ORDER
The opinion filed on December 20, 2011, and appearing at
Appellant’s petition for panel rehearing is GRANTED and the petition for rehearing en banc is DENIED AS MOOT.
A superseding opinion will be filed concurrently with this order.
*1011 The parties may file additional petitions for rehearing or rehearing en bane.
OPINION
Veoh Networks (Veoh) operates a publicly accessible website that enables users to share videos with other users. Universal Music Group (UMG) is one of the world’s largest recorded music and music publishing companies, and includes record labels such as Motown, Def Jam and Geffen. In addition to producing and distributing recorded music, UMG produces music videos. Although Veoh has implemented various procedures to prevent copyright infringement through its system, users of Veoh’s service have in the past been able, without UMG’s authorization, to download videos containing songs for which UMG owns the copyright. UMG responded by filing suit against Veoh for direct and secondary copyright infringement. The district court granted summary judgment to Veoh after determining that it was protected by the Digital Millennium Copyright Act (DMCA) “safe harbor” limiting service providers’ liability for “infringement of copyright by reason of the storage at the direction of a user of material that resides on a system or network controlled or operated by or for the service provider.” 17 U.S.C. § 512(c). We agree, and accordingly affirm.
Background 1
Veoh allows people to share video content over the Internet. Users can view videos uploaded by other users as well as authorized “partner content” made available by major copyright holders such as SonyBMG, ABC and ESPN. There are two ways to use Veoh’s service: through a standalone software client application launched in late 2005, or through the veoh. com website launched in early 2006 that users access via a standard web browser. Both services are provided free of charge. Veoh generates revenue from advertising displayed along with the videos. “As of April 2009, Veoh had well over a million videos available for viewing, and users had uploaded more than four million videos to Veoh.”
Before a user may share a video through Veoh, he must register at veoh.com by providing an email address, user name and password. He must then state that he has read and agreed to Veoh’s “Publisher Terms and Conditions” (PTC). The PTC instructs users that they “may not submit [material] ... that contains any ... infringing ... or illegal content” and directs that they “may only upload and publish [material] on the Veoh Service to which [they] have sufficient rights and licenses to permit the distribution of [their] [material] via the Veoh Services.” The PTC agreement also gives Veoh a license to “publicly display, publicly perform, transmit, distribute, copy, store, reproduce and/or provide” the uploaded video “through the Veoh Service, either in its original form, copy or in the form of an encoded work.”
A user who wants to share a video must also agree to Veoh’s “Terms of Use,” which give Veoh a license “to use, reproduce, modify, distribute, prepare derivative works of, display, publish, perform and transmit” the video. The Terms of Use provide that “you expressly represent and warrant that you own or have the necessary licenses, rights, consents, and permissions to use and authorize Veoh to use all ... copyright or other proprietary rights in and to any and all [material shared on Veoh].” Users must agree “not to (a) take any action or (b) upload, download, post, submit or otherwise distribute or facilitate distribution of any [material] ... through *1012 the Veoh Service, that ... infringes any ... copyright.” Once a user agrees to the PTC and Terms of Use, he may upload a video. Each time a user begins to upload a video to Veoh’s website, a message appears stating, “Do not upload videos that infringe copyright, are pornographic, obscene, violent, or any other videos that violate Veoh’s Terms of Use.”
When a video is uploaded, various automated processes take place. Veoh’s software automatically breaks down the video file into smaller 256-kilobyte “chunks,” which facilitate making the video accessible to others. Veoh’s software also automatically converts, or “transcodes,” the video file into Flash 7 format. This is done because “the vast majority of internet users have software that can play videos” in this format. Veoh presets the requisite settings for the Flash conversion. If the user is a “Pro” user, Veoh’s software also converts the uploaded video into Flash 8 and MPEG-4 formats, which are playable on some portable devices. Accordingly, when a Pro user uploads a video, Veoh automatically creates and retains four copies: the chunked file, the Flash 7 file, the Flash 8 file and the MPEG-4 file. None of these automated conversions affects the content of the video.
Veoh’s computers also automatically extract metadata from information users provide to help others locate the video for viewing. Users can provide a title, as well as tags or keywords that describe the video, and can also select pre-set categories describing the video, such as “music,” “faith” or “politics.” The Veoh system then automatically assigns every uploaded video a “permalink,” or web address, that uniquely identifies the video and makes it available to users. Veoh employees do not review the user-submitted video, title or tags before the video is made available. 2
Veoh’s system allows users to access shared videos in two ways. First, the video may be “streamed” from a server, whereby the user’s web browser begins displaying the video almost immediately, before the entire file has been transmitted to the user’s computer. Depending on whether the user stops his web browser from streaming the full video, a partial or full copy of the video is stored temporarily on the user’s computer. Second, the user can download a copy of the video through Veoh’s website or client software application. Veoh transfers a “chunked” copy of the file to the user’s computer, and the software reassembles the chunks into a viewable copy. The downloaded file is stored on the user’s computer in a Veoh directory, which gives Veoh the ability to terminate access to the files.
Veoh employs various technologies to automatically prevent copyright infringement on its system. In 2006, Veoh adopted “hash filtering” software. Whenever Veoh disables access to an infringing video, the hash filter also automatically disables access to any identical videos and blocks any subsequently submitted duplicates. Veoh also began developing an additional filtering method of its own, but in 2007 opted instead to adopt a third-party filtering solution produced by a company called Audible Magic. Audible Magic’s technology takes audio “fingerprints” from video files and compares them to a database of copyrighted content provided by copyright holders. If a user attempts to upload a video that matches a fingerprint from Audible Magic’s database of forbidden material, the video never becomes available for viewing. Approximately nine *1013 months after beginning to apply the Audible Magic filter to all newly uploaded videos, Veoh applied the filter to its backlog of previously uploaded videos. This resulted in the removal of more than 60,000 videos, including some incorporating UMG’s works. Veoh has also implemented a policy for terminating users who repeatedly upload infringing material, and has terminated thousands of user accounts.
Despite Veoh’s efforts to prevent copyright infringement on its system, both Veoh and UMG agree that some of Veoh’s users were able to download unauthorized videos containing songs for which UMG owns the copyright. The parties also agree that before UMG filed its complaint, the only notices Veoh received regarding alleged infringements of UMG’s works were sent by the Recording Industry Association of America (RIAA). The RIAA notices listed specific videos that were allegedly infringing, and included links to those videos. The notices did not assert rights to all works by the identified artists, and did not mention UMG. UMG does not dispute that Veoh removed the material located at the links identified in the RIAA notices.
