ABSTRACT: This study aims to compare the making of a notary deed during the Covid-19 period in
Indonesia and Estonia. Normative juridical law research is the method employed in this research. Analytical
descriptive was further also utilized, while the data collection technique used is literature study. The results of
the study indicated the importance of making supporting or additional regulations for Law Number 30 of 2004
concerning Notary Positions as amended by Law Number 2 of 2014 concerning Amendments to Law Number
30 of 2004 concerning Notary Positions ("Notary Position Law") in connection with by making an authentic
deed which is carried out without physical presence, which facilitates Notaries to carry out their positions in
times of emergency such as the current Covid-19. In response to this, Estonia, which is also a Civil Law
country, has fulfilled the element of legal expediency by amending the Notaries Act of the Republic of Estonian
("Estonian Notaries Act") which makes it possible to make a notarial deed without a physical presence or to do
it virtually.
KEYWORDS : Cyber notary, Electronic Notarization, Estonia, Indonesia, Notary Deed.
Second Amandement to the Law No. 11/2008: Streghtening Legal Protection and C...AHRP Law Firm
In 2022, based on the data of the Central Bureau of Statistics, 66.48% of the Indonesian citizens have accessed internet. This number have increased by 4.38% from the number in 2021. Such rise of the internet utilization shows that electronic data and information has became the basic need in Indonesia.
At the same time, technology has been developing progressively worldwide. Transboundary transactions are inevitable. Moreover, data and information being accessible to any person regardless of his age. Therefore, the Government of Indonesia issued the Second Amendment of Law No. 11 of 2008 on Electronic Information and Transaction on January 2nd 2024 which one of the objectives is to provide clearer regulatory framework on the distribution of electronic data and information. Find out more our insights about this topic in our Legal Brief Publication.
Current State of Personal Data Protection in Electronic Voting: Criteria and ...TELKOMNIKA JOURNAL
The document discusses personal data protection in electronic voting in Indonesia. It provides background on legal regulations related to personal data protection and issues with previous elections. It also discusses criteria and indicators for effective implementation of electronic voting, including robustness against fraud, consistency, security, privacy measures, and transparency. The document calls for simplified legal requirements and new technical solutions to design effective personal data protection in electronic voting.
This document discusses cyber jurisdiction in India. It begins with an introduction to cyber jurisdiction and defines cyber crimes. It then provides background on the history and development of cyber law in India, including the passage of the Information Technology Act of 2000. The document discusses the key issues around jurisdiction of cyber crimes, as the internet has no boundaries. It notes that the IT Act provides for extraterritorial jurisdiction over cyber crimes impacting India or involving Indian computers. However, the boundaryless nature of the internet still poses challenges to jurisdiction. The document aims to understand the position of cyber jurisdiction in India.
This document provides an overview and introduction to cyber laws in India, specifically the Information Technology Act 2000. Some key points:
- The IT Act was passed in 2000 and aimed to provide legal recognition for electronic records and transactions to facilitate e-commerce. It amended several other acts related to evidence and records.
- A major amendment was made in 2008 to address criticisms and keep up with technological changes. It focused on data privacy, information security, and added new cyber crimes like child pornography.
- The document discusses some notable Indian cases where sections of the IT Act like Section 66A were used, sometimes controversially, to arrest individuals for online speech or dissent.
- Other acts amended by the IT Act
Obstacles to Investigators Using Electronic Information Technology in the Pro...AJHSSR Journal
ABSTRACT : This study aims to find out and examine the obstacles investigators use electronic information
technology in the process of inquiry and investigation to uncover criminal acts of persecution (a case study of
the persecution that led to the death of the victim Augustine ) normative research supported by empirical data.
The results showed that the obstacles faced by investigators at the DitreskrimumPoldaSultra in the use of
technology related to the process of investigating and investigating cases of abuse that caused the death of
people consisted of 3 (three) obstacles, namely: first , Obstacles in Legal Substance: a. The Criminal Code does
not recognize electronic evidence; b. The evidence in the Electronic Transaction Information Law is not
supported by adequate implementing regulations; and c. There is no progressive legal umbrella in terms of
Standard Operating Procedures for the use of technology in the process of investigating criminal acts of
persecution that cause people to die.
KEYWORDS: Investigators, Electronic Evidence, Persecution.
- The document provides an overview of cyber laws and cyber crimes in India, outlining the Information Technology Act 2000 and its subsequent amendment in 2008 which established the primary laws governing cybercrimes.
- It describes how the Act defines key terms like "computer" and the scope of offenses covered under the law. It also discusses how the Act established procedures for adjudication of civil offenses and appeals.
- Major Acts in India like the Indian Penal Code, Indian Evidence Act, and Bankers' Books Evidence Act were also amended after the IT Act to recognize electronic records and better address cybercrimes.
- However, issues like territorial jurisdiction in cross-border cybercrimes are still not fully addressed under current
SYNERGY OF MAIN DUTIES AND FUNCTIONS IN THE CIVIL AND STATE ADMINISTRATION (D...AJHSSR Journal
ABSTRACT: Use ApplicationHello Prosecutor better known as " Halo State Attorney (JPN) " which can be
downloaded for free via the Android version of the Google Play Store feature. The Halo JPN application is a
breakthrough from the Prosecutor's Office which aims to bring people closer togetherinpublic.Via an
application,Thiswillgive a lotof convenience. In this research, the focus of the issues raised is related to the Halo
JPN service category in providing legal assistance to the community, as well as how to analyze the Standard
Operating Procedures (SOP) for Halo JPN services to fulfill the synergy of TUPOKSI in the datum field and
also asking how the implementation of legal aid services in the datum field via the Halo JPN application. The
method in this research uses normative and empirical methods to support the truth of the results achieved. So
this research concluded that the categories in the Halo JPN service are related to categories related to Land,
Inheritance Law, legal drafting, marriage and divorce law, Establishment and Dissolution of PTs, and Accounts
Payable. Meanwhile, the SOP for the Halo JPN service concerns the stages of the administrative implementer
opening the Hallo JPN application and accepting requests for questions online. request questions submitted
online, Asdatun checks the concept of JPN's answers to request questions submitted online and the
administrative implementer uploads the answers to the Hallo JPN application. The implementation itself has
been carried out but there is still a lack of outreach to the public regarding the existence of the Halo JPN
application.
Keywords: TUPOKSI Datun, Hello JPN, Great Prosecutor's Office
Abstract- This study aims to describe sybercrime cases that have the potential to become criminal acts on social media that are closely related to
the ITE Law. The aim is to find out what actions have the potential to violate the ITe Law carried out on social media which are included in
cybercrime behavior. In addition, the author examines the effectiveness of this law in resolving criminal cases that occur on the internet, which
is so complex and has various modes. The method used in this research is qualitative by conducting a literature study. As a result, the
researchers found that the types of cyber crimes varied, ranging from hecking, spreading hoaxes, defamation, hate speech, and cases of
spreading pornography/immoral acts. Furthermore, this study observes that the ITE Law which is used as a legal instrument is still inadequate
considering the complexity of the problems that occur in cybercrime and modes of crime that accompany it.
Second Amandement to the Law No. 11/2008: Streghtening Legal Protection and C...AHRP Law Firm
In 2022, based on the data of the Central Bureau of Statistics, 66.48% of the Indonesian citizens have accessed internet. This number have increased by 4.38% from the number in 2021. Such rise of the internet utilization shows that electronic data and information has became the basic need in Indonesia.
At the same time, technology has been developing progressively worldwide. Transboundary transactions are inevitable. Moreover, data and information being accessible to any person regardless of his age. Therefore, the Government of Indonesia issued the Second Amendment of Law No. 11 of 2008 on Electronic Information and Transaction on January 2nd 2024 which one of the objectives is to provide clearer regulatory framework on the distribution of electronic data and information. Find out more our insights about this topic in our Legal Brief Publication.
Current State of Personal Data Protection in Electronic Voting: Criteria and ...TELKOMNIKA JOURNAL
The document discusses personal data protection in electronic voting in Indonesia. It provides background on legal regulations related to personal data protection and issues with previous elections. It also discusses criteria and indicators for effective implementation of electronic voting, including robustness against fraud, consistency, security, privacy measures, and transparency. The document calls for simplified legal requirements and new technical solutions to design effective personal data protection in electronic voting.
This document discusses cyber jurisdiction in India. It begins with an introduction to cyber jurisdiction and defines cyber crimes. It then provides background on the history and development of cyber law in India, including the passage of the Information Technology Act of 2000. The document discusses the key issues around jurisdiction of cyber crimes, as the internet has no boundaries. It notes that the IT Act provides for extraterritorial jurisdiction over cyber crimes impacting India or involving Indian computers. However, the boundaryless nature of the internet still poses challenges to jurisdiction. The document aims to understand the position of cyber jurisdiction in India.
This document provides an overview and introduction to cyber laws in India, specifically the Information Technology Act 2000. Some key points:
- The IT Act was passed in 2000 and aimed to provide legal recognition for electronic records and transactions to facilitate e-commerce. It amended several other acts related to evidence and records.
- A major amendment was made in 2008 to address criticisms and keep up with technological changes. It focused on data privacy, information security, and added new cyber crimes like child pornography.
- The document discusses some notable Indian cases where sections of the IT Act like Section 66A were used, sometimes controversially, to arrest individuals for online speech or dissent.
- Other acts amended by the IT Act
Obstacles to Investigators Using Electronic Information Technology in the Pro...AJHSSR Journal
ABSTRACT : This study aims to find out and examine the obstacles investigators use electronic information
technology in the process of inquiry and investigation to uncover criminal acts of persecution (a case study of
the persecution that led to the death of the victim Augustine ) normative research supported by empirical data.
The results showed that the obstacles faced by investigators at the DitreskrimumPoldaSultra in the use of
technology related to the process of investigating and investigating cases of abuse that caused the death of
people consisted of 3 (three) obstacles, namely: first , Obstacles in Legal Substance: a. The Criminal Code does
not recognize electronic evidence; b. The evidence in the Electronic Transaction Information Law is not
supported by adequate implementing regulations; and c. There is no progressive legal umbrella in terms of
Standard Operating Procedures for the use of technology in the process of investigating criminal acts of
persecution that cause people to die.
KEYWORDS: Investigators, Electronic Evidence, Persecution.
- The document provides an overview of cyber laws and cyber crimes in India, outlining the Information Technology Act 2000 and its subsequent amendment in 2008 which established the primary laws governing cybercrimes.
- It describes how the Act defines key terms like "computer" and the scope of offenses covered under the law. It also discusses how the Act established procedures for adjudication of civil offenses and appeals.
