{"id":12,"date":"2009-11-12T10:46:48","date_gmt":"2009-11-12T08:46:48","guid":{"rendered":"http:\/\/d637164.u142.pipeten.co.uk\/sun01\/?page_id=12"},"modified":"2025-01-20T09:54:59","modified_gmt":"2025-01-20T07:54:59","slug":"policies-regulations","status":"publish","type":"page","link":"https:\/\/blogs.sun.ac.za\/it\/policies-regulations\/","title":{"rendered":"[:en]POLICIES &amp; REGULATIONS[:af]BELEIDE &amp; VOORSKRIFTE[:]"},"content":{"rendered":"<p>[:en]<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-17120 size-full\" src=\"https:\/\/blogs.sun.ac.za\/it\/files\/2025\/01\/WEB-announcement_update-coming-1.png\" alt=\"\" width=\"800\" height=\"269\" srcset=\"https:\/\/blogs.sun.ac.za\/it\/files\/2025\/01\/WEB-announcement_update-coming-1.png 800w, https:\/\/blogs.sun.ac.za\/it\/files\/2025\/01\/WEB-announcement_update-coming-1-300x101.png 300w, https:\/\/blogs.sun.ac.za\/it\/files\/2025\/01\/WEB-announcement_update-coming-1-500x168.png 500w, https:\/\/blogs.sun.ac.za\/it\/files\/2025\/01\/WEB-announcement_update-coming-1-768x258.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<table style=\"width: 609px\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 323px\"><strong>IT policy definitions<\/strong><\/td>\n<td style=\"width: 151px\"><a title=\"Information Security Regulations\" href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2009\/11\/IT-policy-definitions-v1-0.pdf\" target=\"_blank\" rel=\"noopener\">Download Eng<\/a>\u00a0(.pdf)<\/td>\n<td style=\"width: 127px\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 323px\"><strong>Information security regulations<\/strong><\/td>\n<td style=\"width: 151px\"><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2009\/11\/SU-Information-Security-Regulations-signed-2010.pdf\" target=\"_blank\" rel=\"noopener\">Download Eng<\/a>(.pdf)<\/td>\n<td style=\"width: 127px\"><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2009\/11\/US-Informasiesekuriteitregulasie-geteken-2010.pdf\">Download Afr<\/a>(.pdf)<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 323px\"><strong>Electronic communications policy (ECP) <\/strong><\/td>\n<td style=\"width: 151px\"><a title=\"Electronic Communications Policy\" href=\"http:\/\/stbweb01.stb.sun.ac.za\/university\/Policies\/ecp\/ecp_december_eng.pdf\" target=\"_blank\" rel=\"noopener\">Download Eng<\/a>\u00a0(.pdf)<\/td>\n<td style=\"width: 127px\"><a title=\"Elektroniese Kommunikasiebeleid\" href=\"http:\/\/www.sun.ac.za\/university\/policies\/ecp\/Ekb_desember_afr.pdf\" target=\"_blank\" rel=\"noopener\">Download Afr<\/a>\u00a0(.pdf)<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 323px\"><strong> SU Web Regulations<\/strong><\/td>\n<td style=\"width: 151px\"><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2011\/06\/Web-regulation-approved-Eng-20-Junie-2011.pdf\" target=\"_blank\" rel=\"noopener\">Download Eng<\/a>\u00a0(.pdf)<\/td>\n<td style=\"width: 127px\"><a href=\"\/\/blogs.sun.ac.za\/it\/files\/2011\/06\/Webregulasie-goedgekeur-Afr-20-Junie-2011.pdf\" target=\"_blank\" rel=\"noopener\">Download Afr<\/a>\u00a0(.pdf)<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 323px\"><strong>Identity and access management policy<\/strong><\/td>\n<td style=\"width: 151px\"><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2009\/11\/IAM.Policy.InterimApproved.13.12.2012.pdf\" target=\"_blank\" rel=\"noopener\">Download Eng<\/a>\u00a0(.pdf)<\/td>\n<td style=\"width: 127px\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 323px\"><strong>Electronic identity