Enforcing the policy (rules and regulations) of the organization that pertain to information and computing. Also called "policy-based management," it mostly deals with database access and network resource issues: which users have access to what data and how network traffic is prioritized. See
policy,
COPS and
information security.