<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="review-article" dtd-version="2.0">
    <front>
        <journal-meta>
            <journal-id journal-id-type="publisher-id">JMIR</journal-id>
            <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
            <journal-title>Journal of Medical Internet Research</journal-title>
            <issn pub-type="epub">1438-8871</issn>
            <publisher>
                <publisher-name>Gunther Eysenbach</publisher-name>
                <publisher-loc>JMIR Publications Inc., Toronto, Canada</publisher-loc>
            </publisher>
        </journal-meta>
        <article-meta>
            <article-id pub-id-type="publisher-id">v14i4e114</article-id>
            <article-id pub-id-type="pmid">22917868</article-id>
            <article-id pub-id-type="doi">10.2196/jmir.1904</article-id>
            <article-categories>
                <subj-group subj-group-type="article-type">
                    <subject>Review</subject>
                </subj-group>
            </article-categories>
            <title-group>
                <article-title>Are Personal Health Records Safe? A Review of Free Web-Accessible Personal Health Record Privacy Policies</article-title>
            </title-group>
            <contrib-group>
                <contrib contrib-type="editor">
                    <name>
                        <surname>El Emam</surname>
                        <given-names>Khaled</given-names>
                    </name>
                </contrib>
            </contrib-group>
            <contrib-group>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>Porter</surname>
                        <given-names>Stephen</given-names>
                    </name>
                </contrib>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>Malin</surname>
                        <given-names>Bradley</given-names>
                    </name>
                </contrib>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>van't Noordende</surname>
                        <given-names>Guido</given-names>
                    </name>
                </contrib>
            </contrib-group>
            <contrib-group>
                <contrib contrib-type="author" id="contrib1" corresp="yes">
                    <name name-style="western">
                        <surname>Carri&#243;n Se&#241;or</surname>
                        <given-names>Inmaculada</given-names>
                    </name>
                    <degrees>BSC</degrees>
                    <xref ref-type="aff" rid="aff1">1</xref>
                    <address>
                        <institution>Research Group of Software Engineering</institution>
                        <institution>Department of Informatics and Systems, Faculty of Computer Science, Regional Campus of International Excellence &#8220;Campus Mare Nostrum&#8221;</institution>
                        <institution>University of Murcia</institution>
                        <addr-line>Facultad de Inform&#225;tica</addr-line>
                        <addr-line>Campus de Espinardo</addr-line>
                        <addr-line>Murcia, 30100</addr-line>
                        <country>Spain</country>
                        <phone>34 868884621</phone>
                        <fax>34 868884151</fax>
                        <email>mariainmaculada.carrion@um.es</email>
                    </address>
                </contrib>
                <contrib contrib-type="author" id="contrib2">
                    <name name-style="western">
                        <surname>Fern&#225;ndez-Alem&#225;n</surname>
                        <given-names>Jos&#233; Luis</given-names>
                    </name>
                    <degrees>PhD</degrees>
                    <xref ref-type="aff" rid="aff1">1</xref>
                </contrib>
                <contrib contrib-type="author" id="contrib3">
                    <name name-style="western">
                        <surname>Toval</surname>
                        <given-names>Ambrosio</given-names>
                    </name>
                    <degrees>PhD</degrees>
                    <xref ref-type="aff" rid="aff1">1</xref>
                </contrib>
            </contrib-group>
            <aff id="aff1" rid="aff1">
                <sup>1</sup>
                <institution>Research Group of Software Engineering</institution>
                <institution>Department of Informatics and Systems, Faculty of Computer Science, Regional Campus of International Excellence &#8220;Campus Mare Nostrum&#8221;</institution>
                <institution>University of Murcia</institution>
                <addr-line>Murcia</addr-line>
                <country>Spain</country>
            </aff>
            <pub-date pub-type="collection">
                <season>Jul-Aug</season>
                <year>2012</year>
            </pub-date>
            <pub-date pub-type="epub">
                <day>23</day>
                <month>08</month>
                <year>2012</year>
            </pub-date>
            <volume>14</volume>
            <issue>4</issue>
            <elocation-id>e114</elocation-id>
            <!--history from ojs - api-xml-->
            <history>
                <date date-type="received">
                    <day>12</day>
                    <month>08</month>
                    <year>2011</year>
                </date>
                <date date-type="rev-request">
                    <day>17</day>
                    <month>10</month>
                    <year>2011</year>
                </date>
                <date date-type="rev-recd">
                    <day>03</day>
                    <month>01</month>
                    <year>2012</year>
                </date>
                <date date-type="accepted">
                    <day>30</day>
                    <month>05</month>
                    <year>2012</year>
                </date>
            </history>
            <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
            <copyright-statement>&#169;Inmaculada Carri&#243;n Se&#241;or, Jos&#233; Luis Fern&#225;ndez-Alem&#225;n, Ambrosio Toval. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 23.08.2012. </copyright-statement>
            <copyright-year>2012</copyright-year>
            <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/2.0/">
                <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.</p>
            </license>
            <self-uri xlink:href="http://www.jmir.org/2012/4/e114/" xlink:type="simple" />
            <abstract>
                <sec sec-type="background">
                    <title>Background</title>
                    <p>Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users&#8217; concerns regarding the privacy and security of their personal health information.</p>
                </sec>
                <sec sec-type="objective">
                    <title>Objective</title>
                    <p>To analyze the privacy and security characteristics of PHR privacy policies. It is hoped that identification of the strengths and weaknesses of the PHR systems will be useful for PHR users, health care professionals, decision makers, and designers.</p>
                </sec>
                <sec sec-type="methods">
                    <title>Methods</title>
                    <p>We conducted a systematic review using the principal databases related to health and computer science to discover the Web-based and free PHR systems mentioned in published articles. The privacy policy of each PHR system selected was reviewed to extract its main privacy and security characteristics.</p>
                </sec>
                <sec sec-type="results">
                    <title>Results</title>
                    <p>The search of databases and the myPHR website provided a total of 52 PHR systems, of which 24 met our inclusion criteria. Of these, 17 (71%) allowed users to manage their data and to control access to their health care information. Only 9 (38%) PHR systems permitted users to check who had accessed their data. The majority of PHR systems used information related to the users&#8217; accesses to monitor and analyze system use, 12 (50%) of them aggregated user information to publish trends, and 20 (83%) used diverse types of security measures. Finally, 15 (63%) PHR systems were based on regulations or principles such as the US Health Insurance Portability and Accountability Act (HIPAA) and the Health on the Net Foundation Code of Conduct (HONcode).</p>
                </sec>
                <sec sec-type="conclusions">
                    <title>Conclusions</title>
                    <p>Most privacy policies of PHR systems do not provide an in-depth description of the security measures that they use. Moreover, compliance with standards and regulations in PHR systems is still low.</p>
                </sec>
            </abstract>
            <kwd-group>
                <kwd>Personal health records</kwd>
                <kwd>privacy</kwd>
                <kwd>computer security</kwd>
                <kwd>standards</kwd>
                <kwd>HIPAA</kwd>
                <kwd>Health Insurance Portability and Accountability Act</kwd>
            </kwd-group>
        </article-meta>
    </front>
    <body>
        <sec sec-type="introduction">
            <title>Introduction</title>
            <p>In many countries, it is tedious for patients to obtain copies of their official health records from health care providers, which makes it difficult for patients to seek second opinions or control their own information [<xref ref-type="bibr" rid="ref1">1</xref>]. Moreover, records that patients create themselves tend not to be included in the official patient record. A personal health record (PHR) system can be maintained by patients and their families, can be shared with clinicians, and can support the maintenance of accurate and complete health records [<xref ref-type="bibr" rid="ref1">1</xref>].</p>
            <p>A PHR is &#8220;an electronic record of an individual&#8217;s health information by which the individual controls access to the information and may have the ability to manage, track, and participate in his or her own health care&#8221; [<xref ref-type="bibr" rid="ref2">2</xref>]. A PHR should include all relevant information about the user&#8217;s life, including the following items: problem list, procedures, major illnesses, allergy data, home-monitored data, family history, social history and lifestyle, immunizations, medications, laboratory tests, and genetic information [<xref ref-type="bibr" rid="ref3">3</xref>-<xref ref-type="bibr" rid="ref5">5</xref>].</p>
            <p>A PHR can take multiple forms: an independent software application running on a single computer; a Web service belonging to a single organization; a general Web service as a platform with which to collect different types of health information; or a USB-based PHR [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref7">7</xref>]. Maintaining data privacy is difficult in both PHRs and electronic health records (EHRs) [<xref ref-type="bibr" rid="ref1">1</xref>], to the extent that, for instance, administrative staff could access information without the patient&#8217;s explicit consent [<xref ref-type="bibr" rid="ref8">8</xref>]. Consumer concerns regarding PHR systems were found to be focused on two major areas: privacy and security [<xref ref-type="bibr" rid="ref9">9</xref>]. A total of 91% of surveyed Americans stated that they were very worried about the privacy and security of their health information [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref9">9</xref>]. The aim of this review is to answer the following research question: What security and privacy features do PHR systems have? We carried out an in-depth analysis of many significant issues related to the security and privacy features of PHR privacy policies. The data collected were contrasted by analyzing the privacy aspects of 50% of PHR systems.</p>
        </sec>
        <sec sec-type="methods">
            <title>Methods</title>
            <p>The methods used to carry out the review were guided by a protocol. Iterative decisions concerning data collection, fields for extraction, analysis, and other relevant aspects of the survey were discussed in meetings that were attended and documented by the authors.</p>
            <sec>
                <title>Review and Protocol</title>
                <p>This review followed the quality reporting guidelines set out in the Preferred Reporting Items for Systematic Reviews and Meta-analyses (PRISMA) statement [<xref ref-type="bibr" rid="ref10">10</xref>].</p>
            </sec>
            <sec>
                <title>Eligibility Criteria</title>
                <p>We used the following inclusion criteria (IC): (1) IC1: free PHR systems, (2) IC2: PHR systems with a Web-based format, and (3) IC3: patient-centered PHR systems with a privacy policy.</p>
                <p>Based on the International Organization for Standardization (ISO) standard ISO/TR 12773 (<italic>Business Requirements for Health Summary Records</italic>), a PHR is defined as an electronic, universally available, lifelong resource of health information maintained by individuals, as opposed to an EHR, which is a repository of health information gathered across the longitudinal electronic record of the patient. This information is generated by one or more encounters in any care delivery setting [<xref ref-type="bibr" rid="ref11">11</xref>]. Among the current variety of PHR support technologies, we focused our study on Web-based, free PHR systems. Free PHR systems can be used by anyone and are easiest to access (IC1). Web-based PHRs have certain benefits with regard to the use of the Internet (IC2) [<xref ref-type="bibr" rid="ref11">11</xref>]. Moreover, the US Institute of Medicine recommended that &#8220;access to care should be provided over the Internet, by telephone, and by other means in addition to in-person visits&#8221; [<xref ref-type="bibr" rid="ref12">12</xref>], while the 2003 Health Information National Trends Survey indicated that consumers use the Internet to access health information more often than they obtain this information from their health care professionals [<xref ref-type="bibr" rid="ref13">13</xref>]. In addition, the number of users who use the Internet to access and manage their PHR is increasing [<xref ref-type="bibr" rid="ref14">14</xref>-<xref ref-type="bibr" rid="ref18">18</xref>]. Finally, according to the ISO, the owner of the record in a PHR system can be the health care organization, provider, or patient [<xref ref-type="bibr" rid="ref11">11</xref>]. We also stipulated that the PHR systems included in the review should be patient-centered applications&#8212;that is, according to the definition of a PHR in the Health Insurance Portability and Accountability Act (HIPAA) [<xref ref-type="bibr" rid="ref2">2</xref>], the information should be totally or partially managed by the patient (IC3). We analyzed this type of PHR system because they are more flexible and useful than non-patient-centered PHR systems, although they can have more privacy and security problems.</p>
            </sec>
            <sec>
                <title>Information Sources</title>
                <p>We used two information sources: the myPHR website and scientific databases. The myPHR website was created by the American Health Information Management Association and contains information related to the use and creation of PHRs. To the best of our knowledge, this website provides the most comprehensive list of PHR systems that a user can find and has also been used to select PHR systems in multisource sampling [<xref ref-type="bibr" rid="ref19">19</xref>]. Although our primary source was myPHR, we identified other PHR systems by reading articles extracted from the Medline, ACM Digital Library, IEEE Xplore Digital Library, and ScienceDirect databases, which we searched between February and April 2011. A systematic review was then used to review the articles indexed in these databases.</p>
            </sec>
            <sec>
                <title>PHR System Selection</title>
                <p>The PHR system selection process was organized in the following six phases:</p>
                <p>1. The search for PHR systems from the myPHR website.</p>
                <p>2. The search for PHR systems from scientific databases. This phase was performed by means of a systematic review with the following search string: (&#8220;PHR providers&#8221; OR &#8220;Microsoft HealthVault&#8221; OR &#8220;Google Health&#8221;), which we adapted to database search engines. We next explored the articles identified in order to find the names of Web-based PHR systems.</p>
                <p>3. Exploration of the PHR systems found, and a selection based on eligibility criteria IC1 and IC2.</p>
                <p>4. Exploration of the PHR websites identified in order to find each one&#8217;s privacy policy and find out whether the PHR systems were patient-centered applications (eligibility criteria IC3).</p>
                <p>5. A complete reading of each of the PHR privacy policies selected in the previous phase to extract their principal privacy and security characteristics.</p>
                <p>The activities defined above were carried out by two authors independently. Disagreements were resolved by a third member of the team. The PHR system selection was developed in an iterative process of individual assessments until the interrater reliability was acceptable (0.9). In statistics, interrater reliability is the degree of agreement among raters, which gives a score with the level of consensus of the judges. We use the Cohen kappa coefficient for measuring this agreement. The Cohen kappa [<xref ref-type="bibr" rid="ref20">20</xref>] coefficient is a statistical measure of interrater reliability for qualitative (categorical) items. A value of 0.9 indicates almost perfect agreement between the two privacy policy assessments performed by two authors.</p>
            </sec>
            <sec>
                <title>Data Collection Process</title>
                <p>We collected data by using a data extraction form. The PHR system privacy policies were used to extract the methods employed to maintain the privacy and security of the users&#8217; data. The privacy policy had to satisfy the security safeguards that are appropriate to the sensitivity of the information. They are used to protect personal information, according to Yee and Korba [<xref ref-type="bibr" rid="ref21">21</xref>]. Note that Beldad et al [<xref ref-type="bibr" rid="ref22">22</xref>] state that the omission of an assurance of security in a privacy statement may cause users to think that their personal data are susceptible to potential abuse, and this could discourage them from supplying the personal data needed to complete an online transaction. According to Earp et al [<xref ref-type="bibr" rid="ref23">23</xref>], it is for this reason that online privacy statements often emphasize the application of security measures and the methods used for the collection of data.</p>
            </sec>
            <sec>
                <title>Data Items</title>
                <p>In this study, we analyzed security and privacy of PHR systems in reference to the ISO 13606 standard [<xref ref-type="bibr" rid="ref24">24</xref>]. Security was analyzed in terms of availability, confidentiality, integrity, and accountability. According to the ISO 13606 standard (<italic>Electronic Health Record Communication Part 4: Security</italic>), <italic>availability </italic>refers to the &#8220;property of being accessible and useable upon demand by an authorized entity.&#8221; This standard defines <italic>confidentiality </italic>as the &#8220;process that ensures that information is accessible only to those authorized to have access to it.&#8221; <italic>Integrity </italic>refers to the duty to ensure that information is accurate and not modified in an unauthorized fashion. <italic>Accountability </italic>refers to a person&#8217;s right to criticize or ask why something has occurred. The other topic analyzed in this study, privacy, has been defined as &#8220;the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others&#8221; [<xref ref-type="bibr" rid="ref25">25</xref>]. The characteristics analyzed in the privacy policies allowed us to analyze how privacy, integrity, and confidentiality are maintained.</p>
                <p>We designed a template for the data to be extracted from each PHR system. In total, 39 characteristics were analyzed and grouped into 12 categories, which we divided into <italic>privacy</italic>, <italic>security</italic>, and <italic>standards and regulations</italic>. <xref ref-type="table" rid="table1">Table 1</xref> shows the category descriptions. Some of the characteristics are dependent on others. A complete list of the characteristics analyzed is described in <xref ref-type="app" rid="app1">Multimedia Appendix 1</xref>.</p>
                <table-wrap id="table1" position="float">
                    <label>Table 1</label>
                    <caption>
                        <p>Description of the assessed personal health record (PHR) system characteristics.</p>
                    </caption>
                    <table cellpadding="8" cellspacing="0" border="1" rules="groups" frame="hsides" width="1000">
                        <col width="43" />
                        <col width="314" />
                        <col width="643" />
                        <thead>
                            <tr valign="top">
                                <td colspan="2">  Category  </td>
                                <td>  Description  </td>
                            </tr>
                        </thead>
                        <tbody>
                            <tr valign="top">
                                <td colspan="3">
                                    <bold>Privacy</bold>
                                </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Privacy policy location  </td>
                                <td>  Considers whether user can easily access the privacy policy  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Management and notification of privacy policy changes  </td>
                                <td>  Describes whether users are notified of changes in the privacy policy, and the means for doing so  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Access management  </td>
                                <td>  Focuses on who shares the information, with whom it is shared, and types of permissions  </td>
                            </tr>
                            <tr valign="top">
                                <td colspan="3">
                                    <bold>Security: confidentiality and integrity</bold>
                                </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Data management  </td>
                                <td>  Considers who manages the information, what information is managed, and where this information comes from  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Data accessed without user&#8217;s permission  </td>
                                <td>  Describes what data are shared without the user&#8217;s explicit consent for secondary use of the data (eg, for marketing, policy)  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Access audit  </td>
                                <td>  Informs whether the user can trace with whom his or her information has been shared  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Access criteria  </td>
                                <td>  Establishes whether the user is authorized to access the particular resource and what actions she or he is permitted to take with respect to that resource in accordance with certain access criteria  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Authentication  </td>
                                <td>  Describes the method used to prevent identity theft  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Without cookies  </td>
                                <td>  Indicates whether the system uses cookies  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Safeguards  </td>
                                <td>  Presents what security measures are deployed by the PHR system  </td>
                            </tr>
                            <tr valign="top">
                                <td colspan="3">
                                    <bold>Standards and regulations</bold>
                                </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Standards or regulations  </td>
                                <td>  Describes whether the PHR system meets any standards or regulations  </td>
                            </tr>
                        </tbody>
                    </table>
                </table-wrap>
                <p>Each of these categories satisfied one or more of the eight principles concerning privacy policies by the Canadian Standards Association [<xref ref-type="bibr" rid="ref21">21</xref>]. The categories, and the principles that they satisfy, are shown in <xref ref-type="app" rid="app1">Multimedia Appendix 1</xref>.</p>
            </sec>
            <sec>
                <title>Quality Assessment</title>
                <p>We evaluated each PHR system in relation to its characteristics. We then assigned three scores to each PHR system: total score (range 0 to 24), security score (range 0 to 14), and privacy score (range 0 to 8). The total score was obtained by adding 1 point for each characteristic that was satisfied. The security and privacy scores were obtained considering only the security and privacy characteristics, respectively, of the categories described above. To address the consistency of the rating system, we used triangulation [<xref ref-type="bibr" rid="ref26">26</xref>] among the raters&#8212;that is, more than one researcher gathered and interpreted the security and privacy characteristics. We used a Cohen kappa coefficient of 0.95, which, according to Landis and Koch [<xref ref-type="bibr" rid="ref20">20</xref>], indicates almost perfect agreement between two privacy policy assessments performed by two authors. In relation to content validity, we thoroughly reviewed the appropriate scientific literature to find recommendations and standards describing good practices for preparing privacy policies [<xref ref-type="bibr" rid="ref21">21</xref>-<xref ref-type="bibr" rid="ref23">23</xref>] to identify the items to be included. Experts then critically reviewed this list for relevance, comprehensibility, completeness, and level of detail.</p>
                <p>The test-retest [<xref ref-type="bibr" rid="ref27">27</xref>] method was used to measure the reliability of the measuring procedure. The same test was performed on the same PHR systems after a month. We obtained a correlation of 0.96 between the scores in the two assessments.</p>
            </sec>
        </sec>
        <sec sec-type="results">
            <title>Results</title>
            <sec>
                <title>Study Selection</title>
                <p>We identified 24 PHR systems in the review. The search of databases and the myPHR website provided a total of 52 PHR systems, but we discarded 11 because they did not satisfy IC1 and 13 because the did not satisfy IC2. The privacy policies of the remaining 28 PHR systems were examined, and 4 of these were discarded because they were not patient-centered PHR systems (IC3). <xref ref-type="fig" rid="figure1">Figure 1</xref> shows a PRISMA flow diagram that summarizes this process. The PHR systems included in and discarded from the review are shown in <xref ref-type="app" rid="app2">Multimedia Appendix 2</xref>.</p>
                <fig id="figure1" position="float">
                    <label>Figure 1</label>
                    <caption>
                        <p>Preferred Reporting Items for Systematic Reviews and Meta-analyses (PRISMA) flow diagram. IC1–3 = inclusion criteria 1 to 3, PHR = Personal Health Record.</p>
                    </caption>
                    <graphic xlink:href="jmir_v14i4e114_fig1.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
            </sec>
            <sec>
                <title>Study Characteristics</title>
                <p>In this section, we describe the most important features of the PHR systems included in the review. <xref ref-type="table" rid="table2">Table 2</xref> shows the percentage of PHR systems that satisfy each characteristic analyzed. <xref ref-type="table" rid="table3">Table 3</xref> [<xref ref-type="bibr" rid="ref28">28</xref>-<xref ref-type="bibr" rid="ref51">51</xref>] shows the systems selected for the study and the three scores assigned to each: security score, privacy score, and total score. More detailed information about the PHR systems analyzed is provided in the tables shown in <xref ref-type="app" rid="app3">Multimedia Appendix 3</xref>. The percentages and the scores of the dependent characteristics were calculated in relation to the number of PHR systems that met the nondependent characteristic.</p>
                <table-wrap id="table2" position="float">
                    <label>Table 2</label>
                    <caption>
                        <p>Evaluation of personal health record (PHR) system characteristics and proportion of PHR systems (n = 24) satisfying each characteristic.</p>
                    </caption>
                    <table cellpadding="8" cellspacing="0" border="1" rules="groups" frame="hsides" width="1000">
                        <col width="45" />
                        <col width="437" />
                        <col width="324" />
                        <col width="97" />
                        <col width="97" />
                        <thead>
                            <tr valign="top">
                                <td colspan="2">  Characteristic  </td>
                                <td>  Depends on  </td>
                                <td>  n  </td>
                                <td>  %  </td>
                            </tr>
                        </thead>
                        <tbody>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>Privacy policy location</bold>
                                </td>
                                <td />
                                <td />
                                <td />
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Accessible  </td>
                                <td />
                                <td>  23  </td>
                                <td>  96  </td>
                            </tr>
                            <tr valign="top">
                                <td colspan="3">
                                    <bold>Notification of changes to privacy policy</bold>
                                </td>
                                <td />
                                <td />
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Change notification  </td>
                                <td>  Accessible  </td>
                                <td>  14  </td>
                                <td>  61  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Change notification on website  </td>
                                <td>  Change notification  </td>
                                <td>  12  </td>
                                <td>  86  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Change notification directly  </td>
                                <td>  Change notification  </td>
                                <td>  3  </td>
                                <td>  21  </td>
                            </tr>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>Access management</bold>
                                </td>
                                <td />
                                <td />
                                <td />
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  User grants access  </td>
                                <td />
                                <td>  17  </td>
                                <td>  71  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  User grants access to health care professionals  </td>
                                <td>  User grants access  </td>
                                <td>  10  </td>
                                <td>  59  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  User grants access to people with other roles  </td>
                                <td>  User grants access  </td>
                                <td>  3  </td>
                                <td>  18  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Kinds of permissions  </td>
                                <td />
                                <td>  5  </td>
                                <td>  21  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Access in case of emergency  </td>
                                <td>  User grants access  </td>
                                <td>  6  </td>
                                <td>  35  </td>
                            </tr>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>Data management</bold>
                                </td>
                                <td />
                                <td />
                                <td />
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  User adds, modifies, removes, and updates information  </td>
                                <td />
                                <td>  20  </td>
                                <td>  83  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Health care professionals update or add information  </td>
                                <td />
                                <td>  5  </td>
                                <td>  21  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Family members&#8217; data  </td>
                                <td>  User adds, modifies, removes and updates information  </td>
                                <td>  3  </td>
                                <td>  15  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Connection with other PHRs  </td>
                                <td>  User adds, modifies, removes and updates information  </td>
                                <td>  4  </td>
                                <td>  20  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Monitoring devices  </td>
                                <td />
                                <td>  2  </td>
                                <td>  8  </td>
                            </tr>
                            <tr valign="top">
                                <td colspan="3">
                                    <bold>Data accessed without user&#8217;s permission</bold>
                                </td>
                                <td />
                                <td />
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Not accessed or information related to the user&#8217;s accesses  </td>
                                <td />
                                <td>  6  </td>
                                <td>  25  </td>
                            </tr>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>Access audit</bold>
                                </td>
                                <td />
                                <td />
                                <td />
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Who has accessed it  </td>
                                <td />
                                <td>  9  </td>
                                <td>  38  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  With what aim  </td>
                                <td>  Who has accessed it  </td>
                                <td>  2  </td>
