{"id":5462,"date":"2022-02-01T15:27:02","date_gmt":"2022-02-01T20:27:02","guid":{"rendered":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/in-print\/volume-110\/volume-110-issue-2-december-2021\/the-public-trust-in-data\/"},"modified":"2025-05-12T11:13:16","modified_gmt":"2025-05-12T15:13:16","slug":"the-public-trust-in-data","status":"publish","type":"page","link":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/in-print\/volume-110\/volume-110-issue-2-december-2021\/the-public-trust-in-data\/","title":{"rendered":"The Public Trust in Data"},"content":{"rendered":"<p><i>Personal data is no longer just personal. Social networks and pervasive environmental surveillance via cellphones and the Internet of Things extract minute by minute details of our behavior and cognition. This information accumulates into a valuable asset. It then circulates among data brokers, targeted advertisers, political campaigns, and even foreign states as fuel for predictive interventions that shape individuals\u2019 lives, often for the worse. Rich gains flow to firms that are best positioned to leverage these new information aggregates. The privacy losses, economic exploitation, structural inequalities, and democratic backsliding produced by personal data economies, however, fall upon society at large.<span class=\"Apple-converted-space\">\u00a0<\/span><\/i><\/p>\n<p><i>This Article proposes a novel regulatory intervention to mitigate the harms that result from transforming personal data into an asset. States and municipalities should create \u201cpublic trusts\u201d as governance vehicles for their residents\u2019 locational and personal data. An asset in public trust is owed and managed by the state\u2014although it can be in the physical custody of private actors. The state can permit its use, and even allow limited alienation, provided that doing so benefits a broad public rather than a handful of firms. Unique among the legal interventions proposed for new data economies, a public trust for data allows a democratic polity to durably commit to public-regarding management of its informational commons, coupled to judicially enforceable limits on private exploitation and public allocation decisions. At the same time, because data remains in the physical custody of private actors, state actors cannot use it for undemocratic or repressive ends. The public trust itself is a common law doctrine of ancient roots. It was revived in the Progressive Era as an instrument to protect public assets against private exploitation. Both federal and state courts, including the U.S. Supreme Court, have since endorsed a variety of doctrinal formulations. The result today is a rich repertoire of rules and remedies for the management of commonly held property. Personal data, usefully, has many similarities to assets long managed by public trust. And familiar justifications for creation of a public trust logically extend to personal data. Indeed, municipalities in the United States, Europe, and Canada have started to experiment with limited forms of a public trust in data. Generalizing from those\u00a0<\/i><i>experiences, this Article offers a \u201cproof of concept\u201d for how personal data economies can be leashed through the public trust form\u2014a mechanism for minimizing private harms while preventing abusive state action.<span class=\"Apple-converted-space\">\u00a0<\/span><\/i><\/p>\n<p>Continue reading <a href=\"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-content\/uploads\/sites\/26\/2022\/02\/Huq_The-Public-Trust-in-Data.pdf\"><em><strong>The Public Trust in Data<\/strong><\/em><\/a>.<\/p>\n<a href=\"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-content\/uploads\/sites\/26\/2022\/02\/Huq_The-Public-Trust-in-Data.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\" data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Huq_The Public Trust in Data<\/a>\n","protected":false},"excerpt":{"rendered":"<p>Personal data is no longer just personal. Social networks and pervasive environmental surveillance via cellphones and the Internet of Things extract minute by minute details of our behavior and cognition. [&hellip;]<\/p>\n","protected":false},"author":5086,"featured_media":0,"parent":5446,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"abstract.php","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-5462","page","type-page","status-publish","hentry"],"acf":[],"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/5462","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/users\/5086"}],"replies":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/comments?post=5462"}],"version-history":[{"count":121,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/5462\/revisions"}],"predecessor-version":[{"id":23266,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/5462\/revisions\/23266"}],"up":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/5446"}],"wp:attachment":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/media?parent=5462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}