Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service.

1. Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service.

2. Please do an internet search and find out the results of the Erin Andrews invasion of privacy case that the Craig discusses in the assigned text. Write a commentary on your thoughts on the case.