<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMU</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Mhealth Uhealth</journal-id>
      <journal-title>JMIR mHealth and uHealth</journal-title>
      <issn pub-type="epub">2291-5222</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v7i3e11642</article-id>
      <article-id pub-id-type="pmid">30892275</article-id>
      <article-id pub-id-type="doi">10.2196/11642</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Mobile Health Systems for Community-Based Primary Care: Identifying Controls and Mitigating Privacy Threats</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Ruotsalainen</surname>
            <given-names>Pekka</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Mohan</surname>
            <given-names>Diwakar</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="author" id="contrib1" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Iwaya</surname>
            <given-names>Leonardo Horn</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Privacy and Security (PriSec)</institution>
            <institution>Department of Mathematics and Computer Science</institution>
            <institution>Karlstad University</institution>
            <addr-line>Universitetsgatan 2</addr-line>
            <addr-line>Karlstad, 651 88</addr-line>
            <country>Sweden</country>
            <phone>46 709225016</phone>
            <email>leonardo.horn.iwaya@hotmail.com</email>
          </address>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-9005-0543</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib2" equal-contrib="yes">
          <name name-style="western">
            <surname>Fischer-Hübner</surname>
            <given-names>Simone</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-6938-4466</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib3" equal-contrib="yes">
          <name name-style="western">
            <surname>Åhlfeldt</surname>
            <given-names>Rose-Mharie</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-8607-948X</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib4" equal-contrib="yes">
          <name name-style="western">
            <surname>Martucci</surname>
            <given-names>Leonardo A</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-9980-3473</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
      <label>1</label>
      <institution>Privacy and Security (PriSec)</institution>
      <institution>Department of Mathematics and Computer Science</institution>  
      <institution>Karlstad University</institution>  
      <addr-line>Karlstad</addr-line>
      <country>Sweden</country></aff>
      <aff id="aff2">
      <label>2</label>
      <institution>School of Informatics</institution>
      <institution>University of Skövde</institution>  
      <addr-line>Skövde</addr-line>
      <country>Sweden</country></aff>
      <author-notes>
        <corresp>Corresponding Author: Leonardo Horn Iwaya 
        <email>leonardo.horn.iwaya@hotmail.com</email></corresp>
      </author-notes>
      <pub-date pub-type="collection"><month>03</month><year>2019</year></pub-date>
      <pub-date pub-type="epub">
        <day>20</day>
        <month>03</month>
        <year>2019</year>
      </pub-date>
      <volume>7</volume>
      <issue>3</issue>
      <elocation-id>e11642</elocation-id>
      <!--history from ojs - api-xml-->
      <history>
        <date date-type="received">
          <day>20</day>
          <month>7</month>
          <year>2018</year>
        </date>
        <date date-type="rev-request">
          <day>8</day>
          <month>10</month>
          <year>2018</year>
        </date>
        <date date-type="rev-recd">
          <day>2</day>
          <month>12</month>
          <year>2018</year>
        </date>
        <date date-type="accepted">
          <day>31</day>
          <month>12</month>
          <year>2018</year>
        </date>
      </history>
      <copyright-statement>©Leonardo Horn Iwaya, Simone Fischer-Hübner, Rose-Mharie Åhlfeldt, Leonardo A Martucci. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 20.03.2019.</copyright-statement>
      <copyright-year>2019</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR mhealth and uhealth, is properly cited. The complete bibliographic information, a link to the original publication on http://mhealth.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="http://mhealth.jmir.org/2019/3/e11642/" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Community-based primary care focuses on health promotion, awareness raising, and illnesses treatment and prevention in individuals, groups, and communities. Community Health Workers (CHWs) are the leading actors in such programs, helping to bridge the gap between the population and the health system. Many mobile health (mHealth) initiatives have been undertaken to empower CHWs and improve the data collection process in the primary care, replacing archaic paper-based approaches. A special category of mHealth apps, known as mHealth Data Collection Systems (MDCSs), is often used for such tasks. These systems process highly sensitive personal health data of entire communities so that a careful consideration about privacy is paramount for any successful deployment. However, the mHealth literature still lacks methodologically rigorous analyses for privacy and data protection.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>In this paper, a Privacy Impact Assessment (PIA) for MDCSs is presented, providing a systematic identification and evaluation of potential privacy risks, particularly emphasizing controls and mitigation strategies to handle negative privacy impacts.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>The privacy analysis follows a systematic methodology for PIAs. As a case study, we adopt the GeoHealth system, a large-scale MDCS used by CHWs in the Family Health Strategy, the Brazilian program for delivering community-based primary care. All the PIA steps were taken on the basis of discussions among the researchers (privacy and security experts). The identification of threats and controls was decided particularly on the basis of literature reviews and working group meetings among the group. Moreover, we also received feedback from specialists in primary care and software developers of other similar MDCSs in Brazil.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>The GeoHealth PIA is based on 8 Privacy Principles and 26 Privacy Targets derived from the European General Data Protection Regulation. Associated with that, 22 threat groups with a total of 97 subthreats and 41 recommended controls were identified. Among the main findings, we observed that privacy principles can be enhanced on existing MDCSs with controls for managing consent, transparency, intervenability, and data minimization.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Although there has been significant research that deals with data security issues, attention to privacy in its multiple dimensions is still lacking for MDCSs in general. New systems have the opportunity to incorporate privacy and data protection by design. Existing systems will have to address their privacy issues to comply with new and upcoming data protection regulations. However, further research is still needed to identify feasible and cost-effective solutions.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>mobile health</kwd>
        <kwd>mHealth</kwd>
        <kwd>data security</kwd>
        <kwd>privacy</kwd>
        <kwd>data protection</kwd>
        <kwd>privacy impact assessment</kwd>
        <kwd>public health</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Mobile health (mHealth) apps for <italic>health surveys and surveillance</italic> play a crucial role in creating rich data repositories for public health decision-making [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. Apps for health surveys are usually known as mHealth Data Collection Systems (MDCSs), used by Community Health Workers (CHWs), replacing less efficient and less reliable paper-based approaches [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref4">4</xref>]. The CHWs’ main task is to visit families at their homes to provide primary care, but they also carry out surveys, collect the family’s data, and report it to the government. Instead of using paper forms, the CHWs can now use smartphones or tablets for the data collection process.</p>
        <p>It is a problem that although mHealth initiatives are developed with a positive and optimistic outlook, there is often little concern for the privacy implications of the app [<xref ref-type="bibr" rid="ref5">5</xref>]. The existing solutions do not carefully consider privacy and it remains unclear how to deal with the issues inherent to systems of health surveillance. MDCSs are used to collect, process, and share sensitive data (ie, personal health data), making <italic>privacy and security</italic> of paramount importance.</p>
        <p>In recent years, much research has focused on the information security aspects of MDCSs [<xref ref-type="bibr" rid="ref6">6</xref>-<xref ref-type="bibr" rid="ref9">9</xref>], that is, dealing with the concepts of confidentiality, integrity, and availability, which are commonly addressed by means of security mechanisms for encryption, authentication, secure storage, and access control. Privacy, in turn, stands for the respect of fundamental rights and freedoms of individuals with regard to the processing of personal data. It overlaps with security, especially regarding confidentiality, but many other privacy principles should be addressed (eg, purpose binding, transparency, data minimization, unlikability, intervenability, accountability, and consent)—fundamental differences that are further discussed in this paper. It means that although privacy-preserving systems require strong security, security by itself is not enough.</p>
        <p>There are many reasons for enforcing privacy in the primary care context. Privacy is <italic>sine qua non</italic> for achieving high-quality health care [<xref ref-type="bibr" rid="ref10">10</xref>]. Personal data are collected, processed, and shared in the delivering of health services. Patients (ie, the data subjects) want their information to be used for meaningful purposes, and they want to provide personal data access to health workers so that they can receive proper care. If privacy is not enforced, patients may refrain using the service and/or hold back information, thus preventing health care workers from providing efficient and effective care. The result is inferior quality of health care.</p>
        <p>MDCSs are inherently mass surveillance tools. Health care workers may have access to health data of entire communities, so that the privacy impact is amplified. There is a great power imbalance between individuals and the health agencies. Members of underserved communities, typically with less power, face greater risk because of privacy violations [<xref ref-type="bibr" rid="ref11">11</xref>]. Therefore, it is important to follow <italic>privacy principles</italic> during the design of such systems. Privacy principles have been vastly discussed in the scientific literature and embodied in legal frameworks in various jurisdictions, for example, European General Data Protection Regulation (EU GDPR) [<xref ref-type="bibr" rid="ref12">12</xref>] and the Brazilian general Bill on the Protection of Personal Data (PLC 53/2018) [<xref ref-type="bibr" rid="ref13">13</xref>]. Legal frameworks entail compliance, and thus project managers and developers should be prepared to follow such regulations.</p>
        <p>Given that, our main research question is the following: <italic>How to design a privacy-aware and secure MDCS?</italic> To answer this question, a Privacy Impact Assessment (PIA) framework is chosen as a strategy for realizing privacy by design. [PIA] <italic>is a systematic process that identifies and evaluates, from the perspectives of all stakeholders, the potential effects on privacy of a project, initiative or proposed system or scheme, and includes a search for ways to avoid or mitigate negative privacy impacts</italic> [<xref ref-type="bibr" rid="ref14">14</xref>]. PIA comes from the notion of <italic>impact assessment</italic>, defined as <italic>the identification of future consequences of a current or proposed action</italic> [<xref ref-type="bibr" rid="ref15">15</xref>]. PIAs support a stricter analysis of privacy risks, that is, <italic>effect of uncertainty on privacy</italic> [<xref ref-type="bibr" rid="ref16">16</xref>]. Each stage of the PIA process builds up on each other, offering not only the risk assessment but also a solid strategy for risk management regarding privacy. In this paper, a PIA is presented using the GeoHealth MDCS [<xref ref-type="bibr" rid="ref3">3</xref>] as a case study to ground our analysis. As our methodology, the PIA framework proposed by Oetzel et al [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref18">18</xref>] is adopted in this study.</p>
