<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="review-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMU</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Mhealth Uhealth</journal-id>
      <journal-title>JMIR mHealth and uHealth</journal-title>
      <issn pub-type="epub">2291-5222</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v9i1e23409</article-id>
      <article-id pub-id-type="pmid">33507159</article-id>
      <article-id pub-id-type="doi">10.2196/23409</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Privacy Policy Compliance of Chronic Disease Management Apps in China: Scale Development and Content Evaluation</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Buis</surname>
            <given-names>Lorraine</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Benjumea</surname>
            <given-names>Jaime</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Lalla-Edward</surname>
            <given-names>Samanta</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Ni</surname>
            <given-names>Zhenni</given-names>
          </name>
          <degrees>BM</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>School of Information Management</institution>
            <institution>Wuhan University</institution>
            <addr-line>LuoJiaShan</addr-line>
            <addr-line>WuChang district</addr-line>
            <addr-line>Wuhan</addr-line>
            <country>China</country>
            <phone>86 13667195159</phone>
            <email>Jennie_N@whu.edu.cn</email>
          </address>
          <xref rid="aff2" ref-type="aff">2</xref>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-1422-2168</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>Yiying</given-names>
          </name>
          <degrees>LLB</degrees>
          <xref rid="aff4" ref-type="aff">4</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-3514-8032</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Qian</surname>
            <given-names>Yuxing</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff2" ref-type="aff">2</xref>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-3803-2505</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>School of Information Management</institution>
        <institution>Wuhan University</institution>
        <addr-line>Wuhan</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Center for Studies of Information Resources</institution>
        <institution>Wuhan University</institution>
        <addr-line>Wuhan</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Big Data Institute</institution>
        <institution>Wuhan University</institution>
        <addr-line>Wuhan</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff4">
        <label>4</label>
        <institution>School of International Law</institution>
        <institution>Shanghai University of Political Science and Law</institution>
        <addr-line>Shanghai</addr-line>
        <country>China</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Zhenni Ni <email>Jennie_N@whu.edu.cn</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>1</month>
        <year>2021</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>28</day>
        <month>1</month>
        <year>2021</year>
      </pub-date>
      <volume>9</volume>
      <issue>1</issue>
      <elocation-id>e23409</elocation-id>
      <history>
        <date date-type="received">
          <day>11</day>
          <month>8</month>
          <year>2020</year>
        </date>
        <date date-type="rev-request">
          <day>18</day>
          <month>9</month>
          <year>2020</year>
        </date>
        <date date-type="rev-recd">
          <day>10</day>
          <month>11</month>
          <year>2020</year>
        </date>
        <date date-type="accepted">
          <day>2</day>
          <month>12</month>
          <year>2020</year>
        </date>
      </history>
      <copyright-statement>©Zhenni Ni, Yiying Wang, Yuxing Qian. Originally published in JMIR mHealth and uHealth (http://mhealth.jmir.org), 28.01.2021.</copyright-statement>
      <copyright-year>2021</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR mHealth and uHealth, is properly cited. The complete bibliographic information, a link to the original publication on http://mhealth.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="http://mhealth.jmir.org/2021/1/e23409/" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>With the development of mobile health (mHealth), chronic disease management apps have brought not only the possibility of reducing the burden of chronic diseases but also huge privacy risks to patients’ health data.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>The purpose of the study was to analyze the extent to which chronic disease management apps in China comply with the Personal Information Security Specification (PI Specification).</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>The compliance of 45 popular chronic disease management apps was evaluated from the perspective of the information life cycle. To conduct a fine-grained evaluation, a scale based on the PI Specification was developed. Finally, 6 level 1 indicators, 22 level 2 indicators, and 61 level 3 indicators were defined.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>There were 33/45 apps (73%) with a privacy policy, and the average score of these apps was 40.4 out of 100. Items of level 1 indicators with high scores included general characteristics (mean 51.9% [SD 28.1%]), information collection and use (mean 51.1% [SD 36.7%]), and information sharing and transfer (mean 50.3% [SD 33.5%]). Information storage and protection had the lowest compliance with PI Specification (mean 29.4% [SD 32.4%]). Few personal information (PI) controllers have stated how to handle security incidents, including security incident reporting (7/33, 21%), security incident notification (10/33, 30%), and commitment to bear corresponding legal responsibility for PI security incidents (1/33, 3%). The performance of apps in the stage of information destruction (mean 31.8% [SD 40.0%]) was poor, and only 21% (7/33) apps would notify third parties to promptly delete PI after individuals cancelled their accounts. Moreover, the scoring rate for rights of PI subjects is generally low (mean 31.2% [SD 35.5%]), especially for obtaining copies of PI (15%) and responding to requests (25%).</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Although most chronic disease management apps had a privacy policy, the total compliance rate of the policy content was low, especially in the stage of information storage and protection. Thus, the field has a long way to go with regard to compliance around personal privacy protection in China.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>mHealth</kwd>
        <kwd>noncommunicable diseases</kwd>
        <kwd>content analysis</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Chronic diseases, such as diabetes and hypertension, are a major global health issue affecting many countries [<xref ref-type="bibr" rid="ref1">1</xref>]. Fortunately, the booming of mobile health (mHealth) offers opportunities for chronic diseases prevention, treatment, and daily self-management. The health benefits of mHealth interventions for patients with chronic diseases have been demonstrated [<xref ref-type="bibr" rid="ref2">2</xref>]; mHealth apps can be used to collect and monitor health data [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref4">4</xref>], promote and support self-management [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref6">6</xref>], and provide medication and appointment reminders [<xref ref-type="bibr" rid="ref7">7</xref>]. Different from other types of mHealth apps, such as online registration and online consultation, chronic disease management apps allow individuals to generate large quantities of data about their lifestyle, introducing risks to the security and privacy of patient data.</p>
