Pacific Resource Investigative Services

Pacific Resource Investigative ServicesPacific Resource Investigative ServicesPacific Resource Investigative ServicesPacific Resource Investigative Services

Pacific Resource Investigative Services

Pacific Resource Investigative ServicesPacific Resource Investigative ServicesPacific Resource Investigative Services

A Professional Investigation Company

A Professional Investigation CompanyA Professional Investigation CompanyA Professional Investigation Company
Book

About Us

Services

  • Worker's Compensation Investigations
  • Intellectual Property Investigations
  • Domestic Investigations
  • Contestable Death Claim Investigations
  • Liability Investigations
  • History Without Mystery 

BACKGROUND

 The company's founder began his career in the late 1980s working for two prominent local private investigation firms. Subsequently he was hired by a firm out of Los Angeles and was eventually promoted to branch manager. Eventually, he obtained his own professional private investigators license, (California License # PI21999) and began Pacific Resource Investigative Services in 2001. Since that time, we have worked thousands of cases primarily in the workers compensation arena including AOE/COE investigations, serious and willful and sub-Rosa. 

History Without Mystery

   

Everyone has a story to tell and someone who wants to hear it...

Our company, Pacific Resource Investigative Services, is proud to introduce to you and provide you the opportunity to tell your life story to future generations.

Personally, I lost my mother many years ago and often, there are questions that I want to ask her. 

With over 30 years of experience in the Private Investigation industry, our unique position as licensed private investigators lend extensive familiarity with custodian of evidence and records and matters of confidentiality. Our objective in this endeavor is to provide family history to your subsequent generations in a digital video and audio format.  This would be a visual and spoken history of you and your experiences and, at times, could be information that only you could provide to your offspring, their offspring, and other loved ones.  This information will include a wide range of topics and of course, the interview would go in different directions based on your responses to specific questions. 

This information would be collected and stored securely and disseminated only to those whom you have chosen to share it with. This will occur within 45 days of your passing. Words from the departed may help some individuals cope with the loss of a loved one and would be a moving gift to those that you leave behind. 

We have a plan in place as to how your loved ones could become aware of the existence of this material after your passing. 

Please do not hesitate to contact us if we may be of service to you.

Objective

 Pacific Resource Investigative Services specializes in camera sub-Rosa and the investigation of liability and all aspects of workers’ compensation claims, including S&W, AOE/COE and Subrogation. Additionally, we handle contestable death insurance claims as well as intellectual property investigations and in doing so, work very closely with law enforcement. I personally have over thirty (30) years of experience in camera sub-Rosa, mostly in workers’ compensation, honing camera and “tailing” skills over the years to the extent that my success rate is second to none. These skills have been acquired by having been employed by three separate companies. The last one a managerial position prior to having become self-employed. I am credited with having performed the sub-Rosa on one of the first cases (if not the first) in the State of California to have been prosecuted under the workers compensation fraud law, that particular case having been profiled on the CBS Evening News. Subsequently, numerous cases of ours have been referred to the district attorney’s office for fraud prosecution. 


We have worked with the following agencies:


  United States Secret Service 

 United States Department of Homeland Security 

 United States Federal Bureau of Investigation 

 United States Immigration and Customs Enforcement 

 State of California Department of Motor Vehicles 

 State of California Highway Patrol  

 Numerous Law Enforcement Agencies and District Attorney’s Offices  

 Numerous Third Party Administrators, Insurance Companies, Joint Power Authorities and Professional Law Firms 


References are available. 


We are very anxious to assist in guarding against potential fraud. We are motivated, meticulous, and time conscious. We are not afraid to take risks. This is especially effective in obtaining superior sub-Rosa video. You have our promise of a thorough and effective work product, with it always being kept foremost in mind that time is of the essence in completion of your assignment. Enclosed is a sample report for your review. Please note that we video the surrounding area upon arrival, periodically throughout the day and upon departure in an effort to document our time on site. This insures that no padding of the invoice occurs. I am confident that we are competitive in the marketplace, and strive to provide the excellent service that Pacific Resource is known for. If there is something that we can do differently or better, we are eager for constructive criticism and will make the changes necessary in an effort to improve our service. Territory is from Modesto to Bakersfield in the State of California. E-mail or call us today so that we may further discuss a working relationship. Thank you in advance for the opportunity to provide you with excellent service. We consider it a privilege to do so. 

security policy

Security Policy


  

SECTION A

· Computer and Email Usage Policy

To help you do your job, PACIFIC RESOURCE may give you access to computers, computer files, the email system, and software. You should not use a password, access a file, or retrieve any stored communication without authorization. To make sure that all employees follow this policy, we may monitor computer and email usage.

