Licensed & Insured — Texas Private Security & Investigations
24/7 Available (800) 930-5298

DFW Security & Investigations Glossary

54 defined terms covering Texas security licensing, private investigation methods, fugitive recovery, inmate transport, fire watch compliance, and the legal context that governs every engagement we handle. Compiled from 40+ years of field experience across the Dallas-Fort Worth metroplex.

01

Security Personnel

2 terms

Armed Security Officer

A licensed security guard authorized to carry a firearm while on duty. In Texas, armed security officers must hold a Level III commission issued by the Texas Department of Public Safety Private Security Bureau, complete additional firearms training, and qualify on a state-approved firearms course.

Unarmed Security Officer

A licensed security guard who provides protection without carrying a firearm. In Texas, unarmed security officers hold a Level II registration through the Texas DPS Private Security Bureau and complete state-mandated training before deployment.

02

Texas Licensing

7 terms

Level II Officer

Texas DPS classification for unarmed, non-commissioned security officers. Requires registration with the Texas Department of Public Safety and completion of an 8-hour state-approved training course covering legal authority, ethics, and emergency response.

Level III Officer

Texas DPS classification for commissioned armed security officers. Requires Level II training plus a 15-hour firearms training course, range qualification, and a commission issued by the Texas Department of Public Safety Private Security Bureau.

Level IV Officer (Personal Protection Officer)

Texas DPS classification for commissioned personal protection officers (executive protection). Requires Level III qualification plus a 15-hour Personal Protection Officer course covering close protection, threat assessment, and protective intelligence.

Class C License

A combined Texas Department of Public Safety license authorizing both Security Services and Private Investigation operations. EJR Agency operates under Class C License C04922, allowing both guard services and licensed investigative work statewide.

Texas DPS Private Security Bureau

The regulatory division of the Texas Department of Public Safety responsible for licensing private security companies, security officers, private investigators, and related personnel under Texas Occupations Code Chapter 1702.

Texas Occupations Code Chapter 1702

The Texas statute governing private security and private investigation services. Defines licensing requirements, scope of authorized services, training mandates, and prohibited conduct for all licensed security and investigation businesses operating in Texas.

Class A License (Private Investigator)

Texas DPS license authorizing an individual or company to provide private investigation services. Class A licensees can conduct surveillance, background investigations, asset searches, missing persons cases, and other investigative work under Texas Occupations Code Chapter 1702.

03

Security Services

7 terms

Mobile Patrol

Security service in which uniformed officers patrol multiple client properties on a randomized schedule using marked patrol vehicles. Mobile patrol provides visible deterrence and incident response without the cost of a full-time on-site guard, with each visit logged and reported to the property owner.

Fire Watch

Continuous patrol of a property by trained personnel during periods when fire suppression systems are impaired or hot work is underway. Required by Texas fire codes when sprinkler systems are out of service for more than 4 hours, fire watch officers patrol the affected area, document conditions, and notify emergency services if fire is detected.

Construction Site Security

Security guard services protecting active and inactive construction projects from equipment theft, material loss, vandalism, and trespassing. Construction security typically includes overnight and weekend patrols, access point monitoring, daily activity reporting, and coordination with general contractors and project managers.

Apartment Security

Licensed security guard services for multifamily residential properties including gate monitoring, common area patrol, parking lot security, after-hours access control, and incident response. Apartment security supports tenant safety, premises liability documentation, and consistent enforcement of community policies.

Event Security

Licensed security personnel deployed for crowd management, access control, credential verification, and incident response at public and private events. Event security includes concerts, corporate gatherings, weddings, festivals, and any function requiring crowd safety management.

Executive Protection

Specialized close protection services for executives, public figures, and high-net-worth individuals. Executive protection in Texas requires Level IV Personal Protection Officer commissioning and includes threat assessment, advance planning, secure transportation coordination, and on-the-ground protective operations.

Emergency Security Services

Rapid-deployment security services for urgent situations including post-incident coverage, immediate threat response, fire watch on short notice, and emergency property protection. Emergency security typically deploys within hours rather than the standard 24-48 hour timeline.