                                <td>  22  </td>
                            </tr>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>Access criteria</bold>
                                </td>
                                <td />
                                <td />
                                <td />
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Roles  </td>
                                <td />
                                <td>  13  </td>
                                <td>  54  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Groups  </td>
                                <td />
                                <td>  0  </td>
                                <td>  0  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Location  </td>
                                <td />
                                <td>  1  </td>
                                <td>  4  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Time  </td>
                                <td />
                                <td>  2  </td>
                                <td>  8  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Transaction type  </td>
                                <td />
                                <td>  0  </td>
                                <td>  0  </td>
                            </tr>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>Without cookies</bold>
                                </td>
                                <td />
                                <td />
                                <td />
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Yes  </td>
                                <td />
                                <td>  9  </td>
                                <td>  38  </td>
                            </tr>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>Authentication</bold>
                                </td>
                                <td />
                                <td />
                                <td />
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Something known  </td>
                                <td />
                                <td>  23  </td>
                                <td>  96  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Something the user has  </td>
                                <td />
                                <td>  1  </td>
                                <td>  4  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Biometric factors  </td>
                                <td />
                                <td>  0  </td>
                                <td>  0  </td>
                            </tr>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>Safeguards</bold>
                                </td>
                                <td />
                                <td />
                                <td />
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Physical security measures  </td>
                                <td />
                                <td>  15  </td>
                                <td>  63  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Limited access  </td>
                                <td />
                                <td>  5  </td>
                                <td>  21  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Electronic security measures  </td>
                                <td />
                                <td>  16  </td>
                                <td>  67  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Encrypted data  </td>
                                <td />
                                <td>  12  </td>
                                <td>  50  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Backup system  </td>
                                <td />
                                <td>  4  </td>
                                <td>  17  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Defined data security plan  </td>
                                <td />
                                <td>  1  </td>
                                <td>  4  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Staff training  </td>
                                <td />
                                <td>  1  </td>
                                <td>  4  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  Privacy seal  </td>
                                <td />
                                <td>  4  </td>
                                <td>  17  </td>
                            </tr>
                            <tr valign="top">
                                <td colspan="2">
                                    <bold>Standard or regulations</bold>
                                </td>
                                <td />
                                <td />
                                <td />
                            </tr>
                            <tr valign="bottom">
                                <td />
                                <td>  HIPAA<sup>a </sup>considered  </td>
                                <td />
                                <td>  10  </td>
                                <td>  42  </td>
                            </tr>
                            <tr valign="top">
                                <td />
                                <td>  HIPAA  </td>
                                <td>  HIPAA considered  </td>
                                <td>  6  </td>
                                <td>  60  </td>
                            </tr>
                            <tr valign="bottom">
                                <td />
                                <td>  HONcode<sup>b</sup>
                                </td>
                                <td />
                                <td>  7  </td>
                                <td>  29  </td>
                            </tr>
                        </tbody>
                    </table>
                    <table-wrap-foot>
                        <fn id="table2fn1">
                            <p>
                                <sup>a </sup>Health Insurance Portability and Accountability Act.</p>
                        </fn>
                        <fn id="table2fn2">
                            <p>
                                <sup>b </sup>Health on the Net Foundation Code of Conduct.</p>
                        </fn>
                    </table-wrap-foot>
                </table-wrap>
                <table-wrap id="table3" position="float">
                    <label>Table 3</label>
                    <caption>
                        <p>The personal health record (PHR) systems and their assigned scores<sup>a</sup>.</p>
                    </caption>
                    <table cellpadding="8" cellspacing="0" border="1" rules="groups" frame="hsides" width="1000">
                        <col width="397" />
                        <col width="219" />
                        <col width="201" />
                        <col width="183" />
                        <thead>
                            <tr valign="top">
                                <td>  PHR and reference  </td>
                                <td>  Security score  </td>
                                <td>  Privacy score  </td>
                                <td>  Total score  </td>
                            </tr>
                        </thead>
                        <tbody>
                            <tr valign="top">
                                <td>  Microsoft HealthVault [<xref ref-type="bibr" rid="ref28">28</xref>]  </td>
                                <td>  14  </td>
                                <td>  7  </td>
                                <td>  23  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Google Health [<xref ref-type="bibr" rid="ref30">30</xref>]  </td>
                                <td>  10  </td>
                                <td>  7  </td>
                                <td>  18  </td>
                            </tr>
                            <tr valign="top">
                                <td>  NoMoreClipBoard [<xref ref-type="bibr" rid="ref32">32</xref>]  </td>
                                <td>  8  </td>
                                <td>  6  </td>
                                <td>  16  </td>
                            </tr>
                            <tr valign="top">
                                <td>  HealthyCircles [<xref ref-type="bibr" rid="ref34">34</xref>]  </td>
                                <td>  11  </td>
                                <td>  4  </td>
                                <td>  15  </td>
                            </tr>
                            <tr valign="top">
                                <td>  myHealthFolders [<xref ref-type="bibr" rid="ref36">36</xref>]  </td>
                                <td>  10  </td>
                                <td>  5  </td>
                                <td>  15  </td>
                            </tr>
                            <tr valign="top">
                                <td>  RememberItNow! [<xref ref-type="bibr" rid="ref38">38</xref>]  </td>
                                <td>  7  </td>
                                <td>  8  </td>
                                <td>  15  </td>
                            </tr>
                            <tr valign="top">
                                <td>  MiVIA [<xref ref-type="bibr" rid="ref40">40</xref>]  </td>
                                <td>  8  </td>
                                <td>  4  </td>
                                <td>  14  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Telemedical [<xref ref-type="bibr" rid="ref42">42</xref>]  </td>
                                <td>  8  </td>
                                <td>  4  </td>
                                <td>  13  </td>
                            </tr>
                            <tr valign="top">
                                <td>  MedicAlert [<xref ref-type="bibr" rid="ref44">44</xref>]  </td>
                                <td>  7  </td>
                                <td>  5  </td>
                                <td>  12  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Juniper Health [<xref ref-type="bibr" rid="ref46">46</xref>]  </td>
                                <td>  8  </td>
                                <td>  4  </td>
                                <td>  12  </td>
                            </tr>
                            <tr valign="top">
                                <td>  MediCompass [<xref ref-type="bibr" rid="ref48">48</xref>]  </td>
                                <td>  6  </td>
                                <td>  3  </td>
                                <td>  12  </td>
                            </tr>
                            <tr valign="top">
                                <td>  myMediConnect [<xref ref-type="bibr" rid="ref50">50</xref>]  </td>
                                <td>  8  </td>
                                <td>  3  </td>
                                <td>  12  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Health Butler [<xref ref-type="bibr" rid="ref29">29</xref>]  </td>
                                <td>  7  </td>
                                <td>  3  </td>
                                <td>  11  </td>
                            </tr>
                            <tr valign="top">
                                <td>  ZebraHealth [<xref ref-type="bibr" rid="ref31">31</xref>]  </td>
                                <td>  8  </td>
                                <td>  1  </td>
                                <td>  11  </td>
                            </tr>
                            <tr valign="top">
                                <td>  My Doclopedia PHR [<xref ref-type="bibr" rid="ref33">33</xref>]  </td>
                                <td>  5  </td>
                                <td>  5  </td>
                                <td>  11  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Dr. I-Net [<xref ref-type="bibr" rid="ref35">35</xref>]  </td>
                                <td>  7  </td>
                                <td>  3  </td>
                                <td>  11  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Keas [<xref ref-type="bibr" rid="ref37">37</xref>]  </td>
                                <td>  5  </td>
                                <td>  4  </td>
                                <td>  9  </td>
                            </tr>
                            <tr valign="top">
                                <td>  MedsFile.com [<xref ref-type="bibr" rid="ref39">39</xref>]  </td>
                                <td>  6  </td>
                                <td>  3  </td>
                                <td>  9  </td>
                            </tr>
                            <tr valign="top">
                                <td>  PatientsLikeMe [<xref ref-type="bibr" rid="ref41">41</xref>]  </td>
                                <td>  2  </td>
                                <td>  6  </td>
                                <td>  9  </td>
                            </tr>
                            <tr valign="top">
                                <td>  My HealtheVet [<xref ref-type="bibr" rid="ref43">43</xref>]  </td>
                                <td>  6  </td>
                                <td>  1  </td>
                                <td>  9  </td>
                            </tr>
                            <tr valign="top">
                                <td>  dLife [<xref ref-type="bibr" rid="ref45">45</xref>]  </td>
                                <td>  3  </td>
                                <td>  3  </td>
                                <td>  7  </td>
                            </tr>
                            <tr valign="top">
                                <td>  MyChart [<xref ref-type="bibr" rid="ref47">47</xref>]  </td>
                                <td>  4  </td>
                                <td>  1  </td>
                                <td>  7  </td>
                            </tr>
                            <tr valign="top">
                                <td>  EMRy Stick [<xref ref-type="bibr" rid="ref49">49</xref>]  </td>
                                <td>  5  </td>
                                <td>  2  </td>
                                <td>  7  </td>
                            </tr>
                            <tr valign="top">
                                <td>  iHealthRecord [<xref ref-type="bibr" rid="ref51">51</xref>]  </td>
                                <td>  4  </td>
                                <td>  1  </td>
                                <td>  5  </td>
                            </tr>
                        </tbody>
                    </table>
                    <table-wrap-foot>
                        <fn id="table3fn1">
                            <p>
                                <sup>a </sup>Maximum possible scores: 14 (security score), 8 (privacy score), 24 (total score).</p>
                        </fn>
                    </table-wrap-foot>
                </table-wrap>
                <sec>
                    <title>Privacy</title>
                    <p>The privacy policy document must be easily accessible to PHR systems users. This document was accessible or available in 23 of the 24 PHRs, with myMediConnect being the only PHR system to lack this characteristic. The details of its privacy policy were in the website&#8217;s FAQ section [<xref ref-type="bibr" rid="ref50">50</xref>]. Of the PHR systems analyzed, 14 indicated that their users are notified of changes to their privacy policy. Changes could be announced on the home page [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref40">40</xref>-<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref44">44</xref>-<xref ref-type="bibr" rid="ref46">46</xref>] or via email [<xref ref-type="bibr" rid="ref39">39</xref>]. A total of 17 of the PHR systems allowed users to grant and revoke access to their data, and 10 indicated that users could grant access to their data to health care professionals. Among these, Google Health and Microsoft HealthVault [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref30">30</xref>] also allowed access to be granted to other system users or to certain services or applications (such as insurance companies or pharmacies).</p>
                    <p>Only 5 of the PHR systems reviewed defined kinds of permissions. The Google Health PHR system [<xref ref-type="bibr" rid="ref30">30</xref>] determined two access types for services or applications: write-only access and read/write access. The RememberItNow! PHR system [<xref ref-type="bibr" rid="ref38">38</xref>] defined three kinds of accesses: write, read, and administrator. Microsoft HealthVault [<xref ref-type="bibr" rid="ref28">28</xref>] established access levels for users and programs. The Healthy Circles PHR system [<xref ref-type="bibr" rid="ref34">34</xref>] defined read permission and read/write permission. PatientsLikeMe [<xref ref-type="bibr" rid="ref41">41</xref>] allowed the contents to be public (anyone could access them) or visible (only PatientsLikeMe users could access them). Finally, only 6 PHRs considered data access in case of an emergency. This access could be total [<xref ref-type="bibr" rid="ref34">34</xref>] or partial [<xref ref-type="bibr" rid="ref28">28</xref>].</p>
                </sec>
                <sec>
                    <title>Confidentiality and Integrity</title>
                    <p>PHRs contain information users&#8217; personal data, which are managed by the user in 20 of the PHRs reviewed. However, MyChart indicated that its users could not manage their own data [<xref ref-type="bibr" rid="ref47">47</xref>]. Users could only notify the associated health care providers of incorrect data, but not modify them. MyChart was responsible for managing the data. The remainder of the PHR systems did not indicate whether users could manage their data.</p>
