Analysis of Information Security in Data Leaks in The PeduliLindungi Application

 (*)Sundari Retno Andani Mail (AMIK Tunas Bangsa, Pematangsiantar, Indonesia)

(*) Corresponding Author

Submitted: November 7, 2021; Published: November 30, 2021

Abstract

In the midst of the COVID-19 pandemic, the Indonesian government is trying to control the spread of COVID-19 in various ways, one of which is through the use of technology. The Indonesian government has built and developed a surveillance application called PeduliLindungi to help the government with tracing and tracking to stop the spread of COVID-19. This application requires personal data and utilizes the bluetooth network in location tracking for tracing contact history with COVID-19 sufferers. The search results will make it easier for the government to identify people who are exposed and need further treatment to stop the spread of COVID-19. But besides that, there are many public concerns about the leakage of personal data from the PeduliLindung application. This research focuses on the leakage of personal data and misuse of personal data from the PeduliLindung application from an information security perspective. This study is a study that aims to analyze data security in the PeduliLindung application

Keywords


Data Leak; Data Misuse; Information Security

Full Text:

PDF


Article Metrics

Abstract view : 954 times
PDF - 409 times

References

UNICEF, “Apakah novel coronavirus?” https://www.unicef.org/indonesia/id/coronavirus/tanya-jawab-seputar-coronavirus?gclid=EAIaIQobChMItdSvzLP88wIVFh4rCh3HegCtEAAYASAAEgLLf_D_BwE#apaitunovelcoronavirus.

N. Nurhidayati, S. Sugiyah, and K. Yuliantari, “Pengaturan Perlindungan Data Pribadi Dalam Penggunaan Aplikasi Pedulilindungi,” Widya Cipta J. Sekr. dan Manaj., vol. 5, no. 1, pp. 39–45, 2021, doi: 10.31294/widyacipta.v5i1.9447.

P. Robin and G. Priscila, “Pengaisan Big Data & Dunia Kesehatan: ‘Analisis Penyalahgunaan Big Data Dalam Usaha Pemerintah Indonesia Di Masa Pandemi Covid-19,’” J. Public Corner Fisip Univ. Wiraraja, vol. 16, pp. 38–48, 2021.

S. I. N. Suwandi, X. Wahyuadi, and A. Situmorang, “Analisis privasi data pengguna contact tracing application pengendalian COVID-19 di Indonesia berdasarkan PERPRES RI No . 95 tahun 2018 tentang sistem pemerintahan berbasis elektronik Analysis of the privacy of user data for the application of contact tra,” vol. 11, no. 1, pp. 46–58, 2021.

D. Olivia, S. De. Rosadi, and R. R. Permata, “Perlindungan Data Pribadi Dalam Penyelenggaraan Aplikasi Surveilans Kesehatan PeduliLindungi dan COVIDSAFE Di Indonesia dan Australia,” DATIN law J., no. September, 2020.

H. Wijayanto, D. Hariyadi, and A. H. Muhammad, “Analisis Penyalahgunaan Data Pribadi Dalam Aplikasi Fintech Ilegal Dengan Metode Hibrid,” no. 1, pp. 1–10, 2020.

T. A. Raila, S. D. Rosadi, and R. R. Permata, “Perlindungan Data Privasi Di Indonesia Dan Singapura Terkait Penerapan Digital Contact Tracing Sebagai Upaya Pencegahan Covid-19 Serta Tanggung Jawabnya,” vol. 2, pp. 1–16, 2020.

A. Kusumawardhani, “Ini 5 Masalah Keamanan di Aplikasi PeduliLindungi.” https://teknologi.bisnis.com/read/20210911/84/1441024/ini-5-masalah-keamanan-di-aplikasi-pedulilindungi/3.

PeduliLindungi, “Kebijakan Kerahasiaan.” https://www.pedulilindungi.id/kebijakan-privasi-data.

R. G. Lubabah, “BSSN Jamin Keamanan Sistem Aplikasi PeduliLindungi.” https://www.merdeka.com/peristiwa/bssn-jamin-keamanan-sistem-aplikasi-pedulilindungi.html.

Iskandar, “Pemerintah Bentuk Tim Khusus untuk Pantau Keamanan Data PeduliLindungi.” https://www.liputan6.com/tekno/read/4653922/pemerintah-bentuk-tim-khusus-untuk-pantau-keamanan-data-pedulilindungi.

A. Rahman, “Aplikasi PeduliLindungi Bisa Tak Berguna bagi User.” https://cyberthreat.id/read/6233/Aplikasi-PeduliLindungi-Bisa-Tak-Berguna-bagi-User.

Cindy, “Kumpulan Kasus Kebocoran Data Pedulilindungi, Ini Penjelasan Kemenkes.” https://www.medcom.id/nasional/peristiwa/dN64ejak-kumpulan-kasus-kebocoran-data-pedulilindungi-ini-penjelasan-kemenkes.

R. Klar and D. Lanzerath, “The ethics of COVID-19 tracking apps – challenges and voluntariness,” Res. Ethics, vol. 16, no. 3–4, pp. 1–9, 2020, doi: 10.1177/1747016120943622.

H. Mukhtar, Kriptografi Untuk Kemanan Data, 1st ed. Yogyakarta: Deepublish.

Paryati, “Keamanan Sistem Informasi,” Semin. Nas. Inform. 2008 (semnasIF 2008) UPN “Veteran” Yogyakarta, 24 Mei 2008, vol. 2008, no. semnasIF, pp. 379–386, 2008.

M. K. M. Nasution, “Kebocoran Data,” in Diktat Perkuliahan Advanced Information Security, 2021.

Acer Indonesia, “Kebocoran Data (Data Leakage), Kenali Penyebab dan Dampaknya,” 2021. https://commercial.acerid.com/support/articles/kebocoran-data-data-leakage-kenali-penyebab-dan-dampaknya.

Phintraco Group, “Kasus Kebocoran Data Kerap Terjadi, Bagaimana Cara Mengatasinya?” https://phintraco.com/kasus-kebocoran-data/.

Juanda, “ITSEC: Pentingnya Keamanan Informasi Cegah Pelanggaran Data,” 2021. https://itechmagz.id/itsec-pentingnya-keamanan-informasi-cegah-pelanggaran-data/.

L. Lessig, Code Version 2.0. New York: Basic Books Publishing, 2006.

D. D. F. Putri and M. H. Fahrozi, “Upaya Pencegahan Kebocoran Data Konsumen Melalui Pengesahan Ruu Perlindungan Data Pribadi ( Studi Kasus E-Commerce Bhinneka . Com ) The Prevention of Consumer Data Leakage Through Legalization of The Personal Data Protection Bill,” pp. 978–979, 2020.

Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Analysis of Information Security in Data Leaks in The PeduliLindungi Application

Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 Sundari Retno Andani

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.


The IJICS (International Journal of Informatics and Computer Science)
Published by STMIK Budi Darma.
Jl. Sisingamangaraja No.338 Simpang Limun, Medan, North Sumatera
Email: ijics.stmikbudidarma@gmail.com

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.