        <p>Considering the potential negative effects of security breaches of health data systems, such as social stigma, damage to reputation, and fraud in the health system [<xref ref-type="bibr" rid="ref8">8</xref>], privacy has become an important factor discouraging patients from using mHealth apps for health care [<xref ref-type="bibr" rid="ref9">9</xref>-<xref ref-type="bibr" rid="ref11">11</xref>]. Different from other kinds of disease management, the care of chronic diseases requires patients to regularly track key health indicators. It means that protecting the safety and privacy of personal information (PI) is crucial for chronic disease management apps. A few studies were related to the privacy policy of chronic disease management apps. These studies mainly involved 3 focal aspects: the quality assessment [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref13">13</xref>], the complexity analysis of app privacy policies [<xref ref-type="bibr" rid="ref14">14</xref>], and the security analysis [<xref ref-type="bibr" rid="ref15">15</xref>]. Although the above 3 aspects involved privacy policies, the evaluations were relatively rough.</p>
        <p>As for the evaluation criteria, various standards were used to evaluate the privacy of mHealth apps. Most papers established evaluation indicators based on the existing literature [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref17">17</xref>] or authors’ criteria [<xref ref-type="bibr" rid="ref18">18</xref>-<xref ref-type="bibr" rid="ref20">20</xref>]. The most common items in the evaluation criteria included stating processing purposes, determining the recipient of personal data, the existence of the data rights of the individuals, and the existence of privacy policies. Although a few papers on the privacy assessment of mHealth apps were based on laws or regulations, such as General Data Protection Regulation (GDPR), Fair Information Practices (FIPS) [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref21">21</xref>], some of them proposed a set of items to check the compliance of laws or regulations [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref22">22</xref>].</p>
        <p>In China, the Information Security Technology–Personal Information Security Specification (GB/<italic>t</italic> 35273-2020) (PI Specification) came into effect on October 1, 2020 [<xref ref-type="bibr" rid="ref23">23</xref>]. This specification, also as the standard basis for apps’ privacy certification, lays out granular guidelines for how personal data should be collected, used, and shared. Besides, it provides a template of PI protection policy in the form of attachments. Although PI Specification is a national voluntary standard instead of a mandatory standard, it provides a reference for the industry. However, the compliance with PI Specification of mHealth apps remains unclear. In each step of the information life cycle, the patient’s PI is at risk of leakage, such as collection, storage, usage, sharing, destruction, and so on. Therefore, it is necessary to review the compliance of the privacy policy of mHealth apps based on PI Specification from various stages of the information life cycle, especially for chronic disease management apps that have insufficient privacy assessment.</p>
      </sec>
      <sec>
        <title>Objectives</title>
        <p>This study aimed to evaluate the compliance of privacy policies of chronic disease apps with the PI Specification from the perspective of the information life cycle. Specifically, this study can provide answers to the following 2 research questions: (1) To what extent do chronic disease apps comply with PI Specification 2020? (2) Among the various stages of the information life cycle, which stage has the weakest privacy policy protection?</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Apps Selection</title>
        <p>Considering the popularity of Android in China [<xref ref-type="bibr" rid="ref24">24</xref>], this study investigated mHealth apps in Android app stores. The top 4 Android app stores were selected, which accounts for 61.0% of the Chinese Android market [<xref ref-type="bibr" rid="ref25">25</xref>], including Tencent My App (26.0%) [<xref ref-type="bibr" rid="ref26">26</xref>], Huawei App Market (15.1%) [<xref ref-type="bibr" rid="ref27">27</xref>], Oppo Software Store (10.2%) [<xref ref-type="bibr" rid="ref28">28</xref>], and 360 Mobile Assistant (9.7%) [<xref ref-type="bibr" rid="ref29">29</xref>]. The apps returned by queries for “noncommunicable diseases,” “chronic disease,” “diabetes,” “blood pressure,” “hypertension,” “heart disease,” “kidney,” “cardiovascular,” “asthma,” “respiratory disease,” or “cancer” were included in the set of chronic diseases management apps.</p>
        <p>This search was conducted on October 2, 2020. Our sample was filtered based on the title and description in the app stores. The app met inclusion criteria if it (1) was in Chinese; (2) required the input of PI over time; (3) had the general public as its target user group rather than clinicians; and (4) had over 100,000 downloads. The authors saved all privacy policies as text files and recorded the downloads, update time, and disease category.</p>
        <p>A total of 45 apps met the inclusion criteria (<xref rid="figure1" ref-type="fig">Figure 1</xref>). Among them, 12/45 apps (27%) had no privacy policy. Excluding apps without a privacy policy, the remaining 33 privacy policies were analyzed.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Flow chart of the search strategy.</p>
          </caption>
          <graphic xlink:href="mhealth_v9i1e23409_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Scale Development and Scoring</title>
        <p>The level 1 and level 2 evaluation indicators are shown in <xref ref-type="boxed-text" rid="box1">Textbox 1</xref>. Level 3 evaluation indicators for privacy policies are listed in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>. Based on the information life cycle, 6 level 1 indicators were developed, including information collection and use, information storage and protection, information sharing and transfer, information destruction, general characteristics of privacy policies, and rights of PI subjects. There are 22 items on level 2 indicators and 61 items on level 3 indicators. For each level 3 indicator, a brief explanation, example sentences, and corresponding clauses of PI Specification are listed in <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>.</p>
        <p>Each level 3 indicator was scored as 1 point if the privacy policy complies with the indicator and 0 otherwise. Scoring rate of each level 3 indicator was defined as the percentage of the number of apps scored 1 point in the total sample. Scoring rate of each level 2 indicator was the average of all level 3 indicators under that level 2 indicator. Scoring rate of each level 1 indicator, which indicated the compliance of apps in the corresponding stage of the information life cycle, was the average of all level 2 indicators under that level 1 indicator. For each app, the sum of all level 3 indicators scores was converted into a percentage system as a final score; the final score represented the compliance of the app. Bar graphs are used to visualize the degree of policy compliance. The ordinate of bar graphs is the scoring indicators, including level 3 and level 2 indicators, and the scoring rate of level 2 indicators. The abscissa is the scoring rate of level 3 indicators. In order to more intuitively reflect the scores of the level 2 indicators, we use different colors to visualize each level 2 indicator; if the scoring rate is close to the average score, it is yellow; if the scoring rate is close to the minimum value, it is red; If the scoring rate is close to the maximum value, it is green.</p>
        <p>Initially, 2 raters (ZN and YW) independently reviewed 21% (7/33) of randomly selected apps to assess the level of agreement; the Kappa-Cohen Index was 0.87, which denoted an almost perfect agreement. Then, 2 raters (ZN and YW) discussed indicators with inconsistent scores, and each rater analyzed half of the remaining apps after the standard was unified.</p>
        <boxed-text id="box1" position="float">
          <title>Level 1 and level 2 evaluation indicators for privacy policies.</title>
          <p>
            <bold>1. General characteristics</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>App scope</p>
            </list-item>
            <list-item>
              <p>Policy disclosure</p>
            </list-item>
            <list-item>
              <p>Policy updates</p>
            </list-item>
          </list>
          <p>
            <bold>2. Information collection and use</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>Information collection and usage rules for business functions</p>
            </list-item>
            <list-item>
              <p>Personal sensitive information</p>
            </list-item>
          </list>
          <p>
