<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JFR</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Form Res</journal-id>
      <journal-title>JMIR Formative Research</journal-title>
      <issn pub-type="epub">2561-326X</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v5i3e17456</article-id>
      <article-id pub-id-type="pmid">33729163</article-id>
      <article-id pub-id-type="doi">10.2196/17456</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Viewpoint</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Viewpoint</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Mind Your Data: Privacy and Legal Matters in eHealth</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Seeman</surname>
            <given-names>Neil</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>S</surname>
            <given-names>Dr. Venkatesan</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Abdelhamid</surname>
            <given-names>Mohamed</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Zegers</surname>
            <given-names>Catharina M L</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff2" ref-type="aff">2</xref>
          <address>
            <institution>Institute of Data Science</institution>
            <institution>Maastricht University</institution>
            <addr-line>Paul-Henri Spaaklaan 1</addr-line>
            <addr-line>Maastricht, 6229 ER</addr-line>
            <country>Netherlands</country>
            <phone>31 43 388 4996</phone>
            <email>karen.zegers@maastrichtuniversity.nl</email>
          </address>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-9772-0869</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Witteveen</surname>
            <given-names>Annemieke</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff4" ref-type="aff">4</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-5581-6478</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Schulte</surname>
            <given-names>Mieke H J</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff5" ref-type="aff">5</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-4295-1141</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Henrich</surname>
            <given-names>Julia F</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff6" ref-type="aff">6</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6659-3994</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Vermeij</surname>
            <given-names>Anouk</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff7" ref-type="aff">7</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-4637-1654</ext-link>
        </contrib>
        <contrib id="contrib6" contrib-type="author">
          <name name-style="western">
            <surname>Klever</surname>
            <given-names>Brigit</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff8" ref-type="aff">8</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-8789-1296</ext-link>
        </contrib>
        <contrib id="contrib7" contrib-type="author">
          <name name-style="western">
            <surname>Dekker</surname>
            <given-names>Andre</given-names>
          </name>
          <degrees>Prof Dr</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-0422-7996</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Digital Society Health &#38; Well-being</institution>
        <addr-line>The Hague</addr-line>
        <country>Netherlands</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Institute of Data Science</institution>
        <institution>Maastricht University</institution>
        <addr-line>Maastricht</addr-line>
        <country>Netherlands</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Department of Radiation Oncology (MAASTRO)</institution>
        <institution>GROW - School for Oncology and Development Biology</institution>
        <institution>Maastricht University Medical Centre</institution>
        <addr-line>Maastricht</addr-line>
        <country>Netherlands</country>
      </aff>
      <aff id="aff4">
        <label>4</label>
        <institution>Department of Biomedical Signals and Systems</institution>
        <institution>TechMed Centre</institution>
        <institution>University of Twente</institution>
        <addr-line>Enschede</addr-line>
        <country>Netherlands</country>
      </aff>
      <aff id="aff5">
        <label>5</label>
        <institution>Department of Clinical, Neuro and Developmental Psychology</institution>
        <institution>Vrije Universiteit</institution>
        <addr-line>Amsterdam</addr-line>
        <country>Netherlands</country>
      </aff>
      <aff id="aff6">
        <label>6</label>
        <institution>Unit of Health, Medical and Neuropsychology</institution>
        <institution>Institute of Psychology</institution>
        <institution>Leiden University</institution>
        <addr-line>Leiden</addr-line>
        <country>Netherlands</country>
      </aff>
      <aff id="aff7">
        <label>7</label>
        <institution>Department of Cognitive Neuropsychology</institution>
        <institution>Tilburg University</institution>
        <addr-line>Tilburg</addr-line>
        <country>Netherlands</country>
      </aff>
      <aff id="aff8">
        <label>8</label>
        <institution>University Medical Center</institution>
        <institution>University of Groningen</institution>
        <addr-line>Groningen</addr-line>
        <country>Netherlands</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Catharina M L Zegers <email>karen.zegers@maastrichtuniversity.nl</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>3</month>
        <year>2021</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>17</day>
        <month>3</month>
        <year>2021</year>
      </pub-date>
      <volume>5</volume>
      <issue>3</issue>
      <elocation-id>e17456</elocation-id>
