facebook_pixel

Hello! I’m Roy of Person Centered Tech. We know that you want to focus on your clients, so we provide articles, tools, and continuing education on how to best serve clients in the digital world.

(Sign up for other free articles addressing topics such as: telemental health, HIPAA, and practical technology tools!)


Windows and Macintosh computers allow you to make separate user accounts for everyone who might use the device. The Windows Surface tablet also allows this. So wherever you can make separate accounts for people, you should do so.

Keeping It Separated

There are a couple advantages to creating unique user accounts for everyone who might use a computer:

  1. People other than the clinician generally can’t access the clinician’s information.
  2. The activities of every person get logged.

Separate user accounts mean separate sets of files. If a clinician keeps healthcare files in one account, those files are unlikely to be accessed by someone logging in from another account. In fact, it can even make sense for a clinician to make one account for professional work and one for personal use.

Also, the computer does keep a record of who logs in and out of the computer (that’s why it is called “logging in.”) With separate accounts, you may be able to see if anyone is using the computer when they shouldn’t. Or if something was done on the computer that qualifies as a security incident, you may be able to see who was logged in to the computer at the time of the incident.

It’s For Software, Too

Everything your practice uses that has logins should have separate logins for every person. So it’s not just computers — it’s also software and cloud services.

Some practices still use record-keeping software that runs on a computer (as opposed to the cloud.) In these cases, everyone who uses the record-keeping software should have their own, unique login for the software.

Everyone who uses the practice’s cloud services should also have a unique login account. We’ll discuss that more in section 6.

What About Mobiles?

Unfortunately, smartphones and tablets generally don’t allow multiple user accounts. This is because these devices are designed with the intention that every adult has their own and doesn’t really share it. This isn’t always true, but it’s how the machines are designed.

Fortunately, these devices are also frequently used to access cloud services more than they are used to run apps that handle PHI directly on the device. If sharing such a device is necessary, a good measure is to avoid using apps that store information directly on the device. In addition, ensure that cloud services are logged out of before passing the device to the next person.

Person Centered Tech: we will demystify the legal and technical topics that are required of your profession and provide you with education and tools required to help make your business successful for you, and digitally safe for your clients. PCT is here to help you achieve your personal gold standard of client-centered care in privacy and security.


Person Centered Tech’s membership filters the noise of technology through education, customizable tools, expert consulting with direct answers and tried and tested recommendations to provide you with a clear, manageable pathway to provide excellence in care — all while you get your CE hours!