Investigating Protected Health Information Leakage from Android Medical Applications

05/16/2021
by   George Grispos, et al.
0

As smartphones and smartphone applications are widely used in a healthcare context (e.g., remote healthcare), these devices and applications may need to comply with the Health Insurance Portability and Accountability Act (HIPAA) of 1996. In other words, adequate safeguards to protect the user's sensitive information (e.g., personally identifiable information and/or medical history) are required to be enforced on such devices and applications. In this study, we forensically focus on the potential of recovering residual data from Android medical applications, with the objective of providing an initial risk assessment of such applications. Our findings (e.g., documentation of the artifacts) also contribute to a better understanding of the types and location of evidential artifacts that can, potentially, be recovered from these applications in a digital forensic investigation.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/11/2019

A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices

The integration of medical devices in everyday life prompts the idea tha...
research
06/28/2019

Forensic Analysis of Third Party Location Applications in Android and iOS

Location sharing applications are becoming increasingly common. These ap...
research
12/12/2018

Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices

In recent years we have witnessed a shift towards personalized, context-...
research
08/27/2019

A Security-Aware Access Model for Data-Driven EHR System

Digital healthcare systems are very popular lately, as they provide a va...
research
08/17/2023

Watch Out! Smartwatches as criminal tool and digital forensic investigations

In the rapidly advancing technological landscape, smartwatches have mate...
research
02/24/2022

Online handwriting, signature and touch dynamics: tasks and potential applications in the field of security and health

Background: An advantageous property of behavioural signals ,e.g. handwr...
research
02/09/2014

Classification Tree Diagrams in Health Informatics Applications

Health informatics deal with the methods used to optimize the acquisitio...

Please sign up or login with your details

Forgot password? Click here to reset