that specifically delves into the safeguarding of private data. After being signed by representatives of member states in 1981, this convention was enforced in 1985 following the requisite ratifications from several countries (Themba, 2016).</p><p>Regarding the things that have been described above, it proves that protecting private data is very important because it is part of individual life, has a great complexity and amount and can make others know something about ourselves <xref ref-type="bibr" rid="BIBR-34">(Riahi, 2015)</xref> such as data leakage such as name and the Population Identification Number (NIK). This information can be used by hackers. Hackers are always up to date with technology; therefore, they always find a way to exploit vulnerabilities on the websites of companies/government agencies to determine whether the stolen private data is then sold to the detriment of a particular company or out of political motives. There are two forms of private data protection, including physical security of both visible and invisible data, and regulations that govern the unauthorized use of data, data misuse for specific purposes, and damage to the data itself <xref ref-type="bibr" rid="BIBR-39">(Sautunnida, 2018)</xref>. Disputing parties have several considerations in choosing the appropriate mechanism to resolve conflicts, including legal system components that will influence their choices.</p><p>The dispute resolution mechanism for private data security in Indonesia and the Philippines differs. In Indonesia, if there is an indication of a private data leak, it can take general steps first. If a private data leak is detected, it must be responded to quickly; for example, companies or organizations that experience such incidents need to immediately identify and confirm private data leaks by checking systems and networks to determine the source and scale of the leak. Second, if it is confirmed that there is a data leak, then access to the affected system must be disconnected first, then repair the security gaps that allow attacks and restore damaged or lost data. Third, ask for the help of a computer security team or forensic company to find out who the culprit is and the motive behind it. To find out carried out Forensic investigation is carried out that involves analyzing logs, digital traces, and other investigative techniques. Fourth, the information and evidence collected during the investigation are submitted to the National Cyber and Encryption Agency (BSSN) or the police to be processed legally. Fifth, if the case has been resolved, the affected organization or company needs to implement measures such as training employees, improving network security, conducting periodic security audits, and updating software. Sixth, evaluate and monitor the security system regularly because this can help determine the existence of potential threats and new weaknesses that may arise.</p><p>In addition, the PDP law if we see in Article 64, paragraphs 1 and 2 concluded dispute resolution is done in court or alternatively through institutions with statutory provisions, see the principle of lex specialis, that procedural law is used to resolve disputes. The trial process can be carried out behind closed doors to protect private data. In Indonesia, safeguarding private data is imperative as it constitutes one of the fundamental human rights. They protect private privacy, and there should be a legal basis that can guarantee the rights of citizens by regulating the protection of private data. Data subjects who experience losses due to data leakage are entitled to receive compensation by filing a civil lawsuit. As for an alternative dispute resolution as stated in law number 30 of 1999 in Article 6, which regulates that if the dispute is resolved by non-litigation based on the good faith of the parties, it is carried out by meeting directly within 14 days. Then, an agreement that has been successfully reached is made in writing.