In September 2007, UMG filed suit against Veoh for direct, vicarious and contributory copyright infringement, and for inducement of infringement. UMG contended that Veoh’s efforts to prevent copyright infringement on its system were “too little too late” because Veoh did not adopt filtering technology until “after Veoh harbored infringing material for its own benefit,” and initially it ran the filters only on newly uploaded videos. UMG also argued that Veoh “remove[d] copyrighted material only if identified specifically in a notice of infringement,” and “[e]ven then, Veoh would only remove the video associated with the particular URL and bit-for-bit copies of that same video.”
In UMG’s first amended complaint (FAC), it added three of Veoh’s investors as defendants on theories of secondary liability. 3 The Investor Defendants sought dismissal of UMG’s FAC for failure to state a claim against them under Federal Rule of Civil Procedure 12(b)(6). The district court granted the motion to dismiss without prejudice and UMG filed a Second Amended Complaint (SAC). The Investor Defendants again moved to dismiss, and the district court dismissed the claims against the Investor Defendants with prejudice, holding that UMG’s “allegations amounted to little more than what is legally and customarily required of corporate board members.” Final judgment on that ground was entered on June 1, 2009.
Veoh asserted as an affirmative defense that it is protected by the DMCA safe harbor provisions. UMG moved for partial summary judgment that Veoh is not entitled to protection under the 17 U.S.C. § 512(c) safe harbor because the alleged infringement did not qualify as “by reason of the storage [of material] at the direction of a user.” The district court disagreed and denied UMG’s motion.
See UMG Recordings, Inc. v. Veoh Networks Inc. (UMG I),
Veoh moved for an award of costs and attorney’s fees under Federal Rule of Civil Procedure 68 and the Copyright Act, 17 U.S.C. § 505. Although the district court found that Veoh was the prevailing party “on the core issue in the litigation,” the court declined to exercise its discretion to award Veoh fees under § 505 because Veoh “failed to demonstrate that UMG’s legal challenge was improper, in bad faith, or contrary to the purposes of the Copyright Act.” Because the court concluded fees were not “properly awardable” under § 505, it also denied Veoh fees and costs under Rule 68. Veoh does not challenge the denial of fees under § 505, but appeals the denial of Rule 68 costs and fees. UMG appeals the entry of summary judgment in Veoh’s favor and the dismissal of its complaint against the Investor Defendants.
Discussion
I.
The district court had jurisdiction over these matters under 28 U.S.C. § 1331, and we have jurisdiction over the appeals under 28 U.S.C. § 1291. We review de novo a district court’s summary judgment ruling.
See Rossi v. Motion Picture Ass’n of Am. Inc.,
II.
“Difficult and controversial questions of copyright liability in the online world prompted Congress to enact Title II of the DMCA, the Online Copyright Infringement Liability Limitation Act (OCILLA).”
Ellison v. Robertson,
There are a number of requirements that must be met for a “service provider” like Veoh to receive § 512(c) safe harbor *1015 protection. 4 Section 512(c) provides in relevant part:
(c) Information residing on systems or networks at direction of users.—
(1) In general. — A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the storage at the direction of a user of material that resides on a system or network controlled or operated by or for the service provider, if the service provider—
(A)(i) does not have actual knowledge that the material or an activity using the material on the system or network is infringing;
(ii) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or
(iii) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material;
(B) does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity; and
(C) upon notification of claimed infringement as described in paragraph (3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity.
On appeal, UMG contends that three of these requirements were not met. First, UMG argues that the alleged infringing activities do not fall within the plain meaning of “infringement of copyright by reason of the storage [of material] at the direction of a user,” a threshold requirement under § 512(c)(1). Second, UMG argues that genuine issues of fact remain about whether Veoh had actual knowledge of infringement, or was “aware of facts or circumstances from which infringing activity [wa]s apparent” under § 512(c)(1)(A). Finally, UMG argues that it presented sufficient evidence that Veoh “receive[d] a financial benefit directly attributable to ... infringing activity” that it had “the right and ability to control” under § 512(c)(1)(B). We disagree on each count, and accordingly we affirm the district court. 5
A.
We must first decide whether the functions automatically performed by Veoh’s software when a user uploads a video fall within the meaning of “by reason of the storage at the direction of a user.” 17 U.S.C. § 512(c)(1). Although UMG concedes that “[sjtorage on computers in- *1016 volves making a copy of the underlying data,” it argues that “nothing in the ordinary definition of ‘storage’ encompasses” the automatic processes undertaken to facilitate public access to user-uploaded videos. Facilitation of access, UMG argues, goes beyond “storage.” Therefore the creation of chunked and Flash files and the streaming and downloading of videos fall outside § 512(c). UMG also contends that these automatic processes are not undertaken “at the direction of the user.”
The district court concluded that UMG’s reading of § 512(c) was too narrow, wrongly requiring “that the infringing conduct
be
storage,” rather than be “
‘by reason of
the storage,’ ” as its terms provide.
UMG I,
UMG’s argument that the district court too broadly construed the scope of § 512(c) rests in part on UMG’s contention that the DMCA’s “by reason of’ language should be interpreted in the same way as similar language in the Racketeer Influenced and Corrupt Organizations Act (RICO), 18 U.S.C. §§ 1961-1968. RICO provides that “[a]ny person injured in his business or property by reason of a violation of section 1962 of this chapter may sue therefor.” 18 U.S.C. § 1964(c). In
Holmes v. Securities Investor Protection Corp.,
Ordinarily we presume that “similar language in similar statutes should be interpreted similarly.”
United States v. Sioux,
The
Holmes
Court began its analysis by recognizing that “by reason of’ “can, of course, be read to mean that ... the defendant’s violation was a ‘but for’ cause of plaintiffs injury.”
Holmes
also explained that “such directness of relationship” between the harm and the alleged wrong is a “central element!]” of “Clayton Act causation” for three primary reasons, and, significantly, concluded that all three “apply with equal force to suits under [RICO].”
Id.
at 269-70,
None of these concerns applies to the DMCA, which, unlike the Clayton Act and RICO, involves a narrow affirmative defense rather than the expansion of liability. Further, unlike in Holmes, there is no indication that Congress modeled the DMCA on the Clayton Act or RICO. We are therefore doubtful that in this quite different context, Holmes’ strict reading of “by reason of’ is what Congress intended. 7
Our doubts are confirmed by the fact that UMG’s reading of the “by reason of’ language would create internal statutory conflicts. By its terms, § 512(c) presupposes that service providers will provide access to users’ stored material, and we would thus contravene the statute if we
*1018
held that such access disqualified Veoh from the safe harbor. Section 512(c) codifies a detailed notice and takedown procedure by which copyright holders inform service providers of infringing material accessible through their sites, and service providers then “disable
access
to” such materials. 17 U.S.C. § 512(c)(l)(A)(iii), (c)(1)(C)
&
(c)(3)(A)(iii) (emphasis added). This carefully considered protocol, and the statute’s attendant references to “disabling] access” to infringing materials,
see id.,
would be superfluous if we accepted UMG’s constrained reading of the statute.
