Russia: Storing software is infringement

Managing IP is part of Legal Benchmarking Limited, 1-2 Paris Gardens, London, SE1 8ND

Copyright © Legal Benchmarking Limited and its affiliated companies 2026

Accessibility | Terms of Use | Privacy Policy | Modern Slavery Statement

Russia: Storing software is infringement

7c63f202-46c5-4d99-8329-076d5211f7edindia-computer-related-inventions-min-1-final.jpg

There was a court case early in 2019 in connection with software unlawfully stored in a computer's memory by the respondent. The infringer was obliged to pay compensation of more than $40,000.

The judgment was appealed but was upheld by the appeal court. While examining the case, the court of appeal stated that storing software in a computer which is the subject matter of copyright is a way of unlawful use of the computer program in the absence of permission from the owner of the software.

This conclusion follows from Article 1, Paragraph 4 of the WIPO Copyright Treaty of which Russia is a member. The article makes reference to the Berne Convention according to which (Article 9) the reproduction right fully applies in the digital environment, in particular to the use of works in digital form. It is understood that the storage of a protected work in digital form in an electronic medium constitutes a reproduction within the meaning of Article 9 of the Berne Convention. A corresponding rule entailing liability is set forth in Article 4 of the Directive 2009/24/EC of the European Parliament and Council dated April 23 2009. It provides that actions like downloading on to a computer, displaying on the screen, use, transmission or storing computer programs constitute infringement if done without permission of the owner of the program. The court noted that storing software per se in a computer without approval of the right owner is an independent element of infringement.

This approach is confirmed in a Resolution of the Supreme Court of the Russian Federation No 308-ЭC-14-1400 dated June 8 2016.

As found by the courts of first and second instance, the plaintiff is the owner of software which is the basis of the claim in court.

The presence of the software on hard discs of the computer owned by the respondent was established by the courts of first and second instances during the basis examination and evaluation of the set of pieces of evidence present on file.

The respondent stored software owned by the plaintiff on hard discs of computers owned by the respondent which is infringement per se.

Contrary to the arguments of the respondent, no person aside from himself could have committed the infringement, i.e. downloading and storing the computer programs in the computer's memory.

Vladimir Biriulin

more from across site and SHARED ros bottom lb

More from across our site

News of Dolby suing Snap over AV1 and HEVC patents and SCOTUS offering guidance on the liability of internet service providers were also among the top talking points
Arrival of Caitlin Heard will bolster the soon-to-be-created Ashurst Perkins Coie’s IP presence in the capital
AI, cybersecurity and data practice group will provide clients with legal guidance around AI alongside a 'deep technical foundation’ in IP
Lawyers at Vondst and Biopatents say a ruling concerning the protected status of trade secrets could see the UPC flooded with requests to prevent access to confidential information
Sharad Vadehra of Kan & Krishme discusses why older IP firms still have an edge over up-and-coming boutiques and how the firm is using AI to provide quick and cost-effective service
Lawyers at Appleyard Lees share how they picked apart a plant breeder’s infringement claims concerning the ‘Tango’ mandarin
A further decision on long-arm status, and a new hire for Pentarc in Germany from Taylor Wessing were also among top developments
The US decision marks a rare grant of a request under the Uniform Fraudulent Transfer Act in a patent case
Stobbs has applied to strike out a contempt of court application filed against the firm and two of its lawyers
With trademark volumes surging, trademark teams need to think beyond traditional clearance searches, towards a continuous, intelligence-led workflow, says Meghan Medeiros of Corsearch
Gift this article