validation regulation<\/strong><\/td>\n<td style=\"width: 151px\"><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2009\/11\/Electronic.Identity.Validation.Regulation.Approved.13.12.2012.pdf\" target=\"_blank\" rel=\"noopener\">Download Eng<\/a>\u00a0(.pdf)<\/td>\n<td style=\"width: 127px\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 323px\"><strong>Purchasing and tender policy and procedure<\/strong><\/td>\n<td style=\"width: 151px\"><a href=\"http:\/\/admin.sun.ac.za\/finance\/new\/finbeleid\/eng\/AANKOOP%20EN%20TENDERBELEID%20ENG.pdf\" target=\"_blank\" rel=\"noopener\">Download Eng<\/a>\u00a0(.pdf)<\/td>\n<td style=\"width: 127px\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 323px\"><strong>Password regulations<\/strong><\/td>\n<td style=\"width: 151px\"><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2009\/11\/StellenboschUniversityPasswordRegulations.pdf\" target=\"_blank\" rel=\"noopener\">Download Eng<\/a>\u00a0(.pdf)<\/td>\n<td style=\"width: 127px\"><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2009\/11\/UniversiteitStellenboschVoorskrifteOorWagwoorde.pdf\" target=\"_blank\" rel=\"noopener\">Download Afr<\/a>\u00a0(.pdf)<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 323px\"><strong>Software standards for external developers<\/strong><\/td>\n<td style=\"width: 151px\"><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2009\/11\/Stellenbosch-University-Standards-for-External-Develope1.pdf\" target=\"_blank\" rel=\"noopener\">Download Eng<\/a>\u00a0(.pdf)<\/td>\n<td style=\"width: 127px\">\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>[:af]<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-17120 size-full\" src=\"https:\/\/blogs.sun.ac.za\/it\/files\/2025\/01\/WEB-announcement_update-coming-1.png\" alt=\"\" width=\"800\" height=\"269\" srcset=\"https:\/\/blogs.sun.ac.za\/it\/files\/2025\/01\/WEB-announcement_update-coming-1.png 800w, https:\/\/blogs.sun.ac.za\/it\/files\/2025\/01\/WEB-announcement_update-coming-1-300x101.png 300w, https:\/\/blogs.sun.ac.za\/it\/files\/2025\/01\/WEB-announcement_update-coming-1-500x168.png 500w, https:\/\/blogs.sun.ac.za\/it\/files\/2025\/01\/WEB-announcement_update-coming-1-768x258.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<table style=\"width: 611px\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 347px\"><strong>IT beleid-definisies<\/strong><\/td>\n<td style=\"width: 136px\"><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2009\/11\/IT-policy-definitions-v1-0.pdf\" target=\"_blank\" rel=\"noopener\">Laai Eng af<\/a>\u00a0(.pdf)<\/td>\n<td style=\"width: 128px\"><strong>\u00a0<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 347px\"><strong>Informasiesekuriteitsvoorskrifte<\/strong><\/td>\n<td style=\"width: 136px\"><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2009\/11\/SU-Information-Security-Regulations-signed-2010.pdf\" target=\"_blank\" rel=\"noopener\">Laai Eng af<\/a>\u00a0(.pdf)<\/td>\n<td style=\"width: 128px\"><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2009\/11\/US-Informasiesekuriteitregulasie-geteken-2010.pdf\" target=\"_blank\" rel=\"noopener\">Laai Afr af<\/a>\u00a0(.pdf)<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 347px\"><strong>Elektroniese Kommunikasiebeleid (EKB)<\/strong><\/td>\n<td style=\"width: 136px\"><a title=\"Elektroniese Kommunikasiebeleid\" href=\"http:\/\/stbweb01.stb.sun.ac.za\/university\/Policies\/ecp\/ecp_december_eng.pdf\" target=\"_blank\" rel=\"noopener\">Laai Eng af<\/a>\u00a0(.pdf)<\/td>\n<td