We try hard to have a workplace that is free of harassment and sensitive to the diversity of our employees. Therefore, we do not allow employees to use computers and email in ways that are disruptive, offensive to others, or harmful to morale.

At PACIFIC RESOURCE you may not display, download, or email sexually explicit images, messages, and cartoons. You also may not use computers and email for ethnic slurs, racial comments, off-color jokes, or anything that another person might take as harassment or disrespect.

You may not use email to ask other people to contribute to or to tell them about businesses outside of PACIFIC RESOURCE religious or political causes, outside organizations, or any other non-business matters.

PACIFIC RESOURCE buys and licenses computer software for business purposes. We do not own the copyright to this software or its documentation. Unless the software developer authorizes us, we do not have the right to use the software on more than one computer.

You may only use software on local area networks or on multiple machines according to the software license agreement. PACIFIC RESOURCE prohibits the illegal duplication of software and its documentation.

If you know about any violations to this policy, notify your supervisor, the Human Resources Department or any member of management. Employees who violate this policy are subject to disciplinary action, up to and including termination of employment.

SECTION B

· Internet Usage Policy

PACIFIC RESOURCE may provide you with Internet access to help you do your job. This policy explains our guidelines for using the Internet.

All Internet data that is written, sent, or received through our computer systems is part of official PACIFIC RESOURCE records. That means that we can be legally required to show that information to law enforcement or other parties. Therefore, you should always make sure that the business information contained in Internet email messages and other transmissions is accurate, appropriate, ethical, and legal.

The equipment, services, and technology that you use to access the Internet are the property of PACIFIC RESOURCE. Therefore, we reserve the right to monitor how you use the Internet. We also reserve the right to find and read any data that you write, send, or receive through our online connections or is stored in our computer systems.

You may not write, send, read, or receive data through the Internet that contains content that could be considered discriminatory, offensive, obscene, threatening, harassing, intimidating, or disruptive to any employee or other person.

Examples of unacceptable content include (but are not limited to) sexual comments or images, racial slurs, gender-specific comments, or other comments or images that could reasonably offend someone on the basis of race, age, sex, religious or political beliefs, national origin, disability, sexual orientation, or any other characteristic protected by law.

PACIFIC RESOURCE does not allow the unauthorized use, installation, copying, or distribution of copyrighted, trademarked, or patented material on the Internet. As a general rule, if you did not create the material, do not own the rights to it, or have not received authorization for its use, you may not put the material on the Internet. You are also responsible for making sure that anyone who sends you material over the Internet has the appropriate distribution rights.

If you use the Internet in a way that violates the law or PACIFIC RESOURCE. policies, you will be subject to disciplinary action, up to and including termination of employment. You may also be held personally liable for violating this policy.

The following are some examples of prohibited activities that violate this Internet policy:

  • Sending      or posting discriminatory, harassing, or threatening messages or images
  • Using      the organization’s time and resources for personal gain
  • Stealing,      using, or disclosing someone else’s code or password without authorization
  • Copying,      pirating, or downloading software and electronic files without permission
  • Sending      or posting confidential material, trade secrets, or proprietary      information outside of the organization
  • Violating      copyright law
  • Failing      to observe licensing agreements
  • Engaging      in unauthorized transactions that may incur a cost to the organization or      initiate unwanted Internet services and transmissions
  • Sending      or posting messages or material that could damage the organization’s image      or reputation
  • Participating      in the viewing or exchange of pornography or obscene materials
  • Sending      or posting messages that defame or slander other individuals
  • Attempting      to break into the computer system of another organization or person
  • Refusing      to cooperate with a security investigation
  • Sending      or posting chain letters, solicitations, or advertisements not related to      business purposes or activities
  • Using      the Internet for political causes or activities, religious activities, or      any sort of gambling
  • Jeopardizing      the security of the organization’s electronic communications systems
  • Sending      or posting messages that disparage another organization’s products or      services
  • Passing      off personal views as representing those of the organization
  • Sending      anonymous email messages
  • Engaging      in any other illegal activities

SECTION C

· Workplace Violence Policy

Violent behavior of any kind or threats of violence, either implied or direct, are prohibited at Pacific Resource, in properties and at Pacific Resource sponsored events. Such conduct by a Pacific Resource employee will not be tolerated. An employee who exhibits violent behavior may be subject to criminal prosecution and shall be subject to disciplinary action up to and including dismissal. Violent threats or actions by a non-employee may result in criminal prosecution. Pacific Resource will investigate all complaints filed and will also investigate any possible violation of this policy of which we are made aware. Retaliation against a person who makes a complaint regarding violent behavior or threats of violence made to him/her is also prohibited.

SECTION D

· Cybersecurity Policy

I. Introduction

This Cybersecurity Policy outlines the guidelines and procedures Pacific Resource follows to protect its digital assets, ensure network security, and maintain the confidentiality, integrity, and availability of sensitive information. As a small business, we recognize the importance of safeguarding our systems and data against ever-evolving cyber threats.

II. Purpose

The purpose of this policy is to:

  1. Protect      Pacific Resource’s digital assets, including proprietary information,      customer data, and intellectual property.
  2. Define      the roles and responsibilities of employees regarding cybersecurity.
  3. Establish      guidelines and procedures for maintaining a secure digital environment.
  4. Comply      with applicable laws, regulations, and industry standards.

III. Scope

This policy applies to all Pacific Resource employees, contractors, and vendors who access, use, or manage Pacific Resource-owned or personal devices, systems, and networks for work purposes.

IV. Roles and Responsibilities

  1. Management:      The management team is responsible for overseeing the implementation of      this cybersecurity policy and ensuring all employees adhere to the      guidelines and procedures.
  2. IT      Team: The IT team is responsible for managing and maintaining the security      of Pacific Resource’s networks, systems, and devices, as well as providing      technical support and training to employees.
  3. Employees:      All employees are responsible for following the guidelines and procedures      outlined in this policy, attending mandatory cybersecurity training, and      promptly reporting any security incidents or concerns.

V. Security Guidelines and Procedures

  1. Password      Management:

  • Use      strong, unique passwords for all Pacific Resource accounts and devices.
  • Change      passwords every 90 days or following a security breach.
  • Access      Control:
  • Grant      access to sensitive data and systems only to authorized personnel on a      need-to-know basis.
  • Regularly      review and update user access privileges.
  • Implement      multi-factor authentication (MFA) for critical systems and applications.
  • Secure      Communication:
  • Use      encrypted email and messaging platforms for transmitting sensitive      information.
  • Avoid      discussing sensitive Pacific Resource information on public or unsecured      networks.
  • Device      Security:
  • Ensure      all Pacific Resource-owned and personal devices used for work are secured      with up-to-date antivirus software, firewalls, and security patches.
  • Enable      device encryption and lock screens with strong passwords or biometric      authentication.
  • Do not      install unauthorized software or connect unsecured devices to Pacific      Resource networks.
  • Incident      Response:
  • Immediately      report any suspected security incidents to the IT team or management.
  • Follow      the Pacific Resource’s incident response plan to detect, contain, and      recover from security incidents.
  • Conduct      a post-incident analysis to identify the cause, evaluate the response, and      implement improvements.
  • Remote      Work and BYOD (Bring Your Own Device) Policy:
  • Use a Pacific      Resource-approved VPN when accessing Pacific Resource networks and      resources remotely.
  • Keep      personal devices used for work updated with the latest security patches      and antivirus software.
  • Do not      store sensitive Pacific Resource data on personal devices without proper      encryption and authorization.
  • VI.      Employee Training and Awareness
  • All      employees must attend mandatory cybersecurity training sessions, which      will be provided by the IT team or external trainers.
  • Training      sessions will cover topics such as password management, phishing      awareness, and secure data handling.
  • VII.      Compliance Monitoring and Enforcement
  • The IT      team will conduct regular security audits to assess compliance with this      cybersecurity policy.
  • Non-compliance      with this policy may result in disciplinary action, up to and including      termination of employment.
  • VIII.      Legal and Regulatory Compliance
  • Pacific      Resource will adhere to all applicable laws, regulations, and industry      standards related to cybersecurity and data protection, such as GDPR,      HIPAA, or PCI DSS.
  • This      policy will be reviewed and updated regularly to ensure ongoing compliance      with evolving requirements.
  • IX.      Policy Review and Update
  • This      cybersecurity policy will be reviewed annually or whenever significant      changes occur within the business or the threat landscape.
  • Updates      to the policy will be communicated to all employees, and additional      training may be provided as necessary.
  • incident.
  • Do not      share passwords with colleagues or third parties.

X. Third-Party and Vendor Security

  • All      third parties and vendors with access to Pacific Resource’s networks,      systems, or data must adhere to this cybersecurity policy and any      additional security requirements deemed necessary.
  • Pacific      Resource will conduct periodic assessments of third-party and vendor      security practices to ensure compliance and minimize risk exposure.

XI. Backup and Disaster Recovery

  • Pacific      Resource will implement a comprehensive data backup and disaster recovery      plan to safeguard critical business data and ensure business continuity in      the event of a security incident or natural disaster.
  • Regular      backups of essential data will be performed and stored securely in offsite      locations or cloud-based storage.
  • The IT      team will periodically test and update the disaster recovery plan to      ensure its effectiveness and preparedness.

XII. Physical Security

  • Pacific      Resource will implement physical security measures to protect Pacific      Resource devices, equipment, and facilities from unauthorized access or      theft.
  • Access      to server rooms and other critical areas will be restricted to authorized      personnel only.
  • Employees      must secure their workstations and devices when not in use and report any      missing or stolen equipment immediately.

XIII. Reporting Security Concerns and Incident Disclosure

  • Employees      are encouraged to report any security concerns, suspicious activities, or      potential security incidents to the IT team or management.
  • Pacific      Resource will disclose security incidents to affected customers, partners,      and regulatory bodies as required by law or industry standards, while      taking appropriate steps to mitigate the impact and prevent recurrence.

By implementing and adhering to this comprehensive cybersecurity policy, Pacific Resource aims to create a secure digital environment that protects its valuable assets, maintains customer trust, and ensures business continuity. All employees play a critical role in maintaining cybersecurity and are expected to uphold the guidelines and procedures outlined in this policy. 

.

XIV. Policy Acknowledgment and Acceptance

  • All      employees, contractors, and vendors must read, understand, and acknowledge      their adherence to this cybersecurity policy upon joining Pacific Resource      and during annual policy reviews.
  • Pacific      Resource management will provide a signed acknowledgment form for      employees to confirm their understanding and acceptance of this policy.

XV. Policy Exceptions and Modifications

  • Requests      for exceptions or modifications to this cybersecurity policy must be      submitted in writing to the IT team or management, detailing the specific      reasons for the requested change.
  • The      IT team or management will review the request and provide a written      response, either approving or denying the exception or modification.

In conclusion, Pacific Resource is committed to maintaining a secure digital environment by implementing this comprehensive cybersecurity policy. Through continuous employee training, adherence to guidelines and procedures, and regular policy review and updates, we aim to protect our digital assets and ensure the long-term success of our business. By fostering a culture of security awareness and vigilance, we can effectively mitigate cyber risks and safeguard the trust of our customers and partners.



Contact Us

Pacific Resource Investigative Services CA License # PI 21999 2025 W. Front Street Selma, CA 93662 P.O. Box 4176 Fresno, CA 93744 P: 559.225.7775 james@pacsourcepi.com.

Reviews

email us

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Help us, help you!

Pacific Resource Investigative Services

james@pacsourcepi.com

  • PacSource Security Policy

Pacific Resource Investigative Services

Copyright © 2025 Pacific Resource Investigative Services - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept