Ethics and Professional Conduct in Debt Management Debt management sits at the sharp edge of tax administration: it blends coercive state power (collection and enforcement) with high‑sensitivity data (financial identity, income, liabilities, enforcement status).
1

Context

Tax practitioners and ZIMRA officers involved in debt management must uphold rigorous ethical and professional standards, balancing the imperative to collect revenue with the obligation to respect taxpayer rights.

2

Legislation

Professional conduct obligations arise from the ZIMRA Act [Chapter 23:11], the registered tax practitioners framework, professional body codes of ethics, and Zimbabwe's anti-corruption and public integrity legislation.

3

Concepts

This lesson covers the duty of confidentiality in debt proceedings, prohibition on inducements and conflicts of interest, the proper and proportionate use of enforcement powers, taxpayer rights during collection, and whistleblowing protections.

Context
Legislation
Concepts

Executive summary

Debt management sits at the sharp edge of tax administration: it blends coercive state power (collection and enforcement) with high‑sensitivity data (financial identity, income, liabilities, enforcement status). In most systems, ethical failures in debt collection cluster around five recurring risks: unlawful disclosure or misuse of taxpayer information; disrespectful or unfair treatment of taxpayers; abuse of authority (using powers for improper purposes); unmanaged conflicts of interest; and weak controls that enable fraud, bribery, or retaliatory behavior. Modern tax systems respond by combining (a) tax‑specific secrecy laws (e.g., U.S. Internal Revenue Code §6103; U.K. Commissioners for Revenue and Customs Act 2005 (CRCA) s18; Canada Income Tax Act (ITA) s241; Australia Taxation Administration Act 1953 Sch 1 Div 355; South Africa Tax Administration Act 2011 s69; New Zealand Tax Administration Act 1994 s81) with (b) general data‑protection laws (e.g., UK data protection framework; Australia’s Privacy Act 1988 and Australian Privacy Principles; Canada’s Privacy Act; South Africa’s POPIA; New Zealand’s Privacy Act 2020).

A second pillar is codes of conduct and taxpayer‑rights instruments that prescribe “how” powers must be used: U.S. Taxpayer Bill of Rights and Publication 1 describe rights that apply during collection; the HMRC Charter is a statutory requirement under CRCA 2005; the ATO Charter sets service commitments; the CRA Taxpayer Bill of Rights includes a right to privacy and confidentiality and to professional, courteous, fair treatment.

For instructors, the most teachable throughline is a two‑layer test for any debt‑management action: (1) legal authority (is it authorized by statute/delegation and used for a proper purpose?), and (2) ethical defensibility (is it necessary, proportionate, fair, and documented, with privacy safeguards and conflict‑of‑interest controls?). Tax authorities explicitly frame disclosure decisions in those terms: HMRC’s information‑disclosure guide emphasizes lawful authority and proportionality, and ATO publishes formal procedures for disclosing protected information under its secrecy regime.

Disclaimer (educational). This lesson is for training/educational use and is not legal advice. Rules, penalties, and notification duties must be verified for the applicable jurisdiction, tax type, and agency delegations.

Learning objectives and instructor delivery script

Learning objectives

By the end of a 60–90 minute class, learners should be able to:

Distinguish tax‑specific secrecy rules from general privacy/data‑protection obligations and apply “need‑to‑know” and lawful disclosure tests to common debt‑recovery scenarios.

Identify professional conduct expectations that inform debt collection behavior (fairness, courtesy, sensitive handling, proper recordkeeping) using taxpayer charters and public‑service codes.

Recognize and mitigate abuse‑of‑authority patterns (improper purpose, retaliation, unauthorized access, intimidation, selective treatment) using documented safeguards and supervisory controls.

Spot conflicts of interest in debt recovery and apply disclosure/recusal rules grounded in representative statutes and codes (e.g., U.S. 18 U.S.C. §208; APS Code of Conduct; Civil Service Code), without assuming a single jurisdiction.

Draft compliant communications and internal records: a taxpayer‑sensitive call script, a conflict‑of‑interest disclosure, and an incident report, with audit‑ready reasoning and preserves privacy.

