Your shopping cart doesn't have any products yet!!

We are a localized enterprise service platform in Vietnam.

share

Handbook | New Processes and Approaches in Tax Audit, Invoice Checking and Tax Risk Management

  • Aug 27, 2025
  • General knowlegde

In the past, the tax inspection process often focused on checking each item individually, sometimes causing inconvenience to businesses and time consuming. But now, the Tax Authority has switched to using information technology to manage tax data and invoices synchronously, creating favorable conditions for analysis, assessment and risk classification for businesses. .

Below are the major changes in the processes and approaches to tax audit and tax administration.

  • Major changes in processes and approaches to tax audit and tax administration
  • Trends in changes related to the tax examination and analysis process
  • The way that businesses need to approach appropriately and change their thinking in the matter of tax obligations

1. Build a centralized taxpayer database

1.1. Build a centralized taxpayer database

Information technology helps to synthesize and manage tax and invoice data accurately and efficiently, thereby creating a clear view of the financial position of the business.

  • Tax authorities develop a database of taxpayers that is built and managed centrally at the General Department of Taxation
  • Deploying a centralized electronic invoice management and database system at the General Department of Taxation

1.2. Building data analysis tools based on information technology (AI)

By using technology to analyze data, Tax Offices can create early indications of potential tax and financial problems, the following tools are in place:

  • The application supports the whole test to evaluate and select high-risk taxpayers. See the detailed article of Decision 970/QD-TCT on Tax Inspection Process (Effective from 14/07/2023) and The application supports the whole test
  • Electronic invoice data analysis system in order to evaluate and identify enterprises showing signs of risks in the management and use of invoices. See detailed article Deployment of database analysis and e-invoice management system

2. Data communication and data collection outside the tax authority

The sources and methods of collecting information on tax obligations are applied as follows:

2.1. Collecting information in tax authorities

Including information within the scope of collection and management of tax authorities, that is: Tax registration information; information on the identities of the founding members, owners and legal representatives of taxpayers; Information about affiliate transactions…

2.2. Collecting taxpayer information from agencies other than tax authorities

Information collected from relevant state management agencies, organizations and individuals responsible for providing, including:

  • Information about taxpayers from the bank; Card-looking Things to know about providing banking transaction data to tax authorities
  • Information about Labor; Social insurance. View Post Data sharing between Social Insurance (SI) and Tax Authority
  • Information from relevant ministries and agencies and Information from foreign countries and international organizations.

3. Analyze, evaluate and audit taxes based on tax risk classification

3.1. Analysis - evaluation

The Tax Office can identify businesses that are more at risk and focus their checks on the most important issues.

The assessment and supervision activities of tax authorities include:

  • Collect, process, manage and use information related to taxpayers for risk management.
  • Assess tax compliance and classify taxpayers' risk.
  • Apply tax management professional measures corresponding to the level of tax compliance and taxpayer risk.
  • Regulations on criteria, indicators of compliance assessment criteria and risk classification of taxpayers as businesses and individuals.

The principles of management and control are as follows:

The tax authority shall base itself on the results of the assessment of compliance with the above-mentioned tax laws and professional information at the time of decision-making to determine a list of taxpayers classified by risk levels in each period.

The list of taxpayers at risk according to the above cases is updated on the risk management application in tax management.

a) High risk: Review, check, verify; Inspection, testing

b) Medium risk: Randomly selected to be included in the list of review, check and verify; Continue to perform risk classification for the next assessment period

c) Low risk: Save records, perform risk classification for the next audit period.

In case of high compliance: Include in the list to consider, choose to commend and reward taxpayers who comply with tax laws.

See detailed instructions: Tax risk assessment and key monitoring of taxpayers applied from July 02, 07 

3.2. Tax audit based on risk classification

In order to quickly check for at-risk taxpayers, tax authorities apply "The application supports the whole test" with the following procedure:

Step 1: Check tax records: No later than 25 days after the deadline for filing tax returns, tax officials assigned to tax audits shall use test application software to check and make a list of high-risk taxpayers.

Step 2: Processing test results and notifications: For tax records that are assessed as having a high total risk score, a list will be generated on the application to perform an inspection at the tax office. At the same time, the results from this inspection step will be combined with the inspection plan and the inspection plan at the tax office. 

As such, this process helps tax authorities focus on quickly checking taxpayers who are at high risk for tax compliance through the use of the Full Check Support App. This enhances the ability to manage and handle potential tax violations.

4. Monitor sales transactions closely through the electronic invoice system

4.1. Electronic invoice analysis and management system:

The General Department of Taxation deploys a system to analyze and manage electronic invoices of taxpayers.

This system will be able to compare electronic invoice data with tax declarations, evaluate invoice usage, localize doubts and warn of risks.

See detailed article Deployment of database analysis and e-invoice management system

4.2. Apply coefficient K to check invoices exceeding safety threshold

On June 14, 6, the General Department of Taxation issued Official Dispatch 2392_TCT_QLRR dated June 14, 6 on checking electronic invoices, thereby proactively checking taxpayers who issue invoices that exceed the safety threshold.

In particular, the General Department of Taxation stated that it has built functions on the electronic invoice application to meet the requirements of controlling electronic invoices and preventing the issue of false invoices. Some main functions are as follows:

– The system automatically controls the total value of goods sold on issued invoices compared to the threshold value of input goods calculated as K times the total value of inventory and total value of purchased goods. .

– The warning system operates according to parameter K.