      <history>
        <date date-type="received">
          <day>13</day>
          <month>12</month>
          <year>2019</year>
        </date>
        <date date-type="rev-request">
          <day>30</day>
          <month>3</month>
          <year>2020</year>
        </date>
        <date date-type="rev-recd">
          <day>1</day>
          <month>5</month>
          <year>2020</year>
        </date>
        <date date-type="accepted">
          <day>17</day>
          <month>1</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Catharina M L Zegers, Annemieke Witteveen, Mieke H J Schulte, Julia F Henrich, Anouk Vermeij, Brigit Klever, Andre Dekker. Originally published in JMIR Formative Research (http://formative.jmir.org), 17.03.2021.</copyright-statement>
      <copyright-year>2021</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Formative Research, is properly cited. The complete bibliographic information, a link to the original publication on http://formative.jmir.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://formative.jmir.org/2021/3/e17456" xlink:type="simple"/>
      <abstract>
        <p>The health care sector can benefit considerably from developments in digital technology. Consequently, eHealth applications are rapidly increasing in number and sophistication. For successful development and implementation of eHealth, it is paramount to guarantee the privacy and safety of patients and their collected data. At the same time, anonymized data that are collected through eHealth could be used in the development of innovative and personalized diagnostic, prognostic, and treatment tools. To address the needs of researchers, health care providers, and eHealth developers for more information and practical tools to handle privacy and legal matters in eHealth, the Dutch national Digital Society Research Programme organized the “Mind Your Data: Privacy and Legal Matters in eHealth” conference. In this paper, we share the key take home messages from the conference based on the following five tradeoffs: (1) privacy versus independence, (2) informed consent versus convenience, (3) clinical research versus clinical routine data, (4) responsibility and standardization, and (5) privacy versus solidarity.</p>
      </abstract>
      <kwd-group>
        <kwd>data</kwd>
        <kwd>privacy</kwd>
        <kwd>eHealth</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec>
      <title>The Digital Society Program</title>
      <p>The Association of Universities in the Netherlands (VSNU) has brought together scientists from all 14 universities in the Netherlands to address the pressing questions raised by the emergence of a digital society. Exploring the responsible use of innovative digital technologies in the health care sector has high societal priority because of the potential to significantly improve health care and reduce health care costs. The Health &#38; Well-Being program line of the VNSU Digital Society Research Programme aims to develop, evaluate, and implement integrated and personalized digital health care solutions, while addressing the societal challenges raised by the digitalization of health care.</p>
      <p>Decelerating factors in the development and implementation of eHealth are a lack of knowledge, information, and practical tools with respect to handling privacy and legal matters. To discuss these factors, the Digital Society Health &#38; Well-Being team organized a conference on September 26, 2019 titled “Mind Your Data: Privacy and Legal Matters in eHealth” with the aim to learn from each other’s approaches to tackle privacy and legal matters in the development of eHealth.</p>
      <p>The conference hosted five speakers who were selected based on their unique backgrounds (law, eHealth, data science, philosophy, and mobile health [mHealth]), vision, and expertise on privacy and legal issues in eHealth. Marie-José Bonthuis is an external privacy lawyer who is connected to the Medical Biobank Lifelines and to the University Medical Center Groningen. Furthermore, she is an expert in the Health Research Infrastructure initiative (Health-RI) service desk for ethical, legal, and societal questions related to personalized medicine and next-generation sequencing. Dr. Bonthuis presented a talk titled “Overview of data protection principles in research: bringing practice and legislation together.” Niels Chavannes is a professor of Public Health and Primary Care at Leiden University Medical Centre, a general practitioner, and the founder of the National eHealth living lab (NeLL). Professor Chavannes presented a talk titled “Clinical implementation of successful eHealth initiatives: ethical and legal issues.” Andre Dekker is the professor of Clinical Data Science at Maastricht University, Maastricht University Medical Center+, and MAASTRO Clinic. Professor Dekker presented a talk titled “The personal health train: privacy preserving learning from health data.” Peter Paul Verbeek is the professor of Philosophy of Technology and scientific codirector of DesignLab of the University of Twente. In addition, he is an honorary professor of Techno-Anthropology at Aalborg University and chair of the UNESCO World Commission for the Ethics of Science and Technology. Professor Verbeek shared his perspective in a talk titled “Privacy and beyond: inclusive digitalisation and the dynamics of privacy.” Finally, Edward Watkins is the professor of Experimental and Applied Clinical Psychology at the University of Exeter. Professor Watkins presented a talk titled “ECoWeB – mental health app for young people data and governance issues.”</p>