</p><p>However, if it does not work out, the parties can seek the help of a mediator or expert advisor. If, within a period of 14 days, the parties have sought the assistance of a mediator or expert advisor but have not reached an agreement, the disputing parties may request an alternative dispute resolution institution or arbitration institution to appoint a mediator to initiate mediation involving a third party, with a deadline of 7 days <xref ref-type="bibr" rid="BIBR-33">(Rezki et al., 2019)</xref>. While carrying out its responsibilities, the mediator should possess the capability to maintain confidentiality, and a written agreement, endorsed by the concerned disputing parties, must be reached within a 30-day period. In addition, the outcome of the agreement is recorded within 30 days at the court from the date of ratification by the parties to the dispute. Nevertheless, these initiatives may not bring about a resolution to the dispute. In such instances, the disputing parties have the option to pursue dispute resolution through an arbitration institution or ad hoc arbitration, contingent upon a documented agreement.</p><p>Resolution of disputes through arbitration depends on written agreements between the parties engaged in disputes outside the General Court. Arbitrators, designated by either the parties, the district court, or an arbitration institution, are tasked with making a decision on the dispute that arises; the outcome is a win-lose decision, is final, and has the force of law binding on all parties involved. Anyone can voluntarily resolve private data leakage disputes through out-of-court dispute resolution. The parties to the dispute may choose according to their needs, such as negotiation, mediation, conciliation, arbitration, or other options based on their agreement in dispute. Then, if this effort is successful, the results of the written agreement shall be final and binding on the parties unless otherwise provided by law. However, the parties may dispute with the court when the above attempts are unsuccessful.</p><p>Unlike in Indonesia, in the Philippines, the general step that must be taken when there is an indication of private data leakage is first, the individual company or organization concerned determines what violation occurred, for example, whether there is unauthorized use of private data, unauthorized access, and others. Second, gather all available evidence, e.g., screenshots and copies of documents, to support our statement. Third, report violations that occur and submit all evidence to the National Privacy Commission (NPC) so that it can take appropriate steps to resolve the problem. Fourth, we can also contact the police or the court so that they can take investigative steps and take legal action if necessary. Fifth, ask for the help of lawyers experienced in privacy law and data protection because we can be given the right solution and assisted in resolving the case. In the Philippines, it was resolving disputes primarily through the judicial system. However, the large number of cases that went to court caused the file to become clogged due to limited resources in responding to the increase in cases. Hence, the judicial process seemed protracted and expensive.</p><p>Therefore, an alternative dispute resolution or ADR emerges, which refers to other dispute resolutions that include alternatives to litigation <xref ref-type="bibr" rid="BIBR-4">(Blake et al., 2021)</xref>. Alternative dispute resolution is considered an intervention against the accumulation of case files. Consequently, this alternative dispute resolution should be considered based on its superiority as an effective system to resolve disputes more quickly and efficiently, with lower costs. The Alternative Dispute Resolution Act of 2004 was established by the Philippine government. Alternative dispute resolution mechanisms in the Philippines include mediation, conciliation, and arbitration. Although mediation and conciliation are two different things, they are used interchangeably in the Philippines. Thus, in this case, the third party facilitates the negotiation with two or more parties to the dispute. When facilitating it, third parties help to provide the best solution to benefit the parties to the debate. The agreement can be reached because the mediator orders the parties concerned to express all their views on a condition until they understand each other about the problems that occur. The role of a mediator in a successful negotiation lies with the parties to the dispute because the negotiation results are in their hands. In carrying out its duties, the mediator must ensure that the negotiation process can run effectively, systematically, and fairly.