Instructor script with time allocations for a 75‑minute session

Opening and framing (0–8 min). “Debt management is where state power meets financial vulnerability. Today we learn the rules that protect taxpayers and protect staff from wrongdoing allegations—confidentiality, conduct, conflicts, and anti‑corruption controls.” Anchor with two published standards: Tax secrecy is statutory (e.g., CRCA s18; IRC §6103) and taxpayer rights apply in collection interactions (IRS Publication 1 / TBOR).

Module A—Confidentiality (8–23 min). Define taxpayer information; run a 3‑question disclosure test; show “need‑to‑know” controls from CRA; show ATO disclosure procedures as an example of pre‑approval routing.

Module B—Conduct and abuse of authority (23–43 min). Use taxpayer‑charter commitments (HMRC, ATO, CRA, IRS) and the Civil Service Code’s “do not misuse your official position” line to translate ethics into behavioral rules.

Module C—Conflicts of interest and anti‑corruption controls (43–58 min). Apply conflict scenarios: family business, gifts, side jobs, practitioner relationships, and “who benefits from a settlement.” Use U.S. conflict statute and public‑integrity standards (OECD; UNCAC) to show why controls exist.

Module D—Incident response workflow (58–68 min). Walk learners through the allegation‑to‑resolution flowchart; emphasize log preservation, separation of duties, and notification duties where required (e.g., NZ notifiable privacy breaches framework; CRA breach‑investigation model).

Activity + quick assessment (68–75 min). Mini‑case: “accidental voicemail disclosure,” “officer searches neighbor’s tax account,” or “gift offered to pause collection.” Learners complete a one‑page incident report + corrective actions checklist.

Topic modules with rules, breach triggers, and safeguards

Confidentiality of taxpayer information

Key principle. Taxpayer information should be accessed and disclosed only for authorized purposes and only to those with a lawful right to receive it. Statutes articulate this as a general prohibition with enumerated exceptions: IRC §6103 begins with a confidentiality rule; CRCA 2005 s18 prohibits disclosure of HMRC‑held information except via lawful gateways; ITA s241 prohibits officials from knowingly providing or allowing access except as authorized; SARS secrecy in s69 and NZ s81 similarly impose secrecy duties.

Practical rule set instructors should teach (portable across jurisdictions). A debt officer must be able to answer “yes” to all three questions before access or disclosure:

Is the access/disclosure for a legitimate tax‑administration purpose within my duties (audit/collection, authorized support, or a defined gateway)? For HMRC, lawful disclosure is controlled by CRCA and HMRC emphasizes staff must not disclose without lawful authority; verifying info someone already holds can still be a disclosure.

Is the recipient entitled (taxpayer or authorized representative) or is there a statutory gateway? CRA emphasizes information is shared only with the taxpayer or authorized third party except where authorized by law, and it prohibits voicemail messages containing taxpayer information.

Is the disclosure minimal, necessary, and secure? CRA describes encryption and restrictions on sending Protected information externally by email; ATO publishes procedures to satisfy statutory obligations for disclosing protected information.

Typical breach triggers (debt‑management context). “Curiosity browsing” (accessing accounts not assigned), unsafe communications (voicemail/email), informal sharing with other departments without gateways, and “identity verification shortcuts” that reveal sensitive facts to a caller before confirming authority. CRA labels unauthorized access as accessing information outside one’s assigned workload and uses proactive detection tools to verify real‑time access appropriateness.

Discipline and remedies (teach as consequences mapping). Unauthorized disclosure may trigger employment discipline and, in many systems, criminal and civil consequences. U.S. IRC §7213 establishes felony penalties for unauthorized disclosure, and §7431 permits a civil damages action for unauthorized inspection/disclosure; HMRC materials note criminal offence under CRCA s19 with imprisonment and fines; CRA states disciplinary action up to termination and potential criminal referral for suspected criminal acts.

Professional conduct in tax enforcement

Key principle. Ethical enforcement is firm but fair: it combines lawful authority with respectful, impartial service. Taxpayer charters and public‑service codes translate this into enforceable expectations.

