X

 

 

Health eProfile Articles and Education
What are the risks associated with mobile device apps?

What are the risks associated with mobile device apps?

An article from the Cybersecurity and Infrastructure Security Agency (CISA)

Nathan E Botts 0 18792 Article rating: 5.0

This is based on an article from the Cybersecurity and Infrastructure Security Agency (CISA). CISA is the Nation’s risk advisor, working with partners to defend against today’s threats and collaborating to build a more secure and resilient infrastructure for the future. CISA provides extensive cybersecurity and infrastructure security knowledge which can assist people in applying better personal health information risk management. 

In this article, CISA explains risks associated with mobile device apps and some preventive methods that can be used to better secure your personal information.

Assessment of the Data Sharing and Privacy Practices of Smartphone Apps for Depression and Smoking Cessation

Assessment of the Data Sharing and Privacy Practices of Smartphone Apps for Depression and Smoking Cessation

An article from the JAMA Open Network

Nathan E Botts 0 19883 Article rating: 5.0

An article posted in the Journal of the American Medical Association identified that some of the highest-ranking health apps used to assist people with mental health conditions (e.g. depression) and smoking cessation were sharing data with Facebook and Google services and that only a third disclosed such practices.

Have you considered your privacy rights when using birth control apps?

Have you considered your privacy rights when using birth control apps?

Assessment of a Wired.com article by Megan Molteni

Nathan E Botts 0 18069 Article rating: 5.0

Abstract from the article titled, "Before Using Birth Control Apps Consider Your Privacy" posted on Wired.com: "Natural Cycles’ privacy policy states that in using the app each user grants the company and any of its partners broad rights to “use, reproduce, distribute, modify, adapt, prepare derivative works of, publicly display, publicly perform, communicate to the public, and otherwise utilize and exploit a user's anonymized information.”

RSS