Today in Dutch crime:
— There was a tax officer with legitimate access to a database of information on citizens, needed to do his job
— His lookups in the database increased an order of magnitude, often after work hours
— The people whose information he looked up were peculiarly likely to experience a mafia intimidation crime (such as fireworks-in-the-mail-slot) shortly afterwards
This is why thorough audit logs are such a crucial part of computer security. If your org handles sensitive personal information, you should be proactively looking for users with an unusually high number of accesses, or who are looking up celebrities, politicians or their own family and neighbors for no clear reason.