- Major Acts in India like the Indian Penal Code, Indian Evidence Act, and Bankers' Books Evidence Act were also amended after the IT Act to recognize electronic records and better address cybercrimes.
- However, issues like territorial jurisdiction in cross-border cybercrimes are still not fully addressed under current
SYNERGY OF MAIN DUTIES AND FUNCTIONS IN THE CIVIL AND STATE ADMINISTRATION (D...AJHSSR Journal
ABSTRACT: Use ApplicationHello Prosecutor better known as " Halo State Attorney (JPN) " which can be
downloaded for free via the Android version of the Google Play Store feature. The Halo JPN application is a
breakthrough from the Prosecutor's Office which aims to bring people closer togetherinpublic.Via an
application,Thiswillgive a lotof convenience. In this research, the focus of the issues raised is related to the Halo
JPN service category in providing legal assistance to the community, as well as how to analyze the Standard
Operating Procedures (SOP) for Halo JPN services to fulfill the synergy of TUPOKSI in the datum field and
also asking how the implementation of legal aid services in the datum field via the Halo JPN application. The
method in this research uses normative and empirical methods to support the truth of the results achieved. So
this research concluded that the categories in the Halo JPN service are related to categories related to Land,
Inheritance Law, legal drafting, marriage and divorce law, Establishment and Dissolution of PTs, and Accounts
Payable. Meanwhile, the SOP for the Halo JPN service concerns the stages of the administrative implementer
opening the Hallo JPN application and accepting requests for questions online. request questions submitted
online, Asdatun checks the concept of JPN's answers to request questions submitted online and the
administrative implementer uploads the answers to the Hallo JPN application. The implementation itself has
been carried out but there is still a lack of outreach to the public regarding the existence of the Halo JPN
application.
Keywords: TUPOKSI Datun, Hello JPN, Great Prosecutor's Office
Abstract- This study aims to describe sybercrime cases that have the potential to become criminal acts on social media that are closely related to
the ITE Law. The aim is to find out what actions have the potential to violate the ITe Law carried out on social media which are included in
cybercrime behavior. In addition, the author examines the effectiveness of this law in resolving criminal cases that occur on the internet, which
is so complex and has various modes. The method used in this research is qualitative by conducting a literature study. As a result, the
researchers found that the types of cyber crimes varied, ranging from hecking, spreading hoaxes, defamation, hate speech, and cases of
spreading pornography/immoral acts. Furthermore, this study observes that the ITE Law which is used as a legal instrument is still inadequate
considering the complexity of the problems that occur in cybercrime and modes of crime that accompany it.
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...Jamil Salem
The document discusses challenges and opportunities for eGovernment initiatives in Palestine. It summarizes the complex evolution of the Palestinian legal system under successive occupations. The establishment of the Palestinian Authority in 1994 gave limited self-governance but key areas remain under Israeli control. eGovernment requires a supportive legal framework including laws on digital signatures, data protection, and administrative procedures. Existing initiatives like Al-Muqtafi provide online legal resources but continued legal reform is needed to fully develop eGovernment in Palestine.
This document summarizes a research paper that examines the legal implications of imposing stamp duty to provide legal certainty for civil agreement documents according to Law Number 10 of 2020 concerning Stamp Duty in Indonesia. The paper finds that affixing a stamp on civil agreement documents in accordance with the law can be used as evidence in the agreement and satisfies the criteria for tax collection. However, non-payment of stamp duty does not affect the cancellation or validity of an agreement as long as the agreement is drafted in accordance with Indonesia's Civil Code. The paper concludes that stamp duty settlement procedures allow for subsequent payment if an agreement was not originally stamped, so lack of stamp does not invalidate the agreement under Law Number 10 of 2020.
Know your rights protection against facial recognition software.Diganth Raj Sehgal
This document summarizes rights related to facial recognition software and data protection laws. It discusses how facial recognition data is considered sensitive personal data under Indian law. It also outlines the right to privacy under the Indian Constitution and key related legislations in India like the IT Act, Consumer Protection Act, and pending Personal Data Protection Bill. Additionally, it reviews positions on facial recognition data in other regions like the EU, California, and under the US Biometric Information Privacy Act.
Notary Criminal Liability for Deeds MadeBased on Fake LetterAJHSSR Journal
ABSTRACT: Research with the title of criminal liability of a notary for a deed made based on a forged letter
by formulating the problem as follows: How are the Formal and Material Requirements in making a Notary
Deed. And How is the Notary's criminal responsibility for the Deed made based on the False Letter. Based on
research that uses normative juridical methods, in-depth discussion and analysis can be produced. The results of
the analysis show that: Formal and Material Requirements in making Notary Deeds based on False Letters
Criminal acts related to or committed by a notary position are not specifically regulated in Law Number 30 of
2004. This law has been amended by Law Number 2 of 2014 concerning Amendments to Law Number 30 of
2004 concerning Notary Positions. Provisions regarding criminal acts committed or related to notaries are also
not regulated in Law Number 2 of 2014. It can be concluded that the provisions of the Criminal Code apply to
crimes committed by notaries. Notary Criminal Liability for Deeds made based on False Letters determines if
the notary who is subject to a crime does not invalidate the deed made by the notary by law. Things that are not
right through the eyes of law, namely if the decision of the criminal court with the decision to cancel the notary
deed on the grounds that the notary has been proven to have committed the crime of forgery. The things that
must be done by the party who feels a loss because of the deed is to file a criminal lawsuit against the notary for
the deed he made, and file a civil lawsuit to cancel the deed.
KEYWORDS:Criminal; notary; fake letter
The plaintiff, People's Leasing Company Ltd, filed a case against defendants for not paying installments according to the lease agreement for a vehicle. The plaintiff provided computer printouts of accounts ledgers as evidence, but defendants objected stating they were just computer data without identifying information. However, the Electronic Transaction Act of 2006 was referenced, stating electronic documents like ledgers are admissible. Considering this act and witness testimony, the judge ruled the ledgers could be admitted as evidence relating to the lease agreement in question.
Countries that have made electronic signatures legalDaria Kizilova
There are many countries, 60 to be precise, which have passed laws to make electronic signatures fully legal and admissible by law. These legislations provide e-signatures a solid foundation to stand on.
This presentation is about the Cyber Governemance in Pakistan, it clarifys the laws, Bills and Punishments for cyber crimes in the world and perticulary Pakistan.
When anti-corruption norms lead to undesirable results: learning from the Ind...UniversitasGadjahMada
This paper analyzes how and why adverse side-effects have occurred in the implementation of two articles of Indonesia’s anti-corruption law. These articles prohibit unlawful acts which may be detrimental to the finances of the state. Indeed, the lawmakers had good intentions when they drafted the two articles. They wanted to make it easier to convict corrupt individuals by lowering the standard of evidence required to prove criminal liability. The implementation of these articles has raised legal uncertainty. The loose definition of the elements of the crime enables negligence and imperfection of (public) contracts to be considered as corruption. The Constitutional Court has issued two rulings to restrict and guide the interpretation of these articles. However, law enforcement agencies (Supreme Court and public prosecutors) have been unwilling to adhere to the rulings. There are two possible reasons for this. First, as has been argued by several commentators, the law enforcement agencies have misinterpreted the concept of Bunlawfulness^. Besides, the law enforcement agencies wish to be seen to be committed to prosecuting and delivering convictions in corruption cases. To do so, they need to maintain looser definitions of the elements of the offence. This paper endorses the Constitutional Court rulings and provides additional reasons in support of their stance. The paper can be considered as a case study for other countries that may be contemplating similar legislation.
A new approach to International Judicial Cooperation through secure ICT platf...ePractice.eu
Authors: Mauro Cislaghi | Domenico Pellegrini | Elisa Negroni.
Cooperation between judicial systems is a key factor for sustainable development, one of the EU’s major priorities. eGovernment plans and e-Justice initiatives supported by the European Commission and national governments create a very favourable background for the adoption of ICT standards in the area of cross-border judicial cooperation, both in Member States and in pre-Accession countries.
This document is an application for a research grant to study Nigeria's Freedom of Information Act of 2011. The study aims to [1] examine how the Act aligns with other open government laws and the Nigerian Constitution, [2] identify the procedural guidelines for enforcing the right to information, and [3] determine if the Official Secrets Act was impliedly repealed by the Freedom of Information Act. The researcher plans to use legal sources like the Constitution and Acts, as well as secondary sources like books, journals, and cases, to conduct a doctrinal and empirical analysis of these issues. The expected findings include that information access is a fundamental right and that security reasons cannot broadly prevent information disclosure under the Act.
Executability of the constitutional court decisionQodirJaelani
The document discusses the executability of Constitutional Court decisions in Indonesia, specifically whether decisions include a grace period for implementation by legislators. It finds that decisions without a grace period are often not followed up through new legislation, while decisions with a grace period are typically implemented through new laws within the mandated timeframe. The document concludes that including a grace period and institutionalizing constitutional review through expanded Constitutional Court authorities could make future decisions more executable.
Defragmentation of indian legal cases withijfcstjournal
The main aim of this research paper is to develop a rule based knowledge database for legal expert system
for consumer protection act, a domain within the Indian legal system which is often in demand. A
knowledge database developed here will further help the legal expert system to determine type of case with
respect to the Indian Judicial System. In this paper a rule based knowledge database will be developed to
determine the type of the case. The main aim of the study is to build a prototype which will rule based in
nature. The rule based knowledge database development is the first phase in the development of
comprehensive rule based legal expert system for consumer protection act which will be of great help in
process of solving consumer related cases.
This document summarizes an assignment on cyber law submitted to a professor. It discusses the objectives and structure of the Information Technology Act 2000 and the need for the Information Technology Amendment Act 2008. It then provides case studies related to selected sections of the IT Act, including Section 43 on penalties for computer damage, Section 65 on tampering with computer source documents, Section 66 on computer-related offenses, and Section 66A on sending offensive messages.
