<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
    <front>
        <journal-meta>
            <journal-id journal-id-type="publisher-id">JMIR</journal-id>
            <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
            <journal-title>Journal of Medical Internet Research</journal-title>
            <issn pub-type="epub">1438-8871</issn>
            <publisher>
                <publisher-name>Gunther Eysenbach</publisher-name>
                <publisher-loc>Centre for Global eHealth Innovation, Toronto, Canada</publisher-loc>
            </publisher>
        </journal-meta>
        <article-meta>
            <article-id pub-id-type="publisher-id">v13i1e18</article-id>
            <article-id pub-id-type="pmid" />
            <article-id pub-id-type="doi">10.2196/jmir.1335</article-id>
            <article-categories>
                <subj-group subj-group-type="article-type">
                    <subject>Original Paper</subject>
                </subj-group>
            </article-categories>
            <title-group>
                <article-title>How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?</article-title>
            </title-group>
            <contrib-group>
                <contrib contrib-type="editor">
                    <name>
                        <surname>Eysenbach</surname>
                        <given-names>Gunther</given-names>
                    </name>
                </contrib>
            </contrib-group>
            <contrib-group>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>Shuaib</surname>
                        <given-names>Khaled</given-names>
                    </name>
                </contrib>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>Chen</surname>
                        <given-names>Dongquan</given-names>
                    </name>
                </contrib>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>Manion</surname>
                        <given-names>Frank</given-names>
                    </name>
                </contrib>
            </contrib-group>
            <contrib-group>
                <contrib contrib-type="author" id="contrib1" corresp="yes">
                    <name name-style="western">
                        <surname>El Emam</surname>
                        <given-names>Khaled</given-names>
                    </name>
                    <degrees>BEng PhD</degrees>
                    <xref ref-type="aff" rid="aff1">1</xref>
                    <address>
                        <institution>Children's Hospital of Eastern Ontario Research Institute</institution>
                        <addr-line>401 Smyth Road</addr-line>
                        <addr-line>Ottawa, ON, K1H 8L1</addr-line>
                        <country>Canada</country>
                        <phone>1 613 738 4181</phone>
                        <fax>1 613 731 1374</fax>
                        <email>kelemam@uottawa.ca</email>
                    </address>
                    <xref ref-type="aff" rid="aff2">2</xref>
                </contrib>
                <contrib contrib-type="author" id="contrib2">
                    <name name-style="western">
                        <surname>Moreau</surname>
                        <given-names>Katherine</given-names>
                    </name>
                    <degrees>BA BEd MA</degrees>
                    <xref ref-type="aff" rid="aff1">1</xref>
                </contrib>
                <contrib contrib-type="author" id="contrib3">
                    <name name-style="western">
                        <surname>Jonker</surname>
                        <given-names>Elizabeth</given-names>
                    </name>
                    <degrees>BA(Hons)</degrees>
                    <xref ref-type="aff" rid="aff1">1</xref>
                </contrib>
            </contrib-group>
            <aff id="aff2" rid="aff2">
                <sup>2</sup>
                <institution>Department of Pediatrics</institution>
                <institution>Faculty of Medicine</institution>
                <institution>University Of Ottawa</institution>
                <addr-line>Ottawa, ON</addr-line>
                <country>Canada</country>
            </aff>
            <aff id="aff1" rid="aff1">
                <sup>1</sup>
                <institution>Children's Hospital of Eastern Ontario Research Institute</institution>
                <addr-line>Ottawa, ON</addr-line>
                <country>Canada</country>
            </aff>
            <pub-date pub-type="collection">
                <season>Jan-Mar</season>
                <year>2011</year>
            </pub-date>
            <pub-date pub-type="epub">
                <day>11</day>
                <month>02</month>
                <year>2011</year>
            </pub-date>
            <volume>13</volume>
            <issue>1</issue>
            <elocation-id>e18</elocation-id>
            <!--history from ojs - api-xml-->
            <history>
                <date date-type="received">
                    <day>13</day>
                    <month>08</month>
                    <year>2009</year>
                </date>
                <date date-type="rev-request">
                    <day>03</day>
                    <month>09</month>
                    <year>2009</year>
                </date>
                <date date-type="rev-recd">
                    <day>23</day>
                    <month>12</month>
                    <year>2010</year>
                </date>
                <date date-type="accepted">
                    <day>12</day>
                    <month>01</month>
                    <year>2011</year>
                </date>
            </history>
            <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
            <copyright-statement>&#169;Khaled El Emam, Katherine Moreau, Elizabeth Jonker. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 11.02.2011. </copyright-statement>
            <copyright-year>2011</copyright-year>
            <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/2.0/">
                <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.</p>
            </license>
            <self-uri xlink:href="http://www.jmir.org/2011/1/e18/" xlink:type="simple" />
            <abstract>
                <sec sec-type="background">
                    <title>Background</title>
                    <p>Findings and statements about how securely personal health information is managed in clinical research are mixed.</p>
                </sec>
                <sec sec-type="objective">
                    <title>Objective</title>
                    <p>The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials.</p>
                </sec>
                <sec sec-type="methods">
                    <title>Methods</title>
                    <p>Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information.</p>
                </sec>
                <sec sec-type="results">
                    <title>Results</title>
                    <p>We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration.</p>
                </sec>
                <sec sec-type="conclusion">
                    <title>Conclusion</title>
                    <p>If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices.</p>
                </sec>
            </abstract>
            <kwd-group>
                <kwd>Privacy</kwd>
                <kwd>security</kwd>
                <kwd>passwords</kwd>
            </kwd-group>
        </article-meta>
    </front>
    <body>
        <sec sec-type="introduction">
            <title>Introduction</title>
            <p>Information technology is being increasingly used in clinical trials. One recent study estimated that 41% of Canadian clinical trials are using an electronic data capture (EDC) system [<xref ref-type="bibr" rid="ref1">1</xref>]. Researchers are also turning more to electronic medical records as a source of clinically relevant patient data, and this is fueled by their growing adoption in practice [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref6">6</xref>].</p>
            <p>The data collected during clinical trials consist of sensitive personal health information (PHI). Most clinical trial data sets contain fields such as participant initials, date of birth, and gender; information about the location of the participant&#8217;s residence; and the clinical trial site where the participant is receiving treatment. This kind of information can be used to reidentify individuals [<xref ref-type="bibr" rid="ref7">7</xref>-<xref ref-type="bibr" rid="ref10">10</xref>]. In some cases, clinical trial data contain detailed contact information (eg, email addresses, residence address, or telephone numbers) for participants to receive reminders of upcoming visits or reminders to complete specific data collection forms.</p>
            <p>Despite strong assurances about the safety of PHI entrusted with researchers [<xref ref-type="bibr" rid="ref11">11</xref>] and arguments about the paucity of publicly known privacy violations in medical research [<xref ref-type="bibr" rid="ref12">12</xref>], there have been recent publicized cases of data breaches from clinical trials [<xref ref-type="bibr" rid="ref13">13</xref>]. Risky behaviors that can result in data breaches when handling data in clinical trials have been reported [<xref ref-type="bibr" rid="ref14">14</xref>]:</p>
            <list list-type="bullet">
                <list-item>
                    <p>Engineering and mathematics graduate students were participating in a study that involved the analysis of medical images. These students did not receive sufficient education on privacy issues and how to handle PHI. Consequently, they were exchanging the personal data of subjects among themselves by email without any encryption.</p>
                </list-item>
                <list-item>
                    <p>There were reported cases of study coordinators taking data home to finish some work off by saving it on to a memory stick or emailing the information to public accounts that they can access from home (eg, Gmail, Sympatico, or Rogers accounts). The data that were taken home were not encrypted.</p>
                </list-item>
                <list-item>
                    <p>In one study progress notes had to be completed in an EDC system during a patient visit. There were cases where the physician or nurse completing the clinical notes mentioned the patient&#8217;s name, family physician name, sibling or parent name, or other identifying information in what they wrote. Therefore, even if the structured questionnaires used to collect data in a clinical research study exclude any identifying or potentially identifying information, patients can potentially be identified from the clinical notes that were submitted as part of the study.</p>
                </list-item>
                <list-item>
                    <p>Another example involved the audit trails. If, for example, a nurse saved identifying information in the notes or comments section in an EDC form and then subsequently deletes that information, the information remains in the audit trail. In this scenario patients were reidentifiable through data that were available in the audit trails.</p>
                </list-item>
                <list-item>
                    <p>In one study where an EDC was used, there were examples of password sharing (to avoid having to re-log in every time an individual was to work on a shared computer), and passwords written on notes posted on monitors were common.</p>
                </list-item>
            </list>
            <p>Computer users are known to use email quite often to share files, and frequently as their primary file-sharing mechanism [<xref ref-type="bibr" rid="ref15">15</xref>-<xref ref-type="bibr" rid="ref18">18</xref>]. One survey of US enterprises found that approximately one-quarter reported that personal information (including PHI) was included in outbound emails in breach of regulations, and one-third had investigated a violation of data-protection regulations related to email within the previous year [<xref ref-type="bibr" rid="ref19">19</xref>].</p>
