The Ring Doorbell Security Lawsuit refers to a series of privacy violations and enforcement actions against Amazon’s Ring division, involving unauthorized access to customer videos by both company employees and external hackers. In May 2023, the Federal Trade Commission (FTC) took action against Amazon, requiring the company to pay over $30 million in settlements, with Ring’s doorbell unit specifically responsible for $5.8 million of that amount. The violations stemmed from systemic failures in security protocols that allowed Ring employees to view customer videos without restrictions and enabled hackers to compromise over 55,000 customer accounts. For example, one Ring employee accessed thousands of intimate video recordings from female customers’ bathrooms and bedrooms over a period of months, illustrating just how serious the privacy breaches were. The Ring doorbell security failures represent one of the most significant privacy violations in consumer IoT device history.
Customers purchased Ring cameras believing their video feeds were secure, encrypted, and accessible only to them. Instead, they discovered that Ring had failed to implement basic security measures, stored customer videos unencrypted, gave employees unrestricted access to all footage, and did not implement adequate systems to prevent hacker takeovers. The consequences extended beyond privacy invasion—hackers used compromised Ring cameras to harass customers through two-way audio, targeting elderly individuals and children with racist slurs and threats. This lawsuit and settlement have had lasting implications for consumer privacy standards, leading to changes in how Ring operates and triggering ongoing litigation around biometric data collection practices. Customers affected by these breaches have received compensation through a refund program, though the full scope of the security failures continues to unfold through additional lawsuits.
Table of Contents
- What Happened with Ring’s Privacy Violations and Employee Misconduct?
- The FTC Settlement and Enforcement Action Details
- How Ring Employees and Hackers Compromised Customer Accounts
- The Customer Refund Program and Compensation
- Hacker Harassment and the Scope of Real-World Harm
- The Ongoing Biometric Privacy Lawsuit
- The May 2025 False “Hacking” Claim and Context for Current Ring Users
- Conclusion
What Happened with Ring’s Privacy Violations and Employee Misconduct?
Ring’s security failures began years before enforcement action was taken. For years, Ring employees had “full access” to all customer video footage stored on the company’s servers. These videos were stored unencrypted, meaning anyone with database access could view them without restriction. Unlike most modern security systems that encrypt data both in transit and at rest, Ring’s architecture left customer videos vulnerable. This policy persisted until 2017 and represented a fundamental failure in security by design. The most egregious example of employee misconduct involved a single Ring employee who systematically viewed thousands of video recordings from female customers in intimate settings.
Over months, this employee accessed footage from bathrooms, bedrooms, and other private spaces. Other instances of employee misconduct included viewing customer videos for purposes unrelated to their job duties and accessing footage they had no legitimate business reason to see. The company’s security logs later revealed that this misconduct was widespread and had gone undetected for extended periods, suggesting that Ring had no meaningful monitoring systems in place to detect suspicious access patterns. What made these failures particularly troubling is that they weren’t isolated incidents caused by a single bad employee—they reflected systemic problems in how Ring managed access controls and monitored user activity. The company had no technical safeguards preventing employees from accessing customer data, no audit trails to detect when inappropriate access occurred, and insufficient policies restricting which employees could view customer videos. This represents a comparison to industry best practices, where companies typically implement role-based access control (RBAC), meaning employees can only access data necessary for their specific job function.

The FTC Settlement and Enforcement Action Details
The Federal Trade Commission’s enforcement action against Amazon, finalized in May 2023, resulted in penalties totaling over $30 million. Ring’s doorbell division specifically paid $5.8 million of this settlement. The FTC alleged that Ring violated the Federal Trade Commission Act by making false and unsubstantiated claims about the security and privacy of its devices and services. More significantly, the FTC found that Ring had engaged in unfair practices by failing to implement reasonable security measures despite knowing that customer videos contained highly sensitive and intimate content. The settlement required Ring to implement comprehensive security improvements, including encrypting customer videos, implementing access controls for employees, enhancing monitoring systems to detect unauthorized access, and providing customers with more transparent information about who can access their videos.
