Advanced Search

Regulation Institution Password State Number 14 Of 2010

Original Language Title: Peraturan Lembaga Sandi Negara Nomor 14 Tahun 2010

Subscribe to a Global-Regulation Premium Membership Today!

Key Benefits:

Subscribe Now for only USD$40 per month.
details of the JKS Title budget based on the Lemsaneg External JKS Title Plan proposal.

www.djpp.depkumham.go.id

2010, No. 292 6

Second Section Implementation

Section 6 of Lemsaneg with the Government Instancy carries out the implementation of the External JKS Title based on the External JKS Title Plan proposal.

Article 7 Implementation of the External JKS Title as referred to in Section 6 includes activities: a. The telecommunications infrastructure is used; b. Password system key setup; c. Appliance setup; and d. operation of the External JKS Title.

Article 8 Instancy of the Government conducts the telecommunications infrastructure used as referred to in Article 7 of the letter a using existing infrastructure or building new infrastructure.

Section 9 In terms of the telecommunications infrastructure used as referred to in Section 7 of the letter a using the existing infrastructure then its usage provision is special for the benefit of the External JKS.

Article 10 In The telecommunications infrastructure that is used as referred to in Article The 7-letter a building of the new infrastructure then must meet the requirements: a. Paying attention to the communication data topology. in accordance with the type of Password Appliances used; c. pay attention to network security factors.

Section 11 Lemsaneg conducts a key setup of the password system as referred to in Article 7 of the letter b consisting of activities:

www.djpp.depkumham.go.id

2010, No. 292 7

a. the key creation of a password system based on the key management of the password system has been created; and

b. the key administration of the password system includes logging, duplication, distribution and termination of the password system key.

Section 12 Lemsaneg did the preparation of the Password Equipment as referred to in Article 7 of the c-letter of activities: a. Determination of the Password Tool used; b. The Password test; and c. do settings of the Password Appliance.

Section 13 Operational of the External JKS Title as referred to in Section 7 of the d. with ready to operate.

Third Section Evaluation Section 14

(1) Lemsaneg is authorized to conduct an evaluation of the implementation of the External JKS Title.

(2) Evaluation of External JKS Title as referred to paragraph (1) includes activities: a. The assessment of the agreement between implementation with the title planning

JKS External; and b. the efficiency assessment and effectiveness of the External JKS utilization.

CHAPTER IV THE INTERNAL JKS TITLE

Part Of The Planning

Section 15 (1) The Government Instancy is performing an inventory of the resources available at

its environment.

www.djpp.depkumham.go.id

2010, No. 292 8

(2) The inventory of resources as referred to in paragraph (1) is in accordance with the inventory of the resources as referred to in Section 5 of the paragraph (2).

(3) The Government Instancy may consult the product inventory results as referred to in paragraph (2) to Lemsaneg to obtain an Internal JKS Title Recommend.

(4) The Government Instancy may use the recommendation JKS Internal degree from Lemsaneg to compile the planning of JKS Internal Title.

(5) Internal JKS Title Planning as referred to in paragraph (4) includes: a. JKS Internal design; b. password system key management; and c. Budget needs.

(6) Internal JKS Design as referred to in paragraph (5) the letter a, consists of: a. Persandian User Communication Topology; b. Password tools are used; and c. the telecom infrastructure used.

(7) The Government Instancy is compiling a work reference framework and the details of the JKS Degree cost budget based on the planned Internal JKS Title plan.

Article 16 Lemsaneg is required to provide the assistance required for the Government Instancy in the Internal JKS Title.

Second Section Implementation

Article 17 of the Government Instates implementation of the Internal JKS Title implementation based on planning An Internal JKS title has been compiled.

Article 18 Implementation of the JKS Title Internal as referred to in Article 17, includes activities:

www.djpp.depkumham.go.id

2010, No. 292 9

a. The telecommunications infrastructure is used; b. Password system key setup; c. Appliance setup; and d. operation of the JKS Internal Title.

Article 19 of the Government conducts of the telecom infrastructure used as referred to in Article 18 of the letter a using existing infrastructure or building new infrastructure.

Section 20 In terms of the telecommunications infrastructure used as referred to in Article 18 of the letter a using the existing infrastructure then its usage provision is special for the benefit of the JKS Internal.

Article 21 In The telecommunications infrastructure that is used as intended in the Article 18 of the letter a building of the new infrastructure then must meet the requirements: a. Paying attention to the communication data topology. in accordance with the type of Password Appliances used; c. pay attention to network security factors.

Article 22 of the Government performs a key setup of the password system as referred to in Article 18 of the letter b in a way: a. Government agencies submit a password system key request to

Lemsaneg; _or b. Government agencies do independent password system keys.

Section 23 In the case of the Government Instancy conduct a key setup of the password system independently as referred to in Section 22 of the letter b, the Government Instancy must be doing the following activities: a. Compiling a password for the user with the same name. the key creation of the password system based on the Lemsaneg recommendation;

www.djpp.depkumham.go.id

2010, No. 292 10

c. Logging, duplication, distribution, and extermination of the password system keys; and

d. Drafting a password is not available.

