Claim Missing Document
Check
Articles

Found 2 Documents
Search

Hak Kreditur Pemegang Jaminan pada Perseroan Terbatas yang Dinyatakan Pailit Efraint Pangondian Sinaga; Nadia Maulisa
SIGn Jurnal Hukum Vol 4 No 1: April - September 2022
Publisher : CV. Social Politic Genius (SIGn)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37276/sjh.v4i1.171

Abstract

This study aims to analyze and explain the position of creditors as holders of the pledge of shares of a Limited Liability Company declared bankrupt. This study also aims to determine the legal remedies creditors can take if they experience these problems. This study uses a normative juridical research method with a statute and conceptual approach. The data was collected using literature study techniques on primary, secondary, and tertiary legal materials. The collected legal materials are then analyzed using qualitative data analysis methods. The results show that the position of creditors as holders of the pledge of shares of a Limited Liability Company declared bankrupt is preferred creditors. However, the position of creditors will mutatis mutandis change from preferred creditors to concurrent creditors because the collateral object no longer exists. In addition, creditors can make efforts as holders of the pledge of shares related to Limited Liability Company declared bankrupt, namely preventive and repressive efforts. However, repressive efforts are insufficient to provide justice, certainty, and legal protection to creditors as holders of the pledge of shares. Therefore, it is recommended to creditors as holders of the pledge of shares to make preventive efforts: authentic deed, authorization letter to sell the collateral object, adding another collateral object, and auditing prospective debtors and collateral objects. In addition, it is recommended for the Government to harmonize and regulate several applicable laws and regulations regarding the pledge of shares. In this case, creditors as holders of the pledge of shares have more power, certainty, and legal protection in the pledge of shares agreement in the future.
GOING DIGITAL RUPIAH: SOME CONSIDERATIONS FROM SOVEREIGNTY AND CYBERSECURITY PERSPECTIVES Zahrashafa Mahardika; Rizky Banyualam Permana; Nadia Maulisa
Journal of Central Banking Law and Institutions Vol. 2 No. 1 (2023)
Publisher : Bank Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21098/jcli.v2i1.42

Abstract

Central banks worldwide are coming to terms with the bits and bytes of digital money, commonly referred to as Central Bank Digital Currency (CBDC). CBDC has been claimed to be safer, more secure, and inherently less volatile, unlike cryptocurrencies, as it is issued and regulated by central banks. The development of digital currency not only emerged in, and isolated developed countries’ monetary policy but also came from the emerging markets. However, the policy and academic discussion on CBDC is clouded as only a significant minority of states have instituted it. From a regulatory point of view, the basic concept of CBDC is still significantly understudied. Among the emerging scholarship, there remains a paucity of study on the (legal) aspects of cybersecurity risk and resilience of the proposed CBDC. This paper explores the role of Bank Indonesia (BI), as the central bank, in implementing CBDC and conducts a preliminary expose associated with cybersecurity risks. This paper shows that CBDC understood as not only usage of Digital Ledger Technologies, (DLTs), but in all models of electronic payment. There are diverging models for the implementation of CBDC, some models involve multiple actors and electronic systems. However, as a currency the Central Bank would ultimately bear the liability for each transaction. Therefore, it is important for BI, as the central bank, consider cybersecurity risks associated with the implementation of CBDC. Cybersecurity risks in the financial sectors including CBDC, is the potential disruption caused by cyber-attacks, IT failures, personnel, and physical or infrastructure security risks.