      <p>More than 100 participants from a wide range of organizations (universities, medical centers, knowledge institutes, private parties, citizens, and government) attended the conference. Three independent authors noted down specific points that were expressed during the presentations, panel discussion, and eHealth forum. These notes were compared, sorted in categories, and juxtaposed in a way that the ethical challenges clearly emerged. Solutions provided by speakers were described; otherwise, clarification was provided by the authors of the paper. This resulted in our summary of the most prominent ethical-, technical-, and research-related issues in eHealth and their potential solutions.</p>
    </sec>
    <sec>
      <title>Privacy Versus Independence</title>
      <p>There is no straightforward answer for the best way to address privacy issues in eHealth. For each eHealth application, there should be a balance between individual privacy and potential individual or societal benefit. Data protection is all about contextual integrity; that is, using data responsibly within a specific context. Take for example the development of an mHealth approach to assess and enhance emotional competence for well-being in the young (ECoWeB project) [<xref ref-type="bibr" rid="ref1">1</xref>]. In this project, young people expressed their reluctance to share passive sensor data and preferred to be in control of the data they would like to release. In this situation, an active approach to gather data (eg, by questionnaires) is most suitable. By contrast, the use of cameras, a more privacy-intrusive method, is more likely to be accepted in smart homes for people with dementia, since the benefit for the user is larger, as people could have the opportunity to stay at home for a longer time [<xref ref-type="bibr" rid="ref2">2</xref>]. This is in agreement with Wilkowska et al [<xref ref-type="bibr" rid="ref3">3</xref>], who showed that female patients and healthy adults insist on higher security and privacy standards, whereas people with ailing health consider privacy of lower importance. End users seem to be willing to tradeoff part of their privacy for the benefit of, for example, independence.</p>
      <p>To gain insight into this tradeoff, user preferences, and needs, it is essential to include the end user in the design of eHealth at an early stage of development. This should provide an understanding as to what extent the user is willing to share data and for what purpose. During the conference, this was exemplified by the ECoWeB project [<xref ref-type="bibr" rid="ref1">1</xref>] in which co-design with young people was critical. The data collection and recruitment are fully online processes, and the use of data is transparent and clear to the users. Previous research has shown that the uptake of eHealth and mHealth is only successful when they are built to fulfill a certain need of either patients or health care providers [<xref ref-type="bibr" rid="ref4">4</xref>]. The early involvement of clinicians and patients will encourage adoption and maximize the positive impact of an intervention [<xref ref-type="bibr" rid="ref5">5</xref>]. An example of a dedicated approach to develop and evaluate eHealth is the Centre for eHealth and Wellbeing Research roadmap developed by van Gemert et al [<xref ref-type="bibr" rid="ref6">6</xref>], which focuses on user participation and process evaluation.</p>
    </sec>
    <sec>
      <title>Informed Consent Versus Convenience</title>
      <p>eHealth research generally includes an informed consent procedure for use and accessibility of data. This can potentially be done by digital authentication, including, for example, parental consent and age verification. However, during the conference’s panel discussion, the issue about how elaborate digital informed consent should be arose. The panelists concluded that there should be a balance between simple, convenient, and easy to understand versus fully complete. This tradeoff is similar to a paper-based consent procedure. Nevertheless, there seems to be a striking difference between the requirements for informed consent of eHealth in comparison to commercial applications. An editorial published in <italic>Nature</italic> [<xref ref-type="bibr" rid="ref7">7</xref>] also addressed this issue, stating that the consent for commercial mobile applications is often not more than a box to tick, with terms and conditions that are hardly ever read by the users.</p>
      <p>In addition to informed consent, it is highly important to address the expectations of the eHealth app. This includes information on the procedure for incidental findings, such as whether or not the user wants to be actively informed or what can be expected with regard to automated messaging/triggering the health care provider for actions in the case of a monitoring app. Providing this additional information might limit possible overexpectations of users of the app.</p>
    </sec>
    <sec>
      <title>Clinical Research Versus Clinical Routine Data</title>
      <p>Data obtained after informed consent are only available from a small population of people that are registered for clinical research or use a specific eHealth app. By contrast, general registries collect data from a large number of patients, but the information is limited to demographics and a small selection of clinical variables. Another data source is clinical routine data, which contains the largest amount of clinically relevant information. One could think of a “patients like me” approach, where we can learn from existing data worldwide to find a similar patient. Unfortunately, clinical routine data are very hard to collect centrally because they are stored in individual local databases. One of the potential solutions is the use of distributed learning. The Personal Health Train is an example of this, where the data remain at the source (eg, the hospital) in Findable, Accessible, Interoperable, Reusable (FAIR) data stations, and the analysis method (eg, the algorithm) is transferred to the data. This method has been successfully implemented such as for predicting the 2-year survival of lung cancer patients using clinical data of 20,000 patients [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref9">9</xref>].</p>
