<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "journalpublishing.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="2.0" xml:lang="en" article-type="research-article"><front><journal-meta><journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id><journal-id journal-id-type="publisher-id">jmir</journal-id><journal-id journal-id-type="index">1</journal-id><journal-title>Journal of Medical Internet Research</journal-title><abbrev-journal-title>J Med Internet Res</abbrev-journal-title><issn pub-type="epub">1438-8871</issn><publisher><publisher-name>JMIR Publications</publisher-name><publisher-loc>Toronto, Canada</publisher-loc></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">v27i1e71998</article-id><article-id pub-id-type="doi">10.2196/71998</article-id><article-categories><subj-group subj-group-type="heading"><subject>Original Paper</subject></subj-group></article-categories><title-group><article-title>School-Based Online Surveillance of Youth: Systematic Search and Content Analysis of Surveillance Company Websites</article-title></title-group><contrib-group><contrib contrib-type="author"><name name-style="western"><surname>O'Daffer</surname><given-names>Alison</given-names></name><degrees>BA</degrees><xref ref-type="aff" rid="aff1">1</xref><xref ref-type="aff" rid="aff2">2</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Liu</surname><given-names>Wendy</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff3">3</xref></contrib><contrib contrib-type="author" corresp="yes"><name name-style="western"><surname>Bloss</surname><given-names>Cinnamon S</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff1">1</xref><xref ref-type="aff" rid="aff4">4</xref></contrib></contrib-group><aff id="aff1"><institution>Center for Empathy and Technology, Sanford Institute for Empathy and Compassion, University of California San Diego</institution><addr-line>9500 Gilman Drive MC 0811</addr-line><addr-line>La Jolla</addr-line><addr-line>CA</addr-line><country>United States</country></aff><aff id="aff2"><institution>Joint Doctoral Program of Clinical Psychology, San Diego State University/University of California San Diego</institution><addr-line>San Diego</addr-line><addr-line>CA</addr-line><country>United States</country></aff><aff id="aff3"><institution>Rady School of Management, University of California San Diego</institution><addr-line>La Jolla</addr-line><addr-line>CA</addr-line><country>United States</country></aff><aff id="aff4"><institution>Herbert Wertheim School of Public Health and Human Longevity Science, University of California San Diego</institution><addr-line>La Jolla</addr-line><addr-line>CA</addr-line><country>United States</country></aff><contrib-group><contrib contrib-type="editor"><name name-style="western"><surname>Sarvestan</surname><given-names>Javad</given-names></name></contrib></contrib-group><contrib-group><contrib contrib-type="reviewer"><name name-style="western"><surname>Marlow</surname><given-names>Chad</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Tran</surname><given-names>Tich Phuoc</given-names></name></contrib></contrib-group><author-notes><corresp>Correspondence to Cinnamon S Bloss, PhD, Center for Empathy and Technology, Sanford Institute for Empathy and Compassion, University of California San Diego, 9500 Gilman Drive MC 0811, La Jolla, CA, 92037-0811, United States, 1 858-534-9595, 1 858-534-9595; <email>cbloss@ucsd.edu</email></corresp></author-notes><pub-date pub-type="collection"><year>2025</year></pub-date><pub-date pub-type="epub"><day>8</day><month>7</month><year>2025</year></pub-date><volume>27</volume><elocation-id>e71998</elocation-id><history><date date-type="received"><day>11</day><month>02</month><year>2025</year></date><date date-type="rev-recd"><day>29</day><month>05</month><year>2025</year></date><date date-type="accepted"><day>29</day><month>05</month><year>2025</year></date></history><copyright-statement>&#x00A9; Alison O'Daffer, Wendy Liu, Cinnamon S Bloss. Originally published in the Journal of Medical Internet Research (<ext-link ext-link-type="uri" xlink:href="https://www.jmir.org">https://www.jmir.org</ext-link>), 8.7.2025. </copyright-statement><copyright-year>2025</copyright-year><license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (<ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">https://creativecommons.org/licenses/by/4.0/</ext-link>), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research (ISSN 1438-8871), is properly cited. The complete bibliographic information, a link to the original publication on <ext-link ext-link-type="uri" xlink:href="https://www.jmir.org/">https://www.jmir.org/</ext-link>, as well as this copyright and license information must be included.</p></license><self-uri xlink:type="simple" xlink:href="https://www.jmir.org/2025/1/e71998"/><abstract><sec><title>Background</title><p>School-based online surveillance of students has been widely adopted by middle and high school administrators over the past decade. Little is known about the technology companies that provide these services or the benefits and harms of the technology for students. Understanding what information online surveillance companies monitor and collect about students, how they do it, and if and how they facilitate appropriate intervention fills a crucial gap for parents, youth, researchers, and policy makers.</p></sec><sec><title>Objective</title><p>The two goals of this study were to (1) comprehensively identify school-based online surveillance companies currently in operation, and (2) collate and analyze company-described surveillance services, monitoring processes, and features provided.</p></sec><sec sec-type="methods"><title>Methods</title><p>We systematically searched GovSpend and EdSurge&#x2019;s Education Technology (EdTech) Index to identify school-based online surveillance companies offering social media monitoring, student communications monitoring, or online monitoring. We extracted publicly available information from company websites and conducted a systematic content analysis of the websites identified. Two coders independently evaluated all company websites and discussed the findings to reach 100% consensus regarding website data labeling.</p></sec><sec sec-type="results"><title>Results</title><p>Our systematic search identified 14 school-based online surveillance companies. Content analysis revealed that most of these companies facilitate school administrators&#x2019; access to students&#x2019; digital behavior, well beyond monitoring during school hours and on school-provided devices. Specifically, almost all companies reported conducting monitoring of students at school, but 86% (12/14) of companies reported also conducting monitoring 24/7 outside of school and 7% (1/14) reported conducting monitoring outside of school at school administrator-specified locations. Most online surveillance companies reported using artificial intelligence to conduct automated flagging of student activity (10/14, 71%), and less than half of the companies (6/14, 43%) reported having a secondary human review team. Further, 14% (2/14) of companies reported providing crisis responses via company staff, including contacting law enforcement at their discretion.</p></sec><sec sec-type="conclusions"><title>Conclusions</title><p>This study is the first detailed assessment of the school-based online surveillance industry and reveals that student monitoring technology can be characterized as heavy-handed. Findings suggest that students who only have school-provided devices are more heavily surveilled and that historically marginalized students may be at a higher risk of being flagged due to algorithmic bias. The dearth of research on efficacy and the notable lack of transparency about how surveillance services work indicate that increased oversight by policy makers of this industry may be warranted. Dissemination of our findings can improve parent, educator, student, and researcher awareness of school-based online monitoring services.</p></sec></abstract><kwd-group><kwd>schools</kwd><kwd>secondary schools</kwd><kwd>adolescents</kwd><kwd>youth</kwd><kwd>mental health</kwd><kwd>privacy</kwd><kwd>surveillance</kwd><kwd>monitoring</kwd></kwd-group></article-meta></front><body><sec id="s1" sec-type="intro"><title>Introduction</title><sec id="s1-1"><title>Background</title><p>School-based online surveillance of students has been adopted widely by middle and high school administrators (eg, principals, district officials, or information technology directors) over the past decade [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. Purportedly designed to protect students, many school districts have used the technology with the goal of preventing youth suicide and school violence, including gun violence and cyberbullying [<xref ref-type="bibr" rid="ref3">3</xref>]. With rising rates of youth suicide [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref5">5</xref>], considerable concern about gun violence in schools [<xref ref-type="bibr" rid="ref6">6</xref>], and ongoing reports of cyberbullying [<xref ref-type="bibr" rid="ref7">7</xref>], schools are key stakeholders in keeping adolescents safe and healthy into adulthood [<xref ref-type="bibr" rid="ref8">8</xref>]. There are no up-to-date, publicly available data on the prevalence of school-based online surveillance in the United States, but school purchases of online surveillance services have increased annually since 2013 [<xref ref-type="bibr" rid="ref1">1</xref>], and 9 of 10 secondary school teachers surveyed report that their schools use student online surveillance technology [<xref ref-type="bibr" rid="ref9">9</xref>]. Research suggests that most parents, teachers, and school administrators support the use of online surveillance to detect risks of students harming themselves or others, but student attitudes are mixed [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref11">11</xref>].</p><p>School-based online surveillance companies are companies that sell one or more of the following services to schools or districts: social media monitoring, student communications monitoring (eg, email or documents), and online (ie, web browsing) monitoring [<xref ref-type="bibr" rid="ref12">12</xref>]. School-based online surveillance services are a subset of the educational technology (EdTech) surveillance industry. School-based online surveillance is distinct from web filtering, which is mandated by the Children&#x2019;s Internet Protection Act [<xref ref-type="bibr" rid="ref13">13</xref>] and blocks students from viewing certain content online. School-based online surveillance is more invasive than web filtering, in that it scans students&#x2019; online activity for specific words or phrases determined to be concerning, traces flagged content to specific students&#x2019; identities, and shares that information with school staff [<xref ref-type="bibr" rid="ref12">12</xref>].