ON PETITION FOR REHEARING
Pursuant to Federal Rule of Appellate Procedure 40(a), the panel hereby grants the appellees’ petition for rehearing, withdraws the previous panel opinion dated December 22, 1995, and substitutes the following opinion:
I. BACKGROUND
Appellees-cross-appellants Brian E. Bate-man and Charles H. Fricker filed an action in federal court against appellants-eross-ap-pellees Mnemonics, Inc., Harry Thompson, David Katz, Parking Automation Corp., BCS, Inc. (“BCS”), and Robert Brunet (collectively “PAC”). The second amended complaint alleged copyright infringement in Bateman’s single board computer operating system (“SBCOS”) software (Count I), copyright infringement in Bateman and Flicker's hardware logic diagrams for their computer circuit board (Count II), copyright infringement in the programmable array logic (“PAL”) software (Count III), false designation of origin in violation of 15 U.S.C. § 1125(a) (Count IV), common law unfair competition (Count V), and theft of trade secrets (Count VI).
Before addressing the many issues involved in this appeal, it is important to set forth the factual and technical background to this complex ease. Both Bateman and Fricker are engineers. Bateman created and developed SBCOS software, and the Register of Copyrights registered his claim of copyright in this software.
Initially, Bateman had a business relationship with BCS and its principal, Robert Brunet,
In 1987, Generex was acquired by PAC, a wholly owned subsidiary of Mnemonics, Inc. Pursuant to the BCS/Generex agreement, BCS began delivering SBCs to PAC. In the spring of 1988, Bateman terminated BCS’s right to use his SBCOS software on the SBCs that it was selling.
Days after the May agreement between Guidage and Bateman was signed, it was repudiated by Thompson, president of Mnemonics, PAC’s parent company. A new contract was negotiated and signed in June of 1988, under which Bateman and Fricker agreed to design the SBC2, which would meet certain of PAC’s technical requirements. Bateman and Fricker delivered the SBC2 to PAC in June of 1988. In addition, in November of 1988, pursuant to the June contract, Fricker delivered to PAC “engineering” for the board; these materials were needed in order for PAC to be able to build SBC2s.
Shortly after delivering the engineering to PAC, Bateman and Fricker realized that they had given PAC their only copy of these materials. Because these materials were needed to manufacture more boards, Bate-man and Fricker needed to retrieve them. Fricker received back the engineering materials from PAC, signing a receipt to indicate that PAC had loaned the materials to him; Fricker later returned the materials to PAC. It is these engineering materials that are at issue in Bateman and Fricker’s theft of trade secret count against PAC.
By January of 1989, the business relationship between Bateman/Fricker and PAC had deteriorated severely. PAC experienced problems with the SBC2s that were in the field, and the parties disputed the cause of the problems. On January 18, 1989, Bate-man and Fricker met with Jack Blalock, the
After Bateman and Flicker denied PAC’s request for the source code for the SBCOS and the rights to the SBC2 circuit design, PAC undertook to compose its own operating system that would interoperate with the application program that it (or its predecessor, Generex) had written to be compatible with Bateman’s SBCOS. Tom Colvin, Mnemonic’s senior engineer, was assigned this task. He disassembled and de-compiled a portion of Bateman’s SBCOS from a computer chip resident on one of the previously delivered SBC2s.
Shortly after the January contract termination by PAC, Bateman and Frieker filed suit in Florida state court, alleging breach of the June 2, 1988 contract.
II. ISSUES ON APPEAL
On appeal, PAC raises eight issues, and Bateman and Frieker present one issue on cross-appeal. The issues on direct appeal are whether: (1) a jury instruction that limited the “successive filtration” test for copyright infringement to nonliteral similarity was confusing or misleading; (2) the district court should have instructed the jury to filter out the operating system/application program interface; (3) it was plain error to instruct the jury that a “qualitatively” small amount of copying could authorize a finding of copyright infringement; (4) the district court erred in directing a verdict striking PAC’s omission of copyright notice defense because it found that one copy was a “relatively small number” under the Copyright Act, as a matter of law; (5) the district court erred in denying PAC’s motions for directed verdict and JNOV as to claims of copyright infringement in hardware logic diagrams, where the only evidence of damages was the sale of purely utilitarian circuit boards built from them; (6) the district court erred in denying PAC’s motions for directed verdict and JNOV as to damages based on sales of circuit boards where Bateman and Frieker failed to introduce evidence that “translations” of their schematics purportedly used in manufacturing circuit boards contained any protectable expression; (7) the district court should have vacated the jury’s award of $120,000 in damages for infringement of the hardware logic diagram’s copyright, where there was no evidence that any boards were manufactured after PAC had notice of the copyright claim; and (8) the district court erred in denying PAC’s motions for directed verdict and JNOV on the state law trade secret claim. The sole issue on cross-appeal is whether the district court abused its discretion in refusing to award exemplary damages on Bateman and Fricker’s trade secret claim of Count VI under Fla.Stat. § 688.004(2), given the evidence that supported the jury verdict in Bateman and Fricker’s favor on this count.
A. The Feist Two-Pronged Test for Copyright Infringement
At the outset, we review some applicable basic principles. To establish a claim of copyright infringement, Bateman and Fricker must prove “(1) ownership of a valid copyright, and (2) copying of constituent elements of the work that are original.” Feist Publications, Inc. v. Rural Tel. Serv. Co.,
It is Feist’s second prong that is a central focus of this case. To prove actionable copying, the plaintiff must first establish, as a factual matter, that the alleged infringer “actually used the copyrighted material to create his own work.” Engineering Dynamics, Inc. v. Structural Software, Inc.,
For the reasons discussed, we need not consider Feist’s first prong. The factual copying aspect of Feist’s second prong is not at issue either, because PAC admits that it copied portions of the SBCOS code and the SBC2 logic circuit diagrams during the design and development of the LCCOS and the LCC. Thus, the two matters directly at issue on appeal as to Count I are whether; (1) the copying done by PAC is legally actionable; that is, whether there is “substantial similarity” between the allegedly offending program and the protectable, original elements of the copyrighted works; and (2) the use of any such original elements qualifies as a fair use under 17 U.S.C. § 107.
B. The Jury Instructions
PAC raises three separate issues on appeal concerning the district court’s instructions to the jury. “We apply a deferential standard of review to a district court’s jury instructions. So long as the instructions accurately reflect the law, the trial judge is given wide discretion as to the style and wording employed in the instructions.” United States v. Starke,
1. Limiting the “Abstractimir-Filtration-Comparison” Test to Nonliteral Similarity
PAC asserts that the district court committed reversible error by instructing the jury to filter out only nonliteral similarities in applying the “abstraction-filtration-comparison” test for substantial similarity that the Second Circuit adopted in Computer Assocs. Int’l v. Altai, Inc.,
The Second Circuit in Altai summarized its abstraction-filtration-comparison test as follows:
In ascertaining substantial similarity under this approach, a court would first break down the allegedly infringed program into its constituent structural parts. Then, by examining each of these parts for such things as incorporated ideas, expression that is necessarily incidental to those ideas, and elements that are taken from the public domain, a court would then be able to sift out all non-protectable material. Left with a kernel, or possible kernels, of creative expression after following this process of elimination, the court’s last step would be to compare this material with the structure of an allegedly infringing program. The result of this comparison will determine whether the protectable elements of the programs at issue are substantially similar so as to warrant a finding of infringement.
Altai,
The district court’s instruction limited the filtration analysis to nonliteral similarity, stating that:
Under the Nimmer test, substantial similarity of the non-literal elements is determined by comparing with the defendants’ program, that protectable expression of the copyrighted work which remains after filtering out any portion of the copyrighted work, which represents only ideas, elements[ ] dictated solely by logic and efficiency, elements dictated by hardware or software standards, computer industry programming and practices or elements which are taken from the public domain.
Even a qualitatively [sic] small amount of copied material which remains unfiltered may be sufficiently important to the operation of Mr. Bateman’s operating system program to justify a finding of substantial similarity. For instance, a small portion of a structure or code of a program may nonetheless give it its distinctive features. In such a ease, a finding of substantial similarity would be appropriate.
Supp. R1-318-92-93. This instruction is a verbatim version of Bateman’s proposed instruction on determining substantial similarity under the Nimmer test. At the time that this instruction was offered by Bateman,
We recognize that the Altai test was formulated by the Second Circuit to help “determine the scope of copyright protection that extends to a computer program’s non-literal structure.” Altai,
We see this disagreement between the Lotus and Gates courts as more of a matter of semantics than substance. It is undeniable that the Altai court formulated its test to address nonliteral copying of computer code. Even if the Altai test is limited to nonliteral copying, however, a parallel type of analysis must be undertaken in examining alleged instances of literal copying of computer code or screen displays.
We express no opinion as to whether it is better to consider these challenges to literal copying as part of the filtration step or rather to consider them in a separate, yet parallel, analysis. The important point here is that such an analysis is necessary — it makes little difference which methodology is employed.
2. The Failure to Instruct the Jury on the Legal Consequences of Copying Elements Dictated by Compatibility Requirements
PAC also claims that the district court erred in not instructing the jury on the legal consequences of a finding that certain instances of literal copying of code by PAC were dictated by compatibility and interoperability requirements. The district court gave no instruction on whether the application program/SBCOS interface at issue in this ease was a constraint that rendered the interface either unproteetable or subject to a fair use analysis.
PAC proposed an instruction that stated, in part, that “you are to filter out as unproteetable expression portions of the program that the evidence shows were dictated by the interface with the applications code which was an external constraint.” R7-216 (Instruction No. 26). Bateman objected to this instruction, noting that he had introduced evidence that PAC’s application program could have been rewritten to avoid using the interface commands;
The instruction given by the court is not technically incorrect. It fails, however, to define the important term “compatibility”
In analyzing elements dictated by external factors, the Second Circuit in Altai cited Professor Nimmer for the proposition that “ ‘in many instances it is virtually impossible to write a program to perform particular functions in a specific computing environment without employing standard techniques.’ ” Altai,
The Sega and Altai courts are certainly not alone in noting that external factors such as compatibility may work to deny copyright protection to certain portions of a computer program. See also Engineering Dynamics,
3. “Qualitatively” or “Quantitatively”
Further, we address PAC’s claim that the district court erred in instructing the jury that “[e]ven a qualitatively small amount of copied material which remains unfiltered may be sufficiently important to the operation of Mr. Bateman’s operating system program to justify a finding of substantial similarity. For instance, a small portion of a structure or code of a program may nonetheless give it its distinctive features. In such a case, a finding of substantial similarity would be appropriate.” Supp. R1-318-93 (emphasis added). There is no dispute among the parties that this instruction should have contained the word “quantitatively,” not “qualitatively.” It is not clear, however, that the judge misspoke, because the written charges that were with the jury during their deliberations correctly read “quantitatively small amount”; the court reporter may have simply heard or transcribed the word incorrectly. Regardless of what actually happened, PAC admits that it did not object to the instruction when it was given.
“[I]f no objection to the instructions was raised at trial, we only review for plain error.” Starke,
C. Infringement of the Hardware Logie Diagrams
PAC raises four separate issues on appeal concerning the jury award for Bateman and Flicker for PAC’s alleged infringement of the copyrighted hardware logic diagrams (Count II). Given our conclusion regarding the improper jury instructions as to Count I and our resultant order of a new trial, we need not address in detail the issues on appeal as to Count II.
Given this standard, we do not believe that a partial new trial only as to Count I would be proper here. We are convinced that the jury was not properly instructed on Count II, and that the general instructions relative to distinguishing copyrightable subject matter from unprotectable work mani
D. The Trade Secret Misappropriation Claim
Although Counts I and II are clearly intertwined, Count VI, a pendent state law trade secret claim, is separate and distinct from Counts I and II, and thus we must fully discuss the issues relevant to it on appeal. PAC contends that the district court erred in denying its motions for directed verdict and JNOV on the trade secret claim. Bateman and Flicker, in their sole issue on cross-appeal, contend that the district court abused its discretion in refusing to award exemplary damages on their trade secret claim pursuant to Fla.Stat. § 688.004(2), given the evidence that supported the jury verdict in Bateman and Flicker's favor on this count.
Our review of the district court’s disposition of motions for a directed verdict and JNOV is de novo. Colvin v. Housing Auth. of Sarasota,
In the case at bar, Bateman and Fricker’s state law trade secret claim is predicated upon the existence of an implied confidential relationship. Given the backdrop of federal preemption pursuant to section 301 of the Copyright Act, we must carefully review this state law claim to ascertain whether it requires an “extra element” for recovery, for “[a] state law claim is not preempted if the ‘extra element’ changes ‘the nature of the action so that it is qualitatively different from a copyright infringement claim.’” Altai,
We have no doubt that the Florida trade secret statute at issue satisfies the “extra element” test generally employed by courts in performing copyright preemption analysis. However, we find that the evidence presented by Bateman and Fricker, even viewed in the light most favorable to them, fails to establish the existence of a confidential relationship sufficient to trigger liability.
IV. CONCLUSION
The district court committed reversible error as to Count I both in improperly instruet-ing the jury to filter out only instances of nonliteral copying in the “substantial similarity” analysis, and in not instructing the jury on the legal consequences of copying dictated by compatibility requirements. Since Count I and Count II are not “so distinct and separable” as to permit a partial new trial on Count I alone, the judgment of the district court is VACATED on Counts I and II, and the case is REMANDED for a new trial on these counts. The judgment of the district court on the trade secret misappropriation count is REVERSED, and the district court is instructed to enter judgment as a matter of law for PAC on the trade secret count.
VACATED IN PART; REVERSED IN PART, and REMANDED.
Notes
. Prior to trial, Bateman and Fricker consented to a dismissal of Count III after the United States Register of Copyrights refused registration of the PAL listings on the ground that PAL listings are not copyrightable subject matter. Bateman and Fricker continued to include the PAL listings as part of the trade secret claim of Count VI.
. As for Counts IV and V of the second amended complaint, PAC conceded at trial that Bateman and Fricker were entitled to an injunction on these counts, and the district court’s permanent injunction, dated September 20, 1993, precludes PAC from altering the copyright notice on or computer software listings in Bateman’s original SBCOS. No appeal was taken on these counts.
. The copyright registration number for Bate-man’s SBCOS software is TX 2-807-731, with an effective date of registration of March 29, 1990. The 1990 registration is derivative of Bateman’s 1988 registration for an earlier version of his SBCOS software. The copyright registration issued in 1988 is numbered TXU 329-938. Bate-man’s SBCOS software is not limited in use to parking systems (the use involved in this case), but also has several other functional uses, including cash drawer management and energy management. It was designed by Bateman as a general purpose operating system.
. The copyright registration number in the hardware logic diagrams is VA 410-209, with an effective date of March 29, 1990.
. Although we refer to Brunet and BCS separately at times, it is important to note that BCS was a very small company that was wholly controlled by Brunet. Therefore, the dealings of Generex, Bateman, and Fricker, although ostensibly with BCS, were effectively with Brunet, as the trial testimony reflects that Brunet and BCS were essentially one.
. PAC acquired Generex’s assets in 1987 and currently engages in the business of computerizing parking decks. Mnemonics, Inc. is the parent corporation of PAC and appellants-cross-ap-
. The SBCOS comes in chip form and was one of the components that was integrated into the circuit board, or SBC, to render it operational. The parties also refer to this chip as a programmable read only memory ("PROM"). It can be contrasted with a read only memory ("ROM”). A ROM normally is preprogrammed at a factory and cannot be programmed by an individual in the field. A PROM, however, can be plugged into a programming device at any remote location and one can actually program in the software there. Bateman developed several SBCOS PROMs over the years, although the only PROMs at issue on appeal are those that were a component on the boards sold to PAC.
. Although the exact nature of the relationship between BCS and Bateman is not clear, BCS secured Bateman’s permission to sell the boards containing his SBCOS software to Generex. In return for granting BCS this permission, Brunet apparently agreed to pay royalties to Bateman based on the number of circuit boards sold to Generex.
. There is no dispute that Generex and its successor PAC own the copyright to this parking system application program.
. In turn, BCS had received these specifications from Bateman.
. The following explanation of some of the key terms and concepts involved in computer copyright technology may be helpful:
Computer hardware consists of the machine itself, while computer software is the set of instructions, written by computer programmers, that tell the hardware to perform certain tasks. Computer software is generally divided into two categories: operating systems and application programs. Operating systems control the internal operations of the computer and transfer the data between the components of the overall system. In essence, they function as intermediaries between computer hardware and application programs. Application programs tell the operating system to instruct the computer to perform a specific function, such as word processing.
The computer hardware, operating system, application software, and user communicate with each other across "interfaces.” The system communicates with the user through the "user interface,” which consists of images on the monitor as well as the keyboard, mouse, etc. The interfaces between the application program, operating system, and hardware are internal, and thus are invisible to the user....
For the entire system to function, the components must be "compatible” — i.e., communication must be unimpeded throughout the system.
Timothy S. Teter, Note, Merger and the Machines: An Analysis of the Pro-Compatibility Trend in Computer Software Copyright Cases, 45 Stan.L.Rev. 1061, 1063 (1993) (hereinafter "Teter") (footnotes omitted).
Although operating systems and application programs generally perform separate functions, the distinction between them is not always clear and continues to erode as programs become more advanced. "For example, since Lotus 1-2-3 executes ‘macros' (user-written command sequences), it can be considered to be a hybrid operating system/application program.” Id. at n. 15.
. Bateman claims that he gave Brunet/BCS a license to sell the SBCOS software, but that he terminated the license in the spring of 1988. At the time that Bateman advised Brunet that he was revoking his license, Brunet disputed that their agreement was a license at all, although he did agree that he owed Bateman money and promised to pay as soon as he was financially able. It is important to note that there was no written agreement .establishing a license. Rather, Bateman claims that the license was both oral and implied. R8-245-203. Under applicable law, "[a] transfer of copyright ownership, other than by operation of law [i.e., a work for hire], is not valid unless an instrument of conveyance, or note or memorandum of the transfer, is in writing and signed by the owner of the rights conveyed or such owner’s duly authorized agent.” 17 U.S.C. § 204(a) (1977). The Copyright Act defines "transfer of copyright ownership” as "an
. The SBC that BCS sold to Generex is referred to by the parties as the “SBC1.” The SBC that Bateman and Fricker designed for PAC is referred to as the "SBC2.” At trial, the SBC2 was predominantly at issue and it remains so on appeal. Thus, we refer to this second board as the "SBC2.” Any earlier reference in this opinion to the SBC should be understood as a reference to the SBC1.
. PAL technology is used to save space on a circuit board and to conserve power. Fricker testified that PAL enabled him to take all of the discrete logic that was contained in four or five chips on the SBC1 and reduce it to one chip on the SBC2. R8-246-199. Like the SBCOS, PAL manifests itself on a circuit board in the form of a chip.
. Among the materials delivered to PAC were the hardware logic diagrams, the PAL software listings, a disk with the network list, or “net list” on it, and the hole chart for the circuit board. Other materials were included as well. These materials, or "engineering,” reflect how the circuit board is actually wired together and were needed in order for PAC to manufacture the SBC2.
. There was no written nondisclosure agreement regarding the engineering materials. The documents were signed for when initially delivered by Fricker to PAC and then signed for again when PAC "loaned” them back to Fricker.
. In defining and distinguishing between source code and object code, the following explanation is helpful:
Computer programs are initially written in a “source code,” which is a symbolic language, often using English words and common mathematical symbols, that humans can read. The source code is then translated, through a mechanical process known as compilation or assembly, into "object code,” which is a concatenation of Is and Os readable by computer. Although a skilled programmer can read and understand small sections of object code, it is virtually impossible to develop a working understanding of a program by examining only its object code. As a result, most commercial programs are sold only in object code form, and can be run only “as is” by the ordinary user.
3 Melville B. Nimmer & David Nimmer, Nimmer on Copyright § 13.03[F] n. 271 (1995) (hereinafter “Nimmer”). See also E.F. Johnson Co. v. Uniden Corp. of America,
Since object code is only machine readable, PAC would have had to disassemble and decom-pile it for it to be of any use. See Robert A. Kreiss, Accessibility and Commercialization in Copyright Theory, 43 UCLA L.Rev. 1, 32 n. 110 (1995) (hereinafter "Kreiss”) (noting that "object code, in the vast quantities found in normal computer programs, is not, as a practical matter, humanly accessible to programmers"). “Disas-sembly,” which is a reverse engineering term that includes both disassembly and decompilation, “ 'is a procedure for translating the machine language program into an assembly language program.' ” Kreiss, at 3 n. 8 (quoting Office of Technology Assessment, Finding A Balance: Computer Software, Intellectual Property and the Challenge of Technological Change 146 (1992)). Thus, PAC requested the source code for Bateman's SBCOS, which would have afforded greater insight into the workings and structure of the SBCOS software; in particular, it would have provided PAC with any accompanying programmer notes.
