The loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or any similar occurrence where: A person other than an authorized user accesses or potentially accesses data or an authorized user accesses data for another than authorized purpose.