You are on page 1of 10

ALCOHOL RESEARCH: Current Reviews

Privacy and Security in Mobile


Health (mHealth) Research
Shifali Arora, M.D.; Jennifer Yttri, Ph.D.; and Wendy Nilsen, Ph.D.

Research on the use of mobile technologies for alcohol use problems is a developing
Shifali Arora, M.D., is an American field. Rapid technological advances in mobile health (or mHealth) research generate
Association for the Advancement both opportunities and challenges, including how to create scalable systems capable
of Science (AAAS) Fellow in the of collecting unprecedented amounts of data and conducting interventions—some
Directorate for Computer & in real time—while at the same time protecting the privacy and safety of research
Information Science & Engineering, participants. Although the research literature in this area is sparse, lessons can be
National Science Foundation, borrowed from other communities, such as cybersecurity or Internet security, which
Washington, DC. offer many techniques to reduce the potential risk of data breaches or tampering in
mHealth. More research into measures to minimize risk to privacy and security
Jennifer Yttri, Ph.D., is an AAAS effectively in mHealth is needed. Even so, progress in mHealth research should not
Science and Technology Policy stop while the field waits for perfect solutions.
Fellow in the Directorate for
Computer & Information Science
& Engineering, National Science
Key words: Alcohol use, abuse, and dependence; problematic alcohol use; alcohol
Foundation, Washington, DC. use disorders; mobile health; mHealth; wireless technology; mobile devices;
sensors; data collection; intervention; privacy; security
Wendy Nilsen, Ph.D., is a Health
Scientist Administrator in the Office
of Behavioral and Social Sciences
Research, National Institutes of
Health, Bethesda, Maryland.

The recent proliferation of wireless and in mHealth can ensure that important are now able to begin thinking about
mobile health (mHealth) technologies social, behavioral, and environmental big data at the level of the individual
presents the opportunity for scientists data are used to understand the deter­ (Estrin 2014). Fusion of streaming
to collect information in the real-world minants of health and to improve biological, physiological, social, behav­
via wearable sensors. When coupled health outcomes and prevent develop­ ioral, environmental, and locational
with fixed sensors embedded in the ment of alcohol use disorders (AUDs). data can now dwarf the traditional
environment, mHealth technologies Despite its promise, research in genetics and electronic health records-
produce continuous streams of data mHealth has progressed much more based datasets of so-called big data.
related to an individual’s biology, psy­ slowly than developments in industry. Further, previously underserved groups
chology (attitudes, cognitions, and One reason is that issues of privacy can now participate in research because
emotions), behavior and daily environ­ and security remain an ongoing con­
of the rapid adoption of mobile
ment. These data have the potential to cern for researchers conducting
yield new insights into the factors that mHealth studies, especially in areas devices. In contrast with the Internet
lead to disease. They also could be ana­ involving sensitive behavior or treat­ digital divide that limited the reach
lyzed and used in real time to prompt ment (e.g., alcohol use). Not only is of computerized health behavior inter­
changes in behaviors or environmental the sensitivity of the data an issue for ventions for lower socioeconomic
exposures that can reduce health risks privacy and security, but also the groups, mobile phone use has been
or optimize health outcomes. This new amount that can be collected using rapidly and widely adopted among
area of research has the potential to be mobile devices. Because most mobile virtually all demographic groups (Pew
a transformative force, because it is devices (including phones and sensors) Research Internet Project 2014). Now,
dynamic, being based on a continuous are carried by the person and collecting 90 percent of American adults and 78
input and assessment process. Research data throughout the day, researchers percent of teenagers have a cell phone,

