Law of The Republic of Indonesia NUMBER 11 OF 2008 ON Electronic Information and Transactions
Law of The Republic of Indonesia NUMBER 11 OF 2008 ON Electronic Information and Transactions
Law of The Republic of Indonesia NUMBER 11 OF 2008 ON Electronic Information and Transactions
NUMBER 11 OF 2008
ON
ELECTRONIC INFORMATION AND TRANSACTIONS1
AS CONSOLIDATED WITH:
LAW NUMBER 19 OF 2016 ON AMENDMENT TO LAW NUMBER 11 OF 2008 ON
ELECTRONIC INFORMATION AND TRANSACTIONS
Considering:
a. that national development is a sustainable process which should always be
responsive against various dynamics which happen in the public;
b. that globalization of information has put Indonesia as a part of global information
society, therefore it requires the establishment of regulation on management of
Electronic Information and Transaction on national level, thus the development of
Information Technology may be performed in optimum manner, equally distributed,
and spread to all strata of the society in order to educate the nation’s life;
c. that development and advancement of Information Technology which is so rapid has
caused alteration to activities of human’s lives in various sectors, which directly have
affected the inception of new forms of legal acts;
d. that the use and utilization of Information Technology should continue to be
developed in order to protect, maintain, and strengthen national unity based on Laws
and Regulations for the purpose of national interest;
*
This translation is created with the best effort as can be offered and by any means, does not constitute and should
not be treated as official translation or sworn translation for legal proceeding purposes. The copyright owner: 1)
Should not be held liable for any error which occurs in the source document; 2) Reserves the right to change and
modify this translation, with subsequent notifications given to every clients in timely manner; and 3) May seek
redress for any unlawful or unauthorized transfer or disclosure of this translation against any party.
Considering:
a. that in order to guarantee recognition, as well as respect toward rights and
freedom of others and in order to fulfill fair demand in accordance with
considerations of security and public order in a democratic society, amendment
to Law Number 11 of 2008 on Electronic Information and Transactions is deemed
necessary to be made, so that fairness, public order, and legal certainty can be
realized;
b. that based on consideration as referred to in letter a, it is deemed necessary to
enact Law on Amendment to Law Number 11 of 2008 on Electronic Information
and Transactions;
In view of:
Article 5 paragraph (1) and Article 20 of the 1945 Constitution of the Republic of
Indonesia;
In view of:
1. Article 5 paragraph (1), Article 20, Article 25A, Article 28D paragraph (1), Article
28E paragraph (2), Article 28E paragraph (3), Article 28F, Article 28G paragraph
(1), Article 28J paragraph (2), and Article 33 paragraph (2) of the 1945
Constitution of the Republic of Indonesia;
2. Law Number 11 of 2008 on Electronic Information and Transactions (State
gazette of the Republic of Indonesia of 2008 Number 58, Supplement to the State
Gazette of the Republic of Indonesia Number 4843);
HAVE DECIDED:
To enact:
LAW ON ELECTRONIC INFORMATION AND TRANSACTIONS.
CHAPTER 1
GENERAL PROVISIONS
Article 1*
Under this Law, the following definitions are employed:
1. Electronic Information is one or a group of electronic data, including but not limited
to text, sound, image, map, design, photo, electronic data interchange (EDI),
electronic mail (surat elektronik), telegram, telex, telecopy or its equivalent, letter,
CHAPTER II
PRINCIPLES AND PURPOSES
Article 3
The utilization of Information Technology and Electronic Transaction is performed based
on the principles of legal certainty, benefit, precautionary, good faith, and freedom to
choose technology or technology-neutral.
Article 4
The utilization of Information Technology and Electronic Transaction is performed with
the purposes to:
a. educate nation’s life as a part of global information society;
b. develop national trading and economy in the event of increasing public welfare;
c. increase the effectiveness and efficiency of public services;
d. open opportunities as broad as possible to any Person to advance the thinking and
ability within the sectors of the use and utilization of Information Technology as
optimal as possible and accountable; and
e. provide the feeling of secure, fairness, and legal certainty for the user and provider
of Information Technology.
Article 5*
(1) Electronic Information and/or Electronic Document and/or its hardcopy are valid
legal evidence.
(2) Electronic Information and/or Electronic Document and/or its hardcopy as referred
to in paragraph (1) are expansion of valid evidence in accordance with the prevailing
Procedural Law in Indonesia.
(3) Electronic Information and/or Electronic Document are declared valid if using
Electronic System in accordance with provisions as addressed under this Law.
