Proof Against Counterfeiting Crime In the Data Information and Electronic Traction (Supreme Court Case Study No. Reg 65 / PID.B / 2005 / PN.Medan)

Authors

  • Julianto Negoro
  • Fitriati Fitriati
  • Yetisma Saini

Abstract

The presence of the information society (information society) which is believed to be one of the important agenda of the world community in the third millennium, among others, characterized by the widespread use of the internet in the various activities of human life. Crime in the field of information technology in general, ordinary crimes that use information technology as a tool accessories. case studies and the decision to search is studied verdict Reg No. 65 / Pid.B / 2005 / PN.Medan) in which case it tells that the accused has committed forgery data. Issues that will be examined are as follows: 1 How is proof of the crime of falsification of data in information and electronic transactions? 2 .What into consideration in the judge dropped criminal fraud data in information and electronic transactions? This type of research used in this study is normative method. of proof in criminal cases falsification of data in information and electronic transactions in the case of credit card misuse is to attach evidence of improper use of transaction used by the actual owner of the credit card indicated by the signature validation. Consideration judge by considering what the charge or charges provided by the attorney and see the evidence or facts during the trial process.

Keywords: Verification, Falsification, Data, Electronic.

References

A. Buku

Abdul, Wahid, 2002. Kriminologi dan Kejahatan Kontemporer, Malang: Lembaga Penerbitan Fakultas Hukum UNISMA.

Abdul Wahid dan Mohammad Labib, 2005. Kejahatan Mayatara Cyber Crime, Jakarta: PT. Refika Aditama.

Adam Chazawi, 2001. Kejahatan terhadap Pemalsuan, PT RajaGrafindo Persada, Jakarta.

Andi, Hamzah, 1996. Hukum Pidana yang berkaitan dengan Komputer. Edisi Kedua, Sinar Grafika, Jakarta,

David I. Bainbridge, 1993. Komputer dan Hukum, Cetakan Pertama, Sinar Grafiks Jakarta,

H.A.K. Moch. Anwar, 1980. Hukum Pidana Bagian Khusus, KUHP buku II, Alumni, Bandung

Harahap, M. Yahya, 2010 Hukum Acara Perdata, Jakarta: Sinar Grafika.

Mertokusumo, Sudikno 2010 Hukum Acara Perdata Indonesia, Yogyakarta: Liberty Yogyakarta, .

Subekti, 2003 Pokok-pokok Hukum Perdata, Jakarta: Intermasa .

Subekti dan Tjitrosudibio, 2004 Kitab Undang-undang Hukum Perdata, Jakarta: Pradnya Paramita.

Sugeng A.S, Bambang. dan Sujayadi, 2011 Hukum Acara Perdata dan Litigasi Perkara Perdata, Jakarta: Kencana.

SoerjonoSoekanto, 2008, Pengantar Penelitian Hukum, Universitas Indonesia, Jakarta

B. Undang-Undang

Kitab Undang-undang Hukum Pidana

Kitab Undang-undang Hukum Acara Pidana

Kitab Undang-Undang Hukum Perdata (KUHPerdata)

Undang-undang Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik

Kep.Men.Keu.RI Nomor 448/KMK.017/2000 tentang Perusahaan Pembiayaan

C. Sumber Lain

Heru Sutadi, Cybercrime, ApaYang BisaDiperbuat?,

http://www.sinarharapan.co.id/berita/0304/05/opi01.html, diaksespadatgl 13 Juni 2013 jam 20.30 Wib.

“Hati-hati, Hacker Bisadi jeratAturanHukumKonvensional, http://hukumonline.com/ detail.asp?id=6852&cl=Berita, akses 6 Agustus 2008.

Redha Manthovani,Problematikadan Solusi Penanganan Kejahatan Cyber di Indonesia(Jakarta: PT. Malibu, Juni 2006).

Pengguna //.php/http:/dglib.uns.ac.id/?mn=showview&id=24009, diakses 10 Mei 2014, Pukul. 23.00. WB.

Bitstream/ http://repository.usu.ac.id/ /123456789/37715/3/Chapter%20II.pdf, diakses 10 Mei 2014, Pukul. 22.30. WIB.

Downloads

Published

2014-08-28