Tuesday, 24 July 2018

Tugas Pertemuan 12

Rangkuman Tentang Buku Ajar Etika Profesi dan Pengertian Etika dan Profesi Hukum

Assalamualaikum.wr.wb

Profesi
Istilah profesi telah dimengerti oleh banyak orang bahwa suatu hal yang berkaitan dengan
bidang yang sangat dipengaruhi oleh pendidikan dan keahlian, sehingga banyak orang yang
bekerja tetap sesuai. Tetapi dengan keahlian saja yang diperoleh dari pendidikan kejuruan,
juga belum cukup disebut profesi. Tetapi perlu penguasaan teori sistematis yang mendasari
praktek pelaksanaan, dan hubungan antara teori dan penerapan dalam praktek
Yang harus kita ingat dan fahami betul bahwa “PEKERJAAN / PROFESI” dan
“PROFESIONAL” terdapat beberapa perbedaan :

PROFESI :
- Mengandalkan suatu keterampilan atau keahlian khusus.
- Dilaksanakan sebagai suatu pekerjaan atau kegiatan utama (purna waktu).
- Dilaksanakan sebagai sumber utama nafkah hidup.
- Dilaksanakan dengan keterlibatan pribadi yang mendalam

PROFESIONAL :
- Orang yang tahu akan keahlian dan keterampilannya.
- Meluangkan seluruh waktunya untuk pekerjaan atau kegiatannya itu.
- Hidup dari situ.
- Bangga akan pekerjaannya.

CIRI-CIRI PROFESI

Secara umum ada beberapa ciri atau sifat yang selalu melekat pada profesi, yaitu :

1. Adanya pengetahuan khusus, yang biasanya keahlian dan keterampilan ini dimiliki berkat
    pendidikan, pelatihan dan pengalaman yang bertahun-tahun.
2. Adanya kaidah dan standar moral yang sangat tinggi. Hal ini biasanya setiap pelaku
    profesi mendasarkan kegiatannya pada kode etik profesi.
3. Mengabdi pada kepentingan masyarakat, artinya setiap pelaksana profesi harus
    meletakkan kepentingan pribadi di bawah kepentingan masyarakat.
4. Ada izin khusus untuk menjalankan suatu profesi. Setiap profesi akan selalu berkaitan
    dengan kepentingan masyarakat, dimana nilai-nilai kemanusiaan berupa keselamatan,
    keamanan, kelangsungan hidup dan sebagainya, maka untuk menjalankan suatu profesi
    harus terlebih dahulu ada izin khusus.
5. Kaum profesional biasanya menjadi anggota dari suatu profesi.

PRINSIP-PRINSIP ETIKA PROFESI :

1. Tanggung jawab
    - Terhadap pelaksanaan pekerjaan itu dan terhadap hasilnya.
    - Terhadap dampak dari profesi itu untuk kehidupan orang lain atau masyarakat pada
       umumnya.
2. Keadilan. Prinsip ini menuntut kita untuk memberikan kepada siapa saja apa yang
      menjadi haknya.
3. Otonomi. Prinsip ini menuntut agar setiap kaum profesional memiliki dan di beri
      kebebasan dalam menjalankan profesinya.

 SYARAT-SYARAT SUATU PROFESI :
- Melibatkan kegiatan intelektual.
- Menggeluti suatu batang tubuh ilmu yang khusus.
- Memerlukan persiapan profesional yang alam dan bukan sekedar latihan.
- Memerlukan latihan dalam jabatan yang berkesinambungan.
- Menjanjikan karir hidup dan keanggotaan yang permanen.
- Mementingkan layanan di atas keuntungan pribadi.
- Mempunyai organisasi profesional yang kuat dan terjalin erat.
- Menentukan baku standarnya sendiri, dalam hal ini adalah kode etik.

PERANAN ETIKA DALAM PROFESI :
· Nilai-nilai etika itu tidak hanya milik satu atau dua orang, atau segolongan orang saja,
tetapi milik setiap kelompok masyarakat, bahkan kelompok yang paling kecil yaitu
keluarga sampai pada suatu bangsa. Dengan nilai-nilai etika tersebut, suatu kelompok
diharapkan akan mempunyai tata nilai untuk mengatur kehidupan bersama.

· Salah satu golongan masyarakat yang mempunyai nilai-nilai yang menjadi landasan
dalam pergaulan baik dengan kelompok atau masyarakat umumnya maupun dengan
sesama anggotanya, yaitu masyarakat profesional. Golongan ini sering menjadi pusat
perhatian karena adanya tata nilai yang mengatur dan tertuang secara tertulis (yaitu kode
etik profesi) dan diharapkan menjadi pegangan para anggotanya.