(4) Provisions on Electronic Information and/or Electronic Document as referred to in
paragraph (1) do not apply for:
a. letter, of which, according to the Law should be made in writing; and
b. letter, as well as its documents, of which, according to the Law should be made
in the forms of notarial deed or deed which is made by notary [pejabat pembuat
akta].
Article 6
In case there are provisions other than as addressed under Article 5 paragraph (4) which
require that an information should be in the forms of writing or its authentic version,
Electronic Information and/or Electronic Document are deemed to be valid, provided that
information as addressed in it may be accessed, displayed, guaranteed on its integrity,
and accountable, hence it explains a condition.
Article 7
Any Person who declares a right, strengthens existing right, or reject right of other Person
based on the existence of Electronic Information and/or Electronic Document, should
ascertain that Electronic Information and/or Electronic Document under its possession
are originated from Electronic System which fulfills requirements based on Laws and
Regulations.
Article 9
Businesses who offer product through Electronic System should provide complete and
veracious information relating to the conditions of contract, producer, and offered product.
Article 10
(1) Any businesses which organize Electronic Transaction may be certified by
Reliability Certification Agency.
(2) Provisions on establishment of Reliability Certification Agency as referred to in
paragraph (1) are addressed under Regulation of the Government.
Article 12
(1) Any Person who is involved in Digital Signature is obliged to provide security of
Digital Signature which is used by it.
(2) Security of Digital Signature as referred to in paragraph (1) at least encompasses:
a. system is inaccessible by another ineligible Person;
b. Signor should implement precautionary principles in order to prevent invalid
use of data relating to the generation of Digital Signature;
c. Signor should, without any delay, use the method which is advised by Digital
Signature provider or other method which is proper and should have
immediately notified someone whom by the Signor is considered to trust Digital
Signature or to the party as the supporter of Digital Signature services, if:
1. Signor knows that the generation data on Digital Signature has been
breached; or
2. condition which is known by the Signor may raise significant risk,
probably due to the breach of generation data on Digital Signature; and
CHAPTER IV
DIGITAL CERTIFICATION PRACTICE AND ELECTRONIC SYSTEM
First Division
Digital Certification Practice
Article 13
(1) Any Person is entitled to use the service of Digital Certification Provider for the
generation of Digital Signature.
(2) Digital Certification Provider should guarantee interconnectedness of a Digital
Signature with its owner.
(3) Digital Certification Provider consists of:
a. Indonesian Digital Certification Provider; and
b. foreign Digital Certification Provider.
(4) Indonesian Digital Certification Provider takes form as Indonesian incorporated
entity and is domiciled in Indonesia.
(5) Foreign Digital Certification Provider which operates in Indonesia should be
registered in Indonesia.
(6) Further provisions on Digital Certification Provider as referred to in paragraph (3)
are addressed under Regulation of the Government.
Article 14
Digital Certification Provider as referred to under Article 13 paragraph (1) up to paragraph
(5) should provide accurate, clear, and certain information to every service user,
encompassing:
Second Division
Organization of Electronic System
Article 15
(1) Any Electronic System Provider should organize Electronic System in reliable and
secure manners, as well as held responsible for the proper operation of Electronic
System.
(2) Electronic System Provider is held liable for the Organization of its Electronic
System.
(3) Provisions as referred to in paragraph (2) do not apply in case the occurrence of
force majeure [keadaan memaksa], error, and/or negligence from Electronic System
user can be proven.
Article 16
(1) Insofar that it is not deemed otherwise under separate law, any Electronic System
Provider must operate Electronic System which fulfills the following minimum
requirements:
a. able to redisplay Electronic Information and/or Electronic Document in
integrated manner in accordance with the retention period as established
under Laws and Regulations;
b. able to protect the availability, integrity, authenticity, confidentiality, and
accessibility of Electronic Information in the course of such Organization of
Electronic System;
c. able to operate in accordance with procedure or guideline in the course of such
Organization of Electronic System;
CHAPTER V
ELECTRONIC TRANSACTION
Article 17
(1) Organization of Electronic Transaction may be performed within public or private
scope.
(2) The parties who perform Electronic Transaction as referred to in paragraph (1) must
be in good faith in the course of performing interaction and/or exchange of Electronic
Information and/or Electronic Document during the ongoing transaction.
(3) Further provisions on organization of Electronic Transaction as referred to in
paragraph (1) are addressed under Regulation of the Government.
Article 18
(1) Electronic Transaction which is incorporated in the forms of Electronic Contract
binds the parties.
(2) The parties have the authority to make choice of law for international Electronic
Transaction which is made by them.
