411 search results for “illustrated files” in the Staff website
-
File formats
For people to reuse your data, the file formats you publish them in must be “open” as well.
-
Sharing and sending files
If you wish to share files with colleagues within or outside the university, you can save these files in the cloud. You can do this with Office 365 or OneDrive. If your files are too large to be send by e-mail, you can use SURFfilesender.
-
Sharing and sending files
If you wish to share files with colleagues within or outside the university, you can save these files in the cloud. You can do this with Office 365 or OneDrive. If your files are too large to be send by e-mail, you can use SURFfilesender.
-
Directory structure and file naming
Think of a clear and consistent directory structure.
-
Retention and archiving of exam files
An exam file contains all relevant information about an exam or assignment and must be kept according to legal guidelines. This page provides the procedures for archiving exam files and the responsibilities of the examiner.
-
Connect & Preserve: File formats
Lecture + Q&A
-
Vibrant illustrations and mind-boggling graphs - Psychology students share insights into their research
Why do some smokers quit much more easily than others? Can we think ourself to insomnia? And does playing music together help to calm conflicts? Psychology students investigated these questions and presented their findings during the Psychology Science Day 2023.
-
Office 365 and OneDrive
Via Office 365 and OneDrive you can work from all kinds of places and on different devices without having to use Remote Workplace.
-
Office 365 and OneDrive
Via Office 365 and OneDrive you can work from all kinds of places and on different devices without having to use Remote Workplace.
-
Version Management
Determine how you keep track of the final version and intermediate versions.
-
Microsoft Teams
Microsoft Teams lets you work remotely. You can chat, meet, call and collaborate with your colleagues. Check out tips on how to get started with Teams quickly and easily.
-
Project reports
Financial reports are an important aspect of project funder reports. Grant providers generally require an auditor’s report. This is the opinion of an external auditor on the financial statement for a project.
-
Working from home
To set up your digital workspace, use the following tools: Webmail, Office 365 and OneDrive.
-
Metadata
Keep in mind a fellow researcher: someone who knows your area of expertise, but not necessarily as well as you do. Are your files understandable as they are, or do they need cleaning enhancement? Keep the right balance: make sure the metadata is sufficient for reuse, but do not get carried away and…
-
University Teaching Qualification (BKO)
Good teaching is a skill in itself. In order to guarantee the quality of education in the Netherlands, the University Teaching Qualification (Basis Kwalificatie Onderwijs, BKO) is now compulsory for all lecturers, university lecturers (UD), senior university lecturers (UHD) and professors. What does…
-
Storage and sharing
Estimate the amount of data you have created and what will be added?
-
Manuals
Do you want to install software yourself at your workplace? Or would you link to sync your work email with your smartphone? On this page you will find all our ICT workplace manuals, sorted by theme.
-
Frequently asked questions about privacy and security
Veelgestelde vragen privacy en security
-
Brightspace
Brightspace is the online learning environment of Leiden University.
-
(Personal) mobile devices
If you have a mobile device such as a smart phone or tablet that you purchased privately but also use for work-related purposes, it is important that you save your documents securely and deal responsibly with confidential information.
-
ReaderOnline
Looking for an easy way to compile, order or view readers online? Then meet ReaderOnline. The instructions below will help you on your way.
-
One-off data processing
Are you handling personal data just once, for instance when taking the minutes of a meeting or organising an employee outing? You do not need to include this use in the data processing register if you stick to the following conditions.
-
Privacy and data breaches
Any loss of control over stored personal data constitutes a potential data leak. In most cases this concerns stolen (or lost) digital files, but a stolen (or mislaid) printed list containing personal data also represents a data leak. It is important that you report any data leak.
-
Data storage
Your options for data storage may vary depending on factors such as size and sensitivity of the data or collaboration with partners outside the university. We are all responsible for data protection. To keep (personal) data as secure as possible, the university has established an information security…
-
Remote workplace
The remote workplace allows you to open a virtual workplace from your own PC, Mac, smartphone or tablet. Ideally, the remote workplace should only be used for logging on to Self Service.
