The system must allow authorized users to inspect their own session history.
Systems usually collect personal and transactional data from their users.
Users should have control of their own data and, as such,
should be allowed to query and inspect whatever information the system has
collected from them,
including their session history.
HIPAA Security Rules 164.308(a)(1)(ii)(D):
Information System Activity Review: Implement procedures
to regularly review records of information system activity,
such as audit logs, access reports, and security incident tracking reports.