How to calculate K coefficient

Based on Official Dispatch 2392/TCT-QLRR in 2023, the K coefficient is used to control the total value of goods sold on issued invoices compared to the threshold value of input goods calculated by the following formula:

K = Total value of goods sold on invoice / (Total value of Inventory + Total value of purchased goods on invoice)

Accordingly, when an enterprise exceeds the threshold value of input goods calculated as K times the total value of inventory and the total value of purchased goods, the system will issue an invoice warning and put it on the list. manage.

Some examples of explanation requirements due to exceeding the threshold according to the K coefficient

Below are some explanation requirements due to exceeding the K coefficient threshold

Disadvantages of K coefficient:

Because the K coefficient is calculated using mathematical logic without considering other conditional factors, mechanical manipulation of this coefficient may cause inspection warnings but there is no actual risk. For example, some types of processing businesses with revenue many times higher than the value of inventory + inputs fall into the risk list even under normal business conditions.

5. What do businesses need to do to avoid tax risks?

We can draw an important point: Businesses need to manage their finances, accounting and tax declaration process strictly and comply with the law. The goal is to ensure that your business is on these lists businesses “do well” instead of having to deal with lying in list of “violations”

To make this happen, here are some important tips for both businesses and individuals:

  • Understand the law: Master the regulations and guidelines related to data provision, tax return and tax payment. Make sure you understand how it's done and the restrictions and legal obligations you need to follow.
  • Data systematization: Build and maintain a reliable tax, transaction and financial management system. This makes it easy for you to retrieve the necessary information when required by the tax authorities.
  • Watch closely: Make sure you have correctly recorded the financial information. Check regularly to ensure accuracy of data.
  • Getting ready for inspection and inspection: Make sure you have the necessary data and information ready to face any examination or inspection from the tax authorities.
  • Keep relevant documents: Store all tax and financial related documents and vouchers for the specified time. This will help you demonstrate the accuracy and compliance of your information where necessary.
  • Partnering with a financial and tax professional: Work with an experienced tax and finance professional or consulting firm to ensure you follow the right process and comply with the law.

Remember, complying with regulations and following the right processes not only helps you avoid legal risks, but also contributes to the transparency and financial health of your business.

Doing the above is not easy for businesses, the effective solution is to use a professional service: Cooperate with a financial, accounting and tax expert to ensure you follow the correct process and comply with the regulations. legislation.

See detailed information about our services in the article

Accounting and tax consulting services.

We use cookie to improve your online experience. By continuing to browse this website, you agree to our use of cookie.

Cookies

Please read our Terms and Conditions and this Policy before accessing or using our Services. If you cannot agree with this Policy or the Terms and Conditions, please do not access or use our Services. If you are located in a jurisdiction outside the European Economic Area, by using our Services, you accept the Terms and Conditions and accept our privacy practices described in this Policy.
We may modify this Policy at any time, without prior notice, and changes may apply to any Personal Information we already hold about you, as well as any new Personal Information collected after the Policy is modified. If we make changes, we will notify you by revising the date at the top of this Policy. We will provide you with advanced notice if we make any material changes to how we collect, use or disclose your Personal Information that impact your rights under this Policy. If you are located in a jurisdiction other than the European Economic Area, the United Kingdom or Switzerland (collectively “European Countries”), your continued access or use of our Services after receiving the notice of changes, constitutes your acknowledgement that you accept the updated Policy. In addition, we may provide you with real time disclosures or additional information about the Personal Information handling practices of specific parts of our Services. Such notices may supplement this Policy or provide you with additional choices about how we process your Personal Information.


Cookies

Cookies are small text files stored on your device when you access most Websites on the internet or open certain emails. Among other things, Cookies allow a Website to recognize your device and remember if you've been to the Website before. Examples of information collected by Cookies include your browser type and the address of the Website from which you arrived at our Website as well as IP address and clickstream behavior (that is the pages you view and the links you click).We use the term cookie to refer to Cookies and technologies that perform a similar function to Cookies (e.g., tags, pixels, web beacons, etc.). Cookies can be read by the originating Website on each subsequent visit and by any other Website that recognizes the cookie. The Website uses Cookies in order to make the Website easier to use, to support a better user experience, including the provision of information and functionality to you, as well as to provide us with information about how the Website is used so that we can make sure it is as up to date, relevant, and error free as we can. Cookies on the Website We use Cookies to personalize your experience when you visit the Site, uniquely identify your computer for security purposes, and enable us and our third-party service providers to serve ads on our behalf across the internet.

We classify Cookies in the following categories:
 ●  Strictly Necessary Cookies
 ●  Performance Cookies
 ●  Functional Cookies
 ●  Targeting Cookies


Cookie List
A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.

Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.

Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.

Targeting Cookies
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

How To Turn Off Cookies
You can choose to restrict or block Cookies through your browser settings at any time. Please note that certain Cookies may be set as soon as you visit the Website, but you can remove them using your browser settings. However, please be aware that restricting or blocking Cookies set on the Website may impact the functionality or performance of the Website or prevent you from using certain services provided through the Website. It will also affect our ability to update the Website to cater for user preferences and improve performance. Cookies within Mobile Applications

We only use Strictly Necessary Cookies on our mobile applications. These Cookies are critical to the functionality of our applications, so if you block or delete these Cookies you may not be able to use the application. These Cookies are not shared with any other application on your mobile device. We never use the Cookies from the mobile application to store personal information about you.

If you have questions or concerns regarding any information in this Privacy Policy, please contact us by email at . You can also contact us via our customer service at our Site.