{"id":8687,"date":"2022-04-21T00:43:34","date_gmt":"2022-04-21T00:43:34","guid":{"rendered":"https:\/\/ncjolt.org\/?p=8687"},"modified":"2022-04-21T01:13:44","modified_gmt":"2022-04-21T01:13:44","slug":"this-is-no-ovary-action-femtech-apps-need-strongerregulations-to-protect-data-and-advance-publichealth-goals","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/articles\/volume-23\/volume-23-issue-3\/this-is-no-ovary-action-femtech-apps-need-strongerregulations-to-protect-data-and-advance-publichealth-goals\/","title":{"rendered":"THIS IS NO OVARY-ACTION: FEMTECH APPS NEED STRONGERREGULATIONS TO PROTECT DATA AND ADVANCE PUBLIC HEALTH GOALS"},"content":{"rendered":"<a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2022\/04\/NC-JOLT-Vol-23.3_636-668_Scatterday.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\" data-mobile-width=\"500\"  data-scrollbar=\"none\" data-download=\"off\" data-tracking=\"on\" data-newwindow=\"on\" data-pagetextbox=\"off\" data-scrolltotop=\"off\" data-startzoom=\"100\" data-startfpzoom=\"100\" data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">NC-JOLT-Vol-23.3_636-668_Scatterday<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><em>Millions of people download and use \u201cfemtech,\u201d or female technology, applications to track patterns in their reproductive health, including menstruation and fertility. The market for femtech apps is projected to experience rapid growth over the next decade. Despite the highly sensitive, intimate nature of data collected by femtech apps, U.S. privacy law leaves these apps largely unregulated. Recent investigations reveal that femtech app developers have misled users about their privacy policies, left user accounts vulnerable to security threats, and sold user data to advertisers and other third parties without notice or consent. Femtech app users urgently need legal solutions that strengthen privacy protections; however, along with maintaining data privacy, proposed actions should also address ways to use data collected by femtech apps to fill critical gaps in women\u2019s health research.<\/em><\/p>\n\n\n\n<p><strong>Author: Allysan Scatterday<\/strong><\/p>\n\n\n\n<p><strong>PDF:<\/strong>&nbsp;http:\/\/journals.law.unc.edu\\\/ncjolt\/wp-content\/uploads\/sites\/4\/2022\/04\/NC-JOLT-Vol-23.3_636-668_Scatterday.pdf<\/p>\n\n\n\n<p><strong>Volume 23, Issue 3<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Millions of people download and use \u201cfemtech,\u201d or female technology, applications to track patterns in their reproductive health, including menstruation and fertility. The market for femtech apps is projected to experience rapid growth over the next decade. Despite the highly sensitive, intimate nature of data collected by femtech apps, U.S. privacy law leaves these apps <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/articles\/volume-23\/volume-23-issue-3\/this-is-no-ovary-action-femtech-apps-need-strongerregulations-to-protect-data-and-advance-publichealth-goals\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[370],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/8687"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=8687"}],"version-history":[{"count":2,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/8687\/revisions"}],"predecessor-version":[{"id":8707,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/8687\/revisions\/8707"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=8687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=8687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=8687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}