Privacy and Security in Mobile Health (mHealth) Research 143


and more than half are smartphones Federal Regulations Affecting consideration. Significantly, some
(Pew Research Internet Project 2014). Health Information Privacy components have not been modified:
Many of the strengths of mHealth the rules still require authorization
and Security from the individual to share his or her
research (i.e., its ability to reach large
and broad samples and collect contin­ Any study related to alcohol use gen­ personal health information; and an
erally must abide by several layers of individual has the right to ask for and
uously streaming data on a range of
Federal rules instituted to protect receive his or her own health informa­
potentially sensitive and possibly illegal tion. Other areas have evolved: the
behaviors and events) also drive privacy patients and research subjects.
security regulations now include updated
and security concerns. These topics, as administrative, physical and technical
well as confidentiality, are all separate HIPAA
safeguards for protected health infor­
yet connected issues that researchers Regulations have been in place for mation (U.S. Department of Health
must address in protecting research close to 20 years surrounding the and Human Services 2009a). The latest
participants. The National Committee privacy of personal health information. 2013 update, which expanded HIPAA
for Vital and Health Statistics describes In 1996, the Department of Health through the HITECH Act Subtitle D,
and Human Services—specifically the now allows a patient to receive pro­
the differences between and among Office for Civil Rights—introduced tected health information in any elec­
privacy, confidentiality, and security the Health Insurance Portability and tronic format preferred. The onus of
this way: Accountability Act (HIPAA). Although protection has been extended beyond
“Health information privacy is an research activity is not directly addressed the initial group of “covered entities”
individual’s right to control the acquisi­ in HIPAA, many researchers are (i.e., medical care providers, hospitals
tion, uses, or disclosures of his or her employed by or work within HIPAA- and insurance companies) to include
identifiable health data. Confidentiality, covered entities and work under the those involved with Electronic Health
which is closely related, refers to the obli­ HIPAA guidelines for privacy and Record (EHR) development and
gations of those who receive information security, especially when personal records management (U.S. Department
to respect the privacy interests of those health information is being used. of Health and Human Services 2013).
Title II of HIPAA defined policies and
to whom the data relate. Security is guidelines for maintaining privacy and
altogether different. It refers to physical, security of a patient’s health informa­ The Common Rule
technological, or administrative safe­ tion (U.S. Department of Health and In addition to HIPAA, researchers
guards or tools used to protect identifiable Human Services 1996). Within Title must abide by the Federal Policy for
health data from unwarranted access or II lies the Privacy Rule, the first set of the Protection of Human Subjects,
disclosure (Cohn 2006).” national standards for protecting every also known as the Common Rule.
These issues are further complicated individual’s health information, as The Common Rule was introduced in
by Federal regulations governing per­ well as the Security Rule, which set 1991 to protect individuals participating
sonal health information, as well as a national standard for protecting in research activities (U.S. Department
sensitive information concerning personal health information in an of Health and Human Services 2009b).
electronic format (U.S. Department The Common Rule sets out detailed
alcohol, drug use or mental health. of Health and Human Services 1996). policies and guidelines about informed
There also are many legal and ethical At the time these rules were introduced, consent, adverse events, handling
concerns about mHealth, especially clinical health information existed pri­ of biological data, and vulnerable
when used to study alcohol, drug use marily in the form of handwritten populations, among other issues. An
or mental health. Among these issues patient health records. Information updated version of the Common Rule
is safety of participants and liability of generally was shared between care is undergoing review (U.S. Depart­
researchers if a study participant expe­ providers over the phone, by fax or in ment of Health and Human Services
riences an emergency during the study person. Consequently, initial regulations 2011). One proposed change of signif­
(Kramer et al. 2014). Legal and ethical and guidelines focused on the challenges icance to mobile health researchers is
considerations should be discussed surrounding protecting information in the addition of specific guidance on
these limited-sharing formats. data security and privacy. If enacted
further by the mHealth community
The regulations have evolved over as proposed, data privacy and security
but will not be reviewed here. Instead, the last 15 years as the needs of the protections that would be applied to
this article focuses on privacy, confi­ healthcare system have changed. As research on human subjects would be
dentiality, and security in mHealth, systems have begun to use electronic calibrated to the level of identifiability
areas ripe with research questions and health records, the guidelines have of the information being collected.
opportunities whose times are overdue. been amended to take new factors into Because standards for digital privacy