See Greenwood v. CompuCredit Corp.,
We do not find persuasive UMG’s effort to reconcile the internal contradictions its reading of the statute creates by positing that Congress must have meant § 512(c) to protect only “web hosting” services. Web hosts “host” websites on their servers, thereby “mak[ing] storage resources available to website operators.” The thrust of UMG’s argument seems to be that web hosts do not undertake the sorts of accessibility-facilitating functions that Veoh does, and thus the services they perform “fit within the ordinary meaning of ‘storage,’ ” and thereby “harmoniz[e]” with the notice and takedown procedures. UMG’s theory fails to account for the reality that web hosts, like Veoh, also store user-submitted materials in order to make those materials accessible to other Internet users. The reason one has a website is so that others may view it. As amici note, these access activities define web hosting — if the web host only stored information for a single user, it would be more aptly described as an online back-up service. See Brief for Electronic Frontier Found, et al. as Amici Curiae Supporting Appellees at 15, UMG Recordings, Inc. v. Veoh Networks, Inc., No. 09-56777 (9th Cir.2011).
In addition, the technological processes involved in providing web hosting services require those service providers to make, transmit and download multiple copies of users’ stored materials. To create a website, the user uploads content to the web host’s computers, which make an initial copy. “Content may be any number of things — family photos, poems, ... even sound clips and movies.” Preston Gralla, How The Internet Works 132 (2d ed. 1999). Then, when another Internet user wants to access the website by clicking a link or entering the URL, all the website’s relevant content is transmitted to the user’s computer, where another copy is automatically made by the user’s web browser software in order to assemble the materials for viewing and listening. See id. at 157. To carry out their function of making websites available to Internet users, web hosting services thus routinely copy content and transmit it to Internet users. See id. We cannot see how these access-facilitating processes are meaningfully distinguishable from Veoh’s for § 512(c)(1) purposes.
*1019 Further, the language of the statute recognizes that one is unlikely to infringe a copyright by merely storing material that no one could access, and so includes activities that go beyond storage. Section 512(c)(l)(A)(i) so recognizes in stating “the material or an activity using the material ... is infringing.” (Emphasis added.) Section 512(c)(1)(A)(ii) similarly addresses “infringing activity.” Section 512(c)(l)(A)(iii) also reinforces this reading by requiring the service provider “to remove, or disable access to, the material,” suggesting that if the material were still being stored by the service provider, but was inaccessible, it might well not be infringing. (Emphasis added.)
Finally, if Congress wanted to confíne § 512(c) exclusively to web hosts rather than reach a wider range of service providers, we very much doubt it would have done so with the oblique “by reason of storage” language. We presume that Congress instead would have taken the more straightforward course of clarifying in the definition of “service provider” that, as it applies to § 512(c), only web hosts qualify. Indeed, Congress already gives two definitions of “service provider[s]” — one narrow definition specific to § 512(a), and one broader definition that applies to the rest of § 512. 9 We therefore see no basis for adopting UMG’s novel theory that Congress intended § 512(c) to protect only web hosting services. 10
OCILLA’s two “service provider” definitions also undermine UMG’s argument that the automatic processes that make user-uploaded videos accessible are not undertaken “at the direction of the user.” The narrower definition that applies exclusively to § 512(a), which governs conduit-only functions, expressly excludes service providers that “modiffy] [ ] the content of the material as sent or received.” 17 U.S.C. § 512(k)(l)(A). Under the broader definition applying to § 512(c), by contrast, there is no limitation on the service provider’s ability to modify user-submitted material to facilitate storage and access, as
*1020
Veoh’s automatic processes do.
See Io Grp., Inc. v. Veoh Networks, Inc.,
“Veoh has simply established a system whereby software automatically processes user-submitted content and recasts it in a format that is readily accessible to its users.”
Id.
at 1148. Veoh does not actively participate in or supervise file uploading, “[n]or does it preview or select the files before the upload is completed.”
Id.
Rather, this “automated process” for making files accessible “is initiated entirely at the volition of Veoh’s users.”
Id.; see also CoStar Grp., Inc. v. Loopnet, Inc.,
B.
Under § 512(c)(1)(A), a service provider can receive safe harbor protection only if it “(i) does not have actual knowledge that the material or an activity using the material on the system or network is infringing;” “(ii) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or” “(iii) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material.”
11
UMG has never disputed that when Veoh became aware of allegedly infringing material as a result of the RIAA’s DMCA notices, it removed the files. Rather, it argues that Veoh had knowledge or awareness of other infringing videos that it did not remove. The district court found that UMG failed to rebut Veoh’s showing “that when it did acquire knowledge of allegedly infringing material — whether from DMCA notices, informal notices, or other means — it expeditiously removed such material.”
UMG 11,
1.
It is undisputed that, until the filing of this lawsuit, UMG “had not identified to Veoh any specific infringing video available on Veoh’s system.” UMG’s decision to forgo the DMCA notice protocol “stripped it of the most powerful evidence of a service provider’s knowledge — actual notice of infringement from the copyright holder.”
Corbis Corp. v. Amazon.com, Inc.,
As an initial matter, contrary to UMG’s contentions, there are many music videos that
could
in fact legally appear on Veoh. “Among the types of videos subject to copyright protection but lawfully available on Veoh’s system were videos with music created by users and videos that Veoh provided pursuant to arrangements it reached with major copyright holders, such as SonyBMG.”
UMG II,
Cases analyzing knowledge in the secondary copyright infringement context also counsel against UMG’s should-have-known approach. In
Sony Corp. of America v. Universal City Studios, Inc.,
Requiring specific knowledge of particular infringing activity makes good sense in the context of the DMCA, which Congress enacted to foster cooperation among copyright holders and service providers in dealing with infringement on the Internet. *1022 See S.Rep. No. 105-190, at 20 (noting OCILLA was intended to provide “strong incentives for service providers and copyright owners to cooperate to detect and deal with copyright infringements”); H.R.Rep. No. 105-551, pt. 2, at 49 (1998) (same). Copyright holders know precisely what materials they own, and are thus better able to efficiently identify infringing copies than service providers like Veoh, who cannot readily ascertain what material is copyrighted and what is not. See S.Rep. No. 105-190, at 48; (“[A] [service] provider could not be expected, during the course of its brief cataloguing visit, to determine whether [a] photograph was still protected by copyright or was in the public domain; if the photograph was still protected by copyright, whether the use was licensed; and if the use was not licensed, whether it was permitted under the fair use doctrine.”); H.R.Rep. No. 105-551, pt. 2, at 57-58 (same).
