Downloadable Resources

Free guides, videos and checklists to keep your jewelry business safe and secure.

Checklists and Guides

Downloadable guides, checklists, social graphics and signage are available for you and your employees.

check mark

Suspicious Incident Logbook

Be on the lookout for individuals “casing” your jewelry business. Use this logbook to note suspicious behavior.

Download PDF >

check mark

Robbery Checklist

Train staff on what to do before and after a robbery.

Download PDF >

check mark

Emergency Planning Checklist

Be prepared for various emergencies with this planning checklist.

Download PDF >

check mark

Hurricane Preparedness Guide

Know your hurricane risks. Get started now by developing a comprehensive continuity and disaster plan specific to your business.

Download PDF >

check mark

Prevent and Thaw Frozen Pipes Guidelines

Guidance on how to prevent and thaw frozen pipes at your jewelry business.

Download PDF >

check mark

Inventory Record Keeping Guide

Receive guidance on proper inventory record keeping necessary for the success of your jewelry business.

Download PDF >

check mark

Social Media Graphics for Jeweler Use

Share a variety of jewelry care and safety tips to your Facebook and Instagram channels and encourage customers to come back to you for cleanings and inspections.

Download Graphics >

check mark

Business Continuity Planning Checklist

The best time to establish a business continuity plan is before you need it. To prepare, follow our checklist of data and records to include as you start building out your plan.

Download Checklist >

check mark

Store Safety Signage

Display this sign in store to let customers know jewelry is cleaned after each showing, items are shown one at a time and they may be asked to show ID before looking at merchandise.

Download PDF >

check mark

Technology and Cyber Security Important Considerations

Protect your business by learning more about important expectations for technology service providers and considerations for data/cyber security. 

Download PDF >