CRA’s Taxpayer Bill of Rights includes the right to be treated professionally, courteously and fairly (and explicitly references CRA employee conduct codes).

IRS TBOR and Publication 1 include rights relevant during collection, including fairness and the “right to a fair and just tax system.”

HMRC Charter is a legal requirement under CRCA 2005 and must include aspirational standards of behavior and values.

The UK Civil Service Code requires staff to deal with the public “fairly… promptly… effectively and sensitively,” and reinforces accurate recordkeeping and lawful handling of information.

Practical conduct standards for debt officers (explain as “behavioral controls”). A compliant enforcement interaction should be traceable in the file: accurate notes, clear explanation of the debt basis, respectful language, and a documented escalation path (review, complaint, appeal). These align with IRS Publication 1’s taxpayer‑rights framing and CRA’s service rights.

Common pitfalls. Over‑reliance on pressure tactics, uneven treatment of similarly situated taxpayers, and inadequate recognition of vulnerability. ATO’s charter explicitly includes options if taxpayers are not satisfied and provides “support for people experiencing vulnerability” as part of its charter suite (useful for teaching vulnerability detection and referrals).

Avoiding abuse of authority

Key principle. Powers must be used for proper purposes, proportionately, and without retaliation. In common‑law settings, this aligns with broader administrative‑law norms; in training, anchor this with explicit code text.

The Civil Service Code gives clear “do not” rules: do not misuse official position (including using information acquired at work to further private interests), do not accept gifts or hospitality that might compromise judgment, and do not disclose official information without authority.

Case‑anchored illustration (confidentiality vs public pressure). In South Africa, the Constitutional Court litigation around Public Protector v CSARS focused on whether subpoena powers could override statutory secrecy; the court materials reflect that s69 secrecy can justify withholding taxpayer information absent a statutory exception. This is a strong teaching example of “legal duty to refuse” even where disclosure might seem politically or socially demanded.

Abuse triggers specific to debt management. Selective “pause” or “accelerate” decisions for personal motives; retaliatory liens/garnishments; “off‑book” settlements; coercing cash payments; and manipulating write‑off/remission recommendations for favoritism. Teaching point: these risks are why robust approvals, audit trails, and segregation of duties are non‑negotiable (see OECD Public Integrity guidance on systematic, risk‑based integrity strategies).

Conflict of interest in tax recovery

Key principle. Conflicts can be financial, relational, or reputational; the ethical standard is usually “disclose and resolve,” not “hide and hope it’s fine.”

Representative statutory/codified models (illustrative only): - U.S.: 18 U.S.C. §208 prohibits federal employees from participating personally and substantially in matters where they (or imputed persons) have a financial interest; implementing ethics regulation explains the prohibition and exemption mechanics. - Australia: APS Code of Conduct requires employees to disclose and take reasonable steps to avoid real or apparent conflicts of interest. - UK: Civil Service Code frames integrity as putting public obligations above personal interests and explicitly prohibits misuse of position and compromised judgment via gifts/hospitality. - Canada: Values and Ethics Code for the Public Sector sets values/expected behaviours guiding officials; Treasury Board FAQ notes breaches can result in discipline up to termination.

COI “red flags” for debt teams (teach as a quick diagnostic): Family/friend’s entity appears in your assigned portfolio; you hold a private debt claim against the taxpayer; gifts offered during a payment negotiation; you previously worked for the debtor’s accounting firm; or you have side employment in debt collection/credit services. These patterns map directly to the “financial interest” and “appearance” concerns that public service codes and ethics statutes target.

Ethical treatment of taxpayers

Key principle. Debt collection must respect taxpayer rights and dignity, and must not exploit informational or power asymmetries. Teach “ethical treatment” as a documented service behavior, not merely interpersonal kindness.

CRA’s Taxpayer Bill of Rights includes rights to privacy and confidentiality and to professional, courteous, fair treatment; IRS TBOR describes fundamental rights when interacting with the IRS, including fairness and the right to be informed; ATO’s charter and HMRC’s charter set service commitments and complaint options.

