Store SignIn Wishlist/PO Builder Store Cart
Store SignIn Wishlist/PO Builder Store Cart
Privacy Policy
Distribution Partnerships

Discovery Education welcomes new distribution partners that will focus on promoting and selling our educational multimedia products into the Education, Business & Industry and Health & Guidance markets.

We offer a competitive discount structure, marketing support materials, and an efficient fulfillment process for our partners.

If you are interested in becoming a distribution partner with Discovery Education, please contact for more information.

Copyright Information

1. Content

1.1 The contents of the Internet service are intended for the personal, noncommercial use of its Users. All materials published on (including, but not limited to, feature articles, photographs, images, illustrations, audio clips and video clips, also known as "The Content") are protected by copyright, and owned or controlled by, Discovery Communications, Inc., or the party credited as the provider of the content, software or other materials. User shall abide by all additional copyright notices, information or restrictions contained in any Content accessed through the Web site.

1.2 is protected by copyright as a collective work and/or compilation, pursuant to U.S. copyright laws, international conventions and other copyright laws. User may not modify, publish, transmit, participate in the transfer or sale of, reproduce, create derivative works from, distribute, perform, display or in any way exploit any of the Content, software, materials or Service in whole or in part.

1.3 User may not download or copy the Content and other downloadable items displayed on this Web site for personal use. User shall not store any significant portion of any Content owned by or licensed to in any form. If you are an owner of intellectual property who believes your intellectual property has been improperly posted or distributed via this Web site, please notify Customer Care at

2. Forums and Discussions

2.1 User shall not upload to, or distribute or otherwise publish through the Web site any Content which is libelous, defamatory, obscene, pornographic, abusive or otherwise violates any law.

2.2 The Forums shall be used only in a noncommercial manner. User shall not, without the express approval of, distribute or otherwise publish any material containing any solicitation of funds, advertising or solicitation for goods or services.

2.3 While does not and cannot review every message posted by Users in the Forums, and is not responsible for any content of these messages, reserves the right to delete, move or edit messages that it, in its sole discretion, deems abusive, defamatory, obscene, in violation of copyright or trademark laws or otherwise unacceptable. Users shall remain solely responsible for the content of their messages.

2.4 User acknowledges that any submissions (e.g. Letter to the Editors, articles) may be edited, removed, modified, published, transmitted and displayed by In addition User warrants that all moral rights in any uploaded materials have been waived.

3. Access and Availability of Service and Links

3.1 contains links to other related World Wide Web Internet sites, resources and sponsors of Since is not responsible for the availability of these outside resources or their contents, User should direct any concerns regarding any external link to its site administrator or Webmaster.

4. Representatives and Warranties

4.1 Neither nor Discovery Communications, Inc., represent or endorse the accuracy or reliability of any advice, opinion, statement or other information displayed, uploaded or distributed through the service by any User, information provider or any other person or entity. User acknowledges that any reliance upon any such opinion, advice, statement, memorandum or information shall be at User's sole risk. reserves the right, in its sole discretion, to correct any errors or omissions in any portion of the Web site.

The Web site and all downloadable software are distributed on an "as is" basis without warranties of any kind, either express or implied, including, without limitation, warranties of title or implied warranties of merchantability or fitness for a particular purpose, or noninfringement. User hereby acknowledges that use of the Web site is at User's sole risk.

5. Disclaimer

The material in this Web site could include technical inaccuracies or other errors. Your use and browsing of the Web site is at your risk. Neither nor any other party involved in creating, producing or delivering the Web site shall be liable for any direct, incidental, consequential, indirect or punitive damages arising out of your access to, or use of, the Web site. does not warrant that the functional aspects of the Web site will be uninterrupted or error free, or that this Web site or the server that makes it available are free of viruses or other harmful components. Please note that some jurisdictions may not allow the exclusion of implied warranties, so some of the above exclusions may not apply to you. reserves the right to make changes to this Web site at any time without notice.

Privacy & Security

Ordering Online at is Safe and Easy! utilizes Secure Sockets Layer, an advanced data encryption system used to ensure the security and confidentiality of information exchanged between your browser and the Discovery Channel e-commerce servers. All of your personal information (including credit card numbers) will be encrypted and then transmitted from your browser to our e-commerce systems securely. This information can only be unencrypted by Discovery. For more information on secure transactions, please read our Security FAQs.

