Published on 23.08.12 in Vol 14, No 4 (2012): Jul-Aug
Are Personal Health Records Safe? A Review of Free Web-Accessible Personal Health Record Privacy Policies
Background: Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users’ concerns regarding the privacy and security of their personal health information.
Objective: To analyze the privacy and security characteristics of PHR privacy policies. It is hoped that identification of the strengths and weaknesses of the PHR systems will be useful for PHR users, health care professionals, decision makers, and designers.
Results: The search of databases and the myPHR website provided a total of 52 PHR systems, of which 24 met our inclusion criteria. Of these, 17 (71%) allowed users to manage their data and to control access to their health care information. Only 9 (38%) PHR systems permitted users to check who had accessed their data. The majority of PHR systems used information related to the users’ accesses to monitor and analyze system use, 12 (50%) of them aggregated user information to publish trends, and 20 (83%) used diverse types of security measures. Finally, 15 (63%) PHR systems were based on regulations or principles such as the US Health Insurance Portability and Accountability Act (HIPAA) and the Health on the Net Foundation Code of Conduct (HONcode).
Conclusions: Most privacy policies of PHR systems do not provide an in-depth description of the security measures that they use. Moreover, compliance with standards and regulations in PHR systems is still low.
J Med Internet Res 2012;14(4):e114
- Personal health records;
- computer security;
- Health Insurance Portability and Accountability Act
In many countries, it is tedious for patients to obtain copies of their official health records from health care providers, which makes it difficult for patients to seek second opinions or control their own information . Moreover, records that patients create themselves tend not to be included in the official patient record. A personal health record (PHR) system can be maintained by patients and their families, can be shared with clinicians, and can support the maintenance of accurate and complete health records [ ].
A PHR is “an electronic record of an individual’s health information by which the individual controls access to the information and may have the ability to manage, track, and participate in his or her own health care” . A PHR should include all relevant information about the user’s life, including the following items: problem list, procedures, major illnesses, allergy data, home-monitored data, family history, social history and lifestyle, immunizations, medications, laboratory tests, and genetic information [ - ].
A PHR can take multiple forms: an independent software application running on a single computer; a Web service belonging to a single organization; a general Web service as a platform with which to collect different types of health information; or a USB-based PHR [, ]. Maintaining data privacy is difficult in both PHRs and electronic health records (EHRs) [ ], to the extent that, for instance, administrative staff could access information without the patient’s explicit consent [ ]. Consumer concerns regarding PHR systems were found to be focused on two major areas: privacy and security [ ]. A total of 91% of surveyed Americans stated that they were very worried about the privacy and security of their health information [ , ]. The aim of this review is to answer the following research question: What security and privacy features do PHR systems have? We carried out an in-depth analysis of many significant issues related to the security and privacy features of PHR privacy policies. The data collected were contrasted by analyzing the privacy aspects of 50% of PHR systems.
The methods used to carry out the review were guided by a protocol. Iterative decisions concerning data collection, fields for extraction, analysis, and other relevant aspects of the survey were discussed in meetings that were attended and documented by the authors.
Review and Protocol
This review followed the quality reporting guidelines set out in the Preferred Reporting Items for Systematic Reviews and Meta-analyses (PRISMA) statement .
Based on the International Organization for Standardization (ISO) standard ISO/TR 12773 (Business Requirements for Health Summary Records), a PHR is defined as an electronic, universally available, lifelong resource of health information maintained by individuals, as opposed to an EHR, which is a repository of health information gathered across the longitudinal electronic record of the patient. This information is generated by one or more encounters in any care delivery setting . Among the current variety of PHR support technologies, we focused our study on Web-based, free PHR systems. Free PHR systems can be used by anyone and are easiest to access (IC1). Web-based PHRs have certain benefits with regard to the use of the Internet (IC2) [ ]. Moreover, the US Institute of Medicine recommended that “access to care should be provided over the Internet, by telephone, and by other means in addition to in-person visits” [ ], while the 2003 Health Information National Trends Survey indicated that consumers use the Internet to access health information more often than they obtain this information from their health care professionals [ ]. In addition, the number of users who use the Internet to access and manage their PHR is increasing [ - ]. Finally, according to the ISO, the owner of the record in a PHR system can be the health care organization, provider, or patient [ ]. We also stipulated that the PHR systems included in the review should be patient-centered applications—that is, according to the definition of a PHR in the Health Insurance Portability and Accountability Act (HIPAA) [ ], the information should be totally or partially managed by the patient (IC3). We analyzed this type of PHR system because they are more flexible and useful than non-patient-centered PHR systems, although they can have more privacy and security problems.
