Thank you for posting this to clear up concerns.
You do not need to "gain access" to a "system" to "hack" it. Though gaining access is one use of the term, it's not the only use. To be able to manipulate the data or system or exploit a vulnerability is enough. It's about the end result, not necessarily about "gaining access". Don't stop at the first definition.