. As noted in note 17, supra, there is an important technical distinction between the source code and the object code. Generally, the object code is readable only by machines. But, as Professor Nimmer notes:
The skilled programmer, however, may reverse engineer the program by using the techniques of "decompilation" and "disassembly” to work backwards from object code and to produce a facsimile of the original source code. Although decompilation techniques generally will not yield a perfect copy of the original source code, decompilation can afford an understanding of much of the structure and operation of a program.
3 Nimmer § 13.03[F] n. 271 (citation omitted).
PAC utilized the techniques of disassembly and decompilation on Bateman's SBCOS. PAC claims that such reverse engineering was necessary to develop an operating system compatible with its application program, which in turn was written to be compatible with Bateman's SBCOS. Although the issue is not directly before us on appeal, it will likely appear on remand, and thus we think it proper to address it and thereby provide some guidance to the district court on remand. See United States v. Costa,
. This case never went to trial, and the record is silent as to its outcome. The breach of contract claim is not part of the case before us on appeal.
. Although a timely obtained certificate of registration constitutes prima facie evidence of the validity of the claim of copyright, this presumption is rebuttable. See Autoskill, Inc. v. National Educ. Support Sys., Inc.,
. Initially, the task is to distinguish between protectable expression and unprotectable “methods of operation," “processes," and the like. 17 U.S.C. § 102(b). Where a portion of the computer program constitutes an unprotectable method of operation or process, it is not an expressive part of the work. It is particularly important to exclude methods of operation and processes from the scope of copyright in computer programs because much of the contents of computer programs is patentable. Were we to permit an author to claim copyright protection for those elements of the work that should be the province of patent law, we would be undermining the competitive principles that are fundamental to the patent system. See Baker v. Selden,
. Fair use traditionally has been treated as an affirmative defense to a charge of copyright infringement See Campbell v. Acuff-Rose Music, Inc., - U.S. -, -,
. Before embarking upon any infringement analysis, it is vital to understand that infringing conduct is the unpermitted exercise of a right of the copyright owner. To 'properly apply that principle, it is equally important to remember that there exists a distinction between the work and the copyright. The work — in this case a computer program — is separate and distinct from the copyright; the copyright is the rights to which the copyrighted work is subject. It is the rights, not the work, that the copyright holder owns. This distinction is manifest in view of the fact that when the copyright expires, the erstwhile copyright holder no longer owns any exclusive rights, but the work continues to exist without change. The copyright owner never owns the work because copyright is a series of specified rights to which a designated work is subject for a limited period of time, after which the work enters into the public domain unencumbered by copyright. Hence, the use of the work and the use of the copyright are distinct. One may use the work without using the copyright, but one cannot use the copyright without using the work — one does not infringe the work, rather one infringes the copyright. Thus, "[a]nyone who violates any of the exclusive rights of the copyright owner ... is an infringer of the copy-right_” 17 U.S.C. § 501(a). Therefore, the basic issue in all copyright defenses is whether the use involved was a use of the work or a use of the copyright. See generally L. Ray Patterson,
. Throughout their briefs, the parties refer to this test as the Nimmer "successive filtration” test. In instructing the jury, the district court also referred to this test as the “Nimmer test.” Supp. R1-318-92. While we certainly recognize that the Altai court endorsed Professor Nimmer’s "successive filtering method” for separating pro-tectable expression from nonprotectable material, the test set forth in Altai is more comprehensive than that formulated by Professor Nimmer. The jury instructions were clearly based on the Altai version of the Nimmer test, and therefore any reference in this opinion to the "Nimmer test” is to be understood as a reference to the Altai version of the Nimmer test.
. Two works need not be identical in order to be deemed "substantially similar” for purposes of copyright infringement. As Judge Learned Hand noted, "[i]t is of course essential to any protection of literary property ... that the right cannot be limited literally to the text, else a plagiarist would escape by immaterial variations.” Nichols v. Universal Pictures Corp.,
It is in this substantial similarity analysis that one must distinguish between literal and nonli-teral similarity. Literal similarity refers to similarity at the code level; that is, there is a verbatim copying of part or all of the source or object codes of a computer program. Nonliteral similarity is more difficult to define. Professor Nim-mer refers to it as "comprehensive nonliteral similarity,” and notes that the term "similarity” is not limited to a particular line or paragraph of a work, but refers rather to where "the fundamental essence or structure of one work is duplicated in another.” Id. at § 13.03[A][1]. Thus, nonliteral similarity can be thought of as paraphrasing or copying the essence or struc
. Screen displays are the products of a program and are not considered to be a literal element of a program. They fall "under the copyright rubric of audiovisual works.” Altai,
. It is essential that one keep in mind that the approaches adopted by the other circuits merely are a means to a very important end: filtering out all unprotectable material. Sometimes parties become so engrossed in disputing what "test” should apply that they lose sight of what the tests were designed to accomplish in the first place. To paraphrase a sage observer, "If you don't know where you’re goin’, when you get there you’ll be lost.”
