Feeds

National Portrait Gallery bitchslaps Wikipedia

Hands off our photos!

Choosing a cloud hosting partner with confidence

Wikipedia has been dinged for violating 3,000 copyrights belonging to the National Portrait Gallery.

User DCoetzee uploaded the images here to the Wikimedia Commons site. The Gallery says it contacted the Wikimedia Foundation back in April, without success, so is now suing the uploader personally. He received the notification on Friday and posted it here, and alerted El Reg to it following our Copyfraud article.

It's not Copyfraud, however, which is defined as the false assertion of copyright over public domain material. While the portraits are long out of copyright, the photographs aren't, and the gallery owns these rights.

In a page on its website that explains its copyright policy, the NPG says it has "a public duty not only to conserve and display works in its Collection but also to ensure they are correctly represented in reproductions and publications".

Copyright expert Struan Robertson of law firm Pinsett Masons told us it was a straightforward breach of copyright, but the US location of the infringer added a wrinkle. "The copyright owner has to enforce the order in the US. It's possible to do, but it can be quite expensive," he said.

As Charles Eicher, author of our recent Copyfraud piece, explained here (see How To Copyright Michelangelo), the US legal situation is unusual, in that since 1999, a photograph of an artwork cannot be copyrighted. Many US galleries and museums had already handed over exploitation rights, many of which can only be sourced to Corbis - Bill Gates' other monopoly.

The Gallery says the infringement is enflamed by Wikipedia's use of a permissive licence.

"By posting the images to the Wikipedia website you are expressly authorising users to themselves make further copies of those images on their own screens and hard drives in the manner permitted by the GNU Free Documentation License. Therefore, by authorising that use you are also primarily liable under 16(2) of the CDPA for every subsequent copyright infringement committed by every member of the public that re-uses those images anywhere in the world," wrote the Gallery's lawyers, Farrer & Co.

Ironically, the first DMCA takedown we ever received at El Reg (after the act had been operating for eight years) was from... a Wikipedian. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Scrapping the Human Rights Act: What about privacy and freedom of expression?
Justice minister's attack to destroy ability to challenge state
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Hey Brit taxpayers. You just spent £4m on Central London ‘innovation playground’
Catapult me a Mojito, I feel an Digital Innovation coming on
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
EU probes Google’s Android omerta again: Talk now, or else
Spill those Android secrets, or we’ll fine you
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.