Home > Store

Enriching the Value Chain: Infrastructure Strategies Beyond the Enterprise

Register your product to gain access to bonus material or receive a coupon.

Enriching the Value Chain: Infrastructure Strategies Beyond the Enterprise

Book

  • Sorry, this book is no longer in print.
Not for Sale

Description

  • Copyright 2002
  • Dimensions: 7-3/8x9-1/4
  • Pages: 384
  • Edition: 1st
  • Book
  • ISBN-10: 0-201-76730-9
  • ISBN-13: 978-0-201-76730-8

How do forward-thinking IT professionals organize infrastructure and staff to meet the challenges of e-Business value chain initiatives head-on? Enriching the Value Chain gives you the answers:

  • Strategic advice for mapping business drivers to a set of fundamental patterns and planning models.
  • A way to organize e-Business infrastructure with your suppliers, trading partners, and customers.
  • How to run e-Business infrastructure services for the long term with high quality.
  • How to make applications become easier, more cost-effective, and quicker to integrate.

Picking up where The Adaptive Enterprise leaves off, this companion volume tells you how to achieve success in value chain infrastructure planning.



0201767309B02082002

Sample Content

Online Sample Chapter

Beyond e-Business: Infrastructure Strategies that Will Enrich Your Value Chain

Downloadable Sample Chapter

Click below for Sample Chapter related to this title:
robertsonch1.pdf

Table of Contents

(NOTE: Each chapter concludes with a Summary.)

Preface.


1 Beyond e-Business.

Why Infrastructure (Suddenly) Matters.

Getting It Right.

The Importance of Being Adaptive.

The Clash of Cultures.

What's the Solution?

Understanding Adaptive Infrastructure.

Measuring the Benefits.



2 Laying the Foundation.

How to Catalog Components.

Physical Components.

Functional Components.

Interface Components.

Other Components?

Other Layers?

Developing Adaptive Services.

Understanding the Concept.

Applying the Model.

Benefits of Adaptive Infrastructure Services.

Shifting Services to the Infrastructure.

Decoupling the Lifecycles.

Examining the Network Model.

Service Interfaces and Service Level Agreements.

Where to Create Service Boundaries.

Keeping it Real.

Design Guidelines.

How to Apply Services to New Applications.



3 Identifying and Using Patterns.

What Are Patterns?

Designing for the Future.

Asking Who, Where, and What?

How Detailed Should It Get?

Understanding the Major Patterns.

Transact Patterns.

Publish Patterns.

Collaborate Patterns.

Key Patterns for e-Business.

Web Publish Pattern.

3/N-Tier Transact Pattern.

What Patterns Do You Need?

Subdividing Patterns.

Should Patterns for e-Business Be Different?

Applying Multiple Patterns.



4 Infrastructure Planning and Design.

The Business/IT Project Lifecycle.

Step 1: Setting Strategy.

Step 2: Choosing Strategic Activities.

Step 3: Matching Activities to Patterns.

Step 4: Refining Patterns and Project Plans.

Step 5: Implementing and Operating.

The Importance of People Skills.

Assessing the Skills Required.

Increased Pressure to Deliver.

New Types of Relationships.

Developing Relationship-based Management.

New Business Roles.

Effective Recruiting.

Retaining Employees.

Understanding Infrastructure Planning.

Details of Project Planning.

Packaging Infrastructure.

Designing Patterns.



5 Security Services.

Isolation Infrastructure Service.

Understanding Firewalls.

Architecting the Demilitarized Zone (DMZ).

Intrusion Detection and Threat Management.

SSL and Encryption Hardware.

Refining Pattern Designs for Isolation Infrastructure.

Identity Infrastructure Service.

Web SSO: Simple Web-Centric Authentication.

Public Key Infrastructure (PKI).

Directory Server.

Building a Complete Identity Infrastructure.

Refining Pattern Designs in Identity Infrastructure.



6 Physical Components.

Network Layer.

Overview of Networking Technologies.

Scale-Out Design for Performance and Availability.

Network Load Balancer.

Caching Server.

Content Delivery Network (CDN).

Internet Access and Transport Services.