-
Research Data Management in Archaeology
Doing research in archaeology is more than just gathering data and publishing a paper. Nowadays, there is a growing trend in producing well-defined and responsible data management plans. They help to navigate the process and result in good data management practices which in return benefit the researchers…
- Complaints committees
-
Thinking through Drawing and Illustration: A Workshop with Ulrike Uhlig
Course
-
Concert and book launch "The Oud: An Illustrated History"
Arts and culture
-
Alumni database (CRM)
Leiden University’s alumni database is managed by the department for Alumni Relations and Fundraising and currently stores information on around 150,000 registered alumni.
-
Privacy and secure collaboration
Teachers work with sensitive information on a daily basis: student data, exam information and communication about education, for example. It’s essential to process this information securely and to protect yourself and your students against digital risks, such as phishing, unauthorised access and other…
-
Working securely online
All employees of Leiden University handle data or personal information. And it is very likely that, at some point or another, everyone will receive a suspicious email or have to deal with other attempts by hackers to gain access to this data. Some cybercriminals try to obtain data because they want…
-
Audit department
The Audit department appraises the effectiveness and reliability of the internal organisation of Leiden University. Contact the Audit department with any questions on auditing.
-
Testing and assessment
Planning, organizing, and conducting exams, from setup to review.
-
Audit department
The Audit department appraises the effectiveness and reliability of the internal organisation of Leiden University. Contact the Audit department with any questions on auditing.
-
The Most Popular Buddhist Illustrated Book of circa 1450
Lecture, China Seminar
-
Double Lecture: Illustrated Books and Manuscripts in Early Modern Japan
Lecture
-
Secure online workspace from home
Since we are working from home we are extra vulnerable for cyber attacks and data breaches. Please create a secure online workplace, by executing the following steps.
-
ICT in computer rooms
All faculties offer computer rooms for teaching and/or independent study purposes. The University Library also provides study stations with (or without) computer and a group instruction room.
- Video toolkit
-
Data management, privacy and data protection
As a PhD candidate, you work with data. To keep (personal) data as secure as possible, the university has established an information security policy.
-
National holidays and compulsory closures
The University has national holidays and compulsory closures. National holidays are not deducted from your vacation hours, whereas compulsory closures are.
-
Céline Zaepffel
Faculty of Humanities
c.v.zaepffel@hum.leidenuniv.nl | +31 71 527 2050
-
The right tool for your assessment
Whether you choose formative or summative assessment, here you will find which digital tools are best suited to the assessment method you want to use.
-
Tools and tips for working securely
Curious to find out how you can contribute to a safe working environment? Then keep reading to discover our tips for working securely. They will help you to work more safely in specific situations. This section contains tools and tips to promote safe working habits in specific situations.
-
The surprising tradition of fables in French education: 'It builds bridges between generations'
In the Netherlands, people probably grew up with De Fabeltjeskrant (a children’s show, ed.), but in France an introduction to fables plays a much more important role in a child's upbringing. PhD candidate Céline Zaepffel studied the role of fables in French education and teaching methods. It turns out…
-
Phishing
We all occasionally receive an email from an unknown sender, with content we weren’t expecting or that raises our suspicions in some other way. This is usually a fake email, also known as a phishing email. In fact, there are various types of phishing: it can also be done over the phone.
-
Step-by-step plan towards more impact
An important question being asked, both in the academic world and in society, concerns the impact of our research and education. By providing a well-supported answer, we not only create a strong position for our research, we also increase our chances of success in applying for research grants and retaining…
-
Leiden University is upgrading to Windows 11: what will this mean for you?
ICT
-
Audio-visual equipment in lecture halls
Nearly all lecture halls are equipped with a computer with a projector or television screen. These computers do not require you to log in, so guest speakers do not need to have an account. As a standard, these computers are equipped with PowerPoint, Word and various Internet browsers. Some of the larger…