• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Data Avoidance and Data Minimization

By Abhishek Ghosh February 3, 2024 10:42 am Updated on February 3, 2024

Data Avoidance and Data Minimization

Advertisement

Data avoidance and data minimization is a concept in the field of data protection. The basic idea is that only as much personal data is collected during data processing as is absolutely necessary for the respective application. The concept of data avoidance and data minimization is closely related to the traditional data protection principle that only those personal data may be processed that are necessary for the performance of the respective task (necessity). However, it is also an aspect of system data protection, i.e. the integration of data protection requirements into IT systems, today often referred to as privacy by design. Data protection should not only be standardised by legal regulations, but also implemented through the design of the IT.

Data protection is a term that emerged in the second half of the 20th century, which is sometimes defined and interpreted differently. Depending on how you look at it, data protection is understood as protection against abusive data processing, protection of the right to informational self-determination, protection of personal rights in data processing and also protection of privacy. Data protection is usually understood – as the right that every person is allowed to decide for themselves who should have access to which of “their” personal data and when. The essence of such data protection law is that the inequality of power between organizations and individuals can be subject to conditions. Data protection is intended to counteract the trend towards so-called transparent people, the escalation of state surveillance measures (surveillance state) and data monopolies of private companies in the multifaceted digital and networked information society.

Data Avoidance and Data Minimization

At the same time, data minimization also refers to a reluctance on the part of the consumer, as demanded by data protection advocates, to disclose personal data outside of the information necessary for a business relationship, especially on the Internet and in competitions.

Advertisement

---

A concrete implementation of the principle of data minimization and data avoidance is, for example, the right to informational self-determination.

Many data protection advocates and data protection officers categorically require an opt-in for personal data and for data that can be linked to personal data. However, many applications do not even allow an opt-out or do not even tell users what data is being processed or transmitted to computer networks. The privacy policies of the providers also often do not explain what data is processed and where it is transferred, to which bodies the data is passed on, whether and for how long it is stored or whether there is a right to be forgotten.

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Data Avoidance and Data Minimization

  • Nginx WordPress Installation Guide (All Steps)

    This is a Full Nginx WordPress Installation Guide With All the Steps, Including Some Optimization and Setup Which is Compatible With WordPress DOT ORG Example Settings For Nginx.

  • WordPress & PHP : Different AdSense Units on Mobile Devices

    Here is How To Serve Different AdSense Units on Mobile Devices on WordPress With PHP. WordPress Has Function Which Can Be Used In Free Way.

  • Changing Data With cURL for OpenStack Swift (HP Cloud CDN)

    Changing Data With cURL For Object is Quite Easy in OpenStack Swift. Here Are Examples With HP Cloud CDN To Make it Clear. Official Examples Are Bad.

  • Developing Privacy Compliant Big Data Apps on IBM Cloud

    A key theme of this work is to answer the key question “Can we use IBM’s solutions to develop various privacy law complainant applications?”.

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

vpsdime

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cloud-Powered Play: How Streaming Tech is Reshaping Online GamesSeptember 3, 2025
  • How to Use Transcribed Texts for MarketingAugust 14, 2025
  • nRF7002 DK vs ESP32 – A Technical Comparison for Wireless IoT DesignJune 18, 2025
  • Principles of Non-Invasive Blood Glucose Measurement By Near Infrared (NIR)June 11, 2025
  • Continuous Non-Invasive Blood Glucose Measurements: Present Situation (May 2025)May 23, 2025
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2026 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy