<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMU</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Mhealth Uhealth</journal-id>
      <journal-title>JMIR mHealth and uHealth</journal-title>
      <issn pub-type="epub">2291-5222</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
    <article-id pub-id-type="publisher-id">v6i1e3</article-id>
    <article-id pub-id-type="pmid">29301737</article-id>
    <article-id pub-id-type="doi">10.2196/mhealth.7626</article-id>
    <article-categories>
      <subj-group subj-group-type="heading">
        <subject>Original Paper</subject>
      </subj-group>
      <subj-group subj-group-type="article-type">
        <subject>Original Paper</subject>
      </subj-group>
    </article-categories>
    <title-group>
      <article-title>Privacy Policies for Apps Targeted Toward Youth: Descriptive Analysis of Readability</article-title>
    </title-group>
    <contrib-group>
      <contrib contrib-type="editor">
        <name>
          <surname>Eysenbach</surname>
          <given-names>Gunther</given-names>
        </name>
      </contrib>
    </contrib-group>
    <contrib-group>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Bender</surname>
          <given-names>Jackie</given-names>
        </name>
      </contrib>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Li</surname>
          <given-names>Jingquan</given-names>
        </name>
      </contrib>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Boisrond</surname>
          <given-names>Pierre</given-names>
        </name>
      </contrib>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Cyr</surname>
          <given-names>Alaina</given-names>
        </name>
      </contrib>
    </contrib-group>
    <contrib-group>
      <contrib contrib-type="author" id="contrib1">
        <name name-style="western">
          <surname>Das</surname>
          <given-names>Gitanjali</given-names>
        </name>
        <degrees>BS</degrees>
        <xref rid="aff1" ref-type="aff">1</xref>
        <xref rid="aff2" ref-type="aff">2</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-9101-0882</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib2">
        <name name-style="western">
          <surname>Cheung</surname>
          <given-names>Cynthia</given-names>
        </name>
        <degrees>MPH, MA</degrees>
        <xref rid="aff3" ref-type="aff">3</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-1743-6890</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib3">
        <name name-style="western">
          <surname>Nebeker</surname>
          <given-names>Camille</given-names>
        </name>
        <degrees>EdD, MS</degrees>
        <xref rid="aff1" ref-type="aff">1</xref>
        <xref rid="aff3" ref-type="aff">3</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-6819-1796</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib4">
        <name name-style="western">
          <surname>Bietz</surname>
          <given-names>Matthew</given-names>
        </name>
        <degrees>PhD</degrees>
        <xref rid="aff3" ref-type="aff">3</xref>
        <xref rid="aff4" ref-type="aff">4</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-7782-3887</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib5" corresp="yes">
      <name name-style="western">
        <surname>Bloss</surname>
        <given-names>Cinnamon</given-names>
      </name>
      <degrees>PhD</degrees>
      <xref rid="aff1" ref-type="aff">1</xref>
      <xref rid="aff3" ref-type="aff">3</xref>
      <xref rid="aff5" ref-type="aff">5</xref>
      <address>
        <institution>Department of Psychiatry</institution>
        <institution>University of California San Diego</institution>
        <addr-line>9500 Gilman Drive</addr-line>
        <addr-line>Atkinson Hall</addr-line>
        <addr-line>La Jolla, CA, 92093-0811</addr-line>
        <country>United States</country>
        <phone>1 858 534 9595</phone>
        <fax>1 858 534 9404</fax>
        <email>cbloss@ucsd.edu</email>
      </address>  
      <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-1315-8387</ext-link></contrib>
    </contrib-group>
    <aff id="aff1">
    <sup>1</sup>
    <institution>Department of Family Medicine and Public Health</institution>
    <institution>University of California San Diego</institution>  
    <addr-line>La Jolla, CA</addr-line>
    <country>United States</country></aff>
    <aff id="aff2">
    <sup>2</sup>
    <institution>Division of Biological Sciences</institution>
    <institution>University of California San Diego</institution>  
    <addr-line>La Jolla, CA</addr-line>
    <country>United States</country></aff>
    <aff id="aff3">
    <sup>3</sup>
    <institution>Qualcomm Institute</institution>
    <institution>California Institute for Telecommunications and Technology</institution>  
    <institution>University of California San Diego</institution>  
    <addr-line>La Jolla, CA</addr-line>
    <country>United States</country></aff>
    <aff id="aff4">
    <sup>4</sup>
    <institution>Donald Bren School of Information and Computer Sciences</institution>
    <institution>Department of Informatics</institution>  
    <institution>University of California Irvine</institution>  
    <addr-line>Irvine, CA</addr-line>
    <country>United States</country></aff>
    <aff id="aff5">
    <sup>5</sup>
    <institution>Department of Psychiatry</institution>
    <institution>University of California San Diego</institution>  
    <addr-line>La Jolla, CA</addr-line>
    <country>United States</country></aff>
    <author-notes>
      <corresp>Corresponding Author: Cinnamon Bloss 
      <email>cbloss@ucsd.edu</email></corresp>
    </author-notes>
    <pub-date pub-type="collection"><month>01</month><year>2018</year></pub-date>
    <pub-date pub-type="epub">
      <day>04</day>
      <month>01</month>
      <year>2018</year>
    </pub-date>
    <volume>6</volume>
    <issue>1</issue>
    <elocation-id>e3</elocation-id>
    <!--history from ojs - api-xml-->
    <history>
      <date date-type="received">
        <day>2</day>
        <month>3</month>
        <year>2017</year>
      </date>
      <date date-type="rev-request">
        <day>5</day>
        <month>6</month>
        <year>2017</year>
      </date>
      <date date-type="rev-recd">
        <day>1</day>
        <month>8</month>
        <year>2017</year>
      </date>
      <date date-type="accepted">
        <day>23</day>
        <month>8</month>
        <year>2017</year>
      </date>
    </history>
    <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
    <copyright-statement>©Gitanjali Das, Cynthia Cheung, Camille Nebeker, Matthew Bietz, Cinnamon Bloss. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 04.01.2018.</copyright-statement>
    <copyright-year>2018</copyright-year>
    <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
      <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR mhealth and uhealth, is properly cited. The complete bibliographic information, a link to the original publication on http://mhealth.jmir.org/, as well as this copyright and license information must be included.</p>
    </license>  
    <self-uri xlink:href="http://mhealth.jmir.org/2018/1/e3/" xlink:type="simple"/>
    <abstract>
      <sec sec-type="background">
        <title>Background</title>
        <p>Due to the growing availability of consumer information, the protection of personal data is of increasing concern.</p>
      </sec>
      <sec sec-type="objective">
        <title>Objective</title>
        <p>We assessed readability metrics of privacy policies for apps that are either available to or targeted toward youth to inform strategies to educate and protect youth from unintentional sharing of personal data.</p>
      </sec>
      <sec sec-type="methods">
        <title>Methods</title>
        <p>We reviewed the 1200 highest ranked apps from the Apple and Google Play Stores and systematically selected apps geared toward youth. After applying exclusion criteria, 99 highly ranked apps geared toward minors remained, 64 of which had a privacy policy. We obtained and analyzed these privacy policies using reading grade level (RGL) as a metric. Policies were further compared as a function of app category (free vs paid; entertainment vs social networking vs utility).</p>
      </sec>
      <sec sec-type="results">
        <title>Results</title>
        <p>Analysis of privacy policies for these 64 apps revealed an average RGL of 12.78, which is well above the average reading level (8.0) of adults in the United States. There was also a small but statistically significant difference in word count as a function of app category (entertainment: 2546 words, social networking: 3493 words, and utility: 1038 words; <italic>P</italic>=.02).</p>
      </sec>
      <sec sec-type="conclusions">
        <title>Conclusions</title>
        <p>Although users must agree to privacy policies to access digital tools and products, readability analyses suggest that these agreements are not comprehensible to most adults, let alone youth. We propose that stakeholders, including pediatricians and other health care professionals, play a role in educating youth and their guardians about the use of Web-based services and potential privacy risks, including the unintentional sharing of personal data.</p>
      </sec>
    </abstract>
    <kwd-group>
      <kwd>privacy</kwd>
      <kwd>comprehension</kwd>
      <kwd>mobile applications</kwd>
      <kwd>adolescent</kwd>
    </kwd-group></article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>Both Apple and Android have recently surpassed 1.5 million apps available on their respective markets [<xref ref-type="bibr" rid="ref1">1</xref>]. Most of these apps collect user statistics and are able to make use of the built-in sensors on one’s mobile phone to track movement, location, and other personal behavior and activity [<xref ref-type="bibr" rid="ref2">2</xref>]. Although the use of built-in sensors may simplify the user interface and improve user experience, it can also allow app developers and third parties to gather potentially sensitive information about the consumer [<xref ref-type="bibr" rid="ref2">2</xref>]. Due to the growing availability of consumer information, protection of personal data is of increasing concern.</p>