            <bold>3. Information storage and protection</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>Storage security</p>
            </list-item>
            <list-item>
              <p>The handling of security incidents</p>
            </list-item>
          </list>
          <p>
            <bold>4. Information sharing and transfer</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>Entrusted processing</p>
            </list-item>
            <list-item>
              <p>Sharing of PI</p>
            </list-item>
            <list-item>
              <p>Transfer of PI</p>
            </list-item>
            <list-item>
              <p>Public disclosure of PI</p>
            </list-item>
            <list-item>
              <p>Cross-border transmission</p>
            </list-item>
          </list>
          <p>
            <bold>5. Information destruction</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>Storage time limit</p>
            </list-item>
            <list-item>
              <p>Data deletion and anonymization</p>
            </list-item>
          </list>
          <p>
            <bold>6. Rights of PI subjects</bold>
          </p>
        </boxed-text>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Sample Distribution</title>
        <p>The basic characteristics of these apps are presented in <xref ref-type="table" rid="table1">Table 1</xref>. The types of chronic diseases targeted by apps mainly include diabetes (11/45, 24%), hypertension (4/45, 9%), heart disease (4/45, 9%), cancer (2/45, 4%), and comprehensive chronic disease management (19/45,42%). The comprehensive chronic disease management app referred to providing users with long-term, multifaceted chronic disease prevention and treatment services that were not targeted at specific chronic disease. Besides, it included a small number of apps for other types of chronic diseases (5/45, 11%), such as asthma, chronic kidney disease, and chronic skeletal muscle diseases. Most apps (30/45, 67%) had between 100,000 and 1,000,000 downloads; 73% (33/45) of apps were updated in 2020.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Sample distribution of chronic disease management apps (N=45).</p>
          </caption>
          <table border="1" rules="groups" cellpadding="5" frame="hsides" width="1000" cellspacing="0">
            <col width="30"/>
            <col width="470"/>
            <col width="500"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Category</td>
                <td>Count, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="2">
                  <bold>Disease category</bold>
                </td>
                <td/>
              </tr>
              <tr valign="top">
                <td/>
                <td>Diabetes</td>
                <td>11 (24)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Hypertension</td>
                <td>4 (9)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Heart disease</td>
                <td>4 (9)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Cancer</td>
                <td>2 (4)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Comprehensive</td>
                <td>19 (42)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>Others</td>
                <td>5 (11)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">
                  <bold>Downloads</bold>
                </td>
                <td/>
              </tr>
              <tr valign="top">
                <td/>
                <td>100,000-1,000,000</td>
                <td>30 (67)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>1,000,000-10,000,000</td>
                <td>11 (24)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>10,000,000</td>
                <td>4 (9)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">
                  <bold>Updated</bold>
                </td>
                <td/>
              </tr>
              <tr valign="top">
                <td/>
                <td>2014-2016</td>
                <td>2 (4)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>2017-2019</td>
                <td>10 (22)</td>
              </tr>
              <tr valign="top">
                <td/>
                <td>2020</td>
                <td>33 (73)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Compliance Evaluation</title>
        <p>The average score of 33 apps was 40.4 out of 100, and the degree of dispersion was very high (SD 31.2). The evaluation results on level 1 indicators of privacy policies are presented in <xref rid="figure2" ref-type="fig">Figure 2</xref>. The most complied-with items in level 1 indicators were the following: general characteristics (mean 51.9% [SD 28.1%]), information collection and use (mean 51.1% [SD 36.7%]), and information sharing and transfer (mean 50.3% [SD 33.5%]). However, some indicators had a low degree of overall compliance, such as information storage and protection (mean 29.4% [SD 32.4%]), information destruction (mean 31.8% [SD 40.0%]), and rights of PI subjects (mean 31.2% [SD 35.5%]). The name and evaluation results of each app are listed in <xref ref-type="supplementary-material" rid="app3">Multimedia Appendix 3</xref>.</p>
        <p>The scoring rate for level 2 indicators ranged from 15.2% to 75.8%, with an average of 40.4%. We visualized the evaluation results with bar graphs, in which the color of bars indicates the scoring rate of level 2 indicators (the value in parentheses) and the length of bars indicates the scoring rate of level 3 indicators.</p>
        <p>The general characteristics of privacy policy reflect its openness, readability, and timeliness of updates. Compliance evaluation results of the privacy policies general characteristics are shown in <xref rid="figure3" ref-type="fig">Figure 3</xref>. Some level 2 indicators scored high, such as policy updates (59%) and disclosure (58%). More than one-half of the apps promised to notify users (19/33, 58%) and obtain the explicit consent of PI subjects again (17/33, 52%) if the policy was updated. As for policy disclosure, although most apps provided independent (20/33, 61%) and easily accessible (27/33, 82%) privacy policies, only a few apps (10/33, 30%) had a clear logical structure and provided a directory summary. In terms of scope, a few apps (9/33, 27%) marked the update date or effective time of the privacy policy, which indicated that the timeliness of policy updates was low.</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>The scoring rate of chronic disease management apps on level 1 indicators. PI: personal information.</p>
          </caption>
          <graphic xlink:href="mhealth_v9i1e23409_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Compliance evaluation results of the privacy policies general characteristics. PI: personal information.</p>
          </caption>
          <graphic xlink:href="mhealth_v9i1e23409_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>Compliance evaluation results in the stage of information collection and use, and the stage of information storage and protection are presented in <xref rid="figure4" ref-type="fig">Figure 4</xref>. In the information collection and use stage, the scoring rate of all level 2 indicators reached the average, and the overall compliance degree was relatively high. Because the research object of this article was chronic disease management apps, all apps in this research involved the collection and processing of personally sensitive information. However, in terms of personal sensitive information, only 30% (10/33) of apps marked personal sensitive information prominently.</p>
        <p>Although the compliance level of storage security was close to the average (38%), most apps (28/33, 85%) did not inform PI subjects the security agreement they followed and the certification they obtained. The compliance level of the handling of security incidents (18%) was far below the average. Among the 33 apps, only 1 app (3%) promised to bear corresponding responsibilities if a security incident occurred. In addition, no more than one-third of apps described how to inform PI subjects after a security incident (10/33, 30%), and whether they would report it truthfully to government organizations (7/33, 21%).</p>
