TY - GEN
T1 - Investigating the protection of customers' personal data in the ridesharing applications
T2 - 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, ECTI-CON 2018
AU - Gandhi, Arfive
AU - Sucahyo, Yudho Giri
AU - Ruldeviyani, Yova
N1 - Publisher Copyright:
© 2018 IEEE
PY - 2018/7/2
Y1 - 2018/7/2
N2 - Ridesharing application acquires, collects, stores, and shares personal data of its customers and therefore there has to be a practice on protecting customers' data and a mechanism to ensure that data will not be misused. This research investigates how ridesharing applications in Indonesia protect their customers' personal data. By using self-regulation mechanism and compliance examination with related national regulation, this research is demonstrated to three ridesharing applications in Indonesia through their privacy policies, terms, and conditions. Generally, this research unveils that all core principles of Data Protection have been fully covered by them. It shows that the application operators have established formal commitment to protect their customers' personal data which have been shared after vendor approves the customer's booking. Unfortunately, they cannot ensure that shared information are fully erased from vendor's device after transaction. They also do not expose their compliance to national regulation although most of stipulation have been covered.
AB - Ridesharing application acquires, collects, stores, and shares personal data of its customers and therefore there has to be a practice on protecting customers' data and a mechanism to ensure that data will not be misused. This research investigates how ridesharing applications in Indonesia protect their customers' personal data. By using self-regulation mechanism and compliance examination with related national regulation, this research is demonstrated to three ridesharing applications in Indonesia through their privacy policies, terms, and conditions. Generally, this research unveils that all core principles of Data Protection have been fully covered by them. It shows that the application operators have established formal commitment to protect their customers' personal data which have been shared after vendor approves the customer's booking. Unfortunately, they cannot ensure that shared information are fully erased from vendor's device after transaction. They also do not expose their compliance to national regulation although most of stipulation have been covered.
KW - Customer data protection
KW - Data privacy
KW - E-Commerce
KW - Information security
UR - http://www.scopus.com/inward/record.url?scp=85062223899&partnerID=8YFLogxK
U2 - 10.1109/ECTICon.2018.8619912
DO - 10.1109/ECTICon.2018.8619912
M3 - Conference contribution
AN - SCOPUS:85062223899
T3 - ECTI-CON 2018 - 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology
SP - 118
EP - 121
BT - ECTI-CON 2018 - 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 18 July 2018 through 21 July 2018
ER -