Skip to main content

Humanities, Social Science and Language


Digital Products


Connect®
Course management and student learning tools backed by great support.

McGraw Hill GO
Greenlight learning with the new eBook+

ALEKS®
Personalize learning and assessment

ALEKS® Placement, Preparation, and Learning
Achieve accurate math placement

SIMnet
Ignite mastery of MS Office and IT skills

McGraw Hill eBook & ReadAnywhere App
Get learning that fits anytime, anywhere

Sharpen: Study App
A reliable study app for students

Virtual Labs
Flexible, realistic science simulations

AI Reader
Encourage Discovery, Boost Understanding

Services


Affordable Access
Reduce costs and increase success

Learning Management System Integration
Log in and sync up

Content Collections powered by Create®
Curate and deliver your ideal content

Custom Courseware Solutions
Teach your course your way

Education for All
Let’s build a future where every student has a chance to succeed

Business Program
Explore business learning solutions & resources

Professional Services
Collaborate to optimize outcomes

Remote Proctoring
Validate online exams even offsite

Institutional Solutions
Increase engagement, lower costs, and improve access for your students

Evergreen
Updated, relevant materials—without the hassle.

Support


General Help & Support Info
Customer Service & Tech Support contact information

Online Technical Support Center
FAQs, articles, chat, email or phone support

Support At Every Step
Instructor tools, training and resources for ALEKS, Connect & SIMnet

Instructor Sample Requests
Get step by step instructions for requesting an evaluation, exam, or desk copy

Platform System Check
System status in real time

Net Privacy: A Guide to Developing & Implementing an Ironclad ebusiness Privacy Plan

ISBN10: 0071381112 | ISBN13: 9780071381116

Net Privacy: A Guide to Developing & Implementing an Ironclad ebusiness Privacy Plan
ISBN10: 0071381112
ISBN13: 9780071381116
By Michael Erbschloe and John Vacca

Chapter 1: The Threat to Privacy and Corporate Vulnerability

Chapter 2: The Nature of Privacy Problems.

Chapter 3: The Regulatory and Legislative Environment.

Chapter 4: Organizing to Protect Privacy.

Chapter 5: Conducting a Privacy-Needs Audit.

Chapter 6: Evaluating Technology Needs for Privacy Protection.

Chapter 7: Developing the Enterprise Privacy Plan.

Chapter 8: Implementing the Enterprise Privacy Plan.

Chapter 9: Managing Privacy on the Enterprise Web Site.

Chapter 10: Managing Privacy on Internet Supply Chains.

Chapter 11: Managing Privacy Efforts on the Long-Term.

Chapter 12: Protecting the Privacy of Enterprise Storage and Processing.

Chapter 13: Protecting the Privacy of Corporate Communications.

Chapter 14: Protecting Corporate Desktop Privacy.

Chapter 15: Protecting the Privacy of the Road Warrior's Laptop.

Chapter 16: Protecting the Privacy of Remote Access and Telecommuters.

Chapter 17: The Future of Privacy Management.

Need support?   We're here to help - Get real-world support and resources every step of the way.

Top