Methods and systems are provided for any individual with access to a network to create, operate and thereafter dismantle a personal private network (PPN) which is secure across all forms of media which facilitate digital data transfer, including but not limited to, both wireless and wireline based networks. In one embodiment, utilizing browser-based management objects and a PPN client server the present invention provides for any individual with access to the Internet or other types of networks to create, control and utilize his own PPN with any one or a plurality of authorized participants. This invention facilities this capability with the creation of secure pipelines between each authorized participant of the PPN, where, if necessary, to establish these secure pipelines, a tunnel under, around or through border servers and/or firewalls is created. Each PPN provides the authorized participants with complete freedom to communicate, to review information and to transfer data between participants with full and complete encryption security. The creation, operation and the dismantlement of a PPN is totally within the capabilities and control of the originating party, the source client, and requires no actions from any network or system administrators. Additionally, all of the PPN secure pipeline creation and infrastructure mapping for the enablement of the PPN, plus access controls and codes for authorizing participation and initiating participation and disconnection can be encased in a PPN secure access key.