I think it's fine to have a fictitious user, just make his password complex.
I agree that tracking becomes impossible when they are not logged in under their name, but the reality is, in a small office people often are logged in under other's names and often know the other person's passwords.
Yes,Jon, I asked rhetorically, but I did note that the user seems to have vanished.