      <p>Privacy policies should inform users of the risks of the product they are about to use. Whereas most users may not read the privacy policy, if they have concerns about their privacy while using an app, they should be able to refer back to the policy to understand how their information is being collected or used. Although the Federal Trade Commission (FTC) recommends that mobile apps make privacy statements available to app users [<xref ref-type="bibr" rid="ref3">3</xref>], not all apps have privacy policies. Furthermore, there are no clear standards regarding the accessibility of privacy statements for the average consumer, so privacy policies are often lengthy and difficult to read and comprehend [<xref ref-type="bibr" rid="ref4">4</xref>]. In fact, an analysis of the privacy policies of mobile health apps conducted in 2015 found that most mobile health apps did not have privacy policies. Of the privacy policies that did exist, two-thirds of them did not focus solely on the app itself but instead addressed several apps or services offered by the developer. The available policies also did not make privacy practices transparent to the readers and had a high reading grade level (RGL) [<xref ref-type="bibr" rid="ref4">4</xref>]. This presents a unique set of challenges when considering apps targeted toward minors.</p>
      <p>Two existing regulations have attempted to address these issues: the FTC’s Children’s Online Privacy Protection Act (COPPA) and the California Online Privacy Protection Act (CalOPPA). The COPPA took effect in 2000 and created stipulations for the collection, usage, and sharing of information from children under 13 years by Web-based services. In 2013, COPPA rules were updated to address the privacy threats associated with “big data” and the ability for mobile apps and websites to collect highly granular information from consumers such as geolocation, relationships with friends, and different behaviors and preferences. The new COPPA guidelines also addressed parental concerns about websites collecting information about location, friends and contacts, and tracking software associated with mobile apps [<xref ref-type="bibr" rid="ref5">5</xref>]. Similarly, the CalOPPA imposed regulations on apps available to California residents, requiring them to have a privacy statement informing consumers how their information is collected and shared [<xref ref-type="bibr" rid="ref6">6</xref>]. CalOPPA also requires privacy statements to include a list of personally identifiable information being collected and a list of third parties with whom information is shared [<xref ref-type="bibr" rid="ref6">6</xref>]. Unfortunately, it is still often unclear how third parties are collecting information that is entered into the app [<xref ref-type="bibr" rid="ref7">7</xref>]. This calls into question the effectiveness of such a policy if users are not aware that apps are collecting their information.</p>
      <p>The unnoticed involvement of third parties is of particular concern when considering apps targeted toward minors. Although the COPPA legally restricts the ways in which information from minors younger than 13 years can be collected and used, language in the COPPA excludes teenagers from 13 to 18 years of age from these same protections. Although the responsibility of monitoring a child’s Web safety has traditionally fallen on the child’s parents [<xref ref-type="bibr" rid="ref8">8</xref>], the teenage years are a time when parents tend to have less direct oversight of Web-based activities. Teens who use mobile apps and websites are less likely to involve their parents when interfacing with and providing information to Web-based services [<xref ref-type="bibr" rid="ref9">9</xref>] and may not be fully aware of how their information is collected and used. An open question, then, is the extent to which parents are able to adequately understand and advise on the privacy implications of their children’s Web-based activities.</p>
      <p>Internet safety has become a public health issue that concerns health care providers. The American Academy of Pediatrics (AAP) encourages parents to open a dialogue with their children about Web safety [<xref ref-type="bibr" rid="ref10">10</xref>]. However, the lack of parental involvement in Web-based activity potentially leaves teens in a vulnerable situation regarding personal privacy and Web-based behaviors. For example, location tracking is a known safety concern particularly for teenage girls [<xref ref-type="bibr" rid="ref9">9</xref>], making it important for teens to be aware of location-tracking features on the apps they download. Additionally, the increasing prevalence of social networking features in popular apps can expose youth to cyberbullying or unsuitable material, which can lead to long-term mental health consequences [<xref ref-type="bibr" rid="ref11">11</xref>]. Although some research has shown that teenagers will take steps to protect their privacy by avoiding apps or disabling features that track their movements or usage [<xref ref-type="bibr" rid="ref9">9</xref>], it is unclear whether the majority of teens are actually aware of the need to take such measures. Given that an estimated one in 3 Internet users is younger than 18 years [<xref ref-type="bibr" rid="ref12">12</xref>], the implications of this issue are considerable. A 2012 analysis of app permissions and risk signals concluded that popular apps require more permissions for greater functionality, yet there are no reliable “risk signals” that alert users to the privacy risks associated with the app [<xref ref-type="bibr" rid="ref13">13</xref>]. Privacy policies, such as an informed consent document, should be written in a way for users to understand their privacy risk when using an app. This study was designed to evaluate the readability of privacy policies for apps that are available to and targeted toward youth. Our goal was to inform strategies to educate and protect youth from unintentional sharing of personal data. The overarching privacy principles state that patients must be able to easily find and read the privacy policy of their health technology, and they have the right to refuse participation. The readability statistics collected in this study are compared with the Patient Privacy Rights’ Trust Framework (PPR TF) principle #1 criteria on ability to find and understand privacy policies, which recommends an RGL of 12.0 or lower and a Flesch reading ease of 45.0 [<xref ref-type="bibr" rid="ref14">14</xref>].</p>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>App Selection Process</title>
        <p><xref ref-type="fig" rid="figure1">Figure 1</xref> outlines the app selection process used. The Apple App Store and the Google Play Store have a combined total of over 3 million apps available for download on mobile devices [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref16">16</xref>]. Each store ranks their apps according to their respective ranking formulas, which take into account app ratings, reviews, and number of downloads. We identified and analyzed the highest-ranked 300 free and 300 paid apps in the Apple App Store and the highest-ranked 300 free and 300 paid apps in the Google Play Store, for a total of 1200 apps, which were reviewed manually.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>App selection process flowchart (completed March 2016).</p>
          </caption>
          <graphic xlink:href="mhealth_v6i1e3_fig1.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <sec>
          <title>Focus on Youth</title>
          <p>We made efforts to focus our study on apps actually used by youth, and this was done by further narrowing down the selection from the initial 1200 apps identified. Apps were characterized as available to and targeted toward minors if they generally did not require the use of money and did not facilitate interaction with unknown people. Specific exclusion criteria included apps that (1) encourage the use of money outside in-app purchases (eg, shopping, travel, or real-estate apps), (2) facilitate interaction with unknown people (eg, dating or ride-service apps), (3) are focused on tracking pregnancies or newborn development, or (4) serve as licensing keys that unlock premium features of other apps (only in the Google Play Store). Shopping apps included apps related to specific stores or corporations (eg, Kohl’s, Walmart, or Amazon), buy and sell apps (eg, letgo or eBay), and coupon or discount apps (eg, Groupon). Shopping apps did not include subscription streaming services such as HBO Now or Netflix. Dating and ride-service apps, including Tinder and Uber, were omitted because interaction with strangers is discouraged for youth.</p>
          <p>Pregnancy and newborn development tracking apps were omitted because having and raising children is less common among teenagers and youth. A total of 96 apps were omitted. All other apps were included.</p>
        </sec>
        <sec>
          <title>Reliability</title>
          <p>To determine the reliability of the exclusion criteria, a second rater who had not seen the original list of 1200 apps applied the exclusion criteria to a random sample of 120 apps (30 per app type—Apple Free, Apple Paid, Google Play Free, and Google Play Paid). Out of the 120 apps, there was disagreement on only one app, yielding a kappa statistic of .94 (<italic>P</italic>&#60;.001), which demonstrates high interrater agreement [<xref ref-type="bibr" rid="ref17">17</xref>]. After discussion, the 2 raters came to consensus on the one app of disagreement and included it in the sample as “available to youth.”</p>