Extranet Service Providers (ESPs).

Hosting Services.

Refining Patterns in the Network Layer.

Storage Layer.

Storage Area Network Interconnect.

Network Attached Storage Solutions (NAS).

Backup/Recovery Architectures.

Storage Options in the Server Layer.

Refining Patterns in the Storage Layer.

Server Layer.

Server Evolution.

Scale-Up Versus Scale-Out.

Scaling Out Web Services.

Server Consolidation.

Refining Patterns in the Server Layer.



7 Functional Components.

Database Layer.

Important Design Issues.

Trends in Database Technologies.

Scale-Out Solutions and Clustered Database Options.

Refining Patterns in the Database Layer.

Integration Layer.

The Integration Server (Message Broker).

The Inter-Enterprise Integration (IEI) Server.

Refining Patterns in the Integration Layer.

Application Server Layer.

Understanding Application Servers.

Choosing Application Servers.

.NET versus J2EE.

Refining Patterns in the Application Server Layer.



8 Interface and Management Components.

Presentation Layer.

Web Server.

Wireless Application Protocol (WAP) Server.

Wireless Service.

Voice.

Interactive Voice Response (IVR).

Refining Patterns in the Presentation Layer.

API Layer.

Understanding APIs.

Refining Patterns in the API Layer.

Management Layer.

Service Level Management (SLM).

Web Application Monitoring Strategy.

A Note on Metrics.

Refining Patterns in the Management Layer.

Using a Test Lab to Increase Performance.



Appendix A. Component Catalog.

Index to Components.



Glossary.


Index. 0201767309T01242002

Preface

Competition in the future, even today in certain industries, will not be company against company but supply chain against supply chain. Companies will be only as strong as the weakest link in their supply chain. The winners will be companies that can build electronic B2B relationships rapidly and manage those relationships seamlessly.

To cope in this new world, businesses need more agility. But to get this agility, they need a well-designed IT infrastructure that is highly reusable and adaptive. An agile, adaptive infrastructure can help businesses turn on a dime and capture new opportunities as they arrive.

Enriching the Value Chain: Infrastructure Strategies Beyond the Enterprise explains how adaptive infrastructure techniques can create a more focused, organized approach to delivering and supporting high-agility applications for e-Business and beyond. Along the way, the book recommends best practices for dealing with architecture and technology issues within the infrastructure in a way that can lead to success.

Moreover, the book highlights the e-Business-centric infrastructure strategies that will become key internal strategies as well. The days of separate e-Business infrastructure design and delivery are waning, to be replaced by more codependent and jointly developed internal and external infrastructure solutions.

From an infrastructure perspective, the "e" is actually disappearing so that e-Business will become just plain business. Soon, creating a design for inter-nal corporate infrastructure will involve nothing more than dropping a few requirements from high-level e-Business designs. If these internal solutions later need to be reused externally, the infrastructure will already be in place for a simple incremental upgrade to the e-Business level. And e-Business infrastructure will not be all that different from what we now think of as traditional enterprise computing.



0201767309P01242002

Index


active directory services (ADS) 158
active server pages (ASP) 61
adaptability 20
adaptive cost 110
adaptive infrastructure 4
    selling it to upper management 18
adaptive infrastructure services 38
administration
    centralized and automated 143
agility 33, 39
    creating 40
analysis
    clickstream 291
    pattern analysis 222
    pattern-based 29
    root-cause 132, 293
appliances
    vs. switch-based products 172
application
    implementing and maintaining 88
application hosting 193
application management 198, 291
    planning 295
application programming interface (API) 32, 77, 92, 283
    understanding APIs 285
application programming interface layer 33
application server 220
application server layer 31
application service provider (ASP) 14, 103, 198
application subscriptions 103
application(s)
    externalization 207
applications
    extranet 154
    HTTP 135
    integrating 5
    Web-centric 139, 143
assets
    behind-the-wall 102
authentication 157
    cookie-based 142
    vs. authorization/b 150
authorization 150
automatic locator information (ALI) 280

