Available methods for controlling access to network information and the policies used to determine that access depend upon the operating system(s) involved.