| Literature DB >> 26404673 |
Kit Huckvale1, José Tomás Prieto2, Myra Tilney3, Pierre-Jean Benghozi4, Josip Car5,6.
Abstract
BACKGROUND: Poor information privacy practices have been identified in health apps. Medical app accreditation programs offer a mechanism for assuring the quality of apps; however, little is known about their ability to control information privacy risks. We aimed to assess the extent to which already-certified apps complied with data protection principles mandated by the largest national accreditation program.Entities:
Mesh:
Year: 2015 PMID: 26404673 PMCID: PMC4582624 DOI: 10.1186/s12916-015-0444-y
Source DB: PubMed Journal: BMC Med ISSN: 1741-7015 Impact factor: 8.775
Fig. 1A ‘man-in-the-middle’ attack. A man-in-the-middle attack is able to intercept network traffic sent by a mobile app in a way that is invisible to users and services
Basic characteristics of included apps
| Characteristic | Apps with characteristic, n = 79 (%) |
|---|---|
| Platform | |
| Both platforms | 38 (48 %) |
| iOS-only | 37 (47 %) |
| Android-only | 4 (5 %) |
| Cost | |
| Free | 58 (73 %) |
| Paid-for | 21 (27 %) |
| Version history | |
| First releases | 17 (22 %) |
| Older | 62 (78 %) |
| App purposesa | |
| Information provision | 46 (58 %) |
| Healthy living and health promotion | 21 (27 %) |
| Exercise and weight loss | 8 (10 %) |
| Smoking cessation | 6 (8 %) |
| Alcohol use | 8 (10 %) |
| Drug use | 5 (6 %) |
| Sexual health | 5 (6 %) |
| Self-management | 16 (20 %) |
| Long-term conditions | 10 (13 %) |
| Diabetes | 5 (6 %) |
| Hypertension | 2 (3 %) |
| Otherb | 5 (6 %) |
| Therapy-related management | 11 (14 %) |
| Self-assessment | 9 (11 %) |
| Diary or personal health record | 27 (34 %) |
| Medication management | 3 (4 %) |
| Reminders | 4 (5 %) |
| Assistive technologies | 4 (5 %) |
| Service directory or finder | 9 (11 %) |
| Social networking | 4 (5 %) |
| Collecting data for research | 6 (8 %) |
aMost apps supported multiple functions and are counted more than once; bepilepsy (n = 1), irritable bowel syndrome (n = 1), Parkinson’s disease (n = 1), sickle cell anemia (n = 1), stroke (n = 1)
Security vulnerabilities affecting data storage and transmission
| Security vulnerability class [ | Type | All apps, n = 79 (%) |
|---|---|---|
| Insecure data storage | Unencrypted data storage (of any data) | 73 (92 %) |
| Unencrypted username/password | 8 (10 %) | |
| Unencrypted personal or sensitive informationa | 42 (53 %) | |
| Insufficient transport layer protection | Identifying information sent without encryptionb | 23 (29 %) |
| Sensitive information sent without encryption | 6 (8 %) | |
| Unintended data leakage | Username/password captured in network cache or log | 2 (3 %) |
| Health-related information sent to third parties | 8 (10 %) | |
| Fixed device identifier used as user identifier | 9 (11 %) | |
| Weak server-side controls | Unencrypted access to server-side API | 16 (20 %) |
| Access to user data without authorization | 2 (3 %) |
aExcluding username and password; bconsidering strong identifiers only
Availability of policy disclosures
| Apps collecting data | Apps transmitting data | ||||
|---|---|---|---|---|---|
| Policy | All apps, n = 79 (%) | Any data, n = 70 (%) | Personal or sensitive dataa, n = 59 (%) | Any data, n = 70 (%) | Personal or sensitive dataa, n = 38 (%) |
| Privacy disclosure available | 53 (67 %) | 50 (71 %) | 43 (73 %) | 49 (70 %) | 31 (82 %) |
| In-app privacy policy | 22 (28 %) | 22 (31 %) | 21 (36 %) | 22 (31 %) | 15 (39 %) |
| Other privacy policy | 48 (61 %) | 45 (64 %) | 38 (64 %) | 44 (63 %) | 29 (76 %) |
| Policy mentions app | 8 (10 %) | 8 (11 %) | 5 (8 %) | 8 (11 %) | 5 (13 %) |
| Advertising policy | 3 (4 %) | 3 (4 %) | 3 (5 %) | 3 (4 %) | 3 (8 %) |
