Public Security vs Personal Privacy: Analysis of PeduliLindungi from Open Government and Surveillance State Perspectives


The COVID-19 pandemic has driven the development of the implementation of surveillance states in various countries worldwide. As various countries go all out to control the spread of the pandemic, the central pillar used in controlling the pandemic is tracking social mobility and collecting citizen data on a massive scale. The development of digital surveillance during the COVID-19 pandemic has increasingly heated the debate regarding the dilemma between public security and citizens’ privacy. Indonesia’s PeduliLindungi is a mobile phone application that played a central role as the instrument for pandemic surveillance. This study aims to analyze PeduliLindungi as the object of research. The analysis focuses on whether PeduliLindungi is more likely based on the principles of open government or surveillance state. This study concludes that when viewed based on the features of the PeduliLindungi application, the terms and conditions of use of the application, to the privacy policy applied by the PeduliLindungi application, the PeduliLindungi application is more oriented toward open government rather than a surveillance state.

Keywords: pandemic COVID-19, public security, personal privacy, PeduliLindungi, open government, surveillance state

[1] Schwab K. The fourth industrial revolution [Internet]. World Economic Forum; 2017 [cited 2022 Sep 4]. Available from:

[2] Berdykulova GM, Sailov A, Kaliazhdarova S et al. The emerging digital economy: case of Kazakhstan. Procedia Soc Behav Sci. 2014;109:1287–1291. https://doi:10.1016/j.sbspro.2013.12.626

[3] Tierney T. The public space of social media: connected cultures of the network society. 1st Ed. London: Routledge; 2013.

[4] Clegg SR. The end of bureaucracy in Reinventing hierarchy and bureaucracy–from the bureau to network organizations. Diefenbach T, Todnem R, editor. Research in the Sociology of Organizations. Emerald Group Publishing Limited. 2012;35:59-84.

[5] Castells M. An introduction to the information age. City. 1997;2(7):6-16. DOI: 10.1080/13604819708900050

[6] Gasco-Hernandez M. Open government: opportunities and challenges for public governance. Bolívar M, editor. Springer Science & Business Media. 2014; 4.

[7] Welchman L. Managing Chaos: Digital governance by design. New York, USA: Rosenfeld Media; 2015.

[8] World Bank. World Development Report 2009: Reshaping Economic Geography [Internet]. Washington DC: World Bank; 2009 [cited 2022 Sep 5]. Available from:

[9] Kalvet T. Innovation: A factor explaining e-government success in Estonia. Electronic Government, An International Journal. 2012;9(2):142–157. https://doi:10.1504/EG.2012.046266

[10] Kitsing M. Success without strategy: E-Government development in Estonia. Policy and Internet. 2011;3(1):86–106. DOI:10.2202/1944-2866.1095.

[11] Sai AA, Boadi P. A bundled approach to explaining technological change: The case of e-Estonia. Eur J Bus Manag. 2017;9(30):1–17.

[12] Marx GT. Ethics for the New Surveillance. The Information Society. 1998;144(3):171-185. DOI: 10.1080/019722498128809

[13] Dirks E, Leibold, J. Genomic surveillance: Inside China’s DNA Dragnet [Internet]. Barton: Australian Strategic Policy Institute; 2020 [cited 2022 Sep 6]. Available from:

[14] Hoffman S. Engineering global consent: The Chinese Communist Party’s data-driven power expansion [Internet]. Barton: Australian Strategic Policy Institute; 2019 [cited 2022 Sep 6]. Available from:

[15] WHO. Preventing and managing COVID-19 across long-term care services. WHO [Internet]. 2020 July 24 [cited 2022 Sep 6]. Available from:

[16] Olivia S, Gibson J, Nasrudin R. Indonesia in the time of Covid-19. Bulletin of Indonesian Economic Studies. 2020;56(2):143–174. doi: 10.1080/00074918.2020.1798581

[17] UNCTAD. China’s structural transformation what can developing countries learn? New York: United Nations Publications; 2022.

[18] Ünver HA. Politics of Digital Surveillance, National Security and Privacy. Centre for Economics and Foreign Policy Studies [Internet]; 2018 [cited 2022 Sep 8]. Available from:

[19] Kampmark B. The pandemic surveillance state: an enduring legacy of COVID-19. J Glob Faul. 2020;7(1)59–70. doi: 10.13169/jglobfaul.7.1.0059

[20] Kopec A, Sheldrick, B. The adoption of open government by local governments in Canada: Obstacles and possibilities. Can J Urban Res. 2020;29(1)70–93.