· Sorotan masyarakat menjadi semakin tajam manakala perilaku-perilaku sebagian para
anggota profesi yang tidak didasarkan pada nilai-nilai pergaulan yang telah disepakati
bersama (tertuang dalam kode etik profesi), sehingga terjadi kemerosotan etik pada
masyarakat profesi tersebut. Sebagai contohnya adalah pada profesi hukum dikenal
adanya mafia peradilan, demikian juga pada profesi dokter dengan pendirian klinik super
spesialis di daerah mewah, sehingga masyarakat miskin tidak mungkin menjamahnya

KODE ETIK PROFESI
Kode; yaitu tanda-tanda atau simbol-simbol yang berupa kata-kata, tulisan atau benda yang
disepakati untuk maksud-maksud tertentu, misalnya untuk menjamin suatu berita, keputusan
atau suatu kesepakatan suatu organisasi. Kode juga dapat berarti kumpulan peraturan yang
sistematis.
Kode etik ; yaitu norma atau azas yang diterima oleh suatu kelompok tertentu sebagai
landasan tingkah laku sehari-hari di masyarakat maupun di tempat kerja

TUJUAN KODE ETIK PROFESI :
1. Untuk menjunjung tinggi martabat profesi.
2. Untuk menjaga dan memelihara kesejahteraan para anggota.
3. Untuk meningkatkan pengabdian para anggota profesi.
4. Untuk meningkatkan mutu profesi.
5. Untuk meningkatkan mutu organisasi profesi.
6. Meningkatkan layanan di atas keuntungan pribadi.
7. Mempunyai organisasi profesional yang kuat dan terjalin erat.
8. Menentukan baku standarnya sendiri.

Adapun fungsi dari kode etik profesi adalah :
1. Memberikan pedoman bagi setiap anggota profesi tentang prinsip profesionalitas yang
digariskan.
2. Sebagai sarana kontrol sosial bagi masyarakat atas profesi yang bersangkutan
3. Mencegah campur tangan pihak di luar organisasi profesi tentang hubungan etika dalam
keanggotaan profesi. Etika profesi sangatlah dibutuhkan dlam berbagai bidang.

Hukum merupakan instrumen eksternal sementara moral adalah instrumen internal yang menyangkut sikap pribadi, disiplin pribadi yang oleh karena itu etika disebut juga “disciplinary rules.”

Jadi ETIKA DESKRIPTIF, ialah etika yang berusaha meneropong secara kritis danrasional sikap dan prilaku manusia dan apa yang dikejar oleh manusia dalam hidup ini sebagaisesuatu yang bernilai. Etika deskriptif memberikan fakta sebagai dasar untuk mengambilkeputusan tentang prilaku atau sikap yang mau diambil.
Sedang ETIKA NORMATIF, yaitu etika yang berusaha menetapkan berbagai sikap dan pola prilaku ideal yang seharusnya dimiliki oleh manusia dalam hidup ini sebagai sesuatu yang bernilai. Etika normatif memberi penilaian sekaligus memberi norma sebagai dasar dan kerangkatindakan yang akan diputuskan.
Etika secara uumum dapat dibagi menjadi :

1.ETIKA UMUM, berbicara mengenai kondisi-kondisi dasar bagaimana manusia bertindaksecara etis,bagaimana manusia mengambil keputusan etis, teori-teori etika dan prinsip- prinsip moral dasar yang menjadi pegangan bagi manusia dalam bertindak serta tolak ukurdalam menilai baik atau buruknya suatu tindakan. Etika umum dapat di analogkan denganilmu pengetahuan, yang membahas mengenai pengertian umum dan teoriteori.

2.ETIKA KHUSUS, merupakan penerapan prinsip-prinsip moral dasar dalam bidangkehidupan yang khusus. Penerapan ini bisa berwujud : Bagaimana saya mengambilkeputusan dan bertindak dalam bidang kehidupan dan kegiatan khusus yang saya lakukan,yang didasari oleh cara, teori dan prinsip-prinsip moral dasar. Namun, penerapan itu dapat juga berwujud : Bagaimana saya menilai perilaku saya dan orang lain dalam bidang kegiatandan kehidupan khusus yang dilatarbelakangi oleh kondisi yang memungkinkan manusia bertindak etis : Cara bagaimana manusia mengambil suatu keputusan atau tidakan, dan teoriserta prinsip moral dasar yang ada dibaliknya.Sedang Etika Khusus dibagi lagi menjadi dua bagian yaitu :
a. Etika individual, yaitu menyangkut kewajiban dan sikap manusia terhadap dirinya sendiri. 
b. Etika sosial, yaitu berbicara mengenai kewajiban, sikap dan pola perilaku manusia sebagaianggota umat manusia.





Tugas Pertemuan 11

Internet Privacy and Freedom of Expression dan Privacy on the internet an integrated eu approach to on line data protection

Assalamualaikum.wr.wb



Global standards

Privacy finds direct and explicit protection under international human rights law. Article 12 of the UDHR states: No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.

The right was given formal legal protection in Article 17 of the ICCPR, which states:

(1) No one shall be subjected to arbitrary or unlawful interference with his privacy, family, home or correspondence, nor to unlawful attacks on his honour and reputation.

(2) Everyone has the right to the protection of the law against such interference or attacks. These two definitions are similar, albeit with some important differences. The UDHR only protects against arbitrary, but not unlawful, interferences with privacy. In practice this is likely to be of limited importance, since an unlawful interference will always qualify as arbitrary. As far as honour and reputation go, the ICCPR only protects against unlawful attacks, while the UDHR protects against all such attacks. This may be more significant in nature, although this remains untested in the jurisprudence.

The UN Human Rights Committee has made it clear in a General Comment on Article 17 that the right to privacy encompasses the right to protection “against all such interferences and attacks whether they emanate from State authorities or from natural or legal persons.The Committee’s General Comment provides little guidance, however, as to what either ‘arbitrary’ or ‘privacy’ mean. Regarding the former, the Committee stated that an interference that was provided by law could still be arbitrary, and that all such interferences would need to be “in accordance with the provisions, aims and objectives of the Covenant and should be, in any event, reasonable in the particular circumstances. This ultimately provides very little guidance as to what may be considered to be ‘arbitrary’, although it would at least rule out interferences with privacy that were established by laws which ran against the aims of the Covenant or which were not reasonable.

