• Skip to main content
  • Skip to after header navigation
  • Skip to site footer

Guide to Combating Corruption & Fraud in Infrastructure Development Projects

  • Detection
    • Complaints
      • General initial interview questions
      • How to Generate Complaints and Reports
      • List of fraud reporting sites for Multilateral Development Banks
    • Red Flags
      • Red Flags Listed by Project Cycle
      • “Visible red flags” of Implementation Fraud
      • Proactive Fraud Detection Tests
    • Due Diligence
      • “Top Five” Due Diligence Background Checks
      • Free and Subscription Internet Sites
      • Local and On-Site Due Diligence Checks
      • Due Diligence Service Providers
  • Proof
    • Proving Common Schemes
      • Corruption Schemes
      • Bid Rigging Schemes
      • Collusive Bidding Schemes
      • Fraud Schemes
      • The Basic Steps of a Complex Fraud and Corruption Investigation
    • Elements of Proof for Sanctionable Offenses
      • Elements of Proof of Corrupt Practices
      • Elements of Proof of Obstructive Practices
      • Elements of Proof of Coercive Practices
      • Elements of Proof of Collusive Practices
      • Elements of Proof of Fraudulent Practices
  • Evidence
    • The Basics of Evidence for Investigators
  • Prevention
    • Anti-fraud Resources
Home » Proof » Most Common Schemes » Potential Scheme: Leaking of Bid Information

Potential Scheme: Leaking of Bid Information

Project officials can leak confidential information, such as, among many other things:

  • Budgets and cost estimates
  • Preferred solutions
  • Competing bid information, etc.

to help a favored bidder gain an advantage.  Leaking of bid information usually indicates a corrupt relationship between the parties.

RED FLAGS OF LEAKING OF BID INFORMATION

  • Winning bid is just under the next lowest bid
  • Bid is too close to budget, estimate or preferred solution
  • Inadequate bidding procedures, e.g., acceptance of late bids, non-public bid openings, taking breaks during the bid opening (to provide the opportunity to share the content of certain bids and to amend others), etc.
  • Late bidder is the winning bidder
  • A questionable agent, “consultant” or “middleman” is involved in the bidding process
  • Project officials and a bidder communicate or meet privately during the bidding process

CASE EXAMPLES OF LEAKING OF BID INFORMATION

See actual case example of leaking of bid information from investigated cases.

BASIC STEPS TO DETECT AND PROVE LEAKING OF BID INFORMATION

  1. Identify and interview all complainants to obtain further detail.
    • General interview questions
    • Leaking of bid information questions
  2. Obtain the following bidding documents and examine them for the red flags listed above:
    • Requests for bids
    • Winning and losing bids
    • Bid evaluation reports
    • Minutes of bid opening
  3. Compare information in bids and proposals to confidential information in the files of the bidding organization, including budgets, cost estimates and competing bids.
  4. Interview witnesses and examine telephone, email records and visitors logs to determine if there were communications or meetings between a bidder and project officials during the bidding period.
Category: Most Common Schemes

International Anti-Corruption
Resource Center

Washington, DC
info@iacrc.org

IACRC - International Anti-Corruption Resource Center

© 2025 · IACRC · Guide to Combating Corruption & Fraud in Infrastructure Development Projects · All Rights Reserved