{"id":345,"date":"2026-02-03T12:41:17","date_gmt":"2026-02-03T12:41:17","guid":{"rendered":"https:\/\/binus.ac.id\/humanitarian-ai\/?p=345"},"modified":"2026-02-04T15:52:31","modified_gmt":"2026-02-04T15:52:31","slug":"introduction-to-cyber-law","status":"publish","type":"post","link":"https:\/\/binus.ac.id\/humanitarian-ai\/blog\/2026\/02\/03\/introduction-to-cyber-law\/","title":{"rendered":"Introduction to Cyber Law and Data Protection"},"content":{"rendered":"<h1 style=\"text-align: center\" data-start=\"326\" data-end=\"342\"><span style=\"font-size: 18pt\">Training Syllabus<\/span><\/h1>\n<h4 data-start=\"1783\" data-end=\"1799\">\ud83d\udd58 Duration: <strong>1 full day<\/strong> (08:00 AM \u2013 04:00 PM GMT+7)<\/h4>\n<h4 data-start=\"1845\" data-end=\"1873\">\ud83d\udc65 Minimum Participants: <strong data-start=\"1874\" data-end=\"1886\">5 people<\/strong><\/h4>\n<h4 data-start=\"1888\" data-end=\"1899\">\ud83d\udcbc Fee: <strong data-start=\"1900\" data-end=\"1932\">Based on agreement and venue<\/strong><\/h4>\n<hr class=\"\" data-start=\"1934\" data-end=\"1937\" \/>\n<h3 class=\"\" data-start=\"1939\" data-end=\"1967\">\ud83d\udccb <strong data-start=\"1946\" data-end=\"1967\">Training Overview<\/strong><\/h3>\n<pre id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" role=\"text\" data-placeholder=\"Translation\" data-ved=\"2ahUKEwjrz66qzNyQAxVgTGwGHbaxAKwQ3ewLegQIChAV\" aria-label=\"Translated text: This Python Programming for Deep Learning training is designed for participants who already understand the basics of Python and want to delve deeper into the world of artificial intelligence (AI), specifically deep learning. Participants will learn how Python is used to build, train, and evaluate neural network models using modern libraries like TensorFlow and Keras. This training focuses on hands-on coding and real-world case studies, enabling participants to understand the deep learning workflow, from data preprocessing and model architecture to training and evaluation.\">Cyber law, as a field of legal study concerning the utilization of information and communication technology, has become an integral and inseparable part of contemporary business practices. This training is essential for business actors, legal practitioners, as well as individuals with an interest in law and technology. Fundamental materials are provided as an initial step toward understanding the regulatory framework of cyber law from the perspective of Indonesian cyber law. <a href=\"https:\/\/binus.ac.id\/humanitarian-ai\/wp-content\/uploads\/2026\/02\/Pengantar-Hukum-Siber.pdf\">Download Syllabus<\/a>.<\/pre>\n<hr class=\"\" data-start=\"2415\" data-end=\"2418\" \/>\n<h3 class=\"\" data-start=\"2420\" data-end=\"2445\">\ud83d\udcda <strong data-start=\"2427\" data-end=\"2445\">Topics Covered<\/strong><\/h3>\n<p><strong>Session 1 \u2013 Introduction to Cyber Law<\/strong><\/p>\n<ul data-start=\"604\" data-end=\"813\">\n<li data-start=\"604\" data-end=\"638\">\n<p data-start=\"606\" data-end=\"638\">Concept and scope of Cyber Law and introduction of Indonesian Cyber Law.<\/p>\n<\/li>\n<li data-start=\"639\" data-end=\"707\">\n<p data-start=\"641\" data-end=\"707\">Development of information technology and its legal implications<\/p>\n<\/li>\n<li data-start=\"708\" data-end=\"762\">\n<p data-start=\"710\" data-end=\"762\">The role of cyber law in modern business practices<\/p>\n<\/li>\n<li data-start=\"763\" data-end=\"813\">\n<p data-start=\"765\" data-end=\"813\">Overview of the Indonesian cyber law framework<\/p>\n<\/li>\n<\/ul>\n<p><strong>Session 2 \u2013 Electronics Transactions and\u00a0 Signatures<\/strong><\/p>\n<ul>\n<li