bleeding edge 5
border gateway protocol (BGP) 174, 190
buffers 131
business
    negiotiating with 110
business vision refinement 101
business-to-business (B2B) 3, 135, 149, 193, 280
    integration of 5
business-to-consumer (B2C) 195, 280
business-to-employee (B2E) 195

cache
    cache server 175
    forward cache 176
    proxy cache 176
    reverse caching 181
centers of excellence (COE) 89
certificate authority (CA) 147
certificate revocation list (CRL) 153
clusters 170
commercial off the shelf (COTS) 274
Communications Assistance for Law Enforcement Act (CALEA) 280
components
    cataloging 24
    identifying and cataloging 12
    organizing infrastructure 51
computer telephony integration (CTI) 32
consultants
    using them 8
content delivery network (CDN) 67, 73, 168, 179, 182, 208
corporate connectivity 189
cryptographic acceleration 138
customer expectations
    managing 290
customer interaction center (CIC) 206, 308
customer relationship management (CRM) 78, 283

data warehousing 28, 74
database layer 28
database management systems (DBMS) 128
decoupling 43, 46
defense in-depth 128
delegated administration 157
demilitarized zone (DMZ) 77, 120, 179, 277, 291
    extended vs. traditional 121
    multi-site 124
    parallel 124
design guidelines 48
digital receipts 149
digital signature 149
directory
    primary purpose of 158
directory server 153
directory service agent (DSA) 154
directory service markup language (DSML) 160
directory user agent (DUA) 154
distributed servers 183
DMZ Sandwich 122
dynamic link library (DLL) 42

e-Business 14, 23, 26, 148, 154, 206
    converging with business 92
    expectations of 1
    goal of 116
    hype vs. reality 2
    rapid ascendance of 31
e-Commerce 56, 154, 173
    consumer-centric 145
Edge Side Includes (ESI) 185
electronic document interchange (EDI) 5
encryption 132
enterprise application integration (EAI) 30, 77, 126, 155, 207
enterprise resource planning (ERP) 60, 158
enterprise systems management (ESM) 133
ethernet 167
expertise
    advanced ISP services 190
extensible markup language (XML) 5, 41, 71, 158, 174, 205, 221, 275
extensible stylesheet language transformations (XSLT) 75
extranet 193
extranet service provider (ESP) 193

fault tolerance 123, 125, 177
feedback system 295
Fibre Channel 209, 212, 218
file transfer protocol (FTP) 48
firewall 116, 138
    application proxy 116
    clusters 123
    dual 122
    serial, or DMZ Sandwich 122
    single 122
    stateful packet filtering 117
flash crowds 186, 202
full-time equivalent (FTE) 134

gap analysis 87
gateway
    SQL 47
gateways 28, 142
Global 2000 145
Global Positioning System (GPS) 280
graphical user interface (GUI)
    improving off-the-shelf 144

hackers 116, 121, 129, 133, 138, 148, 152
host pattern 60
host-based agents 131
hypertext markup language (HTML) 274, 275
hypertext transfer protocol (HTTP) 71
identity infrastructure
    purposes of 160
Infra-API 34
    understanding 287
infrastructure 7
    definition of 6
    identity vs. permission 159
    infrastructure patterns 27
    integration, reuse of 20
    organizing at the platform level 23
    permission vs. identity 162
    physical 198
    raw 23
    strategies 9
Infrastructure Pattern Matching (IPM) 14, 56, 83, 88, 90, 105
infrastructure planning 156
    strategic vs. tactical 15
inputs, tools, outputs, services (ITOS) 98
instant messaging 68
integrated agents 131
integrated development environment (IDE) 287
integrated threat management (ITM) 133
integrated voice response (IVR) 285
integration layer 30
Interactive Voice Response (IVR) 5, 32, 274, 282
Inter-API 34, 288
    understanding 288
inter-enterprise integration (IEI) 30
interfaces
    creating 48
Internet Protocol (IP) 282
Internet service provider (ISP) 14, 186
    consolidation of 204
Intra-API 34, 288
    understanding 287
intrusion detection system (IDS) 116, 128, 138
    network-based vs. host-based 129
IP multi-protocol label switching (MPLS) 190
IP transport 193
isolation infrastructure service 121
    definition of 115
isolation infrastructure service/b 116