[21] Shkabatur J. Transparency with(out) accountability: Open government in the United States. Yale Law Policy Rev. 2012;31(1):79–140.

[22] Evans AM, Camp A. Open Government Initiatives: Challenges of citizen participation. J Policy Anal Manag. 2013;32(1):172–185. doi: 10.1002/pam.21651

[23] Meer, Gelders D, Rotthier S. e-Democracy: Exploring the Current Stage of e-Government. J Info Policy. 2012;4(2014):489–506.

[24] Wanna J. Opening government: Transparency and engagement in the information age. In Opening Government. Wanna J, Vincent S, editor. Canberra, Australia: ANU Press; 2018. p. 3–24.

[25] Homan T, Pasquale A, Onoka K, Kiche I, Hiscox A, Mweresa C, et al. Profile: The Rusinga health and demographic surveillance system, Western Kenya. Int J Epidemiol. 2016;45(3): 718–727. doi: 10.1093/ije/dyw072

[26] Calvert G M, Higgins SA. Using surveillance data to promote occupational health and safety policies and practice at the state level: A Case Study. Am J Ind Med. 2010;53(2):188–193. doi: 10.1002/ajim.20707

[27] Richards NM. The dangers of surveillance. Harv Law Rev. 2013;126(7):1934–1965.

[28] O’Connor N, Lange A, Lange A. Privacy in the digital age. Great decisions [Internet]; 2015:17–28 [cited 2022 Sep 8]. Available from:

[29] Miyamoto I. Mass surveillance and individual privacy. Asia-Pacific Center for Security Studies [Internet]; 2020 [cited 2022 Sep 8]. Available from

[30] Creswell JW, Poth CN. Qualitative inquiry and research design (choosing among five approaches). 4th ed. California: SAGE Publication, Inc; 2018.

[31] Decree of the Minister of Communication and Information Number 171 of 2020 concerning Determination of PeduliLindungi Applications in the Context of Implementing Health Surveillance for Handling Corona Virus Disease 2019 (COVID-19) (INA)

[32] Decree of the Minister of Communication and Information Number 253 of 2020 (INA)

[33] PeduliLindungi. PeduliLindungi Privacy Policy. PeduliLindungi [Internet]. 2022 Aug 8 [cited 2022 Sep 10]. Available from:

[34] Decree of the Minister of Communication and Information Number 459 of 2021 (INA)

[35] Andarningtyas N. Exploring the features of the PeduliLindungi application. Antaranews [Internet]. 2021 Sep 4 [cited 2022 Sep 9]. Available from:

[36] PeduliLindungi. @PLindungi [Internet]. Twitter. What's new in PeduliLindungi January-March 2022; 2022 Mar 22. 2022 [cited 2022 Sep 9]. Available from:

[37] Wijayanto H, Daryono D, Nasiroh S. Forensic analysis on the Peduli Lindungi application against leakage of personal data. J Info Comm Technol (TIKomSiN). 2021;9(2):11–18, 2021. doi: 10.30646/tikomsin.v9i2.572

[38] Rokom. PeduliLindungi Has Prevented Millions of Residents from Being Exposed to COVID-19. Sehat Negeriku, Ministry of Health of the Republic of Indonesia [Internet]. 2022 Apr 26 [cited 2022 Sep 10]. Available from:

[39] PeduliLindungi. PeduliLindungi Terms of Use. PeduliLindungi [Internet]. 2022 Aug 8 [cited 2022 Sep 10]. Available from:

[40] Alfarizi MK, Wuragil Z. List of PeduliLindungi Application User Complaints and Recommendations for Improvement. 2021 Sep 10 [cited 2022 Sep 10]. Available from:

[41] Mustopa A, Anna H, Pratama E, Hendini A, Risdiansyah D. Analysis of user reviews for the PeduliLindungi Application on Google Play Using the Support Vector Machine and Naive Bayes Algorithm Based on Particle Swarm Optimization. 2020 Fifth International Conference on Informatics and Computing (ICIC). 2020;2:1–7. doi: 10.1109/ICIC50835.2020.9288655

[42] Herdiana D. Peduli Lindungi Application: Community protection in accessing public facilities during the implementation of PPKM Policy. JIP: Jurnal Inovasi Penelitian. 2021;2(6):1685–1694. doi: 10.47492/jip.v2i6.959

