Home > Articles > Programming

This chapter is from the book

Graphics—Data Modeling

A Short History

Computer programs are fundamentally abstract products. In the mid-1970s people began to realize that these abstractions could benefit from more graphic representations. Flow charts led to data flow diagrams on the process side. And in 1976, entity/relationship modeling was invented to represent data structures graphically.

Entity/Relational Modeling

Peter Chen first introduced a graphic approach to relational design with entity/relationship modeling (a kind of data modeling) in 1976 [Chen 1976–1977]. Based on Mr. Codd's idea of associating simple groups of data, entity/relationship modeling used a box to represent a relation, and a diamond and lines to represent a relationship between relations. This simple idea has revolutionized the way we represent data structures. It began essentially as a graphic technique for modeling relational data, but it subsequently evolved to representation of a particular nonrelational structure as well (“super-type” and “sub-types”, described below).

While originally data modeling was supposed to depict relations, it quickly became clear that the boxes really represented the things in a business about which it wished to hold information. They represented entity types. An entity type is the definition of something of significance to an organization, such as “person”, “product”, or “activity”. An entity type has attributes and relationships with other entity types.

Indeed, data modeling describes the structure of a business itself.

Thus, a data model reflects the structure of an enterprise as well as the potential design of a database that would similarly reflect that structure of the enterprise. And it turns out that while a company's processes may change, its fundamental (data) structure rarely does. Base a system design on the structure of a company's data and you have a system that promises to last more than a few months.

Mr. Chen's approach to entity/relationship modeling was only a first version, however, and many people since then have tried to improve upon it. A veritable plethora of data modeling notations have emerged.

Clive Finkelstein invented a different data modeling notation to use as the basis for his idea of information engineering. Not just a new modeling technique, information engineering is a comprehensive approach to the whole process of system development. It is based both on a data-centric approach to analysis and on the system development life cycle (described in Chapter 2 of this book). It portrays the development process as progressing from strategic planning and requirements analysis through design, construction, and implementation. Mr. Finkelstein and James Martin first published this in 1981 in the article “Information Engineering” in the Savant Institute's Technical Report. Later Mr. Martin popularized this approach through various books, and Mr. Finkelstein finally published his version in 1989 as An Introduction to Information Engineering: From Strategic Planning to Information Systems.

Messrs. Finkelstein and Martin added to the relationally oriented data model the concept of sub-type and super-type. This concept is derived from the idea of inheritance, first identified for object-oriented programming in the 1960s. It is a representation of the fact that occurrences of a thing of significance may themselves be categorized. An ORDER, for example, may be either a SALES ORDER, a PURCHASE ORDER, or a WORK ORDER. This is not a structure that can be directly represented in a relational database without serious translation. But it is a powerful data modeling concept for representing things in the business.

Subsequently, several other data modeling notations were developed. Among these were IDEF1X, primarily used by the United States Defense Department [Bruce, 1992], and one developed by the British consulting firm CACI. The latter was further developed by Richard Barker and the Oracle Corporation and is also used in Europe as part of the Structured Systems Analysis and Design Method (SSADM). Among other things, this modeling method introduced a discipline for naming relationships—a discipline that makes it possible to read relationship names as simple natural language sentences.

Object Modeling

While all this was going on in the world of business requirements analysis, programmers also discovered that organizing their programs around data had great advantages. Since the mid 1960s, object-oriented programming has been taking over the world of writing programs. Where programs were originally organized around what they did, with data being attached where necessary, the object-oriented programmers organized their work around the data—or rather, they organized it in terms of the objects the data described. This turned out to be a particularly powerful way to look at the problem—especially in the realm of real-time systems. It burst upon the general data processing scene in a big way in the 1980s, when the advent of graphic user interfaces introduced object-oriented programmers to the world of commercial applications. They realized that the problem of defining requirements in this world could benefit from their insights into the world of objects. Without appreciating that commercial systems analysts themselves had already discovered the modeling of “things of significance to the business”, they introduced the idea of object models.

Thus, while the systems analysts were becoming data oriented through information engineering, the programmers were becoming data oriented through object-oriented programming.

In 1988 Sally Shlaer and Stephen Mellor wrote Object-Oriented Systems Analysis: Modeling the World in Data, and thus introduced object-oriented analysis to the world at large. They acknowledged that information engineering had developed a modeling technique that was singularly compatible with the object-oriented view of things. They invented their own notation for it, however (adding to the four or five that already existed), thus introducing the notion of “object modeling” to the world of commercial applications.

In fact, the symbols in Ms. Shlaer's and Mr. Mellor's books corresponded exactly to those in information engineering. There were entity types (now called object classes) and relationships (called associations). The relationships had a single arrow when referring to a single occurrence of a class and a double arrow when referring to multiple occurrences of a class. Each relationship was assumed to be mandatory, unless marked with a “C” for “conditional”.

Then, in 1991, James Rumbaugh, Michael Blaha, William Premerlani, Frederick Eddy, and William Lorensen published Object-Oriented Modeling and Design. This book presented another object modeling notation, along with a methodology called the “Object Modeling Technique”, or OMT. The methodology included variations on the information engineering concepts of analysis, system design, “object design”, and implementation. It modified the information engineering approach to the extent that it was much more tolerant of iteration in the system development life cycle.

After 1991, several other authors tried their hands at developing object-modeling techniques. Ed Yourdon and Peter Coad wrote Object-Oriented Analysis in 1990. David Embley, Barry Kurtz, and Scott N. Woodfield wrote Object-Oriented Systems Analysis: A Model-Driven Approach in 1992. So now, in addition to the various entity/relationship modeling notations available, there were as many or more under the rubric of object modeling.

In 1997 the experts of the object world got together and devised the Unified Modeling Language (the UML), to replace at least all of the object-modeling notations [OMG, 1998].

Where it was concerned only with business objects (tangible things seen by people in the enterprise or intangible things commonly understood by people in the enterprise), object modeling essentially represented the same things as the data modeling techniques available at the time. It had the advantage, however, of being from the “object” world, which made object-oriented developers more comfortable with its ideas. As it happened, the ERD concept of inheritance from super-type to sub-types had been developed in the context of object-oriented programming in the 1960s.

This doesn't mean that object modeling is not useful to support object-oriented design specifically. By portraying computer objects an object model can be very helpful in clarifying the implications of particular designs. And the model of an object oriented design may be very different from the corresponding model of relational design.

For example, object-oriented associations are treated differently from relational relationships in design. Where a relationship implemented in a relational database remains structural, consisting of a foreign key, in an object-oriented program it is part of a class's behavior. A piece of program code is required to implement the navigation from each class to each other class. Separate pieces of code are required for the two directions of a relationship.

Object-oriented programming does combine objects with their behavior, bringing together data and process in a very effective way. In the context of object-oriented programming, behavior describes the program which implements the behavior of an object along with the description of the object itself. Mr. Rumbaugh et al. extended this to allow for describing the behavior of business object classes as well. This did not, however, affect the structural aspects of the technique.

While the idea of incorporating behavior in analysis data models is appealing, it turns out to be problematic. Where, in a program, behavior is always described by program code, the behavior of real-world objects is much more complex. Since the objects in object-oriented programming are themselves pieces of code, it is reasonable to package with them the code that describes their behavior. Objects in the world, however, that are the subject of requirements analysis behave in ways that are far more varied and complex than can be described by a bit of pseudocode. Describing the complete behavior of a person, for example, has taxed the skills of novelists for generations.

The best way to describe business object behavior appears to be entity life histories, a technique described in Chapter 7.

The net effect of all this, even with the consolidation under the UML, is that there are still many ways to model the structure of data. Appendix B presents the most significant notations in detail and compares them.

Regardless of the symbols used, data modeling during analysis (whether of the object or entity/relationship kind) is intended to do one thing: describe the things about which an organization wishes to collect data, along with the relationships among them. For this reason, all of the commonly used systems of notation fundamentally are convertible from one to another. The major differences among them are aesthetic, although some make distinctions that others do not, and some lack symbols to represent all situations.

Object-Role Modeling (ORM)

Another approach to modeling data was developed by G. M. Nijssen in the 1980s. This is significantly different in its approach from either entity/relationship or object modeling. It was originally called NIAM, an acronym for “Nijssen's Information Analysis Methodology”. More recently, since G. M. Nijssen was only one of many people involved in the full development of the method, it has been renamed “object-role modeling”, or ORM. ORM takes a different approach from the other methods described here. Rather than representing entity types as analogs of relational tables, it shows relationships (“roles” in ORM parlance) to be such analogs. Like Mr. Barker's notation, it makes extensive use of language in making the models accessible to the public, but unlike any of the other modeling techniques, it has much greater capacity to describe business rules and constraints.

With ORM, it is difficult to describe entity types independently from relationships. The philosophy behind the language is that it describes “facts,” where a fact is a combination of ORM objects: entity types, value types, and roles.

