Ditemukan 5 dokumen yang sesuai dengan query
Reyhan Syofyano
Abstrak :
Tesis ini membahas mengenai pembentukan peraturan keamanan data European Union General Data Protection Regulation (EU GDPR). Uni Eropa berhasil menetapkan EU GDPR pada tahun 2016, disaat negara-negara masih kesulitan menghasilkan kebijakan keamanan yang dapat menjangkau ranah siber secara efektif. Peraturan tersebut berbentuk regulasi sehingga tidak membutuhkan ratifikasi tingkat nasional, sedangkan belum semua negara anggota Uni Eropa memiliki aturan dasar mengenai keamanan siber. Sehingga menjadi pertanyaan mengapa Uni Eropa berhasil membentuk EU GDPR tanpa mendapatkan penolakan dari badan-badan Uni Eropa. Penelitian dilakukan menggunakan metode kualitatif dan teori neofungsionalisme sebagai kerangka analisis. Neofungsionalisme melihat adanya fenomena spillover dalam terjadinya integrasi di Eropa. Tiga variabel spillover yaitu functional spillover, political spillover dan cultivated spillover menjadi faktor-faktor yang mempengaruhi pembentukan kebijakan. Berdasarkan faktor-faktor tersebut disimpulkan bahwa peran badan supranasional merupakan kunci penting pada proses integrasi penyebab berhasilnya pembentukan EU GDPR.
......This thesis examines the establishment of EU's new data protection regulation, European Union General Data Protection Regulation (EU GDPR). EU officially signed EU GDPR in 2016, at the moment when states are still in the hassle of procuring a security policy which able to reach the cyberspace effectively. With the form of an EU regulation the EU GDPR do not have to go through ratification on national level, whereas many of EU countries still haven't set their own basic law on cyber security yet. Thus, it brings up the question on why EU's managed to establish EU GDPR without any objections from the EU bodies. This study uses quantitative methodology and neofunctionalism theory as the analytical framework. Neofunctionalism recognize the spillover phenomenon in the occurrence of European Integration. Three variables of spillover: functional spillover, political spillover and cultivated spillover are the main factors which decides the result of the policy agreement. Based on those factors it can be concluded that supranational bodies within EU act as the important key regarding the process of integration which lead to the successful establishment of EU GDPR.
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2021
T-pdf
UI - Tesis Membership Universitas Indonesia Library
Radian Adi Nugraha
Abstrak :
Skripsi ini membahas mengenai penerapan pasal perlindungan data pribadi yang terdapat dalam Undang-undang No. 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik yang dikaitkan dengan praktik layanan komputasi awan yang saat ini sedang berkembang pesat. Kebutuhan komputasi awan diperkirakan akan mengalami peningkatan yang sangat besar di masa mendatang. Hal tersebut didorong makin banyaknya penggunaan perangkat yang terhubung ke internet dan membutuhkan akses layanan berbasis data secara real time. Sebagai sebuah jenis layanan yang masih tergolong baru di Indonesia, isu keamanan dan perlindungan data pribadi dinilai masih menjadi poin penting yang dikhawatirkan dalam adopsi komputasi awan di Indonesia, menyusul banyaknya kasus pembobolan data yang merugikan pengguna layanan berbasis media elektronik seperti telepon selular dan kartu kredit. Dalam penelitian ini akan dibahas mengenai konsep umum perlindungan data, peraturan perundang-undangan yang mengatur tentang perlindungan data baik di dalam maupun luar negeri, tinjauan umum dari komputasi awan, analisis pasal 26 UU ITE dan tanggung jawab dari penyedia layanan komputasi awan terhadap data pribadi pengguna layanannya.
......This paper discusses around the application of article about personal data protection that contained in Law No. 11 Year 2008 on Information and Electronic Transaction associated with the practice of cloud computing service that is growing rapidly nowadays. The need of cloud computing are predicted to get a huge increase in the future. It is driven more and more use of the devices that connected to the internet and require access to data-based services in real time. As a kind of the new service in Indonesia, the issue of security and personal data protection is still considered to be an important point of concern in the adoption of cloud computing in Indonesia, following a number of data leaked cases that adverse subject data of electronic media-based services such as mobile phones and credit cards. In this study will be discussed on the general concept of data protection, laws and regulations governing data protection both inside and outside the country, an overview of cloud computing, analysis of article 26 of Law of Information and Electroninc Transactions and responsibilities of providers of cloud computing services to the user's personal data from its services.
Depok: Fakultas Hukum Universitas Indonesia, 2012
S-Pdf
UI - Skripsi Open Universitas Indonesia Library
Abstrak :
"This book recognizes the importance of information technology by addressing the most crucial issues, challenges, opportunities, and solutions related to the role and responsibility of an information system, highlighting various aspects of the organizational and legal implications of system administration"-- Provided by publisher.
Hershey, PA: Information Science Reference, 2014
658.403 801 1 ORG
Buku Teks Universitas Indonesia Library
Oxford: Oxford University Press, 2015
341.63 CYB
Buku Teks Universitas Indonesia Library
Abstrak :
This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA compliance handbook, explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of certification and accreditation is discussed.
This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment.
Various topics discussed in this book include the NIST risk management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an authority to operate for an information system and what actions to take in regards to vulnerabilities and audit findings.
FISMA Compliance Handbook Second Edition, also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government?s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.
Waltham, MA: Syngress, 2013
e20427059
eBooks Universitas Indonesia Library