Police Chief Tito Karnavian Forms Forced Calling Team

By : Herry Barus And Aldo Bella Putra | Thursday, October 12 2017 - 21:00 IWST

Kapolri Jenderal Polisi Tito Kurniawan
Kapolri Jenderal Polisi Tito Kurniawan

INDUSTRY.co.id - Jakarta - National Police Chief Gen Tito Karnavian will form a special team to review the forced enforcement efforts requested by the House of Representatives in the context of the investigation of the Special Committee on the Rights of the House of Representatives regarding the Duties and Powers of KPK.

"The police will consider and will discuss internally about what steps will be taken to address this," Tito said at a hearing in the House of Representatives Commission III, Jakarta, Thursday (12/11/2017)

That, according to him, includes inviting experts from external, constitutional law experts, and criminal, in order to address what attitude Polri will be taken.

Tito believes that any involuntary summons must be regulated in the procedural law, namely the Criminal Procedure Code and the forced involuntary attempts requested by Parliament are not provided for in the Criminal Procedure Code.

"Do not let the attitude of Police who implement this would be a boomerang and blame many parties," he said.

He explained that in view of the Criminal Procedure Code, not recognizing the involuntary call by the DPR, including those relating to the Police duties are not explicitly stated.

Then Chairman of Commission III of the House of Representatives, Bambang Soesatyo cut off Tito's explanation, and said that in the Act No. 17 of 2014 on the MPR, DPR, DPD and DPRD (UU MD3) it was explained that the DPR could make a forced calling effort by asking for help to the Police.

"This is a matter of involuntary calling, which we regulate in the law is the Police of the Republic of Indonesia.If the order is Pamdal, we do not ask the Police," he said.

Golkar Party politician asked the National Police to think deeply about it because it is set in the law so that if refusing the forced call will reduce the authority of the Act.

Tito then explained that in the Act in question Bambang did not explain the technical matter of the summoning his name because Polri could not give an attitude to this problem.

According to him, if there is one paragraph or one article that conveys that the technical involuntary summons and hostage adjusted with the Criminal Procedure Code. (Ant)

News Comment

Today's Industry

Dr Paul Gardner-Stephen, Senior Lecturer, College of Science and Engineering, Flinders University (Photo by ICT Days)

Kamis, 24 September 2020 - 15:15 WIB

NBN Co to Spend $3bn Upgrading Half of FTTN Network to Full Fibre

In particular, the original Fibre-To-The-Premises (FTTP) plan had several key advantages that this announcement is not able to solve.

Rena Chua, Bug Bounty Advisor at HackerOne (Photo by Linkedin)

Kamis, 24 September 2020 - 14:15 WIB

How COVID-19 Is Impacting Security

With this accelerated pace of digital transformation, CISOs had to quickly facilitate new needs — while ensuring the security of existing systems and newly-acquired collaboration tools.

Ilustration Asia-Pacific’s First and Largest Collaborative Robots Virtual Expo (Photo by Universal Robots)

Selasa, 22 September 2020 - 17:00 WIB

Universal Robots Hosts First Virtual Collaborative Robots Exhibition & Conference in Asia-Pacific

Gain actionable insights on flexible and cost-effective automation solutions addressing post-pandemic ROI and safety challenges for small & medium businesses.

Published BSIMM11, The Latest Version of The BSIMM (Photo by EEJournal)

Senin, 21 September 2020 - 18:30 WIB

Synopsys Publishes BSIMM11 Study Highlighting Fundamental Shifts in Software Security

BSIMM11 reflects the software security practices observed across 130 firms from multiple industry verticals including financial services, FinTech, independent software vendors, cloud, health…

New Cloud-Based Technology That Delivers Secure Remote Access (Photo by News Break)

Senin, 21 September 2020 - 17:15 WIB

Check Point Software Technologies Redefines Secure Remote Access for Enterprises

This technology will integrate with Check Point´s Infinity architecture, and become the easiest and most secure solution for enterprises need to enable employees´ secure remote access to any…