Law Enforcement against the Crime of Fraud through Funds Transfer Study at Po...ijtsrd
Fraud using SMS short message services is usually carried out by perpetrators by sending SMS to random recipients using a send to many system more than one recipient of the message or some kind of broadcast message. Then the perpetrator waits for several responses which are then followed up with lies and ruses so that the victim transfers some money. A crime that is still a complex problem is that criminals use SMS as a medium to find victims with the mode of asking the victim to transfer a certain amount of money with certain tricks until the potential victim actually follows the perpetrators wishes. Based on this description, the authors found problems in this research, namely legal arrangements regarding the criminal act of fraud through the transfer of funds in Indonesia, law enforcement against the crime of fraud through the transfer of funds at the Medan Polrestabes. The purpose of the study is to find out the legal arrangements regarding the criminal act of fraud through the transfer of funds in Indonesia, to find out law enforcement against the crime of fraud through the transfer of funds at the Medan Polrestabes. The research method used is normative juridical research positive law , data collection techniques are conducting library research by reading books, scientific works, legislation, lecture materials, as well as through internet media websites , field research by conducting interviews with The related party is the Medan City Resort Police. From the results of the research conducted, the authors conclude that the legal regulation regarding the criminal act of fraud through the transfer of funds in Indonesia is Article 378 of the Criminal Code, the threat of which is a maximum of 4 years in prison, Article 28 paragraph 1 of Law Number 19 of 2016 concerning Amendments to Laws Law Number 11 of 2008 concerning Information and Electronic Transactions, Article 82 of Law Number 11 of 2011 concerning Transfer of Funds, imprisonment for a maximum of 4 four years and or a fine of a maximum of Rp. 1,000,000,000.00 one billion rupiahs . Law enforcement against criminal acts of fraud through transfer of funds at the Medan Polrestabes conducted an investigation into SMS media fraud with the mode of transfer of funds, officers immediately asked for the perpetrators data to find out the identity of the perpetrator. Investigators study the traces left by the perpetrators, complete the facilities and infrastructure at the Medan Besar City Resort Police such as cyber tools and improve the ability of members related to technology understanding. The next legal process is the trial process. H. Lawali Hasibuan | Alvin Hamzah "Law Enforcement against the Crime of Fraud through Funds Transfer (Study at Polrestabes Medan)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7 , December 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52473.pdf Paper URL: https://www.ijtsrd.com/other-s
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian depending on perspective. The key points covered include:
- The objectives and scope of the original 2000 act regarding electronic transactions and documents.
- Why the 2008 amendment was pursued, to address gaps, consult experts, and compare to other countries' laws.
- Notable changes the amendment brought, like focusing on data privacy, security, and defining new cyber crimes.
- An overview of the act's structure and applicability.
- Examples of cyber crime cases related to specific sections of
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian by different parties. It then summarizes the key aspects and changes covered in the amended act of 2008, including a focus on data privacy, information security, cyber cafes, digital signatures, and including additional cyber crimes. The document also discusses the structure and applicability of the act, and provides case studies to illustrate specific sections of the act related to offenses such as tampering, cheating, identity theft, and publishing obscene material.
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian depending on perspective. The key points covered include:
- The objectives and scope of the original 2000 act regarding electronic transactions and documents.
- Why the 2008 amendment was pursued, to address gaps, consult experts, and compare to other countries' laws.
- Notable changes the amendment brought, like focusing on data privacy, security, and defining new cyber crimes.
- An overview of the act's structure and applicability.
- Examples of cyber crime cases related to specific sections of
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian by different parties. It then summarizes the key sections and features added in the amendment, including a focus on data privacy, information security, and additional cyber crimes. Several case studies are presented related to specific sections of the act around offenses such as identity theft, computer tampering, and publishing obscene material. The structure and applicability of the act are also outlined.
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian depending on perspective. The key points covered include:
- The objectives and scope of the original 2000 act regarding electronic transactions and documents.
- Why the 2008 amendment was pursued, to address perceived issues and compare to other countries' laws.
- Notable features strengthened in the amended act like data privacy, information security, and defining additional cyber crimes.
- An overview of the act's structure and applicability.
- Examples of cyber crime cases related to specific sections of the act.
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian by different parties. It then summarizes some key sections of the acts related to cyber crimes and penalties. Several case studies are presented related to sections like tampering with computer data, identity theft, cyber terrorism, and publishing obscene content online. The document aims to explain the Indian legal framework around cyber crimes and cases that have been prosecuted under different sections of the acts.
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISMAJHSSR Journal
ABSTRACT: Huzhou has rich tourism resources, as early as a considerable development since the reform and
opening up, especially in recent years, Huzhou tourism has ushered in a new period of development
opportunities. At present, Huzhou tourism has become one of the most characteristic tourist cities on the East
China tourism line. With the development of Huzhou City, the tourism industry has been further improved, and
the tourism degree of the whole city has further increased the transformation and upgrading of the tourism
industry. However, the development of tourism in Huzhou City still lags far behind the tourism development of
major cities in East China. This round of research mainly analyzes the current development of tourism in
Huzhou City, on the basis of analyzing the specific situation, pointed out that the current development of
Huzhou tourism problems, and then analyzes these problems one by one, and put forward some specific
solutions, so as to promote the further rapid development of tourism in Huzhou City.
KEYWORDS:Huzhou; Travel; Development
Enhancing Losari Beach Exploration: Augmented Reality for Immersive Visualiza...AJHSSR Journal
ABSTRACT: South Sulawesi, commonly known as Makassar, boasts rich cultural heritage and customs,
making it a prominent destination for tourism. Among its attractions, Losari beach stands out as a focal point for
visitors seeking to explore the city's natural beauty and cultural offerings. In this context, leveraging modern
technology such as augmented reality presents an innovative approach to showcasing Losari beach to potential
tourists. This research endeavors to introduce tourism assets in a more visually captivating manner through the
use of augmented reality. Utilizing software tools like Unity and Adobe Illustrator, the study focuses on creating
an immersive experience where tourists can interact with virtual representations of Losari beach. By simply
pointing their mobile phone cameras at designated markers or using barcode scanners, tourists can access
augmented reality features embedded within the application. The findings of this research aim to provide
valuable information, particularly for foreign tourists, about Losari beach, positioning it as a compelling
destination within South Sulawesi's diverse array of tourist attractions. Through this technological innovation,
the study seeks to enhance the visibility and appeal of Makassar city's tourism offerings on a global scale.
KEYWORDS: Visualizing, Losari Beach, Augmented Reality
More Related Content
Similar to The Urgency of Electronic Notarization in Indonesia by Seeing the Implementation in Estonia During the Covid-19 Pandemic
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...Jamil Salem
The document discusses challenges and opportunities for eGovernment initiatives in Palestine. It summarizes the complex evolution of the Palestinian legal system under successive occupations. The establishment of the Palestinian Authority in 1994 gave limited self-governance but key areas remain under Israeli control. eGovernment requires a supportive legal framework including laws on digital signatures, data protection, and administrative procedures. Existing initiatives like Al-Muqtafi provide online legal resources but continued legal reform is needed to fully develop eGovernment in Palestine.
This document summarizes a research paper that examines the legal implications of imposing stamp duty to provide legal certainty for civil agreement documents according to Law Number 10 of 2020 concerning Stamp Duty in Indonesia. The paper finds that affixing a stamp on civil agreement documents in accordance with the law can be used as evidence in the agreement and satisfies the criteria for tax collection. However, non-payment of stamp duty does not affect the cancellation or validity of an agreement as long as the agreement is drafted in accordance with Indonesia's Civil Code. The paper concludes that stamp duty settlement procedures allow for subsequent payment if an agreement was not originally stamped, so lack of stamp does not invalidate the agreement under Law Number 10 of 2020.
Know your rights protection against facial recognition software.Diganth Raj Sehgal
This document summarizes rights related to facial recognition software and data protection laws. It discusses how facial recognition data is considered sensitive personal data under Indian law. It also outlines the right to privacy under the Indian Constitution and key related legislations in India like the IT Act, Consumer Protection Act, and pending Personal Data Protection Bill. Additionally, it reviews positions on facial recognition data in other regions like the EU, California, and under the US Biometric Information Privacy Act.
Notary Criminal Liability for Deeds MadeBased on Fake LetterAJHSSR Journal
ABSTRACT: Research with the title of criminal liability of a notary for a deed made based on a forged letter
by formulating the problem as follows: How are the Formal and Material Requirements in making a Notary
Deed. And How is the Notary's criminal responsibility for the Deed made based on the False Letter. Based on
research that uses normative juridical methods, in-depth discussion and analysis can be produced. The results of
the analysis show that: Formal and Material Requirements in making Notary Deeds based on False Letters
Criminal acts related to or committed by a notary position are not specifically regulated in Law Number 30 of
2004. This law has been amended by Law Number 2 of 2014 concerning Amendments to Law Number 30 of
2004 concerning Notary Positions. Provisions regarding criminal acts committed or related to notaries are also
not regulated in Law Number 2 of 2014. It can be concluded that the provisions of the Criminal Code apply to
crimes committed by notaries. Notary Criminal Liability for Deeds made based on False Letters determines if
the notary who is subject to a crime does not invalidate the deed made by the notary by law. Things that are not
right through the eyes of law, namely if the decision of the criminal court with the decision to cancel the notary
deed on the grounds that the notary has been proven to have committed the crime of forgery. The things that
must be done by the party who feels a loss because of the deed is to file a criminal lawsuit against the notary for
the deed he made, and file a civil lawsuit to cancel the deed.
KEYWORDS:Criminal; notary; fake letter
The plaintiff, People's Leasing Company Ltd, filed a case against defendants for not paying installments according to the lease agreement for a vehicle. The plaintiff provided computer printouts of accounts ledgers as evidence, but defendants objected stating they were just computer data without identifying information. However, the Electronic Transaction Act of 2006 was referenced, stating electronic documents like ledgers are admissible. Considering this act and witness testimony, the judge ruled the ledgers could be admitted as evidence relating to the lease agreement in question.
Countries that have made electronic signatures legalDaria Kizilova
There are many countries, 60 to be precise, which have passed laws to make electronic signatures fully legal and admissible by law. These legislations provide e-signatures a solid foundation to stand on.
This presentation is about the Cyber Governemance in Pakistan, it clarifys the laws, Bills and Punishments for cyber crimes in the world and perticulary Pakistan.
When anti-corruption norms lead to undesirable results: learning from the Ind...UniversitasGadjahMada
This paper analyzes how and why adverse side-effects have occurred in the implementation of two articles of Indonesia’s anti-corruption law. These articles prohibit unlawful acts which may be detrimental to the finances of the state. Indeed, the lawmakers had good intentions when they drafted the two articles. They wanted to make it easier to convict corrupt individuals by lowering the standard of evidence required to prove criminal liability. The implementation of these articles has raised legal uncertainty. The loose definition of the elements of the crime enables negligence and imperfection of (public) contracts to be considered as corruption. The Constitutional Court has issued two rulings to restrict and guide the interpretation of these articles. However, law enforcement agencies (Supreme Court and public prosecutors) have been unwilling to adhere to the rulings. There are two possible reasons for this. First, as has been argued by several commentators, the law enforcement agencies have misinterpreted the concept of Bunlawfulness^. Besides, the law enforcement agencies wish to be seen to be committed to prosecuting and delivering convictions in corruption cases. To do so, they need to maintain looser definitions of the elements of the offence. This paper endorses the Constitutional Court rulings and provides additional reasons in support of their stance. The paper can be considered as a case study for other countries that may be contemplating similar legislation.
