| Literature DB >> 32459640 |
Jaime Benjumea1, Jorge Ropero1, Octavio Rivera-Romero1, Enrique Dorronzoro-Zubiete1, Alejandro Carrasco1.
Abstract
BACKGROUND: Privacy has always been a concern, especially in the health domain. The proliferation of mobile health (mHealth) apps has led to a large amount of sensitive data being generated. Some authors have performed privacy assessments of mHealth apps. They have evaluated diverse privacy components; however, different authors have used different criteria for their assessments.Entities:
Keywords: apps; data privacy; mHealth; mobile phone; privacy; privacy assessment; review; security
Mesh:
Year: 2020 PMID: 32459640 PMCID: PMC7367524 DOI: 10.2196/18868
Source DB: PubMed Journal: JMIR Mhealth Uhealth ISSN: 2291-5222 Impact factor: 4.773
Figure 1Flow diagram of the search strategy.
General information from each article.
| Reference | Sourcea | App areas | Number of analyzed apps |
| Papageorgiou et al, 2018 [ | IEEE (Institute of Electrical and Electronics Engineers) Access (J) | Pregnancy and baby growth | 20 |
| Minen et al, 2018 [ | Headache (J) | Headache | 14 |
| Huckvale et al, 2019 [ | JAMA (Journal of the American Medical Association) Network Open (J) | Depression | 36 |
| Scott et al, 2015 [ | Australasian Journal of Information Systems (J) | General (top 20 mobile health [mHealth] apps) | 20 |
| Brüggemann et al, 2016 [ | Annual Privacy Forum (J) | Medical | 298 |
| Mense et al, 2016 [ | Studies in Health Technology and Informatics (BC) | Health and fitness | 20 |
| Hutton et al, 2018 [ | JMIR mHealth and uHealth (J) | Self-tracking | 64 |
| Zapata et al, 2014 [ | Annual International Conference of the IEEE Engineering in Medicine and Biology Society (C) | Personal health record | 24 |
| Sunyaev et al, 2015 [ | Journal of the American Informatics Association (J) | Medical | 600 |
| Leigh et al, 2017 [ | Evidence-Based Mental Health (J) | Chronic insomnia | 19 |
| Baumel et al, 2017 [ | Journal of Medical Internet Research (J) | Health-related behaviors | 84 |
| Bachiri et al, 2018 [ | Journal of Medical Systems (J) | Pregnancy | 19 |
| de las Aguas Robustillo Cortés et al, 2014 [ | Telemedicine and e-Health (J) | HIV/AIDS | 41 |
| Quevedo-Rodríguez and Wagner, 2019 [ | Endocrinología, Diabetes y Nutrición (J) | Diabetes | 42 |
| Knorr et al, 2015 [ | IFIP (International Federation for Information Processing) Advances in Information and Communication Technology (J) | Diabetes | 154 |
| Zapata et al, 2014 [ | RISTI (Revista Ibérica de Sistemas e Tecnologias de Informação) (J) | Personal health record | 24 |
| Bondaronek et al, 2018 [ | JMIR mHealth and uHealth (J) | Physical activity | 65 |
| O’Laughlin et al, 2019 [ | Internet Interventions (J) | Depression | 116 |
| Adhikari et al, 2014 [ | Australasian Conference on Information Systems (C) | General (top 20 mHealth apps) | 20 |
| Aliasgari et al, 2018 [ | IEEE Conference on Application, Information and Network Security (C) | General (top 25 mHealth apps) | 25 |
| Mense et al, 2016 [ | Modeling and Simulation in Medicine Symposium (C) | Health and fitness | 10 |
| Powell el al, 2018 [ | JMIR mHealth and uHealth (J) | Diabetes | 70 |
| Huckvale et al, 2015 [ | BMC (BioMed Central) Medicine (J) | General | 79 |
| Robillard et al, 2019 [ | Internet Interventions (J) | Mental health | 369 |
aSources include journal articles (J), conference papers (C), or book chapters (BC).