        <p>As a result, this paper brings the following contributions: (1) it provides a comprehensive privacy analysis for an MDCS, identifying threats and controls that help project managers and developers solve privacy and data protection issues in their systems, and (2) it shares the experience on how to carry out a PIA for a large-scale mHealth system, as advocated in previous studies [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref19">19</xref>], and it can be seen as an example to other mHealth initiatives. To the best of our knowledge, this is the first thorough privacy analysis for an MDCS. In fact, most mHealth systems neither mention nor appropriately discuss security issues in their systems [<xref ref-type="bibr" rid="ref20">20</xref>], including privacy.</p>
      </sec>
      <sec>
        <title>Previous Work</title>
        <p>This section presents an overview of the previous work in regard to (1) MDCSs, (2) PIA frameworks, and (3) security and privacy of MDCSs. In the sections that follow, various contributions in the area that precedes the current research are described.</p>
      </sec>
      <sec>
        <title>Mobile Health Data Collection Systems Worldwide and in Brazil</title>
        <p>Initiatives for replacing paper-based solutions by MDCSs have been increasingly and especially adopted in developing countries [<xref ref-type="bibr" rid="ref21">21</xref>]. A more recent example is MoTeCH [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>], employed in Ghana, which empowers nurses and CHWs with a simple mobile app for recording and tracking the care delivered to women and newborns, and it generates management reports mandated by the country’s health authorities. There are also standardized, general purpose tools that help in the task of designing forms and sending them to mobile devices, such as the Magpi framework [<xref ref-type="bibr" rid="ref24">24</xref>] and the Open Data Kit [<xref ref-type="bibr" rid="ref25">25</xref>]. Moreover, the World Health Organization together with a group of academic and research institutions and technology partners is developing the Open Smart Register Platform [<xref ref-type="bibr" rid="ref26">26</xref>], which has been used to empower frontline health workers to electronically register and track the health of their entire client population.</p>
        <p>Similarly, many MDCSs have been developed and tested in Brazil. Given the importance of Brazil’s Family Health Strategy (FHS) program for community-based primary care [<xref ref-type="bibr" rid="ref27">27</xref>], it is natural that various MDCSs focus on the data gathering for the Health Information System for Primary Care (SISAB) database. FHS is one of the most important programs of the Brazilian public health service, <italic>Sistema Único de Saúde</italic>. In the past, the research on MDCSs was mainly developed by research groups inside universities, as it was the case with projects Borboleta [<xref ref-type="bibr" rid="ref28">28</xref>] and GeoHealth [<xref ref-type="bibr" rid="ref3">3</xref>].</p>
        <p>In this paper, the privacy analysis is particularly grounded on the GeoHealth system. GeoHealth has been targeted in various scientific publications over the years, including work about the design process [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref29">29</xref>], large-scale deployment [<xref ref-type="bibr" rid="ref3">3</xref>], and CHWs’ experience with the technology [<xref ref-type="bibr" rid="ref4">4</xref>], which enables us to perform the PIA on the basis of published material, as well as previous first-hand experience with the system.</p>
      </sec>
      <sec>
        <title>Privacy Impact Assessment Frameworks</title>
        <p>Many PIA frameworks exist. Some are recommended to a specific jurisdiction and legal framework, whereas others aim for a specific industry sector or for a general methodology. The PIA for Radio Frequency Identification (known as PIA RFID) [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref30">30</xref>] and PIA Smart Grids [<xref ref-type="bibr" rid="ref31">31</xref>] are examples of sector-specific frameworks. However, the PIA RFID was later generalized in a systematic methodology [<xref ref-type="bibr" rid="ref17">17</xref>] and it is no longer limited to RFID applications. Other well-known PIA frameworks were proposed by data protection authorities in various countries, such as the British Information Commissioner’s Office (ICO) PIA [<xref ref-type="bibr" rid="ref32">32</xref>], the Australian Office of the Australian Information Commissioner’s (OAIC) PIA [<xref ref-type="bibr" rid="ref33">33</xref>], and the French Commission nationale de l'informatique et des libertés’ (CNIL) PIA [<xref ref-type="bibr" rid="ref34">34</xref>].</p>
        <p>More recently, International Organization for Standardization/International Electrotechnical Commission released a standard for PIAs numbered ISO/IEC 29134:2017 [<xref ref-type="bibr" rid="ref35">35</xref>]. This PIA framework offers as sound methodology with well-defined privacy principles (ISO/IEC 29100), risk identification and evaluation (ISO/IEC 31000 and ISO/IEC 29134), and privacy controls (ISO/IEC 27001 and ISO/IEC 29151). However, it is worth mentioning, that at the ISO/IEC, standards, for example, ISO/IEC 29134 and ISO/IEC 29151, had only been published when this study was already well underway, so they were not chosen as main PIA framework.</p>
        <p>In recent years, the systematic PIA methodology [<xref ref-type="bibr" rid="ref17">17</xref>] also gained more maturity and was endorsed by the Article 29 Data Protection Working Party [<xref ref-type="bibr" rid="ref36">36</xref>], leading to its adoption for GeoHealth’s PIA. Furthermore, the PIA RFID framework not only provides a robust methodology but it is also accompanied with extensive supplementary material [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref30">30</xref>], openly published and freely accessible since 2011. As far as possible, a parallel among existing PIA frameworks is drawn throughout the paper, given that methods from different PIA frameworks can be combined to better suit the analysis.</p>
      </sec>
      <sec>
        <title>Security and Privacy of Mobile Health Data Collection Systems</title>
        <p>Issues regarding <italic>information security</italic> in MDCSs (ie, confidentiality, integrity, and availability) have already been addressed by different authors. For instance, in a study by Cobb et al [<xref ref-type="bibr" rid="ref9">9</xref>], a range of security threats to MDCSs, that is, Open Data Kit [<xref ref-type="bibr" rid="ref37">37</xref>], have been identified. In the study [<xref ref-type="bibr" rid="ref9">9</xref>], the authors detailed a threat modeling exercise on the basis of surveys and interviews with technology experts. Other examples on information security are the works of Gejibo at al [<xref ref-type="bibr" rid="ref7">7</xref>] and Simplício et al [<xref ref-type="bibr" rid="ref8">8</xref>] that propose 2 distinct security frameworks for MDCSs. These frameworks are designed to cope with the networking and processing constraints that are inherent to mobile computing. However, both frameworks considerably converge to the same security issues identified in the study by Cobb et al [<xref ref-type="bibr" rid="ref9">9</xref>].</p>
        <p>In addition, regarding mHealth privacy in general, the work of Avancha et al [<xref ref-type="bibr" rid="ref6">6</xref>] proposes <italic>threat taxonomy</italic> that organizes threats into 3 categories: (1) identity threats, (2) access threats, and (3) disclosure threats. However, privacy is addressed in the study [<xref ref-type="bibr" rid="ref6">6</xref>] in a rather narrow way. The taxonomy is composed by privacy-related threats, but it essentially overlaps with classical security properties (ie, threats to confidentiality, integrity, and availability). Therefore, if privacy should be considered in a broader dimension, the mHealth threat taxonomy [<xref ref-type="bibr" rid="ref6">6</xref>] does not contemplate many important Privacy Principles (such as the ones listed in the section “Definition of Privacy Targets”).</p>
        <p>Finally, this paper also expands our previous work on GeoHealth’s privacy threat analysis presented in a study by Iwaya et al [<xref ref-type="bibr" rid="ref38">38</xref>]. On the basis of that, controls are identified and recommended in this paper to mitigate the previously identified threats. In addition, an extensive documentation is provided, enabling research reproducibility of GeoHealth’s PIA and therefore contributing to bridge the knowledge gap between mHealth practitioners and privacy engineers.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <p>This privacy threat analysis follows the PIA framework defined by Oetzel and Spiekermann [<xref ref-type="bibr" rid="ref17">17</xref>]. In brief, this PIA framework supports project managers and developers to integrate privacy by design in their system development life cycle. The methodology comprises 7 steps, as shown in <xref ref-type="fig" rid="figure1">Figure 1</xref>.</p>
      <p>Starting with the system characterization in Step 1, the Brazilian GeoHealth MDCS [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref4">4</xref>] is analyzed in the context of previous work on similar solutions [<xref ref-type="bibr" rid="ref7">7</xref>].</p>
      <fig id="figure1" position="float">
        <label>Figure 1</label>
        <caption>
          <p>Privacy Impact Assessment (PIA) methodology overview.</p>
        </caption>
        <graphic xlink:href="mhealth_v7i3e11642_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
      <p>In Step 2, the Privacy Principles and Privacy Targets are defined on the basis of a legal framework. This PIA follows the EU GDPR [<xref ref-type="bibr" rid="ref12">12</xref>] (enacted in May 2018). This choice is based on 2 reasons: (1) scientifically, the EU GDPR can be considered as state of the art in privacy regulations, and it can be also mapped to the work “A Taxonomy of Privacy [<xref ref-type="bibr" rid="ref39">39</xref>],” regarded as <italic>“the most complete list of privacy threats</italic> [<xref ref-type="bibr" rid="ref17">17</xref>].” (2) The current draft of the Brazilian data protection regulation, in a broad way, is akin to the EU GDPR. Even though the health and medical fields often have their own privacy-related regulations, GDPR compliance addresses the privacy problems to a great extent.</p>
      <p>In Step 3, the Privacy Targets are evaluated using a degree of protection demand, similar to an impact level (eg, low, medium, and high). During the threat analysis in Step 4, stakeholders identify threats associated to each of the Privacy Targets. All threats are addressed in Step 5 with respective technical and/or nontechnical control measures; residual risk is analyzed, and an implementation plan is specified.</p>
      <p>In Step 6, the plan for implementing controls and the remaining residual risk is documented. However, given that GeoHealth has been discontinued and controls cannot be implemented, this step is not performed. For this reason, this PIA can be considered as an <italic>after-the-fact</italic> review, which is still helpful to mHealth practitioners, who might not be particularly keen to publish in-depth public PIA reports about on-going deployments.</p>
      <p>As a final outcome of Step 7, this paper can be considered as a “PIA Report” describing the whole analysis, with emphasis on Step 5, “Identification and Recommendation of Controls.” Nonetheless, extensive documentation generated during the PIA process for Steps 1 to 4 is also provided in the form of Appendices.</p>
      <p>GeoHealth’s PIA was carried out by our group of researchers with expertise in information security, privacy, and health informatics. Particularly for Steps 3 to 5, the working group meetings were based on evidence from the scientific literature (presented in Section 1). Moreover, 1 of the members participated in the design and development of GeoHealth. Contributions from software developers of other MDCSs as well as specialists in public health and primary care were also received. During the interaction with partners, feedback on our reports and documentation were collected, so that the analysis could be refined.</p>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <p>This section describes the intermediate results of the PIA process. As explained, Step 5, “Identification and Recommendation of existing or new Controls,” is emphasized in this paper to offer the reader a minimum background. The preceding Steps 1 to 4 are nonetheless summarized, and complete documentation is provided in <xref ref-type="app" rid="app1">Multimedia Appendices 1</xref> to <xref ref-type="app" rid="app4">4</xref>.</p>
      <sec>
        <title>Characterization of the System</title>
        <p>GeoHealth is an MDCS tailored for Brazil’s FHS program. It is composed by the GeoHealth-Mobile and the GeoHealth-Web. At the client side, the GeoHealth-Mobile is the Android app that implements all forms used for data collection. At the server side, the GeoHealth-Web implements Web services for receiving and consolidating data as well as for generating reports and exporting data to the national-level system (ie, SISAB/Department of Informatics of the Unified Health System). <xref ref-type="fig" rid="figure2">Figure 2</xref> presents the system architecture, main actors (CHWs, families, physicians, and health managers), and system components.</p>
        <p>The GeoHealth has been the target of many studies over the last years, so that further information can be found in the original material [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref29">29</xref>], as well as in a comprehensive description in <xref ref-type="app" rid="app1">Multimedia Appendix 1</xref> [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref41">41</xref>]. For the readers’ convenience, the data flow diagram presented in <xref ref-type="fig" rid="figure3">Figure 3</xref> shows how personal information is handled by the different subprocesses.</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Overview of the GeoHealth actors and their interaction with the system’s components.</p>
          </caption>
          <graphic xlink:href="mhealth_v7i3e11642_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>High-level data flow diagram of the GeoHealth environment. Acronyms: Personally Identifiable Information (PII); Basic Health Unit(BHU); Health Information System for Primary Care (SISAB); Department of Informatics of the Unified Health System (DATASUS).</p>
          </caption>
          <graphic xlink:href="mhealth_v7i3e11642_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Definition of Privacy Targets</title>
        <p>After the system characterization, the next step is to determine the privacy principles that will be the basis of the design of our system. In the study by Oetzel and Spiekermann [<xref ref-type="bibr" rid="ref17">17</xref>], the authors distinguish between <italic>privacy principles</italic> and <italic>privacy targets</italic>. Both terms were not explicitly defined, but privacy principles can be considered as a fundamental, primary, or general rule derived from the existing legal frameworks [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. However, as explained by the study [<xref ref-type="bibr" rid="ref17">17</xref>], these legal privacy principles must be translated into concrete, auditable, and functionally enforceable Privacy Targets and subsequent system functions. Furthermore, Privacy Targets should be formulated as action items, just like in widely accepted modeling techniques such as Unified Modeling Language and Architecture of Integrated Information Systems.</p>
        <p><xref ref-type="boxed-text" rid="box1">Textbox 1</xref> presents a list of privacy principles and respective Privacy Targets derived from the European General Data Protection Regulation and originally conceived by Oetzel and Spiekermann [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref38">38</xref>]. Although this list was used as a baseline for this PIA, all Privacy Targets were reviewed in terms of applicability, meaning, and exhaustiveness in the context of GeoHealth. As a result of this revision, the principle <italic>P5-Intervenability</italic> was added and the targets that were previously listed under <italic>P4 - Access Right of Data Subject</italic> were moved to this new category (ie, P5.1, P5.2, and P5.3). Thus, now there is a clear distinction between data subject access (transparency) and intervenability. Furthermore, new Privacy Targets P4.2 and P5.4 were proposed and added to the list.</p>
        <boxed-text id="box1" position="float">
          <title>List of Privacy Principles and Privacy Targets.</title>
          <p>P1-Quality of data processing</p>
          <list list-type="bullet">
            <list-item>
              <p>P1.1 - Ensuring processing in a lawful, fair, and transparent manner</p>
            </list-item>
            <list-item>
              <p>P1.2 - Ensuring processing only for legitimate purposes</p>
            </list-item>
            <list-item>
              <p>P1.3 - Providing purpose specification</p>
            </list-item>
            <list-item>
              <p>P1.4 - Ensuring limited processing for specified purpose</p>
            </list-item>
            <list-item>
              <p>P1.5 - Ensuring data avoidance</p>
            </list-item>
            <list-item>
              <p>P1.6 - Ensuring data minimization</p>
            </list-item>
            <list-item>
              <p>P1.7 - Ensuring data quality, accuracy, and integrity</p>
            </list-item>
            <list-item>
              <p>P1.8 - Ensuring limited storage</p>
            </list-item>
          </list>
          <p>P2-Processing lawfulness (and informed consent)</p>
          <list list-type="bullet">
            <list-item>
              <p>P2.1 - Ensuring legitimacy of personal data processing</p>
            </list-item>
            <list-item>
              <p>P2.2 - Ensuring legitimacy of sensitive personal data processing</p>
            </list-item>
          </list>
          <p>P3-Information right of data subject (ex ante transparency)</p>
          <list list-type="bullet">
            <list-item>
              <p>P3.1 - Providing adequate information in cases of direct collection of data from the data subject</p>
            </list-item>
            <list-item>
              <p>P3.2 - Providing adequate information where data has not been obtained directly from the data subject (eg, from third parties)</p>
            </list-item>
          </list>
          <p>P4-Access right of data subject (ex post transparency)</p>
          <list list-type="bullet">
            <list-item>
              <p>P4.1 - Facilitating the provision of information about processed data and purpose</p>
            </list-item>
            <list-item>
              <p>P4.2 - Facilitating the provision of an (electronic) copy of data</p>
            </list-item>
          </list>
          <p>P5-Intervenability</p>
          <list list-type="bullet">
            <list-item>
              <p>P5.1 - Facilitating the rectification, erasure, or blocking of data</p>
            </list-item>
            <list-item>
              <p>P5.2 - Facilitating the portability of data</p>
            </list-item>
            <list-item>
              <p>P5.3 - Facilitating the notification to third parties about rectification, erasure, and blocking of data</p>
            </list-item>
            <list-item>
              <p>P5.4 - Providing the ability to withdraw consent</p>
            </list-item>
          </list>
          <p>P6-Data subject’s right to object</p>
          <list list-type="bullet">
            <list-item>
              <p>P6.1 - Facilitating the objection to the processing of personal data</p>
            </list-item>
            <list-item>
              <p>P6.2 - Facilitating the objection to direct marketing activities</p>
            </list-item>
            <list-item>
              <p>P6.3 - Facilitating the objection to disclosure of data to third parties</p>
            </list-item>
            <list-item>
              <p>P6.4 - Facilitating the objection to decisions that are solely based on automated processing of data</p>
            </list-item>
            <list-item>
              <p>P6.5 - Facilitating the data subject’s right to dispute the correctness of machine conclusions</p>
            </list-item>
          </list>
          <p>P7-Security of processing</p>
          <list list-type="bullet">
            <list-item>
              <p>P7.1 - Ensuring the confidentiality, integrity, and availability of personal data storage, processing, and transmission</p>
            </list-item>
            <list-item>
              <p>P7.2 - Ensuring the detection of personal data breaches and their communication to data subjects</p>
            </list-item>
          </list>
          <p>P8-Accountability</p>
          <list list-type="bullet">
            <list-item>
              <p>P8.1 - Ensuring the accountability of personal data storage, processing, and transmission</p>
            </list-item>
          </list>
        </boxed-text>
      </sec>
      <sec>
        <title>Evaluation of the Degree of Protection Demand for Each Privacy Target</title>
        <p>Each of the listed Privacy Targets was put in context and further evaluated. In this step of the PIA, Privacy Targets were ranked and priorities for the GeoHealth’s privacy architecture were identified. To determine the right level of protection that each Privacy Target demands, a potential damage scenario had to be considered, that is, using the <italic>“feared events”</italic> technique by asking, <italic>“What would happen if...?”</italic> Every Privacy Target was challenged by its potential damage in case of noncompliance. Furthermore, the damage had to be considered from 2 perspectives: the system operator (eg, loss of reputation and financial penalties) and its customer (eg, social embarrassment, financial losses, and jeopardize personal freedom).</p>
        <p>A qualitative approach is used because privacy breaches are often “softer” or intangible (eg, hurt feelings, discredit, blackmail, and even death) rather than something with a specific monetary value (eg, a computer system or asset). Being qualitative is a major difference of the PIA methodology when compared with more quantitative asset-driven evaluations for security assessments. That is, assets such as data, software, and hardware are easier to quantify, such as loss and cost, whereas reputation, embarrassment, and harm to people’s rights and freedoms are not. This part of the PIA process is detailed in <xref ref-type="app" rid="app2">Multimedia Appendix 2</xref>.</p>
      </sec>
      <sec>
        <title>Identification of Threats for Each Privacy Target</title>
        <p>For each Privacy Target, the threats that could impede us from achieving each target are systematically identified. A threat is essentially a noncompliance with the relevant privacy laws and standards that emerge from multiple sources, such as the lack of training and privacy awareness, inappropriate use, privacy-preserving technologies, or absence of privacy management and governance practices [<xref ref-type="bibr" rid="ref17">17</xref>].</p>
        <p>The identification of privacy threats for GeoHealth was presented as part of our previous work [<xref ref-type="bibr" rid="ref38">38</xref>]. Further details can be also found in <xref ref-type="app" rid="app3">Multimedia Appendix 3</xref>. In summary, this threat analysis was built upon existing threats analyses for mHealth in general [<xref ref-type="bibr" rid="ref6">6</xref>] or specifically for MDCSs [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref9">9</xref>], as well as privacy threats (for RFID) found in the study by Oetzel et al [<xref ref-type="bibr" rid="ref18">18</xref>]. Thus, this threat analysis is not only based on the assessment of privacy experts but also on existing scientific literature, from which threats were reviewed and compiled.</p>
        <p>As a result, 22 groups of threats and a total of 97 subthreats are identified. Threats can range greatly, jeopardizing principles such as data quality, processing legitimacy, informed consent, right to information, right to access, right to object, data security, and accountability. The threats were also classified as “likely” (n=86) or “unlikely” (n=11) to happen, enabling us to assertively assign controls.</p>
      </sec>
      <sec>
        <title>Identification and Recommendation of Controls to Protect Against Threats</title>
