Workstation Use
The HIPAA Workstation Use requirement means you must document and enforce how workstations that can access ePHI are allowed to be used, how users must perform those functions, and what physical conditions must exist around those workstations. Operationally, this is a set of role- and location-based rules (plus training and checks) that reduce screen exposure, unauthorized access, and unsafe workstation placement.
Key takeaways:
- Define “classes” of workstations (clinical, back office, shared/kiosk, remote) and write specific use rules for each.
- Pair written rules with enforceable technical and physical controls (screen locks, privacy screens, clean desk, restricted areas).
- Keep evidence that the rules exist, are communicated, and are followed (policies, standards, training, audits, exception logs).
“Workstation Use” under the HIPAA Security Rule is easy to misunderstand because it sounds like a generic “computer policy.” It is narrower and more operational: you must specify what workstations that access electronic protected health information (ePHI) are allowed to do, how users are supposed to do it, and what the physical surroundings must look like so ePHI is not exposed or misused. The requirement pushes you toward consistent rules for common scenarios: nurses’ stations, front-desk check-in computers, billing team laptops, call-center desktops, shared devices, and remote work from home.
For a Compliance Officer, CCO, or GRC lead, the fastest path is to treat this as a workstation classification and standardization project. Write workstation-class standards that combine: (1) permitted functions and prohibited behaviors, (2) required user behaviors (logoff/lock, printing, handling of media), and (3) physical placement and environmental controls (visibility to the public, restricted areas, cable security, and secure storage). Then connect those standards to onboarding/training, periodic checks, and exception handling so you can prove the policy is real.
Regulatory text
Requirement (excerpt): “Implement policies and procedures that specify the proper functions to be performed, the manner in which those functions are to be performed, and the physical attributes of the surroundings of a specific workstation or class of workstation that can access electronic protected health information.” 1
What the operator must do:
- Write policies and procedures that are specific enough to guide day-to-day behavior.
- Define workstation “classes” (or list individual workstations where needed) that access ePHI.
- For each workstation or class, specify:
- Proper functions (what users may do on that workstation)
- Manner of performance (how they must do it, including required behaviors and restrictions)
- Physical attributes (what the surrounding environment must be like to protect ePHI)
This is an implementation requirement, not a “paper policy” requirement. Your documentation should map to controls you can actually enforce and test.
Plain-English interpretation (what “Workstation Use” really requires)
You need clear, enforceable rules for computers and devices that can access ePHI, covering:
- Allowed activities (for example, clinical charting only vs. charting plus email)
- Required user behaviors (locking screens, logging off shared devices, handling printouts)
- Physical setup expectations (who can see screens, where the workstation may be placed, and what security features are required in that area)
A policy that says “users must protect ePHI” is not enough. Auditors expect you to translate that into workstation-specific expectations, especially for public-facing and shared environments.
Who it applies to (entity + operational context)
Applies to:
- Covered Entities and Business Associates that create, receive, maintain, or transmit ePHI on workstations. 1
Operational contexts that should trigger workstation-use rules:
- Clinical areas: nurse stations, exam rooms, labs, imaging, medication rooms
- Front office: registration, scheduling, check-in/out, kiosks
- Administrative functions: billing, revenue cycle, HR (if systems access ePHI), compliance, IT support
- Remote work: laptops at home, coworking spaces, travel, telehealth settings
- Third party/on-site support: contractors, biomedical technicians, MSP staff, consultants who may use or view ePHI on your devices or theirs
What you actually need to do (step-by-step)
Step 1: Build a workstation inventory and classify “workstation types”
Create a list of workstation endpoints that can access ePHI (or connect to systems that can). Then assign each to a class that will share the same rules. Common classes:
- Clinical fixed workstation (managed desktop at a nurse station)
- Clinical mobile (workstation on wheels)
- Back-office desktop (billing/coding)
- Shared/kiosk (front desk or shared exam room device)
- Privileged admin workstation (IT/admin accounts)
- Remote laptop (issued device used offsite)
Keep the taxonomy practical. If you can’t explain the difference in controls between two classes, merge them.