            <p>An earlier qualitative study indicated that email was often used to transfer information during Canadian clinical trials [<xref ref-type="bibr" rid="ref14">14</xref>]. It has been noted that email is the most widely used communication mechanism in clinical trials [<xref ref-type="bibr" rid="ref20">20</xref>]. One survey found that 50% of professionals working on clinical trials use email as their predominant method for sharing information [<xref ref-type="bibr" rid="ref21">21</xref>], and two-thirds of clinical trials professionals responded that documents and files are exchanged with investigative sites via email [<xref ref-type="bibr" rid="ref22">22</xref>]. Unfortunately, there are many ways for an adversary to access information sent by email, either during transmission or at its destination (see <xref ref-type="app" rid="app1">Multimedia Appendix 1</xref>).</p>
            <p>In the United States the Health Insurance Portability and Accountability Act (HIPAA) permits the electronic transmission of PHI without encryption if the risk is deemed reasonable [<xref ref-type="bibr" rid="ref23">23</xref>]. However, under many state breach notification laws the transmission of unprotected personal information by email may be considered a breach (see <xref ref-type="app" rid="app1">Multimedia Appendix 1</xref>). Many health care providers admit that they do not encrypt patient data when they are transmitted electronically [<xref ref-type="bibr" rid="ref24">24</xref>]. On the other hand, some states, notably Nevada and Massachusetts, have mandated the encryption of electronic personal information in transit over public networks [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. Noncompliance can subject data custodians to significant fines and penalties. It is likely that more states will follow with similar laws. Furthermore, recognizing the potential for a breach, various health systems have mandated the encryption of data transferred by email for delivering care and for research purposes [<xref ref-type="bibr" rid="ref27">27</xref>-<xref ref-type="bibr" rid="ref29">29</xref>].</p>
            <p>Trials using an EDC system will have raw data available in electronic form throughout the study. Regulated trials need to comply with the US Food and Drug Administration&#8217;s (FDA&#8217;s) 21 Code of Federal Regulations (CFR) Part 11 regulations where electronic systems are used [<xref ref-type="bibr" rid="ref30">30</xref>-<xref ref-type="bibr" rid="ref35">35</xref>], and these include provisions for securing data to avoid tampering and ensure data integrity. Regulated trials have a higher likelihood (than unregulated trials) of being audited, and the FDA has publicized its intention of increased audits [<xref ref-type="bibr" rid="ref36">36</xref>]. Failure to address FDA concerns expressed in warning letters could result in delays in drug and device submissions. The out-of-pocket clinical development costs for a self-originated new drug are estimated to be on average $282 million (US $467 million for capitalized costs) [<xref ref-type="bibr" rid="ref37">37</xref>], making any delays in submissions to the FDA quite costly. Therefore, there are strong incentives by sponsors to implement reasonable security practices for such trials.</p>
            <p>Trial participants have the expectation that their PHI will be protected by the sponsors and sites collecting data. There are also potential financial and social harms to participants if their PHI is inadvertently disclosed (see <xref ref-type="app" rid="app1">Multimedia Appendix 1</xref>).</p>
            <p>To investigate the extent to which research staff actually protect PHI, in this paper we report on two studies: (1) a direct evaluation of one behavioral indicator of secure information management practices: the strength of passwords used to transfer encrypted electronic health information among the stakeholders in regulated Canadian clinical trials, and (2) a series of interviews of study coordinators to understand their file-sharing practices and how files are protected when shared.</p>
        </sec>
        <sec sec-type="methods">
            <title>Methods</title>
            <p>We performed two studies to investigate password strength and file-sharing practices in the context of clinical trials. Each is described below. Both study protocols were reviewed and approved by the research ethics board of the Children&#8217;s Hospital of Eastern Ontario Research Institute, Ottawa, Canada.</p>
            <sec>
                <title>Study 1: Password Strength Analysis</title>
                <p>Over a period of 6 months the first author contacted stakeholders in 15 clinical trials known to him to determine whether they were interested in participating in this study. All of these trials used a form of EDC system for data collection and management. Stakeholders in four clinical trials were willing to participate in this study. Stakeholders were site coordinators, statisticians, monitors, and study project managers. Three studies had at least one commercial sponsor and were consequently expected to follow FDA regulations. The fourth trial did not have a commercial sponsor but was sufficiently high in profile that it received strong regulatory oversight by Health Canada.</p>
                <p>The clinical trials that participated were not representative of all clinical trials in Canada. They were, however, likely examples of trials where the stakeholders were sufficiently comfortable with their security practices that they agreed to participate.</p>
                <p>The stakeholders identified password-protected electronic files that were generated or created during these trials and that were sent or received by email. All files met the following criteria:</p>
                <list list-type="bullet">
                    <list-item>
                        <p>Their format was either Microsoft Office (Microsoft Corporation, Redmond, WA, USA) or ZIP (eg, WinZip Computing, Mansfield, CT, USA) (compressed archive; the contents of the compressed files may be any other data file type, such as Word, Excel, SAS, or XML data files). All Microsoft Office files were version 2003 or earlier (for example, with the .doc or .xls file extension).</p>
                    </list-item>
                    <list-item>
                        <p>They were encrypted or protected using a password.</p>
                    </list-item>
                    <list-item>
                        <p>The files were sent by email between sites, data management groups, statistical analysis groups, external consultants, or central labs with at least one party in the communication within Canada.</p>
                    </list-item>
                    <list-item>
                        <p>They were suspected or known to have PHI of the participants.</p>
                    </list-item>
                </list>
                <p>We chose these file formats because they are the most commonly used based on their market penetration. Focusing on these document types provided us with an indicator of password strengths used by PHI custodians when they are free to select whatever password they want.</p>
                <p>Even if the EDC system used in the trial supported some form of secure file sharing, the email exchanges we obtained the files from were with individuals involved in the trial but who did not have an account on the EDC system (eg, external statisticians and information technology specialists).</p>
                <p>In total we examined 15 files from the four clinical trials. Nine were ZIP files and the remainder were Microsoft Office documents.</p>
                <p>We purchased two commercial password recovery tools (Visual Zip Password Recovery Master version 6.2, Rixler Software, and Accent Office Password Recovery version 2.6, AccentSoft Utilities, St Petersburg, Russian Federation) and attempted to recover the passwords. We selected those tools based on listings at the openwall.com site, usability, and recommendations from security administrators at our institutions. Using commercial tools allowed us to assess the risk from an unsophisticated adversary.</p>
                <p>One tool would attempt to recover the password for the Word document, and the second tool would attempt to recover the password for the whole of the ZIP archive (ie, there is one password for the whole archive). The tools use a number of techniques, including a dictionary attack, common password patterns, heuristics, brute force to recover the password, and by taking advantage of known vulnerabilities.</p>
                <p>For dictionary attacks, we enhanced the dictionaries used to include Canada-specific terms (such as city and province names and famous personality names) and other commonly used terms and passwords (see <xref ref-type="app" rid="app2">Multimedia Appendices 2</xref> and <xref ref-type="app" rid="app3">3</xref>). </p>
                <p>There are known vulnerabilities in some of the encryption methods that are used for these file types. Up to and including Word 2003, the default encryption was &#8220;97/2000 compatible.&#8221; This was an RC4 stream cipher with a 40-bit key. Because of the small key size, it would be possible to try all binary keys until one that works is found. This would not recover the password itself but would allow an adversary to access the contents of the password-protected file. Similarly, older versions of WinZip used the ZIP 2.0 encryption standard, which was considered weak. Only versions 9 and above of WinZip provide stronger encryption algorithms, such as Advanced Encryption Standard.</p>
                <p>We used a computer running a 2 GHz dual processor with 2 GB of memory to execute the tool. The password recovery tools were allowed to run for 24 hours on each file before they were stopped.</p>
                <p>The password recovery process was performed under the auspices of or by the stakeholder(s) themselves. Therefore, no files were transferred to any entity outside the data custodian to perform this study. The password recovery software was installed on a virtual machine and the software was run within the virtual machine on the data custodian&#8217;s equipment. The first author participated in running and monitoring the execution of the software. Each virtual machine instance, including all of the data files within it, was deleted after the analysis. We determined how many files had their password recovered during the 24-hour period.</p>
            </sec>
            <sec>
                <title>Study 2: Study Coordinator Interviews</title>
                <p>We identified 121 study coordinators who responded to a previous survey [<xref ref-type="bibr" rid="ref1">1</xref>] and were located within the Toronto-Ottawa-Montreal corridor. We randomly selected a subset of 80 coordinators and sent each an email request to participate in a 1-hour interview. Assuming that we would not be able to reach 25% of the group due to a change in contact information following the previous study (eg, change of employment, relocation), we expected our email invitation to be received by approximately 60 coordinators in total. We expected a response rate of 33% from those 60 [<xref ref-type="bibr" rid="ref38">38</xref>]. We therefore planned for a group of 20 interviewees. The purpose of the interviews was to understand the file-sharing practices used within a recent clinical trial in which each coordinator had been involved.</p>
                <p>The 80 selected individuals were invited by email to participate (<xref ref-type="app" rid="app4">Multimedia Appendix 4</xref> contains the text of the invitation email). As an incentive to participate, we organized a raffle for an iPod shuffle (Apple, Cupertino, CA, USA) that took place after the interviews had been completed. All interviewees were entered in the raffle.</p>
                <p>Depending on the location and timing, some interviews were conducted face-to-face and some were conducted by telephone. The interviews were recorded and then transcribed verbatim. The open-ended interview questions are presented in <xref ref-type="app" rid="app4">Multimedia Appendix 4</xref>. The interview guide included a series of questions on the electronic file-sharing practices used during the conduct of clinical trials. Specifically, the questions elicited information related to how research coordinators addressed security and privacy issues and why they made certain file-sharing choices during clinical trials. </p>