J2EE 220
Java server pages (JSP) 61

key history management 147
key management 152
key pair 146
knowledge management 28
layer
    management 289
    presentation layer 274
layers 23
    creating separate 35
    organizing components into 24
legacy platforms 225
legacy systems
    integrating 5
lifecycles
    decoupling 40
lightweight directory access protocol (LDAP) 139, 154
    load balancing 138, 168
    load sharing 168
local area network (LAN) 166

manageability
    as factor in reverse caches 179
managed security service (MSS) 133
management
    data quality 157
marketing
    runaway campaigns 202
metadirectories 155
metadirectory 158
middleware 28
mobile application server (MAS) 274, 275
Mooreís Law 219

network architecture 189
network attached storage (NAS) 206, 209
network IDS
    limitations of 131
network infrastructure 167
network latency 173
network layer 55
    best practices 208
network load balancer (NLB) 125, 135, 140, 168, 170, 173
    advantages of 172
    integrating SSL into 137
network operating system (NOS) 69, 154, 161
network traffic
    minimizing 76
networking 203
nodes
    importance of 189
non-repudiation 194
notifications
    attack 132

online analytical processing (OLAP) 64
online data stores (ODS) 74
online transaction processing (OLTP) 60, 73, 74, 168
operating system (OS) 225
organizations
    Global 2000 133
OSI stack 137
outsourcing 5, 21, 67, 74, 90, 104, 155, 192, 201, 203, 208, 276
    hosting services 195
    outsourcing patterns 50
ownership
    establishing 45

package and communicate 101
package pricing 104
partitioning 20
pattern
    1-Tier Transact 60
    2-Tier Transact 61, 126
    3/N-Tier Transact 29, 32, 63, 75, 122, 126, 127, 138, 168, 182, 192, 201, 220, 289
    Client/Server 63
    combination of Publish and Transact 74
    designing 104
    linking patterns with services 88
    maturity 58
    pattern design 201
    pattern refinement 88
    phasing out old 225
    Real-Time Collaborate 68
    refined 112
    scalability of a pattern as deciding factor 57
    selecting a pattern 111
    Store-and-Forward Collaborate 69, 80, 223
    Stream Publish 66, 220
    Structured Collaborate 70
    Web Publish 29, 50, 65, 71, 122, 137, 168, 182, 192, 216, 220
patterns 11, 23, 53
    defining 11
    identifying modular 13
PCI cards
    accelerating site performance 136
peering points 190, 194
performance drag
    minimizing 135
permissions management 150, 194
personal computer interface (PCI) 135
personal digital assistant (PDA) 5, 277
personal identification number (PIN) 152
planning
    assimilation 101
    per-project 100
    strategic, or periodic 98
    tactical, or per-project 98
platform 11, 23
point of interaction (POI) 208
    multiple 76
points of interaction (POI) 33, 119, 275
    multiple 90
points-of-interaction (POI) 56
policy
    compliance 133
portfolios 16
Predictive Cost Modeling (PCM) 83, 88, 106
presentation 77
presentation independence 19
presentation layer 32
private key infrastructure (PKI) 139
process 112
    getting the process defined 89
process model 45
process(es)
    repeatable 15
provider viability 191
public key encryption (PKI) 134
public key infrastructure (PKI) 146, 194
public safety access center (PSAC) 281

quality of service (QoS) 202, 205

redundant array of independent disks (RAID) 169
relationship-based management (RBM) 94
reliability vs. performance 174
request for proposal (RFP) 145
resource(s)
    dedicated 89
return on investment (ROI) 8, 80
reuse 20, 34, 42, 56, 92, 139, 146, 149, 156, 171
    reuse challenges 151
reverse proxies 179
risk management 118
robots 291
role
    application developer 17, 34, 46
    assigning roles 89
    business analyst 287
    business manager 87
    chief customer officer 96
    chief information officer (CIO) 86
    chief security officer 96
    chief technical officer (CTO) 96
    chief technology officer (CTO) 86
    infrastructure developer 17, 92, 102, 108, 287
     infrastructure manager 87
    infrastructure planner 9, 14, 20, 30, 74, 90, 165
    internal partner manager 96
    IT director 293
    programmer 34
    relationship manager 95
    vendor and sourcing manager 96
role identifiers 158
router 116
router hops 173
rule
    80/20 80