        <p>Compliance evaluation results in the stage of information sharing and transfer, and the stage of information destruction are shown in <xref rid="figure5" ref-type="fig">Figure 5</xref>. Only 24% (8/33) of apps informed the type of shared information and 33% (11/33) of apps informed the security measures taken before sharing, such as anonymization or deidentification. Entrusted processing scored low; only 27% (9/33) of apps stated that they would supervise the entrusted party by establishing the third-party’s responsibilities and duties through contract or other such means. The 2 level 2 indicators of the information destruction stage, namely, storage time limit (35%) and data deletion and anonymization (29%), were all lower than the average scoring rate. Especially if PI subjects request to delete user data, only 21% (7/33) of apps would notify third parties to promptly delete their PI.</p>
        <p>Most privacy policies had a low scoring rate for the indicators related to rights of PI subjects (<xref rid="figure6" ref-type="fig">Figure 6</xref>), especially the right to obtain a copy of PI, which was only 15% (5/33). Scores for level 2 indicators such as complaint management (29%) and responding to requests (26%) were far below the average, which meant that most apps did not pay attention to the handling of user requests and complaints.</p>
        <fig id="figure4" position="float">
          <label>Figure 4</label>
          <caption>
            <p>Evaluation results in the stage of information collection and use, and the stage of information storage and protection. PI: personal information.</p>
          </caption>
          <graphic xlink:href="mhealth_v9i1e23409_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure5" position="float">
          <label>Figure 5</label>
          <caption>
            <p>Evaluation results in the stage of information sharing and transfer, and the stage of information destruction. PI: personal information.</p>
          </caption>
          <graphic xlink:href="mhealth_v9i1e23409_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure6" position="float">
          <label>Figure 6</label>
          <caption>
            <p>Compliance evaluation results of the right of PI subjects. PI: personal information.</p>
          </caption>
          <graphic xlink:href="mhealth_v9i1e23409_fig6.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Key Findings</title>
        <p>In this study, we proposed a scale based on PI Specification 2020 for assessing the compliance of China’s chronic disease apps privacy policies from various stages of the information life cycle. Fu and Zhao [<xref ref-type="bibr" rid="ref30">30</xref>] analyzed the privacy policies of 20 mHealth apps in China based on PI Specification 2017. In their study, the privacy policies were analyzed from 6 aspects, including information collection, cookies and other related technologies, PI storage and protection, PI sharing, PI processing rights, and minor information protection. However, their study did not conduct a fine-grained quantitative analysis and evaluation of each item and it could not reveal the app’s compliance with specific articles in PI Specification. In this paper, 6 level 1 indicators, 22 level 2 indicators, and 61 level 3 indicators were defined and a fine-grained evaluation was conducted. PI controllers and subjects can use the scale to obtain a percentual score that defines the compliance of privacy policies.</p>
        <p>According to the results, most of the apps collected in the initial sample (33/45, 73%) included a privacy policy, which was similar to a previous assessment of cancer apps by Benjumea et al [<xref ref-type="bibr" rid="ref22">22</xref>] who found that 71% of the apps in their sample had a privacy policy. Considering that the prevalence of privacy policies for high-download apps is significantly higher than that of low-download apps (high downloads: 15/17, 88%; and low downloads: 33/64, 52%; <italic>P</italic>=.006) [<xref ref-type="bibr" rid="ref31">31</xref>], our result might be higher than the actual situation.</p>
        <p>Regarding scores, only 39% (13/33) of apps in our sample had a score greater than or equal to 40 points, with an average score of 40.4 out of 100 (SD 31.2), which indicated that the majority of chronic disease management apps in China had low compliance with PI Specification 2020. This result is consistent with the prior finding by Fu and Zhao [<xref ref-type="bibr" rid="ref30">30</xref>], who determined that most mHealth apps in China did not meet the requirements of PI Specification. Benjumea et al [<xref ref-type="bibr" rid="ref22">22</xref>] analyzed the privacy policies of 31 cancer Android apps from the Google Play website (Spanish version) and obtained an average score of 50.5 points; in Hutton et al [<xref ref-type="bibr" rid="ref21">21</xref>], the average score for 64 self-tracking mHealth apps from Google Play was 46.2% (SD 24.3%). These differences might also be the result of different mHealth app types, evaluation scales, and even normative background (Hutton et al [<xref ref-type="bibr" rid="ref21">21</xref>] refer to GDPR, FIPS, and usability, whereas Benjumea et al [<xref ref-type="bibr" rid="ref22">22</xref>] refer to GDPR). What we compared is the degree to which apps complied with local laws or regulations, rather than the degree to which they protected the privacy of users. Thus, according to the evaluation results, the compliance of chronic disease management apps in China Android app stores might be slightly lower than that of mHealth apps in Google Play.</p>
        <p>In terms of general characteristics, policy disclosure and policy updates are the basic prerequisites for a privacy policy to effectively protect the legal rights of PI subjects. The level 3 indicators under policy disclosure and policy updates can maintain a scoring rate of 57%-58%, which indicated that most PI controllers had a basic awareness of protecting user privacy. However, only 48% (16/33) of apps introduce the basic information of the PI controller in the privacy policies, which is far lower than a previous study (77%) [<xref ref-type="bibr" rid="ref22">22</xref>].</p>
        <p>In the stage of information collection and use, 64% (21/33) of apps stated the purpose of collecting and using PI, which was in line with the result (61%) of Hutton et al [<xref ref-type="bibr" rid="ref21">21</xref>]; 52% (17/33) of apps described the impact of refusal to provide PI, which was far higher than the result (27%) of Benjumea et al [<xref ref-type="bibr" rid="ref22">22</xref>]. According to PI Specification Article 5.5, if the app involves the collection of personal sensitive information, the PI controller should clearly mark or highlight the information. However, only 30% (10/33) of apps prominently marked personal sensitive information in their privacy policies.</p>
        <p>Information sharing has always been a hotspot in privacy policy analysis. Robillard et al [<xref ref-type="bibr" rid="ref32">32</xref>] found that 68% of privacy policies stated that users’ PI may be shared with third parties, whereas only 10% of apps stated that users’ PI would not be shared without their consent. In this paper, the majority of apps with a privacy policy that we assessed were highly compliant with PI Specification in data sharing (48%), transmission (56%), and public disclosure (76%). In terms of the consent of PI subjects, considerable proportions of privacy policies mentioned that they would obtain the consent of PI subjects before sharing (26/33, 79%), transfer (24/33, 73%), and public disclosure (24/33, 73%) PI. While most apps would obtain the consent of PI subjects before sharing PI, no more than one-fourth of apps informed the type of PI they would share. Furthermore, during the information sharing and transfer stage, the most worrying issue was the lack of safety measures (11/33, 33%) and supervision of third parties (9/33, 27%), which brought serious security risks to PI of patients.</p>
        <p>Among the stages of the information life cycle, the stage of information storage and protection had the lowest compliance with PI Specification. According to Zhou et al [<xref ref-type="bibr" rid="ref11">11</xref>], most users did have concerns about their privacy when using mHealth apps and expected the apps to take a variety of security measures, such as regular password updates, remote wipe, user consent, and access control. However, according to our assessment, approximately two-thirds of chronic disease management apps lacked the description of security measures in the level of organization management. Concerningly, only few PI controllers (18%) have stated how to handle security incidents, such as security incident reporting, security incident notification, and commitment to bear corresponding legal responsibility for PI security incidents.</p>
