How to Remove “Other” Data from iOS Device Storage

Ever wondered what that “Other” on your iPhone storage is? To be honest, you are not the only one to have found it a bit strange. It’s the address to a multiplicity of stuff like cookies, logs, browser history, caches of videos and photos, database files and many more hoarded by your apps.

However, if you don’t take any step towards deleting the “Other” from your iOS device, the chances are that the unnecessary files may pile up to eat into plenty of storage on your iPhone. By just being a little bit conscious, you will be able to obstruct the junk files from going overboard.

Honestly, clearing “Other” data from an iPhone had never been as clear-cut before as it has been now. Additionally, you have got multiple ways to remove these “Other” data from your iPhone or iPad storage. Follow the steps mentioned below to do so:

  1. First of all, launch the Settings app on your iPhone or iPad.
  2. Then go to the General.
  3. Click on the iPhone/iPad Storage option.
  4. Here, you will need to check out how much storage has been used and how much space is left.

Note: You should look for the things that are consuming most space on your device. The most noticeable culprits are going to be Other, photos, apps, media and even mail too.

  1. As soon as the culprits that have virtually hijacked the storage have been found, you must go for the mission cleanup.
  2. Simply, click on the app which data you wish to erase.
  3. Here, you are going to have two options:
  • Offload App – Offloading apps on your iPhone or iPad, you are going to be able to clear the storage used by the apps but save its data. Hence, when you reinstall the app, you are more likely to be able to reinstate the linked data.
  • Delete App – You are recommended to choose it if you want to delete not just the app but also its complete data.
  1. You will have to pick the option based on your requirement.

However, as this article is all about removing the data of particular apps, deleting may serve the purpose.

Thank you for reading this article; I hope the information given above is going to be useful to you.

Mathew Anderson is a self-professed security expert; he has been making the people aware of the security threats. His passion is to write about Cyber security, cryptography, malware, social engineering, internet and new media. He writes for Norton security products at

Leave a Reply

Your email address will not be published. Required fields are marked *

Disclaimer: : We are is a independent technical support provider on on-site and On-Demand Technical or Information Services For Norton related products. Use Of the Name, trademarks, logo & Product Images of Norton is only for reference purposes and is no way related to suggesting that info or services have any business association with Norton Products. Norton or its product-related trademarks, names, Images or logo are the property of its owner i.e, Norton or of their respective owner, we disclaim any ownership in such conditions or if you find any issue feel free to email us.