          <p>For the analysis of the apps, in each of the four app types, the highest ranked 30 apps, representing 10.00% (120/1200) of the apps, were reviewed for availability of a privacy policy. A total of 120 apps were considered a feasible number of privacy policies to analyze using a readability calculator. Of these 120 apps, 21 were available in both the Apple and Google stores and were analyzed only once. Out of the final 99 apps, 24 apps did not have privacy policies, and 11 apps had identical privacy policies because of those apps being products of the same developer. This left a total of 64 unique documents for our final readability analysis. Privacy policies of apps were found either via direct link to the privacy policy from the respective app store or from a link to the website of the app developer.</p>
        </sec>
        <sec>
          <title>Readability Analysis</title>
          <p>Comprehensibility was measured as “readability,” or the ease of understanding the given text. Readability was used as a measure of comprehensibility, as it provides an unbiased numerical value reflective of comprehensibility. Readability statistics of privacy policies for apps from the Apple and Google Play app stores were calculated using a Web-based readability calculator and analyzed. The average RGL was then compared with the average RGL of adults in the United States. Notably, there are no standards or guidelines for the readability of mobile app privacy policies, so the readability statistics were also compared with the PPR TF. The PPR TF is a set of criteria that measure how technology affects patient privacy. These criteria were developed by the Coalition for Patient Privacy, in collaboration with others, to offer suggested standards on how patient privacy can be protected.</p>
          <p>The 64 privacy policies were entered into a Web-based readability calculator, the Readability Test Tool (WebpageFX, Inc, Harrisburg, PA) [<xref ref-type="bibr" rid="ref18">18</xref>], which is one of multiple free resources that calculate readability. Before selecting this tool, privacy policies were entered into multiple Web-based calculators. As most tools were found to produce fairly consistent results, the Readability Test Tool was used because of its simple user interface.</p>
          <p>Statistics collected from the readability calculator were word count, Flesch reading ease, Flesch-Kincaid RGL, Gunning-Fog RGL, simplified measure of Gobbledygook (SMOG) RGL, sentence count, and number of complex words. Flesch reading ease computes a score on a scale from 0 to 100 with higher numbers representing greater reading ease. Flesch-Kincaid, Gunning-Fog RGL, and SMOG RGL are calculated by taking into account the sentence length and average word length. Gunning-Fog uses the average word length to determine the percentage of complex words or words with greater than three syllables. SMOG RGL typically overestimates the RGL of the text, and Flesh-Kincaid typically underestimates RGL. For a more accurate metric, RGL was calculated as the average of Flesch-Kincaid RGL, Gunning-Fog RGL, and SMOG RGL (<xref ref-type="table" rid="table1">Table 1</xref>).</p>
        </sec>
      </sec>
      <sec>
        <title>Data Analysis</title>
        <p>Mean RGL of the 64 apps was compared with the average adult reading level in the United States and to the PPR TF recommended RGL of 12.0. The Flesch reading ease score was compared with the PPR TF recommended reading ease score of 45.0. Apps were also divided into three broad app categories (entertainment, social networking, and utility) based on app store classifications. Entertainment apps included games, music, and video apps (eg, Angry Birds, Spotify, and Netflix). Social networking apps were categorized as such by the app stores and included messaging services associated with social networking (eg, Snapchat, Facebook Messenger, and Instagram). Utility apps encompassed all apps for general use and apps that did not fit into the other two categories (eg, flashlight, word processing, or email apps). RGL of the three categories were compared using a one-way analysis of variance (ANOVA). All reported <italic>P</italic> values are uncorrected.</p>

          <table-wrap position="float" id="table1">
            <label>Table 1</label>
            <caption>
              <p>Flesch-Kincaid, Gunning-Fog, simplified measure of Gobbledygook (SMOG), and average reading grade levels (RGLs) for all apps included in the analysis. The average reading level column is the average of Flesch-Kincaid, Gunning-Fog, and SMOG RGLs.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="300"/>
              <col width="200"/>
              <col width="250"/>
              <col width="150"/>
              <col width="100"/>
              <thead>
                <tr valign="bottom">
                  <td>App name</td>
                  <td>Average reading level</td>
                  <td>Flesch-Kincaid reading level</td>
                  <td>Gunning-Fog</td>
                  <td>SMOG<sup>a</sup></td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>Disney Build It: Frozen</td>
                  <td>17.1</td>
                  <td>16.8</td>
                  <td>19.4</td>
                  <td>15</td>
                </tr>
                <tr valign="top">
                  <td>Subway surfers</td>
                  <td>15.9</td>
                  <td>16.1</td>
                  <td>18.2</td>
                  <td>13.6</td>
                </tr>
                <tr valign="top">
                  <td>Nova Launcher Prime</td>
                  <td>15.6</td>
                  <td>15.8</td>
                  <td>16.9</td>
                  <td>14.1</td>
                </tr>
                <tr valign="top">
                  <td>Monument Valley</td>
                  <td>15.5</td>
                  <td>15.9</td>
                  <td>16.6</td>
                  <td>14</td>
                </tr>
                <tr valign="top">
                  <td>WhatsApp</td>
                  <td>15.5</td>
                  <td>16.2</td>
                  <td>17.4</td>
                  <td>13</td>
                </tr>
                <tr valign="top">
                  <td>Du Battery Saver and phone charger</td>
                  <td>15.2</td>
                  <td>14.5</td>
                  <td>17.9</td>
                  <td>13.3</td>
                </tr>
                <tr valign="top">
                  <td>Netflix</td>
                  <td>14.9</td>
                  <td>14.6</td>
                  <td>17.2</td>
                  <td>13</td>
                </tr>
                <tr valign="top">
                  <td>Grand Theft Auto: San Andreas</td>
                  <td>14.7</td>
                  <td>14.5</td>
                  <td>16.4</td>
                  <td>13.1</td>
                </tr>
                <tr valign="top">
                  <td>Mobile Strike</td>
                  <td>14.6</td>
                  <td>14.6</td>
                  <td>16.6</td>
                  <td>12.5</td>
                </tr>
                <tr valign="top">
                  <td>Pages</td>
                  <td>14.2</td>
                  <td>13.8</td>
                  <td>16.2</td>
                  <td>12.6</td>
                </tr>
                <tr valign="top">
                  <td>Terraria</td>
                  <td>14.2</td>
                  <td>13.7</td>
                  <td>16.3</td>
                  <td>12.5</td>
                </tr>
                <tr valign="top">
                  <td>Faily brakes</td>
                  <td>14.1</td>
                  <td>13.8</td>
                  <td>16.1</td>
                  <td>12.3</td>
                </tr>
                <tr valign="top">
                  <td>Pandora</td>
                  <td>14.1</td>
                  <td>13.9</td>
                  <td>16</td>
                  <td>12.5</td>
                </tr>
                <tr valign="top">
                  <td>Rolling Sky</td>
                  <td>14</td>
                  <td>13.4</td>
                  <td>16.4</td>
                  <td>12.3</td>
                </tr>
                <tr valign="top">
                  <td>Stick Texting: The Emoji Killer</td>
                  <td>13.9</td>
                  <td>13.8</td>
                  <td>15.7</td>
                  <td>12.4</td>
                </tr>
                <tr valign="top">
                  <td>Gmail</td>
                  <td>13.8</td>
                  <td>13.5</td>
                  <td>15.9</td>
                  <td>11.9</td>
                </tr>
                <tr valign="top">
                  <td>Assassin’s Creed Identity</td>
                  <td>13.7</td>
                  <td>13.8</td>
                  <td>14.8</td>
                  <td>12.5</td>
                </tr>
                <tr valign="top">
                  <td>Minecraft: Story Mode</td>
                  <td>13.7</td>
                  <td>13.5</td>
                  <td>15.6</td>
                  <td>12</td>
                </tr>
                <tr valign="top">
                  <td>Angry Birds</td>
                  <td>13.6</td>
                  <td>13.3</td>
                  <td>15.2</td>
                  <td>12.4</td>
                </tr>
                <tr valign="top">
                  <td>NBA 2K16</td>
                  <td>13.5</td>
                  <td>13.3</td>
                  <td>15</td>
                  <td>12.2</td>
                </tr>
                <tr valign="top">
                  <td>Candy Crush Jelly Saga</td>
                  <td>13.4</td>
                  <td>13</td>
                  <td>15</td>
                  <td>12.2</td>
                </tr>
                <tr valign="top">
                  <td>FaceSwap Live Lite</td>
                  <td>13.4</td>
                  <td>13.3</td>
                  <td>14.5</td>
                  <td>12.3</td>
                </tr>
                <tr valign="top">
                  <td>Ultimate Guitar Tabs and Chords</td>
                  <td>13.3</td>
