{"id":48517,"date":"2022-09-20T10:47:57","date_gmt":"2022-09-20T10:47:57","guid":{"rendered":"http:\/\/6682a9ca-4476-4e58-8e6d-e0dac7507e37"},"modified":"2022-09-20T10:47:57","modified_gmt":"2022-09-20T10:47:57","slug":"indonesia-finally-passes-personal-data-protection-law","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/indonesia-finally-passes-personal-data-protection-law\/","title":{"rendered":"Indonesia finally passes personal data protection law"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/f75d3fe833d62b3753bc2e0b3c0af810535554c9\/2022\/03\/01\/db3a392d-0cee-4fd8-81dc-364e6825168e\/zd-data-protection-and-privacy.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\" class=\"ff-og-image-inserted\"><\/div>\n<p>Indonesia finally has passed its personal data protection law that has been in discussions since 2016. The government believes the new Bill will be critical amidst a spate of data security breaches in the country.&nbsp;<\/p>\n<p>Indonesia&#8217;s House of Representatives earlier this month approved the Personal Data Protection (PDP) Bill, paving the way for its ratification on Tuesday. The country now joins other jurisdictions in Southeast Asia that have dedicated personal data protection laws, including&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/singapore-updates-data-protection-law-to-exclude-user-consent-for-legitimate-business-purposes\/\" rel=\"follow\">Singapore<\/a>&nbsp;and Thailand.&nbsp;<\/p>\n<p>Communications and Informatics Minister Johnny G. Plate had hailed the approval as a milestone and key to driving connectivity and advancements for the local digital sector. Plate said laws to safeguard personal data would help boost and facilitate the management of data security breaches, according to statutory board and state-owned news agency,&nbsp;<a href=\"https:\/\/en.antaranews.com\/news\/250541\/personal-data-protection-bill-ratified-on-september-20-house-speaker\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Antara<\/a>.<\/p>\n<p>Indonesian President Joko <a href=\"https:\/\/en.antaranews.com\/news\/249889\/pdp-bill-ratification-urged-amid-rising-reports-of-data-breach\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Widodo last week underscored the urgent need<\/a> for relevant ministries to coordinate and investigate alleged breaches of personal data. The National Cyber and Encryption Agency on September 13 <a href=\"https:\/\/en.antaranews.com\/news\/249561\/data-hack-case-bssn-probing-background-of-hacker\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">said it was investigating<\/a> claims made by hackers, dubbed &#8220;Bjorka&#8221;, that they had access to the data of several government websites, presidential letters, and confidential documents from the intelligence agency.&nbsp;<\/p>\n<p>The same hackers in August said they obtained information from SIM card users, including their national identification number and contact details.<\/p>\n<p>That same month, personal details of 17 million customers of state-run electricity provider PT PLN (Persero) were leaked as were the data of 26 million customers of Telkom Indonesia&#8217;s internet and digital TV service IndiHome.<\/p>\n<p>The security breaches highlighted the urgent need for the data protection bill to maintain public trust, especially as personal information was required for public services and processed digitally, said Antara. Identity card numbers (NIKs), for example, often were used for registration of online apps and to process the purchase of train tickets.<\/p>\n<p>Citing stats from Surfshark, Antara said Indonesia ranked third as the country most affected by data breaches in the third quarter of 2022, with 12.7 million local accounts compromised.<\/p>\n<p>House of Representatives Speaker Puan&nbsp;<a href=\"https:\/\/en.antaranews.com\/news\/250541\/personal-data-protection-bill-ratified-on-september-20-house-speaker\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Maharani said<\/a> Monday: &#8220;This PDP Bill will provide legal assurance that every citizen, without exception, [has full control] over their personal data. Thus, there will be no more tears from the people due to online loans that they don&#8217;t ask for, or doxxing that makes people uncomfortable.&#8221;&nbsp;<\/p>\n<p>Maharani said derivative rules, including the establishment of a supervisory agency tasked to protect the public&#8217;s personal data, could be formed immediately after the Bill was ratified.&nbsp;<\/p>\n<p>She added that it would serve as a guide for ministries, agencies, and policy makers to main a robust national digital security environment.