        <p>The timely destruction of PI is essential to the privacy of patients. Few privacy policies complied with PI Specification in terms of the storage time limit (35%) and the deletion or anonymization of PI after account cancellation (29%). One noteworthy point here was that only 21% (7/33) of chronic disease management apps would notify third parties to promptly delete PI after PI subjects cancelled their accounts. According to PI Specification [<xref ref-type="bibr" rid="ref23">23</xref>], the PI retention period should be the shortest time needed to achieve the purpose (Article 6.1); after the retention period is exceeded or the account is cancelled, PI controllers should carry out data deletion or anonymization (Article 6.1, Article 8.5). Judging from the assessment results of this study, the performance of apps in the stage of information destruction was far from reaching the requirements of PI Specification.</p>
        <p>The scoring rate for rights of PI subjects is generally low, especially for obtaining copies of PI (15%) and responding to requests (25%), which was consistent with a previous study [<xref ref-type="bibr" rid="ref21">21</xref>]. Furthermore, during our evaluation, we noticed that compared with the description of rights of PI subjects, the scoring rate of how to exercise rights of PI subjects is usually lower. For example, 48% (16/33) of apps stated the right of PI inquiry, whereas only 36% (12/33) of apps provided methods to inquire PI. These findings demonstrated that most Android chronic disease management apps in China can hardly guarantee the exercise of patients’ rights.</p>
      </sec>
      <sec>
        <title>Implications and Recommendations</title>
        <p>The contributions of this study are threefold. First, we developed a new scale based on PI Specification. From the perspective of information life cycle management, the compliance of privacy policies can be evaluated systematically, and the scale can be generalizable to other kinds of apps in China. Based on our scale, app operators can also conduct a fine-grained self-assessment of their app privacy policies. Second, through the analysis of privacy policies, physicians and patients could better understand what information patients provide to the app companies and the potential risk of providing this information to non–health care providers, especially in terms of information storage and protection. Moreover, we investigated and assessed the current state of practice in chronic disease management apps regarding the protection of health-related data. The indicators in this paper were based on the PI Specification 2020, and findings presented in this article could provide insights into the implementation of the new specification in China. Personal health information is highly sensitive and the leakage of daily health data may cause negative effects [<xref ref-type="bibr" rid="ref8">8</xref>]. In this regard, we would like to make the following recommendations:</p>
        <p>First, improve the readability of the privacy policy. The results from a 2018 study [<xref ref-type="bibr" rid="ref33">33</xref>] suggested that privacy policies are not comprehensible to most adults. Thus, it is of great significance for apps to make their privacy policies shorter and simpler so that PI subjects can understand it. Second, strengthen government supervision and industry self-regulation. The Personal Information Protection Law of the People’s Republic of China (Draft Law) was released for seeking opinions from the public on October 21, 2020 [<xref ref-type="bibr" rid="ref34">34</xref>]. Different from the PI Specification, which is a national recommended standard instead of a mandatory standard, the promulgation and implementation of the Personal Information Protection Law will provide strong legal support for the protection of personal privacy and user rights. Moreover, it is important to pay attention to the positive effects of mHealth industry self-discipline and encourage mHealth industry organizations to draft industry rules to collect and use personal health information legally.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>First, our indicators may not be practical for apps in some special cases. For example, all level 2 indicators under “Sharing of PI” cannot be evaluated if the app does not share any PI. Assigning 1 point or 0 points, in this case, would overrate or underrate the privacy policy, respectively. Second, although we assessed the compliance of the privacy policies, we did not conduct a technical audit to evaluate if the data handling procedures outlined in the policy are implemented. It is reported that the disclosures regarding third-party data transmission do not match actual behavior [<xref ref-type="bibr" rid="ref16">16</xref>]. Thus, future work can explore the correspondence between privacy disclosures and how apps for chronic disease handle personal data.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>Despite these limitations, our findings demonstrated a general lack of compliance regarding the handling of users’ health data submitted to chronic disease management apps. Although most chronic disease management apps had a privacy policy, the total compliance rate of the policy content was low. In addition, few apps could handle security incidents according to the requirements of PI specification. Importantly, it was difficult for PI subjects to exercise their rights in accordance with the privacy policies, especially in the stage of information destruction. Overall, our findings suggest the field has a long way to go with regard to compliance around data handling in China. Only by calling attention to this large need, can we change the practices and create a safer online environment for users’ daily health information.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Evaluation indicators for privacy policies.</p>
        <media xlink:href="mhealth_v9i1e23409_app1.docx" xlink:title="DOCX File , 25 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Evaluation guide.</p>
        <media xlink:href="mhealth_v9i1e23409_app2.xlsx" xlink:title="XLSX File  (Microsoft Excel File), 22 KB"/>
      </supplementary-material>
      <supplementary-material id="app3">
        <label>Multimedia Appendix 3</label>
        <p>List of mHealth apps names and evaluation results.</p>
        <media xlink:href="mhealth_v9i1e23409_app3.xlsx" xlink:title="XLSX File  (Microsoft Excel File), 13 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">FIPS</term>
          <def>
            <p>Fair Information Practices</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">GDPR</term>
          <def>
            <p>General Data Protection Regulation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">mHealth</term>
          <def>
            <p>mobile Health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">PI</term>
          <def>
            <p>personal information</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">PI Specification</term>
          <def>
            <p>Information Security Technology–Personal Information Security Specification (GB/<italic>t</italic> 35273-2020)</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This work was supported by the National Natural Science Foundation of China (Grant nos. 71661167007, 71420107026).</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>World Health Organization</collab>
          </person-group>
          <source>Noncommunicable diseases: Secondary Noncommunicable diseases</source>
          <year>2018</year>
          <month>6</month>
          <day>1</day>
          <access-date>2020-12-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.who.int/news-room/fact-sheets/detail/noncommunicable-diseases">https://www.who.int/news-room/fact-sheets/detail/noncommunicable-diseases</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Triantafyllidis</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kondylakis</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Votis</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Tzovaras</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Maglaveras</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Rahimi</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Features, outcomes, and challenges in mobile health interventions for patients living with chronic diseases: A review of systematic reviews</article-title>
          <source>Int J Med Inform</source>
          <year>2019</year>