However, a significant limitation of the FTC settlement is that it focused on prospective remedies—ensuring Ring changed its practices going forward—rather than comprehensively addressing past violations. While the company was required to pay refunds to affected customers, the settlement did not include punitive damages or acknowledgment of liability, which are common in other privacy settlements. The FTC’s investigation revealed that Ring had received reports of employee misconduct and hacking incidents but failed to take adequate remedial action. In one documented case, Ring became aware that a customer’s Ring account had been accessed by an unauthorized person but did not implement multi-factor authentication or other protective measures across its user base, despite knowing this risk existed. This warning about delayed response is important: even after discovering security breaches, Ring continued operating under the same vulnerable security framework for extended periods.
How Ring Employees and Hackers Compromised Customer Accounts
The breaches affected approximately 55,000 U.S. customers whose accounts were compromised. Hackers gained access to Ring accounts through various methods, including credential stuffing (using previously leaked usernames and passwords from other services), weak passwords, and phishing attacks. Once hackers accessed accounts, they could view live feeds from Ring cameras, control the two-way audio system, and in some cases, access recorded footage. The disturbing part: Ring’s security infrastructure provided no meaningful obstacles to these unauthorized intrusions. Once inside compromised Ring accounts, hackers engaged in direct harassment of customers. In documented cases, hackers accessed Ring cameras in homes with elderly residents and children, using the two-way audio feature to shout racial slurs, make threats, and attempt to intimidate families.
One example involved a hacker accessing a Ring camera in a child’s bedroom and verbally harassing the child. Another case documented hackers making racist statements directed at elderly customers. These incidents weren’t just privacy violations—they constituted criminal harassment and terrorization of vulnerable populations. This represents a significant downside of interconnected home security devices: a single compromised password can give a stranger audio and video access to your most private spaces. The gap between what customers believed their Ring cameras could do and what actually happened is stark. Customers purchased these devices expecting that their video footage would be accessible only to them and select family members they explicitly invited. Instead, Ring employees could view footage at will, and hackers could gain access through relatively simple credential compromise attacks. Ring’s failure to implement basic security measures like multi-factor authentication (which requires a second form of identification beyond just a password) meant that customers were left vulnerable even if they used reasonably strong passwords.

The Customer Refund Program and Compensation
In April 2024, the FTC began distributing refunds to Ring customers affected by the privacy breaches. The refund program issued $5.6 million in total compensation to eligible customers through PayPal payments. The FTC processed 117,044 individual payments to consumers who owned Ring devices during periods when unauthorized access occurred. The average refund per customer was approximately $48, though the amount varied depending on factors such as how long the customer owned a Ring device and when the unauthorized access occurred. To receive a refund, eligible customers had to take action within a 30-day redemption window after notification. This timeframe represents a limitation of the refund program: customers who missed the deadline or didn’t receive notification had no way to claim their compensation.
The FTC mailed notices and sent emails to customers on file, but not all customers received the communications. Those who did not claim their refund within the specified period forfeited the payment. A comparison to other major settlement programs shows that some offer indefinite claim periods, while the Ring program required action within a narrow window. The refund amounts were relatively modest—averaging less than $50 per customer—which raised questions about whether they truly compensated customers for the privacy violations. Customers whose intimate videos were viewed by unauthorized parties might argue that monetary compensation is insufficient to address the harm, though the settlement represented the FTC’s assessment of what constituted fair recompense. The refund program did not provide additional remedies like free identity monitoring, credit monitoring, or other services sometimes offered in data breach settlements.
Hacker Harassment and the Scope of Real-World Harm
The harassment incidents involving compromised Ring cameras demonstrate the real-world consequences of security failures in home surveillance devices. Unlike data breaches where information is stolen and misused, the Ring breaches were interactive—hackers could communicate directly with victims in real time. Documented cases include instances where hackers accessed Ring cameras in homes with children and made threats or inappropriate statements through the two-way audio system. Elderly customers reported being startled and frightened by unknown voices coming through their Ring devices. One particularly troubling aspect is that Ring initially downplayed these incidents as user error, suggesting that customers with weak passwords were responsible for the compromises.