                    <p>A total of 12 PHR systems used aggregated information about users to publish trends or to improve their services [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref32">32</xref>-<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref44">44</xref>,<xref ref-type="bibr" rid="ref46">46</xref>,<xref ref-type="bibr" rid="ref48">48</xref>]. Of the PHR systems reviewed, 3 could access users&#8217; identifiable data without their consent [<xref ref-type="bibr" rid="ref39">39</xref>,<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref47">47</xref>].</p>
                    <p>One mechanism that allowed users to verify whether data confidentiality and integrity were maintained is access audit. In this respect, 9 of the PHR systems permitted users to check who had accessed their data [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref49">49</xref>], and 2 of them allowed users to verify what changes were made [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref30">30</xref>].</p>
                    <p>PHR systems also presented security measures to maintain data integrity and guarantee confidentiality. Of the PHR systems reviewed, 20 indicated whether they used physical or electronic security measures: 15 of them used physical security measures in their servers. On the other hand, we found 12 PHR systems that used encryption to protect the data during transmission [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref46">46</xref>,<xref ref-type="bibr" rid="ref50">50</xref>], and 4 also stored the data encrypted [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref46">46</xref>]. And 1, ZebraHealth [<xref ref-type="bibr" rid="ref31">31</xref>], stated that they regularly reviewed and revised data security plans as required by the evolution of technological and security needs. Some PHR systems even had a privacy seal: Microsoft HealthVault, Healthy Circles, Juniper Health, and dLife were certified by TRUSTe [<xref ref-type="bibr" rid="ref52">52</xref>].</p>
                    <p>To avoid unauthorized access of users&#8217; records, an authentication system is required. The most widespread authentication system was the combination of a user ID with a password, which is something the user knows [<xref ref-type="bibr" rid="ref28">28</xref>-<xref ref-type="bibr" rid="ref51">51</xref>]. Some PHR systems combined this with the use of an activation code that had been given to users previously [<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref51">51</xref>]. Only 1 PHR used something the user has for authentication. To access MedsFile.com [<xref ref-type="bibr" rid="ref39">39</xref>], users had to enter the personal identification number on their access card.</p>
                    <p>As for the access criteria, the most common one was role-based access control [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref39">39</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref42">42</xref>-<xref ref-type="bibr" rid="ref44">44</xref>,<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref51">51</xref>]. PHR systems allowed patients, health care providers, insurances, companies, etc, to access records. Access criteria based on location were applied by 1 PHR [<xref ref-type="bibr" rid="ref40">40</xref>]. This PHR changed the data shown, such as the list of health care providers, depending on the country from which the user accessed the system. Moreover, 2 PHRs enabled users to establish a period of validity for permissions, which were revoked once this period expired [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref38">38</xref>].</p>
                </sec>
                <sec>
                    <title>Standards and Regulations</title>
                    <p>Some legislation and statements are satisfied by or related to the PHR system analyzed. A total of 6 systems complied with HIPAA, while another 4 indicated in their privacy policy that they were not covered by HIPAA, although some of their procedures were inspired by this regulation. Finally, another 7 PHR systems complied with the Health on the Net Foundation Code of Conduct (HONcode) principles for trustworthy health information. HONcode is the oldest and most-used ethical and trustworthiness code for medical and health-related information available on the Internet.</p>
                </sec>
            </sec>
            <sec>
                <title>Verification of the Information Contained in Privacy Policies</title>
                <p>We triangulated [<xref ref-type="bibr" rid="ref26">26</xref>] sources of data (chosen at random) to raise the level of confidence in our results and to ensure that the data we collected would enable us to draw valid conclusions. Two authors analyzed the privacy aspects of 11 systems by logging in to the PHR systems&#8217; Web portals and verifying whether their privacy policy satisfied the characteristics we had defined. Unfortunately, we were able to verify only a subset of the characteristics analyzed because we could not verify some of them, such as whether the physical measures were really being applied, from the websites. The results obtained were cross-checked against our two initial assessments of the PHR privacy policies. As <xref ref-type="table" rid="table4">Table 4</xref> shows, the level of agreement is between high and perfect in three-quarters of the cases [<xref ref-type="bibr" rid="ref20">20</xref>]. However, the differences we found are not significant because they only lay in some privacy functionalities that were not mentioned in the privacy policies.</p>
                <table-wrap id="table4" position="float">
                    <label>Table 4</label>
                    <caption>
                        <p>Kappa coefficients for level of agreement in cross-checks of privacy policy assessment.</p>
                    </caption>
                    <table cellpadding="8" cellspacing="0" border="1" rules="groups" frame="hsides" width="1000">
                        <col width="457" />
                        <col width="281" />
                        <col width="261" />
                        <thead>
                            <tr valign="top">
                                <td>  Personal health record system  </td>
                                <td>  Kappa coefficient  </td>
                                <td>  Agreement level  </td>
                            </tr>
                        </thead>
                        <tbody>
                            <tr valign="top">
                                <td>  Dr. I-Net  </td>
                                <td>  0.42  </td>
                                <td>  Low  </td>
                            </tr>
                            <tr valign="top">
                                <td>  EMRy Stick  </td>
                                <td>  0.77  </td>
                                <td>  High  </td>
                            </tr>
                            <tr valign="top">
                                <td>  HealthButler  </td>
                                <td>  0.79  </td>
                                <td>  High  </td>
                            </tr>
                            <tr valign="top">
                                <td>  HealthyCircles  </td>
                                <td>  0.82  </td>
                                <td>  Almost perfect  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Juniper Health  </td>
                                <td>  0.77  </td>
                                <td>  High  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Microsoft HealthVault  </td>
                                <td>  1  </td>
                                <td>  Perfect  </td>
                            </tr>
                            <tr valign="top">
                                <td>  My DoclopediaPHR  </td>
                                <td>  0.9  </td>
                                <td>  Almost perfect  </td>
                            </tr>
                            <tr valign="top">
                                <td>  myHealthFolders  </td>
                                <td>  0.81  </td>
                                <td>  Almost perfect  </td>
                            </tr>
                            <tr valign="top">
                                <td>  myMediConnect  </td>
                                <td>  0.55  </td>
                                <td>  Medium  </td>
                            </tr>
                            <tr valign="top">
                                <td>  NoMoreClipBoard  </td>
                                <td>  0.62  </td>
                                <td>  High  </td>
                            </tr>
                            <tr valign="top">
                                <td>  RememberItNow!  </td>
                                <td>  0.71  </td>
                                <td>  High  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Telemedical  </td>
                                <td>  0.38  </td>
                                <td>  Low  </td>
                            </tr>
                        </tbody>
                    </table>
                </table-wrap>
            </sec>
        </sec>
        <sec sec-type="discussion">
            <title>Discussion</title>
            <p>The main characteristics of the PHR systems reviewed are summarized below. These characteristics answer our research question of what security and privacy features PRH systems have.</p>
            <sec>
                <title>What Security and Privacy Features do PHR Systems Have?</title>
                <sec>
                    <title>Privacy</title>
                    <p>In general, most of the PHR systems we reviewed had a document called a privacy policy. This document contains the information related to how the user&#8217;s information is managed by the system. The user should be able to access this document [<xref ref-type="bibr" rid="ref53">53</xref>]. Moreover, users must be notified of changes to the privacy policy, given the importance of this document. To fulfill this requirement, most of the PHR systems published an advertisement on their website, which obliges the user to check the PHR website to verify whether the privacy policy has changed. Some authors [<xref ref-type="bibr" rid="ref54">54</xref>] believe that direct notification of any change is a better solution. One characteristic not found in the PHRs we reviewed is that of notifying users when their data have been exposed. Some regulations, such as the Directive on Privacy and Electronic Communications of the European Union [<xref ref-type="bibr" rid="ref55">55</xref>], indicate that users have the right to be notified of any personal information disclosure. Most states in the United States also have data breach notification laws [<xref ref-type="bibr" rid="ref56">56</xref>], which PHR systems must satisfy. These require a data custodian to report a data breach to the individuals affected, state attorneys general, the media, consumer reporting agencies, or other government agencies. One means to ensure that users trust their data security is to indicate that the PHR website is certified by a certification authority. The PHR systems we reviewed used the TRUSTe [<xref ref-type="bibr" rid="ref52">52</xref>] certification, which guarantees that the security requirements included in the privacy policies are supported by the website.</p>
                    <p>With regard to PHR access management, 71% of PHR systems allowed users to grant and revoke access to their data. This characteristic is particularly important because users require more flexible ways of sharing data, allowing the user to choose who can access their data, which data they can access, and at what level of access [<xref ref-type="bibr" rid="ref57">57</xref>]. A problematic issue is the access to users&#8217; data in case of emergency&#8212;that is, when users cannot explicitly grant access. We found that 35% of PHRs considered this case and provided some type of mechanism to permit the appropriate health care professionals (previously authorized by the user) to access the user&#8217;s data. Some PHR systems, such as Microsoft HealthVault, allowed users to select what information could be shared and with whom in case of emergency. Nevertheless, emergency access increases the risk of data breaches. Some national laws assume implicit patient consent in an emergency situation [<xref ref-type="bibr" rid="ref58">58</xref>], which does not guarantee the privacy of patients&#8217; data. Moreover, this unusual access adds an extra complexity level to the access control model [<xref ref-type="bibr" rid="ref58">58</xref>]. On the other hand, not all users are very inclined to share their data in a health emergency. Users with good or excellent health are less likely to share their data during this kind of situation [<xref ref-type="bibr" rid="ref59">59</xref>].</p>
                    <p>Finally, ownership of the PHR is an important issue to consider. In Europe, although the PHR can store patient information from a health care provider, the patient owns only the copy stored in the PHR, not the information stored with the provider [<xref ref-type="bibr" rid="ref60">60</xref>]. This is, for instance, the case in the Dutch system. Such a system allows users to remove data from their PHR, but they cannot remove data from a hospital EHR. Other approaches allowed users to access but not modify their PHR, such as HealthSpace [<xref ref-type="bibr" rid="ref57">57</xref>]. This may make the PHR of less value to patients and physicians, as no information flows back, but it does provide more security. In the United States, there is the case of My HealtheVet, which is a PHR system developed by the Department of Veterans Affairs. According My HealtheVet&#8217;s privacy policy, although the content is managed by the Department, the PHR is the property of the veteran and she or he can also manage the information [<xref ref-type="bibr" rid="ref61">61</xref>].</p>
                </sec>
                <sec>
                    <title>Confidentiality and Integrity</title>
                    <p>We examined patient-centered PHR systems in this review, and they allow users to manage their data. In other words, users can add, modify, remove, and update their health data in 83% of cases, according to our review. Connecting the PHR to the EHR would lead to more comprehensive data management by patients [<xref ref-type="bibr" rid="ref62">62</xref>]. However some physicians have expressed their concern about giving patients so much control over their records, because the information stored in PHRs might be less accurate if patients do not know what exactly is included in them, in comparison with non-patient-centered PHRs [<xref ref-type="bibr" rid="ref63">63</xref>]. Moreover, if a PHR is hacked&#8212;and the patient&#8217;s data are modified&#8212;then, physicians cannot be sure of the correctness of the data [<xref ref-type="bibr" rid="ref63">63</xref>]. When information comes from several sources, greater privacy and security risks emerge. However, determining the most appropriate strategy remains an open question: to have multiple reliable sources of information, or to have the patient be the only information source.</p>
                    <p>Few PHRs permit users to check who accessed their data. This aspect should be improved because, according to HIPAA&#8217;s Privacy Rule and Security Rule and to ISO 13606, users should be aware of how their information has been shared.</p>
                    <p>We found that 3 (13%) of PHR systems used information related to users&#8217; accesses and identified user information to monitor system use without the user&#8217;s explicit consent. Since the users&#8217; privacy should be guaranteed, their identifiable information should not be accessed without their consent [<xref ref-type="bibr" rid="ref64">64</xref>]. Half of the PHR systems used de-identified or aggregated user information. However, it is very difficult to retrieve sufficient information when aggregated data are used in order to ensure that patients cannot be identified, so some risk of re-identification will usually remain [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref65">65</xref>]. A further issue is that PHR privacy policies did not indicate what information they aggregated. PHR designers could consider studies such as that of Sweeney, who designed a model called k-anonymity, and the accompanying policies that allow the individual&#8217;s information to be protected, because this cannot be distinguished from, at least, k - 1 other individuals&#8217; information [<xref ref-type="bibr" rid="ref66">66</xref>]. With regard to the information de-identification process, HIPAA indicates that there are two ways to do this: a formal determination by a qualified statistician, or the removal of specified identifiers of the individual and of the individual&#8217;s relatives, household members, and employers. Removal of identifiers is adequate only if the entity covered has no actual knowledge that the remaining information could be used to identify the individual. In any case, one of these two means is required [<xref ref-type="bibr" rid="ref2">2</xref>].</p>
                    <p>The PHR systems must take physical and electronic measures to protect user information [<xref ref-type="bibr" rid="ref67">67</xref>]. Of the PHR systems we analyzed, in their privacy policies, 63% indicated their physical measures and 67% explicitly stated their electronic security measures; however, only 4 (17%) stated that the data were encrypted both for transmission over the network and for storage. The most widely used encryption scheme for communications was secure socket layer. However, encryption is only part of the solution to protect data. There are also other threats, such as virus-infected systems, against which the PHR systems must be protected. Although there are no well-documented examples of EHR/PHR systems linked to security breaches [<xref ref-type="bibr" rid="ref68">68</xref>], designers should consider threats to Web applications at least when they deploy their PHR system. In 2008, over 63% of all documented vulnerabilities affected Web applications [<xref ref-type="bibr" rid="ref69">69</xref>].</p>