(3) If the parties do not make choice of law for international Electronic Transaction, the
prevailing law is based on the principles of Private International Law.
(4) The parties have the authority to determine the forum of court, arbitration, or other
alternative dispute resolution body which is competent to handle the dispute which
might occur from international Electronic Transaction which is made by them.
Article 19
The parties who perform Electronic Transaction should use Electronic System which is
agreed.
Article 20
(1) Unless deemed otherwise by the parties, Electronic Transaction takes place when
the offering of transaction which is sent by the Sender has been accepted and
agreed by the Acceptor.
(2) Agreement to offering of Electronic Transaction as referred to in paragraph (1)
should be performed by electronic acceptance statement.
Article 21
(1) Sender or Acceptor may perform Electronic Transaction by itself, through the party
who is authorized by it, or through Electronic Agent.
(2) Party who is held liable for any legal consequences for the performance of Electronic
Transaction as referred to in paragraph (1) is addressed as follows:
a. if it is performed by itself, any legal consequences for the performance of
Electronic Transaction become the liability of the parties to transaction;
b. if it is performed through the granting of authorization, any legal consequences
for the performance of Electronic Transaction become the liability of principal;
or
c. if it is performed through Electronic Agent, any legal consequences for the
performance of Electronic Transaction become the liability of Electronic Agent
provider.
Article 22
(1) Certain Electronic Agent provider should accommodate feature for Electronic Agent
which is operated by it, which enables its user to perform modification to information
which is still undergoing the transaction process.
(2) Further provisions on certain Electronic Agent provider as referred to in paragraph
(1) are addressed under Regulation of the Government.
CHAPTER VI
DOMAIN NAMES, INTELLECTUAL PROPERTY RIGHTS, AND PROTECTION OF
INDIVIDUAL RIGHTS
Article 23
(1) Any state organizer, Person, Enterprise, and/or the public are entitled to own
Domain Name based on the first-come-first-serve principle.
(2) Ownership and use of Domain Name as referred to in paragraph (1) should be
based on good faith, not violating fair business competition principles, and not
violating rights of another Person.
(3) Any state organizer, Person, Enterprise, or the public who is injured due to
unauthorized use of Domain Name by other Person, is entitled to file a lawsuit for
cancellation of Domain Name in question.
Article 25
Electronic Information and/or Electronic Document which are composed into intellectual
creation, internet site, and intellectual creation which exists within it is protected as
Intellectual Property Right based on provisions under Laws and Regulations.
Article 26*
(1) Unless deemed otherwise under laws and regulations, the use of any information
through electronic media in connection with personal data of an individual should be
performed based on consent of Person in question.
(2) Any Person whose right is violated as referred to in paragraph (1) may file a lawsuit
for incurred losses based on this Law.
(3) Any Electronic System Provider must erase Electronic Information and/or Electronic
Document which are irrelevant that are under its control upon request from person
in question based on court stipulation.
(4) Any Electronic System Provider must provide mechanism for the erasure of
Electronic Information and/or Electronic Document which are no longer relevant in
accordance with provisions under laws and regulations.
CHAPTER VII
PROHIBITED ACTS
Article 27*
(1) Any Person who deliberately and unlawfully distributes and/or transmits and/or
makes the accessibility of Electronic Information and/or Electronic Document
containing contents which violate decency.
(2) Any Person who deliberately and unlawfully distributes and/or transmits and/or
makes the accessibility of Electronic Information and/or Electronic Document
containing contents on gambling.
(3) Any Person who deliberately and unlawfully distributes and/or transmits and/or
makes the accessibility of Electronic Information and/or Electronic Document
containing contents on insult and/or defamation.
(4) Any Person who deliberately and unlawfully distributes and/or transmits and/or
makes the accessibility of Electronic Information and/or Electronic Document
containing contents on extortion and/or threat.
Article 28
(1) Any Person who deliberately and unlawfully disseminates hoax and misleading
news which inflict losses for consumers to Electronic Transaction.
(2) Any Person who deliberately and unlawfully disseminates information which is
aimed to create hatred or hostility toward certain individual and/or group of society
based on ethnicity, religion, race, and inter-group relation (Suku, Agama, Ras, dan
Antargolongan – SARA).
Article 30
(1) Any Person who deliberately and unlawfully or illegally accesses Computer and/or
Electronic System as owned by another Person by all means.
(2) Any Person who deliberately and unlawfully or illegally accesses Computer and/or
Electronic System by all means with the purpose of obtaining Electronic Information
and/or Electronic Document.