        <p>As a point of departure, a list of possible controls presented in a study by Oetzel et al [<xref ref-type="bibr" rid="ref30">30</xref>] is used, combined with the security controls proposed in previous studies [<xref ref-type="bibr" rid="ref7">7</xref>-<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref43">43</xref>]. The final list is composed by 41 recommended controls (<xref ref-type="table" rid="table1">Table 1</xref>, further details in <xref ref-type="app" rid="app4">Multimedia Appendix 4</xref>) to cope with the identified privacy threats. According to the methodology, each control has up to 3 levels of rigor: (1) satisfactory, (2) strong, and (3) very strong. During the process of assigning controls for each threat, a level of rigor is also chosen, defining how extensive the control should be, which is likely costlier and more difficult. The level of rigor should match the previously defined level of protection demand determined in the section “Evaluation of Degree of Protection Demand for each Privacy Target.” However, for the GeoHealth case study, all the threats are linked to at least one or more Privacy Targets with a “high” level of protection demand. Therefore, all controls in the consolidate list only need to be described for a “very strong” level of rigor (see <xref ref-type="app" rid="app4">Multimedia Appendix 4</xref>). <xref ref-type="table" rid="table2">Table 2</xref> shows the association of controls to the identified threats.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Consolidated list of controls. The detailed description of all controls can be found in <xref ref-type="app" rid="app4">Multimedia Appendix 4</xref>.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="800"/>
            <col width="200"/>
            <thead>
              <tr valign="top">
                <td>Control codes and short descriptions</td>
                <td>Done?</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>C1.1 Service description</td>
                <td>—<sup>a</sup></td>
              </tr>
              <tr valign="top">
                <td>C1.2 Information accessibility</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C1.3 Language/semantics of information</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C1.4 Information timeliness</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C1.5 Privacy statement</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C1.7 Purpose specification</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C1.8 Ensuring limited data processing</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C1.9 Ensuring purpose related processing</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C1.10 Ensuring data minimization</td>
                <td>Partly</td>
              </tr>
              <tr valign="top">
                <td>C1.12 Ensuring personal data quality</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>C1.14 Ensuring data accuracy</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>C1.15 Enabling data deletion</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C3.1 Obtaining data subjects’ explicit consent</td>
                <td>Partly</td>
              </tr>
              <tr valign="top">
                <td>C4.1 Providing data processing information</td>
                <td>Partly</td>
              </tr>
              <tr valign="top">
                <td>C4.2 Providing information on third party information processing</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C5.1 Informing data subjects about data processing</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C5.3 Handling data subjects change requests</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C5.4 Providing data export functionality</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C5.5 Handling exemptions and derogations</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C6.1 Notifying data subjects about sharing practices</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C6.2 Handling objections (to automated decisions)</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C7.1 Ensuring data subject authentication</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C7.2 Ensuring staff authentication</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>C7.3 Ensuring device authentication</td>
                <td>Partly</td>
              </tr>
              <tr valign="top">
                <td>C7.4 Providing usable authentication</td>
                <td>Partly</td>
              </tr>
              <tr valign="top">
                <td>C7.5 Logging access to personal data</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>C7.6 Performing regular privacy audits</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C7.7 Ensuring data anonymization</td>
                <td>Partly</td>
              </tr>
              <tr valign="top">
                <td>C7.8 Providing confidential communication</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>C7.9 Providing usable access control</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C7.10 Ensuring secure storage</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>C7.11 Ensuring physical security of infrastructure</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C7.12 Providing locked down devices</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>C7.13 Providing memory wipe</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C7.14 Enabling offline authentication</td>
                <td>Yes</td>
              </tr>
              <tr valign="top">
                <td>C7.15 Network monitoring</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C7.16 Preventing denial-of-service attacks</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C7.17 Handling security incidents</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C8.1 Demonstrate data privacy accountability</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C8.2 Notification of authority</td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>C8.3 Notification of data subjects</td>
                <td>—</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>The control was not implemented.</p>
            </fn>
            
           
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Threat groups and associated controls. The detailed description of all subthreats can be found in <xref ref-type="app" rid="app3">Multimedia Appendix 3</xref>.</p>
          </caption>
          <table width="1000" cellpadding="7" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="100"/>
            <col width="600"/>
            <col width="300"/>
            <thead>
              <tr valign="top">
                <td>Threat Group</td>
                <td>Description</td>
                <td>Controls</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>T1.1-T1.5</td>
                <td>Lack of transparency, missing or insufficient service information</td>
                <td>C1.1, C1.2, C1.3, C1.4, and C6.2</td>
              </tr>
              <tr valign="top">
                <td>T1.6-T1.10</td>
                <td>Lack of transparency, missing or insufficient privacy statement</td>
                <td>C1.5</td>
              </tr>
              <tr valign="top">
                <td>T1.11-T1.18</td>
                <td>Unspecified and unlimited purpose</td>
                <td>C1.7, C1.8, C1.9, and C1.10</td>
              </tr>
              <tr valign="top">
                <td>T1.19-T1.24</td>
                <td>Collection and/or combination of data exceeding purpose</td>
                <td>C1.8, C1.9, and C1.10</td>
              </tr>
              <tr valign="top">
                <td>T1.25-T1.30</td>
                <td>Missing quality assurance of data</td>
                <td>C1.12, C1.14, and C7.1</td>
              </tr>
              <tr valign="top">
                <td>T1.31-T1.34</td>
                <td>Unlimited data storage</td>
                <td>C1.15 and C1.10</td>
              </tr>
              <tr valign="top">
                <td>T2.1-T2.8</td>
                <td>Invalidation or nonexistence of consent</td>
                <td>C3.1 and C5.5</td>
              </tr>
              <tr valign="top">
                <td>T3.1-T3.5</td>
                <td>No or insufficient information concerning collection of data from the data subject</td>
                <td>C4.1, C4.2, and C5.1</td>
              </tr>
              <tr valign="top">
                <td>T4.1-T4.4</td>
                <td>Inability to provide individualized information about processed data and purpose</td>
                <td>C5.1, C7.1, and C7.5</td>
              </tr>
              <tr valign="top">
                <td>T5.1-T5.6</td>
                <td>Inability to rectify, erase, or block individual data</td>
                <td>C1.15, C5.3, C7.1, C7.5, and</td>
              </tr>
              <tr valign="top">
                <td>T5.7</td>
                <td>Inability to notify third parties about rectification, erasure and blocking of individual data</td>
                <td>C5.3</td>
              </tr>
              <tr valign="top">
                <td>T5.8-T5.10</td>
                <td>Inability to support data portability for individual data</td>
                <td>C5.4</td>
              </tr>
              <tr valign="top">
                <td>T6.1</td>
                <td>Inability to allow objection to the processing of personal data</td>
                <td>C6.1 and C6.2</td>
              </tr>
              <tr valign="top">
                <td>T6.2-T6.5</td>
                <td>Inability to allow objection to the disclosure of data to third parties</td>
                <td>C4.2, C6.1, and C6.2</td>
              </tr>
              <tr valign="top">
                <td>T6.6</td>
                <td>Inability to allow objection to being subject to decisions that are solely based on automated processing of data</td>
                <td>C6.2</td>
              </tr>
              <tr valign="top">
                <td>T7.1-T7.3</td>
                <td>Identity threats, misuse and leakage of data subject identities [<xref ref-type="bibr" rid="ref21">21</xref>]</td>
                <td>C7.1, C7.5, C7.6, C7.7, and C7.8</td>
              </tr>
              <tr valign="top">
                <td>T7.4-T7.11</td>
                <td>Access threats, unauthorized access and modification of PHI<sup>a</sup> or PHR<sup>b</sup> [<xref ref-type="bibr" rid="ref21">21</xref>]</td>
                <td>C5.5, C7.2, C7.5, C7.6, C7.9, C7.10, and C7.11</td>
              </tr>
              <tr valign="top">
                <td>T7.12-T7.19</td>
                <td>Disclosure threats, unauthorised disclosure and data leaks of PII<sup>c</sup> and PHI [<xref ref-type="bibr" rid="ref21">21</xref>]</td>
                <td>C7.2, C7.3, C7.4, C7.5, C7.6, C7.8, C7.10, C7.12, and C7.13</td>
              </tr>
              <tr valign="top">
                <td>T7.20-T7.21</td>
                <td>Denial-of-service threats [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref24">24</xref>]</td>
                <td>C7.3, C7.10, C7.14, C7.15, and C7.16</td>
              </tr>
              <tr valign="top">
                <td>T7.22-T7.24</td>
                <td>Inability to detect personal data breaches and communicate them to data subjects</td>
                <td>C7.5, C7.6, C7.17, C8.2, and C8.3</td>
              </tr>
              <tr valign="top">
                <td>T8.1-T8.2</td>
                <td>Lack of accountability of personal data storage, processing, and transmission</td>
                <td>C7.6, C8.1, and C8.4</td>
              </tr>
              <tr valign="top">
                <td>T8.3-T8.6</td>
                <td>Noncompliance with notification requirements</td>
                <td>C8.2 and C8.4</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>PHI: protected health information.</p>
            </fn>
            <fn id="table2fn2">
              <p><sup>b</sup>PHR: personal health record.</p>
            </fn>
            <fn id="table2fn3">
              <p><sup>c</sup>PII: personally identifiable information.</p>
            </fn>
            <fn id="table2fn4">
              <p><sup>c</sup>Note that each group of threats has a number of more specific subthreats (eg, T1.1, T1.2, and T1.3). The technical or organizational controls (listed in <xref ref-type="table" rid="table1">Table 1</xref>) can then be associated to 1 or more subthreats.</p>
            </fn>
           
          </table-wrap-foot>
        </table-wrap>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>In summary, GeoHealth’s PIA is based on 8 Privacy Principles and 26 Privacy Targets derived from the EU GDPR. Associated to that, 22 threat groups with a total of 97 subthreats and 41 recommended controls are identified. Thus, offering a sound privacy analysis for a large-scale MDCS.</p>
        <p>This research shows that the literature mostly focuses on the information security issues, solving only a fraction of the problem, that is, (P6) Security of Data. Currently, there is a lack of contributions on how to engineer privacy not only in MDCSs but also for the area of mHealth in general [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref19">19</xref>]. Our PIA helps to bridge this gap by exposing the problems and providing controls (see <xref ref-type="app" rid="app4">Multimedia Appendix 4</xref>). On the basis of this PIA, engineers have a clearer path toward solving the privacy issues and ideally being able to address them at the very early stages of the design process, when changes are often simpler and less costly.</p>