data-start=\"1202\" data-end=\"1257\">\n<p data-start=\"1204\" data-end=\"1257\">Legal basis of electronic transactions in Indonesia<\/p>\n<\/li>\n<li data-start=\"1258\" data-end=\"1312\">\n<p data-start=\"1260\" data-end=\"1312\">Types and characteristics of electronic signatures<\/p>\n<\/li>\n<li data-start=\"1313\" data-end=\"1378\">\n<p data-start=\"1315\" data-end=\"1378\">Legal validity and evidentiary value of electronic signatures<\/p>\n<\/li>\n<li data-start=\"1379\" data-end=\"1444\">\n<p data-start=\"1381\" data-end=\"1444\">Implementation of electronic signatures in business practices<\/p>\n<\/li>\n<\/ul>\n<p><strong>Session 3 \u2013 Electronic Evidence in Legal Proceedings<\/strong><\/p>\n<ul>\n<li data-start=\"2165\" data-end=\"2212\">\n<p data-start=\"2167\" data-end=\"2212\">Definition and types of electronic evidence.<\/p>\n<\/li>\n<li data-start=\"2213\" data-end=\"2272\">\n<p data-start=\"2215\" data-end=\"2272\">Legal standing of electronic evidence in procedural law.<\/p>\n<\/li>\n<li data-start=\"2273\" data-end=\"2327\">\n<p data-start=\"2275\" data-end=\"2327\">Collection and preservation of electronic evidence.<\/p>\n<\/li>\n<li data-start=\"2328\" data-end=\"2391\">\n<p data-start=\"2330\" data-end=\"2391\">Challenges in electronic evidence examination before courts.<\/p>\n<\/li>\n<li data-start=\"2328\" data-end=\"2391\">Case study and discussion.<\/li>\n<\/ul>\n<p><strong>Session 4 \u2013 Personal Data Protection<\/strong><\/p>\n<ul>\n<li data-start=\"2764\" data-end=\"2818\">\n<p data-start=\"2766\" data-end=\"2818\">Concept and principles of personal data protection<\/p>\n<\/li>\n<li data-start=\"2819\" data-end=\"2882\">\n<p data-start=\"2821\" data-end=\"2882\">Rights of data subjects and obligations of data controllers<\/p>\n<\/li>\n<li data-start=\"2883\" data-end=\"2942\">\n<p data-start=\"2885\" data-end=\"2942\">Overview of the Indonesian Personal Data Protection Law<\/p>\n<\/li>\n<li data-start=\"2943\" data-end=\"2999\">\n<p data-start=\"2945\" data-end=\"2999\">Legal risks of personal data breaches for businesses.<\/p>\n<\/li>\n<li data-start=\"2943\" data-end=\"2999\">Case study and discussion<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<hr class=\"\" data-start=\"2710\" data-end=\"2713\" \/>\n<h3 class=\"\" data-start=\"2715\" data-end=\"2743\">\ud83c\udfaf <strong data-start=\"2722\" data-end=\"2743\">Learning Outcomes<\/strong><\/h3>\n<p class=\"\" data-start=\"2744\" data-end=\"2791\">By the end of this training, participants will be able to:<\/p>\n<ul data-start=\"2792\" data-end=\"3002\">\n<li class=\"\" data-start=\"2792\" data-end=\"2861\">Understadning about Indonesian Cyber Law.<\/li>\n<li class=\"\" data-start=\"2792\" data-end=\"2861\">Electronic Signatures.<\/li>\n<li class=\"\" data-start=\"2792\" data-end=\"2861\">Electronic Evidence.<\/li>\n<li class=\"\" data-start=\"2792\" data-end=\"2861\">An Introduction to Personal Data Protection.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3 class=\"\" data-start=\"1518\" data-end=\"1531\">\ud83d\udcde Contact:<\/h3>\n<ul data-start=\"1532\" data-end=\"1679\">\n<li class=\"\" data-start=\"1532\" data-end=\"1597\">\n<p class=\"\" data-start=\"1534\" data-end=\"1597\">\ud83d\udce7 Email: <a class=\"cursor-pointer\" rel=\"noopener\" data-start=\"1544\" data-end=\"1595\">wbudiharto@binus.edu<\/a><\/p>\n<\/li>\n<li class=\"\" data-start=\"1598\" data-end=\"1639\">\n<p class=\"\" data-start=\"1600\" data-end=\"1639\">\ud83d\udcf1 Bpk. Prof. Widodo (WA): +62 856 9887 384<\/p>\n<\/li>\n<li class=\"\" data-start=\"1640\" data-end=\"1679\">\n<p class=\"\" data-start=\"1642\" data-end=\"1679\">\ud83d\udcf1 