Because breaches come from public vulnerabilities, unless you can prove there was no breach, you should treat it as a breach. This is common information security practice.
Google are unable to prove there was no breach because they didn't keep sufficient logs, which is also not acceptable in modern security practice.
Google are unable to prove there was no breach because they didn't keep sufficient logs, which is also not acceptable in modern security practice.