2019
DOI: 10.1016/j.invent.2018.12.001
|View full text |Cite
|
Sign up to set email alerts
|

Reviewing the data security and privacy policies of mobile apps for depression

Abstract: BackgroundMobile apps have become popular resources for mental health support. Availability of information about developers' data security procedures for health apps, specifically those targeting mental health, has not been thoroughly investigated. If people are to use and trust these tools for their mental health, it is crucial we evaluate the transparency and quality around the data practices of these apps. The present study reviewed data security and privacy policies of mobile apps for depression.MethodsWe … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

5
95
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 137 publications
(101 citation statements)
references
References 19 publications
5
95
1
Order By: Relevance
“…A further concern relates to the inadequate data protection and privacy declarations revealed in many apps in this study. This finding is consistent with the results of prior investigations (O'Loughlin, Neary, Adkins, & Schueller, 2019;Sucala et al, 2017;Terhorst et al, 2018). Even more concerning is the fact that many apps transmit data to commercial entities without disclosing this (Huckvale, Torous, & Larsen, 2019).…”
Section: Discussionsupporting
confidence: 94%
“…A further concern relates to the inadequate data protection and privacy declarations revealed in many apps in this study. This finding is consistent with the results of prior investigations (O'Loughlin, Neary, Adkins, & Schueller, 2019;Sucala et al, 2017;Terhorst et al, 2018). Even more concerning is the fact that many apps transmit data to commercial entities without disclosing this (Huckvale, Torous, & Larsen, 2019).…”
Section: Discussionsupporting
confidence: 94%
“…Transparency, therefore, is of the utmost importance. However, the literature is consistent in its illustration of the mHealth industry as being poorly compliant with the provision of appropriate privacy policies or Terms of Service agreements to users [84,89,90,[105][106][107][108][109][110][111][112][113]. Where privacy policies do exist, they are often non-specific to the app in question, may not inform users if the policy is being updated or if their data is to be shared, and may not provide users the right to access their personal data or be otherwise HIPAA-noncompliant [107,108,110,[114][115][116].…”
Section: Informed Consent Privacy Policies and Access Controlmentioning
confidence: 96%
“…These are considered separately due to the growing importance of compliance in the mHealth industry [65]. [24], [41], [69], [73], [75], [76], [80], [82], [83] General security and privacy evaluation focus 6 studies [6], [8], [54], [60], [62], [68] Compliance…”
Section: Iv3 Security And/or Privacy Evaluation Techniquesmentioning
confidence: 99%
“…On a more detailed level, Table 6 includes the categories and subcategories of evaluation artefacts and the numbers of papers that covered them. Healthcare expert evaluation [69], user evaluation [21], [72] [2], [6], [8], [17], [21], [22], [24], [27], [41], [68]- [70], [72], [75], [77]- [79], [81]- [83] Privacy policy (PP) and Terms of Agreement (ToA) content evaluation Readability assessment [17], [23], [56], [116] [1], [6], [17], [22]- [24], [41], [55], [56], [58], [60], [68], [71], [74], [75], [77], [78], [83], [116] Technical security mechanisms evaluation…”
Section: ) Evaluation Objectives and Artefactsmentioning
confidence: 99%