</p><p>While online surveillance of students was once limited to public social media post collation through geofencing [<xref ref-type="bibr" rid="ref14">14</xref>-<xref ref-type="bibr" rid="ref16">16</xref>], recent advances in artificial intelligence (AI) provide more sophisticated and intrusive methods for surveilling individuals&#x2019; online activity [<xref ref-type="bibr" rid="ref17">17</xref>]. Under the Family Educational Rights and Privacy Act, schools can legally provide identifiable student information to contractors to perform school personnel functions [<xref ref-type="bibr" rid="ref18">18</xref>]. Large language models can analyze a large amount of student online activity (ie, emails, web searches, direct messages, or private social media browsing and posting) if school administrators give that level of access to student data to online surveillance companies. The use of large language models for reviewing sensitive student data presents risks of AI bias for marginalized students [<xref ref-type="bibr" rid="ref19">19</xref>]. In the school-based surveillance space, potential adverse effects of automated surveillance via AI include higher false positive rates for Black students, outing of LGBTQ+ students, or excessive discipline of students with disabilities [<xref ref-type="bibr" rid="ref12">12</xref>].</p><p>Most school-based online surveillance services follow a similar process. First, school or district administrators purchase school-based online surveillance and give a surveillance company access to ongoing student online activities. The surveillance company then conducts automated monitoring of what students are doing online. If something a student did online is deemed problematic by the company&#x2019;s automated review mechanism, the technology would then generate an alert and push it to school administrators with the name of the student and the content that was flagged. Within this general process, different companies have different nuanced approaches to how they get access to student data, how much data they can access, what automated monitoring technology they use to generate alerts, and how alerts are handled.</p><p>Despite the ubiquity of use of such technology at schools, there is little systematic knowledge about the scope and practices of the school-based online surveillance industry [<xref ref-type="bibr" rid="ref12">12</xref>], compounding the lack of empirical evidence of the efficacy of this technology and the societal effects of this industry. It is unclear how many online surveillance companies are currently in operation, what services each company offers, and if and how AI is being leveraged by these companies. Understanding what information online surveillance companies claim to monitor and collect about students, how they claim to do it, and if and how they facilitate or claim to facilitate appropriate intervention fills a crucial knowledge gap for parents, youth, researchers, and policy makers, and may inform decision-making related to this important industry.</p></sec><sec id="s1-2"><title>Aims</title><p>We conducted a systematic search for school-based online surveillance companies and a content analysis of the websites identified. Our research questions were as follows: (1) what are the school-based online surveillance companies currently in operation in the US? (2) What surveillance services, monitoring processes, and features do school-based online surveillance companies report offering?</p></sec></sec><sec id="s2" sec-type="methods"><title>Methods</title><sec id="s2-1"><title>Systematic Search of Online Surveillance Companies</title><p>We sought to identify school-based online surveillance companies and conduct a content analysis of their websites. Entities were included in our analysis if they (1) claimed to monitor students&#x2019; social media, private electronic communications, or online browsing activity; (2) claimed to generate and save alerts tied to individual students&#x2019; identities; (3) had informational materials available in English; (4) specifically designed or marketed their services to schools (even if they marketed to multiple industries); and (5) were in operation at the time of the systematic search.</p><p>Identification of online surveillance companies and website content analysis was conducted from February 2024 to June 2024. Our systematic search process to identify companies was threefold. First, we searched GovSpend [<xref ref-type="bibr" rid="ref20">20</xref>], an extensive database of US public government procurement records, to identify online surveillance companies with which school districts across the country have contracts. Public schools and districts in the United States are typically obligated to make contract information publicly available when paying nonemployees for contract work [<xref ref-type="bibr" rid="ref21">21</xref>]. GovSpend is a commercially available data aggregation service for these public records, capturing state, local, and education spending in the United States. GovSpend reports collecting spending, purchase order, and contracts data directly from thousands of US public agency partners every quarter. We searched K-12 school contract data in the GovSpend database for online surveillance companies, using general keywords &#x201C;computer monitoring,&#x201D; &#x201C;social media monitoring,&#x201D; &#x201C;EdTech,&#x201D; &#x201C;risk detection,&#x201D; and specific names of companies we know of from news stories and websites of school-based online surveillance companies.</p><p>Second, we used EdSurge&#x2019;s EdTech Index tool [<xref ref-type="bibr" rid="ref22">22</xref>], an extensive index of EdTech products and services, to search for online surveillance companies. EdSurge&#x2019;s EdTech Index uses categorical labels to sort EdTech services, so we screened all services labeled &#x201C;wellness and mental health&#x201D; or &#x201C;learning technology management&#x201D; for &#x201C;K-12 education.&#x201D;</p><p>To ensure we captured all school-based online surveillance companies, we augmented these search strategies by reviewing news articles mentioning school-based online surveillance through Google News over the past 10 years. Our team was concurrently conducting qualitative work with school administrators, adolescents, and parents of adolescents during the time of this analysis, so we also cross-referenced any company mentioned in those interviews with our list from GovSpend and EdSurge&#x2019;s EdTech Index.</p><p>The resulting initial set of companies was then subjected to further screening, with exclusions made if (1) the company did not conduct student communications monitoring, social media monitoring, or online monitoring; (2) the company&#x2019;s monitoring data was not linked to student identities; (3) the company did not design or market their services to schools (even if they marketed to other industries); or (4) the company was no longer in operation. No additional companies were identified through our review of news articles or concurrent qualitative interviews, but 1 company, Sergeant Laboratories, was identified as providing school-based online surveillance by a school administrator after being screened and excluded previously. Sergeant Laboratories was lacking information on their website, which likely contributed to the initial exclusion.</p><p>Once we evaluated each company using these criteria, we arrived at the final set of companies for analysis. After the final companies were identified, we extracted information from LinkedIn about each company, including the location of the headquarters, year founded, approximate number of employees, and target customers.</p></sec><sec id="s2-2"><title>Content Analysis</title><p>For each online surveillance company that met the final inclusion criteria, we extracted publicly available information from the company&#x2019;s website and saved all website content in our files. All website information was extracted between February and June 2024. We developed a codebook specifically for this project (<xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>). The codebook was created via an iterative, deductive process. First, based on existing literature, we developed research questions and codes on the 3 topic areas of interest a priori (types of services, monitoring processes, and features). While conducting data extraction, additional codes were added as needed (eg, if an online surveillance company claimed to offer a feature we had not heard of or included in our original codebook, we added that code to our codebook to capture the information). In our codebook, 40 codes were chosen by the authors within the 3 topic areas related to our research questions: types of services, monitoring processes, and features. Types of services codes included whether each company conducted student communications monitoring, social media monitoring, or online activity monitoring. Monitoring process codes included access mechanisms, monitoring mechanisms, types of software screened, when and where monitoring is conducted, and types of devices and accounts monitored. Codes about features offered included content, alert generation, alert response, and student tracking features.</p><p>Two coders, an author and a research associate (AO and Natalie Gonzalez, BA), independently reviewed data for all 14 company websites and independently labeled each variable from our codebook. We met to discuss findings, review incongruities, and reach 100% consensus. Consensus conversations took place in May 2025.</p></sec></sec><sec id="s3" sec-type="results"><title>Results</title><sec id="s3-1"><title>Systematic Search of Online Surveillance Companies</title><p>The keyword search in GovSpend and EdSurge yielded 169 companies that could potentially offer school-based surveillance services. Of these, 148 companies were then screened out because they did not claim to monitor students&#x2019; social media, private electronic communications, or online browsing activity. Four companies were excluded because they did not claim to generate alerts tied to students&#x2019; individual identities. Three companies were excluded because they were no longer in operation. No companies were excluded due to not having materials in English, likely because we searched English-language databases. After all screening criteria were applied, we identified 14 school-based online surveillance companies [<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref36">36</xref>]. The PRISMA flow diagram [<xref ref-type="bibr" rid="ref37">37</xref>] (<xref ref-type="fig" rid="figure1">Figure 1</xref>) provides more detailed information about our search and screening process.</p><fig position="float" id="figure1"><label>Figure 1.</label><caption><p>PRISMA flow diagram [<xref ref-type="bibr" rid="ref37">37</xref>] for systematic search of online surveillance companies. PRISMA: Preferred Reporting Items for Systematic Reviews and Meta-Analyses.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v27i1e71998_fig01.png"/></fig><p>The 14 online surveillance companies identified and included in the content analysis are Ativion [<xref ref-type="bibr" rid="ref23">23</xref>], Bark [<xref ref-type="bibr" rid="ref24">24</xref>], Blocksi [<xref ref-type="bibr" rid="ref25">25</xref>], Deledao [<xref ref-type="bibr" rid="ref26">26</xref>], Gaggle [<xref ref-type="bibr" rid="ref27">27</xref>], GoGuardian [<xref ref-type="bibr" rid="ref28">28</xref>], Lightspeed Systems [<xref ref-type="bibr" rid="ref29">29</xref>], Linewize by Qoria [<xref ref-type="bibr" rid="ref30">30</xref>], ManagedMethods [<xref ref-type="bibr" rid="ref38">38</xref>], Navigate360 [<xref ref-type="bibr" rid="ref32">32</xref>], Netsweeper [<xref ref-type="bibr" rid="ref33">33</xref>], Safer Schools Together [<xref ref-type="bibr" rid="ref34">34</xref>], Securly [<xref ref-type="bibr" rid="ref35">35</xref>], and Sergeant Laboratories [<xref ref-type="bibr" rid="ref36">36</xref>]. Information about these companies can be found in <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>.</p><p>One company, Sergeant Laboratories, conveyed that they monitor online activity, but had extremely limited information about their services available on their website [<xref ref-type="bibr" rid="ref36">36</xref>]. Despite multiple contact attempts, they ultimately declined to provide additional information, which explains the gaps in information in the Results and Tables for Sergeant Laboratories.</p></sec><sec id="s3-2"><title>Content Analysis</title><sec id="s3-2-1"><title>Services Offered and Pricing</title><p>Our content analysis revealed that 12/14 (86%) companies offered student communications monitoring [<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref35">35</xref>], 7/14 (50%) companies offered social media monitoring [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref32">32</xref>-<xref ref-type="bibr" rid="ref35">35</xref>], 11/14 (79%) companies offered online monitoring [<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref35">35</xref>], and 1/14 (7%) companies did not provide information about the specific digital activity they monitor [<xref ref-type="bibr" rid="ref36">36</xref>]. <xref ref-type="table" rid="table1">Table 1</xref> details surveillance services offered by the 14 school-based online surveillance companies included in our analysis.</p><table-wrap id="t1" position="float"><label>Table 1.</label><caption><p>Surveillance services offered by school-based online surveillance companies (N=14).</p></caption><table id="table1" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Company</td><td align="left" valign="bottom">Student communications monitoring<sup><xref ref-type="table-fn" rid="table1fn1">a</xref></sup> (n=12)</td><td align="left" valign="bottom">Social media monitoring<sup><xref ref-type="table-fn" rid="table1fn2">b</xref></sup> (n=7)</td><td align="left" valign="bottom">Online monitoring<sup><xref ref-type="table-fn" rid="table1fn3">c</xref></sup> (n=11)</td><td align="left" valign="bottom">Unclear or unspecified (n=1)</td></tr></thead><tbody><tr><td align="left" valign="top">Ativion [<xref ref-type="bibr" rid="ref23">23</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Bark [<xref ref-type="bibr" rid="ref24">24</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Blocksi [<xref ref-type="bibr" rid="ref25">25</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Deledao [<xref ref-type="bibr" rid="ref26">26</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Gaggle [<xref ref-type="bibr" rid="ref27">27</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">GoGuardian [<xref ref-type="bibr" rid="ref28">28</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Lightspeed Systems [<xref ref-type="bibr" rid="ref29">29</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Linewize by Qoria [<xref ref-type="bibr" rid="ref30">30</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">ManagedMethods [<xref ref-type="bibr" rid="ref31">31</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Navigate360 [<xref ref-type="bibr" rid="ref32">32</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Netsweeper [<xref ref-type="bibr" rid="ref33">33</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Safer Schools Together [<xref ref-type="bibr" rid="ref34">34</xref>]</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Securly [<xref ref-type="bibr" rid="ref35">35</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Sergeant Laboratories [<xref ref-type="bibr" rid="ref36">36</xref>]</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td></tr></tbody></table><table-wrap-foot><fn id="table1fn1"><p><sup>a</sup>Student communications monitoring: technology that &#x201C;scans private student electronic communications, such as emails and documents written on school accounts and software applications, for words and phrases deemed by the technology provider [or] school to be problematic and shares concerning communications with the provider and/or school&#x201D; [<xref ref-type="bibr" rid="ref12">12</xref>].</p></fn><fn id="table1fn2"><p><sup>b</sup>Social media monitoring: technology that &#x201C;scans students&#x2019; public social media accounts for words and phrases that are designated by the school [or] the product provider to be problematic, even when they are off campus&#x201D; [<xref ref-type="bibr" rid="ref12">12</xref>].</p></fn><fn id="table1fn3"><p><sup>c</sup>Online monitoring: technology that &#x201C;monitors what students search for online and what websites they visit, and flags concerning activities for the technology provider [or] school&#x201D; [<xref ref-type="bibr" rid="ref12">12</xref>].</p></fn></table-wrap-foot></table-wrap><p>Pricing information was not publicly available for 93% (13/14) of online surveillance companies [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>-<xref ref-type="bibr" rid="ref36">36</xref>]; the exception was Bark, which provides its basic services to schools for free and offers a more in-depth, paid, parent platform, and paid add-ons for schools [<xref ref-type="bibr" rid="ref24">24</xref>]. A total of 43% (6/14) of companies had information on their website about how to apply for governmental grants to pay for online surveillance [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref27">27</xref>-<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref32">32</xref>].</p></sec><sec id="s3-2-2"><title>Monitoring Processes</title><p>Online surveillance companies reported obtaining access to student data through a variety of mechanisms. <xref ref-type="table" rid="table2">Table 2</xref> provides detailed information about access mechanisms for each of the 14 school-based online surveillance companies. A total of 4/14 (29%) companies reported accessing student data through software installed on school-issued devices [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref28">28</xref>-<xref ref-type="bibr" rid="ref30">30</xref>], and 3/14 (21%) companies used browser plug-ins or extensions (software installed on web browsers) [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref30">30</xref>]. Further, 7/14 (50%) companies reported accessing student information through school-provided account access [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. Additionally, 3/14 (21%) companies reported accessing information through application programming interface integrations (ie, software interfaces that connect computers or computer software without needing to install anything on a specific device or device&#x2019;s browser) [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. Furthermore, 3/14 (21%) companies reported accessing student information through publicly available online content [<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. Moreover, 3/14 (21%) companies either provided unclear information about access or did not specify how they access student data [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref36">36</xref>]. Besides, 8/14 (57%) companies reported using more than one of these methods to access student online activity data [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref28">28</xref>-<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref35">35</xref>].</p><table-wrap id="t2" position="float"><label>Table 2.</label><caption><p>Monitoring mechanisms used by school-based online surveillance companies (N=14).</p></caption><table id="table2" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Company</td><td align="left" valign="bottom" colspan="6">How does the company access student data?</td><td align="left" valign="bottom" colspan="3">How does the company screen student data?</td></tr><tr><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="bottom" colspan="2">Automated methods</td><td align="left" valign="bottom">Nonautomated methods</td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">Browser plug-in<sup><xref ref-type="table-fn" rid="table2fn1">a</xref></sup> (n=3)</td><td align="left" valign="top">Device software or app (n=4)</td><td align="left" valign="top">School-provided account access (n=7)</td><td align="left" valign="top">API integr-ation<sup><xref ref-type="table-fn" rid="table2fn2">b</xref></sup> (n=3)</td><td align="left" valign="top">Public online activity (n=3)</td><td align="left" valign="top">Unclear or not specified (n=3)</td><td align="left" valign="top">Artificial intelligence (n=10)</td><td align="left" valign="top">Unspecified automated mechanism (n=4)</td><td align="left" valign="top">Human review team (n=6)</td></tr></thead><tbody><tr><td align="left" valign="top">Ativion [<xref ref-type="bibr" rid="ref23">23</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Bark [<xref ref-type="bibr" rid="ref24">24</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top">Blocksi [<xref ref-type="bibr" rid="ref25">25</xref>]</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top">Deledao [<xref ref-type="bibr" rid="ref26">26</xref>]</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Gaggle [<xref ref-type="bibr" rid="ref27">27</xref>]</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top">GoGuardian [<xref ref-type="bibr" rid="ref28">28</xref>]</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top">Lightspeed Systems [<xref ref-type="bibr" rid="ref29">29</xref>]</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top">Linewize by Qoria [<xref ref-type="bibr" rid="ref30">30</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top">ManagedMethods [<xref ref-type="bibr" rid="ref31">31</xref>]</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Navigate360 [<xref ref-type="bibr" rid="ref32">32</xref>]</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Netsweeper [<xref ref-type="bibr" rid="ref33">33</xref>]</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top">Safer Schools Together [<xref ref-type="bibr" rid="ref34">34</xref>]</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Securly [<xref ref-type="bibr" rid="ref35">35</xref>]</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Sergeant Laboratories [<xref ref-type="bibr" rid="ref36">36</xref>]</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr></tbody></table><table-wrap-foot><fn id="table2fn1"><p><sup>a</sup>Browser plug-in: software installed onto a web browser.