Skip to content

Victims of the infamous construction industry blacklisting scandal are to be contacted with details of their involvement, an Information Commissioner's Office (ICO) blog entry has revealed.

The scandal, which took place between 1993 and 2009, saw the Consulting Association compile a database of 3,214 construction workers identified as trade union members or other left-wing ‘troublemakers.’ The blacklist affected the livelihoods of all those implicated, with the involvement of many major construction industry contractors preventing them from finding work.

Since the blacklist came to light in 2009, construction industry unions such as the GMB have worked tirelessly to see victims of the scandal earn restitution from the guilty parties. However, to this day only 467 of the 3,214 victims have been made aware that they were on the Consulting Association list in the first place.

In a major breakthrough for the unions the ICO has agreed to contact a further 1,200 victims of the blacklisting scandal, providing them with details of their involvement and giving them a chance to seek restitution.

ICO deputy commissioner David Smith has said that contacted victims should ‘reply to us (the ICO) and provide some form of identification if they would like us to check whether the information included on the list is about them. If it is, then they will receive a copy of their information.’

This move from the ICO can be seen as an extremely positive step for the construction industry, going some way towards righting the wrongs perpetrated by certain contractors and the Consulting Association during the early part of the 21st century.


Accounting for subcontractors; what they need to know

Accounting for subcontractors; what they need to know

The construction industry relies on subcontractor labour, and ensuring that your firm manages its subcontractors appropriately and effectively is crucial if you are to achieve success down the line. How much accounts information should your subcontractors have access to, and how do you limit that access?

Read more