We used two information sources: the myPHR website and scientific databases. The myPHR website was created by the American Health Information Management Association and contains information related to the use and creation of PHRs. To the best of our knowledge, this website provides the most comprehensive list of PHR systems that a user can find and has also been used to select PHR systems in multisource sampling . Although our primary source was myPHR, we identified other PHR systems by reading articles extracted from the Medline, ACM Digital Library, IEEE Xplore Digital Library, and ScienceDirect databases, which we searched between February and April 2011. A systematic review was then used to review the articles indexed in these databases.
PHR System Selection
The PHR system selection process was organized in the following six phases:
1. The search for PHR systems from the myPHR website.
2. The search for PHR systems from scientific databases. This phase was performed by means of a systematic review with the following search string: (“PHR providers” OR “Microsoft HealthVault” OR “Google Health”), which we adapted to database search engines. We next explored the articles identified in order to find the names of Web-based PHR systems.
3. Exploration of the PHR systems found, and a selection based on eligibility criteria IC1 and IC2.
5. A complete reading of each of the PHR privacy policies selected in the previous phase to extract their principal privacy and security characteristics.
Data Collection Process
In this study, we analyzed security and privacy of PHR systems in reference to the ISO 13606 standard . Security was analyzed in terms of availability, confidentiality, integrity, and accountability. According to the ISO 13606 standard (Electronic Health Record Communication Part 4: Security), availability refers to the “property of being accessible and useable upon demand by an authorized entity.” This standard defines confidentiality as the “process that ensures that information is accessible only to those authorized to have access to it.” Integrity refers to the duty to ensure that information is accurate and not modified in an unauthorized fashion. Accountability refers to a person’s right to criticize or ask why something has occurred. The other topic analyzed in this study, privacy, has been defined as “the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others” [ ]. The characteristics analyzed in the privacy policies allowed us to analyze how privacy, integrity, and confidentiality are maintained.
We designed a template for the data to be extracted from each PHR system. In total, 39 characteristics were analyzed and grouped into 12 categories, which we divided into privacy, security, and standards and regulations.shows the category descriptions. Some of the characteristics are dependent on others. A complete list of the characteristics analyzed is described in .
|Access management||Focuses on who shares the information, with whom it is shared, and types of permissions|
|Security: confidentiality and integrity|
|Data management||Considers who manages the information, what information is managed, and where this information comes from|
|Data accessed without user’s permission||Describes what data are shared without the user’s explicit consent for secondary use of the data (eg, for marketing, policy)|
|Access audit||Informs whether the user can trace with whom his or her information has been shared|
|Access criteria||Establishes whether the user is authorized to access the particular resource and what actions she or he is permitted to take with respect to that resource in accordance with certain access criteria|
|Authentication||Describes the method used to prevent identity theft|
|Safeguards||Presents what security measures are deployed by the PHR system|
|Standards and regulations|
|Standards or regulations||Describes whether the PHR system meets any standards or regulations|
Each of these categories satisfied one or more of the eight principles concerning privacy policies by the Canadian Standards Association . The categories, and the principles that they satisfy, are shown in .
The test-retest  method was used to measure the reliability of the measuring procedure. The same test was performed on the same PHR systems after a month. We obtained a correlation of 0.96 between the scores in the two assessments.
We identified 24 PHR systems in the review. The search of databases and the myPHR website provided a total of 52 PHR systems, but we discarded 11 because they did not satisfy IC1 and 13 because the did not satisfy IC2. The privacy policies of the remaining 28 PHR systems were examined, and 4 of these were discarded because they were not patient-centered PHR systems (IC3).shows a PRISMA flow diagram that summarizes this process. The PHR systems included in and discarded from the review are shown in .
In this section, we describe the most important features of the PHR systems included in the review.shows the percentage of PHR systems that satisfy each characteristic analyzed. [ - ] shows the systems selected for the study and the three scores assigned to each: security score, privacy score, and total score. More detailed information about the PHR systems analyzed is provided in the tables shown in . The percentages and the scores of the dependent characteristics were calculated in relation to the number of PHR systems that met the nondependent characteristic.