(3) Any Person who deliberately and unlawfully or illegally accesses Computer and/or
Electronic System by all means by violating, breaching, trespassing, or penetrating
security system.
Article 31*
(1) Any Person who deliberately and unlawfully or illegally performs interception or
wiretapping of Electronic Information and/or Electronic Document in a Computer
and/or certain Electronic System as owned by another Person.
(2) Any Person who deliberately and unlawfully or illegally performs interception of
transmission of Electronic Information and/or Electronic Document which is not
public in nature, from, to, and within a Computer and/or certain Electronic System
as owned by another Person, both not causing any alteration or causing any
alteration, deletion, and/or cessation of Electronic Information and/or Electronic
Document which are being transmitted.
(3) Provisions as referred to in paragraph (1) and paragraph (2) do not apply against
interception or wiretapping as performed in the event of law enforcement upon
request from police, public prosecutor’s office, or another institution which
authorities are established based on law.
(4) Further provisions on procedures for interception as referred to in paragraph (3) are
addressed under a law.
Article 33
Any Person who deliberately and unlawfully or illegally performs any act which causes
the interference of Electronic System and/or causes Electronic System to not properly in
operation.
Article 34
(1) Any Person who deliberately and unlawfully or illegally produces, sells, procures for
use purposes, imports, distributes, provides or possesses:
a. hardware or software of Computer which is designed or specifically developed
to facilitate an act as referred to under Article 27 up to Article 33;
b. password of Computer, Access Code, or matter which is similar to it, with an
aim for Electronic System to be accessible with the purpose of facilitating an
act as referred to under Article 27 up to Article 33.
(2) Act as referred to in paragraph (1) is not a criminal act if it is aimed to perform the
activities in regards to research, testing of Electronic System, for protection of the
Electronic System itself in lawful and legal manners.
Article 36
Any Person who deliberately and unlawfully or illegally performs an act as referred to
under Article 27 up to Article 34 which inflicts losses to another Person.
Article 37
Any Person who deliberately performs prohibited acts as referred to under Article 27 up
to Article 36 outside of Indonesia’s territories against Electronic System which exists in
Indonesia’s jurisdictions.
CHAPTER VIII
DISPUTE RESOLUTION
Article 38
(1) Any Person may file a lawsuit against the party who organizes Electronic System
and/or uses Information Technology which inflicts losses.
(2) The public may file a lawsuit through class action [perwakilan] against the party who
organizes Electronic System and/or uses Information Technology which causes
losses for the public, in accordance with provisions under Laws and Regulations.
Article 39
(1) Civil lawsuit is performed in accordance with provisions under Laws and Regulations.
(2) Other than resolution through civil lawsuit as referred to in paragraph (1), the parties
may resolve the dispute through arbitration, or other alternative dispute resolution
body in accordance with provisions under Laws and Regulations.
Article 40*
(1) Government facilitates the utilization of Information Technology and Electronic
Transaction in accordance with provisions under laws and regulations.
(2) Government protects public interest from any types of interferences as a
consequence of misuse of Electronic Information and Electronic Transaction which
disturbs public order, in accordance with provisions under laws and regulations.
(2a) Government must perform prevention of dissemination and use of Electronic
Information and/or Electronic Document containing prohibited contents in
accordance with provisions under laws and regulations.
(2b) In the course of performing prevention as referred to in paragraph (2a), Government
is authorized to perform termination of access and/or order Electronic System
Provider to perform termination of access against Electronic Information and/or
Electronic Document containing illegal contents.
(3) Government determines body or institution which possesses strategic electronic
data which must be protected.
(4) Body or institution as referred to in paragraph (3) should produce Electronic
Document and its electronic backup record, as well as connect it to certain data
center for data security purposes.
(5) Body or institution other than as addressed in paragraph (3) produces Electronic
Document and its electronic backup record in accordance with the needs of
protection of data as possessed by it.
(6) Further provisions on role of the Government as referred to in paragraph (1),
paragraph (2), paragraph (2a), paragraph (2b), and paragraph (3) are addressed
under regulation of the government.
CHAPTER X
INVESTIGATION
Article 42
Investigation against criminal act as referred to under this Law, is performed based on
provisions under Criminal Procedural Law and provisions under this Law.
Article 43*
(1) In addition to Indonesian National Police Investigator, certain Civil Servant Officer
within the scope of the Government whose scope of its duties and responsibilities is
within the sectors of Information Technology and Electronic Transaction, is granted
special authority as investigator under the Law on Criminal Procedural Law in order
to perform investigation of criminal act within the sectors of Information Technology
and Electronic Transaction.
