Based on Department of State protocol, an individual computer user is assigned his or hers log on name and password. This process also establishes a profile on the computer being logged onto by the user. This profile is then populated with the computer users’ computer settings and history.