Card Registration, Indosat Accepts One Report of Misuse of Personal Data

By : Ahmad Fadli Dan Aldo Bella Putra | Thursday, March 15 2018 - 16:00 IWST

Ilustrasi registrasi simcard prabayar
Ilustrasi registrasi simcard prabayar

INDUSTRY.co.id - Jakarta - PT Indosat Ooredo Tbk claimed up to now received a report of abuse of personal data for re-registration of a previously viral mobile card in social media and has been dealt with by blocking other numbers using it.

"So far we have come to complain, there is only one.If there is a report like that, people can check yes. If there is indications that there is abuse, people who feel have NIK report to us, we block directly," said Group Head of Regulatory and Government Relations of PT Indosat Ooredoo Tbk Fajar Aji Suryawan, in Jakarta, Wednesday.

After coming to Indosat Gallery and showing ID cards and passing cellular numbers owned, then the number that is not hers directly blocked.

Fajar said the operator does not hold the data of residence, but only distribute the number registered by the customer to be verified with data from the Directorate General of Dukcapil Kemendagri.

After the data is declared valid, he said, the operator declared the re-registration has been successful. The operator can not directly know the data of personal data used several numbers for registration.

"The operators also love the data one by one, Dukcapil also directly reply yes or no. Each number is registered, recorded in Dukcapil. Dukcapil itself does not do the processing, he just recorded," he said again.

Dukcapil Directorate General, said Fajar, do not know a number that has been registered actively or not because just match NIK and KK.

Dawn confirms there is no data leakage because the operator does not hold the data, Kemenkominfo only monitors the traffic, and DG Dapcapil does not provide any data but only verifies.

"Each person is responsible for maintaining the data, the operator does not hold the data, Kemenkominfo is just monitoring the traffic, whose name is no leak," said Fajar.

News Comment

Today's Industry

Oleg Mogilevsky - Product Marketing Manager at Check Point Software Technologies (Photo by Linkedin)

Selasa, 10 November 2020 - 11:00 WIB

Five Reasons to Reevaluate Your Endpoint Protection

With the new emerging threats caused by remote working standards, security professionals need to reevaluate their approach to protecting endpoints. In order to do so, it’s vital that organisations…

Darrell Adams, Head of Southeast Asia & Oceania, Universal Robots (Photo by LinkedIn)

Selasa, 10 November 2020 - 10:30 WIB

Collaborative Robots Open New Horizons in Quality Control Processes

Collaborative robots (cobots) offer suitable solutions to manufacturers. Hence, cobot-based quality control and inspection systems that can transition between different end products in very…

Ilustration Hackers (Photo by Microwire.info)

Jumat, 30 Oktober 2020 - 11:20 WIB

Organisations Paid Hackers US$23.5 Million for These 10 Vulnerabilities in One Year

HackerOne report reveals cross-site scripting, improper access control, and information disclosure top list of most common and impactful vulnerabilities.

Clean Earth Technologies (CET)

Jumat, 30 Oktober 2020 - 10:30 WIB

Clean Earth Technologies’ New Class Of Polymers Invented By Associate Professor, Justin Chalker, Receives Australian Pm’s New Innovator Award

Associate Professor Justin Chalker has invented a novel class of polymers synthesised directly from elemental sulphur which is a waste by-product of the petrochemical industry and renewable…

Adi Ikan - Network Research & Protection Group Manager, at Check Point Software Technologies (Photo by Linkedin)

Jumat, 30 Oktober 2020 - 10:05 WIB

Measuring the Global Impact of the NSA’s Top 25 Vulnerabilities Being Exploited In the Wild

NSA’s list of top vulnerabilities were used to launch 3 million attacks in 2020, with 2.5 million of those attacks occurring in the last 6 months.