                  <td>13</td>
                  <td>14.8</td>
                  <td>12</td>
                </tr>
                <tr valign="top">
                  <td>Twitter</td>
                  <td>13.2</td>
                  <td>13.2</td>
                  <td>15.2</td>
                  <td>11.2</td>
                </tr>
                <tr valign="top">
                  <td>Agar.io</td>
                  <td>12.9</td>
                  <td>12.3</td>
                  <td>15.3</td>
                  <td>11.3</td>
                </tr>
                <tr valign="top">
                  <td>Hitman: Sniper</td>
                  <td>12.9</td>
                  <td>12.7</td>
                  <td>14.2</td>
                  <td>11.7</td>
                </tr>
                <tr valign="top">
                  <td>Kimoji</td>
                  <td>12.9</td>
                  <td>12.6</td>
                  <td>14.7</td>
                  <td>11.5</td>
                </tr>
                <tr valign="top">
                  <td>Spotify Music</td>
                  <td>12.8</td>
                  <td>12.5</td>
                  <td>14.3</td>
                  <td>11.7</td>
                </tr>
                <tr valign="top">
                  <td>VivaVideo Pro</td>
                  <td>12.8</td>
                  <td>12.3</td>
                  <td>14.8</td>
                  <td>11.2</td>
                </tr>
                <tr valign="top">
                  <td>Facetune</td>
                  <td>12.7</td>
                  <td>12.7</td>
                  <td>13.9</td>
                  <td>11.6</td>
                </tr>
                <tr valign="top">
                  <td>Heads Up</td>
                  <td>12.7</td>
                  <td>12.3</td>
                  <td>14.5</td>
                  <td>11.3</td>
                </tr>
                <tr valign="top">
                  <td>Swype keyboard</td>
                  <td>12.7</td>
                  <td>12.5</td>
                  <td>13.9</td>
                  <td>11.6</td>
                </tr>
                <tr valign="top">
                  <td>Fishdom: Deep Dive</td>
                  <td>12.6</td>
                  <td>12.4</td>
                  <td>14.4</td>
                  <td>11.1</td>
                </tr>
                <tr valign="top">
                  <td>Game of Life Classic Edition</td>
                  <td>12.6</td>
                  <td>12.4</td>
                  <td>14.3</td>
                  <td>11.2</td>
                </tr>
                <tr valign="top">
                  <td>Geometry Dash</td>
                  <td>12.6</td>
                  <td>12.2</td>
                  <td>14.4</td>
                  <td>11.3</td>
                </tr>
                <tr valign="top">
                  <td>Power Clean: Optimize cleaner</td>
                  <td>12.6</td>
                  <td>12.4</td>
                  <td>13.9</td>
                  <td>11.5</td>
                </tr>
                <tr valign="top">
                  <td>Snapchat</td>
                  <td>12.5</td>
                  <td>12.2</td>
                  <td>14.6</td>
                  <td>10.8</td>
                </tr>
                <tr valign="top">
                  <td>Super Bright LED Flashlight</td>
                  <td>12.5</td>
                  <td>12.3</td>
                  <td>13.5</td>
                  <td>11.8</td>
                </tr>
                <tr valign="top">
                  <td>Clash Royale</td>
                  <td>12.4</td>
                  <td>11.8</td>
                  <td>14.4</td>
                  <td>11.1</td>
                </tr>
                <tr valign="top">
                  <td>Plague Inc</td>
                  <td>12.4</td>
                  <td>12.6</td>
                  <td>13.1</td>
                  <td>11.6</td>
                </tr>
                <tr valign="top">
                  <td>Sleep Cycle Alarm Clock</td>
                  <td>12.4</td>
                  <td>12.4</td>
                  <td>13.2</td>
                  <td>11.6</td>
                </tr>
                <tr valign="top">
                  <td>Bloon TD 5</td>
                  <td>12.3</td>
                  <td>12.3</td>
                  <td>14.1</td>
                  <td>10.6</td>
                </tr>
                <tr valign="top">
                  <td>Facebook</td>
                  <td>12.3</td>
                  <td>11.8</td>
                  <td>14.3</td>
                  <td>10.8</td>
                </tr>
                <tr valign="top">
                  <td>Instagram</td>
                  <td>12.3</td>
                  <td>12.1</td>
                  <td>13.9</td>
                  <td>11</td>
                </tr>
                <tr valign="top">
                  <td>Akinator the Genie</td>
                  <td>12.2</td>
                  <td>12.3</td>
                  <td>12.8</td>
                  <td>11.4</td>
                </tr>
                <tr valign="top">
                  <td>YouTube</td>
                  <td>12.2</td>
                  <td>11.7</td>
                  <td>14.4</td>
                  <td>10.6</td>
                </tr>
                <tr valign="top">
                  <td>Please Don’t Touch Anything</td>
                  <td>11.9</td>
                  <td>11.6</td>
                  <td>12.8</td>
                  <td>11.2</td>
                </tr>
                <tr valign="top">
                  <td>Musical.ly</td>
                  <td>11.8</td>
                  <td>11.5</td>
                  <td>12.7</td>
                  <td>11.2</td>
                </tr>
                <tr valign="top">
                  <td>ZEDGE</td>
                  <td>11.8</td>
                  <td>11.4</td>
                  <td>13.4</td>
                  <td>10.7</td>
                </tr>
                <tr valign="top">
                  <td>Kik</td>
                  <td>11.7</td>
                  <td>11.3</td>
                  <td>13.3</td>
                  <td>10.6</td>
                </tr>
                <tr valign="top">
                  <td>PianoTiles 2</td>
                  <td>11.6</td>
                  <td>11.4</td>
                  <td>12.6</td>
                  <td>10.9</td>
                </tr>
                <tr valign="top">
                  <td>Dragon Land</td>
                  <td>11.4</td>
                  <td>10.7</td>
                  <td>12.8</td>
                  <td>10.6</td>
                </tr>
                <tr valign="top">
                  <td>Kika Emoji Keyboard</td>
                  <td>11.3</td>
                  <td>11</td>
                  <td>12.9</td>
                  <td>10</td>
                </tr>
                <tr valign="top">
                  <td>NeoMonsters</td>
                  <td>11.3</td>
                  <td>10.8</td>
                  <td>12.8</td>
                  <td>10.3</td>
                </tr>
                <tr valign="top">
                  <td>Pinterest</td>
                  <td>11.3</td>
                  <td>10.8</td>
                  <td>12.9</td>
                  <td>10.2</td>
                </tr>
                <tr valign="top">
                  <td>Toca Lab</td>
                  <td>11.2</td>
                  <td>11</td>
                  <td>12.6</td>
                  <td>10</td>
                </tr>
                <tr valign="top">
                  <td>Afterlight</td>
                  <td>10.8</td>
                  <td>10.4</td>
                  <td>11.9</td>
                  <td>10.2</td>
                </tr>
                <tr valign="top">
                  <td>Minecraft pocket edition</td>
                  <td>10.7</td>
                  <td>10.2</td>
                  <td>11.9</td>
                  <td>10.1</td>
                </tr>
                <tr valign="top">
                  <td>Badland 2</td>
                  <td>10.5</td>
                  <td>9.7</td>
                  <td>12.3</td>
                  <td>9.4</td>
                </tr>
                <tr valign="top">
                  <td>True Skate</td>
                  <td>10.2</td>
                  <td>10</td>
                  <td>11.4</td>
                  <td>9.1</td>
                </tr>
                <tr valign="top">
                  <td>Pocket Casts</td>
                  <td>10</td>
                  <td>9.2</td>
                  <td>11.5</td>
                  <td>9.3</td>
                </tr>
                <tr valign="top">
                  <td>SuperPhoto Full</td>
                  <td>10</td>
                  <td>9.4</td>
                  <td>11.7</td>
                  <td>9</td>
                </tr>
                <tr valign="top">
                  <td>The Room Three</td>
                  <td>10</td>
                  <td>9.3</td>
                  <td>11.7</td>
                  <td>9.1</td>
                </tr>
                <tr valign="top">
                  <td>Papa’s Freezeria To Go</td>
                  <td>8.5</td>
                  <td>8.6</td>
                  <td>8.8</td>
                  <td>8.2</td>
                </tr>
              </tbody>
            </table>
            <table-wrap-foot>
              <fn id="table1fn1">
                <p><sup>a</sup>SMOG: simplified measure of Gobbledygook.</p>
              </fn>
            </table-wrap-foot>
          </table-wrap>

      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Readability</title>
        <p>The privacy policies reviewed in our analysis had a mean length of 2425 words (standard deviation [SD] 1965) and ranged from 140 to 8290 words (<xref ref-type="table" rid="table2">Tables 2</xref> and <xref ref-type="table" rid="table3">3</xref> and <xref ref-type="fig" rid="figure2">Figure 2</xref>). Privacy policies had a mean RGL of 12.78 (SD 1.611; <xref ref-type="table" rid="table2">Tables 2</xref> and <xref ref-type="table" rid="table3">3</xref> and <xref ref-type="fig" rid="figure3">Figure 3</xref>). The correlation between privacy policy length and RGL was not statistically significant (<italic>r</italic>=.2452, <italic>P</italic>&#62;.05, N=64). The mean Flesch reading ease was 42.73 (SD 6.991).</p>
