Middle School Open House
Gray Stone Day School is hosting an Open House on Tuesday, December 17, 2024 at 6:30 p.m. for all prospective middle school students. Guests will be given tours of the school and learn more about curriculum offerings, clubs, and extra-curricular activities.
More info

We will also offer school tours and information sessions to prospective high school families. Click here to schedule a visit with one of our counselors.


New Student Applications
The application window for 2025-2026 is now open!
Enrollment info

Picture of the High School building
2022 Graduation
Carousel Slider

Internet Safety Policy

A. INTRODUCTION

It is the policy of Gray Stone Day School to: (a) prevent user access via its technological resources to, or transmission of, inappropriate material on the Internet or through electronic mail or other forms of direct electronic communications; (b) prevent unauthorized access to the Internet and devices or programs connected to or accessible through the Internet; (c) prevent other unlawful online activity; (d) prevent unauthorized online disclosure, use or dissemination of personal identification information of minors; and (e) comply with the Children’s Internet Protection Act.

B. DEFINITIONS

  1. Technology Protection Measure
    The term “technology protection measure” means a specific technology that blocks or filters Internet access to visual depictions that are obscene, child pornography or harmful to minors.
  2. Harmful to Minors
    The term “harmful to minors” means any picture, image, graphic image file or other visual depiction that:
    1. taken as a whole and with respect to minors, appeals to a prurient interest in nudity, sex or excretion;
    2. depicts, describes or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act or sexual contact, actual or simulated normal or perverted sexual acts or a lewd exhibition of the genitals; and
    3. taken as a whole, lacks serious literary, artistic, political or scientific value as to minors.
  3. Child Pornography
    The term “child pornography” means any visual depiction, including any photograph, film, video picture or computer or computer-generated image or picture, whether made or produced by electronic, mechanical or other means, of sexually explicit conduct, where:
    1. the production of such visual depiction involves the use of a minor engaging in sexually explicit conduct;
    2. such visual depiction is a digital image, computer image or computer-generated image that is, or is indistinguishable from, that of a minor engaging in sexually explicit conduct; or
    3. such visual depiction has been created, adapted or modified to appear that an identifiable minor is engaging in sexually explicit conduct.
  4. Sexual Act; Sexual Contact
    The terms “sexual act” and “sexual contact” have the meanings given such terms in section 2246 of title 18, United States Code. 5. C.
  5. Minor
    For purposes of this policy, the term “minor” means any individual who has not attained the age of 17 years.

C. ACCESS TO INAPPROPRIATE MATERIAL

To the extent practical, technology protection measures (or “Internet filters”) will be used to block or filter access to inappropriate information on the Internet and World Wide Web. Specifically, blocking will be applied to audio and visual depictions deemed obscene or to be child pornography or harmful to minors. Student access to other materials that are inappropriate to minors will also be restricted. The board has determined that audio or visual materials that depict violence, nudity or graphic language that does not serve a legitimate pedagogical purpose are inappropriate for minors. School administration shall make a determination regarding what other matter or materials are inappropriate for minors. School personnel may not restrict Internet access to ideas, perspectives or viewpoints if the restriction is motivated solely by disapproval of the viewpoints involved.

Subject to staff supervision, technology protection measures may be disabled during use by an adult for bona fide research or other lawful purposes.

D. INAPPROPRIATE NETWORK USAGE

All users of school technological resources are expected to comply with the requirements established in the Technology Responsible Use policy. In particular, users are prohibited from: (a) attempting to gain unauthorized access, including “hacking”, and engaging in other similar unlawful activities; and (b) engaging in the unauthorized disclosure, use or dissemination of personal identifying information regarding minors.

E. EDUCATION, SUPERVISION AND MONITORING

To the extent practical, steps will be taken to promote the safety and security of users of the school system’s online computer network, especially when they are using electronic mail, chat rooms, instant messaging and other forms of direct electronic communications. It is the responsibility of all school personnel to educate, supervise and monitor usage of the online computer network and access to the Internet in accordance with this policy, the Children’s Internet Protection Act, the Neighborhood Children’s Internet Protection Act and the Protecting Children in the 21st Century Act.

Procedures for the disabling or otherwise modifying any technology protection measures are the responsibility of the technology director or designated representatives.

School administration or designated representatives shall provide age-appropriate training for students who use the school system’s Internet services. The training provided will be designed to promote the school system’s commitment to educating students in digital literacy and citizenship, including:

  1. the standards and acceptable use of Internet services as set forth in the Technology Responsible Use policy;
  2. student safety with regard to safety on the Internet, appropriate behavior while online, including behavior on social networking websites and in chat rooms, and cyberbullying awareness and response; and
  3. compliance with the E-rate requirements of the Children’s Internet Protection Act.

Following receipt of this training, the student must acknowledge that he or she received the training, understood it and will follow the provisions the Technology Responsible Use policy.

The school administration shall develop any regulations needed to implement this policy and shall submit any certifications necessary to demonstrate compliance with this policy.


College Planning

Standardized Tests   |   ACT/SAT Classes   |   CollegeBoard
College Fairs   |   Naviance