We can only guarantee secure transactions with orders placed directly from our website using our secure online ordering system. We cannot guarantee secure transactions for orders sent to us via email. Please do not send order via email.'s Safe Shopping Guarantee
We guarantee that shopping with will be safe and secure. This means that you will not be responsible for any unauthorized charges made to your credit card stemming from purchases you have made with

U.S. federal regulations provide for a limit on the liability of each credit card holder for fraudulent charges. This limit is currently $50.00. Should fraudulent charges be applied to your card through no fault of your own while interacting with's secure commerce facilities, and your bank holds you responsible for the $50.00 maximum, we will cover the entire amount up to the full $50.00. Respects Your Privacy knows that the confidentiality of purchase-related information is of special concern to visitors who purchase items through That is why is committed to safeguarding this information. We will never share any personally identifiable information (such as your name, address or telephone number) that you provide us when you make a purchase through with any other company.

What Information We Collect
The information gathered by falls into two categories: (1) personally identifiable information voluntarily supplied by visitors to our Web sites through optional registration or other methods and (2) non-personally identifiable information routinely gathered as visitors navigate through our sites.

Personally Identifiable Information
There is lots of content and that does not require that submission of personally identifiable information. However, certain personalized features that our visitors can take advantage on our Web site (such as Account Sign In) through registration. In order to register on our site, we may ask for your name, email address, gender, age and zip code, and we might request information on your interest in education. The information you supply will help us to offer you more personalized features, to tailor our sites to your interests and to make them more useful to you.

The more you tell us about yourself, the more value we can offer you. Supplying such information is entirely voluntary. But if you don't supply the information we need, we may be unable to provide you with services we make available to other visitors to our sites. Of course, even if you want to remain anonymous, you're still free to take advantage of the wealth of content available on our sites without registration.

Non-Personally Identifiable Information

To help make our sites more responsive to the needs of our visitors, we invoke a standard feature found in browser software, called a "cookie", to assign each visitor a unique, random number, a sort of anonymous user ID that resides on your computer. The cookie doesn't actually identify the visitor, just the computer that a visitor uses to access our site. Unless you voluntarily identify yourself (through registration, for example), we won't know who you are, even if we assign a cookie to your computer. The only personal information a cookie can contain is information you supply. A cookie can't read data off your hard drive.
We use cookies to help us tailor our site to your needs, to deliver a better, more personalized service. In addition, we may use cookies to track the pages on our sites visited by our users. We can build a better site if we know which pages our users are visiting and how often. Of course, you can set your browser not to accept cookies, but if you do, you may not be able to take advantage of the personalized features enjoyed by other visitors to our sites.

IP Addresses
Our Web servers automatically collect limited information about your computer's connection to the Internet, including your IP address, when you visit our sites. (Your IP address is a number that lets computers attached to the Internet know where to send you data - such as the Web pages you view.) Your IP address does not identify you personally. We use this information to deliver our Web pages to you upon request, to tailor our sites to the interests of our users and to measure traffic within our sites.

Security FAQs

How can I send my credit card number over the Internet securely?
One problem with communicating sensitive information over the Internet is that almost every connection between two computers over a network involves many intermediate steps. These steps involve a chain of computers that successively receive and forward information until the information reaches its proper destination. This process, called routing, is fundamental to all Internet communication, and any computer in the routing chain has complete access to all the data it receives. This routing process makes it possible for the unscrupulous to intercept your private messages, steal your credit card numbers, or illegally obtain confidential or proprietary information.

However, the shopping system uses the Secure Sockets Layer (SSL) protocol for secure data transmission over the Internet, thereby preventing the unscrupulous from intercepting your data. SSL, which is the leading data encryption system, scrambles any data sent from your computer to our server in such a way that our server - and only our server - can unscramble the information when your data is received. Because of SSL, intermediary computers involved in routing the information see only gibberish that they can't decipher.

What is encryption?
A traditional encryption system, called a secret-key system, uses a single large number called a key both to scramble (encrypt) and unscramble (decrypt) messages. Secret-key encryption systems are very fast, but they rely on one party communicating the secret key to another party, often by way of a third party such as a courier, before the two parties can exchange encrypted messages. This makes keys vulnerable to theft or tampering while in transit.'s system does not use a traditional encryption system. Instead, uses a form of encryption called "public-key encryption," which ensures the privacy of your credit card and other personal information.

How is public-key encryption different from traditional encryption?
Public-key encryption is used by SSL to encrypt and decrypt transmitted data. Unlike secret-key encryption systems, a public-key system uses pairs of keys (key pairs). One key, called the public-key, is used to encrypt messages, while the other, called the private-key, is used to decrypt messages. The two keys are large numbers that are related mathematically in such a way that it takes a very long time to calculate the private-key from the public-key. has registered it's public-key with Verisign, Inc. When you want to send an encrypted message, your browser must look up our public-key in a directory maintained by Verisign. The browser then uses's public-key to encrypt the message, and send us the encrypted message. Only our private-key can decrypt the message sent from you.