</p><p>It distinguishes itself from arbitration as it involves a third party that assesses the information presented by the disputing parties and examines the case. Then arbitration is the one that gives the decision on how to resolve the dispute and often assesses who is the proper party among the other parties to the dispute. In contrast to mediation, the third party is a facilitator only, and the parties to the dispute decide the final solution to the disputed problem.</p><p>There are advantages if you resolve a dispute out of court rather than through the courts:</p><p>a. The settlement is private so that outsiders do not know the company's kitchen, so the company's reputation is well preserved, and the verdict results are not published.</p><p>b. The settlement is faster than through the court because the provisions regarding the time limit, the selection of arbitrators, and Law resolution of disputes agreed by the parties submitted by themselves are made relatively quickly and flexibly.</p><p>c. It realizes the results of a win-win dispute resolution with the hope that in the future, it is not placed as a losing or disadvantaged party despite the conflict between the parties.</p><p>Therefore, this alternative settlement can keep the business relationship in the future. Of course, some advantages of the Alternative Dispute Resolution Mechanism are "contradictory" when compared with the settlement mechanism through the courts. Dispute resolution through the courts is closely related to practices that tend to be slow or not fast (takes a long time), not simple (complicated), and expensive. In addition, sometimes, the judicial world, in some cases, is full of corrupt practices.</p></sec></sec><sec><title>CONCLUSION</title><p>Private Data is valuable data often misused by other parties to benefit, so private data must be stored, maintained, maintained authenticity, and protected by both individuals and data controllers. In Indonesia, the PDP Law, data is grouped; special and general data. Then in the Philippines, covers all types of private information and established a private data protection supervisory body called the National Privacy Commission to protect private data. In Indonesia, private data protection has no supervisory body, while the supervisory body is formed based on the PDP Law. If there is a regulatory body, it is likely accessible.</p><p>Judges in deciding a case contain reasons and considerations. Judges are not just mechanically applying the law but must use their full intellect, wisdom and humanism in court to decide a case with full justice. In Indonesia, personal data cases can be resolved through the courts. However, court decisions and judges' considerations regarding private data cases still refer to the ITE Law. This is because the PDP Law will only come into full effect in October 2024. Unlike in the Philippines, private data cases are handled and decided by the National Privacy Commission (NPC) whose information can be accessed through its official website. Until now, no case of personal data has reached the Supreme Court, as only Supreme Court decisions are publicly accessible.</p><p>The dispute resolution mechanism for private data security in Indonesia refers to Article 64, Regulating that in the event of a dispute, the settlement can be carried out through courts, arbitration, and alternatively, institutions. An alternative dispute resolution regulation can be seen in Law No. 30 of 1999. If the dispute is resolved through the court, the proceedings can be conducted behind closed doors to protect private data. In the Philippines, they are resolving disputes primarily through the judicial system. However, the large number of cases that go to court causes the case file to become clogged due to limited resources in responding to the increase in cases, Therefore, the implementation of alternative dispute resolution in the Philippines was initiated by introduction of the Alternative Dispute Resolution Act of 2004 by the Philippine government.