      <p>To allow for the secondary use of clinical personal data, data should be made nonidentifiable or anonymous [<xref ref-type="bibr" rid="ref10">10</xref>], however, it is unclear when data are truly anonymous. Complete anonymity cannot be guaranteed if combinations of demographic data are given, and thus the question as to when data are truly anonymous remains. Many datasets that appeared to be anonymous have been released and individuals were reidentified [<xref ref-type="bibr" rid="ref11">11</xref>]. Reidentification is generally performed by media or researchers, with the aim to show that shared data are unsafe, to publish new algorithms, and show weaknesses in the databases. An example was the reidentification of an individual from an adverse events database of Health Canada, and the media were able to reidentify a deceased woman based on a match of age, location, and date of death [<xref ref-type="bibr" rid="ref12">12</xref>]. Algorithms such as k-anonymity can be used to describe the level of anonymity of datasets that plays a role in the definition of (non)identifiable personal data [<xref ref-type="bibr" rid="ref13">13</xref>]. In addition, to determine the likelihood of an individual to be correctly reidentified, Rocher et al [<xref ref-type="bibr" rid="ref11">11</xref>] proposed and validated a statistical model that was able to reidentify individuals even if the dataset was heavily incomplete. As such, if a dataset has been completely anonymized, it would be impossible to find the data of an individual who would like to withdraw consent to use their data. This is problematic if participants have been informed that they can withdraw their consent at any time [<xref ref-type="bibr" rid="ref7">7</xref>]. An additional problem occurs in research scenarios that require data to be linked across different entities (eg, linking medical data from a hospital to socioeconomic data from Statistics Netherlands). These scenarios demand separate solutions that address privacy while still enabling subject-level linking based on common information [<xref ref-type="bibr" rid="ref14">14</xref>].</p>
    </sec>
    <sec>
      <title>Responsibility and Standardization</title>
      <p>There are no straightforward answers to the questions of who is responsible for digital health apps, and how to guarantee maximal privacy and compliance with legislation. Together with multiple partners, the VSNU developed a Code of Conduct for research integrity in the Netherlands in 2018. The responsibilities have been defined at multiple levels, from the individual researcher to the boards of research institutions and the institutions as a whole [<xref ref-type="bibr" rid="ref15">15</xref>]. Researchers can also use the General Data Protection Regulation (GDPR) carwash [<xref ref-type="bibr" rid="ref16">16</xref>], a prototype of a practical flowchart that aims to guide researchers through the necessary steps to work with personal data in a GDPR-compliant manner.</p>
      <p>Moreover, it is hard for a user to determine which app is qualitatively good. The availability of health apps is increasing rapidly. Pereira-Azevedo and Venderbos [<xref ref-type="bibr" rid="ref4">4</xref>] estimated that over 300,000 medical apps were available in 2018. Medical App Checker developed by the Royal Dutch Medical Association was established as an initiative to evaluate mobile medical apps [<xref ref-type="bibr" rid="ref17">17</xref>]. Medical App Checker consists of several checklists, including one for evaluating the protection and security of personal data. Additionally, an international norm (ISO standard) is in development for health and wellness apps. This standard could be used to certify apps that meet the norms for safety, reliability, and user-friendliness based on existing quality requirements and legislation. The latter is in flux as the new EU Medical Device Regulation, which takes effect on May 2021, will set more stringent demands on medical applications.</p>
      <p>Finally, when moving from research toward the clinical implementation of eHealth, Dutch professional communities (medical specialists, medical physics, and clinical informatics) have expressed in their vision statements that they will take their responsibilities in the stimulation of the development and use of eHealth, and to assure its quality and safety.</p>
    </sec>
    <sec>
      <title>Privacy and Solidarity</title>
      <p>Technological innovations change our society rapidly and the interaction of humans with these digital innovations may also influence our perception of societal values such as privacy. The complex interactions of how innovations influence the ethical frameworks with which they are valued can be exemplified with a Google Glass study. In this study, a technological mediation approach was used to focus on the dynamics of the interaction between technologies and human values. Online discussions about Google Glass technology were investigated to evaluate how people articulate new meanings of the value of privacy [<xref ref-type="bibr" rid="ref18">18</xref>].</p>
      <p>Additionally, there are cultural differences in the way we value privacy, especially on a global scale. To account for this dynamism of values, value-sensitive and responsible design approaches should be adopted. There is also a movement toward solidarity and data donorship. Toward this end, a culturally sensitive balance should be sought between sharing (“give data and save lives“) and protection (eg, potential threat of commercial exploitation) of data.</p>
    </sec>
    <sec>
      <title>Conclusion</title>
