<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
<url>
  <loc>https://knowledge.halo.science/articles/6648176834-what-are-best-practices-for-writing-a-partnering-request</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/7153630041-what-are-reviewers-lead-reviewers-and-admins</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/9327130535-what-happens-after-a-proposal-of-interest-is-identified</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/1334465437-guide-for-reviewing-proposals</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/4531218265-pulsechecks-beta</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/5480764130-discover-beta</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/4654279737-external-partnering-tools-for-corporate-sponsors</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/9955541600-managing-conversations-with-finalists-and-connections-on-halo</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/2770011917-where-and-how-do-i-submit-a-proposal</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/1514917614-what-is-a-private-proposal</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/2540244061-why-are-companies-private-for-some-opportunities</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/6162611398-how-are-my-ideas-protected</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/5149190509-how-do-i-check-the-status-of-my-proposal</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/5241702837-what-should-i-do-if-the-sponsor-reaches-out-to-me</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/6157047979-does-halo-review-and-filter-out-proposals</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/4509315564-how-are-partnerships-structured</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/2236338617-are-indirect-costs-included-in-the-funding-provided-by-sponsors</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/1980686958-what-resources-are-available-to-researchers</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/6824735124-how-many-proposals-will-be-funded</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/8574717834-can-i-have-a-co-pi</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/5330959917-how-do-i-add-another-researcher-s-name-to-my-proposal</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/7279158345-can-multiple-researchers-at-an-institution-submit-proposals</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/3479712200-can-researchers-outside-the-united-states-submit-proposals</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/8716943225-how-does-halo-ensure-that-academic-researchers-are-compliant-with-university-policy</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/6743409509-how-does-halo-prevent-researchers-from-sharing-confidential-information</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/3433279651-does-halo-charge-universities</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/2403295924-can-university-administrators-join-halo</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/1041236496-guide-for-writing-proposals</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/8690682827-guide-for-university-administrators</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/8946411648-guide-for-innovators</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/8866359278-partner-listings</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/9647471901-organization-pages</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/9685909543-who-is-eligible-to-submit-proposals</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/2620115674-what-is-the-submission-process</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/6444956162-how-is-confidential-information-handled</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/3849092343-how-long-does-it-take-to-complete-a-proposal</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/5599028801-what-is-the-evaluation-process</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/9057505219-how-are-ip-rights-handled</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/9455470745-how-do-i-edit-my-halo-profile</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/5224055052-how-does-halo-make-money</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/6960000304-what-is-emerge</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/4207985423-why-does-emerge-matter</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/3019877115-what-are-the-benefits-of-being-accepted-into-emerge</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/8627984390-what-is-halo-and-what-data-do-you-handle</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/1325256049-how-do-you-use-the-data-you-collect</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/5894451771-do-you-sell-or-share-data-with-third-parties</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/7139276619-do-you-use-my-data-to-train-ai-models</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/2388784180-where-is-halo-s-infrastructure-hosted-and-how-is-it-secured</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/8420566421-is-data-encrypted</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/2553598442-how-do-you-control-access-to-our-data</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/4141494206-how-do-you-secure-employee-devices-and-a-remote-workforce</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/1264829164-what-about-authentication-sso-and-mfa</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/2173705592-how-do-you-detect-and-respond-to-security-incidents</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/1537706660-how-do-you-handle-privacy-rights-and-user-requests</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/7632674343-how-long-do-you-keep-data-and-what-happens-if-we-leave</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/5866462675-how-are-employees-vetted-and-trained</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/8901026468-do-you-have-formal-security-and-privacy-policies</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/4049549253-privacy-policy</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/6696735431-community-standards</loc>
</url>
<url>
  <loc>https://knowledge.halo.science/articles/3780522397-terms-of-service</loc>
</url>
</urlset>
