Bodycams Beginning To Percolate in Schools

Two school districts are adopting the use of body cameras this fall to record interactions.Two school districts are adopting the use of body cameras this fall to record interactions. Houston Independent School District in Texas will issue the cameras to members of its police force. At Burlington Community School District in Iowa the cameras will be worn by principals and other building administrators to capture private meetings with students and parents.

The Iowa decision came this summer after it was requested by a principal in one of its middle schools who was accused of assaulting a student. Video evidence showed that he hadn't done so; but the current surveillance cameras in use captured only images, not audio, which made it impossible for the district to investigate accusations of verbal misconduct.

In a statement, the district said the cameras were intended to "protect everyone, while also holding administrators accountable for their behavior."

According to news coverage in the Des Moines Register, the district purchased 13 cameras for $85 each. The cameras record with a time and date stamp and can be turned on and off. Before they're turned on to record, the administrator will read a script, informing the person of the intent to record the conversation and giving him or her the option of declining to be recorded. The district emphasized that files would be retained only for the purposes of investigation or "as determined by the administrator."

The decision to outfit Houston ISD's police officers with the "body-worn cameras" follows a four-month pilot project in which the devices were worn by 25 officers. There, the district chose the WatchGuard Video VISTA high-definition camera. The district has almost 250 police officers and security people on staff.

"As the largest district in the state, we have close to 300 schools, 215,000 students and 28,000 employees that we need to keep safe," said Police Chief Robert Mock at the time of the pilot on the district blog. "These cameras will serve as a vital tool to better monitor school environments, evaluate school incidents and ensure our officers are performing well."

In a district video Mock noted that the cameras were about the size of a pager and would be worn on officer lapels. "Any time they approach an incident or something noteworthy, they can turn the camera on and start recording," he said. "We feel this is a best practice that is a trend across the nation...and we want to be at the forefront of providing this tool for our officers."

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • DreamBox Math

    Discovery Education Announces Updates to Experience, DreamBox Math

    K-12 learning solution provider Discovery Education has announced enhancements to its Discovery Education Experience and DreamBox Math products, designed to create a more personalized, engaging learning experience for students.

  • abstract pattern of cybersecurity, ai and cloud imagery

    Report Identifies Malicious Use of AI in Cloud-Based Cyber Threats

    A recent report from OpenAI identifies the misuse of artificial intelligence in cybercrime, social engineering, and influence operations, particularly those targeting or operating through cloud infrastructure. In "Disrupting Malicious Uses of AI: June 2025," the company outlines how threat actors are weaponizing large language models for malicious ends — and how OpenAI is pushing back.

  • digital dashboard featuring a shield icon, graphs, a world map, and network nodes

    IBM Launches Agentic AI Governance and Security Platform

    IBM has introduced a new software stack for enterprise IT teams tasked with managing the complex governance and security challenges posed by autonomous AI systems.

  • laptop and fish hook

    Security Researchers Identify Generative AI 'Vishing' Attack

    A new report from researchers at Ontinue's Cyber Defense Center has identified a complex, multi-stage cyber attack that leveraged social engineering, remote access tools, and signed binaries to infiltrate and persist within a target network.