10 Requirements for Personal Information in Health and Fitness Apps and Patient Portals

2014 ◽  
Author(s):  
Patricia Seybold
2018 ◽  
Vol 4 ◽  
pp. 205520761878815 ◽  
Author(s):  
Aasha E Cowey ◽  
Henry W W Potts

Objectives We live in a digital age and opportunities within healthcare are increasing, ranging from patient portals to wearable devices. Today’s undergraduates are second generation digital natives and are at a critical point of becoming more autonomous in their healthcare interactions. This study aims to understand their experiences of both digital and broader healthcare. This will enable a better understanding of implications for national policy, individual healthcare organisations and further research. Methods Undergraduates aged 18–21 participated in individual interviews or focus groups. Inductive thematic analysis was undertaken. Negative member checking and feedback on emerging themes from both participants and experts were used to increase the validity of the study. Results Twenty-four undergraduates participated in the study, including a high proportion of international students. Thematic analysis revealed 16 themes. Six key themes explored in this paper are: generation gap; impact on healthcare professionals (HCPs); use of technology to replace or enhance HCP interactions; use of technology to support administration/transactional activities; paper vs electronic; and personally held health and fitness data. Conclusion This paper highlights recommendations for the undergraduate cohort and wider populations including better articulation of benefits, making digital options more personalised and interactive, and raising awareness of dangerous ‘obsessive’ behaviour around health and fitness apps. Some of our findings challenge the assumption that this generation will automatically accept digital initiatives, including the importance this cohort continues to place on face-to-face interactions. In response, we offer some suggestions to improve awareness, utilisation and acceptance of digital health.


Author(s):  
Devjani Sen ◽  
Rukhsana Ahmed

With a growing number of health and wellness applications (apps), there is a need to explore exactly what third parties can legally do with personal data. Following a review of the online privacy policies of a select set of mobile health and fitness apps, this chapter assessed the privacy policies of four popular health and fitness apps, using a checklist that comprised five privacy risk categories. Privacy risks, were based on two questions: a) is important information missing to make informed decisions about the use of personal data? and b) is information being shared that might compromise the end-user's right to privacy of that information? The online privacy policies of each selected app was further examined to identify important privacy risks. From this, a separate checklist was completed and compared to reach an agreement of the presence or absence of each privacy risk category. This chapter concludes with a set of recommendations when designing privacy policies for the sharing of personal information collected from health and fitness apps.


Author(s):  
Devjani Sen ◽  
Rukhsana Ahmed

With a growing number of health and wellness applications (apps), there is a need to explore exactly what third parties can legally do with personal data. Following a review of the online privacy policies of a select set of mobile health and fitness apps, this chapter assessed the privacy policies of four popular health and fitness apps, using a checklist that comprised five privacy risk categories. Privacy risks, were based on two questions: a) is important information missing to make informed decisions about the use of personal data? and b) is information being shared that might compromise the end-user's right to privacy of that information? The online privacy policies of each selected app was further examined to identify important privacy risks. From this, a separate checklist was completed and compared to reach an agreement of the presence or absence of each privacy risk category. This chapter concludes with a set of recommendations when designing privacy policies for the sharing of personal information collected from health and fitness apps.


Author(s):  
Devjani Sen ◽  
Rukhsana Ahmed

Personal applications (apps) collect all sorts of personal information like name, email address, age, height, weight, and in some cases, detailed health information. When using such apps, many users trustfully log everything from diet to sleep patterns. Studies suggest that many applications do not have a privacy policy, or users do not have access to an app's permissions before s/he downloads it to the mobile device. This raises questions regarding the ethics around sharing personal data gathered from health and fitness apps to third parties. Despite the important role of informed consent in the creation of health and fitness mobile applications, the intersection of ethics and sharing of personal information is understudied and is an often-ignored topic during the creation of mobile applications. After reviewing the online privacy policies of four mobile health and fitness apps, this chapter concludes with a set of recommendations when designing privacy policies to share personal information collected from health and fitness apps.


Author(s):  
Devjani Sen ◽  
Rukhsana Ahmed

Personal Applications (apps) collect all sorts of personal information like name, email address, age, height, weight and in some cases detailed health information. When using such apps, many users trustfully log everything from diet to sleep patterns. Studies suggest that many applications do not have a privacy policy, or users do not have access to an app's permissions before s/he downloads it to the mobile device. This raises questions regarding the ethics around sharing personal data gathered from health and fitness apps to third parties. Despite the important role of informed consent in the creation of health and fitness mobile applications, the intersection of ethics and sharing of personal information is understudied and is an often-ignored topic during the creation of mobile applications. After reviewing the online privacy policies of four mobile health and fitness apps, this chapter concludes with a set of recommendations when designing privacy policies to share personal information collected from health and fitness apps.


2018 ◽  
Author(s):  
Celine Latulipe ◽  
Sara A. Quandt ◽  
Kathryn Altizer Melius ◽  
Alain Bertoni ◽  
David P. Miller Jr ◽  
...  

BACKGROUND Electronic patient portals have become common and offer many potential benefits for patients’ self-management of health care. These benefits could be especially important for older adult patients dealing with significant chronic illness, many of whom have caregivers, such as a spouse, adult child, or other family member or friend, who help with health care management. Patient portals commonly contain large amounts of personal information, including diagnoses, health histories, medications, specialist appointments, lab results, and billing and insurance information. Some health care systems provide proxy accounts for caregivers to access a portal on behalf of a patient. It is not well known how much and in what way caregivers are using patient portals on behalf of patients and whether patients see any information disclosure risks associated with such access. OBJECTIVE The objective of this study was to examine how older adult patients perceive the benefits and risks of proxy patient portal access by their caregivers. METHODS We conducted semistructured interviews with 10 older adult patients with chronic illness. We asked them about their relationship with their caregivers, their use of their patient portal, their caregiver’s use of the portal, and their perceptions about the benefits and risks of their caregiver’s use of the portals. We also asked them about their comfort level with caregivers having access to information about a hypothetical diagnosis of a stigmatized condition. Two investigators conducted a thematic analysis of the qualitative data. RESULTS All patients identified caregivers. Some had given caregivers access to their portals, in all cases by sharing log-in credentials, rather than by setting up an official proxy account. Patients generally saw benefits in their caregivers having access to the information and functions provided by the portal. Patients generally reported that they would be uncomfortable with caregivers learning of stigmatized conditions and also with caregivers (except spouses) accessing financial billing information. CONCLUSIONS Patients share their electronic patient portal credentials with caregivers to receive the benefits of those caregivers having access to important medical information but are unaware of all the information those caregivers can access. Better portal design could alleviate these unwanted information disclosures.


2020 ◽  
Vol 43 ◽  
Author(s):  
John Corbit ◽  
Chris Moore

Abstract The integration of first-, second-, and third-personal information within joint intentional collaboration provides the foundation for broad-based second-personal morality. We offer two additions to this framework: a description of the developmental process through which second-personal competence emerges from early triadic interactions, and empirical evidence that collaboration with a concrete goal may provide an essential focal point for this integrative process.


2002 ◽  
Vol 30 (3) ◽  
pp. 466-474

In In re Pharmatrak, Inc. Privacy Litigation, website users brought suit claiming that major pharmaceutical corporations and a web monitoring company violated three federal statutes protecting electronic communications and data by collecting web traffic data and personal information about website users. On August 13,2002, the District Court of Massachusetts dismissed these allegations, holding that the defendants were parties to the communications and thus exempted under the statutory language.The court also found that plaintiffs had not suffered an amount of damages required to sustain private action.


Sign in / Sign up

Export Citation Format

Share Document