The Victorian Government is committed to providing a website that is accessible to the widest possible audience, regardless of technology or ability. This page may not meet our minimum WCAG 2.0 ...
Being a Child Protection Practitioner means making real change to the lives of others – keeping children safe and families strong. A career in child protection offers professional pathways and ...
This table sets out the departments, ministers, portfolios and program areas that are referenced in this report. See Appendix 6 for more detailed portfolio summaries.
The Department of Education continued to run training via webinars, face-to-face workshops and e-Learns. This training supported education workforces prescribed under phase 2 of CISS, FVISS and MARAM.
A key element of any reform is reinforcing the change that it brings. MARAM is a complex reform that is continuously improving. We regularly release new practice guidance. The Department of Education ...
We use the term victim survivor to refer to adults, children and young people who have experienced family violence. We acknowledge that some people and cultures also prefer to use the term people who ...
The Victorian Government, departments and sector peak bodies will provide clear and consistent leadership that encourages a shared understanding of risk, respects sector expertise and cultivates trust ...
Narrator: Introducing Arrival – a purpose-built system designed to replace the Kindergarten Information Management System (or KIMS) for mandatory kindergarten data reporting. All funded kindergarten ...
Any reform that seeks to change the way we work needs clear and consistent leadership. In 2023–24, departments and sector peaks continued to build on this leadership. This work deepened Victoria’s ...
The legislative structure around MARAM is shown in Figure 7. The Family Violence Multi-Agency Risk Assessment and Management Framework (MARAM) reporting process, legislated in the Act, has 2 stages: ...
Narrator: [gentle music] To get started with Arrival, you will need to action the steps in your email invitation including completing a registration process and setting up a security method the first ...