                <p>We used a general qualitative thematic approach to analyze the interview transcripts [<xref ref-type="bibr" rid="ref39">39</xref>]. NVivo software version 8 (QRS International, Cambridge, MA, USA) facilitated the management and analysis of the data. We analyzed the data by developing a &#8220;start list&#8221; of codes based on the interview guide for the study, as well as the issues and themes that we expected to see in the data. However, recognizing that some codes would emerge or disappear during the analysis, we only used these predefined codes as starting points and embraced any new or revised issues or themes that emerged from the data.</p>
            </sec>
        </sec>
        <sec sec-type="results">
            <title>Results</title>
            <sec>
                <title>Password Strength Analysis</title>
                <p>The ZIP files contained more than 2000 data files in their archive. In all cases the tools were able to recover the password, except for one file where the password could not be cracked within the 24-hour period. One of the recovered files contained coding information and dictionaries, and therefore did not have any PHI.</p>
                <p>In all cases the recovered passwords were poorly constructed [<xref ref-type="bibr" rid="ref40">40</xref>], with names of local locations (eg, &#8220;ottawa&#8221;), names of animals (eg, &#8220;cobra&#8221;), car brands (eg, &#8220;nissan&#8221;), and common number sequences (eg, &#8220;123&#8221;). This makes it easier for password recovery tools to guess them.</p>
                <p>The files with recovered passwords that had PHI included Microsoft Word, Microsoft Excel, SAS, and XML (Clinical Data Interchange Standards Consortium Operational Data Model format files). They contained raw data from the clinical trials. In total, more than 10,000 patient records were in these files, and many with PHI on the subjects. For example, fields included name of study site, dates of screening and randomization, date of birth, initials, gender, and medical history.</p>
                <p>For Microsoft Office document files, password-protecting a document is not the same as encrypting its contents [<xref ref-type="bibr" rid="ref41">41</xref>]. Password protection controls the actions that can be performed on the document, such as who can modify a document, but the contents themselves are not encrypted. It may not always be obvious to an end user that such document protection does not protect the document contents themselves. A different program that ignores the document protections can be used to read the unencrypted contents, or they can be examined through a binary file viewer. All of the files in our sample were encrypted, but all used the default &#8220;97/2000 compatible&#8221; encryption.</p>
                <p>Passwords on older versions of Word and Excel files are relatively straightforward to recover under certain conditions [<xref ref-type="bibr" rid="ref42">42</xref>]. Word and Excel 2003 also have an option to use an RC4 stream cipher with a key length of up to 128 bits. A weakness in the implementation of the encryption module makes it possible for an adversary to compare two versions of a password-protected file to recover its plaintext contents [<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref43">43</xref>]. In such a case password strength would not have affected the ability to extract the PHI. However, in our study we had only one version of each document and therefore our files were not vulnerable to this attack.</p>
                <p>All of the ZIP files in our data set used the ZIP 2.0 encryption standard. All of the recovered passwords from the ZIP files were poor choices, and most of them were in our dictionaries or derived from words in the dictionaries (eg, ottawa followed by a digit).</p>
            </sec>
            <sec>
                <title>Study Coordinator Interviews</title>
                <p>We interviewed 20 study coordinators in the Toronto-Ottawa-Montreal corridor. </p>
                <p>There was a marked difference between industry-sponsored trials and investigator-initiated trials. Specifically, industry-sponsored trials tended to have more formal processes in place to protect PHI and defined mechanisms for sharing data among those directly involved in the trial.</p>
                <p>The three primary modes for sharing electronic information in the context of trials were as follows.</p>
                <sec>
                    <title>By Email</title>
                    <p>Data sent by email included mostly queries and responses to queries (eg, questions to sites about inconsistent or incomplete data for a particular patient). According to our informants, patient information was rarely encrypted when sent this way.</p>
                    <p>If PHI data files were sent by email then they were encrypted. This was used to justify the transmission of such files using an inherently insecure medium. If there was no EDC system in use in the trial or it did not support file sharing, then files were exchanged between any of the individuals and organizations working on the trial. If an EDC system that supported file sharing was deployed, then email was used to send data files to individuals who do not have accounts on the system.</p>
                </sec>
                <sec>
                    <title>Shared Drives</title>
                    <p>These drives were used within sites to store all trial information, including keys linking pseudonyms to patient names and Case Report Form (CRF) data. All site staff working on the trial would normally have access to the files on the shared drive. If the files were protected, the same password was often used for all of the files, and all staff who needed to access the documents would know that password. Formal processes for changing individual and shared credentials after the departure of staff were often not defined. Generally, individuals would not be taken off the access list once the trial was complete.</p>
                    <p>The file formats that we considered encourage the sharing of passwords. For example, it is not possible to assign different passwords to each individual who needs to access each of these documents. A single password is used for a document, and all individuals who need to read the document know that same password. If many documents need to be exchanged, it is not practical to have a different password for each one; therefore, often a single password is used for all documents and this password is shared among all users.</p>
                </sec>
                <sec>
                    <title>EDC Systems</title>
                    <p>In trials using EDC systems that support file sharing (through either an internal email system or document management features), individual patient-level data would be shared through the EDC system. The amount of access control would depend on the specific EDC system in question. If the EDC system did not support file sharing then most often email would be used.</p>
                    <p>It should be noted that, given the sensitivity of the topic, the interviewees may have held back some information. Specifically, they may not have been willing to share information about poor security practices in the trials they were participating in. Consequently, our results should be seen as an optimistic view of current practices.</p>
                </sec>
            </sec>
        </sec>
        <sec sec-type="discussion">
            <title>Discussion</title>
            <sec>
                <title>Summary</title>
                <p>Previous work had indicated that password-protected files containing the PHI of clinical trial participants were being sent by email. Our initial study objective was to examine the strength of the passwords used to protect those files. Strong passwords were seen as an indicator of following good security practices in the context of clinical research.</p>
                <p>We obtained a sample of 15 encrypted files that were sent by insecure email and were able to recover the passwords for 93% (14/15) of the files using commercial password recovery tools. Thirteen of those 14 files (93%) had sensitive health information in them. Therefore, in total 13/15 files were recovered <italic>and</italic> had PHI (87%). Since we were able to recover passwords using off-the-shelf tools, then it would be quite easy for an unsophisticated adversary to also do so. This result is consistent with previous research showing that health care professionals choose weak passwords to access patient data when there are no restrictions on password strength [<xref ref-type="bibr" rid="ref44">44</xref>].</p>
                <p>Perhaps more alarming, all of the Office and ZIP files in our sample used the default weak encryption methods. Therefore, an adversary had two different ways to extract the PHI: by attacking the weak algorithm itself or by attacking the weak password. In the current version of the WinZip tool (version 14.5), the default encryption is <italic>still</italic> based on the weak ZIP 2.0 standard.</p>
                <p>At the time of this study the default applications for these file formats (ie, Microsoft Office and WinZip) did not enforce any password strengths, which means users could create any password they wished. For example, in earlier versions of WinZip that did provide password protection it was not possible to enforce a particular password strength (older versions of WinZip are still available [<xref ref-type="bibr" rid="ref45">45</xref>]). Similarly, only recent versions of Microsoft Word have provided password strength enforcement [<xref ref-type="bibr" rid="ref46">46</xref>]. Therefore, the passwords chosen were those that the stakeholders believed were sufficiently strong.</p>
                <p>A follow-up interview study to examine the file-sharing practices of clinical trial study coordinators indicated that some PHI was exchanged by email that was not encrypted (eg, queries about specific patient data). Shared drives were another commonly used mechanism for exchanging files containing participant PHI. Shared drives create additional risks because, in practice, all files posted on the drive share a common password, and this common password is also shared among all stakeholders who need to access any one of the files. Sharing passwords is a violation of best-security practices. Furthermore, this goes against another best practice of limiting access to PHI to only the information that an individual needs (ie, a person who needs to access a single file should not get the password to access all files). From a regulatory perspective, it is also not possible to maintain audit trails of modifications made to files on shared drives.</p>
            </sec>
            <sec>
                <title>Recommendations</title>
                <sec>
                    <title>Encrypt PHI Sent by Email</title>
                    <p>Protocols can be employed to securely exchange information that was sent by email using PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) [<xref ref-type="bibr" rid="ref47">47</xref>]. However, these tools remain quite difficult for people to use [<xref ref-type="bibr" rid="ref48">48</xref>-<xref ref-type="bibr" rid="ref50">50</xref>]. Furthermore, in an enterprise setting where the key management complexities are handled by a central information technology department, they are still complicated to use when communicating beyond institutional boundaries and therefore may not be suitable for distributed collaborations that cross such boundaries.</p>
                    <p>Some products bypass the key management complexities by sending a plaintext notification email to the receiver that they have received a message with a link to a secure website where they can pick up their email [<xref ref-type="bibr" rid="ref51">51</xref>]. The receiver, however, then needs to create an account on the secure website to pick up the message. In the context of clinical trials with staff joining and leaving throughout, such an option may be workable if creating an account is simple.</p>
                    <p>Another common approach is to use the built-in password protection capabilities available in tools for common file formats (such as WinZip and Microsoft Office) and then transmit the encrypted files. Instructions for encrypting Microsoft Office and ZIP files are available [<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref52">52</xref>-<xref ref-type="bibr" rid="ref54">54</xref>]. However, caution should be exercised when using some of these tools. The default encryption standard may be a weak one. A strong encryption algorithm must be selected or set as the default.</p>
