How to Navigate Health App Permissions

How to Navigate Health App Permissions

An assessment of the article from Wired magazine

SUBJECTIVE: This article published in Wired magazine discusses the long tail of privacy considerations that we need to think through when installing and giving permissions to apps on our smartphones, computers, and other internet connected devices. It brings to light the many different ways in which seemingly innocent functionalities that you turn on in apps can gather a lot of information that is often unknown to the user.

 

ABSTRACT FROM THE WIRED ARTICLE:

"Thanks to FaceBook, app permissions have popped back into the public’s consciousness again. Last month it was discovered that Facebook had stored the phone logs of Android users who opted sharing their contacts in the days before Android 4.1 Jelly Bean. Then this week, during Mark Zuckerberg’s congressional testimony, two representatives asked whether Facebook might be listening to private conversations through our phone microphones and using the info to serve up eerily specific ads. Zuckerberg responded definitively to the questions about the microphone conspiracy theory—“no”—then felt the need to add that Facebook does have access to audio when people record video on their devices for Facebook. “I think that is pretty clear. But I just wanted to make sure I was exhaustive there,” he said."
"But Zuckerberg’s do-si-do with Congress, rather than being clear or exhaustive, showed that people are still genuinely confused about what data their smartphone apps can and can’t access. That’s partly because of app permissions: They’re oversimplified and designed to offer a minimal amount of information, right as they’re asking for access to your data. And while they’ve improved just as apps have, it’s not enough to match the sophistication of the data-gathering technology that now surrounds us."

 

OBJECTIVE:

This article does not provide any concrete guidance on methods for reducing the amount of access that third-party apps have to your smart devices, but it does provide a number of links to similar reports outlining how companies, services, and games such as Facebook, Pokemon Go, and travel apps such as Path. It also provides some discussion on how application platforms such as Android and iOS are now including further constraints on how developers request and maintain permissions for accessing device information.

 

ASSESSMENT:

Informative article worth reading to gain a better understanding of the reasons why we should take the time to more consciously keep track of the permissions we give applications that we use.

 

PLAN: 

Start with social networking apps that you use such as FaceBook, Twitter, Linked-In, SnapChat, and any others that you use on a frequent basis. Go into the privacy and sharing settings  and make sure that you agree with all of the permissions you are providing those applications.

Previous Article How do you control where your DNA data resides and how it is shared online?
Next Article OCR Guidance on Ensuring Equal Access to Emergency Services During Hurricane Florence
Print
22691 Rate this article:
5.0
0Upvote 0Downvote
Please login or register to post comments.

How to Protect Your Privacy as More Apps Harvest Your Data

A New York Times Personal Tech series article by Brian X. Chen

Retrieved By Health eConsultation 0 15675 Article rating: 5.0

In this article written by Brian X. Chen from the New York Times he discusses some of the potential ways in which mobile apps that you download to your phone may be collecting and using your personal data in ways you did not know.

One of the key takeaways is that there are ways in which to protect yourself and tools that can help you figure out which apps are collecting your data and how to remove their ability to do so.

Stay Private: How to Hide Your Webcam, Mute Your Mic, and Turn Off Notifications

An article from Zapier

Nathan E Botts 0 15593 Article rating: 5.0

One consideration as you gather and store more personal health information on your computer and devices is making sure that you are not inadvertently sharing this information (or some other aspect of your personal health) through your webcam or mic.

This article from Zapier outlines several different ways and some handy applications that can help you control this on your PC or MAC.

Determining the Value of Compromising Your Privacy

An article from Engadget

Nathan E Botts 0 10568 Article rating: No rating

This article from the Engadget web magazine discusses how your online searching behaviors might be monitored by different companies that you are unaware about. This data is likely used to build profiles that may impact the advertisements you see, credit ratings received, and other potential social network aspects as of yet identified. 

Sharing Sensitive Health Information: Protect Your Privacy and Improve Your Health

A guide from the Office of the National Coordinator for Health Information Technology

Nathan E Botts 0 54156 Article rating: 5.0

This 2-page ONC published graphic novel (aka comic book) is a short guide that helps illustrate why protecting your health privacy is important and issues to consider when sharing sensitive health information.

RSS

What is Health eDefense?

Health eDefense is the act of protecting your personal health information. This not only protects your privacy, security, and safety, but also protects the data of your family, friends, and others in your community.

The Health eDefense platform is dedicated to providing consumers with actionable information on how to protect their personal health information effectively from cyber threats. Health eDefense provides informational content and education related to cyber security, privacy and consent, security, and related topics and policies such as HIPAA and GDPR.

Cyber security is impacting our daily lives, and our personal and protected health information is a target for hackers and criminals looking to make money off of our personal data. Your personal health data will always be about your health, demographics, social, lifestyle, financial history, and other related details. Once taken, they cannot be taken back.

We think the best cybersecurity tool is education and awareness, and we hope to provide users with tools and insight to protect themselves and their data better.