The General Comment also includes fairly expansive, if general, statements on data protection, stating that the gathering and holding of personal information, whether by public or private bodies, must be regulated, that individuals have a right to ascertain what information about them is held, and for what purposes, and by whom. The jurisprudence of the Committee in this area has also been sparse. In the case of Hulst v. the Netherlands, the Committee had to assess whether or not interception of the telephone calls by the author, who was a lawyer, which were used to convict him of a crime, represented an unwarranted invasion of his privacy. In deciding that there had been no interference, the Committee quoted the standards noted above in its General Comment, and held that the interference was authorised by law and was reasonable.

African and Inter-American System
There is no explicit protection for privacy in the African Charter on Human and Peoples’ Rights.135 Protections for privacy are also found in the American Convention on Human Rights (ACHR),136 at Article 11, and the European Convention on Human Rights (ECHR),at Article 8.

The relevant provisions of the ACHR state:

(1) No one may be the object of arbitrary or abusive interference with his private life, his family, his home, or his correspondence, or of unlawful attacks on his honor or reputation.

(2) Everyone has the right to the protection of the law against such interference or attacks.

These provisions are very similar to those found under the UDHR and ICCPR. There has been little direct jurisprudence on this issue before the Inter-American Court of Human Rights. An important recent case on privacy, decided in November 2011, is Fontevecchia & D’Amico v. Argentina.138 In that case, the Inter-American Court held that the publication of certain private information about Menem, the former President of Argentina, was not an invasion of his privacy. It gave as reasons that the information was already well known, it had not even been treated confidentially by Menem and there was considerable public interest in the information.

The Inter-American Court has dealt with privacy on a number of other occasions as well. In the case of Tristán Donoso v. Panama, the Court found a breach of the right to privacy when State officials disseminated a recording of a private telephone conversation, which had apparently been made by a private party, to church officials and members of the bar association.139 In the case of Escher et al. v. Brazil, the Court came to a number of important conclusions regarding privacy in the context of telephone surveillance. First, it held that while the burden proof of the facts of a human rights violation normally lay with the complainant, it was legitimate to draw reasonable conclusions where it was impossible for the complainant to prove these facts conclusively, due to secrecy on the part of the State.

Given the intrusive nature of telephone interception, the Court held: This measure must be based on a law that must be precise and indicate the corresponding clear and detailed rules, such as the circumstances in which this measure can be adopted, the persons authorised to request it, to order it and to carry it out, and the procedure to be followed. In this case, the rules had not been followed properly, and so the invasion of privacy did not meet the requirement of legality, as stipulated in the ACHR.142 The dissemination of some of the private material by State agents represented a further breach of the right to privacy. In terms of data protection, the Inter-American Commission has made it clear that it believes that a right of habeas data exists under the ACHR, which gives individuals the right to know what information the State and private actors have collected on them, to access that data and to modify, correct or remove it, as appropriate.The Inter- American Court has never directly addressed the issue of habeas data.

ECHR: an overview

Article 8 of the ECHR formulates the right in rather different terms that the ICCPR or ACHR, as follows:
(1) Everyone has the right to respect for his private and family life, his home and his correspondence.
(2) There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others.

The characterisation of the right here is more positive; a right to respect for one’s privacy rather than to be protected against interferences. Another difference is that the protection is restricted to interference by public authorities, although the European Court of Human Rights has not interpreted the provision in such a limited fashion (see below). Finally, the tandards for restrictions are set out in a much clearer form. Instead of vague terms such as ‘arbitrary’, ‘unlawful’ and ‘abusive’, we have a clear three-part test: a) in accordance with the law; b) necessary in a democratic society; and c) to protect one of the listed interests (national security, public order and so on). In terms of the scope of the notion of privacy, the European Court has identified a number of specific types of State actions that may breach the right, such as interception of private communications or telephone tapping, regardless of the content of the communication, allocation of rights over children, interference with sexual life, compulsory medical treatment and access to certain types of State-held information. The Court has refrained from proposing a generic definition of privacy, holding instead, as noted above, that this is not possible. The Court has, however, indicated a number of features of the right. In the case of Von Hannover v. Germany, for example, the Court held that privacy covers “aspects relating to personal identity, such as a person’s name, or a person’s picture” and “a person’s physical and psychological integrity”. Furthermore, the right is intended to “ensure the development, without outside interference, of the personality of each individual in his relations with other human beings. In Niemietz v. Germany, it held that “it would be too restrictive to limit the notion to an ‘inner circle’ in which the individual may live his own personal life as he chooses and to exclude therefrom entirely the outside world”. Instead, “private life must also comprise to a certain degree the right to establish and develop relationships with other human beings. Business and professional relations came within the scope of the concept, so that a search of a business premises did represent an interference with private life.

The Court has noted that “a person’s reasonable expectations as to privacy may be a significant, although not necessarily conclusive, factor. Even information collected in public situations may, through the unexpected use to which it is put, raise private life issues. Thus: “Private-life considerations may arise, however, once any systematic or permanent record comes into existence of such material from the public domain. In practice, the Court has tended to recognise a fairly wide scope of the right, while also recognising the possibility of restrictions, along with a wide margin of appreciation to States, particularly in cases involving protection of children. For example, in the case of Keegan v. Ireland, the Court stated that States “enjoy a wide margin of appreciation in the area of adoption. The case involved a father seeking guardianship over his child, whom the mother, who was estranged from the father, had put up for adoption. In Von Hannover v. Germany (No. 2), which involved the publication of pictures alleged to be private, the Court stated: “Contracting States have a certain margin of appreciation in assessing whether and to what extent an interference with the freedom of expression protected by this provision is necessary”.