</p></fn><fn id="table2fn2"><p><sup>b</sup>API integration: Application programming interface integration refers to software interfaces that connect computers or computer software without needing to install anything on a specific device or device&#x2019;s browser.</p></fn></table-wrap-foot></table-wrap><p>Many companies reported surveilling specific software. <xref ref-type="table" rid="table3">Table 3</xref> details specific software and applications that the 14 school-based online surveillance companies reported monitoring. Specifically, 10/14 (79%) online surveillance companies said they monitored student activity on Google Workspace [<xref ref-type="bibr" rid="ref24">24</xref>-<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref35">35</xref>], 10/14 (71%) said they monitored student activity on Microsoft 365 [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref27">27</xref>-<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref35">35</xref>], and 10/14 (71%) said they monitored student web browser activity [<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. Further, 3/14 (21%) online surveillance companies reported monitoring student activity on Canvas, a web-based learning management system [<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. One company, Netsweeper, reported monitoring student activity on smartphone apps [<xref ref-type="bibr" rid="ref29">29</xref>]. Furthermore, 3/14 (21%) online surveillance companies reported monitoring public social media activity [<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>], while 5/14 (36%) companies reported monitoring all social media activity [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. One company, Sergeant Laboratories, did not provide any information about the software it surveils [<xref ref-type="bibr" rid="ref36">36</xref>].</p><table-wrap id="t3" position="float"><label>Table 3.</label><caption><p>Software screened by school-based online surveillance companies (N=14).</p></caption><table id="table3" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Company</td><td align="left" valign="bottom" colspan="4">Student communications</td><td align="left" valign="bottom" colspan="2">Social media</td><td align="left" valign="bottom">Online activity</td></tr><tr><td align="left" valign="top"/><td align="left" valign="top">Google Workspace (n=11)</td><td align="left" valign="top">Microsoft 365 (n=10)</td><td align="left" valign="top">Canvas (n=3)</td><td align="left" valign="top">Public social media posts (n=3)</td><td align="left" valign="top">All social media activity (n=5)</td><td align="left" valign="top">Web browsers (n=10)</td><td align="left" valign="top">Smartphone apps (n=1)</td></tr></thead><tbody><tr><td align="left" valign="top">Ativion [<xref ref-type="bibr" rid="ref23">23</xref>]</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Bark [<xref ref-type="bibr" rid="ref24">24</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Blocksi [<xref ref-type="bibr" rid="ref25">25</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Deledao [<xref ref-type="bibr" rid="ref26">26</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Gaggle [<xref ref-type="bibr" rid="ref27">27</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">GoGuardian [<xref ref-type="bibr" rid="ref28">28</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Lightspeed Systems [<xref ref-type="bibr" rid="ref29">29</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Linewize by Qoria [<xref ref-type="bibr" rid="ref30">30</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">ManagedMethods [<xref ref-type="bibr" rid="ref31">31</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Navigate360 [<xref ref-type="bibr" rid="ref32">32</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Netsweeper [<xref ref-type="bibr" rid="ref33">33</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top">Safer Schools Together [<xref ref-type="bibr" rid="ref34">34</xref>]</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Securly [<xref ref-type="bibr" rid="ref35">35</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Sergeant Laboratories<sup><xref ref-type="table-fn" rid="table3fn1">a</xref></sup> [<xref ref-type="bibr" rid="ref36">36</xref>]</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr></tbody></table><table-wrap-foot><fn id="table3fn1"><p><sup>a</sup>Sergeant Laboratories had incomplete information on their website. We reached out to the company for more information, and they ultimately declined to comment.</p></fn></table-wrap-foot></table-wrap><p>A total of 93% (13/14) of companies reported conducting monitoring of students at school [<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref35">35</xref>]. Locations, devices, and accounts monitored by online surveillance companies are detailed in <xref ref-type="table" rid="table4">Table 4</xref>. Further, 86% (12/14) of companies reported conducting monitoring 24/7 at any location outside of school [<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref35">35</xref>] and 7% (1/14) reported conducting monitoring outside of school only in administrator-specified locations [<xref ref-type="bibr" rid="ref34">34</xref>]. Additionally, 93% (13/14) of online surveillance companies indicated that they monitored student activity on school-issued devices [<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>], 36% (5/14) reported that they monitored at least some student activity on student-owned computers and tablets [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref35">35</xref>], and 36% (5/14) reported that they monitored at least some student activity on student-owned smartphones [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. One online surveillance company, Safer Schools Together, only reported monitoring public social media activity of students, and therefore did not monitor any specific devices [<xref ref-type="bibr" rid="ref34">34</xref>]. Moreover, 86% (12/14) of companies reported monitoring school-provided accounts [<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref35">35</xref>], and 43% (6/14) reported monitoring at least some activity on personal accounts [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref32">32</xref>-<xref ref-type="bibr" rid="ref35">35</xref>].</p><table-wrap id="t4" position="float"><label>Table 4.</label><caption><p>Locations, devices, and accounts monitored by school-based online surveillance companies (N=14).</p></caption><table id="table4" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Company</td><td align="left" valign="bottom" colspan="3">Where is monitoring conducted?</td><td align="left" valign="bottom" colspan="3">What devices are monitored?</td><td align="left" valign="bottom" colspan="2">What accounts are monitored?</td></tr><tr><td align="left" valign="bottom"/><td align="left" valign="bottom">At school (n=13)</td><td align="left" valign="bottom">Any location outside of school (n=12)</td><td align="left" valign="bottom">Specified locations<break/>outside of school (n=1)</td><td align="left" valign="bottom">School-issued devices (n=13)</td><td align="left" valign="bottom">Student-owned computers or tablets (n=5)</td><td align="left" valign="bottom">Student-owned cell phones (n=5)</td><td align="left" valign="bottom">School-<break/>provided accounts (n=12)</td><td align="left" valign="bottom">Personal accounts (n=6)</td></tr></thead><tbody><tr><td align="left" valign="top">Ativion [<xref ref-type="bibr" rid="ref23">23</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Bark [<xref ref-type="bibr" rid="ref24">24</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Blocksi [<xref ref-type="bibr" rid="ref25">25</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Deledao [<xref ref-type="bibr" rid="ref26">26</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top">Gaggle [<xref ref-type="bibr" rid="ref27">27</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">GoGuardian [<xref ref-type="bibr" rid="ref28">28</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Lightspeed Systems [<xref ref-type="bibr" rid="ref29">29</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Linewize by Qoria [<xref ref-type="bibr" rid="ref30">30</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top">ManagedMethods [<xref ref-type="bibr" rid="ref31">31</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/></tr><tr><td align="left" valign="top">Navigate360 [<xref ref-type="bibr" rid="ref32">32</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top">Netsweeper [<xref ref-type="bibr" rid="ref33">33</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top">Safer Schools Together [<xref ref-type="bibr" rid="ref34">34</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top">Securly [<xref ref-type="bibr" rid="ref35">35</xref>]</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td><td align="left" valign="top">&#x2713;</td></tr><tr><td align="left" valign="top">Sergeant Laboratories<sup><xref ref-type="table-fn" rid="table4fn1">a</xref></sup> [<xref ref-type="bibr" rid="ref36">36</xref>]</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">&#x2713;</td><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top"/></tr></tbody></table><table-wrap-foot><fn id="table4fn1"><p><sup>a</sup>Sergeant Laboratories had incomplete information on their website. We reached out to the company for more information, and they ultimately declined to comment.