|Change notification on website||Change notification||12||86|
|Change notification directly||Change notification||3||21|
|User grants access||17||71|
|User grants access to health care professionals||User grants access||10||59|
|User grants access to people with other roles||User grants access||3||18|
|Kinds of permissions||5||21|
|Access in case of emergency||User grants access||6||35|
|User adds, modifies, removes, and updates information||20||83|
|Health care professionals update or add information||5||21|
|Family members’ data||User adds, modifies, removes and updates information||3||15|
|Connection with other PHRs||User adds, modifies, removes and updates information||4||20|
|Data accessed without user’s permission|
|Not accessed or information related to the user’s accesses||6||25|
|Who has accessed it||9||38|
|With what aim||Who has accessed it||2||22|
|Something the user has||1||4|
|Physical security measures||15||63|
|Electronic security measures||16||67|
|Defined data security plan||1||4|
|Standard or regulations|
a Health Insurance Portability and Accountability Act.
b Health on the Net Foundation Code of Conduct.
|PHR and reference||Security score||Privacy score||Total score|
|Microsoft HealthVault ||14||7||23|
|Google Health ||10||7||18|
|Juniper Health ||8||4||12|
|Health Butler ||7||3||11|
|My Doclopedia PHR ||5||5||11|
|Dr. I-Net ||7||3||11|
|My HealtheVet ||6||1||9|
|EMRy Stick ||5||2||7|
a Maximum possible scores: 14 (security score), 8 (privacy score), 24 (total score).
Only 5 of the PHR systems reviewed defined kinds of permissions. The Google Health PHR system  determined two access types for services or applications: write-only access and read/write access. The RememberItNow! PHR system [ ] defined three kinds of accesses: write, read, and administrator. Microsoft HealthVault [ ] established access levels for users and programs. The Healthy Circles PHR system [ ] defined read permission and read/write permission. PatientsLikeMe [ ] allowed the contents to be public (anyone could access them) or visible (only PatientsLikeMe users could access them). Finally, only 6 PHRs considered data access in case of an emergency. This access could be total [ ] or partial [ ].
Confidentiality and Integrity
PHRs contain information users’ personal data, which are managed by the user in 20 of the PHRs reviewed. However, MyChart indicated that its users could not manage their own data . Users could only notify the associated health care providers of incorrect data, but not modify them. MyChart was responsible for managing the data. The remainder of the PHR systems did not indicate whether users could manage their data.
A total of 12 PHR systems used aggregated information about users to publish trends or to improve their services [, , - , , , , , , , ]. Of the PHR systems reviewed, 3 could access users’ identifiable data without their consent [ , , ].
One mechanism that allowed users to verify whether data confidentiality and integrity were maintained is access audit. In this respect, 9 of the PHR systems permitted users to check who had accessed their data [, , , , , , , ], and 2 of them allowed users to verify what changes were made [ , ].
PHR systems also presented security measures to maintain data integrity and guarantee confidentiality. Of the PHR systems reviewed, 20 indicated whether they used physical or electronic security measures: 15 of them used physical security measures in their servers. On the other hand, we found 12 PHR systems that used encryption to protect the data during transmission [, , , , , , , , , ], and 4 also stored the data encrypted [ , , , ]. And 1, ZebraHealth [ ], stated that they regularly reviewed and revised data security plans as required by the evolution of technological and security needs. Some PHR systems even had a privacy seal: Microsoft HealthVault, Healthy Circles, Juniper Health, and dLife were certified by TRUSTe [ ].
To avoid unauthorized access of users’ records, an authentication system is required. The most widespread authentication system was the combination of a user ID with a password, which is something the user knows [- ]. Some PHR systems combined this with the use of an activation code that had been given to users previously [ , , , ]. Only 1 PHR used something the user has for authentication. To access MedsFile.com [ ], users had to enter the personal identification number on their access card.
As for the access criteria, the most common one was role-based access control [, , , , , , , - , , , ]. PHR systems allowed patients, health care providers, insurances, companies, etc, to access records. Access criteria based on location were applied by 1 PHR [ ]. This PHR changed the data shown, such as the list of health care providers, depending on the country from which the user accessed the system. Moreover, 2 PHRs enabled users to establish a period of validity for permissions, which were revoked once this period expired [ , ].
Standards and Regulations
Verification of the Information Contained in Privacy Policies
|Personal health record system||Kappa coefficient||Agreement level|
|My DoclopediaPHR||0.9||Almost perfect|
The main characteristics of the PHR systems reviewed are summarized below. These characteristics answer our research question of what security and privacy features PRH systems have.
What Security and Privacy Features do PHR Systems Have?
