Home > Store

Exchange Server 2010 Unleashed

Register your product to gain access to bonus material or receive a coupon.

Exchange Server 2010 Unleashed

Book

  • Sorry, this book is no longer in print.
Not for Sale

Description

  • Copyright 2010
  • Edition: 1st
  • Book
  • ISBN-10: 0-672-33046-6
  • ISBN-13: 978-0-672-33046-9

Microsoft Exchange Server 2010 Unleashed is the ultimate guide to designing, deploying, managing, troubleshooting, and supporting any Exchange Server 2010 environment, no matter how large or complex.

Drawing on their extensive experience with hundreds of enterprise Exchange Server environments--including Exchange Server 2010 early adopters--the authors thoroughly cover every stage of the Exchange Server 2010 lifecycle. They present detailed recommendations, proven tips and tricks, and step-by-step techniques for implementation and migration planning, architecture, installation, administration, security, monitoring, integration, availability, optimization, and much more.

Rand Morimoto and his expert colleagues also offer indispensable practical guidance for making the most of Microsoft Exchange Server 2010’s many enhancements--from its improved web access to its enhanced support for Unified Communications and Mobility.

  • Use proven best practices to plan your Exchange Server 2010 implementation
  • Architect higher-performance, lower-cost enterprise Exchange Server environments
  • Maximize the security of your Exchange Server infrastructure, transport, and messages
  • Migrate smoothly from Exchange Server 2003/2007 and Active Directory 2000/2003 to Exchange Server 2010 and Active Directory 2008
  • Utilize Microsoft Operations Manager to monitor Exchange Server 2010
  • Use Windows PowerShell to streamline Exchange Server management
  • Integrate other Microsoft technologies, including SharePoint 2007 and Office Communication Server 2007
  • Leverage the full capabilities of the Outlook Web App (OWA) client
  • Provide robust messaging to non-Windows and non-Outlook systems
  • Implement Exchange Server’s powerful new Database Availability Group replication feature
  • Back up Exchange Server 2010 environments and recover quickly from a disaster
  • Systematically optimize Exchange Server 2010 environments, including storage

Sample Content

Online Sample Chapter

Understanding Core Exchange Server 2010 Design Plans

Sample Pages

Download the sample pages (includes Chapter 3 and Index)

Table of Contents

Introduction 1

Part I: Microsoft Exchange Server 2010 Overview

1     Exchange Server 2010 Technology Primer     5

What Is Exchange Server 2010?      5

What’s New in Exchange Server 2010?      13

Understanding Exchange Server 2010 Server Roles and Mail Flow     26

Understanding the Importance of Active Directory for an Exchange Server 2010 Environment     31

Installing and Migrating to Exchange Server 2010     32

Managing and Administering Exchange Server 2010     33

Summary     34

Best Practices     34

2     Planning, Prototyping, Migrating, and Deploying Exchange Server 2010     37

Initiation, Planning, Testing, and Pilot: The Four Phases to the Upgrade      38

Initiation Phase: Defining the Scope and Goals      40

Initiation Phase: Creating the Statement of Work     46

Planning Phase: Discovery     51

Planning Phase: Creating the Design Document     53

Creating the Migration Document     57

The Prototype Phase      62

The Pilot Phase: Deploying Services to a Limited Number of Users      65

The Production Migration/Upgrade      67

Summary     68

Best Practices     69

Part II: Planning and Designing an Exchange Server 2010 Environment

3     Understanding Core Exchange Server 2010 Design Plans     71

Planning for Exchange Server 2010      71

Understanding AD Design Concepts for Exchange Server 2010      76

Determining Exchange Server 2010 Placement      80

Configuring Exchange Server 2010 for Maximum Performance and Reliability     83

Securing and Maintaining an Exchange Server 2010 Implementation     86

Summary     87

Best Practices     87

4     Architecting an Enterprise-Level Exchange Server Environment     89

Designing Active Directory for Exchange Server 2010     89

Determining Hardware and Software Components     92

Designing Exchange Server Roles in an Exchange Server Environment     93

Designing Exchange Server Infrastructure      97

Integrating Client Access into Exchange Server 2010 Design      99

Summary     100

Best Practices     101

5     Integrating Exchange Server 2010 in a Non-Windows Environment     103

Synchronizing Directory Information with Forefront Identity Manager (FIM)      104

