An unauthorized third party gained access to the system's network and obtained copies of certain data.
Photo: Weiquan Lin/Getty Images
Topic:
Photo: Weiquan Lin/Getty Images