Feeds

TwitPic-nicking Mail nicked

Final bill no picnic

Designing a Defense for Mobile Applications

If you’re going to nick TwitPics, it pays to read the small print first.

That could be a salutary lesson for the Daily Mail, currently facing a bill of almost ten times the going rate after lifting a professional photographer’s pics from the web and then attempting to claim that as they were "in the public domain", they didn’t actually need to be paid for.

The pics in question were the work of acclaimed documentary film-maker Emily James. On the day of the general election, she took pictures of voting frenzy at the St Vincent Polling Station in Dalston. The pictures were placed on the Twitter feed for Just Do It, a group linked to James’ current work, and offered formally to national news networks. Some newspapers took them – and paid.

According to James, however, the Daily Mail just helped itself, publishing three of her pics, without byline, in its online version the next day.

James was not amused – and sent the Mail a bill for £1170. That is the NUJ recommended rate of £130 per pic, times three for the unauthorised use, times three again for the number of pics.

Elliott Wagland, Pictures Editor for the Mail wrote back: "Unfortunately we cannot pay the amount you have requested, these images were taken from TwitPic and therefore placed in the public domain, also after consultation with Twitter they have always asked us to byline images by the username of the account holder.

"We are more that happy to pay for the images but we’ll only be paying £40 per image."

This, according to James, is just plain wrong. She wrote back:

I’m afraid that you are wrong about the terms of publishing on Twitpic. If you read the terms of service you will see that copyright is clearly retained by the poster: http://twitpic.com/terms.do

Third parties who wish to reproduce posted images must contact the copyright holder and seek permission.

You should have contacted me if you wanted to use the photos, as every other news outlet did. Had you done so, you might have been in a position to get the photos for £40 each.

However you didn’t contact me, even though this would have been very easy to do, nor did you inform me that you had used them. Instead, I had to uncover that you had used them, that one of them was not credited even with the correct Twitter account, and that none were credited as I would have asked them to be.

As of today, the Mail has not yet responded to James. The Register also asked the Mail for comment, but so far we've heard nothing back, either. ®

Bootnote

Readers might also be interested to know that one Reg journalist is currently pursuing the Daily Mail for an act of shameless plagiarism in March. Ready the chequebook chaps...

Using blade systems to cut costs and sharpen efficiencies

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple ran off to IBM
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.