      <p>The information presented and discussed at the conference highlighted the many tradeoffs in eHealth with regard to privacy and legal questions. To prevent potential decelerating factors in the development and implementation of eHealth, we need to be aware of these tradeoffs between (i) privacy and independence, (ii) informed consent and convenience, (iii) clinical research and clinical routine data, (iv) responsibility and standardization, and (v) privacy and solidarity. Furthermore, we need to make use of the available knowledge and tools on a national and international level, think carefully about the design of the application, and include end users at an early stage of development to reach the full potential of the eHealth technology. Clearly, there are risks associated with developments in eHealth, but rather than avoiding risks and stalling innovation, we should attempt to minimize risks while providing the greatest possible benefits to society.</p>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">ECoWeB</term>
          <def>
            <p>emotional competence for well-being in the young</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">FAIR</term>
          <def>
            <p>Findable, Accessible, Interoperable, Reusable</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">GDPR</term>
          <def>
            <p>General Data Protection Regulation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">Health-RI</term>
          <def>
            <p>Health Research Infrastructure Initiative</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">mHealth</term>
          <def>
            <p>mobile health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">VSNU</term>
          <def>
            <p>Association of Universities in the Netherlands</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>We would like to thank the VSNU, the Digital Society program coordinators (Prof I Lagendijk, Prof M de Rijke, and Prof S Wyatt), our colleagues of the Health &#38; Well-Being team and co-organizers of the conference (Prof A Brombacher, Prof A Evers, Prof E Feskens, Prof H Hermens, Prof L van Gemert-Pijnen, Prof N Maurits, Prof H Riper, Prof M Sitskoorn, Dr I Kalinauskaite, Dr J van Soest, Dr R Fijten, Dr R van der Vaart, Dr S van Dijk, Dr M Simons, Dr M Tabak, and Dr K Gehring), the speakers, including external privacy lawyer Marie-José Bonthuis, Professor of Public Health and Primary Care at Leiden University Medical Centre; general practitioner and the founder of the National eHealth living lab (NeLL) Niels Chavannes; Professor of Clinical Data Science in Maastricht Andre Dekker; Professor of Philosophy of Technology at the University of Twente and chairman of UNESCO’s World Commission on the Ethics of Scientific Knowledge and Technology Peter Paul Verbeek; and Professor of Experimental and Applied Clinical Psychology at the University of Exeter Edward Watkins. We also thank all (forum) participants at the event.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <source>ECoWeB Project</source>
          <access-date>2019-10-17</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.ecowebproject.eu/">http://www.ecowebproject.eu/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wrede</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Jansen</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Havinga</surname>
              <given-names>PJM</given-names>
            </name>
            <name name-style="western">
              <surname>Croockewit</surname>
              <given-names>JH</given-names>
            </name>
            <name name-style="western">
              <surname>van Gemert-Pijnen</surname>
              <given-names>JEWC</given-names>
            </name>
          </person-group>
          <year>2019</year>
          <conf-name>14th International Conference on Persuasive Technology</conf-name>
          <conf-date>April 9, 2019</conf-date>
          <conf-loc>Limassol, Cyprus</conf-loc>
          <fpage>43</fpage>
          <lpage>45</lpage>
          <pub-id pub-id-type="doi">10.1007/978-3-030-17287-9</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wilkowska</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Ziefle</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Privacy and data security in E-health: requirements from the user's perspective</article-title>
          <source>Health Informatics J</source>
          <year>2012</year>
          <month>09</month>
          <day>24</day>
          <volume>18</volume>
          <issue>3</issue>
          <fpage>191</fpage>
          <lpage>201</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tinyurl.com/psfsdkex"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/1460458212442933</pub-id>
          <pub-id pub-id-type="medline">23011814</pub-id>
          <pub-id pub-id-type="pii">18/3/191</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pereira-Azevedo</surname>
              <given-names>NM</given-names>
            </name>
            <name name-style="western">
              <surname>Venderbos</surname>
              <given-names>LDF</given-names>
            </name>
          </person-group>
          <article-title>eHealth and mHealth in prostate cancer detection and active surveillance</article-title>
          <source>Transl Androl Urol</source>
          <year>2018</year>
          <month>02</month>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>170</fpage>
          <lpage>181</lpage>
          <pub-id pub-id-type="doi">10.21037/tau.2017.12.22</pub-id>
          <pub-id pub-id-type="medline">29594031</pub-id>
          <pub-id pub-id-type="pii">tau-07-01-170</pub-id>
          <pub-id pub-id-type="pmcid">PMC5861289</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Shah</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Spaulding</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Xun</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Weng</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Shan</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Wongvibulsin</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Marvel</surname>