A new approach to International Judicial Cooperation through secure ICT platf...ePractice.eu
Authors: Mauro Cislaghi | Domenico Pellegrini | Elisa Negroni.
Cooperation between judicial systems is a key factor for sustainable development, one of the EU’s major priorities. eGovernment plans and e-Justice initiatives supported by the European Commission and national governments create a very favourable background for the adoption of ICT standards in the area of cross-border judicial cooperation, both in Member States and in pre-Accession countries.
This document is an application for a research grant to study Nigeria's Freedom of Information Act of 2011. The study aims to [1] examine how the Act aligns with other open government laws and the Nigerian Constitution, [2] identify the procedural guidelines for enforcing the right to information, and [3] determine if the Official Secrets Act was impliedly repealed by the Freedom of Information Act. The researcher plans to use legal sources like the Constitution and Acts, as well as secondary sources like books, journals, and cases, to conduct a doctrinal and empirical analysis of these issues. The expected findings include that information access is a fundamental right and that security reasons cannot broadly prevent information disclosure under the Act.
Executability of the constitutional court decisionQodirJaelani
The document discusses the executability of Constitutional Court decisions in Indonesia, specifically whether decisions include a grace period for implementation by legislators. It finds that decisions without a grace period are often not followed up through new legislation, while decisions with a grace period are typically implemented through new laws within the mandated timeframe. The document concludes that including a grace period and institutionalizing constitutional review through expanded Constitutional Court authorities could make future decisions more executable.
Defragmentation of indian legal cases withijfcstjournal
The main aim of this research paper is to develop a rule based knowledge database for legal expert system
for consumer protection act, a domain within the Indian legal system which is often in demand. A
knowledge database developed here will further help the legal expert system to determine type of case with
respect to the Indian Judicial System. In this paper a rule based knowledge database will be developed to
determine the type of the case. The main aim of the study is to build a prototype which will rule based in
nature. The rule based knowledge database development is the first phase in the development of
comprehensive rule based legal expert system for consumer protection act which will be of great help in
process of solving consumer related cases.
This document summarizes an assignment on cyber law submitted to a professor. It discusses the objectives and structure of the Information Technology Act 2000 and the need for the Information Technology Amendment Act 2008. It then provides case studies related to selected sections of the IT Act, including Section 43 on penalties for computer damage, Section 65 on tampering with computer source documents, Section 66 on computer-related offenses, and Section 66A on sending offensive messages.
Law Enforcement against the Crime of Fraud through Funds Transfer Study at Po...ijtsrd
Fraud using SMS short message services is usually carried out by perpetrators by sending SMS to random recipients using a send to many system more than one recipient of the message or some kind of broadcast message. Then the perpetrator waits for several responses which are then followed up with lies and ruses so that the victim transfers some money. A crime that is still a complex problem is that criminals use SMS as a medium to find victims with the mode of asking the victim to transfer a certain amount of money with certain tricks until the potential victim actually follows the perpetrators wishes. Based on this description, the authors found problems in this research, namely legal arrangements regarding the criminal act of fraud through the transfer of funds in Indonesia, law enforcement against the crime of fraud through the transfer of funds at the Medan Polrestabes. The purpose of the study is to find out the legal arrangements regarding the criminal act of fraud through the transfer of funds in Indonesia, to find out law enforcement against the crime of fraud through the transfer of funds at the Medan Polrestabes. The research method used is normative juridical research positive law , data collection techniques are conducting library research by reading books, scientific works, legislation, lecture materials, as well as through internet media websites , field research by conducting interviews with The related party is the Medan City Resort Police. From the results of the research conducted, the authors conclude that the legal regulation regarding the criminal act of fraud through the transfer of funds in Indonesia is Article 378 of the Criminal Code, the threat of which is a maximum of 4 years in prison, Article 28 paragraph 1 of Law Number 19 of 2016 concerning Amendments to Laws Law Number 11 of 2008 concerning Information and Electronic Transactions, Article 82 of Law Number 11 of 2011 concerning Transfer of Funds, imprisonment for a maximum of 4 four years and or a fine of a maximum of Rp. 1,000,000,000.00 one billion rupiahs . Law enforcement against criminal acts of fraud through transfer of funds at the Medan Polrestabes conducted an investigation into SMS media fraud with the mode of transfer of funds, officers immediately asked for the perpetrators data to find out the identity of the perpetrator. Investigators study the traces left by the perpetrators, complete the facilities and infrastructure at the Medan Besar City Resort Police such as cyber tools and improve the ability of members related to technology understanding. The next legal process is the trial process. H. Lawali Hasibuan | Alvin Hamzah "Law Enforcement against the Crime of Fraud through Funds Transfer (Study at Polrestabes Medan)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7 , December 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52473.pdf Paper URL: https://www.ijtsrd.com/other-s
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian depending on perspective. The key points covered include:
- The objectives and scope of the original 2000 act regarding electronic transactions and documents.
- Why the 2008 amendment was pursued, to address gaps, consult experts, and compare to other countries' laws.
- Notable changes the amendment brought, like focusing on data privacy, security, and defining new cyber crimes.
- An overview of the act's structure and applicability.
- Examples of cyber crime cases related to specific sections of
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian by different parties. It then summarizes the key aspects and changes covered in the amended act of 2008, including a focus on data privacy, information security, cyber cafes, digital signatures, and including additional cyber crimes. The document also discusses the structure and applicability of the act, and provides case studies to illustrate specific sections of the act related to offenses such as tampering, cheating, identity theft, and publishing obscene material.
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian depending on perspective. The key points covered include:
- The objectives and scope of the original 2000 act regarding electronic transactions and documents.
- Why the 2008 amendment was pursued, to address gaps, consult experts, and compare to other countries' laws.
- Notable changes the amendment brought, like focusing on data privacy, security, and defining new cyber crimes.
- An overview of the act's structure and applicability.
- Examples of cyber crime cases related to specific sections of
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian by different parties. It then summarizes the key sections and features added in the amendment, including a focus on data privacy, information security, and additional cyber crimes. Several case studies are presented related to specific sections of the act around offenses such as identity theft, computer tampering, and publishing obscene material. The structure and applicability of the act are also outlined.
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian depending on perspective. The key points covered include:
- The objectives and scope of the original 2000 act regarding electronic transactions and documents.
- Why the 2008 amendment was pursued, to address perceived issues and compare to other countries' laws.
- Notable features strengthened in the amended act like data privacy, information security, and defining additional cyber crimes.
- An overview of the act's structure and applicability.
- Examples of cyber crime cases related to specific sections of the act.
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
The document discusses the Information Technology Act of 2000 and its amendment in 2008 in India. It provides context for why the amendment was needed, as the original act was criticized for being too lenient or draconian by different parties. It then summarizes some key sections of the acts related to cyber crimes and penalties. Several case studies are presented related to sections like tampering with computer data, identity theft, cyber terrorism, and publishing obscene content online. The document aims to explain the Indian legal framework around cyber crimes and cases that have been prosecuted under different sections of the acts.
Similar to The Urgency of Electronic Notarization in Indonesia by Seeing the Implementation in Estonia During the Covid-19 Pandemic (20)
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISMAJHSSR Journal
ABSTRACT: Huzhou has rich tourism resources, as early as a considerable development since the reform and
opening up, especially in recent years, Huzhou tourism has ushered in a new period of development
opportunities. At present, Huzhou tourism has become one of the most characteristic tourist cities on the East
China tourism line. With the development of Huzhou City, the tourism industry has been further improved, and
the tourism degree of the whole city has further increased the transformation and upgrading of the tourism
industry. However, the development of tourism in Huzhou City still lags far behind the tourism development of
major cities in East China. This round of research mainly analyzes the current development of tourism in
Huzhou City, on the basis of analyzing the specific situation, pointed out that the current development of
Huzhou tourism problems, and then analyzes these problems one by one, and put forward some specific
solutions, so as to promote the further rapid development of tourism in Huzhou City.
KEYWORDS:Huzhou; Travel; Development
Enhancing Losari Beach Exploration: Augmented Reality for Immersive Visualiza...AJHSSR Journal
ABSTRACT: South Sulawesi, commonly known as Makassar, boasts rich cultural heritage and customs,
making it a prominent destination for tourism. Among its attractions, Losari beach stands out as a focal point for
visitors seeking to explore the city's natural beauty and cultural offerings. In this context, leveraging modern
technology such as augmented reality presents an innovative approach to showcasing Losari beach to potential
tourists. This research endeavors to introduce tourism assets in a more visually captivating manner through the
use of augmented reality. Utilizing software tools like Unity and Adobe Illustrator, the study focuses on creating
an immersive experience where tourists can interact with virtual representations of Losari beach. By simply
pointing their mobile phone cameras at designated markers or using barcode scanners, tourists can access
augmented reality features embedded within the application. The findings of this research aim to provide
valuable information, particularly for foreign tourists, about Losari beach, positioning it as a compelling
destination within South Sulawesi's diverse array of tourist attractions. Through this technological innovation,
the study seeks to enhance the visibility and appeal of Makassar city's tourism offerings on a global scale.
KEYWORDS: Visualizing, Losari Beach, Augmented Reality
DEVELOPMENT STATUS AND COUNTERMEASURES OF TMALL DURING THE COVID-19 EPIDEMICAJHSSR Journal
ABSTRACT:China's e-commerce enterprises have developed rapidly, among which Tmall has become one of
the largest retail shopping websites in China.But in the past year, the Covid-19 epidemic has brought a huge
impact to Chinese e-commerce enterprises, and Tmall is no exception.Therefore, the development status of
Tmall in the new crown epidemic situation was analyzed, and the viewpoint was put forward :Tmall1 stabilized
the situation in the face of the epidemic situation and made a very correct countermeasures.The influence of this
epidemic on Tmall was deeply analyzed, and the conclusion was made: the new crown epidemic is both a
challenge and an opportunity forTmall.
KEYWORDS:Tmall; COVID - 19 outbreak ; The electronic commerce
Factors affecting undergraduate students’ motivation at a university in Tra VinhAJHSSR Journal
ABSTRACT: Motivation plays an important role in foreign language learning process. This study aimed to
investigate student’s motivation patterns towards English language learning at a University in Tra Vinh, and factors
affecting their motivation change toward English language learning of non-English-major students in the semester.