          <month>12</month>
          <volume>132</volume>
          <fpage>103984</fpage>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2019.103984</pub-id>
          <pub-id pub-id-type="medline">31605884</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(18)30725-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Aubourg</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Demongeot</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Provost</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Vuillerme</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Circadian Rhythms in the Telephone Calls of Older Adults: Observational Descriptive Study</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2020</year>
          <month>02</month>
          <day>25</day>
          <volume>8</volume>
          <issue>2</issue>
          <fpage>e12452</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2020/2/e12452/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/12452</pub-id>
          <pub-id pub-id-type="medline">32130156</pub-id>
          <pub-id pub-id-type="pii">v8i2e12452</pub-id>
          <pub-id pub-id-type="pmcid">PMC7064945</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Nicdao</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Mikaheal</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Baldacchino</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Albeos</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Petoumenos</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Sud</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Emotion sharing in remote patient monitoring of patients with chronic kidney disease</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2020</year>
          <month>02</month>
          <day>01</day>
          <volume>27</volume>
          <issue>2</issue>
          <fpage>185</fpage>
          <lpage>193</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/31633755"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamia/ocz183</pub-id>
          <pub-id pub-id-type="medline">31633755</pub-id>
          <pub-id pub-id-type="pii">5601684</pub-id>
          <pub-id pub-id-type="pmcid">PMC7647270</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Korpershoek</surname>
              <given-names>YJG</given-names>
            </name>
            <name name-style="western">
              <surname>Hermsen</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Schoonhoven</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Schuurmans</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Trappenburg</surname>
              <given-names>JCA</given-names>
            </name>
          </person-group>
          <article-title>User-Centered Design of a Mobile Health Intervention to Enhance Exacerbation-Related Self-Management in Patients With Chronic Obstructive Pulmonary Disease (Copilot): Mixed Methods Study</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>06</month>
          <day>15</day>
          <volume>22</volume>
          <issue>6</issue>
          <fpage>e15449</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/6/e15449/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/15449</pub-id>
          <pub-id pub-id-type="medline">32538793</pub-id>
          <pub-id pub-id-type="pii">v22i6e15449</pub-id>
          <pub-id pub-id-type="pmcid">PMC7324997</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Slater</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Stinson</surname>
              <given-names>JN</given-names>
            </name>
            <name name-style="western">
              <surname>Jordan</surname>
              <given-names>JE</given-names>
            </name>
            <name name-style="western">
              <surname>Chua</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Low</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Lalloo</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Pham</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Cafazzo</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Briggs</surname>
              <given-names>AM</given-names>
            </name>
          </person-group>
          <article-title>Evaluation of Digital Technologies Tailored to Support Young People's Self-Management of Musculoskeletal Pain: Mixed Methods Study</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>06</month>
          <day>05</day>
          <volume>22</volume>
          <issue>6</issue>
          <fpage>e18315</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/6/e18315/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/18315</pub-id>
          <pub-id pub-id-type="medline">32442143</pub-id>
          <pub-id pub-id-type="pii">v22i6e18315</pub-id>
          <pub-id pub-id-type="pmcid">PMC7305555</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tabi</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Randhawa</surname>
              <given-names>AS</given-names>
            </name>
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Mithani</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Albers</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Schnieder</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Nikoo</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Vigo</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Jang</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Demlova</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Krausz</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Mobile Apps for Medication Management: Review and Analysis</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2019</year>
          <month>09</month>
          <day>11</day>
          <volume>7</volume>
          <issue>9</issue>
          <fpage>e13608</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2019/9/e13608/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/13608</pub-id>
          <pub-id pub-id-type="medline">31512580</pub-id>
          <pub-id pub-id-type="pii">v7i9e13608</pub-id>
          <pub-id pub-id-type="pmcid">PMC6786858</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kotz</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>A threat taxonomy for mHealth privacy</article-title>
          <year>2011</year>
          <conf-name>2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)</conf-name>
          <conf-date>January 4-8, 2011</conf-date>
          <conf-loc>Bangalore, Karnataka, India</conf-loc>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>IEEE</publisher-name>
          <fpage>1</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.1109/COMSNETS.2011.5716518</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Atienza</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>Zarcadoolas</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Vaughon</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Hughes</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Patel</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Chou</surname>
              <given-names>WS</given-names>
            </name>
            <name name-style="western">
              <surname>Pritts</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Consumer Attitudes and Perceptions on mHealth Privacy and Security: Findings From a Mixed-Methods Study</article-title>
          <source>J Health Commun</source>
          <year>2015</year>
          <volume>20</volume>
          <issue>6</issue>
          <fpage>673</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1080/10810730.2015.1018560</pub-id>
          <pub-id pub-id-type="medline">25868685</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Peng</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Kanthawala</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Yuan</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Hussain</surname>
              <given-names>SA</given-names>
            </name>
          </person-group>
          <article-title>A qualitative study of user perceptions of mobile health apps</article-title>
          <source>BMC Public Health</source>
          <year>2016</year>
          <month>11</month>
          <day>14</day>
          <volume>16</volume>
          <issue>1</issue>
          <fpage>1158</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcpublichealth.biomedcentral.com/articles/10.1186/s12889-016-3808-0"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12889-016-3808-0</pub-id>
          <pub-id pub-id-type="medline">27842533</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12889-016-3808-0</pub-id>