04

Security Operations

6 terms

Access Control

The practice of regulating who may enter a property and verifying their credentials before granting access. Access control includes lobby reception, gate monitoring, badge verification, visitor logging, and coordination with electronic access systems.

Perimeter Security

Security focused on the outer boundary of a property — fences, gates, walls, and entry points. Perimeter security includes patrol of the property edge, monitoring of perimeter alarms, and rapid response to perimeter breach indicators.

Post Order

Written instructions given to a security officer detailing the specific duties, patrol routes, reporting requirements, escalation procedures, and rules of engagement for a particular post or property. Post orders are reviewed by officers at shift change and form the basis of accountability for guard performance.

Daily Activity Report (DAR)

A written or digital log produced by a security officer documenting all activities, incidents, observations, and notable events during a shift. DARs include patrol times, unusual occurrences, visitor logs, and conditions observed — providing accountability and creating a record for property managers and insurance documentation.

Incident Report

A formal written document prepared by a security officer detailing a specific event such as a theft, trespass, altercation, injury, or property damage. Incident reports include timestamps, location, parties involved, witnesses, actions taken, and any evidence preserved — supporting insurance claims, premises liability defense, and law enforcement coordination.

Use of Force Continuum

A framework guiding security officers in the appropriate level of response to a given threat or situation, escalating from officer presence and verbal commands through physical control techniques to weapon use only when justified. Texas-licensed officers are trained to operate within this continuum and document use-of-force incidents in detail.

05

Private Investigation

16 terms

Private Investigator

A Texas-licensed individual authorized to conduct investigative work including surveillance, background checks, asset searches, witness interviews, and evidence gathering. Texas private investigators must hold a Class A license through the Texas DPS Private Security Bureau or work under a licensed Class C investigation agency.

Surveillance

The systematic observation and documentation of a subject's activities, typically conducted by licensed private investigators using legal methods including public observation, photographic and video documentation, and pattern analysis. Texas allows surveillance in public spaces but prohibits trespass, unauthorized audio recording in private settings, and other restricted methods.

Counter-Surveillance

The detection and documentation of surveillance being conducted against a client. Counter-surveillance is used by executives, witnesses, and individuals concerned they are being watched — identifying who is observing, documenting their methods, and developing information about the source.

Skip Tracing

The investigative process of locating individuals who have moved without leaving a forwarding address — often debtors, witnesses, or persons avoiding contact. Skip tracing combines database research, public records analysis, social media investigation, and field work to develop verified current addresses and contact information.

Background Check

A comprehensive investigation into a person's history including criminal record, civil litigation, employment, education, addresses, and identity verification. Professional background checks conducted by licensed investigators include verification beyond automated database results, with findings formatted for hiring, leasing, partnership, or litigation decisions.

Due Diligence Investigation

A thorough investigation conducted before a significant business transaction, hiring decision, or partnership agreement. Due diligence investigations verify representations made by parties, document litigation history, identify reputational risks, and confirm the financial standing of individuals or entities.

Process Service

The legal delivery of court documents (summons, subpoena, complaint) to a named party. While not exclusively a PI function, licensed private investigators frequently handle difficult process service cases involving subjects who are evasive or have moved without forwarding information.

Pretexting

The use of false or assumed identity to obtain information from a third party. While some forms of pretexting are legal in investigative work, federal and Texas law prohibit pretexting to obtain financial records, telephone records, and certain other protected information.

Subject of Investigation (SOI)

The person who is the focus of an investigation. Investigators document the SOI's activities, contacts, and movements without alerting them to the investigation's existence — discretion being foundational to most private investigative work.

Investigative Report

The formal written document delivered to a client at the conclusion of an investigation, summarizing findings, methodology, evidence collected, and conclusions. Reports are formatted for court use, internal review, or litigation support depending on the engagement.

Domestic Investigation

A category of investigation involving family or relationship matters — including infidelity, custody disputes, missing family members, and divorce-related asset searches. Domestic investigations require particular discretion and produce evidence often used in Texas family court.

Corporate Investigation

Investigations conducted on behalf of businesses, including employee theft and fraud cases, intellectual property leaks, workplace harassment investigations, executive misconduct cases, and pre-employment due diligence on senior hires.

