Enforcing the policy (rules and regulations) of the organization that pertain to information and computing.  Also called "policy-based management," it mostly deals with database access and network resource issues: which users have access to what data and how network traffic is prioritized.  See 
policy, 
COPS and 
information security.