                    <p>If file encryption tools will be the main mechanism used to protect PHI, then all PHI needs to be in files, including queries and their responses.</p>
                    <p>Users may get confused between encrypting a file and protecting parts of it with a password (which does not encrypt it). Therefore, an alternative that avoids the potential for confusion is to use an external file encryption tool [<xref ref-type="bibr" rid="ref55">55</xref>], whereby it would be clear that the whole file is being encrypted.</p>
                </sec>
                <sec>
                    <title>Enforce Strong Passwords</title>
                    <p>Where file encryption with passwords will be used, policies need to be put in place to ensure that strong passwords are also used. Ensuring password strength would mitigate the type of attack we describe in this paper. Standards for passwords are available [<xref ref-type="bibr" rid="ref56">56</xref>], as well as general guidelines on email security [<xref ref-type="bibr" rid="ref47">47</xref>] and information management security in the health care context [<xref ref-type="bibr" rid="ref57">57</xref>].</p>
                    <p>The default applications for creating Office and ZIP files can enforce passwords, but only if the most recent versions are used, as only these have such capabilities, and they need to be set up to enforce password strength.</p>
                    <p>This needs to be augmented with privacy training for study coordinators so that they have an appreciation of privacy risks when using information technology in the conduct of trials. Training should cover procedures for the handling of electronic data, as well as providing background on the security risks of the specific technologies used in the study.</p>
                </sec>
                <sec>
                    <title>Minimize Password Sharing</title>
                    <p>In collaborative workflows that are common in clinical trials, current methods for file sharing are risky because they require password sharing, for example, by sharing files through email or on shared drives. It does not matter how strong a password is; if many individuals know that password then it is not a secure password.</p>
                    <p>Shared passwords make it difficult to maintain clear audit trails of individuals responsible for particular changes, which is a critical requirement in 21 CFR Part 11. For example, if multiple individuals at a site are able to view and edit an encrypted document on a shared drive because they all have the password, this would likely run afoul of the regulations because audit trails of modifications made to individual files are not maintained with shared drives.</p>
                    <p>Encryption of documents today assigns the password to the document rather than to the individual. To eliminate password sharing means creating multiple copies of each document with a unique password for every user. Commonly used contemporary tools cannot handle such additional password management complexity.</p>
                    <p>A more practical solution is to use collaboration environments, such as Microsoft SharePoint or equivalent ones. These allow the creation of repositories with different access controls for different users without the need to encrypt the documents themselves or store them on hosted email servers. Collaboration environments can also maintain detailed audit trails and version control.</p>
                </sec>
                <sec>
                    <title>Make File-Sharing Systems Inclusive</title>
                    <p>Modern EDC systems support secure email communications between stakeholders in the trial within the walls of the system, and some provide secure file sharing and document management mechanisms. Despite this capability, some of the stakeholders in clinical trials do not have access to the EDC system. For example, an external statistician would not normally have an EDC account and therefore may be sent a data file by email. The user base for such systems can be quite large, including individuals across multiple organizations, and these individuals change during a trial [<xref ref-type="bibr" rid="ref58">58</xref>]. In addition, if there are multiple staff working on a trial within a single site, then they ought to all have EDC system accounts, otherwise mechanisms such as shared drives are used. Therefore, the use of an EDC system with good security practices around file sharing is insufficient insurance against inappropriate security practices unless <italic>everyone</italic> who needs to access files has an account on it.</p>
                    <p>File-sharing capabilities may not be embedded within an EDC system, but may also be complementing an EDC system (eg, a document management system). In such cases the same conditions noted above would need to apply.</p>
                    <p>In the future, the use of federated authentication systems could allow file sharing that is more appropriate to the workflows in clinical trials.</p>
                </sec>
                <sec>
                    <title>Strengthen Data Breach Notification Exemptions</title>
                    <p>It should not be taken for granted that the default file encryption algorithms used to protect PHI are strong. In fact, we found that emailing the ZIP files in our sample would be considered a data breach under the US Health Information Technology for Economic and Clinical Health (HITECH) Act because they all used the weak ZIP 2.0 standard. Furthermore, the emailing of files encrypted using the default encryption in Word 2003 and earlier would also be a breach under the US HITECH Act. Therefore, the simple technical act of encryption does not ensure that this was done effectively [<xref ref-type="bibr" rid="ref59">59</xref>,<xref ref-type="bibr" rid="ref60">60</xref>]. A good example illustrating this is the case of TJX Companies, the parent company of some of the largest retailers in the United States, whereby adversaries were able to crack a weak encryption algorithm and access more than 90 million credit card numbers [<xref ref-type="bibr" rid="ref61">61</xref>,<xref ref-type="bibr" rid="ref62">62</xref>]. Encryption exemptions should always require that the algorithms used must meet a minimal standard.</p>
                    <p>Encryption exemptions in breach notification laws should explicitly consider the strength of the passwords that are used. If, for example, a sensitive document on someone&#8217;s hacked Gmail account is encrypted and the password is &#8220;password,&#8221; then the encryption is somewhat meaningless, however strong the algorithm itself is. Based on the results of our study, it seems prudent to consider password strength in determining whether an exemption applies: it should not be assumed that encryption, even with a strong algorithm, means that it was done adequately and that the adversary would not be able to figure out the password. Some states, such as North Carolina and Oregon, recognize the risk of an adversary acquiring the decryption key or password [<xref ref-type="bibr" rid="ref59">59</xref>], and therefore would not allow an encryption exemption from notification under those conditions.</p>
                </sec>
            </sec>
            <sec>
                <title>Limitations</title>
                <p>Given the small number of trials from which we obtained files, broad generalization of the results is difficult. But we did expect that only trials that had good security and privacy practices would be willing to participate. We also expected that only study coordinators who were comfortable with the quality of their security practices would be willing to participate in the interviews. Therefore, the findings are expected to be biased toward those who were security-aware and were investing in protecting the data. Should this be case, then the more general state of affairs would be worse than depicted by our conservative results.</p>
                <p>All of our data were collected from Canadian trials and Canadian coordinators. While the regulated trials from which we collected data had international sponsors and our interviewees participated in and discussed practices in international trials, our findings are specific to practices within a Canadian geography.</p>
                <p>Our results indicate a potential privacy risk rather than an actual risk, since we do not know whether anyone has actually inappropriately accessed these files and cracked their passwords. However, this should not dilute the seriousness of the risk, since one purpose of having good password management practices is to act as a deterrent against an attack.</p>
            </sec>
            <sec>
                <title>Conclusions</title>
                <p>When sharing files containing PHI in the context of clinical trials, it is critical to encrypt all PHI. However, such a practice does not provide much protection if the passwords are weak or if the passwords are widely shared. Our study indicated that the passwords used are not strong and could be compromised using a commercial password recovery tool, and that some file-sharing practices used in clinical trials promote the wide sharing of passwords among study staff.</p>
                <p>These results suggest that stronger oversight is needed on the transfer of health information in the context of clinical trials, and better training and enforcement (technical and procedural) of good security practices.</p>
            </sec>
        </sec>
    </body>
    <back>
        <ack>
            <p>We wish to thank Liam Peyton for reviewing an earlier version of this paper.</p>
        </ack>
        <fn-group>
            <fn fn-type="conflict">
                <p>None declared</p>
            </fn>
        </fn-group>
        <app-group>
            <app id="app1">
                <title>Multimedia Appendix 1</title>
                <p> Background on email file sharing in clinical trials</p>
                <media xlink:href="jmir_v13i1e18_app1.pdf" xlink:title="PDF file (Adobe PDF File), 48 KB" />
            </app>
            <app id="app2">
                <title>Multimedia Appendix 2</title>
                <p> A manually constructed password list file</p>
                <media xlink:href="jmir_v13i1e18_app2.zip" xlink:title="ZIP file (ZIP Archive), 3168 KB" />
            </app>
            <app id="app3">
                <title>Multimedia Appendix 3</title>
                <p> The “npasswd” password quality-checking tool dictionary.</p>
                <media xlink:href="jmir_v13i1e18_app3.gz" xlink:title="GZ file (GZIP Archive), 5518 KB" />
            </app>
            <app id="app4">
                <title>Multimedia Appendix 4</title>
                <p> Invitation and questions</p>
                <media xlink:href="jmir_v13i1e18_app4.pdf" xlink:title="PDF file (Adobe PDF File), 20 KB" />
            </app>
        </app-group>
        <glossary>
            <title>Abbreviations</title>
            <def-list>
                <def-item>
                    <term id="abb1">CFR</term>
                    <def>
                        <p>Code of Federal Regulations</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb2">CRF</term>
                    <def>
                        <p>Case Report Form</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb3">EDC</term>
                    <def>
                        <p>electronic data capture</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb4">FDA</term>
                    <def>
                        <p>Food and Drug Administration</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb5">HIPAA</term>
                    <def>
                        <p>Health Insurance Portability and Accountability Act</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb6">HITECH Act</term>
                    <def>
                        <p>Health Information Technology for Economic and Clinical Health Act</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb7">PHI</term>
                    <def>
                        <p>personal health information</p>
                    </def>
                </def-item>
            </def-list>
        </glossary>
        <ref-list>