      </sec>
      <sec>
        <title>Policy Readability Versus Recommended Standards</title>
        <p>Importantly, none of the discovered privacy policies had an RGL below the average adult RGL in the United States of 8.0 (<xref ref-type="fig" rid="figure3">Figure 3</xref>). Privacy policies also had an average Flesch reading ease of 42.73 (SD 6.991), which is lower (ie, less readable) than the 45.0 recommended reading ease by the PPR (<italic>P</italic>&#60;.05; <xref ref-type="fig" rid="figure3">Figure 3</xref>). The average RGL of 12.78 is similar to the PPR TF recommended RGL of 12.0.</p>
      </sec>
      <sec>
        <title>App Category Comparisons</title>
        <p>The readability of policies from 30 free apps and 34 paid apps were compared. Free apps had an average RGL of 13.09 (SD 1.304), and paid apps had an average RGL of 12.51 (SD 1.815). Data are shown in <xref ref-type="table" rid="table2">Table 2</xref> and illustrate no significant differences between free and paid apps on any of the metrics examined (<italic>P</italic>&#62;.05). Apps were also divided into three broad categories (entertainment, social networking, and utility), as previously described. When privacy policies from these apps were compared as a function of category, we observed a significant difference in word count between the categories (<xref ref-type="table" rid="table3">Table 3</xref>), with social networking having the highest word count and utility the lowest. There were, however, no significant differences in average RGL.</p>

        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Mean readability statistics. Free versus paid: comparison of mean reading grade level (RGL), mean word count, and mean reading ease between free and paid apps from both the Android and Apple markets. The <italic>P</italic> values for the <italic>t</italic> tests between the two app types show that there is no significant difference between mean RGL, word count, and reading ease.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="450"/>
            <col width="150"/>
            <col width="150"/>
            <col width="150"/>
            <col width="100"/>
            <thead>
              <tr valign="bottom">
                <td>Statistic</td>
                <td>All apps<sup>a</sup></td>
                <td>Free apps</td>
                <td>Paid apps</td>
                <td><italic>P</italic> value</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>N</td>
                <td>64</td>
                <td>30</td>
                <td>34</td>
                <td>--</td>
              </tr>
              <tr valign="top">
                <td>Mean RGL<sup>b</sup></td>
                <td>12.78</td>
                <td>13.09</td>
                <td>12.51</td>
                <td>.15</td>
              </tr>
              <tr valign="top">
                <td>Mean word count</td>
                <td>2425</td>
                <td>2355</td>
                <td>2487</td>
                <td>.79</td>
              </tr>
              <tr valign="top">
                <td>Mean Flesch reading ease</td>
                <td>42.73</td>
                <td>42.3</td>
                <td>43.1</td>
                <td>.65</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>Column summarizes results for all apps included in the analysis; it was not included in the significance test for the <italic>P</italic> value in the last column.</p>
            </fn>
            <fn id="table2fn2">
              <p><sup>b</sup>RGL: reading grade level.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>

        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Mean readability statistics. Entertainment versus social networking versus utility: comparison of mean reading grade level (RGL), mean word count, and mean reading ease between entertainment, social networking, and utility apps. The <italic>P</italic> values for the analysis of variance (ANOVA) tests show that there is no significant difference in the mean RGL and reading ease between the app categories, but there is a significant difference in mean word count.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="250"/>
            <col width="150"/>
            <col width="150"/>
            <col width="200"/>
            <col width="150"/>
            <col width="100"/>
            <thead>
              <tr valign="bottom">
                <td>Statistic</td>
                <td>All apps<sup>a</sup></td>
                <td>Entertainment</td>
                <td>Social networking</td>
                <td>Utility</td>
                <td><italic>P</italic> value</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>N</td>
                <td>64</td>
                <td>44</td>
                <td>7</td>
                <td>13</td>
                <td>--</td>
              </tr>
              <tr valign="top">
                <td>Mean RGL<sup>b</sup></td>
                <td>12.78</td>
                <td>12.84</td>
                <td>12.7</td>
                <td>12.62</td>
                <td>.93</td>
              </tr>
              <tr valign="top">
                <td>Mean word count</td>
                <td>2425</td>
                <td>2546</td>
                <td>3493</td>
                <td>1038</td>
                <td>.02</td>
              </tr>
              <tr valign="top">
                <td>Mean Flesch reading ease</td>
                <td>42.73</td>
                <td>42</td>
                <td>46.46</td>
                <td>43.37</td>
                <td>.31</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table3fn1">
              <p><sup>a</sup>Column summarizes results for all apps included in the analysis; it was not included in the significance test for the <italic>P</italic> value in the last column.</p>
            </fn>
            <fn id="table3fn2">
              <p><sup>b</sup>RGL: reading grade level.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>

        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Privacy policy word count (N=64 apps). The average word count of the privacy policies was 2425 words. The Game of Life Classic Edition had the highest word count at 8290 words, and Plague Inc had the lowest word count at 140 words.</p>
          </caption>
          <graphic xlink:href="mhealth_v6i1e3_fig2.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>

        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Privacy policy reading grade level (RGL; N=64). The RGL was an average of the Flesch-Kincaid, Gunning Fog, and simplified measure of Gobbledygook (SMOG) RGLs. The mean RGL of all the apps was 12.78, which is equivalent to a freshman in college. This average level is also higher than the Patient Privacy Rights (PPR) recommended RGL of 12.00 and higher than the US average adult RGL of 8.00. In terms of the individual apps, the highest RGL was for Disney Build It: Frozen at 17.07, which is equivalent to a graduate student reading level. The lowest RGL was for Papa’s Freezeria To Go at 8.53.</p>
          </caption>
          <graphic xlink:href="mhealth_v6i1e3_fig3.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>

      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>Analysis of privacy policies for 64 popular apps targeted toward youth revealed an average reading level of 12.78 or the equivalent RGL of a first year college student. Although this RGL is similar to the reading level recommended by the PPR TF, it is well above the average reading level of adults in the United States. These findings are similar to those from a 2015 study (Sunyaev et al), which noted that app developers and companies are not transparent about their privacy practices through their privacy policies [<xref ref-type="bibr" rid="ref4">4</xref>]. Although users must agree to app privacy policies to access digital tools and products, these agreements are not comprehensible by the average adult, let alone youth. Because companies often collect, use, and sell users’ personal information, it is concerning that agreements describing and governing these activities are not accessible to most users. We propose that stakeholders, including pediatricians and other health care professionals, could play a role in educating youth and their guardians about the use of Web-based services and potential privacy risks, including the unintentional sharing of personal data. However, considering the complexities of privacy policy agreements, there may be a need for further tools and training to help such stakeholders, including health care workers, understand, navigate, and educate others about Web-based privacy and Internet safety.</p>
        <p>Most parents are concerned about their child’s safety on the Internet. Whereas many have taken steps to protect their child’s safety while using the Web, such as through discussions with their children, it is often difficult for parents to know how their child’s privacy is protected on the Internet [<xref ref-type="bibr" rid="ref19">19</xref>]. About 40% of parents of Internet users have read the privacy policies of the apps that their children are using. Previous studies that have assessed privacy policies of mobile apps have concluded that college-level literacy is required to comprehend the text of privacy statements [<xref ref-type="bibr" rid="ref20">20</xref>]. Likewise, our study reached similar conclusions even though the apps selected for analysis were specifically directed toward children and teenagers. Apps that are available to teenagers should have privacy statements that teenagers can understand, and apps that are available to children should have privacy statements that are accessible by their parents or guardians. To be COPPA compliant, apps and websites should post a policy regarding their privacy practices so that parents are aware of how information is collected and used, and these policies must be readable and comprehensible [<xref ref-type="bibr" rid="ref21">21</xref>].</p>