144 Vol. 36, No.1 Alcohol Research: C u r r e n t R e v i e w s


and security were not delineated in majority of Americans (78 percent) safeguards should balance the type of
earlier versions of the Common Rule, consider information stored on their information being used, the intended
Institutional Review Boards were mobile phones to be as or even more use of the mHealth tool, the method
often asked to make judgments about private than the information stored in of sharing information, and the costs
topics for which they may not have their personal computers (Urban et al. of the protections to develop a feasible
had the proper expertise. Thus, stan­ 2012). Although people believe that system with the minimal amount of
dardizing requirements will allow for information on their phones is under privacy and security risk.
more uniformity in research review their control, this is not always true.
and more clarity for researchers as they The settings on phones may allow
design research protocols to support applications to access and share more Privacy in mHealth
digital privacy and security. information than people realize.
Research participants, by contrast, In the United States, privacy is consid­
are told the truth about phone privacy ered an essential freedom. It is the
42 Code of Federal Regulations right of individuals to determine for
and security issues—primarily that
Part 2 themselves when, how, and to what
there are potential dangers that often
The field of alcohol and substance use center on data breaches. This apparent extent personal information is com­
research is unique in that a set of spe­ disconnect between perception of municated to others. Because privacy
cific Federal regulations guides it above privacy in daily life compared with targets the human side of information
and beyond the requirements of HIPAA research settings is important. It sug­ protection, the solutions to these
and the Common Rule. Under 42 gests that broad efforts at enhancing issues target the humans using the
Code of Federal Regulations Part 2 technological literacy are needed, or technology. At the highest level, patients
(42 CFR), the confidentiality of the researchers risk making mHealth currently regulate who can access their
records of patients with alcohol and applications seem less safe than other personal health information through
substance abuse/dependence is man­ protected mobile activities, such as consent. The consent gives partici­
dated (http://www.ecfr.gov/cgi-bin/ banking. Instead of voicing concerns pants appropriate knowledge of what
text-idx?c=ecfr;sid=af45a7480ecfb95b about highlighting the risks in health data are being collected, how they are
c813ab4bbd37fb5b;rgn=div5;view= research and care, the scientific com­ stored and used, what rights they have
text;node=42%3A1.0.1.1.2;idno= munity should support overall efforts to the data, and what the potential
42;cc=ecfr). Alcohol and drug abuse to increase the public’s knowledge of risks of disclosure could be. Unfortu­
records can only be shared after written privacy and security risks regarding nately, as noted earlier, technological
consent is obtained from patients, even technology, thus allowing a rising tide literacy in the United States limits
if the use of such records by healthcare of literacy to float all mobile device– people’s understanding of the true risks
professionals occurs in a medical using boats. and benefits of mobile technology.
emergency. CFR42 also prohibits the As is the case in all research, privacy, Because changes in technological
disclosure of a research participant’s confidentiality, and security policies literacy take time to implement,
identity in any report or publication, should be created in advance of a project researchers in mHealth will need to
even with consent. Because of the sen­ by developing written standard oper­ develop systems that enhance partici­
sitive nature of the personal health ating procedures. Developing a priori pant privacy. More specifically, this
information involved, protection of practices and principles of conduct for means building mHealth systems that
privacy, security and confidentiality mHealth research projects is a crucial allow research participants some con­
warrants extra thought by alcohol step in enhancing data and participant trol over the data, whether this be
researchers. safety. Since the majority of security control over which data are collected
breaches in healthcare (not just mHealth) or over which data are released to the
are due to unauthorized access to a research team. Researchers will need
Responsibility to Protect Privacy device or from mishandling or misusing to be explicit about the data they are
and Security data (Bennett et al. 2010), mHealth collecting and what control the partic­
researchers need to conduct a risk ipants will have over it. This also means
Regulations governing privacy and assessment to identify potential vul­ that mHealth researchers should be
security—while layered and complex— nerabilities as they develop and imple­ thoughtful about what research data
tend to hold few surprises for experienced ment their systems. When designing they will collect.
research teams. Patient expectations and implementing a security plan to An example of offering such patient
related to privacy on mobile devices, protect participant information, control comes from the field of com­
however, offer a new challenge that researchers should tailor the plan to puter science. Although not a standard
study protocols must address. For fit the risks associated with their pro­ for other scientific areas in health, in
example, research has shown that a tocol. A plan for privacy and security a participatory model of research