Step 2: Write a “Workstation Use Standard” per class (use a table)
Create a single standard with sections per workstation class. Include these control statements:
A. Proper functions (allowed use):
- Allowed applications/workflows (EHR, scheduling system, claims portal)
- Prohibited uses (personal email, removable media usage if restricted, storing ePHI locally unless approved)
- Rules for printing/scanning/faxing from that workstation (if relevant)
B. Manner of use (required behaviors):
- Screen locking expectations and “walk-away” behavior
- Login practices for shared devices (no shared accounts unless formally approved and controlled)
- Handling of paper output (immediate pickup, no abandoned printouts)
- Rules for discussing PHI where screens are visible (tie to privacy practices)
C. Physical attributes (environment requirements):
- Placement rules: not facing public areas; position monitors away from patient lines of sight
- Required safeguards: privacy screens where exposure risk exists; cable locks where theft risk exists
- Access control for the area: badge door, reception control, or “staff-only” zones
- Storage: secure drawers/cabinets for portable devices and media where applicable
Tip from practice: write each rule so a supervisor can do a quick walk-through and answer “pass/fail” without interpretation.
Step 3: Align technical settings to the standard (make it enforceable)
Workstation Use is “policy and procedure,” but you will be judged on whether the policy matches reality. Translate the rules into technical baselines:
- Device management configuration (screen lock, password requirements, timeout behavior)
- Application allow/deny approach for high-risk workstation classes (kiosks, shared devices)
- Centralized patching and endpoint protection where devices access ePHI
- Session controls for shared clinical environments (fast user switching, auto-lock, re-authentication)
Avoid writing “requirements” you cannot enforce on unmanaged endpoints. If you allow BYOD or third party devices, define what access is permitted and what compensating controls apply.
Step 4: Add training, acknowledgments, and local signage
Make workstation rules part of:
- New hire onboarding for workforce members who access ePHI
- Role-based refreshers for clinical/front desk roles
- Quick signage for high-risk areas (shared stations, public adjacency): “Lock before you walk” style reminders (keep wording consistent with your policy)
Maintain training materials and proof of completion.
Step 5: Implement checks: spot audits + exception handling
Set up an operational cadence:
- Periodic walk-through checks for workstation placement, unattended logged-in sessions, exposed screens, and unsecured printouts
- A simple exception process (for example, where a nurse station cannot be repositioned) that documents risk, compensating controls, and approval
- Ticketing for remediation actions (privacy screens installed, workstation moved, physical barriers added)
Step 6: Extend the requirement to third parties where they touch workstations
If third parties work onsite or connect to systems where they may access ePHI:
- Require them to follow your workstation rules when using your devices or working in your spaces
- Add contract language or onboarding checklists for on-site consultants/contractors
- Control escorted access to areas with workstation exposure
Daydream can help here by centralizing third-party onboarding evidence and tying “onsite access” to required acknowledgments and security requirements, so exceptions and artifacts don’t get scattered across email threads.
Required evidence and artifacts to retain
Auditors look for proof you defined, implemented, and monitor workstation use. Keep:
- Workstation Use Policy/Standard with workstation classes and specific rules 1
- Workstation inventory or endpoint list showing which devices are in scope for ePHI access
- Configuration baselines or screenshots/exports from device management showing key settings aligned to the policy
- Physical security records: photos (as appropriate), facilities work orders, placement diagrams for high-risk areas
- Training materials and completion logs, plus workforce acknowledgments
- Audit/rounding checklists, findings, and remediation tickets
- Exception register documenting approved deviations and compensating controls
- Third party onboarding/attestations for onsite personnel who work around ePHI workstations
Common exam/audit questions and hangups
Expect questions like:
- “Show me your workstation use policy. How does it differ for front desk vs. clinical areas?”
- “Which workstations access ePHI, and how do you know?”
- “How do you prevent passersby from seeing ePHI on screens in public-facing spaces?”
- “How do you handle shared workstations and session locking?”
- “What happens when staff do not follow the lock/logoff requirement?”
- “How do third parties working onsite comply with your workstation rules?”
Hangup to anticipate: teams often have a general “acceptable use policy” but lack physical surroundings requirements by workstation class, which is explicitly called for in the text. 1
Frequent implementation mistakes (and how to avoid them)
-
One generic policy for all devices.
Fix: define workstation classes and attach stricter rules to public-facing and shared stations. -
No physical environment rules.
Fix: add placement, line-of-sight, and local area access controls; document where privacy screens are required. -
Policy contradicts technical reality.
Fix: validate screen lock, inactivity behavior, and access controls against actual configurations before publishing. -
Shared accounts on shared workstations without controls.
Fix: require unique user authentication or document an approved exception with compensating controls and monitoring. -
No monitoring or consequences.
Fix: implement spot checks with documented remediation. Tie repeated issues to workforce sanction processes if your HIPAA program has them.
