How to borrow a laptop
If you want to loan a laptop, this page tells you how to do it, where to get them from and how much it costs.
From the IT Service Desk
You can borrow a laptop from the IT Service D…
How to use the ad hoc recorder
To record a non-timetabled event in a lecture capture enabled room, you can use the ad hoc recorder on the podium PC in the room.
Book the space in advance using the online room booking system. Pl…
How to publish your desktop or adhoc recording to Minerva
This page explains how to make your desktop or adhoc recording available for viewing to staff / students registered on the module. Recordings can be published to the Media catalogue or links embedded …
Standards and best practice
Find out what Argos is, how it works and the standards and good practice that you'll need to be aware of.
Argos is used as a web-based reporting tool which can create reports against any of the pr…
Using an App to access OneDrive
You do not need to install an App to access OneDrive - University of Leeds but if you do you can access your files more easily from that device.
You can always use a web browser to get to&nbs…
How to view and search for content on VideoLeeds
VideoLeeds allows you to easily watch videos, browse channels and search keywords.
The homepage shows the spotlight videos, followed by the most recent videos and then lists the channels.  …
Setting up email on Android
The following guide shows you how to setup email on Android devices.
This tutorial was created using Android 6.0 (Marshmallow), but the process should be similar for most versions of Android.
TE5 - Access and Identity Management
Policies, processes and technology used to manage user's digital identity including provision and removal of IT usernames and access management controlling user access to services.
SAP Account Management System (SAM)
SAP is available to staff that require access to Finance, Human Resources, Logistics (Purchasing, Sales and Plant Maintenance) or Research information as part of their role within the University.
Information Protection Policy
Here is an overview of the University's draft Information Protection Policy.
This Policy classifies sensitive information according to its damage potential, and defines the special co…