1. Arrange students into groups. Each group needs at least ONE person who has a mobile device.
2. If their phone camera doesn't automatically detect and decode QR codes, ask students to
4. Cut them out and place them around your class / school.
1. Give each group a clipboard and a piece of paper so they can write down the decoded questions and their answers to them.
2. Explain to the students that the codes are hidden around the school. Each team will get ONE point for each question they correctly decode and copy down onto their sheet, and a further TWO points if they can then provide the correct answer and write this down underneath the question.
3. Away they go! The winner is the first team to return with the most correct answers in the time available. This could be within a lesson, or during a lunchbreak, or even over several days!
4. A detailed case study in how to set up a successful QR Scavenger Hunt using this tool can be found here.
Question | Answer |
1. In order to make sure that these resources are available to you for the time you need to get the information | Senior Management Buy-in | 2. To ensure that users who have to live by the policies have enough time to review them and implement any project, processes or internal communications necessary to make sure they are in compliance | Determine a compliance grace period | 3. give all team members an estimate of how much of their time they can expect to allocate to the project. | Determine Resource Involvement | 4. Can be used to get an idea of current company stance on a given issue or technology, or simply to show that a certain technology is secured differently in different areas of the company. | Review existing Security Policies | 5. This is particularly the case for ‘new’ technologies such as Instant messaging, smart phones, or topics that your company has not previously had an official security policy on. | Determine Research Materials | 6. know as much about the topic as you can, and determine what level of detail and information you require | Interview with SMEs | 7. it is a good idea to get something down on paper before your first review meeting with the rest of the project team. | Write Initial Draft | 8. Ensuring that all your policies have the same look and feel will help them to be more quickly accepted as corporate documents. | Style Considerations | 9. Make a final check of your document to ensure that you have followed the style guides outlined | Review Cycles | 10. Determine which policy statements are not currently in force in your organization. | Policy Gap Identification Process | 11. If policy is not read it will not be adhered to | Develop Communication Strategy | 12. This usually means putting them on a company intranet site, possibly the information security team’s own intranet site | Publish | 13. It should be possible to teach policy stakeholders about the policy and their role in maintaining it. This will help make the policy an integral part of their jobs. | Activate Communication Strategy | 14. Ensuring that policy does not become out of date due to changes in technology or implementation | Regularly Review and Update |
Question 1 (of 14)
Question 2 (of 14)
Question 3 (of 14)
Question 4 (of 14)
Question 5 (of 14)
Question 6 (of 14)
Question 7 (of 14)
Question 8 (of 14)
Question 9 (of 14)
Question 10 (of 14)
Question 11 (of 14)
Question 12 (of 14)
Question 13 (of 14)
Question 14 (of 14)