        <p>In addition, the consolidated list of controls, in <xref ref-type="table" rid="table1">Table 1</xref>, also makes it clear that privacy cannot be dealt only with technical measures. In fact, most controls required a mixed approach of technical and organizational procedures that should be put in place to achieve privacy and data protection. One way of doing this is to integrate the organizational procedures related to privacy in an information security management system to facilitate for organizations and make the processes for both information security and privacy more efficient. This could be a task for further research.</p>
        <p>Another important finding from the PIA is that some privacy issues are more challenging, requiring major changes on the existing MDCSs. However, it is not within the scope of a PIA to provide complete solutions to solve such challenges but rather to make them explicit. The main privacy challenges for MDCSs include the following: (1) individualized access to personal data to provide transparency and intervenability, (2) obtaining and handling explicit informed consent from data subjects and allowing consent withdrawal, (3) defining measures to object processing and allow data blocking or deletion, (4) employ security mechanisms, and (5) utilize appropriate anonymization techniques for data sharing. In the sections that follow, the discussion on each of these privacy challenges is expanded.</p>
      </sec>
      <sec>
        <title>Transparency and Intervenability</title>
        <p>Among the main findings, it is noticeable that existing MDCSs particularly fall short with respect to GDPR principles of <italic>transparency and intervenability</italic>, that is, (P1) Quality of Data Processing, (P4) Access Right of Data Subject, and (P5) Intervenability. In brief, MDCSs do not consider the data subjects’ personalized access to their data in electronic form, and in fairness, they were designed to be accessed only by CHWs and medical staff. However, it is worth mentioning that to achieve GDPR compliance, nonelectronic access is sufficient. Nonetheless, as a matter of enhanced privacy by design (and not purely compliance), major redesign is required to add data subjects as system users and to support interaction with a personalized interface (eg, a privacy dashboard), somewhat similar to existing online medical records [<xref ref-type="bibr" rid="ref44">44</xref>]. In this line, MDCSs would benefit from emerging Transparency-Enhancing Tools [<xref ref-type="bibr" rid="ref45">45</xref>] that help to raise privacy awareness among data subjects by allowing them to know about the data that are collected and processed about them and the potential privacy risks (eg, discriminatory profiling, data breaches, and leaks). However, such changes greatly expand the system’s attack surface (ie, a new category of users with access rights) and increase the costs of software development and underlying infrastructure. Therefore, the redesign of MDCSs requires further feasibility studies, especially for projects running in low- and middle-income countries.</p>
      </sec>
      <sec>
        <title>Informed Consent</title>
        <p><italic>Explicit informed consent</italic> (ie, a signed written statement) [<xref ref-type="bibr" rid="ref46">46</xref>] also has some particularities. Consent is a well-known requisite for providing medical treatment. In MDCSs, the consent is given for the processing of personal data. It refers to the data collection, processing, and access rights to the data and for the purpose stated, that is, it is about technologies and systems. Just as importantly, consent revocation needs to be as easily made as giving consent. As CHWs use smartphones for data collection, it is difficult for data subjects to withdraw their consent later, as they do not have direct computer access. Asking to revoke consent via telephone is not an easy solution either, as the data subjects must be properly identified first. There should also be routines for allowing to revoke the consent only for selected purposes (eg, a partial agreement, as there should be opt-in options for each purpose). Existing literature on MDCSs does not discuss opt-ins, but there are guidelines to help project managers [<xref ref-type="bibr" rid="ref46">46</xref>].</p>
        <p>On the other hand, consent is not the only lawful basis for personal data processing. Public health and social care can also rely on legitimate interests and the performance of a public task as justifications for the processing of personal data. However, some MDCSs can also be used for secondary purposes, which should be made optional to data subjects. For instance, linking the data subjects’ personal data to other electronic health records or disclosing it for research and statistics outside the public health sphere. However, there is an immense power asymmetry between the public health system and the individuals. When the majority of the population relies uniquely on the public system, there is never really a free choice. That is, if data subjects are coerced or if there is a threat of disadvantage (eg, no health care) the consent can be rendered invalid.</p>
      </sec>
      <sec>
        <title>Data Objection and Deletion</title>
        <p>Features for <italic>automated data deletion</italic> are also missing in the existing MDCSs. That may be seen as a technicality that is just not explored in the MDCS literature, but it is associated with the well-known right to be forgotten and data minimization principle. For MDCSs, families may also change their address or move to other communities, which would require formal procedures for automated deletion, as well as <italic>data portability</italic> (ie, to send the family’s data to another health unit). Data subjects may also require deletion or blocking of sensitive data that can impact their privacy. More importantly, medical conditions with strong genetic components can disclose information about the patient’s relatives, that is, impacting other people’s privacy. Individual privacy preferences pose challenges for executing data subject rights, as the data may refer to multiple data subjects, who all may have rights by different interest (eg, one may want the data to be deleted whereas the other would like data to be preserved). Routines are needed to handle such disputes and situations. In some cases, it may be possible to pseudonymize the identity of the person that wants his or her data to be deleted (eg, in case of infections), whereas in case of genetic relations, it may not currently be possible.</p>
        <p>However, it is essential to know that medical information related to medical conditions and procedures cannot be deleted even if the data subject requests, that is, with respect to legal aspects of medical records alterations. Instead, because this is sensitive information, the protection mechanisms are even more important.</p>
      </sec>
      <sec>
        <title>Security Mechanisms</title>
        <p>Security frameworks specifically designed for MDCSs have already been proposed [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref8">8</xref>]. In brief, MDCSs need a Key Management Mechanism to provide Authentication and Key Exchange among parties (user’s mobile and app server). Authentication protocols and key derivation schemes for MDCSs usually rely on symmetric cryptography, using password authentication. These protocols should also give support for online and offline user authentication so that users are not limited because of the lack of network connectivity or coverage. Other mechanisms should cope with the confidentiality of stored and in-transit data by means of encryption schemes for secure storage and transmission.</p>
      </sec>
      <sec>
        <title>Anonymization</title>
        <p>MDCSs also support the creation of rich repositories of health-related data needed for the planning, implementation, and evaluation of public health practice. These datasets are often used for secondary purposes by government agencies, researchers, and academics. In such cases, the data should be anonymized, that is, to protect privacy by making a number of data transformations so that individuals whom the data describe remain anonymous. The anonymization process can have variable degrees of robustness [<xref ref-type="bibr" rid="ref47">47</xref>], depending on how likely is to (1) single out an individual in the dataset, (2) link records concerning the same individual, or (3) infer the value of 1 attribute on the basis of other values. In essence, all these circumstances should be avoided, resulting in an anonymized dataset. Anonymized data are not considered personal data; therefore, data privacy laws no longer apply. Although the literature on data anonymization is vast, fully anonymized datasets are difficult or even impossible to achieve. The Working Party 29 has already expressed an opinion on this matter [<xref ref-type="bibr" rid="ref47">47</xref>].</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>Although this PIA had been carefully designed and conducted, limitations of the research must be acknowledged. First, regarding methodological aspects, a parallel with other approaches for risk assessment can be drawn. That is, PIAs, as any risk assessment methodology, have inherent limitations [<xref ref-type="bibr" rid="ref48">48</xref>]: (1) the estimation of risk is never complete in the mathematical sense, (2) a complete set of undesired events (threats) is never known, (3) no way is provided to deal with unknown vulnerabilities and attacks, and (4) continuous revision is always required. PIAs are not different. PIAs should be periodically reviewed, whenever assumptions change or when new threats are unveiled. Nonetheless, by performing a PIA and implementing controls, organizations demonstrate that they are tackling privacy and data protection issues due diligence.</p>
        <p>Second, although the PIA RFID framework [<xref ref-type="bibr" rid="ref17">17</xref>] offers a sound methodology, there are other PIA frameworks that are already published (eg, OAIC’s PIA, British ICO’s PIA Handbook, CNIL’s PIA manual, and ISO/IEC 29134). Some approaches are more streamlined (eg, OAIC’s PIA and British ICO’s PIA Handbook) and consequently not so grounded on technical standards (eg, PIA RFID framework and ISO/IEC 29134). Moreover, as mentioned before, the chosen PIA framework also utilizes a qualitative approach for risk assessment, which differs from quantitative and asset-driven approaches that are more common for security risk analysis. A comparison study of PIA frameworks is outside the scope of this paper, but it may be beneficial to the community.</p>
        <p>Third, a few remarks can be also made about the way in which the PIA was conducted. Ideally, the PIA should be carried out in consultation with all relevant stakeholders (eg, developers, health care workers, data subjects and/or representatives, and policy-makers). The PIA was conducted by the authors who come from multiple disciplines (information security, medical informatics, and law) and have first-hand experiences with MDCSs. Besides, input and feedback were provided by software engineers from 2 industry partners with experience in developing MDCS. In conducting this PIA, the authors adopted the role of the data subjects to articulate their perspectives and advocate for their privacy. Two of the authors are members of privacy interest organizations and/or former members of the advisory board of the Swedish Data Protection Commissioner. The authors are therefore used to taking the perspective of data subjects and are more experienced in analyzing privacy issues on behalf of the data subjects than most laypersons. Nonetheless, especially after the MDCS is rolled out, it is recommended to consult the families enrolled in the primary care programs directly and gather their perspectives and concerns regarding privacy on the basis of their personal experiences for conducting another iteration of the PIA.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>CHWs are crucial in the Brazilian health care scenario, and empowering them with relevant tools can revolutionize the delivery of community-based primary care. MDCSs are proven effective tools to support the activities of CHWs in Brazil [<xref ref-type="bibr" rid="ref3">3</xref>] and around the world [<xref ref-type="bibr" rid="ref1">1</xref>]. However, solving privacy and data protection issues is imperative for the successful deployment of such systems. In fact, as advocated in previous studies [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref19">19</xref>], a careful look into privacy is still notably lacking in many mHealth projects and initiatives. This paper offers a full PIA for the GeoHealth MDCS aiming to unveil the privacy pitfalls that large-scale mHealth systems may have. Our results show that important privacy principles could be further enhanced, such as data minimization, obtaining consent, enabling data processing transparency, and intervenability. In fairness, existing research may not primarily account for privacy, as privacy-preserving features are considered as nonfunctional requirements or even because such considerations are beyond the scope of many papers. Nonetheless, systems that are already deployed, especially in health care, should be compliant with the principles of privacy by design.</p>
