"Unauthorized access of PII resulted from the theft of laptops, desktops, tapes, and storage media such as CD-ROMs and USB flash-drives, and of the compromise of ???data at rest??? within online systems." . . . . .