        <p>Results from a 2013 study conducted by the Pew Research Center show that 70% of teen Internet users do seek out advice about their Internet safety. Many teenagers turn to friends, peers, or their parents for advice about privacy settings on Web applications. The results of the Pew study also show that teenagers of all racial and socioeconomic backgrounds seek advice about Internet safety, but white teenagers are more likely than black or Hispanic teenagers to talk to their parents about Web privacy. Youth should have a trusted adult they can consult when considering privacy expectations with their Web presence. By having privacy policies written so that youth can understand them, children and teenagers are afforded a sense of autonomy over their Internet practices. They will be able to make informed decisions about what kind of privacy settings they desire on their Web-based accounts, and they can discuss these privacy settings and their safety with a trusted adult [<xref ref-type="bibr" rid="ref9">9</xref>].</p>
        <p>Much of the inaccessible language in privacy policies stems from legal terminology used by corporations to protect themselves from potential liability. We identified excerpts from privacy policies in our study with the highest RGL (<xref ref-type="table" rid="table4">Table 4</xref>). Use of terms such as “cookies” and “third-party site” may contribute to comprehension difficulties, as well as complex phrases that use other jargon not in common parlance. It is well known that many users do not read privacy statements when they do download an app, and one possible reason for this may be the fact that they are difficult to comprehend. A potential solution is to require app developers to have versions of their privacy statements that translate the legal terminology in a way that is easy to understand. For example, Twitter’s privacy policy includes one sentence “tips” that summarize different sections of the policy [<xref ref-type="bibr" rid="ref22">22</xref>]. These tips are short and easy to read and allow users to better understand how their personal information is being used.</p>
        <p>We noted that even the PPR TF criteria that was used as a base of comparison for readability in this study has recommended standards that are too difficult for the average adult in the United States to comprehend, as they recommend a RGL of 12.0. We recommend that a new set of guidelines for privacy policies target the average adult in the United States, with an average RGL of 8.0 or lower, a Flesch reading ease score of 70 or higher, and a word count of less than 500 words. These standards would also be understood by most high school students, allowing teenagers to read and comprehend privacy policies for the apps they download and potentially gain a better understanding of how their personal data are collected, used, and potentially sold to third parties.</p>
        <p>The complexity and thus incomprehensibility of privacy policies poses a serious Internet safety concern for the youth in particular. A recent study on digital monitoring activity among teenagers shows that most parents do talk to their teenage children about appropriate Web behavior and what they should share on the Internet; however, most parents do not have these talks as frequently as they speak to their children about offline behavior [<xref ref-type="bibr" rid="ref23">23</xref>]. With the increasing use of Web-based applications in entertainment, education, and social networking, young people are making more and more information available over the Web, potentially leading to harmful consequences.</p>
        <p>Introducing educational curricula in schools about Web-based safety and increasing exposure to safe Internet practices may be an avenue to explore empirically. These curricula could provide children and adolescents with the tools they need to understand privacy risks and make choices about how their personal data are stored and shared over the Internet. Such resources are particularly important for older teenagers, who are less likely than younger children to involve their parents or ask for advice about Web privacy [<xref ref-type="bibr" rid="ref9">9</xref>]. Indeed, teenagers are often already in the position of making their own choices about their behavior and practices in Web-based and digital environments. Web-based safety programs, such as the one developed by Common Sense Education, allow teachers to tailor their curricula to specific grade levels to make Internet safety relevant to minors of different ages [<xref ref-type="bibr" rid="ref24">24</xref>].</p>

        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Sample text from privacy policies with highest reading grade level (top 5).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="200"/>
            <col width="110"/>
            <col width="165"/>
            <col width="520"/>
            <thead>
              <tr valign="top">
                <td>App name</td>
                <td>Word count</td>
                <td>Reading grade level</td>
                <td>Sample text from privacy policy</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Disney Build It: Frozen</td>
                <td>2880</td>
                <td>17.07</td>
                <td>“We collect...Usage, viewing and technical data, including your device identifier or IP address, when you visit our sites...or open emails we send.”</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td><break/></td>
                <td><break/></td>
                <td>“We acquire information from other trusted sources...”</td>
              </tr>
              <tr valign="top">
                <td>Subway Surfers</td>
                <td>1272</td>
                <td>15.97</td>
                <td>“We log information about your use of the App...”</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td><break/></td>
                <td><break/></td>
                <td>“...if you log into the App using a third-party site or platform such as Facebook, we may access information about you from that site or platform...”</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td><break/></td>
                <td><break/></td>
                <td>“We may allow third parties to serve contextual advertisements and provide analytics services in connection with the App. These entities may use various identifiers to collect information...”</td>
              </tr>
              <tr valign="top">
                <td>Nova Launcher Prime</td>
                <td>1487</td>
                <td>15.60</td>
                <td>“Information collected automatically from this Application (or third party services employed in this Application), which can include: the IP addresses or domain names of the computers utilized by the Users who use this Application...the country of origin...”</td>
              </tr>
              <tr valign="top">
                <td>WhatsApp</td>
                <td>2701</td>
                <td>15.53</td>
                <td>“WhatsApp will periodically access your address book or contact list on your mobile phone...”</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td><break/></td>
                <td><break/></td>
                <td>“WhatsApp uses both session cookies and persistent cookies. A persistent cookie remains after you close your browser...”</td>
              </tr>
              <tr valign="top">
                <td>Monument Valley</td>
                <td>984</td>
                <td>15.50</td>
                <td>“For operation and maintenance purposes, this Application and any third party services may collect files that record interaction with this Application (System Logs) or use for this purpose other Personal Data (such as IP Address).”</td>
              </tr>
              <tr valign="top">
                <td><break/></td>
                <td><break/></td>
                <td><break/></td>
                <td>“This Application does not support “Do Not Track” requests.”</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>

        <p>Given the ubiquitous nature of Web-based applications and the increasing frequency of use among children and adolescents, combined with the potential for harm if these are used inappropriately, health care providers may need to consider how to address these harms in the context of their overall care of underage patients. Using clinicians as a vehicle for counseling patients on privacy and app safety practices would be analogous to the ways in which health professionals play an important role in informing patients about practices to promote a healthy lifestyle (eg, physical activity and nutrition). For example, health care providers who interact with youth (eg, orthodontists, dentists, or pediatricians) can leverage their access to youth to share information about safety practices to enhance protection of youth in Web-based settings. However, to do that, a systematic approach to document the need for and, subsequently, appropriate guidelines directed to the clinician, would be needed.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>Overall, Internet safety has increasingly become a public health issue. Whereas parents may have the primary responsibility for Internet safety education [<xref ref-type="bibr" rid="ref8">8</xref>], the literature documents research findings that underscore the expertise required to understand privacy policies. The AAP has posted a guide on their website to assist parents in opening a dialogue to talk to their kids about Internet safety and social media [<xref ref-type="bibr" rid="ref10">10</xref>]. Social networking features have become increasingly prevalent in apps—even apps that are not directly associated with social media are often linked to Facebook accounts or have the option to share on social networking. This expansive network increases opportunities for exposure to cyberbullying or material that is unsuitable for minors, which can lead to mental health and safety issues in the pediatric population [<xref ref-type="bibr" rid="ref11">11</xref>]. Until there are clear standards for pediatricians and other health care providers specific to privacy and app safety education, they can assist by sharing information about available tools and educational resources.</p>
