The policies are specified and encapsulated in policy schema file 210 (the policy database), which includes standards, priorities, security requirements, speed, and other characteristics, and determines how a user can get connected to a particular network and the operations that the user can perform while on that network. [0029] For example, if a user was connected to a public network, the user mi