The loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or any similar occurrence where: A person other than an authorized user accesses or potentially accesses data or an authorized user accesses data for an other than authorized purpose.