Procedure for evaluation of the apps.
| Reference | Area of assessment | Object of the assessment | Basis of the assessment criteria (includes legal framework) |
| Papageorgiou et al, 2018 [ | Privacy and security | In-app information | Authors |
| Minen et al, 2018 [ | Privacy | Static and dynamic analyses | Authors |
| Huckvale et al, 2019 [ | Privacy | In-app information | Literature |
| Scott et al, 2015 [ | Privacy and security | App properties and behavior | Literature |
| Brüggemann et al, 2016 [ | Privacy | App properties and behavior | Authors |
| Mense et al, 2016 [ | Privacy | App communications | Author |
| Hutton et al, 2018 [ | Privacy | App properties and behavior | Literature |
| Zapata et al, 2014 [ | Privacy | App properties and behavior | Literature |
| Sunyaev et al, 2015 [ | Privacy | Existence of a privacy policy | Authors |
| Leigh et al, 2017 [ | Multidimensional | In-app information | Legal |
| Baumel et al, 2017 [ | Multidimensional | Existence of a privacy policy | Literature |
| Bachiri et al, 2018 [ | Privacy | App properties and behavior | Literature |
| de las Aguas Robustillo Cortés et al, 2014 [ | Multidimensional | App properties and behavior | Recommendations or principles |
| Quevedo-Rodríguez and Wagner, 2019 [ | Multidimensional | App properties and behavior | Recommendations or principles |
| Knorr et al, 2015 [ | Privacy and security | Legibility of the privacy policy | Recommendations or principles |
| Zapata et al, 2014 [ | Privacy | App properties and behavior | Authors |
| Bondaronek et al, 2018 [ | Privacy and security | Existence of a privacy policy | Recommendations or principles |
| O’Laughlin et al, 2019 [ | Privacy | Existence of a privacy policy | Authors |
| Adhikari et al, 2014 [ | Privacy and security | App properties and behavior | Literature |
| Aliasgari et al, 2018 [ | Privacy and security | App communications | Legal |
| Mense et al, 2016 [ | Privacy and security | App communications | Authors |
| Powell el al, 2018 [ | Privacy | Existence of a privacy policy | Authors |
| Huckvale et al, 2015 [ | Privacy and security | App properties and behavior | Legal |
| Robillard et al, 2019 [ | Privacy | Existence of a privacy policy | Authors |
Criteria for evaluation of the apps.
| Reference | Criteria | Assessment of criteria |
| Papageorgiou et al, 2018 [ | Privacy policy: consent, user rights (ie, withdraw and portability), data protection officer, data collection, purpose, and transfer | Number of apps that meet the different criteria |
| Minen et al, 2018 [ | Account functionality | Number of apps that meet the different criteria |
| Huckvale et al, 2019 [ | Privacy policy availability | Percentage of apps that meet the different criteria |
| Scott et al, 2015 [ | User registration and authentication | Items 1-3: risk score (1 point if there is a risk); |
| Brüggemann et al, 2016 [ | Information-sharing targets (S), information transfer (T), and information collection (U) | PrivacyRiskScoreApp = TApp × w(T) + PApp × w(P) + LApp × w(L)+ SApp × w(S) + UApp × w(U) + RApp × w(R) |
| Mense et al, 2016 [ | Use of SSL and certificate pinning | Number of apps that meet the different criteria |
| Hutton et al, 2018 [ | Notice and awareness: data sharing, nature of data, and explanation of security measures | Most heuristics are valued as 0-2 (0, 1, or 2), though some have slightly different values (ie, 0/1, 0-3, or 0-4) |
| Zapata et al, 2014 [ | Privacy policy access and updates | All six items are valued as 0, 0.5, or 1 |
| Sunyaev et al, 2015 [ | Privacy policy availability | Number of apps that meet the different criteria |
