Every computer in your dental practice handles patient data. The front desk computer holds appointment and billing records. The operatory computer accesses clinical charts and captures X-rays. The office manager’s computer runs reports that include patient names and treatment histories.
HIPAA requires specific technical safeguards on every device that creates, stores, or accesses electronic protected health information. Most dental practices have some of these in place and are missing others. Here is what each safeguard is and how to confirm it is working.

Encryption converts the data on a device into an unreadable format. Without the correct decryption key, the files are useless to anyone who accesses them without authorization. For dental workstations running Windows, BitLocker is the standard encryption tool. It encrypts the entire hard drive and requires authentication to access the data.
Encryption is particularly important for any device that could be physically removed from the office. Laptops, external hard drives used for backups, and USB drives that contain patient data all need encryption. For devices that are not encrypted, a theft or loss event is automatically a reportable HIPAA breach because the data is accessible.
HIPAA requires unique user identification, meaning every staff member must have their own username and password. Shared logins, where multiple staff members use the same credentials, violate this requirement and make audit trails impossible. When patient records are accessed, HIPAA requires being able to identify who accessed them and when. Shared logins make that identification impossible.
Setting up individual user accounts for every staff member is a basic Active Directory configuration that your IT provider handles. Each account should have access only to the systems and data relevant to that staff member’s role.
HIPAA’s automatic logoff requirement specifies that systems must automatically lock or log off after a period of inactivity. In a dental office, this typically means a screen lock after three to five minutes of inactivity on operatory and front desk computers. A screen left unattended with a patient chart open is a privacy violation and a potential compliance gap.
Screen lock policies are set through Group Policy in Windows environments and apply automatically to all workstations. Staff unlock the screen with their individual credentials, maintaining the audit trail requirement simultaneously.
Multi-Factor Authentication adds a second verification step to the login process. Even if a staff member’s password is compromised through phishing or a data breach, the attacker cannot log in without also having access to the second factor. MFA is now either required or strongly recommended under the updated HIPAA Security Rule for all access to systems containing electronic protected health information.

HIPAA requires maintaining records of who accessed patient data, when, and from which system. Audit logs are created automatically by your practice management software and operating system, but they need to be retained and reviewable. Your IT provider should confirm that audit logging is enabled and that logs are being retained for the required six-year period.
Technical safeguards on the software side are only part of the picture. Physical access to the computers themselves matters too. Server rooms or closets should be locked. Workstations should not be left unattended with screens unlocked. Decommissioned computers need to have their drives wiped or physically destroyed before disposal. Patient data that remains on a discarded hard drive is a HIPAA violation waiting to be discovered.
Every device that stores or can access patient data needs encryption. This includes all workstations, laptops, and any external drives used for backup or data transfer. Devices that have no access to patient data, such as a reception area TV or a non-networked display, do not require encryption.
Under HIPAA, theft of an unencrypted device containing patient data is a reportable breach. You must notify affected patients within 60 days, report to HHS, and if more than 500 patients are affected, notify the media. Encryption would have prevented the breach from being reportable because the data would be inaccessible without the decryption key.
Ask your IT provider to confirm BitLocker status on each workstation. They can verify this remotely in minutes. If they cannot confirm it, assume it is not enabled and request that it be configured immediately.
Yes. Ekim IT Solutions configures and verifies all HIPAA technical safeguards for dental practices across all 50 states remotely, with on-site support in New England and New York. This includes BitLocker encryption, individual user accounts, screen lock policies, MFA, and audit logging.
Ekim IT Solutions works exclusively with dental practices. We serve New England and New York with on-site support and dental practices nationwide with remote support. Security, compliance, and everything in between so you can focus on patients.
Schedule a Fit Call: Find out in 15 minutes if we are the right fit for your practice.