Practical implications in a debt case. Ethical treatment means: explain the basis of debt and options; offer review/appeal paths; avoid disclosing sensitive facts in shared spaces; and accommodate reasonable communication needs (language, disability, vulnerability) where the system provides such support. Publication 1 explicitly describes rights in the collection process, and ATO’s charter suite highlights support for vulnerable customers.

Procedures, templates, and controls toolkit

Staff checklist for every debtor contact

Before contact: confirm identity and authority; use “minimum necessary” information; confirm whether a representative is authorized (CRA frames sharing with an authorized third party as the lawful route). During contact: use a standardized script (below), avoid voicemail with taxpayer information (CRA’s explicit practice), document the interaction. After contact: log actions, store documents under correct security marking/classification, and escalate any unusual payment offers, gifts, or attempted inducements under gifts/hospitality policy.

Manager checklist for alleged misconduct or privacy breach

Immediate containment: restrict access, preserve logs/audit trails, and prevent further disclosure. CRA describes dedicated teams for unauthorized access/breaches and proactive detection, offering an “operational model” for containment and investigation. Triage and classification: determine whether the event is (a) unauthorized access, (b) unauthorized disclosure, (c) conflict‑of‑interest breach, (d) coercion/bribery attempt, or (e) conduct complaint. Investigation: assign independent investigator; ensure segregation of duties and avoid investigator COI. OECD Public Integrity guidance emphasizes systematic, risk‑based integrity controls and accountability mechanisms. Notifications: follow local breach-notification rules. New Zealand’s Privacy Act 2020 contains notifiable privacy breach duties (agency notification to Commissioner and affected individuals/public notice, subject to statutory exceptions), useful as a teaching exemplar of “mandatory notification architecture.” Outcome and remediation: document findings, corrective actions (training, policy change), and discipline process; refer suspected criminal acts to law enforcement where required (CRA explicitly references referral of potential criminal acts to RCMP).

Mermaid flowchart from allegation to investigation to resolution and appeal

flowchart TD A[Allegation or indicator
privacy breach / abuse / COI / misconduct] --> B[Immediate containment
restrict access, preserve logs] B --> C[Triage classification
Access? Disclosure? COI? Conduct? Bribery attempt?] C --> D[Assign independent investigator
check investigator COI] D --> E[Evidence collection
system logs, case file notes, comms, witness interviews] E --> F{Notifiable breach / mandatory report?} F -- Yes --> G[Notify regulator + affected persons as required
document timing and content] F -- No --> H[Continue internal investigation] G --> H H --> I[Findings report
facts, rule breaches, risk rating, recommendations] I --> J{Decision authority} J --> K[Disciplinary action / referral
HR, professional body, police (if required)] J --> L[No breach substantiated
close with documentation] K --> M[Remediation plan
training, control changes, monitoring] L --> M M --> N[Communication to complainant
outcome + review/appeal route] N --> O[Appeal / review / oversight route
(jurisdiction-specific)] O --> P[Close and retain records
audit-ready]

Anti-fraud and anti-corruption controls tailored to debt management

Debt management is unusually bribery‑susceptible because staff can influence outcomes (timing, enforcement intensity, write‑off recommendations). International integrity frameworks encourage risk‑based controls that reduce opportunities and strengthen accountability (OECD Public Integrity Recommendation and Handbook; UNCAC’s emphasis on public‑official codes and anti‑corruption measures).

Confidentiality agreement clause for debt staff

Clause (template): “I acknowledge that taxpayer information and tax‑administration information are confidential. I will access and use such information only for authorized duties and will not disclose it without lawful authority. I understand that unauthorized disclosure may result in disciplinary action and may constitute a criminal offence under applicable tax secrecy laws.”

Annotation for instructors: Use this clause to connect employment obligations to statutory secrecy regimes. HMRC guidance notes new staff sign confidentiality declarations (linked to CRCA obligations), while CRA explicitly ties security to the CRA Code of Integrity and Professional Conduct and states discipline can include termination; U.S. codes provide criminal/civil consequences under IRC §§7213/7431 and confidentiality under §6103.