style=\"width: 128px\"><a title=\"Elektroniese Kommunikasiebeleid\" href=\"http:\/\/stbweb01.stb.sun.ac.za\/university\/policies\/ecp\/Ekb_desember_afr.pdf\" target=\"_blank\" rel=\"noopener\">Laai Afr af<\/a>\u00a0(.pdf)<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 347px\"><strong> US webregulasies<\/strong><\/td>\n<td style=\"width: 136px\"><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2011\/06\/Web-regulation-approved-Eng-20-Junie-2011.pdf\" target=\"_blank\" rel=\"noopener\">Laai Eng af<\/a>\u00a0(.pdf)<\/td>\n<td style=\"width: 128px\"><a href=\"\/\/blogs.sun.ac.za\/it\/files\/2011\/06\/Webregulasie-goedgekeur-Afr-20-Junie-2011.pdf\" target=\"_blank\" rel=\"noopener\">Laai Afr af<\/a>\u00a0(.pdf)<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 347px\"><strong>Identiteit- en toegangsbestuur beleid<\/strong><\/td>\n<td style=\"width: 136px\"><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2009\/11\/IAM.Policy.InterimApproved.13.12.2012.pdf\" target=\"_blank\" rel=\"noopener\">Laai Eng af<\/a>\u00a0(.pdf)<\/td>\n<td style=\"width: 128px\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 347px\"><strong>Elektroniese Identiteitsvalidasie beleid<\/strong><\/td>\n<td style=\"width: 136px\"><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2009\/11\/Electronic.Identity.Validation.Regulation.Approved.13.12.2012.pdf\" target=\"_blank\" rel=\"noopener\">Laai Eng af<\/a>\u00a0(.pdf)<\/td>\n<td style=\"width: 128px\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 347px\"><strong>Wagwoordvoorskrifte<\/strong><\/td>\n<td style=\"width: 136px\"><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2009\/11\/StellenboschUniversityPasswordRegulations.pdf\" target=\"_blank\" rel=\"noopener\">Laai Eng af<\/a>\u00a0(.pdf)<\/td>\n<td style=\"width: 128px\"><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2009\/11\/UniversiteitStellenboschVoorskrifteOorWagwoorde.pdf\" target=\"_blank\" rel=\"noopener\">Laai Afr af<\/a>\u00a0(.pdf)<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 347px\"><strong>Sagteware-standaarde vir eksterne programmeerders\u00a0<\/strong><\/td>\n<td style=\"width: 136px\"><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2009\/11\/Stellenbosch-University-Standards-for-External-Develope1.pdf\" target=\"_blank\" rel=\"noopener\">Laai Eng af<\/a>\u00a0(.pdf)<\/td>\n<td style=\"width: 128px\"><strong>\u00a0<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:en] IT policy definitions Download Eng\u00a0(.pdf) \u00a0 Information security regulations Download Eng(.pdf) Download Afr(.pdf) Electronic communications policy (ECP) Download Eng\u00a0(.pdf) Download Afr\u00a0(.pdf) SU Web Regulations Download Eng\u00a0(.pdf) Download Afr\u00a0(.pdf) Identity and access management policy Download Eng\u00a0(.pdf) \u00a0 Electronic identity validation regulation Download Eng\u00a0(.pdf) \u00a0 Purchasing and tender policy and procedure Download Eng\u00a0(.pdf) \u00a0 Password regulations [&hellip;]<\/p>\n","protected":false},"author":57,"featured_media":0,"parent":0,"menu_order":6,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-12","page","type-page","status-publish","hentry"],"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/pages\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/57"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":49,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":17132,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/pages\/12\/revisions\/17132"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}