Item request has been placed!
×
Item request cannot be made.
×
Processing Request
The Concept of Cloud Computing for Notary Protocol Storage Reviewed from the Secrets of the Notary Position.
Item request has been placed!
×
Item request cannot be made.
×
Processing Request
- Additional Information
- Abstract:
This research is motivated by the problems and difficulties in storing the Notary Protocol, where it must provide a sufficient place and protect it from the risk of loss or damage due to fire, theft, or force majeure. Cloud computing-based Notary Protocol Storage is the solution to the problem. This study aims to analyze the implementation of the Notary Protocol based on cloud computing associated with the Secrets of the Notary Position regulated in Law Number 2 of 2014 concerning Amendments to the 2004 Law on the Notary Position (UUJN). This research was conducted using a doctrinal approach, with an explanatory type of research that used secondary data obtained from literature and document studies. The data obtained is analyzed qualitatively; the collected data is systematically calcified according to each category and then analyzed to answer the main problem. The results of this study show that the cloud computing system will facilitate and overcome the risk of loss or damage to archives stored in the Notary Protocol, and the use of cloud computing can be done without violating the Notary Secret, but it is better than the service provider is the party organized by the Notary Supervisory Council (MPN), and for the weaknesses and risks owned by the cloud computing system, the storage of the Notary Protocol should be carried out in conjunction with manual storage either by conventional (paper) and/or by backing up on a private server. [ABSTRACT FROM AUTHOR]
- Abstract:
Copyright of Asian Journal of Engineering, Social & Health (AJESH) is the property of Global Publisher and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
No Comments.