(2) Investigation within the sector of Information Technology and Electronic Transaction
as referred to in paragraph (1) is performed by considering protection of privacy,
confidentiality, smoothness of public services, and integrity or wholeness of data in
accordance with provisions under laws and regulations.
(3) Search [penggeledahan] and/or confiscation of Electronic System which relates to
allegation of criminal act within the sectors of Information Technology and Electronic
Transaction are performed in accordance with the provisions of criminal procedural
law.
Article 44
Evidence for investigation, prosecution and examination in court proceedings according
to provisions under this Law, are as follows:
a. evidence as referred to in provisions under Laws and Regulations; and
b. other evidence in the forms of Electronic Information and/or Electronic Document as
referred to under Article 1 point 1 and point 4, as well as Article 5 paragraph (1),
paragraph (2), and paragraph (3).
Article 45*
(1) Any Person who deliberately and unlawfully distributes and/or transmits and/or
causes the access of Electronic Information and/or Electronic Document containing
contents which violate decency as referred to under Article 27 paragraph (1) is
sentenced with imprisonment for 6 (six) years at maximum and/or fines in sum of
IDR 1,000,000,000.00 (one billion rupiahs) at maximum.
(2) Any Person who deliberately and unlawfully distributes and/or transmits and/or
causes the access of Electronic Information and/or Electronic Document containing
contents on gambling as referred to under Article 27 paragraph (2) is sentenced with
imprisonment for 6 (six) years at maximum and/or fines in sum of IDR
1,000,000,000.00 (one billion rupiahs) at maximum.
(3) Any Person who deliberately and unlawfully distributes and/or transmits and/or
causes the access of Electronic Information and/or Electronic Document containing
contents on insult and/or defamation as referred to under Article 27 paragraph (3) is
sentenced with imprisonment for 4 (four) years at maximum and/or fines in sum of
IDR 750,000,000.00 (seven hundred and fifty million rupiahs) at maximum.
(4) Any Person who deliberately and unlawfully distributes and/or transmits and/or
causes the access of Electronic Information and/or Electronic Document containing
contents on extortion and/or threat as referred to under Article 27 paragraph (4) is
sentenced with imprisonment for 6 (six) years at maximum and/or fines in sum of
IDR 1,000,000,000.00 (one billion rupiahs) at maximum.
(5) Provisions as referred to in paragraph (3) are complaint offense.
Article 45A*
(1) Any Person who deliberately and unlawfully disseminates hoax and misleading
news which inflict losses for consumers to Electronic Transaction as referred to
under Article 28 paragraph (1) is sentenced with imprisonment for 6 (six) years at
Article 45B*
Any Person who deliberately and unlawfully sends Electronic Information and/or
Electronic Document containing violence threat or frightening which is addressed
personally as referred to under Article 29 is sentenced with imprisonment for 4 (four)
years at maximum and/or fines in sum of IDR 750,000,000.00 (seven hundred and fifty
million rupiahs) at maximum.
Article 46
(1) Any Person who fulfills elements as referred to under Article 30 paragraph (1) is
sentenced with imprisonment for 6 (six) years at maximum and/or fines in sum of
IDR 600,000,000.00 (six hundred million rupiahs) at maximum.
(2) Any Person who fulfills elements as referred to under Article 30 paragraph (2) is
sentenced with imprisonment for 7 (seven) years at maximum and/or fines in sum
of IDR 700,000,000.00 (seven hundred million rupiahs) at maximum.
(3) Any Person who fulfills elements as referred to under Article 30 paragraph (3) is
sentenced with imprisonment for 8 (eight) years at maximum and/or fines in sum of
IDR 800,000,000.00 (eight hundred million rupiahs) at maximum.
Article 47
Any Person who fulfills elements as referred to under Article 31 paragraph (1) or
paragraph (2) is sentenced with imprisonment for 10 (ten) years at maximum and/or fines
in sum of IDR 800,000,000.00 (eight hundred million rupiahs) at maximum.
Article 49
Any Person who fulfills elements as referred to under Article 33, is sentenced with
imprisonment for 10 (ten) years at maximum and/or fines in sum of IDR
10,000,000,000.00 (ten billion rupiahs) at maximum.
Article 50
Any Person who fulfills elements as referred to under Article 34 paragraph (1) is
sentenced with imprisonment for 10 (ten) years at maximum and/or fines in sum of IDR
10,000,000,000.00 (ten billion rupiahs) at maximum.
Article 51
(1) Any Person who fulfills elements as referred to under Article 35 is sentenced with
imprisonment for 12 (twelve) years at maximum and/or fines in sum of IDR
12,000,000,000.00 (twelve billion rupiahs) at maximum.