        <p>Finally, institutional resources should be developed to help health professionals fulfill this role. An example of this is the AAP policy statement “Media Use in School-Aged Children and Adolescents” [<xref ref-type="bibr" rid="ref25">25</xref>] that specifically highlights the privacy risks of social media and other Web-based activities and recognizes pediatricians’ role in helping parents set rules for Web-based activities and mentor their children about Web safety. Although the AAP tools are a good beginning, there is a need for further tools and training to help health care workers understand, navigate, and educate others about Web-based privacy and Internet safety. Overall, there is evidence that youth are concerned about maintaining their privacy, so training pediatricians and other health care providers to address privacy concerns with their patients will provide an additional safe place to ask questions and open a dialogue about Internet safety.</p>
      </sec>
    </sec>
  </body>
  <back>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AAP</term>
          <def>
            <p>American Academy of Pediatrics</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">ANOVA</term>
          <def>
            <p>analysis of variance</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">COPPA</term>
          <def>
            <p>Children’s Online Privacy Protection Act</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">CalOPPA</term>
          <def>
            <p>California Online Privacy Protection Act</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">FTC</term>
          <def>
            <p>Federal Trade Commission</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">PPR TF</term>
          <def>
            <p>Patient Privacy Rights’ Trust Framework</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">RGL</term>
          <def>
            <p>reading grade level</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">SD</term>
          <def>
            <p>standard deviation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">SMOG</term>
          <def>
            <p>simplified measure of Gobbledygook</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>The authors thank Joshua Quiroz for his assistance with aspects of this project. The authors also thank Kathryn Montgomery, Mark Hochhauser, and Kevin Patrick for their comments on study design and interpretation. This work was supported by a grant from the National Human Genome Research Institute “Impact of Privacy Environments for Personal Health Data on Patients” (PI: CB, R01 HG008753, 2015-2018).</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
        <source>Statista</source>  
        <access-date>2017-03-01</access-date>
        <comment>Number of apps available in leading app stores as of July 2015 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.statista.com/statistics/276623/number-of-apps-available-in-leading-app-stores/">https://www.statista.com/statistics/276623/number-of-apps-available-in-leading-app-stores/</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6oeJ6SFSh"/></comment> </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Lane</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Miluzzo</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Lu</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Peebles</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Choudhury</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Campbell</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>A survey of mobile phone sensing</article-title>
        <source>IEEE Commun Mag</source>  
        <year>2010</year>  
        <month>09</month>  
        <day>02</day>  
        <volume>48</volume>  
        <issue>9</issue>  
        <fpage>140</fpage>  
        <lpage>50</lpage>  
        <pub-id pub-id-type="doi">10.1109/MCOM.2010.5560598</pub-id></nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="web">
        <source>FTC</source>  
        <year>2013</year>  
        <month>02</month>  
        <access-date>2017-09-18</access-date>
        <comment>Mobile privacy disclosures: building trust through transparency 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.ftc.gov/reports/mobile-privacy-disclosures-building-trust-through-transparency-federal-trade-commission">https://www.ftc.gov/reports/mobile-privacy-disclosures-building-trust-through-transparency-federal-trade-commission</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6tZcvUM92"/></comment> </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Sunyaev</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Dehling</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Taylor</surname>
            <given-names>PL</given-names>
          </name>
          <name name-style="western">
            <surname>Mandl</surname>
            <given-names>KD</given-names>
          </name>
        </person-group>
        <article-title>Availability and quality of mobile health app privacy policies</article-title>
        <source>J Am Med Inform Assoc</source>  
        <year>2015</year>  
        <month>04</month>  
        <volume>22</volume>  
        <issue>e1</issue>  
        <fpage>e28</fpage>  
        <lpage>33</lpage>  
        <pub-id pub-id-type="doi">10.1136/amiajnl-2013-002605</pub-id>
        <pub-id pub-id-type="medline">25147247</pub-id>
        <pub-id pub-id-type="pii">amiajnl-2013-002605</pub-id></nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="web">
        <source>Democratic Media</source>  
        <year>2016</year>  
        <month>06</month>  
        <day>26</day>  
        <access-date>2017-09-18</access-date>
        <comment>The new children's online privacy rules: what parents need to know 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.democraticmedia.org/sites/default/files/CDDCOPPAParentguideJune2013.pdf">https://www.democraticmedia.org/sites/default/files/CDDCOPPAParentguideJune2013.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6tZdWLYy9"/></comment> </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Harris</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <source>OAG</source>  
        <year>2014</year>  
        <month>05</month>  
        <access-date>2017-09-18</access-date>
        <comment>Making your privacy practices public: recommendations on developing a meaningful privacy policy 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://oag.ca.gov/sites/all/files/agweb/pdfs/cybersecurity/making_your_privacy_practices_public.pdf">https://oag.ca.gov/sites/all/files/agweb/pdfs/cybersecurity/making_your_privacy_practices_public.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6tZeFKaJr"/></comment> </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Zang</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Dummit</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Graves</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Lisker</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Sweeney</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>Who knows what about me? a survey of behind the scenes personal data sharing to third parties by mobile apps</article-title>
        <source>Technology Science</source>  
        <year>2015</year>  
        <month>10</month>  
        <day>30</day>  
        <fpage>1</fpage>  
        <lpage>53</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://techscience.org/a/2015103001/"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Moreno</surname>
            <given-names>MA</given-names>
          </name>
          <name name-style="western">
            <surname>Egan</surname>
            <given-names>KG</given-names>
          </name>
          <name name-style="western">
            <surname>Bare</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Young</surname>
            <given-names>HN</given-names>
          </name>
          <name name-style="western">
            <surname>Cox</surname>
            <given-names>ED</given-names>
          </name>
        </person-group>
        <article-title>Internet safety education for youth: stakeholder perspectives</article-title>
        <source>BMC Public Health</source>  
        <year>2013</year>  
        <month>6</month>  
        <day>5</day>  
        <volume>13</volume>  
        <issue>1</issue>  
        <fpage>543</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://bmcpublichealth.biomedcentral.com/articles/10.1186/1471-2458-13-543"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/1471-2458-13-543</pub-id>
        <pub-id pub-id-type="medline">23738647</pub-id>
        <pub-id pub-id-type="pii">1471-2458-13-543</pub-id>
        <pub-id pub-id-type="pmcid">PMC3691757</pub-id></nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Lenhart</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Madden</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Cortesi</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Gasser</surname>
            <given-names>U</given-names>
          </name>
          <name name-style="western">
            <surname>Smith</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <source>Pew Research Center</source>  
        <year>2013</year>  
        <month>08</month>  
        <day>15</day>  
        <access-date>2017-09-18</access-date>
