How to deploy user training modules

There are five online training modules for the Classification system. These modules are aimed at anyone who creates or handles government information. This includes all employees, contractors, and suppliers to Government.

The modules are designed as an introductory course to be given during induction and then as refresher training as required.

The modules are available for organisations to use in four ways:

Host modules on agency's learning management system (LMS)

We can provide your agency with the LMS enabled SCORM 1.2 and 2004 files. For more information and access to the files, contact the PSR team at psr@protectivesecurity.govt.nz


Host modules on agency intranet

For agencies who do not have a LMS to host the online training, they can host it from their intranet. Refer to your ICT team for deployment of these files on your intranet. We can provide your agency with website enabled files. For more information and access to the website files, contact the PSR team at psr@protectivesecurity.govt.nz


Tailor the modules to specific agency context

The modules were developed using Articulate Storyline 360. To tailor the modules, you will need access to Storyline 360 v3.63.27674.0 or higher. We can provide your agency with Storyline files. For more information and access to the Storyline files, contact the PSR team at psr@protectivesecurity.govt.nz


Run modules hosted on the internet

For agencies that cannot host the files on an LMS or intranet, they can run the modules direct from this website. Note: Your organisation will not be able to track learning completion or outcomes for each user who accesses these modules via this website.

Module 1: Introduction to classification​(external link)

Duration: 15 minutes

Audience: All government employees, contractors, and suppliers

In this module we’ll provide you with an introduction to the New Zealand Government Information Security Classification System (classification system). By the end of the module, you'll be able to:

  • Explain the benefits of classification​
  • Explain the consequences of poor classification​
  • Explain what classifications are
  • Explain what protectives markings are​

Module 2: How to classify information​(external link)

Duration: 25 minutes

Audience: All government employees, contractors, and suppliers

In this module we’ll look at how to classify government information using a harm-based approach.​
By the end of the module you’ll be able to:​

  • Understand the relationship between harm, impact and classification​
  • Describe the different types of impact​
  • Assess the level of harm and impact that compromise of information could have​
  • Classify information based on its impact.

Module 3: How to protect information(external link)

Duration: 15 minutes

Audience: All government employees, contractors, and suppliers

On completion of this module you will understand:​

  • How to protectively mark information​
  • Who can handle classified information
  • How to securely handle classified information​ (e.g., store, use, transport, protect, and destroy)

This module covers what you need to know to protect classified information at IN CONFIDENCE, SENSITIVE, and RESTRICTED classification levels.  ​

Module 4: How to classify national security information(external link)

Duration: 30 minutes

Audience: Government employees, contractors, and suppliers who hold a national security clearance and who create national security related information.

This module builds on knowledge you gained from all previous modules and looks specifically at how to classify information and assets relevant to New Zealand’s national interest and national security.

On completion of this module you will understand:​

  • What are your obligations as a national security clearance holder
  • What is national security information
  • How to classify national security information
  • How to apply national security markings to information or assets

Module 5: How to protect national security information(external link)

Duration: 15 minutes

Audience: Government employees, contractors, and suppliers who hold a national security clearance and who handle national security related information. 

This module builds on knowledge you gained from all previous modules and looks specifically at how to protect information and assets relevant to New Zealand’s national interest and national security.

On completion of this module you will understand:​

  • How access is controlled through the need-to-know principle, national security clearances, identity, and permissions
  • How to securely handle national security information (e.g. store, use, transport, protect, and destroy)