ECHR: restrictions

The Court has developed a fairly clear methodology for applying the three-part test for restrictions in cases involving interferences with privacy. In a number of cases, especially regarding telephone tapping and other forms of surveillance, the Court has noted that due to the particularly invasive nature of these activities, they must “be based on a ‘law’ that is particularly precise … especially as the technology available for use is continually becoming more sophisticated. In the case of Kruslin v. France, the Court held that this part of the test was not met because the conditions on telephone tapping were not sufficiently precise. In particular, there was no restriction on the categories of person who might have their telephones tapped, no obligation on judges to set a time limit on tapping, no procedures for drawing up reports on intercepted conversations or procedures for destruction of recordings, and no requirements that recordings be kept intact.

In the case of Malone v. United Kingdom, the European Court examined the practice of ‘metering’ of phone calls (i.e. recording the numbers called and length of the calls). It distinguished this from actual interception of calls, but noted that while this was legitimate (presumably on the basis of consent) for purposes of billing and monitoring of proper use of the service, passing this information on to the police represented an interference with private life. There was no law that required the Post Office, which conducted the metering (a public body which had become British Telecommunications by the time of the case), to pass the records over to the police, but in practice they did so in cases where this information was “essential to police enquiries in relation to serious crime” and could not be obtained from other sources”. This practice did not meet the standard of being “in accordance with the law” for purposes of Article 8(2) of the ECHR. This is clearly relevant for other cases in which private actors – such as Internet service providers – engage with public bodies in areas which impact on privacy rights.

In terms of the second part of the test, in general, the Court has no problem recognising a legitimate aim which requires protection in privacy cases, often the rights of others or public order. Thus, in Leander v. Sweden, the Court held in one short paragraph that a law allowing police to keep secret information gathered on job applicants for certain positions was necessary in the interests of national security,while in Murray v. the United Kingdom the Court similarly devoted only one paragraph to recognising the prevention of crime as a legitimate aim.
In assessing the necessity part of the test, the Court has stated: “[R]egard must be had to the fair balance that has to be struck between the competing interests of the individual and of the community as a whole”.Furthermore, “the notion of necessity implies that the interference corresponds to a pressing social need and, in particular, that it is proportionate to the legitimate aim pursued” and that the “reasons adduced to justify the interferences at issue are ‘relevant and sufficient’”. As with national courts, the European Court has relied upon the idea of the overall public interest when assessing restrictions on privacy, especially when competing human rights come into play, as is clear from the box below on the Von Hannover case.

ECHR: private actors

The European Court has addressed the question of interference with privacy by private interests on a number of occasions. It has stressed that “the object of [Article 8] is ‘essentially’ that of protecting the individual against arbitrary interference by the public authorities”. The Court has recognised that privacy interests may impose positive obligations on States to take action to safeguard privacy. Sometimes, the Court uses positive obligations in cases in which “it is not that the State has acted but that it has failed to act” to protect privacy. Some of these cases deal with the relationship between individuals and the State, or the ‘vertical’ application of rights. Gaskin v. United Kingdom is an example of this. In that case, the Court held that a public authority was obliged to release certain personal information relating to the applicant to protect a privacy interest.
At the same time, the Court has in some cases referred to States’ positive obligation to regulate relations between non-State actors, the ‘horizontal’ application of rights. In such cases, it is not the relationship between the State and an individual – either because of an action the State has taken or the failure of a State to act – that is in issue. Rather, the claim is that the effective protection of private life requires the State to regulate relations between non-State actors, for example by providing a legal remedy against privacy invasions.

In some of these cases, there has been an element of State involvement in the privacy breach. For example, in López Ostra v. Spain, the Court held that the failure of the authorities to take action to prevent the detrimental effects of severe environmental pollution arising from a waste-treatment plant breached Article 8. However, the Court specifically noted that the legality of the plant under Spanish law was in question and focused on the fact that the authorities had not only failed to protect Mrs. López Ostra but had also contributed to prolonging the situation.In X and Y v. the Netherlands, the Court held that a civil remedy was insufficient to protect individuals against sexual assault and that a criminal remedy should be available. The Netherlands did normally provide ma criminal law remedy for sexual assault; it was not applicable in this case because of certain procedural issues relating to the fact that the victim was mentally handicapped. In other cases, however, the Court has held that States were in breach of the right to mprivacy purely due to actions between private parties (see box).

SURFING AND SEARCHING

Technical description and actors involved

The process of websurfing

• Telecoms providers. In order to contact a website an Internet user generally contacts
the Internet by a telephone connection to an Internet Service Provider (ISP). The telecom
provider logs the call to the ISP.

• Internet Access Provider. The entry point to the ISP is the network access server. This
server generally records the Calling Line Identification of the connection. Most IAP’s log
the login name, login and logout times and the amount of data transferred during a
session. It should be noted that in some cases the telecoms provider is also the IAP.

• Allocation of the IP address. Once the contact with the IAP has been established, the
IAP allocates a dynamic IP-address for the duration of the Internet user’s session.
Henceforth all communication during a session is to and from this IP-address. The IP
number is carried with all the packets transmitted in all subsequent stages of
communication. It should be noted that the allocated IP number is always within a certain
range of numbers allocated to the respective IAP. Hence external parties can easily
retrieve the IAP from which IP-packets originate.

