72 Entities Without Operational Permits Potentially Disadvantages the People

By : Herry Barus And Aldo Bella Putra | Saturday, April 21 2018 - 12:00 IWST

Ilustrasi Investasi Bodong (Foto Dok Industry.co.id)
Ilustrasi Investasi Bodong (Foto Dok Industry.co.id)

INDUSTRY.co.id - Jakarta - The Task Force on the Suspension of Legal Action in the Field of Community Funds and Investment Management ensures that 72 entities are suspected of having undertaken unauthorized activities and potentially harming the public.

"This is only April but there are 72 entities that have been complained for allegedly conducting business without permission," said Task Force Investigative Chairman Tongam L Tobing in a press conference in Jakarta on Friday (20/4/2018).

Tongam said this amount is almost close to the number of entities reported by the community and does not have permission to market products based on investment throughout 2017 that is as much as 80 entities.

He added that most entities that should receive special attention from the community are engaged in Forex or Future Trading, Cyptocurrency, Multi Level Marketing and other investments that promise unfair returns or profits.

"They conduct activities to raise funds from the community with high yields without risk as well as attractive but unreasonable offerings," said Tongam.

Tongam asks the public to be vigilant and increase education on speculative-based investments and promise big profits in a short time, let alone most cases occur among urban communities.

"This is a recurring problem, so community participation is important to be convincing, so if there is a release from the Task Force related to the problem entity, please ask the entity not to be followed," he said.

He asserted that the list of these problem entities has been reported to the Police Criminal Investigation Unit to obtain further legal process and to the Ministry of Communications and Information Technology to block the site and the page of the entity.

However, he acknowledges the precautionary process should be repeated so that these different modes of investment with unreasonable returns do not recur and do not continue to harm the public.

"We may have closed the web by Kominfo, but the culprit is very cunning and publishes a new web, so there must be a firm step from the police," Tongam said.

News Comment

Today's Industry

Dr Paul Gardner-Stephen, Senior Lecturer, College of Science and Engineering, Flinders University (Photo by ICT Days)

Kamis, 24 September 2020 - 15:15 WIB

NBN Co to Spend $3bn Upgrading Half of FTTN Network to Full Fibre

In particular, the original Fibre-To-The-Premises (FTTP) plan had several key advantages that this announcement is not able to solve.

Rena Chua, Bug Bounty Advisor at HackerOne (Photo by Linkedin)

Kamis, 24 September 2020 - 14:15 WIB

How COVID-19 Is Impacting Security

With this accelerated pace of digital transformation, CISOs had to quickly facilitate new needs — while ensuring the security of existing systems and newly-acquired collaboration tools.

Ilustration Asia-Pacific’s First and Largest Collaborative Robots Virtual Expo (Photo by Universal Robots)

Selasa, 22 September 2020 - 17:00 WIB

Universal Robots Hosts First Virtual Collaborative Robots Exhibition & Conference in Asia-Pacific

Gain actionable insights on flexible and cost-effective automation solutions addressing post-pandemic ROI and safety challenges for small & medium businesses.

Published BSIMM11, The Latest Version of The BSIMM (Photo by EEJournal)

Senin, 21 September 2020 - 18:30 WIB

Synopsys Publishes BSIMM11 Study Highlighting Fundamental Shifts in Software Security

BSIMM11 reflects the software security practices observed across 130 firms from multiple industry verticals including financial services, FinTech, independent software vendors, cloud, health…

New Cloud-Based Technology That Delivers Secure Remote Access (Photo by News Break)

Senin, 21 September 2020 - 17:15 WIB

Check Point Software Technologies Redefines Secure Remote Access for Enterprises

This technology will integrate with Check Point´s Infinity architecture, and become the easiest and most secure solution for enterprises need to enable employees´ secure remote access to any…