</p></sec></body><back><ref-list><title>References</title><ref id="BIBR-1"><element-citation publication-type="article-journal"><article-title>Big data phenomenon in banking</article-title><source>Texila International Journal of Academic Research</source><volume>6</volume><issue>2</issue><person-group person-group-type="author"><name><surname>Aliu</surname><given-names>B.</given-names></name></person-group><year>2019</year><fpage>81</fpage><lpage>87</lpage><page-range>81-87</page-range><pub-id pub-id-type="doi">10.21522/tijar.2014.06.02.art008</pub-id></element-citation></ref><ref id="BIBR-2"><element-citation publication-type="book"><article-title>Peradilan Etika Dan Etika Konstitusi</article-title><person-group person-group-type="author"><name><surname>Asshidiqie</surname><given-names>J.</given-names></name></person-group><year>2014</year><publisher-name>Sinar Grafika</publisher-name><publisher-loc>Jakarta</publisher-loc></element-citation></ref><ref id="BIBR-3"><element-citation publication-type="book"><article-title>Hukum Kejahatan Bisnis Teori dan Praktik di Era Globalisasi</article-title><person-group person-group-type="author"><name><surname>Atmasasmita</surname><given-names>R.</given-names></name></person-group><year>2014</year><publisher-name>Prenadamedia Group</publisher-name><publisher-loc>Jakarta</publisher-loc></element-citation></ref><ref id="BIBR-4"><element-citation publication-type="book"><article-title>A practical approach to alternative dispute resolution</article-title><person-group person-group-type="author"><name><surname>Blake</surname><given-names>S.H.</given-names></name><name><surname>Browne</surname><given-names>J.</given-names></name><name><surname>Sime</surname><given-names>S.</given-names></name></person-group><year>2021</year><publisher-name>Oxford University Press</publisher-name></element-citation></ref><ref id="BIBR-5"><element-citation publication-type="article-journal"><article-title>Politik Hukum Pidana Terhadap Penanggulangan Cybercrime</article-title><source>Jurnal Legislasi Indonesia</source><volume>16</volume><issue>1</issue><person-group person-group-type="author"><name><surname>Bunga</surname><given-names>D.</given-names></name></person-group><year>2019</year><fpage>1</fpage><lpage>15</lpage><page-range>1-15</page-range><pub-id pub-id-type="doi">10.35141/jyu.v1i1.100</pub-id></element-citation></ref><ref id="BIBR-6"><element-citation publication-type="article-journal"><article-title>Konsep Perlindungan Hukum Atas Privasi dan Data Pribadi dikaitkan dengan Penggunaan Cloud Computing di Indonesia</article-title><source>Yustisia</source><volume>5</volume><issue>1</issue><person-group person-group-type="author"><name><surname>Dewi</surname><given-names>S.</given-names></name></person-group><year>2016</year><pub-id pub-id-type="doi">10.20961/yustisia.v5i1.8712</pub-id></element-citation></ref><ref id="BIBR-7"><element-citation publication-type="chapter"><article-title>Hukum Perlindungan Data Pribadi di Indonesia: Lanskap, Urgensi dan Kebutuhan Pembaruan”</article-title><source>Seminar Hukum dalam Era Analisis Big Data. Program Pasca Sarjana Fakultas Hukum UGM</source><person-group person-group-type="author"><name><surname>Djafar</surname><given-names>W.</given-names></name></person-group><year>2019</year></element-citation></ref><ref id="BIBR-8"><element-citation publication-type="article-journal"><article-title>Pertimbangan Hakim Dalam Perkara Pencemaran Nama Baik Melalui Media Sosial (Kajian Putusan Nomor: 324/Pid./2014/PN.SGM</article-title><source>Jurnal Penelitian Hukum De Jure</source><volume>18</volume><issue>1</issue><person-group person-group-type="author"><name><surname>Djanggih</surname><given-names>H.