            <ref id="ref1">
                <label>1</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>El Emam</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Jonker</surname>
                            <given-names>E</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sampson</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Krleza-Jerić</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Neisa</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>The use of electronic data capture tools in clinical trials: Web-survey of 259 Canadian trials</article-title>
                    <source>J Med Internet Res</source>
                    <year>2009</year>
                    <volume>11</volume>
                    <issue>1</issue>
                    <fpage>e8</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2009/1/e8/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.1120</pub-id>
                    <pub-id pub-id-type="medline">19275984</pub-id>
                    <pub-id pub-id-type="pii">v11i1e8</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2762772</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref2">
                <label>2</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Irving</surname>
                            <given-names>R</given-names>
                        </name>
                    </person-group>
                    <source>2002 Report on Information Technology in Canadian Hospitals</source>
                    <year>2003</year>
                    <publisher-loc>Thornhill, Ontario</publisher-loc>
                    <publisher-name>Canadian Healthcare Technology</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref3">
                <label>3</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <collab>Healthcare Information and Management Systems Society Foundation</collab>
                    </person-group>
                    <source>Healthcare CIO Results</source>
                    <year>2004</year>
                    <publisher-loc>Chicago, IL</publisher-loc>
                    <publisher-name>HIMSS Foundation</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref4">
                <label>4</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Andrews</surname>
                            <given-names>JE</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Pearce</surname>
                            <given-names>KA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sydney</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ireson</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Love</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <article-title>Current state of information technology use in a US primary care practice-based research network</article-title>
                    <source>Inform Prim Care</source>
                    <year>2004</year>
                    <volume>12</volume>
                    <issue>1</issue>
                    <fpage>11</fpage>
                    <lpage>8</lpage>
                    <pub-id pub-id-type="medline">15140348</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref5">
                <label>5</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Bower</surname>
                            <given-names>AG</given-names>
                        </name>
                    </person-group>
                    <source>The Diffusion and Value of Healthcare Information Technology</source>
                    <year>2005</year>
                    <publisher-loc>Santa Monica, CA</publisher-loc>
                    <publisher-name>Rand Corp.</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref6">
                <label>6</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Fonkych</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Taylor</surname>
                            <given-names>R</given-names>
                        </name>
                    </person-group>
                    <source>The State and Pattern of Health Information Technology Adoption</source>
                    <year>2005</year>
                    <publisher-loc>Santa Monica, CA</publisher-loc>
                    <publisher-name>Rand Corp.</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref7">
                <label>7</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>El Emam</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Jonker</surname>
                            <given-names>E</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sams</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Neri</surname>
                            <given-names>E</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Neisa</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Gao</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chowdhury</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <source>Pan-Canadian De-Identification Guidelines for Personal Health Information</source>
                    <year>2007</year>
                    <publisher-loc>Ottawa, Ontario</publisher-loc>
                    <publisher-name>Office of the Privacy Commissioner of Canada</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref8">
                <label>8</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>El Emam</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Dankar</surname>
                            <given-names>FK</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Vaillancourt</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Roffey</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Lysyk</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <article-title>Evaluating the risk of re-identification of patients from hospital prescription records</article-title>
                    <source>Can J Hosp Pharm</source>
                    <year>2009</year>
                    <volume>62</volume>
                    <issue>4</issue>
                    <fpage>307</fpage>
                    <lpage>319</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.cjhp-online.ca/index.php/cjhp/article/view/812/956" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref9">
                <label>9</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>El Emam</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kosseim</surname>
                            <given-names>P</given-names>
                        </name>
                    </person-group>
                    <article-title>Privacy interests in prescription records, part 2: patient privacy</article-title>
                    <source>IEEE Security &#38; Privacy Magazine</source>
                    <year>2009</year>
                    <volume>7</volume>
                    <issue>2</issue>
                    <fpage>75</fpage>
                    <lpage>78</lpage>
                    <pub-id pub-id-type="doi">10.1109/MSP.2009.47</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref10">
                <label>10</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>El Emam</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Jabbouri</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sams</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Drouet</surname>
                            <given-names>Y</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Power</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <article-title>Evaluating common de-identification heuristics for personal health information</article-title>
                    <source>J Med Internet Res</source>
                    <year>2006</year>
                    <volume>8</volume>
                    <issue>4</issue>
                    <fpage>e28</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2006/4/e28/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.8.4.e28</pub-id>
                    <pub-id pub-id-type="medline">17213047</pub-id>
                    <pub-id pub-id-type="pii">v8i4e28</pub-id>
                    <pub-id pub-id-type="pmcid">PMC1794009</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref11">
                <label>11</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Upshur</surname>
                            <given-names>RE</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Morin</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Goel</surname>
                            <given-names>V</given-names>
                        </name>
                    </person-group>
                    <article-title>The privacy paradox: laying Orwell's ghost to rest</article-title>
                    <source>CMAJ</source>
                    <year>2001</year>
                    <month>08</month>
                    <day>7</day>
                    <volume>165</volume>
                    <issue>3</issue>
                    <fpage>307</fpage>
                    <lpage>9</lpage>
                    <pub-id pub-id-type="medline">11517649</pub-id>
                    <pub-id pub-id-type="pmcid">PMC81333</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref12">
                <label>12</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Gershon</surname>
                            <given-names>AS</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Tu</surname>
                            <given-names>JV</given-names>
                        </name>
                    </person-group>
                    <article-title>The effect of privacy legislation on observational research</article-title>
                    <source>CMAJ</source>
                    <year>2008</year>
                    <month>03</month>
                    <day>25</day>
                    <volume>178</volume>
                    <issue>7</issue>
                    <fpage>871</fpage>
                    <lpage>3</lpage>
                    <pub-id pub-id-type="doi">10.1503/cmaj.061353</pub-id>
                    <pub-id pub-id-type="medline">18362384</pub-id>
                    <pub-id pub-id-type="pii">178/7/871</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2267836</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref13">
                <label>13</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Cavoukian</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <source>Office of the Privacy Commissioner of Ontario</source>
                    <year>2007</year>
                    <access-date>2007-04-20</access-date>
                    <comment>Order HO-004<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.ipc.on.ca/images/Findings/up-3ho_004.pdf">http://www.ipc.on.ca/images/Findings/up-3ho_004.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5OFOzaj1O</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref14">
                <label>14</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>El Emam</surname>
                            <given-names>K</given-names>
                        </name>
                    </person-group>
                    <source>Data Anonymization Practices in Clinical Research: A Descriptive Study</source>
                    <year>2006</year>
                    <publisher-loc>Ottawa, Ontario</publisher-loc>
                    <publisher-name>Health Canada, Access to Information and Privacy Division</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref15">
                <label>15</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Johnson</surname>
                            <given-names>ML</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bellovin</surname>
                            <given-names>SM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Reeder</surname>
                            <given-names>RW</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Schechter</surname>
                            <given-names>SE</given-names>
                        </name>
                    </person-group>
                    <article-title>Laissez-faire file sharing: access control designed for individuals at the endpoints</article-title>
                    <source>NSPW '09 Proceedings of the 2009 Workshop on New Security Paradigms</source>
                    <year>2009</year>
                    <publisher-loc>New York NY</publisher-loc>
                    <publisher-name>ACM Press</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref16">