Ibu Dr. Emny (WA): +62 813 8741 3863<\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<hr \/>\n<h2 class=\"\" style=\"text-align: center\" data-start=\"162\" data-end=\"191\"><strong data-start=\"168\" data-end=\"189\">Silabus Pelatihan<\/strong><\/h2>\n<h3 class=\"\" style=\"text-align: center\" data-start=\"192\" data-end=\"237\">Pengenalan Cyber Law di Indonesia<\/h3>\n<h4 data-start=\"266\" data-end=\"280\">\ud83d\udd58 Durasi: 1<strong>\u00a0hari fullday<\/strong> (08:00 &#8211; 16:00 WIB)<\/h4>\n<h4 data-start=\"321\" data-end=\"351\">\ud83d\udc65 Jumlah Peserta Minimum: <strong data-start=\"352\" data-end=\"363\">5 orang<\/strong><\/h4>\n<h4 data-start=\"365\" data-end=\"378\">\ud83d\udcbc Biaya: <strong data-start=\"379\" data-end=\"429\">Sesuai dengan kesepakatan dan lokasi pelatihan<\/strong><\/h4>\n<hr class=\"\" data-start=\"431\" data-end=\"434\" \/>\n<h3 class=\"\" data-start=\"436\" data-end=\"466\">\ud83d\udccb <strong data-start=\"443\" data-end=\"466\">Deskripsi Pelatihan<\/strong><\/h3>\n<p>Hukum siber sebagai kajian hukum dalam pemanfaatan teknologi informasi dan komunikasi menjadi bagian yang tidak dapat dilepaskan dari praktik bisnis saat ini. Pelatihan ini perlu dikuasi oleh para pelaku usaha, praktisi maupun peminat hukum dan teknologi. Materi-materi fundamental diberikan sebagai langkah awal memahami pengaturan mengenai hukum siber dalam perspektif hukum siber Indonesia.<\/p>\n<hr class=\"\" data-start=\"906\" data-end=\"909\" \/>\n<h3 class=\"\" data-start=\"911\" data-end=\"949\">\ud83d\udcda <strong data-start=\"918\" data-end=\"949\">Materi yang Akan Dipelajari<\/strong><\/h3>\n<p><strong>Sesi 1 \u2013 Pengenalan Hukum Siber<\/strong><\/p>\n<ul data-start=\"604\" data-end=\"813\">\n<li data-start=\"604\" data-end=\"638\">\n<p data-start=\"606\" data-end=\"638\">Concept and scope of Cyber Law and introduction of Indonesian Cyber Law.<\/p>\n<\/li>\n<li data-start=\"639\" data-end=\"707\">\n<p data-start=\"641\" data-end=\"707\">Development of information technology and its legal implications<\/p>\n<\/li>\n<li data-start=\"708\" data-end=\"762\">\n<p data-start=\"710\" data-end=\"762\">The role of cyber law in modern business practices<\/p>\n<\/li>\n<li data-start=\"763\" data-end=\"813\">\n<p data-start=\"765\" data-end=\"813\">Overview of the Indonesian cyber law framework<\/p>\n<\/li>\n<\/ul>\n<p><strong>Sesi 2 \u2013 Electronics Transactions dan Electronic Signatures<\/strong><\/p>\n<ul>\n<li data-start=\"969\" data-end=\"1018\">\n<p data-start=\"971\" data-end=\"1018\">Dasar hukum transaksi elektronik di Indonesia<\/p>\n<\/li>\n<li data-start=\"1019\" data-end=\"1070\">\n<p data-start=\"1021\" data-end=\"1070\">Jenis dan karakteristik tanda tangan elektronik<\/p>\n<\/li>\n<li data-start=\"1071\" data-end=\"1127\">\n<p data-start=\"1073\" data-end=\"1127\">Kekuatan hukum dan keabsahan tanda tangan elektronik<\/p>\n<\/li>\n<li data-start=\"1128\" data-end=\"1186\">\n<p data-start=\"1130\" data-end=\"1186\">Penerapan tanda tangan elektronik dalam praktik bisnis<\/p>\n<\/li>\n<\/ul>\n<p><strong>Sesi 3 \u2013 Electronic Evidence in Legal Proceedings<\/strong><\/p>\n<ul>\n<li data-start=\"2165\" data-end=\"2212\">\n<p data-start=\"2167\" data-end=\"2212\">Definition and types of electronic evidence<\/p>\n<\/li>\n<li data-start=\"2213\" data-end=\"2272\">\n<p data-start=\"2215\" data-end=\"2272\">Legal standing of electronic evidence in procedural law<\/p>\n<\/li>\n<li data-start=\"2273\" data-end=\"2327\">\n<p data-start=\"2275\" data-end=\"2327\">Collection and preservation of electronic evidence<\/p>\n<\/li>\n<li data-start=\"2328\" data-end=\"2391\">\n<p data-start=\"2330\" data-end=\"2391\">Challenges in electronic evidence examination before courts<\/p>\n<\/li>\n<li data-start=\"2328\" data-end=\"2391\">Case study and discussion<\/li>\n<\/ul>\n<p><strong>Sesi 4 \u2013 Perlindungan Data Pribadi<\/strong><\/p>\n<ul>\n<li data-start=\"2764\" data-end=\"2818\">\n<p data-start=\"2766\" data-end=\"2818\">Concept and principles of personal data protection<\/p>\n<\/li>\n<li data-start=\"2819\" data-end=\"2882\">\n<p data-start=\"2821\" data-end=\"2882\">Rights of data subjects and obligations of data controllers<\/p>\n<\/li>\n<li data-start=\"2883\" data-end=\"2942\">\n<p data-start=\"2885\" data-end=\"2942\">Overview of the Indonesian Personal Data Protection Law<\/p>\n<\/li>\n<li data-start=\"2943\" data-end=\"2999\">\n<p data-start=\"2945\" data-end=\"2999\">Legal risks of personal data breaches for businesses.<\/p>\n<\/li>\n<li data-start=\"2943\" data-end=\"2999\">Case study dan diskusi.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<hr class=\"\" data-start=\"1207\" data-end=\"1210\" \/>\n<h3 class=\"\" data-start=\"1212\" data-end=\"1239\">\ud83c\udfaf <strong data-start=\"1219\" data-end=\"1239\">Tujuan Pelatihan<\/strong><\/h3>\n<p>Setelah mengikuti pelatihan ini, peserta diharapkan mampu menjelaskan:<\/p>\n<ul>\n<li>Hukum siber Indonesia.<\/li>\n<li>Tandatangan elektronik.<\/li>\n<li>Alat bukti elektronik.<\/li>\n<li>Pengantar Pelindungan Data Pribadi.<\/li>\n<\/ul>\n<hr class=\"\" data-start=\"1513\" data-end=\"1516\" \/>\n<h3 class=\"\" data-start=\"1518\" data-end=\"1531\">\ud83d\udcde Kontak<\/h3>\n<ul data-start=\"1532\" data-end=\"1679\">\n<li class=\"\" data-start=\"1532\" data-end=\"1597\">\n<p class=\"\" data-start=\"1534\" data-end=\"1597\">\ud83d\udce7 Email: <a class=\"cursor-pointer\" rel=\"noopener\" data-start=\"1544\" data-end=\"1595\">wbudiharto@binus.edu<\/a><\/p>\n<\/li>\n<li class=\"\" data-start=\"1598\" data-end=\"1639\">\n<p class=\"\" data-start=\"1600\" data-end=\"1639\">\ud83d\udcf1 Bpk. Prof. Widodo (WA): +62 856 9887 384<\/p>\n<\/li>\n<li class=\"\" data-start=\"1640\" data-end=\"1679\">\n<p class=\"\" data-start=\"1642\" data-end=\"1679\">\ud83d\udcf1 Ibu Dr. Emny (WA): +62 813 8741 3863<\/p>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Training Syllabus \ud83d\udd58 Duration: 1 full day (08:00 AM \u2013 04:00 PM GMT+7) \ud83d\udc65 Minimum Participants: 5 people \ud83d\udcbc Fee: Based on agreement and venue \ud83d\udccb Training Overview Cyber law, as a field of legal study concerning the utilization of information and communication technology, has become an integral and inseparable part of contemporary business practices. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":421,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,11],"tags":[],"class_list":["post-345","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-syllabus"],"_links":{"self":[{"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/posts\/345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/comments?post=345"}],"version-history":[{"count":8,"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/posts\/345\/revisions"}],"predecessor-version":[{"id":399,"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/posts\/345\/revisions\/399"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/media\/421"}],"wp:attachment":[{"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/media?parent=345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/categories?post=345"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/binus.ac.id\/humanitarian-ai\/wp-json\/wp\/v2\/tags?post=345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}