After this, the Internet traffic is sorted at the ISP by the so-called port number, which
specifies the service and corresponding protocol. A request to visit a website is generally
done through the HTTP protocol. At the ISP this traffic is recognised by a corresponding
port number. It may also be transferred directly to a router which connects the Internet
user with the external websites required.

The request is often transferred to a dedicated proxy server. This server logs the request
for a certain website. The proxy server contains a copy of the content of the most
frequently visited websites. If the website requested by the Internet user is in the proxy
server, this server only needs to prompt the respective website for an update of any
changes since the moment the copy was stored in the proxy. This measure strongly
reduces the amount of data to be exchanged between the ISP and the website, since it
only communicates the changes instead of the full pages. The proxy server may store a
detailed list of the visits to websites connected to an IP-address at a given time. These
can be linked to an individual user by the IP-address and the logging of the session times.

• Routers. On the path between the ISP and the website visited, the traffic generally
passes through several routers that direct the data between the IP-address of the Internet
user and the IP-address of the website. With regard to the storage of personal data, these
routers are considered as neutral elements, even though dedicated facilities could be
applied to intercept the Internet traffic at these points.

• Regular websites. Once the connection with the website has been established, the
website collects information on the visiting Internet user. All requests are accompanied
by the destination IP-address. The website also knows from which page an Internet user
has been transferred (the previous page reference, or URL, is known). The information
on website visits is generally stored in the ‘Common Log File’. All the above mentioned
information can be used to create, by means of a log analyser, accumulated information
on the traffic to and from a website and the activities of visitors.

Upon connection with a website, some additional information is collected in the
communication between the most common browser software used by Internet users and
the websites visited. This is often referred to as ‘chattering data.’ It generally includes the
following items:
- Operating system
- Type and version of browser
- Protocols used for websurfing
- Referring page
- Language preferences
- Cookies

The website has additional gathering power if it posts so-called cookies. These are
pieces of data that can be stored in text files which may be put on the Internet user’s hard
disk, while a copy may be kept by the website. They are a standard part of HTTP traffic,
and can as such be transported unobstructed with the IP-traffic. A cookie can contain a
unique number (GUI, Global Unique Identifier) which allows better personalisation than
dynamic IP-adresses. Such cookies extend the capability of websites to store and
‘personalise’ information on their visitors. The cookie may be re-read on a regular basis
by the site to identify a Internet user and recognise him/her when he/she visits again,
check possible passwords, analyse the path during a session and within a site, record
transactions, such as Articles purchased, customise a site etc.

Cookies can differ in nature: they can be persistent but can also have a limited duration,
when they are called “session cookies”. In some cases, they may be useful for providing a certain service through the Internet or to facilitate the surfing of the Internet user. For
instance, certain custom websites rely on cookies to identify users each time they return,
so users do not have to log into the website each time they check their news.
The privacy implications of the use of cookies should however not be underestimated.
This issue will be dealt with in the legal analysis section of this chapter.
• Portal sites
Because of the growing complexity of the Internet, Internet users often connect to a
website via a so-called portal site, which provides an overview of weblinks in an ordered
way.

Often such portals contain links to commercial sites, and could be compared to a
shopping mall hosting many stores. The portal sites collect information in the same way
as websites in general, but may also store information on visits to all the sites ‘behind’
the portal.

A portal site is always hosted by an Internet Service Provider and in some cases can
belong to the ISP. In such cases, the ISP has the possibility of collecting data on a user’s
visits to sites " behind" this portal and can therefore create a complete profile of the user.
The Dutch Data Protection Authority (Registratiekamer) concluded in a report about
the Internet and privacy, based on investigations into 60 ISPs in the Netherlands, that it is
possible for the content provider (in this case the ISP that owns a portal) to know how
many advertisements have been placed, how often a user has visited an e-shop, which
products he/she has bought and how much he/she has paid for them.

• Providers of additional services
The data collected by websites is sometimes (automatically) transferred to a third party to
the original communication (e.g. companies specialised in the analysis of web statistics,
such as Nedstat). The purpose can be to create accumulated statistical data on visits to the
website, which is sold back to the owner of the respective websites. Advertisement
banners generally collect information on the websites visited by a person by means of
cookie-files. Service providers like DoubleClick or Globaltrash accumulate the
information on website visits to all the different sites on which they put advertisements.
A profile of the Internet users’ preferences can be compiled with these data, and
subsequently used to customise webpages.

Surfing from the perspective of the Internet user
A PC installed with browser software will in many cases, after starting up, automatically
load a selected starting page from the web. This starting page may contain hyperlinks that
can be activated to visit other websites or search engines. While browsing, the browser
programme of the Internet user sends a request to a server (that can be located anywhere
in the world) to transmit a specified webpage (marked by its URL) that is hosted by this
webserver. By clicking on a hyperlink the Internet user in fact downloads the requested
webpage to his/her computer.
After having connected to his/her ISP, the Internet user generally chooses one of the
following approaches when surfing:

• Directly addressing the website required by entering the URL, such as
www.amazon.com. The URL also contains the protocol.

• Reaching the website via a referring (portal) site that contains hyperlinks towards other
sites. These portal services are becoming more popular as the number of webpages is
growing and Internet users need more guidance to find interesting material.

