Privacy Policy

10085 reads

This privacy policy discloses the privacy practices for www.businessgyan.com. This privacy policy applies solely to information collected by this web site. It will notify you of the following:

What personally identifiable information is collected from you through the web site, how it is used and with whom it may be shared.

What choices are available to you regarding the use of your data.

The security procedures in place to protect the misuse of your information.

How you can correct any inaccuracies in the information.

Information Collection, Use, and Sharing

We are the sole owners of the information collected on this site. We only have access to/collect information that you voluntarily give us via email or other direct contact from you. We will not sell or rent this information to anyone.

We will use your information to respond to you, regarding the reason you contacted us. We will not share your information with any third party outside of our organization, other than as necessary to fulfill your request, e.g. to ship an order.

Unless you ask us not to, we may contact you via email in the future to tell you about specials, new products or services, or changes to this privacy policy.

Your Access to and Control Over Information

You may opt out of any future contacts from us at any time. You can do the following at any time by contacting us via the email address or phone number given on our website:

• See what data we have about you, if any.

• Change/correct any data we have about you.

• Have us delete any data we have about you.

• Express any concern you have about our use of your data.

Security We take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline.

Wherever we collect sensitive information (such as credit card data), that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a closed lock icon at the bottom of your web browser, or looking for "https" at the beginning of the address of the web page.

While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.

Trending

256
misner's picture

Dude, Where are my Wheels? Why Networking Helps – Even in the “Hood”

I recently visited Los Angeles and drove through an area that I grew up around.  I was regaling my wife with a story about a job I had in a pretty tough neighborhood when I was in college.  At the end of the story she said, “you have to
291
Harvey Mackay's picture

Resourcefulness = “Of Coursefulness”

A firm needed a researcher. Applicants were a scientist, an engineer and an economist. Each was given a stone, a piece of string and a stopwatch and told to determine a certain building’s height. The scientist went to the rooftop, tied the stone to
336
johnsullivan's picture

Sourcing Is the New Recruiting

I have some excellent news for you. Sourcing is the place to be in talent acquisition today! Recruiting as it has traditionally been known is going away. Increasingly companies are adopting recruitment process automation, and that means that there
384
harvardbusinessreview's picture

How to Prepare for a Panel

Make sure to connect with the moderator beforehand.
367
johnsullivan's picture

HR Roundtable: The Value of a Multi-Generational Workforce

In the classic rock anthem My Generation by The Who, lead singer Roger Daltrey screams, “I hope I die before I get old.” He echoed a sentiment of the times, but he never knew that he was also doing what...
396
adamgrant's picture

Why Women Volunteer for Tasks That Don’t Lead to Promotions

Here’s a work scenario many of us know too well: You are in a meeting and your manager brings up a project that needs to be assigned. It’s not particularly challenging work, but it’s time-consuming, unlikely to drive revenue, and probably won’t be
409
johnsullivan's picture

What’s Wrong With Corporate Culture As A Management Tool? Almost Everything!

The top 15 most damaging shortcomings of managing using your culture It’s no secret that most in HR and many CEOs are enamored with “corporate culture,” which is essentially the “invisible hand” that helps guide the behavior of your employees....
364
sethgodin's picture

But why does it take so long?

The original book could take three years to write. Retyping the manuscript might take a day or two. Modern work isn’t time-consuming because it takes a long time to type. Physical constraints aren’t usually the gating factor, either. It’s not a
364
johnsullivan's picture

Accenture Is Using Tech to Make Onboarding a Personal Experience

Normally I think of onboarding along two dimensions: efficiently handling the administrative work and welcoming a person onto the team so they can be effective. Onboarding, even the basic administrative work, can be hard to do, and technology can