</p></fn></table-wrap-foot></table-wrap><p>All 14 online surveillance companies reported using some sort of automated technology, particularly AI, to analyze the data from monitoring and to generate alerts (<xref ref-type="table" rid="table2">Table 2</xref>). Furthermore, 71% (10/14) of online surveillance companies reported using AI to conduct automated flagging of student activity [<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref31">31</xref>-<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. Additionally, 29% (4/14) of companies did not clarify how they generate automated alerts [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref36">36</xref>]. Some companies mentioned more specific applications of AI as part of monitoring: 14% (2/14) of companies reported using machine learning (an application of AI) [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref27">27</xref>] and 14% (2/14) reported using natural language processing (a type of machine learning) [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. Some online surveillance companies also reported using AI for sentiment analysis (1/14, 7%) [<xref ref-type="bibr" rid="ref34">34</xref>], keyword analysis (2/14, 17%) [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref35">35</xref>], and image analysis (1/14, 7%) [<xref ref-type="bibr" rid="ref35">35</xref>]. In addition to automated monitoring technology, 43% (6/14) of online surveillance companies reported having a secondary human review team to review automated alerts [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref28">28</xref>-<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref33">33</xref>].</p></sec><sec id="s3-2-3"><title>Features Offered</title><p>Specific features offered by online surveillance companies are detailed in <xref ref-type="supplementary-material" rid="app3">Multimedia Appendix 3</xref>. Further, 86% (12/14) of companies reported providing an alert management dashboard to view and track responses to alerts [<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. Furthermore, 71% (10/14) of companies reported providing after-hours alerts for prespecified school administrators [<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref27">27</xref>-<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref35">35</xref>], and 71% (10/14) of companies reported having company staff on call after hours to support school personnel who respond to student alerts [<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref27">27</xref>-<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref33">33</xref>-<xref ref-type="bibr" rid="ref35">35</xref>]. One (of 14) online surveillance company, Securly, reported detecting harassing content as students type and &#x201C;nudging&#x201D; students to think twice before posting or sending [<xref ref-type="bibr" rid="ref35">35</xref>]. Additionally, 29% (4/14) of companies reported generating individual student &#x201C;wellness&#x201D; or &#x201C;risk&#x201D; scores and providing data visualization tools for school administrators to view scores (eg, at individual, classroom, grade, and school levels) [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. Moreover, 43% (6/14) of companies reported offering a complementary parent platform for parents to view their child&#x2019;s individual information and alerts [<xref ref-type="bibr" rid="ref24">24</xref>-<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. Two (14%) companies, Gaggle and Netsweeper, reported contacting law enforcement &#x201C;as needed&#x201D; after hours to respond to student alerts [<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref33">33</xref>]. One online surveillance company, Gaggle, reported that they offer virtual crisis response by company staff [<xref ref-type="bibr" rid="ref27">27</xref>]. One online surveillance company, Navigate360, reported offering online psychoeducation modules for students identified via monitoring as at mental health risk [<xref ref-type="bibr" rid="ref32">32</xref>].</p></sec></sec></sec><sec id="s4" sec-type="discussion"><title>Discussion</title><sec id="s4-1"><title>Principal Findings</title><p>This study provides the first detailed assessment of the current school-based online surveillance industry. Our systematic search and content analysis found that all 14 companies identified offer extensive monitoring of school-issued devices and accounts. School-based monitoring of personal devices and accounts is offered by over half of the companies, but these services seem to have gaps in data access. Most companies reported using AI to process student data, and algorithmic transparency is lacking. Less than half of school-based online surveillance companies have human staff review AI-generated alerts before alerts are sent to school staff.</p><p>As this paper is the first to outline the scope and offerings of this industry in detail, we suspect that there is low stakeholder and public awareness about this technology. Dissemination of our findings can improve public awareness of school-based online monitoring services. This study also suggests that students who only have school-issued devices (eg, low-income students) are likely being surveilled more heavily than students who have access to personal devices. Established research suggests that large language models demonstrate notable biases against non-White groups [<xref ref-type="bibr" rid="ref19">19</xref>], so reliance on AI for monitoring without algorithmic transparency presents risks of discrimination or adverse outcomes for historically marginalized students. Companies without human review teams (Ativion [<xref ref-type="bibr" rid="ref23">23</xref>], Deledao [<xref ref-type="bibr" rid="ref26">26</xref>], Gaggle [<xref ref-type="bibr" rid="ref27">27</xref>], ManagedMethods [<xref ref-type="bibr" rid="ref31">31</xref>], Navigate360 [<xref ref-type="bibr" rid="ref32">32</xref>], Safer Schools Together [<xref ref-type="bibr" rid="ref34">34</xref>], Securly [<xref ref-type="bibr" rid="ref35">35</xref>], and Sergeant Laboratories [<xref ref-type="bibr" rid="ref36">36</xref>]) may be at a higher risk of generating false positive alerts that lead to unwarranted disciplinary procedures for students [<xref ref-type="bibr" rid="ref39">39</xref>]. To reduce these risks, surveillance companies should use methods to identify AI bias (eg, data audits, fairness metrics, or adversarial testing) and mitigate it (eg, algorithmic fairness techniques, training models on diverse data, or continuous human oversight) [<xref ref-type="bibr" rid="ref40">40</xref>-<xref ref-type="bibr" rid="ref42">42</xref>], while providing transparent information to consumers.</p><p>There is a notable lack of transparency about how surveillance companies work and a dearth of research on whether these school-based online surveillance products improve student outcomes and prevent harms [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref44">44</xref>]. Research on other types of school-based online surveillance (eg, security guards, cameras, or metal detectors) suggests that school surveillance is ineffective in preventing violence [<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref46">46</xref>] and has negative effects on youth mental health [<xref ref-type="bibr" rid="ref47">47</xref>-<xref ref-type="bibr" rid="ref52">52</xref>], adding to concern about broad implementation of online surveillance technology in schools. The dearth of empirical research on online surveillance services is especially concerning given the serious topics facing students that online surveillance companies claim to prevent (eg, suicidality, self-harm, cyberbullying, and gun violence). Without transparency and accountability, this industry is susceptible to unproductive competition and even deceptive practices. Federal education grants are often used to pay for school-based online surveillance services [<xref ref-type="bibr" rid="ref53">53</xref>], but at present, the lack of research or reliable metrics makes it difficult to determine whether this technology is an appropriate use of federal funds. Further, any gains in school safety from this technology should be assessed in balance to the potential loss in privacy and cybersecurity risks.</p><p>Excessive surveillance may lead to a loss of students&#x2019; intimate privacy [<xref ref-type="bibr" rid="ref43">43</xref>] which can impede their learning, social development, and mental health. Sharing of student data with outside companies also exposes such data to wider cybersecurity attacks. The sensitivity of the topic area, an opaque market, a lack of empirical assessment of effectiveness, and the growing prowess of data extraction and analysis are concerning. These factors, taken together with trade-offs of decreased privacy and increased cybersecurity risks, suggest that the school-based online surveillance industry may require more oversight from regulators, greater monitoring from the public, and more thorough risk assessment. Policy options to mitigate risks may include federal regulations on AI bias, transparency requirements for surveillance companies, and opt-in mechanisms for student monitoring outside of school hours.</p><p>These companies&#x2019; extensive access to students&#x2019; online data activity 24/7 also raises questions regarding the role of the school versus the role of parents in monitoring and controlling minors&#x2019; technology use. It is unclear to what extent students, parents, and guardians understand or even are aware of schools&#x2019; use of surveillance technology. Our team had challenges accessing detailed, clear information about these companies, suggesting it is currently difficult for students and parents to find information to make informed decisions. More attention should be given to the issue of how to communicate the relevant information and craft opt-in and opt-out options to parents for school-based digital surveillance.</p><p>While this research analyzed the scope and nature of surveillance services currently provided to schools, an important question that remains to be further examined is why are we observing this particular structure of service offerings. In particular, it could be the result of the intentions of both the suppliers and the customers (schools). For example, 1 possibility is that the surveillance companies developed a comprehensive menu of services in terms of surveillance method, scope, and frequency, and schools choose what they deem appropriate and affordable from the menu. If this were the case, then what we are observing largely reflects the schools&#x2019; preferences for what to monitor and how to use the information. In contrast, another possibility is that the surveillance technology companies decide on what services to offer based on their own knowledge of what monitoring is effective, as well as their financial incentives, such as the profitability of each type of service and the legal and reputational risks involved. They then actively persuade schools to adopt certain types of services. The eventual market outcome is likely a result of both dynamics. Future research can investigate to what extent schools versus surveillance service providers have greater influence in the service selection decisions.</p></sec><sec id="s4-2"><title>Limitations</title><p>We have identified a thorough list of companies through GovSpend and EdSurge&#x2019;s EdTech Index, reviewing news articles mentioning school-based online surveillance, and cross-referencing with qualitative data from other ongoing work in our research program. However, it is possible that our search strategy missed one or more companies due to gaps in databases or news coverage. Similarly, we limited our analysis to companies that market to schools, so we may be underestimating the scope and scale of the school-based online surveillance industry. We limited this analysis to companies that market to schools because school settings are distinct from other surveillance use cases (eg, law enforcement).</p><p>With the rapidly changing landscape of technology companies, the content of these company websites may have changed in the time since we conducted data extraction. This analysis does not include 3 online surveillance companies (GeoListening, GeoFeedia, and SnapTrends) that are no longer in operation.</p><p>The exclusive reliance on publicly available website content for our content analysis may lead to incomplete or skewed representations of what school-based online surveillance services actually do in practice. Websites are often marketing tools, and companies may not disclose all relevant information or may present their services in a favorable light. Publicly available information on websites may not reflect internal policies or contract terms. However, we chose to rely solely on company website data because that is what school administrators purchasing these services are exposed to, and to ensure reproducibility of this study and lay the foundation for future work evaluating claims made by school-based online surveillance companies. Future research to evaluate these claims may include qualitative interviews with stakeholders, analysis of school contracts, or testing surveillance systems in practice.</p></sec><sec id="s4-3"><title>Conclusions</title><p>School-based online surveillance companies all claim to closely monitor student activity on school-provided devices and accounts, and many also claim to monitor personal devices and accounts. Despite a lack of evidence for the effectiveness of these products, these companies nonetheless have extensive reach into the digital lives of students and their families. Further, federal funds are often used to pay for these services that monitor student activity 24/7 and use opaque algorithms to process student data. This paper can serve as an informative tool for parents, youth, researchers, and regulators curious about the scope and depth of school-based online surveillance services who are seeking to make informed decisions about this technology.</p></sec></sec></body><back><ack><p>The authors would like to thank Mark Rothstein, JD, and Natalie Gonzalez, BA, for their contributions to this project. This work was supported by National Institutes of Mental Health grant R01MH129774 &#x201C;Stakeholder Perspectives on Social Media Surveillance in Schools&#x201D; (principal investigator: CSB) and the Center for Empathy and Technology of the Institute for Empathy and Compassion at the University of California San Diego.</p></ack><fn-group><fn fn-type="con"><p>AO worked on conceptualization, data curation, formal analysis, investigation, methodology, project administration, visualization, and writing of the original draft. WL did the review and editing of the writing. CSB handled the conceptualization, funding acquisition, supervision, and review and editing of the writing.</p></fn><fn fn-type="conflict"><p>None declared.</p></fn></fn-group><glossary><title>Abbreviations</title><def-list><def-item><term id="abb1">AI</term><def><p>artificial intelligence</p></def></def-item><def-item><term id="abb2">EdTech</term><def><p>Educational Technology</p></def></def-item></def-list></glossary><ref-list><title>References</title><ref id="ref1"><label>1</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Patel</surname><given-names>F</given-names> </name><name name-style="western"><surname>Levinson-Waldman</surname><given-names>R</given-names> </name></person-group><article-title>Schools: social media surveillance</article-title><source>Brennan Center for Justice</source><year>2019</year><month>04</month><day>30</day><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.brennancenter.org/issues/protect-liberty-security/social-media/schools-social-media-surveillance">https://www.brennancenter.org/issues/protect-liberty-security/social-media/schools-social-media-surveillance</ext-link></comment></nlm-citation></ref><ref id="ref2"><label>2</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Burke</surname><given-names>C</given-names> </name><name name-style="western"><surname>Bloss</surname><given-names>C</given-names> </name></person-group><article-title>Social media surveillance in schools: rethinking public health interventions in the digital age</article-title><source>J Med Internet Res</source><year>2020</year><month>11</month><day>12</day><volume>22</volume><issue>11</issue><fpage>e22612</fpage><pub-id pub-id-type="doi">10.2196/22612</pub-id><pub-id pub-id-type="medline">33179599</pub-id></nlm-citation></ref><ref id="ref3"><label>3</label><nlm-citation citation-type="web"><article-title>The brave new world of AI-powered self-harm alerts</article-title><source>The New York Times</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.nytimes.com/2024/12/09/health/suicide-monitoring-software-schools.html">https://www.nytimes.com/2024/12/09/health/suicide-monitoring-software-schools.html</ext-link></comment></nlm-citation></ref><ref id="ref4"><label>4</label><nlm-citation citation-type="report"><person-group person-group-type="author"><name name-style="western"><surname>Curtin</surname><given-names>SC</given-names> </name><name name-style="western"><surname>Garnett</surname><given-names>MF</given-names> </name></person-group><article-title>Suicide and homicide death rates among youth and young adults aged 10-24: United States, 2001-2021</article-title><year>2023</year><month>06</month><access-date>2025-06-17</access-date><publisher-name>NCHS Data Brief</publisher-name><comment><ext-link ext-link-type="uri" xlink:href="https://stacks.cdc.gov/view/cdc/128423">https://stacks.cdc.gov/view/cdc/128423</ext-link></comment></nlm-citation></ref><ref id="ref5"><label>5</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Marcotte</surname><given-names>DE</given-names> </name><name name-style="western"><surname>Hansen</surname><given-names>B</given-names> </name></person-group><article-title>The re&#x2010;emerging suicide crisis in the U.S.: patterns, causes and solutions</article-title><source>J Policy Anal Manage</source><year>2024</year><month>03</month><volume>43</volume><issue>2</issue><fpage>582</fpage><lpage>612</lpage><pub-id pub-id-type="doi">10.1002/pam.22526</pub-id></nlm-citation></ref><ref id="ref6"><label>6</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Cox</surname><given-names>JW</given-names> </name><name name-style="western"><surname>Rich</surname><given-names>S</given-names> </name><name name-style="western"><surname>Trevor</surname><given-names>L</given-names> </name><name name-style="western"><surname>Muyskens</surname><given-names>J</given-names> </name><name name-style="western"><surname>Ulmanu</surname><given-names>M</given-names> </name></person-group><article-title>There have been 413 school shootings since Columbine, according to post data</article-title><source>The Washington Post</source><year>2024</year><month>07</month><day>1</day><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.washingtonpost.com/education/interactive/school-shootings-database">https://www.washingtonpost.com/education/interactive/school-shootings-database</ext-link></comment></nlm-citation></ref><ref id="ref7"><label>7</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Zhu</surname><given-names>C</given-names> </name><name name-style="western"><surname>Huang</surname><given-names>S</given-names> </name><name name-style="western"><surname>Evans</surname><given-names>R</given-names> </name><name name-style="western"><surname>Zhang</surname><given-names>W</given-names> </name></person-group><article-title>Cyberbullying among adolescents and children: a comprehensive review of the global situation, risk factors, and preventive measures</article-title><source>Front Public Health</source><year>2021</year><volume>9</volume><fpage>634909</fpage><pub-id pub-id-type="doi">10.3389/fpubh.2021.634909</pub-id><pub-id pub-id-type="medline">33791270</pub-id></nlm-citation></ref><ref id="ref8"><label>8</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>O&#x2019;Daffer</surname><given-names>A</given-names> </name><name name-style="western"><surname>Bintliff</surname><given-names>AV</given-names> </name><name name-style="western"><surname>Bloss</surname><given-names>CS</given-names> </name></person-group><article-title>Getting schooled on social media and adolescent mental health</article-title><source>J Adolesc Health</source><year>2024</year><month>08</month><volume>75</volume><issue>2</issue><fpage>211</fpage><lpage>213</lpage><pub-id pub-id-type="doi">10.1016/j.jadohealth.2024.05.002</pub-id><pub-id pub-id-type="medline">38852088</pub-id></nlm-citation></ref><ref id="ref9"><label>9</label><nlm-citation citation-type="web"><article-title>Report&#x2013;hidden harms: the misleading promise of monitoring students online. center for democracy and technology</article-title><source>Center for Democracy and Technology</source><year>2022</year><month>08</month><day>3</day><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://cdt.org/insights/report-hidden-harms-the-misleading-promise-of-monitoring-students-online/">https://cdt.org/insights/report-hidden-harms-the-misleading-promise-of-monitoring-students-online/</ext-link></comment></nlm-citation></ref><ref id="ref10"><label>10</label><nlm-citation citation-type="report"><article-title>EdTech in schools: creating safer digital learning environments</article-title><year>2022</year><access-date>2025-06-17</access-date><publisher-name>Morning Consult</publisher-name><comment><ext-link ext-link-type="uri" xlink:href="https://assets2.brandfolder.io/bf-boulder-prod/mv9r5xvp273j8k7gn9bgnr/v/1099809031/original/Edtech_in_Schools%20-%20Creating_Safer_Digital_Learning_Environments.pdf">https://assets2.brandfolder.io/bf-boulder-prod/mv9r5xvp273j8k7gn9bgnr/v/1099809031/original/Edtech_in_Schools%20-%20Creating_Safer_Digital_Learning_Environments.pdf</ext-link></comment></nlm-citation></ref><ref id="ref11"><label>11</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Burke</surname><given-names>C</given-names> </name><name name-style="western"><surname>Triplett</surname><given-names>C</given-names> </name><name name-style="western"><surname>Rubanovich</surname><given-names>CK</given-names> </name><name