With regard to PHR access management, 71% of PHR systems allowed users to grant and revoke access to their data. This characteristic is particularly important because users require more flexible ways of sharing data, allowing the user to choose who can access their data, which data they can access, and at what level of access . A problematic issue is the access to users’ data in case of emergency—that is, when users cannot explicitly grant access. We found that 35% of PHRs considered this case and provided some type of mechanism to permit the appropriate health care professionals (previously authorized by the user) to access the user’s data. Some PHR systems, such as Microsoft HealthVault, allowed users to select what information could be shared and with whom in case of emergency. Nevertheless, emergency access increases the risk of data breaches. Some national laws assume implicit patient consent in an emergency situation [ ], which does not guarantee the privacy of patients’ data. Moreover, this unusual access adds an extra complexity level to the access control model [ ]. On the other hand, not all users are very inclined to share their data in a health emergency. Users with good or excellent health are less likely to share their data during this kind of situation [ ].
Confidentiality and Integrity
We examined patient-centered PHR systems in this review, and they allow users to manage their data. In other words, users can add, modify, remove, and update their health data in 83% of cases, according to our review. Connecting the PHR to the EHR would lead to more comprehensive data management by patients . However some physicians have expressed their concern about giving patients so much control over their records, because the information stored in PHRs might be less accurate if patients do not know what exactly is included in them, in comparison with non-patient-centered PHRs [ ]. Moreover, if a PHR is hacked—and the patient’s data are modified—then, physicians cannot be sure of the correctness of the data [ ]. When information comes from several sources, greater privacy and security risks emerge. However, determining the most appropriate strategy remains an open question: to have multiple reliable sources of information, or to have the patient be the only information source.
Few PHRs permit users to check who accessed their data. This aspect should be improved because, according to HIPAA’s Privacy Rule and Security Rule and to ISO 13606, users should be aware of how their information has been shared.
We found that 3 (13%) of PHR systems used information related to users’ accesses and identified user information to monitor system use without the user’s explicit consent. Since the users’ privacy should be guaranteed, their identifiable information should not be accessed without their consent . Half of the PHR systems used de-identified or aggregated user information. However, it is very difficult to retrieve sufficient information when aggregated data are used in order to ensure that patients cannot be identified, so some risk of re-identification will usually remain [ , ]. A further issue is that PHR privacy policies did not indicate what information they aggregated. PHR designers could consider studies such as that of Sweeney, who designed a model called k-anonymity, and the accompanying policies that allow the individual’s information to be protected, because this cannot be distinguished from, at least, k - 1 other individuals’ information [ ]. With regard to the information de-identification process, HIPAA indicates that there are two ways to do this: a formal determination by a qualified statistician, or the removal of specified identifiers of the individual and of the individual’s relatives, household members, and employers. Removal of identifiers is adequate only if the entity covered has no actual knowledge that the remaining information could be used to identify the individual. In any case, one of these two means is required [ ].
The PHR systems must take physical and electronic measures to protect user information . Of the PHR systems we analyzed, in their privacy policies, 63% indicated their physical measures and 67% explicitly stated their electronic security measures; however, only 4 (17%) stated that the data were encrypted both for transmission over the network and for storage. The most widely used encryption scheme for communications was secure socket layer. However, encryption is only part of the solution to protect data. There are also other threats, such as virus-infected systems, against which the PHR systems must be protected. Although there are no well-documented examples of EHR/PHR systems linked to security breaches [ ], designers should consider threats to Web applications at least when they deploy their PHR system. In 2008, over 63% of all documented vulnerabilities affected Web applications [ ].
Important for security vulnerability is authentication . All the PHR systems we analyzed used only one authentication method, the use of something the user knows or has. However, two of the following three methods are recommended for inclusion in an identification system: something a person knows, such as login ID; something a person has, such as an access card; or something that identifies a person, such as biometrics. Therefore, designers should incorporate another authentication system to strengthen authentication [ ]. Moreover, the use of passwords as an authentication mechanism is exposed to multiple types of attacks, such as electronic monitoring of network traffic to capture information, or unauthorized access to the password file.
Finally, 38% of the PHR systems used cookies to remember that the user had already logged in. Using cookies increases the likelihood of identity attacks because the cookie’s authentication data can be intercepted by a hacker to gain access to the user’s health data .
Standards and Regulations
Finally, less than half of the PHR systems we reviewed were based on standards or regulations, and this shows that there is no guarantee that the privacy and security of patients’ data is ensured. The most frequently referenced regulation is HIPAA, used in the United States. HIPAA is a federal law that protects health information and ensures that patients have access to their own medical records while assigning new responsibilities to those in charge of protecting this information. Although PHR systems are not required to meet HIPAA by law, users might believe that their data are better protected if the PHR satisfies HIPAA .