(2) Any Person who fulfills elements as referred to under Article 36 is sentenced with
imprisonment for 12 (twelve) years at maximum and/or fines in sum of IDR
12,000,000,000.00 (twelve billion rupiahs) at maximum.
CHAPTER XII
TRANSITIONAL PROVISIONS
Article 53
When this Law enters into force, all Laws and Regulations and institutional aspect in
connection with utilization of Information Technology which are not in contradictory with
this Law are declared to continue to prevail.
Article 54
(1) This Law enters into force on its promulgation date.
(2) Regulation of the Government should have been established no later than 2 (two)
years after the promulgation of this Law.
For the purposes of public cognizance, it has been ordered that the promulgation of this
Law should be achieved through its publication in the State Gazette of the Republic of
Indonesia.
Article II
This Law enters into force on its promulgation date.
For the purposes of public cognizance, it has been ordered that the promulgation of this
Law should be achieved through its publication in the State Gazette of the Republic of
Indonesia.
Enacted in Jakarta
on 21 April 2008
PRESIDENT OF THE REPUBLIC OF INDONESIA,
Promulgated in Jakarta
on 21 April 2008
ANDI MATTALATA
Enacted in Jakarta
On 25 November 2016
PRESIDENT OF THE REPUBLIC OF INDONESIA,
signed
JOKO WIDODO
Promulgated in Jakarta
On 25 November 2016
MINSITER OF LAW AND HUMAN RIGHTS OF
THE REPUBLIC OF INDONESIA
signed
YASONNA H. LAOLY
I. GENERAL
The utilization of Information Technology, media, and communication has
changed both global behavior of the society and human civilization. Development of
information technology and communication has also caused the world relationship
to be borderless (tanpa batas) and caused significant changes in social, economy,
and culture in very fast manner. Information Technology is currently being a double-
edged sword, because asides from giving contribution for the increase in welfare,
advancement and human civilization, it also becomes an effective mean for illegal
act.
Currently, a new legal regime has been born, which is known as cyber law or
telematic law. Cyber law or hukum siber, is internationally used for legal definition
relating to utilization of information and communication technology. In addition,
telematic law is the manifestation of convergence of telecommunication law, media
law, and informatics law. Another definition which is also used is law of information
technology (hukum teknologi informasi), virtual world law (hukum dunia maya), and
cyberspace law (hukum mayantara). Such definitions exist considering activities
which are performed through the networks of computer system and communication
system, both within the local and global scopes (Internet) by utilizing computer-
system-based information technology which is electronic system, may be viewed
virtually. Legal dispute which is often encountered is when relating to delivery of
information, communication, and/or transaction in electronic manner, specifically in
regards to inquisitorial process and matters relating to legal act which is performed
through electronic system.
Electronic system refers to computer system in a broad manner, which not only
encompasses hardware and software of computer, but also encompasses
Article 1
Self-explanatory.
Article 2
This Law has scope of jurisdiction which is not merely for legal act that prevails
in Indonesia and/or performed by Indonesian citizen, but also prevails for legal
act as performed outside of jurisdiction (wilayah hukum) of Indonesia, either by
Indonesian citizen or foreign citizen or Indonesian incorporated entity or foreign
incorporated entity, which is having legal consequence in Indonesia, considering
the utilization of Information Technology for Electronic Information and Electronic
Transaction may be cross-territories or universal.
“Injuring Indonesia’s interests” refers to, including but not limited to injuring the
interests of national economy, protection of strategic data, nation’s dignity and
standards, state defence and security, state sovereignty, citizen, as well as
Indonesian incorporated entity.
Article 3
“Principle of legal certainty” refers to legal ground for utilization of Information
Technology and Electronic Transaction, as well as any matters which support its
organization which obtains legal recognition inside and outside of court.
“Principle of benefit” refer to principle for the utilization of Information Technology
and Electronic Transaction is strived for supporting the informing process,
therefore it may increase public welfare.
“Principle of precautionary” refers to ground for parties in question that they [sic]
should take regard the entire aspects which are having potentials to inflict losses,
either for themselves or another party in the course of utilization of Information
Technology and Electronic Transaction.
Article 4
Self-explanatory.
Article 5*
Paragraph (1)
That existence of Electronic Information and/or Electronic Document binds and
be recognized as valid evidence in order to provide legal certainty against the
Organization of Electronic System and Electronic Transaction, specifically for
the inquisitorial process and matters relating to legal act which is performed
through Electronic System.