Managing Identity Information Between LDAP Directories and Exchange Server 2010     109

Using Services for UNIX to Integrate UNIX Systems with an Active Directory/Exchange Server 2010 Environment     111

Understanding the Identity Management for UNIX Components     118

Administrative Improvements with Windows Server 2008     121

Summary     122

Best Practices     123

6     Understanding Network Services and Active Directory Domain Controller Placement for Exchange Server 2010      125

Domain Name System and Its Role in Exchange Server 2010      125

Outlining the Types of DNS Servers     128

Examining DNS Components      129

Using DNS to Route SMTP Mail in Exchange Server 2010     137

Understanding DNS Requirements for Exchange Server 2010      138

Configuring DNS to Support Exchange Servers      144

Troubleshooting DNS Problems     144

Global Catalog and Domain Controller Placement     148

Examining the Role of Domain Controllers in AD     150

Defining the Global Catalog     152

Exploring DSAccess, DSProxy, and the Categorizer      159

Understanding AD Functionality Modes and Their Relationship to Exchange Server Groups     163

Summary     166

Best Practices     167

Part III: Implementing Exchange Server 2010 Services

7     Installing Exchange Server 2010     169

Understanding the Exchange Server 2010 Server Roles     170

Understanding the Prerequisites for Exchange Server 2010     171

Understanding High Availability and Site Resilience in Exchange Server 2010      174

Exchange Server 2010 Hardware Requirements     175

Understanding the Active Directory Requirements for Exchange Server 2010      176

Understanding Role Based Access Control     186

Planning Your Exchange Server 2010 Installation     188

Deploying Active Directory from Scratch       190

Preparing Your Environment for Exchange Server 2010      199

Installing Exchange Server 2010      206

Finalizing the Deployment     209

Summary     210

Best Practices     211

8     Implementing Edge Services for an Exchange 2010 Environment      213

Installing and Configuring the Edge Transport Server Components      214

Utilizing the Basic Sender and Recipient Connection Filters      222

Utilizing SenderID on an Edge Transport Server     231

Using Content Filtering to Isolate Inappropriate Content     237

Fine-Tuning Content Filtering     243

Using Content Filtering to Allow and Reject Domain-Level Content     245

Filtering Content in a Message Attachment      247

Using Sender/IP Reputation to Filter Content      250

Using Address Rewriting to Standardize on Domain Address Naming for an Organization     252

Using EdgeSync to Synchronize Active Directory Information to the Edge Transport Server     255

Implementing Safelist Aggregation for Outlook 2003 and Outlook 2007     259

Managing and Maintaining an Edge Transport Server      261

Forefront Online Security for Exchange Server 2010     265

Summary     266

Best Practices     266

9     Using Windows PowerShell in an Exchange Server 2010 Environment     269

What Is Windows PowerShell     269

Introducing the Exchange Management Shell     272

Understanding the Exchange Server Task Model     275

Starting the Exchange Management Shell      276

More on How PowerShell and EMS Work Together      280

Understanding the EMS Syntax     281

Creating Your Own Scripts      285

Managing Cmdlets     288

Introducing the Windows PowerShell Command Log      289

Using EMS to Do Administrative Mailbox Tasks     290

Using EMS to Do Reporting     295

Finding Other Resources     297

Summary     298

Best Practices     298

Part IV: Securing an Exchange Server 2010 Environment

10     Client-Level Secured Messaging     301

Microsoft’s Trustworthy Computing Initiative      301

Securing Your Windows Environment      302

Exchange Server 2010 Client-Level Security Enhancements     311

Securing Outlook 2007      312

Protecting Against Spam     317

Securing Outlook Web App      322

Summary     324

Best Practices     325

11     Server and Transport-Level Security      327

Considering the Importance of Security in an Exchange Server 2010Environment     327