The researcher used semi-structured interview at the first phase of choosing the participants and writing reflection
through the instrument called “My English Learning Motivation History” adapted from Sawyer (2007) to collect
qualitative data within 15 weeks. The participants consisted of nine first year non-English-major students who learning
General English at pre-intermediate level. They were chosen and divided into three groups of three members each
(high motivation group; average motivation group; and low motivation group). The results of the present study
identified six visual motivation patterns of three groups of students with different motivation fluctuation, through the
use of cluster analysis. The study also indicated a diversity of factors affecting students’ motivation involving internal
factors as influencing factors (cognitive, psychology, and emotion) and external factors as social factors (instructor,
peers, family, and learning environment) during English language learning in a period of 15 weeks. The findings of
the study helped teacher understand relationship of motivation change and its influential factors. Furthermore, the
findings also inspired next research about motivation development in learning English process.
KEY WORDS: language learning motivation, motivation change, motivation patterns, influential factors, students’
motivation.
The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...AJHSSR Journal
ABSTRACT :This research aims to analyze the correlation between employee work stress and digital literacy
with employee performance at PT Telkom Akses Area Cirebon, both concurrently and partially. Employing a
quantitative approach, the study's objectives are descriptive and causal, adopting a positivist paradigm with a
deductive approach to theory development and a survey research strategy. Findings reveal that work stress
negatively and significantly impacts employee performance, while digital literacy positively and significantly
affects it. Simultaneously, work stress and digital literacy have a positive and significant influence on employee
performance. It is anticipated that company management will devise workload management strategies to
alleviate work stress and assess the implementation of more efficient digital technology to enhance employee
performance.
KEYWORDS -digital literacy, employee performance,job stress, multiple regression analysis, workload
management
The Settlement of Construction Disputes Through Dispute Councils From the Per...AJHSSR Journal
ABSTRACT:This research differs from the practice of business activity in the construction services industry,
which may lead to construction disputes. The settlement of construction disputes is a consensus based on the
basic principle of debate. If the discussions between the parties do not reach an agreement, the parties may take
measures to resolve the dispute through the dispute council. Because the standard governing the disputes
committee was not fully regulated, they did not comply with the principle of legal certainty. Therefore, further
research was needed to establish a theoretical basis for regulating the disputes committee in settling construction
disputes. This research is a standard legal research using a legal regulatory, conceptual, and comparative
approach. The research results show that the ideal concept of resolving construction disputes through a dispute
council based on the value of legal certainty is to establish that the position of the dispute council is a special
court that has the authority to resolve construction disputes under construction services agreements. To realize
the position of the Court of Disputation as a special court, it must be based on the creation of philosophical
values, the creationof legislative regulations, and the creation of the institutional structure of the Court of
Disputation.
KEYWORDS-Construction Disputes, Dispute Council, Special Court
VALUES OF ORAL LITERATURE IN THE SOCIETY: A STUDY OF FOLKTALES OFOGBA IN RIVE...AJHSSR Journal
ABSTRACT : Oral literature is a creative work of art that portends high merit and has the creative use of
imagination in preliterate societies. It adopts the genres of literature: drama, prose and poetry in the oral milieu,
using performance as its hallmark. It thrives on the use of oral data because of its orality. This paper focuses on
the moral values or oral literature in the society using Ogba as a spring board. The study was carried out in
communities ofOgba. The population of the study consists of ten towns and village, in Ogba. The theoretical
framework used is Dell Hyme’s ethno-poetics because the works of oral literature relate to the society. This
paper concludes that oral literature serves to against all odds; communicate ideas, emotions, beliefs and
appreciation of life. The folktales in Ogba for instance, serve similar purpose through their
rendition/performance. Through the stories, the younger generation in Ogba society is familiarised with the
customs, traditions, and rituals prevalent in the society. This paper therefore recommends the use of oral
literature in all its genres to inculcate moral values and lessons to the teenagers and youths. Against this
background, Ogba (African) themselves must cease to regard oral literature as primitive and fetish.
KEYWORDS: Values, Oral Literature, Society, Ogba, Folktales
Pormalistikong Pagdalumat sa mga Tula ni Ron CanimoAJHSSR Journal
ABSTRACT: Nilayon ng pag-aaral na ito na masuri ang dalawampung (20) tula ni Ron Canimo gamit ang
pormalistikong dulog batay sa mga sumusunod na elemento: (a) Sukat at Tugma, (b) Talinghaga at
Simbolismo, (c) Imahen, (d) Tema, at (e) Diksiyon. Layunin din nitong mataya ang antas ng pagtanggap ng
ginawang pagsusuri gamit ang nabuong instrumento sa pagtataya nito. Sinunod dito ang Input-Process-Output
na balangkas ng pag-aaral at ginamitan ng kwantitatib-deskriptib-ebalwatib na pamamaraan. Sa pamamagitan
ng talatanungang ibinatay sa ginamit ni Morales (2014) na naimodipika ayon sa kahingian ng kasalukuyang
pag-aaral, tatlong (3) gurong eksperto ang nagsilbing tagataya dito na siyang tumiyak sa kahusayan ng nabuong
pagsusuri ng mananaliksik. Gamit ang Content Analysis, natuklasan na makabagong pamamaraan ang istilo na
ginamit ni Ron Canimo sa pagsulat ng mga tula. Lahat ng kanyang mga tula ay walang sinusunod na sukat at
tugma, may iba‟t ibang tayutay at simbolismong ginamit, magkaibang pandama ang pinagana dahil sa mga
imahe at paglalarawang ginawa, iba‟t ibang uri ng pag-ibig ang tinalakay at gumamit ng pormal, impormal o
kumbersasyonal na wika at makabagong istilo sa pagsulat ng tula. Gamit ang mean at standard deviation,
lumabas na “Mataas” ang antas ng pagtanggap sa kabuuan ng mga gurong eksperto na tumaya sa nabuong
pagsusuri. Lumabas din na “Mataas” ang antas ng kanilang pagtanggap sa nabuong pagsusuri batay sa mga
sumusunod na elemento: (a) Sukat at Tugma, (b) Talinghaga at Simbolismo, (c) Imahen, (d) Tema, at (e)
Diksiyon. Mula sa natayang pagsusuri at kinalabasan ng antas ng pagtanggap dito, naitala ang mga paksa sa
Junior High School Filipino na maaaring lapatan at gamitan ng nabuong pagsusuri.
KEYWORDS: Kumbensyunal, Pagdalumat, Pormalistiko, Ron Canimo, Tula
SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...AJHSSR Journal
ABSTRACT: This qualitative study investigates the adaption experiences of indigenous college students at the
University of Mindanao, Matina-main campus. Eight major themes emerged, including difficulties with language
proficiency, online learning, classroom interaction, examination systems, grading procedures, school regulations,
resource accessibility, coping mechanisms, and future goals. Implications include the requirement for targeted
language proficiency and technology use support, an understanding of adaption processes, interventions to
improve resource accessibility, and equitable public administration policies. The study underlines the importance
of adaptation in various educational contexts, as well as the role of educators and legislators in creating inclusive
learning environments.
KEYWORDS: indigenous college students, adaptation, educational challenges, coping strategies
The effect of Institutional Ownership, Sales Growth and Profitability on Tax ...AJHSSR Journal
ABSTRACT: This research aims to test, analyze and obtain empirical evidence about the influence of
institutional ownership, sales growth and profitability on tax avoidance. The object of this research is
manufacturing companies in the consumer goods industry sector listed on the Indonesia Stock Exchange (BEI)
in 2018-2022. This research used quantitative research methods and causal research design. The sampling
technique in this research used non-probability sampling with purposive sampling as the basis for determining
the sample so that a sample of 55 samples was obtained. The data used is secondary data obtained from the
official website of the Indonesia Stock Exchange (BEI) during the 2018-2022 period. The data analysis method
used was multiple linear regression analysis with several tests such as descriptive statistical tests, classical
assumption tests, and hypothesis testing using SPSS version 26 statistical software. The results showed that the
institutional ownership variable has no effect on tax avoidance, while the sales growth and profitability has a
negative and significant effect on tax avoidance.
KEYWORDS: Institutional Ownership, Sales Growth, Profitability, Tax Avoidance
MGA ESTRATEHIYA SA PAGTUTURO KAUGNAY SA PASALITANG PARTISIPASYON NG MGA MAG-A...AJHSSR Journal
ABSTRAK: Ang mga estratehiya sa pagtuturo ay mahalagang kasangkapan sa paghahatid ng mabisang
pagtuturo sa loob ng silid. Tinukoy sa pag-aaral na ito ang antas ng kagustuhan ng mga mag-aaral sa pagsasadula,
pangkatang talakayan at paggawa ng mga koneksyon sa tunay na karanasan sa buhay bilang mga estratehiya sa
pagtuturo ng panitikan sa Filipino at pasalitang partisipasyon ng mga mag-aaral sa Baitang 7 ng Misamis
University Junior High School, Ozamiz City. Ang ginamit na disenyo sa pananaliksik na ito ay deskriptivcorrelational. Ang mga datos sa pag-aaral ay nagmula sa kabuuang populasyon na 120 na mag-aaral at tatlong
mga guro na tagamasid sa pasalitang partisipasyon ng mga mag-aaral. Ang Talatanungan sa Kagamitan sa
Pagtuturo ng Panitikan at Checklist batay sa Obserbasyon sa Pasalita na Partisipasyon ay ang instrumentong
ginamit sa pagkalap ng datos. Mean, standard deviation, Analysis of Variance at Pearson Product-Moment
Correlation Coefficient ang mga ginamit na estatistiko na sangkap. Inihayag sa naging resulta na ang tatlong piling
estratehiya sa pagtuturo ng panitikan sa Filipino ay may pinakamataas na antas ng kagustuhan ng mga mag-aaral.
Ang antas ng pakilahok ng mga mag-aaral sa paggamit ng tatlong estratehiya sa pagtuturo ng panitikan ay
pinakamataas na nagpapahiwatig na aktibong nakilahok ang mga mag-aaral sa mga gawain. Inihayag din na
walang makabuluhang kaibahan sa antas ng kagustuhan ng mga mag-aaral sa mga estratehiya sa pagtuturo ng
panitikan sa Filipino. Ito ay nangahulugan na gustong-gusto ng mga mag-aaral ang pagkakaroon ng mga
estratehiya sa pagtuturo. Walang makabuluhang kaugnayan ang kagustuhan sa mga estratehiya at antas ng
pakikilahok ng mga mag-aaral. Hindi nakaapekto sa kanilang pakikilahok ang anumang estratehiyang ginamit ng
guro.