This study had several limitations. Although we conducted a comprehensive literature search on numerous databases using a variety of pertinent search terms, certain PHR systems may have been overlooked due to the lack of indexing in the searched databases. In addition, we recognize that several key PHR systems that were included in the original sample of 51 were excluded as a result of selection criteria. Moreover, we may have excluded some PHR systems if we did not find their privacy policies on their website.
Since this study only analyzed the security and privacy characteristics of PHR systems, it lacks information about the users. Our results cannot easily be generalized to populations, since PHR systems are not equally used by people of different age groups.
The scope of this study did not include analysis of real functionality of PHR systems, and some PHR systems may not satisfy their own privacy policies, so incorrect data may have affected the results of the study. However, this limitation is diminished because we cross-checked the results against an evaluation of actual functionality of 50% of the PHRs.
Another limitation of our study is related to third-party access to the PHR. This characteristic turns PHR systems into a more flexible tool, although it would be necessary to analyze the privacy policies of these parties.
In general, PHR systems allow users to manage their personal health data and to control who has access to them. However, there is a debate regarding the degree to which individuals should be able to control this access, and the forms that this control may take: some PHR systems allow their users only read-only access, while others offer individuals total control [, ].
The strengths and weaknesses in the privacy and security of PHR systems will be useful for PHR users, health care professionals, decision makers, and system builders. In accordance with the privacy policies, PHR systems do not provide an in-depth description of the security measures used. The designs of privacy policies also need to be improved to include more detailed information related to security measures, and PHR system designers should focus their efforts on increasing the quality of security measures at all stages of system development .
The use of standards and regulations by PHR systems is still low. The majority of companies that design PHR systems are not covered by HIPAA . This may be one of the reasons why users do not use PHR systems [ ].
Finally, the development of third-party applications that add new functionality to PHR systems is increasing. An example of this is Microsoft HealthVault, which has more than 50 third-party applications . This connection to other applications, such as PHR systems, could also cause important security breaches.
This work has been partially financed by the Spanish Ministry of Science and Innovation, project PANGEA, TIN2009-13718-C02-02.
Conflicts of Interest
Multimedia Appendix 1
Characteristics analyzed and principles that they satisfy.PDF File (Adobe PDF File), 47KB
Multimedia Appendix 2
List of personal health record systems excluded and included in the study.PDF File (Adobe PDF File), 29KB
Multimedia Appendix 3
Characteristics of personal health record systems included in the review.PDF File (Adobe PDF File), 75KB
- Liu LS, Shih PC, Hayes GR. Barriers to the adoption and use of personal health record systems. In: Proceedings of the iConference. New York, NY: ACM; 2011 Presented at: iConference; Feb 8-11, 2011; Seattle, WA, USA p. 363-370. [CrossRef]
- US Department of Health and Human Services, Office for Civil Rights. 2008 Dec 15. Personal Health Records and the HIPAA Privacy Rule URL: http://www.hhs.gov/ocr/privacy/hipaa/understanding/special/healthit/phrs.pdf [accessed 2011-08-05] [WebCite Cache]
- Fernandez-Luque L, Karlsen R, Bonander J. Review of extracting information from the Social Web for health personalization. J Med Internet Res 2011 Jan;13(1):e15 [FREE Full text] [CrossRef] [Medline]
- Tang PC, Ash JS, Bates DW, Overhage JM, Sands DZ. Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption. J Am Med Inform Assoc 2006 Apr;13(2):121-126 [FREE Full text] [CrossRef] [Medline]
