About the Policy
Monitoring (Keep Looking)
HeadStart Rules for Storage
Where Does It Go
IT Security
100

This type of document explains how work should be done consistently across the program.

What is a policy or procedure?

100

This process evaluates how well the program is meeting performance standards throughout the year.

What is ongoing monitoring?

100

This simple rule helps you decide where a file belongs: ask who does the work and who it is ultimately reported to.

What is “files live where the work is done; summaries live where the work is reported”?

100

Classroom lesson plans and teaching documentation belong in this domain area.

What is Education?

100

This unsafe practice occurs when employees give their login credentials to coworkers, making it impossible to track who actually accessed a system.

What is password sharing?

200

Technology usage rules for staff are typically found in this department’s policies.

What is IT?

200

This annual process reviews strengths, challenges, and areas for improvement.

What is Self-Assessment?

200

This tool should always be checked if you are unsure where to save a document in SharePoint.

What is the Data Dictionary?

200

Correct file storage supports compliance with these federal requirements. a

What are the Head Start Program Performance Standards (HSPPS)?

200

This type of cyberattack tricks users into revealing passwords or sensitive information by pretending to be a trusted source, often through email or text.

What is phishing?

300

Monotary controls, procurement rules, and budget policies belong in this domain

What is Fiscal?

300

FA1 and FA2 reviews are conducted by this federal entity.

What is the Office of Head Start (OHS)?

300

Saving the same document in multiple folders should generally be avoided to prevent this common problem.

What is version confusion (or duplicate records)?

$400

300

Recruitment flyers and eligibility documentation are stored in this domain area.

What is ERSEA?

300

This cybersecurity tactic manipulates people—rather than technology—by exploiting trust, fear, or urgency to gain access to sensitive information or systems.

What is social engineering?

400

Personnel policies, staff qualifications, and training requirements are managed by this department.

What is Human Resources?

400

Monitoring evidence should be organized so reviewers can easily see compliance with these.

What are the Head Start Program Performance Standards?

400

This department usually stores summaries, trends, and analysis rather than original working files.

What is PMQI (Program Management & Quality Improvement)?

400

This domain area oversees Policy Council, Board minutes, and shared decision-making.

What is Governance?

400

Using simple, short, or reused passwords makes accounts vulnerable to this common attack, where hackers try many possible combinations until one works.

What is a brute-force attack?

500

Policies are reviewed regularly as part of this ongoing oversight process.

What is PMQI or ongoing monitoring?

500

Keeping files in the correct folders helps demonstrate readiness for this type of review.

What is a federal monitoring review or audit?

500

Poor file organization can make a program appear unprepared during these federal reviews.

What is FA1 or FA2 monitoring?

500

This domain supports family partnerships, parent engagement, and community collaboration.

What is PFCE (Parent, Family, and Community Engagement)?

500

When sensitive work files are saved to personal cloud accounts or unapproved devices, this can happen—putting confidential data at risk of exposure, loss, or legal penalties.

What is a data breach?

M
e
n
u