In this paper, Seda Gürses, Princeton University; Carmela Troncoso, Gradiant; and Claudia Diaz, COSIC/iMinds, Dept. of Electrical Engineering, KU Leuven, summarize their initial conceptualization of how experts apply data minimization strategies. Specifically, based on a study of existing privacy preserving systems, they first elaborate on the design strategies hidden behind the term data minimization, offering a preliminary description of the activities that a privacy engineer performs to apply the right data minimization strategies.
Engineering Privacy by Design Reloaded

CIPM, CIPP/A, CIPP/C, CIPP/E, CIPP/G, CIPP/US, CIPT
Credits: 2
Related Stories
Web Conference: Privacy Engineering Live — Is Encrypted Data Personal Under the GDPR?
Original broadcast date: July 9, 2019
In this webinar, we'll be discussing a question that thoughtful privacy professionals agree to disagree on: Is encrypted data considered personal information under the GDPR? You'll hear from legal and technical experts about the case to be made on both sides of...
Web Conference: Privacy Engineering Live — PBD in Practice
Original broadcast date: March 27, 2019
Seeing the importance of this emerging trend in changing roles, processes and technologies in the privacy space, the IAPP is creating this new web conference series to highlight workable solutions and innovative people and ideas. Join us for these online conv...
Privacy Engineer Sample Job Description
Published: March 2018
As the job of privacy moves beyond law, policy, and compliance and into operations and the actualization of information technology, organizations have begun training, hiring, and generally seeking out "privacy engineers" to fill the gap left between policy and implementation...
Engineering Privacy by Design Reloaded
In this paper, Seda Gürses, Princeton University; Carmela Troncoso, Gradiant; and Claudia Diaz, COSIC/iMinds, Dept. of Electrical Engineering, KU Leuven, summarize their initial conceptualization of how experts apply data minimization strategies. Specifically, based on a study of existing privacy p...