Because breaches come from public vulnerabilities, unless you can prove there was no breach, you should treat it as a breach. This is common information security practice.
Google are unable to prove there was no breach because they didn't keep sufficient logs, which is also not acceptable in modern security practice.