Last week, I published my wife Alice's picture
of The Gap's "death-camp chic" ultra-skinny mannequins. Various newspapers subsequently approached my wife for permission to use the pic, and while she gladly gave permission to the Washington Post
, she was much more ambivalent about the awful Daily Mail
, a hateful right-wing tabloid that keeps finding new bottoms to scrape.
After some deliberation, Alice told the Mail they could use the pic if they donated £250 to charity. The Mail cried poor and said they couldn't afford it and Alice bade them good day.
Then the Mail -- which makes a practice of threatening bloggers with big copyright lawsuits when their photos and copy are reproduced -- just went ahead and ran Alice's photos, even though they'd asked for, and been denied, permission. They didn't attribute the photos to her, nor did they link back to her. They didn't downrez them or use a thumbnail. In other words, they didn't do anything that militated for a fair use or fair dealing. They just took 'em, for their commercial operation. They even lifted Alice's quotes to the Washington Post and didn't attribute them, either.
To add insult to injury, they remove all the linkbacks, present in the WashPo article, to my original tweet, and to Cory's BoingBoing post.
The Daily Mail knowingly and commercially used my photos despite my denying them permission.
They don't even link to the WashPo article that they lifted the quotes and photographs from.
I've asked the Daily Mail to now pay up for the unauthorised use - and knowing infringement - of these pics. I'm currently requesting 2 x £1000 charitable donations, which I will request go to MIND and ORG.
Updates to come, I'm sure.
Charles Duan from Public Knowledge sends us “a video we put together for Fair Use Week about copyright and fair use, to the tune of ‘Let It Go’ from Frozen, and full of clips of other fair use videos.”
An excellent excerpt from Aaron Perzanowski and Jason Schultz’s The End of Ownership: Personal Property in the Digital Economy on Motherboard explains how Section 1201 of the 1998 Digital Millennium Copyright Act — which bans tampering with or bypassing DRM, even for legal reasons — has allowed corporations to design their products so that using […]
Securelist’s report on the security vulnerabilities in Android-based “connected cars” describes how custom Android apps could be used to find out where the car is, follow it around, unlock its doors, start its engine, and drive it away.
Having a luxurious bed isn’t just a fairy tale from a catalog; it is a real, affordable possibility with offerings like this Olive+Owen bedroom set. If you’re thinking of doing some “spring cleaning”, this bed set is an easy way to completely upgrade your room in one purchase.This 20-piece collection has all of the expected slumberland elements, […]
Python is immensely popular in the data science world for the same reason it is in most other areas of computing—it has highly readable syntax and is suitable for anything from short scripts to massive web services. One of its most exciting, newest applications, however, is in machine learning. You can dive into this booming […]
Learning new skills is a great way to improve your resume and stand out from other candidates. Especially in a workforce in which many job-seekers have a wide variety of qualifications. With lifetime access to Virtual Training Company, you won’t have to choose a specific focus. You can pick up new expertise whenever you deem it […]