• Retrieving relevant sites by first entering a query to a website using a search-engine.
Search engines use indexing by means of keywords. The user enters one or more
keywords and initiates the search. The search engine then searches for the titles of the
corresponding sites and their URL addresses in its own index database. The search
engine has the power to assemble personal profiles as it accumulates the search terms
entered by an Internet user and the websites consequently visited. The personalisation is
often done by means of cookies. Several search engines also offer more personalised
services whereby an Internet user is required to provide information on personal
preferences in order to get, for example, regular updates of websites on a certain topic.

III. Privacy risks
Millions of Internet users around the word often surf the World Wide Web or search for
information on the Internet. These activities are, however, not risk-free from a privacy
point of view.
In the context of the Internet, a lot of information is collected and processed in a manner
which is invisible to the data subject. The Internet user is sometimes not aware of the fact
that his/her personal data have been collected and further processed and might be used
for purposes that are unknown to him/her. The data subject does not know about the
processing and has no freedom to decide on it.

Additional risks exist when data collected during the surfing activities of Internet users
can be linked with other existent information on the same user. The fear of such a
connection of personal data concerning Internet users has been very present in the
discussion on the merger between Internet advertiser DoubleClick and market research
firm Abacus Direct.

It was feared that, should the two firms merge, the DoubleClick database containing data
on Internet usage habits would be cross-referenced with the Abacus Direct database
containing real names and addresses, as well as detailed information on customer buying
habits.

This merger took place in November 1999. According to the information provided on the
Doubleclick website, name and address information volunteered by a user on an
Abacus Alliance website were to be linked by Abacus through the use of a match code
and the DoubleClick cookie with other information about that individual.
Information in the Abacus Online database includes the user's name, address, retail
catalogue and online purchase history, and demographic data. The database also includes
the user's non-personally-identifiable information collected by websites and other
companies with which DoubleClick does business. According to Double Click, no link has been made up to now between the Double Click and the Abacus databases.

New monitoring software
New monitoring technologies are becoming available to ISPs which will generate far
more information about traffic patterns and content preferences than existed in the public
switched telecommunications network (PSTN). Such technologies promise to deliver the
Internet equivalent of PSTN call-detail records, and more.
These kinds of software programs are popularly known as E.T. applications “because
once they have lodged in the user's computer and learned what they want to know, they
do what Steven Spielberg's extra-terrestrial did: phone home”.
To given an example, Narus, a private software company in Palo Alto, Californa (USA),
offers software to ISPs that ‘monitors the data stream and parses each packet to extract
packet header and payload information. Narus claims to work closely with key partners,
including Bull, Cisco and Sun Microsystems. This software can be used for the
identification and measurement of Internet telephony and other applications (eg, the web,
e-mail or IP fax), but it also aims to monitor potentially billable content within the IP traffic (eg copyrighted material requiring a royalty or on-demand use of an application, or audio clips). The Narus software reports to ISPs in real time on the top websites visited as well as the types of content viewed and downloaded.

Alexa is a tool that can be added to a browser to accompany the user while surfing, by
providing additional information about the site visited (about the registered site owner,
ratings and reviews of the site) and making suggestions on related sites. In return for
providing this service to users, Alexa has complied one of the largest databases on
patterns of web usage. Amazon paid 250 million US dollars in stock for Alexa in early
1999. In its privacy policy, Alexa states that it collects information on web usage which
remains anonymous, by using their web usage logs and cookie data.

Amongst other products produced by Alexa is the zBubbles program, an on-line
shopping tool that collects surfing data on the user in order to offer product
recommendations, comparative shopping advice, etc. According to the information
published by Time Magazine, zBubbles also sends information back to Alexa when
users are not shopping. This product is designed to be installed on the screen during the
whole duration of the navigation session, even though most users are not shopping all the
time.

Another interesting example of monitoring software is Radiate, formerly known as
Aureate. Radiate is an advertising company that works with the makers of shareware. It
is reported that Radiate's advertisements came with E.T. software that embedded
themselves in 18 million people's computers and used their Internet connection to report
back on what advertisements people were clicking on. The original version of Radiate's
software, which still resides in countless computers, was written to keep phoning home
even after the shareware that put it there was deleted. Users needed a special tool to
delete the file, which the company provided on its website later on.

Presently hundreds of E.T. applications exist. More than 22 million people are believed
to have downloaded them. E.T. monitoring software programs are again an example of
technologies that process personal data on users without their knowledge (invisible
processing): most computer users have no idea that these software programs have been
placed in their computers.
Often the makers of these E.T. applications say that, although they are able to collect data
about computer users, they do not connect them to individuals. This does not, however,
offer sufficient guarantees to the user since, given the commercial value of individualised
data, companies that collect them could change their policies at any time. The potential

risk of data misuse is still there.

tugas rangkuman pertemuan 10

Tentang Pengaruh Perkembangan Masyarakat Informasi terhadap Kesejahteraan Masyarakat Dan Peranan Teknologi Komunikasi Dalam Menciptakan Masyarakat Informasi Di Indonesia