name-style="western"><surname>Karnaze</surname><given-names>MM</given-names> </name><name name-style="western"><surname>Bloss</surname><given-names>CS</given-names> </name></person-group><article-title>Attitudes toward school-based surveillance of adolescents&#x2019; social media activity: convergent parallel mixed methods survey</article-title><source>JMIR Form Res</source><year>2024</year><month>02</month><day>6</day><volume>8</volume><issue>1</issue><fpage>e46746</fpage><pub-id pub-id-type="doi">10.2196/46746</pub-id><pub-id pub-id-type="medline">38319696</pub-id></nlm-citation></ref><ref id="ref12"><label>12</label><nlm-citation citation-type="web"><article-title>Digital dystopia: the danger in buying what the EdTech surveillance industry is selling</article-title><source>American Civil Liberties Union</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.aclu.org/publications/digital-dystopia-the-danger-in-buying-what-the-edtech-surveillance-industry-is-selling">https://www.aclu.org/publications/digital-dystopia-the-danger-in-buying-what-the-edtech-surveillance-industry-is-selling</ext-link></comment></nlm-citation></ref><ref id="ref13"><label>13</label><nlm-citation citation-type="web"><article-title>Children&#x2019;s Internet Protection Act (CIPA)</article-title><source>Federal Communications Commission</source><year>2024</year><month>07</month><day>5</day><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.fcc.gov/consumers/guides/childrens-internet-protection-act">https://www.fcc.gov/consumers/guides/childrens-internet-protection-act</ext-link></comment></nlm-citation></ref><ref id="ref14"><label>14</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Shade</surname><given-names>LR</given-names> </name><name name-style="western"><surname>Singh</surname><given-names>R</given-names> </name></person-group><article-title>&#x201C;Honestly, we&#x2019;re not spying on kids&#x201D;: school surveillance of young people&#x2019;s social media</article-title><source>Soc Media + Soc</source><year>2016</year><month>10</month><volume>2</volume><issue>4</issue><pub-id pub-id-type="doi">10.1177/2056305116680005</pub-id></nlm-citation></ref><ref id="ref15"><label>15</label><nlm-citation citation-type="web"><article-title>Snaptrends quietly lays off entire staff, ceases operations</article-title><source>The American Genius</source><year>2016</year><month>10</month><day>31</day><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://theamericangenius.com/business-news/snaptrends-quietly-lays-off-entire-staff-ceases-operations/">https://theamericangenius.com/business-news/snaptrends-quietly-lays-off-entire-staff-ceases-operations/</ext-link></comment></nlm-citation></ref><ref id="ref16"><label>16</label><nlm-citation citation-type="web"><article-title>Facebook, Instagram, and Twitter provided data access for a surveillance product marketed to target activists of color</article-title><source>ACLU Northern California</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.aclunc.org/blog/facebook-instagram-and-twitter-provided-data-access-surveillance-product-marketed-target">https://www.aclunc.org/blog/facebook-instagram-and-twitter-provided-data-access-surveillance-product-marketed-target</ext-link></comment></nlm-citation></ref><ref id="ref17"><label>17</label><nlm-citation citation-type="web"><article-title>Advances in AI increase risks of government social media monitoring</article-title><source>Brennan Center for Justice</source><year>2023</year><month>07</month><day>26</day><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.brennancenter.org/our-work/analysis-opinion/advances-ai-increase-risks-government-social-media-monitoring">https://www.brennancenter.org/our-work/analysis-opinion/advances-ai-increase-risks-government-social-media-monitoring</ext-link></comment></nlm-citation></ref><ref id="ref18"><label>18</label><nlm-citation citation-type="web"><article-title>eCFR :: 34 CFR Part 99 -- Family Educational Rights and Privacy</article-title><source>Code of Federal Regulations</source><year>1974</year><access-date>2025-06-19</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.ecfr.gov/current/title-34/subtitle-A/part-99">https://www.ecfr.gov/current/title-34/subtitle-A/part-99</ext-link></comment></nlm-citation></ref><ref id="ref19"><label>19</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hofmann</surname><given-names>V</given-names> </name><name name-style="western"><surname>Kalluri</surname><given-names>PR</given-names> </name><name name-style="western"><surname>Jurafsky</surname><given-names>D</given-names> </name><name name-style="western"><surname>King</surname><given-names>S</given-names> </name></person-group><article-title>AI generates covertly racist decisions about people based on their dialect</article-title><source>Nature New Biol</source><year>2024</year><month>09</month><volume>633</volume><issue>8028</issue><fpage>147</fpage><lpage>154</lpage><pub-id pub-id-type="doi">10.1038/s41586-024-07856-5</pub-id><pub-id pub-id-type="medline">39198640</pub-id></nlm-citation></ref><ref id="ref20"><label>20</label><nlm-citation citation-type="web"><article-title>GovSpend platform</article-title><source>GovSpend</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://govspend.com/govspend-platform/">https://govspend.com/govspend-platform/</ext-link></comment></nlm-citation></ref><ref id="ref21"><label>21</label><nlm-citation citation-type="web"><article-title>eCFR :: 34 CFR Part 99 Subpart D -- may an educational agency or institution disclose personally identifiable information from education records?</article-title><source>Code of Federal Regulations</source><access-date>2025-06-19</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.ecfr.gov/current/title-34/subtitle-A/part-99/subpart-D">https://www.ecfr.gov/current/title-34/subtitle-A/part-99/subpart-D</ext-link></comment></nlm-citation></ref><ref id="ref22"><label>22</label><nlm-citation citation-type="web"><article-title>About</article-title><source>EdTech Index</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://index.edsurge.com/about/">https://index.edsurge.com/about/</ext-link></comment></nlm-citation></ref><ref id="ref23"><label>23</label><nlm-citation citation-type="web"><source>Ativion &#x2013; safeguard</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.ativion.com/">https://www.ativion.com/</ext-link></comment></nlm-citation></ref><ref id="ref24"><label>24</label><nlm-citation citation-type="web"><article-title>Internet safety for students and schools</article-title><source>Bark for Schools</source><access-date>2024-10-02</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.bark.us/schools">https://www.bark.us/schools</ext-link></comment></nlm-citation></ref><ref id="ref25"><label>25</label><nlm-citation citation-type="web"><source>Blocksi</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://blocksi.net/">https://blocksi.net/</ext-link></comment></nlm-citation></ref><ref id="ref26"><label>26</label><nlm-citation citation-type="web"><article-title>ActivePulse: student wellness</article-title><source>Deledao</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.deledao.com/activepulse-student-wellness">https://www.deledao.com/activepulse-student-wellness</ext-link></comment></nlm-citation></ref><ref id="ref27"><label>27</label><nlm-citation citation-type="web"><article-title>Student safety monitoring software for K-12</article-title><source>Gaggle Inc</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.gaggle.net/safety-management">https://www.gaggle.net/safety-management</ext-link></comment></nlm-citation></ref><ref id="ref28"><label>28</label><nlm-citation citation-type="web"><article-title>Beacon</article-title><source>GoGuardian</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.goguardian.com/beacon">https://www.goguardian.com/beacon</ext-link></comment></nlm-citation></ref><ref id="ref29"><label>29</label><nlm-citation citation-type="web"><source>Lightspeed Systems</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.lightspeedsystems.com/">https://www.lightspeedsystems.com/</ext-link></comment></nlm-citation></ref><ref id="ref30"><label>30</label><nlm-citation citation-type="web"><source>Linewize</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.linewize.com">https://www.linewize.com</ext-link></comment></nlm-citation></ref><ref id="ref31"><label>31</label><nlm-citation citation-type="web"><article-title>Student self-harm detection</article-title><source>ManagedMethods</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://managedmethods.com/use-cases/student-self-harm-detection/">https://managedmethods.com/use-cases/student-self-harm-detection/</ext-link></comment></nlm-citation></ref><ref id="ref32"><label>32</label><nlm-citation citation-type="web"><article-title>Digital threat detection software for schools</article-title><source>Navigate360</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://navigate360.com/solutions/digital-threat-detection/">https://navigate360.com/solutions/digital-threat-detection/</ext-link></comment></nlm-citation></ref><ref id="ref33"><label>33</label><nlm-citation citation-type="web"><article-title>Solutions - best in class web filtering</article-title><source>Netsweeper</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.netsweeper.com/solutions">https://www.netsweeper.com/solutions</ext-link></comment></nlm-citation></ref><ref id="ref34"><label>34</label><nlm-citation citation-type="web"><source>Safer Schools Together</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://saferschoolstogether.com/">https://saferschoolstogether.com/</ext-link></comment></nlm-citation></ref><ref id="ref35"><label>35</label><nlm-citation citation-type="web"><source>Securly</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.securly.com/">https://www.securly.com/</ext-link></comment></nlm-citation></ref><ref id="ref36"><label>36</label><nlm-citation citation-type="web"><source>Sergeant Laboratories</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.sgtlabs.com/">https://www.sgtlabs.com/</ext-link></comment></nlm-citation></ref><ref id="ref37"><label>37</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Page</surname><given-names>MJ</given-names> </name><name name-style="western"><surname>McKenzie</surname><given-names>JE</given-names> </name><name name-style="western"><surname>Bossuyt</surname><given-names>PM</given-names> </name><etal/></person-group><article-title>The PRISMA 2020 statement: an updated guideline for reporting systematic reviews</article-title><source>BMJ</source><year>2021</year><month>03</month><day>29</day><volume>372</volume><fpage>n71</fpage><pub-id pub-id-type="doi">10.1136/bmj.n71</pub-id><pub-id pub-id-type="medline">33782057</pub-id></nlm-citation></ref><ref id="ref38"><label>38</label><nlm-citation