Eight overlooked tax issues in family law
InsightExplore eight often overlooked tax issues impacting asset division and liabilities in family law.
Federal Budget Virtual Seminar: expert insights on spending, tax reform and policy impacts. Register now.

Procurement remains one of the most persistent and high‑risk areas for fraud, corruption and governance breakdown – not only because it involves large sums of money, but because it sits at the intersection of delegated authority, supplier relationships, documentation standards, time pressure and human behaviour, often with uneven oversight.
Procurement misconduct is rarely a single dramatic act; often it is consistent and repeatable. Procurement misconduct often appears procedurally sound until patterns, relationships and context are put under the microscope. Matters are frequently unsophisticated once uncovered – yet persistent – and commonly driven by undisclosed or under‑disclosed conflicts of interest.
These schemes exploit the same weaknesses: erosion of process discipline under urgency, weak due diligence, over‑delegation and poor record‑keeping. Detection is typically late, with external data reinforcing that fraud is widespread, deception‑based and often identified after the fact through automated controls. Critically, investigation quality itself is a risk – procedural fairness, evidence preservation and clear separation between investigation and disciplinary action determine whether outcomes are defensible.
Procurement integrity has moved from being a ‘procurement function issue’ to a system‑level governance issue. The macro environment is signalling converging pressures.
Procurement integrity is increasingly viewed as a system‑level governance issue rather than a functional concern. Recent commentary from Transparency International Australia, including Australia’s Corruption Perceptions Index results, has been framed as a ‘wake‑up call’, highlighting ongoing concerns about accountability and integrity settings.
For procurement, this signal is particularly acute. Procurement represents one of the most visible points of public trust, combining high‑value decisions, private counterparties, delegated authority and strong incentives for misconduct.
ABS personal fraud data shows fraudulent deception is widespread across the community and often difficult to recognise. This matters for organisations because procurement schemes frequently rely on the same techniques, including false documentation, impersonation, false billing and payment manipulation.
The ABS notes that fraud is challenging to detect and likely under‑reported – a pattern that mirrors procurement misconduct – which typically remains embedded in routine processes until controls or scrutiny intervene.
Evidence from the Australian Institute of Criminology indicates that once fraud enters government systems, it concentrates in procurement. Critically, detection is most often automated and occurs after the fact, reinforcing that misconduct is commonly identified only once it has already passed through decision‑making and payment processes.
Procurement integrity extends beyond fraud and corruption to include competition integrity. The ACCC identifies bid rigging and collusive tendering as core cartel risks, placing procurement at the intersection of governance, fraud and competition law.
Procurement misconduct takes many forms, but in practice it concentrates around a small number of recurring schemes. These schemes often appear procedurally compliant until patterns, relationships and outcomes are examined over time. The consolidated scheme map below reflects the most common misconduct structures observed across procurement lifecycles, together with the indicators that typically emerge as matters escalate.
Procurement decisions are influenced by undisclosed interests held by officials or executives, shaping tender design, evaluation or contract management. This conduct often persists because it initially appears administrative, only crystallising into fraud once concealment or non-disclosure is established.
Indicators include hidden employee supplier relationships, criteria tailored to favour a related entity, competition narrowed or bypassed, informal contract oversight, value expansion through variations, and benefits justified through weak commercial narratives.
Competition is deliberately manipulated to control outcomes, often through weakened procurement pathways, tailored specifications or coordinated supplier behaviour that preserves the appearance of competition.
Indicators include discretionary high value tenders, substitution of formal processes with limited or urgent approaches, shaped access or evaluation criteria, positioning of preferred suppliers, and post award value extraction through variations or permissive contract management.
Legitimately awarded contracts are expanded through repeated scope changes that inflate pricing without retendering. These matters frequently present as commercial disputes before patterns of unjustified variations, overridden approvals and ignored warnings become apparent.
Indicators include repeated urgency driven scope changes, managed approval thresholds, poor audit trails, material escalation of contract value, avoidance of retendering and deepening supplier dependence.