KEYWORDS : estratehiya, karanasan, pagsasadula, pagtuturo, pangkatang talakayan
The Role of the Instruction of Reading Comprehension Strategies in Enhancing ...AJHSSR Journal
ABSTRACT :Throughout my studies and teaching English in different language centers and higher studies
institutions, I have come to conclude that students consider Reading comprehension as a nightmare that
frightens them and hinders their language acquisition in the Moroccan EFL Context. This may cause them to
develop an internal psychological obstacle that grows as their lack of the necessary instruments or tools to
overcome are not equipped with. They become lost and unaware about or unfamiliar with the necessary reading
comprehension strategies that could help them to face the problem of misunderstanding or non-understanding
of English texts. Respectively, this article which is only one part of my whole study aims at showing the effect
of teaching reading strategies in enhancing the S1 students‟ familiarity with reading strategies and raising their
frequency use. A sample of 283 University students in EFL context have been chosen randomly and have
attended the usual academic reading classes, yet only 76 are subject to this survey. 38 of them constitute the
experimental group who have attended the treatment regularly in one of the language centers and the other 38
participants are chosen randomly from the whole population to constitute the Control group. They all have
Psychosocial Factors and Deviant Behaviors of Children in Conflict with the L...AJHSSR Journal
ABSTRACT:This study aims to determine the relationship between psychosocialfactors and deviant
behaviors among children in conflict with the law (CICL) inDavao Region. The researchers want to discover the
prevalent factors thatdrive these children to their behaviors. Further, the study sought to determinethe
manifestation of psychosocial factors in terms of life satisfaction, emotionalsupport, self-esteem, and personality
traits. The study's data came from N-83children in conflict with the law (CICL) at the Regional Rehabilitation
Center forYouth (RRCY) in Bago Oshiro, Davao City; all respondents are male. This studyused a total
enumeration sampling technique due to the relatively smallpopulation size. The researchers adapted the
Psychosocial surveyquestionnaires by Zabriskie & Ward (2013) and by John and Srivastava (1999)as well as the
Deviant Behavior Variety Scale (DBVS) by Sanches et al. (2016).Through the use of a validated questionnaire,
the mean and standard deviationare determined. The researchers modified this questionnaire and translated itinto
the respondents' mother tongue (Cebuano) for them to comprehend itbetter. The study discovered no significant
relationship between psychosocialfactors and deviant behaviors of children in conflict with the law (CICL) in
theDavao Region
KEYWORDS :Children in Conflict with the Law (CICL), deviant behaviors, psychosocial factors
Entropy: A Join between Science and Mind-SocietyAJHSSR Journal
ABSTRACT: Entropy is join, intersection and interaction between natural science and human mind-society.
We proposed that if internal interactions exist in isolated systems, entropy decrease will be possible for this
system. Management in system is a typical internal interaction within the isolated system. The purpose of
management is to use regulating the internal interactions within the system, and to decrease the increasing
entropy spontaneously. We propose the principle of social civilization and the developing direction is: freedom
of thought, rule of action. Both combinations should be a peaceful revision and improvement of social rules and
laws. Different countries and nations, different religions and beliefs should coexist peacefully and compete
peacefully. The evolution of human society must be coevolution. Its foundation is the evolution of the human
heart and the human nature.
KEYWORDS: entropy, science, society, management, mind, evolution.
A Model of Disaster Resilience Among Colleges and Universities: A Mixed Metho...AJHSSR Journal
ABSTRACT :This research paper aimed to create a comprehensive framework for measuring disaster
resilience in colleges and universities. The study used a mixed method through Exploratory Factor Analysis
(EFA), which involved analyzing data from a survey questionnaire. The questionnaire was developed based on
in-depth interviews with 12 selected participants from the University of Mindanao, as well as relevant literature
and studies. It was reviewed and validated by 10 experts using a method called Content Validity Ratio (CVR).
This questionnaire was then administered to 400 students from 10 different colleges in University of Mindanao.
After conducting the Exploratory Factor Analysis and performing rotations and iterations, the researchers
identified five main constructs that characterize disaster resilience among colleges (1) disaster preparedness, (2)
disaster awareness, (3) community readiness, and (4) disaster management, (5) disaster resilience. The
researchers aimed to create an organization called “Council of College Disaster Volunteers (CCDV)” which
consist of student volunteers. These factors can be used to develop effective management strategies and
strengthen efforts in preventing and managing disasters and accidents.
KEYWORDS:content validity ratio, criminology, disaster resilience, disaster management, exploratory factor
analysis, and Philippines.
Environmental Struggles and Justice Among Lumad Farmers of Davao CityAJHSSR Journal
ABSTRACT : The study described the various environmental struggles experienced among the participants
and their status in accessing justice. The study followed a qualitative multiple-case study approach; the
participants are the Lumad farmers of Marilog, Davao City selected through a Critical sampling method and
aims to present the environmental violations experienced by the Lumad farmers in Davao City and how it
affected their families and sustenance further, their status in accessing justice is also explored. The study
concluded that the most common struggles the participant experience are Illegal logging and improper waste
disposal, which affect their farms, family, health, and income. Their preferred means to accessing justice is
through barangay settlement; the rigors of accessing courts, such as distance, expenses, fear of ruling, and the
hassle of being called to be present in court, are the most prevalent barriers that hinder the lead farmers from
accessing justice or seeking legal action. Nevertheless, the participants believed that the government would help
them in accessing justice.
KEYWORDS :access to justice, criminology,environmental justice, environmental struggles, lumadfarmers
CYBERBULLYING EXPERIENCES OF UNIVERSITY OF MINDANAO CRIMINOLOGY STUDENTSAJHSSR Journal
ABSTRACT:This paper explores the cyberbullying experiences among Criminology students at the
University of Mindanao. A simple random sampling method was used to distribute the study's online
questionnaire to the respondents and to survey the target population. This study has four hundred (400)
respondents, and the respondents are Criminology students at the University of Mindanao. The findings of this
study revealed that the level of cyberbullying experiences is sometimes manifested. On the other hand, the
cyberbullying experiences of the students indicate a moderate level, which indicates that the cyberbullying
experiences of the respondents are sometimes manifested. Also, the computations showed that among the
indicators presented, the highest mean is obtained in the psychological effect, which implies that there is a
significant effect of cyberbullying experiences of the respondents in terms of the Gender level of the
respondents. Therefore, respondents with a low level of cyberbullying experiences tend to have a moderate level
of cyberbullying experience. However, there is no significant effect in terms of age and year level of the
respondents according to the results regarding the psychological, emotional, and physical impact of
cyberbullying.
KEYWORDS :cyberbullying, emotional, experiences, psychological,physical effect, and simple random
sampling method.
A philosophical ontogenetic standpoint on superego role in human mind formationAJHSSR Journal
ABSTRACT: One of the most significant contributions of psychoanalysis to understand the human being is the
elaboration of a model about the mind from a topical and dynamic perspective. Freud explains the mind by the
constitution of the preconscious, conscious, and subconscious. Later, by three dynamic components: the id, the
ego and the superego. Such an organization of the psychic apparatus supposes not only individual elements, but
social influences along the process of hominization. In this paper, we recover the findings of the renowned
anthropologist Lewis Morgan, trying to link some of them to the psychoanalytic theory. Especially highlighting
the importance of superego in Haidt’s social intuitionism.
Keywords: evolutionism, intuitionism, psychoanalysis, Freud, Haidt, Morgan
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...AJHSSR Journal
ABSTRACT: In the Malaysian context, small and medium enterprises (SMEs) experience a significant
burden of workplace accidents. A consensus among scholars attributes a substantial portion of these incidents to
human factors, particularly unsafe behaviors. This study, conducted in Malaysia's northern region, specifically
targeted Safety and Health/Human Resource professionals within the manufacturing sector of SMEs. We
gathered a robust dataset comprising 107 responses through a meticulously designed self-administered
questionnaire. Employing advanced partial least squares-structural equation modeling (PLS-SEM) techniques
with SmartPLS 3.2.9, we rigorously analyzed the data to scrutinize the intricate relationship between safety
behavior and safety performance. The research findings unequivocally underscore the palpable and
consequential impact of safety behavior variables, namely safety compliance and safety participation, on
improving safety performance indicators such as accidents, injuries, and property damages. These results
strongly validate research hypotheses. Consequently, this study highlights the pivotal significance of cultivating
safety behavior among employees, particularly in resource-constrained SME settings, as an essential step toward
enhancing workplace safety performance.
KEYWORDS :Safety compliance, safety participation, safety performance, SME
Psychological Empowerment and Empathy as Correlates of ForgivenessAJHSSR Journal
ABSTRACT: The study explores Psychological Empowerment and Empathy as Correlates of Forgiveness.
The two variables are regarded to have influence on the decision one makes to forgive another. The study aimed
at examining the relationships between psychological empowerment and forgiveness, empathy and forgiveness
and to identify which one of the two,Psychological Empowerment or Empathy, is the more powerful predictor of
forgiveness. The study took a survey design with a sample of 350 drawn from a population of university students
using a self-administered questionnaire with four sections: Personal information, Psychological empowerment
scale, Toronto Empathy questionnaire, and the Heartland Forgiveness Scale (HFS). Data analysis employed
Pearson’s product moment correlation and regression analysis to test hypotheses. The results show significant
relationships between psychological empowerment and forgiveness as well as empathy and forgiveness.
Empathy was found to be the more powerful predictor of forgiveness.
KEY WORDS: Psychological empowerment, empathy, forgiveness
This tutorial presentation provides a step-by-step guide on how to use Facebook, the popular social media platform. In simple and easy-to-understand language, this presentation explains how to create a Facebook account, connect with friends and family, post updates, share photos and videos, join groups, and manage privacy settings. Whether you're new to Facebook or just need a refresher, this presentation will help you navigate the features and make the most of your Facebook experience.
Telegram is a messaging platform that ushers in a new era of communication. Available for Android, Windows, Mac, and Linux, Telegram offers simplicity, privacy, synchronization across devices, speed, and powerful features. It allows users to create their own stickers with a user-friendly editor. With robust encryption, Telegram ensures message security and even offers self-destructing messages. The platform is open, with an API and source code accessible to everyone, making it a secure and social environment where groups can accommodate up to 200,000 members. Customize your messenger experience with Telegram's expressive features.
