1) In policy-based networking, a policy is a formal set of statements that define how the network's resources are to be allocated among its clients. Clients can be individual users, departments, host computers, or applications. Resources can be allocated based on time of day, client authorization priorities, availability of resources, and other factors. Allocation can be static or dynamic (based on variations in traffic). Policies and policy statements are created by network managers and stored in a policy repository. During network operation, the policies are retrieved and used by network management software to make decisions.

Ideally, policy statements can be written in natural language like this:

Give voice-over-IP users the highest priority.
Give teleconference users the next highest priority.
In practice, most policy-based networking software today requires specific knowledge of the network configuration and the use of a more artificial language.

2) In Hierarchical Storage Management (HSM), a policy is a set of statements used to guide HSM software about when to backup or archive files or to migrate them from one form of backup storage to another.

This was last updated in April 2005

Continue Reading About policy

Dig Deeper on Enterprise mobility strategy and policy



Find more PRO+ content and other member only offers, here.



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:


File Extensions and File Formats

Powered by:





  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...