Service providers who can prove they did not have direct control of
their computer system, did not commit the infringement themselves,
or did not order anyone to commit the infringement in the service
provider’s computer system, and complied with the court order to
remove the infringing content from the computer system.