Payments are made for goods or services not delivered, overstated, or duplicated, typically enabled by weak matching and approval controls. While individual invoices may appear erroneous, repetition establishes intent.
Indicators include vague invoice descriptions, incomplete documentation, weak purchase order and receipt matching, rubber stamp approvals, repeated anomalies and concealment through altered records or banking changes.
Benefits such as cash, gifts or travel are provided in exchange for favourable procurement or contract management decisions. These benefits are commonly disguised as consulting fees, commissions or subcontracting arrangements and processed through accounts payable.
Indicators include supplier provided benefits, steered decisions, weak challenge to invoices or variations, overlooked performance issues, circular payment flows through intermediaries and normalised records with limited detail.
Procurement is structured to remain below delegation thresholds, avoiding scrutiny and competition while cumulative spend escalates beyond governance triggers.
Indicators include deliberate scope fragmentation, substitution of RFQs or direct awards for tenders, repeated awards to the same supplier, concentrated spend and further value growth through extensions and variations.
Small or low capability suppliers are used on low scrutiny work to build an apparent track record, later leveraged to justify larger contracts without refreshed due diligence.
Indicators include early micro contracts, rapid experience accumulation, stale due diligence, reliance on familiarity, reduced competition and subsequent award of larger contracts with limited challenge to scope or value for money.
Rather than wholesale policy rewrites, experience shows that targeted policy uplift is more effective and sustainable. Incremental strengthening is more likely to gain organisational traction and can be positioned as reducing regulatory and audit vulnerability, evidencing ethical procurement, and supporting a defensible value for money rationale.
Cultural settings are equally critical. Strong procurement integrity depends on an ethical, speak‑up culture where individuals are alert to misconduct risks and empowered to challenge inappropriate behaviour. Preventive focus also extends to entry controls, with inadequate credential checks and false qualifications repeatedly emerging as early enablers of procurement failures.
These schemes persist because the same control points fail. In practice, effective control frameworks focus on preventing conflicted decisions at source, making manipulation difficult to conceal, and surfacing anomalies early enough to contain loss.
| Risk pattern | Controls that help | Practical data tests / indicators |
|---|---|---|
|
Conflict of interest / related parties |
Verified COI declarations; supplier beneficial ownership checks; segregation of duties for evaluation and approvals; mandatory recusal and independent probity oversight for high‑risk categories. |
Match employee ↔ supplier addresses, phone numbers and bank accounts; check repeat decision‑makers linked to the same vendors; identify sudden vendor creation and rapid spend growth. |
|
RFQ substitution / order splitting |
Clear thresholds and mandatory escalation; enforced aggregation rules (same project/category/supplier); exception reporting to governance forums. |
Cluster POs by supplier/category/time window to detect repeated sub‑threshold purchasing; monitor exception codes and ‘urgent’ rationales. |
|
Tender manipulation / collusion |
Tender integrity protocols; restricted access to tender info; bid‑rigging awareness; independent evaluation panels; structured debrief records; escalation triggers for limited bids. |
Screen for bid rotation, identical pricing patterns, unusual subcontracting between bidders, or repeated ‘losing’ bids by the same firms; compare IP metadata / document similarities where available. |
|
Variation / change order abuse |
Variation governance with independent commercial review; scope control; variation caps and retender triggers; locked approval workflows with audit logs. |
Identify contracts where variations exceed thresholds (e.g., 30 per cent, 50 per cent, 100 per cent); detect approvals modified after the fact or reassigned; trend ‘time and materials’ expansions. |
|
Invoice fraud / duplicate billing |
Three‑way matching (PO/receipt/invoice) where feasible; mandatory supporting documentation; vendor bank detail change controls; payment run anomaly detection. |
Duplicate invoice number/date/amount tests; weekend/after‑hours approvals; round‑dollar invoices; multiple invoices just below review thresholds; bank account reuse across vendors. |
|
Kickbacks disguised as fees |
Gifts and benefits controls; scrutiny of consulting/subcontracting arrangements; conflict‑aware contract management; periodic vendor and employee lifestyle/benefits declarations where appropriate. |
Identify unusual commissions, vague consulting descriptions, or subcontractors linked to employees; correlate contract performance issues with repeated payment approvals. |
Investigations most often succeed or fail at the earliest stages. Behavioural indicators frequently emerge before any financial anomaly and are often the first warning signs of procurement misconduct. Individuals displaying excessive confidence, a willingness to override process in the name of delivery, or repeated justification of exceptions and urgency commonly feature in early stages. Resistance to scrutiny, documentation or independent review is another recurring signal. These risks are amplified where contractors are involved, as contractors may not be subject to the same cultural expectations or organisational accountability as employees.