citation-type="web"><source>ManagedMethods</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://managedmethods.com/">https://managedmethods.com/</ext-link></comment></nlm-citation></ref><ref id="ref39"><label>39</label><nlm-citation citation-type="web"><article-title>Warren, Markey investigation finds that EdTech student surveillance platforms need urgent federal action to protect students</article-title><source>US Senator Elizabeth Warren of Massachusetts</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.warren.senate.gov/oversight/reports/warren-markey-investigation-finds-that-edtech-student-surveillance-platforms-need-urgent-federal-action-to-protect-students">https://www.warren.senate.gov/oversight/reports/warren-markey-investigation-finds-that-edtech-student-surveillance-platforms-need-urgent-federal-action-to-protect-students</ext-link></comment></nlm-citation></ref><ref id="ref40"><label>40</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Roselli</surname><given-names>D</given-names> </name><name name-style="western"><surname>Matthews</surname><given-names>J</given-names> </name><name name-style="western"><surname>Talagala</surname><given-names>N</given-names> </name></person-group><article-title>Managing bias in AI</article-title><access-date>2025-06-17</access-date><conf-name>Companion Proceedings of The 2019 World Wide Web Conference WWW &#x2019;19</conf-name><conf-date>May 13-17, 2019</conf-date><conf-loc>San Francisco, United States</conf-loc><comment><ext-link ext-link-type="uri" xlink:href="https://dl.acm.org/doi/proceedings/10.1145/3308560">https://dl.acm.org/doi/proceedings/10.1145/3308560</ext-link></comment><pub-id pub-id-type="doi">10.1145/3308560.3317590</pub-id></nlm-citation></ref><ref id="ref41"><label>41</label><nlm-citation citation-type="other"><person-group person-group-type="author"><name name-style="western"><surname>McDuff</surname><given-names>D</given-names> </name><name name-style="western"><surname>Cheng</surname><given-names>R</given-names> </name><name name-style="western"><surname>Kapoor</surname><given-names>A</given-names> </name></person-group><article-title>Identifying bias in AI using simulation</article-title><source>arXiv</source><comment>Preprint posted online on  Sep 30, 2018</comment><pub-id pub-id-type="doi">10.48550/arXiv.1810.00471</pub-id></nlm-citation></ref><ref id="ref42"><label>42</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Mavrogiorgos</surname><given-names>K</given-names> </name><name name-style="western"><surname>Kiourtis</surname><given-names>A</given-names> </name><name name-style="western"><surname>Mavrogiorgou</surname><given-names>A</given-names> </name><name name-style="western"><surname>Menychtas</surname><given-names>A</given-names> </name><name name-style="western"><surname>Kyriazis</surname><given-names>D</given-names> </name></person-group><article-title>Bias in machine learning: a literature review</article-title><source>Appl Sci (Basel)</source><year>2024</year><volume>14</volume><issue>19</issue><fpage>8860</fpage><pub-id pub-id-type="doi">10.3390/app14198860</pub-id></nlm-citation></ref><ref id="ref43"><label>43</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Citron</surname><given-names>DK</given-names> </name></person-group><article-title>The surveilled student</article-title><source>Stanford Law Rev</source><year>2024</year><access-date>2025-06-17</access-date><volume>76</volume><issue>7</issue><fpage>1439</fpage><lpage>1472</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://review.law.stanford.edu/wp-content/uploads/sites/3/2024/10/Citron-76-Stan.-L.-Rev.-1439.pdf">https://review.law.stanford.edu/wp-content/uploads/sites/3/2024/10/Citron-76-Stan.-L.-Rev.-1439.pdf</ext-link></comment></nlm-citation></ref><ref id="ref44"><label>44</label><nlm-citation citation-type="web"><article-title>Uvalde, gun violence, and surveillance technology in the aftermath of school shootings</article-title><source>Vox</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.vox.com/recode/23150863/school-surveillance-mass-shooting-texas-uvalde">https://www.vox.com/recode/23150863/school-surveillance-mass-shooting-texas-uvalde</ext-link></comment></nlm-citation></ref><ref id="ref45"><label>45</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Alexandrie</surname><given-names>G</given-names> </name></person-group><article-title>Surveillance cameras and crime: a review of randomized and natural experiments</article-title><source>JSSCCP</source><year>2017</year><month>07</month><day>3</day><volume>18</volume><issue>2</issue><fpage>210</fpage><lpage>222</lpage><pub-id pub-id-type="doi">10.1080/14043858.2017.1387410</pub-id></nlm-citation></ref><ref id="ref46"><label>46</label><nlm-citation citation-type="web"><article-title>San Francisco surveillance cameras don&#x2019;t reduce violent crime, study finds</article-title><source>ACLU Northern California</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.aclunc.org/blog/san-francisco-surveillance-cameras-don%E2%80%99t-reduce-violent-crime-study-finds">https://www.aclunc.org/blog/san-francisco-surveillance-cameras-don%E2%80%99t-reduce-violent-crime-study-finds</ext-link></comment></nlm-citation></ref><ref id="ref47"><label>47</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Malik</surname><given-names>AS</given-names> </name><name name-style="western"><surname>Acharya</surname><given-names>S</given-names> </name><name name-style="western"><surname>Humane</surname><given-names>S</given-names> </name></person-group><article-title>Exploring the impact of security technologies on mental health: a comprehensive review</article-title><source>Cureus</source><year>2024</year><month>02</month><volume>16</volume><issue>2</issue><fpage>e53664</fpage><pub-id pub-id-type="doi">10.7759/cureus.53664</pub-id><pub-id pub-id-type="medline">38455776</pub-id></nlm-citation></ref><ref id="ref48"><label>48</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Duffy</surname><given-names>BE</given-names> </name><name name-style="western"><surname>Chan</surname><given-names>NK</given-names> </name></person-group><article-title>"You never really know who&#x2019;s looking": imagined surveillance across social media platforms</article-title><source>New Media Soc</source><year>2019</year><month>01</month><volume>21</volume><issue>1</issue><fpage>119</fpage><lpage>138</lpage><pub-id pub-id-type="doi">10.1177/1461444818791318</pub-id></nlm-citation></ref><ref id="ref49"><label>49</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Birnhack</surname><given-names>M</given-names> </name><name name-style="western"><surname>Perry-Hazan</surname><given-names>L</given-names> </name></person-group><article-title>School surveillance in context: high school students&#x2019; perspectives on CCTV, privacy, and security</article-title><source>Youth Soc</source><year>2020</year><month>10</month><volume>52</volume><issue>7</issue><fpage>1312</fpage><lpage>1330</lpage><pub-id pub-id-type="doi">10.1177/0044118X20916617</pub-id></nlm-citation></ref><ref id="ref50"><label>50</label><nlm-citation citation-type="thesis"><person-group person-group-type="author"><name name-style="western"><surname>Persson</surname><given-names>A</given-names> </name><name name-style="western"><surname>Eleyan</surname><given-names>A</given-names> </name></person-group><article-title>Student perspectives on school surveillance: an explorative study using a mobile application prototype [master&#x2019;s thesis]</article-title><year>2019</year><publisher-name>Ume&#x00E5; University</publisher-name><comment><ext-link ext-link-type="uri" xlink:href="http://www.diva-portal.org/smash/record.jsf?pid=diva2%3A1329863&#x0026;dswid=-9519">http://www.diva-portal.org/smash/record.jsf?pid=diva2%3A1329863&#x0026;dswid=-9519</ext-link></comment></nlm-citation></ref><ref id="ref51"><label>51</label><nlm-citation citation-type="report"><person-group person-group-type="author"><name name-style="western"><surname>Cortesi</surname><given-names>S</given-names> </name><name name-style="western"><surname>Haduong</surname><given-names>P</given-names> </name><name name-style="western"><surname>Gasser</surname><given-names>U</given-names> </name><name name-style="western"><surname>Aricak</surname><given-names>OT</given-names> </name><name name-style="western"><surname>Saldaaa</surname><given-names>M</given-names> </name><name name-style="western"><surname>Lerner</surname><given-names>Z</given-names> </name></person-group><article-title>Youth perspectives on tech in schools: from mobile devices to restrictions and monitoring</article-title><year>2014</year><month>01</month><day>15</day><publisher-name>Berkman Center Research Publication</publisher-name><pub-id pub-id-type="doi">10.2139/ssrn.2378590</pub-id></nlm-citation></ref><ref id="ref52"><label>52</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bottiani</surname><given-names>J</given-names> </name><name name-style="western"><surname>Waasdorp</surname><given-names>TE</given-names> </name><name name-style="western"><surname>Bradshaw</surname><given-names>CP</given-names> </name><name name-style="western"><surname>Johnson</surname><given-names>SL</given-names> </name></person-group><article-title>Surveillance or safekeeping? How school security officer and camera presence influence students&#x2019; perceptions of safety, equity, and support</article-title><source>J Adolesc Health</source><year>2018</year><month>12</month><volume>63</volume><issue>6</issue><fpage>732</fpage><lpage>738</lpage><pub-id pub-id-type="doi">10.1016/j.jadohealth.2018.06.008</pub-id><pub-id pub-id-type="medline">30197197</pub-id></nlm-citation></ref><ref id="ref53"><label>53</label><nlm-citation citation-type="web"><article-title>K-12 school safety grants and federal funding</article-title><source>Raptor Technologies</source><access-date>2025-06-17</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://raptortech.com/school-safety-grants-and-federal-funding/">https://raptortech.com/school-safety-grants-and-federal-funding/</ext-link></comment></nlm-citation></ref></ref-list><app-group><supplementary-material id="app1"><label>Multimedia Appendix 1</label><p>Codebook.</p><media xlink:href="jmir_v27i1e71998_app1.docx" xlink:title="DOCX File, 18 KB"/></supplementary-material><supplementary-material id="app2"><label>Multimedia Appendix 2</label><p>LinkedIn information about school-based online surveillance companies.</p><media xlink:href="jmir_v27i1e71998_app2.docx" xlink:title="DOCX File, 17 KB"/></supplementary-material><supplementary-material id="app3"><label>Multimedia Appendix 3</label><p>Features offered by school-based online surveillance companies (N=14).</p><media xlink:href="jmir_v27i1e71998_app3.docx" xlink:title="DOCX File, 20 KB"/></supplementary-material></app-group></back></article>