These considerations are reflected in Congress’ decision to enact a notice and takedown protocol encouraging copyright holders to identify specific infringing material to service providers. They are also evidenced in the “exclusionary rule” that prohibits consideration of substantially deficient § 512(c)(3)(A) notices for purposes of “determining whether a service provider has actual knowledge or is aware of facts and circumstances from which infringing activity is apparent.” 17 U.S.C. § 512(c)(3)(B)(i);
see also
H.R.Rep. No. 105-551, pt. 2, at 56 (explaining this provision); Nimmer § 12B.04(B)(4)(c) (“[T]he copyright owner bears the burden of demonstrating knowledge independently of the failed notification.”). Congress’ intention is further reflected in the DMCA’s direct statement that “[n]othing in this section shall be construed to condition the applicability of subsections (a) through (d) on ... a service provider monitoring its service or affirmatively seeking facts indicating infringing activity.” 17 U.S.C. § 512(m).
13
Congress made a considered policy determination that the “DMCA notification procedures [would] place the burden of policing copyright infringement — identifying the potentially infringing material and adequately documenting infringement— squarely on the owners of the copyright.”
Perfect 10, Inc. v. CCBill LLC,
UMG asks us to change course with regard to § 512(c)(1)(A) by adopting a broad conception of the knowledge requirement. We see no principled basis for doing so. We therefore hold that merely hosting a category of copyrightable content, such as music videos, with the general knowledge that one’s services could be used to share infringing material, is insufficient to meet the actual knowledge requirement under § 512(c)(l)(A)(i).
We reach the same conclusion with regard to the § 512(c)(l)(A)(ii) inquiry into *1023 whether a service provider is “aware of facts or circumstances from which infringing activity is apparent.” The district court’s conception of this “red flag test” properly followed our analysis in CCBill, which reiterated that the burden remains with the copyright holder rather than the service provider. See id. at 1114. The plaintiffs in CCBill argued that there were a number of red flags that made it apparent infringing activity was afoot, noting that the defendant hosted sites with names such as “illegal.net” and “stoleneelebrityp-ics.com,” as well as password hacking websites, which obviously infringe. See id. We disagreed that these were sufficient red flags because “[w]e do not place the burden of determining whether [materials] are actually illegal on a service provider,” and “[w]e impose no such investigative duties on service providers.” Id. For the same reasons, we hold that Veoh’s general knowledge that it hosted copyrightable material and that its services could be used for infringement is insufficient to constitute a red flag.
Of course, a service provider cannot willfully bury its head in the sand to avoid obtaining such specific knowledge.
See Viacom Int’l v. YouTube, Inc.,
2.
We are not persuaded that UMG’s other purported evidence of Veoh’s actual or apparent knowledge of infringement warrants trial. First, UMG points to the tagging of videos on Veoh’s service as “music videos.” Relying on the theory rejected above, UMG contends that this demonstrates Veoh’s knowledge that it hosted a category of infringing content. Relatedly, UMG argues that Veoh’s purchase of certain search terms through the Google AdWords program demonstrates knowledge of infringing activity because some of the terms purchased, such as “50 Cent,” “Avril Lavigne” and “Britney Spears,” are the names of UMG artists. However, artists are not always in exclusive relationships with recording companies, so just because UMG owns the copyrights for some Britney Spears songs does not mean it owns the copyright for all Britney Spears songs. Indeed, 50 Cent, Avril Lavigne and Britney Spears are also affiliated with SonyBMG, which gave Veoh permission to stream its videos by these artists. Furthermore, even if Veoh had not had such permission, we recognize that companies sometimes purchase search terms they believe will lead potential customers to their websites even if the terms do not describe goods or services the company actually provides. For example, a sunglass company might buy the search terms “sunscreen” or “vacation” because it believed that people interested in such searches would often also be interested in sunglasses. Accordingly, Veoh’s search term purchases are insufficient to demonstrate that it knew it hosted infringing material.
UMG also argues that Veoh’s removal of unauthorized content identified in RIAA notices demonstrates knowledge, even if Veoh complied with § 512(c)’s notice and takedown procedures. According to UMG,
*1024
Veoh should have taken the initiative to use search and indexing tools to locate and remove from its website any other content by the artists identified in the notices. Relatedly, UMG argues that some of the videos on Veoh that had been pulled from MTV or other broadcast television stations bore information about the artist, song title and record label. UMG contends that Veoh should have used this information to find and remove unauthorized videos. As we have explained, however, to so require would conflict with § 512(m), § 512(c)(1)(C) and
CCBiU’s
refusal to “impose ... investigative duties on service providers.”
UMG also points to news articles discussing the availability of copyrighted materials on Veoh. One article reported that “several major media companies ... say that Veoh.com has been among the least aggressive video sharing sites in fighting copyrighted content,” and has thus “become a haven for pirated content.” Brad Stone, Veoh’s Vexing Visitor Numbers, N.Y. Times Bits Blog (July 15, 2007, 9:35 AM), http://bits.blogs.nytimes.com/2007/07/ 15/veohs-vexing-visitor-numbers/. Another article reported that,
Veoh Networks CEO Dmitry Shapiro acknowledges that only a week after the company’s official debut, Veoh.com is host to a wide range of unauthorized and full-length copies of popular programs. But Shapiro says it’s not his upstart company’s fault: ... “We have a policy that specifically states that when we see copyright material posted, we take it down,” Shapiro said. “This problem is the democratization of publishing. Anyone can now post a video to the Internet. Sometimes the material belongs to someone else. We take this very seriously.”
Greg Sandoval, A new copyright battlefield: Veoh Networks, CNET News (Feb. 21, 2007, 4:00 AM), http://news.cnet.com/A-new-copyright-battlefield-Veoh-Networks/ 2100-1026_3-6160860.html. UMG elicited deposition testimony from Shapiro that he had heard of these articles, and was aware that, “from time to time,” “material belonging to someone else end[ed] up on” Veoh. UMG argues that this evidence of knowledge that, as a general matter, unauthorized materials had been previously posted on Veoh is sufficient to meet the § 512(c)(1)(A) requirements.