              <given-names>FA</given-names>
            </name>
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>SS</given-names>
            </name>
          </person-group>
          <article-title>The role of a clinician amid the rise of mobile health technology</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2019</year>
          <month>11</month>
          <day>01</day>
          <volume>26</volume>
          <issue>11</issue>
          <fpage>1385</fpage>
          <lpage>1388</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/31373364"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamia/ocz131</pub-id>
          <pub-id pub-id-type="medline">31373364</pub-id>
          <pub-id pub-id-type="pii">5542898</pub-id>
          <pub-id pub-id-type="pmcid">PMC6798562</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van Gemert-Pijnen</surname>
              <given-names>JEWC</given-names>
            </name>
            <name name-style="western">
              <surname>Nijland</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>van Limburg</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ossebaard</surname>
              <given-names>HC</given-names>
            </name>
            <name name-style="western">
              <surname>Kelders</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Eysenbach</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Seydel</surname>
              <given-names>ER</given-names>
            </name>
          </person-group>
          <article-title>A holistic framework to improve the uptake and impact of eHealth technologies</article-title>
          <source>J Med Internet Res</source>
          <year>2011</year>
          <month>12</month>
          <day>05</day>
          <volume>13</volume>
          <issue>4</issue>
          <fpage>e111</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2011/4/e111/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.1672</pub-id>
          <pub-id pub-id-type="medline">22155738</pub-id>
          <pub-id pub-id-type="pii">v13i4e111</pub-id>
          <pub-id pub-id-type="pmcid">PMC3278097</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <collab>Editorial</collab>
          </person-group>
          <article-title>Time to discuss consent in digital-data studies</article-title>
          <source>Nature</source>
          <year>2019</year>
          <month>08</month>
          <volume>572</volume>
          <issue>7767</issue>
          <fpage>5</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nature.com/articles/d41586-019-02322-z"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/d41586-019-02322-z</pub-id>
          <pub-id pub-id-type="medline">31367033</pub-id>
          <pub-id pub-id-type="pii">10.1038/d41586-019-02322-z</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jochems</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Deist</surname>
              <given-names>TM</given-names>
            </name>
            <name name-style="western">
              <surname>van Soest</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Eble</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bulens</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Coucke</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Dries</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Lambin</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Dekker</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Distributed learning: Developing a predictive model based on data from multiple hospitals without data leaving the hospital - A real life proof of concept</article-title>
          <source>Radiother Oncol</source>
          <year>2016</year>
          <month>12</month>
          <volume>121</volume>
          <issue>3</issue>
          <fpage>459</fpage>
          <lpage>467</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S0167-8140(16)34336-5"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.radonc.2016.10.002</pub-id>
          <pub-id pub-id-type="medline">28029405</pub-id>
          <pub-id pub-id-type="pii">S0167-8140(16)34336-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van Soest</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Mussmann</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Puts</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>van den Berg</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Malic</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>van Oppen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Towend</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Dekker</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Dumontier</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Using the personal health train for automated and privacy-preserving analytics on vertically partitioned data</article-title>
          <source>Stud Health Technol Inform</source>
          <year>2018</year>
          <volume>247</volume>
          <fpage>581</fpage>
          <lpage>585</lpage>
          <pub-id pub-id-type="medline">29678027</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chevrier</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Foufi</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Gaudet-Blavignac</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Robert</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lovis</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Use and understanding of anonymization and de-identification in the biomedical literature: scoping review</article-title>
          <source>J Med Internet Res</source>
          <year>2019</year>
          <month>05</month>