Insurance Fraud Investigation

Investigation into suspected fraudulent insurance claims, often involving surveillance to verify whether claimants' actual physical activity matches reported injuries. Insurance fraud investigations support workers compensation, disability, and personal injury claim adjusting.

Workers Compensation Investigation

A specialized form of insurance investigation focused on workers compensation claims. Investigators document the claimant's actual activities through surveillance — often capturing video evidence of physical capabilities inconsistent with claimed injuries.

Stakeout

A stationary surveillance operation in which investigators observe a fixed location waiting for a subject to arrive, depart, or take specific action. Stakeouts can extend over hours, days, or weeks depending on the case requirements.

06

Evidence

1 term

Chain of Custody

The documented handling of evidence from collection through presentation in court — recording who collected it, when, where it was stored, and every transfer between parties. Chain of custody documentation is essential for evidence to be admitted in Texas civil and criminal proceedings.

07

Recovery Services

4 terms

Fugitive Recovery Agent

A licensed individual authorized to locate and apprehend bail bond defendants who have failed to appear in court. In Texas, fugitive recovery agents (commonly called bail enforcement agents) operate under specific legal authority granted by the bail bond contract and Texas Code of Criminal Procedure.

Failure to Appear (FTA)

A defendant's failure to appear at a scheduled court date after being released on bail. FTA triggers bail forfeiture proceedings and authorizes the bail bondsman or their agents to locate and surrender the defendant within statutory timeframes.

Bail Bond

A surety contract through which a licensed bondsman guarantees a defendant's appearance at court in exchange for a fee (typically 10% of the bail amount). If the defendant fails to appear, the bondsman becomes liable for the full bail amount unless the defendant is surrendered to custody.

Bail Forfeiture

The legal process by which a bail bond is declared forfeited to the court following a defendant's failure to appear. Forfeiture creates the legal authority and financial motivation for fugitive recovery operations to locate and surrender the defendant.

08

Transport Services

3 terms

Inmate Transport

The secure transportation of incarcerated individuals between correctional facilities, between facilities and courts, or for medical appointments. Inmate transport requires licensed officers, specialized vehicles, chain-of-custody documentation, and compliance with state and federal transport regulations.

Prisoner Transport

A broader term encompassing all forms of secure transportation of detained or incarcerated individuals, including pre-trial transport, inter-facility transfers, and extradition. Prisoner transport in Texas may be conducted by sheriff's departments, contracted private transport services, or U.S. Marshals depending on jurisdiction.

Extradition

The legal process of returning a fugitive from one state or country to another for prosecution or to serve a sentence. Interstate extradition within the U.S. is governed by the Uniform Criminal Extradition Act and typically involves coordination between law enforcement agencies and licensed transport services.

10

Compliance Standards

4 terms

NFPA 25

The National Fire Protection Association standard for the inspection, testing, and maintenance of water-based fire protection systems. Chapter 15 of NFPA 25 governs sprinkler system impairment procedures, including the requirement for fire watch when systems are out of service.

International Fire Code (IFC)

The model fire code adopted as the base fire code by Texas and most jurisdictions. IFC Chapter 9 covers fire protection and life safety systems; Chapter 26 addresses hot work operations. Local jurisdictions including Dallas and Fort Worth may adopt amendments stricter than the IFC baseline.

Premises Liability

The legal responsibility property owners and occupiers have for injuries occurring on their property. Premises liability cases often hinge on whether the property owner provided adequate security and documented their security efforts — making professional security services and incident documentation important defensive measures.

C-TPAT

Customs-Trade Partnership Against Terrorism — a U.S. Customs and Border Protection program for trade community partners. Warehouse and logistics security programs serving import/export facilities support C-TPAT compliance through access control, container security, and personnel verification protocols.

Have a Question Not Covered Here?

EJR Agency has handled DFW security and investigation cases since 1985. Founder E. John Rosa is regularly consulted by FOX 4, WFAA, CBS DFW, and NBC DFW for expert commentary on cases throughout the metroplex. If you have a specific question about Texas security or investigations law, professional methodology, or how we handle a particular case type — call our 24/7 operations desk.

Ready to Get Coverage?

Call our operations desk or request a quote. Guards deployed within hours.

Get a Commercial Security Quote