At base, this argument relies on UMG’s primary theory, which we rejected above. Here, as well, more specific information than UMG has adduced is required. The DMCA’s detailed notice and takedown procedure assumes that, “from time to time,” “material belonging to someone else ends up” on service providers’ websites, and establishes a process for ensuring the prompt removal of such unauthorized material. If Veoh’s CEO’s acknowledgment of this general problem and awareness of news reports discussing it was enough to remove a service provider from DMCA safe harbor eligibility, the notice and take-down procedures would make little sense and the safe harbors would be effectively nullified. We cannot conclude that Congress intended such a result, and we therefore hold that this evidence is insufficient to warrant a trial.
UMG comes closer to meeting the § 512(c)(1)(A) requirements with its evidence of emails sent to Veoh executives and investors by copyright holders and users identifying infringing content. One email, sent by the CEO of Disney, a major copyright holder, to Michael Eisner, a Veoh investor, stated that the movie Cinderella III and various episodes from the television show Lost were available on Veoh without Disney’s authorization. If *1025 this notification had come from a third party, such as a Veoh user, rather than from a copyright holder, it might meet the red flag test because it specified particular infringing material. 14 As a copyright holder, however, Disney is subject to the notification requirements in § 512(c)(3), which this informal email failed to meet. Accordingly, this deficient notice “shall not be considered under paragraph (1)(A) in determining whether a service provider has actual knowledge or is aware of facts or circumstances from which infringing activity is apparent.” 17 U.S.C. § 512(c) (3) (B) (i). Further, even if this email could have created actual knowledge or qualified as a red flag, Eisner’s email in response assured Disney that he would instruct Veoh to “take it down,” and Eisner copied Veoh’s founder to ensure this happened “right away.” UMG nowhere alleges that the offending material was not immediately removed, and accordingly Veoh would be saved by § 512(c)(l)(A)(iii), which preserves the safe harbor for service providers with such knowledge so long as they “act[ ] expeditiously to remove, or disable access to, the material.”
UMG also points to an email from a Veoh user whose video was rejected for containing infringing content. Upset that Veoh would not post his unauthorized material, he stated that he had seen “plenty of [other] copyright infringement material” on the site, and identified another user who he said posted infringing content. It is possible that this email would be sufficient to constitute a red flag under § 512(c)(l)(A)(ii), even though it would not qualify as sufficient notice from a copyright holder under § 512(c)(3). But even assuming that is so, UMG has not specifically alleged that Veoh failed to expeditiously remove the infringing content identified by the user’s email. Accordingly, this too fails to create a genuine issue of material fact regarding Veoh’s knowledge of infringement.
We do not credit UMG’s contention that the district court conflated the actual knowledge and red flag awareness tests. A user email informing Veoh of material that appeared to the user to be infringing and specifying its location provides a good example of the distinction. Although the user’s allegations would not give Veoh actual knowledge under § 512(c)(l)(A)(i), because Veoh would have no assurance that a third party who does not hold the copyright in question would know whether the material was infringing, the email nonetheless could act as a red flag under § 512(c)(l)(A)(ii) provided its information was sufficiently specific. As the Second Circuit recognized:
The difference between actual and red flag knowledge is ... between a subjective and an objective standard. In other words, the actual knowledge provision turns on whether the provider actually or “subjectively” knew of specific infringement, while the red flag provision turns on whether the provider was subjectively aware of facts that would have made the specific infringement “objectively” obvious to a reasonable person. The red flag provision, because it incorporates an objective standard, is not swallowed up by the actual knowledge provision under our construction of the § 512(c) safe harbor. Both provisions do independent work, and both apply only to specific instances of infringement.
Viacom Int’l v. YouTube, Inc.,
C.
A service provider is eligible for the § 512(c) safe harbor only if it “does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity.” 17 U.S.C. § 512(c)(1)(B). UMG appeals the district court’s determination that Veoh did not have the necessary right and ability to control infringing activity and thus remained eligible for safe harbor protection. We conclude the district court was correct, and therefore affirm. 16
“Statutory interpretation begins with the language of the statute.”
Children’s Hosp. & Health Ctr. v. Belshe,
Whether Veoh had the requisite “ability to control” the infringing activity at issue depends on what the statute means by that phrase, which the statute does not define. Looking first to the dictionary, “ability” is defined as “the quality or state of being able: physical, mental, or legal power to perform: competence in doing”; and “able” is in turn defined as “possessed of needed powers (as intelligence or strength) or of needed resources (as means or influence) to accomplish an objective ...: constituted or situated so as to be susceptible or readily subjected to some action or treatment.” Webster’s Third New International Dictionary 3, 4 (2002). “Control” is defined as having the “power or authority to guide or manage: directing or restraining domination.” Id. at 496.
UMG argues that we should interpret § 512(c) as we did a similar concept in the common law vicarious liability context in
Napster,
Second, § 512(c) actually presumes that service providers have the sort of control that UMG argues satisfies the § 512(c)(1)(B) “right and ability to control” requirement to be eligible for several of the safe harbors: they must “remove[ ] or disable access to” infringing material when they become aware of it. 17 U.S.C. § 512(c)(1)(A)(iii) & (C). Quoting
Napster,
We agree with Judge Matz that “Congress could not have intended for courts to hold that a service provider loses immunity under the safe harbor provision of the DMCA because it engages in acts that are specifically required by the DMCA” to obtain safe harbor protection.
UMG II,
Third, although not definitive, the legislative history informs our conclusion that Congress did not intend to exclude from § 512(c)’s safe harbor all service providers who would be vicariously liable for their users’ infringing activity under the common law. The legislative history did, at one point, suggest an intention to codify the “right and ability to control” element of vicarious infringement, and § 512(c)(1)(B) was not modified following that report. 18 That report, however, referred to a version of the bill different from the one ultimately passed, and the discussion of vicarious liability is omitted from all later reports and, notably, from the statutory language. See H.R.Rep. No. 105-551, pt. 2, at 54; S.Rep. No. 105-190, at 44-45; H.R. Conf. Rep. No. 105-796, at 64 (1998), reprinted in 1998 U.S.C.C.A.N. 639, 649.