Evidence risk is frequently underestimated. Critical evidence extends beyond documents to include communications across email, collaboration platforms and finance systems, as well as system logs, audit trails and metadata. Once concerns are identified, records can be altered quickly, particularly within finance or accounts payable functions, eroding evidentiary integrity. Technical weaknesses compound this risk where systems lack reliable audit trails or do not clearly attribute changes to individuals, requiring corroboration from access logs, physical security records or other contextual data.
Investigation readiness is therefore central to containment. Effective responses prioritise early triage to define scope, risks and reporting obligations, alongside rapid evidence preservation through legal holds over key custodians and systems. Clear decision logs documenting who decided what, when and why are critical to defensibility, as is early selection of the appropriate investigation model, whether a governance review, fact‑finding exercise or privileged legal investigation.
When procurement concerns arise, the way an organisation investigates can determine outcomes as much as the underlying facts. Effective investigations are anchored in procedural fairness, disciplined evidence handling and decisions that can be clearly explained and defended.
Procedural fairness must be applied throughout the investigation and not treated as a final step. Decisions should be grounded in evidence rather than assumption or speculation, with active steps taken to avoid bias in process design and execution and to ensure affected parties have a consistent opportunity to respond.
Evidence discipline requires a focus on relevance, proof and contemporaneous records. Quality, not volume, determines defensibility. Evidence should clearly support findings, and admissions should only be relied upon where they are voluntary and free from inducement or pressure.
Findings are made on the balance of probabilities, calibrated to the seriousness of the allegations, without elevating the standard to a criminal threshold. Early missteps frequently undermine otherwise sound investigations. These commonly arise through delayed or incomplete reporting where reasonable grounds exist, poorly defined scope that creates evidentiary gaps, and failures to preserve systems, records and communications at the outset.
Grounded in an emphasis on early triage, defensibility, reporting obligations and evidence preservation, the following practical response model applies.
Procurement disputes and investigations rarely involve a single dramatic act. They more commonly evolve through accumulated governance gaps, control weaknesses, poor documentation and delayed decision making. Acting early, preserving evidence and responding proportionately is consistently more effective in containing risk and preventing escalation.
In practice, this requires clear visibility over where discretion is exercised, particularly the use of RFQs, direct awards and urgent exceptions, supported by exception metrics reported to executive risk forums. Conflict management must move beyond collection to verification, with refreshed declarations in high-risk areas and targeted checks of related parties and beneficial ownership where relevant. Variation governance should be structured and disciplined, with clear retender triggers and independent review for high value or high frequency changes. Vendor master and payment controls require hardening through bank detail change controls and routine duplicate and anomaly testing. Investigation readiness should be tested regularly, including the ability to preserve communications, approvals and audit logs within days, and the clear separation of investigation and disciplinary functions.
Ultimately, the effectiveness of these measures is anchored in culture. Ethical procurement settings that promote accountability, transparency and early challenge are the foundation on which integrity controls operate and are sustained across the organisation.
Explore eight often overlooked tax issues impacting asset division and liabilities in family law.
Post-acquisition disputes can significantly impact the success of a transaction and the ongoing success of the businesses involved. Read about practical insights into common post-acquisition dispute issues and how to address them proactively, particularly through the financial due diligence and deal advisory process.
For accounting experts, one of the key factors surrounding any valuation assignment stems from the concept or meaning of value (often referred to as the Basis of Value) to be applied, as these can have different meanings depending on the context or circumstances where it is applied to a valuation engagement.