[43] Liu J, Zhou S. Application research of data mining technology in personal privacy protection and material data analysis. Integrated Ferroelectrics. 2021;216(1):29–42. doi: 10.1080/10584587.2021.1911255

[44] Freeman EH. The telegraph and personal privacy: A historical and legal perspective. EDPACS (The EDP Audit, Control, and Security Newslette). 2012;46(6):9–20. doi: 10.1080/07366981.2012.750531

[45] Nugroho AA, Winanti A, Surahmad S. Personal data protection in Indonesia: Legal Perspective. International Journal of Multicultural and Multireligious Understanding. 2020;7(7):183–189. doi: 10.18415/ijmmu.v7i7.1773

[46] Rosadi S. Protecting privacy on personal data in digital economic era: Legal framework in Indonesia. Brawijaya Law J. 2018;5(1):143–157. doi: 10.21776/ub.blj.2018.005.01.09

[47] Ministry of State Apparatus Empowerment and Bureaucratic Reform of the Republic of Indonesia. These are the Benefits of the PeduliLindungi Application that are Not Widely Known. Menpan [Internet]. 2021 Sep 10 [cited 2022 Sep 11]. Available from:

[48] The 1945 Constitution of the Republic of Indonesia (INA)

[49] Law Number 19 of 2016 concerning Information and Electronic Transactions (INA)

[50] Government Regulation Number 71 of 2019 concerning the Implementation of Electronic Systems and Transactions (INA)

[51] Gobel T, Suud Y. Ini Hasil Evaluasi BSSN terhadap Aplikasi Covid-19 PeduliLindungi. [Internet]. 2020 Jun 29 [cited 2022 Sep 16]. Available from:

[52] Thaher I. Legal politics: Personal data protection on the PeduliLindungi application in Indonesia. Tambusai J Edu [Internet]. 2022;6(1):1065–1072 [cited 2022 Sep 17]. Available from:

[53] Yusuf. Minister of Communication and Informatics: PDP Bill Passed, Kominfo Oversees PSE Personal Data Governance. Directorate General of Informatics Applications, Ministry of Communication and Informatics of the Republic of Indonesia [Internet]. 2022 Sep 20 [cited 2022 Sep 24]. Available from:

[54] BBC News Indonesia. Personal Data Protection Law passed, but observers say its implementation has the potential to be a 'paper tiger'. BBC News Indonesia [Internet]. 2022 Sep 21 [cited 2022 Sep 25]. Available from:

[55] Jannah LM. UU Perlindungan Data Pribadi dan Tantangan Implementasinya. Fakultas Ilmu Administrasi Universitas Indonesia [Internet]. 2022 Sep 21 [cited 2022 Sep 25]. Available from:

[56] Nurhidayati N, Sugiyah S, Yuliantari K. Personal data protection settings in the use of Pedulilindungi Application. Widya Cipta: Journal of Secretariat and Management. 2021;5(1):39–45. doi: 10.31294/widyacipta.v5i1.9447

[57] Djafar W. Personal data protection in Indonesia: Landscape, urgency, and need for renewal,” public lecture "legal challenges in the era of big data analysis". Postgraduate Program, Faculty of Law, Gadjah Mada University. 2019;1(1):147–154.

[58] Dewi NK, Budiartha I, Subamia I. Responsibility of application health service providers Pedulilindungi Towards the Security of Consumer Personal Data. Journal of Legal Preferences. 2022;3(2):407–412. doi: 10.55637/jph.3.2.4952.407-412

[59] Dewi IR. Making Republic of Indonesia Excited, What Data Was Leaked by Bjorka Hackers? CNBC Indonesia [Internet]. 2022 Sep 14 [cited 2022 Sep 26]. Available from:

[60] Indriani RM. List of 7 'Secret' data leaked by Bjorka so far, shocking! [Internet]. 2022 Sep 12 [cited 2022 Sep 26]. Available from:

[61] Agustini P. Pemerintah Jamin Sistem PeduliLindungi Aman. Direktorat Jenderal Aplikasi Informatika, Kementerian Komunikasi dan Informatika Republik Indonesia [Internet]. 2021 Sep 9 [cited 2022 Sep 26]. Available from:

[62] Olivia D, Rosadi S, Permata R. Protection of personal data in the implementation of the Pedulilindungi and Covidsafe Health Surveillance Applications in Indonesia and Australia. DATIN: Law Jurnal. 2020;1(2):1–15. doi: 10.36355/dlj.v1i2.453