                <label>16</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Dalal</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Nelson</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Smetters</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Good</surname>
                            <given-names>N</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Elliot</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>Ad-hoc guesting: when exceptions are the rule</article-title>
                    <year>2008</year>
                    <conf-name>Usability, Psychology, and Security 2008</conf-name>
                    <conf-date>Apr 14, 2008</conf-date>
                    <conf-loc>San Francisco, CA</conf-loc>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.usenix.org/events/upsec08/tech/full_papers/dalal/dalal_html/dalal.html" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref17">
                <label>17</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Voida</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Edwards</surname>
                            <given-names>WK</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Newman</surname>
                            <given-names>MW</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Grinter</surname>
                            <given-names>RE</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ducheneaut</surname>
                            <given-names>N</given-names>
                        </name>
                    </person-group>
                    <article-title>Share and share alike: exploring the user interface affordances of file sharing</article-title>
                    <source>Proceedings of ACM CHI 2006 Conference on Human Factors in Computing Systems</source>
                    <year>2006</year>
                    <publisher-loc>New York, NY</publisher-loc>
                    <publisher-name>ACM Press</publisher-name>
                    <fpage>221</fpage>
                    <lpage>230</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref18">
                <label>18</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Whalen</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Smetters</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Churchill</surname>
                            <given-names>EF</given-names>
                        </name>
                    </person-group>
                    <article-title>User experiences with sharing and access control</article-title>
                    <source>Proceedings of the CHI '06 Extended Abstracts on Human Factors in Computing Systems</source>
                    <year>2006</year>
                    <publisher-loc>New York, NY</publisher-loc>
                    <publisher-name>ACM Press</publisher-name>
                    <fpage>1517</fpage>
                    <lpage>1522</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref19">
                <label>19</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>Osterman Research</collab>
                    </person-group>
                    <source>Proofpoint</source>
                    <year>2010</year>
                    <access-date>2010-12-13</access-date>
                    <comment>Outbound Email and Data Loss Prevention in Today's Enterprise<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.proofpoint.com/downloads/Proofpoint-Outbound-Email-and-Data-Loss-Prevention-2010.pdf">http://www.proofpoint.com/downloads/Proofpoint-Outbound-Email-and-Data-Loss-Prevention-2010.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5ux9tNwBx</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref20">
                <label>20</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Wheeler</surname>
                            <given-names>D</given-names>
                        </name>
                    </person-group>
                    <source>Applied Clinical Trials Online</source>
                    <year>2010</year>
                    <access-date>2010-10-02</access-date>
                    <comment>Rethinking Document Sharing: The Benefits of Peer-to-Peer Networking Over Email, Fax, and Hosted Solutions<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://appliedclinicaltrialsonline.findpharma.com/appliedclinicaltrials/CRO%2FSponsor/Rethinking-Document-Sharing/ArticleStandard/Article/detail/660941">http://appliedclinicaltrialsonline.findpharma.com/appliedclinicaltrials/CRO%2FSponsor/Rethinking-Document-Sharing/ArticleStandard/Article/detail/660941</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5tBqD8vNb</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref21">
                <label>21</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Shapiro</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <source>Applied Clinical Trials Online</source>
                    <year>2009</year>
                    <access-date>2010-10-02</access-date>
                    <comment>Poll Finds Ironic Inefficiency: Uncovering the Risky Communication Methods of Clinical Trials Professionals, While Discovering a Potential Web-Based Replacement<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://appliedclinicaltrialsonline.findpharma.com/appliedclinicaltrials/article/articleDetail.jsp?id=586857">http://appliedclinicaltrialsonline.findpharma.com/appliedclinicaltrials/article/articleDetail.jsp?id=586857</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5tBqPCPWN</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref22">
                <label>22</label>
                <nlm-citation citation-type="web">
                    <source>Applied Clinical Trials Online</source>
                    <year>2009</year>
                    <comment>Document Management Inefficiencies Cost Sites Time and Money Says Intralinks' Survey<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://appliedclinicaltrialsonline.findpharma.com/appliedclinicaltrials/News/Document-Management-Inefficiencies-Cost-Sites-Time/ArticleStandard/Article/detail/601186?contextCategoryId=44911&#38;ref=25">http://appliedclinicaltrialsonline.findpharma.com/appliedclinicaltrials/News/Document-Management-Inefficiencies-Cost-Sites-Time/ArticleStandard/Article/detail/601186?contextCategoryId=44911&#38;ref=25</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5tBqd7lO7</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref23">
                <label>23</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Schmidt</surname>
                            <given-names>DA</given-names>
                        </name>
                    </person-group>
                    <source>SANS Institute InfoSec Reading Room</source>
                    <year>2003</year>
                    <access-date>2010-12-13</access-date>
                    <comment>E-mail Communication With Patients in the Wake of the HIPAA Final Security Rule<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.sans.org/reading_room/whitepapers/legal/e-mail-communication-patients-wake-hipaa-final-security-rule_1057">http://www.sans.org/reading_room/whitepapers/legal/e-mail-communication-patients-wake-hipaa-final-security-rule_1057</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5uxAd8Ign</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref24">
                <label>24</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>HIMSS Foundation</collab>
                    </person-group>
                    <source>Healthcare Information and Management Systems Society</source>
                    <year>2009</year>
                    <access-date>2010-12-13</access-date>
                    <comment>2009 HIMSS Security Survey<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.himss.org/content/files/HIMSS2009SecuritySurveyReport.pdf">http://www.himss.org/content/files/HIMSS2009SecuritySurveyReport.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5uxApn1kW</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref25">
                <label>25</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>Commonwealth of Massachusetts</collab>
                    </person-group>
                    <source>Mass.gov</source>
                    <access-date>2011-01-14</access-date>
                    <comment>201 CMR 17. 00: Standards For the Protection of Personal Information of Residents of the Commonwealth<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.mass.gov/Eoca/docs/idtheft/201CMR1700reg.pdf">http://www.mass.gov/Eoca/docs/idtheft/201CMR1700reg.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5vjwvZkj3</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref26">
                <label>26</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Worthen</surname>
                            <given-names>B</given-names>
                        </name>
                    </person-group>
                    <source>Wall Street Journal</source>
                    <year>2008</year>
                    <access-date>2010-10-03</access-date>
                    <comment>New data privacy laws set for firms<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://online.wsj.com/article/SB122411532152538495.html">http://online.wsj.com/article/SB122411532152538495.html</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5tCoEs06a</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref27">
                <label>27</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Cottis</surname>
                            <given-names>P</given-names>
                        </name>
                    </person-group>
                    <source>Redbridge Primary care Trust (NHS)</source>
                    <year>2008</year>
                    <access-date>2010-12-13</access-date>
                    <comment>Transferring Personal Information Policy and Procedures<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.redbridge.nhs.uk/files/documents/1030_transferring%20personal%20information%20policy%20080215.pdf">http://www.redbridge.nhs.uk/files/documents/1030_transferring%20personal%20information%20policy%20080215.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5uxBTsEuk</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref28">
                <label>28</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>Research Computing</collab>
                    </person-group>
                    <source>Partners Healthcare</source>
                    <year>2010</year>
                    <access-date>2010-10-03</access-date>
                    <comment>Email Encryption<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://rc.partners.org/emailencryption/">http://rc.partners.org/emailencryption/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5tCnUoOn3</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref29">
                <label>29</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Chalmers</surname>
                            <given-names>L</given-names>
                        </name>
                    </person-group>
                    <source>University of Edinburgh, Community Health Sciences</source>
                    <year>2007</year>
                    <access-date>2010-12-22</access-date>
                    <comment>Guidance to Research and the Data Protection Act<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.chs.med.ed.ac.uk/cphs/researchTraining/DPResearch.pdf">http://www.chs.med.ed.ac.uk/cphs/researchTraining/DPResearch.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5vAdm66WW</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref30">
                <label>30</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>US Department of Health and Human Services</collab>
                        <collab>Food and Drug Administration</collab>
                        <collab>Office of the Commissioner</collab>
                    </person-group>
                    <source>FDA</source>
                    <year>2007</year>
                    <access-date>2009-01-11</access-date>
                    <comment>Guidance for Industry: Computerized Systems Used in Clinical Investigations<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.fda.gov/Cder/Guidance/7359fnl.pdf">http://www.fda.gov/Cder/Guidance/7359fnl.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5dkOZy0uG</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref31">
                <label>31</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <collab>Good Automated Manufacturing Practice Forum</collab>
                    </person-group>