In ORM, an entity type is portrayed by an ellipse (often a circle, actually) containing its name. An ellipse can also represent a value type, which is effectively a domain. A value type describes a kind of data, like “date” or “amount”, and can be related to entity types just like other entity types.

Relationships between pairs of objects are shown as pairs of roles. A role is the half of a relationship reading in one direction. In other words, entity type 1 plays a role with respect to entity type 2. Entity type 2 plays a complementary role with respect to entity type 1. A fact is the playing of a role by an entity type. Figure 3.11 shows that each relationship between entity types represents two facts. For example, each Event must be an example of one and only one Event Type, and each Event Type must be embodied in one or more Events.

03fig11.gifFigure 3.11. An ORM Model.

In fact what would be an “attribute” of an entity type in an entity/relationship diagram, in ORM is simply a role played in a relationship. It is intentionally not clear initially whether the attribute is pointing to a value type or another entity type.

The dot where a relationship is attached to an entity type means that for each occurrence of the entity type, there must be at least one occurrence of the role involved. The double-headed arrow over one or more roles means that there can be no more than one occurrence of the roles so marked; they are unique. For each occurrence of the entity type, there can be no more than one occurrence of the role.

Object role modeling is described both in Appendix B and in Chapter 8 of this book. Chapter 8 describes ORM's approach to business rules. ORM is fully documented in Terry Halpin's 2000 book, Information Modeling and Relational Databases.

For example, the dot on Event makes it mandatory that each Event must be an example of at least one Event Type. The double-headed arrow over “an example of” means that there can be no more than one occurrence of this role for each Event. Absence of a dot next to Event Type makes it optional whether there are any events for that Event Type, and the absence of a double-headed arrow over “embodied in” means that the role can occur any number of times for an Event Type.

When it is related to another entity type, the role it takes is an attribute of the first entity type. Figure 3.11 shows an example: Event and event type are entity types. “Event description” and “event type description” appear to be attributes, but this is left intentionally ambiguous. Indeed, an attribute is treated as an object, just like an entity type. Event Type Description appears here to be a value type (domain). It is conceivable—albeit unlikely—that “Event Type Description” could turn out to have attributes of its own, thereby becoming an entity type. If this were an entity/relationship diagram, and “event type description” were initially shown as an attribute of Event, later, when it turned out that it had an attribute of its own, the model would have to be restructured to make Event Type an entity type. Here, it doesn't matter. The relationship between Event Type and Event Type Description is independent of whether or not there are attributes of Event Type Description.

An entity type label (an attribute which is a sole identifier) may be shown with a dashed ellipses around a value type, although as a shorthand, it also may be shown within the entity type ellipse in parentheses, below the entity type name. In the example, “(ID)” is the identifying attribute for event, and “(Code)” is the identifying attribute of event type.

Relationships not only connect entity types to each other but also connect value types to entity types. ORM is unique in being able to graphically show the optionality and cardinality of attributes. That is, is the attribute mandatory? Can it take more than one value?

Where most methods portray entity types in terms that allow them to be translated into relational tables, ORM portrays the relationships so that they can be converted to tables. That is, the two parts (or more) of the relationship become columns in a “relation” (table). In effect, these are the foreign keys to the two entity types. Attributes of one or more of the related entity types also then become part of a generated table.

In Figure 3.11, for example, a table would be created from the an example of / embodied in relationship, with columns for “Event (code)” and “Event Type (code)”. Another table would have the columns “Event Code” and “Event Description”, and yet another would have “Event Type Code” and “Event Type Description”. This is shown in Tables 3.1.

03tab01.gifTable 3.1. Relationship Tables

ORM represents a unique way to create conceptual data models for Row Three of the Architecture Framework.

How to Draw a Data Model

As stated above, Appendix B contains a comparison of the various data and object modeling techniques currently available. It compares their syntax, aesthetics, and appropriateness to each of the audiences described here.

Because this book is concerned with requirements analysis—the translation of a business owner's view to an architect's view—the data modeling technique used here will be the one that seems most suitable for presenting to an audience of business owners. It is graphically the simplest, with the fewest different kinds of symbols to learn.

The technique was developed by the British consulting company CACI and then made part of Oracle Corporation's approach to modeling. It was brought into its final form and publicized by Richard Barker in his 1990 book, CASE Method: Entity Relationship Modelling. It has since been made part of the European methodology, “Structured Systems Analysis and Design Method” (SSADM). (More information about SSADM can be found in Malcolm Eva's 1994 book, SSADM Version 4: A User's Guide Second Edition.)