Privacy and Security in Mobile Health (mHealth) Research 145


proposed in computer science (Shilton abstract such information, thereby rules, because they underestimate or
2012), participants pick and choose protecting privacy. fail to understand the costs of their
which data to share, whether before Confidentiality in mHealth research actions (Besnard and Arief 2004).
data collection or after data have been shares many of the same factors as Thus, when it comes to securing data,
sampled. A simple electronic or paper conventional research. A research team researchers should try to prevent the
checklist of possible data points should be aware of the need to keep most likely breaches, such as leaving
administered before data collection personal information private and to mobile devices unsecured, sharing
and/or a patient-facing data dashboard release information only in aggregate. passwords or leaving them written on
will allow participants to exercise their Researchers should also collect only notes, accessing sensitive information
rights to control and access their data. in public areas using open-WiFi net­
Thus, which data are shared and which works, or even losing a mobile device.
The overall goal of effective
While outsiders may intentionally
are held becomes a personal decision.
This does create potential havoc for security protocols is to
attempt to access information or try to
the design of data collection and ana­ protect participant
figure out someone’s identity or location
lytic plans, but it has the advantage of identity and secure data
from intercepting communications,
ensuring that participants are thought­ such efforts will account for a minority
in such a way that if
of security threats. Many breaches are
ful about the specifics of their privacy.
It has the added benefit of helping unauthorized individuals
preventable through having a high-
participants learn about the privacy were to gain access,
quality security plan that pays special
options available in their non-research they would be unable
attention to the most common and
mobile world, which, again, should simplest reasons for data losses.
to link the data with a
The overall goal of effective security
enhance technological literacy.
Another option is to create a context- particular person or with
protocols is to protect participant
aware system that the participant con­ other data being sent.
identity and secure data in such a way
trols. In such a system used for eHealth that if unauthorized individuals were
research, the privacy options change to gain access, they would be unable
the minimum amount and detail of to link the data with a particular person
based on factors such as location and
data needed for their research to reduce or with other data being sent. This is
who is accessing the data to match
the risk of reidentification. For especially true because while no single
the participant’s level of trust (e.g.,
mHealth, an additional concern arises source of data may be identifiable, the
Ruotsalainen et al. 2014). Although through the frequent use of third- combination of multiple sources of
limited, the work in patient-controlled party developers to build systems, data may make identifiable linkages
data access has shown that most peo­ including the databases for the project. possible. In mHealth, information is
ple who participate will not cull their These developers may continue in a often transmitted at a high frequency
data once they have committed to a project to ensure the system is updated and transferred over wireless networks,
study. The best practice may therefore and performing appropriately. As which can be more susceptible to
yield greater satisfaction with the with all research team members, the monitoring and interception than
research process, because privacy is developers—who may have little or broadband (Internet) networks, mak­
seen as protected in accordance with no experience with human subjects— ing security protocols the only barriers
patient preference but results in mini­ will need a carefully considered educa­ protecting data against a breach
mal impact on data collection or the tional plan to understand the privacy (Luxton and Kayl 2012).
analytic plan. and confidentiality of health informa­
mHealth also poses privacy chal­ tion, especially when the data target
lenges from people not enrolled in the Simple Protections and Encryption
the sensitive subject of alcohol use.
research. Examples of this issue include As noted earlier, when creating a secu­
the use of mobile cameras or micro­ rity protocol, simple ways to increase
phones to collect data, but which also Security in mHealth data security should be considered
pick up sounds and images from first. For example, enabling WPA2
non-participants. As with the issues Security refers to the safeguards, tech­ encryption on a wireless device enhances
raised at the participant level, ways niques, and tools used to protect the security of information transmit­
to address these problems are needed. against the inappropriate access or ted over wireless networks, but it must
Solutions can be found not only at the disclosure of information. Research be enabled on the mobile device. In all
level of study design but also through suggests that legitimate users of a system cases in which consumer devices are
the use of techniques that can extract often may be the likely cause of used (e.g., a mobile phone or tablet),
information from raw data and impaired security when they overlook the use of a password (e.g., S0briety!),