</given-names></name></person-group><year>2018</year><page-range>96</page-range><pub-id pub-id-type="doi">10.30641/dejure.2018.V18.93-102</pub-id></element-citation></ref><ref id="BIBR-9"><element-citation publication-type="book"><article-title>Reforming European Data protection Law</article-title><person-group person-group-type="author"><name name-style="given-only"><given-names>Gutwirth</given-names></name><etal/></person-group><year>2015</year><publisher-name>Springer</publisher-name><publisher-loc>Dordrecht</publisher-loc><pub-id pub-id-type="doi">10.1007/978-94-017-9385-8</pub-id></element-citation></ref><ref id="BIBR-10"><element-citation publication-type="book"><article-title>Hukum Acara Perdata Tentang Gugatan, Persidangan, Penyitaan, Pembuktian Dan Putusan Pengadilan</article-title><person-group person-group-type="author"><name><surname>Harahap</surname><given-names>Y.</given-names></name></person-group><year>2016</year><publisher-name>Sinar grafika</publisher-name><publisher-loc>Jakarta</publisher-loc></element-citation></ref><ref id="BIBR-11"><element-citation publication-type="article-journal"><article-title>Current Landscape and Influence of Big data on Finance"</article-title><source>Journal of Big Data, Edisi</source><issue>21, Vol 7</issue><person-group person-group-type="author"><name><surname>Hasan</surname><given-names>M.D.M.</given-names></name><name><surname>Popp</surname><given-names>J.</given-names></name><name><surname>Olah</surname><given-names>J.</given-names></name></person-group><year>2020</year><page-range>8</page-range><publisher-name>Springer</publisher-name></element-citation></ref><ref id="BIBR-12"><element-citation publication-type=""><pub-id pub-id-type="doi">10.1186/s40537-020-00291-z</pub-id></element-citation></ref><ref id="BIBR-13"><element-citation publication-type=""><year>2023</year><month>07</month><day>29</day><ext-link xlink:href="https://cloud.bssn.go.id/s/3S5B2ToddAFsiXs" ext-link-type="uri">Available from: https://cloud.bssn.go.id/s/3S5B2ToddAFsiXs</ext-link></element-citation></ref><ref id="BIBR-14"><element-citation publication-type=""><year>2023</year><ext-link xlink:href="https://cloud.bssn.go.id/s/Lyw8E4LxwNiJoNw," ext-link-type="uri">Available from: https://cloud.bssn.go.id/s/Lyw8E4LxwNiJoNw,</ext-link></element-citation></ref><ref id="BIBR-15"><element-citation publication-type=""><ext-link xlink:href="https://privacy.gov.ph/wp-content/uploads/2023/05/NPC-21-086-RTB-v.-East-West-Bank-Corporation-Resolution-Final.pdf," ext-link-type="uri">Available from: https://privacy.gov.ph/wp-content/uploads/2023/05/NPC-21-086-RTB-v.-East-West-Bank-Corporation-Resolution-Final.pdf,</ext-link></element-citation></ref><ref id="BIBR-16"><element-citation publication-type=""><ext-link xlink:href="https://www.hukumonline.com/berita/a/tugas-tugas-lembaga-penyelenggara-pelindungan" ext-link-type="uri">Available from: https://www.hukumonline.com/berita/a/tugas-tugas-lembaga-penyelenggara-pelindungan</ext-link></element-citation></ref><ref id="BIBR-17"><element-citation publication-type=""><year>2023</year><ext-link xlink:href="https://www.ncert.gov.ph/statistics/," ext-link-type="uri">Available from: https://www.ncert.gov.ph/statistics/,</ext-link></element-citation></ref><ref id="BIBR-18"><element-citation publication-type="article-journal"><article-title>Legal Reasoning Hakim Dalam Pengambilan Putusan Perkara Di Pengadilan,”</article-title><source>Jurnal Islamadina</source><volume>18</volume><issue>2</issue><person-group person-group-type="author"><name><surname>Isnantiana</surname><given-names>N.I.</given-names></name></person-group><year>2017</year><fpage>41</fpage><lpage>56</lpage><page-range>41-56</page-range><pub-id pub-id-type="doi">10.30595/islamadina.v18i2.1920</pub-id></element-citation></ref><ref id="BIBR-19"><element-citation publication-type="article-journal"><article-title>Penguatan Hukum dan Urgensi Otoritas Pengawasan Indepen Dalam Perlindungan Data Pribadi di Indonesia</article-title><source>Jurnal Lex Generalis</source><volume>2</volume><issue>8</issue><person-group person-group-type="author"><name><surname>Khansa</surname><given-names>F.N.