| Leigh et al, 2017 [ | Data sharing | App privacy features (1-2) and privacy policy (3-8), with 1 point per question |
| Baumel et al, 2017 [ | Data communications, storage, and sharing | Eight items: 1 point if the app does not include the item |
| Bachiri et al, 2018 [ | Privacy policy location and updates | Number of criteria that are met (35 items) |
| de las Aguas Robustillo Cortés et al, 2014 [ | Data transmission and confidentiality | –1 (does not meet the criterion), 0 (not applicable), or 1 (meets the criterion) |
| Quevedo-Rodríguez and Wagner, 2019 [ | Nature and purpose of the information and data storing | Compliance with items: 2 (complies), 1 (partially complies), or 0 (does not comply) |
| Knorr et al, 2015 [ | Static and dynamic analyses and web connection | General compliance with the items |
| Zapata et al, 2014 [ | Notification: privacy policy access and updates, cookies, and use of safety standards | Compliance with items: 2 (complies), 1 (partially complies), or 0 (does not comply) |
| Bondaronek et al, 2018 [ | Privacy information: availability, accessibility, data collecting, data sharing, and data security | Number of apps that meet the different criteria |
| O’Laughlin et al, 2019 [ | Privacy policy availability, existence of a log-in process, and identification | Some of the items received a white, light-grey, or dark-grey score; other items received a white or light-grey score; 1 item received a white, light-grey, or black score |
| Adhikari et al, 2014 [ | User registration and authentication | Items 1-3: risk score (1 point if there is a risk); |
| Aliasgari et al, 2018 [ | SSL configuration | HIPAA compliance or not: the authors checked if the terms and conditions indicated HIPAA compliance, or they asked the app’s support team |
| Mense et al, 2016 [ | Encryption | Number of apps that meet the different criteria |
| Powell el al, 2018 [ | Privacy policy readability: word count, sentences per paragraph, words per sentence, characters per word, average number of sentences per 100 words, average words with 6 or more characters, Flesch Reading Ease, Flesch-Kincaid Grade Level, Gunning Fog Score, SMOG (Simple Measure of Gobbledygook) Index, Coleman Liau Index, Automated Readability Index, Fry Grade Level, and Raygor Estimate Graph Grade Level | Average score, median, or range for every item comparing diabetes apps vs mental health apps |
| Huckvale et al, 2015 [ | Privacy policy: availability and features | Percentage of apps that meet the different criteria |
| Robillard et al, 2019 [ | Collected information (ie, nature and types), use of information, and data sharing | Percentage of apps that meet the different criteria |
Items present in the assessment of criteria for each article.
| Item | Reference | |||||||||||||||||||||||
|
| [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ |
| Existence of a data controller | X |
| X |
|
|
| X |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| X |
|
| DPOa details are given | X |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Purposes of the processing are stated |
| X | X |
|
|
| X |
|
| X | X |
| X | X | X |
| X | X |
|
| X |
| X | X |
| Legal basis exists | X |
| X |
|
|
| X | X |
| X |
| X |
| X |
| X |
|
|
|
|
|
| X | X |
| Recipients of personal data are identified |
| X | X | X |
| X | X |
| X | X |
|
| X | X | X |
| X | X | X |
| X |
| X | X |
| International data transfers are disclosed | X |
|
|
|
| X |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Data storage period is stated |
|
| X |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| X |
|
| Existence of users’ data rights |
| X | X | X |
|
| X | X | X |
|
| X | X | X |
| X |
