RAHASIA DAGANG
MIS).68
yaitu pada tahun 1989. 69 Pada tahun 1989 dilakukan merger antara
68
Danrivanto Budhijanto, op.cit., hlm. 257.
69
Ibid.
70
Ibid.
71
Ibid.
25
26
72
Ibid.
73
Ibid, dikuti dari: Harry Newton, Newton’s Telecom Dictionary, CMP Books, New York,
2002, hlm. 402-403.
74
Agus Raharjo, Cybercrime. Bandung: PT Citra Aditya Bakti, 2002, hlm. 45.
75
Danrivanto Budhijanto, op.cit., hlm. 258.
27
76
Ibid.
77
Ibid.
78
Erman Radjagukguk dan Ridwan Khairandy, Alih Teknologi Dalam Perspektif Hukum.
Yogyakarta: UII, 1999, hlm. 10.
79
Idem, hlm 15-16.
80
Danrivanto Budhijanto, loc.cit.
28
berikut:82
81
Idem, hlm. 259.
82
Ibid, dikutip dari: Yang Yudong, ICT and Information Flow Theory, State Council
Informatization Office of the People’s Republic.
83
Ibid.
84
Ibid.
85
Ibid.
29
1. Teknologi Telekomunikasi88
86
Ibid, dikutip dari: Rob Nicholls,Michelle Rowland, and Dianah Merchant, A Failure to
Converge, a Failure to Recognise Convergence or a Failure to Care?, ICT Policy
in Australia.
87
Danrivanto Budhijanto, op.cit., hlm. 260
88
Idem, hlm. 260
30
telekomunikasi.
2. Teknologi Penyiaran89
89
Idem, 260-261
31
90
Idem, hlm. 261
32
akses, simbol atau perforasi yang memiliki makna atau arti atau
91
Ibid.
92
Ibid, dikutip dari: Bart-Jaap Koops, “Should ICT Regulation be Technology-Neutral?”, IT
Law Series Vol. 9, The Hague (2006)
33
93
Agus Raharjo, Cybercrime. Bandung: PT Citra Aditya Bakti, 2002, hlm. 59.
94
Idem, hlm. 60.
95
Agus Raharjo, Op.cit., hlm. 92-93.
96
Ibid.
34
where you can meet people and discover information about any”.
cyberspace sebagai:
97
<http://dictionary.cambridge.org> [19 Maret 2013]
98
Wolf Heintschel von Heinegg, op.cit.,hlm. 9.
99
Idem, hlm. 208.
35
100
Achmad Gusman Catur Siswandi, loc.cit., dikutip dari: Justice Michael Kirby
sebagaimana dikutip oleh Margaret White & Laurel Devine, Challenges to Law-3
Unit Legal Studies, CCH Australia Limited, NSW, 1995, hlm. 115.
101
Ibid.
102
Idem, hlm. 153
103
Pierlugi Paganini, “Cyber-espionage: The Greatest transfer of wealth in history”
<http://hplusmagazine.com/2013/03/01/cyber-espionage-the-greatest-transfer-of-
wealth-in-history/> [21 Maret 2013]
36
in Cyberspace?
104
Ibid.
105
Jorge H. Romero, op.cit., hlm. 37
37
berikut:
b. Cyber exploitation
106
Ibid.
107
Alexander Melnitzky, op.cit., hlm. 538
38
c. Cyber Espionage
network penetration.”
108
Ibid.
109
Richard A. Clarke, “Securing Cyberspace Through International Norms,
Recommendations for Policymakers and the Private Sector, hlm. 5 (2012)
39
mail, link dari website yang terinfeksi, P2P file sharing, dan
110
Ashley Packar, Digital Media Law, Oxford: John Wiley-Blackwell Publishing, 2010,
hlm. 72
111
Ibid.
112
Ibid.
113
Ibid.
114
Ibid.
115
Idem, hlm. 73
40
komputer tersebut.116
antara lain:
a. Phising117
116
Ibid.
117
hlm. 73
41
b. Pharming118
kepentingan mereka.
c. Watering Hole
118
Idem, hlm. 72-73
119
Gavin O’Gorman dan Geoff McDonald, “The Elderwood Project”, Symantec Security
Response, hlm. 3-4 (2012)
42
Windows XP SP3.125
120
Ibid.
121
Ibid.
122
Ibid.
123
Paganinip, “Tens of Zero Day Vulnerabilities, millions of users exposed”,
< http://securityaffairs.co/wordpress/9475/hacking/tens-of-zero-day-
vulnerabilities-millions-of-users-exposed.html>[28/02/2013]
124
Ibid.
