{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T20:03:15Z","timestamp":1773086595506,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,11,11]],"date-time":"2010-11-11T00:00:00Z","timestamp":1289433600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,11,11]]},"DOI":"10.1145\/1882992.1883020","type":"proceedings-article","created":{"date-parts":[[2010,11,12]],"date-time":"2010-11-12T14:38:38Z","timestamp":1289572718000},"page":"191-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Privacy policies of personal health records"],"prefix":"10.1145","author":[{"given":"Lorenzo","family":"Martino","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Suchit","family":"Ahuja","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Journal of Medical Internet Research. 2008. Social uses of personal health information within PatientsLikeMe an online patient community: what can happen when patients have access to one another's data. Jeana H Frost Michael P Massagli Volume: 10 Issue: 3 Pages: e15 PubMed ID: 18504244  Journal of Medical Internet Research. 2008. Social uses of personal health information within PatientsLikeMe an online patient community: what can happen when patients have access to one another's data. Jeana H Frost Michael P Massagli Volume: 10 Issue: 3 Pages: e15 PubMed ID: 18504244","DOI":"10.2196\/jmir.1053"},{"key":"e_1_3_2_1_2_1","unstructured":"Connecting for Health. The Markle Foundation. http:\/\/www.connectingforhealth.org\/resources\/final_phwg_report1.pdf  Connecting for Health. The Markle Foundation. http:\/\/www.connectingforhealth.org\/resources\/final_phwg_report1.pdf"},{"key":"e_1_3_2_1_3_1","unstructured":"Qualys On Demand Vulnerability Management. CASE STUDY: Geisinger Health System--Bringing HIPAA Compliance to an Electronic Medical Record System. http:\/\/www.qualys.com\/docs\/geisinger.pdf  Qualys On Demand Vulnerability Management. CASE STUDY: Geisinger Health System--Bringing HIPAA Compliance to an Electronic Medical Record System. http:\/\/www.qualys.com\/docs\/geisinger.pdf"},{"key":"e_1_3_2_1_4_1","unstructured":"Center for Information Technology Leadership {CITL}. 2008. Value of Personal Health Records. Center for Information Technology Leadership. ISBN: 978-0-9800697-4-7  Center for Information Technology Leadership {CITL}. 2008. Value of Personal Health Records. Center for Information Technology Leadership. ISBN: 978-0-9800697-4-7"},{"key":"e_1_3_2_1_5_1","unstructured":"The Markle Foundation. Press Release. October 11 2005. http:\/\/www.markle.org\/resources\/press_center\/press_releases\/2005\/press_release_10112005.php  The Markle Foundation. Press Release. October 11 2005. http:\/\/www.markle.org\/resources\/press_center\/press_releases\/2005\/press_release_10112005.php"},{"key":"e_1_3_2_1_6_1","unstructured":"National Committee on Vital and Health Statistics. http:\/\/ncvhs.hhs.gov\/  National Committee on Vital and Health Statistics. http:\/\/ncvhs.hhs.gov\/"},{"key":"e_1_3_2_1_7_1","unstructured":"The Hippocratic Oath. http:\/\/www.indiana.edu\/~ancmed\/oath.htm  The Hippocratic Oath. http:\/\/www.indiana.edu\/~ancmed\/oath.htm"},{"key":"e_1_3_2_1_8_1","unstructured":"The Code of Fair Information Practices 1974. http:\/\/www.consumerprivacyguide.org\/law\/pa.shtml  The Code of Fair Information Practices 1974. http:\/\/www.consumerprivacyguide.org\/law\/pa.shtml"},{"key":"e_1_3_2_1_9_1","unstructured":"The Patient Privacy Rights Foundation. http:\/\/www.patientprivacyrights.org  The Patient Privacy Rights Foundation. http:\/\/www.patientprivacyrights.org"},{"key":"e_1_3_2_1_10_1","unstructured":"Health Insurance Portability and Accountability Act of 1996. Department of Health and Human Services. Retrieved from: http:\/\/www.cms.hhs.gov\/HIPAAGenInfo\/Downloads\/HIPAALaw.pdf  Health Insurance Portability and Accountability Act of 1996. Department of Health and Human Services. Retrieved from: http:\/\/www.cms.hhs.gov\/HIPAAGenInfo\/Downloads\/HIPAALaw.pdf"},{"key":"e_1_3_2_1_11_1","unstructured":"Gellman R. Personal Health Records: Why Many PHRs Threaten Privacy. World Privacy Forum. The World Privacy Forum - A Legal and Policy Analysis. www.worldprivacyforum.org\/  Gellman R. Personal Health Records: Why Many PHRs Threaten Privacy. World Privacy Forum. The World Privacy Forum - A Legal and Policy Analysis. www.worldprivacyforum.org\/"},{"key":"e_1_3_2_1_12_1","volume-title":"Consumer Organization Outreach TF (March 28, 2007","author":"Lisa A.","year":"2007"},{"key":"e_1_3_2_1_13_1","unstructured":"San Diego Tribune. 