146 Vol. 36, No.1 Alcohol Research: C u r r e n t R e v i e w s


numerical pin (e.g., 16479), or pass- Simple precautions are an effective streaming data or because the system
phrase (e.g., G0 2 the moon with me!) part of a security protocol, but secur­ slows data transmission and may
is highly encouraged. Support for ing data also has technical aspects, reduce the speed of user-supplied
these techniques should be offered to which for many studies are essential to devices, both of which may add to
participants at the start of a study, protecting and maintaining integrity participant burden.
because they often either do not know and security. Many of the more com­ In addition to VPNs, various mech­
the techniques for developing an effec­ plex technical challenges surrounding anisms can be applied to protect data
tive password (e.g., not using the word securing data have been addressed by in transit. For example, data can be
“password”) or their lack of techno­ the cybersecurity community, which transferred in different orientations for
logical literacy may make them think can offer guidance and potential solu­ further protection. Because this is an
that risks are low and cause them to tions (Bennett et al. 2010; Sorber area of interest in the cybersecurity
discard safety features once they con­ et al. 2012). Some of these security research community, multiple mecha­
trol the devices. Finally, researchers models are discussed below. nisms to accomplish it have been cre­
can enable remote data wiping or Encryption of data is a key compo­ ated. The goal during transfer is to
locking protocols on phones or tablets nent of security that allows for the send the messages efficiently so they
used for mHealth. These systems, protection and preservation of ano­ do not overwhelm the system, tag
which come standard on many operat­ nymity, but it must be done before messages so they can be recognized
ing systems or can be added to devices, the transfer of data. This process hides only by the receiver, and make sure
allow data to be wiped remotely and the content of a message while it is in that no data tampering occurs (Mare
the device locked if it is thought to transit, and the original message can et al. 2011a,b).
have been lost or stolen. only be seen through a process called One important aspect to remember
Researchers also should consider decryption. A shared “key” is needed during security protocol development
carefully which data need to be trans­ in the process of encrypting and is that the higher the level of security,
mitted and where they will be stored. decrypting and in healthcare settings. the greater the cost of the transmission
For instance, medication adherence According to Federal HIPAA and in terms of time and encryption,
reminders can be developed without HITECH Act regulations, this key as well as burden of use. Another
reference to specific drug categories or must contain 128-bits (i.e., the length method of securing the data during
of the key) to offer sufficient security transfer is to change the strength of
even a mention of disease. The WelTel
(Department of Health and Human security depending both on the safety
Kenya study by Lester and colleagues
Services 2013). National and interna­ of the environment in which the data
(2010) ingeniously used the phrase
tional encryption standards have been are being collected (i.e., a home versus
“Mambo?” in an SMS message to generated for mobile technology, and
HIV-infected individuals, which is a public area) and on the device the
researchers should use these when data are being sent from (trusted or
Kiswahili for “How are you?” These developing encryption and decryption not trusted) (Prasad and Alam 2006).
messages did not mention disease or algorithms. NIST (the National Thus, a study might use a multiple-
anti-retroviral drugs, which would Institute of Standards and Technology) level strategy for EHR data being
have identified people as HIV infected. recommends using Suite-B (https:// viewed on a mobile device, but not
Instead, the messages, even if received www.nsa.gov/ia/programs/suiteb_ on single transmissions coming from
by someone else, could convey the cryptography/), a set of algorithms devices using a secure network in
study team’s question without poten­ that employs the cutting edge for the home. Location of data transfer
tially jeopardizing any participant’s exchanging decryption keys and digital and level of device trust would form
privacy and security. signatures to authenticate data (Adibi part of a plan to help determine
Minimizing the potential impact of et al. 2013). which level of security should be
data breaches can also be achieved by Once data are encrypted and the used and when.
not storing data on a mobile device. challenge of anonymity has been
For example, if a protocol includes addressed, the data collected can be
the development of a personal health transferred. For some mHealth, using Authentication
record with detailed health data, the a VPN (Virtual Provider Network) Authentication ensures that the data
research team might consider encrypt­ is a highly secure way for the appro­ collected are associated with the cor­
ing data (see below) and storing it priate people to connect to data to rect participant; that only authorized
in a secure server for aggregation. be transferred. VPNs have been used individuals have access to data and
Participants could access the data frequently by Internet and eHealth tools; that only valid and protected
through a wireless network, but data communities (Adibi et al. 2013). devices are used; and that data are
would not be left in the device after However, for mobile devices, using a sent through authorized channels.
the application closed. VPN may be challenging because of The cybersecurity community uses

Privacy and Security in Mobile Health (mHealth) Research 147


two-factor authentication as its current and usually consists of a PIN number, The last category, which only appears
highest standard. In cybersecurity, password or passphrase. This is cur- in rare circumstances, is unique to
there are three different categories for rently the most common mode of each user and includes fingerprints,
authentication: “something known,” authentication. The second category eye scans or voice recognition. For
“something possessed,” and “some- for authentication includes a tangible two-factor authentication to take
thing unique to the person” (Varchol item that users can carry with them place, correct responses are required
et al. 2008). The first is set by the user such as a token, smart card, or dongle. in two out of the three categories

Table Addressing confidentiality, privacy, and security challenges in mHealth. Many risks may occur in design and use of mHealth. Solutions that are
cost-effective and can be implemented without interfering with research are recommended to mitigate these risks. These solutions are commonly
used in Internet/eHealth, telemedicine, and cybersecurity research.

Risk Solution

De-identification Share data in aggregate

Separate transmission of identifying information (name, location) from other data

Consent Use consent to educate participants about what data are being collected and what can
be inferred from such data
Include privacy and safety training for participants

Consider allowing patients to choose which data to share and with whom

Breaches from intended user Enable password, pin, or passphrase on phones before distribution

Enable remote wiping

Encryption Use WPA2 and 128-bit key encryption

Add a tag or header to the encrypted message

Data transmission Use non-sensitive messages to contact participants

Store data remotely, such as on a secure server or in a cloud

Data accessibility Store critical data in two locations to ensure availability

Data integrity and quality Have a second system to collect the same data, such as in-person visits or surveys,
to verify mobile data integrity and quality

Location Have adjustable security settings for trusted and untrusted locations

Authentication Use two-factor authentication, such as with a pin/password and a token/smart


card/dongle

Audits and risk assessment Include audits in security protocols, potentially with the help of a “red team”;
risk assessment should be done at each stage of implementation

148 Vol. 36, No.1 Alcohol Research: C u r r e n t R e v i e w s


(Varchol et al. 2008). Two-factor lapses. Although setting up official designed to help developers generate
authorization may not be needed teams would add expense and burden safe and effective mHealth technology
in most research, but it should be con­ to projects, researchers might be able (FDA 2013). In practice, no common
sidered when sensitive data with high to mimic this methodology by having database of breaches of security for
potential negative impact are being non-involved research team members mHealth research exists, so actual pat­
transmitted. Many available authenti­ or graduate students in related pro­ terns or typologies of these lapses, if
cation systems can be added to new grams (e.g., computer engineering and they have occurred, have not emerged.
mHealth tools (Adibi et al. 2013). sciences) field test the technology or If researchers experience a security
Again, the first approach is to avoid or application before it is deployed to lapse, there is no mechanism to report
minimize the amount of high-impact determine how easily the program can this beyond the university or even
data being transmitted. be disrupted or hacked. These efforts the research team. Thus, while secure
should be documented and communi­ systems are built to collect and manage
cated to the team and Institutional mHealth data, what contributes to
Risk Assessments and Audits
Review Board (IRB), as well as in their success or failure remains unknown.
of the Security System
grant applications and publications Further, because mHealth may have
Security breaches can occur at any (as applicable). An example of success­ both novel risks and novel benefits,
stage of implementation of mHealth ful risk assessment without the use of there is value to including community
technology. As part of a research “red teams” comes from Henriksen members—the people who will be
protocol, risk assessments should be and colleagues (2013). In designing
included to ensure that the lowest most affected by mHealth technology—
their home-based eHealth platform, in discussions of privacy, safety, and
possible risk to security is maintained. the project team used a brainstorming
Audits of a security system are required security. Improving awareness and
process to identify potential risks
as part of HIPAA, HITECH, and offering training in technological liter­
throughout the design and implemen­
international security standards and tation process. They then applied acy, as noted earlier, are ways to reduce
should be performed throughout test­ simple measures to reduce those risks privacy and security risks caused by
ing and use to ensure security measures when deemed unacceptable at given participants and increase involvement
are working. Audits can be a natural stages in development. in mHealth. Many security features
byproduct of security measures and require input from the end user, and
help to identify potential risks in a therefore education can help ensure
system. For instance, authentication Moving Privacy, Safety and the security of mHealth. Security
protocols for individuals and devices training can be included with training
Security Forward in mHealth for using mHealth tools and with
connecting to a system and accessing
information leave an audit trail that Although security and privacy are crit­ education on the benefits of mHealth.
automatically notes which participant’s ical, no system involving humans will More research into measures to
personal health information was han­ be completely secure. Breaches will effectively minimize risk to privacy
dled and by whom. This ensures that happen. Thus, a balance must be struck and security in mHealth is needed.
any failures in the system are detected between security, subject usability and While lessons can be borrowed from
and holds each insider accountable research cost based on the requirements other communities, such as cybersecu­
for following proper protocols to of the mHealth research. The goal rity or eHealth, the unique challenges
maintain privacy and security. should be to mitigate security risks associated with mobile technology
It is clear that when researchers without impeding use and to set up a warrant development of novel security
combine multiple layers of safeguards system that recovers from potential approaches. In the meantime, we have
to ensure privacy and security, they breaches. Safety protocols are available the knowledge to prevent privacy and
are better placed to protect personal from other related fields that could be security breaches while maintaining
health information. To determine applied to mHealth. Protocols devel­ the benefits of using mHealth (see
whether such a layered system still oped as standards for medical devices table). Progress in mHealth research
contains security gaps, the best approach (Underwriters Laboratory ISO 14971; should not stop while waiting for
is to test it. A potential method for Underwriters Laboratory 2011) and perfect solutions.
testing security that is used successfully ideas from the fields of telehealth,
in the cybersecurity world involves eHealth, and cybersecurity can be
employing “red teams”, experts charged co-opted for use with mHealth prod­ Acknowledgments
with hacking into cyber systems to ucts. For example, the Food and Drug
assess weaknesses. Red teams can iden­ Administration (FDA) has developed The views expressed in this article are
tify safety flaws before a technology is guidance for device safety and stan­ those of the authors and do not neces­
deployed, thereby preventing safety dards, publishing guidance documents sarily reflect the position or policy of