Because public-key encryption is much slower than secret-key encryption, SSL uses it only when your browser first connects to the site to exchange a secret-key called a session key, which both your browser and our server use to encrypt and decrypt transmitted data.

Who is Verisign, Inc.?
Verisign, Inc. is a Certifying Authority (CA). Certifying Authorities are used to ensure that your browser is communicating with the authentic and not an imposter.

When your browser connects to for secure transactions, your browser must be assured that it hasn't connected to an impostor pretending to be Your browser therefore requires to authenticate itself before such transactions can proceed. To authenticate itself, our website presents your browser with the proper credentials, called a certificate.

When set-up its secure website, we obtained our certificate from Verisign, one of the most trusted Certifying Authorities in the world. As part of our application, we provided them with certain legal information about our organization, which they used to certify that is legitimate and should be certified.

Technical Support

Minimum System Requirements (Single CD-ROMs)

  • A Pentium processor-based PC or compatible computer
  • At least 128MB of RAM
  • Win 98/Me/2000/XP/Vista
  • Color Monitor (High Color - 16 Bit)
  • QuickTime 6.0 or later (6.0 included on CD)
  • 4X CD-ROM (or faster)
Macintosh OS X:
  • A 400 MHz PowerPC G3 or faster Macintosh computer
  • At least 128MB of RAM
  • Mac OS X v10.1.5; v10.2.3 or later
  • Color Monitor (1000s colors)
  • QuickTime 6.0 or later (6.0 included on CD)
  • 4X CD-ROM (or faster)
Mac OS 8.6/9:
  • Power Macintosh Power PC processor (G3 or higher recommended)
  • 64 MB of installed RAM
  • Netscape 4.0 or later, or Microsoft Internet Explorer 4.5 or later, or AOL 4.0 or later
  • Mac-compatible speakers
  • Color Monitor (1000s colors)
  • QuickTime 6.3 (installed by software)
  • 4x CD-ROM drive
  • Microphone (optional)
  • Modem for online access (optional)

Please call 800-323-9084, or email for Network System requirements.

Installing the Program
Click on the Start button, then the Run button, and then the Browse button. Double click the Setup.exe file that is located on the root of the CD. Follow the on-screen instructions.

Running the Program
Click on the Start button, choose Programs, then choose Discovery School, then choose Ecology v2.0, then click on the Ecology v2.0 icon.

Teacher's Guide
A teacher's guide has been included on the CD in PDF and Word formats. To view the PDF version you need to have Acrobat Reader 5.0 or later installed on your computer. If you do not have Acrobat Reader installed on your computer, an installer for Acrobat Reader 5.0 has been included on the CD. To install Acrobat Reader 5.0 follow the following instructions:
1) Insert the CD into your CD ROM drive.
2) Double click on the My Computer icon which is located on your desktop.
3) Double click on your CD ROM disk.
4) Double click on the Setup folder to open it.
5) Double click on the Acrobat50 folder to open it.
6) Double click on the Setup.exe file to run the Acrobat installer.
7) Follow the on-line instructions.
8) If you have problems printing the PDF version of the teacher's guide you can view the Word version (Word 97 or newer). Word viewers can be downloaded from Microsoft's web site ( if you do not have Word 97 or newer.

Quicktime Movies
If the QuickTime movies in the program do not play properly you may have to install QuickTime 6.0 from the CD. To do this follow the following instructions:
1) Insert the CD into your CD ROM drive.
2) Double click on the My Computer icon which is located on your desktop.
3) Double click on your CD ROM disk.
4) Double click on the Setup folder to open it.
5) Double click on the Qtw6 folder to open it.
6) Double click on the QuickTimeInstaller.exe file to run the QuickTime installer.
7) Follow the on-line instructions.

Volume Control
The volume control within the program works as a percentage of Windows master volume control. If Windows master volume control is set to 50 percent of your maximum volume then setting the program's volume to 50 percent will result in a volume setting of 25 percent. For best results set your master volume to the loudest that you want it to sound and then adjust the program's volume accordingly.

For audiovisual use only. Not for use on closed-circuit, ITFS channels, cable or other multi-site distribution. All Discovery School branded videos closed captioned. For inquiries regarding duplication rights, call 301-272-2539.

Digital Licensing
Linear DVD-R and digital transmission licenses for schools and libraries are now available for Discovery School video titles. To speak to a media consultant, please contact Films for the Humanities and Sciences at 800-257-5126 or e-mail or visit