| X | X |
|
|
|
| X |
| Existence of the right to withdraw consent | X |
| X |
|
|
| X |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| X |
| Existence of the right to complain to a supervisory authority |
|
| X |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| X |
|
| Obligation to provide data |
|
| X |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| X |
|
| Existence of data processing and profiling |
|
|
|
|
|
|
|
|
|
|
|
|
| X |
|
|
|
|
|
|
|
|
|
|
| Nature of the collected information is disclosed |
| X |
|
| X | X | X |
|
|
| X |
| X | X |
|
|
|
|
|
|
|
|
| X |
| Risks of data collection and management of confidentiality breaches are stated |
|
|
|
|
|
|
|
|
| X | X |
|
|
|
|
|
|
|
|
|
|
|
|
|
| Location of the collected information is disclosed |
| X |
| X | X |
| X |
|
|
|
|
|
|
|
|
|
|
| X |
|
|
|
|
|
| User registration is required |
|
|
| X | X |
|
|
|
|
|
|
| X |
|
|
|
| X | X |
|
|
|
|
|
| Existence of a privacy policy | X | X | X | X |
|
|
|
| X | X | X | X |
|
| X |
| X | X | X |
|
|
| X |
|
| Privacy policy good practices | X |
| X |
|
|
|
| X | X |
|
| X |
|
| X | X | X |
|
|
|
| X | X |
|
| Minimum data needed for app functioning are collected |
|
|
|
|
|
|
|
|
| X |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Protection of minors and age of verification exists |
| X | X |
|
|
|
|
|
|
| X |
| X | X |
|
|
|
|
|
|
|
|
|
|
| Anonymization takes place |
| X | X |
|
|
|
|
|
|
| X | X |
|
|
|
| X |
|
|
|
|
|
| X |
aDPO: data protection officer.
Scoring methods used to assess apps.
| Reference | Score | Weighted score |
| Papageorgiou et al, 2018 [ | No | No, though there are “major issues” and “minor issues” |
| Minen et al, 2018 [ | No | N/Aa |
| Huckvale et al, 2019 [ | No | N/A |
| Scott et al, 2015 [ | Yes. Risk score: 0-3; safety score: 0-6 | No |
| Brüggemann et al, 2016 [ | Yes. Connection security (S), information-sharing targets (T), unspecific information transfer (U), information collection (R), and log-in (L) are binary. Personal information type (P) is more elaborated: 13 types are considered and a correction factor is applied. | Yes, it can be configured by the user |
| Mense et al, 2016 [ | No | N/A |
| Hutton et al, 2018 [ | The paper does not give a score but, rather, explains how different heuristics are implemented. However, it is easy to assign a score to every app with the available information. | N/A, although it can be calculated (see Scoring Method section above) |
| Zapata et al, 2014 [ | Yes: 0-6 | No |
| Sunyaev et al, 2015 [ | No | N/A |
| Leigh et al, 2017 [ | Yes: 0-8 | No |
| Baumel et al, 2017 [ | Yes: 0-8, with 0 points being maximum privacy | No |
| Bachiri et al, 2018 [ | Yes: 0-35 | No |
| de las Aguas Robustillo Cortés et al, 2014 [ | Yes, but it is a general app score, not only for privacy | Yes, weighted by experts |
| Quevedo-Rodríguez and Wagner, 2019 [ | Yes, but as part of the global app quality | No |
| Knorr et al, 2015 [ | No | N/A |
| Zapata et al, 2014 [ | Yes | No |
| Bondaronek et al, 2018 [ | No, at least for the privacy items | N/A |
| O’Laughlin et al, 2019 [ | Yes: acceptable, unacceptable, or questionable | No |
| Adhikari et al, 2014 [ | Yes. Risk score: 0-3; safety score: 0-5 | No |
| Aliasgari et al, 2018 [ | Yes. Although there is no global score, there are certain scores pertaining to Transport Layer Security (TLS) and Health Insurance Portability and Accountability Act (HIPAA) compliance. | No |
| Mense et al, 2016 [ | No | N/A |
| Powell el al, 2018 [ | Average score, median, and range for every item | No |
| Huckvale et al, 2015 [ | No | N/A |
| Robillard et al, 2019 [ | No | N/A |
aN/A: not applicable.