World Vision takes seriously its responsibility to protect and ensure the integrity, confidentiality, and security of the individual and community data stored and maintained on wvcentral, World Vision’s intranet/extranet.
Accordingly, access to wvcentral is limited to personnel of World Vision International (WVI), its affiliates and branch offices and designated external partners. Authorised users are granted access to wvcentral for the sole purpose of uploading, accessing and managing information for World Vision business and professional purposes only. Authorised partners are granted access to wvcentral; for the sole purpose of accessing information in the pursuit of activities relating to World Vision’s ministry and operations.
Access by any non-World Vision individuals or entities must be authorised by the wvcentral Advisory Group or its delegate. World Vision staff should not permit access to wvcentral through his or her logon as wvcentral contains confidential, proprietary data about World Vision’s business affairs and the individuals and communities that World Vision serves. Any unauthorised access through employee or partner logon will be deemed a breach of security resulting in corrective action measures to and including termination.
wvcentral is a private network and users may be subject to electronic monitoring. If you are not authorised to connect to and access the information on this website, disconnect immediately. Actual or attempted use, access, examination, or configuration change by an unauthorised person will result in criminal and civil prosecution to the full extent of the law.
All information stored on or transmitted by World Vision computer and communications systems is the property of WVI and its affiliates. Users must not test, or attempt to compromise computer or communication system security measures unless specifically approved in advance and in writing by WVI Global Centre IT (#email@example.com). Incidents involving unapproved system cracking (hacking), password cracking (guessing), file decryption, bootleg software copying, or similar unauthorised attempts to compromise security measures may be unlawful, and will be considered serious violations of this policy. Likewise, bypassing systems security measures, as well as pranks and practical jokes involving the compromise of systems and security measures, are prohibited.