<\/p>\n<p>The Bill also is expected to bring together all existing and additional regulations into one. Indonesia currently has 32 laws governing the protection of personal data.&nbsp;<\/p>\n<p>Modelled on European Union&#8217;s General Data Protection Regulation (<a href=\"https:\/\/www.zdnet.com\/article\/gdpr-in-real-life-transparency-innovation-and-adoption-across-borders-and-organizations\/\" rel=\"follow\">GDPR<\/a>), Indonesia&#8217;s PDP Bill comprises various global components that are not included in its local regulations, such as sensitive personal data and data protection officer. The Bill will regulate all forms of data processing, including acquisition and collection, storing, updating and correcting, as well as deleting, according to <a href=\"https:\/\/www.dentons.com\/en\/insights\/articles\/2022\/june\/13\/indonesias-draft-law-bring-clarity-to-regulation-of-data-handling-and-e-commerce\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Andre Rahadian<\/a>, a partner and founding member of law firm Hanafiah Ponggawa &amp; Partners (Dentons HPRP).&nbsp;<\/p>\n<p>Under the PDP Bill, for instance, personal data controllers will be required to update and correct errors in personal data within 24 hours after receiving the request to do so. The Bill also specifies underlying documents or circumstances under which personal data may be transmitted outside Indonesia, such as pre-obtained approval of the personal data owner and bilateral international agreements.&nbsp;<\/p>\n<p>It <a href=\"https:\/\/www.thejakartapost.com\/indonesia\/2022\/09\/20\/indonesia-passes-long-awaited-data-protection-bill.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">includes corporate penalties<\/a> of up to 2% of an organisation&#8217;s annual revenue and up to six years jail terms for those deemed to have breached the law.&nbsp;<\/p>\n<p>Indonesia has an estimated <a href=\"https:\/\/en.tempo.co\/read\/1600176\/indonesian-internet-users-jumped-by-45-million-due-to-pandemic-survey\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">220 million internet users<\/a>. <\/p>\n<p>The country also was projected to account for 40% of Southeast Asia&#8217;s 2021 e-commerce gross merchandise value (GMV), at $70 billion, according to the&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/sea-digital-merchants-credit-platform-for-keeping-them-afloat-but-high-costs-key-barrier\/\" rel=\"follow\">2021 e-Conomy Southeast Asia<\/a> report, which covers six regional markets: Singapore, Malaysia, Vietnam, Indonesia, Thailand, and the Philippines. The study also revealed that 80% in Indonesia had made at least one purchase online.<\/p>\n<h3>RELATED COVERAGE<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/indonesia-finally-passes-personal-data-protection-law\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After years of deliberation, the largest Southeast Asian market ratifies personal data protection bill, which will apply to local businesses as well as international corporations that handle data of Indonesian consumers.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-48517","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Indonesia finally passes personal data protection law 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/indonesia-finally-passes-personal-data-protection-law\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Indonesia finally passes personal data protection law 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/indonesia-finally-passes-personal-data-protection-law\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-20T10:47:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/f75d3fe833d62b3753bc2e0b3c0af810535554c9\/2022\/03\/01\/db3a392d-0cee-4fd8-81dc-364e6825168e\/zd-data-protection-and-privacy.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indonesia-finally-passes-personal-data-protection-law\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indonesia-finally-passes-personal-data-protection-law\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Indonesia finally passes personal data protection law\",\"datePublished\":\"2022-09-20T10:47:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indonesia-finally-passes-personal-data-protection-law\\\/\"},\"wordCount\":699,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indonesia-finally-passes-personal-data-protection-law\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/f75d3fe833d62b3753bc2e0b3c0af810535554c9\\\/2022\\\/03\\\/01\\\/db3a392d-0cee-4fd8-81dc-364e6825168e\\\/zd-data-protection-and-privacy.