This warning is important: when security failures occur, responsibility lies with the company that failed to implement reasonable protective measures, not the user. Ring later acknowledged this perspective was incorrect and that the company bore responsibility for not implementing basic security features like multi-factor authentication. The warning here extends to consumers: if a company blames you for security breaches resulting from their failure to implement standard security practices, that’s a red flag. The harassment incidents also revealed another downside of Amazon’s ecosystem: Ring’s integration with Alexa and other Amazon services meant that compromised accounts could potentially provide access to broader home automation systems. While documented cases focused on Ring camera access, the theoretical risk of hackers controlling smart locks, lighting systems, and other connected devices added another layer of concern. This underscores why security in IoT devices cannot be treated as an afterthought—a single weak link can compromise an entire smart home ecosystem.

The Ongoing Biometric Privacy Lawsuit
Beyond the FTC settlement, Ring faces additional litigation over biometric data collection practices. A class action lawsuit titled Wise v. Ring LLC, filed in the Western District of Washington (Case No. 2:20-cv-01298), alleges that Ring collected face geometry templates and biometric identifiers from customers without informed consent.
The lawsuit claims Ring violated the Illinois Biometric Information Privacy Act (BIPA), which is one of the nation’s strongest privacy laws regarding facial recognition and biometric data. The lawsuit focuses on Ring’s use of video footage to create facial geometry data—digital representations of face characteristics that can be used for identification purposes. According to the allegations, Ring did this without adequately disclosing the practice to customers or obtaining explicit consent. The case highlights an emerging concern: companies are increasingly extracting biometric data from existing content (in this case, video from doorbell cameras) for purposes beyond the original intended use. This represents an example of mission creep in data collection, where video captured for home security purposes is repurposed for facial recognition development.
The May 2025 False “Hacking” Claim and Context for Current Ring Users
In May 2025, a viral claim spread across social media alleging that Ring doorbells had experienced a mass hack. The claim suggested that thousands of Ring devices had been compromised simultaneously on May 28, 2025. Amazon and Ring investigated the incident and officially dismissed the claim as a technical glitch, not a security breach. The glitch caused some Ring devices to display unusual status notifications or briefly show connection errors, but no actual unauthorized access occurred.
This incident provides important context for current Ring users: while Ring’s historical security failures were real and significant, it’s important to distinguish between actual breaches and technical issues or security theater claims that circulate on social media. The rapid spread of the false claim illustrates how the prior security failures have eroded consumer trust in Ring. Even a routine technical glitch triggered fears of mass compromise because of the company’s documented history. This underscores the long-term reputational damage that security failures cause: it can take years of reliable security before consumers trust again. For current Ring users considering whether to continue using the service, the relevant question is whether Ring has actually implemented the security improvements required by the FTC settlement, not whether every technical hiccup represents a breach.
Conclusion
The Ring Doorbell Security Lawsuit represents a watershed moment in consumer IoT privacy. The case began with a straightforward failure: Ring chose not to implement basic security measures like encryption, access controls, and monitoring systems. That choice had severe consequences—55,000+ customers experienced account compromise, Ring employees accessed intimate videos from customers’ homes, and hackers harassed vulnerable customers including elderly individuals and children.
The FTC settlement required Ring to implement comprehensive security improvements and distribute $5.6 million in refunds to affected customers, though the settlement focused on prospective remedies rather than punitive damages for past violations. If you owned a Ring device during the periods of unauthorized access documented in the lawsuit and have not yet claimed your refund, you should verify whether you are eligible for compensation. The FTC settlement refund program has concluded, but if you believe you were affected and did not receive notification, you can contact the FTC for information about your eligibility. Going forward, the Ring case serves as a reminder that when evaluating smart home security devices, you should assess not just the device’s ability to detect threats, but the company’s security practices for protecting the footage it collects.