← Blog

Journaling as a Therapist's Companion — Confidentiality First

Journaling as a Therapist's Companion — Confidentiality First

Most journaling literature is written for the client side: how to journal between sessions, what to bring to therapy, how to track mood. This post takes the other angle — for clinicians who want to use a journaling tool either themselves or with clients, and for clients whose journaling crosses into territory their therapist will discuss.

Confidentiality is the thing that matters most here. Get the tool wrong and you've put session notes, client identifiers, or raw client thoughts onto a server you don't control. The good news is the right tool is unglamorous and easy to set up; the hard part is knowing what to look for.

This is not legal or compliance advice. HIPAA, GDPR, and clinical-board rules vary by jurisdiction and role. Talk to your supervisor and your professional body. The post below covers the principles that hold across regimes.

The threat model, briefly

For a therapist or client, the people you don't want reading the notes include:

A privacy-first journal app addresses the first three by architecture. The last two are device-level concerns and require habits in addition to a tool.

The non-negotiables

Whatever tool you pick, confirm:

  1. End-to-end encryption by default. Not as an upsell, not as a setting buried in advanced options. The app shouldn't have a path to read content even if it wanted to. (See What End-to-End Encryption Actually Means for Your Journal.)
  2. Master key on device only. No "we'll keep a copy in case you forget your password." A real recovery flow is a phrase you saved at signup; if you lose it, the data is gone.
  3. No server-side AI on entries. "Summarize this entry" or "auto-tag" features mean the entry was decrypted on a server. Even transient decryption can mean retained logs at the LLM provider.
  4. Documented metadata. What does the server know? Account ID, entry IDs, dates, timestamps. That's roughly the minimum. No content-derived metadata.
  5. Plain-text export. You should be able to leave with your data at any time, in a format that survives the app.

For therapists: a few use patterns

Personal practice. Many therapists journal themselves — for processing client work indirectly, for supervision prep, for personal continuity. The tool should be private from the company and from family members on a shared device. App-level passcode or biometric lock is non-negotiable.

Session preparation notes. Notes you write about a client — even pseudonymized — can have unique enough details to be re-identifiable. These need the same treatment as official records or stricter, depending on your regulatory regime. Consider:

Reflection on the practice itself. Therapist self-care, supervision themes, training takeaways. These are sensitive but rarely client-identifying. Standard E2EE journal practice applies.

For clients: writing for therapy without writing into it

Clients sometimes journal for therapy — a structured between-session log that gets discussed in session. A few practical notes:

The "shared device" trap

One of the most common breaches isn't a hack. It's a partner, parent, or roommate picking up an unlocked tablet and seeing the open journal app. Two habits prevent it:

The cloud-AI risk for clinicians

In 2026, "AI productivity" features are common in productivity apps. For clinicians using journaling tools to process client material — even pseudonymized — these features represent real risk:

For client-related content, the safest stance is: no server-side AI. None. (Background: Your Notes Are Training AI — How to Stop It.)

Why Jottii fits this use case

Jottii is built around exactly the constraints clinicians need:

We are not HIPAA-certified at the time of writing. If your role requires a Business Associate Agreement (BAA) or specific compliance attestations, you must verify directly with the vendor; ask us. Architecture is necessary but not sufficient for regulatory compliance.

A quick checklist before using any tool for clinically-adjacent work

If a tool checks these, the architecture is doing its job. The remaining work is yours.

Jottii is built for this kind of use — quietly, by being privacy-first from the foundation up.