Criminal Liability of Perpetrators who Intentionally and Unauthorized Alteration of Electronic Documents Based on the Electronic Information and Transactions Law (Study of Central Jakarta District Court Decision Number 724/Pid.Sus/2023/PN Jkt.Pst)
Keywords:
Accountability, changing electronic documents, intentionally, without authorization.Abstract
An electronic document is electronic information created, forwarded, sent, received, or stored in digital, electromagnetic, optical, or similar format, which can be viewed, displayed, and/or heard through a computer or electronic system. This document can be in the form of text, sound, images, or various other formats that convey meaning. The crime of altering electronic documents that causes harm to another person can be categorized as a cybercrime, particularly related to the manipulation of electronic information. The research method used is the normative juridical method, namely research that prioritizes library data, namely research on secondary data. The secondary data can be in the form of primary, secondary, or tertiary legal materials. Based on the research results, the author concludes that criminal liability for perpetrators of criminal acts intentionally and without authority to change electronic documents belonging to others that result in harm to others, can be enshrined by the Electronic Information and Transactions Law (UU ITE). The ITE Law regulates criminal sanctions for various actions related to electronic data manipulation. The relevant articles in the ITE Law related to illegal alteration of electronic documents include Article 27, Article 30, Article 32, Article 35, and Article 65. These articles regulate: a) Article 27: Prohibition on distributing, transmitting, and/or making accessible electronic information that contains content that violates morality, gambling, insults, or defamation; b) Article 30: Prohibition on unauthorized access to other people's computers or electronic systems; c) Article 35: Prohibition on falsifying electronic data; d) Article 65: Prohibition on using personal data that does not belong to them. Meanwhile, the sanctions, the perpetrator can be subject to criminal sanctions in the form of imprisonment and/or a fine, the amount of which varies depending on the article violated and the level of loss caused.
Downloads
References
Arief, Barda Nawawi. Mayantara Crimes. Jakarta: Raja Grafindo Persada, 2007, p. 19
Delvyan Putri Surya Ningrum, Jamiatur Robekha, Legal Analysis in Cyber Crime Cases Against Internet Banking in Indonesia, Journal of Education, Social and Humanities , Vol.2, No.4, June 2023, P. 765
https://www.google.com/search?client=firefox-be&q=dokumen+elektronik/diakses-1-Juli-2025
Ina Heliany, Wonderful Digital Tourism Indonesia and the Role of the Industrial Revolution in Facing the Era of the Digital Economy 5.0, Destinesia Journal of Hospitality and Tourism, Vol. 1, No. 1, September 2019, p. 22
Article 263 paragraphs (1) and (2) Criminal Code
Article 51 paragraph (1) in conjunction with Article 35 of Law Number 19 of 2009 2016 concerning Amendments to Law Number 11 of 2008 concerning Information and Electronic Transactions
Central Jakarta District Court Decision Number 724/Pid.Sus/2023/PN Jkt.Pst
Soerjono, Soekanto, Introduction to Legal Research , Jakarta: UI Press, 2010, p. 81
Sry Wahyuni, Elwidarifa Marwenny, Legal Review of the Criminal Act of Threats in the Electronic Information and Transactions Law (Case Study of the Koto Baru District Court), Uir Law Review, Vol 4 Issue 2, 2020, pp. 15-24