        <p>Besides, as discussed, the literature on Privacy-Enhancing Technologies (PETs) already has a range of mechanisms for consent management, transparency, and intervenability. Therefore, the future work in MDCSs involves the evaluation of suitable PETs mainly accounting for the implementation of technical controls as well as to migrate organizational controls with information security management processes.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <app id="app1">
        <title>Multimedia Appendix 1</title>
        <p>Characterization of the System.</p>
        <media xlink:href="mhealth_v7i3e11642_app1.pdf" xlink:title="PDF File (Adobe PDF File), 746KB"/>
      </app>
      <app id="app2">
        <title>Multimedia Appendix 2</title>
        <p>Evaluation of degree of protection demand.</p>
        <media xlink:href="mhealth_v7i3e11642_app2.pdf" xlink:title="PDF File (Adobe PDF File), 181KB"/>
      </app>
      <app id="app3">
        <title>Multimedia Appendix 3</title>
        <p>Identification of privacy threats.</p>
        <media xlink:href="mhealth_v7i3e11642_app3.pdf" xlink:title="PDF File (Adobe PDF File), 254KB"/>
      </app>
      <app id="app4">
        <title>Multimedia Appendix 4</title>
        <p>Technical and non-technical controls.</p>
        <media xlink:href="mhealth_v7i3e11642_app4.pdf" xlink:title="PDF File (Adobe PDF File), 94KB"/>
      </app>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">CHWs</term>
          <def>
            <p>Community Health Workers</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">CNIL</term>
          <def>
            <p>Commission nationale de l'informatique et des libertés</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">EU GDPR</term>
          <def>
            <p>European General Data Protection Regulation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">FHS</term>
          <def>
            <p>Family Health Strategy</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">ICO</term>
          <def>
            <p>Information Commissioner’s Office</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">IEC</term>
          <def>
            <p>International Electrotechnical Commission</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">ISO</term>
          <def>
            <p>International Organization for Standardization</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">MDCS</term>
          <def>
            <p>Mobile Health Data Collection System</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">mHealth</term>
          <def>
            <p>mobile health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb10">OAIC</term>
          <def>
            <p>Office of the Australian Information Commissioner</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb11">ODK</term>
          <def>
            <p>Open Data Kit</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb12">PETs</term>
          <def>
            <p>Privacy-Enhancing Technologies</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb13">PIA</term>
          <def>
            <p>Privacy Impact Assessment</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb14">RFID</term>
          <def>
            <p>Radio Frequency Identification</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb15">SISAB</term>
          <def>
            <p>Health Information System for Primary Care (Sistema de Informação em Saúde para a Atenção Básica)</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This research was funded by the DigitalWell Research (Dnr RV2017-545), a cooperation between the Region of Värmland and Karlstad University; it was also partially supported by the Swedish Foundation for Strategic Research SURPRISE project. We would like to thank Professor Alexandra Brentani for her expert advice on Brazil’s primary care system. We also extend our thanks to Professor Danilo Doneda for the clarifications about the Brazilian privacy and data protection regulations. We also thank the software engineers of SysVale SoftGroup and Bridge Laboratory for providing feedback on our assessment.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>World Health Organization</collab>
        </person-group>
        <source>Global Observatory for eHealth</source>  
        <year>2011</year>  
        <access-date>2018-07-18</access-date>
        <comment>mHealth new horizons for health through mobile technologies: second global survey on ehealth
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.who.int/goe/publications/goe_mhealth_web.pdf">http://www.who.int/goe/publications/goe_mhealth_web.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="710IELkfV"/></comment> </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Pencarrick</surname>
            <given-names>HC</given-names>
          </name>
          <name name-style="western">
            <surname>Meagher</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>McGrail</surname>
            <given-names>KM</given-names>
          </name>
        </person-group>
        <article-title>Privacy by design at population data BC: a case study describing the technical, administrative, and physical controls for privacy-sensitive secondary use of personal information for research in the public interest</article-title>
        <source>J Am Med Inform Assoc</source>  
        <year>2013</year>  
        <month>01</month>  
        <day>01</day>  
        <volume>20</volume>  
        <issue>1</issue>  
        <fpage>25</fpage>  
        <lpage>8</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/22935136"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1136/amiajnl-2012-001011</pub-id>
        <pub-id pub-id-type="medline">22935136</pub-id>
        <pub-id pub-id-type="pii">amiajnl-2012-001011</pub-id>
        <pub-id pub-id-type="pmcid">PMC3555322</pub-id></nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Sá</surname>
            <given-names>JH</given-names>
          </name>
          <name name-style="western">
            <surname>Rebelo</surname>
            <given-names>MS</given-names>
          </name>
          <name name-style="western">
            <surname>Brentani</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Grisi</surname>
            <given-names>SJ</given-names>
          </name>
          <name name-style="western">
            <surname>Iwaya</surname>
            <given-names>LH</given-names>
          </name>
          <name name-style="western">
            <surname>Simplício</surname>
            <given-names>MA</given-names>
          </name>
          <name name-style="western">
            <surname>Carvalho</surname>
            <given-names>TC</given-names>
          </name>
          <name name-style="western">
            <surname>Gutierrez</surname>
            <given-names>MA</given-names>
          </name>
        </person-group>
        <article-title>Georeferenced and secure mobile health system for large scale data collection in primary care</article-title>
        <source>Int J Med Inform</source>  
        <year>2016</year>  
        <month>12</month>  
        <volume>94</volume>  
        <fpage>91</fpage>  
        <lpage>9</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2016.06.013</pub-id>
        <pub-id pub-id-type="medline">27573316</pub-id>
        <pub-id pub-id-type="pii">S1386-5056(16)30142-3</pub-id></nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Schoen</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Mallett</surname>
            <given-names>JW</given-names>
          </name>
          <name name-style="western">
            <surname>Grossman-Kahn</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Brentani</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Kaselitz</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Heisler</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Perspectives and experiences of community health workers in Brazilian primary care centers using m-health tools in home visits with community members</article-title>
        <source>Hum Resour Health</source>  
        <year>2017</year>  
        <month>09</month>  
        <day>29</day>  
        <volume>15</volume>  
        <issue>1</issue>  
        <fpage>71</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://human-resources-health.biomedcentral.com/articles/10.1186/s12960-017-0245-9"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/s12960-017-0245-9</pub-id>
        <pub-id pub-id-type="medline">28962569</pub-id>
        <pub-id pub-id-type="pii">10.1186/s12960-017-0245-9</pub-id>
        <pub-id pub-id-type="pmcid">PMC5622566</pub-id></nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Crowe</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Taking Privacy and Data Protection Seriously in M4D Initiatives</article-title>
        <source>Proceedings of the 4th International Conference on M4D Mobile Communication for Development: M4D 2014, General Tracks</source>  
        <year>2014</year>  
        <conf-name>International Conference on M4D Mobile Communication for Development</conf-name>
        <conf-date>April 7-9, 2016</conf-date>
        <conf-loc>Dakar, Senegal</conf-loc>
        <publisher-name>Karlstad University Studies</publisher-name>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-31802"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Avancha</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Baxi</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Kotz</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>Privacy in mobile technology for personal healthcare</article-title>
        <source>ACM Comput Surv</source>  
        <year>2012</year>  
        <month>11</month>  
        <day>01</day>  
        <volume>45</volume>  
        <issue>1</issue>  
        <fpage>1</fpage>  
        <lpage>54</lpage>  
        <pub-id pub-id-type="doi">10.1145/2379776.2379779</pub-id></nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gejibo</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Mancini</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Mughal</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Sasan</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Mobile data collection: a security perspective</article-title>
        <source>Mobile Health: A Technology Road Map</source>  
        <year>2015</year>  
        <publisher-loc>Switzerland</publisher-loc>
        <publisher-name>Springer, Cham</publisher-name>
        <fpage>1015</fpage>  
        <lpage>1042</lpage> </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Simplício</surname>
            <given-names>MA</given-names>
          </name>
          <name name-style="western">
            <surname>Iwaya</surname>
            <given-names>LH</given-names>
          </name>
          <name name-style="western">
            <surname>Barros</surname>
            <given-names>BM</given-names>
          </name>
          <name name-style="western">
            <surname>Carvalho</surname>
            <given-names>TC</given-names>
          </name>
          <name name-style="western">
            <surname>Näslund</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>SecourHealth: a delay-tolerant security framework for mobile health data collection</article-title>
        <source>IEEE Biomed Health Inform</source>  
        <year>2015</year>  
        <volume>19</volume>  
        <issue>2</issue>  
        <fpage>761</fpage>  
        <lpage>72</lpage>  
        <pub-id pub-id-type="doi">10.1109/JBHI.2014.2320444</pub-id>
        <pub-id pub-id-type="medline">24801629</pub-id></nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Cobb</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Sudar</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Reiter</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Anderson</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Roesner</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Kohno</surname>
            <given-names>T</given-names>
          </name>
        </person-group>
        <article-title>Computer security for data collection technologies</article-title>
        <source>Dev Eng</source>  
        <year>2018</year>  
        <volume>3</volume>  
        <fpage>1</fpage>  
        <lpage>11</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.deveng.2017.12.002</pub-id></nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Cooper</surname>