Privacy and Security in Mobile Health (mHealth) Research 149


the National Science Foundation and technology to deliver mental health care. Cognitive and Applications (HotMobile ’12). San Diego, CA, February
Behavioral Practice, June 2, 2014. DOI: 10.1016/j. 2012. DOI: 10.1145/2162081.2162092. Available at
the National Institutes of Health. cbpra.2014.04.008. Available at http://www.sciencedi­ http://www.cs.dartmouth.edu/~dfk/papers/sorber­
rect.com/science/article/pii/S1077722914000807. amulet.pdf.

Lester, R.T.; Ritvo, P.; Mills, E.J.; et al. Effects of a Underwriters Laboratory. ISO 14971 Gap Analysis
Financial Disclosure mobile phone short message service on antiretroviral Checklist, 2011. Available at http://industries.ul.com/
treatment adherence in Kenya (WelTel Kenya1): A ran­ wp-content/uploads/sites/2/2014/08/ISO-14971-Gap­
The authors declare that they have no domised trial. Lancet 376(9755):1838–1845, 2010. Analysis-Checklist-New-Brand.pdf.
competing financial interests. PMID: 21071074
U.S. Department of Health and Human Services. Health
Luxton, D.; Kayl, R; and Mishkind, M.C. mHealth data Insurance and Portability Act of 1996 (HIPAA);  Pub.L.
security: The need for HIPAA-compliant standardization. 104–191, 110 Stat. 1936, 1996. Available at http://
References Telemedicine Journal and e-Health 18(4):284–288, www.hhs.gov/ocr/privacy/hipaa/administrative/statute/
2012. PMID: 22400974 index.html.
Adibi, S.; Wickramasinghe, N.; and Chan, C. CCmH: The
Mare, S.; Sorber, J.; Shin, M.; Cornelius, C.; and Kotz, S. U.S. Department of Health and Human Services. Health
cloud computing paradigm for mobile health. Interna­
Adaptive security and privacy for mHealth sensing. In Information Technology for Economic and Clinical
tional Journal of Soft Computing and Software Engineer­
Proceedings of the U.S.ENIX Workshop on Health Security Health Act of 2009, Pub. L. No. 111-5, 123 STAT. 227,
ing 3(3):403–410, 2013.
and Privacy (HealthSec’11), 12, August 2011a. Available 2009a. Available at http://www.hhs.gov/ocr/privacy/
Bennett, K.; Bennett, A.J.; and Griffiths, K.M. Security at http://sharps.org/wp-content/uploads/MARE- hipaa/administrative/enforcementrule/enfifr.pdf.
considerations for e-mental health interventions. Journal HEALTHSEC.pdf. U.S. Department of Health and Human Services. Federal
of Medical Internet Research 12(5):e61, 2010. PMID:
Mare, S.; Sorber, J.; Shin, M.; Cornelius, C.; and Kotz, D. Policy for the Protection of Human Subjects (‘Common
21169173
Adapt-lite: Privacy-aware, secure, and efficient mHealth Rule’). Washington, DC: U.S. DHHS, 2009b. Available at
Besnard, D., and Arief, B. Computer security impaired sensing. In Proceedings for Workshop on Privacy in the http://www.hhs.gov/ohrp/humansubjects/commonrule/.
by legitimate users. Computers and Security 23(2):25– Electronic Society (WPES’11), 137–142, October 2011b. U.S. Department of Health and Human Services.
264, 2004. Available at http://sharps.org/wp-content/uploads/MARE­ Advance Notice of Proposed Rulemaking for Revision to
WPES.pdf. the Common Rule, 2011. Available at http://www.hhs.
Cohn, S.P. Privacy and Confidentiality in the Nationwide
Health Information Network. Washington, DC: National Pew Research Internet Project. Mobile Technology Fact gov/ohrp/humansubjects/anprm2011page.html.
Committee on Vital and Health Statistics, June 22, 2006. Sheet: Pew Research Center’s Internet & American Life U.S. Department of Health and Human Services. Modifi­
Available at http://www.ncvhs.hhs.gov/060622lt.htm. Project. Washington, DC: Pew Research Center, 2014. cations to the HIPAA Privacy, Security, Enforcement, and
