Skip to main content

Social Media and Technology Use Policy

Responsible Executives: Dean of Enrollment Management and Student Life, Director of Information Technology

Responsible Offices: Enrollment Management Unit, IT/Facilities Unit

Effective Date: 12/14/2011 Last Reviewed: 9/21/2023 Revised: 9/21/2023; 11/28/2012


HJ International Graduate School for Peace and Public Leadership (“HJI” or the “Institution”) is committed to fostering a safe and respectful workplace and educational environment for in- person and online communications. This Policy is designed to guide students, faculty, and staff in the acceptable use of social media, email, forums, computers, networks, and other information technology resources at HJI.


This Policy applies to the entire HJI community, including all students, faculty, employees, and staff.


A. Social Media: Introduction

Social media (e.g., Facebook, Instagram, X/Twitter, TikTok, blogs), email and other electronic communication tools are quick, easy to use, and can have a significant impact on people and the Institution. Because they are quick and often instantaneous, you need to follow the same ethical standards and laws as you would in face-to-face communications.

Social Media: Do’s and Don’ts


  • Think twice before posting

There is no privacy on social media sites. Everything that is being posted can be retrieved by others – even if you delete it immediately. Search engines can find posts years after they were originally posted, people can copy, forward, or otherwise redistribute your posts. If you don’t want something to be public – do not post it. If you are emotionally upset, wait until you have calmed down before posting.

  • Be authentic

Be honest about who you are. If you are representing HJI in an official capacity, say so. If you post personal views or opinions, state that they do not reflect the views of HJI (e.g., “the post is my own and does not represent HJI’s position”). Never pretend to be someone else – even “anonymous” posts can be tracked back to the sender.

  • Be accurate

Be factual in your postings, especially when representing HJI. Verify your facts, and check for grammar or spelling mistakes. If you make mistakes in content, acknowledge them and post your correction (or retraction). If you change a posting in a blog, say so. You do not want to be charged with changing evidence.

  • Be respectful

You want to use the media sites to make your beliefs and opinions known, and this may lead to hot discussions. However, engage in them respectfully, without racial or ethnic slurs, personal insults, or obscenities. You are more likely to achieve your goals if you are constructive and respectful while discussing a bad experience or disagreeing with a concept or person.

  • Maintain privacy and confidentiality

Do not post private or confidential information about HJI, its students, faculty, staff members, or alumni. This pertains to gossip as well as factual information, especially those that may be protected under the Family Educational Rights and Privacy Act (FERPA) (see FERPA Policy). Please note that you may not post photos/pictures of individuals unless they have given permission to do so. HJI will seek written consent from students before their appearance in any media (see Media Consent Form).

  • Respect copyright

When posting follow the same copyright rules as in writing a paper. When in doubt, direct questions to the Library Director (see Copyright Compliance Policy).

  • Protect yourself

While you should be honest about yourself, do not provide personal information that can put you at risk.

  • Follow the law

You are responsible for your posts, and may be open to charges of libel for content that seems obscene, fraudulent, or illegal. HJI reserves the right to delete postings on HJI maintained sites (website, blogs, forum, bulletin boards) that are considered insensitive, harassing, or illegal.

Language that is illegal, obscene, defamatory, threatening, infringing of intellectual property rights, invasive of privacy, profane, libelous, threatening, harassing abusive, hateful or embarrassing to any person or entity, or otherwise, is a violation of the Student Code.

Safety and Privacy Tips for Social Media Networking1

The internet is open to a world-wide audience. When using social media channels, ask yourself:

  1. Did I set my privacy setting to help control who can look at my profile, personal information and photos? You can limit access somewhat but not completely, and you have no control over what someone else may
  2. How much information do I want strangers to know about me? If I give them my cell phone number, address, email, class schedule, a list of possessions (such as my CD collection) how might they use it? With whom will they share it? Not everyone will respect your personal or physical
  3. Is the image I’m projecting by my materials and photos the one I want my current and future friends to know me by? What does my profile say to potential faculty members/advisors? Future graduate school/internship interviewers? Potential employers? Neighbors? Family? Parents? Which doors am I opening and which am I closing?
  4. What if I change my mind about what I post? For instance, what if I want to remove something I posted as a joke or to make a point? Have I read the social networking site’s privacy and caching statements? Removing material from network caches can be diffic Posted material can remain accessible on the internet until you’ve completed the prescribed process for removing information from the caching technology of one or multiple (potentially unknown) search engines.
  5. Have I asked permission to post someone else’s image or information? Am I infringing on their privacy? Could I be hurting someone? Could I be subject to libel suits? Am I violating network use policy or FERPA privacy rules?
  6. Does my equipment have spyware and virus protections installed? Some sites collect profile information to SPAM you. Others contain links that can infect your equipment with viruses that potentially can destroy data and infect others with whom you Remember to back up your work on an external source in case of destructive attacks.

B.     Technology Resources: Introduction

HJI provides students, faculty, and staff with technology resources to support the educational mission of the Institution. These resources include, but are not limited to computers, computer networks, software, and other hardware. Users are expected to use them responsibly and with consideration for the rights and needs of others.

General/Users Rights and Responsibilities/Use of Hardware or Software

HJI faculty, students, and staff may use HJI owned hardware, software, and software licenses under the following conditions:

  • Computer use in the Information Commons is restricted to HJI students, faculty, and A guest user must obtain permission from the Library Director;
  • Users are expected to use electronic resources This means among others that users should not be dominating resources and thereby excluding others from being able to use the resources. Users should not share their username and passwords;
  • Users have to take responsibility for their own personal data, including backing up files on thumb drives, and properly logging off on public computers;
  • Users should be aware of malware (viruses, Trojan horses, ) and take precautionary steps to avoid infection of public computers;
  • Only authorized personnel may install programs on Information Commons computers;
  • Users may not change, copy, or delete software unless authorized to do so;
  • Users must follow all applicable copyright laws;
  • Users who have access to confidential data are being held accountable to protecting this data, especially in regards to FERPA (see FERPA Policy);
  • Computer hardware may experience mechanical problems at any time resulting in the loss of data;
  • Users must use computer and other equipment with They are responsible for any damage caused by misuse;
  • HJI is not responsible for loss, destruction, or damage of personal files;
  • HJI periodically deletes all files stored on Information Commons computers for security

Limitations of Use

The use of the resources is a privilege that can be revoked if the user is found to:

  • share username and passwords;
  • attempt to circumvent security measures;
  • intentionally introduce viruses and other malicious programs;
  • modify system or network facilities without proper authorization;
  • interfere with the ability of others to use the network;
  • interfere with the work of another user;
  • use the Institution’s computing resources for malicious or harassing communication;
  • obtain unauthorized access to records or data maintained by HJI;
  • violate copyright and other federal or state laws;
  • do other illegal activities on HJI’s resources (e.g., child pornography);
  • physically damage technology

    [1] Reprinted with permission. Copyright © 2010 the Regents of the University of Michigan.