scalability 19, 72, 77, 125, 140, 142, 166, 170, 175, 220
    challenges of 152
    low-cost 168
    single-server 154
scale-out 165
    as architectural trend 274
scaling
    scaling up vs. scaling out 220
SCSI 209
secure HTTP 135
secure socket layer (SSL) 134, 147
secure sockets library (SSL) 73, 168
security 74, 77, 204
security assertion markup language (SAML) 145
server
    database 215
server cluster 172
server farm 169
server layer 27
server(s)
    server consolidation 221
    types of 221
service level
    defining 106
service level agreement (SLA) 204, 290, 292
service level agreements (SLA)
    negotiating 199
service level management (SLM) 289, 290
service levels 20, 39
    defining 48
service(s) 11, 18, 23
    adaptive 37
    bundling 198
    consumer 43
    creating 36
    decoupling 14
    defining adaptive infrastructure service 51
    defining service levels 45
    desktop 103
    externalizing 91
    full interface 43
    interface 43
    keeping the number low 46
    non-repudiation/b 149
    project 104
    provider 43
    security and directory 194
    Web edge 175
sharing 38
Simple Mail Transfer Protocol (SMTP) 205
Simple Network Management Protocol (SNMP) 134
Simple Object Access Protocol (SOAP) 41, 205, 221
single instance 214
single point of administration (SPA) 144
Single Sign-On (SSO) 140, 148
smart cards 151
smart PC 20, 61, 63
software development kit (SDK) 288
solution(s)
    bundling 146
SQLNet 63
SSL session ID 173
stability 38
Storage Area Network (SAN) 26, 206
    comparing with network-attached storage (NAS) 210
storage layer 206
stovepipes 11, 20, 54
    removing 14
    vs. adaptive infrastructure 42
strategy
    vs. strategic activities 87
supply chain management (SCM) 78
supply-side caching 138
switching 132
system partitioning 170

TCP/IP 14, 25, 42, 55, 68, 81, 205, 209
    definition of 166
test lab 296
threat management 133
tools
    Bluetooth 278
    Check Point FireWall-1 117
    CICS 34
    Cisco PIX 117
    ColdFusion 61
    COM+/.NET 34
    Excel 69
    Forte 34
    freeware tools 120
    Haht 61
    J2EE 31, 34
    Kerberos 146
    metadirectory 155
    Microsoft IIS 126
    Microsoft Money 16
    Microsoft Windows 2000/.NET Server 31
    NetMeeting 68
    Passport 152
    Peoplesoft 63
    PowerBuilder 34, 61
    Quicken 16
    Real Application Cluster (RAC) 79
    RealPlayer 66
    SAP R/3 63
    Tuxedo 34
    Visual Basic 61
    WebLogic 31
    WebSphere 31
    Windows 2000/.NET 143
    Windows Media Player 66
    Word 69
total cost of ownership (TCO) 107, 119
    lowering 224
traditional DMZ 121
transactional systems 169
transactions per second (TPS) 135
trust
    challenges of 152

Universal Description, Discovery, and Integration (UDDI) 41, 205, 221
UNIX 212, 218
usability 132

videoconferencing 68
virtual private network (VPN) 25, 116, 167
voice markup language (VoxML) 275
voice messaging 28
Voice Over Internet (VoIP) 68, 281
voice response unit (VRU) 306

Web hosting 202
web management 291
Web server 121, 141, 154, 157, 169, 171, 172, 173, 202, 213, 215, 274
Web Services Description Language (WSDL) 41, 205, 221
Web Single Sign-On (Web SSO) 77, 139, 142, 145, 153, 154, 159, 162, 180, 194
wide area network (WAN) 166
Windows 2000/.NET 212, 218
wireless application protocol (WAP) 32, 274, 275, 277
wireless application server provider (WASP) 274, 276, 280, 281
wireless markup language (WML) 275

XML query language (XQL) 75

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020