Subsequent legislative statements help clarify Congress’ intent. First, Congress explicitly stated in three different reports that the DMCA was intended to “protect qualifying service providers from liability for all monetary relief for direct, vicarious and contributory infringement.” H.R. Conf. Rep. No. 105-796, at 64, 1998 U.S.C.C.A.N. at 649 (emphasis added); S.Rep. No. 105-190, at 20, 40; H.R.Rep. No. 105-551, pt. 2, at 50. Under UMG’s interpretation, however, every service provider subject to vicarious liability would be automatically excluded from safe harbor protection. Second, Congress made clear that it intended to provide safe harbor protection not by altering the common law vicarious liability standards, but rather by carving out permanent safe harbors to that liability for Internet service providers even while the common law standards continue to evolve. See S.Rep. No. 105-190, at 19 (“There have been several cases relevant to service provider liability for copyright infringement. Most have approached the issue from the standpoint of contributory and vicarious liability. Rather than embarking upon a wholesale clarification of these doctrines, the Committee decided to leave current law in its evolving state and, instead, to create a series of ‘safe harbors,’ for certain common activities of service providers. A service provider which qualifies for a safe harbor, receives the benefit of limited liability.” (footnote omitted)). 19
Given Congress’ explicit intention to protect qualifying service providers who would otherwise be subject to vicarious liability, it would be puzzling for Congress to make § 512(c) entirely coextensive with the vicarious liability requirements, which would effectively exclude all vicarious liability claims from the § 512(c) safe harbor. See, e.g., Lee, supra, 32 Colum. J.L. & Arts at 236-37 (acknowledging that interpreting the DMCA to exclude service providers subject to vicarious liability would “undo the benefits of the safe harbors altogether” (quoting Mark A. Lemley, Rationalizing Internet Safe Harbors, 6 J. Telecomm. & High Tech. L. 101, 104 (2007)) (internal quotation marks omitted)). In addition, it is difficult to envision, from a policy perspective, why Congress would have eho- *1029 sen to exclude vicarious infringement from the safe harbors, but retain protection for contributory infringement. It is not apparent why the former might be seen as somehow worse than the latter. See id. at 243^14.
Furthermore, if Congress had intended that the § 512(c)(1)(B) “right and ability to control” requirement be coextensive with vicarious liability law, the statute could have accomplished that result in a more direct manner.
It is conceivable that Congress [would have] intended that [service providers] which receive a financial benefit directly attributable to the infringing activity would not, under any circumstances, be able to qualify for the subsection (c) safe harbor. But if that was indeed their intention, it would have been far simpler and much more straightforward to simply say as much. The Court does not accept that Congress would express its desire to do so by creating a confusing, self-contradictory catch-22 situation that pits 512(c)(1)(B) and 512(c)(1)(C) directly at odds with one another, particularly when there is a much simpler explanation: the DMCA requires more than the mere ability to delete and block access to infringing material after that material has been posted in order for the [service provider] to be said to have “the right and ability to control such activity.”
Ellison v. Robertson,
Our reading of § 512(c)(1)(B) is further informed and reinforced by our concern that the statute would be internally inconsistent in other respects were we to interpret the “right and ability to control” language as UMG urges. First, § 512(m) cuts against holding that Veoh’s general knowledge that infringing material could be uploaded to its site triggered an obligation to “police” its services to the “fullest extent” possible. As we have explained, § 512(m) provides that § 512(c)’s safe harbor protection may not be conditioned on “a service provider monitoring its service or affirmatively seeking facts indicating infringing activity.” UMG’s reading of the “right and ability to control” language would similarly run afoul of
CCBill,
In light of the DMCA’s language, structure, purpose and legislative history, we are compelled to reject UMG’s argument that the district court should have employed Napster’s vicarious liability standard to evaluate whether Yeoh had sufficient “right and ability to control” infringing activity under § 512(c). Although in some cases service providers subject to vicarious liability will be excluded from the § 512(c) safe harbor, in others they will not. As we are unper
*1030
suaded by UMG’s argument, we conclude instead that whereas the vicarious liability standard applied in
Napster
can be met by merely having the general ability to locate infringing material and terminate users’ access, § 512(c) requires “something more,”
Cybernet Ventures,
The Second Circuit recently considered what constitutes “something more.”
See Viacom,
To date, only one court has found that a service provider had the right and ability to control infringing activity under § 512(c)(1)(B). In Perfect 10, Inc. v. Cybernet Ventures, Inc., the court found control where the service provider instituted a monitoring program by which user websites received ‘detailed instructions regarding] issues of layout, appearance, and content.’ The service provider also forbade certain types of content and refused access to users who failed to comply with its instructions.
Id. (footnote and citations omitted). The Second Circuit also suggested that “inducement of copyright infringement under Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd., which ‘premises liability on purposeful, culpable expression and conduct,’ might also rise to the level of control under § 512(c)(1)(B).” Id. (citations omitted). Finally, the court noted that “[o]ther courts have suggested that control may exist where the service provider is ‘actively involved in the listing, bidding, sale and delivery’ of items offered for sale, Hendrickson v. eBay, Inc., ... or otherwise controls vendor sales by previewing products prior to their listing, editing product descriptions, or suggesting prices, Corbis Corp. v. Amazon.com, Inc.].” Id. at 38 n. 13. After offering this guidance, the Second Circuit “remand[ed] to the District Court to consider in the first instance whether the plaintiffs ha[d] adduced sufficient evidence to allow a reasonable jury to conclude that YouTube had the right and ability to control the infringing activity and received a financial benefit directly attributable to that activity.” Id. at 38.
We agree with the Second Circuit and hold that, in order to have the “right and ability to control,” the service provider must “exert[] substantial influence on the activities of users.”
Id.
“Substantial influence” may include, as the Second Circuit suggested, high levels of control over activities of users, as in
Cybernet.
Or it may include purposeful conduct, as in
Grokster.
In this case, Veoh’s interactions with and conduct toward its users did not rise to such a level. As Judge Matz recognized, “(a) the allegedly infringing
material
resided on Veoh’s system; (b) Veoh had the ability to remove such material; (c) Veoh could have implemented, and did implement, filtering systems; and (d) Veoh could have searched for potentially infringing content.”
UMG II,
III.
UMG also appeals the district court’s Rule 12(b)(6) dismissal of its complaint against the Investor Defendants for vicarious infringement, contributory infringement and inducement of infringement. It is well-established that “[s]eeondary liability for copyright infringement does not exist in the absence of direct infringement....”
Napster,
UMG first alleges that the Investor Defendants are liable for contributory infringement. “[0]ne who, with knowledge of the infringing activity, induces, causes or materially contributes to the infringing conduct of another, may be held liable as a ‘contributory’ infringer.”