                    <p>Important for security vulnerability is authentication [<xref ref-type="bibr" rid="ref70">70</xref>]. All the PHR systems we analyzed used only one authentication method, the use of something the user knows or has. However, two of the following three methods are recommended for inclusion in an identification system: something a person knows, such as login ID; something a person has, such as an access card; or something that identifies a person, such as biometrics. Therefore, designers should incorporate another authentication system to strengthen authentication [<xref ref-type="bibr" rid="ref71">71</xref>]. Moreover, the use of passwords as an authentication mechanism is exposed to multiple types of attacks, such as electronic monitoring of network traffic to capture information, or unauthorized access to the password file.</p>
                    <p>Finally, 38% of the PHR systems used cookies to remember that the user had already logged in. Using cookies increases the likelihood of identity attacks because the cookie&#8217;s authentication data can be intercepted by a hacker to gain access to the user&#8217;s health data [<xref ref-type="bibr" rid="ref70">70</xref>].</p>
                </sec>
                <sec>
                    <title>Standards and Regulations</title>
                    <p>Finally, less than half of the PHR systems we reviewed were based on standards or regulations, and this shows that there is no guarantee that the privacy and security of patients&#8217; data is ensured. The most frequently referenced regulation is HIPAA, used in the United States. HIPAA is a federal law that protects health information and ensures that patients have access to their own medical records while assigning new responsibilities to those in charge of protecting this information. Although PHR systems are not required to meet HIPAA by law, users might believe that their data are better protected if the PHR satisfies HIPAA [<xref ref-type="bibr" rid="ref72">72</xref>].</p>
                </sec>
            </sec>
            <sec>
                <title>Limitations</title>
                <p>This study had several limitations. Although we conducted a comprehensive literature search on numerous databases using a variety of pertinent search terms, certain PHR systems may have been overlooked due to the lack of indexing in the searched databases. In addition, we recognize that several key PHR systems that were included in the original sample of 51 were excluded as a result of selection criteria. Moreover, we may have excluded some PHR systems if we did not find their privacy policies on their website.</p>
                <p>Since this study only analyzed the security and privacy characteristics of PHR systems, it lacks information about the users. Our results cannot easily be generalized to populations, since PHR systems are not equally used by people of different age groups.</p>
                <p>The scope of this study did not include analysis of real functionality of PHR systems, and some PHR systems may not satisfy their own privacy policies, so incorrect data may have affected the results of the study. However, this limitation is diminished because we cross-checked the results against an evaluation of actual functionality of 50% of the PHRs.</p>
                <p>Another limitation of our study is related to third-party access to the PHR. This characteristic turns PHR systems into a more flexible tool, although it would be necessary to analyze the privacy policies of these parties.</p>
            </sec>
            <sec>
                <title>Conclusions</title>
                <p>In general, PHR systems allow users to manage their personal health data and to control who has access to them. However, there is a debate regarding the degree to which individuals should be able to control this access, and the forms that this control may take: some PHR systems allow their users only read-only access, while others offer individuals total control [<xref ref-type="bibr" rid="ref73">73</xref>,<xref ref-type="bibr" rid="ref74">74</xref>].</p>
                <p>The strengths and weaknesses in the privacy and security of PHR systems will be useful for PHR users, health care professionals, decision makers, and system builders. In accordance with the privacy policies, PHR systems do not provide an in-depth description of the security measures used. The designs of privacy policies also need to be improved to include more detailed information related to security measures, and PHR system designers should focus their efforts on increasing the quality of security measures at all stages of system development [<xref ref-type="bibr" rid="ref75">75</xref>].</p>
                <p>The use of standards and regulations by PHR systems is still low. The majority of companies that design PHR systems are not covered by HIPAA [<xref ref-type="bibr" rid="ref7">7</xref>]. This may be one of the reasons why users do not use PHR systems [<xref ref-type="bibr" rid="ref72">72</xref>].</p>
                <p>Finally, the development of third-party applications that add new functionality to PHR systems is increasing. An example of this is Microsoft HealthVault, which has more than 50 third-party applications [<xref ref-type="bibr" rid="ref28">28</xref>]. This connection to other applications, such as PHR systems, could also cause important security breaches.</p>
            </sec>
        </sec>
    </body>
    <back>
        <app-group>
            <app id="app1">
                <title>Multimedia Appendix 1</title>
                <p>Characteristics analyzed and principles that they satisfy.</p>
                <media xlink:href="jmir_v14i4e114_app1.pdf" xlink:title="PDF File (Adobe PDF File), 47KB" />
            </app>
            <app id="app2">
                <title>Multimedia Appendix 2</title>
                <p>List of personal health record systems excluded and included in the study.</p>
                <media xlink:href="jmir_v14i4e114_app2.pdf" xlink:title="PDF File (Adobe PDF File), 29KB" />
            </app>
            <app id="app3">
                <title>Multimedia Appendix 3</title>
                <p>Characteristics of personal health record systems included in the review.</p>
                <media xlink:href="jmir_v14i4e114_app3.pdf" xlink:title="PDF File (Adobe PDF File), 75KB" />
            </app>
        </app-group>
        <glossary>
            <title>Abbreviations</title>
            <def-list>
                <def-item>
                    <term id="abb1">EHR</term>
                    <def>
                        <p> electronic health record</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb2">HIPAA</term>
                    <def>
                        <p> Health Insurance Portability and Accountability Act</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb3">HONcode</term>
                    <def>
                        <p> Health on the Net Foundation Code of Conduct</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb4">ISO</term>
                    <def>
                        <p> International Organization for Standardization</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb5">PHR</term>
                    <def>
                        <p> personal health record</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb6">PRISMA</term>
                    <def>
                        <p> Preferred Reporting Items for Systematic Reviews and Meta-analyses</p>
                    </def>
                </def-item>
            </def-list>
        </glossary>
        <ack>
            <p>This work has been partially financed by the Spanish Ministry of Science and Innovation, project PANGEA, TIN2009-13718-C02-02.</p>
        </ack>
        <fn-group>
            <fn fn-type="conflict">
                <p>None declared.</p>
            </fn>
        </fn-group>
        <ref-list>
            <ref id="ref1">
                <label>1</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Liu</surname>
                            <given-names>LS</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Shih</surname>
                            <given-names>PC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hayes</surname>
                            <given-names>GR</given-names>
                        </name>
                    </person-group>
                    <article-title>Barriers to the adoption and use of personal health record systems</article-title>
                    <source>Proceedings of the iConference</source>
                    <year>2011</year>
                    <conf-name>iConference</conf-name>
                    <conf-date>Feb 8-11, 2011</conf-date>
                    <conf-loc>Seattle, WA, USA</conf-loc>
                    <publisher-loc>New York, NY</publisher-loc>
                    <publisher-name>ACM</publisher-name>
                    <fpage>363</fpage>
                    <lpage>70</lpage>
                    <pub-id pub-id-type="doi">10.1145/1940761.1940811</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref2">
                <label>2</label>
                <nlm-citation citation-type="web">
                    <source>US Department of Health and Human Services, Office for Civil Rights</source>
                    <year>2008</year>
                    <month>12</month>
                    <day>15</day>
                    <access-date>2011-08-05</access-date>
                    <comment>Personal Health Records and the HIPAA Privacy Rule<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.hhs.gov/ocr/privacy/hipaa/understanding/special/healthit/phrs.pdf">http://www.hhs.gov/ocr/privacy/hipaa/understanding/special/healthit/phrs.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iXgrSXM</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref3">
                <label>3</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Fernandez-Luque</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Karlsen</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bonander</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>Review of extracting information from the Social Web for health personalization</article-title>
                    <source>J Med Internet Res</source>
                    <year>2011</year>
                    <month>01</month>
                    <volume>13</volume>
                    <issue>1</issue>
                    <fpage>e15</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2011/1/e15/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.1432</pub-id>
                    <pub-id pub-id-type="medline">21278049</pub-id>
                    <pub-id pub-id-type="pii">v13i1e15</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3221336</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref4">
                <label>4</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Tang</surname>
                            <given-names>PC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ash</surname>
                            <given-names>JS</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bates</surname>
                            <given-names>DW</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Overhage</surname>
                            <given-names>JM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sands</surname>
                            <given-names>DZ</given-names>
                        </name>
                    </person-group>
                    <article-title>Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption</article-title>
                    <source>J Am Med Inform Assoc</source>
                    <year>2006</year>
                    <month>04</month>
                    <volume>13</volume>
                    <issue>2</issue>
                    <fpage>121</fpage>
                    <lpage>6</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://jamia.bmj.com/cgi/pmidlookup?view=long&#38;pmid=16357345" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1197/jamia.M2025</pub-id>
                    <pub-id pub-id-type="medline">16357345</pub-id>
                    <pub-id pub-id-type="pii">M2025</pub-id>
                    <pub-id pub-id-type="pmcid">PMC1447551</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref5">
                <label>5</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Adida</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kohane</surname>
                            <given-names>IS</given-names>
                        </name>
                    </person-group>
                    <article-title>GenePING: secure, scalable management of personal genomic data</article-title>
                    <source>BMC Genomics</source>
                    <year>2006</year>
                    <month>04</month>
                    <volume>7</volume>
                    <fpage>93</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.biomedcentral.com/1471-2164/7/93" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1186/1471-2164-7-93</pub-id>
                    <pub-id pub-id-type="medline">16638151</pub-id>
                    <pub-id pub-id-type="pii">1471-2164-7-93</pub-id>
                    <pub-id pub-id-type="pmcid">PMC1524750</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref6">
                <label>6</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Bonander</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Gates</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <article-title>Public health in an era of personal health records: opportunities for innovation and new partnerships</article-title>
                    <source>J Med Internet Res</source>
                    <year>2010</year>
                    <month>08</month>
                    <volume>12</volume>
                    <issue>3</issue>
                    <fpage>e33</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2010/3/e33/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.1346</pub-id>
                    <pub-id pub-id-type="medline">20699216</pub-id>
                    <pub-id pub-id-type="pii">v12i3e33</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2956336</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref7">
                <label>7</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Kaelber</surname>
                            <given-names>DC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Jha</surname>
                            <given-names>AK</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Johnston</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Middleton</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bates</surname>
                            <given-names>DW</given-names>
                        </name>
                    </person-group>
                    <article-title>A research agenda for personal health records (PHRs)</article-title>
                    <source>J Am Med Inform Assoc</source>
                    <year>2008</year>
                    <month>12</month>
                    <volume>15</volume>
                    <issue>6</issue>
                    <fpage>729</fpage>
                    <lpage>36</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://jamia.bmj.com/cgi/pmidlookup?view=long&#38;pmid=18756002" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1197/jamia.M2547</pub-id>
                    <pub-id pub-id-type="medline">18756002</pub-id>
                    <pub-id pub-id-type="pii">M2547</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2585530</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref8">
                <label>8</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Anderson</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Brown</surname>
                            <given-names>I</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Dowty</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Inglesant</surname>
                            <given-names>P</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Heath</surname>
                            <given-names>W</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sasse</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <source>Joseph Rowntree Reform Trust Ltd</source>
                    <year>2009</year>
                    <access-date>2011-12-02</access-date>
                    <comment>Database State<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.cl.cam.ac.uk/~rja14/Papers/database-state.pdf">http://www.cl.cam.ac.uk/~rja14/Papers/database-state.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">63dH8MiQ0</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref9">
                <label>9</label>
                <nlm-citation citation-type="web">
                    <source>Connecting For Health: The Personal Health Working Group Final Report</source>
                    <year>2003</year>
                    <access-date>2012-08-06</access-date>
                    <publisher-loc>New York, NY</publisher-loc>
                    <publisher-name>Markle Foundation</publisher-name>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.policyarchive.org/handle/10207/bitstreams/15473.pdf">http://www.policyarchive.org/handle/10207/bitstreams/15473.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">69iJt9UgM</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref10">