In this notation, two major types of symbols are used in an entity/relationship diagram:

  • A rectangular box with rounded corners, which represents an entity type

  • A line, each half of which may be dashed or solid, which represents a relationship between two entity types

Other elements of the diagram may add additional information.

Entity Types

An entity type is a person, place, event, thing, or concept that has characteristics of interest to the business and is uniquely identifiable. It is something about which data are kept.

Examples of four entity types are shown in Figure 3.12.

03fig12.gifFigure 3.12. Entity Types.

Note that, as originally defined, what you see here are really entity types or entity classes. Each is the definition of a TIMESHEET ENTRY, a PERSON, an ORGANIZATION, or an ACTIVITY. In the original terminology, a particular person, organization, timesheet entry, or activity is an entity. That is, originally, the definition was called an “entity type”, and the occurrence was called an “entity”, but the language has since been corrupted. Now entity often refers to the definition, and an instance of the thing is called an occurrence. This book will retain the original definitions of “entity type” for the definition and “entity” for the occurrence. In the object-oriented world, the occurrence is called an object, while the entity is called an object class (or simply class.)

Sub-types and Super-types

When the occurrences of an entity type fall into two or more subcategories, the subcategories can themselves become entity types which are then called sub-types of the first entity type. The first entity type is called a super-type. For example, in Figure 3.13, PERSON and ORGANIZATION are examples of the larger class called “PARTY” (as in “party” to a contract). That is, each PARTY (a super-type) must be either a PERSON or an ORGANIZATION (a sub-type), each PERSON must be a PARTY, and each ORGANIZATION must be a PARTY.

03fig13.gifFigure 3.13. Sub-types and Super-types.

Note that there is a rule with this notation that each occurrence of the super-type may be an occurrence of only one sub-type, and it must be an occurrence of one of them.

Relationships

A relationship is a pair of named associations between entity types. In an entity/relationship diagram, a relationship is represented by drawing a line between two entity types.

The cardinality constraint—the assertion that an occurrences of an entity type may be related to no more than a specified number of occurrences of another entity type—is represented on a diagram by the presence or absence of a “crow's foot” symbol next to the second entity type. If there is no crow's foot, an occurrence of the far entity type may be related to no more than one occurrence of the adjacent entity type. If there is a crow's foot, there is no limit to the number of occurrences to which the occurrence of the far entity type may be related.

The optionality constraint—the assertion that an occurrence of one entity type must be related to at least one occurrence of another entity type—is represented by the half-line next to the first entity type being solid or dashed.

In most notations, there are no real rules about the naming of relationships. People generally use verbs, but with no particular system regarding the way they use them. Cardinality and optionality are not expressed in the resulting sentences, except by saying such things as, for example, “A PERSON has zero, one, or many ASSIGNMENTS”. The Barker notation, however, uses a convention that both adds additional discipline to the names and makes them more readable as normal English sentences.

Relationship sentences may be constructed from the symbols in the Barker technique as follows:


Each

<first entity type name>

must be (solid line from first entity type)
(or)
may be (dashed line from first entity type)

<relationship name>

one and only one (single line into second entity type)
(or)
one or more ("crows foot" into second entity type)

<second entity type name>,

Examples of two relationships are shown in Figure 3.14.

03fig14.gifFigure 3.14. Relationships.

The top relationship in Figure 3.14 is represented by the following two sentences:

  • Each TIMESHEET ENTRY must be by one and only one PERSON.

  • Each PERSON may be the source of one or more TIMESHEETS.

The lower relationship in Figure 3.14 is represented by the following two sentences:

  • Each TIMESHEET ENTRY must be for one and only one ACTIVITY.

  • Each ACTIVITY may be charged with one or more TIMESHEET ENTRIES.

Attributes

An attribute is the definition of a characteristic, quality, or property of an entity type. It describes an entity type. In an entity/relationship diagram, an attribute of an entity type names and defines a characteristic, while an occurrence of an entity type provides a discrete value for the attribute.

Examples of attributes may be shown as text in the entity type boxes in Figure 3.15. Note that any attribute of (or relationship to) a super-type is inherited by each of the sub-types. In the example, “Party ID”, an attribute of PARTY, is also an attribute of PERSON and of ORGANIZATION. This does not go the other way, however. “Family Name” is an attribute of PERSON only and therefore is not an attribute of either PARTY or ORGANIZATION. Similarly, TIMESHEET ENTRY is related to PERSON only, and not to ORGANIZATION.