                    <source>The Good Automated Manufacturing Practice (GAMP) Guide for Validation of Automated Systems in Pharmaceutical Manufacture</source>
                    <year>2002</year>
                    <publisher-loc>Tampa, FL</publisher-loc>
                    <publisher-name>International Society for Pharmaceutical Engineering</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref32">
                <label>32</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>US Department of Health and Human Services</collab>
                        <collab>Food and Drug Administration</collab>
                        <collab>Center for Drug Evaluation and Research</collab>
                        <collab>Center for Biologic Evaluation and Research</collab>
                        <collab>Center for Devices and Radiological Health</collab>
                        <collab>Center for Food Safety and Applied Nutrition</collab>
                        <collab>Center for Veterinary Medicine</collab>
                        <collab>Office of Regulatory Affairs</collab>
                    </person-group>
                    <source>FDA</source>
                    <year>2003</year>
                    <access-date>2009-01-11</access-date>
                    <comment>Guidance for Industry: Part 11, Electronic Records; Electronic Signatures - Scope and Application<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.fda.gov/cder/guidance/5667fnl.pdf">http://www.fda.gov/cder/guidance/5667fnl.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5dkOj5uYQ</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref33">
                <label>33</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <collab>US Department of Health and Human Services</collab>
                        <collab>Food and Drug Administration</collab>
                    </person-group>
                    <article-title>21 CFR Part 11: electronic records; electronic signatures; final rule</article-title>
                    <source>Federal Register</source>
                    <year>1997</year>
                    <volume>62</volume>
                    <issue>54</issue>
                    <fpage>13430</fpage>
                    <lpage>13466</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.fda.gov/ora/compliance_ref/Part11/FRs/background/pt11finr.pdf" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref34">
                <label>34</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>US Department of Health and Human Services</collab>
                        <collab>Food and Drug Administration</collab>
                        <collab>Center for Biologic Evaluation and Research</collab>
                        <collab>Center for Drug Evaluation and Research</collab>
                        <collab>Center for Devices and Radiological Health</collab>
                        <collab>Center for Food Safety and Applied Nutrition</collab>
                        <collab>Center for Veterinary Medicine</collab>
                        <collab>Office of Regulatory Affairs</collab>
                    </person-group>
                    <source>FDA</source>
                    <year>1999</year>
                    <access-date>2011-01-14</access-date>
                    <comment>Guidance For Industry: Computerized Systems Used in Clinical Trials<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.fda.gov/ora/compliance_ref/bimo/ffinalcct.pdf">http://www.fda.gov/ora/compliance_ref/bimo/ffinalcct.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5vjx3KTzB</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref35">
                <label>35</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>International Pharmaceutical Privacy Consortium</collab>
                    </person-group>
                    <source>IPPC</source>
                    <year>2006</year>
                    <access-date>2010-12-23</access-date>
                    <comment>Transmission Security Practices of Pharma Sponsors of Clinical Research<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.pharmaprivacy.org/download/Clinical_Research_Transmission_Security.pdf">http://www.pharmaprivacy.org/download/Clinical_Research_Transmission_Security.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5vCIzGZd7</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref36">
                <label>36</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>US Department of Health and Human Services</collab>
                        <collab>Food and Drug Administration</collab>
                    </person-group>
                    <source>FDA</source>
                    <year>2010</year>
                    <access-date>2010-10-01</access-date>
                    <comment>FDA to Conduct Inspections Focusing on 21 CFR 11 (Part 11) Requirements Relating to Human Drugs<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.fda.gov/AboutFDA/CentersOffices/CDER/ucm204012.htm">http://www.fda.gov/AboutFDA/CentersOffices/CDER/ucm204012.htm</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5t9ze5Jnr</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref37">
                <label>37</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>DiMasi</surname>
                            <given-names>JA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hansen</surname>
                            <given-names>RW</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Grabowski</surname>
                            <given-names>HG</given-names>
                        </name>
                    </person-group>
                    <article-title>The price of innovation: new estimates of drug development costs</article-title>
                    <source>J Health Econ</source>
                    <year>2003</year>
                    <month>03</month>
                    <volume>22</volume>
                    <issue>2</issue>
                    <fpage>151</fpage>
                    <lpage>85</lpage>
                    <pub-id pub-id-type="doi">10.1016/S0167-6296(02)00126-1</pub-id>
                    <pub-id pub-id-type="medline">12606142</pub-id>
                    <pub-id pub-id-type="pii">S0167-6296(02)00126-1</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref38">
                <label>38</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Schonlau</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Fricker</surname>
                            <given-names>RD</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Elliott</surname>
                            <given-names>MN</given-names>
                        </name>
                    </person-group>
                    <source>Conducting Research Surveys Via E-mail and the Web</source>
                    <year>2002</year>
                    <publisher-loc>Santa Monica, CA</publisher-loc>
                    <publisher-name>RAND</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref39">
                <label>39</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Miles</surname>
                            <given-names>MB</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Huberman</surname>
                            <given-names>AM</given-names>
                        </name>
                    </person-group>
                    <person-group person-group-type="editor">
                        <name name-style="western">
                            <surname>Huberman</surname>
                            <given-names>AM</given-names>
                        </name>
                    </person-group>
                    <source>Qualitative Data Analysis: An Expanded Sourcebook. 2nd edition</source>
                    <year>1994</year>
                    <publisher-loc>Thousand Oaks, CA</publisher-loc>
                    <publisher-name>Sage Publications</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref40">
                <label>40</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Cazier</surname>
                            <given-names>JA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Medlin</surname>
                            <given-names>BD</given-names>
                        </name>
                    </person-group>
                    <article-title>Password security: an empirical investigation into e-commerce passwords and their crack times</article-title>
                    <source>Information Security Journal</source>
                    <year>2006</year>
                    <volume>15</volume>
                    <issue>6</issue>
                    <fpage>45</fpage>
                    <lpage>55</lpage>
                    <pub-id pub-id-type="doi">10.1080/10658980601051318</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref41">
                <label>41</label>
                <nlm-citation citation-type="web">
                    <source>Microsoft</source>
                    <year>2003</year>
                    <access-date>2010-12-17</access-date>
                    <comment>Microsoft Office 2003 Editions Security Whitepaper<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://office.microsoft.com/download/afile.aspx?AssetID=AM102424861033">http://office.microsoft.com/download/afile.aspx?AssetID=AM102424861033</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5v3FVk3pw</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref42">
                <label>42</label>
                <nlm-citation citation-type="web">
                    <source>Microsoft</source>
                    <year>2007</year>
                    <comment>2007 Office System Document: 2007 Microsoft Office System Document Encryption<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.microsoft.com/downloads/en/details.aspx?FamilyID=0444ea0e-3f62-4da0-8551-52349b70272e&#38;displaylang=en">http://www.microsoft.com/downloads/en/details.aspx?FamilyID=0444ea0e-3f62-4da0-8551-52349b70272e&#38;displaylang=en</ext-link>
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref43">
                <label>43</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Wu</surname>
                            <given-names>H</given-names>
                        </name>
                    </person-group>
                    <source>International Association for Cryptologic Research</source>
                    <year>2005</year>
                    <access-date>2011-01-14</access-date>
                    <comment>The Misuse of RC4 in Microsoft Word and Excel<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://eprint.iacr.org/2005/007.pdf">http://eprint.iacr.org/2005/007.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5vjxZJxof</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref44">
                <label>44</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Cazier</surname>
                            <given-names>JA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Medlin</surname>
                            <given-names>BD</given-names>
                        </name>
                    </person-group>
                    <article-title>How secure is your information system? An investigation into actual healthcare worker password practices</article-title>
                    <source>Perspect Health Inf Manag</source>
                    <year>2006</year>
                    <volume>3</volume>
                    <fpage>8</fpage>
                    <pub-id pub-id-type="medline">18066366</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2047302</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref45">
                <label>45</label>
                <nlm-citation citation-type="web">
                    <source>CBCnews.ca</source>
                    <year>2010</year>
                    <month>08</month>
                    <day>04</day>
                    <comment>Hundreds of Ont. Patient Health Files Stolen<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.cbc.ca/canada/toronto/story/2010/08/04/usb-medical-files-stolen684.html?ref=rss&#38;loomia_si=t0:a16:g2:r5:c0.0440057:b36264812">http://www.cbc.ca/canada/toronto/story/2010/08/04/usb-medical-files-stolen684.html?ref=rss&#38;loomia_si=t0:a16:g2:r5:c0.0440057:b36264812</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5rkr1UjXO</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref46">
                <label>46</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>Microsoft Corporation</collab>
                    </person-group>