Components of a Secure Messaging Environment      331

Exchange Server-Level Security Features      344

Transport-Level Security Defined      350

Exchange Server 2010 SMTP Connectors     352

Edge Transport Server Connectors      359

Securing Windows for the Edge Transport Server Role     364

Summary     366

Best Practices     366

12     Integrating Certificate-Based Public Key Infrastructure (PKI) in Exchange Server 2010     369

Understanding Public Key Infrastructure     370

Installing a Windows Certification Authority Server     376

Server Certificates in Exchange Server 2010      378

Implementing Secured Email Communications with Exchange Server 2010     383

Using Outlook to Send and Receive Digitally Signed and Encrypted Emails     388

Summary     394

Best Practices     394

13     Securing Exchange Server 2010 with ISA Server     397

Understanding the Internet Security and Acceleration (ISA) Server 2006      398

Outlining the Need for ISA Server 2006 in Exchange Server Environments      398

Outlining the Inherent Threat in Exchange Server HTTP Traffic     401

Securing Exchange Outlook Web App with ISA Server 2006     403

Securing POP and IMAP Exchange Server Traffic      412

Managing and Controlling Simple Mail Transfer Protocol (SMTP) Traffic     414

Logging ISA Traffic     417

Monitoring ISA from the ISA Console     420

Summary     425

Best Practices     425

14     Understanding Exchange Policy Enforcement Security     427

What Is Exchange Policy Management in Exchange Server 2010     428

Understanding Relevant Governmental Regulations for Policy Enforcement     428

Using Transport Agents in Exchange Server 2010      439

Understanding the Hub Role Transport Agents in Exchange Server 2010     440

Implementing Transport Agent Policies on the Edge      446

Creating Messaging Records Management Policies      448

Summary     453

Best Practices     453

Part V: Migrations and Coexistence with Exchange Server 2010

15     Migrating from Active Directory 2000/2003 to Active Directory 2008     455

Understanding What Needs to Be Migrated to Windows Server 2008      455

Understanding the Benefits to Upgrading Active Directory     458

Beginning the Migration Process     460

Big Bang Migration      463

Phased Migration      467

Multiple Domain Consolidation Migration     479

Summary     489

Best Practices     490

16     Transitioning from Exchange Server 2003/2007 to Exchange Server 2010     491

High-Level Guide for Transition from Exchange Server 2003 to Exchange Server 2010      492

 High-Level Guide for Transition from Exchange Server 2007 to Exchange Server 2010      493

 Understanding How to Transition to Exchange Server 2010      494

Understanding What’s New and What’s Different with Exchange Server 2010      497

Deploying a Prototype Lab for the Exchange Server 2010 Transition Process      502

