HBS Working Knowledge will not sell, exchange, rent, or otherwise disclose to any third party any information provided. HBS Working Knowledge reserves the right to disclose this information under special circumstances, such as in connection with judicial proceedings or if, in the sole discretion of HBS Working Knowledge, disclosure is necessary to protect HBS Working Knowledge or the President and Fellows of Harvard College.
Weekly E-mail Newsletter
You may subscribe to the free weekly HBS Working Knowledge e-mail newsletter by providing your e-mail address in the Sign Up! box on the subscribe page. We do not include any functionality on our site that would allow third parties to perform "reverse searches" to identify individuals from e-mail addresses. You may unsubscribe at any time by visiting the unsubscribe page.
The user has the option of providing HBS Working Knowledge with additional personal information and preferences by filling out a survey. The survey asks users to provide information such as industry, job title, favorite topics, etc. We encourage our users to fill in all of this information, so that the site is able to offer more content that reflects your areas of interest.
Use of Information
HBS Working Knowledge uses the information provided in the survey to continue to improve our product and services. To this end, HBS Working Knowledge does evaluate site usage by analyzing user information and demographics, but only in aggregate, and does not use any method of analysis that would allow individual identification.
HBS Working Knowledge is not responsible for the content or privacy policies of any Web sites to which it may link.
Due to the nature of Internet communications, no data transmission over the Internet can be guaranteed to be completely secure. While HBS Working Knowledge remains committed to protecting the privacy of our users, we cannot ensure or warrant the security of any information you transmit to us, and you do so at your own risk. Once we receive your transmission, we make our best effort to ensure its security on our systems. We do so by using secure technology, privacy protection controls, and restrictions on employee access.