            <given-names>T</given-names>
          </name>
        </person-group>
        <source>Healthcare Information and Management Systems Society (HIMSS)</source>  
        <year>2007</year>  
        <access-date>2018-07-18</access-date>
        <comment>Managing information privacy &amp; security in healthcare: Privacy and security principles
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://s3.amazonaws.com/rdcms-himss/files/production/public/HIMSSorg/Content/files/CPRIToolkit/version6/v7/D02_Privacy_and_Security_Principles.pdf">https://s3.amazonaws.com/rdcms-himss/files/production/public/HIMSSorg/Content/files/CPRIToolkit/version6/v7/D02_Privacy_and_Security_Principles.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="710Mio1Pv"/></comment> </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gangadharan</surname>
            <given-names>SP</given-names>
          </name>
        </person-group>
        <article-title>The downside of digital inclusion: expectations and experiences of privacy and surveillance among marginal Internet users</article-title>
        <source>New Media Soc</source>  
        <year>2015</year>  
        <month>11</month>  
        <day>09</day>  
        <volume>19</volume>  
        <issue>4</issue>  
        <fpage>597</fpage>  
        <lpage>615</lpage>  
        <pub-id pub-id-type="doi">10.1177/1461444815614053</pub-id></nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>European Commission</collab>
        </person-group>
        <source>EUR-Lex</source>  
        <year>2016</year>  
        <access-date>2019-02-07</access-date>
        <comment>Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation)
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://eur-lex.europa.eu/eli/reg/2016/679/oj">https://eur-lex.europa.eu/eli/reg/2016/679/oj</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="760cm5ZqG"/></comment> </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="web">
        <source>Senado Federal</source>  
        <year>2018</year>  
        <access-date>2018-07-17</access-date>
        <comment>[House Bill No. 53, of 2018]
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www25.senado.leg.br/web/atividade/materias/-/materia/133486">https://www25.senado.leg.br/web/atividade/materias/-/materia/133486</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="70ynkwY1K"/></comment> </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Clarke</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>An evaluation of privacy impact assessment guidance documents</article-title>
        <source>International Data Privacy Law</source>  
        <year>2011</year>  
        <month>02</month>  
        <day>15</day>  
        <volume>1</volume>  
        <issue>2</issue>  
        <fpage>111</fpage>  
        <lpage>20</lpage>  
        <pub-id pub-id-type="doi">10.1093/idpl/ipr002</pub-id></nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Clarke</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>Privacy impact assessment: its origins and development</article-title>
        <source>Comput Law Secur Rev</source>  
        <year>2009</year>  
        <month>1</month>  
        <volume>25</volume>  
        <issue>2</issue>  
        <fpage>123</fpage>  
        <lpage>35</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.clsr.2009.02.002</pub-id></nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>ISO</collab>
        </person-group>
        <source>International Organization for Standardization</source>  
        <year>2011</year>  
        <access-date>2019-02-07</access-date>
        <comment>ISO/IEC 29100:2011 Information technology - Security techniques - Privacy framework
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.iso.org/standard/45123.html">https://www.iso.org/standard/45123.html</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="760dFnwCH"/></comment> </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Oetzel</surname>
            <given-names>MC</given-names>
          </name>
          <name name-style="western">
            <surname>Spiekermann</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>A systematic methodology for privacy impact assessments: a design science approach</article-title>
        <source>Eur J Inf Syst</source>  
        <year>2013</year>  
        <month>7</month>  
        <day>23</day>  
        <volume>23</volume>  
        <issue>2</issue>  
        <fpage>126</fpage>  
        <lpage>50</lpage>  
        <pub-id pub-id-type="doi">10.1057/ejis.2013.18</pub-id></nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Oetzel</surname>
            <given-names>MC</given-names>
          </name>
          <name name-style="western">
            <surname>Spiekermann</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Grüning</surname>
            <given-names>I</given-names>
          </name>
          <name name-style="western">
            <surname>Kelter</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Mull</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <source>[Federal Office for Information Security (BSI)]</source>  
        <year>2011</year>  
        <access-date>2018-07-18</access-date>
        <comment>Privacy impact assessment guideline for RFID applications
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/ElekAusweise/PIA/Privacy_Impact_Assessment_Guideline_Langfassung.pdf;jsessionid=CD45C6C723F80F2499954EEB5DCD40BD.1_cid341?__blob=publicationFile&amp;v=1">https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/ElekAusweise/PIA/Privacy_Impact_Assessment_Guideline_Langfassung.pdf;jsessionid=CD45C6C723F80F2499954EEB5DCD40BD.1_cid341?__blob=publicationFile&amp;v=1</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="710NW2uvy"/></comment> </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>TrustLaw</collab>
        </person-group>
        <source>TrustLaw Connect</source>  
        <year>2013</year>  
        <access-date>2018-07-18</access-date>
        <comment>Patient privacy in a mobile world: A framework addresses privacy law issues in mobile health
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mhealthknowledge.org/sites/default/files/10_trustlaw_connect_report.pdf">https://www.mhealthknowledge.org/sites/default/files/10_trustlaw_connect_report.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="710NgqnQc"/></comment> </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Iwaya</surname>
            <given-names>LH</given-names>
          </name>
          <name name-style="western">
            <surname>Gomes</surname>
            <given-names>MA</given-names>
          </name>
          <name name-style="western">
            <surname>Simplício</surname>
            <given-names>MA</given-names>
          </name>
          <name name-style="western">
            <surname>Carvalho</surname>
            <given-names>TC</given-names>
          </name>
          <name name-style="western">
            <surname>Dominicini</surname>
            <given-names>CK</given-names>
          </name>
          <name name-style="western">
            <surname>Sakuragui</surname>
            <given-names>RR</given-names>
          </name>
          <name name-style="western">
            <surname>Rebelo</surname>
            <given-names>MS</given-names>
          </name>
          <name name-style="western">
            <surname>Gutierrez</surname>
            <given-names>MA</given-names>
          </name>
          <name name-style="western">
            <surname>Näslund</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Håkansson</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Mobile health in emerging countries: a survey of research initiatives in Brazil</article-title>
        <source>Int J Med Inform</source>  
        <year>2013</year>  
        <month>05</month>  
        <volume>82</volume>  
        <issue>5</issue>  
        <fpage>283</fpage>  
        <lpage>98</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2013.01.003</pub-id>
        <pub-id pub-id-type="medline">23410658</pub-id>
        <pub-id pub-id-type="pii">S1386-5056(13)00014-2</pub-id></nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Shao</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <source>Malmö University</source>  
        <year>2018</year>  
        <comment>A proposal of a mobile health data collection and reporting system for the developing world
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://hdl.handle.net/2043/13936">http://hdl.handle.net/2043/13936</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="710JdcQzv"/></comment> </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>Grameem Foundation</collab>
        </person-group>
        <source>Grameem Foundation</source>  
        <year>2012</year>  
        <access-date>2018-07-18</access-date>
        <comment>Mobile technology for community health in Ghana
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.grameenfoundation.org/sites/default/files/MOTECH-Early-Lessons-Learned-March-2011-FINAL.pdf">https://www.grameenfoundation.org/sites/default/files/MOTECH-Early-Lessons-Learned-March-2011-FINAL.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="710KIpyLT"/></comment> </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>LeFevre</surname>
            <given-names>AE</given-names>
          </name>
          <name name-style="western">
            <surname>Mohan</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Hutchful</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Jennings</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Mehl</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Labrique</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Romano</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Moorthy</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Mobile Technology for Community Health in Ghana: what happens when technical functionality threatens the effectiveness of digital health programs?</article-title>
        <source>BMC Med Inform Decis Mak</source>  
        <year>2017</year>  
        <month>12</month>  
        <day>14</day>  
        <volume>17</volume>  
        <issue>1</issue>  
        <fpage>27</fpage>  
        <pub-id pub-id-type="doi">10.1186/s12911-017-0421-9</pub-id>
        <pub-id pub-id-type="medline">28292288</pub-id>
        <pub-id pub-id-type="pii">10.1186/s12911-017-0421-9</pub-id>
        <pub-id pub-id-type="pmcid">PMC5351254</pub-id></nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>Magpi</collab>
        </person-group>
        <source>Magpi</source>  
        <access-date>2018-07-18</access-date>
        <comment>Advanced mobile data, message, and visualization
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://home.magpi.com/">https://home.magpi.com/</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="710KiVoWH"/></comment> </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Anokwa</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Hartung</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Brunette</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Borriello</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Lerer</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Open source data collection in the developing world</article-title>
        <source>Computer</source>  
        <year>2009</year>  
        <month>10</month>  
        <volume>42</volume>  
        <issue>10</issue>  
        <fpage>97</fpage>  
        <lpage>9</lpage>  
        <pub-id pub-id-type="doi">10.1109/MC.2009.328</pub-id></nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>OpenSRP</collab>
        </person-group>
        <source>Open Smart Register Platform</source>  
        <access-date>2018-07-17</access-date>
        <comment>OpenSRP
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://smartregister.org/">http://smartregister.org/</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="70ymzVIFB"/></comment> </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Macinko</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Harris</surname>
            <given-names>MJ</given-names>
          </name>
        </person-group>
        <article-title>Brazil's family health strategy--delivering community-based primary care in a universal health system</article-title>
        <source>N Engl J Med</source>  
        <year>2015</year>  
        <month>06</month>  
        <day>04</day>  
        <volume>372</volume>  
        <issue>23</issue>  
        <fpage>2177</fpage>  
        <lpage>81</lpage>  
        <pub-id pub-id-type="doi">10.1056/NEJMp1501140</pub-id>
        <pub-id pub-id-type="medline">26039598</pub-id></nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Correia</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Kon</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Kon</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>Borboleta: A mobile telehealth system for primary homecare</article-title>