Transitioning to a Brand-New Exchange Server 2010 Environment     504

Transitioning from Exchange Server 2003 to Exchange Server 2010     505

Transitioning from Exchange Server 2007 to Exchange Server 2010     520

Summary     521

Best Practices     521

17     Implementing Client Access and Hub Transport Servers     523

Understanding the Client Access Server      524

Installing the Client Access Server      544

Understanding the Hub Transport Server      546

Transport Pipeline     550

Installing the Hub Transport Server      553

Test Cmdlets for CAS and Hub Transport Servers     555

Summary     561

Best Practices     561

Part VI: Exchange Server 2010 Administration and Management

18     Administering an Exchange Server 2010 Environment     563

Introduction to Role Based Access Control     563

Administrative Tools      570

Performing Common Tasks      584

Recipient Configuration      604

Understanding Journaling      611

Understanding Archiving      616

Using the Exchange Server 2010 Toolbox     618

Exchange Server Coexistence      627

Server Administration     628

Summary     631

Best Practices     632

19     Exchange Server 2010 Management and Maintenance Practices      633

Proper Care and Feeding of Exchange Server 2010      633

Maintenance Tools for Exchange Server 2010      636

The Exchange Control Panel     640

Auditing the Environment      647

Best Practices for Performing Database Maintenance     656

Prioritizing and Scheduling Maintenance Best Practices     658

Post-Maintenance Procedures     663

Reducing Management and Maintenance Efforts     664

Summary     665

Best Practices     665

20     Using Operations Manager to Monitor Exchange Server 2010     667

OpsMgr Exchange Server 2010 Monitoring      668

What’s New in OpsMgr R2      670

Explaining How OpsMgr Works      671

Outlining OpsMgr Architecture     674

Understanding How to Use OpsMgr      677

Understanding OpsMgr Component Requirements      680

Understanding Advanced OpsMgr Concepts     681

Securing OpsMgr     686

Installing Operations Manager 2007 R2     689

Installing Edge Transport Monitoring Certificates     697

Summary     703

Best Practices     704

21     Remote Administration of Exchange Server 2010 Servers     705

Certificates, Trust, and Remote Administration     706

Using the Exchange Management Console Remotely     707

Using the Remote Exchange Management Shell      707

Using the ECP Remotely     710

RDP with Exchange Server 2010      710

Summary     724

Best Practices     725

22     Documenting an Exchange Server 2010 Environment     727

Benefits of Documentation     728

Exchange Server 2010 Project Documentation     730

Exchange Server 2010 Environment Documentation      741

Exchange Server 2010 Administration and Maintenance Documents     744

Disaster Recovery Documentation      747

Performance Documentation      749

Security Documentation     750

Training Documentation      752

Summary     752

Best Practices     753

Part VII: Unified Communications in an Exchange Server 2010 Environment

23     Designing and Implementing Mobility in Exchange Server 2010    755

Understanding Mobility Enhancements in Exchange Server 2010     755

Enabling ActiveSync in Exchange Server 2010      757

Securing Access to ActiveSync with Secure Sockets Layer Encryption     760

Securing Access to ActiveSync Using Internet Security and Acceleration (ISA) Server 2006      764

Working with ActiveSync Policies      768

Working with Windows Mobile Pocket PC and Smartphone Editions      770

Summary     774

Best Practices     775

24     Designing and Configuring Unified Messaging in Exchange Server 2010     777

Unified Messaging Features      777

Unified Messaging Architecture     783

Unified Messaging Installation     797

Monitoring and Troubleshooting Unified Messaging     811

Unified Messaging Shell Commands     825

SIP Protocol      828

Summary     831

Best Practices     831

25     Collaborating Within an Exchange Server Environment Using Microsoft Office SharePoint Server 2007     833

Understanding the History of SharePoint Technologies     833

Identifying the Need for MOSS 2007      837

Exploring Basic MOSS Features     838

Exploring End-User Features in MOSS      845

Customizing and Developing MOSS Sites     851

Summary     854

Best Practices     854

26     Integrating Office Communications Server 2007 in an Exchange Server 2010 Environment     857

Understanding Microsoft’s Unified Communications Strategy     858

Installing OCS 2007 R2     861

Exploring Office Communications Server Tools and Concepts      876

Installing and Using the Communicator 2007 Client     879

Web Conferencing      880

Summary     881

Best Practices     881

Part VIII: Client Access to Exchange Server 2010

27     Getting the Most Out of the Microsoft Outlook Client      883

Outlook over the Years      883

Highlighted Features in Outlook 2007     885

Security Enhancements in Outlook 2007      893

Implementing Outlook Anywhere      900

Deploying Outlook 2007      903

Using Outlook 2007     905

Using Cached Exchange Mode for Offline Functionality     914

Summary     919

Best Practices     920

28 Leveraging the Capabilities of the Outlook Web App (OWA) Client      921

Understanding Microsoft’s Direction on OWA      922

What’s New in OWA 2010?      924

Understanding Available Versions and Security Options      927

Using OWA 2010     931

Using the Calendar in OWA      947

Using Tasks in OWA     952

Using Contacts in OWA     953

Using Keyboard Shortcuts     953

The Options Page     954

Signing Out of OWA 2010     967

Configuring OWA and IM Integration     967

Summary     972

Best Practices     972

29     Using Non-Windows Systems to Access Exchange Server 2010     973

Understanding Non-Windows--Based Mail Client Options     974

Outlook Express      977

Mac Mail, iCal, and Address Book     982

Configuring and Implementing Entourage for the Mac     984

Remote Desktop Connection Client for Mac     987

Understanding Other Non-Windows Client Access Methods      991

Summary     993

Best Practices     993

30     Deploying the Client for Microsoft Exchange Server 2010     995

Outlook 2007 Auto Account Setup      995

Understanding Deployment Options     999

Planning Considerations and Best Practices      1003

Preparing the Deployment      1005

Installing the Outlook Client for Exchange Server     1012

Pushing Outlook Client Software with Group Policies     1015

Deploying with Microsoft System Center Configuration Manager 2007      1023

Managing Post-Deployment Tasks     1025

Summary     1026

Best Practices     1026

Part IX: Data Protection and Disaster Recovery of Exchange Server 2010

31     Database Availability Group Replication in Exchange Server 2010     1027

Understanding Database Availability Groups      1028

Deploying a Database Availability Group      1030

Comparing and Contrasting DAG Versus CCR/SCR/SCC     1050

Load Balancing in Exchange Server 2010      1052

Summary     1057

Best Practices     1057

32     Backing Up the Exchange Server 2010 Environment     1059

Understanding the Importance of Backups      1059

Establishing Service Level Agreements     1061

Supporting Backups with Documentation     1063

Logging Daily Backup Results and Evaluation     1066

Roles and Responsibilities     1066

Developing a Backup Strategy      1067

What to Back Up on Exchange Servers      1071

The Need for Backups with Database Availability Groups      1074

Backing Up Windows Server 2008 and Exchange Server 2010      1075

Backing Up Specific Windows Services      1078

Summary     1081

Best Practices     1082

33     Recovering from a Disaster in an Exchange Server 2010 Environment     1085

Identifying the Extent of the Problem      1086

What to Do Before Performing Any Server-Recovery Process      1090

Preparing for a More Easily Recoverable Environment      1091

Recovering from a Site Failure     1094

Recovering from a Disk Failure     1098

Recovering from a Boot Failure      1100

Recovering from a Complete Server Failure     1101

Recovering Exchange Server Application and Exchange Server Data      1103

Recovering from Database Corruption     1105

Recovering Internet Information Services     1109

Recovering Windows Server 2008 Domain Controllers     1109

Recovering Active Directory      1110

Summary     1112

Best Practices     1113

Part X: Optimizing Exchange Server 2010 Environments

34     Optimizing an Exchange Server 2010 Environment     1115

Examining Exchange Server 2010 Performance Improvements     1116

Analyzing Capacity and Performance      1119

Optimizing Exchange Server 2010 Servers     1122

Monitoring Exchange Server 2010      1131

Analyzing and Monitoring Core Elements      1131

Properly Sizing Exchange Server 2010      1137

Optimizing Exchange Server Through Ongoing Maintenance      1146

Monitoring Exchange Server with System Center Operations Manager     1146

Summary     1147

Best Practices     1147

35     Designing and Optimizing Storage in an Exchange Server 2010 Environment     1149

Defining the Technologies     1150

When Is the Right Time to Implement NAS and SAN Devices?     1152

Designing the Right Data Storage Structure for Exchange Server 2010      1154

Adding in Fault Tolerance for External Storage Systems      1160

Recommendations for SAN and NAS Solutions      1161

Making the Best Use of SAN/NAS Disks with Exchange Server 2010     1163

Summary     1167

Best Practices     1168

Index      1169

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020