Assalamualaikum.wr.wb


Kemajuan teknologi memang sangat penting untuk manusia Sebagai PenunjangKemajuan manusia. Perkembangan teknologi berkembang secara drastis dan terus berevolusi hingga sekarang. Hingga menciptakan obyek-obyek, teknik yang dapat membantu manusiadalam pengerjaan sesuatu lebih efisien dan cepat. Salah satunya adalah komputer. Hampir semua pekerjaan manusia memiliki hubungan dengan komputer. Sehingga pantas jika komputer adalah penemuan yang paling mutakhir dan yang paling berpengaruh pada kehidupan manusia.
Berikut ini merupakan pengaruh perkembangan masyarakat informasi terhadap kesejahteraan masyarakat:

a. Bidang Pendidikan
Ada beberapa pendapat tentang teknologi pendidikan. Istilah yang digunakandalam bahasa Inggris adalah instructional technology atau educational technology. Salah satu pendapat ialah bahwa instructional technology means the media born of the communications revolutional which can be used for instructional purpose alongside the teacher, the book, and the blackboard (Commission on Instructional hal. 39). Jadi, yang diutamakan ialah media komunikasi yang berkembang secara pesat sekali yang dapat dimanfaatkan dalam pendidikan. Alat-alat teknologi ini lazim disebut “hardware” antara lain berupa TV, radio, video tape, computer, dan lain-lain.Di lain pihak ada pendapat bahwa teknologi pendidikan adalah pengembangan, penerapan dan penilaian sistem, teknik dan alat bantu untuk memperbaiki danmeningkatkan proses belajar manusia. Ada pula yang berpendapat bahwa teknologi pendidikan adalah pemikiran yang sistematis tentang pendidikan, penerapan metode problem solving dalam pendidikan, yang dapat dilakukan dengan alat-alat komunikasimodern, akan tetapi juga tanpa alat-alat itu.Pada hakikatnya teknologi pendidikan adalah suatu pendekatan yang sistematisdan kritis tentang pendidikan. Teknologi pendidikan memandang soal mengajar dan belajar sebagai masalah atau problema yang harus dihadapi secara rasional dan ilmiah.

Jenis-jenis alat-alat teknologi pendidikan

Di sini akan kita bicarakan secara singkat beberapa alat pendidikan yang dapat dipandangsebagai alat teknologi pendidikan.

a. Papan Tulis
Alat penajaran ini sangat populer, digunakan oleh sekolah yang tradisional maupun yangmodern dan dapat dikombinasikan dengan alat pengajaran lainnya seperti radio, TV. Alat inidimanfaatkan dalam tiap metode pengajaran. Papan tulis dapat dipakai untuk tulisan, membuatgambar, grafik, diagram, peta, dan sebagainya dengan kapur yang putih maupun yang berwarna.

b. Gambar
Gambar-gambar dapat dikumpulkan dari berbagai sumber seperti kalender, majalah, surat kabar, pamflet dari biro perjalanan, dan sebagainya. Gambar-gambar harus dikumpulkan dalam map menurut kategori tertentu agar mudah dicari kembali bila diperlukan.

c. Model
Model-model dapat merupakan tiruan dari benda yang sebenarnya seperti model mobil,kereta api, rumah, bintang, dan lain-lain.

d. Koleksi
Bermacam-macam koleksi dapat diadakan seperti macam-macam tekstil, batu-batuan, daunkering, mata uang, perangko, dan sebagainya.

e. Peta dan Globe
Geografi dan pelajaran sejarah akan pincang tanpa peta. Macam-macam peta harusdisediakan tentang tiap bagian dunia, juga peta ekonomi, penduduk, dan sebagainya.

f. Buku
PelajaranBuku pelajaran merupakan alat pengajaran yang paling banyak digunakan di antarasemua alat pengajaran lainnya. Buku pelajaran telah digunakan sejak manusia pandai menulisdan membaca, tetapi meluas dengan pesat setelah ditemukannya alat cetak.

g. Film
Sejak ditemukan film, para pendidik segera melihat manfaatnya bagi pendidikan. Film pendidikan sekarang telah sangat berkembang di negara-negara maju. Telah banyak perpustakaan film yang meminjamkan film tentang segala macam topik dalam tiap bidang studi.Universitas demikian pula sekolah-sekolah telah banyak mempunyai perpustakaan film sendiri.Film di sana bukan merupakan barang luks lagi.

h. Filmstrip dan Silde
Filmstrip dan slide diperlihatkan kepada murid-murid dengan menggunakan proyektor. Yang
dilihat adalah gambar “mati” jadi bukan gambar hidup seperti film. Gambar itu dapat merupakan
foto, table, diagram karton, reproduksi lukisan, dan sebagainya. Kecepatan memperlihatkanfilmstrip dan slide dapat diatur oleh guru dan bergantung pada banyak komentar yang diberikantentang tiap gambar.

i. Tape Recorder
Tape recorder pada saat ini bukan barang mewah lagi. Alat ini sangat serasi untuk digunakandalam pelajaran bahasa. Laboratorium bahasa menggunakan tape recorder.

j. Komputer
Komputer adalah hasil teknologi modern yang mempermudah murid atau mahasiswa dalammengerjakan semua kegiatan dalam sistem pengajaran. Semua sudah dapat dikerajakan dalamsistem komputer. Dari mengerjakan tugas mengetik, desain, dan banyak lagi fungsi-fungsi.

TRANSISI MASYARAKAT INDONESIA
Orang-orang yang belajar di luar negeri misalnya membawa penemuan ilmu pengetahuan baru dari negara maju ke Indonesia. Contoh lain mobilitas kapital yang membawa modal dari negara maju ke Indonesia mengakibatkan kita harus menggunakan situasi masyarakat informasi pemilik modal terutama penggunaan komputer dan fasilitas komunikasi. Misalnya juga dalam bidang kedokteran, kita dapat dengan cepat mengatasi suatu penyakit karena ada teknologi pembuatan obat dari negara lain yang sudah tinggi ilmunya. Kita dapat mengatasinya karena terimbas kemajuan manusia dan negara lain. Masyarakat informasi yang muncul di Indonesia hanyalah imbas atau dampak dari trend setter negara bermasyarakat informasi. Transisi yang dialami Indonesia pun belum bisa ditetapkan dengan tepat, baik bentuk maupun macam transisinya. Akan tetapi setidaknya kita bisa menggolongkan lima faktor penentu yang membentuk masyarakat informasi, yaitu: 1) Kemajuan dalam pendidikan. Dengan pendidikan orang bisa membaca, menulis, menghitung dan menguasai pengetahuan. Melalui pendidikan SDM yang berkualitas bisa diperoleh; 2) Perubahan karakteristik pola kerja. Evolusi pola kerja membuat orang mencari informasi atau pengetahuan tentang cara-cara paling efisien, efektif, praktis dan mudah melakukan suatu pekerjaan; 3) Perubahan dalam menyebarkan pengetahuan dari cara primitif dari mulut ke mulut sampai penggunaan alat yang canggih; 4) Perubahan dalam cara-cara orang mencari pengetahuan. Rasa ingin tahu yang besar dari orang-orang terhadap suatu pengetahuan yang baru menyebabkan evolusi ataupun revolusi dalam cara-cara orang mencari pengetahuan; 5) Kemajuan dalam penciptaan alat-alat untuk menyebarkan dan mengakses pengetahuan baru.

KOMPUTERISASI DAN ELECTRONIC GOVERMENT

Masyarakat informasi diidentikkan dengan komputerisasi. Para pembuat komputer selalu mengkliam bahwa mesin-mesin mereka akan membuat sekian banyak hal dalam hidup kita menjadi lebih mudah. Untuk sebagian kecil masalah hidup, komputer mungkin sebuah solusi yang tidak bisa ditolak, tapi dalam banyak hal lain ia justru kerap menjadi tambahan pekerjaan baru yang menjengkelkan. Selain sebagai alat komputasi, komputer juga bisa berubah
menjadi alat amputasi yang melumpuhkan beberapa kemampuan alamiah manusia. Mereka yang sebagian besar pekerjannya bergantung pada komputer, dalam banyak kasus, seperti kehilangan kemampuannya untuk menangani pekerjaan-pekerjaan tersebut secara manual. Di samping itu, karena seringnya mesin-mesin itu mengalami gangguan, orang akan cenderung lebih banyak disibukkan oleh perkara-perkara teknis. Di Indonesia, gangguan atau kerusakan
komputer bahkan sering menjadi sebuah alasan yang tidak bisa dibantah kalau seseorang atau sebuah lembaga tidak bisa menangani pekerjaan-pekerjaan atau pelayanan sesuai jadwal yang telah ditetapkan (Budiman, 2002) Setidaknya, apa yang dinyatakan dalam paragraf di atas itu menjadi nyata dalam sistem komputerisasi pemilu legislatif 2004, 5 April silam. Komisi
Pemilihan Umum (KPU) memutuskan untuk memakai sistem teknologi informasi yang memakan biaya Rp 200 milyar (Rp 154 milyar untuk pengadaan komputer, Rp 27 milyar untuk Pasifik Satelit National (PSN), Rp 19 milyar untuk dialokasikan ke jaringan Telkom) ini dalam proses penghitungan suara. (Penggunaan komputerisasi ini-meskipun tidak diamanatkan dalam Undang-Undang Pemilu diklaim oleh KPU mempunyai banyak kelebihan, antara lain 1) Rangkaian proses penghitungan suara ini menjanjikan hasil yang relatif jujur dan bebas dari manipulasi; 2) Cepat dan dapat menghemat waktu penghitungan suara, sehingga dapat menjadi fasilitas untuk memenuhi rasa ingin tahu masyarakat dalam memperoleh informasi hasil pemilu secara cepat selama 24 jam, 3) Sistem teknologi ini juga bermanfaat membantu melacak bila ada kesalahan saat penghitungan suara. Sebetulnya, apa yang dilakukan oleh KPU berkenaan dengan sistem
komputerisasi itu erat kaitannya dengan pelaksanaan electronic government (egovernment)
seperti yang telah diamanatkan Pertemuan Geneva untuk mewujudkan masyarakat informasi pada 2015, dan juga Inpres No 3/2003 yang merumuskan kebijakan dan strategi e-government menuju masyarakat informasi. Pemanfaatan TI (Teknologi Informasi) dan internet di lingkungan instansi pemerintah terutama yang dimaksudkan untuk mendukung layanan publik sering disebut sebagai e-government. E-government yang didefinisikan oleh World Bank, mengacu pada pemanfaatan TI oleh institusi pemerintah yang selanjutnya mendukung transformasi hubungan dengan warga negara, pelaku bisnis, dan institusi pemerintah lainnya, dengan maksud memberikan layanan publik yang lebih baik, meningkatkan hubungan antara pemerintah dengan bisnis dan industri, serta meningkatkan peran serta masyarakat dalam peningkatan efisiensi manajemen pemerintahan. Selengkapnya World Bank menyatakan:

Electronic government refers to the use by government agancies of
information technologies (such as wide area networks, the internet
and mobile computing) that have the ability to transform relations
with citizens, businesses, and other arms of government. These
technologies can serve a variety of different ends: better delivery
of government services to citizens, improve interactions with
business and industry, citizen empowerment through access to
information, or more efficient government management. The
resulting benefits can be less corruption, increased transparency,
greater convenience, revenue growth, and/or cost reductions.