03fig15.gifFigure 3.15. Attributes.

When presenting data models, you may chose not to show the attributes. They tend to clutter the diagram unnecessarily if you are presenting a model for purposes of discussing structure only. On the other hand, some would like to see attributes to clarify the meaning of each entity type.

Note that on this diagram, attributes are preceded by different symbols.

  • The open circle (03inl02.gif) means the attribute is optional—it may or may not be given a value for a particular instance of the entity type.

  • The asterisk (*) means that it is mandatory.

  • The pound sign (#) means that it is part of the “unique identifier” of the entity type. That is, the value of that attribute at least partially identifies different occurrences of the entity type—distinguishing them from each other.

The entity types PARTY and ACTIVITY are examples of reference entity types or independent entity types. Occurrences of them do not require occurrences of any other entity type. The entity type TIMESHEET ENTRY is an example of a dependent entity type, because an occurrence of it can only exist if it is related to occurrences of PERSON and ACTIVITY. 7The entity type TIMESHEET ENTRY is also an example of an intersect entity type, sometimes called an associative entity type. This is because its sole purpose for existing is to relate other entity types to one another.

PARTY is also an example of a reference entity type. A reference entity type is an entity type that usually refers to something tangible in the enterprise (in this case, a PERSON or an ORGANIZATION). It may also refer to a quality (like COLOR) that is used to describe another entity type, or to a classification for other entity types, such as ACTIVITY TYPE or CONTRACT TYPE. Usually, a reference entity type is also an independent entity type. By contrast, a transaction entity type (always a dependent entity type and usually an associative entity type) refers to something that occurred at a particular time.

All independent entity types are reference entity types, while nearly all reference entity types are independent. All dependent entity types are transaction entity types, and all transaction entity types are dependent on reference entity types. It is possible for a reference entity type to be dependent on another reference entity type.

Some of the attributes in Figure 3.15 are in parentheses. This means that the value for that attribute is computed from other attributes. For example, “(Value)” in TIMESHEET ENTRY is computed as “Hours” in TIMESHEET ENTRY, times the “Charge Rate” in PERSON. “(Labor Cost)” in ACTIVITY is the sum of “(Value)” across all the TIMESHEET ENTRIES that an ACTIVITY is charged with.

Note that any notation may be used for derived attributes, but it is constrained by the process that will be used to convert attributes in entity types to columns in tables. Parentheses are not usually permitted in table names. If this conversion will be done automatically, the convention used here will not work. In that case, simply precede the attribute name with a “c”.

Note also that the definition of the calculation does not show on the model. This must be documented behind the scenes.

Unique Identifiers

The first rule for specifying an entity type is that each of its occurrences must be unique. Duplicates are not permitted. An occurrence is made unique through some combination of attributes and relationships. By the end of the requirements analysis project, each entity type in the model must be assigned at least one unique identifier.

In the sample model in Figure 3.16, each occurrence of PERSON is made unique by a value for “ID”. This is shown by the octothorpe (#)4 in front of “ID” Similarly, COURSES are uniquely identified by values for “Course number”.

03fig16.gifFigure 3.16. Unique Identifiers.

A COURSE OFFERING, on the other hand, requires a value for “Offering date” plus identification of the COURSE that the COURSE OFFERING is an occurrence of. This is shown by the octothorpe in front of “Offering date” and the short line across the occurrence of relationship. A CLASS ENROLLMENT, meanwhile, can only be identified by identifying the PERSON enrolling and the COURSE OFFERING enrolled in. This is shown by lines across both relationships.

In the original relational theory, each entity type's unique identifier should be a combination of natural attributes. In practice, however, it is difficult to assert that any attribute is absolutely immutable—a requirement if it is to be part of a primary key. For this reason, it is common to assign a surrogate key at least for reference entity types. This is a sequence number that has no intrinsic meaning. It is simply incremented for each new occurrence to ensure that that occurrence is unique. In Figure 3.16, “ID” is a surrogate key to PERSON.

If all reference entity types (those that have no mandatory relationships to any other entity type) have surrogate keys, it is still reasonable to let natural keys serve as identifiers of the relationships to such reference entity types. It is not necessary to have a surrogate key, unless it is important to allow multiple occurrences of each combination the entity type describes. In Figure 3.16, for example, using the two relationships to identify occurrences of CLASS ENROLLMENT means that no PERSON may be enrolled in the same COURSE OFFERING more than once. If you want to allow such duplication, it is necessary to add a “Sequence number” as part of the identifier.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020