Available at http://www.pewinternet.org/fact-sheets/ Breach Notification Rules Under the Health Information
Estrin, D. Small data, where n = me. Communications of
mobile-technology-fact-sheet/. Technology for Economic and Clinical Health Act and
the ACM 57(4):32–34, 2014.
Prasad, N., and Alam, M. Security framework for wireless the Genetic Information Nondiscrimination Act, 2013.
Food and Drug Administration. Mobile Medical Applica­ Available at http://www.gpo.gov/fdsys/pkg/FR-2013-01­
sensor networks. Wireless Personal Communications
tions: Guidance for Industry and Food and Drug Admin­ 25/pdf/2013-01073.pdf.
37:455–469, 2006.
istration staff. September 25, 2013. Washington DC:
U.S. Department of Health and Human Services, Food Ruotsalainen, P.; Nykanen, P.; Seppala, A.; and Blobel, Urban, J.M.; Hoofnagle, C.J.; and Li, S. Mobile Phones
and Drug Administration. Available at http://www.fda. B. Trust-based information system architecture for per­ and Privacy (BCLT Research Paper Series, UC Berkeley
gov/downloads/medicaldevices/deviceregulationand­ sonal wellness. Studies in Health Technology and Infor­ Public Law Research Paper No. 2103405). Berkeley, CA:
guidance/guidancedocuments/ucm263366.pdf. University of California at Berkeley, 2012. Available at
matics 205:136–140, 2014. PMID: 25160161
http://ssrn.com/abstract=2103405.
Henriksen, E.; Burkow, T.M.; Johnsen, E.; and Vognild, Shilton, K. Participatory personal data: An emerging
L.K. Privacy and information security risks in a technol­ Varchol, P.; Levicky, D.; and Juhar, J. Multimodal bio­
research challenge for the information sciences. Journal
metric authentication using speech and hand geometry
ogy platform for home-based chronic disease rehabilita­ of the American Society for Information Science and
fusion. In Proceedings of IEEE: 15th International
tion and education. BMC Medical Informatics and Technology, 63(10):1905–1915, 2012.
Conference on Systems, Signals and Image Processing
Decision Making 13:85, 2013. PMID: 23927965
Sorber, J.; Shin, M.; Peterson, R.; et al. An amulet for (IWSSIP 2008), 57–60, 2008. Available at http://ieeex­
Kramer, G.M., Kinn, J.T., and Mishkind, M.C. Legal, trustworthy wearable mHealth. Proceedings of the plore.ieee.org/xpl/abstractKeywords.jsp?arnumber=
regulatory, and risk management issues in the use of Twelfth Workshop on Mobile Computing Systems and 4604366.

150 Vol. 36, No.1 Alcohol Research: C u r r e n t R e v i e w s


Now Available

NIAAA Spectrum
Volume 7, Issue 1
The latest issue of the NIAAA Spectrum, an online magazine featuring information
from NIAAA and the alcohol research field, is now available. Each issue includes
feature-length stories, news updates, engaging graphics, and an interview with
an NIAAA staff member or prominent researcher in the field.

For more information and to subscribe, go to

http://www.spectrum.niaaa.nih.gov/

151
Alcohol Research: Current Review

and another 3.3 million articles are in


PubMed Central!
Since its creation in 2000, PMC has served as a free digital archive, offering full-text
content for a variety of biomedical and life sciences journals. In 2005, PMC became
the main repository for papers submitted in accordance with the NIH Public Access
Policy and similar funding agency policies.

See the link:

http://www.ncbi.nlm.nih.gov/pmc/journals/2195/ to view

past issues of ARCR from 2007 to present.

152 Vol. 36, No.1 Alcohol Research: C u r r e n t R e v i e w s

You might also like