Paragraph (2)
Specifically for Electronic Information and/or Electronic Document in the forms
of result of interception or wiretapping or recording which is a part of
wiretapping that should be performed in the event of law enforcement upon
request from police, public prosecutor, and/or other institution, of which, its
authority is addressed based on law.
Paragraph (3)
Self-explanatory.
Paragraph (4)
Letter a
Letter, of which, according to the law should be made in writing, including
but not limited to negotiable instrument, letter of value [surat yang berharga],
Article 6
Up until the current condition, written form is identical with information and/or
document as merely incorporated on the paper, however, fundamentally,
information and/or document may be incorporated into any media, including
electronic media. Within the scope of Electronic System, authentic information
and its copy is no longer relevant to be differentiated since Electronic System
basically operates through the way of duplication which causes the authentic
information can no longer be differentiated from its copy.
Article 7
This provision denotes that an Electronic Information and/or Electronic Document
may be used as the reason for the inception of a right.
Article 8
Self-explanatory.
Article 9
“Complete and veracious information” refers to, encompassing:
a. information containing identity, as well as status of legal subject and its
competence, either as producer, supplier, provider or intermediary;
b. other information explaining certain matter which becomes the condition for
validity of agreement, as well as explaining goods and/or services which are
offered, such as name, address, and description of goods/services.
Article 11
Paragraph (1)
This Law only provides explicit recognition that, although it is only a code,
Digital Signature possesses the same standing with manual signature which
generally possesses legal power and legal consequence.
Requirements as referred to under this Article are minimum requirements
which must be fulfilled by each Digital Signature. This provision opens
opportunities as broad as possible to anyone to develop method, technique,
or process for the generation of Digital Signature.
Paragraph (2)
Regulation of the Government in question, inter alia, addresses technique,
method, mean, and process for the generation of Digital Signature.
Article 12
Self-explanatory.
Article 13
Self-explanatory.
Article 15
Paragraph (1)
“Reliable” denotes that Electronic System possesses capability which is in
accordance with the purposes of its use.
“Secure” denotes that Electronic System is protected physically and non-
physically.
“Proper operation” denotes that Electronic System possesses capability which
is in accordance with its specification.
Paragraph (2)
“Held liable” denotes that there is legal subject who is legally held liable against
such Organization of Electronic System.
Paragraph (3)
Self-explanatory.
Article 16
Self-explanatory.
Article 17
Paragraph (1)
This Law provides opportunity for the utilization of Information Technology by
state organizer, Person, Enterprise, and/or the public.
Utilization of Information Technology should be performed well, wisely,
responsibly, effectively, and efficient, hence the utmost benefit for the public
may be reached.
Paragraph (2)
Self-explanatory.
Paragraph (3)
Article 18
Paragraph (1)
Self-explanatory.
Paragraph (2)
Choice of law is performed by the parties to international contract, including
those which are performed electronically, is known as pilihan hukum. This law
binds as the law which prevails for such contract.
Choice of law in Electronic Transaction may only be performed if there is
foreign element in the contract and its implementation should be in line with
the principles of private international law (Hukum Perdata Internasional – HPI).
Paragraph (3)
In case the choice of law is absent, determination of prevailing law which is
based on principles or rules of private international law will be determined as
the law which prevails to such contract.
Paragraph (4)
Forum which is competent to adjudicate international contract dispute,
including those which are performed electronically, is forum which is chosen
by the parties. Such forum may take form as court, arbitration, or other
alternative dispute resolution body.
Paragraph (5)
In case the parties do not make choice of forum, the competence of forum
prevails based on principles or rules of private international law. Such rules are
known as the domicile of the defendant (the basis of presence) rule and
effectiveness which emphasizes on the location where assets of the defendant
lie (principle of effectiveness).
Article 19
“Agreed” under this article also encompasses the agreed procedure which exists
in the Electronic System in question.
Article 21
Paragraph (1)
“Authorized” under this provision is advised to be declared in power of attorney.
Paragraph (2)
Self-explanatory.
Paragraph (3)
Self-explanatory.
Paragraph (4)
Self-explanatory.
Paragraph (5)
Self-explanatory.
Article 22
Paragraph (1)
“Feature” refers to facility which provides opportunity for the user of Electronic
Agent to make modification to information which is delivered by it, namely
facilities for cancellation (pembatalan), edit, and reconfirmation.
Paragraph (2)
Self-explanatory.
Article 24
Self-explanatory.
Article 25
Electronic Information and/or Electronic Document which are formulated and be
registered as intellectual creation, copyright, patent, mark, trade secret, industrial
design, and its equivalent, must be protected under this Law by regarding
provisions under Laws and Regulations.