| No privacy disclosure | 26 (33 %) | 20 (29 %) | 16 (27 %) | 21 (30 %) | 7 (18 %) |
| In-app clinical disclaimer | 36 (46 %) | 32 (46 %) | 26 (44 %) | 33 (47 %) | 13 (34 %) |
aIncorporates strong personal identifiers, health-related information and other sensitive information
Coverage of privacy and security-related topics in privacy policies
| Apps with a privacy policy | ||||||
|---|---|---|---|---|---|---|
| Apps collecting data | Apps transmitting data | |||||
| Domain | Topic | All apps, n = 53 (%) | Any data, n = 50 (%) | Personal or sensitive dataa, n = 43 (%) | Any data, n = 49 (%) | Personal or sensitive dataa, n = 31 (%) |
| Uses of data | Primary uses of collected data | 46 (87 %) | 43 (86 %) | 36 (84 %) | 43 (88 %) | 28 (90 %) |
| Secondary uses of collected data | 31 (58 %) | 29 (58 %) | 25 (58 %) | 30 (61 %) | 20 (65 %) | |
| Sending data to developer-provided online services | 21 (40 %) | 21 (42 %) | 18 (42 %) | 21 (43 %) | 17 (55 %) | |
| Sending data to advertisers/marketers | 6 (11 %) | 6 (12 %) | 6 (14 %) | 6 (12 %) | 6 (19 %) | |
| Sending data for analytics/research | 19 (36 %) | 18 (36 %) | 14 (33 %) | 19 (39 %) | 16 (52 %) | |
| Sending data while loading content | 5 (9 %) | 5 (10 %) | 4 (9 %) | 5 (10 %) | 3 (10 %) | |
| Anonymous uses only | 8 (15 %) | 7 (14 %) | 7 (16 %) | 8 (16 %) | 4 (13 %) | |
| Technical concerns | Technical and procedural security arrangements | 28 (53 %) | 26 (52 %) | 22 (51 %) | 27 (55 %) | 15 (48 %) |
| How long data will be retained | 9 (17 %) | 9 (18 %) | 7 (16 %) | 9 (18 %) | 6 (19 %) | |
| Inherent risks or limitations of security on mobile device/internet | 19 (36 %) | 18 (36 %) | 14 (33 %) | 19 (39 %) | 11 (35 %) | |
| The use of cookies | 42 (79 %) | 39 (78 %) | 33 (77 %) | 38 (78 %) | 25 (81 %) | |
| User rights | Procedures for opting out of data sharingb,c | 30 (61 %) | 28 (56 %) | 25 (58 %) | 30 (61 %) | 19 (61 %) |
| Consequences of not providing or sharing dataa | 15 (31 %) | 15 (30 %) | 13 (30 %) | 15 (31 %) | 8 (26 %) | |
| Procedures for subject access requestsb,c | 14 (29 %) | 14 (28 %) | 10 (23 %) | 14 (29 %) | 9 (29 %) | |
| Procedures for editing data held by developers/third partiesb,c | 29 (59 %) | 27 (54 %) | 23 (53 %) | 29 (59 %) | 17 (55 %) | |
| Procedures for deleting data held by developers/third partiesb,c | 15 (31 %) | 14 (28 %) | 14 (33 %) | 15 (31 %) | 10 (32 %) | |
| Complaints proceduresc | 28 (53 %) | 27 (54 %) | 24 (56 %) | 28 (57 %) | 17 (55 %) | |
| Special procedures for handling data for vulnerable users | 9 (17 %) | 9 (18 %) | 8 (19 %) | 9 (18 %) | 6 (19 %) | |
| Administrative details | Identify data controller or responsible legal entity | 16 (30 %) | 16 (32 %) | 14 (33 %) | 16 (33 %) | 10 (32 %) |
| Legal jurisdiction governing policy | 27 (51 %) | 26 (52 %) | 23 (53 %) | 26 (53 %) | 17 (55 %) | |
| Jurisdictions under which data will be processeda | 13 (27 %) | 13 (26 %) | 11 (26 %) | 13 (27 %) | 8 (26 %) | |
| Date of policy | 8 (15 %) | 7 (14 %) | 5 (12 %) | 8 (16 %) | 3 (10 %) | |
| Date of next review | 0 (0 %) | 0 (0 %) | 0 (0 %) | 0 (0 %) | 0 (0 %) | |
| Procedures for changing the terms of the policy | 17 (32 %) | 17 (34 %) | 14 (33 %) | 17 (35 %) | 11 (35 %) | |
aIncorporates strong personal identifiers, health-related information and other sensitive information; bbecause these topics are only relevant for apps that transmit data, the denominator for calculated percentages is the number of apps with a privacy policy that also transmit data; cfor these domains, policies were additionally examined to distinguish between rights afforded to individuals and those denied. However, in no case did a policy text mention a user right only to deny it