        <year>2008</year>  
        <conf-name>ACM symposium on Applied computing</conf-name>
        <conf-date>Mar 16-20, 2008</conf-date>
        <conf-loc>Fortaleza, Ceará</conf-loc>
        <fpage>1343</fpage>  
        <lpage>7</lpage>  
        <pub-id pub-id-type="doi">10.1145/1363686.1363998</pub-id></nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Sá</surname>
            <given-names>JH</given-names>
          </name>
          <name name-style="western">
            <surname>Rebelo</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Brentani</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Grisi</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Gutierrez</surname>
            <given-names>MA</given-names>
          </name>
        </person-group>
        <article-title>GeoHealth: a georeferenced system for health data analysis in primary care</article-title>
        <source>IEEE Latin Am Trans</source>  
        <year>2012</year>  
        <month>01</month>  
        <volume>10</volume>  
        <issue>1</issue>  
        <fpage>1352</fpage>  
        <lpage>6</lpage>  
        <pub-id pub-id-type="doi">10.1109/TLA.2012.6142483</pub-id></nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Oetzel</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Spiekermann</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Grüning</surname>
            <given-names>I</given-names>
          </name>
          <name name-style="western">
            <surname>Kelter</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Mull</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <source>Bundesamt für Sicherheit in der Informationstechnik (BSI)</source>  
        <year>2011</year>  
        <access-date>2018-07-18</access-date>
        <comment>Privacy impact assessment guideline
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/ElekAusweise/PIA/Privacy_Impact_Assessment_Guideline_Kurzfasssung.pdf?__blob=publicationFile&amp;v=1">https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/ElekAusweise/PIA/Privacy_Impact_Assessment_Guideline_Kurzfasssung.pdf?__blob=publicationFile&amp;v=1</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="710Oqm2hz"/></comment> </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>EU Commission</collab>
        </person-group>
        <source>European Commission</source>  
        <year>2014</year>  
        <access-date>2018-12-01</access-date>
        <comment>Data protection impact assessment template for smart grid and smart metering systems
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://ec.europa.eu/energy/sites/ener/files/documents/2014_dpia_smart_grids_forces.pdf">https://ec.europa.eu/energy/sites/ener/files/documents/2014_dpia_smart_grids_forces.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="74L8VPHDQ"/></comment> </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>Information Commissioner's Office</collab>
        </person-group>
        <source>Information Commissioner's Office</source>  
        <year>2014</year>  
        <access-date>2018-12-01</access-date>
        <comment>Conducting privacy impact assessments code of practice
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://iapp.org/media/pdf/resource_center/ICO_pia-code-of-practice.pdf">https://iapp.org/media/pdf/resource_center/ICO_pia-code-of-practice.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="74L8nAcIC"/></comment> </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>Office of the Australian Information Commissioner</collab>
        </person-group>
        <source>Office of the Australian Information Commissioner</source>  
        <year>2014</year>  
        <access-date>2018-12-01</access-date>
        <comment>Guide to undertaking a privacy impact assessment
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.oaic.gov.au/resources/agencies-and-organisations/guides/guide-to-undertaking-privacy-impact-assessments.pdf">https://www.oaic.gov.au/resources/agencies-and-organisations/guides/guide-to-undertaking-privacy-impact-assessments.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="74L8ubgcs"/></comment> </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>CNIL</collab>
        </person-group>
        <source>[National Commission for Informatics and Liberties]</source>  
        <year>2018</year>  
        <access-date>2018-12-01</access-date>
        <comment>Privacy impact assessment (pia) methodology
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.cnil.fr/sites/default/files/atoms/files/cnil-pia-1-en-methodology.pdf">https://www.cnil.fr/sites/default/files/atoms/files/cnil-pia-1-en-methodology.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="74L974BUz"/></comment> </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>ISO</collab>
        </person-group>
        <source>International Organization for Standardization</source>  
        <year>2017</year>  
        <access-date>2019-02-07</access-date>
        <comment>ISO/IEC 29134:2017 Information technology-Security techniques -Guidelines for privacy impact assessment
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.iso.org/obp/ui/">https://www.iso.org/obp/ui/</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="760ecKBJZ"/></comment> </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Wright</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>The state of the art in privacy impact assessment</article-title>
        <source>Comput Law Secur Rev</source>  
        <year>2012</year>  
        <month>2</month>  
        <volume>28</volume>  
        <issue>1</issue>  
        <fpage>54</fpage>  
        <lpage>61</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.clsr.2011.11.007</pub-id>
        <pub-id pub-id-type="medline">25904163</pub-id></nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="web">
        <source>Open Data Kit</source>  
        <year>2018</year>  
        <access-date>2018-07-17</access-date>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://opendatakit.org">https://opendatakit.org</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="70yr5yVwT"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Iwaya</surname>
            <given-names>LH</given-names>
          </name>
          <name name-style="western">
            <surname>Fischer-Hübner</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Åhlfeldt</surname>
            <given-names>RM</given-names>
          </name>
          <name name-style="western">
            <surname>Martucci</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>mHealth: a Privacy Threat Analysis for Public Health Surveillance Systems</article-title>
        <source>IEEE 31st International Symposium on Computer-Based Medical Systems (CBMS)</source>  
        <year>2018</year>  
        <conf-name>International Symposium on Computer-Based Medical Systems (CBMS)</conf-name>
        <conf-date>18-21 June, 2018</conf-date>
        <conf-loc>Karlstad, Sweden</conf-loc>
        <pub-id pub-id-type="doi">10.1109/CBMS.2018.00015</pub-id></nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Solove</surname>
            <given-names>DJ</given-names>
          </name>
        </person-group>
        <article-title>A taxonomy of privacy</article-title>
        <source>Univ PA Law Rev</source>  
        <year>2006</year>  
        <volume>154</volume>  
        <issue>3</issue>  
        <fpage>477</fpage>  
        <lpage>560</lpage>  
        <pub-id pub-id-type="doi">10.2307/40041279</pub-id></nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>SISAB</collab>
        </person-group>
        <source>[Department of Primary Care]</source>  
        <year>2018</year>  
        <access-date>2018-07-17</access-date>
        <comment>SISAB
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://sisab.saude.gov.br/">https://sisab.saude.gov.br/</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="70yrfXBPB"/></comment> </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>DATASUS</collab>
        </person-group>
        <source>[IT Department of SUS]</source>  
        <year>2018</year>  
        <access-date>2018-07-17</access-date>
        <comment>DATASUS
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://datasus.saude.gov.br/">http://datasus.saude.gov.br/</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="70ysDK0ID"/></comment> </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>EU Commission</collab>
        </person-group>
        <source>EUR-Lex</source>  
        <year>1995</year>  
        <comment>Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://data.europa.eu/eli/dir/1995/46/oj">http://data.europa.eu/eli/dir/1995/46/oj</ext-link></comment> </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kotz</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>A threat taxonomy for mHealth privacy</article-title>
        <year>2011</year>  
        <conf-name>International Conference on Communication Systems and Networks (COMSNETS)</conf-name>
        <conf-date>4-8 Jan, 2011</conf-date>
        <conf-loc>Bangalore, India</conf-loc>
        <fpage>1</fpage>  
        <lpage>6</lpage>  
        <pub-id pub-id-type="doi">10.1109/COMSNETS.2011.5716518</pub-id></nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Rexhepi</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Åhlfeldt</surname>
            <given-names>RM</given-names>
          </name>
          <name name-style="western">
            <surname>Cajander</surname>
            <given-names>Å</given-names>
          </name>
          <name name-style="western">
            <surname>Huvila</surname>
            <given-names>I</given-names>
          </name>
        </person-group>
        <article-title>Cancer patients' attitudes and experiences of online access to their electronic medical records: A qualitative study</article-title>
        <source>Health Informatics J</source>  
        <year>2016</year>  
        <month>07</month>  
        <day>19</day>  
        <pub-id pub-id-type="doi">10.1177/1460458216658778</pub-id>
        <pub-id pub-id-type="medline">27440056</pub-id>
        <pub-id pub-id-type="pii">1460458216658778</pub-id></nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Murmann</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Fischer-Hübner</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Tools for achieving usable ex post transparency: a survey</article-title>
        <source>IEEE Access</source>  
        <year>2017</year>  
        <month>10</month>  
        <day>23</day>  
        <volume>5</volume>  
        <fpage>22965</fpage>  
        <lpage>91</lpage>  
        <pub-id pub-id-type="doi">10.1109/ACCESS.2017.2765539</pub-id></nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>EU Commission</collab>
        </person-group>
        <source>European Commission</source>  
        <year>2017</year>  
        <access-date>2018-07-20</access-date>
        <comment>Article 29 data protection working party: Guidelines on consent under regulation 2016/679
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://ec.europa.eu/newsroom/article29/document.cfm?action=display&amp;doc_id=51030">http://ec.europa.eu/newsroom/article29/document.cfm?action=display&amp;doc_id=51030</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="7137LtkK3"/></comment> </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>WP29</collab>
        </person-group>
        <source>European Commission</source>  
        <year>2014</year>  
        <comment>Article 29 Working Party
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://ec.europa.eu/justice/article-29/documentation/opinion-recommendation/files/2014/wp216_en.pdf">http://ec.europa.eu/justice/article-29/documentation/opinion-recommendation/files/2014/wp216_en.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="7137h0U9s"/></comment> </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Cherdantseva</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Burnap</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Blyth</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Eden</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Jones</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Soulsby</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Stoddart</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>A review of cyber security risk assessment methods for SCADA systems</article-title>
        <source>Comput Secur</source>  
        <year>2016</year>  
        <month>02</month>  
        <volume>56</volume>  
        <fpage>1</fpage>  
        <lpage>27</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="http://www.sciencedirect.com/science/article/pii/S0167404815001388"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/j.cose.2015.09.009</pub-id></nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