Article 27*
Paragraph (1)
“Distributes” refers to sending and/or disseminating Electronic Information
and/or Electronic Document to many Persons or various parties through
Electronic System.
“Transmits” refers to sending Electronic Information and/or Electronic
Document which is designated to one other party through Electronic System.
“Makes the accessibility” refers to any acts other than distributing and
transmitting through Electronic System which cause Electronic Information
and/or Electronic Document to be known by another party or the public.
Paragraph (2)
Self-explanatory.
Article 28
Self-explanatory.
Article 29
Self-explanatory.
Article 30
Paragraph (1)
Self-explanatory.
Paragraph (2)
Technically, prohibited act as referred to in this paragraph may be committed,
inter alia, by:
a. performing communication, sending, broadcasting or deliberately
attempting to realize such conditions to anyone who is ineligible to
receive it; or
b. deliberately preventing, so that the information in question cannot be or
failed to be received by those who are authorized to accept it within the
scope of government and/or regional government.
Paragraph (3)
Security system is system which restricts access to Computer or bans access
to inside of Computer based on categorization or classification of user, as well
as authority level which is determined.
Article 32
Self-explanatory.
Article 33
Self-explanatory.
Article 34
Paragraph (1)
Self-explanatory.
Paragraph (2)
“Activities in regards to research” refer to research that is conducted by
licensed research agency.
Article 35
Self-explanatory.
Article 37
Self-explanatory.
Article 38
Self-explanatory.
Article 39
Self-explanatory.
Article 40*
Paragraph (1)
Facilitation of utilization of Information Technology, including governance of
Information Technology and Electronic Transaction which is secure, ethical,
intelligent, creative, productive, and innovative. This provision includes
facilitating the general public, governmental body, and businesses in the
course of developing products and services relating to Information Technology
and communication.
Paragraph (2)
Self-explanatory.
Paragraph (2a)
Self-explanatory.
Paragraph (2b)
Self-explanatory.
Paragraph (3)
Self-explanatory.
Paragraph (4)
Self-explanatory.
Article 42
Self-explanatory.
Article 43*
Paragraph (1)
“Certain Civil Servant Officer” refers to Civil Servant Officer at ministry which
organizes governmental affairs within the sectors of communication and
informatics who have fulfilled requirements based on provisions under laws
and regulations.
Paragraph (2)
Self-explanatory.
Paragraph (3)
Self-explanatory.
Paragraph (4)
Self-explanatory.
Paragraph (5)
Letter a
Self-explanatory.
Letter b
Self-explanatory.
Letter c
Self-explanatory.
Letter d
Self-explanatory.
Letter e
Self-explanatory.
Article 44
Self-explanatory.
Article 45*
Self-explanatory.
Article 45A*
Self-explanatory.
Article 46
Self-explanatory.
Article 47
Self-explanatory.
Article 48
Self-explanatory.
Article 49
Self-explanatory.
Article 50
Self-explanatory.
Article 51
Self-explanatory.
Article 52
Paragraph (1)
Self-explanatory.
Paragraph (2)
Self-explanatory.
Paragraph (3)
Self-explanatory.
Article 53
Self-explanatory.
Article 54
Self-explanatory.
The translator is aware that there have been numerous Constitutional Court
Decisions which have been filed against this Law. However, most of them have been
accommodated under the Law Number 19 of 2016 on Amendment to Law Number 11 of
2008 on Electronic Information and Transaction, including:
1. Constitutional Court Decision Number 50/PUU-VI/2008;
2. Constitutional Court Decision Number 2/PUU-VII/2009;
3. Constitutional Court Decision Number 5/PUU-VIII/2010; and
4. Constitutional Court Decision Number 20/PUU-XIV/2016,
therefore, consolidation with the abovementioned Constitutional Court Decisions are,
needless to say, practically not necessary anymore.
In addition, the translator is also aware that there have been several judicial-review
petitions against this Law subsequent to the passing of Law Number 19 of 2016 on
Amendment to Law Number 11 of 2008 on Electronic Information and Transaction,
including:
1. Constitutional Court Decision Number 74/PUU-XIV/2016 (withdrawn);
2. Constitutional Court Decision Number 76/PUU-XV/2017 (completely rejected);
3. Constitutional Court Decision Number 64/PUU-XVI/2018 (inadmissible),
considering that all of them are not granted (or at least partially granted), hence the
abovementioned Constitutional Court Decisions are, once again, practically not
necessary to be consolidated.