- Adida B, Kohane IS. GenePING: secure, scalable management of personal genomic data. BMC Genomics 2006 Apr;7:93 [FREE Full text] [CrossRef] [Medline]
- Bonander J, Gates S. Public health in an era of personal health records: opportunities for innovation and new partnerships. J Med Internet Res 2010 Aug;12(3):e33 [FREE Full text] [CrossRef] [Medline]
- Kaelber DC, Jha AK, Johnston D, Middleton B, Bates DW. A research agenda for personal health records (PHRs). J Am Med Inform Assoc 2008 Dec;15(6):729-736 [FREE Full text] [CrossRef] [Medline]
- Anderson R, Brown I, Dowty T, Inglesant P, Heath W, Sasse A. Joseph Rowntree Reform Trust Ltd. 2009. Database State URL: http://www.cl.cam.ac.uk/~rja14/Papers/database-state.pdf [accessed 2011-12-02] [WebCite Cache]
- Connecting For Health: The Personal Health Working Group Final Report. New York, NY: Markle Foundation; 2003. URL: http://www.policyarchive.org/handle/10207/bitstreams/15473.pdf [accessed 2012-08-06] [WebCite Cache]
- Liberati A, Altman DG, Tetzlaff J, Mulrow C, Gøtzsche PC, Ioannidis JP, et al. The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration. J Clin Epidemiol 2009 Oct;62(10):e1-34. [CrossRef] [Medline]
- Caligtan CA, Dykes PC. Electronic health records and personal health records. Semin Oncol Nurs 2011 Aug;27(3):218-228. [CrossRef] [Medline]
- Institute of Medicine. 2001 Mar 5. Crossing the Quality Chasm: A New Health System for the 21st Century URL: http://www.iom.edu/~/media/Files/Report%20Files/2001/Crossing-the-Quality-Chasm/Quality%20Chasm%202001%20%20report%20brief.pdf [accessed 2012-08-06] [WebCite Cache]
- Hesse BW, Nelson DE, Kreps GL, Croyle RT, Arora NK, Rimer BK, et al. Trust and sources of health information: the impact of the Internet and its implications for health care providers: findings from the first Health Information National Trends Survey. Arch Intern Med 2005;165(22):2618-2624. [CrossRef] [Medline]
- Sittig DF. Personal health records on the internet: a snapshot of the pioneers at the end of the 20th Century. Int J Med Inform 2002 Apr;65(1):1-6. [Medline]
- Kummervold PE, Chronaki CE, Lausen B, Prokosch HU, Rasmussen J, Santana S, et al. eHealth trends in Europe 2005-2007: a population-based survey. J Med Internet Res 2008;10(4):e42 [FREE Full text] [CrossRef] [Medline]
- Kim MI, Johnson KB. Personal health records: evaluation of functionality and utility. J Am Med Inform Assoc 2002 Apr;9(2):171-180 [FREE Full text] [Medline]
- Simons WW, Mandl KD, Kohane IS. The PING personally controlled electronic medical record system: technical architecture. J Am Med Inform Assoc 2005 Feb;12(1):47-54 [FREE Full text] [CrossRef] [Medline]
- Ball MJ, Smith C, Bakalar RS. Personal health records: empowering consumers. J Healthc Inf Manag 2007;21(1):76-86. [Medline]
- Hulse NC, Wood GM, Haug PJ, Williams MS. Deriving consumer-facing disease concepts for family health histories using multi-source sampling. J Biomed Inform 2010 Oct;43(5):716-724. [CrossRef] [Medline]
- Landis JR, Koch GG. The measurement of observer agreement for categorical data. Biometrics 1977 Mar;33(1):159-174. [Medline]
- Yee G, Korba L. Personal privacy policies. In: Vacca JR, editor. Computer and Information Security Handbook. Amsterdam: Morgan Kaufmann; 2009:487-505.
- Beldad A, Jong M, Steehouder M. Reading the least read? Indicators of users' intention to consult privacy statements on municipal websites. Gov Inf Q 2010 Jul;27(3):238-244. [CrossRef]
- Earp JB, Anton A, Aiman-Smith L, Stufflebeam WH. Examining internet privacy policies within the context of user privacy values. IEEE Trans Eng Manag 2005;52(2):227. [CrossRef]
- International Organization for Standardization. 2011. ISO/TS 13606-4:2009: Health informatics -- Electronic Health Record Communication -- Part 4: Security URL: http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=50121 [accessed 2011-08-05] [WebCite Cache]
- Westin AF. Privacy and Freedom. London: Bodley Head; 1970.
- Denzin NK. Sociological Methods: A Sourcebook. New Brunswick, NJ: Aldine Transaction; 2006.
- Carmines EG, Zeller RA. Reliability and Validity Assessment. Thousand Oaks, CA: Sage Publications; 1979.
- Microsoft. 2012. Microsoft HealthVault URL: http://www.microsoft.com/en-us/healthvault [accessed 2011-08-05] [WebCite Cache]
- Health Butler, LLC. 2011. HealthButler URL: http://healthbutler.com/ [accessed 2011-08-05] [WebCite Cache]
- Google. 2011. Google Health URL: https://www.google.com/health/ [accessed 2011-08-05] [WebCite Cache]
- ZebraHealth, Inc. 2011. ZebraHealth URL: https://www.zebrahealth.com/ [accessed 2011-08-05] [WebCite Cache]
- NoMoreClipboard.com. 2009. NoMoreClipBoard URL: http://www.nomoreclipboard.com/ [accessed 2011-08-05] [WebCite Cache]
- Doclopedia. My Doclopedia PHR URL: https://www.doclopedia.com/Login.aspx [accessed 2011-08-05] [WebCite Cache]
- HealthyCircles. 2011. HealthyCircles URL: https://www.healthycircles.com/ [accessed 2011-08-05] [WebCite Cache]
- Dr. I-Net Corp. Dr. I-Net URL: http://www.drinet.com/ [accessed 2011-08-05] [WebCite Cache]
- What is myHealthFolders? MyHealthFolders, LLC# 2011 URL: https://myhealthfolders.com/ [accessed 2011-08-05] [WebCite Cache]
- Keas, Inc#. 2011. Keas URL: https://keas.com/ [accessed 2011-08-05] [WebCite Cache]
- RememberItNow! LLC. RememberItNow! URL: http://www.rememberitnow.com/ [accessed 2011-08-05] [WebCite Cache]
- MedsFile. 2010. medsfile URL: http://www.medsfile.com/ [accessed 2011-08-05] [WebCite Cache]
- Community Health Resource & Development Center. 2010. MiVIA URL: https://www.mivia.org/ [accessed 2011-08-05] [WebCite Cache]
- PatientsLikeMe. 2011. PatientsLikeMe URL: http://www.patientslikeme.com/ [accessed 2011-12-02] [WebCite Cache]
- Dr. Carr. 2011. Telemedical URL: http://www.telemedical.com/ [accessed 2011-08-05] [WebCite Cache]
- US Department of Veterans Affairs. 2012. My HealtheVet URL: http://www.myhealth.va.gov/ [accessed 2011-08-05] [WebCite Cache]
- MedicAlert Foundation. 2011. MedicAlert URL: http://www.medicalert.org/ [accessed 2011-08-05] [WebCite Cache]
- LifeMed Media, Inc. 2011. dLife URL: http://www.dlife.com/ [accessed 2011-08-05] [WebCite Cache]
- Toucan Health Systems, LLC. 2011. Juniper Health URL: https://juniperhealth.com/ [accessed 2011-08-05] [WebCite Cache]
- Epic Systems Corporation. 2010. MyChart URL: https://www.mychartlink.com/mychart/ [accessed 2011-08-05] [WebCite Cache]
- iMetrikus, Inc. 2011. MediCompass Care Coordination Platform URL: https://www.medicompass.com/mcweb/default.aspx [accessed 2011-08-05] [WebCite Cache]
- MDGuidelines ePHR. Welcome to EmryStick. com URL: http://phr.emrystick.com/ [accessed 2011-08-05] [WebCite Cache]
- MediConnect Global Inc. 2011. myMediConnect URL: http://www.mymediconnect.net/index.php [accessed 2011-08-05] [WebCite Cache]
- Medfusion. 2007. Weldome to iHealthRecord by Medfusion URL: http://medfusion.net/ihealthrecord/ [accessed 2011-08-05] [WebCite Cache]
- TRUSTe. TRUSTe URL: http://www.truste.com/ [accessed 2011-08-05] [WebCite Cache]
- Martino L, Ahuja S. Privacy policies of personal health records: an evaluation of their effectiveness in protecting patient information. In: Proceedings of the 1st ACM International Health Informatics Symposium. New York, NY, USA; 2010 Presented at: 1st ACM International Health Informatics Symposium (IHI '10); Nov 11-12, 2010; Arlington, VA, USA p. 191-200. [CrossRef]
- Carrión I, Fernández-Alemán JL, Jayne C, Palmer-Brown D, Toval A, Carrillo de Gea JM. Evaluation and neuronal network-based classification of the PHRs privacy policies. In: Proceedings of the 45th Hawaii International Conference on System Sciences. 2012 Presented at: 45th Hawaii International Conference on System Sciences; Jan 4-7, 2012; Wailea, Maui, HI. USA p. 2840-2849. [CrossRef]
- Official Journal of the European Communities. 2002 Jul 31. Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2001 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) URL: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2002:201:0037:0047:en:PDF [accessed 2012-02-16] [WebCite Cache]
- Lesemann D. Once more unto the breach: an analysis of legal, technological and policy issues involving data breach notification statutes. Akron Intellect Prop J 2010;4:203-238 [FREE Full text] [WebCite Cache]
- Greenhalgh T, Hinder S, Stramer K, Bratan T, Russell J. Adoption, non-adoption, and abandonment of a personal electronic health record: case study of HealthSpace. BMJ 2010;341:c5814 [FREE Full text] [Medline]
- van der Linden H, Kalra D, Hasman A, Talmon J. Inter-organizational future proof EHR systems. A review of the security and privacy related issues. Int J Med Inform 2009 Mar;78(3):141-160. [CrossRef] [Medline]
- Weitzman ER, Kaci L, Mandl KD. Sharing medical data for health research: the early personal health record experience. J Med Internet Res 2010;12(2):e14 [FREE Full text] [CrossRef] [Medline]
- van't Noordende G. Security in the Dutch electronic patient record system. In: Proceedings. New York, NY, USA: ACM; 2010 Presented at: Second annual workshop on Security and Privacy in Medical and Home-Care Systems; Oct 4-8, 2010; Chicago, IL, USA p. 21-32. [CrossRef]
- Nazi KM, Hogan TP, Wagner TH, McInnes DK, Smith BM, Haggstrom D, et al. Embracing a health services research perspective on personal health records: lessons learned from the VA My HealtheVet system. J Gen Intern Med 2010 Jan;25 Suppl 1:62-67. [CrossRef] [Medline]
- Maloney FL, Wright A. USB-based Personal Health Records: an analysis of features and functionality. Int J Med Inform 2010 Feb;79(2):97-111. [CrossRef] [Medline]
- Yau GL, Williams AS, Brown JB. Family physicians' perspectives on personal health records: qualitative study. Can Fam Physician 2011 May;57(5):e178-e184 [FREE Full text] [Medline]
- El Emam K, Jabbouri S, Sams S, Drouet Y, Power M. Evaluating common de-identification heuristics for personal health information. J Med Internet Res 2006 Nov;8(4):e28 [FREE Full text] [CrossRef] [Medline]
- El Emam K, Jonker E, Arbuckle L, Malin B. A systematic review of re-identification attacks on health data. PLoS One 2011;6(12):e28071 [FREE Full text] [CrossRef] [Medline]
- Sweeney L. k-Anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 2002;10(5):557-570 [FREE Full text] [CrossRef]
- Carrión I, Fernández-Alemán JL, Toval A. Usable privacy and security in personal health records. Lect Notes Comput Sci 2011;6949:36-43. [CrossRef]
- Greenhalgh T, Stramer K, Bratan T, Byrne E, Russell J, Hinder S, et al. The Devil's in the Detail: Final Report of the Independent Evaluation of the Summary Care Record and HealthSpace programmes. London: University College London; 2010. URL: http://www.ucl.ac.uk/news/scriesummary.pdf [accessed 2011-12-12] [WebCite Cache]
- Huynh T, Miller J. An empirical investigation into open source web applications' implementation vulnerabilities. Empir Softw Eng 2010 Oct;15(5):556-576. [CrossRef]
- National Vulnerability Database. DHS National Cyber Security Division/US-CERT. CWE: Common Weakness Enumeration URL: http://nvd.nist.gov/cwe.cfm [accessed 2011-08-05] [WebCite Cache]
- Park MA. Embedding security into visual programming courses. In: Proceedings of the Information Security Curriculum Development Conference. New York, NY, USA: ACM; 2011 Presented at: Information Security Curriculum Development Conference; Sep 30-Oct 1, 2011; Kennesaw, GA, USA p. 84-93. [CrossRef]
- Srinivasan A. Keeping online personal records private: security and privacy considerations for Web-based PHR systems. J AHIMA 2006 Jan;77(1):62-3, 68. [Medline]
- Bourgeois FC, Taylor PL, Emans SJ, Nigrin DJ, Mandl KD. Whose personal control? Creating private, personally controlled health records for pediatric and adolescent patients. J Am Med Inform Assoc 2008 Dec;15(6):737-743 [FREE Full text] [CrossRef] [Medline]
- Steinbrook R. Personally controlled online health data--the next big thing in medical care? N Engl J Med 2008 Apr 17;358(16):1653-1656. [CrossRef] [Medline]
- Fernández-Medina E, Piattini M. Designing secure databases. Inf Softw Technol 2005;47(7):463-477. [CrossRef]
|EHR: electronic health record|
|HIPAA: Health Insurance Portability and Accountability Act|
|HONcode: Health on the Net Foundation Code of Conduct|
|ISO: International Organization for Standardization|
|PHR: personal health record|
|PRISMA: Preferred Reporting Items for Systematic Reviews and Meta-analyses|
Edited by K El Emam; submitted 12.08.11; peer-reviewed by S Porter, B Malin, G van't Noordende; comments to author 17.10.11; revised version received 03.01.12; accepted 30.05.12; published 23.08.12
©Inmaculada Carrión Señor, José Luis Fernández-Alemán, Ambrosio Toval. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 23.08.2012.
This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.