Your LinkedIn Success Starts Here.......SocioCosmos
In order to make a lasting impression on your sector, SocioCosmos provides customized solutions to improve your LinkedIn profile.
https://www.sociocosmos.com/product-category/linkedin/
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyDigital Marketing Lab
Explore the latest trends in Search Engine Optimization (SEO) and discover how modern practices are transforming business visibility. This document delves into the shift from keyword optimization to user intent, highlighting key trends such as voice search optimization, artificial intelligence, mobile-first indexing, and the importance of E-A-T principles. Enhance your online presence with expert insights from Digital Marketing Lab, your partner in maximizing SEO performance.
UR BHatti Academy dedicated to providing the finest IT courses training in the world. Under the guidance of experienced trainer Usman Rasheed Bhatti, we have established ourselves as a professional online training firm offering unparalleled courses in Pakistan. Our academy is a trailblazer in Dijkot, being the first institute to officially provide training to all students at their preferred schedules, led by real-world industry professionals and Google certified staff.
This tutorial presentation offers a beginner-friendly guide to using THREADS, Instagram's messaging app. It covers the basics of account setup, privacy settings, and explores the core features such as close friends lists, photo and video sharing, creative tools, and status updates. With practical tips and instructions, this tutorial will empower you to use THREADS effectively and stay connected with your close friends on Instagram in a private and engaging way.
Lifecycle of a GME Trader: From Newbie to Diamond Handsmediavestfzllc
Your phone buzzes with a Reddit notification. It's the WallStreetBets forum, a cacophony of memes, rocketship emojis, and fervent discussions about Gamestop (GME) stock. A spark ignites within you - a mix of internet bravado, a rebellious urge to topple the hedge funds (remember Mr. Mayo?), and maybe that one late-night YouTube rabbit hole about tendies. You decide to YOLO (you only live once, right?).
Ramen noodles become your new best friend. Every spare penny gets tossed into the GME piggy bank. You're practically living on fumes, but the dream of a moonshot keeps you going. Your phone becomes an extension of your hand, perpetually glued to the GME ticker. It's a roller-coaster ride - every dip a stomach punch, every rise a shot of adrenaline.
Then, it happens. Roaring Kitty, the forum's resident legend, fires off a cryptic tweet. The apes, as the GME investors call themselves, erupt in a frenzy. Could this be it? Is the rocket finally fueled for another epic launch? You grip your phone tighter, heart pounding in your chest. It's a wild ride, but you're in it for the long haul.
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEFebless Hernane
Using Google Teams (G-Teams) is simple. Start by opening the Google Teams app on your phone or visiting the G-Teams website on your computer. Sign in with your Google account. To join a meeting, click on the link shared by the organizer or enter the meeting code in the "Join a Meeting" section. To start a meeting, click on "New Meeting" and share the link with others. You can use the chat feature to send messages and the video button to turn your camera on or off. G-Teams makes it easy to connect and collaborate with others!
Project Serenity is an innovative initiative aimed at transforming urban environments into sustainable, self-sufficient communities. By integrating green architecture, renewable energy, smart technology, sustainable transportation, and urban farming, Project Serenity seeks to minimize the ecological footprint of cities while enhancing residents' quality of life. Key components include energy-efficient buildings, IoT-enabled resource management, electric and autonomous transportation options, green spaces, and robust waste management systems. Emphasizing community engagement and social equity, Project Serenity aspires to serve as a global model for creating eco-friendly, livable urban spaces that harmonize modern conveniences with environmental stewardship.
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANEFebless Hernane
Using Remini is easy and quick for enhancing your photos. Start by downloading the Remini app on your phone. Open the app and sign in or create an account. To improve a photo, tap the "Enhance" button and select the photo you want to edit from your gallery. Remini will automatically enhance the photo, making it clearer and sharper. You can compare the before and after versions by swiping the screen. Once you're happy with the result, tap "Save" to store the enhanced photo in your gallery. Remini makes your photos look amazing with just a few taps!
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
The Urgency of Electronic Notarization in Indonesia by Seeing the Implementation in Estonia During the Covid-19 Pandemic
1. American Journal of Humanities and Social Sciences Research (AJHSSR) 2022
A J H S S R J o u r n a l P a g e | 135
American Journal of Humanities and Social Sciences Research (AJHSSR)
e-ISSN : 2378-703X
Volume-6, Issue-9, pp-135-138
www.ajhssr.com
Research Paper Open Access
The Urgency of Electronic Notarization in Indonesia by Seeing
the Implementation in Estonia During the Covid-19 Pandemic
Sharon Gracale1
, Mohamad Fajri Mekka Putra2
1
(Faculty of Law, University of Indonesia, Indonesia)
2
(Faculty of Law, University of Indonesia, Indonesia)
ABSTRACT: This study aims to compare the making of a notary deed during the Covid-19 period in
Indonesia and Estonia. Normative juridical law research is the method employed in this research. Analytical
descriptive was further also utilized, while the data collection technique used is literature study. The results of
the study indicated the importance of making supporting or additional regulations for Law Number 30 of 2004
concerning Notary Positions as amended by Law Number 2 of 2014 concerning Amendments to Law Number
30 of 2004 concerning Notary Positions ("Notary Position Law") in connection with by making an authentic
deed which is carried out without physical presence, which facilitates Notaries to carry out their positions in
times of emergency such as the current Covid-19. In response to this, Estonia, which is also a Civil Law
country, has fulfilled the element of legal expediency by amending the Notaries Act of the Republic of Estonian
("Estonian Notaries Act") which makes it possible to make a notarial deed without a physical presence or to do
it virtually.
KEYWORDS : Cyber notary, Electronic Notarization, Estonia, Indonesia, Notary Deed.
I. INTRODUCTION
During the COVID-19 pandemic, all Indonesians are asked to implement preventive measures
including physical or social distancing, quarantining, and working remotely to reduce the spread especially in
the workplace. All work must be done electronically, or using electronic communication systems. This has been
done by many legal services, including lawyers/advocates, judiciary, and prosecutors.
Ironically, there is still one legal service provider who is relatively lagging behind or seems slow in
responding to emergency situations, namely a Notary as a Public Official who also provides public services. It
seems that Indonesian Notaries still seem hesitant to transform themselves in order to be able to provide their
services electronically. In fact, the community really needs the alertness and dynamic function and role of
Notaries in dealing with this emergency situation to be able to organize their services online.
During the Covid-19 pandemic, the best advice that has been given by the government is that Notaries
are expected to be able to open offices but still enforce social distancing and limit the glass in front of the desk.
This certainly endangers many parties, not only the notary himself, but also the community. Seeing the
fluctuating and increasingly unpredictable increase in Covid-19 cases, it is undoubtedly an urgent matter for the
government to make special provisions regarding electronic notaries.
In its development, several countries have implemented cybernotary in their national legal systems,
especially in the context of the need to guarantee the authenticity of electronic information, in supporting the
implementation of digital signatures. The government policies of each country regarding the position of a notary
in making a notary deed during the COVID-19 pandemic are different, therefore it is crucial to know how other
countries determine these policies. This activity is carried out with the aim of comparing Indonesia to Estonia so
that the responsible government can take the newest policy that is more suitable to be applied, especially in
terms of notary positions in making deeds during the Covid-19 pandemic. Estonia is one of the countries that
represents the Civil Law (European Justice, 2021) [1] legal tradition which recognizes the existence of a notary
as a third party who is trusted to guarantee the legality of a legal act and has implemented an e-notary in its
national legal system.
This is proven by the fact that Estonia has made some changes in the Notaries Act which has passed
through government quickly. It makes Estonia implement a rule that the making of a deed can be done using a
two-way audiovisual communication facility to prevent Covid-19. Therefore, this study becomes a necessity in
the context of reforming national law in order to accommodate the dynamics of telematics technology as
expected properly. This research investigates how Estonia has responded differently to Covid-19 in respect of
the physical presence requirement. This is important to see if there is an opportunity for the implementation of
2. American Journal of Humanities and Social Sciences Research (AJHSSR) 2022
A J H S S R J o u r n a l P a g e | 136
e-notary in Indonesia in the future. With this research, it is hoped that the Indonesian government can imitate the
implementation of Estonia and that notaries can still carry out their work comfortably in the midst of the Covid-
19 pandemic situation.
II. RESEARCH METHODS
This study uses a statutory approach in normative legal research. This approach analyses civil law
norms related to notary. The primary data are the Law Number 2 of 2014 concerning Amendments to Law
Number 30 of 2004 concerning Position of Notary Profession, Information and Electronic Transactions Law
Number 11 of 2008 (“ITE Law”), Government Regulation No. 21 of 2020, and Notaries Act of the Republic of
Estonia 2000 (“Estonian Notaries Act”). This study uses secondary sources of legal materials such as books,
legal journals, work safety journals, and articles related to electronic notarization. The collected data is then
analyzed and studied to find answers to the legal issues in this article.
III. RESULTS AND DISCUSSIONS
3.1 Indonesia’s Regulations Toward Notary Positions in Making Notary Deed
The concept of cyber-notary seems to be still under debate in Indonesia and is perceived as a discourse,
not yet perceived as a necessity. Although technology allows the role of notaries online and remotely, legally it
seems that this cannot be done because the paradigm that underlies the Notary Law is built with conventional
mechanisms. Notary Position Law stipulates the obligation to „appear‟ between the party making the deed and
the notary (Notary Positions Law Number 2 of 2014, 2014) [2]. The 'appearing' is carried out in the context of
reading the deed in the presence of at least 2 (two) witnesses, or 4 (four) witnesses specifically for making a
private will, and signed at the same time by the appearer, the witness, and a notary.
The classic reason that becomes a problem in the process of making a deed is the norm of having to be
physically present in making a deed and not being able to do it as stated in Notary Position Law. In addition, the
ITE Law also excludes notary deeds in the context of electronic documents as legal evidence, so that it has the
potential to cause legal problems for notaries, whether civil, administrative or maybe even criminal (Law
Number 11 of 2008, 2008) [3].
It is feared that if it is not done physically, it will have legal consequences for the Notary, including:
(i) the status of the authentic deed will be reduced to a private deed, as a result (ii) there will be a lawsuit against
a notary by its service users in the future; (iii) there is no guarantee of security for electronic systems and
electronic documents that are prone to being altered and have the potential to leak so as to violate
confidentiality, (iv) refusal by the parties may occur, and (iii) the possibility of not receiving these documents by
the relevant agencies, as well as ( iv) the potential for dismissal sanctions that must be faced by the Notary for
not carrying out legal compliance (Makarim, 2011) [4].