Article 24 of the Government Instance of the Government of the Password as referred to in Article 18 of the letter c consists of activities: a. Determination of the Password Tool used; b. Password: and c. do settings of the Password Appliance.

Section 25 Operational Title JKS Internal as referred to in Section 18 of the letter d is the implementation of the JKS Internal Title planning implementation to the ready to be operated.

The Third Section Evaluation Section 26

(1) The Government Instancy must conduct an evaluation of the implementation of the Prograity; c. persandian users; d. Interuser interface for interuser; e. Human power source code; f. Password equipment; g. transmission media; and h. budget.

(3) Lemsaneg uses the resource inventory output as referred to in paragraph (2) as the analytical material needs in the planning of External JKS Title.

(4) External JKS Title Planning as contemplated on verse (3) includes: a. JKS External design; b. password system key management; and c. Budget needs.

(5) External JKS Design as referred to in paragraph (4) the letter a, consists of: a. Persandian User Communication Topology; b. The Password tool used; and c. the telecom infrastructure used.

(6) Lemsaneg compiled the External JKS Title planning as referred to in paragraph (4) in the form of an External JKS Title plan.

(7) Instancy The government that will hold the External JKS compiling the work reference framework and the budget m Internal JKS Title.

(2) Evaluation of the Internal JKS Title as referred to in paragraph (1) Includes activities: a. Assessment of the IBM Software as a Service (s) and/or IBM Software as a Service (s). Utilization assessment and effectiveness of JKS Internal utilization.

CHAPTER V SPECIAL JKS TITLE

Section Of Planning

Section 27 (1) Government Instancy that will hold the Special JKS mandatory

deliver the Title Request JKS Special to Lemsaneg.

www.djpp.depkumham.go.id

2010, No. 292 11

(2) Lemsaneg is compiling a Special JKS Title planning based on the Government Instancy requirement.

(3) Special JKS Title Planning as referred to in paragraph (2) includes: a. Special JKS design; b. password system key management; and c. budget needs.

(4) Special JKS Design as referred to in paragraph (3) letter a, consists of: a. Persandian User Communication Topology; b. The Password tool used; and c. the telecom infrastructure used.

(5) Lemsaneg composed the Special JKS Title planning as referred to in paragraph (3) in the form of a Special JKS Title Plan proposal.

(6) Instancy The Government that will hold the Special JKS compiling the work reference framework and the budget details of the JKS Degree fee based on the Special JKS Title Plan proposal that has been compiled by Lemsaneg.

Second Section Implementation

Article 28 Lemsaneg together Government agencies carry out the implementation of Special JKS Title based on the proposal A Special JKS Title Plan has been compiled.

Article 29 Implementation of the Special JKS Title as referred to in Article 28, includes activities: a. The telecommunications infrastructure is used; b. Password system key setup; c. Appliance setup; and d. Special JKS Title Operations.

Section 30 (1) Government Instancy and/or Lemsaneg conducting infrastructure preparation

the telecom used as referred to in Article 29 of the letter a.

www.djpp.depkumham.go.id

2010, No. 292 12

(2) The telecommunications infrastructure used as referred to in paragraph (1) may use existing infrastructure or build new infrastructure.

Article 31 In terms of infrastructure The telecommunications used as referred to in Article 29 of the letter a using the existing infrastructure then the provisions of its use are only for Special JKS interests.

Article 32 In terms of the telecom infrastructure used as referred to in Article 29 of the letter a build new infrastructure then must meet the requirements: a. Paying attention to the communication data topology. in accordance with the type of Password Appliances used; c. pay attention to network security factors.

Article 33 Lemsaneg performs a key setup of the password system as referred to in Article 29 of the letter b consisting of activities: a. the key creation of a password system based on the password system key management

which has been created; and b. Key administration of the password system includes logging, duplication, distribution,

and password-system key extermination. Section 34

Lemsaneg does the setup of the Password Equipment as referred to in Article 29 of the letter c which is composed of activities: a. Determination of the Password Tool used; b. The Password test; and c. do settings of the Password parameter.

Section 35 Operational External JKS Title as referred to in Section 29 of the d. ready to be operated.

www.djpp.depkumham.go.id

2010, No. 292 13

Third Section Evaluation Section 36

(1) Lemsaneg authorized the evaluation of Special JKS Title in the field after the implementation of Special JKS Title was completed.

(2) Evaluation of Special JKS Title as referred to in paragraph (1) includes activities: a. The assessment of the agreement between implementation with the planning of the Title

Special JKS; b. Assessment of the efficiency and effectiveness of Special JKS utilization.

BAB VII CLOSING provisions

Section 37 of the State Code Chief Regulation shall apply to the specified date. In order for everyone to know, ordered the invitational of the State Code Head Regulation with its placement in the State News of the Republic of Indonesia.

Specified in Jakarta on 10 June 2010 THE HEAD OF THE COUNTRY ' S PASSWORD AGENCY REPUBLIC OF INDONESIA, WIRJONO BUFORBIDDEN SO

promulred in Jakarta on 17 June 2010 MINISTER OF LAW AND HUMAN RIGHTS REPUBLIC OF INDONESIA,

PATRIALIST AKBAR

www.djpp.depkumham.go.id