Conflict-of-interest disclosure form

Fields (template): Employee name/role; date; case reference(s) affected; COI type (financial interest, family/relationship, gift/benefit, side employment, prior employment); description; steps taken (disclosure, recusal, reassignment); manager decision; mitigation plan; follow‑up review date.

Annotation: This structure mirrors statutory/coded expectations: APS Code requires disclosure and reasonable steps to avoid COI; U.S. ethics rules prohibit participation where a financial interest exists; UK Civil Service Code defines integrity and prohibits misuse of position.

Taxpayer-sensitive communication script (call or letter snippet)

Script (template): “Hello, my name is [name] calling from [agency]. Before we discuss your account, I need to confirm your identity and authority to speak on this matter. I can explain the amount due, the time period, and your options, including how to request a review or make a complaint if you believe something is wrong.”

Annotation: This supports charter‑based expectations: CRA TBOR emphasizes courteous, fair treatment and privacy; IRS Publication 1 is designed to inform taxpayers of rights in examination/collection; CRA security guidance emphasizes identity‑safe communications (no sensitive voicemail; controlled disclosure).

Internal incident report template

Fields: Incident type; date/time; reporter; affected taxpayer(s); systems accessed; description; immediate containment actions; evidence preserved (logs, emails); preliminary assessment (unauthorized access vs disclosure); potential notification obligations; referrals (HR/legal/police); corrective actions; closure notes.

Annotation: Model this on CRA’s described practice of dedicated teams investigating breaches and potential taxpayer notification; incorporate NZ Privacy Act 2020’s “notifiable privacy breach” concept as an exemplar of mandatory breach response discipline (even if local law differs).

Classroom activities, discussion questions, and assessment tasks

Classroom activities

Scenario lab: “The three disclosure gates” (15 minutes). Provide three mini‑scenarios: (a) spouse calls about partner’s debt; (b) police request debtor address; (c) another government department asks for debt status. Learners apply the 3‑question disclosure test and decide: disclose, refuse, or escalate for legal gateway review. Anchor to statutory confidentiality frameworks (CRCA s18 gateways; ITA s241 exceptions; IRC §6103 authorized disclosures) without assuming one jurisdiction.

Role-play: “Firm but fair enforcement” (10 minutes). Pairs practice a collections call using the taxpayer-sensitive script, then peer‑assess against charter standards (courteous, fair, privacy‑safe). Use IRS TBOR/Publication 1 and CRA TBOR for scoring anchors.

COI triage drill (10 minutes). Students classify COIs and choose mitigation: disclose/recuse/reassign. Use APS “disclose and avoid” rule and U.S. conflict statute as exemplars.

Discussion questions

How do you distinguish “necessary disclosure for administration” from convenience‑based disclosure? Use HMRC’s emphasis on lawful authority and proportionality and ATO’s structured disclosure procedures as the baseline.

When is it ethical to escalate enforcement quickly (e.g., lien/levy equivalents) and when does that become abusive? Tie arguments to taxpayer charters and fairness commitments rather than personal intuition.

Why do integrity frameworks focus on systemic controls (segregation of duties, audit trails) rather than “trust in good people”? Use OECD Public Integrity Recommendation/Handbook and UNCAC’s framing of integrity and anti‑corruption measures.

Assessment tasks with marking scheme

Assessment (25 marks): Ethics incident + remediation plan (in-class or take-home) Learners receive a fact pattern: a debt officer accessed a celebrity taxpayer’s file outside assignment and discussed “they owe a lot” with a friend. Students produce:

1) Legal classification (8 marks): identify unauthorized access and disclosure issues and cite at least one secrecy authority from an exemplar jurisdiction (e.g., IRC §6103; CRCA s18; ITA s241; Div 355; s69; s81). 2) Incident report (7 marks): complete the template fields with containment, evidence preservation, and notification consideration (use CRA and NZ exemplars). 3) Corrective action plan (6 marks): propose 3–5 controls (need‑to‑know, detection tools, training, disciplinary routes, COI screening if relevant) aligned to published control models. 4) Professional conduct reflection (4 marks): identify how taxpayer charter principles were violated and how to restore trust (service standards, apology channels, complaint mechanisms).