However, of course, with the regulations of physical distancing due to the Covid-19 pandemic, the
implementation of Article 16 paragraph (1) letter m is hampered. In this article, the article very clearly regulates
the provisions for physical presence and there are no multiple interpretations that occur. Therefore, the
government in this article only imposes restrictions on activities, not prohibits the public from carrying out
activities. This means that Article 16 paragraph (1) letter m still provides the possibility for notaries and the
public to carry out by complying with the health protocols set by the government.
By looking at this provision, the government is actually indirectly forcing notaries to apply the practice
of "presence from home", which is certainly very possible for notaries to apply (Budianto, 2020) [5]. If it is said
the presence "from" the house and not the presence "at" the house, then his presence should be interpreted as the
presence of work. Especially if the presence is remote but with the condition of the Notary being in his office
and the server is in his office. So here it can be considered that the appearers who are "invited" and "summoned"
by the notary to the server, are counted as being present in his office.
Indeed Notary Positions Law does not recognize audio-visual. However, laws can be softened in the
public interest, especially in abnormal conditions that make normal laws unenforceable. The government should
enact a new legal rule that may deviate from the provisions of the applicable laws and regulations. Under normal
circumstances, Notaries do not have the opportunity to use audio visuals, unless the Notary Positions Law is
revised. But in an emergency these rules can be deviated, but with a temporary nature.
3.2 Regulations in Estonia
In Estonia, the Notaries Act has amended through government quickly. The amendment proposal was
submitted several times, and on April 2nd, 2022 amended Notarial Regulations was amended again, due to the
emergency situation caused by the coronavirus (Estonian Notarization Act of 2001, 2001) [6]. In order for
normal life disrupted by the emergency situation to proceed as smoothly as possible, the Minister of Justice
established a possibility to use remote authentication elsewhere. Thus, as of the beginning of April, notarial
transactions can be made in case the party is at home, in the office or elsewhere, in Estonia or abroad.
3. American Journal of Humanities and Social Sciences Research (AJHSSR) 2022
A J H S S R J o u r n a l P a g e | 137
Prior to launching the e-notary system, physical presence at a local notary‟s office was required to trade
or transfer company shares, buy or sell real estate, attest credentials, or carry out other notarial acts. This made it
inconvenient for residents to manage their affairs and carry out business transactions from different cities. But
with the e-notary service now rolled out to its total capacity, you can carry out all but one type of transaction
from anywhere you are in the world.
These changes mean, that avoiding contact, the notary has the possibility to authenticate almost all the
transactions if the party at the same time stays e.g. at home(Estonian Notarization Act of 2001, 2001) [7].As the
remote authentication is a possibility, not an obligation, it is always possible to book an appointment at the
notary‟s office to carry out the notarial transaction. In case several persons are required to participate in the
transaction, they shall decide whether they all go to the notary‟s office or make the transaction remotely.
However, it is not possible to make a notarial transaction if one of the parties is at home and the other one is at
notary‟s office.
Therefore, on February 2020, just weeks before the pandemic broke out, the Estonian Chamber of
Notaries launched the e-notary service as a pilot project that enables the remote authentication of notarial acts to
be carried out anywhere – the first state service of its kind in Europe. The novel service had been in the pipeline
for over 5 years but came to life at the most crucial time.
3.2.1 Notary Authentication
The possibility of not needing to see notaries face-to-face or not going to their office just became an
option with remote authentication. But before that, notaries in Estonia already had a standard e-notary system
that was being used internally by the notaries and notary offices to prepare contracts, schedule calendars, sign
documents, create document templates, access registers, send out documents and data to the registries, and issue
apostilles. It was just that the existing e-notary service was not available for the public‟s use.
Remote authentication(Estonian Notarization Act of 2001, 2001) [8] enables notarial acts to be
performed by means of a video conference between the notary and the customer(Chamber, 2020) [9]. Such
authentication is equivalent to a physical authentication at the notary‟s office. Not all notaries allow remote
authentication, as it is not a requisite, but an option. It is up to the notary to decide if a specific transaction can
be carried out by using remote authentication.
This meant that Estonians no longer had to visit the notary office each time they needed the services of
the local notaries. Although, before this time, 99% of Estonian public services had been digitized for years, the
complexities, sensitivity, and risks associated with notarial acts excluded them from this narrative. Notarial
services just had to be done in person at local notary offices.
There are no limits to the type of notarial services that can be done remotely. People can do everything
remotely except marriage or divorce. For that, Estonians just have to see the notary face-to-face in the same
room. But anything else, the clients can just be at their home or wherever else they are and do all that needs to
be done. The types of deeds including but not limited to: (1) carrying out transactions with shares of a private
limited company, (2) authenticating powers of attorney, (4) applications related to succession, (5) deletion and
transfer of real rights, (6) commercial pledges(Chamber, 2020) [10].
3.2.2 Data Privacy and Protection Assured
Data privacy and protection remains a recurrent issue and burning topic within the tech sphere. With
the sensitivity of the data and information exchanged between notaries and their clients, data security and
privacy were group members or team members significant for the Chamber of Notaries. Nobody should see or
hear what the notaries and clients are talking about. This is why The Estonian Chamber of Notaries developed
the platform and server. They are not using third-party services, so all communication, including video and
audio transmission, is going through their server(Rigi, 2020) [11]. The digital ID and signing system is also a
platform they did not develop themselves. But since this belongs to the state, all state agencies can make use of
it.
They are minimizing the occurrence of potential breaches by hosting their own system and using their
own video conference platform. They used an open-source code that Andmevara modified for them, but the
server is hosted on the Ministry of Justice‟s server(Blessing, 2021) [12].So, to use the e-notary service, every
client connects to the server in the Ministry of Justice – no other connection is made. As of yet, they do not
know of vulnerabilities related to the e-service. And since they are not relying on third-party platforms, they
would continue our remote notarial authentications even when Zoom, Skype, Facebook, or some other platform
is down.
3.3 The improvements of the Platform
The e-notary service has improved in diverse ways since the initial pilot was first launched. This is
partially due to the impact of the pandemic and the way it has disrupted technological innovations. Three years
ago, notaries did not know what people wanted from the video conference, but since COVID-19 hit, notaries
4. American Journal of Humanities and Social Sciences Research (AJHSSR) 2022
A J H S S R J o u r n a l P a g e | 138
have gotten to see how the likes of Zoom and Skype have improved, and they have incorporated similar
improvements into our system. Then they added a chatbox, zooming/pausing/recording features, and other
helpful functionalities. Right now, they get feedback from the users, listen to the feedback and discuss that
internally. It is a public service, so usability and security are important to them. And of course, our reputation
needs to be kept intact as well. This is why notaries always strive to improve the service.
The biggest upgrade to the e-notary system went live at the beginning of September this year. This
upgrade gives room for a hybrid notarial transaction, whereby some of the clients are on seat in-person with the
notary while others are connected remotely. Before now, they could only carry out notarial acts offline. Every
member of a group or team had to be at the notary office in person with the others. Now people can have a big
hybrid transaction.
IV. CONCLUSION
Based on the description and analysis above, the author conclude that in Indonesia, the Law on
Notary Positions does not yet recognize virtual meetings but requires the making of a notary deed by means of
the parties dealing directly with the notary; while Estonia has previously implemented a rule that the making of
a deed can be done using a two-way audiovisual communication facility for the prevention of COVID-19.
In connection with the condition of the COVID-19 pandemic, there is a need for urgency to add
changes to the Law on Notary Positions, one of which is regarding the expansion of the meaning of
"confronting". With advances in technology, the phrase "appear" can be interpreted as a Notary can
deal virtually through a unique application made by the Government to read and sign the deed before the
parties, in which the application is designed with technological advances, namely being able to find out when
the deed was read, and the time the deed was signed and can find out the location of the deed signing.
Thus, Indonesia needs to have supporting regulations on the Notary Position Law, which
accommodates notaries to carry out their positions in times of emergency such as the current COVID-19
condition. The changes and policy in Estonia can be determined as inspirations so that Indonesia can be
developed in terms of notary position in making deeds during the COVID-19 pandemic. Its policy certainly
cannot be directly implemented in Indonesia, however it can to be adjusted to other regulations and other
aspects that Indonesia has.
Although the measures can be a difficult process, E-notary may speed up the modernization of the role
of the notary and the witness in making last wills, adjusting these roles to the standards of the 21st century.
Solutions introducing audio-video technology as an alternative for physical presence are more favorable than the
conventional systems. Introducing remote authentication and remote witnessing leaves intact the existing deeds
types of the particular jurisdiction as they are, while at the same time preserving legal certainty by anchoring
these possibilities in legislation. Moreover, introducing audio-video technology in making notarial deeds seems
a logical step forward in Indonesia, given the possibilities at hand.
REFERENCES
[1] European Justice, Official Website of European Union, Sources of Law, https://e-
justice.europa.eu/6/EN/national_legislation?ESTONIA&member=1
[2] Notary Positions Law Number 2 of 2014 concerning Amendments to Law Number 30 of 2004
concerning Position of Notary Profession, Article 16 paragraph (1) letter (m).
[3] Information and Electronic Transactions Law Number Number 11 of 2008, Article 5 Paragraph (4).
[4] Makarim, E. (2011). Modernisasi Hukum Notaris Masa Depan: Kajian Hukum TerhadapKemungkinan
Cyber Notary Di Indonesia. Jurnal Hukum & Pembangunan.
https://doi.org/10.21143/jhp.vol41.no3.287
[5] Budianto, A., Sihombing, J., Krissanti, V. D., Jamin, S., Pramono, R., &Purwanto, A. (2020).
Obligation to prove appearer document authenticity as deelneming claim exception. Journal of
Advanced Research in Law and Economics. https://doi.org/10.14505/jarle.v11.3(49).08
[6] Estonian Notarization Act of 2001, Passed November 11, 2001, Entered in force February 1, 2002.
[7] Estonian Notarization Act of 2001, § 2 Number 3
[8] Estonian Notarization Act of 2001, § 1 Number 31
[9] Chamber of Notaries Official Website “NotariteKoda”, Remote Authentication and Facial Recognition,
accessed through https://www.notar.ee/en/teabekeskus/kaugtoestus
[10] The Estonian Chamber of Notaries Official Website, accessed through
https://www.notar.ee/en/teabekeskus/apostille
[11] Rigi Infosusteemi, https://tara.ria.ee
[12] Blessing Oyetunde, Estonia‟s fully remote e-notary service – 1st state e-service of its kind in Europe,
accessed through https://e-estonia.com/estonias-fully-remote-e-notary-service-1st-state-e-service-of-its-
kind-in-europe/