Fonovisa, Inc. v. Cherry Auction, Inc.,
UMG acknowledges that funding alone cannot satisfy the material assistance requirement. It thus argues that the Investor Defendants “provided Veoh’s necessary funding
and
directed its spending” on “basic operations including ... hardware, software, and employees” — “elements” UMG argues “form ‘the site and facilities’ for Veoh’s direct infringement.” UMG thus attempts to liken its case to
UMG Recordings, Inc. v. Bertelsmann AG et
al.,
Even assuming that such joint control, not typically an element of contributory infringement, could satisfy Fonovisa’s site and facilities requirement, UMG’s argument fails on its own terms, because the complaint nowhere alleged that the Investor Defendants agreed to work in concert to this end. UMG suggests that it “did allege that the [Investor] Defendants agreed to ‘operate’ Veoh jointly — UMG alleged that the [Investor] Defendants operated Veoh by ‘s[eeking] and obtaining] seats on Veoh’s Board of Directors as a condition of their investments.’ ” But three investors individually acquiring one seat apiece is not the same as agreeing to operate as a unified entity to obtain and leverage majority control. Unless the three independent investors were on some level working in concert, then none of them actually had sufficient control over the Board to direct Veoh in the way UMG contends. This missing allegation is critical because finding secondary liability without it would allow plaintiffs to sue any collection of directors making up 51 percent of the board on the theory that they constitute a majority, and therefore together they control the company. Without this lynchpin allegation, UMG’s claim that the Investor Defendants had sufficient control over Veoh to direct its spending and operations in a manner that might theoretically satisfy the “site and facilities” test falls apart. We therefore affirm the dismissal of UMG’s contributory infringement claim.
This missing allegation likewise requires us to affirm the district court’s dismissal of UMG’s vicarious liability and inducement of infringement claims. Inducement liability is proper where “one [ ] distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement.”
Grokster,
IV.
Veoh appeals the district court’s refusal to grant it costs and attorney’s fees under Federal Rule of Civil Procedure 68. “Under Rule 68, if a plaintiff rejects a defendant’s offer of judgment, and the judgment finally obtained by plaintiff is not more favorable than the offer, the plaintiff must pay the costs incurred subsequent to the offer.”
United States v. Trident Seafoods Corp.,
Veoh contends that it was entitled to receive Rule 68 costs incurred from the time of its October 2008 settlement offer. It argues these costs should include attorney’s fees because
Marek,
A.
In
Marek,
the Supreme Court held that “the term ‘costs’ in Rule 68 was intended to refer to all costs
properly awardable
under the relevant substantive statute.”
We confronted the same issue with regard to a different substantive statute in
Champion.
There, we considered whether Rule 68 “costs” included attorney’s fees where Idaho Code § 12-120(3) permitted the award of fees to a “prevailing party,” and the district court expressly held that the defendant had not prevailed within the meaning of that section.
See Champion,
£j]ust as attorneys’ fees are not “properly awardable” to a defendant in a Clean Air Act case unless “the court finds that such action was unreasonable,” Trident,92 F.3d at 860 , attorneys’ fees are not “properly awardable” to a defendant in a case where the relevant statute awards attorneys’ fees to a prevailing party unless the defendant is a prevailing party within the meaning of that statute.
Id.
at 1031 (citing
Payne v. Milwaukee Cnty.,
*1035 B.
Even though Veoh is not entitled to attorney’s fees under Rule 68, it may be entitled to its other costs.
See, e.g., Champion,
Second, Veoh can recover Rule 68 costs only if it is not a prevailing defendant. In
Delta Air Lines, Inc. v. August,
We cannot reasonably conclude that the drafters of the Federal Rules intended on the one hand affirmatively to grant the district judge discretion to deny costs to the prevailing party under Rule 54(d) and then on the other hand to give defendants — and only defendants — the power to take away that discretion by performing a token act.
Id.; see also MRO Commc’ns, Inc. v. Am. Tel. & Tel. Co.,
Veoh argues that
Delta
does not apply because UMG “actually obtained certain relief’ in the form of the parties’ stipulation that Veoh would continue removing infringing content discovered by its hash filtering system, and thus UMG rather than Veoh “obtained the judgment.”
Delta,
CONCLUSION
We affirm the district court’s determination on summary judgment that Veoh is entitled to § 512(c) safe harbor protection, and its dismissal of the claims of secondary liability against the Investor Defendants. We also affirm its determination that, in this case, attorney’s fees may not be awarded under Rule 68. We remand for the district court to consider in the first instance whether Veoh is entitled to Rule 68 costs excluding attorney’s fees.
The parties shall bear their own costs on appeal.
The motions of the Recording Industry Association of America et al., the Electronic Frontier Foundation et al., and eBay Inc. et al., for leave to file amicus curiae briefs are granted, and the briefs are ordered filed.
AFFIRMED in part and REMANDED in part.
Notes
. The facts are undisputed unless otherwise noted.
. Veoh employees do monitor already accessible videos for pornography, which is removed, using a "porn tool” to review thumbnail images of uploaded videos tagged as "sexy.”
. The three investors, Shelter Capital LLC, Spark Capital LLC and the Tornante Company are referred to collectively as "the Investor Defendants.”
. We assume without deciding that Veoh qualifies as a "service provider” because UMG does not contend otherwise.
. We do not address whether Veoh adopted and reasonably implemented a repeat infringer termination policy as required by § 512(i), or whether, upon notification, Veoh expeditiously removed or disabled access to infringing material under § 512(c)(1)(C). Although UMG contested those points in the district court, its only mention of them on appeal was in a footnote in its opening brief stating summarily that the district court also committed reversible error "in holding that no genuine issues of fact existed as to whether Veoh satisfied the requirements” of those provisions, but "[d]ue to space constraints, UMG focuses on errors in the District Court’s ruling concerning subsections 512(c)(1)(A) and (B).” Given that UMG presented no argument on these points, Veoh declined to address them in its answering brief. Accordingly, we will not discuss them either.
See Retlaw Broad. Co. v. NLRB,
. " 'But for’ causation is a short way of saying ‘[t]he defendant’s conduct is a cause of the event if the event would not have occurred but for that conduct.’ It is sometimes stated as
'sine qua non'
causation, i.e., 'without which not.... ’"
Boeing Co. v. Cascade Corp.,
. A number of other courts have concluded, outside the RICO and Clayton Act context, that “by reason of” should be read to require only "but for” rather than proximate causation.
See, e.g., Gross v. FBL Fin. Servs., Inc.,
. One commentator discussing the district court's decision in this case observed that "[UMG’s] interpretation would have rendered the safe harbor a complete nullity. Virtually all [service providers] that host third-party content — ranging from website hosting companies such as GoDaddy to content companies such as MySpace, Facebook, or YouTube — host such content so that it can be shared with others over the internet.” See Edward Lee, Decoding the DMCA Safe Harbors, 32 Colum. J.L. & Arts 233, 261 (2009).
