Penerapan asas lex consumen derogat legi consumte dalam tindak pidana daring (phishing) (putusan no. 74/pid.sus/2021/pn nga)
Penerbit : FH - Usakti
Kota Terbit : Jakarta
Tahun Terbit : 2025
Pembimbing 1 : Andi Widiatno
Kata Kunci : phishing, digital extortion, ITE Law, lex consumen derogat legi consumte principle.
Status Posting : Published
Status : Lengkap
| No. | Nama File | Hal. | Link |
|---|---|---|---|
| 1. | 2025_SK_SHK_010002100316_Halaman-Judul.pdf | 12 | |
| 2. | 2025_SK_SHK_010002100316_Surat-Pernyataan-Revisi-Terakhir.pdf | 1 | |
| 3. | 2025_SK_SHK_010002100316_Surat-Hasil-Similaritas.pdf | 1 | |
| 4. | 2025_SK_SHK_010002100316_Halaman-Pernyataan-Persetujuan-Publikasi-Tugas-Akhir-untuk-Kepentingan-Akademis.pdf | 1 | |
| 5. | 2025_SK_SHK_010002100316_Lembar-Pengesahan.pdf | 1 | |
| 6. | 2025_SK_SHK_010002100316_Pernyataan-Orisinalitas.pdf | 1 | |
| 7. | 2025_SK_SHK_010002100316_Formulir-Persetujuan-Publikasi-Karya-Ilmiah.pdf | 1 | |
| 8. | 2025_SK_SHK_010002100316_Bab-1.pdf | 18 | |
| 9. | 2025_SK_SHK_010002100316_Bab-2.pdf |
|
|
| 10. | 2025_SK_SHK_010002100316_Bab-3.pdf | 14 |
|
| 11. | 2025_SK_SHK_010002100316_Bab-4.pdf |
|
|
| 12. | 2025_SK_SHK_010002100316_Bab-5.pdf | 3 | |
| 13. | 2025_SK_SHK_010002100316_Daftar-Pustaka.pdf | 7 | |
| 14. | 2025_SK_SHK_010002100316_Lampiran.pdf |
|
K Kemajuan teknologi informasi turut memunculkan kejahatan siber, seperti phishing, yakni penipuan daring untuk memperoleh data pribadi dengan modus pemerasan dan pengancaman. penelitian ini membahas dua rumusan masalah: bagaimana penerapan dan unsur-unsur tindak pidana penipuan daring dengan metode phishing di indonesia, serta apakah asas lex consumen derogat legi consumte telah diterapkan dalam putusan no. 74/pid.sus/2021/pn nga. penelitian ini merupakan penelitian hukum normatif dengan pendekatan undang-undang, studi pustaka, yurisprudensi, dan wawancara ahli. hasil menunjukkan bahwa meskipun phishing belum disebut secara eksplisit dalam uu ite, perbuatan tersebut dapat dikualifikasikan sebagai pemerasan atau pengancaman sebagaimana diatur dalam pasal 27 ayat (4) jo. pasal 45 ayat (4) uu ite. namun, dalam putusan no. 74/pid.sus/2021/pn nga, hakim justru menerapkan uu pornografi, bukan uu ite, yang lebih relevan secara substansi terhadap modus operandi phishing. hal ini menunjukkan bahwa asas lex consumen derogat legi consumte, yang menekankan penerapan hukum khusus yang lebih sesuai dengan fakta konkret, belum diterapkan secara tepat dalam putusan tersebut. akibatnya, penerapan hukum menjadi kurang optimal dalam melindungi korban dan menjerat pelaku sesuai dengan perbuatannya. penelitian ini menegaskan pentingnya ketepatan penerapan pasal dalam kejahatan siber serta perlunya peningkatan pemahaman terhadap asas hukum khusus dalam konteks phishing.
A Advances in information technology have also led to cybercrime, such as phishing, which is online fraud to obtain personal data with the mode of extortion and threatening. this research discusses two problem formulations: how the application and elements of the crime of online fraud using the phishing method in indonesia, and whether the principle of lex consumen derogat legi consumte has been applied in decision no. 74/pid.sus/2021/pn nga. this research is a normative legal research with a statutory approach, literature study, jurisprudence, and expert interviews. the results show that although phishing has not been explicitly mentioned in the ite law, the act can be qualified as extortion or threatening as regulated in article 27 paragraph (4) jo. article 45 paragraph (4) of the ite law. however, in decision no. 74/pid.sus/2021/pn nga, the judge applied the pornography law instead of the ite law, which is more relevant in substance to the modus operandi of phishing. this shows that the principle of lex consumen derogat legi consumte, which emphasizes the application of specific laws that are more in line with concrete facts, has not been properly applied in the decision. as a result, the application of the law is less than optimal in protecting victims and ensnaring the perpetrators according to their actions. this research emphasizes the importance of the accuracy of the application of articles in cybercrime as well as the need to increase understanding of special legal principles in the context of phishing.