125
Ibid.
43
129
Gambar 1. Metode Watering Hole
126
Idem,hlm. 6
127
Ibid.
128
Ibid.
44
1. Pengertian Yurisdiksi
129
Gavin O’Gorman dan Geoff McDonald, loc.cit.
130
Huala Adolf, Aspek-aspek Negara Dalam Hukum Internasional cetakan ke-4,
Bandung: Keni Media, 2011, hlm. 163
131
Ibid, dikutip dari: Antonia Cassese, International Law, Oxford: Oxford U.P., 2nd. Ed.,
2005, hlm. 49.
132
Ibid, dikutip dari: Hans Kelsen, Principles of International Law, New York: Rinehart &
Co., 1956, hlm. 235
133
Ibid.
134
Ibid, dikutip dari: Hans Kelsen, Principles of International Law, New York: Rinehart &
Co., 1956, hlm. 235
135
Ibid.
45
internansional tersebut;
136
Ibid.
137
Ibid, dikutip dari: Martin Dixon, Textbook on International Law, London: Blackstone,
4th.ed., 2000, hlm. 166.
138
Idem, hlm. 164, dikutip dari: Hans Kelsen, op.cit., hlm. 239.
46
Internasional
a. Malcolm N. Shaw
139
Malcolm N. Shaw, hlm. 452 dikutip dari: Sigid Suseno, Yurisdiksi Tindak Pidana Siber,
Bandung: PT Refika Aditama, 2012, hlm. 55
47
b. Huala Adolf
(Legislative Jurisdiction).141
140
Huala Adolf, loc.cit.
141
Ibid.
48
2. Judicial Jurisdiction
3. Enforcement Jurisdiction
142
Tien S. Saefullah, op.cit., hlm. 97.
143
Ibid.
144
Huala Adolf, op.cit.
145
Idem, hlm. 165
146
Ibid.
49
territory…”149
c. Tien S. Saefullah
adjudicate).150
147
Ibid.
148
Ibid.
149
Ibid, The Lotus Case (France v. Turkey) (PCIJ, 1927)
150
Tien S. Saefullah, Yurisdiksi Sebagai Upaya Penegakan Hukum dalam Kegiatan
Cyberspace dalam Mieke Komar Kantaatmadja, et.al., Cyberlaw: Suata
Pengantar, Bandung: ELIPS, 2002, hlm. 97
50
a. Yurisdiksi perdata
hukum asing).151
b. Yurisdiksi Pidana
1. Yurisdiksi Teritorial
151
Huala Adolf, op.cit., hlm. 166
152
Idem.
153
Idem, hlm. 166
51
over all persons and things within its territorial limits and in all
154
Idem, hlm. 166-167, dikutip dari: Bernard Oxman, “Jurisdiction”, EPIL 10 (1087), hlm.
279
155
Idem, hlm. 186.
52
Amerika Serikat.
156
Tien S. Saefullah, op.cit., hlm. 98
53
2. Yurisdiksi Personal
secara universal.158
berikut:
157
Huala Adolf, op.cit., hlm. 188.
158
Ibid.
159
Idem, hlm 189
54
negaranya.161
berada di wilayahnya.162
160
J.G. Starke, op.cit., hlm. 303.
161
Huala Adolf, op.cit., hlm 189
162
J.G. Starke, loc.cit.
55
negaranya.163
163
Huala Adolf, op.cit., hlm. 189
164
Idem, hlm. 190
165
Ibid.
166
Ibid.
56
bersangkutan?.170
167
Ibid.
168
Ibid.
169
Ibid.
170
Ibid.
171
Ibid.
57
172
Ibid.
173
Idem, hlm. 192
174
Ibid.
58
4. Yurisdiksi Universal
175
Huala Adolf, op.cit., hlm. 194
176
Ibid.
177
Ibid.
178
Ibid.
59
pidana tersebut.179
terbagi dua, yaitu suatu tindak pidana yang dimulai di suatu negara
179
Tien S. Saefullah, op.cit., hlm. 99.
180
J.G. Starke, op.cit., hlm. 273
181
Ibid.
182
Huala Adolf, op.cit., hlm. 167.
60
186
J.G. Starke, loc.cit.
187
Ibid.
188
Idem, hlm. 274
189
Ibid.
190
Huala Adolf, loc.cit., dikutip dari: David, H. Ott, Public International Law in the Modern
London: Pitman, 1987, hlm. 137.
191
Ian Brownlie, Principle of Public International Law, Third Edition, London: Oxford
University Press, 1980,hlm. 309.
62
Doctrine’).192
192
Ibid.
193
Ibid.
63
even upon persons not within its allegiance, for conduct outside its
borders, that has consequences within its borders which the State
reprehends.”194
Jurisdiction).197
194
Ibid.
195
Idem, hlm. 193
196
Ibid.
197
Ibid.
198
Peter Malanczuk, Akehurst’s Modern Introduction to International Law, seventh
revised edition, London: Harper Collins Academi, 1997, hlm. 112-113.
64
teknologi.199
teknologi informasi?200
199
Tien S. Saefullah, op.cit., hlm. 96.
200
Idem., hlm. 100.
201
Ibid.
65
202
Idem, hlm. 101, dikutip dari: Darrel Menthe, “Jurisdiction in Cyberspace: A Theory of
International Space, <http://www.mttlr.org/volfour/menthe.html>, hlm.2.
203
Ibid.
204
Ibid.
66
online behavior
205
Idem, hlm. 101-102.
206
Idem, hlm. 102.
207
Idem, hlm. 103-104, dikutip dari: Darrel Menthe, “Jurisdiction in Cyberspace: A Theory
of International Space, <http://www.mttlr.org/volfour/menthe.html>, hlm.3-4
67
perjudian tersebut.
208
Idem, hlm. 104, dikutip dari: Darrel Menthe, “Jurisdiction in Cyberspace: A Theory of
International Space, <http://www.mttlr.org/volfour/menthe.html>, hlm.5
69
angkasa.
a. Territorial claims
pidana.
209
Idem, hlm. 103-104, dikutip dari: Darrel Menthe, “Jurisdiction in Cyberspace: A Theory
of International Space, <http://www.mttlr.org/volfour/menthe.html>, hlm.7-8
210
Sigid Suseno, op.cit., hlm. 75 dikutip dari Susan W. Brenner dan Bert-Jaap Koops,
“Approaches to Cybercrime Jurisdiction, Journal of High Technology Law Volume
IV No.1, hlm. 10-29 (2004)
70
b. Personality claims
pidana.
yang dilakukan oleh ICJ dari unsur kontrol. Di satu sisi, Amerika
Hal yang sama juga terjadi pada kasus Tadic yang juga
212
Ibid.
213
Ibid.
214
Ibid.
215
Idem, hlm. 48.
216
Ibid.
73
E. Rahasia Dagang
perdagangan; dan
217
Pasal 39.1 Agreement on Trade Related Aspects of Intellectual Property Rights
(TRIPs)
218
Achmad Zen Umar Purba, Hak Kekayaan Intelektual Pasca TRIPs, Bandung: PT.
Alumni, 2005, hlm. 80
74
justru sebaliknya.220
berikut:221
tanda tangani.
219
Pasal 39.2 TRIPs.
220
Achmad Zen Umar Purba, Op.cit., hlm. 81.
221
Ahmad M. Ramli, HAKI: Teori DasarPerlindungan Rahasia Dagang, Bandung: Mandar
Maju, 2002, hlm. 83-84
75
perjanjian.
orang lain dan tidak mudah dipastikan dengan cara yang tepat.
mempertahankan kerahasiaanya.
222
Gerald O’Hara, hlm. 249
223
“What is Economic Espionage”, <http://www.wisegeek.com/what-is-the-economic-
espionage-act.htm> [19 Maret 2013]
78
tersebut.224
“(3) the term ‘trade secret’ means all forms and types of
financial, business, scientific, technical, economic, or
engineering information, including patterns, plans, compilations,
program, devices, formulas, designs, prototypes, methods,
techniques, processes, procedures, programs, or codes,
whether tangible or intangible, and whether or how stored,
compiled, or memorialized, physically, electrically, graphically,
photographically, or in writing if-
(A) The owner thereof has taken reasonable measures
to keep such information secret; and
(B) The information derives independent economic
value, actual or potential from not being generally
known to, and not being readily ascertainable
through proper means by, the public,”
Section 1831:
224
Gerald O’Hara, op.cit., hlm. 249.
225
Section 1839 (2) Economic Espionage Act 1996
226
Gerald O’Hara, Op.cit., hlm. 250
79
227
Gerald O’Hara, loc.cit.
228
Section 1831 Economic Espionage Act 1996
80
organisasi.229
229
Section 1832 Economic Espionage Act 1996
230
Gerald O’Hara, loc.cit.