Information Systems and Social Media Policy
This document is the information systems and social media policy of Collegiate Girls’ High School, as approved by the school governing body on (date). The policy has been drafted in accordance with the provisions of the Constitution of South Africa, 1996; the South African Schools Act 84 of 1996 (‘SASA’); the National Education Policy Act 27 of 1996; applicable provincial legislation on school education, and the Regulation of Interception of Communications and Provision of Communication-related Information Act 70 of 2002.
The purpose of this policy is to govern the use of the school’s information systems in conveying any communication-related information, and the appropriate use of social media platforms by educators, non-educators and learners. The school recognises the evolution of social media as a mode of communication, but also realises that to optimise the use of social media, it must be used responsibly.
The school respects the individual privacy of educators, non-educators and learners. However, this privacy does not extend to their work-related conduct or to the use of equipment, resources or supplies provided by the school.
In terms of the Regulation of Interception of Communications and Provision of Communication-related Information Act 70 of 2002, “any person … may intercept any communication if he or she is a party to the communication, unless such communication is intercepted by such person for purposes of committing an offence”. The school may therefore intercept any communication that is conveyed through the school’s information systems or social media platforms and that refers to any information regarding the school.
This policy applies to all users of the school’s information and information systems. It also applies to the expression of opinions and comments by educators, non-educators and learners on social media that may in any manner be linked to the school.
3.1 Information systems – the systems consisting of the network of all communication channels used within the school.
3.2 Intercept – the aural or other acquisition of the contents of any communication by any means so as to make some or all of the contents of a communication available to a person other than the sender or recipient or intended recipient thereof, and includes the:
3.2.1 monitoring of any such communication by means of a monitoring device;
3.2.2 viewing, examination or inspection of the contents of any indirect communication; and
3.2.3 diversion of any indirect communication from its intended destination to any other destination.
3.3 IT – information technology.
3.4 School – the school governing body, as well as any person to whom particular authority or functions have been delegated in terms of this policy.
3.5 School Management – the principal or a member of the school staff delegated by the principal.
3.6 Social media – the means of interaction among people during which they create, share and exchange information and ideas in virtual communities and networks. Social media can include text, audio, video, images, podcasts and other multimedia communications.
3.7 Systems hardware – any mechanical or electronic device linked to a computer system, including the central processing unit and added or additional devices such as printers and external disk drives.
3.8 Systems software – computer software designed to operate and control the computer hardware and to provide a platform for running application software.
In general, the school’s computer and communication systems are intended for official school purposes only. Incidental personal use is nonetheless permissible if the use does not consume more than a trivial amount of resources that could have otherwise been used for official purposes; does not interfere with worker productivity; does not detract from any school activity, and does not cause distress, legal problems or morale problems for the school’s or other educators, non-educators and learners.
All systems hardware and software are the property of Collegiate Girls’ High School. The school has legal ownership of the contents of all files that are stored on its computer and network systems, as well as all messages that are transmitted via these systems. The school reserves the right to access this information without prior notice whenever a genuine business need exists.
The school reserves the right to audit systems on a periodic basis to ensure compliance with this policy.
The school may at its own discretion examine, move or delete files, including electronic mail (e-mail), for purposes of system maintenance or if the files are determined to be disruptive to the system or its users, either intentionally or unintentionally.
The school provides no warranties of any kind, whether expressed or implied, for the services it provides.
The school will not be responsible for any damages suffered while on this system, including loss of personal data due to system outages or irresponsible use.
The school is not responsible for offensive material obtained by any user using the school’s information systems.
5. INTERNET POLICY
Internet use is a privilege, which constitutes the acceptance of responsibilities and obligations that are subject to government policies and laws. Acceptable use must be legal, ethical and respectful of intellectual property, ownership of data, systems security mechanisms and individual rights to privacy and freedom from intimidation, harassment and annoyance.
Users shall be subject to limitations on their internet use, as determined by the appropriate supervising authority.
To protect the school from profane material and to minimise the use of bandwidth, all internet use shall be monitored by web content filtering software.
Content filtering software shall prevent users from connecting to certain websites that do not relate to school business. All websites that contain sexually explicit, profane and other potentially offensive material shall be blocked via the proxy server.
At any time and without prior notice, school management reserves the right to examine web browser cache files, web browser bookmarks and other information that are stored on or passing through the computers of the school. Such management access ensures compliance with internal policies, assists with internal investigations, and aids in managing the school.
6. E-MAIL POLICY
- The school does not guarantee privacy or confidentiality of any e-mail.
- Use of e-mail to violate this or any school policy is prohibited.
- Any use of e-mail that does not reflect the image and reputation of the school is prohibited.
- The user bears sole responsibility for all transmissions using his/her assigned e-mail address.
- Concealment or misrepresentation of names, addresses or affiliations in e-mail is prohibited.
- Use of e-mail for commercial purposes is prohibited.
- Use of e-mail that is threatening, offensive or intended for purposes of harassment is prohibited.
- E-mail is part of the business or administration record of the school, and may be inspected.
7. PROHIBITED ACTIVITIES OR BEHAVIOUR
The following activities and/or behaviour are prohibited:
- Copying material bearing copyrights or patents, without proper licensing or authority
- Using the school’s information systems for political lobbying, personal gain or commercial purposes
- Copying or removing software from the school’s computers
- Installation of system hardware or software by unauthorised personnel. Under no circumstances shall unlicensed software, privately owned software, games, public-domain software, and freeware, shareware or demonstration software be loaded onto official computer equipment without prior written consent from the IT Administrator.
