Skip to main content
. 2019 Dec 16;7(12):e16391. doi: 10.2196/16391

Table 1.

Use cases and characteristics of each protocol version.

Characteristic Version 1.0 Version 2.0 Version 3.0
Use case Exploratory testing of platform capabilities Small-scale study Study requiring scalability
Interactive time 30-60 minutes
Lowest level of automation
20-30 minutes 5-10 minutes
Highest level of automation
Requirements Minimum financial investment
Study team Apple ID for each phone
Participants must have home Wi-Fi
USB connection required to reset PIN-locked phone
In addition to previous requirements:
Apple Mac computer running Apple Configurator software
Low-cost SIMs without cellular service
Apple Mac computer running Apple Configurator software
Apple Business Manager (free)
Mobile Device Management (subscription fee)
Cellular plan for each loaner phone
Features Unrestricted Apple App Store
Activation Lock to prevent circumventing security measures by factory reset
Find My iPhone GPS tracking to reduce the risk of theft
iOS restrictions to disable iCloud and prevent inadvertent sharing of PHIa
Increased consistency in configuration due to automation Apple Device Enrollment Program to prevent circumventing security measures by factory reset
Lost Mode GPS tracking to reduce the risk of theft
Mobile Device Management policies to disable iCloud and prevent inadvertent sharing of PHI
Limitations Manual (error-prone) configuration of all features and app installation
Insertion and removal of SIM card required to activate phones after each reset
Find My iPhone not helpful outside of Wi-Fi range
Manual configuration of Apple ID and app installation
Find My iPhone not helpful outside of Wi-Fi range
Apple Configurator unable to share configuration profiles with other computers—single team member performs all setup
Apple Configurator required for first-time configuration of each loaner phone

aPHI: protected health information.