Enforcement context and risk implications
No public enforcement cases were provided in the approved source catalog for this requirement, so this page does not cite specific actions. The practical risk is straightforward: poorly controlled workstation use increases the chance of incidental disclosure (visible screens, abandoned printouts) and unauthorized access (unlocked sessions, shared credentials), both of which can trigger reportable incidents depending on facts and circumstances.
Practical execution plan (30/60/90-day)
Use this as a sprint plan, not a calendar guarantee.
First 30 days (Immediate stabilization)
- Identify in-scope workstation classes and high-risk locations (front desk, waiting room adjacency, shared stations).
- Draft the workstation-class table: allowed functions, manner of use, physical attributes.
- Pick a single evidence trail: where the policy lives, where training completion is stored, where exceptions are logged.
By 60 days (Controls and rollout)
- Validate technical settings for lock behavior and authentication practices against the written standard.
- Deploy physical safeguards for obvious exposure points (reposition monitors, add privacy screens where required by your standard).
- Train affected roles and obtain acknowledgments. Start basic walk-through checks with a consistent checklist.
By 90 days (Operationalize and prove it)
- Run a second round of checks and track remediation to closure.
- Formalize the exception process and make it easy for managers to request an approved deviation.
- Extend requirements to third parties who work onsite or access ePHI via workstations, and collect attestations in a system of record (Daydream can serve as that system of record for third-party evidence and exceptions).
Frequently Asked Questions
Does “Workstation Use” only apply to desktops in the office?
No. It applies to any workstation or class of workstation that can access ePHI, including laptops and shared devices where ePHI can be viewed or entered. The key is access to ePHI, not device form factor. 1
What’s the minimum we need in a workstation use policy to satisfy 45 CFR § 164.310(b)?
You need written rules that cover proper functions, the manner of use, and the physical surroundings for each workstation or workstation class that can access ePHI. If your policy does not address the physical environment, it is typically incomplete. 1
How do we handle shared clinical workstations without slowing down care?
Define a specific “shared clinical workstation” class with streamlined but secure session handling (for example, quick lock behavior and re-authentication expectations) and train staff on walk-away locking. Document any deviations as exceptions with compensating controls.
Do we need privacy screens everywhere?
No. Require privacy screens where screens can be viewed by unauthorized persons due to workstation placement or traffic patterns. Document your decision criteria in the workstation class standard and keep evidence of installations in the higher-risk areas.
Our third party service team sometimes uses a workstation in our space. Are they in scope?
Yes, if their work can expose ePHI through workstation access or visibility. Put expectations in their onboarding and onsite access process, and keep an acknowledgment or attestation aligned to your workstation rules. 1
Can we satisfy this with an “Acceptable Use Policy” alone?
Sometimes it can be a component, but most acceptable use policies are too generic. You still need workstation- or class-specific requirements for functions, how the work is performed, and physical surroundings. 1
Footnotes
Frequently Asked Questions
Does “Workstation Use” only apply to desktops in the office?
No. It applies to any workstation or class of workstation that can access ePHI, including laptops and shared devices where ePHI can be viewed or entered. The key is access to ePHI, not device form factor. (Source: 45 CFR Parts 160, 162, 164)
What’s the minimum we need in a workstation use policy to satisfy 45 CFR § 164.310(b)?
You need written rules that cover proper functions, the manner of use, and the physical surroundings for each workstation or workstation class that can access ePHI. If your policy does not address the physical environment, it is typically incomplete. (Source: 45 CFR Parts 160, 162, 164)
How do we handle shared clinical workstations without slowing down care?
Define a specific “shared clinical workstation” class with streamlined but secure session handling (for example, quick lock behavior and re-authentication expectations) and train staff on walk-away locking. Document any deviations as exceptions with compensating controls.
Do we need privacy screens everywhere?
No. Require privacy screens where screens can be viewed by unauthorized persons due to workstation placement or traffic patterns. Document your decision criteria in the workstation class standard and keep evidence of installations in the higher-risk areas.
Our third party service team sometimes uses a workstation in our space. Are they in scope?
Yes, if their work can expose ePHI through workstation access or visibility. Put expectations in their onboarding and onsite access process, and keep an acknowledgment or attestation aligned to your workstation rules. (Source: 45 CFR Parts 160, 162, 164)
Can we satisfy this with an “Acceptable Use Policy” alone?
Sometimes it can be a component, but most acceptable use policies are too generic. You still need workstation- or class-specific requirements for functions, how the work is performed, and physical surroundings. (Source: 45 CFR Parts 160, 162, 164)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream