Normativity of Consumer Protection in the Perspective of Maqāṣid Sharīʿah An Analysis of the Effectiveness of Laws Related to Personal Data Protection in WhatsApp Application Users

Main Article Content

Cristine Mailiena
M Ilham Tanzilulloh

Abstract

Personal data security is the right of every person to protect their personal data confidentially. This research discusses regulations for consumer protection, personal data protection, and their implementation from the perspective of the maqāṣid sharīʿah. The aim of this research is to determine the extent to which laws related to consumer data protection have been implemented to prevent leaks in the personal data of WhatsApp application users. This study used a qualitative approach with normative empirical research methods. Normative research examines Law No. 8 of 1999 concerning Consumer Protection and Law No. 27 of 2022 concerning Personal Data Protection, while empirical research examines the implementation of these regulations. Researchers draw the conclusion that regulations related to the protection of consumers' personal data and their implementation fall within the concept of maqāṣid sharīʿah, especially the basic principle of maintaining one's honor (ḥifẓ al-ʿirḍ) because these regulations were made to protect one's privacy.


 

Article Details

How to Cite
Mailiena, C., & Tanzilulloh, M. I. (2024). Normativity of Consumer Protection in the Perspective of Maqāṣid Sharīʿah: An Analysis of the Effectiveness of Laws Related to Personal Data Protection in WhatsApp Application Users. Invest Journal of Sharia & Economic Law, 4(1), 176-188. https://doi.org/10.21154/invest.v4i1.9004
Section
Articles

References

Hilary G. Buttrick et al., The Skeleton of a Data Breach: The Ethical and Legal Concerns, 23 Rich. J.L. & Tech. 2 (2016), http://jolt.richmond.edu/wp-content/uploads/volume23_article2_Buttrick.pdf.
Delpiero, Maichle, Farah Azzahra Reynaldi, Istiawati Utami Ningdiah, and Nafisah Muthmainnah. “Analisis Yuridis Kebijakan Privasi dan Pertanggungjawaban Online Marketplace dalam Pelindungan Data Pribadi Pengguna Pada Kasus Kebocoran Data.” Padjajaran Law Review, V. 9. No. 1 (2021).
Fauziah, Puji. “Data WhatsApp Bocor Si Google Search Hingga Bisa Diakses Banyak Orang.” February 29, 2020. https://bekasi.pikiran-rakyat.com/teknologi/pr-12345367/data-whatsapp-bocor-di-google-search-hingga-bisa-diakses-banyak-orang?page=all
Hehanussa, Umi Kalsum. “Implementation Of The Islamic Economic System Increasing Community Welfare Based On Maslahah In Indonesia.” Jurnal Ilmiah Ekonomi Islam 9, no. 3 (November 20, 2023): 3839. https://doi.org/10.29040/jiei.v9i3.9223.
Ibnu ‘Āmir al-Ḥajj al-Ḥalabī. At-Taqrīr wa at-Taḥrīr. Beirut: Dār al-Kutub al-‘Ilmiyyah, n.d. Juz 3, 183.
Jamāluddīn ‘Aṭiyyah. Nahwa Taf‘īl Maqāṣid Syarī‘ah. Damascus: Dār al-Fikr, 2003, 146–147.
“PROSIDING SEMINAR NASIONAL FH UNMAS DENPASAR,” n.d.
Saly, Jeane Neltje, and Irwandhy Idrus. “Analisis Kepastian Hukum Terhadap Perlindungan Data Pribadi Dari Penggunaan Aplikasi Online Sebagai Konsumen Berdasarkan Undang-Undang Nomor 8 Tahun 1999 Tentang Perlindungan Konsumen.” Journal.Upy.Ac.Id. October 6, 2023. https://doi.org/10.31316/jk.v7i2.5402.
Soekanto, Soerjono. Efektivitas Hukum dan Peranan Sanksi. Edited by Tjun Surjaman. Bandung: Remadja Karya, 1988.
Soekanto, Soerjono. Pokok-Pokok Sosiologi Hukum. Jakarta: PT Raja Grafindo Persada, 2007.
Stevani, Winnie, and Lu Sudirman. “Urgensi Perlindungan Data Pengguna Financial Technology terhadap Aksi Kejahatan Online di Indonesia.” Journal of Judicial Review 23, no. 2 (December 23, 2021): 197. https://doi.org/10.37253/jjr.v23i2.5028.
“UNDANG-UNDANG No 8 Tahun 1999 Tentang Perlindungan Konsumen,” n.d.
“UNDANG-UNDANG Nomor 27 Tahun 2022 Tentang Perlindungan Data Pribadi.”
Utin Indah Permata Sari. “Kebijakan Penegakan Hukum Dalam Upaya Penanganan Cyber Crime Yang Dilakukan Oleh Virtual Police Di Indonesia.” Jurnal Studia Legalia, 2, no. 01 (March 26, 2022): 58–77. https://doi.org/10.61084/jsl.v2i01.7.
Wong, Rebecca. Data Security Breaches and Privacy in Europe. SpringerBriefs in Cybersecurity. London: Springer London, 2013. https://doi.org/10.1007/978-1-4471-5586-7.