        <comment>Where teens seek online privacy advice 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.pewinternet.org/2013/08/15/where-teens-seek-online-privacy-advice/">http://www.pewinternet.org/2013/08/15/where-teens-seek-online-privacy-advice/</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6tZfUGixi"/></comment> </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="web">
        <source>American Academy of Pediatrics</source>  
        <year>2013</year>  
        <month>05</month>  
        <day>31</day>  
        <access-date>2017-07-27</access-date>
        <comment>Talking to kids and teens about social media and sexting 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.aap.org/en-us/about-the-aap/aap-press-room/news-features-and-safety-tips/Pages/Talking-to-kids-and-Teens-about-social-media-and-sexting.aspx">https://www.aap.org/en-us/about-the-aap/aap-press-room/news-features-and-safety-tips/Pages/Talking-to-kids-and-Teens-about-social-media-and-sexting.aspx</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6sGERsdnF"/></comment> </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Diomidous</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Chardalias</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Magita</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Koutonias</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Panagiotopoulou</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Mantas</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Social and psychological effects of the internet use</article-title>
        <source>Acta Inform Med</source>  
        <year>2016</year>  
        <month>02</month>  
        <volume>24</volume>  
        <issue>1</issue>  
        <fpage>66</fpage>  
        <lpage>8</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/27041814"/>
        </comment>  
        <pub-id pub-id-type="doi">10.5455/aim.2016.24.66-68</pub-id>
        <pub-id pub-id-type="medline">27041814</pub-id>
        <pub-id pub-id-type="pii">AIM-24-66</pub-id>
        <pub-id pub-id-type="pmcid">PMC4789623</pub-id></nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Livingstone</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Carr</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Byrne</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <source>Cigionline</source>  
        <year>2015</year>  
        <month>11</month>  
        <day>02</day>  
        <access-date>2017-09-18</access-date>
        <comment>One in three: Internet governance and children’s rights 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.cigionline.org/publications/one-three-internet-governance-and-childrens-rights">https://www.cigionline.org/publications/one-three-internet-governance-and-childrens-rights</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6tZfrMwgq"/></comment> </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Chia</surname>
            <given-names>PH</given-names>
          </name>
          <name name-style="western">
            <surname>Yamamoto</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Asokan</surname>
            <given-names>N</given-names>
          </name>
        </person-group>
        <article-title>Is this app safe? a large scale study on application permissions and risk signals</article-title>
        <year>2012</year>  
        <month>04</month>  
        <conf-name>Proceedings of the 21st International conference on World Wide Web</conf-name>
        <conf-date>April 16-20, 2012</conf-date>
        <conf-loc>Lyon, France</conf-loc>
        <publisher-loc>New York, NY</publisher-loc>
        <publisher-name>International World Wide Web Conference Committee (IW3C2)</publisher-name>
        <fpage>1</fpage>  
        <lpage>10</lpage> </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Peel</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>Privacy Trust Framework</article-title>
        <source>Patient Privacy Rights</source>  
        <year>2013</year>  
        <month>02</month>  
        <day>27</day>  
        <fpage>1</fpage>  
        <lpage>13</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://patientprivacyrights.org/trust-framework/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2139/ssrn.2231667</pub-id></nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="web">
        <source>Apple Inc</source>  
        <access-date>2017-03-01</access-date>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://itunes.apple.com/us/genre/ios/id36?mt=8">https://itunes.apple.com/us/genre/ios/id36?mt=8</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6oeK5W1R1"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="web">
        <source>Google Inc</source>  
        <access-date>2017-09-18</access-date>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://play.google.com/store/apps?hl=en">https://play.google.com/store/apps?hl=en</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6tZh9INWW"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Landis</surname>
            <given-names>JR</given-names>
          </name>
          <name name-style="western">
            <surname>Koch</surname>
            <given-names>GG</given-names>
          </name>
        </person-group>
        <article-title>The measurement of observer agreement for categorical data</article-title>
        <source>Biometrics</source>  
        <year>1977</year>  
        <month>03</month>  
        <volume>33</volume>  
        <issue>1</issue>  
        <fpage>159</fpage>  
        <lpage>74</lpage>  
        <pub-id pub-id-type="doi">10.2307/2529310</pub-id>
        <pub-id pub-id-type="medline">843571</pub-id></nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="web">
        <source>WebpageFX Inc</source>  
        <access-date>2017-03-02</access-date>
        <comment>Readability test tool 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.webpagefx.com/tools/read-able/">http://www.webpagefx.com/tools/read-able/</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6oeLNVXdm"/></comment> </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="web">
        <source>Children's Commissioner</source>  
        <year>2017</year>  
        <month>01</month>  
        <publisher-loc>London</publisher-loc>
        <comment>Growing up digital: a report of the growing up digital taskforce 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.childrenscommissioner.gov.uk/wp-content/uploads/2017/06/Growing-Up-Digital-Taskforce-Report-January-2017_0.pdf">https://www.childrenscommissioner.gov.uk/wp-content/uploads/2017/06/Growing-Up-Digital-Taskforce-Report-January-2017_0.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6tZhWccDQ"/></comment> </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>McDonald</surname>
            <given-names>AM</given-names>
          </name>
          <name name-style="western">
            <surname>Reeder</surname>
            <given-names>RW</given-names>
          </name>
          <name name-style="western">
            <surname>Kelley</surname>
            <given-names>PG</given-names>
          </name>
          <name name-style="western">
            <surname>Cranor</surname>
            <given-names>LF</given-names>
          </name>
        </person-group>
        <article-title>A comparative study of online privacy policies and formats</article-title>
        <source>Privacy Enhancing Technologies</source>  
        <year>2009</year>  
        <publisher-loc>Berlin, Heidelberg</publisher-loc>
        <publisher-name>Springer</publisher-name>
        <fpage>37</fpage>  
        <lpage>55</lpage> </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="web">
        <source>FTC</source>  
        <year>2015</year>  
        <access-date>2017-03-02</access-date>
        <comment>Complying with COPPA: frequently asked questions 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.ftc.gov/tips-advice/business-center/guidance/complying-coppa-frequently-asked-questions">https://www.ftc.gov/tips-advice/business-center/guidance/complying-coppa-frequently-asked-questions</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6oeLGfMMv"/></comment> </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="web">
        <source>Twitter Inc</source>  
        <access-date>2017-09-18</access-date>
        <comment>Twitter privacy policy 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://twitter.com/en/privacy">https://twitter.com/en/privacy</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6tZiJXV98"/></comment> </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Anderson</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <source>Pew Research Center</source>  
        <year>2016</year>  
        <month>01</month>  
        <day>07</day>  
        <access-date>2017-09-18</access-date>
        <comment>Parents, teens, and digital monitoring 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.pewinternet.org/2016/01/07/parents-teens-and-digital-monitoring/">http://www.pewinternet.org/2016/01/07/parents-teens-and-digital-monitoring/</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6tZieU27k"/></comment> </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="web">
        <source>Common Sense</source>  
        <access-date>2017-03-02</access-date>
        <comment>Digital citizenship 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.commonsense.org/education/digital-citizenship">https://www.commonsense.org/education/digital-citizenship</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6oeLaSLQH"/></comment> </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <collab>Council on Communications and Media</collab>
        </person-group>
        <article-title>Media use in school-aged children and adolescents</article-title>
        <source>Pediatrics</source>  
        <year>2016</year>  
        <month>11</month>  
        <volume>138</volume>  
        <issue>5</issue>  
        <fpage>1</fpage>  
        <lpage>8</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.webcitation.org/6tZjJvbCz"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1542/peds.2016-2592</pub-id></nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