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indonesia-finally-passes-personal-data-protection-law\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indonesia-finally-passes-personal-data-protection-law\\\/\",\"name\":\"Indonesia finally passes personal data protection law 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indonesia-finally-passes-personal-data-protection-law\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indonesia-finally-passes-personal-data-protection-law\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/f75d3fe833d62b3753bc2e0b3c0af810535554c9\\\/2022\\\/03\\\/01\\\/db3a392d-0cee-4fd8-81dc-364e6825168e\\\/zd-data-protection-and-privacy.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\",\"datePublished\":\"2022-09-20T10:47:57+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indonesia-finally-passes-personal-data-protection-law\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indonesia-finally-passes-personal-data-protection-law\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indonesia-finally-passes-personal-data-protection-law\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/f75d3fe833d62b3753bc2e0b3c0af810535554c9\\\/2022\\\/03\\\/01\\\/db3a392d-0cee-4fd8-81dc-364e6825168e\\\/zd-data-protection-and-privacy.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/f75d3fe833d62b3753bc2e0b3c0af810535554c9\\\/2022\\\/03\\\/01\\\/db3a392d-0cee-4fd8-81dc-364e6825168e\\\/zd-data-protection-and-privacy.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indonesia-finally-passes-personal-data-protection-law\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Indonesia finally passes personal data protection law\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Indonesia finally passes personal data protection law 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/indonesia-finally-passes-personal-data-protection-law\/","og_locale":"en_US","og_type":"article","og_title":"Indonesia finally passes personal data protection law 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/indonesia-finally-passes-personal-data-protection-law\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-09-20T10:47:57+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/f75d3fe833d62b3753bc2e0b3c0af810535554c9\/2022\/03\/01\/db3a392d-0cee-4fd8-81dc-364e6825168e\/zd-data-protection-and-privacy.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/indonesia-finally-passes-personal-data-protection-law\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/indonesia-finally-passes-personal-data-protection-law\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Indonesia finally passes personal data protection law","datePublished":"2022-09-20T10:47:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/indonesia-finally-passes-personal-data-protection-law\/"},"wordCount":699,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/indonesia-finally-passes-personal-data-protection-law\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/f75d3fe833d62b3753bc2e0b3c0af810535554c9\/2022\/03\/01\/db3a392d-0cee-4fd8-81dc-364e6825168e\/zd-data-protection-and-privacy.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/indonesia-finally-passes-personal-data-protection-law\/","url":"https:\/\/www.threatshub.org\/blog\/indonesia-finally-passes-personal-data-protection-law\/","name":"Indonesia finally passes personal data protection law 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/indonesia-finally-passes-personal-data-protection-law\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/indonesia-finally-passes-personal-data-protection-law\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/f75d3fe833d62b3753bc2e0b3c0af810535554c9\/2022\/03\/01\/db3a392d-0cee-4fd8-81dc-364e6825168e\/zd-data-protection-and-privacy.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","datePublished":"2022-09-20T10:47:57+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/indonesia-finally-passes-personal-data-protection-law\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/indonesia-finally-passes-personal-data-protection-law\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/indonesia-finally-passes-personal-data-protection-law\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/f75d3fe833d62b3753bc2e0b3c0af810535554c9\/2022\/03\/01\/db3a392d-0cee-4fd8-81dc-364e6825168e\/zd-data-protection-and-privacy.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/f75d3fe833d62b3753bc2e0b3c0af810535554c9\/2022\/03\/01\/db3a392d-0cee-4fd8-81dc-364e6825168e\/zd-data-protection-and-privacy.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/indonesia-finally-passes-personal-data-protection-law\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Indonesia finally passes personal data protection law"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48517"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48517\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}