          <pub-id pub-id-type="pmcid">PMC5109835</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Bao</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Watzlaf</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Parmanto</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Barriers to and Facilitators of the Use of Mobile Health Apps From a Security Perspective: Mixed-Methods Study</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2019</year>
          <month>04</month>
          <day>16</day>
          <volume>7</volume>
          <issue>4</issue>
          <fpage>e11223</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://mhealth.jmir.org/2019/4/e11223/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/11223</pub-id>
          <pub-id pub-id-type="medline">30990458</pub-id>
          <pub-id pub-id-type="pii">v7i4e11223</pub-id>
          <pub-id pub-id-type="pmcid">PMC6488955</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Quevedo Rodríguez</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Wägner</surname>
              <given-names>AM</given-names>
            </name>
          </person-group>
          <article-title>Mobile phone applications for diabetes management: A systematic review</article-title>
          <source>Endocrinol Diabetes Nutr</source>
          <year>2019</year>
          <month>05</month>
          <volume>66</volume>
          <issue>5</issue>
          <fpage>330</fpage>
          <lpage>337</lpage>
          <pub-id pub-id-type="doi">10.1016/j.endinu.2018.11.005</pub-id>
          <pub-id pub-id-type="medline">30745121</pub-id>
          <pub-id pub-id-type="pii">S2530-0164(19)30002-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Leigh</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ouyang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Mimnagh</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Effective? Engaging? Secure? Applying the ORCHA-24 framework to evaluate apps for chronic insomnia disorder</article-title>
          <source>Evid Based Ment Health</source>
          <year>2017</year>
          <month>11</month>
          <volume>20</volume>
          <issue>4</issue>
          <fpage>e20</fpage>
          <pub-id pub-id-type="doi">10.1136/eb-2017-102751</pub-id>
          <pub-id pub-id-type="medline">28947676</pub-id>
          <pub-id pub-id-type="pii">eb-2017-102751</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Powell</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Torous</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>The Complexity of Mental Health App Privacy Policies: A Potential Barrier to Privacy</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2018</year>
          <month>07</month>
          <day>30</day>
          <volume>6</volume>
          <issue>7</issue>
          <fpage>e158</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2018/7/e158/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.9871</pub-id>
          <pub-id pub-id-type="medline">30061090</pub-id>
          <pub-id pub-id-type="pii">v6i7e158</pub-id>
          <pub-id pub-id-type="pmcid">PMC6090172</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Knorr</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Aspinall</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Wolters</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps</article-title>
          <source>ICT Systems Security and Privacy Protection. SEC 2015. IFIP Advances in Information and Communication Technology (Vol. 455)</source>
          <year>2015</year>
          <conf-name>SEC 2015: 30th IFIP TC 11 International Conference</conf-name>
          <conf-date>May 26-28, 2015</conf-date>
          <conf-loc>Hamburg, Germany</conf-loc>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>571</fpage>
          <lpage>584</lpage>
          <pub-id pub-id-type="doi">10.1007/978-3-319-18467-8_38</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Huckvale</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Torous</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Larsen</surname>
              <given-names>ME</given-names>
            </name>
          </person-group>
          <article-title>Assessment of the Data Sharing and Privacy Practices of Smartphone Apps for Depression and Smoking Cessation</article-title>
          <source>JAMA Netw Open</source>
          <year>2019</year>
          <month>04</month>
          <day>05</day>
          <volume>2</volume>
          <issue>4</issue>
          <fpage>e192542</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://jamanetwork.com/journals/jamanetworkopen/fullarticle/10.1001/jamanetworkopen.2019.2542"/>
          </comment>
          <pub-id pub-id-type="doi">10.1001/jamanetworkopen.2019.2542</pub-id>
          <pub-id pub-id-type="medline">31002321</pub-id>
          <pub-id pub-id-type="pii">2730782</pub-id>
          <pub-id pub-id-type="pmcid">PMC6481440</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bachiri</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Idri</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Fernández-Alemán</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Toval</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Evaluating the Privacy Policies of Mobile Personal Health Records for Pregnancy Monitoring</article-title>
          <source>J Med Syst</source>
          <year>2018</year>
          <month>06</month>
          <day>29</day>
          <volume>42</volume>
          <issue>8</issue>
          <fpage>144</fpage>
          <pub-id pub-id-type="doi">10.1007/s10916-018-1002-x</pub-id>
          <pub-id pub-id-type="medline">29959535</pub-id>
          <pub-id pub-id-type="pii">10.1007/s10916-018-1002-x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Papageorgiou</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Strigkos</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Politou</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Alepis</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Solanas</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Patsakis</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice</article-title>
          <source>IEEE Access</source>
          <year>2018</year>
          <volume>6</volume>
          <fpage>9390</fpage>
          <lpage>9403</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2018.2799522</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Minen</surname>
              <given-names>MT</given-names>
            </name>
            <name name-style="western">
              <surname>Stieglitz</surname>
              <given-names>EJ</given-names>
            </name>
            <name name-style="western">
              <surname>Sciortino</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Torous</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Privacy Issues in Smartphone Applications: An Analysis of Headache/Migraine Applications</article-title>
          <source>Headache</source>
          <year>2018</year>
          <month>07</month>
          <volume>58</volume>
          <issue>7</issue>
          <fpage>1014</fpage>
          <lpage>1027</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/29974470"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/head.13341</pub-id>
          <pub-id pub-id-type="medline">29974470</pub-id>
          <pub-id pub-id-type="pmcid">PMC6347475</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Benjumea</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ropero</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Rivera-Romero</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Dorronzoro-Zubiete</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Carrasco</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Privacy Assessment in Mobile Health Apps: Scoping Review</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2020</year>
          <month>07</month>
          <day>02</day>
          <volume>8</volume>
          <issue>7</issue>
          <fpage>e18868</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2020/7/e18868/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/18868</pub-id>
          <pub-id pub-id-type="medline">32459640</pub-id>
          <pub-id pub-id-type="pii">v8i7e18868</pub-id>
          <pub-id pub-id-type="pmcid">PMC7367524</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hutton</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Price</surname>