          <day>31</day>
          <volume>21</volume>
          <issue>5</issue>
          <fpage>e13484</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2019/5/e13484/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/13484</pub-id>
          <pub-id pub-id-type="medline">31152528</pub-id>
          <pub-id pub-id-type="pii">v21i5e13484</pub-id>
          <pub-id pub-id-type="pmcid">PMC6658290</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rocher</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Hendrickx</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>de Montjoye</surname>
              <given-names>YA</given-names>
            </name>
          </person-group>
          <article-title>Estimating the success of re-identifications in incomplete datasets using generative models</article-title>
          <source>Nat Commun</source>
          <year>2019</year>
          <month>07</month>
          <day>23</day>
          <volume>10</volume>
          <issue>1</issue>
          <fpage>3069</fpage>
          <pub-id pub-id-type="doi">10.1038/s41467-019-10933-3</pub-id>
          <pub-id pub-id-type="medline">31337762</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41467-019-10933-3</pub-id>
          <pub-id pub-id-type="pmcid">PMC6650473</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>El Emam</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Rodgers</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Malin</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Anonymising and sharing individual patient data</article-title>
          <source>BMJ</source>
          <year>2015</year>
          <month>03</month>
          <day>20</day>
          <volume>350</volume>
          <fpage>h1139</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/25794882"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmj.h1139</pub-id>
          <pub-id pub-id-type="medline">25794882</pub-id>
          <pub-id pub-id-type="pmcid">PMC4707567</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Samarati</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Sweeney</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Protecting privacy when disclosing information: k-anonymityits enforcement through generalization and suppression</article-title>
          <source>Data Privacy Lab De-identification Project</source>
          <year>2018</year>
          <access-date>2021-02-23</access-date>
          <publisher-name>Carnegie Mellon University</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dataprivacylab.org/dataprivacy/projects/kanonymity/index3.html">https://dataprivacylab.org/dataprivacy/projects/kanonymity/index3.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ippel</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>van Soest</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Wouters</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Malic</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Adekunle</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>van den Berg</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Mussmann</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Koster</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>van der Kallen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>van Oppen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Townend</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Dekker</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Dumontier</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>A privacy-preserving infrastructure for analyzing personal health data in a vertically partitioned scenario</article-title>
          <source>Stud Health Technol Inform</source>
          <year>2019</year>
          <month>08</month>
          <day>21</day>
          <volume>264</volume>
          <fpage>373</fpage>
          <lpage>377</lpage>
          <pub-id pub-id-type="doi">10.3233/SHTI190246</pub-id>
          <pub-id pub-id-type="medline">31437948</pub-id>
          <pub-id pub-id-type="pii">SHTI190246</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <source>Netherlands Code of Conduct for Research Integrity</source>
          <year>2018</year>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.vsnu.nl/files/documents/Netherlands%20Code%20of%20Conduct%20for%20Research%20Integrity%202018.pdf"/>
          </comment>
          <pub-id pub-id-type="doi">10.17026/dans-2cj-nvwu</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bonthuis</surname>
              <given-names>MJ</given-names>
            </name>
          </person-group>
          <source>50 misverstanden over de Algemene Verordening Gegevensbescherming</source>
          <year>2020</year>
          <publisher-loc>Deventer, Netherlands</publisher-loc>
          <publisher-name>Wolters Kluwer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="web">
          <article-title>App Checker</article-title>
          <source>Royal Dutch Medical Association (KNMG)</source>
          <access-date>2019-11-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.knmg.nl/advies-richtlijnen/knmg-publicaties/medische-app-checker.htm">https://www.knmg.nl/advies-richtlijnen/knmg-publicaties/medische-app-checker.htm</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kudina</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Verbeek</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Ethics from within: Google Glass, the Collingridge dilemma, and the mediated value of privacy</article-title>
          <source>Sci Technol Hum Values</source>
          <year>2018</year>
          <month>08</month>
          <day>21</day>
          <volume>44</volume>
          <issue>2</issue>
          <fpage>291</fpage>
          <lpage>314</lpage>
          <pub-id pub-id-type="doi">10.1177/0162243918793711</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