. We emphasize here that although unoriginality and fair use, when related to compatibility considerations, are closely related copyright issues, they are analytically distinct. Compatibility and other functionality challenges to originality, if found to be applicable, are applied so as to deny copyright protection to a particular work or portion of a work. 17 U.S.C. § 102(b). In contrast, fair use is a doctrine that is applied after a finding has been made that a work or portion of a work is entitled to copyright protection. 17 U.S.C. § 107.
. The availability of alternatives should not be determinative in distinguishing between elements of a computer program that are expressive and those that are unproteetable under 17 U.S.C. § 102(b). Generally, there is more than one method of operation or process that can be used to perform a particular computer program function. However, methods of operation and processes are not copyrightable. But tension exists in the Act as to what a "process” or "method of operation" is in the context of computer programs. See Jane C. Ginsburg, Four Reasons and A Paradox: The Manifest Superiority of Copyright Over Sui Generis Protection of Computer Software, 94 Colum.L.Rev. 2559, 2560-70 (1994). Patents routinely recite prior methods or systems of performing the same function in distinguishing the claimed invention from the prior art.
. As one commentator has noted:
Compatibility becomes an issue when a firm wishes to create a single new component designed to operate with elements of a preexisting system. For example, if manufacturer "B" would like to design a computer that can use software designed for a computer manufactured by "A,” B’s operating system interface must match that of manufacturer A. Without that compatibility, the software designed for A's machine will not function on B's.
Teter, at 1064 (emphasis added).
Although the factual situation in this hypothetical is not identical to the case at bar, it is close enough to highlight the importance of the operating system interface.
. We need not decide whether PAC is correct in its assertion that, given the particular facts of this case, it was not obligated to rewrite its application program to avoid copying Bateman’s interface specifications. PAC, however, is incorrect in arguing that this rewriting was not required because Bateman’s interface specifications are not entitled to copyright protection as a matter of law.
. As noted above, simply because something is copyrightable does not mean that it is entitled to copyright protection. The expression at issue may be found to be unoriginal through application of the merger doctrine or under 17 U.S.C. § 102(b). And even if the expression is found to be original, fair use may be demonstrated by the alleged infringer to defeat the claim of infringement. This latter analysis will depend upon the facts in the particular case, since a use by one putative infringer may be "fair” while the use by another may not so qualify under 17 U.S.C. § 107. See L. Ray Patterson & Stanley W. Lindberg, The Nature of Copyright: A Law of Users’ Rights 163-241 (1991).
. Note that we use the word "may.” Such a finding will depend on the particular facts of a case, and thus it would be unwise for us to try to formulate a bright-line rule to address this issue, given the importance of the factual nuances of each case. In no case, however, should copyright protection be extended to functional results obtained when program instructions are executed and such results are processes of the type better left to patent and trade secret protection.
. Because it may resurface on remand, we briefly address one of the issues on appeal regarding the hardware logic diagrams. We find that the district court was correct in concluding that Flicker’s delivery of a single copy of the hardware logic diagrams to PAC, even though it did not contain a copyright notice on it, was not a public distribution and thus the forfeiture provisions of 17 U.S.C. § 405 do not come into play. We disagree, however, with the district court’s finding that, as a matter of law, one copy is a "relatively small number” under 17 U.S.C. § 405(a)(1). See Donald Frederick Evans,
. Bateman and Flicker contend that the fact that PAC signed for the engineering materials when Flicker delivered them to it and the fact that it required Flicker to sign them out when they were "loaned” back to him is strong evidence that PAC treated these materials as trade secrets. We are unpersuaded by this contention — the mere fact that PAC employed standard business inventory practices does not create the confidential relationship that is needed for Bate-man and Flicker to prevail on their trade secret misappropriation claim.
. In light of our resolution of the trade secret issue, we need not address Bateman and Flicker’s cross-appeal concerning the award of exemplary damages under Fla.Stat. § 688.004(2).