</given-names></name></person-group><year>2021</year><fpage>649</fpage><lpage>662</lpage><page-range>649-662</page-range><pub-id pub-id-type="doi">10.56370/jhlg.v2i8.114</pub-id></element-citation></ref><ref id="BIBR-20"><element-citation publication-type="article-journal"><article-title>The European Union and the Search for an International Data Protection Framework”</article-title><source>Groningen Journal of International Law</source><volume>2</volume><person-group person-group-type="author"><name><surname>Kuner</surname><given-names>C.</given-names></name></person-group><year>2014</year><page-range>76</page-range><pub-id pub-id-type="doi">10.21827/5a86a82b67dab</pub-id></element-citation></ref><ref id="BIBR-21"><element-citation publication-type="article-journal"><article-title>Modalitas Hakim Progresif,”</article-title><source>Verstek: Jurnal Hukum Acara</source><volume>08</volume><issue>02</issue><person-group person-group-type="author"><name><surname>Lesmana</surname><given-names>Y.E.M.</given-names></name></person-group><year>2020</year><pub-id pub-id-type="doi">10.20961/jv.v8i2.44116</pub-id></element-citation></ref><ref id="BIBR-22"><element-citation publication-type="article-journal"><article-title>Fungsi Hukum Dalam Kehidupan Masyarakat"</article-title><source>Jurnal Masalah-Masalah Hukum</source><issue>i No. 3 Vol. 44</issue><person-group person-group-type="author"><name><surname>Mawardi</surname><given-names>D.R.</given-names></name></person-group><year>2015</year></element-citation></ref><ref id="BIBR-23"><element-citation publication-type=""><pub-id pub-id-type="doi">10.14710/mmh.44.3.2015.275-283</pub-id></element-citation></ref><ref id="BIBR-24"><element-citation publication-type="article-journal"><article-title>Analisis Yuridis Terhadap Legalitas Dokumen Elektronik Sebagai Alat Bukti Dalam Penyelesaiaan Sengketa</article-title><source>Jurnal Wawasan Yuridika</source><volume>32</volume><issue>1</issue><person-group person-group-type="author"><name><surname>Meliala</surname><given-names>S.M.</given-names></name></person-group><year>2015</year><fpage>99</fpage><lpage>111</lpage><page-range>99-111</page-range><pub-id pub-id-type="doi">10.25072/jwy.v32i1.92</pub-id></element-citation></ref><ref id="BIBR-25"><element-citation publication-type="article-journal"><article-title>Akibat hukum putusan hakim yang menjatuhkan putusan di luar dakwaan penuntut umum</article-title><source>Justitia Jurnal Hukum</source><volume>2</volume><issue>1</issue><person-group person-group-type="author"><name><surname>Ngape</surname><given-names>H.B.A.</given-names></name></person-group><year>2018</year><fpage>127</fpage><lpage>143</lpage><page-range>127-143</page-range><pub-id pub-id-type="doi">10.30651/justitia.v2i1.1229</pub-id></element-citation></ref><ref id="BIBR-26"><element-citation publication-type="chapter"><article-title>Perlindungan Data Pribadi dan Pribadi Penumpang Pada Era Big Data</article-title><source>Mimbar Hukum Jurnal Universitas Gaja Mada, Edisi No</source><volume>2</volume><person-group person-group-type="author"><name><surname>Nugraha</surname><given-names>R.A.</given-names></name></person-group><year>2018</year><pub-id pub-id-type="doi">10.22146/jmh.30855</pub-id></element-citation></ref><ref id="BIBR-27"><element-citation publication-type="article-journal"><article-title>Dialektika Pertimbangan Hakim Perkara Tindak Pidana”</article-title><source>Jurnal Verstek</source><volume>2</volume><issue>2</issue><person-group person-group-type="author"><name><surname>Pamungkas</surname><given-names>A.</given-names></name></person-group><year>2021</year><page-range>431</page-range></element-citation></ref><ref id="BIBR-28"><element-citation publication-type="article-journal"><article-title>Balancing the Interests of Labor and Capital: An Empirical Analysis of Philippine Supreme Court Labor Cases from 1987 to 2016</article-title><source>Philippine Political Science Journal</source><volume>39</volume><issue>1</issue><person-group person-group-type="author"><name><surname>Panao</surname><given-names>A.L.</given-names></name><name><surname>Leon</surname><given-names>B.X.D.</given-names></name></person-group><year>2018</year><fpage>24</fpage><lpage>46</lpage><page-range>24-46</page-range><pub-id pub-id-type="doi">10.1080/01154451.2018.1498606</pub-id></element-citation></ref><ref id="BIBR-29"><element-citation publication-type="article-journal"><article-title>Perlindungan Data Private Siber di Indonesia,”</article-title><source>Padjadjaran Journal of International Relations</source><volume>1</volume><issue>3</issue><person-group person-group-type="author"><name><surname>Prabowo</surname><given-names>W.H.</given-names></name><name><surname>Wibawa</surname><given-names>S.</given-names></name><name><surname>Azmi</surname><given-names>F.</given-names></name></person-group><year>2020</year><page-range>227</page-range><pub-id pub-id-type="doi">10.24198/padjir.v1i3.26194</pub-id></element-citation></ref><ref id="BIBR-30"><element-citation publication-type="article-journal"><article-title>Perlindungan Privasi Data Pribadi Perspektif Perbandingan Hukum</article-title><source>Jatiswara</source><volume>34</volume><issue>3</issue><person-group person-group-type="author"><name><surname>Priscyllia</surname><given-names>F.</given-names></name></person-group><year>2019</year><fpage>239</fpage><lpage>49</lpage><page-range>239-49</page-range><pub-id pub-id-type="doi">10.29303/jtsw.v34i3.218</pub-id></element-citation></ref><ref id="BIBR-31"><element-citation publication-type="article-journal"><article-title>Upaya Pencegahan Kebocoran Data Konsumen Melalui Pengesahan Ruu Perlindungan Data Pribadi (Studi Kasus E-Commerce Bhinneka.Com</article-title><source>Borneo Law Review</source><volume>5</volume><issue>1</issue><person-group person-group-type="author"><name><surname>Putri</surname><given-names>F.</given-names></name><name><surname>Destriani</surname><given-names>D.</given-names></name><name><surname>Fahrozi</surname><given-names>M.H.</given-names></name></person-group><year>2021</year><fpage>46</fpage><lpage>68</lpage><page-range>46-68</page-range><pub-id pub-id-type="doi">10.35334/bolrev.v5i1.2014</pub-id></element-citation></ref><ref id="BIBR-32"><element-citation publication-type="article-journal"><article-title>Benang Merah’ Penalaran Hukum, Argumentasi Hukum Dan Penegakan Hukum</article-title><source>Jurnal Hukum Progresif</source><volume>7</volume><issue>2</issue><person-group person-group-type="author"><name><surname>Qodri</surname><given-names>M.</given-names></name></person-group><year>2019</year><page-range>182</page-range><pub-id pub-id-type="doi">10.14710/hp.7.2.182-191</pub-id></element-citation></ref><ref id="BIBR-33"><element-citation publication-type="article-journal"><article-title>Application of Civil Law Theory In the Termination of Custody of Adopted Children in Indonesia</article-title><source>Journal of Legal Research</source><volume>1</volume><issue>6</issue><person-group person-group-type="author"><name><surname>Rezki</surname><given-names>A.</given-names></name><name><surname>Anggraeni</surname><given-names>R.R.</given-names></name><name><surname>Dewi</surname><given-names>Yunus</given-names></name><name name-style="given-only"><given-names>N.R.</given-names></name></person-group><year>2019</year><pub-id pub-id-type="doi">10.15408/jlr.v1i6.15301</pub-id></element-citation></ref><ref id="BIBR-34"><element-citation publication-type="article-journal"><article-title>Big Data and Big Data Analytics: Concepts, Types and Technology"</article-title><source>International Journal of Research and Engineering, Edisi</source><issue>9, Vol. 5</issue><person-group person-group-type="author"><name name-style="given-only"><given-names>Riahi</given-names></name><etal/></person-group><year>2015</year><page-range>525</page-range></element-citation></ref><ref id="BIBR-35"><element-citation publication-type=""><pub-id pub-id-type="doi">10.21276/ijre.2018.5.9.5</pub-id></element-citation></ref><ref id="BIBR-36"><element-citation publication-type="article-journal"><article-title>The necessity of the implementation of Privacy by Design insectors where data protection concerns arise</article-title><source>Comput. Law Secur. Rev</source><person-group person-group-type="author"><name><surname>Romanou</surname><given-names>A.