2008. Health records shared online pose dilemma. Keith Darc\u00e9. March 5 2008. http:\/\/www.signonsandiego.com\/uniontrib\/20080305\/news_1n5web.html  San Diego Tribune. 2008. Health records shared online pose dilemma. Keith Darc\u00e9. March 5 2008. http:\/\/www.signonsandiego.com\/uniontrib\/20080305\/news_1n5web.html"},{"key":"e_1_3_2_1_14_1","unstructured":"World Privacy Forum. 2008. http:\/\/www.worldprivacyforum.org\/testimony\/NCVHStestimony_092005.html  World Privacy Forum. 2008. http:\/\/www.worldprivacyforum.org\/testimony\/NCVHStestimony_092005.html"},{"key":"e_1_3_2_1_15_1","unstructured":"PHRPrivacy.com. 2008. The Foundation for Healthcare Excellence. http:\/\/phrprivacy.com\/index.php?option=com_content&task=view&id=41&Itemid=139  PHRPrivacy.com. 2008. The Foundation for Healthcare Excellence. http:\/\/phrprivacy.com\/index.php?option=com_content&task=view&id=41&Itemid=139"},{"key":"e_1_3_2_1_16_1","unstructured":"Security and Privacy Issues with Health Care Information Technology. Marci Meingast Tanya Roosta Shankar Sastry. Department of Electrical Engineering and Computer Sciences University of California Berkeley. http:\/\/robotics.eecs.berkeley.edu\/~roosta\/EMBC06.pdf  Security and Privacy Issues with Health Care Information Technology. Marci Meingast Tanya Roosta Shankar Sastry. Department of Electrical Engineering and Computer Sciences University of California Berkeley. http:\/\/robotics.eecs.berkeley.edu\/~roosta\/EMBC06.pdf"},{"key":"e_1_3_2_1_17_1","unstructured":"Health Privacy Project at http:\/\/www.healthprivacy.org\/  Health Privacy Project at http:\/\/www.healthprivacy.org\/"},{"key":"e_1_3_2_1_18_1","unstructured":"Review of the Personal Health Record (PHR) Service Provider Market: Privacy and Security. ALTARUM Research. January 5 2007. http:\/\/www.hhs.gov\/healthit\/ahic\/materials\/01_07\/ce\/PrivacyReview.pdf  Review of the Personal Health Record (PHR) Service Provider Market: Privacy and Security. ALTARUM Research. January 5 2007. http:\/\/www.hhs.gov\/healthit\/ahic\/materials\/01_07\/ce\/PrivacyReview.pdf"},{"key":"e_1_3_2_1_19_1","unstructured":"Detailed PHR Privacy Report Cards. Patient Privacy Rights Foundation. 2010. http:\/\/patientprivacyrights.org\/detailed-phr-privacy-report-cards\/#MSHV  Detailed PHR Privacy Report Cards. Patient Privacy Rights Foundation. 2010. http:\/\/patientprivacyrights.org\/detailed-phr-privacy-report-cards\/#MSHV"},{"key":"e_1_3_2_1_20_1","unstructured":"User Centric. 2010. http:\/\/www.usercentric.com\/publications\/2009\/02\/02\/google-health-vs-microsoft-healthvault-consumers-compare-online-personal-hea  User Centric. 2010. http:\/\/www.usercentric.com\/publications\/2009\/02\/02\/google-health-vs-microsoft-healthvault-consumers-compare-online-personal-hea"},{"issue":"7","key":"e_1_3_2_1_21_1","first-page":"64A","article-title":"The Role of the Personal Health Record in the EHR","volume":"76","author":"e-HIM Personal Health Record Work Group","year":"2005","journal-title":"Journal of AHIMA"},{"key":"e_1_3_2_1_22_1","unstructured":"The HITECH Act and HIPAA. 2010. HIPAA Survival Guide. http:\/\/www.hipaasurvivalguide.com\/hipaa-survival-guide-21.php  The HITECH Act and HIPAA. 2010. HIPAA Survival Guide. http:\/\/www.hipaasurvivalguide.com\/hipaa-survival-guide-21.php"},{"key":"e_1_3_2_1_23_1","unstructured":"HITECH Act -- Interim Final Rule. 2009. http:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/administrative\/enforcementrule\/enfifr.pdf  HITECH Act -- Interim Final Rule. 2009. http:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/administrative\/enforcementrule\/enfifr.pdf"}],"event":{"name":"IHI '10: ACM International Health Informatics Symposium","location":"Arlington Virginia USA","acronym":"IHI '10","sponsor":["SIGHIT ACM Special Interest Group on Health Informatics"]},"container-title":["Proceedings of the 1st ACM International Health Informatics Symposium"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1882992.1883020","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1882992.1883020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:11Z","timestamp":1750243931000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1882992.1883020"}},"subtitle":["an evaluation of their effectiveness in protecting patient information"],"short-title":[],"issued":{"date-parts":[[2010,11,11]]},"references-count":23,"alternative-id":["10.1145\/1882992.1883020","10.1145\/1882992"],"URL":"https:\/\/doi.org\/10.1145\/1882992.1883020","relation":{},"subject":[],"published":{"date-parts":[[2010,11,11]]},"assertion":[{"value":"2010-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}