Methods, apparatuses and systems allowing for deployment of volume-based
network policies across a computer network. In one embodiment, the
present invention monitors network utilization of a plurality of users
and detects the occurrence of network utilization milestones or other
events for individual users, such as exceeding a data transfer allotment
or threshold. To enforce the allotment or threshold, the present
invention is operative to deny, degrade, or otherwise affect a
characteristic associated with network access provided to such users.