                <label>10</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Liberati</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Altman</surname>
                            <given-names>DG</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Tetzlaff</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Mulrow</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>G&#248;tzsche</surname>
                            <given-names>PC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ioannidis</surname>
                            <given-names>JP</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Clarke</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Devereaux</surname>
                            <given-names>PJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kleijnen</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Moher</surname>
                            <given-names>D</given-names>
                        </name>
                    </person-group>
                    <article-title>The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration</article-title>
                    <source>J Clin Epidemiol</source>
                    <year>2009</year>
                    <month>10</month>
                    <volume>62</volume>
                    <issue>10</issue>
                    <fpage>e1</fpage>
                    <lpage>34</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.jclinepi.2009.06.006</pub-id>
                    <pub-id pub-id-type="medline">19631507</pub-id>
                    <pub-id pub-id-type="pii">S0895-4356(09)00180-2</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref11">
                <label>11</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Caligtan</surname>
                            <given-names>CA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Dykes</surname>
                            <given-names>PC</given-names>
                        </name>
                    </person-group>
                    <article-title>Electronic health records and personal health records</article-title>
                    <source>Semin Oncol Nurs</source>
                    <year>2011</year>
                    <month>08</month>
                    <volume>27</volume>
                    <issue>3</issue>
                    <fpage>218</fpage>
                    <lpage>28</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.soncn.2011.04.007</pub-id>
                    <pub-id pub-id-type="medline">21783013</pub-id>
                    <pub-id pub-id-type="pii">S0749-2081(11)00035-0</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref12">
                <label>12</label>
                <nlm-citation citation-type="web">
                    <source>Institute of Medicine</source>
                    <year>2001</year>
                    <month>03</month>
                    <day>5</day>
                    <access-date>2012-08-06</access-date>
                    <comment>Crossing the Quality Chasm: A New Health System for the 21st Century<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.iom.edu/~/media/Files/Report%20Files/2001/Crossing-the-Quality-Chasm/Quality%20Chasm%202001%20%20report%20brief.pdf">http://www.iom.edu/~/media/Files/Report%20Files/2001/Crossing-the-Quality-Chasm/Quality%20Chasm%202001%20%20report%20brief.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">69iPFk2Zq</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref13">
                <label>13</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Hesse</surname>
                            <given-names>BW</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Nelson</surname>
                            <given-names>DE</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kreps</surname>
                            <given-names>GL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Croyle</surname>
                            <given-names>RT</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Arora</surname>
                            <given-names>NK</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Rimer</surname>
                            <given-names>BK</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Viswanath</surname>
                            <given-names>K</given-names>
                        </name>
                    </person-group>
                    <article-title>Trust and sources of health information: the impact of the Internet and its implications for health care providers: findings from the first Health Information National Trends Survey</article-title>
                    <source>Arch Intern Med</source>
                    <year>2005</year>
                    <volume>165</volume>
                    <issue>22</issue>
                    <fpage>2618</fpage>
                    <lpage>24</lpage>
                    <pub-id pub-id-type="doi">10.1001/archinte.165.22.2618</pub-id>
                    <pub-id pub-id-type="medline">16344419</pub-id>
                    <pub-id pub-id-type="pii">165/22/2618</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref14">
                <label>14</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Sittig</surname>
                            <given-names>DF</given-names>
                        </name>
                    </person-group>
                    <article-title>Personal health records on the internet: a snapshot of the pioneers at the end of the 20th Century</article-title>
                    <source>Int J Med Inform</source>
                    <year>2002</year>
                    <month>04</month>
                    <volume>65</volume>
                    <issue>1</issue>
                    <fpage>1</fpage>
                    <lpage>6</lpage>
                    <pub-id pub-id-type="medline">11904243</pub-id>
                    <pub-id pub-id-type="pii">S1386505601002155</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref15">
                <label>15</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Kummervold</surname>
                            <given-names>PE</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chronaki</surname>
                            <given-names>CE</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Lausen</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Prokosch</surname>
                            <given-names>HU</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Rasmussen</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Santana</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Staniszewski</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Wangberg</surname>
                            <given-names>SC</given-names>
                        </name>
                    </person-group>
                    <article-title>eHealth trends in Europe 2005-2007: a population-based survey</article-title>
                    <source>J Med Internet Res</source>
                    <year>2008</year>
                    <volume>10</volume>
                    <issue>4</issue>
                    <fpage>e42</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2008/4/e42/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.1023</pub-id>
                    <pub-id pub-id-type="medline">19017584</pub-id>
                    <pub-id pub-id-type="pii">v10i4e42</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2629359</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref16">
                <label>16</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Kim</surname>
                            <given-names>MI</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Johnson</surname>
                            <given-names>KB</given-names>
                        </name>
                    </person-group>
                    <article-title>Personal health records: evaluation of functionality and utility</article-title>
                    <source>J Am Med Inform Assoc</source>
                    <year>2002</year>
                    <month>04</month>
                    <volume>9</volume>
                    <issue>2</issue>
                    <fpage>171</fpage>
                    <lpage>80</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://jamia.bmj.com/cgi/pmidlookup?view=long&#38;pmid=11861632" />
                    </comment>
                    <pub-id pub-id-type="medline">11861632</pub-id>
                    <pub-id pub-id-type="pmcid">PMC344574</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref17">
                <label>17</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Simons</surname>
                            <given-names>WW</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Mandl</surname>
                            <given-names>KD</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kohane</surname>
                            <given-names>IS</given-names>
                        </name>
                    </person-group>
                    <article-title>The PING personally controlled electronic medical record system: technical architecture</article-title>
                    <source>J Am Med Inform Assoc</source>
                    <year>2005</year>
                    <month>02</month>
                    <volume>12</volume>
                    <issue>1</issue>
                    <fpage>47</fpage>
                    <lpage>54</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://jamia.bmj.com/cgi/pmidlookup?view=long&#38;pmid=15492031" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1197/jamia.M1592</pub-id>
                    <pub-id pub-id-type="medline">15492031</pub-id>
                    <pub-id pub-id-type="pii">M1592</pub-id>
                    <pub-id pub-id-type="pmcid">PMC543826</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref18">
                <label>18</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Ball</surname>
                            <given-names>MJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Smith</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bakalar</surname>
                            <given-names>RS</given-names>
                        </name>
                    </person-group>
                    <article-title>Personal health records: empowering consumers</article-title>
                    <source>J Healthc Inf Manag</source>
                    <year>2007</year>
                    <volume>21</volume>
                    <issue>1</issue>
                    <fpage>76</fpage>
                    <lpage>86</lpage>
                    <pub-id pub-id-type="medline">17299929</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref19">
                <label>19</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Hulse</surname>
                            <given-names>NC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Wood</surname>
                            <given-names>GM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Haug</surname>
                            <given-names>PJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Williams</surname>
                            <given-names>MS</given-names>
                        </name>
                    </person-group>
                    <article-title>Deriving consumer-facing disease concepts for family health histories using multi-source sampling</article-title>
                    <source>J Biomed Inform</source>
                    <year>2010</year>
                    <month>10</month>
                    <volume>43</volume>
                    <issue>5</issue>
                    <fpage>716</fpage>
                    <lpage>24</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.jbi.2010.04.003</pub-id>
                    <pub-id pub-id-type="medline">20382264</pub-id>
                    <pub-id pub-id-type="pii">S1532-0464(10)00050-X</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref20">
                <label>20</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Landis</surname>
                            <given-names>JR</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Koch</surname>
                            <given-names>GG</given-names>
                        </name>
                    </person-group>
                    <article-title>The measurement of observer agreement for categorical data</article-title>
                    <source>Biometrics</source>
                    <year>1977</year>
                    <month>03</month>
                    <volume>33</volume>
                    <issue>1</issue>
                    <fpage>159</fpage>
                    <lpage>74</lpage>
                    <pub-id pub-id-type="medline">843571</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref21">
                <label>21</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Yee</surname>
                            <given-names>G</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Korba</surname>
                            <given-names>L</given-names>
                        </name>
                    </person-group>
                    <article-title>Personal privacy policies</article-title>
                    <source>Vacca JR, editor. Computer and Information Security Handbook</source>
                    <year>2009</year>
                    <publisher-loc>Amsterdam</publisher-loc>
                    <publisher-name>Morgan Kaufmann</publisher-name>
                    <fpage>487</fpage>
                    <lpage>505</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref22">
                <label>22</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Beldad</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Jong</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Steehouder</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <article-title>Reading the least read? Indicators of users' intention to consult privacy statements on municipal websites</article-title>
                    <source>Gov Inf Q</source>
                    <year>2010</year>
                    <month>07</month>
                    <volume>27</volume>
                    <issue>3</issue>
                    <fpage>238</fpage>
                    <lpage>44</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.giq.2010.01.004</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref23">
                <label>23</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Earp</surname>
                            <given-names>JB</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Anton</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Aiman-Smith</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Stufflebeam</surname>
                            <given-names>WH</given-names>
                        </name>
                    </person-group>
                    <article-title>Examining internet privacy policies within the context of user privacy values</article-title>
                    <source>IEEE Trans Eng Manag</source>
                    <year>2005</year>
                    <volume>52</volume>
                    <issue>2</issue>
                    <fpage>227</fpage>
                    <pub-id pub-id-type="doi">10.1109/TEM.2005.844927</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref24">
                <label>24</label>
                <nlm-citation citation-type="web">
                    <source>International Organization for Standardization</source>
                    <year>2011</year>
                    <access-date>2011-08-05</access-date>
                    <comment>ISO/TS 13606-4:2009: Health informatics -- Electronic Health Record Communication -- Part 4: Security<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=50121">http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=50121</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iYu0R7f</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref25">
                <label>25</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Westin</surname>
                            <given-names>AF</given-names>
                        </name>
                    </person-group>
                    <source>Privacy and Freedom</source>
                    <year>1970</year>
                    <publisher-loc>London</publisher-loc>
                    <publisher-name>Bodley Head</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref26">
                <label>26</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Denzin</surname>
                            <given-names>NK</given-names>
                        </name>
                    </person-group>
                    <source>Sociological Methods: A Sourcebook</source>
                    <year>2006</year>
                    <publisher-loc>New Brunswick, NJ</publisher-loc>
                    <publisher-name>Aldine Transaction</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref27">
                <label>27</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Carmines</surname>
                            <given-names>EG</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Zeller</surname>
                            <given-names>RA</given-names>
                        </name>
                    </person-group>
                    <source>Reliability and Validity Assessment</source>
                    <year>1979</year>
                    <publisher-loc>Thousand Oaks, CA</publisher-loc>
                    <publisher-name>Sage Publications</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref28">
                <label>28</label>
                <nlm-citation citation-type="web">
                    <source>Microsoft</source>
                    <year>2012</year>
                    <access-date>2011-08-05</access-date>
                    <comment>Microsoft HealthVault<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.microsoft.com/en-us/healthvault">http://www.microsoft.com/en-us/healthvault</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iZtNKO9</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref29">