</given-names></name></person-group><year>2017</year><fpage>1</fpage><lpage>12</lpage><page-range>1-12</page-range><pub-id pub-id-type="doi">10.1016/j.clsr.2017.05.021</pub-id></element-citation></ref><ref id="BIBR-37"><element-citation publication-type="book"><article-title>Cyber Law: Aspek Data Privasi Menurut Hukum Internasional, Regional, dan Nasional</article-title><person-group person-group-type="author"><name><surname>Rosadi</surname><given-names>S.D.</given-names></name></person-group><year>2015</year><publisher-name>PT Refika Aditama</publisher-name><publisher-loc>Bandung</publisher-loc></element-citation></ref><ref id="BIBR-38"><element-citation publication-type="article-journal"><article-title>Perlindungan Privasi dan Data Pribadi dalam Era Ekonomi Digital di Indonesia”</article-title><source>Jurnal Veritas et Justitia</source><volume>4</volume><issue>1</issue><person-group person-group-type="author"><name><surname>Rosadi</surname><given-names>S.D.</given-names></name><name><surname>Pratama</surname><given-names>G.G.</given-names></name></person-group><year>2018</year><page-range>89</page-range><pub-id pub-id-type="doi">10.25123/vej.2916</pub-id></element-citation></ref><ref id="BIBR-39"><element-citation publication-type="article-journal"><article-title>Urgensi Undang-undang Perlindungan Data Pribadi di Indonesia; Studi Perbandingan Hukum Inggris dan Malaysia”</article-title><source>Kanun Jurnal Ilmu Hukum</source><volume>20</volume><person-group person-group-type="author"><name><surname>Sautunnida</surname><given-names>L.</given-names></name></person-group><year>2018</year><page-range>2</page-range><pub-id pub-id-type="doi">10.24815/kanun.v20i2.11159</pub-id></element-citation></ref><ref id="BIBR-40"><element-citation publication-type="article-journal"><article-title>Penataan Lembaga Negara Mandiri dalam Struktur Ketatanaegaraan Indonesia</article-title><source>MIMBAR HUKUM</source><volume>26</volume><issue>2</issue><person-group person-group-type="author"><name><surname>Sukmariningsih</surname><given-names>R.M.</given-names></name></person-group><year>2014</year><fpage>194</fpage><lpage>204</lpage><page-range>194-204</page-range><pub-id pub-id-type="doi">10.22146/jmh.16039</pub-id></element-citation></ref><ref id="BIBR-41"><element-citation publication-type=""><article-title>Penegakan Hukum Terhadap Tindak Pidana Pencemaran Nama Baik Menurut Pasal 27 Ayat (3) Undang-Undang Nomor 11 Tahun 2008 Tentang Informasi dan Transaksi Elektronik</article-title><person-group person-group-type="author"><name><surname>Sutrisno</surname><given-names>B.</given-names></name><name><surname>Paksa</surname><given-names>F.X.B.B.</given-names></name></person-group><year>2019</year><pub-id pub-id-type="doi">10.32503/mizan.v8i1.495</pub-id></element-citation></ref><ref id="BIBR-42"><element-citation publication-type=""><article-title>Ati Tribe Wins Boracay Land Case vs Private Claimants.”Philippine Daily Inquirer</article-title><person-group person-group-type="author"><name><surname>Tetch</surname><given-names>T.T.</given-names></name></person-group><year>2019</year><ext-link xlink:href="https://www.newsinfo.inquirer.net/1158638/ati-tribe-wins-boracay-land-case-vs-private-claimants" ext-link-type="uri" xlink:title="Ati Tribe Wins Boracay Land Case vs Private Claimants.”Philippine Daily Inquirer">Available from: https://www.newsinfo.inquirer.net/1158638/ati-tribe-wins-boracay-land-case-vs-private-claimants</ext-link></element-citation></ref><ref id="BIBR-43"><element-citation publication-type="article-journal"><article-title>Logika Hukum Dan Terobosan Hukum Melalui Legal Reasoning,”</article-title><source>Jurnal Hukum Jatiswara</source><volume>31</volume><issue>1</issue><person-group person-group-type="author"><name><surname>Vera</surname><given-names>N.L.P.</given-names></name><name><surname>Ainudin</surname><given-names>N.</given-names></name></person-group><year>2016</year><fpage>99</fpage><lpage>110</lpage><page-range>99-110</page-range></element-citation></ref></ref-list></back></article>
