Methods and systems for propagating
data security policies and rules up a chain of network components, for example, from an end-
user device having a firewall, to a
network component at the “edge” of the network, such as a so-called “edge” firewall
server, from where a policy statement can be transmitted to a
service provider, such as an ISP, are described. A device, such as a computer or
mobile phone, has, as part of its firewall
software, a policy propagation file, that communicates with pre-existing firewall
software. The firewall
software creates a policy statement upon detecting a triggering event, which is transmitted from the device to the next
data security component up the chain, “upstream,” in the network. In some cases this device may be a firewall
server or a firewall policy
server. The firewall server may combine policy statements from numerous end-user type devices and transmit the policy statement to an external
network component, such as an ISP firewall server or similar device. The ISP or other
service provider may then use the policy statement to implement date security rules for the devices in the network. In this manner, the firewall operated by the ISP implements rules and policies of a network owner or the owner of a stand-alone device, thereby preventing unwanted traffic from entering the network.