                <label>29</label>
                <nlm-citation citation-type="web">
                    <source>Health Butler, LLC</source>
                    <year>2011</year>
                    <access-date>2011-08-05</access-date>
                    <comment>HealthButler<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://healthbutler.com/">http://healthbutler.com/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iZYlaTs</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref30">
                <label>30</label>
                <nlm-citation citation-type="web">
                    <source>Google</source>
                    <year>2011</year>
                    <access-date>2011-08-05</access-date>
                    <comment>Google Health<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.google.com/health/">https://www.google.com/health/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60ialazPN</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref31">
                <label>31</label>
                <nlm-citation citation-type="web">
                    <source>ZebraHealth, Inc</source>
                    <year>2011</year>
                    <access-date>2011-08-05</access-date>
                    <comment>ZebraHealth<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.zebrahealth.com/">https://www.zebrahealth.com/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iaQFShX</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref32">
                <label>32</label>
                <nlm-citation citation-type="web">
                    <source>NoMoreClipboard.com</source>
                    <year>2009</year>
                    <access-date>2011-08-05</access-date>
                    <comment>NoMoreClipBoard<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.nomoreclipboard.com/">http://www.nomoreclipboard.com/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iaC3pH9</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref33">
                <label>33</label>
                <nlm-citation citation-type="web">
                    <source>Doclopedia</source>
                    <access-date>2011-08-05</access-date>
                    <comment>My Doclopedia PHR<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.doclopedia.com/Login.aspx">https://www.doclopedia.com/Login.aspx</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iZvVD0s</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref34">
                <label>34</label>
                <nlm-citation citation-type="web">
                    <source>HealthyCircles</source>
                    <year>2011</year>
                    <access-date>2011-08-05</access-date>
                    <comment>HealthyCircles<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.healthycircles.com/">https://www.healthycircles.com/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iZb4z21</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref35">
                <label>35</label>
                <nlm-citation citation-type="web">
                    <source>Dr. I-Net Corp</source>
                    <access-date>2011-08-05</access-date>
                    <comment>Dr. I-Net<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.drinet.com/">http://www.drinet.com/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iZTcn9T</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref36">
                <label>36</label>
                <nlm-citation citation-type="web">
                    <access-date>2011-08-05</access-date>
                    <comment>What is myHealthFolders? MyHealthFolders, LLC# 2011<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://myhealthfolders.com/">https://myhealthfolders.com/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60ia7bGZC</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref37">
                <label>37</label>
                <nlm-citation citation-type="web">
                    <source>Keas, Inc#</source>
                    <year>2011</year>
                    <access-date>2011-08-05</access-date>
                    <comment>Keas<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://keas.com/">https://keas.com/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iZjrP1e</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref38">
                <label>38</label>
                <nlm-citation citation-type="web">
                    <source>RememberItNow! LLC</source>
                    <access-date>2011-08-05</access-date>
                    <comment>RememberItNow!<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.rememberitnow.com/">http://www.rememberitnow.com/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iaEGjsk</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref39">
                <label>39</label>
                <nlm-citation citation-type="web">
                    <source>MedsFile</source>
                    <year>2010</year>
                    <access-date>2011-08-05</access-date>
                    <comment>medsfile<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.medsfile.com/">http://www.medsfile.com/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iZrMEgp</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref40">
                <label>40</label>
                <nlm-citation citation-type="web">
                    <source>Community Health Resource &#38; Development Center</source>
                    <year>2010</year>
                    <access-date>2011-08-05</access-date>
                    <comment>MiVIA<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.mivia.org/">https://www.mivia.org/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iaMiN6d</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref41">
                <label>41</label>
                <nlm-citation citation-type="web">
                    <source>PatientsLikeMe</source>
                    <year>2011</year>
                    <access-date>2011-12-02</access-date>
                    <comment>PatientsLikeMe<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.patientslikeme.com/">http://www.patientslikeme.com/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">63dHNkcBq</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref42">
                <label>42</label>
                <nlm-citation citation-type="web">
                    <source>Dr. Carr</source>
                    <year>2011</year>
                    <access-date>2011-08-05</access-date>
                    <comment>Telemedical<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.telemedical.com/">http://www.telemedical.com/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iaKHr6W</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref43">
                <label>43</label>
                <nlm-citation citation-type="web">
                    <source>US Department of Veterans Affairs</source>
                    <year>2012</year>
                    <access-date>2011-08-05</access-date>
                    <comment>My HealtheVet<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.myhealth.va.gov/">http://www.myhealth.va.gov/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iZz644p</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref44">
                <label>44</label>
                <nlm-citation citation-type="web">
                    <source>MedicAlert Foundation</source>
                    <year>2011</year>
                    <access-date>2011-08-05</access-date>
                    <comment>MedicAlert<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.medicalert.org/">http://www.medicalert.org/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iZmQ7p5</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref45">
                <label>45</label>
                <nlm-citation citation-type="web">
                    <source>LifeMed Media, Inc</source>
                    <year>2011</year>
                    <access-date>2011-08-05</access-date>
                    <comment>dLife<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.dlife.com/">http://www.dlife.com/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iZOypVa</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref46">
                <label>46</label>
                <nlm-citation citation-type="web">
                    <source>Toucan Health Systems, LLC</source>
                    <year>2011</year>
                    <access-date>2011-08-05</access-date>
                    <comment>Juniper Health<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://juniperhealth.com/">https://juniperhealth.com/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iZhdziv</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref47">
                <label>47</label>
                <nlm-citation citation-type="web">
                    <source>Epic Systems Corporation</source>
                    <year>2010</year>
                    <access-date>2011-08-05</access-date>
                    <comment>MyChart<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.mychartlink.com/mychart/">https://www.mychartlink.com/mychart/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60ia5GhT5</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref48">
                <label>48</label>
                <nlm-citation citation-type="web">
                    <source>iMetrikus, Inc</source>
                    <year>2011</year>
                    <access-date>2011-08-05</access-date>
                    <comment>MediCompass Care Coordination Platform<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.medicompass.com/mcweb/default.aspx">https://www.medicompass.com/mcweb/default.aspx</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iZoo4n3</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref49">
                <label>49</label>
                <nlm-citation citation-type="web">
                    <source>MDGuidelines ePHR</source>
                    <access-date>2011-08-05</access-date>
                    <comment>Welcome to EmryStick. com<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://phr.emrystick.com/">http://phr.emrystick.com/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iZVtRvV</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref50">
                <label>50</label>
                <nlm-citation citation-type="web">
                    <source>MediConnect Global Inc</source>
                    <year>2011</year>
                    <access-date>2011-08-05</access-date>
                    <comment>myMediConnect<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.mymediconnect.net/index.php">http://www.mymediconnect.net/index.php</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iZKF7Qb</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref51">
                <label>51</label>
                <nlm-citation citation-type="web">
                    <source>Medfusion</source>
                    <year>2007</year>
                    <access-date>2011-08-05</access-date>
                    <comment>Weldome to iHealthRecord by Medfusion<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://medfusion.net/ihealthrecord/">http://medfusion.net/ihealthrecord/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iZdbCcs</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref52">
                <label>52</label>
                <nlm-citation citation-type="web">
                    <source>TRUSTe</source>
                    <access-date>2011-08-05</access-date>
                    <comment>TRUSTe<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.truste.com/">http://www.truste.com/</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iadtEia</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref53">
                <label>53</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Martino</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ahuja</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <article-title>Privacy policies of personal health records: an evaluation of their effectiveness in protecting patient information</article-title>
                    <source>Proceedings of the 1st ACM International Health Informatics Symposium</source>
                    <year>2010</year>
                    <conf-name>1st ACM International Health Informatics Symposium (IHI '10)</conf-name>
                    <conf-date>Nov 11-12, 2010</conf-date>
                    <conf-loc>Arlington, VA, USA</conf-loc>
                    <publisher-loc>New York, NY, USA</publisher-loc>
                    <fpage>191</fpage>
                    <lpage>200</lpage>
                    <pub-id pub-id-type="doi">10.1145/1882992.1883020</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref54">
                <label>54</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Carri&#243;n</surname>
                            <given-names>I</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Fern&#225;ndez-Alem&#225;n</surname>
                            <given-names>JL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Jayne</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Palmer-Brown</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Toval</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Carrillo de Gea</surname>
                            <given-names>JM</given-names>
                        </name>
                    </person-group>
                    <article-title>Evaluation and neuronal network-based classification of the PHRs privacy policies</article-title>
                    <source>Proceedings of the 45th Hawaii International Conference on System Sciences</source>
                    <year>2012</year>
                    <conf-name>45th Hawaii International Conference on System Sciences</conf-name>
                    <conf-date>Jan 4-7, 2012</conf-date>
                    <conf-loc>Wailea, Maui, HI.  USA</conf-loc>
                    <fpage>2840</fpage>
                    <lpage>9</lpage>
                    <pub-id pub-id-type="doi">10.1109/HICSS.2012.257</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref55">
                <label>55</label>
                <nlm-citation citation-type="web">
                    <source>Official Journal of the European Communities</source>
                    <year>2002</year>
                    <month>07</month>
                    <day>31</day>
                    <access-date>2012-02-16</access-date>
                    <comment>Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2001 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications)<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2002:201:0037:0047:en:PDF">http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2002:201:0037:0047:en:PDF</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">65VNHZNQy</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref56">
                <label>56</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Lesemann</surname>
                            <given-names>D</given-names>
                        </name>
                    </person-group>
                    <article-title>Once more unto the breach: an analysis of legal, technological and policy issues involving data breach notification statutes</article-title>
                    <source>Akron Intellect Prop J</source>
                    <year>2010</year>
                    <volume>4</volume>
                    <fpage>203</fpage>
                    <lpage>38</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1671082" />
                    </comment>
                </nlm-citation>
            </ref>
            <ref id="ref57">
                <label>57</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Greenhalgh</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hinder</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Stramer</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bratan</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Russell</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>Adoption, non-adoption, and abandonment of a personal electronic health record: case study of HealthSpace</article-title>
                    <source>BMJ</source>
                    <year>2010</year>
                    <volume>341</volume>
                    <fpage>c5814</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.bmj.com/cgi/pmidlookup?view=long&#38;pmid=21081595" />
                    </comment>
                    <pub-id pub-id-type="medline">21081595</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2982892</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref58">
                <label>58</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>van der Linden</surname>
                            <given-names>H</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kalra</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hasman</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Talmon</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>Inter-organizational future proof EHR systems. A review of the security and privacy related issues</article-title>
                    <source>Int J Med Inform</source>
                    <year>2009</year>
                    <month>03</month>
                    <volume>78</volume>
                    <issue>3</issue>
                    <fpage>141</fpage>
                    <lpage>60</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2008.06.013</pub-id>
                    <pub-id pub-id-type="medline">18760661</pub-id>
                    <pub-id pub-id-type="pii">S1386-5056(08)00108-1</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref59">
                <label>59</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Weitzman</surname>
