PogoWasRight.org

Menu
  • About
  • Privacy
Menu

New Philadelphia GameStop Policy Requires Customer Fingerprints When Trading In Games

Posted on August 4, 2014July 1, 2025 by Dissent

Steve Tawa reports:

The big video game retailer, GameStop, is now requiring its customers in Philadelphia, but not in the suburbs, to provide a fingerprint scan on certain transactions.

When GameStop buys used video games from customers, the chain says it is following a local law that allows the store to collect thumb prints, which go into a database to help law enforcement track down thieves who fence stolen goods.

City Solicitor Shelley Smith says, however, the city is not requiring GameStop to abide by the pawnbroker’s ordinance:

“What GameStop does doesn’t meet any of the elements of the definition in the code, so the pawnbreaker ordinance doesn’t apply to GameStop.”

Read more on CBS Philly.

Thanks to Joe Cadillic for this link.

No related posts.

Category: Business

Post navigation

← NZ: School plans microchip bracelets
Brazilian Web Provider Fined $1.6 Million For Selling Browsing Data to Advertisers →

Now more than ever

Search

Contact Me

Email: [email protected]

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

Categories

Recent Posts

  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • How to Build on Washington’s “My Health, My Data” Act

RSS Recent Posts on DataBreaches.net

  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
©2025 PogoWasRight.org. All rights reserved.