- Using the school’s information system for offensive or harassing material. The following shall constitute computer harassment: (1) using the computer to annoy, harass, terrify, intimidate, threaten, offend or bother another person by conveying obscene language, pictures or other materials, or threats of bodily or psychological harm to the recipient; (2) using the computer to contact another person repeatedly with the intent to annoy, harass or bother, whether or not any actual message is communicated, and/or where no purpose of legitimate communication exists, and where the recipient has expressed a desire for the communication to cease; (3) using the computer to contact another person repeatedly regarding a matter about which one does not have the legal right to communicate, once the recipient has provided reasonable notice that he or she desires such communication to cease; (4) using the computer to disrupt or damage the academic research, administrative or related pursuits of the school or another person; (5) using the computer to invade the privacy, academic or otherwise, of another, or the threatened invasion of privacy of another; and (6) material containing sexist, racist and/or violent content.
- Viewing or transmission of any material that violates any national, provincial or international law
- Use of school information systems to gain unauthorised access to any system or data
- Accessing, downloading, storing or transmitting obscene material through the school’s computer network system.
Each educator and non-educator shall be granted access to information as needed to perform his or her assigned function, but shall not be given access to information otherwise requiring protection unless and until such access is needed and formally authorised. Authorised users are responsible for the security of their passwords and accounts.
The following acts of ‘cyber-misconduct’ are prohibited:
- Distributing offensive or abusive material: Educators, non-educators and learners may not circulate information that is defamatory, pornographic, racist, or sexist.
- Derogatory statements: Educators, non-educators and learners may not post or distribute derogatory and offensive messages about the school, its staff or the learners. An offender may be found guilty of bringing the school into disrepute, which could lead to disciplinary action or legal action for defamation.
- Breach of trust: Educators, non-educators and learners may not use the school’s information, information systems or social media platforms in a way that breaches the school’s trust.
8. EDUCATORS, NON-EDUCATORS, LEARNERS AND PARENTS USING SOCIAL MEDIA FOR OFFICIAL AND NON-OFFICIAL PURPOSES SHOULD BE AWARE OF THE FOLLOWING
- The approved social media sites may only be used for official purposes when using the school’s information systems.
- The message that the school wants to convey to other users must be clearly defined.
- Postings must be kept legal, ethical and respectful.
- Educators, non-educators and learners may not engage in online communication activities that could bring the school into disrepute.
- Personal details of educators, non-educators, learners and parents may not be disclosed. Educators, non-educators, learners and parents should take note that the school may from time to time share photos on social media sites that were taken during official school activities. People may then be ‘tagged’. Users of these social media sites are advised to check their security settings if they prefer to review postings in which they were ‘tagged’. Educators, non-educators and learners are advised to block other users who they do not know or do not want to be associated with, from accessing their profiles.
- The school does not accept any responsibility or liability for weak security settings on the social media profile of any person associated with the school.
- If any educator, non-educator, learner or parent posts a remark, photo or video on any social media platform that may harm the reputation of the school, and affiliation to the school is identified, known or presumed, such educator, non-educator or learner will be subject to disciplinary and legal action. Legal action may be taken against a parent who jeopardises the school’s reputation.
- All information that is published must be accurate, and confidential information may not be disclosed.
- Copyright laws must be adhered to.
- Only the official approved logo of the school may be used.
- Statements to the media must first be approved by the Principal.
- All school information systems privileges shall be promptly terminated when an educator or non-educator ceases to provide services to the school, or when a learner leaves the school. The school reserves the right to revoke any user’s privileges at any time.
- Conduct that interferes with the normal and proper operation of information systems, adversely affects the ability of others to use these information systems, or is harmful or offensive to others shall not be permitted.
9. SERVER SECURITY
Where feasible, all servers hosting data and applications shall be located in a physically secure environment where access is strictly controlled. All server rooms shall be regarded as high-risk security areas, to which access shall be strictly controlled.
All servers shall be loaded and protected with the latest, approved anti-virus software. Updates for patches and upgrades shall be implemented regularly by the designated IT service provider or the school’s IT specialist, when required.
Only an authorised administrator shall be granted administrative rights to the servers. Administrative passwords shall be kept secret, and only personnel who have been nominated at the school’s discretion shall have access to the passwords.
All business or administrative critical data on local computer and notebook hard drives must be copied or moved to a “My Documents” share on a file server, where it will be backed up. Where such an action is not possible, for example due to being away from access to the school network, the data must be copied over on the first available opportunity. It will be the sole responsibility of the user to backup and maintain data security at all times.
Servers shall be backed up on a monthly basis by the IT service provider or the school’s IT specialist.
10. ACCEPTANCE OF PERSONAL RESPONSIBILITY
Any person who uses an information system of the school shall be responsible and accountable to follow recommended procedures, and to take all reasonable steps to safeguard the information handled by that system as well as any sensitive assets involved. The user is solely responsible for all materials viewed, stored or transmitted from school-based computers. However, the school expects users to comply with all school rules. Failure to do so may result in the suspension or revocation of a user’s access privileges as well as disciplinary measures, including the possibility of civil and/or criminal liability. Educators and non-educators who fail to adhere to this policy will be subject to disciplinary proceedings in terms of either the grievance and disciplinary procedure of the school or procedures conducted by the Department of Basic Education. Learners who fail to comply with this policy will be subject to the school’s code of conduct for learners.
11. POLICY AMENDMENTS
The School Governing Body may from time to time amend, supplement, modify or alter this policy.