                            <given-names>ER</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kaci</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Mandl</surname>
                            <given-names>KD</given-names>
                        </name>
                    </person-group>
                    <article-title>Sharing medical data for health research: the early personal health record experience</article-title>
                    <source>J Med Internet Res</source>
                    <year>2010</year>
                    <volume>12</volume>
                    <issue>2</issue>
                    <fpage>e14</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2010/2/e14/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.1356</pub-id>
                    <pub-id pub-id-type="medline">20501431</pub-id>
                    <pub-id pub-id-type="pii">v12i2e14</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2956225</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref60">
                <label>60</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>van't Noordende</surname>
                            <given-names>G</given-names>
                        </name>
                    </person-group>
                    <article-title>Security in the Dutch electronic patient record system</article-title>
                    <source>Proceedings</source>
                    <year>2010</year>
                    <conf-name>Second annual workshop on Security and Privacy in Medical and Home-Care Systems</conf-name>
                    <conf-date>Oct 4-8, 2010</conf-date>
                    <conf-loc>Chicago, IL, USA</conf-loc>
                    <publisher-loc>New York, NY, USA</publisher-loc>
                    <publisher-name>ACM</publisher-name>
                    <fpage>21</fpage>
                    <lpage>32</lpage>
                    <pub-id pub-id-type="doi">10.1145/1866914.1866918</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref61">
                <label>61</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Nazi</surname>
                            <given-names>KM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hogan</surname>
                            <given-names>TP</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Wagner</surname>
                            <given-names>TH</given-names>
                        </name>
                        <name name-style="western">
                            <surname>McInnes</surname>
                            <given-names>DK</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Smith</surname>
                            <given-names>BM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Haggstrom</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Chumbler</surname>
                            <given-names>NR</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Gifford</surname>
                            <given-names>AL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Charters</surname>
                            <given-names>KG</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Saleem</surname>
                            <given-names>JJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Weingardt</surname>
                            <given-names>KR</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Fischetti</surname>
                            <given-names>LF</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Weaver</surname>
                            <given-names>FM</given-names>
                        </name>
                    </person-group>
                    <article-title>Embracing a health services research perspective on personal health records: lessons learned from the VA My HealtheVet system</article-title>
                    <source>J Gen Intern Med</source>
                    <year>2010</year>
                    <month>01</month>
                    <volume>25 Suppl 1</volume>
                    <fpage>62</fpage>
                    <lpage>7</lpage>
                    <pub-id pub-id-type="doi">10.1007/s11606-009-1114-6</pub-id>
                    <pub-id pub-id-type="medline">20077154</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2806958</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref62">
                <label>62</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Maloney</surname>
                            <given-names>FL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Wright</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>USB-based Personal Health Records: an analysis of features and functionality</article-title>
                    <source>Int J Med Inform</source>
                    <year>2010</year>
                    <month>02</month>
                    <volume>79</volume>
                    <issue>2</issue>
                    <fpage>97</fpage>
                    <lpage>111</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2009.11.005</pub-id>
                    <pub-id pub-id-type="medline">20053582</pub-id>
                    <pub-id pub-id-type="pii">S1386-5056(09)00177-4</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref63">
                <label>63</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Yau</surname>
                            <given-names>GL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Williams</surname>
                            <given-names>AS</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Brown</surname>
                            <given-names>JB</given-names>
                        </name>
                    </person-group>
                    <article-title>Family physicians' perspectives on personal health records: qualitative study</article-title>
                    <source>Can Fam Physician</source>
                    <year>2011</year>
                    <month>05</month>
                    <volume>57</volume>
                    <issue>5</issue>
                    <fpage>e178</fpage>
                    <lpage>84</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.cfp.ca/cgi/pmidlookup?view=long&#38;pmid=21642732" />
                    </comment>
                    <pub-id pub-id-type="medline">21642732</pub-id>
                    <pub-id pub-id-type="pii">57/5/e178</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3093606</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref64">
                <label>64</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>El Emam</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Jabbouri</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sams</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Drouet</surname>
                            <given-names>Y</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Power</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <article-title>Evaluating common de-identification heuristics for personal health information</article-title>
                    <source>J Med Internet Res</source>
                    <year>2006</year>
                    <month>11</month>
                    <volume>8</volume>
                    <issue>4</issue>
                    <fpage>e28</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2006/4/e28/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.8.4.e28</pub-id>
                    <pub-id pub-id-type="medline">17213047</pub-id>
                    <pub-id pub-id-type="pii">v8i4e28</pub-id>
                    <pub-id pub-id-type="pmcid">PMC1794009</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref65">
                <label>65</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>El Emam</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Jonker</surname>
                            <given-names>E</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Arbuckle</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Malin</surname>
                            <given-names>B</given-names>
                        </name>
                    </person-group>
                    <article-title>A systematic review of re-identification attacks on health data</article-title>
                    <source>PLoS One</source>
                    <year>2011</year>
                    <volume>6</volume>
                    <issue>12</issue>
                    <fpage>e28071</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://dx.plos.org/10.1371/journal.pone.0028071" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1371/journal.pone.0028071</pub-id>
                    <pub-id pub-id-type="medline">22164229</pub-id>
                    <pub-id pub-id-type="pii">PONE-D-11-14348</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3229505</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref66">
                <label>66</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Sweeney</surname>
                            <given-names>L</given-names>
                        </name>
                    </person-group>
                    <article-title>k-Anonymity: a model for protecting privacy</article-title>
                    <source>Int J Uncertain Fuzziness Knowl Based Syst</source>
                    <year>2002</year>
                    <volume>10</volume>
                    <issue>5</issue>
                    <fpage>557</fpage>
                    <lpage>70</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://dataprivacylab.org/projects/kanonymity/index.html" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1142/S0218488502001648</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref67">
                <label>67</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Carri&#243;n</surname>
                            <given-names>I</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Fern&#225;ndez-Alem&#225;n</surname>
                            <given-names>JL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Toval</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>Usable privacy and security in personal health records</article-title>
                    <source>Lect Notes Comput Sci</source>
                    <year>2011</year>
                    <volume>6949</volume>
                    <fpage>36</fpage>
                    <lpage>43</lpage>
                    <pub-id pub-id-type="doi">10.1007/978-3-642-23768-3_3</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref68">
                <label>68</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Greenhalgh</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Stramer</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bratan</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Byrne</surname>
                            <given-names>E</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Russell</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hinder</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Potts</surname>
                            <given-names>H</given-names>
                        </name>
                    </person-group>
                    <source>The Devil&#039;s in the Detail: Final Report of the Independent Evaluation of the Summary Care Record and HealthSpace programmes</source>
                    <year>2010</year>
                    <access-date>2011-12-12</access-date>
                    <publisher-loc>London</publisher-loc>
                    <publisher-name>University College London</publisher-name>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.ucl.ac.uk/news/scriesummary.pdf">http://www.ucl.ac.uk/news/scriesummary.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">63snHmtym</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref69">
                <label>69</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Huynh</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Miller</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>An empirical investigation into open source web applications' implementation vulnerabilities</article-title>
                    <source>Empir Softw Eng</source>
                    <year>2010</year>
                    <month>10</month>
                    <volume>15</volume>
                    <issue>5</issue>
                    <fpage>556</fpage>
                    <lpage>76</lpage>
                    <pub-id pub-id-type="doi">10.1007/s10664-010-9131-y</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref70">
                <label>70</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <collab>National Vulnerability Database</collab>
                    </person-group>
                    <source>DHS National Cyber Security Division/US-CERT</source>
                    <access-date>2011-08-05</access-date>
                    <comment>CWE: Common Weakness Enumeration<ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://nvd.nist.gov/cwe.cfm">http://nvd.nist.gov/cwe.cfm</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">60iaZ4JzW</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref71">
                <label>71</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Park</surname>
                            <given-names>MA</given-names>
                        </name>
                    </person-group>
                    <article-title>Embedding security into visual programming courses</article-title>
                    <source>Proceedings of the Information Security Curriculum Development Conference</source>
                    <year>2011</year>
                    <conf-name>Information Security Curriculum Development Conference</conf-name>
                    <conf-date>Sep 30-Oct 1, 2011</conf-date>
                    <conf-loc>Kennesaw, GA, USA</conf-loc>
                    <publisher-loc>New York, NY, USA</publisher-loc>
                    <publisher-name>ACM</publisher-name>
                    <fpage>84</fpage>
                    <lpage>93</lpage>
                    <pub-id pub-id-type="doi">10.1145/2047456.2047469</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref72">
                <label>72</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Srinivasan</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>Keeping online personal records private: security and privacy considerations for Web-based PHR systems</article-title>
                    <source>J AHIMA</source>
                    <year>2006</year>
                    <month>01</month>
                    <volume>77</volume>
                    <issue>1</issue>
                    <fpage>62</fpage>
                    <lpage>3, 68</lpage>
                    <pub-id pub-id-type="medline">16475740</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref73">
                <label>73</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Bourgeois</surname>
                            <given-names>FC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Taylor</surname>
                            <given-names>PL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Emans</surname>
                            <given-names>SJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Nigrin</surname>
                            <given-names>DJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Mandl</surname>
                            <given-names>KD</given-names>
                        </name>
                    </person-group>
                    <article-title>Whose personal control? Creating private, personally controlled health records for pediatric and adolescent patients</article-title>
                    <source>J Am Med Inform Assoc</source>
                    <year>2008</year>
                    <month>12</month>
                    <volume>15</volume>
                    <issue>6</issue>
                    <fpage>737</fpage>
                    <lpage>43</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://jamia.bmj.com/cgi/pmidlookup?view=long&#38;pmid=18755989" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1197/jamia.M2865</pub-id>
                    <pub-id pub-id-type="medline">18755989</pub-id>
                    <pub-id pub-id-type="pii">M2865</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2585529</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref74">
                <label>74</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Steinbrook</surname>
                            <given-names>R</given-names>
                        </name>
                    </person-group>
                    <article-title>Personally controlled online health data--the next big thing in medical care?</article-title>
                    <source>N Engl J Med</source>
                    <year>2008</year>
                    <month>04</month>
                    <day>17</day>
                    <volume>358</volume>
                    <issue>16</issue>
                    <fpage>1653</fpage>
                    <lpage>6</lpage>
                    <pub-id pub-id-type="doi">10.1056/NEJMp0801736</pub-id>
                    <pub-id pub-id-type="medline">18420496</pub-id>
                    <pub-id pub-id-type="pii">358/16/1653</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref75">
                <label>75</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Fern&#225;ndez-Medina</surname>
                            <given-names>E</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Piattini</surname>
                            <given-names>M</given-names>
                        </name>
                    </person-group>
                    <article-title>Designing secure databases</article-title>
                    <source>Inf Softw Technol</source>
                    <year>2005</year>
                    <volume>47</volume>
                    <issue>7</issue>
                    <fpage>463</fpage>
                    <lpage>77</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.infsof.2004.09.013</pub-id>
                </nlm-citation>
            </ref>
        </ref-list>
    </back>
</article>