                    <source>Microsoft</source>
                    <year>2010</year>
                    <access-date>2010-09-29</access-date>
                    <comment>Password Policy<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://office.microsoft.com/en-ca/excel-help/password-policy-HA010355926.aspx">http://office.microsoft.com/en-ca/excel-help/password-policy-HA010355926.aspx</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5t76jss0L</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref47">
                <label>47</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Bisker</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Tracy</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Jansen</surname>
                            <given-names>W</given-names>
                        </name>
                    </person-group>
                    <source>National Institute of Standards and Technology</source>
                    <year>2002</year>
                    <access-date>2010-12-16</access-date>
                    <comment>Guidelines on Electronic Mail Security<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.21cfrpart11.com/files/library/security/guidelines_on_email_sec.pdf">http://www.21cfrpart11.com/files/library/security/guidelines_on_email_sec.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5v1jynapa</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref48">
                <label>48</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Whitten</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Tygar</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>Why Johnny can't encrypt: a usability case study of PGP 5</article-title>
                    <source>Proceedings</source>
                    <year>1999</year>
                    <conf-name>8th USENIX Security Symposium</conf-name>
                    <conf-date>Aug 23-26, 1999</conf-date>
                    <conf-loc>Washington, DC</conf-loc>
                </nlm-citation>
            </ref>
            <ref id="ref49">
                <label>49</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Sheng</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Broderick</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Koranda</surname>
                            <given-names>CA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hyland</surname>
                            <given-names>JJ</given-names>
                        </name>
                    </person-group>
                    <article-title>Why Johnny still can't encrypt: evaluating the usability of email encryption software</article-title>
                    <source>CyLab Usable Privacy and Security Laboratory, Carnegie Mellon University</source>
                    <year>2006</year>
                    <conf-name>Symposium On Usable Privacy and Security</conf-name>
                    <conf-date>Jul 12-14, 2006</conf-date>
                    <conf-loc>Pittsburgh, PA</conf-loc>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://cups.cs.cmu.edu/soups/2006/posters/sheng-poster_abstract.pdf" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref50">
                <label>50</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Garfinkel</surname>
                            <given-names>SL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Miller</surname>
                            <given-names>RC</given-names>
                        </name>
                    </person-group>
                    <article-title>Johnny 2: a user test of key continuity management with S/MIME and Outlook Express</article-title>
                    <source>CyLab Usable Privacy and Security Laboratory, Carnegie Mellon University</source>
                    <year>2005</year>
                    <conf-name>Symposium On Usable Privacy and Security</conf-name>
                    <conf-date>Jul 6-8, 2005</conf-date>
                    <conf-loc>Pittsburgh, PA</conf-loc>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://cups.cs.cmu.edu/soups/2005/2005proceedings/p13-garfinkel.pdf" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref51">
                <label>51</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Firstbrook</surname>
                            <given-names>P</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ouellet</surname>
                            <given-names>E</given-names>
                        </name>
                    </person-group>
                    <source>Gartner</source>
                    <year>2010</year>
                    <access-date>2011-01-14</access-date>
                    <comment>Magic Quadrant for Secure E-mail Gateways<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://synctech.com.vn/Casestudy/Gartner%20Magic%20Quadrant%20for%20Secure%20Email%20Gateways-2010.pdf">http://synctech.com.vn/Casestudy/Gartner%20Magic%20Quadrant%20for%20Secure%20Email%20Gateways-2010.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5vjxoiPus</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref52">
                <label>52</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>WinZip Computing</collab>
                    </person-group>
                    <source>WinZip.com</source>
                    <access-date>2010-09-28</access-date>
                    <comment>How Do You Encrypt Files in a Zip File with WinZip?  2010<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://kb.winzip.com/kb/entry/78/">http://kb.winzip.com/kb/entry/78/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5t5VpbDwr</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref53">
                <label>53</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>WinZip Computing</collab>
                    </person-group>
                    <source>WinZip.com</source>
                    <year>2010</year>
                    <access-date>2010-09-28</access-date>
                    <comment>Password Policy For Encryption<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://kb.winzip.com/kb/entry/260/">http://kb.winzip.com/kb/entry/260/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5t5VlTV7O</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref54">
                <label>54</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Shinder</surname>
                            <given-names>D</given-names>
                        </name>
                    </person-group>
                    <source>TechRepublic</source>
                    <year>2007</year>
                    <access-date>2010-09-29</access-date>
                    <comment>Safeguard Your Office 2007 Files With Encryption, Document Protection, and Digital Signatures<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://articles.techrepublic.com.com/5100-10878_11-6176764.html">http://articles.techrepublic.com.com/5100-10878_11-6176764.html</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5t779mb5Y</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref55">
                <label>55</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>Axantum Software</collab>
                    </person-group>
                    <source>Axantum.com</source>
                    <year>2011</year>
                    <access-date>2011-01-14</access-date>
                    <comment>AxCrypt Software Download<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.axantum.com/AxCrypt/Downloads.html">http://www.axantum.com/AxCrypt/Downloads.html</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5vjxrk6Cb</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref56">
                <label>56</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>Federal Information Processing Standards</collab>
                    </person-group>
                    <source>National Institute of Standards and Technology, Information Technology Laboratory</source>
                    <year>1985</year>
                    <access-date>2011-01-14</access-date>
                    <comment>Standard for Password Usage<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.itl.nist.gov/fipspubs/fip112.htm">http://www.itl.nist.gov/fipspubs/fip112.htm</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5vjxt0qFA</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref57">
                <label>57</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>HITRUST Alliance</collab>
                    </person-group>
                    <source>HITRUSTAlliance.net</source>
                    <year>2010</year>
                    <access-date>2011-01-14</access-date>
                    <comment>Common Security Framework<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.hitrustalliance.net/commonsecurityframework/">http://www.hitrustalliance.net/commonsecurityframework/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">5vjxtZiZ8</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref58">
                <label>58</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Olson</surname>
                            <given-names>L</given-names>
                        </name>
                    </person-group>
                    <article-title>Electronic record challenges for clinical systems</article-title>
                    <source>Drug Inf J</source>
                    <year>2001</year>
                    <volume>35</volume>
                    <fpage>721</fpage>
                    <lpage>730</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref59">
                <label>59</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Burdon</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Low</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Reid</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>If it&#039;s encrypted its secure! The viability of US state-based encryption exemptions</article-title>
                    <source>Proceedings of the 2010 IEEE International Symposium on Technology and Society</source>
                    <year>2010</year>
                    <publisher-loc>Los Alamitos, CA</publisher-loc>
                    <publisher-name>IEEE</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref60">
                <label>60</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Burdon</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Reid</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Low</surname>
                            <given-names>R</given-names>
                        </name>
                    </person-group>
                    <article-title>Encryption safe harbours and data breach notification laws</article-title>
                    <source>Computer Law &#38; Security Review</source>
                    <year>2010</year>
                    <volume>26</volume>
                    <issue>5</issue>
                    <fpage>520</fpage>
                    <lpage>534</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.clsr.2010.07.002</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref61">
                <label>61</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Berg</surname>
                            <given-names>GG</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Freeman</surname>
                            <given-names>MS</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Schneider</surname>
                            <given-names>KN</given-names>
                        </name>
                    </person-group>
                    <article-title>Analyzing the TJ Maxx data security fiasco: lessons for auditors</article-title>
                    <source>CPA Journal</source>
                    <year>2008</year>
                    <volume>78</volume>
                    <issue>8</issue>
                    <fpage>34</fpage>
                    <lpage>37</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.nysscpa.org/cpajournal/2008/808/essentials/p34.htm" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref62">
                <label>62</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Pereira</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>Breaking the code: how credit card data went out wireless door</article-title>
                    <source>Wall Street Journal</source>
                    <year>2007</year>
                    <month>05</month>
                    <day>04</day>
                </nlm-citation>
            </ref>
        </ref-list>
    </back>
</article>
