KEBIJAKAN TINDAK PIDANA TERHADAP PELAKU PENGGELAPAN MOBIL SEWA DI CV ALIF TRANS
نویسندگان
چکیده
The development of information technology has now changed people's lifestyles, including in transportation. Various transportation developments both online and person. Many people live a luxurious lifestyle to show that they have different class but not everyone can meet these needs because expensive prices car maintenance. So many rental rentals, it is very unfortunate practice services are targets or crime by people. irresponsible. This marked the frequent occurrence criminal acts fraud embezzlement committed users services. Embezzlement someone who abuses rights trust where obtained without any elements against law. Car one them. an unlawful act may be subject offense. case occurred Cerme sub-district, Gresik district, ALIF TRANS rental, agreement tenant rented for 1 month after was returned, turned out pawned on other side. violation tricking hiding from owner. In this article, we will explain articles Criminal Code applied cases cars, such as Articles 372, 1548, CHAPTER XXVI. method used study uses type normative juridical research, namely research according book laws Code. There need policy approach must taken, combination efforts deal with penalty (after occurred) (before occurred). Penal policies divided into penal non-penal efforts, repressive occurred, while prevention focus more preventive efforts.
منابع مشابه
Analisis Keamanan Protokol Secure Socket Layer (SSL) Terhadap Proses Sniffing di Jaringan
Development of information technology, especially in the field of computer network allows the exchange of information faster and more complex and the data that is exchanged can vary. Security of data on communication in the network is a major thing. Secure socket layer (SSL) is the solution to the problem, but further research on the security of the SSL protocol transactions should be done to d...
متن کاملThe Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions
Masalah Salah satu masalah yang dihadapi berbagai organisasi dewasa ini adalah banyaknya tindakan penyalahgunaan komputer, meliputi di antaranya penyebaran virus, pemalsuan identitas, duplikasi perangkat lunak secara ilegal, hingga sabotase terhadap perusahaan dengan menggunakan komputer. Sebagian perusahaan telah mulai menetapkan sejumlah kode etik, yiatu segala pernyataan perusahaan mengenai ...
متن کاملcatena-Poly[bis[cis-dipyrimidine-trans-dithiocyanatoiron(II)]-di-μ-pyrimidine-[trans-dithiocyanatoiron(II)]-di-μ-pyrimidine]
In the crystal structure of the title compound, [Fe(3)(NCS)(6)(C(4)H(4)N(2))(8)](n), each iron(II) cation is coordinated by four N-bonded pyrimidine ligands and two N-bonded thio-cyanate anions in a distorted octa-hedral environment. The asymmetric unit consists of one iron cation located on a crystallographic center of inversion, as well as one iron cation, three thio-cyanate anions and four p...
متن کاملMobil Uygulamalarin Kalite Ozelliklerinin Olcumu
Since it is difficult to measure the (external) quality attributes of a software product directly, an evaluation is made by using some software metrics that represent the value of related internal quality attributes. The objective of this work is to answer the research question – which has not been studied much in the literature yet – of whether the quality attributes of an application will be ...
متن کاملStorytelling App - jüdische Geschichte mobil erleben
Besucher kulturhistorischer Sehenswürdigkeiten möchten sich meist umfassend aber auch speziell zu bestimmten Details eines Denkmals informieren. Im Fall des jüdischen Friedhofs „Heiliger Sand“ in Worms werden Gästeführungen angeboten und eine Schautafel informiert am Eingang des Friedhofs. Dieses Angebot zeitund ortsunabhängig zu ergänzen und das individuelle Besuchererlebnis von Kulturtouriste...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Unes Journal of Swara Justisia
سال: 2023
ISSN: ['2579-4914']
DOI: https://doi.org/10.31933/ujsj.v7i1.328