. Section 512(k)(l)(A) provides that, “As used in subsection (a), the term ‘service provider’ means an entity offering the transmission, routing, or providing of connections for digital online communications, between or among points specified by a user, of material of the user’s choosing, without modification to the content of the material as sent or received.” By contrast, § 512(k)(l)(B) provides that, "As used in this section, other than subsection (a), the term 'service provider' means a provider of online services or network access, or the operator of facilities therefor, and includes an entity described in subparagraph (A).”
. We are also unpersuaded by UMG's argument that "the District Court used one activity — ‘storage’—to immunize other activities,” in violation of § 512(n). We certainly agree that this would be improper — § 512(n) clearly states that "[w]hether a service provider qualifies for the limitation on liability in any one of those subsections ... shall not affect a determination of whether that service provider qualifies for the limitations on liability under any other such subsection.” But we do not understand Veoh to argue, or the district court to have held, that a service provider qualifying under § 512(c) necessarily also qualifies under any other safe harbor. Rather, we affirm the district court’s holding that the "by reason of storage” language in § 512(c)
itself
covers the access-facilitating automatic functions Veoh's system undertakes, without being supplemented by any other subsection. These functions are "separate and distinct,” 17 U.S.C. § 512(n), from the "transmitting, routing, or providing connections” protected under § 512(a), which addresses "[t]ransitory digital network communications” where the service provider "merely acts as a conduit for infringing material without storing, caching, or providing links to copyrighted material,” and thus "has no ability to remove the infringing material from its system or disable access to the infringing material.”
In re Charter Commc'ns, Inc., Subpoena Enforcement Matter,
. We note that, to be coherent, the statute must be read to have an implicit "and” between § 512(c)(l)(A)(i) and (ii). We thus treat the provisions as stating that to qualify for the safe harbor, a service provider must either (1) have no actual knowledge and no "aware[ness] of facts or circumstances from which infringing activity is apparent” or (2) expeditiously remove or disable access to infringing material of which it knows or is aware.
. Notably, the statute specifies that notice of infringement by or on behalf of a copyright holder that does not substantially comply with § 512(c) "shall not be considered ... in de *1021 termining whether a service provider has actual knowledge or [has red-flag knowledge].” 17 U.S.C. § 512(c)(3)(B)(i). Proper DMCA notice under 17 U.S.C. § 512(c)(3) provides only a claim of infringement, and is not necessarily sufficient by itself to establish actual or "red flag” knowledge. Instead, proper DMCA notice gives rise independently to an obligation to remove the allegedly infringing material as well as to procedures for ascertaining whether the material is indeed infringing. See § 512(g).
. We are not persuaded by UMG's argument that § 512(m)'s title, "Protection of privacy," should cause us to read the provision differently. "Headings and titles are not meant to take the place of the detailed provisions of the text.”
Greenwood,
. We therefore do not consider whether Veoh's awareness of apparent infringement of Disney’s copyrights over movies and television shows would affect the availability of the § 512(c) safe harbor with regard to UMG's claims that Veoh hosted unauthorized UMG music videos.
. In adopting this distinction between actual and "red flag” knowledge, we note that whether "the specific infringement” is " ‘objectively’ obvious to a reasonable person” may vary depending on the facts proven by the copyright holder in establishing liability.
. We need not consider whether Veoh received "a financial benefit directly attributable to the infringing activity.”
. Most courts that have confronted this question have likewise declined to assume that Congress created this Catch-22.
See, e.g., Perfect 10 v. Cybernet Ventures, Inc.,
. "The financial benefit standard in subpara-graph (B) is intended to codify and clarify the direct financial benefit element of vicarious liability.... The 'right and ability to control’ language in Subparagraph (B) codifies the second element of vicarious liability.” H.R.Rep. No. 105-551, pt. 1, at 25-26.
. We do not mean to suggest that there is no overlap between the facts that give rise to contributory or vicarious liability and those pertinent to determining whether one or more of the DMCA safe harbors are available. In many instances, the overlap will be substantial.
. In
Perfect 10, Inc. v. Visa International Service Ass'n,
The result, under Perfect 10's theories, would therefore be that a service provider with actual knowledge of infringement and the actual ability to remove the infringing material, but which has not received a statutorily compliant notice, is entitled to a safe harbor from liability, while credit card companies with actual knowledge but without the actual ability to remove infringing material, would benefit from no safe harbor. We recognize that the DMCA was not intended to displace the development of secondary liability in the courts; rather, we simply take note of the anomalous result Perfect 10 seeks.
Id. at 795 n. 4. We remain concerned about the possibility of imposing secondary liability on tangentially involved parties, like Visa and the Investor Defendants, while those accused of direct infringement receive safe harbor protection. “[B]y limiting the liability of service providers,” the DMCA sought to assuage any "hesitation] to make the necessary investment in the expansion of the speed and capacity of the Internet.” S.Rep. No. 105— 190, at 8. Congress was no doubt well aware that service providers can make the desired investment only if they receive funding from investors like the Investor Defendants. Although we do not decide the matter today, were we to hold that Veoh was protected, but its investors were not, investors might hesitate to provide the necessary funding to companies like Veoh, and Congress' purpose in passing the DMCA would be undermined.
. Although the district court did not reach the right and ability to supervise prong in its vicarious liability analysis, resting instead on its determination that the Investor Defendants did not profit directly from the infringement, we may affirm a district court's dismissal for failure to state a claim "on any basis fairly supported by the record.”
Corrie v. Caterpillar, Inc.,
. Rule 68 provides, in relevant part: “[A] party defending against a claim may serve upon an opposing party an offer to allow judgment on specified terms, with costs then accrued.... If the judgment that the offeree finally obtains is not more favorable than the unaccepted offer, the offeree must pay the costs incurred after the offer was made." Fed. R.Civ.P. 68 (emphasis added).
.The court declined to exercise its discretion to grant fees under § 505 despite its conclusion that Veoh was “the prevailing party on the core issue in the litigation” because
*1034
it found that, under the factors described in
Fogarty v. Fantasy, Inc.,
. When determining whether to award fees under the Copyright Act, we consider "(1) the degree of success obtained; (2) frivolousness; (3) motivation; (4) the objective unreasonableness of the losing party’s factual and legal arguments; and (5) the need, in particular circumstances, to advance considerations of compensation and deterrence.”
Love v. Associated Newspapers, Ltd.,
. Veoh argues that we should not follow
Trident
because it “misapplied the Supreme Court’s approach in
Marek,”
and urges us
*1035
instead to follow the Eleventh Circuit’s contrary approach in
Jordan v. Time, Inc.,