              <given-names>BA</given-names>
            </name>
            <name name-style="western">
              <surname>Kelly</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>McCormick</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Bandara</surname>
              <given-names>AK</given-names>
            </name>
            <name name-style="western">
              <surname>Hatzakis</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Meadows</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Nuseibeh</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Assessing the Privacy of mHealth Apps for Self-Tracking: Heuristic Evaluation Approach</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2018</year>
          <month>10</month>
          <day>22</day>
          <volume>6</volume>
          <issue>10</issue>
          <fpage>e185</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://mhealth.jmir.org/2018/10/e185/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.9217</pub-id>
          <pub-id pub-id-type="medline">30348623</pub-id>
          <pub-id pub-id-type="pii">v6i10e185</pub-id>
          <pub-id pub-id-type="pmcid">PMC6231850</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Benjumea</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ropero</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Rivera-Romero</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Dorronzoro-Zubiete</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Carrasco</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Assessment of the Fairness of Privacy Policies of Mobile Health Apps: Scale Development and Evaluation in Cancer Apps</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2020</year>
          <month>07</month>
          <day>28</day>
          <volume>8</volume>
          <issue>7</issue>
          <fpage>e17134</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2020/7/e17134/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/17134</pub-id>
          <pub-id pub-id-type="medline">32720913</pub-id>
          <pub-id pub-id-type="pii">v8i7e17134</pub-id>
          <pub-id pub-id-type="pmcid">PMC7420637</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>National Information Security Standardization Technical Committee</collab>
          </person-group>
          <source>Information security technology: Personal information security specification (GB/<italic>t</italic> 35273-2020)</source>
          <year>2020</year>
          <access-date>2020-12-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.chinesestandard.net/PDF/English.aspx/GBT35273-2020">https://www.chinesestandard.net/PDF/English.aspx/GBT35273-2020</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>China Internet Network Information Center</collab>
          </person-group>
          <source>Statistical Report on China Internet Development: Secondary Statistical Report on China Internet Development</source>
          <year>2020</year>
          <month>4</month>
          <day>28</day>
          <access-date>2020-12-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.cac.gov.cn/2020-04/27/c_1589535470378587.htm">http://www.cac.gov.cn/2020-04/27/c_1589535470378587.htm</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>AppInChina</collab>
          </person-group>
          <source>The AppInChina App Store Index</source>
          <year>2020</year>
          <month>7</month>
          <day>8</day>
          <access-date>2020-12-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.appinchina.co/market/app-stores/">https://www.appinchina.co/market/app-stores/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Tencent</collab>
          </person-group>
          <source>Tencent My App</source>
          <access-date>2020-12-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://android.myapp.com/">https://android.myapp.com/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Huawei</collab>
          </person-group>
          <source>Huawei App Market</source>
          <access-date>2020-12-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://app.hicloud.com/">http://app.hicloud.com/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>BBK Electronics</collab>
          </person-group>
          <source>Oppo Software Store</source>
          <access-date>2020-12-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://store.oppomobile.com/">https://store.oppomobile.com/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Qihoo 360</collab>
          </person-group>
          <source>360 Mobile Assistant</source>
          <access-date>2020-12-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://zhushou.360.cn/">http://zhushou.360.cn/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Research on user privacy protection policies of health apps - based on information security technology - personal information security specification [in Chinese]</article-title>
          <source>Libr Tribune</source>
          <year>2019</year>
          <volume>39</volume>
          <issue>12</issue>
          <fpage>109</fpage>
          <lpage>18</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Lum</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Car</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Medication Management Apps for Diabetes: Systematic Assessment of the Transparency and Reliability of Health Information Dissemination</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2020</year>
          <month>02</month>
          <day>19</day>
          <volume>8</volume>
          <issue>2</issue>
          <fpage>e15364</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2020/2/e15364/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/15364</pub-id>
          <pub-id pub-id-type="medline">32130163</pub-id>
          <pub-id pub-id-type="pii">v8i2e15364</pub-id>
          <pub-id pub-id-type="pmcid">PMC7057820</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Robillard</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Feng</surname>
              <given-names>TL</given-names>
            </name>
            <name name-style="western">
              <surname>Sporn</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Lai</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lo</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ta</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Nadler</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Availability, readability, and content of privacy policies and terms of agreements of mental health apps</article-title>
          <source>Internet Interv</source>
          <year>2019</year>
          <month>09</month>
          <volume>17</volume>
          <fpage>100243</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2214-7829(18)30016-2"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.invent.2019.100243</pub-id>
          <pub-id pub-id-type="medline">30949436</pub-id>
          <pub-id pub-id-type="pii">S2214-7829(18)30016-2</pub-id>
          <pub-id pub-id-type="pmcid">PMC6430038</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Das</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Cheung</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Nebeker</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Bietz</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bloss</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Privacy Policies for Apps Targeted Toward Youth: Descriptive Analysis of Readability</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2018</year>
          <month>01</month>
          <day>04</day>
          <volume>6</volume>
          <issue>1</issue>
          <fpage>e3</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2018/1/e3/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.7626</pub-id>
          <pub-id pub-id-type="medline">29301737</pub-id>
          <pub-id pub-id-type="pii">v6i1e3</pub-id>
          <pub-id pub-id-type="pmcid">PMC5773816</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>The National People's Congress of the People's Republic of China</collab>
          </person-group>
          <source>The draft of personal information protection law and other draft laws are open for comments</source>
          <access-date>2020-12-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.npc.gov.cn/npc/c30834/202010/9f67b926535948719c2a0b0220dce9ed.shtml">http://www.npc.gov.cn/npc/c30834/202010/9f67b926535948719c2a0b0220dce9ed.shtml</ext-link>
          </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
